Les cookies nous permettent de vous proposer nos services plus facilement. En utilisant nos services, vous nous donnez expressément votre accord pour exploiter ces cookies.En savoir plus OK

Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP)

Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP)

Le pdf se trouve ci-dessous. Vous pouvez télécharger le pdf en cliquant à droite.

Revenir à l'accueil

 

Au format "texte" :

Siège social pour le continent américain Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 États-Unis http://www.cisco.com Tél. : +1 408 526-4000 +1 800 553-NETS (6387) Fax : +1 408 527-0883 Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) Cisco, Cisco Systems, the Cisco logo, and the Cisco Systems logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0705R) © 2008 Cisco Systems, Inc. All rights reserved. OL-17124-01 LIVRET DE RÉFÉRENCE Téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) Définition des touches de fonction Icônes de l’écran du téléphone Icônes des boutons Tâches téléphoniques courantes Définition des touches de fonction AGrpIntr Prendre un appel en sonnerie dans un groupe associé Annuler Annuler une opération ou quitter un écran sans appliquer les modifications effectuées Autres Afficher d’autres touches de fonction Bis Rappeler le dernier numéro composé Compos. Composer un numéro de téléphone Conf. Créer une conférence téléphonique Détails (SCCP uniquement) Ouvrir l’enregistrement Détails d’un appel à plusieurs interlocuteurs dans les journaux d’appels en absence et d’appels reçus EditNum Modifier un numéro dans un journal d’appels Effacer Supprimer des enregistrements ou des paramètres Enreg. Sauvegarder les paramètres choisis Fermer Fermer la fenêtre active FinApp. Mettre fin à l’appel en cours (intercom ou non) GrpIntr Répondre à un appel en sonnerie dans un autre groupe ou sur une autre ligne InsConf Participer à un appel sur une ligne partagée et établir une conférence téléphonique Inser. Vous ajouter à un appel sur une ligne partagée Intrcpt Répondre à un appel en sonnerie sur un autre téléphone de votre groupe Joindre Joindre plusieurs appels existants pour créer une conférence Liens Afficher des rubriques d’aide connexes ListConf Afficher la liste des participants à la conférence MeetMe Héberger une conférence téléphonique Meet-Me ModeVid. (SCCP uniquement) Choisir un mode d’affichage vidéo Tâches téléphoniques courantes Afficher l’Aide en ligne sur le téléphone Appuyez sur . Passer un appel Décrochez le téléphone avant ou après avoir composé un numéro. Rappeler un numéro Appuyez sur Bis. ou sur le bouton Navigation (téléphone raccroché) pour afficher le journal des appels composés. Passer en mode Combiné au cours d’un appel Décrochez le combiné. Passer en mode haut-parleur ou casque en cours d’appel Appuyez sur ou sur , puis raccrochez le combiné. Activer le mode Coupure micro du téléphone Appuyez sur . Utiliser les journaux d’appels Appuyez sur pour choisir un journal d’appels. Pour numéroter, mettez une entrée de la liste en surbrillance et décrochez le téléphone. Modifier un numéro Appuyez sur EditNum, sur << ou sur >>. Mettre en attente/ reprendre un appel Appuyez sur Attente ou sur Reprend. Transférer un appel vers un nouveau numéro Appuyez sur Trnsfer, saisissez le numéro, puis appuyez de nouveau sur Trnsfer. Passer un appel intercom Appuyez sur le bouton intercom et, le cas échéant, saisissez un numéro. Quand vous entendez la tonalité, commencez à parler. Démarrer une conférence téléphonique standard (ad hoc) Appuyez sur autres > Conf., composez le numéro du participant, puis appuyez de nouveau sur Conf. MàJ Actualiser le contenu Nouvel appel Passer un nouvel appel NPD Activer/désactiver la fonction Ne pas déranger (NPD) NumAbr Composer un numéro en utilisant un code de numérotation abrégée Parquer Stocker un appel à l’aide de la fonction de parcage d’appels Précédent Revenir à la rubrique d’aide précédente Principal Afficher le menu principal de l’Aide QRT Soumettre à l’administrateur système les problèmes relatifs aux appels Quitter Revenir à l’écran précédent Rappel Recevoir une notification lorsqu’un poste occupé se libère Recher. Effectuer une recherche dans une liste de répertoires Effacer Réinitialiser les valeurs par défaut des paramètres RenvTt Configurer/annuler le renvoi d’appels Répond. Prendre un appel Reprend. Reprendre un appel en attente Rvoi Im Transférer ou rediriger un appel vers un système de messagerie vocale Sélect. Sélectionner une option de menu ou un appel SupDerA Abandonner le dernier interlocuteur à avoir rejoint une conférence téléphonique Suppr. Supprimer un participant de la conférence Supprimer Supprimer les caractères se trouvant à droite du curseur lors de l’utilisation de la touche EditNum Transfert Transférer un appel TrnsDir (SCCP uniquement) Transférer deux appels l’un vers l’autre << Supprimer les caractères saisis >> Passer d’un caractère saisi à un autre Icônes de l’écran du téléphone Renvoi d’appels activé Appel en attente Appel connecté Appel entrant Combiné décroché Combiné raccroché Ligne partagée en cours d’utilisation Message en attente Appel authentifié Appel chiffré Une ligne surveillée par FLO est en cours d’utilisation Une ligne surveillée par FLO est inactive Une ligne surveillée par FLO sonne (Interception d’appels FLO) Numérotation abrégée, journal d’appels ou entrée de répertoire (état de la ligne inconnu) Ligne en mode Ne pas déranger (fonction FLO) Ligne intercom inactive Ligne intercom unidirectionnelle Ligne intercom bidirectionnelle Combiné en cours d’utilisation Casque en cours d’utilisation Haut-parleur en cours d’utilisation Icônes des boutons Vidéo activée (SCCP uniquement) Fonction associée à un bouton Mobilité associée à un bouton Attente associée à un bouton Conférence associée à un bouton Transfert associé à un bouton URL de service téléphonique associée à un bouton Vous pouvez maintenant modifier l’entrée d’URL dans le journal d’appels. (SIP uniquement) Option sélectionnée Fonction activée Messages Services Aide Répertoires Paramètres Volume Haut-parleur Coupure micro Casque Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) iii Table des matières Mise en route 1 Utilisation de ce guide 1 Recherche d’informations supplémentaires 2 Accès aux didacticiels d’apprentissage électronique du téléphone IP Cisco Unified série 7900 2 Informations relatives à la sécurité et aux performances 3 Présentation de la sécurité des produits Cisco 4 Fonctions d’accessibilité 4 Raccordement du téléphone 5 Présentation du téléphone 8 Présentation des boutons et du matériel 8 Présentation des lignes et des appels 12 Présentation des icônes de lignes et d’appels 12 Présentation des fonctions de l’écran du téléphone 14 Nettoyage de l’écran du téléphone 15 Présentation des menus et des boutons de fonctions 15 Accès au système d’aide du téléphone 16 Explications relatives à la disponibilité des fonctions 16 Différence entre le protocole SIP et le protocole SCCP 18 Gestion de base des appels 19 Établissement d’un appel : options de base 19 Établissement d’un appel : options supplémentaires 20 Prise d’appel 23 Fin d’un appel 25 Utilisation des fonctions Attente et Reprise 25 iv OL-17124-01 Utilisation du mode coupure micro 27 Passage d’un appel à l’autre 27 Transfert d’un appel en cours vers un autre téléphone 28 Affichage de plusieurs appels 28 Transfert d’appels 29 Transfert d’un appel vers un système de messagerie vocale 30 Renvoi des appels vers un autre numéro 31 Utilisation de la fonction Ne pas déranger 32 Établissement de conférences téléphoniques 34 Utilisation des fonctions de conférence 34 Utilisation de Conférence 34 Utilisation de la fonction Joindre 35 Utilisation de InsConf 36 Utilisation de la fonction Meet-Me 36 Affichage ou suppression de participants à une conférence 37 Passer ou recevoir des appels intercom 38 Gestion avancée des appels 39 Numérotation abrégée 39 Interception d’un appel redirigé sur votre téléphone 40 Stockage et récupération d’appels parqués 42 Déconnexion de groupes de recherche 43 Utilisation d’une ligne partagée 43 Présentation des lignes partagées 44 Utilisation de l’insertion pour vous ajouter à un appel sur une ligne partagée 44 Présentation des fonctions d’insertion 45 Utilisation des fonctions d’insertion 45 Procédure permettant d’empêcher d’autres personnes d’afficher un appel sur une ligne partagée ou de s’y joindre 46 Utilisation de FLO pour déterminer l’état d’une ligne 47 Émission et réception d’appels sécurisés 48 Suivi des appels suspects 49 Donner la priorité aux appels critiques 49 Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) v Utilisation de la fonction de mobilité de poste de Cisco 51 Gestion des appels professionnels à l’aide d’un seul numéro de téléphone 52 Utilisation du combiné, du casque et du haut-parleur 54 Utilisation d’un combiné 54 Utilisation d’un casque 54 Utilisation d’un haut-parleur 56 Utilisation de la fonction Réponse automatique avec un casque ou un haut-parleur 56 Modification des paramètres du téléphone 57 Personnalisation des sonneries et des indicateurs de message 57 Personnalisation de l’écran du téléphone 58 Utilisation des journaux d’appels et des répertoires 59 Utilisation des journaux d’appels 59 Composition depuis le répertoire 61 Utilisation du répertoire d’entreprise sur le téléphone 62 Utilisation du répertoire personnel sur le téléphone 63 Accès aux messages vocaux 66 Utilisation des pages Web Options utilisateur 67 Accès à vos pages Web Options utilisateur 67 Configuration des fonctions et des services sur le Web 68 Utilisation du répertoire personnel sur le Web 68 Utilisation de votre carnet d’adresses personnel sur le Web 68 Configuration de numéros abrégés sur le Web 70 Utilisation de l’outil de synchronisation du carnet d’adresses 71 Configuration de numéros abrégés sur le Web 71 Configuration de services téléphoniques sur le Web 73 Contrôle des paramètres utilisateur sur le Web 74 Contrôle des paramètres de ligne sur le Web 75 Configuration des téléphones et des listes d’accès pour la connexion mobile 77 Utilisation de Cisco WebDialer 79 vi OL-17124-01 Présentation des options de configuration supplémentaires 81 Dépannage du téléphone 85 Informations générales de dépannage 85 Affichage des données d’administration de votre téléphone 86 Utilisation de l’outil de génération de rapports qualité 86 Conditions générales de la garantie matérielle limitée à un an de Cisco 87 Index 89 Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 1 Mise en route Utilisation de ce guide Ce guide propose une présentation générale des fonctions disponibles sur votre téléphone. Parcourez-le dans son intégralité pour prendre connaissance de toutes les possibilités de votre téléphone. Vous pouvez également vous reporter au tableau ci-après, qui permet d’atteindre d’un seul clic les sections les plus utilisées. Pour... Procédez comme suit : Apprendre à utiliser le téléphone par vous-même Lorsque vous avez besoin d’aide, appuyez sur la touche du téléphone. Prendre connaissance des consignes de sécurité Reportez-vous à Informations relatives à la sécurité et aux performances, page 3. Raccorder le téléphone Reportez-vous à Raccordement du téléphone, page 5. Utiliser le téléphone une fois qu’il est installé Commencez par vous reporter à Présentation du téléphone, page 8. Connaître la signification des boutons et des voyants Reportez-vous à Présentation des boutons et du matériel, page 8. En savoir plus sur l’écran Reportez-vous à Présentation des fonctions de l’écran du téléphone, page 14. Passer des appels Reportez-vous à Établissement d’un appel : options de base, page 19. Mettre des appels en attente Reportez-vous à Utilisation des fonctions Attente et Reprise, page 25. Désactiver le micro durant les appels Reportez-vous à Utilisation du mode coupure micro, page 27. Transférer des appels Reportez-vous à Transfert d’appels, page 29. Établir des conférences téléphoniques Reportez-vous à Établissement de conférences téléphoniques, page 34. Configurer la numérotation abrégée Reportez-vous à Numérotation abrégée, page 39. Partager un numéro de téléphone Reportez-vous à Utilisation d’une ligne partagée, page 43. 2 OL-17124-01 Recherche d’informations supplémentaires Pour obtenir la documentation la plus récente sur les téléphones IP Cisco Unified, reportez-vous au site Web à l’adresse suivante : http://www.cisco.com/en/US/products/hw/phones/ps379/tsd_products_support_series_home.html Vous pouvez accéder au site Web de Cisco à l’adresse suivante : http://www.cisco.com/ Les sites Web internationaux de Cisco sont accessibles à l’adresse suivante : http://www.cisco.com/public/countries_languages.shtml Les informations les plus récentes concernant les licences sont disponibles à l’adresse suivante : http://www.cisco.com/en/US/docs/voice_ip_comm/cuipph/all_models/openssl_license/7900_ssllic.html Accès aux didacticiels d’apprentissage électronique du téléphone IP Cisco Unified série 7900 (uniquement sur les téléphones SCCP) Les didacticiels d’apprentissage électronique du téléphone IP Cisco Unified série 7900 utilisent le son et l’animation pour présenter les fonctions d’appel de base. Depuis un ordinateur, vous pouvez accéder en ligne aux didacticiels d’apprentissage électronique de plusieurs modèles de téléphone. Pour rechercher le didacticiel d’apprentissage électronique de votre modèle de téléphone, reportez-vous à la liste de documentations de la page suivante (en anglais uniquement) : http://www.cisco.com/en/US/products/hw/phones/ps379/products_user_guide_list.html Utiliser la fonction haut-parleur du téléphone Reportez-vous à Utilisation du combiné, du casque et du haut-parleur, page 54. Modifier le volume ou la tonalité de la sonnerie Reportez-vous à Modification des paramètres du téléphone, page 57. Consulter vos appels en absence Reportez-vous à Utilisation des journaux d’appels et des répertoires, page 59. Écouter vos messages vocaux Reportez-vous à Accès aux messages vocaux, page 66. Consulter les définitions des touches de fonction et des icônes Reportez-vous au Livret de référence au début du présent guide. Pour... Procédez comme suit : Mise en route Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 3 Remarque Aucun didacticiel d’apprentissage électronique n’est disponible pour les Téléphone IP Cisco Unified 7962G/7942G. Vous pouvez toutefois vous reporter à ceux du téléphone IP Cisco Unified série 7900 pour y découvrir la présentation des fonctions et des fonctionnalités courantes de votre téléphone. Informations relatives à la sécurité et aux performances Cette section décrit l’effet des pannes d’électricité et des autres périphériques sur votre téléphone IP Cisco Unified. Panne d’électricité Vous ne pouvez accéder au service d’urgence que si votre téléphone est alimenté. Si l’alimentation est interrompue, le service d’appel d’urgence et de réparation est indisponible pendant toute la durée de la coupure. Il se peut que vous deviez ensuite réinitialiser ou reconfigurer votre téléphone pour pouvoir utiliser le service d’appel d’urgence et de réparation. Utilisation de périphériques externes Les informations suivantes s’appliquent lorsque vous utilisez des périphériques externes avec le téléphone IP Cisco Unified. Cisco recommande d’utiliser des périphériques externes (casques, etc.) de bonne qualité et protégés des interférences produites par les signaux de fréquences radio et audio. Selon la qualité de ces périphériques et leur proximité par rapport à d’autres périphériques, tels que des téléphones portables ou des radios bidirectionnelles, des parasites sonores peuvent toujours se produire. Dans ce cas, Cisco vous recommande d’effectuer une ou plusieurs des opérations suivantes : • Éloignez le périphérique externe de la source émettrice des signaux de fréquences radio ou audio. • Maintenez les câbles du périphérique externe éloignés de la source émettrice des signaux de fréquences radio ou audio. • Utilisez des câbles blindés pour le périphérique externe ou des câbles dotés d’un blindage supérieur et d’un meilleur connecteur. • Raccourcissez le câble du périphérique externe. • Utilisez des structures en ferrite ou d’autres dispositifs de ce type pour les câbles du périphérique externe. La société Cisco ne peut garantir les performances du système car elle ne dispose d’aucun moyen de contrôle sur la qualité des périphériques externes, des câbles et des connecteurs utilisés. Le système fonctionne comme il convient lorsque les périphériques appropriés sont connectés à l’aide de câbles et de connecteurs de bonne qualité. 4 OL-17124-01 Avertissement Dans les pays de l’Union européenne, utilisez uniquement des casques externes conformes à la Directive [89/336/CE] sur la compatibilité électromagnétique (CEM). Présentation de la sécurité des produits Cisco Ce produit contient des fonctions cryptographiques et est soumis aux lois des États-Unis et des autres pays qui en régissent l’importation, l’exportation, le transfert et l’utilisation. La fourniture de produits cryptographiques Cisco n’autorise pas un tiers à importer, exporter, distribuer ou utiliser le chiffrement. Les importateurs, exportateurs, distributeurs et utilisateurs sont responsables du respect des lois américaines et des autres pays. Si vous utilisez ce produit, vous vous engagez à respecter les lois et réglementations applicables. Si vous n’êtes pas en mesure de respecter les lois américaines et des autres pays, renvoyez-nous ce produit immédiatement. Pour plus d’informations concernant les réglementations d’exportation des États-Unis, rendez-vous à l’adresse suivante : http://www.access.gpo.gov/bis/ear/ear_data.html. Fonctions d’accessibilité La liste des fonctions d’accessibilité est disponible sur demande. Pour plus d’informations concernant les fonctions d’accessibilité Cisco, rendez-vous à l’adresse suivante : www.cisco.com/go/accessibility Raccordement du téléphone Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 5 Raccordement du téléphone Votre administrateur système sera probablement chargé de raccorder votre nouveau téléphone IP Cisco Unified au réseau de téléphonie IP de votre entreprise. Si ce n’est pas le cas, reportez-vous à l’illustration et au tableau ci-dessous pour raccorder le téléphone. 1 Port de l’adaptateur CC (48 V) 6 Prise du combiné 2 Alimentation CA vers CC 7 Prise du casque 3 Cordon d’alimentation CA 8 Bouton du socle 4 Port réseau (10/100 SW) 9 Prise auxiliaire (AUX) 5 Port d’accès (10/100 PC) AUX DC48V 10/100 SW 10/100 PC + 185045 2 9 8 3 4 5 6 7 1 6 OL-17124-01 Réglage du socle Pour modifier l’angle de la base de votre téléphone, maintenez le bouton du socle enfoncé pendant que vous réglez le socle. Réglage du support du combiné Cisco recommande de régler le support du combiné, notamment lors du montage mural du téléphone. Cette opération évite que le récepteur ne glisse facilement de son support. Reportez-vous au tableau ci-dessous pour obtenir les instructions correspondantes. Enregistrement à l’aide de l’outil TAPS Une fois votre téléphone raccordé au réseau, votre administrateur système peut vous demander d’enregistrer automatiquement votre téléphone à l’aide de l’outil TAPS (Tool for Auto-Registered Phones Support, Outil d’assistance des téléphones enregistrés automatiquement). L’outil TAPS peut être utilisé aussi bien pour un nouveau téléphone que pour remplacer un téléphone existant. Pour enregistrer un téléphone à l’aide de l’outil TAPS, décrochez le combiné, saisissez le numéro de poste TAPS fourni par votre administrateur système et suivez les instructions vocales. Il se peut que vous ayez à saisir la totalité de votre numéro de poste, y compris l’indicatif régional. Lorsque votre téléphone affiche un message de confirmation, raccrochez. Le processus de redémarrage du téléphone est lancé. 1 Posez le combiné sur le côté et tirez vers le haut la plaquette en plastique carrée du support du combiné. 2 Faites pivoter la plaquette de 180 degrés. 3 Pour remettre la plaquette en place sur le support du combiné, faites-la coulisser. Une extension ressort en haut de la plaquette qui a pivoté. Replacez le combiné sur son support. 1 2 3 120521 Raccordement du téléphone Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 7 Utilisation d’un casque Vous pouvez utiliser un casque filaire ou un casque sans fil fonctionnant avec la fonction de contrôle à distance du clip de commutation pour casque sans fil. Prise en charge du casque Bien que Cisco Systems réalise certains essais internes sur des casques de fournisseurs tiers utilisés avec les téléphones IP Cisco Unified, Cisco ne certifie pas ni ne promeut de produits de fournisseurs de casques ou de combinés. Cisco recommande d’utiliser des périphériques externes de bonne qualité, par exemple des casques blindés contre les interférences produites par les signaux de fréquences radio (RF) ou audio (AF). En fonction de la qualité de ces périphériques et de leur proximité par rapport à d’autres appareils, tels que les téléphones portables et les radios bidirectionnelles, des parasites sonores ou des échos peuvent toujours se produire. Un ronflement ou un bourdonnement peut être entendu soit par l’interlocuteur uniquement, soit par l’interlocuteur et par l’utilisateur du téléphone IP Cisco Unified. Les ronflements et les bourdonnements peuvent être provoqués par diverses sources extérieures : lampes électriques, moteurs électriques ou grands écrans d’ordinateur, par exemple. Pour plus d’informations, reportez-vous à Utilisation de périphériques externes, page 3. Remarque Dans certains cas, il est possible de réduire ou d’éliminer le ronflement à l’aide d’un groupe amplificateur de puissance local ou d’un injecteur de puissance. En raison des contraintes environnementales et matérielles liées aux différents sites de déploiement des téléphones IP Cisco Unified, il n’existe pas de solution de casque unique optimale pour tous les environnements. Cisco recommande aux clients de tester les casques dans l’environnement prévu afin de déterminer leurs performances avant de prendre une décision d’achat et de les déployer en masse. Qualité audio à l’appréciation de l’utilisateur Au-delà des performances physiques, mécaniques et techniques, la qualité sonore d’un casque doit sembler bonne à l’utilisateur et à son interlocuteur. La qualité sonore est subjective et Cisco ne peut garantir les performances d’aucun casque. Toutefois, un certain nombre de casques de grands fabricants de casques ont été signalés comme fonctionnant bien avec les téléphones IP Cisco Unified. Reportez-vous aux sites des fabricants pour en savoir plus. Pour plus d’informations sur les casques sans fils fonctionnant avec la fonction de contrôle à distance du clip de commutation pour casque sans fil, veuillez accéder au lien URL suivant : http://www.cisco.com/pcgi-bin/ctdp/Search.pl 1. Sélectionnez Communications IP dans la liste déroulante Entrer la solution. La liste déroulante Sélectionner une catégorie de solution s’affiche. 2. Sélectionnez Casques de téléphone IP pour afficher une liste des partenaires du Programme de développement de technologies. Si vous souhaitez rechercher un partenaire du Programme de développement de technologies en particulier, saisissez le nom de ce partenaire dans le champ Saisir le nom de la société. 8 OL-17124-01 Présentation du téléphone Les Téléphone IP Cisco Unified 7962G/7942G sont des téléphones intégrés qui permettent une communication vocale via le réseau de données utilisé par votre ordinateur. Ainsi, vous pouvez passer et recevoir des appels téléphoniques, mettre des appels en attente, utiliser la numérotation abrégée, transférer des appels, établir des conférences téléphoniques, etc. Outre ses capacités de gestion de base des appels, votre téléphone prend en charge certaines fonctions d’optimisation de productivité qui permettent d’étendre les capacités de gestion des appels de votre périphérique. Selon la configuration de votre téléphone, celui-ci peut prendre en charge : • l’accès aux données du réseau, aux applications XML et aux services Web ; • la personnalisation en ligne des fonctions et des services du téléphone à partir de vos pages Web Options utilisateur Cisco Unified CM ; • un système d’aide en ligne complet qui affiche des informations sur l’écran du téléphone. Présentation des boutons et du matériel Pour identifier les boutons et les composants matériels du téléphone, reportez-vous à l’illustration et au tableau ci-dessous. Téléphone IP Cisco Unified 7962G 1 16 3 4 5 7 9 6 8 15 14 13 12 11 10 187005 2 Présentation du téléphone Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 9 Téléphone IP Cisco Unified 7942G 187004 4 5 6 7 9 15 14 13 12 11 10 16 1 3 8 2 10 OL-17124-01 Élément Description Pour en savoir plus, reportez-vous à... 1 Boutons programmables Selon la configuration du téléphone, les boutons programmables permettent l’accès aux : • Lignes téléphoniques et lignes intercom (boutons de ligne) • Numéros abrégés (boutons de numérotation abrégée, y compris la fonction de ligne occupée FLO) • Services en ligne (par exemple, bouton du carnet d’adresses personnel) • Fonctions d’appel (par exemple, un bouton de confidentialité, de mise en attente ou de transfert) Les boutons s’allument pour indiquer les états suivants. Vert fixe : appel actif ou appel intercom bidirectionnel Vert clignotant : appel en attente Orange fixe : fonction de confidentialité en cours d’utilisation, appel intercom unidirectionnel, activation de NPD ou connexion établie avec un groupe de recherche Orange clignotant : appel entrant ou à reprendre Rouge fixe : ligne distante utilisée (ligne partagée ou état FLO) • Présentation des fonctions de l’écran du téléphone, page 14 • Gestion de base des appels, page 19 • Numérotation abrégée, page 39 • Utilisation d’une ligne partagée, page 43 • Utilisation de FLO pour déterminer l’état d’une ligne, page 47 • Utilisation de FLO pour déterminer l’état d’une ligne, page 47 • Passer ou recevoir des appels intercom, page 38 2 Écran du téléphone Affiche les fonctions téléphoniques. Présentation des fonctions de l’écran du téléphone, page 14 3 Bouton du socle Permet de régler l’angle du socle du téléphone. Réglage du socle, page 6 4 Bouton Messages Compose automatiquement le numéro de votre service de messagerie vocale (variable selon les services). Accès aux messages vocaux, page 66 Présentation du téléphone Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 11 5 Bouton Répertoires Active ou désactive le menu Répertoires et permet d’accéder aux journaux d’appels et aux répertoires. Utilisation des journaux d’appels, page 59 6 Bouton Aide Active le menu Aide. Accès au système d’aide du téléphone, page 16 7 Bouton Paramètres Active ou désactive le menu Paramètres et permet de contrôler le contraste de l’écran et les sonneries. Modification des paramètres du téléphone, page 57 8 Bouton Services Active ou désactive le menu Services. Utilisation des pages Web Options utilisateur, page 67 9 Bouton Volume Contrôle le volume du combiné, du casque et du haut-parleur (décroché), ainsi que le volume de la sonnerie (raccroché). Utilisation du combiné, du casque et du haut-parleur, page 54 10 Bouton Haut-parleur Active ou désactive le mode haut-parleur. Lorsque le mode haut-parleur est activé, le bouton est allumé. Utilisation du combiné, du casque et du haut-parleur, page 54 11 Bouton Coupure micro Active ou désactive le micro. Lorsque le micro est coupé, le bouton est allumé. Utilisation du mode coupure micro, page 27 12 Bouton Casque Active ou désactive le mode casque. Lorsque le mode casque est activé, le bouton est allumé. Utilisation du combiné, du casque et du haut-parleur, page 54 13 Bouton Navigation Permet de faire défiler les menus et de mettre les options de menu en surbrillance. Lorsque le téléphone est raccroché, ce bouton permet d’afficher les numéros de téléphone du journal d’appels passés. Utilisation des journaux d’appels, page 59 14 Clavier Permet de composer des numéros de téléphone, de saisir des lettres et de sélectionner des options de menu. Gestion de base des appels, page 19 15 Touches de fonction Chacune de ces touches active une option de touche de fonction (affichée sur l’écran du téléphone). Présentation des fonctions de l’écran du téléphone, page 14 16 Bande lumineuse du combiné Signale un appel entrant ou un nouveau message vocal. Accès aux messages vocaux, page 66 Élément Description Pour en savoir plus, reportez-vous à... 12 OL-17124-01 Présentation des lignes et des appels Pour éviter toute confusion entre une ligne et un appel, reportez-vous aux définitions suivantes. Lignes : chacune est associée à un numéro de répertoire ou à un numéro intercom que vos contacts peuvent utiliser pour vous appeler. Les téléphones IP Cisco Unified 7962G et 7942G prennent en charge respectivement une à six lignes et une à deux lignes, selon la configuration. Pour connaître le nombre de lignes dont vous disposez, regardez à droite de l’écran du téléphone. Vous disposez d’autant de lignes que de numéros d’annuaire et d’icônes de lignes téléphoniques . Appel : chaque ligne peut prendre en charge plusieurs appels. Par défaut, le téléphone prend en charge quatre appels connectés par ligne mais l’administrateur système peut adapter ce nombre à vos besoins. Il ne peut y avoir qu’un seul appel actif ; tous les autres appels sont automatiquement mis en attente. Présentation des icônes de lignes et d’appels Votre téléphone affiche des icônes pour vous aider à connaître l’état d’appel ou de ligne. Icône État de la ligne ou de l’appel Description Combiné raccroché Aucune activité d’appel sur cette ligne. Combiné décroché Vous êtes en train de composer un numéro ou un appel sortant est en sonnerie. Appel connecté La communication avec votre interlocuteur est actuellement établie. Appel en sonnerie Un appel entrant est en sonnerie sur l’une de vos lignes. Appel en attente Vous avez mis un appel en attente. Reportez-vous à Utilisation des fonctions Attente et Reprise, page 25. Utilisé à distance Un autre téléphone qui partage votre ligne a un appel connecté. Pour plus d’informations, reportez-vous à Utilisation d’une ligne partagée, page 43. Appel à reprendre Vous avez un appel en attente à reprendre sur votre téléphone. Reportez-vous à Utilisation des fonctions Attente et Reprise, page 25. Appel authentifié Reportez-vous à Émission et réception d’appels sécurisés, page 48. Appel chiffré Reportez-vous à Émission et réception d’appels sécurisés, page 48. Présentation du téléphone Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 13 Une ligne surveillée par FLO est inactive Reportez-vous à Utilisation de FLO pour déterminer l’état d’une ligne, page 47. Une ligne surveillée par FLO est en cours d’utilisation Reportez-vous à Utilisation de FLO pour déterminer l’état d’une ligne, page 47. Une ligne surveillée par FLO sonne (Interception d’appels FLO) Reportez-vous à Utilisation de FLO pour déterminer l’état d’une ligne, page 47. Ligne en mode Ne pas déranger (FLO) Reportez-vous à Utilisation de FLO pour déterminer l’état d’une ligne, page 47. Ligne intercom inactive La ligne intercom n’est pas utilisée. Reportez-vous à Passer ou recevoir des appels intercom, page 38. Appel intercom unidirectionnel La ligne intercom envoie ou reçoit des données audio unidirectionnelles. Reportez-vous à Passer ou recevoir des appels intercom, page 38. Appel intercom bidirectionnel Le destinataire a appuyé sur le bouton de ligne intercom pour utiliser la fonction audio bidirectionnelle avec l’appelant. Reportez-vous à Passer ou recevoir des appels intercom, page 38. Icône État de la ligne ou de l’appel Description 14 OL-17124-01 Présentation des fonctions de l’écran du téléphone Lorsque des appels sont actifs et que plusieurs menus de fonctions sont ouverts, l’écran principal du téléphone se présente de la façon suivante : 1 Ligne téléphonique principale Affiche le numéro de téléphone (numéro de répertoire) de votre ligne téléphonique principale. Lorsque plusieurs onglets de fonctions sont ouverts, le numéro de téléphone, l’heure et la date s’affichent en alternance à cet endroit. 2 Indicateurs des boutons programmables Les boutons programmables peuvent servir de boutons de lignes téléphoniques, de boutons de numérotation abrégée, de boutons de services téléphoniques ou de boutons de fonctions téléphoniques. Les icônes et les étiquettes indiquent le mode de configuration de ces boutons. Pour obtenir des informations sur une icône, reportez-vous à « Icônes de l’écran du téléphone » dans le Livret de référence au début du présent guide. 3 Étiquettes des touches de fonction Chacune décrit la fonction d’une touche de fonction. Pour activer une touche de fonction, appuyez sur le bouton correspondant. 4 Ligne d’état Affiche les icônes du mode audio, les informations d’état et les invites. 5 Zone d’activité des appels Affiche les appels en cours par ligne, notamment l’ID de l’appelant, la durée et l’état de l’appel pour la ligne mise en surbrillance (en mode d’affichage standard). Reportez-vous à « Présentation des icônes de lignes et d’appels » à la page 12 et à Affichage de plusieurs appels, page 28. 6 Onglet Téléphone Indique l’activité des appels. 7 Onglets de fonctions Indiquent qu’un menu de fonctions est ouvert. Reportez-vous à Présentation des menus et des boutons de fonctions, page 15. 7 1 6 5 4 2 3 186847 Présentation du téléphone Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 15 Nettoyage de l’écran du téléphone Utilisez uniquement un chiffon doux et sec pour essuyer l’écran du téléphone. N’utilisez pas de produits liquides ou en poudre sur le téléphone, car ils risquent d’endommager les composants de l’appareil et donc d’entraîner des dysfonctionnements. Présentation des menus et des boutons de fonctions Appuyez sur un bouton de fonctions pour ouvrir ou fermer un menu de fonctions. Pour... Procédez comme suit : Ouvrir ou fermer un menu de fonctions Appuyez sur un bouton de fonctions : Messages Services Répertoires Paramètres Aide Faire défiler une liste ou un menu Appuyez sur le bouton Navigation. Remonter d’un niveau au sein d’un menu de fonctions Appuyez sur Quitter. Si vous appuyez sur Quitter alors que vous êtes dans le niveau supérieur d’un menu, ce dernier se ferme. Passer d’un menu de fonctions actif à un autre Appuyez sur un onglet de fonctions. Un onglet est affecté à chaque menu de fonctions. Celui-ci est visible lorsque le menu de fonctions est ouvert. 16 OL-17124-01 Accès au système d’aide du téléphone Votre téléphone comprend un système complet d’aide en ligne. Les rubriques d’aide apparaissent à l’écran du téléphone. Explications relatives à la disponibilité des fonctions Selon la configuration de votre système téléphonique, certaines fonctionnalités décrites dans ce guide sont susceptibles de ne pas être disponibles dans votre cas ou de fonctionner différemment. Pour en savoir plus sur le fonctionnement ou la disponibilité des fonctions, contactez un membre de l’équipe d’assistance ou votre administrateur système. Une touche de fonction ou un bouton de ligne peut permettre d’accéder à de nombreuses fonctions. Vous pouvez configurer certaines fonctions, mais votre administrateur système contrôle la plupart d’entre elles. L’accès aux fonctions au moyen des touches de fonction et des boutons de ligne est résumé ci-dessous. Pour... Procédez comme suit : Afficher le menu principal Appuyez sur le bouton du téléphone et attendez quelques secondes que le menu s’affiche. Les rubriques du menu principal abordent les thèmes suivants : • À propos de votre téléphone IP Cisco Unified : description détaillée de votre téléphone • Procédures relatives aux tâches téléphoniques courantes • Fonctions d’appel : description et procédures d’utilisation des fonctions d’appel • Aide : conseils sur l’utilisation et l’accès Obtenir des informations sur un bouton ou une touche de fonction Appuyez sur , puis rapidement sur le bouton ou la touche de fonction. Obtenir des informations sur une option de menu Appuyez sur , ou pour afficher un menu de fonctions. Mettez une option du menu en surbrillance, puis appuyez deux fois rapidement sur . Apprendre à vous servir de l’aide Appuyez deux fois rapidement sur . Sélectionnez la rubrique de votre choix. Présentation du téléphone Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 17 Fonction Touche de fonction Étiquette et icône du bouton de ligne Rappel Rappel Rappel Renvoi d’appels RenvTt Renvoyer tout Parcage d’appel Parquer Parquer Interception d’appels Intrcpt Intrcpt Conférence Conf. Conférence Liste de conférence ListConf Liste de conférence Ne pas déranger NPD Ne pas déranger ou Ne pas déranger Mettre fin à un appel FinApp. Mettre fin à un appel Interception d’appels de groupe GrpIntr Interception d’appels de groupe Attente Attente Attente Groupe de recherche Groupmt Groupe de recherche ou Groupe de recherche Identification d’appels malveillants IDAM ID d’appels malveillants Conférences Meet-Me MeetMe MeetMe Mobilité Mobilité Mobilité Nouvel appel NvAppel NvAppel Autre groupe de prise d’appel AGrpIntr Autre groupe de prise d’appel Outil de génération de rapports qualité QRT Outil de génération de rapports qualité Bis Bis Bis Suppression du dernier participant à une conférence SupDerA Supprimer le dernier participant Transfert Trnsfer Trnsfer Commande du mode vidéo ModeVid. Vidéo 18 OL-17124-01 Différence entre le protocole SIP et le protocole SCCP Votre téléphone peut être configuré pour fonctionner avec l’un de ces deux protocoles de signalisation : SIP (Session Initiation Protocol) ou SCCP (Skinny Call Control Protocol). C’est votre administrateur système qui détermine cette configuration. Les fonctions disponibles sur le téléphone dépendent du protocole choisi. Le présent guide indique les fonctions spécifiques à chaque protocole. Pour déterminer le protocole configuré sur votre téléphone, contactez votre administrateur système ou sélectionnez l’option > Caractéristiques > Protocole de contrôle d’appel sur votre téléphone. Gestion de base des appels Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 19 Gestion de base des appels Les tâches de gestion de base des appels s’appuient sur un ensemble de fonctions et de services. La disponibilité des fonctionnalités peut varier. Pour plus d’informations, contactez votre administrateur système. Établissement d’un appel : options de base Voici quelques méthodes simples pour passer un appel depuis votre téléphone IP Cisco Unified. Pour... Procédez comme suit : Pour en savoir plus, reportez-vous à... Passer un appel à l’aide du combiné Décrochez le combiné et saisissez un numéro. Présentation du téléphone, page 8 Passer un appel en utilisant le haut-parleur Appuyez sur , puis saisissez un numéro. Utilisation du combiné, du casque et du haut-parleur, page 54 Passer un appel en utilisant le casque Appuyez sur , puis saisissez un numéro. Si le bouton est allumé, vous pouvez également appuyer sur NvAppel et composer un numéro. Utilisation du combiné, du casque et du haut-parleur, page 54 Rappeler un numéro Appuyez sur Bis pour composer le dernier numéro ou sur le bouton Navigation pour afficher les appels passés (dans ce dernier cas, le téléphone doit être inactif). Utilisation des journaux d’appels, page 59 Passer un appel lorsqu’un autre appel est actif (en utilisant la même ligne) 1. Appuyez sur Attente. 2. Appuyez sur NvAppel. 3. Saisissez un numéro. Utilisation des fonctions Attente et Reprise, page 25 Composer un numéro à partir d’un journal d’appels 1. Sélectionnez > Appels en absence, Appels reçus ou Appels composés. 2. Sélectionnez ou recherchez une entrée de la liste, puis décrochez le téléphone. Utilisation des journaux d’appels, page 59 20 OL-17124-01 Conseils • Vous pouvez composer un numéro avec le combiné raccroché et sans tonalité (prénumérotation). Pour la prénumérotation, entrez un numéro, puis décrochez en soulevant le combiné ou en appuyant sur Compos., ou . • Lors de la prénumérotation, le téléphone tente d’anticiper le numéro en cours de composition. Pour ce faire, il utilise le journal d’appels passés pour afficher les numéros correspondants (s’ils sont disponibles). Cette opération s’appelle la numérotation automatique. Pour la lancer à l’écran, appuyez sur un numéro affiché ou une autre occurrence de la liste, puis décrochez le combiné. • Si vous commettez une erreur pendant la numérotation, appuyez sur << pour effacer des chiffres. • Si les interlocuteurs d’un appel entendent un bip, l’appel est peut-être surveillé ou enregistré. Pour plus d’informations, contactez votre administrateur système. • Votre téléphone peut être configuré pour la connexion aux appels internationaux, qui est indiquée par un symbole « + » sur les journaux d’appels, le rappel ou les entrées du répertoire d’appels. Pour plus d’informations, contactez votre administrateur système. Établissement d’un appel : options supplémentaires Vous pouvez passer des appels à l’aide des fonctions et services spéciaux éventuellement disponibles sur votre téléphone. Pour plus d’informations sur ces options supplémentaires, contactez votre administrateur système. Pour... Procédez comme suit : Pour en savoir plus, reportez-vous à... Passer un appel lorsqu’un autre est actif (sur une ligne différente) 1. Appuyez sur correspondant à la nouvelle ligne. Le premier appel est mis en attente automatiquement. 2. Saisissez un numéro. Utilisation des fonctions Attente et Reprise, page 25 Composer un numéro abrégé Procédez comme suit : • Appuyez sur (bouton de numérotation abrégée). • Utilisez la fonction NumAbr. • Utilisez la fonction de numérotation abrégée. Numérotation abrégée, page 39 Gestion de base des appels Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 21 Composer un numéro à partir d’un répertoire d’entreprise disponible sur le téléphone 1. Sélectionnez > Répertoire d’entreprise (le nom exact de la fonction peut varier). 2. Saisissez un nom, puis appuyez sur Recher. 3. Mettez l’entrée de la liste en surbrillance et décrochez. Utilisation des journaux d’appels, page 59 Utiliser un répertoire d’entreprise sur un ordinateur pour composer un numéro à l’aide de la fonctionnalité Cisco WebDialer 1. Ouvrez un navigateur Web et accédez au répertoire compatible WebDialer de votre entreprise. 2. Cliquez sur le numéro à composer. Utilisation de Cisco WebDialer, page 79 Utiliser la fonction de rappel pour recevoir une notification lorsqu’un poste occupé ou en sonnerie se libère 1. Appuyez sur Rappel lorsque vous entendez la tonalité occupé ou la sonnerie. 2. Raccrochez. Votre téléphone vous avertit lorsque la ligne se libère. 3. Passez à nouveau l’appel. Votre administrateur système Vérifier si une ligne associée à un numéro abrégé, un journal d’appels ou une liste de répertoires est occupée avant de l’appeler Recherchez les indicateurs d’affichage de ligne occupée. Utilisation de FLO pour déterminer l’état d’une ligne, page 47 Passer un appel prioritaire (qui a la préséance) (uniquement sur les téléphones SCCP) Entrez le numéro d’accès MLPP, puis le numéro de téléphone. Donner la priorité aux appels critiques, page 49 Composer un numéro depuis une entrée de carnet d’adresses personnel 1. Sélectionnez > Répertoire personnel pour vous connecter. 2. Sélectionnez Carnet d’adresses personnel et recherchez le numéro dans la liste. Utilisation du répertoire personnel sur le téléphone, page 63 Passer un appel à l’aide d’un code de facturation ou de suivi (Uniquement sur les téléphones SCCP) 1. Composez un numéro. 2. Lorsque vous entendez la tonalité, saisissez un code d’affaire client ou un code d’autorisation forcée. Votre administrateur système Pour... Procédez comme suit : Pour en savoir plus, reportez-vous à... 22 OL-17124-01 Passer un appel en utilisant votre profil de mobilité de poste Cisco Connectez-vous au service de mobilité de poste de Cisco sur un téléphone. Utilisation de la fonction de mobilité de poste de Cisco, page 51 Utiliser la fonction d’accès vocal mobile pour passer un appel depuis un téléphone portable 1. Composez le numéro d’accès vocal mobile qui vous a été attribué. 2. Saisissez le numéro de votre téléphone portable, si vous y êtes invité, et votre PIN. 3. Appuyez sur 1 pour effectuer un appel vers un téléphone IP d’entreprise. 4. Composez le numéro d’un téléphone de bureau autre que le vôtre. Remarque Avant d’effectuer un appel à l’aide de la fonction, procurez-vous le numéro d’accès vocal mobile et le PIN de l’utilisateur final auprès de votre administrateur système. Utilisation de la fonction de mobilité de poste de Cisco, page 51 Passer un appel à l’aide de numéros abrégés. Remarque Avant que vous puissiez utiliser cette option, votre administrateur système doit la configurer et affecter une URL de service au bouton de ligne. Pour plus d’informations, contactez votre administrateur système. 1. Appuyez sur le bouton de ligne de numérotation abrégée. 2. Faites défiler les entrées ou appuyez sur le numéro d’index pour accéder à l’entrée souhaitée. 1. Appuyez sur Compos. Configuration de codes de carnet d’adresses personnel sur le Web, page 70 Utilisation de votre carnet d’adresses personnel sur le Web, page 68 Pour... Procédez comme suit : Pour en savoir plus, reportez-vous à... Gestion de base des appels Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 23 Prise d’appel Vous pouvez prendre un appel en décrochant le combiné ou en utilisant d’autres options éventuellement disponibles sur le téléphone. Passer un appel à l’aide du carnet d’adresses personnel Remarque Avant que vous puissiez utiliser cette option, votre administrateur système doit la configurer et affecter une URL de service au bouton de ligne. Pour plus d’informations, contactez votre administrateur système. 1. Appuyez sur le bouton de ligne de votre carnet d’adresses personnel. 2. Accédez au contact et sélectionnez le numéro. 3. Appuyez sur Compos. Utilisation de votre carnet d’adresses personnel sur le Web, page 68 Configuration de codes de carnet d’adresses personnel sur le Web, page 70 Pour... Procédez comme suit : Pour en savoir plus, reportez-vous à... Répondre avec un casque filaire Si le bouton est éteint, appuyez dessus. Autre possibilité : si le bouton est déjà allumé, appuyez sur Répond. ou sur (voyant clignotant). Si vous utilisez un casque sans fil, reportez-vous à la documentation qui l’accompagne. Utilisation du combiné, du casque et du haut-parleur, page 54 Répondre en mode haut-parleur Appuyez sur , Répond. ou sur (voyant clignotant). Utilisation du combiné, du casque et du haut-parleur, page 54 Prendre un nouvel appel à partir d’un appel déjà connecté Appuyez sur Répond. ou, si l’appel est en sonnerie sur une autre ligne, appuyez sur (clignotement). Utilisation des fonctions Attente et Reprise, page 25 Répondre à l’aide de la fonction d’appel en attente Appuyez sur Répond. Utilisation des fonctions Attente et Reprise, page 25 Pour... Procédez comme suit : Pour en savoir plus, reportez-vous à... 24 OL-17124-01 Transférer un appel vers un système de messagerie vocale Appuyez sur Rvoi Im. Transfert d’un appel vers un système de messagerie vocale, page 30 Connecter automatiquement des appels Utilisez la fonction de réponse automatique. Utilisation de la fonction Réponse automatique avec un casque ou un haut-parleur, page 56 Récupérer un appel parqué sur un autre téléphone Utilisez Parcage d’appel ou Parcage d’appels dirigé. Stockage et récupération d’appels parqués, page 42 Utiliser le téléphone pour prendre un appel en sonnerie ailleurs Utilisez la fonction d’interception d’appels. Interception d’un appel redirigé sur votre téléphone, page 40 Prendre un appel prioritaire (uniquement sur les téléphones SCCP) Mettez fin à l’appel en cours en raccrochant, puis appuyez sur Répond. Donner la priorité aux appels critiques, page 49 Prendre un appel sur votre téléphone portable ou une autre destination distante Activez la connexion mobile et répondez sur votre téléphone. Lorsque vous activez la connexion mobile : • Votre bureau et vos destinations distantes reçoivent les appels simultanément. • Lorsque vous prenez l’appel sur votre téléphone de bureau, la sonnerie s’interrompt, la déconnexion se produit et un message d’appel en absence s’affiche sur les destinations distantes. • Lorsque vous prenez l’appel sur une destination distante, la sonnerie s’interrompt, la déconnexion se produit et un message d’appel en absence s’affiche sur les autres destinations distantes. Utilisation de la fonction de mobilité de poste de Cisco, page 51 Pour... Procédez comme suit : Pour en savoir plus, reportez-vous à... Gestion de base des appels Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 25 Conseil Si les interlocuteurs d’un appel entendent un bip, l’appel est peut-être surveillé ou enregistré. Pour plus d’informations, contactez votre administrateur système. Fin d’un appel Pour mettre fin à un appel, raccrochez. Le tableau ci-dessous présente des informations à ce sujet. Utilisation des fonctions Attente et Reprise Vous pouvez mettre des appels en attente et les reprendre. Lorsque vous mettez un appel en attente, l’icône Attente apparaît en regard de l’ID de l’appelant et le bouton de la ligne correspondante clignote en vert . Si la fonction Récupérer l’appel en attente est activée sur votre téléphone, l’appel que vous avez mis en attente sonne de nouveau au bout d’un certain temps. Un appel en attente reste en attente jusqu’à ce que vous le repreniez ou que cette fonction expire. Votre téléphone peut vous indiquer la présence d’un appel à reprendre de diverses manières : • En vous avertissant à intervalles réguliers par une sonnerie (ou par un clignotement ou un bip, selon la configuration de votre ligne téléphonique) • En affichant brièvement Récupérer l’appel en attente dans la barre d’état, en bas de l’écran du téléphone • En affichant l’icône animée Récupérer l’appel en attente en regard de l’ID de l’appelant correspondant à l’appel • En affichant un bouton de ligne orange (voyant clignotant, selon l’état de la ligne). Pour... Procédez comme suit : Raccrocher lorsque vous utilisez le combiné Replacez le combiné sur son support ou appuyez sur FinApp. Raccrocher lorsque vous utilisez un casque filaire Appuyez sur . Pour que le mode casque reste activé, appuyez sur FinApp. Si vous utilisez un casque sans fil, reportez-vous à la documentation qui l’accompagne. Raccrocher en cas d’utilisation du haut-parleur Appuyez sur ou sur FinApp. Mettre fin à un appel sans pour autant mettre fin à un autre appel sur la même ligne Appuyez sur FinApp. Le cas échéant, récupérez d’abord l’appel mis en attente. 26 OL-17124-01 Conseils • Habituellement, l’activation de la fonction de mise en attente génère de la musique ou un bip. • Si vous êtes informé au même moment de l’arrivée d’un appel entrant et d’un appel à reprendre, l’écran de votre téléphone affiche en priorité l’appel entrant (par défaut). Votre administrateur système peut modifier ce paramètre de priorité. • Si vous utilisez une ligne partagée, la fonction Récupérer l’appel en attente permet d’appliquer la sonnerie uniquement au téléphone ayant mis l’appel en attente et non aux autres téléphones partageant la ligne. • Votre administrateur système détermine le délai entre les alertes de la fonction Récupérer l’appel en attente. Pour... Procédez comme suit : Mettre un appel en attente 1. Assurez-vous que l’appel à mettre en attente est mis en surbrillance. 2. Appuyez sur Attente. Reprendre sur la ligne active un appel mis en attente 1. Vérifiez que l’appel concerné est en surbrillance. 2. Appuyez sur Reprend. Reprendre sur une autre ligne un appel mis en attente 1. Appuyez sur le bouton de ligne correspondant : ou (voyant clignotant). Cette action peut entraîner la reprise automatique d’un appel en attente : • Si la ligne comporte un appel à récupérer, celui-ci est repris. • Si la ligne comporte plusieurs appels à récupérer, le plus ancien est repris. • Si la ligne comporte uniquement un appel en attente qui n’est pas à récupérer, celui-ci est repris. 2. Le cas échéant, recherchez l’appel concerné dans la liste, puis appuyez sur Reprise. Gestion de base des appels Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 27 Utilisation du mode coupure micro Lorsque la coupure micro est activée, vous pouvez entendre vos interlocuteurs, mais ces derniers ne peuvent pas vous entendre. Il est possible d’utiliser cette fonction avec le combiné, le haut-parleur ou le casque. Passage d’un appel à l’autre Vous pouvez passer d’un appel à un autre, sur une ou plusieurs lignes. Si l’appel sur lequel vous voulez basculer n’est pas automatiquement mis en surbrillance, utilisez le bouton Navigation pour l’atteindre. Pour... Procédez comme suit : Activer le microphone Appuyez sur . Désactiver le microphone Appuyez sur . Pour... Procédez comme suit : Passer d’un appel connecté à l’autre sur une même ligne 1. Assurez-vous que l’appel vers lequel vous souhaitez basculer est mis en surbrillance. 2. Appuyez sur Reprend. Tout appel actif est mis en attente et l’appel sélectionné est repris. Passer d’un appel connecté à l’autre sur différentes lignes Appuyez sur le bouton de la ligne sur laquelle vous souhaitez passer. Si la ligne ne comporte qu’un seul appel en attente, la reprise de ce dernier est automatique. Si elle en comporte plusieurs, mettez l’appel concerné en surbrillance, puis appuyez sur Reprise. Répondre à un appel en sonnerie à partir d’un appel déjà connecté Appuyez sur Répond. ou, si l’appel est en sonnerie sur une autre ligne, appuyez sur (voyant clignotant). Tout appel actif est mis en attente et l’appel sélectionné est repris. 28 OL-17124-01 Transfert d’un appel en cours vers un autre téléphone Vous pouvez transférer l’appel en cours de votre téléphone de bureau vers votre portable ou une autre destination distante. Affichage de plusieurs appels Une meilleure compréhension de l’affichage d’appels multiples sur le téléphone peut vous aider à organiser vos efforts de gestion des appels. En mode d’affichage standard, le téléphone affiche les appels de la façon suivante pour la ligne mise en surbrillance : • Les appels ayant le niveau de priorité le plus important et la durée la plus longue figurent en haut de la liste. • Les appels d’un même type sont regroupés. Par exemple, les appels auxquels vous vous êtes déjà connecté sont regroupés au début de la liste, tandis que les appels en attente sont regroupés à la fin. Pour... Procédez comme suit : Transférer l’appel en cours de votre téléphone de bureau vers un téléphone portable 1. Appuyez sur la touche de fonction Mobilité, puis sélectionnez Transférer l’appel vers le téléphone portable. 2. Répondez à l’appel en cours sur votre téléphone portable. Le bouton de la ligne du téléphone de bureau devient rouge et les icônes du combiné ainsi que le numéro de l’appelant apparaissent sur l’écran du téléphone. Vous ne pouvez pas utiliser la même ligne téléphonique pour d’autres appels mais, si votre téléphone de bureau prend en charge plusieurs lignes, vous pouvez utiliser une autre ligne pour émettre ou recevoir des appels. Transférer l’appel en cours d’un téléphone portable vers votre téléphone de bureau 1. Raccrochez pour déconnecter le téléphone portable sans interrompre l’appel. 2. Dans un délai de quatre secondes, appuyez sur la touche Reprise de votre téléphone de bureau et commencez à parler. Gestion de base des appels Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 29 Les méthodes suivantes permettent d’afficher plusieurs appels sur plusieurs lignes : Transfert d’appels Le transfert permet de rediriger un appel connecté. La cible est le numéro vers lequel vous souhaitez transférer l’appel. Pour... Procédez comme suit : Afficher les appels d’une autre ligne 1. Appuyez sur . 2. Appuyez immédiatement sur le bouton de ligne . Passer en mode de présentation des appels Appuyez sur correspondant à la ligne mise en surbrillance. Le téléphone bascule sur le mode de présentation des appels et affiche un appel par ligne. L’appel affiché est l’appel actif ou l’appel en attente le plus ancien. Pour revenir au mode d’affichage standard, appuyez sur , puis, immédiatement après, sur le bouton de ligne. Pour... Procédez comme suit : Transférer un appel sans prévenir le destinataire du transfert 1. À partir d’un appel en cours, appuyez sur Trnsfer. 2. Saisissez le numéro cible. 3. Appuyez de nouveau sur Trnsfer pour effectuer le transfert ou sur FinApp. pour l’annuler. Remarque Si la fonction de transfert en mode combiné raccroché est activée sur votre téléphone, terminez le transfert en raccrochant. Informer le destinataire du transfert avant de lui transférer un appel (transfert par consultation) 1. Au cours de l’appel, appuyez sur Trnsfer. 2. Saisissez le numéro cible. 3. Patientez quelques instants pour laisser le temps au destinataire du transfert de répondre. 4. Appuyez de nouveau sur Trnsfer pour effectuer le transfert ou sur FinApp. pour l’annuler. Remarque Si la fonction de transfert en mode combiné raccroché est activée sur votre téléphone, terminez le transfert en raccrochant. 30 OL-17124-01 Conseils • Si la fonction de transfert en mode combiné raccroché est activée sur votre téléphone, terminez l’appel en raccrochant. • Si le transfert en mode combiné raccroché n’est pas activé sur le téléphone, le fait de raccrocher sans appuyer sur Trnsfer remet l’appel en attente. • Trnsfer ne permet pas de rediriger un appel en attente. Appuyez sur Reprend. pour le reprendre avant de le transférer. Transfert d’un appel vers un système de messagerie vocale La touche Rvoi Im vous permet de transférer un appel actif, en sonnerie ou en attente vers votre système de messagerie vocale. Selon le type d’appel et la configuration de votre téléphone, vous pouvez également utiliser cette touche pour transférer l’appel vers le système de messagerie vocale d’un autre interlocuteur. • Si le téléphone d’une autre personne sonne, Rvoi Im vous permet de rediriger l’appel soit vers votre propre système de messagerie vocale, soit vers celui du destinataire initial. Votre administrateur système doit au préalable avoir activé cette option pour vous. • Si l’appel vous est directement destiné (sans être transféré ou redirigé vers votre poste) ou si votre téléphone ne prend pas en charge l’option décrite ci-dessus, appuyez sur la touche Rvoi Im pour rediriger l’appel vers votre système de messagerie vocale. Mettre en communication un appelant avec un autre (transfert direct) sans rester en ligne (uniquement sur les téléphones SCCP) 1. Faites défiler les appels sur la ligne et mettez en surbrillance l’appel concerné. 2. Appuyez sur Sélect. 3. Renouvelez cette procédure pour le second appel. 4. Lorsque l’un des appels sélectionnés est mis en surbrillance, appuyez sur TrnsDir. (il se peut que vous deviez au préalable appuyer sur autres). Les deux appels se connectent l’un à l’autre et vous ne participez plus à l’appel. Remarque Pour rester en ligne avec ces appelants, utilisez l’option Joindre. Rediriger un appel vers un système de messagerie vocale Appuyez sur Rvoi Im. Pour plus d’informations, reportez-vous à Transfert d’un appel vers un système de messagerie vocale, page 30. Pour... Procédez comme suit : Gestion de base des appels Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 31 Conseil Si le menu disparaît avant que vous ayez pu faire votre choix, appuyez de nouveau sur Rvoi Im pour qu’il s’affiche à nouveau. Vous pouvez également demander à votre administrateur système qu’il définisse une valeur de temporisation plus longue. Renvoi des appels vers un autre numéro Les fonctions de renvoi des appels permettent de rediriger tous les appels entrants de votre téléphone vers un autre numéro. Votre administrateur système peut vous autoriser à choisir entre deux types de fonctions de renvoi d’appel : • Renvoi d’appels sans condition (Renvoi de tous les appels) : s’applique à tous les appels que vous recevez. • Renvoi d’appel conditionnel (Renvoi si sans réponse, Renvoi si occupé, Pas de couverture) : s’applique à certains appels que vous recevez, sous certaines conditions. Vous pouvez accéder à la fonction de renvoi de tous les appels sur votre téléphone ou à partir des pages Web Options utilisateur. Les fonctions de renvoi d’appel conditionnel sont accessibles uniquement à partir de vos pages Web Options utilisateur. Votre administrateur système détermine les fonctions de renvoi d’appels auxquelles vous avez accès. Pour... Procédez comme suit : Transférer un appel actif, en sonnerie ou en attente vers un système de messagerie vocale Appuyez sur Rvoi Im. Cela entraîne l’une des actions suivantes : • L’appel est transféré vers votre système de messagerie vocale. • L’écran de votre téléphone affiche un menu vous permettant de choisir entre votre système de messagerie vocale et celui du destinataire initial. Sélectionnez une option pour rediriger l’appel. Pour... Procédez comme suit : Configurer le renvoi d’appels sur votre ligne principale Appuyez sur RenvTt ou Renvoyer tout, puis entrez un numéro de téléphone cible. Annuler le renvoi de tous les appels sur votre ligne principale Appuyez sur RenvTt ou Renvoyer tout. 32 OL-17124-01 Conseils • Saisissez le numéro cible du renvoi d’appel exactement comme si vous le composiez sur le téléphone. Par exemple, entrez un code d’accès ou l’indicatif régional (le cas échéant). • Vous pouvez renvoyer vos appels vers un téléphone analogique traditionnel ou vers un autre téléphone IP. Cependant, votre administrateur système peut limiter la fonction de renvoi des appels aux numéros utilisés au sein de votre société. • Le renvoi d’appels dépend de la ligne téléphonique. Si un appel arrive sur une ligne dont la fonction de renvoi n’est pas activée, il sonne normalement. • Votre administrateur système peut activer une fonction d’annulation de transfert permettant à la personne qui reçoit vos appels transférés de vous joindre. Lorsque cette fonction est activée, un appel passé depuis le téléphone cible vers votre poste n’est pas transféré et votre poste sonne. • Il est possible que votre téléphone refuse votre tentative de configuration du renvoi de tous les appels directement sur le téléphone si le numéro cible saisi a pour effet de créer une boucle de renvoi d’appel ou de dépasser le nombre maximal de liens autorisés dans une chaîne de renvoi d’appel. Utilisation de la fonction Ne pas déranger Vous pouvez utiliser la fonction Ne pas déranger (NPD) pour désactiver seulement la sonnerie de votre téléphone ou pour désactiver toutes les notifications sonores et visuelles des appels entrants. L’activation de cette fonction requiert l’intervention de votre administrateur système. Lorsque les fonctions NPD et Renvoi de tous les appels sont activées sur votre téléphone, les appels sont renvoyés et l’appelant n’entend pas de tonalité occupé. Vérifier que le renvoi de tous les appels est activé sur votre ligne principale Recherchez : • L’icône de renvoi d’appel au-dessus du numéro de téléphone principal : . • Le numéro cible de renvoi d’appel dans la ligne d’état. Configurer ou annuler le renvoi d’appels à distance ou dans le cas d’une ligne autre que la ligne principale 1. Connectez-vous à vos pages Web Options utilisateur. (Reportez-vous à Accès à vos pages Web Options utilisateur, page 67.) 2. Accédez à vos paramètres de renvoi d’appels. (Reportez-vous à Contrôle des paramètres de ligne sur le Web, page 75.) Remarque Si la fonction de renvoi des appels s’applique à toute ligne secondaire, aucune confirmation de votre téléphone n’indique que l’opération est en cours. Au lieu de cela, vous devez confirmer vos paramètres dans les pages Web Options utilisateur. Pour... Procédez comme suit : Gestion de base des appels Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 33 Les interactions de la fonction NPD avec d’autres types d’appels sont les suivantes : • NPD n’affecte pas les appels intercom ni les appels prioritaires non-intercom. • Si les fonctions NPD et de réponse automatique sont activées, seuls les appels intercom sont pris automatiquement. Conseils • Lorsque la fonction NPD est active, le blocage est appliqué à toutes les lignes de votre téléphone. • Lorsque les fonctions NPD et Renvoi de tous les appels sont activées sur votre téléphone, c’est le Renvoi de tous les appels qui a la priorité sur les appels entrants. Cela signifie que les appels sont renvoyés et que l’appelant n’entend pas de tonalité occupé. • Les fonctions d’intercom, de préséance et de préemption à plusieurs niveaux (MLPP), de récupération des appel parqués et de récupération des appels en attente ont toutes précédence sur la fonction NPD. • L’activation de cette dernière requiert l’intervention de votre administrateur système. Pour... Procédez comme suit : Activer NPD Appuyez sur NPD ou Ne pas déranger . « Ne pas déranger » s’affiche sur l’écran du téléphone, le voyant NPD s’allume et la sonnerie est désactivée. Désactiver NPD Appuyez sur NPD ou Ne pas déranger . Personnaliser les paramètres NPD Si votre administrateur système a configuré la fonction NPD de manière à afficher ses paramètres dans la page Options utilisateur, procédez comme suit : 1. Connectez-vous à vos pages Web Options utilisateur. Reportez-vous à Accès à vos pages Web Options utilisateur, page 67. 2. Dans le menu déroulant, sélectionnez Options utilisateur > Périphérique. 3. Définissez les options suivantes : – Ne pas déranger : active ou désactive cette fonction. – Option NPD : choisissez Refus d’appel (pour désactiver toutes les notifications sonores et visuelles) ou Sonnerie désactivée (pour désactiver uniquement la sonnerie). – Alerte d’appel entrant avec la fonction NPD (s’applique aux deux configurations de l’option NPD) : configurez l’alerte afin qu’elle émette un bip seulement ou qu’elle clignote seulement, désactivez l’alerte ou choisissez Aucune (pour utiliser le mode d’alerte configuré par votre administrateur système). 34 OL-17124-01 Établissement de conférences téléphoniques Votre téléphone IP Cisco Unified vous permet de parler à plusieurs personnes en même temps dans une conférence téléphonique. Utilisation des fonctions de conférence Vous pouvez créer une conférence de différentes manières, en fonction de vos besoins et des fonctions disponibles sur votre téléphone. • Conférence : permet de créer une conférence standard (ad hoc) en appelant chaque participant. Utilisez la touche de fonction Conf. ou le bouton Conférence. La fonction Conférence est disponible sur la plupart des téléphones. • Joindre : permet de créer une conférence standard (ad hoc) en associant des appels existants. Utilisez le bouton ou la touche de fonction Joindre. • InsConf : permet de créer une conférence standard (ad hoc) en vous ajoutant à un appel sur une ligne partagée. Appuyez sur un bouton de ligne ou sur la touche de fonction ou le bouton InsConf. La fonction InsConf est disponible uniquement sur les téléphones qui utilisent des lignes partagées. • Meet-Me : permet de créer ou de rejoindre une conférence en appelant un numéro de conférence. Utilisez le bouton ou la touche de fonction MeetMe. Utilisation de Conférence La fonction Conférence permet d’appeler chaque participant. La fonction Conférence est disponible sur la plupart des téléphones. Pour... Procédez comme suit : Créer une conférence 1. Au cours d’un appel, appuyez sur Conf. ou Conférence. (il se peut que vous deviez au préalable appuyer sur la touche de fonction autres pour accéder à Conf.). 2. Entrez le numéro de téléphone du participant. 3. Attendez que l’appel soit établi. 4. Appuyez de nouveau sur Conf. ou Conférence pour que le participant se joigne à votre appel. 5. Répétez cette procédure pour ajouter d’autres participants. Gestion de base des appels Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 35 Utilisation de la fonction Joindre La fonction Joindre permet de combiner plusieurs appels existants afin de créer une conférence à laquelle vous participez. Ajouter de nouveaux participants à une conférence déjà créée Répétez les étapes ci-dessus. Votre administrateur système détermine si vous pouvez ajouter ou supprimer des participants si vous n’êtes pas l’organisateur de la conférence. Afficher la liste des participants ou supprimer des participants Reportez-vous à Affichage ou suppression de participants à une conférence, page 38. Pour... Procédez comme suit : Créer une conférence en joignant des appels existants passés sur une même ligne téléphonique 1. Depuis un appel actif, surlignez un autre appel à inclure dans la conférence, puis appuyez sur Sélect. Les appels sélectionnés affichent l’icône . 2. Répétez cette étape pour chacun des appels à ajouter. 3. Appuyez sur Joindre. (Pour afficher cette option, vous pouvez avoir à appuyer d’abord sur la touche de fonction autres.) Créer une conférence en joignant des appels existants passés sur plusieurs lignes téléphoniques 1. À partir d’un appel en cours, appuyez sur Joindre. (Pour afficher cette option, vous pouvez avoir à appuyer d’abord sur la touche de fonction autres.) 2. Appuyez sur le bouton de ligne vert clignotant pour le ou les appels que vous souhaitez inclure à la conférence. L’un des événements suivants se produit : • Les appels sont joints. • Une fenêtre s’ouvre sur l’écran du téléphone ; celle-ci vous permet de sélectionner les appels à joindre. Mettez les appels en surbrillance. Appuyez ensuite sur Sélect., puis sur Joindre pour terminer l’opération. Remarque Si votre téléphone ne prend pas en charge la fonction Joindre dans le cas d’appels sur plusieurs lignes, transférez les appels vers une ligne unique. Vous pourrez alors utiliser la fonction Joindre. Pour... Procédez comme suit : 36 OL-17124-01 Conseils • S’il vous arrive souvent de joindre plus de deux interlocuteurs dans une seule conférence, vous trouverez peut-être pratique de sélectionner tout d’abord les appels à joindre, puis d’appuyer sur Joindre pour terminer l’action. • Une fois l’action Joindre terminée, l’ID de l’appelant devient « Conférence ». • Il est possible de combiner plusieurs conférences téléphoniques à l’aide de la touche de fonction Joindre ou TrnsDir. Vérifiez auprès de votre administrateur système que vous disposez de cette fonction. Utilisation de InsConf Vous pouvez créer une conférence en utilisant InsConf pour vous ajouter à un appel sur une ligne partagée. Afficher la liste des participants ou supprimer des participants Appuyez sur ListConf ou sur Liste de conférence. (Il se peut que vous deviez au préalable appuyer sur la touche de fonction autres.) Reportez-vous à Affichage ou suppression de participants à une conférence, page 38. Pour... Procédez comme suit : Créer une conférence téléphonique en vous connectant par insertion à un appel sur une ligne partagée Appuyez sur le bouton de ligne correspondant à la ligne partagée. Dans certains cas, vous devez mettre l’appel en surbrillance et appuyer sur InsConf pour terminer l’opération. Pour plus d’informations, reportez-vous à Utilisation de l’insertion pour vous ajouter à un appel sur une ligne partagée, page 44. Afficher la liste des participants ou supprimer des participants Reportez-vous à Affichage ou suppression de participants à une conférence, page 38. Pour... Procédez comme suit : Gestion de base des appels Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 37 Utilisation de la fonction Meet-Me Le mode de conférence téléphonique Meet-Me permet de démarrer une conférence ou de s’y connecter en composant le numéro de celle-ci. Conseil Si vous composez le numéro d’une conférence Meet-Me sécurisée depuis un téléphone non sécurisé, celui-ci affiche « Périphérique non autorisé ». Pour plus d’informations, reportez-vous à Émission et réception d’appels sécurisés, page 48. Pour... Procédez comme suit : Démarrer une conférence Meet-Me 1. Demandez un numéro de conférence Meet-Me à votre administrateur système. 2. Communiquez ce numéro à tous les participants. 3. Lorsque vous êtes prêt à lancer la conférence, décrochez pour obtenir une tonalité, puis appuyez sur MeetMe. 4. Composez le numéro de la conférence Meet-Me. Les participants peuvent à présent rejoindre la conférence en composant le numéro correspondant. Remarque Les participants entendent une tonalité occupé s’ils composent le numéro de la conférence avant que l’organisateur ne soit lui-même connecté. Dans ce cas, ils doivent rappeler. Rejoindre une conférence Meet-Me Composez le numéro de la conférence Meet-Me (que vous a communiqué l’organisateur de la conférence). Remarque Vous entendez une tonalité occupé si vous composez le numéro de la conférence avant que l’organisateur ne soit connecté. Dans ce cas, rappelez ultérieurement. Mettre fin à une conférence Meet-Me Tous les participants doivent raccrocher. La conférence ne s’arrête pas automatiquement lorsque l’organisateur se déconnecte. 38 OL-17124-01 Affichage ou suppression de participants à une conférence Lors d’une conférence standard (ad hoc), vous pouvez afficher la liste des participants et supprimer des participants. Passer ou recevoir des appels intercom Vous pouvez passer un appel intercom à destination d’un téléphone qui répond alors automatiquement à l’appel en mode haut-parleur et coupure micro. L’appel intercom unidirectionnel permet d’envoyer un message court au destinataire. S’il utilise le combiné ou le casque, il y entend le message. Si le destinataire a déjà un appel en cours, celui-ci continue simultanément. Le destinataire de l’appel reçoit une tonalité d’alerte intercom et dispose des possibilités suivantes : • Écouter l’appelant, son microphone étant coupé (il peut écouter l’appelant, mais celui-ci ne peut pas l’entendre). • Mettre fin à l’appel intercom en appuyant sur la touche de fonction FinApp. après avoir sélectionné l’appel intercom. Cette option permet de ne pas écouter le message. • Parler à l’appelant à l’aide du bouton intercom actif en mode combiné, via le casque ou le haut-parleur. L’appel intercom devient une connexion bidirectionnelle permettant de communiquer avec l’appelant. Afficher la liste des participants à une conférence Appuyez sur ListConf ou sur Liste de conférence. Les participants sont affichés dans l’ordre dans lequel ils ont rejoint la conférence, les derniers à la rejoindre apparaissant en tête de liste. Mettre à jour la liste des participants à une conférence Lorsque la liste des participants à la conférence est affichée, appuyez sur MàJ. Savoir qui a organisé la conférence Lorsque la liste des participants à la conférence est affichée, recherchez le participant qui apparaît au bas de la liste, avec un astérisque (*) en regard de son nom. Supprimer un participant de la conférence Lorsque vous affichez la liste, mettez en surbrillance le nom du participant, puis appuyez sur Suppr. Abandonner le dernier interlocuteur à avoir rejoint la conférence Lorsque la liste des participants à la conférence est affichée, appuyez sur SupDerA ou Supprimer dernier participant. Vérifier si une conférence téléphonique est sécurisée Recherchez l’icône ou après « Conférence », sur l’écran du téléphone. Vérifier qu’un participant appelle depuis un téléphone sécurisé Vérifiez la présence de l’icône ou en regard du nom du participant sur l’écran du téléphone. Ajouter d’autres participants Reportez-vous à Utilisation de Conférence, page 34. Gestion de base des appels Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 39 Lorsque vous utilisez la fonction intercom, n’oubliez pas les points suivants : • Les lignes intercom ne sont reliées qu’entre elles. • Une seule ligne est utilisable à la fois. • Vous ne pouvez ni recevoir ni émettre d’appel intercom si votre appel actif est surveillé ou enregistré. • Vous ne pouvez pas mettre un appel intercom en attente. Remarque Si vous vous connectez à votre téléphone de bureau tous les jours à l’aide de votre profil de mobilité de poste, vérifiez que votre administrateur système a configuré votre profil de mobilité de poste en y incluant la fonction intercom. Pour... Procédez comme suit : Passer un appel intercom vers une cible intercom préconfigurée Appuyez sur (ligne cible intercom) et commencez à parler lorsque vous entendez la tonalité d’alerte intercom. Passer un appel intercom vers un numéro intercom Appuyez sur (ligne intercom). Entrez le numéro intercom ou appuyez sur le numéro abrégé cible. Lorsque vous entendez la tonalité d’alerte intercom, commencez à parler. Recevoir un appel intercom Lorsque vous entendez la tonalité d’alerte intercom, vous pouvez traiter l’appel de l’une des manières suivantes : • Écouter le message par voie audio unidirectionnelle. • Parler à l’appelant en appuyant sur (ligne intercom active). • Appuyer sur FinApp. après avoir sélectionné l’appel intercom. Gestion avancée des appels Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 39 Gestion avancée des appels Les tâches de gestion avancée des appels comprennent des fonctions spéciales que votre administrateur système peut configurer sur votre téléphone, en fonction de vos besoins en matière de gestion des appels et de votre environnement de travail. Numérotation abrégée La numérotation abrégée permet de saisir un code, d’appuyer sur un bouton ou de sélectionner un élément de l’écran du téléphone pour passer un appel. Selon sa configuration, votre téléphone peut prendre en charge plusieurs fonctions de numérotation abrégée : • Les boutons de numérotation abrégée • La composition d’un code • Les codes de carnet d’adresses personnel Remarque • Pour configurer des boutons de numérotation abrégée et la numérotation abrégée, vous devez accéder aux pages Web Options utilisateur. Reportez-vous à Accès à vos pages Web Options utilisateur, page 67. • Pour configurer des numéros abrégés, vous devez accéder à la fonction de répertoire personnel. Reportez-vous à Utilisation du répertoire personnel sur le téléphone, page 63. • Votre administrateur système peut également configurer des fonctions de numérotation abrégée à votre attention. Pour... Procédez comme suit : Utiliser des boutons de numérotation abrégée 1. Configurez les boutons de numérotation abrégée. Reportez-vous à Configuration de numéros abrégés sur le Web, page 71. 2. Pour passer un appel, appuyez sur (bouton de numérotation abrégée). Remarque Si votre téléphone prend en charge la fonction de numérotation abrégée d’affichage de ligne occupée (FLO), vous pouvez savoir si le numéro abrégé est occupé avant de le composer. Reportez-vous à Utilisation de FLO pour déterminer l’état d’une ligne, page 47. 40 OL-17124-01 Interception d’un appel redirigé sur votre téléphone Grâce à cette fonction, vous pouvez répondre à un appel en sonnerie sur le téléphone d’un collègue en le redirigeant vers votre appareil. Cette fonction peut être utile si vous êtes plusieurs à gérer les appels. Utiliser un code de numérotation abrégée 1. Configurez des codes de numérotation abrégée. Reportez-vous à Configuration de numéros abrégés sur le Web, page 71. 2. Pour passer un appel, saisissez le code de numérotation abrégée correspondant, puis appuyez sur NumAbr. Utiliser un code de carnet d’adresses personnel 1. Créez une entrée du carnet d’adresses personnel et affectez-lui un code de numérotation abrégée. Reportez-vous à Utilisation de votre carnet d’adresses personnel sur le Web, page 68. 2. Pour passer un appel, accédez au service de numérotation abrégée de votre téléphone. Reportez-vous à Utilisation du répertoire personnel sur le téléphone, page 63. Pour... Procédez comme suit : Répondre à un appel qui est en sonnerie sur un autre poste faisant partie de votre groupe de prise d’appel 1. Appuyez sur la touche de fonction ou le bouton Intrcpt. (Vous devrez peut-être décrocher pour afficher la touche de fonction.) Si votre téléphone prend en charge l’interception automatique des appels, vous êtes connecté à l’appel. 2. Si le téléphone sonne, appuyez sur Répond. pour vous connecter à l’appel. Répondre à un appel qui est en sonnerie sur un autre poste ne faisant pas partie de votre groupe de prise d’appel 1. Appuyez sur la touche de fonction GrpIntr ou sur le bouton Interception d’appels de groupe. (Vous devrez peut-être décrocher pour afficher la touche de fonction.) 2. Saisissez le numéro d’interception d’appels de groupe. Si votre téléphone prend en charge l’interception automatique des appels, vous êtes connecté à l’appel. 3. Si le téléphone sonne, appuyez sur Répond. pour vous connecter à l’appel. Pour... Procédez comme suit : Gestion avancée des appels Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 41 Conseils • Si plusieurs appels peuvent être interceptés, votre téléphone décroche d’abord l’appel le plus ancien (l’appel qui sonne depuis le plus longtemps). • Si vous appuyez sur GrpIntr ou sur Interception d’appels de groupe et entrez un numéro de ligne, votre téléphone décroche l’appel qui sonne sur cette ligne (le cas échéant). • Si vous avez plusieurs lignes et si vous ne souhaitez pas prendre l’appel sur votre ligne principale, appuyez sur le bouton de la ligne souhaitée, puis sur un bouton ou une touche de fonction d’interception d’appel. • Selon la configuration du téléphone, vous pouvez recevoir un signal sonore et/ou visuel à propos d’un appel vers votre groupe de prise d’appel. • Si vous utilisez la fonction d’interception FLO sur votre téléphone, reportez-vous à Utilisation de FLO pour déterminer l’état d’une ligne, page 47. Prendre un appel en sonnerie sur un autre poste de votre groupe ou sur celui d’un groupe associé 1. Appuyez sur la touche de fonction AGrpIntr ou sur le bouton Autre groupe de prise d’appel. (Vous devrez peut-être décrocher pour afficher la touche de fonction.) Si votre téléphone prend en charge l’interception automatique des appels, vous êtes connecté à l’appel. 2. Si le téléphone sonne, appuyez sur Répond. pour vous connecter à l’appel. Répondre à un appel qui est en sonnerie sur un poste particulier (numéro de ligne) 1. Appuyez sur la touche de fonction GrpIntr ou sur le bouton Interception d’appels de groupe. (Vous devrez peut-être décrocher pour afficher la touche de fonction.) 2. Entrez le numéro de ligne correspondant à l’appel que vous souhaitez intercepter. Par exemple, si l’appel à intercepter sonne sur la ligne 12345, entrez 12345. Si votre téléphone prend en charge l’interception automatique des appels, vous êtes connecté à l’appel. 3. Si le téléphone sonne, appuyez sur Répond. pour vous connecter à l’appel. Pour... Procédez comme suit : 42 OL-17124-01 Stockage et récupération d’appels parqués Si vous souhaitez stocker un appel, vous pouvez le parquer pour qu’une autre personne et vous puissiez le récupérer sur un autre téléphone du système Cisco Unified Communications Manager (par exemple, le téléphone du bureau d’un collègue ou celui d’une salle de conférence). Vous pouvez parquer un appel en utilisant les méthodes suivantes : • Parcage d’appels : appuyez sur la touche de fonction Parquer pour stocker l’appel. Le téléphone affiche le numéro de parcage où le système a stocké l’appel. Vous devez noter ce numéro et utiliser le même pour récupérer l’appel. • Parcage d’appels dirigés : utilisez la touche de fonction Trnsfer pour diriger l’appel vers un numéro de parcage disponible (abrégé ou non). Pour récupérer ensuite l’appel, composez le préfixe de récupération du parcage, puis le numéro (abrégé ou non). Le bouton de parcage d’appels dirigé permet de composer le numéro abrégé correspondant et de surveiller s’il est disponible ou non. Pour... Procédez comme suit : Stocker un appel actif à l’aide de la fonction de parcage d’appels 1. Au cours d’un appel, appuyez sur Parquer (avant de pouvoir afficher la touche Parquer, vous devrez peut-être appuyer sur la touche de fonction autres). 2. Notez le numéro de parcage affiché à l’écran du téléphone. 3. Raccrochez. Récupérer un appel parqué Saisissez le numéro de parcage sur un téléphone IP Cisco Unified du réseau pour vous connecter à l’appel. Diriger et stocker un appel actif vers un numéro de parcage d’appels dirigés 1. Au cours d’un appel, appuyez sur Trnsfer. 2. Pour composer le numéro abrégé, appuyez sur le bouton de parcage d’appel dirigé associé à l’icône de disponibilité . Lorsque le bouton de parcage d’appel dirigé accompagné de l’icône de non-disponibilité clignote, le numéro correspondant n’est pas accessible. 3. Appuyez de nouveau sur Trnsfer pour valider le stockage de l’appel. Récupérer un appel parqué depuis un numéro de parcage d’appels dirigés Depuis un téléphone IP Cisco Unified de votre réseau, entrez le préfixe de récupération et le numéro de parcage d’appel dirigé. Autre possibilité : après avoir entré le préfixe, appuyez sur (voyant clignotant) avec pour prendre l’appel. Gestion avancée des appels Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 43 Conseils • Vous disposez d’un délai limité pour récupérer l’appel parqué avant qu’il ne recommence à sonner sur le poste auquel il était destiné à l’origine. Contactez votre administrateur système pour en savoir plus. • L’administrateur système peut affecter des fonctions de parcage d’appel dirigé aux boutons de ligne disponibles sur le téléphone IP Cisco Unified 7962G disposant du module d’extension Cisco Unified IP Phone 7914 (le modèle 7942G ne prend pas en charge ce modèle d’extension). • Vous pouvez composer des numéros de parcage d’appel dirigé si vous n’avez pas de boutons correspondants. Toutefois, vous ne pourrez pas afficher l’état du numéro de parcage d’appels dirigé. Déconnexion de groupes de recherche Si votre entreprise reçoit un grand nombre d’appels entrants, vous pouvez être membre d’un groupe de recherche. Un groupe de recherche inclut une série de numéros de répertoire partageant la charge des appels entrants. Lorsque le premier numéro de répertoire du groupe de recherche est occupé, le système recherche le numéro de répertoire suivant disponible dans le groupe et dirige les appels vers ce téléphone. Lorsque vous vous éloignez du téléphone, vous pouvez vous déconnecter des groupes de recherche pour que votre téléphone ne sonne pas. Conseil Vous déconnecter des groupes de recherche n’empêche pas les appels d’autres groupes de sonner sur votre téléphone. Utilisation d’une ligne partagée Votre administrateur système peut vous demander d’utiliser une ligne partagée si vous : • disposez de plusieurs téléphones et souhaitez avoir le même numéro pour tous ; • partagez des tâches de gestion d’appels avec des collègues ; • gérez des appels pour le compte d’un manager. Pour... Procédez comme suit : Vous déconnecter des groupes de recherche pour bloquer temporairement les appels des groupes de recherche Appuyez sur Groupmt ou sur Groupe de recherche. L’écran du téléphone affiche Déconnecté du grpe rech. Vous connecter pour recevoir des appels des groupes de recherche Appuyez sur Groupmt ou sur Groupe de recherche. Lorsque vous êtes connecté, le bouton Groupe de recherche s’allume. 44 OL-17124-01 Présentation des lignes partagées Icône Utilisé à distance L’icône Utilisé à distance apparaît lorsqu’un appel est connecté sur un autre téléphone de votre ligne partagée. Vous pouvez passer et recevoir des appels normalement sur la ligne partagée, même si l’icône Utilisé à distance s’affiche. Partage des informations relatives aux appels et insertion Les téléphones qui partagent une ligne affichent chacun des informations concernant les appels passés et reçus sur la ligne partagée. Ces informations peuvent inclure l’ID de l’appelant et la durée de l’appel (pour connaître les cas d’exception, reportez-vous à Confidentialité). Lorsque les informations relatives aux appels sont visibles, vous et les collègues qui partagez la ligne pouvez vous joindre à des appels à l’aide de la fonction Inser. ou InsConf. Reportez-vous à Utilisation de l’insertion pour vous ajouter à un appel sur une ligne partagée, page 44. Confidentialité Si vous ne souhaitez pas que les collègues qui partagent votre ligne puissent afficher les informations concernant vos appels, activez la fonction de confidentialité. Ainsi, ils ne peuvent pas se connecter à vos appels. Reportez-vous à Procédure permettant d’empêcher d’autres personnes d’afficher un appel sur une ligne partagée ou de s’y joindre, page 46. Remarque Le nombre maximum d’appels pris en charge sur une ligne partagée varie selon les téléphones. Utilisation de l’insertion pour vous ajouter à un appel sur une ligne partagée Vous pouvez utiliser les fonctions d’insertion (InsConf ou Inser.) pour vous ajouter à des appels sur votre ligne partagée. (Les appels ne doivent pas être confidentiels. Reportez-vous à Présentation des lignes partagées, page 44.) Gestion avancée des appels Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 45 Présentation des fonctions d’insertion InsConf et Inser. Selon la configuration de votre téléphone, vous pouvez vous connecter à un appel non confidentiel sur une ligne partagée à l’aide de la fonction InsConf ou Inser. • InsConf transforme l’appel en conférence téléphonique standard et permet ainsi d’ajouter de nouveaux participants. (Reportez-vous à Établissement de conférences téléphoniques, page 34 pour plus d’informations sur les conférences standard.) • Inser. permet de vous ajouter à l’appel mais ne le transforme pas en conférence téléphonique et ne permet pas d’y ajouter de nouveaux participants. Insertion directe ou différée L’administrateur système détermine si la fonction d’insertion de votre téléphone (InsConf ou Inser.) doit être directe ou différée. • La fonction d’insertion directe permet de vous ajouter à un appel en appuyant sur un simple bouton de ligne (si un seul appel est sur la ligne). • La fonction d’insertion différée permet d’afficher les informations concernant un appel avant de vous y ajouter. Utilisation des fonctions d’insertion Le tableau ci-dessous décrit la façon d’utiliser les fonctions d’insertion (InsConf ou Inser.) pour vous ajouter à un appel sur une ligne partagée. Pour... Procédez comme suit : Savoir si la ligne partagée est en cours d’utilisation Vérifiez la présence de l’icône Utilisé à distance en regard d’un bouton de ligne rouge . Vous ajouter à un appel sur une ligne partagée Appuyez sur le bouton de ligne rouge correspondant à la ligne partagée. L’un des événements suivants se produit : • Vous êtes ajouté à l’appel. • Une fenêtre s’ouvre sur l’écran du téléphone ; celle-ci vous permet de sélectionner l’appel à insérer. Appuyez sur Inser. ou InsConf pour faire votre sélection. (Il se peut que vous deviez appuyer sur la touche de fonction autres pour accéder à l’option Inser. ou InsConf). Afficher la liste des participants à la conférence (si vous avez utilisé InsConf) Reportez-vous à Affichage ou suppression de participants à une conférence, page 38. 46 OL-17124-01 Conseils • Lorsque vous vous insérez à un appel, les autres participants entendent un bip annonçant votre présence. Avec InsConf, les autres participants entendent une courte interruption audio, et l’écran du téléphone change pour afficher les détails de la conférence. • Si la fonction Confidentialité est activée sur un téléphone qui utilise la ligne partagée, les informations concernant l’appel et les touches de fonction d’insertion n’apparaissent pas sur les autres téléphones qui partagent la ligne. • Lorsque vous vous connectez à un appel à l’aide de la touche Insert, vous en serez déconnecté s’il est mis en attente, transféré ou transformé en conférence téléphonique. Procédure permettant d’empêcher d’autres personnes d’afficher un appel sur une ligne partagée ou de s’y joindre Si vous partagez une ligne téléphonique, vous pouvez utiliser la fonctionnalité de confidentialité pour empêcher les personnes qui partagent votre ligne d’afficher vos appels ou de s’y insérer. Conseils • Si vous partagez la ligne avec un téléphone dont la fonction de confidentialité est activée, vous pouvez passer et recevoir des appels normalement sur la ligne partagée. • La fonction de confidentialité s’applique à toutes les lignes partagées de votre téléphone. Par conséquent, si vous avez plusieurs lignes partagées sur votre téléphone et que la fonction de confidentialité est activée, vos collègues ne pourront pas afficher les appels sur vos lignes partagées, ni s’y connecter. Pour... Procédez comme suit : Empêcher d’autres personnes d’afficher vos appels sur une ligne partagée ou de s’y insérer 1. Appuyez sur Confidentiel(le) . 2. Pour vérifier que la fonction de confidentialité est activée, vérifiez la présence d’une icône de confidentialité activée située en regard d’un bouton de ligne orange . Autoriser les autres personnes à afficher vos appels sur une ligne partagée ou à s’y insérer 1. Appuyez sur Confidentiel(le) . 2. Pour vérifier que la fonction de confidentialité est désactivée, vérifiez l’absence de l’icône correspondante en regard d’un bouton de ligne éteint . Gestion avancée des appels Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 47 Utilisation de FLO pour déterminer l’état d’une ligne Les fonctions d’affichage de ligne occupée (FLO) vous permettent d’afficher l’état d’une ligne téléphonique associée à un bouton de numérotation abrégée, un journal d’appels ou une entrée de répertoire sur votre téléphone. Si vous utilisez la fonction d’interception d’appels FLO, vous pouvez répondre à un appel qui sonne sur la ligne que vous surveillez. Votre administrateur système détermine les fonctions FLO configurées sur votre téléphone. Pour... Procédez comme suit : Consulter l’état d’une ligne figurant dans un journal d’appels ou un répertoire Recherchez l’un des indicateurs suivants en regard du numéro de la ligne : La ligne est en cours d’utilisation. La ligne est inactive. L’indicateur FLO n’est pas disponible pour cette ligne. La ligne est en mode Ne pas déranger. Afficher l’état d’une ligne de numérotation abrégée Recherchez l’un des indicateurs suivants en regard du numéro de la ligne : + La ligne est en cours d’utilisation. + La ligne est inactive. L’indicateur FLO n’est pas disponible pour cette ligne. + La ligne est en mode Ne pas déranger. + (voyant clignotant) : La ligne sonne (Interception d’appels FLO uniquement). Utiliser la fonction d’interception d’appels FLO pour répondre à un appel en sonnerie sur le téléphone d’un collègue Appuyez sur le bouton d’interception d’appels FLO pendant que la ligne sonne. L’appel est redirigé vers la ligne suivante disponible sur votre téléphone. (Pour indiquer une ligne particulière, appuyez d’abord sur un bouton de ligne puis sur le bouton FLO.) Si votre téléphone prend en charge l’interception automatique des appels, l’appel est connecté automatiquement. Dans le cas contraire, l’appel sonne sur votre téléphone et vous pouvez y répondre. Remarque Si vous appuyez sur le bouton d’interception des appels FLO alors que la ligne surveillée ne sonne pas, votre téléphone compose le numéro abrégé de la ligne. 48 OL-17124-01 Conseils • Il est possible qu’un indicateur sonore retentisse sur votre téléphone lorsqu’un appel sonne sur la ligne surveillée (Interception d’appels FLO uniquement). • La fonction d’interception d’appels FLO répond d’abord à l’appel le plus ancien (si plusieurs appels sonnent sur la ligne surveillée). Émission et réception d’appels sécurisés Selon la configuration choisie par votre administrateur système, votre téléphone peut prendre en charge la fonction d’établissement et de réception d’appels sécurisés. Il peut prendre en charge les types d’appels suivants : • Appel authentifié : l’identité de chaque téléphone participant à l’appel a été vérifiée. • Appel chiffré : le téléphone reçoit et transmet (sur le réseau IP Cisco) des données audio chiffrées (votre conversation). Les appels chiffrés sont également authentifiés. • Appel protégé : le téléphone échange (reçoit et transmet) des données audio chiffrées (votre conversation) avec un autre téléphone. Un appel protégé offre un niveau de sécurité équivalent à celui d’un appel chiffré, tout en ajoutant une sécurité supplémentaire. Si l’appel est protégé aux deux extrémités, une tonalité de sécurité retentit au début de la conversation. Certaines fonctions ne sont pas disponibles lorsque l’appel protégé est configuré : par exemple les conférences téléphoniques, les lignes partagées, la mobilité de poste et l’option Joindre sur les lignes. Les appels protégés ne sont pas authentifiés. • Appel non sécurisé : un des téléphones participant à l’appel ou la connexion ne prennent pas en charge ces fonctions de sécurité, ou il n’est pas possible de vérifier l’identité des propriétaires des téléphones. Pour... Procédez comme suit : Contrôler le niveau de sécurité d’un appel ou d’une conférence Regardez si l’une des icônes de sécurité suivantes apparaît en haut à droite de la zone d’activité des appels, en regard de l’indicateur de durée d’appel : Appel ou conférence authentifié(e) Appel ou conférence chiffré(e) Appel ou conférence non sécurisé(e) Gestion avancée des appels Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 49 Remarque Des interactions, des restrictions et des limites affectent l’exécution des fonctions de sécurité de votre téléphone. Pour en savoir plus, contactez votre administrateur système. Suivi des appels suspects Si vous faites l’objet d’appels suspects ou malveillants, votre administrateur système peut ajouter la fonction d’identification des appels malveillants (IDAM) à votre téléphone. Cette fonction permet d’identifier un appel actif comme suspect, ce qui lance une série de messages automatiques de suivi et de notification. Donner la priorité aux appels critiques (uniquement sur les téléphones SCCP) Dans certains environnements spécialisés, tels que les bureaux de l’Armée ou de l’État, il se peut que vous ayez besoin de passer et de recevoir des appels urgents ou critiques. Si vous avez besoin de ce traitement spécialisé des appels, votre administrateur système peut ajouter une fonction de préséance et préemption à plusieurs niveaux (MLPP) sur votre téléphone. Vérifier que le téléphone à l’autre extrémité de la connexion est également sécurisé Regardez si l’icône de chiffrement en forme de verrou apparaît et écoutez si une tonalité de sécurité retentit au début de l’appel. Lorsque la fonction d’appel chiffré est configurée sur votre téléphone, l’icône en forme de verrou s’affiche. Toutefois, la conversation est protégée seulement à partir du moment où la tonalité de sécurité retentit au début d’un appel, indiquant que celui-ci est protégé aux deux extrémités. Si votre appel est connecté à un téléphone non protégé, la tonalité de sécurité ne retentit pas. Déterminer s’il est possible de passer des appels sécurisés au sein de votre société Contactez votre administrateur système. Pour... Procédez comme suit : Informer votre administrateur système d’un appel suspect ou malveillant Appuyez sur IDAM ou sur l’option Identification d’appel malveillant. Vous entendez une tonalité et le message « IDAM réussie » s’affiche sur votre téléphone. Pour... Procédez comme suit : 50 OL-17124-01 Gardez ces définitions à l’esprit : • La préséance indique la priorité associée à un appel. • La préemption est le processus qui permet de mettre fin à un appel en cours dont la priorité est inférieure et, parallèlement, d’accepter un appel de priorité supérieure qui est envoyé vers votre téléphone. Si vous... Procédez comme suit : Souhaitez pouvoir choisir le niveau de priorité (préséance) d’un appel sortant Contactez votre administrateur système pour obtenir la liste des numéros de préséance correspondant aux appels. Souhaitez passer un appel prioritaire (qui a la préséance) Saisissez le numéro d’accès MLPP (que vous a fourni votre administrateur système), puis le numéro de téléphone. Entendez une sonnerie différente (plus rapide que d’habitude) ou une tonalité d’attente spéciale Vous recevez un appel prioritaire (qui a la préséance). Une icône MLPP s’affiche sur l’écran de votre téléphone pour indiquer le niveau de priorité de l’appel. Souhaitez afficher le niveau de priorité d’un appel Recherchez l’icône MLPP sur l’écran de votre téléphone : Appel prioritaire Appel d’importance moyenne (immédiat) Appel très important (rapide) Appel de la plus haute importance (suppression rapide) ou appel prioritaire Les appels les plus importants s’affichent en haut de la liste des appels. Si aucune icône MLPP n’apparaît, l’appel est un appel normal (routine). Souhaitez accepter un appel plus important Répondez normalement à l’appel. Le cas échéant, mettez d’abord fin à l’appel en cours. Entendez une tonalité continue qui interrompt votre appel Cela signifie que vous ou votre interlocuteur recevez un appel qui est prioritaire sur l’appel en cours. Raccrochez immédiatement pour permettre à l’appel plus important de sonner sur votre téléphone. Gestion avancée des appels Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 51 Conseils • Lorsque vous passez ou recevez un appel compatible MLPP, vous entendez une sonnerie et une tonalité d’attente spéciales, différentes des sonnerie et tonalité standard. • Si vous saisissez un numéro d’accès MLPP incorrect, un message vocal vous en avertit. • Un appel MLPP reste prioritaire lorsque vous : – le mettez en attente ; – le transférez ; – l’ajoutez à une conférence à trois ; – y répondez par interception. • MLPP est prioritaire sur la fonction NPD (Ne pas déranger). Utilisation de la fonction de mobilité de poste de Cisco La fonction de mobilité de poste de Cisco (EM) permet de configurer temporairement un téléphone IP Cisco Unified comme étant le vôtre. Lorsque vous vous connectez à EM, le téléphone adopte votre profil utilisateur, vos lignes téléphoniques, fonctions, services établis et paramètres Web. Seul l’administrateur système peut configurer la mobilité de poste. Conseils • Vous êtes automatiquement déconnecté de la mobilité de poste au bout d’un certain temps. C’est l’administrateur système qui détermine ce délai. • Les modifications que vous apportez à votre profil de mobilité de poste dans les pages Web Options utilisateur sont prises en compte immédiatement si vous êtes connecté à la fonction de mobilité de poste. Sinon, elles ne seront prises en compte qu’à votre prochaine connexion. • Les modifications que vous apportez à votre téléphone dans les pages Web Options utilisateur sont prises en compte immédiatement si vous vous déconnectez. Sinon, elles ne seront prises en compte qu’à votre prochaine déconnexion. • Les paramètres locaux réglables sur le téléphone ne sont pas enregistrés dans votre profil de mobilité de poste. Pour... Procédez comme suit : Vous connecter au service EM 1. Sélectionnez > Service de mobilité de poste (le nom de cette fonction peut varier). 2. Saisissez votre ID utilisateur et votre PIN (fournis par votre administrateur système). 3. Si vous y êtes invité, sélectionnez un profil de périphérique. Vous déconnecter du service EM 1. Sélectionnez > Service de mobilité de poste (le nom de cette fonction peut varier). 2. Lorsque vous êtes invité à vous déconnecter, appuyez sur Oui. 52 OL-17124-01 Gestion des appels professionnels à l’aide d’un seul numéro de téléphone Lorsque les fonctions de connexion et d’accès vocal mobiles sont installées, vous pouvez utiliser votre téléphone portable pour gérer les appels associés au numéro de votre téléphone de bureau. Pour... Procédez comme suit : Configurer la connexion mobile Les pages Web Options utilisateur permettent de configurer des destinations distantes et de créer des listes d’accès destinées à autoriser ou à bloquer le transfert vers les destinations distantes des appels en provenance de numéros spécifiques. Reportez-vous à Configuration des téléphones et des listes d’accès pour la connexion mobile, page 77. Répondre à un appel sur votre téléphone portable Reportez-vous à Prise d’appel, page 23. Faire basculer un appel en cours entre votre téléphone de bureau et un téléphone portable Reportez-vous à Transfert d’un appel en cours vers un autre téléphone, page 28. Mettre en attente un appel pris sur votre téléphone portable 1. Appuyez sur la touche de fonction d’attente d’appel professionnel (le nom de la fonction peut varier). Votre interlocuteur est mis en attente. 2. Sur votre téléphone portable, appuyez sur la touche de fonction Reprise (le nom de la fonction peut varier). Reportez-vous à Transfert d’un appel en cours vers un autre téléphone, page 28. Obtenir la fonction d’accès vocal mobile 1. Composez le numéro d’accès vocal mobile qui vous a été attribué depuis n’importe quel téléphone. 2. Saisissez le numéro depuis lequel vous appelez, si vous y êtes invité, et votre PIN. Activer la connexion mobile depuis votre téléphone portable 1. Composez le numéro d’accès vocal mobile qui vous a été attribué. 2. Saisissez le numéro de votre téléphone portable, si vous y êtes invité, et votre PIN. 3. Appuyez sur 2 pour activer la connexion mobile. 4. Vous pouvez activer la connexion mobile pour tous les téléphones configurés ou pour un seul. – Tous les téléphones : saisissez 2. – Un seul téléphone : saisissez 1 et le numéro de destination distante à ajouter, puis #. Émettre un appel depuis votre téléphone portable Reportez-vous à Établissement d’un appel : options supplémentaires, page 20. Gestion avancée des appels Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 53 Conseils • En cas d’accès vocal mobile, vous devez saisir le numéro depuis lequel vous appelez et votre PIN si l’une des conditions suivantes s’applique : – Le numéro depuis lequel vous appelez n’est pas l’une de vos destinations distantes. – Le numéro est bloqué par votre opérateur ou par vous (affiché comme étant inconnu). – Le numéro ne se présente pas exactement de la même manière dans la base de données Cisco Unified Communications Manager. Par exemple : votre numéro est le 510-666-9999 (ou 408-999-6666) mais la base de données contient 666-9999 (ou 1-408-999-6666). • Si vous vous trompez trois fois de suite dans la saisie des informations demandées telles que le numéro de téléphone portable ou le PIN, vous ne disposez plus de la fonction d’accès vocal mobile et vous restez bloqué pendant une certaine durée. Pour toute assistance, contactez votre administrateur système. Désactiver la connexion mobile depuis votre téléphone portable 1. Composez le numéro d’accès vocal mobile qui vous a été attribué. 2. Saisissez le numéro de votre téléphone portable, si vous y êtes invité, et votre PIN. 3. Appuyez sur 3 pour désactiver la connexion mobile. 4. Vous pouvez désactiver la connexion mobile pour tous les téléphones configurés ou pour un seul. – Tous les téléphones : saisissez 2. – Un seul téléphone : saisissez 1 et le numéro de destination distante à ajouter, puis #. Activer ou désactiver l’accès de connexion mobile à toutes vos destinations distantes à partir de votre téléphone de bureau 1. Appuyez sur Mobilité pour afficher l’état actuel de la destination distante (activée ou désactivée). 2. Appuyez sur Sélect. pour modifier l’état. 3. Appuyez sur Quitter. Pour... Procédez comme suit : 54 OL-17124-01 Utilisation du combiné, du casque et du haut-parleur Vous pouvez utiliser votre téléphone avec ces périphériques audio : un combiné, un casque ou un haut-parleur. Le téléphone est décroché lorsque le combiné est soulevé ou lorsqu’un autre périphérique audio est utilisé. Le téléphone est raccroché lorsque le combiné est sur son support et aucun autre périphérique audio n’est utilisé. Utilisation d’un combiné Utilisation d’un casque Votre téléphone prend en charge des prises casque à 4 ou 6 fils, ainsi que des casques sans fil. Pour plus d’informations sur l’achat d’un casque, reportez-vous à Utilisation d’un casque, page 7. Vous pouvez utiliser un casque avec toutes les commandes de votre téléphone, notamment et . Toutefois, si vous utilisez un casque sans fil, reportez-vous pour plus d’informations à la documentation qui l’accompagne. Pour... Procédez comme suit : Décrocher Soulevez le combiné. Raccrocher Replacez le combiné sur son support. Passer en mode casque ou haut-parleur en cours d’appel Appuyez sur ou sur , puis raccrochez le combiné. Régler le volume d’un appel Appuyez sur au cours de l’appel ou après obtention de la tonalité. Appuyez sur Enreg. pour que le volume soit le même lors de vos prochains appels. Utilisation du combiné, du casque et du haut-parleur Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 55 Si vous utilisez le mode Réponse automatique, reportez-vous à Utilisation de la fonction Réponse automatique avec un casque ou un haut-parleur, page 56. Utilisation d’un casque sans fil Pour plus d’informations, reportez-vous à la documentation qui l’accompagne concernant l’utilisation des fonctions à distance du casque sans fil. Vérifiez donc auprès de votre administrateur système que votre téléphone est bien activé pour utiliser un casque sans fil fonctionnant avec la fonction de contrôle à distance du clip de commutation pour casque sans fil. Utilisation du paramètre large bande avec votre casque Si vous utilisez un casque large bande, vous devriez bénéficier d’une meilleure sensibilité audio en activant le paramètre large bande de votre téléphone (ce paramètre est désactivé par défaut). Pour accéder à ce paramètre, appuyez sur > Préférences utilisateur > Préférences audio > Casque large bande. Si le paramètre Casque large bande apparaît en grisé, vous ne pouvez pas le modifier. Assurez-vous auprès de l’administrateur que votre système téléphonique est bien configuré pour le mode large bande. Si ce n’est pas le cas, vous ne détecterez sans doute aucune sensibilité audio supplémentaire, même en utilisant un casque large bande. Pour connaître les caractéristiques de votre casque, reportez-vous à la documentation qui l’accompagne ou demandez de l’aide à votre administrateur système. Pour... Procédez comme suit : Activer ou désactiver le mode casque Appuyez sur . Passer en mode combiné Soulevez le combiné. Régler le volume d’un appel Appuyez sur au cours de l’appel ou après obtention de la tonalité. Appuyez sur Enreg. pour que le volume soit le même lors de vos prochains appels. 56 OL-17124-01 Utilisation d’un haut-parleur Pour composer un numéro ou prendre un appel, la plupart des actions déclenchent automatiquement le mode haut-parleur, à condition que le combiné soit raccroché et que le bouton soit éteint. Utilisation de la fonction Réponse automatique avec un casque ou un haut-parleur Lorsque la fonction Réponse automatique est activée, votre téléphone répond automatiquement aux appels entrants après quelques sonneries. Votre administrateur système doit configurer la fonction de réponse automatique de sorte qu’elle fonctionne avec votre haut-parleur ou avec votre casque. Utilisez la fonction de réponse automatique si vous recevez un grand nombre d’appels entrants. Pour... Procédez comme suit : Activer ou désactiver le mode haut-parleur Appuyez sur . Passer en mode combiné Soulevez le combiné. Régler le volume d’un appel Appuyez sur au cours de l’appel ou après obtention de la tonalité. Appuyez sur Enreg. pour que le volume soit le même lors de vos prochains appels. Si vous... Procédez comme suit : Utilisez la fonction de réponse automatique avec un casque Même si aucun appel n’est en cours, gardez le mode casque activé. En d’autres termes, le bouton doit rester allumé. Pour que le mode casque reste activé, procédez comme suit : • Appuyez sur FinApp. pour raccrocher. • Appuyez sur NvAppel ou sur Compos. pour passer d’autres appels. Si votre téléphone est configuré pour utiliser la fonction de réponse automatique en mode casque, la réponse aux appels est automatique uniquement si le bouton est allumé. Dans le cas contraire, les appels sonnent normalement et vous devez y répondre manuellement. Utilisez la fonction de réponse automatique avec le haut-parleur Laissez le combiné raccroché et gardez le mode casque inactif. En d’autres termes, le bouton reste éteint . Dans le cas contraire, les appels sonnent normalement et vous devez y répondre manuellement. Modification des paramètres du téléphone Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 57 Modification des paramètres du téléphone Vous pouvez personnaliser votre téléphone IP Cisco Unified en réglant la sonnerie, l’image d’arrière-plan et d’autres paramètres. Personnalisation des sonneries et des indicateurs de message Vous pouvez personnaliser la manière dont votre téléphone signale les appels entrants et les nouveaux messages vocaux. Vous pouvez également régler le volume de la sonnerie de votre téléphone. Pour... Procédez comme suit : Changer la sonnerie suivant la ligne 1. Sélectionnez > Préférences utilisateur > Sonneries. 2. Choisissez une ligne téléphonique ou la sonnerie par défaut. 3. Sélectionnez une sonnerie pour en entendre un extrait. 4. Appuyez sur Sélect. et sur Enreg. pour utiliser cette sonnerie ou sur Annuler. Modifier la séquence de la sonnerie pour chaque ligne (clignotement seulement, une sonnerie, bip seulement, etc.) 1. Connectez-vous à vos pages Web Options utilisateur. (Reportez-vous à Accès à vos pages Web Options utilisateur, page 67.) 2. Accédez à vos paramètres de séquence de la sonnerie. (Reportez-vous à Contrôle des paramètres de ligne sur le Web, page 75.) Remarque Votre administrateur système devra peut-être activer ce paramètre pour que vous puissiez y accéder. Régler le volume de la sonnerie du téléphone Appuyez sur en mode combiné raccroché lorsque les boutons du casque et du haut-parleur sont désactivés. Le nouveau volume de la sonnerie est enregistré automatiquement. Modifier la façon dont le témoin lumineux de votre combiné signale les messages vocaux 1. Connectez-vous à vos pages Web Options utilisateur. (Reportez-vous à Accès à vos pages Web Options utilisateur, page 67.) 2. Accédez à vos paramètres d’indicateur de message. (Reportez-vous à Contrôle des paramètres de ligne sur le Web, page 75.) Remarque Généralement, la politique par défaut du système est d’indiquer les nouveaux messages vocaux en affichant un témoin fixe sur la bande lumineuse du combiné. 58 OL-17124-01 Personnalisation de l’écran du téléphone Vous pouvez régler les caractéristiques de l’écran du téléphone. Pour... Procédez comme suit : Modifier le niveau de contraste de l’écran du téléphone 1. Sélectionnez > Préférences utilisateur > Contraste. 2. Pour procéder aux réglages, appuyez sur Haut, Bas ou . 3. Appuyez sur Enreg. ou sur Annuler. Remarque Si vous enregistrez par erreur un niveau de contraste très faible ou très élevé et que vous ne voyez plus l’affichage de l’écran du téléphone : Appuyez sur , puis sur 1, 4 sur le clavier. Appuyez ensuite sur pour modifier le contraste jusqu’à ce que l’affichage de l’écran du téléphone soit lisible, puis appuyez sur Enreg. Modifier l’image d’arrière-plan 1. Sélectionnez > Préférences utilisateur > Images d’arrière-plan. 2. Faites défiler les images disponibles, puis appuyez sur Sélect. pour en choisir une. 3. Appuyez sur Aperçu pour afficher une vue plus grande de l’image d’arrière-plan. 4. Appuyez sur Quitter pour retourner au menu de sélection. 5. Appuyez sur Enreg. pour accepter l’image ou sur Annuler. Remarque La sélection d’images ne s’affiche pas si cette option n’a pas été activée sur votre système. Modifier la langue de l’écran 1. Connectez-vous à vos pages Web Options utilisateur. (Reportez-vous à Accès à vos pages Web Options utilisateur, page 67.) 2. Accédez à vos paramètres utilisateur. (Reportez-vous à Contrôle des paramètres utilisateur sur le Web, page 74.) Changer le libellé de ligne 1. Connectez-vous à vos pages Web Options utilisateur. (Reportez-vous à Accès à vos pages Web Options utilisateur, page 67.) 2. Accédez à vos paramètres de libellé de ligne. (Reportez-vous à Contrôle des paramètres de ligne sur le Web, page 75.) Régler le contraste du module d’extension pour téléphone IP Cisco Unified 1. Sélectionnez > Préférences utilisateur > Contraste. 2. Pour procéder aux réglages, appuyez sur Haut, Bas ou . 3. Appuyez sur Enreg. ou sur Annuler. Remarque Le téléphone IP Cisco Unified 7942G ne prend pas en charge le module d’extension pour téléphone IP Cisco Unified. Utilisation des journaux d’appels et des répertoires Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 59 Utilisation des journaux d’appels et des répertoires Cette section explique comment utiliser les journaux d’appels et les répertoires. Le bouton Répertoires permet d’accéder à ces deux fonctions. Utilisation des journaux d’appels Votre téléphone gère des journaux pour les appels en absence, passés et reçus. Pour... Procédez comme suit : Afficher vos journaux d’appels Sélectionnez > Appels en absence, Appels composés, ou Appels reçus. Chacun contient jusqu’à 100 enregistrements. Afficher les détails concernant un enregistrement particulier 1. Sélectionnez > Appels en absence, Appels composés, ou Appels reçus. 2. Mettez en surbrillance l’enregistrement d’appel. 3. Appuyez sur Détails. Cette opération permet d’afficher des informations, telles que le numéro de l’appelé, le numéro de l’appelant, l’heure du jour et la durée de l’appel (uniquement pour les appels passés et reçus). Effacer l’ensemble des enregistrements d’appels de tous les journaux d’appels Appuyez sur , puis sur Effacer. Effacer tous les enregistrements d’appels d’un journal d’appels en particulier 1. Sélectionnez > Appels en absence, Appels composés, ou Appels reçus. 2. Mettez en surbrillance l’enregistrement d’appel. 3. Appuyez sur Effacer. (Il se peut que vous deviez au préalable appuyer sur la touche de fonction autres pour afficher Effacer.) Effacer un seul enregistrement d’appel 1. Sélectionnez > Appels en absence, Appels composés, ou Appels reçus. 2. Mettez en surbrillance l’enregistrement d’appel. 3. Appuyez sur Supprimer. 60 OL-17124-01 Composer un numéro à partir d’un journal d’appels (aucun autre appel n’étant en cours) 1. Sélectionnez > Appels en absence, Appels composés, ou Appels reçus. 2. Mettez en surbrillance l’enregistrement d’appel. Remarque Si la touche de fonction Détails s’affiche, l’appel représente l’entrée principale d’une communication à plusieurs interlocuteurs. Reportez-vous ci-dessous au paragraphe Conseils. 3. Si vous devez modifier le numéro affiché, appuyez sur EditNum, puis sur << ou >>. Pour supprimer le numéro, appuyez sur EditNum puis sur Suppr. (Il se peut que vous deviez au préalable appuyer sur la touche de fonction autres pour afficher Suppr.) 4. Décrochez pour passer l’appel. Composer un numéro à partir d’un journal d’appels (avec un autre appel en cours) 1. Sélectionnez > Appels en absence, Appels composés, ou Appels reçus. 2. Mettez en surbrillance l’enregistrement d’appel. Remarque Si la touche de fonction Détails s’affiche, l’appel représente l’entrée principale d’une communication à plusieurs interlocuteurs. Reportez-vous ci-dessous au paragraphe Conseils. 3. Si vous devez modifier le numéro affiché, appuyez sur EditNum, puis sur << ou >>. Pour supprimer le numéro, appuyez sur EditNum puis sur Suppr. (Il se peut que vous deviez au préalable appuyer sur la touche de fonction autres pour afficher Suppr.) 4. Appuyez sur Compos. 5. Choisissez une option de menu pour traiter l’appel initial : • Attente : met le premier appel en attente et compose le second. • Trnsfer : transfère le premier interlocuteur vers le second et vous déconnecte de l’appel. (Appuyez de nouveau sur Trnsfer après avoir composé le numéro pour que l’opération soit effectuée.) • Conférence : établit une conférence téléphonique entre tous les interlocuteurs, vous y compris. (Appuyez de nouveau dessus ou sur Conférence après avoir composé le numéro pour que l’opération soit effectuée.) • FinApp. : déconnecte le premier appel et compose le second. Vérifier si la ligne du journal d’appels est occupée avant de l’appeler Recherchez les indicateurs d’affichage de ligne occupée. Reportez-vous à Utilisation de FLO pour déterminer l’état d’une ligne, page 47. Pour... Procédez comme suit : Utilisation des journaux d’appels et des répertoires Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 61 Conseils • (Téléphones SCCP et SIP) Votre téléphone peut être configuré pour la connexion aux appels internationaux, qui est indiquée par un symbole « + » sur les journaux d’appels, le rappel ou les entrées du répertoire d’appels. Pour plus d’informations, contactez votre administrateur système. • (Téléphones SCCP uniquement) Pour afficher l’enregistrement d’appel complet d’un appel à plusieurs interlocuteurs (par exemple, d’un appel qui a été redirigé ou transféré sur votre poste), mettez en surbrillance l’enregistrement d’appel et appuyez sur Détails. L’enregistrement Détails affiche deux entrées pour chaque appel à plusieurs interlocuteurs en absence ou reçu. Celles-ci apparaissent dans l’ordre chronologique inverse : – La première entrée enregistrée contient le nom ou le numéro du dernier appel à plusieurs interlocuteurs terminé, reçu sur votre téléphone. – La seconde entrée enregistrée contient le nom ou le numéro du premier appel à plusieurs interlocuteurs terminé, reçu sur votre téléphone. Composition depuis le répertoire Selon la configuration de votre téléphone, celui-ci dispose peut-être de fonctions de répertoire d’entreprise et personnel. • Le répertoire d’entreprise contient des contacts professionnels accessibles depuis votre téléphone. Il est configuré et géré par votre administrateur système. • Le répertoire personnel affiche, le cas échéant, les contacts personnels et les codes associés de numérotation abrégée que vous pouvez configurer et obtenir depuis votre téléphone et vos pages Web Options utilisateur. Le répertoire personnel comprend le carnet d’adresses personnel et les numéros abrégés : – Le carnet d’adresses personnel est un répertoire de vos contacts personnels. – Les numéros abrégés sont des codes affectés aux entrées du carnet d’adresses personnel et permettent de composer les numéros rapidement. Passer un appel à partir d’une entrée d’URL d’un journal d’appels (uniquement sur les téléphones SIP) 1. Sélectionnez > Appels en absence, Appels composés, ou Appels reçus. 2. Mettez en surbrillance l’entrée d’URL à composer. 3. Si vous devez modifier l’entrée, appuyez sur EditNum. 4. L’icône apparaît pour indiquer que vous pouvez commencer à modifier les caractères dans l’entrée d’URL. 5. Appuyez sur Compos. Pour... Procédez comme suit : 62 OL-17124-01 Utilisation du répertoire d’entreprise sur le téléphone Le répertoire d’entreprise vous permet d’appeler vos collègues. Conseil Utilisez le pavé numérique pour saisir des caractères sur l’écran du téléphone. Utilisez le bouton Navigation de votre téléphone pour passer d’un champ de saisie à un autre. Pour... Procédez comme suit : Composer un numéro à partir d’un répertoire d’entreprise (aucun autre appel n’étant en cours) 1. Sélectionnez > Répertoire d’entreprise (le nom exact de la fonction peut varier). 2. Saisissez un nom complet ou partiel à l’aide du clavier, puis appuyez sur Recher. 3. Pour composer un numéro, sélectionnez ou recherchez une entrée dans la liste, puis décrochez le combiné. Composer un numéro à partir d’un répertoire d’entreprise (en étant connecté à un autre appel) 1. Sélectionnez > Répertoire d’entreprise (le nom exact de la fonction peut varier). 2. Saisissez un nom complet ou partiel à l’aide du clavier, puis appuyez sur Recher. 3. Faites défiler la liste jusqu’au numéro souhaité, puis appuyez sur Compos. 4. Choisissez une option de menu pour traiter l’appel initial : • Attente : met le premier appel en attente et compose le second. • Trnsfer : transfère le premier interlocuteur vers le second et vous déconnecte de l’appel. (Appuyez de nouveau sur Trnsfer après avoir composé le numéro pour que l’opération soit effectuée.) • Conférence : établit une conférence téléphonique entre tous les interlocuteurs, vous y compris. (Appuyez de nouveau dessus ou sur Conférence après avoir composé le numéro pour que l’opération soit effectuée.) • FinApp. : déconnecte le premier appel et compose le second. Vérifier si la ligne de téléphone du répertoire est occupée Vérifiez la présence d’indicateurs d’affichage de ligne occupé (FLO). Reportez-vous à Utilisation de FLO pour déterminer l’état d’une ligne, page 47. Utilisation des journaux d’appels et des répertoires Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 63 Utilisation du répertoire personnel sur le téléphone Le répertoire personnel contient les contacts du carnet d’adresses personnel et leurs numéros abrégés. Cette section explique comment configurer et utiliser le répertoire personnel sur votre téléphone. Vous pouvez également vous reporter à Utilisation du répertoire personnel sur le Web, page 68. Pour... Procédez comme suit : Accéder au répertoire personnel (pour le carnet d’adresses personnel et les codes de numérotation abrégée) 1. Sélectionnez > Répertoire personnel (le nom exact de la fonction peut varier). 2. Saisissez votre ID utilisateur et votre PIN Cisco Unified Communications Manager, puis appuyez sur Soum. Effectuer une recherche d’entrée dans le carnet d’adresses personnel 1. Accédez au répertoire personnel, puis sélectionnez Carnet d’adresses personnel. 2. Saisissez des critères de recherche, puis appuyez sur Soum. 3. Préc. et Suivant permettent de passer d’une liste à une autre. 4. Mettez en surbrillance la liste du carnet d’adresses personnel de votre choix et appuyez sur Sélect. Composer un numéro à partir d’une entrée du carnet d’adresses personnel 1. Recherchez une entrée dans la liste. 2. Mettez l’entrée en surbrillance, puis appuyez sur Sélect. 3. Appuyez sur Compos. (Il se peut que vous deviez au préalable appuyer sur la touche de fonction autres pour afficher Compos.) 4. Entrez le numéro de téléphone du participant. 5. Mettez en surbrillance le numéro à composer, puis appuyez sur OK. 6. Appuyez de nouveau sur OK pour composer le numéro. Supprimer une entrée du carnet d’adresses personnel 1. Recherchez une entrée dans la liste. 2. Mettez l’entrée en surbrillance, puis appuyez sur Sélect. 3. Appuyez sur Suppr. 4. Appuyez sur OK pour confirmer la suppression. Modifier une entrée du carnet d’adresses personnel 1. Recherchez une entrée dans la liste. 2. Mettez en surbrillance l’entrée à modifier, puis appuyez sur Modif. pour modifier un nom ou une adresse e-mail. 3. Si nécessaire, sélectionnez Téléph. pour modifier un numéro de téléphone. 4. Appuyez sur MàJ. 64 OL-17124-01 Ajouter une entrée au carnet d’adresses personnel 1. Accédez au répertoire personnel, puis sélectionnez Carnet d’adresses personnel. 2. Accédez à la page de recherche en sélectionnant Soum. (Il n’est pas nécessaire de commencer par saisir les informations de recherche.) 3. Appuyez sur Nouveau. 4. Utilisez le clavier de votre téléphone pour saisir un nom et une adresse e-mail. 5. Sélectionnez Téléph. et utilisez le clavier pour saisir les numéros de téléphone. N’oubliez pas d’inclure les codes d’accès nécessaires, tels que le 9 ou le 1. 6. Sélectionnez Soum. pour ajouter l’entrée à la base de données. Affecter un code de numérotation abrégée à une entrée du carnet d’adresses personnel 1. Recherchez l’entrée dans le carnet d’adresses personnel. 2. Mettez l’entrée en surbrillance, puis appuyez sur Sélect. 3. Appuyez sur Numéro abrégé. 4. Mettez en surbrillance le numéro à composer, puis appuyez sur Sélect. 5. Mettez en surbrillance le code de numérotation abrégée à affecter au numéro, puis appuyez sur Sélect. Ajouter un code de numérotation abrégée (sans utiliser une entrée du carnet d’adresses personnel) 1. Sélectionnez > Répertoire personnel > Numéros abrégés personnels. 2. Appuyez sur Numéro abrégé. 3. Mettez en surbrillance un code de numérotation abrégée qui n’est pas affecté, puis appuyez sur Sélect. 4. Appuyez sur Affecter. 5. Saisissez un numéro de téléphone. 6. Appuyez sur MàJ. Rechercher des codes de numérotation abrégée 1. Sélectionnez > Répertoire personnel > Numéros abrégés personnels. 2. Préc. et Suivant permettent de passer d’une liste à une autre. 3. Mettez en surbrillance l’entrée de votre choix, puis appuyez sur Sélect. Passer un appel à l’aide d’un code de numérotation abrégée 1. Recherchez un code de numérotation abrégée. 2. Mettez en surbrillance l’entrée de votre choix et appuyez sur Sélect. 3. Appuyez sur Compos. 4. Appuyez sur OK pour terminer l’opération. Pour... Procédez comme suit : Utilisation des journaux d’appels et des répertoires Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 65 Conseils • L’administrateur système peut vous fournir l’ID utilisateur et le code PIN nécessaires pour vous connecter au répertoire personnel. • Le répertoire personnel vous déconnecte automatiquement au bout d’un certain temps. Ce délai peut varier. Pour plus d’informations, contactez votre administrateur système. • Utilisez le pavé numérique pour saisir des caractères sur l’écran du téléphone. Utilisez le bouton Navigation de votre téléphone pour passer d’un champ de saisie à un autre. • Votre téléphone peut être configuré pour la connexion aux appels internationaux, qui est indiquée par un symbole « + » sur les journaux d’appels, le rappel ou les entrées du répertoire d’appels. Pour plus d’informations, contactez votre administrateur système. Supprimer un code de numérotation abrégée 1. Recherchez un code de numérotation abrégée. 2. Mettez en surbrillance l’entrée de votre choix et appuyez sur Sélect. 3. Appuyez sur Suppr. Vous déconnecter du répertoire personnel 1. Sélectionnez > Répertoire personnel (le nom exact de la fonction peut varier). 2. Sélectionnez Déconn. Pour... Procédez comme suit : 66 OL-17124-01 Accès aux messages vocaux Pour accéder aux messages vocaux, utilisez le bouton . Remarque Votre entreprise détermine le service de messagerie vocale utilisé par votre système téléphonique. Pour obtenir des informations précises et détaillées, reportez-vous à la documentation livrée avec votre système de messagerie vocale. Pour... Procédez comme suit : Configurer et personnaliser votre service de messagerie vocale Appuyez sur et suivez les instructions vocales. Si un menu apparaît à l’écran, sélectionnez l’option appropriée. Savoir si vous avez de nouveaux messages vocaux Recherchez : • Un témoin lumineux rouge fixe sur votre combiné. (Cet indicateur peut varier. Reportez-vous à Personnalisation des sonneries et des indicateurs de message, page 57.) • Une icône de message en attente clignotante et un message affiché sur l’écran du téléphone. Remarque Le témoin lumineux rouge et l’icône de message en attente s’affichent si vous avez un message vocal sur votre ligne principale et non sur d’autres lignes. Vérifiez si : • Une tonalité accélérée se fait entendre dans le combiné, le casque ou le haut-parleur lorsque vous émettez un appel. Remarque La tonalité accélérée est propre à la ligne. Vous ne l’entendez que si vous utilisez la ligne associée au message en attente. Écouter vos messages vocaux ou accéder au menu des messages vocaux Appuyez sur . Selon votre service de messagerie vocale, cette opération permet de composer automatiquement le numéro du service de messagerie ou d’afficher un menu. Transférer un appel vers un système de messagerie vocale Appuyez sur Rvoi Im. Pour plus d’informations, reportez-vous à Transfert d’un appel vers un système de messagerie vocale, page 30. Utilisation des pages Web Options utilisateur Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 67 Utilisation des pages Web Options utilisateur Votre téléphone IP Cisco Unified est un périphérique réseau qui peut partager des informations avec les autres périphériques du même type de votre entreprise, notamment votre ordinateur. Vous pouvez utiliser votre ordinateur pour vous connecter à vos pages Web Options utilisateur Cisco Unified CM. Celles-ci permettent de contrôler les fonctions, les paramètres et les services de votre téléphone IP Cisco Unified. Par exemple, vous pouvez configurer des boutons de numérotation abrégée depuis les pages Web Options utilisateur. Accès à vos pages Web Options utilisateur Cette section explique comment vous connecter et sélectionner un périphérique de téléphonie. Pour... Procédez comme suit : Vous connecter à vos pages Web Options utilisateur 1. Demandez à votre administrateur système de vous fournir une URL, un ID utilisateur et un mot de passe par défaut pour vos Options utilisateur. 2. Ouvrez un navigateur Web sur votre ordinateur, saisissez l’URL, puis connectez-vous. 3. Si le programme vous invite à accepter les paramètres de sécurité, cliquez sur Oui ou sur Installer le certificat. La page Web Options utilisateur principale de Cisco Unified Communications Manager s’affiche. Dans cette page, sélectionnez Options utilisateur pour accéder aux paramètres utilisateur, aux fonctions de répertoire, à un carnet d’adresses personnel et aux numéros abrégés. Pour accéder aux options spécifiques au téléphone, sélectionnez un périphérique (voir ci-dessous). Sélectionner un périphérique après vous être connecté 1. Après vous être connecté aux pages Web Options utilisateur, sélectionnez Options utilisateur > Périphérique. La page Configuration du périphérique s’affiche. 2. Si plusieurs périphériques vous sont affectés, sélectionnez le périphérique approprié (modèle de téléphone, profil de mobilité de poste ou profil de destination distante) dans le menu déroulant Nom. Remarque Les boutons de barre d’outils situés en haut de la page Configuration du périphérique sont propres au type de périphérique sélectionné. 68 OL-17124-01 Configuration des fonctions et des services sur le Web Les rubriques de cette section décrivent comment configurer les fonctions et les services de vos pages Web Options utilisateur après vous être connecté. Reportez-vous à Accès à vos pages Web Options utilisateur, page 67. Utilisation du répertoire personnel sur le Web L’ensemble des fonctions de répertoire personnel auquel vous avez accès depuis votre ordinateur comprend : • Un carnet d’adresses personnel • Des codes de carnet d’adresses personnel • Cisco Unified Communications Manager, outil de synchronisation du carnet d’adresses Remarque Vous pouvez également accéder au carnet d’adresses personnel et aux numéros abrégés depuis votre téléphone. Reportez-vous à Utilisation du répertoire personnel sur le téléphone, page 63. Utilisation de votre carnet d’adresses personnel sur le Web Cette section explique comment utiliser le carnet d’adresses personnel depuis les pages Web Options utilisateur. Sélectionner une option de configuration après vous être connecté 1. Après vous être connecté à vos pages Web Options utilisateur, sélectionnez Options utilisateur pour accéder aux paramètres utilisateur, au répertoire, au carnet d’adresses personnel, aux numéros abrégés et aux paramètres de mobilité. 2. Pour revenir à la page Configuration du périphérique depuis une autre page, sélectionnez Options utilisateur > Périphérique. Pour... Connectez-vous et procédez comme suit : Ajouter une entrée au carnet d’adresses personnel 1. Sélectionnez Options utilisateur > Carnet d’adresses personnel. 2. Cliquez sur Ajouter nouveau. 3. Saisissez les informations correspondant à l’entrée. 4. Cliquez sur Enreg. Pour... Procédez comme suit : Utilisation des pages Web Options utilisateur Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 69 Effectuer une recherche d’entrée dans le carnet d’adresses personnel 1. Sélectionnez Options utilisateur > Carnet d’adresses personnel. 2. Indiquez les informations recherchées et cliquez sur Trouver. Modifier une entrée du carnet d’adresses personnel 1. Recherchez l’entrée dans le carnet d’adresses personnel. 2. Cliquez sur un nom ou un pseudonyme. 3. Modifiez l’entrée et cliquez sur Enreg. Supprimer une entrée du carnet d’adresses personnel 1. Recherchez l’entrée dans le carnet d’adresses personnel. 2. Sélectionnez une ou plusieurs entrées. 3. Cliquez sur Supprimer la sélection. Affecter un bouton de ligne à votre carnet d’adresses personnel Remarque Avant que vous puissiez affecter un bouton de ligne à votre carnet d’adresses personnel, votre administrateur système doit configurer le téléphone pour l’affichage des services. Pour plus d’informations, contactez votre administrateur système. 1. Sélectionnez Options utilisateur > Périphérique. 2. Cliquez sur URL de service. 3. Sélectionnez le service Carnet d’adresses personnel dans la liste déroulante des boutons. 4. Entrez une étiquette de téléphone pour le bouton. 5. Cliquez sur Enreg. 6. Cliquez sur Réinit. puis sur Redém. pour actualiser la configuration du téléphone. Vous pouvez maintenant appuyer sur le bouton de ligne pour accéder aux codes du carnet d’adresses personnel. Pour... Connectez-vous et procédez comme suit : 70 OL-17124-01 Configuration de codes de carnet d’adresses personnel sur le Web Cette section explique comment affecter des numéros abrégés depuis vos pages Web Options utilisateur. Pour... Connectez-vous et procédez comme suit : Affecter un bouton de ligne à la numérotation abrégée Remarque Avant que vous puissiez affecter un bouton de ligne à la numérotation abrégée, votre administrateur système doit configurer le téléphone pour l’affichage des services. Pour plus d’informations, contactez votre administrateur système. 1. Sélectionnez Options utilisateur > Périphérique. 2. Cliquez sur URL de service. 3. Sélectionnez le service Numérotation abrégée dans la liste déroulante des boutons. 4. Entrez une étiquette de téléphone pour le bouton. 5. Cliquez sur Enreg. 6. Cliquez sur Réinit. puis sur Redém. pour actualiser la configuration du téléphone. Vous pouvez maintenant appuyer sur le bouton de ligne pour accéder aux codes de numérotation abrégée. Affecter un code de numérotation abrégée à une entrée du carnet d’adresses personnel 1. Créez une entrée dans le carnet d’adresses personnel. Reportez-vous à Utilisation de votre carnet d’adresses personnel sur le Web, page 68. 2. Sélectionnez Options utilisateur > Numéros abrégés. 3. Cliquez sur Ajouter nouveau. 4. Utilisez la zone des options de recherche pour trouver l’entrée appropriée dans le carnet d’adresses personnel. 5. Cliquez sur un numéro de téléphone dans la zone des résultats de recherche. 6. Modifiez le code de numérotation abrégée si vous le souhaitez. 7. Cliquez sur Enreg. Affecter un code de numérotation abrégée à un numéro de téléphone (sans utiliser d’entrée du carnet d’adresses personnel) 1. Sélectionnez Options utilisateur > Numéros abrégés. 2. Cliquez sur Ajouter nouveau. 3. Modifiez le code de numérotation abrégée si vous le souhaitez. 4. Saisissez un numéro de téléphone. 5. Cliquez sur Enreg. Rechercher une entrée de numérotation abrégée 1. Sélectionnez Options utilisateur > Numéros abrégés. 2. Indiquez les informations recherchées et cliquez sur Trouver. Utilisation des pages Web Options utilisateur Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 71 Conseils • Vous pouvez créer jusqu’à 500 entrées de numéros abrégés et de carnet d’adresses personnel. • Vous pouvez créer une nouvelle entrée de numérotation abrégée sans utiliser d’entrée du carnet d’adresses personnel. Ces entrées de numérotation abrégée sont étiquetées brut dans les pages Web Options utilisateur et n’affichent pas d’étiquette de texte configurable. Utilisation de l’outil de synchronisation du carnet d’adresses L’outil de synchronisation du carnet d’adresses (TABSynch) permet de synchroniser votre carnet d’adresses Microsoft Windows existant (le cas échéant) avec votre carnet d’adresses personnel. Les entrées de votre carnet d’adresses Microsoft Windows sont ensuite accessibles depuis votre téléphone IP Cisco Unified et vos pages Web Options utilisateur. Votre administrateur système peut vous donner accès à l’outil TABSynch et vous fournir des instructions détaillées. Configuration de numéros abrégés sur le Web Selon sa configuration, votre téléphone peut prendre en charge plusieurs fonctions de numérotation abrégée : • Les boutons de numérotation abrégée • La composition d’un code • Les codes de carnet d’adresses personnel Modifier le numéro de téléphone correspondant à un numéro abrégé 1. Sélectionnez Options utilisateur > Numéros abrégés. 2. Recherchez le numéro abrégé à modifier. 3. Cliquez sur un composant de l’entrée. 4. Modifiez le numéro de téléphone. 5. Cliquez sur Enreg. Supprimer une entrée de numérotation abrégée 1. Recherchez le numéro abrégé. 2. Sélectionnez une ou plusieurs entrées. 3. Cliquez sur Supprimer la sélection. Pour... Connectez-vous et procédez comme suit : 72 OL-17124-01 Remarque Pour obtenir de l’aide sur l’utilisation des fonctions de numérotation abrégée, reportez-vous à Numérotation abrégée, page 39. Pour... Connectez-vous et procédez comme suit : Configurer les boutons de numérotation abrégée 1. Sélectionnez Options utilisateur > Périphérique. 2. Sélectionnez un téléphone dans le menu déroulant Nom. 3. Cliquez sur Numérotations abrégées. 4. Saisissez le numéro et l’intitulé correspondant à un bouton de numérotation abrégée (bouton programmable) sur votre téléphone. 5. Cliquez sur Enreg. Remarque Votre téléphone utilise le champ Nom sans caract. accentués. Configurer la numérotation abrégée 1. Sélectionnez Options utilisateur > Périphérique. 2. Sélectionnez un téléphone dans le menu déroulant Nom. 3. Cliquez sur Numérotations abrégées. 4. Saisissez le numéro et le libellé correspondant à un code de numérotation abrégée. 5. Cliquez sur Enreg. Configurer des codes de carnet d’adresses personnel Reportez-vous à Configuration de codes de carnet d’adresses personnel sur le Web, page 70. Vous pouvez également configurer des numéros abrégés sur votre téléphone. Reportez-vous à Utilisation du répertoire personnel sur le téléphone, page 63. Utilisation des pages Web Options utilisateur Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 73 Configuration de services téléphoniques sur le Web Les services téléphoniques peuvent inclure des fonctions spéciales, des données du réseau et des informations Web (par exemple les cours de la bourse ou les programmes de cinéma). Vous devez d’abord vous abonner à un service téléphonique avant de pouvoir y accéder sur votre téléphone. Pour... Connectez-vous et procédez comme suit : Vous abonner à un service 1. Sélectionnez Options utilisateur > Périphérique. 2. Sélectionnez un téléphone dans le menu déroulant Nom. 3. Cliquez sur Services téléphoniques. 4. Cliquez sur Ajouter nouveau. 5. Choisissez un service dans la liste déroulante et cliquez sur Suivant. 6. Changez l’intitulé du service et/ou saisissez des informations supplémentaires sur le service, le cas échéant (facultatif). 7. Cliquez sur Enreg. Rechercher des services 1. Sélectionnez un périphérique. 2. Cliquez sur Services téléphoniques. 3. Cliquez sur Trouver. Modifier un service ou y mettre fin 1. Recherchez les services. 2. Sélectionnez une ou plusieurs entrées. 3. Cliquez sur Supprimer la sélection. Modifier le nom d’un service 1. Recherchez les services. 2. Cliquez sur le nom du service. 3. Modifiez les informations et cliquez sur Enreg. 74 OL-17124-01 Contrôle des paramètres utilisateur sur le Web Les paramètres utilisateur incluent votre mot de passe, votre PIN et votre langue (paramètres régionaux). Associer un service à un bouton programmable disponible 1. Sélectionnez Options utilisateur > Périphérique. 2. Sélectionnez un téléphone dans le menu déroulant Nom. 3. Cliquez sur URL de service. Remarque Si cette option n’apparaît pas, demandez à votre administrateur système de configurer une touche d’URL de service pour votre téléphone. 4. Sélectionnez un service dans la liste déroulante Touche de service. 5. Si vous souhaitez renommer le service, modifiez les champs d’étiquettes. Remarque Votre téléphone utilise le champ Nom sans caract. accentués s’il ne prend pas en charge les jeux de caractères à deux octets. 6. Cliquez sur Enreg. 7. Cliquez sur Réinitialiser pour réinitialiser votre téléphone (nécessaire pour afficher le nouveau libellé de la touche sur votre téléphone). Accéder à un service depuis le téléphone Sélectionnez ( ) > Services. Pour... Connectez-vous et procédez comme suit : Modifier votre mot de passe 1. Sélectionnez Options utilisateur > Paramètres utilisateur. 2. Dans la zone Mot de passe du navigateur, saisissez les informations. 3. Cliquez sur Enreg. Modifier votre PIN 1. Sélectionnez Options utilisateur > Paramètres utilisateur. 2. Dans la zone PIN du téléphone, saisissez les informations. 3. Cliquez sur Enreg. Modifier la langue (paramètres régionaux) des pages Web Options utilisateur 1. Sélectionnez Options utilisateur > Paramètres utilisateur. 2. Dans la zone Langue utilisateur, choisissez une option dans la liste déroulante Langue. 3. Cliquez sur Enreg. Pour... Connectez-vous et procédez comme suit : Utilisation des pages Web Options utilisateur Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 75 Conseil Votre code PIN et votre mot de passe permettent d’accéder à plusieurs fonctions et services. Par exemple, utilisez votre code PIN pour vous connecter au service de mobilité de poste de Cisco ou au répertoire personnel de votre téléphone. Utilisez votre mot de passe pour vous connecter à vos pages Web Options utilisateur et à Cisco WebDialer sur votre ordinateur. Pour en savoir plus, contactez votre administrateur système. Contrôle des paramètres de ligne sur le Web Les paramètres de ligne ont une incidence sur une ligne donnée (numéro d’annuaire) de votre téléphone. Les paramètres de ligne peuvent inclure le renvoi d’appels, les indicateurs de message vocal, le modèle de sonneries et les libellés de ligne. Vous pouvez configurer d’autres paramètres de ligne directement sur votre téléphone : • Configuration du renvoi d’appels sur votre ligne téléphonique principale (reportez-vous à Renvoi des appels vers un autre numéro, page 31). • Modification des sonneries, de l’affichage et d’autres paramètres propres au modèle de téléphone (reportez-vous à Modification des paramètres du téléphone, page 57). Modifier la langue (paramètres régionaux) de l’écran de votre téléphone 1. Sélectionnez Options utilisateur > Paramètres utilisateur. 2. Sélectionnez une option dans la liste déroulante Langue utilisateur. 3. Cliquez sur Enreg. Pour... Connectez-vous et procédez comme suit : Configurer le renvoi d’appels par ligne 1. Sélectionnez Options utilisateur > Périphérique. 2. Sélectionnez un téléphone dans le menu déroulant Nom. 3. Cliquez sur Paramètres de ligne. 4. Si plusieurs numéros de répertoire (lignes) sont affectés à votre téléphone, sélectionnez une ligne dans le menu déroulant Ligne. 5. Dans la zone Renvoi des appels entrants, choisissez les paramètres de renvoi d’appels correspondant aux différentes situations. 6. Cliquez sur Enreg. Pour... Connectez-vous et procédez comme suit : 76 OL-17124-01 Modifier le paramètre d’indicateur de message vocal selon la ligne (signal visuel) 1. Sélectionnez Options utilisateur > Périphérique. 2. Sélectionnez un téléphone dans le menu déroulant Nom. 3. Cliquez sur Paramètres de ligne. 4. Si plusieurs numéros de répertoire (lignes) sont affectés à votre téléphone, sélectionnez une ligne dans le menu déroulant Ligne. 5. Dans la zone Indicateur de messages en attente, choisissez un ou plusieurs paramètres. Remarque Généralement, le paramètre par défaut de messages en attente demande à votre téléphone d’afficher un témoin lumineux rouge fixe sur la bande lumineuse du combiné pour indiquer la présence d’un nouveau message vocal. 6. Cliquez sur Enreg. Modifier le paramètre d’indicateur de message vocal selon la ligne (signal sonore) 1. Sélectionnez Options utilisateur > Périphérique. 2. Sélectionnez un téléphone dans le menu déroulant Nom. 3. Cliquez sur Paramètres de ligne. 4. Si plusieurs numéros de répertoire (lignes) sont affectés à votre téléphone, sélectionnez une ligne dans le menu déroulant Ligne. 5. Dans la zone Indicateur de messages vocaux en attente, choisissez l’un des paramètres. Remarque Généralement, le paramètre par défaut de messages en attente demande à votre téléphone d’afficher un témoin lumineux rouge fixe sur la bande lumineuse du combiné pour indiquer la présence d’un nouveau message vocal. 6. Cliquez sur Enreg. Modifier ou créer un libellé de ligne apparaissant à l’écran de votre téléphone 1. Sélectionnez Options utilisateur > Périphérique. 2. Sélectionnez un téléphone dans le menu déroulant Nom. 3. Cliquez sur Paramètres de ligne. 4. Si plusieurs numéros de répertoire (lignes) sont affectés à votre téléphone, sélectionnez une ligne dans le menu déroulant Ligne. 5. Dans la zone Libellé de ligne, saisissez un libellé. 6. Cliquez sur Enreg. Remarque Votre téléphone utilise le champ Nom sans caract. accentués s’il ne prend pas en charge les jeux de caractères à deux octets. Pour... Connectez-vous et procédez comme suit : Utilisation des pages Web Options utilisateur Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 77 Configuration des téléphones et des listes d’accès pour la connexion mobile Lorsque vous utilisez la fonction de connexion mobile de Cisco, vous devez indiquer les téléphones (portables et autres) à utiliser pour émettre et recevoir des appels en utilisant les mêmes numéros de répertoire que ceux de votre téléphone de bureau. Ces téléphones sont appelés destinations distantes. Vous pouvez également définir des listes d’accès pour interdire ou autoriser l’envoi vers votre téléphone portable des appels en provenance de certains numéros. Pour... Connectez-vous et procédez comme suit : Créer une liste d’accès 1. Sélectionnez Options utilisateur > Paramètres de mobilité > Listes d’accès. 2. Cliquez sur Ajouter nouveau. 3. Saisissez un nom pour identifier la liste d’accès et donnez une description (facultatif). 4. Choisissez si la liste d’accès autorise ou bloque les appels indiqués. 5. Cliquez sur Enreg. 6. Cliquez sur Ajouter un membre pour ajouter des numéros de téléphone ou des filtres à la liste. 7. Sélectionnez une option dans la liste déroulante Masque de filtre. Vous pouvez filtrer un numéro de répertoire ou les appels dont l’ID de l’appelant est restreint (Non disponible) ou anonyme (Confidentiel). 8. Si vous sélectionnez un numéro de répertoire dans la liste déroulante Masque de filtre, saisissez un numéro de téléphone ou un filtre dans le champ Masque NR. Vous pouvez utiliser les caractères génériques suivants pour définir un filtre : – X (majuscule ou minuscule) : correspond à un chiffre. Par exemple, 408555123X correspond aux numéros 4085551230, 4085551231, 4085551232, 4085551233, 4085551234, 4085551235, 4085551236, 4085551237, 4085551238 ou 4085551239. – ! : correspond à un nombre indéfini de chiffres. Par exemple, 408! correspond à tout numéro commençant par 408. – # : remplace un chiffre pour créer une correspondance exacte. 9. Pour ajouter ce membre à la liste d’accès, cliquez sur Enreg. 10. Pour enregistrer la liste d’accès, cliquez sur Enreg. 78 OL-17124-01 Ajouter une nouvelle destination distante 1. Sélectionnez Options utilisateur > Paramètres de mobilité > Destinations distantes. 2. Cliquez sur Ajouter nouveau. 3. Saisissez les informations suivantes : – Nom : donnez un nom au téléphone portable (ou autre). – Numéro de destination : saisissez le numéro de votre téléphone portable. 4. Sélectionnez votre profil de destination distante dans la liste déroulante. Votre profil de destination distante contient les paramètres qui s’appliquent aux destinations distantes que vous créez. 5. Cochez la case Téléphone portable pour autoriser votre destination distante à accepter un appel passé depuis votre téléphone de bureau. 6. Cochez la case Activer la connexion mobile pour autoriser votre destination distante à sonner en même temps que votre téléphone de bureau. 7. Appuyez sur l’une des options suivantes dans la zone Calendrier de sonneries : – Tout le temps : sélectionnez cette option si vous ne souhaitez pas appliquer de restriction de jour et d’heure pour faire sonner la destination distante. – Comme indiqué ci-dessous : choisissez cette option et sélectionnez l’une des options suivantes pour définir un calendrier de sonneries en fonction du jour et de l’heure. • Cochez les cases correspondant aux jours de la semaine pour lesquels vous souhaitez autoriser les appels à faire sonner la destination distante. • Pour chaque jour, sélectionnez Toute la journée ou sélectionnez les heures de début et de fin dans les listes déroulantes. • Sélectionnez le fuseau horaire dans la liste déroulante. 8. Choisissez l’une des options de sonnerie suivantes : – Toujours faire sonner cette destination. – Faire sonner cette destination seulement si l’appelant fait partie de la liste d’accès autorisé sélectionnée. – Ne pas faire sonner cette destination si l’appelant fait partie de la liste d’accès bloqué sélectionnée. Remarque Les listes déroulantes du calendrier de sonneries contiennent uniquement les listes d’accès que vous avez créées. 9. Cliquez sur Enreg. Pour... Connectez-vous et procédez comme suit : Utilisation des pages Web Options utilisateur Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 79 Utilisation de Cisco WebDialer Cisco WebDialer permet de passer des appels sur votre téléphone IP Cisco Unified à des contacts du répertoire en cliquant sur les éléments d’un navigateur Web. L’administrateur système doit vous configurer cette fonction. Pour... Procédez comme suit : Utiliser WebDialer avec votre répertoire Options utilisateur 1. Connectez-vous à vos pages Web Options utilisateur. Reportez-vous à Accès à vos pages Web Options utilisateur, page 67. 2. Sélectionnez Options utilisateur > Répertoire et recherchez un collègue. 3. Cliquez sur le numéro à composer. 4. Si vous utilisez WebDialer pour la première fois, configurez vos préférences et cliquez sur Soum. (Reportez-vous à la dernière ligne de ce tableau pour plus de détails.) 5. Si la page Passer un appel s’affiche, cliquez sur Compos. (Reportez-vous à la dernière ligne de ce tableau si vous souhaitez que cette page ne s’affiche plus à l’avenir.) L’appel est maintenant passé sur votre téléphone. 6. Pour mettre fin à un appel, cliquez sur Raccrocher ou raccrochez le combiné de votre téléphone. Utiliser WebDialer avec un autre répertoire d’entreprise en ligne (et non votre répertoire Options utilisateur) 1. Connectez-vous à un répertoire d’entreprise compatible WebDialer et recherchez des collègues. 2. Cliquez sur le numéro à composer. 3. Lorsque vous y êtes invité, saisissez votre ID utilisateur et votre mot de passe. 4. Si vous utilisez WebDialer pour la première fois, configurez vos préférences et cliquez sur Soum. (Reportez-vous à la dernière ligne de ce tableau pour plus de détails.) 5. Si la page Passer un appel s’affiche, cliquez sur Compos. (Reportez-vous à la dernière ligne de ce tableau si vous souhaitez que cette page ne s’affiche plus à l’avenir.) L’appel est maintenant passé sur votre téléphone. 6. Pour mettre fin à un appel, cliquez sur Raccrocher ou raccrochez le combiné de votre téléphone. 80 OL-17124-01 Vous déconnecter de WebDialer Cliquez sur l’icône de déconnexion dans la page Passer un appel ou Raccrocher. Configurer, afficher ou modifier des préférences de WebDialer Accédez à la page Préférences. La page Préférences s’affiche la première fois que vous utilisez WebDialer (après avoir cliqué sur le numéro que vous voulez composer). Pour revenir aux préférences par la suite, cliquez sur l’icône Préférences des pages Passer un appel ou Raccrocher. La page Préférences contient les options suivantes : • Langue souhaitée : détermine la langue utilisée pour les paramètres et les invites de WebDialer. • Utiliser un périphérique permanent : identifie le téléphone IP Cisco Unified et le numéro de répertoire (ligne) à utiliser pour passer des appels WebDialer. Si votre téléphone dispose d’une seule ligne, ce téléphone et cette ligne sont sélectionnés automatiquement. Sinon, choisissez un téléphone et/ou une ligne. Les téléphones sont indiqués par leur nom système. (Pour afficher le nom système de votre téléphone, sélectionnez > Config. réseau > Nom système.) • Utiliser la mobilité de poste : si cette option est sélectionnée, elle invite WebDialer à utiliser le téléphone IP Cisco Unified associé à votre profil de mobilité de poste (s’il existe). • Ne pas afficher la boîte de dialogue de confirmation d’appel : si cette option est sélectionnée, WebDialer supprime la page Passer un appel. Cette page s’affiche par défaut lorsque vous cliquez sur un numéro de téléphone dans un répertoire en ligne compatible WebDialer. Pour... Procédez comme suit : Présentation des options de configuration supplémentaires Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 81 Présentation des options de configuration supplémentaires Votre administrateur système peut configurer votre téléphone de manière à ce que vous puissiez utiliser, le cas échéant, des modèles spécifiques de boutons et de touches de fonction, associés à des fonctions et à des services particuliers. Le tableau ci-après présente certaines options de configuration que vous pouvez demander à l’administrateur de votre système téléphonique en fonction de vos besoins en appels ou de votre environnement de travail. Remarque Les guides des téléphones et autres documents auxquels il est fait référence dans ce tableau sont disponibles à l’adresse suivante : http://www.cisco.com/en/US/ products/hw/phones/ps379/tsd_products_support_series_home.html Si vous... Procédez comme suit : Pour plus d’informations... Devez gérer davantage d’appels sur votre ligne téléphonique Demandez à votre administrateur système de configurer votre ligne de manière à ce qu’elle prenne en charge un plus grand nombre d’appels. Contactez votre administrateur système ou l’équipe d’assistance téléphonique. Avez besoin de plusieurs lignes téléphoniques Demandez à votre administrateur système de vous configurer un ou plusieurs numéros de répertoire supplémentaires. Contactez votre administrateur système ou l’équipe d’assistance téléphonique. 82 OL-17124-01 Avez besoin de plus de boutons de numérotation abrégée Vérifiez d’abord que vous utilisez déjà la totalité des boutons de numérotation abrégée disponibles. Si vous avez besoin de boutons de numérotation abrégée supplémentaires, utilisez la fonction de numérotation abrégée ou abonnez-vous au service de numérotation abrégée. Vous pouvez également ajouter un module d’extension à votre téléphone IP Cisco Unified 7962G. Reportez-vous aux références suivantes : • Numérotation abrégée, page 39 • Cisco Unified IP Phone Expansion Module 7914 Phone Guide. • Cisco Unified IP Phone Expansion Module 7915 Phone Guide. • Cisco Unified IP Phone Expansion Module 7916 Phone Guide. Remarque Le téléphone IP Cisco Unified 7942G ne prend pas en charge le module d’extension pour téléphone IP Cisco Unified. Travaillez en collaboration avec un assistant administratif (ou en tant qu’assistant administratif) Pensez à utiliser : • Cisco Unified Communications Manager Assistant • Une ligne partagée Reportez-vous aux références suivantes : • Utilisation d’une ligne partagée, page 43 • Guide de l’utilisateur de Cisco Unified Communications Manager Assistant Souhaitez utiliser un même numéro de poste pour plusieurs téléphones Demandez une ligne partagée. Cela vous permet d’utiliser un numéro de poste unique pour les téléphones de votre bureau et de votre laboratoire, par exemple. Reportez-vous à Utilisation d’une ligne partagée, page 43. Si vous... Procédez comme suit : Pour plus d’informations... Présentation des options de configuration supplémentaires Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 83 Partagez vos téléphones ou votre bureau avec des collègues Pensez à utiliser : • La fonction de parcage d’appels pour enregistrer et récupérer des appels sans utiliser la fonction de transfert. • La fonction d’interception d’appels pour répondre à des appels en sonnerie sur un autre téléphone. • Une ligne partagée pour afficher les appels de vos collègues ou vous y connecter. • La fonction de mobilité de poste de Cisco pour affecter vos numéro de téléphone et profil utilisateur à un téléphone IP Cisco Unified partagé. Demandez des informations sur ces fonctions à votre administrateur système et reportez-vous aux sections suivantes : • Gestion avancée des appels, page 39 • Utilisation d’une ligne partagée, page 43 • Utilisation de la fonction de mobilité de poste de Cisco, page 51 Répondez à de nombreux appels ou gérez des appels pour une autre personne Demandez à votre administrateur système de configurer la fonction de réponse automatique sur le téléphone. Reportez-vous à Utilisation de la fonction Réponse automatique avec un casque ou un haut-parleur, page 56. Devez passer des appels vidéo (sur les téléphones SCCP uniquement) Pensez à utiliser Cisco Unified Video Advantage pour passer des appels vidéo en utilisant votre téléphone IP Cisco Unified, votre PC et une caméra vidéo externe. Si vous avez besoin d’aide, contactez votre administrateur système et reportez-vous aux documents Cisco Unified Video Advantage Quick Start Guide et Cisco Unified Video Advantage User Guide. Si vous... Procédez comme suit : Pour plus d’informations... 84 OL-17124-01 Devez déterminer l’état d’une ligne téléphonique associée à un bouton de numérotation abrégée, un journal d’appels ou une entrée de répertoire sur votre téléphone Demandez à votre administrateur de configurer la fonction d’affichage de ligne occupée (FLO) sur votre téléphone. Reportez-vous à Utilisation de FLO pour déterminer l’état d’une ligne, page 47. Souhaitez affecter temporairement vos numéro de téléphone et paramètres à un téléphone IP Cisco Unified partagé Demandez des détails sur le service de mobilité de poste de Cisco à votre administrateur système. Reportez-vous à Utilisation de la fonction de mobilité de poste de Cisco, page 51. Si vous... Procédez comme suit : Pour plus d’informations... Dépannage du téléphone Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 85 Dépannage du téléphone Cette section fournit des informations de dépannage sur le téléphone IP Cisco Unified. Informations générales de dépannage La présente section vous donne des indications destinées à vous aider à résoudre les principaux problèmes de votre téléphone. Pour en savoir plus, contactez votre administrateur système. Signe Explication Vous n’entendez pas de tonalité ou vous n’arrivez pas à passer d’appel Cela est peut-être dû à l’une (ou plusieurs) des raisons suivantes : • Vous devez vous connecter au service de mobilité de poste. • Vous devez entrer un code d’affaire client (CMC) ou un code d’autorisation forcée (FAC) après avoir composé un numéro (Uniquement sur les téléphones SCCP) • Votre téléphone est soumis à des restrictions horaires qui vous empêchent d’utiliser certaines fonctions à certaines heures de la journée. Le bouton de paramètres ne répond pas Votre administrateur système peut avoir désactivé sur votre téléphone. La touche de fonction que vous souhaitez utiliser ne s’affiche pas Cela est peut-être dû à l’une (ou plusieurs) des raisons suivantes : • Vous devez appuyer sur autres pour afficher des touches de fonction supplémentaires. • Vous devez changer l’état de la ligne (par exemple en décrochant ou en passant un appel). • Votre téléphone n’est pas configuré pour prendre en charge la fonction associée à cette touche de fonction. L’option Inser. ne fonctionne pas et le téléphone émet une tonalité « occupé » rapide Vous ne pouvez pas vous connecter à un appel chiffré si le téléphone que vous utilisez n’est pas configuré pour le chiffrement. Si votre tentative de connexion échoue pour cette raison, le téléphone émet une tonalité « occupé » rapide. 86 OL-17124-01 Affichage des données d’administration de votre téléphone Votre administrateur système peut vous demander d’accéder à des données d’administration sur votre téléphone en vue du dépannage. Utilisation de l’outil de génération de rapports qualité L’administrateur système peut configurer temporairement le téléphone avec l’outil de génération de rapports qualité (QRT) pour résoudre les problèmes de performances. Appuyez sur QRT ou Outil de génération de rapports qualité pour lui soumettre des informations. Selon la configuration de votre téléphone, l’outil QRT permet de : • signaler immédiatement un problème audio sur un appel en cours ; • sélectionner un problème général dans une liste et choisir des codes motifs. Vous êtes déconnecté d’un appel que vous avez rejoint par insertion Lorsque vous vous connectez à un appel à l’aide de la touche Inser., vous pouvez en être déconnecté s’il est mis en attente, transféré ou transformé en conférence téléphonique. Le Rappel échoue Votre interlocuteur a peut-être activé la fonction de renvoi d’appels. Le téléphone affiche un message d’erreur lorsque vous tentez de configurer le renvoi de tous les appels Il est possible que votre téléphone refuse votre tentative de configuration du renvoi de tous les appels directement sur le téléphone si le numéro cible saisi a pour effet de créer une boucle de renvoi de tous les appels ou de dépasser le nombre maximal de liens autorisés dans une chaîne de renvoi d’appel (également appelé nombre maximal de sauts). Contactez votre administrateur système pour en savoir plus. Si vous devez... Procédez comme suit : Accéder aux données de configuration du réseau Sélectionnez > Configuration réseau, puis l’élément de configuration réseau que vous souhaitez afficher. Accéder aux données d’état Sélectionnez > État, puis l’élément d’état que vous souhaitez afficher. Accéder aux caractéristiques du téléphone Sélectionnez > Caractéristiques. Accéder aux informations relatives aux appels et à la qualité vocale du téléphone Sélectionnez > État > Statistiques d’appel. Signe Explication Conditions générales de la garantie matérielle limitée à un an de Cisco Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 87 Conditions générales de la garantie matérielle limitée à un an de Cisco Des conditions spéciales s’appliquent à votre garantie matérielle et plusieurs services sont à votre disposition au cours de la période couverte par cette garantie. Votre déclaration de garantie formelle, comprenant les garanties et les accords de licence applicables aux logiciels Cisco, est disponible sur Cisco.com à l’adresse suivante : http://www.cisco.com/en/US/docs/general/warranty/English/1Y1DEN__.html 88 OL-17124-01 Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 89 Index A Abonnement à des services téléphoniques 73 Accès vocal mobile 52 AGrpIntr 41 Aide en ligne, utilisation 16 Aide, utilisation 16 Appel en attente 23 Appels affichage 14, 27 affichage de plusieurs appels 28 attente et reprise 25 attribution de priorités 49 avec plusieurs interlocuteurs 34 blocage 32 coupure micro 27 différences avec une ligne 12 émission 19 fin 25 fonctions de conférence 34 gestion de plusieurs appels 27 icônes 12 insertion 44 nombre maximal par ligne 12 parcage 42 plusieurs appels, passage de l’un à l’autre 27 prendre 23 rapports sur les problèmes 86 redirection d’appels en sonnerie 40 renvoi 31, 75 sécurisés 48 stockage et récupération 42 Transfert 29 utilisation de NPD 32 Appels à plusieurs interlocuteurs affichage des détails 60, 61 identification dans les journaux d’appels 60 Appels authentifiés 48 Appels chiffrés 48 Appels composés, enregistrements 59 Appels en absence, enregistrements 59 Appels reçus, enregistrements 59 Appels sécurisés 48 Appels suspects, suivi 49 Appels, gestion de base 19 Appels, zone d’activité 14 Attente et passage d’un appel à l’autre 27 et transfert 29 utilisation 25 Attribution de priorités aux appels 49 Audio, qualité 7 Autre groupe de prise d’appel, utilisation 41 90 OL-17124-01 B Bidirectionnel 13 Bouton 38 Bouton Aide, description 11 Bouton Coupure micro, description 11 Bouton Messages, description 10 Bouton Navigation, description 11 Bouton Paramètres, description 11 Bouton Services, description 11 Bouton Volume, description 11 Boutons de fonctions Aide 11 Messages 10 Paramètres 11 Services 11 Boutons de ligne, identification 10 Boutons programmables description 10 étiqu. 14 C Calendrier de sonneries pour les destinations distantes 78 Carnet d’adresses personnel 61 composition d’un numéro 21 utilisation depuis la page Web 68 voir Personnel, carnet d’adresses 63 Carnet personnel, voir Carnet d’adresses personnel Casque bouton, identification 11 mode 54 prendre des appels 23 qualité audio 7 raccrochage 25 Chuchotement 13 Cisco Unified Communications Manager, outil de synchronisation du carnet d’adresses 71 Cisco Unified Video Advantage 83 Cisco WebDialer 79 Clavier description 11 CMC 21 Code d’affaire client 21 Code d’autorisation forcée 21 Codes de carnet d’adresses personnel configuration depuis la page Web 70 Combiné bande lumineuse 11 fixation sur son support 6 utilisation 54 Composition d’une URL, à partir d’un journal d’appels 61 Composition le combiné raccroché 20 Composition, options 19 Conférences Meet-Me 36 Conférences téléphoniques Meet-Me 36 types 34 Confidentialité et lignes partagées 44 utilisation 46 Configuration options 81 Connexion aux appels internationaux 20, 61, 65 Connexion mobile 52 accès aux destinations distantes 53 activation 78 Coupure micro, utilisation 27 Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 91 D Déconnexion de groupes de recherche 43 Dépannage 85 voir aussi QRT 85 Destinations distantes 52 calendrier de sonneries 78 désactiver l'accès 53 E Écran du téléphone fonctions 14 modification de la langue 58 nettoyage 15 réglage du contraste 58 Émission d’appels, options 19 État de la ligne, affichage 14 État, recherche des données 85 F FAC 21 Fin d’un appel, options 25 FLO 47 Fonction ligne occupée voir FLO 47 Fonctions, disponibilité 16, 81 G Gestion avancée des appels 39 Groupes de recherche, déconnexion 43 GrpIntr 40 H Haut-parleur bouton, identification 11 mode 54 prendre des appels 23 raccrochage 25 I Icône Utilisé à distance pour les lignes partagées 44 Icônes de l’état des appels 12 des lignes 12 ID de l’appelant 14 Identification des appels malveillants (IDAM), utilisation 49 Inactivité 13 indicateur d’attente de message audible 66 Indicateur de messages vocaux 66 modification des paramètres 75 Insertion et confidentialité 46 et lignes partagées 44 utilisation 44 Installation du téléphone IP Cisco Unified 5 Interception d’appels de groupe, utilisation 40 Interception d’appels FLO 47 Interception d’appels, utilisation 40 Intercom, appels 38 Intercom, ligne 13, 38 Intrcpt 40 92 OL-17124-01 J Journaux d’appels affichage et composition d’un numéro 59 composition à partir d’une entrée d’URL 61 effacement 59 L Large bande Casque 55 Lignes affichage 14 description 12 et état des appels 12 et renvoi d’appels 75 Icônes 12 libellé 75 modèle de sonneries 75 paramètre d’indicateur de message vocal 75 utilisation de FLO 47 Lignes partagées avec insertion 44 avec la fonction de confidentialité 46 description 43 et icône Utilisé à distance 44 Lignes téléphoniques boutons 10 description 12 M Menus de fonctions, utilisation 16 Menus, utilisation 16 Messagerie vocale, service 66 Messages écoute 66 indicateur 57, 66 MLPP, utilisation 49 Mobilité de poste connexion 51 déconnexion 51 Modèle de sonneries, modification 75 Module d’extension pour téléphone IP Cisco Unified 7914 58, 82 Module d’extension pour téléphone IP Cisco Unified 7915 82 Mot de passe, modification 74 N Ne pas déranger 32 NPD 32 Numérotation abrégée 39, 71 Boutons, identification 10 configuration 71 étiquettes 14, 71 utilisation 20 Numérotation automatique 20 O Onglets, téléphone et fonction 14 Outil d’assistance des téléphones enregistrés automatiquement (TAPS, Tool for Auto-Registered Phones Support) 6 Outil de génération de rapports qualité 86 Outil de synchronisation du carnet d’adresses 71 Manuel des téléphones IP Cisco Unified 7962G et 7942G pour Cisco Unified Communications Manager 7.0 (SCCP et SIP) 93 P Pages Web Options utilisateur abonnement à des services téléphoniques 73 accès 67 configuration des fonctions et des services 68 Paramètres de langue (paramètres régionaux) 74 Paramètres, personnalisation 57 Parcage d’appel dirigé 42 Parcage d’appels 42 Passage d’un appel à l’autre 27, 52 Performances du casque, généralités 7 Périphérique, page de configuration 67 Personnalisation Messages 66 PIN, modification 74 Plusieurs appels, gestion 27 Poste, numéros 14 Préfixe de récupération du parcage 42 Prendre des appels, options 23 Prise en charge du champ Nom sans caract. accentués 72 Problèmes audio 86 Q QRT 86 QRT, utilisation 86 R Raccrochage, options 25 Rappel 19 Récupérer l’appel en attente, indicateurs 25 Renvoi d’appels 31 configuration depuis la page Web 75 Renvoi d’appels vers une messagerie vocale 30, 66 Renvoi d’appels, options 31 Répertoire composition d’un numéro depuis une page Web 21 d’entreprise 61 personnel 61 utilisation depuis la page Web 79 utilisation sur le téléphone 21, 59 Répertoire d’entreprise composition d’un numéro depuis une page Web 21 utilisation depuis la page Web 79 utilisation sur le téléphone 21 Répertoire personnel utilisation depuis la page Web 68 Réponse automatique 56 Reprise, utilisation 25 Réseau, recherche des données de configuration 85 S Sécurité établissement et réception d’appels sécurisés 48 niveaux 48 vérification des appels non sécurisés 48 Sécurité, consignes 3 Service de numérotation abrégée numérotation 21 94 OL-17124-01 Services téléphoniques configuration voir pages Web Options utilisateur Services Web configuration 67 voir aussi pages Web Options utilisateur Services, abonnement 73 Socle bouton, identification 10 réglage 6 Sonnerie indicateur 11 personnalisation 57 T TABSynch 71 TAPS, utilisation 6 Téléphone IP Cisco Unified aide en ligne 16 configuration des fonctions 16, 81 description 8 enregistrement 6 fixation du support du combiné 6 illustration 8 raccordement 5 réglage de la hauteur 6 services Web 67 Téléphonie, fonctions indicateur d’attente de message audible 66 Texte saisi sur le téléphone 16 Touche de fonction Détails, affichage des appels à plusieurs interlocuteurs 60, 61 Touches de fonction description 11 étiqu. 14 Transfert direct 30 Transfert, options 29 W WebDialer 21, 79 Siège social aux États-Unis Cisco Systems, Inc. San Jose, CA Siège social en Asie-Pacifique Cisco Systems (USA) Pte. Ltd. Singapour Siège social en Europe Cisco Systems International BV Amsterdam, Pays-Bas Cisco possède plus de 200 bureaux dans le monde. Les adresses ainsi que les numéros de téléphone et de fax se trouvent sur le site Web Cisco, à l’adresse www.cisco.com/go/offices. CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, the Cisco logo, DCE, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn is a service mark; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0805R) © 2008 Cisco Systems, Inc. All rights reserved. OL-17124-01 A - 1 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. CCNA Glossary A Term Definition A&B bit signaling Procedure used in T1 transmission facilities in which each of the 24 T1 subchannels devotes one bit of every sixth frame to the carrying of supervisory signaling information. Also called 24th channel signaling. AAL ATM adaptation layer. Service-dependent sublayer of the data link layer. The AAL accepts data from different applications and presents it to the ATM layer in the form of 48-byte ATM payload segments. AALs consist of two sublayers, CS and SAR. AALs differ on the basis of the source-destination timing used, whether they use CBR or VBR, and whether they are used for connection-oriented or connectionless mode data transfer. At present, the four types of AAL recommended by the ITU-T are AAL1, AAL2, AAL3/4, and AAL5. See AAL1, AAL2, AAL3/4, AAL5, CS, and SAR. See also ATM and ATM layer. AAL1 ATM adaptation layer 1. One of four AALs recommended by the ITU-T. AAL1 is used for connection-oriented, delay-sensitive services requiring constant bit rates, such as uncompressed video and other isochronous traffic. See also AAL. AAL2 ATM adaptation layer 2. One of four AALs recommended by the ITU-T. AAL2 is used for connection-oriented services that support a variable bit rate, such as some isochronous video and voice traffic. See also AAL. AAL3/4 ATM adaptation layer 3/4. One of four AALs (merged from two initially distinct adaptation layers) recommended by the ITU-T. AAL3/4 supports both connectionless and connection-oriented links, but is primarily used for the transmission of SMDS packets over ATM networks. See also AAL. AAL5 ATM adaptation layer 5. One of four AALs recommended by the ITU-T. AAL5 supports connection-oriented, VBR services, and is used predominantly for the transfer of classical IP over ATM and LANE traffic. AAL5 uses SEAL and is the least complex of the current AAL recommendations. It offers low bandwidth overhead and simpler processing requirements in exchange for reduced bandwidth capacity and error-recovery capability. See also AAL and SEAL. A - 2 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. AARP AppleTalk Address Resolution Protocol. Protocol in the AppleTalk protocol stack that maps a data-link address to a network address. AARP probe packets Packets transmitted by AARP that determine if a randomly selected node ID is being used by another node in a nonextended AppleTalk network. If the node ID is not being used, the sending node uses that node ID. If the node ID is being used, the sending node chooses a different ID and sends more AARP probe packets. See also AARP. ABM Asynchronous Balanced Mode. An HDLC (and derivative protocol) communication mode supporting peer-oriented, pointto-point communications between two stations, where either station can initiate transmission. ABR 1) available bit rate. QOS class defined by the ATM Forum for ATM networks. ABR is used for connections that do not require timing relationships between source and destination. ABR provides no guarantees in terms of cell loss or delay, providing only best-effort service. Traffic sources adjust their transmission rate in response to information they receive describing the status of the network and its capability to successfully deliver data. Compare with CBR, UBR, and VBR. 2) area border router. Router located on the border of one or more OSPF areas that connects those areas to the backbone network. ABRs are considered members of both the OSPF backbone and the attached areas. They therefore maintain routing tables describing both the backbone topology and the topology of the other areas. Abstract Syntax Notation One See ASN1. AC alternating current. Electrical current that reverses its direction regularly and continually. It is the form of electrical power found in residential and commercial buildings. The abbreviation for this term is AC. access card I/O card in the LightStream 2020 ATM switch. Together with their associated line cards, access cards provide data transfer services for a switch using physical interfaces such as OC-3c. A LightStream 2020 switch can have up to 10 access cards. Occasionally referred to as a paddle card. access list List kept by Cisco routers to control access to or from the router for a number of services (for example, to prevent packets with a certain IP address from leaving a particular interface on the router). access method 1) Generally, the way in which network devices access the network medium. 2) Software within an SNA processor that controls the flow of information through a network A - 3 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. AccessPro PC card Multiprotocol router card from Cisco that can be installed in an IBM-compatible PC equipped with an ISA or EISA bus. This series of PC-compatible router cards is based on Cisco 2500 series technology. Provides scalable wide-area connectivity and flexible full-function routing support. AccessPro PC cards run autonomously using only their own processing power, thus offering routing capabilities without impacting existing applications. access server Communications processor that connects asynchronous devices to a LAN or WAN through network and terminal emulation software. Performs both synchronous and asynchronous routing of supported protocols. Sometimes called a network access server. Compare with communication server. accounting management One of five categories of network management defined by ISO for management of OSI networks. Accounting management subsystems are responsible for collecting network data relating to resource usage. See also configuration management, fault management, performance management, and security management. ACF Advanced Communications Function. A group of SNA products that provides distributed processing and resource sharing. See also ACF and NCP. ACK acknowledgment. Notification sent from one network device to another to acknowledge that some event (for example, receipt of a message) has occurred. Sometimes abbreviated ACK. Compare to NAK. acknowledgment number Next expected TCP octet. ACR allowed cell rate. Parameter defined by the ATM Forum for ATM traffic management. ACR varies between the MCR and the PCR, and is dynamically controlled using congestion control mechanisms. See also MCR and PCR. ACSE association control service element. An OSI convention used to establish, maintain, or terminate a connection between two applications. active hub Multiported device that amplifies LAN transmission signals. active monitor Device responsible for managing a Token Ring. A network node is selected to be the active monitor if it has the highest MAC address on the ring. The active monitor is responsible for such management tasks as ensuring that tokens are not lost, or that frames do not circulate indefinitely. See also ring monitor and standby monitor. adapter See NIC (network interface card). adaptive differential pulse code modulation See ADPCM. adaptive routing See dynamic routing. A - 4 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. ADCCP Advanced Data Communications Control Protocol. An ANSI standard bit-oriented data link control protocol. address Data structure or logical convention used to identify a unique entity, such as a particular process or network device. addressed call mode Mode that permits control signals and commands to establish and terminate calls in V.25bis. See also V.25bis address mapping Technique that allows different protocols to interoperate by translating addresses from one format to another. For example, when routing IP over X.25, the IP addresses must be mapped to the X.25 addresses so that the IP packets can be transmitted by the X.25 network. See also address resolution. address mask Bit combination used to describe which portion of an address refers to the network or subnet and which part refers to the host. Sometimes referred to simply as mask. See also subnet mask. address resolution Generally, a method for resolving differences between computer addressing schemes. Address resolution usually specifies a method for mapping network layer (Layer 3) addresses to data link layer (Layer 2) addresses. See also address mapping. Address Resolution Protocol See ARP. address translation gateway See ATG. adjacency Relationship formed between selected neighboring routers and end nodes for the purpose of exchanging routing information. Adjacency is based upon the use of a common media segment. adjacent nodes 1) In SNA, nodes that are connected to a given node with no intervening nodes. 2) In DECnet and OSI, nodes that share a common network segment (in Ethernet, FDDI, or Token Ring networks). administrative distance A rating of the trustworthiness of a routing information source. In Cisco routers, administrative distance is expressed as a numerical value between 0 and 255. The higher the value, the lower the trustworthiness rating. admission control See traffic policing. ADPCM adaptive differential pulse code modulation. Process by which analog voice samples are encoded into high-quality digital signals. ADSU ATM DSU. Terminal adapter used to access an ATM network via an HSSI-compatible device. See also DSU. Advanced Communications Function See ACF. A - 5 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. Advanced Communications Function/Network Control Program See ACF/NCP. Advanced Data Communications Control Protocol See ADCCP. Advanced Peer-to-Peer Networking See APPN. Advanced Program-to-Program Communication See APPC. Advanced Research Projects Agency See ARPA. Advanced Research Projects Agency Network See ARPANET. advertising Router process in which routing or service updates are sent at specified intervals so that other routers on the network can maintain lists of usable routes. AEP AppleTalk Echo Protocol. Used to test connectivity between two AppleTalk nodes. One node sends a packet to another node and receives a duplicate, or echo, of that packet. agent 1) Generally, software that processes queries and returns replies on behalf of an application. 2) In NMSs, process that resides in all managed devices and reports the values of specified variables to management stations. 3) In Cisco hardware architecture, an individual processor card that provides one or more media interfaces. AGS+ Multiprotocol, high-end Cisco router optimized for large corporate internetworks. The AGS+ runs the Cisco IOS software and features a modular approach that provides for easy and efficient scalability. AIP ATM Interface Processor. ATM network interface for Cisco 7000 series routers designed to minimize performance bottlenecks at the UNI. The AIP supports AAL3/4 and AAL5. See also AAL3/4, AAL5, and Cisco 7000. AIS alarm indication signal. In a T1 transmission, an all-ones signal transmitted in lieu of the normal signal to maintain transmission continuity and to indicate to the receiving terminal that there is a transmission fault that is located either at, or upstream from, the transmitting terminal. See also T1. alarm Message notifying an operator or administrator of a network problem. See also event and trap. alarm indication signal See AIS. A - 6 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. a-law The ITU-T companding standard used in the conversion between analog and digital signals in PCM systems. A-law is used primarily in European telephone networks and is similar to the North American mu-law standard. See also companding and mu-law. algorithm Well-defined rule or process for arriving at a solution to a problem. In networking, algorithms are commonly used to determine the best route for traffic from a particular source to a particular destination. alias See entity. alignment error In IEEE 802.3 networks, an error that occurs when the total number of bits of a received frame is not divisible by eight. Alignment errors are usually caused by frame damage due to collisions. allowed cell rate See ACR. all-rings explorer packet See all-routes explorer packet. all-routes explorer packet Explorer packet that traverses an entire SRB network, following all possible paths to a specific destination. Sometimes called all-rings explorer packet. See also explorer packet, local explorer packet, and spanning explorer packet. alternate mark inversion See AMI. AM amplitude modulation. Modulation technique whereby information is conveyed through the amplitude of the carrier signal. Compare with FM and PAM. See also modulation. American National Standards Institute See ANSI. American Standard Code for Information Interchange See ASCII. AMI alternate mark inversion. Line-code type used on T1 and E1 circuits. In AMI, zeros are represented by 01 during each bit cell, and ones are represented by 11 or 00, alternately, during each bit cell. AMI requires that the sending device maintain ones density. Ones density is not maintained independent of the data stream. Sometimes called binary coded alternate mark inversion. Compare with B8ZS. See also ones density. amplitude Maximum value of an analog or a digital waveform. amplitude modulation See AM. analog transmission Signal transmission over wires or through the air in which information is conveyed through variation of some combination of signal amplitude, frequency, and phase. A - 7 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. ANSI American National Standards Institute. Voluntary organization comprised of corporate, government, and other members that coordinates standards-related activities, approves U.S. national standards, and develops positions for the United States in international standards organizations. ANSI helps develop international and U.S. standards relating to, among other things, communications and networking. ANSI is a member of the IEC and the ISO. See also IEC and ISO. ANSI X3T9.5 See X3T9.5. APaRT Automated packet recognition/translation. Technology that allows a server to be attached to CDDI or FDDI without requiring the reconfiguration of applications or network protocols. APaRT recognizes specific data link layer encapsulation packet types and, when these packet types are transferred from one medium to another, translates them into the native format of the destination device. API application programming interface. Specification of function-call conventions that defines an interface to a service. Apollo Domain Proprietary network protocol suite developed by Apollo Computer for communication on proprietary Apollo networks. APPC Advanced Program-to-Program Communication. IBM SNA system software that allows high-speed communication between programs on different computers in a distributed computing environment. APPC establishes and tears down connections between communicating programs, and consists of two interfaces, a programming interface and a data-exchange interface. The former replies to requests from programs requiring communication; the latter establishes sessions between programs. APPC runs on LU 6.2 devices. See also LU 6.2. AppleTalk Series of communications protocols designed by Apple Computer. Two phases currently exist. Phase 1, the earlier version, supports a single physical network that can have only one network number and be in one zone. Phase 2, the more recent version, supports multiple logical networks on a single physical network and allows networks to be in more than one zone. See also zone. AppleTalk Address Resolution Protocol See AARP. AppleTalk Echo Protocol See AEP. AppleTalk Remote Access See ARA. AppleTalk Transaction Protocol See ATP. AppleTalk Update-Based Routing Protocol See AURP. AppleTalk zone See zone. A - 8 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. application layer Layer 7 of the OSI reference model. This layer provides services to application processes (such as electronic mail, file transfer, and terminal emulation) that are outside of the OSI model. The application layer identifies and establishes the availability of intended communication partners (and the resources required to connect with them), synchronizes cooperating applications, and establishes agreement on procedures for error recovery and control of data integrity. Corresponds roughly with the transaction services layer in the SNA model. See also data link layer, network layer, physical layer, presentation layer, session layer, and transport layer. application programming interface See API. applique Mounting plate, used primarily in the Cisco AGS+, MGS, and CGS chassis, containing connector hardware allowing attachment to the network. Appliques translate communication signals from a network interface into the signals expected by the communication standard being used (such as EIA/TIA-232 or V.35). See also fantail. APPN Advanced Peer-to-Peer Networking. Enhancement to the original IBM SNA architecture. APPN handles session establishment between peer nodes, dynamic transparent route calculation, and traffic prioritization for APPC traffic. Compare with APPN+. See also APPC. APPN+ Next-generation APPN that replaces the label-swapping routing algorithm with source routing. Also called high-performance routing. See also APPN. ARA AppleTalk Remote Access. Protocol that provides Macintosh users direct access to information and resources at a remote AppleTalk site. ARCnet Attached Resource Computer Network. A 2.5-Mbps token-bus LAN developed in the late 1970s and early 1980s by Datapoint Corporation. area Logical set of network segments (either CLNS-, DECnet-, or OSPF-based) and their attached devices. Areas are usually connected to other areas via routers, making up a single autonomous system. See also autonomous system. area border router See ABR. ARM asynchronous response mode. HDLC communication mode involving one primary station and at least one secondary station, where either the primary or one of the secondary stations can initiate transmissions. See also primary station and secondary station. ARP Address Resolution Protocol. Internet protocol used to map an IP address to a MAC address. Defined in RFC 826. Compare with RARP. See also proxy ARP. A - 9 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. ARPA Advanced Research Projects Agency. Research and development organization that is part of DoD. ARPA is responsible for numerous technological advances in communications and networking. ARPA evolved into DARPA, and then back into ARPA again (in 1994). See also DARPA. ARPANET Advanced Research Projects Agency Network. Landmark packet-switching network established in 1969. ARPANET was developed in the 1970s by BBN and funded by ARPA (and later DARPA). It eventually evolved into the Internet. The term ARPANET was officially retired in 1990. See also ARPA, BBN, DARPA, and Internet. ARQ automatic repeat request. Communication technique in which the receiving device detects errors and requests retransmissions. AS See autonomous system. ASBR autonomous system boundary router. ABR located between an OSPF autonomous system and a non-OSPF network. ASBRs run both OSPF and another routing protocol, such as RIP. ASBRs must reside in a nonstub OSPF area. See also ABR, non-stub area, and OSPF. ASCII American Standard Code for Information Interchange. 8-bit code for character representation (7 bits plus parity). ASM-CS Cisco multiprotocol communication server designed to connect asynchronous devices to any LAN or WAN using TCP/IP, LAT, or SLIP. It can be configured to interface with Ethernet or Token Ring LANs or synchronous serial networks. ASN.1 Abstract Syntax Notation One. OSI language for describing data types independent of particular computer structures and representation techniques. Described by ISO International Standard 8824. See also BER (basic encoding rules). association control service element See ACSE. associative memory Memory that is accessed based on its contents, not on its memory address. Sometimes called content addressable memory (CAM). AST automatic spanning tree. Function that supports the automatic resolution of spanning trees in SRB networks, providing a single path for spanning explorer frames to traverse from a given node in the network to another. AST is based on the IEEE 802.1 standard. See IEEE 802.1 and SRB. ASTA Advanced Software Technology and Algorithms. Component of the HPCC program intended to develop software and algorithms for implementation on high-performance computer and communications systems. See also HPCC. A - 10 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. Asynchronous Balanced Mode See ABM. asynchronous response mode See ARM. asynchronous time-division multiplexing See ATDM. Asynchronous Transfer Mode See ATM. asynchronous transmission Term describing digital signals that are transmitted without precise clocking. Such signals generally have different frequencies and phase relationships. Asynchronous transmissions usually encapsulate individual characters in control bits (called start and stop bits) that designate the beginning and end of each character. Compare with isochronous transmission, plesiochronous transmission, and synchronous transmission. ATDM asynchronous time-division multiplexing. Method of sending information that resembles normal TDM, except that time slots are allocated as needed rather than preassigned to specific transmitters. Compare with FDM, statistical multiplexing, and TDM. ATG address translation gateway. Cisco DECnet routing software function that allows a router to route multiple, independent DECnet networks and to establish a user-specified address translation for selected nodes between networks. ATM Asynchronous Transfer Mode. International standard for cell relay in which multiple service types (such as voice, video, or data) are conveyed in fixed-length (53-byte) cells. Fixed-length cells allow cell processing to occur in hardware, thereby reducing transit delays. ATM is designed to take advantage of high-speed transmission media such as E3, SONET, and T3. ATM adaptation layer See AAL. ATM adaptation Layer 1 See AAL1. ATM adaptation Layer 2 See AAL2. ATM adaptation Layer 3/4 See AAL3/4. ATM adaptation Layer 5 See AAL5. ATM data service unit See ADSU. ATM Forum International organization jointly founded in 1991 by Cisco Systems, NET/ADAPTIVE, Northern Telecom, and Sprint that develops and promotes standards-based implementation agreements for ATM technology. The ATM Forum expands on official standards developed by ANSI and ITU-T, and develops implementation agreements in advance of official standards. ATM interface processor See AIP. A - 11 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. ATM layer Service-independent sublayer of the data link layer in an ATM network. The ATM layer receives the 48-byte payload segments from the AAL and attaches a 5-byte header to each, producing standard 53-byte ATM cells. These cells are passed to the physical layer for transmission across the physical medium. See also AAL. ATMM ATM management. Process that runs on an ATM switch that controls VCI translation and rate enforcement. See also ATM and VCI. ATM management See ATMM. ATM UNI See UNI. ATM user-user connection Connection created by the ATM layer to provide communication between two or more ATM service users, such as ATMM processes. Such communication can be unidirectional, using one VCC, or bidirectional, using two VCCs. See also ATM layer, ATMM, and VCC. ATP AppleTalk Transaction Protocol. Transport-level protocol that allows reliable request-response exchanges between two socket clients. Attached Resource Computer Network See ARCnet. attachment unit interface See AUI. attenuation Loss of communication signal energy. attribute Configuration data that defines the characteristics of database objects such as the chassis, cards, ports, or virtual circuits of a particular device. Attributes might be preset or userconfigurable. On a LightStream 2020 ATM switch, attributes are set using the configuration program or CLI commands. AUI attachment unit interface. IEEE 802.3 interface between an MAU and a NIC (network interface card). The term AUI can also refer to the rear panel port to which an AUI cable might attach, such as those found on a Cisco LightStream Ethernet access card. Also called transceiver cable. See also IEEE 802.3, MAU, and NIC (network interface card). AURP AppleTalk Update-Based Routing Protocol. Method of encapsulating AppleTalk traffic in the header of a foreign protocol, allowing the connection of two or more discontiguous AppleTalk internetworks through a foreign network (such as TCP/IP) to form an AppleTalk WAN. This connection is called an AURP tunnel. In addition to its encapsulation function, AURP maintains routing tables for the entire AppleTalk WAN by exchanging routing information between exterior routers. See also AURP tunnel and exterior router. A - 12 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. AURP tunnel Connection created in an AURP WAN that functions as a single, virtual data link between AppleTalk internetworks physically separated by a foreign network (a TCP/IP network, for example). See also AURP. authority zone Associated with DNS, an authority zone is a section of the domain-name tree for which one name server is the authority. See also DNS. Automated Packet Recognition/Translation See APaRT. automatic call reconnect Feature permitting automatic call rerouting away from a failed trunk line. automatic repeat request See ARQ. automatic spanning tree See AST. autonomous confederation Group of autonomous systems that rely on their own network reachability and routing information more than they rely on that received from other autonomous systems or confederations. autonomous switching Feature on Cisco routers that provides faster packet processing by allowing the ciscoBus to switch packets independently without interrupting the system processor. autonomous system Collection of networks under a common administration sharing a common routing strategy. Autonomous systems are subdivided by areas. An autonomous system must be assigned a unique 16-bit number by the IANA. Sometimes abbreviated AS. See also area and IANA. autonomous system boundary router See ASBR. autoreconfiguration Process performed by nodes within the failure domain of a Token Ring network. Nodes automatically perform diagnostics in an attempt to reconfigure the network around the failed areas. See also failure domain. available bit rate See ABR. average rate The average rate, in kilobits per second (kbps), at which a given virtual circuit will transmit. B - 13 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. B Term Definition B8ZS binary 8-zero substitution. Line-code type, used on T1 and E1 circuits, in which a special code is substituted whenever 8 consecutive zeros are sent through the link. This code is then interpreted at the remote end of the connection. This technique guarantees ones density independent of the data stream. Sometimes called bipolar 8-zero substitution. Compare with AMI. See also ones density. backbone The part of a network that acts as the primary path for traffic that is most often sourced from, and destined for, other networks. backbone cabling Cabling that provides interconnections between wiring closets, wiring closets and the POP, and between buildings that are part of the same LAN. See vertical cabling. back end Node or software program that provides services to a front end. See also client, front end, and server. backoff The retransmission delay enforced when a collision occurs. backplane Physical connection between an interface processor or card and the data buses and power distribution buses inside a Cisco chassis. back pressure Propagation of network congestion information upstream through an internetwork. backward explicit congestion notification See BECN. backward learning Algorithmic process used for routing traffic that surmises information by assuming symmetrical network conditions. For example, if node A receives a packet from node B through intermediate node C, the backward-learning routing algorithm will assume that A can optimally reach B through C. balanced configuration In HDLC, a point-to-point network configuration with two combined stations. balanced, unbalanced See balun. balun balanced, unbalanced. Device used for matching impedance between a balanced and an unbalanced line, usually twistedpair and coaxial cable. bandwidth The difference between the highest and lowest frequencies available for network signals. The term is also used to describe the rated throughput capacity of a given network medium or protocol. B - 14 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. bandwidth allocation See bandwidth reservation. bandwidth reservation Process of assigning bandwidth to users and applications served by a network. Involves ssigning priority to different flows of traffic based on how critical and delay-sensitive they are. This makes the best use of available bandwidth, and if the network becomes congested, lower-priority traffic can be dropped. Sometimes called bandwidth allocation. See also call priority. banner motd Command used to configure a message of the day which is displayed at login and is useful for conveying messages that affect all network users, such as impending system shutdowns. Banyan VINES See VINES. BARRNet Bay Area Regional Research Network. Regional network serving the San Francisco Bay Area. The BARRNet backbone is composed of four University of California campuses (Berkeley, Davis, Santa Cruz, and San Francisco), Stanford University, Lawrence Livermore National Laboratory, and NASA Ames Research Center. BARRNET is now part of BBN Planet. See also BBN Planet. baseband Characteristic of a network technology where only one carrier frequency is used. Ethernet is an example of a baseband network. Also called narrowband. Contrast with broadband. bash Bourne-again shell. Interactive UNIX shell based on the traditional Bourne shell, but with increased functionality. The LynxOS bash shell is presented when you log in to a LightStream 2020 ATM switch as root (bash#) or fldsup (bash$). See also fldsup account and root account. basic configuration The minimal configuration information entered when a new router, switch, or other configurable network device is installed on a network. The basic configuration for a LightStream 2020 ATM switch, for example, includes IP addresses, the date, and parameters for at least one trunk line. The basic configuration enables the device to receive a full configuration from the NMS. basic encoding rules See BER. Basic Rate Interface See BRI. Basic Research and Human Resources See BRHR. baud Unit of signaling speed equal to the number of discrete signal elements transmitted per second. Baud is synonymous with bits per second (bps), if each signal element represents exactly 1 bit. Bay Area Regional Research Network See BARRNet. B - 15 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. BBN Bolt, Beranek, and Newman, Inc. High-technology company located in Massachusetts that developed and maintained the ARPANET (and later, the Internet) core gateway system. See also BBN Planet. BBN Planet Subsidiary company of BBN that operates a nationwide Internet access network composed in part by the former regional networks BARRNET, NEARNET, and SURAnet. See also BARRNet, BBN, NEARNET, and SURAnet. Bc committed burst. Negotiated tariff metric in Frame Relay internetworks. The maximum amount of data (in bits) that a Frame Relay internetwork is committed to accept and transmit at the CIR. See also Be and CIR. B channel bearer channel. In ISDN, a full-duplex, 64-kbps channel used to send user data. Compare to D channel, E channel, and H channel. Be excess burst. Negotiated tariff metric in Frame Relay internetworks. The number of bits that a Frame Relay internetwork will attempt to transmit after Bc is accommodated. Be data is, in general, delivered with a lower probability than Bc data because Be data can be marked as DE by the network. See also Bc and DE. beacon Frame from a Token Ring or FDDI device indicating a serious problem with the ring, such as a broken cable. A beacon frame contains the address of the station assumed to be down. See also failure domain. bearer channel See B channel. Because It's Time Network See BITNET. BECN backward explicit congestion notification. Bit set by a Frame Relay network in frames traveling in the opposite direction of frames encountering a congested path. DTE receiving frames with the BECN bit set can request that higher-level protocols take flow control action as appropriate. Compare with FECN. Bell Communications Research See Bellcore. Bellcore Bell Communications Research. Organization that performs research and development on behalf of the RBOCs. Bellman-Ford routing algorithm See distance vector routing algorithm. Bell operating company See BOC. BER 1) bit error rate. The ratio of received bits that contain errors. 2) basic encoding rules. Rules for encoding data units described in the ISO ASN.1 standard. See also ASN.1. B - 16 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. Berkeley Standard Distribution See BSD. BERT bit error rate tester. Device that determines the BER on a given communications channel. See also BER (bit error rate). best-effort delivery Describes a network system that does not use a sophisticated acknowledgment system to guarantee reliable delivery of information. BGP Border Gateway Protocol. Interdomain routing protocol that replaces EGP. BGP exchanges reachability information with other BGP systems. It is defined by RFC 1163. See also BGP4 and EGP. BGP4 BGP Version 4. Version 4 of the predominant interdomain routing protocol used on the Internet. BGP4 supports CIDR and uses route aggregation mechanisms to reduce the size of routing tables. See also BGP and CIDR. BIGA Bus Interface Gate Array. Technology that allows the Catalyst 5000 to receive and transmit frames from its packet-switching memory to its MAC local buffer memory without the intervention of the host processor. big-endian Method of storing or transmitting data in which the most significant bit or byte is presented first. Compare with littleendian. binary A numbering system characterized by ones and zeros (1 = on, 0 = off). binary 8-zero substitution See B8ZS. binary coded alternate mark inversion See AMI. binary synchronous communication See BSC. biphase coding Bipolar coding scheme originally developed for use in Ethernet. Clocking information is embedded into and recovered from the synchronous data stream without the need for separate clocking leads. The biphase signal contains no direct current energy. bipolar Electrical characteristic denoting a circuit with both negative and positive polarity. Contrast with unipolar. bipolar 8-zero substitution See B8ZS. BISDN Broadband ISDN. ITU-T communication standards designed to handle high-bandwidth applications such as video. BISDN currently uses ATM technology over SONET-based transmission circuits to provide data rates from 155 to 622 Mbps and beyond. Contrast with N-ISDN. See also BRI, ISDN, and PRI. B - 17 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. bisync See BSC. bit Binary digit used in the binary numbering system. Can be 0 or 1. bit error rate See BER. bit error rate tester See BERT. BERT "Because It's Time" Networking Services. Low-cost, low-speed academic network consisting primarily of IBM mainframes and 9600-bps leased lines. BITNET is now part of CREN. See also CREN. BITNET III Dial-up service providing connectivity for members of CREN. See also CREN. bit-oriented protocol Class of data link layer communication protocols that can transmit frames regardless of frame content. Compared with byte-oriented protocols, bit-oriented protocols provide fullduplex operation and are more efficient and reliable. Compare with byte-oriented protocol. bit rate Speed at which bits are transmitted, usually expressed in bits per second (bps). bits per second Abbreviated bps. black hole Routing term for an area of the internetwork where packets enter, but do not emerge, due to adverse conditions or poor system configuration within a portion of the network. blocking In a switching system, a condition in which no paths are available to complete a circuit. The term is also used to describe a situation in which one activity cannot begin until another has been completed. block multiplexer channel IBM-style channel that implements the FIPS-60 channel, a U.S. channel standard. This channel is also referred to as OEMI channel and 370 block mux channel. blower Internal cooling fan used in larger router and switch chassis such as the Cisco AGS+, the Cisco 7000, and the LightStream 2020. BNC connector Short for British Naval Connector or Bayonet Nut Connector or Bayonet Neill Concelman, a type of connector used with coaxial cables such as the RG-58 A/U cable used with the 10BASE2 Ethernet system. The basic BNC connector is a male type mounted at each end of a cable. This connector has a center pin connected to the center cable conductor and a metal tube connected to the outer cable shield. A rotating ring outside the tube locks the cable to any female connector. B - 18 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. BNN boundary network node. In SNA terminology, a subarea node that provides boundary function support for adjacent peripheral nodes. This support includes sequencing, pacing, and address translation. Also called boundary node. BOC Bell operating company. See RBOC. Bolt, Beranek, and Newman, Inc. See BBN. BOOTP Protocol used by a network node to determine the IP address of its Ethernet interfaces, in order to affect network booting. boot programmable read-only memory See boot PROM. boot PROM boot programmable read-only memory. Chip mounted on a printed circuit board used to provide executable boot instructions to a computer device. border gateway Router that communicates with routers in other autonomous systems. Border Gateway Protocol See BGP. boundary function Capability of SNA subarea nodes to provide protocol support for attached peripheral nodes. Typically found in IBM 3745 devices. boundary network node See BNN. boundary node See BNN. Bpdu Bridge Protocol Data Unit. Spanning-Tree Protocol hello packet that is sent out at configurable intervals to exchange information among bridges in the network. See also PDU. bps bits per second. BRHR Basic Research and Human Resources. Component of the HPCC program designed to support research, training, and education in computer science, computer engineering, and computational science. See also HPCC. BRI Basic Rate Interface. ISDN interface composed of two B channels and one D channel for circuit-switched communication of voice, video, and data. Compare with PRI. See also BISDN, ISDN, and N-ISDN. bridge Device that connects and passes packets between two network segments that use the same communications protocol. Bridges operate at the data link layer (layer 2) of the OSI reference model. In general, a bridge will filter, forward, or flood an incoming frame based on the MAC address of that frame. See also relay. B - 19 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. bridge forwarding Process that uses entries in a filtering database to determine whether frames with a given MAC destination address can be forwarded to a given port or ports. Described in the IEEE 802.1 standard. See also IEEE 802.1. bridge group Cisco bridging feature that assigns network interfaces to a particular spanning-tree group. Bridge groups can be compatible with the IEEE 802.1 or the DEC specification. bridge number Number that identifies each bridge in an SRB LAN. Parallel bridges must have different bridge numbers. bridge protocol data unit See BPDU. bridge static filtering Process in which a bridge maintains a filtering database consisting of static entries. Each static entry equates a MAC destination address with a port that can receive frames with this MAC destination address and a set of ports on which the frames can be transmitted. Defined in the IEEE 802.1 standard. See also IEEE 802.1. broadband Transmission system that multiplexes multiple independent signals onto one cable. In telecommunications terminology, any channel having a bandwidth greater than a voice-grade channel (4 kHz). In LAN terminology, a coaxial cable on which analog signaling is used. Also called wideband. Contrast with baseband. Broadband ISDN See BISDN. broadcast Data packet that will be sent to all nodes on a network. Broadcasts are identified by a broadcast address. Compare with multicast and unicast. See also broadcast address. broadcast address Special address reserved for sending a message to all stations. Generally, a broadcast address is a MAC destination address of all ones. Compare with multicast address and unicast address. See also broadcast. broadcast and unknown server See BUS. broadcast domain The set of all devices that will receive broadcast frames originating from any device within the set. Broadcast domains are typically bounded by routers because routers do not forward broadcast frames. broadcast search Propagation of a search request to all network nodes if the location of a resource is unknown to the requester. See also directed search. broadcast storm Undesirable network event in which many broadcasts are sent simultaneously across all network segments. A broadcast storm uses substantial network bandwidth and, typically, causes network time-outs. B - 20 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. browser See WWW browser. BSC binary synchronous communication. Character-oriented data link layer protocol for half-duplex applications. Often referred to simply as bisync. BSD Berkeley Standard Distribution. Term used to describe any of a variety of UNIX-type operating systems based on the UC Berkeley BSD operating system. BT burst tolerance. Parameter defined by the ATM Forum for ATM traffic management. For VBR connections, BT determines the size of the maximum burst of contiguous cells that can be transmitted. See also VBR. buffer Storage area used for handling data in transit. Buffers are used in internetworking to compensate for differences in processing speed between network devices. Bursts of data can be stored in buffers until they can be handled by slower processing devices. Sometimes referred to as a packet buffer. burst tolerance See BT. BUS broadcast and unknown server. Multicast server used in ELANs that is used to flood traffic addressed to an unknown destination, and to forward multicast and broadcast traffic to the appropriate clients. See also ELAN. bus 1) Common physical signal path composed of wires or other media across which signals can be sent from one part of a computer to another. Sometimes called highway. 2) See bus topology. bus and tag channel IBM channel, developed in the 1960s, incorporating copper multiwire technology. Replaced by the ESCON channel. See also ESCON channel and parallel channel. Bus Interface Gate Array See BIGA. bus topology Linear LAN architecture in which transmissions from network stations propagate the length of the medium and are received by all other stations. Compare with ring topology, star topology, and tree topology. bypass mode Operating mode on FDDI and Token Ring networks in which an interface has been removed from the ring. bypass relay Allows a particular Token Ring interface to be shut down and thus effectively removed from the ring. byte Term used to refer to a series of consecutive binary digits that are operated upon as a unit (for example, an 8-bit byte). B - 21 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. byte-oriented protocol Class of data-link communications protocols that use a specific character from the user character set to delimit frames. These protocols have largely been replaced by bit-oriented protocols. Compare with bit-oriented protocol. byte reversal Process of storing numeric data with the least-significant byte first. Used for integers and addresses on devices with Intel microprocessors. C - 22 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. C Term Definition CA See congestion avoidance. cable Transmission medium of copper wire or optical fiber wrapped in a protective cover. cable range Range of network numbers that is valid for use by nodes on an extended AppleTalk network. The cable range value can be a single network number or a contiguous sequence of several network numbers. Node addresses are assigned based on the cable range value. cable television See CATV. California Education and Research Federation Network See CERFnet. call admission control Traffic management mechanism used in ATM networks that determines whether the network can offer a path with sufficient bandwidth for a requested VCC. call priority Priority assigned to each origination port in circuit-switched systems. This priority defines the order in which calls are reconnected. Call priority also defines which calls can or cannot be placed during a bandwidth reservation. See also bandwidth reservation. call setup time The time required to establish a switched call between DTE devices. CAM content-addressable memory. See associative memory. Canadian Standards Association See CSA. carrier Electromagnetic wave or alternating current of a single frequency, suitable for modulation by another, data-bearing signal. See also modulation. Carrier Detect See CD. carrier sense multiple access collision detect See CSMA/CD. Catalyst 1600 Token Ring Switch Cisco Token Ring switch that offers full-duplex dedicated LAN segments to individual servers and other workstations that require high-speed switching access. The Catalyst 1600 provides up to 12 switched Token Ring interfaces and low latency switching between servers and clients across a backbone. C - 23 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. Catalyst 5000 Cisco modular switching system that allows connection to Ethernet, CDDI, FDDI, and ATM LANs and backbones. The Catalyst 5000 switch performs store-and-forward packet switching and allows the user to dedicate 10- or 100-Mbps connections to existing LAN segments or high-performance end stations. Catalyst Workgroup Switch Series of Cisco workgroup switches that enhance the network performance of Ethernet client/server workgroups. The Catalyst Workgroup Switch integrates software enhancements for network management and provides a 100-Mbps interface to servers and dedicated Ethernet-to-desktop workstations. Catchment areas Zone that falls within area that can be served by an internetworking device such as a hub. Category 1 cabling One of five grades of UTP cabling described in the EIA/TIA568B standard. Category 1 cabling is used for telephone communications and is not suitable for transmitting data. Compare with Category 2 cabling, Category 3 cabling, Category 4 cabling, and Category 5 cabling. See also EIA/TIA568B and UTP. Category 2 cabling One of five grades of UTP cabling described in the EIA/TIA568B standard. Category 2 cabling is capable of transmitting data at speeds up to 4 Mbps. Compare with Category 1 cabling, Category 3 cabling, Category 4 cabling, and Category 5 cabling. See also EIA/TIA-568B and UTP. Category 3 cabling One of five grades of UTP cabling described in the EIA/TIA568B standard. Category 3 cabling is used in 10BASE-T networks and can transmit data at speeds up to 10 Mbps. Compare with Category 1 cabling, Category 2 cabling, Category 4 cabling, and Category 5 cabling. See also EIA/TIA568B and UTP. Category 4 cabling One of five grades of UTP cabling described in the EIA/TIA568B standard. Category 4 cabling is used in Token Ring networks and can transmit data at speeds up to 16 Mbps. Compare with Category 1 cabling, Category 2 cabling, Category 3 cabling, and Category 5 cabling. See also EIA/TIA568B and UTP. Category 5 cabling One of five grades of UTP cabling described in the EIA/TIA568B standard. Category 5 cabling is used for running CDDI and can transmit data at speeds up to 100 Mbps. Compare with Category 1 cabling, Category 2 cabling, Category 3 cabling, and Category 4 cabling. See also EIA/TIA-568B and UTP. catenet Network in which hosts are connected to diverse networks, which themselves are connected with routers. The Internet is a prominent example of a catenet. C - 24 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. CATV cable television. Communication system where multiple channels of programming material are transmitted to homes using broadband coaxial cable. Formerly called Community Antenna Television. CBDS Connectionless Broadband Data Service. European highspeed, packet-switched, datagram-based WAN networking technology. Similar to SMDS. See also SMDS. CBR constant bit rate. QOS class defined by the ATM Forum for ATM networks. CBR is used for connections that depend on precise clocking to ensure undistorted delivery. Compare with ABR (available bit rate), UBR, and VBR. CCITT Consultative Committee for International Telegraph and Telephone. International organization responsible for the development of communications standards. Now called the ITU-T. See ITU-T. CCS common channel signaling. Signaling system used in telephone networks that separates signaling information from user data. A specified channel is exclusively designated to carry signaling information for all other channels in the system. See also SS7. CD Carrier Detect. Signal that indicates whether an interface is active. Also, a signal generated by a modem indicating that a call has been connected. CDDI Copper Distributed Data Interface. Implementation of FDDI protocols over STP and UTP cabling. CDDI transmits over relatively short distances (about 100 meters), providing data rates of 100 Mbps using a dual-ring architecture to provide redundancy. Based on the ANSI Twisted-Pair Physical Medium Dependent (TPPMD) standard. Compare with FDDI. CDDI/FDDI workgroup concentrator See Cisco Workgroup Concentrator. CDP Cisco Discovery Protocol. Media- and protocol-independent device-discovery protocol that runs on all Cisco-manufactured equipment including routers, access servers, bridges, and switches. Using CDP, a device can advertise its existence to other devices and receive information about other devices on the same LAN or on the remote side of a WAN. Runs on all media that support SNAP, including LANs, Frame Relay, and ATM media. CDPCP Cisco Discovery Protocol Control Protocol may be negotiated during NCP, though this is not common. C - 25 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. CDPD Cellular Digital Packet Data. Open standard for two-way wireless data communication over high-frequency cellular telephone channels. Allows data transmissions between a remote cellular link and a NAP. Operates at 19.2 Kbps. CDVT cell delay variation tolerance. Parameter defined by the ATM Forum for ATM traffic management. In CBR transmissions, determines the level of jitter that is tolerable for the data samples taken by the PCR. See also CBR and PCR. cell The basic unit for ATM switching and multiplexing. Cells contain identifiers that specify the data stream to which they belong. Each cell consists of a 5-byte header and 48 bytes of payload. See also cell relay. cell delay variation tolerance See CDVT. cell line card See CLC. cell loss priority See CLP. cell payload scrambling Technique used on the LightStream 2020 ATM switch to maintain framing on some medium-speed edge and trunk interfaces. cell relay Network technology based on the use of small, fixed-size packets, or cells. Because cells are fixed-length, they can be processed and switched in hardware at high speeds. Cell relay is the basis for many high-speed network protocols including ATM, IEEE 802.6, and SMDS. See also cell. cells per second Abbreviated cps. Cellular Digital Packet Data See CDPD. cellular radio Technology that uses radio transmissions to access telephonecompany networks. Service is provided in a particular area by a low-power transmitter. CEMAC circuit emulation access card.T1 or E1 circuit emulation card in the LightStream 2020 ATM switch. See also access card. central office See CO. Centrex AT&T PBX that provides direct inward dialing and automatic number identification of the calling PBX. CEPT Conférence Européenne des Postes et des Télécommunications. Association of the 26 European PTTs that recommends communication specifications to the ITU-T. C - 26 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. CERFnet California Education and Research Federation Network. TCP/IP network, based in Southern California, that connects hundreds of higher-education centers internationally while also providing Internet access to subscribers. CERFnet was founded in 1988 by the San Diego Supercomputer Center and General Atomics and is funded by the NSF. CFRAD See Cisco FRAD. CGS Compact Gateway Server. Cisco midrange multiprotocol router designed for medium to small regional and district environments. The CGS is a 2-slot router that supports up to four interfaces (all of the same type). chaining SNA concept in which RUs are grouped together for the purpose of error recovery. Challenge Handshake Authentication Protocol See CHAP. channel 1) A communication path. Multiple channels can be multiplexed over a single cable in certain environments. 2) In IBM, the specific path between large computers (such as mainframes) and attached peripheral devices. channel-attached Pertaining to attachment of devices directly by data channels (input/output channels) to a computer. Channel Interface Processor See CIP. channelized E1 Access link operating at 2.048 Mbps that is subdivided into 30 B-channels and 1 D-channel. Supports DDR, Frame Relay, and X.25. Compare with channelized T1. channelized T1 Access link operating at 1.544 Mbps that is subdivided into 24 channels (23 B-channels and 1 D-channel) of 64 Kbps each. The individual channels or groups of channels connect to different destinations. Supports DDR, Frame Relay, and X.25. Also referred to as fractional T1. Compare with channelized E1. channel service unit See CSU. CHAP Challenge Handshake Authentication Protocol. Security feature supported on lines using PPP encapsulation that prevents unauthorized access. CHAP does not itself prevent unauthorized access, it merely identifies the remote end. The router or access server then determines whether that user is allowed access. Compare to PAP. chat script String of text that defines the login "conversation" that occurs between two systems. Consists of expect-send pairs that define the string that the local system expects to receive from the remote system and what the local system should send as a reply. C - 27 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. Cheapernet Industry term used to refer to the IEEE 802.3 10BASE2 standard or the cable specified in that standard. Compare with Thinnet. See also 10BASE2, Ethernet, and IEEE 802.3. checksum 1) Method for checking the integrity of transmitted data. A checksum is an integer value computed from a sequence of octets taken through a series of arithmetic operations. The value is recomputed at the receiving end and compared for verification. 2) Calculated checksum of the header and data fields. choke packet Packet sent to a transmitter to tell it that congestion exists and that it should reduce its sending rate. CIA See classical IP over ATM. CICNet Regional network that connects academic, research, nonprofit, and commercial organizations in the Midwestern United States. Founded in 1988, CICNet was a part of the NSFNET and was funded by the NSF until the NSFNET dissolved in 1995. See also NSFNET. CICS Customer Information Control System. IBM application subsystem allowing transactions entered at remote terminals to be processed concurrently by user applications. CIDR classless interdomain routing. Technique supported by BGP4 and based on route aggregation. CIDR allows routers to group routes together in order to cut down on the quantity of routing information carried by the core routers. With CIDR, several IP networks appear to networks outside the group as a single, larger entity. See also BGP4. CIO Cisco Information Online. Online service available to Cisco customers that provides electronic services and online information relating to Cisco products. CIO services include product information, software updates, release notes, technical tips, configuration notes, brochures, and download offerings. CIP Channel Interface Processor. Channel attachment interface for Cisco 7000 series routers. The CIP is used to connect a host mainframe to a control unit, eliminating the need for an FEP for channel attachment. CIR committed information rate. The rate at which a Frame Relay network agrees to transfer information under normal conditions, averaged over a minimum increment of time. CIR, measured in bits per second, is one of the key negotiated tariff metrics. See also Bc. circuit Communications path between two or more points. C - 28 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. circuit emulation access card See CEMAC. circuit group Grouping of associated serial lines that link two bridges. If one of the serial links in a circuit group is in the spanning tree for a network, any of the serial links in the circuit group can be used for load balancing. This load-balancing strategy avoids data ordering problems by assigning each destination address to a particular serial link. circuit switching Switching system in which a dedicated physical circuit path must exist between sender and receiver for the duration of the "call." Used heavily in the telephone company network. Circuit switching can be contrasted with contention and token passing as a channel-access method, and with message switching and packet switching as a switching technique. Cisco 1000 Any of the Cisco 1000 series LAN Extenders and routers. The Cisco 1000 series are easy-to-install, inexpensive, multiprotocol access products designed for small offices and other remote sites. The Cisco 1000 series includes an ISDN router, an asynchronous router, and LAN extenders. See also LAN Extender. Cisco 2500 Any of the Cisco 2500 series routers and access servers, including single LAN routers; mission-specific, low-end routers; router/hub combinations; access servers; and dual LAN routers. The Cisco 2500 is designed for small offices and other remote sites and runs the Cisco IOS software. Sometimes called the Cisco Access Server 2500 series. Cisco 4000 Any of the Cisco 4000 series routers designed for a wide variety of network computing environments. The Cisco 4000 series routers run the Cisco IOS software and can be optimized for particular environments with custom configurations. Cisco 5100 Cisco data communications platform that combines the functions of a Cisco access server with analog and digital modems, CSUs, and T1 channel banks. The Cisco 5100 is optimized for high-speed modem access and is well-suited for dial-up applications, including host access, electronic mail, file transfer, and dial-in access to a LAN. Also known as the Cisco Access Server 5100. Cisco 7000 Any of the Cisco 7000 series of routers (the Cisco 7000 or the Cisco 7010), a high-end router platform that supports a wide range of network interfaces and media types and is designed for use in enterprise networks. Cisco 7000 series routers run the Cisco IOS software and support online software reconfiguration, OIR, fast boot, environmental monitoring, selfdiagnostics, redundant power supplies, and Flash memory. C - 29 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. Cisco 7500 Any of the Cisco 7500 series of routers, a high-end multiprotocol router platform designed for use in enterprise networks. Cisco 7500 series routers run the Cisco IOS software and implement a distributed multiprocessor architecture consisting of the CyBus, the RSP, and the VIP. See also CyBus, RSP, and VIP. Cisco Access Server 2500 See Cisco 2500. Cisco Access Server 5100 See Cisco 5100. ciscoBus controller See SP. Cisco Discovery Protocol See CDP. Cisco Extended Bus See CxBus. Cisco FRAD Cisco Frame Relay access device. Cisco product that supports Cisco IOS Frame Relay SNA services and can be upgraded to be a full-function multiprotocol router. The Cisco FRAD connects SDLC devices to Frame Relay without requiring an existing LAN. However, the Cisco FRAD does support attached LANs and can perform conversion from SDLC to Ethernet and Token Ring. See also FRAD. Cisco Frame Relay access device See Cisco FRAD. CiscoFusion Cisco internetworking architecture that "fuses" together the scalability, stability, and security advantages of the latest routing technologies with the performance benefits of ATM and LAN switching, and the management benefits of VLANs. See also Cisco IOS software. Cisco Information Online See CIO. Cisco Internetwork Operating System software See Cisco IOS software. Cisco IOS software Cisco Internetwork Operating System software. Cisco system software that provides common functionality, scalability, and security for all products under the CiscoFusion architecture. The Cisco IOS software allows centralized, integrated, and automated installation and management of internetworks, while ensuring support for a wide variety of protocols, media, services, and platforms. See also CiscoFusion. Cisco LightStream 100 Cisco LightStream 100 ATM switch. a fully nonblocking ATM switch operating at up to 2.4 Gbps and supporting multiple ATM lines of 155-Mbps data speed as well as a variety of LAN and WAN interfaces. The LightStream 100 switch can serve as part of an ATM workgroup or small campus backbone connecting a number of ATM routers, multilayer LAN switches, and high-performance servers and clients. C - 30 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. Cisco LightStream 2020 Cisco LightStream 2020 Enterprise ATM switch. For campus and wide-area applications. The LightStream 2020 ATM switch supports trunks operating at T1/E1 data rates and provides a migration path through T3/E3 into a SONET/SDH OC-3 trunk. The LightStream 2020 intelligent edge modules support a variety of services including frame forwarding, Frame Relay, ATM UNI, and LAN internetworking. CiscoView GUI-based device-management software application that provides dynamic status, statistics, and comprehensive configuration information for Cisco internetworking devices. In addition to displaying a physical view of Cisco device chassis, CiscoView also provides device monitoring functions and basic troubleshooting capabilities, and can be integrated with several leading SNMP-based network management platforms. Cisco Workgroup Adapter Series of Cisco workgroup adapters that allow workstations to connect to CDDI or FDDI interfaces operating at 100 Mbps. Cisco Workgroup Concentrator Series of Cisco workgroup concentrators that combines the compact form factor of workgroup concentrators with the versatility of modular hubs. Supports from 4 to 32 combinations of CDDI or FDDI ports. CiscoWorks Series of SNMP-based internetwork management software applications. CiscoWorks includes applications for monitoring router and access server status, managing configuration files, and troubleshooting network problems. CiscoWorks applications are integrated on several SNMP-based network management platforms, including SunNet Manager, HP OpenView, and IBM NetView. Class A station See DAS. Class B station See SAS. classical IP over ATM Specification for running IP over ATM in a manner that takes full advantage of the features of ATM. Defined in RFC 1577. Sometimes called CIA. classless interdomain routing See CIDR. class of service See COS. CLAW Common Link Access for Workstations. Data link layer protocol used by channel-attached RISC System/6000 series systems and by IBM 3172 devices running TCP/IP off-load. CLAW improves efficiency of channel use and allows the CIP to provide the functionality of a 3172 in TCP/IP environments and support direct channel attachment. The output from TCP/IP mainframe processing is a series of IP datagrams that the router can switch without modifications. C - 31 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. CLC cell line card. Card on the LightStream 2020 ATM switch that, in conjunction with an access card, supports up to two OC-3c edge ports or one OC-3c trunk port. A CLC can be configured as an edge card or a trunk card. Clear To Send See CTS. CLI Command-line interface. The command-line interface on the LightStream 2020 that runs on NPs and Sun SPARCstations and is used to monitor and control an ATM network. client Node or software program (front-end device) that requests services from a server. See also back end, front end, and server. client-server computing Term used to describe distributed computing (processing) network systems in which transaction responsibilities are divided into two parts: client (front end) and server (back end). Both terms (client and server) can be applied to software programs or actual computing devices. Also called distributed computing (processing). Compare with peer-to-peer computing. See also RPC. CLNP Connectionless Network Protocol. OSI network layer protocol that does not require a circuit to be established before data is transmitted. See also CLNS. CLNS Connectionless Network Service. OSI network layer service that does not require a circuit to be established before data is transmitted. CLNS routes messages to their destinations independently of any other messages. See also CLNP. CLP cell loss priority. Field in the ATM cell header that determines the probability of a cell being dropped if the network becomes congested. Cells with CLP = 0 are insured traffic, which is unlikely to be dropped. Cells with CLP = 1 are best-effort traffic, which might be dropped in congested conditions in order to free up resources to handle insured traffic. cluster controller 1) Generally, an intelligent device that provides the connections for a cluster of terminals to a data link. 2) In SNA, a programmable device that controls the input/output operations of attached devices. Typically, an IBM 3174 or 3274 device. CMI coded mark inversion. ITU-T line coding technique specified for STS-3c transmissions. Also used in DS-1 systems. See also DS-1 and STS-3c. CMIP Common Management Information Protocol. OSI network management protocol created and standardized by ISO for the monitoring and control of heterogeneous networks. See also CMIS. C - 32 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. CMIS Common Management Information Services. OSI network management service interface created and standardized by ISO for the monitoring and control of heterogeneous networks. See also CMIP. CMNS Connection-Mode Network Service. Extends local X.25 switching to a variety of media (Ethernet, FDDI, Token Ring). See also CONP. CMT connection management. FDDI process that handles the transition of the ring through its various states (off, active, connect, and so on), as defined by the ANSI X3T9.5 specification. CO central office. Local telephone company office to which all local loops in a given area connect and in which circuit switching of subscriber lines occurs. coaxial cable Cable consisting of a hollow outer cylindrical conductor that surrounds a single inner wire conductor. Two types of coaxial cable are currently used in LANs: 50-ohm cable, which is used for digital signaling, and 75-ohm cable, which is used for analog signal and high-speed digital signaling. code bits Control functions (such as setup and termination of a session). CODEC coder-decoder. Device that typically uses PCM to transform analog signals into a digital bit stream, and digital signals back into analog. coded mark inversion See CMI. coder-decoder See CODEC. coding Electrical techniques used to convey binary signals. collapsed backbone Nondistributed backbone in which all network segments are interconnected by way of an internetworking device. A collapsed backbone might be a virtual network segment existing in a device such as a hub, a router, or a switch. collision In Ethernet, the result of two nodes transmitting simultaneously. The frames from each device impact and are damaged when they meet on the physical media. See also collision domain. collision detection See CSMA/CD. collision domain In Ethernet, the network area within which frames that have collided are propagated. Repeaters and hubs propagate collisions; LAN switches, bridges and routers do not. See also collision. command-line interface See CLI. C - 33 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. Committed Burst See Bc. committed information rate See CIR. common carrier Licensed, private utility company that supplies communication services to the public at regulated prices. common channel signaling See CCS. Common Link Access for Workstations See CLAW. Common Management Information Protocol See CMIP. Common Management Information Services See CMIS. common mode Term used to describe problems involving either the hot or neutral wires and the safety ground wire on a power line. See normal mode. common part convergence sublayer See CPCS. Common Programming Interface for Communications See CPI-C. common transport semantic See CTS. communication Transmission of information. communication controller In SNA, a subarea node (such as an IBM 3745 device) that contains an NCP. communication server Communications processor that connects asynchronous devices to a LAN or WAN through network and terminal emulation software. Performs only asynchronous routing of IP and IPX. Compare with access server. communications line The physical link (such as wire or a telephone circuit) that connects one or more devices to one or more other devices. community In SNMP, a logical group of managed devices and NMSs in the same administrative domain. Community Antenna Television Now known as CATV. See CATV. community string Text string that acts as a password and is used to authenticate messages sent between a management station and a router containing an SNMP agent. The community string is sent in every packet between the manager and the agent. Compact Gateway Server See CGS. C - 34 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. companding Contraction derived from the opposite processes of compression and expansion. Part of the PCM process whereby analog signal values are logically rounded to discrete scalestep values on a nonlinear scale. The decimal step number is then coded in its binary equivalent prior to transmission. The process is reversed at the receiving terminal using the same nonlinear scale. Compare with compression and expansion. See also a-law and mu-law. complete sequence number PDU See CSNP. Compressed Serial Link Internet Protocol See CSLIP. compression The running of a data set through an algorithm that reduces the space required to store or the bandwidth required to transmit the data set. Compare with companding and expansion. Computer Science Network See CSNET. concentrator See hub. conductor Any material with a low resistance to electrical current. Any material capable of carrying an electrical current. See insulator. Conférence Européenne des Postes et des Télécommunications See CEPT. config-register 0x10f Command used to enter configuration register values. Configuration Builder Cisco software application that lets you create configuration files for multiple routers without knowing the router commandline syntax. Configuration Builder is a Microsoft Windowsbased application that enables you to configure multiple routers simultaneously; automatically detect the model, software version, image type, and the number and type of installed interfaces on the router you are configuring; and quickly import predefined priority queuing lists, access lists, and filters into multiple configuration files. configuration database File of attribute settings created using the Cisco LightStream configurator. A global database holds configuration information for the entire LightStream-based ATM backbone and is stored on the NMS. A local database, stored in each LightStream 2020 ATM switch, contains just the configuration information for that switch. Configuration data includes definitions of chassis, cards, ports, VCs, and the attributes that describe them. See also configurator. C - 35 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. configuration management One of five categories of network management defined by ISO for management of OSI networks. Configuration management subsystems are responsible for detecting and determining the state of a network. See also accounting management, fault management, performance management, and security management. configuration register In Cisco routers, a 16-bit, user-configurable value that determines how the router functions during initialization. The configuration register can be stored in hardware or software. In hardware, the bit position is set using a jumper. In software, the bit position is set by specifying a hexadecimal value using configuration commands. configurator Management tool used with the LightStream 2020 ATM switch that is used to create configuration database files for the nodes in an ATM network. The configurator is an HP OpenViewbased application that runs on an NMS. See also configuration database. configure memory Command used to load configuration information from NVRAM. configure terminal Command used to configure manually from the console terminal. congestion Traffic in excess of network capacity. congestion avoidance The mechanism by which a LightStream-based ATM network controls traffic entering the network to minimize delays. In order to use resources most efficiently, lower-priority traffic is discarded at the edge of the network if conditions indicate that it cannot be delivered. Sometimes abbreviated CA. connectionless Term used to describe data transfer without the existence of a virtual circuit. Compare with connection-oriented. See also virtual circuit. Connectionless Broadband Data Service See CBDS. Connectionless Network Protocol See CLNP. Connectionless Network Service See CLNS. connection management See CMT. Connection-Mode Network Service See CMNS. connection-oriented Term used to describe data transfer that requires the establishment of a virtual circuit. See also connectionless. See also virtual circuit. Connection-Oriented Network Protocol See CONP. C - 36 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. CONP Connection-Oriented Network Protocol. OSI protocol providing connection-oriented operation to upper-layer protocols. See also CMNS. console DTE through which commands are entered into a host. constant bit rate See CBR. Consultative Committee for International Telegraph and Telephone See CCITT. content-addressable memory See associative memory. contention Access method in which network devices compete for permission to access the physical medium. Contrast with circuit switching and token passing. control point See CP. ControlStream traffic management Traffic management scheme used by the LightStream 2020 ATM switch. Includes congestion avoidance, traffic shaping, and traffic policing, and allows links to operate at high levels of utilization by scaling back lower-priority, delay-tolerant traffic at the edge of the network when congestion begins to occur. convergence The speed and ability of a group of internetworking devices running a specific routing protocol to agree on the topology of an internetwork after a change in that topology. convergence sublayer See CS. conversation In SNA, an LU 6.2 session between two transaction programs. Cooperation for Open Systems Interconnection Networking in Europe See COSINE. Copper Distributed Data Interface See CDDI. copy flash tftp Command used to copy the system image to a TFTP server. copy running-config startup-config Command used to store the current configuration in RAM into NVRAM. copy running-config tftp Command used to store the current configuration in RAM on a network TFTP server. copy tftp flash Command used to download the new image from the TFTP server. copy tftp running-config Command used to load configuration information from a network TFTP server. core gateway The primary routers in the Internet. C - 37 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. core router In a packet-switched star topology, a router that is part of the backbone and that serves as the single pipe through which all traffic from peripheral networks must pass on its way to other peripheral networks. Corporation for Open Systems See COS. Corporation for Research and Educational Networking See CREN. COS 1) Class of service. Indication of how an upper-layer protocol requires that a lower-layer protocol treat its messages. In SNA subarea routing, COS definitions are used by subarea nodes to determine the optimal route to establish a given session. A COS definition comprises a virtual route number and a transmission priority field. Also called TOS (type of service). 2) Corporation for Open Systems. Organization that promulgates the use of OSI protocols through conformance testing, certification, and related activities. COSINE Cooperation for Open Systems Interconnection Networking in Europe. European project financed by the European Community (EC) to build a communication network between scientific and industrial entities in Europe. The project ended in 1994. cost Arbitrary value, typically based on hop count, media bandwidth, or other measures, that is assigned by a network administrator and used to compare various paths through an internetwork environment. Cost values are used by routing protocols to determine the most favorable path to a particular destination: the lower the cost, the better the path. Sometimes called path cost. See also routing metric. count to infinity Problem that can occur in routing algorithms that are slow to converge, in which routers continuously increment the hop count to particular networks. Typically, some arbitrary hopcount limit is imposed to prevent this problem. CP control point. In SNA networks, element that identifies the APPN networking components of a PU 2.1 node, manages device resources, and can provide services to other devices. In APPN, CPs are able to communicate with logically adjacent CPs by way of CP-to-CP sessions. See also EN and NN. CPCS common part convergence sublayer. One of the two sublayers of any AAL. The CPCS is service-independent and is further divided into the CS and the SAR sublayers. The CPCS is responsible for preparing data for transport across the ATM network, including the creation of the 48-byte payload cells that are passed to the ATM layer. See also AAL, ATM layer, CS, SAR, and SSCS. C - 38 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. CPE customer premises equipment. Terminating equipment, such as terminals, telephones, and modems, supplied by the telephone company, installed at customer sites, and connected to the telephone company network. CPI-C Common Programming Interface for Communications. Platform-independent API developed by IBM and used to provide portability in APPC applications. See also APPC. cps cells per second CPU central processing unit. The part of a computer that controls all the other parts. It fetches instructions from memory and decodes them. This may cause it to transfer data to or from memory or to activate peripherals to perform input or output. CRC cyclic redundancy check. Error-checking technique in which the frame recipient calculates a remainder by dividing frame contents by a prime binary divisor and compares the calculated remainder to a value stored in the frame by the sending node. CREN Corporation for Research and Educational Networking. The result of a merger of BITNET and CSNET. CREN is devoted to providing Internet connectivity to its members, which include the alumni, students, faculty, and other affiliates of participating educational and research institutions, via BITNET III. See also BITNET, BITNET III, and CSNET. cross talk Interfering energy transferred from one circuit to another. CS convergence sublayer. One of the two sublayers of the AAL CPCS, responsible for padding and error checking. PDUs passed from the SSCS are appended with an 8-byte trailer (for error checking and other control information) and padded, if necessary, so that the length of the resulting PDU is divisible by 48. These PDUs are then passed to the SAR sublayer of the CPCS for further processing. See also AAL, CPCS, SAR, and SSCS. CSA Canadian Standards Association. Agency within Canada that certifies products that conform to Canadian national safety standards. CSLIP Compressed Serial Link Internet Protocol. Extension of SLIP that, when appropriate, allows just header information to be sent across a SLIP connection, reducing overhead and increasing packet throughput on SLIP lines. See also SLIP. C - 39 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. CSMA/CD carrier sense multiple access collision detect. Media-access mechanism wherein devices ready to transmit data first check the channel for a carrier. If no carrier is sensed for a specific period of time, a device can transmit. If two devices transmit at once, a collision occurs and is detected by all colliding devices. This collision subsequently delays retransmissions from those devices for some random length of time. CSMA/CD access is used by Ethernet and IEEE 802.3. CSNET Computer Science Network. Large internetwork consisting primarily of universities, research institutions, and commercial concerns. CSNET merged with BITNET to form CREN. See also BITNET and CREN. CSNP complete sequence number PDU. PDU sent by the designated router in an OSPF network to maintain database synchronization. CSU channel service unit. Digital interface device that connects enduser equipment to the local digital telephone loop. Often referred to together with DSU, as CSU/DSU. See also DSU. csumon Tool available on the LightStream 2020 ATM switch, accessible from the bash shell. Csumon allows connection to an external CSU/DSU on a low-speed line for monitoring and control purposes, and can display statistics on the internal CSU/DSU of a medium-speed line. CTS 1) Clear To Send. Circuit in the EIA/TIA-232 specification that is activated when DCE is ready to accept data from DTE. 2) Common transport semantic. Cornerstone of the IBM strategy to reduce the number of protocols on networks. CTS provides a single API for developers of network software and enables applications to run over APPN, OSI, or TCP/IP. Customer Information Control System See CICS. customer premises equipment See CPE. cut sheet A rough diagram indicating where cable runs are located and the numbers of rooms they lead to. cut-through packet switching Packet switching approach that streams data through a switch so that the leading edge of a packet exits the switch at the output port before the packet finishes entering the input port. A device using cut-through packet switching reads, processes, and forwards packets as soon as the destination address is looked up, and the outgoing port determined. Also known as on-the-fly packet switching. Contrast with store and forward packet switching. C - 40 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. CxBus Cisco Extended Bus. Data bus for interface processors on Cisco 7000 series routers that operates at 533 Mbps. See also Switch Processor. CyBus 1.067-Gbps data bus for interface processors. Used in the Cisco 7500 series routers. See also Cisco 7500. cycles per second See hertz. cyclic redundancy check See CRC. D - 41 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. D Term Definition D4 framing See SF. DAC dual-attached concentrator. FDDI or CDDI concentrator capable of attaching to both rings of an FDDI or CDDI network. It can also be dual-homed from the master ports of other FDDI or CDDI concentrators. DARPA Defense Advanced Research Projects Agency. U.S. government agency that funded research for and experimentation with the Internet. Evolved from ARPA, and then, in 1994, back to ARPA. See also ARPA. DARPA Internet Obsolete term referring to the Internet. See Internet. DAS Dual attachment station. Device attached to both the primary and the secondary FDDI rings. Dual attachment provides redundancy for the FDDI ring: if the primary ring fails, the station can wrap the primary ring to the secondary ring, isolating the failure and retaining ring integrity. Also known as a Class A station. Compare with SAS. data Upper-layer protocol data. database object 1) In general, a piece of information that is stored in a database. 2) Chassis, card, or port defined in the configuration database of a LightStream 2020 ATM switch. Database objects have associated attributes that describe them. data bus connector See DB connector. data channel See D channel. data circuit-terminating equipment See DCE. data communications equipment See DCE. Data Country Code See DCC. Data Encryption Standard See DES. Data Exchange Interface See DXI. data flow control layer Layer 5 of the SNA architectural model. This layer determines and manages interactions between session partners, particularly data flow. Corresponds to the session layer of the OSI model. See also data link control layer, path control layer, physical control layer, presentation services layer, transaction services layer, and transmission control layer. D - 42 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. datagram Logical grouping of information sent as a network layer unit over a transmission medium without prior establishment of a virtual circuit. IP datagrams are the primary information units in the Internet. The terms frame, message, packet, and segment are also used to describe logical information groupings at various layers of the OSI reference model and in various technology circles. Datagram Delivery Protocol See DDP. data-link connection identifier See DLCI. data link control layer Layer 2 in the SNA architectural model. Responsible for the transmission of data over a particular physical link. Corresponds roughly to the data link layer of the OSI model. See also data flow control layer, path control layer, physical control layer, presentation services layer, transaction services layer, and transmission control layer. data link layer Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The data link layer is concerned with physical addressing, network topology, line discipline, error notification, ordered delivery of frames, and flow control. The IEEE has divided this layer into two sublayers: the MAC sublayer and the LLC sublayer. Sometimes simply called link layer. Roughly corresponds to the data link control layer of the SNA model. See also application layer, LLC, MAC, network layer, physical layer, presentation layer, session layer, and transport layer. data-link switching See DLSw. Data Movement Processor See DMP. Data Network Identification Code See DNIC. data set ready See DSR. data service unit See DSU. data sink Network equipment that accepts data transmissions. data stream All data transmitted through a communications line in a single read or write operation. data terminal equipment See DTE. data terminal ready See DTR. dB decibels D - 43 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. DB connector data bus connector. Type of connector used to connect serial and parallel cables to a data bus. DB connector names are of the format DB-x, where x represents the number of (wires) within the connector. Each line is connected to a pin on the connector, but in many cases, not all pins are assigned a function. DB connectors are defined by various EIA/TIA standards. DC direct current. Electrical current that travels in only one direction. Direct current is generally used in electronic circuits. See DC." DCA Defense Communications Agency. U.S. government organization responsible for DDN networks such as MILNET. Now called DISA. See DISA. DCC Data Country Code. One of two ATM address formats developed by the ATM Forum for use by private networks. Adapted from the subnetwork model of addressing in which the ATM layer is responsible for mapping network layer addresses to ATM addresses. See also ICD. DCE data communications equipment. Data communications equipment (EIA expansion) or data circuit-terminating equipment (ITU-T expansion). The devices and connections of a communications network that comprise the network end of the user-to-network interface. The DCE provides a physical connection to the network, forwards traffic, and provides a clocking signal used to synchronize data transmission between DCE and DTE devices. Modems and interface cards are examples of DCE. Compare with DTE. D channel Data channel. 1) Full-duplex, 16-kbps (BRI) or 64-kbps (PRI) ISDN channel. Compare to B channel, E channel, and H channel. 2) In SNA, a device that connects a processor and main storage with peripherals. DDM Distributed Data Management. Software in an IBM SNA environment that provides peer-to-peer communication and file sharing. One of three SNA transaction services. See also DIA and SNADS. DDN Defense Data Network. U.S. military network composed of an unclassified network (MILNET) and various secret and topsecret networks. DDN is operated and maintained by DISA. See also DISA and MILNET. DDP Datagram Delivery Protocol. Apple Computer network layer protocol that is responsible for the socket-to-socket delivery of datagrams over an AppleTalk internetwork. D - 44 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. DDR dial-on-demand routing. Technique whereby a Cisco router can automatically initiate and close a circuit-switched session as transmitting stations demand. The router spoofs keepalives so that end stations treat the session as active. DDR permits routing over ISDN or telephone lines using an external ISDN terminal adaptor or modem. DE Discard eligible. See tagged traffic. deadlock 1) Unresolved contention for the use of a resource. 2) In APPN, when two elements of a process each wait for action by or a response from the other before they resume the process. debug ip rip Command that displays RIP routing updates as they are sent and received. decibels Abbreviated dB. DECnet Group of communications products (including a protocol suite) developed and supported by Digital Equipment Corporation. DECnet/OSI (also called DECnet Phase V) is the most recent iteration and supports both OSI protocols and proprietary Digital protocols. Phase IV Prime supports inherent MAC addresses that allow DECnet nodes to coexist with systems running other protocols that have MAC address restrictions. See also DNA. DECnet routing Proprietary routing scheme introduced by Digital Equipment Corporation in DECnet Phase III. In DECnet Phase V, DECnet completed its transition to OSI routing protocols (ES-IS and ISIS). decorative raceway Type of wall-mounted channel with removable cover used to support horizontal cabling. Decorative raceway is big enough to hold two cables. decryption The reverse application of an encryption algorithm to encrypted data, thereby restoring that data to its original, unencrypted state. See also encryption. dedicated LAN Network segment allocated to a single device. Used in LAN switched network topologies. dedicated line Communications line that is indefinitely reserved for transmissions, rather than switched as transmission is required. See also leased line. de facto standard Standard that exists by nature of its widespread use. Compare with de jure standard. See also standard. default route Routing table entry that is used to direct frames for which a next hop is not explicitly listed in the routing table. D - 45 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. Defense Advanced Research Projects Agency See DARPA. Defense Communications Agency See DCA. Defense Data Network See DDN. Defense Information Systems Agency See DISA. Defense Intelligence Agency See DIA. de jure standard Standard that exists because of its approval by an official standards body. Compare with de facto standard. See also standard. delay The time between the initiation of a transaction by a sender and the first response received by the sender. Also, the time required to move a packet from source to destination over a given path. demand priority Media access method used in 100VG-AnyLAN that uses a hub that can handle multiple transmission requests and can process traffic according to priority, making it useful for servicing time-sensitive traffic such as multimedia and video. Demand priority eliminates the overhead of packet collisions, collision recovery, and broadcast traffic typical in Ethernet networks. See also 100VG-AnyLAN. demarc Demarcation point between carrier equipment and CPE. demodulation Process of returning a modulated signal to its original form. Modems perform demodulation by taking an analog signal and returning it to its original (digital) form. See also modulation. demultiplexing The separating of multiple input streams that have been multiplexed into a common physical signal back into multiple output streams. See also multiplexing. dense mode PIM See PIM dense mode. Department of Defense See DoD. Department of Defense Intelligence Information System Network Security for Information Exchange See DNSIX. Dependent LU See DLU. Dependent LU Requester See DLUR. Dependent LU Server See DLUS. DES Data Encryption Standard. Standard cryptographic algorithm developed by the U.S. NBS. D - 46 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. designated bridge The bridge that incurs the lowest path cost when forwarding a frame from a segment to the route bridge. designated router OSPF router that generates LSAs for a multiaccess network and has other special responsibilities in running OSPF. Each multiaccess OSPF network that has at least two attached routers has a designated router that is elected by the OSPF Hello protocol. The designated router enables a reduction in the number of adjacencies required on a multiaccess network, which in turn reduces the amount of routing protocol traffic and the size of the topological database. destination address Address of a network device that is receiving data. See also source address. destination MAC See DMAC. destination port Number of the called port. destination service access point See DSAP. deterministic load distribution Technique for distributing traffic between two bridges across a circuit group. Guarantees packet ordering between sourcedestination pairs and always forwards traffic for a sourcedestination pair on the same segment in a circuit group for a given circuit-group configuration. Deutsche Industrie Norm See DIN. Deutsche Industrie Norm connector See DIN connector. device See node. DIA Document Interchange Architecture. Defines the protocols and data formats needed for the transparent interchange of documents in an SNA network. One of three SNA transaction services. See also DDM and SNADS. dial backup Feature supported by Cisco routers that provides protection against WAN downtime by allowing the network administrator to configure a backup serial line through a circuit-switched connection. dial-on-demand routing See DDR. dial-up line Communications circuit that is established by a switched-circuit connection using the telephone company network. differential encoding Digital encoding technique whereby a binary value is denoted by a signal change rather than a particular signal level. differential Manchester encoding Digital coding scheme where a mid-bit-time transition is used for clocking, and a transition at the beginning of each bit time denotes a zero. The coding scheme used by IEEE 802.5 and Token Ring networks. D - 47 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. Diffusing Update Algorithm See DUAL. Digital Network Architecture See DNA. digital signal Language of computers comprising only two states, on and off which are indicated by a series of voltage pulses. digital signal level 0 See DS-0. digital signal level 1 See DS-1. digital signal level 3 See DS-3. Dijkstra's algorithm See SPF. DIN Deutsche Industrie Norm. German national standards organization. DIN connector Deutsche Industrie Norm connector. Multipin connector used in some Macintosh and IBM PC-compatible computers, and on some network processor panels. directed search Search request sent to a specific node known to contain a resource. A directed search is used to determine the continued existence of the resource and to obtain routing information specific to the node. See also broadcast search. direct memory access See DMA. directory services Services that help network devices locate service providers. DISA Defense Information Systems Agency. U.S. military organization responsible for implementing and operating military information systems, including the DDN. See also DDN. discard eligible See DE. discovery architecture APPN software that enables a machine configured as an APPN EN to automatically find primary and backup NNs when the machine is brought onto an APPN network. discovery mode Method by which an AppleTalk interface acquires information about an attached network from an operational node and then uses this information to configure itself. Also called dynamic configuration. disk assembly The combination of a hard disk drive, a floppy disk drive, and a disk power supply on a LightStream 2020 ATM switch. Each NP card in a LightStream 2020 chassis has its own disk assembly. Distance Vector Multicast Routing Protocol See DVMRP. D - 48 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. distance vector routing algorithm Class of routing algorithms that iterate on the number of hops in a route to find a shortest-path spanning tree. Distance vector routing algorithms call for each router to send its entire routing table in each update, but only to its neighbors. Distance vector routing algorithms can be prone to routing loops, but are computationally simpler than link state routing algorithms. Also called Bellman-Ford routing algorithm. See also link state routing algorithm and SPF. distortion delay Problem with a communication signal resulting from nonuniform transmission speeds of the components of a signal through a transmission medium. Also called group delay. distributed computing (processing) See client-server computing. Distributed Data Management See DDM. Distributed Queue Dual Bus See DQDB. DLCI data-link connection identifier. Value that specifies a PVC or SVC in a Frame Relay network. In the basic Frame Relay specification, DLCIs are locally significant (connected devices might use different values to specify the same connection). In the LMI extended specification, DLCIs are globally significant (DLCIs specify individual end devices). See also LMI. DLSw data-link switching. Interoperability standard, described in RFC 1434, that provides a method for forwarding SNA and NetBIOS traffic over TCP/IP networks using data link layer switching and encapsulation. DLSw uses SSP (Switch-to-Switch Protocol) instead of SRB, eliminating the major limitations of SRB, including hop-count limits, broadcast and unnecessary traffic, timeouts, lack of flow control, and lack of prioritization schemes. See also DLSw+, SRB, and SSP (Switch-to-Switch Protocol). DLSw+ Data Link Switching Plus. Cisco implementation of the DLSw standard for SNA and NetBIOS traffic forwarding. DLSw+ goes beyond the standard to include the advanced features of the current Cisco RSRB implementation, and provides additional functionality to increase the overall scalability of data-link switching. See also DLSw. DLU Dependent LU. An LU that depends on the SSCP to provide services for establishing sessions with other LUs. See also LU and SSCP. DLUR Dependent LU Requester. The client half of the Dependent LU Requestor/Server enhancement to APPN. The DLUR component resides in APPN ENs and NNs that support adjacent DLUs by securing services from the DLUS. See also APPN, DLU, and DLUS. DLUR node In APPN networks, an EN or NN that implements the DLUR component. See also DLUR. D - 49 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. DLUS Dependent LU Server. The server half of the Dependent LU Requestor/Server enhancement to APPN. The DLUS component provides SSCP services to DLUR nodes over an APPN network. See also APPN, DLU, and DLUR. DLUS node In APPN networks, a NN that implements the DLUS component. See also DLUS. DMA direct memory access. The transfer of data from a peripheral device, such as a hard disk drive, into memory without that data passing through the microprocessor. DMA transfers data into memory at high speeds with no processor overhead. DMAC Destination MAC. The MAC address specified in the Destination Address field of a packet. Compare with SMAC. See also MAC address. DMP Data Movement Processor. Processor on the Catalyst 5000 that, along with the multiport packet buffer memory interface, performs the frame-switching function for the switch. The DMP also handles translational bridging between the Ethernet and FDDI interfaces, IP segmentation, and intelligent bridging with protocol-based filtering. See also Catalyst 5000. DNA Digital Network Architecture. Network architecture developed by Digital Equipment Corporation. The products that embody DNA (including communications protocols) are collectively referred to as DECnet. See also DECnet. DNIC Data Network Identification Code. Part of an X.121 address. DNICs are divided into two parts: the first specifying the country in which the addressed PSN is located and the second specifying the PSN itself. See also X.121. DNS Domain Naming System. System used in the Internet for translating names of network nodes into addresses. See also authority zone. DNSIX Department of Defense Intelligence Information System Network Security for Information Exchange. Collection of security requirements for networking defined by the U.S. Defense Intelligence Agency. Document Interchange Architecture See DIA. DoD Department of Defense. U.S. government organization that is responsible for national defense. The DoD has frequently funded communication protocol development. domain 1) In the Internet, a portion of the naming hierarchy tree that refers to general groupings of networks based on organizationtype or geography. 2) In SNA, an SSCP and the resources it controls. 3) In IS-IS, a logical set of networks. D - 50 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. Domain Networking system developed by Apollo Computer (now part of Hewlett-Packard) for use in its engineering workstations. Domain Naming System See DNS. domain specific part See DSP. dot address Refers to the common notation for IP addresses in the form where each number a represents, in decimal, 1 byte of the 4-byte IP address. Also called dotted notation or fourpart dotted notation. dotted notation See dot address. downlink station See ground station. downstream physical unit See DSPU. DQDB Distributed Queue Dual Bus. Data link layer communication protocol, specified in the IEEE 802.6 standard, designed for use in MANs. DQDB, which permits multiple systems to interconnect using two unidirectional logical buses, is an open standard that is designed for compatibility with carrier transmission standards, and is aligned with emerging standards for BISDN. SIP (SMDS Interface Protocol) is based on DQDB. See also MAN. DRAM dynamic random-access memory. RAM that stores information in capacitors that must be periodically refreshed. Delays can occur because DRAMs are inaccessible to the processor when refreshing their contents. However, DRAMs are less complex and have greater capacity than SRAMs. See also SRAM. drop Point on a multipoint channel where a connection to a networked device is made. drop cable Generally, a cable that connects a network device (such as a computer) to a physical medium. A type of AUI. See also AUI. DS-0 digital signal level 0. Framing specification used in transmitting digital signals over a single channel at 64-kbps on a T1 facility. Compare with DS-1 and DS-3. DS-1 digital signal level 1. Framing specification used in transmitting digital signals at 1.544-Mbps on a T1 facility (in the United States) or at 2.108-Mbps on an E1 facility (in Europe). Compare with DS-0 and DS-3. See also E1 and T1. DS-1 domestic trunk interface See DS-1/DTI. DS-1/DTI DS-1 domestic trunk interface. Interface circuit used for DS-1 applications with 24 trunks. D - 51 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. DS-3 digital signal level 3. Framing specification used for transmitting digital signals at 44.736-Mbps on a T3 facility. Compare with DS-0 and DS-1. See also E3 and T3. DSAP destination service access point. The SAP of the network node designated in the Destination field of a packet. Compare to SSAP. See also SAP (service access point). DSP domain specific part. The part of a CLNS address that contains an area identifier, a station identifier, and a selector byte. DSPU downstream physical unit. 1) In SNA, a PU that is located downstream from the host. 2) Cisco IOS software feature that enables a router to function as a PU concentrator for SNA PU 2 nodes. PU concentration at the router simplifies the task of PU definition at the upstream host while providing additional flexibility and mobility for downstream PU devices. This feature is sometimes referred to as DSPU concentration. See also PU and SNA. DSPU concentration See DSPU and PU. DSR data set ready. EIA/TIA-232 interface circuit that is activated when DCE is powered up and ready for use. DSU data service unit. Device used in digital transmission that adapts the physical interface on a DTE device to a transmission facility such as T1 or E1. The DSU is also responsible for such functions as signal timing. Often referred to together with CSU, as CSU/DSU. See also CSU. DSX-1 Cross-connection point for DS-1 signals. DTE data terminal equipment. Device at the user end of a usernetwork interface that serves as a data source, destination, or both. DTE connects to a data network through a DCE device (for example, a modem) and typically uses clocking signals generated by the DCE. DTE includes such devices as computers, protocol translators, and multiplexers. Compare with DCE. DTMF dual tone multifrequency. Use of two simultaneous voice-band tones for dialing (such as touch tone). DTR data terminal ready. EIA/TIA-232 circuit that is activated to let the DCE know when the DTE is ready to send and receive data. D - 52 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. DUAL Diffusing Update Algorithm. Convergence algorithm used in Enhanced IGRP that provides loop-free operation at every instant throughout a route computation. Allows routers involved in a topology change to synchronize at the same time, while not involving routers that are unaffected by the change. See also Enhanced IGRP. dual-attached concentrator See DAC. dual attachment station See DAS. dual counter-rotating rings Network topology in which two signal paths, whose directions are opposite one another, exist in a token-passing network. FDDI and CDDI are based on this concept. dual-homed station Device attached to multiple FDDI rings to provide redundancy. dual homing Network topology in which a device is connected to the network by way of two independent access points (points of attachment). One access point is the primary connection, and the other is a standby connection that is activated in the event of a failure of the primary connection. Dual IS-IS See Integrated IS-IS. dual tone multifrequency See DTMF. DVMRP Distance Vector Multicast Routing Protocol. Internetwork gateway protocol, largely based on RIP, that implements a typical dense mode IP multicast scheme. DVMRP uses IGMP to exchange routing datagrams with its neighbors. See also IGMP. DXI Data Exchange Interface. ATM Forum specification, described in RFC 1483, that defines how a network device such as a bridge, router, or hub can effectively act as an FEP to an ATM network by interfacing with a special DSU that performs packet segmentation and reassembly. dynamic address resolution Use of an address resolution protocol to determine and store address information on demand. dynamic configuration See discovery mode. dynamic random-access memory See DRAM. dynamic routing Routing that adjusts automatically to network topology or traffic changes. Also called adaptive routing. E - 53 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. E Term Definition E1 Wide-area digital transmission scheme used predominantly in Europe that carries data at a rate of 2.048 Mbps. E1 lines can be leased for private use from common carriers. Compare with T1. See also DS-1. E.164 ITU-T recommendation for international telecommunication numbering, especially in ISDN, BISDN, and SMDS. An evolution of standard telephone numbers. E3 Wide-area digital transmission scheme used predominantly in Europe that carries data at a rate of 34.368 Mbps. E3 lines can be leased for private use from common carriers. Compare with T3. See also DS-3. early token release Technique used in Token Ring networks that allows a station to release a new token onto the ring immediately after transmitting, instead of waiting for the first frame to return. This feature can increase the total bandwidth on the ring. See also Token Ring. EARN European Academic Research Network. European network connecting universities and research institutes. EARN merged with RARE to form TERENA. See also RARE and TERENA. EBCDIC extended binary coded decimal interchange code. Any of a number of coded character sets developed by IBM consisting of 8-bit coded characters. This character code is used by older IBM systems and telex machines. Compare with ASCII. ECC edge card control. Process on the NP of a LightStream 2020 ATM switch that performs per-card processing for an edge card. Such processing includes protocol management (ATM connection management) and media-specific (Ethernet and FDDI) management tasks, internetworking operations such as packet forwarding and filtering, and network management tasks. See also edge card, LCC, and NP card. E channel echo channel. 64-kbps ISDN circuit-switching control channel. The E channel was defined in the 1984 ITU-T ISDN specification, but was dropped in the 1988 specification. Compare with B channel, D channel, and H channel. echo channel See E channel. echoplex Mode in which keyboard characters are echoed on a terminal screen upon return of a signal from the other end of the line indicating that the characters were received correctly. E - 54 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. ECMA European Computer Manufacturers Association. Group of European computer vendors who have done substantial OSI standardization work. edge card Line card on the LightStream 2020 ATM switch that is configured to communicate with devices outside the ATM network. Edge cards offer Ethernet, FDDI, frame forwarding, Frame Relay, OC-3c, and UNI interfaces. See also trunk card. edge card control See ECC. edge device Network entity such as a LAN segment, host, or router that connects to a LightStream 2020 ATM switch via an edge card. Edge devices send and receive the data that passes through the ATM network. EDI electronic data interchange. The electronic communication of operational data such as orders and invoices between organizations. EDIFACT Electronic Data Interchange for Administration, Commerce, and Transport. Data exchange standard administered by the United Nations to be a multi-industry EDI standard. EEPROM electrically erasable programmable read-only memory. EPROM that can be erased using electrical signals applied to specific pins. See also EPROM. EGP Exterior Gateway Protocol.Internet protocol for exchanging routing information between autonomous systems. Documented in RFC 904. Not to be confused with the general term exterior gateway protocol. EGP is an obsolete protocol that has been replaced by BGP. See also BGP. EIA Electronic Industries Association.Group that specifies electrical transmission standards. The EIA and TIA have developed numerous well-known communications standards, including EIA/TIA-232 and EIA/TIA-449. See also TIA. EIA-530 REFers to two electrical implementations of EIA/TIA-449: RS422 (for balanced transmission) and RS-423 (for unbalanced transmission). See also RS-422, RS-423, and EIA/TIA-449. EIA/TIA-232 Common physical layer interface standard, developed by EIA and TIA, that supports unbalanced circuits at signal speeds of up to 64 kbps. Closely resembles the V.24 specification. Formerly known as RS-232. E - 55 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. EIA/TIA-449 Popular physical layer interface developed by EIA and TIA. Essentially, a faster (up to 2 Mbps) version of EIA/TIA-232 capable of longer cable runs. Formerly called RS-449. See also EIA-530. EIA/TIA-568 Standard that describes the characteristics and applications for various grades of UTP cabling. See also Category 1 cabling, Category 2 cabling, Category 3 cabling, Category 4 cabling, Category 5 cabling, and UTP. EIA/TIA-606 Administration standard for the telecommunications infrastructure of commercial buildings. It includes the following administration areas: terminations, media, pathways, spaces, and bounding and grounding. EIGRP See Enhanced IGRP. EIP Ethernet Interface Processor.Interface processor card on the Cisco 7000 series routers. The EIP provides high-speed (10- Mbps) AUI ports that support Ethernet Version 1 and Ethernet Version 2 or IEEE 802.3 interfaces, and a high-speed data path to other interface processors. EISA Extended Industry-Standard Architecture.32-bit bus interface used in PCs, PC-based servers, and some UNIX workstations and servers. See also ISA. ELAN Emulated LAN.ATM network in which an Ethernet or Token Ring LAN is emulated using a client-server model. ELANs are composed of an LEC, an LES, a BUS, and an LECS. Multiple ELANs can exist simultaneously on a single ATM network. ELANs are defined by the LANE specification. See also BUS, LANE, LEC, LECS, and LES. electromagnetic interference See EMI. electromagnetic pulse See EMP. electrically erasable programmable read-only memory See EEPROM. electronic data interchange See EDI. Electronic Data Interchange for Administration, Commerce, and Transport See EDIFACT. Electronic Industries Association See EIA. electronic mail Widely used network application in which mail messages are transmitted electronically between end users over various types of networks using various network protocols. Often called e-mail. E - 56 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. Electronic Messaging Association See EMA. electrostatic discharge See ESD. EMA 1) Enterprise Management Architecture. Digital Equipment Corporation network management architecture, based on the OSI network management model. 2) Electronic Messaging Association. Forum devoted to standards and policy work, education, and development of electronic messaging systems such as electronic mail, voice mail, and facsimile. e-mail See electronic mail. EMI electromagnetic interference. Interference by electromagnetic signals that can cause reduced data integrity and increased error rates on transmission channels. EMIF ESCON Multiple Image Facility. Mainframe I/O software function that allows one ESCON channel to be shared among multiple logical partitions on the same mainframe. See also ESCON. EMP electromagnetic pulse. Caused by lightning and other highenergy phenomena. Capable of coupling enough energy into unshielded conductors to destroy electronic devices. See also Tempest. emulated LAN See ELAN. emulation mode Function of an NCP that enables it to perform activities equivalent to those performed by a transmission control unit. For example, with CiscoWorks, the NetView PU 2 emulates the IBM 3274. EN end node. APPN end system that implements the PU 2.1, provides end-user services, and supports sessions between local and remote CPs. ENs are not capable of routing traffic and rely on an adjacent NN for APPN services. Compare with NN. See also CP. enable-password Command used to restrict access to the privileged EXEC mode. enable-secret Password from the System Configuration Dialog to setup global parameters uses a Cisco-proprietary encryption process to alter the password character string. encapsulation The wrapping of data in a particular protocol header. For example, Ethernet data is wrapped in a specific Ethernet header before network transit. Also, when bridging dissimilar networks, the entire frame from one network is simply placed in the header used by the data link layer protocol of the other network. See also tunneling. E - 57 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. encapsulation bridging Carries Ethernet frames from one router to another across disparate media, such as serial and FDDI lines. Contrast with translational bridging. encoder Device that modifies information into the required transmission format. encoding Process by which bits are represented by voltages. encryption The application of a specific algorithm to data so as to alter the appearance of the data making it incomprehensible to those who are not authorized to see the information. See also decryption. end node See EN. end of transmission See EOT. end point Device at which a virtual circuit or virtual path begins or ends. end system See ES. End System-to-Intermediate System See ES-IS. Energy Sciences Network See ESnet. Enhanced IGRP Enhanced Interior Gateway Routing Protocol. Advanced version of IGRP developed by Cisco. Provides superior convergence properties and operating efficiency, and combines the advantages of link state protocols with those of distance vector protocols. Compare with IGRP. See also IGP, OSPF, and RIP. Enhanced Interior Gateway Routing Protocol See Enhanced IGRP. Enterprise Management Architecture See EMA. Enhanced Monitoring Services Set of analysis tools on the Catalyst 5000 switch, consisting of an integrated RMON agent and the SPAN. These tools provide traffic monitoring, and network segment analysis and management. See also RMON and SPAN. enterprise network Large and diverse network connecting most major points in a company or other organization. Differs from a WAN in that it is privately owned and maintained. Enterprise System Connection See ESCON. Enterprise System Connection channel See ESCON channel. entity Generally, an individual, manageable network device. Sometimes called an alias. E - 58 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. EOT end of transmission. Generally, a character that signifies the end of a logical group of characters or bits. EPROM erasable programmable read-only memory. Nonvolatile memory chips that are programmed after they are manufactured, and, if necessary, can be erased by some means and reprogrammed. Compare with EEPROM and PROM. equalization Technique used to compensate for communications channel distortions. erasable programmable read-only memory See EPROM. erase startup-config Command used to delete the backup configuration file in NVRAM. error control Technique for detecting and correcting errors in data transmissions. error-correcting code Code having sufficient intelligence and incorporating sufficient signaling information to enable the detection and correction of many errors at the receiver. error-detecting code Code that can detect transmission errors through analysis of received data based on the adherence of the data to appropriate structural guidelines. ES end system. 1) Generally, an end-user device on a network. 2) Nonrouting host or node in an OSI network. ESCON Enterprise System Connection. IBM channel architecture that specifies a pair of fiber-optic cables, with either LEDs or lasers as transmitters and a signaling rate of 200 Mbps. ESCON channel IBM channel for attaching mainframes to peripherals such as storage devices, backup units, and network interfaces. This channel incorporates fiber channel technology. The ESCON channel replaces the bus and tag channel. Compare with parallel channel. See also bus and tag channel. ESCON Multiple Image Facility See EMIF. ESD electrostatic discharge. A flow or spark of electricity that originates from a static source such as a carpet and arcs across a gap to another object. E - 59 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. ESF Extended Superframe Format. Framing type used on T1 circuits that consists of 24 frames of 192 bits each, with the 193rd bit providing timing and other functions. ESF is an enhanced version of SF. See also SF. ES-IS End System-to-Intermediate System. OSI protocol that defines how end systems (hosts) announce themselves to intermediate systems (routers). See also IS-IS. ESnet Energy Sciences Network. Data communications network managed and funded by the U.S. Department of Energy Office of Energy Research (DOE/OER). Interconnects the DOE to educational institutions and other research facilities. Ethernet Baseband LAN specification invented by Xerox Corporation and developed jointly by Xerox, Intel, and Digital Equipment Corporation. Ethernet networks use CSMA/CD and run over a variety of cable types at 10 Mbps. Ethernet is similar to the IEEE 802.3 series of standards. See also 10BASE2, 10BASE5, 10BASE-F, 10BASE-T, 10Broad36, and IEEE 802.3. Ethernet Interface Processor See EIP. EtherTalk AppleTalk protocols running on Ethernet. ETSI European Telecommunication Standards Institute. Organization created by the European PTTs and the European Community (EC) to propose telecommunications standards for Europe. EUnet European Internet. European commercial Internet service provider. EUnet is designed to provide electronic mail, news, and other Internet services to European markets. European Academic Research Network See EARN. European Computer Manufacturers Association See ECMA. European Telecommunication Standards Institute See ETSI. European Internet See EUnet. event Network message indicating operational irregularities in physical elements of a network or a response to the occurrence of a significant task, typically the completion of a request for information. See also alarm and trap. Excess Burst See Be. excess rate Traffic in excess of the insured rate for a given connection. Specifically, the excess rate equals the maximum rate minus the insured rate. Excess traffic is delivered only if network resources are available and can be discarded during periods of congestion. Compare with insured rate and maximum rate. E - 60 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. exchange identification See XID. EXEC The interactive command processor of the Cisco IOS software. expansion The process of running a compressed data set through an algorithm that restores the data set to its original size. Compare with companding and compression. expectational acknowledgment Type of acknowledgment scheme in which the acknowledgment number refers to the octet expected next. expedited delivery Option set by a specific protocol layer telling other protocol layers (or the same protocol layer in another network device) to handle specific data more rapidly. explicit route In SNA, a route from a source subarea to a destination subarea, as specified by a list of subarea nodes and transmission groups that connect the two. explorer frame Frame sent out by a networked device in a SRB environment to determine the optimal route to another networked device. explorer packet Generated by an end station trying to find its way through a SRB network. Gathers a hop-by-hop description of a path through the network by being marked (updated) by each bridge that it traverses, thereby creating a complete topological map. See also all-routes explorer packet, local explorer packet, and spanning explorer packet. Extended Binary Coded Decimal Interchange Code See EBCDIC. Extended Industry-Standard Architecture See EISA. Extended Superframe Format See ESF. exterior gateway protocol Any internetwork protocol used to exchange routing information between autonomous systems. Not to be confused with Exterior Gateway Protocol (EGP), which is a particular instance of an exterior gateway protocol. Exterior Gateway Protocol See EGP. exterior router Router connected to an AURP tunnel, responsible for the encapsulation and deencapsulation of AppleTalk packets in a foreign protocol header (for example, IP). See also AURP and AURP tunnel. F - 61 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. F Term Definition failure domain Area in which a failure has occurred in a Token Ring, defined by the information contained in a beacon. When a station detects a serious problem with the network (such as a cable break), it sends a beacon frame that includes the station reporting the failure, its NAUN, and everything in between. Beaconing in turn initiates a process called autoreconfiguration. See also autoreconfiguration, beacon, and NAUN. fan-out unit Device that allows multiple devices on a network to communicate using a single network attachment. fantail Panel of I/O connectors that attaches to an equipment rack, providing easy access for data connections to a LightStream 2020 ATM switch. See also applique. Fast Ethernet Any of a number of 100-Mbps Ethernet specifications. Fast Ethernet offers a speed increase ten times that of the 10BASET Ethernet specification, while preserving such qualities as frame format, MAC mechanisms, and MTU. Such similarities allow the use of existing 10BASE-T applications and network management tools on Fast Ethernet networks. Based on an extension to the IEEE 802.3 specification. Compare with Ethernet. See also 100BASE-FX, 100BASE-T, 100BASE-T4, 100BASE-TX, 100BASE-X, and IEEE 802.3. Fast Ethernet Interface Processor See FEIP. Fast Sequenced Transport See FST. Fast Serial Interface Processor See FSIP. fast switching Cisco feature whereby a route cache is used to expedite packet switching through a router. Contrast with slow switching. fault management One of five categories of network management defined by ISO for management of OSI networks. Fault management attempts to ensure that network faults are detected and controlled. See also accounting management, configuration management, performance management, and security management. FCC Federal Communications Commission. U.S. government agency that supervises, licenses, and controls electronic and electromagnetic transmission standards. fcload function card load. Low-level software module in the LightStream 2020 ATM switch that is invoked by higher-level modules to load software from the NP to a function card. F - 62 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. FCS frame check sequence. Refers to the extra characters added to a frame for error control purposes. Used in HDLC, Frame Relay, and other data link layer protocols. FDDI Fiber Distributed Data Interface. LAN standard, defined by ANSI X3T9.5, specifying a 100-Mbps token-passing network using fiber-optic cable, with transmission distances of up to 2 km. FDDI uses a dual-ring architecture to provide redundancy. Compare with CDDI and FDDI II. FDDI II ANSI standard that enhances FDDI. FDDI II provides isochronous transmission for connectionless data circuits and connection-oriented voice and video circuits. Compare with FDDI. FDDI Interface Processor See FIP. FDM frequency-division multiplexing. Technique whereby information from multiple channels can be allocated bandwidth on a single wire based on frequency. Compare with ATDM, statistical multiplexing, and TDM. FECN forward explicit congestion notification. Bit set by a Frame Relay network to inform DTE receiving the frame that congestion was experienced in the path from source to destination. DTE receiving frames with the FECN bit set can request that higher-level protocols take flow-control action as appropriate. Compare with BECN. Federal Communications Commission See FCC. Federal Networking Council See FNC. FEIP Fast Ethernet Interface Processor. Interface processor on the Cisco 7000 series routers. The FEIP supports up to two 100- Mbps 100BASE-T ports. FEP front-end processor. Device or board that provides network interface capabilities for a networked device. In SNA, typically an IBM 3745 device. FF See frame forwarding. Fiber Distributed Data Interface See FDDI. fiber-optic cable Physical medium capable of conducting modulated light transmission. Compared with other transmission media, fiberoptic cable is more expensive, but is not susceptible to electromagnetic interference, and is capable of higher data rates. Sometimes called optical fiber. fiber-optic interrepeater link See FOIRL. F - 63 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. FID0 format indicator 0. One of several formats that an SNA TH can use. An FID0 TH is used for communication between an SNA node and a non-SNA node. See also TH. FID1 format indicator 1. One of several formats that an SNA TH can use. An FID1 TH encapsulates messages between two subarea nodes that do not support virtual and explicit routes. See also TH. FID2 format indicator 2. One of several formats that an SNA TH can use. An FID2 TH is used for transferring messages between a subarea node and a PU 2, using local addresses. See also TH. FID3 Format indicator 3. One of several formats that an SNA TH can use. An FID3 TH is used for transferring messages between a subarea node and a PU 1, using local addresses. See also TH. FID4 format indicator 4. One of several formats that an SNA TH can use. An FID4 TH encapsulates messages between two subarea nodes that are capable of supporting virtual and explicit routes. See also TH. field-replaceable unit See FRU. file transfer Popular network application that allows files to be moved from one network device to another. File Transfer, Access, and Management See FTAM. File Transfer Protocol See FTP. filter Generally, a process or device that screens network traffic for certain characteristics, such as source address, destination address, or protocol, and determines whether to forward or discard that traffic based on the established criteria. FIP FDDI Interface Processor. Interface processor on the Cisco 7000 series routers. The FIP supports SASs, DASs, dual homing, and optical bypass, and contains a 16-mips processor for high-speed (100-Mbps) interface rates. The FIP complies with ANSI and ISO FDDI standards. firewall Router or access server, or several routers or access servers, designated as a buffer between any connected public networks and a private network. A firewall router uses access lists and other methods to ensure the security of the private network. firmware Software instructions set permanently or semipermanently in ROM. fish tape Retractable coil of steel tape used to guide cable through a wall from above or below. flapping Routing problem where an advertised route between two nodes alternates (flaps) back and forth between two paths due to a network problem that causes intermittent interface failures. F - 64 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. Flash memory Technology developed by Intel and licensed to other semiconductor companies. Flash memory is nonvolatile storage that can be electrically erased and reprogrammed. Allows software images to be stored, booted, and rewritten as necessary. flash update Routing update sent asynchronously in response to a change in the network topology. Compare with routing update. fldsup account One of the four default user accounts that are created in the factory on each LightStream 2020 ATM switch. The fldsup account is for the use of field service personnel. Its default interface is the bash shell. See also bash. flooding Traffic passing technique used by switches and bridges in which traffic received on an interface is sent out all of the interfaces of that device except the interface on which the information was originally received. flow Stream of data traveling between two endpoints across a network (for example, from one LAN station to another). Multiple flows can be transmitted on a single circuit. flow control Technique for ensuring that a transmitting entity, such as a modem, does not overwhelm a receiving entity with data. When the buffers on the receiving device are full, a message is sent to the sending device to suspend the transmission until the data in the buffers has been processed. In IBM networks, this technique is called pacing. FM frequency modulation. Modulation technique in which signals of different frequencies represent different data values. Compare with AM and PAM. See also modulation. FNC Federal Networking Council. Group responsible for assessing and coordinating U.S. federal agency networking policies and needs. FOIRL fiber-optic interrepeater link. Fiber-optic signaling methodology based on the IEEE 802.3 fiber-optic specification. FOIRL is a precursor of the 10BASE-FL specification, which is designed to replace it. See also 10BASE-FL. format indicator 0 See FID0. format indicator 1 See FID1. format indicator 2 See FID2. format indicator 3 See FID3. format indicator 4 See FID4. forward channel Communications path carrying information from the call initiator to the called party. F - 65 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. forward delay interval Amount of time an interface spends listening for topology change information after that interface has been activated for bridging and before forwarding actually begins. forward explicit congestion notification See FECN. forwarding Process of sending a frame toward its ultimate destination by way of an internetworking device. forwarding priority See transmit priority. Fourier transform Technique used to evaluate the importance of various frequency cycles in a time series pattern. four-part dotted notation See dot address. fractional T1 See channelized T1. FRAD Frame Relay access device. Any network device that provides a connection between a LAN and a Frame Relay WAN. See also Cisco FRAD and FRAS. fragment Piece of a larger packet that has been broken down to smaller units. fragmentation Process of breaking a packet into smaller units when transmitting over a network medium that cannot support the original size of the packet. See also reassembly. frame Logical grouping of information sent as a data link layer unit over a transmission medium. Often refers to the header and trailer, used for synchronization and error control, that surround the user data contained in the unit. The terms datagram, message, packet, and segment are also used to describe logical information groupings at various layers of the OSI reference model and in various technology circles. frame check sequence See FCS. frame forwarding Interface on the LightStream 2020 ATM switch that allows any traffic based on HDLC or SDLC frames to traverse the ATM network. Frame forwarding circuits are port-to-port, and only one PVC is allowed between a pair of ports. Frame forwarding is supported by the low-speed interface module, which offers V.35, EIA/TIA-449, or X.21 physical interfaces. Sometimes abbreviated FF. Frame Relay Industry-standard, switched data link layer protocol that handles multiple virtual circuits using HDLC encapsulation between connected devices. Frame Relay is more efficient than X.25, the protocol for which it is generally considered a replacement. See also X.25. Frame Relay Access Device See FRAD. Frame Relay Access Support See FRAS. F - 66 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. Frame Relay bridging Bridging technique, described in RFC 1490, that uses the same spanning-tree algorithm as other bridging functions, but allows packets to be encapsulated for transmission across a Frame Relay network. frame switch See LAN switch. FRAS Frame Relay Access Support. Cisco IOS software feature that allows SDLC, Token Ring, Ethernet, and Frame Relayattached IBM devices to connect to other IBM devices across a Frame Relay network. See also FRAD. free-trade zone Part of an AppleTalk internetwork that is accessible by two other parts of the internetwork that are unable to directly access one another. frequency Number of cycles, measured in hertz, of an alternating current signal per unit time. frequency-division multiplexing See FDM. frequency modulation See FM. from switch unit See FSU. front end Node or software program that requests services of a back end. See also back end, client, and server. front-end processor See FEP. FRU field-replaceable unit. Hardware component that can be removed and replaced by Cisco-certified service providers. Typical FRUs include cards, power supplies, and chassis components. FSIP Fast Serial Interface Processor. The default serial interface processor for Cisco 7000 series routers. The FSIP provides four or eight high-speed serial ports. FST Fast Sequenced Transport. Connectionless, sequenced transport protocol that runs on top of the IP protocol. SRB traffic is encapsulated inside of IP datagrams and is passed over an FST connection between two network devices (such as routers). Speeds up data delivery, reduces overhead, and improves the response time of SRB traffic. FSU from switch unit. Subsystem of each line card on a LightStream 2020 ATM switch that accepts calls from the switch card, verifies their checksums, and passes them to the reassembly unit. The FSU selectively drops cells if the network becomes congested. F - 67 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. FTAM File Transfer, Access, and Management. In OSI, an application layer protocol developed for network file exchange and management between diverse types of computers. FTP File Transfer Protocol. Application protocol, part of the TCP/IP protocol stack, used for transferring files between network nodes. FTP is defined in RFC 959. full duplex Capability for simultaneous data transmission between a sending station and a receiving station. Compare with half duplex and simplex. full mesh Term describing a network in which devices are organized in a mesh topology, with each network node having either a physical circuit or a virtual circuit connecting it to every other network node. A full mesh provides a great deal of redundancy, but because it can be prohibitively expensive to implement, it is usually reserved for network backbones. See also mesh and partial mesh. function card Line card or an NP card in a LightStream 2020 ATM switch. function card load See fcload. Fuzzball Digital Equipment Corporation LSI-11 computer system running IP gateway software. The NSFnet used these systems as backbone packet switches. G - 68 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. G Term Definition G.703/G.704 ITU-T electrical and mechanical specifications for connections between telephone company equipment and DTE using BNC connectors and operating at E1 data rates. G.804 ITU-T framing standard that defines the mapping of ATM cells into the physical medium. gateway In the IP community, an older term referring to a routing device. Today, the term router is used to describe nodes that perform this function, and gateway refers to a special-purpose device that performs an application layer conversion of information from one protocol stack to another. Compare with router. Gateway Discovery Protocol See GDP. gateway host In SNA, a host node that contains a gateway SSCP. gateway NCP NCP that connects two or more SNA networks and performs address translation to allow cross-network session traffic. Gateway-to-Gateway Protocol See GGP. GB gigabyte. GBps gigabytes per second. Gb gigabit. Gbps gigabits per second. GDP Gateway Discovery Protocol. Cisco protocol that allows hosts to dynamically detect the arrival of new routers as well as determine when a router goes down. Based on UDP. See also UDP. generic routing encapsulation See GRE. Get Nearest Server See GNS. GGP Gateway-to-Gateway Protocol. MILNET protocol specifying how core routers (gateways) should exchange reachability and routing information. GGP uses a distributed shortest-path algorithm. GHz gigahertz. G - 69 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. GID global information distribution. Process that runs on the NP of every LightStream 2020 ATM switch in a network. GID maintains a database and keeps nodes in the network apprised of changes in topology such as ports, cards, and nodes being added or removed, and trunks going up or down. This information is supplied by the ND process. Sometimes called global information distribution daemon, or GIDD. See also ND. GIDD global information distribution daemon. See GID. gigabit Abbreviated Gb. gigabits per second Abbreviated Gbps. gigabyte Abbreviated GB. gigabytes per second Abbreviated GBps. gigahertz Abbreviated GHz. global configuration database See configuration database. global information distribution See GID. global information distribution daemon See GID. GNS Get Nearest Server. Request packet sent by a client on an IPX network to locate the nearest active server of a particular type. An IPX network client issues a GNS request to solicit either a direct response from a connected server or a response from a router that tells it where on the internetwork the service can be located. GNS is part of the IPX SAP. See also IPX and SAP (Service Advertisement Protocol). GOSIP Government OSI Profile. U.S. government procurement specification for OSI protocols. Through GOSIP, the government has mandated that all federal agencies standardize on OSI and implement OSI-based systems as they become commercially available. Government OSI Profile See GOSIP. grade of service Measure of telephone service quality based on the probability that a call will encounter a busy signal during the busiest hours of the day. graphical user interface See GUI. GRE generic routing encapsulation. Tunneling protocol developed by Cisco that can encapsulate a wide variety of protocol packet types inside IP tunnels, creating a virtual point-to-point link to Cisco routers at remote points over an IP internetwork. By connecting multiprotocol subnetworks in a single-protocol backbone environment, IP tunneling using GRE allows network expansion across a single-protocol backbone environment. ground Electrically neutral contact point. G - 70 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. ground loop Arrangement that exists when a multi-path connection exists between computers. Usually this occurs when computers are connected to each other through a ground wire and when computers are attached to the same network using twisted pair cable. ground station Collection of communications equipment designed to receive signals from (and usually transmit signals to) satellites. Also called a downlink station. group address See multicast address. group delay See distortion delay. guard band Unused frequency band between two communications channels that provides separation of the channels to prevent mutual interference. GUI graphical user interface User environment that uses pictorial as well as textual representations of the input and output of applications and the hierarchical or other data structure in which information is stored. Conventions such as buttons, icons, and windows are typical, and many actions are performed using a pointing device (such as a mouse). Microsoft Windows and the Apple Macintosh are prominent examples of platforms utilizing a GUI. gutter Type of wall-mounted channel with removable cover used to support horizontal cabling. Gutter is big enough to hold several cables. H - 71 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. H Term Definition half duplex Capability for data transmission in only one direction at a time between a sending station and a receiving station. Compare with full duplex and simplex. hammer drill Tool resembling an oversized electric drill used for drilling into masonry. As it turns the bit, it hammers rapidly. handshake Sequence of messages exchanged between two or more network devices to ensure transmission synchronization. hardware address See MAC address. HBD3 Line code type used on E1 circuits. HCC horizontal cross-connect. Wiring closet where the horizontal cabling connects to a patch panel which is connected by backbone cabling to the main distribution facility. H channel high-speed channel. Full-duplex ISDN primary rate channel operating at 384 Kbps. Compare with B channel, D channel, and E channel. HDLC High-Level Data Link Control. Bit-oriented synchronous data link layer protocol developed by ISO. Derived from SDLC, HDLC specifies a data encapsulation method on synchronous serial links using frame characters and checksums. See also SDLC. headend The end point of a broadband network. All stations transmit toward the headend; the headend then transmits toward the destination stations. header Control information placed before data when encapsulating that data for network transmission. Compare with trailer. See also PCI. header checksum Field within an IP datagram that indicates the integrity check on the header. heartbeat See SQE. HELLO Interior routing protocol used principally by NSFnet nodes. HELLO allows particular packet switches to discover minimal delay routes. Not to be confused with the Hello protocol. hello packet Multicast packet that is used by routers for neighbor discovery and recovery. Hello packets also indicate that a client is still operating and network-ready. H - 72 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. Hello protocol Protocol used by OSPF systems for establishing and maintaining neighbor relationships. Not to be confused with HELLO. helper address Address configured on an interface to which broadcasts received on that interface will be sent. HEPnet High-Energy Physics Network. Research network that originated in the United States, but that has spread to most places involved in high-energy physics. Well-known sites include Argonne National Laboratory, Brookhaven National Laboratory, Lawrence Berkeley Laboratory, and the Stanford Linear Accelerator Center (SLAC). hertz Measure of frequency, abbreviated Hz. Synonymous with cycles per second. heterogeneous network Network consisting of dissimilar devices that run dissimilar protocols and in many cases support dissimilar functions or applications. hexadecimal Base 16. A number representation using the digits 0 through 9, with their usual meaning, plus the letters A through F to represent hexadecimal digits with values of 10 to 15. The rightmost digit counts ones, the next counts multiples of 16, then 16^2=256, etc. hierarchical routing Routing based on a hierarchical addressing system. For example, IP routing algorithms use IP addresses, which contain network numbers, subnet numbers, and host numbers. hierarchical star topology Extended star topology where a central hub is connected by vertical cabling to other hubs that are dependent on it. High-Energy Physics Network See HEPnet. High-Level Data Link Control See HDLC. High Performance Computing and Communications See HPCC. High Performance Computing Systems See HPCS. High-Performance Parallel Interface See HIPPI. High Performance Routing See HPR. High-Speed Communications Interface See HSCI. High-Speed Serial Interface See HSSI. highway See bus. H - 73 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. HIP HSSI Interface Processor. Interface processor on the Cisco 7000 series routers. The HIP provides one HSSI port that supports connections to ATM, SMDS, Frame Relay, or private lines at speeds up to T3 or E3. HIPPI High-Performance Parallel Interface. High-performance interface standard defined by ANSI. HIPPI is typically used to connect supercomputers to peripherals and other devices. HLEN Number of 32-bit words in the header. holddown State into which a route is placed so that routers will neither advertise the route nor accept advertisements about the route for a specific length of time (the holddown period). Holddown is used to flush bad information about a route from all routers in the network. A route is typically placed in holddown when a link in that route fails. homologation Conformity of a product or specification to international standards, such as ITU-T, CSA, TUV, UL, or VCCI. Enables portability across company and international boundaries. hop Term describing the passage of a data packet between two network nodes (for example, between two routers). See also hop count. hop count Routing metric used to measure the distance between a source and a destination. RIP uses hop count as its sole metric. See also hop and RIP. horizontal cross connect See HCC. host Computer system on a network. Similar to the term node except that host usually implies a computer system, whereas node generally applies to any networked system, including access servers and routers. See also node. host address See host number. host node SNA subarea node that contains an SSCP. host number Part of an IP address that designates which node on the subnetwork is being addressed. Also called a host address. Hot Standby Router Protocol See HSRP. hot swapping See OIR and power-on servicing. hot wire Ungrounded lead wire that connects the transformer and electrical devices or appliances via an electrical outlet and power plug. HPCC High Performance Computing and Communications. U.S. government funded program advocating advances in computing, communications, and related fields. The HPCC is designed to ensure U.S. leadership in these fields through H - 74 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. education, research and development, industry collaboration, and implementation of high-performance technology. The five components of the HPCC are ASTA, BRHR, HPCS, IITA, and NREN. HPCS High Performance Computing Systems. Component of the HPCC program designed to ensure U.S. technological leadership in high-performance computing through research and development of computing systems and related software. See also HPCC. HPR High Performance Routing. Second-generation routing algorithm for APPN. HPR provides a connectionless layer with nondisruptive routing of sessions around link failures, and a connection-oriented layer with end-to-end flow control, error control, and sequencing. Compare to ISR. See also APPN. HSCI High-Speed Communications Interface. Single-port interface, developed by Cisco, providing full-duplex synchronous serial communications capability at speeds up to 52 Mbps. HSRP Hot Standby Router Protocol. Provides high network availability and transparent network topology changes. HSRP creates a Hot Standby router group with a lead router that services all packets sent to the Hot Standby address. The lead router is monitored by other routers in the group, and if it fails, one of these standby routers inherits the lead position and the Hot Standby group address. HSSI High-Speed Serial Interface. Network standard for high-speed (up to 52 Mbps) serial connections over WAN links. HSSI Interface Processor See HIP. HTML Hypertext markup language. Simple hypertext document formatting language that uses tags to indicate how a given part of a document should be interpreted by a viewing application, such as a WWW browser. See also hypertext and WWW browser. hub 1) Generally, a term used to describe a device that serves as the center of a star-topology network. 2) Hardware or software device that contains multiple independent but connected modules of network and internetwork equipment. Hubs can be active (where they repeat signals sent through them) or passive (where they do not repeat, but merely split, signals sent through them). 3) In Ethernet and IEEE 802.3, an Ethernet multiport repeater, sometimes referred to as a concentrator. hybrid network Internetwork made up of more than one type of network technology, including LANs and WANs. H - 75 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. hypertext Electronically-stored text that allows direct access to other texts by way of encoded links. Hypertext documents can be created using HTML, and often integrate images, sound, and other media that are commonly viewed using a WWW browser. See also HTML and WWW browser. hypertext markup language See HTML. Hz See hertz. I - 76 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. I Term Definition IAB Internet Architecture Board. Board of internetwork researchers who discuss issues pertinent to Internet architecture. Responsible for appointing a variety of Internet-related groups such as the IANA, IESG, and IRSG. The IAB is appointed by the trustees of the ISOC. See also IANA, IESG, IRSG, and ISOC. IANA Internet Assigned Numbers Authority. Organization operated under the auspices of the ISOC as a part of the IAB. IANA delegates authority for IP address-space allocation and domain-name assignment to the NIC and other organizations. IANA also maintains a database of assigned protocol identifiers used in the TCP/IP stack, including autonomous system numbers. See also IAB, ISOC, and NIC. ICC IDF that connects the horizontal cross-connect to the main cross-connect. See horizontal cross-connect. See main crossconnect. ICD International Code Designator. One of two ATM address formats developed by the ATM Forum for use by private networks. Adapted from the subnetwork model of addressing in which the ATM layer is responsible for mapping network layer addresses to ATM addresses. See also DCC. ICMP Internet Control Message Protocol. Network layer Internet protocol that reports errors and provides other information relevant to IP packet processing. Documented in RFC 792. ICMP Router Discovery Protocol See IRDP. Identification, Flags, Frag Offset Field within an IP datagram that provides fragmentation of datagrams to allow differing MTUs in the internet. IDF intermediate distribution facility. Secondary communications room for a building using a star networking topology. The IDF is dependent on the MDF. See also MDF . IDI initial domain identifier. In OSI, the portion of the NSAP that specifies the domain. IDN International Data Number. See X.121. IDP initial domain part. The part of a CLNS address that contains an authority and format identifier and a domain identifier. I - 77 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. IDPR Interdomain Policy Routing. Interdomain routing protocol that dynamically exchanges policies between autonomous systems. IDPR encapsulates interautonomous system traffic and routes it according to the policies of each autonomous system along the path. IDPR is currently an IETF proposal. See also policy routing. IDRP IS-IS Interdomain Routing Protocol. OSI protocol that specifies how routers communicate with routers in different domains. IEC International Electrotechnical Commission. Industry group that writes and distributes standards for electrical products and components. IEEE Institute of Electrical and Electronics Engineers. Professional organization whose activities include the development of communications and network standards. IEEE LAN standards are the predominant LAN standards today. IEEE 802.1 IEEE specification that describes an algorithm that prevents bridging loops by creating a spanning tree. The algorithm was invented by Digital Equipment Corporation. The Digital algorithm and the IEEE 802.1 algorithm are not exactly the same, nor are they compatible. See also spanning tree, spanning-tree algorithm, and Spanning-Tree Protocol. IEEE 802.12 IEEE LAN standard that specifies the physical layer and the MAC sublayer of the data link layer. IEEE 802.12 uses the demand priority media-access scheme at 100 Mbps over a variety of physical media. See also 100VG-AnyLAN. IEEE 802.2 IEEE LAN protocol that specifies an implementation of the LLC sublayer of the data link layer. IEEE 802.2 handles errors, framing, flow control, and the network layer (Layer 3) service interface. Used in IEEE 802.3 and IEEE 802.5 LANs. See also IEEE 802.3 and IEEE 802.5. IEEE 802.3 IEEE LAN protocol that specifies an implementation of the physical layer and the MAC sublayer of the data link layer. IEEE 802.3 uses CSMA/CD access at a variety of speeds over a variety of physical media. Extensions to the IEEE 802.3 standard specify implementations for Fast Ethernet. Physical variations of the original IEEE 802.3 specification include 10BASE2, 10BASE5, 10BASE-F, 10BASE-T, and 10Broad36. Physical variations for Fast Ethernet include 100BASE-T, 100BASE-T4, and 100BASE-X. IEEE 802.3i Physical variation of the original IEEE 802.3 specification that calls for using Ethernet type signaling over twisted pair networking media. The standard sets the signaling speed at 10 megabits per second using a baseband signaling scheme transmitted over twisted pair cable employing a star or extended star topology. See 10BASE2, 10BASE5, 10BASE-F, 10BASE-T, and 10Broad36. I - 78 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. IEEE 802.4 IEEE LAN protocol that specifies an implementation of the physical layer and the MAC sublayer of the data link layer. IEEE 802.4 uses token-passing access over a bus topology and is based on the token bus LAN architecture. See also token bus. IEEE 802.5 IEEE LAN protocol that specifies an implementation of the physical layer and MAC sublayer of the data link layer. IEEE 802.5 uses token passing access at 4 or 16 Mbps over STP cabling and is similar to IBM Token Ring. See also Token Ring. IEEE 802.6 IEEE MAN specification based on DQDB technology. IEEE 802.6 supports data rates of 1.5 to 155 Mbps. See also DQDB. IESG Internet Engineering Steering Group. Organization, appointed by the IAB, that manages the operation of the IETF. See also IAB and IETF. IETF Internet Engineering Task Force. Task force consisting of over 80 working groups responsible for developing Internet standards. The IETF operates under the auspices of ISOC. See also ISOC. IFIP International Federation for Information Processing. Research organization that performs OSI prestandardization work. Among other accomplishments, IFIP formalized the original MHS model. See also MHS. IGMP Internet Group Management Protocol. Used by IP hosts to report their multicast group memberships to an adjacent multicast router. See also multicast router. IGP Interior Gateway Protocol. Internet protocol used to exchange routing information within an autonomous system. Examples of common Internet IGPs include IGRP, OSPF, and RIP. See also IGRP, OSPF, and RIP. IGRP Interior Gateway Routing Protocol. IGP developed by Cisco to address the problems associated with routing in large, heterogeneous networks. Compare with Enhanced IGRP. See also IGP, OSPF, and RIP. IIH IS-IS Hello. Message sent by all IS-IS systems to maintain adjacencies. See also IS-IS. IITA Information Infrastructure Technology and Applications. Component of the HPCC program intended to ensure U.S. leadership in the development of advanced information technologies. See also HPCC. ILMI Interim Local Management Interface. Specification developed by the ATM Forum for incorporating network-management capabilities into the ATM UNI. I - 79 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. IMP interface message processor. Old name for ARPANET packet switches. An IMP is now referred to as a PSN (packet-switch node). See also PSN (packet-switch node). in-band signaling Transmission within a frequency range normally used for information transmission. Compare with out-of-band signaling. Industry-Standard Architecture See ISA. Information Infrastructure Technology and Applications See IITA. infrared Electromagnetic waves whose frequency range is above that of microwaves, but below that of the visible spectrum. LAN systems based on this technology represent an emerging technology. initial domain identifier See IDI. initial domain part See IDP. INOC Internet Network Operations Center. BBN group that in the early days of the Internet monitored and controlled the Internet core gateways (routers). INOC no longer exists in this form. input/output See I/O. Institute of Electrical and Electronics Engineers See IEEE. insulator Any material with a high resistance to electrical current. See conductor. insured burst The largest burst of data above the insured rate that will be temporarily allowed on a PVC and not tagged by the traffic policing function for dropping in the case of network congestion. The insured burst is specified in bytes or cells. Compare with maximum burst. See also insured rate. insured rate The long-term data throughput, in bits or cells per second, that an ATM network commits to support under normal network conditions. The insured rate is 100 percent allocated; the entire amount is deducted from the total trunk bandwidth along the path of the circuit. Compare with excess rate and maximum rate. See also insured burst. insured traffic Traffic within the insured rate specified for the PVC. This traffic should not be dropped by the network under normal network conditions. See also CLP and insured rate. I - 80 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. Integrated IS-IS Routing protocol based on the OSI routing protocol IS-IS, but with support for IP and other protocols. Integrated IS-IS implementations send only one set of routing updates, making it more efficient than two separate implementations. Formerly referred to as Dual IS-IS. Compare with IS-IS. Integrated Services Digital Network See ISDN. interarea routing Term used to describe routing between two or more logical areas. Compare with intra-area routing. Interdomain Policy Routing See IDPR. interface 1) Connection between two systems or devices. 2) In routing terminology, a network connection. 3) In telephony, a shared boundary defined by common physical interconnection characteristics, signal characteristics, and meanings of interchanged signals. 4) The boundary between adjacent layers of the OSI model. interface message processor See IMP. interface module Combination of a line card and an access card that together allow you to connect a LightStream 2020 ATM switch to other devices. interface processor Any of a number of processor modules used in the Cisco 7000 series routers. See AIP, CIP, EIP, FEIP, FIP, FSIP, HIP, MIP, SIP (Serial Interface Processor), and TRIP. interference Unwanted communication channel noise. Interim Local Management Interface See ILMI. Interior Gateway Protocol See IGP. Interior Gateway Routing Protocol See IGRP. intermediate cross connect See ICC. intermediate distribution facility See IDF. intermediate routing node See IRN. Intermediate Session Routing See ISR. intermediate system See IS. Intermediate System-to-Intermediate System See IS-IS. International Centers (Class 1 offices) A variation of Regional Centers that have lines that span across multiple countries. I - 81 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. International Code Designator See ICD. International Data Number See X.121. International Electrotechnical Commission See IEC. International Federation for Information Processing See IFIP. International Organization for Standardization See ISO. International Standards Organization Erroneous expansion of the acronym ISO. See ISO. International Telecommunication Union Telecommunication Standardization Sector See ITU-T. Internet Term used to refer to the largest global internetwork, connecting tens of thousands of networks worldwide and having a "culture" that focuses on research and standardization based on real-life use. Many leading-edge network technologies come from the Internet community. The Internet evolved in part from ARPANET. At one time, called the DARPA Internet. Not to be confused with the general term internet. See also ARPANET. internet Short for internetwork. Not to be confused with the Internet. See internetwork. Internet Architecture Board See IAB. Internet address See IP address. Internet Assigned Numbers Authority See IANA. Internet Control Message Protocol See ICMP. Internet Engineering Steering Group See IESG. Internet Engineering Task Force See IETF. Internet Group Management Protocol See IGMP. Internet Network Operations Center See INOC. Internet Protocol See IP. Internet protocol Any protocol that is part of the TCP/IP protocol stack. See TCP/IP. Internet Research Steering Group See IRSG. Internet Research Task Force See IRTF. I - 82 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. Internet Society See ISOC. internetwork Collection of networks interconnected by routers and other devices that functions (generally) as a single network. Sometimes called an internet, which is not to be confused with the Internet. internetworking General term used to refer to the industry that has arisen around the problem of connecting networks together. The term can refer to products, procedures, and technologies. Internetwork Packet Exchange See IPX. interNIC Organization that serves the Internet community by supplying user assistance, documentation, training, registration service for Internet domain names, and other services. Formerly called Network Information Center (NIC). interoperability Ability of computing equipment manufactured by different vendors to communicate with one another successfully over a network. Inter-Switching System Interface See ISSI. intra-area routing Term used to describe routing within a logical area. Compare with interarea routing. Inverse Address Resolution Protocol See Inverse ARP. Inverse ARP Inverse Address Resolution Protocol. Method of building dynamic routes in a network. Allows an access server to discover the network address of a device associated with a virtual circuit. I/O input/output. IOS See Cisco IOS software. IP Internet Protocol. Network layer protocol in the TCP/IP stack offering a connectionless internetwork service. IP provides features for addressing, type-of-service specification, fragmentation and reassembly, and security. Documented in RFC 791. IP access-group Command that links an existing access list to an outbound interface. I - 83 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. IP address 1) 32-bit address assigned to hosts using TCP/IP. An IP address belongs to one of five classes (A, B, C, D, or E) and is written as 4 octets separated with periods (dotted decimal format). Each address consists of a network number, an optional subnetwork number, and a host number. The network and subnetwork numbers together are used for routing, while the host number is used to address an individual host within the network or subnetwork. A subnet mask is used to extract network and subnetwork information from the IP address. Also called an Internet address. 2) Command used to establish the logical network address of this interface. See also IP and subnet mask. IPCP IP Control Protocol. Protocol that establishes and configures IP over PPP. See also IP and PPP. IP host Command used to make a static name-to-address entry in the router’s configuration file. IP multicast Routing technique that allows IP traffic to be propagated from one source to a number of destinations or from many sources to many destinations. Rather than sending one packet to each destination, one packet is sent to a multicast group identified by a single IP destination group address. IP name-server Command used to define which hosts can provide the name service. IP options Field within an IP datagram that deals with network testing, debugging, security, and others. IPSO IP Security Option. U.S. government specification that defines an optional field in the IP packet header that defines hierarchical packet security levels on a per interface basis. IPX Internetwork Packet Exchange. NetWare network layer (Layer 3) protocol used for transferring data from servers to workstations. IPX is similar to IP and XNS. IPXWAN Protocol that negotiates end-to-end options for new links. When a link comes up, the first IPX packets sent across are IPXWAN packets negotiating the options for the link. When the IPXWAN options have been successfully determined, normal IPX transmission begins. Defined by RFC 1362. IRDP ICMP Router Discovery Protocol. Enables a host to determine the address of a router that it can use as a default gateway. Similar to ESIS, but used with IP. See also ES-IS. IRN intermediate routing node. In SNA, a subarea node with intermediate routing capability. IRSG Internet Research Steering Group. Group that is part of the IAB and oversees the activities of the IRTF. See also IAB and IRTF. I - 84 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. IRTF Internet Research Task Force. Community of network experts that consider Internet-related research topics. The IRTF is governed by the IRSG and is considered a subsidiary of the IAB. See also IAB and IRSG. IS intermediate system. Routing node in an OSI network. ISA Industry-Standard Architecture. 16-bit bus used for Intel-based personal computers. See also EISA. isarithmic flow control Flow control technique in which permits travel through the network. Possession of these permits grants the right to transmit. Isarithmic flow control is not commonly implemented. ISDN Integrated Services Digital Network. Communication protocol, offered by telephone companies, that permits telephone networks to carry data, voice, and other source traffic. See also BISDN, BRI, N-ISDN, and PRI. IS-IS Intermediate System-to-Intermediate System. OSI link-state hierarchical routing protocol based on DECnet Phase V routing whereby ISs (routers) exchange routing information based on a single metric to determine network topology. Compare with Integrated IS-IS. See also ES-IS and OSPF. IS-IS Hello See IIH. IS-IS Interdomain Routing Protocol See IDRP. ISO International Organization for Standardization. International organization that is responsible for a wide range of standards, including those relevant to networking. ISO developed the OSI reference model, a popular networking reference model. ISO 3309 HDLC procedures developed by ISO. ISO 3309:1979 specifies the HDLC frame structure for use in synchronous environments. ISO 3309:1984 specifies proposed modifications to allow the use of HDLC in asynchronous environments as well. ISO 9000 Set of international quality-management standards defined by ISO. The standards, which are not specific to any country, industry, or product, allow companies to demonstrate that they have specific processes in place to maintain an efficient quality system. ISOC Internet Society. International nonprofit organization, founded in 1992, that coordinates the evolution and use of the Internet. In addition, ISOC delegates authority to other groups related to the Internet, such as the IAB. ISOC is headquartered in Reston, Virginia, U.S.A. See also IAB. I - 85 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. isochronous transmission Asynchronous transmission over a synchronous data link. Isochronous signals require a constant bit rate for reliable transport. Compare with asynchronous transmission, plesiochronous transmission, and synchronous transmission. ISODE ISO development environment. Large set of libraries and utilities used to develop upper-layer OSI protocols and applications. ISO development environment See ISODE. ISR Intermediate Session Routing. Initial routing algorithm used in APPN. ISR provides node-to-node connection-oriented routing. Network outages cause sessions to fail because ISR cannot provide nondisruptive rerouting around a failure. ISR has been replaced by HPR. Compare with HPR. See also APPN. ISSI Inter-Switching System Interface. Standard interface between SMDS switches. ITU-T International Telecommunication Union Telecommunication Standardization Sector. International Telecommunication Union Telecommunication Standardization Sector (ITU-T) (formerly the Committee for Internatiional Telegraph and Telephone ([CCITT]). An international organization that develops communication standards. See also CCITT. J - 86 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. J Term Definition jabber 1) Error condition in which a network device continually transmits random, meaningless data onto the network. 2) In IEEE 802.3, a data packet whose length exceeds that prescribed in the standard. JANET Joint Academic Network. X.25 WAN connecting university and research institutions in the United Kingdom. Japan UNIX Network See JUNET. jitter Analog communication line distortion caused by the variation of a signal from its reference timing positions. Jitter can cause data loss, particularly at high speeds. John von Neumann Computer Network See JvNCnet. Joint Academic Network See JANET. jumper 1) Term used for patchcords found in a wiring closet. 2) Electrical switch consisting of a number of pins and a connector that can be attached to the pins in a variety of different ways. Different circuits are created by attaching the connector to different pins. JUNET Japan UNIX Network. Nationwide, noncommercial network in Japan, designed to promote communication between Japanese and other researchers. JvNCnet John von Neumann Computer Network. Regional network, owned and operated by Global Enterprise Services, Inc., composed of T1 and slower serial links providing midlevel networking services to sites in the Northeastern United States. K - 87 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. K Term Definition Karn's algorithm Algorithm that improves round-trip time estimations by helping transport layer protocols distinguish between good and bad round-trip time samples. KB kilobyte. Kb kilobit. kBps kilobytes per second. kbps kilobits per second. keepalive interval Period of time between each keepalive message sent by a network device. keepalive message Message sent by one network device to inform another network device that the virtual circuit between the two is still active. Kermit Popular file-transfer and terminal-emulation program. KERN kernel trap logging facility. Process that runs on each NP of every LightStream 2020 ATM switch in a network. KERN converts LynxOS kernel messages, sent to the console, into SNMP messages. kilobit Abbreviated Kb. kilobits per second Abbreviated kbps. kilobyte Abbreviated kB. kilobytes per second Abbreviated kBps. L - 88 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. L Term Definition label swapping Routing algorithm used by APPN in which each router that a message passes through on its way to its destination independently determines the best path to the next router. LAN local-area network. High-speed, low-error data network covering a relatively small geographic area (up to a few thousand meters). LANs connect workstations, peripherals, terminals, and other devices in a single building or other geographically limited area. LAN standards specify cabling and signaling at the physical and data link layers of the OSI model. Ethernet, FDDI, and Token Ring are widely used LAN technologies. Compare with MAN and WAN. LANE LAN emulation. Technology that allows an ATM network to function as a LAN backbone. The ATM network must provide multicast and broadcast support, address mapping (MAC-toATM), SVC management, and a usable packet format. LANE also defines Ethernet and Token Ring ELANs. See also ELAN. LAN emulation See LANE. LAN Emulation Client See LEC. LAN Emulation Configuration Server See LECS. LAN Emulation Server See LES. LAN Extender Any of the products in the Cisco 1000 series. Cisco LAN Extenders provide a transparent connection between a central site and a remote site, logically extending the central network to include the remote LAN. LAN Extender products support all standard network protocols and are configured and managed through a host router at the central site, requiring no technical expertise at the remote end. See also Cisco 1000. LAN Manager Distributed NOS, developed by Microsoft, that supports a variety of protocols and platforms. LAN Manager for UNIX See LM/X. LAN Network Manager See LNM. LAN Server Server-based NOS developed by IBM and derived from LNM. See also LNM. L - 89 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. LAN switch High-speed switch that forwards packets between data-link segments. Most LAN switches forward traffic based on MAC addresses. This variety of LAN switch is sometimes called a frame switch. LAN switches are often categorized according to the method they use to forward traffic: cut-through packet switching or store-and-forward packet switching. Multilayer switches are an intelligent subset of LAN switches. An example of a LAN switch is the Cisco Catalyst 5000. Compare with multilayer switch. See also cut-through packet switching and store and forward packet switching. LAPB Link Access Procedure, Balanced. Data link layer protocol in the X.25 protocol stack. LAPB is a bit-oriented protocol derived from HDLC. See also HDLC and X.25. LAPD Link Access Procedure on the D channel. ISDN data link layer protocol for the D channel. LAPD was derived from the LAPB protocol and is designed primarily to satisfy the signaling requirements of ISDN basic access. Defined by ITU-T Recommendations Q.920 and Q.921. LAPM Link Access Procedure for Modems. ARQ used by modems implementing the V.42 protocol for error correction. See also ARQ and V.42. laser light amplification by stimulated emission of radiation. Analog transmission device in which a suitable active material is excited by an external stimulus to produce a narrow beam of coherent light that can be modulated into pulses to carry data. Networks based on laser technology are sometimes run over SONET. LAT local-area transport. A network virtual terminal protocol developed by Digital Equipment Corporation. LATA local access and transport area. Geographic telephone dialing area serviced by a single local telephone company. Calls within LATAs are called "local calls." There are well over 100 LATAs in the United States. latency 1) Delay between the time a device requests access to a network and the time it is granted permission to transmit. 2) Delay between the time when a device receives a frame and the time that frame is forwarded out the destination port. LCC line card control. Process that runs on the NP for each CLC, LSC, and MSC of a LightStream 2020 ATM switch. LCC establishes VCCs, maintains the link management protocol for the line card, continually monitors line quality on each trunk using TUD, and performs other functions. See also ECC. LCI logical channel identifier. See VCN. LCN logical channel number. See VCN. L - 90 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. LCP link control protocol. Protocol that establishes, configures, and tests data-link connections for use by PPP. See also PPP. leaf internetwork In a star topology, an internetwork whose sole access to other internetworks in the star is through a core router. learning bridge Bridge that performs MAC address learning to reduce traffic on the network. Learning bridges manage a database of MAC addresses and the interfaces associated with each address. See also MAC address learning. leased line Transmission line reserved by a communications carrier for the private use of a customer. A leased line is a type of dedicated line. See also dedicated line. LEC 1) LAN Emulation Client. Entity in an end system that performs data forwarding, address resolution, and other control functions for a single ES within a single ELAN. A LEC also provides a standard LAN service interface to any higher-layer entity that interfaces to the LEC. Each LEC is identified by a unique ATM address, and is associated with one or more MAC addresses reachable through that ATM address. See also ELAN and LES. 2) local exchange carrier. Local or regional telephone company that owns and operates a telephone network and the customer lines that connect to it. LECS LAN Emulation Configuration Server. Entity that assigns individual LANE clients to particular ELANs by directing them to the LES that corresponds to the ELAN. There is logically one LECS per administrative domain, and this serves all ELANs within that domain. See also ELAN. LED light emitting diode. Semiconductor device that emits light produced by converting electrical energy. Status lights on hardware devices are typically LEDs. LEN node low-entry networking node. In SNA, a PU 2.1 that supports LU protocols, but whose CP cannot communicate with other nodes. Because there is no CP-to-CP session between a LEN node and its NN, the LEN node must have a statically defined image of the APPN network. LES LAN Emulation Server. Entity that implements the control function for a particular ELAN. There is only one logical LES per ELAN, and it is identified by a unique ATM address. See also ELAN. Level 1 router Device that routes traffic within a single DECnet or OSI area. Level 2 router Device that routes traffic between DECnet or OSI areas. All Level 2 routers must form a contiguous network. light amplification by stimulated emission of radiation See laser. L - 91 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. light emitting diode See LED. limited resource link Resource defined by a device operator to remain active only when being used. limited-route explorer packet See spanning explorer packet. line 1) In SNA, a connection to the network. 2) See link. line card Card on a LightStream 2020 ATM switch that, together with its access card, provides I/O services for the switch. There are four types of line cards: CLC, LSC, MSC, and PLC. line card control See LCC. line code type One of a number of coding schemes used on serial lines to maintain data integrity and reliability. The line code type used is determined by the carrier service provider. See also AMI, B8ZS, and HBD3. line conditioning Use of equipment on leased voice-grade channels to improve analog characteristics, thereby allowing higher transmission rates. line console 0 Command used to establish a password on the console terminal. line driver Inexpensive amplifier and signal converter that conditions digital signals to ensure reliable transmissions over extended distances. Line Interface See LINF. line of sight Characteristic of certain transmission systems such as laser, microwave, and infrared systems in which no obstructions in a direct path between transmitter and receiver can exist. line printer daemon See LPD. line turnaround Time required to change data transmission direction on a telephone line. line vty 0 4 Command used to establish password protection on incoming Telnet sessions. LINF Line Interface. Interface card used on the LightStream 100 ATM switch. The LINF receives cells sent over a line, checks them for errors, and forwards them toward their destination. L - 92 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. link Network communications channel consisting of a circuit or transmission path and all related equipment between a sender and a receiver. Most often used to refer to a WAN connection. Sometimes referred to as a line or a transmission link. Link Access Procedure, Balanced See LAPB. Link Access Procedure for Modems See LAPM. Link Access Procedure on the D channel See LAPD. link layer See data link layer. link-layer address See MAC address. link-state advertisement See LSA. link-state packet See LSA. link state routing algorithm Routing algorithm in which each router broadcasts or multicasts information regarding the cost of reaching each of its neighbors to all nodes in the internetwork. Link state algorithms create a consistent view of the network and are therefore not prone to routing loops, but they achieve this at the cost of relatively greater computational difficulty and more widespread traffic (compared with distance vector routing algorithms). Compare with distance vector routing algorithm. See also Dijkstra's algorithm. little-endian Method of storing or transmitting data in which the least significant bit or byte is presented first. Compare with bigendian. LLC Logical Link Control. Higher of the two data link layer sublayers defined by the IEEE. The LLC sublayer handles error control, flow control, framing, and MAC-sublayer addressing. The most prevalent LLC protocol is IEEE 802.2, which includes both connectionless and connection-oriented variants. See also data link layer and MAC. LLC 2 Connection-oriented OSI LLC-sublayer protocol. See also LLC. LMI Local Management Interface. Set of enhancements to the basic Frame Relay specification. LMI includes support for a keepalive mechanism, which verifies that data is flowing; a multicast mechanism, which provides the network server with its local DLCI and the multicast DLCI; global addressing, which gives DLCIs global rather than local significance in Frame Relay networks; and a status mechanism, which provides an on-going status report on the DLCIs known to the switch. Known as LMT in ANSI terminology. LMT See LMI. L - 93 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. LM/X LAN Manager for UNIX. Monitors LAN devices in UNIX environments. LNM LAN Network Manager. SRB and Token Ring management package provided by IBM. Typically running on a PC, it monitors SRB and Token Ring devices, and can pass alerts up to NetView. load balancing In routing, the ability of a router to distribute traffic over all its network ports that are the same distance from the destination address. Good load-balancing algorithms use both line speed and reliability information. Load balancing increases the utilization of network segments, thus increasing effective network bandwidth. local access and transport area See LATA. local acknowledgment Method whereby an intermediate network node, such as a router, responds to acknowledgments for a remote end host. Use of local acknowledgments reduces network overhead and, therefore, the risk of time-outs. Also known as local termination. local-area network See LAN. local-area transport See LAT. local bridge Bridge that directly interconnects networks in the same geographic area. local database See configuration database. local exchange carrier See LEC. local explorer packet Generated by an end system in an SRB network to find a host connected to the local ring. If the local explorer packet fails to find a local host, the end system produces either a spanning explorer packet or an all-routes explorer packet. See also allroutes explorer packet, explorer packet, and spanning explorer packet. local loop Line from the premises of a telephone subscriber to the telephone company CO. Local Management Interface See LMI. LocalTalk Apple proprietary baseband protocol that operates at the data link and physical layers of the OSI reference model. LocalTalk uses CSMA/CD media access scheme and supports transmissions at speeds of 230 Kbps. local termination See local acknowledgment. L - 94 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. local traffic filtering Process by which a bridge filters out (drops) frames whose source and destination MAC addresses are located on the same interface on the bridge, thus preventing unnecessary traffic from being forwarded across the bridge. Defined in the IEEE 802.1 standard. See also IEEE 802.1. logical address See network address. logical channel Nondedicated, packet-switched communications path between two or more network nodes. Packet switching allows many logical channels to exist simultaneously on a single physical channel. logical channel identifier See LCI. logical channel number See LCN. Logical Link Control See LLC. Logical Link Control, type 2 See LLC2. logical unit See LU. Logical Unit 6.2 See LU 6.2. loop Route where packets never reach their destination, but simply cycle repeatedly through a constant series of network nodes. loopback test Test in which signals are sent and then directed back toward their source from some point along the communications path. Loopback tests are often used to test network interface usability. lossy Characteristic of a network that is prone to lose packets when it becomes highly loaded. low-entry networking node See LEN node. low-speed line card See LSC. LPD line printer daemon. Protocol used to send print jobs between UNIX systems. LSA link-state advertisement. Broadcast packet used by link-state protocols that contains information about neighbors and path costs. LSAs are used by the receiving routers to maintain their routing tables. Sometimes called a link-state packet (LSP). LSC low-speed line card. Card on the LightStream 2020 ATM switch that can be configured as an edge or a trunk card. An LSC, in conjunction with an access card, supports eight trunk or edge ports (Frame Relay or frame forwarding) at individual port speeds up to 3.584 Mbps, or an aggregate rate of 6 Mbps per line card. See also edge card, MSC, and trunk card. L - 95 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. LSP link-state packet. See LSA. LU logical unit. Primary component of SNA, an LU is an NAU that enables end users to communicate with each other and gain access to SNA network resources. LU 6.2 logical unit 6.2. In SNA, an LU that provides peer-to-peer communication between programs in a distributed computing environment. APPC runs on LU 6.2 devices. See also APPC. LynxOS Real-time, UNIX-like operating system that runs on the NP of a LightStream 2020 ATM switch. M - 96 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. M Term Definition MAC Media Access Control. Lower of the two sublayers of the data link layer defined by the IEEE. The MAC sublayer handles access to shared media, such as whether token passing or contention will be used. See also data link layer and LLC. MAC address Standardized data link layer address that is required for every port or device that connects to a LAN. Other devices in the network use these addresses to locate specific ports in the network and to create and update routing tables and data structures. MAC addresses are 6 bytes long and are controlled by the IEEE. Also known as a hardware address, a MAC-layer address, or a physical address. Compare with network address. MAC address learning Service that characterizes a learning bridge, in which the source MAC address of each received packet is stored so that future packets destined for that address can be forwarded only to the bridge interface on which that address is located. Packets destined for unrecognized addresses are forwarded out every bridge interface. This scheme helps minimize traffic on the attached LANs. MAC address learning is defined in the IEEE 802.1 standard. See also learning bridge and MAC address. MacIP Network layer protocol that encapsulates IP packets in DDS or transmission over AppleTalk. MacIP also provides proxy ARP services. MAC-layer address See MAC address. Main cross connect See MCC. Main distribution facility See MDF. Maintenance Operation Protocol See MOP. MAN metropolitan-area network. Network that spans a metropolitan area. Generally, a MAN spans a larger geographic area than a LAN, but a smaller geographic area than a WAN. Compare with LAN and WAN. managed object In network management, a network device that can be managed by a network management protocol. Management Information Base See MIB. management services SNA functions distributed among network components to manage and control an SNA network. M - 97 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. Manchester encoding Digital coding scheme, used by IEEE 802.3 and Ethernet, in which a mid-bit-time transition is used for clocking, and a 1 is denoted by a high level during the first half of the bit time. Manufacturing Automation Protocol See MAP. MAP Manufacturing Automation Protocol. Network architecture created by General Motors to satisfy the specific needs of the factory floor. MAP specifies a token-passing LAN similar to IEEE 802.4. See also IEEE 802.4. mask See address mask and subnet mask. master management agent See MMA. MAU media attachment unit. Device used in Ethernet and IEEE 802.3 networks that provides the interface between the AUI port of a station and the common medium of the Ethernet. The MAU, which can be built into a station or can be a separate device, performs physical layer functions including the conversion of digital data from the Ethernet interface, collision detection, and injection of bits onto the network. Sometimes referred to as a media access unit, also abbreviated MAU, or as a transceiver. In Token Ring, a MAU is known as a multistation access unit and is usually abbreviated MSAU to avoid confusion. See also AUI and MSAU. maximum burst Specifies the largest burst of data above the insured rate that will be allowed temporarily on an ATM PVC, but will not be dropped at the edge by the traffic policing function, even if it exceeds the maximum rate. This amount of traffic will be allowed only temporarily; on average, the traffic source needs to be within the maximum rate. Specified in bytes or cells. Compare with insured burst. See also maximum rate. maximum rate Maximum total data throughput allowed on a given virtual circuit, equal to the sum of the insured and uninsured traffic from the traffic source. The uninsured data might be dropped if the network becomes congested. The maximum rate, which cannot exceed the media rate, represents the highest data throughput the virtual circuit will ever deliver, measured in bits or cells per second. Compare with excess rate and insured rate. See also maximum burst. maximum transmission unit See MTU. MB megabyte. Mb megabit. MBONE multicast backbone. The multicast backbone of the Internet. MBONE is a virtual multicast network composed of multicast LANs and the point-to-point tunnels that interconnect them. Mbps megabits per second. M - 98 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. MCA micro channel architecture. Bus interface commonly used in PCs and some UNIX workstations and servers. MCC main cross-connect. Wiring closet that serves as the most central point in a star topology and where LAN backbone cabling connects to the Internet. MCI Multiport Communications Interface. Card on the AGS+ that provides two Ethernet interfaces and up to two synchronous serial interfaces. The MCI processes packets rapidly, without the interframe delays typical of other Ethernet interfaces. MCR minimum cell rate. Parameter defined by the ATM Forum for ATM traffic management. MCR is defined only for ABR transmissions, and specifies the minimum value for the ACR. See also ABR (available bit rate), ACR, and PCR. MD5 Message Digest 5. Algorithm used for message authentication in SNMP v.2. MD5 verifies the integrity of the communication, authenticates the origin, and checks for timeliness. See also SNMP2. MDF main distribution facility. Primary communications room for a building. Central point of a star networking topology where patch panels, hub, and router are located. See also IDF. media Plural of medium. The various physical environments through which transmission signals pass. Common network media include twisted-pair, coaxial and fiber-optic cable, and the atmosphere (through which microwave, laser, and infrared transmission occurs). Sometimes called physical media. Media Access Control See MAC. Media Access Control Address See MAC address. media access unit See MAU. media attachment unit See MAU. media interface connector See MIC. media rate Maximum traffic throughput for a particular media type. medium See media. medium-speed line card See MSC. megabit Abbreviated Mb. megabits per second Abbreviated Mbps. megabyte Abbreviated MB. M - 99 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. mesh Network topology in which devices are organized in a manageable, segmented manner with many, often redundant, interconnections strategically placed between network nodes. See also full mesh and partial mesh. message Application layer (Layer 7) logical grouping of information, often composed of a number of lower-layer logical groupings such as packets. The terms datagram, frame, packet, and segment are also used to describe logical information groupings at various layers of the OSI reference model and in various technology circles. message handling system See MHS. Message Digest 5 See MD5. Message Queuing Interface See MQI. message switching Switching technique involving transmission of messages from node to node through a network. The message is stored at each node until such time as a forwarding path is available. Contrast with circuit switching and packet switching. message unit Unit of data processed by any network layer. Metal oxide varister See MOV. metasignaling Process running at the ATM layer that manages signaling types and virtual circuits. metering See traffic shaping. metric See routing metric. metropolitan-area network See MAN. MGS Cisco midrange multiprotocol router designed for medium to small regional and district environments. The MGS is a 4-slot router that can handle up to 11 interfaces of different types. MHS message handling system. ITU-T X.400 recommendations that provide message handling services for communications between distributed applications. NetWare MHS is a different (though similar) entity that also provides message-handling services. See also IFIP. MIB Management Information Base. Database of network management information that is used and maintained by a network management protocol such as SNMP or CMIP. The value of a MIB object can be changed or retrieved using SNMP or CMIP commands. MIB objects are organized in a tree structure that includes public (standard) and private (proprietary) branches. M - 100 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. MIB collection Polling technique used by the SNMP protocol to gather information needed to monitor the network. MIB reporting Technique used by the CMIP protocol to obtain information needed to monitor the network. It is dependent upon network devices to initiate reports regarding their status to a central monitoring station on the network. MIC media interface connector. FDDI de facto standard connector. micro channel architecture See MCA. microcode Translation layer between machine instructions and the elementary operations of a computer. Microcode is stored in ROM and allows the addition of new machine instructions without requiring that they be designed into electronic circuits when new instructions are needed. microsegmentation Division of a network into smaller segments, usually with the intention of increasing aggregate bandwidth to network devices. micron Unit of measure equal to one millionth of a meter or one thousandth of a millimeter. Sometimes the symbol µ is used instead of the word micron. microwave Electromagnetic waves in the range 1 to 30 GHz. Microwavebased networks are an evolving technology gaining favor due to high bandwidth and relatively low cost. midsplit Broadband cable system in which the available frequencies are split into two groups: one for transmission and one for reception. Military Network See MILNET. millions of instructions per second See mips. MILNET Military Network. Unclassified portion of the DDN. Operated and maintained by the DISA. See also DDN and DISA. minimum cell rate See MCR. MIP MultiChannel Interface Processor. Interface processor on the Cisco 7000 series routers that provides up to two channelized T1 or E1 connections via serial cables to a CSU. The two controllers on the MIP can each provide up to 24 T1 or 30 E1 channel-groups, with each channel-group presented to the system as a serial interface that can be configured individually. mips millions of instructions per second. Number of instructions executed by a processor per second. M - 101 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. MMA master management agent. SNMP agent that runs on the NP of a LightStream 2020 ATM switch. MMA translates between an external network manager using SNMP and the internal switch management mechanisms. modem modulator-demodulator. Device that converts digital and analog signals. At the source, a modem converts digital signals to a form suitable for transmission over analog communication facilities. At the destination, the analog signals are returned to their digital form. Modems allow data to be transmitted over voice-grade telephone lines. modem eliminator Device allowing connection of two DTE devices without modems. modulation Process by which the characteristics of electrical signals are transformed to represent information. Types of modulation include AM, FM, and PAM. See also AM, FM, and PAM. modulator-demodulator See modem. monitor Management tool on the LightStream 2020 ATM switch that allows a user to examine individual nodes in the network and learn the status of interface modules and power supplies. The monitor is an HP OpenView-based application that runs on an NMS. monomode fiber See single-mode fiber. MOP Maintenance Operation Protocol. Digital Equipment Corporation protocol, a subset of which is supported by Cisco, that provides a way to perform primitive maintenance operations on DECnet systems. For example, MOP can be used to download a system image to a diskless station. Mosaic Public-domain WWW browser, developed at the National Center for Supercomputing Applications (NCSA). See also WWW browser. MOSPF Multicast OSPF. Intradomain multicast routing protocol used in OSPF networks. Extensions are applied to the base OSPF unicast protocol to support IP multicast routing. MOV metal oxide varistor. Voltage clamping surge suppressor capable of absorbing large currents without damage. MQI Message Queuing Interface. International standard API that provides functionality similar to that of the RPC interface. In contrast to RPC, MQI is implemented strictly at the application layer. See also RPC. M - 102 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. MSAU multistation access unit. Wiring concentrator to which all end stations in a Token Ring network connect. The MSAU provides an interface between these devices and the Token Ring interface of, for example, a Cisco 7000 TRIP. Sometimes abbreviated MAU. MSC medium-speed line card. Card on the LightStream 2020 ATM switch that can be configured as an edge or a trunk card. The MSC, in conjunction with an access card, supports two trunk or edge (UNI) ports at data rates up to T3 or E3. MTU maximum transmission unit. Maximum packet size, in bytes, that a particular interface can handle. mu-law North American companding standard used in conversion between analog and digital signals in PCM systems. Similar to the European alaw. See also a-law and companding. multiaccess network Network that allows multiple devices to connect and communicate simultaneously. multicast Single packets copied by the network and sent to a specific subset of network addresses. These addresses are specified in the destination address field. Compare with broadcast and unicast. multicast address Single address that refers to multiple network devices. Synonymous with group address. Compare with broadcast address and unicast address. See also multicast. multicast backbone See MBONE. multicast group Dynamically determined group of IP hosts identified by a single IP multicast address. Multicast OSPF See MOSPF. multicast router Router used to send IGMP query messages on their attached local networks. Host members of a multicast group respond to a query by sending IGMP reports noting the multicast groups to which they belong. The multicast router takes responsibility for forwarding multicast datagrams from one multicast group to all other networks that have members in the group. See also IGMP. multicast server Establishes a one-to-many connection to each device in a VLAN, thus establishing a broadcast domain for each VLAN segment. The multicast server forwards incoming broadcasts only to the multicast address that maps to the broadcast address. MultiChannel Interface Processor See MIP. M - 103 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. multidrop line Communications line having multiple cable access points. Sometimes called a multipoint line. multihomed host Host attached to multiple physical network segments in an OSI CLNS network. multihoming Addressing scheme in IS-IS routing that supports assignment of multiple area addresses. multilayer switch Switch that filters and forwards packets based on MAC addresses and network addresses. A subset of LAN switch. The Catalyst 5000 is an example of a multilayer switch. Compare with LAN switch. multimode fiber Optical fiber supporting propagation of multiple frequencies of light. See also single-mode fiber. multiple domain network SNA network with multiple SSCPs. See also SSCP. multiplexing Scheme that allows multiple logical signals to be transmitted simultaneously across a single physical channel. Compare with demultiplexing. multipoint line See multidrop line. Multiport Communications Interface See MCI. multistation access unit See MSAU. multivendor network Network using equipment from more than one vendor. Multivendor networks pose many more compatibility problems than single-vendor networks. Compare with single-vendor network. N - 104 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. N Term Definition Nagle's algorithm Actually two separate congestion control algorithms that can be used in TCP-based networks. One algorithm reduces the sending window; the other limits small datagrams. NAK negative acknowledgment. Response sent from a receiving device to a sending device indicating that the information received contained errors. Compare to acknowledgment. Name Binding Protocol See NBP. name caching Method by which remotely discovered host names are stored by a router for use in future packet-forwarding decisions to allow quick access. name resolution Generally, the process of associating a name with a network location. name server Server connected to a network that resolves network names into network addresses. NAP network access point. Location for interconnection of Internet service providers in the United States for the exchange of packets. narrowband See baseband. Narrowband ISDN See N-ISDN. National Bureau of Standards See NBS. National Institute of Standards and Technology See NIST. National Research and Education Network See NREN. National Science Foundation See NSF. National Science Foundation Network See NSFNET. native client interface architecture See NCIA. NAU network addressable unit. SNA term for an addressable entity. Examples include LUs, PUs, and SSCPs. NAUs generally provide upper-level network services. Compare with path control network. NAUN nearest active upstream neighbor. In Token Ring or IEEE 802.5 networks, the closest upstream network device from any given device that is still active. N - 105 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. NBMA nonbroadcast multiaccess. Term describing a multiaccess network that either does not support broadcasting (such as X.25) or in which broadcasting is not feasible (for example, an SMDS broadcast group or an extended Ethernet that is too large). See also multiaccess network. NBP Name Binding Protocol. AppleTalk transport-level protocol that translates a character string name into an internetwork address. NBS National Bureau of Standards. Organization that was part of the U.S. Department of Commerce. Now known as NIST. See also NIST. NCIA native client interface architecture. SNA applications-access architecture, developed by Cisco, that combines the full functionality of native SNA interfaces at both the host and client with the flexibility of leveraging TCP/IP backbones. NCIA encapsulates SNA traffic on a client PC or workstation, thereby providing direct TCP/IP access while preserving the native SNA interface at the end-user level. In many networks, this capability obviates the need for a standalone gateway and can provide flexible TCP/IP access while preserving the native SNA interface to the host. NCP 1)Network Control Protocol. In SNA, a program that routes and controls the flow of data between a communications controller (in which it resides) and other network resources. 2) Network Control Protocol. Series of protocols for establishing and configuring different network layer protocols, such as for AppleTalk over PPP. See also PPP. NCP/Token Ring Interconnection See NTRI. ND neighborhood discovery. Process that runs on the NP of each LightStream 2020 ATM switch in the ATM network. For call routing purposes, every node in the network needs to know about changes in network topology, such as trunks and ports going up or down. ND learns about such changes at the chassis level and forwards this information to the GID process, which sends the information throughout the network. Sometimes referred to as neighborhood discovery daemon, or NDD. See also GID. NDD neighborhood discovery daemon. See ND. NDIS network driver interface specification. Specification for a generic, hardware- and protocol-independent device driver for NICs. Produced by Microsoft. nearest active upstream neighbor See NAUN. N - 106 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. NEARNET Regional network in New England (United States) that links Boston University, Harvard University, and MIT. Now part of BBN Planet. See also BBN Planet. negative acknowledgment See NAK. neighborhood discovery See ND. neighborhood discovery daemon See ND. neighboring routers In OSPF, two routers that have interfaces to a common network. On multiaccess networks, neighbors are dynamically discovered by the OSPF Hello protocol. NET network entity title. Network addresses, defined by the ISO network architecture, and used in CLNS-based networks. net Short for network. NetBIOS Network Basic Input/Output System. API used by applications on an IBM LAN to request services from lower-level network processes. These services might include session establishment and termination, and information transfer. NETscout Cisco network management application that provides an easyto-use GUI for monitoring RMON statistics and protocol analysis information. NETscout also provides extensive tools that simplify data collection, analysis, and reporting. These tools allow system administrators to monitor traffic, set thresholds, and capture data on any set of network traffic for any segment. NetView IBM network management architecture and related applications. NetView is a VTAM application used for managing mainframes in SNA networks. See also VTAM. NetWare Popular distributed NOS developed by Novell. Provides transparent remote file access and numerous other distributed network services. NetWare Link Services Protocol See NLSP. NetWare Loadable Module See NLM. network 1) Collection of computers, printers, routers, switches, and other devices that are able to communicate with each other over some transmission medium. 2) Command that assigns a NIC-based address to which the router is directly connected. 3) Command that specifies any directly connected networks to be included. N - 107 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. network access point See NAP. network access server See access server. network address Network layer address referring to a logical, rather than a physical, network device. Also called a protocol address. Compare with MAC address. network addressable unit See NAU. network administrator Person responsible for the operation, maintenance, and management of a network. See also network operator. network analyzer Network monitoring device that maintains statistical information regarding the status of the network and each device attached to it. More sophisticated versions using artificial intelligence can detect, define, and fix problems on the network. Network Basic Input/Output System See NetBIOS. Network Control Program See NCP. network driver interface specification See NDIS. network entity title See NET. Network File System See NFS. Network Information Center Organization whose functions have been assumed by the InterNIC. See InterNIC. Network Information Service See NIS. network interface Boundary between a carrier network and a privately-owned installation. network interface card See NIC. network layer Layer 3 of the OSI reference model. This layer provides connectivity and path selection between two end systems. The network layer is the layer at which routing occurs. Corresponds roughly with the path control layer of the SNA model. See also application layer, data link layer, physical layer, presentation layer, session layer, and transport layer. network management Generic term used to describe systems or actions that help maintain, characterize, or troubleshoot a network. Network Management Processor See NMP. network management system See NMS. network management vector transport See NMVT. Network-to-Network Interface See NNI. N - 108 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. network node See NN. Network Node Server SNA NN that provides resource location and route selection services for ENs, LEN nodes, and LUs that are in its domain. network number Part of an IP address that specifies the network to which the host belongs. network operating system See NOS. Network Operations Center See NOC. network operator Person who routinely monitors and controls a network, performing such tasks as reviewing and responding to traps, monitoring throughput, configuring new circuits, and resolving problems. See also network administrator. network processor card See NP card. network service access point See NSAP. networking Connecting of any collection of computers, printers, routers, switches, and other devices for the purpose of communication over some transmission medium. neutral wire Circuit wire that is connected to an earth ground at the power plant and at the transformer. Next Hop Resolution Protocol See NHRP. NFS Network File System. As commonly used, a distributed file system protocol suite developed by Sun Microsystems that allows remote file access across a network. In actuality, NFS is simply one protocol in the suite. NFS protocols include NFS, RPC, XDR (External Data Representation), and others. These protocols are part of a larger architecture that Sun refers to as ONC. See also ONC. NHRP Next Hop Resolution Protocol. Protocol used by routers to dynamically discover the MAC address of other routers and hosts connected to a NBMA network. These systems can then directly communicate without requiring traffic to use an intermediate hop, increasing performance in ATM, Frame Relay, SMDS, and X.25 environments. NIC network interface card. Board that provides network communication capabilities to and from a computer system. Also called an adapter. See also AUI. 2.) See network information center. NIS Network Information Service. Protocol developed by Sun Microsystems for the administration of network-wide databases. The service essentially uses two programs: one for finding a NIS server and one for accessing the NIS databases. N - 109 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. N-ISDN Narrowband ISDN. Communication standards developed by the ITU-T for baseband networks. Based on 64-kbps B channels and 16- or 64-kbps D channels. Contrast with BISDN. See also BRI, ISDN, and PRI. NIST National Institute of Standards and Technology. Formerly the NBS, this U.S. government organization supports and catalogs a variety of standards. See also NBS. NLM NetWare Loadable Module. Individual program that can be loaded into memory and function as part of the NetWare NOS. NLSP NetWare Link Services Protocol. Link-state routing protocol based on IS-IS. The Cisco implementation of NLSP also includes MIB variables and tools to redistribute routing and SAP information between NLSP and other IPX routing protocols. See also IS-IS. NMP Network Management Processor. Processor module on the Catalyst 5000 switch used to control and monitor the switch. NMS network management system. System responsible for managing at least part of a network. An NMS is generally a reasonably powerful and well-equipped computer such as an engineering workstation. NMSs communicate with agents to help keep track of network statistics and resources. NMVT network management vector transport. SNA message consisting of a series of vectors conveying network management specific information. NN network node. SNA intermediate node that provides connectivity, directory services, route selection, intermediate session routing, data transport, and network management services to LEN nodes and ENs. The NN contains a CP that manages the resources of both the NN itself and those of the ENs and LEN nodes in its domain. NNs provide intermediate routing services by implementing the APPN PU 2.1 extensions. Compare with EN. See also CP. NNI Network-to-Network Interface. ATM Forum standard that defines the interface between two ATM switches that are both located in a private network or are both located in a public network. The interface between a public switch and private one is defined by the UNI standard. Also, the standard interface between two Frame Relay switches meeting the same criteria. Compare with UNI. no ip domain lookup Command used to turn off name-to-address translation in the router. NOC Network Operations Center. Organization responsible for maintaining a network. N - 110 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. node 1) Endpoint of a network connection or a junction common to two or more lines in a network. Nodes can be processors, controllers, or workstations. Nodes, which vary in routing and other functional capabilities, can be interconnected by links, and serve as control points in the network. Node is sometimes used generically to refer to any entity that can access a network, and is frequently used interchangeably with device. See also host. 2) In SNA, the basic component of a network, and the point at which one or more functional units connect channels or data circuits. noise Undesirable communications channel signals. nonbroadcast multiaccess See NBMA. nonreturn to zero See NRZ. nonreturn to zero inverted See NRZI. nonseed router In AppleTalk, a router that must first obtain, and then verify, its configuration with a seed router before it can begin operation. See also seed router. non-stub area Resource-intensive OSPF area that carries a default route, static routes, intra-area routes, interarea routes, and external routes. Nonstub areas are the only OSPF areas that can have virtual links configured across them, and are the only areas that can contain an ASBR. Compare with stub area. See also ASBR and OSPF. nonvolatile random-access memory See NVRAM. normal mode Term used to describe problems between the hot and neutral wires on a power line. See common mode. normal response mode See NRM. Northwest Net NSF-funded regional network serving the Northwestern United States, Alaska, Montana, and North Dakota. Northwest Net connects all major universities in the region as well as many leading industrial concerns. NOS network operating system. Generic term used to refer to what are really distributed file systems. Examples of NOSs include LAN Manager, NetWare, NFS, and VINES. Novell IPX See IPX. npadmin account One of the four default user accounts that are created in the factory on each LightStream 2020 ATM switch. The npadmin account is for privileged users. Its default interface is the CLI. N - 111 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. NP card network processor card. Main computational and storage resource for the LightStream 2020 ATM switch. Each LightStream 2020 switch has one or two NPs. The second card, if present, serves as a backup for the first. Each NP is associated with a floppy disk drive for loading software and a hard disk drive for storing software and configuration data. Each NP also has an access card that provides an Ethernet port. NP TCS monitoring module See NPTMM. NP module On a LightStream 2020 ATM switch, the combination of the NP card, the NP access card, and the disk assembly. See also access card, disk assembly, and NP card. NPTMM NP TCS monitoring module. Process that runs on the NP of every LightStream 2020 ATM switch in an ATM network. NPTMM monitors the health of the system through the TCS and coordinates switch cutover when redundant switch cards are present. See also TCS. NREN National Research and Education Network. Component of the HPCC program designed to ensure U.S. technical leadership in computer communications through research and development efforts in state-of-the-art telecommunications and networking technologies. See also HPCC. NRM normal response mode. HDLC mode for use on links with one primary station and one or more secondary stations. In this mode, secondary stations can transmit only if they first receive a poll from the primary station. NRZ nonreturn to zero. NRZ signals maintain constant voltage levels with no signal transitions (no return to a zero-voltage level) during a bit interval. Compare with NRZI. NRZI nonreturn to zero inverted. NRZI signals maintain constant voltage levels with no signal transitions (no return to a zerovoltage level), but interpret the presence of data at the beginning of a bit interval as a signal transition and the absence of data as no transition. Compare with NRZ. NSAP network service access point. Network addresses, as specified by ISO. An NSAP is the point at which OSI Network Service is made available to a transport layer (Layer 4) entity. NSF National Science Foundation. U.S. government agency that funds scientific research in the United States. The now-defunct NSFNET was funded by the NSF. See also NSFNET. NSFNET National Science Foundation Network. Large network that was controlled by the NSF and provided networking services in support of education and research in the United States, from 1986 to 1995. NSFNET is no longer in service. N - 112 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. NTRI NCP/Token Ring Interconnection. Function used by ACF/NCP to support Token Ring-attached SNA devices. NTRI also provides translation from Token Ring-attached SNA devices (PUs) to switched (dial-up) devices. null modem Small box or cable used to join computing devices directly, rather than over a network. NVRAM Nonvolatile RAM. RAM that retains its contents when a unit is powered off. In Cisco products, NVRAM is used to store configuration information. NYSERNet Network in New York (United States) with a T1 backbone connecting NSF, many universities, and several commercial concerns. O - 113 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. O Term Definition OAM cell Operation, Administration, and Maintenance cell. ATM Forum specification for cells used to monitor virtual circuits. OAM cells provide a virtual circuit-level loopback in which a router responds to the cells, demonstrating that the circuit is up, and the router is operational. OARnet Ohio Academic Resources Network. Internet service provider that connects a number of U.S. sites, including the Ohio supercomputer center in Columbus, Ohio. object instance Network management term referring to an instance of an object type that has been bound to a value. OC optical carrier. Series of physical protocols (OC-1, OC-2, OC-3, and so on), defined for SONET optical signal transmissions. OC signal levels put STS frames onto multimode fiber-optic line at a variety of speeds. The base rate is 51.84 Mbps (OC-1); each signal level thereafter operates at a speed divisible by that number (thus, OC-3 runs at 155.52 Mbps). See also SONET, STS-1, and STS-3c. ODA Open Document Architecture. ISO standard that specifies how documents are represented and transmitted electronically. Formally called Office Document Architecture. ODI Open Data-Link Interface. Novell specification providing a standardized interface for NICs (network interface cards) that allows multiple protocols to use a single NIC. See also NIC (network interface card). OEMI channel See block multiplexer channel. Office Document Architecture See ODA. Ohio Academic Resources Network See OARnet. OIM OSI Internet Management. Group tasked with specifying ways in which OSI network management protocols can be used to manage TCP/IP networks. OIR online insertion and removal. Feature that permits the addition, replacement, or removal of interface processors in a Cisco router without interrupting the system power, entering console commands, or causing other software or interfaces to shut down. Sometimes called hot swapping. See also power-on servicing. ONC Open Network Computing. Distributed applications architecture designed by Sun Microsystems, currently controlled by a consortium led by Sun. The NFS protocols are part of ONC. See also NFS. O - 114 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. ones density Scheme that allows a CSU/DSU to recover the data clock reliably. The CSU/DSU derives the data clock from the data that passes through it. In order to recover the clock, the CSU/DSU hardware must receive at least one 1 bit value for every 8 bits of data that pass through it. Also called pulse density. online insertion and removal See OIR. on-the-fly packet switching See cut-through packet switching. open architecture Architecture with which third-party developers can legally develop products and for which public domain specifications exist. open circuit Broken path along a transmission medium. Open circuits will usually prevent network communication. Open Data-Link Interface See ODI. Open Document Architecture See ODA. Open Network Computing See ONC. Open Shortest Path First See OSPF. Open System Interconnection See OSI. Open System Interconnection reference model See OSI reference model. oper account One of the four default user accounts that are created in the factory on each LightStream 2020 ATM switch. The oper account is for general users. Its default interface is the CLI. Operation, Administration, and Maintenance cell See OAM cell. Option One currently defined: maximum TCP segment size. Optical Carrier See OC. optical fiber See fiber-optic cable. Organizational Unique Identifier See OUI. oscillation Secondary signal on top of the 60-Hz waveform. It has a magnitude that ranges from 15 % to 100 % of the normal voltage carried on the power line. See surge, spike, and sag. OSI Open System Interconnection. International standardization program created by ISO and ITU-T to develop standards for data networking that facilitate multivendor equipment interoperability. OSI Internet Management See OIM. O - 115 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. OSINET International association designed to promote OSI in vendor architectures. OSI reference model Open System Interconnection reference model. Network architectural model developed by ISO and ITU-T. The model consists of seven layers, each of which specifies particular network functions such as addressing, flow control, error control, encapsulation, and reliable message transfer. The highest layer (the application layer) is closest to the user; the lowest layer (the physical layer) is closest to the media technology. The next to lowest layer are implemented in hardware and software, while the upper five layers are implemented only in software. The OSI reference model is used universally as a method for teaching and understanding network functionality. Similar in some respects to SNA. See application layer, data link layer, network layer, physical layer, presentation layer, session layer, and transport layer. OSPF Open Shortest Path First. Link-state, hierarchical IGP routing algorithm proposed as a successor to RIP in the Internet community. OSPF features include least-cost routing, multipath routing, and load balancing. OSPF was derived from an early version of the ISIS protocol. See also Enhanced IGRP, IGP, IGRP, IS-IS, and RIP. OUI Organizational Unique Identifier. The 3 octets assigned by the IEEE in a block of 48-bit LAN addresses. outframe Maximum number of outstanding frames allowed in an SNA PU 2 server at any time. out-of-band signaling Transmission using frequencies or channels outside the frequencies or channels normally used for information transfer. Out-of-band signaling is often used for error reporting in situations in which in-band signaling can be affected by whatever problems the network might be experiencing. Contrast with in-band signaling. P - 116 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. P Term Definition pacing See flow control. packet Logical grouping of information that includes a header containing control information and (usually) user data. Packets are most often used to refer to network layer units of data. The terms datagram, frame, message, and segment are also used to describe logical information groupings at various layers of the OSI reference model and in various technology circles. See also PDU. packet assembler/disassembler See PAD. packet buffer See buffer. packet internet groper See ping. packet level protocol See PLP. packet line card See PLC. packet switch WAN device that routes packets along the most efficient path and allows a communications channel to be shared by multiple connections. Sometimes referred to as a packet switch node (PSN), and formerly called an IMP. See also IMP. packet-switched data network See PSN. packet-switched network See PSN. packet switching Networking method in which nodes share bandwidth with each other by sending packets. Compare with circuit switching and message switching. See also PSN (packet-switched network). packet switch exchange See PSE. packet-switching node See PSN. PAD packet assembler/disassembler. Device used to connect simple devices (like character-mode terminals) that do not support the full functionality of a particular protocol to a network. PADs buffer data and assemble and disassemble packets sent to such end devices. paddle card See access card. Palo Alto Research Center See PARC. PAM pulse amplitude modulation. Modulation scheme where the modulating wave is caused to modulate the amplitude of a pulse stream. Compare with AM and FM. See also modulation. P - 117 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. PAP Password Authentication Protocol. Authentication protocol that allows PPP peers to authenticate one another. The remote router attempting to connect to the local router is required to send an authentication request. Unlike CHAP, PAP passes the password and host name or username in the clear (unencrypted). PAP does not itself prevent unauthorized access, but merely identifies the remote end. The router or access server then determines if that user is allowed access. PAP is supported only on PPP lines. Compare with CHAP. parallel channel Channel that uses bus and tag cables as a transmission medium. Compare with ESCON channel. See also bus and tag channel. parallelism Indicates that multiple paths exist between two points in a network. These paths might be of equal or unequal cost. Parallelism is often a network design goal: if one path fails, there is redundancy in the network to ensure that an alternate path to the same point exists. parallel transmission Method of data transmission in which the bits of a data character are transmitted simultaneously over a number of channels. Compare with serial transmission. PARC Palo Alto Research Center. Research and development center operated by XEROX. A number of widely-used technologies were originally conceived at PARC, including the first personal computers and LANs. PARC Universal Protocol See PUP. parity check Process for checking the integrity of a character. A parity check involves appending a bit that makes the total number of binary 1 digits in a character or word (excluding the parity bit) either odd (for odd parity) or even (for even parity). partial mesh Term describing a network in which devices are organized in a mesh topology, with some network nodes organized in a full mesh, but with others that are only connected to one or two other nodes in the network. A partial mesh does not provide the level of redundancy of a full mesh topology, but is less expensive to implement. Partial mesh topologies are generally used in the peripheral networks that connect to a fully meshed backbone. See also full mesh and mesh. Password Authentication Protocol See PAP. patch panel An assembly of pin locations and ports which can be mounted on a rack or wall bracket in the wiring closet. Patch panels act like switchboards that connect workstations cables to each other and to the outside. P - 118 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. path control layer Layer 3 in the SNA architectural model. This layer performs sequencing services related to proper data reassembly. The path control layer is also responsible for routing. Corresponds roughly with the network layer of the OSI model. See also data flow control layer, data link control layer, physical control layer, presentation services layer, transaction services layer, and transmission control layer. path control network SNA concept that consists of lower-level components that control the routing and data flow through an SNA network and handle physical data transmission between SNA nodes. Compare with NAU. path cost See cost. path name Full name of a UNIX, DOS, or LynxOS file or directory, including all directory and subdirectory names. Consecutive names in a path name are typically separated by a forward slash (/) or a backslash (\), as in /usr/app/base/config. payload Portion of a frame that contains upper-layer information (data). PBX private branch exchange. Digital or analog telephone switchboard located on the subscriber premises and used to connect private and public telephone networks. PCI protocol control information. Control information added to user data to comprise an OSI packet. The OSI equivalent of the term header. See also header. PCM pulse code modulation. Transmission of analog information in digital form through sampling and encoding the samples with a fixed number of bits. PCR peak cell rate. Parameter defined by the ATM Forum for ATM traffic management. In CBR transmissions, PCR determines how often data samples are sent. In ABR transmissions, PCR determines the maximum value of the ACR. See also ABR (available bit rate), ACR, and CBR. PDN public data network. Network operated either by a government (as in Europe) or by a private concern to provide computer communications to the public, usually for a fee. PDNs enable small organizations to create a WAN without all the equipment costs of long-distance circuits. PDU protocol data unit. OSI term for packet. See also BPDU and packet. peak cell rate See PCR. peak rate Maximum rate, in kilobits per second, at which a virtual circuit can transmit. P - 119 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. peer-to-peer computing Peer-to-peer computing calls for each network device to run both client and server portions of an application. Also describes communication between implementations of the same OSI reference model layer in two different network devices. Compare with client-server computing. performance management One of five categories of network management defined by ISO for management of OSI networks. Performance management subsystems are responsible for analyzing and controlling network performance including network throughput and error rates. See also accounting management, configuration management, fault management, and security management. peripheral node In SNA, a node that uses local addresses and is therefore not affected by changes to network addresses. Peripheral nodes require boundary function assistance from an adjacent subarea node. permanent virtual circuit See PVC. permanent virtual connection See PVC. permanent virtual path See PVP. permit processing See traffic policing. P/F poll/final bit. Bit in bit-synchronous data link layer protocols that indicates the function of a frame. If the frame is a command, a 1 in this bit indicates a poll. If the frame is a response, a 1 in this bit indicates that the current frame is the last frame in the response. PGP Pretty Good Privacy. Public-key encryption application that allows secure file and message exchanges. There is some controversy over the development and use of this application, in part due to U.S. national security concerns. phase Location of a position on an alternating wave form. phase shift Situation in which the relative position in time between the clock and data signals of a transmission becomes unsynchronized. In systems using long cables at higher transmission speeds, slight variances in cable construction, temperature, and other factors can cause a phase shift, resulting in high error rates. PHY physical sublayer. One of two sublayers of the FDDI physical layer. See also PMD. physical address See MAC address. physical control layer Layer 1 in the SNA architectural model. This layer is responsible for the physical specifications for the physical links between end systems. Corresponds to the physical layer of the OSI model. See also data flow control layer, data link control layer, path control layer, presentation services layer, transaction services layer, and transmission control layer. P - 120 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. physical layer Layer 1 of the OSI reference model. The physical layer defines the electrical, mechanical, procedural and functional specifications for activating, maintaining, and deactivating the physical link between end systems. Corresponds with the physical control layer in the SNA model. See also application layer, data link layer, network layer, presentation layer, session layer, and transport layer. physical layer convergence procedure See PLCP. physical media See media. physical medium See media. physical medium dependent See PMD. physical sublayer See PHY. physical unit See PU. Physical Unit 2 See PU 2. Physical Unit 2.1 See PU 2.1. Physical Unit 4 See PU 4. Physical Unit 5 See PU 5. Physics Network See PHYSNET. PHYSNET Physics Network. Group of many DECnet-based physics research networks, including HEPnet. See also HEPnet. piggybacking Process of carrying acknowledgments within a data packet to save network bandwidth. PIM Protocol Independent Multicast. Multicast routing architecture that allows the addition of IP multicast routing on existing IP networks. PIM is unicast routing protocol independent and can be operated in two modes: dense mode and sparse mode. See also PIM dense mode and PIM sparse mode. PIM dense mode One of the two PIM operational modes. PIM dense mode is data-driven and resembles typical multicast routing protocols. Packets are forwarded on all outgoing interfaces until pruning and truncation occurs. In dense mode, receivers are densely populated, and it is assumed that the downstream networks want to receive and will probably use the datagrams that are forwarded to them. The cost of using dense mode is its default flooding behavior. Sometimes called dense mode PIM or PIM DM. Contrast with PIM sparse mode. See also PIM. PIM DM See PIM dense mode. PIM SM See PIM sparse mode. P - 121 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. PIM sparse mode One of the two PIM operational modes. PIM sparse mode tries to constrain data distribution so that a minimal number of routers in the network receive it. Packets are sent only if they are explicitly requested at the RP (rendezvous point). In sparse mode, receivers are widely distributed, and the assumption is that downstream networks will not necessarily use the datagrams that are sent to them. The cost of using sparse mode is its reliance on the periodic refreshing of explicit join messages and its need for RPs. Sometimes called sparse mode PIM or PIM SM. Contrast with PIM dense mode. See also PIM and RP (rendezvous point). pin location A color-coded slot on a patch panel. Cable wires are punched down using a punch tool to make an electrical connection that allows the network to function. ping Short for Packet Internet Groper or Packet Inter-network Groper, a utility to determine whether a specific IP address is accessible. It works by sending a packet to the specified address and waiting for a reply. PING is used primarily to troubleshoot Internet connections. ping-ponging Phrase used to describe the actions of a packet in a two-node routing loop. pixel The smallest element of a display image, corresponding to a single displayed spot or color triad on a display, or to a single input spot from a camera. (A word coined from the phrase "picture element.") plain old telephone service See PSTN. PLC packet line card. Card on the LightStream 2020 ATM switch that can be configured only as an edge card. A PLC, in conjunction with an access card, supports up to eight Ethernet or two FDDI edge ports. PLCP physical layer convergence procedure. Specification that maps ATM cells into physical media, such as T3 or E3, and defines certain management information. plesiochronous transmission Term describing digital signals that are sourced from different clocks of comparable accuracy and stability. Compare with asynchronous transmission, isochronous transmission, and synchronous transmission. Packet level protocol Network layer protocol in the X.25 protocol stack. Sometimes called X.25 Level 3 or X.25 Protocol. See also X.25. PLU Primary LU. The LU that is initiating a session with another LU. See also LU. PMD physical medium dependent. Sublayer of the FDDI physical layer that interfaces directly with the physical medium and performs the most basic bit transmission functions of the network. See also PHY. P - 122 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. PNNI Private Network-Network Interface. ATM Forum specification that describes an ATM virtual circuit routing protocol, as well as a signaling protocol between ATM switches. Used to allow ATM switches within a private network to interconnect. Sometimes called Private Network Node Interface. point of presence See POP. Point-to-Point Protocol See PPP. poison reverse updates Routing updates that explicitly indicate that a network or subnet is unreachable, rather than implying that a network is unreachable by not including it in updates. Poison reverse updates are sent to defeat large routing loops. The Cisco IGRP implementation uses poison reverse updates. policy-based routing See policy routing. policy routing Routing scheme that forwards packets to specific interfaces based on user-configured policies. Such policies might specify that traffic sent from a particular network should be forwarded out one interface, while all other traffic should be forwarded out another interface. poll/final bit See P/F. polling Access method in which a primary network device inquires, in an orderly fashion, whether secondaries have data to transmit. The inquiry occurs in the form of a message to each secondary that gives the secondary the right to transmit. POP point of presence. Point of presence is the point of interconnection between the communication facilities provided by the telephone company and the building's main distribution facility. port 1) Interface on an internetworking device (such as a router). 2) In IP terminology, an upper-layer process that is receiving information from lower layers. 3) To rewrite software or microcode so that it will run on a different hardware platform or in a different software environment than that for which it was originally designed. 4. A female plug on a patch panel which accepts the same size plug as an RJ45 jack. Patch cords are used in these ports to cross connect computers wired to the patch panel. It is this cross connection which allows the LAN to function. 4) A female plug on a patch panel which accepts the same size plug as an RJ45 jack. Patch cords are used in these ports to cross connect computers wired to the patch panel. It is this cross connection which allows the LAN to function. P - 123 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. POST power-on self test. Set of hardware diagnostics that runs on a hardware device when that device is powered up. On a LightStream 2020 ATM switch, for example, the NP, switch card, and line card all perform the POST. Post, Telephone, and Telegraph See PTT. POTS plain old telephone service. See PSTN. power-on self test See POST. power-on servicing Feature on the LightStream 2020 ATM switch that allows faulty components to be diagnosed, removed, and replaced while the rest of the switch continues to operate normally. Sometimes abbreviated POS. Sometimes called hot swapping. See also OIR. power tray Power supply for a LightStream 2020 ATM switch. A LightStream 2020 switch can have one or two bulk power trays. In a redundant system, the two power trays load share, but each can power the entire system in the event that the other fails. The power tray can provide either AC or DC power to the switch. PPP Point-to-Point Protocol. A successor to SLIP, PPP provides router-to-router and host-to-network connections over synchronous and asynchronous circuits. See also SLIP. presentation layer Layer 6 of the OSI reference model. This layer ensures that information sent by the application layer of one system will be readable by the application layer of another. The presentation layer is also concerned with the data structures used by programs and therefore negotiates data transfer syntax for the application layer. Corresponds roughly with the presentation services layer of the SNA model. See also application layer, data link layer, network layer, physical layer, session layer, and transport layer. presentation services layer Layer 6 of the SNA architectural model. This layer provides network resource management, session presentation services, and some application management. Corresponds roughly with the presentation layer of the OSI model. See also data flow control layer, data link control layer, path control layer, physical control layer, transaction services layer, and transmission control layer. Pretty Good Privacy See PGP. PRI Primary Rate Interface. ISDN interface to primary rate access. Primary rate access consists of a single 64-Kbps D channel plus 23 (T1) or 30 (E1) B channels for voice or data. Compare to BRI. See also BISDN, ISDN, and N-ISDN. primary See primary station. Primary LU See PLU. P - 124 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. Primary Rate Interface See PRI. primary ring One of the two rings that make up an FDDI or CDDI ring. The primary ring is the default path for data transmissions. Compare with secondary ring. primary station In bit-synchronous data link layer protocols such as HDLC and SDLC, a station that controls the transmission activity of secondary stations and performs other management functions such as error control through polling or other means. Primary stations send commands to secondary stations and receive responses. Also called, simply, a primary. See also secondary station. print server Networked computer system that fields, manages, and executes (or sends for execution) print requests from other network devices. priority queuing Routing feature in which frames in an interface output queue are prioritized based on various characteristics such as packet size and interface type. private branch exchange See PBX. Private Network-Network Interface See PNNI. Private Network Node Interface See PNNI. process switching Operation that provides full route evaluation and per-packet load balancing across parallel WAN links. Involves the transmission of entire frames to the router CPU where they are repackaged for delivery to or from a WAN interface, with the router making a route selection for each packet. Process switching is the most resource-intensive switching operation that the CPU can perform. programmable read-only memory See PROM. PROM programmable read-only memory. ROM that can be programmed using special equipment. PROMs can be programmed only once. Compare with EPROM. propagation delay Time required for data to travel over a network, from its source to its ultimate destination. protocol 1) Formal description of a set of rules and conventions that govern how devices on a network exchange information. 2) Field within an IP datagram that indicates the upper layer (Layer 4) protocol sending the datagram. protocol address See network address. protocol analyzer See network analyzer. protocol control information See PCI. P - 125 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. protocol converter Enables equipment with different data formats to communicate by translating the data transmission code of one device to the data transmission code of another device. protocol data unit See PDU. Protocol Independent Multicast See PIM. protocol stack Set of related communications protocols that operate together and, as a group, address communication at some or all of the seven layers of the OSI reference model. Not every protocol stack covers each layer of the model, and often a single protocol in the stack will address a number of layers at once. TCP/IP is a typical protocol stack. protocol translator Network device or software that converts one protocol into another, similar, protocol. proxy Entity that, in the interest of efficiency, essentially stands in for another entity. proxy Address Resolution Protocol See proxy ARP. proxy ARP proxy Address Resolution Protocol. Variation of the ARP protocol in which an intermediate device (for example, a router) sends an ARP response on behalf of an end node to the requesting host. Proxy ARP can lessen bandwidth use on slowspeed WAN links. See also ARP. proxy explorer Technique that minimizes exploding explorer packet traffic propagating through an SRB network by creating an explorer packet reply cache, the entries of which are reused when subsequent explorer packets need to find the same host. proxy polling Technique that alleviates the load across an SDLC network by allowing routers to act as proxies for primary and secondary nodes, thus keeping polling traffic off of the shared links. Proxy polling has been replaced by SDLC Transport. See SDLC Transport. PSDN packet-switched data network. See PSN (packet-switched network). PSE packet switch exchange. Essentially, a switch. The term PSE is generally used in reference to a switch in an X.25 PSN. See also switch. PSN 1) packet-switched network. Network that utilizes packetswitching technology for data transfer. Sometimes called a packet-switched data network (PSDN). See packet switching. 2) packet-switching node. Network node capable of performing packet switching functions. See also packet switching. PSTN Public Switched Telephone Network. General term referring to the variety of telephone networks and services in place worldwide. Sometimes called plain old telephone service (POTS). P - 126 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. PTT Post, Telephone, and Telegraph. Government agency that provides telephone services. PTTs exist in most areas outside North America and provide both local and long-distance telephone services. PU physical unit. SNA component that manages and monitors the resources of a node, as requested by an SSCP. There is one PU per node. PU 2 Physical Unit 2. SNA peripheral node that can support only DLUs that require services from a VTAM host and that are only capable of performing the secondary LU role in SNA sessions. PU 2.1 Physical Unit type 2.1. SNA network node used for connecting peer nodes in a peer-oriented network. PU 2.1 sessions do not require that one node reside on VTAM. APPN is based upon PU 2.1 nodes, which can also be connected to a traditional hierarchical SNA network. PU 4 Physical Unit 4. Component of an IBM FEP capable of fullduplex data transfer. Each such SNA device employs a separate data and control path into the transmit and receive buffers of the control program. PU 5 Physical Unit 5. Component of an IBM mainframe or host computer that manages an SNA network. PU 5 nodes are involved in routing within the SNA path control layer. public data network See PDN. Public Switched Telephone Network See PSTN. pull string Strong, heavy string used to pull cable in multiple runs. pulse amplitude modulation See PAM. pulse code modulation See PCM. pulse density See ones density. Punch Tool Spring-loaded tool used for cutting and connecting wire in a jack or on a patch panel. PUP PARC Universal Protocol. Protocol similar to IP developed at PARC. PVC permanent virtual circuit. Virtual circuit that is permanently established. PVCs save bandwidth associated with circuit establishment and tear down in situations where certain virtual circuits must exist all the time. Called a permanent virtual connection in ATM terminology. Compare with SVC. PVP permanent virtual path. Virtual path that consists of PVCs. See also PVC and virtual path. Q - 127 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. Q Term Definition Q.920/Q.921 TU-T specifications for the ISDN UNI data link layer. See also UNI. Q.922A ITU-T specification for Frame Relay encapsulation. Q.931 ITU-T specification for signaling to establish, maintain, and clear ISDN network connections. See also Q.93B. Q.93B ITU-T specification signaling to establish, maintain, and clear BISDN network connections. An evolution of ITU-T recommendation Q.931. See also Q.931. QLLC Qualified Logical Link Control. Data link layer protocol defined by IBM that allows SNA data to be transported across X.25 networks. QOS quality of service. Measure of performance for a transmission system that reflects its transmission quality and service availability. QOS parameters quality of service parameters. Parameters that control the amount of traffic the source router in an ATM network sends over an SVC. If any switch along the path cannot accommodate the requested QOS parameters, the request is rejected, and a rejection message is forwarded back to the originator of the request. Qualified Logical Link Control See QLLC. quality of service See QOS. quartet signaling Signaling technique used in 100VG-AnyLAN networks that allows data transmission at 100 Mbps over four pairs of UTP cabling at the same frequencies used in 10BASE-T networks. See also 100VG-AnyLAN. query Message used to inquire about the value of some variable or set of variables. queue 1.) Generally, an ordered list of elements waiting to be processed. 2.) In routing, a backlog of packets waiting to be forwarded over a router interface. queuing delay Amount of time that data must wait before it can be transmitted onto a statistically multiplexed physical circuit. queuing theory Scientific principles governing the formation or lack of formation of congestion on a network or at an interface. R - 128 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. R Term Definition RACE Research on Advanced Communications in Europe. Project sponsored by the European Community (EC) for the development of broadband networking capabilities. raceway Wall-mounted channel with a removable cover used to support horizontal cabling. radio frequency See RF. radio frequency interference See RFI. RAM random-access memory. Volatile memory that can be read and written by a microprocessor. random-access memory See RAM. Rapid Transport Protocol See RTP. RARE Réseaux Associés pour la Recherche Européenne. Association of European universities and research centers designed to promote an advanced telecommunications infrastructure in the European scientific community. RARE merged with EARN to form TERENA. See also EARN and TERENA. RARP Reverse Address Resolution Protocol. Protocol in the TCP/IP stack that provides a method for finding IP addresses based on MAC addresses. Compare with ARP. rate enforcement See traffic policing. rate queue Value that is associated with one or more virtual circuits, and that defines the speed at which an individual virtual circuit will transmit data to the remote end. Each rate queue represents a portion of the overall bandwidth available on an ATM link. The combined bandwidth of all configured rate queues should not exceed the total bandwidth available. RBHC Regional Bell Holding Company. One of seven telephone companies created by the AT&T divestiture in 1984. RBOC Regional Bell Operating Company. Local or regional telephone company that owns and operates telephone lines and switches in one of seven U.S. regions. The RBOCs were created by the divestiture of AT&T. Also called Bell Operating Company (BOC). rcp remote copy protocol. Protocol that allows users to copy files to and from a file system residing on a remote host or server on the network. The rcp protocol uses TCP to ensure the reliable delivery of data. rcp server Router or other device that acts as a server for rcp. See also rcp. R - 129 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. read-only memory See ROM. Ready To Send See RTS. reassembly The putting back together of an IP datagram at the destination after it has been fragmented either at the source or at an intermediate node. See also fragmentation. redirect Part of the ICMP and ES-IS protocols that allows a router to tell a host that using another router would be more effective. redirector Software that intercepts requests for resources within a computer and analyzes them for remote access requirements. If remote access is required to satisfy the request, the redirector forms an RPC and sends the RPC to lower-layer protocol software for transmission through the network to the node that can satisfy the request. redistribution Allowing routing information discovered through one routing protocol to be distributed in the update messages of another routing protocol. Sometimes called route redistribution. redundancy 1) In internetworking, the duplication of devices, services, or connections so that, in the event of a failure, the redundant devices, services, or connections can perform the work of those that failed. See also redundant system. 2) In telephony, the portion of the total information contained in a message that can be eliminated without loss of essential information or meaning. redundant system Computer, router, switch, or other computer system that contains two or more of each of the most important subsystems, such as two disk drives, two CPUs, or two power supplies. For example, on a fully redundant LightStream 2020 ATM switch, there are two NP cards with disks, two switch cards, and two power trays. A partially redundant LightStream 2020 switch might have two NPs, one switch card, and one power tray. Refraction The measure of how much a given material bends light. Regional Bell Holding Company See RBHC. Regional Bell Operating Company See RBOC. Regional Centers (Class 1 offices) The top of the Public Switched Telephone Network hierarchy. Regional centers cover multiple states and are always owned by the long-distance carriers. registered jack connector See RJ connector. relay OSI terminology for a device that connects two or more networks or network systems. A data link layer (Layer 2) relay is a bridge; a network layer (Layer 3) relay is a router. See also bridge and router. R - 130 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. reliability Ratio of expected to received keepalives from a link. If the ratio is high, the line is reliable. Used as a routing metric. Reliable SAP Update Protocol See RSUP. reload The event of a Cisco router rebooting, or the command that causes the router to reboot. remote bridge Bridge that connects physically disparate network segments via WAN links. remote copy protocol See rcp. remote job entry See RJE. remote login See rlogin. Remote Monitoring See RMON. Remote Operations Service Element See ROSE. remote-procedure call See RPC. remote shell protocol See rsh. remote source-route bridging See RSRB. rendezvous point See RP. repeater Device that regenerates and propagates electrical signals between two network segments. See also segment. Request For Comments See RFC. request/response unit See RU. Research on Advanced Communications in Europe See RACE. Réseaux Associés pour la Recherche Européenne See RARE. reserved Set to zero. Reverse Address Resolution Protocol See RARP. Reverse Path Multicasting See RPM. RF radio frequency Generic term referring to frequencies that correspond to radio transmissions. Cable TV and broadband networks use RF technology. R - 131 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. RFC Request For Comments. Document series used as the primary means for communicating information about the Internet. Some RFCs are designated by the IAB as Internet standards. Most RFCs document protocol specifications such as Telnet and FTP, but some are humorous or historical. RFCs are available online from numerous sources. RFI radio frequency interference. Radio frequencies that create noise that interferes with information being transmitted across unshielded copper cabling. RIF Routing Information Field. Field in the IEEE 802.5 header that is used by a source-route bridge to determine through which Token Ring network segments a packet must transit. A RIF is made up of ring and bridge numbers as well as other information. RII Routing Information Identifier. Bit used by SRT bridges to distinguish between frames that should be transparently bridged and frames that should be passed to the SRB module for handling. ring Connection of two or more stations in a logically circular topology. Information is passed sequentially between active stations. Token Ring, FDDI, and CDDI are based on this topology. ring group Collection of Token Ring interfaces on one or more Cisco routers that is part of a one-bridge Token Ring network. ring latency Time required for a signal to propagate once around a ring in a Token Ring or IEEE 802.5 network. ring monitor Centralized management tool for Token Ring networks based on the IEEE 802.5 specification. See also active monitor and standby monitor. ring topology Network topology that consists of a series of repeaters connected to one another by unidirectional transmission links to form a single closed loop. Each station on the network connects to the network at a repeater. While logically a ring, ring topologies are most often organized in a closed-loop star. Compare with bus topology, star topology, and tree topology. RIP Routing Information Protocol. IGP supplied with UNIX BSD systems. The most common IGP in the Internet. RIP uses hop count as a routing metric. See also Enhanced IGRP, hop count, IGP, IGRP, and OSPF. RJ connector registered jack connector. Standard connectors originally used to connect telephone lines. RJ connectors are now used for telephone connections and for 10BASE-T and other types of network connections. RJ-11, RJ-12, and RJ-45 are popular types of RJ connectors. R - 132 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. RJE remote job entry. Application that is batch-oriented, as opposed to interactive. In RJE environments, jobs are submitted to a computing facility, and output is received later. rlogin remote login. Terminal emulation program, similar to Telnet, offered in most UNIX implementations. RMON remote monitoring. MIB agent specification described in RFC 1271 that defines functions for the remote monitoring of networked devices. The RMON specification provides numerous monitoring, problem detection, and reporting capabilities. ROM read-only memory. Nonvolatile memory that can be read, but not written, by the microprocessor. root account 1) Privileged account on UNIX systems used exclusively by network or system administrators. 2) One of the four default user accounts that are created in the factory on each LightStream 2020 ATM switch. The root account is for use by the system or network administrator only. Its default interface is the bash shell. See also bash. root bridge Exchanges topology information with designated bridges in a spanning-tree implementation in order to notify all other bridges in the network when topology changes are required. This prevents loops and provides a measure of defense against link failure. ROSE Remote Operations Service Element. OSI RPC mechanism used by various OSI network application protocols. round-trip time See RTT. route Path through an internetwork. routed protocol Protocol that can be routed by a router. A router must be able to interpret the logical internetwork as specified by that routed protocol. Examples of routed protocols include AppleTalk, DECnet, and IP. route extension In SNA, a path from the destination subarea node through peripheral equipment to a NAU. route map Method of controlling the redistribution of routes between routing domains. Route Processor See RP. route summarization Consolidation of advertised addresses in OSPF and IS-IS. In OSPF, this causes a single summary route to be advertised to other areas by an area border router. Route/Switch Processor See RSP. R - 133 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. router Network layer device that uses one or more metrics to determine the optimal path along which network traffic should be forwarded. Routers forward packets from one network to another based on network layer information. Occasionally called a gateway (although this definition of gateway is becoming increasingly outdated). Compare with gateway. See also relay. router igrp Command that selects IGRP as a routing protocol. router rip Command that selects RIP as the routing protocol. route redistribution See redistribution. routing Process of finding a path to a destination host. Routing is very complex in large networks because of the many potential intermediate destinations a packet might traverse before reaching its destination host. routing domain Group of end systems and intermediate systems operating under the same set of administrative rules. Within each routing domain is one or more areas, each uniquely identified by an area address. Routing Information Field See RIF. Routing Information Identifier See RII. Routing Information Protocol See RIP. routing metric Method by which a routing algorithm determines that one route is better than another. This information is stored in routing tables. Metrics include bandwidth, communication cost, delay, hop count, load, MTU, path cost, and reliability. Sometimes referred to simply as a metric. See also cost. routing protocol Protocol that accomplishes routing through the implementation of a specific routing algorithm. Examples of routing protocols include IGRP, OSPF, and RIP. routing table Table stored in a router or some other internetworking device that keeps track of routes to particular network destinations and, in some cases, metrics associated with those routes. Routing Table Maintenance Protocol See RTMP. Routing Table Protocol See RTP. routing update Message sent from a router to indicate network reachability and associated cost information. Routing updates are typically sent at regular intervals and after a change in network topology. Compare with flash update. R - 134 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. RP 1) Route Processor. Processor module on the Cisco 7000 series routers that contains the CPU, system software, and most of the memory components that are used in the router. Sometimes called a supervisory processor. 2) Rendezvous point. Router specified in PIM sparse mode implementations to track membership in multicast groups and to forward messages to known multicast group addresses. See also PIM sparse mode. RPC remote-procedure call. Technological foundation of client-server computing. RPCs are procedure calls that are built or specified by clients and executed on servers, with the results returned over the network to the clients. See also client-server computing. RPM Reverse Path Multicasting. Multicasting technique in which a multicast datagram is forwarded out of all but the receiving interface if the receiving interface is one used to forward unicast datagrams to the source of the multicast datagram. RS-232 Popular physical layer interface. Now known as EIA/TIA-232. See EIA/TIA-232. RS-422 Balanced electrical implementation of EIA/TIA-449 for highspeed data transmission. Now referred to collectively with RS423 as EIA-530. See also EIA-530 and RS-423. RS-423 Unbalanced electrical implementation of EIA/TIA-449 for EIA/TIA-232 compatibility. Now referred to collectively with RS422 as EIA-530. See also EIA-530 and RS-422. RS-449 Popular physical layer interface. Now known as EIA/TIA-449. See EIA/TIA-449. rsh remote shell protocol. Protocol that allows a user to execute commands on a remote system without having to log in to the system. For example, rsh can be used to remotely examine the status of a number of access servers without connecting to each communication server, executing the command, and then disconnecting from the communication server. RSP Route/Switch Processor. Processor module used in the Cisco 7500 series routers that integrates the functions of the RP and the SP. See also Cisco 7500, RP (Route Processor), and SP. RSRB remote source-route bridging. SRB over WAN links. See also SRB. RSUP Reliable SAP Update Protocol. Bandwidth-saving protocol developed by Cisco for propagating services information. RSUP allows routers to reliably send standard Novell SAP packets only when the routers detect a change in advertised services. RSUP can transport network information either in conjunction with or independently of the Enhanced IGRP routing function for IPX. R - 135 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. RTMP Routing Table Maintenance Protocol. Apple Computer proprietary routing protocol. RTMP was derived from RIP. See also RIP. RTP 1) Routing Table Protocol. VINES routing protocol based on RIP. Distributes network topology information and aids VINES servers in finding neighboring clients, servers, and routers. Uses delay as a routing metric. See also SRTP. 2) Rapid Transport Protocol. Provides pacing and error recovery for APPN data as it crosses the APPN network. With RTP, error recovery and flow control are done end-to-end rather than at every node. RTP prevents congestion rather than reacts to it. RTS Ready To Send. EIA/TIA-232 control signal that requests a data transmission on a communications line. RTT round-trip time. Time required for a network communication to travel from the source to the destination and back. RTT includes the time required for the destination to process the message from the source and generate a reply. RTT is used by some routing algorithms to aid in calculating optimal routes. RU request/response unit. Request and response messages exchanged between NAUs in an SNA network. run-time memory Memory accessed while a program runs. On a LightStream 2020 ATM switch, this memory contains configuration data that is accessed while the switch operates. S - 136 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. S Term Definition SAC single-attached concentrator. FDDI or CDDI concentrator that connects to the network by being cascaded from the master port of another FDDI or CDDI concentrator. safety ground wire Circuit wire that connects to a local earth ground and the chassis of an electrical appliance or device via an electrical outlet and plug. It is used to ensure that no voltage potential exists between the chassis of the electrical device and the earth ground. sag Any decrease of below 80% in the normal voltage carried by a power line. A sag is sometimes referred to as a brownout. See surge, spike, and oscillation. sampling rate Rate at which samples of a particular waveform amplitude are taken. SAP 1) service access point. Field defined by the IEEE 802.2 specification that is part of an address specification. Thus, the destination plus the DSAP define the recipient of a packet. The same applies to the SSAP. See also DSAP and SSAP. 2) Service Advertisement Protocol. IPX protocol that provides a means of informing network clients, via routers and servers, of available network resources and services. See also IPX. SAR segmentation and reassembly. One of the two sublayers of the AAL CPCS, responsible for dividing (at the source) and reassembling (at the destination) the PDUs passed from the CS. The SAR sublayer takes the PDUs processed by the CS and, after dividing them into 48-byte pieces of payload data, passes them to the ATM layer for further processing. See also AAL, ATM layer, CPCS, CS, and SSCS. SAS single attachment station. Device attached only to the primary ring of an FDDI ring. Also known as a Class B station. Compare with DAS. See also FDDI. satellite communication Use of orbiting satellites to relay data between multiple earthbased stations. Satellite communications offer high bandwidth and a cost that is not related to distance between earth stations, long propagation delays, or broadcast capability. Sbus Bus technology used in Sun SPARC-based workstations and servers. The SBus specification has been adopted by the IEEE as a new bus standard. SCR sustainable cell rate. Parameter defined by the ATM Forum for ATM traffic management. For VBR connections, SCR determines the long-term average cell rate that can be transmitted. See also VBR. S - 137 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. SCTE serial clock transmit external. Timing signal that DTE echoes to DCE to maintain clocking. SCTE is designed to compensate for clock phase shift on long cables. When the DCE device uses SCTE instead of its internal clock to sample data from the DTE, it is better able to sample the data without error even if there is a phase shift in the cable. See also phase shift. SDH Synchronous Digital Hierarchy. European standard that defines a set of rate and format standards that are transmitted using optical signals over fiber. SDH is similar to SONET, with a basic SDH rate of 155.52 Mbps, designated at STM-1. See also SONET and STM-1. SDLC Synchronous Data Link Control. SNA data link layer communications protocol. SDLC is a bit-oriented, full-duplex serial protocol that has spawned numerous similar protocols, including HDLC and LAPB. See also HDLC and LAPB. SDLC broadcast Feature that allows a Cisco router that receives an all-stations broadcast on a virtual multidrop line to propagate the broadcast to each SDLC line that is a member of the virtual multidrop line. SDLC Transport Cisco router feature with which disparate environments can be integrated into a single, high-speed, enterprise-wide network. Native SDLC traffic can be passed through point-to-point serial links with other protocol traffic multiplexed over the same links. Cisco routers can also encapsulate SDLC frames inside IP datagrams for transport over arbitrary (non-SDLC) networks. Replaces proxy polling. See also proxy polling. SDLLC Feature that performs translation between SDLC and IEEE 802.2 type 2. SDSU SMDS DSU. DSU for access to SMDS via HSSIs and other serial interfaces. SDU service data unit. Unit of information from an upper-layer protocol that defines a service request to a lower-layer protocol. SEAL simple and efficient AAL. Scheme used by AAL5 in which the SAR sublayer segments CS PDUs without adding additional fields. See also AAL, AAL5, CS, and SAR. secondary See secondary station. secondary ring One of the two rings making up an FDDI or CDDI ring. The secondary ring is usually reserved for use in the event of a failure of the primary ring. Compare to primary ring. secondary station In bit-synchronous data link layer protocols such as HDLC, a station that responds to commands from a primary station. Sometimes referred to simply as a secondary. See also primary station. S - 138 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. Sectional Centers (Class 2 offices) Offices that serve a very large geographic area, maybe as large as a state. Sectional centers can be connected to primary centers and other sectional centers. security management One of five categories of network management defined by ISO for management of OSI networks. Security management subsystems are responsible for controlling access to network resources. See also accounting management, configuration management, fault management, and performance management. seed router Responds to configuration queries from nonseed routers on its connected AppleTalk network, allowing those routers to confirm or modify their configurations accordingly. See also nonseed router. segment 1) Section of a network that is bounded by bridges, routers, or switches. 2) In a LAN using a bus topology, a segment is a continuous electrical circuit that is often connected to other such segments with repeaters. 3) Term used in the TCP specification to describe a single transport layer unit of information. The terms datagram, frame, message, and packet are also used to describe logical information groupings at various layers of the OSI reference model and in various technology circles. segmentation and reassembly See SAR. sequence number Number used to ensure correct sequencing of the arriving data. Sequenced Packet Exchange See SPX. Sequenced Packet Protocol See SPP. Sequenced Routing Update Protocol See SRTP. serial clock transmit external See SCTE. Serial Interface Processor See SIP. Serial Line Internet Protocol See SLIP. serial transmission Method of data transmission in which the bits of a data character are transmitted sequentially over a single channel. Compare with parallel transmission. serial tunnel See STUN. server Node or software program that provides services to clients. See also back end, client, and front end. Server Message Block See SMB. S - 139 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. service access point See SAP. Service Advertisement Protocol See SAP. service data unit See SDU. service password-encryption Command that allows further protection. service point Interface between non-SNA devices and NetView that sends alerts from equipment unknown to the SNA environment. Service Profile Identifier See SPID. service specific convergence sublayer See SSCS. session 1) Related set of communications transactions between two or more network devices. 2) In SNA, a logical connection enabling two NAUs to communicate. session layer Layer 5 of the OSI reference model. This layer establishes, manages, and terminates sessions between applications and manages data exchange between presentation layer entities. Corresponds to the data flow control layer of the SNA model. See also application layer, data link layer, network layer, physical layer, presentation layer, and transport layer. SF Super Frame. Common framing type used on T1 circuits. SF consists of 12 frames of 192 bits each, with the 193rd bit providing error checking and other functions. SF has been superseded by ESF, but is still widely used. Also called D4 framing. See also ESF. SGMP Simple Gateway Monitoring Protocol. Network management protocol that was considered for Internet standardization and later evolved into SNMP. Documented in RFC 1028. See also SNMP. shaping See traffic shaping. shielded cable Cable that has a layer of shielded insulation to reduce EMI. shielded twisted-pair See STP. shortest path first algorithm See SPF. shortest-path routing Routing that minimizes distance or path cost through application of an algorithm. show access-lists Command that displays the contents of all access lists. show flash 1) Command used to verify that you have sufficient memory on your system for the Cisco IOS software you want to load. 2) Command used to learn the name of the system image file. show running-config Command used to display the current configuration in RAM. S - 140 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. show ip interface Command that displays the status and global parameters associated with an interface. show ip protocol 1) Command that displays values about routing timers and network information associated with the entire router. 2) Command that displays parameters, filters, and network information about the entire router. show ip route Command that displays the contents of an IP routing table. show startup-config Command used to display the saved configuration. signaling Process of sending a transmission signal over a physical medium for purposes of communication. signaling packet Generated by an ATM-connected device that wants to establish a connection with another such device. The signaling packet contains the ATM NSAP address of the desired ATM endpoint, as well as any QOS parameters required for the connection. If the endpoint can support the desired QOS, it responds with an accept message, and the connection is opened. See also QOS. Signaling System number 7 See SS7. signal injector Device used to measure attenuation of a signal on a network. signal quality error See SQE. signal reference ground Reference point used by computing devices to measure and compare incoming digital signals to.Reference point used by computing devices to measure and compare incoming digital signals to. silicon switching Switching based on the SSE, which allows the processing of packets independent of the SSP (Silicon Switch Processor) system processor. Silicon switching provides high-speed, dedicated packet switching. See also SSE and SSP (Silicon Switch Processor). silicon switching engine See SSE. Silicon Switch Processor See SSP. simple and efficient AAL See SEAL. Simple Gateway Monitoring Protocol See SGMP. Simple Mail Transfer Protocol See SMTP. Simple Multicast Routing Protocol See SMRP. Simple Network Management Protocol See SNMP. simplex Capability for data transmission in only one direction between a sending station and a receiving station. Compare with full duplex and half duplex. S - 141 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. single-attached concentrator See SAC. single attachment station See SAS. single-mode fiber Fiber-optic cabling with a narrow core that allows light to enter only at a single angle. Such cabling has higher bandwidth than multimode fiber, but requires a light source with a narrow spectral width (for example, a laser). Also called monomode fiber. See also multimode fiber. single-route explorer packet See spanning explorer packet. single-vendor network Network using equipment from only one vendor. Single-vendor networks rarely suffer compatibility problems. See also multivendor network. SIP 1) SMDS Interface Protocol. Used in communications between CPE and SMDS network equipment. Allows the CPE to use SMDS service for high-speed WAN internetworking. Based on the IEEE 802.6 DQDB standard. See also DQDB. 2) Serial Interface Processor. Obsolete interface processor for Cisco 7000 series routers that provided either two or four channel-independent ports for synchronous serial connections at speeds from 2.4 Kbps to 4 Mbps. The SIP has been replaced by the FSIP. Sometimes called SX-SIP or Pre-FSIP. See also FSIP. sliding window Refers to the fact that the window size is negotiated dynamically during the TCP session. sliding window flow control Method of flow control in which a receiver gives transmitter permission to transmit data until a window is full. When the window is full, the transmitter must stop transmitting until the receiver advertises a larger window. TCP, other transport protocols, and several data link layer protocols use this method of flow control. SLIP Serial Line Internet Protocol. Standard protocol for point-topoint serial connections using a variation of TCP/IP. Predecessor of PPP. See also CSLIP and PPP. slotted ring LAN architecture based on a ring topology in which the ring is divided into slots that circulate continuously. Slots can be either empty or full, and transmissions must start at the beginning of a slot. slow switching Packet processing performed at process level speeds, without the use of a route cache. Contrast with fast switching. SMAC source MAC. MAC address specified in the Source Address field of a packet. Compare with DMAC. See also MAC address. SMB Server Message Block. File-system protocol used in LAN Manager and similar NOSs to package data and exchange information with other systems S - 142 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. information with other systems. SMDS Switched Multimegabit Data Service. High-speed, packetswitched, datagram-based WAN networking technology offered by the telephone companies. See also CBDS. SMDS Interface Protocol See SIP. SMI Structure of Management Information. Document (RFC 1155) specifying rules used to define managed objects in the MIB. See also MIB. smoothing See traffic shaping. SMRP Simple Multicast Routing Protocol. Specialized multicast network protocol for routing multimedia data streams on enterprise networks. SMRP works in conjunction with multicast extensions to the AppleTalk protocol. SMT Station Management. ANSI FDDI specification that defines how ring stations are managed. SMTP Simple Mail Transfer Protocol. Internet protocol providing electronic mail services. SNA Systems Network Architecture. Large, complex, feature-rich network architecture developed in the 1970s by IBM. Similar in some respects to the OSI reference model, but with a number of differences. SNA is essentially composed of seven layers. See data flow control layer, data link control layer, path control layer, physical control layer, presentation services layer, transaction services layer, and transmission control layer. SNA Distribution Services See SNADS. SNA Network Interconnection See SNI. SNADS SNA Distribution Services. Consists of a set of SNA transaction programs that interconnect and cooperate to provide asynchronous distribution of information between end users. One of three SNA transaction services. See also DDM and DIA. SNAP Subnetwork Access Protocol. Internet protocol that operates between a network entity in the subnetwork and a network entity in the end system. SNAP specifies a standard method of encapsulating IP datagrams and ARP messages on IEEE networks. The SNAP entity in the end system makes use of the services of the subnetwork and performs three key functions: data transfer, connection management, and QOS selection. SNI 1) Subscriber Network Interface. Interface for SMDS-based networks that connects CPE and an SMDS switch. See also UNI. 2) SNA Network Interconnection. IBM gateway connecting S - 143 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. multiple SNA networks. SNMP Simple Network Management Protocol. Network management protocol used almost exclusively in TCP/IP networks. SNMP provides a means to monitor and control network devices, and to manage configurations, statistics collection, performance, and security. See also SGMP and SNMP2. SNMP communities Authentication scheme that enables an intelligent network device to validate SNMP requests from sources such as the NMS. A LightStream 2020 ATM switch, for example, responds only to SNMP requests that come from members of known communities and that have the access privileges required for that request. See also SNMP. SNMP2 SNMP Version 2. Version 2 of the popular network management protocol. SNMP2 supports centralized as well as distributed network management strategies, and includes improvements in the SMI, protocol operations, management architecture, and security. See also SNMP. SNPA subnetwork point of attachment. A data link layer address (such as an Ethernet address, X.25 address, or Frame Relay DLCI address). SNPA addresses are used to configure a CLNS route for an interface. socket Software structure operating as a communications end point within a network device. socket number An 8-bit number that identifies a socket. A maximum of 254 different socket numbers can be assigned in an AppleTalk node. SONET Synchronous Optical Network. High-speed (up to 2.5 Gbps) synchronous network specification developed by Bellcore and designed to run on optical fiber. STS-1 is the basic building block of SONET. Approved as an international standard in 1988. See also SDH, STS-1, and STS-3c. source address Address of a network device that is sending data. See also destination address. source and destination IP addresses Field within an IP datagram that indicates the 32-bit source and destination IP addresses. source MAC See SMAC. source port Number of the calling port. source-route bridging See SRB. S - 144 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. source-route translational bridging See SR/TLB. source-route transparent bridging See SRT. source service access point See SSAP. Southeastern Universities Research Association Network See SURAnet. SP Switch Processor. Cisco 7000-series processor module that acts as the administrator for all CxBus activities. Sometimes called ciscoBus controller. See also CxBus. SPAN Switched Port Analyzer. Feature of the Catalyst 5000 switch that extends the monitoring abilities of existing network analyzers into a switched Ethernet environment. SPAN mirrors the traffic at one switched segment onto a predefined SPAN port. A network analyzer attached to the SPAN port can monitor traffic from any of the other Catalyst switched ports. span Full-duplex digital transmission line between two digital facilities. spanning explorer packet Follows a statically configured spanning tree when looking for paths in an SRB network. Also known as a limited-route explorer packet or a single-route explorer packet. See also allroutes explorer packet, explorer packet, and local explorer packet. spanning tree Loop-free subset of a network topology. See also spanning-tree algorithm and Spanning-Tree Protocol. spanning-tree algorithm Algorithm used by the Spanning-Tree Protocol to create a spanning tree. Sometimes abbreviated STA. See also spanning tree and Spanning-Tree Protocol. Spanning-Tree Protocol Bridge protocol that utilizes the spanning-tree algorithm, enabling a learning bridge to dynamically work around loops in a network topology by creating a spanning tree. Bridges exchange BPDU messages with other bridges to detect loops, and then remove the loops by shutting down selected bridge interfaces. Refers to both the IEEE 802.1 Spanning-Tree Protocol standard and the earlier Digital Equipment Corporation Spanning-Tree Protocol upon which it is based. The IEEE version supports bridge domains and allows the bridge to construct a loop-free topology across an extended LAN. The IEEE version is generally preferred over the Digital version. Sometimes abbreviated STP. See also BPDU, learning bridge, MAC address learning, spanning tree, and spanning-tree algorithm. sparse mode PIM See PIM sparse mode. S - 145 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. speed matching Feature that provides sufficient buffering capability in a destination device to allow a high-speed source to transmit data at its maximum rate, even if the destination device is a lowerspeed device. SPF shortest path first algorithm. Routing algorithm that iterates on length of path to determine a shortest-path spanning tree. Commonly used in link-state routing algorithms. Sometimes called Dijkstra's algorithm. See also link state routing algorithm. SPID Service Profile Identifier. Number that some service providers use to define the services to which an ISDN device subscribes. The ISDN device uses the SPID when accessing the switch that initializes the connection to a service provider. spike Any power impulse lasting between .5 and 100 microseconds and possessing an amplitude over 100 % of peak power line voltage. See surge, sag, and oscillation. split-horizon updates Routing technique in which information about routes is prevented from exiting the router interface through which that information was received. Split-horizon updates are useful in preventing routing loops. spoofing 1) Scheme used by Cisco routers to cause a host to treat an interface as if it were up and supporting a session. The router spoofs replies to keepalive messages from the host in order to convince that host that the session still exists. Spoofing is useful in routing environments such as DDR, in which a circuitswitched link is taken down when there is no traffic to be sent across it in order to save toll charges. See also DDR. 2) The act of a packet illegally claiming to be from an address from which it was not actually sent. Spoofing is designed to foil network security mechanisms such as filters and access lists. spooler Application that manages requests or jobs submitted to it for execution. Spoolers process the submitted requests in an orderly fashion from a queue. A print spooler is a common example of a spooler. SPP Sequenced Packet Protocol. Provides reliable, connectionbased, flow-controlled packet transmission on behalf of client processes. Part of the XNS protocol suite. SPX Sequenced Packet Exchange. Reliable, connection-oriented protocol that supplements the datagram service provided by network layer (Layer 3) protocols. Novell derived this commonly used NetWare transport protocol from the SPP of the XNS protocol suite. SQE signal quality error. Transmission sent by a transceiver back to the controller to let the controller know whether the collision circuitry is functional. Also called heartbeat. S - 146 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. SRAM Type of RAM that retains its contents for as long as power is supplied. SRAM does not require constant refreshing, like DRAM. Compare with DRAM. SRB source-route bridging. Method of bridging originated by IBM and popular in Token Ring networks. In a SRB network, the entire route to a destination is predetermined, in real time, prior to the sending of data to the destination. Contrast with transparent bridging. SRT source-route transparent bridging. IBM bridging scheme that merges the two most prevalent bridging strategies, SRB and transparent bridging. SRT employs both technologies in one device to satisfy the needs of all ENs. No translation between bridging protocols is necessary. Compare with SR/TLB. SR/TLB source-route translational bridging. Method of bridging where source-route stations can communicate with transparent bridge stations with the help of an intermediate bridge that translates between the two bridge protocols. Compare with SRT. SRTP Sequenced Routing Update Protocol. Protocol that assists VINES servers in finding neighboring clients, servers, and routers. See also RTP (Routing Table Protocol). SS7 Signaling System number 7. Standard CCS system used with BISDN and ISDN. Developed by Bellcore. See also CCS. SSAP source service access point. The SAP of the network node designated in the Source field of a packet. Compare to DSAP. See also SAP (service access point). SSCP system services control points. Focal points within an SNA network for managing network configuration, coordinating network operator and problem determination requests, and providing directory services and other session services for network end users. SSCP-PU session Session used by SNA to allow an SSCP to manage the resources of a node through the PU. SSCPs can send requests to, and receive replies from, individual nodes in order to control the network configuration. SSCS service specific convergence sublayer. One of the two sublayers of any AAL. SSCS, which is service dependent, offers assured data transmission. The SSCS can be null as well, in classical IP over ATM or LAN emulation implementations. See also AAL, ATM layer, CPCS, CS, and SAR. S - 147 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. SSE silicon switching engine. Routing and switching mechanism that compares the data link or network layer header of an incoming packet to a silicon-switching cache, determines the appropriate action (routing or bridging), and forwards the packet to the proper interface. The SSE is directly encoded in the hardware of the SSP (Silicon Switch Processor) of a Cisco 7000 series router. It can therefore perform switching independently of the system processor, making the execution of routing decisions much quicker than if they were encoded in software. See also silicon switching and SSP (Silicon Switch Processor). SSP 1) Silicon Switch Processor. High-performance silicon switch for Cisco 7000 series routers that provides distributed processing and control for interface processors. The SSP leverages the high-speed switching and routing capabilities of the SSE to dramatically increase aggregate router performance, minimizing performance bottlenecks at the interface points between the router and a high-speed backbone. See also silicon switching and SSE. 2) Switch-to-Switch Protocol. Protocol specified in the DLSw standard that routers use to establish DLSw connections, locate resources, forward data, and handle flow control and error recovery. See also DLSw. STA See spanning-tree algorithm. stack See protocol stack. standard Set of rules or procedures that are either widely used or officially specified. See also de facto standard. standby monitor Device placed in standby mode on a Token Ring network in case an active monitor fails. See also active monitor and ring monitor. StarLAN CSMA/CD LAN, based on IEEE 802.3, developed by AT&T. star topology LAN topology in which end points on a network are connected to a common central switch by point-to-point links. A ring topology that is organized as a star implements a unidirectional closed-loop star, instead of point-to-point links. Compare with bus topology, ring topology, and tree topology. start-stop transmission See asynchronous transmission. static electricity Unpredictable electrical charges in the atmosphere that interfere with radio reception, computer networking, and the like. static route Route that is explicitly configured and entered into the routing table. Static routes take precedence over routes chosen by dynamic routing protocols. Station Management See SMT. S - 148 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. statistical multiplexing Technique whereby information from multiple logical channels can be transmitted across a single physical channel. Statistical multiplexing dynamically allocates bandwidth only to active input channels, making better use of available bandwidth and allowing more devices to be connected than with other multiplexing techniques. Also referred to as statistical timedivision multiplexing or stat mux. Compare with ATDM, FDM, and TDM. statistical time-division multiplexing See statistical multiplexing. stat mux See statistical multiplexing. STM-1 Synchronous Transport Module level 1. One of a number of SDH formats that specifies the frame structure for the 155.52- Mbps lines used to carry ATM cells. See also SDH. store and forward packet switching Packet-switching technique in which frames are completely processed before being forwarded out the appropriate port. This processing includes calculating the CRC and checking the destination address. In addition, frames must be temporarily stored until network resources (such as an unused link) are available to forward the message. Contrast with cut-through packet switching. STP 1) shielded twisted-pair. Two-pair wiring medium used in a variety of network implementations. STP cabling has a layer of shielded insulation to reduce EMI. Compare with UTP. See also twisted pair. 2) See Spanning-Tree Protocol. StreamView network management Cisco suite of SNMP-based network management tools used in conjunction with the LightStream 2020 ATM switch. The StreamView suite includes three GUI-driven applications: a configuration program (the configurator), a network topology map (the topology map), and a node monitoring program (the monitor); and a command-line interface: the CLI. See also CLI, configurator, monitor, and topology map. Structure of Management Information See SMI. STS-1 Synchronous Transport Signal level 1. Basic building block signal of SONET, operating at 51.84 Mbps. Faster SONET rates are defined as STS-n, where n is a multiple of 51.84 Mbps. See also SONET. STS-3c Synchronous Transport Signal level 3, concatenated. SONET format that specifies the frame structure for the 155.52-Mbps lines used to carry ATM cells. See also SONET. stub area OSPF area that carries a default route, intra-area routes, and interarea routes, but does not carry external routes. Virtual links cannot be configured across a stub area, and they cannot contain an ASBR. Compare to non-stub area. See also ASBR and OSPF. S - 149 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. stub network Network that has only a single connection to a router. STUN serial tunnel. Router feature allowing two SDLC- or HDLCcompliant devices to connect to one another through an arbitrary multiprotocol topology (using Cisco routers) rather than through a direct serial link. subarea Portion of an SNA network that consists of a subarea node and any attached links and peripheral nodes. subarea node SNA communication controller or host that handles complete network addresses. subchannel In broadband terminology, a frequency-based subdivision creating a separate communications channel. subinterface One of a number of virtual interfaces on a single physical interface. subnet See subnetwork. subnet address Portion of an IP address that is specified as the subnetwork by the subnet mask. See also IP address, subnet mask, and subnetwork. subnet mask 32-bit address mask used in IP to indicate the bits of an IP address that are being used for the subnet address. Sometimes referred to simply as mask. See also address mask and IP address. subnetwork 1) In IP networks, a network sharing a particular subnet address. Subnetworks are networks arbitrarily segmented by a network administrator in order to provide a multilevel, hierarchical routing structure while shielding the subnetwork from the addressing complexity of attached networks. Sometimes called a subnet. See also IP address, subnet address, and subnet mask. 2) In OSI networks, a collection of ESs and ISs under the control of a single administrative domain and using a single network access protocol. Subnetwork Access Protocol See SNAP. subnetwork point of attachment See SNPA. Subscriber Network Interface See SNI. subvector A data segment of a vector in an SNA message. A subvector consists of a length field, a key that describes the subvector type, and subvector specific data. Super Frame See SF. supervisory processor See RP (Route Processor). S - 150 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. SURAnet Southeastern Universities Research Association Network. Network connecting universities and other organizations in the Southeastern United States. SURAnet, originally funded by the NSF and a part of the NSFNET, is now part of BBN Planet. See also BBN Planet, NSF, and NSFNET. surge Any voltage increase above 110 % of the normal voltage carried by a power line. See sag, spike, and oscillation. sustainable cell rate See SCR. SVC switched virtual circuit. Virtual circuit that is dynamically established on demand and is torn down when transmission is complete. SVCs are used in situations where data transmission is sporadic. Called a switched virtual connection in ATM terminology. Compare with PVC. switch 1) Network device that filters, forwards, and floods frames based on the destination address of each frame. The switch operates at the data link layer of the OSI model. 2) General term applied to an electronic or mechanical device that allows a connection to be established as necessary and terminated when there is no longer a session to support. switch card Card on the LightStream 2020 ATM switch that handles communication between the other cards on the switch. Each LightStream 2020 switch has one or two switch cards. The second card, if present, serves as a backup for the first. switched LAN LAN implemented with LAN switches. See LAN switch. Switched Multimegabit Data Service See SMDS. Switched Port Analyzer See SPAN. switched virtual circuit See SVC. switched virtual connection See SVC. Switch Processor See SP. Switch-to-Switch Protocol See SSP. SwitchVision Cisco SNMP-based network management software, running on Microsoft Windows, that offers a powerful set of tools to manage an entire network, including switches, hubs, routers, and bridges. SwitchVision can automatically discover and map any SNMP device on the network and show the status of network devices. SwitchVision allows network administrators to set event thresholds, activate actions when error conditions occur, and set up custom tables and graphs to view critical network variables. synchronization Establishment of common timing between sender and receiver. S - 151 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. Synchronous Data Link Control See SDLC. Synchronous Digital Hierarchy See SDH. Synchronous Optical Network See SONET. synchronous transmission Term describing digital signals that are transmitted with precise clocking. Such signals have the same frequency, with individual characters encapsulated in control bits (called start bits and stop bits) that designate the beginning and end of each character. Compare with asynchronous transmission, isochronous transmission, and plesiochronous transmission. Synchronous Transport Module level 1 See STM-1. Synchronous Transport Signal level 1 See STM-1. Synchronous Transport Signal level 3, concatenated See STS-3c. sysgen system generation. Process of defining network resources in a network. system generation See sysgen. system services control points See SSCP. Systems Network Architecture See SNA. T - 152 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. T Term Definition T1 Digital WAN carrier facility. T1 transmits DS-1-formatted data at 1.544 Mbps through the telephone-switching network, using AMI or B8ZS coding. Compare with E1. See also AMI, B8ZS, and DS-1. T3 Digital WAN carrier facility. T3 transmits DS-3-formatted data at 44.736 Mbps through the telephone switching network. Compare with E3. See also DS-3. TAC 1) Terminal Access Controller. Internet host that accepts terminal connections from dial-up lines. 2) Technical Assistance Center. Cisco TACs provide technical assistance to partners and end users, and form the hub of Cisco global support. TACACS Terminal Access Controller Access Control System. Authentication protocol, developed by the DDN community, that provides remote access authentication and related services, such as event logging. User passwords are administered in a central database rather than in individual routers, providing an easily scalable network security solution. See also TACACS+. TACACS+ Proprietary Cisco enhancement to TACACS. Provides additional support for authentication, authorization, and accounting. See also TACACS. tagged traffic ATM cells that have their CLP bit set to 1. If the network is congested, tagged traffic can be dropped to ensure delivery of higher-priority traffic. Sometimes called DE (discard eligible) traffic. See also CLP. TAXI 4B/5B Transparent Asynchronous Transmitter/Receiver Interface 4- byte/5-byte. Encoding scheme used for FDDI LANs as well as for ATM. Supports speeds of up to 100 Mbps over multimode fiber. TAXI is the chipset that generates 4B/5B encoding on multimode fiber. See also 4B/5B local fiber. T-carrier TDM transmission method usually referring to a line or cable carrying a DS-1 signal. TCP Transmission Control Protocol. Connection-oriented transport layer protocol that provides reliable full-duplex data transmission. TCP is part of the TCP/IP protocol stack. See also TCP/IP. TCP/IP Transmission Control Protocol/Internet Protocol. Common name for the suite of protocols developed by the U.S. DoD in the 1970s to support the construction of worldwide internetworks. TCP and IP are the two best-known protocols in the suite. See also IP and TCP. T - 153 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. TCS test and control system. Independently-powered subsystem used to initialize, monitor, and troubleshoot the hardware on a LightStream 2020 ATM switch. The TCS consists of a hub residing on the switch card and slaves on NPs and line cards. TCU trunk coupling unit. In Token Ring networks, a physical device that enables a station to connect to the trunk cable. TDM time-division multiplexing. Technique in which information from multiple channels can be allocated bandwidth on a single wire based on preassigned time slots. Bandwidth is allocated to each channel regardless of whether the station has data to transmit. Compare with ATDM, FDM, and statistical multiplexing. TDR time domain reflectometer. Device capable of sending signals through a network medium to check cable continuity, length, and other attributes. TDRs are used to find physical layer network problems. TE terminal equipment. Any ISDN-compatible device that can be attached to the network, such as a telephone, a fax, or a computer. Technical Assistance Center See TAC. Technical Office Protocol See TOP. TEI terminal endpoint identifier. Field in the LAPD address that identifies a device on an ISDN interface. See also TE. telco Abbreviation for telephone company. telecommunications Term referring to communications (usually involving computer systems) over the telephone network. Telecommunications Industry Association See TIA. telephony Science of converting sound to electrical signals and transmitting it between widely removed points. telepole Telescoping pole with a hook at one end. It is used to get cable across a ceiling or attic quickly. telex Teletypewriter service allowing subscribers to send messages over the PSTN. Telnet Command used to verify the application layer software between source and destination stations. This is the most complete test mechanism available. Tempest U.S. military standard. Electronic products adhering to the Tempest specification are designed to withstand EMP. See also EMP. T - 154 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. TERENA Trans-European Research and Education Networking Association. Organization that promotes information and telecommunications technologies development in Europe. Formed by the merging of EARN and RARE. See also EARN and RARE. term ip netmask-format Command used to specify the format of network masks for the current session. termid SNA cluster controller identification. Termid is meaningful only for switched lines. Also called Xid. terminal Simple device at which data can be entered or retrieved from a network. Generally, terminals have a monitor and a keyboard, but no processor or local disk drive. Terminal Access Controller See TAC. Terminal Access Controller Access System See TACACS. terminal adapter Device used to connect ISDN BRI connections to existing interfaces such as EIA/TIA-232. Essentially, an ISDN modem. terminal emulation Network application in which a computer runs software that makes it appear to a remote host as a directly attached terminal. terminal server Communications processor that connects asynchronous devices such as terminals, printers, hosts, and modems to any LAN or WAN that uses TCP/IP, X.25, or LAT protocols. Terminal servers provide the internetwork intelligence that is not available in the connected devices. terminator Device that provides electrical resistance at the end of a transmission line to absorb signals on the line, thereby keeping them from bouncing back and being received again by network stations. test and control system See TCS. Texas Higher Education Network See THEnet. TFTP Trivial File Transfer Protocol. Simplified version of FTP that allows files to be transferred from one computer to another over a network. TH transmission header. SNA header that is appended to the SNA basic information unit (BIU). The TH uses one of a number of available SNA header formats. See also FID0, FID1, FID2, FID3, and FID4. THC over X.25 Feature providing TCP/IP header compression over X.25 links, for purposes of link efficiency. T - 155 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. THEnet Texas Higher Education Network. Regional network comprising over 60 academic and research institutions in the Texas (United States), area. Thinnet Term used to define a thinner, less expensive version of the cable specified in the IEEE 802.3 10BASE2 standard. Compare with Cheapernet. See also 10BASE2, Ethernet, and IEEE 802.3. throughput Rate of information arriving at, and possibly passing through, a particular point in a network system. TIA Telecommunications Industry Association. Organization that develops standards relating to telecommunications technologies. Together, the TIA and the EIA have formalized standards, such as EIA/TIA-232, for the electrical characteristics of data transmission. See also EIA. TIC Token Ring interface coupler. Controller through which an FEP connects to a Token Ring. tie-wraps Plastic ties used for holding cables together or for holding cables in place. time-division multiplexing See TDM. time domain reflectometer See TDR. time domain reflectometry Technique of sending an electrical signal down a cable and then timing the signal's reflection back from the end of the cable. Time Notify See TNotify. time-out Event that occurs when one network device expects to hear from another network device within a specified period of time, but does not. The resulting time-out usually results in a retransmission of information or the dissolving of the session between the two devices. Time To Live See TTL. TN3270 Terminal emulation software that allows a terminal to appear to an IBM host as a 3278 Model 2 terminal. The Cisco TN3270 implementation allows users to access an IBM host without using a special IBM server or a UNIX host acting as a server. TNotify Time Notify. Specifies how often SMT initiates neighbor notification broadcasts. See also SMT. token Frame that contains control information. Possession of the token allows a network device to transmit data onto the network. See also token passing. T - 156 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. token bus LAN architecture using token passing access over a bus topology. This LAN architecture is the basis for the IEEE 802.4 LAN specification. See also IEEE 802.4. token passing Access method by which network devices access the physical medium in an orderly fashion based on possession of a small frame called a token. Contrast with circuit switching and contention. See also token. Token Ring Token-passing LAN developed and supported by IBM. Token Ring runs at 4 or 16 Mbps over a ring topology. Similar to IEEE 802.5. See also IEEE 802.5, ring topology, and token passing. Token Ring interface coupler See TIC. Token Ring Interface Processor See TRIP. TOP Technical Office Protocol. OSI-based architecture developed for office communications. topology Physical arrangement of network nodes and media within an enterprise networking structure. topology map Tool for managing a LightStream 2020 ATM switch that examines a network and displays the status of its nodes and trunks. The topology map is an HP OpenView-based application that runs on an NMS. ToS type of service. Field within an IP datagram that indicates how the datagram should be handled. See COS (class of service). to switch unit See TSU. total length Field within an IP datagram that indicates total length of the header + the data. TP0 Transport Protocol Class 0. OSI connectionless transport protocol for use over reliable subnetworks. Defined by ISO 8073. TP4 Transport Protocol Class 4. OSI connection-based transport protocol. Defined by ISO 8073. trace Command that uses Time-To-Live (TTL) values to generate messages from each router used along the path. This is very powerful in its ability to locate failures in the path from the source to the destination. traffic management See ControlStream traffic management. T - 157 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. traffic policing Process used to measure the actual traffic flow across a given connection and compare it to the total admissable traffic flow for that connection. Traffic outside of the agreed upon flow can be tagged (where the CLP bit is set to 1) and can be discarded en route if congestion develops. Traffic policing is used in ATM, Frame Relay, and other types of networks. Also know as admission control, permit processing, rate enforcement, and UPC (usage parameter control). See also tagged traffic. traffic profile Set of COS attribute values assigned to a given port on a LightStream 2020 ATM switch. The profile affects numerous parameters for data transmitted from the port including rate, cell drop eligibility, transmit priority, and inactivity timer. See also COS. traffic shaping Use of queues to limit surges that can congest a network. Data is buffered and then sent into the network in regulated amounts to ensure that the traffic will fit within the promised traffic envelope for the particular connection. Traffic shaping is used in ATM, Frame Relay, and other types of networks. Also known as metering, shaping, and smoothing. trailer Control information appended to data when encapsulating the data for network transmission. Compare with header. transaction Result-oriented unit of communication processing. transaction services layer Layer 7 in the SNA architectural model. Represents user application functions, such as spreadsheets, word-processing, or electronic mail, by which users interact with the network. Corresponds roughly with the application layer of the OSI reference model. See also data flow control layer, data link control layer, path control layer, physical control layer, presentation services layer, and transmission control layer. transceiver See MAU. transceiver cable See AUI. Trans-European Research and Education Networking Association See TERENA. transfer priority See transmit priority. transit bridging Bridging that uses encapsulation to send a frame between two similar networks over a dissimilar network. T - 158 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. translational bridging Bridging between networks with dissimilar MAC sublayer protocols. MAC information is translated into the format of the destination network at the bridge. Contrast with encapsulation bridging. transmission control layer Layer 4 in the SNA architectural model. This layer is responsible for establishing, maintaining, and terminating SNA sessions, sequencing data messages, and controlling session level flow. Corresponds to the transport layer of the OSI model. See also data flow control layer, data link control layer, path control layer, physical control layer, presentation services layer, and transaction services layer. Transmission Control Protocol See TCP. Transmission Control Protocol/Internet Protocol See TCP/IP. transmission group In SNA routing, one or more parallel communications links treated as one communications facility. transmission header See TH. transmission link See link. transmit priority Queuing scheme in which each internal TOS of a LightStream 2020 ATM switch correlates to a relative priority in queues in the ATM network. This priority determines which traffic is serviced first in the case of contention for a network resource. Also known as forwarding priority and transfer priority. TRANSPAC Major packet data network run by France Telecom. Transparent Asynchronous Transmitter/Receiver Interface 4-byte/5- byte See TAXI 4B/5B. transparent bridging Bridging scheme often used in Ethernet and IEEE 802.3 networks in which bridges pass frames along one hop at a time based on tables associating end nodes with bridge ports. Transparent bridging is so named because the presence of bridges is transparent to network end nodes. Contrast with SRB. transport layer Layer 4 of the OSI reference model. This layer is responsible for reliable network communication between end nodes. The transport layer provides mechanisms for the establishment, maintenance, and termination of virtual circuits, transport fault detection and recovery, and information flow control. Corresponds to the transmission control layer of the SNA model. See also application layer, data link layer, network layer, physical layer, presentation layer, and session layer. T - 159 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. Transport Protocol Class 0 See TP0. Transport Protocol Class 4 See TP4. trap Message sent by an SNMP agent to an NMS, console, or terminal to indicate the occurrence of a significant event, such as a specifically defined condition or a threshold that has been reached. See also alarm and event. tree topology LAN topology similar to a bus topology, except that tree networks can contain branches with multiple nodes. Transmissions from a station propagate the length of the medium and are received by all other stations. Compare with bus topology, ring topology, and star topology. TRIP Token Ring Interface Processor. High-speed interface processor on the Cisco 7000 series routers. The TRIP provides two or four Token Ring ports for interconnection with IEEE 802.5 and IBM Token Ring media with ports independently set to speeds of either 4 or 16 Mbps. Trivial File Transfer Protocol See TFTP. trunk Physical and logical connection between two ATM switches across which traffic in an ATM network travels. An ATM backbone is composed of a number of trunks. trunk card Line card on a LightStream 2020 ATM switch that is configured to communicate with other ATM switches. LightStream 2020 trunk cards offer a variety of interface types. CLCs, LSCs, and MSCs can operate as trunk cards. See also edge card. trunk coupling unit See TCU. trunk up-down See TUD. TSU to switch unit. Subsystem on each LightStream 2020 ATM switch line card that appends ATM routing information to outgoing cells and sends the cells to the switch card. TTL Time To Live. Field in an IP header that indicates how long a packet is considered valid. tunneling Architecture that is designed to provide the services necessary to implement any standard point-to-point encapsulation scheme. See also encapsulation. TUD trunk up-down. Protocol used in ATM networks that monitors trunks and detects when one goes down or comes up. ATM switches send regular test messages from each trunk port to test trunk line quality. If a trunk misses a given number of these messages, TUD declares the trunk down. When a trunk comes back up, TUD recognizes that the trunk is up, declares the trunk up, and returns it to service. See also trunk. T - 160 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. TUV German test agency that certifies products to European safety standards. twisted pair Relatively low-speed transmission medium consisting of two insulated wires arranged in a regular spiral pattern. The wires can be shielded or unshielded. Twisted pair is common in telephony applications and is increasingly common in data networks. See also STP and UTP. two-way simultaneous See TWS. TWS two-way simultaneous. Mode that allows a router configured as a primary SDLC station to achieve better utilization of a fullduplex serial line. When TWS is enabled in a multidrop environment, the router can poll a secondary station and receive data from that station while it sends data to or receives data from a different secondary station on the same serial line. TYMNET See XStream. Type 1 operation IEEE 802.2 (LLC) connectionless operation. Type 2 operation IEEE 802.2 (LLC) connection-oriented operation. type of service See TOS. U - 161 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. U Term Definition UART Universal Asynchronous Receiver/Transmitter. Integrated circuit, attached to the parallel bus of a computer, used for serial communications. The UART translates between serial and parallel signals, provides transmission clocking, and buffers data sent to or from the computer. UB Net/One Ungermann-Bass Net/One. Routing protocol, developed by UB Networks, that uses hello packets and a path-delay metric, with end nodes communicating using the XNS protocol. There are a number of differences between the manner in which Net/One uses the XNS protocol and the usage common among other XNS nodes. UBR unspecified bit rate. QOS class defined by the ATM Forum for ATM networks. UBR allows any amount of data up to a specified maximum to be sent across the network, but there are no guarantees in terms of cell loss rate and delay. Compare with ABR (available bit rate), CBR, and VBR. UDP User Datagram Protocol. Connectionless transport layer protocol in the TCP/IP protocol stack. UDP is a simple protocol that exchanges datagrams without acknowledgments or guaranteed delivery, requiring that error processing and retransmission be handled by other protocols. UDP is defined in RFC 768. UL Underwriters Laboratories. Independent agency within the United States that tests product safety. ULP upper-layer protocol. Protocol that operates at a higher layer in the OSI reference model, relative to other layers. ULP is sometimes used to refer to the next-highest protocol (relative to a particular protocol) in a protocol stack. unbalanced configuration HDLC configuration with one primary station and multiple secondary stations. Underwriters Laboratories See UL. Ungermann-Bass Net/One See UB Net/One. UNI User-Network Interface. ATM Forum specification that defines an interoperability standard for the interface between ATMbased products (a router or an ATM switch) located in a private network and the ATM switches located within the public carrier networks. Also used to describe similar connections in Frame Relay networks. See also NNI, Q.920/Q.921 and SNI (Subscriber Network Interface). unicast Message sent to a single network destination. Compare with broadcast and multicast. U - 162 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. unicast address Address specifying a single network device. Compare with broadcast address and multicast address. See also unicast. uninsured traffic Traffic within the excess rate (the difference between the insured rate and maximum rate) for a VCC. This traffic can be dropped by the network if congestion occurs. See also CLP, insured rate, and maximum rate. unipolar Literally meaning one polarity, the fundamental electrical characteristic of internal signals in digital communications equipment. Contrast with bipolar. unity gain In broadband networks, the balance between signal loss and signal gain through amplifiers. Universal Asynchronous Receiver/Transmitter See UART. Universal Resource Locator See URL. UNIX Operating system developed in 1969 at Bell Laboratories. UNIX has gone through several iterations since its inception. These include UNIX 4.3 BSD (Berkeley Standard Distribution), developed at the University of California at Berkeley, and UNIX System V, Release 4.0, developed by AT&T. UNIX-to-UNIX Copy Program See UUCP. unnumbered frames HDLC frames used for various control and management purposes, including link startup and shutdown, and mode specification. unshielded twisted-pair See UTP. unspecified bit rate See UBR. UPC usage parameter control. See traffic policing. upper-layer protocol See ULP. UPS uninterruptable power supply. Backup device designed to provide an uninterrupted power source in the event of a power failure. They are commonly installed on all file servers and wiring hubs. Urgent Pointer Indicates the end of the urgent data. URL Universal Resource Locator. Standardized addressing scheme for accessing hypertext documents and other services using a WWW browser. See also WWW browser. usage parameter control See traffic policing. USENET Initiated in 1979, one of the oldest and largest cooperative networks, with over 10,000 hosts and a quarter of a million users. Its primary service is a distributed conferencing service called news. U - 163 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. User Datagram Protocol See UDP. User-Network Interface See UNI. UTP unshielded twisted-pair. Four-pair wire medium used in a variety of networks. UTP does not require the fixed spacing between connections that is necessary with coaxial-type connections. There are five types of UTP cabling commonly used: Category 1 cabling, Category 2 cabling, Category 3 cabling, Category 4 cabling, and Category 5 cabling. Compare with STP. See also EIA/TIA-586 and twisted pair. UUCP UNIX-to-UNIX Copy Program. Protocol stack used for point-topoint communication between UNIX systems. V - 164 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. V Term Definition V.24 ITU-T standard for a physical layer interface between DTE and DCE. V.24 is essentially the same as the EIA/TIA-232 standard. See also EIA/TIA-232. V.25bis ITU-T specification describing procedures for call setup and tear down over the DTE-DCE interface in a PSDN. V.32 ITU-T standard serial line protocol for bidirectional data transmissions at speeds of 4.8 or 9.6 Kbps. See also V.32bis. V.32bis ITU-T standard that extends V.32 to speeds up to 14.4 Kbps. See also V.32. V.34 ITU-T standard that specifies a serial line protocol. V.34 offers improvements to the V.32 standard, including higher transmission rates (28.8 Kbps) and enhanced data compression. Compare with V.32. V.35 ITU-T standard describing a synchronous, physical layer protocol used for communications between a network access device and a packet network. V.35 is most commonly used in the United States and in Europe, and is recommended for speeds up to 48 Kbps. V.42 ITU-T standard protocol for error correction using LAPM. See also LAPM. variable bit rate See VBR. variable-length subnet mask See VLSM. VBR variable bit rate. QOS class defined by the ATM Forum for ATM networks. VBR is subdivided into a real time (RT) class and non-real time (NRT) class. VBR (RT) is used for connections in which there is a fixed timing relationship between samples. VBR (NRT) is used for connections in which there is no fixed timing relationship between samples, but that still need a guaranteed QOS. Compare with ABR (available bit rate), CBR, and UBR. VC See virtual circuit. VCC virtual channel connection. Logical circuit, made up of VCLs, that carries data between two end points in an ATM network. Sometimes called a virtual circuit connection. See also VCI, VCL, and VPI. V - 165 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. VCI virtual channel identifier. 16-bit field in the header of an ATM cell. The VCI, together with the VPI, is used to identify the next destination of a cell as it passes through a series of ATM switches on its way to its destination. ATM switches use the VPI/VCI fields to identify the next network VCL that a cell needs to transit on its way to its final destination. The function of the VCI is similar to that of the DLCI in Frame Relay. Compare to DLCI. See also VCL and VPI. VCL virtual channel link. Connection between two ATM devices. A VCC is made up of one or more VCLs. See also VCC. VCN virtual circuit number. 12-bit field in an X.25 PLP header that identifies an X.25 virtual circuit. Allows DCE to determine how to route a packet through the X.25 network. Sometimes called LCI (logical channel identifier) or LCN (logical channel number). vector Data segment of an SNA message. A vector consists of a length field, a key that describes the vector type, and vectorspecific data. VERS Version number field with in an IP datagram. Versatile Interface Processor See VIP. vertical cabling Backbone cabling. See backbone cabling. VINES Virtual Integrated Network Service. NOS developed and marketed by Banyan Systems. VIP 1) Versatile Interface Processor. Interface card used in Cisco 7000 and Cisco 7500 series routers. The VIP provides multilayer switching and runs the Cisco IOS software. See also Cisco 7000 and Cisco 7500. 2) Virtual IP. Function that enables the creation of logically separated switched IP workgroups across the switch ports of a Catalyst 5000 running Virtual Networking Services software. See also Virtual Networking Services. virtual address See network address. virtual channel See virtual circuit. virtual channel connection See VCC. virtual channel identifier See VCI. virtual channel link See VCL. V - 166 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. virtual circuit Logical circuit created to ensure reliable communication between two network devices. A virtual circuit is defined by a VPI/VCI pair, and can be either permanent (a PVC) or switched (an SVC). Virtual circuits are used in Frame Relay and X.25. In ATM, a virtual circuit is called a virtual channel. Sometimes abbreviated VC. See also PVC, SVC, VCI, virtual route, and VPI. virtual circuit connection See VCC. virtual circuit number See VCN. Virtual Integrated Network Service See VINES. virtual IP See VIP. virtualization Process of implementing a network based on virtual network segments. Devices are connected to virtual segments independent of their physical location and their physical connection to the network. virtual LAN See VLAN. virtual LAN internetwork See VLI. Virtual Networking Services Software on some Catalyst 5000 switches that enables multiple workgroups to be defined across switches and offers traffic segmentation and access control. virtual path Logical grouping of virtual circuits that connect two sites. See also virtual circuit. virtual path connection See VPC. virtual path identifier See VPI. virtual path identifier/virtual channel identifier See VPI/VCI. virtual path link See VPL. virtual ring Entity in an SRB network that logically connects two or more physical rings together either locally or remotely. The concept of virtual rings can be expanded across router boundaries. virtual route In SNA, a logical connection between subarea nodes that is physically realized as a particular explicit route. SNA terminology for virtual circuit. See also virtual circuit. VirtualStream virtual workgroups Cisco workgroup architecture implemented on the LightStream 2020 ATM switch that allows geographically dispersed stations on connected LANs to be logically grouped. Such grouping provides easy access within the workgroup, while ensuring privacy between workgroups and limiting the impact of the work of each group on the others. V - 167 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. virtual telecommunications access method See VTAM. Virtual Terminal Protocol See VTP. VLAN Virtual LAN. Group of devices on a LAN that are configured (using management software) so that they can communicate as if they were attached to the same wire, when in fact they are located on a number of different LAN segments. Because VLANs are based on logical instead of physical connections, they are extremely flexible. VLI virtual LAN internetwork. Internetwork composed of VLANs. See VLAN. VLSM variable-length subnet mask. Ability to specify a different subnet mask for the same network number on different subnets. VLSM can help optimize available address space. VNS See Virtual Networking Services. VPC virtual path connection. Grouping of VCCs that share one or more contiguous VPLs. See also VCC and VPL. VPI virtual path identifier. 8-bit field in the header of an ATM cell. The VPI, together with the VCI, is used to identify the next destination of a cell as it passes through a series of ATM switches on its way to its destination. ATM switches use the VPI/VCI fields to identify the next VCL that a cell needs to transit on its way to its final destination. The function of the VPI is similar to that of the DLCI in Frame Relay. Compare with DLCI. See also VCI and VCL. VPI/VCI See VCI and VPI. VPL virtual path link. Within a virtual path, a group of unidirectional VCLs with the same end points. Grouping VCLs into VPLs reduces the number of connections to be managed, thereby decreasing network control overhead and cost. A VPC is made up of one or more VPLs. VTAM virtual telecommunications access method. Set of programs that control communication between LUs. VTAM controls data transmission between channel-attached devices and performs routing functions. VTP Virtual Terminal Protocol. ISO application for establishing a virtual terminal connection across a network. W - 168 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. W Term Definition WAN wide-area network. Data communications network that serves users across a broad geographic area and often uses transmission devices provided by common carriers. Frame Relay, SMDS, and X.25 are examples of WANs. Compare with LAN and MAN. watchdog Watchdog timer manager that runs on the NP of each LightStream 2020 ATM switch in an ATM network. The watchdog process rearms the watchdog timer so that the system automatically restarts if the NP fails. See also watchdog timer. watchdog packet Used to ensure that a client is still connected to a NetWare server. If the server has not received a packet from a client for a certain period of time, it sends that client a series of watchdog packets. If the station fails to respond to a predefined number of watchdog packets, the server concludes that the station is no longer connected and clears the connection for that station. watchdog spoofing Subset of spoofing that refers specifically to a router acting for a NetWare client by sending watchdog packets to a NetWare server to keep the session between client and server active. See also spoofing. watchdog timer 1) Hardware or software mechanism that is used to trigger an event or an escape from a process unless the timer is periodically reset. See also watchdog. 2) In NetWare, a timer that indicates the maximum period of time that a server will wait for a client to respond to a watchdog packet. If the timer expires, the server sends another watchdog packet (up to a set maximum). See also watchdog packet. waveform coding Electrical techniques used to convey binary signals. wide-area network See WAN. wideband See broadband. wildcard mask 32-bit quantity used in conjunction with an IP address to determine which bits in an IP address should be ignored when comparing that address with another IP address. A wildcard mask is specified when setting up access lists. window Number of octets that the receiver is willing to accept. window size Refers to the number of messages that can be transmitted while awaiting an acknowledgment. wire map Feature provided by most cable testers. Used to test twisted pair cable installations, it shows which wire pairs connect to what pins on the plugs and sockets. W - 169 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. wiring closet Specially designed room used for wiring a data or voice network. Wiring closets serve as a central junction point for the wiring and wiring equipment that is used for interconnecting devices. WISCNET TCP/IP network in Wisconsin (United States) connecting University of Wisconsin campuses and a number of private colleges. Links are 56 Kbps and T1. workgroup Collection of workstations and servers on a LAN that are designed to communicate and exchange data with one another. WorkGroup Director Cisco SNMP-based network-management software tool. Workgroup Director runs on UNIX workstations either as a standalone application or integrated with another SNMP-based network management platform, providing a seamless, powerful management system for Cisco workgroup products. See also SNMP. workgroup switching Method of switching that provides high-speed (100-Mbps) transparent bridging between Ethernet networks and highspeed translational bridging between Ethernet and CDDI or FDDI. World Wide Web See WWW. wrap Action taken by an FDDI or CDDI network to recover in the event of a failure. The stations on each side of the failure reconfigure themselves, creating a single logical ring out of the primary and secondary rings. WWW World Wide Web. Large network of Internet servers providing hypertext and other services to terminals running client applications such as a WWW browser. See also WWW browser. WWW browser GUI-based hypertext client application, such as Mosaic, used to access hypertext documents and other services located on innumerable remote servers throughout the WWW and Internet. See also hypertext, Internet, Mosaic, and WWW. X - 170 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. X Term Definition X.121 ITU-T standard describing an addressing scheme used in X.25 networks. X.121 addresses are sometimes called IDNs (International Data Numbers). X.21 ITU-T standard for serial communications over synchronous digital lines. The X.21 protocol is used primarily in Europe and Japan. X.21bis ITU-T standard that defines the physical layer protocol for communication between DCE and DTE in an X.25 network. Virtually equivalent to EIA/TIA-232. See also EIA/TIA-232 and X.25. X.25 ITU-T standard that defines how connections between DTE and DCE are maintained for remote terminal access and computer communications in PDNs. X.25 specifies LAPB, a data link layer protocol, and PLP, a network layer protocol. Frame Relay has to some degree superseded X.25. See also Frame Relay, LAPB, and PLP. X.25 Level 3 See PLP. X.25 Protocol See PLP. X.28 ITU-T recommendation that defines the terminal-to-PAD interface in X.25 networks. See also PAD and X.25. X.29 ITU-T recommendation that defines the form for control information in the terminal-to-PAD interface used in X.25 networks. See also PAD and X.25. X.3 ITU-T recommendation that defines various PAD parameters used in X.25 networks. See also PAD and X.25. X3T9.5 Number assigned to the ANSI Task Group of Accredited Standards Committee for their internal, working document describing FDDI. X.400 ITU-T recommendation specifying a standard for electronic mail transfer. X.500 ITU-T recommendation specifying a standard for distributed maintenance of files and directories. X.75 ITU-T specification that defines the signalling system between two PDNs. X.75 is essentially an NNI. See also NNI. X Display Manager Control Protocol See XDMCP. Xerox Network Systems See XNS. X - 171 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. XID exchange identification. Request and response packets exchanged prior to a session between a router and a Token Ring host. If the parameters of the serial device contained in the XID packet do not match the configuration of the host, the session is dropped. Xid See termid. XDMCP X Display Manager Control Protocol. Protocol used to communicate between X terminals and workstations running UNIX. XNS Xerox Network Systems. Protocol suite originally designed by PARC. Many PC networking companies, such as 3Com, Banyan, Novell, and UB Networks used or currently use a variation of XNS as their primary transport protocol. Xremote Protocol developed specifically to optimize support for X Windows over a serial communications link. Xstream Major public PSN in the United States operated by MCI. Formerly called TYMNET. X terminal Terminal that allows a user simultaneous access to several different applications and resources in a multivendor environment through implementation of X Windows. See also X Windows. X Windows Distributed, network-transparent, device-independent, multitasking windowing and graphics system originally developed by MIT for communication between X terminals and UNIX workstations. See also X terminal. Y - 172 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. Y There are currently no glossary words beginning with 'Y' Z - 173 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. Z Term Definition zero code suppression Line coding scheme used for transmission clocking. Zero line suppression substitutes a one in the seventh bit of a string of eight consecutive zeros. See also ones density. ZIP Zone Information Protocol. AppleTalk session layer protocol that maps network numbers to zone names. See also ZIP storm and zone. ZIP storm Broadcast storm that occurs when a router running AppleTalk propagates a route for which it currently has no corresponding zone name. The route is then forwarded by downstream routers, and a ZIP storm ensues. See also ZIP. zone In AppleTalk, a logical group of network devices. See also ZIP. Zone Information Protocol See ZIP. 0 – 9 - 174 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. 0 – 9 Term Definition 10BASE2 10-Mbps baseband Ethernet specification using 50-ohm thin coaxial cable. 10BASE2, which is part of the IEEE 802.3 specification, has a distance limit of 185 meters per segment. See also Cheapernet, Ethernet, IEEE 802.3, and Thinnet. 10BASE5 10-Mbps baseband Ethernet specification using standard (thick) 50-ohm baseband coaxial cable. 10BASE5, which is part of the IEEE 802.3 baseband physical layer specification, has a distance limit of 500 meters per segment. See also Ethernet and IEEE 802.3. 10BASE-F 10-Mbps baseband Ethernet specification that refers to the 10BASE-FB, 10BASE-FL, and 10BASE-FP standards for Ethernet over fiber-optic cabling. See also 10BASE-FB, 10BASE-FL, 10BASE-FP, and Ethernet. 10BASE-FB 10-Mbps baseband Ethernet specification using fiber-optic cabling. 10BASE-FB is part of the IEEE 10BASE-F specification. It is not used to connect user stations, but instead provides a synchronous signaling backbone that allows additional segments and repeaters to be connected to the network. 10BASE-FB segments can be up to 2000 meters long. See also 10BASE-F and Ethernet. 10BASE-FL 10-Mbps baseband Ethernet specification using fiber-optic cabling. 10BASE-FL is part of the IEEE 10BASE-F specification and, while able to interoperate with FOIRL, is designed to replace the FOIRL specification. 10BASE-FL segments can be up to 1000 meters long if used with FOIRL, and up to 2000 meters if 10BASE-FL is used exclusively. See also 10BASE-F, Ethernet, and FOIRL. 10BASE-FP 10-Mbps fiber-passive baseband Ethernet specification using fiber-optic cabling. 10BASE-FP is part of the IEEE 10BASE-F specification. It organizes a number of computers into a star topology without the use of repeaters. 10BASE-FP segments can be up to 500 meters long. See also 10BASE-F and Ethernet. 10BASE-T 10-Mbps baseband Ethernet specification using two pairs of twisted-pair cabling (Category 3, 4, or 5): one pair for transmitting data and the other for receiving data. 10BASE-T, which is part of the IEEE 802.3 specification, has a distance limit of approximately 100 meters per segment. See also Ethernet and IEEE 802.3. 0 – 9 - 175 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. 10Broad36 10-Mbps broadband Ethernet specification using broadband coaxial cable. 10Broad36, which is part of the IEEE 802.3 specification, has a distance limit of 3600 meters per segment. See also Ethernet and IEEE 802.3. 10 Mbps Millions of bits per second. A unit of information transfer rate. Ethernet carries 10 mbps 100BASE-FX 100-Mbps baseband Fast Ethernet specification using two strands of multimode fiber-optic cable per link. To guarantee proper signal timing, a 100BASE-FX link cannot exceed 400 meters in length. Based on the IEEE 802.3 standard. See also 100BASE-X, Fast Ethernet, and IEEE 802.3. 100BASE-T 100-Mbps baseband Fast Ethernet specification using UTP wiring. Like the 10BASE-T technology on which it is based, 100BASE-T sends link pulses over the network segment when no traffic is present. However, these link pulses contain more information than those used in 10BASE-T. Based on the IEEE 802.3 standard. See also 10BASE-T, Fast Ethernet, and IEEE 802.3. 100BASE-T4 100-Mbps baseband Fast Ethernet specification using four pairs of Category 3, 4, or 5 UTP wiring. To guarantee proper signal timing, a 100BASE-T4 segment cannot exceed 100 meters in length. Based on the IEEE 802.3 standard. See also Fast Ethernet and IEEE 802.3. 100BASE-TX 100-Mbps baseband Fast Ethernet specification using two pairs of either UTP or STP wiring. The first pair of wires is used to receive data; the second is used to transmit. To guarantee proper signal timing, a 100BASE-TX segment cannot exceed 100 meters in length. Based on the IEEE 802.3 standard. See also 100BASE-X, Fast Ethernet, and IEEE 802.3. 100BASE-X 100-Mbps baseband Fast Ethernet specification that refers to the 100BASE-FX and 100BASE-TX standards for Fast Ethernet over fiber-optic cabling. Based on the IEEE 802.3 standard. See also 100BASE-FX, 100BASE-TX, Fast Ethernet, and IEEE 802.3. 100VG-AnyLAN 100-Mbps Fast Ethernet and Token Ring media technology using four pairs of Category 3, 4, or 5 UTP cabling. This highspeed transport technology, developed by Hewlett-Packard, can be made to operate on existing 10BASE-T Ethernet networks. Based on the IEEE 802.12 standard. See also IEEE 802.12. 24th channel signaling See A&B bit signaling. 370 block mux channel See block multiplexer channel. 0 – 9 - 176 CCNA 1-4 v 3.0 – Glossary Copyright  2003, Cisco Systems, Inc. 4B/5B local fiber 4-byte/5-byte local fiber. Fiber channel physical media used for FDDI and ATM. Supports speeds of up to 100 Mbps over multimode fiber. See also TAXI 4B/5B. 4-byte/5-byte local fiber See 4B/5B local fiber. 500-CS 500 series communication server. Cisco multiprotocol communication server that combines the capabilities of a terminal server, a telecommuting server, a protocol translator, and an asynchronous router in one unit. 8B/10B local fiber 8-byte/10-byte local fiber. Fiber channel physical media that supports speeds up to 149.76 Mbps over multimode fiber. 8-byte/10-byte local fiber See 8B/10B local fiber. µ micron. See micron. Cisco Systems, Inc. Tous les contenus sont protégés par copyright © 2003, Cisco Systems, Inc. Tous droits réservés. Page 1 sur 1 Gamme Cisco Catalyst 2950. Commutateurs d’étage Catalyst 10/100/1000 La gamme Catalyst® 2950 de Cisco est destinée à la commutation d’étage dédiée Ethernet 10/100/1000 Mbits/s fixe, offrant des performances, une souplesse et une facilité d'administration exceptionnelles, combinées à une protection de l'investissement inégalée. Cette gamme de commutateurs 10/100/1000 à détection automatique offre de nombreuses fonctionnalités avancées de qualité de service (QoS) et de traitement des flux multicast. L’interface de gestion Web fournit des fonctions d’administration faciles à utiliser via la suite CMS (Cisco Cluster Management Suite) et le logiciel Cisco IOS intégré. Le Catalyst 2950T-24 Gigabit sur cuivre, avec deux liaisons ascendantes à haut débit 10/100/1000, offre pour les petites et moyennes entreprises une solution idéale pour migrer de Fast Ethernet vers le Gigabit Ethernet tout en utilisant le câblage cuivre catégorie 5 existant. La gamme de commutateur Catalyst 2950 est composée de 9 modèles différents permettant de combiner tous les besoins en nombre de ports 10/100 de 12 à 48 ports, et les besoins en ports 100FX, Gigabit cuivre, et Gigabit fibre. Fiche Produit Cisco Systems, Inc. Tous les contenus sont protégés par copyright © 2003, Cisco Systems, Inc. Tous droits réservés. Page 2 sur 2 Dénomination du commutateur Nombre de ports 10/100TX Nb de ports Giga Type des ports Giga Nb de ports 100FXA Perf. en Gb/s 106 de pps Logici el IOS utilisa ble 2950-12 12 0 - 0 2,4 1,8 SI 2950-24 24 0 - 0 4,4 3,6 SI 2950SX-24 24 2 SX MT-RJ 0 8,8 6,6 SI 2950C-24 24 0 - 2 5,2 3,9 EI 2950T-24 24 2 10/100/1000 0 8,8 6,6 EI 2950G-12-EI 12 2 GBIC Cisco 0 6,4 4,8 EI 2950G-24-EI 24 2 GBIC Cisco 0 8,8 6,6 EI 2950G-24-EIDC 24 2 GBIC Cisco 0 8,8 6,6 EI 2950G-48-EI 24 2 GBIC Cisco 0 13,6 10,1 EI A Connecteurs MT-RJ pour les ports 100 Base FX. Chaque commutateur de cette gamme a un faible encombrement (1 unité de rack) les rendant très facile à installer sur un bureau ou dans un local technique (Figure 1). Figure 1: Gamme de commutateurs Catalyst 2950 Débit à la vitesse du médium des stations d'extrémité connectées sur le LAN Avec une matrice de commutation de 13,6 Gigabits par secondes (Gb/s) et une bande passante maximale de transfert de 10,1 millions de paquets par seconde (paquets de 64 octets), le Catalyst 2950 délivre sur tous les ports un débit à la vitesse du médium. Le commutateur Catalyst 2950 supporte des fonctions augmentant les performances tel que le Fast EtherChannel®, le Gigabit EtherChannel et le 802.3ad, offrant jusqu’à 4Gb/s de bande passante entre commutateurs, routeurs et serveurs en agrégeant les liens Ethernet, Fast Ethernet et Gigabit Ethernet entre eux et en répartissant la charge par sessions entre les équipements. Migrer vers le Gigabit sur le LAN Les entreprises de taille moyenne qui ont une infrastructure de câblage réseau existante en cuivre (Categorie 5, UTP) ont maintenant la possibilité de migrer leurs LANs en Gigabit Ethernet. Le Catalyst 2950T-24 est doté de deux ports fixes hauts débits 10/100/1000BaseT (Gigabit sur cuivre) en plus des 24 ports 10/100 pour connecter les postes de travail. Pour un prix au port légèrement supérieur, les entreprises de taille moyenne peuvent maintenant faire évoluer leurs LANs en Gigabit Ethernet, ou bien connecter des serveurs en Gigabit sur les mêmes commutateurs que les stations de travail. Combiné avec le nouveau Catalyst 3550-12T Gigabit Ethernet multi-niveaux (2/3&4), le Catalyst 2950T-24 offre une solution Gigabit sur cuivre intégrée pour les entreprises de petites et moyennes tailles qui veulent faire évoluer leurs cœurs de réseaux en Fast Ethernet vers le Gigabit, et qui veulent Cisco Systems, Inc. Tous les contenus sont protégés par copyright © 2003, Cisco Systems, Inc. Tous droits réservés. Page 3 sur 3 pousser le Fast Ethernet jusqu’au poste de travail. Pour de plus longues distances, la remontée vers le cœur de réseau en fibre est toujours la meilleure des solutions. Différences entre les logiciels Cisco IOS Standard (SI) et Enhanced (EI) Image Les commutateurs Catalyst 2950 existent avec deux versions différentes de logiciel Cisco IOS, permettant ainsi de couvrir les besoins en fonctionnalités des petites, moyennes et grandes entreprises à l’extrémité de leur réseau (commutateurs de bureau). La version SI offre les fonctionnalités Cisco IOS basiques pour des données, de la vidéo et des services voix sur un réseau, soit les fonctionnalités nécessaires pour la plupart des petites et moyennes entreprises en France. Pour des administrateurs réseaux et pour des responsables informatiques ayant compris tout l’intérêt de sécurité encore plus avancée, de qualité de service encore plus précise et efficace, et de haute disponibilité du réseau, la version EI offre des services de réseaux intelligents comme la gestion sophistiquée du traffic, l’optimisation de la bande passante et le filtrage des utilisateurs et de la sécurité des accès au réseau. Toutes les fonctionnalités présentes dans la version SI le sont également dans la version EI, et, dans toute la suite de ce document, nous mettrons en évidence par le symbole les caractéristiques spécifiques de la version « Standard » SI par rapport à la version « Enhanced » EI. Qualité de Service évoluée La gamme Catalyst 2950 offre une qualité de service (QoS) de périphérie très évoluée, inégalée dans cette catégorie de produits. Tous les commutateurs Catalyst 2950 supportent deux modes de classification. Le premier mode, fondé sur le standard IEEE 802.1p, consiste à reconnaître les flux déjà étiquetés (802.1p) et à les diriger vers les différentes files d’attentes suivant le niveau de service auquel ils ont droit. Dans le second mode, l’administrateur réseau peut re-classifier les flux sur le port d’entrée avec une valeur par défaut (CoS). Dans le cas où une trame arrive sans que le champ CoS ne soit renseigné (trame dite « non taggée »), l’administrateur réseau peut classifier cette trame avec la valeur de la CoS par défaut définie sur ce port. Cette méthode permet donc d’accepter tout client qui n’est pas capable d’affecter lui-même une classe de service à ses paquets. Une fois que les trames ont été classifiées ou re-classifiées en utilisant une des deux méthodes cidessus, elles sont dirigées vers la file d’attente appropriée en sortie. Les Catalyst 2950 supportent quatre files d’attente en sortie, ce qui permet à l’administrateur réseau une plus grande granularité lorsqu’il affecte les priorités aux applications sur le LAN. L’une de ces files possède une priorité absolue face aux trois autres, utilisée pour les applications temps réel telles que la voix. Le WRR (Weighted Round Robin), une autre amélioration significative, permet de prendre en compte l'ordonnancement entre files d'attente de plus basse priorité en leur permettant de n’être jamais bloquées les unes par rapport aux autres. Ces fonctionnalités permettent aux administrateurs d’ordonnancer le trafic stratégique, le trafic temps réel tel que les ERP (Oracle, SAP, ...), la voix (Téléphonie sur IP), etc. par rapport au trafic normal (FTP, SMTP, flux Web, ...). La version de logiciel Cisco IOS EI permet la prise en compte de manière très précise des caractéristiques de niveaux 2, 3 et 4 pour assurer la QoS sur le réseau. Sa configuration en est grandement simplifiée par la fonction «auto-qos » qui est capable de détecter automatiquement un téléphone IP Cisco et de positionner automatiquement toutes les commandes de classification et de mise en file d’attente de sortie nécessaires au traitement de ce type de flux temps réel. Les Catalyst 2950 EI sont capables de classifier, reclassifier, policer (déterminer si le paquet fait partie d’un profil déterminé de flux et prendre des actions sur le paquet suite à cette analyse), marquer et rejeter un paquet avant même d’être mis dans la mémoire partagée du commutateur. La classification des paquets, de cette sorte, fait respecter les règles de policing en se fondant sur les champs de niveaux 2 à 4. Dans la phase de sortie des paquets sur l’interface destinataire, le commutateur EI recourt à de la mise ordonnée en files d’attentes (« scheduling ») afin de déterminer dans quel ordre ces files sont vidées. Les commutateurs Catalyst 2950 sont également capables d’allouer de la bande passante sur Cisco Systems, Inc. Tous les contenus sont protégés par copyright © 2003, Cisco Systems, Inc. Tous droits réservés. Page 4 sur 4 des critères comme l’adresse MAC source ou destination, l’adresse IP source ou destination, et les numéros de ports UDP et TCP, ce qui est nécessaire à la mise en place d’un contrôle de la bande passante pour certains utilisateurs ou certaines applications. Service Multicast avec IGMP Snooping Les commutateurs doivent être capables de commuter les adresses MAC de multicast (dérivées de l’adresse IP du groupe de multicast). La fonctionnalité IGMP Snooping (Internet Group Management Protocol) permet aux commutateurs d’interpréter les requêtes IGMP et d’associer les ports qui doivent recevoir effectivement le flux multicast, même en niveau 2. Un port est ajouté dans la table de commutation, et associé à une adresse MAC de multicast quand un «IGMP Membership report » est reçu sur ce port. Il doit être supprimé de la table de commutation si un message « IGMP Leave » est reçu ou si il n’y a pas de réponse aux requêtes « IGMP Queries ». Pour obtenir des performances exceptionnelles, cette solution implique que le commutateur soit capable de traiter tous le s paquets multicast de niveau 2, ce qui nécessite un matériel spécialisé (ASIC) pour assurer le maintient du débit. Cisco implémente donc IGMP Snooping grâce à une accélération matérielle dédiée sur sa gamme de commutateurs Catalyst 2950. Quant à la configuration de cette fonctionnalité, elle se fait de façon très simple au travers de CMS (Cisco Cluster Management Suite). Mise en grappe de commutateurs Cisco (Cisco Cluster Management Suite) La technologie révolutionnaire de Cisco permet de regrouper jusqu'à 16 commutateurs Catalyst 2950, 3550, 3500 XL, 2900 XL, et 1900 interconnectés, quel que soit leur éloignement géographique, pour former un domaine d'administration IP unique. La technologie ‘Switch Clustering’ supporte une large gamme d'options de connectivité et de configurations fondées sur des standards, offrant ainsi des performances évolutives répondant au plus près à vos besoins. Pour les commutateurs Catalyst 2950, toutes les options de connectivité sont utilisables (d’Ethernet au 802.3ad). N'étant pas limitée par des modules d'empilement et des câbles propriétaires, la technologie Cisco de mise en grappe de commutateurs porte le domaine d'empilement traditionnel au-delà du simple local technique et autorise les connexions de tous types, adaptées à vos besoins spécifiques d'administration, de performances et de coûts. Un commutateur de contrôle, qui peut être un Catalyst 2950, un 3500XL ou un 3550, assure des services de Proxy et de re-routage pour une administration par une adresse IP unique pour chaque grappe. Toutes les commandes d'administration de grappes sont dirigées vers l'adresse IP du commutateur de contrôle. Pour la redondance, il est possible d'attribuer une adresse IP à un deuxième commutateur et de gérer toute la grappe à l'aide d'une seule adresse IP virtuelle. Si le commutateur principal de contrôle tombe en panne, le commutateur de contrôle secondaire ou de secours prend en charge la gestion de la grappe de manière transparente. La mise en grappe de commutateurs Cisco est accessible via la suite CMS (Cisco Cluster Management Suite), une interface d'administration Web gratuite. Elle permet aux administrateurs de réseau de configurer, de surveiller et de gérer un commutateur depuis tout point du réseau par l'intermédiaire d'un navigateur standard tel que Microsoft Internet Explorer ou Netscape Navigator. Il leu suffit de pointer leur navigateur sur l'adresse IP du commutateur de contrôle de la grappe pour accéder à toutes les fonctions d'administration et à 100% des commandes en lignes du logiciel Cisco IOS, regroupant la configuration et le contrôle des ports, la configuration des VLAN, et l'affichage de clichés du réseau. Cette administration Web fait partie intégrante de l'architecture Cisco de regroupement de commutateurs. Elle permet également de déployer les mises à jour logicielles à travers de multiples commutateurs en une seule passe. Toutes ces fonctions sont cependant, pour des raisons de sécurité, désactivables par l’administrateur réseau. Cisco Systems, Inc. Tous les contenus sont protégés par copyright © 2003, Cisco Systems, Inc. Tous droits réservés. Page 5 sur 5 Sécurité étendue, Administration et fonctions du Cisco IOS intégrés Les commutateurs Cisco Catalyst 2950 sont dotés de plusieurs fonctionnalités exceptionnelles qui améliorent les performances du réseau, son administration et sa sécurité. Les utilisateurs peuvent optimiser la sécurité des données et les performances des réseaux LAN en déployant jusqu'à 64 LANs virtuels (VLAN) par commutateur. Ils ont ainsi l'assurance que les paquets de données sont bien renvoyés uniquement aux stations d'un VLAN donné, créant de ce fait un cloisonnement virtuel entre des groupes de ports sur le réseau et réduisant le volume des transmissions et des broadcasts. Il est possible de créer des liaisons VLAN à partir de n'importe quel port en utilisant le protocole standard 802.1Q. Les VLAN utilisant des protocoles de liaison 802.1Q permettent d'assurer un contrôle plus important, optimisent la sécurité et simplifient les ajouts, les déplacements et les modifications. Les modes PVST+ (Per VLAN Spanning Tree) et 802.1s (Multiple Spanning-Tree Protocol) permettent aux utilisateurs de mettre en oeuvre des liaisons ascendantes redondantes tout en répartissant la charge du trafic sur des liaisons multiples, ce que les mises en oeuvre Spanning Tree standard ne permettent pas. Les technologies Cisco UplinkFast, CrossStack UplinkFast et 802.1w (Rapid Spanning-Tree Protocol) assurent le transfert immédiat vers la liaison ascendante secondaire, et diminuent considérablement (moins de 2 secondes) le temps de convergence de 30 à 60 secondes traditionnellement constaté. Grâce au Catalyst 2950, les administrateurs de réseau peuvent mettre en oeuvre des fonctions de haute sécurité au niveau des ports et de la console. La sécurité sur adresses MAC (Media Access Control) au niveau de chaque port et du commutateur empêche les stations non autorisées d'accéder au réseau ou à l’équipement, de manière statique ou dynamique. La fonction Private VLAN Edge permet d’isoler tous les ports du switch entre eux et d’assurer que tout le trafic entrant par un port ne puisse être dirigé que vers le lien remontant et non vers l’un des autres ports. En outre, une sécurité à niveaux multiples sur l’accès à la console interdit aux utilisateurs non autorisés la modification de la configuration. La fonction d'authentification en RADIUS ou en TACACS+ (Terminal Access Controller Access Control System) permet de centraliser le contrôle d'accès du commutateur et d'empêcher les utilisateurs non autorisés de modifier la configuration. Enfin, la disponibilité du protocole 802.1x permet l’authentification dynamique des utilisateurs sur chaque port. Dans la version logicielle EI des Catalyst 2950, cette authentification en 802.1x des utilisateurs offre également la possibilité d’affecter dynamiquement un VLAN à l’utilisateur, et ceci où qu’il soit sur le réseau. De plus, il est alors possible de positionner des listes de contrôle d’accès (ACL) spécifiques pour chaque utilisateur sur le port sur lequel il a été identifié, ouvrant ainsi la possibilité de gérer la mobilité sur le réseau de manière centralisée et bien plus simplement qu’auparavant. Ces ACLs peuvent également être temporelles et permettre d’offrir des services différents selon la plage horaire, et peuvent aussi filtrer le trafic sur les valeurs du champ DSCP (DiffServ). Tous ces paramètres de contrôle d’accès par port sont effectués en hardware, ce qui garantit qu’il n’y a pas d’impacts de performances lorsqu’ils sont activés. Les Catalyst 2950 EI sont très sécurisés dans leurs capacités d’administration et de configuration car ils supportent SSH (Secure Shell) et SNMPv3 qui permettent de crypter les échanges d’informations en telnet et avec la station d’administration. Enfin, la fonction Private VLAN Edge est accompagnée du Local Proxy ARP pour permettre de minimiser l’impact des broadcasts sur le réseau et d’améliorer la bande passante globale offerte aux utilisateurs. Caractéristiques et avantages Performances exceptionnelles Vitesse maximale du médium, transmission non bloquante sur tous les ports, même sur les ports Gigabit, et sur tous les modèles de la gamme. Matrice de commutation de 8,8 Gbits/s pour les commutateurs en versions de logiciel SI uniquement et 13,6Gbits/s pour les commutateurs en version de Cisco IOS EI. Débits de transfert non bloquants de 1,8 à 10,1 millions de paquets/seconde en fonction du nombre de ports sur le commutateur, assurant des connexions à vitesse maximale sur chaque port. Cisco Systems, Inc. Tous les contenus sont protégés par copyright © 2003, Cisco Systems, Inc. Tous droits réservés. Page 6 sur 6 + 12, 24 ou 48 ports 10Base-T/100Base-TX à détection automatique, chacun fournissant jusqu'à 200 Mbits/s aux utilisateurs individuels, aux serveurs et aux groupes de travail, pour la prise en charge d'applications fortes consommatrices de bande passante. + Les Catalyst 2950 (sauf les versions 2950-12, 2950-24, et 2950C-24) possèdent 2 ports Gigabit Ethernet (1000BaseX) intégrés, fournissant une bande passante totale de 4 Gbits/s aux fédérateurs Gigabit Ethernet, aux serveurs Gigabit Ethernet ou entre les commutateurs, sur une infrastructure cuivre (UTP Catégorie 5E et supérieure), fibre (SX, LX, ZX, CWDM), ou propriétaire pour chaîner en Gigabit jusqu’à 9 équipements (GigaStack). + Le Catalyst 2950C-24 possède, lui, 2 liaisons ascendantes en fibre multimode (100BaseFX) fournissant chacune jusqu'à 200 Mbits/s de bande passante sur une distance de 2 kilomètres maximum. + Architecture à mémoire partagée de 8 Mo, garantissant un débit maximum grâce à une conception qui élimine les blocages de tête de ligne, réduit au minimum les pertes de paquets, et optimise les performances dans les environnements de trafic volumineux de diffusion globale et de diffusion multipoint. + Mémoires DRAM 16 Mo et flash 8 Mo embarquées, autorisant les mises à jour logicielles et optimiser l'investissement. + Agrégation de bande passante via les technologies Fast EtherChannel, Gigabit EtherChannel et 802.3ad, améliorant la tolérance de panne et permettant d'obtenir une bande passante de 400 Mbits/s à 4 Gbits/s entre commutateurs, routeurs et serveurs individuels. + Il est possible de créer des liaisons VLAN à partir de n'importe quel port en utilisant l'étiquetage (Tagging) 802.1Q; 64 VLANs par commutateur avec 64 instances de Spanning Tree (PVST+). + Grâce au protocole IGMP Snooping traité en Hardware, les commutateurs peuvent transférer de façon sélective et dynamique le trafic multipoint IP vers les stations d'extrémité cibles multimédia, réduisant ainsi la masse du trafic sur le réseau. Qualité de Service (QoS) La reclassification par port permet aux utilisateurs de reclasser les valeurs CoS IEEE 802.1p par port d'où une finesse de contrôle supérieure pour l'implémentation d'une qualité de service à la périphérie du réseau local. Quatre files d'attente par port en sortie traité en Hardware. Le WRR (Weighted Round Robin) permet de prendre en compte l'ordonnancement des files d'attentes de basse priorité. La file d’attente avec une priorité absolue permet de traiter les applications temps réel telles que la voix. Simplicité de déploiement et d'utilisation La technologie Switch Clustering de Cisco permet à un utilisateur de gérer jusqu'à seize commutateurs Catalyst 2950, 3550-12T, 3500 XL, 2900 XL et Catalyst 1900 interconnectés, via une adresse IP unique, quel que soit son emplacement sur le réseau. Cisco Systems, Inc. Tous les contenus sont protégés par copyright © 2003, Cisco Systems, Inc. Tous droits réservés. Page 7 sur 7 Compatibilité totale entre le Catalyst 2950 et les Catalyst 3500 XL, Catalyst 2900 XL, ou le Catalyst 1900. En utilisant CMS le Catalyst 2950 peut donc etre le commutateur de controle de la grappe. La fonction d'administration logicielle de grappes permet à l'administrateur réseau de déployer les mises à jour à travers un groupe de Catalyst 3550-12T, Catalyst 2950, Catalyst 3500 XL et Catalyst 2900 XL, rapidement et en toute facilité. Sur chaque port, la détection automatique détermine la vitesse de l'équipement connecté et configure le port pour une commutation à 10 ou 100 Mbits/s, facilitant ainsi le déploiement du commutateur en environnements mixtes 10Base-T/100Base-TX. Sur tous les ports, la fonction de négociation automatique sélectionne le mode de transmission (monodirectionnel ou bidirectionnel) afin d'optimiser la bande passante. La configuration par défaut stockée en mémoire flash garantit que le commutateur peut être connecté très rapidement au réseau et transférer le trafic avec une intervention minimale de l'utilisateur. En outre, en cas de panne d'alimentation, la configuration est conservée. Solution de commutation Cisco IOS intégrée Le contrôle, au niveau de chaque port, des tempêtes de broadcast évite que des stations d'extrémité défectueuses ne pénalisent le système. Le support de l'interface de commande en ligne de Cisco IOS® fournit une interface utilisateur et un jeu de commandes commun à tous les commutateurs Catalyst et aux routeurs Cisco. Le protocole CDP (Cisco Discovery Protocol) permet à un poste d'administration de réseaux CiscoWorks de détecter automatiquement tout commutateur dans une topologie de réseau. Facilité d'administration exceptionnelle La technologie Switch Clustering de Cisco permet à un utilisateur de gérer jusqu'à seize commutateurs Catalyst 2950, 3550, 3500 XL, 2900 XL et 1900 interconnectés, via une adresse IP unique, quel que soit son emplacement sur le réseau, avec un navigateur Web standard comme Netscape Navigator ou Microsoft Explorer. Le support des protocoles SNMP (Simple Network Management Protocol) et Telnet assure l'administration globale en bande, et une console d'administration à interface de commande en ligne garantit l'administration hors bande. Pour présenter une interface d'administration commune aux routeurs, commutateurs et concentrateurs Cisco, les commutateurs peuvent être configurés par le logiciel d'administration de réseaux CiscoWorks 2000 ou par CiscoWorks for Windows. L'agent logiciel RMON (Remote MONitoring) intégré supporte quatre groupes RMON (historiques, statistiques, alarmes et événements) pour les fonctions avancées d'administration, de surveillance et d'analyse du trafic. Les neuf groupes RMON sont supportés, via un port SPAN (Switch Port Analyzer) qui permet de contrôler le trafic d'un port unique à partir d'un seul analyseur de réseau ou d'un seul système d'analyse RMON. La fonction d'autoconfiguration facilite le déploiement des commutateurs en paramétrant automatiquement plusieurs unités à travers le réseau à partir d'un serveur d'initialisation. Le support Cisco Systems, Inc. Tous les contenus sont protégés par copyright © 2003, Cisco Systems, Inc. Tous droits réservés. Page 8 sur 8 des protocoles DNS (Domain Name System), TFTP (Trivial File Transfer Protocol) et NTP (Network Time Protocol) garantit une interopérabilité avec le monde extérieur, tant pour la configuration automatisée que pour la sécurité. STRG (Spanning Tree Root Guard) évite que les périphériques non contrôlés par l'administrateur de réseau ou le fournisseur de services ne deviennent des noeuds racines STP en configurant STRG sur les ports qu'ils contrôlent. BPDU Guard permet de désactiver un port configuré en PortFast lorsqu’il reçoit des BPDU, améliorant ainsi la stabilité et le niveau de sécurité du réseau commuté Sur chaque port, des LED multifonctions fournissent un système d'administration visuel particulièrement pratique sur l'état du port (transfert monodirectionnel ou bidirectionnel, 10BaseT/100Base-TX) et sur l'état du commutateur (système, bloc d'alimentation redondant RPS, utilisation de la bande passante, alimentation en ligne). Sécurité et redondance Support du protocole IEEE 802.1x pour authentifier chaque utilisateur sur une base Radius centralisée et lui autoriser/interdire l’accès au réseau par le port sur lequel il est branché. Le VLAN d’appartenance et les ACLs sont positionnés sur le port La périphérie de VLAN privée assure la sécurité et l'isolation des ports d'un commutateur, garantissant l'acheminement direct du trafic voix de son point d'entrée au périphérique d'agrégation via un chemin virtuel et empêchant son acheminement vers un autre port. La sécurité de type MAC (Media Access Control) au niveau du port empêche les stations non autorisées d'accéder au commutateur. Le mode d'apprentissage d'adresse, spécifié par l'utilisateur, simplifie la configuration et renforce la sécurité. Support du protocole Spanning Tree IEEE 802.1D pour les connexions de réseau fédérateur redondant et les réseaux sans-boucle : simplifie la configuration de réseau et renforce la tolérance aux pannes, {§} avec ses amélioration normalisées 802.1s et 802.1w. Une architecture d'alimentation innovante assure un prix économique et permet aux systèmes Cisco RPS 300 et Cisco RPS 675 de supporter jusqu'à six commutateurs, réduisant le coût d'alimentation redondante par commutateur Pour l'accès à la console, une sécurité à niveaux multiples empêche les utilisateurs non autorisés de modifier la configuration du commutateur. L'authentification TACACS+ contrôle le commutateur de manière centralisée et empêche les utilisateurs non autorisés de modifier la configuration. Caractéristiques techniques Administration Support de la MIB II (Management Information Base) SNMP, extensions de la MIB SNMP et de la MIB pour le pontage (RFC 1493). SNMP v1, v2 et v3 ( crypté ) Cisco Systems, Inc. Tous les contenus sont protégés par copyright © 2003, Cisco Systems, Inc. Tous droits réservés. Page 9 sur 9 Normes Support du protocole IEEE 802.1x Mode bidirectionnel IEEE 802.3x sur ports 10BASE-T, 100BASE-TX et 1000BASE-T Protocole Spanning-Tree IEEE 802.1D, 802.1w, 802.1s Hiérarchisation par priorité CoS IEEE 802.1p VLAN IEEE 802.1Q Aggrégation de liens 802.3ad Spécification 1000Base-X IEEE 802.3z Spécification 1000Base-T IEEE 802.3ab Spécification 100Base-TX IEEE 802.3u Spécification 10Base-T IEEE 802.3 Connecteurs et câbles - Ports 10Base-T : connecteurs RJ-45 ; câblage avec double paire torsadée non blindée UTP catégorie 3, 4 ou 5 - Ports 100Base-TX : connecteurs RJ-45 ; câblage avec double paire torsadée non blindée UTP catégorie 5 - Ports 1000BASE-T : connecteurs RJ-45 ; câblage avec double paire torsadée non blindée UTP catégorie 5 - Ports 100Base-FX : connecteurs MT-RJ ; fibre multimode (10/125 ou 62,5/125) - Port de la console d'administration : Connecteur RJ-45, RJ-45-DB9 (Coté PC) - Câbles MT-RJ (Type de Câble, Références Cisco) 1-mètre, câble multimode MT-RJ-vers-SC, CAB-MTRJ-SC-MM-1M 3-mètre, câble multimode MT-RJ-vers-SC, CAB-MTRJ-SC-MM-3M 5-mètre, câble multimode MT-RJ-vers-SC, CAB-MTRJ-SC-MM-5M 1-mètre, câble multimode MT-RJ-vers-ST, CAB-MTRJ-ST-MM-1M 3-mètre, câble multimode MT-RJ-vers-ST, CAB-MTRJ-ST-MM-3M 5-mètre, cable multimode MT-RJ-vers-ST, CAB-MTRJ-ST-MM-5M Alimentation du commutateur L’alimentation du commutateur peut se faire soit en utilisant son alimentation interne (100-240V-AC) soit en utilisant une alimentation externe redondante (RPS 300). Connecteurs RPS (alimentation redondante) Connexion du RPS aux périphériques externes : câble de 1,2 m avec un connecteur 14 broches identique à chaque extrémité. Auto-détection en cas de défaillance de l’alimentation interne du commutateur. Le Cisco RPS 300 (PWR300-AC-RPS-N1) est livré avec un câble; les autres câbles doivent être commandés séparément. Voyants LED d'état par port - intégrité des liaisons, activité, débit et indications sur le mode bidirectionnel LED d'état du système - indications sur l'état du système, du bloc d'alimentation RPS et de l'utilisation de la bande passante Dimensions (H x L x P) et poids Dimensions: 4,36 (1RU) x 44,5 x 24,18 cm pour tous sauf le Catalyst 2950G-48 Dimensions: 4,36 (1RU) x 44,5 x 33,02 cm pour le Catalyst 2950G-48 Poids : 3,0 kg pour tous sauf le Catalyst 2950G-48 Cisco Systems, Inc. Tous les contenus sont protégés par copyright © 2003, Cisco Systems, Inc. Tous droits réservés. Page 10 sur 10 Poids : 4,5 kg pour le Catalyst 2950G-48 Environnement et alimentation requis Température de fonctionnement : 0 à 45° Celsius Température de stockage : -25 à 70° Celsius Humidité relative en fonctionnement : 10 à 85 %, sans condensation Altitude de fonctionnement : 3000 m maximum Altitude de stockage: 4500 m maximum Consommation : 30W max, 102 BTU/h et 45W max pour le 2950G-48 (154BTU/h) Tension CA en entrée/fréquence : 100 à 127 et 200 à 240 V (détection automatique), 50 à 60 Hz - +12V @ 4,5A en courant continu à travers le Cisco RPS300. Spécifications pour la fibre (Catalyst 2950C-24) Longueur d’onde de transmission optique: 1300 nm (nanomètres) Sensibilité de réception optique: -14dBm (décibels milliwatts) Puissance de transmission optique: -19dBm à -14 dBm Transmission: -19 dBm à -14dBm MTBF (Mean Time Between Failure) WS-C2950T-24 297 144 heures WS-C2950-24 268 292 heures WS-C2950SX-24 403 214 heures WS-C2950C-24 268 292 heures WS-C2950-12 318 440 heures WS-C2950G-24-DC 479 086 heures WS-C2950G-48 159 026 heures WS-C2950G-24 468 884 heures WS-C2950G-12 482 776 heures Bruit généré - WS-C2950T-24, WS-C2950-24, WS-C2950SX-24, WS-C2950C-24, WS-C2950-12, WS-C2950G24-DC, WS-C2950G-24 et WS-C2950G-12 : 46 dBa - WS-C2950G-48 : 48 dBa Certifications de sécurité UL/CSA G0950 Troisième édition CSA 22.2 N° 950 EN 60950 IEC 950 AS/NZS 3260, TS001 Normes CE Certifications d'émissions électromagnétiques FCC Part 15, Class A EN 55022b Class A (CISPR 22 Class A) VCCI Classe A AS/NZS 3548, Classe A Normes CE CLEI code BSMI Class A Cisco Systems, Inc. Tous les contenus sont protégés par copyright © 2003, Cisco Systems, Inc. Tous droits réservés. Page 11 sur 11 Garantie Clauses de garantie applicables à vie Références pour commande Modèles : · WS-C2950-12: 12 10/100 ports · WS-C2950-24: 24 10/100 ports · WS-C2950T-24: 24 10/100 ports + 2 10/100/1000BaseT ports · WS-C2950C-24: 24 10/100 ports + 2 100BaseFX ports · WS-C2950SX-24: 24 10/100 ports + 2 1000BaseSX intégrés · WS-C2950G-12-EI: 12 10/100 ports + 2 1000BaseX (Gbic) · WS-C2950G-24-EI: 24 10/100 ports + 2 1000BaseX (Gbic) · WS-C2950G-48-EI: 24 10/100 ports + 2 1000BaseX (Gbic) · WS-C2950G-24-EI-DC: 24 10/100 ports + 2 1000BaseX (Gbic), CC Pour plus d'informations sur les produits Cisco, appelez le numéro suivant : · Europe : 32 2 778 4242 Adresse du site Web de Cisco France : http://www.cisco.fr Siège social mondial Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 Etats-Unis www.cisco.com Tél. : 408 526-4000 800 553 NETS (6387) Fax : 408 526-4100 Siège Social Européen Cisco Systems Europe 11 rue Camilles Desmoulins 92782 Issy Les moulineaux Cédex 9 France www-europe.cisco.com Tél. : 33 1 58 04 6000 Fax : 33 1 58 04 6100 Siège social Amérique Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 Etats-Unis www.cisco.com Tél. : 408 526-7660 Fax : 408 527-0883 Siège social Asie Pacifique Cisco Systems, Inc. Capital Tower 168 Robinson Road #22-01 to #29-01 Singapour 068912 www.cisco.com Tél. : +65 317 7777 Fax : +65 317 7799 Cisco Systems possède plus de 200 bureaux dans les pays et les régions suivantes. Vous trouverez les adresses, les numéros de téléphone et de fax sur le site Web de Cisco à l’adresse suivante : www.cisco.com/go/offices Afrique du Sud • Allemagne • Arabie saoudite • Argentine • Australie • Autriche • Belgique • Brésil • Bulgarie • Canada • Chili • Colombie • Corée • Costa Rica • Croatie • Danemark • Dubaï, Emirats arabes unis • Ecosse • Espagne • Etats-Unis • Finlande • France • Grèce • Hong Kong SAR • Hongrie • Inde • Indonésie • Irlande • Israël • Italie • Japon • Luxembourg • Malaisie • Mexique • Nouvelle Zélande • Norvège • Pays-Bas • Pérou • Philippines • Pologne • Portugal • Porto Rico • République tchèque • Roumanie • Royaume-Uni • République populaire de Chine • Russie • Singapour • Slovaquie • Slovénie • Suède • Suisse • Taiwan • Thaïlande • Turquie • Ukraine • Venezuela • Vietnam • Zimbabwe Tous les contenus sont protégés par copyright © 1992 – 2003, Cisco Systems, Inc. Tous droits réservés. Catalyst, Cisco, Cisco IOS, Cisco Systems, le logo Cisco Systems, EtherChannel et GigaStack sont des marques déposées de Cisco Systems, Inc. ou des ses filiales aux EtatsUnis et dans certains autres pays. Toutes les autres marques commerciales mentionnées dans ce document ou sur le site Web appartiennent à leurs propriétaires respectifs. L'utilisation du mot partenaire ne traduit pas une relation de partenariat d'entreprises entre Cisco et toute autre société. (0208R)02/03 BW8645 Cisco Systems, Inc. www.cisco.com Cisco Wireless Solutions Software Compatibility Matrix Last Updated: December 12, 2017 This document lists the software compatibility matrix information for the Cisco wireless devices used in a Cisco centralized and distributed wireless LAN solution and in converged access solutions. Contents This document contains the following sections: • Conventions, page 2 • Supported Access Points in Cisco Wireless Software Releases, page 2 • Supported Cisco WLC Platforms in Software Releases, page 14 • Cisco Prime Infrastructure Compatibility Matrix, page 15 • Cisco Connected Mobile Experiences (CMX) Compatibility Matrix, page 61 • Cisco Mobility Services Engine Compatibility Matrix, page 63 • Cisco Mobility Express Solution Compatibility Matrix, page 80 • Converged Access Solution Compatibility Matrix, page 82 • Supported Converged Access Solution Hardware, page 87 • Compatibility Matrix for Legacy Products, page 93 • Inter-Release Controller Mobility, page 111 • New Mobility Support Matrix, page 114 • Cisco Support Community, page 116 • Obtain Documentation and Submit a Service Request, page 116 2 Cisco Wireless Solutions Software Compatibility Matrix Conventions Conventions See Cisco Technical Tips Conventions for information about document conventions. Supported Access Points in Cisco Wireless Software Releases Table 1 lists the supported access points for various Cisco Wireless software releases. For information about compatibility of Cisco Prime Infrastructure with Cisco WLC, see the “Cisco Prime Infrastructure Compatibility Matrix” section on page 15. For information about compatibility of Cisco Mobility Services Engine with Cisco WLC, see the “Cisco Mobility Services Engine Compatibility Matrix” section on page 63. For compatibility information about Cisco WLC and Cisco ISE, see the Cisco ISE Compatibility Information page. Table 1 Cisco WLC Software Releases, AP IOS Releases, and Supported Access Points Cisco WLC Release Access Point IOS Release Supported Access Points 8.6.101.0 15.3(3)JG1 Lightweight APs: 1700, 1800i, 1810 OEAP, 1810W, 1815i, 1815m, 1815t, 1815w, 1830, 1850, 2700, 2800, 3702e, 3702i, 3702p, 3800, 700, 700W, AP803, ASA5506W-AP702 Outdoor and Industrial APs: 1532E, 1532I, 1540, 1560, 1570, and IW3700 Modules: AIR-RM3010L-x-K9 and AIR-RM3000M 8.5.110.0 15.3(3)JF4 Lightweight APs: 1600, 1700, 1800i, 1810 OEAP, 1810W, 1815i, 1815m, 1815t, 1815w, 1830, 1850, 2600, 2700, 2800, 3500e, 3500i, 3500p, 3600e, 3600i, 3600p, 3702e, 3702i, 3702p, 3800, 700, 700W, AP802, AP803, ASA5506W-AP702 Outdoor and Industrial APs: 1532E, 1532I, 1540, 1552E, 1552H, 1552I, 1552C, 1552EU, 1552CU, 1552S, 1560, 1570, and IW3700 Note The Cisco Aironet 1550 Series APs with 64-MB memory are not supported. Modules: AIR-RM3010L-x-K9 and AIR-RM3000M 8.5.105.0 15.3(3)JF1 8.5.103.0 15.3(3)JF 8.4.100.0 15.3(3)JE Lightweight APs: 1600, 1700, 1810 OEAP, 1810W, 1815i, 1815w, 1830, 1850, 2600, 2700, 2800, 3500e, 3500i, 3500p, 3600e, 3600i, 3600p, 3702e, 3702i, 3702p, 3800, 700, 700W, AP802, AP803, ASA5506W-AP702 Outdoor and Industrial APs: 1532E, 1532I, 1552E, 1552H, 1552I, 1552C, 1552EU, 1552CU, 1552S, 1560, 1570, and IW3700 Note The Cisco Aironet 1550 Series APs with 64-MB memory are not supported. Modules: AIR-RM3010L-x-K9 and AIR-RM3000M 3 Cisco Wireless Solutions Software Compatibility Matrix Supported Access Points in Cisco Wireless Software Releases 8.3.133.0 15.3(3)JD11 15.3(3)JDA11 Lightweight APs: 1040, 1140, 1260, 1600, 1700, 1810 OEAP, 1810W, 1815i, 1830, 1850, 2600, 2700, 2800, 3500e, 3500i, 3500p, 3600e, 3600i, 3600p, 3702e, 3702i, 3702p, 3800, 600 OEAP, 700, 700W, AP802, AP803, ASA5506W-AP702 Outdoor and Industrial APs: 1532E, 1532I, 1552E, 1552H, 1552I, 1552C, 1552EU, 1552CU, 1552S, 1560, 1570, and IW3700 Modules: AIR-RM3010L-x-K9 and AIR-RM3000M The Cisco 1040 Series, 1140 Series, and 1260 Series access points have feature parity with Cisco Wireless Release 8.0. Features introduced in Cisco Wireless Release 8.1 or later are not supported on these access points. 8.3.132.0 15.3(3)JD9 15.3(3)JDA9 8.3.130.0 15.3(3)JD7, 15.3(3)JDA7 8.3.122.0 8.3.121.0 15.3(3)JD6 15.3(3)JD5 8.3.112.0 15.3(3)JD4 Lightweight APs: 1040, 1140, 1260, 1600, 1700, 1810 OEAP, 1810W, 1815i, 1830, 1850, 2600, 2700, 2800, 3500e, 3500i, 3500p, 3600e, 3600i, 3600p, 3702e, 3702i, 3702p, 3800, 600 OEAP, 700, 700W, AP802, AP803, ASA5506W-AP702 Outdoor and Industrial APs: 1532E, 1532I, 1552E, 1552H, 1552I, 1552C, 1552EU, 1552CU, 1552S, 1560, 1570, and IW3700 Modules: AIR-RM3010L-x-K9 and AIR-RM3000M The Cisco 1040 Series, 1140 Series, and 1260 Series access points have feature parity with Cisco Wireless Release 8.0. Features introduced in Cisco Wireless Release 8.1 or later are not supported on these access points. 8.3.102.0 15.3(3)JD Lightweight APs: 1040, 1140, 1260, 1600, 1700, 1810 OEAP, 1810W, 1830, 1850, 2600, 2700, 2800, 3500e, 3500i, 3500p, 3600e, 3600i, 3600p, 3702e, 3702i, 3702p, 3800, 600 OEAP, 700, 700W, AP802, AP803, ASA5506W-AP702 Outdoor and Industrial APs: 1532E, 1532I, 1552E, 1552H, 1552I, 1552C, 1552EU, 1552CU, 1552S, 1570, and IW3700 Modules: AIR-RM3010L-x-K9 and AIR-RM3000M Note The Cisco 1040 Series, 1140 Series, and 1260 Series access points have feature parity with Cisco Wireless Release 8.0. Features introduced in Cisco Wireless Release 8.1 and later are not supported on these access points. 8.2.166.0 15.3(3)JC14 15.3(3)JCA14 Lightweight APs: 1040, 1140, 1260, 1600, 1700, 1810 OEAP, 1810W, 1830, 1850, 2600, 2700, 2800, 3500e, 3500i, 3500p, 3600e, 3600i, 3600p, 3702e, 3702i, 3702p, 3800, 600 OEAP, 700, 700W, AP802, AP803, ASA5506W-AP702 Outdoor and Industrial APs: 1532E, 1532I, 1552E, 1552H, 1552I, 1552C, 1552EU, 1552CU, 1552S, 1570, and IW3700 Modules: AIR-RM3010L-x-K9 and AIR-RM3000M Note The Cisco 1040 Series, 1140 Series, and 1260 Series access points have feature parity with Cisco Wireless Release 8.0. Features introduced in Cisco Wireless Release 8.1 and later are not supported on these access points. 8.2.164.0 15.3(3)JC9 15.3(3)JCA9 8.2.161.0 15.3(3)JC8 15.3(3)JCA8 8.2.160.0 15.3(3)JC7 Table 1 Cisco WLC Software Releases, AP IOS Releases, and Supported Access Points (continued) Cisco WLC Release Access Point IOS Release Supported Access Points 4 Cisco Wireless Solutions Software Compatibility Matrix Supported Access Points in Cisco Wireless Software Releases 8.2.151.0 15.3(3)JC6 Lightweight APs: 1040, 1140, 1260, 1600, 1700, 1810 OEAP, 1810W, 1830, 1850, 2600, 2700, 2800, 3500e, 3500i, 3500p, 3600e, 3600i, 3600p, 3702e, 3702i, 3702p, 3800, 600 OEAP, 700, 700W, AP802, AP803, ASA5506W-AP702 Outdoor and Industrial APs: 1532E, 1532I, 1552E, 1552H, 1552I, 1552C, 1552EU, 1552CU, 1552S, 1570, and IW3700 Modules: AIR-RM3010L-x-K9 and AIR-RM3000M Note The Cisco 1040 Series, 1140 Series, and 1260 Series access points have feature parity with Cisco Wireless Release 8.0. Features introduced in Cisco Wireless Release 8.1 and later are not supported on these access points. 8.2.141.0 15.3(3)JC5 8.2.130.0 15.3(3)JC4 8.2.121.0 15.3(3)JC3 8.2.111.0 15.3(3)JC2 Lightweight APs: 1040, 1140, 1260, 1600, 1700, 1810 OEAP, 1810W, 1830, 1850, 2600, 2700, 2800, 3500e, 3500i, 3500p, 3600e, 3600i, 3600p, 3702e, 3702i, 3702p, 3800, 600 OEAP, 700, 700W, AP802, AP803, ASA5506W-AP702 Outdoor and Industrial APs: 1532E, 1532I, 1552E, 1552H, 1552I, 1552C, 1552EU, 1552CU, 1552S, 1570, and IW3700 Modules: AIR-RM3010L-x-K9 and AIR-RM3000M Note The Cisco 1040 Series, 1140 Series, and 1260 Series access points have feature parity with Cisco Wireless Release 8.0. Features introduced in Cisco Wireless Release 8.1 and later are not supported on these access points. 8.2.110.0 15.3(3)JC1 Lightweight APs: 1040, 1140, 1260, 1600, 1700, 1810 OEAP, 1810W, 1830, 1850, 2600, 2700, 2800, 3500e, 3500i, 3500p, 3600e, 3600i, 3600p, 3702e, 3702i, 3702p, 3800, 600 OEAP, 700, 700W, AP802, AP803, ASA5506W-AP702 Outdoor and Industrial APs: 1532E, 1532I, 1552E, 1552H, 1552I, 1552C, 1552EU, 1552CU, 1552S, 1570, and IW3700 Modules: AIR-RM3010L-x-K9 and AIR-RM3000M Note The Cisco 1040 Series, 1140 Series, and 1260 Series access points have feature parity with Cisco Wireless Release 8.0. Features introduced in Cisco Wireless Release 8.1 and later are not supported on these access points. 8.2.100.0 15.3(3)JC Lightweight APs: 1040, 1140, 1260, 1600, 1700, 1830, 1850, 2600, 2700, 3500e, 3500i, 3500p, 3600e, 3600i, 3600p, 3702e, 3702i, 3702p, 600 OEAP, 700, 700W, AP802, AP803, ASA5506W-AP702 Outdoor and Industrial APs: 1532E, 1532I, 1552E, 1552H, 1552I, 1552C, 1552EU, 1552CU, 1552S, 1570, and IW3700 Modules: AIR-RM3010L-x-K9 and AIR-RM3000M Note The Cisco 1040 Series, 1140 Series, and 1260 Series access points have feature parity with Cisco Wireless Release 8.0. Features introduced in Cisco Wireless Release 8.1 and later are not supported on these access points. Table 1 Cisco WLC Software Releases, AP IOS Releases, and Supported Access Points (continued) Cisco WLC Release Access Point IOS Release Supported Access Points 5 Cisco Wireless Solutions Software Compatibility Matrix Supported Access Points in Cisco Wireless Software Releases 8.1.131.0 15.3(3)JBB6 Lightweight APs: 1040, 1140, 1260, 1600, 1700, 1830, 1850, 2600, 2700, 3500e, 3500i, 3500p, 3600e, 3600i, 3600p, 3702e, 3702i, 3702p, 600 OEAP, 700, 700W, AP802, AP803, ASA5506W-AP702 Outdoor and Industrial APs: 1532E, 1532I, 1552E, 1552H, 1552I, 1552C, 1552EU, 1552CU, 1552S, 1570, and IW3700 Modules: AIR-RM3010L-x-K9 and AIR-RM3000M Note The Cisco 1040 Series, 1140 Series, and 1260 Series access points have feature parity with Cisco Wireless Release 8.0. Features introduced in Cisco Wireless Release 8.1 and later are not supported on these access points. 8.1.122.0 15.3(3)JBB5 Lightweight APs: 1040, 1140, 1260, 1600, 1700, 1830, 1850, 2600, 2700, 3500e, 3500i, 3500p, 3600e, 3600i, 3600p, 3702e, 3702i, 3702p, 600 OEAP, 700, 700W, AP802, AP803, ASA5506W-AP702 Outdoor and Industrial APs: 1532E, 1532I, 1552E, 1552H, 1552I, 1552C, 1552EU, 1552CU, 1552S, 1570, and IW3700 Note The Cisco 1040 Series, 1140 Series, and 1260 Series access points have feature parity with Cisco Wireless Release 8.0. Features introduced in Cisco Wireless Release 8.1 and later are not supported on these access points. 8.1.111.0 15.3(3)JBB1 Lightweight APs: 1040, 1140, 1260, 1600, 1700, 1850, 2600, 2700, 3500e, 3500i, 3500p, 3600e, 3600i, 3600p, 3702e, 3702i, 3702p, 600 OEAP, 700, 700W, and AP802 Outdoor and Industrial APs: 1532E, 1532I, 1552E, 1552H, 1552I, 1552C, 1552EU, 1552CU, 1552S, and 1570 Note The Cisco 1040 Series, 1140 Series, and 1260 Series access points have feature parity with Cisco Wireless Release 8.0. Features introduced in Cisco Wireless Release 8.1 and later are not supported on these access points. 8.1.102.0 15.3(3)JBB Lightweight APs: 1040, 1140, 1260, 1600, 1700, 2600, 2700, 3500e, 3500i, 3500p, 3600e, 3600i, 3600p, 3702e, 3702i, 3702p, 600 OEAP, 700, 700W, and AP802 Outdoor and Industrial APs: 1532E, 1532I, 1552E, 1552H, 1552I, 1552C, 1552EU, 1552CU, 1552S, and 1570 Note The Cisco 1040 Series, 1140 Series, and 1260 Series access points have feature parity with Cisco Wireless Release 8.0. Features introduced in Cisco Wireless Release 8.1 and later are not supported on these access points. Table 1 Cisco WLC Software Releases, AP IOS Releases, and Supported Access Points (continued) Cisco WLC Release Access Point IOS Release Supported Access Points 6 Cisco Wireless Solutions Software Compatibility Matrix Supported Access Points in Cisco Wireless Software Releases 8.0.152.0 153-3.JA12 15.3(3)JAA12 12.4(25e)JAP12 Lightweight APs: 1040, 1130, 1140, 1240, 1250, 1260, 1600, 1700, 2600, 2700, 3500e, 3500i, 3500p, 3600e, 3600i, 3600p, 3702e, 3702i, 3702p, 600 OEAP, 700, 700W, AP801, and AP802 Note Cisco MSE Release 8.0.140.x and later includes wIPS support for the Cisco Aironet 1800, 2800, and 3800 series. However, CAS is not supported for these APs. Outdoor and Industrial APs: 1522, 1524PS, 1524SB, 1532E, 1532I, 1552E, 1552H, 1552I, 1552C, 1552EU, 1552CU, 1552S, 1570, and IW3702 Note The Cisco Wireless Release 8.0.135.0 is a repost of the Cisco Wireless Release 8.0.132.0 and 8.0.133.0. This release impacts only the Cisco Aironet 1570 Series APs with -B regulatory domain and meet the following criteria: a. The Cisco 1570 APs that are made available on or after June 2, 2016, for the USA region b. The Cisco 1570 APs that are identified with version ID 02 (V02) This release ensures that Cisco 1570 APs that are made available to customers in the USA are in compliance with the new FCC rules that come into effect on June 2, 2016. 8.0.150.0 15.3(3)JA11 15.3(3)JAA11 12.4(25e)JAP11 8.0.140.0 15.3(3)JA10/ 12.4(25e)JAP10 8.0.135.0 15.3(3)JA9/ 12.4(25e)JAP9 8.0.133.0 15.3(3)JA8/ 12.4(25e)JAP8 Lightweight APs: 1040, 1130, 1140, 1240, 1250, 1260, 1600, 1700, 2600, 2700, 3500e, 3500i, 3500p, 3600e, 3600i, 3600p, 3702e, 3702i, 3702p, 600 OEAP, 700, 700W, AP801, and AP802 Outdoor and Industrial APs: 1522, 1524PS, 1524SB, 1532E, 1532I, 1552E, 1552H, 1552I, 1552C, 1552EU, 1552CU, 1552S, 1570, and IW3702 8.0.132.0 15.3(3)JA7/ 12.4(25e)JAP7 8.0.121.0 15.3(3)JA5/ 12.4(25e)JAP5 Lightweight APs: 1040, 1130, 1140, 1240, 1250, 1260, 1600, 1700, 2600, 2700, 3500e, 3500i, 3500p, 3600e, 3600i, 3600p, 3702e, 3702i, 3702p, 600 OEAP, 700, 700W, AP801, and AP802 Outdoor and Industrial APs: 1522, 1524PS, 1524SB, 1532E, 1532I, 1552E, 1552H, 1552I, 1552C, 1552EU, 1552CU, 1552S, 1570, and IW3702 8.0.120.0 15.3(3)JA4/ 12.4(25e)JAP4 8.0.110.0 8.0.115.0 15.3(3)JA1/ 12.4(25e)JAP1 Lightweight APs: 1040, 1130, 1140, 1240, 1250, 1260, 1600, 1700, 2600, 2700, 3500e, 3500i, 3500p, 3600e, 3600i, 3600p, 3702e, 3702i, 3702p, 600 OEAP, 700, 700W, AP801, and AP802 Outdoor and Industrial APs: 1522, 1524PS, 1524SB, 1532E, 1532I, 1552E, 1552H, 1552I, 1552C, 1552EU, 1552CU, 1552S, and 1570 8.0.100.0 15.3(3)JAB/ 12.4(25e)JAP Lightweight APs: 1040, 1130, 1140, 1240, 1250, 1260, 1600, 1700, 2600, 2700, 3500e, 3500i, 3500p, 3600e, 3600i, 3600p, 3702e, 3702i, 3702p, 600 OEAP, 700, 700W, AP801, and AP802 Outdoor and Industrial APs: 1522, 1524PS, 1524SB, 1532E, 1532I, 1552E, 1552H, 1552I, 1552C, 1552EU, 1552CU, and 1552S 7.6.130.0 15.2(4)JB6/ 12.4.25e-JAO6 Lightweight APs: 1040, 1130, 1140, 1240, 1250, 1260, 1600, 2600, 2700, 3500e, 3500i, 3500p, 3600e, 3600i, 3600p, 3702e, 3702i, 3702p, 600 OEAP, 700, 700W, AP801, and AP802 Outdoor and Industrial APs: 1522, 1524PS, 1524SB, 1532E, 1532I, 1552E, 1552H, 1552I, 1552C, 1552EU, 1552CU, and 1552S 7.6.120.0 15.2(4)JB5/ 12.4(25e)JAO5 7.6.110.0 15.2(4)JB4/ 12.4(25e)JAO4 Lightweight APs: 1040, 1130, 1140, 1240, 1250, 1260, 1600, 2600, 3500e, 3500i, 3500p, 3600e, 3600i, 3600p, 3702e, 3702i, 3702p, 600 OEAP, 700, AP801, and AP802 Outdoor and Industrial APs: 1522, 1524PS, 1524SB, 1532E, 1532I, 1552E, 1552H, 1552I, 1552C, 1552EU, 1552CU, and 1552S 7.6.100.0 15.2(4)JB3/ 12.4(25e)JAO3 Table 1 Cisco WLC Software Releases, AP IOS Releases, and Supported Access Points (continued) Cisco WLC Release Access Point IOS Release Supported Access Points 7 Cisco Wireless Solutions Software Compatibility Matrix Supported Access Points in Cisco Wireless Software Releases 7.5.102.0 15.2(4)JA1/ 12.4(25e)JAN1 Lightweight APs: 1040, 1130, 1140, 1240, 1250, 1260, 1600, 2600, 3500e, 3500i, 3500p, 3600e, 3600i, 3600p, 600 OEAP, 700, AP801, and AP802 Outdoor and Industrial APs: 1522, 1524PS, 1524SB, 1552E, 1552H, 1552I, 1552C, 1552EU, 1552CU, and 1552S 7.4.150.0 15.2(2)JB6/ 12.4(25e)JAM6 Lightweight APs: 1040, 1130, 1140, 1240, 1250, 1260, 1600, 2600, 3500e, 3500i, 3500p, 3600e, 3600i, 600 OEAP, AP801, AP802 Outdoor and Industrial APs: 1522, 1524PS, 1524SB, 1552E, 1552H, 1552I, 1552C, 1552EU, 1552CU, and 1552S 7.4.140.0 15-2(2)JB5/ 12.4(25e)JAM5 7.4.130.0 15.2(2)JB3/ 12.4(25e)JAM4 7.4.121.0 15.2(2)JB3/ 12.4(25e)JAM3 7.4.110.0 15.2(2)JB2/ 12.4(25e)JAM2 7.4.100.60 15.2(2)JB1/ 12.4(25e)JAM1 7.4.100.0 15.2(2)JB/ 12.4(25e)JAM 7.3.112.0 15.2(2)JA1/ 12.4(25e)JAL2 Lightweight APs: 1040, 1130, 1140, 1240, 1250, 1260, 2600, 3500e, 3500i, 3600e, 3600i, 3500p, 600 OEAP, AP801, and AP802 Outdoor and Industrial APs: 1522, 1524PS, 1524SB, 1552E, 1552H, 1552I, 1552C, 1552EU, 1552CU, and 1552S 7.3.101.0 15.2(2)JA/ 12.4(25e)JAL 7.2.115.2 12.4(25e)JA2 Lightweight APs: 1040, 1130, 1140, 1240, 1250, 1260, 2600, 3500e, 3500i, 3500p, 3600e, 3600i, 600 OEAP, AP801, and AP802 Outdoor and Industrial APs: 1522, 1524PS, 1524SB, 1552E, 1552H, 1552I, 1552C, and 1552S 7.2.111.3 12.4(25e)JA2 7.2.110.0 12.4(25e)JA1 7.2.103.0 12.4(25e)JA Lightweight APs: 1040, 1130, 1140, 1240, 1250, 1260, 3500e, 3500i, 3600e, 3500p, 3600i, 600 OEAP, AP801, and AP802 Outdoor and Industrial APs: 1522, 1524PS, 1524SB, 1552E, 1552H, 1552I, 1552C, and 1552S 7.0.252.0 12.4(23c)JA10 Lightweight APs: 1040, 1120, 1130, 1140, 1220, 1230, 1240, 1250, 1260, 1300, 3500, OEAP 600 Series, 3500p, AP801, and AP802 Outdoor and Industrial APs: 1522, 1524SB, 1552E, 1552H, 1552I, 1552C, and 1552S 7.0.251.2 12.4(23c)JA9 7.0.250.0 12.4(23c)JA8 7.0.240.0 12.4(23c)JA7 7.0.235.3 12.4(23c)JA6 7.0.235.0 12.4(23c)JA5 7.0.230.0 12.4(23c)JA4 7.0.220.0 12.4(23c)JA3 Table 1 Cisco WLC Software Releases, AP IOS Releases, and Supported Access Points (continued) Cisco WLC Release Access Point IOS Release Supported Access Points 8 Cisco Wireless Solutions Software Compatibility Matrix Supported Access Points in Cisco Wireless Software Releases Software Release Support for Specific Access Point Modules Table 2 lists the Cisco WLC software releases that support specific Cisco access point modules. The First Support column lists the earliest Cisco WLC software release that supports the access point module. For access point modules that are not supported in ongoing releases, the Last Support column lists the last release that supports the access point module. 7.0.116.0 12.4(23c)JA2 Lightweight APs: 1040, 1120, 1130, 1140, 1220, 1230, 1240, 1250, 1260, 3500e, 3500i, 3500p, 600 OEAP, AP801, AP802 Outdoor and Industrial APs: 1522, 1524PS, 1524SB, 1552E, 1552H, 1552I, and 1552C 7.0.98.218 12.4(23c)JZ Lightweight APs: 1040, 1120, 1130, 1140, 1220, 1230, 1240, 1250, 1260, 1300, 3500, and AP801 Outdoor and Industrial APs: 1522, 1524PS, and 1524SB 7.0.98.0 12.4(23c)JA 6.0.202.0 12.4(21a)JHC Lightweight APs: 1120, 1130, 1140, 1230AG, 1240, 1250, 1300, and AP801 Outdoor and Industrial APs: 1522, 1524PS, and 1524SB 5.2.193.0 12.4(18a)JA2 Lightweight APs: 1120, 1130, 1140, 1220, 1230AG, 1240, 1250, 1300, and AP801 Outdoor and Industrial APs: 1522 and 1524PS 4.1.192.35 M (Mesh Release 3) — 1505, 1510, 1522, 1524PS, 1130, 1240 4.1.191.24 M (Mesh Release 2) — 1505, 1510, 1522 (US, Canada, and RoW), 1130, 1240 4.1.190.5 (Mesh Release 1) — 1505, 1510, 1522 (US and Canada) Table 1 Cisco WLC Software Releases, AP IOS Releases, and Supported Access Points (continued) Cisco WLC Release Access Point IOS Release Supported Access Points Table 2 Software Support for Access Point Modules Access Points First Cisco Wireless Release Support Last Cisco Wireless Release Support First IOS XE Release Support Last IOS XE Release Support 700W Series AIR-CAP702Wx-K9 7.6.120.0 — 3.6.0E — AIR-CAP702W-xK910 7.6.120.0 — 3.6.0E — 700 Series AIR-CAP702I-x-K9 7.5.102.0 — 3.6.0E — AIR-CAP702W-x-K9 7.6.120.0 — 3.6.0E — 9 Cisco Wireless Solutions Software Compatibility Matrix Supported Access Points in Cisco Wireless Software Releases 1000 Series AIR-AP1010 3.0.100.0 4.2.209.0 — — AIR-AP1020 3.0.100.0 4.2.209.0 — — AIR-AP1030 3.0.100.0 4.2.209.0 — — Airespace AS1200 — 4.0 — — AIR-LAP1041N 7.0.98.0 8.3.x 3.2.0SE — AIR-LAP1042N 7.0.98.0 8.3.x 3.2.0SE — 1100 Series AIR-LAP1121 4.0.155.0 7.0.x — — AIR-LAP1131 3.1.59.24 8.0.x — — AIR-LAP1141N 5.2.157.0 8.3.x 3.2.0SE — AIR-LAP1142N 5.2.157.0 8.3.x 3.2.0SE — 1220 Series AIR-AP1220A 3.1.59.24 7.0.x — — AIR-AP1220B 3.1.59.24 7.0.x — — 1230 Series AIR-AP1230A 3.1.59.24 7.0.x — — AIR-AP1230B 3.1.59.24 7.0.x — — AIR-LAP1231G 3.1.59.24 7.0.x — — AIR-LAP1232AG 3.1.59.24 7.0.x — — 1240 Series AIR-LAP1242G 3.1.59.24 8.0.x — — AIR-LAP1242AG 3.1.59.24 8.0.x — — 1250 Series AIR-LAP1250 4.2.61.0 8.0.x — — AIR-LAP1252G 4.2.61.0 8.0.x — — AIR-LAP1252AG 4.2.61.0 8.0.x — — 1260 Series AIR-LAP1261N 7.0.116.0 8.3.x 3.2.0SE — AIR-LAP1262N 7.0.98.0 8.3.x 3.2.0SE — 1300 Series AIR-BR1310G 4.0.155.0 7.0.x — — 1400 Series Standalone Only N/A — — — 1600 Series AIR-CAP1602I-x-K9 7.4.100.0 8.5.x 3.2.0SE — AIR-CAP1602I-xK910 7.4.100.0 8.5.x 3.2.0SE — AIR-SAP1602I-x-K9 7.4.100.0 8.5.x 3.2.0SE — AIR-SAP1602I-xK9-5 7.4.100.0 8.5.x 3.2.0SE — AIR-CAP1602E-x-K9 7.4.100.0 8.5.x 3.2.0SE — AIR-SAP1602E-xK9-5 7.4.100.0 8.5.x 3.2.0SE — 1700 Series AIR-CAP1702I-x-K9 8.0.100.0 — 3.7.0E — AIR-CAP1702I-xK910 8.0.100.0 — 3.7.0E — 1810 Series AIR-OEAP1810-x-K9 8.2.110.0 — — — Table 2 Software Support for Access Point Modules (continued) Access Points First Cisco Wireless Release Support Last Cisco Wireless Release Support First IOS XE Release Support Last IOS XE Release Support 10 Cisco Wireless Solutions Software Compatibility Matrix Supported Access Points in Cisco Wireless Software Releases 1810W Series AIR-AP1810W-x-K9 8.2.110.0 — — — 1815 Series AIR-AP1815I-x-K9 8.3.112.0 — — — AIR-AP1815W-x-K9 8.4.100.0 — — — AIR-AP1815M-x-K9 8.5.103.0 — — — AIR-AP1815T-x-K9 8.5.103.0 — — — 1830 Series AIR-AP1832I-UXK9 8.1.122.0 — 3.7.3 — AIR-AP1832I-UXK910 8.1.122.0 — 3.7.3 — AIR-AP1832I-UXK9C 8.1.122.0 — 3.7.3 — AIRAP1832I-UXK910C 8.1.122.0 — 3.7.3 — AIR-AP1832I-x-K9 8.1.122.0 — 3.7.3 — AIR-AP1832I-x-K9C 8.1.122.0 — 3.7.3 — 1850 Series AIR-AP1852I-UXK9 8.1.111.0 3.7.3 — AIR-AP1852I-UXK910 8.1.111.0 3.7.3 — AIR-AP1852I-UXK9C 8.1.111.0 3.7.3 — AIRAP1852I-UXK910C 8.1.111.0 3.7.3 — AIR-AP1852E-UXK9 8.1.111.0 3.7.3 — AIR-AP1852E-UXK910 8.1.111.0 3.7.3 — AIR-AP1852E-UXK9C 8.1.111.0 3.7.3 — AIRAP1852E-UXK910C 8.1.111.0 3.7.3 — AIR-AP1852E-x-K9 8.1.111.0 3.7.3 — AIR-AP1852E-x-K9C 8.1.111.0 3.7.3 — AIR-AP1852I-x-K9 8.1.111.0 3.7.3 — AIR-AP1852I-x-K9C 8.1.111.0 3.7.3 — AP801 — 5.1.151.0 8.0.x — — AP802 — 7.0.98.0 8.5.x — — AP802H — 7.3.101.0 8.5.x — — AP803 — 8.1.122.0 — — — ASA 5506W-AP702 — 8.1.122.0 — — — Table 2 Software Support for Access Point Modules (continued) Access Points First Cisco Wireless Release Support Last Cisco Wireless Release Support First IOS XE Release Support Last IOS XE Release Support 11 Cisco Wireless Solutions Software Compatibility Matrix Supported Access Points in Cisco Wireless Software Releases 2600 Series AIR-CAP2602I-x-K9 7.2.110.0 8.5.x 3.2.0SE — AIR-CAP2602I-xK910 7.2.110.0 8.5.x 3.2.0SE — AIR-SAP2602I-x-K9 7.2.110.0 8.5.x 3.2.0SE — AIR-SAP2602I-x-K95 7.2.110.0 8.5.x 3.2.0SE — AIR-CAP2602E-x-K9 7.2.110.0 8.5.x 3.2.0SE — AIR-CAP2602E-xK910 7.2.110.0 8.5.x 3.2.0SE — 2700 Series AIR-CAP2702I-x-K9 7.6.120.0 — 3.6.0E — AIR-CAP2702E-x-K9 7.6.120.0 — 3.6.0E — AIR-AP2702I-UXK9 8.0.110.0 — — — 2800 Series AIR-AP2802E-x-K9 8.2.110.0 — — — AIR-AP2802I-x-K9 8.2.110.0 — — — 3500 Series AIR-CAP3501E 7.0.98.x 8.5.x 3.2.0SE — AIR-CAP3501I 7.0.98.x 8.5.x 3.2.0SE — AIR-CAP3502E 7.0.98.x 8.5.x 3.2.0SE — AIR-CAP3502I 7.0.98.x 8.5.x 3.2.0SE — AIR-CAP3502P 7.0.116.0 8.5.x 3.2.0SE — 3600 Series AIR-CAP3602I 7.1.91.0 8.5.x 3.2.0SE — AIR-CAP3602E 7.1.91.0 8.5.x 3.2.0SE — 3700 Series AIR-CAP3702I 7.6.100.0 — 3.3.1SE — AIR-CAP3702E 7.6.100.0 — 3.3.1SE — AIR-CAP3702P 7.6.100.0 — 3.3.1SE — 3800 Series AIR-AP3802E-x-K9 8.2.110.0 — — — AIR-AP3802I-x-K9 8.2.110.0 — — — AIR-AP3802P-x-K9 8.2.110.0 — — — 600 Series AIR-OEAP602I 7.0.116.0 8.3.x — — 1500 Mesh Series AIR-LAP-1505 3.1.59.24 4.2.207.54M — — AIR-LAP-1510 3.1.59.24 4.2.207.54M — — Table 2 Software Support for Access Point Modules (continued) Access Points First Cisco Wireless Release Support Last Cisco Wireless Release Support First IOS XE Release Support Last IOS XE Release Support 12 Cisco Wireless Solutions Software Compatibility Matrix Supported Access Points in Cisco Wireless Software Releases 1520 Mesh Series AIR-LAP1522AG -A and N: 4.1.190.1 or 5.2 or later1 8.0.x — — All other reg. domains: 4.1.191.24M or 5.2 or later1 8.0.x — — AIR-LAP1522HZ -A and N: 4.1.190.1 or 5.2 or later1 8.0.x — — All other reg. domains: 4.1.191.24M or 5.2 or later1 8.0.x — — AIR-LAP1522PC -A and N: 4.1.190.1 or 5.2 or later1 8.0.x — — All other reg. domains: 4.1.191.24M or 5.2 or later1 8.0.x — — AIR-LAP1523CM 7.0.116.0 or later. 8.0.x — — AIR-LAP1524SB -A, C and N: 6.0 or later 8.0.x — — All other reg. domains: 7.0.116.0 or later. 8.0.x — — AIR-LAP1524PS -A: 4.1.192.22M or 5.2 or later1 8.0.x — — 1530 Series AIR-CAP1532I-x-K9 7.6.100.0 — 3.6.0E2 — AIR-CAP1552E-x-K9 7.6.100.0 — 3.6.0E — 1540 Series AIR-AP1542I-x-K9 8.5.103.0 — — — AIR-AP1542D-x-K9 8.5.103.0 — — — 1550 Series3 AIR-CAP1552I-x-K9 7.0.116.0 8.5.x — — AIR-CAP1552E-x-K9 7.0.116.0 8.5.x — — AIR-CAP1552C-x-K9 7.0.116.0 8.5.x — — AIR-CAP1552H-x-K9 7.0.116.0 8.5.x — — AIR-CAP1552SA-x-K9 7.0.220.0 8.5.x — — AIR-CAP1552SD-x-K9 7.0.220.0 8.5.x — — AIR-CAP1552CU-x-K9 7.3.101.0 8.5.x — — AIR-CAP1552EU-x-K9 7.3.101.0 8.5.x — — Table 2 Software Support for Access Point Modules (continued) Access Points First Cisco Wireless Release Support Last Cisco Wireless Release Support First IOS XE Release Support Last IOS XE Release Support 13 Cisco Wireless Solutions Software Compatibility Matrix Supported Access Points in Cisco Wireless Software Releases 1552S AIR-CAP1552SA-x-K9 7.0.220.0 8.5.x — — AIR-CAP1552SD-x-K9 7.0.220.0 8.5.x — — 1560 Series AIR-AP1562I-x-K9 8.3.111.0 — — — AIR-AP1562E-x-K9 8.3.111.0 — — — AIR-AP1562D-x-K9 8.3.111.0 — — — 1570 version ID 01 (V01) AIR-AP1572EAC-x-K9 8.0.110.0 — 3.7.0E — AIR-AP1572ICy4 -x-K9 8.0.110.0 — 3.7.0E — AIR-AP1572ECy-x-K9 8.0.110.0 — 3.7.0E — 1570 version ID 02 (V02) AIR-AP1572EAC-B-K9 8.0.135.0 — — — AIR-AP1572EC1-B-K9 8.0.135.0 — — — AIR-AP1572EC2-B-K9 8.0.135.0 — — — AIR-AP1572IC1-B-K9 8.0.135.0 — — — AIR-AP1572IC2-B-K9 8.0.135.0 — — — IW3700 IW3702-2E-UXK9 8.0.120.0 — — — IW3702-4E-UXK9 8.0.120.0 — — — IW3702-2E-B-K9 8.2.110.0 — — — IW3702-4E-B-K9 8.2.110.0 — — — IW3702-2E-M-K9 8.3.102.0 — — — IW3702-4E-M-K9 8.3.102.0 — — — IW3702-2E-R-K9 8.3.102.0 — — — IW3702-4E-R-K9 8.3.102.0 — — — IW3702-2E-Q-K9 8.3.102.0 — — — IW3702-4E-Q-K9 8.3.102.0 — — — IW3702-2E-S-K9 8.3.102.0 — — — IW3702-4E-S-K9 8.3.102.0 — — — 1. These access points are supported in the separate 4.1.19x.x mesh software release or with release 5.2 or later releases. These access points are not supported in the 4.2, 5.0, or 5.1 Releases. 2. The Cisco Aironet 1530 Series APs are supported operating only in Local mode; these APs in mesh mode are not supported. 3. The Cisco Aironet 1550 Series APs with 64-MB memory are not supported from Release 8.4. 4. y—Country DOCSIS Compliance, see ordering guide for details. Table 2 Software Support for Access Point Modules (continued) Access Points First Cisco Wireless Release Support Last Cisco Wireless Release Support First IOS XE Release Support Last IOS XE Release Support 14 Cisco Wireless Solutions Software Compatibility Matrix Supported Cisco WLC Platforms in Software Releases Related Information • See the relevant release notes before you perform any software upgrade: https://www.cisco.com/c/en/us/support/wireless/wireless-lan-controller-software/products-releasenotes-list.html. • Product Approval Status: https://prdapp.cloudapps.cisco.com/cse/prdapp/jsp/externalsearch.do?action=externalsearch&page =EXTERNAL_SEARCH • Wireless LAN Compliance Lookup: https://www.cisco.com/c/dam/assets/prod/wireless/wireless-compliance-tool/index.html Supported Cisco WLC Platforms in Software Releases Table 3 lists the Cisco WLC software releases in which the support started and ended, as applicable, for various Cisco WLC hardware platforms. For information about supported hardware for Cisco Converged Access Solution, see the “Supported Converged Access Solution Hardware” section on page 87 Table 3 Cisco WLC Platform Support in Software Releases Cisco WLC Platform First Support Last Support 2100 4.2.x 7.x 2504 7.0.x 8.5 3504 8.5 — 4400 4.2.x 7.x 5508 6.0.x 8.5 5520 8.1.x — 7510 7.0.x 8.5 8510 7.3.x 8.5 8540 8.1.x — Virtual Controller (vWLC) 7.3.x — WiSM 4.2.x 7.x WiSM2 (1 DP) 7.0.x 8.5 WiSM2 (2 DP) 7.2.x 8.5 SRE 7.0.x — 15 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix This section contains the following topics: • Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix, page 15 • Cisco Prime Infrastructure and Cisco Converged Access Solution Compatibility Matrix, page 54 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix Table 4 lists the Cisco WLC releases, Cisco Mobility Service Engine (MSE) releases, and Identity Services Engine (ISE) versions that are compatible with the Cisco Prime Infrastructure releases. For information about wireless device support in Cisco Prime Infrastructure, see the following URL: https://www.cisco.com/c/en/us/support/cloud-systems-management/prime-infrastructure/products-devi ce-support-tables-list.html 16 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 3.3 8.6.101.0 8.5.110.0 8.5.105.0 8.5.103.0 8.4.100.0 8.3.133.0 8.3.132.0 8.3.130.0 8.3.12x.0 8.3.112.0 8.3.102.0 8.2.166.0 8.2.164.0 8.2.161.0 8.2.160.0 8.2.151.0 8.2.141.0 8.2.130.0 8.2.121.0 8.2.111.0 8.2.110.0 8.2.100.0 8.1.131.0 8.1.122.0 8.1.111.0 8.1.102.0 8.0.152.0 8.0.150.0 8.0.140.0 8.0.13x.0 8.0.121.0 8.0.120.0 8.0.115.0 8.0.110.0 8.0.100.0 10.4.x 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 10.4.x 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 10.4.x 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 2.3 2.2 2.1 2.0 1.4 1.3 17 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 7.6.130.0 7.6.120.0 7.6.110.0 7.6.100.0 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 18 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 3.2.1 8.5.110.0 8.5.105.0 8.5.103.0 8.4.100.0 8.3.133.0 8.3.132.0 8.3.130.0 8.3.12x.0 8.3.112.0 8.3.102.0 8.2.166.0 8.2.164.0 8.2.161.0 8.2.160.0 8.2.151.0 8.2.141.0 8.2.130.0 8.2.121.0 8.2.111.0 8.2.110.0 8.2.100.0 8.1.131.0 8.1.122.0 8.1.111.0 8.1.102.0 8.0.152.0 8.0.150.0 8.0.140.0 8.0.13x.0 8.0.121.0 8.0.120.0 8.0.115.0 8.0.110.0 8.0.100.0 10.4.x 10.3.x3 10.2.34 10.2.25 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 10.4.x 10.3.x 10.2.34 10.2.25 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 10.4.x 10.3.x 10.2.34 10.2.25 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 2.2 2.12 2.02 1.4**2 1.3** **The latest Cisco Identity Services Engine (ISE) Patch Version works. Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 19 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 7.6.130.0 7.6.120.0 7.6.110.0 7.6.100.0 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 20 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 3.2 8.5.110.0 8.5.105.0 8.5.103.0 8.4.100.0 8.3.133.0 8.3.132.0 8.3.130.0 8.3.12x.0 8.3.112.0 8.3.102.0 8.2.166.0 8.2.164.0 8.2.161.0 8.2.160.0 8.2.151.0 8.2.141.0 8.2.130.0 8.2.121.0 8.2.111.0 8.2.110.0 8.2.100.0 8.1.131.0 8.1.122.0 8.1.111.0 8.1.102.0 8.0.152.0 8.0.150.0 8.0.140.0 8.0.13x.0 8.0.121.0 8.0.120.0 8.0.115.0 8.0.110.0 8.0.100.0 10.4.x 10.3.x3 10.2.34 10.2.25 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 10.4.x 10.3.x 10.2.34 10.2.25 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 10.4.x 10.3.x 10.2.34 10.2.25 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 2.2 2.12 2.02 1.4**2 1.3** **The latest Cisco Identity Services Engine (ISE) Patch Version works. Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 21 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 7.6.130.0 7.6.120.0 7.6.110.0 7.6.100.0 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 22 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 3.1.7 8.4.100.0 8.3.133.0 8.3.132.0 8.3.130.0 8.3.12x.0 8.3.111.0 8.3.112.0 8.3.102.0 8.2.166.0 8.2.164.0 8.2.161.0 8.2.160.0 8.2.151.0 8.2.141.0 8.2.130.0 8.2.121.0 8.2.111.0 8.2.110.0 8.2.100.0 8.1.131.0 8.1.122.0 8.1.111.0 8.1.102.0 8.0.152.0 8.0.150.0 8.0.140.0 8.0.13x.0 8.0.121.0 8.0.120.0 8.0.115.0 8.0.110.0 8.0.100.0 10.4.x 10.3.x3 10.2.34 10.2.25 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 10.4.x 10.3.x 10.2.34 10.2.25 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 10.4.x 10.3.x 10.2.34 10.2.25 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 2.2 2.12 2.02 1.4**2 1.3** **The latest Cisco Identity Services Engine (ISE) Patch Version works. Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 23 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 7.6.130.0 7.6.120.0 7.6.110.0 7.6.100.0 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 24 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 3.1.6 8.4.100.0 8.3.133.0 8.3.132.0 8.3.130.0 8.3.12x.0 8.3.112.0 8.3.111.0 8.3.102.0 8.2.166.0 8.2.164.0 8.2.161.0 8.2.160.0 8.2.151.0 8.2.141.0 8.2.130.0 8.2.121.0 8.2.111.0 8.2.110.0 8.2.100.0 8.1.131.0 8.1.122.0 8.1.111.0 8.1.102.0 8.0.152.0 8.0.150.0 8.0.140.0 8.0.13x.0 8.0.121.0 8.0.120.0 8.0.115.0 8.0.110.0 8.0.100.0 10.4.x 10.3.x3 10.2.34 10.2.25 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 10.4.x 10.3.x 10.2.34 10.2.25 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 10.4.x 10.3.x 10.2.34 10.2.25 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 2.2 2.12 2.02 1.4**2 1.3** **The latest Cisco Identity Services Engine (ISE) Patch Version works. Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 25 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 7.6.130.0 7.6.120.0 7.6.110.0 7.6.100.0 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 26 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 3.1.5 8.4.100.0 8.3.133.0 8.3.132.0 8.3.130.0 8.3.12x.0 8.3.112.0 8.3.102.0 8.2.166.0 8.2.164.0 8.2.161.0 8.2.160.0 8.2.151.0 8.2.141.0 8.2.130.0 8.2.121.0 8.2.111.0 8.2.110.0 8.2.100.0 8.1.131.0 8.1.122.0 8.1.111.0 8.1.102.0 8.0.152.0 8.0.150.0 8.0.140.0 8.0.13x.0 8.0.121.0 8.0.120.0 8.0.115.0 8.0.110.0 8.0.100.0 10.4.x 10.3.x3 10.2.34 10.2.25 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 10.4.x 10.3.x 10.2.34 10.2.25 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 10.4.x 10.3.x 10.2.34 10.2.25 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 2.12 2.02 1.4**2 1.3** **The latest Cisco Identity Services Engine (ISE) Patch Version works. Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 27 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 7.6.130.0 7.6.120.0 7.6.110.0 7.6.100.0 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 28 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 3.1.4 8.3.133.0 8.3.132.0 8.3.130.0 8.3.12x.0 8.3.112.0 8.3.102.0 8.2.166.0 8.2.164.0 8.2.161.0 8.2.160.0 8.2.151.0 8.2.141.0 8.2.130.0 8.2.121.0 8.2.111.0 8.2.110.0 8.2.100.0 8.1.131.0 8.1.122.0 8.1.111.0 8.1.102.0 8.0.152.0 8.0.150.0 8.0.140.0 8.0.13x.0 8.0.121.0 8.0.120.0 8.0.115.0 8.0.110.0 8.0.100.0 10.4.x 10.3.x3 10.2.34 10.2.25 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 10.4.x 10.3.x 10.2.34 10.2.25 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 10.4.x 10.3.x 10.2.34 10.2.25 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 2.12 2.02 1.4**2 1.3 **For Cisco Prime Infrastructure 3.1.4 to work, you must apply Cisco Identity Services Engine (ISE) Patch 3 Version (1.4.0.253-Patch3-141133) to an existing ISE 1.4.0 installation. Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 29 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 7.6.130.0 7.6.120.0 7.6.110.0 7.6.100.0 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 30 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 3.1.3 8.3.133.0 8.3.132.0 8.3.130.0 8.3.12x.0 8.3.112.0 8.3.102.0 8.2.166.0 8.2.164.0 8.2.161.0 8.2.160.0 8.2.151.0 8.2.141.0 8.2.130.0 8.2.121.0 8.2.111.0 8.2.110.0 8.2.100.0 8.1.131.0 8.1.122.0 8.1.111.0 8.1.102.0 8.0.152.0 8.0.150.0 8.0.140.0 8.0.13x.0 8.0.121.0 8.0.120.0 8.0.115.0 8.0.110.0 8.0.100.0 10.4.x 10.3.x3 10.2.34 10.2.25 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 10.4.x 10.3.x 10.2.34 10.2.25 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 10.4.x 10.3.x 10.2.34 10.2.25 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 2.02 1.4**2 1.3 *Cisco Aironet 1810 Series OEAPs are not supported. **For Cisco Prime Infrastructure 3.1.3 to work, you must apply Cisco Identity Services Engine (ISE) Patch 3 Version (1.4.0.253-Patch3-141133) to an existing ISE 1.4.0 installation. Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 31 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 7.6.130.0 7.6.120.0 7.6.110.0 7.6.100.0 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 32 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 3.1.1 8.3.13x.0 8.3.12x.0 8.3.112.0*** 8.3.102.0*** 8.2.16x.0 8.2.151.0 8.2.141.0 8.2.130.0 8.2.121.0 8.2.111.0 8.2.110.0 8.2.100.0 8.1.131.0 8.1.122.0 8.1.111.0 8.1.102.0 8.0.15x.0 8.0.140.0 8.0.13x.0 8.0.121.0 8.0.120.0 8.0.115.0 8.0.110.0 8.0.100.0 10.4.x 10.3.x3 10.2.34 10.2.25 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 10.4.x 10.3.x 10.2.34 10.2.25 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 10.4.x 10.3.x 10.2.34 10.2.25 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 2.02 1.4**2 1.3 **For Cisco Prime Infrastructure 3.1.1 to work, you must apply Cisco Identity Services Engine (ISE) Patch 3 Version (1.4.0.253-Patch3-141133) to an existing ISE 1.4.0 installation. ***No new features of Cisco WLC 8.3.x are supported with Cisco Prime Infrastructure Release 3.1.1. Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 33 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 7.6.130.0 7.6.120.0 7.6.110.0 7.6.100.0 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 34 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 3.1 8.2.16x.0 8.2.151.0 8.2.141.0 8.2.130.0 8.2.121.0 8.2.111.0 8.2.110.0 8.2.100.0 8.1.131.0 8.1.122.0 8.1.111.0 8.1.102.0 8.0.15x.0 8.0.140.0 8.0.13x.0 8.0.121.0 8.0.120.0 8.0.115.0 8.0.110.0 8.0.100.0 10.4.x 10.3.x3 10.2.34 10.2.25 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 10.4.x 10.3.x 10.2.34 10.2.25 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 10.4.x 10.3.x 10.2.34 10.2.25 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 2.02 1.4**2 1.3 **For Cisco Prime Infrastructure 3.1 to work, you must apply Cisco Identity Services Engine (ISE) Patch 3 Version (1.4.0.253-Patch3-141133) to an existing ISE 1.4.0 installation. Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 35 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 7.6.130.0 7.6.120.0 7.6.110.0 7.6.100.0 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 36 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 3.0 Technology Package 8.2.16x.0 8.2.151.0 8.2.141.0 8.2.130.0 8.2.121.0 8.2.111.0 8.2.110.0 8.2.100.0 8.1.131.0 8.1.122.0 8.1.111.0 8.1.102.0 8.0.15x.0 8.0.140.0 8.0.13x.0 8.0.121.0 8.0.120.0 8.0.115.0 8.0.110.0 8.0.100.0 10.4.x 10.3.x3 10.2.34 10.2.25,6 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 10.4.x 10.3.x 10.2.34 10.2.25,6 8.0.130.0 8.0.120.7 8.0.120.0 10.4.x 10.3.x 10.2.34 10.2.25,6 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 1.4**2 1.3 **For Cisco Prime Infrastructure 3.0 to work, you must apply Cisco Identity Services Engine (ISE) Patch 3 Version (1.4.0.253-Patch3-141133) to an existing ISE 1.4.0 installation. Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 37 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 7.6.130.0 7.6.120.0 7.6.110.0 7.6.100.0 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 38 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 3.0.3 8.1.131.0* 8.1.122.0 8.1.111.0 8.1.102.0 8.0.15x.0 8.0.140.0 8.0.13x.0 8.0.121.0 8.0.120.0 8.0.115.0 8.0.110.0 8.0.100.0 7.6.130.0 7.6.120.0 7.6.110.0 7.6.100.0 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 10.4.x 10.3.x3 10.2.34 10.2.25,6 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 10.4.x 10.3.x 10.2.34 10.2.25,6 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 10.4.x 10.3.x 10.2.34 10.2.25,6 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 1.4**2 1.3 *No new features of Cisco WLC 8.1.131.0 are supported with Cisco Prime Infrastructure Release 3.0, but the Mobility Express features are supported. **For Cisco Prime Infrastructure 3.0 to work, you must apply Cisco Identity Services Engine (ISE) Patch 3 Version (1.4.0.253-Patch3-141133) to an existing ISE 1.4.0 installation. Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 39 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 3.0.2 8.1.131.0* 8.1.122.0 8.1.111.0 8.1.102.0 8.0.15x.0 8.0.140.0 8.0.13x.0 8.0.121.0 8.0.120.0 8.0.115.0 8.0.110.0 8.0.100.0 7.6.130.0 7.6.120.0 7.6.110.0 7.6.100.0 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 10.4.x 10.3.x3 10.2.34 10.2.25,6 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 10.4.x 10.3.x 10.2.34 10.2.25,6 8.0.130.0 8.0.120.7 8.0.120.0 10.4.x 10.3.x 10.2.34 10.2.25,6 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 1.4**2 1.3 *No new features of Cisco WLC 8.1.131.0 are supported with Cisco Prime Infrastructure Release 3.0, but the Mobility Express features are supported. **For Cisco Prime Infrastructure 3.0 to work, you must apply Cisco Identity Services Engine (ISE) Patch 3 Version (1.4.0.253-Patch3-141133) to an existing ISE 1.4.0 installation. Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 40 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 3.0.1 8.1.131.0* 8.1.122.0 8.1.111.0 8.1.102.0 8.0.15x.0 8.0.140.0 8.0.13x.0 8.0.121.0 8.0.120.0 8.0.115.0 8.0.110.0 8.0.100.0 7.6.130.0 7.6.120.0 7.6.110.0 7.6.100.0 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 10.4.x 10.3.x3 10.2.34 10.2.25,6 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 10.4.x 10.3.x 10.2.34 10.2.25,6 8.0.130.0 8.0.120.7 8.0.120.0 10.4.x 10.3.x 10.2.34 10.2.25,6 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 1.4**2 1.3 *No new features of Cisco WLC 8.1.131.0 are supported with Cisco Prime Infrastructure Release 3.0, but the Mobility Express features are supported. **For Cisco Prime Infrastructure 3.0 to work, you must apply Cisco Identity Services Engine (ISE) Patch 3 Version (1.4.0.253-Patch3-141133) to an existing ISE 1.4.0 installation. Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 41 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 3.0 8.1.131.0 8.1.122.0* 8.1.111.0 8.1.102.0 8.0.15x.0 8.0.140.0 8.0.13x.0 8.0.121.0 8.0.120.0 8.0.115.0 8.0.110.0 8.0.100.0 7.6.130.0 7.6.120.0 7.6.110.0 7.6.100.0 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 10.4.x 10.3.x3 10.2.34 10.2.25,6 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 10.4.x 10.3.x 10.2.34 10.2.25,6 8.0.130.0 8.0.120.7 8.0.120.0 10.4.x 10.3.x 10.2.34 10.2.25,6 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 1.4**2 1.3 *No new features of Cisco WLC 8.1.122.0 or later including Mobility Express is supported with PI Release 3.0. **For PI 3.0 to work, you must apply Cisco Identity Services Engine (ISE) Patch 3 Version (1.4.0.253-Patch3-141133) to an existing ISE 1.4.0 installation. Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 42 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 2.2.3 8.1.131.0 8.1.122.0 8.1.111.0 8.1.102.0 8.0.15x.0 8.0.140.0 8.0.13x.0 8.0.121.0 8.0.120.0 8.0.115.0 8.0.110.0 8.0.100.0 7.6.130.0 7.6.120.0 7.6.110.0 7.6.100.0 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 10.4.x 10.3.x3 10.2.34 10.2.25,6 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 10.4.x 10.3.x 10.2.34 10.2.25,6 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 10.4.x 10.3.x 10.2.34 10.2.25,6 8.0.150.x1 8.0.140.x1 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 1.4**2 1.3 **For PI 2.2.3 to work, you must apply Cisco Identity Services Engine (ISE) Patch 3 Version (1.4.0.253-Patch3-141133) to an existing ISE 1.4.0 installation. Cisco Prime Infrastructure 2.2.2 allows you to manage Cisco WLC 8.1.x; however, features introduced in Cisco WLC 8.1.x are not supported. Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 43 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 2.2.2 8.1.131.0 8.1.122.0 8.1.111.0 8.1.102.0 8.0.15x.0 8.0.140.0 8.0.13x.0 8.0.121.0 8.0.120.0 8.0.115.0 8.0.110.0 8.0.100.0 7.6.130.0 7.6.120.0 7.6.110.0 7.6.100.0 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 10.4.x 10.3.x3 10.2.34 10.2.25,6 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 10.4.x 10.3.x 10.2.34 10.2.25,6 8.0.130.0 8.0.120.7 8.0.120.0 10.4.x 10.3.x 10.2.34 10.2.25,6 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 1.3 Cisco Prime Infrastructure 2.2.2 allows you to manage Cisco WLC 8.1.x; however, features introduced in Cisco WLC 8.1.x are not supported. Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 44 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 2.2.1 8.1.131.0 8.1.122.0 8.1.111.0 8.1.102.0 8.0.15x.0 8.0.140.0 8.0.13x.0 8.0.121.0 8.0.115.0 8.0.110.0 8.0.100.0 7.6.130.0 7.6.120.0 7.6.110.0 7.6.100.0 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 10.4.x 10.3.x3 10.2.34 10.2.25,6 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 10.4.x 10.3.x 10.2.35 10.2.25,6 8.0.130.0 8.0.120.7 8.0.120.0 10.4.x 10.3.x 10.2.35 10.2.25,6 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 1.3 Cisco Prime Infrastructure 2.2.1 allows you to manage Cisco WLC 8.1.x; however, features introduced in Cisco WLC 8.1.x are not supported. Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 45 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 2.2 8.0.15x.0 8.0.140.0 8.0.13x.0 8.0.121.0 8.0.120.0 8.0.115.0 8.0.110.0 8.0.100.0 7.6.130.0 7.6.120.0 7.6.110.0 7.6.100.0 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 10.4.x 10.3.x3 10.2.34 10.2.25,6 8.0.110.0** 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 10.4.x 10.3.x 10.2.34 10.2.25,6 8.0.130.0 8.0.120.7 8.0.120.0 10.4.x 10.3.x 10.2.34 10.2.25,6 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 1.3 1.2*** 1.1 1.0 * Prime Infrastructure 2.2 allows you to manage Cisco WLC Release 8.0.110.0. For the supported WLC features, see the “supported features” section of the Prime Infrastructure 2.2 Release Notes at the following URL. https://www.cisco.com/c/en/us/td/docs /net_mgmt/prime/infrastructure/2-2/rel ease/notes/cpi_rn.html ** Prime Infrastructure 2.2 allows you to manage Cisco MSE Release 8.0.110.0. For more information on MSE model and platform details, see Table 7. *** Prime Infrastructure supports ISE 1.2 in non-FIPS mode. Note For version compatibility for MSE 8.0 wIPS with PI 2.2, see Table 7. Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 46 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 2.1.2*** 8.0.15x.0 8.0.140.0* 8.0.13x.0* 8.0.121.0* 8.0.120.0* 8.0.115.0* 8.0.110.0* 8.0.100.0* 7.6.130.0* 7.6.120.0* 7.6.110.0* 7.6.100.0* 7.5.102.0* 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 8.0.110.0** 8.0.100.0** 7.6.132.0** 7.6.120.0** 7.6.100.0** 7.5.102.101** 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 1.0 1.1 1.2 * Prime Infrastructure 2.1.2 allows you to manage Cisco WLC Releases 7.5.102.0, 7.6.x, and 8.0.x with the features of Cisco WLC 7.4.130.0 and earlier releases. Cisco Prime Infrastructure 2.1.2 does not support any features that are introduced in Cisco WLC Releases 7.5.102.0 and 7.6.x except the new access point platforms and the new mobility feature. ** Prime Infrastructure 2.1.2 allows you to manage Cisco MSE Releases 7.5.102.101, 7.6.100.0, 7.6.120.0, 8.0.100.0, and 8.0.110.0 with feature compatibility of Cisco MSE Release 7.4.121.0. Prime Infrastructure 2.1.2 does not support any new features introduced in Cisco MSE Releases 7.5.102.101 and 7.6.120.0. For information on MSE model and platform details, see Table 7. *** Cisco AP701E is not supported by Prime Infrastructure 2.1.2. Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 47 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 2.1.1*** 8.0.15x.0 8.0.140.0* 8.0.13x.0* 8.0.121.0* 8.0.120.0* 8.0.115.0* 8.0.110.0* 8.0.100.0* 7.6.130.0* 7.6.120.0* 7.6.110.0* 7.6.100.0* 7.5.102.0* 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 8.0.110.0** 8.0.100.0** 7.6.132.0 7.6.120.0** 7.6.100.0** 7.5.102.101** 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 8.0.130.0 8.0.120.7 8.0.120.0 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 1.0 1.1 1.2 * Prime Infrastructure 2.1.1 allows you to manage Cisco WLC Releases 7.5.102.0, 7.6.100.0, 7.6.110.0, 7.6.120.0, and 8.0.100.0 with the features of Cisco WLC 7.4.130.0 and earlier releases. Cisco Prime Infrastructure 2.1.1 does not support any features that are introduced in Cisco WLC Releases 7.5.102.0 and 7.6.x except the new access point platforms and the new mobility feature. ** Prime Infrastructure 2.1.1 allows you to manage Cisco MSE Releases 7.5.102.101, 7.6.100.0, 7.6.120.0, 8.0.110.0 and 8.0.110.0 with feature compatibility of Cisco MSE Release 7.4.121.0. Prime Infrastructure 2.1.1 does not support any new features introduced in Cisco MSE Releases 7.5.102.101 and 7.6.120.0. For information on MSE model and platform details, see Table 7. *** Cisco AP701E is not supported by Prime Infrastructure 2.1.1. Also, Cisco Aironet 1700 Series Access Points are not supported by Prime Infrastructure until Prime Infrastructure Release 2.2. Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 48 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 2.1 7.6.120.0* 7.5.102.0* 7.4.150.0 7.4.140.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 8.0.110.0** 7.6.132.0 7.6.120.0** 7.5.102.101** 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 — 8.0.110.0 8.0.100.0 7.6.132.0 7.6.120.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 1.0 1.1 1.2 *Prime Infrastructure 2.1 allows you to manage Cisco WLC Releases 7.5.102.0 and 7.6.120.0 with the features of Cisco WLC 7.4.130.0 and earlier releases. Prime Infrastructure 2.1 does not support any features that are introduced in Cisco WLC Releases 7.5.102.0 and 7.6.x except the new access point platforms and the new mobility feature. ** Prime Infrastructure 2.1 allows you to manage Cisco MSE Releases 7.5.102.101 and 7.6.120.0 with feature compatibility of Cisco MSE Release 7.4.121.0. Prime Infrastructure 2.1 does not support any new features introduced in Cisco MSE Releases 7.5.102.101 and 7.6.120.0. For information on MSE model and platform details, see Table 7. Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 49 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 2.0 7.5.102.0* 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 7.5.102.101** 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 — 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 1.0 1.1 1.2 * Cisco Prime Infrastructure 2.0 enables you to manage Cisco WLC 7.5.102.0 with the features of Cisco WLC 7.4.130.0 and earlier releases. Prime Infrastructure 2.0 does not support any features that are introduced in Cisco WLC 7.5.102.0 or later releases including the new access point platforms. ** Cisco Prime Infrastructure 2.0 enables you to manage 7.5.102.101 or later releases of Cisco MSE with features of Cisco MSE Release 7.4.121.0 and earlier releases. Prime Infrastructure 2.0 does not support any features that are introduced in Cisco MSE 7.5.102.101 or later releases. For information on MSE model and platform details, see Table 7. Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 50 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix Update 2 for 1.4.0.45 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 — 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 1.0 1.1 1.2 The Update 2 for Cisco Prime Infrastructure 1.4.0.45 enables you to manage Cisco WLC 7.6.x with the features of Cisco WLC 7.5.102.0 and earlier releases. This release does not support any new features of Cisco WLC 7.6.x. However, this release supports two new AP platforms—Cisco 702w and Cisco 2700. Note For version compatibility for MSE 8.0 wIPS with Update 2 for 1.4.0.45, see Table 7. Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 51 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix Update 1 for 1.4.0.45 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 — 7.6.100.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 1.0 1.1 1.2 The Update 1 for Cisco Prime Infrastructure 1.4.0.45 enables you to manage Cisco WLC 7.6.x with the features of Cisco WLC 7.5.102.0 and earlier releases. This release does not support any new features of Cisco WLC 7.6.x. However, the Aironet 3700 Series Access Points are supported. Note For version compatibility for MSE 8.0 wIPS with Update 1 for 1.4.0.45, see Table 7. Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 52 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 1.4.0.45 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 8.0.110.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 — 8.0.110.0 7.5.102.101 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 1.0 1.1 1.2 — Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 53 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix Update 4 for 1.3.0.20 Update 1 for 1.3.0.20 1.3.0.20 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 — 7.4.121.0 7.4.110.0 7.4.100.0 7.3.101.0 7.2.110.0 7.2.103.0 1.0 1.1 1.2 — 1.2.1.12 7.3.112.0 7.3.101.0 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 7.3.101.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 — 7.3.101.0 7.2.110.0 7.2.103.0 1.0 1.1 — 1. Cisco MSE Release 8.0.140.x and later is compatible with Cisco Prime Infrastructure Releases 3.1.7, 3.1.6, 3.1.5, 3.1.3, 3.1.1, 3.0.3.1, and 2.2.3.5. If you encounter reachability issues with the Cisco MSE, upgrade to Prime Infrastructure Release 3.1.3. (CSCuz19013) 2. ISE 2.x or ISE 1.4 only works with MSE 8.0 or earlier. 3. Cisco CMX Release 10.3.x supports Cisco MSE 3355. However, the HA feature in Cisco CMX Release 10.3.x is not supported on the Cisco MSE 3355. Table 4 Cisco Prime Infrastructure and Cisco Wireless Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco WLC Cisco MSE 3355 Cisco MSE 3365 MSE Virtual Appliance ISE Remarks 54 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix Cisco Prime Infrastructure and Cisco Converged Access Solution Compatibility Matrix Table 5 lists the Cisco IOS/IOS XE releases and the corresponding devices that are compatible with the Cisco Prime Infrastructure releases. 4. Cisco CMX Release 10.2.3 (Cisco Hyperlocation and Cisco 2800 and 3800 series access points) is compatible with Cisco Prime Infrastructure Release 3.1.x with device pack and update patch. PI 3.1.3 update patch: https://software.cisco.com/download/release.html?mdfid=286304360&flowid=&softwareid=284272933&release=3.1.3&relind=AVAILABLE&rellifecy cle=&reltype=latest. PI 3.1.3 device pack: https://software.cisco.com/download/release.html?mdfid=286304360&softwareid=286208063&release=3.1.3&relind=AVAILABLE&rellifecycle=&relt ype=latest. 5. You manually download maps from Cisco Prime Infrastructure to Cisco CMX Release 10.2.2. Client display within Cisco Prime Infrastructure is not supported on Cisco CMX Release 10.2.2. 6. Cisco CMX Release 10.2.x (non-Cisco Hyperlocation apps) is compatible with Cisco Prime Infrastructure Release 2.2.x and 3.0.x. Table 5 Cisco Prime Infrastructure and Cisco IOS/IOS XE Release Compatibility Matrix Cisco Prime Infrastructure Cisco IOS/IOS XE Release Device Remarks 3.3 Cisco IOS XE Denali 16.3.1 Cisco IOS XE Denali 16.3.2 Cisco IOS XE Denali 16.3.3 Cisco IOS XE Denali 16.2.2 Cisco IOS XE Denali 16.1.2 Cisco IOS XE Denali 16.2.1 Cisco IOS XE Denali 16.1.1 03.07.03E 03.07.002E 03.07.001E 03.07.000E 03.06.03E 03.06.02E 03.06.01E 03.06.00E Cisco Catalyst 3850 Switch / Catalyst 38xx stack-able Ethernet Switch Cisco Catalyst 3650 Switch / Catalyst 36xx stack-able Ethernet Switch Cisco 5700 Series Wireless Controller / Catalyst 57xx stack-able Ethernet Switch Cisco Catalyst 4500 Series Switch Supervisor Engine 8-E platform (Platform support from 03.07.00.E and later). Denali 16.x.x does not support MSE 8.0.x. 55 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 3.2 Cisco IOS XE Denali 16.3.1 Cisco IOS XE Denali 16.3.2 Cisco IOS XE Denali 16.3.3 Cisco IOS XE Denali 16.2.2 Cisco IOS XE Denali 16.1.2 Cisco IOS XE Denali 16.2.1 Cisco IOS XE Denali 16.1.1 03.07.03E 03.07.002E 03.07.001E 03.07.000E 03.06.03E 03.06.02E 03.06.01E 03.06.00E Cisco Catalyst 3850 Switch / Catalyst 38xx stack-able Ethernet Switch Cisco Catalyst 3650 Switch / Catalyst 36xx stack-able Ethernet Switch Cisco 5700 Series Wireless Controller / Catalyst 57xx stack-able Ethernet Switch Cisco Catalyst 4500 Series Switch Supervisor Engine 8-E platform (Platform support from 03.07.00.E and later). Denali 16.x.x does not support MSE 8.0.x. 3.1.7 Cisco IOS XE Denali 16.3.5 Cisco IOS XE Denali 16.3.3 Cisco IOS XE Denali 16.3.2 Cisco IOS XE Denali 16.3.1 Cisco IOS XE Denali 16.2.2 Cisco IOS XE Denali 16.1.2 Cisco IOS XE Denali 16.2.1 Cisco IOS XE Denali 16.1.1 03.07.03E 03.07.002E 03.07.001E 03.07.000E 03.06.03E 03.06.02E 03.06.01E 03.06.00E Cisco Catalyst 3850 Switch / Catalyst 38xx stack-able Ethernet Switch Cisco Catalyst 3650 Switch / Catalyst 36xx stack-able Ethernet Switch Cisco 5700 Series Wireless Controller / Catalyst 57xx stack-able Ethernet Switch Cisco Catalyst 4500 Series Switch Supervisor Engine 8-E platform (Platform support from 03.07.00.E and later). Denali 16.x.x does not support MSE 8.0.x. Table 5 Cisco Prime Infrastructure and Cisco IOS/IOS XE Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco IOS/IOS XE Release Device Remarks 56 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 3.1.6 Cisco IOS XE Denali 16.3.1 Cisco IOS XE Denali 16.3.2 Cisco IOS XE Denali 16.3.3 Cisco IOS XE Denali 16.2.2 Cisco IOS XE Denali 16.1.2 Cisco IOS XE Denali 16.2.1 Cisco IOS XE Denali 16.1.1 03.07.03E 03.07.002E 03.07.001E 03.07.000E 03.06.03E 03.06.02E 03.06.01E 03.06.00E Cisco Catalyst 3850 Switch / Catalyst 38xx stack-able Ethernet Switch Cisco Catalyst 3650 Switch / Catalyst 36xx stack-able Ethernet Switch Cisco 5700 Series Wireless Controller / Catalyst 57xx stack-able Ethernet Switch Cisco Catalyst 4500 Series Switch Supervisor Engine 8-E platform (Platform support from 03.07.00.E and later). Denali 16.x.x does not support MSE 8.0.x. 3.1.5 Cisco IOS XE Denali 16.3.1 Cisco IOS XE Denali 16.3.2 Cisco IOS XE Denali 16.2.2 Cisco IOS XE Denali 16.1.2 Cisco IOS XE Denali 16.2.1 Cisco IOS XE Denali 16.1.1 03.07.03E 03.07.002E 03.07.001E 03.07.000E 03.06.03E 03.06.02E 03.06.01E 03.06.00E Cisco Catalyst 3850 Switch / Catalyst 38xx stack-able Ethernet Switch Cisco Catalyst 3650 Switch / Catalyst 36xx stack-able Ethernet Switch Cisco 5700 Series Wireless Controller / Catalyst 57xx stack-able Ethernet Switch Cisco Catalyst 4500 Series Switch Supervisor Engine 8-E platform (Platform support from 03.07.00.E and later). Denali 16.x.x does not support MSE 8.0.x. Table 5 Cisco Prime Infrastructure and Cisco IOS/IOS XE Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco IOS/IOS XE Release Device Remarks 57 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 3.1.4 Cisco IOS XE Denali 16.3.1 Cisco IOS XE Denali 16.1.2 Cisco IOS XE Denali 16.2.2 Cisco IOS XE Denali 16.2.1 Cisco IOS XE Denali 16.1.1 03.07.03E 03.07.002E 03.07.001E 03.07.000E 03.06.03E 03.06.02E 03.06.01E 03.06.00E Cisco Catalyst 3850 Switch / Catalyst 38xx stack-able Ethernet Switch Cisco Catalyst 3650 Switch / Catalyst 36xx stack-able Ethernet Switch Cisco 5700 Series Wireless Controller / Catalyst 57xx stack-able Ethernet Switch Cisco Catalyst 4500 Series Switch Supervisor Engine 8-E platform (Platform support from 03.07.00.E and later). Denali 16.x.x does not support MSE 8.0.x. 3.1.3 Cisco IOS XE Denali 16.2.2 Cisco IOS XE Denali 16.1.2 Cisco IOS XE Denali 16.2.1 Cisco IOS XE Denali 16.1.1 03.07.03E 03.07.002E 03.07.001E 03.07.000E 03.06.03E 03.06.02E 03.06.01E 03.06.00E Cisco Catalyst 3850 Switch / Catalyst 38xx stack-able Ethernet Switch Cisco Catalyst 3650 Switch / Catalyst 36xx stack-able Ethernet Switch Cisco 5700 Series Wireless Controller / Catalyst 57xx stack-able Ethernet Switch Cisco Catalyst 4500 Series Switch Supervisor Engine 8-E platform (Platform support from 03.07.00.E and later). Denali 16.x.x does not support MSE 8.0.x. 3.1.1 Cisco IOS XE Denali 16.1.2 Cisco IOS XE Denali 16.2.1 Cisco IOS XE Denali 16.1.1 03.07.03E 03.07.002E 03.07.001E 03.07.000E 03.06.03E 03.06.02E 03.06.01E 03.06.00E Cisco Catalyst 3850 Switch / Catalyst 38xx stack-able Ethernet Switch Cisco Catalyst 3650 Switch / Catalyst 36xx stack-able Ethernet Switch Cisco 5700 Series Wireless Controller / Catalyst 57xx stack-able Ethernet Switch Cisco Catalyst 4500 Series Switch Supervisor Engine 8-E platform (Platform support from 03.07.00.E and later). Denali 16.x.x does not support MSE 8.0.x. Table 5 Cisco Prime Infrastructure and Cisco IOS/IOS XE Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco IOS/IOS XE Release Device Remarks 58 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 3.1 Cisco IOS XE Denali 16.1.2 Cisco IOS XE Denali 16.2.1 Cisco IOS XE Denali 16.1.1 03.07.03E 03.07.002E 03.07.001E 03.07.000E 03.06.03E 03.06.02E 03.06.01E 03.06.00E Cisco Catalyst 3850 Switch / Catalyst 38xx stack-able Ethernet Switch Cisco Catalyst 3650 Switch / Catalyst 36xx stack-able Ethernet Switch Cisco 5700 Series Wireless Controller / Catalyst 57xx stack-able Ethernet Switch Cisco Catalyst 4500 Series Switch Supervisor Engine 8-E platform (Platform support from 03.07.00.E and later). Denali 16.x.x does not support MSE 8.0.x. 3.0 Technology Pack Cisco IOS XE Denali 16.1.1 03.07.002E 03.07.001E 03.07.000E 03.06.03E 03.06.02E 03.06.01E 03.06.00E Cisco Catalyst 3850 Switch / Catalyst 38xx stack-able Ethernet Switch Cisco Catalyst 3650 Switch / Catalyst 36xx stack-able Ethernet Switch Cisco 5700 Series Wireless Controller / Catalyst 57xx stack-able Ethernet Switch Cisco Catalyst 4500 Series Switch Supervisor Engine 8-E platform (Platform support from 03.07.00.E and later). Denali 16.x.x does not support MSE 8.0.x. 3.0.2 03.07.002E 03.07.001E 03.07.000E 03.06.03E 03.06.02E 03.06.01E 03.06.00E Cisco Catalyst 3850 Switch / Catalyst 38xx stack-able Ethernet Switch Cisco Catalyst 3650 Switch / Catalyst 36xx stack-able Ethernet Switch Cisco 5700 Series Wireless Controller / Catalyst 57xx stack-able Ethernet Switch Cisco Catalyst 4500 Series Switch Supervisor Engine 8-E platform (Platform support from 03.07.00.E and later). 3.0.1 03.07.002E 03.07.001E 03.07.000E 03.06.03E 03.06.02E 03.06.01E 03.06.00E Cisco Catalyst 3850 Switch / Catalyst 38xx stack-able Ethernet Switch Cisco Catalyst 3650 Switch / Catalyst 36xx stack-able Ethernet Switch Cisco 5700 Series Wireless Controller / Catalyst 57xx stack-able Ethernet Switch Cisco Catalyst 4500 Series Switch Supervisor Engine 8-E platform (Platform support from 03.07.00.E and later). Table 5 Cisco Prime Infrastructure and Cisco IOS/IOS XE Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco IOS/IOS XE Release Device Remarks 59 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 3.0 03.07.002E 03.07.001E 03.07.000E 03.06.03E 03.06.02E 03.06.01E 03.06.00E Cisco Catalyst 3850 Switch / Catalyst 38xx stack-able Ethernet Switch Cisco Catalyst 3650 Switch / Catalyst 36xx stack-able Ethernet Switch Cisco 5700 Series Wireless Controller / Catalyst 57xx stack-able Ethernet Switch Cisco Catalyst 4500 Series Switch Supervisor Engine 8-E platform (Platform support from 03.07.00.E and later). 2.2.3 03.07.00E 03.06.03E 03.06.01E 03.06.00E 03.03.03S 03.03.04S 03.03.05SE Cisco Catalyst 3850 Switch / Catalyst 38xx stack-able Ethernet Switch Cisco Catalyst 3650 Switch / Catalyst 36xx stack-able Ethernet Switch Cisco 5700 Series Wireless Controller / Catalyst 57xx stack-able Ethernet Switch 03.07.00E* 03.07.01E Cisco Catalyst 3850 Switch / Catalyst 38xx stack-able Ethernet Switch Cisco Catalyst 3650 Switch / Catalyst 36xx stack-able Ethernet Switch Cisco 5700 Series Wireless Controller / Catalyst 57xx stack-able Ethernet Switch Cisco Catalyst 4500 Series Switch Supervisor Engine 8-E *With Release 03.07.00.E, support is introduced for Cisco Catalyst 4500 Series Switch Supervisor Engine 8-E platform. 2.2.2 03.07.00E 03.06.03E 03.06.01E 03.06.00E 03.03.03S 03.03.04S 03.03.05SE Cisco Catalyst 3850 Switch / Catalyst 38xx stack-able Ethernet Switch Cisco Catalyst 3650 Switch / Catalyst 36xx stack-able Ethernet Switch Cisco 5700 Series Wireless Controller / Catalyst 57xx stack-able Ethernet Switch 03.07.00E* 03.07.01E Cisco Catalyst 3850 Switch / Catalyst 38xx stack-able Ethernet Switch Cisco Catalyst 3650 Switch / Catalyst 36xx stack-able Ethernet Switch Cisco 5700 Series Wireless Controller / Catalyst 57xx stack-able Ethernet Switch Cisco Catalyst 4500 Series Switch Supervisor Engine 8-E *With Release 03.07.00.E, support is introduced for Cisco Catalyst 4500 Series Switch Supervisor Engine 8-E platform. Table 5 Cisco Prime Infrastructure and Cisco IOS/IOS XE Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco IOS/IOS XE Release Device Remarks 60 Cisco Wireless Solutions Software Compatibility Matrix Cisco Prime Infrastructure Compatibility Matrix 2.2 03.07.00E 03.06.03E 03.06.01E 03.06.00E 03.03.03S 03.03.04S 03.03.05SE Cisco Catalyst 3850 Switch / Catalyst 38xx stack-able Ethernet Switch Cisco Catalyst 3650 Switch / Catalyst 36xx stack-able Ethernet Switch Cisco 5700 Series Wireless Controller / Catalyst 57xx stack-able Ethernet Switch *With Release 03.07.00.E, support is introduced for Cisco Catalyst 4500 Series Switch Supervisor Engine 8-E platform. 03.07.00E* 03.07.01E Cisco Catalyst 3850 Switch / Catalyst 38xx stack-able Ethernet Switch Cisco Catalyst 3650 Switch / Catalyst 36xx stack-able Ethernet Switch Cisco 5700 Series Wireless Controller / Catalyst 57xx stack-able Ethernet Switch Cisco Catalyst 4500 Series Switch Supervisor Engine 8-E 2.1.2 03.06.03E 3.6.1E 3.6.0E 03.03.03S 03.03.04S 03.03.05SE Cisco Catalyst 3850 Switch / Catalyst 38xx stack-able Ethernet Switch Cisco Catalyst 3650 Switch / Catalyst 36xx stack-able Ethernet Switch Cisco 5700 Series Wireless Controller / Catalyst 57xx stack-able Ethernet Switch We recommend that you use Cisco Prime Infrastructure 2.1.2 if MSE is also deployed. We recommend that you use Cisco Prime Infrastructure 2.1 if MSE is not deployed. 2.1.1 3.6.0E 03.03.02SE 03.03.01SE 03.03.00SE Cisco Catalyst 3850 Switch / Catalyst 38xx stack-able Ethernet Switch Cisco Catalyst 3650 Switch / Catalyst 36xx stack-able Ethernet Switch Cisco 5700 Series Wireless Controller / Catalyst 57xx stack-able Ethernet Switch We recommend that you use Cisco Prime Infrastructure 2.1.1 if MSE is also deployed. We recommend that you use Cisco Prime Infrastructure 2.1 if MSE is not deployed. 2.1 3.6.0E 3.3.2SE 3.3.1SE 3.3.0SE 3.2.3SE 3.2.2SE Cisco Catalyst 3850 Switch / Catalyst 38xx stack-able Ethernet Switch Cisco 5700 Series Wireless Controller / Catalyst 57xx stack-able Ethernet Switch For Release 3.6.0E, we recommend that you use Cisco Prime Infrastructure 2.1 if MSE is not deployed. If MSE is deployed on your network, we recommend that you upgrade to Cisco Prime Infrastructure 2.1.1. — 3.6.0E 3.3.2SE 3.3.1SE 3.3.0SE Cisco Catalyst 3650 Switch / Catalyst 36xx stack-able Ethernet Switch Table 5 Cisco Prime Infrastructure and Cisco IOS/IOS XE Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco IOS/IOS XE Release Device Remarks 61 Cisco Wireless Solutions Software Compatibility Matrix Cisco Connected Mobile Experiences (CMX) Compatibility Matrix Cisco Connected Mobile Experiences (CMX) Compatibility Matrix Table 6 lists the CMX solution compatibility matrix. Important Notes: • If you are running Cisco CMX Release 10.1.x, we strongly recommend that you upgrade to Cisco CMX Release 10.3.x or later. • You must manually download maps from Cisco Prime Infrastructure to Cisco CMX Release 10.3.x or later. Auto-import is not supported. • Cisco CMX Release 10.2.x and later are supported on the MSE 3355 but on a limited scale in terms of number of tracked clients and number of WLCs synchronized. Scale numbers for Location and Presence Analytics are documented in the https://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/connected-mobile-experie nces/datasheet-c78-734648.html. • Cisco MSE 3365 supports Cisco Prime Infrastructure 2.1.1 and later. Cisco MSE 3365 does not support Cisco Prime Infrastructure 2.1.0. • Cisco Hyperlocation is not be supported on the MSE 3355. 2.0 3.3.1SE 3.3.0SE 3.2.3SE Cisco Catalyst 3850 Switch Cisco 5700 Series Wireless Controller Cisco Catalyst 3650 Switch that is supported with 3.3.xSE release is not supported with Cisco Prime Infrastructure 2.0. IOS12.2(50)SE IOS12.2(50)SG IOS12.2(33)SXI Cisco Catalyst 3750 Switch Can be used only for monitoring purposes. 1.4.0.45 3.2.1SE 3.2.2SE Cisco Catalyst 3850 Switch Can be used only for monitoring purposes. IOS12.2(50)SE IOS12.2(50)SG IOS12.2(33)SXI Cisco Catalyst 3750 Switch Can be used only for monitoring purposes. 1.3.0.20 3.2.1SE Cisco Catalyst 3850 Switch Can be used only for monitoring purposes. IOS12.2(50)SE IOS12.2(50)SG IOS12.2(33)SXI Cisco Catalyst 3750 Switch Can be used only for monitoring purposes. 1.2.1.12 — — — IOS12.2(50)SE IOS12.2(50)SG IOS12.2(33)SXI Cisco Catalyst 3750 Switch Can be used only for monitoring purposes. Table 5 Cisco Prime Infrastructure and Cisco IOS/IOS XE Release Compatibility Matrix (continued) Cisco Prime Infrastructure Cisco IOS/IOS XE Release Device Remarks 62 Cisco Wireless Solutions Software Compatibility Matrix Cisco Connected Mobile Experiences (CMX) Compatibility Matrix • Cisco WLC Release 8.1.131.0 or later is required to use with CMX Hyperlocation. • Cisco WLC Release 7.x supports the complete set of Cisco CMX Connect services. However: – Cisco WLC Release 8.2 or later is required to use these features available on Cisco CMX Release 10.2.2: menu link, text link on login page, and DNS-ACL configuration. – Cisco WLC Release 8.3 or later is required to use the PMS policy uplink bandwidth enforcement feature available on Cisco CMX Release 10.2.2. • The High Availability feature on Cisco CMX: – Is supported only in Cisco CMX Release 10.3.x and later. – Is supported on all platforms supported by Cisco CMX Release 10.3.x and later. Note The HA feature in Cisco CMX Release 10.3.x or later is not supported on the Cisco MSE 3355. – Requires that both primary and standby servers have the same virtual machine size and the same virtual Cisco MSE appliances. • Hyperlocation with the High Availability feature on Cisco CMX requires Cisco WLC Release 8.4.1.210 or later. Table 6 Cisco CMX Compatibility Matrix Cisco CMX Platform Prime Infrastructure WLC Converged Access Access Point Platforms 10.4.x MSE Virtual Appliance CISCO_CMX-10.4 MSE 3365 MSE 33555 3.0 to 3.3 2.2 8.0 to 8.6 n/a Cisco Aironet 1540, 1552H, 1560, 1562, 1800, 1810, 1815, 1830, 1850, 2800, and 3800 series. 1,2,6 APs with integrated controller functionality: Cisco Aironet 1850 series, 1830 series3 APs without integrated controller functionality: Cisco Aironet 700i, 700w, 1600 series, 1700 series, 2600 series, 2700 series, 3500 series, 3600 series, 3700 series Cisco Aironet 1800i Access Point and the Cisco Aironet 1800s Wireless Network Sensor4 1. Cisco CMX Release 10.3.x supports Cisco access points supported by Cisco WLC Release 8.0 or later. 2. Cisco Aironet 1815I and 1560 (1560I, 1560E, 1560D) series are compatible with Cisco CMX Release 10.3.x. 3. Cisco CMX Release 10.2.3 or later supports Cisco Aironet 1850 and 1830 series. 4. Cisco CMX Release 10.4.x or later supports Cisco Aironet 1800i Access Point and the Cisco Aironet 1800s Wireless Network Sensor. 10.3.x MSE Virtual Appliance CISCO_CMX-10.3 MSE 3365 MSE 33555 3.0 to 3.2 2.2 8.0 to 8.5 n/a 10.2.3 MSE Virtual Appliance CISCO_CMX-10.2.3 MSE 3365 MSE 3355 3.x6 2.2.x7 7.6 to 8.5 16.3.x 16.2.x 10.2.2 MSE Virtual Appliance CISCO_CMX-10.2.2 MSE 3365 MSE 3355 3.x7,8 2.2.x7,8 7.6 to 8.5 16.3.x 16.2.x 63 Cisco Wireless Solutions Software Compatibility Matrix Cisco Mobility Services Engine Compatibility Matrix Cisco Mobility Services Engine Compatibility Matrix This section contains the following topics: • Cisco MSE Compatibility Matrix for Software Versions 7.5.x through 8.x, page 63 • Cisco MSE Compatibility Matrix for Legacy Software Versions, page 75 Note For information about the Cisco Connected Mobile Experiences (CMX) 10.x solution compatibility matrix, see Table 5. Cisco MSE Compatibility Matrix for Software Versions 7.5.x through 8.x Note For MSE Release 8.0.x HA and WLC Release 8.0 or later, Prime Infrastructure Release 2.2.x is compatible. Note AeroScout CLE is not bundled with Cisco MSE release 7.5 and later. However, AeroScout CLE is compatible with Cisco MSE Release 7.5 and later, which uses the API interface. 5. Cisco CMX Release 10.3.x or later supports Cisco MSE 3355. However, the HA feature in Cisco CMX Release 10.3.x or later is not supported on the Cisco MSE 3355. 6. Cisco CMX Release 10.2.3 (Cisco Hyperlocation and Cisco 2800 and 3800 series access points) is compatible with Cisco Prime Infrastructure Release 3.1.x with device pack and update patch. PI 3.1.3 update patch: https://software.cisco.com/download/release.html?mdfid=286304360&flowid=&softwareid=284272933&release=3.1.3&relind=AVAILABLE&rellifec ycle=&reltype=latest. PI 3.1.3 device pack: https://software.cisco.com/download/release.html?mdfid=286304360&softwareid=286208063&release=3.1.3&relind=AVAILABLE&rellifecycle=&rel type=latest. 7. Cisco CMX Release 10.2.x (non-Cisco Hyperlocation apps) is compatible with Cisco Prime Infrastructure Release 2.2.x and 3.0.x. 8. You manually download maps from Cisco Prime Infrastructure to Cisco CMX Release 10.2.2. Client display within Cisco Prime Infrastructure is not supported on Cisco CMX Release 10.2.2. 64 Cisco Wireless Solutions Software Compatibility Matrix Cisco Mobility Services Engine Compatibility Matrix Table 7 Cisco MSE Compatibility Matrix for Software Versions 7.5.x through 8.x MSE 3355 MSE 3365 MSE Virtual Appliance Prime Infrastructure WLC Converged Access Remarks 8.0.150.x1,2 8.0.140.x1,2 8.0.150.x1,2 8.0.140.x1,2 8.0.150.x1,2 8.0.140.x1,2 3.1.7 3.1.6 3.1.5 3.1.3 3.1 3.0.3 2.2.3 8.3.13x.0 8.3.12x.0 8.3.112.0 8.3.111.0 8.3.102.0 8.2.16x.0 8.2.160.0 8.2.151.0 8.2.141.0 8.2.130.0 8.2.121.0 8.2.111.0 8.2.110.0 8.1.131.0 8.1.122.0 8.1.111.0 8.1.102.0 8.0.15x.0 8.0.140.0 8.0.13x.0 8.0.121.0 8.0.120.0 8.0.110.0 8.0.100.0 7.6.130.0* 7.6.120.0* 7.6.110.0* 7.6.100.0* 7.5.102.0** 7.4.121.0** 7.4.110.0** 7.4.100.60** 7.4.100.0** 7.3.112.0** 7.3.101.0** 7.2.111.3** 7.2.110.0** 7.2.103.0** 7.0.240.0** 7.0.235.3** 7.0.235.0** 7.0.230.0** 7.1.91.0** 7.0.220.0** 7.0.116.0** 7.0.98.218** 7.0.98.0** 3.7.x 3.6.x 3.3.5 3.3.4 3.3.3 3.3.2 3.2.3 3.2.2 * For FIPS compliance, Cisco MSE 8.0 works with Cisco Prime Infrastructure 2.2, Cisco WLC 8.0.100.0, and Converged Access 3.6.0. ** The MSE 8.0 wIPS profile cannot be applied to Cisco WLC release 7.5 or prior using Cisco Prime Infrastructure 2.2 *** If you are you are running Analytics and Context Aware Service (Location Service) on different machines and using Cisco Prime Infrastructure 1.4, then additional setup is required. You can download the Setup script from this location. 65 Cisco Wireless Solutions Software Compatibility Matrix Cisco Mobility Services Engine Compatibility Matrix 8.0.130.0 8.0.130.0 8.0.130.0 3.1 3.0.1 3.0 2.2 and later 1.4*** 8.3.13x.0 8.3.111.0 8.3.102.0 8.2.16x.0 8.2.151.0 8.2.141.0 8.2.130.0 8.2.121.0 8.2.111.0 8.2.110.0 8.1.131.0 8.1.122.0 8.1.111.0 8.1.102.0 8.0.15x.0 8.0.140.0 8.0.13x.0 8.0.121.0 8.0.120.0 8.0.110.0 8.0.100.0 7.6.130.0* 7.6.120.0* 7.6.110.0* 7.6.100.0* 7.5.102.0** 7.4.121.0** 7.4.110.0** 7.4.100.60** 7.4.100.0** 7.3.112.0** 7.3.101.0** 7.2.111.3** 7.2.110.0** 7.2.103.0** 7.0.240.0** 7.0.235.3** 7.0.235.0** 7.0.230.0** 7.1.91.0** 7.0.220.0** 7.0.116.0** 7.0.98.218** 7.0.98.0** 3.7.x 3.6.x 3.3.5 3.3.4 3.3.3 3.3.2 3.2.3 3.2.2 * For FIPS compliance, Cisco MSE 8.0 works with Cisco Prime Infrastructure 2.2, Cisco WLC 8.0.100.0, and Converged Access 3.6.0. ** The MSE 8.0 wIPS44 profile cannot be applied to Cisco WLC release 7.5 or prior using Cisco Prime Infrastructure 2.2 *** If you are you are running Analytics and Context Aware Service (Location Service) on different machines and using Cisco Prime Infrastructure 1.4, then additional setup is required. You can download the Setup script from this location. Table 7 Cisco MSE Compatibility Matrix for Software Versions 7.5.x through 8.x (continued) MSE 3355 MSE 3365 MSE Virtual Appliance Prime Infrastructure WLC Converged Access Remarks 66 Cisco Wireless Solutions Software Compatibility Matrix Cisco Mobility Services Engine Compatibility Matrix 8.0.120.7 8.0.120.7 8.0.120.7 3.0.1 3.0 2.2.2*** 2.2.1 2.2 2.1.2*** 2.1.1*** 1.4***** 8.1.131.0 8.1.122.0 8.1.111.0 8.1.102.0 8.0.15x.0 8.0.140.0 8.0.13x.0 8.0.121.0 8.0.120.0 8.0.110.0 8.0.100.0 7.6.130.0 7.6.120.0 7.6.110.0* 7.6.100.0* 7.5.102.0**** 7.4.150.0**** 7.4.140.0**** 7.4.130.0**** 7.4.121.0**** 7.4.110.0**** 7.4.100.60**** 7.4.100.0**** 7.3.112.0**** 7.3.101.0**** 7.2.111.3**** 7.2.110.0**** 7.2.103.0**** 7.0.240.0**** 7.0.235.3**** 7.0.235.0**** 7.0.230.0**** 7.1.91.0**** 7.0.220.0**** 7.0.116.0**** 7.0.98.218**** 7.0.98.0**** 3.7.x 3.6.x 3.3.5 3.3.4 3.3.3 3.3.2 3.2.3 3.2.2 * For FIPS compliance, Cisco MSE 8.0 works with Cisco PI 2.2, Cisco WLC 8.0.100.0, and Converged Access 3.6.0. ****With MSE 8.0 wIPS feature: If you are using Cisco Prime Infrastructure 2.2 or later releases with Cisco WLC 7.5 or earlier releases, use Cisco MSE 8.0.120 or later. ***** If you are you are running Analytics and Context Aware Service (Location Service) on different machines and using Cisco PI 1.4 release, then additional setup is required. You can download the Setup script from this location. Table 7 Cisco MSE Compatibility Matrix for Software Versions 7.5.x through 8.x (continued) MSE 3355 MSE 3365 MSE Virtual Appliance Prime Infrastructure WLC Converged Access Remarks 67 Cisco Wireless Solutions Software Compatibility Matrix Cisco Mobility Services Engine Compatibility Matrix 8.0.120.0 8.0.120.0 8.0.120.0 3.0.1 3.0 2.2.2*** 2.2.1 2.2 2.1.2*** 2.1.1*** 1.4***** 8.1.131.0 8.1.122.0 8.1.111.0 8.1.102.0 8.0.15x.0 8.0.140.0 8.0.13x.0 8.0.121.0 8.0.120.0 8.0.110.0 8.0.100.0 7.6.130.0 7.6.120.0 7.6.110.0* 7.6.100.0* 7.5.102.0**** 7.4.150.0**** 7.4.140.0**** 7.4.130.0**** 7.4.121.0**** 7.4.110.0**** 7.4.100.60**** 7.4.100.0**** 7.3.112.0**** 7.3.101.0**** 7.2.111.3**** 7.2.110.0**** 7.2.103.0**** 7.0.240.0**** 7.0.235.3**** 7.0.235.0**** 7.0.230.0**** 7.1.91.0**** 7.0.220.0**** 7.0.116.0**** 7.0.98.218**** 7.0.98.0**** 3.7.x 3.6.x 3.3.5 3.3.4 3.3.3 3.3.2 3.2.3 3.2.2 * For FIPS compliance, Cisco MSE 8.0 works with Cisco PI 2.2, Cisco WLC 8.0.100.0, and Converged Access 3.6.0. ****With MSE 8.0 wIPS feature: If you are using Cisco Prime Infrastructure 2.2 or later releases with Cisco WLC 7.5 or earlier releases, use Cisco MSE 8.0.120 or later. ***** If you are you are running Analytics and Context Aware Service (Location Service) on different machines and using Cisco PI 1.4 release, then additional setup is required. You can download the Setup script from this location. Table 7 Cisco MSE Compatibility Matrix for Software Versions 7.5.x through 8.x (continued) MSE 3355 MSE 3365 MSE Virtual Appliance Prime Infrastructure WLC Converged Access Remarks 68 Cisco Wireless Solutions Software Compatibility Matrix Cisco Mobility Services Engine Compatibility Matrix 8.0.110.0 — 8.0.110.0 2.2.1 2.2 2.1.2*** 2.1.1*** 2.1*** 2.0*** 1.4***** 8.1.131.0 8.1.122.0 8.1.111.0 8.1.102.0 8.0.15x.0 8.0.140.0 8.0.13x.0 8.0.121.0 8.0.120.0 8.0.115.0 8.0.110.0 8.0.100.0 7.6.130.0 7.6.120.0 7.6.110.0* 7.6.100.0* 7.5.102.0**** 7.4.150.0**** 7.4.140.0**** 7.4.130.0**** 7.4.121.0**** 7.4.110.0**** 7.4.100.60**** 7.4.100.0**** 7.3.112.0**** 7.3.101.0**** 7.2.111.3**** 7.2.110.0**** 7.2.103.0**** 7.0.240.0**** 7.0.235.3**** 7.0.235.0**** 7.0.230.0**** 7.1.91.0**** 7.0.220.0**** 7.0.116.0**** 7.0.98.218**** 7.0.98.0**** 7.0.250.0 7.0.251.0 7.0.252.0 3.7.x 3.6.x 3.3.x 3.2.x * For FIPS compliance, MSE 8.0 works with PI 2.2, Wireless LAN Controller (WLC) 8.0.100.0, and Converged access 3.6.0. ***While using PI 2.1.1 and 2.1.2, the MSE 8.0 wIPS will have MSE 7.4 feature parity. ****With MSE 8.0 wIPS feature: If you are using Cisco Prime Infrastructure 2.2 or later releases with Cisco WLC 7.5 or earlier releases, use Cisco MSE 8.0.120 or later. ***** If you are you are running Analytics and Location services on different machines and using Cisco Prime Infrastructure 1.4 Version, then additional setup is required. You can download the Setup script from this location. Table 7 Cisco MSE Compatibility Matrix for Software Versions 7.5.x through 8.x (continued) MSE 3355 MSE 3365 MSE Virtual Appliance Prime Infrastructure WLC Converged Access Remarks 69 Cisco Wireless Solutions Software Compatibility Matrix Cisco Mobility Services Engine Compatibility Matrix 8.0.100.0* — 8.0.100.0 2.2.1 2.2 2.1.2 2.1.1*** 2.1 2.0 1.4***** 8.1.131.0 8.1.122.0 8.1.111.0 8.1.102.0 8.0.100.0 7.6.130.0 7.6.120.0 7.6.110.0* 7.6.100.0* 7.5.102.0**** 7.4.150.0**** 7.4.140.0**** 7.4.130.0**** 7.4.121.0**** 7.4.110.0**** 7.4.100.60**** 7.4.100.0**** 7.3.112.0**** 7.3.101.0**** 7.2.111.3**** 7.2.110.0**** 7.2.103.0**** 7.0.240.0**** 7.0.235.3**** 7.0.235.0**** 7.0.230.0**** 7.1.91.0**** 7.0.220.0**** 7.0.116.0**** 7.0.98.218**** 7.0.98.0**** 3.7.x 3.6.x 3.3.5 3.3.4 3.3.3 3.3.2 3.2.3 3.2.2 * For FIPS compliance, MSE 8.0 works with PI 2.2, Wireless LAN Controller (WLC) 8.0.100.0, and Converged access 3.6.0. *** While using PI 2.1.1, the MSE 8.0 wIPS will have MSE 7.4 feature parity. ****With MSE 8.0 wIPS feature: If you are using Cisco Prime Infrastructure 2.2 or later releases with Cisco WLC 7.5 or earlier releases, use Cisco MSE 8.0.120 or later. ***** If you are you are running Analytics and Location services on different machines and using Cisco Prime Infrastructure 1.4 Version, then additional setup is required. You can download the Setup script from this location. Table 7 Cisco MSE Compatibility Matrix for Software Versions 7.5.x through 8.x (continued) MSE 3355 MSE 3365 MSE Virtual Appliance Prime Infrastructure WLC Converged Access Remarks 70 Cisco Wireless Solutions Software Compatibility Matrix Cisco Mobility Services Engine Compatibility Matrix 7.6.120.0 — 7.6.120.0 2.2.1 2.2 2.1.2 2.1.1** 2.1 2.0 1.4.2 7.6.120.0 7.6.110.0* 7.6.100.0* 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.111.3 7.2.110.0 7.2.103.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 — **Prime Infrastructure 2.1.1 allows you to manage Cisco MSE Releases 7.5.102.101 and 7.6.120.0 with feature compatibility of Cisco MSE Release 7.4.121.0. Prime Infrastructure 2.1.1 does not support any new features introduced in Cisco MSE Releases 7.5.102.101 and 7.6.120.0. Note For PI 2.1.1 to work with MSE 7.6, you need to install a patch for Cisco bug Id CSCup93101. Contact Cisco TAC for a patch. Table 7 Cisco MSE Compatibility Matrix for Software Versions 7.5.x through 8.x (continued) MSE 3355 MSE 3365 MSE Virtual Appliance Prime Infrastructure WLC Converged Access Remarks 71 Cisco Wireless Solutions Software Compatibility Matrix Cisco Mobility Services Engine Compatibility Matrix 7.6.132.0 — 7.6.132.0 2.2.1 2.2 2.1.2 2.1.1** 2.1 2.0 1.4.2 7.6.130.0 7.6.120.0 7.6.110.0* 7.6.100.0* 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.111.3 7.2.110.0 7.2.103.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 — **Prime Infrastructure 2.1.1 allows you to manage Cisco MSE Releases 7.5.102.101 and 7.6.120.0 with feature compatibility of Cisco MSE Release 7.4.121.0. Prime Infrastructure 2.1.1 does not support any new features introduced in Cisco MSE Releases 7.5.102.101 and 7.6.120.0. Note For PI 2.1.1 to work with MSE 7.6, you need to install a patch for Cisco bug Id CSCup93101. Contact Cisco TAC for a patch. Table 7 Cisco MSE Compatibility Matrix for Software Versions 7.5.x through 8.x (continued) MSE 3355 MSE 3365 MSE Virtual Appliance Prime Infrastructure WLC Converged Access Remarks 72 Cisco Wireless Solutions Software Compatibility Matrix Cisco Mobility Services Engine Compatibility Matrix 7.6.100.0 — 7.6.100.0 2.2.1 2.2 2.1.2 2.1.1 2.1 2.0 Update 1 for 1.4.0.45* Update 2 for 1.4.0.45** 7.6.110.0* 7.6.100.0* 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.111.3 7.2.110.0 7.2.103.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 — *The Update 1 for Cisco Prime Infrastructure 1.4.0.45 enables you to manage Cisco WLC 7.6.x with the features of Cisco WLC 7.5.102.0 and earlier releases. This release does not support any new features of Cisco WLC 7.6.x including the new access point platforms. **The Update 2 for Cisco Prime Infrastructure 1.4.0.45 enables you to manage Cisco WLC 7.6.x with the features of Cisco WLC 7.5.102.0 and earlier releases. This release does not support any new features of Cisco WLC 7.6.x. However, this release supports two new AP platforms—Cisco 702w and Cisco 2700. Table 7 Cisco MSE Compatibility Matrix for Software Versions 7.5.x through 8.x (continued) MSE 3355 MSE 3365 MSE Virtual Appliance Prime Infrastructure WLC Converged Access Remarks 73 Cisco Wireless Solutions Software Compatibility Matrix Cisco Mobility Services Engine Compatibility Matrix 7.6.100.0 — 7.6.100.0 2.2.1 2.2 2.1.2 2.1.1 2.1 2.0* 7.6.110.0** 7.6.100.0** 7.5.102.0** 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.111.3 7.2.110.0 7.2.103.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 3.2.2** 3.3.2** *Cisco Prime Infrastructure 2.0 enables you to manage Cisco WLC 7.5.102.0 with the features of Cisco WLC 7.4.110.0 and earlier releases. Prime Infrastructure 2.0 does not support any features that are introduced in Cisco WLC 7.5.102.0 or later releases including the new access point platforms. **Supports 7.4 MSE feature parity—CAS, MSE 8.0 wIPS, and CMX Analytics service. Note MSE 8.0 wIPS profile cannot be pushed to Cisco Wireless LAN Controller (WLC) Version 7.5 or prior using the Prime Infrastructure 1.4.x or 2.x with MSE 7.6 Release. 7.5.102.101 — 7.5.102.101 2.2.1 2.2 2.1.2 2.1.1 2.1 2.0 Update 1 for 1.4.0.45 1.4.0.45 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.111.3 7.2.110.0 7.2.103.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 — — Table 7 Cisco MSE Compatibility Matrix for Software Versions 7.5.x through 8.x (continued) MSE 3355 MSE 3365 MSE Virtual Appliance Prime Infrastructure WLC Converged Access Remarks 74 Cisco Wireless Solutions Software Compatibility Matrix Cisco Mobility Services Engine Compatibility Matrix 7.5.102.101 — 7.5.102.101 2.2.1 2.2 2.1.2 2.1.1 2.1 2.0* 7.5.102.0 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.111.3 7.2.110.0 7.2.103.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 3.2.2** 3.3.2** *Cisco Prime Infrastructure 2.0 enables you to manage Cisco WLC 7.5.102.0 with the features of Cisco WLC 7.4.110.0 and earlier releases. Prime Infrastructure 2.0 does not support any features that are introduced in Cisco WLC 7.5.102.0 or later releases including the new access point platforms. **Supports 7.4 MSE feature parity—CAS, MSE 8.0 wIPS, and CMX Analytics service. 1. Cisco MSE Release 8.0.140.x and later includes wIPS support for the Cisco Aironet 1800, 2800, and 3800 series. However, CAS is not supported for these APs. 2. Cisco MSE Release 8.0.140.x and later is compatible with Cisco Prime Infrastructure Releases 3.3, 3.2.x, 3.1.7, 3.1.6, 3.1.5, 3.1.3, 3.1.1, 3.0.3.1, and 2.2.3.5. If you encounter reachability issues with the Cisco MSE, upgrade to Prime Infrastructure Release 3.1.3. (CSCuz19013) Table 7 Cisco MSE Compatibility Matrix for Software Versions 7.5.x through 8.x (continued) MSE 3355 MSE 3365 MSE Virtual Appliance Prime Infrastructure WLC Converged Access Remarks 75 Cisco Wireless Solutions Software Compatibility Matrix Cisco Mobility Services Engine Compatibility Matrix Cisco MSE Compatibility Matrix for Legacy Software Versions Table 8 Cisco MSE Compatibility Matrix—Legacy Software Versions MSE 3355 MSE 3350 MSE Virtual Appliance AeroScout CLE WCS WLC Prime Infrastructure / NCS 7.4.121.0 — 7.4.121.0 4.5.2.16 4.4.2.11 — 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.111.3 7.2.110.0 7.2.103.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 2.0 Update 1 for 1.4.0.45 1.4.0.45 Update 4 for 1.3.0.20 Update 1 for 1.3.0.20 1.3.0.20 7.4.110.0 — 7.4.110.0 4.4.2.11 — 7.4.110.0 7.4.100.60 7.4.100.0 7.3.112.0 7.3.101.0 7.2.111.3 7.2.110.0 7.2.103.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 2.0 Update 1 for 1.4.0.45 1.4.0.45 Update 4 for 1.3.0.20 Update 1 for 1.3.0.20 1.3.0.20 76 Cisco Wireless Solutions Software Compatibility Matrix Cisco Mobility Services Engine Compatibility Matrix 7.4.100.0 — 7.4.100.0 4.4.2.11 4.4.2.7 — 7.4.100.0 7.3.112.0 7.3.101.0 7.2.111.3 7.2.110.0 7.2.103.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 Update 1 for 1.4.0.45 1.4.0.45 Update 4 for 1.3.0.20 Update 1 for 1.3.0.20 1.3.0.20 7.3.101.0 7.3.101.0 7.3.101.0 4.4.2.4 — 7.4.150.0 7.4.140.0 7.4.130.0 7.4.121.0 7.4.110.0 7.4.100.60 7.4.100.0 7.2.111.3 7.2.110.0 7.2.103.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 Update 4 for 1.3.0.20 Update 1 for 1.3.0.20 1.3.0.20 1.2.1.12 Table 8 Cisco MSE Compatibility Matrix—Legacy Software Versions (continued) MSE 3355 MSE 3350 MSE Virtual Appliance AeroScout CLE WCS WLC Prime Infrastructure / NCS 77 Cisco Wireless Solutions Software Compatibility Matrix Cisco Mobility Services Engine Compatibility Matrix 7.2.110.0 7.2.110.0 7.2.110.0 4.4.2.4 — 7.2.111.3 7.2.110.0 7.2.103.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 Update 4 for 1.3.0.20 Update 1 for 1.3.0.20 1.3.0.20 1.2.1.12 1.1.1.24 1.1.0.58 7.2.103.0 7.2.103.0 7.2.103.0 4.4.1.4 — 7.2.103.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 Update 4 for 1.3.0.20 Update 1 for 1.3.0.20 1.3.0.20 1.2.1.12 1.1.124 1.1.0.58 7.0.240.0 7.0.240.0 — 4.3.1.10 7.0.240.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 Update 4 for 1.3.0.20 Update 1 for 1.3.0.20 1.3.0.20 1.2.1.12 1.1.1.24 1.1.0.58 1.0.2.29 7.0.230.0 7.0.230.0 — 4.3.1.19 7.0.230.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 Update 4 for 1.3.0.20 Update 1 for 1.3.0.20 1.3.0.20 1.2.1.12 1.1.1.24 1.1.0.58 1.0.2.29 Table 8 Cisco MSE Compatibility Matrix—Legacy Software Versions (continued) MSE 3355 MSE 3350 MSE Virtual Appliance AeroScout CLE WCS WLC Prime Infrastructure / NCS 78 Cisco Wireless Solutions Software Compatibility Matrix Cisco Mobility Services Engine Compatibility Matrix Note AeroScout CLE is no longer bundled with MSE starting from Release 7.5 Release. However, AeroScout CLE is compatible with MSE Release 7.5 and later using the API interface. Note Cisco MSE 3310 and 3350 are not supported beyond Release 7.3. 7.0.220.0 7.0.220.0 — 4.3.1.19 7.0.220.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 Update 4 for 1.3.0.20 Update 1 for 1.3.0.20 1.3.0.20 1.2.1.12 1.1.1.24 1.1.0.58 1.0.2.29 1.0.1.4 7.0.201.204 7.0.201.204 — 4.2.4.4 7.0.172.0 7.0.116.0 7.0.98.218 7.0.98.0 Update 4 for 1.3.0.20 Update 1 for 1.3.0.20 1.3.0.20 1.2.1.12 1.1.1.24 1.1.0.58 1.0.2.29 1.0.1.4 1.0.0.96 7.0.112.0 7.0.112.0 — 4.2.4.4 7.0.164.3 7.0.164.0 7.0.98.218 7.0.98.0 Update 4 for 1.3.0.20 Update 1 for 1.3.0.20 1.3.0.20 1.2.1.12 1.1.1.24 1.1.0.58 1.0.2.29 1.0.1.4 1.0.0.96 7.0.105.0 7.0.105.0 — 4.2.4.4 7.0.164.3 7.0.98.218 Update 4 for 1.3.0.20 Update 1 for 1.3.0.20 1.3.0.20 1.2.1.12 1.1.1.24 1.1.0.58 1.0.2.29 1.0.1.4 1.0.0.96 Table 8 Cisco MSE Compatibility Matrix—Legacy Software Versions (continued) MSE 3355 MSE 3350 MSE Virtual Appliance AeroScout CLE WCS WLC Prime Infrastructure / NCS 79 Cisco Wireless Solutions Software Compatibility Matrix Cisco Mobility Services Engine Compatibility Matrix Note This compatibility matrix lists only the compatibility information of Cisco MSE with other Cisco wireless products. This matrix does not reflect compatibility information between Cisco WLC and Cisco Prime Infrastructure or Cisco NCS. For compatibility information about Cisco Prime Infrastructure with Cisco WLC and other wireless products, see the Cisco Prime Infrastructure Release Notes. 80 Cisco Wireless Solutions Software Compatibility Matrix Cisco Mobility Express Solution Compatibility Matrix Cisco Mobility Express Solution Compatibility Matrix This section contains compatibility information about the Cisco Mobility Express Solution. Note The Cisco Mobility Express solution is not compatible with other Cisco Wireless LAN Controller deployments and Cisco Network Assistant. Table 9 Mobility Express Software Compatibility Matrix Cisco Mobility Express Solution Access Point Software Access Point Platforms Cisco CMX Cisco ISE Cisco Prime Infrastructure Remarks 8.5.103.0 15.3(3)JF APs with integrated controller functionality: Cisco Aironet 1540 series, 1560 series, 1815i, 1815m, 1815w,1830 series, 1850 series, 2800 series, and 3800 series.* APs without integrated controller functionality: Cisco Aironet 700i, 700w, 1600 series, 1700 series, 1810w series, 2600 series, 2700 series, 3500 series, 3600 series, 3700 series 10.2.2 and later 2.2 2.1 3.2 3.1.6 3.1.5 *Cisco Aironet 1560 series, 1815i, and 1815w AP platforms are not supported on Cisco Prime Infrastructure. 8.4.100.0 15.3(3)JE APs with integrated controller functionality: Cisco Aironet 1560 series, 1815i, 1815w,1830 series, 1850 series, 2800 series, and 3800 series.* APs without integrated controller functionality: Cisco Aironet 700i, 700w, 1600 series, 1700 series, 1810w series, 2600 series, 2700 series, 3500 series, 3600 series, 3700 series 10.2.2 and later 2.2 2.1 3.2 3.1.6 3.1.5 *Cisco Aironet 1560 series, 1815i, and 1815w AP platforms are not supported on Cisco Prime Infrastructure. 81 Cisco Wireless Solutions Software Compatibility Matrix Cisco Mobility Express Solution Compatibility Matrix 8.3.130.0 15.3(3)JD7, 15.3(3)JDA7 APs with integrated controller functionality: • Cisco Aironet 1560, 1830, 1850, 2800, and 3800 series APs without integrated controller functionality: • Cisco Aironet 700i, 700w, 1600 series, 1700 series, 1810w series, 2600 series, 2700 series, 3500 series, 3600 series, 3700 series 3.2 3.1.6 3.1.5 8.3.122.0 8.3.121.0 15.3(3)JD6 15.3(3)JD5 – – 8.3.112.0 15.3(3)JD4 8.3.102.0 15.3(3)JD APs with integrated controller functionality: • Cisco Aironet 1830, 1850, 2800, and 3800 series APs without integrated controller functionality: • Cisco Aironet 700i, 700w, 1600 series, 1700 series, 1810w series, 2600 series, 2700 series, 3500 series, 3600 series, 3700 series – – 3.2 3.1.6 3.1.5 3.1.4 8.2.100.0 15.3(3)JC APs with integrated controller functionality: • Cisco Aironet 1850 series, 1830 series APs without integrated controller functionality: • Cisco Aironet 700i, 700w, 1600 series, 1700 series, 2600 series, 2700 series, 3500 series, 3600 series, 3700 series – 1.4 1.4 1.3 8.1.122.0 15.3(3)JBB5 1.3 Table 9 Mobility Express Software Compatibility Matrix (continued) Cisco Mobility Express Solution Access Point Software Access Point Platforms Cisco CMX Cisco ISE Cisco Prime Infrastructure Remarks 82 Cisco Wireless Solutions Software Compatibility Matrix Converged Access Solution Compatibility Matrix Converged Access Solution Compatibility Matrix Note Because of SHA-2 certificate implementation, MSE 7.6 is not compatible with Cisco IOS XE Release 3.6E. Therefore, we recommend that you upgrade to MSE 8.0. Note IRCM Feature: Seamless roam between Cisco 5700 WLC/Catalyst 3850 and Cisco 5500 WLC / Cisco WiSM2 with Release 7.3.112.0 using New Mobility. Note To see the list of supported Cisco AP models on the Cisco Catalyst 3650 and 3850 Series Switches, see the respective release notes. Table 10 Converged Access Solution Compatibility Matrix Catalyst 3850/3650 Cisco 5700 WLC Cisco 5508 WLC or WiSM2 MSE ISE ACS Cisco Prime Infrastructure Cisco IOX XE Denali 16.3.3 Cisco IOS XE Denali 16.3.2 Cisco IOS XE Denali 16.3.1 Cisco IOS XE Denali 16.2.2 Cisco IOS XE Denali 16.2.1 Cisco IOS XE Denali 16.1.1 03.07.05E 03.07.04E 03.07.03E 03.07.02E 03.06.07E 03.06.06E 03.06.05aE 03.06.05E 03.06.04E 03.06.03E1 8.5 8.4 8.3 8.2 8.1 — 2.0 Patch 3 1.4 Patch 7 1.4 (Wireless) 1.3 Patch 6 (Wired and Wireless) 1.3 Patch 5 (Wired and Wireless) 1.3 Patch 3 (Wired) 5.3 5.4 5.5 3.1.6 3.1.5 3.1.4 3.1.3 3.1.1 3.1 3.0 Technology Pack 03.07.05E 03.07.04E 03.07.03E 03.07.02E 03.07.01E 03.07.00E 03.07.05E 03.07.04E 03.07.03E 03.07.02E 03.07.01E 03.07.00E 8.1 8.0 7.6 8.02 1.3 5.2 5.3 2.2 83 Cisco Wireless Solutions Software Compatibility Matrix Converged Access Solution Compatibility Matrix 03.06.07E 03.06.06E 03.06.05bE 03.06.05E 03.06.04E 03.06.03E 03.06.02aE 03.06.01E 03.06.00E 03.06.07E 03.06.06E 03.06.05aE 03.06.05E 03.06.04E 03.06.03E 03.06.02aE 03.06.01E 03.06.00E 8.0 7.6 8.0 1.2 5.2 5.3 2.1.2 or 2.1.1 if MSE is also deployed3 2.1.0 if MSE is not deployed 03.03.05SE 03.03.04SE 03.03.03SE 03.03.02SE 03.03.01SE 03.03.00SE 03.03.05SE 03.03.04SE 03.03.03SE 03.03.02SE 03.03.01SE 03.03.00SE 7.64 7.55 7.6 7.5 1.2 5.2 5.3 2.0 1. Cisco 5700 (Cisco IOS XE Release 03.06.03E/ 03.07.02E) inter-operates as a Peer MC with Catalyst 3850 running on Cisco IOS XE 03.06.03E/ 03.07.02E releases. 2. Because of SHA-2 certificate implementation, MSE 7.6 is not compatible with Cisco IOS XE Release 3.6E and later. Therefore, we recommend that you upgrade to MSE 8.0. 3. If MSE is deployed on your network, we recommend that you upgrade to Cisco Prime Infrastructure 2.1.2. 4. Cisco WLC Release 7.6 is not compatible with Cisco Prime Infrastructure 2.0. 5. Prime Infrastructure 2.0 enables you to manage Cisco WLC 7.5.102.0 with the features of Cisco WLC 7.4.110.0 and earlier releases. Prime Infrastructure 2.0 does not support any features of Cisco WLC 7.5.102.0 including the new AP platforms. Table 10 Converged Access Solution Compatibility Matrix Catalyst 3850/3650 Cisco 5700 WLC Cisco 5508 WLC or WiSM2 MSE ISE ACS Cisco Prime Infrastructure 84 Cisco Wireless Solutions Software Compatibility Matrix Converged Access Solution Compatibility Matrix Table 11 Converged Access Software Compatibility Matrix Cisco 5700 WLC Catalyst 3850 Catalyst 3650 Catalyst 4500E with Sup 8-E Cisco WLC Release for Cisco 5508 WLC, WiSM2, or 25041 WLC Platforms Cisco MSE ISE ACS Cisco Prime Infrastructure 03.07.05E 03.07.04E 03.07.03E 03.07.02E 03.07.01E 03.07.00E 03.06.07E 03.06.06E 03.06.05aE 03.06.04E 03.06.02aE 03.06.01E 03.06.00E 03.07.05E 03.07.04E 03.07.03E 03.07.02E 03.07.01E 03.07.00E 03.06.07E 03.06.06E 03.06.05b E 03.06.04E 03.06.03E 03.06.02a E 03.06.01E 03.06.00E 03.07.05E 03.07.04E 03.07.03E 03.07.02E 03.07.01E 03.07.00E 03.06.07E 03.06.06E 03.06.05b E 03.06.04E 03.06.03E 03.06.02a E 03.06.01E 03.06.00E 03.09.01E 03.09.00E 03.08.03E 03.08.02E 03.08.01E 03.08.00E 03.07.03E 03.07.02E 03.07.01E 03.07.00E 8.3.x 8.2.x 8.1.x 8.0 7.6 8.0 1.3 5.2 5.3 3.0 03.07.05E 03.07.04E 03.07.03E 03.07.02E 03.07.01E 03.07.00E 03.06.06E 03.06.05aE 03.06.05E 03.06.04E 03.06.02aE 03.06.01E 03.06.00E 03.07.05E 03.07.04E 03.07.02E 03.07.01E 03.07.00E 03.06.06E 03.06.05a E 03.06.05E 03.06.04E 03.06.02a E 03.06.01E 03.06.00E 03.07.05E 03.07.04E 03.07.03E 03.07.02E 03.07.01E 03.07.00E 03.06.06E 03.06.05a E 03.06.05E 03.06.04E 03.06.02a E 03.06.01E 03.06.00E 03.07.03E 03.07.02E 03.07.01E 03.07.00E 8.1.x 8.0 7.6 8.0 1.3 5.2 5.3 2.2 85 Cisco Wireless Solutions Software Compatibility Matrix Converged Access Solution Compatibility Matrix 03.06.05aE 03.06.05E 03.06.04E 03.06.02aE 03.06.01E 03.06.00E 03.06.05b E 03.06.05E 03.06.04E 03.06.03E 03.06.02a E 03.06.01E 03.06.00E 03.06.05b E 03.06.05E 03.06.04E 03.06.03E 03.06.02a E 03.06.01E 03.06.00E — 8.0 8.0.x 7.6.x 8.02 1.2 5.2 5.3 2.2 2.1.2 or 2.1.1 if MSE is also deployed 2.1.0 if MSE is not deployed3 03.03.03SE 03.03.02SE 03.03.01SE 03.03.00SE 03.03.03S E 03.03.02S E 03.03.01S E 03.03.00S E 03.03.03S E 03.03.02S E 03.03.01S E 03.03.00S E — 7.64 7.55 7.6 7.5 1.2 5.2 5.3 2.0 03.02.03SE 03.02.03S E — — 7.6.x 7.5 7.3.112.0 7.6 7.5 1.1.3 1.1.2 5.2 5.3 2.0 03.02.02SE 03.02.02S E — — 7.6.x 7.5 7.3.112.0 7.6 7.5 1.1.3 1.1.2 5.2 5.3 — 03.02.01SE 03.02.01S E — — 7.3.112.0 — 1.1.3 1.1.2 5.2 5.3 — 03.02.00SE 03.02.00S E — — 7.3.112.0 — 1.1.1 MR 5.2 — 1. New Mobility is supported on Cisco 2504 WLC in 8.0.x and later releases. 2. Because of SHA-2 certificate implementation, MSE 7.6 is not compatible with Cisco IOS XE Release 3.6E and later. Therefore, we recommend that you upgrade to MSE 8.0. 3. If MSE is deployed on your network, we recommend that you upgrade to Cisco Prime Infrastructure 2.1.2. 4. Cisco WLC Release 7.6 is not compatible with Cisco Prime Infrastructure 2.0. 5. Prime Infrastructure 2.0 enables you to manage Cisco WLC 7.5.102.0 with the features of Cisco WLC 7.4.110.0 and earlier releases. Prime Infrastructure 2.0 does not support any features of Cisco WLC 7.5.102.0 including the new AP platforms. Table 11 Converged Access Software Compatibility Matrix (continued) Cisco 5700 WLC Catalyst 3850 Catalyst 3650 Catalyst 4500E with Sup 8-E Cisco WLC Release for Cisco 5508 WLC, WiSM2, or 25041 WLC Platforms Cisco MSE ISE ACS Cisco Prime Infrastructure 86 Cisco Wireless Solutions Software Compatibility Matrix Converged Access Solution Compatibility Matrix Table 12 Cisco IOS XE to Cisco IOS Version Number Mapping Cisco IOS XE Version Cisco IOSd Version Cisco Wireless Control Module Version Access Point IOS Version 16.4.0 Not applicable 16.4.1.0 15.3(3)JPD 16.3.3 Not applicable 16.3.3.0 15.3(3)JPC3 16.3.2 Not applicable 16.3.2.0 15.3(3)JPC2 16.3.1 Not applicable 16.3.1.1 15.3(3)JPC1 16.3.0 Not applicable 16.3.1.0 15.3(3)JPC 16.2.1 Not applicable 16.2.2.0 15.3(3)JPB1 16.2.0 Not applicable 16.2.1.0 15.3(3)JPB 16.1.2 Not applicable 16.1.3.0 15.3(3)JNP2 16.1.1 Not applicable 16.1.2.0 15.3(3)JNP1 16.1.0 Not applicable 16.1.1.0 15.3(3)JNP 03.09.01E 15.2(5)E1 10.5.110.0 15.3(3)JND1 03.09.00E 15.2(5)E 10.5.100.0 15.3(3)JND 03.08.03E 15.2(4)E3 10.4.130.0 15.3(3)JNC3 03.08.02E 15.2(4)E2 10.4.120.0 15.3(3)JNC2 03.08.01E 15.2(4)E1 10.4.111.0 15.3(3)JNC1 03.08.00E 15.2(3)E 10.3.100.0 15.3(3)JNB 03.07.05E 15.2(3)E5 10.3.150.0 15.3(3)JNB6 03.07.04E 15.2(3)E4 10.3.141.0 15.3(3)JNB5 03.07.03E 15.2(3)E3 10.3.130.0 15.3(3)JNB3 03.07.02E 15.2(3)E2 10.3.120.0 15.3(3)JNB2 03.07.01E 15.2(3)E1 10.3.100.0 15.3(3)JNB1 03.06.07E 15.2(2)E7 10.2.170.0 15.3(3)JN12 03.06.06E 15.2(2)E6 10.2.160.0 15.3(3)JN11 03.06.05aE 15.2(2)E5 10.2.155.0 15.3(3)JN10 03.06.05E 15.2(2)E5 10.2.150.0 15.3(3)JN9 03.06.04E 15.2(2)E4 10.2.140.0 15.3(3)JN8 03.06.03E 15.2(2)E3 10.2.131.0 15.3(3)JN7 03.06.02E 15.2(2)E2 10.2.120.0 15.3(3)JN4 03.06.01E 15.2(2)E1 10.2.111.0 15.3(3)JN3 03.06.00E 15.2(2)E 10.2.102.0 15.3(3)JN 03.03.05SE 15.0(1)EZ5 10.1.150.0 15.2(4)JB7 03.03.04SE 15.0(1)EZ4 10.1.140.0 15.2(4)JB6 03.03.03SE 15.0(1)EZ3 10.1.130.0 15.2(4)JB5h 03.03.02SE 15.0(1)EZ2 10.1.121.0 15.2(4)JB3h 87 Cisco Wireless Solutions Software Compatibility Matrix Supported Converged Access Solution Hardware Supported Converged Access Solution Hardware Supported Cisco 5760 Wireless Controller Models 03.03.01SE 15.0(1)EZ1 10.1.110.0 15.2(4)JB2 03.03.00SE 15.0(1)EZ 10.1.100.0 15.2(4)JN 03.02.03SE 15.0(1)EX3 10.0.120.0 15.2(2)JN 03.02.02SE 15.0(1)EX2 10.0.111.0 15.2(2)JN 03.02.01SE 15.0(1)EX1 10.0.101.0 15.2(2)JN 03.02.00SE 15.0(1)EX 10.0.100.0 15.2(2)JN Table 13 Cisco WLC 5700 Models Part Number Description AIR-CT5760-25-K9 Cisco 5760 Wireless Controller for up to 25 Cisco access points AIR-CT5760-50-K9 Cisco 5760 Wireless Controller for up to 50 Cisco access points AIR-CT5760-100-K9 Cisco 5760 Wireless Controller for up to 100 Cisco access points AIR-CT5760-250-K9 Cisco 5760 Wireless Controller for up to 250 Cisco access points AIR-CT5760-500-K9 Cisco 5760 Wireless Controller for up to 500 Cisco access points AIR-CT5760-1K-K9 Cisco 5760 Wireless Controller for up to 1000 Cisco access points AIR-CT5760-HA-K9 Cisco 5760 Series Wireless Controller for High Availability Table 12 Cisco IOS XE to Cisco IOS Version Number Mapping Cisco IOS XE Version Cisco IOSd Version Cisco Wireless Control Module Version Access Point IOS Version 88 Cisco Wireless Solutions Software Compatibility Matrix Supported Converged Access Solution Hardware Supported Catalyst 3850 Switch Models Table 14 Catalyst 3850 Switch Models Switch Model Cisco IOS Image Description WS-C3850-24T-L LAN Base Cisco Catalyst 3850 Stackable 24 10/100/1000 Ethernet ports, with 350-WAC power supply 1 RU, LAN Base feature set (StackPower cables must be purchased separately) WS-C3850-48T-L LAN Base Cisco Catalyst 3850 Stackable 48 10/100/1000 Ethernet ports, with 350-WAC power supply 1 RU, LAN Base feature set (StackPower cables must be purchased separately) WS-C3850-24P-L LAN Base Cisco Catalyst 3850 Stackable 24 10/100/1000 Ethernet PoE+ ports, with 715-WAC power supply 1 RU, LAN Base feature set (StackPower cables must be purchased separately) WS-C3850-48P-L LAN Base Cisco Catalyst 3850 Stackable 48 10/100/1000 Ethernet PoE+ ports, with 715-WAC power supply 1 RU, LAN Base feature set (StackPower cables must be purchased separately) WS-C3850-48F-L LAN Base Cisco Catalyst 3850 Stackable 48 10/100/1000 Ethernet PoE+ ports, with 1100-WAC power supply 1 RU, LAN Base feature set (StackPower cables must be purchased separately) WS-C3850-12X48U-L LAN Base Stackable 12 100M/1G/2.5G/5G/10G and 36 1G UPoE ports, 1 network module slot, 1100 W power supply WS-C3850-24T-S IP Base Cisco Catalyst 3850 Stackable 24 10/100/1000 Ethernet ports, with 350-WAC power supply 1 RU, IP Base feature set WS-C3850-48T-S IP Base Cisco Catalyst 3850 Stackable 48 10/100/1000 Ethernet ports, with 350-WAC power supply 1 RU, IP Base feature set WS-C3850-24P-S IP Base Cisco Catalyst 3850 Stackable 24 10/100/1000 Ethernet PoE+ ports, with 715-WAC power supply 1 RU, IP Base feature set WS-C3850-48P-S IP Base Cisco Catalyst 3850 Stackable 48 10/100/1000 Ethernet PoE+ ports, with 715-WAC power supply 1 RU, IP Base feature set WS-C3850-48F-S IP Base Cisco Catalyst 3850 Stackable 48 10/100/1000 Ethernet PoE+ ports, with 1100-WAC power supply 1 RU, IP Base feature set WS-C3850-24PW-S IP Base Cisco Catalyst 3850 24-port PoE IP Base with 5-access point license WS-C3850-48PW-S IP Base Cisco Catalyst 3850 48-port PoE IP Base with 5-access point license 89 Cisco Wireless Solutions Software Compatibility Matrix Supported Converged Access Solution Hardware Catalyst 3850-12S-S IP Base 12 SFP module slots, 1 network module slot, 350-W power supply Catalyst 3850-24S-S IP Base 24 SFP module slots, 1 network module slot, 350-W power supply WS-C3850-12XS-S IP Base Catalyst 3850 12-port SFP+ transceiver, 1 network module slot, support for up to 10 G SFP+, 350 W power supply WS-C3850-16XS-S IP Base Catalyst 3850 16-port SFP+ transceiver, 1 network module slot, support for up to 10 G SFP+, 350 W power supply. 16 ports are available when the C3850-NM-4-10G network module is plugged into the WS-C3850-12XS-S switch. WS-C3850-24XS-S IP Base Catalyst 3850 24-port SFP+ transceiver, 1 network module slot, support for up to 10 G SFP+, 715 W power supply. WS-C3850-32XS-S IP Base Catalyst 3850 32-port SFP+ transceiver, 1 network module slot, support for up to 10 G SFP+, 715 W power supply. 32 ports are available when the C3850-NM-8-10G network module is plugged into the WS-C3850-24XS-S switch. WS-C3850-12X48U-S IP Base Stackable 12 100M/1G/2.5G/5G/10G and 36 1 G UPoE ports, 1 network module slot, 1100 W power supply WS-C3850-24T-E IP Services Cisco Catalyst 3850 Stackable 24 10/100/1000 Ethernet ports, with 350-WAC power supply 1 RU, IP Services feature set WS-C3850-48T-E IP Services Cisco Catalyst 3850 Stackable 48 10/100/1000 Ethernet ports, with 350-WAC power supply 1 RU, IP Services feature set WS-C3850-24P-E IP Services Cisco Catalyst 3850 Stackable 24 10/100/1000 Ethernet PoE+ ports, with 715-WAC power supply 1 RU, IP Services feature set WS-C3850-48P-E IP Services Cisco Catalyst 3850 Stackable 48 10/100/1000 Ethernet PoE+ ports, with 715-WAC power supply 1 RU, IP Services feature set WS-C3850-48F-E IP Services Cisco Catalyst 3850 Stackable 48 10/100/1000 Ethernet PoE+ ports, with 1100-WAC power supply 1 RU, IP Services feature set WS-3850-24U-E IP Services Cisco Catalyst 3850 Stackable 24 10/100/1000 Cisco UPOE ports,1 network module slot, 1100-W power supply Table 14 Catalyst 3850 Switch Models (continued) Switch Model Cisco IOS Image Description 90 Cisco Wireless Solutions Software Compatibility Matrix Supported Converged Access Solution Hardware Supported Catalyst 3650 Switch Models WS-3850-48U-E IP Services Cisco Catalyst 3850 Stackable 48 10/100/1000 Cisco UPOE ports,1 network module slot, 1100-W power supply Catalyst 3850-12S-E IP Services 12 SFP module slots, 1 network module slot, 350-W power supply Catalyst 3850-24S-E IP Services 24 SFP module slots, 1 network module slot, 350-W power supply WS-C3850-12XS-E IP Services Catalyst 3850 12-port SFP+ transceiver, 1 network module slot, support for up to 10 G SFP+, 350 -W power supply. WS-C3850-16XS-E IP Services Catalyst 3850 16-port SFP+ transceiver, 1 network module slot, support for up to 10 G SFP+, 350 W power supply. 16 ports are available when the C3850-NM-4-10G network module is plugged into the WS-C3850-12XS-E switch. WS-C3850-24XS-E IP Services Catalyst 3850 24-port SFP+ transceiver, 1 network module slot, support for up to 10 G SFP+, 715 W power supply. WS-C3850-32XS-E IP Services Catalyst 3850 32-port SFP+ transceiver, 1 network module slot, support for up to 10 G SFP+, 715 W power supply. 32 ports are available when the C3850-NM-8-10G network module is plugged into the WS-C3850-24XS-E switch. WS-C3850-12X48U-E IP Services Stackable 12 100M/1G/2.5G/5G/10G and 36 1 G UPoE ports, 1 network module slot, 1100 W power supply Table 15 Catalyst 3650 Switch Models Switch Model Cisco IOS Image Description Catalyst 3650-24TS-L LAN Base Stackable 24 10/100/1000 Ethernet downlink ports, four 1-Gigabit SFP (small form-factor pluggable) uplink ports, 250-W power supply Catalyst 3650-48TS-L LAN Base Stackable 48 10/100/1000 Ethernet downlink ports, four 1-Gigabit SFP uplink ports, 250-W power supply Catalyst 3650-24PS-L LAN Base Stackable 24 10/100/1000 PoE+1 downlink ports, four 1-Gigabit SFP uplink ports, 640-W power supply Table 14 Catalyst 3850 Switch Models (continued) Switch Model Cisco IOS Image Description 91 Cisco Wireless Solutions Software Compatibility Matrix Supported Converged Access Solution Hardware Catalyst 3650-48PS-L LAN Base Stackable 48 10/100/1000 PoE+ downlink ports, four 1-Gigabit SFP uplink ports, 640-W power supply Catalyst 3650-48FS-L LAN Base Stackable 48 10/100/1000 Full PoE downlink ports, four 1-Gigabit SFP uplink ports, 1025-W power supply Catalyst 3650-24TD-L LAN Base Stackable 24 10/100/1000 Ethernet downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 250-W power supply Catalyst 3650-48TD-L LAN Base Stackable 48 10/100/1000 Ethernet downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 250-W power supply Catalyst 3650-24PD-L LAN Base Stackable 24 10/100/1000 PoE+ downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 640-W power supply Catalyst 3650-48PD-L LAN Base Stackable 48 10/100/1000 PoE+ downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 640-W power supply Catalyst 3650-48FD-L LAN Base Stackable 48 10/100/1000 Full PoE downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 1025-W power supply Catalyst 3650-48FQ-L LAN Base Stackable 48 10/100/1000 Full PoE downlink ports, four 10-Gigabit SFP+ uplink ports, 1025-W power supply Catalyst 3650-48PQ-L LAN Base Stackable 48 10/100/1000 PoE+ downlink ports, four 10-Gigabit SFP+ uplink ports, 640-W power supply Catalyst 3650-48TQ-L LAN Base Stackable 48 10/100/1000 Ethernet downlink ports, four 10-Gigabit SFP+ uplink ports, 250-W power supply Catalyst 3650-24TS-S IP Base Stackable 24 10/100/1000 Ethernet downlink ports, four 1-Gigabit SFP uplink ports, 250-W power supply Catalyst 3650-48TS-S IP Base Stackable 48 10/100/1000 Ethernet downlink ports, four 1-Gigabit SFP uplink ports, 250-W power supply Catalyst 3650-24PS-S IP Base Stackable 24 10/100/1000 PoE+ downlink ports, four 1-Gigabit SFP uplink ports, 640-W power supply Catalyst 3650-48PS-S IP Base Stackable 48 10/100/1000 PoE+ downlink ports, four 1-Gigabit SFP uplink ports, 640-W power supply Table 15 Catalyst 3650 Switch Models (continued) Switch Model Cisco IOS Image Description 92 Cisco Wireless Solutions Software Compatibility Matrix Supported Converged Access Solution Hardware Catalyst 3650-48FS-S IP Base Stackable 48 10/100/1000 Full PoE downlink ports, four 1-Gigabit SFP uplink ports, 1025-W power supply Catalyst 3650-24TD-S IP Base Stackable 24 10/100/1000 Ethernet downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 250-W power supply Catalyst 3650-48TD-S IP Base Stackable 48 10/100/1000 Ethernet downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 250-W power supply Catalyst 3650-24PD-S IP Base Stackable 24 10/100/1000 PoE+ downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 640-W power supply Catalyst 3650-48PD-S IP Base Stackable 48 10/100/1000 PoE+ downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 640-W power supply Catalyst 3650-48FD-S IP Base Stackable 48 10/100/1000 Full PoE downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 1025-W power supply Catalyst 3650-48FQ-S IP Base Stackable 48 10/100/1000 Full PoE downlink ports, four 10-Gigabit SFP+ uplink ports, 1025-W power supply Catalyst 3650-48PQ-S IP Base Stackable 48 10/100/1000 PoE+ downlink ports, four 10-Gigabit SFP+ uplink ports, 640-W power supply Catalyst 3650-48TQ-S IP Base Stackable 48 10/100/1000 Ethernet downlink ports, four 10-Gigabit SFP+ uplink ports, 250-W power supply Catalyst 3650-24TS-E IP Services Stackable 24 10/100/1000 Ethernet downlink ports, four 1-Gigabit SFP uplink ports, 250-W power supply Catalyst 3650-48TS-E IP Services Stackable 48 10/100/1000 Ethernet downlink ports, four 1-Gigabit SFP uplink ports, 250-W power supply Catalyst 3650-24PS-E IP Services Stackable 24 10/100/1000 PoE+ downlink ports, four 1-Gigabit SFP uplink ports, 640-W power supply Catalyst 3650-48PS-E IP Services Stackable 48 10/100/1000 PoE+ downlink ports, four 1-Gigabit SFP uplink ports, 640-W power supply Catalyst 3650-48FS-E IP Services Stackable 48 10/100/1000 Full PoE downlink ports, four 1-Gigabit SFP uplink ports, 1025-W power supply Table 15 Catalyst 3650 Switch Models (continued) Switch Model Cisco IOS Image Description 93 Cisco Wireless Solutions Software Compatibility Matrix Compatibility Matrix for Legacy Products Compatibility Matrix for Legacy Products This section contains the following subsections: • Cisco Prime Network Control System Compatibility Matrix, page 93 • Cisco Wireless Control System Compatibility Matrix, page 97 • Cisco WCS Navigator Compatibility Matrix, page 105 Cisco Prime Network Control System Compatibility Matrix Table 16 lists the compatibility matrix of Cisco Prime NCS, controller, access point images, Identity Services Engines (ISE), and mobility services engines (MSE). Catalyst 3650-24TD-E IP Services Stackable 24 10/100/1000 Ethernet downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 250-W power supply Catalyst 3650-48TD-E IP Services Stackable 48 10/100/1000 Ethernet downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 250-W power supply Catalyst 3650-24PD-E IP Services Stackable 24 10/100/1000 PoE+ downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 640-W power supply Catalyst 3650-48PD-E IP Services Stackable 48 10/100/1000 PoE+ downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 640-W power supply Catalyst 3650-48FD-E IP Services Stackable 48 10/100/1000 Full PoE downlink ports, two 1-Gigabit SFP and two 10-Gigabit SFP+ uplink ports, 1025-W power supply Catalyst 3650-48FQ-E IP Services Stackable 48 10/100/1000 Full PoE downlink ports, four 10-Gigabit SFP+ uplink ports, 1025-W power supply Catalyst 3650-48PQ-E IP Services Stackable 48 10/100/1000 PoE+ downlink ports, four 10-Gigabit SFP+ uplink ports, 640-W power supply Catalyst 3650-48TQ-E IP Services Stackable 48 10/100/1000 Ethernet downlink ports, four 10-Gigabit SFP+ uplink ports, 250-W power supply 1. PoE+ = Power over Ethernet plus (provides up to 30 W per port). Table 15 Catalyst 3650 Switch Models (continued) Switch Model Cisco IOS Image Description 94 Cisco Wireless Solutions Software Compatibility Matrix Compatibility Matrix for Legacy Products Table 16 Cisco Prime Network Control System Compatibility Matrix Cisco NCS Cisco WLC Cisco MSE ISE 1.1.1.24 7.2.115.2 7.2.111.3 7.2.110.0 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.01 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 7.2.110.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 ISE 1.0 ISE 1.1 1.1.0.58 7.2.103.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.02 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 7.2.103.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 ISE 1.0 ISE 1.1 95 Cisco Wireless Solutions Software Compatibility Matrix Compatibility Matrix for Legacy Products 1.0.2.29 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.1.91.03 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 6.0.202.0 6.0.199.4 6.0.196.0 6.0.188.0 6.0.182.0 6.0.108.0 4.2.209.0 4.2.207.0 4.2.205.0 4.2.176.0 4.2.173.0 4.2.130.0 4.2.112.0 4.2.99.0 4.2.61.0 7.0.240.0 7.0.230.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 6.0.202.0 6.0.103.0 ISE 1.0 Table 16 Cisco Prime Network Control System Compatibility Matrix (continued) Cisco NCS Cisco WLC Cisco MSE ISE 96 Cisco Wireless Solutions Software Compatibility Matrix Compatibility Matrix for Legacy Products 1.0.1.4 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 6.0.202.0 6.0.199.4 6.0.196.0 6.0.188.0 6.0.182.0 6.0.108.0 4.2.209.0 4.2.207.0 4.2.205.0 4.2.176.0 4.2.173.0 4.2.130.0 4.2.112.0 4.2.99.0 4.2.61.0 7.0.220.0 7.0.201.204 7.0.112.0 7.0.105.0 6.0.202.0 6.0.103.0 ISE 1.0 1.0.0.96 7.0.116.0 7.0.98.218 7.0.98.0 6.0.202.0 6.0.199.4 6.0.196.0 6.0.188.0 6.0.182.0 6.0.108.0 4.2.209.0 4.2.207.0 4.2.205.0 4.2.176.0 4.2.173.0 4.2.130.0 4.2.112.0 4.2.99.0 4.2.61.0 7.0.201.204 7.0.112.0 7.0.105.0 6.0.202.0 6.0.103.0 ISE 1.0 1. If you upgrade to the 7.1.91.0 software release of Cisco Wireless LAN Controller from an earlier release, we suggest that you also upgrade Cisco Wireless Control System to 7.0.220.0 and MSE to 7.0.220.0. This upgrade ensures that you get support for the latest 3600i and 3600e lightweight access points. 2. If you upgrade to the 7.1.91.0 software release of Cisco Wireless LAN Controller from an earlier release, we suggest that you also upgrade Cisco Wireless Control System to 7.0.220.0 and MSE to 7.0.220.0. This upgrade ensures that you get support for the latest 3600i and 3600e lightweight access points. 3. If you upgrade to the 7.1.91.0 software release of Cisco Wireless LAN Controller from an earlier release, we suggest that you also upgrade Cisco Wireless Control System to 7.0.220.0 and MSE to 7.0.220.0. This upgrade ensures that you get support for the latest 3600i and 3600e lightweight access points. Table 16 Cisco Prime Network Control System Compatibility Matrix (continued) Cisco NCS Cisco WLC Cisco MSE ISE 97 Cisco Wireless Solutions Software Compatibility Matrix Compatibility Matrix for Legacy Products Cisco Wireless Control System Compatibility Matrix Table 17 lists the Cisco Wireless Control System (WCS) compatibility matrix. Table 17 Cisco WCS Compatibility Matrix WCS Version Controller Versions 2710 Location Appliance Versions MSE Versions Upgrade Supported From 7.0.240.0 7.0.252.0 7.0.251.2 7.0.250.0 7.0.240.0 7.0.235.3 7.0.235.0 7.0.230.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 6.0.202.0 6.0.196.0 6.0.188.0 6.0.182.0 6.0.108.0 5.2.193.0 5.2.178.0 5.2.157.0 4.2.209.0 4.2.207.0 4.2.205.0 4.2.176.0 4.2.173.0 4.2.130.0 4.2.112.0 4.2.99.0 4.2.61.0 — 7.0.240.0 7.0.230.0 7.0.220.0 7.0.172.0 7.0.164.3 7.0.164.0 6.0.202.0 6.0.196.0 6.0.181.0 6.0.170.0 6.0.132.0 5.2.148.0 5.2.130.0 5.2.125.0 5.2.110.0 98 Cisco Wireless Solutions Software Compatibility Matrix Compatibility Matrix for Legacy Products 7.0.230.0 7.0.235.3 7.0.235.0 7.0.230.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 6.0.202.0 6.0.196.0 6.0.188.0 6.0.182.0 6.0.108.0 5.2.193.0 5.2.178.0 5.2.157.0 4.2.209.0 4.2.207.0 4.2.205.0 4.2.176.0 4.2.173.0 4.2.130.0 4.2.112.0 4.2.99.0 4.2.61.0 — 7.0.230.0 7.0.220.0 7.0.172.0 7.0.164.3 7.0.164.0 6.0.202.0 6.0.196.0 6.0.181.0 6.0.170.0 6.0.132.0 5.2.148.0 5.2.130.0 5.2.125.0 5.2.110.0 7.0.220.0 7.1.91.0 7.0.220.0 7.0.116.0 7.0.98.218 7.0.98.0 6.0.202.0 6.0.196.0 6.0.188.0 6.0.182.0 6.0.108.0 5.2.193.0 5.2.178.0 5.2.157.0 4.2.209.0 4.2.207.0 4.2.205.0 4.2.176.0 4.2.173.0 4.2.130.0 4.2.112.0 4.2.99.0 4.2.61.0 — 7.0.220.0 7.0.172.0 7.0.164.3 7.0.164.0 6.0.202.0 6.0.196.0 6.0.181.0 6.0.170.0 6.0.132.0 5.2.148.0 5.2.130.0 5.2.125.0 5.2.110.0 Table 17 Cisco WCS Compatibility Matrix (continued) WCS Version Controller Versions 2710 Location Appliance Versions MSE Versions Upgrade Supported From 99 Cisco Wireless Solutions Software Compatibility Matrix Compatibility Matrix for Legacy Products 7.0.172.0 7.0.116.0 7.0.98.218 7.0.98.0 6.0.202.0 6.0.196.0 6.0.188.0 6.0.182.0 6.0.108.0 5.2.193.0 5.2.178.0 5.2.157.0 4.2.209.0 4.2.207.0 4.2.205.0 4.2.176.0 4.2.173.0 4.2.130.0 4.2.112.0 4.2.99.0 4.2.61.0 — 7.0.201.204 7.0.164.3 7.0.164.0 6.0.202.0 6.0.196.0 6.0.181.0 6.0.170.0 6.0.132.0 5.2.148.0 5.2.130.0 5.2.125.0 5.2.110.0 7.0.164.3 7.0.98.218 7.0.98.0 6.0.196.0 6.0.188.0 6.0.182.0 6.0.108.0 5.2.193.0 5.2.178.0 5.2.157.0 4.2.209.0 4.2.207.0 4.2.205.0 4.2.176.0 4.2.173.0 4.2.130.0 4.2.112.0 4.2.99.0 4.2.61.0 — 7.0.112.0 7.0.105.0 6.0.181.0 6.0.170.0 6.0.132.0 5.2.148.0 5.2.130.0 5.2.125.0 5.2.110.0 Table 17 Cisco WCS Compatibility Matrix (continued) WCS Version Controller Versions 2710 Location Appliance Versions MSE Versions Upgrade Supported From 100 Cisco Wireless Solutions Software Compatibility Matrix Compatibility Matrix for Legacy Products 7.0.164.0 7.0.98.218 7.0.98.0 6.0.196.0 6.0.188.0 6.0.182.0 6.0.108.0 5.2.193.0 5.2.178.0 5.2.157.0 4.2.209.0 4.2.207.0 4.2.205.0 4.2.176.0 4.2.173.0 4.2.130.0 4.2.112.0 4.2.99.0 4.2.61.0 — 7.0.112.0 7.0.105.0 6.0.181.0 6.0.170.0 6.0.132.0 5.2.148.0 5.2.130.0 5.2.125.0 5.2.110.0 6.0.196.0 6.0.199.4 6.0.199.0 (pulled from CCO) 6.0.196.0 6.0.188.0 6.0.182.0 6.0.108.0 5.2.193.0 5.2.178.0 5.2.157.0 5.1.163.0 5.1.151.0 4.2.209.0 4.2.207.0 4.2.205.0 4.2.176.0 4.2.173.0 4.2.130.0 4.2.112.0 4.2.99.0 4.2.61.0 6.0.102.0 6.0.105.0 6.0.181.0 6.0.170.0 6.0.132.0 5.2.148.0 5.2.130.0 5.2.125.0 5.2.110.0 5.1.65.4 5.1.64.0 4.2.128.0 4.2.110.0 4.2.97.0 4.2.81.0 4.2.62.11 4.2.62.0 Table 17 Cisco WCS Compatibility Matrix (continued) WCS Version Controller Versions 2710 Location Appliance Versions MSE Versions Upgrade Supported From 101 Cisco Wireless Solutions Software Compatibility Matrix Compatibility Matrix for Legacy Products 6.0.181.0 6.0.199.4 6.0.199.0 6.0.196.159 6.0.196.0 6.0.188.0 6.0.182.0 6.0.108.0 5.2.193.0 5.2.178.0 5.2.157.0 5.1.163.0 5.1.151.0 4.2.207.0 4.2.205.0 4.2.176.0 4.2.173.0 4.2.130.0 4.2.112.0 4.2.99.0 4.2.61.0 6.0.101.0 6.0.103.0 6.0.170.0 6.0.132.0 5.2.148.0 5.2.130.0 5.2.125.0 5.2.110.0 5.1.65.4 5.1.64.0 4.2.128.0 4.2.110.0 4.2.97.0 4.2.81.0 4.2.62.11 4.2.62.0 6.0.170.0 6.0.188.0 6.0.182.0 6.0.108.0 5.2.193.0 5.2.178.0 5.2.157.0 5.1.163.0 5.1.151.0 4.2.207.0 4.2.205.0 4.2.176.0 4.2.173.0 4.2.130.0 4.2.112.0 4.2.99.0 4.2.61.0 6.0.97.0 6.0.97.0 6.0.132.0 5.2.148.0 5.2.130.0 5.2.125.0 5.2.110.0 5.1.65.4 5.1.64.0 4.2.128.0 4.2.110.0 4.2.97.0 4.2.81.0 4.2.62.11 4.2.62.0 Table 17 Cisco WCS Compatibility Matrix (continued) WCS Version Controller Versions 2710 Location Appliance Versions MSE Versions Upgrade Supported From 102 Cisco Wireless Solutions Software Compatibility Matrix Compatibility Matrix for Legacy Products 6.0.132.0 6.0.182.0 6.0.108.0 5.2.178.0 5.2.157.0 5.1.163.0 5.1.151.0 4.2.205.0 4.2.176.0 4.2.173.0 4.2.130.0 4.2.112.0 4.2.99.0 4.2.61.0 6.0.85.0 6.0.85.0 5.2.130.0 5.2.125.0 5.2.110.0 5.1.65.4 5.1.64.0 4.2.128.0 4.2.110.0 4.2.97.0 4.2.81.0 4.2.62.11 4.2.62.0 5.2.148.0 5.2.193.0 5.2.178.0 5.2.157.0 5.1.151.0 5.0.148.2 5.0.148.0 4.2.207.0 4.2.205.0 4.2.176.0 4.2.173.0 4.2.130.0 4.2.112.0 4.2.99.0 4.2.61.0 5.2.100.0 5.2.100.0 5.2.130.0 5.2.125.0 5.2.110.0 5.1.65.4 5.1.64.0 5.0.72.0 5.0.56.2 5.0.56.0 4.2.128.0 4.2.110.0 4.2.97.0 4.2.81.0 4.2.62.11 4.2.62.0 5.2.130.0 5.2.178.0 5.2.157.0 5.1.151.0 5.0.148.2 5.0.148.0 4.2.176.0 4.2.173.0 4.2.130.0 4.2.112.0 4.2.99.0 4.2.61.0 5.2.91.0 5.2.91.0 5.2.125.0 5.2.110.0 5.1.65.4 5.1.64.0 5.0.72.0 5.0.56.2 5.0.56.0 4.2.110.0 4.2.97.0 4.2.81.0 4.2.62.11 4.2.62.0 Table 17 Cisco WCS Compatibility Matrix (continued) WCS Version Controller Versions 2710 Location Appliance Versions MSE Versions Upgrade Supported From 103 Cisco Wireless Solutions Software Compatibility Matrix Compatibility Matrix for Legacy Products 5.2.125.0 (pulled from CCO) 5.2.178.0 5.2.157.0 5.1.151.0 5.0.148.2 5.0.148.0 4.2.176.0 4.2.173.0 4.2.130.0 4.2.112.0 4.2.99.0 4.2.61.0 5.2.91.0 5.2.91.0 5.2.110.0 5.1.65.4 5.1.64.0 5.0.72.0 5.0.56.2 5.0.56.0 4.2.110.0 4.2.97.0 4.2.81.0 4.2.62.11 4.2.62.0 5.2.110.0 5.2.157.0 5.1.151.0 5.0.148.2 5.0.148.0 4.2.176.0 4.2.173.0 4.2.130.0 4.2.112.0 4.2.99.0 4.2.61.0 5.2.91.0 5.2.91.0 5.1.64.0 5.0.72.0 5.0.56.2 5.0.56.0 4.2.110.0 4.2.97.0 4.2.81.0 4.2.62.11 4.2.62.0 5.1.65.4 5.1.163.0 5.1.151.0 5.0.148.2 5.0.148.0 4.2.176.0 4.2.173.0 4.2.130.0 4.2.112.0 4.2.99.0 4.2.61.0 5.1.35.0 5.1.35.0 5.1.64.0 5.0.72.0 5.0.56.2 5.0.56.0 4.2.110.0 4.2.97.0 4.2.81.0 4.2.62.11 4.2.62.0 5.1.64.0 5.1.151.0 5.0.148.2 5.0.148.0 4.2.176.0 4.2.173.0 4.2.130.0 4.2.112.0 4.2.99.0 4.2.61.0 5.1.30.0 5.1.30.0 5.0.56.2 5.0.56.0 4.2.97.0 4.2.81.0 4.2.62.11 4.2.62.0 Table 17 Cisco WCS Compatibility Matrix (continued) WCS Version Controller Versions 2710 Location Appliance Versions MSE Versions Upgrade Supported From 104 Cisco Wireless Solutions Software Compatibility Matrix Compatibility Matrix for Legacy Products 5.0.72.0 5.0.148.2 5.0.148.0 4.2.130.0 4.2.112.0 4.2.99.0 4.2.61.0 4.1.185.0 4.1.171.0 4.0.38.0 — 5.0.56.2 5.0.56.0 4.2.62.11 4.2.62.0 4.1.91.0 4.1.83.0 5.0.56.2 5.0.148.0 4.2.61.0 4.1.x.x 4.0.33.0 — 5.0.56.0 4.2.62.11 4.2.62.0 4.1.91.0 4.1.83.0 5.0.56.0 5.0.148.0 4.2.61.0 4.1.x.x 4.0.32.0 — 4.2.62.11 4.2.62.0 4.1.91.0 4.1.83.0 4.2.128.0 4.2.209.0 4.2.207.0 4.2.205.0 4.2.176.0 4.2.130.0 4.2.112.0 4.2.99.0 4.2.61.0 4.1.185.0 4.1.171.0 4.0.216.0 4.0.206.0 4.0.179.11 4.0.179.8 4.0.155.0 3.1.43.0 — 4.2.110.0 4.2.97.0 4.2.81.0 4.2.62.11 4.2.62.0 4.1.91.0 4.1.83.0 4.0.100.0 4.0.97.0 4.0.96.0 4.0.87.0 4.0.81.0 4.0.66.0 4.2.110.0 4.2.176.0 4.2.130.0 4.2.112.0 4.2.99.0 4.2.61.0 4.1.185.0 4.1.171.0 4.0.216.0 4.0.206.0 4.0.179.11 4.0.179.8 4.0.155.0 3.1.42.0 — 4.2.97.0 4.2.81.0 4.2.62.11 4.2.62.0 4.1.91.0 4.1.83.0 4.0.100.0 4.0.97.0 4.0.96.0 4.0.87.0 4.0.81.0 4.0.66.0 Table 17 Cisco WCS Compatibility Matrix (continued) WCS Version Controller Versions 2710 Location Appliance Versions MSE Versions Upgrade Supported From 105 Cisco Wireless Solutions Software Compatibility Matrix Compatibility Matrix for Legacy Products Cisco WCS Navigator Compatibility Matrix Cisco WCS and Cisco WCS Navigator must be from the same release in order to be compatible (see Table 18). Although the release numbers will not be the same, you must verify whether they were part of the same release. 4.2.97.0 4.2.176.0 4.2.130.0 4.2.112.0 4.2.99.0 4.2.61.0 4.1.185.0 4.1.171.0 4.0.216.0 4.0.206.0 4.0.179.11 4.0.179.8 4.0.155.0 3.1.38.0 — 4.2.81.0 4.2.62.11 4.2.62.0 4.1.91.0 4.1.83.0 4.0.100.0 4.0.97.0 4.0.96.0 4.0.87.0 4.0.81.0 4.0.66.0 4.2.81.0 4.2.99.0 4.2.61.0 4.1.185.0 4.1.171.0 4.0.216.0 4.0.206.0 4.0.179.11 4.0.179.8 4.0.155.0 3.1.36.0 — 4.2.62.11 4.2.62.0 4.1.91.0 4.1.83.0 4.0.100.0 4.0.97.0 4.0.96.0 4.0.87.0 4.0.81.0 4.0.66.0 4.2.62.11 4.2.61.0 4.1.185.0 4.1.171.0 4.0.216.0 4.0.206.0 4.0.179.11 4.0.179.8 4.0.155.0 3.1.35.0 — 4.2.62.0 4.1.91.0 4.1.83.0 4.0.100.0 4.0.97.0 4.0.96.0 4.0.87.0 4.0.81.0 4.0.66.0 4.2.62.0 4.2.61.0 4.1.185.0 4.1.171.0 4.0.216.0 4.0.206.0 4.0.179.11 4.0.179.8 4.0.155.0 3.1.35.0 — 4.1.91.0 4.1.83.0 4.0.100.0 4.0.97.0 4.0.96.0 4.0.87.0 4.0.81.0 4.0.66.0 Table 17 Cisco WCS Compatibility Matrix (continued) WCS Version Controller Versions 2710 Location Appliance Versions MSE Versions Upgrade Supported From 106 Cisco Wireless Solutions Software Compatibility Matrix Compatibility Matrix for Legacy Products For example, Cisco WCS Navigator 1.0 is compatible with Cisco WCS 4.1, and Cisco WCS Navigator 1.1.x is compatible with any Cisco WCS 4.2.x. Note When Cisco WCS Navigator is upgraded to a new version, the corresponding Cisco WCS must also be upgraded to the corresponding new version. For example, if Cisco WCS Navigator is upgraded to version 1.6, Cisco WCS must also be upgraded to the corresponding version 7.0. Table 18 WCS and Navigator Compatibility Matrix Navigator Release Number WCS Release Number Upgrade Supported From 1.6.230.0 7.0.240.0 7.0.230.0 1.6.220.0 1.6.172.0 1.6.164.3 1.6.164.0 1.5.202.0 1.5.196.0 1.5.181.0 1.5.170.0 1.5.132.0 1.4.148.0 1.4.130.0 1.4.125.0 1.4.110.0 1.6.220.0 7.0.220.0 1.6.172.0 1.6.164.3 1.6.164.0 1.5.202.0 1.5.196.0 1.5.181.0 1.5.170.0 1.5.132.0 1.4.148.0 1.4.130.0 1.4.125.0 1.4.110.0 1.6.172.0 7.0.172.0 1.6.164.3 1.6.164.0 1.5.202.0 1.5.196.0 1.5.181.0 1.5.170.0 1.5.132.0 1.4.148.0 1.4.130.0 1.4.125.0 1.4.110.0 107 Cisco Wireless Solutions Software Compatibility Matrix Compatibility Matrix for Legacy Products 1.6.164.3 7.0.164.3 1.6.164.0 1.5.202.0 1.5.196.0 1.5.181.0 1.5.170.0 1.5.132.0 1.4.148.0 1.4.130.0 1.4.125.0 1.4.110.0 1.6.164.0 7.0.164.0 7.0.164.3 6.0.181.0 6.0.170.0 6.0.132.0 5.2.148.0 5.2.130.0 5.2.125.0 5.2.110.0 1.5.202.0 6.0.132.0 6.0.181.0 6.0.202.0 1.5.196.0 1.5.181.0 1.5.170.0 1.5.132.0 1.4.148.0 1.4.130.0 1.4.125.0 1.4.110.0 1.3.65.4 1.3.64.0 1.1.128.0 1.1.110.0 1.1.97.0 1.1.81.0 1.1.62.11 1.1.62.0 Table 18 WCS and Navigator Compatibility Matrix (continued) Navigator Release Number WCS Release Number Upgrade Supported From 108 Cisco Wireless Solutions Software Compatibility Matrix Compatibility Matrix for Legacy Products 1.5.196.0 6.0.196.0 1.5.181.0 1.5.170.0 1.5.132.0 1.4.148.0 1.4.130.0 1.4.125.0 1.4.110.0 1.3.65.4 1.3.64.0 1.1.128.0 1.1.110.0 1.1.97.0 1.1.81.0 1.1.62.11 1.1.62.0 1.5.181.0 6.0.181.0 1.5.170.0 1.5.132.0 1.4.148.0 1.4.130.0 1.4.125.0 1.4.110.0 1.3.65.4 1.3.64.0 1.1.128.0 1.1.110.0 1.1.97.0 1.1.81.0 1.1.62.11 1.1.62.0 1.5.170.0 6.0.132.0 1.5.132.0 1.4.148.0 1.4.130.0 1.4.125.0 1.4.110.0 1.3.65.4 1.3.64.0 1.1.128.0 1.1.110.0 1.1.97.0 1.1.81.0 1.1.62.11 1.1.62.0 Table 18 WCS and Navigator Compatibility Matrix (continued) Navigator Release Number WCS Release Number Upgrade Supported From 109 Cisco Wireless Solutions Software Compatibility Matrix Compatibility Matrix for Legacy Products 1.5.132.0 6.0.132.0 1.4.130.0 1.4.125.0 1.4.110.0 1.3.65.4 1.3.64.0 1.1.128.0 1.1.110.0 1.1.97.0 1.1.81.0 1.1.62.11 1.1.62.0 1.4.148.0 5.2.148.0 1.4.130.0 1.4.125.0 1.4.110.0 1.3.65.4 1.3.64.0 1.2.72.0 1.2.56.2 1.2.56.0 1.1.128.0 1.1.110.0 1.1.97.0 1.1.81.0 1.1.62.11 1.1.62.0 1.4.130.0 5.2.130.0 5.2.110.0 1.4.125.0 1.4.110.0 1.3.65.4 1.3.64.0 1.2.72.0 1.2.56.2 1.2.56.0 1.1.128.0 1.1.110.0 1.1.97.0 1.1.81.0 1.1.62.11 1.1.62.0 Table 18 WCS and Navigator Compatibility Matrix (continued) Navigator Release Number WCS Release Number Upgrade Supported From 110 Cisco Wireless Solutions Software Compatibility Matrix Compatibility Matrix for Legacy Products 1.4.110.0 5.2.110.0 1.3.64.0 1.2.72.0 1.2.56.2 1.2.56.0 1.1.128.0 1.1.110.0 1.1.97.0 1.1.81.0 1.1.62.11 1.1.62.0 1.3.64.0 5.1.64.0 1.2.56.2 1.2.56.0 1.1.128.0 1.1.110.0 1.1.97.0 1.1.81.0 1.1.62.11 1.1.62.0 1.1.128.0 4.2.97.0 4.2.81.0 4.2.62.11 4.2.62.0 4.2.110.0 4.2.128.0 1.1.110.0 1.1.97.0 1.1.81.0 1.1.62.11 1.1.62.0 1.0.91.0 1.0.83.0 1.1.110.0 4.2.97.0 4.2.81.0 4.2.62.11 4.2.62.0 4.2.110.0 1.1.97.0 1.1.81.0 1.1.62.11 1.1.62.0 1.0.91.0 1.0.83.0 1.1.97.0 4.2.97.0 4.2.81.0 4.2.62.11 4.2.62.0 1.1.81.0 1.1.62.11 1.1.62.0 1.0.91.0 1.0.83.0 1.1.62.11 4.2.62.11 4.2.62.0 1.1.62.0 1.0.91.0 1.0.83.0 1.1.62.0 4.2.62.0 1.0.91.0 1.0.83.0 1.0.91.0 4.1.91.0 4.1.83.0 1.0.83.0 1.0.83.0 4.1.83.0 — Table 18 WCS and Navigator Compatibility Matrix (continued) Navigator Release Number WCS Release Number Upgrade Supported From 111 Cisco Wireless Solutions Software Compatibility Matrix Inter-Release Controller Mobility Inter-Release Controller Mobility This section contains the following Inter-Release Controller Mobility (IRCM) topics: • IRCM Compatibility Matrix, page 112 • CUWN Converged Access Solution Components and New (Hierarchical) Mobility IRCM Compatibility Matrix, page 113 112 Cisco Wireless Solutions Software Compatibility Matrix Inter-Release Controller Mobility IRCM Compatibility Matrix Table 19 IRCM Compatibility Matrix: 4.2.x to 7.6.x Releases CUWN Service 4.2.x 5.0.x 5.1.x 6.0.x 7.0.x 7.2.x 7.3.x 7.4.x 7.6.x Layer 2 and Layer 3 Roaming Y — — Y Y Y Y Y Y Wireless Guest Access/Termination YYYYYYYYY MSE 8.0 wIPS and AwIPS Rogue Detection Y ——Y Y Y Y Y Y Fast Roaming (CCKM) in a mobility group Y ——Y Y Y Y Y Y Location Services Y — — Y Y Y Y Y Y Radio Resource Management (RRM) Y ——Y Y Y1 1. In the 7.2.x.x release, RF Groups and Profiles were introduced. RRM for 7.2.x.x and later releases is not compatible with RRM for any previous release. Y2 2. In the 7.3.101.0 release, changes were made to RF profiles that are not backwardly compatible with 7.2. Y Y Management Frame Protection (MFP) Y ——Y Y Y Y Y Y AP Failover Y — — Y Y Y Y Y Y Table 20 IRCM Compatibility Matrix: 7.0.x to 8.0.x Releases CUWN Service 7.0.x 7.2.x 7.3.x 7.4.x 7.6.x 8.0.x Layer 2 and Layer 3 Roaming Y Y Y Y Y Y Wireless Guest Access/Termination YYYYYY MSE 8.0 wIPS and AwIPS Rogue Detection YYYYYY Fast Roaming (CCKM) in a mobility group YYYYYY Location Services Y Y Y Y Y Y Radio Resource Management (RRM) Y Y1 1. In the 7.2.x.x release, RF Groups and Profiles were introduced. RRM for 7.2.x.x and later releases is not compatible with RRM for any previous release. Y2 2. In the 7.3.101.0 release, changes were made to RF profiles that are not backwardly compatible with 7.2. YYY Management Frame Protection (MFP) YYYYYY AP Failover Y Y Y Y Y Y 113 Cisco Wireless Solutions Software Compatibility Matrix Inter-Release Controller Mobility CUWN Converged Access Solution Components and New (Hierarchical) Mobility IRCM Compatibility Matrix Table 21 IRCM Compatibility Matrix: 7.4.x to 8.1.x and Later Releases CUWN Service 7.4.x 7.6.x 8.0.x 8.1.x 8.2.x 8.3.x 8.4.x 8.5.x Layer 2 and Layer 3 Roaming Y Y Y Y Y Y Y Y Wireless Guest Access/Termination Y Y YY Y Y YY MSE 8.0 wIPS and AwIPS Rogue Detection Y Y YY Y Y YY Fast Roaming (CCKM) in a mobility group Y Y YY Y Y YY Location Services Y Y Y Y Y Y Y Y Radio Resource Management (RRM) Y Y YY Y Y YY Management Frame Protection (MFP) Y Y YY Y Y YY AP Failover Y Y Y Y Y Y Y Y Table 22 CUWN Converged Access Solution Components and New (Hierarchical) Mobility IRCM Compatibility Matrix Service 7.3.112.0 7.5 and later releases IOS XE 3.2.0SE and later releases Layer 2 and Layer 3 Roaming Y Y Wireless Guest Anchor/Termination1 1. Guest Anchor Termination is only supported on Cisco 2500 Series, 5700 Series, 5500 Series, 8500 Series, and Cisco WiSM2 platforms. The Cisco 2500 Series, 5700 Series, 5500 Series, 8500 Series, Cisco WiSM2, and Catalyst 3650 and 3850 are all supported as foreign controllers. Y Y MSE 8.0 wIPS and AwIPS Rogue Detection2 2. Rogue Detector Mode is not supported on Catalyst 3650 and 3850. Y Y Fast Roaming (CCKM) in a mobility group Y Y Location Services Y Y Radio Resource Management (RRM)3 3. In Release 7.2, RF profiles and groups feature was introduced. RRM for Release 7.2 and later is not backward compatible with the earlier releases. RRM Converged Access is compatible with the controller software 7.6 and later releases but does not support RF Profiles and Groups feature that was introduced in Release 7.2. Y Y Management Frame Protection (MFP) Y Y AP Failover and SSO4 4. AP SSO support for Cisco 5700 series controllers is supported in IOS XE 3.3.0SE release. AP Intra-OS Platform Fast Failover Supported. AP Inter-OS Platform Image Download and Reboot performed. Y Y 114 Cisco Wireless Solutions Software Compatibility Matrix New Mobility Support Matrix New Mobility Support Matrix This section lists the New Mobility support matrix for Cisco WLC platforms per various Cisco Wireless releases: • Cisco 2504 and 5508 Wireless Controller and WiSM2, page 114 • Cisco 8510 Wireless Controllers, page 115 • Cisco 3504, 5520, and 8540 Wireless Controllers, page 115 Note New Mobility is not supported on Cisco Flex 7510 WLC and Cisco Virtual Wireless Controller (vWLC). Cisco 2504 and 5508 Wireless Controller and WiSM2 Table 23 New Mobility Support Matrix for Cisco 2504 and 5508 WLCs and WiSM2 Feature 7.3.112. 0 7.4 7.5 7.6 8.0 8.1 8.2 8.3 8.4 8.5 New Mobility—Guest Anchor Controller Y N Y Y Y YY Y Y Y New Mobility—Mobility Controller Y N Y Y Y NN N N N New Mobility—Mobility Controller SPG Y N Y Y Y NN N N N Native IPv6 N N N N N N N N N N HA AP SSO Y Y Y Y Y Y Y Y Y Y HA Client SSO N N N N N N N N N N Sleeping Clients N N N Y Y Y Y Y Y Y Mobility Statistics Y N Y Y Y Y Y Y Y Y Mobility Oracle configuration N N Y Y Y YY Y Y Y EoGRE Tunnel Support N N N N N N N N N N Mobility Support for Microsoft Lync calls N N N N N NN N N N Mesh RAP channel synchronization across mobility groups N N N N N NN N N N AVC Profile N N Y Y Y Y Y Y Y Y Internal DHCP N N N N N N N N N N PMIPv6 N N N N N N N N N N Fast SSID Switching N N N Y Y Y Y Y Y Y 802.11r N N N N Y Y Y Y Y Y 115 Cisco Wireless Solutions Software Compatibility Matrix New Mobility Support Matrix Cisco 8510 Wireless Controllers Cisco 3504, 5520, and 8540 Wireless Controllers 802.11k N N N N Y Y Y Y Y Y 802.11v N N N N Y Y Y Y Y Y Table 24 New Mobility Support Matrix for Cisco 8510 WLCs Feature 8.0 8.1 8.2 8.3 8.4 8.5 New Mobility—Guest Anchor Controller Y Y Y Y Y Y New Mobility—Mobility Controller Y Y Y Y N N New Mobility—Mobility Controller SPG N N N N N N Native IPv6 N N N N N N HA AP SSO Y Y Y Y Y Y HA Client SSO N N N N N N Sleeping Clients Y1 1. Supported from Release 8.0.140.0 onwards. YYYYY Mobility Statistics Y Y Y Y Y Y Mobility Oracle configuration N N N N N N EoGRE Tunnel Support N N N N N N Fast SSID Switching Y Y Y Y Y Y 802.11r Y Y Y Y Y Y 802.11k Y Y Y Y Y Y 802.11v Y Y Y Y Y Y Table 25 New Mobility Support Matrix for Cisco 3504, 5520, and 8540 WLCs Feature 8.1 8.2 8.3 8.4 8.5 New Mobility—Guest Anchor Controller Y Y Y Y Y New Mobility—Mobility Controller Y Y Y N N New Mobility—Mobility Controller SPG N N N N N Native IPv6 N N N N N HA AP SSO Y Y Y Y Y HA Client SSO N N N N N Sleeping Clients Y Y Y Y Y Table 23 New Mobility Support Matrix for Cisco 2504 and 5508 WLCs and WiSM2 Feature 7.3.112. 0 7.4 7.5 7.6 8.0 8.1 8.2 8.3 8.4 8.5 116 Cisco Wireless Solutions Software Compatibility Matrix Cisco Support Community Cisco Support Community Cisco Support Community is a forum for you to ask and answer questions, share suggestions, and collaborate with your peers. Join the forum at https://supportforums.cisco.com/index.jspa. Obtain Documentation and Submit a Service Request For information on obtaining documentation, using the Cisco Bug Search Tool (BST), submitting a service request, and gathering additional information, see What’s New in Cisco Product Documentation. To receive new and revised Cisco technical content directly to your desktop, you can subscribe to the What’s New in Cisco Product Documentation RSS feed. The RSS feeds are a free service. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R) Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. © 2017 Cisco Systems, Inc. All rights reserved. Mobility Statistics Y Y Y Y Y Mobility Oracle configuration N N N N N EoGRE Tunnel Support N N N N N Mobility Support for Microsoft Lync calls NNNN N Mesh RAP channel synchronization across mobility groups NNNN N AVC Profile Y Y Y Y Y Internal DHCP N N N N N PMIPv6 N N N N N Fast SSID Switching Y Y Y Y Y 802.11r Y Y Y Y Y 802.11k Y Y Y Y Y 802.11v Y Y Y Y Y Table 25 New Mobility Support Matrix for Cisco 3504, 5520, and 8540 WLCs Feature 8.1 8.2 8.3 8.4 8.5 Cisco シスコ製品カタログ Vol.9 2016 秋冬号 特集 Cisco Catalyst 2960-L シリーズ 有線ネットワーク エッジを変革する これからのデスクトップ スイッチ Fast IT でイノベーションを加速する スイッチ ワイヤレス ルータ セキュリティ Meraki サービス Cisco Start シリーズ 100 名規模以下の企業向けラインアップ -ネットワーク製品国内シェア No.1※ のシスコがもっと身近に- 全国の販売パートナー検索、見積依頼はこちらへ! http://www.cisco.com/jp/go/marketplace マーケット プレイス 製品の外観や仕様など、より詳細な情報はこちらへ! http://www.cisco.com/jp/go/start Cisco Start シリーズ特設サイト Start ルータ ギガビット対応 VPN ルータ Cisco 841M J シリーズ Start クラウド サービス クラウドをビジネスに有効活用 Cisco クラウド Web セキュリティ Web 会議 Cisco WebEx ※ 出典:IDC Japan, 2016 年 5 月「国内企業向けネットワーク機器市場シェア、2015 年:ルーター、イーサネットスイッチ、無線 LAN 機器」(JPJ40592316) Start ワイヤレス 11ac Wave 2 / Wave 1 対応 Cisco Aironet 1800/1700 シリーズ アクセス ポイント 小規模オフィスに最適、カンタン設定 Cisco SG/SF シリーズ スイッチ Cisco WAP シリーズ アクセス ポイント 「学びの場」のインフラをより安全、安心なものに Cisco Catalyst スイッチ Cisco Aironet アクセス ポイント Start スイッチ ギガビット対応アクセス スイッチ Start セキュリティ 統合型セキュリティアプライアンス Cisco ASA 5506-X with FirePOWER Services Cisco Start エントリー モデル Cisco Catalyst 2960-L シリーズ Cisco Start 文教セレクション Vol.9 2016 秋冬号 シスコ製品カタログ Index スイッチ Cisco スモール ビジネス スイッチ ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ P15 Cisco Catalyst 2960-L シリーズ ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ P16 Cisco Catalyst 2960-Plus シリーズ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ P16 Cisco Catalyst 2960-CX シリーズ ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ P17 Cisco Catalyst 3560-CX シリーズ ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ P17 Cisco Catalyst 2960-X シリーズ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ P19 Cisco Catalyst 3650 シリーズ ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ P20 Cisco Catalyst 3850 シリーズ ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ P22 Cisco Catalyst 4500E シリーズ ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ P24 Cisco Catalyst 4500-X シリーズ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ P25 Cisco Catalyst 6500 シリーズ ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ P26 Cisco Catalyst 6800 シリーズ ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ P27 モジュール & アクセサリ ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ P29 ワイヤレス Cisco WAP & Aironet アクセス ポイント ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ P34 ■ 屋内用アクセス ポイント P34 ■ 屋外用アクセス ポイント P36 ■ Cisco Aironet アンテナ & アクセサリ P37 Cisco ワイヤレス コントローラ ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ P39 モビリティ サービス & ネットワーク管理ツール ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ P41 ルータ Cisco ISR 800 シリーズ ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ P44 Cisco ISR 1900/2900/3900 シリーズ ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ P45 Cisco ISR 4000 シリーズ ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ P46 モジュール & アクセサリ ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ P47 Cisco Wide Area Application Services (WAAS) ・・・・・・・・・・・・・・・・・・・・・・・・・ P50 セキュリティ 次世代ファイアウォール・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ P53 セキュリティ管理・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ P55 Advanced Malware Protection(AMP)・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ P55 Meraki Cisco Meraki・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ P56 サービス シスコ サービス・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ P60 注目! の新製品 P04 Cisco Catalyst 2960-L シリーズ 有線ネットワークエッジを変革する これからのデスクトップ スイッチ P06 Cisco 4G LTE ソリューション バックアップは ISDN から 4G LTE の時代へ 機動性と耐障害性に優れた WAN を実現 P08 スイッチ ワイヤレス ルータ セキュリティ Meraki サービス いつでも、どこでも、誰にでも、どのようなデバイスに対しても、 安全性が高く信頼できる、シームレスな環境で接続できるネットワーク。 中堅・中小企業のビジネスを成功へと導く、エンタープライズ ネットワークを実現する新製品を紹介します。 発売日につきましては、シスコ認定パートナー、シスコ認定ディストリビュータ、またはシスコ担当営業にお問い合わせください。 注目! の新製品 Cisco Catalyst 2960-L シリーズは、エンタープライズクラスのネットワー クをシンプルかつリーズナブルに構築できる、次世代デスクトップ スイッチです。 スリムかつスタイリッシュなシャーシにファンレス静音設計、-5 ~ 55 ℃ の幅 広い動作温度で、デスクトップなど、ワイヤリング クローゼットに限定されず必 要な場所に、エンタープライズクラスのサービスを拡張できます。 シンプルかつリーズナブルな次世代デスクトップ スイッチ スイッチ 小規模ネットワーク向けスイッチのラインアップが大幅に拡充されました。 Cisco 350 シリーズ マネージド スイッチは大好評の Cisco 300 シリーズ マネージド スイッチの後継バージョンで、新たに PoE パススルー対応モデル や 60 W PoE 対応モデルが追加されました。Cisco 350X/550X シリーズ スタッカブル マネージド スイッチは小規模ネットワークのコアに最適な 10 ギ ガビット イーサネット対応スイッチで、それぞれ最大 4 または 8 台のスタッ ク接続をサポートします。 小規模ネットワーク向けスイッチの新ラインアップ Cisco Catalyst 2960-L シリーズ P16 Cisco 350 シリーズ マネージド スイッチ P15 Cisco 350X シリーズ スタッカブル マネージド スイッチ P15 Cisco 550X シリーズ スタッカブル マネージド スイッチ P15 04 日本市場向けに 6 年ぶりに、小規模ネットワーク向けアクセス ポイントがリリースされました。スタイリッシュな縦置きデザインの Cisco WAP131 や壁面 設置で有線 PoE 出力ポートも備えた Cisco WAP361 など、さまざまな設置環境にマッチするラインアップです。さらに、Cisco WAP150/361/561 は 11ac Wave 1 対応、およびコントローラが不要のシングル ポイント セットアップ(SPS)対応で、高速かつ高品質な無線 LAN をリーズナブルに導入およびシ ンプルに運用管理できます。 小規模ネットワーク向けアクセス ポイントが再ラインアップ Cisco 100 シリーズ ワイヤレス アクセス ポイント P34 Cisco 300 シリーズ ワイヤレス アクセス ポイント P34 Cisco 500 シリーズ ワイヤレス アクセス ポイント P34 Cisco 819G/819GW サービス統合型ルータ P44 Cisco IR829GW サービス統合型ルータ P44 Cisco 899G サービス統合型ルータ P44 ワイヤレス ルータ Cisco 819G/819GW、Cisco IR829GW、および Cisco 899G は、WAN のメイン回線またはバックアップ回線として携帯電話の 4G LTE ネットワーク を使用できるサービス統合型ルータです。耐久性に優れた Cisco 819G/819GW および Cisco IR829GW は、Machine-to-Machine(M2M)環境にも 最適で、さまざまな場所に設置できます。 ISDN からの移行に最適な 4G LTE 2.5 対応ルータ 05 スイッチ ワイヤレス ルータ セキュリティ Meraki サービス ネットワーク インフラを支える数々のデバイスの中でも、絶えず進化を続 けるテクノロジーへのキャッチアップから取り残されがちなデバイス群が、 いわゆる「島ハブ」です。オフィスに点在するデスクのかたまり(グループ)ご とに配置して、社員が有線ネットワーク接続に使用するデスクトップ スイッ チです。主としてコスト面の理由から、この島ハブに低価格な非インテリジェ ント スイッチを使用している企業は少なくありません。 しかし、このような非インテリジェント スイッチには、セキュリティ面およ び管理面の両方で常にリスクがつきまといます。夜間に誰かがオフィスに侵 入して、島ハブから社内ネットワークに接続して機密情報を盗んでしまうかも しれません。仕事中に突然、ネットワーク接続ができなくなってしまうかもし れません。このような非インテリジェント スイッチでは多くの場合、ネットワー ク管理者がリモートで、トラブルの兆候を事前に把握して対処することも、原 因を究明して復旧することも困難です。 とはいえ、ネットワークのコアで使用されるスイッチのように、高機能なが ら高価格のスイッチを、島ハブに配置することはコスト面で現実的ではあり ません。機能面では不必要でもあります。島ハブに最適なスイッチは、現在 および将来にわたってネットワークの課題に応えられる、コスト面と機能面 で最高のバランスを提供するデスクトップ スイッチです。 有線ネットワーク エッジの課題 Cisco Catalyst 2960-L シリーズは、島ハブのような有線ネットワーク エッジに最適なスイッチとしてリリースされました。 これからのデスクトップ スイッチ Cisco Catalyst 2960-L シリーズ 有線ネットワーク エッジを変革する これからのデスクトップ スイッチ 特集 Cisco Catalyst 2960-L シリーズ シスコの「Catalyst」スイッチ ブランドで、最もリーズナブルに導入およびシンプルに運用管理できるラインアップがリ リースされました。Cisco Catalyst 2960-L シリーズは、コスト面と機能面で最高のバランスを提供する、有線ネッ トワークエッジに最適なスイッチです。オフィスの島ハブにありがちな非インテリジェントスイッチをこの次世代デスクトッ プ スイッチにリプレースすれば、ネットワーク全体をインテリジェントに統合管理できるようになります。 ● 最もリーズナブルな Catalyst スイッチ:これまでの「Catalyst」スイッチ ブランドで、最もリーズナブルな価格帯で提供されます。 ● スリムでスタイリッシュ:文字どおり「デスクトップ」に設置しても違和感が ない、スリムでスタイリッシュな外観です。デスク下やデスク間にもすっき り収納できます。 ● ファンレス静音設計:48 ポート PoE 対応モデルを除き、ほとんどのモデ ルがファンレス静音設計で、動作音が気になりません。 ● 幅広い動作温度:-5 ~ 55 ℃ の幅広い動作温度で、デスクトップに限 らず、さまざまな環境に設置できます。 ● 全ポート PoE & 1 ポートあたり最大 30 W 出力対応:PoE 対応モデル の RJ-45 ダウンリンク ポートは全ポートが PoE 出力対応で、1 ポート あたり最大で 30 W の PoE 出力にも対応しています。 ●レイヤ 2 基本機能を提供:実績を積み重ねた Cisco IOS ソフトウェア の LAN Lite フィーチャ セットを搭載、レイヤ 2 の基本機能をすべて利 用可能です。さらに、セキュリティや管理性、QoS などネットワーク エッ ジに必要な機能で、これまでの LAN Lite フィーチャ セットには含まれ なかった一部の機能が利用可能になりました。 ● 日本語 Web UI:日本語に完全対応した使いやすい Web ブラウザベー スの設定ユーティリティによって、簡単に導入および管理できます。もち ろん、従来のコマンドライン インターフェイスも使用できます。 06 Cisco Catalyst 2960-L シリーズは、既存の Cisco Catalyst スイッチ、とりわけ Cisco Catalyst 2960-C/SF/S/Plus シリーズ LAN Lite モデル のリプレースに最適です。これらのファスト イーサネット スイッチを、機能を損なわずにギガビット イーサネット スイッチへとアップグレードできます。 固定構成型 Cisco Catalyst スイッチ ポジショニング 既存の Cisco Catalyst スイッチのリプレースにも最適 ネットワーク管理者の悩みを解決 !! Cisco Catalyst 2960-L シリーズ セキュリティが 不安 管理が 行き届かない 壊れやすい 安心のブランド リモ-ト管理 日本語 Web UI 万全の セキュリティ リーズナブル パフォーマンス & 機能 Catalyst 3650 Catalyst 2960-X Catalyst 2960-CX Catalyst 2960-L ・ワイヤレス コントローラ内蔵 ・mGig オプション ・ネットワーク センサー ・Cisco StackWise-480 ・ Cisco StackPower ・mGig オプション ・Cisco NetFlow-Lite ・10 G アップリンク ・ PoE+ パススルー ・LAN Base ・Cisco NetFlow-Lite ・ワイヤレス コントローラ内蔵 ・mGig オプション ・ネットワーク センサー ・Cisco StackWise-160 ・IP Lite オプション ・電源モジュールの複数搭載 ・Cisco FlexStack Plus ・LAN Base オプション ・ファスト イーサネット アクセス コア / アクセス アクセス / デスクトップ デスクトップ Catalyst 3850 Catalyst 3560-CX Catalyst 2960-Plus 旧モデル 現行モデル Catalyst 2960-C Catalyst 2960-SF Catalyst 2960-S Catalyst 2960-Plus Catalyst 2960-X Catalyst 2960-L WS-C2960C-8TC-S - - - - WS-C2960L-8TS-JP WS-C2960L-16TS-JP - WS-C2960S-F24TS-S WS-C2960S-24TS-S WS-C2960+24TC-S WS-C2960X-24TS-LL WS-C2960L-24TS-JP - - - WS-C2960+24LC-S WS-C2960+24PC-S - WS-C2960L-24PS-JP - WS-C2960S-F48TS-S WS-C2960S-48TS-S WS-C2960+48TC-S WS-C2960X-48TS-LL WS-C2960L-48TS-JP - - - WS-C2960+48PST-S - WS-C2960L-48PS-JP 07 スイッチ ワイヤレス ルータ セキュリティ Meraki サービス ネットワークがあらゆる業務において不可欠となった現在、企業の拠点間 を結ぶ WAN 回線も、万一の事態に備えてバックアップ回線を確保しておく ことが望まれます。とはいえ、バックアップ用途で光ファイバの有線ブロード バンド回線を敷設するのは、多くの企業にとって負担が大きすぎるでしょう。 また、旧来からバックアップ用のネットワークに利用されてきた ISDN 回 線は、安価に利用できるものの 64 Kbps と低速で、今日ではメイン回線と の速度差があまりにも大きくなってしまい、実用的とはいえません。さらに、 ISDN のデータ通信サービスは、2020 年度後半に終了が予定されています (2016 年 6 月時点)。 そこで、低コストかつ高速なバックアップ回線として広く利用されるように なってきたのが、携帯電話の 4G ネットワークを WAN 接続に利用する「4G LTE ワイヤレス WAN」です。携帯電話キャリアが提供する各サービスによっ て異なりますが、下り(ダウンリンク)最大約 100 Mbps、上り(アップリンク) 最大約 50 Mbps の高速通信を実現します。また、光ファイバ回線よりも低 価格であることに加えて、携帯電話キャリアが提供する定額プランを適用で きるため、バックアップ回線の運用コスト予測が立てやすいというメリットも あります。 ISDN に代わる低コストで高速なバックアップ WAN 回線として バックアップは ISDN から 4G LTE の時代へ 機動性と耐障害性に優れた WAN を実現 特集 Cisco 4G LTE ソリューション シスコのサービス統合型ルータは、携帯電話の 4G LTE ネットワークを使用した WAN 接続に対応しています。 2020 年度後半にデータ通信サービスの終了が予定されている ISDN から 4G LTE ネットワークへと移行することで、 WAN の高速なバックアップ回線を容易に確保できます。また、広範囲をカバーする 4G LTE ネットワークの特徴を 活かして、有線ブロードバンド接続が不可能な環境などで WAN のメイン回線としても活用できます。 バックアップ WAN メイン WAN 通常はメイン WAN の 有線ブロードバンド回線を使用するが、 接続断を検知すると、 バックアップ WAN の 4G LTE ネットワークに切り替える シス コ の サ ー ビ ス 統 合 型 ル ー タ で は、Cisco 819G/GW、Cisco IR829GW、Cisco 899G、および ワイヤレス WAN モジュール(EHWICLTE-JN)を搭載した Cisco ISR 1900/2900/3900 シリーズが 4G LTE ソリューションに対応しています。 また、Cisco 841M では 3G/4G 対応 USB モデムの接続をサポートす るほか、Cisco ISR 4000 シリーズでも、ワイヤレス WAN モジュールの日 本国内サポートを予定しています。 4G LTE ソリューション対応ルータ USB モデム ビルトインまたは モジュール 特長 コスト パフォーマンス 高い信頼性と機能 用途 ・いざというときの バックアップ回線として ・少データ量または ベスト エフォートの メイン回線として ・機動性に富んだ メイン回線として ・信頼性が高い バックアップ回線として 対応モデル / 対応シリーズ ・Cisco 841M ・Cisco 819G/GW ・Cisco IR829GW ・Cisco 899G ・Cisco ISR 1900/2900/3900/4000 シリーズ 08 エンターテインメント スタジアム インテリジェント 車載システム エネルギー管理 の最適化 公共サービス 安全・災害対策 物流の最適化 物流トラッキング 自動販売機管理 配車管理 生産管理 観光サービス の充実 公共交通サービス の連動 デジタル サイネージ スマート シティ スマート トランスポーテーション スマート ロジスティクス スマート ファクトリー 4G LTE ワイヤレス WAN は、バックアップ回線としてだけではなく、物 理的・時間的な制約がある拠点のメイン回線としても有用です。 物理的な制約に対応できる例としては、離島や山間部など、光ファイバ の有線ブロードバンド回線がそもそも提供されていない地域での利用や、 ショッピング モールの通路上の店舗や駅のキオスクなど、スペースの都合 で有線ブロードバンド回線の敷設工事が困難な場所での利用があります。 時間的な制約に対応できる例としては、イベント会場や工事現場の事務 所、または仮設店舗など、限定された期間のみ WAN 回線が必要な場合で の利用があります。 さらに、このように物理的・時間的な制約に強いという特長を敷 ふえん 衍して考 えると、4G LTE ワイヤレス WAN は災害対策としても非常に有用です。東 日本大震災では、シスコは被災地・避難所へエンジニアをボランティアで派 遣し、40 か所以上へ衛星および 3G ワイヤレス WAN 経由のインターネッ ト アクセス環境を展開しました。 また、4G LTE ワイヤレス WAN の最大の特徴は、無線通信の回線であ ることから、ネットワークの構築にケーブルの敷設が不要である点です。し かも、携帯電話の電波を使用することから、かなり広い範囲をカバーするこ とができます。これらの特徴から、4G LTE ワイヤレス WAN は移動拠点の メイン回線としても有用です。 たとえば、内装をホテルのロビーのように改造した車両を「移動営業所」と してさまざまな地域へ走らせ、顧客が株の売買や証券の電子化などを車内 でもできるように、どこに移動しても WAN 接続可能な環境を実現した証券 会社の事例があります。 また、シスコとサンフランシスコ交通局の共同開発で始まった「コネクテッ ド・バス(Connected Bus)」のように、乗客にインターネット接続を提供し つつ、車内のディスプレイで乗り継ぎ情報や周辺の観光情報のようにライブ 情報を提供するなど、これからの都市や公共交通機関で必要とされる先進 的な事例もあります。 物理的・時間的制約がある拠点や移動拠点のメイン WAN 回線として 4G LTE ソリューションの広がる利用シーン インターネット接続を提供 (移動ホット スポット) 車内ディスプレイで ライブ情報を提供 交通局に GPS 情報を送信 車載カメラのリモート制御 バス停に設置された デジタル サイネージと連携 利用シーン詳細:「コネクテッド・バス(Connected Bus)」 09 スイッチ ワイヤレス ルータ セキュリティ Meraki サービス L2/L3 スイッチ スイッチ Cisco スモール ビジネス & Catalyst スイッチ ラインアップ コア Catalyst 6500/6800 Catalyst 4500-X コア / アクセス Catalyst 4500E Catalyst 3650 Catalyst 3850 アクセス Catalyst 2960-Plus Catalyst 2960-X アクセス / デスクトップ Catalyst 2960-CX Catalyst 3560-CX デスクトップ スモール ビジネス Catalyst 2960-L パフォーマンス & スケーラビリティ → 高 Cisco スモール ビジネス スイッチ ユーザ数が 100 名以下の小規模ネットワークに適したスイッチです。 スモール ビジネスに必要十分な性能と機能をリーズナブルな価格で提供します。 くわしくは、15 ページを ご覧ください。 Cisco Catalyst 2960-L シリーズ アクセス レイヤでの配置に適した L2 固定構成型スイッチです。 ダウンリンクの全ポートで GE をサポートします。 くわしくは、16 ページを ご覧ください。 Cisco Catalyst 2960-Plus シリーズ アクセス レイヤでの配置に適した L2 固定構成型スイッチです。 ダウンリンクの全ポートで FE をサポートします。 くわしくは、16 ページを ご覧ください。 Cisco Catalyst 2960-CX シリーズ アクセス レイヤでの配置に適した L2 コンパクト スイッチです。 ワイヤリング クローゼット外でも基本的なネットワーク サービスを提供します。 くわしくは、17 ページを ご覧ください。 Cisco Catalyst 3560-CX シリーズ アクセス レイヤでの配置に適した L3 コンパクト スイッチです。 ワイヤリング クローゼット外でも高度なネットワーク サービスを提供します。 くわしくは、17 ページを ご覧ください。 Cisco Catalyst 2960-X シリーズ アクセス レイヤでの配置に適した L2/L3 固定構成型スイッチです。 ダウンリンクの全ポートで GE、スタック機能もサポートします。 くわしくは、19 ページを ご覧ください。 Cisco Catalyst 3650 シリーズ アクセスまたはコア レイヤでの配置に適した L2/L3 固定構成型スイッチです。 有線/無線 LAN の統合プラットフォームとして、ワイヤレス コントローラ機能も提供します。 くわしくは、20 ページを ご覧ください。 Cisco Catalyst 3850 シリーズ アクセスまたはコア レイヤでの配置に適した次世代 L2/L3 固定構成型スイッチです。 有線/無線 LAN の統合プラットフォームとして、ワイヤレス コントローラ機能も提供します。 くわしくは、22 ページを ご覧ください。 Cisco Catalyst 4500E シリーズ アクセスまたはコア レイヤでの配置に適した L2/L3 モジュラ型スイッチです。 優れたコスト パフォーマンスで長期間にわたって投資を保護します。 くわしくは、24 ページを ご覧ください。 Cisco Catalyst 4500-X シリーズ コア レイヤでの配置に適した L3 固定構成型スイッチです。 スペースに制約がある環境でも優れた拡張性とパフォーマンスを提供します。 くわしくは、25 ページを ご覧ください。 Cisco Catalyst 6500 シリーズ コア レイヤでの導入に適した L3 モジュラ型スイッチです。 業界トップレベルのパフォーマンスで豊富なネットワーク サービスも提供します。 くわしくは、26 ページを ご覧ください。 Cisco Catalyst 6800 シリーズ コア レイヤでの配置に適した L3 固定構成型/モジュラ型スイッチです。 10/40/100 ギガビット イーサネットに最適化されたネットワーク サービスを提供します。 くわしくは、27 ページを ご覧ください。 10 スイッチ mGig mGig mGig mGig ※1 LAN Lite モデルはスタック非対応。 ※2 WS-C2960X-24PSQ-L は非対応。 ※3 コンパクト スイッチは 8 ポートで 15.4 W フル給電。 ※4 コンパクト スイッチは 8 または 12 ポートで 15.4 W フル給電。 Cisco Catalyst 2960-L/2960-Plus/2960-CX/2960-X シリーズ ■ シリーズ番号 ■ モデルの種類 CX がある場合 :コンパクト モデル + がある場合 :FE モデル X がある場合 :スタック対応 GE モデル※1 ※2 XR がある場合 :電源二重化/スタック対応 GE モデル ■ ポート数 8/16/24/48 の 4 パターン ■ ダウンリンク ポート T の場合 :データ専用ポート L の場合 :PoE 給電対応ポート(8 ポートで 15.4 W フル給電) P の場合 :PoE 給電対応ポート(24 ポートで 15.4 W フル給電)※3 LP の場合 :PoE 給電対応ポート(24 ポートで 15.4 W フル給電) FP の場合 :PoE 給電対応ポート(48 ポートで 15.4 W フル給電) ■ アップリンク ポート Q がある場合 :GE ポート T がある場合 :GE ポート C がある場合 :GE/SFP ポート S がある場合 :SFP モジュール スロット D がある場合 :SFP/SFP+ モジュール スロット ■ Cisco IOS S または LL の場合:LAN Lite L の場合 :LAN Base I の場合 :IP Lite Cisco Catalyst 3560-CX/3650/3850 シリーズ WS-C 2960 X-24 T S-L ■ シリーズ番号 ■ ポート数 8/12/24/48 の 4 パターン ■ ダウンリンク ポート T の場合 :データ専用ポート P の場合 :PoE 給電対応ポート(24 ポートで 15.4 W フル給電)※4 PF/F/PW の場合:PoE 給電対応ポート(48 ポートで 15.4 W フル給電) U の場合 :UPOE 給電対応ポート S の場合 :SFP モジュール スロット X の場合 :mGig ポートまたは SFP/SFP+ モジュール スロット ■ Cisco IOS L の場合 :LAN Base S の場合 :IP Base E の場合 :IP Services WS-C - - 3850 24 XU S Cisco Catalyst 4500-X シリーズ(ネットワーク モジュールなし) ■ 冷却用ファン 何もない場合 :前面吸気/背面排気 F がある場合 :背面吸気/前面排気 16/32 の 2 パターン ■ ポート数 16/32 の 2 パターン Cisco Catalyst 4500-X シリーズ(ネットワーク モジュールあり) WS-C 4500 X-F -16 SFP+ ■ ポート数 ■ Cisco IOS IPB の場合 :IP Base ES の場合 :Enterprise Services WS-C 4500 X- - 24 X ES Cisco Catalyst 4500E シリーズ(シャーシ) ■ スロット数 3/6/7/10 の 4 パターン 46 の場合 :24 Gbps 47 の場合 :48 Gbps Cisco Catalyst 4500E シリーズ(ライン カード) WS-C 4507 R+E ■ スロットあたりの帯域幅 ■ ポートのインターフェイス RJ45 の場合 :GE ポート RJ45V+ の場合 :PoE+ 給電対応 GE ポート U または UPOE の場合 :UPOE 給電対応 GE ポート X の場合 :mGig ポート SFP の場合 :SFP モジュール スロット X2 の場合 :X2 モジュール スロット SFP+ の場合 :SFP/SFP+ モジュール スロット WS-X 4748 - - RJ45 E ■ スーパバイザ エンジン冗長化 何もない場合 :非対応 R がある場合 :対応 ■ シャーシ タイプ 何もない場合 :横型スロット V がある場合 :縦型スロット Cisco Catalyst 6500 シリーズ(シャーシ) ■ スロット数 3/4/6/9/13 の 5 パターン 4/8/16/24/32/48 の 6 パターン Cisco Catalyst 6500/6800 シリーズ(ライン カード) WS-C 6509 V-- E ■ ポート数 ■ ポートのインターフェイス TX の場合 :GE ポート SFP の場合 :SFP モジュール スロット 10T の場合 :10GBASE-T ポート 10G の場合 :X2 モジュール スロットまたは SFP/SFP+ モジュール スロット 40G の場合 :CFP モジュール スロット WS-X 6904- - 40 G 2T Cisco Catalyst 2960-L/2960-Plus/2960-CX/2960-X シリーズ ■ シリーズ番号 ■ モデルの種類 CX がある場合 :コンパクト モデル + がある場合 :FE モデル X がある場合 :スタック対応 GE モデル※1 ※2 XR がある場合 :電源二重化/スタック対応 GE モデル ■ ポート数 8/16/24/48 の 4 パターン ■ ダウンリンク ポート T の場合 :データ専用ポート L の場合 :PoE 給電対応ポート(8 ポートで 15.4 W フル給電) P の場合 :PoE 給電対応ポート(24 ポートで 15.4 W フル給電)※3 LP の場合 :PoE 給電対応ポート(24 ポートで 15.4 W フル給電) FP の場合 :PoE 給電対応ポート(48 ポートで 15.4 W フル給電) ■ アップリンク ポート Q がある場合 :GE ポート T がある場合 :GE ポート C がある場合 :GE/SFP ポート S がある場合 :SFP モジュール スロット D がある場合 :SFP/SFP+ モジュール スロット ■ Cisco IOS S または LL の場合:LAN Lite L の場合 :LAN Base I の場合 :IP Lite Cisco Catalyst 3560-CX/3650/3850 シリーズ WS-C 2960 X-24 T S-L ■ シリーズ番号 ■ ポート数 8/12/24/48 の 4 パターン ■ ダウンリンク ポート T の場合 :データ専用ポート P の場合 :PoE 給電対応ポート(24 ポートで 15.4 W フル給電)※4 PF/F/PW の場合:PoE 給電対応ポート(48 ポートで 15.4 W フル給電) U の場合 :UPOE 給電対応ポート S の場合 :SFP モジュール スロット X の場合 :mGig ポートまたは SFP/SFP+ モジュール スロット ■ Cisco IOS L の場合 :LAN Base S の場合 :IP Base E の場合 :IP Services WS-C - - 3850 24 XU S Cisco Catalyst 4500-X シリーズ(ネットワーク モジュールなし) ■ 冷却用ファン 何もない場合 :前面吸気/背面排気 F がある場合 :背面吸気/前面排気 16/32 の 2 パターン ■ ポート数 16/32 の 2 パターン Cisco Catalyst 4500-X シリーズ(ネットワーク モジュールあり) WS-C 4500 X-F -16 SFP+ ■ ポート数 ■ Cisco IOS IPB の場合 :IP Base ES の場合 :Enterprise Services WS-C 4500 X- - 24 X ES Cisco Catalyst 4500E シリーズ(シャーシ) ■ スロット数 3/6/7/10 の 4 パターン 46 の場合 :24 Gbps 47 の場合 :48 Gbps Cisco Catalyst 4500E シリーズ(ライン カード) WS-C 4507 R+E ■ スロットあたりの帯域幅 ■ ポートのインターフェイス RJ45 の場合 :GE ポート RJ45V+ の場合 :PoE+ 給電対応 GE ポート U または UPOE の場合 :UPOE 給電対応 GE ポート X の場合 :mGig ポート SFP の場合 :SFP モジュール スロット X2 の場合 :X2 モジュール スロット SFP+ の場合 :SFP/SFP+ モジュール スロット WS-X 4748 - - RJ45 E ■ スーパバイザ エンジン冗長化 何もない場合 :非対応 R がある場合 :対応 ■ シャーシ タイプ 何もない場合 :横型スロット V がある場合 :縦型スロット Cisco Catalyst 6500 シリーズ(シャーシ) ■ スロット数 3/4/6/9/13 の 5 パターン 4/8/16/24/32/48 の 6 パターン Cisco Catalyst 6500/6800 シリーズ(ライン カード) WS-C 6509 V-- E ■ ポート数 ■ ポートのインターフェイス TX の場合 :GE ポート SFP の場合 :SFP モジュール スロット 10T の場合 :10GBASE-T ポート 10G の場合 :X2 モジュール スロットまたは SFP/SFP+ モジュール スロット 40G の場合 :CFP モジュール スロット WS-X 6904- - 40 G 2T Cisco Catalyst 2960-L/2960-Plus/2960-CX/2960-X シリーズ ■ シリーズ番号 ■ モデルの種類 CX がある場合 :コンパクト モデル + がある場合 :FE モデル X がある場合 :スタック対応 GE モデル※1 ※2 XR がある場合 :電源二重化/スタック対応 GE モデル ■ ポート数 8/16/24/48 の 4 パターン ■ ダウンリンク ポート T の場合 :データ専用ポート L の場合 :PoE 給電対応ポート(8 ポートで 15.4 W フル給電) P の場合 :PoE 給電対応ポート(24 ポートで 15.4 W フル給電)※3 LP の場合 :PoE 給電対応ポート(24 ポートで 15.4 W フル給電) FP の場合 :PoE 給電対応ポート(48 ポートで 15.4 W フル給電) ■ アップリンク ポート Q がある場合 :GE ポート T がある場合 :GE ポート C がある場合 :GE/SFP ポート S がある場合 :SFP モジュール スロット D がある場合 :SFP/SFP+ モジュール スロット ■ Cisco IOS S または LL の場合:LAN Lite L の場合 :LAN Base I の場合 :IP Lite Cisco Catalyst 3560-CX/3650/3850 シリーズ WS-C 2960 X-24 T S-L ■ シリーズ番号 ■ ポート数 8/12/24/48 の 4 パターン ■ ダウンリンク ポート T の場合 :データ専用ポート P の場合 :PoE 給電対応ポート(24 ポートで 15.4 W フル給電)※4 PF/F/PW の場合:PoE 給電対応ポート(48 ポートで 15.4 W フル給電) U の場合 :UPOE 給電対応ポート S の場合 :SFP モジュール スロット X の場合 :mGig ポートまたは SFP/SFP+ モジュール スロット ■ Cisco IOS L の場合 :LAN Base S の場合 :IP Base E の場合 :IP Services WS-C - - 3850 24 XU S Cisco Catalyst 4500-X シリーズ(ネットワーク モジュールなし) ■ 冷却用ファン 何もない場合 :前面吸気/背面排気 F がある場合 :背面吸気/前面排気 16/32 の 2 パターン ■ ポート数 16/32 の 2 パターン Cisco Catalyst 4500-X シリーズ(ネットワーク モジュールあり) WS-C 4500 X-F -16 SFP+ ■ ポート数 ■ Cisco IOS IPB の場合 :IP Base ES の場合 :Enterprise Services WS-C 4500 X- - 24 X ES Cisco Catalyst 4500E シリーズ(シャーシ) ■ スロット数 3/6/7/10 の 4 パターン 46 の場合 :24 Gbps 47 の場合 :48 Gbps Cisco Catalyst 4500E シリーズ(ライン カード) WS-C 4507 R+E ■ スロットあたりの帯域幅 ■ ポートのインターフェイス RJ45 の場合 :GE ポート RJ45V+ の場合 :PoE+ 給電対応 GE ポート U または UPOE の場合 :UPOE 給電対応 GE ポート X の場合 :mGig ポート SFP の場合 :SFP モジュール スロット X2 の場合 :X2 モジュール スロット SFP+ の場合 :SFP/SFP+ モジュール スロット WS-X 4748 - - RJ45 E ■ スーパバイザ エンジン冗長化 何もない場合 :非対応 R がある場合 :対応 ■ シャーシ タイプ 何もない場合 :横型スロット V がある場合 :縦型スロット Cisco Catalyst 6500 シリーズ(シャーシ) ■ スロット数 3/4/6/9/13 の 5 パターン 4/8/16/24/32/48 の 6 パターン Cisco Catalyst 6500/6800 シリーズ(ライン カード) WS-C 6509 V-- E ■ ポート数 ■ ポートのインターフェイス TX の場合 :GE ポート SFP の場合 :SFP モジュール スロット 10T の場合 :10GBASE-T ポート 10G の場合 :X2 モジュール スロットまたは SFP/SFP+ モジュール スロット 40G の場合 :CFP モジュール スロット WS-X 6904- - 40 G 2T Cisco Catalyst 2960-L/2960-Plus/2960-CX/2960-X シリーズ ■ シリーズ番号 ■ モデルの種類 CX がある場合 :コンパクト モデル + がある場合 :FE モデル X がある場合 :スタック対応 GE モデル※1 ※2 XR がある場合 :電源二重化/スタック対応 GE モデル ■ ポート数 8/16/24/48 の 4 パターン ■ ダウンリンク ポート T の場合 :データ専用ポート L の場合 :PoE 給電対応ポート(8 ポートで 15.4 W フル給電) P の場合 :PoE 給電対応ポート(24 ポートで 15.4 W フル給電)※3 LP の場合 :PoE 給電対応ポート(24 ポートで 15.4 W フル給電) FP の場合 :PoE 給電対応ポート(48 ポートで 15.4 W フル給電) ■ アップリンク ポート Q がある場合 :GE ポート T がある場合 :GE ポート C がある場合 :GE/SFP ポート S がある場合 :SFP モジュール スロット D がある場合 :SFP/SFP+ モジュール スロット ■ Cisco IOS S または LL の場合:LAN Lite L の場合 :LAN Base I の場合 :IP Lite Cisco Catalyst 3560-CX/3650/3850 シリーズ WS-C 2960 X-24 T S-L ■ シリーズ番号 ■ ポート数 8/12/24/48 の 4 パターン ■ ダウンリンク ポート T の場合 :データ専用ポート P の場合 :PoE 給電対応ポート(24 ポートで 15.4 W フル給電)※4 PF/F/PW の場合:PoE 給電対応ポート(48 ポートで 15.4 W フル給電) U の場合 :UPOE 給電対応ポート S の場合 :SFP モジュール スロット X の場合 :mGig ポートまたは SFP/SFP+ モジュール スロット ■ Cisco IOS L の場合 :LAN Base S の場合 :IP Base E の場合 :IP Services WS-C - - 3850 24 XU S Cisco Catalyst 4500-X シリーズ(ネットワーク モジュールなし) ■ 冷却用ファン 何もない場合 :前面吸気/背面排気 F がある場合 :背面吸気/前面排気 16/32 の 2 パターン ■ ポート数 16/32 の 2 パターン Cisco Catalyst 4500-X シリーズ(ネットワーク モジュールあり) WS-C 4500 X-F -16 SFP+ ■ ポート数 ■ Cisco IOS IPB の場合 :IP Base ES の場合 :Enterprise Services WS-C 4500 X- - 24 X ES Cisco Catalyst 4500E シリーズ(シャーシ) ■ スロット数 3/6/7/10 の 4 パターン 46 の場合 :24 Gbps 47 の場合 :48 Gbps Cisco Catalyst 4500E シリーズ(ライン カード) WS-C 4507 R+E ■ スロットあたりの帯域幅 ■ ポートのインターフェイス RJ45 の場合 :GE ポート RJ45V+ の場合 :PoE+ 給電対応 GE ポート U または UPOE の場合 :UPOE 給電対応 GE ポート X の場合 :mGig ポート SFP の場合 :SFP モジュール スロット X2 の場合 :X2 モジュール スロット SFP+ の場合 :SFP/SFP+ モジュール スロット WS-X 4748 - - RJ45 E ■ スーパバイザ エンジン冗長化 何もない場合 :非対応 R がある場合 :対応 ■ シャーシ タイプ 何もない場合 :横型スロット V がある場合 :縦型スロット Cisco Catalyst 6500 シリーズ(シャーシ) ■ スロット数 3/4/6/9/13 の 5 パターン 4/8/16/24/32/48 の 6 パターン Cisco Catalyst 6500/6800 シリーズ(ライン カード) WS-C 6509 V-- E ■ ポート数 ■ ポートのインターフェイス TX の場合 :GE ポート SFP の場合 :SFP モジュール スロット 10T の場合 :10GBASE-T ポート 10G の場合 :X2 モジュール スロットまたは SFP/SFP+ モジュール スロット 40G の場合 :CFP モジュール スロット WS-X 6904- - 40 G 2T Cisco Catalyst スイッチ製品型番の見方 Cisco Catalyst スイッチ製品型番は、その製品の大まかなスペックが把握できるようになっています。 11 ワイヤレス ルータ セキュリティ Meraki サービス スイッチ 新規スイッチ購入の意思決定ツリー 1. スイッチの目的は 何ですか ? 2. スイッチをどこに 展開しますか ? 3. 有線 / 無線 LAN の 統合アクセスは 必要ですか ? 4. 通信速度の ニーズは何ですか ? 5. どのようなタイプの スイッチが よいですか ? 6. どのような機能が 必要ですか ? アクセス ワイヤリング クローゼット外 高度な機能 Catalyst 3560-CX 基本的な機能 Catalyst 2960-CX いいえ ファスト イーサネット Catalyst 2960-Plus ギガビット イーサネット モジュラ 基本的な機能 Catalyst 4500E (SUP8L-E) 高度な機能 Catalyst 4500E (SUP8-E) スタッカブル 高度な機能 Catalyst 3850 基本的な機能 Catalyst 2960-X ブランチ はい いいえ ファスト イーサネット Catalyst 2960-Plus スタッカブル ギガビット イーサネット 高度な機能 Catalyst 3850 モジュラ Catalyst 4500E (SUP8-E) スタッカブル 高度な機能 Catalyst 3650 基本的な機能 Catalyst 2960-X モジュラ 基本的な機能 Catalyst 4500E (SUP8L-E) 高度な機能 Catalyst 4500E (SUP8-E) 基本的な機能 Catalyst 3650 1. スイッチの目的は 何ですか ? 3. 通信速度の ニーズは何ですか ? 2. どのシスコ スイッチを アップグレードしますか ? 4. どのようなタイプの スイッチが よいですか ? 5. どのような機能が 必要ですか ? 高度な機能を備えた スイッチのメリット Catalyst 4500E (SUP7/8L-E なし ) Catalyst 4500 (E なし ) アクセス Catalyst 3560-CX 高度な機能 Catalyst 2960-CX 基本的な機能 Catalyst 3750 Catalyst 3560 Catalyst 2960-S Catalyst 2960 Catalyst 3560 ( コンパクト) Catalyst 2960 ( コンパクト) 基本的な機能 Catalyst 4500E (SUP8L-E) 高度な機能 Catalyst 4500E (SUP8-E) Catalyst 3850 高度な機能 Catalyst 3650 高度な機能 Catalyst 2960-X 基本的な機能 Catalyst 3650 基本的な機能 新しい スイッチを購入 古い スイッチを更新 ・ 内蔵の ワイヤレス コントローラ ・ 1.7 倍の スイッチング容量 ・ 2 倍のアップリンク ・ 内蔵の ワイヤレス コントローラ ・ 1.7 倍の スイッチング容量 ・ 2 倍のアップリンク ・ 3 倍の スタッキング帯域幅 ・ モジュラ アップリンク ・ Cisco StackPower ・ mGig オプション ・ 内蔵の ワイヤレス コントローラ ・ 2 倍の スタッキング帯域幅 ・ セキュリティ センサー ・ 内蔵の ワイヤレス コントローラ ・ 6 倍の スタッキング帯域幅 ・ セキュリティ センサー ・ 10 G アップリンク ・ PoE+ パススルー ・ mGig オプション バックボーン 高密度 (1/10/40 Gbps) モジュラ 高度な機能 Catalyst 6807-XL 基本的な機能 Catalyst 6500-E (SUP2T) スタンドアロン 高度な機能 Catalyst 6880-X Catalyst 6840-X 基本的な機能 Catalyst 4500-X 低密度 (1/10 Gbps) モジュラ 基本的な機能 Catalyst 4500E (SUP8-E) 高度な機能 Catalyst 6500-E (SUP2T) スタンドアロン 高度な機能 Catalyst 4500-X はい モジュラ Catalyst 4500E (SUP8-E) スタッカブル 基本的な機能 Catalyst 3650 高度な機能 Catalyst 3850 基本的な機能 Catalyst 3850 ( ファイバ ) バックボーン 高密度 (1/10/40 Gbps) Catalyst 6807-XL 高度な機能 基本的な機能 Catalyst 6500-E (SUP2T) スタンドアロン 高度な機能 Catalyst 6880-X Catalyst 6840-X Catalyst 4500-X 基本的な機能 低密度 (1/10 Gbps) モジュラ 基本的な機能 Catalyst 4500E (SUP8-E) 高度な機能 Catalyst 6500-E (SUP2T) Catalyst 6500-E (SUP2T なし ) Catalyst 4500E (SUP7/8L-E なし ) Catalyst 6500 (E なし ) Catalyst 4500 (E なし ) スタンドアロン Catalyst 4500-X 高度な機能 モジュラ Catalyst 3750 基本的な機能 Catalyst 3850 (Fiber) ・ スロットあたり 最大 880 Gbps ・ 11.4 Tbps スイッチング ・ 最大 80 個の 10 Gbps ポート または 最大 20 個の 40 Gbps ポート ・ Multiprotocol Label Switching ・ Easy Virtual Network ・ サービス モジュール ・ Virtual Switching System ・ 3 倍の スタッキング帯域幅 ・ モジュラ アップリンク ・ Cisco StackPower ・ mGig オプション キャンパス 12 スイッチ スイッチ更新の意思決定ツリー 1. スイッチの目的は 何ですか ? 2. スイッチをどこに 展開しますか ? 3. 有線 / 無線 LAN の 統合アクセスは 必要ですか ? 4. 通信速度の ニーズは何ですか ? 5. どのようなタイプの スイッチが よいですか ? 6. どのような機能が 必要ですか ? アクセス ワイヤリング クローゼット外 高度な機能 Catalyst 3560-CX 基本的な機能 Catalyst 2960-CX いいえ ファスト イーサネット Catalyst 2960-Plus ギガビット イーサネット モジュラ 基本的な機能 Catalyst 4500E (SUP8L-E) 高度な機能 Catalyst 4500E (SUP8-E) スタッカブル 高度な機能 Catalyst 3850 基本的な機能 Catalyst 2960-X ブランチ はい いいえ ファスト イーサネット Catalyst 2960-Plus スタッカブル ギガビット イーサネット 高度な機能 Catalyst 3850 モジュラ Catalyst 4500E (SUP8-E) スタッカブル 高度な機能 Catalyst 3650 基本的な機能 Catalyst 2960-X モジュラ 基本的な機能 Catalyst 4500E (SUP8L-E) 高度な機能 Catalyst 4500E (SUP8-E) 基本的な機能 Catalyst 3650 1. スイッチの目的は 何ですか ? 3. 通信速度の ニーズは何ですか ? 2. どのシスコ スイッチを アップグレードしますか ? 4. どのようなタイプの スイッチが よいですか ? 5. どのような機能が 必要ですか ? 高度な機能を備えた スイッチのメリット Catalyst 4500E (SUP7/8L-E なし ) Catalyst 4500 (E なし ) アクセス Catalyst 3560-CX 高度な機能 Catalyst 2960-CX 基本的な機能 Catalyst 3750 Catalyst 3560 Catalyst 2960-S Catalyst 2960 Catalyst 3560 ( コンパクト) Catalyst 2960 ( コンパクト) 基本的な機能 Catalyst 4500E (SUP8L-E) 高度な機能 Catalyst 4500E (SUP8-E) Catalyst 3850 高度な機能 Catalyst 3650 高度な機能 Catalyst 2960-X 基本的な機能 Catalyst 3650 基本的な機能 新しい スイッチを購入 古い スイッチを更新 ・ 内蔵の ワイヤレス コントローラ ・ 1.7 倍の スイッチング容量 ・ 2 倍のアップリンク ・ 内蔵の ワイヤレス コントローラ ・ 1.7 倍の スイッチング容量 ・ 2 倍のアップリンク ・ 3 倍の スタッキング帯域幅 ・ モジュラ アップリンク ・ Cisco StackPower ・ mGig オプション ・ 内蔵の ワイヤレス コントローラ ・ 2 倍の スタッキング帯域幅 ・ セキュリティ センサー ・ 内蔵の ワイヤレス コントローラ ・ 6 倍の スタッキング帯域幅 ・ セキュリティ センサー ・ 10 G アップリンク ・ PoE+ パススルー ・ mGig オプション バックボーン 高密度 (1/10/40 Gbps) モジュラ 高度な機能 Catalyst 6807-XL 基本的な機能 Catalyst 6500-E (SUP2T) スタンドアロン 高度な機能 Catalyst 6880-X Catalyst 6840-X 基本的な機能 Catalyst 4500-X 低密度 (1/10 Gbps) モジュラ 基本的な機能 Catalyst 4500E (SUP8-E) 高度な機能 Catalyst 6500-E (SUP2T) スタンドアロン 高度な機能 Catalyst 4500-X はい モジュラ Catalyst 4500E (SUP8-E) スタッカブル 基本的な機能 Catalyst 3650 高度な機能 Catalyst 3850 基本的な機能 Catalyst 3850 ( ファイバ ) バックボーン 高密度 (1/10/40 Gbps) Catalyst 6807-XL 高度な機能 基本的な機能 Catalyst 6500-E (SUP2T) スタンドアロン 高度な機能 Catalyst 6880-X Catalyst 6840-X Catalyst 4500-X 基本的な機能 低密度 (1/10 Gbps) モジュラ 基本的な機能 Catalyst 4500E (SUP8-E) 高度な機能 Catalyst 6500-E (SUP2T) Catalyst 6500-E (SUP2T なし ) Catalyst 4500E (SUP7/8L-E なし ) Catalyst 6500 (E なし ) Catalyst 4500 (E なし ) スタンドアロン Catalyst 4500-X 高度な機能 モジュラ Catalyst 3750 基本的な機能 Catalyst 3850 (Fiber) ・ スロットあたり 最大 880 Gbps ・ 11.4 Tbps スイッチング ・ 最大 80 個の 10 Gbps ポート または 最大 20 個の 40 Gbps ポート ・ Multiprotocol Label Switching ・ Easy Virtual Network ・ サービス モジュール ・ Virtual Switching System ・ 3 倍の スタッキング帯域幅 ・ モジュラ アップリンク ・ Cisco StackPower ・ mGig オプション キャンパス 13 ワイヤレス ルータ セキュリティ Meraki サービス スイッチ Cisco Catalyst スイッチの Cisco IOS Cisco Catalyst スイッチは、高機能ネットワーク インフラストラクチャ ソフトウェアで ある Cisco IOS(Internetwork Operating System)を搭載しています。LAN Lite および LAN Base が L2 レベルの機能を提供する機能セット、IP Lite、IP Base、IP Services、Advanced IP Services、Enterprise Services、およ び Advanced Enterprise Services が L3 レベルの機能を提供する機能セットです。 Cisco Catalyst 3560-CX/3650/3850/4500-X/4500E シリーズとともに提供 される Cisco IOS は、単一のユニバーサル イメージで提供されます。ユニバーサ ル イメージには、ソフトウェア ライセンスで有効化できる Cisco IOS テクノロジー セットがすべて含まれています。これまでの Cisco Catalyst スイッチでは、新しい 機能を利用するためにソフトウェア イメージをインストールする必要がありましたが、 Cisco Catalyst 3560-CX/3650/3850/4500-X/4500E シリーズでは Cisco IOS アップグレード ライセンスによって、高度な機能をすぐに有効化できます。 IP Services IP Base LAN Base ユニバーサル イメージ L3 L2+ ■ ライセンスで機能を有効化(Catalyst 3650/3850 シリーズの場合) ※1 Cisco Catalyst 2960-L シリーズのみ対応。 ※2 Cisco Catalyst 2960-XR シリーズのみ対応。 ※3 Cisco Catalyst 3650/3850 シリーズは、将来のソフトウェア リリースで対応予定。 ※4 Cisco Catalyst 2960-CX/2960-X シリーズは非対応。 ※5 Cisco Catalyst 3560-CX シリーズは非対応。 ※6 Cisco Catalyst 3650/3850 シリーズは非対応。 ※7 Cisco Catalyst 3560/3850 シリーズのみ対応。 ※8 Cisco Catalyst 4500E シリーズのみ対応。 ■ シリーズ別対応比較(Cisco Catalyst 2960-CX/3560-CX/2960-Plus/2960-X/3650/3850/4500-X/4500E シリーズ) シリーズ名 LAN Lite (LL) LAN Base (LB) IP Lite (IPL) IP Base (IPB) IP Servises (IPS) Enterprise Servises (ES) Catalyst 2960-CX - ● - - - - Catalyst 3560-CX - - - ● ● - Catalyst 2960-Plus ● ● - - - - Catalyst 2960-X ● ● ●※1 - - - Catalyst 3650 - ● - ● ● - Catalyst 3850 - ● - ● ● - Catalyst 4500-X - - - ● - ● Catalyst 4500E - ● - ● - ● ■ Cisco IOS 仕様比較(L2 機能) ■ Cisco IOS 仕様比較(L3 機能) 主な機能 LL LB IPL IPB IPS ES 主な機能 LL LB IPL IPB IPS ES IEEE 802.1q トランキング ● ● ● ● ● ● スタティック ルーティング - ● ● ● ● ● DTP ● ● ● ● ● ● RIP - - ● ● ● ● UDLD ● ● ● ● ● ● EIGRP Stub - - ● ● ● ● VTP ● ● ● ● ● ● EIGRP - - - - ● ● CDP ● ● ● ● ● ● ルーテッド アクセス用の OSPF - - ● ● ● ● LLDP ● ● ● ● ● ● OSPF v2/v3 - - - - ● ● LLDP-MED ●※1 ● ● ● ● ● BGP - - - - ● ● STP(スパニング ツリー プロトコル) ● ● ● ● ● ● IS-IS - - - - ● ● Flex Link - ● ● ● ● ● ポリシーベース ルーティング(PBR) - - ● ● ● ● EtherChannel ● ● ● ● ● ● VRF-Lite - - - - ● ● LACP ● ● ● ● ● ● PIM Stun - - ● ● ● ● リンクステート トラッキング ●※1 ● ● ● ● ● PIM - - - - ● ● Resilient Ethernet Protocol(REP) - - - ●※3 ●※3 ● WCCP - - ● ● ● ● ポート単位のストーム制御 ● ● ● ● ● ● SSO - ●※4 - ●※5 ●※5 ● NSF - - - ● ● ● ■ Cisco IOS 仕様比較(管理性) ■ Cisco IOS 仕様比較(セキュリティ) 主な機能 LL LB IPL IPB IPS ES 主な機能 LL LB IPL IPB IPS ES SNMP ● ● ● ● ● ● SSH ● ● ● ● ● ● RMON ● ● ● ● ● ● SSL ● ● ● ● ● ● SPAN ● ● ● ● ● ● SCP ● ● ● ● ● ● RSPAN ●※1 ● ● ● ● ● HTTPS ● ● ● ● ● ● TDR ● ● ● ● ● ● TACACS+ ● ● ● ● ● ● スマート ポート ● ● ● ● ● ● RADIUS ● ● ● ● ● ● Smart Install(クライアント) ● ● ● ● ● ● ポート セキュリティ ● ● ● ● ● ● Smart Install(ディレクタ) - ●※4 - ● ● ● DHCP スヌーピング ●※1 ● ● ● ● ● Cisco IOS IP SLA(レスポンダ) - ● ● ● ● ● ダイナミック ARP 検査(DAI) ●※1 ● ● ● ● ● Cisco IOS IP SLA(イニシエータ) - - - ● ● ● IP ソース ガード - ● ● ● ● ● Cisco IOS EEM - - - ● ● ● 音声用の MAC 認証バイパス ● ● ● ● ● ● Wireshark - - - ●※5 ●※5 ● プライベート VLAN エッジ ● ● ● ● ● ● Netflow-Lite - ● ● ● ● - プライベート VLAN - - ● ● ● ● Flexible NetFlow - - - ● ● ● L2-4 の ACL - ● ● ● ● ● EnergyWise ● ● ● ● ● ● ルータ ACL - ●※6 ● ● ● ● GOLD(GOLD-Lite) ● ● ● ● ● ● VLAN ACL ●※1 - ● ● ● ● OBFL ● ● ● ● ● ● Time Range ACL - ● ● ● ● ● Web 認証 ●※1 ● ● ● ● ● ■ Cisco IOS 仕様比較(QoS) TrustSec SXP - ● ● ● ● ● 主な機能 LL LB IPL IPB IPS ES TrustSec SGT/SGACL - ●※6 ● ● ● ● SRR ● ● ● ● ● ● MACsec - -   ● ● ● 優先キュー ● ● ● ● ● ● NEAT - ● ● ● ● ● Auto QoS ●※1 ● ● ● ● ● DSCP ●※1 ● ● ● ● ● 重み付けテール ドロップ(WTD) ●※1 ●※7 - ●※7 ● - ダイナミック バッファ制限(DBL) - ●※8 - ●※8 - ●※8 コントロール プレーン ポリシング(CoPP) - ●※4 - ●※5 ●※5 ● VLAN 単位のポリシー - - ● ● ● ● 14 スイッチ ■ Cisco 200 シリーズ スマートスイッチ モデル名 SKU ポート PoE 電源 ファン レス スタック ラック FE GE SFP マウント GE/ SFP 10 GB-T SFP+ 10GB-T /SFP+ ポート 60 W ポート 電力 IEEE 802.3 受電 ポート パス スルー SF200-24 SLM224GT-JP 24 - - 2 - - - - - - - - - 内部 ● - 1 RU SG200-08 SLM2008T-JP - 8 - - - - - - - - - 1 - 外部 ● - - SG200-26 SLM2024T-JP - 24 - 2 - - - - - - - - - 内部 ● - 1 RU ■ Cisco 300 シリーズ マネージド スイッチ モデル名 SKU ポート PoE 電源 ファン レス スタック ラック FE GE SFP GE/ マウント SFP 10 GB-T SFP+ 10GB-T /SFP+ ポート 60 W ポート 電力 IEEE 802.3 受電 ポート パス スルー SF300-08 SRW208-K9-JP 8 - - - - - - - - - - - - 外部 ● - 1 RU SF302-08 SRW208G-K9-JP 8 - - 2 - - - - - - - - - 外部 ● - 1 RU SF302-08PP SF302-08PP-K9-JP 8 - - 2 - - - 8 - 62 W af/at - - 外部 ● - 1 RU SF300-24 SRW224G4-K9-JP 24 2 - 2 - - - - - - - - - 内部 ● - 1 RU SF300-24PP SF300-24PP-K9-JP 24 2 - 2 - - - 24 - 180 W af/at - - 内部 - - 1 RU SG300-10 SRW2008-K9-JP - 8 - 2 - - - - - - - - - 外部 ● - 1 RU SG300-10PP SG300-10PP-K9-JP - 8 - 2 - - - 8 - 62 W af/at - - 外部 ● - 1 RU SG300-10MPP SG300-10MPP-K9-JP - 8 - 2 - - - 8 - 124 W af/at - - 外部 ● - 1 RU SG300-20 SRW2016-K9-JP - 18 - 2 - - - - - - - - - 内部 ● - 1 RU SG300-28 SRW2024-K9-JP - 26 - 2 - - - - - - - - - 内部 ● - 1 RU SG300-28PP SG300-28PP-K9-JP - 26 - 2 - - - 24 - 180 W af/at - - 内部 - - 1 RU SG300-52 SRW2048-K9-JP - 50 - 2 - - - - - - - - - 内部 - - 1 RU ■ Cisco 350 シリーズ マネージド スイッチ モデル名 SKU ポート PoE 電源 ファン レス スタック ラック FE GE SFP GE/ マウント SFP 10 GB-T SFP+ 10GB-T /SFP+ ポート 60 W ポート 電力 IEEE 802.3 受電 ポート パス スルー SG350-10 SG350-10-K9-JP - 8 - 2 - - - - - - - 2 ● 外部 ● - 1 RU SG350-10P SG350-10P-K9-JP - 8 - 2 - - - 8 - 62 W af/at 2 ● 外部 ● - 1 RU SG350-10MP SG350-10MP-K9-JP - 8 - 2 - - - 8 - 124 W af/at 2 ● 外部 ● - 1 RU SG355-10P SG355-10P-K9-JP - 8 - 2 - - - 8 - 62 W af/at 2 ● 内部 ● - 1 RU SG350-28 SG350-28-K9-JP - 24 2 2 - - - - - - - - - 内部 ● - 1 RU SG350-28P SG350-28P-K9-JP - 24 2 2 - - - 24 4 195 W af/at - - 内部 - - 1 RU ■ Cisco 350X シリーズ スタッカブル マネージド スイッチ モデル名 SKU ポート PoE 電源 ファン レス スタック ラック FE GE SFP GE/ マウント SFP 10 GB-T SFP+ 10GB-T /SFP+ ポート 60 W ポート 電力 IEEE 802.3 受電 ポート パス スルー SG350XG-2F10 SG350XG-2F10-K9-JP - - - - 10 2 - - - - - - - 内部 - ● 1 RU SG350XG-24T SG350XG-24T-K9-JP - - - - 22 - 2 - - - - - - 内部 - ● 1 RU SG350XG-24F SG350XG-24F-K9-JP - - - - - 22 2 - - - - - - 内部 - ● 1 RU SG350XG-48T SG350XG-48T-K9-JP - - - - 46 - 2 - - - - - - 内部 - ● 1 RU ■ Cisco 550X シリーズ スタッカブル マネージド スイッチ モデル名 SKU ポート PoE 電源 ファン レス スタック ラック FE GE SFP GE/ マウント SFP 10 GB-T SFP+ 10GB-T /SFP+ ポート 60 W ポート 電力 IEEE 802.3 受電 ポート パス スルー SG550XG-8F8T SG550XG-8F8T-K9-JP - - - - 8 8 - - - - - - - 内部 - ● 1 RU SG550XG-24T SG550XG-24T-JP - - - - 22 - 2 - - - - - - 内部 - ● 1 RU SG550XG-24F SG550XG-24F-JP - - - - - 22 2 - - - - - - 内部 - ● 1 RU SG550XG-48T SG550XG-48T-K9-JP - - - - 46 - 2 - - - - - - 内部 - ● 1 RU ユーザ数が 100 名以下の小規模ネットワークに適したスイッチです。従来の企業向け製 品や一般消費者向け製品とは異なり、スモール ビジネスに必要十分な性能と機能をリーズ ナブルな価格で提供します。日本語に完全対応した使いやすい Web ブラウザベースの設 定ユーティリティによって、高度な機能も簡単に設定および管理できます。 ■ 主な特長 ● 設定不要のプラグ アンド プレイ対応(Cisco 110 シリーズ アンマネージド スイッチ) ● 10 ギガビット イーサネット対応ポート搭載(Cisco 350X/550X シリーズ スタッカブル マネージド スイッチ) ● PoE+ 給電対応ダウンリンク ポート搭載(PSE モデル、一部のモデルは 60 W 対応) ● PoE パススルー対応(Cisco 350 シリーズ マネージド スイッチの一部のモデル) ● 最大 4 台のスタック接続(Cisco 350X シリーズ スタッカブル マネージド スイッチ) ● 最大 8 台のスタック接続(Cisco 550X シリーズ スタッカブル マネージド スイッチ) Cisco スモール ビジネス スイッチ ■ Cisco 110 シリーズ アンマネージド スイッチ モデル名 SKU ポート PoE 電源 ファン レス スタック ラック FE GE SFP マウント GE/ SFP 10 GB-T SFP+ 10GB-T /SFP+ ポート 60 W ポート 電力 IEEE 802.3 受電 ポート パス スルー SF110D-08 SF110D-08-JP 8 - - - - - - - - - - - - 外部 ● - - SF110D-16 SF110D-16-JP 16 - - - - - - - - - - - - 外部 ● - - SG110D-08 SG110D-08-JP - 8 - - - - - - - - - - - 外部 ● - - SG110-16 SG110-16-JP - 16 - - - - - - - - - - - 内部 ● - 1 RU SG112-24 SG112-24-JP - 22 - 2 - - - - - - - - - 内部 ● - 1 RU 15 ワイヤレス ルータ セキュリティ Meraki サービス スイッチ ダウンリンクにギガビット イーサネット ポートを搭載した、L2 固定構成型スイッチです。ス リムかつスタイリッシュなシャーシとファンレス静音設計で、デスクトップなど、ワイヤリング クローゼットに限定されず必要な場所に、エンタープライズクラスのサービスを拡張できま す。従来のコマンドライン インターフェイスだけでなく、日本語に完全対応した使いやすい Web ブラウザベースの設定ユーティリティによって、簡単に導入および管理できます。 ■ 主な特長 ● Cisco IOS LAN Lite イメージ搭載 ● ファンレス静音設計(一部のモデルを除く) ● PoE+ 給電対応ダウンリンク ポート搭載(PSE モデル) ● 動作温度:-5 ~ 55 ℃ ● 奥行きに制限がある場所にも設置可能:奥行き最大 29.2 cm ダウンリンクにファスト イーサネット ポートを搭載した、L2 固定構成型スイッチです。 Cisco Catalyst 2960 シリーズのファスト イーサネット モデルをベースにメモリを 2 倍 に増強し、バージョン 15.0(2)SE 以降の新しい Cisco IOS をサポートします。 ■ 主な特長 ● Cisco IOS LAN Base イメージ搭載(LAN Lite モデルは非搭載) ● PoE 給電対応ダウンリンク ポート搭載(PSE モデル) ■ Cisco Catalyst 2960-Plus シリーズ 製品型番 ダウンリンク アップリンク Cisco IOS Web 認証 最大 VLAN 数 PoE 出力ポート 電源 ラック FE GE SFP GE/ マウント SFP PoE 7.7 W PoE 15.4 W WS-C2960+24TC-S 24 - - 2 LAN Lite - 64 - - 内部 1 RU WS-C2960+24LC-S 24 - - 2 LAN Lite - 64 8 8 内部 1 RU WS-C2960+24PC-S 24 - - 2 LAN Lite - 64 24 24 内部 1 RU WS-C2960+48TC-S 48 - - 2 LAN Lite - 64 - - 内部 1 RU WS-C2960+48PST-S 48 2 2 - LAN Lite - 64 48 24 内部 1 RU WS-C2960+24TC-L 24 - - 2 LAN Base ● 255 - - 内部 1 RU WS-C2960+24LC-L 24 - - 2 LAN Base ● 255 8 8 内部 1 RU WS-C2960+24PC-L 24 - - 2 LAN Base ● 255 24 24 内部 1 RU WS-C2960+48TC-L 48 - - 2 LAN Base ● 255 - - 内部 1 RU WS-C2960+48PST-L 48 2 2 - LAN Base ● 255 48 24 内部 1 RU Cisco Catalyst 2960-Plus シリーズ ■ Cisco Catalyst 2960-L シリーズ 製品型番 ダウンリンク アップリンク Cisco IOS Web 認証 最大 VLAN 数 PoE 出力ポート ファンレス 電源 マグネット ラック GE SFP PoE マウント 7.7 W PoE 15.4 W PoE+ 30 W WS-C2960L-8TS-JP 8 2 LAN Lite ● 64 - - - ● 内部 -※1 - WS-C2960L-8PS-JP 8 2 LAN Lite ● 64 8 4 2 ● 内部 -※1 - WS-C2960L-16TS-JP 16 2 LAN Lite ● 64 - - - ● 内部 -※1 - WS-C2960L-16PS-JP 16 2 LAN Lite ● 64 16 7 4 ● 内部 -※1 - WS-C2960L-24TS-JP 24 4 LAN Lite ● 64 - - - ● 内部 - 1 RU WS-C2960L-24PS-JP 24 4 LAN Lite ● 64 24 12 6 ● 内部 - 1 RU WS-C2960L-48TS-JP 48 4 LAN Lite ● 64 - - - ● 内部 - 1 RU WS-C2960L-48PS-JP 48 4 LAN Lite ● 64 48 24 12 - 内部 - 1 RU Cisco Catalyst 2960-L シリーズ 16 スイッチ ※1 設置用マグネット キット(CMPCT-MGNT-TRAY=)が必要。 17 ワイヤレス ルータ セキュリティ Meraki サービス スイッチ Cisco Catalyst 2960-CX シリーズ Cisco Catalyst 3560-CX シリーズ ※1 設置用マグネット キット(CMPCT-MGNT-TRAY=)が必要。オプションで新型電源アダプタ ブラケット(PWR-ADPT-BRKT=)をサポート。 ※2 ラックマウント キット(RCKMNT-19-CMPCT=/RCKMNT-23-CMPCT=)が必要。オプションで新型電源アダプタ ブラケット(PWR-ADPT-BRKT=)をサポート。 Cisco Catalyst コンパクト スイッチ仕様比較 ■ Cisco Catalyst 3560-CX シリーズ 製品型番 ダウンリンク アップリンク Cisco IOS Web 認証 Mac sec 最大 VLAN 数 PoE 出力ポート AC 電源 マグネット ラック GE mGig GE SFP SFP/ マウント SFP+ PoE 7.7 W PoE 15.4 W PoE+ 30 W WS-C3560CX-8TC-S 8 - 2 2 - IP Base ● ● 1023 - - - 内部 -※2 -※3 WS-C3560CX-8PT-S 8 - 2 - - IP Base ● ● 1023 8 8 8 外部※1 -※2 -※3 WS-C3560CX-8PC-S 8 - 2 2 - IP Base ● ● 1023 8 8 8 内部 -※2 -※3 WS-C3560CX-8XPD-S 6 2 - - 2 IP Base ● ● 1023 8 8 8 内部 -※2 -※3 WS-C3560CX-12TC-S 12 - 2 2 - IP Base ● ● 1023 - - - 内部 -※2 -※3 WS-C3560CX-12PC-S 12 - 2 2 - IP Base ● ● 1023 12 12 8 内部 -※2 -※3 WS-C3560CX-12PD-S 12 - 2 - 2 IP Base ● ● 1023 12 12 8 内部 -※2 -※3 拡張性を強化し、ケーブルの統合によってコスト削減を実現するレイヤ 2 コンパクトスイッチです。エンタープライズクラスのサービスを、 ワイヤリング クローゼットに限定されず必要な場所に拡張できます。Cisco Catalyst 2960-X シリーズと同等の、セキュリティと管理の ための高度なネットワーク機能を提供します。 ■ 主な特長 ● スタイリッシュでコンパクトなファンレス静音設計 ● ディープスリープ モード:平均 60 %、最大 80 % の省電力 ● 動作温度:-5 ~ 45 ℃ ● デスクの下、シェルフの上、壁、DIN レールに加えて、マウントブラケットでラックマウントも可能 ● IT の簡素化:ゼロタッチの導入およびメンテナンス、プラグ & プレイ(PnP) ●トラフィックの可視性:すべてのダウンリンクおよびアップリンク ポートで L4 までの Cisco NetFlow-Lite に対応 拡張性を強化し、ケーブルの統合によってコスト削減を実現するレイヤ 3 コンパクトスイッチです。エンタープライズクラスのサービスを、 ワイヤリング クローゼットに限定されず必要な場所に拡張できます。Cisco Catalyst 3650/3850 シリーズと同等の、セキュリティと管 理のための高度なネットワーク機能を提供します。 ■ 主な特長 ● スタイリッシュでコンパクトなファンレス静音設計 ● ディープスリープ モード:平均 60 %、最大 80 % の省電力。8 ポートのスイッチではディープスリープ モードでわずか 3.8 W ● 動作温度:-5 ~ 45 ℃ ● デスクの下、シェルフの上、壁、DIN レールに加えて、マウントブラケットでラックマウントも可能 ● IT の簡素化:ゼロタッチの導入およびメンテナンス、プラグ & プレイ(PnP) ●トラフィックの可視性:すべてのダウンリンクおよびアップリンク ポートで L4 までの Cisco NetFlow-Lite に対応 ● PoE パススルー:業界初の UPOE 給電スイッチ。接続されたデバイスに最大 146 W のパススルー給電が可能(WS-C3560CX8PT-S) ● 新しい DC-DC 電源オプションによって、電車、バスなどでも使用可能 製品型番 ダウンリンク アップリンク Cisco IOS Web 認証 Mac sec 最大 VLAN 数 PoE 出力ポート AC 電源 マグネット ラック GE mGig GE SFP SFP/ マウント SFP+ PoE 7.7 W PoE 15.4 W PoE+ 30 W WS-C2960CX-8TC-L 8 - 2 2 - LAN Base ● - 255 - - - 内部 -※1 -※2 WS-C2960CX-8PC-L 8 - 2 2 - LAN Base ● - 255 8 8 4 内部 -※1 -※2 ■ Cisco Catalyst 2960-CX シリーズ ■ Cisco Catalyst 3560-CX シリーズ用 Cisco IOS アップグレード ライセンス 製品型番 製品説明 L-C3560CX-12-S-E Cisco Catalyst 3560-CX シリーズ用 Cisco IOS IP Services ライセンス ■ Cisco Catalyst 2960-CG & 2960-CX コンパクトスイッチ仕様比較 パラメータ 機能 2960-CG 2960-CX ポート アップリンク 2 x GE/SFP 2 x GE および 2 x SFP ダウンリンク GE x 8 GE x 8 PoE PoE - 124 W PoE+ 無停止型 PoE - ●※1 ハードウェア DRAM、Flash 128 MB、64 MB 512 MB、128 MB その他 セキュリティ 802.1X 802.1x、SXP※2 AVC - NetFlow Lite ■ Cisco Catalyst 3560-CG & 3560-CX コンパクトスイッチ仕様比較 パラメータ 機能 3560-CG 3560-CX ポート アップリンク 2 x GE または 2 x SFP 2 x GE および SFP/SFP+※3 ダウンリンク GE x 8 8 x GE または 12 x GE mGig - ●※4 PoE PoE 124 W PoE+ 240 W PoE+ PoE パススルー 1 x UPOE、23.8 W 2 x UPOE(144.8 W)※1 DC 電源 - ●※1 電源スタック - 水平スタック※1 無停止型 PoE - ● ソフトウェア Cisco IOS IP Base のみ IP Base、IP Services ハードウェア DRAM、Flash 128 MB、64 MB 512 MB、128 MB その他 セキュリティ 802.1x、MACsec 802.1x、MACsec、 SXP※1 、SGACL※1 AVC なし NetFlow Lite IPv6 Basic Enhanced ※1 将来対応予定。 ※2 SGACL は非対応。 ※3 WS-C3560CX-8XPD-S および WS-C3560CX-12PD-S のみ対応。 ※4 WS-C3560CX-8XPD-S のみ対応。 ※1 PoE 受電を利用しない場合は電源アダプタと電源コードが必要。 ※2 設置用マグネット キット(CMPCT-MGNT-TRAY=)が必要。オプションで新型電源アダプタ ブラケット(PWR-ADPT-BRKT=)をサポート。 ※3 ラック マウント ブラケット(RCKMNT-19-CMPCT=/RCKMNT-23-CMPCT=)が必要。オプションで新型電源アダプタ ブラケット(PWR-ADPT-BRKT=)をサポート。 ■ Cisco Catalyst 2960-SF/2960-S/2960-Plus/2960-L/2960-X シリーズ※1 旧モデル 現行モデル 現行/推奨モデル ファスト イーサネット ギガビット イーサネット ファスト イーサネット ギガビット イーサネット スタック非対応 スタック対応 スタック非対応 スタック対応 スタック非対応 スタック非対応 スタック対応 WS-C2960S-F24TS-S - WS-C2960S-24TS-S - WS-C2960+24TC-S WS-C2960L-24TS-JP WS-C2960X-24TS-LL - - - - - WS-C2960+24LC-S WS-C2960+24PC-S WS-C2960L-24PS-JP - WS-C2960S-F48TS-S - WS-C2960S-48TS-S - WS-C2960+48TC-S WS-C2960L-48TS-JP WS-C2960X-48TS-LL - - - - - WS-C2960+48PST-S WS-C2960L-48PS-JP - - WS-C2960S-F24TS-L - WS-C2960S-24TS-L WS-C2960+24TC-L - WS-C2960X-24TS-L WS-C2960XR-24TS-I - - - WS-C2960S-24TD-L - - WS-C2960X-24TD-L WS-C2960XR-24TD-I - WS-C2960S-F24PS-L - WS-C2960S-24PS-L WS-C2960+24LC-L WS-C2960+24PC-L WS-C2960X-24PSQ-L WS-C2960X-24PS-L WS-C2960XR-24PS-I - - - WS-C2960S-24PD-L - - WS-C2960X-24PD-L WS-C2960XR-24PD-I - WS-C2960S-F48TS-L - WS-C2960S-48TS-L WS-C2960+48TC-L - WS-C2960X-48TS-L WS-C2960XR-48TS-I - - - WS-C2960S-48TD-L - - WS-C2960X-48TD-L WS-C2960XR-48TD-I - WS-C2960S-F48LPS-L - WS-C2960S-48LPS-L WS-C2960+48PST-L - WS-C2960X-48LPS-L WS-C2960XR-48LPS-I - WS-C2960S-F48FPS-L - WS-C2960S-48FPS-L - - WS-C2960X-48FPS-L WS-C2960XR-48FPS-I - - - WS-C2960S-48LPD-L - - WS-C2960X-48LPD-L WS-C2960XR-48LPD-I - - - WS-C2960S-48FPD-L - - WS-C2960X-48FPD-L WS-C2960XR-48FPD-I Cisco Catalyst 2960 シリーズ移行ガイド & 仕様比較 ※1 詳細は cisco.com で「EOL10043」を検索。 ■ 主な仕様比較 シリーズ 2960-SF 2960-S 2960-Plus 2960-L 2960-X IOS LAN Lite LAN Base LAN Lite LAN Base LAN Lite LAN Base LAN Lite LAN Lite LAN Base IP Lite 基本的な L2 機能 ● ● ● ● ● ● ● ● ● ● 高度な L2 機能 - ● - ● - ● - - ● ● 基本的な L3 機能 - - - - - - - - - ● DNA(APIC-EM)対応 - ● - ● - - ● - ● ● ビルトイン GUI - - - - - - ● - - - 1 GE ダウンリンク - - ● ● - - ● ● ● ● 10 GE アップリンク - - - ● - - - - ● ● フル PoE 15.4 W - ● - ● - - ● - ● ● PoE+ - ● - ● - - ● - ● ● RPS - - - ● - ● - - ● - 電源二重化 - - - - - - - - - ● FlexStack - ● - ● - - - - - - FlexStack Plus - - - - - - - - ● ● 8 ポート コンパクト モデル - - - - - - ● - - - 16 ポート コンパクト モデル - - - - - - ● - - - ファンレス モデル - - - - - - ● - ● - 18 スイッチ ダウンリンクにギガビット イーサネット ポートを搭載した、スタッカブル L2/L3 固定構成型スイッチ です。スタック機能、および複数の電源モジュールまたは単一の冗長電源システムを搭載することに よって、柔軟性と冗長性のある電源構成を実現します。 ■ 主な特長 ● Cisco IOS ユニバーサル イメージ搭載(LAN Lite/LAN Base/IP Lite 対応)※1 ● HSRP や VRRP などレイヤ 3 機能をサポート(IP Lite モデル) ● PoE+ 給電対応ダウンリンク ポート搭載(PSE モデル) ● フル PoE 給 電 対 応 電 源 搭 載(WS-C2960X-48FPS-L/WS-C2960X-48FPD-L/WSC2960XR-48FPS-I/WS-C2960XR-48FPD-I) ● 電源モジュールの複数搭載対応(IP Lite モデル) ● Cisco FlexStack Plus 対応(LAN Base/IP Lite モデル) ■ 混在スタック(Cisco FlexStack & Cisco FlexStack-Plus)対応表 2960-SF/S LAN Base 2960-X LAN Base 2960-XR IP Lite 2960-SF/S LAN Base ● ● - 2960-X LAN Base ● ● - 2960-XR IP Lite - - ● ■ Cisco FlexStack Plus モジュール 製品型番 C2960X-STACK 対応 IOS LAN Base/IP Lite 最大デバイス数 8 スタック帯域幅 80 Gbps アーキテクチャ ハードウェア ドロップ テーブル ダイナミックリング ロードバランシング - スタック収束 100 ミリ秒 Cisco FlexStack Plus モジュール Cisco Catalyst 2960-X シリーズ ■ Cisco Catalyst 2960-X シリーズ 製品型番 ダウンリンク アップリンク Cisco IOS Web 認証 最大 VLAN 数 PoE 出力ポート ファンレス 電源 電源 二重化 RPS Flex Stack Plus ラック GE GE SFP SFP/ マウント SFP+ PoE 7.7 W PoE 15.4 W PoE+ 30 W WS-C2960X-24TS-LL 24 - 2 - LAN Lite - 64 - - - - 固定 AC - - - 1 RU WS-C2960X-48TS-LL 48 - 2 - LAN Lite - 64 - - - - 固定 AC - - - 1 RU WS-C2960X-24TS-L 24 - 4 - LAN Base ● 1024 - - - - 固定 AC - ● ●※2 1 RU WS-C2960X-24TD-L 24 - - 2 LAN Base ● 1024 - - - - 固定 AC - ● ●※2 1 RU WS-C2960X-24PSQ-L 24 2 2 - LAN Base ● 1024 8 6 3 ● 固定 AC - - - 1 RU WS-C2960X-24PS-L 24 - 4 - LAN Base ● 1024 24 24 12 - 固定 AC - ● ●※2 1 RU WS-C2960X-24PD-L 24 - - 2 LAN Base ● 1024 24 24 12 - 固定 AC - ● ●※2 1 RU WS-C2960X-48TS-L 48 - 4 - LAN Base ● 1024 - - - - 固定 AC - ● ●※2 1 RU WS-C2960X-48TD-L 48 - - 2 LAN Base ● 1024 - - - - 固定 AC - ● ●※2 1 RU WS-C2960X-48LPS-L 48 - 4 - LAN Base ● 1024 48 24 12 - 固定 AC - ● ●※2 1 RU WS-C2960X-48FPS-L 48 - 4 - LAN Base ● 1024 48 48 24 - 固定 AC - ● ●※2 1 RU WS-C2960X-48LPD-L 48 - - 2 LAN Base ● 1024 48 24 12 - 固定 AC - ● ●※2 1 RU WS-C2960X-48FPD-L 48 - - 2 LAN Base ● 1024 48 48 24 - 固定 AC - ● ●※2 1 RU WS-C2960XR-24TS-I 24 - 4 - IP Lite ● 1024 - - - - 250 W AC ● - ●※2 1 RU WS-C2960XR-24TD-I 24 - - 2 IP Lite ● 1024 - - - - 250 W AC ● - ●※2 1 RU WS-C2960XR-24PS-I 24 - 4 - IP Lite ● 1024 24 24 12 - 640 W AC ● - ●※2 1 RU WS-C2960XR-24PD-I 24 - - 2 IP Lite ● 1024 24 24 12 - 640 W AC ● - ●※2 1 RU WS-C2960XR-48TS-I 48 - 4 - IP Lite ● 1024 - - - - 250 W AC ● - ●※2 1 RU WS-C2960XR-48TD-I 48 - - 2 IP Lite ● 1024 - - - - 250 W AC ● - ●※2 1 RU WS-C2960XR-48LPS-I 48 - 4 - IP Lite ● 1024 48 24 12 - 640 W AC ● - ●※2 1 RU WS-C2960XR-48FPS-I 48 - 4 - IP Lite ● 1024 48 48 24 - 640 W AC ● - ●※2 1 RU WS-C2960XR-48LPD-I 48 - - 2 IP Lite ● 1024 48 24 12 - 1025 W AC ● - ●※2 1 RU WS-C2960XR-48FPD-I 48 - - 2 IP Lite ● 1024 48 48 24 - 1025 W AC ● - ●※2 1 RU ■ Cisco Catalyst 2960-XR シリーズ用電源モジュール 製品型番 製品説明 対応製品型番 PWR-C2-250WAC 250 W AC 電源モジュール WS-C2960XR-24TS-I/WS-C2960XR-24TD-I/WS-C2960XR-48TS-I/WS-C2960XR-48TD-I PWR-C2-640WAC 640 W AC 電源モジュール WS-C2960XR-24PS-I/WS-C2960XR-24PD-I/WS-C2960XR-48LPS-I/WS-C2960XR-48LPD-I PWR-C2-1025WAC 1025 W AC 電源モジュール WS-C2960XR-48FPS-I/WS-C2960XR-48FPD-I Cisco Catalyst 2960-X シリーズの LAN Base/IP Lite モデルは、オプションの Cisco FlexStack Plus モジュール(C2960X-STACK)を搭載することで、最大 8 台のスイッチを 80 Gbps でスタック接続できます。 Cisco FlexStack Plus は Cisco FlexStack との下位互換性があります。Cisco Catalyst 2960-X シリーズの LAN Base モデルと Cisco Catalyst 2960-SF/ S シリーズの LAN Base モデルの組み合わせに限り、最大 4 台のスイッチを 40 Gbps でスタック接続できます。 ※1 アップグレードは非対応。 ※2 Cisco FlexStack Plus モジュール(C2960X-STACK)が必要。 19 ワイヤレス ルータ セキュリティ Meraki サービス スイッチ      Cisco Catalyst 3650 シリーズ ワイヤレス コントローラ機能を提供する、スタッカブル L2/L3 固定構成型スイッチです。 160 Gbps スタック機能や電源モジュールの複数搭載によって、柔軟な冗長構成を実現し ます。また、有線/無線 LAN の両方に共通のインテリジェント サービス(QoS やセキュリ ティなど)を提供します。 ※1 Cisco IOS IP Base/IP Services ライセンスが必要。 ■ 主な特長 ● Cisco IOS XE ユニバーサル イメージ搭載(LAN Base/IP Base/IP Services 対応) ● ユニファイド アクセス データプレーン(UADP)ASIC 搭載 ● 最大 50 台のワイヤレス アクセス ポイントを管理できるコントローラ機能を内蔵(IP Base/IP Services 対応) ● Cisco Catalyst Multigigabit Technology(mGig)対応ダウンリンク ポート搭載 (一部のモデル) ● PoE+/UPOE 給電対応ダウンリンク ポート搭載(一部の PSE モデル) ● MACsec 対応ダウンリンク/アップリンク ポート搭載(IP Base/IP Services モデル) ● Cisco StackWise-160 対応 ● 奥行きに制限がある場所にも設置可能な Mini モデル(WS-C3650-24PDM/ WSC3650-48FQM) ■ Cisco Catalyst 3650 シリーズ(1/2) 製品型番 ワイヤレス スループット ダウンリンク アップリンク Cisco IOS Mac sec 最大 VLAN 数 PoE 出力ポート 電源 電源 二重化 RPS ラック SFP マウント SFP/ SFP+ QSFP+ PoE 15.4 W PoE+ 30 W UPOE GE mGig 60 W WS-C3650-24TS-L 20 Gpbs 24 - 4 - - LAN Base -※1 255 - - - 250 W AC ● - 1 RU WS-C3650-24TS-S 20 Gpbs 24 - 4 - - IP Base ● 4094 - - - 250 W AC ● - 1 RU WS-C3650-24TS-E 20 Gpbs 24 - 4 - - IP Services ● 4094 - - - 250 W AC ● - 1 RU WS-C3650-24TD-L 20 Gpbs 24 - 2 2 - LAN Base -※1 255 - - - 250 W AC ● - 1 RU WS-C3650-24TD-S 20 Gpbs 24 - 2 2 - IP Base ● 4094 - - - 250 W AC ● - 1 RU WS-C3650-24TD-E 20 Gpbs 24 - 2 2 - IP Services ● 4094 - - - 250 W AC ● - 1 RU WS-C3650-24PS-L 20 Gpbs 24 - 4 - - LAN Base -※1 255 24 13 - 640 W AC ● - 1 RU WS-C3650-24PS-S 20 Gpbs 24 - 4 - - IP Base ● 4094 24 13 - 640 W AC ● - 1 RU WS-C3650-24PS-E 20 Gpbs 24 - 4 - - IP Services ● 4094 24 13 - 640 W AC ● - 1 RU WS-C3650-24PDM-L 20 Gpbs 24 - 2 2 - LAN Base -※1 255 24 13 - 640 W AC - ● 1 RU WS-C3650-24PDM-S 20 Gpbs 24 - 2 2 - IP Base ● 4094 24 13 - 640 W AC - ● 1 RU WS-C3650-24PDM-E 20 Gpbs 24 - 2 2 - IP Services ● 4094 24 13 - 640 W AC - ● 1 RU WS-C3650-24PD-L 20 Gpbs 24 - 2 2 - LAN Base -※1 255 24 13 - 640 W AC ● - 1 RU WS-C3650-24PD-S 20 Gpbs 24 - 2 2 - IP Base ● 4094 24 13 - 640 W AC ● - 1 RU WS-C3650-24PD-E 20 Gpbs 24 - 2 2 - IP Services ● 4094 24 13 - 640 W AC ● - 1 RU WS-C3650-8X24PD-L 20 Gpbs 24 8 - 2 - LAN Base -※1 255 24 14 - 750 W AC ● - 1 RU WS-C3650-8X24PD-S 20 Gpbs 24 8 - 2 - IP Base ● 4094 24 14 - 750 W AC ● - 1 RU WS-C3650-8X24PD-E 20 Gpbs 24 8 - 2 - IP Services ● 4094 24 14 - 750 W AC ● - 1 RU WS-C3650-8X24UQ-L 20 Gpbs 24 8 - 4 - LAN Base -※1 255 24 24 13 1100 W AC ● - 1 RU WS-C3650-8X24UQ-S 20 Gpbs 24 8 - 4 - IP Base ● 4094 24 24 13 1100 W AC ● - 1 RU WS-C3650-8X24UQ-E 20 Gpbs 24 8 - 4 - IP Services ● 4094 24 24 13 1100 W AC ● - 1 RU ※1 詳細は cisco.com で「EOL10623」を検索。 Cisco Catalyst 3000 シリーズ移行ガイド ■ Cisco Catalyst 3560-X/3650 シリーズ※1 旧モデル 推奨モデル WS-C3560X-24T-L/S/E WS-C3650-24TS-L/S/E WS-C3650-24TD-L/S/E WS-C3560X-24P-L/S/E WS-C3650-24PS-L/S/E WS-C3650-24PD-L/S/E WS-C3650-8X24PD-L/S/E WS-C3560X-24U-L/S/E WS-C3650-24PS-L/S/E WS-C3650-24PD-L/S/E WS-C3650-8X24PD-L/S/E WS-C3650-8X24UQ-L/S/E WS-C3560X-48T-L/S/E WS-C3650-48TS-L/S/E WS-C3650-48TD-L/S/E WS-C3650-48TQ-L/S/E 旧モデル 推奨モデル WS-C3560X-48P-L/S/E WS-C3650-48PS-L/S/E WS-C3650-48PD-L/S/E WS-C3650-48PQ-L/S/E WS-C3650-12X48FD-L/S/E WS-C3560X-48PF-L/S/E WS-C3650-48FS-L/S/E WS-C3650-48FD-L/S/E WS-C3650-48FQ-L/S/E WS-C3650-12X48FD-L/S/E WS-C3650-12X48UQ-L/S/E WS-C3650-12X48UR-L/S/E WS-C3650-12X48UZ-L/S/E WS-C3560X-48U-L/S/E WS-C3650-48FS-L/S/E WS-C3650-48FD-L/S/E WS-C3650-48FQ-L/S/E WS-C3650-12X48FD-L/S/E WS-C3650-12X48UQ-L/S/E WS-C3650-12X48UR-L/S/E WS-C3650-12X48UZ-L/S/E ■ Cisco Catalyst 3750-X/3850 シリーズ※1 旧モデル 推奨モデル WS-C3750X-24T-L/S/E WS-C3850-24T-L/S/E WS-C3750X-24P-L/S/E WS-C3850-24P-L/S/E WS-C3750X-24U-L/S/E WS-C3850-24U-L/S/E WS-C3850-24XU-L/S/E WS-C3750X-48T-L/S/E WS-C3850-48T-L/S/E 旧モデル 推奨モデル WS-C3750X-48P-L/S/E WS-C3850-48P-L/S/E WS-C3750X-48PF-L/S/E WS-C3850-48F-L/S/E WS-C3750X-48U-L/S/E WS-C3850-48U-L/S/E WS-C3850-12X48U-L/S/E WS-C3750X-12S-S/E WS-C3850-12S-S/E WS-C3750X-24S-S/E WS-C3850-24S-S/E 20 スイッチ ※1 Cisco IOS IP Base/IP Services ライセンスが必要。 ■ Cisco Catalyst 3650 シリーズ用電源モジュール 製品型番 製品説明 PWR-C2-250WAC 250 W AC 電源モジュール PWR-C2-640WAC 640 W AC 電源モジュール PWR-C1-715WAC 715 W AC 電源モジュール PWR-C2-1025WAC 1025 W AC 電源モジュール PWR-C1-1100WAC 1100 W AC 電源モジュール PWR-C2-640WAC 640 W DC 電源モジュール ■ Cisco Catalyst 3650 シリーズ用 Cisco IOS アップグレード ライセンス 製品型番 製品説明 L-C3650-24-L-S 24 ポート IP Base モデル用 Cisco IOS IP Base ライセンス L-C3650-24-S-E 24 ポート IP Base モデル用 Cisco IOS IP Services ライセンス L-C3650-24-L-E 24 ポート IP Base モデル用 Cisco IOS IP Services ライセンス L-C3650-48-L-S 48 ポート IP Base モデル用 Cisco IOS IP Base ライセンス L-C3650-48-S-E 48 ポート IP Base モデル用 Cisco IOS IP Services ライセンス L-C3650-48-L-E 48 ポート IP Base モデル用 Cisco IOS IP Services ライセンス ■ Cisco 3650 シリーズ用アクセス ポイント追加ライセンス 製品型番 追加数 プライマリアップグレード製品型番 L-LIC-CTIOS-1A 1 L-LIC-CT3650-UPG ■ Cisco Catalyst 3650 シリーズ用 Cisco StackWise-160 モジュール 製品型番 製品説明 C3650-STACK-KIT Cisco StackWise-160 モジュール ■ Cisco Catalyst 3560-C/3560-CX シリーズ※1 旧モデル 推奨モデル WS-C3560C-8PC-S WS-C3560CX-8PC-S WS-C3560C-12PC-S WS-C3560CX-12PC-S WS-C3560CX-12PD-S WS-C3560CG-8TC-S WS-C3560CX-8TC-S WS-C3560CX-12TC-S WS-C3560CG-8PC-S WS-C3560CX-8PC-S WS-C3560CX-8XPD-S WS-C3560CPD-8PT-S WS-C3560CX-8PT-S ■ Cisco Catalyst 2960-C/2960-L/2960-CX シリーズ 旧モデル 推奨モデル WS-C2960C-8TC-S WS-C2960L-8TS-JP WS-C2960C-8TC-L WS-C2960CX-8TC-L WS-C2960C-8PC-L WS-C2960CX-8PC-L WS-C2960CPD-8TT-L WS-C2960CX-8TC-L WS-C2960CPD-8PT-L WS-C2960CX-8PC-L WS-C2960C-12PC-L WS-C2960CX-8PC-L WS-C2960CG-8TC-L ※ 1 WS-C2960CX-8TC-L Cisco Catalyst Compact スイッチ移行ガイド ※1 詳細は cisco.com で「EOL10691」を検索。 ■ Cisco Catalyst 3650 シリーズ(2/2) 製品型番 ワイヤレス スループット ダウンリンク アップリンク Cisco IOS Mac sec 最大 VLAN 数 PoE 出力ポート 電源 電源 二重化 RPS ラック SFP マウント SFP/ SFP+ QSFP+ PoE 15.4 W PoE+ 30 W UPOE GE mGig 60 W WS-C3650-48TS-L 40 Gbps 48 - 4 - - LAN Base -※1 255 - - - 250 W AC ● - 1 RU WS-C3650-48TS-S 40 Gbps 48 - 4 - - IP Base ● 4094 - - - 250 W AC ● - 1 RU WS-C3650-48TS-E 40 Gbps 48 - 4 - - IP Services ● 4094 - - - 250 W AC ● - 1 RU WS-C3650-48TD-L 40 Gbps 48 - 2 2 - LAN Base -※1 255 - - - 250 W AC ● - 1 RU WS-C3650-48TD-S 40 Gbps 48 - 2 2 - IP Base ● 4094 - - - 250 W AC ● - 1 RU WS-C3650-48TD-E 40 Gbps 48 - 2 2 - IP Services ● 4094 - - - 250 W AC ● - 1 RU WS-C3650-48TQ-L 40 Gbps 48 - - 4 - LAN Base -※1 255 - - - 250 W AC ● - 1 RU WS-C3650-48TQ-S 40 Gbps 48 - - 4 - IP Base ● 4094 - - - 250 W AC ● - 1 RU WS-C3650-48TQ-E 40 Gbps 48 - - 4 - IP Services ● 4094 - - - 250 W AC ● - 1 RU WS-C3650-48PS-L 40 Gbps 48 - 4 - - LAN Base -※1 255 25 13 - 640 W AC ● - 1 RU WS-C3650-48PS-S 40 Gbps 48 - 4 - - IP Base ● 4094 25 13 - 640 W AC ● - 1 RU WS-C3650-48PS-E 40 Gbps 48 - 4 - - IP Services ● 4094 25 13 - 640 W AC ● - 1 RU WS-C3650-48PD-L 40 Gbps 48 - 2 2 - LAN Base -※1 255 25 13 - 640 W AC ● - 1 RU WS-C3650-48PD-S 40 Gbps 48 - 2 2 - IP Base ● 4094 25 13 - 640 W AC ● - 1 RU WS-C3650-48PD-E 40 Gbps 48 - 2 2 - IP Services ● 4094 25 13 - 640 W AC ● - 1 RU WS-C3650-48PQ-L 40 Gbps 48 - - 4 - LAN Base -※1 255 25 13 - 640 W AC ● - 1 RU WS-C3650-48PQ-S 40 Gbps 48 - - 4 - IP Base ● 4094 25 13 - 640 W AC ● - 1 RU WS-C3650-48PQ-E 40 Gbps 48 - - 4 - IP Services ● 4094 25 13 - 640 W AC ● - 1 RU WS-C3650-48FS-L 40 Gbps 48 - 4 - - LAN Base -※1 255 48 25 - 1025 W AC ● - 1 RU WS-C3650-48FS-S 40 Gbps 48 - 4 - - IP Base ● 4094 48 25 - 1025 W AC ● - 1 RU WS-C3650-48FS-E 40 Gbps 48 - 4 - - IP Services ● 4094 48 25 - 1025 W AC ● - 1 RU WS-C3650-48FD-L 40 Gbps 48 - 2 2 - LAN Base -※1 255 48 25 - 1025 W AC ● - 1 RU WS-C3650-48FD-S 40 Gbps 48 - 2 2 - IP Base ● 4094 48 25 - 1025 W AC ● - 1 RU WS-C3650-48FD-E 40 Gbps 48 - 2 2 - IP Services ● 4094 48 25 - 1025 W AC ● - 1 RU WS-C3650-48FQM-L 40 Gbps 48 - - 4 - LAN Base -※1 255 48 25 - 975 W AC - ● 1 RU WS-C3650-48FQM-S 40 Gbps 48 - - 4 - IP Base ● 4094 48 25 - 975 W AC - ● 1 RU WS-C3650-48FQM-E 40 Gbps 48 - - 4 - IP Services ● 4094 48 25 - 975 W AC - ● 1 RU WS-C3650-48FQ-L 40 Gbps 48 - - 4 - LAN Base -※1 255 48 25 - 1025 W AC ● - 1 RU WS-C3650-48FQ-S 40 Gbps 48 - - 4 - IP Base ● 4094 48 25 - 1025 W AC ● - 1 RU WS-C3650-48FQ-E 40 Gbps 48 - - 4 - IP Services ● 4094 48 25 - 1025 W AC ● - 1 RU WS-C3650-12X48FD-L 40 Gbps 48 12 - 2 - LAN Base -※1 255 48 27 - 1100 W AC ● - 1 RU WS-C3650-12X48FD-S 40 Gbps 48 12 - 2 - IP Base ● 4094 48 27 - 1100 W AC ● - 1 RU WS-C3650-12X48FD-E 40 Gbps 48 12 - 2 - IP Services ● 4094 48 27 - 1100 W AC ● - 1 RU WS-C3650-12X48UQ-L 40 Gbps 48 12 - 4 - LAN Base -※1 255 48 27 11 1100 W AC ● - 1 RU WS-C3650-12X48UQ-S 40 Gbps 48 12 - 4 - IP Base ● 4094 48 27 11 1100 W AC ● - 1 RU WS-C3650-12X48UQ-E 40 Gbps 48 12 - 4 - IP Services ● 4094 48 27 11 1100 W AC ● - 1 RU WS-C3650-12X48UR-L 40 Gbps 48 12 - 8 - LAN Base -※1 255 48 27 11 1100 W AC ● - 1 RU WS-C3650-12X48UR-S 40 Gbps 48 12 - 8 - IP Base ● 4094 48 27 11 1100 W AC ● - 1 RU WS-C3650-12X48UR-E 40 Gbps 48 12 - 8 - IP Services ● 4094 48 27 11 1100 W AC ● - 1 RU WS-C3650-12X48UZ-L 40 Gbps 48 12 - - 2 LAN Base -※1 255 48 27 11 1100 W AC ● - 1 RU WS-C3650-12X48UZ-S 40 Gbps 48 12 - - 2 IP Base ● 4094 48 27 11 1100 W AC ● - 1 RU WS-C3650-12X48UZ-E 40 Gbps 48 12 - - 2 IP Services ● 4094 48 27 11 1100 W AC ● - 1 RU 21 ワイヤレス ルータ セキュリティ Meraki サービス スイッチ      Cisco Catalyst 3850 シリーズ ワイヤレス コントローラ機能を提供する、次世代スタッカブル L2/L3 固定構成型スイッチ です。業界最高の 480 Gbps スタック機能、電源モジュールの複数搭載、および革新的な 電源共有機能によって、柔軟かつ高度な冗長構成を実現します。また、有線/無線 LAN の 両方に共通のインテリジェント サービス(QoS やセキュリティなど)を提供します。 ※1 48 ポート 10 G ファイバ モデルは非対応。 ※2 Cisco Catalyst 3850 シリーズ用ネットワーク モジュールが必要(48 ポート ファイバ モデルでは不要)。 ※3 Cisco IOS IP Base/IP Services ライセンスが必要。 ※4 デフォルト電源構成の場合。 ■ Cisco Catalyst 3850 シリーズ 製品型番 ワイヤレス スループット ダウンリンク アップリンク※2 Cisco IOS Mac sec 最大 VLAN 数 PoE 出力ポート※4 電源 ラック GE mGig SFP マウント SFP / SFP + SFP SFP / SFP + QSFP+ PoE 15.4 W PoE + 30 W UPOE 60 W WS-C3850-24T-L 20 Gpbs 24 - - - 4 2 - LAN Base -※3 255 - - - 350 W AC 1 RU WS-C3850-24T-S 20 Gpbs 24 - - - 4 2 - IP Base ● 4094 - - - 350 W AC 1 RU WS-C3850-24T-E 20 Gpbs 24 - - - 4 2 - IP Services ● 4094 - - - 350 W AC 1 RU WS-C3850-24P-L 20 Gpbs 24 - - - 4 2 - LAN Base -※3 255 24 14 - 715 W AC 1 RU WS-C3850-24P-S 20 Gpbs 24 - - - 4 2 - IP Base ● 4094 24 14 - 715 W AC 1 RU WS-C3850-24P-E 20 Gpbs 24 - - - 4 2 - IP Services ● 4094 24 14 - 715 W AC 1 RU WS-C3850-24U-L 20 Gpbs 24 - - - 4 2 - LAN Base -※3 255 24 14 13 715 W AC 1 RU WS-C3850-24U-S 20 Gpbs 24 - - - 4 2 - IP Base ● 4094 24 14 13 715 W AC 1 RU WS-C3850-24U-E 20 Gpbs 24 - - - 4 2 - IP Services ● 4094 24 14 13 715 W AC 1 RU WS-C3850-24XU-L 40 Gbps - 24 - - 4 8 2 LAN Base -※3 255 24 24 24 1100 W AC 1 RU WS-C3850-24XU-S 40 Gbps - 24 - - 4 8 2 IP Base ● 4094 24 24 24 1100 W AC 1 RU WS-C3850-24XU-E 40 Gbps - 24 - - 4 8 2 IP Services ● 4094 24 24 24 1100 W AC 1 RU WS-C3850-48T-L 40 Gbps 48 - - - 4 4 - LAN Base -※3 255 - - - 350 W AC 1 RU WS-C3850-48T-S 40 Gbps 48 - - - 4 4 - IP Base ● 4094 - - - 350 W AC 1 RU WS-C3850-48T-E 40 Gbps 48 - - - 4 4 - IP Services ● 4094 - - - 350 W AC 1 RU WS-C3850-48P-L 40 Gbps 48 - - - 4 4 - LAN Base -※3 255 28 14 - 715 W AC 1 RU WS-C3850-48P-S 40 Gbps 48 - - - 4 4 - IP Base ● 4094 28 14 - 715 W AC 1 RU WS-C3850-48P-E 40 Gbps 48 - - - 4 4 - IP Services ● 4094 28 14 - 715 W AC 1 RU WS-C3850-48F-L 40 Gbps 48 - - - 4 4 - LAN Base -※3 255 48 26 - 1100 W AC 1 RU WS-C3850-48F-S 40 Gbps 48 - - - 4 4 - IP Base ● 4094 48 26 - 1100 W AC 1 RU WS-C3850-48F-E 40 Gbps 48 - - - 4 4 - IP Services ● 4094 48 26 - 1100 W AC 1 RU WS-C3850-48U-L 40 Gbps 48 - - - 4 4 - LAN Base -※3 255 48 26 13 1100 W AC 1 RU WS-C3850-48U-S 40 Gbps 48 - - - 4 4 - IP Base ● 4094 48 26 13 1100 W AC 1 RU WS-C3850-48U-E 40 Gbps 48 - - - 4 4 - IP Services ● 4094 48 26 13 1100 W AC 1 RU WS-C3850-12X48U-L 40 Gbps 36 12 - - 4 8 2 LAN Base -※3 255 48 48 36 1100 W AC 1 RU WS-C3850-12X48U-S 40 Gbps 36 12 - - 4 8 2 IP Base ● 4094 48 48 36 1100 W AC 1 RU WS-C3850-12X48U-E 40 Gbps 36 12 - - 4 8 2 IP Services ● 4094 48 48 36 1100 W AC 1 RU WS-C3850-12S-S 20 Gbps - - 12 - 4 2 - IP Base ● 4094 - - - 350 W AC 1 RU WS-C3850-12S-E 20 Gbps - - 12 - 4 2 - IP Services ● 4094 - - - 350 W AC 1 RU WS-C3850-12XS-S 40 Gbps - - - 12 - 4 - IP Base ● 4094 - - - 350 W AC 1 RU WS-C3850-12XS-E 40 Gbps - - - 12 - 4 - IP Services ● 4094 - - - 350 W AC 1 RU WS-C3850-24S-S 20 Gbps - - 24 - 4 2 - IP Base ● 4094 - - - 350 W AC 1 RU WS-C3850-24S-E 20 Gbps - - 24 - 4 2 - IP Services ● 4094 - - - 350 W AC 1 RU WS-C3850-24XS-S 40 Gbps - - - 24 - 8 2 IP Base ● 4094 - - - 715 W AC 1 RU WS-C3850-24XS-E 40 Gbps - - - 24 - 8 2 IP Services ● 4094 - - - 715 W AC 1 RU WS-C3850-48XS-S 40 Gbps - - - 48 - - 4 IP Base ● 4094 - - - 750 W AC 1 RU WS-C3850-48XS-E 40 Gbps - - - 48 - - 4 IP Services ● 4094 - - - 750 W AC 1 RU WS-C3850-48XS-F-S 40 Gbps - - - 48 - - 4 IP Base ● 4094 - - - 750 W AC 1 RU WS-C3850-48XS-F-E 40 Gbps - - - 48 - - 4 IP Services ● 4094 - - - 750 W AC 1 RU ■ Cisco Catalyst 3850 シリーズ用ネットワークモジュール 製品型番 製品説明 サポートする構成(SFP/SFP+/QSFP) C3850-NM-4-1G 24/48 ポート モデル、mGig モデル、1 G ファイバ モデル用 SFP モジュール スロット搭載ネットワーク モジュール 4/0/0 C3850-NM-2-10G 24/48 ポート モデル、mGig モデル、および 1 G ファイバ モデル用 SFP+ モジュール スロット搭載ネットワーク モジュール 4/0/0、3/1/0、2/2/0、0/2/0 C3850-NM-4-10G 48 ポート モデル、mGig モデル、および 10 G ファイバ モデル用 SFP+ モジュール スロット搭載ネットワーク モジュール 4/0/0、3/1/0、2/2/0、1/3/0、0/4/0 C3850-NM-8-10G mGig モデルおよび 24 ポート 10 G ファイバ モデル用 SFP+ モジュール スロット搭載ネットワーク モジュール 8/8/0 C3850-NM-2-40G mGig モデルおよび 24 ポート 10 G ファイバ モデル用 QSFP モジュール スロット搭載ネットワーク モジュール 0/0/2 ■ 主な特長 ● Cisco IOS XE ユニバーサル イメージ搭載(LAN Base/IP Base/IP Services 対応) ● ユニファイド アクセス データプレーン(UADP)ASIC 搭載 ● 最大 100 台のワイヤレス アクセス ポイントを管理できるコントローラ機能を内蔵(IP Base/IP Services 対応) ● Cisco Catalyst Multigigabit Technology(mGig)対応ダウンリンク ポート搭載 (一部のモデル) ● PoE+/UPOE 給電対応ダウンリンク ポート搭載(一部の PSE モデル) ● MACsec 対応ダウンリンク ポート搭載(IP Base/IP Services モデル) ● MACsec 対応アップリンク ポート(オプション、IP Base/IP Services モデル) ● Cisco StackPower 対応※1 ● Cisco StackWise-480 対応※1 ■ Cisco Catalyst 3850 シリーズ用電源モジュール 製品型番 製品説明 PWR-C1-350WAC 350 W AC 電源モジュール PWR-C1-715WAC 715 W AC 電源モジュール PWR-C1-1100WAC 1100 W AC 電源モジュール PWR-C1-440WDC 440 W DC 電源モジュール 製品型番 製品説明 PWR-C3-750WAC-R WS-C3850-48XS 用前面吸気 / 背面排気 750 W AC 電源モジュール PWR-C3-750WAC-F WS-C3850-48XS 用背面吸気 / 前面排気 750 W AC 電源モジュール PWR-C3-750WDC-R WS-C3850-48XS 用前面吸気 / 背面排気 750 W DC 電源モジュール PWR-C3-750WDC-F WS-C3850-48XS 用背面吸気 / 前面排気 750 W DC 電源モジュール 22 スイッチ ■ Cisco Catalyst 3850 シリーズ バンドル 製品型番 バンドル モデル ネットワーク モジュール アクセス ポイントライセンス数 Cisco IOS WS-C3850-24PW-S WS-C3850-24P-S - 5 IP Base WS-C3850-24UW-S WS-C3850-24U-S - 5 IP Base WS-C3850-24XUW-S WS-C3850-24XU-S - 5 IP Base WS-C3850-48W-S WS-C3850-48P-S - 5 IP Base WS-C3850-48PW-S WS-C3850-48F-S - 5 IP Base WS-C3850-48UW-S WS-C3850-48U-S - 5 IP Base WS-C3850-12X48UW-S WS-C3850-12X48U-S - 5 IP Base WS-C3850-16XS-S WS-C3850-12XS-S C3850-NM-4-10G 5 IP Base WS-C3850-16XS-E WS-C3850-12XS-E C3850-NM-4-10G 5 IP Services WS-C3850-32XS-S WS-C3850-24XS-S C3850-NM-8-10G 5 IP Base WS-C3850-32XS-E WS-C3850-24XS-E C3850-NM-8-10G 5 IP Services Cisco Catalyst マルチギガビット テクノロジー(mGig) ■「ギガビットを超える無線 LAN」11ac 導入がもたらす有線 LAN の課題 理論値で最大 6.9 Gbps も の 通 信 速 度 を 実 現 する、 超 高 速 無 線 規 格 IEEE 802.11ac。無線 LAN は文字どおり「ギガビット超え」の時代に突入していますが、 11ac への移行が有線 LAN に「古くて新しい」課題をもたらしています。つまり、か つて経験した課題、11a/g から 11n への移行を計画した際と同様の課題です。 11a/g から 11n への移行を計画した際に、アクセス ポイントを収容するアクセス ス イッチがファスト イーサネット(理論値で最大 100 Mbps)ではキャパシティ不足であ ることは明白でした。いま同様に、11n から 11ac への移行を計画する際に、1 ギガ ビット イーサネット(1 GE、理論値で最大 1000 Mbps)ではキャパシティ不足である ことが明白です。具体的には、 ● 複数の 11ac 対応アクセス ポイントを収容するアクセス スイッチのアップリンクが 1 GE では、そこがボトルネックになります。 ● 11ac Wave 2 対応アクセス ポイントを収容するアクセス スイッチのダウンリンク が 1 GE では、そこがボトルネックになります。 したがって、11ac のポテンシャルをフルに発揮させるためには、11a/g から 11n への移行の際と同様に、少なくともアクセス スイッチのリプレースが必須です。 ところが、現行の IEEE 標準規格で 1 GE を上回る規格は、銅線または光ファイバ ケー ブルによる 10 ギガビット イーサネット(10 GE)ですが、10 GE 対応スイッチの導入 にはいくつかの難点があります。 ● 多くの場合、ケーブルの再敷設が必要:全世界の企業で敷設済みの銅線ケーブルの 46 % がカテゴリ 5e、28 % がカテゴリ 6 です。銅線による 10 GE は、カテゴリ 5e には非対応、カテゴリ 6 ではケーブル長 55 m までの制限があります。光ファイ バ ケーブルの敷設はもちろん、銅線ケーブルの敷設にも莫大なコストがかかります。 ● 現行の 10 GE は PoE に非対応:アクセス ポイントに電源設備と電源ケーブルが 必要になるため、電源供給の課題が発生します。 ■ Cisco Catalyst マルチギガビットテクノロジー(mGig) 11ac 導入がもたらすこのような課題を一挙に解決するのが、シスコの革新的な Cisco Catalyst Multigigabit テクノロジー(mGig)です。mGig には大きく分けて、 次の 3 つの特長があります。 ● マルチ スピード:カテゴリ 5e ケーブルで 100 Mbps、1 Gbps、2.5 Gbps、お よび 5 Gbps をサポート、カテゴリ 6a ケーブルで 10 Gbps をサポートします。 ● ケーブル タイプ:カテゴリ 5e、カテゴリ 6、カテゴリ 6a を含む、多様なケーブル タイプをサポートします。 ● PoE:現行の 10 GE とは異なり、PoE(15.4 W)、PoE+(30 W)、および UPOE(60 W)をサポートします。 mGig は、シスコが 2014 年 10 月に設立した NBASE-T アライアンスのテクノロ ジーに基づいています。NBASE-T アライアンスには多数のベンダー企業が参画、現 在、2.5GBASE-T および 5GBASE-T として、IEEE での標準化が進められています。 ■ Cisco Catalyst マルチギガビット テクノロジー(mGig):速度とケーブル ケーブル タイプ 1 Gbps 2.5 Gbps 5 Gbps 10 Gbps Cat 5e ● ● ● - Cat 6 ● ● ● ●(55m) カテゴリ 6a ● ● ● ● mGig 対応 コア スイッチ 11ac Wave 1 対応 アクセス ポイント 最大 1.3 Gbps ■ mGig の特長 11ac Wave 2 対応 アクセス ポイント 最大 3.5 Gbps mGig 対応 アクセス スイッチ カテゴリ 5e ケーブルで 2.5 Gbps および 5 Gbps をサポート カテゴリ 6a ケーブルで 10 Gbps をサポート PoE(15.4 W)、PoE+(30 W) および UPOE(60 W)をサポート ■ Cisco Catalyst 3850 シリーズ用 Cisco IOS XE アップグレード ライセンス 製品型番 製品説明 L-C3850-12-S-E 12 ポート IP Base モデル用 Cisco IOS IP Services ライセンス L-C3850-24-L-S 24 ポート LAN Base モデル用 Cisco IOS IP Base ライセンス L-C3850-24-S-E 24 ポート IP Base モデル用 Cisco IOS IP Services ライセンス L-C3850-24-L-E 24 ポート LAN Base モデル用 Cisco IOS IP Services ライセンス L-C3850-48-L-S 48 ポート LAN Base モデル用 Cisco IOS IP Base ライセンス L-C3850-48-S-E 48 ポート IP Base モデル用 Cisco IOS IP Services ライセンス L-C3850-48-L-E 48 ポート LAN Base モデル用 Cisco IOS IP Services ライセンス ■ Cisco 3850 シリーズ用アクセス ポイント追加ライセンス 製品型番 追加数 プライマリアップグレード 製品型番 L-LIC-CTIOS-1A 1 L-LIC-CT3850-UPG 23 ワイヤレス ルータ セキュリティ Meraki サービス スイッチ Cisco Catalyst 4500E シリーズ 3、6、7、または 10 スロットのシャーシを備えた、L2/L3 モジュラ型スイッチです。シャーシ、 スーパバイザ エンジン、ライン カードも含めて、複数の世代間で上位および下位互換性を 提供するコンポーネントで構成できるため、優れたコスト パフォーマンスで長期間にわたっ て投資を保護します。 ※1 スロット 3、4、および 7 ~ 10 は 750 W。 ※2 動作モード(冗長 1 + 1 モード、冗長 N + 1 モード、複合モード)に依存。 ■ Cisco Catalyst 4500E シリーズ用シャーシ 製品型番 スロット数 スーパバイザ エンジン 冗長性 最大ポート数(ラインカード搭載) スロットあたり PoE 供給可能 最大電力 電源 モジュール スロット数 ラック スーパバイザ マウント エンジン ライン カード GE SFP SFP+ WS-C4503-E 1 2 - 96 96 24 1500 W 2 7 RU WS-C4506-E 1 5 - 240 240 60 1500 W 2 10 RU WS-C4507R+E 2 5 ● 240 240 60 1500 W 2 11 RU WS-C4510R+E 2 8 ● 384 384 96 1500 W ※1 2 14 RU ■ Cisco Catalyst 4500E シリーズ用スーパバイザ エンジン 製品型番 スイッチング 容量 スループット SFP/SFP+ Cisco IOS L3 ルート登録数 対応シャーシ IPv4 IPv6 IPv4 IPv6 WSC4503-E WSC4506-E WSC4507R+E WSC4510R+E WS-X45-SUP7L-E 520 Gbps 225 Mpps 110 Mpps 2 IP Base 64K 32K ● ● ● - WS-X45-SUP7-E 848 Gbps 250 Mpps 125 Mpps 4 IP Base 256K 128K ● ● ● ● WS-X45-SUP8L-E 560 Gbps 225 Mpps 110 Mpps 4 IP Base 64K 32K ● ● ● - WS-X45-SUP8-E 928 Gbps 250 Mpps 125 Mpps 8 IP Base 256K 128K ● ● ● ● ■ Cisco Catalyst 4500E シリーズ用電源モジュール 製品型番 タイプ コネクタ 最大出力電力(冗長モード) 最大 PoE デバイス数(冗長モード) データ PoE PoE 15.4 W PoE+ 30 W UPOE 60 W PWR-C45-1000AC AC 1 1000 W + 40 W - - - - PWR-C45-1300ACV AC 1 1000 W + 40 W 800 W 48 24 12 PWR-C45-1400AC AC 1 1360 W + 40 W - - - - PWR-C45-2800ACV AC 1 1360 W + 40 W 1400 W 84 43 21 PWR-C45-4200ACV AC 2 1360 W + 40 W 1850 W(110 V)/ 3700 W(220 V) 223 114 57 PWR-C45-6000ACV AC 2 2200 W + 40 W 1850 W(110 V)/ 4800 W(220 V) 289 148 74 PWR-C45-9000ACV AC 3 1960 W + 40 W 2500 W(110 V)/ 7500 W(220 V) 384 232 116 ■ Cisco Catalyst 4500E シリーズ用ライン カード 製品型番 スロットあたり 帯域幅 ポート数 PoE 出力ポート Mac sec 省電力 GE SFP SFP/SFP+ mGig PoE+ UPOE (EEE) WS-X4648-RJ45-E 24 Gbps 48 - - - - - - - WS-X4648-RJ45V+E 24 Gbps 48 - - - 48 - - - WS-X4612-SFP-E 24 Gbps - 12 - - - - - - WS-X4624-SFP-E 24 Gbps - 24 - - - - - - WS-X4748-RJ45-E 48 Gbps 48 - - - - - ● ● WS-X4748-RJ45V+E 48 Gbps 48 - - - 48 - ● - WS-X4748-UPOE+E 48 Gbps 48 - - - 48 48 ※2 ● ● WS-X4748-12X48U+E 48 Gbps 36 - - 12 48 48 ※2 ● ● WS-X4712-SFP-E 48 Gbps - 12 - - - - ● - WS-X4724-SFP-E 48 Gbps - 24 - - - - ● - WS-X4748-SFP-E 48 Gbps - 48 - - - - ● - WS-X4712-SFP+E 48 Gbps - - 12 - - - ● - ■ Cisco Catalyst 4500E シリーズ バンドル 製品型番 バンドル アップグレード オプション シャーシ スーパバイザ エンジン ライン カード Cisco IOS WS-X4748-UPOE+E WS-X45-SUP8-E WS-X4748-RJ45V+E WS-X45-SUP8-E WS-X4748-UPOE+E WS-X45-SUP8-E WS-X4748-12X48U+E WS-C4503E-S7L+48V+ WS-C4503-E WS-X45-SUP7L-E WS-X4648-RJ45V+E LAN Base C4500E-S3-UPOE - C4500E-3NR-8E-UPOE C4500E-3NR-8E-MGIG WS-C4506E-S7L+96 WS-C4506-E WS-X45-SUP7L-E WS-X4648-RJ45-E x 2 LAN Base - - - WS-C4506E-S7L+96V+ WS-C4506-E WS-X45-SUP7L-E WS-X4648-RJ45V+E X 2 LAN Base C4500E-S6-UPOE - C4500E-6NR-8E-UPOE C4500E-6NR-8E-MGIG WS-C4507RE-S7L+96 WS-C4507R+E WS-X45-SUP7L-E WS-X4648-RJ45-E x 2 LAN Base - - - - WS-C4507RE+96V+ WS-C4507R+E WS-X45-SUP7L-E WS-X4648-RJ45V+E X 2 LAN Base C4500E-S7-UPOE C4500E-S7L-S8 C4500E-7R-S8E-UPOE C4500E-7R-S8E-MGIG WS-C4510RE-S7+96V+ WS-C4510R+E WS-X45-SUP7-E WS-X4748-RJ45V+E X 2 LAN Base C4500E-S7-UPOE - - - WS-C4510RE-S8+96V+ WS-C4510R+E WS-X45-SUP8-E WS-X4748-RJ45V+E X 2 LAN Base C4510RE-S8-UPOE - - C4510RE-S8-MGIG ■ Cisco Catalyst 4500E シリーズ用 Cisco IOS XE アップグレード ライセンス 製品型番 製品説明 L-C4500E-LB-IP バンドル用 IP Base ライセンス L-C4500E-IP-ES スーパバイザ エンジン用 Cisco IOS Enterprise Services ライセンス L-C4500E-LB-ES バンドル用 Cisco IOS Enterprise Services ライセンス ■ 主な特長 ● 10/100/1000 および mGig(銅線)、1 G/10 G(ファイバ)に対応する広範なインターフェ イス オプション ● Cisco IOS XE ユニバーサル イメー ジ 搭 載(LAN Base/IP Base/Enterprise Services 対応) ● ユニファイド アクセス データプレーン(UADP)ASIC 搭載(WS-X45-SUP8-E) ● 最大 100 台のワイヤレス アクセス ポイントを管理できるコントローラ機能を内蔵(WSX45-SUP8-E で IP Base/Enterprise Services に対応) ● Cisco VSS 対応(最大 1.6 Tbps のスイッチング容量) ● Cisco TrustSec 対応(MACsec/SGT/SGACL) ● 最大 928 Gbps のスイッチング容量(WS-X45-SUP8-E) ● スロットあたり最大 48 Gbps の帯域幅 ● 最大 250 Mpps の IPv4 スループット(WS-X45-SUP7-E/WS-X45-SUP8-E) ● 最大 125 Mpps の IPv6 スループット(WS-X45-SUP7-E/WS-X45-SUP8-E) ● Cisco Catalyst Multigigabit Technology(mGig)対応ダウンリンク ポート(WSX4748-12X48U+E) 24 スイッチ Cisco Catalyst 4500-X シリーズ SFP+ モジュール スロットを搭載した、L3 固定構成型スイッチです。キャンパス ネットワークでのス ペースに制約のある環境に、クラス最高レベルの拡張性、シンプルなネットワーク仮想化、そして統合 ネットワーク サービスを提供します。オプションのネットワーク モジュールによって、SFP+ モジュー ル スロットを増設できる拡張性も備えています。 ■ 主な特長 ● Cisco IOS XE ユニバーサル イメージ搭載(IP Base/Enterprise Services 対応) ● SDN/OpenFlow 1.3 対応 ● Cisco VSS 対応(最大 1.6 Tbps のスイッチング容量) ● Cisco TrustSec 対応ハードウェア(MACsec/SGT/SGACL) ● 最大 800 Gbps のスイッチング容量 ● 最大 250 Mpps の IPv4 スループット ● 最大 125 Mpps の IPv6 スループット ● SFP+ を 8 ポート備えたネットワーク モジュール(オプション) ※1 Cisco Catalyst 4500-X シリーズ用ネットワーク モジュールが必要。 ■ Cisco Catalyst 4500-X シリーズ 製品型番 SFP/SFP+ Cisco IOS L3 ルート登録数 マルチキャスト ルート 冷却ファン 電源 モジュール スロット数 ラック デフォルト 最大 IPv4 IPv6 IPv4 IPv6 マウント WS-C4500X-16SFP+ 16 24※1 IP Base 64K 32K 24K 12K 前面吸気/背面排気 2 1 RU WS-C4500X-F-16SFP+ 16 24※1 IP Base 64K 32K 24K 12K 背面吸気/前面排気 2 1 RU WS-C4500X-32SFP+ 32 40※1 IP Base 256K 128K 32K 32K 前面吸気/背面排気 2 1 RU WS-C4500X-F-32SFP+ 32 40※1 IP Base 256K 128K 32K 32K 背面吸気/前面排気 2 1 RU WS-C4500X-24X-IPB 24 24 IP Base 64K 32K 24K 12K 前面吸気/背面排気 2 1 RU WS-C4500X-24X-ES 24 24 Enterprise Services 64K 32K 24K 12K 前面吸気/背面排気 2 1 RU WS-C4500X-40X-ES 40 40 Enterprise Services 256K 128K 32K 32K 前面吸気/背面排気 2 1 RU ■ Cisco Catalyst 4500-X シリーズ用ネットワークモジュール 製品型番 製品説明 SFP/SFP+ ポート数 C4KX-NM-8SFP+ SFP+ モジュール スロット搭載ネットワーク モジュール 8 ■ Cisco Catalyst 4500-X シリーズ用電源モジュール 製品型番 製品説明 対応製品型番 C4KX-PWR-750AC-R 前面吸気 / 背面排気 750 W AC 電源モジュール WS-C4500X-16SFP+/WS-C4500X-32SFP+/ WS-C4500X-24X-IPB/WS-C4500X-24X-ES/WS-C4500X-40X-ES C4KX-PWR-750AC-F 背面吸気 / 前面排気 750 W AC 電源モジュール WS-C4500X-F-16SFP+/WS-C4500X-F-32SFP+ C4KX-PWR-750DC-R 前面吸気 / 背面排気 750 W DC 電源モジュール WS-C4500X-16SFP+/WS-C4500X-32SFP+/ WS-C4500X-24X-IPB/WS-C4500X-24X-ES/WS-C4500X-40X-ES C4KX-PWR-750DC-F 背面吸気 / 前面排気 750 W DC 電源モジュール WS-C4500X-F-16SFP+/WS-C4500X-F-32SFP+ ■ Cisco Catalyst 4500-X シリーズ用 Cisco IOS XE アップグレード ライセンス 製品型番 製品説明 対応製品型番 L-C4500X-16P-IP-ES 16/24 ポート IP Base モデル用 Cisco IOS Enterprise Services ライセンス WS-C4500X-16SFP+/WS-C4500X-F-16SFP+/WS-C4500X-24X-IPB L-C4500X-IP-ES 24 ポート IP Base モデル用 Cisco IOS Enterprise Services ライセンス WS-C4500X-32SFP+/WS-C4500X-F-32SFP+ Cisco Virtual Switching System(VSS) Cisco Virtual Switching System(VSS)は、2 台の Cisco Catalyst スイッチ を仮想的に 1 台の論理スイッチとして運用するためのクラスタ テクノロジーです。クラ スタを構成するスイッチのデータ プレーンとスイッチ ファブリックは、どちらも 100 % 稼動します。つまり、Cisco Catalyst スイッチの本来の性能比で 200 % のパフォー マンスを、1 台の論理スイッチで実現できます。また、パフォーマンスの向上だけでは なく、次のようなメリットも提供します。 ● シンプルなトポロジー(STP 不要のループがないネットワーク) 2 台の物理スイッチを 1 台の論理スイッチとして運用するため、物理スイッチ間に STP などの冗長プロトコルは必要ありません。 ● 単一のルーティング インスタンス 1 台の物理スイッチに障害が発生しても、もう 1 台の物理スイッチは稼働し続けるた め、ネットワークの切り替えやルーティング テーブルの再構築によるサービスの中断は ありません。 ●ネットワーク管理性 設定管理の対象が 2 台の物理スイッチではなく 1 台の論理スイッチであるため、ネッ トワーク管理者の負荷が軽減されます。 Cisco Virtual Switching System(VSS)は、Cisco Catalyst 4500-X/ 4500E/6500/6800 シリーズでサポートします。 物理構成 2 台の物理スイッチを 1 台の論理スイッチとして運用 単一の Cisco IOS、 単一の設定ファイルで設定管理 ルーティング テーブルなど ステート情報を共有 論理的なイメージ 25 ワイヤレス ルータ セキュリティ Meraki サービス スイッチ      ■ Cisco Catalyst 6500 シリーズ用ライン カード 製品型番 スロットあたり 帯域幅 ポート数 Mac sec VSL DFC4 搭載モデル DFC4XL 搭載モデル GE SFP SFP/SFP+ X2/SFP+ CFP/QSFP WS-X6824-SFP-2T WS-X6824-SFP-2TXL 20 Gbps - 24 - - - - - WS-X6848-TX-2T WS-X6848-TX-2TXL 40 Gbps 48 - - - - - - C6800-48P-TX C6800-48P-TX-XL 40 Gbps 48 - - - - - - WS-X6848-SFP-2T WS-X6848-SFP-2TXL 40 Gbps - 48 - - - - - C6800-48P-SFP C6800-48P-SFP-XL 40 Gbps - 48 - - - - - WS-X6816-10G-2T WS-X6816-10G-2TXL 40 Gbps - - - 16※1 - - ● C6800-8P10G C6800-8P10G-XL 80 Gbps - - 8 - 2※2 ● ● C6800-16P10G C6800-16P10G-XL 80 Gbps - - 16 - 4※2 ● ● C6800-32P10G C6800-32P10G-XL 80 Gbps - - 32 - 8※2 ● ● ■ Cisco Catalyst 6500 シリーズ用スーパバイザ エンジン 製品型番 スイッチング 容量 搭載 PFC 搭載 MSFC ポート数 Cisco IOS L3 ルート登録数 NetFlow SFP SFP/SFP+ X2 QSFP IPv4 IPv6 登録数 VS-S2T-10G 2.08 Tbps PFC4 MSFC5 3 - 2 - IP Base 256K 128K 256K VS-S2T-10G-XL 2.08 Tbps PFC4XL MSFC5 3 - 2 - IP Base 1024K 512K 1024K C6800-SUP6T 6 Tbps PFC4 MSFC5 - 8 - 2 IP Services 256K 128K 512K C6800-SUP6T-XL 6 Tbps PFC4XL MSFC5 - 8 - 2 IP Services 1024K 512K 1024K Cisco Catalyst 6500 シリーズ 3、4、6、7、または 13 スロットのシャーシを備えた、L3 モジュラ型スイッチです。コアレイヤでの配 置に最適な業界トップレベルのパフォーマンス、ワイヤレスやセキュリティなど豊富なネットワーク サービスの統合、および比類なき投資保護を実現します。 ■ 主な特長 ● Cisco IOS 搭載(IP Base/IP Services/Advanced IP Services/Advanced Enterprise Services 対応) ● Cisco VSS 対応(最大 4 Tbps のスイッチング容量) ● Cisco TrustSec 対応(MACsec/SGT/SGACL) ● 最大 2.08 Tbps のスイッチング容量 ● スロットあたり最大 80 Gbps の帯域幅 ● 最大 720 Mpps の IPv4 スループット(WS-C6513-E) ● 最大 390 Mpps の IPv6 スループット(WS-C6513-E) ● さまざまなサービス モジュールをサポート(Wireless Services Module 2、ASA Services Module など) ※1 SFP+ モジュールの装着には SFP+ コンバータ(CVR-X2-SFP10G)が必要。 ※2 QSFP モジュールの装着には、QSFP Active Optical ブレークアウト ケーブル(QSFP-4X10G-AOCxM)または QSFP コンバータ(CVR-4SFP10G-QSFP で対応予定)が必要。 ※3 電源入力モジュール(PEM-20A-AC+)が必要。 ■ Cisco Catalyst 6500 シリーズ バンドル 製品型番 バンドル シャーシ スーパバイザ エンジン ライン カード ファントレイ Cisco IOS VS-C6503E-SUP2T WS-C6503-E VS-S2T-10G - WS-C6503-E-FAN IP Services VS-C6504E-SUP2T WS-C6504-E VS-S2T-10G - FAN-MOD-4HS IP Services VS-C6506E-SUP2T WS-C6506-E VS-S2T-10G - WS-C6506-E-FAN IP Services VS-C6509E-SUP2T WS-C6509-E VS-S2T-10G - WS-C6509-E-FAN IP Services VS-C6509VE-SUP2T WS-C6509-V-E VS-S2T-10G - WS-C6509-V-E-FAN IP Services VS-C6513E-SUP2T WS-C6513-E VS-S2T-10G - WS-C6513-E-FAN IP Services ■ Cisco Catalyst 6500 シリーズ用ファントレイ 製品型番 製品説明 WS-C6503-E-FAN WS-C6503-E 用ファン トレイ FAN-MOD-4HS= WS-C6504-E 用ファン トレイ WS-C6506-E-FAN WS-C6506-E 用ファン トレイ 製品型番 製品説明 WS-C6509-E-FAN WS-C6509-E 用ファン トレイ WS-C6509-V-E-FAN WS-C6509-V-E 用ファン トレイ WS-C6513-E-FAN= WS-C6513-E 用ファン トレイ ■ Cisco Catalyst 6500 シリーズ用電源モジュール 製品型番 タイプ 電源コネクタ数 最大出力電力 対応シャーシ WS-C6503-E WS-C6504-E WS-C6506-E WS-C6509-E WS-C6509-V-E WS-C6513-E PWR-1400-AC ※ 3 AC 1 1400 W ● - - - - - PWR-2700-AC/4 AC 1 2700 W - ● - - - - WS-CAC-3000W AC 1 3000 W - - ● ● ● ● WS-CAC-6000W AC 2 6000 W - - ● ● ● ● WS-CAC-8700W-E AC 3 8700 W - - ● ● ● ● PWR-2700-DC/4 DC 2 2700 W - ● - - - - PWR-4000-DC DC 3 4000 W - - ● ● ● ● PWR-6000-DC DC 4 6000 W - - ● ● ● ● ■ Cisco Catalyst 6500 シリーズ用シャーシ 製品型番 IPv4 スループット スロット数 スーパバイザ エンジン 冗長性 最大ポート数(ラインカード搭載) 電源 モジュール スロット数 ラック スーパバイザ マウント エンジン 共用 ライン カード GE SFP SFP/ SFP+ 10GB-T X2/ SFP+ CFP/ QSFP WS-C6503-E 150 Mpps 1 1 1 ● 96 96 64 32 32 8/16 2 4 RU WS-C6504-E 210 Mpps 1 1 2 ● 144 144 96 64 64 12/24 2 5 RU WS-C6506-E 330 Mpps 1 1 4 ● 240 240 160 80 80 20/40 2 12 RU WS-C6509-E 510 Mpps 1 1 7 ● 384 384 256 128 128 32/64 2 15 RU WS-C6509-V-E 510 Mpps 1 1 7 ● 384 384 256 128 128 32/64 2 21 RU WS-C6513-E 720 Mpps 2 - 11 ● 528 528 352 176 176 44/88 2 20 RU 26 スイッチ      ■ Cisco Catalyst 6807-XL 用ライン カード 製品型番 スロットあたり 帯域幅 ポート数 Mac sec VSL DFC4 搭載モデル DFC4XL 搭載モデル GE SFP SFP/SFP+ X2/SFP+ CFP/QSFP WS-X6824-SFP-2T WS-X6824-SFP-2TXL 20 Gbps - 24 - - - - - WS-X6848-TX-2T WS-X6848-TX-2TXL 40 Gbps 48 - - - - - - C6800-48P-TX C6800-48P-TX-XL 40 Gbps 48 - - - - - - WS-X6848-SFP-2T WS-X6848-SFP-2TXL 40 Gbps - 48 - - - - - C6800-48P-SFP C6800-48P-SFP-XL 40 Gbps - 48 - - - - - WS-X6816-10G-2T WS-X6816-10G-2TXL 40 Gbps - - - 16※4 - - ● C6800-8P10G C6800-8P10G-XL 80 Gbps - - 8 - 2※5 ● ● C6800-16P10G C6800-16P10G-XL 80 Gbps - - 16 - 4※5 ● ● C6800-32P10G C6800-32P10G-XL 160 Gbps - - 32 - 8※5 ● ● ■ Cisco Catalyst 6807-XL 用スーパバイザ エンジン 製品型番 スイッチング 容量 搭載 PFC 搭載 MSFC ポート数 Cisco IOS L3 ルート登録数 NetFlow SFP SFP/SFP+ X2 QSFP IPv4 IPv6 登録数 VS-S2T-10G 2.08 Tbps PFC4 MSFC5 3 - 2 - IP Base 256K 128K 256K VS-S2T-10G-XL 2.08 Tbps PFC4XL MSFC5 3 - 2 - IP Base 1024K 512K 1024K C6800-SUP6T 6 Tbps PFC4 MSFC5 - 8 - 2 IP Services 256K 128K 512K C6800-SUP6T-XL 6 Tbps PFC4XL MSFC5 - 8 - 2 IP Services 1024K 512K 1024K 10/40/100 ギガビット イーサネットに最適化された L3 スイッチです。ラインアップには、 固定構成型の Cisco Catalyst 6840-X/6880-X シリーズ、モジュラ型 の Cisco Catalyst 6807-XL があります。 ■ 主な特長 ● Cisco IOS 搭 載(IP Base/IP Services/Advanced IP Services/Advanced Enterprise Services 対応)※1 ● Cisco VSS 対応(C6807-XL は最大 22.8 Tbps のスイッチング容量)。 ● Cisco TrustSec 対応(MACsec/SGT/SGACL) ● 最大 11.4 Tbps のスイッチング容量(C6807-XL) ● スロットあたり最大 880 Gbps の帯域幅(C6807-XL) ● 最大 300 Mpps の IPv4 スループット(C6880-X) ● 最大 150 Mpps の IPv6 スループット(C6880-X) ● 40 G QSFP の 2 つのネイティブ アップリンク ポートを搭載(C6824-X-LE-40G/ C6840-X-LE-40G) Cisco Catalyst 6800 シリーズ ※1 Cisco Catalyst 6840-X/6880-X シリーズは Cisco IOS IP Services/Advanced Enterprise Services に対応。 ※2 SFP/SFP+ モジュールの装着には、SFP+ 直接接続ブレークアウト ケーブル(QSFP-4SFP10G-CUxM、QSFP-4x10G-ACxM)または SFP+ Active Optical ブレークアウト ケーブル(QSFP-4X10G-AOCxM)が必要。 ※3 QSFP モジュールの装着には QSFP コンバータ(CVR-4SFP10G-QSFP で対応予定)が必要。 ※4 SFP+ モジュールの装着には SFP+ コンバータ(CVR-X2-SFP10G)が必要。 ※5 QSFP モジュールの装着には、QSFP Active Optical ブレークアウト ケーブル(QSFP-4X10G-AOCxM)または QSFP コンバータ(CVR-4SFP10G-QSFP で対応予定)が必要。 ■ Cisco Catalyst 6880-X シリーズ用電源モジュール 製品型番 製品説明 C6880-X-3KW-AC 3000 W AC 電源モジュール C6880-X-3KW-DC 3000 W DC 電源モジュール ■ Cisco Catalyst 6880-X シリーズ用ファントレイ 製品型番 製品説明 C6880-X-FAN Cisco Catalyst 6880-X シリーズ用ファン トレイ ■ Cisco Catalyst 6880-X シリーズ用シャーシ 製品型番 ポートカード スロット数 スイッチング 容量 最大ポート数 (ラインカード搭載) Cisco IOS L3 ルート登録数 NetFlow 登録数 電源 モジュール スロット数 ラック マウント SFP + QSFP※3 IPv4 IPv6 C6880-X-LE 4 2 Tbps 80 20 IP Services 256K 128K 512K 2 4.85 RU C6880-X 4 2 Tbps 80 20 IP Services 2048K 1024K 512K 2 4.85 RU ■ Cisco Catalyst 6880-X シリーズ用マルチレートポートカード 製品型番 スロットあたり 帯域幅 SFP/SFP+ L3 ルート登録数 マルチキャスト ルート Mac sec 対応シャーシ IPv4 IPv6 IPv4 IPv6 C6880-X-LE C6880-X C6880-X-LE-16P10G 80 Gbps 16 256K 128K 128K 128K ● ● - C6880-X-16P10G 80 Gbps 16 2048K 1024K 128K 128K ● - ● ■ Cisco Catalyst 6807-XL 用シャーシ 製品型番 スロット数 最大ポート数(ラインカード搭載) 電源 モジュール スロット数 ラック スーパバイザ マウント エンジン ライン カード GE SFP SFP/SFP+ 10GB-T X2/ SFP+ CFP/QSFP C6807-XL 2 5 240 240 160 80 80 20/40 4 10 RU ■ Cisco Catalyst 6807-XL 用電源モジュール 製品型番 製品説明 C6800-XL-3KW-AC 3000 W AC 電源モジュール ■ Cisco Catalyst 6807-XL 用ファントレイ 製品型番 製品説明 C6807-XL-FAN Cisco Catalyst 6807-XL 用ファン トレイ ■ Cisco Catalyst 6807-XL バンドル 製品型番 バンドル シャーシ スーパバイザ エンジン 電源モジュール ファントレイ Cisco IOS C6807-XL-S2T-BUN C6807-XL VS-S2T-10G C6800-XL-3KW-AC x 2 C6807-XL-FAN IP Services ■ Cisco Catalyst 6840-X シリーズ用シャーシ 製品型番 スイッチング 容量 ポート 最大ポート数 シスコ IOS L3 ルート登録数 NetFlow 登録数 電源 モジュール スロット数 ラック SFP/ マウント SFP+ QSFP SFP/ SFP+ QSFP IPv4 IPv6 C6816-X-LE 80 Gbps 16 - 16 4※3 IP Services 256K 128K 512K 2 2 RU C6832-X-LE 160 Gbps 32 - 32 8※3 IP Services 256K 128K 1024K 2 2 RU C6824-X-LE-40G 160 Gbps 24 2 24 + 8※2 2 + 6※3 IP Services 256K 128K 1024K 2 2 RU C6840-X-LE-40G 240 Gbps 40 2 40 + 8※2 2 + 10※3 IP Services 256K 128K 1536K 2 2 RU ■ Cisco Catalyst 6840-X シリーズ用電源モジュール 製製製 製品説明 C6840-X-750W-AC 750 W AC 電源モジュール C6840-X-1100W-AC 1100 W AC 電源モジュール 製品型番 製品説明 C6840-X-750W-DC 750 W DC 電源モジュール C6840-X-1100W-DC 1100 W DC 電源モジュール 27 ワイヤレス ルータ セキュリティ Meraki サービス スイッチ ■ Cisco Catalyst 4500 シリーズ用シャーシ 旧モデル 推奨モデル WS-C4503※1 WS-C4503-E WS-C4506※1 WS-C4506-E WS-C4507R-E※2 WS-C4507R+E WS-C4510R-E※2 WS-C4510R+E ■ Cisco Catalyst 4500 シリーズ用スーパバイザ エンジン 旧モデル 推奨モデル WS-X4516-10GE※3 WS-X45-SUP7L-E WS-X45-SUP8L-E WS-X45-SUP7-E WS-X45-SUP8-E WS-X45-SUP6L-E※4 WS-X45-SUP7L-E WS-X45-SUP8L-E WS-X45-SUP6-E※5 WS-X45-SUP7-E WS-X45-SUP8-E ■ Cisco Catalyst 4500 シリーズ用ライン カード 旧モデル 推奨モデル WS-X4148-RJ※6 WS-X4748-RJ45-E WS-X4248-RJ45V※7 WS-X4748-RJ45V+E WS-X4748-UPOE+E WS-X4748-12X48U+E WS-X4306-GB※8 WS-X4712-SFP-E WS-X4724-SFP-E WS-X4748-SFP-E WS-X4418-GB※9 WS-X4712-SFP-E WS-X4724-SFP-E WS-X4748-SFP-E WS-X4506-GB-T※9 WS-X4748-RJ45V+E WS-X4748-UPOE+E WS-X4712-SFP-E WS-X4724-SFP-E WS-X4748-SFP-E WS-X4548-GB-RJ45※3 WS-X4748-RJ45-E WS-X4524-GB-RJ45V※10 WS-X4748-RJ45V+E WS-X4748-UPOE+E WS-X4748-12X48U+E WS-X4548-GB-RJ45V※3 WS-X4748-RJ45V+E WS-X4748-UPOE+E WS-X4748-12X48U+E WS-X4548-RJ45V+※11 WS-X4748-RJ45V+E WS-X4748-UPOE+E WS-X4748-12X48U+E WS-X4648-RJ45-E※12 WS-X4748-RJ45-E WS-X4548-RJ45V+※11 WS-X4748-RJ45V+E WS-X4748-UPOE+E WS-X4748-12X48U+E WS-X4648-RJ45V+E※12 WS-X4748-RJ45V+E WS-X4748-UPOE+E WS-X4748-12X48U+E WS-X4612-SFP-E※12 WS-X4712-SFP-E WS-X4724-SFP-E WS-X4748-SFP-E WS-X4624-SFP-E※12 WS-X4712-SFP-E WS-X4724-SFP-E WS-X4748-SFP-E ■ Cisco Catalyst 6500/6800 シリーズ用シャーシ 旧モデル 推奨モデル WS-C6503※13 C6807-XL WS-C6506※13 C6807-XL WS-C6509※13 C6807-XL WS-C6509-NEB※14 WS-C6509-V-E WS-C6509-NEB-A※15 WS-C6509-V-E WS-C6513※16 WS-C6513-E ■ Cisco Catalyst 6500/6800 シリーズ用スーパバイザ エンジン 旧モデル 推奨モデル(PFC4) 推奨モデル(PFC4XL) WS-SUP32-GE-3B※17 VS-S2T-10G VS-S2T-10G-XL WS-SUP32-10GE-3B※17 VS-S2T-10G VS-S2T-10G-XL WS-SUP720-3B※18 VS-S2T-10G VS-S2T-10G-XL WS-SUP720-3BXL※18 - VS-S2T-10G-XL VS-S720-10G-3C※19 VS-S2T-10G VS-S2T-10G-XL VS-S720-10G-3CXL※19 - VS-S2T-10G-XL ■ Cisco Catalyst 6500/6800 シリーズ用ライン カード 旧モデル 推奨モデル(PFC4) 推奨モデル(PFC4XL) WS-X6148-FE-SFP※20 WS-X6848-SFP-2T C6800-48P-SFP WS-X6848-SFP-2TXL C6800-48P-SFP WS-X6148A-GE-TX※21 WS-X6848-TX-2T WS-X6848-TX-2TXL WS-X6548-GE-TX※20 WS-X6848-TX-2T WS-X6848-TX-2TXL WS-X6516A-GBIC※20 WS-X6824-SFP-2T WS-X6824-SFP-2TXL WS-X6724-SFP※19 WS-X6824-SFP-2T WS-X6824-SFP-2TXL WS-X6748-GE-TX※22 C6800-48P-TX C6800-48P-TX-XL WS-X6748-SFP※22 WS-X6848-SFP-2T C6800-48P-SFP WS-X6848-SFP-2TXL C6800-48P-SFP WS-X6716-10T-3C※19 - - WS-X6716-10T-3CXL※19 - - WS-X6716-10G-3C※19 WS-X6816-10G-2T C6800-16P10G - WS-X6716-10G-3CXL※19 - WS-X6816-10G-2TXL C6800-16P10G-XL WS-X6708-10G-3C※22 C6800-8P10G - WS-X6708-10G-3CXL※22 - C6800-16P10G-XL WS-X6908-10G-2T※22 C6800-8P10G - WS-X6908-10G-2TXL※22 - C6800-16P10G-XL WS-X6904-40G-2T※22 C6800-16P10G C6800-32P10G - WS-X6904-40G-2TXL※22 - C6800-16P10G-XL C6800-32P10G-XL WS-X6816-10T-2T※22 - - WS-X6816-10T-2TXL※22 - - Cisco Catalyst 4500/6500/6800 シリーズ移行ガイド ※1 詳細は cisco.com で「EOL6869」を検索。 ※2 詳細は cisco.com で「EOL8168」を検索。 ※3 詳細は cisco.com で「EOL8162」を検索。 ※4 詳細は cisco.com で「EOL9604」を検索。 ※5 詳細は cisco.com で「EOL8975」を検索。 ※6 詳細は cisco.com で「EOL9420」を検索。 ※7 詳細は cisco.com で「EOL9424」を検索。 ※8 詳細は cisco.com で「EOL8969」を検索。 ※9 詳細は cisco.com で「EOL7380」を検索。 ※10 詳細は cisco.com で「EOL6879」を検索。 ※11 詳細は cisco.com で「EOL9426」を検索。 ※12 詳細は cisco.com で「EOL10936」を検索。 ※13 詳細は cisco.com で「EOL3037」を検索。 ※14 詳細は cisco.com で「EOL6564」を検索。 ※15 詳細は cisco.com で「EOL6720」を検索。 ※16 詳細は cisco.com で「EOL8193」を検索。 ※17 詳細は cisco.com で「EOL7769」を検索。 ※18 詳細は cisco.com で「EOL8147」を検索。 ※19 詳細は cisco.com で「EOL9892」を検索。 ※20 詳細は cisco.com で「EOL7770」を検索。 ※21 詳細は cisco.com で「EOL9058」を検索。 ※22 詳細は cisco.com で「EOL10550」を検索。 28 スイッチ ポート Cisco Catalyst スイッチは、アップリンクおよびダウンリンクで次のインターフェイス のポートをサポートします。 ● ファスト イーサネット ポート(FE) ● ギガビット イーサネット ポート(GE) ● マルチギガビット イーサネット ポート(mGig) ● SFP モジュール スロット(SFP) ● デュアルパーパス ポート(GE/SFP) ● 10GBASE-T ポート(10GB-T) ● X2 モジュール スロット(X2) ● SFP+ モジュール スロット(SFP/SFP+) ● CFP モジュール スロット(CFP) ● QSFP モジュール スロット(QSFP) カッコで囲まれた表記は、本カタログの仕様比較表などで使用する略称です。デュアル パーパス ポートはギガビット イーサネット ポートと SFP モジュール スロットを組み合 わせたインターフェイスで、GE/SFP として表記されています(どちらか一方だけをア クティブにできます)。同様に、SFP+ モジュール スロットは SFP との互換性がある ため、SFP/SFP+ として表記されています。また、X2 モジュール スロット、CFP モ ジュール スロット、QSFP モジュール スロットには、各種コンバータを使用することで SFP モジュールや SFP+ モジュールを装着できます。 ● アップリンク ・ギガビット イーサネット ポート(GE) ・SFP モジュール スロット(SFP) ・デュアルパーパス ポート(GE/SFP) ・10GBASE-T ポート(10GB-T) ・SFP+ モジュール スロット(SFP/SFP+) ・QSFP モジュール スロット(QSFP) ● ダウンリンク ・ファスト イーサネット ポート(FE) ・ギガビット イーサネット ポート(GE) ・マルチギガビット イーサネット ポート(mGig) ・SFP モジュール スロット(SFP) ・SFP+ モジュール スロット(SFP/SFP+) ■ 固定構成型 Cisco Catalyst スイッチがサポートするポート(例) モジュール & アクセサリ ※1 LAN Lite モデルは非対応。 ※2 IP Lite モデルは非対応。 ※3 Mini モデルのみ対応。 ※4 Cisco Catalyst 6880 シリーズおよび Cisco Catalyst 6807-XL は非対応。 ※5 Catalyst 6880-X は非対応。 ■ Cisco Redundant Power System(RPS)2300 製品型番 製品説明 対応シリーズ スモール 2960-CX 3560-CX 2960-P 2960-L 2960-X 3650 3850 4500E 4500-X 6500 6800 PWR-RPS2300 Cisco RPS 2300 シャーシ - - - ● - ●※1 ※2 ●※3 - - - - ●※4 C3K-PWR-750WAC Cisco RPS 2300 用 750 W AC 電源モジュール - - - ● - ●※1 ※2 ●※3 - - - - ●※4 CAB-RPS2300= Cisco RPS 2300 用 14 ピン スペア RPS ケーブル - - - ● - - - - - - - - CAB-RPS2300-E= Cisco RPS 2300 用 22 ピン スペア RPS ケーブル - - - - - ●※1 ※2 ●※3 - - - - ●※4 ■ Cisco トランシーバ モジュール 製品型番 製品説明 対応シリーズ スモール 2960-CX 3560-CX 2960-P 2960-L 2960-X 3650 3850 4500E 4500-X 6500 6800 GLC-GE-100FX 100BASE-FX SFP モジュール - ● ● ● ● ● ● ● ● - ● ● GLC-T 1000BASE-T SFP モジュール - - - ● ● ● ● ● ● ● ● ● MGBSX1 1000BASE-SX SFP モジュール ● ● ● ● ● ● ● ● ● ● ● ● GLC-SX-MMD 1000BASE-SX SFP モジュール(DOM) - ● ● ● ● ● ● ● ● ● ● ● GLC-LH-SMD 1000BASE-LX SFP モジュール(DOM) ● ● ● ● ● ● ● ● ● ● ● ● MGBLH1 1000BASE-LH SFP モジュール ● ● ● ● ● ● ● ● ● ● ● ● GLC-BX-D 1000BASE-BX SFP モジュール(1490 nm) - ● ● ● ● ● ● ● ● ● ● ● GLC-BX-U 1000BASE-BX SFP モジュール(1310 nm) ● ● ● ● ● ● ● ● ● ● ● ● GLC-EX-SMD 1000BASE-EX SFP モジュール - ● ● - - ● ● ● ● ● ● ● GLC-ZX-SMD 1000BASE-ZX SFP モジュール - ● ● ● ● ● ● ● ● ● ● ● SFP-10G-SR 10GBase-SR SFP+ モジュール - - ● - - ● ● ● ● ● ● ● SFP-10G-LR 10GBase-LR SFP+ モジュール - - ● - - ● ● ● ● ● ● ● SFP-10G-LRM 10GBASE-LRM SFP モジュール - - ● - - ● ● ● ● ● ● ● SFP-10G-ER 10GBASE-ER SFP+ モジュール - - ● - - ● ● ● ● ● ● ● X2-10GB-CX4 10GBASE-CX4 X2 モジュール - - - - - - - - ● - ● ●※5 X2-10GB-LRM 10GBASE-LRM X2 モジュール - - - - - - - - ● - ● ●※5 X2-10GB-SR 10GBASE-SR X2 モジュール - - - - - - - - ● - ● ●※5 X2-10GB-LR 10GBASE-LR X2 モジュール - - - - - - - - ● - ● ●※5 X2-10GB-ER 10GBASE-ER X2 モジュール - - - - - - - - ● - ● ●※5 X2-10GB-ZR 10GBASE-ZR X2 モジュール - - - - - - - - ● - ● ●※5 CVR-X2-SFP X2 モジュール用 TwinGig コンバータ - - - - - - - - ● - - - CVR-X2-SFP10G X2 モジュール用 SFP+ コンバータ - - - - - - - - ● - ● ●※5 CFP-40G-SR4 40GBASE-SR4 CFP モジュール - - - - - - - - - - ● ●※5 CFP-40G-LR4 40GBASE-LR4 CFP モジュール - - - - - - - - - - ● ●※5 CVR-CFP-4SFP10G CFP モジュール用 FourX SFP+ コンバータ - - - - - - - - - - ● ●※5 CVR-QSFP-SFP10G QSFP モジュール用 SFP/SFP+ コンバータ - - - - - - - - - - ● ●※5 CVR-4SFP10G-QSFP SFP+ モジュール用 QSFP コンバータ - - - - - - - ● ● ● ● ● 29 ワイヤレス ルータ セキュリティ Meraki サービス スイッチ ワイヤレス アクセス ポイント/コントローラ ワイヤレス Cisco Mobility Express Cisco Mobility Express は、シスコ ワイヤレス ソリューションの新しい展開モードです。 小規模ネットワーク向けに、簡単かつコストを抑えながら、エンタープライズクラスの無線 LAN を提供するために設計されました。Cisco Mobility Express は、オンプレミスで集 中管理型の無線 LAN を実現するソリューションであり、次のような特長があります。 ● 仮想コントローラ機能を Cisco Aironet 1830/1850/2800/3800/1560 シリー ズでサポート ● 仮想コントローラの管理対象は、Cisco Aironet 1600/1700/2600/2700/3600/ 3700 シリーズなど、従来のモデルも含めた Cisco Aironet アクセス ポイント ● 10 分以内での設定を可能にする 3 ステップ セットアップ ウィザード ● 最大 25 のアクセス ポイントと最大 500 のクライアントをサポート Cisco Mobility Express では、仮想コントローラ機能を実行する 1 台のアクセス ポイント (AP)がマスター AP として指定されて、その他の AP は管理対象 AP としてマスター AP に関連づけられます。マスター AP はワイヤレス コントローラとして動作して、管理対象 AP を管理および制御するだけでなく、通常の AP と同様にクライアントに無線 LAN 接続も提 供します。管理対象 AP は通常の集中管理型(lightweight)AP として動作して、クライア ントに無線 LAN 接続を提供します。 Cisco Wireless Release 8.3 用 Cisco Mobility Express ソフトウェア Cisco Wireless Release 8.3 では、Cisco Mobility Express ソフトウェアに次の新 機能が導入されています。 ● Cisco CMX Cloud:Cisco Mobility Express と CMX Cloud のシンプルな Web ユーザ インターフェイス(UI)で、ゲスト アクセスおよびプレゼンス分析用の CMX Connect を使用できます。 ● 初期設定ウィザードに自動リダイレクト:ブラウザに IP アドレスを入力しなくても、 Cisco Mobility Express の Web UI にアクセスしてセットアップできます。 ● 内蔵 DHCP サーバ:外部 DHCP サーバは不要です。 ● NTP サーバ プールと OpenDNS:3 つの NTP サーバ プールが自動的に設定されて、 OpenDNS を使用して名前解決されます。 ● Web UI での RF 最適化:Web UI に RF 最適化機能が追加されています。パラメー タは RF 特性の変化に応じて変更できます。 ● Web UI の SNMP v3:Web UI で SNMP v2c/v3 がサポートされています。CLI からも v1 を含めて設定できます。 ● オンライン ソフトウェア更新:ソフトウェアは cisco.com から AP に直接ダウンロード されます。ローカルにダウンロードして解凍したり、TFTP パラメータを設定したりする 必要はありません。 ● Mobility Express Network に AP を自動的に追加:AP は cisco.com からコー ドを自動的にダウンロードしてネットワークに参加します。手動操作は不要です。 ● Mobility Express を強制的にフェールオーバー:Web UI から、任意の管理対象 AP でコントローラ機能を有効化できます。 ● 11ac Wave 2 AP のスタンドアロン モードで復元力を強化:11ac Wave 1 AP と 同様に、11ac Wave 2 AP でもスタンドアロン モードがサポートされます。マスター AP がオフラインになった場合でも、これらの AP に接続しているクライアントは接続し たままになり、ローカルでのデータ送受信が継続されます。 ● カスタマイズされたゲストポータル:CMX Connect によってカスタム ポータルとソー シャル ログインがサポートされます。 3 ステップ セットアップ ウィザード マスター AP ワイヤレス コントローラ として動作 Aironet 1830/1850 2800/3800/1560 従来のモデルも含めた Aironet アクセス ポイント 管理対象 AP 通常の集中管理型 AP として動作 ■ Web ユーザ インターフェイスでの RF 最適化 ■ Web ユーザ インターフェイスでのアクセス ポイント管理 30 ワイヤレス Cisco High Density Experience(HDX)テクノロジー ※1 Cisco Aironet 2800/3800 シリーズのみ対応。 シスコは IEEE 802.11ac(11ac)による無線 LAN のパフォーマンス向上と密度の増大に 対応するために、Cisco Aironet 1560/1570/2700/2800/3700/3800 シリーズに Cisco High Density Experience(HDX)テクノロジーを導入しました。Cisco HDX は、これらのシスコ製品のために設計された ASIC(専用カスタム チップ)によるハードウェ ア ベースのソリューションです。次のような一連の機能によって、クライアント密度が高いネッ トワーク向けに、パフォーマンス調整、RF 干渉の緩和、スペクトル モニタリング、ローミン グ最適化を提供します。 ● フレキシブル ラジオ アサインメント & デュアル 5 GHz※1 :RF 環境に基づいてアクセ ス ポイント(デュアル無線)の動作モードをインテリジェントに決定、無線 LAN をリア ルタイムで最適化します。デュアル 5 GHz 動作モードでは、デュアル無線の両方が 5 Ghz で動作します。このときの合計データレートは最大 5.2 Gbps(2 x 2.6 Gbps) です。 ● ターボ パフォーマンス:本体だけでなくラジオごとにも CPU とメモリを搭載、メディア リッチなビデオやインタラクティブなトラフィックを実行する 60 台以上の 11 ac クライ アントを、パフォーマンスを低下させることなくサポートします。 ● 11ac 対 応 Cisco ClientLink:11ac の 標準規格 Explicit Compressed Beamforming Feedback(ECBF)を補完するシスコ独自のビームフォーミング テク ノロジーで、従来の 11a/g/n 対応クライアントも含めて通信パフォーマンスを向上さ せます。 ● 11ac 対応 Cisco CleanAir:11ac Wave 1 の最大 80 MHz チャネルおよび 11ac Wave 2 の最大 160 MHz チャネルに対応した Cisco CleanAir で、チャネ ル帯域幅の拡大に伴う電波干渉の可能性を最小化します。 ● ローミングの最適化:すべてのクライアントの接続品質を監視して、パフォーマンスが低 下しているクライアントには適切な接続を探すように早い段階から促すことで、ユーザ エクスペリエンスの低下を防止します。 ● 動的な帯域幅選択:レーダー信号を検出した場合に現在のチャネルすべてを変更する のではなく、チャネル帯域幅を自動的かつインテリジェントに構成して回避します。 ● ゼロインパクト AVC※1 :専用のハードウェア アクセラレーションを使用することで、通 信速度に影響を与えずにアプリケーションを可視化および制御できます。 11ac 対応 Cisco CleanAir Cisco CleanAir は、自己回復および自己最適化する無線 LAN 環境を構築できる、集 中管理型ワイヤレス ソリューションの革新的なテクノロジーです。 電波干渉の原因を特定するために、従来のテクノロジーでは、ネットワーク管理者がセン サーを備えたノート PC を持って動き回る必要がありました。Cisco CleanAir では、ASIC (専用カスタム チップ)を搭載した Cisco Aironet アクセス ポイント自体が無線環境の計 測器やアナライザーとしての役割を兼ね備えているだけでなく、Cisco Aironet アクセス ポイントから得られた情報が可視化されて提供されるため、ネットワーク管理者はデスクに いながら原因を特定し、迅速かつ効率的に問題を解決できます。また、電波干渉検出後に 周波数帯を自動最適化して問題を緩和する、電波資源管理機能も提供します。 Cisco Aironet 1570/2700/3700 シリーズは、11ac Wave 1 の 80 MHz チャネル 帯域幅、Cisco Aironet 1560/2800/3800 シリーズは、11ac Wave 2 の 160 MHz チャネル帯域幅をサポートしています。 11ac 対応 Cisco ClientLink 低速なクライアント(たとえば 11a/g 対応クライアント)と高速なクライアント(たとえば 11n/ ac 対応クライアント)が混在する環境では、低速なクライアントによって無線 LAN 全体の 通信パフォーマンスが低下します。Cisco Aironet アクセス ポイントが実装する Cisco ClientLink は、チップセットに組み込まれた信号処理拡張機能によってクライアントか らのアップリンク通信の信号を解析、ダウンリンク通信の信号を強化および最適化し、低 速なクライアントの通信パフォーマンスを向上させるテクノロジーです。Cisco Aironet 1560/1570/2700/2800/3700/3800 シリーズが実装する Cisco ClientLink 3.0/4.0 では、アクセス ポイントの 3 本目または 4 本目のアンテナによって、iPhone や iPad、最 新のノート PC も含めて、対応データ ストリーム数が 3 ストリームまでの 11n/ac 対応クラ イアントの通信パフォーマンスも向上させます。 n a/g n n n 11a/b/g/n/ac デバイスが混在する環境で あらゆるデバイスのスループットおよびチャネル容量が向上 デバイス側での特別なテクノロジーの実装は不要 ac IEEE 802.11ac IEEE 802.11ac(11ac)は、現在の主流である無線規格 IEEE 802.11n(11n)の後継規 格です。理論値で最大 600 Mbps の 11n に対して、最大 6.9 Gbps という有線 LAN をも凌駕する通信速度を実現します。11ac は次の 3 点を強化することで、通信速度を高 めています。 ● より高密度の変調方式:64QAM から 256QAM(11n)に増加 ● チャネル ボンディングの拡張:最大 40 MHz(11n)から最大 80 MHz(11ac Wave 1) さらには最大 160 MHz(11ac Wave 2)に増加 ● より進化した MIMO(Multiple Input Multiple Output):11n の最大 4 データ ストリー ムから最大 8 データ ストリームに増加、11n の 1 対 1 同時通信から 1 対 n 同時通 信に増加(マルチユーザ MIMO) シスコのワイヤレス アクセス ポイントでは、Cisco WAP150/361 および Cisco Aironet 1700/1810/1810W/1830 シリーズ、Cisco WAP571 および Cisco Aironet 1560/1570/2700/3700 シリーズ、Cisco Aironet 1850 シリーズ、 Cisco Aironet 2800/3800 シリーズが 11ac 規格対応製品であり、理論値でそ れぞれ最大 867 Mbps、1.3 Gbps、1.7 Gbps、2.6 Gbps を実現します。 ■ IEEE 802.11n/ac 仕様比較 規格 / データ ストリーム数 理論値による通信速度 20 MHz 40 MHz 80 MHz 160 MHz IEEE 802.11n 1 ストリーム 72 Mbps 150 Mbps - - 2 ストリーム 144 Mbps 300 Mbps - - 3 ストリーム 216 Mbps 450 Mbps - - 4 ストリーム 288 Mbps 600 Mbps - - IEEE 802.11ac 1 ストリーム - 200 Mbps 433 Mbps 866 Mbps 2 ストリーム - 400 Mbps 866 Mbps 1733 Mbps 3 ストリーム - 600 Mbps 1299 Mbps 2600 Mbps 4 ストリーム - 800 Mbps 1733 Mbps 3466 Mbps 5 ストリーム - 1000 Mbps 2166 Mbps 4333 Mbps 6 ストリーム - 1200 Mbps 2599 Mbps 5200 Mbps 7 ストリーム - 1400 Mbps 3033 Mbps 6066 Mbps 8 ストリーム - 1600 Mbps 3466 Mbps 6933 Mbps 31 スイッチ ルータ セキュリティ Meraki サービス ワイヤレス Cisco Connected Mobile Experiences(CMX)ソリューション ■ Cisco CMX Cloud Cisco CMX Cloud は、シスコのワイヤレス インフラストラクチャとのシームレスな統合 によって、ワイヤレス ゲストアクセスと構内の分析に変革をもたらします。 クラウドで提供される Software-as-a-Service(SaaS)のため、迅速に導入および簡 単に使用できるだけでなく、サブスクリプション形式の課金モデルによって、デバイス コスト (資本コスト)と IT リソースの初期投資を節約できます。Cisco CMX Cloud によって、次 のことが可能になります。 ● 施設内のすべての Wi-Fi デバイスを検出して、滞在時間、新規顧客とリピート顧客の 対比、ピーク時間など、それらのデバイスのプレゼンスに関する分析結果を提供します。 ● ソーシャル、セルフ登録、ショートメッセージ サービス(SMS)など、各種の認証方式 に対応したカスタマイズ可能なポータル ページによって、顧客が利用しやすいゲスト アクセス ソリューションを実現します。 ● ロケーションベースのコンテンツを提供するゲスト ポータル ページやモバイル アプリ で顧客に直接対応できます。 ■ 顧客エンゲージメント どの業種でも、より高い価値の提供によって新規顧客を獲得し、既存顧客を維持することが、 継続的に成長するうえで欠かせません。Cisco CMX は、モバイル ユーザの顧客に無線 LAN 接続を提供します。これによって、直接的なコミュニケーション チャネルを開き、顧客 の希望について理解を深め、顧客が希望するものを提供できるようにします。顧客エンゲー ジメントの効果が高くなると、次のことが可能になります。 ● パーソナライズされたエクスペリエンスを提供することで、既存顧客のロイヤルティを 向上させる、および新規顧客を獲得する。 ● 施設に滞在している間、ワイヤレス アクセスと重要な情報を提供して顧客のエクスペリ エンスを高める。 ● ソーシャル メディアへのチェックインとフィード ストリーミングによって、ブランドの露出 を向上させる。 ● 顧客がよりニーズに合った意思決定をできるようにして、満足度を向上させる。 ■ 施設内の効率性 Cisco CMX によって、顧客の施設での実際の行動をより深く理解し、フロア プランを最 大限に活用できるようになります。顧客の行動を明解に理解できると、次のことが可能にな ります。 ● 顧客の行き来が最も多い場所を特定して、広告、製品、サービスを配置する。 ● 施設のレイアウトを調整して、使用率が高いときのトラフィックフローを最適化する。 ● サービスを提供する場所にスタッフを配置して、顧客の流れや時間帯に対応する。 ● フロア プランの調整の影響を評価する。 Cisco CMX ソリューションは、顧客とビジネスに最適な情報を的確なタイミングで提供し ます。 ■ Cisco CMX for Facebook Wi-Fi また、Cisco CMX の新たなサービスとして、シスコは Facebook との協業で、Cisco CMX for Facebook Wi-Fi の提供を開始しています。このサービスを導入しているホテ ルや店舗などでは、Wi-Fi ユーザがネットワークにアクセスしてその施設にチェックインする と、無料で無線 LAN が利用できるようになります。ユーザに利便性を提供できるだけでな く、チェックインの増加による顧客認知度の向上や、Facebook が匿名で収集した顧客情 報に基づくマーケティングなど、さまざまなビジネス上の効果をもたらすソリューションです。 ■ ロケーション分析 Wi-Fi デバイスの信号を匿名で検出および追跡することで、Wi-Fi ユーザの数や行動を 取得・集計・可視化して分析できる機能です。 たとえばコペンハーゲン国際空港の事例では、乗降客(Wi-Fi ユーザ)の出発/到着それぞ れにおける一般的な移動経路や滞留エリア/時間を分析し、さまざまな行動パターンを把 握できるようになりました。これによって、たとえば混雑状況に合わせた人員配置の最適化 や利便性が高い施設レイアウト調整が可能となり、顧客満足度が高いサービスをコスト効率 よく提供できるようになりました。また、広告配置の最適化による効果的な集客も可能となり、 免税店などテナントの収益アップにも貢献しています。 ■ 導線情報や滞留時間など、多様な分析手段を提供 ■ Cisco Connected Mobile Experiences(CMX)Cloud 製品型番 説明 製品型番 製品説明 AIR-CMX-SVC-CX ※ 1 CMX クラウド コネクタ。 AIR-CMX-SVC-CPAX ※ 1 プレセンス分析機能搭載 CMX クラウド コネクタ。 ※1 AIR-CMX-CLOUD が必要。 複数の導入オプション、同一のソフトウェア 分析 検出 エンゲージ 接続 導入と利用が簡単 高度な使用例に最適 優れた制御 CMX オンプレミス CMX Cloud Cisco Connected Mobile Experiences(CMX)は、スマートフォンやタブレットなど、 無線 LAN(Wi-Fi)デバイスの位置情報を収集/解析してビジネスに活用できる、画期的な ソリューションです。小売、サービス、運輸、医療、教育、官公庁など、幅広い業種で、無 線 LAN のマネタイズ(収益化)をサポートします。海外ではすでに多数の導入実績があり、 日本でも Interop Tokyo 2013/2014 などで実証実験の成果が得られているほか、商業 ベースの導入も計画されています。 Cisco CMX には、次のようなサービスがあります。 Cisco CMX の詳細は、次の Web サイトをご覧ください。 http://www.cisco.com/jp/go/cmx 32 ワイヤレス ワイヤレス製品ライン Cisco WAP & Aironet アクセス ポイント ■ 屋内用アクセス ポイント Cisco WAP ワイヤレス アクセス ポイントおよび Cisco Aironet アクセス ポイントの 屋内用モデルは、全モデルが IEEE 802.11n 規格対応、さらに複数のモデルが IEEE 802.11ac 規格対応で、理論値で最大 300 Mbps ~ 2.6 Gbps の高速かつ安定した 無線 LAN 環境を実現します。一般的なオフィス向けに、アンテナ内蔵の流線型フォルムと PoE(Power over Ethernet)による LAN と電源のケーブル一本化によって、オフィスの 美観を損ねずにスマートに設置できるモデル、工場や倉庫、店舗など、厳しい要件がある 環境向けに、堅牢な金属製シャーシと広範囲の動作温度をサポートし、設置環境に最適な さまざまなアンテナを選択できるモデル、在宅勤務者やサテライト オフィス向けに、本社オ フィスと同等のセキュリティとネットワーク サービスを提供するモデルなど、豊富なラインアッ プがあります。 くわしくは、34 ~ 35 ページをご覧ください。 ■ 屋外用アクセス ポイント Cisco Aironet アクセス ポイントの屋外用モデルは、都市規模の広範なエリア、企業の 構内、工場の敷地、採掘現場など、さまざまな場所で高速かつ安定した無線 LAN 環境を 実現します。幅広いラインアップの屋外モデルは、IEC 規格 IP67 準拠の防水性と NEMA 規格 Type 4X 準拠の屋外耐じん性と耐食性を備えたシャーシで、過酷な環境にも安心し て設置できるだけでなく、周辺環境に溶け込む小型で洗練された外観の軽量モデル、たと えば監視カメラなどに電力を供給できる PoE 給電対応モデル、既存のケーブル ネットワー クを利用できるケーブル モデム搭載モデルなど、多種多様なニーズに応えます。 くわしくは、36 ページをご覧ください。 モビリティ サービス & ネットワーク管理ツール モバイル デバイスの位置情報を収集するなど、さまざまなモビリティ サービスを提供す る Cisco Mobility Services Engine(MSE)、および無線 LAN 環境を可視化して 運用管理を大幅に簡素化する Cisco Prime Infrastructure は、いずれも Cisco CleanAir の重要なコンポーネントです。 くわしくは、41 ページをご覧ください。 Cisco ワイヤレス コントローラ Cisco ワイヤレス コントローラは、リモート拠点も含めた複数の Cisco Aironet アクセス ポイントを集中管理できるプラットフォームです。Cisco Aironet アクセス ポイントの導入 および追加に必要な設定管理を自動化することによって、ネットワーク管理者の負荷を軽減 するだけでなく、Cisco Aironet アクセス ポイントのロード バランシングや無線環境の変 化への迅速かつ動的な対応など、安定した無線 LAN 環境を構築するために必要な制御 機能を提供します。 くわしくは、39 ~ 40 ページをご覧ください。 33 スイッチ ルータ セキュリティ Meraki サービス ワイヤレス 屋内用アクセス ポイント ■ Cisco 100 シリーズ ワイヤレス アクセス ポイント 寸法(高さ x 幅 x 奥行):3.81 x 13.49 x 13.49 cm 重量:0.35 kg※1 製品型番 SPS クラスタ数 Clean Air Office Extend Client Link Band Select IEEE 802 ポート数 PoE 受電※ 2 アンテナ 11n 11ac GE mGig 802.3af 802.3at WAP131-J-K9-JP - - - - - ● - 1 - ● ● 内蔵 WAP150-J-K9-JP 4 - - - - ● ● 1 - ● ● 内蔵 ■ Cisco 500 シリーズ ワイヤレス アクセス ポイント 寸法(高さ x 幅 x 奥行):3.99 x 22.99 x 22.99 cm 重量:0.78 kg 製品型番 SPS クラスタ数 Clean Air Office Extend Client Link Band Select IEEE 802 ポート数 PoE 受電 アンテナ 11n 11ac GE mGig 802.3af 802.3at WAP571-J-K9 16 - - - - ● ● 2 - ●※6 ● 内蔵 ■ Cisco 300 シリーズ ワイヤレス アクセス ポイント 寸法(高さ x 幅 x 奥行):4.57 x 16.51 x 11.00 cm 重量:0.48 kg 製品型番 SPS クラスタ数 Clean Air Office Extend Client Link Band Select IEEE 802 ポート数 PoE 受電※ 3 アンテナ 11n 11ac GE mGig 802.3af 802.3at WAP361-J-K9-JP 8 - - - - ● ● 5※4 ※5 - ● ● 内蔵 ※1 WAP131 は、寸法(高さ x 幅 x 奥行き):3.59 x 17.00 x 17.00 cm、重量:0.40 kg。 ※2 PoE 受電を使用しない場合は 同梱の電源アダプタまたは別売のパワー インジェクタ(SB-PWR-INJ2-JP)が必要。  ※3 PoE 受電を使用しない場合は、別売の電源アダプタ(SB-PWR-48V-JP)またはパワー インジェクタ(SB-PWR-INJ2-JP)が必要。  ※4 WAN 専用ポートを含む。 ※5 PoE 給電対応 GE x 1 を含む。 ※6 PoE 受電では一部の機能に制限(詳細はデータシート)。  ■ Cisco WAP & Aironet 屋内用アクセス ポイント Cisco WAP & Aironet 屋内用アクセス ポイントは、全モデルが IEEE 802.11n 規格 対応、さらに複数のモデルが IEEE 802.11ac 規格対応で、理論値で最大 300 Mbps ~ 2.6 Gbps の高速かつ安定した無線 LAN 環境を実現するワイヤレス アクセス ポ イントです。設置環境やネットワーク要件に応じて自由に選択できる豊富なラインアッ プがあります。 ● アンテナ内蔵モデル:流線型フォルムと PoE(Power over Ethernet)による LAN と電源のケーブル一本化によって、オフィス環境にマッチするスタイリッシュ な設置が可能になります。 ● アンテナ外付けモデル:工場や倉庫、店舗など、厳しい要件がある環境向けに、 堅牢な金属製シャーシと広範囲の動作温度をサポートし、設置環境に最適なさまざ まなアンテナを選択できます(Cisco Aironet アンテナ の詳細は、37 ~ 38 ペー ジをご覧ください)。 Cisco WAP ワイヤレス アクセス ポイントには、コントローラが不要のシングル ポイン ト セットアップ(SPS)によって、複数のアクセス ポイントを簡単に導入できるモデルが あります。 Cisco Aironet 屋内用アクセス ポイントに は、自律型モデルまたは Mobility Express(テクノロジーの詳細は 30 ページ)と集中管理型モデルがあります。集中管 理型モデルは、Cisco ワイヤレス コントローラと連係して動作します。 ■ 主な特長 ● IEEE 802.11n 対応(全モデル) ● IEEE 802.11ac Wave 1 対応(Cisco WAP 150/361/571 および Cisco Aironet 1700/2700/3700 シリーズ) ● IEEE 802.11ac Wave 2 対応(Cisco Aironet 1810/1810W/1830/1850/ 2800/3800 シリーズ) ● 2.4 GHz/5 GHz デュアル バンド対応(全モデル) ● Cisco CleanAir Express 対応( Cisco Aironet 1700 シリーズの集中管理 型モデル) ● Cisco CleanAir 対応(Cisco Aironet 2700/2800/3700/3800 シリーズ の集中管理型モデル。テクノロジーの詳細は 31 ページ) ● Cisco OfficeExtend 対応(一部のモデルを除く集中管理型モデル) ● Cisco ClientLink 対応(一部のモデルを除く、テクノロジーの詳細は 31 ページ) ● Cisco BandSelect 対応(一部のモデルを除く集中管理型モデル) Cisco WAP & Aironet アクセス ポイント 小規模向け WAP 中~大規模向け Aironet 2.6 Gbps Aironet 2800 Aironet 3800 1.7 Gbps Aironet 1850 1.3 Gbps WAP571 Aironet 2700 Aironet 3700 867 Mbps WAP150 WAP361 Aironet 1700 Aironet 1810 Aironet 1810W Aironet 1830 300 Mbps WAP131 11n 11ac Wave 1 11ac Wave 2 mGig HDX HDX HDX Cisco Aironet 屋内用アクセス ポイントの詳細は、次の Web サイトをご覧ください。 http://www.cisco.com/jp/go/ap HDX 34 ワイヤレス ※1 PoE 受電を使用しない場合は Cisco Aironet 電源オプションが必要(詳細は 38 ページ)。 ※2 自律型への移行をサポート。 ※3 集中管理型への移行をサポート。 ※4 WAN 専用ポートを含む。 ※5 PoE 給電対応 GE x 1 を含む。 ※6 Cisco AireOS 8.0 以降で Cisco CleanAir Express に対応。 ※7 AUX x 1 を含む。 ※8 PoE 受電では一部の機能に制限(詳細はデータシート)。 ※9 Cisco Mobility Express への移行をサポート。 ※10 Aironet 2802E は、寸法(高さ x 幅 x 奥行き):6.35 x 22.00 x 22.28 cm、重量:2.10 kg。 ※11 Aironet 3802E および 3802P は、寸法(高さ x 幅 x 奥行き):6.65 x 22.00 x 22.05 cm、重量:2.10 kg。 ■ Cisco Aironet 700 シリーズ 寸法(高さ x 幅 x 奥行):5.08 x 17.78 x 17.78 cm 重量:0.48 kg 製品型番 スタンド アロン 集中 管理型 Clean Air Office Extend Client Link Band Select IEEE 802 ポート数 PoE 受電※ 1 アンテナ 11n 11ac GE mGig 802.3af 802.3at AIR-SAP702I-x-K9 ● -※3 - - - ● ● - 1 - ● - 内蔵 AIR-CAP702I-x-K9 -※2 ● - - - ● ● - 1 - ● - 内蔵 ■ Cisco Aironet 700W シリーズ 寸法(高さ x 幅 x 奥行):4.06 x 15.24 x 10.16 cm 重量:0.39 kg 製品型番 スタンド アロン 集中 管理型 Clean Air Office Extend Client Link Band Select IEEE 802 ポート数 PoE 受電※ 1 アンテナ 11n 11ac GE mGig 802.3af 802.3at AIR-CAP702W-x-K9 -※2 ● - - - ● ● - 5※4 ※5 - ● - 内蔵 ■ Cisco Aironet 1700 シリーズ 寸法(高さ x 幅 x 奥行):5.05 x 22.07 x 22.07 cm 重量:1.00 kg 製品型番 スタンド アロン 集中 管理型 Clean Air Office Extend Client Link Band Select IEEE 802 ポート数 PoE 受電※ 1 アンテナ 11n 11ac GE mGig 802.3af 802.3at AIR-CAP1702I-x-K9 -※2 ● ●※6 ● - ● ● ● 2※7 - ● - 内蔵 ■ Cisco Aironet 1810 シリーズ OfficeExtend 寸法(高さ x 幅 x 奥行):4.06 x 16.51 x 11.43 cm重量:0.54 kg 製品型番 スタンド アロン 集中 管理型 Clean Air Office Extend Client Link Band Select IEEE 802 ポート数 PoE 受電※ 1 アンテナ 11n 11ac GE mGig 802.3af 802.3at AIR-OEAP1810-x-K9 - ● - ● - - ● ● 4※4 ※5 - ●※8 ● 内蔵 ■ Cisco Aironet 1810W シリーズ 寸法(高さ x 幅 x 奥行):4.06 x 16.51 x 11.43 cm 重量:0.54 kg 製品型番 ME マスター 集中 管理型 Clean Air Office Extend Client Link Band Select IEEE 802 ポート数 PoE 受電※ 1 アンテナ 11n 11ac GE mGig 802.3af 802.3at AIR-AP1810W-x-K9 - ● - - - ● ● ● 4※4 ※5 - ●※8 ● 内蔵 ■ Cisco Aironet 1830 シリーズ 寸法(高さ x 幅 x 奥行):5.08 x 21.08 x 21.08 cm 重量:1.42 kg 製品型番 ME マスター 集中 管理型 Clean Air Office Extend Client Link Band Select IEEE 802 ポート数 PoE 受電※ 1 アンテナ 11n 11ac GE mGig 802.3af 802.3at AIR-AP1832I-x-K9C ● -※3 - - - ● ● ● 1 - ●※8 ● 内蔵 AIR-AP1832I-x-K9 -※9 ● - - - ● ● ● 1 - ●※8 ● 内蔵 ■ Cisco Aironet 1850 シリーズ 寸法(高さ x 幅 x 奥行):5.08 x 21.08 x 21.08 cm 重量:1.42 kg 製品型番 ME マスター 集中 管理型 Clean Air Office Extend Client Link Band Select IEEE 802 ポート数 PoE 受電※ 1 アンテナ 11n 11ac GE mGig 802.3af 802.3at AIR-AP1852I-x-K9C ● -※3 - - - ● ● ● 2※7 - ●※8 ● 内蔵 AIR-AP1852E-x-K9C ● -※3 - - - ● ● ● 2※7 - ●※8 ● 外付け AIR-AP1852I-x-K9 -※9 ● - - - ● ● ● 2※7 - ●※8 ● 内蔵 AIR-AP1852E-x-K9 -※9 ● - - - ● ● ● 2※7 - ●※8 ● 外付け ■ Cisco Aironet 2700 シリーズ 寸法(高さ x 幅 x 奥行):5.05 x 22.07 x 22.07 cm 重量:1.00 kg 製品型番 スタンド アロン 集中 管理型 Clean Air Office Extend Client Link Band Select IEEE 802 ポート数 PoE 受電※ 1 アンテナ 11n 11ac GE mGig 802.3af 802.3at AIR-CAP2702I-x-K9 -※2 ● ● ● ● ● ● ● 2※7 - ●※8 ● 内蔵 AIR-CAP2702E-x-K9 -※2 ● ● ● ● ● ● ● 2※7 - ●※8 ● 外付け ■ Cisco Aironet 2800 シリーズ 寸法(高さ x 幅 x 奥行):5.51 x 22.00 x 22.05 cm 重量:1.60 kg※10 製品型番 ME マスター 集中 管理型 Clean Air Office Extend Client Link Band Select IEEE 802 ポート数 PoE 受電※ 1 アンテナ 11n 11ac GE mGig 802.3af 802.3at AIR-AP2802I-x-K9C ● -※3 ● ● ● ● ● ● 2※7 - - ● 内蔵 AIR-AP2802E-x-K9C ● -※3 ● ● ● ● ● ● 2※7 - - ● 外付け AIR-AP2802I-x-K9 -※9 ● ● ● ● ● ● ● 2※7 - - ● 内蔵 AIR-AP2802E-x-K9 -※9 ● ● ● ● ● ● ● 2※7 - - ● 外付け ■ Cisco Aironet 3700 シリーズ 寸法(高さ x 幅 x 奥行):5.36 x 22.10 x 22.10 cm 重量:1.13 kg 製品型番 スタンド アロン 集中 管理型 Clean Air Office Extend Client Link Band Select IEEE 802 ポート数 PoE 受電※ 1 アンテナ 11n 11ac GE mGig 802.3af 802.3at AIR-CAP3702I-x-K9 -※2 ● ● ● ● ● ● ● 1 - ●※8 ● 内蔵 AIR-CAP3702E-x-K9 -※2 ● ● ● ● ● ● ● 1 - ●※8 ● 外付け AIR-CAP3702P-x-K9 -※2 ● ● - ● ● ● ● 1 - ●※8 ● 外付け ■ Cisco Aironet 3800 シリーズ 寸法(高さ x 幅 x 奥行):6.25 x 22.00 x 22.05 cm 重量:2.00 kg※11 製品型番 ME マスター 集中 管理型 Clean Air Office Extend Client Link Band Select IEEE 802 ポート数 PoE 受電※ 1 アンテナ 11n 11ac GE mGig 802.3af 802.3at AIR-AP3802I-x-K9C ● -※3 ● ● ● ● ● ● 1 1 - ● 内蔵 AIR-AP3802E-x-K9C ● -※3 ● ● ● ● ● ● 1 1 - ● 外付け AIR-AP3802P-x-K9C ● -※3 ● ● ● ● ● ● 1 1 - ● 外付け AIR-AP3802I-x-K9 -※9 ● ● ● ● ● ● ● 1 1 - ● 内蔵 AIR-AP3802E-x-K9 -※9 ● ● ● ● ● ● ● 1 1 - ● 外付け AIR-AP3802P-x-K9 -※9 ● ● - ● ● ● ● 1 1 - ● 外付け ■ Cisco Hyperlocation ソリューション(Cisco Aironet 3700 シリーズ用) 製品型番 製品説明 AIR-RM3010L-x-K9= 高度なセキュリティを備えたハイパーロケーション モジュール。 AIR-ANT-LOC-01= ハイパーロケーション アンテナ、モデル 1、全方向性アンテナ付属。 35 スイッチ ルータ セキュリティ Meraki サービス ワイヤレス 屋外用アクセス ポイント ■ Cisco Aironet 1530 シリーズ 製品型番 Clean Air Client Link Band Select ポート数 電源オプション アンテナ GE SFP ケーブル AC DC PoE 給電 PoE 受電 UPOE 受電 PoC 受電 内蔵全方向性 内蔵指向性 外付け デュアルバンド 外付け シングルバンド AIR-CAP1532I-Q-K9 - - ● 2 - - - ● - - ● - 3※2 - - - AIR-CAP1532E-Q-K9 - - ● 2 - - - ● - ● - - - - 2 2 + 2 ■ Cisco Aironet 屋外用アクセス ポイント Cisco Aironet 屋外用アクセス ポイントは、都市規模の広範なエリア、企業の構内、工 場の敷地、採掘現場など、さまざまな場所で高速かつ安定した無線 LAN 環境を実現す るワイヤレス アクセス ポイントです。 IEC 規格 IP67 準拠の防水性と NEMA 規格 Type 4X 準拠の屋外耐じん性と耐食性 を備えたシャーシで、過酷な環境にも安心して設置できるだけでなく、多種多様なニー ズに応えるラインアップがあります。 ● アンテナ内蔵モデル:Cisco Aironet 1532I、Cisco Aironet 1562I/D、お よび Cisco Aironet 1572IC は、洗練された外観で周辺環境に溶け込むデザイ ンです。 ● アンテナ外 付 けモデル:Cisco Aironet 1532E、Cisco Aironet 1562E/ PS、および Cisco Aironet 1572EAC/EC では、設置環境に最適なさまざま なアンテナを選択できます(Cisco Aironet アンテナの詳細は 37 ~ 38 ページ)。 ● ケーブル モデム内蔵モデル: Cisco Aironet 1572IC/EC は、ケーブル テレ ビなどで使用される同軸ケーブルによる通信サービスの国際規格 DOCSIS 3.0 (24x8)準拠のケーブル モデムを搭載しています。 ■ 主な特長 ● IEC IP67 準拠の防水性(全モデル) ● NEMA 規格 Type 4X 準拠の屋外耐じん性と耐食性(全モデル) ● 過酷な屋外環境に対応(全モデル) ● 内蔵 SFP モジュール スロットに対応(Cisco Aironet 1560/1570 シリーズ) ● GPS 対応(Cisco Aironet 1570 シリーズ)※1 ● IEEE 802.11n 規格対応(全モデル) ● IEEE 802.11ac Wave 1 対応(Cisco Aironet 1570 シリーズ) ● IEEE 802.11ac Wave 2 対応(Cisco Aironet 1560 シリーズ) ● 2.4 GHz/5 GHz デュアル バンド対応(全モデル) ● 4.9 GHz の Public Safety 帯域に対応(Cisco Aironet 1562PS) ● Cisco CleanAir に対応(Cisco Aironet 1560/1570 シリーズ、テクノロジー の詳細は 31 ページ) ● ClientLink 対応(Cisco Aironet 1560/1570 シリーズ、テクノロジーの詳細 は 31 ページ) ● Cisco BandSelect 対応(全モデル) ● Cisco High Density Experience(HDX)対応(Cisco Aironet 1560/1570 シ リーズ) ■ Cisco Aironet 1570 シリーズ 製品型番 Clean Air Client Link Band Select ポート数 電源オプション アンテナ GE SFP ケーブル AC DC PoE 給電 PoE 受電 UPOE 受電 PoC 受電 内蔵全方向性 内蔵指向性 外付け デュアルバンド 外付け シングルバンド AIR-AP1572IC4-Q-K9 ● ● ● 2 1 1 - ● - - - ● 4 - - - AIR-AP1572EAC-Q-K9 ● ● ● 2 1 - ● ● ●※4 - ● - - - 4 2 + 2 AIR-AP1572EC4-Q-K9 ● ● ● 2 1 1 - ● - - - ● - - 4 2 + 2 ■ Cisco Aironet 1560 シリーズ※3 製品型番 Clean Air Client Link Band Select ポート数 電源オプション アンテナ GE SFP ケーブル AC DC PoE 給電 PoE 受電 UPOE 受電 PoC 受電 内蔵全方向性 内蔵指向性 外付け デュアルバンド 外付け シングルバンド AIR-AP1562I-Q-K9 ● ● ● 1 1 - - ● - - ● - 3 - - - AIR-AP1562E-Q-K9 ● ● ● 1 1 - - ● - ● - - - - 2 2 + 2 AIR-AP1562D-Q-K9 ● ● ● 1 1 - - ● - ● - - - 2 - - AIR-AP1562PS-Q-K9 ● ● ● 1 1 - - ● - ● - - - - 2 2 + 2 モデル名 寸法 (高さ x 幅 x 奥行) 最大 重量 Cisco Aironet 1532I 22.86 x 17.78 x 10.16 cm 2.27 kg Cisco Aironet 1532E 25.40 x 17.78 x 10.16 cm 2.49 kg Cisco Aironet 1562I 22.86 x 17.27 x 9.90 cm 2.54 kg Cisco Aironet 1562E 22.86 x 17.27 x 9.90 cm 2.54 kg Cisco Aironet 1562D 22.86 x 17.27 x 10.92 cm 2.59 kg Cisco Aironet 1562PS 22.86 x 17.27 x 9.90 cm 2.54 kg Cisco Aironet 1572IC 29.97 x 20.07 x 20.07 cm 5.22 kg Cisco Aironet 1572EAC/EC 29.97 x 20.07 x 16.00 cm 6.12 kg Cisco Aironet 1572EC 29.97 x 20.07 x 16.00 cm 6.12 kg Cisco Aironet 1532E Cisco Aironet 1562E/PS Cisco Aironet 1572EAC/EC Cisco Aironet 1572IC Cisco Aironet 1532I Cisco Aironet 1562I/D ※1 GPS アンテナ(AIR-ANT-GPS-1)が必要。 ※2 2.4 GHz:送信 3 x 受信 3 アンテナ(3 ストリーム)、5 GHz:送信 2 x 受信 3 アンテナ(2 ストリーム)。 ※3 2017 年前半に発売予定。 ※4 PoE+ 給電に対応。 36 ワイヤレス Cisco Aironet アンテナおよびアクセサリ ■ Cisco Aironet 2.4 GHz 全方向性アンテナ 製品型番 設置 / 寸法 ゲイン(dBi) AIR-ANT2420V-N 12.70 x 2.54 cm 2.0 AIR-ANT2450V-N 27.94 x 2.54 cm 5.0 AIR-ANT2455V-N 31.75 x 2.54 cm 5.5 AIR-ANT2480V-N 49.53 x 2.22 cm 8.0 ■ Cisco Aironet 2.4 GHz 指向性アンテナ 製品型番 設置 / 寸法 / 重量 ゲイン(dBi) AIR-ANT2413P2M-N パッチ 19.81 x 19.81 x 3.05 cm 0.61 kg 13.0 ■ Cisco Aironet デュアルバンド全方向性アンテナ 製品型番 設置 / 寸法 / 重量 ゲイン(dBi) AIR-ANT2524V4C-R 天井マウント 18.42 x 18.42 x 2.54 cm 0.59 kg 2.0(2.4 GHz) 4.0(5 GHz) AIR-ANT2544V4M-R 壁面マウント 55.37 x 16.00 cm 0.67 kg 4.0(2.4 GHz) 4.0(5 GHz) AIR-ANT2547V-N 28.19 x 3.18 cm 170 g 4.0(2.4 GHz) 7.0(5 GHz) AIR-ANT2547VG-N 28.19 x 3.18 cm 170 g 4.0(2.4 GHz) 7.0(5 GHz) AIR-ANT2568VG-N 37.59 x 3.81 cm 204 g 6.0(2.4 GHz) 8.0(5 GHz) ■ Cisco Aironet 5 GHz 全方向性アンテナ 製品型番 設置 / 寸法 ゲイン(dBi) AIR-ANT5140V-N 12.70 x 2.54 cm 4.0 AIR-ANT5175V-N 29.59 x 2.54 cm 7.5 AIR-ANT5180V-N 27.94 x 2.54 cm 8.0 ■ Cisco Aironet 5 GHz 指向性アンテナ 製品型番 設置 / 寸法 / 重量 ゲイン(dBi) AIR-ANT5114P2M-N パッチ 19.81 x 19.81 x 3.05 cm 0.61 kg 14.0 ■ Cisco Aironet デュアルバンド ダイポール アンテナ 製品型番 色 / 寸法 / 重量 ゲイン(dBi) AIR-ANT2524DB-R ブラック 16.84 x 2.11 cm 36.85 g 2.0(2.4 GHz) 4.0(5 GHz) AIR-ANT2524DG-R グレイ 16.84 x 2.11 cm 36.85 g 2.0(2.4 GHz) 4.0(5 GHz) AIR-ANT2524DW-R ホワイト 16.84 x 2.11 cm 36.85 g 2.0(2.4 GHz) 4.0(5 GHz) AIR-ANT2535SDW-R ホワイト 8.38 x 3.18 cm 48.19 g 3.0(2.4 GHz) 5.0(5 GHz) ■ Cisco Aironet デュアルバンド指向性アンテナ 製品型番 設置 / 寸法 / 重量 ゲイン(dBi) AIR-ANT2566P4W-R パッチ 16.00 x 27.94 x 3.05 cm 0.64 kg 6.0(2.4 GHz) 6.0(5 GHz) AIR-ANT2566D4M-R パッチ 25.40 x 25.40 x 4.09 cm 1.36 kg 6.0(2.4 GHz) 6.0(5 GHz) AIR-ANT2588P3M-N パッチ 30.48 x 17.78 x 2.79 cm 0.45 kg 8.0(2.4 GHz) 8.0(5 GHz) AIR-ANT2513P4M-N パッチ 30.48 x 17.78 x 2.79 cm 0.45 kg 13.0(2.4 GHz) Cisco Aironet アンテナの詳細については、次の Web サイトを参照してください。 13.0(5 GHz) http://www.cisco.com/go/antenna 37 スイッチ ルータ セキュリティ Meraki サービス ワイヤレス ■ Cisco Aironet 2.4 GHz 全方向性アンテナ モデル別対応比較 製品型番 ゲイン(dBi) 対応モデル 2.4 GHz 5 GHz 1852E 2702E 2802E 3702E 3702P 3802E 3802P 1532E 1562E 1562PS 1572E AIR-ANT2420V-N 2.0 - - - - - - - - - - - ● AIR-ANT2450V-N 5.0 - - - - - - - - ● ● ● ● AIR-ANT2455V-N 5.5 - - - - - - - - - - - - AIR-ANT2480V-N 8.0 - - - - - - - - ● ● ● ● ■ Cisco Aironet 5 GHz 全方向性アンテナ モデル別対応比較 製品型番 ゲイン(dBi) 対応モデル 2.4 GHz 5 GHz 1852E 2702E 2802E 3702E 3702P 3802E 3802P 1532E 1562E 1562PS 1572E AIR-ANT5140V-N - 4.0 - - - - - - - - - - ● AIR-ANT5175V-N - 7.5 - - - - - - - - - - - AIR-ANT5180V-N - 8.0 - - - - - - - ● ● ● ● ■ Cisco Aironet 2.4 GHz 指向性アンテナ モデル別対応比較 製品型番 ゲイン(dBi) 対応モデル 2.4 GHz 5 GHz 1852E 2702E 2802E 3702E 3702P 3802E 3802P 1532E 1562E 1562PS 1572E AIR-ANT2413P2M-N 13.0 - - - - - - - - ● ● ● ● ■ Cisco Aironet 5 GHz 指向性アンテナ モデル別対応比較 製品型番 ゲイン(dBi) 対応モデル 2.4 GHz 5 GHz 1852E 2702E 2802E 3702E 3702P 3802E 3802P 1532E 1562E 1562PS 1572E AIR-ANT5114P2M-N - 14.0 - - - - - - - ● ● ● ● ■ Cisco Aironet デュアルバンド ダイポール アンテナ モデル別対応比較 製品型番 ゲイン(dBi) 対応モデル 2.4 GHz 5 GHz 1852E 2702E 2802E 3702E 3702P 3802E 3802P 1532E 1562E 1562PS 1572E AIR-ANT2524DB-R 2.0 4.0 ● ● ● ● ● ● ● - - - - AIR-ANT2524DG-R 2.0 4.0 ● ● ● ● ● ● ● - - - - AIR-ANT2524DW-R 2.0 4.0 ● ● ● ● ● ● ● - - - - AIR-ANT2535SDW-R 3.0 5.0 ● ● ● ● ● ● ● - - - - ■ Cisco Aironet デュアルバンド全方向性アンテナ モデル別対応比較 製品型番 ゲイン(dBi) 対応モデル 2.4 GHz 5 GHz 1852E 2702E 2802E 3702E 3702P 3802E 3802P 1532E 1562E 1562PS 1572E AIR-ANT2524V4C-R 2.0 4.0 ● ● ● ● ● ● ● - - - - AIR-ANT2544V4M-R 4.0 4.0 ● ● ● ● ● ● ● - - - - AIR-ANT2547V-N 4.0 7.0 - - - - - - - ● ● ● ● AIR-ANT2547VG-N 4.0 7.0 - - - - - - - ● ● ● ● AIR-ANT2568VG-N 6.0 8.0 - - - - - - - - ● ● ● ■ Cisco Aironet デュアルバンド指向性アンテナ モデル別対応比較 製品型番 ゲイン(dBi) 対応モデル 2.4 GHz 5 GHz 1852E 2702E 2802E 3702E 3702P 3802E 3802P 1532E 1562E 1562PS 1572E AIR-ANT2566P4W-R 6.0 6.0 ● ● ● ● ● ● ● - - - - AIR-ANT2566D4M-R 6.0 6.0 ● ● ● ● ● ● ● - - - - AIR-ANT2588P3M-N 8.0 8.0 - - - - - - - ● ● ● ● AIR-ANT2513P4M-N 13.0 13.0 - - - - ● - ● - ● ● ● ■ Cisco Aironet 電源オプション 製品型番 製品説明 対応モデル 700 700W 1810 1810W 1830 1850 1700 2700 2800 3700 3800 1530 1560 1570 AIR-PWRINJ5= パワー インジェクタ ● ● ● ● ●※1 ●※1 ● ●※2 - - - - - - AIR-PWRINJ6= パワー インジェクタ ● ● ● ● ● ● ● ● ● ● ● ● ●※3 - AIR-PWRINJ1500-2= パワー インジェクタ - - - - - - - - - - - ● - ●※4 AIR-PWRINJ-60RGD1= パワー インジェクタ - - - - - - - - - - - - ● ● AIR-PWRINJ-60RGD2= パワー インジェクタ - - - - - - - - - - - - ● ● AIR-PWR-B= 電源モジュール ● - - - - - ● ● - ● - - - - AIR-PWR-C= 電源モジュール - ● - - ● ● - - - - - - - - AIR-PWR-D= 電源モジュール ● ● ● ● ● ● - - - - - - - - AIR-PWR-50= 電源モジュール - - - - - - - - - - ● - - - AIR-PWRADPT-1530= 電源モジュール - - - - - - - - - - - ● - - AIR-PWRADPT-RGD1= 電源モジュール - - - - - - - - - - - ● ● - ※1 PoE+、AIR-PWRINJ4= または AIR-PWR-C= による電力供給でフル機能をサポート(AIR-PWRINJ5 は PoE 受電のみサポート)。 ※2 PoE+、AIR-PWRINJ4= または AIR-PWR-B= による電力供給でフル機能をサポート(AIR-PWRINJ5 は PoE 受電のみサポート)。 ※3 Cisco Aironet 1562I:UPOE、AIR-PWRINJ-60RGD1/2=、または AIR-PWRADPT-RGD1= による電力供給でフル機能をサポート(AIR-PWRINJ6 は PoE+ 受電のみサポート)。 ※4 Cisco Aironet 1572IC4 は非対応。 38 ワイヤレス Cisco ワイヤレス コントローラは、リモート拠点も含めた複数の Cisco Aironet アク セス ポイントを集中管理できるプラットフォームです。Cisco Catalyst 6500 シリー ズにサービスを統合する拡張モジュール、VMware ESX/ESXi および Linux Kernelbased Virtual Machine(KVM)上のソフトウェア製品、専用のハードウェア アプライ アンスなど、幅広いラインアップがあります。アクセス ポイントの管理数には柔軟なラ イセンス体系を採用しているため、導入時のネットワーク要件に応じて必要な管理数を 選択できるだけでなく、導入後のネットワーク要件に応じて柔軟に管理数を拡張できる、 業界トップレベルの低価格ソリューションです。 アプライアンス / 仮想マシン Cisco 2500 シリーズ ワイヤレス コントローラ Cisco Virtual ワイヤレス コントローラ Cisco 5500 シリーズ ワイヤレス コントローラ Cisco 8500 シリーズ ワイヤレス コントローラ スイッチ / モジュール Cisco Catalyst 3650 シリーズ Cisco Catalyst 3850 シリーズ Cisco Catalyst 4500E シリーズ (SUP8-E) Cisco Wireless Services Module 2 (WiSM2) アクセス ポイント (Mobility Express) Cisco Aironet 1830/1850/2800/ 3800/1560 シリーズ 管理対象アクセス ポイント数 → 多 ■ Cisco 2500 シリーズ ワイヤレス コントローラ 寸法(高さ x 幅 x 奥行):4.39 x 20.32 x 17.15 cm 最大重量:1.59 kg 製品型番 OS アクセス ポイント管理数 最大 クライアント数 最大 RF タグ数 最大 スループット Office Extend ワイヤレス メッシュ ポート数 ラック デフォルト 最大 GE SFP SFP + マウント AIR-CT2504-5-K9 AireOS 5 75 1,000 500 1 Gbps ● ● 4 - - -※1 AIR-CT2504-15-K9 AireOS 15 75 1,000 500 1 Gbps ● ● 4 - - -※1 AIR-CT2504-25-K9 AireOS 25 75 1,000 500 1 Gbps ● ● 4 - - -※1 AIR-CT2504-50-K9 AireOS 50 75 1,000 500 1 Gbps ● ● 4 - - -※1 ■ Cisco Virtual ワイヤレス コントローラ 製品型番 OS アクセス ポイント管理数 最大 クライアント数 最大 RF タグ数 最大 スループット Office Extend ワイヤレス メッシュ ポート数 ラック デフォルト 最大 GE SFP SFP + マウント L-AIR-CTVM-5-K9 AireOS 5 3,000 32,000 3,000 500 Mbps ● - - - - - ■ Cisco Wireless Services Module 2(WiSM2)※2 製品型番 OS アクセス ポイント管理数 最大 クライアント数 最大 RF タグ数 最大 スループット Office Extend ワイヤレス メッシュ ポート数 ラック デフォルト 最大 GE SFP SFP + マウント WS-SVC-WISM2-1-K9 AireOS 100 1,000 15,000 5,000 20 Gbps ● ● - - - - WS-SVC-WISM2-3-K9 AireOS 300 1,000 15,000 5,000 20 Gbps ● ● - - - - WS-SVC-WISM2-5-K9 AireOS 500 1,000 15,000 5,000 20 Gbps ● ● - - - - WS-SVC-WISM2-K-K9 AireOS 1,000 1,000 15,000 5,000 20 Gbps ● ● - - - - ■ Cisco 5500 シリーズ ワイヤレス コントローラ(5508/5520) 製品型番 OS アクセス ポイント管理数 最大 クライアント数 最大 RF タグ数 最大 スループット Office Extend ワイヤレス メッシュ ポート数 ラック デフォルト 最大 GE SFP SFP + マウント AIR-CT5508-12-K9 AireOS 12 500 7,000 5,000 8 GB/s ● ● - 8 - 1 RU AIR-CT5508-25-K9 AireOS 25 500 7,000 5,000 8 GB/s ● ● - 8 - 1 RU AIR-CT5508-50-K9 AireOS 50 500 7,000 5,000 8 GB/s ● ● - 8 - 1 RU AIR-CT5520-K9 AireOS 0 1,500 20,000 25,000 20 Gbps ● ● - - 2 1 RU AIR-CT5520-50-K9 AireOS 50 1,500 20,000 25,000 20 Gbps ● ● - - 2 1 RU ■ Cisco 8500 シリーズ ワイヤレス コントローラ(8510/8540) 製品型番 OS アクセス ポイント管理数 最大 クライアント数 最大 RF タグ数 最大 スループット Office Extend ワイヤレス メッシュ ポート数 ラック デフォルト 最大 GE SFP SFP + マウント AIR-CT8510-300-K9 AireOS 300 6,000 64,000 50,000 10 Gbps ● ● - - 2 1 RU AIR-CT8510-500-K9 AireOS 500 6,000 64,000 50,000 10 Gbps ● ● - - 2 1 RU AIR-CT8510-1K-K9 AireOS 1,000 6,000 64,000 50,000 10 Gbps ● ● - - 2 1 RU AIR-CT8510-3K-K9 AireOS 3,000 6,000 64,000 50,000 10 Gbps ● ● - - 2 1 RU AIR-CT8510-6K-K9 AireOS 6,000 6,000 64,000 50,000 10 Gbps ● ● - - 2 1 RU AIR-CT8540-K9 AireOS 0 6,000 64,000 50,000 40 Gbps ● ● - - 4 2 RU AIR-CT8540-1K-K9 AireOS 1,000 6,000 64,000 50,000 40 Gbps ● ● - - 4 2 RU ※1 ラック マウントブラケット(AIR-CT2504-RMNT)が必要。 ※ 2017 年 4 月に販売終了予定。 詳細は cisco.com で「EOL11243」を検索。  Cisco ワイヤレスコントローラ 39 スイッチ ルータ セキュリティ Meraki サービス ワイヤレス ※1 Cisco ワイヤレス コントローラソフトウェアリリース 7.3.112.0 が必要。 ※2 Cisco AireOS 8.1 以降は非対応。 展開モード シスコのワイヤレス ソリューションは、Cisco Aironet アクセス ポイントを個別運用する自律型と、Cisco ワイヤレス コントローラによって複数の Cisco Aironet アクセスポイントを統合 運用する集中管理型の 2 つに大別されますが、集中管理型でも複数の展開モードをサポートします。 また、この他にメッシュモード、FlexConnect + メッシュモード、OfficeExtend モード、モニタ モード、不正検出モード、およびスニファモードもサポートします。 ■ Cisco ワイヤレス コントローラ ソフトウェア仕様比較 AirOS IOS-XE 復元力 Client SSO、AP SSO、N+1、高可用性オプション SKU AP SSO、Multiple LAG、高可用性オプション SKU QoS Alloy QoS きめ細やかな QoS(MQC) セキュリティ ダイナミック ACL、SGA(SXP) dACL ローミング L2 および L3 FSR、IEEE 802.11r、Neighbor List L2 および L3 FSR サービス Bonjour、AVC、Static Netflow Flexible Netflow、AVC コマンドライン インターフェイス Secure FTP Cisco IOS CLI、Secure Shell、EEM/TCL/TK Cisco ワイヤレス コントローラ ソフトウェア Cisco Catalyst 3650/3850 シリーズおよび Cisco Catalyst 4500E シリーズ用スー パバイザ エンジン 8-E は、これまでの製品とは異なり、Cisco IOS XE ベースのワイヤレ ス コントローラソフトウェアを搭載しています。Flexible NetFlow、高度な QoS、dACL (downloadable Access Control List)など、Cisco IOS の豊富な機能を無線 LAN にも提供できます。 ■ Cisco 2500 シリーズ ワイヤレス コントローラ用アクセス ポイント追加ライセンス※1 製品型番 追加数 対応モデル L-LIC-CT2504-1A 1 2504 L-LIC-CT2504-5A 5 2504 L-LIC-CT2504-25A 25 2504 ■ Cisco Virtual ワイヤレス コントローラ用アクセス ポイント追加ライセンス※2 製品型番 追加数 対応モデル L-LIC-CTVM-1A 1 - L-LIC-CTVM-5A 5 - L-LIC-CTVM-25A 25 - ■ Cisco Wireless Services Module 2(WiSM2)用アクセス ポイント追加ライセンス※3 製品型番 追加数 対応モデル L-LIC-WISM2-100A 100 6500/6800 L-LIC-WISM2-200A 200 6500/6800 ■ Cisco 5500 シリーズ ワイヤレス コントローラ用アクセス ポイント追加ライセンス※4 製品型番 追加数 対応モデル L-LIC-CT5508-1A 1 5508 L-LIC-CT5508-25A 25 5508 L-LIC-CT5508-50A 50 5508 L-LIC-CT5508-100A 100 5508 L-LIC-CT5508-250A 250 5508 LIC-CT5520-1A 1 5520 ■ Cisco 8500 シリーズ ワイヤレス コントローラ用アクセス ポイント追加ライセンス※5 製品型番 追加数 対応モデル L-LIC-CT8500-1A 1 8510 L-LIC-CT8500-100A 100 8510 L-LIC-CT8500-500A 500 8510 L-LIC-CT8500-1000A 1,000 8510 LIC-CT8540-1A 1 8540 ※1 L-LIC-CT2504-UPG が必要。 ※2 L-LIC-CTVM-UPG が必要。 ※3 L-LIC-WISM2-UPG が必要。 ※4 L-LIC-CT5508-UPG または L-LIC-CT5540-UPG が必要。 ※5 L-LIC-CT8500-UPG または L-LIC-CT8540-UPG が必要。 Mobility Express (アクセス ポイントにコントローラを内蔵) FlexConnect 統合アクセス 集中 小規模ネットワーク向け 拠点向け 小規模キャンパス / 拠点向け 大規模キャンパス向け Aironet WAN イントラネット 1830/1850/ 2800/3800/ 1560 3650/ 3850/ 4500E (SUP8-E) 5700 ■ Cisco ワイヤレス コントローラ展開モード対応比較 プラットフォーム 展開モード Mobility Express FlexConnect 統合アクセス 集中 メッシュ OfficeExtend Cisco Aironet 1830/1850 シリーズ アクセス ポイント ● - - - - - Cisco Aironet 2800/3800 シリーズ アクセス ポイント ● - - - - - Cisco Aironet 1560 シリーズ屋外用アクセス ポイント ● - - - - - Cisco 2500 シリーズ ワイヤレス コントローラ - ● - ● ● ● Cisco Virtual ワイヤレス コントローラ - ● - - - - Cisco 5500 シリーズ ワイヤレス コントローラ - ● ●※1 ※2 ● ● ● Cisco Wireless Services Module 2(WiSM2) - ● ●※1 ※2 ● ● ● Cisco 8500 シリーズ ワイヤレス コントローラ - ● - ● ● ● 40 ワイヤレス Cisco Mobility Services Engine(MSE) Cisco Mobility Services Engine(MSE)は、Cisco CleanAir、Cisco Base Location Services、Cisco Connected Mobile Experiences(CMX)、Cisco Wireless Intrusion Prevention System(wIPS)など、広範なモビリティ サービス を提供するプラットフォームです。VMware ESX/ESXi 上のソフトウェア製品、またはハー ドウェア アプライアンスとして実装します。 ■ Cisco Connected Mobile Experiences(CMX)リリース 10 Cisco CMX リリース 10 は、次の機能によってシスコ ワイヤレス LAN を拡張するプラッ トフォームです。 ● モバイル デバイス、タグ、不正アクセス ポイント、ワイヤレス干渉源を含め、敷地内 のあらゆるワイヤレス デバイスのロケーションを計算します。 ● 高度なロケーション分析を生成します(CMX アナリティクス)。 ● 訪問者のためのワイヤレス オンボーディング プラットフォームを提供します(CMX コ ネクト)。 ● Bluetooth Low Energy(BLE)ビーコンの位置を計算して特定します。 ※1 L-MSE-PAK が必要。 ※2 L-MSE-PAK-N が必要。 ※3 R-MGMT3X-N-K9 が必要。 Cisco Prime Infrastructure Cisco Prime Infrastructure は、有線 LAN と無線 LAN、本社と支社など、ネット ワーク全体を一貫して包括的に管理できる、統合型管理プラットフォームです。有線 LAN や無線 LAN を構成するデバイスを単に物理資産として管理できるだけでなく、 それらから収集した豊富な情報に基づいて、ユーザに提供できるサービス レベルの観 点からもネットワークを管理できます。 ■ Cisco Mobility Services Engine(MSE) 製品型番 製品説明 アクセス ポイント管理数 ロケーション サービス CMX wIPS モニター モード wIPS エンハンスド ローカル モード L-MSE-7.0-K9 ソフトウェア製品 5,000 10,000 AIR-MSE-3365-K9 ハードウェア アプライアンス 10,000 10,000 モビリティサービス & ネットワーク管理ツール ■ Cisco Connected Mobile Experiences(CMX)リリース 10 ライセンス ● Cisco CMX Base ライセンス:Wi-Fi クライアント、Bluetooth Low Energy(BLE) ビーコン、デバイス、RFID タグなどの位置特定機能、CMX コネクト、標準の REST API を使用したサードパーティ統合機能などを提供します。 ● Cisco CMX Advanced ライセンス:すべての CMX Base サービスと、CMX ア ナリティクス、CMX プレゼンス分析を提供します。 ● Cisco wIPS モニター モード ライセンス:モニター モードの Cisco Aironet アクセ ス ポイントに wIPS を提供します(将来のリリースで対応予定)。 ● Cisco wIPS エンハンスド ローカル モード ライセンス:ローカル モードの Cisco Aironet アクセス ポイントに wIPS を提供します(将来のリリースで対応予定)。 ■ Cisco Prime Infrastructure 3.x ハードウェア アプライアンス 製品型番 製品説明 PI-UCS-APL-K9 第 2 世代ハードウェア アプライアンス PI-UCS-APL-U-K9 第 1 世代からのアップグレード ライセンス ■ Cisco Prime Infrastructure 3.x ソフトウェア & ベース ライセンス※3 製品型番 製品説明 R-PI30-SW-K9 Prime Infrastructure 3.0 ソフトウェア L-MGMT3X-PI-BASE ベース ライセンス ■ Cisco Prime Infrastructure 3.x ハイ アベイラビリティライセンス※3 製品型番 製品説明 L-MGMT3X-HA ハイ アベイラビリティライセンス ■ Cisco Prime Infrastructure 3.x ライフサイクル & アシュアランス ライセンス※3 製品型番 最大管理デバイス数 数量 L-MGMT3X-2K-K9 Cisco Catalyst 2000 シリーズ 1 L-MGMT3X-3K-K9 Cisco Catalyst 3000 シリーズ 1 L-MGMT3X-4K-K9 Cisco Catalyst 4000 シリーズ 1 L-MGMT3X-6K-K9 Cisco Catalyst 6000 シリーズ 1 L-MGMT3X-CSR1-K9 Cisco CSR 1000 シリーズ 1 L-MGMT3X-800SR-K9 Cisco ISR 800 シリーズ 1 L-MGMT3X-ISR1-K9 Cisco ISR 1000 シリーズ 1 L-MGMT3X-ISR2-K9 Cisco ISR 2000 シリーズ 1 L-MGMT3X-ISR3-K9 Cisco ISR 3000 シリーズ 1 L-MGMT3X-ISR4-K9 Cisco ISR 4000 シリーズ 1 製品型番 最大管理デバイス数 数量 L-MGMT3X-ASR1K9 Cisco ASR 1000 シリーズ 1 L-MGMT3X-AP-K9 Cisco Aironet アクセス ポイント 1 L-MGMT3X-N2K-K9 Cisco Nexus 2000 シリーズ ファブリック エクステンダ(FEX) 1 L-MGMT3X-N3K-K9 Cisco Nexus 3000 シリーズ 1 L-MGMT3X-N5K-K9 Cisco Nexus 5000 シリーズ 1 L-MGMT3X-N6K-K9 Cisco Nexus 6000 シリーズ 1 L-MGMT3X-N7K-K9 Cisco Nexus 7000 シリーズ 1 L-MGMT3X-N93XX-K9 Cisco Nexus 9300 シリーズ 1 L-MGMT3X-N9K-K9 Cisco Nexus 9000 シリーズ 1 ■ Cisco CMX Base ライセンス 製品型番 対応アクセス ポイント数 MSE 8.0 ※ 1 CMX 10.x ※ 2 L-LS-1AP L-LS-1AP-N 1 L-LS-100AP - 100 L-LS-1000AP - 1,000 ■ Cisco CMX Advanced ライセンス 製品型番 対応アクセス ポイント数 MSE 8.0 ※ 1 CMX 10.x ※ 2 L-AD-LS-1AP L-AD-LS-1AP-N 1 L-AD-LS-100AP - 100 L-AD-LS-1000AP - 1,000 L-UPG-LS-1AP L-UPG-LS-1AP-N 1 ■ Cisco wIPS モニター モード ライセンス 製品型番 対応アクセス ポイント数 MSE 8.0 ※ 1 CMX 10.x ※ 2 L-WIPS-MM-1AP TBD 1 L-WIPS-MM-100AP TBD 100 L-WIPS-MM-1000AP TBD 1,000 ■ Cisco wIPS エンハンスド ローカル モード ライセンス 製品型番 対応アクセス ポイント数 MSE 8.0 ※ 1 CMX 10.x ※ 2 L-WIPS-ELM-1AP TBD 1 L-WIPS-ELM-100AP TBD 100 L-WIPS-ELM-1000AP TBD 1,000 41 スイッチ ルータ セキュリティ Meraki サービス ワイヤレス Cisco ISR 800 シリーズ 小規模拠点や在宅勤務、Machine-to-Machine(M2M)環境での使用に適した、 固定構成型のサービス統合型ルータです。 くわしくは、44 ページをご覧ください。 Cisco ISR 1900/2900/3900 シリーズ 小規模から大規模までの拠点での使用に適した、 モジュラ型のサービス統合型ルータです。 くわしくは、45 ページをご覧ください。 Cisco ISR 4000 シリーズ アプリケーション認識型サービスの提供を必要とする拠点での使用に適した、 モジュラ型のサービス統合型ルータです。 くわしくは、46 ページをご覧ください。 サービス統合型ルータ ルータ 高パフ ォーマンス & 機能 4451 4431 3945 4351 3925 4331 2951 4321 2921 2911 1941 2901 IR829GW 891FJ/891-24X 892FSP/897VA/899G 819G/GW/H 1921 881/881W/881-V 867VAE 841M 固定構成型 モジュラ型(EHWIC/SM)※ 1 モジュラ型(NIM/SM-X)※ 1 ※1 プラットフォームが搭載する主要な拡張スロットです。対応する拡張モジュールの詳細は、48 ~ 49 ページをご覧ください。 Cisco ISR なら ルーティングだけでなく さまざまなサービスを統合 & 1 台で実現! ルーティング スイッチング ワイヤレス (アクセス ポイント / コントローラ) ユニファイド コミュニケーション (呼制御 / メッセージング) セキュリティ (ファイアウォール /IPS/VPN) WAN 最適化 Cisco ISR のラインアップ 従来は小規模な拠点でも、スイッチ、ワイヤレス アクセス ポイント、WAN 最適 化アプライアンスなどの、さまざまなデバイスの設置が必要でした。Cisco ISR (Integrated Services Router;サービス統合型ルータ)は、このような複数の デバイスから構成されるネットワーク サービスを 1 つのプラットフォームに統合できる 「スーパー ルータ」です。複数のサービスを統合するだけでなく、ライセンスの有効 化や拡張モジュールの追加によって、必要に応じて新しいサービスを追加することも可 能です。これらのルータを導入することで、ネットワークの構成がシンプルになり、デ バイスのコスト、および運用とメンテナンスに要するコストが削減されます。 42 ルータ Cisco ISR 4000 シリーズへ移行するメリット シスコの 20 年にわたるブランチ オフィス ルータの歴史を受け継ぐ Cisco ISR 4000 シリーズは、現代のブランチ オフィスのニーズに応える新たなサービスやパ フォーマンスを備え、ビジネスに次のようなメリットをもたらします。 ● 新たなリモート オフィスを迅速に開設、または付加サービスを簡単に追加可能 ● ブランチ オフィス全体を単一のプラットフォームで運用可能 ● 日常的な作業を自動化、およびセキュリティやアプリケーションのサービスを組織化するこ とで、IT 部門が開発に費やせる時間が増加 Cisco ISR 4000 シリーズによって、旧世代の Cisco ISR による現行サービスを廃 止することなく、現代のブランチ オフィスが直面する諸問題に対処できるようになりま す。ネットワークの仮想化機能によって、ビジネス ニーズの変化に応じて迅速にサー ビスを導入したり、リソースを再割り当てしたりすることもできます。また、ローカル アプリケーションのサバイバビリティ(生存可能性)、データ バックアップ、ローカル分 析処理に必要な処理能力をもたらします。 Cisco ISR 4000 シリーズの新たなアーキテクチャは、統合プラットフォームにおい て最大 2 Gbps の速度を誇ります。これは旧世代の Cisco ISR と比較すると、お よそ 4 ~ 10 倍の速度になります。Cisco ISR 4000 シリーズの WAN およびアプ リケーション最適化サービスには、Cisco Application Visibility and Control (AVC)および Cisco Performance Routing Version 3(PfR v3)が含まれ ます。前者は IT の容量プランニングのアセスメントを可能にし、後者は現状のネット ワーク条件において最良の接続でトラフィックを自動送信します。このアーキテクチャ によって、ブランチ オフィスのネットワークを単一のプラットフォームで運用できるだけ でなく、ネットワーク、コンピューティング、ストレージのリソースを同じプラットフォー ムに統合できるようになります。Cisco ISR 4000 シリーズの内部や、オプションの データ センタークラスのサーバ モジュール(Cisco UCS E シリーズ サーバ)経由で 使用できる仮想化テクノロジーが、新たなレベルの統合能力を提供します。 Cisco ISR の選択 トラフィックが集中するセンター側には、拠点側よりもパフォーマンスと拡張性が高い ルータを選択します。Cisco ISR では、センターや拠点で必要とされるサービスに応 じてバンドル モデルを選択できるだけでなく、ライセンスによる Cisco IOS テクノロ ジーの有効化や拡張モジュールの追加によって、ビジネス ニーズの変化にも柔軟に対 応できます。 Cisco ISR 4431 センター ■ 拠点間ネットワーク サンプル構成:小規模ネットワーク ■ 拠点間ネットワーク サンプル構成:中規模ネットワーク Cisco ISR 841M 拠点 A Cisco ASR 1001-X センター Cisco ISR 4331 拠点 B Cisco ISR 891FJ 拠点 A Cisco ISR 891FJ 拠点 B WAN WAN ■ シリーズ別対応比較 ブランチ ネットワークの ニーズ 機能 Cisco ISR 1800/2800/3800 シリーズ Cisco ISR 1900/2900/3900 シリーズ Cisco ISR 4000 シリーズ 利点 高性能と 拡張性の両立 最大スループット 最大 50 Mbps 最大 350 Mbps 最大 2 Gbps ISR G2 と同価格で 4 倍から 10 倍のパフォーマンス向上 データ プレーン、コントロール プレーン、 サービス プレーンの分離 - - ● ネットワーク サービスの追加やスループットの増加に伴うパ フォーマンスへの影響を最小化 統合サービス コンテナ - - ● ブランチでの追加アプライアンス導入が不要、着脱可能な仮想マ シンで追加ネットワーク サービスを実現 Cisco UCS E シリーズ サーバを使用した 統合コンピューティング - ● ● アプリケーション、データ バックアップ、分析用のローカル コン ピューティング リソース Cisco IOS XE オペレーティング システム - - ● マルチコア プロセッシングによってネットワーク サービスの可用 性を向上 妥協のない ユーザ エクスペリエンス Cisco Application Visibility and Control (AVC) - ● ● キャパシティ プランニングと優先順位づけのために 1,000 以上 のアプリケーションを可視化 インテリジェントなパス選択 (PfR v3) - ● ● リアルタイム分析に基づくパス選択によってアプリケーション エクス ペリエンスの改善とコスト削減を実現 WAN 最適化 (WAAS および Akamai) - ● ● レイヤ 4 ~ 7 の最適化とインテリジェント キャッシングによってアプ リケーションのパフォーマンスとオフロード WAN を改善 セキュリティ Sourcefire 侵入検知システム(IDS) - ● ● 業界トップクラスの高度な脅威防御 高度なマルウェア防御(AMP)を備えた クラウド Web セキュリティ - ● ● 一貫性のあるポリシーの適用によって安全なダイレクト インター ネット アクセスを拡大 マルチコア ハードウェア VPN アクセラレーション - - ● ハイ パフォーマンスな暗号化によって安全な WAN を実現 コスト削減と ビジネスの俊敏性を実現 成長に応じて拡張可能な パフォーマンスとサービス - - ● 現時点で必要な機能のみを購入し、いつでも必要な部分だけを アップグレードできる柔軟性 Cisco ONE ソフトウェア スイート - ● ● 予測可能な OpEx(運用コスト)、ライセンス ポータビリティ、 投資保護 インテリジェントな WAN アプリケーションと Cisco APIC エンタープライズ モジュール - ● ● プロビジョニングの自動化によって迅速な展開が可能 43 スイッチ ワイヤレス セキュリティ Meraki サービス ルータ Cisco ISR 800 シリーズ 小規模拠点や在宅勤務、Machine-to-Machine(M2M)環境での使用に適した、固定構成型のサービス統合 型ルータです。ルーティングだけでなく、スイッチングやワイヤレス、セキュリティ、WAN 最適化など、さまざま なサービスを 1 台で提供します。 ■ 主な特長 ● Cisco IOS ユニバーサル イメージ搭載(IP Base/Advanced Security/Advanced IP Services 対応) ● マネージド スイッチ内蔵 ● IEEE 802.11n 対応ワイヤレス アクセス ポイント内蔵(C819GW-LTE-LA-QK9/IR829GW-LTELA-QK9/C881W-P-K9) ● 4G LTE ワイヤレス WAN 対応(C819G-LTE-LA-K9/C819GW-LTE-LA-QK9/IR829GW-LTELA-QK9/C899G-LTE-JP-K9/C899G-LTE-LA-K9) ■ Cisco ISR 800 シリーズ(1/2) 製品型番 製品説明 寸法(高さ x 幅 x 奥行) 重量 C819G-LTE-LA-K9 Cisco 819G サービス統合型ルータ 4G LTE 2.5 M2M モデル 4.24 x 19.56 x 18.29 cm 1.04 kg C819GW-LTE-LA-QK9 Cisco 819GW サービス統合型ルータ 4G LTE 2.5 & ワイヤレス M2M モデル 4.24 x 19.56 x 22.86 cm 1.04 kg C819H-K9 Cisco 819H サービス統合型ルータ M2M 耐久型モデル 4.39 x 19.56 x 20.57 cm 1.45 kg IR829GW-LTE-LA-QK9 Cisco IR829GW サービス統合型ルータ 4G LTE 2.5 & ワイヤレス M2M 耐久型モデル 4.39 x 27.94 x 19.56 cm 2.04 kg C841M-4X-JSEC/K9 Cisco 841M サービス統合型ルータ 4 ポート Advanced Security モデル 4.37 x 34.29 x 17.53 cm 1.70 kg C841M-4X-JAIS/K9 Cisco 841M サービス統合型ルータ 4 ポート Advanced IP Services モデル 4.37 x 34.29 x 17.53 cm 1.70 kg C841M-8X-JAIS/K9 Cisco 841M サービス統合型ルータ 8 ポート Advanced IP Services モデル 4.37 x 34.29 x 17.53 cm 1.70 kg C867VAE Cisco 867VAE サービス統合型ルータ IP Base モデル 3.85 x 20.90 x 19.80 cm 2.49 kg C867VAE-K9 Cisco 867VAE サービス統合型ルータ Advanced Security モデル 3.85 x 20.90 x 19.80 cm 2.49 kg C881-K9 Cisco 881 サービス統合型ルータ 4.82 x 32.51 x 24.89 cm 2.49 kg C881W-P-K9 Cisco 881W サービス統合型ルータ ワイヤレス モデル 4.82 x 32.51 x 26.42 cm 2.49 kg C881-V-K9 Cisco 881-V サービス統合型ルータ 4.82 x 32.51 x 24.89 cm 2.49 kg C891FJ-K9 Cisco 891FJ サービス統合型ルータ 4.62 x 32.28 x 24.84 cm 2.49 kg C891-24X/K9 Cisco 891-24X サービス統合型ルータ 4.62 x 43.82 x 30.48 cm 2.49 kg C892FSP-K9 Cisco 892FSP サービス統合型ルータ 4.62 x 32.28 x 24.84 cm 2.49 kg C897VA-K9 Cisco 897VA サービス統合型ルータ 4.62 x 32.28 x 24.84 cm 2.49 kg C899G-LTE-JP-K9 Cisco 899G サービス統合型ルータ 4G LTE 2.0 モデル 4.82 x 32.51 x 26.42 cm 2.59 kg C899G-LTE-LA-K9 Cisco 899G サービス統合型ルータ 4G LTE 2.5 モデル 4.82 x 32.51 x 26.42 cm 2.59 kg 製品型番 Cisco IOS ダウンリンク ポート アップリンク ポート 高速化 ワイヤレス セキュリティ 音声 ラック マウント FE GE FE GE GE/ SFP ISDN xDSL 音声 WAASX AP 4G LTE FW VPN GW 呼制御 MSG C819G-LTE-LA-K9 Advanced IP Services 4 - - 1 - - - - ● - ● ● ● - -※6 C819GW-LTE-LA-QK9 Advanced IP Services 4 - - 1 - - - - ● ● ● ● ● - -※6 C819H-K9 Advanced IP Services 4 - - 1 - - - - ● - - ● ● - -※6 IR829GW-LTE-LA-QK9 Advanced IP Services - 4 - - 1 - - - ● ● ● ● ● - -※7 C841M-4X-JSEC/K9 Advanced Security - 4 - 2 - - - - - - - ● ● - -※8 C841M-4X-JAIS/K9 Advanced IP Services - 4 - 2 - - - - - - - ● ● - -※8 C841M-8X-JAIS/K9 Advanced IP Services - 8 - 2 - - - - - - - ● ● - -※8 C867VAE IP Base 3 2 - 1 - - 1※2 - - - - - - - - C867VAE-K9 Advanced Security 3 2 - 1 - - 1※2 - - - - ● ● - - C881-K9 Advanced Security ※ 1 4 - 1 - - - - - - - - ● ● - -※9 C881W-P-K9 Advanced Security ※ 1 4 - 1 - - - - - - ● - ● ● - - C881-V-K9 Advanced IP Services 4 - 1 - - - - 7※3 - - - ● ● ●※5 - C891FJ-K9 Advanced IP Services - 8 1 - 1 1 - - ●※4 - - ● ● - -※9 C891-24X/K9 Advanced IP Services - 24 - - 2 - - - - - - ● ● - -※10 C892FSP-K9 Advanced IP Services - 8 - 1 1 - - - ●※4 - - ● ● - -※9 C897VA-K9 Advanced IP Services - 8 - 1 - 1 1※2 - ●※4 - - ● ● - -※9 C899G-LTE-JP-K9 Advanced IP Services - 8 - 1 1 - - - ●※4 - ● ● ● - -※9 C899G-LTE-LA-K9 Advanced IP Services - 8 - 1 1 - - - ●※4 - ● ● ● - -※9 ■ Cisco ISR 800 シリーズ(2/2) ※1 Cisco IOS Advanced IP Services ライセンスにアップグレード可能。 ※2 Annex M は非対応。 ※3 BRI x 2、FXS x 4、FXO x 1。 ※4 機能ライセンスが必要。 ※5 呼制御およびメッセージング(MSG)は非対応。 ※6 DIN レール マウント(ACS-810-DM)およびフロア マウント/壁掛け(ACS-810-FWM)に対応(オプション)。 ※7 DIN レール マウント(IR829-DINRAIL)に対応(オプション)。 ※8 ACS-800M-RM-19 が必要。 ※9 ACS-890-RM-19 が必要。 ※10 ACS-2901-RM-19 が必要。 Machine-to-Machine(M2M) Machine-to-Machine(M2M)とは、人が介在せずに機械と機械が相互に通信し合 う通信形態を、IP ネットワークに集約するテクノロジーです。自動販売機や監視システ ム、センサーを搭載した計測機器など、すでにさまざまな機器で利用され、今後も導入 が加速することが予想されています。M2M を実現するネットワーク デバイスにとって重 要な要素は、コンパクト、モビリティ、および耐久性です。たとえば自動販売機の場合、 機械の内部にネットワーク デバイスを設置するためにはコンパクトである必要がありま す。環境によっては、夏場の高温に耐えうる耐久性も必要になるでしょう。 Cisco 819G/GW/H および IR829GW は、これらの課題を解決するために開発 されました。いずれも手のひらサイズのコンパクトなシャーシで、Cisco 819G/ GW および IR829GW は、4G LTE 2.5 にも対 応しています。さらに Cisco 819H/829GW は、-23 ℃ ~ +60 ℃ までの温度、および最高で 95 % の湿度で も動作し、工業用途にも耐えうる耐振動性と耐衝撃性を備えています。また、DIN レー ル マウントやフロア マウント、壁掛けなどの豊富な設置オプションもサポートします。 44 ルータ Cisco ISR 1900/2900/3900 シリーズ 小規模から大規模拠点での使用に適した、モジュラ型のサービス統合型ルータです。 ルーティングだけでなく、スイッチングやワイヤレス、セキュリティ、ユニファイド コミュ ニケーション、WAN 最適化、およびサービス仮想化など、さまざまなサービスを 1 台 に統合できます。 ■ 主な特長 ● Cisco IOS ユニバーサル イメージ搭載(IP Base/SEC/UC/APP) ● 現場交換可能な Cisco Services Performance Engine(SPE)マザーボード (Cisco ISR 3900 シリーズ) ● マルチコア CPU と大容量メモリを搭載 ● さまざまなネットワーク サービスを拡張モジュールで統合(EHWIC/SM スロット) ● Cisco UCS E シリーズ サーバ対応 ※1 拡張モジュールが必要。 ※2 機能ライセンスが必要。 ※3 Cisco IOS SEC ライセンスが必要。 ※4 ACS-1900-RM-19 が必要。 ※5 SFP モジュール スロットまたはデュアルパーパス ポートを含む。 ※6 機能ライセンスまたは拡張モジュールが必要。 ※7 Cisco IOS UC ライセンスと構成に応じた機能ライセンスなどが必要。 製品型番 Cisco IOS 拡張スロット ポート 高速化 ワイヤレス セキュリティ 音声 ラック EHWIC ISM SM PVDM FE GE マウント ISDN バック アップ xDSL 音声 WAAS AP WLC 4G FW IPS VPN GW 呼制御 MSG CISCO3925/K9 IP Base 4 1 2 4 -※1 4※5 -※1 -※1 -※1 -※6 - -※1 -※1 -※3 -※3 -※3 -※7 ● CISCO3925-SEC/K9 IP Base + SEC 4 1 2 4 -※1 4※5 -※1 -※1 -※1 -※6 - -※1 -※1 ● ● ● -※7 ● C3925-AX/K9 IP Base + SEC + APP 4 1 2 4 -※1 4※5 -※1 -※1 -※1 ● - -※1 -※1 ● ● ● -※7 ● CISCO3945/K9 IP Base 4 1 4 4 -※1 4※5 -※1 -※1 -※1 -※6 - -※1 -※1 -※3 -※3 -※3 -※7 ● CISCO3945-SEC/K9 IP Base + SEC 4 1 4 4 -※1 4※5 -※1 -※1 -※1 -※6 - -※1 -※1 ● ● ● -※7 ● C3945-AX/K9 IP Base + SEC + APP 4 1 4 4 -※1 4※5 -※1 -※1 -※1 ● - -※1 -※1 ● ● ● -※7 ● CISCO3925E/K9 IP Base 3 - 2 3 -※1 4※5 -※1 -※1 -※1 -※6 - -※1 -※1 -※3 -※3 -※3 -※7 ● CISCO3925E-SEC/K9 IP Base + SEC 3 - 2 3 -※1 4※5 -※1 -※1 -※1 -※6 - -※1 -※1 ● ● ● -※7 ● C3925E-AX/K9 IP Base + SEC + APP 3 - 2 3 -※1 4※5 -※1 -※1 -※1 ● - -※1 -※1 ● ● ● -※7 ● CISCO3945E/K9 IP Base 3 - 4 3 -※1 4※5 -※1 -※1 -※1 -※6 - -※1 -※1 -※3 -※3 -※3 -※7 ● CISCO3945E-SEC/K9 IP Base + SEC 3 - 4 3 -※1 4※5 -※1 -※1 -※1 -※6 - -※1 -※1 ● ● ● -※7 ● C3945E-AX/K9 IP Base + SEC + APP 3 - 4 3 -※1 4※5 -※1 -※1 -※1 ● - -※1 -※1 ● ● ● -※7 ● ■ Cisco ISR 3900 シリーズ 製品型番 Cisco IOS 拡張スロット ポート 高速化 ワイヤレス セキュリティ 音声 ラック EHWIC ISM SM PVDM FE GE マウント ISDN バック アップ xDSL 音声 WAAS AP WLC 4G FW IPS VPN GW 呼制御 MSG CISCO2901/K9 IP Base 4 1 - 2 -※1 2 -※1 -※1 -※1 -※2 - -※1 -※1 -※3 -※3 -※3 -※7 ● CISCO2901-SEC/K9 IP Base + SEC 4 1 - 2 -※1 2 -※1 -※1 -※1 -※2 - -※1 -※1 ● ● ● -※7 ● C2901-AX/K9 IP Base + SEC + APP 4 1 - 2 -※1 2 -※1 -※1 -※1 ● - -※1 -※1 ● ● ● -※7 ● CISCO2911/K9 IP Base 4 1 1 2 -※1 3 -※1 -※1 -※1 -※6 - -※1 -※1 -※3 -※3 -※3 -※7 ● CISCO2911-SEC/K9 IP Base + SEC 4 1 1 2 -※1 3 -※1 -※1 -※1 -※6 - -※1 -※1 ● ● ● -※7 ● C2911-AX/K9 IP Base + SEC + APP 4 1 1 2 -※1 3 -※1 -※1 -※1 ● - -※1 -※1 ● ● ● -※7 ● CISCO2921/K9 IP Base 4 1 1 3 -※1 4※5 -※1 -※1 -※1 -※6 - -※1 -※1 -※3 -※3 -※3 -※7 ● CISCO2921-SEC/K9 IP Base + SEC 4 1 1 3 -※1 4※5 -※1 -※1 -※1 -※6 - -※1 -※1 ● ● ● -※7 ● C2921-AX/K9 IP Base + SEC + APP 4 1 1 3 -※1 4※5 -※1 -※1 -※1 ● - -※1 -※1 ● ● ● -※7 ● CISCO2951/K9 IP Base 4 1 2 3 -※1 4※5 -※1 -※1 -※1 -※6 - -※1 -※1 -※3 -※3 -※3 -※7 ● CISCO2951-SEC/K9 IP Base + SEC 4 1 2 3 -※1 4※5 -※1 -※1 -※1 -※6 - -※1 -※1 ● ● ● -※7 ● C2951-AX/K9 IP Base + SEC + APP 4 1 2 3 -※1 4※5 -※1 -※1 -※1 ● - -※1 -※1 ● ● ● -※7 ● ■ Cisco ISR 2900 シリーズ 製品型番 Cisco IOS 拡張スロット ポート 高速化 ワイヤレス セキュリティ 音声 ラック EHWIC ISM SM PVDM FE GE マウント ISDN バック アップ xDSL 音声 WAAS AP WLC 4G FW IPS VPN GW 呼制御 MSG CISCO1921/K9 IP Base 2 - - - -※1 2 -※1 -※1 - - - - -※1 -※3 -※3 -※3 - -※4 CISCO1921-SEC/K9 IP Base + SEC 2 - - - -※1 2 -※1 -※1 - - - - -※1 ● ● ● - -※4 C1921-AX/K9 IP Base + SEC + APP 2 - - - -※1 2 -※1 -※1 - ● - - -※1 ● ● ● - -※4 CISCO1941/K9 IP Base 2 1 - - -※1 2 -※1 -※1 - -※2 - -※1 -※1 -※3 -※3 -※3 - ● CISCO1941-SEC/K9 IP Base + SEC 2 1 - - -※1 2 -※1 -※1 - -※2 - -※1 -※1 ● ● ● - ● C1941-AX/K9 IP Base + SEC + APP 2 1 - - -※1 2 -※1 -※1 - ● - -※1 -※1 ● ● ● - ● ■ Cisco ISR 1900 シリーズ バンドル 製品型番に 含まれる文字列 バンドル ライセンス / モジュール IOS SEC IOS UC IOS APP CME/SRST PVDM3 セキュリティ バンドル SEC ● - - - - 音声およびビデオ バンドル V - ● - - ● CME-SRST バンドル CME-SRST - ● - ● ● 音声およびビデオ セキュリティ バンドル VSEC ● ● - - ● アプリケーション エクスペリエンス バンドル AX ● - ● - - ■ Cisco ISR 1900/2900/3900 シリーズ バンドル仕様比較 45 スイッチ ワイヤレス セキュリティ Meraki サービス ルータ Cisco ISR 4000 シリーズ 小規模から大規模拠点での使用に適した、モジュラ型のサービス統合型ルータです。ルーティングだけでなく、ス イッチングやワイヤレス、セキュリティ、ユニファイド コミュニケーション、WAN 最適化、およびサービス仮想化など、 さまざまなサービスを 1 台に統合できます。コントロール、データ、サービスの各リソースがハードウェアレベルで分 離されているため、負荷が高い場合でも可用性を損なわずにサービスを提供できます。 ■ 主な特長 ● Cisco IOS XE ユニバーサル イメージ搭載(IP Base/SEC/UC/AX 対応) ● マルチコア CPU と 4 GB のメモリを搭載(Cisco 4321/4331/4351、Cisco 4321 は最大 8 GB、Cisco 4331/4351 は最大 16 GB のメモリを搭載可能) ● マルチコア CPU とコントロール プレーン用に 4 GB およびデータ プレーン用に 2 GB のメモリを搭 載(Cisco 4431/4451、最大 16 GB のメモリを搭載可能) ● さまざまなネットワーク サービスを拡張モジュールで統合(NIM/SM-X スロット) ● Cisco UCS E シリーズ サーバ対応 製品型番 Cisco IOS 拡張スロット ポート 高速化 ワイヤレス セキュリティ 音声 ラック NIM SM/ マウント SM-X PVDM FE GE ISDN バック アップ xDSL 音声 WAAS AP WLC 4G FW IPS VPN GW 呼制御 MSG ISR4321/K9 IP Base 2 - 1 - 2※2 -※3 -※3 -※3 -※4 - -※3 -※3 -※5 -※5 -※5 -※6 ● ISR4321-SEC/K9 IP Base + SEC 2 - 1 - 2※2 -※3 -※3 -※3 -※4 - -※3 -※3 ● ● ● -※6 ● ISR4321-V/K9 IP Base + UC 2 - 1 - 2※2 -※3 -※3 -※3 -※4 - -※3 -※3 -※5 -※5 -※5 ● ● ISR4321-AX/K9 IP Base + SEC + APP 2 - 1 - 2※2 -※3 -※3 -※3 ● - -※3 -※3 ● ● ● -※6 ● ISR4321-AXV/K9 IP Base + SEC + UC + APP 2 - 1 - 2※2 -※3 -※3 -※3 ● - -※3 -※3 ● ● ● ● ● ISR4331/K9 IP Base 2 1 1 - 3※2 -※3 -※3 -※3 -※4 - -※3 -※3 -※5 -※5 -※5 -※6 ● ISR4331-SEC/K9 IP Base + SEC 2 1 1 - 3※2 -※3 -※3 -※3 -※4 - -※3 -※3 ● ● ● -※6 ● ISR4331-V/K9 IP Base + UC 2 1 1 - 3※2 -※3 -※3 -※3 -※4 - -※3 -※3 -※5 -※5 -※5 ● ● ISR4331-AX/K9 IP Base + SEC + APP 2 1 1 - 3※2 -※3 -※3 -※3 ● - -※3 -※3 ● ● ● -※6 ● ISR4331-AXV/K9 IP Base + SEC + UC + APP 2 1 1 - 3※2 -※3 -※3 -※3 ● - -※3 -※3 ● ● ● ● ● ISR4351/K9 IP Base 3 2 1 - 3※2 -※3 -※3 -※3 -※4 - -※3 -※3 -※5 -※5 -※5 -※6 ● ISR4351-SEC/K9 IP Base + SEC 3 2 1 - 3※2 -※3 -※3 -※3 -※4 - -※3 -※3 ● ● ● -※6 ● ISR4351-V/K9 IP Base + UC 3 2 1 - 3※2 -※3 -※3 -※3 -※4 - -※3 -※3 -※5 -※5 -※5 ● ● ISR4351-AX/K9 IP Base + SEC + APP 3 2 1 - 3※2 -※3 -※3 -※3 ● - -※3 -※3 ● ● ● -※6 ● ISR4351-AXV/K9 IP Base + SEC + UC + APP 3 2 1 - 3※2 -※3 -※3 -※3 ● - -※3 -※3 ● ● ● ● ● ISR4431/K9 IP Base 3 - 1 - 4※2 -※3 -※3 -※3 -※4 - -※3 -※3 -※5 -※5 -※5 -※6 ● ISR4431-SEC/K9 IP Base + SEC 3 - 1 - 4※2 -※3 -※3 -※3 -※4 - -※3 -※3 ● ● ● -※6 ● ISR4431-V/K9 IP Base + UC 3 - 1 - 4※2 -※3 -※3 -※3 -※4 - -※3 -※3 -※5 -※5 -※5 ● ● ISR4431-AX/K9 IP Base + SEC + APP 3 - 1 - 4※2 -※3 -※3 -※3 ● - -※3 -※3 ● ● ● -※6 ● ISR4431-AXV/K9 IP Base + SEC + UC + APP 3 - 1 - 4※2 -※3 -※3 -※3 ● - -※3 -※3 ● ● ● ● ● ISR4451-X/K9 IP Base 3 2 1 - 4※2 -※3 -※3 -※3 -※4 - -※3 -※3 -※5 -※5 -※5 -※6 ● ISR4451-X-SEC/K9 IP Base + SEC 3 2 1 - 4※2 -※3 -※3 -※3 -※4 - -※3 -※3 ● ● ● -※6 ● ISR4451-X-V/K9 IP Base + UC 3 2 1 - 4※2 -※3 -※3 -※3 -※4 - -※3 -※3 -※5 -※5 -※5 ● ● ISR4451-X-AX/K9 IP Base + SEC + APP 3 2 1 - 4※2 -※3 -※3 -※3 ● - -※3 -※3 ● ● ● -※6 ● ISR4451-X-AXV/K9 IP Base + SEC + UC + APP 3 2 1 - 4※2 -※3 -※3 -※3 ● - -※3 -※3 ● ● ● ● ● ISR4451XWAAS-200G IP Base + SEC + APP 2 2 1 - 4※2 -※3 -※3 -※3 ● - -※3 -※3 ● ● ● -※6 ● ■ Cisco ISR 4000 シリーズ ■ Cisco ISR 4000 シリーズ バンドル仕様比較 バンドル 製品型番に 含まれる文字列 バンドル ライセンス / モジュール IOS SEC IOS UC IOS APP CME/SRST PVDM4 セキュリティ バンドル SEC ● - - - - 音声バンドル V - ● - - ●※1 音声セキュリティ バンドル VSEC ● ● - - ●※1 アプリケーション エクスペリエンス バンドル AX ● - ● - - アプリケーション エクスペリエンス音声バンドル AXV ● ● ● - ●※1 Cisco ISR 4000 シリーズが搭載する Cisco IOS Cisco ISR 4000 シリーズの Cisco IOS テクノロジー パッケージ ライセンスには、IP Base/Security(SEC)/Unified Collaboration(UC)/Application Experience(APP) の 4 種類があります。 IP Base ライセンス/SEC ライセンス/UC ライセンスは、Cisco ISR 800/1900/2900/ 3900 シリーズと同 様 に、 そ れ ぞ れ IP 制御機能/IP セ キュリティ機 能/IP テレフォ ニー機能を提供するテクノロジー セットです。 新しい APP ライセンスは、Cisco ISR 1900/2900/3900 シリーズの包括的な IP 制御機能を提供するテクノロジー セットである DATA ライセンスに、Cisco Wide Area Application Services(WAAS)ライセンスや Application Visibility & Control(AVC)ライセンスなどを統合したテクノロジー セットです。 APP ライセンス は、Cisco ISR 800/1900/2900/3900 シリーズでも提供されます。 APP ライセンスの詳細は、47 ページをご覧ください。 IP Base SECHSEC Unied CME/SRST Unied BEe UC APP Performance-on-demand ※1 Cisco 4321 は非対応。 ※2 SFP モジュール スロットまたはデュアルパーパス ポートを含む。 ※3 拡張モジュールが必要。 ※4 機能ライセンスまたは拡張モジュールが必要。  ※5 Cisco IOS SEC ライセンスが必要。 ※6 Cisco IOS UC ライセンスと構成に応じた機能ライセンスなどが必要。 46 ルータ 製品型番 製品説明 対応モデル 800 1921 1941 2901 2911 2921 2951 3925 3945 3925E 3945E 4321 4331 4351 4431 4451 L-SL-19-SEC-K9 Cisco ISR 1900 シリーズ用 Cisco IOS SEC ライセンス - ● ● - - - - - - - - - - - - - L-SL-29-SEC-K9 Cisco ISR 2900 シリーズ用 Cisco IOS SEC ライセンス - - - ● ● ● ● - - - - - - - - - L-SL-39-SEC-K9 Cisco ISR 3900 シリーズ用 Cisco IOS SEC ライセンス - - - - - - - ● ● ● ● - - - - - SL-4320-SEC-K9 Cisco ISR 4321 用 Cisco IOS SEC ライセンス - - - - - - - - - - - ● - - - - SL-4330-SEC-K9 Cisco ISR 4331 用 Cisco IOS SEC ライセンス - - - - - - - - - - - - ● - - - SL-4350-SEC-K9 Cisco ISR 4351 用 Cisco IOS SEC ライセンス - - - - - - - - - - - - - ● - - SL-44-SEC-K9 Cisco ISR 4400 シリーズ用 Cisco IOS SEC ライセンス - - - - - - - - - - - - - - ● ● L-SL-29-UC-K9 Cisco ISR 2900 シリーズ用 Cisco IOS UC ライセンス - - - ● ● ● ● - - - - - - - - - L-SL-39-UC-K9 Cisco ISR 3900 シリーズ用 isco IOS UC ライセンス - - - - - - - ● ● ● ● - - - - - SL-4320-UC-K9 Cisco ISR 4321 用 Cisco IOS UC ライセンス - - - - - - - - - - - ● - - - - SL-4330-UC-K9 Cisco ISR 4331 用 Cisco IOS UC ライセンス - - - - - - - - - - - - ● - - - SL-4350-UC-K9 Cisco ISR 4351 用 Cisco IOS UC ライセンス - - - - - - - - - - - - - ● - - SL-44-UC-K9 Cisco ISR 4400 シリーズ用 isco IOS UC ライセンス - - - - - - - - - - - - - - ● ● SL-19-APP-K9 Cisco ISR 1900 シリーズ用 Cisco IOS APP ライセンス - ● ● - - - - - - - - - - - - - SL-29-APP-K9 Cisco ISR 2900 シリーズ用 Cisco IOS APP ライセンス - - - ● ● ● ● - - - - - - - - - SL-39-APP-K9 Cisco ISR 3900 シリーズ用 Cisco IOS APP ライセンス - - - - - - - ● ● ● ● - - - - - SL-4320-APP-K9 Cisco ISR 4321 用 Cisco IOS APP ライセンス - - - - - - - - - - - ● - - - - SL-4330-APP-K9 Cisco ISR 4331 用 Cisco IOS APP ライセンス - - - - - - - - - - - - ● - - - SL-4350-APP-K9 Cisco ISR 4351 用 Cisco IOS APP ライセンス - - - - - - - - - - - - - ● - - SL-44-APP-K9 Cisco ISR 4400 シリーズ用 Cisco IOS APP ライセンス - - - - - - - - - - - - - - ● ● ■ Cisco IOS テクノロジー パッケージ ライセンス 製品型番 製品説明 対応モデル 800 1921 1941 2901 2911 2921 2951 3925 3945 3925E 3945E 4321 4331 4351 4431 4451 L-FL-29-HSEC-K9 Cisco 2921/2951 用 Cisco IOS HSEC ライセンス※ 1 - - - - - ● ● - - - - - - - - - L-FL-39-HSEC-K9 Cisco 3925/3945 用 Cisco IOS HSEC ライセンス※ 1 - - - - - - - ● ● - - - - - - - L-FL-39E-HSEC-K9 Cisco 3925E/3945E 用 Cisco IOS HSEC ライセンス※ 1 - - - - - - - - - ● ● - - - - - FL-4320-HSEC-K9 Cisco ISR 4321 用 Cisco IOS HSEC ライセンス※ 1 - - - - - - - - - - - ● - - - - FL-4330-HSEC-K9 Cisco ISR 4331 用 Cisco IOS HSEC ライセンス※ 1 - - - - - - - - - - - - ● - - - FL-4350-HSEC-K9 Cisco ISR 4351 用 Cisco IOS HSEC ライセンス※ 1 - - - - - - - - - - - - - ● - - FL-44-HSEC-K9 Cisco ISR 4400 シリーズ用 Cisco IOS HSEC ライセンス※ 1 - - - - - - - - - - - - - - ● ● L-FL-CME-SRST-5 Cisco Unified CME または SRST 5 ライセンス※ 2 ※ 3 ● - - ● ● ● ● ● ● ● ● ● ● ● ● ● L-FL-CME-SRST-25 Cisco Unified CME または SRST 25 ライセンス ※ 2 - - - ● ● ● ● ● ● ● ● ● ● ● ● ● L-FL-CME-SRST-100 Cisco Unified CME または SRST 100 ライセンス ※ 2 - - - - - ● ● ● ● ● ● - ● ● ● ● FL-CUBEE-5-RED Cisco Unified BEe 5 冗長構成ライセンス※ 2 - - - ● ● ● ● ● ● ● ● ● ● ● ● ● FL-CUBEE-25-RED Cisco Unified BEe 25 冗長構成ライセンス※ 2 - - - ● ● ● ● ● ● ● ● ● ● ● ● ● FL-CUBEE-100-RED Cisco Unified BEe 100 冗長構成ライセンス※ 2 - - - ● ● ● ● ● ● ● ● ● ● ● ● ● FL-CUBEE-500-RED Cisco Unified BEe 500 冗長構成ライセンス※ 2 - - - - - - ● ● ● ● ● - - ● ● ● FL-CUBEE-1000-RED Cisco Unified BEe 1000 冗長構成ライセンス※ 2 - - - - - - - - ● ● ● - - ● ● ● L-FL-29-SNA Cisco ISR 2900 シリーズ用 Cisco IOS SNA スイッチング ライセンス※ 4 - - - ● ● ● ● - - - - - - - - - L-FL-39-SNA Cisco ISR 3900 シリーズ用 Cisco IOS SNA スイッチング ライセンス※ 4 - - - - - - - ● ● ● ● - - - - - L-FL-C800-APP Cisco ISR 800 シリーズ用 Cisco IOS APP ライセンス※ 5 ● - - - - - - - - - - - - - - - FL-4320-PERF-K9 Cisco ISR 4321 用 Cisco IOS パフォーマンス オンデマンド ライセンス - - - - - - - - - - - ● - - - - FL-4330-PERF-K9 Cisco ISR 4331 用 Cisco IOS パフォーマンス オンデマンド ライセンス - - - - - - - - - - - - ● - - - FL-4350-PERF-K9 Cisco ISR 4351 用 Cisco IOS パフォーマンス オンデマンド ライセンス - - - - - - - - - - - - - ● - - FL-44-PERF-K9 Cisco ISR 4400 シリーズ用 Cisco IOS パフォーマンス オンデマンド ライセンス - - - - - - - - - - - - - - ● ● ■ Cisco IOS 機能ライセンス モジュール & アクセサリ Cisco IOS APP ライセンス Cisco IOS APP ライセンスは、Cisco ISR 1900/2900/3900 シリーズの包括的な IP 制御機能を提供するテクノロジー セットである DATA ライセンスに、Cisco Wide Area Application Services(WAAS)ライセンスや Application Visibility & Control(AVC)ライセンスなどを統合したテクノロジー セットです。Cisco ISR 800 シリーズでは機能ライセンスとして、Cisco ISR 1900/2900/3900/4000 シリーズ ではテクノロジー パッケージ ライセンスまたはアプリケーション エクスペリエンス バンド ルとして提供されます。 製品型番 バンドル ライセンス / メモリ SEC DATA WAAS-X ISR WAAS vWAAS WAAS/vWAAS 最適化接続数 AVC DRAM L-FL-C800-APP - - ● - - - ● ● SL-19-APP-K9 - ● ● - - - ● - SL-29-APP-K9 - ● ● - ●※1 1300 ● - SL-39-APP-K9 - ● ● - ● 2500 ● - SL-4320-APP-K9 - ● - ● - 2500 ● - SL-4330-APP-K9 - ● - ● ● 2500 ● - SL-4350-APP-K9 - ● - ● ● 2500 ● - SL-44-APP-K9 - ● - ● ●※2 2500 ● - ■ Cisco IOS APP ライセンス プラットフォーム バンドル ライセンス / メモリ WAN 最大帯域幅(Mbps)/TCP 最適化接続数(最大) SEC DATA WAAS-X ISR WAAS vWAAS AVC DRAM WAAS-X ISR-WAAS vWAAS ※ 3 1300 2500 6000 1921 ● ● ● - - ● - 0.512/50 - - - 1941 ● ● ● - - ● ● 4/150 - - - 2901 ● ● ● - - ● ● 6/150 - - - 2911/2921 ● ● ● - ● ● - 6/200 80/1300 150/2500 200/6000 ~ 2951 ● ● ● - ● ● - 6/400 80/1300 150/2500 200/6000 ~ 3925/3945/3925E/3945E ● ● ● - ● ● - 6/400 80/1300 150/2500 200/6000 ~ 4321 ● ● - ● - ● ● 15/200 - - - 4331/4351 ● ● - ● ● ● - 25/750 80/1300 150/2500 200/6000 ~ 4431 ● ● - ● - ● ● 50/1300 - - - 4451 ● ● - ● ● ● - 150/2500 80/1300 150/2500 200/6000 ~ ■ Cisco ISR アプリケーション エクスペリエンス バンドル ※1 Cisco 2901 は非対応。 ※2 Cisco 4321/4431 は非対応。 ※3 Cisco ISR 2900/3900/4000 シリーズ用 Cisco UCS E シリーズ サーバが必要。 ※1 Cisco IOS SEC ライセンスが必要。 ※2 Cisco IOS UC ライセンスが必要。 ※3 Cisco ISR 800 シリーズは Cisco 881-V のみ応。 ※4 Cisco IOS APP ライセンスが必要。 ※5 Cisco ISR 800 シリーズは Cisco 891FJ/892FSP/897VA/899G のみ対応。 47 スイッチ ワイヤレス セキュリティ Meraki サービス ルータ ■ Cisco ISR 1900/2900/3900/4000 シリーズ用拡張モジュール(1/2) 製品型番 製品説明 搭載 スロット 対応モデル 1921 1941 2901 2911 2921 2951 3925 3945 3925E 3945E 4321 4331 4351 4431 4451 EHWIC-4ESG Gigabit EtherSwitch モジュール(L2、4 ポート GE) EHWIC ● ● ● ● ● ● ● ● ● ● - - - - - EHWIC-4ESG-P Gigabit EtherSwitch モジュール(L2、4 ポート GE/PoE) EHWIC ● ● ● ● ● ● ● ● ● ● - - - - - EHWIC-D-8ESG Gigabit EtherSwitch モジュール(L2、8 ポート GE) EHWIC ● ● ● ● ● ● ● ● ● ● - - - - - EHWIC-D-8ESG-P Gigabit EtherSwitch モジュール(L2、8 ポート GE/PoE) EHWIC ● ● ● ● ● ● ● ● ● ● - - - - - SM-ES2-16-P Enhanced EtherSwitch モジュール(L2、16 ポート FE/GE/PoE) SM - - - ● ● ● ● ● ● ● - - - - - SM-ES2-24 Enhanced EtherSwitch モジュール(L2、24 ポート FE/GE) SM - - - ● ● ● ● ● ● ● - - - - - SM-ES2-24-P Enhanced EtherSwitch モジュール(L2、24 ポート FE/GE/PoE) SM - - - ● ● ● ● ● ● ● - - - - - SM-ES3-16-P Enhanced EtherSwitch モジュール(L2/L3、16 ポート FE/GE/PoE) SM - - - ● ● ● ● ● ● ● - - - - - SM-ES3-24-P Enhanced EtherSwitch モジュール(L2/L3、24 ポート FE/GE/PoE) SM - - - ● ● ● ● ● ● ● - - - - - SM-ES3G-16-P Enhanced EtherSwitch モジュール(L2/L3、16 ポート GE/PoE) SM - - - ● ● ● ● ● ● ● - - - - - SM-ES3G-24-P Enhanced EtherSwitch モジュール(L2/L3、24 ポート GE/PoE) SM - - - ● ● ● ● ● ● ● - - - - - NIM-ES2-4 EtherSwitch モジュール(L2、4 ポート GE) NIM - - - - - - - - - - ● ● ● ● ● NIM-ES2-8 EtherSwitch モジュール(L2、8 ポート GE) NIM - - - - - - - - - - ● ● ● ● ● NIM-ES2-8-P モジュール(L2、8 ポート GE/PoE+) NIM - - - - - - - - - - ● ● ● ● ● SM-X-ES3-16-P SM-X EtherSwitch モジュール(L2/L3、16 ポート GE/PoE+)※ 1 SM - - - ● ● ● ● ● ● ● - ● ● - ● SM-X-ES3-24-P SM-X EtherSwitch モジュール(L2/L3、24 ポート GE/PoE+)※ 1 SM - - - ● ● ● ● ● ● ● - ● ● - ● SM-X-ES3D-48-P SM-X EtherSwitch モジュール(L2/L3、48 ポート GE/PoE+)※ 1 SM - - - - ● ● ● ● ● ● - - ● - ● EHWIC-1GE-SFP-CU GE/SFP WAN モジュール(1 ポート) EHWIC ● ● ● ● ● ● ● ● ● ● - - - - - WIC-1B-S/T-V3 ISDN BRI モジュール(1 ポート) EHWIC ● ● ● ● ● ● ● ● ● ● - - - - - HWIC-4B-S/T ISDN BRI モジュール(4 ポート) EHWIC ● ● ● ● ● ● ● ● ● ● - - - - - NIM-1T シリアル WAN モジュール(1 ポート) NIM - - - - - - - - - - ● ● ● ● ● NIM-2T シリアル WAN モジュール(2 ポート) NIM - - - - - - - - - - ● ● ● ● ● NIM-4T シリアル WAN モジュール(4 ポート) NIM - - - - - - - - - - ● ● ● ● ● SM-X-1T3/E3 T3/E3 モジュール(1 ポート)※ 1 SM - - - ● ● ● ● ● ● ● - ● ● - ● NIM-1GE-CU-SFP GE/SFP モジュール(1 ポート) NIM - - - - - - - - - - ● ● ● ● ● NIM-2GE-CU-SFP GE/SFP モジュール(2 ポート) NIM - - - - - - - - - - ● ● ● ● ● SM-X-6X1G GE/SFP サービス モジュール(6 ポート) SM-X - - - - - - - - - - - ● ● - ● SM-X-4X1G-1X10G GE/SFP(4 ポート)または SFP+(1 ポート)サービス モジュール SM-X - - - - - - - - - - - ● ● - ● EHWIC-LTE-JN 4G LTE ワイヤレス WAN モジュール EHWIC ● ● ● ● ● ● ● ● ● ● - - - - - ※1 Cisco ISR 4000 シリーズは SM-X スロットに搭載。 4G LTE ワイヤレス WAN ソリューション 4G LTE ワイヤレス WAN 対応の Cisco ISR 800 シリーズ、および 4G LTE ワイヤレス WAN モジュー ル(EHWIC-LTE-JN)を 搭 載 し た Cisco ISR 1900/2900/3900 シリーズを導入することで、モバイル 4G LTE ネットワークをプ ライマリ WAN またはバックアップ WAN としてすばやく展開できるようになります。 ■ プライマリ WAN として導入 本社 小規模拠点 移動拠点 プライマリ WAN 携帯電話の 4G ネットワーク ■ バックアップ WAN として導入 拠点 本社 バックアップ WAN プライマリ WAN 携帯電話の 4G ネットワーク 48 ルータ 製品型番 製品説明 搭載 スロット 対応モデル 1921 1941 2901 2911 2921 2951 3925 3945 3925E 3945E 4321 4331 4351 4431 4451 VIC3-2FXS/DID 音声モジュール(2 ポート FXS/DID) EHWIC - - ● ● ● ● ● ● ● ● - - - - - VIC2-2BRI-NT/TE 音声モジュール(2 ポート BRI) EHWIC - - ● ● ● ● ● ● ● ● - - - - - NIM-2FXS 音声モジュール(2 ポート FXS) NIM - - - - - - - - - - ● ● ● ● ● NIM-4FXS 音声モジュール(4 ポート FXS) NIM - - - - - - - - - - ● ● ● ● ● NIM-2FXO 音声モジュール(2 ポート FXO) NIM - - - - - - - - - - ● ● ● ● ● NIM-4FXO 音声モジュール(4 ポート FXO) NIM - - - - - - - - - - ● ● ● ● ● NIM-2FXS/4FXO 音声モジュール(2 ポート FXS および 4 ポート FXO) NIM - - - - - - - - - - ● ● ● ● ● NIM-4E/M 音声モジュール(4 ポート E/M) NIM - - - - - - - - - - ● ● ● ● ● VWIC3-1MFT-T1/E1 音声 /WAN モジュール(1 ポート T1/E1)※ 1 EHWIC ● ● ● ● ● ● ● ● ● ● - - - - - VWIC3-4MFT-T1/E1 音声 /WAN モジュール(4 ポート T1/E1) EHWIC - - - ● ● ● ● ● ● ● - - - - - NIM-1MFT-T1/E1 音声 /WAN モジュール(1 ポート T1/E1) NIM - - - - - - - - - - ● ● ● ● ● NIM-2MFT-T1/E1 音声 /WAN モジュール(2 ポート T1/E1) NIM - - - - - - - - - - ● ● ● ● ● NIM-4MFT-T1/E1 音声 /WAN モジュール(4 ポート T1/E1) NIM - - - - - - - - - - ● ● ● ● ● NIM-8MFT-T1/E1 音声 /WAN モジュール(8 ポート T1/E1) NIM - - - - - - - - - - ● ● ● ● ● NIM-1CE1T1-PRI 音声 /WAN モジュール(1 ポート T1/E1/G.703) NIM - - - - - - - - - - ● ● ● ● ● NIM-2CE1T1-PRI 音声 /WAN モジュール(2 ポート T1/E1/G.703) NIM - - - - - - - - - - ● ● ● ● ● NIM-8CE1T1-PRI 音声 /WAN モジュール(8 ポート T1/E1/G.703) NIM - - - - - - - - - - ● ● ● ● ● PVDM3-16 高密度パケット音声 / ビデオ DSP モジュール(16 チャネル) PVDM3 - - ● ● ● ● ● ● ● ● - - - - - PVDM3-32 高密度パケット音声 / ビデオ DSP モジュール(32 チャネル) PVDM3 - - ● ● ● ● ● ● ● ● - - - - - PVDM3-64 高密度パケット音声 / ビデオ DSP モジュール(64 チャネル) PVDM3 - - ● ● ● ● ● ● ● ● - - - - - PVDM3-128 高密度パケット音声 / ビデオ DSP モジュール(128 チャネル) PVDM3 - - ● ● ● ● ● ● ● ● - - - - - PVDM3-192 高密度パケット音声 / ビデオ DSP モジュール(192 チャネル) PVDM3 - - ● ● ● ● ● ● ● ● - - - - - PVDM3-256 高密度パケット音声 / ビデオ DSP モジュール(256 チャネル) PVDM3 - - ● ● ● ● ● ● ● ● - - - - - PVDM4-32 高密度パケット音声 / ビデオ DSP モジュール(16 チャネル) PVDM4※3 - - - - - - - - - - ● ● ● ● ● PVDM4-64 高密度パケット音声 / ビデオ DSP モジュール(32 チャネル) PVDM4※3 - - - - - - - - - - ● ● ● ● ● PVDM4-128 高密度パケット音声 / ビデオ DSP モジュール(64 チャネル) PVDM4※3 - - - - - - - - - - ● ● ● ● ● PVDM4-256 高密度パケット音声 / ビデオ DSP モジュール(128 チャネル) PVDM4※3 - - - - - - - - - - ● ● ● ● ● PVDM4-64U128 PVDM4-64 から PVDM4-128 へのファクトリ アップグレード PVDM4※3 - - - - - - - - - - ● ● ● ● ● PVDM4-64U256 PVDM4-64 から PVDM4-256 へのファクトリ アップグレード PVDM4※3 - - - - - - - - - - ● ● ● ● ● SM-X-PVDM-500 高密度音声 DSP モジュール(768 チャネル) SM-X - - - - - - - - - - - ● ● - ● SM-X-PVDM-1000 高密度音声 DSP モジュール(1,024 チャネル) SM-X - - - - - - - - - - - ● ● - ● SM-X-PVDM-2000 高密度音声 DSP モジュール(2,048 チャネル)※ 2 SM-X - - - - - - - - - - - - ● - ● SM-X-PVDM-3000 高密度音声 DSP モジュール(3,080 チャネル)※ 2 SM-X - - - - - - - - - - - - ● - ● ■ Cisco ISR 1900/2900/3900/4000 シリーズ用拡張モジュール(2/2) 製品型番 CPU コア メモリ 内蔵 ドライブ スロット RAID 搭載 スロット 対応モデル デフォルト 最大 1921 1941 2901 2911 2921 2951 3925 3945 3925E 3945E 4321 4331 4351 4431 4451 UCS-EN120E-54/K9 4 4 GB 4 GB 1 - EHWIC ● ● ● ● ● ● ● ● ● ● - - - - - UCS-EN120E-58/K9 4 8 GB 8 GB 1 - EHWIC ● ● ● ● ● ● ● ● ● ● - - - - - UCS-EN120E-108/K9 4 8 GB 8 GB 1 - EHWIC ● ● ● ● ● ● ● ● ● ● - - - - - UCS-EN120E-208/K9 4 8 GB 8 GB 1 - EHWIC ● ● ● ● ● ● ● ● ● ● - - - - - UCS-EN140N-M2/K9 4 8 GB 8 GB 1 - NIM - - - - - - - - - - ● ● ● ● ● UCS-EN120S-M2/K9 2 4 GB 16 GB 2 0/1 SM※4 - - - ● ● ● ● ● ● ● - ● ● - ● UCS-E140S-M2/K9 4 8 GB 16 GB 2 0/1 SM※4 - - - ● ● ● ● ● ● ● - ● ● - ● UCS-E160S-M3/K9 6 8 GB 32 GB 2 0/1 SM※4 - - - ● ● ● ● ● ● ● - ● ● - ● UCS-E160D-M2/K9 6 8 GB 96 GB 3 0/1/5 SM※4 - - - - - - ● ● ● ● - - ● - ● UCS-E180D-M2/K9 8 8 GB 96 GB 3 0/1/5 SM※4 - - - - - - ● ● ● ● - - ● - ● ■ Cisco ISR 1900/2900/3900/4000 シリーズ用 Cisco UCS E シリーズ サーバ ※1 Cisco ISR 1900 シリーズはデータ通信のみに対応。 ※2 Cisco 4351 は 1,024 チャネルまでサポート。 ※3 Voice NIM の PVDM4 スロットでも対応。 ※4 Cisco ISR 4000 シリーズは SM-X スロットに搭載。 49 スイッチ ワイヤレス セキュリティ Meraki サービス ルータ Cisco WAAS Express Cisco ISR 800/1900/2900/3900 シリーズが搭載する Cisco IOS に統合されている、拠点用のソフトウェア製品です。 機能ライセンスまたは Cisco IOS APP ライセンスで有効化します。 Cisco ISR WAAS Cisco ISR 4000 シリーズが搭載する Cisco IOS XE に統合されている、拠点またはセンター用のソフトウェア製品です。 Cisco IOS APP ライセンスで有効化します。 Cisco vWAAS Cisco ISR 2900/3900/4000 シリーズ用 Cisco UCS E シリーズ サーバや Cisco UCS C シリーズ ラック サーバなど、 VMware ESX/ESXi 上で実装する拠点またはセンター用のソフトウェア製品です。 Cisco WAAS アプライアンス 拠点またはセンター用のハードウェア アプライアンスです。 Cisco Wide Area Application Services(WAAS)は、オフィス間における WAN の最適化とアプリケーションの高速化を実現する優れたソリューションです。遅延など WAN 特有の問題を解決し、TCP ベースのアプリケーション パフォーマンスを向上させ ます。 ■ LAN 接続と同等のアプリケーション パフォーマンス Cisco WAAS によって、WAN 経由でも LAN 接続と同等のパフォーマンスでアプリケー ションを利用できるようになります。 ● スループットの最適化:トランスポート プロトコルの挙動を向上させて、WAN 環境 をさらに改善します。 ● 帯域幅の効率化:DRE(Data Redundancy Elimination)や圧縮技術を利用して、 冗長なデータ パターンの送受信を最小化します。 ● アプリケーション高速化:先読み、プロトコル代行、キャッシングといったテクノロジー を活用して遅延を削減し、帯域幅の効率的な利用を実現します。 ■ Citrix XenDesktop および XenApp を完全サポート ビジネスの柔軟性や継続性、コンプライアンス/セキュリティ要件の制約などから、VDI (Virtual Desktop Infrastructure:仮想デスクトップ インフラストラクチャ)ソリュー ションの普及が加速しています 。しかし、クライアントから仮想デスクトップ(サーバ)へ の接続はネットワークを経由する以上、とりわけ WAN を経由する場合には、遅延や帯 域幅の制限を十分に考慮する必要があります。 Cisco WAAS は、Citrix 社 の VDI ソリュー ション Citrix XenDesktop および XenApp との互換性について同社の認定を取得、次のようなメリットをもたらします。 ● WAN 上での仮想デスクトップ パフォーマンスが最大 70 パーセント向上 ● コストのかかる WAN 帯域幅の増強なしで Citrix クライアントの同時接続数が最大 2 倍に増大 ● WAN 帯域幅の要件を最大 60 パーセント削減 ● WAN 経由での印刷を最大 98 パーセント最適化 ● Citrix MSI (Multi Stream ICA)をサポート Cisco WAAS とは Cisco WAAS には、ビジネスの規模に合わせて自由に選択できるだけでなく、ビジネ スの成長に合わせて柔軟に拡張できる、豊富なラインアップがあります。これらの製品 によって、さまざまな利用環境で WAN の最適化とアプリケーションの高速化を実現し、 企業の生産性を向上させることができます。 Cisco WAAS 製品ポートフォリオ Cisco ISR WAAS on Cisco ISR 4000 シリーズ Cisco vWAAS on Cisco UCS E シリーズ サーバ Cisco vWAAS on Cisco UCS C シリーズ ラックサーバ Cisco WAAS アプライアンス Cisco WAAS Express on Cisco ISR 800/1900/2900/3900 シリーズ ネットワークの規模 大 Cisco Wide Area Application Services(WAAS) Cisco WAAS の詳細は、次の Web サイトをご覧ください。 http://www.cisco.com/jp/go/waas 50 ルータ ※1 プラットフォームがサポートする最大 DRAM が必要。 ※2 MEM-294-8GB が必要。 ※3 MEM-594-12GB が必要。 ※4 MEM-694-24GB が必要。 ※5 Cisco AppNav 10 GE バンドル(WAVE-APNV-10GE)が必要。 ※6 Cisco AppNav GE または SFP モジュールが必要。 ※7 Cisco WAAS ソフトウェアリリース 5.1 によるパフォーマンス指標。 ※8 管理対象デバイスに Cisco WAAS Express 搭載ルータが混在する環境では、最大管理デバイス数が約 20 % 低下。 ※9 WAVE-294-K9 はデフォルトで搭載。 ■ Cisco WAAS Central Manager Cisco WAAS Central Manager は、すべての Cisco WAAS 実装に必要不可 欠な管理ツールです。一般的に、データやアプリケーションのサーバを設置するセン ター側で、単一の Cisco WAAS アプライアンスとして実装するか、または VMware ESX/ESXi 上の Cisco Virtual WAAS Central Manager として実装します。 Cisco WAAS Central Manager で は、Cisco WAAS Express を有効化した Cisco ISR 800/1900/2900/3900 シリーズ、Cisco ISR WAAS を有効化した Cisco ISR 4000 シリーズ、および Cisco WAAS アプライアンスなど、複数の拠点に 分散配置されたさまざまな Cisco WAAS デバイスを集中管理できます。わかりやす い GUI からは、Cisco WAAS デバイスの展開とリアルタイム監視、障害管理やロギン グ機能に加えて、Cisco WAAS トポロジ内にある最大 2,500 台の Cisco WAAS デ バイスに対してスケジュールされたレポートを作成できるカスタム レポート作成機能な どが利用できます。 製品型番 製品説明 GE ポート SFP ポート WAVE-INLN-GE-4T Cisco WAAS アプライアンス用 GE モジュール※ 9 4 - WAVE-INLN-GE-8T Cisco WAAS アプライアンス用 GE モジュール 8 - WAVE-INLN-GE-4SX Cisco WAAS アプライアンス用 SFP モジュール - 4 WAVE-APNV-GE-12T Cisco WAVE 694 WAAS アプライアンス用 AppNav GE モジュール 12 - WAVE-APNV-GE-12SFP Cisco WAVE 694 WAAS アプライアンス用 AppNav SFP モジュール - 12 ■ Cisco WAAS アプライアンス用モジュール ■ Cisco WAAS 仕様比較 シリーズ名 製品型番 / プラットフォーム WAN 帯域幅 (最大) TCP 最適化 接続数(最大) WAN 最適化 アプリ 高速化 AppNav Central Manager モード 最大管理デバイス数 Cisco WAAS Express L-FL-C880-WAASX ※ 1 1.5 Mbps 75 ● - - - L-FL-C890-WAASX ※ 1 2 Mbps 75 ● - - - L-FL-C1941-WAASX ※ 1 4 Mbps 150 ● - - - L-FL-C2901-WAASX ※ 1 6 Mbps 150 ● - - - L-FL-C2911-WAASX ※ 1 6 Mbps 200 ● - - - L-FL-C2921-WAASX ※ 1 6 Mbps 200 ● - - - L-FL-C2951-WAASX ※ 1 6 Mbps 200 ● - - - L-FL-C3900-WAASX ※ 1 10 Mbps 500 ● - - - Cisco ISR WAAS Cisco 4321 15 Mbps 200 ● ● ● - Cisco 4331 25 Mbps 750 ● ● ● - Cisco 4351 25 Mbps 750 ● ● ● - Cisco 4431 50 Mbps 1,300 ● ● ● - Cisco 4451 150 Mbps 2,500 ● ● ● - Cisco vWAAS LIC-200-VWAAS 20 Mbps 200 ● ● - - LIC-750-VWAAS 50 Mbps 750 ● ● - - LIC-1300-VWAAS 80 Mbps 1,300 ● ● - - LIC-2500-VWAAS 150 Mbps 2,500 ● ● - - LIC-6K-VWAAS 200 Mbps 6,000 ● ● - - LIC-12K-VWAAS 310 Mbps 12,000 ● ● - - LIC-50K-VWAAS 700 Mbps 50,000 ● ● - - Cisco WAAS アプライアンス WAVE-294-K9 4 GB メモリ 10 Mbps 200 ● ● - 250(200)※ 7 ※ 8 8 GB メモリ※ 2 20 Mbps 400 ● ● - 250(200)※ 7 ※ 8 WAVE-594-K9 8 GB のメモリ 50 Mbps 750 ● ● ●※ 5 1,000(800)※ 7 ※ 8 12 GB メモリ※ 3 100 Mbps 1,300 ● ● ●※ 5 1,000(800)※ 7 ※ 8 WAVE-694-K9 16 GB メモリ 200 Mbps 2,500 ● ● ●※ 6 2,000(2,000)※ 7 ※ 8 24 GB メモリ※ 4 200 Mbps 6,000 ● ● ●※ 6 2,000(2,000)※ 7 ※ 8 Cisco Intelligent WAN(IWAN)with Akamai Connect Cisco Intelligent WAN(IWAN)with Akamai Connect は、APP(Application Experience)サービスを提供する Cisco ISR に、WAN 最適化、アプリケーション 高速化、およびインテリジェント キャッシュ機能を統合したスイートです。 この ソリュー ション によって、 実 績 の ある HTTP キャッシュ対 応 の Akamai Intelligent Platform がブランチ オフィスにまで拡張されて、Cisco IWAN の アプリケーション最適化機能が強化されます。Akamai Connect キャッシュは、 Application Visibility and Control (AVC)、Cisco Performance Routing(PfR)、 Cisco Wide Area Application Services(WAAS)などの Cisco IWAN 機能と 統合されます。Cisco ISR ポートフォリオと Cisco WAAS アプライアンス全体で利 用できるため、フルサービスのブランチ オフィス運用が可能になっています。 ユーザは帯域幅を大量に消費するアプリケーションに、ネットワークを選ばす瞬時にア クセスできます。データセンター、プライベート クラウド、パブリッククラウド、インター ネットなど、アプリケーションがホストされている場所にも左右されません。 Akamai Connect なし Akamai Connect あり (1 回目の接続) Akamai Connect あり (2 回目の接続) ERP アプリ 57 秒 18 秒 2 秒 修復アプリ 70 秒 28 秒 1 秒以下 カタログ アプリ 28 秒 13 秒 1 秒以下 ■ モバイル アプリケーションのベンチマーク結果(秒) Akamai Connect なし Akamai Connect あり デフォルトの動画品質 144p 720 p(自動で HD) 読み込み時間(720 p HD) 14 秒 瞬時 ■トレーニングやデジタル サイネージなど動画のベンチマーク結果(ピクセルと秒) 製品型番 製品説明 SL-200-AKC 200 WAAS 接続対応ライセンス SL-750-AKC 750 WAAS 接続対応ライセンス SL-1300-AKC 1300 WAAS 接続対応ライセンス SL-2500-AKC 2500 WAAS 接続対応ライセンス SL-6K-AKC 6000 WAAS 接続対応ライセンス ■ Cisco IWAN with Akamai Connect ライセンス 51 スイッチ ワイヤレス セキュリティ Meraki サービス ルータ 社外 ASA 5500-X with FirePOWER Firepower NGFW Firepower IPS + AMP DMZ VPN AnyConnect + AMP AMP Security Manager Management Center Defense Orchestrator ESA + AMP WSA + AMP ISE Aironet アクセス ポイント Catalyst スイッチ (アクセス) ワイヤレス コントローラ 仮想化オプション Catalyst スイッチ (コア) 社内 攻撃者 CES CWS + AMP 脅威に関する情報をリアルタイムでフィードバック Cisco Collective Security Intelligence インターネット AMP Threat Grid 次世代ファイアウォール/高度なマルウェア防御 セキュリティ Why Cisco? 現在の脅威の状況は、10 年前とは全く異なります。単純な方法で封じ込めることがで きた攻撃は、もう過去のものです。今日の脅威は巧妙化し、豊富な資金に支えられて、 企業や国家の基盤に大規模な混乱を引き起こすサイバー犯罪活動になっています。こ れらの高度な攻撃は検出が難しいだけでなく、長期間にわたってネットワークに潜伏し てリソースを集め、いたるところで攻撃を開始します。 検出とブロックだけに依存する従来の防御方法では、もはや不十分です。いまや、あ らゆる種類の攻撃に対して、攻撃前(Before)、攻撃中(During)、攻撃後(After)と、 継続的に対応できる新しいセキュリティ モデルが必要になっています。 この新しいセキュリティ モデルを確立するためには、次の 3 つの戦略が不可欠です。 ● 可視性主導型:より深い洞察や適切な意思決定を可能にする、包括的なインテリジェン スとコンテキストを取得できます。 ● 脅威重視型:攻撃サイクル全体にわたって、脅威を検出し、把握し、阻止します。 ● プラットフォームベース:ネットワーク、デバイス、クラウドをすき間なく保護します。 攻撃サイクル全体に対応する包括的な保護を確立するためには、さまざまな分野に重 点を置いたテクノロジーを統合する必要があります。シスコのセキュリティ ポートフォリ オは、高度なマルウェア、標的型攻撃、APT に対抗する、脅威中心型の広範なサイバー セキュリティ ソリューションを提供します。可視性主導型、脅威重視型、そしてプラット フォームベースの各種ソリューションが、脅威出現の兆候がある攻撃ベクトルに対して、 業界で最も充実した実効性と修復オプションを提供します。 ネットワーク統合、 広範なセンサー利用、 コンテキストと自動化 継続的かつ高度な 脅威への対策、 クラウドベースの セキュリティ インテリジェンス 俊敏でオープンな プラットフォーム、 拡張性と一貫性がある 制御と管理 ネットワーク エンドポイント モバイル 仮想 クラウド 可視性主導型 脅威重視型 プラットフォームベース シスコのセキュリティソリューションの詳細は、次の Web サイトをご覧ください。 http://www.cisco.com/jp/go/security 52 セキュリティ Cisco Firepower Next-Generation Firewall(NGFW) 次世代ファイアウォール Cisco クラウド E メール セキュリティ(CES) Cisco クラウド E メール セキュリティ(CES)は、世界中で実績があるシスコの E メー ル セキュリティを簡単に導入できる、クラウドベースのセキュリティ サービスです。他 社にはない、次のような特長があります。 ● 専用のクラウド インフラストラクチャ:各ユーザは、シスコの複数のデータセンター でホストされる、専用の E メール セキュリティ インスタンスを使用できます。 ● クラウドの容量を保証:スパムメールの容量が増加してもしなくてもユーザは保護さ れて、なおかつ最高のパフォーマンスが維持されます。シンプルなユーザ単位/年 単位の価格モデルに、常に追加の容量が含まれています。 ● クラウドの可用性を保証:世界中の複数のデータセンターによって、99.999 % の アップタイムが保証されます。 コンプライアンスまたはポリシーの制限から自社内でシステムを構築する必要がある組 向けに、ハイブリッドおよびオンプレミスのオプションがあります。 アプライアンス デスクトップ モバイル ラップトップ タブレット 仮想 ハイブリッド マルチデバイス サポート ハイブリッド クラウド マネージド オンプレミス クラウド ※1 インターフェイス カードが必要。 製品型番 スループット ポート インターフェイス カード スロット数 電源 ラック マウント FW FW + AVC FW + AVC + IPS VPN GE SFP SFP/ SFP+ セキュリティ ネットワーク ASA5506-FTD-K9 750 Mbps 250 Mbps 125 Mbps 100 Mbps 8 - - - - 1 AC 1 RU ASA5506W-x-FTD-K9 750 Mbps 250 Mbps 125 Mbps 100 Mbps 8 - - - - 1 AC 1 RU ASA5506H-FTD-K9 750 Mbps 250 Mbps 125 Mbps 100 Mbps 4 - - - - 1 AC 1 RU ASA5508-FTD-K9 1 Gbps 450 Mbps 250 Mbps 175 Mbps 8 - - - - 1 AC 1 RU ASA5516-FTD-K9 1.8 Gbps 850 Mbps 450 Mbps 250 Mbps 8 - - - - 1 AC 1 RU ASA5525-FTD-K9 2 Gbps 1,100 Mbps 650 Mbps 300 Mbps 8 -※1 -※1 - 1 1 AC 1 RU ASA5545-FTD-K9 3 Gbps 1,500 Mbps 1,000 Mbps 400 Mbps 8 -※1 -※1 - 1 1 AC 1 RU ASA5555-FTD-K9 4 Gbps 1,750 Mbps 1,250 Mbps 700 Mbps 8 -※1 -※1 - 1 1 AC 1 RU ■ Cisco ASA 5500-FTD-X/5500-X シリーズ Cisco Firepower Next-Generation Firewall(NGFW)は、 統 合 さ れ た 管 理機能を備えた、業界初のフル統合型・脅威重視型の次世代ファイアウォールで す。このファイアウォールには、Application Visibility and Control(AVC)、オ プ ション の Firepower Next-Generation IPS(NGIPS)、Cisco Advanced Malware Protection(AMP)、および URL フィルタリングが含まれています。Cisco Firepower NGFW は、攻撃前、攻撃中、攻撃後の各フェーズにまたがって高度な脅威 から保護します。 ● より多くの脅威に対応:最先端の Cisco AMP とサンドボックス機能を使用して、既 知および未知のマルウェアを封じ込めます。4,000 を超える一般的なアプリケーショ ン、およびカスタム アプリケーションに対して、アプリケーション ファイアウォール機能 (AVC)を使用できます。 ● 洞察を深める:Cisco Firepower NGIPS によって、お使いの環境に対する優れた 可視性が提供されます。自動化されたリスク ランキングと影響フラグによって、優先的 に解決すべき脅威を識別できます。 ● すばやい検出と対処:「シスコ年次セキュリティ レポート」によれば、企業全体で感染 から検出までにかかる時間は平均で 100 日間です。この時間を 1 日以内に短縮でき ます。 ● 複雑性を低減:アプリケーション ファイアウォール、NGIPS、AMP など、緊密に統合 された各セキュリティ機能を一元的に管理して、脅威の関連づけを自動化できます。 ● ネットワークを最大限に活用:他のシスコ製品やサード パーティ製のネットワークおよ びセキュリティ ソリューションを統合するオプションで、セキュリティを強化して既存の 投資を活用できます。 Cisco Firepower Next-Generation Firewall(NGFW)の詳細は、 次の Web サイトをご覧ください。 http://www.cisco.com/jp/go/ngfw Cisco Firepower 9300 Cisco Firepower 4100 シリーズ Cisco ASA 5555-X Cisco ASA 5545-X Cisco ASA 5525-X Cisco ASA 5516-X Cisco ASA 5508-X Cisco ASA 5506-X ファイアウォール スループット → 高 53 スイッチ ワイヤレス ルータ Meraki サービス セキュリティ Cisco Firepower Threat Defense ライセンス Cisco FirePOWER Next-Generation Firewall(NGFW)に は、 デフォルト で Application Visibility and Control(AVC)ライセンスが付属しています。オ プションで Firepower Next-Generation IPS(NGIPS)、Cisco Advanced Malware Protection(AMP)、および URL フィルタリング ライセンスを購入するこ とで、さらに高度な機能を追加できます。 デフォルトの AVC ライセンスでは、4,000 を超えるアプリケーションの識別および制 御機能が使用できます。たとえば、これらのアプリケーションをリスクやビジネスへの 関連性によって検出および分類できます。 オプションの各ライセンスは、1 年、3 年、5 年のサブスクリプション ライセンスです。 ● NGIPS:きわめて効果的な脅威保護と、ユーザ、インフラストラクチャ、アプリケー ション、およびコンテンツに対するフル コンテキスト認識機能を備え、マルチベクト ルな脅威も検出し、防御対策を自動化します。 ● AMP:高度なマルウェアに対してインライン ネットワーク保護および Cisco Threat Grid サンドボックスを提供します。 ● URL フィルタリング:2.8 億以上のトップレベルのドメインをリスク レベルごとに 82 以上のカテゴリにフィルタリングできます。 ※1 FTD から ASA へ、またはその逆の再イメージングに対応。 ※2 ネットワークモジュールが必要。 ※3 スーパバイザが必要。 製品型番 スループット ポート モジュール スロット数 電源 ラック マウント FTD イメージ※1 ASA イメージ※1 SFP/ SFP+ QSFP+ QSFP28 FW + AVC FW + AVC + IPS FW VPN セキュリティ ネットワーク FPR4110-NGFW-K9 12 Gbps 10 Gbps - - 8 -※2 - - 2 1 AC 1 RU FPR4110-ASA-K9 - - 20 Gbps 8 Gbps 8 -※2 - - 2 1 AC 1 RU FPR4120-NGFW-K9 20 Gbps 15 Gbps - - 8 -※2 - - 2 1 AC 1 RU FPR4120-ASA-K9 - - 40 Gbps 10 Gbps 8 -※2 - - 2 1 AC 1 RU FPR4140-NGFW-K9 25 Gbps 20 Gbps - - 8 -※2 - - 2 1 AC 1 RU FPR4140-ASA-K9 - - 60 Gbps 14 Gbps 8 -※2 - - 2 1 AC 1 RU ■ Cisco Firepower 4100 シリーズ 製品型番 スループット(セキュリティモジュールの構成によって異なる) ポート モジュール スロット数 電源 ラック マウント FTD イメージ※1 ASA イメージ※1 SFP/ SFP+ QSFP+ QSFP28 FW + AVC FW + AVC + IPS FW VPN セキュリティ ネットワーク FPR-C9300-AC 25 ~ 100 Gbps 20 ~ 90 Gbps 75 ~ 225 Gbps 15 ~ 54 Gbps -※3 -※2 -※2 3 -※3 2 AC 3 RU FPR-C9300-DC 25 ~ 100 Gbps 20 ~ 90 Gbps 75 ~ 225 Gbps 15 ~ 54 Gbps -※3 -※2 -※2 3 -※3 2 DC 3 RU ■ Cisco Firepower 9300 製品型番 製品説明 FPR4K-NM-8X10G ネットワーク モジュール(8 ポート SFP/SFP+) FPR4K-NM-4X40G ネットワーク モジュール(4 ポート QSFP+) ■ Cisco Firepower 4100 シリーズ用ネットワーク モジュール 製品型番 製品説明 FPR4K-PWR-AC-1100 1,100 W AC 電源モジュール FPR4K-PWR-DC-950 950 W DC 電源モジュール ■ Cisco Firepower 4100 シリーズ用電源モジュール 製品型番 製品説明 FPR9K-SM-24 24 物理コア セキュリティ モジュール(NEBS 対応) FPR9K-SM-36 36 物理コア セキュリティ モジュール FPR9K-SM-44 44 物理コア セキュリティ モジュール ■ Cisco Firepower 9300 用セキュリティモジュール 製品型番 製品説明 FPR9K-SUP スーパバイザ(8 ポート SFP/SFP+、2 スロット NM) ■ Cisco Firepower 9300 用スーパバイザ 製品型番 製品説明 FPR9K-NM-8X10G ネットワーク モジュール(8 ポート SFP/SFP+) FPR9K-NM-4X40G ネットワーク モジュール(4 ポート QSFP+) FPR9K-DNM-2X100G ネットワーク モジュール(2 ポート QSFP28) ■ Cisco Firepower 9300 用ネットワーク モジュール 製品型番 製品説明 FPR9K-PS-AC AC 電源モジュール FPR9K-PS-DC DC 電源モジュール ■ Cisco Firepower 9300 用電源モジュール ■ Cisco Firepower Threat Defense ライセンス比較 ライセンス 製品型番に含まれる文字列 次世代 IPS (NGIPS) 高度なマルウェア防御 (AMP) URL フィルタリング (URL) NGIPS ライセンス T ● - - AMP ライセンス AMP - ● - URL ライセンス URL - - ● NGIPS & AMP ライセンス TM ● ● - NGIPS & URL ライセンス TC ● - ● NGIPS & AMP & URL ライセンス TMC ● ● ● 54 セキュリティ セキュリティ管理 Advanced Malware Protection(AMP) Cisco Firepower Management Center は、多様なプラットフォーム上で稼動す る多数のシスコ セキュリティ製品を集中管理できるセキュリティ管理コンソールです。 ファイアウォール、アプリケーション制御、侵入防御、URL フィルタリング、および高度な マルウェア防御を完全かつ包括的に管理できます。Cisco Firepower Management Center は次のソリューションで、イベントおよびポリシー管理の中心として機能します。 ● Cisco Firepower Next-Generation Firewall(NGFW) ● Cisco ASA with FirePOWER Services ● Cisco Firepower Next-Generation IPS(NGIPS) ● Cisco FirePOWER Threat Defense for ISR ● Cisco Advanced Malware Protection(AMP) Cisco Firepower Management Center 1000 Cisco Firepower Management Center 2500 Cisco Firepower Management Center 4500 Virtual Cisco Firepower Management Center Cisco Firepower Management Center 750 Cisco Firepower Management Center 2000 Cisco Firepower Management Center 4000 管理対象センサーの数 → 多 ※1 仮想化環境に依存。 ■ Cisco Firepower Management Center 製品型番 デバイス 管理数 IPS イベント 最大数 イベント ストレージ ネットワーク マップ最大数 最大 フロー レート ポート 電源 ラック ホスト ユーザ GE SFP マウント SFP/ SFP+ FS-VMW-2-SW-K9 2 1,000 万 250 GB 50,000 50,000 -※1 -※1 -※1 -※1 -※1 -※1 FS-VMW-10-SW-K9 10 1,000 万 250 GB 50,000 50,000 -※1 -※1 -※1 -※1 -※1 -※1 FS-VMW-SW-K9 25 1,000 万 250 GB 50,000 50,000 -※1 -※1 -※1 -※1 -※1 -※1 FS750-K9 10 2,000 万 100 GB 2,000 2,000 2,000 fps 2 - - 1 AC ● FMC1000-K9 30 TBD TBD TBD 100,000 5,000 fps 2 - 2 2 AC ● FS2000-K9 70 6,000 万 1.8 TB 150,000 150,000 12,000 fps 2 - 2 2 AC ● FMC2500-K9 70 TBD TBD TBD 150,000 12,000 fps 2 - 2 2 AC ● FS4000-K9 300 3 億 3.2 TB 600,000 600,000 20,000 fps 2 - 2 2 AC ● FMC4500-K9 300 TBD TBD TBD 600,000 20,000 fps 2 - 2 2 AC ● Cisco Firepower Management Center ※1 FP-AMP-LIC= が必要。 Cisco Advanced Malware Protection(AMP)for Endpoints は、インテリジェン トかつ高度なマルウェア分析/保護を提供するソリューションです。このソリューション が使用するテレメトリ モデルでは、ビッグ データおよび継続的かつ高度な分析を活用 して、すべてのエンドポイント(Windows PC、Mac、Linux、モバイル デバイス、仮想 システム)を対象に、高度なマルウェアによる感染を検出、追跡、分析、制御、およびブ ロックします。 Cisco AMP for Endpoints は、使いやすい Web ベースのコンソールを使用して管 理します。軽量なエンドポイント コネクタを使用して導入されるため、ユーザのパフォー マンスに影響はありません。分析はエンドポイントではなくクラウドで実行されます。 このソリューションは、Windows、Mac、Linux、モバイル デバイスなど、各エンドポイ ントに対するサブスクリプション ライセンスとして提供されます。また、プライバシー要 件が高く、パブリック クラウドの利用を制限している組織向けに、Cisco AMP プライ ベートクラウド仮想アプライアンスを導入するオンプレミス オプションがあります。 分析は クラウドで実行 広範なエンドポイント サポート: 軽量な AMP for Endpoints コネクタ Windows Mac Android コンテキストを提供する 実用性が高いダッシュボード デバイス トラジェクトリによる 詳細な分析 Cisco Advanced Malware Protection (AMP) for エンドポイント ■ Cisco Advanced Malware Protection(AMP)プライベートクラウド仮想アプライアンス 製品型番 コネクタ数 FP-AMP-CLOUD-SW 10,000 ■ Cisco Advanced Malware Protection (AMP) for エンドポイントライセンス※1 製品型番 コネクタ数 1 年 3 年 5 年 FP-AMP-1Y-S1 FP-AMP-3Y-S1 FP-AMP-5Y-S1 50 ~ 99 FP-AMP-1Y-S2 FP-AMP-3Y-S2 FP-AMP-5Y-S2 100 ~ 499 FP-AMP-1Y-S3 FP-AMP-3Y-S3 FP-AMP-5Y-S3 500 ~ 999 FP-AMP-1Y-S4 FP-AMP-3Y-S4 FP-AMP-5Y-S4 1,000 ~ 4,999 FP-AMP-1Y-S5 FP-AMP-3Y-S5 FP-AMP-5Y-S5 5,000 ~ 9,999 FP-AMP-1Y-S6 FP-AMP-3Y-S6 FP-AMP-5Y-S6 10,000 ~ 12,499 FP-AMP-1Y-S7 FP-AMP-3Y-S7 FP-AMP-5Y-S7 12,500 ~ 14,999 FP-AMP-1Y-S8 FP-AMP-3Y-S8 FP-AMP-5Y-S8 15,000 ~ 17,499 FP-AMP-1Y-S9 FP-AMP-3Y-S9 FP-AMP-5Y-S9 17,500 ~ 19,999 FP-AMP-1Y-S10 FP-AMP-3Y-S10 FP-AMP-5Y-S10 20,000 ~ 22,499 FP-AMP-1Y-S11 FP-AMP-3Y-S11 FP-AMP-5Y-S11 22,500 ~ 24,999 FP-AMP-1Y-S12 FP-AMP-3Y-S12 FP-AMP-5Y-S12 25,000 ~ 55 スイッチ ワイヤレス ルータ Meraki サービス セキュリティ Cisco Meraki Cisco Meraki Systems Manager Cisco Meraki Systems Manager を使用することによって、組織で管理するモバイ ル デバイスに対して、クラウドベースで OTA(Over The Air;無線通信経由)集中管理、 診断、モニタリング、セキュリティなどの機能を実行できます。オンサイトで特別なアプラ イアンスを導入しなくても、分散配備されているあらゆるデバイスを管理できます。 管理下のデバイスは Cisco Meraki のクラウドに安全に接続されます。それらのデバイ スに対して、わかりやすいパワフルな Web 上のダッシュボードから、所在の確認、ソフト ウェアやアプリケーションの展開、コンテンツの送信、セキュリティ ポリシーの適用などが できるようになります。 Cisco Meraki クラウド管理型製品 ■ クラウド管理型ワイヤレス ● 屋内用および屋外用アクセス ポイント ● 最大 2.5 Gbps の超高パフォーマン スを実現する IEEE 802.11ac および IEEE 802.11n ● ワイヤレス セキュリティとゲスト アクセ スを統合 ● 3 つ目の無線はセキュリティと RF 最適 化専用(屋内用モデル) ● 高密度環境のキャンパス、ブランチ、在 宅勤務者、および耐久性が求められる 屋外環境に最適 ● 内蔵のトラフィック シェーピング、ロケー ション分析、グループ ポリシー。いず れもマウスを数回クリックするだけで設 定可能 ■ クラウド マネージド スイッチ ● 1 GE アクセス スイッチおよび 40 GE アグリゲーション スイッチ ● モニタリング機能とアラート機能による 集中管理 ● きわめて高い信頼性(ライフタイム保証 を含む) ● 全ポート PoE 対応による、音声および ビデオトラフィックの最適化 ■ クラウド マネージド セキュリティアプライアンス ● ネットワーキング、セキュリティ、および アプリケーションの包括的な制御 ● クラウドからの集中管理 ● ファイアウォール、自動 VPN、WAN 最適化、ブランチ ルーティングを含む ● 小規模ブランチから大規模キャンパスま で対応する 6 段階のモデル ■ モビリティ管理 ● ネットワーク全体の可視性と制御 ● オンサイトのコントローラ用ハードウェ アが不要 ● 自動モニタリングとアラート機能 ● Web 経由でのシームレスなアップデー ト Meraki 100 % クラウドで管理するネットワーク Cisco Meraki ポートフォリオのネットワーク デバイスは、クラウドから一元的に管理で きます。機能が豊富で操作が簡単なクラウド アーキテクチャが、ビジネスにおける新た な問題の解決と運用コストの削減を実現します。 ● 単一のダッシュボードからネットワーク全体を管理 ● ユーザ、アプリケーション、デバイスをコントロール ● コントローラなど管理用ハードウェアのインストールや保守の必要なし ● セキュアなクラウド インフラストラクチャ(PCI および HIPAA 準拠) ● 小規模拠点から、数百万のユーザを抱える導入環境へと拡張可能 キャンパス /本社 自社所有の Meraki ハードウェア ブラウザベースの管理 拠点 小売店 テレワーカー http://meraki.com http://meraki.co m クラウドで管理 管理データ Cisco Meraki の詳細は、次の Web サイトをご覧ください。 http://meraki.cisco.com/ja/content 56 Meraki 使用例 シスコのお客様が最も利用する機能 小売 教育 企業オフィス MX セキュリティ HA Internet Restore USB Management Internet 1 2 3 4 5 6 7 8 9 10 11 LAN 1 2 3 4 5 6 7 8 9 10 11 サイト間 VPN コンテンツ フィルタリング Sourcefire を備えた IPS Advanced Malware Protection(AMP) MS スイッチング 構成のクローニング 仮想スタッキング レイヤ 3 および冗長性 MR ワイヤレス Cloud CMX アナリティクス 高密度 Wi-Fi BYOD ポリシー SM モビリティ タブレット管理 アプリケーション管理 セキュリティ ポリシーの適用 Cisco Meraki MX クラウド管理型セキュリティアプライアンスの特長 Cisco Meraki MX クラウド管理型セキュリティアプライアンスは、多数の分散型拠点 を抱える組織に最適です。Cisco Meraki MX クラウド管理型セキュリティ アプライア ンスは 100 % クラウドで管理できるため、インストールもリモート管理も簡単です。ま た、1 台で包括的なネットワーク サービスを提供できるため、デバイスを個々に何台 も揃える必要はありません。これらのサービスには、レイヤ 7 アプリケーション ファイ アウォール、コンテンツ フィルタリング、Web 検索フィルタリング、侵入防御、Web キャッシング、複数のアップリンクを備えたインテリジェント WAN、4G フェールオー バーなどがあります。 ■ 主な特長 ● クラウドベースの管理と監視 ・組み込みの一元管理機能 ・ブランチ オフィスに最適なゼロタッチ プロビジョニング ● 自動 VPN(サイト間 VPN) ・ 2 クリックで設定 ・ MPLS、4G、または 2 つ目の WAN リンクへの自動フェールオーバー ・データセンターの冗長性 ● クラス最高レベルのレイヤ 7 セキュリティ ・ SourceFire ベースの IPS ・ Advanced Malware Protection(AMP) ・ 85 個のカテゴリを使用した BrightCloud URL フィルタリング ・ Web(Google/Bing)SafeSearch ・ MaxMind ベースの Geo-IP セキュリティ ● インテリジェント WAN(IWAN) ・トラフィックのロード バランシングと自動リンク フェールオーバー ・パフォーマンスおよびポリシーベース ルーティング ・ 3G/4G USB モデム対応 ● アプリケーショントラフィック シェーピング ・ VoIP やビデオなど、ビジネスに不可欠なアプリケーションを優先 ・インターネット コストを削減 ・ Web キャッシュによるインターネット アクセスの高速化 ■ 選択ガイド ● MX64/MX65:最大 50 ユーザ ・小売店または小規模拠点 ・コスト意識が高いエンド ユーザ ・有線/ワイヤレスを組み合わせる必要があるエンド ユーザ(MX64W/MX65W) ● MX84:最大 100 ユーザ ・ Web キャッシュ用に 1 TB HDD を内蔵 ● MX100:最大 500 ユーザ ・大規模ブランチまたは中規模の K-12 キャンパス ・ 4 つ以上のポートまたは SFP(ファイバ)接続が必要 ● MX400:最大 2,000 ユーザ ・中規模キャンパスへの導入 ・大規模な導入向け VPN コンセントレータ ● MX600:2,000 人以上のユーザ ・大規模キャンパスへの導入 ・ Web キャッシュ用に 4 TB が必要なユーザ ・超大規模な導入向け VPN コンセントレータ ■ 主なハードウェア仕様比較 MX64 MX65 MX84 MX100 MX400 MX600 推奨ユーザ数 50 50 200 500 2,000 10,000 ファイアウォール(Mbps) 250 250 500 750 1,000 1,000 Advanced Security(Mbps) 200 200 300 650 1,000 1,000 最大 VPN ピア数 25 25 100 250 1,000 5,000 デュアル WAN リンク ● ● ● ● ● ● Web キャッシング - - ● ● ● ● Web キャッシュ サイズ(TB) - - 1 1 1 4 ファイバ接続 - - - SFP SFP+ SFP+ デュアル電源 - - - - ● ● ■ ライセンス比較 Enterprise Advanced Security ステートフル ファイアウォール、NAT、DMZ ● ● アクティブ/パッシブ HA ● ● レイヤ 7 トラフィック シェーピング ● ● クラウドベースの管理 ● ● モニタリングとアラート ● ● リンクアグリゲーションとフェールオーバー ● ● Web キャッシング ● ● サイト間(IPsec)VPN ● ● クライアント VPN ● ● IDS/IPS - ● SafeSearch によるコンテンツ フィルタリング - ● ウイルス対策とフィッシング対策 - ● 位置情報 IP ファイアウォール ルール - ● 57 スイッチ ワイヤレス ルータ セキュリティ サービス Meraki クラウド管理型ワイヤレス クラウド管理型セキュリティ アプライアンス ■ Cisco Meraki MX クラウド管理型セキュリティアプライアンス シリーズ モデル 小規模拠点 MX64 MX64W MX65 MX65W 推奨最大ユーザ数 50 50 50 50 ファイアウォール スループット 250 Mbps 250 Mbps 250 Mbps 250 Mbps Advanced Security スループット 200 Mbps 200 Mbps 200 Mbps 200 Mbps 最大 VPN セッション 25 25 25 25 インターフェイス GE x 5 GE x 5 GE x 12(2 PoE+) GE x 12(2 PoE+) ワイヤレス - 11b/g/n 無線 x 1 11a/n/ac 無線 x 1 2 x 2 MIMO 2 ストリーム 1.2 Gbps - 11b/g/n 無線 x 1 11a/n/ac 無線 x 1 2 x 2 MIMO 2 ストリーム 1.2 Gbps ■ Cisco Meraki MR クラウド管理型ワイヤレス アクセス ポイント モデル 屋内用アクセス ポイント MR18 MR32 MR42 MR52 無線仕様 11b/g/n 無線 x 1 11a/n 無線 x 1 11b/g/n 無線 x 1 11a/n/ac 無線 x 1 Bluetooth Low Energy 無線 x 1 11b/g/n 無線 x 1 11a/n/ac Wave 2 無線 x 1 Bluetooth Low Energy 無線 x 1 11b/g/n 無線 x 1 11a/n/ac 無線 x 1 Bluetooth Low Energy 無線 x 1 11n および 11ac 機能 2 x 2 MIMO 2 ストリーム 2 x 2 MIMO 2 ストリーム 3 x 3 SU/MU-MIMO 3 ストリーム 4 x 4 MIMO 4 ストリーム 最大データレート※ 1 600 Mbps 1.2 Gbps 1.9 Gbps 2.5 Gbps インターフェイス GE x 1 GE x 1 GE x 1 GE x 2 クラウド管理型スイッチ ■ Cisco Meraki MS クラウド管理型スイッチ モデル レイヤ 2 アクセス スイッチ レイヤ 3 アクセス スイッチ MS220-8 MS220-8P MS220-24 MS220-24P MS220-48 MS220-48LP MS220-48FP MS320-24 MS320-24P MS320-48 MS320-48LP MS320-48FP MS350-24 MS350-24P ダウンリンク GE x 8 GE x 24 GE x 48 GE x 24 GE x 48 GE x 24 アップリンク SFP x 2 SFP x 4 SFP x 4 SFP/SFP+ x 4 SFP/SFP+ x 4 SFP/SFP+ x 4 スタッキング 仮想 仮想 仮想 仮想 仮想 仮想 + 物理 PoE/PoE+ 電力バジェット 124 W(8P) 370 W(24P) 370 W(48LP) 740 W(48FP) 370 W(24P) 370 W(48LP) 740 W(48FP) 370 W(24P) スイッチング容量 20 Gbps 48 Gbps 104 Gbps 128 Gbps 176 Gbps 128 Gbps ※1 合計集約デュアルバンド データ レート。 ※1 UPOE(60 W)対応。 58 Meraki 中規模拠点 大規模拠点 / キャンパス / コンセントレータ モデル MX84 MX100 MX400 MX600 200 500 2,000 10,000 推奨最大ユーザ数 500 Mbps 750 Mbps 1 Gbps 1 Gbps ファイアウォール スループット 300 Mbps 650 Mbps 1 Gbps 1 Gbps Advanced Security スループット 100 250 1,000 5,000 最大 VPN セッション GE x 10 SFP x 2 GE x 9 SFP x 2 GE x 4 GE x 4 インターフェイス - - - - ワイヤレス 屋外用アクセス ポイント モデル MR53 MR66 MR72 MR84 11b/g/n 無線 x 1 11a/n/ac 無線 x 1 Bluetooth Low Energy 無線 x 1 11b/g/n 無線 x 1 11a/n 無線 x 1 11b/g/n 無線 x 1 11a/n/ac 無線 x 1 Bluetooth Low Energy 無線 x 1 11b/g/n 無線 x 1 11a/n/ac 無線 x 1 Bluetooth Low Energy 無線 x 1 無線仕様 4 x 4 MIMO 4 ストリーム 2 x 2 MIMO 2 ストリーム 2 x 2 MIMO 2 ストリーム 4 x 4 MIMO 4 ストリーム 11n および 11ac 機能 2.5 Gbps 600 Mbps 1.2 Gbps 2.5 Gbps 最大データレート※ 1 GE x 1 mGig x 1(最大 2.5 Gbps) GE x 1 GE x 1 GE x 1 mGig x 1(最大 2.5 Gbps) インターフェイス アグリゲーション スイッチ モデル MS350-24x MS350-48 MS350-48LP MS350-48FP MS410-16 MS410-32 MS425-16 MS425-32 GE x 16、mGig x 8 GE x 48 SFP x 16 SFP x 32 SFP/SFP+ x 16 SFP/SFP+ x 32 ダウンリンク SFP/SFP+ x 4 SFP/SFP+ x 4 SFP/SFP+ x 2 SFP/SFP+ x 4 QSFP+ x 2 QSFP+ x 2 アップリンク 仮想 + 物理 仮想 + 物理 仮想 + 物理 仮想 + 物理 仮想 + 物理 仮想 + 物理 スタッキング 740 W※1 370 W(48LP) 740 W(48FP) - - - - PoE/PoE+ 電力バジェット 432 Gbps 176 Gbps 72 Gbps 144 Gbps 480 Gbps 800 Gbps スイッチング容量 ※1 合計集約デュアルバンド データ レート。 59 スイッチ ワイヤレス ルータ セキュリティ サービス Meraki シスコは「計画」「構築」「運用」の IT ライフサイクルに基づき、シスコが注力するアーキ テクチャ、テクノロジー、ソリューションのサービスを提供します。 お客様のビジネス戦略と IT 戦略に基づき、業務改革や IoE(Internet of Everything) 実現のためのビジネス テクノロジーの構築と活用をお手伝いします。 61 ~ 62 ページでは、運用フェーズのテクニカル サービスをご紹介します。 シスコ サービスの詳細は、次の Web サイトをご覧ください。 ht tp://www.cisco.com/jp/go/services シスコ サービス ビジネス戦略を効果的に サポートする IT 戦略策定と アーキテクチャ設計 戦略/分析 アーキテクチャ戦略と ロードマップの作成 アセスメント ネットワークと IT インフラストラク チャの対応状況の判断 設計 柔軟性と復元力の高いスケーラブル なアーキテクチャ基盤の確立 利益創出までの時間短縮と 展開コスト削減 検証 ソリューションが要件を満たしている ことを実際の導入前に確認 展開 新しいソリューションやアプリケー ションの展開における専門家の支援 移行 全体像を体系的に捉えた効果的な アプローチでインフラストラクチャを アップグレード サービス レベルの 継続的改善と最適化 製品サポート ネットワーク機器の自動インベントリ 管理、サポート ソリューション サポート 専門知識を持った専任リソースへの 優先アクセス 最適化 インフラストラクチャ、アプリケーショ ン、サービス管理の最適化 オペレーション マネジメント ネットワーク インフラストラクチャの 監視と管理 計画 構築 運用 日本市場におけるシスコ サービスの歩み サービス ラインアップを強化して、お客様の課題を包括的に解決 メーカーならではの技術情報、 世界中で培ったノウハウを活用して ネットワークの安定運用をサポート シスコのイノベーションと テクニカル リーダーシップを推進 ビジネス戦略に合致した IT 戦略の構築 ビジネス テクノロジーの構築と活用を支援 1992 年 シスコシステムズ 日本オフィス開設 日本で TACを開設※1 2000 年 金融機関初のユニファイド コミュニケーション 構築支援サービス受注 通信キャリアの 包括保守 サービス受注 2010 年 データセンター 仮想化/自動化支援 サービス提供開始 スマート サービス 提供開始 セキュリティ サービス 提供開始 ※1 TAC(Technical Assistance Center;テクニカル アシスタンス センター)。 計画 構築 運用 スマート サービス 機能 設計 検証 展開 移行 製品 サポート ソリューション サポート 最適化 オペレーション マネジメント アセスメント 戦略 分析 60 サービス ※1 シビラティの詳細は http://www.cisco.com/cisco/web/support/JP/loc/contact をご覧ください。 ※2 サービス レベルの詳細は http://www.cisco.com/web/JP/services/portfolio/product-technical-support/smart-net-total-care をご覧ください。 ※3 2 時間および 4 時間以内の配送サービスは、提供可能な地域に制限があります。また、30 kg 以上の重量パーツは配送の時間帯が異なります。詳細は、お買い求めの販売パートナーまでお問い合わせください。 ※4 シビラティ(障害重要度)1 の障害の場合、障害切り分け支援およびパーツ配送のいずれも 24 時間 365 日の対応となります。その他のシビラティの障害の場合、障害切り分け支援は営業日・営業時間内の対応となります。 ■ シスコ テクニカル アシスタンス センター(Cisco TAC)による遠隔技術サポート Cisco TAC は、シスコの認定資格を保有する、高度な訓練を受けたネットワークおよびソフトウェア エンジニアの組織です。障害解決の支援、製品の設定、操作方法など、お客様か らのお問い合わせに対して、電話および E メールで 24 時間 365 日、技術支援をしています。日本の Cisco TAC では、シビラティ(重大度)1 の障害に対して 24 時間 365 日の 日本語サポートを提供します。シビラティ 2 ~ 4 のサポートは、営業日および営業時間内に対応します。※1 ■ シスコ テクニカル サービスの特長 ● 24 時間 365 日サポート “フォロー・ザ・サン”をモデルに 24 時間 365 日体制でテクニカル サービスを提供 ● 充実のオンライン サポート体制 250 万人/月が利用する Web サポートや、100 万人/月が閲覧する、お客様どう しが情報交換できる「シスコ サポート コミュニティ」を提供 ● 日本全国をカバー 120 か所以上のパーツ配送拠点を日本全国に配備 ● 業界トップクラスの解決力 所属エンジニアの約 60 % が CCIE を取得し、年間 600 万件のお客様対応によ る経験を最大限に活用 ■ OS ソフトウェア アップデート シスコのルータやスイッチ製品はシステム ソフトウェアである Cisco IOS を搭載しています。シスコは、ネットワーク環境の変化へ迅速に対応し、ハードウェアの性能をより引き出 すために、Cisco IOS をはじめとするシステム ソフトウェアを常に改良および更新しています。最新の Cisco IOS は、Cisco.com でダウンロードいただけます。 ■ 代替ハードウェアの配送 Cisco TAC のエンジニアが、ネットワーク障害の原因がハードウェアの故障によると特定した場合、契約したサービス レベルに応じて代替パーツの先出し配送を実施します。 オンサイト付きサービスをご契約の場合は、オンサイト エンジニアが設置先で機器を交換します。 ■ 自動診断ツール(Smart Call Home 機能) ハードウェアをモニタリングしてデバイスの問題点を早期検知し、改善依頼をお知らせする機能です。この機能をデバイスで有効にすると、問題が生じた場合に自動的にサービス リ クエストが作成されて、 Cisco TAC に伝達されます。 Cisco Smart Net Total Care(SNTC)提供内容 Cisco Smart Net Total Care(SNTC)は、シスコのハードウェア製品のための基本的なテクニカル サービスです。IT インフラストラクチャへの保守サポートとして、シスコ テクニ カル アシスタンス センター(Cisco TAC)のエキスパートによる技術支援や OS のアップデート、代替パーツの配送などを提供します。さらに、各デバイスのご契約サービスの一覧 や契約ステータス、OS のバージョン情報など、膨大なインベントリ情報を一元管理できる SNTC ポータル機能も提供します。 ハードウェア製品向けテクニカル サービス Smart Call Home の詳細は、次の Web サイトをご覧ください。 ht tp://www.cisco.com/web/JP/services/por t folio/tss/smar t_call_home.html 選べるサービス レベル※ 2 内容※ 3 8h x 5d x NBD(Next Business Day) (オンサイト付き選択可能) 障害原因箇所を特定後、翌営業日に代替パーツを配送します。 オンサイト付きサービスの場合は、オンサイト エンジニアが機器を交換します。 8h x 5d x 4h (オンサイト付き選択可能) 障害原因箇所の特定が営業時間内に完了した場合、4 時間以内に代替パーツを配送します。 営業時間外に完了した場合は翌営業日 13 時以降に時間指定で代替パーツを配送します。 オンサイト付きサービスの場合は、オンサイト エンジニアが機器を交換します。 24h x 7d x 4h (オンサイト付き選択可能) 障害原因箇所を特定後、4 時間以内に代替パーツを配送します。※ 4 オンサイト付きサービスの場合は、オンサイト エンジニアが機器を交換します。 24h x 7d x 2h (オンサイト付き選択可能) 障害原因箇所を特定後、2 時間以内に代替パーツを配送します。※ 4 オンサイト付きサービスの場合は、オンサイト エンジニアが機器を交換します。 n パーツ 配送拠点 ● トラブル発生から解決までの概略図 ❺ サービス レベルに 基づき部品を配送 ❷ 受付 TAC ❹部品交換が必要な場合、パーツ配送手配 エンジニア ❸TAC エンジニアと直接コミュニケーション ❶トラブル発生のご連絡 パーツ メール対応 コールバック対応 原因調査と対応 画面共有による リモート対応 お客様 オンサイト サポート付の場合 エンジニアが交換 61 スイッチ ワイヤレス ルータ セキュリティ サービス Meraki ■ Cisco Smart Assist Service Cisco Smart Assist Service は、Cisco Smart Net Total Care(SNTC)に付加 してご利用いただけるテクニカル サービスです。 SNTC ポータル機能を速やかにご利用いただくために、データ コレクターの導入、 SNTC ポータルへの接続サポート、およびトレーニングを提供します。また、導入後は ポータルおよびコレクターに対する Cisco TAC サポートを提供します。 ※1 対象製品やサービス、パーツ配送サービス レベルによって、サービス内容が異なる場合があります。 ※2 Smart Foundation では、シビラティ(重大度)の設定がありません。Japan SMB TAC がシスコ営業日(年末年始と祝祭日を除く平日)の 9 ~ 17 時に受付順に対応します。 提供内容 SNTC 契約のみ SNTC 契約 + Smart Assist SNTC ポータル 機能の利用 ● ● 導入サポート お客様のセルフ サポート シスコによるサポート 導入時のスマート機能 トレーニング お客様のセルフ サポート シスコによるサポート インベントリ情報の調整 お客様のセルフ サポート 年 2 回実施 ポータルおよび コレクターに対する テクニカル サポート コミュニティ(英語) サポート TAC サポート ■ テクニカル サービス一覧 カテゴリ サービス名 概要※ 1 基本サービス 拡張サービス※ 1 TAC 技術支援 代替パーツ 配送 OS アップデート Cisco.com アクセス SNTC ポータル アプリケーション ソフトウェア アップグレード ハードウェア 製品向け Smart Net Total Care (SNTC) シスコの独自技術を結集した、ハードウェア製品向けの 標準的なサービス。TAC によるテクニカル サポートや 代替パーツ配送、OS のアップデートなどの技術支援と、 専用ポータル サイトからデバイスの状況を把握してレ ポートを発行できるネットワーク デバイスのインベント リ管理を支援するサービス。 ● ● ● ● ● ● Smart Foundation ネットワークへの依存度が低いお客様向けに、基本サー ビスを限定的に提供するサービス。 ▲※2 ● ▲ ● - - 特定テクノロジー 製品向け Service for IPS IPS(侵入防御システム)搭載ハードウェア製品のシグ ネチャ ファイル アップデートと Smart Net Total Care (SNTC)を同梱したサービス。 ● ● ● ● - - Software Support Services(SWSS) ユニファイド コミュニケーション製品と Cisco Prime 製品、Cisco ONE ソフトウェア製品を対象としたサービ ス。該当ライセンスの発注時に、初年度分の同時購入が 必要。 ● - - ● - ● ソフトウェア 製品向け SAS アプリケーションソフトウェアを対象としたサービス。 メンテナンス リリースとマイナー リリースを提供。 ● - - ● - ▲ SASU アプリケーションソフトウェアを対象としたサービス。 メンテナンス リリースとマイナー リリースに加えてメ ジャー リリースを提供。 ● - - ● - ● その他の製品向けテクニカル サービス シスコでは、ハードウェア製品向けの基本的なテクニカル サービスとなる Cisco Smart Net Total Care(SNTC)以外にも、お客様を支援する便利なテクニカル サービスを各種 提供しています。 ■ オンラインリソース(Web ベースの情報)の提供 Cisco.com サポート ページ、シスコ サポート コミュニティで、シスコ製品の技術情報 やマニュアル、各種ドキュメントなど、豊富な最新情報を公開しています。 ● Cisco.com(http://www.cisco.com/cisco/web/JP/support/index.html) ● シスコ サポート コミュニティ(https://supportforums.cisco.com/ja) ■ SNTC ポータル Cisco SNTC をご契約いただいた場合、SNTC ポータルをご利用いただけます。この ポータルは、お客様が所有するシスコ製品のインベントリ情報の管理支援ツールです。 ご購入いただいた各製品の契約サービス一覧や契約ステータス、OS のバージョン情報 やアラート情報などを一元管理して、グラフィカルに把握できます。 ● インベントリ情報管理 ● サービス契約管理 ● アラート、EOL 情報管理 Cisco SNTC ポータルをご利用いただくためには、データ コレクターのインストー ルなどの設定が必要となります。導入支援が必要な場合には、Cisco Smart Assist Service を Cisco SNTC に付加して利用できます。 62 サービス ©2016 Cisco Systems, Inc. All rights reserved. Cisco、Cisco Systems、および Cisco Systems ロゴは、Cisco Systems, Inc. またはその関連会社の米国およびその他の一定の国における登録商標または商標です。 本書類またはウェブサイトに掲載されているその他の商標はそれぞれの権利者の財産です。 「パートナー」または「partner」という用語の使用は Cisco と他社との間のパートナーシップ関係を意味するものではありません。(1502R) この資料の記載内容は 2016 年 11 月現在のものです。 この資料に記載された仕様は予告なく変更する場合があります。 シスコシステムズ合同会社 〒107‐6227 東京都港区赤坂9-7-1 ミッドタウン・タワー http://www.cisco.com/jp お問い合わせ先 1217-1611-28A-TO CISCO VALIDATED DESIGN September 2018 Solution 1.1 Software-Defined Access Deployment Guide Table of Contents Cisco Validated Design Table of Contents Software-Defined Access introduction ............................................................................................1 Implementation overview..................................................................................................................................................2 Design considerations ......................................................................................................................................................3 Additional information.......................................................................................................................................................4 Deployment details..........................................................................................................................5 Installing controllers for an SD-Access network...............................................................................................................5 Install Identity Services Engine nodes ........................................................................................................................... 15 Integrate Identity Services Engines with DNA Center.................................................................................................... 21 Install SD-Access wireless LAN controllers................................................................................................................... 23 Deploying SD-Access ................................................................................................................................................... 27 Using DNA Center for initial network design and discovery........................................................................................... 27 Creating segmentation and policy for the SD-Access network..................................................................................... 35 Preparing the network for automation ........................................................................................................................... 38 Provisioning the SD-Access underlay network.............................................................................................................. 50 Provisioning an SD-Access overlay network ................................................................................................................. 53 Optional......................................................................................................................................................................... 63 Integrating wireless into SD-Access ............................................................................................................................. 64 Appendix A: Product list................................................................................................................71 DNA Center................................................................................................................................................................... 71 DNA Center packages................................................................................................................................................... 71 Identity management..................................................................................................................................................... 72 SD-Access fabric border and control plane .................................................................................................................. 72 SD-Access fabric edge................................................................................................................................................. 72 SD-Access Wireless .................................................................................................................................................... 73 LAN Automation switches—Cisco Validated Design verified (not inclusive of all possibilities)........................................ 73 Glossary ........................................................................................................................................74 Cisco Validated Design page 1 Software-Defined Access introduction Software-Defined Access introduction Cisco® Software-Defined Access (SD-Access) is an application package that runs on the Cisco DNA Center™ controller for designing, provisioning, applying policy, and facilitating the creation of an intelligent campus wired and wireless network with assurance. Fabric technology for the campus, an integral part of SD-Access, introduces programmable overlays enabling easy-to-deploy network virtualization across the wired and wireless campus. In addition to network virtualization, fabric technology for campus provides software-defined segmentation and policy enforcement based on user identity and group membership. Software-defined segmentation is seamlessly integrated using Cisco TrustSec® technology, providing micro-segmentation through the use of scalable groups within a virtual network. Using DNA Center to automate the creation of virtual networks provides reduction in operational expenses, coupled with the advantage of reduced risk with integrated security and improved network performance provided by the assurance and analytics capabilities. This guide describes an implementation for deploying an SD-Access network using DNA Center, integrated into an existing enterprise network. The virtual networks that SD-Access builds (overlay networks) run on a physical network (underlay network), creating alternative topologies for connecting devices in the campus LAN. Similarly, overlay networks are commonly used to provide Layer 2 and Layer 3 logical networks with virtual machine mobility in data center fabrics (examples: Cisco ACI™, VXLAN, and Cisco FabricPath). Overlay networks are also used in wide-area networks to provide secure tunneling from remote sites (examples: MPLS, DMVPN, and GRE). This guide helps you understand important elements of automating SD-Access configurations and the integration into existing networks. As described in the Software-Defined Access Design Guide, the underlay network is defined by the physical switches and routers that are part of the campus fabric. All network elements of the underlay must establish IP connectivity via the use of a routing protocol, just as when building a traditional campus network. Instead of using arbitrary network topologies and protocols, this implementation uses a well-designed Layer 3 foundation inclusive of the campus edge switches (also known as a routed access design), ensuring performance, scalability, and high availability of the network. In the campus fabric, end-user subnets are not part of the underlay network, even though the underlay infrastructure equipment supports the end-user physical connectivity. You use the underlay as the supporting infrastructure when creating one or more overlay networks, which run across a set of the underlay network devices. The data plane traffic and control plane signaling is contained within each virtualized network, maintaining isolation among the networks in addition to isolation from the underlay network. The SD-Access fabric implements virtualization by encapsulating user traffic over IP packets that are sourced and terminated at the boundaries of the fabric, extending all the way to APs for wireless clients. Because IP-based connectivity within each Layer 3 overlay is an abstraction from the physical connectivity, multiple IP networks can be a part of each virtual network. In multi-tenant style deployments where you relinquish control of the addressing for each tenant’s Layer 3 overlay, you likely have to allow for some nonunique IP address space appearing in more than one overlay. You can support the overlapping IP address space requirement by preserving the traffic separation beyond the fabric border using typical virtualization techniques— including adding devices to remediate addressing conflicts (typically using network address translation) and provisioning to enable communication with permitted common external IP services such as DNS and the Internet. Cisco Validated Design page 2 Software-Defined Access introduction Figure 1. Layer 3 overlay—connectivity logically routed 7104F Physical Topology Physical Topology Logical Layer 3 Overlay Edge Nodes Border Nodes In addition to network virtualization, the campus fabric integrates Cisco TrustSec technology to enable softwaredefined segmentation and policy enforcement based on user identity and group membership. In this deployment, security policy management uses Cisco Identity Services Engine (ISE). Scalable group tags (SGTs), also known as security group tags, are integrated into the campus fabric headers. For group policies that extend outside of the campus, you configure the propagation of the SGT information from the fabric border node outside of the campus by either transporting the tags to TrustSec-aware devices using SGT exchange protocol (SXP) or by directly mapping SGTs to Cisco Meta Data using inline tagging capabilities implemented for connections to the border. Implementation overview Although there are certainly a wide variety of alternative deployment options to the topologies, protocols, and designs shown in this implementation, organizations are encouraged to start implementations with these configurations and then customize them to fit their needs. Within this guide, the deployment of the underlay network is a Layer 3 routed access topology using the Intermediate System to Intermediate System (IS-IS) routing protocol with fast network convergence properties available using equal-cost multipath (ECMP) routing. Underlay topologies for the fabric should not use the classic Layer 2 access design components, such as EtherChannel, in a fabric implementation for the SD-Access 1.1 solution. The overlay networks deployed are IP-only and connect with the rest of the enterprise network at the fabric border nodes as a function enabled on the campus core devices. Network virtualization extending outside of the fabric is preserved using VRF-lite, a virtualization technology commonly used to enable multiple separated Layer 3 routing and forwarding functions within a device. Cisco Validated Design page 3 Software-Defined Access introduction Outside of the fabric, you enable any required connectivity among virtual routing and forwarding instances (VRFs) and to services (typically residing within either the global routing table or a dedicated VRF) using classic virtualization techniques, which preserve the separation while allowing communication on an as-needed basis. When you consider integrating the campus fabric into an existing enterprise network, there are two key network design considerations, and each drives unique requirements for the integration: • Virtualized network: If the network is already virtualized, the VRFs at the campus fabric border extend into that virtualization technique of choice by using VRF-lite as a handoff into the existing virtualized infrastructure, whether it is MPLS, Multi-VRF, or some other technique. • Non-virtualized network: If the existing network is not virtualized, the recommended, validated interconnection between the fabric border and the non-virtualized network uses an intermediate device (fusion router) to enable route exchange between the domains and enabling shared services across all the virtual networks. Dual fusion routers are deployed for increased availability and use Border Gateway Protocol (BGP) as an exterior gateway protocol to the fabric border, which easily accommodates loop avoidance. In the deployment described, the campus core layer hosts the border functionality. An alternative border for smaller networks using a collapsed core/distribution using stackable switches is also described. Using the core as the border offers the overlay benefits across the entire campus LAN at the common campus exit point. The location where traffic exits the fabric as the default path is the external border. There are alternative choices for the external border, such as extending the border further into the enterprise, perhaps by extending the fabric all the way to the Internet edge. For trial deployments, the entire fabric could consist of a pair of distribution switches (or a collapsed core/distribution at a smaller site) performing the fabric external border role along with associated access switches at the fabric edge. When implementing this, recognize that the fabric benefits are limited to the devices covered by the extent of the border-to-edge fabric domains. If there is a requirement to have another location in the fabric as an alternative exit point for a specific set of non-default traffic (perhaps a WAN location, for example), additional border devices are used to support the requirement. The scope of border deployment guidance in this version of the deployment guide is for the more common external border configurations. Design considerations When deploying SD-Access, there are a number of significant deployment decisions to consider prior to starting, as described in the Software-Defined Access Design Guide. These considerations include: • Are you ready to deploy a Layer 3 (routed) access layer? This deployment assumes Layer 3 access for the network. Although any topology and routing protocol could be used in the underlay, the implementation of a well-designed Layer 3 foundation all the way to the campus edge is required to ensure support for performance, scalability, and high availability of the network. To achieve this goal for underlay deployments not manually created, the DNA Center LAN Automation feature deploys new networks using an IS-IS routed access design. Though there are many alternatives, the selection offers operational advantages such as neighbor establishment without IP protocol dependencies, peering capability using loopback addresses, and agnostic treatment of IPv4, IPv6, and non-IP traffic. • Subnet planning is an integral consideration if you are planning a migration from a Layer 2 to a routed access layer. All the same, SD-Access introduces the flexibility to remove traditional routed access layer restrictions associating client subnets to the closest Layer 3 gateway and allows subnets to stretch through the SDAccess fabric to support a specific function, such as connectivity for computers, unified communications, or wireless LAN access points. Cisco Validated Design page 4 Software-Defined Access introduction • Do you plan to deploy the underlay manually in a custom configuration as an extension to the routing protocol already used throughout an organization, or do you intend to use a dedicated interior gateway protocol (IGP) for the fabric underlay? This deployment shows a separate IGP using IS-IS for the underlay, which has a welldefined scope that is useful in automating new deployments. • Are there requirements to deploy multiple Layer 3 overlay networks (such as for multitenant use cases described in the Introduction), or does a single Layer 3 overlay with multiple stretched subnets meet the requirements? The deployment accommodates both types of deployments by supporting one or multiple VRFs extended outside the fabric domain. Nevertheless, consider that multiple overlays require additional planning for integration of common services into the multi-VRF environment. In both scenarios, you need to plan for and document all overlay subnets and VRFs for the host pools and be prepared to integrate them into your Dynamic Host Configuration Protocol (DHCP) services. • Have you identified the appropriate locations for the edge, border, and control plane roles in your network? Do you have the proper platforms in place to support those fabric roles? Full discussion of these platforms and roles is covered in the associated Software-Defined Access Design Guide. It is important to understand that, unlike in a trial deployment, a production deployment will present operational challenges if you deploy the border in one location and later decide to relocate it to another location, so careful consideration of the future fabric coverage scope is important. In the validated deployment described, the most common scenarios with supported platforms are shown, and Appendix A: Product List. lists the equipment specifically validated for roles in this deployment. Additional information If you didn’t get this guide from Cisco Design Zone, you can check for the latest version of this guide. You can find the Software-Defined Access Design Guide, User-to-Data Center Access Control Using TrustSec Deployment Guide, and related design guides, deployment guides, and white papers in the Design Zone at the following page: https://www.cisco.com/go/designzone Cisco Validated Design page 5 Deployment details Deployment details The enterprise network integrated with the described campus fabric deployment is nonvirtualized and runs Enhanced Interior Gateway Routing Protocol (EIGRP) as a routing protocol. IP prefixes from the campus, including shared services, must be available to both the fabric underlay and overlay networks while maintaining isolation among overlay networks. To maintain the isolation, VRF-Lite extends from the fabric border nodes to a set of fusion routers. The fusion routers implement VRF route leaking using a BGP route target import and export configuration and perform mutual redistribution with EIGRP in the enterprise network and with BGP to the campus fabric. A route-map configuration for dynamic tagging and filtering of redistributed routes provides a simple and dynamic way to prevent routing loops while accommodating multiple redistribution points in the high-availability design. Process Installing controllers for an SD-Access network 1. Install DNA Center The Cisco SD-Access 1.1 solution described in this guide uses a single DNA Center controller hardware appliance, prepared for inclusion as part of a cluster in the future. For this solution, DNA Center integrates with two ISE nodes configured for redundancy and dedicated to the SD-Access deployment, as detailed in the installation. To support SD-Access Wireless, the solution includes two wireless LAN controllers (WLCs) for controller redundancy. Before you begin, you must identify the following: • IP addressing and network connectivity for all controllers being deployed: DNA Center must have Internet access for system updates from the Cisco cloud repository. • A network-reachable Network Time Protocol (NTP) server, used during DNA Center installation to help ensure reliable digital certificate operation for securing connections. • Certificate server information, if you choose not to use self-signed digital certificates for a single node: For three-node cluster configurations, certificates generated by a certificate authority are required. Cisco Validated Design page 6 Deployment details Procedure 1 Install DNA Center The DNA Center appliance has 10-Gbps SFP+ modular LAN on motherboard (mLOM) interfaces and integrated copper interfaces available for network connectivity. Use the following table to assist with IP address assignment and connections. Validation is shown using a virtual IP (VIP) configured on a standalone DNA Center appliance, making it easier to migrate to a three-appliance cluster in the future. You do not need to physically connect the intra-cluster communications port for a standalone configuration. For provisioning and assurance communication efficiency, DNA Center should be installed in close network proximity to the greatest number of devices being managed. Figure 2. Rear view of the DNA Center Appliance — DN1-HW-APL Table 1. DNA Center server LAN Ethernet interface assignments (left to right, from rear) PORT 2 mLOM SFP+ 10 Gbps PORT 1 mLOM SFP+ 10 Gbps M Integrated RJ-45 1 Integrated RJ-45 2 Integrated RJ-45 Wizard name enp10s0 enp9s0 — enp1s0f0 enp1s0f1 Use Intra-cluster communications Enterprise network infrastructure Cisco Integrated Management Controller outof-band server appliance management Optional dedicated management network for web access Optional isolated enterprise network Example cluster VIP address — 10.4.49.25 255.255.255.0 — — — Example interface address 192.168.127.1 255.255.255.248 10.4.49.26 255.255.255.0 10.204.49.25 255.255.255.0 Unused in this example Unused in this example Tech tip To avoid the need to maintain a list of static routes on an additional interface, you can connect DNA Center to your network using a single network interface configured with a default gateway. For deployments requiring multiple interfaces separating administrative access and network infrastructure provisioning, static route changes after installation may require reconfiguration. If reconfiguration is required, follow the procedure to reconfigure the appliance using the wizard in the Cisco Digital Network Architecture Center Appliance Installation Guide. Cisco Validated Design page 7 Deployment details Reserve an arbitrary private IP space at least 20 bits of netmask in size that is not used elsewhere in the network. Divide the /20 address space into two /21 address spaces and use them in a later setup step for services communication among the processes running in a DNA Center instance. The address space is required for both a single-server configuration and a three-server configuration. The DNA Center appliance also must have Internet connectivity, either directly or via a web proxy, to obtain software updates from the Cisco cloud repository. Internet access requirements and optional proxy server setup requirements are detailed in the Cisco Digital Network Architecture Center Appliance Installation Guide. Step 1: Connect the DNA Center server to a Layer 2 access switch port in your network, by: • Using the 10Gb port labeled PORT 1 on the mLOM card (named enp9s0 in the wizard) • Using the Cisco Integrated Management Controller (IMC) port (labeled M on the embedded Ethernet ports) • Optionally using any other ports required for the installation, such as the dedicated web management port, an isolated enterprise network port, or cluster configuration port. The following example steps are described in detail with all options within the Installation Guide for the appliance software version. Use the guide to configure Cisco IMC on the appliance during first boot, along with the credentials required for Cisco IMC access. The Installation Guide describes the complete set of options, including joining a host to another host to create a cluster and configuring the left port (labeled PORT 2 on the mLOM card, and named enp10s0 in the wizard) for intra-cluster communications. The example that follows configures a standalone host or the first host in a cluster deployment, without a network proxy. Step 2: Boot the DNA Center hardware appliance. A welcome message appears. Welcome to the Maglev Configuration Wizard! Step 3: Press Enter to accept the default choice, Start a DNA-C Cluster. Step 4: Continue by accepting the wizard default choices, while supplying information for the following steps within the wizard (the wizard steps are in order but are not sequential): • In wizard STEP #4, selection for NETWORK ADAPTER #1 (enp10s0): This interface is used for clustering—configure clustering to easily allow for the future capability, even if you don’t need clustering initially. Fill in the information for the Host IP Address and Netmask (a /29 size network covers a three-member cluster), use the spacebar to select Cluster Link, do not fill in any other fields, and then select next >> to continue. Host IP Address: 192.168.127.1 Netmask: 255.255.255.248 Default Gateway IP Address: [blank] Cisco Validated Design page 8 Deployment details DNS Servers: [blank] Static Routes: [blank] Cluster Link [use spacebar to select] Configure IPv6 address [blank] • In wizard STEP #4, selection for OPTIONAL - NETWORK ADAPTER #2 (enp1s0f0): This interface can be used as a dedicated management interface for administrative web access to DNA Center. If you are using this option (which requires static route configuration), fill in the information; otherwise leave all selections blank, and then select next >> to continue. • In wizard STEP #4, selection for OPTIONAL - NETWORK ADAPTER #3 (enp1s0f1): This is available for use with an isolated network with a static route—unless you require this connectivity, leave all selections blank, and select next >> to continue. • In wizard STEP #4, selection for OPTIONAL - NETWORK ADAPTER #4 (enp9s0): Use this interface for communications with your network infrastructure. Supply at least the Host IP Address, Netmask, Default Gateway IP Address, and DNS Servers, optionally supply Static Routes, and then select next >> to continue. Host IP Address: 10.4.49.26 Netmask: 255.255.255.0 Default Gateway IP Address: 10.4.49.1 DNS Servers: 10.4.49.10 Static Routes: [blank for single interface installation] Cluster Link [blank] Configure IPv6 address [blank] The wizard displays an informational message. The wizard will need to shutdown the controller in order to validate… Cisco Validated Design page 9 Deployment details Step 5: Select proceed >> to continue with the network validation. The installation validates gateway reachability. Please wait while we validate and configure host networking... Step 6: After the wizard network validation completes, continue entering initial configuration values. For a standalone appliance, you create a cluster configuration to facilitate future migration. To add appliances into a cluster configuration, refer to the Installation Guide. • In wizard STEP #11 , MAGLEV CLUSTER DETAILS: Cluster Virtual IP address 10.4.49.25 • In wizard STEP #13 , USER ACCOUNT SETTINGS: Linux Password: * [linux password] Re-enter Linux Password: * [linux password] Password Generation Seed: [skip this entry] Auto Generated Password: [skip this entry] Administrator Passphrase: * [DNAC administrator password] Re-enter Administrator Passphrase: * [DNAC administrator password] Step 7: In wizard STEP #14, NTP SEVER SETTINGS, you must supply at least one active NTP server. NTP Servers: * 10.4.0.1 10.4.0.2 Step 8: Select next >>. The installation validates connectivity to the NTP servers. Validating NTP Server: 10.4.0.1 Step 9: In wizard STEP #16 , MAGLEV ADVANCED SETTINGS, you assign unique IP networks that are not part of the enterprise network, which are used by DNA Center to manage its own API services and cluster services. The minimum recommended size for each is a network with a 21-bit netmask to accommodate the large numbers of different services with unique IP addresses that communicate with one another. Services Subnet: * 192.168.240.0/21 Cluster Services Subnet: * 192.168.248.0/21 Select next >>. The wizard displays an informational message. The wizard is now ready to apply the configuration on the controller. Cisco Validated Design page 10 Deployment details Step 10: Disregard any additional warning messages about existing disk partitions. Select proceed >> to apply the configuration and complete the installation. You should not interact with the system until the installation is complete. A number of status messages scroll by during the installation, the platform boots the installed image and configures the base processes for the first time, which can take multiple hours. When installation and configuration is complete, a login message is displayed. Welcome to the Maglev Appliance (tty1) Step 11: Log in with the maglev user from the console, or alternatively from an SSH session on port 2222 to the host IP address as assigned during the installation. maglev-master-1 login: maglev Password: [password assigned during installation] Step 12: Verify that processes are deployed. $ maglev package status For the validated version, all packages are DEPLOYED initially, except for any NOT_DEPLOYED packages listed, including the following, which vary depending on your installation version: application-policy sd-access sensor-automation You install other required components in later steps. Step 13: Connect to the DNA Center Web UI by directing a web browser to the Cluster Virtual IP address you supplied in the first step of the installation (example: https://10.4.49.25/). While processes are launched after installation, you may have to wait for some time before the web server is available to serve your first request. Step 14: At the Username line enter admin, at the Password line enter the DNA Center administrator password that you assigned using the Maglev Configuration Wizard, and then click Log In. Cisco Validated Design page 11 Deployment details Step 15: At the prompt, choose a new password or skip to the next step. Step 16: At the Welcome to DNA Center prompt, provide a Cisco.com ID and password. The ID is used to register software downloads and receive system communications. If you skip this step because you do not have an ID or plan to add one later by using Settings (gear) > System Settings > Settings > Cisco Credentials, features such as SWIM, Telemetry, and Licensing will be unable to function properly. Step 17: In the previous step, if you did not enter an ID with Smart Account access with privileges for managing Cisco software licenses for your organization, a Smart Account prompt displays. Enter a Cisco.com ID associated with a Smart Account or click Skip. Step 18: If you have an Infoblox or Bluecat IPAM server, enter the details at the IP Address Manager prompt and click Next. Otherwise, click Skip. Step 19: At the Terms and Conditions display, click Next, and then at the Ready to go! display, click Go. Cisco Validated Design page 12 Deployment details Step 20: At the main DNA Center dashboard, click the settings (gear) icon, and then click About DNA Center. Step 21: Check that the version is at least 1.1.6. If your version is earlier than 1.1.6, contact support to reimage your DNA Center Appliance to version 1.1.6 or later before continuing. Version 1.1.6 is the minimum software requirement to upgrade to version 1.1.8, shown in a later step. Step 22: At the main DNA Center dashboard, click Add applications. The Application Management – Packages and Updates screen displays. This screen is used to install packages, adding functionality to the controller, including SD-Access. Cisco Validated Design page 13 Deployment details Tech tip For the validated version of DNA Center and SD-Access listed in Appendix A: Product List, a system update from the Internet is required. Check the release notes for your target software version for the appropriate procedures and dependencies. DNA Center release notes are found at: https://www.cisco.com/c/en/us/support/cloud-systems-management/dna-center/products-releasenotes-list.html The release notes include firewall access requirements for connecting DNA Center to the Internet to download packages from the cloud catalog server. DNA Center software newer than the version used for this validation may also support additional platform images, which can be found by searching Cisco.com for SD-Access Hardware and Software Compatibility Matrix. DNA Center automatically connects to the Cisco cloud repository to find the latest updates. You can use the Refresh button to reveal any updates that are found over time. Tech tip When deploying with this guide, do not use the DNA Center 1.2 Switch Now button, if it appears. This guide covers SD-Access using only DNA Center 1.1 versions of the software. Step 23: Click the settings (gear) icon, click System Settings, and then navigate to App Management > System Updates. The Application Management – System Updates screen is displayed. Step 24: Under the Available Update column, in the row showing System, if there is an available update, click Install. A download of the new system update begins, which can take many minutes. Then the installation starts automatically, which can take more than an hour. Use the Refresh button to check the status until the updated Installed Version is displayed with a Running status. The System package within the System Updates section is the only package you download or update during the initial system update. After the installation of the system is complete, you then download and install the application package updates. Cisco Validated Design page 14 Deployment details Tech tip Illustrations are installation examples. Software versions used for validation are listed in Appendix A: Product List. Step 25: Click the settings (gear) icon, click System Settings, and navigate to App Management > Packages and Updates. At the top of the list, select all packages by selecting the box next to Package, click the Actions pull-down menu, and then select Download. Step 26: At the popup, select OK to confirm the download operation. The screen updates, showing all of the packages that are being downloaded. Before proceeding to the next step, refresh the screen until there are no longer any packages showing a status of Downloading. The download can take many minutes to complete. Step 27: After the new versions of the packages are downloaded, install the packages, including the latest version of the SD-Access package. Select all packages in common that have a new Downloaded Version available, at the top of the window click the Actions pull-down menu, select Update, and then click OK. The package updates begin. Use the browser refresh button to see the updated status for each package. The update process can take over an hour to complete. Tech tip Packages must be updated in a specific order to appropriately address package interdependencies and should be updated only after the system updates have completed. Allow DNA Center to handle dependencies by selecting and updating all package updates at once; otherwise refer to the Installation Guide for the correct package update sequence. The Installation Guide also explains how to use the Maglev CLI to force a download retry for any stalled download. Cisco Validated Design page 15 Deployment details The Actions menu is unavailable until package tasks are complete. Wait until packages no longer show a Status of Pending Update, Preparing Update, or Updating before proceeding. While the packages are installing, which takes some time, you may work in parallel on the next process for installing the Identity Services Engine nodes. After the Automation – SD Access package is in Running status, along with any other updated packages, the functionality is available to use, and integration with the installed ISE nodes can proceed. Step 28: Validate that the correct versions of DNA Center and all packages are now installed. At the main DNA Center dashboard, click the settings (gear) icon, click About DNA Center, and then click Show Packages. Process Install Identity Services Engine nodes 1. Install ISE server images 2. Configure roles for ISE nodes 3. Register ISE node 2 and configure roles The SD-Access 1.1 solution described in this guide uses two ISE nodes in a high-availability standalone configuration dedicated to the SD-Access network and integrated into DNA Center management. The first ISE node has the primary Policy Administration Node (PAN) persona configuration and the secondary monitoring and troubleshooting (MnT) persona configuration. The second ISE node has the secondary PAN persona configuration and the primary MnT persona configuration. Both nodes include Policy Services Node (PSN) persona configurations. You also enable pxGrid and External RESTful Services (ERS) on the ISE nodes. Cisco Validated Design page 16 Deployment details Table 2. ISE node configurations ISE Node 1 ISE Node 2 Primary PAN Secondary PAN Secondary MnT Primary MnT PSN PSN pxGrid pxGrid ERS Services ERS Services Tech tip There are specific ISE software versions required for compatibility with DNA Center. To be able to integrate with an existing ISE installation, you must first ensure that the existing ISE is running at least the minimum supported version. An ISE integration option, which is not included in this validation, is to stand up a new ISE instance as a proxy to earlier versions of ISE. The versions of ISE and DNA Center validated in HA standalone mode for this guide are listed in Appendix A: Product List. You may find alternative recommended images by searching cisco.com for SD-Access Hardware and Software Compatibility Matrix. Procedure 1 Install ISE server images Step 1: On both ISE nodes, boot and install the ISE image. Step 2: On the console of the first ISE node, at the login prompt, type setup, and then press Enter. Please type ‘setup’ to configure the appliance localhost login: setup Step 3: Enter the platform configuration parameters. Press ‘Ctrl-C’ to abort setup Enter hostname[]: m29-ise1 Enter IP address []: 10.4.49.30 Enter IP netmask[]: 255.255.255.0 Enter IP default gateway[]: 10.4.49.1 Enter default DNS domain[]: ciscodna.net Enter Primary nameserver[]: 10.4.49.10 Add secondary nameserver? Y/N [N]: N Enter NTP server[time.nist.gov]: 10.4.0.1 Add another NTP server? Y/N [N]: Y Cisco Validated Design page 17 Deployment details Enter NTP server[time.nist.gov]: 10.4.0.2 Add another NTP server? Y/N [N]: N Enter system timezone[UTC]: UTC Enable SSH service? Y/N [N]: Y Enter username[admin]: admin Enter password: [admin password] Enter password again: [admin password] Copying first CLI user to be first ISE admin GUI user… Bringing up network interface... Pinging the gateway... Pinging the primary nameserver... Do not use ‘Ctrl-C’ from this point on... Installing Applications... === Initial Setup for Application: ISE === Additional installation messages appear, and then the server reboots. Rebooting... Step 4: Repeat steps 2 and 3 on the second ISE node, using the appropriate parameters for it. The systems reboot automatically and display the Cisco ISE login prompt. localhost login: Procedure 2 Configure roles for ISE nodes Step 1: On the first ISE node, login using a web browser and the configured username and password, and then accept any informational messages. https://m29-ise1.ciscodna.net/ Step 2: Navigate to Administration > System > Deployment, and then click OK to the informational message. Cisco Validated Design page 18 Deployment details Step 3: Click on the ISE node hostname, and then under Role, click Make Primary. Step 4: Select pxGrid, and then click Save. Procedure 3 Register ISE node 2 and configure roles Integrate the additional ISE node by using the same ISE administration session started on the first node. Step 1: Refresh the view by navigating again to Administration > System > Deployment, and then under the Deployment Nodes section, click Register. A screen displays allowing registration of the second ISE node into the deployment. Step 2: Enter the ISE fully-qualified domain name Host FQDN (m29-ise2.ciscodna.net), User Name (admin), and Password ([admin password]), and then click Next. Step 3: If you are using self-signed certificates, click Import Certificate and Proceed. If you are not using selfsigned certificates, follow the instructions for importing certificates and canceling this registration, and then return to the previous step. Cisco Validated Design page 19 Deployment details Step 4: On the Register ISE Node - Step 2: Configure Node screen, under Monitoring, change the role for this second ISE node to PRIMARY, at the bottom check pxGrid, and then click Submit. The node configuration is saved. Step 5: Click OK to the notification that the data is to be synchronized to the node and the application server on the second node will restart. The synchronization and restart of the second node can take more than ten minutes to complete. You can use the refresh button on the screen to observe when the node returns from In Progress to a Connected state to proceed to the next step. Cisco Validated Design page 20 Deployment details Step 6: Check cisco.com for ISE release notes, download any patch required for your installation, and install the patch by navigating in ISE to Administration > System > Maintenance > Patch Management, click Install, click Browse, browse for the patch image, and then click Install. The patch installs node-by-node to the cluster, and each cluster node reboots. Step 7: After the ISE web interface is active again, check progress of the patch installation by navigating to Administration > System > Maintenance > Patch Management, select the patch, and then select Show Node Status. Use the Refresh button to update status until all nodes are in Installed status, and then proceed to the next step. Step 8: Navigate to Administration > System > Settings, on the left pane navigate to ERS Settings, under ERS Setting for Primary Administration Node select Enable ERS for Read/Write, accept any dialog box that appears, under ERS Setting for All Other Nodes select Enable ERS for Read, and then click Save. Accept any additional dialog box that appears. The ERS settings are updated, and ISE is ready to be integrated with DNA Center. Cisco Validated Design page 21 Deployment details Process Integrate Identity Services Engines with DNA Center 1. Configure DNA Center authentication and policy servers Integrate ISE with DNA Center by defining ISE as an authentication and policy server to DNA Center and permitting pxGrid connectivity from DNA Center into ISE. Integration enables information sharing between the two platforms, including device information and group information, and allows DNA Center to define policies to be rendered into the network infrastructure by ISE. Tech tip Validation shows DNA Center integrated with ISE servers. Although it is possible to avoid the integration of ISE, policy configuration such as using scalable group tags and group-based policies will not be possible and there will be a loss of automation, resulting in the requirement to manually assign edge ports to VNs, which is not a part of the validation shown. Procedure 1 Configure DNA Center authentication and policy servers Step 1: Log in to the DNA Center web interface, at the top-right corner select the gear icon, and then navigate to System Settings. Cisco Validated Design page 22 Deployment details Step 2: Navigate to Settings > Authentication and Policy Servers, and then click on the + Add button. Tech tip The next step for integrating an ISE installation is the same whether you use a high-availability standalone ISE deployment, as validated, or a distributed ISE deployment. The shared secret chosen needs to be consistent with the shared secret used across the devices in the network for communicating with the authentication, authorization, and accounting (AAA) server. The username and password are used for DNA Center to communicate with ISE using SSH, and must be the default super admin account that was created during the ISE installation. Step 3: In the Add AAA/ISE SERVER display, enter the ISE node 1 (primary PAN) Server IP Address (example: 10.4.49.30) and Shared Secret, toggle the Cisco ISE selector, enter the ISE Username (example: admin), enter the ISE Password, enter the ISE fully-qualified domain name for FQDN (verified with a DNS lookup at submission— cut-and-paste from a browsing session to ISE aids with entry accuracy), enter Subscriber Name (example: dnac), leave the SSH Key blank, and then click Apply. During communication establishment, status from DNA Center displays IN PROGRESS. Use the Refresh button until communication establishes with ISE and the server displays ACTIVE status. If communication is not established, an error message displays with information reported from ISE regarding the problem to be addressed before continuing. You can also see the communication status by navigating from the gear icon to System Settings > System 360. Under External Network Services, the Cisco ISE server shows in Available status. With communications established, DNA Center requests a pxGrid session with ISE. Step 4: Log in to ISE, and then navigate to Administration > pxGrid Services. The client named dnac is now showing Pending in the Status column. Cisco Validated Design page 23 Deployment details Step 5: Check the box next to dnac, above the list click Approve, and then click Yes to confirm. A success message displays, and the Pending status changes to Online (XMPP). You can additionally verify that the integration is active by expanding the view for the client and observing two subscribers, Core and TrustSecMetaData. If ISE is integrated with DNA Center after scalable groups are already created in ISE, in addition to the default groups available, any existing ISE groups are also visible by logging in to DNA Center and navigating to Policy > Registry > Scalable Groups. Existing ISE policies are not migrated to DNA Center. Process Install SD-Access wireless LAN controllers 1. Configure the WLC Cisco AireOS platforms using the startup wizard For this deployment, dedicate the WLCs to SD-Access Wireless connectivity by integrating them natively with the fabric. The WLCs use link aggregation to connect to a redundant Layer 2 shared services distribution outside of the SD-Access fabric, as described in the Campus LAN and Wireless LAN Design Guide. Use this guide to configure a pair of Cisco WLCs with high availability stateful switchover (HA SSO) resiliency, and all of the network connectivity should be in place before starting the configuration procedure. Because each fabric border node is an independent routed device, redundant WLCs should not be connected at the border, but rather to a set of devices configured to support the Layer 2 redundancy suitable for the HA SSO WLCs, such as a switch stack, Cisco Virtual Switching System, or Cisco StackWise® Virtual. Tech tip The SD-Access 1.1 solution supports transport of only IP frames in the Layer 2 overlays that are used for WLAN, without Layer 2 flooding of broadcast and unknown multicast traffic. Without broadcasts from the fabric edge, Address Resolution Protocol (ARP) functions by using the fabric control plane for MAC-to-IP address table lookups. For transport of non-IP frames and Layer 2 flooding, see the release notes for your software version in order to verify updated support. Cisco Validated Design page 24 Deployment details Tech tip To add WLAN as part of SD-Access 1.1 with the software releases listed in Appendix A: Product List, while using Cisco Catalyst® 6800 Series fabric border devices not supporting the wireless control plane, you must use separate control plane devices that do include wireless support. See the release notes for any changes to WLAN Layer 2 control plane support when using the Cisco Catalyst 6800 Series. Procedure 1 Configure the WLC Cisco AireOS platforms using the startup wizard Perform the initial configuration using the CLI startup wizard. After powering up the WLC, you should see the following on the WLC console. If not, type - (dash) followed by Enter repeatedly until the startup wizard displays the first question. Welcome to the Cisco Wizard Configuration Tool Use the ‘-‘ character to backup Step 1: Terminate the auto-install process. Would you like to terminate autoinstall? [yes]: YES Step 2: Enter a system name. Do not use colons in the system name, and do not leave the default name. System Name [Cisco_7e:8e:43] (31 characters max): SDA-WLC-1 Step 3: Enter an administrator username and password. Tech tip Use at least three of the following character classes in the password: lowercase letters, uppercase letters, digits, and special characters. Enter Administrative User Name (24 characters max): admin Enter Administrative Password (24 characters max): [password] Re-enter Administrative Password : [password] Step 4: Use DHCP for the service port interface address. Service Interface IP address Configuration [static] [DHCP]: DHCP Step 5: Enable Link Aggregation (LAG). Enable Link Aggregation (LAG) [yes][NO]: YES Cisco Validated Design page 25 Deployment details Step 6: Enter the management interface IP address, mask, and default router. The IP address for the secondary controller of an HA SSO pair is used only temporarily until the secondary WLC downloads the configuration from the primary and becomes a member of the HA controller pair. Management Interface IP Address: 10.4.174.26 Management Interface Netmask: 255.255.255.0 Management interface Default Router: 10.4.174.1 Step 7: Configure the Management Interface VLAN Identifier. Management Interface VLAN Identifier (0 = untagged): 174 Step 8: Configure the Management Interface Port Number. The displayed range varies by WLC model. This number is arbitrary after enabling LAG, because all management ports are automatically configured and participate as one LAG, and any functional physical port in the group can pass management traffic. Management Interface Port Num [1 to 2]: 1 Step 9: Enter the DHCP server for clients. (Example: 10.4.48.10) Management Interface DHCP Server IP Address: 10.4.48.10 Step 10: Do not enable HA SSO. DNA Center automates the HA SSO controller configuration during device provisioning. Enable HA (Dedicated Redundancy Port is used by Default)[yes][NO]: NO Step 11: The WLC uses the virtual interface for mobility DHCP relay, guest web authentication, and intercontroller communication. Enter an IP address that is not used in your organization’s network. Virtual Gateway IP Address: 192.0.2.1 Step 12: Enter a multicast address that will be used by each AP to subscribe to IP multicast flows coming from the WLC. This address will be used only when configuring the IP multicast delivery method called multicast-multicast. Multicast IP Address: 239.1.1.1 Tech tip The multicast address must be unique for each controller or HA pair in the network. The multicast address entered is used as the source multicast address, which the access points registered to the controller use for receiving wireless user-based multicast streams. Step 13: Enter a name for the default mobility and RF group. Mobility/RF Group Name: SDA-Campus Step 14: Enter an SSID for the data WLAN. This is used later in the deployment process. Network Name (SSID): SDA-Data Step 15: Disable DHCP Bridging Mode. Configure DHCP Bridging Mode [yes][NO]: NO Cisco Validated Design page 26 Deployment details Step 16: Enable DHCP snooping. Allow Static IP Addresses [YES][no]: NO Step 17: Do not configure the RADIUS server now. You will configure the RADIUS server later using the GUI. Configure a RADIUS Server now? [YES][no]: NO Warning! The default WLAN security policy requires a RADIUS server. Please see documentation for more details. Step 18: Enter the country code where you are deploying the WLC. Enter Country Code list (enter ‘help’ for a list of countries) [US]: US Step 19: Enable all of the required wireless networks. Enable 802.11b network [YES][no]: YES Enable 802.11a network [YES][no]: YES Enable 802.11g network [YES][no]: YES Step 20: Enable the radio resource management (RRM) auto-RF feature. Enable Auto-RF [YES][no]: YES Step 21: Synchronize the WLC clock to your organization’s NTP server. Configure a NTP server now? [YES][no]:YES Enter the NTP server’s IP address: 10.4.0.1 Enter a polling interval between 3600 and 604800 secs: 86400 Step 22: Do not configure IPv6. Would you like to configure IPv6 parameters[YES][no]:NO Step 23: Confirm that the configuration is correct. The WLC saves the configuration and resets automatically. Configuration correct? If yes, system will save it and reset. [yes][NO]: YES … Configuration saved! Resetting system with new configuration… If you press Enter or respond with no, the system resets without saving the configuration, and you will have to complete this procedure again. The WLC resets and displays a User: login prompt. (Cisco Controller) Enter User Name (or ‘Recover-Config’ this one-time only to reset configuration to factory defaults) User: Cisco Validated Design page 27 Deployment details Step 24: Repeat step 1 through step 23 for the secondary WLC, using the appropriate parameters for it. Step 25: Use a web browser to verify connectivity by logging in to each of the Cisco WLC administration web pages using the credentials created in step 3 of Procedure 1. (Example: https://10.4.174.26) Step 26: Navigate to Commands > Set Time. Verify that the date and time agree with the NTP server. If the time appears to be significantly different, manually correct it, and also choose a time zone, if you commonly use something other than the default in the network infrastructure. The correct date and time are important for certificate validation and successful AP registration with the WLC. The controllers are ready for discovery and integration into the DNA Center setup. Additional controller reachability requirements, such as a specific route at the edge nodes to the WLC, are addressed in later integration procedures. Deploying SD-Access Process Using DNA Center for initial network design and discovery 1. Create network sites 2. Configure network services for sites 3. Add device credentials for discovery and management 4. Reserve IP address pools for network provisioning Using DNA Center, you create a network hierarchy of sites that can contain additional sites or buildings and floors within sites. Devices map into buildings for configuration. Cisco Validated Design page 28 Deployment details Procedure 1 Create network sites Step 1: Log in to DNA Center. Navigate to the main DNA Center dashboard, under the Design category, select Add site locations on the network. Step 2: Click Add Site to start a network design using the tool, supply an appropriate Site Name, and then click Add. Step 3: Click Add Site, select the Building button, supply an appropriate Building Name, select the site previously created as the Parent, complete the wizard to assign a location, and then click Add. To add a building, you can use an approximate street address near the building within the wizard and, if desired, refine the building position on the map by clicking the target location. Step 4: Repeat the previous steps as required to add sites and buildings, creating a hierarchy that makes sense for your organization. Cisco Validated Design page 29 Deployment details Step 5: If you are integrating wireless to a building, or want more granularity for network choices within a building, select the building on the map (or select the gear icon next to a building in the hierarchy), choose Add Floor, and complete the wizard with the details. Floors are referenced during the wireless provisioning. If you have floor map diagrams in DXF, DWG, JPG, GIF, or PNG formats, add them to any defined floors as a useful component for wireless deployments to show access point locations and coverage. You can add hundreds of sites up to the limits listed in the Software-Defined Access Design Guide. Procedure 2 Configure network services for sites Configure AAA, DHCP, and DNS services as required for the sites in DNA Center. If the services use the same servers across all of your sites, you can configure them globally, and the inheritance properties of the hierarchy make the global settings available to all sites. Differences for individual sites can then be applied on a site-by-site basis. This procedure shows the configuration globally. Cisco Validated Design page 30 Deployment details Step 1: Within DNA Center, navigate to DESIGN > Network Settings > Network. Within the left pane in the site hierarchy, select the appropriate level (example: Global), fill in the DHCP Server IP address (example: 10.4.49.10), under DNS Server fill in the Domain Name (example: ciscodna.net) and server Primary IP Address (example: 10.4.49.10), add any redundant or additional servers, and then click Save. Step 2: Near the top, next to Network Telemetry, click the + Add Servers button, select the AAA check box, and then click OK. The configuration pane is updated with AAA Server as an available configuration section, ready for configuring AAA services for both the network infrastructure device management and the client endpoints connecting to the infrastructure. For validation, the high-availability standalone ISE nodes are used with RADIUS for both the network infrastructure and the client endpoint authentication. Cisco Validated Design page 31 Deployment details Step 3: Select the Network checkbox, and select both the ISE and RADIUS radio buttons. Under Network, use the pull-down to select the prepopulated ISE server. Use the second pull-down that appears to select the IP Address (Primary) of the ISE server, select the plus sign (+) button, and then in the IP Address (Additional) pull-down select the redundant ISE server node. Step 4: Select the Client/Endpoint checkbox, and select both the ISE and RADIUS radio buttons. Under Client/Endpoint, use the pull-down to select the prepopulated ISE server. Use the second pulldown that appears to select the IP Address (Primary) of the ISE server, and then click Save. The ISE servers for AAA, the DHCP Server, and the DNS Server for the selected level in the site hierarchy are all saved to be used during fabric provisioning. Procedure 3 Add device credentials for discovery and management When you deploy the SD-Access underlay using devices that are already configured and which are network reachable by DNA Center, you discover and manage the devices by supplying the CLI and Simple Network Management Protocol (SNMP) credentials. As an option, you can deploy LAN switches without existing configurations into the underlay by using the DNA Center LAN Automation capabilities. Cisco Network Plug and Play (PnP) is the mechanism enabling connectivity and initial configuration for supported switches. For LAN Automation deployments, you also supply CLI and SNMP credentials to access and prepare one or more supported PnP seed devices, such as Cisco Catalyst 9500 Series Switches in a distribution or core. LAN Automation discovers switches directly connected to chosen seed device interfaces and up to one additional hop of connected switches, all of which must be running the PnP agent and have no previous configuration. The credentials supplied allow DNA Center and seed devices to work together to configure the discovered devices and add them into managed inventory. Add device credentials to manage scopes of the site hierarchy created in the design. These credentials enable discovery and management for the network. Cisco Validated Design page 32 Deployment details Step 1: Navigate to Design > Network Settings > Device Credentials, select an appropriate level of the site hierarchy in the left pane (example: Global for common credentials across the hierarchy), and acknowledge any pop-up alerts. Step 2: At the top of the CLI Credentials section, click Add, complete the Name / Description (example: IOS Devices), Username, Password, and Enable Password fields, and click OK. Caution If you are using ISE as your AAA server, you should avoid using admin as the username for device CLI credentials, which can lead to username conflicts with the ISE administrator login, resulting in the inability to log in to devices. Cisco Validated Design page 33 Deployment details Step 3: At the top of the SNMP Credentials section, select an SNMP credential type to update (example: SNMPv2c Read). Click Add, select the radio button in the row next to the credential to update (a single credential per row at a time), fill out the credential details, and click Save. Step 4: Repeat steps 2 and 3 for any additional credentials required in the hierarchy. CLI Credentials and both SNMPV2C Read and SNMPV2C Write are the most common requirements. Step 5: For each of the CLI and SNMP credentials assigned, click all radio buttons next to each assignment created, including ones where you toggle among the options (example: SNMPV2C Write). After each selection, at the bottom of the Device Credentials screen, click Save. A Created Common Settings Successfully acknowledgment is displayed. The device credentials to be used for network discovery and management are now available in DNA Center. Procedure 4 Reserve IP address pools for network provisioning Reserve IP addresses for your networks by manually assigning them in DNA Center. The assignments can be pushed to an IP address manager (IPAM) (examples: Infoblox, Bluecat) by integrating the IPAMs through APIs. You optionally integrate with an IPAM by navigating to the System Settings > Settings > IP Address Manager and filling out the form with the specifics of your IPAM provider. This procedure shows how to manually define the IP address pools that will be used later and then assign pools to be used by the sites in your network, which you do for both manual and IPAM configurations. You have the flexibility to create a larger global pool and then later reserve a subset of a pool at lower levels, such as for a specific site in the site hierarchy. When using the validated version of DNA Center listed in Appendix A: Product List, you use the global level only to create IP address pools. DHCP scopes configured on the DHCP server should support the address allocations and any additional DHCP options required to make a device work. For example, some IP telephony vendors require specific DHCP options to be configured to enable their devices to function correctly, which can be checked in product documentation. The global address pools in the table are added as part of the validation. Cisco Validated Design page 34 Deployment details Table 3. Global address pools used during validation Pool name Network/mask IP gateway DHCP server DNS server Border-Handoff 172.16.172.0/24 172.16.172.1 — — Access-Point 172.16.173.0/24 172.16.173.1 10.4.49.10 10.4.49.10 14-Underlay 10.4.14.0/24 10.4.14.1 10.4.49.10 10.4.49.10 14-Employee 10.101.114.0/24 10.101.114.1 10.4.49.10 10.4.49.10 14-Phone 10.101.214.0/24 10.101.214.1 10.4.49.10 10.4.49.10 14-Things 10.102.114.0/24 10.102.114.1 10.4.49.10 10.4.49.10 14-Guest 10.103.114.0/24 10.103.114.1 10.4.49.10 10.4.49.10 LAN-Automation 10.5.100.0/24 10.5.100.1 10.4.49.10 10.4.49.10 Step 1: Add a global pool in DNA Center that is dedicated to fabric border node connectivity provisioning. Navigate to DESIGN > Network Settings > IP Address Pools. In the site hierarchy on the left, select Global, and click + Add IP Pool. Fill in the IP Pool Name, IP Subnet, CIDR Prefix, and Gateway IP address. If the pool has endpoint clients, assign DHCP Server(s) and DNS Server(s). Do not select Overlapping. When you are done, click Save. Repeat this step for any additional global IP pools that include subnets at the site and building levels. The pools are added to the list of global pools. Cisco Validated Design page 35 Deployment details Process Creating segmentation and policy for the SD-Access network 1. Add an overlay VN to the SD-Access network 2. Create a micro-segmentation policy using SGTs As part of the design decisions in advance of your SD-Access network deployment, you decide network segmentation strategies for the organization. Macro segmentation uses additional overlay networks in the fabric (VNs), and micro segmentation uses scalable group tags to apply policy to groups of users or device profiles. The desired outcomes of policy application using segmentation may be easily accommodated with group policies. In a university example, students and faculty machines may both be permitted to access printing resources, but student machines should not communicate directly with faculty machines, and printing devices should not communicate with other printing devices. In other cases, a higher degree of isolation is required. In a retail store example, the point-of-sale machines should never be in communication with the video surveillance network infrastructure, which in turn should never communicate with the building HVAC system. In cases where the isolation need extends from the edge of the network all the way to the core of the network for access to access centralized services, macro segmentation using VNs is the best choice. Governmental and industrial compliance requirements and an organization’s risk policies often drive the choice to use VNs. Use these procedures as examples for deploying your macro and micro segmentation policies. Cisco Validated Design page 36 Deployment details Procedure 1 Add an overlay VN to the SD-Access network Step 2: From the main DNA Center dashboard, navigate to POLICY > Virtual Network, click the + (plus sign) to create a new virtual network, enter a Virtual Network Name (example: Workers), drag scalable groups from the Available Scalable Groups pool into the Groups in the Virtual Network pool (examples: Employees and Developers), and then click Save. The VN with associated groups is defined and appears in the list of defined virtual networks. These virtual network definitions are available for provisioning fabrics. Tech tip If you don’t see any groups, likely the pxGrid connectivity between DNA Center and ISE is not fully operational. In this case, review the integration procedures for ISE with DNA Center and be sure to approve the pxGrid connection request in ISE from DNA Center. Repeat this step for each overlay network, either guest or non-guest, as required. You can also return to this step after the fabric is provisioned to create more overlay networks. Procedure 2 Create a micro-segmentation policy using SGTs Micro-segmentation policies are customized for an organization’s deployment. This simple example shows a basic policy that can be used to deny users within a VN from communicating with other employee devices and also from one another when a group called Quarantined_System is applied. Cisco Validated Design page 37 Deployment details Step 3: From the main DNA Center dashboard, navigate to POLICY > Policy Administration > Group-Based Access Control (Fabric), click + Add Policy, from the Available Scalable Groups pane drag the Quarantined_ System group and drop it into both the Source and the Destination panes, drag the Employees group into the Destination pane, input a Policy Name (example: Quarantine), enter a Description, select Enable Policy, leave Enable Bi-directional unselected, click + Add Contract, select deny, click OK, and then click Save. The policy is created and listed with a status of DEPLOYED. This policy is now available to be applied to fabrics that are created and is available in ISE. Step 4: Log in to ISE, navigate to Work Centers > TrustSec > TrustSec Policy, on the left side select Matrix, and verify that the policy has been updated to ISE for rendering into the network. Cisco Validated Design page 38 Deployment details Process Preparing the network for automation 1. Configure underlay network device management using the CLI 2. Configure underlay network links for routed access connectivity 3. Enable routing connectivity at border toward external router neighbor 4. Redistribute shared services subnets into underlay IGP 5. Enable connectivity at external fusion router towards border neighbor 6. Configure MTU on unmanaged intermediate devices 7. Discover and manage network devices 8. Configure underlay switches using LAN Automation 9. Manage software images for devices in inventory 10.Use software image management to update device software To be able to deploy the network designs and policies created, a functioning network underlay must exist with working management connectivity. Procedure 1 Configure underlay network device management using the CLI For maximum resiliency and bandwidth, use a loopback interface on each device and enable Layer 3 connectivity for DNA Center in-band discovery and management. The following steps configure point-to-point Ethernet connectivity between devices using IS-IS as the routing protocol and SSHv2 with SNMPv2c for device configuration to the device loopback interfaces. Do not add a configuration to any devices that you intend to discover and configure using LAN Automation as part of a later procedure. Devices with existing configurations cannot be configured using PnP onboarding. Step 1: Use the device CLI to configure the hostname to make it easy to identify the device. hostname [hostname] Step 2: Configure local login and password. username dna privilege 15 secret [user password] enable secret [enable password] service password-encryption Step 3: Configure Secure Shell (SSH) as the method for CLI management access. ip ssh version 2 line vty 0 15 login local transport input ssh transport preferred none Cisco Validated Design page 39 Deployment details Step 4: Enable Simple Network Management Protocol (SNMP) and configure SNMPv2c with both a read-only and a read-write community string, which match the credentials input into DNA Center. snmp-server community [SNMP read-only name] ro snmp-server community [SNMP read-write name] rw Step 5: Configure the switch to support Ethernet jumbo frames. The MTU chosen allows for the extra fabric headers and compatibility with the highest common value across most switches, and the round number should be easy to remember when configuring and troubleshooting. system mtu 9100 Step 6: Configure the switch loopback address. interface Loopback0 ip address [Device loopback IP address] 255.255.255.255 Procedure 2 Configure underlay network links for routed access connectivity Optional If your underlay network is already configured as a routed access network, skip this procedure. Do not add a configuration to any devices that you intend to discover and configure using LAN Automation as part of a later procedure. Devices with existing configurations cannot be configured using PnP onboarding. Step 1: Configure the switch connections within the underlay network infrastructure. Repeat this step for every link to a neighbor switch within the fabric underlay. If the device will be provisioned as a fabric border node and the connection is to be used as a handoff from the fabric to the rest of the infrastructure, use the next procedure instead. interface TenGigabitEthernet1/0/1 no switchport ip address [Point-to-point IP address] 255.255.255.254 Step 2: Enable IP routing and enable the IS-IS routing protocol on the switch. ! ip routing is not enabled by default for many switches ip routing router isis net 49.0001.0100.0400.0001.00 metric-style wide nsf ietf ispf level-1-2 passive-interface loopback0 log-adjacency-changes Cisco Validated Design page 40 Deployment details Tech tip A common convention in IS-IS is to embed the loopback IP address into the unique NET, or system ID. For example, a loopback IP address 10.4.32.1 (010.004.032.001) becomes 0100.0403.2001, and it is appended with .00 and prepended with the area ID (49.0001), resulting in NET 49.0001.0100.0403.2001.00. Step 3: Enable IS-IS routing on all of the configured infrastructure interfaces in the underlay, except for the border handoff interfaces, which are configured in the next procedure. The loopback interface is enabled to share the management IP address and the physical interfaces are enabled to share routing information with the connected infrastructure. interface Loopback0 ip router isis interface range TenGigabitEthernet1/0/1-2 , TenGigabitEthernet2/0/1-2 ip router isis Procedure 3 Enable routing connectivity at border toward external router neighbor If your underlay network is already configured as a routed access network and integrated with the rest of your network using BGP, skip this procedure. To connect border node devices into your network, you establish connectivity across interfaces configured using VRF-lite, which uses 802.1Q VLAN tagging to separate the VRFs. Connect common network services available outside of the border nodes such as DNS, DHCP, and WLCs, and for DNA Center management when it is not directly connected to the SD-Access network nodes, by extending your existing enterprise network to the underlay at the border. Connectivity to DNA Center is required for additional provisioning. The external device handling routing among multiple virtual networks and a global routing instance acts as a fusion router for those networks, and the separation of connectivity is maintained by using VRFs connected using interfaces with 802.1Q tagging to the border, also known as VRF-lite. Establishing the underlay connectivity using BGP allows DNA Center to manage initial discovery and configuration using the link, and then to use the same link augmented with additional tags and BGP sessions as needed for overlay VN connectivity. Step 1: For each border node, if you are configuring a switch supporting VLAN trunk interfaces such as Catalyst 9000, 3800, or 6800 Series switches, you must configure a trunk on the connected interface with a dedicated VLAN to establish underlay connectivity for route peering to the fusion router. vlan 100 interface vlan100 ip address [IP address] [netmask] no shutdown interface FortyGigabitEthernet1/0/24 switchport switchport mode trunk switchport trunk allowed vlan add 100 no shutdown Cisco Validated Design page 41 Deployment details Step 2: For each border node, if you are configuring a device such as an ASR or ISR router that supports 802.1Q VLAN tagging, use an alternative subinterface configuration instead of a switch trunk interface to establish underlay connectivity to the fusion router. interface TenGigabitEthernet0/1/0 no shutdown ! interface TenGigabitEthernet0/1/0.100 encapsulation dot1Q 100 ip address [IP address] [netmask] no shutdown Step 3: If you skipped the procedure to interconnect the underlay devices, connect the redundant border nodes together with at least one routed interface for underlay communication and later BGP peering. The configuration for integrating into the IS-IS protocol is shown. Repeat this step for each interface connecting border nodes. interface FortyGigabitEthernet1/0/23 no switchport ip address [Point-to-point IP address] 255.255.255.254 ip router isis no shutdown Step 4: Enable BGP routing to the fusion router in order to connect networks external to the fabric, and activate BGP for the connecting interfaces. You use BGP to allow DNA Center management access to the underlay network devices, while allowing further provisioning for virtual networks on the interfaces and minimizing disruption to network connectivity. Repeat this step for each border node. router bgp [underlay AS number] bgp router-id [loopback 0 IP address] bgp log-neighbor-changes ! fusion router is an eBGP neighbor neighbor [fusion interface IP address] remote-as [external AS number] ! redundant border is an iBGP neighbor neighbor [redundant border Lo0 address] remote-as [underlay AS number] neighbor [redundant border Lo0 address] update-source Loopback0 ! address-family ipv4 network [Lo0 IP address] mask 255.255.255.255 ! advertise underlay IP network summary in global routing table aggregate-address [underlay IP network summary] [netmask] summary-only redistribute isis level-2 neighbor [fusion interface IP address] activate neighbor [redundant border Lo0 address] activate maximum-paths 2 exit-address-family Cisco Validated Design page 42 Deployment details Procedure 4 Redistribute shared services subnets into underlay IGP A default route in the underlay cannot be used by the APs to reach the WLC. A more specific route (such as a /24 subnet or /32 host route) to the WLC IP addresses must exist in the global routing table at each node where the APs connect to establish connectivity. Permit the more specific routes for the WLC and DHCP shared services needed from BGP (examples: 10.4.174.0/24 and 10.4.48.0/21) into the underlay network by redistributing the shared services route at the border into the underlay IGP routing process using this procedure. Using this process, the prefixes used match prefixes in the BGP routing table. Step 1: Connect to the each border node and add a prefix-list and route-map for subnets used for the shared services. ip prefix-list SHARED_SERVICES_NETS seq 5 permit 10.4.48.0/21 ip prefix-list SHARED_SERVICES_NETS seq 10 permit 10.4.174.0/24 route-map GLOBAL_SHARED_SERVICES_NETS permit 10 match ip address prefix-list SHARED_SERVICES_NETS Step 2: At each border node, redistribute the prefixes into your underlay routing protocol. This example assumes ISIS. router isis redistribute bgp [underlay AS number] route-map GLOBAL_SHARED_SERVICES_NETS metric-type external Procedure 5 Enable connectivity at external fusion router towards border neighbor The fusion routers connected to your SD-Access fabric border routers require CLI configuration for BGP connectivity consistent with the border routers configured in the previous procedure. Follow this procedure at each external fusion router device that is connected to your border. Step 1: On each external fusion router, create the VRF, route distinguisher, and route targets for the initial management connectivity to the border. vrf definition VRF-GLOBAL rd 100:100 ! address-family ipv4 route-target export 100:100 route-target import 100:100 exit-address-family Cisco Validated Design page 43 Deployment details Step 2: For each connection from the external fusion router to the SD-Access fabric border, enable the interface, VLAN-tagged subinterface, and IP addressing. This example uses 802.1Q VLAN tagging on a router with subinterfaces. For switches requiring trunk port configurations, match the other side that was previously configured. interface TenGigabitEthernet0/1/7 description to Border mtu 9100 no ip address interface TenGigabitEthernet0/1/7.100 encapsulation dot1Q 100 vrf forwarding VRF-GLOBAL ip address [IP network] [netmask] IP connectivity is now enabled for the VLAN (example: 100) on the 802.1Q tagged connection between the fusion router and the border node. Step 3: Create route maps to tag routes and avoid routing loops when redistributing between the IGP used within the rest of the network and BGP when connecting using multiple links. IGPs can vary—the example shown is for EIGRP, completing the routing connectivity from IS-IS to BGP to EIGRP. route-map RM-BGP-TO-EIGRP permit 10 set tag 100 ! route-map RM-EIGRP-TO-BGP deny 10 match tag 100 route-map RM-EIGRP-TO-BGP permit 20 Step 4: Enable BGP peering from redundant fusion routers to the border nodes and redistribute the IGP that is used to reach the networks beyond the fusion routers. router bgp [external AS number] bgp router-id [loopback IP address] bgp log-neighbor-changes ! address-family ipv4 vrf VRF-GLOBAL redistribute eigrp 100 route-map RM-EIGRP-TO-BGP neighbor [redundant fusion IP] remote-as [external AS number] neighbor [redundant fusion IP] activate Cisco Validated Design page 44 Deployment details neighbor [border IP address] remote-as [underlay AS number] neighbor [border IP address] activate maximum-paths 2 default-information originate exit-address-family Step 5: Redistribute BGP into the IGP to enable reachability. IGPs can vary—the example shown is for named mode EIGRP. router eigrp LAN ! address-family ipv4 unicast vrf VRF-GLOBAL autonomous-system 100 topology base redistribute bgp [external AS number] metric 1000000 1 255 1 9100 routemap RM-BGP-TO-EIGRP exit-af-topology network [external IP network address] [netmask] eigrp router-id [loopback IP address] exit-address-family Procedure 6 Configure MTU on unmanaged intermediate devices Optional It is an advantage to have DNA Center manage all devices in a fabric domain. DNA Center already manages fabric edge nodes and border nodes; however, if you have intermediate devices within the fabric that will not be managed by DNA Center (example: hardware or software support isn’t available in DNA Center), then the devices must still meet the requirements for transporting SD-Access traffic through those transit fabric intermediate nodes. The primary requirements are that they: • Are Layer 3 devices that must be actively participating in routing within the other fabric underlay domain devices. • Must be able to transport the jumbo frames that are offered by the fabric encapsulation techniques. For unmanaged fabric intermediate node devices, you must set an appropriate MTU (example: 9100) and manually configure routing with the other devices in the underlay. Configuration guidance for this situation is device-specific and not discussed further in this guide. Do not add a configuration to any devices that you intend to discover and configure using LAN Automation as part of a later procedure. Devices with existing configurations cannot be configured using PnP onboarding. Cisco Validated Design page 45 Deployment details Procedure 7 Discover and manage network devices You discover and manage devices in a network to be used as the underlay for an SD-Access network when DNA Center has IP connectivity to the devices and has the CLI and SNMP credentials required to manage the devices. These steps show how to initiate discovery by supplying an IP address range or multiple ranges to use to scan for network devices, which constrains the discovery and potentially saves time. Alternatively, you can supply an initial device for discovery and direct DNA Center to use Cisco Discovery Protocol to find connected neighbors. Step 1: Navigate to the main DNA Center dashboard, and at the bottom, under the Tools section, click Discovery and fill out a Discovery Name. Click Range, and enter a start and end IP loopback address for IP Ranges (to cover a single address, enter that address for both the start and end of the range). For Preferred Management IP, click + (plus sign), and then select Use Loopback. Step 2: If you have any additional ranges, in the IP Ranges section, enter the additional range, and then click + (plus sign). Verify the credentials to be used for the discovery, and then click Start. The discovery details are displayed and the discovery begins. A progress bar shows the status. During the discovery you can click the device count icon at the top of the page to see devices as they are discovered. Cisco Validated Design page 46 Deployment details Step 3: If there are any discovery failures, inspect the devices list, resolve the problem, and restart the discovery for those devices. Step 4: After the discovery process finishes successfully, navigate to the main DNA Center dashboard, and then, under the Tools section, click Inventory. The discovered devices are displayed. After inventory collection completes, the devices show a status of Managed. DNA Center can now access the devices, synchronize the inventory, and make configuration changes on the devices. Procedure 8 Configure underlay switches using LAN Automation Optional Use this procedure if you are deploying LAN switches without existing configurations into the underlay by using DNA Center’s LAN Automation capabilities. The device CLI and SNMP credentials to be pushed by Cisco Network Plug and Play (PnP), the network-reachable IP address pool used for connectivity, and the seed devices (typically border switches) have been configured as part of previous procedures. Each seed device is expected to have an appropriate VTP mode and MTU configuration (examples: vtp mode transparent, system mtu 9100). Ports connected to devices to be discovered must be in layer-2 mode, and cannot be dedicated out-of-band (OOB) management ports on a switch. Tech tip LAN Automation enables discovery of supported switches from supported seed devices (validated switches are listed in the appendix). Discovered switches are directly connected to chosen seed device interfaces (OOB management ports are not supported) and up to one additional hop of connected switches away. The credentials supplied allow DNA Center and seed devices to work together to configure the discovered devices and add them into managed inventory. Because all of the discovered devices must be running the PnP agent with no previous configuration, any previously configured switch to be used must be restored to a state where the PnP agent is running, accomplished by using the following commands: crypto key zeroize no crypto pki cert pool delete /force vlan.dat delete /force nvram:*.cer delete /force nvram:pnp* delete /force flash:pnp* Cisco Validated Design page 47 Deployment details delete /force stby-nvram:*.cer delete /force stby-nvram:*.pnp* !previous two lines only for HA systemswrite erase reload Do not save the configurations for the reload process. Step 1: Verify that the seed devices are in the inventory and managed by DNA Center. Step 2: Navigate to PROVISION > Devices > Inventory. At the top right, click LAN Automation, and fill in all of the parameters for the supported seed device. Select the interfaces connected to the devices to be discovered, and then click Start. Step 3: Click LAN Auto Status to view progress. Do not click Stop until all devices show a state of Completed. Prematurely stopping the PnP process will leave the discovery in a state needing manual intervention for recovery. Discovering devices an additional hop away from the seed can take significantly more time to reach completion. Tech tip The IP pool used for LAN Automation should be sized significantly larger than the number of devices to be discovered. The pool is divided in half, with one half used for VLAN 1 DHCP services provided by the seed devices. The second half of the pool is divided in half again, leaving a quarter of the total address space for point-to-point link addressing, and a quarter for loopback addressing. Endpoints should not be plugged into the switches, as they can exhaust the IP pool DHCP uses for PnP provisioning. Addresses in all pools need to be reachable by DNA Center to successfully complete provisioning. Step 4: After the devices discovered all reach Completed state, click Stop. LAN Automation tears down all Layer 2 connectivity on VLAN 1 and the underlay IS-IS routing process is used for reachability to the routed network, and devices can be managed just like other devices in the inventory. Procedure 9 Manage software images for devices in inventory To achieve the full capabilities of SD-Access, the SD-Access package in DNA Center has minimum software version requirements for the devices that it provisions. The software image management capability built into DNA Center is used to upgrade any devices that are not running a recommended image version. You can find recommended images by searching cisco.com for SD-Access Hardware and Software Compatibility Matrix. The images used for validation are listed in Appendix A: Product List. Use the following steps to apply software updates of images and software maintenance updates (SMUs) to the devices, by importing the required images, marking images as golden, and applying images to devices. Cisco Validated Design page 48 Deployment details Step 1: Navigate to the main DNA Center dashboard, click Design, click Image Repository, click + Import Image/SMU, choose a file location, and then click Import. The image import into DNA Center starts. Repeat this step for all images that you wish to deploy using DNA Center. Images to be used for device families not yet available in DNA Center will be listed under the Unassigned category. You can verify an import is in the image repository ready to deploy by clicking Show Tasks until the image import task is listed as green with a checkmark next to it. Step 2: After the image is successfully imported, use the Refresh button to update available device families that have the imported image available, under the Image Name column click the down arrow next to the image listed for a device family, and then click the star for Golden Image to mark the appropriate image as the preferred one for the platform. Repeat the importing and tagging images as golden until all devices are marked for an appropriate image. Procedure 10 Use software image management to update device software DNA Center runs a compliance check of devices in inventory compared to images marked golden. Devices out of compliance with the golden image are marked as Outdated in inventory. Update the images to the version marked golden. Inventory collection must have completed successfully and the devices must be in the Managed state before continuing. When you update device software, the software image copy and upgrade happen in a single step. Cisco Validated Design page 49 Deployment details Step 1: Navigate to PROVISION > Devices > Inventory, select all devices marked Outdated, select Actions, and then select Update OS Image. Step 2: Inspect the list of devices to be updated. If any devices do not have the appropriate resources for an upgrade, they are flagged. Fix any problems before continuing. Figure 3. Example device with insufficient flash memory available for update Step 3: Select all devices to update, use the default selection of Run Now, click Apply, and then at the popup warning about devices being rebooted click OK. Images are distributed to the selected devices, and then the devices reboot to activate the new images immediately after the image distribution is complete. Step 4: In Inventory, click Refresh to see overall upgrade status and click Upgrade Status to see the details for each task. Cisco Validated Design page 50 Deployment details Process Provisioning the SD-Access underlay network 1. Provision devices and assign to sites to prepare for SD-Access After devices have management connectivity with DNA Center and are running the appropriate software versions for SD-Access, use DNA Center to provision the devices with their roles as part of an SDAccess network. Procedure 1 Provision devices and assign to sites to prepare for SD-Access Provision the devices and assign devices to a site for integration into an SD-Access network. ISE is updated to support the provisioning. Tech tip When devices are provisioned, the devices receive a number of configurations appropriate for the assigned site, including the centralized AAA server configuration, which is preferred over local login credentials. To maintain the ability to manage the devices after provisioning, the credentials you use for provisioning must be available from the centralized AAA server, either directly or as the means to an external identity source such as Active Directory. Step 1: Log in to ISE, navigate to Administration > Identity Management > Identities, click +Add, enter the Name (matching what was used for DNA Center discovery), enter the associated Login Password and Re-Enter Password, and then at the bottom of the screen click Submit. The network administrative user login is now available from ISE, in addition to the same user ID stored on each device. Cisco Validated Design page 51 Deployment details Step 2: In DNA Center, navigate to PROVISION > Devices > Inventory, select the devices to provision into an SD-Access network, click Actions, and then click Provision. A Provision Devices wizard screen appears. Tech tip Devices must be of the same type (example: all switches) in order to provision them at the same time. You can group provisioning operations in multiple small batches for common site assignments as needed. Step 3: Within the first wizard screen, select the site assignments for the devices, and then at the bottom of the screen click Next. Cisco Validated Design page 52 Deployment details Step 4: Use Next to skip the Configuration and Advanced Configuration screens, in the Summary screen review the details for each device, and then click Deploy. Step 5: At pop-up screen, leave the default selection of Now, and click Apply. Configuration of each device begins, and status messages appear as each device is provisioned successfully. The Device Inventory screen updates with Provision Status and Sync Status. As a result of the DNA Center pxGrid integration with ISE, the network devices also appear in ISE. Step 6: Verify the ISE integration function by logging into ISE and navigating to Administration > Network Resources > Network Devices. The provisioned devices appear. Cisco Validated Design page 53 Deployment details Process Provisioning an SD-Access overlay network 1. Create a fabric domain and add provisioned network devices 2. Enable eBGP connectivity for VN at neighbor (fusion) to border router 3. Assign wired clients to VN and enable connectivity 4. Enable fabric edge ports for client onboarding 5. Enable multicast for fabric Create a fabric overlay network using the provisioned SD-Access underlay network devices. Procedure 1 Create a fabric domain and add provisioned network devices A fabric domain called Default LAN Fabric is automatically created by DNA Center, containing provisioned devices ready to be assigned to a fabric. Create a new campus fabric domain and assign the appropriate devices to it. Campus fabric domains are used in the SD-Access 1.1 solution, enabling client endpoints to connect to wired and wireless LAN networks. Step 1: Using DNA Center, navigate to PROVISION > Fabric, click + Add, leave the default Campus selection, supply a fabric name (example: RTP6_C9K), and then click Add. The new campus fabric domain is created. Tech tip All devices appear across all fabric domains. The fabric is defined within a domain by assigning fabric functionality to devices and requires at least one instance of each of the fabric functions: edge node, border node, and control plane. The roles may be combined (example: control plane and border node) as permitted by the SD-Access solution being deployed. Cisco Validated Design page 54 Deployment details Step 2: Click the icon for the fabric domain you just created (example: RTP6_C9K). The fabric Select Devices wizard starts. Step 3: If the topology diagram shown does not mimic the two-tier (distribution/access) or three-tier (core/ distribution/access) topology that is deployed, correct the topology by clicking each device, on the pop-up menu select Device Role, inspect its network role, and then either change the role and click Save, or if the role is correct select Cancel. When the device roles are complete an appropriate topology is displayed. The topology can be reoriented by clicking the green arrow button. Step 4: Hold the shift key and click all of the nodes that are fabric edge nodes, and then in the pop-up box, click Add to Fabric. Step 5: If you have a node for the fabric dedicated to the role of being a control plane node without border functionality, click it, and then in the pop-up box, click Add as CP (control plane). Repeat this step for a redundant dedicated control plane node without border functionality. Tech tip If the border nodes are Cisco Nexus® 7700 Series Switches using the software listed in Appendix A: Product List, you use dedicated control plane nodes and connect them directly to the Nexus 7700 Series border nodes. Additionally, enable the MPLS license and configure MPLS LDP on the physical links to the control plane nodes to support the control plane connectivity. Cisco Validated Design page 55 Deployment details Step 6: Click a device to perform the fabric border role, in the pop-up box click either Add as Border or Add as CP+Border (if skipping the previous step), fill in the additional dialog for the type of border (example: Outside World (External)), supply the BGP Local AS Number (example: 65514), under Border Handoff > Layer 3 use the Select IP Pool dropdown to select the Global pool configured previously in the guide for border connectivity functionality, and then next to External Interface click + Add Interface. Tech tip If the border is the only path to exit to the rest of the network, you should choose an external border. In cases where you have a combined control plane and border node functionality and the node uses internal border functionality, additional control plane filtering may be necessary when using the validated releases shown in Appendix A: Product List. Step 7: Select the interface for the connection to the fusion router outside of the fabric, fill in the BGP Remote AS Number for the device outside of the fabric (example: 65500), select Virtual Network and all VNs to include in the Layer 3 handoff outside the fabric, click Save, and then click Add. If you have an additional fabric border node, repeat the previous two steps for it. Tech tip To configure a VRF-Lite handoff interface from the border to the rest of the network requires an 802.1Q-tagged interface. If you are managing the border using in-band connectivity over the redundant links to be converted, you first make the connection over a tagged interface, as described in the processes to setup management to a border device for network discovery. When using the version of SD-Access validated in this guide, provisioning is unsuccessful if the interface already includes a non-tagged configuration. Cisco Validated Design page 56 Deployment details Step 8: After all required roles are assigned to the nodes in the fabric, at the bottom click Save, use the default choice Now, and then click Apply. Your campus fabric domain is created. Procedure 2 Enable eBGP connectivity for VN at neighbor (fusion) to border router The SD-Access application in DNA Center configures the fabric border node BGP handoff to external networks. In the SD-Access version validated, you manually configure the external network peers of the border devices with the compatible VRF-Lite and BGP peering information. For AP and other infrastructure onboarding, you use the routing information from the BGP peer for the DEFAULT_VN, highlighted in the example below. Example subset of border node configuration pushed by DNA Center SD-Access application vrf definition DEFAULT_VN rd 1:4098 ! address-family ipv4 route-target export 1:4098 route-target import 1:4098 exit-address-family ! vrf definition Workers rd 1:4099 ! address-family ipv4 route-target export 1:4099 route-target import 1:4099 exit-address-family Cisco Validated Design page 57 Deployment details ! interface Vlan3001 description vrf interface to External router ip address 172.16.172.1 255.255.255.252 no ip redirects ip route-cache same-interface ! interface Vlan3002 description vrf interface to External router vrf forwarding Workers ip address 172.16.172.5 255.255.255.252 no ip redirects ip route-cache same-interface ! interface Vlan3003 description vrf interface to External router vrf forwarding DEFAULT_VN ip address 172.16.172.9 255.255.255.252 no ip redirects ip route-cache same-interface ! router bgp 65514 bgp router-id interface Loopback0 bgp log-neighbor-changes neighbor 10.4.2.65 remote-as 65500 neighbor 10.4.14.4 remote-as 65514 neighbor 10.4.14.4 update-source Loopback0 neighbor 172.16.172.2 remote-as 65500 neighbor 172.16.172.2 update-source Vlan3001 Cisco Validated Design page 58 Deployment details ! address-family ipv4 network 10.4.14.3 mask 255.255.255.255 aggregate-address 10.4.14.0 255.255.255.0 summary-only redistribute isis level-2 redistribute lisp metric 10 neighbor 10.4.2.65 activate neighbor 10.4.14.4 activate neighbor 172.16.172.2 activate neighbor 172.16.172.2 weight 65535 exit-address-family ! address-family ipv4 vrf DEFAULT_VN redistribute lisp metric 10 neighbor 172.16.172.10 remote-as 65500 neighbor 172.16.172.10 update-source Vlan3003 neighbor 172.16.172.10 activate neighbor 172.16.172.10 weight 65535 exit-address-family ! address-family ipv4 vrf Workers redistribute lisp metric 10 neighbor 172.16.172.6 remote-as 65500 neighbor 172.16.172.6 update-source Vlan3002 neighbor 172.16.172.6 activate neighbor 172.16.172.6 weight 65535 exit-address-family ! The deployed configuration includes VRF, VLAN, and BGP elements similar to the ones shown in the above configuration example; however, the VLANs deployed will likely be different. Cisco Validated Design page 59 Deployment details Step 9: Login to border devices and use the CLI to observe the automated configurations created by the SD-Access DNA Center application for IP connectivity outside of the border. Some of the following commands may be helpful. show running-config brief show running-config | section vrf definition show running-config | section interface Vlan show running-config | section router bgp Tech tip There are other important additions to the configuration, which are handled completely by the automation. If you are interested in observing additional LISP fabric control plane changes, use the following command: show running-config | section LISP|lisp|site Step 10: Login to the fusion devices external to the fabric that are connected to the border, using the border configuration as a guide, configure VRFs as required by virtual networks created on the border. VRFs separate communication between groups of interfaces and virtual network contexts within the fabric. vrf definition [VRF name] rd [Route Distinguisher] address-family ipv4 route-target export [Route Target] route-target import [Route Target] exit-address-family Repeat this step for each virtual network context, consistent with the border node configuration. Step 11: Configure each interface to the neighbor. Some devices support VLAN subinterface configuration directly on trunks, and other devices require VLAN interfaces to be created and associated with a trunk. Repeat the neighbor interface configuration for each neighbor on each peer to the border. interface [Peer interface] Step 12: Configure BGP IPv4 unicast routing towards the fusion router to support connectivity for each VRF associated with each VN in the fabric. router bgp [Local BGP AS] bgp router-id interface Loopback0 bgp log-neighbor-changes neighbor [Border IP Address] remote-as [Fabric BGP AS] !repeat for any additional neighbors Cisco Validated Design page 60 Deployment details ! address-family ipv4 network [Loopback IP Address] mask 255.255.255.255 neighbor [Border 1 IP Address] activate neighbor [Border 2 IP Address] activate maximum-paths 2 exit-address-family Procedure 3 Assign wired clients to VN and enable connectivity Step 1: From the DNA Center dashboard, navigate to PROVISION > Fabric > Host Onboarding, under Select Authentication template select Closed Authentication, at the top of the section click Save, and then click Apply. Step 2: Under Virtual Networks, select a VN to be used for wired clients (example: Workers), in the Edit Virtual Network:Workers slide-out pane, select the names of IP Pools to add to the VN (example: 14-Employee), select Traffic Type of Data, change Layer 2 Extension to Off, and then click Update. Layer 2 extension is only supported with wireless in SD-Access solution 1.1. Cisco Validated Design page 61 Deployment details Step 3: At the Modify Authentication Template slideout, keep the default Run Now selection, and then click Apply. Procedure 4 Enable fabric edge ports for client onboarding Repeat this procedure for each fabric edge switch where clients are connecting. Step 1: Navigate to PROVISION > Fabric > Host Onboarding. Under Select Port Assignment in the left column, select a switch. Step 2: At the top of the list of switch ports on the right, select the Address Pool(VN) (example: 10_101_114_0-Workers). Optionally select an appropriate group from Groups (example: Employees), optionally select a Voice Pool(VN) to use for IP telephones, and then select the Authentication (example: Closed Authentication). Tech tip The group assignment is used to statically assign a group if the fabric edge port does not receive its assignment dynamically using an authentication server, which is useful for some types of devices used in an organization. If “No Authentication” is selected as an authentication method, DNA Center pushes the global default authentication template chosen in the “Select Authentication template” section at the top of the screen. DNA Center pushes a port configuration when “Closed Authentication” is configured. Cisco Validated Design page 62 Deployment details Step 3: Within the list of switch ports, select every wired fabric edge port to participate in the fabric VN, click Save, and then click Apply. Devices can now connect at the fabric edge ports using the wired network overlay and authentication method created. Example port configuration pushed by DNA Center using closed authentication interface GigabitEthernet1/0/23 switchport access vlan 1032 switchport mode access switchport voice vlan 1030 load-interval 30 authentication control-direction in authentication event server dead action authorize vlan 3999 authentication event server dead action authorize voice authentication host-mode multi-auth authentication order dot1x mab authentication priority dot1x mab authentication port-control auto authentication periodic authentication timer reauthenticate server authentication timer inactivity server dynamic mab no macro auto processing dot1x pae authenticator dot1x timeout tx-period 10 spanning-tree portfast Cisco Validated Design page 63 Deployment details Procedure 5 Enable multicast for fabric Optional Use this procedure to configure multicast support in the fabric overlay. SD-Access fabrics can support Any Source Multicast (ASM) and Source Specific Multicast (SSM). Sources can be within the fabric or outside of the fabric, and Rendezvous Point configuration is available only at the fabric border nodes. PIM messages are unicast between the border nodes and the fabric edges, and multicast packets are replicated at the head end fabric border devices toward the fabric edge nodes. Step 1: Add a global pool in DNA Center that is dedicated for unicast IP interfaces used to enable multicast for each VN where multicast is enabled. Navigate to DESIGN > Network Settings > IP Address Pools. In the site hierarchy on the left, select Global. Click + Add IP Pool, and fill in the IP Pool Name, IP Subnet, CIDR Prefix, and Gateway IP address. Assign DHCP Server(s) and DNS Server(s). Do not select Overlapping. When you are done, click Save. Step 2: Using DNA Center, navigate to PROVISION > Fabric, and click the icon for the fabric domain. The fabric Select Devices wizard starts. Step 3: Right-click on a fabric border node and select Enable Rendezvous Point. Within the Associate Multicast Pools to VNs popup window at the right, under Associate Virtual Networks, choose the VN. Under Select IP Pools, choose the pool created for multicast, and click the plus sign to add the pool to the list. Click Next, and then click Enable. Step 4: Repeat the previous step for any additional fabric border nodes. At the bottom of the screen, click Save, and then click Apply. DNA Center pushes the multicast configurations to the fabric nodes and creates the loopbacks and Multicast Source Discovery Protocol (MSDP) peering for the rendezvous point (RP) state communication between the border nodes. Step 5: If multicast communication is required outside of the border toward the fusion router, enable the following commands on each device. Global: ip multicast-routing ip pim rp address [RP Address] ip pim register-source Loopback0 ip pim ssm default Interface or subinterface (for each virtual network): ip pim sparse-mode Cisco Validated Design page 64 Deployment details Process Integrating wireless into SD-Access 1. Add the wireless controllers into inventory and create an HA SSO pair 2. Create IP pools for access points 3. Design fabric enterprise wireless SSIDs 4. Design a fabric guest wireless SSID 5. Provision the WLC for SD-Access Wireless fabric integration 6. Enable onboarding of access points into the wireless fabric 7. Assign wireless clients to VN and enable connectivity The process to install SD-Access wireless LAN controllers is completed as part of previous procedures and the controllers are available to integrate into the fabric using DNA Center. Procedure 1 Add the wireless controllers into inventory and create an HA SSO pair If the wireless LAN controllers are not in the DNA Center inventory, you must add them before the wireless integration, and create an HA SSO pair. Step 1: Navigate to the main DNA Center dashboard, under the Tools section click Discovery, fill out a Discovery Name, click Range, in both the start and end IP loopback address for IP Ranges enter the IP address of the WLC (example: 10.4.174.26), click + (plus sign) to include the range, add a range for the second WLC (example: 10.4.174.27) , click + (plus sign) to include the additional range, leave the default Preferred Management IP of None, if you have unique credentials for the device click + Add Credentials add each new credential (examples: public/private SNMP communities and admin user) and Save, and then click Start. The inventory discovery starts. When it is complete the device count increments and Complete is displayed. Step 2: Navigate to the main DNA Center dashboard under the Tools section click Inventory, and find the added WLCs. Before proceeding, use the Refresh button to update the Last Inventory Collection Status until it is in Managed status. Cisco Validated Design page 65 Deployment details Step 3: If you are creating an HA SSO pair, go to the main DNA Center dashboard, navigate to PROVISION > Devices > Inventory, select the Device Name of the primary WLC (example: SDA-WLC1), on the right side in the pop-out at the top select High Availability, under Select Secondary WLC select the second WLC in the HA SSO pair (example: SDA-WLC-2), supply Redundancy Management IP and Peer Redundancy Management IP (examples: 10.4.174.126, 10.4.174.127), and then click Configure HA. Warning messages display. Configuring HA for Primary. Please do not Refresh the page.. Configuring HA for Secondary... Proceed to the next step after the HA configuration is complete. Step 4: Go to the main DNA Center dashboard, navigate to DESIGN > Image Repository. If the WLC image is the correct version, then mark the image golden. If the image needs to be updated, then at the top, click Import Image/SMU, follow the instructions to import, refresh the screen, use the dropdown for the device to mark the image golden. In the validated version, an external SFTP server is required for upgrading WLC devices directly from the DNA Center Image Repository. For expediency, the next step shows an easy alternative to upgrade without an available SFTP server. Step 5: Use a web browser to view the WLC main page (example: https://10.4.174.26), navigate to COMMANDS > Download File, select File Type, Transfer Mode, and File Name (example: Code, HTTP, AIRCT5520-K9-8-5-131-0.aes), click DOWNLOAD, and then click OK. A progress status notification appears. Follow the instructions displayed to complete the upgrade. Cisco Validated Design page 66 Deployment details Procedure 2 Create IP pools for access points Verify that a global pool in DNA Center is available for address assignment for the APs to be managed by the network. Step 1: Navigate to DESIGN > Network Settings > IP Address Pools. In the site hierarchy on the left, select Global, and inspect the list of IP address Pools for a pool dedicated to the AP infrastructure (example: Access-Point). Step 2: If a pool for the APs does not exist, click + Add IP Pool, fill in the IP Pool Name, IP Subnet, CIDR Prefix, and Gateway IP address (examples: Access-Point, 172.16.173.0, /24, 172.16.173.1), select the DHCP Server and DNS Server, and then click Save. Procedure 3 Design fabric enterprise wireless SSIDs Step 1: From the main DNA Center dashboard, navigate to DESIGN > Network Settings> Wireless, in the Enterprise Wireless section click + Add, in the Create an Enterprise Wireless Network wizard, and supply the following information: • Enter the Wireless Network Name(SSID) (example: Employee) • Under TYPE OF ENTERPRISE NETWORK, select Voice and Data and Fast Lane • For LEVEL OF SECURITY select WPA2 Enterprise • Under ADVANCED SECURITY OPTIONS select Adaptive Step 2: Click Next to continue in the wizard, and supply the following information: • Enter a Wireless Profile Name (example: RTP5-Wireless) • Under Fabric, select Yes • Under Choose a site, select the location where the SSID will broadcast (example: Global/RTP/RTP5-C9K), and include floors to include in SSID coverage (example: Global/RTP/RTP5-C9K/Main Floor) Step 3: Click Finish to continue. The DESIGN > Network Settings> Wireless screen is displayed. Repeat this procedure for additional SSIDs using the same network profile and any new location profiles to be associated with an SSID. Procedure 4 Design a fabric guest wireless SSID Step 1: Navigate to DESIGN > Network Settings> Wireless, in the Guest Wireless section click + Add, in the Create a Guest Wireless Network wizard, and supply the following information: • Enter the Wireless Network Name(SSID) (example: Guest) • Under LEVEL OF SECURITY select Web Auth • Under AUTHENTICATION SERVER select ISE Authentication Leave the other default selections and click Next to continue in the wizard. Cisco Validated Design page 67 Deployment details Step 2: In the Wireless Profiles section, select the Profile Name corresponding to the deployment location (example: RTP5-Wireless), in the slide-out panel keep the default Fabric selection of Yes, keep the other default information, at the bottom of the panel click Save, and then click Next. Step 3: In the Portals screen, click + Add. The Portal Builder screen appears. Step 4: Supply a Guest Portal name (example:Guest-RTP5), make any desired customizations, and then at the bottom of the screen click Save. A guest web authentication portal is generated for the site, and you return to the previous screen. Step 5: Click Finish. The wireless LAN design is created and is ready to deploy. Procedure 5 Provision the WLC for SD-Access Wireless fabric integration After completing the SD-Access Wireless design, push the configuration from the design to the WLC. Step 1: Navigate to PROVISION > Devices, find the WLC and select the checkbox next to it, and then at the top of the screen under the Actions pull-down, select Provision. The Provision Devices wizard opens. Step 2: Assign the site (example: Global/RTP/RTP5-C9K), click Next, at the Configuration screen under Managed AP Location select the additional floor assignments for APs managed by the WLC (example: Global/ RTP/RTP5-C9K/Main Floor), click Next, and then at the Advanced Configuration screen click Next. Step 3: At the Summary screen review the configurations, click Deploy, at the slide-out panel keep the default selection Run Now, and then click Apply. The WLC is assigned to the site and the provisioning starts. Use the Refresh button until Provision Status shows Success before proceeding. Cisco Validated Design page 68 Deployment details Step 4: Navigate to PROVISION > Fabric, click the fabric domain where the WLC is to be added (example: RTP6_C9K), click the WLC, in the popup box select Add to Fabric, click Save, in the slide-out menu keep the default selection Run Now, and then click Apply. The WLC configurations are created to establish a secure connection to the fabric control plane. You can verify that WLC controller pair is integrated into the fabric from the WLC management console by navigating to CONTROLLER > Fabric Configuration > Control Plane, which shows the fabric integration is enabled with the connection status up. Cisco Validated Design page 69 Deployment details Procedure 6 Enable onboarding of access points into the wireless fabric The APs are hosts that join the fabric and are assigned into a VN named INFRA_VN. This special VN for infrastructure devices such as APs, enables management communication between the APs at the fabric edge nodes using the fabric control plane and the WLC sitting outside of the fabric as a part of global routing connectivity. Step 1: Connect APs to be used for the fabric directly to an edge node within the fabric. Step 2: Navigate to PROVISION > Fabric, select the fabric, and then click Host Onboarding. Step 3: Under Select Authentication template, select No Authentication, click Save, in the slide-out panel keep the default selection Run Now and then click Apply. The authentication template is applied to the fabric, and automatic onboarding of APs is enabled. Tech tip DNA Center enables automatic onboarding of APs by provisioning a CDP macro at the fabric edge switches when the authentication template to be set to No Authentication. Alternatively, you use the switch port configurations in DNA Center to assign a port to the IP address pool for the APs. Step 4: Under Virtual Networks, select INFRA_VN, click the check box next to the IP Pool Name for the APs (example: Access-Point), click Update, in the slide-out panel keep the default selection Run Now, and then click Apply. After the update is complete, the edge node switch ports connected to the APs are enabled with a device tracking configuration recognizing APs and permitting the APs to get network connectivity. Tech tip A default route in the underlay cannot be used by the APs to reach the WLC. A more specific route (such as a /24 subnet or /32 host route) to the WLC IP addresses must exist in the global routing table at each node where the APs connect to establish connectivity. Redistribute the WLC route at the border into the underlay IGP routing process for efficiency. Alternatively, you can create static entries at each edge node supporting APs. Cisco Validated Design page 70 Deployment details Step 5: Navigate to the main DNA Center dashboard, under Tools select Inventory, select the WLC being added, and then at the top in the Actions pulldown, select Resync. The APs associated with the WLC are immediately added to the inventory without waiting for an inventory refresh. Step 6: Navigate to the main DNA Center dashboard, PROVISION > Devices > Inventory, select the APs being added, at the top in the Actions pulldown menu, select Provision, assign the APs to a floor (example: Global/ RTP/RTP5-C9K/Main Floor), click Next, for RF Profile select TYPICAL, click Next, at the Summary page click Deploy, and then in the slide-out panel, click Apply and acknowledge any warnings about reboots. Procedure 7 Assign wireless clients to VN and enable connectivity Step 1: Navigate to PROVISION > Fabric > Host Onboarding, select a VN to be used for clients (example: Guest), in the Edit Virtual Network:Guest slide-out pane, select the names of IP Pools to add to the VN (example: 14-Guest), select Traffic Type of Data, verify Layer-2 Extension is On, and then click Update. Tech tip Selecting Layer-2 Extension enables the SD-Access LISP control plane to learn MAC addresses, which is required for wireless clients. Step 2: Under the Modify Authentication Template slideout, keep the default Run Now selection, and then click Apply. Step 3: In the Wireless SSID’s section, for each SSID Name, under Address Pool, select the appropriate IP Address Pool, click Save, and then click Apply. Devices can now connect via the wireless networks. Cisco Validated Design page 71 Appendix A: Product list Appendix A: Product list The following products and software versions were included as part of validation in this deployment guide. Additional hardware options are listed in the associated Software-Defined Access Design Guide, and updated DNA Center package files are regularly released and available within the packages and updates listings. DNA Center Functional area Product Part number Software version Network Automation Cisco DNA Center Appliance DN1-HW-APL 1.1.8 (System Update 1.0.4.855) DNA Center packages All packages running on the DNA Center during validation are listed—not all packages are included as part of the testing for SD-Access validation. Package Version Assurance - Base 1.1.8.1205 Assurance - Path Trace 2.1.12.60016 Assurance – Sensor 1.1.5.40 Automation – Application Policy 2.1.10.170000 Automation – Base 2.1.12.60016 Automation – Device Onboarding 2.1.12.60016 Automation – Image Management 2.1.12.60011 Automation – SD-Access 2.1.12.60016 Automation – Sensor 2.1.9.60029 Command Runner 2.1.9.60029 NCP – Base 2.1.9.60029 NCP – Services 2.1.12.60011 Network Controller Platform 2.1.12.60011 Network Data Platform – Base Analytics 1.0.7.906 Network Data Platform – Core 1.0.7.862 Network Data Platform – Manager 1.0.7.969 Cisco Validated Design page 72 Appendix A: Product list Identity management Functional area Product Software version Cisco ISE Server Cisco Identity Services Engine 2.3 Patch 4 SD-Access fabric border and control plane Functional area Product Software version Border and control plane Cisco Catalyst 9500 Series Switches 16.6.4 Border and control plane–small site Cisco Catalyst 3850XSswitches (10-Gbpsfiber) 16.6.4 Border and control plane Cisco 4000 Series Integrated Services Routers 16.6.3 Border and control plane–large scale Cisco ASR 1000-X and 1000-HX Series Aggregation Services Routers 16.6.3 Border (wired-only control plane option) Cisco Catalyst 68077-slot chassis with Supervisor Engine 6T or Supervisor Engine 2T and 6800 32- port 10GE with dual integrated DFC4 15.5(1)SY1 Border (wired-only control plane option) Cisco Catalyst 6880-X and 6840-X switches 15.5(1)SY1 Border Cisco Nexus 7700 switches 2-slot chassis with Supervisor2 Enhanced module and Cisco Nexus 7700 M3-Series 48-port 1/10 Gigabit Ethernet module 8.2(1) + SMU Control plane Cisco Cloud Services Router 1000V Series 16.6.3 SD-Access fabric edge Functional area Product Software version Fabric edge Cisco Catalyst 9300 Series–stackable 16.6.4 Fabric edge Cisco Catalyst 9400 Series with Supervisor Engine-1 –modular chassis 16.6.4 Cisco Validated Design page 73 Appendix A: Product list Functional area Product Software version Fabric edge Cisco Catalyst 3850 Series–stackable 16.6.4 Fabric edge Cisco Catalyst 3650 Series – standalone with optional stacking 16.6.4 Fabric edge Cisco Catalyst 4500E Series with Supervisor 8-E– modular chassis 3.10.1E SD-Access Wireless Functional area Product Software version Wireless LAN controller Cisco 8540, 5520, and 3504 Series Wireless Controllers 8.5.131.0 (8.5 MR3) Fabric mode access points Cisco Aironet® 1800, 2800, and 3800 Series (Wave 2) 8.5.131.0 (8.5 MR3) LAN Automation switches—Cisco Validated Design verified (not inclusive of all possibilities) Product PnP roles tested (discovered devices directly attached to seeds) Cisco Catalyst 9500 Series (standard performance versions) Seed device Cisco Catalyst 3850XSswitches(10Gbpsfiber) Seed device Cisco Catalyst 9300 Series–stackable Seed device Discovered device Cisco Catalyst 9400 Series with Supervisor Engine-1 –modular chassis Seed device Discovered device Cisco Catalyst 3850 Series–stackable Discovered device Cisco Catalyst 3650 Series – standalone with optional stacking Discovered device Cisco Catalyst 4500E Series with Supervisor 8-E– modular chassis Discovered device Cisco Validated Design page 74 Glossary Glossary AAA authentication, authorization, and accounting ACL access control list AD Active Directory AP access point ARP address resolution protocol BGP border gateway protocol BPDU bridge protocol data unit CAPWAP control and provisioning of wireless access points protocol CLI command-line interface DHCP dynamic host configuration protocol DMVPN dynamic multipoint virtual private network DNS domain name system ECMP equal-cost multipath FHRP first-hop redundancy protocols GLBP gateway load-balancing protocol GRE generic routing encapsulation GUI graphical user interface HSRP hot standby router protocol IGMP Internet Group Management Protocol IoT Internet of Things IS-IS intermediate system to intermediate system routing protocol IGP interior gateway protocol ISE Cisco Identity Services Engine LISP locator/ID separation protocol MnT Monitoring and Troubleshooting Node MPLS multiprotocol label switching MSDP multicast source discovery protocol MTU maximum transmission unit PAN Policy Administration Node PSN Policy Service Node RP rendezvous point SD-Access Software-Defined Access Cisco Validated Design page 75 Glossary SGACL scalable group access control list SGT scalable group tag or security group tag SVI switched virtual interface SXP scalable group tag exchange protocol VLAN virtual local area network VN virtual network VRF virtual routing and forwarding Americas Headquarters Cisco Systems, Inc. San Jose, CA Asia Pacific Headquarters Cisco Systems (USA) Pte. Ltd. Singapore Europe Headquarters Cisco Systems International BV Amsterdam, The Netherlands Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices. ALL DESIGNS, SPECIFICATIONS, STATEMENTS, INFORMATION, AND RECOMMENDATIONS (COLLECTIVELY, “DESIGNS”) IN THIS MANUAL ARE PRESENTED “AS IS,” WITH ALL FAULTS. CISCO AND ITS SUPPLIERS DISCLAIM ALL WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THE DESIGNS, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THE DESIGNS ARE SUBJECT TO CHANGE WITHOUT NOTICE. USERS ARE SOLELY RESPONSIBLE FOR THEIR APPLICATION OF THE DESIGNS. THE DESIGNS DO NOT CONSTITUTE THE TECHNICAL OR OTHER PROFESSIONAL ADVICE OF CISCO, ITS SUPPLIERS OR PARTNERS. USERS SHOULD CONSULT THEIR OWN TECHNICAL ADVISORS BEFORE IMPLEMENTING THE DESIGNS. RESULTS MAY VARY DEPENDING ON FACTORS NOT TESTED BY CISCO. Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. © 2018 Cisco Systems, Inc. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) Cisco Validated Design C07-741188-00 08/18 Please use the feedback form to send comments and suggestions about this guide.  2014 Microchip Technology Inc. DS20005323A-page 1 HV9910C Features • Switch mode controller for single switch LED drivers • Enhanced drop-in replacement to the HV9910B • Open loop peak current controller • Internal 15 to 450V linear regulator • Constant frequency or constant off-time operation • Linear and PWM dimming capability • Requires few external components for operation • Over-temperature protection Applications • DC/DC or AC/DC LED driver applications • RGB back-lighting LED driver • Back lighting of flat panel displays • General purpose constant current source • Signage and decorative LED lighting • Chargers Description HV9910C is an open-loop, current-mode control, LED driver IC. This IC can be programmed to operate in either a constant frequency or constant off-time mode. It includes a 15 – 450V linear regulator which allows it to work with a wide range of input voltages without the need for an external low voltage supply. HV9910C includes a TTL-compatible, PWM-dimming input that can accept an external control signal with a duty ratio of 0 – 100% and a frequency of up to a few kilohertz. It also includes a 0 – 250mV linear-dimming input which can be used for linear dimming of the LED current. Unlike the HV9910B, the HV9910C is equipped with built-in thermal-shutdown protection. HV9910C is ideally suited for buck LED drivers. Since the HV9910C operates in open-loop current mode control, the controller achieves good output current regulation without the need for any loop compensation. Also, being an open-loop controller, PWM-dimming response is limited only by the rate of rise of the inductor current, enabling a very fast rise and fall times of the LED current. HV9910C requires only three external components (apart from the power stage) to produce a controlled LED current. This makes HV9910C an ideal solution for low-cost LED drivers. Universal High-Brightness LED Driver HV9910C DS20005323A-page 2  2014 Microchip Technology Inc. TO OUR VALUED CUSTOMERS It is our intention to provide our valued customers with the best documentation possible to ensure successful use of your Microchip products. To this end, we will continue to improve our publications to better suit your needs. Our publications will be refined and enhanced as new volumes and updates are introduced. If you have any questions or comments regarding this publication, please contact the Marketing Communications Department via E-mail at docerrors@microchip.com. We welcome your feedback. Most Current Data Sheet To obtain the most up-to-date version of this data sheet, please register at our Worldwide Web site at: http://www.microchip.com You can determine the version of a data sheet by examining its literature number found on the bottom outside corner of any page. The last character of the literature number is the version number, (e.g., DS30000000A is version A of document DS30000000). Errata An errata sheet, describing minor operational differences from the data sheet and recommended workarounds, may exist for current devices. As device/documentation issues become known to us, we will publish an errata sheet. The errata will specify the revision of silicon and revision of document to which it applies. To determine if an errata sheet exists for a particular device, please check with one of the following: • Microchip’s Worldwide Web site; http://www.microchip.com • Your local Microchip sales office (see last page) When contacting a sales office, please specify which device, revision of silicon and data sheet (include literature number) you are using. Customer Notification System Register on our web site at www.microchip.com to receive the most current information on all of our products.  2014 Microchip Technology Inc. DS20005323A-page 3 HV9910C Pin Diagram Typical Application Circuit 8-Lead SOIC 16-Lead SOIC 1 2 3 4 5 6 7 8 16 15 14 13 12 11 10 9 8 7 6 5 1 2 3 4 VIN CS GND GATE RT LD VDD PWMD VIN NC NC CS GND NC NC GATE NC NC RT LD VDD NC NC PWMD CDD ROSC RCS L1 Q1 D1 CO CIN HV9910C VIN GATE CS VDD LD PWMD RT GND HV9910C DS20005323A-page 4  2014 Microchip Technology Inc. 1.0 ELECTRICAL CHARACTERISTICS ABSOLUTE MAXIMUM RATINGS VIN to GND......................................................-0.5V to +470V VDD to GND.......................................................................12V CS, LD, PWMD, GATE...........................-0.3V to (VDD + 0.3V) Junction temperature ....................................-40°C to +125°C Storage temperature .....................................-65°C to +150°C Continuous power dissipation (TA = +25°C) 8-lead SOIC ...............................................650 mW 16-lead SOIC ...........................................1300 mW 8-lead SOIC with heat slug ......................1300 mW Note: Stresses above those listed under “Absolute Maximum Ratings” may cause permanent damage to the device. This is a stress rating only and functional operation of the device at those or any other conditions, above those indicated in the operational listings of this specification, is not implied. Exposure to maximum rating conditions for extended periods may affect device reliability. 1.1 ELECTRICAL SPECIFICATIONS TABLE 1-1: ELECTRICAL CHARACTERISTICS (SHEET 1 OF 2)1 Symbol Parameter Note Min Typ Max Units Conditions Input VINDC Input DC supply voltage range2 3 15 - 450 V DC input voltage IIN(MAX) Supply current - - 0.8 1.5 mA Pin PWMD to VDD, no capacitance at GATE IINSD Shut-down mode supply current - - 0.5 1.0 mA Pin PWMD to GND Internal Regulator VDD Internally regulated voltage - 7.25 7.50 7.75 V VIN = 15V, IDD(ext) = 0, PWMD = VDD, 500pF at GATE; ROSC = 249kΩ ∆VDD, line Line regulation of VDD - 0 - 1.0 V VIN = 15 - 450V, IDD(ext) = 0, PWMD = VDD, 500pF at GATE; ROSC = 249kΩ ∆VDD, load Load regulation of VDD - 0 - 0.1 V IDD(ext) = 0 - 1.0mA, PWMD = VDD, 500pF at GATE; ROSC = 249kΩ UVLO VDD under voltage lockout threshold 3 6.45 6.70 6.95 V VDD rising ∆UVLO VDD under voltage lockout hysteresis - - 500 - mV VDD falling IIN(MAX) Maximum regulator current 4 5.0 - - mA VDD = UVLO - ∆UVLO PWM Dimming VEN(lo) PWMD input low voltage 3 - - 1.0 V VIN = 15 - 450V VEN(hi) PWMD input high voltage 3 2.4 - - V VIN = 15 - 450V REN Internal pull-down resistance at PWMD - 50 100 150 kΩ VPWMD = 5.0V  2014 Microchip Technology Inc. DS20005323A-page 5 HV9910C Current Sense Comparator VCS Current sense pull-in threshold voltage - 225 250 275 mV -40°C < TA < +125°C VOFFSET Offset voltage for LD comparator 3 -12 - +12 mV TBLANK Current sense blanking interval - 150 215 280 ns 0 < TA < +85°C, VLD = VDD, VCS = VCS,TH + 50mV after TBLANK - 145 215 315 -40 < TA < +125°C, VLD = VDD, VCS = VCS,TH + 50mV after TBLANK tDELAY Delay to output - - 80 150 ns VIN = 15V, VLD = 0.15, VCS = 0 to 0.22V after tBLANK Oscillator fOSC Oscillator frequency - 20 25 30 kHz ROSC = 1.00MΩ - 80 100 120 ROSC = 249kΩ Gate Driver ISOURCE Maximum GATE sourcing current - 0.165 - - A VGATE = 0V ISINK Maximum GATE sinking current - 0.165 - - A VGATE = VDD tRISE GATE output rise time 4 - 30 50 ns CGATE = 500pF tFALL GATE output fall time 4 - 30 50 ns CGATE = 500pF Over-Temperature Protection TSD Shut-down temperature - 128 - 150 °C ∆TSD Hysteresis - 10 - 30 °C ISD TSD-mode VIN current - - - 350 μA 1 Specifications are TA = 25°C, VIN = 15V unless otherwise noted. 2 Also limited by package-power dissipation limit; Whichever is lower. 3 Applies over the full operating ambient temperature range of -40°C < TA < +125°C. 4 For design guidance only. TABLE 1-1: ELECTRICAL CHARACTERISTICS (CONTINUED) (SHEET 2 OF 2)1 Symbol Parameter Note Min Typ Max Units Conditions TABLE 1-2: THERMAL RESISTANCE Package θja 8-Lead SOIC 101°C/W 16-Lead SOIC 83°C/W 8-Lead SOIC (with heat slug) 84°C/W HV9910C DS20005323A-page 6  2014 Microchip Technology Inc. 2.0 PIN DESCRIPTION The descriptions of the pins are listed in Table 2-1. TABLE 2-1: PIN DESCRIPTION Pin # Function Description 8-Lead SOIC 16-Lead SOIC 1 1 VIN Input of an 15 - 450V linear regulator. 2 4 CS Current sense pin used to sense the FET current by means of an external sense resistor. When this pin exceeds the lower of either the internal 250mV or the voltage at the LD pin, the GATE output goes low. 3 5 GND Ground return for all internal circuitry. Must be electrically connected to the power ground. 4 8 GATE Output GATE driver for an external N-channel power MOSFET. 5 9 PWMD TTL-compatible, PWM-dimming input of the IC. When this pin is pulled to GND or left open, the GATE driver is turned off. When the pin is pulled high, the GATE driver operates normally. 6 12 VDD Power supply pin for all internal circuits. It must be bypassed with a low ESR capacitor to GND (≥0.1μF). 7 13 LD Linear-dimming input and sets the current sense threshold as long as the voltage at the pin is less than 250mV (typ). 8 14 RT Sets the oscillator frequency. When a resistor is connected between RT and GND, the HV9910C operates in constant frequency mode. When the resistor is connected between RT and GATE, the IC operates in constant off-time mode. - 2, 3, 6, 7, 10, 11, 15, 16 NC No connection  2014 Microchip Technology Inc. DS20005323A-page 7 HV9910C 3.0 APPLICATION INFORMATION HV9910C is optimized to drive buck LED drivers using open-loop, peak-current mode control. This method of control enables fairly accurate LED current control without the need for high side current sensing or the design of any closed loop controllers. The IC uses very few external components and enables both Linear and PWM-dimming of the LED current. A resistor connected to the RT pin programs the frequency of operation (or the off-time). The oscillator produces pulses at regular intervals. These pulses set the SR flip-flop in the HV9910C which causes the GATE driver to turn on. The same pulses also start the blanking timer, which inhibits the reset input of the SR flip flop and prevents false turn-offs due to the turn-on spike. When the FET turns on, the current through the inductor starts ramping up. This current flows through the external sense resistor, RCS, and produces a ramp voltage at the CS pin. The comparators are constantly comparing the CS pin voltage to both the voltage at the LD pin and the internal 250mV. Once the blanking timer is complete, the output of these comparators is allowed to reset the flip-flop. When the output of either one of the two comparators goes high, the flip-flop is reset and the GATE output goes low. The GATE goes low until the SR flip-flop is set by the oscillator. Assuming a 30% ripple in the inductor, the current sense resistor RCS can be set using: Constant frequency peak current mode control has an inherent disadvantage – at duty cycles greater than 0.5, the control scheme goes into subharmonic oscillations. To prevent this, an artificial slope is typically added to the current sense waveform. This slope compensation scheme will affect the accuracy of the LED current in the present form. However, a constant offtime peak current control scheme does not have this problem and can easily operate at duty cycles greater than 0.5. This control scheme also gives inherent input voltage rejection, making the LED current almost insensitive to input voltage variations. However, this scheme leads to variable frequency operation and the frequency range depends greatly on the input and output voltage variation. Using HV9910C, it is easy to switch between the two modes of operation by changing one connection (see Section 3.3 “Oscillator”). 3.1 Input Voltage Regulator HV9910C can be powered directly from its VIN pin and can work from 15 - 450VDC at its VIN pin. When a voltage is applied at the VIN pin, HV9910C maintains a constant 7.5V at the VDD pin. This voltage is used to power the IC and any external-resistor dividers needed to control the IC. The VDD pin must be bypassed by a low-ESR capacitor to provide a low impedance path for the high frequency current of the output GATE driver. HV9910C can also be operated by supplying a voltage at the VDD pin greater than the internally regulated voltage. This will turn off the internal linear regulator of the IC and the HV9910C will operate directly off the voltage supplied at the VDD pin. This external voltage at the VDD pin should not exceed 12V. Although the VIN pin of the HV9910C is rated up to 450V, the actual maximum voltage that can be applied is limited by the power dissipation in the IC. For example, if an 8-lead SOIC HV9910C (junction to ambient thermal resistance Rθj-a = 101°C/W) draws about IIN = 2.0mA from the VIN pin, and has a maximum allowable temperature rise of the junction temperature limited to ∆T = 75°C, the maximum voltage at the VIN pin would be: In these cases, to operate HV9910C from higher input voltages, a Zener diode can be added in series with the VIN pin to divert some of the power loss from HV9910C to the Zener diode. In the above example, using a 100V Zener diode will allow the circuit to easily work up to 450V. The input current drawn from the VIN pin is a sum of the 1.5mA (maximum) current drawn by the internal circuit and the current drawn by the GATE driver. The GATE driver depends on the switching frequency and the GATE charge of the external FET. In the above equation, fs is the switching frequency and Qg is the GATE charge of the external FET, which can be obtained from the data sheet of the FET. 3.2 Current Sense The current sense input of HV9910C goes to the noninverting inputs of two comparators. The inverting terminal of one comparator is tied to an internal 250mV reference, whereas the inverting terminal of the other comparator is connected to the LD pin. The outputs of both these comparators are fed into an OR GATE and RCS 0.25V orV   LD 1.15 I  LED = ------------------------------------ Note: The Zener diode will increase the minimum input voltage required to turn on the HV9910C to 115V. VIN MAX   T Rja ---------- 1 IIN  ----- 75C 101C W -------------------------- 1 2mA  ------------ = 371V = = IIN 1.5mA Qg fs +=  HV9910C DS20005323A-page 8  2014 Microchip Technology Inc. the output of the OR GATE is fed into the reset pin of the flip-flop. Thus, the comparator which has the lowest voltage at the inverting terminal determines when the GATE output is turned off. The outputs of the comparators also include a 150- 280ns blanking time which prevents spurious turn-offs of the external FET due to the turn-on spike normally present in peak-current mode control. In rare cases, this internal blanking might not be enough to filter out the turn-on spike. In these instances, an external RC filter needs to be added between the external sense resistor (RCS) and the CS pin. Please note that the comparators are fast (with a typical 80ns response time). A proper layout minimizing external inductances will prevent false triggering of these comparators. 3.3 Oscillator The oscillator in HV9910C is controlled by a single resistor connected at the RT pin. The equation governing the oscillator time period Tosc is given by: If the resistor is connected between RT and GND, HV9910C operates in a constant frequency mode and the above equation determines the time period. If the resistor is connected between RT and GATE, HV9910C operates in a constant off-time mode and the above equation determines the off-time. 3.4 Gate Output The gate output of the HV9910C is used to drive an external FET. It is recommended that the GATE charge of the external FET be less than 25nC for switching frequencies ≤ 100kHz and less than 15nC for switching frequencies > 100kHz. 3.5 Linear Dimming The Linear Dimming pin is used to control the LED current. There are two cases when it may be necessary to use the Linear Dimming pin. 1. In some cases, when using the internal 250mV, it may not be possible to find the exact RCS value required to obtain the LED current. In these cases, an external voltage divider from the VDD pin can be connected to the LD pin to obtain a voltage (less than 250mV) corresponding to the desired voltage across RCS. 2. Linear dimming may be desired to adjust the current level to reduce the intensity of the LEDs. In these cases, an external 0-250mV voltage can be connected to the LD pin to adjust the LED current during operation. To use the internal 250mV, the LD pin can be connected to VDD. 3.6 PWM Dimming PWM Dimming can be achieved by driving the PWMD pin with a low frequency square wave signal. When the PWM signal is zero, the GATE driver is turned off; when the PWMD signal if high, the GATE driver is enabled. The PWMD signal does not turn off the other parts of the IC, therefore, the response of HV9910C to the PWMD signal is almost instantaneous. The rate of rise and fall of the LED current is thus determined solely by the rise and fall times of the inductor current. To disable PWM Dimming and enable the HV9910C permanently, connect the PWMD pin to VDD. 3.7 Over-Temperature Protection The auto-recoverable thermal shutdown at 140°C (typ.) junction temperature with 20°C hysteresis is featured to avoid thermal runaway. When the junction temperature reaches TSD = 140°C (typ.), HV9910C enters a low power consumption shut-down mode with IIN <350µA. TOSC  s ROSC  k 25 = -------------------------- Note: Although the LD pin can be pulled to GND, the output current will not go to zero. This is due to the presence of a minimum ontime, which is equal to the sum of the blanking time and the delay to output time, or about 450ns. This minimum on-time causes the FET to be on for a minimum of 450ns, and thus the LED current when LD = GND is not zero. This current is also dependent on the input voltage, inductance value, forward voltage of the LEDs, and circuit parasitics. To get zero LED current, the PWMD pin has to be used.  2014 Microchip Technology Inc. DS20005323A-page 9 HV9910C FIGURE 3-1: INTERNAL BLOCK DIAGRAM POR 250mV VDD GATE VIN LD CS GND RT PWMD S Blanking R Q + - + - + - 1.25V Bandgap Reference OTP Oscillator HV9910C DS20005323A-page 10  2014 Microchip Technology Inc. 4.0 PACKAGING INFORMATION 4.1 Package Marking Information 8-Lead SOIC 16-Lead SOIC X = Product Code YY = Year Sealed WW = Week Sealed NNN = Traceability Code e# = JEDEC Symbol ● = Pin 1 Indicator Note: The JEDEC environmental marking symbols (e#) illustrated are examples only, and might not reflect the actual value for the listed package code.  2014 Microchip Technology Inc. DS20005323A-page 11 HV9910C FIGURE 4-1: 8-LEAD SOIC (NARROW BODY) PACKAGE OUTLINE (LG) Notes: 1. This chamfer feature is optional. A Pin 1 identifier must be located in the index area indicated. The Pin 1 identifier can be: a molded mark/identifier; an embedded metal marker; or a printed indicator. 1 8 Seating Plane Gauge Plane L L1 L2 EE1 D e b A A2 A1 Seating Plane A A Top View Side View View B View B θ1 θ Note 1 (Index Area D/2 x E1/2) View A-A h h Note 1 Symbol A A1 A2 b D E E1 e h L L1 L2 θ θ1 Dimension (mm) MIN 1.35* 0.10 1.25 0.31 4.80* 5.80* 3.80* 1.27 BSC 0.25 0.40 1.04 REF 0.25 BSC 0° 5° NOM - - - - 4.90 6.00 3.90 - - - - MAX 1.75 0.25 1.65* 0.51 5.00* 6.20* 4.00* 0.50 1.27 8° 15° JEDEC Registration MS-012, Variation AA, Issue E, Sep 2005. * This dimension is not specified in the JEDEC drawing. † This dimension differs from the JEDEC drawing. Drawings not to scale. HV9910C DS20005323A-page 12  2014 Microchip Technology Inc. FIGURE 4-2: 16-LEAD SOIC (NARROW BODY) PACKAGE OUTLINE (NG) Notes: 1. This chamfer feature is optional. A Pin 1 identifier must be located in the index area indicated. The Pin 1 identifier can be: a molded mark/identifier; an embedded metal marker; or a printed indicator. Top View Side View View A-A View B A A Seating Plane 16 1 Seating Plane Gauge Plane L L1 L2 θ1 θ View B h h b A A2 A1 e E1 E D Note 1 (Index Area D/2 x E1/2) Symbol A A1 A2 b D E E1 e h L L1 L2 θ θ1 Dimension (mm) MIN 1.35* 0.10 1.25 0.31 9.80* 5.80* 3.80* 1.27 BSC 0.25 0.40 1.04 REF 0.25 BSC 0° 5° NOM - - - - 9.90 6.00 3.90 - - - - MAX 1.75 0.25 1.65* 0.51 10.00* 6.20* 4.00* 0.50 1.27 8° 15° JEDEC Registration MS-012, Variation AC, Issue E, Sep 2005. * This dimension is not specified in the JEDEC drawing. † This dimension differs from the JEDEC drawing. Drawings not to scale.  2014 Microchip Technology Inc. DS20005323A-page 13 HV9910C FIGURE 4-3: 8-LEAD SOIC (NARROW BODY) PACKAGE OUTLINE (SG) Notes: 1. This chamfer feature is optional. A Pin 1 identifier must be located in the index area indicated. The Pin 1 identifier can be: a molded mark/identifier; an embedded metal marker; or a printed indicator. 1 8 EE1 D e b A A2 A1 Seating Plane A A Top View Side View View B Note 1 (Index Area D/2 x E1/2) View A-A 8 1 Bottom View D1 E2 Exposed Thermal Pad Zone Seating Plane Gauge Plane L L1 L2 View B θ1 θ h h Note 1 Symbol A A1 A2 b D D1 E E1 E2 e h L L1 L2 θ θ1 Dimension (mm) MIN 1.25* 0.00 1.25 0.31 4.80* 3.30† 5.80* 3.80* 2.29† 1.27 BSC 0.25 0.40 1.04 REF 0.25 BSC 0° 5° NOM - - - - 4.90 - 6.00 3.90 - - - - - MAX 1.70 0.15 1.55* 0.51 5.00* 3.81† 6.20* 4.00* 2.79† 0.50 1.27 8° 15° JEDEC Registration MS-012, Variation BA, Issue E, Sep 2005. * This dimension is not specified in the JEDEC drawing. † This dimension differs from the JEDEC drawing. Drawings not to scale. HV9910C DS20005323A-page 14  2014 Microchip Technology Inc. APPENDIX A: REVISION HISTORY Revision A (August 2014) • Original Release of this Document.  2014 Microchip Technology Inc. DS20005323A-page 15 HV9910C THE MICROCHIP WEB SITE Microchip provides online support via our WWW site at www.microchip.com. This web site is used as a means to make files and information easily available to customers. Accessible by using your favorite Internet browser, the web site contains the following information: • Product Support – Data sheets and errata, application notes and sample programs, design resources, user’s guides and hardware support documents, latest software releases and archived software • General Technical Support – Frequently Asked Questions (FAQ), technical support requests, online discussion groups, Microchip consultant program member listing • Business of Microchip – Product selector and ordering guides, latest Microchip press releases, listing of seminars and events, listings of Microchip sales offices, distributors and factory representatives CUSTOMER CHANGE NOTIFICATION SERVICE Microchip’s customer notification service helps keep customers current on Microchip products. Subscribers will receive e-mail notification whenever there are changes, updates, revisions or errata related to a specified product family or development tool of interest. To register, access the Microchip web site at www.microchip.com. Under “Support”, click on “Customer Change Notification” and follow the registration instructions. CUSTOMER SUPPORT Users of Microchip products can receive assistance through several channels: • Distributor or Representative • Local Sales Office • Field Application Engineer (FAE) • Technical Support Customers should contact their distributor, representative or Field Application Engineer (FAE) for support. Local sales offices are also available to help customers. A listing of sales offices and locations is included in the back of this document. Technical support is available through the web site at: http://microchip.com/support HV9910C DS20005323A-page 16  2014 Microchip Technology Inc. PRODUCT IDENTIFICATION SYSTEM To order or obtain information, e.g., on pricing or delivery, refer to the factory or the listed sales office. Device: HV9910C= Universal High-Brightness LED Driver Package: LG = 8-lead SOIC NG = 16-lead SOIC SG = 8-lead SOIC with head slug Environmental G = Lead (Pb)-free/ROHS-compliant package Reel: (nothing) = Reel for LG and SG packages, Tube for NG package M934 = Reel for NG package Examples: a) HV9910CLG-G: 8-lead SOIC package, 2500/Reel. b) HV9910CNG-G 16-lead SOIC package, 45/Tube c) HV9910CNG-G-M934: 16-lead SOIC package, 2500/Reel. d) HV9910CSG-G: 8-lead SOIC package with heat slug, 2500/Reel. PART NO. X Device X Environmental XX Package Options Reel - -  2014 Microchip Technology Inc. DS20005323A-page 17 Information contained in this publication regarding device applications and the like is provided only for your convenience and may be superseded by updates. It is your responsibility to ensure that your application meets with your specifications. MICROCHIP MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WHETHER EXPRESS OR IMPLIED, WRITTEN OR ORAL, STATUTORY OR OTHERWISE, RELATED TO THE INFORMATION, INCLUDING BUT NOT LIMITED TO ITS CONDITION, QUALITY, PERFORMANCE, MERCHANTABILITY OR FITNESS FOR PURPOSE. Microchip disclaims all liability arising from this information and its use. Use of Microchip devices in life support and/or safety applications is entirely at the buyer’s risk, and the buyer agrees to defend, indemnify and hold harmless Microchip from any and all damages, claims, suits, or expenses resulting from such use. No licenses are conveyed, implicitly or otherwise, under any Microchip intellectual property rights. Trademarks The Microchip name and logo, the Microchip logo, dsPIC, FlashFlex, KEELOQ, KEELOQ logo, MPLAB, PIC, PICmicro, PICSTART, PIC32 logo, rfPIC, SST, SST Logo, SuperFlash and UNI/O are registered trademarks of Microchip Technology Incorporated in the U.S.A. and other countries. FilterLab, Hampshire, HI-TECH C, Linear Active Thermistor, MTP, SEEVAL and The Embedded Control Solutions Company are registered trademarks of Microchip Technology Incorporated in the U.S.A. Silicon Storage Technology is a registered trademark of Microchip Technology Inc. in other countries. Analog-for-the-Digital Age, Application Maestro, BodyCom, chipKIT, chipKIT logo, CodeGuard, dsPICDEM, dsPICDEM.net, dsPICworks, dsSPEAK, ECAN, ECONOMONITOR, FanSense, HI-TIDE, In-Circuit Serial Programming, ICSP, Mindi, MiWi, MPASM, MPF, MPLAB Certified logo, MPLIB, MPLINK, mTouch, Omniscient Code Generation, PICC, PICC-18, PICDEM, PICDEM.net, PICkit, PICtail, REAL ICE, rfLAB, Select Mode, SQI, Serial Quad I/O, Total Endurance, TSHARC, UniWinDriver, WiperLock, ZENA and Z-Scale are trademarks of Microchip Technology Incorporated in the U.S.A. and other countries. SQTP is a service mark of Microchip Technology Incorporated in the U.S.A. GestIC and ULPP are registered trademarks of Microchip Technology Germany II GmbH & Co. KG, a subsidiary of Microchip Technology Inc., in other countries. All other trademarks mentioned herein are property of their respective companies. © 2014, Microchip Technology Incorporated, Printed in the U.S.A., All Rights Reserved. Printed on recycled paper. ISBN: 978-1-63276-529-1 Note the following details of the code protection feature on Microchip devices: • Microchip products meet the specification contained in their particular Microchip Data Sheet. • Microchip believes that its family of products is one of the most secure families of its kind on the market today, when used in the intended manner and under normal conditions. • There are dishonest and possibly illegal methods used to breach the code protection feature. All of these methods, to our knowledge, require using the Microchip products in a manner outside the operating specifications contained in Microchip’s Data Sheets. Most likely, the person doing so is engaged in theft of intellectual property. • Microchip is willing to work with the customer who is concerned about the integrity of their code. • Neither Microchip nor any other semiconductor manufacturer can guarantee the security of their code. Code protection does not mean that we are guaranteeing the product as “unbreakable.” Code protection is constantly evolving. We at Microchip are committed to continuously improving the code protection features of our products. Attempts to break Microchip’s code protection feature may be a violation of the Digital Millennium Copyright Act. If such acts allow unauthorized access to your software or other copyrighted work, you may have a right to sue for relief under that Act. Microchip received ISO/TS-16949:2009 certification for its worldwide headquarters, design and wafer fabrication facilities in Chandler and Tempe, Arizona; Gresham, Oregon and design centers in California and India. The Company’s quality system processes and procedures are for its PIC® MCUs and dsPIC® DSCs, KEELOQ® code hopping devices, Serial EEPROMs, microperipherals, nonvolatile memory and analog products. In addition, Microchip’s quality system for the design and manufacture of development systems is ISO 9001:2000 certified. QUALITY MANAGEMENT SYSTEM CERTIFIED BY DNV == ISO/TS 16949 == DS20005323A-page 18  2014 Microchip Technology Inc. AMERICAS Corporate Office 2355 West Chandler Blvd. Chandler, AZ 85224-6199 Tel: 480-792-7200 Fax: 480-792-7277 Technical Support: http://www.microchip.com/ support Web Address: www.microchip.com Atlanta Duluth, GA Tel: 678-957-9614 Fax: 678-957-1455 Austin, TX Tel: 512-257-3370 Boston Westborough, MA Tel: 774-760-0087 Fax: 774-760-0088 Chicago Itasca, IL Tel: 630-285-0071 Fax: 630-285-0075 Cleveland Independence, OH Tel: 216-447-0464 Fax: 216-447-0643 Dallas Addison, TX Tel: 972-818-7423 Fax: 972-818-2924 Detroit Novi, MI Tel: 248-848-4000 Houston, TX Tel: 281-894-5983 Indianapolis Noblesville, IN Tel: 317-773-8323 Fax: 317-773-5453 Los Angeles Mission Viejo, CA Tel: 949-462-9523 Fax: 949-462-9608 New York, NY Tel: 631-435-6000 San Jose, CA Tel: 408-735-9110 Canada - Toronto Tel: 905-673-0699 Fax: 905-673-6509 ASIA/PACIFIC Asia Pacific Office Suites 3707-14, 37th Floor Tower 6, The Gateway Harbour City, Kowloon Hong Kong Tel: 852-2943-5100 Fax: 852-2401-3431 Australia - Sydney Tel: 61-2-9868-6733 Fax: 61-2-9868-6755 China - Beijing Tel: 86-10-8569-7000 Fax: 86-10-8528-2104 China - Chengdu Tel: 86-28-8665-5511 Fax: 86-28-8665-7889 China - Chongqing Tel: 86-23-8980-9588 Fax: 86-23-8980-9500 China - Hangzhou Tel: 86-571-8792-8115 Fax: 86-571-8792-8116 China - Hong Kong SAR Tel: 852-2943-5100 Fax: 852-2401-3431 China - Nanjing Tel: 86-25-8473-2460 Fax: 86-25-8473-2470 China - Qingdao Tel: 86-532-8502-7355 Fax: 86-532-8502-7205 China - Shanghai Tel: 86-21-5407-5533 Fax: 86-21-5407-5066 China - Shenyang Tel: 86-24-2334-2829 Fax: 86-24-2334-2393 China - Shenzhen Tel: 86-755-8864-2200 Fax: 86-755-8203-1760 China - Wuhan Tel: 86-27-5980-5300 Fax: 86-27-5980-5118 China - Xian Tel: 86-29-8833-7252 Fax: 86-29-8833-7256 China - Xiamen Tel: 86-592-2388138 Fax: 86-592-2388130 China - Zhuhai Tel: 86-756-3210040 Fax: 86-756-3210049 ASIA/PACIFIC India - Bangalore Tel: 91-80-3090-4444 Fax: 91-80-3090-4123 India - New Delhi Tel: 91-11-4160-8631 Fax: 91-11-4160-8632 India - Pune Tel: 91-20-3019-1500 Japan - Osaka Tel: 81-6-6152-7160 Fax: 81-6-6152-9310 Japan - Tokyo Tel: 81-3-6880- 3770 Fax: 81-3-6880-3771 Korea - Daegu Tel: 82-53-744-4301 Fax: 82-53-744-4302 Korea - Seoul Tel: 82-2-554-7200 Fax: 82-2-558-5932 or 82-2-558-5934 Malaysia - Kuala Lumpur Tel: 60-3-6201-9857 Fax: 60-3-6201-9859 Malaysia - Penang Tel: 60-4-227-8870 Fax: 60-4-227-4068 Philippines - Manila Tel: 63-2-634-9065 Fax: 63-2-634-9069 Singapore Tel: 65-6334-8870 Fax: 65-6334-8850 Taiwan - Hsin Chu Tel: 886-3-5778-366 Fax: 886-3-5770-955 Taiwan - Kaohsiung Tel: 886-7-213-7830 Taiwan - Taipei Tel: 886-2-2508-8600 Fax: 886-2-2508-0102 Thailand - Bangkok Tel: 66-2-694-1351 Fax: 66-2-694-1350 EUROPE Austria - Wels Tel: 43-7242-2244-39 Fax: 43-7242-2244-393 Denmark - Copenhagen Tel: 45-4450-2828 Fax: 45-4485-2829 France - Paris Tel: 33-1-69-53-63-20 Fax: 33-1-69-30-90-79 Germany - Dusseldorf Tel: 49-2129-3766400 Germany - Munich Tel: 49-89-627-144-0 Fax: 49-89-627-144-44 Germany - Pforzheim Tel: 49-7231-424750 Italy - Milan Tel: 39-0331-742611 Fax: 39-0331-466781 Italy - Venice Tel: 39-049-7625286 Netherlands - Drunen Tel: 31-416-690399 Fax: 31-416-690340 Poland - Warsaw Tel: 48-22-3325737 Spain - Madrid Tel: 34-91-708-08-90 Fax: 34-91-708-08-91 Sweden - Stockholm Tel: 46-8-5090-4654 UK - Wokingham Tel: 44-118-921-5800 Fax: 44-118-921-5820 Worldwide Sales and Service 03/25/14 Americas Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module First Published: June 24, 2013 Last Modified: November 6, 2015 The Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Modules (NIM) are inserted into the NIM slot on the Cisco 4000 Series Integrated Services Router to provide T1, fractional T1, E1, and fractional E1 support for data and voice applications. Note The Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module requires a PVDM4 to be installed for voice support. Table 1 lists the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Modules. Table 1 Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Modules Network Interface Module Description NIM-1CE1T1-PRI 1-port channelized data module. Supports 24/31 channel groups for T1/E1 per port. NIM-2CE1T1-PRI 2-port channelized data module. Supports 24/31 channel groups for T1/E1 per port. NIM-8CE1T1-PRI 8-port channelized data module. Supports 24/31 channel groups for T1/E1 per port. NIM-1MFT-T1/E1 1-port clear channel data and voice T1/E1 module. Supports 2 channel groups per port. NIM-2MFT-T1/E1 2-port clear channel data and voice T1/E1 module. Supports 2 channel groups per port. NIM-4MFT-T1/E1 4-port clear channel data and voice T1/E1 module. Supports 2 channel groups per port. NIM-8MFT-T1/E1 8-port clear channel data and voice T1/E1 module. Supports 2 channel groups per port. 2 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Restrictions Supported Features • Data and voice support on T1/E1 • TCL and IVR application • Support for DSP Media Services on the motherboard • Support for Cisco Unified Border Element • Support for Cisco Survivable Remote Site Telephony Restrictions • When you configure a media address pool for TDM gateways and CUBE, you must configure the media address pool port range in voice service VoIP configuration mode. • The NIM-8T1E1-PRI module is only supported on Cisco IOS XE releases 3.10.3, 3.11.2, and 3.12. Platform and Hardware Support The Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module is supported on the Cisco 4451-X Integrated Services Router and runs on Cisco IOS XE Release 3.9S and later. The Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module supports only the Cisco Packet Voice Digital Signal Processor Module version 4 (PVDM4). Configuring the Cisco Network Interface Module • Configuring the Card Type • Changing the Card Type • Configuring the T1/E1 Network Interface Module for Data • Configuring T1/E1 for Voice • Configuring DSP Resources • Network Synchronization for the Cisco ISR 4000 Series Configuring the Card Type To configure the T1/E1 network interface module for T1 or E1 operation, perform the following task. Note The T1/E1 network interface module will not be operational until a card type is configured. SUMMARY STEPS 1. enable 2. configure terminal 3 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Configuring the Cisco Network Interface Module 3. card type {t1 | e1} slot subslot DETAILED STEPS Changing the Card Type To change a card type from T1 to E1, or from E1 to T1, perform the following task: SUMMARY STEPS 1. enable 2. configure terminal 3. no card type {t1 | e1} slot subslot 4. card type {t1 | e1} slot subslot 5. exit 6. write 7. reload 8. boot Command or Action Purpose Step 1 enable Example: Router> enable Enables privileged EXEC mode. • Enter your password if prompted. Step 2 configure terminal Example: Router# configure terminal Enters global configuration mode. Step 3 card type {t1 | e1} slot subslot Example: Router(config)# card type t1 0 0 Specifies T1 or E1 connectivity for the network interface module. 4 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Configuring the Cisco Network Interface Module DETAILED STEPS Command or Action Purpose Step 1 enable Example: Router> enable Enables privileged EXEC mode. • Enter your password if prompted. Step 2 configure terminal Example: Router# configure terminal Enters global configuration mode. Step 3 no card type {t1 | e1} slot subslot Example: Router(config)# no card type t1 0 2 (Optional) Removes the previous configuration. Step 4 card type {t1 | e1} slot subslot Example: Router(config)# card type e1 0 2 Specifies T1 or E1 connectivity for the network interface module. Step 5 exit Example: Router(config)# exit Exits the card configuration mode and returns to global configuration mode. Step 6 write Example: Router(config)# write Rebuilds the router configuration. Step 7 reload Example: Router(config)# reload Reloads router so that changes can take effect. After this command executes, the router goes into the ROM monitor (rommon) mode. Step 8 boot Example: Router(rommon)# boot Boots the router with the configuration for the newly selected card type. 5 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Configuring the Cisco Network Interface Module Configuring the T1/E1 Network Interface Module for Data To configure a T1 or E1 interface for data support, perform this task: SUMMARY STEPS 1. enable 2. configure terminal 3. controller {t1 | e1} slot/subslot/port 4. framing {sf | esf} or framing {crc4 | no-crc4} 5. linecode {ami | b8zs} or linecode {ami | hdb3} 6. fdl {att | ansi | both} 7. clock source {internal | line [primary | secondary] | network} 8. line-termination {75-ohm | 120-ohm} 9. loopback {diagnostic | local {payload | line} | remote {iboc | esf {payload | line}}} 10. cablelength long db-loss-value or cablelength short length 11. channel group channel-group-number {timeslots range [speed kbps] | unframed} 12. national reserve N sa4 sa5 sa6 sa7 sa8 13. crc-threshold value 14. yellow {generation | detection} 15. bert pattern pattern interval time DETAILED STEPS Command or Action Purpose Step 1 enable Example: Router> enable Enables privileged EXEC mode. • Enter your password if prompted. Step 2 configure terminal Example: Router# configure terminal Enters global configuration mode. 6 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Configuring the Cisco Network Interface Module Step 3 controller {t1 | e1} slot/subslot/port Example: Router(config)# controller t1 0/1/1 Enters controller configuration mode for the network interface module. • Valid values for slot is 0, subslot is 1 to 3, and port is 0 or 1. Step 4 framing {sf | esf} or framing {crc4 | no-crc4} Example: Router(config-controller)# framing esf In T1 configurations, specifies super frame (sf) or extended super frame (esf) as the frame type for data lines. Default is esf. In E1 configurations, specifies cyclic redundancy check 4 (crc4) or no-crc4 as the frame type for data lines. Default is crc4. Step 5 linecode {ami | b8zs} or linecode {ami | hdb3} Example: Router(config-controller)# linecode b8zs In T1 configurations, specifies alternate mark inversion (AMI) or bipolar 8-zero substitution (b8zs) as the linecode. Default is b8zs. In E1 configurations, specifies AMI or high-density bipolar 3 (hdb3) as the linecode. Default is hdb3. Note When using linecode AMI, we recommend that you select 56 kbps as the speed or make sure that the channel groups created do not contain all the timeslots. See Step 11. This is to avoid exceeding the “15 zeroes” threshold specified by standards. Step 6 fdl {att | ansi | both} Example: Router(config-controller)# fdl both T1 only. Sets the facility data link (fdl) exchange standard for T1 interfaces using esf framing. You can select the ATT standard (ATT TR54016), the ANSI standard (ANSI T1.403), or both standards. Default is ansi. To disable fdl, enter the no fdl command. Command or Action Purpose 7 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Configuring the Cisco Network Interface Module Step 7 clock source {internal | line [primary | secondary] | network} Example: Router(config-controller)# clock source network Specifies the clock source. The options are as follows: • internal—Sets the controller framer as the clock master. The clock source internal command is only applicable with the channel-group command and the pri-group (for data) command. Note The pri-group command is supported on the NIM-xCE1T1-PRI for data without the keyword voice-dsp. • line—Specifies the phase-locked loop (PLL) on a port. When both a primary port and a secondary port are configured and the primary port fails, the PLL switches over to the secondary. When the PLL on the primary port becomes active again, the PLL automatically switches to the primary port. • network—Sets the controller to sync to the TDMSW clock for both TDM voice and data support. This configures the far end of the T1/E1 line as the clock line. Default is line. Step 8 line-termination {75-ohm | 120-ohm} Example: Router(config-controller)# line-termination 75-ohm E1 only. Sets the line termination on an E1 controller. • 75-ohm specifies 75-ohm unbalanced termination. • 120-ohm specifies 120-ohm balanced termination. Step 9 loopback {diagnostic | local {payload | line} | remote {iboc | esf {payload | line}}} Example: Router(config-controller)# loopback remote esf line Sets the loopback method for testing the interface. Options are: • diagnostic—Loops the transmit signal back to receive. • local—Puts the interface into local loopback mode at the payload or line level. • remote—Puts the interface into remote loopback mode through an inband bit oriented code (iboc) or, for T1 only, remote esf, which uses fdl codes to set payload or line levels. Command or Action Purpose 8 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Configuring the Cisco Network Interface Module Step 10 cablelength long db-loss-value or cablelength short length Example: Router(config-controller)# cablelength short 110 T1 only.The cablelength long command attenuates the pulse from the transmitter using pulse equalization and line build-out. This command applies to cables longer than 660 feet. Loss values are: • 0db • -7.5db • -15db • -22.5db Default attenuation is 0db. The cablelength short command sets transmission attenuation for cable lengths of 660 feet or less. When you use the cablelength short command, specify the length as follows: • 110 for cable lengths from 0 to 110 feet • 220 for cable lengths from 111 to 220 feet • 330 for cable lengths from 221 to 330 feet • 440 for cable lengths from 331 to 440 feet • 550 for cable lengths from 441 to 550 feet • 660 for cable lengths from 551 to 660 feet There is no default cable length. Step 11 channel group channel-group-number {timeslots range [speed kbps] | unframed} Example: Router(config-controller)# channel group 1 timeslots 1-4 Configures the serial WAN on a T1 or E1 interface by specifying channels and their timeslots. For T1, values are as follows: • channel-group-number is from 0 to 23. • timeslots range is from 1 to 24. • Default value of speed for T1 is 64 kbps. Configuration of speed is optional. For E1, values are as follows: • channel-group-number is from 0 to 30. • timeslots range is from 1 to 31. • Default value of speed for E1 is 64 kbps. Configuration of speed is optional. • unframed (E1 only) specifies that all 31 timeslots are to be used for data and that none are to be used for framing signals. Step 12 national reserve N sa4 sa5 sa6 sa7 sa8 Example: Router(config-controller)# national reserve 0 1 1 1 1 0 E1 only. Sets the six required national bits in E1 in the G.751 frame. Default is 1 1 1 1 1 1. Command or Action Purpose 9 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Configuring the Cisco Network Interface Module Configuring T1/E1 for Voice To configure a T1 or E1 interface for voice support, perform this task: SUMMARY STEPS 1. enable 2. configure terminal 3. voice-card slot 4. codec complexity {flex [reservation-fixed {high | medium}] | high | medium | secure} 5. exit 6. controller {t1 | e1} slot/subslot/port 7. framing {sf | esf} or framing {crc4 | no-crc4} 8. linecode {ami | b8zs} or linecode {ami | hdb3} 9. ds0-group ds0-group-number timeslots timeslot-list type {e&m-delay-dial | e&m-immediate-start | e&m-wink-start | fxo-ground-start | fxo-loop-start | fxs-ground-start | fxs-loop-start | none} 10. clock source {line [primary | secondary] | network} 11. tdm-group tdm-group-no timeslots timeslot-range type [e&m | fxs [loop-start | ground-start] | fxo [loop-start | ground-start]] 12. voice-port {slot-number/subunit-number/port | slot/port:ds0-group-number} Step 13 crc-threshold value Example: Router(config-controller)# crc-threshold 500 T1 only. Defines a severely errored second by specifying the number of CRC errors that must occur in one second to reach the severely errored second state. Default is 320. Step 14 yellow {generation | detection} Example: Router(config-controller)# no yellow detection Enables generation and detection of yellow alarms. Default condition is that generation and detection of yellow alarms are enabled. Use the no form of the command to disable yellow alarm detection. Step 15 bert pattern pattern interval time Example: Router(config-controller)# bert pattern 2^11 interval 1440 (Optional) Activates the BERT with the chosen test pattern for a specified duration. Configure BERT patterns on the T1/E1 network interface modules as follows: • When the linecode is AMI, use patterns 2^11, 2^15, or 2^20-QRSS. • When the linecode is b8zs or hdb3, use patterns 2^11, 2^15, 2^20-QRSS, or 2^20-O.153. • The interval time is from 1 to 14,400 minutes. Command or Action Purpose 10 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Configuring the Cisco Network Interface Module 13. pri-group timeslots timeslot-range [nfas_d | service][voice-dsp] 14. end DETAILED STEPS Command or Action Purpose Step 1 enable Example: Router> enable Enables privileged EXEC mode. • Enter your password if prompted. Step 2 configure terminal Example: Router# configure terminal Enters global configuration mode. Step 3 voice-card slot/subslot Example: Router(config)# voice-card 0/1 Enters voice card interface configuration mode. • Specify the slot location using a value from 0 to 5. 11 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Configuring the Cisco Network Interface Module Step 4 codec complexity {flex [reservation-fixed {high | medium}] | high | medium | secure} Example: Router(config-voicecard)# codec complexity flex Specifies the codec complexity based on the codec standard that you are using. The number of calls that is supported on the router is dependent on the DSP density and the codec complexity. • flex—Provides support for both medium and high-complexity codec. The number of supported calls varies depending on the codec that is used for a call. In this mode, oversubscription of DSPs is possible. If reservations are needed for certain applications such as CAMA E-911 calls, you can enable the reservation-fixed option. There is no reservation by default. • high—Supports G.711, G.726, G.729, G.723.1, G.723.1 Annex A, G.729 Annex B, G.728, and GSMEFR. • medium—Supports G.711, G.726, G.729 Annex A, G.729 Annex B with Annex A, GSMFR, and fax relay. • secure—Specifies secure codec. Note All medium-complexity codecs are supported in high-complexity codecs. The keyword that you specify for the codec complexity command affects the codecs available when you use the codec dial peer voice configuration command. If you select a codec that is not available, an error message appears. • You cannot change codec complexity while DS0 groups are defined. If they are already set up, follow these steps: 1. Shut down the voice port associated with the controller. 2. Enter the voice-card slot command, and then change the codec complexity. Note This procedure to change codec complexity applies only to T1 and E1 controllers. This procedure is not valid for analog voice ports. Step 5 exit Example: Router(config-voicecard)# exit Exits voice card configuration mode and returns to global configuration mode. Step 6 controller {e1 | t1} slot/subslot/port Example: Router(config)# controller t1 0/1/1 Enters controller configuration mode for the network interface module. • Valid values for slot is 0, subslot is 1 to 3, and port is 0 to 7. Command or Action Purpose 12 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Configuring the Cisco Network Interface Module Step 7 framing {sf | esf} or framing {crc4 | no-crc4} Example: Router(config-controller)# framing esf Example: Router(config-controller)# framing crc4 Specifies a frame type. • The frame type for T1 controllers can be specified as sf for superframe or esf for extended superframe. • The frame type for E1 controllers can be specified as crc4 or no-crc4. Step 8 linecode {ami | b8zs} or linecode {ami | hdb3} Example: Router(config-controller)# linecode b8zs Example: Router(config-controller)# linecode hdb3 Specifies a line encoding for a controller. • Line-code value for T1 can be ami or b8zs. • Line-code value for E1 can be ami or hdb3. Command or Action Purpose 13 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Configuring the Cisco Network Interface Module Step 9 ds0-group ds0-group-number timeslots timeslot-list type {e&m-delay-dial | e&m-immediate-start | e&m-wink-start | fxo-ground-start | fxo-loop-start | fxs-ground-start | fxs-loop-start} Example: Router(config-controller)# ds0-group 12 timeslots 1-3 type fxs-loop-start Defines the T1 channels for use by compressed voice calls and the signaling method that the router uses to connect to the PBX or central office. • Set up DS0 groups after you have specified codec complexity in the voice-card configuration. • ds0-group-number—Value from 0 to 23 that identifies the DS0 group. • The ds0-group command automatically creates a logical voice port that is numbered as follows: slot/port:ds0-group-number. Although only one voice port is created, applicable calls are routed to any channel in the group. • The timeslot-list argument is a single number, numbers separated by commas, or a pair of numbers separated by a hyphen to indicate a range of time slots. • The signaling method selection for the type keyword depends on the connection that you are making: – The E&M interface allows connection for PBX trunk lines (tie lines) and telephone equipment. – The Foreign Exchange Station (FXS) interface allows connection of basic telephone equipment and PBX. – The Foreign Exchange Office (FXO) interface is for connecting the CO to a standard PBX interface where permitted by local regulations; it is often used for off-premises extensions (OPXs). Step 10 clock source {line [primary | secondary] | network} Example: Router(config-controller)# clock source network Specifies the clock source. For voice, you can select either line or network. If internal clocking is required on the network interface module, configure clock source network. • line—Specifies the phase-locked loop (PLL) on a port. When both a primary port and a secondary port are configured and the primary port fails, the PLL switches over to the secondary. When the PLL on the primary port becomes active again, the PLL automatically switches to the primary port. • network—Sets the controller to sync to the TDMSW clock for both TDM voice and data support. This configures the far end of the T1/E1 line as the clock line. Command or Action Purpose 14 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Configuring the Cisco Network Interface Module Step 11 tdm-group tdm-group-no timeslots timeslot-list type [e&m | fxs [loop-start | ground-start] | fxo [loop-start | ground-start]] Example: Router(config-controller)# tdm-group 20 timeslots 20 type fxs ground-start (Optional) Defines TDM channel groups for the drop-and-insert (also called TDM Cross-Connect) function for a multiflex trunk interface card. The tdm-group-no argument identifies the TDM group and is a value from 0 to 23 for T1 and from 0 to 30 for E1. The timeslot-range argument indicates a range of time slots and is a single number, numbers separated by commas, or a pair of numbers separated by a hyphen. The valid range is from 1 to 24 for T1 and from 1 to 31 for E1. The signaling method selection for the type keyword depends on the connection that you are making. The fxs and fxo options allow you to specify a ground-start or loop-start line. Note The group numbers for controller groups must be unique. For example, a TDM group should not have the same ID number as a DS0 group or channel group. Step 12 voice-port {slot-number/subunit-number/port | slot/port:ds0-group-number} Example: Router(config-controller)# voice-port 3/0:0 Enters voice port configuration mode and specifies the voice port. • The slot-number argument identifies the slot where the NIM is installed. Valid entries are from 0 to 3. • The subunit-number argument identifies the subunit on the NIM where the voice port is located. Valid entries are 0 or 1. • The port argument identifies the voice port number. Valid entries are 0 and 1. or • The slot argument is the slot in which the voice port adapter is installed. Valid entries are from 0 to 3. • The port argument is the voice interface card location. Valid entries are 0 to 3. • The ds0-group-number argument indicates the defined DS0 group number. Each defined DS0 group number is represented on a separate voice port. This allows you to define individual DS0s on the digital T1/E1 card. Command or Action Purpose 15 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Configuring the Cisco Network Interface Module Step 13 pri-group timeslots timeslot-range [nfas_d | service][voice-dsp] Example: Router(config-controller)# pri-group timeslots 1-5 Specifies that the controller should be set up as ISDN PRI interface. • For T1, – timeslots range from 1 to 24 – 23rd channel is the D channel • For E1, – timeslots range from 1 to 31 – 15th channel is the D channel Note Current “Service” is only for voice mgcp. So, when “Service” is selected, there is no “voice-dsp” required or needed. Note NIM-xCE1T1-PRI—The option keyword voice-dsp is only available to the NIM-xCE1T1-PRI (x could be 1, 2, or 8) on the ISR 4000 series. Default is without the keyword voice-dsp. The pri-group command on NIM-xCE1T1-PRI can be used for both data and voice. When you use the pri-group command for data, then the voice-dsp keyword is not required. When you use the pri-group command for voice, then the voice-dsp keyword is required. Note NIM-xMFT-T1/E1—Since the pri-group command on the NIM-xMFT-T1/E1 is only used for voice, the keyword voice-dsp is not needed. • If a controller is configured as PRI, individual channel groups cannot be configured on that controller. • The controller command must be entered before this command can be used. Step 14 end Example: Router(config-voiceport)# end Returns to privileged EXEC mode. Command or Action Purpose 16 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Configuring the Cisco Network Interface Module Configuration Examples T1/E1 for Voice The following example shows the running configuration of the router with the Fourth-Generation T1/E1 NIM installed and configured for voice support. Router#sh run Building configuration... Current configuration : 3978 bytes ! ! Last configuration change at 17:12:33 UTC Wed Dec 3 2014 ! version 15.5 service timestamps debug datetime msec service timestamps log datetime msec service internal no platform punt-keepalive disable-kernel-core ! hostname Router ! boot-start-marker boot-end-marker ! aqm-register-fnf ! card type t1 0 2 card type t1 0 3 logging buffered 10000000 ! no aaa new-model ! ! no ip domain lookup ! ! ipv6 rip vrf-mode enable ipv6 multicast rpf use-bgp ! ! subscriber templating multilink bundle-name authenticated ! ! isdn switch-type primary-5ess ! ! voice service voip address-hiding allow-connections h323 to h323 allow-connections h323 to sip allow-connections sip to h323 allow-connections sip to sip fax protocol t38 version 0 ls-redundancy 0 hs-redundancy 0 fallback none sip bind control source-interface GigabitEthernet0/0/0 asymmetric payload full ! ! application service dsapp param callWaiting TRUE param callConference TRUE 17 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Configuring the Cisco Network Interface Module param callTransfer TRUE ! global service default dsapp ! ! voice-card 0/1 no watchdog ! voice-card 0/2 dsp services dspfarm no watchdog ! voice-card 0/3 dsp services dspfarm no watchdog ! voice-card 0/4 no watchdog ! license udi pid ISR4451-X/K9 sn FOC16474UZF license accept end user agreement license boot level appxk9 license boot level uck9 spanning-tree extend system-id ! ! redundancy mode none ! controller T1 0/2/0 framing esf linecode b8zs cablelength long 0db pri-group timeslots 1-24 voice-dsp ! controller T1 0/3/0 shutdown framing esf linecode b8zs cablelength long 0db ds0-group 1 timeslots 1-4 type e&m-immediate-start ! controller T1 0/3/1 framing esf linecode b8zs cablelength long 0db channel-group 1 timeslots 1-24 ! ! vlan internal allocation policy ascending ! ip tftp source-interface GigabitEthernet0/0/0 ! ! interface GigabitEthernet0/0/0 ip address 1.4.33.45 255.255.0.0 negotiation auto no cdp enable ! interface GigabitEthernet0/0/1 no ip address shutdown negotiation auto 18 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Configuring the Cisco Network Interface Module no cdp enable ! interface GigabitEthernet0/0/2 no ip address shutdown negotiation auto no cdp enable ! interface GigabitEthernet0/0/3 no ip address shutdown negotiation auto no cdp enable ! interface Service-Engine0/1/0 ! interface Service-Engine0/2/0 ! interface Service-Engine0/3/0 ! interface Serial0/2/0:23 encapsulation hdlc isdn switch-type primary-5ess no cdp enable ! interface Serial0/3/1:1 no ip address ! interface Service-Engine0/4/0 ! interface GigabitEthernet0 no ip address shutdown negotiation auto ! interface Vlan1 no ip address shutdown ! ip default-gateway 1.4.0.1 ip forward-protocol nd no ip http server no ip http secure-server ip route 223.255.0.0 255.255.0.0 1.4.0.1 ! ! control-plane ! ! voice-port 0/2/0:23 ! voice-port 0/3/0:1 ! voice-port 0/1/0 ! voice-port 0/1/1 ! dial-peer voice 1000 voip service dsapp shutdown destination-pattern 37.. session protocol sipv2 session target ipv4:1.4.31.70 codec g711ulaw 19 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Configuring the Cisco Network Interface Module ! dial-peer voice 2000 pots destination-pattern 38.. port 0/2/0:1 forward-digits all ! dial-peer voice 1010 pots destination-pattern 3710 port 0/1/0 ! ! line con 0 exec-timeout 0 0 stopbits 1 line vty 0 4 password lab login end Encapsulation To configure encapsulation on the interface: 1. enable 2. configure terminal 3. interface serial slot/subslot/port:channel-group 4. encapsulation {hdlc | frame-relay | ppp} H.323 H.323 is an umbrella recommendation from the International Telecommunication Union (ITU) that defines the protocols to provide voice and video communication sessions on a packet network. The H.323 standard addresses call signaling and control, multimedia transport and control, and bandwidth control for point-to-point and multipoint sessions. For more information about H.323, see the Cisco IOS H.323 Configuration Guide. For router configuration information, see the “Configuring H.323 Gateways” chapter of Cisco IOS H.323 Configuration Guide. Session Initiation Protocol Session Initiation Protocol (SIP) is a peer-to-peer, multimedia signaling protocol developed by the IETF (IETF RFC 3261). Session Initiation Protocol is ASCII-based. It resembles HTTP, and it reuses existing IP protocols (such as DNS and SDP) to provide media setup and teardown. For more information, see the Cisco IOS SIP Configuration Guide. For router configuration information under SIP, see the ““Basic SIP Configuration” chapter of the Cisco IOS SIP Configuration Guide. Voice gateways provide voice security through SIP enhancements within the Cisco IOS Firewall. SIP inspect functionality (SIP packet inspection and detection of pin-hole openings) is provided, as well as protocol conformance and application security. The user is given more granular control on the policies and security checks applied to SIP traffic, and the capability to filter unwanted messages. For more information, see “Cisco IOS Firewall: SIP Enhancements: ALG and AIC” at Cisco.com. 20 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Configuring the Cisco Network Interface Module Configuration Examples for Data T1/E1 The following example shows the running configuration of the router with the Fourth-Generation T1/E1 NIM installed and configured for data. Router# show running-config Building configuration... Current configuration : 2716 bytes ! ! Last configuration change at 14:07:42 UTC Sun Feb 3 2013 ! version 15.3 service timestamps debug datetime msec service timestamps log datetime msec ! hostname Router ! vrf definition Mgmt-intf ! address-family ipv4 exit-address-family ! address-family ipv6 exit-address-family ! card type t1 0 2 ! no aaa new-model ! ipv6 multicast rpf use-bgp ipv6 multicast vrf Mgmt-intf rpf use-bgp ! multilink bundle-name authenticated ! license boot level appxk9 license boot level uck9 license boot level securityk9 spanning-tree extend system-id ! ! redundancy mode none ! controller T1 0/2/0 framing esf linecode b8zs cablelength long 0db channel-group 22 timeslots 11 ! controller T1 0/2/1 framing esf linecode b8zs cablelength long 0db pri-group timeslots 1-24 ! controller T1 0/2/2 framing esf linecode b8zs cablelength long 0db ! controller T1 0/2/3 framing esf 21 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Configuring the Cisco Network Interface Module fdl both linecode b8zs cablelength long 0db loopback remote esf line csu ! controller T1 0/2/4 framing esf linecode b8zs cablelength long 0db ! controller T1 0/2/5 framing esf linecode b8zs cablelength long 0db ! controller T1 0/2/6 framing esf linecode b8zs cablelength long 0db ! controller T1 0/2/7 framing esf fdl both linecode b8zs cablelength long 0db ! ip tftp source-interface GigabitEthernet0/0/0 ! interface GigabitEthernet0/0/0 no ip address shutdown negotiation auto ! interface GigabitEthernet0/0/1 no ip address shutdown negotiation auto ! interface GigabitEthernet0/0/2 no ip address shutdown negotiation auto ! interface GigabitEthernet0/0/3 no ip address shutdown negotiation auto ! interface Serial0/2/0:22 no ip address ! interface Serial0/2/1:23 encapsulation hdlc isdn switch-type primary-5ess no cdp enable ! interface GigabitEthernet0 vrf forwarding Mgmt-intf ip address 192.0.2.126 255.255.0.0 negotiation auto ! ip forward-protocol nd no ip http server no ip http secure-server 22 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Configuring the Cisco Network Interface Module ip route vrf Mgmt-intf 10.0.0.0 255.0.0.0 192.168.0.1 ! control-plane ! line con 0 exec-timeout 0 0 stopbits 1 line vty 0 4 login ! end Configuring DSP Resources The PVDM4 is a hardware module that provides DSP resources that enable Cisco Integrated Services Routers to provide voice, video, conference, transcoding, and other collaboration services. DSP-farm Profiles A DSP-farm is the collection of available DSP resources. DSP-farm profiles are created to allocate DSP-farm resources. A DSP-farm profile allows you to group DSP resources based on the service type. Under a DSP farm profile, you select the service type (conference, transcode, or Media Termination Point [MTP]), associate an application, and specify service-specific parameters such as codecs and maximum number of sessions. Applications associated with the profile, such as SCCP, can use the resources allocated under the profile. You can configure multiple profiles for the same service, each of which can register with one Cisco Unified Communications Manager group. The profile ID and service type uniquely identify a profile, allowing the profile to uniquely map to a Cisco Unified Communications Manager group that contains a single pool of Cisco Unified Communications Manager servers. Conferencing Voice conferencing involves adding several parties to a phone conversation. In a traditional circuit-switched voice network, all voice traffic passes through a central device such as a PBX. Conference services are provided within this central device. In contrast, IP phones normally send voice signals directly between phones, without the need to go through a central device. Conference services, however, require a network-based conference bridge. In an IP telephony network using Cisco Unified Communications Manager, the Conferencing and Transcoding for Voice Gateway Routers feature provides the conference-bridging service. Cisco Unified Communications Manager uses a DSP farm to mix voice streams from multiple participants into a single conference-call stream. The mixed stream is played to all conference attendees, minus the voice of the receiving attendee. The Ad Hoc and Meet-Me conferencing features are supported (a conference can be either of these types): • Ad Hoc—The person controlling the conference presses the telephone conference button and adds callers one by one. • Meet-Me—Participants call in to a central number and are joined in a single conference. Participants whose end devices use different codec types are joined in a single conference; no additional transcoding resource is needed. 23 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Configuring the Cisco Network Interface Module Configuring a DSP-farm Profile Perform this procedure to define a DSP-farm. You must configure a separate profile for each conferencing, transcoding, and MTP profile. SUMMARY STEPS 1. enable 2. configure terminal 3. voice-card slot/subslot 4. dsp services dspfarm 5. exit 6. dspfarm profile profile-identifier {conference | mtp | transcode [universal]} 7. description text 8. codec codec-type 9. maximum sessions number 10. associate application sccp 11. no shutdown 12. end DETAILED STEPS Command or Action Purpose Step 1 enable Example: Router> enable Enables privileged EXEC mode. • Enter your password if prompted. Step 2 configure terminal Example: Router# configure terminal Enters global configuration mode. Step 3 voice-card slot/subslot Example: Router(config)# voice-card 0/4 Enters voice-card configuration mode for the network module on which you want to enable DSP-farm services. Step 4 dsp services dspfarm Example: Router(config-voicecard)# dsp services dspfarm Enables DSP-farm services for the voice card. Step 5 exit Example: Router(config-voicecard)# exit Exits voice-card configuration mode. 24 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Configuring the Cisco Network Interface Module Step 6 dspfarm profile profile-identifier {conference | mtp | transcode [universal]} Example: Router(config)# dspfarm profile 20 conference Enters DSP-farm profile configuration mode to define a profile for DSP-farm services. Note The profile-identifier and service type uniquely identify a profile. If the service type and profile-identifier pair is not unique, you are prompted to choose a different profile-identifier. Step 7 description text Example: Router(config-dspfarm-profile)# description art_dept (Optional) Includes a specific description about the Cisco DSP-farm profile. Step 8 codec codec-type Example: Router(config-dspfarm-profile)# codec ilbc Specifies the codecs supported by a DSP farm profile. • Repeat this step for each codec supported by the profile. Note Hardware MTPs support only G.711 a-law and G.711 u-law. If you configure a profile as a hardware MTP, and you want to change the codec to something other than G.711, you must first remove the hardware MTP by using the no maximum sessions hardware command. Note Only one codec is supported for each MTP profile. To support multiple codecs, you must define a separate MTP profile for each codec. Step 9 maximum sessions number or maximum sessions {hardware | software} number Example: Router(config-dspfarm-profile)# maximum sessions 4 Specifies the maximum number of sessions that are supported by the profile. • number—Range is determined by the available registered DSP resources. Default is 0. Note The hardware and software keywords apply only to MTP profiles. Step 10 associate application sccp Example: Router(config-dspfarm-profile)# associate application sccp Associates the SCCP protocol to the DSP-farm profile. Step 11 no shutdown Example: Router(config-dspfarm-profile)# no shutdown Enables the profile, allocates DSP-farm resources, and associates the application. Step 12 end Example: Router(config-dspfarm-profile)# end Exits DSP-farm profile configuration mode. Command or Action Purpose 25 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Configuring the Cisco Network Interface Module Network Synchronization for the Cisco ISR 4000 Series For Cisco 4000 Series ISRs, the clocking mechanism on T1/E1 is changed. You must configure the network-clock synchronization automatic global command which is disabled by default and this will ensure other network-clock commands take effects. For further information, see http://www.cisco.com/c/en/us/td/docs/routers/access/4400/feature/guide/isr4400netclock.html. The network-clock-participate command in Cisco 2900/3900 ISR is replaced by network-clock synchronization participate command in Cisco 4000 series platforms. The network-clock-select command in ISR 2900/3900 is replaced by network-clock input-source command in Cisco 4000 series platforms. In Cisco 4000 series ISR, when you do not sync up the clock across different modules, you don not have to participate the clock to the backplane with the network-clock CLI for voice configuration. To disable clock participate, enter no network-clock synchronization participate slot / subslot. There is no default clock source on Cisco 4000 series ISR backplane and you must have to configure the network-clock input-source command with the network-clock synchronization participate command. In Cisco 4000 Series ISRs, the NIM module can be its own clock domain if no network-clock synchronization participate command is configured for that NIM module. On a single NIM, all the T1/E1 lines with voice ports should share the same clock source. You can recover the clock source from line: clock source line [primary|secondary] or from module internal clock: clock source network. Both data and voice can run on the same NIM module. Cisco Unified Border Element Cisco Unified Border Element (Cisco UBE) is a session border controller that provides the necessary services for interconnecting independent Unified Communications networks securely, flexibly, and reliably. Media packets can flow either through the gateway (thus hiding the networks from each other) or around the border element, if so configured. The Cisco UBE is typically used to connect enterprise networks to service provider SIP trunks, or to interconnect different nodes in an enterprise network where protocol or feature incompatibilities exist, or where extra secure demarcation between segments of the network is needed. The Cisco Unified Border Element provides the following network-to-network interconnect capabilities: • Session Management: Real-time session setup and tear-down services, call admission control, ensuring QoS, routing of calls if an error occurs, statistics, and billing. • Interworking: H.323 and SIP protocol conversion; SIP normalization; DTMF conversion, transcoding, codec filtering. • Local Transcoder Interface (LTI) for audio transcoding. For more information, see the Cisco Unified Border Element Configuration Guide at Cisco.com. Cisco Unified Survivable Remote Site Telephony Cisco Unified Survivable Remote Site Telephony (SRST) enables Cisco routers to provide call-handling support for Cisco IP phones when they lose connection to Cisco Unified Communications Manager (CUCM) installations or when the WAN connection is down. In a centralized deployment, under normal conditions, Cisco IP phones are controlled by the Cisco Unified Communications Manager located at a 26 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Configuring the Cisco Network Interface Module central site like the headquarters of an enterprise. When the connection to CUCM breaks, for example as a result of a failure in the network, Unified SRST automatically detects the failure and auto-configures the router to provide backup call processing functionality. During a WAN failure, the router allows all the phones to re-register to the remote site router in SRST mode, allowing all inbound and outbound dialing to be routed off to the PSTN (on a backup FXO, BRI or PRI connection). Unified SRST provides redundancy for both Cisco IP phones and analog phones to ensure that the telephone system remains operational during network failures. Both Skinny Client Control Protocol (SCCP) and Session Initiation Protocol (SIP) based Cisco IP phones are supported with Unified SRST. When the WAN link or connection to the Cisco Unified Communications Manager is restored, call handling automatically reverts back to the Cisco Unified Communications Manager without the need for any human intervention. For general Unified SRST information, see the Cisco Unified SRST System Administrator Guide. • For information on how the H.323 and Media Gateway Control Protocol (MGCP) call control protocols relate to SRST, see the Cisco Unified SRST System Administrator Guide: – For H.323, see H.323 Gateways and SRST on Cisco.com. – For MGCP, see MGCP Gateways and SRST on Cisco.com. • Configurations of major SRST features are provided in the following chapters of the Cisco Unified SRST System Administrator Guide: – “Setting Up the Network” – “Setting Up Cisco Unified IP Phones” – “Setting Up Call Handling” – “Configuring Additional Call Features” – “Setting Up Secure SRST” – “Integrating Voice Mail with Cisco Unified SRST” For SIP-specific SRST information, see the Cisco Unified SCCP and SIP SRST System Administrator Guide. To configure SIP SRST features, see the “Cisco Unified SIP SRST 4.1” chapter. IVR and TCL IVR is a term that is used to describe systems that collect user input in response to recorded messages over telephone lines. User input can take the form of spoken words or, more commonly, dual tone multifrequency (DTMF) signaling. For example, when a user makes a call with a debit card, an IVR application is used to prompt the caller to enter a specific type of information, such as a PIN. After playing the voice prompt, the IVR application collects the predetermined number of touch tones (digit collection), forwards the collected digits to a server for storage and retrieval, and then places the call to the destination phone or system. Call records can be kept and a variety of accounting functions can be performed. The IVR application (or script) is a voice application designed to handle calls on a voice gateway, which is the router equipped with voice features and capabilities. The prompts used in an IVR script can be either static or dynamic: • Static prompts are audio files referenced by a static URL. The name of the audio file and its location are specified in the Tool Command Language (TCL) script. 27 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Troubleshooting • Dynamic prompts are formed by the underlying system assembling smaller audio prompts and playing them out in sequence. The script uses an API command with a notation form to instruct the system what to play. The underlying system then assembles a sequence of URLs, based on the language selected and audio file locations configured, and plays them in sequence. This provides simple Text-to-Speech (TTS) operations. For example, dynamic prompts are used to inform the caller of how much time is left in their debit ccount, such as: “You have 15 minutes and 32 seconds of call time left in your account.” Note The above prompt is created using eight individual prompt files: youhave.au, 15.au, minutes.au, and.au, 30.au, 2.au, seconds.au, and leftinyouraccount.au. These audio files are assembled dynamically by the underlying system and played as a prompt based on the selected language and prompt file locations. TCL is an interpreted scripting language. Because TCL is an interpreted language, scripts written in TCL do not have to be compiled before they are executed. TCL provides a fundamental command set, which allows for standard functions such as flow control (if, then, else) and variable management. By design, this command set can be expanded by adding extensions to the language to perform specific operations. Cisco created a set of extensions, called TCL IVR commands, that allows users to create IVR scripts using TCL. Unlike other TCL scripts, which are invoked from a shell, TCL IVR scripts are invoked when a call comes into the gateway. For more information on TCL IVR, see the Tcl IVR APi Version 2.0 Programming Guide. Troubleshooting Use the following commands to check the status of the modules. • show controller • show hw-module subslot • show interface serial • show platform hardware subslot (4400) 28 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Related Documents Related Documents MIBs Related Topic Document Title Installation guide for the Cisco PVDM4 Installing the Cisco PVDM4 Installation guide for the Cisco Network Interface Module Installing the Cisco Network Interface Module Command reference information for interface and hardware components Cisco IOS Interface and Hardware Component Command Reference Installation of the Cisco 4451-X Series Integrated Services Router Hardware Installation Guide for the Cisco 4451-X Integrated Services Router Comprehensive command reference information for Cisco IOS voice commands Cisco Unified Border Element (SP Edition) Command Reference: Unified Model Configuration guides for different voice and video applications, H.332 networks, SIP devices, and Cisco Voice Gateway Routers. Cisco Unified Border Element Configuration Guide Library, Cisco IOS XE Release 3S System administrator’s guide for Cisco Unified SRST Cisco Unified SCCP and SIP SRST System Administrator Guide. Configuration information for Cisco Voice Gateway Routers that are configured for Cisco Unified Communications Manager Cisco Unified Communications Manager and Cisco IOS Interoperability Guide Regulatory compliance and safety information Cisco Network Modules and Interface Cards Regulatory Compliance and Safety Information MIB MIBs Link • CISCO-DSP-MGMT-MIB • CISCO ENTITY MIB • CISCO-ENTITY-ALARM-MIB • CISCO-ENTITY-SENSOR-MIB • CISCO-FRAME-RELAY-MIB • CISCO-SIP-UA-MIB • CISCO-SYSLOG-MIB • CISCO-VOICE-DIAL-CONTROL-MIB • CISCO-VOICE-IF-MIB • ENTITY-MIB • IF-MIB • RFC1315-MIB (Frame Relay MIB) • RFC1406-MIB (T1 MIB) To locate and download MIBs for selected platforms, Cisco software releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs 29 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Related Documents RFCs Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. © 2013 Cisco Systems, Inc. All rights reserved. RFC Title RFC 1315 Management Information Base for Frame Delay DTEs RFC 1406 Definitions of Managed Objects for the DS1 and E1 Interface Types RFC SIP: Session Initiation Protocol 30 Configuring the Cisco Fourth-Generation T1/E1 Voice and WAN Network Interface Module OL-28913-01 Related Documents HAL Id: hal-02051883 https://hal.archives-ouvertes.fr/hal-02051883 Submitted on 28 Feb 2019 HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés. Analyse coût-efficacité de l’enseignement assisté par ordinateur Serge Chomienne To cite this version: Serge Chomienne. Analyse coût-efficacité de l’enseignement assisté par ordinateur : le cas de la formation en cours d’emploi. IREDU, 211 p., 1992, Les Cahiers de l’IREDU, 2-85634-058-X. ffhal-02051883ff INSTITUT DE RECHERCHE SUR L'ÉCONOMIE DE L'ÉDUCATION Faculté des Sciences Mirande BP 138- 21004 Dijon Cedex Téléphone : 80 39 54 50 Télécopie : 80 39 54 79 • ANALYSE COUT-EFFICACITÉ DE L'ENSEIGNEMENT ASSISTÉ PAR ORDINATEUR : Le cas de la formation en cours d'emploi Serge CHOMIENNE • FACULTÉ DE SC IENCE ÉCONOMIQUE ET DE GESTION : UN IVERSITÉ DE BOURGOGNE · ANALYSE COÛT-EFFICACITÉ DE L'ENSEIGNEMENT ASSISTÉ PAR ORDINATEUR : Le cas de la formation en cours d'emploi Serge CHOMIENNE Cahier de l'IREDU N'54 ISBN : 2-85634-058-X ISSN : 0768-1968 mai 1992 1 L'EAO dans la formation continue 1 2 L'évolution des Sociétés, ces dernières années, s'est vue notamment marquée, par un double phénomène : . Le développement économique mais aussi technologique conduit les entreprises à apporter une attention plus grande à la formation du personnel. . L'émergence des Nouvelles Technologies Informatiques (NTI) peut, potentiellement, "révolutionner" l'acte pédagogique. Les systèmes de formation doivent faire face à des obligations sans cesse croissantes quant au nombre des stagiaires, à la qualité des remises à niveau, c'est à dire à l'adaptation rapide et efficace des formés aux nouveaux postes de travail. Aussi leur faut-il mettre en pratique des modes d'enseignement de plus en plus performants. Face à ce redéploiement de la formation, les entreprises sont conduites à rechercher des solutions appropriées pour réaliser, dans les meilleures conditions, les buts pédagogiques visés. Autrement dit, il s'agit d'optimiser les ressources affectées à la formation pour atteindre les objectifs prévus. Or, dans ce contexte, de nouveaux outils didactiques se trouvent à la disposition des systèmes de formation : les NTI, et, plus particulièrement, l'Enseignement Assisté par Ordinateur (EAO). L'Association pour la Recherche et le Développement de l'Enseignement Multimedia Informatisé (ARDEMI) a fédéré différentes initiatives pour la création et l'utilisation de ces NTI (pour une présentation plus complète de l'ARDEMI, se reporter à l'annexe 1). Dans toute réflexion liée a leur intégration possible dans l'acte de formation, l'intervention de l'économiste trouve toute justification. En 3 effet, sa réflexion- va porter sur l'optimisation des ressources employées. La mise en oeuvre des nouveaux outils va-t-elle permettre d'améliorer la productivité du système de formation ? Les NT! sont-elles plus efficaces pour atteindre tel objectif spécifique d'enseignement ? Il s'agit bien de raisonner à l'intérieur du système de formation et de voir en quoi l'intégration de nouveaux auxiliaires va permettre de mieux réaliser les objectifs prévus (par rapport à la formation traditionnelle). Le système scolaire initial a connu, ces dernières années, une certaine pénétration de ces nouveaux moyens pédagogiques. Globalement, leur utilisation demeure, pour des raisons très diverses, encore relativement timide. Par contre, on peut penser que pour des motifs de contraintes organisationnelles moins fortes, leur multiplication se montrera plus rapide dans la formation continue. Cependant, toute mise en- oeuvre très large de ces moyens passe par un impératif majeur : l'amélioration, grâce à ces nouveaux auxiliaires, du rapport coüt-efficacité. 1) Le rapport coût-efficacité Choisir entre deux formes d'enseignement signifie évaluer pour chacune, la réalisation des objectifs prévus. Il s'agit alors de voir dans quelle mesure tel outil pédagogique permet une meilleure atteinte des intentions didactiques. L'objet de l'analyse développée relève de l'évaluation de l'efficacité interne, c'est-à-dire de l'examen d'une éventuelle amélioration du rapport coüt-efficacité. Dans l'hypothèse d'une évolution défavorable, il serait alors utile de s'interroger sur la nécessité d'introduire de nouveaux outils. 4 L'ensemble de la-question repose, en fait, sur deux variables: la baisse des coûts, l'amélioration de l'efficacité. *La baisse des co'O.ts : l'introduction de matériels nouveaux supplémentaires peut laisser sous-entendre des surc011ts. Les défenseurs des nouvelles technologies informatiques annoncent, par contre, des possibilités .certaines de baisse de coûts. La question est importante. Il s'agit essentiellement de voir dans quelle mesure cette pénétration de nouveaux outils permettra une baisse des "inputS11 • L'un des points forts relève du coût de l'enseignant; va-t-il diminuer du fait de la substitution homme/machine ? * L'amélioration de 1' efficacité aux côtés -d'une . baisse possible des coûts, l'intégration de ce noUvel outil doit aussi améliorer la formation. Un grand nombre d'effets quantitatifs et qualitatifs sont envisageables : il convient de les mettre en lumière lors des évaluations de la mise en oeuvre de l'EAO. Quelle évaluation peut-on faire du rapport coût-efficacité ? En premier lieu, l'approche menée se situant dans le cadre de l'efficacité interne, aucune mesure monétaire de cette dernière ne se réalise. L'approche générale relève de l'analyse des relations entre les coûts et les effets des outils introduits. Les critères d'appréciation de l' 11 output 11 prennent en compte à la fois les. répercussions sur les formés, sur le formateur et le système de formation. En effet, tout acte de formation fait intervenir ces trois pôles et c'est essentiellement par rapport à eux que 1' on peut envisager des répercussions sur les coûts et sur 1' efficacité : ce sont eux qui constituent 1' origine des dépenses face à tout acte d'enseignement, et c'est sur eux que 1' outil engagé peut manifester des effets. Ainsi, toute possibilité de baisse des 5 coûts et d'amélioration de 1 'efficacité apparaîtra sur 1 'un ou plusieurs de ces pôles, puisque l'introduction d'un nouvel outil peut engendrer d'autres "inputs 11 (coût du formateur, limitation de la durée du stage ... ). L'approche en termes d'efficacité quant à elle repose donc sur l'analyse des effets quantitatifs et qualitatifs de l'EAO. Il s'agira, dès lors, de mettre en rapport les coûts et les effets obtenus puis d'examiner les conditions d'une situation optimale. La décision d'introduire le nouvel outil dans la formation a pour base la réponse à la question suivante : les effets obtenus par rapport aux coîlts, grâce aux moyens mis en oeuvre, sont-ils meilleurs que ceux apportés par la formation traditionnelle ? A ce niveau, une remarque s'impose. L'étude du rapport coût-efficacité sous-entend la comparaison formation traditionnelle et EAO. Est-ce réellement une alternative ? En toute logique, un responsable chargé d'organiser une formation peut s'interroger : la fera-t-il assurer par cours traditionnel ou par EAO ? La question ne se pose, en ·fait, pas toujours en ces termes. Dans certains cas, seul tel mode d'enseignement, ou tel outil permet une bonne réalisation de l'objectif pédagogique. Il est certain que l'on ne transmet pas exactement le même message par des instruments différents. C'est alors qu'il s'agit de choisir la meilleure façon de réaliser les intentions didactiques prévues. Tenant compte de cette limite de l'analyse coût-efficacité, il faut voir dans quelle mesure l'EAO apporte des effets que l'on n'obtenait pas (ou plus difficilement) en traditionnel. .. autre façon de poser la question coût-efficacité. Il est clair que la démarche s'inscrit dans un cadre très large ne se limitant pas aux aspects quantitatifs, mais intégrant aussi l'apport / 6 qualitatif. Il serait effectivement bien tentant (mais pas si facile) d'apposer deux nombres aux numérateur et dénominateur du rapport coût-efficacité. Il deviendrait alOrs aisé de tirer des lois de variations mathématiques selon la propre évolution de chacun. La réalité demeure plus complexe. Toute tentative de réduction de la notion d'efficacité aux seuls effets quantifiables doit être écartée, l'approche qualitative revêtant une dimension tout aussi forte. Il est évident que la non prise en co.mpte de ce deuxième axe laisse échapper des dimensions importantes du problème. Malgré cette impossibilité de modélisation mathématique, une réflexion sur une évolution favorable du rapport coüt-efficacité reste possible. En clair, on peut distinguer trois cas dans lesquels il y a, sans aucun doute, amélioration du rapport coût-efficacité. Coûts identiques & meilleure efficacité : les effets de la mise en oeuvre du nouvel outil se manifestent quantitativement et/ou qualitativement. Coûts plus bas & efficacité identique : il s'agit avant tout de mettre en évidence la baisse des coûts. L'efficacité identique s'admet comme une atteinte identique des objectifs pédagogiques pour une même durée de formation. Coûts plus bas & meilleure efficacité : cette situation correspond à la solution optimale. Les deux facteurs évoluent favorablement. Par contre, dans les trois cas inverses, apparaît une détérioration du rapport coût-efficacité : coûts identiques & moindre efficacité, coûts plus élevés & efficacité identique, coûts plus bas & moindre efficacité. 7 Face à ces six cas présentant une évolution claire du rapport (favorable ou défavorable), il faut distinguer deux autres situations plus difficiles à analyser : Coûts plus élevés & meilleure efficacité : il est, dans ce contexte, difficile de se prononcer, on est dans un cas douteux. La question afférente à cette situation repose sur un point principal : les effets produits justifient-ils réellement la hausse du coût ? Toute réponse relève d'un jugement de valeurs, exprimé par le décideur qui détermine, par rapport à d'autres éléments extérieurs, sa stratégie. Coûts plus bos & moindre efficacité : bien que ce cas apparaisse, en toute logique, possible, il semble difficilement envisageable qu'un responsable de formation choisisse un tel cas de figure. L'impossible quantification absolue de l'efficacité condamne le rapport coût-efficacité à l'inexistence chiffrée. Malgré cela, il est primordial d'évaluer l'effteacité des formes d'enseignement. 2) Structure et problématique générale des coOts de l'enseignement assisté par ordinateur Un nouvel outil pénètre les systèmes de formation., .. Qu'il remplace ou complète la panoplie des auxiliaires pédagogiques utilisés jusqu'à ce jour, il laisse apparaître des éléments nouveaux -intervenant désormais dans le calcul du coût d'une formation. 8 2.1 Classification principale des coûts : Cinq dimensions paraissant les plus utiles face à l'intégration de l'EAO dans la formation sont retenues : technique : cette approche distingue les coûts relatifs aux différents stades d'élaboration et de mise en oeuvre de l'EAO : conception, informatisation, transmission, réception. financière : cette classification repose sur la distinction entre les payeurs. Elle différencie l'origine des financements des coüts engendrés par l'introduction du nouvel outil. On sépare alors les coûts à la charge de l'organisme assurant la mise en oeuvre de la nouvelle technique, ceux couverts par les usagers, puis les dépenses assumées par la collectivité. comptable : elle sépare les investissements en capital et les dépenses de fonctionnement. Cette dichotomie s'avère intéressante puisqu'elle montre les dépenses initiales nécessaires au développement de 1' outil puis celles qui permettent son fonctionnement. coats estimatifs!coats estimés!coats réels : l'évaluation des coûts peut s'opérer avant la mise en oeuvre de l'outil considéré, ce qui conduit au calcul de coüts estimatifs (ex ante). Une fois l'installation réalisée et utilisée, il est alors possible de mesurer les coüts réels d'investissement et de fonctionnement. Cependant, Je calcul.des coüts réels de fonctionnement de l'EAO semble bien souvent difficile à établir. On se trouve alors dans l'obligation de calculer des coûts estimés (à postériori) reposant sur des hypothèses et des ratios d'approximation. 9 économique :l'économiste se préoccupe avant tout de l'optimisation de la production. L'étude statique des coûts ne revêt pas, pour lui, une importance première. Il s'intéresse surtout à la structure des coûts et à leur variation en fonction du niveau de la production. C'est ainsi que la distinction entre coût fixe et coût variable prend toute son ampleur. Les calculs par unité produite (coüt unitaire ou moyen) sont privilégiés et l'intérêt majeur relève, en fait, de l'étude de l'évolution de ce coût moyen par rapport aux quantités produites. Il s'agit alors de définir ce que 1' on considère comme unité produite. Si l'on veut raisonner en termes d'évolution des coûts, en comparaison avec 1' enseignement traditiortnel, il est nécessaire de distinguer les coûts fixes et variables. Le coût variable représente la partie du coût total qui évolue avec le niveau de la production. Il est donc fonction directe des quantités réalisées. Son évolution n'est pas forcément proportionnelle à la production, elle va, certes, dans le même sens. A l'inverse, le coût fixe demeure inchangé, quel que soit le niveau de production. Il est intégré une fois pour toutes. La distribution des coüts fixes et variables à l'intérieur du coût total détermine l'évolution des coüts en fonction du niveau de la production. Plus les coûts variables ont un poids important, plus le coût total dépend de la production. Il augmente alors avec l'accroissement des quantités réalisées. Par contre, une forte part de coüts fixes induit une évolution différente. Par définition, ces coûts restent identiques quelle que soit la production. Plus le nombre d'objets créés s'accroit, plus les cot\ts fixes sont partagés. Le coût total reste quasi identique. Cela a pour conséquence une baisse du coüt moyen avec l'accroissement de la production. Lorsque les coûts fixes ont un poids significatif, le cotit moyen (ou unitaire) baisse avec la taille croissante de la population. Lorsque le coüt moyen diminue avec l'augmentation 10 de la production (on produit chaque unité moins cher) des économies d'échelle se réalisent. La productivité des facteurs s'améliore et de ce fait il y a baisse du coût unitaire. Dans le champ de la formation continue, le but essentiel étant la mise à niveau des formés, 1 'unité de base généralement utilisée est le stagiaire. On obtient donc un coût par stagiaire. Il faut souligner, en formation adulte, l'importance de la durée du stage (en nombre d'heures). Un calcul de coüt horaire en fonction de la durée du stage, apparaît, par conséquent, fort utile. La prise en compte de ces deux dimensions conduit à l'établissement d'un indice synthétique : le coût horaire par -stagiaire. Pour la comparaison entre deux méthodes pédagogiques, il peut aussi être intéressant de réfléchir en termes de coût du stage pour un effectif donné de personnes à former. Toute comparaison des coftts entre formation traditionnelle et avec EAO procède en premier lieu de l'examen, pour chaque système de la part coûts fixes/coûts variables. L'enseignement traditionnel qui repose essentiellement sur la relation formateur/élèves, laisse une part importante aux coûts variables. Qu'en est-il de la formation avec EAO? Avant de répondre à cette question et d'apporter des éléments de réflexion pour une comparaison valable, une analyse de la structure des coüts de l'EAO s'avère utile. L'analyse se doit d'englober à la fois les coûts directs liés spécifiquement à la formation reçue et ceux, indirects, évoluant en parallèle avec le cursus. Les premiers prennent en compte toute la dimension d'enseignement (matériel - fonctionnement- formateur). Les seconds souvent non intégrés appartiennent au domaine non pédagogique (salaire des formés- frais de déplacement). 11 Les coûts directs sont relatifs au coüt du matériel et au coüt de fonctionnement. * Coût du matériel Coût des micro-ordinateurs : Il reste primordial de cotlllaître 1' affectation des machines : enseignement uniquement ou poste de travail et formation. A côté des problèmes liés à l'évaluation du nombre annuel d'heures d'utilisation réelle des micro-ordinateurs, intervient le problème de l'amortissement de ces matériels. En effet, les micro-ordinateurs étant utilisés sur des périodes plus ou moins longues, une réflexion s'impose à cet égard. Ces matériels qui relèvent des technologies avancées deviennent, de par l'évolution technique, très vite obsolètes. C'est ainsi que certaines institutions choisissent une durée d'amortissement de deux années. Cela paraît tout de même très court puisque le micro-ordinateur, à l'issue de cette période, conserve tout de même un certain potentiel d'utilisation. L'administration retient pour les matériels de bureau un taux d'amortissement linéaire de dix à vingt pour cent. Cela conduit à envisager une durée de cinq à dix années. Cependant, un texte du 29 Février !988 signifie les possibilités suivantes : "L'entreprise doit être en mesure de justifier les circonstances particulières qui conduisent à retenir une durée d'amortissement inférieure aux usages professionnels qui traduisent la durée normale d'utilisation des biens. Cela étant, l'administration s'abstient de remettre en cause les durées d'amortissement retenues par les entreprises en raison de ces circonstances particulières, lorsqu'elles ne s'écartent pas de plus de 20% des usages professionnels". (Inst. 29 Février !988, 4 DI- 88 LEFEBVRE BIC Memento Fiscal). 12 Coût des autres matériels annexes : aménagement d'une salle spécifique et amortissement du coût d'installation de l'ensemble. Co(lt du/des didacticie/(s) : concernant la mise à disponibilité du/des didacticiel(s) considéré(s), deux cas s'envisagent. Le premier relève de l'achat sur le marché du logiciel désiré au prix de celui-ci, le second procède de la production de l'outil pédagogique lui-même. De même que pour les micro-ordinateurs, il faut considérer une période d'amortissement des didacticiels. Le choix de la durée varie là encore énormément. L'administration fiscale signifie que le taux se détermine "compte tenu de l'évolution prévisible des concepts et techniques 11 • Elle autorise même un amortissement, pour ce type de matériel, d'une année. Au-delà de cette possibilité fiscale, l'adoption d'une période change surtout avec les connaissances diffusées. * Coilt de fonctionnement : Coat de maintenance des machines : contrats d'entretiens ... Coat des supports : documents livrés aux stagiaires, papier pour l'imprimante. Charges diverses de fonctionnement : électricité, assurances, locaux, fournitures pédagogiques, personnel permanent ..... Coat en personnel : tout d'abord, les coûts en personnel représentent les coûts salariaux (salaire + charges patronales). Lorsque sa présence est maintenue, il s'agit d'évaluer le nombre d'heures d'intervention du formateur. 13 Dans certaines institutions, il apparaît intéressant d'examiner l'évolution de la part de face à face pédagogique et de préparation de cours. Cela se montre important pour l'institution elle-même : dans l'hypothèse d'une baisse de temps de préparation, un nombre supérieur d'élèves par formateur peut alors être pris en compte. En effet, dans certains cas, la diminution des temps de préparation, peut induire une baisse du coût global des formateurs ...... chacun assurant plus de cours. D'un autre côté, pour les centres ressources, il faut retenir le coût de 11 l'homme ressource 11 chargé d'apporter les compléments d'informations. Par ailleurs, certaines entreprises ou institutions de formation procèdent parfois à la création d'un ou plusieurs postes/hommes chargés de réfléchir sur l'EAO, son intégration et son déploiement. Au-delà de cette première tâche, cette (ces personnes) examine(nt) les problèmes spécifiques de formation au sein de l'entreprise. Elle(s) envisage(nt) par rapport à la situation réelle, une mise en oeuvre de l'outil tout en tenant compte des dimensions économiques, sociales, humaines. De plus, elle(s) représente( nt) souvent l'interlocuteur EAO. Les coûts engendrés par ce nouveau service sont essentiellement salariaux. Il est d'ailleurs difficile d'intégrer pour une session précise la part de coûts relative à ce domaine ; la mise au point d'un ratio adéquat n'apparaît pas toujours évidente. Les coûts indirects concernent : Salaires des fonnés : il est fondamental pour la comparaison des coûts d'une formation traditionnelle avec un cursus intégrant l'EAO, 14 d'inclure les salaires des formés. Quoi qu'il en soit, toute modification de la durée de stage intervient dans l'établissement de ces coûts. Frais de déplacement : ils recouvrent ceux relatifs aux formés et/ou au formateur et correspondent aux déplacements journaliers remboursés au prix/kilomètre ou aux dépenses hôtelières. Quelle différence existe-t-il entre structure et évolution des coûts en système traditionnel et avec EAO ? Généralement peu de capital s'intègre dans 1' acte d'enseignement traditionnel, exceptés les élénients minima nécessaires tels bâtiments, mobilier ... Les co'O.ts fixes apparaissent donc limités. A l'inverse, les dépenses en travail qualifié (rémunération des formateurs) sont importantes. Elles varient de façon discontinue avec le nombre d'élèves formés et induisent pàr conséquent, une augmentation du coût total avec la taille de l'auditoire. Cela pose d'ailleurs à certaines entreprises des problèmes importants dès lors qu'elles se trouvent dans l'obligation de former un nombre très large de personnes sur une période limitée. Il leur faut, pour satisfaire les exigences de formation, augmenter le nombre d'enseignants de façon significative ; les coûts deviennent très vite considérables. L'intégration de l'EAO nécessite, bien évidemment, dans un premier temps, des dépenses supplémentaires en capital ; la dotation principale correspond essentiellement à 1' acquisition de microordinateurs et de didacticiels. Cela n'entraîne pas obligatoirement une hausse des coûts puisque la répartition entre coûts fixes et coûts variables se modifie. Les premières études retiennent dès lors l'hypothèse d'une hausse des coûts fixes. Cette perspective prend en compte la mise à disposition d'une quantité figée de matériel pour une période donnée, le parc machines n'évoluant pas parallèlement avec 15 la croissance de la population à former:. Le maximum de stagiaires travaille sur les micro-ordinateurs présents. Le coût moyen relatif au matériel décroît avec l'augmentation de la taille de l'auditoire .... pour peut-être devenir dérisoire lors d'une pratique intensive de l'EAO. Les économies d'échelle sont alors importantes. En fait, la question paraît moins facile. Une mise en oeuvre étendue de l'EAO laisse envisager que la seule installation d'une salle unique contenant X micro-ordinateurs semble aujourd'hui moins systématiquement retenue. Même si les débuts de recours à l'EAO passent par l'installation d'une classe (ou l'achat de quelques micro-ordinateurs), la nécessité de former de plus en plus de personnes avec un appel croissant à l'EAO change la nature du problème. Il s'agit moins d'un 11 bloc" opérationnel mis à la disposition d'un certain nombre de formés, mais de plusieurs mis en place en fonction de la croissance de la demande. De fait, l'évolution qui se dessine laisse plutôt montrer une variation discontinue des coûts en matériel informatique en fonction de la population à former. Pour les didacticiels, la loi d'évolution dépend avant tout de caractéristiques techniques. Plusieurs cas sont à prendre en considération : . Pour une même formation, il est quelquefois obligatoire d'acheter autant de didacticiels que de postes/élèves. Les coûts varient alors en fonction du nombre de micro-ordinateurs installés. La loi d'évolution du coût didacticiel en fonction du nombre d'élèves devient identique à celle des micro-ordinateurs . . Pour d'autres situations, telle contexte ARDEMI (Association pour la Recherche et le Développement de l'Enseignement Multimedia Informatisé), les adhérents possédent un didacticiel qu'ils installent sur 16 chacun des postes. Exceptée la nécessité d'avoir un interpréteur par micro, le même didacticiel se "multiplie" sur plusieurs postes. Dans ce cas, le coüt didacticiel est fixe. Il en va de même pour une structure en réseau avec une tête diffusant le didacticiel à chacun des postes annexes . . Bien que non encore développé de manière large, le recours à I'EAO avec transmission électromagnétique (ligne téléphonique, transpac ..... ) devrait devenir important dans les années futures. La loi d'évolution des coftts est alors souvent corrélative à la durée de la plage de travail. Au-delà des coûts spécifiques liés au matériel utilisé, l'introduction de 1 'EAO amène des coûts supplémentaires bien souvent minimisés. Il est vrai, qu'en regard des dépenses en matériel, ils apparaissent peu élevés. De plus, étant pour la plupart fixes, leur poidS ramené au coût unitaire se montre négligeable. Par ailleurs, les co1lts de fonctionnement général (électricité ... ) varient peu avec la taille de l'auditoire. Pour les disquettes, cela dépend du mode de diffusion de l'EAO. S'il est nécessaire d'avoir un jeu de disquettes par poste, les coûts varient avec le nombre de micro-ordinateurs. Par contre, dans le cas d'un réseau ou d'une implantation sur disque dur, le co1lt des disquettes est fixe (une seule série se montre suffisante). En ce qui concerne le papier, les didacticiels ont dans l'ensemble peu de recours à 1 'imprimante. Si cela se produit, il faut considérer un coüt variable proportionnel au nombre de stagiaires. Les coûts de maintenance des machines (contrat d'entretien lorsqu'il existe, réparations diverses .... ) varient en fonction du parc de machines. Ce dernier pouvant, comme nous l'avons vu, osciller avec la taille de la population à former, ces coûts. augmentent indirectement avec elle. 17 Excepté le cas de l'EAO pratiqué sur le poste de travail, il devient fréquent de regrouper les micro-ordinateurs dans une salle particulière. Or, le développement de l'EAO devenant plus fort, le nombre de salles ressources s'accroit. Ces dernières nécessitent très souvent des protections particulières : grille, alarme, serrure ..... Ce collt d'aménagement de locaux apparalt à peu près fixe sachant qu'il varie lors d'une augmentation significative du nombre d'ordinateurs. Le collt des personnes chargées du suivi de l'EAO et de son développement est essentiellement salarial. Il varie avec l'évolution des salaires mais ne dépend en aucun cas du nombre de formés. Par ailleurs, la mise à disposition de l'EAO en dehors des heures de service entraîne inévitablement des coûts supplémentaires : homme ressource, surveillance, charges de fonctionnement. Par contre, 1 'utilisation encore plus forte de micro-ordinateurs et de didacticiels contribue à l'accroissement du nombre de formés et donc à une baisse du coüt des matériels par stagiaire : dans ce cas, la répartition de la charge sur un plus grand effectif diminue le coüt du matériel par personne. Des économies d'échelle se réalisent alors. 2.2 Effets de l'introduction de l'EAO par rapport aux collts d'une formation traditionnelle : Ainsi que nous venons de le voir, des coûts supplémentaires dus à l'utilisation de l'EAO apparaissent. La question fondamentale repose alors sur l'impact de ces coüts supplementaires par rapport au collt de formation traditionnelle. Malgré ces surcollts, ne peut-on pas envisager une baisse du coût unitaire, les lois d'évolution en fonction du nombre de formés étant différentes pour les deux formes d'enseignement ? Il est bon d'y réfléchir sachant que ces deux modes de formation ne représentent pas nécessairement une alternative. Un des 18 points clés de toute cette réflexion représente alors la question du formateur. Notre propos se doit maintenant d'envisager le problème du formateur. Dans un second temps, nous tenterons de recenser quelques facteurs susceptibles de faire baisser le coût de formation par rapport aux sessions traditionnelles. L'influence sur le coût du formateur : Etudier l'évolution des coûts d'une formation intégrant l'EAO impose de tenir compte de la typologie des formes d'utilisations de ce nouvel outil. Au-delà de la prise en compte des coûts fixes ou variables liés à la technique (micro-ordinateur /didacticiel) intervient la question du formateur. Sa place induit ou non des coûts variables non négligeables. Plusieurs hypothèses sont à retenir, qui prennent en compte l'alternative que constitue la présence ou non du formateur. 1) Les connaissances sont diffusées à partir d'un 11 Stock11 fixe de micro-ordinateurs. Les coûts fixes sont importants; les coûts variables apparaissent faibles. Le coût de formation par stagiaire baissera avec l'augmentation de la taille de l'auditoire : les économies d'échelle sont fortes puisque la massification de la formation répartit plus largement les coûts fixes donc diminue le coût par unité produite. Dans le cas du maintien total du formateur (comme en Formation Traditionnelle), les coûts variables restent importants. Le surcoût par élève, dtî. au matériel utilisé, doit être minime surtout lors d'une utilisation intensive des machines (économies d'échelle). Lorsque le formateur intervient plus partiellement, il s'opère une économie au niveau de l'enseignant. Cette dernière est-elle compensée par le coût supplémentaire des matériels ? La réponse à une telle 19 question dépend de la formation envisagée et de la possibilité d'absence de l'instructeur. Celui-ci peut alors avoir une tâche de supervision, d'aide épisodique. Il n'est pas toujours présent dans la salle. On peut envisager qu'il suive parallèlement une seconde formation. Il circule alors d'une classe à l'autre et apporte des réponses aux diverses sollicitations des stagiaires. Une baisse du coût par stagiaire apparaît tout à fait envisageable. 2) Le nombre de micro-ordinateurs n'est plus figé et évolue de façon discontinue en fonction de l'importance de la population à former. Les coûts variables restent faibles; les coûts des matériels ne sont pas tout à fait fixes. L'augmentation de la taille de l'auditoire induit un recours plus important aux enseignants et aux machines. Le coût total croît avec la population. En cas de moindre intervention du formateur, l'évolution du coût total sera moins rapide. Tout dépend, comme nous l'avons montré ci-dessus, des possibilités d'absence de l'enseignant. Il semble plus difficile mais néanmoins possible d'envisager, pour ce cas, une baisse notoire du coût par stagiaire. Peut-on encore envisager des économies d'échelle ? La réponse semble positive tout en sachant bien que ces dernières demeurent moins fortes que dans le premier cas. La présence ou non du formateur manifeste des répercussions sur les coûts. A première vue, dans l'abstrait, des possibilités de substitution homme/machine existent; elles apparaissent plus ou moins importantes et dépendent de facteurs divers (qualité du didacticiel, niveau du public, autonomie dans l'apprentissage ... ). Dans le meilleur des cas, on peut envisager une forte substitution possible. Il convient de voir, dans la réalité, ce qui est envisageable à cet égard. Toute 20 possibilité d'obtenir des économies d'échelle apparalt avant tout liée au mode d'intégration de ce nouvel outil. Les possibilités de baisse de coats : Comme nous venons de le voir, des possibilités de baisse des coûts s'avèrent envisageables. Il apparaît donc intéressant d'examiner les conditions de leur minoration. a) Diminution du temps de formation Tout d'abord, une diminution du temps de formation doit contribuer à une réduction des coûts. Bien évidemment, il ne s'agit pas de limiter coûte que coûte la durée de session mais bien d'atteindre les mêmes objectifs pédagogiques sur une période plus courte. La limitation du temps de formation implique plusieurs incidences sur les coüts : . Temps d'intervention de l'enseignant moindre formateur moins élevé . coût du . Monopolisation plus réduite des matériels : cela permet à un plus grand nombre de stagiaires de travailler sur les machines . . Absence plus courte du poste de travail et réduction des salaires versés sans contrepartie productive . . Diminution dans certains cas des frais de déplacement. . Possibilité, comme nous avons déjà pu le mettre en évidence, de former un plus grand nombre de personnes. Cela peut permettre 21 dans certaines situations, de plus fortes économies d'échelle : stock fixe de micro-ordinateurs et de didacticiels (encore plus importantes si l'achat d'un seul logiciel permet une installation sur toutes les machines). b) Modification de l'activité du formateur Ainsi que nous avons déjà pu l'appréhender, la part d'intervention du formateur agit de façon non négligeable sur les coûts. L'enseignement traditionnel reposant essentiellement sur lui, sa disparition totale ou partielle induit nécessairement une baisse des coüts. L'absence partielle de 1 'instructeur lui permet d'assurer un travail de préparation de formations futures. Sur un quota d'heures identique, englobant temps de préparation et face à face pédagogique, le second peut alors devenir quantitativement plus élevé. Ceci autoriserait la prise en compte d'un nombre croissant d'élèves. Il est parfois envisagé qu'une moindre présence du formateur, au sein d'un cursus, rende possible un suivi simultané de plusieurs sessions parallèles. La baisse des coûts devient alors très forte. Cependant, une remarque s'impose. Ce type de pratique tout à fait réalisable modifie le rôle pédagogique de l'enseignant. Le formateur 11 glisse" alors vers ce qu'il est convenu d'appeler une action "d'homme ressource 11 • Enfin l'EAO apportant la base d'un cours, l'adaptation des nouveaux enseignants (approche générale du cours- contacts d'harmonisation avec les autres formateurs) devient plus rapide. Etant plus vite opérationnels, ils consacrent dès lors moins de temps à toute organisation préalable au démarrage dans l'établissement. Pour certaines institutions, ce point revêt une importance particulière. En effet, elles connaissent un turn-over important de leurs intervenants. 22 c) Autres facteurs L'utilisation de l'EAO comme support de cours, et par conséquent comme trame générale, évite l'achat de progressions pédagogiques vendues par des groupements spécialisés (certaines institutions achètent, pour assurer tel ou tel cours, une progression pédagogique livrant tout le cursus et la démarche à suivre pour atteindre l'objectif cognitif visé). Par ailleurs, dans le cas de centres d'enseignement individualisé, la pénétration de l'EAO contribue à réduire les frais de tirage de fiches de travail cartonnées. Une utilisation par un grand nombre de stagiaires nécessite des frais de duplication croissants. A défaut de résultats globaux concernant l'impact de l'EAO sur les coa.ts de formation, la présente réflexion met en lumière toutes les difficultés de leur estimation et de leur loi d'évolution. L'économiste doit-il pour cela renoncer à toute tentative d'approche exhaustive? La question ne se pose pas en ces termes. La très grande souplesse d'utilisation de ce nouvel outil impose une étude spécifique propre à chaque forme d'intégration. Tout d'abord, toute analyse économique doit prendre en compte la philosophie générale de pénétration de ce nouvel auxiliaire pédagogique : . Qu'attend-on de ce nouvel outil? . Est-il introduit comme substitut du formateur ou comme complément pour une amélioration de la formation ? . Va-t-il, dès lors, augmenter les coûts de formation ou peut-on en espérer une baisse ? 23 Certes, l'ensemble de cette approche s'opère à partir d'une base de comparaison : 1' enseignement traditionnel. Ces deux formes apparaissent-elles réellement substituables et source de confrbntation ? ·L'écueil profond sur lequel bute l'économiste provient en fait de la réponse plutilt négative à cette question. Ceci crée la difficulté. Dans certaines situations se réalise une substitution totale ; dans d'autres, elle est plus partielle. Enfin dans un troisième cadre, il faut parler de complémentarité. Malgré cela, le seul recours pour livrer une réflexion sur cette nouvelle technologie de formation s'appuie sur la base traditionnelle. Lorsque les critères de mise en oeuvre sont définis très précisément (annexe 1), une situation de comparaison apparaît possible. Cette dernière repose alors sur deux points forts : le nombre de· stagiaires visés, la durée de formation. Une loi d'évolution des ·coûts peut ainsi s'établir. La véritable comparaisori en termes financiers se réduit alors en une question forte : à partir de quel effectif ou de quel nombre d'heures/élèves parvient-on à un coût égal, puis inférieur à une formation traditionnelle ? Une approche de la rentabilité uniquement en termes de coûts apparaît quelque peu réductrice. Bien que cette dimension revête une importance particulière, toute réflexion sur l'acte d'enseignement a pour obligation d'évaluer l'apport auprès des élèves. Afin de poser réellement le problème, il convient, parallèlement, d'étudier les effets quantitatifs et qualitatifs sur la formation ciblée. Même si, de par leur nature, les éléments qualitatifs s'apprécient plus difficilement, ils demeurent, dans bien des cas, primordiaux. Là encore, se pose la véritable question : qu'est-ce que la rentabilité? Comment la définir ? Le caractère particulier de l'enseignement rend bien plus complexe encore toute approche économique. Pour certaines institutions, la 11 production" d'une population à un niveau de connaissances requises, pour répondre à tel impératif industriel ou commercial, pose réelle- 24 ment le problème en termes de rentabilité stricto-sensu. Pour d'autres, l'aspect qualitatif l'emporte, sollicitant moins d'exigences de calcul économique. Cependant, quel que soit l'impératif majeur, une réflexion sur l'efficacité des nouveaux outils engagés s'impose. Une approche complète pour une réflexion approfondie, nécessite une analyse à la fois centrée sur les coûts mais aussi sur l'atteinte des objectifs prévus pour la formation visée. Une étude méthodologique de 1' efficacité se doit, par conséquent, d'être développée parallèlement. 3) Efficacité de l'enseignement assisté par ordinateur : analyseévaluation des effets Le recensement des effets s'articule autour des trois "acteurs" présents : les formés - le formateur - le système de formation. Une étude exhaustive des effets oblige une approche sous double dimension quantitative et qualitative. Effets de l'EAO sur les formés : D'un point de vue qualitatif, on relève : - des effets en terme d'atteinte des objectifs proportion de stagiaires formée au niveau souhaité ; - des effets cognitifs : ce domaine relève directement de la matière enseignée. L'élément clé repose sur les 11 tests" proposés aux stagiaires avant et après la formation dispensée. L'analyse des écarts entre ces deux épreuves fournit la mesure du niveau atteint. La 25 situation de comparaison réelle de groupes· classes utilisant pour les uns l'enseignement traditionnel, et pour les autres la formation avec EAO se montre fort intéressante. Cela nécessite cependant des précautions fondamentales avant toute mise en oeuvre de l'évaluation (identité des objectifs poursuivis - qualité à peu près homogène des formés - niveau général des stagiaires approximativement le même). - des effets sur le temps d'apprentissage : il s'agit de mesurer le temps exact passé par le formé pour acquérir les connaissances nécessaires. D'un point de vue qualitatif, l'évaluation des divers effets mis en évidence s'opère, dans ce cas, par observations sur le terrain et enquête auprès des formés. Elle concerne notamment : -l'individualisation de l'apprentissage, -l'adaptation aux connaissances et rythme de travail du stagiaire, - l'interactivité : dialogue homme/machine, - le degré d'acceptation de l'EAO. Effets de l'EAO sur le formateur : La principale question relevant de l'axe quantitatif appartient à la mesure du temps d'intervention du formateur. Il s'agit de cOnnaître la durée de sa présence lors d'un stage intégrant l'EAO et de la comparer, avec celle d'un cours traditionnel. Du point de vue qualitatif, il s'agit d'évaluer : - la place du formateur. Cet aspect de l'étude porte essentiellement sur l'organisation pratique du cours. 26 - le rôle du formateur dans sa dimension pédagogique .: le formateur voit sa charge de diffusion de connaissances modifiée. Il devient nécessaire d'examiner le nouveau rôle de l'instructeur et d'apprécier son sentiment suite au 11 partage 11 de sa fonction de transfert avec l'ordinateur. - la rigueur pédagogique demandée au formateur. La manifestation de cet effet apparaît, selon le cas, à deux niveaux : conception du didacticiel/intégration dans le cours. D'une part, lorsque le formateur participe à 1' élaboration du didacticiel ou plus spécifiquement à la maquette pédagogique, une réflexion de fond s'instaure. Ce travail d'approfondissement apporte alors un plus fin cadrage des formes et contenus des cours diffusés. Il manifeste par la suite, .des répercussions sur l'enseignement diffusé. D'un autre côté, l'intégration de didacticiels dans un stage livre inévitablement une charpente sur laquelle s'appuiera l'enseignant. Effets de l'EAO sur le système de formation : Les effets sur le système de formation qui peuvent donner lieu à une évaluation quantitative sont essentiellement la durée de la formation et le nombre de personnes formées. En ce qui concerne la durée d'une session de formation avec EAO par rapport à un stage traditionnel, la différenciation entre les notions de temps d'apprentissage (afférent aux formés) et de durée de session (relative au système de formation) est primordiale. Tout gain de temps d'apprentissage n'induit pas nécessairement une baisse de la durée, de session. En toute logique} on pourrait envisager une corrélation entre les deux mais ce n_:est pas obligatoirement le cas. (utilisation par exemple du temps "gagné" à des fins d'approfondisse- 27 ment des notions par diversification des auxiliaires pédagogiques). Cependant, dans la mesure où l'introduction de l'EAO induit une diminution du temps d'apprentissage, il devient logique d'envisager une réduction de la durée du stage. En ce qui concerne 1' effet sur le nombre de personnes formées en même temps ou sur une période plus courte, la présentation de I'EAO comme démultiplicateur de l'action du formateur conduit à s'interroger sur ses capacités de massification de la formation. Certaines entreprises, face à l'ampleur des enseignements à développer, renoncent à recourir aux sessions traditionnelles et escomptent trouver en I'EAO une réponse à leurs exigences. La limitation temporelle d'une session traditionnelle, d'une importance particulière pour les plans de formation, peut induire trois conséquences majeures possibles : 1) soit le nombre prévu de stagiaires se trouve formé sur une période plus courte. Leur opérationnalité est donc plus rapide. Les objectifs de formation se réalisent dans un délai plus court. Les plans s'y afférant peuvent devenir plus ambitieux. 2) soit une quantité plus grande de personnes suivent un stage pour la période initialement prévue. 3) soit, dans l'hypothèse la plus favorable, une quantité plus grande de personnes est formée sur une période plus courte. Les effets sur la qualité de la formation sont potentiellement nombreux. 28 Effets pédagogiques : lors de la pénétration de l'EAO comme support principal des connaissances à transmettre, deux conséquences majeures pour le système de formation peuvent apparaître, à priori, intéressantes : 1)_ Un contenu minimum, celui du didacticiel, se trouve diffusé conformément aux objectifs prévus. Cela peut se montrer particulièrement intéressant lors de formation de public "délicat". Il est effectivement très difficile, pour un enseignant, de trouver la juste adéquation entre un cours traditionnel souvent trop théorique et des situations pédagogiques trop "ouvertes" qui ne permettent aucune manipulation de connaissances. Dès lors, la tendance à dériver devient forte. La présence de l'EAO reconduit le formateur dans le sillage des objectifs. Les responsables du système de formation, sans négliger les difficultés rencontrées par les enseignants, demeurent certains qu'un quota minimum de connaissances a bien été diffusé. 2) Les didacticiels intégrés dans une progression forment des supports sur lesquels les enseignants appuient leur cours. En cas de changement de formateur (situation plus fréquente qu'en formation initiale) un cadre de travail existe. Le nouvel intervenant ne repense pas tout le cursus mais possède déjà un archétype qu'il enrichit simplement de ses propres sensibilités . . Homogénéisation du contenu de la formation dans le temps et dans 1' espace : s'agissant des mêmes didacticiels circulant sur tout le territoire, les diverses unités de l'entreprise possèdent le même outil de travail. Les logiciels_ étant autoporteurs, les mêmes cours contenant les mêmes données et le même vocabulaire sont diffusés à l'ensemble des services concernés quel que soit leur localisation géographique. Il y a constitution, pour les stagiaires, d'un véritable 11VOcabulaire 29 communu. De plus, sur un ensemble de sessions se déroulant sur une période donnée, le même contenu se trouve réellement diffusé. Pour le cas de connaissances stables ou peu évolutives, cette homogénéisation dans le temps peut apparaître importante. Les cours théoriques appropriés à une utilisation future précise se trouvent diffusés identiquement dans toute l'entreprise . . Décentralisation de la formation : les diverses unités de l'entreprise géographiquement dispersées possèdent chacune les didacticiels utilisés. Elles ne sont plus obligées d'envoyer leur personnel dans des lieux centralisés de formation. . Degré d'autonomie dans la réalisation de la formation chaque unité disposant de matériel et de didacticiels peut gérer la formation de ses employés sans attendre une organisation générale demandant beaucoup de temps de mise en place . . Disponibilité totale des cours sur les lieux de travail : dans le cas de libre-accès, le personnel peut travailler suivant son temps disponible y compris la nuit lorsqu 'un système de postes 3 x 8 ou 4 x 8 est en place . . Potentialités sans équivalent : l'utilisation de l'ordinateur permet des activités impossibles à réaliser en enseignemen~ traditionnel. La simulation de situations diverses avec intervention directe de l'élève apporte une dimension nouvelle à la formation. La prise en compte des deux dimensions de l'étude de 1' efficacité représente une approche très large. Toute investigation en ce sens doit aborder tous les effets prévus ou non prévus apparaissant lors de la formation. Pour une analyse scientifiquement valable et non réductri- 30 ce, il est fondamental de réfléchir sur les répercussions quantitatives et qualitatives de l'entrée de cette nouvelle technique sur les trois "intervenants" de la formation. Contrairement à ce que l'on pense communément et aux quelques approches déjà réalisées, la part qualitative apparaît non négligeable. Elle demeure, certes, d'évaluation difficile, mais néanmoins de premier ordre. Uen réflexion sur le rapport coût-efficacité de 1 'EAO amène a fortiori à lui réserver une place toute aussi nette. Cette approche forme un cadre théorique défini à priori. Il convient de l'adapter voire même de l'enrichir lors de toute étude plus particulière d'un 11 terrain 11 donné. Dans les chapitres suivants, nous avons mis en oeuvre cette démarche en vue d'évaluer l'intégration de l'EAO dans sept formations. Chapitre 1 Evaluation coût-efficacité de l'EAO en formation "Initiation à la commande numérique" chez Renault Véhicules Industriels 33 L'introduction de l'EAO chez Renault Véhicules Industriels fait suite à une première expérience, acquise au cours de ces dernières années. Le cours d'initiation à la commande numérique, objet de l'évaluation, tient-compte, pour son organisation, et pour l'intégration de l'EAO d'une certaine réflexion. Cette dernière, certes encore modeste, a été bâtie à partir de situations diverses, vécues et appréciées. De 1' ensemble des "expérimentations" antérieures, quelques idées directrices ont été dégagées. En premier lieu, la nécessité d'un encadrement répondant aux problèmes techniques et pédagogiques s'avère évidente. Même si l'implication du supérieur hiérarchique, dans ce type de formation se trouve fondamentale, celui-ci ne possède pas forcément une compétence pédagogique. Par ailleurs, tout système reposant sur le libre service montre très vite ses limites si un suivi précis des actions de formation ne s'opère pas. Une reprise des acquis avec le formateur apparaît indispensable. Fort de tous ces enseignements, l'EAO se trouve donc intégré dans la formation "Initiation à la commande numériqueu. Son introduction relève donc de deux objectifs complémentaires : apprentissage du contenu et "apprendre à apprendre" 1.1 Présentation d'une session traditionnelle "initiation à la commande numérique" : Afin de situer. le stage d'enseignement "traditionnel", il convient de présenter ce qui se faisait jusqu'alors à Lyon ou St Priest avant l'intégration de l'EAO. 34 La formation se déroulait sur dix journées non consécutives : les quatre premières portant sur la technologie de la machine outil à commande numérique (MOCN), les trois suivantes sur le tournage (terminées par un exercice), les trois dernières sur le fraisage (conclues par un problème). Dans certains cas, un stage spécifique de fraisage ou tournage pouvait être proposé ; il ne comprenait alors que sept jours (quatre en technologie et trois en matière choisie). Ces types d'action ne comportaient aucun travail pratique c'est-à-dire de manipulations sur clavier de MOCN. Ces dernières devaient être vues à l'atelier, soit d'une façon active, soit sous forme de·démonstration, sous la conduite de la maîtrise du secteur. En ce qui concernait les exercices, la correction s'effectuait par le formateur qui prenait en compte les réponses de chaque groupe. Tout reposait donc sur l'instructeur qui appréciait comme "bon" ou "pas bon" le programme préparé. Il apparaît tout de même nécessaire de bien situer la partie de quatre jours en technologie. Elle abordait de manière assez détaillée la description des éléments constitutifs d'une MOCN. D'après les indications livrées par les responsables de la formation, cet approfondissement descriptif n'apporte pas nécessairement une réponse à chacune des personnes présentes et apparaît souvent comme fort long. Selon la provenance des stagiaires (production, maintenance, méthodes ... ), cela s'avère plus ou moins nécessaire. Il est à noter qu'une formation traditionnelle continue d'être assurée à l'unité de Limoges. A la demande de cet établissement, la session 11 lnitiation à la Commande Numérique" relative au tournage et au fraisage se trouve transformée en un stage de huit journées à dominante tour ou fraisage : quatre jours en technologie (connaissances générales de la CN ... ) puis quatre en approche spécifique (tour ou 35 fraisage); La dernière journée est réservée à l'exercice complet par petits groUpes de deux, trois ou quatre. Ces derniers avancent à leur rythme pour parvenir le plus loin possible. Généralement, le programme ·complet avec correction n'est pas atteint, la solution finale étant livrée par papier-listing laissé par le formateur. Aucune manipulation sur pupitre ne se réalise dans le cadre du stage, les formés devant le faire dans leurs ateliers respectifs. 1.2 Introduction de I'EAO dans la formation "initiation à la commande numérique" : Prenant en compte les idées directrices dégagées lors des diverses introduCtions de l'EAO, il a semblé opportun d'utiliser ce nouvel outil en composition avec cours traditionnel et manipulations diverses. Le stage. ses objectifs. l'intégration de l'EAO IntitUlé 11Les bases de la commande numérique en mécanique d'usinagen, ·ce stage représente avant tout une initiation en ce domaine. Diffusé au Centre de Formation de St Priest, il intègre l'Enseignement Assisté par Ordinateur avec la présence d'un formateur. Il s'adresse aux ouvriers professionnels, techniciens, maîtrises, des services de maintenance et fabrication. Quelques pré-requis paraissent souhaitables telles de bonnes notions d'usinage par enlèvement de copeaux. A cette première formation, font suite deux autres stages de spécialisation (Programmation de base Num 760 de six jours) et de perfectionnement (entraînement à la programmation Num 760 de six jours également). 36 Que ce soit sous forme traditionnelle ou avec introduction de l'EAO, les objectifs sont identiques : - Découvrir la structure des machines outils à commande numérique (tour - fraiseuse), leur principe de fonctionnement. - Se familiariser avec le vocabulaire des éléments constitutifs d'une MOCN. - Découvrir le schéma de programmation manuelle, la conduite d'une MOCN, les notions de sécurité et d'entretien préventif. Prenant en compte notre typologie des formes d'intégration de l'EAO, il s'agit d'appliquer cette grille au cas évalué : But apporte une formation nouvelle à l'apprenant Contexte intègre la formation existante Lieu dans le centre de formation Nombre de micro-ordinateurs une salle de type "laboratoire" : 4 appareils Moment pendant le temps de travail Manière intégrée Public captif Unité de base quasi individuelle Nature apprentissage Intégration "mode mixte" Relation au formateur avec suivi 37 Evaluation et déroulement des stages : Après plusieurs entretiens avec le responsable des nouvelles technologies dans la formation chez RVI et plusieurs réunions avec les assistants de formation de chaque usine (moteurs - ponts ~ fonderie - ·méthodes - autocars/autobus), l'ensemble de notre intervention a pu être définie. Par ailleurs, plusieurs rencontres avec le formateur nous ont permis de mieux cadrer l'ensemble des connaissances et savoirfaire dispensés. L'évaluation repose sur notre suivi de trois sessions-de formation (Juin/Juillet - Octobre/Novembre - Novembre/Décembre) dispensées de manière quasi identique par le même formateur. Quelques aménagements s'avèrent nécessaires au fur et à mesure du dérouleinent des stages car l'ensemble relève encore de l'expérimentation. Stage de Juin/Juillet 1988 : L'ensemble de la formation se déroule sur dix jours selon une progression définie globalement. A l'issue d'une présentation générale du stage (explicitation des objectifs, méthode de travail, approche succinte et rapide de la commande numérique .... ),les huit formés s'organisent en binômes. Ils débutent alors le travail sur le' didacticiel 11DIDA CN11 ••• le formateur apportant des explications et èompléments individuels aux différents groupes. Le deuxième jour, avant la reprise du travail devant l'ordinateur, le formateur procède à Une petite récapitulation de quelques éléments clés appréhendés la veille, non soUs forme de cours magistral, mais plutôt de reprise élaborée avec les personnes elles-mêmes. A partir de ce moment, les binômes retrouvent le didacticiel et vont cheminer à leur rythme jusqu'à la fin de la formation. Ils respectent les divers points de passage obligatoires 38 que forment les différents exercices du "contrat11 : exercices 11 tour 11 puis 11 fraisage 11 du didacticiel, deux problèmes de tournage et un de fraisage soumis par le formateur. Il est intéressant de souligner qu'à tout instant, lors de 1' élaboration des programmes de pièces, les formés peuvent recourir à l'EAO pour rechercher telle ou telle information, vérifier un renseignement, réviser une notion mal assimilée (instruction, syntaxe de programmation ... ). Stage d'Octobre/Novembre 1988: Ce stage s'organise selon le même cadre que Juin/Juillet mais sur une durée de huit journées. Globalement le cursus demeure identique. Il faut cependant noter que l'ensemble de tournage (cours + exercices) est entièrement réalisé dans un premier temps. L'étude complète du fraisage y fait suite. Stage de Novembre/Décembre 1988 : De même que celle d'Octobre/Novembre, cette formation se présente sous huit journées. Le corps général d'organisation demeure identique avec cependant quelques aménagements relatifs aux exercices. En effet, l'expérience démontre la nécessité de soumettre de façon régulière de petits exercices afin d'apprécier les acquisitions successives et surtout l'assimilation des notions apprises. Tout au long du stage, de courts exercices sont proposés aux formés de façon à leur faire appliquer ce qu'ils viennent d'appréhender. Pendant l'exécution de ces travaux, le didacticiel demeure à la disposition des binômes qui l'utilisent lors de difficultés rencontrées. 39 Didacticiel utilisé : Le didacticiel "DIDA CN" introduit dans le cadre de cette formation a pour objectif pédagogique l'apport de connaissances élémentaires sur les machines outils à commande numérique et leur mise en oeuvre. Le public cible représente des personnes utilisant des machines outils traditionnelles et de niveau CAP. Ce didacticiel se divise en dix modules intitulés successivement : généralités sur les MOCN, axes d'une MOCN, origines, langage machine, fonctions préparatoires, cycles et micro-instructions, introduction au tournage sur MOCN, exercices de tournage et de fraisage. Objectifs atteints : L'appréciation des objectifs atteints s'établit en référence aux buts prévus du stage, enrichis d'apports spécifiques liés à la façon de travailler. L'évaluation de l'effiCacité interne se place, dans ce contexte, essentiellement par rapport à l'atteinte des objectifs. En effet, le Centre de St Priest ne diffusant plus de formation traditionnelle, nous évaluons l'action pour elle-même, sans comparaison. Certes, des indications sur les sessions traditionnelles antérieures nous ont été données par l'instructeur et diverses personnes du Centre ; cela nous conduira tout de même à livrer quelques termes comparatifs. La perspective première de ce stage concerne la découverte des machines outils à commande numérique et la compréhension de leur principe de fonctionnement au travers de 1' élaboration de programmes. La réalisation de l'objectif n'est pas, en soi, la création d'une pièce par un programme optimisé, le plus performant possible, mais 40 l'utilisation de fonctions de base. Il s'agit, en fait, d'apprendre aux opérateurs, à décoder un programme (le lire et comprendre comment il est écrit) ; cela passe avant tout par une phase de codage. L'ensemble des. exercices proposés a pour objectif fondamental une réflexion sur l'écriture d'un programme avec toutes les questions qui s'y réfèrent.:· Cependant, chaque stagiaire vise la réalisation de la· pièce 11 bonne 11 pour lui, l'atteinte de l'objectif se mesure par la vérification sur pupitre de la validité de l'usinage. 1.3 Etude comparative des coilts d'une formation traditionnelle Puis "mixte" : "initiation à la commande numérique" : Avant de présenter les différents calculs de coüts établis dans le cadre de cette évaluation, il paralt important de souligner le caractère particulier de ces mesures. En effet, la présentation des chiffres propre à chaque entreprise, implique, quelquefois, une approximation réalisée à partir d'informations spécifiques à la Société. Avant de soumettre les tableaux, nous définirons le cadre général des calculs et surtout les diverses hypothèses retenues pour leur élaboration. Cadrage méthodologique et hypothèses retenues : Tout d'abord, les données utilisées pour l'élaboration des coûts sont hors taxes. Les calculs conduisent, dans un premier temps, à l'obtention d'un coût horaire d'enseignement par stagiaire englobant l'ensemble des charges spécifiquement relatives à la diffusion des connaissances. Nous retenons, pour amortissements des micro-ordinateurs et didacticiels, des périodes respectivement de quatre et trois années. Le calcul des coûts s'établissant à partir de données annuelles, 41 le nombre d'heures de diffusion de cours pour un formateur nous a été livré par 1' entreprise. Il est à noter que 1' enseignant assure une tâche de face à face pédagogique ainsi qu'un travail de préparation de cours et de conseil. Le coüt horaire par stagiaire étant un coll.t d'enseignement, il faut, pour approcher un coût de formation, y adjoindre les salaires des formés, les frais annexes (repas ... ), les déplacements. Par rapport à la nature de la formation évaluée, nous présenterons deux études de cas. La première retiendra la présence de stagiaires de Lyon et environs immédiats (St Priest, Vénissieux ... ) ; la seconde prendra en compte des formés en totale provenance d'Annonay. Certes, la situation réelle, lors de la participation de stagiaires éloignés s'apparente plus à une composition mixte du groupe de stage. Il est à noter que les didacticiels utilisés ne proviennent pas du contexte ARDEMI. Aussi nous ne prenons pas en compte le coftt lié à l'adhésion de l'entreprise. Par ailleurs, le coüt de la personne chargée du développement et du suivi des nouvelles technologies dans la formation pour toute la structure RVI n'est pas intégré. Par rapport à l'ensemble de sa tâche, la part relevant de ce stage ressort minime. Comme nous l'avons évoqué dans l'introduction, il est aussi possible de raisonner en termes de coüt du stage (notamment lors de changements dans sa durée). Nous présenterons, suite aux coûts horaires de formation par stagiaire un calcul de coûts de stage (selon les deux modes). 42 1.3.2 Coûts d'une formation traditionnelle : 1.3.2.1 CalcuL du coüt horaire d'enseignement par stagiaire: Un formateur assure, annuellement, 650 heures de diffusion en Commande Numérique. Groupe de 10 stagiaires - Durée : 10 jours. Salaire et charges 30 KF par mois par formateur 360 sociales du formateur Charges diverses : élee- 12 KF par mois 144 tricité, photocopies· 12 KF x 12 = 144 KF Bâtiments, matériels 4 KF par m2 8 m2 par personne 18 divers 4KFx8xl0=320KF Amortissement : 10 ans Utilisation prévue : 1700 h/an Taux d'utilisation : 65% Utilisation réelle : 1100 h/an 32 KF x 650 = 18,91 1100 [ Total 522 Cm1t horaire d'enseignement : (pour 10 stagiaires) 522,91 = 0,8045 KF 650 Coû.t horaire d'enseienement par stagiaire : 0,0845 = 0,08045 KF soit 80,45 F 10 KF 91 91 43 1.3.2.2 Calcul du coût horaire de formation par stagiaire : 1er cas - 10 stagiaires de Lyon et environs proches. Durée : 10 jours - 80 heures Nombre de stagiaires : 10 Coût d'enseignement 0,08045 KF x 80 x 10 = 64,36 KF Cotît des repas 0,035 KF x JO x 10 = 3,5 KF (10 repas servis pendant 10 jours) Coût des salaires 0,08 KF x 80 x 10 = 64 KF 80 F/h est le coût salarial moyen d'une personne devant fréquenter ce stage 1 Total Coût horaire de formation : l..3..L..!!Q = 1,648 KF (pour 10 stagiaires) 80 Coût horaire de formation par stagiaire : J..Ma = 0,1648 KF soit 164,80 F 10 64 36 3 50 64 131 86 KF 44 2ème cas- 10 stagiaires d'Annonay en formation à St Priest : Durée : 10 jours - 80 heures Nombre de stagiaires : 10 Cotît d'enseignement 0,08045 KF x 80 x 10 ~ 64,36 KF Coüt des repas 0,035 KF x 10 x 10 ~ 3,5 KF (10 repas servis pendant 10 jours) Coat des salaires 0,08 KF x 80 x 10 ~ 64 KF 80 Flh est le coat salarial moyen d'une personne devant fréquenter ce stage Frais de déplacement 0,002 KF x 150 x 10 x 3 = 9 KF Remboursement des frais de déplacement avec une automobile personnelle pour 4 stagiaires, Soit pour 10 stagiaires, 3 voitures nécessaires assurant 150 km journaliers (Lyon Annonay 75 km) pendant 10 jours. Coût horaire de formation : 140 86 1,761 KF (pour 10 stagiaires) 80 Coil.t horaire de formation par stagiaire : 1.761 = 0,1761 KF soit 176,10 F 10 1 Total 64 3 64 9 140 KF 36 50 86 45 1.....3...1 Coûts d'une formation 11 mixte" 1.3.3.1 Calcul du coût horaire d'enseignement par stagiaire : Un formateur assure, annuellement, 570 heures de diffusion en Commande Numérique. Groupes de 8 stagiaires - Dur~e : 8 jours. KF Salaires et charges sociales 30 KF par mois par formateur 360 du formateur 30KFx 12 = 360KF Charges diverses : élee- 12 KF par mois 144 tricité, photocopies 12KFx 12 = 144KF Bâtiments, matériels divers 4 KF par mz 8 m2 par personne 13 27 4KFx8x8=256KF Amortissement ; 10 ans Utilisation prévue : 1700 h/an Taux d'utilisation : 65% Utilisation réelle : 1100 h/an 25'6 KF x 570 = 13,27 KF 1100 Micro-ordinateurs 20JCF par binôme- 4 binômes 10 37 20·KF x 4 = 80 KF Amortissement : 4 ans Utilisation prévue: 1700 h/an Taux d'utilisation : 65% Utilisation réelle : 1100 h/an 20 KF x 570 - 10,37 KF noo Didacticiel 4 Qidacticiels 26 67 20'KFx4 = 80KF Arilortissement : 3 ans (cadre non ARDEMI) Formation du formateur 32·heures de formation réelle et 64 heures de prépa- 8 16 ration, connaissance personnelle du didacticiel. 0,17 KF x 32 x 3 = 16,32 KF Amortissement : 2 ans 16;32 KF: 2 = 8,16 1 Total 562 47 Coftt horaire d'enseignement : 562,47 = 0,9867 KF (pour 8 stagiaires) 570 46 Coût horaire d'ensei~nerilent par stagiaire : 0.9867 = 0,1233 KF soit 123,30 F 8 1.3.3.2 Calcul du cofrt horaire de formation par stagiaire : 1er cas - 8 stagiaires de Lyon et environs proches : Durée : 8 jours - 64 heures Nombre de stagiaires : 8 Coût d'enseignement 0,1233 KF x 8 x 64 = 63,13 KF Coût des repas 0,035 KF x 8 x 8 = 2,24 KF Cofit des salaires 0,08 KF x 64 x 8 = 40,96 KF Cofrt horaire de formation : ll!.Q...ll = 1,661 KF (pour 8 stagiaires) 64 Coût horaire de formation par stae;iaire: UQL = 0,208 KF soit 208 F 8 1 Total 63 2 40 106 KF 13 24 96 33 47 2ème cas - 8 stagiaires d'Annonay en formation à St Priest : Durée : 8 jours - 64 heures Nombre de stagiaires : 8 KF Coût d'enseignement 0,1233 KF x 8 x 64 ~ 63,13 KF 63 13 Cofit des repas 0,035 KF x 8 x 8 ~ 2,24 KF 2 24 Coût des salaires 0,08 KF x 64 x 8 ~ 40,96 KF 40 96 Frais de déplacement 0,002 KF x 150 x 8 x 2 ~ 4,8 KF 4 80 Remboursement des frais de déplacement avec une automobile personnelle pour 4 stagiaires. Soit pour 8 stagiaires, 2 voitures nécessaires assurant 150 Km journaliers (Lyon Annonay 75 km) pendant 8 jours. 1 Total 111 13 Coüt horaire de formation : 111 13 1,736 KF (pour 8 stagiaires) 64 Coût horaire de formation par stagiaire: 1.736 = 0,217 KF soit 217F 8 En résumé, si l'on prend en compte le coat horaire de formation par stagiaire, l'ensemble des calculs montre que l'introduction de ce nouvel outil induit un surcoût. Les établissements RVI retiennent pour leurs calculs une durée d'amortissement des micro-ordinateurs et des didacticiels de deux années. Cela conduit aux résultats suivants, qui, comme nous pouvons le constater, ne marquent pas une différence notoire. 48 Coût horaire d'enseignement par stagiaire 128,50 F (au lieu de 123,30 F) Coftt horaire de formation par stagiaire : -1er cas : 213 F (au lieu de 208 F) -2ème cas : 222 F (au lieu de 217 F) Cette faible différence liée à la période d'amortissement retenue montre que l'un des principaux points sur lequel nous sommes obligés de faire des hypothèses n'est pas très significatif. Il est important de savoir que certaines mesures qui reposent sur des hypothèses "subjectiveS 11 sont peu sensibles au choix fait par 1' évaluateur. Par contre, si l'on prend en compte le coût global du stage à nombre égal de stagiaires formés, les conclusions se montrent différentes. Le coüt du stage en formation mixte avec EAO se montre inférieur. Dans ce cas, les économies de salaires versés (formateur et formés) réalisées du fait de la diminution de la durée de stage apparaissent plus directement: pour les stagiaires de Lyon, coftt d'une formation traditionnelle (80 h) versus avec EAO (64 h) et économie réalisée par stage : les données sont pour chaque cas en Francs et en heures stagiaires. Stagiaires de Stage en formation Stage en formation Economie sur Lyon traditionnelle mixte avec EAO le coût total (80 h par stage) (64 h par stage) du stage 8 stagiaires 117 868 F (640h-s) 106 496 F (512h-s) 11 372 F 10 stagiaires 131 856 F (800h-s) 118 400 F (640h-s) 13 456 F 12 stagiaires 145 795 F (960h-s) 130 560 F (768h-s) 15 235 F 14 stagiaires 159 790 F (1120h-s) 143 360 F (896h-s) 16 430 F 16 stagiaires 173 785 F (1280h-s) 155 648 F (1024h-s) 18 137 F 49 Si l'on raisonne en coût total du stage, on note effectivement une baisse du coût lorsque l'on introduit les nouvelles technologies informatiques. La raison principale en est la baisse de la durée d'une session (gain de deux jours). lA Efficacité de l'enseignement assisté par ordinateur : analyse des effets quantitatifs et qualitatifs : L'étude de l'efficacité de I'EAO s'articule autour de trois axes. Ces derniers représentent les trois intervenants dans le processus de formation. Nous allons donc étudier successivement les effets sur les formés, sur le formateur et sur le système de formation. Dans chaque présentation, nous distinguons l'aspect quantitatif puis la dimension qualitative des phénomènes évalués. 1.4.1 Effets sur les formés : Effets cognitifs : En début de formation, aucun test de connaissances n'est proposé ; même si certains formés ont déjà quelques notions générales en commande numérique, aucun ne possède de bases en programmation Num 760. La mesure des acquisitions au sein du stage s'opère par la réussite des différents exercices proposés en tournage et fraisage ainsi que par la maitrise des armoires Num 760. Au niveau des deux exercices de fin proposés par le formateur, lés stagiaires 50 doivent écrire le programme de chacune des pièces et le rentrer sur le simulateur (armoire Num 760) qui donne le verdict. Il est important de rappeler qu'en formation traditionnelle, un seul exercice est proposé en tournage et fraisage, puis corrigé collectivement alors que, dans le cas présent, d'autres problèmes ont été traités auparavant. L'ensemble des binômes parvient donc, en des temps différents, à la réalisation de chacun des programmes. Ces derniers, écrits en utilisant les fonctions de base produisent des pièces "bonnes", l'optimisation du programme n'étant pas demandée. Temps d'apprentissage : Une grande diversité apparaît au sein des groupes. Nous prendrons en compte pour ce temps d'apprentissage, celui passé devant le didacticiel, seul diffuseur de la connaissance. Dans ce temps de passage, se trouvent regroupés l'examen du logiciel et les explications spécifiques au binôme apportées par le formateur. A ces durées, il convient d'ajouter l'heure de rappels divers, assurée par le formateur le deuxième jour. Dans le cadre de ces trois phases de formation, il s'avère intéressant d'apprécier différemment la dernière puisque le cursus diffère un peu par rapport aux deux premières. En effet, un plus grand nombre d'exercices ayant été proposés, les stagiaires se sont beaucoup plus trouvés en état de réinvestissement des notions apprises et, par conséquent, ont mieux apprécié leur degré de compréhension. Cela conduit à une plus grande utilisation de l'EAO puisqu'à chaque question insuffisamment comprise, ils retravaillent le module correspondant du didacticiel. La multiplicité de petits exercices soumis aux stagiaires s'avère donc utile car elle permet à chacun une 51 autoévaluation et dans certains cas, une reprise de la leçon. Cette pratique s'adapte très bien au public ciblé pour lequel ce type de formation se présente comme fort difficile. Il peut, de ce fait, travailler en profondeur certains aspects délicats à appréhender. Cela explique, dans le tableau suivant, les différences en temps d'apprentissage (cours EAO et exercices dirigés) entre les deux premières phases et la dernière. Par groupe et selon les sessions : temps d'apprentissage des stagiaires : Groupe 1 Groupe 2 Groupe 3 Groupe 4 Session de juin/juillet 8 h 45 12h25 12h25 14h25 Session d'octobre/novembre !Oh 9 h 30 13 h 17 h Session de novembre/décembre 13h45 17h25 18h55 13h30 De cette évaluation, émergent deux enseignements. Tout d'abord, malgré une grande variété dans la durée de passage devant le didacticiel, une réduction globale du temps d'apprentissage, par rapport à la formation traditionnelle, se réalise. Si l'on considère les six journées (sur les dix) consacrées, en formation traditionnelle, aux tournage et fraisage, cela représente quarante huit heures. L'exercice "final" occupant, par matière, normalement une journée complète, la durée de face à face pédagogique (donc apprentissage) s'élève à trente-deux heures ( 48 - (2 x 8) = 32 heures). En examinant le tableau ci-dessus montrant les temps d'apprentissage sur EAO, les gains de temps se montrent évidents (d'après les chiffres évalués, diminution de 72% (dans le meilleur des cas) à 41% du temps d'apprentissage). Ainsi que nous le verrons, cette baisse induit même une modification de la longueur du stage. 52 Il est à noter par ailleurs que la multiplicité des travaux individuels de réflexion agit sur la fréquentation de l'EAO. Plus les exercices sont nombreux, plus le recours au didacticiel augmente, chaque hésitation ou carence suscitant un retour sur micro-ordinateur. Il peut être, à ce niveau, intéressant de distinguer le temps de travail sur EAO relevant de l'apprentissage et celui appartenant à l'approfondissement de notions (ou à la vérification d'informations). Ce deuxième aspect apparaît significatif pour l'appréciation de 1 'incitation des personnes à travailler seules sur la machine. Ce phénomène conduit l'évaluateur à s'interroger sur l'intérêt des apprenants à s'investir plus complètement qu'en formation traditionnelle. Effets sur la proportion de stagiaires ayant atteint le niveau souhaité : L'introduction de l'EAO dans cette formation semble manifester un effet positif sur la proportion des stagiaires ayant atteint le niveau souhaité. Cela se révèle d'autant plus, que la très grande individualisation de la formation permet un suivi précis des apprenants. En tout état de cause, toutes les personnes sur lesquelles portent les évaluations menées ont atteint les objectifs prévus. L'analyse qualitative des effets de la mise en oeuvre de l'enseignement assisté par ordinateur au niveau des formés, se marque avant tout par une grande individualisation de la formation. Afin de l'apprécier au mieux, sous ses différents aspects, nous avons établi une enquête soumise aux formés lors du bilan de stage. 53 L'observation du stagiaire s'opère, tout d'abord, par l'examen des binômes qui avancent conjointement dans la connaissance. Peu à peu, les questions posées individuellement au formateur montrent les évolutions particulières. Il est clair que l'instructeur connaît les difficultés, les besoins voire même les carences de chacun. Cette relation individuelle rend possible une adaptation et une reformulation du cours propre à la personne qui travaille : le formateur suit donc individuellement l'apprentissage des notions. A l'issue de la session, le formateur peut apprécier les acquisitions de chaque stagiaire, alors qu'en traditionnel, sa vision demeure assez globale. L'introduction de l'EAO, de par la nouvelle approche de travail qu'elle engendre, permet un suivi très précis du stagiaire ... ce qui contribue non négligemment à un meilleur apprentissage. L'introduction de l'EAO marque, sans conteste, une individualisation notoire du travail. Dans le cas étudié, la structure habituelle est le binôme qui, malgré son unité forte, laisse tout de même une part non négligeable à l'individu seul... En ce qui concerne l'adaptation aux rythmes, connaissances et capacités propre à chaque formé, une des réactions positives fortes dégagées à l'issue des formations, recouvre le fait "d'aller à son rythme". Cela apparaît fondamental pour les formés. Ces derniers apprécient de pouvoir revenir en arrière ; ils reconnaissent qu'ils oublient ou négligent involontairement des aspects qu'ils doivent reprendre ensuite. A l'issue de leur première journée de stage, ils laissent déjà apparaître de telles réactions. Ils affirment surtout qu'ils n'auraient pas écouté toute la journée le formateur leur apportant autant d'informations. Il faut d'ailleurs noter l'insistance du responsable pour faire assurer des 54 pauses, l'ensemble des stagiaires étant "absorbés 11 par le didacticiel (travail durant deux heures consécutives devant le micro-ordinateur). L'adaptation aux capacités propres à chaque formé semble évidente. L'évolution différente dans l'acquisition des connaissances et 1' élaboration des exercices le démontrant aisément. La relative hétérogénéité des groupes ne revêt aucune influence quant à l'évolution du cours. Bien au contraire, peu à peu se développent des échanges inter-groupes très riches. L'introduction de l'EAO induit donc une refonte complète de la pédagogie ... ce qui amène progressivement à l'autonomie. Cette dernière se construit peu à peu, d'abord au sein du binôme puis globalement du groupe classe. Au fur et à mesure de l'avancée du cours se constitue plus lentement certes, une autonomie individuelle y compris, chez les moins aptes à une telle attitude. Lors des commentaires libres dans 1' enquête soumise aux stagiaires, réapparaissent sans cesse des points forts qu '-il est intéressant de citer : "progresser à sa vitesse, en fonction de ses connaissances, travailler à son rythme, être autonome et pouvoir revenir sur une leçon non ou mal apprise 11 • Il y a d'autre part l'apprentissage de "savoir-être" et de 11 Savoirfaire". La pénétration de l'EAO dans la formation laisse apparaître des effets absents en traditionnel. Ces derniers contribuent de façon non négligeable, notamment en commande numérique, à un meilleur apprentissage. Ce "savoir-être" apporte non seulement un "plus" au niveau de la formation en elle-même mais se ressent aussi de manière forte sur le poste de travail. La très large autonomie laissée par l'EAO aux apprenants leur fait très vite appréhender la nécessité de prises de notes bien présentées et bien articulées. La possibilité de pouvoir revenir en arrière au sein du didacticiel incite les formés à une prise 55 de notes structurée. Cela se retrouve peu après, lors de la création de programmes. Progressivement, les formés ressentent l'obligation de venir à l'équipement Num 760 avec quelque chose de construit accompagné d'annotations adéquates. Un autre aspect relève de l'incitation à recueillir les informations nécessaires et surtout à savoir les rechercher. Cela apparalt tout d'abord avec le didacticiel ; les formés rappellent tel ou tel module pour réviser une notion puis, par la suite, doivent chercher dans les fascicules appropriés les erreurs émergeant du programme et signalées par le simulateur. Ce recueil d'informations, totalement nécessaire lors de la mise en oeuvre d'une machine à commande numérique est fondamental. Il s'agit d'apprendre aux formés à savoir aller chercher une donnée soit dans un des nombreux livrets accompagnant la MOCN soit auprès d'une personne compétente capable de la fournir. Cette acquisition du "savoir-faire" se marque par le travail en binôme. Les formés parviennent plus facilement et plus naturellement à réagir face à une situation, à expliquer à l'autre, voire même à argumenter et défendre leur réponse. Cette communication inter-individuelle entre les formés modifie totalement la nature du système d'apprentissage. Globalement, de ce type d'action, découle une incitation à l'autonomie. On peut raisonnablement penser que cette nouvelle approche induit une acquisition de méthode de travail avec une ouverture vers l'esprit de synthèse, de structuration et de clarté dans les informations recueillies et notées. Au-delà de toutes ces attentes qui, effectivement, se réalisent de manière inégale (du fait de la relative hétérogénéité des groupes), se dessine l'objectif d'apprendre à apprendre. 56 Une autre dimension primordiale liée à la mise ·en oeuvre de l'EAO est l'interactivité. L'appréciation de l'interactivité relève avant tout de la nature du dialogue homme/machine. Dans le cadre de l'enquête proposée aux formés, il est possible d'appréhender le degré d'interactivité du didacticiel proposé. D'après les réponses fournies, les vingt-deux apprenants notent un dialogue permanent tout au long du cours et ressentent le fait d'être actifs au travers d'Une conversation avec l'ordinateur. L'échange leur paraît riche, accompagné de nombreuses interventions. La machine les sollicite beaucoup et les fait réagir souvent. Un des éléments essentiels de l'apprentissage relevant de la reprise et du réinvestissement des connaissances nouvelles, les stagiaires notent cette impression effective de maniements successifs et répétés de concepts nouveaux. Il apparaît sans équivoque que ces interventions quasi constantes de l'ordinateur imposent aux élèves une attention beaucoup plus soutenue. D'une manière générale, le didacticiel utilisé apparaît développer une assez forte interactivité, l'ensemble des questions relatives à ce domaine trouvant des réponses positives. En ce qui concerne le degré d'acceptation du didacticiel et de l'EAO, les questions posées relatives à l'appréciation du didacticiel "DIDA CN" revêtent des réponses plutôt positives. Les explications apportées apparaissent pour tous comme claires et suffisantes. L'ensemble du cours se perçoit comme intéressant, amusant, attrayant, composé d'un vocabulaire simple permettant d'apprendre beaucoup. Les parties fondamentales sont estimées bien mises en relief et l'utilisation des couleurs bien étudiée. L'EAO, dans son ensemble, dégage, semble-t-il, un caractère positif. A l'exception d'un stagiaire pour lequel l'ordinateur n'apparaît 57 convivial qu'à partir du deuxième jour, l'effort d'adaptation à ce nouvel outil reste limité. La légère appréhension des premières minutes de contact avec la machine, laisse vite la place à une assurance de manipulation notoire. Ce type de formation, au travers des réponses fournies, demeure à développer puisque l'BAD paraît très intéressant, moins fatigant et très efficace pour apprendre. Les formés notent une impression de comprendre beaucoup plus facilement et rapidement. Par ailleurs, la durée d'une séance EAO ne se ressent ni trop courte, ni trop longue ; 1 'inclusion de cette technologie rend subjectivement la durée de la formation plus courte par rapport à l'enseignement traditionnel. Effets sur le formateur : Il est à considérer, dans cette évaluation, plusieurs dimensions, quant à la présence du formateur. L'intégration de l'BAD dans la formation relève avant tout d'un plus grand travail individuel au travers d'une relation homme/machine. La tendance, lors des utilisations de l'BAD est tout de même le plus grand effacement possible du formateur ... un autre objectif parallèlement visé étant 11 apprendre à apprendre seul 11 • Cela incite donc l'instructeur à quitter la salle de façon à ce que les formés s'autonomisent dans leur travail. Lors de la formation de Juin/Juillet, ses absences ont été plus importantes, alors que pour les deux phases suivantes, un encadrement plus fort s'est avéré nécessaire. Cela semble avant tout lié au public un peu différent des deux dernières sessions. Son comportement vis-à-vis de la formation relevait d'une moins grande motivation. 58 Nous -n'avons pas opéré de mesure exacte du temps de présence dans la salle mais évaluerons grossièrement à 80% du temps pour la phase de Juin/Juillet et 90% pour les deux suivantes. Pour chacune des sessions, l'enseignant intervient collectivement une heure trente pour présenter le stage, quelques idées générales sur la commande numérique et pratiquer un petit bilan rapide de fin de journée. Corrélativement, une heure de bilan de fin de stage permet de connaître les réactions et critiques des stagiaires à l'issue de la formation reçue. Globalement, incluant ces plages "communes 11 à toutes les . sessions, nous obtenons approximativement les temps d'intervention magistrale pour chacune des trois phases : * Session de Juin/juillet : 3 h 40 * Session d'Octobre/Novembre : 7 heures * Session de Novembre/Décembre : 5 h 20 Les différences importantes entre ces trois durées semblent s'expliquer par le degré d'hétérogénéité des groupes, des progressions dans la connaissance et par le niveau général des classes. L'interprétation de ces écarts est à manier avec prudence car, dans ce type de pédagogie, l'élément essentiel repose sur la relation binôme, ordinateur, formateur. Comme on peut le constater, l'intervention magistrale face au groupe complet revêt, pour ce cadre de formation, une place mineure. L'apport essentiel provient du didacticiel, et surtout de la "reformulatian" du message, par l'enseignant, auprès des binômes. Des possibilités d'absence du formateur sont concevables mais, en l'état, peu significatives par rapport à la durée totale du stage. 59 Il s'agit, dès lors, d'examiner plus en détails la nouvelle tâche de l'instructeur. C'est ainsi qu'une étude qualitative sur sa place et son rôle trouve son importance. Cette partie, menant réflexion quant à la place, au rôle et à la rigueur pédagogique imposée par l'EAO à 1' enseignant se constitue à partir de l'étude du terrain et de deux enquêtes : l'une adressée aux formés et l'autre au responsable de la diffusion de la connaissance. Place du formateur (dimension pratique): L'enseignant se "glisse" peu à peu dans l'EAO et constitue progressivement sa place. Sa principale difficulté est d'être présent au moment adéquat tout en se montrant de plus en plus discret. Devenant plutôt un consultant, il s' 11 effacen peu à peu pour parvenir à des interventions très ciblées et très personnalisées. Sa place s'amoindrit puisqu'il n'est plus le centre du groupe. Cette nouvelle situation ne perturbe en aucune façon le formateur rencontré. Selon lui, son intervention au sens magistral du terme diminue pour parvenir à un enseignement spécifique appliqué à tel binôme sur tel sujet. C'est alors un enrichissement notoire de sa place. Au fur et à mesure du déroulement de la formation, 1' enseignant s'absente volontairement de la salle. Au début, cela trouble quelque peu les stagiaires mais l'autonomie de travail grandissant, l'absence se remarque de moins en moins. Contrairement à l'ordinateur qui fournit questions, commentaires et même réponses, s'exerce chez l'instructeur toute une analyse particulière des binômes et de leurs réactions ; cela induit même parfois des interventions spécifiques de sa part. Même si sa place évolue dans un sens moindre, son rôle. n'en demeur_e pas moins fondamental... bien que quelque peu modifié. 60 R6/e du formateur (dimension pédagogique) : Il s'agit, pour lui, d'abandonner en partie le transfert général de connaissances au profit de l'assistance. La relation pédagogique détenteur du savoir/groupe devient plus individuelle (binôme ou personne précise). Au-delà de la reprise des apprentissages, l'enseignant reformule et adapte le message à chaque individu. Bien au-delà de cette individualisation, le formateur connaît de manière plus approfondie son public et peut, par conséquent, devenir encore plus exigeant avec ceux, notamment, qu'il sent plus avancés. Par contre, il lui est possible d'affiner des explications, et donc de faire mieux comprendre les concepts aux élèves marquant plus de difficultés. Le rôle du formateur, par rapport à l'enseignement traditionnel, diffère donc totalement ; le contact individuel le rend véritable "adaptateur" du message au groupe chargé de se 1' approprier. De plus, ses interventions en termes de "savoir-travailler" prennent une place importante : prises de notes, synthèse des points abordés, rédaction et correction des programmes... Quoi qu'il en soit, se maintient une habitude d'appel au formateur. Chaque formé ressent la nécessité d'un recours au "détenteur du savoir", à celui qui conduit (même si son rôle diminue) le groupe. Dans les décennies futures, ce rôle de magister s'amenuisera peut-être peu à peu, le nouveau public à former s'habituant progressivement à l'autoformation ou tout au moins, à une relative prise en charge par rapport à 1' acquisition du savoir. Rigueur pédagogique demandée au formateur dans la conception et la réalisation de la formation : Dans le cas présent, l'utilisation de l'EAO ne forme pas, pour l'instructeur interrogé, un élément canalisateur trop fort. "L'imposi- 61 tion" d'une plus grande rigueur s'applique plus .à la; réflexion pédagogique. Dégagé de la première diffusion du contenu, l'enseignant se doit de trouver tous les moyens pour une explication appropriée. Cela nécessite donc une analyse plus fine de la difficulté rencontrée et l'obligation de posséder plusieurs formules 'd'explicatiOns. Le formateur prépare cette souplesse face aux réactibD.s diverses des formés par rapport à l'ensemble des difficultés susceptibles de surgir tout au long du stage. 1.4.3 Effets sur le système de formation : Le caractère encore expérimental et limité dans le temps permettra seulement d'apporter quelques résultats significatifs et surtout des hypothèses pour l'avenir. En effet, toute réflexion quant à· la nature des effets sur le système de formation impose un recul temporel suffisant. L'intégration de l'EAO dans cette formation en commande numérique induit un effet réel sur la durée d'une session de formation. Pour atteindre les m€mes objectifs pédagogiques, huit journées au lieu de dix s'avèrent nécessaires. Ce gain s'est confirmé tout au long des sessions évaluées. Il faut noter, parallèlement, une meilleure connaissance individuelle des formés, ce qui ne permet pas d'envisager une réduction de temps sans vérification réelle des acquis. Ce gain de deux jours est un effet important pour le système de formation puisqu'il peut avoir d'importantes répercussions. En effet, une telle diminution s'appliquant sur plusieurs stages, des possibilités d'organisation de sessions supplémentaires apparaissent. Par ce biais, l'emploi de ce nouvel outil rendra 62 possible, à terme, dans ces mêmes conditions d'utilisation, une formation d'un plus grand nombre de personnes. Sans anticiper sur des résultats perceptibles plus tard, il est possible d'envisager des répercussions sur le cycle suivant. Aucun groupe (ayant suivi l'EAO) n'étant revenu en formation 11Base de programmation Num 760", l'impact relève d'hypothèses. Il s'agit, parallèlement à l'amélioration permanente du premier niveau, d'analyser le second et éventuellement d'apporter les modifications nécessaires. Le réinvestissement permanent des notions apprises et l'acquisition d'une forme de travail individuelle devraient générer des influences sur le second cycle. Ce dernier débutant par un jour et demi d'exercices de rappel, il sera facile d'apprécier les évolutions du groupe. De plus, toute révision habituellement assurée par le formateur, pourra l'être avec l'EAO. Dès lors, ces reprises de cours, nécessaires pour la suite, glissent là encore vers une plus grande individualisation. Chacun reverra le, ou les modules spécifiques à ces carences et trouvera de ce fait une adaptation à ses propres difficultés. S'ils se vérifiaient lors de la prochaine session 11Base de programmation Num 760", ces apports pourraient aussi développer des effets sur la suite du cursus ; des modifications apparaîtraient envisageables et seraient apportées en fonction des constats. Partant d'observations réalisées au niveau des stages et d'entretiens avec divers responsables de formation, quelques directions pour les années à venir se dessinent. 63 Le système de formation, sans cesse à l'écoute des différents services de l'entreprise, tente d'accorder une réponse à chacun des besoins. Les sessions de Commande Numérique accueillant des personnes d'origines professionnelles diverses (utilisation, méthodes, gestion, maintenance ... ), n'apportent pas nécessairement satisfaction complète. Des remarques de ce type reviennent sans cesse de la part des formés. Dès !989, un réaménagement du cours, avec complément spécifique selon le cadre d'activité, devrait voir le jour. Le corpus théorique, les exercices de· réinvestissement seraient modulés par rapport aux attentes. La plateforme théorique indispensable quel que soit le secteur, demeurerait apportée par 1 'EAO et complétée par le formateur. L'individualisation se doublerait de la personnalisation de la formation. Cette totale adéquation entre le besoin exprimé et l'apport effectif des connaissances serait un effet considérable de l'EAO à la fois sur la formation et sur le poste de travail. Corrélativement, l'objectif d'"apprendre à apprendre", devrait, dans quelques années redéployer le système de formation. La création de centres-ressources avec animateur viendrait en complément des formations conventionnelles. Ce type d'enseignement intégrant l'EAO, réalisé essentiellement à St Priest, n'induit, à l'heure actuelle, aucun effet sur la décentralisation des stages. Quoi qu'il en soit, la libre circulation des disquettes sur les différents sites imposerait la mise en place de démultiplicateurs. Il serait alors certain que le même contenu se diffuserait sur toutes les unités de l'entreprise. Une véritable homogénéisation des contenus développés à partir des mêmes cadres, verrait le jour. Pour l'heure actuelle, la priorité reste aux centres de formation. Les toutes prochaines années apporteront des éiéments de réflexion plus précis. La mise en oeuvre progressive de l'EAO à partir d'un véritable tâtonnement expérimental fournira un terrain 64 riche et une expérience suffisante pour approfondir les effets qualitatifs sur le système. 1.5 Rapport coût-efficacité de I'EAO mis en oeuvre en "Initiation à la commande numérique 11 : Avant d'établir, à 1 'issue des formations évaluées, les conclusions relatives à la mise en oeuvre de l'EAO, il est important de bien situer le niveau des connaissances et savoir-faire à acquérir par rapport au public ciblé. Tout d'abord il faut considérer ce cours comme difficile pour des personnes agissant chaque jour dans le concret, opérant par manipulations réelles et abordant tel ou tel problème par tâtonnement expérimental. Le niveau d'un tel enseignement sollicite un pouvoir d'abstraction relativement fort et un degré très important d'anticipation face à l'action. Il est bien certain que l'élaboration de programmes en commande numérique, objectif non visé en soi mais passage quasi obligé pour décoder, par la suite, un programme courant, n'est pas de première évidence. Les stagiaires, remarqués comme de bons professionnels, abordent une démarche intellectuelle de résolution de problèmes qui contraste avec leur vécu habituel manifestement très empirique. Ayant bien situé le cadre général de ces actions de formation, il apparait dès lors opportun de réfléchir sur le rapport coût-efficacité. Ainsi que nous avons pu le constater lors de l'étude des coûts, l'introduction de ce nouvel outil induit un surcoût lorsque l'on raisonne en collt heure/stagiaire. Par contre, si l'on prend en compte le coût du stage à effectif identique, on voit apparaitre une baisse du coût. Il est certain que le gain de deux jours de formation contribue à limiter les surcoûts liés au matériel supplémentaire nécessaire. La 65 conclusion à tirer, quant aux coûts, dépend de l'indice de comparaison choisi. Si l'on retient la, comparaison en termes de coût de stage, la conclusion est pleinement favorable. Par contre, si l'on regarde le coût heure/stagiaire, un surcoût apparaît. Ce dernier n'est cependant pas considérable puisqu'il représente une augmentation de 13% du coût de formation traditionnelle. Ayant apprécié les différents aspects de la problématique des coûts, il devient opportun d'envisager les éléments susceptibles d'améliorer l'efficacité. Pour cela, une reprise des divers effets de la mise en oeuvre du nouvel outil permettra d'envisager pour chacun d'eux les possibilités d'amélioration (voir synoptique, en fin de chapitre, sur les formés, le formateur et le système de formation). Tout d'abord, il paraît difficile d'abaisser encore le temps d'apprentissage. Seule une individualisation très forte (ce qui oblige une évaluation préalable de la personne) pourrait permettre d'amenuiser drastiquement cette période d'acquisition. Il est bien sür pOssible à des personnes connaissant déjà un peu la commande numérique d'aborder plus rapidement les exercices individuels. Une question se pose alors : ont-elles encore une place en ce stage d'initiation? Par ailleurs la très forte individualisation du travail, renforcée par une relation personnelle avec l'ordinateur assure un effet non négligeable sur la proportion des stagiaires ayant atteint le niveau souhaité. Cela est d'autant plus vrai qu'une réelle appréciation des acquisitions s'avère possible au niveau de chacun des formés. Pour ce qui relève du temps d'intervention du formateur, il est possible d'envisager à terme une présence un peu plus partielle. Elle ne peut, dans ce contexte, baisser beaucoup, la reformulation individuelle gardant toute son importance. La session ayant déjà diminué de deux jours, il semble, là encore, difficile d'envisager une durée bien moindre. Pour certains stagiaires ayant déjà quelques 66 notions, ou d'importants pré-requis, un gain supplémentaire d'une journée apparaît possible. Quoi qu'il en soit, la durée de huit jours semble bien adaptée au public ciblé. L'amélioration de l'efficacité repose aussi sur d'autres facteurs qualitatifs donc non mesurables. Ils revêtent néanmoins, comme nous l'avons étudié, un caractère fondamental et agissent même sur les éléments quantitatifs. Plus généralement, il est certain que de plus en plus, chacun trouvera en formation une réponse réelle à ses besoins spécifiques, et ce, poUr son propre secteur d'activité. Cette spécificité s'établira à double niveau : celui de l'individu et celui du service dans lequel il travaille. Bien au-delà de tous les apports relatifs à l'initiation à la Commande Numérique, un autre point fondamental, qui sera capital pour aborder les années futures se doit d'être pris en compte : apprendre à apprendre. L'évolution rapide des postes de travail ainsi que leur spécificité croissante induiront inéluctablement une nécessité de se former. La demande de formation trouvera-t-elle en face d'elle une offre suffisante ? Le rééquilibrage de l'inadéquation quasi probable entre les deux passera certainement par une démarche individuelle. 67 Renault Véhicules Industriels Tableau synoptique des effets de l'EAO par rapport à une formation traditionnelle 111nitiation à la Commande Numérique" Evaluation quantitative Approfondissement des notions par réinvestissement dans un plus grand nombre d'exercices (8 au lieu de 2) Réalisation de tous les exercices par tous· les stagiaires Baisse du temps d'apprentissage (plus de temps dégagé pour les exercices) Evaluation qualitative Meilleur suivi de chaque stagiaire Individualisation très forte de l'apprentissage : travail à son propre rythme Activité intra binôme et inter binômes forte : développement du travail par équipes Autonomie dans le travail ; retour arrière, reprises, révisions toujours possibles Interactivité : dialogue permanent avec la machine Apprentissage d'un "savoir-être" :prise de notes (articulation, clarté), recherche d'informations ... Evaluation quantitative Abaissement du temps de présence du formateur (10 à 20%) Abaissement du temps d'intervention collective Evaluation qualitative Place nouvelle de l'enseignant au sein du groupe Meilleure connaissance des formés et de leurs acquisitions Reformulation spécifique et individuelle du message pédagogique Adaptation de l'instructeur aux différents rythmes de travail Apprentissage de méthode de travail : prise de notes, synthèse, clarté des programmes et des modifications apportées ou à établir 68 Evaluation quantitative Durée du stage (8 jours au lieu de 10 journées) Effets futurs : Organisation de sessions supplémentaires Formation d'un nombre plus grand de personnes Répercussions possibles sur le cycle suivant Evaluation qualitative Meilleure réponse aux besoins par rapport au service d'origine du formé (utilisation, méthodes, maintenance ... ) Personnalisation de la formation Effets futurs : "Apprendre à apprendre" pour un redéploiement futur du système de formation, création de centres ressources Même diffusion de contenus identiques à partir des didacticiels avec démultiplicateur : homogénéisation des formations . Chapitre 2 Evaluation coût-efficacité de I'EAO en formation "Connaissance de l'entreprise" au Centre de Formation de la petite entreprise et du commerce (CEPC) de la Chambre de Commerce et d'Industrie de Lyon 71 Dans le cadre du dispositif de l'alternance pour les jeunes, la Chambre de Commerce et d'Industrie de Lyon (CCIL) propose les différents stages relatifs aux principaux contrats. Leur réalisation, leur suivi, et la gestion de leur financement relèvent de la Délégation à la Formation Continue et à l'emploi, service de la CCIL. A chacun des trois types de contrats (initiation à la vie professionnelle, adaptation, qualification), correspond une formation spécifique comprenant quelques parties identiques. Parmi celles-ci, se trouve le module 11 Connaissance de 1' entreprise" intégrant 1' enseignement assisté par Ordinateur, objet de notre évaluation. Avant d'aborder plus spécifiquement cette dernière, quelques considérations générales relatives à ce jeune public s'imposent. Tout d'abord, la spécificité du cursus scolaire de ces personnes, ainsi que leur grande instabilité professionnelle les rendent, pour la plupart, fort démotivées face à toute formation. De plus, une vision négative de l'entreprise, apparue à l'issue de leurs divers emplois précaires ne les incite pas à une curiosité aigüe en ce domaine. Le caractère contraignant ou obligatoire de la présence à ce stage ne contribue pas à une réelle motivation. Il s'agit, par conséquent, d'apporter à ces jeunes une formation très proche de leur vécu quotidien, intégrant une pédagogie adaptée. Face à ces difficultés inhérentes au stage lui-même, la délégation à la formation continue, ainsi que le Centre de Formation de la Petite Entreprise et du Commerce (CEPC) ont, sans cesse, tenté d'améliorer les conditions d'enseignement. 72 Lors des premières sessions, le formateur intervenait de manière magistrale et diffusait unilatéralement les connaissances. Très vite, les stagiaires renouaient avec le milieu scolaire et devaient rester passifs durant tout le cursus. Un jeu fut alors introduit ; il apportait une certaine action mais faisait passer une idée vieillie de 1' entreprise. L'arrivée des techniques modernes de communication incita à envisager l'intégration de films video au sein de la formation. En tout état de cause, il s'agit de trouver des outils pédagogiques permettant une valorisation du jeune, développant ainsi un certain intérêt. L'animation repose avant tout sur 1' expérience personnelle, et a pour obligation de proposer des situations actives. Dans ce contexte, la naissance de l'ARDEMI ouvrit l'opportunité d'une mise en oeuvre de l'EAO. La création du didacticiel relatif à ce type de public se substitua à l'élaboration d'un film vidéo. Ce nouvel auxiliaire pédagogique va-t-il permettre d'améliorer la formation ? Contribuera-t-il à développer chez les stagiaires, le goût et le désir de se former ? Autant de questions difficiles auxquelles doivent répondre les responsables, afin de toujours mieux aider ces jeunes intégrant peu à peu la vie professionnelle. 2.1 Introduction de l'EAO dans la formation "Connaissance de l'entreprise 11 : Partant des préoccupations inhérentes à ce public jeune et spécifique, il a donc semblé opportun d'introduire l'enseignement assisté par ordinateur. 73 Présentation du stage : Le stage intitulé 11Connaissance de l'~ntrepris;e" s'adresse aux jeunes en contrats d'alternance. Diffusé au Centre dè Formation de la Petite Entreprise et du commerce (CEPC) à Lyon-Vaise, il porte sur une durée de deux jours et demi. Une demi-journée complémentaire prise en charge par une personne de la Délégation à la Formation Continue et à l'Emploi (DFCE) de la CCIL traite la législation.Le statut juridique du stagiaire, ainsi que ses droits et obligations sont abordés. Pour notre part, nous considérons les deux jours et demi relatifs à la découverte de l'entreprise. Ces objectifs sont : - la sensibilisation à une culture et à une image moderne de 1' entreprise. -l'insertion du jeune dans la vie professionnelle par une connaissance concrète de 1' entreprise . - la diffusion d'une meilleure compréhension du fonctionnement de l'entreprise et de la place occupée par le stagiaire en son sein. - l'incitation à la réflexion et au désir d'en savoir plus afin de renouer avec la formation et ses opportunités. Forme d'intégration de l'EAO : Prenant en compte la typologie des formes d'intégration de l'EAO telle que définie par nos soins, il s'agit d'appliquer cette grille au cas évalué: 74 But apporte une formation nouvelle à l'apprenant Contexte intègre les formations existantes Lieu dans le centre de formation Nombre de micro-ordinateurs une salle de type "laboratoire" : 8 appareils Moment pendant le temps de travail Manière intégrée Public public à motiver Unité de base quasi individuelle Nature apprentissage Intégration "mode mixte" Relation au formateur avec alternance Déroulement des stages et évaluation: La formation diffusée au CEPC se présente sur deux jours et demi et intègre un enseignement "mixte" avec' alternance d'EAO et de traditionnel. Le formateur appuyant son intervention sur un module du didacticiel dégage et reprend les notions clés. Peu à peu, une ouverture du sujet s'opère soit sur son initiative soit par questions spécifiques des stagiaires. Lors du passage de l'un à l'autre, le groupe change de lieu. La salle informatique se trouve au premier étage, les cours étant dispensés au second. Cela ne doit pas être considéré comme un détail ; en effet, les jeunes trouvent dans ces mutations une certaine trève pour mieux appréhender la suite. Il ne faut pas négliger la très faible capacité d'attention qu'ils développent et, par conséquent, la 75 nécessité pour eux d'être actifs physiquement et intellectuellement. Ces déplacements obligés leur permettent donc une reconcentration pour aborder la plage suivante. Cela apparaît d'autant plus vrai que, pour un ou deux cas particuliers de demi journées vécues entièrement en traditionnel (indisponibilité partielle de la salle informatique), trois heures d'enseignement traditionnel s'écoulaient difficilement (malgré quelques pauses). Il ne s'agit absolument pas de cours au sens habituellement entendu, les stagiaires ne prennent aucune note manuscrite (ou très peu). Afin de les faire mieux réfléchir sur la nature même de 1' entreprise (vécue par eux comme un tout indissociable), il est utile de 11 Casser" cette entité et de recomposer les diverses parties en un 11 tout" moins figé. D'autre part, il s'agit de montrer qu'elle évolue dans un contexte général dont le responsable a obligation de tenir compte. Toute une approche positive s'avère donc nécessaire. Dans 'bien des cas, une reconstruction totale de la notion s'impose. Cette double difficulté de recomposition des idées et de remotivation des élèves doit être surmontée au mieux. Une appréciation positive du stage doit être véhiculée par les contractants lors de leur retour en poste. Dans le cas présent, le souci d'efficacité se double de celui de qualité. Mise en oeuvre de l'évaluation : Dans un premier temps, nous avons pris contact avec ce public et avec plusieurs personnes intervenant auprès de lui. Nous. avons ensuite réalisé une approche précise du contenu d'enseignement (afin d'élaborer des tests de connaissances). Une présence régulière et une participation effective à de nombreuses sessions nous ont permis de 76 mener à bien cette évaluation qui porte sur 123 stagiaires. Par la suite, nous avons tenté, par notre assistance aux cours et lors de divers entretiens tant avec les formateurs qu'avec le responsable administratif du stage, de bien cerner chaque groupe. Le CEPC ne diffusant désormais plus de cours traditionnel comme auparavant, nous ne disposons d'aucun cadre de comparaison entre les deux formes d'enseignement. Didacticiel utilisé : Le didacticiel réalisé dans le contexte de l' ARDEMI par la Chambre de Commerce et d'lodustrie de Lyon, propose essentiellement des situations concrètes. Son objectif essentiel est de permettre au stagiaire de mieux se situer dans 1' entreprise et, corrélativement, de comprendre les flux entrée/sortie. Pour cela, llD cadre réel se met en place avec implication de l'apprenant. Par l'intermédiaire de différentes situations ludiques, le formé découvre en six modules les grandes fonctions de 1' entreprise créée par six amis (Vente-Finances-Production-Approvisionnement-Personnel-Direction générale). 2.1.6 Objectifs atteints : L'atteinte des objectifs fixés s'apprécie avant tout qualitativement, par une vision plus positive de l'entreprise. Cela induit une meilleure compréhension de son fonctionnement, et l'acquisition de notions fondamentales spécifiques. Ces dernières, abordées lors du stage, relèvent d'apports cognitifs quantitativement évaluables. Les 77 écarts entre les deux tests de début et de fin permettent de les analyser. Cependant, cela s'avère être un des éléments d'appréciation parmi d'autres. Ce qui est visé se rapporte avant tout au degré de satisfaction du jeune par rapport au stage et à son insertion réussie au sein de l'unité de travail. Comme indiqué ci-avant, notre étude ne peut être totalement comparative, aucune formation de ce type n'étant désormais diffusée selon le mode traditionnel. L'évaluation de l'efficacité interne se place, dans ce contexte, par rapport à l'atteinte des objectifs. 2.2 Etude comparative des coûts d'une formation traditionnelle puis 11mixte" : "Connaissance de l'entreprise": Cette étude comparative des coûts a pour base les calculs relevant d'une formation traditionnelle telle qu'elle était réalisée avant l'introduction de l'EAO. D'après les indications des différents responsables de ce type de formation, le stage se présentait effectivement de manière similaire, mais avec intervention de l'enseignant. 2.2.1 Cadrage méthodologique et hypothèses retenues : Avant de présenter pour chacun des cas le détail des coûts, il nous faut indiquer que seuls les coû.ts opérationnels seront pris en compte. Nous ne pouvons intégrer la part (quasi négligeable par rapport à l'ensemble des prestations fournies) de la direction générale, et des services fonctionnels rapportés à la formation envisagée (CCIL). 78 Par ailleurs, nous sommes en possession de chiffres relatifs à tout le centre de Vaise ; cela nous oblige de faire apparaltre la part relative au stage "Connaissance de l'entreprise". Les données mises à notre disposition appartenant à des documents internes non publiables, nous ne pouvons qu'indiquer les différents ratios utilisés (chiffres hors taxes). Dans le cas de cette évaluation, nous nous plaçons dans le contexte CEPC, et ne prenons, par conséquent, pas en compte le salaire et les frais de déplacement des formés. Ces derniers sont pris en charge par les entreprises. Il est vrai que le coût de formation s'en trouve sous-estimé. Cependant, la base de comparaison des coûts étant la même ( coüt horaire d'enseignement par stagiaire), il est tout de même intéressant d'examiner leurs rapports selon -les deux modes d'enseignement. L'introduction de l'EAO limitant, actuellement, le nombre de stagiaires à 16, nous proposons les calculs élaborés à partir de ce chiffre ; l'effectif en traditionnel était de 18. En ce qui concerne l'amortissement des matériels informatiques, nous conservons une période de quatre années pour les micro-ordinateurs et de trois pour le didacticiel. 79 Collts d'une formation traditionnelle ; 665 heures annuelles de diffusion en "Connaissance de l'entreprise" Année 1987 Groupe de 18 stagiaires- Durée: 2 jours et demi: 17,5 heures Personnel . Permanent CEPC Part relevant des stages évalués . Animateurs Coût salarial 240 F/h Gestion . Assurances . Locations charges J'\urface ~mlle cours x nhre h/staPiaires Con. Ent. . Entretien énergie lAire totale locaux ped x nbre total h/stag. Vaise . Location entretien matériel bureau . Reproduction fNbre I!hotoÇ;ogies gestiQn x nbre hlstag:.Con.Ent. . Fourniture bureau ~.,.Nbre total photocopies x nbre h/stag. gestion . PIT . Dépenses informatiques Nbre de stagiaires Cgn Ent. de gestion Nbre de stagiaires Vaise . Déplacements responsa- 1 x Nbr~ g'heures st!!,g~ Con. Ent ble cycle 7 Nb re d'heures stage gestion . Fournitures pédagogiques . Repas élèves l Total Coût horaire d'enseignement : 336.57 KF = 0,51 KF (pour 18 stagiaires) 665 COUT HORAIRE D'ENSEIGNEMENT PAR STAGIAIRE: 0 51 KF = 0,028 KF soit 28 F 18 KF 70 159 60 0 04 0 92 0 36 0 12 4 12 4 41 49 86 1 08 2 06 8 36 336 57 80 Coût d'une formation "mixte" 665 heures annuelles de diffusion en "Connaissance de l'entreprise" Année 1987 Groupe de 16 stagiaires- Durée: 2 jours et demi: 17,5 heures KF Personnel . Permanent CEPC Part relevant des stages évalués 70 . Animateurs Coût salarial 240 F/h 159 60 Gestion . Assurances 0 11 . Locations charges Surf.salle cours + salle inf x nQre h/stag. Con Ent. 2 31 Aire totale locaux ped x nbre total h/stag. Vaise . Entretien énergie 0 91 . Location entretien 0 11 matériel bureau . Reproduction Nbre nhotocogies gestion x nbre h/stag.Con.Ent 3 76 Nbre total photocopies x nbre h/stag. gestion . Fourniture bureau 4 02 . P'IT 47 09 . Dépenses informati- Nbre de stagiaires Con. Ent 1 02 ques de gestion Nbre de stagiaires Vaise . Déplacements respon- 1 x Nbre d'heures stage Con. Ent. 2 06 sable cycle 7 Nbre d'heures stage gestion . Fournitures pédagogi- 8 ques . Repas élèves 36 . Micro-ordinateurs 158 x 1 x nQre d'heures utilisation Con.Ent 18 96 4 nbre d'heures total util. des ordinat. . Interpréteurs Q.l..û. 1 40 4 . Didacticiel 540 x 1/3 (coût de sous-traitance pour la réalisation 180 du didacticiel) 1 Total 535 35 Coût horaire d'enseignement : (pour 16 stagiaires) 81 535 35 665 =0,805 KF COUT HORAIRE D'ENSEIGNEMENT PAR ST A GlAIRE :. 0,805 KF =0,050 KF soit 50 F 16 2.3 Efficacité de l'enseignement assisté par ordinateur : analyse des effets quantitatifs et qualitatifs : Selon notre présentation type, nous procédons à une étude sur les effets de l'EAO sur les formés, le formateur et le système de formation. U.l Effets sur les formés · Effets cognitifs : Ainsi que nous 1 'avons déjà mentionné, nous soumettons en début et fin de stage un test de connaissances élaboré par nos soins (avec les conseils des différentes personnes rencontrées à la Chambre de Commerce). Sa création a suscité beaucoup de difficultés puisque la formation aborde, de manière générale, beaucoup de points clés relatifs à l'entreprise. De plus, les stagiaires, pour une grande partie, ne sauraient apporter des définitions, ou résoudre des problèmes quelque peu structurés. C'est pour cela que l'exercice proposé se présente sous forme d'affirmations justes ou fausses. La même 82 structure de questions se trouve posée initialement et à postériori. Il s'agit, en l'occurrence, de mesurer un progrès par rapport au stade de départ, les écarts entre les deux notes donnant une progression par rapport aux .connaissances premières. Cela permet d'apprécier en quoi la formation reçue autorise une meilleure appréhension de notions fortes. Le tableau ci-dessous présente, pour chaque groupe de stage, les moyennes des notes obtenues aux différentes passations du test. CEPC Lyon stages Initiale Finale Ecarts Stage du 5 au 7 juillet 1988 14,64 16,56 + 1,92 Stage du 11 au 13 juillet 1988 . 13,81 15,36 + 1,55 Stage du 22 au 24 août 1988 13,56 15,17 + 1,61 Stage du 29 au 31 août 1988 12 13,89 + 1,89 Stage du 27 au 29 septembre 1988 14,85 15,78 + 0,93 Stage du 4 au 6 octobre 1988 16,15 17,60 + 1,45 Stage du 5 au 7 octobre 1988 14,58 15,82 + 1,24 Stage du 11 au 13 octobre 1988 15,68 16,54 + 0,86 Stage du 2 al). 4 novembre 1988 15,5 16,6 + 1,1 Stage du 8 au 10 novembre 1988 12,6 13,4 + 0,8 Stage du 16 au 18 novembre 1988 14,2 16,41 + 2,21 A la lecture de ce tableau, un constat général s'impose: les nOtes tant au début qu'à la fin du stage apparaissent élevées. Cela peut 83 remettre quelque peu en cause la validité de l'exercice proposé. Ainsi que nous l'avons déjà mentionné, toute élaboration de test face à un tel public se montre difficile. Dans tous les cas, on observe des écarts positifs entre les deux tests. Temps d'apprentissage : Comme nous avons déjà pu le constater, l'apport cognitif repose sur l'EAO. Il est diffusé par modules examinés séparément. Lors du premier contact avec la salle informatique et le matériel, une séquence d'une quinzaine de minutes permet de présenter le micro-ordinateur, le clavier et quelques manipulations simples relatives au didacticiel. Immédiatement après, les formés abordent la partie introductive. Dans l'ensemble, les temps de passage s'étalent entre vingt et trente minutes. Cette durée est très rarement dépassée. Selon les leçons appréhendées, les temps augmentent _ou diminuent selon l'intérêt des stagiaires pour cette formation. Sans livrer une présentation exhaustive des chiffres, un certain nombre d'enseignements se dégagent. Tout d'abord, il ressort au travers de nos constatations sur le terrain, que les stagiaires les plus motivés ont un temps de passage devant l'EAO, plus élevé. Les binomes terminant souvent les derniers sont les "éléments moteurs" du groupe classe. Cela s'explique par un échange plus riche entre eux avant de livrer une réponse. A l'inverse, les équipes terminant les premières, n'apparaissent pas comme celles connaissant déjà un peu le sujet, mais plutôt comme peu attirées par le cours. Dans certains cas, à l'issue de quelques leçons, certains éléments peu intéressés au départ se laissent absorber peu à peu par les diverses situations proposées. Quoi qu'il en soit, une relative homogénéité des temps se dégage et l'on peut considérer un temps 84 moyen de passage de l'ordre de vingt-cinq minutes. Il est vrai qu'au delà de trente minutes, une saturation assez forte intervient. En raisonnant au niveau du stage, les formés abordent l'EAO trois heures sur les dix-sept heures et demie. Cela représente approximativement 18% de leur temps de formation en 11 connaissance de l'entreprise". Quelquefois, certains binômes ayant terminé la leçon à visionner, la rappellent ou revoient un module sur lequel ils ont travaillé. Une telle pratique relève encore de l'exception. Bien que non mis en évidence, on peut penser que I'EAO contribue à une certaine diminution du temps d'apprentissage, puisque le corpus théorique est apporté en trois heures. Certes, la reformulalion par le formateur est toujours nécessaire, elle peut être réalisée alors sous différentes formes : cours magistral, exercice d'application, jeu ... Aux travers de nos observations directes et de l'enquête soumise aux formés, nous apprécions l'ensemble des effets qualitatifs sur les stagiaires. Dans le cas de cette formation, il ne faut pas envisager un suivi particulier très approfondi dans les progressions. Certes, une relation plus individuelle s'instaure entre intervenant et élève. Cependant, l'introduction du nouvel outil n'induit pas, dans ce cadre, une meilleure connaissance de chacun. Globalement, les groupes progressent quasi conjointement et les reprises de cours traditionnelles, à l'issue de chaque module, permettent une appréciation générale. 85 Ressentie un peu moins fortement que dans d'autres formations, elle se manifeste surtout par une plus forte implication personnelle. La passivité, face à un intervenant présentant son cours, laisse place à une activité canalisée. L'individualisation se note plus par une obligation d'action face à l'ordinateur, que par rapport à un suivi précis des acquisitions. L'apport essentiel pour ce public, recouvre une plus forte motivation d'apprendre, l'outil moderne qu'est l'ordinateur excitant une certaine curiosité. Dans ce cadre particulier, l'élément fondamental est en fait la participation active ; la vérification et la progression individuelle apparaissant secondaires. Bien évidemment, une relation enseignant/stagiaire s'instaure plus facilement et le dialogue devient plus simple. Cela représente une seconde forme d'individualisation dont il faut tenir compte. L'organisation des séquences d'EAO repose sur la constitution de binômes. Dans l'ensemble, cette structure semble plutôt convenir puisque 93 personnes la considèrent comme un avantage, 26 autres y trouvent plutôt un handicap. Cela ne surprend pas, car ces groupes sont constitués, très souvent, de stagiaires se marginalisant volontairement. Concernant le handicap au clavier, les réponses se présentent dans les mêmes proportions. En ce qui concerne 1' adaptation aux rythmes et connaissances propre à chaque formé, pour les 77 personnes sur les 123 interrogées, le cours se déroule à leur rythme ... Remarquons tout de même que ce nombre ne révèle pas une majorité écrasante. Selon le niveau scolaire initial, les appréciations des formés diffèrent. Les 28 stagiaires de niveau 11 correct" estiment que les informations leur parviennent trop vite alors que 18 seulement notent une excessive lenteur. Ces derniers sont de niveaux scolaires peu élevés. Ils se déclarent moins attirés par 86 des présentations délibérément simplifiées. Ceux qui trouvent une vitesse d'apprentissage trop grande approfondissent généralement beaucoup plus le cours. L'organisation de l'enseignement définit intrinsèquement des plages horaires. De ce fait, nous avons pu remarquer que des binômes plus lents, restant seuls en salle d'informatique pour terminer, accélèrent leur rythme pour compenser leur retard. Ils se sentent quelque peu remarqués par les autres et hésitent à déranger le cours. Il serait peut-être envisageable dans ce cas là de proposer une reprise du didacticiel en autoformation en dehors des créneaux de cours imposés. La découverte d'une possibilité de rappel de modules déjà visionnés attire quelque peu les jeunes. C'est ainsi, que, parfois, ayant terminé la leçon à examiner, ils revoient un module appréhendé le matin ou la veille. Cent quatorze stagiaires apprécient la très grande souplesse qu'apporte la formation assistée par ordinateur. Pour ce qui relève de l'adaptation aux connaissances de l'élève, les réponses sont partagées. Il est clair que le didacticiel ne développe pas un cursus particulier en fonction de tests préàlables. Cependant, les stagiaires notent une possibilité d'adaptation : ils avancent plus vite sur des questions déjà connues et, de ce fait, abordent plus rapidement les points nouveaux. En ce qui concerne l'interactivité, les foi"més, dans leur très grande majorité (104), se considèrent en dialogue permanent avec l'ordinateur et, par conséquent, très actifs pendant le cours. Les connaissances nouvelles leur semblent suffisamment reprises sans toutefois avoir le sentiment que leurs réponses influencent le déroulement du didacticiel. Une certaine conversation s'instaure entre la machine et les formés (78). La relative modestie de ce chiffre s'explique selon nous, par un excès de textes, peu apprécié par les jeunes. Un des principaux reproches apparus lors de nos conversations 87 avec les élèves, recouvre l'effet de lassitude face à une abondance d'écrits. Malgré leurs remarques à ce sujet, les apprenants apprécient, dans l'ensemble, la richesse du dialogue et les importantes sollicitations pour des interventions diverses. Cette implication directe, personnelle, apparaît fondamentale pour ce -type de public. 72% des personnes interrogées reconnaissent fournir une attention plus soutenue favorisée par les demandes de l'ordinateur. Globalement, ce dialogue avec la machine leur rend le cours plus attrayant (113 réponses), plus vivant (105), plus facile quant à l'effort à fournir (98). Les différents résultats montrent dans l' ensemble une implication plus forte des formés quant à l'apprentissage. Malgré la surabondance de textes, ils notent tout de même une activité soutenue face à l'acquisition des notions. Pour ce public, en grande majorité en rupture avec tout système d'enseignement, cela se révèle positif. De plus, la sensation de pénétrer un système économique et d'y apporter réflexions et influences représente une forte motivation. Ce n'est plus un contenu délivré in extenso mais un partage entre 1' apprenant et la machine. En ce qui concerne le degré d'acceptation du didacticiel et de l'EAO, comme que nous 1' avons énoncé plus haut, les stagiaires reprochent un excès de textes. La lecture tant au niveau déchiffrage que quantité à décripter demeure une question importante pour ce type de population. Notre évaluation a porté sur le didacticiel modifié mais non définitif. La version finale, mise en place depuis peu, a vu sa part de messages écrits considérablement diminuée. Dans l'ensemble, le cours se montre intéressant et attrayant avec bonne mise en relief des notions importantes. Plus généralement, les personnes sondées émettent des avis favorables sur l'EAO : outil très 88 intéressant (113), à développer (121) et très efficace pour apprendre (117). Une sensation d'étudier beaucoup plus rapidement se dégage de manière très forte (116 stagiaires). Ce constat apparalt fondamental lorsqu'il s'agit d'aborder des populations particulièrement marquées par le système scolaire. Il est parallèlement significatif de remarquer l'influence de l'EAO sur l'impression d'une plus courte durée de formation. Impliqués dans le processus, les élèves ne mesurent pas le temps. Une séance d'EAO leur parait toujours assez courte. 81 stagiaires ressentent une sensation d'avoir connu, par rapport au traditionnel, un stage plus court. De plus l'introduction de l'ordinateur semble enrichir les relations entre les formés et les rendre beaucoup plus importantes (88), plus faciles (98) et plus coopératives (91). L'ensemble des appréciations concernant ce nouvel outil 'se présentent de façon plutôt positive. Signalons, tout de même, que 16. stagiaires auraient préféré une formation traditionnelle. Certains jugent nécessaire d'apporter des améliorations, mais les annotations générales qu'ils font relèvent l'intérêt d'avoir travaillé sur l'ordinateur, pour eux "outil moderne et plein d'avenir". De fait, l'utilisation d'outils informatiques en tant que tels amorce un premier contact avec les nouvelles technologies. Cette familiarisation timide apporte un "plus" face aux objectifs atteints puisque, de plus en plus, les postes de travail intègrent l'ordinateur. 2..U Effets sur le formateur · Pour l'approche quantitative relative au formateur, l'EAO n'induit aucun effet. Son temps d'intervention reste absolument 89 identique puisqu'il demeure à la fois en salle de cours et en informatique. Pendant que les formés abordent le didacticiel, il est présent, répond aux questions et ne s'absente jamais. Comme pour les autres cadres d'évaluation, nous appuyons nos propos sur les enquêtes soumises aux formateurs et aux formés. Dans le cas présent, deux personnes assurent ces stages, ce qui amènera parfois des idées différentes pour une même question posée. Place du fonnateur : (dimension pratique) La place du formateur reste, sans conteste, très forte. Alors qu'un des enseignants n'en mesure pas un amoindrissement, 1 'autre perçoit, peut-être indirectement, une diminution de ses prérogatives. Selon lui, son intervention se limite à la phase d'introduction et de reformalisation des concepts. Il doit donc partager la diffusion des connaissances avec l'ordinateur. Bien que demeurant en pratique le centre du groupe, la transmission cognitive se partage ... , le formateur n'apparaissant plus comme le seul détenteur du savoir. Les deux enseignants ressentent, pour leur part, une transformation de leur relation avec les stagiaires. Les échanges particuliers deviennent plus riches, plus nombreux et, dans certains cas, s'instaure un véritable cours particulier. La place du formateur, tout en restant aussi importante, glisse d'une relation collective vers un rapport individuel ayant pour référent l'EAO. Quoi qu'il en soit, l'objectif général repose sur le développement de la complémentarité EAO/animateur. En l'état actuel de développement de l'EAO dans cette formation : il ne parait pas envisageable de voir diminuer la place de l'animateur au bénéfice d'une utilisation "libre service absolu". 90 Rôle du formateur : (dimension pédagogique) Pour l'un des deux formateurs, l'aisance d'emploi de l'ordinateur ne se révéla pas immédiate. Un sentiment de perte de contrôle du cours et de disparition derrière la machine apparut. Peu à peu, une accoutumance s'instaura, et aboutit à une plus grande sécurité face au cours. L'élément premier de diffusion de la connaissance étant l'EAO, chacun retrouve une modification de son rôle. L'intervention de 1' animateur prend corps à partir du contenu du didacticiel. C'est alors que l'un des formateurs se sent plus "conseil 11 que professeur. La tâche n'en demeure pas plus facile, puisqu'il s'agit d'apporter un complément à ce qui a été appréhendé. La partie traditionnelle relève tout d'abord de la synthèse du module visionné. Les stagiaires insistent beaucoup sur l'importance de ces mises en commun, car il leur est très souvent difficile de synthétiser ce qui vient de se dérouler sous leurs yeux. Au-delà de l'individualisation lors du travail devant les consoles, l'animateur régule son apport de cours en fonction du groupe : vécu de chacun ... Il reformule en quelque sorte les points clés du didacticiel, en approfondit certains et personnalise la formation en fonction des cas particuliers. Un nouveau 11 style" d'animation de groupe s'instaure : soit directement lors des séances EAO, soit indirectement lors des reprises traditionnelles. Tout d'abord, le découpage des séquences avec changements de salles modifie considérablement l'attitude des stagiaires en situation pédagogique. 11Le cours magistral" s'amenuise en temps et en contenu, puisque, le plus souvent, l'animateur utilise les interventions des élèves, et leurs questions sur ce qu'ils viennent de visionner. Cependant, bien que différentes, ces séquences de reprises de notions restent encore "lourdes" pour certains, et dénuées de toute activité individuelle. L'implication 91 constante, et active représente le maître-mot de toute pédagogie afférente à ce type de public. Certes, les jeunes sollicitent eux-mêmes ces moments de synthèses, mais un juste équilibre se doit d'être trouvé. L'introduction de l'EAO redéfmit le rôle pédagogique de l'enseignant et l'incite à mener plus loin encore toute idée d'implication, et d'action effective pour chacun. Rigueur pédagogique demandée au formateur dans la conception et la réalisation de la formation : L'introduction de l'EAO nécessite effectivement une certaine rigueur sur le découpage de la journée. L'alternance EAO/reprise collective instaure un cadre d'évolution du stage. La formation traditionnelle laisse souvent, pour ce type d'enseignement, une place importante à la "dérive" et donc à la spontanéité. Une question fondamentale surgit alors : Doit-on imposer un programme établi ou 11Satisfaire" les stagiaires par rapport à ce qu'ils recherchent ? Un partage équitable doit s'opérer. Bien que l'apport cognitif ne représente pas l'essentiel du stage, beaucoup d'informations, et d'explications sont à diffuser et à manipuler. L'EAO permet de répondre à cette double exigence. Une structure rigide en soi et comportant l'ensemble des connaissances à diffuser, pénètre le stage; elle en forme l'archétype. Le formateur traite alors tous les ·sujets, même si certains lui paraissent moins faciles ou moins fondamentaux. Il s'appuie donc sur le didacticiel, et alimente ses interventions en fonction de celui-ci. Le cours autrefois assez souple trouve par là même une structure ; l'initiative pédagogique n'appartient plus essentiellement à 1' enseignant 92 mais repose en grande partie, pour son contenu, sur l'auxiliaire didactique. 2.3.3 Effets sur le système de formation · L'introduction de l'EAO n'induit aucun effet quantitatif majeur sur le système de formation. La durée d'une session demeure la même (2 jours et demi). Le nombre de formés reste quasi identique. A ce niveau, en l'état actuel de fonctionnement, l'EAO impose même une limitation dans les groupes puisqu'au delà de 16 stagiaires, les binômes deviennent des équipes de trois. Quelques cas de travaux à trois ont montré les limites d'une telle utilisation, chacun ne pouvant approcher convenablement 1' ordinateur. Conscients des difficultés encore réelles des synthèses traditionnelles, les responsables vont introduire un jeu. Il faut impliquer d'une autre façon les formés, et leur permettre de réinvestir les connaissances préalablement reçues. L'objectif sera alors de gagner du temps sur les révisions et apprentissages (EAO et reprises collectives) pour parvenir assez vite au jeu. Ce dernier, en cours de création, complètera donc la formation et, combiné avec l'EAO, conduira à un plus grand approfondissement des connaissances. La structure générale du stage reposerait alors sur l'alternance EAO/synthèse collective rapide et se terminerait par le jeu. L'idée d'une mise à disposition de l'EAO pour réviser une nouvelle fois certaines notions serait envisageable. Un des effets qualitatifs principaux de la mise en oeuvre de l'EAO relève de l'homogénéisation du contenu entre animateurs. Ce 93 véritable cadre apporté au sein du cours donne une ligne directrice forte. D'ores et déjà, la formation est mieux appréhendée. Avant l'introduction de cette "charpente" il fallait noter une grande hétérogénéité dans les cours, le formateur s'adaptant à son public. Par là-même, les responsables du système de formation possèdent une plus grande maîtrise du discours tenu durant ce stage. Le message à délivrer apparaît mieux cerné, puisque la base de travail s'appuie sur un support pédagogique fort. Cet effet, au niveau de toutes les sessions organisées, forme "un plus 11 fondamental apporté par l'EAO. Par ailleurs, le particularisme de ces formations rend très difficile la mise à disposition d'animateurs expérimentés. Sans intervenir sur le coû.t, la mise en oeuvre de cet outil peut permettre aux responsables du centre de formation de recruter plus facilement des formateurs pour ce type d'enseignement. L'introduction de l'EAO apportant le corpus théorique, et livrant assez de souplesse pour adjoindre d'autres outils pédagogiques, la tâche de l'enseignant se trouve allégée. Cela lui permet alors de se consacrer plus précisément aux problèmes relationnels, point clé pour une meilleure réussite du stage. 2.4 Rapport coût-efficacité de l'EAO mis en oeuvre en "Connaissance de l'entreprise" : Ainsi que nous avons pu le mettre en lumière tout au long de l'évaluation, la spécificité du public ciblé pose le problème coût-efficacité en termes particuliers. Ces jeunes en échec scolaire et quelquefois professionnel ne désirent plus emprunter les chemins de la formation. Les enseignements traditionnels jusqu'alors reçus n'ont pu agir en ce sens. Il fallait donc améliorer le stage. Cela passe inévitablement par la multiplication des outils pédagogiques, l'EAO en était 94 un parmi d'autres. Comme le rappellent très souvent les responsables du centre et les enseignants, la part importante relève plutôt de la forme, de l'état d'esprit, du comportement. Mais l'acquisition d'un fond cognitif reste un objectif prioritaire mais pour une meilleure intégration dans l'entreprise. Partant de l'idée d'améliorer la formation, l'introduction d'outils modernes, motivants, valorisants, s'impose. Cette intégration d'auxiliaires pédagogiques supplémentaires justifie-t-elle le surcoût engendré:·? Dans ce cas, l'optimisation du rapport coût-efficacité signifie 1' obtention d'effets ayant au moins la même ampleur que le surcoût. Tout d'abord, il semble opportun de rappeler le coût heure/stagiaire pour chacune des deux formations. Formation traditionnelle Formation mixte Coftt horaire ensei- 28 F 50 F gnementlstagiaire Ces chiffres montrent un surcoût représentant 78,5% du coût de formation traditionnelle. Cette hausse importante s'explique par l'absence de gains en termes de durée de formation et du nombre de stagiaires formés. Dans cette perspective, le surcoût peut effectivement sejustifier par une meilleure qualité de formation (voir synoptique en fin de chapitre). Il permet alors de mieux réaliser ce qui apparaissait très difficile auparavant. En l'état actuel, la conclusion ne semble pas très favorable (coût plus élevé). On peut penser qu'une diminution du temps d'apprentissage pn•••.L.xz~ - Baisse du temps d'apprentissage Evaluation qualitative . - Interactivité : dialogue permanent avec la machine - Cours plus attrayant - Découverte d'un nouvel outil ••. x·· ....••..• J. ~. • • .~-;; ••... ·: .·· Tè"Yk Evaluation quantitative Evaluation qualitative . - Apprentissage de méthode de travail : prise de notes, synthèse 'w; .:·: ., • . •· ... iii . -,;-,,.;.,. ' r: Evaluation quantitative Effets futurs - Diminution des heures de recherche pédagogique et d'élaboration "artisanale" des fiches de travail Evaluation qualitative - Plus grande facilité de recours à des enseignants devant assurer une certaine polyvalence - Diversification des outils pédagogiques - Meilleure offre de service sur le marché de la formation g Chapitre 6 Evaluation coût-efficacité de I'EAO en formation "L'entreprise et sa comptabilité" au Centre de Formation des Maîtres de Châlon sur Saône 159 Dans le cadre de la rénovation de la technologie dans les collèges, un stage de formation continue est proposé aux professeurs (PEGC/Certifiés) intervenant dans cette discipline. Ces personnes, toutes volontaires, viennent, pendant trois années successives, suivre un trimestre d'enseignement spécifique (90 heures) : économie/gestion, mécanique/automatismes, électricité/électronique. Pour la partie 11 Economie-gestion", et plus particulièrement pour le module "l'entreprise et sa comptabilité", le didacticiel ARDEMI, 11Les mécanismes de base de la comptabilité\ se trouve intégré. L'évaluation menée se situe donc précisément dans ce contexte. 6.1 Introduction de l'EAO en formation "Mécanismes de base de la comptabilité" : Objectifs de la formation : - Se forger une représentation de l'entreprise au travers de la comptabilité ; se construire une image plus claire de l'activité de l'entreprise. -S'initier à une lecture de comptes, être capable de lire un bilan et un compte de résultats. - Passer des écritures simples sans exigence professionnelle. 160 - Susciter chez les personnes un intérêt et les motiver afin de connaître plus en ce domaine. Que ce cOurs soit réalisé traditionnellement ou par EAO, les objectifs restent identiques. Forme d'intégration de l'EAO : Prenant en compte la typologie des formes d'intégration de l'EAO telle que définie par nos soins, il s'agit d'appliquer cette grille au cas évalué : But apporte une formation nouvelle à l'apprenant Contexte intègre la formation existante Lieu dans le centre de formation Nombre de micro-ordinateurs une salle de type "laboratoire" : 2 appareils Moment pendant le temps de formation Manière libre accès total Public très captif Unité de base individuelle/en binôme Nature apprentissage Intégration substitution totale Relation au formateur avec alternance 161 Mise en oeuvre de 1' évaluation : Notre intervention repose sur divers entretiens avec le professeur responsable de la formation (et concepteur du didacticiel) et sur notre présence en fin de module. Pour chacune des deux sessions évaluées, un tirage au sort de quatre personnes a été réalisé. Ce sont donc quatre Stagiaires qui travaillent en autoformation complète sur EAO. Les autres suivent le cours dispensé de manière traditionnelle par l'enseignant. Au-delà de l'intervention magistrale, le professeur intègre transparents, diapositives et surtout le jeu 11 ldeco, un nouvel outil pour découvrir la comptabilité 11 • 6.2 Etude comparative d'une formation traditionnelle puis avec EAO : "L'entreprise et sa comptabilité" : Cadrage méthodologique et hypothèses retenues · Ne pouvant connaître le montant des charges diverses (bâtiments, électricité, assurances ... ) afférentes aux formations dispensées, nous ne pouvons fournir qu'un coût partiel de la formation. Par ailleurs, la prise en compte des frais de déplacements et des salaires ne peut s'opérer puisque, là encore, aucun chiffre n'a pu être fourni. Mais l'absence de ces deux derniers types de données ne doit pas, pour la comparaison, modifier les conclusions puisque frais et salaires demeurent dans les deux cas, identiques. Par contre, l'évaluation de la durée d'utilisation annuelle des micro-ordinateurs et surtout du didacticiel apparaît plus aléatoire. 162 Nous avons retenu, pour les premiers une base de 37 semaines pendant l'année, tenant compte des trèves de congés scolaires. Pour le second, nous prenons en compte le temps réel de mise en oeuvre du logiciel pendant l'année. En fait, vingt-quatre personnes d'une autre classe du Centre (Préparatoire CAPET) et douze stagiaires de la formation continue l'ont utilisé. Il est clair que toute évaluation du temps réel de pratique sur le dida~ticiel _est impossible, d'autres usagers pouvant très bien venir travailler en dehors des cadres prévus. A noter que nous retenons pour le coüt du didacticiel son prix de vente hors taxe (Franklin Partners). En effet, il s'avère difficile d'évaluer le coüt ARDEMI pour l'Education Nationale et surtout d'établir la part afférente au Centre de Formation des Maîtres de Châlon sur Saône par rapport aux autres usagers de l'Education Nationale. Le Centre posSède un didacticiel installé sur deux micro-ordinateurs (procédure ARDEMI). Pour les durées d'amortissement, nous maintenons le choix établi auparavant : micro-ordinateurs et matériels connexes: 4 ans - didacticiels : 3 ans. Coûts d'une formation traditionnelle · Coüt horaire : 15 stagiaires KF Enseignant 12 KF : salaire + charges sociales 0 231 mensuels pour 52 heures de cours 12 KF . 52 163 COUT HORAIRE D'ENSEIGNEMENT PAR STAGIAIRE : 0 231 KF = 0,015 KF soit 15 F 15 Coût d'une formation avec EAO · CoO.ts horaires Micro-ordinateur 15 KF x 2 = 2 micro-ordinateurs 0 4 Utilisation 40 h/semaine Nombre de semaines d'utilisation : 37 Nombre d'heures annuel d'utilisation: 1480 h 15 KF x 2 4 x 1480 Didacticiel Utilisation sur 1 an écoulé 0 24 personnes en préparatoire CAPET 12 personnes en formation continue Temps moyen de passage devant le didacticiel : 6 heures 36x6 ~ 216h ____i.L 3 x 216 Petit matériel Hypothèse : seule utilisation sur le didacticiel de comp- 0 informatique tabilité 07KFx2 4 x 216 1 Total 0 COUT HORAIRE D'ENSEIGNEMENT PAR STAGIAIRE 0,015 KF soit 15 F. KF 005 008 002 015 Bien que partiels et reposant sur des hypothèses parfois subjectives, les coûts horaires d'enseignement apparaissent identiques. 164 6.3 Efficacité de l'EAO qualitatifs : analyse des effets quantitatifs et 2..l.l Effets sur les formés : Effets cognitifs : Chaque stagiaire passe, en début puis en fin de formation, un test de connaissances. Les moyennes sur 20 obtenues en pré et post tests figurent dans les tableaux ci-dessous : MATIERE OUTIL TEST 1 TEST2 ECART L'entreprise et sa comptabilité traditionnel 9,62 12,69 + 3,07 (20 stagiaires) L'entreprise et sa comptabilité EAO 8,27 12,68 + 4,41 (8 stagiaires) La lecture de ce tableau montre des acquisitions dans les deux cas. La moyenne de départ des personnes travaillant en EAO étant plus basse, un phénomène de "rattrapage" se réalise. En effet, les scores de fin de session atteignent le même niveau. Par rapport au public visé, il semble que l'EAO rende possible, pour ce contexte de mise en oeuvre de l'outil, de meilleures acquisitions cognitives. Temps d'apprentissage : Pour la session traditionnelle, la durée de l'intervention professorale s'élève à huit heures. En autoformation, les temps de travail 165 varient entre trois heures quarante cinq et sept heures quarante cinq réparties, bien évidemment, en plusieurs plages d'étude. En tout état de cause, il est à noter une baisse certaine du temps d'apprentissage par EAO. Même les personnes 11 les moins rapides" n'atteignentjamais les huit heures nécessaires en traditionnel. Une réduction du temps d'apprentissage s'avère donc réelle. Du point de vue qualitatif, exceptées deux personnes percevant un déroulement trop rapide du cours, l'ensemble des personnes interrogées considèrent une adaptation convenable au rythme de travail. Les différentes questions relevant de l'interactivité livrent des réponses convergentes. Le dialogue avec l'ordinateur s'avère permanent, la machine faisant réagir très souvent l'apprenant. Une conversation s'instaure, les échanges se présentent assez riches, une sensation d'intervention constante se dégage. Les appréciations relatives au didacticiel paraissent plutôt positives. Cependant, les explications données se montrent, pour six personnes, plutôt difficiles et quelque peu insuffisantes. Il faut noter, corrélativement, une impression de passer beaucoup de temps à réfléchir à la solution (7 réponses), à comprendre les questions (6 réponses). En fait, ces enseignants considérent surtout l'EAO comme un support et non comme un substitut au pédagogue. Une liaison entre le professeur et l'apprenant doit, selon eux, demeurer (explications, 166 compléments d'informations, ... ou EAO complément du cours). D'une façon générale, l'ensemble des personnes interrogées reconnaissent, sans excès, des atouts indéniables à ce nouvel outil. .. tout en émettant une certaine réserve sur 1 'utilisation en auto formation telle que vécue. Effets sur le formateur : Dans le cas présent d'une pratique de l'autoformation pure, l'enseignant disparaît totalement. Son temps d'intervention devient nul. Le formateur ne trouvant aucune place, aucun rôle sous cette forme d'utilisation de l'EAO, aucune évaluation qualitative n'est réalisable. Malgré tout, le professeur responsable de cette formation, concepteur du didacticiel utilisé, a dû mener une réflexion pédagogique approfondie lors de son élaboration. D'après ses indications, cela a induit une reprise de son cours traditionnel réinvestissant en quelque sorte la démarche structurée du didacticiel. Effets sur le système de formation : L'évaluation comparative autoformation/cours traditionnel telle que réalisée dans cette étude ne correspond pas entièrement aux perspectives d'utilisation futures. L'EAO se présenterait essentiellement en complément de l'enseignement magistral. Prenant en compte cette optique à venir, aucun effet quantitatif sur le système de formation n'apparaît envisageable. L'apport qualitatif essentiel recouvrira la mise à disposition sans condition de l '-EAO à toute heure de la journée en vue d'un travail individuel. Il s'agira avant tout d'un 167 complément du cours (résumé, reprise et réinvestissement des notions) ou d'un soutien pédagogique. 6.4 Rapport coût-efficacité de l'EAO mis en oeuvre au Centre de Formation des Maîtres de Chalon sur Saône : Ainsi que nous avons pu le constater, nous disposons, pour cette étude de cas, de coûts partiels. Seul est pris en compte l'acte d'enseignement ; de plus, le coût de formation par EAO repose sur des hypothèses très subjectives. L'égalité apparente du cotît heure par stagiaire pour chacun des deux modes (15 F) laisse montrer que les coûts de l'EAO sans formateur n'atteignent pas des niveaux dispendieux. Une utilisation du didacticiel sur un nombre plus conséquent de stagiaires devrait aboutir à un coût horaire par EAO bien moindre. Cette égalité apparente des coûts résulte, pour l'heure, du faible nombre de stagiaires utilisant l'EAO. Le développement futur sur une population plus nombreuse devrait, sans conteste, abaisser notoirement les coüts. Par ailleurs, quelques éléments relatifs à l'efficacité apparaissent évidents : meilleures acquisitions cognitives, temps d'apprentissage réduit, disponibilité permanente des cours (voir synoptiques en fin de chapitre). Il semble donc qu'une amélioration des deux termes du rapport coût-efficacité soit, dans ce contexte possible. Dans le cas spécifique que nous venons d'évoquer, le public ciblé diffère notablement. Ce cadre d'étude apporte néanmoins des enseignements significatifs. Il ne peut que conforter l'idée fondamen- 168 tale "d'apprendre à apprendre 11 si utile pour des popuhitions peu tournées vers la formation. 169 CENTRE DE FORMATION DES MAITRES DE CHALON SUR SAONE Tableau synoptique des effets de I'EAO par rapport à une formation traditionnelle "L'entreprise et sa comptabilité" ··· .• ···· .. ••.•• ... ·.·•· .. ·... .. · ...• ···.·· .EF~J'}!8,§URLE~ FORMES • .. •Ï••+>.·•fi.i.s Evaluation quantitative Meilleures acquisitions cognitives Réduction du temps d'apprentissage Evaluation qualitative Individualisation de l'apprentissage : travail à son propre rythme Interactivité : dialogue permanent avec la machine Evaluation quantitative Temps d'intervention nul Evaluation qualitative Evaluation quantitative Evaluation qualitative Disponibilité totale des cours à toute heure de la journée '·· Chapitre 7 Evaluations qualitatives de l'introduction de l'EAO aux Gaz de France (GDF) et Electricité de France (EDF) --------~------------------~~~ 173 N'ayant pu mener à bien des évaluations du type de celles développées ci-avant, il nous est, par contre, possible d'apporter quelqués réflexions qualitatives sur l'intégration de ce nouvel Outil dans ces deux institutions. La présentation n'en apparaît pas moins intéressante puisqu'elle· permet d'enrichir particulièrement l'analyse des effets de l'EAO dans des cadres particuliers. Les enseignements diffusés recouvrent des matières spécifiques, techniques non développés sur d'autres 11 terrains 11 • 7.1 Evaluation au Gaz de France (GDF) : La Société Auxiliaire de l'Industrie Gazière (SAIG), filiale du groupe GDF, produit depuis quelques années des modules d'Enseignement Assisté par Ordinateur. Confronté à deux problèmes majeurs liés à la diffusion des connaissances gazières - nombre limité de formateurs, coüt de déplacement de nombreux agents vers des centres de formation - GDF commence à développer l'utilisation de l'EAO sur différents sites. Introduction de 1 'EAO en diverses formations : Divers didacticiels accompagnés parfois de simulateurs ont été mis en oeuvre : 174 - Calcul informatisé des réseaux de distribution de gaz : ETRE-CESAR. - Réponse aux appels de tiers signalant une odeur de gaz et première intervention : PIRATE-S NIF. - Remblayage, compactage des tranchées. Prenant en compte la typologie des formes d'intégration de l'EAO telle que définie par nos soins, il s'agit d'appliquer cette grille au cas évalué : But apporte une formation nouvelle à l'lapprenant Contexte intègre la formation existante/répond à un énorme problème de formation difficile à résoudre par des enseignements traditionnels Lieu local très proche du lieu de travail/centre de formation Nombre de micro-ordinateurs souvent un seul, parfois plusieurs (cela dépend des sites) Moment pendant le temps de travail Manière libre accès contrôlé/intégré Public captif Unité de base individuelle Nature apprentissage Intégration substitution totale/mixte Relation au formateur avec suivi 175 7 1 2 Etude des effets de la mise en oeuvre de l'EAO · Après un entretien avec le directeur de la SAIG à Paris puis avec le responsable EAO/GDF à Lyon (chargé de développer le nouvel outil sur ce site), il a été procédé à un envoi de notre enquête à différents centres GDF de France. Quarante-cinq personnes ont été interrogées ; la répartition par didacticiel se présente de la manière suivante: ETRE (16), PIRATE (18), SNIF (4), COMPACTAGE (7), soit un total de 45 personnes. 7.1.2.1 Effets sur les formés: Corroborant les répons~s aux questions proposées dans l'enquêtet les commentaires libres écrits laissent dégager des points fondamentaux liés à l'efficacité de l'EAO sur les formés. Ils relèvent essentiellement de l'individualisation très forte de l'apprentissage encore bien plus nécessaire sur des matières techniques, spécifiques telles que celles enseignées. Cet apport sans cesse mis en lumière recouvre les points suivants : . . travail à son propre rythme . formation souple (reprises possibles au début ou simple retour arrière limité), modulable en fonction de ses disponibilités, adaptable à ses besoins . Implication forte et très grande activité au niveau de l'apprentissage . Réflexion personnelle importante, peu de dérivation hors sujet 176 . Absence de censure de ses réponses, moindre appréhension face à une réponse à livrer (problème de timidité). Chacun reconnaît en cet outil une possibilité de travail personnel important et approfondi, source d'un meilleur apprentissage. 7 .1.2.2 Effets sur le formateur : Sur les quarante-cinq personnes interrogées, vingt-neuf ont suivi les didacticiels avec un formateur, les autres ayant travaillé seuls. Bien que la manière de mettre en oeuvre ce nouvel outil soit laissée au choix des différentes unités, il semble que le libre accès contrôlé retienne souvent l'attention des responsables. Notons cependant la possibilité pour certains formateurs d'intégrer cet outil dans leur propre cours. Si l'on garde l'idée d'une intégration sous forme de libre-service contrôlé, le rôle et la place du formateur disparaissent. Le complément pédagogique relève alors d'une personne pouvant intervenir à la demande de l'apprenant. Un ou deux cadres (ou agents de maîtrise) assurent, conjointement à leur tâche habituelle, les apports complémentaires. Cela conduit à formuler l'hypothèse d'une baisse importante des coûts, un formateur désigné n'intervenant pas. Certes, les personnes "ressources" voient le temps réservé à la tâche normale diminuer mais, en tout état de cause, leur intervention auprès des apprenants ne peut qu'être assez partielle. L'idée fondamentale ressortant de ces quelques propos repose sur l'utilité de la présence d'un "homme ressource" dès lors que les stagiaires abordent seuls un didacticiel. 177 7 .1.2.3 Effets sur le système de formation : Nos différents entretiens avec des responsables GDF et SA!G, ainsi que la lecture de quelques rapports internes établis suite à des expérimentations partielles laissent dégager quelques effets sur le système de formation. Tout d'abord, il est à souligner l'intérêt de la mise en place de mêmes didacticiels sur l'ensemble du territoire. En effet, cela permet une homogénéisation des connaissances diffusées et une tendance à uniformiser certaines pratiques. De plus, l'apport d'un "corpus théorique" stable limite la difficulté d'engager ou de former des enseig·nants spécialistes en ces domaines. La possibilité du recours à des personnels locaux essentiellement voués à un complément d'informations apparaît non négligeable. Corrélativement, la hiérarchie immédiate peut, à tout moment, connaître les éléments de connaissances apportés à ses subordonnés. La relative souplesse de l'EAO contribue, par ailleurs, en une réduction notoire de la 11 gêne 11 liée à l'absence d'une personne (moindre déplacement- souplesse dans la réalisation de la formation : possibilité de reporter sans difficulté une plage horaire en cas d'absolue nécessité de mise à disposition opérationnelle d'un formé, moindre nécessité de prévoir bien à l'avance i'envoi en stage d'une personne ... ). Tout cela devrait permettre une massification importante de la formation, le recours à dès sessions traditionnelles s'avérant, pour un nombre important de personnes à former, impossible. 178 7.2 Evaluation au Centre de Production Nucléaire EDF du Bugey: Le Centre de Production Nucléaire du Bugey (CPN du Bugey) ayant introduit l'EAO depuis 1982, un recul temporel plus large en ce domaine rend l'étude de première importance. Certes, ce cadre a été plusieurs fois retenu pour des investigations liées à l'intrOduction de cette nouvelle technologie ; ·néanmoins, il forme, pour notre recherche, un cas tout à fait significatif permettant d'apporter à notre réflexion des éléments dignes d'intérêt. En effet, l'utilisation de l'EAO n'étant jamais parvenue au niveau prévu et voyant- même, depuis ces dernières années, sa fréquentation baisser, il conviènt de s 'inter'roger. 1.Ll Introduction de 1 'EAO au CPN du Bugey : L'objectif général, quel que soit le thème traité, relève du maintien des connaissances. Les formations dispensées par EAO demeurent essentiellement techniques et très spécifiques au système nucléaire. Elles se rajoutent à celles intégrées dans le cycle de travail (six semaines dont une de formation) et stages. Il ne s'agit absolument pas du passage sur simulateur de conduite de Centrale mais d'étude sur didacticiel avec très grande variété des thèmes abordés. Prenant en compte la typologie des formes d'intégration de l'EAO telle que définie par nos soins, il s'agit d'appliquer cette grille au cas évalué. A noter que les terminaux sur lesquels travaillent les 179 apprenants sont reliés par lignes PTT à un ordinateur central situé à Clamart. But qualifier/mettre à jour les connaissances Contexte massification de la formation Lieu dans une salle près du lieu de travail Nombre de micro-ordinateurs un micro-ordinateur Moment pendant le temps de travail Manière libre accès total non supervisé Public public captif 1 Unité de base individuelle Nature complément de formation Intégration substitution totale Relation au formateur non conduit L'évaluation repose sur divers entretiens avec un Ingénieur Sûreté Radio Protection (!SR) qui a été chargé d'adapter l'EAO au CPN Bugey. Notre enquête habituelle a été soumise à soixante personnes de la Centrale travaillant essentiellement en salle de commandes et contrôles. Effets et limites de la mise en oeuvre de l'EAO: Effets qualitatifs de la mise en oeuvre de l'EAO : La mise en oeuvre de 1 'EAO en libre accès non supervisé nous a fait interroger des personnes motivées quant à l'utilisation de l'outil (incitation individuelle, promotionnelle). 180 D'un point de vue pratique, ordinateur et didacticiels fonctionnent "assez bien". La mise en route paraît un peu. compliquée. En ce qui concerne l'interactivité, le dialogue avec l'ordinateur semble limité. A de nombreuses reprises, des personnes mentionnent la difficulté de connexion et d'accès au didacticiel désiré. De plus, certaines soulèvent le problème de la rigidité de cet EAO et du manque d'analyse de réponse (blocage de la leçon pour un mot clé difficile à trouver). Malgré cela, beaucoup d'apprenants notent la diversité des sujets abordés et l'intérêt de cette nouvelle technique comme support de formation (complément à un stage, à une formation ... ) ou outil de révision. Un dernier point fort souvent mis en exergue recouvre la disponibilité totale des cours y compris la nuit. Beaucoup soulignent leur préférence pour un travail sur EAO, la nuit ... se sentant moins motivés pour une étude sur livre ou document en cette période de la journée. Pour le formateur, l'ensemble des personnes ne ressentent pas une nécessité absolue de sa présence. Il est sûr que chacun des membres de l'équipe de quart peut recourir, pour explications ou compléments d'informations, à un autre membre du groupe. Le supérieur immédiat, voire même le chef de quart remplissent cette fonction. Ainsi que nous l'avons abordé en début d'étude, l'EAO ne connait pas un taux de fréquentation aussi élevé que prévu. Il est opportun, après ces présentations, de réfléchir sur les conditions expliquant cet intérêt modéré pour le nouvel outil. 181 Limites d'utilisation de l'EAO: Si l'utilisation de l'EAO par GDF connaît un certain succès (voir synoptique en fin de chapitre), en revanche les applications qui en sont faites à EDF montrent quelques limites de cette intégration des NTI. Bien que n'ayant pas atteint un taux de fréquentation maximal, l'EAO s'est vu utilisé plus abondamment lorsqu'une partie de la préparation d'épreuves pour une promotion interne a été mise en place. Il est certain qu'un recours à l'EAO repose, dans ce cadre, sur une motivation intéressée. Dans une équipe de quart, chacun peut trouver un moment pour se former et donc travailler sur EAO. Ce sont bien souvent les personnes les plus accoutumées au travail personnel qui abordent les didacticiels. Les indications fournies montrent, du point de vue du niveau scolaire des apprenants, une fréquentation habituelle des personnes de niveau DUT/BTS et au-delà. Celles de niveau CAP/BEP se sentent relativement moins concernées par cet enseignement... bien que des cours adaptés à leur niveau soient proposés dans la palette. La dimension 11 culture personnelle 11 autonome, rendue possible par ce nouvel outil, ne peut se développer. Une incitation profonde des personnes est, par conséquent, nécessaire. Cette réticence face à l'utilisation de l'outil repose, en fait, sur trois facteurs déterminants. Le premier, à caractère technique, provient de l'EAO lui-même : connexion au réseau, qualité des didacticiels. Les deux autres, liés à la mise en oeuvre de l'outil appartiennent à la motivation des formés et corrélativement à l'attitude de la hiérarchie. D'une manière plus générale, une nouvelle fois se confirme cette nécessité, pour les années futures "d'apprendre à apprendre". Face à cette première phase d'implantation de l'EAO montrant quelques difficultés et limites, le Service de la Production Thermique 182 met en place depuis 1988 un nouveau plan d'action EAO. Ce dernier vise, en particulier, de par une restructuration complète des matériels, à améliorer l'image de l'EAO et à en développer l'utilisation dans des formations centralisées et décentralisées (avec implication de la hiérarchie). Par ailleurs, le projet P9 relatif à l'informatique dans la formation mène une réflexion plus large en ce domaine et entend donner une impulsion supplémentaire à 1 'intégration de ce nouvel outil. 183 GAZ DE FRANCE Tableau synoptique des effets de l'EAO par rapport à une formation traditionnelle "Techniques gazières" (I) Evaluation quantitative Individualisation très forte de l'apprentissage : travail à son propre rythme, implication personnelle forte Autonomie dans le travail : retour arrière, reprises personnelles Interactivité : dialogue permanent avec la machine Réflexion personnelle importante Formation souple, modulable en fonction de ses disponibilités, adaptable à ses besoins Absence de censure de ses réponses, moindre appréhension face à une réponse à livrer Evaluation qualitative Disparition du rôle et de la place du formateur en tant que tel/Rôle et place pouvant être tenus par des supérieurs hiérarchiques Compléments pédagogiques, apports complémentaires Evaluation qualitative Homogénéisation du contenu des formations et ..des connaissances diffusées Limitation des difficultés d'engager ou de former des enseignants spécialistes Plus grande souplesse pour réaliser les formations ; moindre gêne liée à l'absence d'une personne E.ffit futur : Massification importante de la formation Conclusion 187 Tout au long de cette étude, nous avons tenté, face à l'approche collt-efficacité de l'EAO pour la formation en cours d'emploi, de réaliser un travail le plus large possible. Saisir toutes les dimensions du problème ne fut pas toujours facile. Sachons surtout que Ie"terrain" sur lequel nous avons oeuvré se présente comme fort mouvant et en constante mutation. Il était cependa~t clair qu'une base de réflexion se devait d'être engagée et qu'il fallait examiner, un peu plus profondément, ce "bouillonnement". Notre action_ s'est donc placée à ce niveau. Afin de bien cadrer l'ensemble des enseignements à dégager, il est intéressant de dresser une typologie des modes d'utilisation positifs ou négatifs de l'EAO face aux "terrains" examinés. Par ailleurs, il convient de réaliser, par rapport aux travaux engagés, une synthèse spécifique des dimensions abordéeS : répercussions sur les coûts, efficacité de l'EAO (aspects positifs et négatifs), évolution du rapport coût-efficacité. TYPOLOGIE DES MODES D'UTILISATION POSITIFS OU NEGATIFS DE L'EAO A partir de l'échantillon examiné, il est possible de déterminer certaines utilisations de l'EAO fonctionnant efficacement. * "Formation mixte 11 (EAO et intervention du forl1).ateur) à contenu technique - public de bas et moyen niveaux. * "Formation mixte" à contenu général (français-mathématique) public de bas niveau volontaire. 188 * "Formation mixte" à contenu général (initiation économique) - public de très bas niveau non demandeur - Caractère moderne, motivant, valorisant de l'outil. * "Autoformation" à contenu technique (initiation comptable)- public de bon niveau. * -"Autoformation11 en libre-accès contrôlé (homme ressource) et supervisé (suivi assuré par le supérieur hiérarchique ou une autre personne)" à contenu technique - public de bas et moyen niveaux. * ~~ Autoformation" en libre-accès à contenu technique diplômant ou qualifiant - public de bas et moyen niveaux. A 1 'inverse, les études de cas laissent apparaître certaines utilisations non efficaces. * "Autoformation 11 libre-accès tout contenu - public de bas ·niveau. Il faut noter que plus les niveaux sont bas, plus la désaffection pour la formation volontaire est grande (sauf si la motivation est intéressée). * "Autoformation" à contenu technique- public bas niveau. Pour l'heure, deux enseignements généraux sont à retenir de ces évaluations : Le mode de ''formation mixte" apporte des effets largement positifs et en particulier avec les populations en difficultés. Secondement, l'autoformation pose des problèmes qui vont croissant avec l'abaissement des niveaux. 189 Corrélativement, la mise à disposition de cours en libre-accès ne bénéficie qu'aux personnes possédant déjà une relative autonomie d'apprentissage. REPERCUSSIONS SUR LES COUTS En premier lieu, avant toute comparaison de coûts, il cOrivient de bien rappeler l'indicateur de coût utilisé. Comme nous avons pu le constater dans le cas de chez.RVI, le choix de tel ou tel indice conduit - à des conclusions différentes : coû.t horaire par stagiaire, coût du stage (à effectif égal). Si l'on regarde le coüt global du stage chez RVI, l'introduction de l'EAO induit une baisse du coût. Globalement, les gains en termes de jours de stage sont plus importants que les coüts supplémentaires liés aux matériels e( didacticiels utilisés. Par contre, le coüt horaire par, stagiaire est plus élevé en formation mixte ; cependant, ce surcoût ne se révèle absolument pas dispendieux. A quelques rares exceptions près (CEPC), la hausse du coût horaire par apprenant est modérée. Une analyse plus approfondie de la situation actuelle et des perspectives de développement de l'EAO, montre que l'on peut s'attendre, en toute logique, à une baisse des coûts horaires. Deux facteurs importants peuvent intervenir dans la baisse des coûts : une moindre intervention du fonnateur et une réduction du temps de formation (Session plus courte suite à un gain de temps d'apprentissage). 190 EFFICACITE DE L'EAO Tout au long de notre étude, nous avons été amenés à mettre en évidence les effets quantitatifs et qualitatifs liés à J'introduction de l'EAO. L'objet de notre présent propos sera de les rappeler brièvement puis, dans un second temps de livrer quelques réflexions sur les limites de l'efficacité de ce nouvel outil. Récapitulation des effets liés à l'introduction d.e I'EAO : Les études strictement comparatives enseignement traditionnel- /autoformation par EAO, certes difficiles à mettre en oeuvre, laissent apparaître : un niveau égal d'acquisitions cognitives pour un temps d'apprentissage moindre lorsqu 'on utilise les nouvelles technologies. Ces effets ne sont possibles qu'à condition que les personnes sachent être autonomes dans le travail sur didacticiel. En "mode mixte" (formateur + EAO), de meilleurs résultats sont obtenus. Ils se traduisent par une baisse du temps d'apprentissage ayant des répercussions sur le nombre d'exercices réalises et sur la durée de la session, une meilleure motivation des formés, une individualisation et personnalisation de la formation, ainsi que par l'apprentissage d'un savoir être. Il est clair qu'actuellement, il semble difficile d'embrasser tout le problème; des effets à plus long terme ne se manifestent pas pour l'heure. Bien que prenant largement en compte les effets qualitatifs, il est souvent peu facile de mesurer ou d'apprécier toutes les répercus- 191 sions de l'EAO (tant sur les formés, sur le formateur que sur 1' entreprise). Exceptées quelques formes d'utilisation avec certains publics, l'intégration de l'EAO se montre, dans la plupart des cas, efficace. Certes, l'autoformation, le libre accés posent des difficultés notamment lors de la mise à disposition de populations de bas niveaux. Cependant, le recensement de tous ces effets, dans l'ensemble plutôt positifs, ne doit en rien cacher quelques limites de l'outillui-même ou de son utilisation. Limites de l'efficacité de I'EAO : Pour une étude plus précise, il convient de distinguer les limites liées à l'outil lui-même et celles relatives à son utilisation. Limites liées à l'outillui-même : En premier lieu, il faut mentionner les problèmes liés à la qualité des matériels. Les problèmes techniques d'une part, sont encore relativement présents sur les divers terrains : lancement du didacticiel, dysfonctionnement/interruption du didacticiel, accès au module désiré ... D'autre part, un nombre encore significatif de didacticiels se montrent médiocres. Il est s(\r que l'analyse des réponses fournies par l'apprenant soulève souvent des problèmes. En l'occurence, la non acceptation de réponses justes par le didacticiel se trouve très frustrante pour l'élève. On discerne parfois des difficultés de déchiffrage de lecture ou de saturation rapide suite à 1' abondance de messages écrits. Les formés ne lisent alors plus; ils balaient des yeux l'écran. Aucune acquisition n'est donc possible. 192 Il est certain que la production de tels logiciels nécessite des personnes très compétentes ayant une expérience riche dans ce domaine. La structure ARDEMI relève ce défi mais un enrichissement de la palette proposée est encore nécessaire. Il sera véritablement possible d'appréhender toute l'efficacité potentielle de l'outil seule" ment lorsqu'un panel très large de didacticiels s'utilisera. L'intérêt se verra peut-être renforcé si les responsables de formation dispo~ent de 11 briques 11 emboitables leur permettant de composer un cours à leur convenance. Cela suscite le dépassement de beaucoup de contraintes techniques et l'homogénéisation des langages. En second lieu, la dimension des effets ne semble pas devoir être négligée. Par son individualisation forte, l'EAO implique réellement chaque personne. Un phénomène de jugement émis par le groupe sur chacun de ses membres est ressenti parfois plus durement qu'en formation traditionnelle. Les stagiaires arrivant déjà avec un relatif complexe d'infériorité se sentent encore plus gênés car appréciés intrinséquement par leurs collègues ou le formateur. Cette plus grande mise en relief des différents niveaux de chacun accentue quelquefois des situations d'échecs déjà mal vécues antérieurement en période scolaire. Pour ces cas précis, le rôle du formateur devient très fort. A cet égard, soulignons la dimension affective de la relation enseignant/enseigné souvent clé de voüte de tout apprentissage (en particulier avec des apprenants en difficultés). Cet aspect relationnel se trouve modifié dès lors que l'instructeur disparait ou intervient beaucoup moins pendant le stage. Pour certains apprenants, l'aspect convivial et parfois ludique de l'EAO les rend un peu distants face à cette forme d'apprentissage. Assimilant ces logiciels à des jeux, ils ne traitent pas leur travail 193 devant les micro-ordinateurs avec autant de "sérieuxn et d"'application" qu'ils ne le feraient devant un livre, une fiche .... voire même un enseignant. Se tenir devant un écran relève pour certains de la même démarche qu'une présence active devant un jeu informatique ou électronique. Limites liées à l'utilisation de l'outil: Que le cadre de l'utilisation de l'EAO soit une totale autoformation ou un travail individuel avec présence de l'enseignant, le stagiaire se trouve dans l'obligation d'apprendre à apprendre. Or, la tendance de 1 'apprenant à progresser trop vite, ou à croire en une assimilation très rapide du cours peuvent le décourager lorsqu'il prend conscience qu'il n'a pas compris. Une validation régulière de ses acquisitions semble nécessaire de façon à ce qu'il mesure ses assimilations et ses incompréhensions. Par ailleurs, lorsqu'il étudie un didacticiel relativement long, ou plusieurs logiciels successifs, un phénomène de saturation se produit, cela indépendamment de sa propre volonté. Il lui faut par conséquent, savoir ménager de temps à autre des pauses. L'ensemble des remarques précédentes liées à la nécessité d'apprendre à apprendre, montre donc à quel point l'efficacité de l'outil informatique dépend de l'organisation. Cette dernière doit être différente de celle de l'enseignement traditionnel et très rigoureuse. Une mise à disposition plus libre de l'outil demeure toujours possible mais il est bon alors de prendre en compte les points suivants. A l'heure actuelle, la mise en pratique de l'EAO (sous quelque forme que ce soit) a bien souvent pour élément moteur un formateur 194 ou responsable de foZ.mation croyant aux vertus de ce nouvel outil. Le problème principal à court terme est celui de la généralisation possible de l'EAO. Cette dernière dépend avant tout de la motivation de l'ensemble des formateurs. Il s'agit alors de casser les barrières d'appréhensions techniques et pédagogiques. Il est vrai que l'instructeur ne représente plus le seul détenteur du savoir, il partage la diffusion des connaissances avec les micro-ordinateurs. Son rôle s'en trouve modifié, il faut qu'il en accepte les nouvelles modalités. La liberté d'action au sein du cours, chère à l'enseignant, peut lui apparaître quelque peu limitée par 1 'introduction d'un cadre plus strict. D'ailleurs, les détracteurs de ce nouvel outil retiennent comm"~:mément comme argumentation cette pénétration d'un élément contraignant. L'intégration de l'EAO pose très vite le problème de la densité du matériel. Cela ne doit pas contribuer à la création d'un système trop sélectif même si l'entreprise accorde une priorité aux secteurs les plus productifs. Cependant, il ne s'agit en aucun cas de privilégier certains stagiaires aux dépens d'autres. Il est sûr qu'il est difficilement concevable d'envisager une mise en oeuvre rapide sur tous les terrains. Souvent, la solution de 11 Saupoudrage 11 de matériel ne représente pas une solution idéale. Néanmoins, il serait préjudiciable de voir se développer une certaine inégalité ayant pour origine des raisons géographiques (ordinateurs concentrés sur un site), matérielles (insuffisance notoire de micro-ordinateurs), pédagogiques (utilisation de l'EAO sur quelques domaines essentiellement). Il se comprend fort bien qu'en première étape, l'entreprise cherche à améliorer la formation auprès d'un nombre de personnes plus limité. Il est, en effet, préférable, dans un premier temps, de bien former une minorité plutôt que de s'adresser de façon médiocre à l'ensemble des travailleurs. De toute manière, cela ne peut se concevoir qu'en étape préliminaire servant de base à un développement plus large de l'outil. 195 La mise en oeuvre de l'EAO en autoformation sur ou près du poste de travail demande, de la part du supérieur hiérarchique immédiat une reconnaissance de la fonnation individuelle. Une attitude négative de sa part annihile toute idée d'enrichissement personnel. La massification de la formation par ouverture de centres-ressources accessibles en libre service, devra permettre à chacun de se former selon ses besoins. Une pédagogie de soutien pourrait faciliter le travail de publics en difficultés et leur apporter une aide précieuse. Cette structure accueillera bien évidemment les éléments déjà autonomes désireux de parfaire des connaissances mais aura aussi pour tâche d'aider les populations qualifiées de "bas ou sans niveaux 11 • Les principaux éléments relatifs aux coûts et à l'efficacité ayant été cernés, il convient maintenant de poser la question primordiale : L'introduction de l'EAO améliore-t-elle le rapport cotit-efficacité? LE RAPPORT COUT-EFF1CACITE: Comme nous avons pu le mettre en lumière à plusieurs reprises, les résultats des évaluations vont en général dans le sens d'une amélioration de ce rapport. Dans cette phase d'éclosion et, pour certains de début de maturation, on note essentiellement l'apport de meilleurs et de nouveaux effets. Il est sûr que cela sous-entend un mode d'utilisation positif de l'EAO tel que défini ci-avant. Dans ce premier temps, le rapport évolue favorablement du fait d'une meilleure efficacité de l'outil considéré. Il faut même signaler, 196 à ce niveau, que tous les effets possibles de la mise en oeuvre de 1 'EAO ne s_ont pas mis en lumière ; certains ne pouvant apparaître, pour l'entreprise, qu'à moyen et long termes. Au-delà de cette seule prise en compte des effets présents ou à venir, il est possible d'émettre l'hypothèse d'une baisse future des coûts. Elle peut intervenir à deux niveaux. Dans le cas de stages, les gains de temps d'apprentissage (intervenant parfois dans les durées de session) devraient agir sur les cursus complets de formation (cas des stages en plusieurs modules) et donc apporter des réponses plus rapides aux besoins de l'entreprise. L'individualisation de l'apprentissage et l'acquisition d'une certaine autonomie dans le travail permettront au formateur de s'absenter de manière plus significative ... ce qui est source d'une minoration des coûts. Cela suscite, il est vrai, une reformulation totale de la notion de formation et plus particulièrement de la place et du rôle de l'instructeur. La création et le développement de 11Centres-ressourcesu pose d'une autre manière la question du rapport coût-efficacité. Si l'on suppose que l'efficacité est identique à celle des stages spécifiques, les coûts liés au formateur se trouvent considérablement diminués. Seuls subsistent les coûts de "l'homme ressource" chargé du suivi des apprenants ainsi que ceux de la personne supervisant l'individu envoyé en formation (supérieur hiérarchique par exemple). Il est certain que nous ne pouvons, en l'état, qu'approcher timidement la question. Tout semble, à l'heure actuelle, encore fragile mais les deux pistes de réflexion dégagées nous paraissent, elles, suffisamment solides. Bibliographie 199 ARDO!NO, J. et BERGER, G. (1986) "L'évaluation comme interprétation", POUR, n°107 ARROW, K.J. (1973) "Higher Education as a fllter", Journal of Public Economies, n°2, pp.193-216 ASSOCIATION POUR LE DEVELOPPEMENT DE L'INFORMATIQUE ET DES TECHNOLOGIES D'ENSEIGNEMENT (ADITE)/CENTRE D'ETUDES DES SYSTEMES ET DES TECHNOLOGIES A V ANCEES (CESTA) (1987) "Annuaire 1988 des logiciels de formation", Les Editions d'Organisation BANGERT-DROWNS, R.L., KULIK, J.A. and KULIK, C.L.C. (1985) "Effectiveness of Computer-Based Education in Secondary Schoolsn, Journal of Computer-Based Instruction, Vol 12, n°3, pp.59-68 BARBIER, J.M. (1985) "L'évaluation en formation", PUF Pédagogie d'aujourd'hui BARCHECHATH, E. (1988) "Education et informatique multimédias. Que peuvent donc les technologies nouvelles pour l'éducation ?", Education Permanente, n°93/94, pp.9-18 BARON, G.L. (1989) "L'informatique discipline scolaire?", PUF Pédagogie d'aujourd'hui 200 BECKER, G.S. (1964) "Human Capital", National Bureau of Economie Research, Columbia University Press BECKER, G.S. (1975) "Human Capital", National Bureau of Economie Research, Columbia University Press, 2ème édition BECKER, W.E. and SALEM!, M. (1977) "The Learning and Cast Effectiveness of A VT - Supplemented Instruction : Specification of Learning Models", The Journal of Economie Education, pp.77-92 BERNARD, M. (1987) "L'audit de la formation : de la conception à la pratique", Education Permanente, 0°91, pp.9-20 BERTIN!, M.T. et RICHARD, P.J. (1985) "L'informatique oui ou non?", Flammarion BESSJERE, C. et DELEGLISE, A. (1982) "Analyse pédagogique de systèmes EAO en cours d'utilisation : l'EAO à l'EDF", IRPEACS BESSIERE, C. et DELEGLISE, A. (1982) "Analyse pédagogique de systèmes EAO en cours d'utilisation: l'EAO au Crédit Agricole 11 , IRPEACS BESTOUGEFF, H. et FARGETTE, J.P. (1982) "Enseignement et Ordinateur", Fernand Nathan BLAUG, M. (1968) "Analyses coût-bénéfice et coût-efficacité appliquées à l'enseignement", Rapports techniques OCDE, pp.l85-200 201 BOIZEITE, H. et QUEFFELEC, B. (1980) "Etude de 1' efficacité pédagogique de 1' enseignement assisté par ordinateur, compte-rendu d'une expérience à la Caisse Régionale de la Somme", Centre de Formation Supérieure au management/IFCAM BONNELL, R. (1978) "La -formation professionnelle continue et l'analyse économique", Economica BOSSUET, G. (1982) "L'ordinateur à l'école", PUF BOURDIEU, P. et PASSERON, J.C. (1964) "Les Héritiers\ Editions de Minuit BOURDIEU, P. et PASSERON, J.C. (1970) "La Reproduction", Editions de Minuit BOUSQUET, N. et GRANGERARD, C. (1983) "Evolution des formations professionnelles et mutations technologiques11, Education Permanente, N°67, pp.45-49 BOUTIN, A. (1983) "Formation et développements", Pierre Mardaga, éditeur BRIGHT, G. W. (1983) "Explaining the Efficiency of Computer Assisted Instruction", AEDS .lm!!:m!l, Vo116, n'3, pp.144-153 BRJIT-MARI BARTH (1987) "L'apprentissage de l'abstraction", Retz BUCHERON, M. (1983) "Eléments de méthode pour le calcul des seuils de rentabilité de l'EAO", Formation Continue et développement des organisations Liiie, n'2, pp.93-98 202 BUCHERON, M. (1983) "Interrogation d'un formateur sur l'EAO", Formation Continue et développement des organisations Lille, n°2, pp.5-17 BUREAU D'ANALYSE DES STRATEGIES EN INFORMATIQUE ET COMMUNICATIONS (1985) "Etude EAO", Basic CAMBRA, G. (1988) "J'alerte les pédagogues", Education Permanente, n°93-94, pp.l25- 131 CANDEAU, P. (1985) "Audit social 11 , Vuibert CARNOY, M. et LOOP, L. (1986) "Informatique et éducation : quel est le rôle de la recherche internationale ?, Rapport sur le Colloque Stanford-UNESCO, 10-14 mars 1986", UNESCO CARNOY, M., DALEY, H., DEVILLAR, R., EARTHMANN, E.A., HERRMANN, F., LOOP, L., MISRA, M., STARBUCK, J. (1986) "Education and computers: vision and reality in the mid-1980s" CEPEC (Centre d'Etudes Pédagogiques pour l'Expérimentation et le Conseil) (1987) "L'évaluation en questions", éditions ESF CERI (Centre pour la recherche et l'innovation dans l'enseignement) (1986) "Les nouvelles technologies de l'information : un défi pour l'Education", OCDE CESTA (Centre d'Etudes Sur les Technologies Avancées) (1984) "Colloque des 21 et 22 novembre 1983 :L'informatique et l'enseignement11, CNDP - Documentation Française 203 CLEMENT, J. (1986) "Evaluation de l'introduction des micro-ordinateurs sur la Côte d'Or en CE2", Mémoire de Diplôme d'Etudes Approfondies, !REDUSciences de l'Education Dijon CLEMENT, J. (1988) "Infonnatique, pratiques pédagogiques et acquisitions scolaires à l'école primaire", Thèse de Doctorat, Université Paris V, Sciences Humaines COIFFARD, J.P. (1980) "Economie de la formation", Humanisme et Entreprise, Vol 120, pp.29-38 CONGRES FRANCOPHONE SUR L'ENSEIGNEMENT ASSISTE PAR ORDINATEUR (1987) 11 Actes 87", So_us le parrainage du Conseil Général âe 1 'Hérault, organisé par l'Agence de l'informatique CURTIN, C. and SHINALL, S. (1984) ~'Cornputer-Assisted Reading !essons", Cali co Journal, June, pp.l2-16 DALLE, T. (1985) "EAO, Enseignement Assisté par Ordinateur", Lu yu. entendu, pp.l33 CENCEP DANIEAU, C. et PIETTRE, F. (1987) "De la pratique de l'audit de formation", Education Permanente, n°9l, pp.69-85 DEMAIZIERE, F. (1986) "Enseignement Assisté par Ordinateur", Ophrys DESPIN, J.P. et BARTHOLY, M.C. (1986) "Arsenic et jeunes cervelles", 10/18 Inédit 204 DEVILLE BICHOT, G. (1969) "L'éducation et les économistes", Annales de la Faculté de Lettres et Sciences Humaines de Toulouse, HOMO VIII T5, pp. 109-125 DON, D. (1988) 11Dictionnaire de l'EAO", Ophrys DUBREUIL, F., CABROL, D. et LUFT, R. (1983) "L'éva,luation des didacticiels", Education et InformatiqJie, n°18, pp.17-19 DUDEZERT-DELBREIL, M.J. et DUDEZERT, J.P. (1988) "Formation multimédia : définition et méthodes", Education Perma- ~. n°93-94, pp. 109-122 EICHER, J.C., LEVY-GARBOUA, L. et alii (1979) "Economique de l'éducation", Economica EICHER, J.C., HAWKRIDGE, D., Mc ANANY, E., MARIET, F., ORIVEL, F. (1980) "L'économie des nouveaux moyens d'enseignement: volume 2 : Coût et efficacité", UNESCO EICHER, J.C., HAWKRIDGE, D., Mc ANANY, E., MARIET, F., ORIVEL, F. (1984) "L'économie des nouveaux moyens d'enseignement :volume 3 : Vue d'ensemble et synthèse", UNESCO EICHER, J.C. (1984) "Coût et efficacité de l'utilisation des nouvelles technologies de l'information dans l'Education", Revue francaise de finances publiques, n°6, pp. 73-93 205 EICHER, J.C. (1984) 11 Aspects économiques de l'introduction des nouvelles technologies de l'information dans l'Education", Conférence Internationale sur l'Education et les Nouvelles Technologies de l'Information, Château de la Muette, 9-12 juillet, OCDE EICHER, J.C. (1987) "Le coût des nouvelles technologies de 1 'information dans 1 'éducation : . que savons-nous?", Perspectives, n°63, UNESCO EICHER, J.C. (1987) "Les ecOts des nouvelles technologies de l'information dans l'Education : Particularités et problèmes de mesure", UNESCO ENCYCLOPEDIE ECONOMIQUE (1990) Economica EXPERTON, W. (1983) "Techniques de base pour l'analyse et la gestion financière de l'Education", UNESCO FARGETTE, J.P. et LATGE, G. (1985) "EAO et formation professionnelle", Editions d'Organisation FIGARI, G. (1987) "Evaluation et/ou audit?", Education Permanente, n°9l, pp.63-67 GABRIEL, P. (1989) "Evaluation des effets de variables pédagogiques : .l'influence de pratiques de type EAO dans l'enseignement des .mathématiques en classe de 6ème, Sème et CPA-CPPN", Mémoire de Diplôme d'Etudes Approfondies, !REDU-Sciences de l'Education, Dijon GINISTY, D. (1985) "La mesure des effets de la formation", Entreprises-formation, n°5-6 206 GLAUDE, M. et JAROUSSE, J.P. (1988) "L'horizon des jeunes salariés dans leur entreprise", Economie et Statistique, 0°211, pp.23-41 GOGUEL!N, P. (1983) "La formation continue des adultes", PUF Le psychologue GUILLAUME, M. (1988) 1 'L'apport des conférences télématiques à l'enseignement et à la recherche", Education Permanente, 0°93-94, pp. 133-140 HASSENFORDER, J. (1972) "L'innovation dans l'enseignement", Casterman HERMANT, C. (1985) 11Enseigner, apprendre avec l'ordinateur'', Cedic/Nathan JACQ, F. et VARDANEGA-LACHAUD, N. (1988) ''La trans-animation: état des lieux", Education Permanente, n°93-94, pp.19-34 JAROUSSE, J.P. (1987) "Formation, carrière et dualité du marché du travail 11 , Communication aux Journées de Microéconomie Appliquée, Louvain-la-Neuve, 4- 5 juin JOBERT, G. (1986) "Production de la compétence et technologies nouvelles de fonnation : le cas de 1' enseignement assisté par ordinateur darts les centrales nucléaires d'EDF", Université Paris Dauphine, département d'éducation permanente JOBERT, G. (1987) "L'audit de formation entre le contrôle et la recherche du sens", Education Permanente, n°9l, pp. 39-52 .207 KAMOURI, A. (1983-84) 11 Computer-Based Training : a cognitive framework for evaluating systems'designs", Journal of Educational Technology Systems, Vol. 12, n°4, pp. 287-309 KULIK, J.A., KULIK, C.L.C., and BANGERT-DROWNS, R.L. (1985) "Effectiveness of Computer-Based Education in Elementary Schools 11 , Computers in Human Behavior, Vol. 1, pp. 59-74 LE BOTERF, G. (1987) "Qu'entend-on par audit de formation ?", Education Permanente, n•9J, pp. 21-29 LE CORRE, Y. et PAIR, C. (1981) "L'introduction de l'inform~tique dans l'Education Nationale", Ministère de l'Education Nationale, Service Information LEFEBVRE, . (1989) "Documentation pratique des impôts directs", Série BIC, BergerLevrault LE THANH KHOI (1967) "Analyse économique de 1' enseignement considéré comme une industrie", Editions de Minuit LEVIN, H.M. (1983) 11 Cost-Effectiveness: a primer", BeverlyHills, CA: Sage Publications LEVIN, H.M., GLASS, G.V., and MEISTER, G.R. (1984) "Cost-effectiveness of four educational interventions", lnstitute for Research on Educational Finance and Governance, Stanford University . MAUNOURY, J.L. (1972) "Economie du Savoir", Armand Colin, Collection U 208 MEIRIEU, P. (1987) "Apprendre ... oui, mais comment", Editions ESF MELMED, A. (1983) "Productivity and Technology in Education", Educational Leadership, February, pp. 4-7 MIGAUD-LETOURNEUX (1983) "Technologie éducationnelle : un agent d'évolution pour l'action éducative", Thèse de 3ème cycle, Université Lyon II NORA, S. et MINC, A. (1978) "L'informatisation de la Société", Collection Points NOYE, D. et PIVETEAU, J. (1981) "Guide pratique du formateur", IN SEP NUTTIN, J. (1980) "Motivation et perspectives d'avenir", Presses _Universitaires de Louvain NUTTIN, J. (1985) "Théorie de la motivation humaine", deuxième édition, PUF NUTTIN, J. (1985) "La structure de la personnalité 1 ', sixième édition, PUF NUTTIN, J. (1987) "Développement de la motivation et formation", Education Permanen- ~. n'88-89, pp. 97-110 ORIVEL, F. (1981) urnformatique et Enseignement : quelques éléments pour une approche économique", in "L'Informatique à l'école", pp.14-22, Fernand Nathan 209 PAGE, A. (1971) "L'économie de l'éducation", PUF PAPERT, S. (1981) ''Jaillissement de l'esprit : ordinateur et apprentissage", Flammarion PAUL, J.J. (1989) "La relation formation-emploi :un défi pour l'économie", Economica PERT, S. (1972) "Détermination de l'efficacité économique dela formation professionnelle tt, Revue Roumaine de Sciences Sociales série Sciences Economi- ~. 16, n°2, pp. 247-255 PIZON, P. (1983) "Coût et rentabilité de l'EAO", Education Permanente, n°70-71, pp.33-44 PSACHAROPOULOS, G. and WOODHALL, M. (1985) 11Education and Development", Banque Mondiale, Washington RIBOUD, M. (1978) "Accumulation du capital humain", Economica ROLLAND, D. (1981) "L'évaluation des résultats de la formation", Etudes et Documents Série "Recherche'', Institut d'Administration des Entreprises, Centre d'Etude et de Recherche sur les Organisations et la Gestion, Aix-enProvence SCHWARTZ, B. (1968) "Introduction à la programmation budgétaire et à l'analyse Coûtefficacité dans la planification de l'enseignement",, Rapports techniques OCDE, pp. 56-91 210 SCHWARTZ, B. (1981) "L'informatique et l'éducation", La Documentation Française SERGENT, F. (1987) "La micro-informatique en CE2 : Evaluation de l'impact de l'introduction de micro-ordinateurs sur 1' acquis scolaire en français et en mathématique. Le cas de la Côte d'Or en 1985-1986", Mémoire de Diplôme d'Etudes Approfondies, Université de Dijon, Faculté de Sciences Economiques et de Gestion SIMON, J.C. (1980) "L'éducation et l'informatisation de la société", Fayard SINAC (1982) 11Evaluation en EAO", Rapport final d'exécution, Agence de l'Informatique SOREL, M. (1987) "L'éducabilité de l'appareil cognitif: de quoi parle-t-on? Pourquoi ? 11 , Education Permanente, n°88-89, pp. 7-19 SPENCE, M. (1973) "Job Market Signalling", Ouaterly Journal of Economies, août, pp; 355-374 THUROW, L. (1975) "Generating Inequality : Mechanics of Distribution in the U.S. Economy11 , New-York, Basic Books UNESCO (1984) "L'Education aux médias" VAIZEY, J. (1964) 11Economie de 1 'Education", Editions Ouvrières 211 VINCENS, J. (1979) "La formation continue et l'emploi : les aspects économiques", Revue de l'Instit11t d'études politiques de Toulouse, Vol. II, pp. 141-190, Privat VINOKUR, A. (1967) "Economie de l'Education", Thèse de doctorat Sciences Economiques. Université de Nancy Annexes Annexe 1 Dé;.,-,Q~p,.;;;·.,...,;,·;;., r ln'-'!o~;~Mrnenl MUI~rnéO•a lnlormafl>é 93 Chemin des Mouilles 69130 ECULLY Tél. (7) 833.37.11 P R. 0 J E T A R D E M I R,GUJR,. ARDEMI (29,11.84) QU'EST-CE QUE LE PRoJET ''AR DE M 1 '" ARDEMI ARDEMI =: UN ORGANISME "ÉDÉRATEUR UN G, I , E, = UN SYSTÈME MUTUALISTE CHAMP C011MUN D'ACT IV !TÉ GROUPEMENT D'INTERET PARTAGE DES RISQUES ET DES AVANTAGES MISSION ARDEMI (J F0Rt1AT ION PROFESSIONNELLE CONT !.NUE (au FER"'lt;i~i:iFC.\ EJ MAÎTRISE D'OUVRAGE DE L'EXPÉRIMENTATION ET DU DÉVELOPPEf1ENT P. GRANDE ÉCHELLE DE L'EAO EN RHÔNE-ALPES : - DÉVE! OPPE!1ENT À GRANDE ÉCHELLE DE L'EAO P.~R LES MOYENS EXISTANTS. - EXPÉRI~ENTATION À GRANDE ÉCHELLE D'UN SERVICE EAO HA liT DE GAMI·1E, • IMPULSION D'UN MARCHË EAO ET RÔLE STRATÉ{;IQUE DANS L'UTiLISATION DE L'EAO DANS LA RËGION AVEC IMPACT NATIONAL, 0 UNE STRUCTURE JURIDIQUE FONDÉE PAR L'ENSEMBLE DES FORCES SOC!O-ÉCONOM!QUES ET POLITIQUES DE LA RÉGION (DE CONCERT AVEC L'ETAT) OÙ LES UTILISATEURS SONT PARTIES PRENANTES; 0 DANS LE CADRE D'UNE INCITATION POLITIQUE ET FINANCIÈRE LE CONTRAT DE PLAN ~TATRÉGION (1984-1988) ; uT l LI SATEURS (INSTITUTIONNELS) SONT MEMBRES ACTIFS DE ARDEMl ET MEMBRES DU C,A, (IDEM POUR ÉDITEURS), RÉGION : l MFIAN (TOTAL : 5 MF TTC) ETAT : 7 MF (ne) -. F ,p' 4 MF (OONI 40% PUBLICS PRIORITAIRES) - EoN o 1 MF {RESSOURCES HUMAINES) - PTT, 2 MF (MATÉR l EL) 0 A EFFETS DE SYNERGIE MULTIPLES D'AMONT EN AVAL (LES AVANTAGES) GROUP!;MENT D'UT! LI SATEURS À" l MPACT NAT! ONAL VI S-Â-V l S COtiSTRUCTEURS (MATÉRIELS, NORMES, LANGAGES), PARTAGE - COPROPRIETE DIDACTICIElS - PROD, RÉGIONALE AVEC UTILISATION POTENTIELLE NATIONALE .. - PROD. ENSEMBLES PÉDAGOGIQUES COHÉRENTS, GROUPEMENT DE C01111ANDES EXTÉR l EURES DE Dl DA CT! Cl oLS A COÛT PARTAGÉ' DE PRESTATIONS DE SERVICE SPÉCIALISÉES, ARDEMI LES REGLES OU JEU 8 Adhésion à ARDEM 1 e Produire au mini rn um 12 didacticiels de 30 mn J dont .moitié· au moins partagée . o Validation/ Evaluation externe des • didacticiels produits e Utilisation des didacticiels 6 grande · échelle · e N.B. i d e rn pou r rn 01 sons d "éd i ti on " SIMULATION • FONCTIONNEMF"NT ARDEMI SERVICES ARDEMI C ...o.m..-..;.m-....::e.._,.;M.:.:.a i t r e d'Ouvraae action de formation en EAO des auteurs/formateurs. ) encadrement pédagogique et technique (cf. atelier création cours) de l'ensemble du proCessus de production des didacticiels, et responsabilité de la portabilité pédagogique et informatique des ëHdaétï:ciels )organisation et contrôle du proc~ssus de validation/~valuation externe des didacticiels, et des modifications éventuelles. )animation de la diffusion à grande échelle des didacticiels chez les utilisateurs (nombre d'heures annuelles ~sa.ge·s}. ldémarcbes communes aux uti~isateurs ARDEMI : appels d'offres, négociations, opérations co~trat de Plan, etc ... auprès prestataires de services et acteurs politiques, adminiStratifs, économicoindustriels. Autres . ~erv1ces possibles 6) méthodolocrie conception pédagogique et production (dialogue pédagogique à base textuel, graphique, puis multimédia). 0 mise en place grouoes de travail par domaine de contenu, avec spécialistes réseau Education Nationale, g~andes écoles, universités, IUT. @ mise en place d'un réseau· télé~a­ ~ entre J,ltilisateurs ARDEI-1I - .journal in.Ç'ormation· E.-A.O., messagerie pour grou?es de travail et au service de la çoncepticn.et ~reduction Gt actions de diffusion : - démo,· rela~ions extérieures, . actions po~t-forum E.A.O. Lyon, etc ... " ' ,.. COUTS MODALITES DE CALCUL DES COÛTS DE t:OPERATION • coat temps formateurs/auteurs mis à la disposition du projet pour ·produire 12 ·didacticiels (1 1/2 homme-mois x 12 dont modifications). 0 Coût formation E.A.O. des formateurs/auteurs (si .nécessaire) (environ 10 à 12 KF/personne). ~ Coût encadrement ensemble ~rocessus production didacticiels, de l 1 évaluation, et des modifications (estimation totale à' 4,8 MF pour 240 didacticiels produits par 20 utiliSateurs). G) Coût adhésion anhuelle à AlÎI' P7RTAGE, RÉPONSE AUX OBSTACLES À L E.A.O. : o PARTAGE DE LA PRODUCTION (ENSEMBLES PÉDAGOGIQUES COHÉRENTS) o PARTAGE PÉDAGOGIQUE (PARTAGE DES COMPÉTENCES, ET NE PAS DÉMARRER .SUR DE L'EAO EXCLUSIVE11ENT D'AUTOFORMAT ION ET SANS SUPPORT DOCUMENTAIRE) o PARTAGE DES COÛTS (ARDEMI = "SYSTÈME MUTUAL! STE") PA~nGE = EFFETS DE SYNERGIE, COPROPRIÉTÉ DIDACTICIELS, RECHERCHE DU PLUS GRAND DÉNOMINATEUR CO'·If·IUN, e Pragmatisme---. DÉMARRER À PARTIR DES BESOINS EN D 1 DACT 1 Cl ELS LES PLUS LARGE,~ENT RÉPANDUS, SANS EXCLUPE IJN PLAN GLOBAL DE D 1 DAC TIC l ELS Annexe 2 TYPOLOGIE DES FORMES D'INTEGRATION DE L'ENSEIGNE~ffiNT ASSISTE PAR ORDINATEUR : Apportant, de par sa nature même, une très grande souplesse de mise en oeuvre, l'EAO répond à une multitude de situations spécifiques. Son intégration, sous quelque forme que ce soit, induit une multiplication des conditions d'apprentissage. De plus, son développement au sein d'institutions très diverses laisse apparattre un éventail très riche de potentialités. Le choix d'intégration de cette nouvelle technologie informatique repose avant tout sur les responsables de formation. Ces derniers doivent faire face à des questions particulières propres à l'entreprise pour laquelle ils agissent. D'une manière générale, l'EAO se considère principalement comme outil individuel ou quasi individuel (binôme). A l'heure ac~ tuelle, une utilisation collective ne retient pas les pr~orités. Bien que ne délaissant pas cette dimension, notre tYPologie privilégiera et gardera comme fil directeur cette perspective individuelle. Face à la.très grande diversité de mise en oeuvre de ce nouvel outil, nous retenons onze critères d'ordres organisationnel et pédagogique. L•imbrication entre les deux se trouvant assez forte, il semble difficile de séparer, dans la présentation, les deux dimansions. · - Le but L'introduction de l'EAO répond, selon les institutions rencontrées à~~ multitude-d'objectifs finals. Certaines entreprises axent le développement de ce nouvel auxiliaire pédagogique sur des objectifs culturels alors que d'autres l'introduisent dans le cur·sus mSme d'une formation. EA diplÔmant : exemple : modules préparant le brevet professionnel par unités capitalisables ••••• qUalifiant : exemple : préparation d'examens pour passage à l'échelon . s~périeur .ipportant une formation nouVelle à l'apprenant : l'individu appréhende des concepts et connaissances inconnues pour lui. mettant à jour les connaissances la personne confirme ses acquis "et les actualise (normes nouvelles, évolution technique •••• ) développant une cul ture générale - Le contexte Un nouvel outil pédagogique apparaît •••• il peut répondre à différents problèmes posés par la formation. Selon le cadre, il intervient dana un contexte différent. • Le lieu intégrant les formations existantes •· répondant à un énorme problème de formation difficile à résoudre par des enseignements traditionnels : massification de la formation améliorant quantitativement et qualitativement l'offre afin de mieux répondre au marché de la formation et faire face, ainsi, à la concurrence • Pour toute problématiqUe relative à l 1EA0 1 ce critère est fondamental. Aux différentes situations possibles, cOrrespond une utilisation particulière de l'EAO dans un site pr~- ci s. sur le poste de travail : l'ordinateur sert à l'exécution des tâches ·et conjointement à la formation dans un local ou une salle très proche du lieu de travail dans un centre pédagogique "ressource" proche intégrant l'EAO et d'autres moyens pédagogiques. dans le centre de formation à domicile : minitel actuellement, télématique dans un futur proche. - Le nombre de micro-ordinateurs L'implantation des micro-ordinateurs est très souvent sub·ordonnée au nombre de machines que possède 1 1 entreprise. De plus, leur choix d'affectation gestion+ EAO ou EAO seul pose de manière radicalement différente la question de son introduction. - Le moment un micro-ordinateur affecté à la formation pour un service .ou un secteur de l'entrepr~se quelques micro-ordinateurs disséminés dans un service une salle de ty-pe "laboratoire" regroupant un certain nombre d'ordinateurs un micro-ordinateur par personne servant à la fois au poste de travail et à la formation Suivant les orientations données, les moments d'utilisation de l'EAO diffèrent complètement. E A 0 --=============:: pendant le temps de travail hors du temps de travail - La manière Ce critère demeure lui aussi principal. Il co~stitue une des bases de la stratégie de développement de" 1 1EAO. E A 0 libre accès total : les formés travaillent à leur guise sans aucune "surveilla.ncen. libre accès contrôlé : les formés travaillent à leur guise mais s 1 inscrivent pour une séance et souvent font valider leur passage. intégré : 1 1EAO est introduit dans une formation conventionnelle conjointement au cours tradi tiom1el. Corrélativement à cette séparation, il faut-considérer 1 1 importance du suivi du fermé soit par sa hiérarchie immédiate soit par un responsable formation (ou autre personne). supervisé : le suivi est ass_uré par un hiérarchique ou E A 0 une autre personne non supervisé ·- Le public La nature du public ciblé doit être prise en compte lors de.la décision d 1intégration de llEAO. Ce nouvel outil apparaît parfois plus motivant pour des élèves totalement décon.~ectés de tout système de formation. pubiic très capti.t" : ce sOnt des personnes volontaires qui désirent se former. public captif : il représente la moyenne partie des formés, c 1 est-à-dire envoyés en formation pour acquérir de nouvelles connaissances. public à motiver : qualifié souvent de "difficile", ayant Vécu W'le scolarité en si tua ti on d1 échec permanent • . -L'unité de base Bien que demeurant essentiellement un outil indiv.iduel, l 1EAO peut se voir utilisé dans le cadre d'un groupe classe •••• un travail d'équipe facilitant pour certains leur travail.personnel. E A 0 - La nature individuel : une seule personne travaille devant la console quasi individuel : les formés interviennent par binômes ou trinSmes devant l'ordinateur. collectif_ : une seule console est utilisée dans la salle. Les informations apparaissent sur plusieurs écrans placés dans toute la pièce. L1EAO répond selon les cas, à une mission pédagogique· très particulière. Trois voiets se définissent ailÏsi apprentissage : le didacticiel apporte le "corpus" de connaissances complément : l 1EAO s'Utilise alors soit pour préparer une formation soit pour réviser des notions déjà appréhendées. e;x:erciseur 1 1EAO propose essentiellement des exercices d'application. Au niveau des compléments apportés par l'EAO, il faut distinguer trois aspects : avant la formation : révision pour mise à niveau des pré-requis. pendant la formation : selon les points abordés, il semble quelquefois nécessaire de reprendre plus particulièrement des notions. après la formation ~ le réinvestissement des connaissances n'est souvent pas immédiat, ·ainsi fautil revoir au moment ~pportun les . éléments nécessaires à la 'résolution d'un problème pratique. L'introduction de l 1EAO dans la formatien s'opère de manière très diversifiée. A ce stade de la réflexi on surgit la question très souvent posée : "l'EAO est-il un outil de substitution?" La pratique démontre une certaine difficulté pour répondre à une telle interrogation. E. A 0 substitution totale : le cours EAO remplace entière- _ment la formation tradition~ nelle. substitution partielle : "mode mixte", l'outil est introduit conjointement à une intervention du formateur. un outil supplémentaire : dans ce cas, il n'est plus question de substitution. L1EAO s'utilise en plus, parmi d'autres auxiliaires pédagogiques. L'objectif recherché repose sur la diversification des moyens pour un meilleur apprentissage. - La relation au formateur La part d'intervention du formateur rev~t une dimension importante. De plus, la nature même de ses prestations définit des rÔles .pédagogiques de l 1EAO totalemerit différents : EAO outil principal/outil secondaire. E A O. conduit : le formateur reste et apporte parallèlement aes éléments de connaissances. non conduit : le formateur s'absente. Plus significative encore apparaît la forme de ses interventions. -•. avec alternance : reprise synthétique et systé~atique par le formateur de ce qui a été vu dans le module. avec suivi : apports complémentaires d'explications par le formateur au fur et à mesure du déroulement du didacticiel. avec application pratique : autoformation avec réinvestissemant immédiat des connaissances dans des exercices soumis par le formateur. Selon les objectifs visés et la conception que l'on se fait de l 1EAO, les termes de réflexion sur l'opportunité d'introduction de ce nouvel outil varient. Le très grand nombre d'institutions rencontrées nous laisse entrevoir-une variété immense quant à sa mise en oeuvre. Cependant, une remarque de premier ordre s'impose. 1 ,-arrivée progressive actuelle de 1 'EAO sur les différents "te:::-rains" permet, le plus souvent, de valider ou pas, les hypothèses émiSes sur la forme d'utilisation de cet auxiliaire pédagogique. Il est, de ce fait, possible que certaines situations développées dans cette typologie-disparaissent naturellement. Quoi qu'il en soit, le pQint clé de toute considération concernant la pédagogie de l 1EAO appartient à la place du formateur. De sa présence ou non, en découle tout un éventail d'utilisations différentes de ce nouveau moyen d'enseignement. Au-delà de cet aspect principal, ce nouvel outil doit manifester des effets à la fois sur les_ formés, le formateur et le système de formation. Table des matières VEAO dans la fonnation coritinue •••••••.••• o o • • • • • • • • • • 1 10 Le rapport coût-efficacité .... o ••••• o •••••••••••••• 3 2. Structure et problématique générale des coûts de l'enseignement assisté par .ordinateur .................................. 7 2.1 Classification principale des coûts .............. 8 2.2 Effets de l'introduction de l'EAO par rapport aux coûts d'une formation traditionnelle . . . . . . . . . . . . . . . . . 17 3. Efficacité de l'enseignement assisté par ordinateur : analyse-évaluation des effets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Chapitre 1 Evaluation cofit-efficacité de l'EAO en fonnation 11 lnitiation à· la Commande numérique" chez Renault Véhicules Industriels •• , • -•• o o ••• o • • • 31 1.1 Présentation d'une session traditionnelle "initiation èi. la commande numérique" . . . . . . . . . . . . . . . . . . . .. · . . . ·. . . 33 1.2 Introduction de l'EAO dans lafonnation "initiation à la commande numérique" . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 1.2.1 Le stage", ses objectifs, l'intégration de l'EAÛ ... : 35 1.2.2 Evaluation et déroulement des stages . . . . . . . . . 37 1.2.3 1.2.4 Didacticiel utilisé Objectifs atteints .........•........... 39 39 1.3 Etude comparative des coûts d'une fonnation traditionnelle puis "mixte" "initiation à la commande numérique" . . . . . . . . . 40 1.3.1 Cadrage méthodologique et hypothèses retenues .. 40 1.3.2 Coûts d'une formation traditionnelle . . . . . . . . . 42 1.3.2.1 Calcul du coût horaire d'enseignement par stagiaire ........................ 42 1.3.2.2 Calcul du coût horaire de formation par stagiaire ........................ 43 1.3.3 Coûts d'une formation "mixte" ............ 45 1.3.3.1 Calcul du coût horaire d'enseignement par stagiaire . . . . . . . . . . . . . . . . . . . . . . . . 45 1.3.3.2 Calcul du coût horaire de formation par stagiaire . . . . . . . . . . . . . . . . . . . . . . . . 46 1.4 Iijficacité de l'enseignement assisté par ordinateur: analyse des effets quantiiatifs et qualitatifs . . . . . . . . . . . . . . . . . . . . 49 1.4.1 Effets sur les formés . . . . . . . . . . . . . . . . . . . 49 1.4.2 Effets sur le formateur . . . . . . . . . . . . . . . . . 57 1.4.3 Effets sur le système de formation . . . . . . . . . . 61 1.5 Rapport coût-efficacité de l'EAO mis en oeuvre en "Initiation à la commande numérique" . . . . . . . . . . . . . . . . . . . . . . . 64 Tableau synoptique des- effets de l'EAO par rapport à une formation traditionnelle "Initiation à la Commande Numérique" . . . . . . . . . . 67 Chapitre 2 Evaluation coût-efficacité de l'EAO en formation 11Connaissance de I'entreprise11 au Centre de Formation de la Petite Entreprise et du Commerce (CEPC) de la Chambre de Commerce et d'Industrie de Lyon. • • • • • . • • • • • 69 2.1 Introduction de l'EAO dans la formation "Connaissance de l'entreprise" ............................... 72 2.1.1 Présentation du stage . . . . . . . . . . . . . . . . . . 73 2.1.2 Forme d'intégration de l'EAO . . . . . . . . . . . . . 73 2.1.3 Déroulement des stages et évaluation ......... 74 2.1.4 Mise en oeuvre de l'évaluation ............ 75 2.1.5 Didacticiel utilisé . . . . . . . . . . . . . . . . . . . . . 76 2.1.6 Objectifs atteints . . . . . . . . . . . . . . . . . . . . . 76 2.2 Etude comparative des ·coûts d'unefoimation traditionnelle puis "mixte" "Connaissance de l'entreprise" .............. 77 2.2.1 Cadrage méthodologique et hypothèses retenues . . 77 2.2.2 Coûts d'une formation traditionnelle . . . . . . . . . 79 2.2.3 Coût d'une formation "mixte" . . . . . . . . . . . . . 80 2.3 lijjicacité de l'enseignement assisté par ordinateur: analyse des effets quantitatifs et qualitatifs . . . . . . . . . . . . . . . . . . . . 81 2.3.1 Effets sur les formés ............ , , . . . . . 81 2.3.2 Effets sur le-formateur ................. 88 2.3.3 Effets su~ le système de formation . . . . . . . . . . 92 2.4 Rappon coût-efficacité de l'EA.O mis en oeuvre en uconnaissance de l'entreprise" ................ · ......... 93 Tableau synoptique des effets de l 'EAO par rappon à une formation traditionnelle "Connaissance de l'entreprise" ............... 95 Chapitre 3 Evaluation coût-efficacité de I'EAO en fonnation "Automates programmables : structure - fonctionnement- progrannnation" au Centre de formation et de perfectionnement professionnel Merlin-Gerin à Grenoble. • • 97 3.1 Introduction de l'EAO dans lafonnation "Automates Programmables : strncture -fonctionnement -programmation" . -. . . . . 99 3.1.1 Présentation du stage .................. , 99 3.1.2 Objectifs du stage .................... 100 3.1.3 Forme d'intégration de l'EAO ............. 101 3 .1.4 Evaluation et déroulement du stage .......... 102 3.1.5 Didacticiels utilisés .................... 102 3.1.6 Objectifs atteints ..................... 103 3.2 Etude comparative des coûts d'unejonnation traditionnelle puis "mixte" "Automates programmables" ...... , ...•.... 104 3.2.1 Cadrage méthodologique et hypothèses retenues , . 104 3.2.2 Coûts d'une formation traditionnelle ......... 104 3.2.3 Coûts d'une formation "mixte" ............ 105 3.3 Efficacité de l'enseignement Assisté par Ordinateur: analyse des effets ................................... 106 3.3.1 Effets sur les formés ................... 106 3.3.2 Effets sur le formateur ................. 112 3.3.3 Effets sur le système-de formation ........... 114 3.4 Rapport coût-efficacité 'de l'EAO mis en oeuvre en "Automates Programmables: structure- fonctionnement- programmation" . . 116 Tableau synoptique des effets de l 'EAO par rapport à une formation traditionnelle "Automatismes" ........................ 119 Chapitre 4 Evaluation coût-efficacité de l'EAO en formation 11Automatismes 11 à l'AFPMA •.•.•••••••••.••••.•••••••.•••.••••••• ,121 4.1 Introduction de l'EAO en formation "Automatismes"· .. ~ , . ·; 123 · 4.1.1 Objectifs des formations ................. 123 4.1.2 Forme d'intégration de l'EAO ............. 124 4.1.3 Mise en oeuvre de l'évaluation ............ 125 4.2 Etude comparative des coûts d'une formation traditionnelle, puis avec EAO en "Automatismes" .............. -...... 125 4.2.1 Cadrage méthodologique et hypothèses retenues .. 125 4.2.2 Coûts d'une formation traditionnelle ......... 127 4.2.3 Coûts des formations avec EAO ............ 128 4.2.3.1 Coût horaire d'enseignement pour le cours GEMMA (autoformation) ............ 128 4.2.3.2 Coût horaire d'enseignement pour le cours GRAFCET (avec formateur) .......... 129 4.3 Efficacité de l'EAO : analyse des effets quantitatifs et qualita- ~ ..................................... 1~ 4.3.1 Effets sur les formés ................... 130 4.3.2 Effets sur le formateur ................. 133 4.3.3 Effets sur le système de formation .......... 134 4.4 Rapport coût-efficacité de l'EAO mis en oeuvre à l'AFPMA .. 135 Tableau synoptique des effets de l'EA.O par rapport à une fonnation traditionnelle uAutonomatismes" •............•......... 137 Chapitre 5 Evaluation coût-efficacité de l'EAO en formation "Francais-mathématique" au Centre d'enseignement individualisé de la Société d'enseignement professionnel du Rhône (SEPR), ............................. 139 5.1 Introduction_ de l'EA.O dans le Centre d'Enseignement Individualisé (CEl) ................................. 141 5.1.1 Présentation de la formation .............. 141 5.1.2 Objectifs des formations ................. 142 5.1.3 Forme d'intégration de l'EAO ............. 143 5.1.4 Mise en oeuvre de l'évaluation ............ 143 5.1.5 Didacticiels utilisés .................... 144 5.1.6 Objectifs atteints ..................... 145 5.2 Etude comparative des coûts d'uneformation traditionnelle puis "mixte" .........................•.. -...... 145 5.3 Efficacité de l'EAO analyse des effets quantitatifs et qualita- •..................................... W 5.3.1 Effets sur les formés ............. , ..... 147 5.3.2 Effets sur le formateur ................. 150 5.3.3 Effets sur le système de formation .......... 151 5.4 Rapport coat-efficacité de l'EAO mis en oeuvre au CEl .... 153 Tableau synoptique des effets de l'EA.O par rapport à une formation traditionnelle "Français-Mathématiques" ................. 155 Chapitre 6 Evaluation coüt-efficacité de l'EAO en formation "L'entreprise et sa comptabilite" au Centre de formation des maîtres de Châlon sur Saône. • • , • 157 6.1. Introduction de l'EAO en formation "Mécanismes de base de. la comptabilité" . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 1~9 6.1.1 Objectifs de la formation .. · .............. 159 6.1.2 Forme d'intégration de 1'EAO ............. 160 6.1.3 Mise en oeuvre de l'évaluation ............ 161 6.2 Etude comparative d'une jormatiion traditionnelle puis avec EAO: "L'entreprise et sa comptabilité" ......... ,, .... 161 6.2.1 Cadrage méthodologique et hypothèses retenues . , 161 6.2.2 Coûts d'une formation traditionnelle ...... ; ·, . 162 6.2.3 Coût d'une formation avec EAO ........... 163 6.3 Efficacité de l'EAO : analyse des effets quantitatifs et qualita- •••••••••••••••••.. c •.....•••••••••••• 1M 6.3.1 Effets sur les formés ................... 164 6.3.2 Effets sur le formateur ......... -........ 166 6.3.3 Effets sur le système de formation .......... 166 6. 4 Rapport coût-efficacité de l 'EAO mis en .oeuvre au Centre de Fonnation des Maftres de Châlon sur Saône ... · ........ 167 Tableau synoptique des effets de l'EAO par rapport à une formation traditionnelle "L'entreprise et sa comptabilité" .............. 169 Chapitre 7 Evaluations qualitatives de l'introduction de l'EAO aux Gaz de France (GDF) et Electricité de France (EDF) o o o o o o o o o o o o •••• o o o o • o •••• 171 7.1 Evaluation au Gaz de France (GDF) ................ 173 7.1.1 Introduction de l'EAO en diverses formations ... 173 7.1.2 Etude des effets de la mise en oeuvre de l'EAO . 175 7.1.2.1 Effets sur les formés . . . . . . . . . . . . . .. 175 7.1.2.2 Effets sur le formateur .............. 176 7.1.2.3 Effets sur le système de formation ....... 177 7.2 Evaluation au Centre de Production Nucléaire EDF du Bugey 178 7.2.1 Introduction de l'EAO au CPN du Bugey ...... 178 7.2.2 Etude et limites de la mise en oeuvre de l'EAO ... 179 Tableau synoptique des effets de l'EA.O par rapport à une jonnation traditionnelle "Techniques gazières" . . . . . . . . . . . . . . . . . . .. 183 Conclusion •.••••••••••••••.••••••••••••••••••••• 185 Typologie des modes d'utilisation positifs ou négatifs de l'EAO ... 187 Répercussions sur les coûts .......................... 189 Efficacité de l'EAO ................•............. 190 Le rapport coût-efficacité .......................... 195 Bibliographie ••••••••••••••••••••.••••.••••••••••• 197 Annexes •••••••••••••••••••••••••••••••••••••••• 213 Annexe 1 Annexe 2 Table des matières Principes de l’économie Gregory N. Mankiw • Mark P. Taylor Traduction de la 3e édition anglaise par Élise Tosi 4e édition Conception et réalisation des compléments numériques par Franck Jovanovic Principes de l’économie OUVERTURES  ÉCONOMIQUES Principes de l’économie Gregory N. Mankiw – Mark P. Taylor Traduction de la 3e édition anglaise par Élise Tosi 4e édition Conception et réalisation des compléments numériques par Franck Jovanovic  ÉCONOMIQUES OUVERTURES Ouvrage original : Economics, by N. Gregory Mankiw and Mark P. Taylor, 3rd edition Copyright © 2014 Cengage Learning EMEA ISBN 978-1-4080-9379-5 Pour toute information sur notre fonds et les nouveautés dans votre domaine de spécialisation, consultez notre site web : www.deboecksuperieur.com © De Boeck Supérieur s.a., 2015 4 e édition Fond Jean Pâques 4, B-1348 Louvain-La-Neuve 2 e tirage 2016 Pour la traduction en langue française Tous droits réservés pour tous pays. Il est interdit, sauf accord préalable et écrit de l’éditeur, de reproduire (notamment par photocopie) partiellement ou totalement le présent ouvrage, de le stocker dans une banque de données ou de le communiquer au public, sous quelque forme et de quelque manière que ce soit. Imprimé aux Pays- Bas Dépôt légal : Bibliothèque nationale, Paris : septembre 2015 ISSN 2030-501X Bibliothèque royale de Belgique, Bruxelles : 2015/0074/152 ISBN 978-2-8041-9306-5 À PROPOS DES AUTEURS ..........................................................IX AVANT-PROPOS ......................................................................XI REMERCIEMENTS ....................................................................XIII LES COMPLÉMENTS NUMÉRIQUES ............................................ XV PARTIE 1 INTRODUCTION À L’ÉCONOMIE Chapitre 1 Dix principes de l’économie ............................................... 3 Chapitre 2 Penser comme un économiste .......................................... 27 PARTIE 2 L’OffRE ET LA DEMANDE : COMMENT fONCTIONNENT LES MARChÉS Chapitre 3 Les forces du marché : l’offre et la demande ............ 63 Chapitre 4 L’élasticité et ses applications .......................................... 99 Chapitre 5 La formation de la demande : la théorie du choix du consommateur ........................ 129 Chapitre 6 La formation de l’offre : les firmes sur des marchés concurrentiels ................. 175 PARTIE 3 MARChÉS, EffICACITÉ ET bIEN-êTRE Chapitre 7 Les consommateurs, les producteurs et l’efficacité des marchés ............................................... 227 Chapitre 8 L’offre, la demande et les politiques publiques ...... 253 SOMMAIRE Vi PrinciPes de l’économie PARTIE 4 L’ÉCONOMIE DU SECTEUR PUbLIC Chapitre 9 Le système fiscal et les coûts de la fiscalité............... 277 PARTIE 5 LES INEffICACITÉS MARChANDES Chapitre 10 biens publics, ressources communes et biens tutélaires ................................................................ 307 Chapitre 11 Externalités et échec de marché .................................... 333 Chapitre 12 Information et économie comportementale .............. 369 PARTIE 6 COMPORTEMENT DES fIRMES ET STRUCTURES DE MARChÉ Chapitre 13 Les décisions de production des firmes ...................... 391 Chapitre 14 Structures de marché I : le monopole ........................ 407 Chapitre 15 Structures de marché II : la concurrence monopolistique ..................................... 445 Chapitre 16 Structures de marché III : l’oligopole .......................... 467 PARTIE 7 LES MARChÉS DES fACTEURS DE PRODUCTION Chapitre 17 L’économie des marchés du travail ............................. 509 PARTIE 8 LES INÉgALITÉS Chapitre 18 Les inégalités de revenu et pauvreté ........................... 555 PARTIE 9 L’ÉChANgE Chapitre 19 Interdépendances et gains à l’échange ..................... 585 PARTIE 10 LES DONNÉES DE LA MACROÉCONOMIE Chapitre 20 La mesure du revenu d’une nation .............................. 635 Chapitre 21 Mesurer le coût de la vie ................................................. 661 Sommaire VII PARTIE 11 L’ÉCONOMIE RÉELLE DANS LE LONg TERME Chapitre 22 Production et croissance .................................................. 687 Chapitre 23 Le chômage ........................................................................... 723 PARTIE 12 LES TAUx D’INTERêT, LA MONNAIE ET LES PRIx À LONg TERME Chapitre 24 L’épargne, l’investissement et le système financier ...................................................... 757 Chapitre 25 Les outils de base de la finance .................................... 787 Chapitre 26 Le système monétaire ........................................................ 815 Chapitre 27 Croissance de la masse monétaire et inflation ....... 849 PARTIE 13 LA MACROÉCONOMIE DES ÉCONOMIES OUVERTES Chapitre 28 Macroéconomie ouverte : les concepts de base .......................................................... 883 Chapitre 29 Une théorie macroéconomique de l’économie ouverte ...................................................... 907 PARTIE 14 LES fLUCTUATIONS ÉCONOMIQUES DE COURT TERME Chapitre 30 Les cycles économiques .................................................... 933 Chapitre 31 L’economie keynesienne et l’analyse IS-LM ............. 957 Chapitre 32 La demande agrégée et l’offre agrégée .................... 995 Chapitre 33 L’influence de la politique monétaire et de la politique budgétaire sur la demande agrégée ............................................... 1031 Chapitre 34 L’arbitrage de court terme entre inflation et chômage .......................................................................... 1055 Chapitre 35 Les politiques de l’offre .................................................. 1087 Viii PrinciPes de l’économie PARTIE 15 MACROÉCONOMIE INTERNATIONALE Chapitre 36 Les zones monétaires et l’Union monétaire européenne ............................... 1109 Chapitre 37 La crise financière et la dette souveraine ................ 1143 glossaire ..................................................................................................... 1175 Index des notions ....................................................................................... 1185 À PROPOS DES AUTEURS Les auteurs N. Gregory Mankiw est professeur d’économie à l’Université de Harvard. Il a étudié l’économie à l’Université de Princeton et au Massachusetts Institute of Technology (MIT). Il a enseigné la macroéconomie, la microéconomie, les statistiques et les principes de l’économie. Le professeur Mankiw est un écrivain très prolifique ; il est aussi très présent dans les débats économiques et politiques. En plus de ses activités d’enseignement, de recherche et d’écriture, le professeur Mankiw a été chercheur au National Bureau of Economic Research (NBER) et conseiller auprès de la Réserve fédérale de Boston et du Congressional Budget Office (Bureau du Budget du Congrès américain). De 2003 à 2005, il a été président du US President’s Council of Economic Advisors (littéralement, président du Conseil des Conseillers économiques du Président américain). Il a aussi été conseiller de Mitt Romney lors de la campagne électorale américaine de 2012. Le professeur Mankiw vit à Wellesley, dans le Massachusetts, avec sa femme Deborah, leurs trois enfants et leur border terrier, Tobin. Mark P. Tayl or est doyen de la Business School de l’Université de Warwick et professeur de finance internationale. Il est diplômé en philosophie, en science politique et en économie de l’Université d’Oxford. Il a obtenu un master, puis un doctorat en économie et finance internationale à l’Université de Londres. Le professeur Taylor a enseigné l’économie dans de nombreuses universités (incluant Warwick, Oxford, New York), à des niveaux différents (depuis des cours d’introduction jusqu’à des cours de 3e cycle ). Il a été économiste senior auprès du Fonds monétaire international et de la Banque d’Angleterre et avant d’être nommé doyen de l’Université de Warwick, il a été directeur général de BlackRock, le plus grand organisme de placement collectif au monde. Il était en charge de l’étude de l’allocation internationale des actifs du point de vue de l’analyse macroéconomique. Ses travaux ont été publiés dans des revues académiques et il fait partie aujourd’hui des économistes les plus cités dans le monde de la recherche. Le professeur Taylor vit en famille dans une ferme du quinzième siècle près de Stratford sur Avon dans le Warwickshire ; il y collectionne des pendules et élève des abeilles. Le contrIbuteur Andrew Ashwin a plus de 20 ans d’expérience en tant que professeur d’économie. Il est titulaire d’un MBA et rédige une thèse de doctorat portant sur la notion de seuil en X PrinciPes de l’économie économie. Andrew est un auteur expérimenté qui a conçu des manuels pour étudiants de différents niveaux. Andrew est président du collège des examinateurs d’un organisme d’accréditation en économie et gestion de premier plan et est éditeur de la revue de l’Economics, Business and Enterprise Association (EBEA). Il est aussi rédacteur pour le site internet Biz/ed basé à l’université de Bristol et consultant pour le régulateur britannique Ofqual. Andrew, qui développe un intérêt particulier pour l’enseignement et l’évaluation en économie est membre expert du Chartered Institute of Educational Assessors. Andrew vit dans le Rutland avec sa femme Sue et ses jumeaux Alex et Johnny. AVANT-PROPOS La quatrième édition de « Principes de l’Économie » est différente des deux précédentes. Tenant compte des remarques des utilisateurs, étudiants et enseignants, son contenu a été remanié, de nouvelles sections traitent en profondeur les grandes questions de la micro et de la macroéconomie. Cette édition est, comme les précédentes, une adaptation européenne du célèbre ouvrage de Mankiw. Elle a ainsi son identité propre, qui la différencie de la version américaine originale. Les auteurs ont cependant eu à cœur de conserver le style dynamique et le caractère abordable de cet ouvrage d’introduction à l’économie. L’analyse économique fait référence à toutes les situations de notre quotidien et les concepts fondamentaux peuvent s’appliquer à un ensemble d’expériences bien réelles. « L’économie est une étude de l’humanité dans l’activité ordinaire de la vie » : voici qu’écrivit Alfred Marshall, le grand économiste britannique du 19e siècle dans son livre, Principe s d’ économie pol itique . Gardez cela à l’esprit, à mesure que vous progresserez dans votre étude de l’économie. Alors même que les actualités focalisent sur le monde de la banque et de la finance, les impôts et la politique économique, l’analyse économique offre bien plus qu’un simple aperçu de ces thématiques. Elle permet de comprendre le processus de formation d’un ensemble de décisions de la vie courante. Par exemple, vous avez l’intention de voyager, mais vous vous étonnez du prix qu’il vous faut payer pour être vacciné contre des maladies tropicales. Partirez-vous quand même ? Alors que vous vous apprêtez à éviter une dépense substantielle, ne pensez-vous pas que ce prix reste bien faible lorsqu’il est comparé au coût de tomber gravement malade, vous et votre famille ? Ces questions sont du même ordre que celles liées à la fixation du taux d’intérêt de la politique monétaire ou aux décisions d’investir des firmes. Bienvenue dans le monde merveilleux de l’économie – apprenez à penser comme un économiste et un monde nouveau s’ouvrira à vous. REMERCIEMENTS Michael Barrow, University of Sussex, Royaume-Uni Brian Bell, London School of Economics, Royaume-Uni Thomas Braeuninger, Université de Manheim, Allemagne Eleanor Deny, Trinity College – D ublin, Royaume-Uni Gaia Garino, University of Leicester, Royaume-Uni Chris Grammenos, American College of Thessaloniki, Grêce Getinet Haile, University of Nottingham, Royaume-Uni Luc Hens, Vrije Uni, Belgique William Jackson, University of York, Royaume-Uni Colin Jennings, King’s College London, Royaume-Uni Sarah Louise Jewell, University of Reading, Royaume-Uni Arie Kroon, Utrecht Hogeschool, Pays-Bas Jassodra Maharaj, University of East London, Royaume-Uni Paul Melessen, Hogeschool van Amsterdam, Pays-Bas Jør n Rattsø, N orwegian University of Science and Technology, Norvège Frédéric Robert-Nicoud, Université de Genève, Suisse Erich Ruppert, Hochschule Aschaffenburg, Allemagne Noel Russell, University of Manchester, Royaume-Uni Munacinga Simatele, University of Hertfordshire, Royaume-Uni Robert Simmons, University of Lancaster, Royaume-Uni Alison Sinclair, University of Nottingham, Royaume-Uni LES COMPLÉMENTS NUMÉRIQUES Les compléments multimédias associés aux Principe s de l’économie de Mankiw-Taylor ont été conçus pour offrir une expérience d’apprentissage interactive. Avec ces compléments, les étudiants sont actifs : ils interagissent avec le contenu du manuel, visualisent les effets concrets de certains événements, reconstruisent par eux-mêmes les concepts économiques et leur utilisation. Les compléments sont insérés sous forme de pictogrammes dans la version numérique NOTO. Ils précisent, détaillent et approfondissent les sections et les notions importantes des principaux chapitres pour conduire les étudiants à s’approprier par eux-mêmes les connaissances. Ils incluent des documents additionnels, des animations et des explications supplémentaires à celles comprises dans le manuel. Ils incluent aussi des questions/réponses pour permettre aux étudiants de s’assurer par eux-mêmes de la maîtrise des notions, définitions et concepts importants. Ils comprennent également un grand nombre de graphiques, figures et tableaux en complément de ceux du manuel. Les compléments ont ainsi été conçus pour inciter les étudiants à développer leur esprit critique lorsqu’ils lisent un ouvrage et à faire des liens entre leurs lectures et leurs connaissances préalablement acquises. Pour chacun des principaux chapitres, des exercices sont proposés. Ces exercices sont de niveaux de difficulté croissants et possèdent tous un solutionnaire détaillé. Les étudiants peuvent ainsi évaluer leur apprentissage et se préparer efficacement à leurs examens. Il est possible d’imprimer ces exercices ou leur solution au besoin. Enfin, un livret de rappels mathématiques et un livret de rappels méthodo logiques. Ces livrets permettent aux étudiants de réviser les mathématiques nécessaires à la compréhension du manuel. Les rappels méthodologiques sont fournis pour aider les étudiants à présenter leurs réponses lors d’examens et de travaux. Des outILs InteractIFs et InnoVants Les compléments multimédias associés aux Principe s de l’économie de Mankiw-Taylor offrent plusieurs outils interactifs et innovants. XVi PrinciPes de l’économie Des animations avec voix-off Les compléments multimédias et les exercices comptent plus d’une centaine d’animations avec voix-off. Ces animations permettent de suivre visuellement la manière dont certains graphiques ou figures du manuel sont construits, tout en écoutant les commentaires. Elles offrent une version animée de certains raisonnements du manuel. Les compléments numériques XVII Elles permettent d’approfondir certaines affirmations ou concepts du manuel difficilement accessibles au premier abord. Par ailleurs, certaines animations ont été scénarisées pour familiariser les étudiants avec les raisonnements théoriques sous-jacents utilisés dans les outils de simulation interactifs. Des outils de simulation interactifs Des simulations permettent aux étudiants d’analyser par eux-mêmes les conséquences d’un choc macroéconomique. Un choc et une situation initiale sont tirés aléatoirement et les étudiants analysent les conséquences de ce choc en sélectionnant des actions qui sont jouées graphiquement au fur et à mesure. XViii PrinciPes de l’économie Ces simulations ont été développées avec une interaction conviviale. Elles permettent d’appliquer les concepts étudiés avec des exemples concrets et de visualiser directement les effets de chaque étape de l’analyse du choc. Vidéos 85 exercices sont corrigés à l’aide de vidéos. Ces vidéos ont été développées pour faciliter l’apprentissage de concepts économiques abstraits. En visualisant la manière dont un économiste pose puis résout un problème donné, les étudiants acquièrent des réflexes qu’ils peuvent ensuite mobiliser dans leurs échanges avec leurs professeurs ou lors de leurs examens. Par ailleurs, ces vidéos permettent de revoir à loisir les corrections de ces exercices. Les compléments numériques XIX Certaines démonstrations sont également faites à l’aide de vidéos, afin d’aider les étudiants à les assimiler. un aPPrentIssaGe FacILItÉ Les compléments associés aux Principe s de l’économie de Mankiw -Taylor facilitent l’acquisition des connaissances en associant les trois systèmes de perception actifs dans tout apprentissage : le visuel, l’auditif et le kinesthésique. Les animations avec voix-off font appel au système de perception visuel et auditif des étudiants. Une centaine de problèmes de synthèse sont corrigés par des vidéos permettant aux étudiants de visualiser et d’écouter la manière dont un économiste pose puis résout un problème donné. Des outils de simulation reprennent la même interface que certaines animations et permettent aux étudiants de mettre en œuvre leurs connaissances en faisant appel au système de perception kinesthésique des étudiants. De la même manière, tout au long de l’analyse guidée, l’attention des étudiants est sollicitée par des questions sur les concepts théoriques immédiatement abordés dont la réponse est directement accessible. XX PrinciPes de l’économie remercIements Matthieu Ballandonne – U niversité d’Angers Élodie Boissières – T ÉLUQ Charles-Étienne Boulé – T ÉLUQ Kevin Boyer – T ÉLUQ Jacqueline Chevalier – T ÉLUQ Mélanie Denis – T ÉLUQ Annick Desmeules-Paré – T ÉLUQ Michel Dion – T ÉLUQ Mélanie Dionne – T ÉLUQ Jean-Charles Dormeux – T ÉLUQ Nathalie Elgrably – H EC Montréal Philippe Le Gall – U niversité d’Angers Steve Maranda – T ÉLUQ Alice Martin – T ÉLUQ Mathieu Moreau – T ÉLUQ Sébastien Patenaude – T ÉLUQ France Renaud – T ÉLUQ et HEC Montréal Sonia Ruel – T ÉLUQ Christine Simard – T ÉLUQ IntroductIon à L’éconoMIE PartIE 1 chapitre 1 Dix principes de l’économie 3 chapitre 2 Penser comme un économiste 27 1 1.1 Qu’est-ce que l’économie ? 4 1.2 Comment les individus prennent leurs décisions 6 1.3 Comment les individus interagissent 10 1.4 Comment fonctionne l’économie dans son ensemble 14 dIx PrIncIPEs dE L’éconoMIE 4 introduction à l’économie 1.1 Qu’est-ce Que L’ÉconomIe ? Le mot économie a une origine grecque, oikonomos, il signifie « celui qui gère la maison ». À première vue, cette étymologie peut paraître surprenante, mais en réalité les ménages et les économies ont beaucoup de choses en commun. Un ménage fait face à de nombreuses décisions. Il doit décider qui effectue quelles tâches et ce que chacun reçoit en retour : qui prépare le dîner ? Qui lave le linge ? Qui aura une tranche de gâteau supplémentaire à l’heure du thé ? Qui choisit le programme télévisé ? En bref, le ménage doit allouer ses ressources rares entre ses différents membres en prenant en compte les capacités, les efforts et les souhaits de chacun. Au même titre qu’un ménage, une société est confrontée à de nombreuses décisions. Une société doit décider des emplois nécessaires et qui les occupera. Elle a besoin de personnes qui produisent de la nourriture, d’autres qui confectionnent des vêtements et d’autres encore qui créent des logiciels. Une fois que la société a affecté les hommes (ainsi que la terre, les bâtiments et les machines) aux différents emplois, elle doit aussi répartir les quantités de biens et de services produits. Elle doit décider qui mange du caviar et qui mange des pommes de terre. Elle doit décider qui conduit une Jaguar et qui prend le bus. 1.1.1 Le problème économique Ces décisions sont représentatives de ce que l’on peut appeler « le problème économique ». T oute société doit répondre à trois questions : Ɣ quels biens et services devraient être produits ? Ɣ comment ces biens et services devraient être produits ? Ɣ à qui sont destinés ces biens et services produits ? Les réponses à ces questions seraient simples si les ressources étaient si abondantes que la société pourrait produire tout ce que les individus désirent. Il n’en est rien. La société ne dispose jamais assez de ressources pour produire tous les biens désirés et répondre aux besoins de ses citoyens. Ces ressources peuvent être classées dans une de ces trois grandes catégories : Ɣ la terre – Il s’agit de toutes les ressources naturelles de la planète. Elles incluent les minerais de fer, d’argent, d’or, de cuivre, les poissons des océans, le charbon et toutes les ressources alimentaires issues de la terre. Dans son ouvrage de 1817, Principe s de l’économie pol itique et de l’impôt , David Ricardo parle des « facultés primitives et indestructibles du sol ». Ɣ le travail – Il s’agit de l’effort humain, physique et intellectuel, appliqué à la production. Les activités d’un technicien qui fabrique des outils de précision, d’un banquier spécialisé dans les investissements, d’un balayeur, d’un enseignant sont toutes des formes de travail. Ɣ la capital – Il s’agit de l’équipement et des structures utilisées pour produire des biens et des services. Les biens capitaux incluent les machines dans les usines, les bâtiments, Dix principes de l’économie 5 les tracteurs, les ordinateurs, les fours,… en bref, tout ce qui n’a pas d’autre destination que la contribution à la production. Ź Terre toutes les ressources naturelles de la planète Ź Travail l’effort humain, intellectuel et physique, dédié à la production Ź Capital l’équipement et les structures utilisés pour produire des biens et services 1.1.2 Rareté et choix La gestion des ressources de la société est importante car les ressources sont rares. La rareté signifie que les ressources existent en quantités limitées et que la société ne peut pas produire tous les biens et services que les individus souhaiteraient avoir. De la même manière qu’un ménage ne peut pas donner à chacun de ses membres tout ce qu’il désire, une société ne peut pas faire accéder chaque individu au niveau de vie auquel il aspire. L’économie est l’étude de la manière dont la société gère ses ressources rares, elle tente de répondre aux trois questions posées précédemment. Dans la plupart des sociétés, l’allocation des ressources résulte de l’action combinée de millions de ménages et de firmes au sein d’un système de marchés. Les économistes : Ɣ étudient comment les individus prennent leurs décisions : combien d’heures ils travaillent, ce qu’ils achètent, combien ils épargnent et comment ils investissent leur épargne, Ɣ étudient aussi comment les individus interagissent les uns avec les autres. Par exemple, ils examinent comment la multitude d’acheteurs et de vendeurs d’un bien détermine le prix auquel le bien est vendu et en quelle quantité, Ɣ analysent les forces et les tendances qui affectent l’économie dans sa globalité, incluant la croissance du revenu moyen, la part de la population qui ne peut pas trouver de travail et le taux auquel les prix augmentent. Ź Rareté la caractéristique des ressources économiques qui existent en quantités limitées Ź Économie l’étude de la façon dont l’économie gère ses ressources rares Bien que l’étude de l’économie comporte de nombreuses facettes, cette discipline est structurée autour de plusieurs idées majeures. Dans le reste de ce chapitre, nous nous intéresserons aux Dix pr incipe s de l’économie. Ne vous inquiétez pas si vous ne les comprenez pas tous tout de suite, ou si vous ne les trouvez pas complètement convaincants. Dans les chapitres suivants, nous explorerons ces idées plus en détail. Les dix principes sont exposés ici pour que vous puissiez vous faire une idée générale de l’analyse économique. Vous pouvez concevoir ce chapitre comme une « mise en bouche ». 6 introduction à l’économie 1.2 comment Les InDIVIDus Prennent Leurs DÉcIsIons Le terme « économie » n’a rien de mystérieux. Que l’on parle de l’économie d’un groupe de pays comme l’Union européenne ou de l’économie d’un pays en particulier, comme la France, ou du monde entier, une économie est juste un groupe d’individus qui interagissent au quotidien. L’économie fait référence à toutes les activités de production et d’échange qui se déroulent chaque jour – tous les achats et toutes les ventes. Le niveau d’activité économique est une mesure de tout ce qui est acheté et vendu dans l’économie pour une période donnée. Ź L’économie toutes les activités de production et d’échange qui se déroulent chaque jour Ź L’activité économique la mesure des achats et des ventes dans l’économie, pour une période donnée Puisque le comportement d’une économie reflète le comportement des individus qui la composent, nous débutons notre étude de l’économie par les quatre principes de la prise de décision. 1.2.1 Principe 1 : Les individus font face à des arbitrages La première leçon relative à la prise de décision peut se résumer par un adage familier aux économistes : « il n’y a pas de repas gratuit ». Pour obtenir quelque chose que nous aimons, nous devons généralement abandonner quelque chose d’autre que nous aimons aussi. Prendre une décision signifie arbitrer entre différents objectifs. Considérons un étudiant qui doit décider de quelle manière il va répartir la ressource la plus importante dont il dispose – son temps. Il peut passer tout son temps à étudier l’économie, il peut passer tout son temps à étudier la psychologie, ou encore il peut partager son temps entre les deux disciplines. Pour chaque heure qu’il passe à étudier une matière, il renonce à une heure qu’il aurait pu passer à étudier l’autre matière. De même, pour chaque heure passée à étudier, il renonce à une heure passée à faire de la gymnastique, à rouler à vélo, à regarder la télévision, à faire la sieste ou à travailler à temps partiel pour gagner un peu d’argent de poche. Intéressons-nous maintenant aux parents qui doivent décider de la façon de dépenser le revenu familial. Ils peuvent acheter de la nourriture, des vêtements ou se payer des vacances. Alternativement, ils peuvent aussi épargner une part du revenu familial pour leur retraite ou pour aider leurs enfants à s’acheter un logement plus tard. Lorsqu’ils décident de dépenser un euro supplémentaire pour l’un de ces biens, ils ont un euro en moins à dépenser pour acquérir un autre bien. Lorsque les individus sont regroupés au sein de sociétés, ils font face à différents types d’arbitrages. L’arbitrage classique est celui qui porte sur les dépenses liées à la défense nationale ou à l’alimentation. Plus nous investissons dans la défense nationale Dix principes de l’économie 7 pour protéger nos frontières des agressions extérieures, moins nous pouvons acheter de biens de consommation afin d’augmenter notre niveau de vie à l’échelle de la nation. Un arbitrage tout aussi important dans la société moderne est celui qui concerne un environnement sain et un haut niveau de revenu. Les lois qui imposent aux firmes la réduction de la pollution poussent à la hausse les coût s de production des biens et services. Du fait de ces coût s plus élevés, les firmes finissent par dégager des profits moindres, payer des salaires plus faibles, augmenter les prix ou recourir à une combinaison de ces trois éléments. Ainsi, alors que la réglementation de la pollution nous fait bénéficier d’un environnement plus sain et de meilleures conditions sanitaires qui lui sont associées, elle a pour prix la réduction des revenus des entrepreneurs, des travailleurs et des clients des entreprises. Un autre arbitrage rencontré par la société est celui qui concerne l’efficacité et l’équité. L’efficacité signifie que la société tire le meilleur parti de ses ressources rares. L’équité signifie que les produits de ces ressources sont distribués de manière juste entre les membres de la société. En d’autres termes, l’efficacité représente la taille du gâteau économique et l’équité représente la façon selon laquelle le gâteau est partagé. Souvent, lorsque l’État élabore ses politiques, les deux objectifs entrent en conflit. Ź Efficacité la propriété qui caractérise une économie capable de tirer le meilleur parti de ses ressources rares Ź Équité la propriété qui caractérise une économie capable de distribuer les richesses de manière équitable entre ses participants Prenons le cas, par exemple, de politiques visant à atteindre une distribution plus équitable du bien-être économique. Certaines de ces mesures, telles que le système de sécurité sociale ou l’assurance chômage cherchent à soutenir les membres de la société qui sont le plus en difficulté. D’autres mesures, comme l’impôt sur le revenu, imposent à ceux qui ont une situation financière positive de contribuer plus que les autres à l’action de l’État. Alors même que ces politiques ont pour résultat davantage d’équité, elles ont un coût qui se traduit par une efficacité réduite. Lorsque l’État redistribue le revenu des riches vers les pauvres, il réduit la rémunération du travail et par conséquent les individus travaillent moins et produisent moins de biens et services. En d’autres termes, lorsque le gouvernement essaie de couper le gâteau économique en parts plus égales, le gâteau se rétrécit. Reconnaître que les individus sont confrontés à des arbitrages ne nous renseigne pas vraiment sur les décisions qu’ils prendront ou devraient prendre. Un étudiant ne devrait pas cesser d’étudier la psychologie, ce qui aurait pour effet d’augmenter le temps disponible pour l’étude de l’économie. La société ne devrait pas cesser de protéger l’environnement pour la simple raison que les réglementations environnementales réduisent notre train de vie. Les pauvres ne devraient pas être ignorés parce que l’aide qui leur est apportée influence les incitations à travailler. Néanmoins, il est important de reconnaître les arbitrages de la vie quotidienne car il n’est de bonne décision qu’en connaissance des différentes alternatives. 8 introduction à l’économie Testez-vous Est-ce que l’adage « il n’y a jamais de repas gratuit » se réfère simplement au fait que quelqu’un doit payer pour avoir un repas, ou bien cela signifie-t-il que le bénéficiaire de ce repas gratuit supporte également un coût ? 1.2.2 Principe 2 : Le coût d’une chose mesure ce à quoi on renonce pour l’obtenir Puisque les individus font face à des arbitrages, la prise de décision nécessite de comparer les coût s et les bénéfices des alternatives qui se présentent. Dans de nombreux cas, cependant, le coût d’une action n’est pas facile à déterminer. Considérons, par exemple, la décision d’étudier à l’université. L’avantage associé en est l’enrichissement intellectuel personnel ainsi qu’un ensemble d’opportunités professionnelles de qualité tout au long de la vie active. Mais quel en est le coût ? Afin de répondre à cette question, vous seriez tenté d’additionner les montants dépensés au titre des frais de scolarité, des livres, du logement et de la nourriture. En fait, ceci ne représente pas réellement ce à quoi vous renoncez pour étudier une année à l’université. Le premier problème associé à ce type de réponse provient de ce qu’elle inclut des éléments qui ne sont pas vraiment des coût s liés à aux études universitaires. Même si vous renoncez à étudier à plein temps, vous avez toujours besoin d’un endroit pour dormir et vous devez aussi vous nourrir. Le logement et la nourriture ne font partie des coût s des études supérieures que dans la mesure où ils sont plus élevés à l’université qu’ailleurs. De même, il est possible que les coût s du logement et de la nourriture à l’université soient moins élevés que le loyer et les dépenses que vous supporteriez en vivant de manière indépendante. Dans ce cas, les économies réalisées sur le logement et la nourriture sont de réels avantages résultant de la décision d’étudier à l’université. Le deuxième problème découlant de cette manière de calculer les coûts est qu’elle ignore le coût le plus important lié aux études supérieures – le temps personnel des individus. Lorsque vous consacrez une année à suivre des cours, lire des livres et rédiger des dissertations, vous ne pouvez pas dédier ce temps à une activité professionnelle. Pour la plupart des étudiants, les salaires qu’ils sacrifient représentent le coût le plus important de leurs études supérieures. Le coût d’opportunité d’une chose mesure ce à quoi il faut renoncer pour l’obtenir. Lors du processus de décision concernant, par exemple, les études supérieures, ceux qui décident doivent être conscients des coûts d’opportunité associés à chaque action possible. En réalité, ils en sont généralement conscients. Les joueurs de football en âge d’étudier à l’université et qui pourraient gagner des millions en abandonnant leurs études pour jouer au niveau professionnel sont bien conscients de l’importance du coût d’opportunité. Il n’est pas surprenant qu’ils décident que, finalement, le jeu n’en vaille pas la chandelle. Ź Coût d’opportunité ce à quoi il faut renoncer pour obtenir quelque chose Dix principes de l’économie 9 Testez-vous Supposons que les coûts suivants sont supportés par un étudiant pour trois années d’études à l’université : coût d’inscription de 9 000 euros par an = 27 000 euros ; logement pour un coût moyen de 4 500 euros annuels = 13 500 euros ; coût d’opportunité représentant la perte de revenu potentiel évalué à 15 000 euros annuels = 45 000 euros ; coût total = 85 500 euros. Étant donné ce coût relativement élevé, pourquoi aller à l’université ? 1.2.3 Principe 3 : Les individus rationnels raisonnent à la marge Les décisions courantes sont rarement du type « tout ou rien », elles sont habituellement plus nuancées. Au moment du dîner, la décision n’est pas de savoir si on va jeûner ou au contraire s’empiffrer, on doit juste déterminer si on va se resservir en frites. Lorsque la période d’examens se rapproche, la décision n’est pas de tout rater ou de réviser 24 heures par jour, mais de réviser une heure supplémentaire au lieu de regarder la télévision. Les économistes utilisent l’expression « variation marginale » pour décrire les petites variations autour d’un plan d’action donné. Rappelez-vous que le terme « marge » signifie « limite » et par conséquent les variations marginales sont des ajustements aux limites de l’action en cours. Ź Variations marginales ajustements de faible ampleur concernant un plan d’action choisi Dans de nombreuses situations, les individus prennent les meilleures décisions possibles en raisonnant à la marge. Supposons par exemple que vous vous intéressez à l’opportunité de compléter vos études supérieures par un master. Afin de trancher, vous devez identifier les avantages résultant de cette année supplémentaire (des salaires élevés tout au long de votre vie et l’immense joie d’apprendre) ainsi que les coûts additionnels que vous devrez supporter (une année supplémentaire de frais de scolarité et une année de salaire sacrifiée). En comparant ces avantages marginaux à ces coûts marginaux, vous pouvez déterminer en quoi cette dernière année vaut la peine d’être effectuée. Un décideur rationnel entreprend une action si et seulement si l’avantage marginal de cette action est supérieur au coût marginal. 1.2.4 Principe 4 : Les individus réagissent aux incitations Puisque les individus prennent leurs décisions en comparant les avantages et les coûts, leur comportement peut aussi changer lorsque les coûts ou les avantages se modifient. Cela signifie que les individus réagissent aux incitations. Lorsque, par exemple, le prix des pommes augmente, les individus décident de manger plus de poires et moins de pommes puisque le prix d’achat d’une pomme est plus élevé. En même temps, les exploitants des vergers décident d’embaucher plus d’ouvriers et de récolter plus de pommes, puisqu’il est devenu 10 introduction à l’économie encore plus avantageux de vendre une pomme. Comme nous le verrons, connaître l’effet du prix sur le comportement des acheteurs et des vendeurs sur un marché – en l’occurrence, le marché des pommes – est crucial pour comprendre comment l’économie fonctionne. Les décideurs publics ne devraient jamais oublier les incitations car de nombreuses politiques changent les coût s et les avantages auxquels les individus sont confrontés et, par conséquent, modifient les comportements. Une taxe sur l’essence, par exemple, encourage les automobilistes à conduire des voitures plus petites et plus économiques. Elle encourage aussi les automobilistes à utiliser les transports en commun plutôt qu’à prendre leur voiture, et à se rapprocher de leur lieu de travail. Si la taxe était suffisamment importante, les automobilistes commenceraient à conduire des voitures électriques. Lorsque les décideurs publics échouent à identifier comment leurs politiques affectent les incitations, ils obtiennent des résultats non désirés. Par exemple, le gouvernement britannique a accordé un allègement fiscal aux propriétaires de locaux vides afin de les inciter à les remettre sur le marché. Or, cette mesure a été décidée au moment où l’économie rentrait en récession et les propriétaires ont eu les plus grandes difficultés à trouver des locataires pour leurs locaux. Certains propriétaires ont alors estimé qu’il valait mieux détruire les immeubles vides plutôt que payer la taxe. Était-ce le résultat attendu par l’État ? Certainement pas. Cet exemple illustre bien le fait que les individus réagissent aux incitations. Certaines d’entre elles, étudiées par les économistes sont évidentes, d’autres sont plus complexes. Personne n’est surpris d’apprendre que les automobilistes préfèrent acheter des voitures plus petites lorsque le prix de l’essence augmente du fait de nouvelles taxes. En revanche, les effets de la suppression des allègements fiscaux sur les locaux vides ne sont pas faciles à prévoir. Lorsque l’on analyse n’importe quelle politique, il est nécessaire de prendre en compte non seulement les effets directs mais aussi les effets indirects qui passent par les incitations. Si la politique modifie les incitations, les individus modifieront en retour leur comportement. Testez-vous De nombreuses personnes sont sans emploi en Europe, elles demandent des allocations-chômage. Les gouvernements essaient de réduire la dépense publique, mais sont contraints de dépenser davantage en allocations-chômage. Quelles sortes d’incitations les gouvernements pourraient-ils mettre en place afin d’encourager les chômeurs à trouver un emploi au plus vite ? Quelles pourraient être les conséquences inattendues des schémas d’incitations que vous proposez ? 1.3 comment Les InDIVIDus InteraGIssent Les quatre premiers principes portaient sur la manière selon laquelle les agents forment leurs décisions. En ce qui nous concerne personnellement, nombreuses sont nos décisions qui, Dix principes de l’économie 11 non seulement nous affectent nous-mêmes, mais ont aussi un effet sur les autres. Les trois principes suivants concernent la façon dont les agents interagissent les uns avec les autres. 1.3.1 Principe 5 : L’échange est profitable pour tous Les Américains et les Chinois sont souvent présentés dans les actualités comme les concurrents des Européens dans l’économie mondiale. À certains égards, cela est vrai car les firmes américaines et chinoises produisent souvent les mêmes biens que les firmes européennes. Les fabricants de jouets se concurrencent pour conquérir les mêmes clients dans le marché de l’aéronautique. Toyota et Citroën se battent pour les mêmes acheteurs sur le marché des jouets. Les producteurs de fruits se font concurrence pour les mêmes clients sur le marché des fruits. Aussi est-il facile de se tromper lorsque l’on pense à la concurrence entre les pays. Le commerce, ou échange international, entre l’Europe et les États-Unis ou entre l’Europe et la Chine n’est pas assimilable à une compétition sportive, au terme de laquelle il y a un gagnant et un perdant (c’est ce que l’on appelle un jeu à somme nulle). En fait, c’est le contraire qui se produit : l’échange entre deux économies peut améliorer la situation de chacune de ces économies. Pour le comprendre, considérons comment l’échange affecte votre famille. Lorsqu’un membre de votre famille cherche un emploi, il entre en concurrence avec des membres d’autres familles qui cherchent aussi un emploi. Les familles se concurrencent aussi lorsqu’elles vont faire leurs courses, car chacune d’entre elles veut acheter les meilleurs produits au meilleur prix. Ainsi, en un certain sens, d’un point de vue économique, chaque famille se bat contre toutes les autres familles. En dépit de cette concurrence, votre famille ne gagnerait pas à s’isoler des autres familles. Dans ce cas, elle devrait produire sa propre nourriture, fabriquer ses propres vêtements et construire sa propre maison. De toute évidence, votre famille retire beaucoup de sa capacité à échanger avec les autres. L’échange permet à chaque personne de se spécialiser dans les activités pour lesquelles elle est la meilleure, qu’il s’agisse d’élevage, de couture ou de construction. En échangeant avec les autres, les individus peuvent accéder à une plus grande variété de biens et ce, à un coût plus faible. Comme les familles, les pays retirent aussi un avantage de leur capacité à échanger les uns avec les autres. Le commerce permet aux pays de se spécialiser dans ce qu’ils font le mieux et de bénéficier d’une plus grande variété de biens et de services. Les Chinois et les Américains, comme les Coréens et les Brésiliens, sont tout autant nos partenaires dans l’économie mondiale qu’ils sont nos concurrents. 1.3.2 Principe 6 : Les économies de marché sont habituellement un bon mode d’organisation de l’activité économique L’effondrement du communisme dans l’Union Soviétique et dans l’Europe de l’Est au cours des années 1980 est certainement l’un des changements les plus importants intervenus dans le monde au cours du dernier demi-siècle. Le fonctionnement des pays communistes reposait sur le principe selon lequel les planificateurs centraux au pouvoir étaient 12 introduction à l’économie les mieux à même de guider l’activité économique et répondre aux trois questions du problème économique. Ces planificateurs déterminaient quels biens étaient produits, en quelle quantité, par qui et pour qui. La théorie sous-jacente à la planification centralisée prévoyait que seul le gouvernement pouvait organiser l’activité économique de manière à promouvoir le bien-être du pays dans son intégralité. Aujourd’hui, la plupart des pays qui adoptèrent par le passé les économies centralisées ont abandonné ce système et essaient de développer des économies de marché. Dans une économie de marché, les décisions d’un planificateur central sont remplacées par les décisions de millions de firmes et de ménages. Les firmes décident qui embaucher et que produire. Les ménages décident pour quelles firmes travailler et comment dépenser leur revenu. Ces firmes et ces ménages interagissent au sein du marché et les prix ainsi que leur intérêt personnel guident leurs décisions. Ź Économie de marché une économie qui alloue les ressources au travers des décisions décentralisées des nombreuses firmes et des nombreux ménages qui interagissent au sein des marchés des biens et services À première vue, le succès des économies de marché est déconcertant. Après tout, dans une économie de marché, personne ne considère le bien-être de la société dans son ensemble. Les marchés libres (ou décentralisés) présentent de nombreux acheteurs et vendeurs de nombreux biens et services et tous sont intéressés au premier titre par leur propre bien-être. Cependant, en dépit d’un processus de décision décentralisé et de décideurs égoïstes, les économies de marché s’avèrent remarquablement talentueuses dans l’organisation de l’activité économique, de manière à assurer le bien-être économique global. PouR VoTRE infoRmaTion Adam Smith et la main invisible Le célèbre ouvrage d’Adam Smith, La Riche sse de s Nations, fut publié en 1776 et constitue une référence fondamentale en économie. En soulignant le rôle de la main invisible dans les économies de marché, il reflète un point de vue propre aux auteurs des Lumières de la fin du dix-huitième siècle – l’idée selon laquelle les individus vont mieux lorsqu’ils sont livrés à euxmêmes et que la main lourde du gouvernement ne guide pas leur action. Cette philosophie politique fournit la base intellectuelle des économies de marché. Pourquoi les économies de marché fonctionnent-elles aussi bien ? Est-ce parce que l’on compte sur les individus pour traiter leur prochain avec amour et considération ? Pas du tout. Voici comment Adam Smith décrit la façon dont les individus interagissent dans des économies de marché : L’homme a presque continuellement besoin du secours de ses semblables, et c’est en vain qu’il l’attendrait de leur seule bienveillance. Il sera bien plus sûr de réussir, s’il s’adresse à leur intérêt personnel et s’il les persuade que leur propre avantage leur commande de faire ce qu’il souhaite d’eux. […] Ce n’est pas de la bienveillance du boucher, du marchand de bière et du boulanger, que nous attendons notre dîner, mais bien du soin qu’ils apportent à leurs intérêts. […] L’individu […] n’a pas du tout l’intention de promouvoir l’intérêt public pas plus qu’il n’a l’idée de la mesure dans laquelle il est en train d’y contribuer. […] Il ne pense qu’à son propre gain ; en cela, comme dans beaucoup Dix principes de l’économie 13 Dans un ouvrage datant de 1776, Recherches sur la nature et les causes de la richesse des nations, l’économiste écossais Adam Smith a fait une très célèbre observation en économie : les ménages et les firmes qui se rencontrent sur des marchés agissent comme s’ils étaient guidés par une « main invisible », qui les conduit à des situations désirables. Un de nos objectifs dans ce livre est de comprendre comment fonctionne la magie de la main invisible. En étudiant l’économie, vous apprendrez pourquoi les prix sont les instruments avec lesquels la main invisible dirige l’activité économique. Les prix reflètent à la fois la valeur que la société accorde à un bien et ce qu’il lui en coûte de produire ce bien. Puisque les ménages et les firmes se réfèrent au prix lorsqu’ils prennent leurs décisions d’achat et de vente, ils prennent en considération, sans le savoir, les avantages et les coûts sociaux relatifs à leurs actions. Finalement, les prix conduisent les décideurs individuels à des situations qui, dans de nombreux cas, maximisent le bien-être de la société dans son intégralité. 1.3.3 Principe 7 : L’État peut parfois améliorer les situations de marché Si la main invisible du marché est si merveilleuse, pourquoi alors avons-nous besoin de l’État ? Une réponse consisterait à dire que la main invisible a besoin de l’État pour la protéger. Les marchés ne fonctionnent que si les droits de propriété sont respectés. Un agriculteur ne produira pas de produits alimentaires s’il s’attend à ce que ses récoltes soient volées, et un restaurant ne servira pas de repas tant qu’il ne sera pas assuré que les clients paieront avant qu’ils ne partent. Nous nous reposons tous sur le contrôle public et sur les tribunaux pour assurer nos droits sur les choses que nous produisons. Une autre réponse à la même question de l’utilité de l’État trouve sa source dans le fait que, bien que les marchés soient habituellement un bon moyen de coordonner l’activité économique, cette règle connaît des exceptions importantes. En réalité, deux grandes raisons plaident pour qu’un État intervienne dans l’économie : la promotion de l’efficacité et la promotion de l’équité. Cela signifie que la plupart des politiques visent soit à augmenter la taille du gâteau économique, soit à changer la façon dont le gâteau est partagé. Bien que la main invisible conduise habituellement les marchés à allouer les ressources de manière efficace, cela n’est pas toujours le cas. Les économistes utilisent le mot d’autres cas, il est conduit par une main invisible à remplir une fin qui n’entre nullement dans ses intentions ; et ce n’est pas toujours ce qu’il y a de plus mal pour la société, que cette fin n’entre pour rien dans ses intentions. Tout en ne cherchant que son intérêt personnel, il travaille souvent d’une manière bien plus efficace pour l’intérêt de la société, que s’il avait réellement pour but d’y travailler. Smith affirme que les acteurs de l’économie sont motivés par la poursuite de leur intérêt individuel et que la « main invisible » oriente ces intérêts de façon à promouvoir le bien-être économique général. De nombreux apports de Smith sont au centre de l’économie moderne. Notre analyse, dans les chapitres suivants, nous permettra d’expliquer de manière plus précise les conclusions de Smith et d’examiner de plus près les forces et les faiblesses de la main invisible du marché. 14 introduction à l’économie défaillance (ou échec) de marché en référence à une situation dans laquelle le marché livré à lui-même ne réussit pas à produire une allocation des ressources efficace. Une cause possible d’échec de marché réside dans les externalités, qui mesurent l’impact sans contrepartie d’une action d’une personne sur le bien-être d’un tiers. L’exemple classique d’un coût externe est celui de la pollution. Une autre cause possible d’échec de marché est le pouvoir de marché qui fait référence à la capacité d’une personne seule (ou d’un petit groupe de personnes) à influencer outre mesure les prix de marché. Par exemple, si tous les habitants d’un village isolé des Highlands d’Écosse ont besoin d’eau et qu’il n’y a qu’un seul puits, le propriétaire du puits n’est pas soumis à la concurrence rigoureuse par laquelle la main invisible garde normalement l’intérêt individuel sous contrôle. En présence d’externalités ou de pouvoir de marché, une politique publique bien conçue peut augmenter l’efficacité économique. Ź Défaillance (ou échec) de marché une situation dans laquelle le marché décentralisé échoue à allouer les ressources de manière efficace Ź Externalité l’impact sans contrepartie des actions d’un individu sur le bien-être d’un tiers à l’échange Ź Pouvoir de marché la capacité d’un agent économique unique (ou d’un petit groupe d’agents) à exercer une influence substantielle sur les prix de marché La main invisible peut aussi échouer à garantir que la prospérité économique soit distribuée équitablement. Une économie de marché récompense les individus en fonction de leur capacité à produire des choses pour lesquelles d’autres individus sont prêts à payer. Le meilleur footballeur du monde gagne plus que le meilleur joueur d’échecs du monde simplement parce que les gens sont prêts à payer plus pour voir du football plutôt que des échecs. La main invisible ne garantit pas que tout individu disposera d’assez de nourriture, de vêtements décents et jouira d’une assurance santé adaptée. De nombreuses politiques publiques, telles que l’impôt sur le revenu et le système de sécurité sociale visent à obtenir une distribution plus équitable du bien-être économique. Dire que l’État est capable d’améliorer parfois les situations de marché ne signifie pas qu’il le fera systématiquement. La politique publique n’est pas faite par des anges et passe par des processus qui sont loin d’être parfaits. Quelquefois elle est le fait de dirigeants bien intentionnés mais qui ne sont pas parfaitement informés. Un objectif de l’étude de l’économie est de vous aider à juger si une politique publique est justifiée au regard de la promotion de l’efficacité ou de l’équité, ou bien si elle ne l’est pas. 1.4 comment FonctIonne L’ÉconomIe Dans son ensembLe Nous avons commencé en discutant de la façon selon laquelle les individus prennent leurs décisions puis nous avons observé comment ils interagissent les uns avec les autres. Dix principes de l’économie 15 L’ensemble de ces décisions et de ces interactions forme « l’économie ». Les trois derniers principes concernent le fonctionnement de l’économie dans son ensemble. 1.4.1 Microéconomie et macroéconomie L’analyse économique comporte plusieurs niveaux. Les sept premiers principes concernent le niveau individuel, ils étudient les décisions de ménages et des firmes ainsi que leurs interactions sur des marchés spécifiques. Les trois derniers principes que nous étudions portent sur le fonctionnement de l’économie dans son ensemble, il s’agit simplement de l’agrégation de toutes les activités de tous les décideurs sur tous les marchés. Depuis les années 1930, le champ de l’économie est traditionnellement divisé en deux grandes branches. La microéconomie est l’étude de la manière selon laquelle les ménages et les firmes prennent leurs décisions et interagissent sur des marchés particuliers. La macroéconomie est l’étude des phénomènes qui affectent l’économie dans sa globalité. Un microéconomiste pourrait étudier les effets d’une taxe sur le trafic sur l’utilisation des voitures dans le centre de Londres, l’impact de la concurrence étrangère sur l’industrie automobile européenne ou les effets des études universitaires sur les revenus que percevra un individu tout au long de sa vie. Un macroéconomiste pourrait étudier les effets de l’emprunt par les États nationaux, les variations du taux de chômage d’une économie dans le temps ou les politiques alternatives visant à faire progresser les niveaux de vie d’une nation. Ź microéconomie l’étude de la façon dont les ménages et les firmes prennent leurs décisions et interagissent au sein des marchés Ź macroéconomie l’étude de phénomènes économiques globaux incluant l’inflation, le chômage et la croissance économique Microéconomie et macroéconomie sont fortement liées. Comme les changements dans l’économie globale proviennent des décisions de millions d’individus, il est impossible de comprendre les développements macroéconomiques sans considérer les décisions microéconomiques impliquées. Par exemple, un microéconomiste pourrait étudier les effets de la diminution d’un impôt sur le revenu sur le niveau global de production de biens et services dans une économie. Pour analyser cette question, il doit considérer comment la réduction de la taxe affecte les décisions des ménages concernant le montant à dépenser en biens et services. Malgré le lien organique entre microéconomie et macroéconomie, les deux champs sont distincts. En économie, il semble en effet naturel de démarrer la construction sur la base de la plus petite unité. Or faire de la sorte n’est ni nécessairement ni toujours la meilleure façon de procéder. Comme la microéconomie et la macroéconomie traitent de questions différentes, elles adoptent parfois des approches très différentes et sont souvent enseignées dans des cours séparés. 16 introduction à l’économie Un concept clé de l’analyse économique est la croissance économique, elle mesure le taux d’augmentation (en %) de la quantité de biens et services dans une économie au cours d’une période, habituellement le trimestre ou l’année. Ź Croissance économique le taux d’augmentation de la quantité de biens et services d’une économie au cours d’une période 1.4.2 Principe 8 : Le niveau de vie d’une économie dépend de sa capacité à produire des biens et services Le tableau 1.1 montre le produit intérieur brut par tête dans un certain nombre de pays. Il est évident que de nombreux pays avancés présentent un revenu par tête relativement élevé ; il est de 39 160 dollars américains au Royaume-Uni, de 41 865 dollars en Allemagne et de 41 233 dollars en France. En Italie, le revenu moyen est légèrement inférieur à 33 115 dollars ; il est bien plus élevé en Suisse où il s’établit à 78 880 dollars, le Luxembourg culminant à 106 406 dollars. Ces valeurs sont à mettre en parallèle avec les performances nord-américaines, 52 299 dollars au Canada et 51 703 dollars aux États-Unis. Dès que l’on s’éloigne des économies prospères de l’Europe de l’Ouest et de l’Amérique du Nord, nous commençons à constater des écarts dans le revenu et le niveau de vie, au niveau mondial, qui sont renversants. Par exemple, cette même année 2012, le revenu moyen du Gabon, 11 942 dollars, s’établissait à la moitié du revenu grec, en Bolivie il était seulement de 2 514 dollars, en Inde 1 500 dollars et en Haiti 758 dollars – soit un peu moins de 0,7 pour cent du revenu moyen par personne au Luxembourg ! Il n’est pas surprenant que cette grande variation dans le revenu moyen se reflète dans les autres mesures de la qualité et du niveau de la vie. Les citoyens des pays à hauts revenus bénéficient d’une meilleure alimentation, d’un meilleur système de santé et d’une espérance de vie plus longue que les citoyens des pays à bas revenus, et ils disposent aussi de plus de téléviseurs, d’enregistreurs numériques et de voitures. Les variations dans le niveau de vie au cours du temps sont aussi importantes. Au cours des 5 dernières années, l’Albanie a connu une croissance économique de 4,68 % par an, contre 10,5 % par an en Chine, alors qu’en Lettonie, le PIB a baissé de 1,4 % sur la même période (source : Banque Mondiale). Ź niveau de vie la quantité de biens et services qui peuvent être achetés par la population d’un pays. Il est habituellement mesuré par le revenu réel (ajusté par l’inflation) par habitant Qu’est-ce qui explique ces différences importantes dans les niveaux de vie entre les pays et au cours du temps ? De manière surprenante, la réponse est simple. Presque tout l’écart de niveau de vie est attribuable aux différences de productivité des pays – c’està-dire la quantité de biens et services produits par chaque heure de travail. Dans les nations où les travailleurs sont capables de produire une grande quantité de biens et services par Dix principes de l’économie 17 unité de temps, la plupart des citoyens bénéficient d’un niveau de vie élevé, dans les nations où les travailleurs sont moins productifs, la plupart des citoyens connaissent des conditions de vie plus modestes. De manière similaire, le taux de croissance de la productivité d’une nation détermine le taux de croissance de son revenu moyen. Ź Productivité la quantité de biens et services produite en une heure par un travailleur tableau 1.1 Produit Intérieur Brut par tête, prix courants, dollars US 2009 Pays PIb par tête Afghanistan 633 Allemagne 41 865 Autriche 46 642 Belgique 43 615 Bénin 752 Bolivie 2 514 Burundi 281 Cameroun 1 181 Canada 52 299 Chine 6 071 Côte d'Ivoire 1 057 Danemark 56 426 Finlande 45 634 France 41 223 Gabon 11 942 Grèce 22 072 Guinée 518 Haiti 758 Inde 1 500 Italie 33 115 Japon 46 706 Luxembourg 106 406 Maroc 2 955 Norvège 99 170 République démocratique du Congo 230 République Dominicaine 5 766 Royaume-Uni 39 160 Russie 14 302 Singapour 52 051 Suisse 78 880 Tunisie 4 213 Turquie 10 526 USA 51 703 Vietnam 1 752 Yemen 1 366 Zimbabwe 755 Source : Fonds Monétaire International, base de données World Economic Outlook, octobre 2013 18 introduction à l’économie Cette relation fondamentale entre productivité et niveau de vie est simple, mais ses implications sont vastes. Si la productivité est le déterminant premier des niveaux de vie, d’autres explications sont nécessairement secondaires. Par exemple, il serait tentant de porter au crédit des syndicats de travailleurs ou des lois sur le salaire minimum l’augmentation des niveaux de vie des travailleurs européens au cours des 50 dernières années. En fait, le véritable héros des travailleurs européens est leur productivité croissante. La relation entre productivité et niveau de vie a aussi des implications considérables pour la politique publique. Lorsque l’on pense à la façon dont une politique affecte les niveaux de vie, la question clé est de savoir comment elle affectera notre capacité à produire des biens et des services. Afin de doper les niveaux de vie, les décideurs politiques doivent faire augmenter la productivité en s’assurant que les travailleurs ont un bon niveau d’instruction, qu’ils ont les outils nécessaires pour produire des biens et services et qu’ils ont accès à la meilleure technologie disponible. 1.4.3 Principe 9 : Les prix augmentent lorsque la Banque centrale imprime trop de monnaie Ź inflation l’augmentation du niveau général des prix de l’économie Au Zimbabwe en mars 2007, il y avait à peu près 2 200 pour cent d’inflation. Cela signifie qu’un bien qui valait 2,99 euros en mars 2006 avait un prix de 65,78 euros à peine un an après. En février 2008, l’inflation se montait à 165 000 %. Cinq mois plus tard, elle culminait à 2 200 000 %. En juillet 2008, la banque centrale a imprimé un billet de 100 milliards zimbabwéens. À ce moment-là, il était à peine suffisant pour acheter une miche de pain. Des prévisions d’inflation en juillet 2008 ont fixé le taux de croissance des prix à 231 millions de pour cent. En janvier 2009, la banque centrale zimbabwéenne a émis des billets de 10, 20, 50 et 100 mille milliards de dollars – 100 trillions valant le nombre 100 suivi de 12 zéros. Comme l’inflation impose différents coût s à la société, garder l’inflation à un bas niveau est un objectif pour tous ceux qui font de la politique économique. Qu’est-ce qui est à l’origine de l’inflation ? Dans presque tous les cas d’inflation forte ou persistante, le coupable est le même : la croissance dans la quantité de monnaie. Lorsqu’une banque centrale émet de larges quantités de la monnaie nationale, la valeur de la monnaie baisse. Il est aussi largement accepté qu’il existe un lien entre la croissance monétaire et l’inflation. 1.4.4 Principe 10 : À court terme, la société est confrontée à un arbitrage entre inflation et chômage Lorsque la banque centrale fait augmenter la quantité de monnaie dans l’économie, une des conséquences est l’inflation. Une autre conséquence, au moins à court terme, est un niveau de chômage plus faible. La courbe qui illustre cet arbitrage à court terme entre inflation et chômage s’appelle la courbe de Phillips, du nom de l’économiste qui l’a étudiée en premier alors qu’il travaillait à la London School of Economics. Dix principes de l’économie 19 Ź Courbe de Phillips la courbe qui montre l’arbitrage de court terme entre l’inflation et le chômage La courbe de Phillips reste un sujet controversé parmi les économistes, bien que la plupart d’entre eux acceptent aujourd’hui l’idée qu’il existe à court terme un arbitrage entre l’inflation et le chômage. Cela signifie simplement qu’au cours d’une période d’un an ou deux, de nombreuses politiques économiques poussent l’inflation et le chômage dans des directions opposées. Les décideurs politiques sont confrontés à cet arbitrage, que les niveaux d’inflation ou de chômage d’origine soient tous deux élevés (comme ils l’étaient au début des années 1980) ou faibles (comme à la fin des années 1990), ou encore qu’ils se situent quelque part entre ces deux extrêmes. L’arbitrage entre l’inflation et le chômage est seulement temporaire, mais il peut aussi durer plusieurs années. La courbe de Phillips est, par conséquent, essentielle à la compréhension de nombreux développements de l’économie. En particulier, elle est importante pour la compréhension du cyc le économique – les fluctuations irrégulières et largement imprévisibles dans l’activité économique, telles qu’elles apparaissent dans le nombre de personnes employées ou dans la production de biens et services. Ź Cycle économique les fluctuations de l’activité économique, comme celles de l’emploi et de la production Les décideurs politiques peuvent exploiter l’arbitrage de court terme entre inflation et chômage en utilisant différents instruments de politique économique. En modifiant les montants que l’État dépense, ceux qu’il taxe et la quantité de monnaie qu’il imprime, les décideurs politiques peuvent influencer la combinaison d’inflation et de chômage que connaît l’économie. Comme ces instruments de politique monétaire et de politique budgétaire sont potentiellement si puissants, la question de savoir comment les décideurs politiques devraient les utiliser pour contrôler l’économie, fait l’objet d’un débat permanent. Testez-vous Quelle est la différence entre la microéconomie et la macroéconomie ? Listez trois questions qui relèvent de la microéconomie et trois questions qui relèvent de la macroéconomie. concLusIon Vous avez pu entrevoir ce sur quoi porte l’économie. Dans les chapitres à venir, nous développerons de nombreuses idées caractéristiques des individus, des marchés et des économies. Maîtriser ces idées vous demandera des efforts, mais ce n’est pas une tâche écrasante. Le champ de l’économie développe quelques idées de base qui peuvent être appliquées à un grand nombre de situations différentes. 20 introduction à l’économie Tout au long de ce livre, nous continuerons à nous référer aux Dix pr incipe s de l’économie introduits dans ce chapitre et résumés dans le tableau 1.2. Vous devriez garder présents à votre esprit ces éléments fondateurs. Toute analyse économique, même la plus sophistiquée, est élaborée en référence à ces dix principes. tableau 1.2 Dix principes de l’économie Comment les individus prennent leurs décisions 1. Les individus font face à des arbitrages. 2. Le coût d’une chose mesure ce à quoi on renonce pour l’obtenir. 3. Les individus rationnels raisonnent à la marge. 4. Les individus réagissent aux incitations. Comment les individus interagissent 5. L’échange est profitable pour tous. 6. Les économies de marché sont habituellement un bon mode d’organisation de l’activité économique. 7. L’État peut parfois améliorer les situations de marché. Comment fonctionne l’économie dans son ensemble 8. Le niveau de vie d’une économie dépend de sa capacité à produire des biens et services. 9. Les prix augmentent lorsque la banque centrale imprime trop de monnaie. 10. À court terme, la société est confrontée à un arbitrage entre inflation et chômage. Dans L’aCTuaLiTÉ Pensée récente en économie – les incitations Un des Dix pr incipe s de l’économie stipule que les individus réagissent aux incitations. Cela ne paraît pas à première vue surprenant, mais illustre bien le fait que les économistes peuvent tirer d’un lieu commun une réflexion plus complexe. Gneezy et al . montrent que la complexité de la nature humaine rend la question des incitations un vrai défi à la réflexion (Gneezy, U., Meier, S. et P. Ray-Biel (2011) « Quand et pourquoi les incitations (ne) parviennent (pas) à modifier les comportements » Jour nal of Economic Perspe ctives 25 : 4, pp. 191-210). Ces auteurs montrent que les incitations fonctionnent dans certaines conditions seulement et ils concluent que les décideurs politiques doivent prendre en compte une diversité de situations possibles lorsqu’ils mettent en place ces incitations. Ils doivent tout d’abord s’intéresser au type de comportement qui doit être changé. Par exemple, selon Gneezy et al . une société pourrait encourager ses citoyens à se comporter de manière davantage « pro-sociale », c’est-à-dire développer le don de sang, de sperme ou d’organes, le recyclage des déchets, l’assiduité et le sens de l’effort à l’école, l’installation de panneaux solaires afin de réduire la consommation d’électricité, ou encore diminuer la consommation de tabac. Ensuite, il faut identifier les parties prenantes à ces initiatives. Cela peut s’assimiler à un problème de principal-agent. Le principal est une personne, ou un groupe de personnes, pour le compte de laquelle, une autre personne ou groupe de personnes, (l’agent), agit. Dans l’exemple de la lutte contre le tabac, la société est le principal et l’agent est le groupe de fumeurs. Dix principes de l’économie 21 Il faut alors déterminer le type d’incitations mises en place – elles sont en général de nature monétaire. Les incitations monétaires ont deux effets principaux détaillés par Gneezy et al . : l’effet-prix direct et l’effet psychologique. Une fois que tous ces éléments ont été identifiés, le comportement à changer, le principal, l’agent et le type d’incitations, il faut passer à l’étape suivante, la définition du schéma d’incitations. Une première solution possible est plutôt simple : mettre en place une incitation monétaire, c’est-à-dire payer les gens pour qu’ils se comportent comme prévu. La question est de savoir si cela va fonctionner. Gneezy et al. dénombrent des raisons pour lesquelles le résultat peut ne pas être conforme aux attentes. Dans certains cas, les incitations monétaires peuvent « évincer » le comportement attendu. Donner de l’argent pour inciter les gens à donner de leur sang ou aller régulièrement à l’école peut ne pas produire les effets escomptés car cela change la perception des individus. En effet, ces derniers ont des motivations propres, des raisons personnelles de faire des choses. D’autres sont sensibles à l’avis d’autrui et donnent leur sang pour gagner en estime sociale. Selon Gneezy, l’échec des incitations monétaires peut s’expliquer par le fait que l’effet psychologique l’emporte sur l’effet prix. Comment ? Certains individus qui donnent de leur sang par conviction personnelle pourraient finalement ne plus continuer à le faire, au motif que, aux yeux de la société ils ne seraient finalement plus motivés que par l’appât du gain. Ainsi, dans le cas où l’effet psychologique l’emporte sur l’effet prix direct, le nombre de donneurs pourrait diminuer. En ce qui concerne la lutte contre le tabac, l’impact financier peut être un facteur déterminant. Le principe 5 des Dix pr incipe s de l’économie stipule que les individus raisonnent à la marge. La décision de fumer une cigarette supplémentaire induit des avantages et des coût s – le plaisir de fumer contre la réduction de la durée de vie (estimée à 11 minutes) du fumeur. Le problème provient du fait que le coût ne se fait pas ressentir au moment même où la cigarette est fumée (sans compter le risque d’addiction) et l’avantage marginal l’emporte. À long terme, les avantages liés à l’arrêt de la consommation de tabac deviennent bien plus importants que le coût total. L’incitation offerte doit alors être conçue au regard de ce raisonnement marginal, ce qui peut être une tâche difficile. D’autres questions relatives aux incitations renvoient à la confiance mutuelle entre le principal et l’agent. La mise en place d’une incitation envoie le message selon lequel le comportement attendu n’est pas effectif et qu’il doit y avoir une raison pour cela. Les incitations véhiculent aussi l’idée que le principal n’est pas persuadé de la motivation intrinsèque de l’agent (ex. les gens ne donneront pas leur sang, les déchets ne seront pas recyclés…) . De plus, si les incitations parviennent à faire changer les comportements à court terme, cela sera-t-il toujours le cas à long terme, une fois que l’incitation est retirée ? Enfin, le succès des incitations peut dépendre de la manière dont elles sont libellées ou bien présentées par le principal à l’agent. Gneezy et al . présentent un exemple très intéressant. Imaginez, disent-ils, une situation dans laquelle vous rencontrez une personne avec qui vous engagez une relation. Vous souhaitez l’inciter à aller plus loin et avoir des relations plus poussées. La manière de procéder peut avoir un impact considérable sur le résultat. Si par exemple, vous formulez votre « offre » de la manière suivante « je veux faire l’amour avec toi et pour t’y inciter je te donne 50 euros » alors vous pourriez obtenir un résultat très différent comparé à la situation dans laquelle vous dites « je veux faire l’amour avec toi – je t’ai acheté un bouquet de roses rouges [qui d’ailleurs coût ent 50 euros]. L’efficacité des incitations doit être aussi évaluée au regard de leur coût . Les autorités sanitaires dépensent des millions d’euros en Europe au titre de médicaments contre l’hypertension et le cholestérol. Faire en sorte que les gens fassent davantage d’exercice pourrait conduire au même résultat. Qu’est-ce qui pourrait être moins coût eux et plus efficace en termes d’allocation 22 introduction à l’économie PouR VoTRE infoRmaTion Comment lire ce livre L’étude de l’économie est plaisante, mais elle peut aussi être difficile. Notre objectif en écrivant ce manuel a été de le rendre aussi abordable et plaisant que possible. Mais vous, en tant qu’étudiant, vous avez aussi votre rôle à jouer. L’expérience montre que si vous vous engagez activement lorsque vous étudiez ce livre, vous bénéficierez d’un bon retour, tant du point de vue de vos examens que des années à venir. Voici quelques petits conseils pour lire au mieux ce livre. 1. Résum ez, ne sur ligne z pas . Passer un surligneur jaune sur ce livre est une activité trop passive pour maintenir votre esprit mobilisé. Plutôt, lorsque vous arrivez à la fin d’une section, prenez une minute et résumez ce que vous venez d’apprendre avec vos mots, en écrivant votre résumé sur un cahier ou dans votre. Lorsque vous avez terminé le chapitre, comparez votre résumé avec celui qui se trouve à la fin du chapitre. Avez-vous relevé les points essentiels ? 2. Aut otestez-vous . Au fil du texte, la rubrique « Testez-vous » vous permet de découvrir instantanément si vous avez appris ce que vous étiez supposé apprendre. Saisissez l’opportunité. Écrivez votre réponse dans la marge du livre. Les questions rapides visent à tester votre compréhension de base. Si vous n’êtes pas sûr (e) que votre réponse soit juste, vous avez probablement besoin de réviser la section. 3. Entraî nez-vous , entraî nez-vous , entraî nez-vous . À la fin de chaque chapitre, la rubrique « Questions pour réviser » teste votre compréhension, puis « Problèmes et applications » vous demande d’appliquer et d’aller plus loin. Il est possible que votre professeur vous demande de faire certains exercices dans le cadre de devoirs. Si c’est le cas, faites-les. Si ce n’est pas le cas, faites-les quand même. Plus vous utilisez votre nouveau savoir, plus il devient solide. 4. Trav ai llez en gr oupe . Après avoir lu le livre et travaillé les problèmes de votre côté, réunissezvous avec d’autres étudiants pour en discuter le contenu. Vous apprendrez les uns des autres – c eci est une illustration des gains à l’échange. QuEsTions 1. Pourquoi les gens ont-ils besoin d’incitations pour faire des « bonnes » choses, comme donner leur sang ou recycler les déchets ? 2. Qu’est-ce qu’un problème « principal-agent » ? 3. Quels seraient l’effet-prix et l’effet psychologique d’une incitation monétaire destinée à des étudiants afin qu’ils obtiennent de très bonnes notes à l’université ? 4. En quoi est-ce que la mesure de l’incitation est un facteur déterminant dans l’atteinte du comportement désiré ? Quels pourraient être les effets collatéraux dans le cas où cette incitation est renforcée ? 5. En quoi la formulation d’une incitation contribue à l’atteinte du résultat escompté ? Prenez le cas du don d’organes pour répondre à la question. des ressources ? Inciter les gens à faire plus de sport en subventionnant une partie de l’abonnement à la salle de gym ou bien dépenser des fortunes en médicaments sans se préoccuper de la cause de ces problèmes de santé ? Dix principes de l’économie 23 RÉsumÉ 1. Les leçons fondamentales relatives à la formation des décisions individuelles sont que les individus font face à des arbitrages entre des objectifs alternatifs, que le coût de n’importe quelle action est mesuré en termes d’opportunités sacrifiées, que les individus rationnels prennent leurs décisions en comparant les coûts marginaux et les avantages marginaux et qu’ils changent de comportement en réaction aux incitations auxquels ils sont confrontés. 2. Les leçons fondamentales relatives aux interactions entre individus sont que les échanges peuvent être mutuellement bénéfiques, que les marchés sont habituellement un bon moyen de coordonner les échanges entre les individus et que l’État peut potentiellement améliorer les situations de marché s’il y a des échecs de marché ou si la situation est inéquitable. 3. L’analyse économique comporte deux branches : la microéconomie et la macroéconomie. Les microéconomistes étudient la manière dont les ménages et les firmes prennent leurs décisions et comment ils interagissent sur les différents marchés. Les macroéconomistes étudient les forces et les tendances au niveau de l’économie dans son ensemble. 4. Les leçons fondamentales relatives à l’économie dans son ensemble sont que la productivité est la source fondamentale des niveaux de vie, que la croissance de la monnaie est la source fondamentale de l’inflation et que la société est confrontée à un arbitrage de court terme entre l’inflation et le chômage. QuEsTions PouR RÉVisER 1. Donnez trois exemples d’arbitrage que vous rencontrez dans votre vie. 2. Quel est le coût d’opportunité lié au fait d’aller manger au restaurant ? 3. L’eau est nécessaire à la vie. L’avantage marginal d’un verre d’eau est-il grand ou petit ? 4. Pourquoi les décideurs politiques doivent-ils penser aux incitations ? 5. Pourquoi l’échange n’est-il pas comme un jeu, avec des gagnants et des perdants ? 5. N’oubl iez pas le monde réel. Au milieu de tous les nombres, graphiques et nouveaux mots étranges, il est facile de perdre de vue ce qu’est vraiment l’économie. Les encarts « Études de cas » et « Dans l’actualité », disséminés un peu partout dans le livre, devraient vous aider à vous en souvenir. Ne les ignorez pas. Ils montrent comment la théorie est liée aux événements qui arrivent dans nos vies. La rubrique « Dans l’actualité » vous permettra de revenir sur les questions traitées dans le chapitre et de les mettre en application dans des situations particulières. Tenter de répondre à toutes ces questions vous permettra de renforcer votre compréhension. TAbLE DES MATIÈRES SOMMAIRE ........................................................................................................ V À PROPOS DES AUTEURS ..............................................................................IX AVANT-PROPOS ..............................................................................................XI REMERCIEMENTS ............................................................................................ XIII LES COMPLÉMENTS NUMÉRIQUES .............................................................XV Partie 1 Introduction à l’économie .............................................................. 1 Chapitre 1 Dix principes de l’économie ................................................................. 3 1.1 QU’EST-CE QUE L’ÉCONOMIE ? .......................................................... 4 1.1.1 Le problème économique ............................................................................. 4 1.1.2 Rareté et choix ...................................................................................... 5 1.2 COMMENT LES INDIVIDUS PRENNENT LEURS DÉCISIONS ................ 6 1.2.1 Principe 1 : Les individus font face à des arbitrages ..................................................... 6 1.2.2 Principe 2 : Le coût d’une chose mesure ce à quoi on renonce pour l’obtenir .............................. 8 1.2.3 Principe 3 : Les individus rationnels raisonnent à la marge ............................................... 9 1.2.4 Principe 4 : Les individus réagissent aux incitations ..................................................... 9 1.3 COMMENT LES INDIVIDUS INTERAGISSENT ..................................... 10 1.3.1 Principe 5 : L’échange est profitable pour tous ....................................................... 11 1.3.2 Principe 6 : Les économies de marché sont habituellement un bon mode d’organisation de l’activité économique ........................................................................... 11 1.3.3 Principe 7 : L’État peut parfois améliorer les situations de marché ...................................... 13 1.4 COMMENT FONCTIONNE L’ÉCONOMIE DANS SON ENSEMBLE ...................................................................... 14 1.4.1 Microéconomie et macroéconomie .................................................................. 15 1.4.2 Principe 8 : Le niveau de vie d’une économie dépend de sa capacité à produire des biens et services ..... 16 1.4.3 Principe 9 : Les prix augmentent lorsque la Banque centrale imprime trop de monnaie ................... 18 1.4.4 Principe 10 : À court terme, la société est confrontée à un arbitrage entre inflation et chômage .......... 18 1190 PrinciPes de l’économie Chapitre 2 Penser comme un économiste ........................................................... 27 2.1 INTRODUCTION ................................................................................. 28 2.2 L’ÉCONOMISTE EST UN SCIENTIFIQUE ............................................. 28 2.2.1 Empirisme ........................................................................................ 29 2.2.2 Raisonnement inductif, raisonnement déductif ........................................................ 29 2.2.3 Théories .......................................................................................... 29 2.2.4 La méthode scientifique : observation, théorie et encore de l’observation ............................... 30 2.2.5 Empirisme ou rationalisme ? ....................................................................... 31 2.2.6 Le rôle des hypothèses ............................................................................. 32 2.2.7 Les expériences en économie ....................................................................... 33 2.2.8 Les modèles économiques .......................................................................... 34 2.2.9 Notre premier modèle : le modèle de flux circulaire ................................................... 35 2.3 L’ÉCONOMISTE COMME CONSEILLER POLITIQUE ............................ 37 2.3.1 Analyse positive et analyse normative ............................................................... 37 2.4 POURQUOI LES ÉCONOMISTES NE SONT PAS D’ACCORD ENTRE EUX ............................................... 39 2.4.1 Les différences dans les jugements scientifiques ...................................................... 39 2.4.2 Les différences dans les valeurs ..................................................................... 40 2.4.3 La perception et la réalité .......................................................................... 40 2.4.4 Les économistes en tant que décideurs .............................................................. 43 2.5 ALLONS-Y ! .......................................................................................... 44 ANNEXE GRAPHES ET OUTILS DE L’ÉCONOMIE : UNE RÉVISION RAPIDE .........................................................47 Partie 2 L’offre et la demande : comment fonctionnent les marchés ........................................... 61 Chapitre 3 Les forces du marché : l’offre et la demande .............................. 63 3.1 MARCHÉS ET CONCURRENCE .......................................................... 64 3.1.1 Les marchés concurrentiels ......................................................................... 64 3.1.2 La concurrence : parfaite, ou pas .................................................................... 65 3.2 LA DEMANDE ...................................................................................... 66 3.2.1 La courbe de demande : la relation entre le prix et la quantité demandée............................... 66 3.2.2 Demande individuelle vs. demande de marché ....................................................... 68 3.2.3 Déplacements de la courbe de demande vs. Déplacements le long de la courbe ......................... 69 3.2.4 Déterminer le prix et les quantités en utilisant l’algèbre ............................................... 73 3.3 L’OFFRE ............................................................................................... 75 3.3.1 La courbe d’offre : la relation entre le prix et la quantité offerte ........................................ 75 3.3.2 De l’offre individuelle à l’offre de marché ............................................................ 76 3.3.3 Les déplacements de la courbe d’offre ............................................................... 77 3.3.4 L’algèbre de l’offre ................................................................................ 80 Table des matières 1191 3.4 L’OFFRE ET LA DEMANDE, ENSEMBLE ............................................... 82 3.4.1 L’équilibre ........................................................................................ 82 3.4.2 L’algèbre de l’équilibre de marché .................................................................. 85 3.4.3 Trois étapes pour analyser les changements dans l’équilibre ........................................... 86 Chapitre 4 L’élasticité et ses applications ............................................................ 99 4.1 L’ÉLASTICITÉ-PRIX DE LA DEMANDE .................................................. 100 4.1.1 L’élasticité-prix de la demande et ses déterminants ................................................. 100 4.1.2 Comment calculer l’élasticité-prix de la demande ................................................... 102 4.1.3 La méthode du point- milieu : le calcul de l’élasticité- arc de la demande ............................... 103 4.1.4 L’élasticité- point de la demande ................................................................... 104 4.1.5 La diversité des courbes de demande .............................................................. 105 4.1.6 Recette totale et élasticité-prix de la demande ...................................................... 107 4.1.7 Élasticité et recette totale le long d’une courbe de demande linéaire ................................. 109 4.1.8 D’autres types d’élasticité de la demande .......................................................... 111 4.2 L’ÉLASTICITÉ DE L’OFFRE ................................................................... 113 4.2.1 L’élasticité-prix de l’offre et ses déterminants ...................................................... 113 4.2.2 Les déterminants de l’élasticité- prix de l’offre ...................................................... 113 4.2.3 Comment calculer l’élasticité-prix de l’offre ......................................................... 116 4.2.4 La méthode du point- milieu : le calcul de l’élasticité- arc de l’offre .................................... 116 4.2.5 L’élasticité- point de l’offre ........................................................................ 117 4.2.6 La diversité des courbes d’offre ................................................................... 118 4.3 APPLICATIONS DE L’ÉLASTICITÉ DE L’OFFRE ET DE LA DEMANDE .. 120 4.3.1 Pourquoi le prix des billets de train varie tout au long de la journée ? ................................ 120 4.3.2 Pourquoi le revenu des agriculteurs a- t-il diminué, alors que la productivité a augmenté ? .............. 122 Chapitre 5 La formation de la demande : la théorie du choix du consommateur ......................................... 129 5.1 LE MODÈLE ÉCONOMIQUE STANDARD ......................................... 130 5.2 LA VALEUR ......................................................................................... 131 5.3 LA CONTRAINTE BUDGÉTAIRE : CE QUE LE CONSOMMATEUR PEUT SE PERMETTRE ....................... 132 5.4 VARIATION DU REVENU ET CONTRAINTE BUDGÉTAIRE ................. 134 5.5 EFFET D’UNE VARIATION DES PRIX .................................................. 135 5.5.1 Une variation du prix du cola ..................................................................... 135 5.5.2 Une variation du prix de la pizza .................................................................. 136 5.5.3 Une variation du prix des deux biens .............................................................. 136 5.6 LES PRÉFÉRENCES : CE QUE LE CONSOMMATEUR VEUT ............... 137 5.6.1 La représentation des préférences au moyen des courbes d’indifférence .............................. 138 5.6.2 La représentation graphique des courbes d’indifférence.............................................. 139 5.6.3 Quatre propriétés des courbes d’indifférence ....................................................... 140 5.6.4 Utilité totale et utilité marginale................................................................... 142 1192 PrinciPes de l’économie 5.6.5 Le taux marginal de substitution .................................................................. 143 5.6.6 Deux cas extrêmes de courbes d’indifférence ....................................................... 144 5.7 L’OPTIMISATION : CE QUE LE CONSOMMATEUR CHOISIT ..............146 5.7.1 Les choix optimaux du consommateur ............................................................. 146 5.7.2 Comment une variation du revenu modifie les choix du consommateur ............................... 149 5.7.3 Comment une variation des prix modifie les choix du consommateur ................................. 151 5.7.4 L’effet de substitution et l’effet de revenu ......................................................... 153 5.7.5 De l’optimum du consommateur à la courbe de demande ........................................... 155 5.7.6 Le sentier d’expansion des prix ................................................................... 155 5.7.7 Les courbes de demande sont-elles toutes décroissantes ? ........................................... 157 5.7.8 Le sentier d’expansion du revenu ................................................................. 158 5.7.9 La courbe d’Engel ................................................................................ 160 5.8 LES APPROCHES COMPORTEMENTALES DU CONSOMMATEUR ..................................................................... 164 5.8.1 Les individus sont sur- confiants .................................................................... 164 5.8.2 Les individus accordent trop de poids à un petit nombre d’observations « saisissantes » ............... 164 5.8.3 Les individus n’aiment pas changer d’avis ......................................................... 165 5.8.4 Les individus ont une tendance naturelle à chercher des exemples qui confirment leur vision ou hypothèse ............................................................ 165 5.8.5 Les individus utilisent des règles approximatives – des heuristiques .................................. 165 5.8.6 La théorie de l’utilité espérée et les effets de présentation des choix (framing) ........................ 167 Chapitre 6 La formation de l’offre : les firmes sur des marchés concurrentiels .................................. 175 6.1 LES COÛTS DE PRODUCTION .......................................................... 176 6.1.1 Que sont les coûts ? ............................................................................. 176 6.1.2 Les coûts en tant que coûts d’opportunité .......................................................... 176 6.1.3 Le coût du capital en tant que coût d’opportunité ................................................... 177 6.2 PRODUCTION ET COÛTS ................................................................. 178 6.2.1 La fonction de production ......................................................................... 179 6.2.2 De la fonction de production à la courbe de coût total ......................................................................... 182 6.3 LES DIFFÉRENTES MESURES DE COÛT ............................................. 183 6.3.1 Les coûts fixes et les coûts variables ............................................................... 183 6.3.2 Le coût moyen et le coût marginal ................................................................ 185 6.3.3 Les courbes de coût et leur forme ................................................................. 186 6.3.4 Les courbes de coût habituelles ................................................................... 189 6.4 LES COÛTS À COURT TERME ET À LONG TERME ............................ 191 6.4.1 La relation entre le coût moyen total de court terme et de long terme ................................ 191 6.4.2 Économies et déséconomies d’échelles ............................................................ 193 6.5 QU’EST- CE QU’UN MARCHÉ CONCURRENTIEL ? ........................... 197 6.5.1 Ce que signifie la concurrence ..................................................................... 197 6.5.2 La recette d’une firme concurrentielle .............................................................. 198 6.5.3 Recette totale, coût total et profit ................................................................. 200 6.5.4 Le profit économique et le profit comptable ........................................................ 201 Table des matières 1193 6.6 LA MAXIMISATION DU PROFIT ET LA COURBE D’OFFRE D’UNE ENTREPRISE CONCURRENTIELLE .......................................... 202 6.6.1 Un exemple simple de maximisation du profit ...................................................... 202 6.6.2 Profit normal et profit anormal (ou surprofit) ....................................................... 203 6.6.3 La courbe de coût marginal et la décision d’offre des firmes ......................................... 204 6.6.4 La décision de fermeture de la firme à court terme ................................................. 206 6.6.5 Le lait renversé et les autres coûts irrécouvrables ................................................... 208 6.6.6 La décision de long terme de la firme de sortir ou de rentrer sur un marché ........................... 209 6.6.7 La représentation graphique de la mesure du profit d’une firme concurrentielle ........................ 210 6.7 LA COURBE D’OFFRE SUR UN MARCHÉ CONCURRENTIEL ............ 212 6.7.1 Le court terme : l’offre de marché avec un nombre de firmes fixe .................................... 212 6.7.2 Le long terme : l’offre de marché avec une entrée et sortie .......................................... 212 6.7.3 Un déplacement de la demande à court terme et à long terme ...................................... 214 6.7.4 Pourquoi la courbe d’offre de long terme pourrait- elle avoir une pente positive ? ...................... 216 Partie 3 Marchés, efficacité et bien-être ................................................ 225 Chapitre 7 Les consommateurs, les producteurs et l’efficacité des marchés ................................................................. 227 7.1 LE SURPLUS DU CONSOMMATEUR .................................................. 229 7.1.1 La volonté de payer (ou le consentement à payer) ................................................. 229 7.1.2 L’utilisation de la courbe de demande dans la mesure du surplus du consommateur ................... 230 7.1.3 Comment un prix en baisse fait augmenter le surplus du consommateur ............................... 232 7.1.4 Que mesure le surplus du consommateur ? ........................................................ 233 7.1.5 Le surplus du consommateur est- il toujours une bonne mesure du bien- être économique ? ............. 234 7.2 LE SURPLUS DU PRODUCTEUR .......................................................... 236 7.2.1 Le coût et la volonté de vendre (ou le consentement à vendre) ...................................... 236 7.2.2 L’utilisation de la courbe d’offre dans la mesure du surplus du producteur............................. 237 7.2.3 Comment un prix en hausse augmente le surplus du producteur ..................................... 239 7.3 L’EFFICACITÉ DES MARCHÉS ............................................................ 240 7.3.1 L’efficacité économique et le gaspillage ............................................................ 241 7.3.2 Évaluer l’équilibre de marché ..................................................................... 242 7.3.3 Efficacité et équité ............................................................................... 245 Chapitre 8 L’offre, la demande et les politiques publiques ....................... 253 8.1 LES CONTRÔLES DE PRIX .................................................................. 254 8.1.1 Comment les prix plafonds affectent les marchés ................................................... 255 8.1.2 Comment les prix planchers affectent le marché .................................................... 258 8.1.3 Résumé ......................................................................................... 260 8.2 LES TAXES .......................................................................................... 260 8.2.1 Comment les taxes sur les vendeurs affectent les marchés .......................................... 261 8.2.2 L’algèbre de la taxe spécifique (à l’unité).......................................................... 265 8.2.3 Élasticité et incidence de la taxe .................................................................. 266 1194 PrinciPes de l’économie 8.3 LES SUBVENTIONS ........................................................................... 268 8.3.1 Comment les subventions affectent les marchés .................................................... 268 Partie 4 L’économie du secteur public ................................................... 275 Chapitre 9 Le système fiscal et les coûts de la fiscalité ................................ 277 9.1 TAXES ET EFFICACITÉ ........................................................................ 278 9.2 LA PERTE SÈCHE LIÉE À LA TAXE ....................................................... 279 9.2.1 Comment une taxe affecte les participants au marché............................................... 280 9.2.2 Pertes sèches et gains à l’échange ................................................................ 283 9.3 LES DÉTERMINANTS DE LA PERTE SÈCHE ........................................ 285 9.4 LA PERTE SÈCHE ET LES RECETTES FISCALES DANS LE CAS D’UNE VARIATION DE LA TAXE ................................ 286 9.5 LA CHARGE ADMINISTRATIVE DE L’IMPÔT ...................................... 288 9.6 L’ÉLABORATION DU SYSTÈME FISCAL ............................................. 289 9.6.1 Les quatre canons de la fiscalité selon Adam Smith ................................................. 289 9.6.2 Le taux d’imposition marginal et le taux d’imposition moyen ........................................ 290 9.6.3 Les impôts forfaitaires ............................................................................ 291 9.7 LES IMPÔTS ET L’ÉQUITÉ ................................................................... 293 9.7.1 Le principe des avantages retirés .................................................................. 293 9.7.2 Le principe de la capacité de payer ................................................................ 294 9.7.3 L’incidence fiscale et l’équité de l’impôt ........................................................... 296 Partie 5 Les inefficacités marchandes .................................................... 305 Chapitre 10 biens publics, ressources communes et biens tutélaires ................................................................................. 307 10.1 LES DIFFÉRENTS TYPES DE BIENS ..................................................... 308 10.2 LES BIENS PUBLICS ............................................................................ 311 10.2.1 Le problème du passager clandestin (ou du profiteur) ............................................... 311 10.2.2 Des biens publics importants ...................................................................... 312 10.2.3 L’analyse coût-avantage, une tâche difficile ........................................................ 314 10.3 L’OFFRE OPTIMALE DE BIENS PUBLICS ............................................. 318 10.4 LES RESSOURCES COMMUNES ....................................................... 320 10.4.1 La Tragédie des Communs ........................................................................ 320 10.4.2 Des ressources communes importantes ............................................................ 321 10.5 LES BIENS TUTÉLAIRES ...................................................................... 323 10.5.1 L’éducation en tant que bien tutélaire ............................................................. 323 10.5.2 Les soins médicaux, les assurances et les retraites en tant que biens tutélaires (à effets positifs) ................................................................................ 324 10.5.3 L’alcool, le tabac et la drogue en tant que biens tutélaires (à effets négatifs) ......................... 325 Table des matières 1195 Chapitre 11 Externalités et échec de marché ..................................................... 333 11.1 LES EXTERNALITÉS ............................................................................. 334 11.1.1 Les coûts et les avantages sociaux liés à une décision ............................................... 335 11.2 LES EXTERNALITÉS ET L’INEFFICACITÉ DES MARCHÉS ..................... 336 11.2.1 L’économie du bien- être : récapitulons. ............................................................ 336 11.2.2 Les externalités négatives ........................................................................ 337 11.2.3 Les externalités positives ......................................................................... 339 11.3 LES SOLUTIONS PRIVÉES AUX EXTERNALITÉS .................................. 341 11.3.1 Les différents types de solutions privées ........................................................... 341 11.3.2 Le théorème de Coase ........................................................................... 342 11.3.3 Pourquoi les solutions privées ne marchent pas toujours ............................................. 343 11.3.4 Les biens positionnels et les externalités ........................................................... 345 11.4 LES POLITIQUES PUBLIQUES ET LES EXTERNALITÉS .......................... 346 11.4.1 La réglementation ............................................................................... 346 11.4.2 Les taxes pigoviennes et les subventions ........................................................... 347 11.4.3 Les droits à polluer ............................................................................... 348 11.5 LES POLITIQUES PUBLIQUES/PRIVÉES ET LES EXTERNALITÉS ........... 350 11.5.1 Les droits de propriété............................................................................ 350 11.5.2 Le contrôle des situations de « course à l’armement » .............................................. 352 11.5.3 Les objections à l’analyse économique de la pollution ............................................... 354 11.6 LES DÉFAILLANCES DE L’ÉTAT ........................................................... 355 11.6.1 La théorie du choix public ........................................................................ 355 11.6.2 La main invisible contre l’intérêt général ........................................................... 356 11.6.3 L’incitation des électeurs ......................................................................... 357 11.6.4 Les incitations des politiciens...................................................................... 357 11.6.5 Les incitations bureaucratiques .................................................................... 357 11.6.6 L’effet d’intérêt spécial ........................................................................... 358 11.6.7 La recherche d’acquisition de rente ................................................................ 359 11.6.8 Recherche d’acquisition de rente .................................................................. 360 11.6.9 Le court- termisme ................................................................................ 360 11.6.10 L’inefficacité du secteur public .................................................................... 361 11.6.11 Favoritisme ou copinage politique ................................................................. 361 11.6.12 L’inefficacité du système fiscal .................................................................... 361 Chapitre 12 Information et économie comportementale ............................... 369 12.1 PRINCIPAL ET AGENT ....................................................................... 370 12.2 INFORMATION ASYMÉTRIQUE ........................................................ 371 12.2.1 Actions cachées et hasard moral (ou aléa de moralité) .............................................. 371 12.2.2 Sélection adverse (ou anti- sélection) .............................................................. 373 12.2.3 Caractéristiques cachées : sélection adverse et « vieux clous » ....................................... 373 12.2.4 Le signalement comme moyen de transmettre de l’information privée ................................ 375 12.2.5 Le contrôle comme moyen de révéler l’information ................................................. 377 12.2.6 Les asymétries d’information et la politique publique................................................ 378 1196 PrinciPes de l’économie 12.3 LES ÉCARTS AU MODÈLE ÉCONOMIQUE STANDARD .................... 379 12.3.1 Les individus ne sont pas toujours rationnels ....................................................... 379 12.3.2 Les individus sont attentifs à l’équité .............................................................. 382 12.3.3 Les individus sont incohérents dans le temps ....................................................... 383 Partie 6 Comportement des firmes et structures de marché ........... 389 Chapitre 13 Les décisions de production des firmes ....................................... 391 13.1 ISOQUANTES ET ISOCOÛTS ............................................................ 392 13.2 LES ISOQUANTES DE PRODUCTION ............................................... 392 13.3 LES DROITES D’ISOCOÛT ................................................................. 395 13.4 LA COMBINAISON OPTIMALE DE FACTEURS .................................. 398 13.5 RÉSUMÉ ............................................................................................. 400 Chapitre 14 Structures de marché I : le monopole ......................................... 407 14.1 LA CONCURRENCE IMPARFAITE ...................................................... 408 14.2 POURQUOI LES MONOPOLES SE CONSTITUENT ........................... 410 14.2.1 Les ressources d’un monopole .................................................................... 410 14.2.2 Les monopoles créés par l’État .................................................................... 411 14.2.3 Les monopoles naturels .......................................................................... 412 14.2.4 Croissance externe ............................................................................... 413 14.3 COMMENT LES MONOPOLES PRENNENT LEURS DÉCISIONS DE PRIX ET DE PRODUCTION ............................. 414 14.3.1 Monopole et concurrence ......................................................................... 414 14.3.2 La recette d’un monopole ........................................................................ 415 14.3.3 La maximisation du profit ........................................................................ 418 14.3.4 Le profit d’un monopole .......................................................................... 419 14.4 LE COÛT EN BIEN- ÊTRE DU MONOPOLE ......................................... 422 14.4.1 La perte sèche du monopole ...................................................................... 423 14.4.2 Les profits du monopole : un coût social ? ......................................................... 425 14.5 LA DISCRIMINATION PAR LES PRIX ................................................... 426 14.5.1 La fixation des prix illustrée ....................................................................... 427 14.5.2 La morale de l’histoire ........................................................................... 428 14.5.3 Une analyse de la discrimination par les prix ....................................................... 429 14.5.4 Des exemples de discrimination par les prix ........................................................ 431 14.6 LES POLITIQUES PUBLIQUES ET LE MONOPOLE .............................. 432 14.6.1 Réglementer les monopoles ...................................................................... 434 14.6.2 La propriété publique ............................................................................. 435 14.6.3 Ne rien faire ..................................................................................... 436 Table des matières 1197 Chapitre 15 Structures de marché II : la concurrence monopolistique ..... 445 15.1 LA CONCURRENCE AVEC DES PRODUITS DIFFÉRENCIÉS ............... 446 15.1.1 La firme en concurrence monopolistique dans le court terme ......................................... 447 15.1.2 L’équilibre de long terme ......................................................................... 448 15.1.3 La concurrence monopolistique et la concurrence parfaite ............................................ 450 15.1.4 La concurrence monopolistique et le bien-être de la société .......................................... 451 15.2 LA PUBLICITÉ ET LA MARQUE ............................................................ 453 15.2.1 Le débat relatif à la publicité ...................................................................... 453 15.2.2 La publicité en tant que signal de qualité .......................................................... 455 15.2.3 Les marques .................................................................................... 457 15.3 LES MARCHÉS CONTESTABLES ........................................................ 458 Chapitre 16 Structures de marché III : l’oligopole ............................................ 467 16.1 LES CARACTÉRISTIQUES DE L’OLIGOPOLE ...................................... 468 16.1.1 La différenciation ................................................................................ 469 16.1.2 L’interdépendance ............................................................................... 469 16.1.3 Un exemple de duopole .......................................................................... 470 16.1.4 La concurrence, les monopoles et les cartels ....................................................... 471 16.1.5 L’équilibre de l’oligopole ......................................................................... 472 16.1.6 Comment la taille d’un oligopole affecte le marché ................................................. 473 16.1.7 Les oligopoles et la courbe de demande coudée .................................................... 476 16.2 LA THÉORIE DES JEUX ET L’ÉCONOMIE DE LA COOPÉRATION ...... 477 16.2.1 Le dilemme du prisonnier ......................................................................... 479 16.2.2 Les oligopoles sont des dilemmes du prisonnier..................................................... 481 16.2.3 D’autres exemples du dilemme du prisonnier ....................................................... 482 16.2.4 L’équilibre de Nash .............................................................................. 484 16.2.5 Le dilemme du prisonnier et le bien-être de la société ............................................... 488 16.2.6 Pourquoi les individus coopèrent parfois ........................................................... 488 16.3 MODÈLES D’OLIGOPOLES ................................................................ 490 16.3.1 Le modèle de Cournot ............................................................................ 490 16.3.2 Le modèle de Bertrand ........................................................................... 493 16.3.3 Le modèle de Stackelberg ........................................................................ 494 16.4 LA POLITIQUE PUBLIQUE ET LES OLIGOPOLES ................................. 494 16.4.1 Entrave au commerce et loi de la concurrence ...................................................... 495 16.4.2 Les controverses autour de la politique de concurrence .............................................. 496 Partie 7 Les marchés des facteurs de production ................................ 507 Chapitre 17 L’économie des marchés du travail ............................................... 509 17.1 LA DEMANDE DE TRAVAIL ................................................................ 510 17.1.1 La firme concurrentielle qui cherche à maximiser son profit .......................................... 511 17.1.2 La fonction de production et la productivité marginale du travail ..................................... 511 1198 PrinciPes de l’économie 17.1.3 La valeur de la productivité marginale et la demande de travail ...................................... 513 17.1.4 La demande de facteurs et l’offre de bien produit : les deux faces d’une même pièce .................. 515 17.1.5 Les éléments qui conduisent à un déplacement de la courbe de demande de travail ................... 516 17.2 L’OFFRE DE TRAVAIL .......................................................................... 517 17.2.1 L’arbitrage entre travail et loisir ................................................................... 517 17.2.2 Comment les salaires affectent- ils l’offre detravail ? ................................................ 518 17.2.3 Les éléments qui déterminent les mouvements de la courbe d’offre de travail ......................... 522 17.3 L’ÉQUILIBRE SUR LE MARCHÉ DU TRAVAIL ....................................... 522 17.3.1 Le déplacement de l’offre de travail ............................................................... 523 17.3.2 Les déplacements de la demande de travail ........................................................ 524 17.3.3 Le monopsone................................................................................... 525 17.4 LES DIFFÉRENTIELS DE SALAIRES ....................................................... 527 17.4.1 Les différences compensatrices .................................................................... 528 17.4.2 Le capital humain ................................................................................ 529 17.4.3 Aptitude, effort et hasard ......................................................................... 529 17.4.4 Une autre interprétation de l’éducation : le signalement ............................................. 530 17.4.5 Le phénomène des vedettes ...................................................................... 531 17.4.6 Salaires au- dessus de l’équilibre : lois sur les salaires minimum, syndicats et salaires d’efficience .................................................................. 532 17.5 L’ÉCONOMIE DE LA DISCRIMINATION ........................................... 535 17.5.1 Mesurer la discrimination sur le marché du travail .................................................. 536 17.5.2 La discrimination pratiquée par les employeurs ..................................................... 538 17.5.3 La discrimination par les clients et les gouvernements ............................................... 539 17.5.4 Le modèle des « préférences pour la discrimination » de Becker ..................................... 540 17.6 LES AUTRES FACTEURS DE PRODUCTION : LA TERRE ET LE CAPITAL .................................................................... 541 17.6.1 L’équilibre sur le marché de la terre et du capital ................................................... 542 17.6.2 Les liens entre les facteurs de production .......................................................... 543 17.7 LA RENTE ÉCONOMIQUE ................................................................ 544 Partie 8 Les inégalités ................................................................................ 553 Chapitre 18 Les inégalités de revenu et pauvreté ............................................ 555 18.1 LA MESURE DES INÉGALITÉS ............................................................ 556 18.1.1 Les inégalités de revenus ......................................................................... 557 18.1.2 La courbe de Lorenz ............................................................................. 557 18.1.3 Le coefficient de Gini ............................................................................. 560 18.1.4 Les problèmes liés à la mesure des inégalités ...................................................... 563 18.1.5 La mobilité économique .......................................................................... 565 18.1.6 Le taux de pauvreté .............................................................................. 565 18.2 LA PHILOSOPHIE POLITIQUE DE LA REDISTRIBUTION DES REVENUS ................................................................................... 567 18.2.1 L’utilitarisme .................................................................................... 568 18.2.2 Le libéralisme ................................................................................... 569 Table des matières 1199 18.2.3 Le libertarisme .................................................................................. 571 18.2.4 Le paternalisme libertarien........................................................................ 572 18.3 LES POLITIQUES VISANT À RÉDUIRE LA PAUVRETÉ .......................... 573 18.3.1 Les lois concernant le salaire minimum ............................................................ 573 18.3.2 Les prestations sociales........................................................................... 574 18.3.3 L’imposition négative du revenu .................................................................. 575 18.3.4 Les prestations en nature ......................................................................... 576 18.3.5 Les politiques anti- pauvreté et les incitations au travail .............................................. 576 Partie 9 L’échange ...................................................................................... 583 Chapitre 19 Interdépendances et gains à l’échange ....................................... 585 19.1 LA FRONTIÈRE DES POSSIBILITÉS DE PRODUCTION ........................ 586 19.1.1 Calculer les coûts d’opportunité ................................................................... 588 19.1.2 La forme de la frontière des possibilités de production............................................... 588 19.1.3 Un déplacement de la frontière des possibilités de production ........................................ 590 19.2 LE COMMERCE INTERNATIONAL ..................................................... 591 19.2.1 Une parabole pour l’économie moderne ........................................................... 592 19.2.2 Les possibilités de production ..................................................................... 593 19.2.3 Spécialisation et échange......................................................................... 596 19.3 LE PRINCIPE DE L’AVANTAGE COMPARATIF ................................... 598 19.3.1 L’avantage absolu ............................................................................... 598 19.3.2 Coût d’opportunité et avantage comparatif ......................................................... 599 19.3.3 Avantage comparatif et échange .................................................................. 602 19.3.4 L’Europe doit-elle faire du commerce avec d’autres pays ? .......................................... 603 19.4 LES DÉTERMINANTS DE L’ÉCHANGE ............................................... 604 19.4.1 L’équilibre sans l’échange ........................................................................ 604 19.4.2 Le prix mondial et l’avantage comparatif .......................................................... 606 19.5 LES GAGNANTS ET LES PERDANTS À L’ÉCHANGE ......................... 607 19.5.1 Les gains et les pertes d’un pays exportateur ....................................................... 607 19.5.2 Les gains et les pertes d’un pays importateur ...................................................... 609 19.6 LES RESTRICTIONS À L’ÉCHANGE ................................................... 612 19.6.1 Les effets d’un droit de douane ................................................................... 612 19.6.2 Les effets d’un quota à l’importation .............................................................. 614 19.6.3 Les barrières non tarifaires ........................................................................ 617 19.6.4 Les leçons à tirer pour la politique commerciale ..................................................... 618 19.6.5 Les arguments en faveur de la limitation des échanges .............................................. 620 Partie 10 Les données de la macroéconomie ...................................... 633 Chapitre 20 La mesure du revenu d’une nation ............................................... 635 20.1 LE REVENU ET LA DÉPENSE DE L’ÉCONOMIE .................................. 637 20.2 LA MESURE DU PIB ............................................................................ 639 1200 PrinciPes de l’économie 20.2.1 « Le PIB est la valeur de marché… » ............................................................. 639 20.2.2 « … De tous… » .............................................................................. 639 20.2.3 « … Les biens et services… » .................................................................. 640 20.2.4 « … Finaux… » ............................................................................... 640 20.2.5 « … Produits… » .............................................................................. 641 20.2.6 « … Dans un pays… » ......................................................................... 641 20.2.7 « … Au cours d’une période… » ................................................................ 641 20.3 LES COMPOSANTES DU PIB ............................................................. 643 20.3.1 La consommation ................................................................................ 643 20.3.2 L’investissement ................................................................................. 643 20.3.3 Les dépenses publiques .......................................................................... 644 20.3.4 Les exportations nettes ........................................................................... 644 20.4 LE PIB RÉEL ET LE PIB NOMINAL ........................................................ 646 20.4.1 Un exemple numérique .......................................................................... 647 20.4.2 Le déflateur du PIB .............................................................................. 649 20.5 LE PIB ET LE BIEN-ÊTRE ÉCONOMIQUE ............................................ 650 20.5.1 L’économie du bonheur .......................................................................... 652 20.5.2 Différences internationales de PIB et qualité de la vie ............................................... 654 Chapitre 21 Mesurer le coût de la vie ................................................................... 661 21.1 L’INDICE DES PRIX À LA CONSOMMATION .................................... 663 21.1.1 Comment se calcule l’indice des prix à la consommation ............................................ 663 21.1.2 Les problèmes liés à la mesure du coût de la vie.................................................... 666 21.1.3 L’IPC et l’indice des prix à la consommation harmonisé ............................................. 671 21.1.4 Le déflateur du PIB versus l’indice des prix à la consommation ....................................... 671 21.2 CORRIGER LES VARIABLES ÉCONOMIQUES DES EFFETS DE L’INFLATION ............................................................. 674 21.2.1 Les valeurs monétaires en différents points du temps ............................................... 674 21.2.2 L’indexation ..................................................................................... 676 21.2.3 Taux d’intérêt réels et nominaux .................................................................. 676 Partie 11 L’économie réelle dans le long terme .................................. 685 Chapitre 22 Production et croissance .................................................................... 687 22.1 LA CROISSANCE ÉCONOMIQUE DANS LE MONDE ...................... 689 22.2 LA THÉORIE DE LA CROISSANCE ..................................................... 692 22.3 LA PRODUCTIVITÉ : SON RÔLE ET SES DÉTERMINANTS ................. 693 22.3.1 Pourquoi la productivité est- elle si importante ? .................................................... 694 22.3.2 Les déterminants de la croissance économique ..................................................... 695 22.3.3 Comment la productivité est- elle déterminée ? ..................................................... 696 22.4 LA CROISSANCE ÉCONOMIQUE ET LA POLITIQUE PUBLIQUE ....... 701 22.4.1 L’importance de l’épargne et de l’investissement ................................................... 701 22.4.2 Les rendements décroissants et l’effet de rattrapage économique .................................... 704 Table des matières 1201 22.4.3 L’investissement provenant de l’étranger .......................................................... 706 22.4.4 L’éducation ..................................................................................... 707 22.4.5 La santé et l’alimentation ........................................................................ 708 22.4.6 Les droits de propriété, la stabilité politique et la bonne gouvernance ................................. 709 22.4.7 Le libre- échange ................................................................................. 711 22.4.8 La Recherche- Développement ..................................................................... 712 22.4.9 La croissance démographique ..................................................................... 713 Chapitre 23 Le chômage ............................................................................................ 723 23.1 IDENTIFIER LE CHÔMAGE................................................................. 725 23.1.1 Qu’est-ce que le chômage ? ...................................................................... 725 23.1.2 Comment mesure-t-on le chômage ? .............................................................. 726 23.1.3 Le taux naturel de chômage ...................................................................... 729 23.1.4 Quelle est la durée du chômage ?................................................................. 730 23.1.5 Pourquoi y a- t-il toujours des chômeurs ? .......................................................... 731 23.2 LA RECHERCHE D’EMPLOI ................................................................ 733 23.2.1 Pourquoi le chômage frictionnel est-il inévitable ? .................................................. 734 23.2.2 Les politiques publiques et la recherche d’emploi ................................................... 735 23.2.3 L’assurance-chômage ............................................................................ 735 23.3 LES LOIS SUR LE SALAIRE MINIMUM ................................................ 737 23.4 SYNDICATS ET NÉGOCIATIONS COLLECTIVES ............................... 739 23.4.1 L’analyse économique des syndicats............................................................... 740 23.4.2 Les syndicats sont-ils bons ou mauvais pour l’économie ? ........................................... 741 23.5 LA THÉORIE DES SALAIRES D’EFFICIENCE ........................................ 742 23.5.1 La santé des travailleurs .......................................................................... 743 23.5.2 Le renouvellement des travailleurs (turnover) ...................................................... 743 23.5.3 L’effort des travailleurs ........................................................................... 744 23.5.4 La qualité des travailleurs ......................................................................... 744 23.6 LE COÛT DU CHÔMAGE .................................................................. 745 23.6.1 Le coût du chômage supporté par les individus ..................................................... 745 23.6.2 Le coût du chômage supporté par la société et l’économie .......................................... 747 Partie 12 Les taux d’interêt, la monnaie et les prix à long terme.........755 Chapitre 24 L’épargne, l’investissement et le système financier ................ 757 24.1 LES INSTITUTIONS FINANCIÈRES DANS L’ÉCONOMIE ................... 759 24.1.1 Les marchés financiers ........................................................................... 759 24.1.2 Les intermédiaires financiers ...................................................................... 762 24.1.3 Les CDS (Credit Default Swaps) ................................................................... 764 24.1.4 Les Collateralized Debt Obligations (CDOs) ......................................................... 767 24.1.5 En résumé ...................................................................................... 768 24.2 ÉPARGNE ET INVESTISSEMENT DANS LE SYSTÈME DE COMPTABILITÉ NATIONALE ........................................................ 769 1202 PrinciPes de l’économie 24.2.1 Des identités comptables importantes ............................................................. 770 24.2.2 La signification de l’épargne et de l’investissement ................................................. 772 24.3 LE MARCHÉ DES FONDS PRÊTABLES ................................................ 773 24.3.1 L’offre et la demande de fonds prêtables .......................................................... 774 24.3.2 Politique numéro 1 : les incitations à l’épargne ..................................................... 776 24.3.3 Politique numéro 2 : les incitations à investir ....................................................... 778 24.3.4 Politique numéro 3 : le déficit ou l’excédent budgétaire de l’État .................................... 779 Chapitre 25 Les outils de base de la finance ...................................................... 787 25.1 LA VALEUR PRÉSENTE : LA MESURE DE LA VALEUR DE LA MONNAIE DANS LE TEMPS ................................................... 788 25.1.1 L’application du concept de valeur présente ........................................................ 790 25.2 LA GESTION DU RISQUE .................................................................. 791 25.2.1 L’aversion pour le risque ......................................................................... 791 25.2.2 Les marchés de l’assurance ....................................................................... 792 25.2.3 La diversification du risque idiosyncratique (ou idiosyncrasique) ...................................... 795 25.2.4 L’arbitrage entre le risque et le rendement ......................................................... 799 25.3 L’ÉVALUATION DES ACTIFS .............................................................. 800 25.3.1 L’analyse fondamentale .......................................................................... 800 25.3.2 L’hypothèse des marchés efficients ................................................................ 801 25.3.3 L’irrationalité des marchés ........................................................................ 806 Chapitre 26 Le système monétaire ......................................................................... 815 26.1 LA SIGNIFICATION DE LA MONNAIE .............................................. 817 26.1.1 Les fonctions de la monnaie ...................................................................... 818 26.1.2 La liquidité ...................................................................................... 819 26.1.3 Les formes de la monnaie ........................................................................ 819 26.1.4 La monnaie dans l’économie ..................................................................... 820 26.2 LE RÔLE DES BANQUES CENTRALES ................................................ 824 26.3 LA BANQUE CENTRALE EUROPÉENNE ET L’EUROSYSTÈME ........... 826 26.4 LE SYSTÈME DE RÉSERVE FÉDÉRALE ................................................. 827 26.5 LES BANQUES ET L’OFFRE DE MONNAIE ........................................ 828 26.5.1 Le cas simple d’un taux de réserves de 100 % ..................................................... 828 26.5.2 La création de monnaie avec des réserves bancaires partielles ....................................... 829 26.5.3 Le multiplicateur monétaire ....................................................................... 831 26.5.4 Les outils de contrôle monétaire de la banque centrale .............................................. 833 26.5.5 L’assouplissement quantitatif (quantitative easing) ................................................. 836 26.5.6 Les problèmes liés au contrôle de l’offre de monnaie ............................................... 839 26.5.7 Le changement de nature de l’activité bancaire ..................................................... 839 Table des matières 1203 Chapitre 27 Croissance de la masse monétaire et inflation ......................... 849 27.1 LA THÉORIE CLASSIQUE DE L’INFLATION ........................................ 851 27.1.1 Le niveau des prix et la valeur de la monnaie ...................................................... 852 27.1.2 L’offre de monnaie, la demande de monnaie et l’équilibre monétaire ................................ 852 27.1.3 Les effets d’une émission monétaire .............................................................. 855 27.1.4 Un bref aperçu du processus d’ajustement ......................................................... 855 27.1.5 La dichotomie classique et la neutralité de la monnaie .............................................. 857 27.1.6 La vitesse de circulation de la monnaie et l’équation quantitative .................................... 859 27.1.7 La taxe inflationniste ............................................................................. 863 27.1.8 L’effet Fisher .................................................................................... 864 27.2 LES COÛTS LIÉS À L’INFLATION ....................................................... 866 27.2.1 Une baisse du pouvoir d’achat ? L’illusion inflationniste ............................................. 867 27.2.2 Les coûts d’usure ................................................................................ 867 27.2.3 Les coûts de changement des menus .............................................................. 868 27.2.4 La variabilité des prix relatifs et la mauvaise allocation des ressources ................................ 869 27.2.5 Les distorsions fiscales engendrées par l’inflation ................................................... 869 27.2.6 Les troubles et les confusions engendrés par l’inflation .............................................. 871 27.2.7 Un coût spécifique engendré par l’inflation non anticipée : la redistribution arbitraire des richesses .................................................................................... 872 27.2.8 Le prix du pain .................................................................................. 873 27.2.9 La déflation ..................................................................................... 873 Partie 13 La macroéconomie des économies ouvertes ...................... 881 Chapitre 28 Macroéconomie ouverte : les concepts de base....................... 883 28.1 LES FLUX INTERNATIONAUX DE BIENS ET DE CAPITAUX ................ 884 28.1.1 Les flux de biens et de services : exportations, importations et exportations nettes .................... 885 28.1.2 Le flux de ressources financières : les sorties nettes de capitaux...................................... 886 28.1.3 L’égalité entre les exportations nettes et les sorties nettes de capitaux ............................... 887 28.1.4 L’épargne et l’investissement et leur relation avec les flux internationaux ............................. 888 28.1.5 En résumé ...................................................................................... 889 28.2 LES PRIX DES TRANSACTIONS INTERNATIONALES : LES TAUX DE CHANGE NOMINAUX ET RÉELS................................. 891 28.2.1 Les taux de change nominaux .................................................................... 891 28.2.2 Les taux de change réels ......................................................................... 892 28.3 UNE PREMIÈRE THÉORIE DE LA DÉTERMINATION DU TAUX DE CHANGE : LA PARITÉ DU POUVOIR D’ACHAT ........... 894 28.3.1 La logique de base de la Parité du Pouvoir d’Achat (PPA) ........................................... 895 28.3.2 Les implications de la Parité du Pouvoir d’Achat .................................................... 896 28.3.3 Les limitations de la théorie de la Parité du Pouvoir d’Achat ......................................... 898 1204 PrinciPes de l’économie Chapitre 29 Une théorie macroéconomique de l’économie ouverte ........................................................................ 907 29.1 L’OFFRE ET LA DEMANDE DE FONDS PRÊTABLES ET LE TAUX DE CHANGE .................................................................. 908 29.1.1 Le marché des fonds prêtables .................................................................... 909 29.1.2 Le marché des changes .......................................................................... 911 29.2 L’ÉQUILIBRE DANS UNE ÉCONOMIE OUVERTE .............................. 914 29.2.1 Les sorties nettes de capitaux : le lien entre les deux marchés ....................................... 914 29.2.2 L’équilibre simultané sur les deux marchés ......................................................... 915 29.3 COMMENT DES POLITIQUES PUBLIQUES OU DES ÉVÉNEMENTS ÉCONOMIQUES AFFECTENT UNE ÉCONOMIE OUVERTE ............. 917 29.3.1 Les déficits budgétaires ........................................................................... 917 29.3.2 La politique commerciale ......................................................................... 920 29.3.3 Fuite des capitaux ............................................................................... 923 Partie 14 Les fluctuations économiques de court terme .................... 931 Chapitre 30 Les cycles économiques ..................................................................... 933 30.1 LE TAUX DE CROISSANCE TENDANCIELLE ...................................... 934 30.1.1 Les différents types de données ................................................................... 936 30.1.2 Tendances ...................................................................................... 938 30.1.3 Mouvements procycliques et contracycliques des données macroéconomiques ......................... 940 30.1.4 Les variables en tant qu’indicateurs ............................................................... 941 30.2 LES CAUSES DU CHANGEMENT DANS L’ACTIVITÉ ÉCONOMIQUE ................................................................................. 942 30.2.1 Les décisions de dépense des ménages ............................................................ 943 30.2.2 Les décisions des firmes .......................................................................... 943 30.2.3 Les forces externes .............................................................................. 944 30.2.4 La politique économique ......................................................................... 944 30.2.5 La confiance et les anticipations ................................................................... 944 30.3 LES MODÈLES DE CYCLE ÉCONOMIQUE ........................................ 945 30.3.1 Le côté « offre » : le modèle Nouveau Classique ................................................... 945 30.3.2 Le côté « offre » : le modèle keynésien............................................................ 946 30.3.3 Le côté « demande » : le modèle des Nouveaux Classiques ......................................... 947 30.3.4 Le côté « demande » – Le modèle keynésien ...................................................... 948 30.3.5 Les modèles de cycles réels ....................................................................... 948 Chapitre 31 L’economie keynesienne et l’analyse IS-LM ............................... 957 31.1 LE MODÈLE À 45° (OU KEYNESIAN-CROSS) ................................... 959 31.1.1 Dépense désirée et dépense réalisée .............................................................. 959 31.1.2 L’équilibre de l’économie ......................................................................... 960 31.1.3 La gestion de la demande ........................................................................ 962 Table des matières 1205 31.2 L’EFFET MULTIPLICATEUR ................................................................... 963 31.2.1 Une formulation du multiplicateur de dépenses ..................................................... 964 31.2.2 Les autres usages de l’effet multiplicateur.......................................................... 966 31.2.3 L’équilibre entre le montant des fuites et des injections désirées ..................................... 967 31.3 LA THÉORIE DE LA PRÉFÉRENCE POUR LA LIQUIDITÉ ....................... 971 31.4 LE MODÈLE IS-LM .............................................................................. 975 31.5 L’ÉQUILIBRE GÉNÉRAL DU MODÈLE IS-LM ........................................ 977 31.5.1 La politique budgétaire ........................................................................... 979 31.5.2 La politique monétaire ........................................................................... 981 31.5.3 Les interactions entre politiques budgétaires et monétaire ........................................... 981 31.6 DU MODÈLE IS-LM À LA DEMANDE AGRÉGÉE ................................ 982 31.6.1 Les déplacements de la fonction de demande agrégée .............................................. 984 31.6.2 Les critiques du modèle IS-LM et le modèle de Romer ............................................... 985 31.6.3 Retour vers le keynésianisme ? .................................................................. 988 Chapitre 32 La demande agrégée et l’offre agrégée ..................................... 995 32.1 TROIS FAITS MAJEURS RELATIFS AUX FLUCTUATIONS ÉCONOMIQUES ............................................................................... 996 32.1.1 Fait n° 1 : les fluctuations économiques sont irrégulières et imprévisibles ............................. 996 32.1.2 La plupart des valeurs macroéconomiques réelles fluctuent de manière synchrone ..................... 997 32.1.3 Fait n° 3 : lorsque la production diminue, le chômage augmente .................................... 997 32.2 COMMENT EXPLIQUER LES FLUCTUATIONS ÉCONOMIQUES DE COURT TERME ................................................. 998 32.2.1 En quoi le court terme est différent du long terme .................................................. 998 32.2.2 Le modèle de base des fluctuations économiques ................................................... 999 32.3 LA COURBE DE DEMANDE AGRÉGÉE ............................................ 1001 32.3.1 Pourquoi la courbe de demande agrégée est décroissante ......................................... 1001 32.3.2 Pourquoi la courbe de demande agrégée peut se déplacer ......................................... 1003 32.4 LA COURBE D’OFFRE AGRÉGÉE ..................................................... 1006 32.4.1 Pourquoi la courbe d’offre agrégée est verticale à long terme ...................................... 1006 32.4.2 Pourquoi la courbe d’offre agrégée de long terme peut se déplacer ................................ 1007 32.4.3 Une nouvelle façon de représenter la croissance de long terme et l’inflation ......................... 1009 32.4.4 Pourquoi la courbe d’offre agrégée a une pente positive dans le court terme ........................ 1011 32.4.5 Pourquoi la courbe d’offre agrégée de court terme peut se déplacer ................................ 1014 32.5 DEUX CAUSES DES FLUCTUATIONS ÉCONOMIQUES .................. 1016 32.5.1 Les effets d’un déplacement de la demande agrégée ............................................. 1017 32.5.2 Les effets d’un déplacement de l’offre agrégée ................................................... 1019 32.5.3 Les traits caractéristiques de la Nouvelle Économie Keynésienne ................................... 1023 1206 PrinciPes de l’économie Chapitre 33 L’influence de la politique monétaire et de la politique budgétaire sur la demande agrégée ......................................... 1031 33.1 COMMENT LA POLITIQUE MONÉTAIRE INFLUENCE LA DEMANDE AGRÉGÉE ................................................................ 1033 33.1.1 La décroissance de la courbe de demande agrégée ............................................... 1034 33.1.2 Les changements dans l’offre de monnaie ....................................................... 1035 33.1.3 Le rôle du taux d’intérêt ........................................................................ 1037 33.2 COMMENT LA POLITIQUE BUDGÉTAIRE INFLUENCE LA DEMANDE AGRÉGÉE ................................................................ 1038 33.2.1 Les changements dans les dépenses publiques ................................................... 1038 33.2.2 L’effet d’éviction .............................................................................. 1038 33.2.3 Le changement dans le niveau d’imposition ...................................................... 1040 33.3 L’UTILISATION DES POLITIQUES ÉCONOMIQUES AFIN DE STABILISER L’ÉCONOMIE ................................................. 1043 33.3.1 Les arguments en faveur d’une politique active de stabilisation .................................... 1043 33.3.2 Les arguments à l’encontre d’une politique de stabilisation active .................................. 1045 33.3.3 Les stabilisateurs automatiques ................................................................. 1046 Chapitre 34 L’arbitrage de court terme entre inflation et chômage ........................................................................................... 1055 34.1 LA COURBE DE PHILLIPS .................................................................. 1056 34.2 LES ORIGINES DE LA COURBE DE PHILLIPS .................................... 1056 34.2.1 La courbe de demande agrégée, la courbe d’offre agrégée et la courbe de Phillips ................... 1058 34.3 LES DÉPLACEMENTS DE LA COURBE DE PHILLIPS : LE RÔLE DES ANTICIPATIONS ........................................................ 1060 34.3.1 La courbe de Phillips de long terme.............................................................. 1060 34.3.2 Concilier la théorie et les faits ................................................................... 1063 34.3.3 La courbe de Phillips de court terme ............................................................. 1064 34.3.4 L’arbitrage entre le chômage et l’inflation ....................................................... 1066 34.4 LA COURBE DE PHILLIPS DE LONG TERME VERTICALE, ARGUMENT EN FAVEUR DE L’INDÉPENDANCE DE LA BANQUE CENTRALE ............................................................. 1068 34.5 LES DÉPLACEMENTS DE LA COURBE DE PHILLIPS : LE RÔLE DES CHOCS D’OFFRE ....................................................... 1072 34.6 LE COÛT DE RÉDUCTION DE L’INFLATION .................................... 1074 34.6.1 Le ratio de sacrifice ............................................................................ 1074 34.6.2 Les anticipations rationnelles et la possibilité d’une désinflation sans coût........................... 1075 34.6.3 La désinflation Thatcher ........................................................................ 1077 34.7 CIBLAGE DE L’INFLATION ............................................................... 1080 34.7.1 Le ciblage ..................................................................................... 1080 Table des matières 1207 Chapitre 35 Les politiques de l’offre .................................................................... 1087 35.1 LES DÉPLACEMENTS DE LA COURBE D’OFFRE AGRÉGÉE ............. 1088 35.2 LES POLITIQUES DE L’OFFRE ........................................................... 1092 35.2.1 Les politiques de l’offre orientées vers le marché ................................................. 1093 35.2.2 Les politiques de l’offre interventionnistes ........................................................ 1100 Partie 15 Macroéconomie internationale ............................................ 1107 Chapitre 36 Les zones monétaires et l’Union monétaire européenne ................................................ 1109 36.1 L’EURO ............................................................................................ 1110 36.1.1 Le Marché unique européen et l’euro ............................................................ 1111 36.2 LES AVANTAGES ET LES INCONVÉNIENTS D’UNE MONNAIE UNIQUE ............................................................ 1114 36.2.1 Les avantages liés à l’adoption d’une monnaie unique ............................................ 1114 36.2.2 Les coûts liés à une monnaie unique ............................................................ 1115 36.3 LA THÉORIE DES ZONES MONÉTAIRES OPTIMALES ..................... 1119 36.3.1 Les caractéristiques qui réduisent les coûts liés à une monnaie unique .............................. 1119 36.3.2 Les caractéristiques qui augmentent les avantages liés à une monnaie unique ....................... 1122 36.4 L’EUROPE EST-ELLE UNE ZONE MONÉTAIRE OPTIMALE ? ............. 1123 36.4.1 Intégration commerciale ........................................................................ 1123 36.4.2 La flexibilité des salaires réels ................................................................... 1124 36.4.3 La mobilité du travail ........................................................................... 1124 36.4.4 La mobilité du capital financier .................................................................. 1125 36.4.5 Les chocs de demande symétriques ............................................................. 1125 36.4.6 Résumé : alors, l’Europe est-elle une zone monétaire optimale ? .................................. 1126 36.5 POLITIQUE BUDGÉTAIRE ET UNION MONÉTAIRE ......................... 1128 36.5.1 Le fédéralisme budgétaire ...................................................................... 1128 36.5.2 Politiques budgétaires nationales dans une union monétaire : le problème du passager clandestin ( free rider) .................................................. 1129 36.5.3 Le pacte budgétaire ............................................................................ 1133 Chapitre 37 La crise financière et la dette souveraine ................................. 1143 37.1 BULLES ET SPÉCULATION ................................................................ 1144 37.1.1 La déréglementation ........................................................................... 1145 37.1.2 L’augmentation des prix de l’immobilier ......................................................... 1146 37.1.3 Le marché des « subprimes » ................................................................... 1147 37.1.4 L’explosion de la bulle ......................................................................... 1150 37.1.5 En route vers la récession mondiale ............................................................. 1153 37.1.6 Le rôle des banques centrales ................................................................... 1154 37.1.7 Des leçons ont-elles été apprises ? .............................................................. 1157 1208 PrinciPes de l’économie 37.2 LA CRISE DE LA DETTE SOUVERAINE ............................................. 1159 37.2.1 La crise de la dette grecque ..................................................................... 1159 37.2.2 Le développement de la crise ................................................................... 1160 37.3 LES POLITIQUES D’AUSTÉRITÉ – TROP LOIN, TROP VITE ? ............. 1164 37.3.1 Les déficits structurels et conjoncturels ........................................................... 1164 37.3.2 La consolidation budgétaire ..................................................................... 1165 37.3.3 Austérité ou croissance ? ....................................................................... 1168 37.3.4 Une résolution ? ............................................................................... 1169 glossaire ...................................................................................................... 1175 Index des notions ....................................................................................... 1185 OUVERTURES ÉCONOMIQUES Allegret J.-P., Le Merrer P., Économie de la mondialisation. Vers une rupture durable ? 2e édition Amelon J.-L., Cardebat J.-M., Les nouveaux défis de l’internationalisation. Quel développement international pour les entreprises après la crise ? Anderson R. D., Sweeney J. D., Williams A. Th., Camm J.D., Cochran J.J., Statistiques pour l’économie et la gestion. 5e édition. Traduction de la 7e édition américaine par Cl. Borsenberger Bénassy- Quéré A., Cœuré B., Jacquet P., Pisani- Ferry J., Politique économique. 3e édition Berend Ivan T., Histoire économique de l’Europe du xxe siècle traduction de la 1re édition anglaise par Amandine Nguyen Bergstrom T., Varian H., Exercices de microéconomie - 1. Premier cycle. Notions fondamentales. 3e édition traduction de la 5e édition américaine par A. Marciano Bergstrom T., Varian H., Exercices de microéconomie - 2. Premier cycle et spécialisation. 2e édition française traduction de la 5e édition américaine par J.-M. Baland, S. Labenne et Ph. Van Kerm avec la collaboration scientifique d’A. Marciano. Besanko, Dranove, Shanley, Schaefer, Principes économiques de stratégie Bilek A., Henriot A., Analyse conjoncturelle pour l’entreprise. Observer, comprendre, prévoir Bismans F., Mathématiques pour l’économie – Volume 1. Fonctions d’une variable réelle Bouthevillain C., Dufrénot G., Frouté Ph., Paul L., Les politiques budgétaires dans la crise. Comprendre les enjeux actuels et les défis futurs Boutillier S., Peaucelle I., Uzunidis D., L’économie russe depuis 1990 Burda M., Wyplosz C., Macroéconomie. À l’échelle européenne. 6e édition traduction de la 6e édition anglaise par Stanislas Standaert Briec W., Peypoch N., Microéconomie de la production. La mesure de l’efficacité et de la productivité Cadoret I., Benjamin C., Martin F., Herrard N., Tanguy S., Économétrie appliquée. 2e édition Méthodes, Applications, Corrigés Cahuc P., Zylberberg A., Le marché du travail Cahuc P., Zylberberg A., Économie du travail. La formation des salaires et les déterminants du chômage Carlton D. W., Perloff J. M., Économie industrielle, traduction de la 2e édition américaine par F. Mazerolle. 2e édition Cartelier J., L’économie de Keynes Caves R.E., Frankel J. A., Jones R. W., Commerce international et paiements, traduction de la 9e édition américaine par M. Chiroleu-Assouline Cayatte J.-L., Introduction à l’économie de l’incertitude Collectif, Économie sociale. Enjeux conceptuels, insertion par le travail et services de proximité Commissariat général du Plan, L’intégration régionale. Une nouvelle voie pour l’organisation de l’économie mondiale ? Cornet B. et Tulkens H. (Éds), Modélisation et décisions économiques Cornuel D., Économie immobilière et des politiques du logement Côté D., Les holdings coopératifs. Évolution ou transformation définitive ? Crépon B., Jacquemet N., Économétrie : méthode et applications Cuthbertson K., Économie financière quantitative. Actions, obligations et taux de change, traduction de la 1re édition anglaise par C. Puibasset Darreau Ph., Croissance et politique économique De Crombrugghe A., Choix et décisions économiques. Introduction aux principes de l’économie de Bandt O., Drumetz Fr., Pfister Chr., Stabilité financière Deffains B., Langlais É., Analyse économique du droit. Principes, méthodes, résultats Defourny J., Démocratie coopérative et efficacité économique. La performance comparée des SCOP françaises Defourny J., Develtere P., Fonteneau B. (Éds), L’économie sociale au Nord et au Sud Defourny J., Monzon Campos J.L. (Éds), Économie sociale/The Third Sector. Entre économie capitaliste et économie publique/Cooperative Mutual and Non-profit Organizations Defraigne J.- Chr., Introduction à l’économie européenne De Grauwe P., Économie de l’intégration monétaire, traduction de la 3e édition anglaise par M. Donnay De Grauwe P., La monnaie internationale. Théories et perspectives, traduction de la 2e édition anglaise par M.-A. Sénégas Deiss J., Gugler Ph., Politique économique et sociale Defraigne J. Chr., Introduction à l’économie européenne de Kerchove A.-M., Geels Th., van Steenberghe V., Questions à choix multiple d’économie politique. 3e édition de Melo J., Grether J.-M., Commerce international. Théories et applications Develtere P., Économie sociale et développement. Les coopératives, mutuelles et associations dans les pays en voie de développement DrÈ ze J., Pour l’emploi, la croissance et l’Europe Drumetz F., Pfister C., Sahuc J.-G., Politique monétaire. 2e édition Dupriez P., Ost C., Hamaide C., Van Droogenbroeck N., L’économie en mouvement. Outils d’analyse de la conjoncture. 2e édition Esch L., Mathématique pour économistes et gestionnaires. 4e édition Essama- Nssah B., Inégalité, pauvreté et bien-être social. Fondements analytiques et normatifs Gazon J., Politique industrielle et industrie Volume 1. Controverses théoriques. Aspects légaux et méthodologie Gillis M. et al., Économie du développement, traduction de la 4e édition américaine par B. Baron-Renault Godard O. Environnement et développement durable. Une approche méta-économique Gomez p.-Y., Korine Harry, L’entreprise dans la démocratie, Une théorie politique du gouvernement des entreprises Gujarati D. N., Économétrie, traduction de la 4e édition américaine par B. Bernier Hansen J.-P. – Percebois J., Énergie. Économie et politiques. 2e édition Harrison A., Dalkiran E., Elsey E., Business international et mondialisation. Vers une nouvelle Europe Heertje A., Pieretti P., Barthélemy Ph., Principes Analyse conjoncturelle pour l’entreprise. Observer, comprendre, prévoir d’économie politique. 4e édition Hindriks J., Gestion publique. Théorie et pratique Hirshleifer J., Glazer A., Hirshleifer D., Microéconomie : théories et applications. Décision, marché, formation des prix et répartition des revenus Jacquemin A., Tulkens H., Mercier P., Fondements d’économie politique. 3e édition Jacquemin A., Pench L. R. (Éds), Pour une compétitivité européenne. Rapports du Groupe Consultatif sur la Compétitivité Jalladeau J., Introduction à la macroéconomie. Modélisations de base et redéploiements théoriques contemporains. 2e édition Jalladeau J., Dorbaire P., Initiation pratique à la macroéconomie. Études de cas, exercices et QCM. 2e édition Jaskold Gabszewicz J., Théorie microéconomique. 2e édition Jaumotte Ch., Les mécanismes de l’économie Jones Ch. I., Théorie de la croissance endogène, traduction de la 1re édition américaine par F. Mazerolle Jurion B., Économie politique. 4e édition Jurion B., Leclercq A., Exercices d’économie politique Kohli U., Analyse macroéconomique Krugman P. R. et Obstfeld M., Économie internationale. 4e édition traduction de la 6e édition américaine par A. Hannequart et F. Leloup KRUGMAN P., L’économie auto-organisatrice, traduction de la 1re édition américaine par F. Leloup. 2e édition KRUGMAN P., Wells R. Macroéconomie, traduction de la 4e édition américaine par L. Baechler. 3e édition KRUGMAN P., Wells R., Microéconomie, traduction de la 4e édition américaine par L. Baechler. 3e édition LANDAIS B., Leçons de politique budgétaire LANDAIS B., Leçons de politique monétaire LECAILLON J.- D., Le Page J.- M., Économie contemporaine. Analyses et diagnostics. 4e édition LEHMANN P.- J., Économie des marchés financiers. 2e édition LEMOINE M., MADIÈS P., MADIÈS T., Les grandes questions d’économie et finance internationales. Décoder l’actualité. 3e édition LEROUX A., Marciano A., Traité de philosophie économique LESUEUR J.- Y., Sabatier M., Microéconomie de l’emploi. Théories et applications LÖWENTHAL P., Une économie politique MANKIW G. N., Macroéconomie, traduction de la 9e édition américaine par Jihad C. El Naboulsi. 7e édition MANKIW G N., TAYLOR M. P., Principes de l’économie, traduction d’Élise Tosi. 4e édition MANSFIELD E., Économie managériale. Théorie et applications, traduction et adaptation de la 4e édition américaine par B. Jérôme MASSÉ G., THIBAUT Fr., Intelligence économique. Un guide pour une économie de l’intelligence MARCIANO A., Éthiques de l’économie. Introduction à l’étude des idées économiques MILGROM P., ROBERTS J., Économie, organisation et management MONNIER L., THIRY B. (Éds), Mutations structurelles et intérêt général. Vers quels nouveaux paradigmes pour l’économie publique, sociale et coopérative ? MUELLER C. D., FACCHINI F., FOUCAULT M., FRANÇOIS A., MAGNI- BERTON R., MELKI M., Choix publics. Analyse économique des décisions publiques NORRO M., Économies africaines. Analyse économique de l’Afrique subsaharienne. 2e édition PERKINS D. H., RADELET S., LINDAUER D. L., Économie du développement. 3e édition PROMEURO, L’Euro pour l’Europe. Des monnaies nationales à la monnaie européenne. 2e édition RASMUSEN E., Jeux et information. Introduction à la théorie des jeux, traduction de la 3e édition anglaise par F. Bismans SALVATORE D. C., Économie internationale, traduction de la de la 9e édition américaine par Fabienne Leloup et Achille Hannequart SHAPIRO C., VARIAN H. R., Économie de l’information. Guide stratégique de l’économie des réseaux, traduction de la 1re édition américaine par F. Mazerolle SHILLER J. R., Le nouvel ordre financier. La finance moderne au service des nouveaux risques économiques, traduction de la 1re édition américaine par Paul- Jacques Lehmann SIMON C. P., BLUME L., Mathématiques pour économistes, traduction de la 1re édition américaine par G. Dufrenot, O. Ferrier, M. Paul, A. Pirotte, B. Planes et M. Seris SINN G., SINN H. W., Démarrage à froid. Une analyse des aspects économiques de l’unification allemande, traduction de la 3e édition allemande par C. Laurent STIGLITZ J. E., WALSH C. E., Lafay J.- D., Principes d’économie moderne. 3e édition, traduction de la 3e édition américaine par F. Mayer SZPIRO D., Économie monétaire et financière. VARIAN H., Introduction à la microéconomie. 8e édition, traduction de la 9e édition américaine par B. Thiry VARIAN H., Analyse microéconomique, traduction de la 3e édition américaine par J.- M. Hommet. 2e édition VAN DER LINDEN B. (Éd.), Chômage. Réduire la fracture WICKENS M., Analyse macroéconomique approfondie. Une approche par l’équilibre général dynamique WOOLDRIDGE J., Introduction à l’économétrie. Une approche moderne ZÉVI A., MONZÓN CAMPOS J.- L., Coopératives, marchés, principes coopératifs Les compléments associés aux Principes de l’économie de Mankiw - Taylor ont été conçus pour offrir une expérience d’apprentissage interactive qui conduit les étudiants à être actifs, à interagir avec le contenu du manuel, à approfondir les concepts importants, à compléter des informations, à visualiser les effets concrets de certains événements, et à reconstruire par eux-mêmes des concepts économiques et leur utilisation. Ces compléments multimédias sont intégrés dans la version numérique Noto et sont identiés par des pictogrammes. Ils précisent, détaillent et complètent le contenu et permettent de s’assurer de la maîtrise des notions, dé- nitions et concepts importants présentés dans le manuel. Franck Jovanovic est professeur de finance à l’Université de Leicester. Il a acquis une expertise dans la création de cours en ligne basés sur les nouvelles technologies lorsqu’il était en poste à la TELUQ - l’Université à distance et en ligne du Québec. Il a développé une expertise pédagogique à travers les postes et responsabilités qu’il a occupés dans des universités en France, au Canada, en Côte d’Ivoire et en Grande-Bretagne (incluant HEC Montréal, l’UQAM, l’Université York, l’Université Paris 1 - Panthéon-Sorbonne, l’Université d’Angers, l’Université d’Orléans, l’Institut Universitaire d’Abidjan), et conseille aujourd’hui des universités sur l’intégration de nouvelles technologies et pratiques pédagogiques dans leurs cours. Ses recherches portent sur l’économie financière, ses fondements, son influence sur les marchés financiers, et ses liens avec l’éconophysique. Ses travaux ont été publiés dans de nombreuses revues académiques et ouvrages. Il a également été consultant ou analyste pour l’OCDE, l’Agence Française de Développement et le Ministère français de l’Économie et des Finances, et pour des organisations professionnelles (comme la compagnie nationale des commissaires aux comptes ou la Fédération Française de la Franchise). Ils comportent : • Plus d’une centaine d’animations avec voix off, facilitant l’apprentissage. Ils incluent près de 600 graphiques, figures et tableaux en complément de ceux du manuel. Ils incluent également plus de 400 questions avec leurs réponses détaillées. Ces questions permettent aux étudiants de tester au cours de leur lecture leur compréhension et maîtrise des connaissances étudiées et d’appliquer les concepts à des cas réels. • 7 outils de simulation interactifs permettant d’appliquer les concepts étudiés avec des exemples concrets et de visualiser les effets des politiques publiques et monétaires sur l’activité économique d’un pays. Ces outils offrent une interface conviviale et facile d’utilisation. • 162 exercices et problèmes avec pour chacun un solutionnaire détaillé. En outre, 85 exercices sont corrigés à l’aide de vidéos permettant de visualiser la manière dont un économiste pose et résout ces types d’exercices. • Des rappels mathématiques et méthodologiques pour rappeler les notions de base utilisées dans le manuel. Ils détaillent, en outre, certaines formules et calculs complexes. Clarté, progressivité, grandes qualités pédagogiques : un ouvrage unique ! Descriptif de l’ouvrage en 2e de couverture www.deboecksuperieur.com ISBN 978-2-8041-9306-5 ISSN 2030-501X i An Introduction to Digital Image Processing with Matlab Notes for SCM2511 Image Processing 1 Alasdair McAndrew School of Computer Science and Mathematics Victoria University of Technology ii CONTENTS Contents 1 Introduction 1 1.1 Images and pictures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 What is image processing? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.3 Images and digital images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.4 Some applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.5 Aspects of image processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.6 An image processing task . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.7 Types of digital images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 1.8 Image File Sizes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 1.9 Image Acquisition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 1.10 Image perception . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 2 Basic use of Matlab 15 2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 2.2 Basic use of Matlab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 2.3 Variables and the workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 2.4 Dealing with matrices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 2.5 Plots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 2.6 Help in Matlab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 3 Images and Matlab 33 3.1 Greyscale images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 3.2 RGB Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 3.3 Indexed colour images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 3.4 Data types and conversions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 4 Image Display 41 4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 4.2 The imshow function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 4.3 Bit planes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 4.4 Spatial Resolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 5 Point Processing 51 5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 5.2 Arithmetic operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 CONTENTS iii 5.3 Histograms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 5.4 Thresholding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 5.5 Applications of thresholding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 6 Spatial Filtering 75 6.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 6.2 Notation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 6.3 Filtering in Matlab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 6.4 Frequencies; low and high pass filters . . . . . . . . . . . . . . . . . . . . . . . . . 84 6.5 Gaussian filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 6.6 Non-linear filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 7 Noise 95 7.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 7.2 Types of noise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 7.3 Cleaning salt and pepper noise . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 7.4 Cleaning Gaussian noise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 8 Edges 111 8.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 8.2 Differences and edges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 8.3 Second differences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 8.4 Edge enhancement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 8.5 Final Remarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 9 The Fourier Transform 131 9.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 9.2 The one-dimensional discrete Fourier transform . . . . . . . . . . . . . . . . . . . 131 9.3 Properties of the one-dimensional DFT . . . . . . . . . . . . . . . . . . . . . . . . 135 9.4 The two-dimensional DFT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 9.5 Fourier transforms in Matlab . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 9.6 Fourier transforms of images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 9.7 Filtering in the frequency domain . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 9.8 Removal of periodic noise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 9.9 Inverse filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 10 The Hough and Distance Transforms 169 10.1 The Hough transform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 10.2 Implementing the Hough transform in Matlab . . . . . . . . . . . . . . . . . . . 174 10.3 The distance transform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 11 Morphology 195 iv CONTENTS 11.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 11.2 Basic ideas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 11.3 Dilation and erosion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 11.4 Opening and closing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 11.5 The hit-or-miss transform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 11.6 Some morphological algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 12 Colour processing 223 12.1 What is colour? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 12.2 Colour models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 12.3 Colour images in Matlab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234 12.4 Pseudocolouring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 12.5 Processing of colour images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 13 Image coding and compression 247 13.1 Lossless compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 Bibliography 255 Index 257 Chapter 1 Introduction 1.1 Images and pictures As we mentioned in the preface, human beings are predominantly visual creatures: we rely heavily on our vision to make sense of the world around us. We not only look at things to identify and classify them, but we can scan for differences, and obtain an overall rough “feeling” for a scene with a quick glance. Humans have evolved very precise visual skills: we can identify a face in an instant; we can differentiate colours; we can process a large amount of visual information very quickly. However, the world is in constant motion: stare at something for long enough and it will change in some way. Even a large solid structure, like a building or a mountain, will change its appearance depending on the time of day (day or night); amount of sunlight (clear or cloudy), or various shadows falling upon it. We are concerned with single images: snapshots, if you like, of a visual scene. Although image processing can deal with changing scenes, we shall not discuss it in any detail in this text. For our purposes, an image is a single picture which represents something. It may be a picture of a person, of people or animals, or of an outdoor scene, or a microphotograph of an electronic component, or the result of medical imaging. Even if the picture is not immediately recognizable, it will not be just a random blur. 1.2 What is image processing? Image processing involves changing the nature of an image in order to either 1. improve its pictorial information for human interpretation, 2. render it more suitable for autonomous machine perception. We shall be concerned with digital image processing, which involves using a computer to change the nature of a digital image (see below). It is necessary to realize that these two aspects represent two separate but equally important aspects of image processing. A procedure which satisfies condition (1)—a procedure which makes an image “look better”—may be the very worst procedure for satisfying condition (2). Humans like their images to be sharp, clear and detailed; machines prefer their images to be simple and uncluttered. Examples of (1) may include: 1 2 CHAPTER 1. INTRODUCTION Enhancing the edges of an image to make it appear sharper; an example is shown in figure 1.1. Note how the second image appears “cleaner”; it is a more pleasant image. Sharpening edges is a vital component of printing: in order for an image to appear “at its best” on the printed page; some sharpening is usually performed. (a) The original image (b) Result after “sharperning” Figure 1.1: Image sharperning Removing “noise” from an image; noise being random errors in the image. An example is given in figure 1.2. Noise is a very common problem in data transmission: all sorts of electronic components may affect data passing through them, and the results may be undesirable. As we shall see in chapter 7 noise may take many different forms;each type of noise requiring a different method of removal. Removing motion blur from an image. An example is given in figure 1.3. Note that in the deblurred image (b) it is easy to read the numberplate, and to see the spokes on the wheels of the car, as well as other details not at all clear in the original image (a). Motion blur may occur when the shutter speed of the camera is too long for the speed of the object. In photographs of fast moving objects: athletes, vehicles for example, the problem of blur may be considerable. Examples of (2) may include: Obtaining the edges of an image. This may be necessary for the measurement of objects in an image; an example is shown in figures 1.4. Once we have the edges we can measure their spread, and the area contained within them. We can also use edge detection algorithms as a first step in edge enhancement, as we saw ab 1.2. WHAT IS IMAGE PROCESSING? 3 (a) The original image (b) After removing noise Figure 1.2: Removing noise from an image (a) The original image (b) After removing the blur Figure 1.3: Image deblurring 4 CHAPTER 1. INTRODUCTION From the edge result, we see that it may be necessary to enhance the original image slightly, to make the edges clearer. (a) The original image (b) Its edge image Figure 1.4: Finding edges in an image Removing detail from an image. For measurement or counting purposes, we may not be interested in all the detail in an image. For example, a machine inspected items on an assembly line, the only matters of interest may be shape, size or colour. For such cases, we might want to simplify the image. Figure 1.5 shows an example: in image (a) is a picture of an African buffalo, and image (b) shows a blurred version in which extraneous detail (like the logs of wood in the background) have been removed. Notice that in image (b) all the fine detail is gone; what remains is the coarse structure of the image. We could for example, measure ther size and shape of the animal without being “distracted” by unnecessary detail. 1.3 Images and digital images Suppose we take an image, a photo, say. For the moment, lets make things easy and suppose the photo is black and white (that is, lots of shades of grey), so no colour. We may consider this image as being a two dimensional function, where the function values give the brightness of the image at any given point, as shown in figure 1.6. We may assume that in such an image brightness values can be any real numbers in the range  (black) to   (white). The ranges of  and  will clearly depend on the image, but they can take all real values between their minima and maxima. A digital image differs from a photo in that the , , and     values are all discrete. Usually they take on only integer values, so the image shown in figure 1.6 will have  and  ranging from 1 to 256 each, and the brightness values also ranging from 0 (black) to 255 (white). A digital image can be considered as a large array of discrete dots, each of which has a brightness associated with it. These dots are called picture elements, or more simply pixels. The pixels surrounding a given pixel constitute its neighbourhood. A neighbourhood can be characterized by its shape in the same way as a matrix: we can speak of a  neighbourhood, or of a  neighbourhood. Except in very special circumstances, neighbourhoods have odd numbers of rows and columns; this ensures that the current pixel is in the centre of the neighbourhood. An example of a neighbourhoo 1.3. IMAGES AND DIGITAL IMAGES 5 (a) The original image (b) Blurring to remove detail Figure 1.5: Blurring an image        Figure 1.6: An image as a functi 6 CHAPTER 1. INTRODUCTION given in figure 1.7. If a neighbourhood has an even number of rows or columns (or both), it may be necessary to specify which pixel in the neighbourhood is the “current pixel”. 48 219 168 145 244 188 120 58 49 218 87 94 133 35 17 148 174 151 74 179 224 3 252 194 77 127 87 139 44 228 149 135 138 229 136 113 250 51 108 163 38 210 185 177 69 76 131 53 178 164 79 158 64 169 85 97 96 209 214 203 223 73 110 200 Current pixel   neighbourhood Figure 1.7: Pixels, with a neighbourhood 1.4 Some applications Image processing has an enormous range of applications; almost every area of science and technology can make use of image processing methods. Here is a short list just to give some indication of the range of image processing applications. 1. Medicine Inspection and interpretation of images obtained from X-rays, MRI or CAT scans, analysis of cell images, of chromosome karyotypes. 2. Agriculture Satellite/aerial views of land, for example to determine how much land is being used for different purposes, or to investigate the suitability of different regions for different crops, inspection of fruit and vegetables—distinguishing good and fresh produce from old. 3. Industry Automatic inspection of items on a production line, inspection of paper samples. 4. Law enforcement Fingerprint analysis, sharpening or de-blurring of speed-camera 1.5. ASPECTS OF IMAGE PROCESSING 7 1.5 Aspects of image processing It is convenient to subdivide different image processing algorithms into broad subclasses. There are different algorithms for different tasks and problems, and often we would like to distinguish the nature of the task at hand. Image enhancement. This refers to processing an image so that the result is more suitable for a particular application. Example include: sharpening or de-blurring an out of focus image, highlighting edges, improving image contrast, or brightening an image, removing noise. Image restoration. This may be considered as reversing the damage done to an image by a known cause, for example: removing of blur caused by linear motion, removal of optical distortions, removing periodic interference. Image segmentation. This involves subdividing an image into constituent parts, or isolating certain aspects of an image: finding lines, circles, or particular shapes in an image, in an aerial photograph, identifying cars, trees, buildings, or roads. These classes are not disjoint; a given algorithm may be used for both image enhancement or for image restoration. However, we should be able to decide what it is that we are trying to do with our image: simply make it look better (enhancement), or removing damage (restoration). 1.6 An image processing task We will look in some detail at a particular real-world task, and see how the above classes may be used to describe the various stages in performing this task. The job is to obtain, by an automatic process, the postcodes from envelopes. Here is how this may be accomplished: Acquiring the image. First we need to produce a digital image from a paper envelope. This an be done using either a CCD camera, or a scanner. Preprocessing. This is the step taken before the “major” image processing task. The problem here is to perform some basic tasks in order to render the resulting image more suitable for the job to follow. In this case it may involve enhancing the contrast, removing noise, or identifying regions likely to contain the postcode. Segmentation. Here is where we actually “get” the postcode; in other words we extract from the image that part of it which contains just the 8 CHAPTER 1. INTRODUCTION Representation and description. These terms refer to extracting the particular features which allow us to differentiate between objects. Here we will be looking for curves, holes and corners which allow us to distinguish the different digits which constitute a postcode. Recognition and interpretation. This means assigning labels to objects based on their descriptors (from the previous step), and assigning meanings to those labels. So we identify particular digits, and we interpret a string of four digits at the end of the address as the postcode. 1.7 Types of digital images We shall consider four basic types of images: Binary. Each pixel is just black or white. Since there are only two possible values for each pixel, we only need one bit per pixel. Such images can therefore be very efficient in terms of storage. Images for which a binary representation may be suitable include text (printed or handwriting), fingerprints, or architectural plans. An example was the image shown in figure 1.4(b) above. In this image, we have only the two colours: white for the edges, and black for the background. See figure 1.8 below. 1 1 0 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 1 1 0 0 0 0 0 0 1 Figure 1.8: A binary image Greyscale. Each pixel is a shade of grey, normally from (black) to   (white). This range means that each pixel can be represented by eight bits, or exactly one byte. This is a very natural range for image file handling. Other greyscale ranges are used, but generally they are a power of 2. Such images arise in medicine (X-rays), images of printed works, and indeed  different grey levels is sufficient for the recognition of most natural objects. An example is the street scene shown in figure 1.1 above, and in figure 1.9 bel 1.7. TYPES OF DIGITAL IMAGES 9 230 229 232 234 235 232 148 237 236 236 234 233 234 152 255 255 255 251 230 236 161 99 90 67 37 94 247 130 222 152 255 129 129 246 132 154 199 255 150 189 241 147 216 132 162 163 170 239 122 Figure 1.9: A greyscale image True colour, or RGB. Here each pixel has a particular colour; that colour being described by the amount of red, green and blue in it. If each of these components has a range –  , this gives a total of        different possible colours in the image. This is enough colours for any image. Since the total number of bits required for each pixel is , such images are also called -bit colour images. Such an image may be considered as consisting of a “stack” of three matrices; representing the red, green and blue values for each pixel. This measn that for every pixel there correspond three values. We show an example in figure 1.10. Indexed. Most colour images only have a small subset of the more than sixteen million possible colours. For convenience of storage and file handling, the image has an associated colour map, or colour palette, which is simply a list of all the colours used in that image. Each pixel has a value which does not give its colour (as for an RGB image), but an index to the colour in the map. It is convenient if an image has  colours or less, for then the index values will only require one byte each to store. Some image file formats (for example, Compuserve GIF), allow only  colours or fewer in each image, for precisely this reason. Figure 1.11 shows an example. In this image the indices, rather then being the grey values of the pixels, are simply indices into the colour map. Without the colour map, the image would be very dark and colourless. In the figure, for example, pixels labelled 5 cor 10 CHAPTER 1. INTRODUCTION Red Green Blue 49 55 56 57 52 53 58 60 60 58 55 57 58 58 54 53 55 56 83 78 72 69 68 69 88 91 91 84 83 82 69 76 83 78 76 75 61 69 73 78 76 76 64 76 82 79 78 78 93 93 91 91 86 86 88 82 88 90 88 89 125 119 113 108 111 110 137 136 132 128 126 120 105 108 114 114 118 113 96 103 112 108 111 107 66 80 77 80 87 77 81 93 96 99 86 85 83 83 91 94 92 88 135 128 126 112 107 106 141 129 129 117 115 101 95 99 109 108 112 109 84 93 107 101 105 102 Figure 1.10: A true colour image 1.8. IMAGE FILE SIZES 11 0.2627 0.2588 0.2549, which is a dark greyish colour. 4 5 5 5 5 5 5 4 5 5 5 5 5 5 5 0 5 5 5 5 5 5 11 11 5 5 5 8 16 20 8 11 11 26 33 20 11 20 33 33 58 37 0.1211 0.1211 0.1416 0.1807 0.2549 0.1729 0.2197 0.3447 0.1807 0.1611 0.1768 0.1924 0.2432 0.2471 0.1924 0.2119 0.1963 0.2002 0.2627 0.2588 0.2549 0.2197 0.2432 0.2588 ... ... ... Indices Colour map Figure 1.11: An indexed colour image 1.8 Image File Sizes Image files tend to be large. We shall investigate the amount of information used in different image type of varying sizes. For example, suppose we consider a    binary image. The number of bits used in this image (assuming no compression, and neglecting, for the sake of discussion, any header information) is           bytes    Kb   Mb. (Here we use the convention that a kilobyte is one thousand bytes, and a megabyte is one million bytes.) A greyscale image of the same size requires:         bytes    Kb   Mb. If we now turn our attention to colour images, each pixel is associated with 3 bytes of colour information. A   image thus requires  12 CHAPTER 1. INTRODUCTION     Kb    Mb. Many images are of course such larger than this; satellite images may be of the order of several thousand pixels in each direction. “A picture is worth one thousand words” Assuming a word to contain 10 ASCII characters (on average), and that each character requires 8 bits of storage, then 1000 words contain     bits of information. This is roughly equivalent to the information in a   binary image    greyscale image    RGB colour image. 1.9 Image Acquisition We will briefly discuss means for getting a picture “into” a computer. CCD camera. Such a camera has, in place of the usual film, an array of photosites; these are silicon electronic devices whose voltage output is proportional to the intensity of light falling on them. For a camera attached to a computer, information from the photosites is then output to a suitable storage medium. Generally this is done on hardware, as being much faster and more efficient than software, using a frame-grabbing card. This allows a large number of images to be captured in a very short time—in the order of one ten-thousandth of a second each. The images can then be copied onto a permanent storage device at some later time. Digital still cameras use a range of devices, from floppy discs and CD’s, to various specialized cards and “memory sticks”. The information can then be downloaded from these devices to a computer hard disk. Flat bed scanner. This works on a principle similar to the CCD camera. Instead of the entire image being captured at once on a large array, a single row of photosites is moved across the image, capturing it row-by-row as it moves. Since this is a much slower process than taking a picture with a camera, it is quite reasonable to allow all capture and storage to be processed by suitable software. 1.10 Image perception Much of image processing is concerned with making an image appear “better” to human beings. We should therefore be aware of the limitations of the the human visual system. Image perception consists of two basic steps: 1. capturing the i 1.10. IMAGE PERCEPTION 13 2. recognising and interpreting the image with the visual cortex in the brain. The combination and immense variability of these steps influences the ways in we perceive the world around us. There are a number of things to bear in mind: 1. Observed intensities vary as to the background. A single block of grey will appear darker if placed on a white background than if it were placed on a black background. That is, we don’t perceive grey scales “as they are”, but rather as they differ from their surroundings. In figure 1.12 a grey square is shown on two different backgrounds. Notice how much darker the square appears when it is surrounded by a light grey. However, the two central squares have exactly the same intensity. Figure 1.12: A grey square on different backgrounds 2. We may observe non-existent intensities as bars in continuously varying grey levels. See for example figure 1.13. This image varies continuously from light to dark as we travel from left to right. However, it is impossible for our eyes not to see a few horizontal edges in this image. 3. Our visual system tends to undershoot or overshoot around the boundary of regions of different intensities. For example, suppose we had a light grey blob on a dark grey background. As our eye travels from the dark background to the light region, the boundary of the region appears lighter than the rest of it. Conversely, going in the other direction, the boundary of the background appears darker than the rest of it. 14 CHAPTER 1. INTRODUCTION Figure 1.13: Continuously varying intensities Chapter 2 Basic use of Matlab 2.1 Introduction Matlab is a data analysis and visualization tool which has been designed with powerful support for matrices and matrix operations. As well as this, Matlab has excellent graphics capabilities, and its own powerful programming language. One of the reasons that Matlab has become such an important tool is through the use of sets of Matlab programs designed to support a particular task. These sets of programs are called toolboxes, and the particular toolbox of interest to us is the image processing toolbox. Rather than give a description of all of Matlab’s capabilities, we shall restrict ourselves to just those aspects concerned with handling of images. We shall introduce functions, commands and techniques as required. A Matlab function is a keyword which accepts various parameters, and produces some sort of output: for example a matrix, a string, a graph or figure. Examples of such functions are sin, imread, imclose. There are manyfunctions in Matlab, and as we shall see, it is very easy (and sometimes necessary) to write our own. A command is a particular use of a function. Examples of commands might be >> sin(pi/3) >> c=imread(’cameraman.tif’); >> a=imclose(b); As we shall see, we can combine functions and commands, or put multiple commnds on a single input line. Matlab’s standard data type is the matrix—all data are considered to be matrices of some sort. Images, of course, are matrices whose elements are the grey values (or possibly the RGB values) of its pixels. Single values are considered by Matlab to be    matrices, while a string is merely a   matrix of characters; being the string’s length. In this chapter we will look at the more generic Matlab commands, and discuss images in further chapters. When you start up Matlab, you have a blank window called the “Command Window” in which you enter commands. This is shown in figure 2.1. Given the vast number of Matlab’s functions, and the different parameters they can take, a command line style interface is in fact much more efficient than a complex sequence of pull-down menus. The prompt consists of two right arrows: >> 16 CHAPTER 2. BASIC USE OF MATLAB Figure 2.1: The Matlab command window ready for action 2.2 Basic use of Matlab If you have never used Matlab before, we will experiment with some simple calculations. We first note that Matlab is command line driven; all commands are entered by typing them after the prompt symbol. Let’s start off with a mathematical classic: >> 2+2 What this means is that you type in 2 at the prompt, and then press your Enter key. This sends the command to the Matlab kernel. What you should now see is ans = 4 Good, huh? Matlab of course can be used as a calculator; it understands the standard arithmetic operations of addition (as we have just seen), subtraction, multiplication, division and exponentiation. Try these: >> 3*4 >> 7-3 >> 11/7 2.3. VARIABLES AND THE WORKSPACE 17 >> 2^5 The results should not surprise you. Note that for the output of 11/7 the result was only given to a few decimal places. In fact Matlab does all its calculations internally to double precision. However, the default display format is to use only eight decimal places. We can change this by using the format function. For example: >> format long >> 11/7 ans = 1.57142857142857 Entering the command format by itself returns to the default format. Matlab has all the elementary mathematical functions built in: >> sqrt(2) ans = 1.4142 >> sin(pi/8) ans = 0.3827 >> log(10) ans = 2.3026 >> log10(2) ans = 0.3010 The trigonometric functions all take radian arguments; and pi is a built-in constant. The functions log and log10 are the natural logarithm and logarithms to base 10. 2.3 Variables and the workspace When using any sort of computer system, we need to store things with appropriate names. In the context of Matlab, we use variables to store values. Here are some examples: 18 CHAPTER 2. BASIC USE OF MATLAB >> a=5^(7/2) a = 279.5085 >> b=sin(pi/9)-cos(pi/9) b = -0.5977 Note that although a and b are displayed using the short format, Matlab in fact stores their full values. We can see this with: >> format long;a,format a = 2.795084971874737e+02 We can now use these new variables in further calculations: >> log(a^2)/log(5) ans = 7 >> >> atan(1/b) ans = -1.0321 2.3.1 The workspace If you are using a windowed version of Matlab, you may find a Workspace item in the View menu. This lists all your currently defined variables, their numeric data types, and their sizes in bytes. To open the workspace window, use the View menu, and choose Workspace. The same information can be obtained using the whos function: >> whos Name Size Bytes Class a 1x1 8 double array ans 1x1 8 double array b 1x1 8 double array 2.4. DEALING WITH MATRICES 19 Grand total is 3 elements using 24 bytes Note also that ans is variable: it is automatically created by Matlab to store the result of the last calculation. A listing of the variable names only is obtained using who: >> who Your variables are: a ans b The numeric date type double is Matlab’s standard for numbers; such numbers are stored as doubleprecision 8-byte values. Other data types will be discussed below. 2.4 Dealing with matrices Matlab has an enormous number of commands for generating and manipulating matrices. Since a greyscale image is an matrix, we can use some of these commands to investigate aspects of the image. We can enter a small matrix by listing its elements row by row, using spaces or commas as delimiters for the elements in each row, and using semicolons to separate the rows. Thus the matrix                      can be entered as >> a=[4 -2 -4 7;1 5 -3 2;6 -8 -5 -6;-7 3 0 1] 2.4.1 Matrix elements Matrix elements can be obtained by using the standard row, column indexing scheme. So for our image matrix a above, the command >> a(2,3) ans = -3 returns the element of the matrix in row 2 and column 3. Matlab also allows matrix elements to be obtained using a single number; this number being the position when the matrix is written out as a single column. Thus in a  matrix as a 20 CHAPTER 2. BASIC USE OF MATLAB the order of elements is                       So the element a(2,3) can also be obtained as a(10): >> a(10) ans = -3 In general, for a matrix  with rows and columns, element    corresponds to        . Using the single indexing allows us to extract multiple values from a matrix: >> a([1 6 11 16]) ans = 4 5 -5 1 To obtain a row of values, or a block of values, we use Matlab’s colon operator (:). This generates a vector of values; the command a:b where a and b are integers, lists all integers from a to b. The more general version of this command: i:b lists all values from a by increment i up to b. So for example: >> 2:3:16 generates the list ans = 2 5 8 11 14 Applied to our matrix a, for example: >> a(2,1:3) ans = 6 -8 -5 lists all values in row 2 which are between columns 1 and 3 inclusive. Simil 2.4. DEALING WITH MATRICES 21 >> a(2:4,3) ans = -3 -5 0 lists all the values in column 3 which are between rows 2 to 4 inclusive. And we can choose a block of values such as >> a(2:3,3:4) ans = -3 2 -5 -6 which lists the 2 by 2 block of values which lie between rows 2 to 3 and columns 3 to 4. The colon operator by itself lists all the elements along that particular row or column. So, for example, all of row 3 can be obtained with: >> a(3,:) ans = 6 -8 -5 -6 and all of column 2 with >> a(:,2) ans = -2 5 -8 3 Finally, the colon on its own lists all the matrix elements as a single column: a(:) shows all the 16 elements of a. 2.4.2 Matrix operations All the standard operations are supported. We can add, subtract, multiply and invert matrices, and take matrix powers. For example, with the matrix a from above, and a new matrix b defined by 22 CHAPTER 2. BASIC USE OF MATLAB >> b=[2 4 -7 -4;5 6 3 -2;1 -8 -5 -3;0 -6 7 -1] we can have, for example: >> 2*a-3*b ans = 2 -16 13 26 -13 -8 -15 10 9 8 5 -3 -14 24 -21 1 As an example of matrix powers: >> a^3*b^4 ans = 103788 2039686 1466688 618345 964142 2619886 2780222 345543 -2058056 -2327582 721254 1444095 1561358 3909734 -3643012 -1482253 Inversion is performed using the inv function: >> inv(a) ans = -0.0125 0.0552 -0.0231 -0.1619 -0.0651 0.1456 -0.0352 -0.0466 -0.0406 -0.1060 -0.1039 -0.1274 0.1082 -0.0505 -0.0562 0.0064 A transpose is obtained by using the apostrophe: >> a’ ans = 4 1 6 -7 -2 5 -8 3 -4 -3 -5 0 7 2 -6 1 As well as these standard arithmetic operations, Matlab supports some geometric operations on matrices; flipud and fliplr flip a matrix up/down and left/right respectively, and rot90 rotates a matrix by 90 degrees: 2.4. DEALING WITH MATRICES 23 >> flipud(a) ans = -7 3 0 1 6 -8 -5 -6 1 5 -3 2 4 -2 -4 7 >> fliplr(a) ans = 7 -4 -2 4 2 -3 5 1 -6 -5 -8 6 1 0 3 -7 >> rot90(a) ans = 7 2 -6 1 -4 -3 -5 0 -2 5 -8 3 4 1 6 -7 The reshape function produces a matrix with elements taken column by column from the given matrix. Thus: >> c=[1 2 3 4 5;6 7 8 9 10;11 12 13 14 15;16 17 18 19 20] c = 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >> reshape(c,2,10) ans = 1 11 2 12 3 13 4 14 5 15 6 16 7 17 8 18 9 19 10 20 >> reshape(c,5,4) 24 CHAPTER 2. BASIC USE OF MATLAB ans = 1 7 13 19 6 12 18 5 11 17 4 10 16 3 9 15 2 8 14 20 Reshape produces an error if the product of the two values is not equal to the number of elements of the matrix. Note that we could have produced the original matrix above with >> c=reshape([1:20],5,4])’ All these commands work equally well on vectors. In fact, Matlab makes no distinction between matrices and vectors; a vector merely being a matrix with number of rows or columns equal to 1. The dot operators A very distinctive class of operators in Matlab are those which use dots; these operate in an element-wise fashion. For example, the command b performs the usual matrix multiplication of a and b. But the corresponding dot operator: *b produces the matrix whose elements are the products of the corresponding elements of a and b. That is, if a.*b then           : >> a.*b ans = 8 -8 28 -28 5 30 -9 -4 6 64 25 18 0 -18 0 -1 We have dot division, and dot powers. The command a.^2 produces a matrix each element of which is a square of the corresponding elements of a: >> a.^2 ans = 16 4 16 49 1 25 2.4. DEALING WITH MATRICES 25 36 64 25 36 49 9 0 1 Similarly we can produce a matrix of reciprocals by writing 1./a: >> 1./a ans = 0.2500 -0.5000 -0.2500 0.1429 1.0000 0.2000 -0.3333 0.5000 0.1667 -0.1250 -0.2000 -0.1667 -0.1429 0.3333 Inf 1.0000 The value Inf is Matlab’s version of infinity; it is returned for the operation  . Operators on matrices Many functions in Matlab, when applied to a matrix, work by applying the function to each element in turn. Such functions are the trigonometric and exponential functions, and logarithms. The use of functions in this way means that in Matlab many iterations and repetitions can be done with vectorization rather than by using loops. We will explore this below. 2.4.3 Constructing matrices We have seen that we can construct matrices by listing all their elements. However, this can be tedious if the matrix is large, or if it can be generated by a function of its indices. Two special matrices are the matrix consisting of all zeros, and the matrix consisting of all ones. These are generated by the zero and ones functions respectively. Each function can be used in several different ways: zeros(n) if n is a number, will produce a zeros matrix of size  zeros(m,n) if m and n are numbers, will produce a zeros matrix of size   zeros(m,n,p,...) where m, n, p and so on are numbers, will produce an     multidimensional array of zeros zeros(a) where a is a matrix, will produce a matrix of zeros of the same size as a. Matrices of random numbers can be produced using the rand and randn functions. They differ in that the numbers produced by rand are taken from a uniform distribution on the interval    , and those produced by randn are take from a normal distribution with mean zero and standard deviation one. For creating matrices the syntax of each is the same as the first three options of zeros above. The rand and randn functions on their own produce single numbers taken from the appropriate distribution. We can construct random integer matrices by multiplying the results of rand or randn by an integer and then using the floor function to take the integer part of the result: >> floor(10*rand(3)) 26 CHAPTER 2. BASIC USE OF MATLAB 8 4 6 8 8 8 5 8 6 >> floor(100*randn(3,5)) ans = -134 -70 -160 -40 71 71 85 -145 68 129 162 125 57 81 66 The floor function will be automatically applied to every element in the matrix. Suppose we wish to create a matrix every element of which is a function of one of its indices. For example, the    matrix for which      . In most programming languages, such a task would be performed using nested loops. We can use nested loops in Matlab, but it is easier here to use dot operators. We can first construct two matrices: one containing all the row indices, and one containing all the column indices: >> rows=(1:10)’*ones(1,10) rows = 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3 3 4 4 4 4 4 4 4 4 4 4 5 5 5 5 5 5 5 5 5 5 6 6 6 6 6 6 6 6 6 6 7 7 7 7 7 7 7 7 7 7 8 8 8 8 8 8 8 8 8 8 9 9 9 9 9 9 9 9 9 9 10 10 10 10 10 10 10 10 10 10 >> cols=ones(10,1)*(1:10) cols = 1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6 7 8 2.4. DEALING WITH MATRICES 27 Now we can construct our matrix using rows and cols: >> A=rows+cols-1 A = 1 2 3 4 5 6 7 8 9 10 2 3 4 5 6 7 8 9 10 11 3 4 5 6 7 8 9 10 11 12 4 5 6 7 8 9 10 11 12 13 5 6 7 8 9 10 11 12 13 14 6 7 8 9 10 11 12 13 14 15 7 8 9 10 11 12 13 14 15 16 8 9 10 11 12 13 14 15 16 17 9 10 11 12 13 14 15 16 17 18 10 11 12 13 14 15 16 17 18 19 The construction of rows and cols can be done automatically with the meshgrid function: [cols,rows]=meshgrid(1:10,1:10) will produce the two index matrices above. The size of our matrix a can be obtained by using the size function: >> size(a) ans = 4 4 which returns the number of rows and columns of a. 2.4.4 Vectorization Vectorization, in Matlab, refers to an operation carried out over an entire matrix or vector. We have seen examples of this already, in our construction of the    matrix above, and in our use of the dot operators. In most programming languages, applying an operation to elements of a list or array will require the use of a loop, or a sequence of nested loops. Vectorization in Matlab allows us to dispense with loops in almost all instances, and is a very efficient replacement for them. For example, suppose we wish to calculate the sine values of all the integer radians one to one million. We can do this with a for loop: >> for i=1:10^6,sin(i);end and we can measure the time of the operation with Matlab’s tic, toc timer: tic starts a stop watch timer, and toc stops it and prints out the elapsed time in seconds. Thus, on my computer: >> tic,for i=1:10^6,sin(i);end,toc elapsed_tim 28 CHAPTER 2. BASIC USE OF MATLAB 27.4969 We can perform the same calculation with: >> i=1:10^6;sin(i); and print out the elapsed time with: >> tic,i=1:10^6;sin(i);toc elapsed_time = 1.3522 Note that the second command applies the sine function to all the elements of the vector 1:10^6, whereas with the for loop, sine is only applied to each element of the loop in turn. As another example, we can easily generate the first 10 square nunmbers with: >> [1:10].^2 ans = 1 4 9 16 25 36 49 64 81 100 What happens here is that [1:10] generates a vector consisting of the numbers 1 to 10; and the dot operator .^2 squares each element in turn. Vectorization can also be used with logical operators; we can obtain all positive elements of the matrix a above with: >> a>0 ans = 1 0 0 1 1 1 0 1 1 0 0 0 0 1 0 1 The result consists of 1’s only in the places where the elements are positive. Matlab is designed to perform vectorized commands very quickly, and whenever possible such a command should be used instead of a for loop. 2.5 Plots Matlab has outstanding graphics capabilities. But we shall just look at some simple plots. The idea is straightforward: we create two vectors x and y of the same size, then the command plot(x,y) will plot y against x. If y has been created from x by using a vectorized function     the plot will show the graph of      . Here’s a simple example 2.5. PLOTS 29 >> x=[0:0.1:2*pi]; >> plot(x,sin(x)) and the result is shown in figure 2.2. The plot function can be used to produce many different plots. 0 1 2 3 4 5 6 7 −1 −0.8 −0.6 −0.4 −0.2 0 0.2 0.4 0.6 0.8 1 Figure 2.2: A simple plot in Matlab We can, for example, plot two functions simultaneously with different colours or plot symbols. For example: >> plot(x,sin(x),’.’,x,cos(x),’o’) produces the graph shown in figure 2.3. 0 1 2 3 4 5 6 7 −1 −0.8 −0.6 −0.4 −0.2 0 0.2 0.4 0.6 0.8 1 Figure 2.3: A different plot in Matlab 30 CHAPTER 2. BASIC USE OF MATLAB 2.6 Help in Matlab Matlab comes with a vast amount of online help and information. So much, in fact, that it’s quite easy to use Matlab without a manual. To obtain information on a particular command, you can use help. For example: >> help for FOR Repeat statements a specific number of times. The general form of a FOR statement is: FOR variable = expr, statement, ..., statement END The columns of the expression are stored one at a time in the variable and then the following statements, up to the END, are executed. The expression is often of the form X:Y, in which case its columns are simply scalars. Some examples (assume N has already been assigned a value). FOR I = 1:N, FOR J = 1:N, A(I,J) = 1/(I+J-1); END END FOR S = 1.0: -0.1: 0.0, END steps S with increments of -0.1 FOR E = EYE(N), ... END sets E to the unit N-vectors. Long loops are more memory efficient when the colon expression appears in the FOR statement since the index vector is never created. The BREAK statement can be used to terminate the loop prematurely. See also IF, WHILE, SWITCH, BREAK, END. If there is too much information, it may scroll past you too fast to see. In such case you can turn on the Matlab pager with the command >> more on For more help on help, try: >> help help Better formatted help can be obtained with the doc function, which opens up a help browser which interprets HTML-formatted help files. The result of the command >> doc help is the window shown in figure 2.4. 2.6. HELP IN MATLAB 31 Figure 2.4: The Matlab help browser You can find more about the doc function with any of >> doc doc >> help doc If you want to find help on a particular topic, but don’t know the function to use, the lookfor function is extremely helpful. The command lookfor topic lists all commands for which the first line of the help text contains the string topic. For example, suppose we want to find out if Matlab supports the exponential function   Here’s how: >> lookfor exponential EXP Exponential. EXPINT Exponential integral function. EXPM Matrix exponential. EXPM1 Matrix exponential via Pade approximation. EXPM2 Matrix exponential via Taylor series. EXPM3 Matrix exponential via eigenvalues and eigenvectors. BLKEXP Defines a function that returns the exponential of the input. and we now know that the function is implemented using exp. We could have used >> lookfor exp and this would have returned many more functions. Note that Matlab convention is to use uppercase names for functions in help texts, even though the function itself is called in lowercase 32 CHAPTER 2. BASIC USE OF MATLAB Exercises 1. Perform the following calculations in Matlab:                     2. Now enter format long and repeat the above calculations. 3. Read the help file for format, and experiment with some of the other settings. 4. Enter the following variables:   ,   ,    . Now calculate:                 5. Find the Matlab functions for the inverse trigonometric functions  ,   and   . Then calculate:              Convert your answers from radians to degrees. 6. Using vectorization and the colon operator, use a single command each to generate: (a) the first 15 cubes, (b) the values       for from 1 to 16, (c) the values for from 10 to 20. 7. Enter the following matrices:         !              "             Now calculate:  #! %$ &!  ! !'" &!($ !)$*$  +! 8. Use the det function to determine the determinant of each of the matrices in the previous question. What happens if you try to find the inverse of matrix ? 9. Plot the function ,    with the following commands: >> x=[0:0.1:10]; >> plot(x,tan(x)) >> figure,plot(x,tan(x)),axis([0,10,-10,10]) What does the axis function do? Read the help file for it. Experiment Chapter 3 Images and Matlab We have seen in the previous chapter that matrices can be handled very efficiently in Matlab. Images may be considered as matrices whose elements are the pixel values of the image. In this chapter we shall investigate how the matrix capabilities of Matlab allow us to investigate images and their properties. 3.1 Greyscale images Suppose you are sitting at your computer and have started Matlab. You will have a Matlab command window open, and in it the Matlab prompt >> ready to receive commands. Type in the command >> w=imread(’wombats.tif’); This takes the grey values of all the pixels in the greyscale image wombats.tif and puts them all into a matrix w. This matrix w is now a Matlab variable, and so we can perform various matrix operations on it. In general the imread function reads the pixel values from an image file, and returns a matrix of all the pixel values. Two things to note about this command: 1. It ends in a semicolon; this has the effect of not displaying the results of the command to the screen. As the result of this particular command is a matrix of size  , or with     elements, we don’t really want all its values displayed. 2. The name wombats.tif is given in single quote marks. Without them, Matlab would assume that wombats.tif was the name of a variable, rather than the name of a file. Now we can display this matrix as a greyscale image: >> figure,imshow(w),pixval on This is really three commands on the one line. Matlab allows many commands to be entered on the same line; using commas to separate the different commands. The three commands we are using here are: 34 CHAPTER 3. IMAGES AND MATLAB figure, which creates a figure on the screen. A figure is a window in which a graphics object can be placed. Objects may include images, or various types of graphs. imshow(g), which displays the matrix g as an image. pixval on, which turns on the pixel values in our figure. This is a display of the grey values of the pixels in the image. They appear at the bottom of the figure in the form  where is the column value of the given pixel; its row value, and its grey value. Since wombats.tif is an 8-bit greyscale image, the pixel values appear as integers in the range –  . This is shown in figure 3.1. Figure 3.1: The wombats image with pixval on If there are no figures open, then an imshow command, or any other command which generates a graphics object, will open a new figure for displaying the object. However, it is good practice to use the figure command whenever you wish to create a new figure. We could display this image directly, without saving its grey values to a matrix, with the command imshow(’wombats.tif’) However, it is better to use a matrix, seeing as these are handled very efficiently in Matl 3.2. RGB IMAGES 35 3.2 RGB Images Matlab handles 24-bit RGB images in much the same way as greyscale. We can save the colour values to a matrix and view the result: >> a=imread(’autumn.tif’); >> figure,imshow(a),pixval on Note now that the pixel values now consist of a list of three values, giving the red, green and blue components of the colour of the given pixel. An important difference between this type of image and a greyscale image can be seen by the command >> size(a) which returns three values: the number of rows, columns, and “pages” of a, which is a threedimensional matrix, also called a multidimensional array. Matlab can handle arrays of any dimension, and a is an example. We can think of a as being a stack of three matrices, each of the same size. To obtain any of the RGB values at a given location, we use similar indexing methods to above. For example >> a(100,200,2) returns the second colour value (green) at the pixel in row 100 and column 200. If we want all the colour values at that point, we can use >> a(100,200,1:3) However, Matlab allows a convenient shortcut for listing all values along a particular dimension; just using a colon on its own: >> a(100,200,:) A useful function for obtaining RGB values is impixel; the command >> impixel(a,200,100) returns the red, green, and blue values of the pixel at column 200, row 100. Notice that the order of indexing is the same as that which is provided by the pixval on command. This is opposite to the row, column order for matrix indexing. This command also applies to greyscale images: >> impixel(g,100,200) will return three values, but since g is a single two-dimensional matrix, all three values will be the same. 3.3 Indexed colour images The command >> figure,imshow(’emu.tif’),pixval on 36 CHAPTER 3. IMAGES AND MATLAB produces a nice colour image of an emu. However, the pixel values, rather than being three integers as they were for the RGB image above, are three fractions between 0 and 1. What is going on here? If we try saving to a matrix first and then displaying the result: >> em=imread(’emu.tif’); >> figure,imshow(em),pixval on we obtain a dark, barely distinguishable image, with single integer grey values, indicating that em is being interpreted as a single greyscale image. In fact the image emu.tif is an example of an indexed image, consisting of two matrices: a colour map, and an index to the colour map. Assigning the image to a single matrix picks up only the index; we need to obtain the colour map as well: >> [em,emap]=imread(’emu.tif’); >> figure,imshow(em,emap),pixval on Matlab stores the RGB values of an indexed image as values of type double, with values between 0 and 1. Information about your image A great deal of information can be obtained with the imfinfo function. For example, suppose we take our indexed image emu.tif from above. >> imfinfo(’emu.tif’) ans = Filename: ’emu.tif’ FileModDate: ’26-Nov-2002 14:23:01’ FileSize: 119804 Format: ’tif’ FormatVersion: [] Width: 331 Height: 384 BitDepth: 8 ColorType: ’indexed’ FormatSignature: [73 73 42 0] ByteOrder: ’little-endian’ NewSubfileType: 0 BitsPerSample: 8 Compression: ’PackBits’ PhotometricInterpretation: ’RGB Palette’ StripOffsets: [16x1 double] SamplesPerPixel: 1 RowsPerStrip: 24 StripByteCounts: [16x1 double] XResolution: 72 YResolution: 72 3.3. INDEXED COLOUR IMAGES 37 ResolutionUnit: ’Inch’ Colormap: [256x3 double] PlanarConfiguration: ’Chunky’ TileWidth: [] TileLength: [] TileOffsets: [] TileByteCounts: [] Orientation: 1 FillOrder: 1 GrayResponseUnit: 0.0100 MaxSampleValue: 255 MinSampleValue: 0 Thresholding: 1 Mushc of this information is not useful to us; but we can see the size of the image in pixels, the size of the file (in bytes), the number of bits per pixel (this is given by BitDepth), and the colour type (in this case “indexed”). For comparison, let’s look at the output of a true colour file (showing only the first few lines of the output): >> imfinfo(’flowers.tif’) ans = Filename: [1x57 char] FileModDate: ’26-Oct-1996 02:11:09’ FileSize: 543962 Format: ’tif’ FormatVersion: [] Width: 500 Height: 362 BitDepth: 24 ColorType: ’truecolor’ Now we shall test this function on a binary image: >> imfinfo(’text.tif’) ans = Filename: [1x54 char] FileModDate: ’26-Oct-1996 02:12:23’ FileSize: 3474 Format: ’tif’ FormatVersion: [] Width: 256 Height: 256 BitDepth: 1 ColorType: ’grayscale’ 38 CHAPTER 3. IMAGES AND MATLAB What is going on here? We have a binary image, and yet the colour type is given as “grayscale”. The fact is that Matlab does not distinguish between greyscale and binary images: a binary image is just a special case of a greyscale image which has only two intensities. However, we can see that text.tif is a binary image since the number of bits per pixel is only one. 3.4 Data types and conversions Elements in Matlab matrices may have a number of different numeric data types; the most common are listed in table 3.1. There are others; see the help for datatypes. These data types are also Data type Description Range int8 8-bit integer   — 127 uint8 8-bit unsigned integer 0 — 255 int16 16-bit integer    — 32767 uint16 16-bit unsigned integer 0 — 65535 double Double precision real number Machine specific Table 3.1: Data types in Matlab functions, we can convert from one type to another. For example: >> a=23; >> b=uint8(a); >> b b = 23 >> whos a b Name Size Bytes Class a 1x1 8 double array b 1x1 1 uint8 array Even though the variables a and b have the same numeric value, they are of different data types. An important consideration (of which we shall more) is that arithmetic operations are not permitted with the data types int8, int16, uint8 and uint16. A greyscale image may consist of pixels whose values are of data type uint8. These images are thus reasonably efficient in terms of storage space, since each pixel requires only one byte. However, arithmetic operations are not permitted on this data type; a uint8 image must be converted to double before any arithmetic is attempted. We can convert images from one image type to another. Table 3.2 lists all of Matlab’s functions for converting between different image types. Note that the gray2rgb function, does not create a colour image, but an image all of whose pixel colours were the same as before. This is done 3.4. DATA TYPES AND CONVERSIONS 39 Function Use Format ind2gray Indexed to Greyscale y=ind2gray(x,map); gray2ind Greyscale to indexed [y,map]=gray2ind(x); rgb2gray RGB to greyscale y=rgb2gray(x); gray2rgb Greyscale to RGB y=gray2rgb(x); rgb2ind RGB to indexed [y,map]=rgb2ind; ind2rgb Indexed to RGB y=ind2rgb(x,map); Table 3.2: Converting images in Matlab simply replicating the grey values of each pixel: greys in an RGB image are obtained by equality of the red, green and blue values. Exercises 1. Type in the command >> help imdemos This will give you a list of, amongst other things, all the sample TIFF images which come with the Image Processing Toolbox. Make a list of these sample images, and for each image (a) determine its type (binary, greyscale, true colour or indexed colour), (b) determine its size (in pixels) (c) give a brief description of the picture (what it looks like; what it seems to be a pixture of) 2. Pick a greyscale image, say cameraman.tif or wombats.tif. Using the imwrite function, write it to files of type JPEG, PNG and BMP. What are the sizes of those files? 3. Repeat the above question with (a) a binary image, (b) an indexed colour image, (c) a true colour image. 40 CHAPTER 3. IMAGES AND MATLAB Chapter 4 Image Display 4.1 Introduction We have touched briefly in chapter 2 on image display. In this chapter, we investigate this matter in more detail. We look more deeply at the use of the imshow function, and how spatial resolution and quantization can affect the display and appearance of an image. In particular, we look at image quality, and how that may be affected by various image attributes. Quality is of course a highly subjective matter: no two people will agree precisely as to the quality of different images. However, for human vision in general, images are preferred to be sharp and detailed. This is a consequence of two properties of an image: its spatial resolution, and its quantization. 4.2 The imshow function Greyscale images We have seen that if x is a matrix of type uint8, then the command imshow(x) will display x as an image. This is reasonable, since the data type uint8 restricts values to be integers between 0 and 255. However, not all image matrices come so nicely bundled up into this data type, and lots of Matlab image processing commands produces output matrices which are of type double. We have two choices with a matrix of this type: 1. convert to type uint8 and then display, 2. display the matrix directly. The second option is possible because imshow will display a matrix of type double as a greyscale image as long as the matrix elements are between 0 and 1. Suppose we take an image and convert it to type double: >> c=imread(’caribou.tif’); >> cd=double(c); >> imshow(c),figure,imshow(cd) 41 42 CHAPTER 4. IMAGE DISPLAY (a) The original image (b) After conversion to type double Figure 4.1: An attempt at data type conversion The results are shown in figure 4.1. However, as you can see, figure 4.1(b) doesn’t look much like the original picture at all! This is because for a matrix of type double, the imshow function expects the values to be between 0 and 1, where 0 is displayed as black, and 1 is displayed as white. A value with    is displayed as grey scale   . Conversely, values greater than 1 will be displayed as 1 (white) and values less than 0 will be displayed as zero (black). In the caribou image, every pixel has value greater than or equal to 1 (in fact the minimum value is 21), so that every pixel will be displayed as white. To display the matrix cd, we need to scale it to the range 0—1. This is easily done simply by dividing all values by 255: >> imshow(cd/255) and the result will be the caribou image as shown in figure 4.1(a). We can vary the display by changing the scaling of the matrix. Results of the commands: >> imshow(cd/512) >> imshow(cd/128) are shown in figures 4.2. Dividing by 512 darkens the image, as all matrix values are now between 0 and 0.5, so that the brightest pixel in the image is a mid-grey. Dividing by 128 means that the range is 0—2, and all pixels in the range 1—2 will be displayed as white. Thus the image has an over-exposed, washed-out appearance. The display of the result of a command whose output is a matrix of type double can be greatly affected by a judicious choice of a scaling factor. We can convert the original image to double more properly using the function im2double. This applies correct scaling so that the output values are between 0 and 1. So the commands >> cd=im2double(c); >> imsho 4.2. THE IMSHOW FUNCTION 43 (a) The matrix cd divided by 512 (b) The matrix cd divided by 128 Figure 4.2: Scaling by dividing an image matrix by a scalar will produce a correct image. It is important to make the distinction between the two functions double and im2double: double changes the data type but does not change the numeric values; im2double changes both the numeric data type and the values. The exception of course is if the original image is of type double, in which case im2double does nothing. Although the command double is not of much use for direct image display, it can be very useful for image arithmetic. We have seen examples of this above with scaling. Corresponding to the functions double and im2double are the functions uint8 and im2uint8. If we take our image cd of type double, properly scaled so that all elements are between 0 and 1, we can convert it back to an image of type uint8 in two ways: >> c2=uint8(255*cd); >> c3=im2uint8(cd); Use of im2uint8 is to be preferred; it takes other data types as input, and always returns a correct result. Binary images Recall that a binary image will have only two values: 0 and 1. Matlab does not have a binary data type as such, but it does have a logical flag, where uint8 values as 0 and 1 can be interpreted as logical data. The logical flag will be set by the use of relational operations such as ==, < or > or any other operations which provide a yes/no answer. For example, suppose we take the caribou matrix and create a new matrix with >> cl=c>120; (we will see more of this type of operation in chapter 5.) If we now check all of our variables with whos, the output will include the line: cl 256x256 65536 uint8 array (logical) 44 CHAPTER 4. IMAGE DISPLAY This means that the command >> imshow(cl) will display the matrix as a binary image; the result is shown in figure 4.3. (a) The caribou image turned binary (b) After conversion to type uint8 Figure 4.3: Making the image binary Suppose we remove the logical flag from cl; this can be done by a simple command: >> cl = +cl; Now the output of whos will include the line: cl 256x256 65536 uint8 array If we now try to display this matrix with imshow, we obtain the result shown in figure 4.3(b). A very disappointing image! But this is to be expected; in a matrix of type uint8, white is 255, 0 is black, and 1 is a very dark grey–indistinguishable from black. To get back to a viewable image, we can either turn the logical flag back on, and the view the result: >> imshow(logical(cl)) or simply convert to type double: >> imshow(double(cl)) Both these commands will produce the image seen in figure 4.3. 4.3 Bit planes Greyscale images can be transformed into a sequence of binary images by breaking them up into their bit-planes. If we consider the grey value of each pixel of an 8-bit image as an 8-bit binary word, 4.4. SPATIAL RESOLUTION 45 then the 0th bit plane consists of the last bit of each grey value. Since this bit has the least effect in terms of the magnitude of the value, it is called the least significant bit, and the plane consisting of those bits the least significant bit plane. Similarly the 7th bit plane consists of the first bit in each value. This bit has the greatest effect in terms of the magnitude of the value, so it is called the most significant bit, and the plane consisting of those bits the most significant bit plane. If we take a greyscale image, we start by making it a matrix of type double; this means we can perform arithmetic on the values. >> c=imread(’cameraman.tif’); >> cd=double(c); We now isolate the bit planes by simply dividing the matrix cd by successive powers of 2, throwing away the remainder, and seeing if the final bit is 0 or 1. We can do this with the mod function. >> c0=mod(cd,2); >> c1=mod(floor(cd/2),2); >> c2=mod(floor(cd/4),2); >> c3=mod(floor(cd/8),2); >> c4=mod(floor(cd/16),2); >> c5=mod(floor(cd/32),2); >> c6=mod(floor(cd/64),2); >> c7=mod(floor(cd/128),2); These are all shown in figure 4.4. Note that the least significant bit plane, c0, is to all intents and purposes a random array, and that we see more of the image appearing. The most significant bit plane, c7, is actually a threshold of the image at level 127: >> ct=c>127; >> all(c7(:)==ct(:)) ans = 1 We shall discuss thresholding in chapter 5. We can recover and display the original image with >> cc=2*(2*(2*(2*(2*(2*(2*c7+c6)+c5)+c4)+c3)+c2)+c1)+c0; >> imshow(uint8(cc)) 4.4 Spatial Resolution Spatial resolution is the density of pixels over the image: the greater the spatial resolution, the more pixels are used to display the image. We can experiment with spatial resolution with Matlab’s imresize function. Suppose we have an    8-bit greyscale image saved to the matrix x. Then the command imresize(x,1/2 46 CHAPTER 4. IMAGE DISPLAY c0 c1 c2 c3 c4 c5 c6 c7 Figure 4.4: The bit planes of an 8-bit greyscale image 4.4. SPATIAL RESOLUTION 47 will halve the size of the image. It does this by taking out every other row and every other column, thus leaving only those matrix elements whose row and column indices are even:                                                                             . . . . . . . . . . . . . . . . . . . . .  imresize(x,1/2)                             . . . . . . . . . . . . If we apply imresize to the result with the parameter 2 rather than 1/2, all the pixels are repeated to produce an image with the same size as the original, but with half the resolution in each direction:                                                                                  . . . . . . . . . . . . The effective resolution of this new image is only    . We can do all this in one line: x2=imresize(imresize(x,1/2),2); By changing the parameters of imresize, we can change the effective resolution of the image to smaller amounts: Command Effective resolution imresize(imresize(x,1/4),4);    imresize(imresize(x,1/8),8);    imresize(imresize(x,1/16),16);     imresize(imresize(x,1/32),32);  To see the effects of these commands, suppose we apply them to the image newborn.tif: x=imread(’newborn.tif’); The effects of increasing blockiness or pixelization become quite pronounced as the resolution decreases; even at    resolution fine detail, such as the edges of the baby’s fingers, are less clear, and at    all edges are now quite blocky. At  the image is barely recognizable, and at     and  the image becomes unrecognizable. Exercises 1. Open the greyscale image cameraman.tif and vi 48 CHAPTER 4. IMAGE DISPLAY (a) The original image (b) at    resolution Figure 4.5: Reducing resolution of an image (a) At    resolution (b) At   resolution Figure 4.6: Further reducing the resolution of an i 4.4. SPATIAL RESOLUTION 49 (a) At     resolution (b) at  resolution Figure 4.7: Even more reducing the resolution of an image >> em,map]=imread(’emu.tif’); >> e=ind2gray(em,map); These will produce a greyscale image of type double. View this image. 3. Enter the command >> e2=im2uint8(e); and view the output. What does the function im2uint8 do? What affect does it have on (a) the appearance of the image? (b) the elements of the image matrix? 4. What happens if you apply im2uint8 to the cameraman image? 5. Experiment with reducing spatial resolution of the following images: (a) cameraman.tif (b) The greyscale emu image (c) blocks.tif (d) buffalo.tif In each case note the point at which the image becomes unrecognizable. 50 CHAPTER 4. IMAGE DISPLAY Chapter 5 Point Processing 5.1 Introduction Any image processing operation transforms the grey values of the pixels. However, image processing operations may be divided into into three classes based on the information required to perform the transformation. From the most complex to the simplest, they are: 1. Transforms. We require a knowledge of all the grey levels in the entire image to transform the image. In other words, the entire image is processed as a single large block. This may be illustrated by the diagram shown in figure 5.1.  Image Transformed image Processed transformed image Processed original image Transform Inverse transform Image processing operation Figure 5.1: Schema for transform processing 2. Spatial filters. To change the grey level of a given pixel we need only know the value of the grey levels in a small neighbourhood of pixels around the given pixel. 3. Point operations. A pixel’s grey value is changed without any knowledge of its surrounds. Although point operations are the simplest, they contain some of the most powerful and widely used of all image processing operations. They are especially useful in image pre-processing, where an image is required to be modified before the main job is attempted. 5 52 CHAPTER 5. POINT PROCESSING 5.2 Arithmetic operations These operations act by applying a simple function      to each grey value in the image. Thus     is a function which maps the range      onto itself. Simple functions include adding or subtract a constant value to each pixel:   " or multiplying each pixel by a constant:  "  In each case we may have to fiddle the output slightly in order to ensure that the results are integers in the      range. We can do this by first rounding the result (if necessary) to obtain an integer, and then “clipping” the values by setting:    if   , if   . We can obtain an understanding of how these operations affect an image by looking at the graph of old grey values against new values. Figure 5.2 shows the result of adding or subtracting 128 from each pixel in the image. Notice that when we add 128, all grey values of 127 or greater will     Old values New values Adding 128 to each pixel     Old values New values Subtracting 128 from each pixel Figure 5.2: Adding and subtracting a constant be mapped to 255. And when we subtract 128, all grey values of 128 or less will be mapped to 0. By looking at these graphs, we see that in general adding a constant will lighten an image, and subtracting a constant will darken it. We can test this on the “blocks” image blocks.tif, which we have seen in figure 1.4. We start by reading the image in: >> b=imread(’blocks.tif’); >> whos b Name Size Bytes Class b 256x2 5.2. ARITHMETIC OPERATIONS 53 The point of the second command was to find the numeric data type of b; it is uint8. The unit8 data type is used for data storage only; we can’t perform arithmetic operations. If we try, we just get an error message: >> b1=b+128 ??? Error using ==> + Function ’+’ not defined for variables of class ’uint8’. We can get round this in two ways. We can first turn b into a matrix of type double, add the 128, and then turn back to uint8 for display: >> b1=uint8(double(b)+128); A second, and more elegant way, is to use the Matlab function imadd which is designed precisely to do this: >> b1=imadd(b,128); Subtraction is similar; we can transform out matrix in and out of double, or use the imsubtract function: >> b2=imsubtract(b,128); And now we can view them: >> imshow(b1),figure,imshow(b2) and the results are seen in figure 5.3. b1: Adding 128 b2: Subtracting 128 Figure 5.3: Arithmetic operations on an image: adding or subtracting a constant We can also perform lightening or darkening of an image by multiplication; figure 5.4 shows some examples of functions which will have these effects. To implement these functions, we use the immultiply function. Table 5.1 shows the particular commands required to implement the functions of figure 5.4. All these images can be viewed with imshow; they are shown in figure 5.5. Compare the results of darkening b2 and b3. Note that b3, although darker than the original, is 54 CHAPTER 5. POINT PROCESSING     Old values New values       Old values New values       Old values New values    Figure 5.4: Using multiplication and division   b3=immultiply(b,0.5); or b3=imdivide(b,2)   b4=immultiply(b,2);    b5=imadd(immultiply(b,0.5),128); or b5=imadd(imdivide(b,2),128); Table 5.1: Implementing pixel multiplication by Matlab commands b3:   b4:   b5:    Figure 5.5: Arithmetic operations o 5.2. ARITHMETIC OPERATIONS 55 still quite clear, whereas a lot of information has been lost by the subtraction process, as can be seen in image b2. This is because in image b2 all pixels with grey values 128 or less have become zero. A similar loss of information has occurred in the images b1 and b4. Note in particular the edges of the light coloured block in the bottom centre; in both b1 and b4 the right hand edge has disappeared. However, the edge is quite visible in image b5. Complements The complement of a greyscale image is its photographic negative. If an image matrix m is of type double and so its grey values are in the range  to  , we can obtain its negative with the command >> 1-m If the image is binary, we can use >> ~m If the image is of type uint8, the best approach is the imcomplement function. Figure 5.6 shows the complement function     , and the result of the commands >> bc=imcomplement(b); >> imshow(bc)     Old values New values      Figure 5.6: Image complementation Interesting special effects can be obtained by complementing only part of the image; for example by taking the complement of pixels of grey value 128 or less, and leaving other pixels untouched. Or we could take the complement of pixels which are 128 or greater, and leave other pixels untouched. Figure 5.7 shows these functions. The effect of these functions is called so 56 CHAPTER 5. POINT PROCESSING     Old values New values Complementing only dark pixels     Old values New values Complementing only light pixels Figure 5.7: Part complementation 5.3 Histograms Given a greyscale image, its histogram consists of the histogram of its grey levels; that is, a graph indicating the number of times each grey level occurs in the image. We can infer a great deal about the appearance of an image from its histogram, as the following examples indicate: In a dark image, the grey levels (and hence the histogram) would be clustered at the lower end: In a uniformly bright image, the grey levels would be clustered at the upper end: In a well contrasted image, the grey levels would be well spread out over much of the range: We can view the histogram of an image in Matlab by using the imhist function: >> p=imread(’pout.tif’); >> imshow(p),figure,imhist(p),axis tight (the axis tight command ensures the axes of the histogram are automatically scaled to fit all the values in). The result is shown in figure 5.8. Since the grey values are all clustered together in the centre of the histogram, we would expect the image to be poorly contrasted, as indeed it is. Given a poorly contrasted image, we would like to enhance its contrast, by spreading out its histogram. There are two ways of doing this. 5.3.1 Histogram stretching (Contrast stretching) Suppose we have an image with the histogram shown in figure 5.9, associated with a table of the numbers  of grey values: Grey level                      5.3. HISTOGRAMS 57 0 50 100 150 200 250 0 500 1000 1500 2000 2500 3000 3500 4000 Figure 5.8: The image pout.tif and its histogram                                 Figure 5.9: A histogram of a poorly contrasted image, and a stret 58 CHAPTER 5. POINT PROCESSING (with  , as before.) We can stretch the grey levels in the centre of the range out by applying the piecewise linear function shown at the right in figure 5.9. This function has the effect of stretching the grey levels – to grey levels –  according to the equation:          where  is the original grey level and  its result after the transformation. Grey levels outside this range are either left alone (as in this case) or transformed according to the linear functions at the ends of the graph above. This yields:          and the corresponding histogram:                   which indicates an image with greater contrast than the original. Use of imadjust To perform histogram stretching in Matlab the imadjust function may be used. In its simplest incarnation, the command imadjust(im,[a,b],[c,d]) stretches the image according to the function shown in figure 5.10. Since imadjust is designed to    Figure 5.10: The stretching functio 5.3. HISTOGRAMS 59 work equally well on images of type double, uint8 or uint16 the values of , , and  must be between 0 and 1; the function automatically converts the image (if needed) to be of type double. Note that imadjust does not work quite in the same way as shown in figure 5.9. Pixel values less than are all converted to , and pixel values greater than are all converted to  . If either of [a,b] or [c,d] are chosen to be [0,1], the abbreviation [] may be used. Thus, for example, the command >> imadjust(im,[],[]) does nothing, and the command >> imadjust(im,[],[1,0]) inverts the grey values of the image, to produce a result similar to a photographic negative. The imadjust function has one other optional parameter: the gamma value, which describes the shape of the function between the coordinates   and    . If gamma is equal to 1, which is the default, then a linear mapping is used, as shown above in figure 5.10. However, values less than one produce a function which is concave downward, as shown on the left in figure 5.11, and values greater than one produce a figure which is concave upward, as shown on the right in figure 5.11.    gamma      gamma   Figure 5.11: The imadjust function with gamma not equal to 1 The function used is a slight variation on the standard line between two points:           Use of the gamma value alone can be enough to substantially change the appearance of the image. For example: >> t=imread(’tire.tif’); >> th=imadjust(t,[],[],0.5); >> imshow(t),figure,imshow(th) produces the result shown in figure 5.12. We may view the imadjust stretching function with the plot function. For example, >> plot(t,th,’.’),axis tight produces the plot shown in figure 5.13. Since p and ph are matrices which contain the original values and the values after the imadjust function, the plot function simply plots them, using 60 CHAPTER 5. POINT PROCESSING Figure 5.12: The tire image and after adjustment with the gamma value 0 50 100 150 200 250 0 50 100 150 200 250 Figure 5.13: The function used in figure 5.12 5.3. HISTOGRAMS 61 A piecewise linear stretching function We can easily write our own function to perform piecewise linear stretching as shown in figure 5.14. To do this, we will make use of the find function, to find the pixel values in the image between  and  . Since the line between the coordinates     and     has the equation     Figure 5.14: A piecewise linear stretching function              the heart of our function will be the lines pix=find(im >= a(i) & im < a(i+1)); out(pix)=(im(pix)-a(i))*(b(i+1)-b(i))/(a(i+1)-a(i))+b(i); where im is the input image and out is the output image. A simple procedure which takes as inputs images of type uint8 or double is shown in figure 5.15. As an example of the use of this function: >> th=histpwl(t,[0 .25 .5 .75 1],[0 .75 .25 .5 1]); >> imshow(th) >> figure,plot(t,th,’.’),axis tight produces the figures shown in figure 5.16. 5.3.2 Histogram equalization The trouble with any of the above methods of histogram stretching is that they require user input. Sometimes a better approach is provided by histogram equalization, which is an entirely automatic procedure. Suppose our image has different grey levels       , and that grey level  occurs  times in the image. Suppose also that the total number of pixels in the image is (so that      . To transform the grey levels to obtain a better contrasted image, we change grey level  to          and thi 62 CHAPTER 5. POINT PROCESSING function out = histpwl(im,a,b) % % HISTPWL(IM,A,B) applies a piecewise linear transformation to the pixel values % of image IM, where A and B are vectors containing the x and y coordinates % of the ends of the line segments. IM can be of type UINT8 or DOUBLE, % and the values in A and B must be between 0 and 1. % % For example: % % histpwl(x,[0,1],[1,0]) % % simply inverts the pixel values. % classChanged = 0; if ~isa(im, ’double’), classChanged = 1; im = im2double(im); end if length(a) ~= length (b) error(’Vectors A and B must be of equal size’); end N=length(a); out=zeros(size(im)); for i=1:N-1 pix=find(im>=a(i) & im> p=imread(’pout.tif’); >> ph=histeq(p); >> imshow(ph),figure,imhist(ph),axis tight applies histogram equalization to the pout image, and produces the resulting histogram. These results are shown in figure 5.19. Notice the far greater spread of the histogram. This corresponds to the greater increase of contrast in the image. We give one more example, that of a very dark image. We can obtain a dark image by t 5.3. HISTOGRAMS 65                   Figure 5.18: The histogram of figure 5.17 after equalization 0 50 100 150 200 250 0 500 1000 1500 2000 2500 3000 3500 4000 Figure 5.19: The histogram of figure 5.8 after equali 66 CHAPTER 5. POINT PROCESSING We now have an index matrix c; in this case consisting of values between 0 and 63, and without the colour map. Since the index matrix contains only low values it will appear very dark when displayed. We can display this matrix and its histogram with the usual commands: >> imshow(c),figure,imhist(c),axis tight and the results are shown in figure 5.20. 0 50 100 150 200 250 0 500 1000 1500 2000 2500 3000 Figure 5.20: The index values from cat.tif and its histogram As you see, the very dark image has a corresponding histogram heavily clustered at the lower end of the scale. But we can apply histogram equalization to this image, and display the results: >> ch=histeq(c); >> imshow(ch),figure,imhist(ch),axis tight and the results are shown in figure 5.21. 0 50 100 150 200 250 0 1000 2000 3000 4000 5000 6000 Figure 5.21: The image from 5.20 equalized and its histogram 5.4. THRESHOLDING 67                  Figure 5.22: The cumulative histogram Why it works Consider the histogram in figure 5.17. To apply histogram stretching, we would need to stretch out the values between grey levels 9 and 13. Thus, we would need to apply a piecewise function similar to that shown in figure 5.9. Let’s consider the cumulative histogram, which is shown in figure 5.22. The dashed line is simply joining the top of the histogram bars. However, it can be interpreted as an appropriate histogram stretching function. To do this, we need to scale the  values so that they are between and  , rather than and  . But this is precisely the method described in section 5.3.2. 5.4 Thresholding 5.4.1 Single thresholding A greyscale image is turned into a binary (black and white) image by first choosing a grey level in the original image, and then turning every pixel black or white according to whether its grey value is greater than or less than : A pixel becomes white if its grey level is  , black if its grey level is  . Thresholding is a vital part of image segmentation, where we wish to isolate objects from the background. It is also an important component of robot vision. Thresholding can be done very simply in Matlab. Suppose we have an 8 bit image, stored as the variable X. Then the command X>T will perform the thresholding. We can view the result with imshow. For example, the commands >> r=imread(’rice.tif’); >> imshow(r),figu 68 CHAPTER 5. POINT PROCESSING Figure 5.23: Thresholded image of rice grains will produce the images shown in figure 5.23. The resulting image can then be further processed to find the number, or average size of the grains. To see how this works, recall that in Matlab, an operation on a single number, when applied to a matrix, is interpreted as being applied simultaneously to all elements of the matrix; this is vectorization, which we have seen in chapter 2. The command X>T will thus return 1 (for true) for all those pixels for which the grey values are greater than T, and 0 (for false) for all those pixels for which the grey values are less than or equal to T. We thus end up with a matrix of 0’s and 1’s, which can be viewed as a binary image. The rice image shown above has light grains on a dark background; an image with dark objects over a light background may be treated the same:: >> b=imread(’bacteria.tif’); >> imshow(b),figure,imshow(b>100) will produce the images shown in figure 5.24. Figure 5.24: Thresholded image of bacteria 5.4. THRESHOLDING 69 As well as the above method, Matlab has the im2bw function, which thresholds an image of any data type, using the general syntax im2bw(image,level) where level is a value between 0 and 1 (inclusive), indicating the fraction of grey values to be turned white. This command will work on greyscale, coloured and indexed images of data type uint8, uint16 or double. For example, the thresholded rice and bacteria images above could be obtained using >> im2bw(r,0.43); >> im2bw(b,0.39); The im2bw function automatically scales the value level to a grey value appropriate to the image type, and then performs a thresholding by our first method. As well as isolating objects from the background, thresholding provides a very simple way of showing hidden aspects of an image. For example, the image paper.tif appears all white, as nearly all the grey values are very high. However, thresholding at a high level produces an image of far greater interest. We can use the commands >> p=imread(’paper1.tif’); >> imshow(p),figure,imshow(p>241) to provide the images shown in figure 5.25. Figure 5.25: The paper image and result after thresholding 5.4.2 Double thresholding Here we choose two values and  and apply a thresholding operation as: A pixel becomes white if its grey level is between and  , black if its grey level is otherwise. We can implement this by a simple variation on the above method: X>T1 & 70 CHAPTER 5. POINT PROCESSING Since the ampersand acts as a logical “and”, the result will only produce a one where both inequalities are satisfied. Consider the following sequence of commands, which start by producing an 8-bit grey version of the indexed image spine.tif: >> [x,map]=imread(’spine.tif’); >> s=uint8(256*ind2gray(x,map)); >> imshow(s),figure,imshow(s>115 & s<125) The output is shown in figure 5.26. Note how double thresholding brings out subtle features of the Figure 5.26: The image spine.tif an the result after double thresholding spine which single thresholding would be unable to do. We can obtain similar results using im2bw: imshow(im2bw(x,map,0.45)&~{}im2bw(x,map,0.5))} but this is somewhat slower because of all the extra computation involved when dealing with an indexed image. 5.5 Applications of thresholding We have seen that thresholding can be useful in the following situations: 1. When we want to remove unnecessary detail from an image, to concentrate on essentials. Examples of this were given in the rice and bacteria images: by removing all grey level information, the rice and bacteria were reduced to binary blobs. But this information may be all we need to investigate sizes, shapes, or numbers of blobs. 2. To bring out hidden detail. This was illustrated with paper and spine images. In both, the detail was obscured because of the similarity of the grey levels involved. But thresholding can be vital for other purposes. We list a few more: 3. When we want to remove a varying background from text or a drawing. We can simulate a varying background by taking the image text.tif and placing it on a random background. This can be easily implemented with some simple Matlab commands: 5.5. APPLICATIONS OF THRESHOLDING 71 >> r=rand(256)*128+127; >> t=imread(’text.tif’); >> tr=uint8(r.*double(not(t)); >> imshow(tr) The first command simply uses the rand function (which produces matrices of uniformly generated random numbers between  and  ), and scales the result so the random numbers are between 127 and 255. We then read in the text image, which shows white text on a dark background. The third command does several things at once: not(t) reverses the text image so as to have black text on a white background; double changes the numeric type so that the matrix can be used with arithmetic operations; finally the result is multiplied into the random matrix, and the whole thing converted to uint8 for display. The result is shown on the left in figure 5.27. If we threshold this image and display the result with >> imshow(tr>100) the result is shown on the right in figure 5.27, and the background has been completely removed. Figure 5.27: Text on a varying background, and thresholding Exercises Thresholding 1. Consider the following  ima 72 CHAPTER 5. POINT PROCESSING 3 148 117 148 145 178 132 174 2 176 174 110 185 155 118 165 0 100 124 113 193 136 146 108 0 155 170 106 158 130 178 170 9 196 138 113 108 127 144 139 6 188 143 183 137 162 105 169 9 122 156 119 188 179 100 151 8 176 137 114 135 123 134 183 Threshold it at (a) level 100 (b) level 150 2. What happens to the results of thresholding as the threshold level is increased? 3. Can you can create a small image which produces an “X” shape when thresholded at level 100, and a cross shape “ ” when thresholded at 150? If not, why not? 4. Superimpose the image text.tif onto the image cameraman.tif. You can do this with: >> t=imread(’text.tif’);} >> c=imread(’cameraman.tif’);} >> m=uint8(double(c)+255*double(t));} Can you threshold this new image m to isolate the text? 5. Try the same problem as above, but define m as: >> m=uint8(double(c).*double(~t)); Histogram Equalization 6. Write informal code to calculate a histogram  of the grey values of an image     . 7. The following table gives the number of pixels at each of the grey levels – in an image with those grey values only:                  Draw the histogram corresponding to these grey levels, and then perform a histogram equalization and draw the resulting histogram. 8. The following tables give the number of pixels at each of the grey levels –   in an image with those grey values only. In each case draw the histogram corresponding to these grey levels, and then perform a histogram equalization and draw the resulting histogram. (a)                       5.5. APPLICATIONS OF THRESHOLDING 73 (b)                     9. The following small image has grey values in the range 0 to 19. Compute the grey level histogram and the mapping that will equalize this histogram. Produce an  grid containing the grey values for the new histogram-equalized image. 12 6 5 13 14 14 16 15 11 10 8 5 8 11 14 14 9 8 3 4 7 12 18 19 10 7 4 2 10 12 13 17 16 9 13 13 16 19 19 17 12 10 14 15 18 18 16 14 11 8 10 12 14 13 14 15 8 6 3 7 9 11 12 12 10. Is the histogram equalization operation idempotent? That is, is performing histogram equalization twice the same as doing it just once? 11. Apply histogram equalization to the indices of the image emu.tif. 12. Create a dark image with >> c=imread(’cameraman.tif’); >> [x,map]=gray2ind(c); The matrix x, when viewed, will appear as a very dark version of the cameraman image. Apply histogram equalization to it, and compare the result with the original image. 13. Using p and ph from section 5.5, enter the command >> figure,plot(p,ph,’.’),grid on What are you seeing here? 14. Experiment with some othe 74 CHAPTER 5. POINT PROCESSING Chapter 6 Spatial Filtering 6.1 Introduction We have seen in chapter 5 that an image can be modified by applying a particular function to each pixel value. Spatial filtering may be considered as an extension of this, where we apply a function to a neighbourhood of each pixel. The idea is to move a “mask”: a rectangle (usually with sides of odd length) or other shape over the given image. As we do this, we create a new image whose pixels have grey values calculated from the grey values under the mask, as shown in figure 6.1. The combination of mask and function Pixel at position     Mask Original image Pixel at position     Image after filtering Figure 6.1: Using a spatial mask on an image is called a filter. If the function by which the new grey value is calculated is a linear function of all the grey values in the mask, then the filter is called a linear filter. We can implement a linear filter by multiplying all elements in the mask by corresponding elements in the neighbourhood, and adding up all these products. Suppose we have a   mask as illustrated in figure 6.1. Suppose that the mask values are given by: 75 76 CHAPTER 6. SPATIAL FILTERING                      and that corresponding pixel values are     ! "#$% &'! (&  )* +#! %  &,!  &#  &-  .&' ! /&,$% .&'&'! .&'(&  We now multiply and add: 0 132  0 42   5 ,   65  ,   A diagram illustrating the process for performing spatial filtering is given in figure 6.2. We see that spatial filtering requires three steps: 1. position the mask over the current pixel, 2. form all products of filter elements with the corresponding elements of the neighbourhood, 3. add up all the products. This must be repeated for every pixel in the image. An example: One important linear filter is to use a   mask and take the average of all nine values within the mask. This value becomes the grey value of the corresponding p 6.1. INTRODUCTION 77 Input image Current pixel Pixel Neighbourhood Mask Product of neighbourhood with mask Output pixel Sum of all products Output image Figure 6.2: Performing spatial filtering 78 CHAPTER 6. SPATIAL FILTERING image. We may describe this operation as follows:           where is grey value of the current pixel in the original image, and the average is the grey value of the corresponding pixel in the new image. To apply this to an image, consider the    “image” obtained by: >> x=uint8(10*magic(5)) x = 170 240 10 80 150 230 50 70 140 160 40 60 130 200 220 100 120 190 210 30 110 180 250 20 90 We may regard this array as being made of nine overlapping   neighbourhoods. The output of our working will thus consist only of nine values. We shall see later how to obtain 25 values in the output. Consider the top left   neighbourhood of our image x: 170 240 10 80 150 230 50 70 140 160 40 60 130 200 220 100 120 190 210 30 110 180 250 20 90 Now we take the average of all these values: >> mean2(x(1:3,1:3)) ans = 111.1111 which we can round to 111. Now we can move to the second ne 6.2. NOTATION 79 170 240 10 80 150 230 50 70 140 160 40 60 130 200 220 100 120 190 210 30 110 180 250 20 90 and take its average: >> mean2(x(1:3,2:4)) ans = 108.8889 and we can round this either down to 108, or to the nearest integer 109. If we continue in this manner, we will build up the following output: 111.1111 108.8889 128.8889 110.0000 130.0000 150.0000 131.1111 151.1111 148.8889 This array is the result of filtering x with the    averaging filter. 6.2 Notation It is convenient to describe a linear filter simply in terms of the coefficients of all the grey values of pixels within the mask. This can be written as a matrix. The averaging filter above, for example, could have its output written as             and so we can describe this filter by the matrix                 An example: The filter       80 CHAPTER 6. SPATIAL FILTERING would operate on grey values as            Edges of the image There is an obvious problem in applying a filter—what happens at the edge of the image, where the mask partly falls outside the image? In such a case, as illustrated in figure 6.3 there will be a lack of grey values to use in the filter function. Figure 6.3: A mask at the edge of an image There are a number of different approaches to dealing with this problem: Ignore the edges. That is, we only apply the mask to those pixels in the image for with the mask will lie fully within the image. This means all pixels except for the edges, and results in an output image which is smaller than the original. If the mask is very large, we may lose a significant amount of information by this method. We applied this method in our example above. “Pad” with zeros. We assume that all necessary values outside the image are zero. This gives us all values to work with, and will return an output image of the same size as the original, but may have the effect of introducing unwanted artifacts (for example, edges) around the image. 6.3 Filtering in Matlab The filter2 function does the job of linear filtering for us; its use is filter2(filter,image,shape) and the result is a matrix of data type double. The parameter shape is optional, it describes the method for dealing with the edges: filter2(filter,image,’same’) is the default; it produces a matrix of equal size to the original image matrix. It uses zero padding: >> a=o 6.3. FILTERING IN MATLAB 81 0.1111 0.1111 0.1111 0.1111 0.1111 0.1111 0.1111 0.1111 0.1111 >> filter2(a,x,’same’) ans = 76.6667 85.5556 65.5556 67.7778 58.8889 87.7778 111.1111 108.8889 128.8889 105.5556 66.6667 110.0000 130.0000 150.0000 106.6667 67.7778 131.1111 151.1111 148.8889 85.5556 56.6667 105.5556 107.7778 87.7778 38.8889 filter2(filter,image,’valid’) applies the mask only to “inside” pixels. We can see that the result will always be smaller than the original: >> filter2(a,x,’valid’) ans = 111.1111 108.8889 128.8889 110.0000 130.0000 150.0000 131.1111 151.1111 148.8889 We can obtain the result of ’same’ above by padding with zeros and using ’valid’: >> x2=zeros(7,7); >> x2(2:6,2:6)=x x2 = 0 0 0 0 0 0 0 0 170 240 10 80 150 0 0 230 50 70 140 160 0 0 40 60 130 200 220 0 0 100 120 190 210 30 0 0 110 180 250 20 90 0 0 0 0 0 0 0 0 >> filter2(a,x2,’valid’) filter2(filter,image,’full’) returns a result larger than the original; it does this by padding with zero, and applying the filter at all places on and around the image where the mask intersects the image matri 82 CHAPTER 6. SPATIAL FILTERING >> filter2(a,x,’full’) ans = 18.8889 45.5556 46.6667 36.6667 26.6667 25.5556 16.6667 44.4444 76.6667 85.5556 65.5556 67.7778 58.8889 34.4444 48.8889 87.7778 111.1111 108.8889 128.8889 105.5556 58.8889 41.1111 66.6667 110.0000 130.0000 150.0000 106.6667 45.5556 27.7778 67.7778 131.1111 151.1111 148.8889 85.5556 37.7778 23.3333 56.6667 105.5556 107.7778 87.7778 38.8889 13.3333 12.2222 32.2222 60.0000 50.0000 40.0000 12.2222 10.0000 The shape parameter, being optional, can be omitted; in which case the default value is ’same’. There is no single “best” approach; the method must be dictated by the problem at hand; by the filter being used, and by the result required. We can create our filters by hand, or by using the fspecial function; this has many options which makes for easy creation of many different filters. We shall use the average option, which produces averaging filters of given size; thus fspecial(’average’,[5,7]) will return an averaging filter of size ; more simply fspecial(’average’,11) will return an averaging filter of size      . If we leave out the final number or vector, the  averaging filter is returned. For example, suppose we apply the    averaging filter to an image as follows: >> c=imread(’cameraman.tif’); >> f1=fspecial(’average’); >> cf1=filter2(f1,c); We now have a matrix of data type double. To display this, we can do any of the following: transform it to a matrix of type uint8, for use with imshow, divide its values by 255 to obtain a matrix with values in the   –   range, for use with imshow, use mat2gray to scale the result for display. We shall discuss the use of this function later. Using the second method: >> figure,imshow(c),figure,imshow(cf1/255) will produce the images shown in figures 6.4(a) and 6.4(b). The averaging filter blurs the image; the edges in particular are less distinct than in the original. The image can be further blurred by using an averaging filter of larger size. This is sho 6.3. FILTERING IN MATLAB 83 (a) Original image (b) Average filtering (c) Using a  filter (d) Using a   filter Figure 6.4: Average filte 84 CHAPTER 6. SPATIAL FILTERING figure 6.4(c), where a  averaging filter has been used, and in figure 6.4(d), where a    averaging filter has been used. Notice how the zero padding used at the edges has resulted in a dark border appearing around the image. This is especially noticeable when a large filter is being used. If this is an unwanted artifact of the filtering; if for example it changes the average brightness of the image, then it may be more appropriate to use the ’valid’ shape option. The resulting image after these filters may appear to be much “worse” than the original. However, applying a blurring filter to reduce detail in an image may the perfect operation for autonomous machine recognition, or if we are only concentrating on the “gross” aspects of the image: numbers of objects; amount of dark and light areas. In such cases, too much detail may obscure the outcome. 6.4 Frequencies; low and high pass filters It will be convenient to have some standard terminology by which we can discuss the effects a filter will have on an image, and to be able to choose the most appropriate filter for a given image processing task. One important aspect of an image which enables us to do this is the notion of frequencies. Fundamentally, the frequencies of an image are the amount by which grey values change with distance. High frequency components are characterized by large changes in grey values over small distances; example of high frequency components are edges and noise. Low frequency components, on the other hand, are parts of the image characterized by little change in the grey values. These may include backgrounds, skin textures. We then say that a filter is a high pass filter if it “passes over” the high frequency components, and reduces or eliminates low frequency components, low pass filter if it “passes over” the low frequency components, and reduces or eliminates high frequency components, For example, the    averaging filter is low pass filter, as it tends to blur edges. The filter            is a high pass filter. We note that the sum of the coefficients (that is, the sum of all e elements in the matrix), in the high pass filter is zero. This means that in a low frequency part of an image, where the grey values are similar, the result of using this filter is that the corresponding grey values in the new image will be close to zero. To see this, consider a  block of similar values pixels, and apply the above high pass filter to the central four:                                    The resulting values are close to zero, which is the expected result of applying a high pass filter to a low frequency component. We shall see how to deal with negative values below. High pass filters are of particular value in edge detection and edge enhancement (of which we shall see more in chapter 8). But we can provide a sneak preview, using the 6.4. FREQUENCIES; LOW AND HIGH PASS FILTERS 85 >> f=fspecial(’laplacian’) f = 0.1667 0.6667 0.1667 0.6667 -3.3333 0.6667 0.1667 0.6667 0.1667 >> cf=filter2(f,c); >> imshow(cf/100) >> f1=fspecial(’log’) f1 = 0.0448 0.0468 0.0564 0.0468 0.0448 0.0468 0.3167 0.7146 0.3167 0.0468 0.0564 0.7146 -4.9048 0.7146 0.0564 0.0468 0.3167 0.7146 0.3167 0.0468 0.0448 0.0468 0.0564 0.0468 0.0448 >> cf1=filter2(f1,c); >> figure,imshow(cf1/100) The images are shown in figure 6.5. Image (a) is the result of the Laplacian filter; image (b) shows the result of the Laplacian of Gaussian (“log”) filter. (a) Laplacian filter (b) Laplacian of Gaussian (“log”) filtering Figure 6.5: High pass filtering In each case, the sum of all the filter elements is zero. 86 CHAPTER 6. SPATIAL FILTERING Values outside the range 0–255 We have seen that for image display, we would like the grey values of the pixels to lie between 0 and 255. However, the result of applying a linear filter may be values which lie outside this range. We may consider ways of dealing with values outside of this “displayable” range. Make negative values positive. This will certainly deal with negative values, but not with values greater than 255. Hence, this can only be used in specific circumstances; for example, when there are only a few negative values, and when these values are themselves close to zero. Clip values. We apply the following thresholding type operation to the grey values  produced by the filter to obtain a displayable value :    if    if        if     This will produce an image with all pixel values in the required range, but is not suitable if there are many grey values outside the 0–255 range; in particular, if the grey values are equally spread over a larger range. In such a case this operation will tend to destroy the results of the filter. Scaling transformation. Suppose the lowest grey value produced by the filter if  and the highest value is . We can transform all values in the range  – to the range 0–255 by the linear transformation illustrated below:   255 Since the gradient of the line is       we can write the equation of the line as          and applying this transformation to all grey levels  produced by the filter will result (after any necessary rounding) in an image which can be displayed. As an example, let’s apply the high pass filter given in section 6.4 to the cameraman image: >> f2=[1 -2 1;-2 4 -2;1 -2 1]; >> cf2=filter2(f2,c); Now the maximum and minimum values of the matrix cf2 are   and    respectively. The mat2gray function automatically scales the matrix elements to displayable values; for any matrix , it applies a linear transformation to to its elements, with the lowest value mapping to 0.0, and the highest value mapping to 1.0. This means the output of mat2gray is always of type double. The function also requires that t 6.5. GAUSSIAN FILTERS 87 >> figure,imshow(mat2gray(cf2)); To do this by hand, so to speak, applying the linear transformation above, we can use: >> maxcf2=max(cf2(:)); >> mincf2=min(cf2(:)); >> cf2g=(cf2-mincf2)/(maxcf2-mncf2); The result will be a matrix of type double, with entries in the range –  . This can be be viewed with imshow. We can make it a uint8 image by multiplying by 255 first. The result can be seen in figure 6.6. We can generally obtain a better result by dividing the result of the filtering by a constant before displaying it: >> figure,imshow(cf2/60) and this is also shown in figure 6.6. Using mat2gray Dividing by a constant Figure 6.6: Using a high pass filter and displaying the result High pass filters are often used for edge detection. These can be seen quite clearly in the right hand image of figure 6.6. 6.5 Gaussian filters We have seen some examples of linear filters so far: the averaging filter, and a high pass filter. The fspecial function can produce many different filters for use with the filter2 function; we shall look at a particularly important filter here. Gaussian filters are a class of low-pass filters, all based on the Gaussian probability distribution function      88 CHAPTER 6. SPATIAL FILTERING where is the standard deviation: a large value of produces to a flatter curve, and a small value leads to a “pointier” curve. Figure 6.7 shows examples of such one dimensional gaussians. Large value of Small value of Figure 6.7: One dimensional gaussians A two dimensional Gaussian function is given by        The command fspecial(’gaussian’) produces a discrete version of this function. We can draw pictures of this with the surf function, and to ensure a nice smooth result, we shall create a large filter (size    ) with different standard deviations. >> a=50;s=3; >> g=fspecial(’gaussian’,[a a],s); >> surf(1:a,1:a,g) >> s=9; >> g2=fspecial(’gaussian’,[a a],s); >> figure,surf(1:a,1:a,g2) The surfaces are shown in figure 6.8. Gaussian filters have a blurring effect which looks very similar to that produced by neighbourhood averaging. Let’s experiment with the cameraman image, and some different gaussian filters. >> g1=fspecial(’gaussian’,[5,5]); >> g1=fspecial(’gaussian’,[5,5],2); >> g1=fspecial(’gaussian’,[11,11],1); >> g1=fspecial(’gaussian’,[11,11],5); The final parameter is the standard deviation; which if not given defaults to  . The second parameter (which is also optional), gives the size of the filter; the default is   . If the filter is to be square, as in all the above examples, we can just give a single number in each case. Now we can apply the filter to the cameraman image matrix c and vier the result. >> imshow(filter2(g1,c)/256) >> figure,imshow(filter2(g2,c)/256) >> figure,imshow(filter2(g3,c)/256) >> figure,imshow(filter2( 6.6. NON-LINEAR FILTERS 89 0 10 20 30 40 50 0 10 20 30 40 50 0 0.005 0.01 0.015 0.02 0 10 20 30 40 50 0 10 20 30 40 50 0 1 2 x 10−3  Figure 6.8: Two dimensional gaussians . and the results are shown in figure 6.9. We see that to obtain a spread out blurring effect, we need a large standard deviation. In fact, if we let the standard deviation grow large without bound, we obtain the averaging filters as limiting values. For example: >> fspecial(’gaussian’,3,100) ans = 0.1111 0.1111 0.1111 0.1111 0.1111 0.1111 0.1111 0.1111 0.1111 and we have the  averaging filter. Although the results of Gaussian blurring and averaging look similar, the Gaussian filter has some elegant mathematical properties which make it particularly suitable for blurring. Other filters will be discussed in future chapters; also check the documentation for fspecial for other filters. 6.6 Non-linear filters Linear filters, as we have seen in the previous sections, are easy to describe, and can be applied very quickly and efficiently by Matlab. However, non-linear filters can also be used, if less efficiently. The function to use is nlfilter, which applies a filter to an image according to a pre-defined function. If the function is not already defined, we have to create an m-file which defines it. Here are some examples; first to define a filter which takes the maximum value in a    neighbourhood: cmax=nlfilter(c,[3,3],’max(x(: 90 CHAPTER 6. SPATIAL FILTERING   ,     ,      ,       ,  Figure 6.9: Effects of different gaussian filters on a 6.6. NON-LINEAR FILTERS 91 The nlfilter function requires three arguments: the image matrix, the size of the filter, and the function to be applied. The function must be a matrix function which returns a scalar value. The result of this operation is shown in figure 6.10(a). A corresponding filter which takes the minimum value can be just as easily applied: cmin=nlfilter(c,[3,3],’min(x(:))’); and the result is shown in figure 6.10(b). (a) Using a maximum filter (b) Using a minimum filter Figure 6.10: Using non-linear filters Both these filters can in fact be more efficiently implemented by using the Matlab function ordfilt2—see its help page! Note that in each case the image has lost some sharpness, and has been brightened by the maximum filter, and darkened by the minimum filter. The nlfilter function is very slow; in general there is little call for non-linear filters except for a few which are defined by their own commands. We shall investigate these in later chapters. Exercises 1. The array below represents a small greyscale image. Compute the images that result when the image is convolved with each of the masks (a) to (h) shown. At the edge of the image use a restricted mask. (In other words, pad the image with zeroes.) 20 20 20 10 10 10 10 10 10 20 20 20 20 20 20 20 20 10 20 20 20 10 10 10 10 20 10 20 20 10 10 10 10 10 20 10 20 10 10 10 10 10 10 20 10 10 10 10 10 20 10 10 20 10 10 10 10 10 10 10 10 10 10 92 CHAPTER 6. SPATIAL FILTERING 20 10 20 20 10 10 10 20 20 20 10 10 20 10 10 20 10 20 (a) -1 -1 0 -1 0 1 0 1 1 (b) 0 -1 -1 1 0 -1 1 1 0 (c) -1 -1 -1 2 2 2 -1 -1 -1 (d) -1 2 -1 -1 2 -1 -1 2 -1 (e) -1 -1 -1 -1 8 -1 -1 -1 -1 (f) 1 1 1 1 1 1 1 1 1 (g) -1 0 1 -1 0 1 -1 0 1 (h) 0 -1 0 -1 4 -1 0 -1 0 2. Check your answers to the previous question with Matlab. 3. Describe what each of the masks in the previous question might be used for. If you can’t do this, wait until question 5 below. 4. Devise a    mask for an “identity filter”; which causes no change in the image. 5. Obtain a greyscale image of a monkey (a mandrill) with the following commands: >> load(’mandrill.mat’); >> m=im2uint8(ind2gray(X,map)); Apply all the filters listed in question 1 to this image. Can you now see what each filter does? 6. Apply larger and larger averaging filters to this image. What is the smallest sized filter for which the whiskers cannot be seen? 7. Repeat the previous question with Gaussian filters with the following parameters: Size Standard deviation [3,3] 0.5 1 2 [7,7] 1 3 6 [11,11] 1 4 8 [21,21] 1 5 10 At what values do the whiskers disappear? 8. Can you see any observable differnce in the results of average filtering and of using a Gaussian filter? 9. Read through the help page of the fspecial function, and apply some of the other filters to the cameraman image, and to the mandrill image. 10. Apply different laplacian filters to the mandrill and cameraman images. Which produces the best edge image? 11. Matlab also has an imfilter function, which if x is an image matrix (of any type), and f is a filter, has the syntax imfilter(x,f); It differs from filter2 in the different parameters it takes (read its help file), and in that the output is always of the same class as the original image. 6.6. NON-LINEAR FILTERS 93 (a) Use imfilter on the mandrill image with the filters listed in question 1. (b) Apply different sized averaging filters to the mandrill image using imfilter. (c) Apply different laplacian filters to the mandrill image using imfilter. Compare the results with those obtained with filter2. Which do you think gives the best results? 12. Display the difference between the cmax and cmin images obtained in section 6.6. You can do this with >> imshow(imsubtract(cmax,cmin)) What are you seeing here? Can you account for the output of these commands? 94 CHAPTER 6. SPATIAL FILTERING Chapter 7 Noise 7.1 Introduction We may define noise to be any degradation in the image signal, caused by external disturbance. If an image is being sent electronically from one place to another, via satellite or wireless transmission, or through networked cable, we may expect errors to occur in the image signal. These errors will appear on the image output in different ways depending on the type of disturbance in the signal. Usually we know what type of errors to expect, and hence the type of noise on the image; hence we can choose the most appropriate method for reducing the effects. Cleaning an image corrupted by noise is thus an important area of image restoration. In this chapter we will investigate some of the standard noise forms, and the different methods of eliminating or reducing their effects on the image. 7.2 Types of noise We will look at four different noise types, and how they appear on an image. Salt and pepper noise Also called impulse noise, shot noise, or binary noise. This degradation can be caused by sharp, sudden disturbances in the image signal; its appearance is randomly scattered white or black (or both) pixels over the image. To demonstrate its appearance, we will first generate a grey-scale image, starting with a colour image: >> tw=imread(’twins.tif’); >> t=rgb2gray(tw); To add noise, we use the Matlab function imnoise, which takes a number of different parameters. To add salt and pepper noise: >> t_sp=imnoise(t,’salt & pepper’); The amount of noise added defaults to  ; to add more or less noise we include an optional parameter, being a value between 0 and 1 indicating the fraction of pixels to be corrupted. Thus, for example 96 CHAPTER 7. NOISE >> imnoise(t,’salt & pepper’,0.2); would produce an image with  of its pixels corrupted by salt and pepper noise. The twins image is shown in figure 7.1(a) and the image with noise is shown in figure 7.1(b). (a) Original image (b) With added salt & pepper noise Figure 7.1: Noise on an image Gaussian noise Gaussian noise is an idealized form of white noise, which is caused by random fluctuations in the signal. We can observe white noise by watching a television which is slightly mistuned to a particular channel. Gaussian noise is white noise which is normally distributed. If the image is represented as , and the Gaussian noise by , then we can model a noisy image by simply adding the two:  Here we may assume that is a matrix whose elements are the pixel values of our image, and  is a matrix whose elements are normally distributed. It can be shown that this is an appropriate model for noise. The effect can again be demonstrated by the imnoise function: >> t_ga=inoise(t,’gaussian’); As with salt and pepper noise, the “gaussian” parameter also can take optional values, giving the mean and variance of the noise. The default values are and   , and the result is shown in figure 7.2(a). Speckle noise Whereas Gaussian noise can be modelled by random values added to an image; speckle noise (or more simply just speckle) can be modelled by random values multiplied by pixel values, hence it is also called multiplicative noise. Speckle noise is a major problem in some radar applications. As above, imnoise can do 7.2. TYPES OF NOISE 97 >> t_spk=imnoise(t,’speckle’); and the result is shown in figure 7.2(b). In Matlab, speckle noise is implemented as    where is the image matrix, and  consists of normally distributed values with mean 0. An optional parameter gives the variance of ; its default value is  . (a) Gaussian noise (b) Speckle noise Figure 7.2: The twins image corrupted by Gaussian and speckle noise Although Gaussian noise and speckle noise appear superficially similar, they are formed by two totally different methods, and, as we shall see, require different approaches for their removal. Periodic noise If the image signal is subject to a periodic, rather than a random disturbance, we might obtain an image corrupted by periodic noise. The effect is of bars over the image. The function imnoise does not have a periodic option, but it is quite easy to create our own, by adding a periodic matrix (using a trigonometric function), to our image: >> s=size(t); >> [x,y]=meshgrid(1:s(1),1:s(2)); >> p=sin(x/3+y/5)+1; >> t_pn=(im2double(t)+p/2)/2; and the resulting image is shown in figure 7.3. Salt and pepper noise, Gaussian noise and speckle noise can all be cleaned by using spatial filtering techniques. Periodic noise, however, requires image transforms for best results, and so we will leave the discussion on cleaning up periodic noise until a later chap 98 CHAPTER 7. NOISE Figure 7.3: The twins image corrupted by periodic noise 7.3 Cleaning salt and pepper noise Low pass filtering Given that pixels corrupted by salt and pepper noise are high frequency components of an image, we should expect a low-pass filter should reduce them. So we might try filtering with an average filter: >> a3=fspecial(’average’); >> t_sp_a3=filter2(a3,t_sp); and the result is shown in figure 7.4(a). Notice, however, that the noise is not so much removed as “smeared” over the image; the result is not noticeably “better” than the noisy image. The effect is even more pronounced if we use a larger averaging filter: >> a7=fspecial(’average’,[7,7]); >> t_sp_a7=filter2(a7,t_sp); and the result is shown in figure 7.4(b). Median filtering Median filtering seems almost tailor-made for removal of salt and pepper noise. Recall that the median of a set is the middle value when they are sorted. If there are an even number of values, the median is the mean of the middle two. A median filter is an example of a non-linear spatial filter; using a   mask, the output value is the median of the values in the mask. For example:                    60          We see that very large or very small values—noisy values—will end up at the top or bottom of the sorted list. Thus the median will in general replace a noisy value with one closer to its surro 7.3. CLEANING SALT AND PEPPER NOISE 99 (a)    averaging (b)    averaging Figure 7.4: Attempting to clean salt & pepper noise with average filtering In Matlab, median filtering is implemented by the medfilt2 function: >> t_sp_m3=medfilt2(t_sp); and the result is shown in figure 7.5. The result is a vast improvement on using averaging filters. As Figure 7.5: Cleaning salt and pepper noise with a median filter with most functions, medfilt2 takes an optional parameter; in this case a 2 element vector giving the size of the mask to be used. If we corrupt more pixels with noise: >> t_sp2=imnoise(t,’salt & pepper’,0.2); then medfilt2 still does a remarkably good job, as shown in figure 7.6. To remove noise completely, 100 CHAPTER 7. NOISE (a) 20% salt & pepper noise (b) After median fitering Figure 7.6: Using a  median filter on more noise we can either try a second application of the    median filter, the result of which is shown in figure 7.7(a) or try a    median filter on the original noisy image: >> t_sp2_m5=medfilt2(t_sp2,[5,5]); the result of which is shown in figure 7.7(b). (a) Using medfilt2 twice (b) using a   median filter Figure 7.7: Cleaning 20% salt & pepper noise with median filtering Rank-order filtering Median filtering is a special case of a more general process called rank-order filtering. Rather than take the median of a set, we order the set and take the -th value, for some predetermined value o 7.3. CLEANING SALT AND PEPPER NOISE 101 Thus median filtering using a    mask is equivalent to rank-order filtering with . Similarly, median filtering using a    mask is equivalent to rank-order filtering with  . Matlab implements rank-order filtering with the ordfilt2 function; in fact the procedure for medfilt2 is really just a wrapper for a procedure which calls ordfilt2. There is only one reason for using rank-order filtering instead of median filtering, and that is that it allows us to choose the median of non-rectangular masks. For example, if we decided to use as a mask a    cross shape: then the median would be the third of these values when sorted. The command to do this is >> ordfilt2(t_sp,3,[0 1 0;1 1 1;0 1 0]); In general, the second argument of ordfilt2 gives the value of the ordered set to take, and the third element gives the domain; the non-zero values of which specify the mask. If we wish to use a cross with size and width 5 (so containing nine elements), we can use: >> ordfilt2(t_sp,5,[0 0 1 0 0;0 0 1 0 0;1 1 1 1 1;0 0 1 0 0;0 0 1 0 0]) An outlier method Applying the median filter can in general be a slow operation: each pixel requires the sorting of at least nine values1 . To overcome this difficulty, Pratt [16] has proposed the use of cleaning salt and pepper noise by treating noisy pixels as outliers; that is, pixels whose grey values are significantly different from those of their neighbours. This leads to the following approach for noise cleaning: 1. Choose a threshold value . 2. For a given pixel, compare its value with the mean  of the values of its eight neighbours. 3. If    , then classify the pixel as noisy, otherwise not. 4. If the pixel is noisy, replace its value with ; otherwise leave its value unchanged. There is no Matlab function for doing this, but it is very easy to write one. First, we can calculate the average of a pixel’s eight neighbours by convolving with the linear filter                                        We can then produce a matrix consisting of 1’s at only those places where the difference of the original and the filter are greater than ; that is, where pixels are noisy. Then   will consist of ones at only those places where pixels are not noisy. Multiplying by the filter replaces noisy values with averages; multiplying   with original values gives the rest of the output. 1 In fact, this is not the case with Matlab, which uses a highly optimized method. Nonetheless, we introduce a different method to show that there are other ways of clean 102 CHAPTER 7. NOISE A Matlab function for implementing this is shown in figure 7.8. An immediate problem with the outlier method is that is it not completely automatic—the threshold must be chosen. An appropriate way to use the outlier method is to apply it with several different thresholds, and choose the value which provides the best results. Suppose we attempt to use the outlier method to clean function res=outlier(im,d) % OUTLIER(IMAGE,D) removes salt and pepper noise using an outlier method. % This is done by using the following algorithm: % % For each pixel in the image, if the difference between its grey value % and the average of its eight neighbours is greater than D, it is % classified as noisy, and its grey value is changed to that of the % average of its neighbours. % % IMAGE can be of type UINT8 or DOUBLE; the output is of type % UINT8. The threshold value D must be chosen to be between 0 and 1. f=[0.125 0.125 0.125; 0.125 0 0.125; 0.125 0.125 0.125]; imd=im2double(im); imf=filter2(f,imd); r=abs(imd-imf)-d>0; res=im2uint8(r.*imf+(1-r).*imd); Figure 7.8: A Matlab function for cleaning salt and pepper noise using an outlier method the noise from figure 7.1(b); that is, the twins image with 10% salt and pepper noise. Choosing  gives the image in figure 7.9(a). This is not as good a result as using a median filter: the affect of the noise has been lessened, but there are still noise “artifacts” over the image. In this case we have chosen a threshold which is too small. If we choose  , we obtain the image in figure 7.9(b), which still has smoe noise artifacts, although in different places. We can see that a lower values of tends to remove noise from dark areas, and a higher value of tends to remove noise from light areas. A mid-way valaue, round about   does in fact produce an acceptable result, although not quite as good as median filtering. Clearly using an appropriate value of is essential for cleaning salt and pepper noise by this method. If is too small, then too many “non-noisy” pixels will be classified as noisy, and their values changed to the average of their neighbours. This will result in a blurring effect, similar to that obtained by using an averaging filter. If is chosen to be too large, then not enough noisy pixels will be classified as noisy, and there will be little change in the output. The outlier method is not particularly suitable for cleaning large amounts of noise; for such situations the median filter is to be preferred. The outlier method may thus be considered as a “quick and dirty” method for cleaning salt and pepper noise when the median filter proves too slow. 7.4 Cleaning Gaussian noise Image averaging It may sometimes happen that instead of just one image corrupted with Gaussian noise, we have many different copies of it. An example is satellite imaging; if a satellite passes over the same spot many times, we will obtain many different images of the same place. Anoth 7.4. CLEANING GAUSSIAN NOISE 103 (a)  (b)  Figure 7.9: Applying the outlier method to 10% salt and pepper noise microscopy: we might take many different images of the same object. In such a case a very simple approach to cleaning Gaussian noise is to simply take the average—the mean—of all the images. T To see why this works, suppose we have 100 copies of our image, each with noise; then the  -th noisy image will be:   where  is the matrix of original values, and  is a matrix of normally distributed random values with mean 0. We can find the mean  of these images by the usual add and divide method:    0   2      0   2    0   2     0   2  Since  is normally distributed with mean 0, it can be readily shown that the mean of all the  ’s will be close to zero—the greater the number of  ’s; the closer to zero. Thus   and the approximation is closer for larger number of images   . We can demonstrate this with the twins image. We first need to create different versions with Gaussian noise, and then take the average of them. We shall create 10 versions. One way is to create an empty three-dimensional array of depth 10, and fill each “level” with a noisy image: >> s=size(t); >> t_ga10=zeros(s(1),s(2),10); >> for i=1:10 t_ga10(:,:,i)=imno 104 CHAPTER 7. NOISE Note here that the “gaussian” option of imnoise calls the random number generator randn, which creates normally distributed random numbers. Each time randn is called, it creates a different sequence of numbers. So we may be sure that all levels in our three-dimensional array do indeed contain different images. Now we can take the average: >> t_ga10_av=mean(t_ga10,3); The optional parameter 3 here indicates that we are taking the mean along the third dimension of our array. The result is shown in figure 7.10(a). This is not quite clear, but is a vast improvement on the noisy image of figure 7.2(a). An even better result is obtained by taking the average of 100 images; this can be done by replacing 10 with 100 in the commands above, and the result is shown in figure 7.10(b). Note that this method only works if the Gaussian noise has mean 0. (a) 10 images (b) 100 images Figure 7.10: Image averaging to remove Gaussian noise Average filtering If the Gaussian noise has mean 0, then we would expect that an average filter would average the noise to 0. The larger the size of the filter mask, the closer to zero. Unfortunately, averaging tends to blur an image, as we have seen in chapter 6. However, if we are prepared to trade off blurring for noise reduction, then we can reduce noise significantly by this method. Suppose we take the    and    averaging filters, and apply them to the noisy image t_ga. >> a3=fspecial(’average’); >> a5=fspecial(’average’,[5,5]); >> tg3=filter2(a3,t_ga); >> tg5=filter2(a5,t_ga); The results are shown in figure 7.11. The results are not really particularly pleasing; although there has been some noise reduction, the “smeary” nature of the resulting images is unattractive. 7.4. CLEANING GAUSSIAN NOISE 105 (a)   averaging (b)  averaging Figure 7.11: Using averaging filtering to remove Gaussian noise Wiener filtering Before we describe this method, we shall discuss a more general question: given a degraded image  of some original image  and a restored version  , what measure can we use to say whether our restoration has done a good job? Clearly we would like  to be as close as possible to the “correct” image . One way of measuring the closeness of  to  is by adding the squares of all differences: 0     where the sum is taken over all pixels of  and  (which we assume to be of the same size). This sum can be taken as a measure of the closeness of  to . If we can minimize this value, we may be sure that our procedure has done as good a job as possible. Filters which operate on this principle of least squares are called Wiener filters. They come in many guises; we shall look at the particular filter which is designed to reduce Gaussian noise. This filter is a (non-linear) spatial filter; we move a mask across the noisy image, pixel by pixel, and as we move, we create an output image the grey values of whose pixels are based on the values under the mask. Since we are dealing with additive noise, our noisy image  can be written as    where  is the original correct image, and  is the noise; which we assume to be normally distributed with mean 0. However, within our mask, the mean may not be zero; suppose the mean is  , and the variance in the mask is  . Suppose also that the variance of the noise over the entire image is known to be  . Then the output value can be calculated as         where is the current value of the pixel in the noisy image. See Lim [13] for details. In practice, we calculate  by simply taking the mean of all grey values under the mask, and  by 106 CHAPTER 7. NOISE the variance of all grey values under the mask. We may not necessarily know the value  , so the Matlab function wiener2 which implements Wiener filtering uses a slight variant of the above equation:             where is the computed noise variance, and is calculated by taking the mean of all values of  over the entire image. This can be very efficiently calculated in Matlab. Suppose we take the noisy image shown in figure 7.2(a), and attempt to clean this image with Wiener filtering. We will use the wiener2 function, which can take an optional parameter indicating the size of the mask to be used. The default size is   . We shall create four images: >> t1=wiener2(t_ga); >> t2=wiener2(t_ga,[5,5]); >> t3=wiener2(t_ga,[7,7]); >> t4=wiener2(t_ga,[9,9]); and these are shown in figure 7.12. Being a low pass filter, Wiener filtering does tend to blur edges and high frequency components of the image. But it does a far better job than using a low pass blurring filter. We can achieve very good results for noise where the variance is not as high as that in our current image. >> t2=imnoise(t,’gaussian’,0,0.005); >> imshow(t2) >> t2w=wiener2(t2,[7,7]); >> figure,imshow(t2w) The image and its appearance after Wiener filtering as shown in figure 7.13. The result is a great improvement over the original noisy image. Exercises 1. The arrays below represent small greyscale images. Compute the  image that would result in each case if the middle   pixels were transformed using a    median filter:                                                                                           2. Using the same images as in question 1, transform them by using a   averaging filter. 3. Use the outlier method to find noisy pixels in each of the images given in question 1. What are the reasonable values to use for the difference between the grey value of 7.4. CLEANING GAUSSIAN NOISE 107 (a)    filtering (b)   filtering (a)   filtering (b)  filtering Figure 7.12: Examples of Wiener filtering to remove Gaussian noi 108 CHAPTER 7. NOISE Figure 7.13: Using Wiener filtering to remove Gaussian noise with low variance 4. Pratt [16] has proposed a “pseudo-median” filter, in order to overcome some of the speed disadvantages of the median filter. For example, given a five element sequence   , its pseudo-median is defined as psmed                              So for a sequence of length 5, we take the maxima and minima of all subsequences of length three. In general, for an odd-length sequence of length  , we take the maxima and minima of all subsequences of length  . We can apply the pseudo-median to    neighbourhoods of an image, or cross-shaped neighbourhoods containing 5 pixels, or any other neighbourhood with an odd number of pixels. Apply the pseudo-median to the images in question 1, using    neighbourhoods of each pixel. 5. Write a Matlab function to implement the pseudo-median, and apply it to the images above with the nlfilter function. Does it produce a good result? 6. Produce a grey subimage of the colour image flowers.tif by >> f=imread(’flowers.tif’); >> fg=rgb2gray(f); >> f=im2uint8(f(30:285,60:315)); Add 5% salt & pepper noise to the image. Attempt to remove the noise with (a) average filtering, (b) median filteri 7.4. CLEANING GAUSSIAN NOISE 109 (d) pseudo-median filtering. Which method gives the best results? 7. Repeat the above question but with 10%, and then with 20% noise. 8. For 20% noise, compare the results with a    median filter, and two applications of a    median filter. 9. Add Gaussian noise to the greyscale flowers image with the following parameters: (a) mean 0, variance   (the default), (b) mean 0, variance  , (c) mean 0, variance  , (d) mean 0, variance   . In each case, attempt to remove the noise with average filtering and with Wiener filtering. Can you produce satisfactory results with the last two noisy 110 CHAPTER 7. NOISE Chapter 8 Edges 8.1 Introduction Edges contain some of the most useful information in an image. We may use edges to measure the size of objects in an image; to isolate particular objects from their background; to recognize or classify objects. There are a large number of edge-finding algorithms in existence, and we shall look at some of the more straightforward of them. The general Matlab command for finding edges is edge(image,’method’,parameters. . . ) where the parameters available depend on the method used. In this chapter, we shall show how to create edge images using basic filtering methods, and discuss the Matlab edge function. An edge may be loosely defined as a line of pixels showing an observable difference. For example, consider the two blocks of pixels shown in figure 8.1. 51 52 53 59 54 52 53 62 50 52 53 68 55 52 53 55 50 53 150 160 51 53 150 170 52 53 151 190 51 53 152 155 Figure 8.1: Blocks of pixels In the right hand block, there is a clear difference between the grey values in the second and third columns. This would be easily discernable in an image—the human eye can pick out grey differences of this magnitude with relative ease. Our aim is to develop methods which will enable us to pick out the edges of an image. 8.2 Differences and edges 8.2.1 Fundamental definitions Suppose we follow the grey values of pixels in a line crossing an edge, as illustrated in figure 8.2. If we consider the grey values along this line, and plot their values, we will have something similar to that shown in figure 8.3 (a) or (b). If we now plot the differences between each grey value and its predecessor from the ramp edge, we would obtain a graph similar to that shown in figure 8.4. 111 112 CHAPTER 8. EDGES Figure 8.2: A line crossing an edge   (a) A “step” edge    (b) A “ramp” edge    (c) A line    (d) A “roof” Figure 8.3: Grey values across edges    Figure 8.4: Differences of the e 8.2. DIFFERENCES AND EDGES 113 To see where this graph comes from, suppose that the values of the “ramp” edge in figure 8.3(b) are, from left to right:        If we form the differences, by subtracting each value from its successor, we obtain: and it is these values which are plotted in figure 8.4. It appears that the difference tends to enhance edges, and reduce other components. So if we could “difference” the image, we would obtain the effect we want. We can define the difference in three separate ways: the forward difference:               , the backward difference:                , the central difference:                 . However, an image is a function of two variables, so we can generalize these definitions to include both the  and  values:                                                                                                               where the subscripts in each case indicate the direction of the difference. 8.2.2 Some difference filters To see how we might use  to determine edges in the  direction, consider the function values around a point    (and using the convention that  values increase to the right,  values to the bottom):                                                                To find the filter which returns the value  , we just compare the coefficients of the function’s values in  with their position in the array:       This filter thus will find vertical edges in an image and produce a reasonably bright result. However, the edges in the result can be a bit “jerky”; this can be overcome by smoothing the result in the opposite directio 114 CHAPTER 8. EDGES Both filters can be applied at once, using the combined filter:              This filter, and its companion for finding horizontal edges:             are the Prewitt filters for edge detection. We are now in the position of having to apply two filters to an image. The trick here is to apply each filter independently, and form the output image from a function of the filter values produced. So if  and were the grey values produced by applying  and to an image, then the output grey value can be chosen by any of these methods: 1.       , 2.     , 3.    . For example, let us take the image of the integrated circuit shown in figure 8.5, which can be read into Matlab with >> ic=imread(’ic.tif’); Figure 8.5: An integrated circuit Applying each of  and individually provides the results shown in figure 8.6 Figure 8.6(a) was produced with the foll 8.2. DIFFERENCES AND EDGES 115 (a) (b) Figure 8.6: The circuit after filtering with the Prewitt filters >> px=[-1 0 1;-1 0 1;-1 0 1]; >> icx=filter2(px,ic); >> figure,imshow(icx/255) and figure 8.6(b) with >> py=px’; >> icy=filter2(py,ic); >> figure,imshow(icy/255) Note that the filter  highlights vertical edges, and horizontal edges. We can create a figure containing all the edges with: >> edge_p=sqrt(icx.^2+icy.^2); >> figure,imshow(edge_p/255) and the result is shown in figure 8.7(a). This is a grey-scale image; a binary image containing edges only can be produced by thresholding. Figure 8.7(b) shows the result after the command >> edge_t=im2bw(edge_p/255,0.3); We can obtain edges by the Prewitt filters directly by using the command >> edge_p=edge(ic,’prewitt’); and the edge function takes care of all the filtering, and of choosing a suitable threshold level; see its help text for more information. The result is shown in figure 8.8. Note that figures 8.7(b) and 8.8 seem different to each other. This is because the edge function does some extra processing over and above taking the square root of the sum of the squares of the filter 116 CHAPTER 8. EDGES (a) (b) Figure 8.7: All the edges of the circuit Figure 8.8: The prewitt option of edge 8.2. DIFFERENCES AND EDGES 117 Slightly different edge finding filters are the Roberts cross-gradient filters:       and       and the Sobel filters:           and           The Sobel filters are similar to the Prewitt filters, in that they apply a smoothing filter in the opposite direction to the central difference filter. In the Sobel filters, the smoothing takes the form   which gives slightly more prominence to the central pixel. Figure 8.9 shows the respective results of the Matlab commands >> edge_r=edge(ic,’roberts’); >> figure,imshow(edge_r) and >> edge_s=edge(ic,’sobel’); >> figure,imshow(edge_s) (a) Roberts edge detection (b) Sobel edge detection Figure 8.9: Results of the Roberts and Sobel filters The appearance of each of these can be changed by specifying a threshold level. Of the three filters, the Sobel filters are probably the best; they provide good edges, and they perform reasonably well 118 CHAPTER 8. EDGES 8.3 Second differences 8.3.1 The Laplacian Another class of edge-detection method is obtained by considering the difference of differences; these are called second differences. To calculate a (central) second difference, take the backward difference of a forward difference:                                                                    This can be implemented by the filter        The corresponding filter for second differences  in the  direction is        The sum of these two is written    and is implemented by the filter          This is known as a discrete Laplacian. To see how the second difference affects an edge, take the difference of the pixel values as plotted in figure 8.4; the results are shown in figure 8.10.    Figure 8 8.3. SECOND DIFFERENCES 119 We see that the Laplacian (after taking an absolute value, or squaring) gives double edges. It is also extremely sensitive to noise. However, the Laplacian does have the advantage of detecting edges in all directions equally well. To see an example, suppose we enter the Matlab commands: >> l=fspecial(’laplacian’,0); >> ic_l=filter2(l,ic); >> figure,imshow(mat2gray(ic_l)) the result of which is shown in figure 8.11. Figure 8.11: Result after filtering with a discrete laplacian Although the result is adequate, it is very messy when compared to the results of the Prewitt and Sobel methods discussed earlier. Other Laplacian masks can be used; some are:             and             In Matlab, Laplacians of all sorts can be generated using the fspecial function, in the form fspecial(’laplacian’,ALPHA) which produces the Laplacian                If the parameter ALPHA (which is optional) is omitted, it is assumed to be  . The value gives the Laplacian de 120 CHAPTER 8. EDGES 8.3.2 Zero crossings A more appropriate use for the Laplacian is to find the position of edges by locating zero crossings. If we look at figure 8.10, we see that the position of the edge is given by the place where the value of the filter takes on a zero value. In general, these are places where the result of the filter changes sign. For example, consider the the simple image given in figure 8.12(a), and the result after filtering with a Laplacian mask in figure 8.12(b).                                                                                                                                                                                                                                                            (a) A simple image (b) After laplace filtering Figure 8.12: Locating zero crossings in an image We define the zero crossings in such a filtered image to be pixels which satisfy either of the following: 1. they have a negative grey value and are next to (by four-adjacency) a pixel whose grey value is positive, 2. they have a value of zero, and are between negative and positive valued pixels. To give an indication of the way zero-crossings work, look at the edge plots and their second differences in figure 8.13. In each case the zero-crossing is circled. The important point is to note that across any edge there can be only one zero-crossing. Thus an image formed from zero-crossings has the potential to be very neat. In figure 8.12(b) the zero crossings are shaded. We now have a further method of edge detection: take the zero-crossings after a laplace filtering. This is implemented in Matlab with the zerocross option of edge, which takes the zero crossings after filtering with a given filter: >> l=fspecial(’laplace’,0); >> icz=edge(ic,’zerocross’,l); >> imshow(icz) The result is shown in figure 8.14(a). We see that this is not in fact a very good result—far too many grey level changes have been interpreted as edges by this method. To eliminate them, we may fir 8.3. SECOND DIFFERENCES 121   A “step” edge    A “ramp” edge     Its second differences      Its second differences Figure 8.13: Edges and second differences 1. smooth the image with a Gaussian filter, 2. convolve the result with a laplacian, 3. find the zero crossings. This method was designed to provide a edge detection method to be as close as possible to biological vision. The first two steps can be combined into one, to produce a “Laplacian of Gaussian” or “LoG” filter. These filters can be created with the fspecial function. If no extra parameters are provided to the zerocross edge option, then the filter is chosen to be the LoG filter found by >> fspecial(’log’,13,2) This means that the following command: >> edge(ic,’log’); produces exactly the same result as the commands: >> log=fspecial(’log’,13,2); >> edge(ic,’zerocross’,log); In fact the LoG and zerocross options implement the same edge finding method; the difference being that the zerocross option allows you to specify your own filter. The result after applying an LoG filter and finding its zero crossings is given in fig 122 CHAPTER 8. EDGES (a) Zeros crossings (b) Using an LoG filter first Figure 8.14: Edge detection using zero crossings 8.4 Edge enhancement So far we have seen how to isolate edges in an image. A related operation is to make edges in an image slightly sharper and crisper, which generally results in an image more pleasing to the human eye. The operation is variously called “edge enhancement”, “edge crispening”, or “unsharp masking”. This last term comes from the printing industry. Unsharp masking The idea of unsharp masking is to subtract a scaled “unsharp” version of the image from the original. In practice, we can achieve this affect by subtracting a scaled blurred image from the original. The schema for unsharp masking is shown in figure 8.15. Original Blur with low pass filter Scale with   Subtract Scale for display Figure 8.15: Schema for unsharp masking Suppose we have an image x of type uint8. The we can apply unsharp masking by the following sequence of commands: >> f=fspecial(’average’); >> xf=filter2(f,x); >> xu=double(x)-xf/1. 8.4. EDGE ENHANCEMENT 123 >> imshow(xu/70) The last command scales the result so that imshow displays an appropriate image; the value may need to be adjusted according to the input image. Suppose that x is the image shown in figure 8.16(a), then the result of unsharp masking is given in figure 8.16(b). The result appears to be a better image than the original; the edges are crisper and more clearly defined. (a) Original image (b) The image after unsharp masking Figure 8.16: An example of unsharp masking To see why this works, we may consider the function of grey values as we travel across an edge, as shown in figure 8.17. As a scaled blur is subtracted from the original, the result is that the edge is enhanced, as shown in graph (c) of figure 8.17. We can in fact perform the filtering and subtracting operation in one command, using the linearity of the filter, and that the    filter     is the “identity filter”. Hence unsharp masking can be implemented by a filter of the form                    where is a constant chosen to provide the best result. Alternatively, the unsharp masking filter may be defined as                   so that we are in effect subtracting a blur from a scaled version of the original; the scaling fac 124 CHAPTER 8. EDGES (a) Pixel values over an edge (b) The edge blurred (c) (a)  (b) Figure 8.17: Unsharp maskin 8.4. EDGE ENHANCEMENT 125 The unsharp option of fspecial produces such filters; the filter created has the form                   where is an optional parameter which defaults to 0.2. If   the filter is                                          Figure 8.18 was created using the Matlab commands >> p=imread(’pelicans.tif’); >> u=fspecial(’unsharp’,0.5); >> pu=filter2(u,p); >> imshow(p),figure,imshow(pu/255) Figure 8.18(b), appears much sharper and “cleaner” than the original. Notice in particular the rocks and trees in the background, and the ripples on the water. (a) The original (b) After unsharp masking Figure 8.18: Edge enhancement with unsharp masking Although we have used averaging filters above, we can in fact use any low pass filter for unsharp masking. High boost filtering Allied to unsharp masking filters are the high boost filters, which are obtained by hi 126 CHAPTER 8. EDGES where is an “amplification factor”. If  , then the high boost filter becomes an ordinary high pass filter. If we take as the low pass filter the    averaging filter, then a high boost filter will have the form                     where  . If we put   , we obtain a filtering very similar to the unsharp filter above, except for a scaling factor. Thus the commands: >> f=[-1 -1 -1;-1 11 -1;-1 -1 -1]/9; >> xf=filter2(x,f); >> imshow(xf/80) will produce an image similar to that in figure 8.16. The value 80 was obtained by trial and error to produce an image with similar intensity to the original. We can also write the high boost formula above as high boost  original    low pass   original     original    high pass        original   high pass   Best results for high boost filtering are obtained if we multiply the equation by a factor so that the filter values sum to 1; this requires   or     So a general unsharp masking formula is    original       low pass   Another version of this formula is    original        low pass  where for best results is taken so that        If we take  , the formula becomes          original                low pass   original    low pass  If we take   we obtain   original     low pass Using the identity and averaging fi 8.4. EDGE ENHANCEMENT 127 >> id=[0 0 0;0 1 0;0 0 0]; >> f=fspecial(’average’); >> hb1=3*id-2*f hb1 = -0.2222 -0.2222 -0.2222 -0.2222 2.7778 -0.2222 -0.2222 -0.2222 -0.2222 >> hb2=1.25*id-0.25*f hb2 = -0.0278 -0.0278 -0.0278 -0.0278 1.2222 -0.0278 -0.0278 -0.0278 -0.0278 If each of the filters hb1 and hb2 are applied to an image with filter2, the result will have enhanced edges. The images in figure 8.19 show these results; figure 8.19(a) was obtained with >> x1=filter2(hb1,x); >> imshow(x1/255) and figure 8.19(b) similarly. (a) High boost filtering with hb1 (b) High boost filtering with hb2 Figure 8.19: High boost filtering Of the two filters, hb1 appears to produce the best result; hb2 produces an image not very much crisper than the original. 128 CHAPTER 8. EDGES 8.5 Final Remarks As we have seen there are a great many different edge detection algorithms; we have only looked at those which are implemented in the edge function of the Matlab image Processing Toolbox. There are, however, a vast number of further algorithms and methods in existence. Most of them can be programmed as Matlab programs with little effort. As to which method is the best; like so many image processing tasks, this is highly subjective. The choice of an suitable edge detector will depend very much on the nature of the image, the amount (and type) of noise, and the use for which the edges are to be put. Exercises 1. Enter the following matrix into Matlab: 201 195 203 203 199 200 204 190 198 203 201 204 209 197 210 202 205 195 202 199 205 198 46 60 53 37 50 51 194 205 208 203 54 50 51 50 55 48 193 194 200 193 50 56 42 53 55 49 196 211 200 198 203 49 51 60 51 205 207 198 205 196 202 53 52 34 46 202 199 193 199 202 194 47 51 55 48 191 190 197 194 206 198 212 195 196 204 204 199 200 201 189 203 200 191 196 207 203 193 204 and use imfilter to apply each of the Roberts, Prewitt, Sobel, Laplacian, and zero-crossing edge-finding methods to the image. In the case of applying two filters (such as with Roberts, Prewitt, or Sobel) apply each filter separately, and join the results. Apply thresholding if necessary to obtain a binary image showing only the edges. Which method seems to produce the best results? 2. Now with the same matrix as above, use the edge function with all possible parameters. Which method seems to produce the best results? 3. Open up the image cameraman.tif in Matlab, and apply each of the following edge finding techniques in turn: (a) Roberts (b) Prewitt (c) Sobel (d) Laplacian (e) Zero-crossings of a laplacian (f) the Marr-Hildreth method Which seems to you to provide the best looking result? 4. Repeat the above exercise, but use the image tire.tif. 8.5. FINAL REMARKS 129 5. Obtain a grey-scale flower image with: fl=imread(’flowers.tif’); f=im2uint8(rgb2gray(fl)); Now repeat question 3. 6. Pick a grey-scale image, and add some noise to it; say with c=imread(’cameraman.tif’); c1=imnoise(c,’salt & pepper’,0.1); c2=imnoise(c,’gaussian’,0,0.02); Now apply the edge finding techniques to each of the “noisy” images c1 and c2. Which technique seems to give (a) the best results in the presence of noise? (b) the worst results in the presence of noise? 130 CHAPTER 8. EDGES Chapter 9 The Fourier Transform 9.1 Introduction The Fourier Transform is of fundamental importance to image processing. It allows us to perform tasks which would be impossible to perform any other way; its efficiency allows us to perform other tasks more quickly. The Fourier Transform provides, among other things, a powerful alternative to linear spatial filtering; it is more efficient to use the Fourier transform than a spatial filter for a large filter. The Fourier Transform also allows us to isolate and process particular image “frequencies”, and so perform low-pass and high-pass filtering with a great degree of precision. Before we discuss the Fourier transform of images, we shall investigate the one-dimensional Fourier transform, and a few of its properties. 9.2 The one-dimensional discrete Fourier transform Our starting place is the observation that a periodic function may be written as the sum of sines and cosines of varying amplitudes and frequencies. For example, in figure 9.1 we show a function, and its decomposition into sine functions. Some functions will require only a finite number of functions in their decomposition; others will require an infinite number. For example, a “square wave”, such as is shown in figure 9.2, has the decomposition                       (9.1) In figure 9.2 we take the first four terms only to provide the approximation. The more terms of the series we take, the closer the sum will approach the original function. When we deal with a discrete function, as we shall do for images, the situation changes slightly. Since we only have to obtain a finite number of values, we only need a finite number of functions to do it. Consider for example the discrete sequence             which we may take as a discrete approximation to the square wave of figure 9.2. This can be expressed as the sum of only two sine functions; this is shown in figure 9.3. We shall see below how to obtain those sequenc 132 CHAPTER 9. THE FOURIER TRANSFORM                         Figure 9.1: A function and its trigonometric decomposition                   Figure 9.2: A square wave and its trigo 9.2. THE ONE-DIMENSIONAL DISCRETE FOURIER TRANSFORM 133 Figure 9.3: Expressing a discrete function as the sum of sines 134 CHAPTER 9. THE FOURIER TRANSFORM The Fourier transform allows us to obtain those individual sine waves which compose a given function or sequence. Since we shall bne concerend with discrete sequences, and of course images, we shall investigate only the discrete Fourier transform, abbreviated DFT. 9.2.1 Definition of the one dimensional DFT Suppose          is a sequence of length . We define its discrete Fourier transform to be the sequence         where    0 2    #     (9.2) The inverse DFT The formula for the inverse DFT is very similar to the forward transform:  0 2   #     (9.3) If you compare this equation with equation 9.2 you will see that there are really only two differences: 1. there is no scaling factor , 2. the sign inside the exponential function has been changed to positive. In Matlab, we can calculate the forward and inverse transforms with fft and ifft. Here fft stands for Fast Fourier Transform, which is a fast and efficient method of performing the DFT (see below for details). For example: a = 1 2 3 4 5 6 >> fft(a’) ans = 21.0000 -3.0000 + 5.1962i -3.0000 + 1.7321i -3.0000 -3.0000 - 1.7321i -3.0000 - 5.1962i We note that to apply a DFT to a single vector in Matlab, we should use a column 9.3. PROPERTIES OF THE ONE-DIMENSIONAL DFT 135 9.3 Properties of the one-dimensional DFT The one-dimensional DFT satisfies many useful and important properties. We will investigate some of them here. A more complete list can be found in, for example [9]. Linearity. This is a direct consequence of the definition of the DFT as a matrix product. Suppose and  are two vectors of equal length, and and are scalars, with . If ,  and  are the DFT’s of ,  and respectively, we have     This follows from the definitions of      and the linearity of the matrix product. Shifting. Suppose we multiply each element  of a vector  by      . In other words, we change the sign of every second element. Let the resulting vector be denoted  . The the DFT  of  is equal to the DFT  of  with the swapping of the left and right halves. Let’s do a quick Matlab example: >> x = [2 3 4 5 6 7 8 1]; >> x1=(-1).^[0:7].*x x1 = 2 -3 4 -5 6 -7 8 -1 >> X=fft(x’) 36.0000 -9.6569 + 4.0000i -4.0000 - 4.0000i 1.6569 - 4.0000i 4.0000 1.6569 + 4.0000i -4.0000 + 4.0000i -9.6569 - 4.0000i >> X1=fft(x1’) X1 = 4.0000 1.6569 + 4.0000i -4.0000 + 4.0000i -9.65 136 CHAPTER 9. THE FOURIER TRANSFORM 36.0000 -9.6569 + 4.0000i -4.0000 - 4.0000i 1.6569 - 4.0000i Notice that the first four elements of X are the last four elements of X1, and vice versa. Conjugate symmetry If  is real, and of length , then its DFT  satisfies the condition that    where   is the complex conjugate of   , for all         . So in our example of length 8, we have    In this case we also have   , which means  must be real. In fact if  is even, then    will be real. Examples can be seen above. The Fast Fourier Transform. Without an efficient method of calculating a DFT, it would remain only of academic interest, and of no practical use. However, there are a number of extremely fast and efficient algorithms for computing a DFT; such an algorithm is called a fast Fourier transform, or FFT. The use of an FFT vastly reduces the time needed to compute a DFT. One FFT method works recursively by dividing the original vector into two halves, computing the FFT of each half, and then putting the results together. This means that the FFT is most efficient when the vector length is a power of 2. Table 9.1 shows that advantage gained by using the FFT algorithm as opposed to the direct arithmetic definition of equations 9.6 and 9.7 by comparing the number of multiplications required for each method. For a vector of length  , the direct method takes      multiplications; the FFT only  . The saving in time is thus of an order of  . Clearly the advantage of using an FFT algorithm becomes greater as the size of the vector increases. Because of the this computational advantage, any implementation of the DFT will use an FFT algorithm.  Direct arithmetic FFT Increase in speed 4 16 8 2.0 8 84 24 2.67 16 256 64 4.0 32 1024 160 6.4 64 4096 384 10.67 128 16384 896 18.3 256 65536 2048 32.0 512 262144 4608 56.9 1024 1048576 10240 102.4 Table 9.1: Compa 9.4. THE TWO-DIMENSIONAL DFT 137 9.4 The two-dimensional DFT In two dimensions, the DFT takes a matrix as input, and returns another matrix, of the same size, as output. If the original matrix values are      , where  and  are the indices, then the output matrix values are   . We call the matrix  the Fourier transform of  and write      Then the original matrix  is the inverse Fourier transform of , and we write     We have seen that a (one-dimensional) function can be written as a sum of sines and cosines. Given that an image may be considered as a two-dimensional function      , it seems reasonable to assume that  can be expressed as sums of “corrugation” functions which have the general form       A sample such function is shown in figure 9.4. And this is in fact exactly what the two-dimensional 2 4 6 8 10 12 14 2 4 6 8 10 12 14 0.5 1 1.5 2 Figure 9.4: A “corrugation” function Fourier transform does: it rewrites the original matrix in terms of sums of corrugations. We can be more precise here: the magnitude of the fourier transform is a matrix (the same size as the starting matrix) whose elements  give the height of the corrugation for which the horizontal and vertical distances between consecutive troughs are   and  . This is shown in figure 9.5. The definition of the two-dimensional discrete Fourier transform is very similar to that for one dimension. The forward and inverse transforms for an    matrix, where for notational convenience we assume that the  indices are from 0 to    and the  indices are from to    , are:    0 2  0 2         #       (9.4)        0 2  0 2    #       (9.5) These are horrendous looking formulas, but if we spend a bit of time pulling them apart, we shall see that they aren 138 CHAPTER 9. THE FOURIER TRANSFORM    Figure 9.5: Corrugations and their measurements Before we do this, we note that the formulas given in equations 9.4 and 9.5 are not used by all authors. The main change is the position of the scaling factor . Some people put it in front of the sums in the forward formula. Others put a factor of   in front of both sums. The point is the sums by themselves would produce a result (after both forward and inverse transforms) which is too large by a factor of . So somewhere in the forward-inverse formulas a corresponding  must exist; it doesn’t really matter where. 9.4.1 Some properties of the two dimensional Fourier transform All the properties of the one-dimensional DFT transfer into two dimensions. But there are some further properties not previously mentioned, which are of particular use for image processing. Similarity. First notice that the forward and inverse transforms are very similar, with the exception of the scale factor  in the inverse transform, and the negative sign in the exponent of the forward transform. This means that the same algorithm, only very slightly adjusted, can be used for both the forward an inverse transforms. The DFT as a spatial filter. Note that the values  #      are independent of the values  or . This means that they can be calculated in advance, and only then put into the formulas above. It also means that every value   is obtained by multiplying every value of     by a fixed value, and adding up all the results. But this is precisely what a linear spatial filter does: it multiplies all elements under a mask with fixed values, an 9.4. THE TWO-DIMENSIONAL DFT 139 all up. Thus we can consider the DFT as a linear spatial filter which is as big as the image. To deal with the problem of edges, we assume that the image is tiled in all directions, so that the mask always has image values to use. Separability. Notice that the Fourier transform “filter elements” can be expressed as products:  #       #    #    The first product value  #   depends only on  and , and is independent of  and . Conversely, the second product value  #   depends only on  and , and is independent of  and . This means that we can break down our formulas above to simpler formulas that work on single rows or columns:    0 2        #   (9.6)       0 2     #    (9.7) If we replace  and with  and we obtain the corresponding formulas for the DFT of matrix columns. These formulas define the one-dimensional DFT of a vector, or simply the DFT. The 2-D DFT can be calculated by using this property of “separability”; to obtain the 2-D DFT of a matrix, we first calculate the DFT of all the rows, and then calculate the DFT of all the columns of the result, as shown in figure 9.6. Since a product is independent of the order, we can equally well calculate a 2-D DFT by calculating the DFT of all the columns first, then calculating the DFT of all the rows of the result. (a) Original image (b) DFT of each row of (a) (c) DFT of each column of (b) Figure 9.6: C 140 CHAPTER 9. THE FOURIER TRANSFORM Linearity An important property of the DFT is its linearity; the DFT of a sum is equal to the sum of the individual DFT’s, and the same goes for scalar multiplication:               where is a scalar, and  and are matrices. This follows directly from the definition given in equation 9.4. This property is of great use in dealing with image degradation such as noise which can be modelled as a sum:   where  is the original image; is the noise, and  is the degraded image. Since         we may be able to remove or reduce by modifying the transform. As we shall see, some noise appears on the DFT in a way which makes it particularly easy to remove. The convolution theorem. This result provides one of the most powerful advantages of using the DFT. Suppose we wish to convolve an image  with a spatial filter . Our method has been place over each pixel of  in turn, calculate the product of all corresponding grey values of  and elements of , and add the results. The result is called the digital convolution of  and , and is denoted   This method of convolution can be very slow, especially if is large. The convolution theorem states that the result  can be obtained by the following sequence of steps: 1. Pad with zeroes so that is the same size as ; denote this padded result by . 2. Form the DFT’s of both  and , to obtain  and   . 3. Form the element-by-element product of these two transforms:      4. Take the inverse transform of the result:         Put simply, the convolution theorem states:         or equivalently that        Although this might seem like an unnecessarily clumsy and roundabout way of computing something so simple as a convolution, it can have e 9.4. THE TWO-DIMENSIONAL DFT 141 For example, suppose we wish to convolve a    image with a   filter. To do this directly would require    multiplications for each pixel, of which there are      . Thus there will be a total of         multiplications needed. Now look at applying the DFT (using an FFT algorithm). Each row requires 4608 multiplications by table 9.1; there are 512 rows, so a total of       multiplications; the same must be done again for the columns. Thus to obtain the DFT of the image requires    multiplications. We need the same amount to obtain the DFT of the filter, and for the inverse DFT. We also require    multiplications to perform the product of the two transforms. Thus the total number of multiplications needed to perform convolution using the DFT is           which is an enormous saving compared to the direct method. The DC coefficient. The value   of the DFT is called the DC coefficient. If we put in the definition given in equation 9.4 we find that    0 2  0 2          0 2  0 2        That is, this term is equal to the sum of all terms in the original matrix. Shifting. For purposes of display, it is convenient to have the DC coefficient in the centre of the matrix. This will happen if all elements      in the matrix are multiplied by      before the transform. Figure 9.7 demonstrates how the matrix is shifted by this method. In each diagram the DC coefficient is the top left hand element of submatrix , and is shown as a black square. ! " An FFT " ! After shifting Figure 9.7: Shifting a DFT Conjugate symmetry An analysis of the Fourier transform definition leads to a symmetry property; if we make the substitutions  and  in equation 9.4 then we find that         for any integers and . This means that half of the transform is a mirror image of the conjugate of the other half. We can think of the top and bottom halves, or the left and right halves, being mirror images of the conjugates of each other. Figure 9.8 demonstrates this symmetry in a shifted DFT. As with figure 9.7, the black square shows the position of the DC coefficient. The symmetry means that its information is giv 142 CHAPTER 9. THE FOURIER TRANSFORM  ! !  Figure 9.8: Conjugate symmetry in the DFT Displaying transforms. Having obtained the Fourier transform   of an image     , we would like to see what it looks like. As the elements    are complex numbers, we can’t view them directly, but we can view their magnitude     . Since these will be numbers of type double, generally with large range, we have two approaches 1. find the maximum value  of      (this will be the DC coefficient), and use imshow to view     , 2. use mat2gray to view     directly. One trouble is that the DC coefficient is generally very much larger than all other values. This has the effect of showing a transform as a single white dot surrounded by black. One way of stretching out the values is to take the logarithm of     and to display           The display of the magnitude of a Fourier transform is called the spectrum of the transform. We shall see some examples later on. 9.5 Fourier transforms in Matlab The relevant Matlab functions for us are: fft which takes the DFT of a vector, ifft which takes the inverse DFT of a vector, fft2 which takes the DFT of a matrix, ifft2 which takes the inverse DFT of a matrix, fftshift which shifts a transform as shown in figure 9.7. of which we have seen the first two above. Before attacking a few images, let’s take the Fourier transform of a few small matrices to get more of a 9.5. FOURIER TRANSFORMS IN MATLAB 143 Example 1. Suppose we take a constant matrix       . Going back to the idea of a sum of corrugations, we see that in fact no corrugations are required to form a constant. Thus we would hope that the DFT consists of a DC coefficient and zeroes everywhere else. We will use the ones function, which produces an  matrix consisting of  ’s, where is an input to the function. >> a=ones(8); >> fft2(a) The result is indeed as we expected: ans = 64 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Note that the DC coefficient is indeed the sum of all the matrix values. Example 2. Now we’ll take a matrix consisting of a single corrugation: >> a = [100 200; 100 200]; >> a = repmat(a,4,4) ans = 100 200 100 200 100 200 100 200 100 200 100 200 100 200 100 200 100 200 100 200 100 200 100 200 100 200 100 200 100 200 100 200 100 200 100 200 100 200 100 200 100 200 100 200 100 200 100 200 100 200 100 200 100 200 100 200 100 200 100 200 100 200 100 200 >> af = fft2(a) ans = 9600 0 0 0 -3200 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 144 CHAPTER 9. THE FOURIER TRANSFORM What we have here is really the sum of two matrices: a constant matrix each element of which is   , and a corrugation which alternates   and  from left to right. The constant matrix alone would produce (as in example 1), a DC coefficient alone of value      ; the corrugation a single value. By linearity, the DFT will consist of just the two values. Example 3. We will take here a single step edge: >> a = [zeros(8,4) ones(8,4)] a = 0 0 0 0 1 1 1 1 0 0 0 0 1 1 1 1 0 0 0 0 1 1 1 1 0 0 0 0 1 1 1 1 0 0 0 0 1 1 1 1 0 0 0 0 1 1 1 1 0 0 0 0 1 1 1 1 0 0 0 0 1 1 1 1 Now we shall perform the Fourier transform with a shift, to place the DC coefficient in the centre, and since it contains some complex values, for simplicity we shall just show the rounded absolute values: >> af=fftshift(fft2(a)); >> round(abs(af)) ans = 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 9 0 21 32 21 0 9 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 The DC coefficient is of course the sum of all values of a; the other values may be considered to be the coefficients of the necessary sine functions required to from an edge, as given in equation 9.1. The mirroring of values about the DC coefficient is a consequence of the symmetry of the DFT. 9.6 Fourier transforms of images We shall create a few simple images, and see what the Fourier transform produces. Example 1. We shall produce a simple image consisting of a single edge: >> a=[zeros(256,128) ones(25 9.6. FOURIER TRANSFORMS OF IMAGES 145 This is displayed on the left in figure 9.10. Now we shall take its DFT, and shift it: >> af=fftshift(fft2(a)); Now we’ll view its spectrum; we have the choice of two commands: 1. afl=log(1+abs(af)); imshow(afl/afl(129,129)) This works because after shifting, the DC coefficient is at position   ,   . We stretch the transform using log, and divide the result by the middle value to obtain matrix of type double with values in the range –  . This can then be viewed directly with imshow. 2. imshow(mat2gray(log(1+abs(af)))) The mat2gray function automatically scales a matrix for display as an image, as we have seen in chapter 6 It is in fact convenient to write a small function for viewing transforms. One such is shown in figure 9.9. Then for example >> fftshow(af,’log’) will show the logarithm of the absolute values of the transform, and >> fftshow(af,’abs’) will show the absolute values of the transform without any scaling. The result is shown on the right in figure 9.10. We see immediately that the result is similar (although larger) to example 3 in the previous section. Example 2. Now we’ll create a box, and then its Fourier transform: >> a=zeros(256,256); >> a(78:178,78:178)=1; >> imshow(a) >> af=fftshift(fft2(a)); >> figure,fftshow(af,’abs’) The box is shown on the left in figure 9.11, and its Fourier transform is is shown on the right. Example 3. Now we shall look at a box rotated  . >> [x,y]=meshgrid(1:256,1:256); >> b=(x+y<329)&(x+y>182)&(x-y>-67)&(x-y<73); >> imshow(b) >> bf=fftshift(fft2(b)); >> figure,fftshow(bf) The results are shown in figure 9.12. Note that the transform of the rotated box is the rotated transform of the ori 146 CHAPTER 9. THE FOURIER TRANSFORM function fftshow(f,type) % Usage: FFTSHOW(F,TYPE) % % Displays the fft matrix F using imshow, where TYPE must be one of % ’abs’ or ’log’. If TYPE=’abs’, then then abs(f) is displayed; if % TYPE=’log’ then log(1+abs(f)) is displayed. If TYPE is omitted, then % ’log’ is chosen as a default. % % Example: % c=imread(’cameraman.tif’); % cf=fftshift(fft2(c)); % fftshow(cf,’abs’) % if nargin<2, type=’log’; end if (type==’log’) fl = log(1+abs(f)); fm = max(fl(:)); imshow(im2uint8(fl/fm)) elseif (type==’abs’) fa=abs(f); fm=max(fa(:)); imshow(fa/fm) else error(’TYPE must be abs or log.’); end; Figure 9.9: A function to display a Fourier transform 9.6. FOURIER TRANSFORMS OF IMAGES 147 Figure 9.10: A single edge and its DFT Figure 9.11: A box and its DFT 148 CHAPTER 9. THE FOURIER TRANSFORM Figure 9.12: A rotated box and its DFT Example 4. We will create a small circle, and then transform it: >> [x,y]=meshgrid(-128:217,-128:127); >> z=sqrt(x.^2+y.^2); >> c=(z<15); The result is shown on the left in figure 9.13. Now we will create its Fourier transform and display it: >> cf=fft2shift(fft2(z)); >> fftshow(cf,’log’) and this is shown on the right in figure 9.13. Note the “ringing” in the Fourier transform. This is an artifact associated with the sharp cutoff of the circle. As we have seen from both the edge and box images in the previous examples, an edge appears in the transform as a line of values at right angles to the edge. We may consider the values on the line as being the coefficients of the appropriate corrugation functions which sum to the edge. With the circle, we have lines of values radiating out from the circle; these values appear as circles in the transform. A circle with a gentle cutoff, so that its edge appears blurred, will have a transform with no ringing. Such a circle can be made with the command (given z above): b=1./(1+(z./15).^2); This image appears as a blurred circle, and its transform is very similar—check them out! 9.7 Filtering in the frequency domain We have seen in section 9.4 that one of the reasons for the use of the Fourier transform in image processing is due to the convolution theorem: a spatial convolution can be performed by elementwise multiplication of the Fourier transform by a suitable “filter matrix”. In this section we shall explore some filtering by this method. 9.7. FILTERING IN THE FREQUENCY DOMAIN 149 Figure 9.13: A circle and its DFT 9.7.1 Ideal filtering Low pass filtering Suppose we have a Fourier transform matrix , shifted so that the DC coefficient is in the centre. Since the low frequency components are towards the centre, we can perform low pass filtering by multiplying the transform by a matrix in such a way that centre values are maintained, and values away from the centre are either removed or minimized. One way to do this is to multiply by an ideal low-pass matrix, which is a binary matrix  defined by:     if     is closer to the center than some value if     is further from the center than  The circle c displayed in figure 9.13 is just such a matrix, with  . Then the inverse Fourier transform of the element-wise product of  and  is the result we require:      Let’s see what happens if we apply this filter to an image. First we obtain an image and its DFT. >> cm=imread(’cameraman.tif’); >> cf=fftshift(fft2(cm)); >> figure,fftshow(cf,’log’) The cameraman image and its DFT are shown in figure 9.14. Now we can perform a low pass filter by multiplying the transform matrix by the circle matrix (recall that “dot asterisk” is the Matlab syntax for element-wise multiplication of two matrices): >> cfl=cf.*c; >> figure,fftshow(cfl,’log’) and this is shown in figure 9.15(a). Now we can take the inverse transform and display the r 150 CHAPTER 9. THE FOURIER TRANSFORM Figure 9.14: The “cameraman” image and its DFT >> cfli=ifft2(cfl); >> figure,fftshow(cfli,’abs’) and this is shown in figure 9.15(b). Note that even though cfli is supposedly a matrix of real numbers, we are still using fftshow to display it. This is because the fft2 and fft2 functions, being numeric, will not produce mathematically perfect results, but rather very close numeric approximations. So using fftshow with the ’abs’ option rounds out any errors obtained during the transform and its inverse. Note the “ringing” about the edges in this image. This is a direct result (a) Ideal filtering on the DFT (b) After inversion Figure 9.15: Applying ideal low pass filtering of the sharp cutoff of the circle. The ringing as shown in figure 9.13 is transferred to the image. 9.7. FILTERING IN THE FREQUENCY DOMAIN 151 We would expect that the smaller the circle, the more blurred the image, and the larger the circle; the less blurred. Figure 9.16 demonstrates this, using cutoffs of 5 and 30. Notice that ringing (a) Cutoff of 5 (b) Cutoff of 30 Figure 9.16: Ideal low pass filtering with different cutoffs is still present, and clearly visible in figure 9.16(b). High pass filtering Just as we can perform low pass filtering by keeping the centre values of the DFT and eliminating the others, so high pass filtering can be performed by the opposite: eliminating centre values and keeping the others. This can be done with a minor modification of the preceding method of low pass filtering. First we create the circle: >> [x,y]=meshgrid(-128:127,-128:127); >> z=sqrt(x.^2+y.^2); >> c=(z>15); and the multiply it by the DFT of the image: >> cfh=cf.*c; >> figure,fftshow(cfh,’log’) This is shown in figure 9.17(a). The inverse DFT can be easily produced and displayed: >> cfhi=ifft2(cfh); >> figure,fftshow(cfhi,’abs’) and this is shown in figure 9.17(b). As with low pass filtering, the size of the circle influences the information available to the inverse DFT, and hence the final result. Figure 9.18 shows some results of ideal high pass filtering with different cutoffs. If the cutoff is large, then more information is removed from the transform, leaving only the highest frequencies. We see this in figure 9.18(c) and (d); only the edges of the image remain. If we have small cutoff, such as in figure 9.18(a), we 152 CHAPTER 9. THE FOURIER TRANSFORM (a) The DFT after high pass filtering (b) The resulting image Figure 9.17: Applying an ideal high pass filter to an image are only removing a small amount of the transform. We would thus expect that only the lowest frequencies of the image would be removed. And this is indeed true, as we see in figure 9.18(b); there is some greyscale detail in the final image, but large areas of low frequency are close to zero. 9.7.2 Butterworth filtering Ideal filtering simply cuts off the Fourier transform at some distance from the centre. This is very easy to implement, as we have seen, but has the disadvantage of introducing unwanted artifacts: ringing, into the result. One way of avoiding this is to use as a filter matrix a circle with a less sharp cutoff. A popular choice is to use Butterworth filters. Before we describe these filters, we shall look again at the ideal filters. As these are radially symmetric about the centre of the transform, they can be simply described in terms of their cross sections. That is, we can describe the filter as a function of the distance  from the centre. For an ideal low pass filter, this function can be expressed as      if    if  where is the cutoff radius. Then the ideal high pass filters can be described similarly:      if   if   These functions are illustrated in figure 9.19. Butterworth filter functions are based on the following functions for low pass filters:           and for high pass filters:     9.7. FILTERING IN THE FREQUENCY DOMAIN 153 (a) Cutoff of 5 (b) The resulting image (a) Cutoff of 30 (b) The resulting image Figure 9.18: Ideal high pass filtering with different cutoffs 154 CHAPTER 9. THE FOURIER TRANSFORM             (a) Low pass (b) High pass Figure 9.19: Ideal filter functions where in each case the parameter is called the order of the filter. The size of dictates the sharpness of the cutoff. These functions are illustrated in figures 9.20 and 9.21.             (a) Low pass (b) High pass Figure 9.20: Butterworth filter functions with  It is easy to implement these in Matlab; here are the commands to produce a Butterworth low pass filter of size    with   and order : >> [x,y]=meshgrid(-128:217,-128:127)); >> bl=1./(1+((x.^2+y.^2)/15).^2); Since a Butterworth high pass filter can be obtained by subtracting a low pass filter from 1, we can write general Matlab functions to generate Butterworth filters of general sizes. These are shown in figures 9.22 and 9.23. So to apply a Butterworth low pass filter to the DFT of the cameraman image: >> bl=lbutter(c,15,1); >> cfbl=cf.*bl; >> figure,fftshow(cfbl,’log’) and this is shown in figure 9.24(a). Note that there is no sharp cutoff as seen in figure 9 9.7. FILTERING IN THE FREQUENCY DOMAIN 155             (a) Low pass (b) High pass Figure 9.21: Butterworth filter functions with  function out=lbutter(im,d,n) % LBUTTER(IM,D,N) creates a low-pass Butterworth filter % of the same size as image IM, with cutoff D, and order N % % Use: % x=imread(’cameraman.tif’); % l=lbutter(x,25,2); % height=size(im,1); width=size(im,2); [x,y]=meshgrid(-floor(width/2):floor((width-1)/2),-floor(height/2): ... floor((height-1)/2)); out=1./(1+(sqrt(2)-1)*((x.^2+y.^2)/d^2).^n); Figure 9.22: A function to generate a low pass Butterworth filter function out=hbutter(im,d,n) % HBUTTER(IM,D,N) creates a high-pass Butterworth filter % of the same size as image IM, with cutoff D, and order N % % Use: % x=imread(’cameraman.tif’); % l=hbutter(x,25,2); % out=1-lbutter(im,d,n); Figure 9.23: A function to generate a high pass Butterworth fi 156 CHAPTER 9. THE FOURIER TRANSFORM the outer parts of the transform are not equal to zero, although they are dimmed considerably. Performing the inverse transform and displaying it as we have done previously produces figure 9.24(b). This is certainly a blurred image, but the ringing seen in figure 9.15 is completely absent. Compare (a) The DFT after Butterworth low pass filtering (b) The resulting image Figure 9.24: Butterworth low pass filtering the transform after multiplying with a Butterworth filter (figure 9.24(a)) with the original transform (in figure 9.14). We see that the Butterworth filter does cause an attenuation of values away from the centre, even if they don’t become suddenly zero, as with the ideal low pass filter in figure 9.15. We can apply a Butterworth high pass filter similarly, first by creating the filter and applying it to the image transform: >> bh=hbutter(cm,15,1); >> cfbh=cf.*bh; >> figure,fftshow(cfbh,’log’) and then inverting and displaying the result: >> cfbhi=ifft2(cfbh); >> figure,fftshow(cfbhi,’abs’) The images are shown in figure 9.25 9.7.3 Gaussian filtering We have met Gaussian filters in chapter 6, and we saw that they could be used for low pass filtering. However, we can also use Gaussian filters in the frequency domain. As with ideal and Butterworth filters, the implementation is very simple: create a Gaussian filter, multiply it by the image transform, and invert the result. Since Gaussian filters have the very nice mathematical property that a Fourier transform of a Gaussian is a Gaussian, we should get exactly the same results as when using a linear Gaussian spatial filter. 9.7. FILTERING IN THE FREQUENCY DOMAIN 157 (a) The DFT after Butterworth high pass filtering (b) The resulting image Figure 9.25: Butterworth high pass filtering Gaussian filters may be considered to be the most “smooth” of all the filters we have discussed so far, with ideal filters the least smooth, and Butterworth filters in the middle. We can create Gaussian filters using the fspecial function, and apply them to our transform. >> g1=mat2gray(fspecial(’gaussian’,256,10)); >> cg1=cf.*g1; >> fftshow(cg1,’log’) >> g2=mat2gray(fspecial(’gaussian’,256,30)); >> cg2=cf.*g2; >> figure,fftshow(cg2,’log’) Note the use of the mat2gray function. The fspecial function on its own produces a low pass Gaussian filter with a very small maximum: >> g=fspecial(’gaussian’,256,10); >> format long, max(g(:)), format ans = 0.00158757552679 The reason is that fspecial adjusts its output to keep the volume under the Gaussian function always 1. This means that a wider function, with a large standard deviation, will have a low maximum. So we need to scale the result so that the central value will be 1; and mat2gray does that automatically. The transforms are shown in figure 9.26(a) and (c). In each case, the final parameter of the fspecial function is the standard deviation; it controls the width of the filter. As we see, the larger the standard deviation, the wider the function, and so the greater amount of the transform is preserved. 158 CHAPTER 9. THE FOURIER TRANSFORM The results of the transform on the original image can be produced using the usual sequence of commands: >> cgi1=ifft2(cg1); >> cgi2=ifft2(cg2); >> fftshow(cgi1,’abs’); >> fftshow(cgi2,’abs’); and the results are shown in figure 9.26(b) and (d) (a)  (b) Resulting image (c)  (d) Resulting image Figure 9.26: Applying a Gaussian low pass filter in the frequency domain We can apply a high pass Gaussian filter easily; we create a high pass filter by subtracting a low pass filter f 9.8. REMOVAL OF PERIODIC NOISE 159 >> h1=1-g1; >> h2=1-g2; >> ch1=cf.*h1; >> ch2=cf.*h2; >> ch1i=ifft2(ch1); >> chi1=ifft2(ch1); >> chi2=ifft2(ch2); >> fftshow(chi1,’abs’) >> figure,fftshow(chi2,’abs’) and the images are shown in figure 9.27. As with ideal and Butterworth filters, the wider the high (a) Using  (b) Using  Figure 9.27: Applying a Gaussian high pass filter in the frequency domain pass filter, the more of the transform we are reducing, and the less of the original image will appear in the result. 9.8 Removal of periodic noise In chapter 7 we investigated a number of different noise types which can affect images. However, we did not look at periodic noise. This may occur if the imaging equipment (the acquisition or networking hardware) is subject to electronic disturbance of a repeating nature, such as may be caused by an electric motor. We can easily create periodic noise by overlaying an image with a trigonometric function: >> [x,y]=meshgrid(1:256,1:256); >> s=1+sin(x+y/1.5); >> cp=(double(cm)/128+s)/4; where cm is the cameraman image from previous sections. The second line simply creates a sine function, and adjusts its output to be in the range 0–2. The last line first adjusts the cameraman image to be in the same range; adds the sine function to it, and divides by 4 to produce a mat 160 CHAPTER 9. THE FOURIER TRANSFORM type double with all elements in the range –  . This can be viewed directly with imshow, and it is shown in figure 9.28(a). We can produce its DFT: (a) (b) Figure 9.28: The cameraman image (a) with periodic noise, and (b) its transform >> cpf=fftshift(fft2(cp)); and this is shown in figure 9.28(b). The extra two “spikes” away from the centre correspond to the noise just added. In general the tighter the period of the noise, the further from the centre the two spikes will be. This is because a small period corresponds to a high frequency (large change over a small distance), and is therefore further away from the centre of the shifted transform. We will now remove these extra spikes, and invert the result. If we put pixval on and move around the image, we find that the spikes have row, column values of       and    . These have the same distance from the centre:   . We can check this by >> z(156,170) >> z(102,88) There are two methods we can use to eliminate the spikes, we shall look at both of them. Band reject filtering. We create a filter consisting of ones with a ring of zeroes; the zeroes lying at a radius of 49 from the centre: >> br=(z < 47 | z > 51); where z is the matrix consisting of distances from the origin. This particular ring will have a thickness large enough to cover the spikes. Then as before, we multiply this by the transform: >> cpfbr=cpf.*br and this is shown in figure 9.29(a). The result is that the spikes have been blocked out by this filter. Taking the inverse transform produces the image shown in figure 9.29(b). Note that not all the noise has gone, but a significant amount has, especially in the centre of t 9.9. INVERSE FILTERING 161 (a) A band-reject filter (b) After inversion Figure 9.29: Removing periodic noise with a band-reject filter Notch filtering. With a notch filter, we simply make the rows and columns of the spikes zero: >> cpf(156,:)=0; >> cpf(102,:)=0; >> cpf(:,170)=0; >> cpf(:,88)=0; and the result is shown in figure 9.30(a). The image after inversion is shown in figure 9.30(b). As before, much of the noise in the centre has been removed. Making more rows and columns of the transform zero would result in a larger reduction of noise. 9.9 Inverse filtering We have seen that we can perform filtering in the Fourier domain by multiplying the DFT of an image by the DFT of a filter: this is a direct use of the convolution theorem. We thus have           where is the DFT of the image;  is the DFT of the filter, and is the DFT of the result. If we are given and , then we should be able to recover the (DFT of the) original image simply by dividing by :            (9.8) Suppose, for example we take the wombats image wombats.tif, and blur it using a low-pass Butterworth filter: >> w=imread(’wombats.tif’); >> wf=fftshift 162 CHAPTER 9. THE FOURIER TRANSFORM (a) A notch filter (b) After inversion Figure 9.30: Removing periodic noise with a notch filter >> b=lbutter(w,15,2); >> wb=wf.*b; >> wba=abs(ifft2(wb)); >> wba=uint8(255*mat2gray(wba)); >> imshow(wba) The result is shown on the left in figure 9.31. We can attempt to recover the original image by dividing by the filter: >> w1=fftshift(fft2(wba))./b; >> w1a=abs(ifft2(w1)); >> imshow(mat2gray(w1a)) and the result is shown on the right in figure 9.31. This is no improvement! The trouble is that some elements of the Butterworth matrix are very small, so dividing produces very large values which dominate the output. We can deal with this problem in two ways: 1. Apply a low pass filter to the division:              This should eliminate very low (or zero) values. 2. “Constrained division”: choose a threshold value  , and if        , we don’t perform a division, but just keep our original value. Thus:              if       ,    if     9.9. INVERSE FILTERING 163 Figure 9.31: An attempt at inverse filtering We can apply the first method by multiplying a Butterworth low pass filter to the matrix c1 above: >> wbf=fftshift(fft2(wba)); >> w1=(wbf./b).*lbutter(w,40,10); >> w1a=abs(ifft2(w1)); >> imshow(mat2gray(w1a)) Figure 9.32 shows the results obtained by using a different cutoff radius of the Butterworth filter each time: (a) uses 40 (as in the Matlab commands just given); (b) uses 60; (c) uses 80, and (d) uses 100. It seems that using a low pass filter with a cutoff round about 60 will yield the best results. After we use larger cutoffs, the result degenerates. We can try the second method; to implement it we simply make all values of the filter which are too small equal to 1: >> d=0.01; >> b=lbutter(w,15,2);b(find(b> w1=fftshift(fft2(wba))./b; >> w1a=abs(ifft2(w1)); >> imshow(mat2gray(w1a)) Figure 9.33 shows the results obtained by using a different cutoff radius of the Butterworth filter each time: (a) uses    (as in the Matlab commands just given); (b) uses   ; (c) uses   , and (d) uses    . It seems that using a threshold  in the range       produces reasonable results. Motion deblurring We can consider the removal of blur caused by motion to be a special case of inverse filtering. Suppose we take an image and blur it by a small amount. >> bc=imread(’board.tif’); >> bg= 164 CHAPTER 9. THE FOURIER TRANSFORM (a) (b) (c) (d) Figure 9.32: Inverse filtering using low pass filtering to eliminate zeros 9.9. INVERSE FILTERING 165 (a) (b) (c) (d) Figure 9.33: Inverse filtering using constrained division 166 CHAPTER 9. THE FOURIER TRANSFORM >> b=bg(100:355,50:305); >> imshow(b) These commands simply take the colour image of a circuit board (the image board.tif), makes a greyscale version of data type uint8, and picks out a square subimage. The result is shown as figure 9.34(a). To blur it, we can use the blur parameter of the fspecial function. >> m=fspecial(’motion’,7,0); >> bm=imfilter(b,m); >> imshow(bm) and the result is shown as figure 9.34(b). The result of the blur has effectively obliterated the text (a) (b) Figure 9.34: The result of motion blur on the image. To deblur the image, we need to divide its transform by the transform corresponding to the blur filter. This means that we first must create a matrix corresponding to the transform of the blur: >> m2=zeros(256,256); >> m2(1,1:7)=m; >> mf=fft2(m2); Now we can attempt to divide by this transform. >> bmi=ifft2(fft2(bm)./mf); >> fftshow(bmi,’abs’) and the result is shown in figure 9.35(a). As with inverse filtering, the result is not particularly good, because the values close to zero in the matrix mf have tended to dominate the result. As above, we can constrain the division by only dividing by values which are above a certain threshold. >> d=0.02; >> mf=fft2(m2);mf(find(abs(mf)> bmi=ifft2(fft2(bm)./mf); >> imshow(mat2gray(abs(bmi))*2) 9.9. INVERSE FILTERING 167 where the last multiplication by 2 just brightens the result, which is shown in figure 9.35(b). The (a) Straight division (b) Constrained division Figure 9.35: Attempts at removing motion blur writing, especially in the centre of the image, is now quite legible. Exercises 1. By hand, compute the DFT of each of the following sequences: (a)    (b)      (c)       (d)     Compare your answers with those given by Matlab’s fft function. 2. For each of the transforms you computed in the previous question, compute the inverse transform by hand. 3. By hand, verify the convolution theorem for each of the following pairs of sequences: (a)    and      (b)     and       4. Using Matlab, verify the convolution theorem for the following pairs of sequences: (a)           and           (b)           and            5. Consider the following matrix:                         Using Matlab, calculate the DFT of each row. You can do this with 168 CHAPTER 9. THE FOURIER TRANSFORM >> a=[4 5 -9 -5;3 -7 1 2;6 -1 -6 1;3 -1 7 -5]; >> a1=zeros(4,4); >> for i=1:4,a1(i,:)=fft(a(i,:));end Now use similar commands to calculate the DFT of each column of a1. Compare the result with the output of the command fft2(a). 6. Perform similar calculations as in the previous question with the matrices produced by the commands magic(4) and hilb(6). 7. Open up the image engineer.tif: >> en=imread(’engineer.tif’); Experiment with applying the Fourier transform to this image and the following filters: (a) ideal filters (both low and high pass), (b) Butterworth filters, (c) Gaussian filters. What is the smallest radius of a low pass ideal filter for which the face is still recognizable? 8. If you have access to a digital camera, or a scanner, produce a digital image of the face of somebody you know, and perform the same calculations as in the previous question. 9. Add the sine waves to the engineer face using the same commands as for the cameraman: >> [x,y]=meshgrid(1:256,1:256); >> s=1+sin(x+y/1.5); >> ep=(double(en)/128+s)/4; Now attempt to remove the noise using band-reject filtering or notch filtering. Which one gives the best result? 10. For each of the following sine commands: (a) s=1+sin(x/3+y/5); (b) s=1+sin(x/5+y/1.5); (c) s=1+sin(x/6+y/6); add the sine wave to the image as shown in the previous question, and attempt to remove the resulting periodic noise using band-reject filtering or notch filtering. Which of the three is easiest to “clean up”? 11. Apply a    blurring filter to the cameraman image with imfilter. Attempt to deblur the result using inverse filtering with constrained division. Which threshold gives the best results? 12. Repeat the previous question using a   blurring filter. 13. Work through the motion deblurring example, experimenting with different values of the threshold. What gives the best results? Chapter 10 The Hough and Distance Transforms 10.1 The Hough transform As we have mentioned in chapter 5, an image transform is an operation which takes an image, or the array of its pixel values, and “transforms” it into a different form. This new form is then processed to provide the result we require. Sometimes it is necessary to apply an inverse transform after the processing, to obtain the processed image. In this chapter we investigate two important transforms, with many different applications. The Hough transform1 is designed to find lines in images, but it can be easily varied to find other shapes. The idea is simple. Suppose     is a point in the image (which we shall assume to be binary). We can write   , and consider all pairs   which satisfy this equation, and plot them into an “accumulator array”. The   array is the “transform array”. For example, take         . Since the equation relating and is    we can write    Thus the line   consists of all pairs of points relating to the single point     . This is shown in figure 10.1.       Image  Transform Figure 10.1: A point in an image and its corresponding line in the transform Each point in the image is mapped onto a line in the transform. The points in the transform corresponding to the greatest number of intersections correspond to the strongest line in the image. 1 “Hough” is 170 CHAPTER 10. THE HOUGH AND DISTANCE TRANSFORMS For example, suppose we consider an image with five points:    ,     ,    ,    and    . Each of these points corresponds to a line as follows:                                Each of these lines appears in the transform as shown in figure 10.2.           Image  Transform Figure 10.2: An image and its corresponding lines in the transform The dots in the transform indicate places where there are maximum intersections of lines: at each dot three lines intersect. The coordinates of these dots are      and        . These values correspond to the lines     and         or   and     . These lines are shown on the image in figure 10.3. We see that these are indeed the “strongest” lines in the image in that they contain the greatest number of points. There is a problem with this implementation of the Hough transform, and that is that it can’t find vertical lines: we can’t express a vertical line in the form   , as  represents the gradient, and a vertical line has infinite gradient. We need another parameterization of lines. Consider a general line, as shown in figure 10.4. Clearly any line can be described in terms of the two parameters and : is the perpendicular di 10.1. THE HOUGH TRANSFORM 171   Image Figure 10.3: Lines found by the Hough transform  Figure 10.4: A line and its paramet 172 CHAPTER 10. THE HOUGH AND DISTANCE TRANSFORMS angle of the line’s perpendicular to the -axis. In this parameterization, vertical lines are simply those which have . If we allow to have negative values, we can restrict to the range     Given this parameterization, we need to be able to find the equation of the line. First note that the point   where the perpendicular to the line meets the line is        . Also note that the gradient of the perpendicular is    . Now let     be any point on then line. The gradient of the line is rise run            But since the gradient of the line’s perpendicular is  , the gradient of the line itself must be        Putting these two expressions for the gradient together produces:           If we now multiply out these fractions we obtain:          and this equation can be rewritten as   &          We finally have the required equation for the line as:      The Hough transform can then be implemented as follows: we start by choosing a discrete set of values of and to use. For each pixel    in the image, we compute     for each value of , and place the result in the appropriate position in the   array. At the end, the values of   with the highest values in the array will correspond to strongest lines in the image. An example will clarify this: consider the image shown in figure 10.5. We shall discretize to use 10.1. THE HOUGH TRANSFORM 173 0 1 2 3 4 0 1 2 3 4   Figure 10.5: A small image We can start by making a table containing all values &   for each point, and for each value of :                                                                 The accumulator array contains the number of times each value of   appears in the above table:                                  In practice this array will be very large, and can be displayed as an image. We see that the two equal largest values occur at     and      . The lines then are     or  , and   174 CHAPTER 10. THE HOUGH AND DISTANCE TRANSFORMS 0 1 2 3 4 0 1 2 3 4   Figure 10.6: Lines found by the Hough transform 10.2 Implementing the Hough transform in Matlab The Image Processing Toolbox does not contain a hough routine, and although the Hough transform can be obtained by other means, it is a pleasant programming exercise to write our own. Following the procedure outlined above, we will: 1. decide on a discrete set of values of and to use, 2. for each foreground pixel    in the image calculate the values of &   for all of our chosen values of , 3. create an accumulator array whose sizes are the numbers of angles and values in our chosen discretizations from step 1, 4. step through all of our values updating the accumulator array as we go. We shall consider each step in turn: Discretizing and . We observe that even though a particular pair   corresponds to only one line, a given line can be parameterized in different ways. For example, the line     can be parameterized using # and  as shown in figure 10.7(a). However, the same line can be parameterized using  and   . So we have a choice: we may restrict the values of , say to the range      , and let have both positive and negative values, or we may let take any value chosen from the range   # and restrict to non-negative values. Since we are going to use the values of and as indices into the accumulator array, it is simplest to take the second option. However, consider figure 10.7(a) slightly redrawn to take into account the directions of  and  as column and row indices of a matrix, as shown in (b). Since our image, for which both  and  will be positive, will sit in the bottom right quadrant, we will only have positive values for     . For if is outside that range, the perpendicular will point into the second (upper left) quadrant, which would require a negative value of if the line was to intersect the image. We can choose any discrete set of values we like, but let us take all the integer degree values in the given range, but convert them to radians for the 10.2. IMPLEMENTING THE HOUGH TRANSFORM IN MATLAB 175      #   (a) Using ordinary Cartesian axes Image     #   (b) Using matrix axes Figure 10.7: A line parameterized with and  >> angles=[-90:180]*pi/180; Calculating the values. Suppose that the image is binary, then we can find the positions of all the foreground pixels with a simple application of the find function: >> [x,y]=find(im); If the image is not binary, we can create a binary edge image by use of the edge function. Now we can calculate all the values with one simple command: >> r=floor(x*cos(angles)+y*sin(angles)); where we use floor so as to obtain only integer values. Forming the accumulator array. If the image is of size   pixels, then supposing the origin to be at the upper left corner, the maximum value of will be   . So the size of the accumulator array can be set at     . However, we are only interested in positive values of : given our choice of range of , negative values can be discarded. So we can first find the largest positive value of , and use that as one dimension of the array: >> rmax=max(r(find(r>0))); >> acc=zeros(rmax+1,270); The rmax+1 allows us to have values of . Updating the accumulator array. We now have to step through the array of values, and for each value   , increase the corresponding accumulator value by one. First notic 176 CHAPTER 10. THE HOUGH AND DISTANCE TRANSFORMS r, as define above, has size    , where  is the number of foreground pixels. Hence the second index of both r and acc corresponds to the angle. This can be done with nested loops, at the heart of which will be the command if r(i,j)>=0, acc(r(i,j)+1,i)=acc(r(i,j)+1,i)+1; Note that this is not a very efficient method of creating the accumulator array, but it does have the advantage of following the theory very closely. The entire program is shown in figure 10.8. function res=hough(image) % % HOUGH(IMAGE) creates the Hough transform corresponding to the image IMAGE % if ~isbw(image) edges=edge(image,’canny’); else edges=image; end; [x,y]=find(edges); angles=[-90:180]*pi/180; r=floor(x*cos(angles)+y*sin(angles)); rmax=max(r(find(r>0))); acc=zeros(rmax+1,270); for i=1:length(x), for j=1:270, if r(i,j)>=0 acc(r(i,j)+1,j)=acc(r(i,j)+1,j)+1; end; end; end; res=acc; Figure 10.8: A simple Matlab function for implementing the Hough transform An example Let us take the cameraman image, and apply our Hough transform procedure to it: >> c=imread(’cameraman.tif’); >> hc=hough(c); This last command may take some time, because of the inefficient nested loops. The first thing we may do is to view the result: >> imshow(mat2gray(hc)*1.5) where the extra 1.5 at the end is just to brighten up the image. The result is shown in figure 10.9. What we are viewing here is the accumulator array. And it is what we should expect: a series of curves, with some bright points indicating places of maximum intersection. Because of the use o 10.2. IMPLEMENTING THE HOUGH TRANSFORM IN MATLAB 177 Figure 10.9: The result of a Hough transform sines and cosines in the construction of the transform, we can expect the curves to be of a sinusoidal nature. What now? Let us find the maximum value of the transform: >> max(hc(:)) ans = 91 We can now find the and values corresponding to the maximum: >> [r,theta]=find(hc==91) r = 138 theta = 181 However, since we are using the pixel coordinates as cartesian coordinates, our  and  axes have been rotated counter-clockwise by . Thus we are measuring in a clockwise direction from the left vertical edge of our image. Figure 10.10 shows how this works: We have also got the problem that We can easily create a small function to draw lines for us, given their perpendicular distance from the origin, and the angle of the perpendicular from the  axis. The tool for this will be the line function, which in the form >> line([x1,x2],[y1,y 178 CHAPTER 10. THE HOUGH AND DISTANCE TRANSFORMS     Figure 10.10: A line from the Hough transform draws a line between coordinates     and     over the current image. The only difficulty here is that line takes the  axis to be on the top, and the  axis going down on the left. This is easily dealt with by replacing with   , and a simple function for drawing lines is shown in figure 10.11. The only thing to notice is the expression 181-theta in the line angle=pi*(181-theta)/180; This can be interpreted as    ; the initial  swaps between cartesian and matrix coordinates, and the extra 1 counters the accumulation of r+1 in the function hough.m. We can use this as follows: >> c2=imadd(imdivide(cm,4),192); >> imshow(c2) >> houghline(c2,r,theta) The idea of using c2 is simply to lighten the image so as to show the line more clearly. The result is shown on the left in figure 10.12. To draw other lines, we can extract some more points from the transform: >> [r,theta]=find(hc>80) r = 14 10.2. IMPLEMENTING THE HOUGH TRANSFORM IN MATLAB 179 function houghline(image,r,theta) % % Draws a line at perpendicular distance R from the upper left corner of the % current figure, with perpendicular angle THETA to the left vertical axis. % THETA is assumed to be in degrees. % [x,y]=size(image); angle=pi*(181-theta)/180; X=[1:x]; if sin(angle)==0 line([r r],[0,y],’Color’,’black’) else line([0,y],[r/sin(angle),(r-y*cos(angle))/sin(angle)],’Color’,’black’) end; Figure 10.11: A simple Matlab function for drawing lines on an image Figure 10.12: The houghline function in action 180 CHAPTER 10. THE HOUGH AND DISTANCE TRANSFORMS 85 90 theta = 169 181 182 204 204 Then the command >> houghline(c,r(1),theta(1)) will place the line as shown on the right in figure 10.12. Clearly we can use these functions to find any lines we like. 10.3 The distance transform In many applications, it is necessary to find the distance of every pixel from a region  . This can be done using the standard Euclidean distance:                   This means that to calculate the distance of    to  , we find all possible distances from    to pixels in  , and take the smallest value as our distance. This is very computationally inefficient: if  is large, then we have to compute many square roots. A saving can be obtained by noting that since the square root function is increasing, we can write the above definition as                  which involves only one square root. But even this definition is slow to compute. There is a great deal of arithmetic involved, and the finding of a smallest value. The distance transform is a computationally efficient method of finding such distance. We shall describe it in a sequence of steps: Step 1. Attach to each pixel    in the image a label      giving its distance from  . Start with labelling each pixel in  with 0, and each pixel not in  with . Step 2. We now travel through the image pixel by pixel. For each pixel     replace its label with                                    using   . Step 3. Repeat step 2 until all labels have been converted to finite 10.3. THE DISTANCE TRANSFORM 181 To give some examples of step 2, suppose we have this neighbourhood:         We are only interested in the centre pixel (whose label we are about to change), and the four pixels above, below, and to the left and right. To these four pixels we add 1:     The minimum of these five values is 3, and so that is the new label for the centre pixel. Suppose we have this neighbourhood:         Again, we add 1 to each of the four pixels above, below, to the left and right, and keep the centre value:      The minimum of these values is , and so at this stage the pixel’s label is not changed. Suppose we take an image whose labels after step 1 are given below                                                                                Step 1 Step 2 (first pass) Step 2 (second pass)                                      Step 2 (third pass) Step 2 (final pass) At this stage we stop, as all label values are finite. An immediate observation is that the distance values given are not in fact a very good approximation to “real” distances. To provide better accuracy, we need to generalize the above transform. One way to do this is to 182 CHAPTER 10. THE HOUGH AND DISTANCE TRANSFORMS Step two in the transform then consists of adding the corresponding mask elements to labels of the neighbouring pixels, and taking the minimum. To obtain good accuracy with simple arithmetic, the mask will generally consist of integer values, but the final result may require scaling. Suppose we apply the mask     to the above image. Step 1 is as above; steps 2 are:                                                                         Step 2 (first pass) Step 2 (second) Step 2 (third) at which point we stop, and divide all values by three:                                          These values are much closer to the Euclidean distances than those provided by the first transform. Even better accuracy can be obtained by using the mask                         and dividing the final result by 5:                                                                      Result of transform After division by 5 The method we have described can in fact be very slow; for a large image we may require many passes before all distance labels become finite. A quicker method requires two passes only: the first pass starts at the top left of the image, and moves left to right, and top to bottom. The second pass starts at the bottom right of the image, and moves right to left, and from bottom to top. For this method we break the mask 10.3. THE DISTANCE TRANSFORM 183 1 1 0 1 0 1 Mask 1 Forward mask Backward mask 3 4 3 4 0 3 3 4 4 0 Mask 2 Forward mask Backward mask 11 11 11 7 7 11 5 5 0 0 5 5 11 11 11 11 7 7 Mask 3 Forward mask Backward mask Figure 10.13: Pairs of masks for the two pass distance transform 184 CHAPTER 10. THE HOUGH AND DISTANCE TRANSFORMS (this is used for the first pass), and the other half inspects only values to the right and below (this is used for the second pass). Such pairs of masks are shown in figure 10.13, and the solid lines show how the original mask is broken up into its two halves. We apply these masks as follows: first surround the image with zeros (such as for spatial filtering), so that at the edges of the image the masks have values to work with. For the forward pass, for each pixel at position    , add the values given in the forward mask to its neighbours and take the minimum, and replace the current label with this minimum. This is similar to step 2 in the original algorithm, except that we are using less pixels. We do the same for the backward pass, except that we use the backwards mask, and we start at the bottom right. If we apply forward masks 1 and 2 to our image, the results of the forward passes are:                                                 Use of mask 1 Use of mask 2 After applying the backward masks, we will obtain the distance transforms as above. Implementation in Matlab We can easily write a function to perform the distance transform using the second method as above. Our function will implement the transform as follows: 1. Using the size of the mask, pad the image with an appropriate number of zeros. 2. Change each zero to infinity, and each one to zero. 3. Create forward and backwards masks. 4. Perform a forward pass: replace each label with the minimum of its neighbourhood plus the forward mask. 5. Perform a backwards pass: replace each label with the minimum of its neighbourhood plus the backwards mask. Let’s consider each of these steps separately: 1. Suppose the image is of size  , and the mask is of size  , where both mask dimensions are odd numbers. We need to add, on each side of the image, a number of columns equal to     , and we need to add, on both top and bottom of the image, a number of rows equal to     . In other words we can embed the image in a larger array of size          : >> [r,c]=size(image); >> [mr,mc]=size(mask); >> nr=(mr-1)/2; >> nc=(mc-1)/2; >> image2=zeros(r+mr-1,c+mc-1); >> image2 10.3. THE DISTANCE TRANSFORM 185 2. This can be easily done using the find function: first change all zeros to infinity, and next change all ones to zeros: >> image2(find(image2)==0)=Inf; >> image2(find(image2)==1)=0; 3. Suppose we are given a forward mask. We can do this most simply by making all blank entries in the masks shown in figure 10.13 infinity; this means that pixels in these positions will have no effect on the final minimum. The backwards mask can be obtained by two rotations. For example: >> mask1=[Inf 1 Inf;1 0 Inf;Inf Inf Inf]; >> backmask=rot90(rot90(mask1)); 4. We can implement the forward mask with nested loops: >> for i=nr+1:r+nr, for j=nc+1:c+nc, image2(i,j)=min(min(image2(i-nr:i+nr,j-nc:j+nc)+mask)); end; end; 5. The backward pass is done similarly: >> for i=r+nr:-1:nr+1, for j=c+nc:-1:nc+1, image2(i,j)=min(min(image2(i-nr:i+nr,j-nc:j+nc)+backmask)); end; end; The full function is shown in figure 10.14. Let’s try it out, first creating our image, and the three masks: >> im=[0 0 0 0 0 0;... 0 0 1 1 0 0;... 0 0 0 1 0 0;... 0 0 0 1 0 0;... 0 0 0 1 1 0;... 0 0 0 0 0 0] im = 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 1 1 0 0 0 0 0 186 CHAPTER 10. THE HOUGH AND DISTANCE TRANSFORMS function res=disttrans(image,mask) % % This function implements the distance transform by applying MASK to % IMAGE, using the two step algorithm with "forward" and "backwards" masks. % backmask=rot90(rot90(mask)); [mr,mc]=size(mask); if ((floor(mr/2)==ceil(mr/2)) | (floor(mc/2)==ceil(mc/2))) then error(’The mask must have odd dimensions.’) end; [r,c]=size(image); nr=(mr-1)/2; nc=(mc-1)/2; image2=zeros(r+mr-1,c+mc-1); image2(nr+1:r+nr,nc+1:c+nc)=image; % % This is the first step; replacing R values with 0 and other values % with infinity % image2(find(image2==0))=Inf; image2(find(image2==1))=0; % % Forward pass % for i=nr+1:r+nr, for j=nc+1:c+nc, image2(i,j)=min(min(image2(i-nr:i+nr,j-nc:j+nc)+mask)); end; end; % % Backward pass % for i=r+nr:-1:nr+1, for j=c+nc:-1:nc+1, image2(i,j)=min(min(image2(i-nr:i+nr,j-nc:j+nc)+backmask)); end; end; res=image2(nr+1:r+nr,nc+1:c+nc); Figure 10.14: A function for computing the distance transform 10.3. THE DISTANCE TRANSFORM 187 >> mask1=[Inf 1 Inf;1 0 Inf;Inf Inf Inf] mask1 = Inf 1 Inf 1 0 Inf Inf Inf Inf >> mask2=[4 3 4;3 0 Inf;Inf Inf Inf] mask2 = 4 3 4 3 0 Inf Inf Inf Inf >> mask3=[Inf 11 Inf 11 Inf;... 11 7 5 7 11;... Inf 5 0 Inf Inf;... Inf Inf Inf Inf Inf;... Inf Inf Inf Inf Inf] mask3 = Inf 11 Inf 11 Inf 11 7 5 7 11 Inf 5 0 Inf Inf Inf Inf Inf Inf Inf Inf Inf Inf Inf Inf Now we can apply the transform: >> disttrans(im,mask1) ans = 3 2 1 1 2 3 2 1 0 0 1 2 3 2 1 0 1 2 3 2 1 0 1 2 3 2 1 0 0 1 4 3 2 1 1 2 >> disttrans(im,mask2) ans = 188 CHAPTER 10. THE HOUGH AND DISTANCE TRANSFORMS 7 4 3 3 4 7 6 3 0 0 3 6 7 4 3 0 3 6 8 6 3 0 3 4 9 6 3 0 0 3 10 7 4 3 3 4 >> disttrans(im,mask3) ans = 11 7 5 5 7 11 10 5 0 0 5 10 11 7 5 0 5 10 14 10 5 0 5 7 15 10 5 0 0 5 16 11 7 5 5 7 Now the results of the transforms usings masks 2 and 3 should be divided by appropriate values to get aproxiations to the true distances. We can of course apply the distance transform to a large image; say circles.tif: >> c=~imread(’circles.tif’); >> imshow(c) >> cd=disttrans(c,mask1); >> figure,imshow(mat2gray(cd)) Note that we invert the circles image to produce black circles on a white background. This means that our transform will find distances towards the inside of the original circles. The only reason for doing this is that it is easier to make sense of the resulting image. The circles image is shown on the leftt in figure 10.15 and the distance transform on the right. Figure 10.15: An example of a distance transform 10.3. THE DISTANCE TRANSFORM 189 Application to skeletonization The distance transform can be used to provide the skeleton of a region  . We apply the distance transform, using mask 1, to the image negative, just as we did for the circle above. Then the skeleton consist of those pixels    for which                              For example, suppose we take a small region concisting of a single rectangle, and find the distance transform of its negative: >> c=zeros(7,9);c(2:6,2:8)=1 c = 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 0 0 1 1 1 1 1 1 1 0 0 1 1 1 1 1 1 1 0 0 1 1 1 1 1 1 1 0 0 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 >> cd=disttrans(~c,mask1) cd = 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 0 0 1 2 2 2 2 2 1 0 0 1 2 3 3 3 2 1 0 0 1 2 2 2 2 2 1 0 0 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 We can obtain the skeleton using a double loop: >> skel=zeros(size(c)); >> for i=2:6, for j=2:8, if cd(i,j)>=max([cd(i-1,j),cd(i+1,j),cd(i,j-1),cd(i,j+1)]) skel(i,j)=1; end; end; end; >> skel skel 190 CHAPTER 10. THE HOUGH AND DISTANCE TRANSFORMS 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 1 1 1 0 0 0 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 In fact we can produce the skeleton more efficiently by using Matlab’s ordfilt2 function, which we met in chapter 7. This can be used to find the largest value in a neighbourhood, and the neighbourhood can be very precisely defined: >> cd2=ordfilt2(cd,5,[0 1 0;1 1 1;0 1 0]) cd2 = 0 1 1 1 1 1 1 1 0 1 1 2 2 2 2 2 1 1 1 2 2 3 3 3 2 2 1 1 2 3 3 3 3 3 2 1 1 2 2 3 3 3 2 2 1 1 1 2 2 2 2 2 1 1 0 1 1 1 1 1 1 1 0 >> cd2<=cd ans = 1 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 1 1 1 0 0 0 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 1 We can easily restrict the image so as not to obtain the extra 1’s in the corners of the result. Now let’s do the same thing with our circles image: >> c=~imread(’circles.tif’); >> cd=disttrans(c,mask1); >> cd2=ordfilt2(cd,5,[0 1 0;1 1 1;0 1 0]); >> imshow((cd2<=cd)&~c) and the result is shown in figure 10.16. The use of the command (cd2<=cd)&~c blocks out the outside of the circles, so that just the skeleton is left. We will see in chapter 11 how to thicken this skeleton, and also other ways of obtaining the skeleton. 10.3. THE DISTANCE TRANSFORM 191 Figure 10.16: Skeletonization using the distance transform Exercises 1. In the diagram shown     is any point on the line  and is the point on the line closest to the origin.   (a) Find the coordinates of in terms of and . (b) Hence find the vector  . (c) Also find the vector  . (d) What is known about the dot product (inner product) of these two vectors? (e) Deduce that    satisfies     . 2. We define and as above. (a) A straight line has and  . What is the equation of the line? (b) Find and for the lines   192 CHAPTER 10. THE HOUGH AND DISTANCE TRANSFORMS 3. Use the Hough transform to detect the strongest line in the binary image shown below. Use the form     with in steps of  from   to and place the results in an accumulator array.           0 0 0 0 0 1 0  0 0 0 0 0 0 0   0 1 0 1 0 1 0  0 0 1 0 0 0 0  0 0 0 0 0 0 0 1 0 0 0 0 1 0  0 0 0 0 0 0 0 4. Repeat the above question with the images:           0 0 0 0 1 0 0  0 0 0 0 0 0 0   0 0 1 0 0 0 1  0 1 0 0 1 0 0  1 0 0 0 0 0 1 0 0 0 0 1 0 0  0 0 0 1 1 0 0           0 0 0 1 0 0 0  1 0 0 0 1 0 0   0 0 0 0 0 0 0  0 0 1 0 0 1 0  0 1 0 1 0 0 0 1 0 0 0 0 0 1  0 0 1 0 0 1 0 5. Find some more lines on the cameraman image, and plot them with houghline. 6. Read and display the image alumgrns.tif. (a) Where does it appear that the “strongest” lines will be? (b) Using hough and houghline, plot the five strongest lines. 7. Experiment with the two routines by changing the initial edge detection of hough. Can you affect the lines found by the Hough transform? 8. For each of the following images:                                        10.3. THE DISTANCE TRANSFORM 193 apply the distance transform to approximate distances from the region containing  ’s to all other pixels in the image, using the masks: (i)     (ii)         (iii)     (iv)                         and applying any necessary scaling at the end. 9. Apply the distance transform and use it to find the skeleton in the images circlesm.tif and nicework. 194 CHAPTER 10. THE HOUGH AND DISTANCE TRANSFORMS Chapter 11 Morphology 11.1 Introduction Morphology, or mathematical morphology is a branch of image processing which is particularly useful for analysing shapes in images. Although morphology can be applied to grey-scale images, we shall only investigate binary morphology. Matlab has many tools for binary morphology in the image processing toolbox; most of which can be used for greyscale morphology as well. 11.2 Basic ideas Translation Suppose that is a set of pixels in a binary image, and     is a particular coordinate point. Then  is the set “translated” in direction    . That is             For example, in figure 11.1, is the cross shaped set, and   . The set has been shifted 5 4 3 2 1 0 0 1 2 3 4 5 4 3 2 1 0 0 1 2 3 4  Figure 11.1: Translation in the  and  directions by the values given in . Note that here we are using matrix coordinates, rather than Cartesian coordinates, so that the origin is at the top left,  goes down and 196 CHAPTER 11. MORPHOLOGY Reflection If is set of pixels, then its reflection, denoted , is obtained by reflecting in the origin:              For examples, in figure 11.2, the open and closed circles form sets which are reflections of each other.      0 1 2 3 3 2 1 0     Figure 11.2: Reflection 11.3 Dilation and erosion These are the basic operations of morphology, in the sense that all other operations are built from a combination of these two. 11.3.1 Dilation Suppose and ! are sets of pixels. Then the dilation of by !, denoted  !, is defined as  !     What this means is that for every point   !, we translate by those coordinates. Then we take the union of all these translations. An equivalent definition is that  !               !  From this last definition, we see that dilation is commutative; that  ! !   An example of a dilation is given in figure 11.3. In the translation diagrams, the grey squares show the original position of the object. Note that   is of course just itself. In this example, we have !                        and those these are the coor 11.3. DILATION AND EROSION 197 7 6 5 4 3 2 1 1 2 3 4 5 1 0    0 1 ! 7 6 5 4 3 2 1 1 2 3 4 5 7 6 5 4 3 2 1 1 2 3 4 5  7 6 5 4 3 2 1 1 2 3 4 5  7 6 5 4 3 2 1 1 2 3 4 5   7 6 5 4 3 2 1 1 2 3 4 5  ! Figure 11.3 198 CHAPTER 11. MORPHOLOGY In general,  ! can be obtained by replacing every point    in with a copy of !, placing the   point of ! at     . Equivalently, we can replace every point   of ! with a copy of . As you see in figure 11.3, dilation has the effect of increasing the size of an object. However, it is not necessarily true that the original object will lie within its dilation  !. Depending on the coordinates of !,  ! may end up quite a long way from . Figure 11.4 gives an example of this: is the same as in figure 11.3; ! has the same shape but a different position. In this figure, we have !                so that  !        8 7 6 5 4 3 2 1 1 2 3 4 ! 14 13 12 10 9 8 7 6 5 4 3 2 1 1 2 3 4 5 6 7 8  ! Figure 11.4: A dilation for which    For dilation, we generally assume that is the image being processed, and ! is a small set of pixels. In this case ! is referred to as a structuring element or as a kernel. Dilation in Matlab is performed with the command >> imdilate(image,kernel) To see an example of dilation, consider the commands: >> t= 11.3. DILATION AND EROSION 199 >> td=imdilate(t,sq); >> subplot(1,2,1),imshow(t) >> subplot(1,2,2),imshow(td) The result is shown in figure 11.5. Notice how the image has been “thickened”. This is really what dilation does; hence its name. Figure 11.5: Dilation of a binary image 11.3.2 Erosion Given sets and !, the erosion of by !, written  !, is defined as: !  !  In other words the erosion of by ! consists of all points     for which ! is in . To perform an erosion, we can move ! over , and find all the places it will fit, and for each such place mark down the corresponding   point of !. The set of all such points will form the erosion. An example of erosion is given in figures 11.6. Note that in the example, the erosion  ! was a subset of . This is not necessarily the case; it depends on the position of the origin in !. If ! contains the origin (as it did in figure 11.6), then the erosion will be a subset of the original object. Figure 11.7 shows an example where ! does not contain the origin. In this figure, the open circles in the right hand figure form the erosion. Note that in figure 11.7, the shape of the erosion is the same as that in figure 11.6; however its position is different. Since the origin of ! in figure 11.7 is translated by      from its position in figure 11.6, we can assume that the erosion will be translated by the same amount. And if we compare figures 11.6 and 11.7, we can see that the second erosion has indeed been shifted by      from the first. For erosion, as for dilation, we generally assume that is the image being processed, and ! is a small set of pixels: the structuring element or kernel. Erosion in Matlab is performed with the command >> i 200 CHAPTER 11. MORPHOLOGY 6 5 4 3 2 1 1 2 3 4 5 6 1 0     0 1 ! 6 5 4 3 2 1 1 2 3 4 5 6 6 5 4 3 2 1 1 2 3 4 5 6 6 5 4 3 2 1 1 2 3 4 5 6 6 5 4 3 2 1 1 2 3 4 5 6 6 5 4 3 2 1 1 2 3 4 5 6 6 5 4 3 2 1 1 2 3 4 5 6 6 5 4 3 2 1 1 2 3 4 5 6 ! Figure 11.6: Erosion with a cross-shaped structuring elem 11.3. DILATION AND EROSION 201 6 5 4 3 2 1 0 0 1 2 3 4 ! 6 5 4 3 2 1 0   0 1 2 3 4 5 6  ! Figure 11.7: Erosion with a structuring element not containing the origin We shall give an example; using a different binary image: >> c=imread(’circbw.tif’); >> ce=imerode(c,sq); >> subplot(1,2,1),imshow(c) >> subplot(1,2,2),imshow(ce) The result is shown in figure 11.8. Notice how the image has been “thinned”. This is the expected result of an erosion; hence its name. If we kept on eroding the image, we would end up with a completely black result. Figure 11.8: Erosion of a binary ima 202 CHAPTER 11. MORPHOLOGY 11.3.3 Relationship between erosion and dilation It can be shown that erosion and dilation are “inverses” of each other; more precisely, the complement of an erosion is equal to the dilation of the complement. Thus: !  !  To show this, see the proof in the box below. First note that, by its definition:       We also know that from elementary properties of subsets, that if   , then   . Thus:       (11.1) But the complement of     is clearly the set     Recall from the definition of dilation that         ! #"  !" $ % So if & "   , then & '() for some *"  and !" . Then &$+, -. Thus:    &./&0+1 ) !" 0"   &.2+!34& - 5" 0" (  &.76 85  -   Replacing  with  in the last equation produces   9&.76 8  -   (11.2) Now compare equations 11.1 and 11.2, and use the fact that 6 6  . Then     6 as required. It can be similarly shown that the same relationship holds if erosion and dilation are interchanged; that  ! !  We can demonstrate the truth of these using Matlab commands; all we need to know is that the complement of a binary image b is obtained using >> ~b and that given two images a and b; their equality is determined with >> all(a(:)==b(:)) To demonstrate the equality !  !  pick a binary image, say the text image, and a structuring element. Then the left hand side of this equation is produced with >> lhs=~imerode(t,sq); and the ri 11.4. OPENING AND CLOSING 203 >> rhs=imdilate(~t,sq); Finally, the command >> all(lhs(:)==rhs(:)) should return 1, for true. 11.3.4 An application: boundary detection If is an image, and ! a small structuring element consisting of point symmetrically places about the origin, then we can define the boundary of by any of the following methods: (i)  +! “ internal boundary” (ii)   !  “external boundary” (iii)   !   ! “morphological gradient” In each definition the minus refers to set difference. For some examples, see figure 11.9. We see that the internal boundary consists of those pixels in which are at its edge; the external boundary consists of pixels outside which are just next to it, and that the morphological gradient is a combination of both the internal and external boundaries. To see some examples, choose the image rice.tif, and threshold it to obtain a binary image: >> rice=imread(’rice.tif’); >> r=rice>110; Then the internal boundary is obtained with: >> re=imerode(r,sq); >> r_int=r&~re; >> subplot(1,2,1),imshow(r) >> subplot(1,2,2),imshow(r_int) The result is shown in figure 11.10. The external boundary and morphological gradients can be obtained similarly: >> rd=imdilate(r,sq); >> r_ext=rd&~r; >> r_grad=rd&~re; >> subplot(1,2,1),imshow(r_ext) >> subplot(1,2,2),imshow(r_grad) The results are shown in figure 11.11. Note that the external boundaries are larger than the internal boundaries. This is because the internal boundaries show the outer edge of the image components; whereas the external boundaries show the pixels just outside the components. The morphological gradient is thicker than either, and is in fact the union of both. 11.4 Opening and closing These operations may be considered as “second level” operations; in that they build on the basic operations of dilation and erosion. They are also, as we shall see, better behaved mat 204 CHAPTER 11. MORPHOLOGY 5 4 3 2 1 0 0 1 2 3 4 5 6 5 4 3 2 1 0    0 1 2 3 4 5 6  ! 1 0    0 1 ! 6 5 4 3 2 1 0    0 1 2 3 4 5 6   !   5 4 3 2 1 0 0 1 2 3 4 5 ! 6 5 4 3 2 1 0    0 1 2 3 4 5 6   !   +! Figure 11.9: B 11.4. OPENING AND CLOSING 205 Figure 11.10: “Internal boundary” of a binary image Figure 11.11: “External boundary” and the morphological gradient of a binary image 206 CHAPTER 11. MORPHOLOGY 11.4.1 Opening Given and a structuring element !, the opening of by !, denoted  !, is defined as:  !  !  !  So an opening consists of an erosion followed by a dilation. An equivalent definition is  ! ! !  That is, ! is the union of all translations of ! which fit inside . Note the difference with erosion: the erosion consists only of the   point of ! for those translations which fit inside ; the opening consists of all of !. An example of opening is given in figure 11.12. 5 4 3 2 1 0 0 1 2 3 4 5 5 4 3 2 1 0 0 1 2 3 4 5 ! 5 4 3 2 1 0 0 1 2 3 4 5 ! Figure 11.12: Opening The opening operation satisfies the following properties: 1.  ! . Note that this is not the case with erosion; as we have seen, an erosion may not necessarily be a subset. 2.  ! !  !. That is, an opening can never be done more than once. This property is called idempotence. Again, this is not the case with erosion; you can keep on applying a sequence of erosions to an image until nothing is left. 3. If ", then  ! " ! . 4. Opening tends to “smooth” an image, to break narrow joins, and to remove thin protrusions. 11.4.2 Closing Analogous to opening we can define closing, which may be considered as a dilation followed by an erosion, and is denoted !: !   ! !  Another definition of closing is that   ! if all translations ! which contain  have non-empty intersections with . An example of closing is given in figure 11.13. The closing operation 11.4. OPENING AND CLOSING 207 6 5 4 3 2 1 0 0 1 2 3 4 5 6 6 5 4 3 2 1 0 0 1 2 3 4 5 6  ! 6 5 4 3 2 1 0 0 1 2 3 4 5 6 ! Figure 11.13: Closing 2.  ! ! !; that is, closing, like opening, is idempotent. 3. If ", then  ! " ! . 4. Closing tends also to smooth an image, but it fuses narrow breaks and thin gulfs, and eliminates small holes. Opening and closing are implemented by the imopen and imclose functions respectively. We can see the effects on a simple image using the square and cross structuring elements. >> cr=[0 1 0;1 1 1;0 1 0]; >> >> test=zeros(10,10);test(2:6,2:4)=1;test(3:5,6:9)=1;test(8:9,4:8)=1;test(4,5)=1 test = 0 0 0 0 0 0 0 0 0 0 0 1 1 1 0 0 0 0 0 0 0 1 1 1 0 1 1 1 1 0 0 1 1 1 1 1 1 1 1 0 0 1 1 1 0 1 1 1 1 0 0 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 0 0 0 0 0 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 >> imopen(test,sq) ans = 0 0 0 0 0 0 0 0 0 0 0 1 1 1 0 0 0 0 0 0 0 1 1 1 0 1 1 1 1 0 0 1 1 208 CHAPTER 11. MORPHOLOGY 0 1 1 1 0 1 1 1 1 0 0 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 >> imopen(test,cr) ans = 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 1 1 0 1 1 1 0 0 0 1 1 1 1 1 1 1 1 0 0 1 1 1 0 1 1 1 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Note that in each case the image has been separated into distinct components, and the lower part has been removed completely. >> imclose(test,sq) ans = 1 1 1 1 0 0 0 0 0 0 1 1 1 1 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 1 1 1 1 1 0 0 0 0 0 1 1 1 1 1 0 0 0 0 0 1 1 1 1 1 0 0 0 0 0 1 1 1 1 1 0 0 >> imclose(test,cr) ans = 0 0 1 0 0 0 0 0 0 0 0 1 1 1 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 0 1 1 1 1 1 1 1 1 1 1 11.4. OPENING AND CLOSING 209 1 1 1 1 1 1 1 1 1 0 0 1 1 1 1 1 1 1 0 0 0 0 1 1 1 1 1 0 0 0 0 0 0 1 1 1 1 1 0 0 0 0 0 1 1 1 1 1 0 0 0 0 0 0 1 1 1 0 0 0 With closing, the image is now fully “joined up”. We can obtain a joining-up effect with the text image, using a diagonal structuring element. >> diag=[0 0 1;0 1 0;1 0 0] diag = 0 0 1 0 1 0 1 0 0 >> tc=imclose(t,diag); >> imshow(tc) The result is shown in figure 11.14. Figure 11.14: An example of closing An application: noise removal Suppose is a binary image corrupted by impulse noise—some of the black pixels are white, and some of the white pixels are back. An example is given in figure 11.15. Then ! will remove the single black pixels, but will enlarge the holes. We can fill the holes by dilating twice:   !  !  210 CHAPTER 11. MORPHOLOGY The first dilation returns the holes to their original size; the second dilation removes them. But this will enlarge the objects in the image. To reduce them to their correct size, perform a final erosion:    +!  !  ! +!  We see that the inner two operations constitute an opening; the outer two operations a closing. Thus this noise removal method is in fact an opening followed by a closing:  ! !  This is called morphological filtering. Suppose we take an image and apply   shot noise to it: >> c=imread(’circles.tif’); >> x=rand(size(c)); >> d1=find(x<=0.05); >> d2=find(x>=0.95); >> c(d1)=0; >> c(d2)=1; >> imshow(c) The result is shown as figure 11.15(a). The filterWe have discussed the Fourier transform and its uses in chapter 9. However, asing process can be implemented with >> cf1=imclose(imopen(c,sq),sq); >> figure,imshow(cf1) >> cf2=imclose(imopen(c,cr),cr); >> figure,imshow(cf2) and the results are shown as figures 11.15(b) and (c). The results are rather “blocky”; although less so with the cross structuring element. (a) (b) (c) Figure 11.15: A noisy binary image and the result after morphological fi 11.5. THE HIT-OR-MISS TRANSFORM 211 11.4.3 Relationship between opening and closing Opening and closing share a relationship very similar to that of erosion and dilation: the complement of an opening is equal to the closing of a complement, and complement of an closing is equal to the opening of a complement. Specifically: ! ! and  ! !  These can be demonstrated using similar techniques to those in section 11.3.3. 11.5 The hit-or-miss transform This is a powerful method for finding shapes in images. As with all other morphological algorithms, it can be defined entirely in terms of dilation and erosion; in this case, erosion only. Suppose we wish to locate    square shapes, such as is in the centre of the image in figure 11.16. We have discussed the Fourier transform and its uses in chapter 9. However, as Figure 11.16: An image  containing a shape to be found If we performed an erosion ! with ! being the square structuring element, we would obtain the result given in figure 11.17. Figure 11.17: The erosion  The result contains two pixels, as there are exactly two places in where ! will fit. Now suppose we also erode the complement of with a structuring element " which fits exactly around the    square; and " are shown in figure 11.18. (We assume that   is at the centre of ".) If we now perform the erosion " we would obtain the result shown in figure 11.19. The intersection of the two erosion operations would produce just one pixel at the position of the centre of the    square in , which is just what we want. If ha 212 CHAPTER 11. MORPHOLOGY : ": Figure 11.18: The complement and the second structuring element Figure 11.19: The erosion  square, the final result would have been single pixels at the positions of the centres of each. This combination of erosions forms the hit-or-miss transform. In general, if we are looking for a particular shape in an image, we design two structuring elements: ! which is the same shape, and !  which fits around the shape. We then write ! ! !  and  !  !   !   for the hit-or-miss transform. As an example, we shall attempt to find the hyphen in “Cross-Correlation” in the text image shown in figure 11.5. This is in fact a line of pixels of length six. We thus can create our two structuring elements as: >> b1=ones(1,6); >> b2=[1 1 1 1 1 1 1 1;1 0 0 0 0 0 0 1; 1 1 1 1 1 1 1 1]; >> tb1=erode(t,b1); >> tb2=erode(~t,b2); >> hit_or_miss=tb1&tb2; >> [x,y]=find(hit_or_miss==1) and this returns a coordinate of     , which is right in the middle of the hyphen. Note that the command >> tb1=erode(t,b1); is not sufficient, as there are quite a few lines of length six in this image. We can see this by viewing the image tb1, which is given in fig 11.6. SOME MORPHOLOGICAL ALGORITHMS 213 Figure 11.20: Text eroded by a hyphen-shaped structuring element 11.6 Some morphological algorithms In this section we shall investigate some simple algorithms which use some of the morphological techniques we have discussed in previous sections. 11.6.1 Region filling Suppose in an image we have a region bounded by an -connected boundary, as shown in figure 11.21. Figure 11.21: An -connected boundary of a region to be filled Given a pixel within the region, we wish to fill up the entire region. To do this, we start with , and dilate as many times as necessary with the cross-shaped structuring element ! (as used in figure 11.6), each time taking an intersection with before continuing. We thus create a sequen 214 CHAPTER 11. MORPHOLOGY of sets:         for which      !  Finally  is the filled region. Figure 11.22 shows how this is done. :        Figure 11.22: The process of filling a region In the right hand grid, we have           Note that the use of the cross-shaped structuring element means that we never cross the boundary. 11.6.2 Connected components We use a very similar algorithm to fill a connected component; we use the cross-shaped structuring element for -connected components, and the square structuring element for -connected components. Starting with a pixel , we fill up the rest of the component by creating a sequence of sets       such that      ! until    . Figure 11.23 shows an example. In each case we are starting in the centre of the square in the lower left. As this square is itself a -connected component, the cross structuring element cannot go beyond it. Both of these algorithms can be very easily implemented by Matlab functions. To implement region filling, we keep track of two images: current an 11.6. SOME MORPHOLOGICAL ALGORITHMS 215     Using the cross              Using the square Figure 11.23: Filling connected components difference between them. We start with previous being the single point in the region, and current the dilation   ! . At the next step we set           !  Given !, we can implement the last step in Matlab by imdilate(current,B)&~A. The function is shown in figure 11.24 We can use this to fill a particular region delineated by a function out=regfill(im,pos,kernel) % REGFILL(IM,POS,KERNEL) performs region filling of binary image IMAGE, % with kernel KERNEL, starting at point with coordinates given by POS. % % Example: % n=imread(’nicework.tif’); % nb=n&~imerode(n,ones(3,3)); % nr=regfill(nb,[74,52],ones(3,3)); % current=zeros(size(im)); last=zeros(size(im)); last(pos(1),pos(2))=1; current=imdilate(last,kernel)&~im; while any(current(:)~=last(:)), last=current; current=imdilate(last,kernel)&~im; end; out=current; Figure 11.24: A simple program for filling regions boundary. >> n=imread(’nicework.tif’); >> imshow(n),pixval on >> nb=n&~imerod 216 CHAPTER 11. MORPHOLOGY >> figure,imshow(nb) >> nf=regfill(nb,[74,52],sq); >> figure,imshow(nf) The results are shown in figure 11.25. Image (a) is the original; (b) the boundary, and (c) the result of a region fill. Figure (d) shows a variation on the region filling, we just include all boundaries. This was obtained with >> figure,imshow(nf|nb) (a) (b) (c) (d) Figure 11.25: Region filling The function for connected components is almost exactly the same as that for region filling, except that whereas for region filling we took an intersection with the complement of our image, for connected components we take the intersection with the image itself. Thus we need only change one line, and the resulting function is shown in 11.26 We can experiment with this function with function out=components(im,pos,kernel) % COMPONENTS(IM,POS,KERNEL) produces the connected component of binary image % IMAGE which nicludes the point with coordinates given by POS, using % kernel KERNEL. % % Example: % n=imread(’nicework.tif’); % nc=components(nb,[74,52],ones(3,3)); % current=zeros(size(im)); last=zeros(size(im)); last(pos(1),pos(2))=1; current=imdilate(last,kernel)&im; while any(current(:)~=last(:)), last=current; current=imdilate(last,kernel)&im; end; out=current; Figure 11.26: A simple program for connected components 11.6. SOME MORPHOLOGICAL ALGORITHMS 217 the “nice work” image. We shall use the square structuring element, and also a larger structuring element of size      . >> sq2=ones(11,11); >> nc=components(n,[57,97],sq); >> imshow(nc) >> nc2=components(n,[57,97],sq2); >> figure,imshow(nc2) and the results are shown in figure 11.27. Image (a) uses the    square; image (b) uses the      square. (a) (b) Figure 11.27: Connected components 11.6.3 Skeletonization Recall that the skeleton of an object can be defined by the “medial axis transform”; we may imagine fires burning in along all edges of the object. The places where the lines of fire meet form the skeleton. The skeleton may be produced by morphological methods. Consider the table of operations as shown in table 11.1. Erosions Openings Set differences !   !  !  ! !  +!   +! ! #!  #! !  #!    #! ! #!  #! !  #!    #! ! . . . . . . . . . !  ! !  !    ! ! 218 CHAPTER 11. MORPHOLOGY Here we use the convention that a sequence of erosions using the same structuring element ! is denoted !. We continue the table until  ! &! is empty. The skeleton is then obtained by taking the unions of all the set differences. An example is given in figure 11.28, using the cross structuring element. !   ! !  ! !  !    ! !  #!  #! !  #!    #! ! Figure 11.28: Skeletonization Since  #! ! is empty, we stop here. The skeleton is the union of all the sets in the third column; it is shown in figure 11.29. This algorithm again can be implemented very easily; a function to do so is shown in figure 11.30. We shall experiment with the nice work image. >> nk=imskel(n 11.6. SOME MORPHOLOGICAL ALGORITHMS 219 Figure 11.29: The final skeleton function skel = imskel(image,str) % IMSKEL(IMAGE,STR) - Calculates the skeleton of binary image IMAGE using % structuring element STR. This function uses Lantejoul’s algorithm. % skel=zeros(size(image)); e=image; while (any(e(:))), o=imopen(e,str); skel=skel | (e&~o); e=imerode(e,str); end Figure 11.30: A simple program for computing skeletons 220 CHAPTER 11. MORPHOLOGY >> figure,imshow(nk2) The result is shown in figure 11.31. Image (a) is the result using the square structuring element; Image (b) is the result using the cross structuring element. (a) (b) Figure 11.31: Skeletonization of a binary image Exercises 1. For each of the following images and structuring elements !: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 0 0 1 1 1 1 1 1 0 0 0 0 0 0 1 1 0 0 0 0 1 1 1 1 0 0 1 1 1 1 1 1 0 0 1 1 1 0 1 1 0 0 1 1 1 1 1 1 0 0 1 1 0 0 1 1 0 0 1 1 1 0 1 1 0 0 1 1 1 1 1 1 0 0 1 1 0 0 1 1 0 0 1 1 1 0 1 1 0 0 1 1 1 1 0 0 0 0 1 1 1 1 1 1 0 0 1 1 1 0 0 0 0 0 1 1 1 1 0 0 0 0 1 1 1 1 1 1 0 0 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ! 0 1 0 1 1 1 1 0 0 1 1 1 1 1 1 0 0 0 0 1 0 1 1 1 0 0 1 calculate the erosion  !, the dilation  !, the opening ! and the closing !. Check your answers with Matlab. 2. Using the binary images circbw.tif, circles.tif, circlesm.tif, logo.tif and testpat2.tif, view the erosion and dilation with both the square and the cross structuring elements. Can you see any d 11.6. SOME MORPHOLOGICAL ALGORITHMS 221 3. Read in the image circlesm.tif. (a) Erode with squares of increasing size until the image starts to split into disconnected components. (b) Using pixval on, find the coordinates of a pixel in one of the components. (c) Use the components function to isolate that particular component. 4. (a) With your disconnected image from the previous question, compute its boundary. (b) Again with pixval on, find a pixel inside one of the boundaries. (c) Use the regfill function to fill that region. (d) Display the image as a boundary with one of the regions filled in. 5. Using the    square structuring element, compute the skeletons of (a) a  square, (b) a   rectangle, (c) an L shaped figure formed from an  square with a   square taken from a corner, (d) an H shaped figure formed from a      square with    squares taken from the centres of the top and bottom, (e) a cross formed from an      square with    squares taken from each corner. In each case check your answer with Matlab 6. Repeat the above question but use the cross structuring element. 7. For the images listed in question 2, obtain their skeletons by both the bwmorph function, and by using the function given in figure 11.30. Which seems to provide the best result? 8. Use the hit-or-miss transform with appropriate structuring elements to find the dot on the “ i ” in the word “ in ” in the image text.tif 222 CHAPTER 11. MORPHOLOGY Chapter 12 Colour processing For human beings, colour provides one of the most important descriptors of the world around us. The human visual system is particularly attuned to two things: edges, and colour. We have mentioned that the human visual system is not particularly good at recognizing subtle changes in grey values. In this section we shall investigate colour briefly, and then some methods of processing colour images 12.1 What is colour? Colour study consists of 1. the physical properties of light which give rise to colour, 2. the nature of the human eye and the ways in which it detects colour, 3. the nature of the human vision centre in the brain, and the ways in which messages from the eye are perceived as colour. Physical aspects of colour Visible light is part of the electromagnetic spectrum: radiation in which the energy takes the form of waves of varying wavelength. These range from cosmic rays of very short wavelength, to electric power, which has very long wavelength. Figure 12.1 illustrates this. The values for the wavelengths of blue, green and red were set in 1931 by the CIE (Commission Internationale d’Eclairage), an organization responsible for colour standards. Perceptual aspects of colour The human visual system tends to perceive colour as being made up of varying amounts of red, green and blue. That is, human vision is particularly sensitive to these colours; this is a function of the cone cells in the retina of the eye. These values are called the primary colours. If we add together any two primary colours we obtain the secondary colours: magenta (purple) red blue cyan green blue yellow red green  224 CHAPTER 12. COLOUR PROCESSING Cosmic rays Gamma rays X-rays UV light VISIBLE LIGHT Infra-red Microwaves TV Radio Electric Power                          Blue Green Red                    Figure 12.1: The electromagnetic spectrum and colours The amounts of red, green, and blue which make up a given colour can be determined by a colour matching experiment. In such an experiment, people are asked to match a given colour (a colour source) with different amounts of the additive primaries red, green and blue. Such an experiment was performed in 1931 by the CIE, and the results are shown in figure 12.2. Note that for some wavelengths, various of the red, green or blue values are negative. This is a physical impossibility, but it can be interpreted by adding the primary beam to the colour source, to maintain a colour match. To remove negative values from colour information, the CIE introduced the XYZ colour model. The values of , and  can be obtained from the corresponding  ,  and ! values by a linear transformation:                               !    The inverse transformation is easily obtained by inverting the matrix:    !                                     The XYZ colour matching functions corresponding to the  , , ! curves of figure 12.2 are shown in figure 12.3. The matrices given are not fixed; other matrices can be defined according to the definition of the colour white. Different definitions of 12.1. WHAT IS COLOUR? 225 350 400 450 500 550 600 650 700 750 800 850 −1 −0.5 0 0.5 1 1.5 2 2.5 Blue Green Red Figure 12.2: RGB colour matching functions (CIE, 1931) A note on the diagrams The diagrams shown in figures 12.3 and 12.3 were obtained from the text file ciexyz31.txt1 which lists the XYZ values corresponding to colours of different wavelengths. Figure 12.4 shows a simple function which takes the relevant information out of this file and plots it. Figure 12.5 shows the similar function for plotting the RGB values (obtained from their XYZ counterparts by the linear transformation above). The CIE required that the component corresponded with luminance, or perceived brightness of the colour. That is why the row corresponding to in the first matrix (that is, the second row) sums to 1, and also why the curve in figure 12.3 is symmetric about the middle of the visible spectrum. In general, the values of , and  needed to form any particular colour are called the tristimulus values. Values corresponding to particular colours can be obtained from published tables. In order to discuss colour independent of brightness, the tristimulus values can be normalized by dividing by  :       1This file can be obtained from the Colour & Vision Research Laboratories web page h 226 CHAPTER 12. COLOUR PROCESSING 350 400 450 500 550 600 650 700 750 800 850 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 Z X Y Figure 12.3: XYZ colour matching functions (CIE, 1931) function plotxyz() % % This function simply plots the colour matching curves for CIE XYZ (1931), % obtaining the data from the file ciexyz31.txt % wxyz=load(’ciexyz31.txt’); w=wxyz(:,1); x=wxyz(:,2); y=wxyz(:,3); z=wxyz(:,4); figure,plot(w,x,’-k’,w,y,’.k’,w,z,’--k’) text(600,1.15,’X’,’Fontsize’,12) text(550,1.1,’Y’,’Fontsize’,12) text(460,1.8,’Z’,’Fontsize’,12) Figure 12.4: A function for plotting the XYZ curves 12.2. COLOUR MODELS 227 function plotrgb() % % This function simply plots the colour matching curves for CIE RGB (1931), % obtaining the original XYZ data from the file ciexyz31.txt % wxyz=load(’ciexyz31.txt’); x2r=[3.063 -1.393 -0.476;-0.969 1.876 0.042;0.068 -0.229 1.069]; xyz=wxyz(:,2:4)’; rgb=x2r*xyz; w=wxyz(:,1); figure,plot(w,rgb(1,:)’,’-k’,w,rgb(2,:)’,’.k’,w,rgb(3,:)’,’--k’) text(450,2,’Blue’,’Fontsize’,12) text(530,1.7,’Green’,’Fontsize’,12) text(640,1.7,’Red’,’Fontsize’,12) Figure 12.5: A function for plotting the RGB curves and so    . Thus a colour can be specified by  and  alone, called the chromaticity coordinates. Given , , and , we can obtain the tristimulus values and  by working through the above equations backwards:           We can plot a chromaticity diagram, again using the ciexyz31.txt file of XYZ values: >> z=zeros(size(xyz)); >> xy=xyz./(sum(xyz’)’*[1 1 1]); >> x=xy(:,1)’; >> y=xy(:,2)’; >> figure,plot([x x(1)],[y y(1)]),axis square Here the matrix xyz consists of the second, third and fourth columns of the data, and plot is a function which draws a polygon with vertices taken from the x and y vectors. The extra x(1) and y(1) ensures that the polygon joins up. The result is shown in figure 12.6. The values of  and  which lie within the horseshoe shape in figure 12.6 represent values which correspond to physically realizable colours. 12.2 Colour models A colour model is a method for specifying colours in some standard way. It generally consists of a three dimensional coordinate system and a subspace of that system in which each colour is represented by a single point. We shall investigate three 228 CHAPTER 12. COLOUR PROCESSING 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Figure 12.6: A chromaticity diagram 12.2.1 RGB In this model, each colour is represented as three values  ,  and !, indicating the amounts of red, green and blue which make up the colour. This model is used for displays on computer screens; a monitor has three independent electron “guns” for the red, green and blue component of each colour. We may imagine all the colours sitting inside a “colour cube” of side  :  !    Black    Red    Green    Blue     Magenta     Yellow     Cyan   12.2. COLOUR MODELS 229 The colours along the black-white diagonal, shown in the diagram as a dotted line, are the points of the space where all the  , , ! values are equal. They are the different intensities of grey. RGB is the standard for the display of colours: on computer monitors; on TV sets. But it is not a very good way of describing colours. How, for example, would you define light brown using RGB? Note also from figure 12.2 that some colours require negative values of  ,  or !. These colours are not realizable on a computer monitor or TV set, on which only positive values are possible. The colours corresponding to positive values form the RGB gamut; in general a colour “gamut” consists of all the colours realizable with a particular colour model. We can plot the RGB gamut on a chromaticity diagram, using the xy coordinates obtained above. To define the gamut, we shall create a      array, and to each point    in the array, associate an XYZ triple defined by             . We can then compute the corresponding RGB triple, and if any of the RGB values are negative, make the output value white. This is easily done with the simple function shown in figure 12.7. function res=gamut() global cg; x2r=[3.063 -1.393 -0.476;-0.969 1.876 0.042;0.068 -0.229 1.069]; cg=zeros(100,100,3); for i=1:100, for j=1:100, cg(i,j,:)=x2r*[j/100 i/100 1-i/100-j/100]’; if min(cg(i,j,:))<0, cg(i,j,:)=[1 1 1]; end; end; end; res=cg; Figure 12.7: Computing the RGB gamut We can then display the gamut inside the chromaticity figure by >> imshow(cG),line([x’ x(1)],[y’ y(1)]),axis square,axis xy,axis on and the result is shown in figure 12.8. 12.2.2 HSV HSV stands for Hue, Saturation, Value. These terms have the following meanings: Hue: The “true colour” attribute (red, green, blue, orange, yellow, and so on). Saturation: The amount by which the colour as been diluted with white. The more white in the colour, the lower the saturation. So a deep red has high saturation, and a light red (a pinkish colour) has low saturation. Value: The degree of brightness: a well lit colour has high intensity; a dark colour has 230 CHAPTER 12. COLOUR PROCESSING 10 20 30 40 50 60 70 80 90 100 10 20 30 40 50 60 70 80 90 100 Figure 12.8: The RGB gamut This is a more intuitive method of describing colours, and as the intensity is independent of the colour information, this is a very useful model for image processing. We can visualize this model as a cone, as shown in figure 12.9. Any point on the surface represents a purely saturated colour. The saturation is thus given as the relative distance to the surface from the central axis of the structure. Hue is defined to be the angle measurement from a pre-determined axis, say red. 12.2.3 Conversion between RGB and HSV Suppose a colour is specified by its RGB values. If all the three values are equal, then the colour will be a grey scale; that is, an intensity of white. Such a colour, containing just white, will thus have a saturation of zero. Conversely, if the RGB values are very different, we would expect the resulting colour to have a high saturation. In particular, if one or two of the RGB values are zero, the saturation will be one, the highest possible value. Hue is defined as the fraction around the circle starting from red, which thus has a hue of zero. Reading around the circle in figure 12.9 produces the following hues: 12.2. COLOUR MODELS 231 Black 0 Saturation 1 0 1 Value Cyan Red Green Yellow Blue Magenta White Figure 12.9: The colour space HSV as a cone Colour Hue Red Yellow     Green      Cyan   Blue    Magenta     Suppose we are given three  , , ! values, which we suppose to be between 0 and 1. So if they are between 0 and 255, we first divide each value by 255. We then define:    !    ! To obtain a value for Hue, we consider several cases: 1. if  then      ! , 2. if  then   232 CHAPTER 12. COLOUR PROCESSING 3. if ! then        . If  ends up with a negative value, we add 1. In the particular case   !   , for which both , we define     . For example, suppose   !       We have                          Since !  we have              Conversion in this direction is implemented by the rgb2hsv function. This is of course designed to be used on    arrays, but let’s just experiment with our previous example: >> rgb2hsv([0.2 0.4 0.6]) ans = 0.5833 0.6667 0.6000 and these are indeed the , and values we have just calculated. To go the other way, we start by defining:                       Since  is a integer between 0 and 5, we have six cases to consider:    !    Let’s take the HSV values we computed above. We have:                     12.2. COLOUR MODELS 233 Since   we have   !          Conversion from HSV to RGB is implemented by the hsv2rgb function. 12.2.4 YIQ This colour space is used for TV/video in America and other countries where NTSC is the video standard (Australia uses PAL). In this scheme Y is the “luminance” (this corresponds roughly with intensity), and I and Q carry the colour information. The conversion between RGB is straightforward:                                   !   and    !                                   The two conversion matrices are of course inverses of each other. Note the difference between Y and I:            #!         ! This reflects the fact that the human visual system assigns more intensity to the green component of an image than to the red and blue components. Since YIQ is a linear transformation of RGB, we can picture YIQ to be a parallelepiped (a rectangular box which has been skewed in each direction) for which the Y axis lies along the central   to      line of RGB. Figure 12.10 shows this. Figure 12.10: The RGB cube and its YIQ transformation That the conversions are linear, and hence easy to do, makes this a good choice for colour image processing. Conversion between RGB 234 CHAPTER 12. COLOUR PROCESSING 12.3 Colour images in Matlab Since a colour image requires three separate items of information for each pixel, a (true) colour image of size   is represented in Matlab by an array of size   : a three dimensional array. We can think of such an array as a single entity consisting of three separate matrices aligned vertically. Figure 12.11 shows a diagram illustrating this idea. Suppose we read in an RGB image: Blue Green Red Figure 12.11: A three dimensional array for an RGB image >> x=imread(’lily.tif’); >> size(x) ans = 186 230 3 We can isolate each colour component by the colon operator: x(:,:,1) The first, or red component x(:,:,2) The second, or green component x(:,:,3) The third, or blue component These can all be viewed with imshow: >> imshow(x) >> figure,imshow(x(:,:,1)) >> figure,imshow(x(:,:,1)) >> figure,imshow(x(:,:,2)) These are all shown in figure 12.12. Notice how the colours with particular hues show up wi 12.3. COLOUR IMAGES IN MATLAB 235 A colour image Red component Green component Blue component Figure 12.12: An RGB colour image and its components high intensities in their respective components. For the rose in the top right, and the flower in the bottom left, both of which are predominantly red, the red component shows a very high intensity for these two flowers. The green and blue components show much lower intensities. Similarly the green leaves—at the top left and bottom right—show up with higher intensity in the green component than the other two. We can convert to YIQ or HSV and view the components again: >> xh=rgb2hsv(x); >> imshow(xh(:,:,1)) >> figure,imshow(xh(:,:,2)) >> figure,imshow(xh(:,:,3)) and these are shown in figure 12.13. We can do precisely the same thing for the YIQ colour space: Hue Saturation Value Figure 12.13: The HSV components >> xn=rgb2ntsc(x); >> imshow(xn(:,:,1)) >> figure,imshow(xn(:,:,2)) >> figure,imshow(xn(:,:,3)) and these are shown in figure 12.14. Notice that the Y component of YIQ gives a better greyscale version of the image than the value of HSV. The top right rose, in particular, is quite washed out in figure 12.13 (Value), but shows better contrast in figure 12.14 (Y). We shall see below how to put three matrices, obtained by operations on the separate components, back into a single three dimensional array for display. 236 CHAPTER 12. COLOUR PROCESSING Y I Q Figure 12.14: The YIQ components 12.4 Pseudocolouring This means assigning colours to a grey-scale image in order to make certain aspects of the image more amenable for visual interpretation—for example, for medical images. There are different methods of pseudocolouring. 12.4.1 Intensity slicing In this method, we break up the image into various grey level ranges. We simply assign a different colour to each range. For example: grey level: –   –    –    –   colour: blue magenta green red We can consider this as a mapping, as shown in figure 12.15. blue magenta green red colour         grey level Figure 12.15: Intensity slicing as a mapping 12.4.2 Grey—Colour transformations We have three functions     ,     ,     which assign red, green and blue values to each grey level . These values (with appropriate scaling, if necessary) are then used for display. Using an appropriate set of functions can enhance a grey-scale image with impress 12.4. PSEUDOCOLOURING 237    grey levels     The grey level  in the diagram is mapped onto red, green and blue values of   ,    and   respectively. In Matlab, a simple way to view an image with added colour is to use imshow with an extra colormap parameter. For example, consider the image blocks.tif. We can add a colourmap with the colormap function; there are several existing colourmaps to choose from. Figure 12.16 shows the children’s blocks image (from figure 1.4) after colour transformations. We created the colour (a) (b) Figure 12.16: Applying a colour map to a greyscale image image (a) with: >> b=imread(’blocks.tif’); >> imshow(b,colormap(jet(256)) However, a bad choice of colourmap can ruin an image. Image (b) in figure 12.16 is an example of this, where we apply the vga colourmap. Since this only has 16 rows, we need to reduce the number of greyscales in the image to 16. This is done with the grayslice function: >> b16=grayslice(b,16); >> figure,imshow(b16,colorm 238 CHAPTER 12. COLOUR PROCESSING The result, although undeniably colourful, is not really an improvement on the original image. The available colourmaps are listed in the help file for graph3d: v - Hue-saturation-value color map. t - Black-red-yellow-white color map. ay - Linear gray-scale color map. ne - Gray-scale with tinge of blue color map. pper - Linear copper-tone color map. nk - Pastel shades of pink color map. ite - All white color map. ag - Alternating red, white, blue, and black color map. nes - Color map with the line colors. lorcube - Enhanced color-cube color map. a - Windows colormap for 16 colors. t - Variant of HSV. ism - Prism color map. ol - Shades of cyan and magenta color map. tumn - Shades of red and yellow color map. ring - Shades of magenta and yellow color map. nter - Shades of blue and green color map. mmer - Shades of green and yellow color map. There are help files for each of these colourmaps, so that >> help hsv will provide some information on the hsv colourmap. We can easily create our own colourmap: it must by a matrix with 3 columns, and each row consists of RGB values between 0.0 and 1.0. Suppose we wish to create a blue, magenta, green, red colourmap as shown in figure 12.15. Using the RGB values: Colour Red Green blue Blue 0 0 1 Magenta 1 0 1 Green 0 1 0 Red 1 0 0 we can create our colourmap with: >> mycolourmap=[0 0 1;1 0 1;0 1 0;1 0 0]; Before we apply it to the blocks image, we need to scale the image down so that there are only the four greyscales 0, 1, 2 and 3: >> b4=grayslice(b,4); >> imshow(b4,mycolourmap) and the result is shown in figure 12.17. 12.5. PROCESSING OF COLOUR IMAGES 239 Figure 12.17: An image coloured with a “handmade” colourmap 12.5 Processing of colour images There are two methods we can use: 1. we can process each R, G, B matrix separately, 2. we can transform the colour space to one in which the intensity is separated from the colour, and process the intensity component only. Schemas for these are given in figures 12.18 and 12.19. We shall consider a number of different image processing tasks, and apply either of the above schema to colour images. Contrast enhancement This is best done by processing the intensity component. Suppose we start with the image cat.tif, which is an indexed colour image, and convert it to a truecolour (RGB) image. >> [x,map]=imread(’cat.tif’); >> c=ind2rgb(x,map); Now we have to convert from RGB to YIQ, so as to be able to isolate the intensity component: >> cn=rgb2ntsc(c); Now we apply histogram equalization to the intensity component, and convert back to RGB for display: >> cn(:,:,1)=histeq(cn(:,:,1)); >> c2=ntsc2rgb(cn); >> imshow(c2) The result is shown in figure 12.20. Whether this is an improvement is debatable, but it has had its contrast enhanced. But suppose we try to apply histogram equalization to each of the RGB components: 240 CHAPTER 12. COLOUR PROCESSING Image   !   ! Output Figure 12.18: RGB processing   Image         Output Figure 12.19: Intensity proces 12.5. PROCESSING OF COLOUR IMAGES 241 >> cr=histeq(c(:,:,1)); >> cg=histeq(c(:,:,2)); >> cb=histeq(c(:,:,3)); Now we have to put them all back into a single 3 dimensional array for use with imshow. The cat function is what we want: >> c3=cat(3,cr,cg,cb); >> imshow(c3) The first variable to cat is the dimension along which we want our arrays to be joined. The result is shown for comparison in figure 12.20. This is not acceptable, as some strange colours have been introduced; the cat’s fur has developed a sort of purplish tint, and the grass colour is somewhat washed out. Intensity processing Using each RGB component Figure 12.20: Histogram equalization of a colour image Spatial filtering It very much depends on the filter as to which schema we use. For a low pass filter, say a blurring filter, we can apply the filter to each RGB component: >> a15=fspecial(’average’,15); >> cr=filter2(a15,c(:,:,1)); >> cg=filter2(a15,c(:,:,2)); >> cb=filter2(a15,c(:,:,3)); >> blur=cat(3,cr,cg,cb); >> imshow(blur) and the result is shown in figure 12.21. We could also obtain a similar effect by applying the filter to the intensity component only. But for a high pass filter, for example an unsharp masking filter, we are better off working with the intensity component only: >> cn=rgb2ntsc(c); >> a=fspecial(’unsharp’); 242 CHAPTER 12. COLOUR PROCESSING >> cn(:,:,1)=filter2(a,cn(:,:,1)); >> cu=ntsc2rgb(cn); >> imshow(cu) and the result is shown in figure 12.21. In general, we will obtain reasonable results using the Low pass filtering High pass filtering Figure 12.21: Spatial filtering of a colour image intensity component only. Although we can sometimes apply a filter to each of the RGB components, as we did for the blurring example above, we cannot be guaranteed a good result. The problem is that any filter will change the values of the pixels, and this may introduce unwanted colours. Noise reduction As we did in chapter 7, we shall use the image twins.tif: but now in full colour! >> tw=imread(’twins.tif’); Now we can add noise, and look at the noisy image, and its RGB components: >> tn=imnoise(tw,’salt & pepper’); >> imshow(tn) >> figure,imshow(tn(:,:,1)) >> figure,imshow(tn(:,:,2)) >> figure,imshow(tn(:,:,3)) These are all shown in figure 12.22. It would appear that we should apply median filtering to each of the RGB components. This is easily done: >> trm=medfilt2(tn(:,:,1)); >> tgm=medfilt2(tn(:,:,2)); >> tbm=medfilt2(tn(:,:,3)); >> tm=cat(3,trm,tgm,tbm); >> imshow(tm) and the result is shown in figure 12.23. We can’t in this instance apply the median filter to the intensity component only, because the conversion from RGB to YIQ spreads the noise across all the YIQ components. If we remove the noise from Y only: 12.5. PROCESSING OF COLOUR IMAGES 243 Salt & pepper noise The red component The green component The blue component Figure 12.22: Noise on a colour image 244 CHAPTER 12. COLOUR PROCESSING >> tnn=rgb2ntsc(tn); >> tnn(:,:,1)=medfilt2(tnn(:,:,1)); >> tm2=ntsc2rgb(tnn); >> imshow(tm2) we see, as shown in figure 12.23 that the noise has been slightly diminished, but it is still there. Denoising each RGB component Denoising Y only Figure 12.23: Attempts at denoising a colour image Edge detection An edge image will be a binary image containing the edges of the input. We can go about obtaining an edge image in two ways: 1. we can take the intensity component only, and apply the edge function to it, 2. we can apply the edge function to each of the RGB components, and join the results. To implement the first method, we start with the rgb2gray function: >> fg=rgb2gray(f); >> fe1=edge(fg); >> imshow(fe1) Recall that edge with no parameters implements Sobel edge detection. The result is shown in figure 12.24. For the second method, we can join the results with the logical “or”: >> f1=edge(f(:,:,1)); >> f2=edge(f(:,:,2)); >> f3=edge(f(:,:,3)); >> fe2=f1 | f2 | f3; >> figure,imshow(fe2) 12.5. PROCESSING OF COLOUR IMAGES 245 fe1: Edges after rgb2gray fe2: Edges of each RGB component Figure 12.24: The edges of a colour image and this is also shown in figure 12.24. The edge image fe2 is a much more complete edge image. Notice that the rose now has most of its edges, where in image fe1 only a few were shown. Also note that there are the edges of some leaves in the bottom left of fe2 which are completely missing from fe1. Exercises 1. By hand, determine the saturation and intensity components of the following image, where the RGB values are as given:                                                                                           2. Suppose the intensity component of an HSI image was thresholded to just two values. How would this affect the appearance of the image? 3. By hand, perform the conversions between RGB and HSV or YIQ, for the values:   !                               !                     246 CHAPTER 12. COLOUR PROCESSING 4. Check your answers to the conversions in question 3 by using the Matlab functions rgb2hsv, hsv2rgb, rgb2ntsc and ntsc2rgb. 5. Threshold the intensity component of a colour image, say flowers.tif, and see if the result agrees with your guess from question 2 above. 6. The image spine.tif is an indexed colour image; however the colours are all very close to shades of grey. Experiment with using imshow on the index matrix of this image, with varying colourmaps of length 64. Which colourmap seems to give the best results? Which colourmap seems to give the worst results? 7. View the image autumn.tif. Experiment with histogram equalization on: (a) the intensity component of HSV, (b) the intensity component of YIQ. Which seems to produce the best result? 8. Create and view a random “patchwork quilt” with: >> r=uint8(floor(256*rand(16,16,3))); >> r=imresize(r,16); >> imshow(r),pixval on What RGB values produce (a) a light brown colour? (b) a dark brown colour? Convert these brown values to HSV, and plot the hues on a circle. 9. Using the flowers image, see if you can obtain an edge image from the intensity component alone, that is as close as possible to the image fe2 in figure 12.24. What parameters to the edge function did you use? How close to fe2 could you get? 10. Add Gaussian noise to an RGB colour image x with >> xn=imnoise(x,’gaussian’); View your image, and attempt to remove the noise with (a) average filtering on each RGB component, (b) Wiener filtering on each RGB component. Chapter 13 Image coding and compression We have seen that image files can be very large. It is thus important for reasons both of storage and file transfer to make these file sizes smaller, if possible. In section 1.8 we touched briefly on the topic of compression; in this section we investigate some standard compression methods. 13.1 Lossless compression This refers to the compression keeping all information, so that the image can be decompressed with no loss of information. This is preferred for images of legal or scientific significance, where loss of data—even of apparent insignificance, could have considerable consequences. Unfortunately this style tends not to lead to high compression ratios. However, lossless compression is used as part of many standard image formats. Huffman coding The idea of Huffman coding is simple. Rather than using a fixed length code (8 bits) to represent the grey values in an image, we use a variable length code, with smaller length codes corresponding to more probable grey values. A small example will make this clear. Suppose we have a 2-bit greyscale image with only four grey levels: 0, 1, 2, 3, with the probabilities 0.2, 0.4, 0.3 and 0.1 respectively. That is, 20% of pixels in the image have grey value 50; 40% have grey value 100, and so on. The following table shows fixed length and variable length codes for this image: Grey value Probability Fixed code Variable code 0 0.2 00 000 1 0.4 01 1 2 0.3 10 01 3 0.1 11 001 Now consider how this image has been compressed. Each grey value has its own unique identifying code. The average number of bits per pixel can be easily calculated as the expected value (in a probabilistic sense):                         Notice that the longest codewords are associated with the lowest probabilities. Although this average is only slightly smaller than 2, it is smaller by a significant amoun 248 CHAPTER 13. IMAGE CODING AND COMPRESSION To obtain the Huffman code for a given image we proceed as follows: 1. Determine the probabilities of each grey value in the image. 2. Form a binary tree by adding probabilities two at a time, always taking the two lowest available values. 3. Now assign 0 and 1 arbitrarily to each branch of the tree from its apex. 4. Read the codes from the top down. To see how this works, consider the example of a 3-bit greyscale image (so the grey values are 0–7) with the following probabilities: Grey value 0 1 2 3 4 5 6 7 Probability 0.19 0.25 0.21 0.16 0.08 0.06 0.03 0.02 We can now combine probabilities two at a time as shown in figure 13.1. 7 6 5 4 3 2 1 0 0.02 0.03 0.06 0.08 0.16 0.21 0.25 0.19 0.05 0.11 0.19 0.35 0.60 0.40 1 Figure 13.1: Forming the Huffman code tree Note that if we have a choice of probabilities we choose arbitrarily. The second stage consists of arbitrarily assigning 0’s and 1’s to each branch of the tree just obtained. This is shown in figure 13.2. To obtain the codes for each grey value, start at the 1 on the top right, and work back towards the grey value in question, listing the numbers passed on the way. This produces: Grey value Huffman code 0 00 1 10 2 01 3 110 4 1110 5 11110 6 111110 7 111111 13.1. LOSSLESS COMPRESSION 249 7 6 5 4 3 2 1 0 0.02 0.03 0.06 0.08 0.16 0.21 0.25 0.19 0.05 0.11 0.19 0.35 0.60 0.40 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 Figure 13.2: Assigning 0’s and 1’s to the branches As above, we can evaluate the average number of bits per pixel as an expected value:                                             which is a significant improvement over 3 bits per pixel. Huffman codes are uniquely decodable, in that a string can be decoded in only one way. For example, consider the string            to be decoded with the Huffman code generated above. There is no code word 1, or 11, so we may take the first three bits 110 as being the code for grey value 3. Notice also that no other code word begins with this string. For the next few bits, we find that 1110 is a code word; no other begins with this string, and no other smaller string is a codeword. So we can decode this string as grey level 4. Continuing in this way we find:                            as the decoding for this string. For more information about Huffman coding, and its limitations and generalizations, see [5, 17]. Run length encoding Run length encoding (RLE) is based on a simple idea: to encode strings of zeros and ones by the number of repetitions in each string. RLE has become a standard in facsimile transmission. For a binary image, there are many different implementations of RLE; one method is to encode each line separately, starting with the number of 250 CHAPTER 13. IMAGE CODING AND COMPRESSION 0 0 1 1 1 0 1 1 1 0 0 1 0 1 1 1 1 0 0 0 0 1 1 1 1 0 0 0 1 1 would be encoded as                       Another method [20] is to encode each row as a list of pairs of numbers; the first number in each pair given the starting position of a run of 1’s, and the second number its length. So the above binary image would have the encoding                     Greyscale images can be encoded by breaking them up into their bit planes; these were discussed in chapter 4. To give a simple example, consider the following 4-bit image and its binary representation:                                              We may break it into bit planes as shown:          0th plane          1st plane       2nd plane         3rd plane and then each plane can be encoded separately using our chosen implementation of RLE. However, there is a problem with bit planes, and that is that small changes of grey value may cause significant changes in bits. For example, the change from value 7 to 8 causes the change of all four bits, since we are changing the binary strings 0111 to 1000. The problem is of course exacerbated for 8-bit images. For RLE to be effective, we should hope that long runs of very similar grey values would result in very good compression rates for the code. But as we see, this may not be the case. A 4-bit image consisting of randomly distributed 7’s and 8’s would thus result in uncorrelated bit planes, and little effective compression. To overcome this difficulty, we may encode the grey values with their binary Gray codes. A Gray code is an orderi 13.1. LOSSLESS COMPRESSION 251 between a string and the next. So a 4-bit Gray code is:                                               See [17] for discussion and detail. To see the advantages, consider the following 4-bit image with its binary and Gray code encodings:                                                                    where the first binary array is the standard binary encoding, and the second array the Gray codes. The binary bit planes are:          0th plane          1st plane          2nd plane        3rd plane and the bit planes corresponding to the Gray codes are: 0th plane 1st plane                 2nd plane   252 CHAPTER 13. IMAGE CODING AND COMPRESSION Exercises 1. Construct a Huffman code for each of the probability tables given: grey scale      probability (a)               (b)                     (c)                    In each case determine the average bits/pixel given by your code. 2. From your results of the previous question, what do think are the conditions of the probability distribution which give rise to a high compression rate using Huffman coding? 3. Encode each of the following binary images using run length encoding: (a) 1 0 0 1 1 1 0 1 0 1 1 1 1 0 0 1 1 1 0 1 1 1 0 1 1 0 1 0 1 1 0 1 1 1 1 0 (b) 1 0 1 0 0 0 0 0 1 1 0 1 1 1 0 0 0 0 0 0 0 0 1 1 1 1 1 1 0 0 1 1 1 0 0 0 4. Using run length encoding, encode each of the following -bit images: (a) 1 1 3 3 1 1 1 7 10 10 7 1 6 13 15 15 13 6 6 13 15 15 13 6 1 7 10 10 7 1 1 1 3 3 1 1 (b) 0 0 0 6 12 12 1 9 1 1 1 6 12 11 9 13 2 2 2 6 11 9 13 13 8 10 15 15 7 5 5 5 14 8 10 15 7 4 4 4 14 14 5 10 7 3 3 3 5. Decode the following run length encoded binary image, where each line has been encoded separately: 1 2 3 2 2 1 3 1 3 2 2 4 2 2 3 1 1 0 1 2 1 1 1 2 1 1 2 1 2 2 1 2 1 1 1 4 1 2 1 1 2 1 0 1 4 1 4 1 1 1 1 1 5 1 1 1 4 1 2 1 2 1 1 1 2 2 1 4 1 1 1 1 1 4 1 2 3 2 1 2 1 2 1 1 3 1 1 1 4 1 3 1 3 1 6 1 1 1 2 1 2 1 1 0 1 2 1 1 1 2 1 1 1 3 1 2 1 4 1 2 1 1 1 2 1 2 1 1 1 2 3 2 2 1 3 1 2 4 2 2 3 2 2 3 Can you describe the resulting image? 6. The following are the run-length encodings for a  4-bit image from most to least important bit-planes: 3 1 2 2 1 4 1 2 1 2 1 2 1 2 1 2 1 3 2 1 2 1 2 2 1 5 0 13.1. LOSSLESS COMPRESSION 253 Construct the image. 7. (a) Given the following -bit image: 0 4 4 4 4 4 6 7 0 4 5 5 5 4 6 7 1 4 5 5 5 4 6 7 1 4 5 5 5 4 6 7 1 4 4 4 4 4 6 7 2 2 8 8 8 10 10 11 2 2 9 9 9 12 13 13 3 3 9 9 9 15 14 14 transform it to a -bit image by removing the least most significant bit plane. Construct a Huffman code on the result and determine the average number of bits/pixel used by the code. (b) Now apply Huffman coding to the original image and determine the average number of bits/pixel used by the code. (c) Which of the two codes gives the best rate of compression? 254 CHAPTER 13. IMAGE CODING AND COMPRESSION Bibliography [1] Dana H. Ballard and Christopher M. Brown. Computer Vision. Prentice Hall, 1982. [2] Gregory A. Baxes. Digital Image Processing: Principles and Applications. John Wiley & Sons Inc., New York NY, 1994. [3] Wayne C. Brown and Barry J. Shepherd. Graphics File Formats: Reference and Guide. Manning Publications, 1995. [4] Kenneth R. Castleman. Digital Image Processing. Prentice Hall, 1979. [5] Rafael Gonzalez and Richard E. Woods. Digital Image Processing. Addison-Wesley, 2nd edition, 2002. [6] Duane Hanselman and Bruce R. Littlefield. Mastering Matlab 6. Prentice Hall, 2000. [7] Gerard J. Holzmann. Beyond Photography: the Digital Darkroom. Prentice Hall, 1988. [8] Bernd Jähne. Digital Image Processing. Springer-Verlag, 1991. [9] Anil K. Jain. Fundamentals of Digital Image Processing. Prentice Hall, 1989. [10] Ramesh Jain, Rangachar Kasturi, and Brian G. Schunk. Machine Vision. McGraw-Hill Inc., 1995. [11] Arne Jensen and Anders la Cour-Harbo. Ripples in Mathematics: the Discrete Wavelet Transform. Springer-Verlag, 2001. [12] David C. Kay and John R. Levine. Graphics File Formats. Windcrest/McGraw-Hill, 1995. [13] Jae S. Lim. Two-Dimensional Signal and Image Processing. Prentice Hall, 1990. [14] Vishvjit S. Nalwa. A Guided Tour of Computer Vision. Addison-Wesley, 1993. [15] James R. Parker. Algorithms for Image Processing and Computer Vision. John Wiley and Sons, 1997. [16] William K. Pratt. Digital Image Processing. John Wiley and Sons, second edition, 1991. [17] Majid Rabbani and Paul W. Jones. Digital Image Compression Techniques. SPIE Optical Engineering Press, 1991. [18] Greg Roelofs. PNG: The Definitive Guide. O’Reilly & Associates, 1999. 255 256 BIBLIOGRAPHY [19] Azriel Rosenfeld and Avinash C. Kak. Digital Picture Processing. Academic Press, second edition, 1982. [20] Milan Sonka, Vaclav Hlavac, and Roger Boyle. Image Processing, Analysis and Machine Vision. PWS Publishing, second edition, 1999. [21] James S. Walker. Fast Fourier Transforms. CRC Press, second edition, 1996. [22] Alan Watt and Fabio Policarpo. The Computer Image. Addison-Wesley, 1998. Index averaging filter, see filter, average binary morphology closing, 206 binary image, see digital image, binary binary morphology boundary detection, 203 dilation, 196 erosion, 199 external bounary, 203 filtering, 210 hit-or-miss transform, 211 internal boundary, 203 kernel, 198 morphological gradient, 203 noise removal, 209 opening, 206 reflection, 196 region filling, 213 skeletonization, 217 structuring element, 198 translation, 195 bit planes, 44, 250 least significant, 45 most significant, 45 BMP image, see file types, Microsoft BMP bniary morphology connected components, 214 boundary, 203 Butterworth filter functions, 152 high pass, 156 in Matlab, 154 low pass, 154 order, 154 chromaticity coordinates, 227 chromaticity diagram, 227 colour hue, 229 perception, 223 physical properties, 223 processing, 239–245 pseudocolouring, 236 RGB gamut, 229 RGB, HSV conversion, 230 saturation, 229 value, 229 XYZ model, 224 colour cube, 228 colour gamut, 229 colour matching, 224 colour model, 227 HSV, 229 RGB, 228 YIQ, 233 colour processing contrast enhancement, 239 edge detection, 244 histogram equalization, 239 noise removal, 242 spatial filtering, 241 complement, 55 compression lossless, 247 convolution theorem, 140 DCT, see discrete cosine transform deletable pixels, see pixels, deletability DFT, see discrete Fourier transform DICOM image, see file types, DICOM differences, 113 digital image, 1 binary, 8 greyscale, 8, 33 indexed, 9, 35 colour map, 36 index, 36 RGB, see digital image, true colour true colour, 9, 35, 234 discrete Fourier transform, 131 distance transform, 180 fast method, 182 in Matlab, 184–188 mask, 181 skeletonization, 189 edge definition, 111 differences of grey values, 111 257 258 INDEX enhancement, 122 edge detection colour images, 244 Laplacian filter, 119 LoG, 121 Marr-Hildreth, 120 Prewitt filters, 114 Roberts cross-gradient filters, 117 Sobel filters, 117 zero crossings, 120 Euclidean distance, 180 external boundary, 203 fast Fourier transform, 136 FFT, see fast Fourier transform filter average, 76, 82 band reject, 160 Butterworth, 152, see Butterworth filter difference, 113 edges of image, 80 frequency domain, 148 Gaussian, see Gaussian high boost, 125 high pass, 84 ideal, see ideal filter implementation of linear, 75 in MATLAB, 80 inverse, 161 Laplacian, 118 Laplacian of Gaussian, 121 linear, 75 low pass, 84 mask, 75 matrix notation, 79 maximum, 89 median, 98 minimum, 91 non-linear spatial, 89 Prewitt, 114 pseudo-median, 108 rank-order, 100 Roberts cross-gradient, 117 Sobel, 117 spatial, 75 unsharp mask, 123 Wiener, 105 Fourier transform comparison of DFT and FFT, 136 convolution theorem, 140 corrugation functions, 137 DC coefficient, 141 definition 2d DFT, 137 discrete decomposition, 131 displaying, 142, 145 FFT, 136 filtering, 148 ideal filtering, 149 inverse one dimensional DFT, 134 Matlab functions, 134 one dimensional DFT, 134 properties 1d, 135 properties 2d, 138 ringing, 150 scaling factor, 138 single edge, 144 spectrum, 142 trigonometric decomposition, 131 two dimensional DFT, 137 Fourier transform ringing, 148 frequency, 84 Gaussian frequency filter, 156 high pass filter, 158 low pass filter, 157 noise, 96 spatial filter, 87 Gaussian distribution, 87 GIF image, see file types, Compuserve GIF Gray codes, 250 greyscale image, see digital image, greyscale Guo-Hall, see skeleton, Guo-Hall algorithm high pass filter, see filter, high pass histogram, 56–67 definition, 56 equalization, 61 piecewise linear stretching, 61 stretching, 56 Hough transform, 169 accumulator array, 169 drawing lines, 177 implementation, 172 in Matlab, 174–180 line parameterization, 170 vertical lines, 170 Huffman coding, 247 ideal filter cutoffs, 151 functions, 152 high pass, 151 low pass, 149 image, 1 acquisition, 12 perception, 12 INDEX 259 image arithmetic addition, 52 clipping output values, 52 complement, 55 multiplication, 53 scaling, 42 subtraction, 52 image interpolation, se e interpolation image types, 8 impulse noise, 209, se e noise, salt and pepper indexed colour image, se e digital image, indexed internal boundary , 203 JPEG image, se e file types, JPEG lo w pass filter, se e filter, lo w pass luminance, 225, 233 mask distance transform, 181 spatial filter, 75 mathematical morphology , se e morphology Matlab , 15 Matlab colon operator, 20 colourmaps, 238 commands, 15 data types, 38 dot operators, 24 entering matrices, 19 functions, 15 matrix indexing, 19 measuring time, 27 multidimensional arra y , 35 obtaining help, 30 plotting, 28 variables, 17 vectorization, 25, 27 workspace, 17, 18 Matlab data types, 38 double, 19 logical, 43 uint8, 38 Matlab functions axis , 56 cat , 241 doc , 30 edge , 111, 244 fft , 134 fft2 , 142 fftshift , 142 figure , 34 filter2 , 80 find , 61 fliplr , 22 flipud , 22 floor , 25 format , 17 fspecial , 82 gray2ind , 39 gray2rgb , 39 grayslice , 237 help , 30 histeq , 64 hsv2rgb , 233 ifft , 134 ifft2 , 142 im2bw , 69 im2double , 42 im2uint8 , 43 imadd , 53 imadjust , 58 imclose , 207 imcomplement , 55 imdilate , 198 imerode , 199 imfinfo , 36 imhist , 56 immultiply , 53 imnoise , 95 imopen , 207 impixel , 35 imread , 33 imresize , 45 imshow , 34, 41, 234 imsubtract , 53 ind2gray , 39 ind2rgb , 39 inv , 22 log , 17 log10 , 17 lookfor , 31 mat2gray , 82 medfilt2 , 99 meshgrid , 27 mod , 45 nlfilter , 89 ntsc2rgb , 233 ones , 25 ordfilt2 , 91, 101, 190 pixval , 34 plot , 28 rand , 25 randn , 25 reshape , 23 rgb2gray , 39 rgb2hsv , 232 260 INDEX rgb2ind, 39 rgb2ntsc, 233 rot90, 22 sin, 17 size, 27 sqrt, 17 surf, 88 tic, 27 toc, 27 transpose, 22 whos, 18 wiener2, 106 zero, 25 maximum filter, see filter, maximum minimum filter, see filter, minimum morphological gradient, 203 morphology, 195 binary, see binary morphology greyscale, see greyscale morphology motion deblurring, 163 neighbourhood, 4 noise definition, 95 Gaussian, 96 periodic, 97, 159 salt and pepper, 95 speckle, 96 noise removal colour images, 242 Gaussian, 102 image averaging, 103 median filtering, 99 morphological filtering, 210 outliers, 101 periodic, 160 spatial averaging, 98, 104 Wiener filtering, 106 non-linear filter, see filter, non-linear one dimensional DFT, 134 Otsu, see thresholding, Otsu’s method PGM image, see file types, PGM pixelization, 47 pixels, 4 PNG image, see file types, PNG point processing, 51–71 arithmetic operations, see image arithmetic primary colours, 223 quantization, 41 RGB image, see digital image, true colour ringing, see Fourier transform, ringing ROI, see region of interest run length encoding (RLE), 249 second differences, 118 secondary colours, 223 shot noise, see noise, salt and pepper simple pixels, see pixels, simple skeleton morphology, see binary morphology, skeletonization using distance transform, 189 solarization, 55 spatial resolution, 41, 45 thresholding, 45, 67–71 applications, 70 definition, 67 double, 69 TIFF image, see file types, TIFF translation, 195 tristimulus values, 225 true colour image, see digital image, true colour two dimensional DFT, 137 unsharp masking, 122 visible light, 223 XYZ colour model, 224 zero crossings, 120 zero padding, 80 Zhang-Suen, see skeleton, Zhang-Suen algorithm Matlab : une introduction Francois Langot CEPREMAP et Universite du Maine Cette note a pour ob jectif de donner les bases necessaire a l'utilisation du logiciel Matlab. Les conventions suivantes sont adoptees:  le texte en caractere typeset decrit des codes Matlab,  un \;" a la n de la ligne indique a Matlab de ne pas acher la commande qu'il execute.  De nombreuses fonctions et instructions ne sont pas detaillees dans cette note, mais leurs codes sont donnes en annexe. 1 Manipulations de vecteurs et de matrices 1.1 Construire une Matrice Il y a plusieurs manieres pour construire une matrice avec Matlab.  La premiere, et peut ^etre la plus simple, est de declarer la matrice comme on l'ecrit a la main: A=[1 2 3 4 5 6] Ceci cree une matrice (2 3) matrix de la forme: 1 2 3 4 5 6 !  Une autre possibilite est d'ecrire: A=[1 2 3;4 5 6] Ces exemples montrent que dans les crochets, un espace sert a separer les colonnes, alors qu'un \;" sert a separer les lignes de la matrice. 1  Finalement, il est possible de declarer une matrice element par element: A(1,1)=1; A(1,2)=2; A(1,3)=3; A(2,1)=4; A(2,2)=5; A(2,3)=6; 1.2 Les matrices particulieres Il y a des matrices particulieres qu'il est tres utile de conna^tre:  La matrice zero: on cree une matrice (r c) de 0 en utilisant l'instruction zeros(r,c). Par exemple: A=zeros(2,3); cree la matrice: A = 0 0 0 0 0 0 !  La matrice de un: on peut creer une matrice (rc) de 1 en utilisant l'instruction ones(r,c). Par exemple: A=ones(2,3); cree la matrice: A = 1 1 1 1 1 1 !  la matrice identite In peut ^etre cree gr^ace a la commande eye(n), ou n est la dimension de la matrice. Ainsi, A=eye(3); cree la matrice: A = 0 B @ 1 0 0 0 1 0 0 0 1 1 C A  une matrice aleatoire: on peut creer une matrice (rc) d'elements aleatoires en utilisant la commande rand(r,c), pour des elements uniformement distribues, ou randn(r,c), pour des elements normalement distribues. Il doit ^etre note que rand tire des nombre sur le support [0;1] alors que randn tire des nombres dans la une loi normale N (0; 1). 2  La matrice vide peut ^etre utile lors de l'initialisation d'une matrice: A=[ ]; de nit A comme la matrice vide. 1.3 Manipulations de base Une des operations de base les plus courante consiste a extraire des elements d'une matrice. Matlab donne un ensemble d'instruments tres puissants pour e ectuer ces operations. Considerons la matrice: A = 0 B B B B B @ 1 2 3 4 5 2 3 4 5 1 3 4 5 1 2 4 5 1 2 3 5 1 2 3 4 1 C C C C C A  On veut isoler la matrice centrale: B = 0 B B B @ 2 3 3 4 4 5 5 1 1 C C C A Pour obtenir B, les commandes Matlab sont: B=A(1:4,2:3) 1:4 signi e la sequence 1 2 3 4 et 2:3 la sequence 2 3, de telle sorte que B=A(1:4,2:3) est l'instruction qui va permettre de de nir B comme une selection des ligne 1 2 3 4 de A et de colonnes 2 et 3.  Supposons que nous voulions selectionner les colonnes 1 et 3, mais que nous voulions garder toutes les lignes. L'instruction est alors: B=A(:,[1 3]); Le : signi e "selectionner tout", alors que [1 3] est juste un vecteur contenant les nombres 1 et 3. Ainsi, tous les elements des colonnes 1 et 3 sont selectionne.  Mais des operations plus complexes peuvent ^etre envisagees. Imaginons que l'on veuille selectionner les elements de la matrice A superieur ou egal a 3, a n de les stocker dans un vecteru B: 3 B=A(A>=3); Si A(i; j) >= 3 alors stocker dans le vecteur B.  Maintenant, considerons la matrice: A = 0 B @ 1 2 3 4 5 6 1 C A et supposons que nous voulions en obtenir la vectorialisation, alors il sut de donner l'instruction: B=A(:); pour obtenir: B = 0 B B B B B B B @ 1 3 5 2 4 6 1 C C C C C C C A  Si on veut obtenir la matrice A a partir de la matrice B, il sut d'utiliser la commande reshape: A=reshape(B,3,2) ce qui signi e que le vecteur B prendra la forme d'une matrice (3 2), comme la matrice A.  Si l'on veut agglomerer des matrices, il sut de suivre les instructions suivantes. Supposons que nous ayons les deux matrices suivantes: A = 1 2 3 4 ! et B = 4 5 6 7 8 9 ! et que l'on veuille la matrice suivante: C = 0 B B B @ 1 2 0 0 0 3 4 0 0 0 0 0 4 5 6 0 0 7 8 9 1 C C C A alors, il sut d'ecrire: 4 C=[A zeros(2,3);zeros(2,2) B];  Le tableau suivant resume les autres manipulations possibles: rot90(A) rotation de A diag(A) cree ou extrait la diagonale de A tril(A) partie triangulaire inf. de A triu(A) partie triangulaire sup. de A 1.4 Operations de base Le tableau suivant resume les operations matricielles disponibles sous Matlab: Action equivalent Math. Matlab Commentaire taille A est (r c) [r,c]=size(A) Transposition A0 A' Addition A + B A+B dim(A) = dim(B) Produit A B A*B Compatilite Produit element par element AijBij A.*B dim(A) = dim(B) Division 1 X solution de A X = B An B Compatilite Division 2 X solution de X A = B An B Compatilite Division element par element Aij=Bij A./B dim(A) = dim(B) Puissance d'une matrice An A^ n A carree Puissance element par element An ij A.^ n Trace tr(A) trace(A) A carree Determinant det(A) det(A) A carree Produit de Kronecker A B kron(A,B) Inverse A1 inv(A) A carree Rang rang(A) rank(A) Noyau (A V = 0) V=null(A) Valeur propre A = D P 1 [P,D]=eig(A) A carree Somme des colonnes Prows(A) i=1 Ai: sum(A) Produit des colonnes rows(A) i=1 Ai: prod(A) 2 Contr^oler la sequence des instructions Comme beaucoup d'autre langage, Matlab peut contr^oler la sequence des instructions d'un programme. Il y a trois facons de faire. 2.1 La boucle avec for Matlab peut repeter un ensemble d'instruction un nombre donne de fois, en utilisant l'instruction for. La forme generale de la boucle est alors: for variable=expression; instruction; end; En fait, expression est une matrice contenant des nombres. Exemple 1 : Generer la matrice A t.q.: Aij = i 2 j 3 + 1; pour i = 1; : : : ; 20 et j = 1; : : : ; 10 Les codes Matlab correspondant sont: for i=1:1:20; % i va de 1 a 20 avec un pas de 1 : for i=init:step:final for j=1:1:10; % j va de 1 a 10 avec un pas de 1 : for j=init:step:final A(i,j)=i^2-j^3+1; end; end; Exemple 2 : Calculer Ab ij , pour b allant de 0 a 1 avec un pas de 0.1, et acher le resultat a chaque iteration. Les codes sont: A=[1 2;2 1]; for b=0:0.1:1; % i va de 0 a 1 avec un pas de 0.1 C=A.^b; disp(C) % afficher C end; 2.2 La boucle avec while Matlab peut aussi utiliser des boucles pour repeter des instructions jusqu'a ce qu'une condition terminale soit satisfaite. La syntaxe generale des boucles avec while est la suivante: while condition; instructions; end; Tant que condition est satisfait, les instructions seront executees. Exemple 1 : trouver un point xe de la relation dynamique suivante (pas de solution analytique): xt+1 = 1 + x0:2 t Tout ce que l'on peut faire, c'est iterer sur cette relation et stopper quand la difference en valeur absolue entre deux iterations est inferieur a un seuil de tolerance. Les codes sont: tol=1e-6; % critere de tolerance crit=1; % initialisation du critere x0=1; % valeur initiale de x while crit>tol; x=1+x0^0.2; % relation dynamique crit=abs(x-x0); % valeur absolue entre 2 iterations consecutives x0=x; % la nouvelle valeur de x(t) end; 2.3 La boucle avec if L'instruction if execute un ensemble de commande si une condition est satisfaite. La syntaxe generale est: if condition commandes 1 else commandes 2 end Exemple 1 : savoir si un entier est impair ou non. Les codes sont alors les suivants: x=input('entrer un entier: '); % Demande a l'utilisateur d'entrer un entier % et le stock dans le vecteur x if rem(x,2)==0; % si le reste de la division par 2 est nul, alors disp('x est pair'); % afficher le message: x est pair else; % sinon disp('x est impair'); % afficher le message: x est impair end; % fin du test Ces commandes peuvent ^etre enrichies de la facon suivante: if condition commandes 1 elseif condition commandes 2 else commandes 3 end Exemple 2 : Construction d'une fonction de demande de la forme: D(P ) = 8 >< >: 0 si p  2 1 0:5P si 2 < p  3 2P 2 sinon Les codes sont les suivant: P=input('entrer un prix : '); if P<=2; D=0; elseif (P>2)&(P<=3); D=1-0.5 P; else; D=2*P^(-2); end; disp(D); Ces instructions peuvent evidement ^etre combinees les unes avec les autres. L'exemple 3 donne une illustration de la combinaison entre les instructions for et if, en utilisant l'instruction break qui permet de sortir d'une boucle avant la n de celle-ci. Exemple 3: Construire la sequence suivante: xt = x0:4 t1 x0:2 t1 pour t = 1; : : : ; 100. On doit s'assurer que x reste positif autrement Matlab trouvera une valeur complexe! Les codes suivant permettent de generer cette sequence et nous font sortir de la boucle des que le resultat d'une iteration est negatif: x(1)=2; for i=2:1:100; y=x(i-1)^0.4-x(i-1)^0.2; if y<0; disp('le resultat ne peut pas etre negatif'); break; end; x(i)=y; end; Avec cette ensemble de trois instructions, il est normalement possible de resoudre tous vos problemes numeriques a l'aide de Matlab. Toutefois, une autre capacite de Matlab est de vous permettre de construire des nouvelles fonctions. 3 De nition et utilisation des vos propres fonctions Les fonctions sont des sous-programmes annexes qu'il est possible d'appeler avec des codes usuels. La syntaxe generale pour de nir une fonction est: function [output]=nom_de_la_fonction(input); instructions; ou output designe le vecteur des resultats, et input designe le vecteur des parametres a entrer pour la resolution de la fonction. Cette fonction doit ^etre sauvee dans un chier texte ("script le") portant le m^eme nom que la fonction. Par exemple, construisons une fonction, appelee stat, qui nous donne la moyenne et l'ecart-type d'un vecteur. On doit alors creer, a l'aide de votre editeur favori, un chier nomme stat.m, contenant le texte suivant: function [m,st]=stat(x); lx=length(x); m=sum(x)/lx; st=sqrt(sum(x-mx)^2)/lx; Soit le vecteur: x=[1;2;3;4;5;6]; En appelant [mx,sx]=stat(x) dans un autre programme, vous obtiendrez mx=3.5000 et sx=1.8708. Les fonctions sont tres importantes pour le traitement de certain probleme. Un des plus important en economie est le calcul de l'etat stationnaire d'un modele. Celui-ci peut ^etre resolu en utilisant la routine fsolve qui resout les systemes nonlineaires. Par exemple, dans le cas du modele neo-classique de croissance, on doit resoudre le suivant suivant 1 : 1 = ( A k 1 + 1 ) k = A k c Il faut alors creer une fonction a deux variables, appelee par exemple steady, dans un chier appele steady.m: function z=steady(x); alpha=0.35; beta=0.99; delta=0.025; A=1; k=x(1); c=x(2); z=zeros(2,1); % Initialisation de z. % Pas necessaire, mais recommande z(1)=1-beta*(alpha*A*k^(alpha-1)+1-\delta); % Remarque: la fonction est z(2)=delta*k-(A*k^alpha-c); % ecrite f(x)=0 et, dans un autre chier, donner les conditions initiales a n de permettre la resolution numerique de ce systeme: k0=10; c0=1; x0=[k0;c0]; sol=fsolve('steady',x0); Un autre avantage des fonctions est qu'elles permettent de vous creer une librairie que vous pouvez utiliser quand vous en avez besoin pour diverses problemes. 1 Remarque: cet exemple peut ^etre resolu a la main, mais il a ete choisi pour sa simplicite. 4 Outils Input{Output Les instructions Input { Output sont importantes car elles permettent d'acher, de sauver et d'utiliser vos resultats dans d'autres codes que ceux utilises par Matlab. 4.1 Textes Input { Output La premiere commande est celle permettant d'acher une commande: disp. Elle vous permet d'acher un message, une valeur ou ce que vous voulez comme texte. Ainsi disp('Ceci est un beau message') achera \Ceci est un beau message" a l'ecran. Soit une matrice A de la forme: A = 1 2 3 4 ! alors: disp(A) achera a l'ecran: 1 2 3 4 Si vous desirez stocker vos resultats dans un chier, il faut ouvrir un chier et faire acher vos resultats sous la forme que vous voulez. Pour cela, utiliser la commande diary name of file. Ne pas oublier de fermer votre chier avec la commande diary off. Par exemple: diary result.out disp('Salut') diary off cree un chier appele result.out contenant \Salut". Attention: l'instruction diary n'ecrase pas le(s) chier(s) existant sous le m^eme nom. Il est donc necessaire, dans un premier temps, d'e acer le(s) vieu(x) chier(s) en utilisant delete name of file, si vous ne voulez pas a jouter de nouvelles informations dans le chier existant, mais seulement avoir un chier donnant les nouveaux resultats. Si on desire que l'utilisateur du programme entre une information avec le clavier, utiliser l'instruction input. n=input('Donner un nombre'); 10 ache le message \Donner un nombre" a l'ecran en attendant une reponse. La reponse est enregistree dans la variable n. Si on desire charger des donnees, vous avez simplement a creer un chier ASCII contenant ces donnees. Par exemple supposons que le chier de donnees dat.txt est de la forme: 1 2 3 4 5 6 Donner juste l'instruction: load dat.txt -ascii; et vos donnees sont stockees dans une matrice, appelee dat, que vous pouvez manipuler comme toutes les matrices. 4.2 Graphiques La premiere instruction importante est clg: elle permet d'e acer le graphique a l'ecran. Dans cette note d'introduction a Matlab, seuls les graphiques en 2-d seront abordes (se sont les plus commun)2 . Il y a essentiellement une instruction: plot. La syntaxe generale de plot est: plot(X,Y,S) ou X et Y sont des matrices et S est une cha^ne de caracteres 1, 2 ou 3 de nissant l'aspect du graphique. L'instruction ci-dessus dessine Y comme une fonction de X. La cha^ne S est une option et peut prendre les valeurs suivantes: y jaune . point m magenta o cercle c cyan x x-marque r rouge + plus g vert - trait plein b bleu * etoile w blanc : pointille k noir -. tirets-point { traits espaces Ainsi plot(X,Y,'b*') dessine une etoile bleue en chaque point de l'echantillon. Il est possible d'a jouter des titres, des legendes pour les axes, en utilisant les instructions suivantes: 2 Pour le graphiques en 3-d, voir le manuel "Matlab Graphics". 11 title(string) % xlabel(string) % titre de l'axe des x ylabel(string) % titre de l'axe des y Il est egalement possible de ra jouter une grille sur votre graphique, en utilisant l'instruction grid. Les graphiques, crees a partir des instructions suivantes sont reportes en annexe (A). Le graphique (1) est de ni par les codes suivants: x=[-3:.01:3]; y1=exp(-0.5*x.^2)/sqrt(2*pi); y2=exp(-0.25*x.^2)/sqrt(2*pi); clg; plot(x,y1,'w',x,y2,'w--'); title('Un bel exemple ?'); ylabel('Les fonctions'); xlabel('Les valeurs'); grid; Il est egalement possible d'avoir simultanement plusieurs graphiques a l'ecran. Pour cela, utiliser la commande subplot(rcn) ou r, c, n sont respectivement le numero de la ligne, de la colonne et du graphique. Ainsi, le graphique (4) de l'annexe est de ni par les codes: x=[-3:.01:3]; y1=exp(-0.5*x.^2)/sqrt(2*pi); y2=sin(x); y3=cos(x); y4=abs(sqrt(x)); clg; subplot(221);plot(x,y1);ylabel('Y1');xlabel('X');title('Gauss'); subplot(222);plot(x,y2);ylabel('Y2');xlabel('X');title('Sin(X)'); subplot(223);plot(x,y3);ylabel('Y3');xlabel('X');title('Cos(X)'); subplot(224);plot(x,y4);ylabel('Y4');xlabel('X');title('Abs(Sqrt(X))'); Pour sauver un graphique dans un chier, il sut d'utiliser l'instruction print. La syntaxe generale est: print -options nom_du_fichier D'autres details sont donnes en annexe (C). 5 Applications economiques: le modele de cycles reels (RBC) L'ob jectif de cette section est de montrer comment resoudre numeriquement, a l'aide de Matlab, le modele d'equilibre general a horizon de vie in ni, dans un cadre stochastique. Ce modele est le cadre de reference des modeles RBC. Le programme est ecrit dans un chier rbc.m, et les resultats de ce programme dans un chier rbc.res. Ainsi, au debut du programme on a les codes suivants: 12 clear delete rbc.res diary rbc.res 5.1 Le modele economique 1. 9 un continuum d'agents identiques, indices par i 2 [0; 1]. 2. Ceux-ci sont a la fois producteur et consommateur, L'agent i maximise la fonction d'utilite suivante: max ci;s;li;s;ki;s+1 X1 s=t Et st " log(ci;s) l 1+ i;s 1 +  # sous la sequence de contraintes suivante: ci;t + ki;t+1  (1 )ki;t + pi;tyi;t 8 t = 1;    ; 1  pi;t prix de la production de l'agent i relativement aux prix des biens consommes,  ki;t, li;t, ci;t et yi;t representent respectivement le stock de capital, le nombre d'heure de travail, la consommation et la production de l'agent i,  les parametres  2 [0; 1), 2 [0; 1) et  2 [0; 1) representent respectivement le taux de depreciation, le facteur d'escompte psychologique et l'inverse de l'elasticite de l'o re de travail Chaque agent a acces a une technologie de production lui permettant de produire yi;t: yi;t = stkm i;t( t li;t) 1m  taux de croissance du P.T. incorpore au travail,  st choc de progres technique, incertitude intrinseque,  fonction de production de l'agent i: rendements constants,  le marche concurrentiel, pi;t = pj;t = 1 8 i; j (le bien nal est le numeraire). En supposant que la contrainte budgetaire de l'agent est saturee a chaque periode (i.e. l'agent utilise ces revenus), le probleme de l'agent i peut se reecrire de la facon suivante: max ks+1 ;li;s X1 s=t Et st " log (ci;s+1) l 1+ i;s 1 +  # avec ci;s = ki;s+1 + (1 )ki;s + sskm i;s( t l i;s) Les conditions d'optimalite de ce probleme sont: 1 ci;t + Et " 1 ci;t+1 1  + @yi;t+1 @ki;t+1 !# = 0 1 ci;t @yi;t @ li;t l  i;t = 0 (1 )ki;s + sskm i;s( t li;s) 1m ci;s = ki;s+1 5.2 Conditions d'equilibre 8 i, les conditions d'optimalite sont identiques: 1 ct = Et  1 ct+1  1  + m yt+1 kt+1  l  t = 1 ct  (1 m) yt lt  Les tra jectoires d'equilibre veri ent egalement: kt+1 = (1 )kt + yt ct yt = stkm t ( t lt) 1m st = s  t1vt ou  2 (0; 1) represente la persistance du choc technologique et vt est une innovation iid. Remarque: Il est possible de reduire la dimension du probleme substituant l'o re de travail par l'expression suivante l t =  (1 m) stkm t ct  1 (+m) ou lt est une fonction de ct, kt et st. 5.3 Sentier de croissance deterministe  hypotheses sur les fonctions de production et d'utilite =) existence d'un sentier de croissance equilibree,  tendance =) progres technique incorpore au travail (fonction de ),  exprimer le modele en variables intensives =) de ater l'ensemble des equations de nissant l'equilib  kt+1 t+1  = (1 )  kt t  +  yt t   ct t   yt t  = st  kt t m l 1m t (1 )  yt t  =  ct t  l +1 t t ct ! =   Et " t+1 ct+1 ! (1  + m  yt+1 t+1  t+1 kt+1 !)# On de nit alors les variables stationnarisees: c~t = ct= t ; ~ k = kt= t ; y~t = yt= t 5.4 Dynamique autour du sentier de croissance et etat stationnaire Les equations de nissant l'equilibre se reecrivent: 1 c~t = Et " 1 c~t+1 1  + m y~t+1 ~ kt+1 !# l  t = 1 c~t  (1 m) y~t lt  k~ t+1 = (1 )k~ t + ~yt c~t y~t = st ~ km t l 1m t Ces equations determinent la dynamique d'equilibre autour du sentier de croissance equilibree. L'etat stationnaire est de ni par le quadruplet fc; k; y; lg unique solution du systeme: k = y + (1 )k c y = sk m l 1m (1 m) y l = cl  1 =  1  + 5.5 Resolution du modele: l'approximation log-lineaire En substituant lt par son expression en kt, ct et st, on reduit la dimension du systeme dynamique. Celui-ci est alors de dim = 3 3: ~ kt+1 = sb5 t ~ k b2 t c~ b3 t + (1 )~ kt c~t 1 c~t = Et  1 c~t+1  1  +  sb5 t+1 ~k b4 t+1c~ b3 t+1 log(st+1) =  log(st) + t+1 ou l'on note: b1 b2 b3 b4 b5 1=( + m) m( + 1)b1 (1 m)b1 b2 1 ( + 1)b1 (1 m)b3 La resolution numerique de ce probleme necessite donc de donner une valeur aux parametres des fonctions de comportements et du processus de variables exogene. Dans le chier Matlab, ceci se fait de la facon suivante: beta=.99; delta=.025; chi=0; gamma=1.004; rhos=.95; epsilon=.0072; m=.36; mu=m; nu=1-m; phi=gamma^(nu/(1-mu)); Les coecients bi alors peuvent ^etre de nis dans le programme Matlab de la facon suivante: b1=1/(chi- nu +1); b2=mu*(chi+1)*b1; b3=-nu*b1; b4=b2-1; b5=(chi+1)*b1; psi=(1-m)^(-b3); L'etat stationnaire peut alors ^etre calcule par Matlab, etant donne la de nition de ces coecients. Les codes sont les suivants3 : 3 La resolution de cet etat stationnaire peut ^etre e ectue en de nissant une fonction telle que celle donnee dans l'exemple "stea AA=(phi+delta-1)-(1/(beta*m))*(phi-beta*(1-delta)); BB=((phi/beta)-1+delta)*(1/(m*psi)); k=(-(BB^(1/b3))/AA)^(1/(1+(b4/b3))); y=((phi/beta)-1+delta)*(k/m); l=(y/(k^mu))^(1/nu); c=y-(delta+phi-1)*k; I=y-c; Il est alors possible de calculer l'utilite, les utilite marginales, ainsi que les derivees des utilites marginales. Les code sont les suivants: util=log(c)-(1/(1+chi))*(l^(1+chi)); %utilite d'etat stationnaire uc=1/c; %utilite marg de la conso ucc=-1/(c^2); %derive seconde par rapport %\`a la conso xcc=ucc*c/uc; %elasticite de l'utilite marg de la conso ul=-l^chi; %desutilite marg du trav ; ull=-chi*(l^(chi-1)); %derive seconde par rapport au trav xll=ull*l/ul; %elasticite de la desutilite %marg du trav Toutes les equations de nissant la dynamique d'equilibre ont la forme generique suivante: f (~ kt; c~t; st) = Et[g(~ kt+1; ~ct+1; st+1)] Le developpement de Taylor jusqu'au premier ordre permet d'approximer, autour de fk; c; sg, toutes les conditions d'equilibre comme suit, les derivees des fonctions f et g etant evaluees au point (k; c; s): f (k; c; s) + @f @k (~kt k) + @f @c (~ct c) + @f @s (st s) = Et  g(k; c; s) + @g @k (~kt+1 k) + @g @c (~ct+1 c) + @g @s (st+1 s)  () f ;k (~kt k) k + f ;c (~ct c) c + f ;s (st s) s = Et " g;k (~ kt+1 k) k + g;c (~ct+1 c) c + g;s (st+1 () f ;k b kt + f ;ccbt + f ;ssbt = Et h g;k b kt+1 + g;c bct+1 + g;ssbt+1i ou i;j , pour i = f; g et j = k; c; s, sont les elasticites des fonctions f et g par rapport a k, c et s. Par exemple, f ;k = @f @k k f (k;c;s) . En appliquant cette methode d'approximation a toutes les equations, on obtient le systeme lineaire d'equations sous anticipations rationnelles suivant (a l'etat stationnaire s = 1): b kt+1 = c1 b kt + c2bct + c3sbt cbt = Et h c4 b kt+1 + c5cbt+1 + c6sbt+1i sbt+1 = sbt + vt+1 ou les coecients ci sont combinaisons non-lineaires des parametres structurels du modele (coecients invariants, Cf critique de Lucas): c1 c2 c3 ( b2k b2 c b3 + (1 )k)=( k) ( b3k b2 c b3 c)=( k) ( b5k b2 c b3 )=( k) c4 c5 c6 m b4k b4 c b3 h 1  + (1 b3)m k b4 c b3 i m b5k b4 c b3 Ces coecients peuvent ^etre de nis dans le programme Matlab de la facon suivante: c1=(psi*b2*(k^b2)*(c^b3) + (1-delta)*k)/(phi*k); c2=(psi*b3*(k^b2)*(c^b3) - c)/(phi*k); c3=(psi*b5*(k^b2)*(c^b3))/(phi*k); c4=(beta/phi)*m*psi*b4*(k^b4)*(c^b3); c5=-(beta/phi)*(1-delta +(1-b3)*m*psi*(k^b4)*(c^b3)); c6 =(beta/phi)*m*psi*b5*(k^b4)*(c^b3); c7 =-c 5.6 Ecriture matricielle 2 6 4 c1 c2 c3 0 1 0 0 0  3 7 5 2 6 4 b kt cbt sbt 3 7 5 = 2 6 4 1 0 0 c4 c5 c6 0 0 1 3 7 5 2 6 4 b kt+1 cbt+1 sbt+1 3 7 5 + 2 6 4 0 0 0 0 0 c4 c5 c6 1 0 0 0 3 7 5 2 6 6 6 4 vt+1 wbk t+1 wbc t+1 wbs t+1 3 7 7 7 5 ou wbx t+1 = Et[xt+1] xt+1, pour x = k; c; s. Codes Matlab correspondant: M1=[c1 c2 c3 ; 0 -1 0 ; 0 0 rho]; M2=[1 0 0 ; c4 c5 c6 ; 0 0 1]; M3=[0 0 0 0; 0 c4 c5 c6 ; -1 0 0 0]; En pre-multipliant le systeme par 2 6 4 c1 c2 c3 0 1 0 0 0  3 7 5 1 on obtient 2 6 4 b kt cbt sbt 3 7 5 = J 2 6 4 b kt+1 cbt+1 sbt+1 3 7 5 + R 2 6 6 6 4 vt+1 wbk t+1 wbc t+1 wbs t+1 3 7 7 7 5 ou dim(J) = 3 3 et dim(R) = 3 4. Codes Matlab correspondant: J=M1\M2; R=M1\M3; La resolution du systeme ci-dessus sut a determiner la dynamique d'equilibre. En e et, l'approximation log-lineaire de la fonction de production et de la condition d'equilibre sur le marche du travail, donnent ybt et b l t comme des fonction de b kt, cbt et sbt: " ybt b l t # = M 2 6 4 b kt cbt sbt 3 7 5 ou dim(M) = 2 5.7 Unicite de la solution: determination de la tra jectoire selle 1. Probleme: systeme d'equations recurrentes non-independantes =) pour le resoudre, pro jection dans une base ou les equations sont independantes. 2. Methode: determination des vecteurs propres, formant la matrice de changement de base, et des valeurs propres, donnant l'evolution dynamique dans la nouvelle base. Etape 1: Determination des valeurs propres i, i 2 [1; 3] val. propres si solutions de: det(J I3) = 0 =) = 2 6 4 1 0 0 0 2 0 0 0 3 3 7 5 Dans ce systeme, il existe une equation independante: celle du choc technologique st. Une des valeurs propres est donc donnee par 1= > 1, car ce processus est stationnaire. Comme dans le modele de croissance optimale, on a 1 < 1 et 2 > 1. L'equilibre est determine: il y a une unique tra jectoire qui converge vers l'etat stationnaire, la tra jectoire selle. Etape 2: vecteurs propres et changement de base Soit la matrice Q, qui veri e Q1 JQ = ou Q = [q 1 ; q2 ; q3 ] avec dim(q i ) = 31, pour i = 1; 2; 3. On note zt le vecteur de nit par: zt = Q1 2 6 4 b kt cbt sbt 3 7 5 et t = Q1 R 2 6 6 6 4 vt wbk t wbc t wbs t 3 7 7 7 5 Ce changement de base permet d'obtenir les trois equations independantes suivantes: 2 6 4 z 1 t z 2 t z 3 t 3 7 5 = 2 6 4 1 0 0 0 2 0 0 0 3 3 7 5 2 6 4 z 1 t+1 z 2 t+1 z 3 t+1 3 7 5 + 2 6 4 1 t+1 2 t+1 3 t+1 3 7 5 Codes Matlab correspondant a ces deux operations [P,MU]=eig(J); %matrices des vect propres P et des val propres PI=inv(P); %inv. P [llambda,kk]=sort(diag(MU)); %classement des val propres par ordre crois. P1=P(:,kk); %classement des vect propre correspondant P1I=inv(P1); %inv de P1 Determination de la tra jectoire selle La premiere equation a une racine inferieure a l'unite: cette equation converge lorsque l'on itere vers le futur. Ces iterations vers le futur determinent la restriction entre cbt, b kt et sbt, de nissant la tra jectoire selle: z 1 t = 1z 1 t+1 + t+1 L'anticipation rationnelle de cette equation donne: z 1 t = 1Et h z 1 t+1i =) z 1 t = T 1 Et h z 1 t+T i Comme z 1 t < 1 et limT!1 T 1 = 0, on a: z 1 t = 0 () q1 1;k b kt + q1 1;c bct + q1 1;s sbt = 0 La tra jectoire selle determine la consommation optimale, cbt, a chaque date comme une fonction lineaire de b kt et sbt. Apres substitutions, on obtient: " b kt+1 sbt+1 # = A " b kt sbt # + Bvt+1 with A = " a11 a12 0  # Les codes Matlab correspondant a ces operations sont: A(1,1)=c1+c2*(-P1I(1,1)/P1I(1,2)); A(1,2)=c3+c2*(-P1I(1,3)/P1I(1,2)); A(2,2)=rho; Les dynamiques des autres variables sont obtenues en utilisant: 2 6 6 6 6 6 6 4 cbt ybt b it b lt dy=lt 3 7 7 7 7 7 7 5 =  " b kt sbt # Les codes Matlab correspondant a ces operation sont: %consommation Pi(1,1)=-P1I(1,1)/P1I(1,2); Pi(1,2)=-P1I(1,3)/P1I(1,2); %produit Pi(2,1)=b2+b3*(-P1I(1,1)/P1I(1,2)); Pi(2,2)=(chi+1)*b1+b3*(-P1I(1,3)/P1I(1,2)); %investissement Pi(3,1)=(y/I)*Pi(2,1)-(c/I)*Pi(1,1); Pi(3,2)=(y/I)*Pi(2,2)-(c/I)*Pi(1,2); %heures Pi(4,1)=(mu*b1)-b1*(-P1I(1,1)/P1I(1,2)); Pi(4,2)=b1-b1*(-P1I(1,3)/P1I(1,2)); %productivite Pi(5,1)=Pi(2,1)-Pi(4,1); Pi(5,2)=Pi(2,2)-Pi(4,2); 5.8 Simulation des fonctions de reponses Il est possible de calculer les fonctions de reponses a un choc technologique. Il s'agit d'evaluer la dynamique d'a justement des variables macroeconomiques si on perturbe l'etat stationnaire par une deviation temporaire de 1% d'un choc technologique (l'exogene du modele). Les codes Matlab correspondant a ces operations sont: nrep=60; %horizon de simulation disp('nrep') disp(nrep) CHOC=[0 ; 1]; %vecteur des chocs sur les variables d'\'etat %le premier \'el\'ement est l'\'ecart du capital %par rapport \`a son niveau d'\'etat stationnaire %le second \'el\'ement est l'\'ecart de la technologie %par rapport \`a son niveau d'\'etat stationnaire: %ici, l'\'ecart est de 1%. %calcul de la trajectoire du capital sur l'horizon de simulation for j=1:nrep; DT=(A^(j-1))*CHOC; DTK(j)=DT(1); end; %calcul de la trajectoire des autres variables sur l'horizon de simulation for j=1:nrep; DT=(Pi*A^(j-1))*CHOC; DTC(j)=DT(1); DTY(j)=DT(2); 22 DTI(j)=DT(3); DTL(j)=DT(4); DTYL(j)=DT(5); end; subplot(221),plot(DTY(1:nrep)) title('Produit') xlabel('Trimestres') ylabel('% Dev.') subplot(222),plot(DTC(1:nrep)) title('Consommation') xlabel('Trimestres') ylabel('% Dev.') subplot(223),plot(DTI(1:nrep)) title('Investissement') xlabel('Trimestres') ylabel('% Dev.') subplot(224),plot(DTK(1:nrep)) title('Capital') xlabel('Trimestres') ylabel('% Dev.') print rbc1.eps pause clg subplot(221),plot(DTL(1:nrep)) title('Heures') xlabel('Trimestres') ylabel('% Dev.') subplot(222),plot(DTYL(1:nrep)) title('Productivit\'e') xlabel('Trimestres') ylabel('% Dev.') print rbc2.eps pause clg 23 A Graphiques Figure 1: Exemple 1 −3 −2 −1 0 1 2 3 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 Les valeurs Les fonctions Un bel exemple ? Figure 2: Exemple 2 −4 −2 0 2 4 0 0.1 0.2 0.3 0.4 Y1 X Gauss −4 −2 0 2 4 −1 −0.5 0 0.5 1 Y2 X Sin(X) −4 −2 0 2 4 −1 −0.5 0 0.5 1 Y3 X Cos(X) −4 −2 0 2 4 0 0.5 1 1.5 2 Y4 X Abs(Sqrt(X)) 24 Figure 3: Rbc: fonction de reponse 0 20 40 60 0 0.5 1 1.5 2 Produit Trimestres % Dev. 0 20 40 60 0.2 0.4 0.6 0.8 1 Consommation Trimestres % Dev. 0 20 40 60 −2 0 2 4 6 Investissement Trimestres % Dev. 0 20 40 60 0 0.5 1 1.5 Capital Trimestres % Dev. Figure 4: Rbc: fonction de reponse 0 20 40 60 −0.5 0 0.5 1 1.5 Heures Trimestres % Dev. 0 20 40 60 0.2 0.4 0.6 0.8 1 Productivit‚ Trimestres % Dev. 25 B Liste des fonction elementaires Ces tableaux sont directement issus du Guide d'Utilisation de Matlab (MATLAB Reference Guide). Operation et caracteres speciaux + plus - moins * multiplication .* multiplication element par element ^ puissance .^ puissance element par element kron produit de kronecker n division a gauche / division a droite ./ division element par element : colonne . point des decimales ... continuite ; semi - colonne % commentaire ' transpose et guillemets = allocation == egalite < > <= >= operateurs & AND logique | OR logique ~ NOT logique xor EXCLUSIVE OR logique 26 Elementary Math Functions abs Absolute value acos Inverse cosine acosh Inverse hyperbolic cosine angle Phase angle asin Inverse sine asinh Inverse hyperbolic sine atan Inverse tangent atan2 Four quadrant inverse tangent atanh Inverse hyperbolic tangent ceil Round towards plus in nity conj Complex conjugate cos Cosine cosh Hyperbolic cosine exp Exponential fix Round towards zero floor Round towards minus in nity imag Complex imaginary part log Natural logarithm log10 Common logarithm real Complex real part rem Remainder after division round Round toward nearest integer sign Signum function sin Sine sinh Hyperbolic sine sqrt Square root tan Tangent tanh Hyperbolic tangent 27 C la commande print Syntaxe: print [ -ddevice] [ -options ] filename Available Windows Device Options -dwin Send gure to currently installed printer in monochrome -dwinc Send gure to currently installed printer in color -dmeta Send gure to clipboard in Meta le format -dbitmap Send gure to clipboard in bitmap format Available Postscript Devices -dps PostScript for black and white printers -dpsc PostScript for color printers -dps2 Level 2 PostScript for black and white printers -dpsc2 Level 2 PostScript for color printers -deps Encapsulated PostScript (EPSF) -depsc Encapsulated Color PostScript (EPSF) -deps2 Encapsulated Level 2 PostScript (EPSF) -depsc2 Encapsulated Level 2 Color PostScript (EPSF) -dlaserjet HP LaserJet -dljetplus HP LaserJet+ -dljet2p HP LaserJet IIP -dljet3 HP LaserJet III -dcdeskjet HP DeskJet 500C with 1 bit/pixel color -dcdjcolor HP DeskJet 500C with 24 bit/pixel color -dcdjmono HP DeskJet 500C printing black only -ddeskjet HP DeskJet and DeskJet Plus -dpaintjet HP PaintJet color printer -dpjetxl HP PaintJet XL color printer -dbj10e Canon BubbleJet BJ10e -dln03 DEC LN03 printer -dgif8 8-bit color GIF le format -dpcx16 Older color PCX le format (EGA/VGA, 16-color) -dpcx256 Newer color PCX le format (256-color) Other Options -append Append the graph to le, rather than overwriting -Pprinter Specify the printer to use -fhandle Handle Graphics handle of gure to print 28 D Programme de simulation clear delete rbcs.res diary rbcs.res ttt=clock; % initialisation du nombre de simulations nsimul=100; disp('nsimul') disp(nsimul) % initialisation de la longueur des series nlong=4*40; %%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %Parametres %%%%%%%%%%%%%%%%%%%%%%%%%%%%%% beta=.99; delta=.025; chi=0; gamma=1.004; rho=.95; sdepsilona=.0072; mu=.36; nu=.64; m=.36; %%%%%%%%%%%%%%%%%%%%%%%%%%%%%% phi=gamma^(nu/(1-mu)); b1=1/(chi- nu +1); b2=mu*(chi+1)*b1; b3=-nu*b1; b4=b2-1; b5=(chi+1)*b1; psi=(1-m)^(-b3); 29 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %Etat stationnaire %%%%%%%%%%%%%%%%%%%%%%%%%%%%%% AA=(phi+delta-1)-(1/(beta*m))*(phi-beta*(1-delta)); BB=((phi/beta)-1+delta)*(1/(m*psi)); k=(-(BB^(1/b3))/AA)^(1/(1+(b4/b3))); y=((phi/beta)-1+delta)*(k/m); l=(y/(k^mu))^(1/nu); c=y-(delta+phi-1)*k; I=y-c; %%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %Dynamique %%%%%%%%%%%%%%%%%%%%%%%%%%%%%% c1= (psi*b2*(k^b2)*(c^b3) + (1-delta)*k)/(phi*k); c2= (psi*b3*(k^b2)*(c^b3) - c)/(phi*k); c3= (psi*b5*(k^b2)*(c^b3))/(phi*k); c4= (beta/phi)*m*psi*b4*(k^b4)*(c^b3); c5= -(beta/phi)*(1-delta + (1-b3)*m*psi*(k^b4)*(c^b3)); c6 = (beta/phi)*m*psi*b5*(k^b4)*(c^b3); M1=[c1 c2 c3 ; 0 -1 0 ; 0 0 rho]; M2=[1 0 0 ; c4 c5 c6 ; 0 0 1]; M3=[0 ; 0 ; 1]; J=M1\M2; R=M1\M3; [P,MU]=eig(J); PI=inv(P); MU %pause [llambda,kk]=sort(diag(MU)); P1=P(:,kk); 30 P1I=inv(P1); %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %Systeme resolu %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %Dynamique de k et s A(1,1)=c1+c2*(-P1I(1,1)/P1I(1,2)); A(1,2)=c3+c2*(-P1I(1,3)/P1I(1,2)); A(2,2)=rho; %c,y,i,l,y/l en fonction de k et s %conso Pi(1,1)=-P1I(1,1)/P1I(1,2); Pi(1,2)=-P1I(1,3)/P1I(1,2); %produit Pi(2,1)=b2+b3*(-P1I(1,1)/P1I(1,2)); Pi(2,2)=(chi+1)*b1+b3*(-P1I(1,3)/P1I(1,2)); %investissement Pi(3,1)=(y/I)*Pi(2,1)-(c/I)*Pi(1,1); Pi(3,2)=(y/I)*Pi(2,2)-(c/I)*Pi(1,2); %heures Pi(4,1)=(mu*b1)-b1*(-P1I(1,1)/P1I(1,2)); Pi(4,2)=b1-b1*(-P1I(1,3)/P1I(1,2)); %productivite Pi(5,1)=Pi(2,1)-Pi(4,1); Pi(5,2)=Pi(2,2)-Pi(4,2); A Pi %************************************************************** % % generation des parties cycliques HP filtrees % 31 %************************************************************** % valeurs initiales de SS calculees HT(1)=l; KT(1)=k; YT(1)=y; CT(1)=c; IT(1)=I; PMT(1)=YT(1)/HT(1); % partie tendantielle for i=2:nlong; KT(i)=(gamma)*KT(i-1); CT(i)=(gamma)*CT(i-1); HT(i)=HT(i-1); YT(i)=(gamma)*YT(i-1); IT(i)=(gamma)*IT(i-1); PMT(i)=(gamma)*PMT(i-1); end; %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %Simulations %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% for j=1:nsimul; disp('simulation') disp(j) % simulation des ji\`emes parties cycliques rand('normal'); aleaa(1:nlong,j)=rand(nlong,1); % tirage des innovations for i=1:nlong; epsa(j,i)= aleaa(i,j) * (sdepsilona); 32 end; % construction des chocs CHT CHT(j,1)=0; for i=2:nlong; CHT(j,i)=rho*CHT(j,i-1) + epsa(j,i); end; % initialisation de la partie cyclique du capital KC(j,1)=0; % parties cycliques for i=1:nlong; KC(j,i+1)=A(1,1)*KC(j,i)+A(1,2)*CHT(j,i); end; for i=1:nlong; CC(j,i)=Pi(1,1)*KC(j,i)+Pi(1,2)*CHT(j,i); YC(j,i)=Pi(2,1)*KC(j,i)+Pi(2,2)*CHT(j,i); IC(j,i)=Pi(3,1)*KC(j,i)+Pi(3,2)*CHT(j,i); HC(j,i)=Pi(4,1)*KC(j,i)+Pi(4,2)*CHT(j,i); PMC(j,i)=Pi(5,1)*KC(j,i)+Pi(5,2)*CHT(j,i); end; % construction des series brutes for i=1:nlong; KB(j,i)=log(KT(i)*(1+KC(j,i))); CB(j,i)=log(CT(i)*(1+CC(j,i))); HB(j,i)=log(HT(i)*(1+HC(j,i))); YB(j,i)=log(YT(i)*(1+YC(j,i))); IB(j,i)=log(IT(i)*(1+IC(j,i))); PMB(j,i)=log(PMT(i)*(1+PMC(j,i))); end; end; 33 for j=1:nsimul; disp('filtre') disp(j) KTHP(j,1:nlong)=hpfilter(KB(j,1:nlong),1,nlong); CTHP(j,1:nlong)=hpfilter(CB(j,1:nlong),1,nlong); HTHP(j,1:nlong)=hpfilter(HB(j,1:nlong),1,nlong); YTHP(j,1:nlong)=hpfilter(YB(j,1:nlong),1,nlong); ITHP(j,1:nlong)=hpfilter(IB(j,1:nlong),1,nlong); PMTHP(j,1:nlong)=hpfilter(PMB(j,1:nlong),1,nlong); % calcul des parties cycliques par filtrage HP KCHP(j,1:nlong)=KB(j,1:nlong)-KTHP(j,1:nlong); CCHP(j,1:nlong)=CB(j,1:nlong)-CTHP(j,1:nlong); HCHP(j,1:nlong)=HB(j,1:nlong)-HTHP(j,1:nlong); YCHP(j,1:nlong)=YB(j,1:nlong)-YTHP(j,1:nlong); ICHP(j,1:nlong)=IB(j,1:nlong)-ITHP(j,1:nlong); PMCHP(j,1:nlong)=PMB(j,1:nlong)-PMTHP(j,1:nlong); ETYCHP(j)=std(YCHP(j,1:nlong)); disp(ETYCHP(j)) end; % calcul des moments entre parties cycliques for j=1:nsimul; disp('moments') disp(j) % ecart-types ETKCHP(j)=std(KCHP(j,80:nlong)); ETCCHP(j)=std(CCHP(j,80:nlong)); ETHCHP(j)=std(HCHP(j,80:nlong)); 34 ETYCHP(j)=std(YCHP(j,80:nlong)); ETICHP(j)=std(ICHP(j,80:nlong)); ETPMCHP(j)=std(PMCHP(j,80:nlong)); % ecart-types relatifs ETRKCHP(j)=ETKCHP(j)/ETYCHP(j); ETRCCHP(j)=ETCCHP(j)/ETYCHP(j); ETRHCHP(j)=ETHCHP(j)/ETYCHP(j); ETRYCHP(j)=ETYCHP(j)/ETYCHP(j); ETRICHP(j)=ETICHP(j)/ETYCHP(j); ETRPMCHP(j)=ETPMCHP(j)/ETYCHP(j); ETRHPMCHP(j)=ETHCHP(j)/ETPMCHP(j); LAMBDA(j)=((ETYCHP(j))^2)/(0.0176^2); % generation des series retardees for k=81:nlong; KCHP1(j,k)=KCHP(j,k-1); CCHP1(j,k)=CCHP(j,k-1); HCHP1(j,k)=HCHP(j,k-1); YCHP1(j,k)=YCHP(j,k-1); ICHP1(j,k)=ICHP(j,k-1); PMCHP1(j,k)=PMCHP(j,k-1); end; % autocorrelations a l'ordre 1 VCV=cov(KCHP1(j,80:nlong-1),KCHP(j,80:nlong-1)); AC1KCHP(j)=(VCV(2,1))/(ETKCHP(j)^(2)); VCV=cov(CCHP1(j,80:nlong-1),CCHP(j,80:nlong-1)); AC1CCHP(j)=(VCV(2,1))/(ETCCHP(j)^(2)); VCV=cov(HCHP1(j,80:nlong-1),HCHP(j,80:nlong-1)); AC1HCHP(j)=(VCV(2,1))/(ETHCHP(j)^(2)); 35 VCV=cov(YCHP1(j,80:nlong-1),YCHP(j,80:nlong-1)); AC1YCHP(j)=(VCV(2,1))/(ETYCHP(j)^(2)); VCV=cov(ICHP1(j,80:nlong-1),ICHP(j,80:nlong-1)); AC1ICHP(j)=(VCV(2,1))/(ETICHP(j)^(2)); VCV=cov(PMCHP1(j,80:nlong-1),PMCHP(j,80:nlong-1)); AC1PMCHP(j)=(VCV(2,1))/(ETPMCHP(j)^(2)); % correlations instantanees avec le produit VCV=cov(KCHP(j,80:nlong),YCHP(j,80:nlong)); CIKCHP(j)=(VCV(2,1))/(ETKCHP(j)*ETYCHP(j)); VCV=cov(CCHP(j,80:nlong),YCHP(j,80:nlong)); CICCHP(j)=(VCV(2,1))/(ETCCHP(j)*ETYCHP(j)); VCV=cov(HCHP(j,80:nlong),YCHP(j,80:nlong)); CIHCHP(j)=(VCV(2,1))/(ETHCHP(j)*ETYCHP(j)); VCV=cov(YCHP(j,80:nlong),YCHP(j,80:nlong)); CIYCHP(j)=(VCV(2,1))/(ETYCHP(j)*ETYCHP(j)); VCV=cov(ICHP(j,80:nlong),YCHP(j,80:nlong)); CIICHP(j)=(VCV(2,1))/(ETICHP(j)*ETYCHP(j)); VCV=cov(PMCHP(j,80:nlong),YCHP(j,80:nlong)); CIPMCHP(j)=(VCV(2,1))/(ETPMCHP(j)*ETYCHP(j)); % correlation emploi-productivite (moyenne) VCV=cov(PMCHP(j,80:nlong),HCHP(j,80:nlong)); CORHPMHP(j)=(VCV(2,1))/(ETPMCHP(j)*ETHCHP(j)); end; % Calcul des moments moyens sur l'ensemble des simulations % et de leur ecart-type 36 mETKCHP=mean(ETKCHP); mETCCHP=mean(ETCCHP); mETHCHP=mean(ETHCHP); mETYCHP=mean(ETYCHP); mETICHP=mean(ETICHP); mETPMCHP=mean(ETPMCHP); etETKCHP=std(ETKCHP); etETCCHP=std(ETCCHP); etETHCHP=std(ETHCHP); etETYCHP=std(ETYCHP); etETICHP=std(ETICHP); etETPMCHP=std(ETPMCHP); mETRKCHP=mean(ETRKCHP); mETRCCHP=mean(ETRCCHP); mETRHCHP=mean(ETRHCHP); mETRYCHP=mean(ETRYCHP); mETRICHP=mean(ETRICHP); mETRPMCHP=mean(ETRPMCHP); mETRHPMCHP=mean(ETRHPMCHP); mLAMBDA=mean(LAMBDA); etETRKCHP=std(ETRKCHP); etETRCCHP=std(ETRCCHP); etETRHCHP=std(ETRHCHP); etETRYCHP=std(ETRYCHP); etETRICHP=std(ETRICHP); etETRPMCHP=std(ETRPMCHP); etETRHPMCHP=std(ETRHPMCHP); etLAMBDA=std(LAMBDA); mAC1KCHP=mean(AC1KCHP); mAC1CCHP=mean(AC1CCHP); mAC1HCHP=mean(AC1HCHP); mAC1YCHP=mean(AC1YCHP); mAC1ICHP=mean(AC1ICHP); mAC1PMCHP=mean(AC1PMCHP); 37 etAC1KCHP=std(AC1KCHP); etAC1CCHP=std(AC1CCHP); etAC1HCHP=std(AC1HCHP); etAC1YCHP=std(AC1YCHP); etAC1ICHP=std(AC1ICHP); etAC1PMCHP=std(AC1PMCHP); mCIKCHP=mean(CIKCHP); mCICCHP=mean(CICCHP); mCIHCHP=mean(CIHCHP); mCIYCHP=mean(CIYCHP); mCIICHP=mean(CIICHP); mCIPMCHP=mean(CIPMCHP); etCIKCHP=std(CIKCHP); etCICCHP=std(CICCHP); etCIHCHP=std(CIHCHP); etCIYCHP=std(CIYCHP); etCIICHP=std(CIICHP); etCIPMCHP=std(CIPMCHP); mCORHPMHP=mean(CORHPMHP); etCORHPMHP=std(CORHPMHP); mET1=[mETCCHP mETHCHP mETYCHP mETICHP mETPMCHP ]; etET1=[etETCCHP etETHCHP etETYCHP etETICHP etETPMCHP ]; mETR1=[mETRCCHP mETRHCHP mETRYCHP mETRICHP mETRPMCHP ]; etETR1=[etETRCCHP etETRHCHP etETRYCHP etETRICHP etETRPMCHP ]; mAC11=[mAC1CCHP mAC1HCHP mAC1YCHP mAC1ICHP mAC1PMCHP ]; etAC11=[etAC1CCHP etAC1HCHP etAC1YCHP etAC1ICHP etAC1PMCHP ]; mCI1=[mCICCHP mCIHCHP mCIYCHP mCIICHP mCIPMCHP ]; etCI1=[etCICCHP etCIHCHP etCIYCHP etCIICHP etCIPMCHP ]; 38 disp('variance modele / variance observee') disp(' ') disp(mLAMBDA) disp(etLAMBDA) disp('moments des parties cycliques HP') disp(' ') disp('ordre: C - H - Y - I - PM') disp(' ') disp('ecart-types') disp(' ') disp(mET1) disp(etET1) disp('ecart-types relatifs') disp(' ') disp(mETR1) disp(etETR1) disp('autocorrelations a l ordre 1') disp(' ') disp(mAC11) disp(etAC11) disp('correlations instantanees avec Y') disp(' ') disp(mCI1) disp(etCI1) disp('correlation instantannee productivite-emploi') disp(' ') disp(mCORHPMHP) disp(etCORHPMHP) disp('ecart type relatif emploi-productivite') disp(' ') disp(mETRHPMCHP) 39 disp(etETRHPMCHP) dur=etime(clock,ttt); disp('temps de calcul en secondes:') disp(dur) diary off 40 Résumés des cours dispensés en Licence Economie Année universitaire 2011 - 2012 2 Sommaire L1 - Semestre 1  Macroéconomie ................................................................................................................... page 4  Grands courants de la pensée économique ........................................................................ page 4  Mathématiques ................................................................................................................... page 4  Statistiques ......................................................................................................................... page 4  Introduction au droit privé ................................................................................................... page 4  Economie descriptive .......................................................................................................... page 4  Comptabilité nationale ........................................................................................................ page 4  Economie d’entreprise ........................................................................................................ page 4  Méthodologie du travail universitaire ................................................................................... page 5  Informatique ........................................................................................................................ page 5 L1 - Semestre 2  Microéconomie .................................................................................................................. page 5  Grands problèmes économiques contemporains ................................................................ page 5  Mathématiques ................................................................................................................... page 5  Statistiques ......................................................................................................................... page 5  Introduction au droit public .................................................................................................. page 6  Grandes fonctions de l’entreprise ....................................................................................... page 6  Sociologie économique ....................................................................................................... page 6  Economie européenne......................................................................................................... page 6  Langue vivante 1 ................................................................................................................ page 6  Informatique ........................................................................................................................ page 6 L2 - Semestre 3  Macroéconomie ................................................................................................................... page 7  Economie monétaire ........................................................................................................... page 7  Mathématiques ................................................................................................................... page 7  Politique de la concurrence ................................................................................................. page 7  Démographie ...................................................................................................................... page 7  Institutions administratives .................................................................................................. page 7  Gestion d’entreprise ............................................................................................................ page 7  Langue vivante 2 ................................................................................................................ page 7  Informatique 1 (statistiques et probabilités avec Excel) ....................................................... page 7 L2 - Semestre 4  Microéconomie ................................................................................................................... page 8  Politiques économiques ...................................................................................................... page 8  Statistiques et probabilités .................................................................................................. page 8  Histoire des faits économiques aux 19ème et 20ème siècles ............................................. page 8  Comptabilité générale ......................................................................................................... page 8  Finance d’entreprise ........................................................................................................... page 8  Langue vivante 3 ................................................................................................................. page 8  Informatique 2 (Access) ..................................................................................................... page 8 L3 - Semestre 5  Marchés et actifs financiers ................................................................................................ page 9  Macroéconomie approfondie ............................................................................................... page 9  Economie publique ............................................................................................................. page 9  Dynamique économique ..................................................................................................... page 9  Statistique approfondie ....................................................................................................... page 9  Economie du risque et de l’environnement ........................................................................ page 9  Croissance et développement durable ................................................................................ page 10  Droit du travail ..................................................................................................................... page 10  Economie du travail et de la répartition ............................................................................... page 10  Comptabilité approfondie .................................................................................................... page 10  Economie des organisations ............................................................................................... page 10  Stratégies d’entreprises ...................................................................................................... page 10 3 Sommaire (suite) Parcours IUP Finance  Analyse monétaire .............................................................................................................. page 11  Analyse microéconomique .................................................................................................. page 11  Statistiques et économétrie appliquées à la finance ........................................................... page 11  Produits boursiers ............................................................................................................... page 11  Comptes et moyens de paiement ....................................................................................... page 11  Produits d’épargne du particulier ......................................................................................... page 11  Gestion des OPCVM ........................................................................................................... page 11  Comptabilité générale ......................................................................................................... page 11  Anglais ................................................................................................................................ page 11  Techniques d’expression .................................................................................................... page 11 L3 - Semestre 6  Mondialisation et économie internationale .......................................................................... page 12  Théorie des jeux ................................................................................................................. page 12  Analyse des données .......................................................................................................... page 12  Histoire de l’analyse économique ....................................................................................... page 12  Histoire de l’Etat libéral ...................................................................................................... page 13  Economie publique appliquée ............................................................................................. page 12  Analyse des risques macrofinanciers .................................................................................. page 13  Analyse économique des politiques sociales ...................................................................... page 13  Gestion d’entreprise appliquée (jeu) ................................................................................... page 13  Gouvernance d’entreprise ................................................................................................... page 13  Gestion de trésorerie .......................................................................................................... page 13  Droit des affaires ................................................................................................................. page 13  Langue vivante 5 ................................................................................................................ page 13  Méthodes d’enquêtes .......................................................................................................... page 13 Parcours IUP Finance  Economie monétaire et bancaire ........................................................................................ page 14  Macroéconomie financière .................................................................................................. page 14  Mathématiques financières ................................................................................................. page 14  Droit des sociétés ............................................................................................................... page 14  Informatique ........................................................................................................................ page 14  Produits d’assurance des personnes .................................................................................. page 14  Crédits bancaires aux particuliers ....................................................................................... page 14  Analyse financière .............................................................................................................. page 14  Anglais des affaires ............................................................................................................ page 14  Techniques d’expression .................................................................................................... page 14  Projet collectif ..................................................................................................................... page 14 4 Licence Economie - Première année GRANDS COURANTS DE LA PENSEE ECONOMIQUE Le cours de grands courants de la pensée économique décrit l’évolution de la pensée économique depuis l’Antiquité. Le premier chapitre (de loin le plus long) présente les diverses conceptions de l’économie et l’émergence des concepts actuels avec les néo-classiques. Les autres chapitres s’attachent à l’histoire des grandes doctrines. 1. L’évolution des instruments d’analyse et des problématiques de l’Antiquité à nos jours : une vue d’ensemble 2. La richesse de la pensée antique 3. La pensée médiévale 4. Les mercantilistes 5. Les physiocrates 6. Les classiques 7. La réaction socialiste, marxiste et non marxiste 8. La réaction méthodologique : l’école historique et l’école institutionnaliste MATHEMATIQUES Le cours de mathématiques est construit de la façon suivante : 1. Equations de droites – programmation linéaire 2. Les polynômes 3. Les logarithmes et les exponentielles 4. Continuité et dérivabilité 5. Le calcul différentiel 6. Etudes de fonctions – développements limités Chaque chapitre est accompagné d’exemples d’applications à l’économie. MACROECONOMIE Dans le cours de macroéconomie, deux chapitres principaux sont traités (en 20 heures) : 1. L’équilibre macro-économique classique 2. L’équilibre macro-économique keynésien STATISTIQUES Le cours de statistiques permet l’étude d’une distribution à une variable. Il est composé de 5 chapitres : 1. Notions statistiques et collecte de données 2. Présentation des données statistiques : tableaux et graphiques 3. Les caractéristiques de tendance centrale des distributions à un caractère 4. Les caractéristiques de dispersion des distributions à un caractère 5. Les caractéristiques de forme et de concentration INTRODUCTION AU DROIT PRIVE Dans le cours d’introduction au droit privé, cinq aspects sont abordés : 1. Le droit et les droits 2. Les sources du droit 3. La mise en œuvre des droits 4. Les sujets de droit 5. La responsabilité délictuelle ECONOMIE DESCRIPTIVE Le cours d’économie descriptive présente, à partir de sujets d’actualité, les concepts de base de la science économique. Les étudiants sont ainsi incités à s’intéresser à l’actualité économique et formés à la décrypter. ECONOMIE D’ENTREPRISE Le cours d’économie d’entreprise aborde les principaux enjeux de la discipline et place les entreprises au cœur du circuit économique. Il revient sur les définitions et les mécanismes élémentaires (comme les facteurs de production, l’investissement, la création de valeur ajoutée et la répartition des revenus), ainsi que sur la diversité de ces entités (tant sur le plan des activités, des statuts juridiques, de la taille ou de la propriété). Ces bases permettent de discuter ensuite les structures et l’organisation des firmes, puis de comprendre la stratégie d’entreprise (démarche, diagnostic, choix…). L’enseignement mêle systématiquement les considérations pratiques aux développements théoriques. COMPTABILITE NATIONALE La comptabilité nationale est le cadre dans lequel sont définies et quantifiées la plupart des notions économiques qui sont la base des études d’économie mais aussi de la compréhension des actualités économiques. Nous allons présenter la logique interne de la comptabilité nationale afin de saisir sa cohérence et son intérêt, mais aussi ses limites et ses problèmes. Plan du cours : Introduction L’approche par les produits L’approche par les revenus Financement des patrimoines La synthèse des résultats : agrégats et TEE 5 Licence Economie - Première année MICROECONOMIE Dans le cours de microéconomie, on aborde les bases de l’analyse microéconomique : la définition de l’économie, la distinction entre micro- et macroéonomie ; la frontière des possibilités de production et le coût d’opportunité, la théorie du consommateur et de la demande ; la théorie du producteur et de l’offre ; les marchés de concurrence parfaite, monopole, oligopole, l’analyse de l’équilibre général. Le plan suivi sera le suivant : Introduction : L’ analyse microéconomique : définition, objectifs et méthodes. Chapitre 1 : Le marché Section 1 : La notion de biens économiques et de marché Section 2 : La fonction de demande Section 3 : La fonction d’offre Section 4 : L’équilibre du marché Chapitre 2 : Le comportement du consommateur Section 1 : Les axiomes de base du comportement du consommateur Section 2 : Utilité et courbes d’indifférence Chapitre 3 : L’équilibre du consommateur Section 1 : La contrainte budgétaire Section 2 : La recherche de l’équilibre du consommateur Section 3 : Le calcul de l’optimum Section 4 : Les modifications de l’équilibre et la demande individuelle Chapitre 4 : La demande du consommateur et son élasticité Section 1 : L'élasticité-prix Section 2 : L'élasticité-revenu Section 3 : L'élasticité croisée Chapitre 5 : Approche de l’entreprise et de sa production Chapitre 6 : La fonction de production de l’entreprise Section 1 : La production avec un seul facteur variable Section 2 : La production avec deux facteurs variables Section 3 : La recherche de l’optimum de production Chapitre 7 : Les coûts de l’entreprise Section 1 : Les coûts de courte période Section 2 : Les coûts de longue période Chapitre 8 : Comportements du producteur sur différent marchés GRANDS PROBLEMES ECONOMIQUES CONTEMPORAINS 1) Aspects microéconomiques : De quelle façon l'économiste analyse-t-il les problèmes d'environnement? La grande entreprise a-t-elle transformé les mécanismes du capitalisme? 2) Aspects macroéconomiques : L'économie du développement L'analyse des crises économiques 3) Aspects à la fois micro et macroéconomiques : Systèmes socialistes et centralisation Libéralisme et interventionnisme MATHEMATIQUES Le cours de mathématiques est construit de la façon suivante : 1. Suites numériques 2. Calcul intégral 3. Equations différentielles 4. Fonctions de plusieurs variables 5. Fonctions homogènes, fonctions implicites 6. Base du calcul matriciel 7. Déterminant et inverse d’une matrice Chaque chapitre est accompagné d’exemples d’applications à l’économie. STATISTIQUES Le cours de statistiques aborde l’étude d’une distribution à deux variables et les notions d’indices et de taux de croissance. Une introduction à la statistique probabiliste est également proposée. Il est composé de 3 chapitres : 1. Statistiques descriptives à deux dimensions (tableaux à double entrée, caractéristiques marginales et conditionnelles, indépendance, liaison fonctionnelle et relative) 2. Taux de croissance et indices (élémentaires et synthétiques) 3. Introduction à la statistique probabiliste (notions de variable aléatoire, de probabilités conditionnelles, …) METHODOLOGIE DU TRAVAIL UNIVERSITAIRE Dans le cours de méthodologie du travail universitaire, les étudiants sont formés aux techniques de prise de notes et de rédaction d’une dissertation. Ils sont également amenés à rechercher de l’information économique et à la présenter sous la meilleure forme. INFORMATIQUE Le cours d’informatique est consacré aux systèmes d’exploitation, à l’internet, aux traitements de textes et aux outils de présentation (préparation de la première partie du C2i). 6 Licence Economie - Première année INTRODUCTION AU DROIT PUBLIC Dans le cours d’introduction au droit public, trois aspects sont abordés : 1. Les notions et principes fondamentaux 2. Les sources du droit public 3. L’organisation constitutionnelle de la Ve République GRANDES FONCTIONS DE L’ENTREPRISE Le cours de grandes fonctions de l’entreprise passe en revue : la fonction de production (en y intégrant la gestion de la qualité, la logistique et la recherche-développement), la fonction commerciale (de la démarche marketing à la force de vente), la fonction comptable et financière, la fonction de gestion des ressources humaines. Ce tour d’horizon mène à l’élaboration d’un système d’information et considère l’entreprise comme un centre de décision. Une synthèse peut alors être réalisée en posant la question de la stratégie de l’entreprise (au niveau global, au niveau des domaines d’activités stratégiques, à l’échelle internationale). SOCIOLOGIE ECONOMIQUE Le cours de sociologie économique s’inscrit dans la continuité du cours de sociologie générale qu’ont reçu les bacheliers ES. Après une brève remise à niveau en sociologie et une présentation des fondateurs de la sociologie économique (Marx, Weber, Mauss), le cours vise à compléter la culture sociologique des étudiants en s’intéressant aux courants contemporains de la sociologie économique. Autour de l’étude des principaux objets de la sociologie économique (l’échange, la coordination, la monnaie, les conventions, les réseaux, la complexité, le travail, etc.), on montre la fécondité de cette approche et l’intérêt qu’elle peut revêtir pour les économistes. L’objectif du cours est donc de faire dialoguer les deux disciplines (économie et sociologie) autour d’objets communs pour montrer comment elles peuvent s’enrichir l’une l’autre dans la compréhension des phénomènes économiques. ECONOMIE EUROPEENNE L’objectif du cours d’économie européenne est de proposer une introduction à l’économie européenne à travers sept grands thèmes : 1. L’économie de l’Union européenne : une approche descriptive 2. Les institutions économiques de l’Union européenne 3. Les théories de l’intégration européenne 4. Les politiques économiques dans la zone Euro 5. La politique agricole commune 6. La concurrence fiscale en Europe 7. Les enjeux de l’élargissement de l’Union à l’est INFORMATIQUE Le cours d’informatique est consacré aux traitements de données, au travail collaboratif, à la sensibilisation au droit et à la déontologie (préparation de la deuxième partie du C2i) LANGUE VIVANTE 1 L’enseignement de langue vivante 1, assuré par le service commun de l’enseignement des langues vivantes (SCELV), porte sur la compréhension orale d’une langue vivante. 7 MACROECONOMIE Dans le cours de macroéconomie, quatre points sont abordés : 1. Analyse approfondie des deux grandes fonctions : consommation et investissement 2. Examen des modèles doctrinaux du côté de la demande 3. Examen des modèles doctrinaux du côté de l’offre 4. Possibilité de synthèse Licence Economie - Deuxième année ECONOMIE MONETAIRE Le cours d’économie monétaire fournit une introduction à la théorie monétaire en trois chapitres : 1. L’utilité de la monnaie 2. La demande de monnaie 3. L’offre de monnaie MATHEMATIQUES Le cours de mathématiques présente les points suivants : 1. Espaces vectoriels 2. Opérations sur les matrices 3. Systèmes d’équations linéaires 4. Vecteurs propres et valeurs propres 5. Fonctions de plusieurs variables réelles 6. Optimisation libre 7. Optimisation contrainte Chaque chapitre est accompagné d'exemples d'applications à l'économie. POLITIQUE DE LA CONCURRENCE Le cours de politique de la concurrence a pour vocation à faire la transition entre les deux cours de microéconomie de L1 (concurrence parfaite) et de L2 (concurrence imparfaite). On montre d’abord comment le modèle de concurrence pure et parfaite peut servir d’étalon afin de juger les situations réelles des marchés. A cet égard, les institutions en charge de la politique de la concurrence sont présentées ainsi que leurs objectifs et la manière dont elles mettent en œuvre leur politique. Puis, on lève progressivement les hypothèses de la concurrence parfaite (atomicité, barrière à l’entrée, ententes) et on introduit de manière non-technique la concurrence imparfaite. L’objectif est ici de faire comprendre les grandes problématiques de la concurrence imparfaite afin de montrer la nécessité d’outils techniques précis pour étudier ces situations (ce qui est fait en Microéconomie II) et pour juger des cas de politique de la concurrence. DEMOGRAPHIE Le cours de démographie répond à trois objectifs : 1. une connaissance des instruments de base de l’analyse démographique, 2. une connaissance des principaux faits démographiques en France, en Europe et dans le monde, 3. une approche empirique et théorique des interactions entre population et économie. Il porte sur les différents phénomènes démographiques (natalité et fécondité, nuptialité, mortalité, migrations). INSTITUTIONS ADMINISTRATIVES L’objectif du cours d’institutions administratives est de sensibiliser les étudiants à l’organisation administrative de la France et à ses modes d’action. Trois parties sont proposées : 1. Présentation générale de l’administration 2. L’administration d’Etat 3. Les collectivités locales GESTION D’ENTREPRISE Le cours de gestion d’entreprise propose aux étudiants une approche concrète des modalités de gestion d’une entreprise, et ce, à partir d’exercices de simulation (jeux d’entreprise). LANGUE VIVANTE 2 Le cours de langue vivante 2, assuré par le service commun de l’enseignement des langues vivantes (SCELV), porte sur la compréhension écrite d’une langue vivante. INFORMATIQUE 1 (Statistiques et probabilités avec Excel) Le cours d’informatique 1 (statistiques et probabilités avec Excel) a pour objet de permettre aux étudiants d’utiliser l’outil informatique pour construire et présenter des travaux de statistiques. Il s’agit de leur montrer comment gérer une base de données, comment construire des tableaux et des graphiques, comment calculer des caractéristiques statistiques, et ce, en insistant sur l’interprétation des résultats obtenus. 8 MICROECONOMIE Le cours de microéconomie reprend les acquis du cours de microéconomie de L1 en exposant les deux théorèmes du bienêtre. En plus, il introduit à l’économie publique (l’Etat comme agent producteur de biens publics et comme agent redistributeur, par le biais de l’impôt et des transferts sociaux) et à la théorie des jeux en concurrence imparfaite (économie industrielle). Licence Economie - Deuxième année POLITIQUES ECONOMIQUES Le cours de politiques économiques présente les différentes politiques économiques conjoncturelles ayant pour objectif de modifier une évolution macroéconomique spontanée jugée sousoptimale. L’introduction permet d’établir et de définir le concept de politique conjoncturelle, de la resituer dans son contexte historique et théorique et de présenter la politique conjoncturelle française depuis 1950. La première partie analyse les deux grands instruments de régulation conjoncturelle : la politique budgétaire et la politique monétaire. La seconde partie se présente comme une application des concepts introduits dans la première aux politiques de lutte contre le chômage. Enfin, la conclusion s’interroge sur la pertinence d’une politique économique conjoncturelle et montre que l’action étatique semble, actuellement, s’orienter vers des actions structurelles de long terme. STATISTIQUES ET PROBABILITES Le cours de statistiques et probabilités propose les cinq points suivants : 1. Probabilités 2. Variables aléatoires 3. Vecteurs aléatoires et lois conditionnelles 4. Principales lois de probabilité 5. Convergences HISTOIRE DES FAITS ECONOMIQUES Le cours d’histoire des faits économiques aux 19e et 20e siècles utilise les principaux concepts acquis en comptabilité nationale et en macroéconomie pour analyser l’évolution des économies européennes (ex URSS incluse) de la révolution industrielle à la fin du 20è siècle. 1. Les méthodes de l’histoire économique 2. La révolution industrielle : histoire et interprétations 3. L’économie française de 1820 à 1914 4. Les spécificités de l’histoire américaine 5. Développement de l’Europe de 1820 à 1914 6. L’ère des crises (1918-1940) : faits et interprétations 7. 1945-2000. Les « trente glorieuses » à la croissance molle COMPTABILITE GENERALE Le cours de comptabilité générale a pour objectif de donner à chaque étudiant les bases de compréhension nécessaires à la lecture et au traitement des principales opérations comptables de l'entreprise. La lecture et la manipulation des états financiers, et notamment de la liasse fiscale, sont en effet indispensables pour tout étudiant d'une filière économie-gestion souhaitant poursuivre sa formation supérieure dans un domaine en rapport avec le monde de l'entreprise. Pour ce faire, nous concilions à la fois l'opératoire, au travers de la tenue d'une comptabilité fictive, et l'analyse en traitant de la logique comptable sous-jacente de façon simple et générale. Aucun pré-requis n'est nécessaire. Le cours est divisé en deux parties. La première s'intéresse aux fondements de la comptabilité générale dans une perspective temporelle ainsi qu'à la mise en évidence de ses principaux objectifs, principes et méthodes. La seconde partie, plus appliquée, traite de la tenue et de l'enregistrement des opérations de constitution, d'exploitation, de financement, d'investissement et d'inventaire. FINANCE D’ENTREPRISE Le cours de finance d’entreprise présente les outils utiles à la gestion des finances d’une entreprise. Sont ainsi abordées, entre autres, les notions de rentabilité, de trésorerie, de liquidité, de choix optimal d’investissement, … . LANGUE VIVANTE 3 L’enseignement de langue vivante 3, assuré par le service commun de l’enseignement des langues vivantes (SCELV), est consacré à l’expression écrite et orale d’une langue vivante. INFORMATIQUE 2 Le cours d’informatique 2 propose une initiation à la création et à la gestion d’une base de données sous Access. Les points suivants sont traités : 1. Analyse fonctionnelle (définition de la notion de bases de données relationnelles) 2. Les tables (création des champs ; définition des propriétés des champs ; création de la clé primaire ; création de liste de choix avec l’assistant ; utilisation et personnalisation du masque de saisie ; définition des relations entre les tables) 3. Les requêtes (création de requêtes de sélections simples) 4. Les formulaires (création de formulaires avec sous formulaire avec l’assistant) 5. Les états (création avec l’assistant) 9 Licence Economie - Troisième année MARCHES ET ACTIFS FINANCIERS L’objet du cours de marchés et actifs financiers est l’étude du marché financier français, ainsi que des grands marchés dérivés de gestion des risques, en se plaçant du point de vue de leur utilisation par les entreprises. L’accent y est mis sur le rôle fondamental des banques. 1. Les financements sur les marchés de valeurs mobilières 2. La gestion du risque de taux d’intérêt sur les marchés de gré à gré 3. La gestion des risques de prix et de change sur les marchés organisés de contrats à terme négociables 4. La gestion du risque boursier sur les marchés organisés d’options négociables MACROECONOMIE APPROFONDIE Le cours de macroéconomie approfondie aborde deux aspects très contemporains de la macroéconomie. Au préalable l’introduction générale définit le champ du cours dans le cadre de la macroéconomie financière. Les problèmes de l’instabilité du cycle économique induite par le cycle du crédit bancaire, ou l’ampleur des déficits budgétaires et de la dette publique, sont abordés, mettant en exergue la macroéconomie du crédit bancaire (Chapitre I) et la macroéconomie des déficits budgétaires (Chapitre II). D’autres problèmes sont signalés en introduction générale mais sans qu’il ne soit possible de leur donner un traitement exhaustif : l’instabilité du cycle économique du fait des décisions d’investissement des firmes privées en régime d’incertitude, ou du fait de l’instabilité financière. Le Chapitre I revient sur le rôle décisif du crédit bancaire dans les économies contemporaines. La Section I montre comment le modèle de base en économie fermée ignore ce rôle, le taux d’intérêt assurant l’équilibre étant celui des actifs financiers. Ce modèle est alors enrichi pour expliquer les raffinements contemporains des fonctions de comportement. Mais surtout, la Credit View est plus exhaustivement abordée (Section II), et ce dans différentes directions, dont la moindre est la mise en évidence du canal du crédit. Le rôle du crédit bancaire dans la détermination du volume d’activité d’équilibre, et surtout dans l’apparition d’une déflation potentielle de l’activité est illustré. Le Chapitre II revient sur la macroéconomie des déficits budgétaires. D’abord à partir des fondements intergénérationnels des transferts redistributifs dans le cadre des ménages dynastiques (Section I). Ensuite avec le rôle central des prévisions rationnelles dans les comportements desdits ménages (Section II). Pour enfin aborder l’échec des politiques de relance par l’emprunt (équivalence ricardienne), lorsque l’Etat « joue contre le secteur privé » dans les pays riches (Section III-A), ou lorsque la stabilisation des déficits publics ignore les contraintes redistributives des ménages dynastiques dans les pays pauvres d’Afrique (Section III-B). ECONOMIQUE PUBLIQUE Le cours d’économie publique s’articule autour de trois parties qui couvrent l’ensemble des domaines traditionnellement étudiés par cette branche de l’économie, essentiellement dans une perspective normative. Ainsi, la première partie traite des fondements de l’économie publique. La deuxième partie est consacrée au rôle de l’Etat dans la correction des défaillances du marché. Enfin, la dernière partie présente une vision plus critique de l’Etat à travers l’analyse des déviances bureaucratiques, de la démocratie et des groupes de pression. DYNAMIQUE ECONOMIQUE Ce cours présente : 1. Les principales approches de la dynamique à long terme, des cycles longs aux théories de la croissance endogène, en les confrontant aux enseignements de l’histoire. 2. Les théories des crises avec une attention particulière aux explications de la crise actuelle comparée à celle de 1929. STATISTIQUE APPROFONDIE Le cours de statistique approfondie propose les trois parties suivantes : 1. Théorie de l’estimation 2. Tests d’hypothèses 3. Introduction à la loi normale multidimensionnelle ECONOMIE DU RISQUE ET DE L’ENVIRONNEMENT Le cours d’économie du risque et de l’environnement est développé en deux parties. La première partie introduit les principales problématiques appréhendées par l’économiste en matière d’environnement (effets externes, bien public, évaluation des biens environnementaux...) et de ressources naturelles (épuisables et renouvelables). Il présente notamment les différentes théories qui ont été développées afin de proposer une gestion optimale des ressources environnementales, ainsi que des instruments de politique environnementale. Sont ensuite abordés des sujets plus pratiques concernant les services d'eau potable, l'écocertification, la déforestation tropicale et la modélisation de filière forestière. L'objectif est de donner une matière pour réfléchir aux questions d'actualité telles que la préservation de la biodiversité, la pertinence d'une taxe carbone, le prix de l'eau... La seconde partie présente l'approche de l'économiste des domaines du risque et de l'incertain. Sont étudiés les outils essentiels de l'analyse microéconomique de l'incertain, tels que la théorie du comportement individuel dans l'incertain, les mesures d'aversion pour le risque et les mesures de risque, la notion d'équivalent certain et les structures d'information. Sont ensuite traités les thèmes de l'assurance et de l'échange en incertain. 10 COMPTABILITE APPROFONDIE Le cours de comptabilité approfondie vise à compléter les connaissances d'étudiants futurs concepteurs ou utilisateurs des comptes. Il traitera de l'application comptable de situations clés de la vie des sociétés. Il s'articulera autour de la connaissance du traitement comptable et des incidences fiscales d'opérations réalisées par les entreprises depuis leur constitution jusqu'à leur fusion ou leur liquidation, en passant par la recherche de sources de financement par capitaux propres ou par endettement. La comptabilité de groupe ainsi que les normes internationales IFRS y seront également abordées en détail. L'objectif principal est d'être capable, à travers la compréhension de la traduction comptable d'opérations fondamentales, de concevoir, analyser, auditer ou utiliser des comptes annuels modifiés par ces opérations. Licence Economie - Troisième année CROISSANCE ET DEVELOPPEMENT DURABLE Le cours de croissance et développement durable vise à apporter aux étudiants des connaissances leur permettant d’appréhender les différentes dimensions du développement durable, économiques, sociales et environnementales. Il inclut une présentation des mécanismes de base de l’analyse de la croissance et du développement ainsi que des acteurs du développement durable, (entreprises socialement responsables, société civile, collectivités territoriales) et du principe de précaution. Les nouveaux modes de fonctionnement de l’économie, tels que l’économie de fonctionnalité ou les symbioses industrielles qui relèvent de l’écologie industrielle sont abordés, ainsi qu’une comparaison des principaux instruments économiques visant à protéger l’environnement, comme les taxes et les permis d’émission négociables. DROIT DU TRAVAIL Le cours de droit du travail présente l’ensemble des règles qui régissent les relations entre les employeurs et les salariés. Ce sont donc les différents aspects du contrat de travail qui sont analysés. ECONOMIE DES ORGANISATIONS Le cours d’économie des organisations présente les principales analyses relatives à l’organisation des systèmes économiques (marchés, entreprises) en se concentrant sur les concepts majeurs de coûts de transaction, d’information, d’aléas moraux, de sélection adverse ou de droits de propriété. De nombreuses applications empiriques de ces concepts sont proposées, abordant ainsi la relation d’emploi, les contrats de franchise ou encore les droits de propriété intellectuelle. 1. Organisation économique et efficacité : coordination, incitation, information 2. Les prix comme mécanisme organisationnel 3. Informations privées et sélection adverse 4. Aléa moral et réputation 5. Les droits de propriété STRATEGIE D’ENTREPRISES Le cours de stratégies d’entreprises présente les avantages et limites de la mise en œuvre des différentes stratégies utilisées par les entreprises en fonction de leur environnement concurrentiel et institutionnel ainsi que de leurs capacités intrinsèques. Cet enseignement conduit à l’analyse des principaux thèmes de l’économie industrielle. ECONOMIE DU TRAVAIL ET DE LA REPARTITION Le cours d’économie du travail et de la répartition est composé de quatre chapitres : 1. Les grandes théories de la répartition du revenu global 2. Chômage et répartition 3. L’offre de travail 4. Les « nouvelles » théories du chômage fondées sur les caractéristiques de l’offre de travail ou du marché du travail 11 Licence Economie - Troisième année - parcours IUP Finance - ANGLAIS Préparation des étudiants au TOEIC, basé sur l’acquisition de vocabulaire professionnel et un entraînement intensif à la compréhension orale de documents sonores tirés de la vie professionnelle. Activités d’expression écrite et orale et de compréhension écrite autour du thème de la bourse (création et suivi d’un portefeuille d’actions fictif). PRODUITS BOURSIERS Etude des marchés d’inscription et de négociation des valeurs mobilières gérés par le réseau Euronext et les institutions associées, de la vie des marchés et des valeurs mobilières qui y sont échangées. COMPTE ET MOYENS DE PAIEMENT Ouverture, fonctionnement et clôture du compte, opérations en espèces, chèques, virements, cartes, … . TECHNIQUES D’EXPRESSION Former les étudiants aux techniques et aux comportements dans le cadre d’entretiens de recherche de stage ou d’emploi. Développer leur capacités de communication écrite et orale avec, comme fil conducteur, les attentes du monde professionnel. COMPTABILITE GENERALE Structure du bilan et du résultat ; opérations courantes de l’entreprise : cycles achat, vente, trésorerie, investissement et créditbail, salaires,… ; opérations d’inventaire : amortissements, provisions pour dépréciation et pour risques, régularisations actif-passif, états de rapprochement ; documents de synthèse (liasse). PRODUITS BANCAIRES D’EPARGNE DU PARTICULIER Analyse de l’épargne des particuliers, comptes, livrets, plans d’épargne,… GESTION DE OPCVM Produits d’épargne non bancaires, organismes de placement collectif en valeurs mobilières. STATISTIQUES ET ECONOMETRIES APPLIQUEES A LA FINANCE Ce cours est composé de deux parties. La première partie permet de présenter la théorie de l’estimation et différents tests statistiques (test d’égalité de deux moyennes, de deux variances, de deux proportions, test du khi-deux, …). Dans la seconde partie, on propose une introduction à l’économétrie dans laquelle on présente d’abord le modèle de régression linéaire simple que l’on applique à l’analyse du risque de la firme. On s’intéresse ensuite au modèle de régression multiple, en l’appliquant à la théorie de l’évaluation par arbitrage. Enfin, on ouvre sur d’autres types de modèles tels que les modèles à retard échelonnés, les modèles autorégressifs ou les modèles d’ajustement partiel, les tests d’efficience du marché fournissant les applications appropriées. ANALYSE MICROECONOMIQUE Ce cours est scindé en deux parties. La première présente l’analyse néoclassique des marchés concurrentiels : théorie du consommateur, théorie de la firme en équilibre (général) de marché. La seconde propose une introduction à la théorie des jeux (non-coopératifs), à la théorie des choix en environnement incertain et à la théorie des contrats et des incitations. ANALYSE MONETAIRE Ce cours est une introduction aux analyse théoriques des éventuelles conséquences de la présence de la monnaie sur les variables économiques réelles (théorie quantitative de la monnaie, l’approche keynésienne, dilemme inflation-chômage, influence du crédit bancaire sur l’activité économique…). 12 ANALYSE DE DONNEES L’objectif du cours et des TD d’analyse des données est de former les étudiants (ayant choisi cette option) aux principales techniques statistiques permettant, face à des données concernant de nombreux individus et de nombreuses variables (quantitatives ou qualitatives), de résumer au mieux l’information. Cela peut se faire par exemple en créant des groupes d’individus qui se ressemblent, et en caractérisant ensuite chaque groupe par les valeurs moyennes ou les modalités les plus fréquentes de certaines variables. Il s’agit de donner aux étudiants qui le désirent un panorama des diverses techniques d’analyse des données, de leur indiquer les critères de choix entre ces techniques et, pour chacune d’entre elles, de leur fournir des clés d’interprétation des résultats, ainsi qu’une idée claire des limites. Cela se fait, en cours, au moyen d’exemples commentés par le professeur, ce qui rend quasiment nécessaire la participation assidue aux cours, ainsi qu’un travail régulier au fil des semaines. En TD, les étudiants apprennent à interpréter des résultats d'analyse de données, en appliquant les principes indiqués lors des cours. Un groupe de perfectionnement est créé à l'intention des étudiants volontaires pour y participer régulièrement toutes les semaines et pour fournir le travail de révision et de préparation nécessaire. Ils y apprennent, avec l’aide du professeur, à mettre en oeuvre euxmêmes les techniques d'analyse de données, en faisant usage d’un logiciel statistique (SAS) et de macro-programmes INSEE spécialisés. Le plan du cours est le suivant : Chapitre 1 : L’analyse en composantes principales (ACP) Chapitre 2 : L’analyse factorielle des correspondances (AFCSimples et AFCMultiples) Chapitre 3 : Méthodes de classification (CAH, CDH, « k-means », nuées dynamiques) Chapitre 4 : L’analyse factorielle discriminante (AFD) THEORIE DES JEUX La théorie des jeux constitue un ensemble d’outils analytiques qui ont été développés afin de comprendre et étudier les situations d’interaction entre individus rationnels. Elle s’inscrit en cela dans les limites de la théorie de l’Equilibre général, théorie dans laquelle les agents économiques interagissent uniquement par l’intermédiaire du système de prix sur lequel leurs décisions individuelles n’ont aucune influence. L’objectif de ce cours, qui se veut introductif, est de familiariser l’étudiant avec l’utilisation de cette « boîte à outils » via la maîtrise des concepts clés du domaine, à savoir les notions de stratégie dominante, d’équilibre de Nash, d’équilibre de Nash parfait en sous-jeux, ? La maîtrise de ces concepts permettra à l’étudiant d’appréhender diverses situations d’interaction stratégique, telles que la concurrence imparfaite, les enchères, le vote... . Ce cours est composé de 4 grandes parties : 1. Concepts clés : jeux, stratégies et information 2. La déviation dans un jeu : l’équilibre de Nash 3. Dynamique et « rétroduction » 4. Négociation : jeux coopératifs et non coopératifs HISTOIRE DE L’ANALYSE ECONOMIQUE Dans le cours d’histoire de l’analyse économique, on présente les bases anciennes de l'analyse économique : le circuit du capital et la formation des prix. L'adoption du paradigme de concurrence et ses implications analytiques en microéconomie et macroéconomie. Le développement des systèmes d'analyse modernes. Licence Economie - Troisième année ECONOMIE PUBLIQUE APPLIQUEE L’objectif du cours d’économie publique appliquée est de mettre en perspective des exemples marquants d’interventions publiques récentes à la lumière des concepts et des modes de raisonnement développés dans le cours d’économie publique du semestre précédent. Un chapitre préliminaire dresse un état des lieux du poids des pouvoirs publics dans l’économie française. Le corps du cours envisage ensuite, successivement, trois motifs d’intervention publique : la fourniture de biens collectifs, la gestion d’externalités et la redistribution. Les mesures de politique publique présentées et analysées sont choisies dans les domaines classiques d’intervention des pouvoirs publics : politique environnementale, politique énergétique, politique de santé, politique éducative, politique de lutte contre la pauvreté. MONDIALISATION ET ECONOMIE INTERNATIONALE Le cours de mondialisation et économie internationale est composé de trois chapitres : 1. La spécialisation internationale dans le cadre mondial 2. Les déséquilibres de paiements extérieurs et les politiques correctrices 3. La recherche de l’optimisation économique nationale à travers l’échange mondial MARCHES D’ASSURANCE ET DE PROTECTION SOCIALE Le cours de marchés d’assurance et de protection sociale, donné par un professionnel, présente les différents marchés d’assurance (IARD, vie, responsabilité civile, risques majeurs, santé,…) ainsi que les produits adaptés à la gestion des risques considérés. La différence est faite entre les mécanismes de l’assurance (dont le concept support est celui de l’efficacité économique) et ceux qui relèvent de la protection sociale (et donc du concept 13 GESTION D’ENTREPRISE APPLIQUEE Le cours de gestion d’entreprise appliquée (jeu) est un enseignement innovant, qui s’appuie sur l’utilisation d’un logiciel et qui vise à sensibiliser les étudiants à l’interdépendance des décisions, tant entre entreprises sur un même marché qu’au sein de l’entreprise. Licence Economie - Troisième année ANALYSE ECONOMIQUE DES POLITIQUES SOCIALES Le cours d’analyse économique des politiques sociales est centré sur la protection sociale. Après un chapitre introductif présentant les principales typologies des systèmes de protection sociale et les fonctions de la protection sociale, le cours traite du financement de la protection sociale et de ses liens avec l’emploi, puis aborde les différents domaines de la protection sociale (politiques familiales, politiques de la santé, politique des retraites, politiques de lutte contre la pauvreté). METHODES D’ENQUÊTES Le cours de méthodes d’enquêtes permet d’aborder les points suivants : 1. Formuler une problématique appréhendable par enquête 2. Echantillonnage et représentativité 3. Rédaction et test d’un questionnaire 4. Choix du mode de collecte 5. Organisation du protocole d’enquête 6. Après la collecte GOUVERNANCE D’ENTREPRISE L’objectif du cours de gouvernance d’entreprise est de présenter l’ensemble des règles régissant la façon dont l’entreprise est dirigée. Différents aspects sont abordés, notamment le fonctionnement du conseil d’administration, le rôle des actionnaires et celui des dirigeants. DROIT DES AFFAIRES Le cours de droit des affaires permet d’aborder les points suivants : - Présentation d’ensemble des règles juridiques qui régissent la vie des Entreprises. - Le cadre juridique du Droit des Affaires. - Le statut de l’Entreprise. Etablissement par chaque étudiant d’un projet de création d’une entreprise (soit sous forme individuelle ou sociétaire) et rédaction d’un contrat qui serait conclu entre cette structure juridique et ses clients » GESTION DE TRESORERIE Le cours de gestion de trésorerie présente la gestion de trésorerie dans la fonction financière de l’entreprise et montre le rôle du trésorier. La gestion des liquidités débute par le budget de trésorerie et un raisonnement en date de valeur. Les instruments de financement et de placement des liquidités sont étudiés dans le contexte bancaire et financier actuels. La gestion de trésorerie est aussi une gestion des risques financiers, parmi lesquels le risque de taux d’intérêt, faisant l’objet de mesures et de couvertures. De même, le risque de change est abordé dans le cadre d’une gestion de trésorerie internationale et d’une gestion de trésorerie de groupe. LANGUE VIVANTE 5 L’enseignement de langue vivante 5, assuré par le service commun de l’enseignement des langues vivantes (SCELV), est consacré à la préparation aux épreuves du certificat de langue CLES2. La part du travail en autonomie est majoritaire dans cet enseignement. ANALYSE DES RISQUES MACROFINANCIERS Dans le cours d’analyse des risques macrofinanciers, il s’agit principalement d’analyser les risques de taux (d’inflation, de change), les risques sur les marchés de capitaux internationaux (liquidité, ....) et la question de la stabilité du système financier. Ces risques affectent autant les entités macroéconomiques (un pays, une zone monétaire, une zone économique, une banque centrale, …) que des entités telles que l’entreprise (financière ou non financière). HISTOIRE DE L’ETAT LIBERAL - Comment le libéralisme est-il apparu en France ? -> Libéralisme politique et économique - Pourquoi existe-t’il depuis l ‘origine un libéralisme à la française spécifique ? -> Politique et économique - Pourquoi la notion de libéralisme est si particulière et presque un tabou chez nous ? - Le rapport complexe et ambigu de la France au libéralisme politique et économique depuis le XVIIème siècle jusqu’à aujourd’hui Notion actuelle : le libéralisme est-il en crise ? 14 FACULTE DE DROIT, SCIENCES ECONOMIQUES ET GESTION 13, place Carnot — C.O. 70026 — 54035 NANCY Cedex http://fac-droit.univ-nancy2.fr MATHEMATIQUES FINANCIERES Matrices, espaces vectoriels, transformations linéaires et application à la finance. PROJET COLLECTIF Ces projets permettent de stimuler et de valoriser les capacités d’initiative, la responsabilité, les qualités d’altruisme et de générosité, les capacités au travail en équipe et la communication. Les étudiants, sous la responsabilité d’un enseignant, participent à la promotion des études de finance, réalisent un journal, un annuaire des anciens, aident les associations de lutte contre la leucémie, … et rédigent un rapport noté. ANALYSE FINANCIERE Introduction au diagnostic financier de l’entreprise ; analyse de l’activité, des résultats, de la structure financière ; tableaux de financement, de flux, … . DROIT DES SOCIETES Ensemble des règles juridiques qui régissent la vie des entreprises : création d’une entreprise, choix de son statut, fonctionnement de l’entreprise et dissolution. ANGLAIS DES AFFAIRES Préparation des étudiants au TOEIC, basé sur l’acquisition de vocabulaire professionnel et un entraînement intensif à la compréhension orale de documents sonores tirés de la vie professionnelle. Activités d’expression écrite et orale et de compréhension écrite autour du thème de la bourse (création et suivi d’un portefeuille d’actions fictif). TECHNIQUES D’EXPRESSION Former les étudiants aux techniques et aux comportements dans le cadre d’entretiens de recherche de stage ou d’emploi. Développer leurs capacités de communication écrite et orale avec, comme fil conducteur, les attentes du monde professionnel. INFORMATIQUE Maîtrise d’outils informatique sur micro-ordinateur : traitement de texte, tableur, base de données relationnelles. PRODUITS D’ASSURANCE DES PERSONNES Assurance-vie etc … CREDITS BANCAIRES AUX PARTICULIERS Identifier les besoins des clients, connaître les principaux crédits, …. Licence Economie - Troisième année - parcours IUP Finance - MACROECONOMIE FINANCIERE Le cours a pour objet de permettre aux étudiants, une fois en situation de travail, de comprendre les évolutions actuelles de l’environnement macroéconomique qui ont un impact sur l’activité des établissements de crédit. Ainsi, seront traités, dans une perspective empirique mais aussi théorique, les aspects suivants : les fluctuations (cycles Kondratieff, cycles des affaires, TCR…), la croissance (modèle de Solow, croissance endogène), l’émergence de l’euro, problème du policy mix, les crises financières récentes (crise de change, y compris celle du SME, crises boursières, crises des pays émergents). ECONOMIE MONETAIRE ET BANCAIRE L’objectif du cours est de présenter l’organisation du système bancaire français et d’analyser dans quelle mesure les mutations de l’environnement économique et financier des vingt dernières années ont entraîné de profondes transformations dans les stratégies, l’activité et la gestion des banques françaises. Cours d'économie de l'entreprise Deuxième année - DEUG Éléments de cours et études de cas corrigées www.Iibrairieharmattan.com harmattan 1@wanadoo.fr diffusion.harmattan@wanadoo.fr ~ L'Harmattan, 2006 ISBN: 2-296-00864-X EAN : 9782296008649 GAMSORE L. Francis Cours d'économie de l'entreprise Deuxième année - DEUG , Eléments de cours et études de cas corrigées L'Harmattan 5-7, rue de l'École-Polytechnique; 75005 Paris FRANCE L'Hannattan Hongrie Kônyvesbolt Kossuth L. u. 14-16 1053 Budapest Espace L'Harmattan Kinshasa L'Harmattan Italia L'Harmattan Burkina Faso Fac..des Sc. Sociales, Pol. et Via Degli Artisti, 15 1200 logements villa 96 Adm. ; BP243, KIN XI 10124 Torino 12B2260 Université de Kinshasa - RDC ITALIE Ouagadougou 12 ~ SOMMAIRE ~ AVANT-PROPOS INTRODUCTION A L'ECONOMIE DE L'ENTREPRISE PREMIERE PARTIE: ELEMENTS DE COURS I. La place de l'entreprise dans les systèmes économiques II. La classification des entreprises III. Les grandes fonctions des entreprises modernes IV. La stratégie de l'entreprise V. Mécanismes comptables et financement des Entreprises DEUXIEME PARTIE: ETUDES DE CAS CORRIGEES I. Exercices d'application numérotés de un à vingt. II. Corrigés des exercices d'application numérotés de un à vingt ANNEXES BIBLIOGRAPHIE 2 [ AVANT - PROPOS) l'Economiede l'Entrepriseest un cours dispensé en deuxième année à l'UFR des Sciences Economiques et de Gestion. l'objectif principal de ce cours est de permettre aux étudiants, candidats à un Diplôme d'Etudes Universitaires Générales (D.E.U.G) de Niveau II, d'accéder à des connaissances générales sur l'univers des entreprises afin de mieux les préparer à un choix de spécialisation à partir de la troisième année, entre les filières de l'analyse économique et celles de la gestion. Il s'agit d'un cours semestriel d'une trentaine d'heures environ, réparties entre l'étude proprement dite de la vie économique des entreprises dans leur environnement d'une part, des applications d'autre part. Ces dernières qui ont lieu à la fin des cours magistraux sont des études de cas simplifiées dont le but est d'intéresser les étudiants à l'évaluation sommaire et à l'interprétation de quelques indicateurs de performance des entreprises dans leur rôle de création et de répartition de richesses au plan national. Pour ce faire, des documents de travaux dirigés contenant un certain nombre d'exercices d'application sont préalablement distribués aux étudiants et illeur revient de recourir aux diverses formulations présentées dans le cours pour résoudre les problèmes posés dans chaque cas. C'est dans l'intention de faciliter l'assimilation du cours par les étudiants et leur conférer une meilleure aptitude à traiter les exercices qui leur sont soumis dans les séances de travaux dirigés et à leur examen partiel, qu'il nous a paru utile de mettre cette brochure que nous avons conçue à leur disposition. le document comprend: des extraits du cours, une bibliographie, et treize études de cas avec leurs corrigés. la conception des exercices d'application répond à un souci de simplicité et de pédagogie et n'est donc pas à confondre avec la situation réelle fort complexe vécue par les entreprises, dans un environnement national ou international dynamique, que celui-cisoit économique, institutionnel, juridique, administratif, politique ou social. Il est à signaler que les exercices et leurs corrigés ne sont pas nécessairement liés au contenu ou à l'application de tel ou tel plan comptable, mais tout simplement à l'assimilation de quelques notions "comptables", financières ou économiques élémentaires, enseignées dans le cours. 3 Il reste à souhaiter que les étudiants en fassent une bonne utilisation. L'auteur demeure ouvert à toutes observations de nature à permettre l'amélioration du travail accompli. Le Professeur 4 INTRODUCTION A L'ECONOMIE DE L'ENTREPRISE ~ L'Economie de l'Entreprise est une branche de l'économie générale qui étudie les fondements et les mécanismes des actes économiques de l'entreprise. L'objet de cette discipline scientifique étant l'entreprise, il convient de préciser ce qu'est cet agent économique. Dans la théorie économique, la notion d'entreprise correspond à une entité dont la fonction est de produire des biens et des services en combinant des facteurs. Il existe cependant différentes conceptions de l'entreprise et différents types d'entreprises. La définition généralement acceptée de l'entreprise et que l'on retrouve dans les LEXIQUES D'ECONOMIE est la suivante: "L'entreprise est une unité économique autonome, combinant divers facteurs de production, produisant pour la vente, des biens et des services, et distribuant des revenus en contrepartie de l'utilisation des facteurs." En ce sens, les organisations à activité marchande constituent des entreprises. En revanche, les entités à caractère non marchand, celles dont la production n'est pas en principe destinée à une clientèle solvable, ne sont pas des entreprises. C'est le cas des administrations, des organisations à but non lucratif en général, des associations. De la définition de l'entreprise, on peut retenir trois aspects qu'il est nécessaire d'expliciter. Ces aspects sont les suivants: 1- L'entreprise, centre de calcul économique 2- L'entreprise, système commandé 3- L'entreprise en tant qu'organisation 5 1. L'entreDrise est un centre de calcul économiaue A l'origine du calcul économique réside la volonté de l'entrepreneur de réaliser une combinaison rationnelle des facteurs de production. Celle-ci en intégrant le plus possible les dernières innovations au plan scientifique et technologique vise à permettre une meilleure transformation des matières en biens et services de consommation intermédiaire ou finale en vue de satisfaire la demande potentielle. Cela suppose un choix judicieux des ressources productives compte tenu de leur disponibilité et de leur coût de possession. En somme, le calcul économique s'apparente à un calcul d'optimisation sous contraintes: "recherche de la meilleure fonction de production c'est à dire celle qui, tout en minimisant les coûts de production, maximise l'objectif de l'entrepreneur et en particulier, le profit maximum tiré du capital investi". Le calcul économique est donc à la fois: un calcul d'efficacité: comment mobiliser les ressources productives pour atteindre le ou les objectifs que l'on s'est fixés? (Produire et vendre au maximum pour rentabiliser le capital investi), un calcul d'efficience: comment atteindre le ou les objectifs que l'on s'est fixés en utilisant la voie la moins coûteuse? (faire des économies de ressources ou maîtriser les coûts de production). 2. L'entreDrise est un svstème commandé En la présentant comme un système, cela présuppose que l'entreprise se structure autour d'un certain nombre d'éléments qui entretiennent des relations nécessaires entre eux en vue d'assurer un fonctionnement régulier de l'unité de production dans son environnement. Le système réalise des transformations et peut changer d'état au cours du temps sous l'effet des perturbations venues de l'environnement. En tant que système commandé, l'entreprise a des organes de commande dont le rôle est de décider des actions à mener, de choisir les méthodes, de fixer les objectifs, d'apprécier les 6 résultats atteints. Système commandé ou système finalisé, l'entreprise fonctionne dans un environnement incertain qui fait intervenir la notion de risque. Ce risque peut être lié à l'évolution sociale, technologique, économique, politique. Ces perturbations possibles et multiples de l'environnement impliquent que le système soit doté d'organes de prévisions et soit capable de réagir à l'imprévu. Le système est par conséquent, appelé à être flexible. 3. L'entreDrise est une oraanisation On entend par là, un groupe de personnes qui œuvrent en commun à la réalisation de certains objectifs avec des moyens plus ou moins limités. Les personnes membres de l'organisation sont régies dans leur comportement et dans leur fonction par un ensemble de relations professionnelles, sociales, un ensemble de rôles (position dans la hiérarchie), un ensemble de normes (règles de conduite). L'organigramme de l'entreprise est un schéma par lequel on exprime les relations professionnelles, les rôles, c'est à dire la structure organisationnelle que celle-ci a mise en place pour mener à terme ses activités. La bonne marche de l'organisation suppose la résolution de trois types de problèmes: +:+ un problème de coordination: comment assurer la poursuite d'objectifs en commun avec la division du travail, la répartition des tâches? +:+un problème de communication - décision: à partir de quel réseau d'information va-t-on prendre les décisions. Comment assurer la communication dans l'entreprise? +:+un problème d'animation: comment gérer un processus d'intégration des efficacité individuelles par une élévation de la compétence et de la motivation des individus afin d'améliorer l'efficacité organisationnelle? Etant donné que l'économie et l'organisation de l'entreprise sont deux domainesintimementliés, on se trouve en présence d'une disciplined'enseignement 7 assez vaste dont on ne peut épuiser le contenu en une année, encore moins en un semestre comme le veut la répartition officielledes cours. Le plan de cours ainsi proposé aux étudiants de deuxième année s'articule autour d'un certain nombre de points considérés comme essentiels. Il reste entendu qu'un élargissement et un approfondissement de ce plan seront nécessaires pour les étudiants en année de Licence et de Maîtrise. 8 1ère PARTIE IIème PARTIE CORRIGEES [ PLAN DU DOCUMENT] ELEMENTS DE COURS ETUDES DE 9 CAS PREMIERE PARTIE I ELEMENTS DE COURS ~ I. La place de l'entreprise dans les systèmes économiques. II. La classification des entreprises III. Les grandes fonctions des entreprises modernes IV. La stratégie de l'entreprise V. Mécanismes comptables et financement des entreprises. 10 : LA PLACE DE L'ENTREPRISE DANS LES SYSTEMES ECONOMIQUES Généralités sur les systèmes économiques De façon générale, le système économique est conçu comme étant un ensemble de structures économiques, institutionnelles, juridiques, sociales, mentales, organisées par une société, en vue d'assurer la poursuite et la réalisation des objectifs économiques qui sont essentiels à l'épanouissement collectif et individuel de ses membres. On distingue cinq principaux systèmes économiques historiquement vécus qui sont les suivants: - le système d'économie fermée. C'est l'exemple du domaine féodal, de l'économie villageoise ou paysanne où l'activité économique est toute orientée vers la satisfaction des besoins de ceux qui vivent sur le domaine. Les débouchés de la production sont limités à un domaine précis dont le chef a la pleine disposition des moyens de production et procède à la redistribution du produit, - le système d'économie artisanale ou pré-industrielle en vigueur dans certains pays européens du XIyè et du Xyè siècle. L'organisation économique, juridique et sociale se caractérise par la propriété privée des moyens de production qui sont entre les mains d'artisans indépendants constitués en corps de métiers, dont les règles coutumières déterminent à la fois les conditions de production et la répartition du produit, - le système d'économie capitaliste. Ce système caractéristique depuis le XYIIIè siècle, la plupart des pays d'Europe Occidentale et des Etats Unis. Il L'esprit de l'activité économique est la recherche du profit individuel. L'organisation juridique et sociale se caractérise essentiellement par la propriété privée des moyens de production, la liberté d'entreprise, la neutralité absolue de l'Etat dans l'activité économique. - le système d'économie collectiviste. Ce système a été en vigueur notamment dans l'ex-Union Soviétique, dans les ex- pays socialistes d'Europe de l'Est. On le retrouve encore en Chine populaire, à Cuba, en Corée du Nord. L'esprit de ce système est de substituer à la recherche du profit individuel dans le système capitaliste, la recherche de l'intérêt collectif qui passe par la satisfaction intégrale des besoins de la population. L'organisation juridique et sociale se caractérise par l'appropriation collective des moyens de production. L'Etat, par l'intermédiaire des instances de la planification, assume sans concession la direction de l'activité économique, et répartit le produit national qui en résulte. - le système d'économie corporatiste. Ce système a été vécu dans certains pays pendant les périodes de guerre et de crises sociales majeures (France, Allemagne, Italie, Espagne, Portugal, Amérique Latine). Il a été institué essentiellement, pour permettre à l'Etat d'organiser la vie politique, économique et sociale dans un environnement marqué par des risques de bouleversements de la situation nationale sur tous les plans. Ainsi, les moyens de production restent propriété privée, mais l'Etat joue un rôle d'arbitre et oriente les activités en vue de ce qu'il appelle: l'intérêt général (ou intérêt supérieur de la nation). L'organisation juridique et sociale se caractérise par la création de groupements professionnels (Corporations ou Corps de Métiers) dans lesquels sont élaborées les règles qui régissent l'activité économique, sous le contrôle de l'Etat. 12 Le système d'économie corporatiste n'est ni un système d'économie capitaliste, ni un système d'économie collectiviste. C'est un système dit « d'économie de guerre ou de crise». Les deux systèmes économiques qui ont cependant le plus marqué l'économie mondiale et sur lesquels il convient de revenir, sont: l'économie de marché et l'économie planifiée. : L'ECONOMIE DE MARCHE Elle est issue de l'application des principes du système capitaliste libéral. Ces principes sont les suivants: - La recherche de l'intérêt personnel et le profit. - La propriété privée des biens de production. - La liberté d'entreprise. - La liberté des échanges ou principe du "laisser faire, laisser aller" . - La liberté de la concurrence dans le respect des textes en vigueur. - La régulation de l'activité économique par le marché, lieu où s'effectuent des transactions commerciales qui mettent en présence d'un côté des offreurs (producteurs ou vendeurs de marchandises ou de services), d'un autre, les demandeurs (clients ou consommateurs). Le prix qui se forme résulte de l'arbitrage du marché, c'est à dire de la force respective des demandeurs et des offreurs (structure du marché, atomicité ou molécularité des intervenants, fluidité). Le marché peut se dérouler en un seul endroit ou en plusieurs endroits (marché local, quotidien, hebdomadaire, régional, national, international) ; le produit concerné peut être homogène ou non homogène. On distingue ainsi huit grandes catégories de marché: concurrence, oligopole, duopole, monopole, monopsone, duopsone, oligopsone, monopole bilatéral (Classification de Stackelberg). 13 NOMBRE DE NOMBRE SITUATION VENDEURS D'ACHETEURS DU MARCHE Multitude Multitude Concurrence Petit nombre Multitude Oligopole Deux Multitude Duopole Un Multitude Monopole Multitude Un Monopsone Multitude Deux Duopsone Multitude Petit nombre Oligopsone Un Un Monopsone Bilatéral STRUCTURE DES MARCHES - La non intervention de l'Etat dans l'activité économique. L'Etat devant se comporter en simple garant de la sécurité des personnes et des biens (principe de neutralité ou encore principe de l'Etat gendarme). - L'application de ce principe a connu essentiellement deux phases qui sont les suivantes: - le capitalisme atomistique. Système d'économie de marché en vigueur en Europe aux ISe, Ige siècles, issus des premières applications des principes du libéralisme économique: la liberté d'entreprise, des échanges, de la concurrence la neutralité de l'Etat à travers notamment, une législation du travail peu contraignante, une libre détermination de l'offre et des salaires, la recherche effrénée de l'accumulation et du profit, ont abouti à la naissance de nombreuses petites entreprises (capitalisme de petites unités). De par leur modeste dimension, ces entreprises n'ont que très peu de moyens d'influencer le marché (en termes de fixation de prix et de 14 publicité par exemple). Ce qui a pu donner aux économistes classiques et néoclassiques, l'illusion d'un marché de concurrence pure et parfaite. - le capitalisme moléculaire. Ce système apparaît sous les formes de capitalisme libéral interventionniste depuis la crise de 1929 où l'on prône désormais l'intervention systématique de l'Etat dans l'activité économique (Etat providence), jusqu'au début des années 1980 où avec l'essoufflement et les imperfections constatées dans l'intervention de l'Etat, on en vient à réclamer à nouveau une réduction systématique du poids de l'Etat dans l'activité économique (capitalisme néolibéral ou retour progressif à I'Etat gendarme). Dans un système capitaliste moléculaire, un petit nombre de grandes entreprises domine le marché. Ce système présente les caractéristiques suivantes: - la recherche du profit n'est plus une préoccupation immédiate de l'entreprise. Elle s'opère dans une perspective à moyen terme en passant par la croissance et la paix sociale; - la grande entreprise influence le marché par la différenciation des produits, la publicité, la fixation des prix, l'amélioration des techniques; - le marché impose à l'entreprise certaines contraintes: quantités vendues, qualité des produits; - l'intervention de l'Etat dans la vie économique. Celle-ci peut prendre deux formes. La première forme est d'ordre administratif. C'est la réglementation de l'activité des entreprises: par exemple, réglementation de la fixation des prix dans certains cas, réglementation du travail et des salaires, réglementation du commerce et des affaires, réglementation de la concurrence, institution d'une fiscalité d'entreprise plus ou moins contraignante, réglementation de la circulation des capitaux, réglementation du crédit. 15 On retrouve ici le concept classique d'Etat gendarme où l'Etat joue un rôle de contrôle, de régulation ou d'assainissement de la vie économique. La deuxième forme est d'ordre économique et social. Il s'agit pour l'Etat, de jouer un rôle d'opérateur économique et social en créant des entreprises ou des services publics, seul ou en association avec des opérateurs économiques privés, dans l'objectif de satisfaire des besoins collectifs tels la culture, l'éducation et la recherche, l'urbanisme, l'équipement, la santé, le logement social, l'emploi, l'aménagement du territoire, les communications, certains biens de grande consommation (électricité, gaz, eau, téléphone, hydrocarbure). On retrouve ici aussi le concept keynésien d'Etat providence où l'Etat intervient pour suppléer les insuffisances du secteur privé ou pour éviter des déséquilibres économiques. C'est précisément ce rôle de l'Etat qui est aujourd'hui remis en cause par les partisans du libéralisme économique pur ou les défenseurs du droit de propriété qui voudraient promouvoir l'entreprise privée, comme étant le seul moteur de l'activité économique. C'est du reste l'une des justifications des privatisations observées à 1'heure actuelle. : L'ECONOMIE PLANIFIEE Elle est issue de l'application des principes du système socialiste, dont les plus éminents penseurs sont: KARL MARX, F. ENGELS, LENINE, STALINE, MAO, ENVER HOXA, TITO. Pour atteindre le bien-être collectif qui est la finalité de l'économie planifiée, on a adopté le principe de la collectivisation des biens de production par la suppression de la propriété privée et le principe d'une planification impérative de l'activité économique qui fait de l'Etat le seul centre de décision, par l'intermédiaire d'un organisme central de planification, où l'on détermine les besoins à satisfaire et les programmes de production à exécuter par les entreprises. 16 Dans ce contexte, l'entreprise propriété publique, ou collective, a une autonomie plus réduite qu'en économie de marché. Elle se voit imposer des objectifs de production à réaliser. En contrepartie, elle reçoit des moyens de production de l'Etat (Terre, Capital, Travail, Technologie, Matières). La recherche du profit privé est impossible puisque l'entreprise ne peut agir sur le niveau de ses bénéfices car les salaires et les prix des biens et services qu'elle achète ou qu'elle vend lui sont imposés. Les bénéfices éventuels sont rigoureusement planifiés, puis répartis en fonction des choix opérés par l'autorité centrale de planification. Tout comme les principes du libéralisme économique, les principes du système d'économie socialiste ou collectiviste ont été diversement appliqués dans les différents pays, en raison de l'environnement. 'Î : LES RELATIONS ENTRE L'ENTREPRISE ET LES AUTRES AGENTS ECONOMIQUES L'activité des entreprises est tributaire des relations qu'elles sont en mesure de développer avec d'autres agents dans l'économie nationale. Ces agents peuvent être regroupés en cinq catégories. Ce sont: les Ménages, l'Administration, les Entreprises non Financières, les Institutions Financières, l'Extérieur. Le contenu des relations entre agents dans une économie est représenté par deux sortes de flux, matérialisées dans un circuit économique. On peut montrer ces flux à travers des schémas successifs. Ce sont: - des flux réels ou « physiques» qui portent sur des biens et services ou des facteurs de production - des flux monétaires ou financiers qui constituent les contreparties des flux réels. 17 Biens et :M54.~C:J{'E Biens et services services 'E:N'r~'EP'lUS D'ES 13I'ENS 'ES Recettes 'ET Règlement :M'EN 54.{i'ES des achats S'E~YIC'ES A. Relations avec les Ména!!es Les Ménages sont des consommateurs à titre principal ôe t'e"enus ~\ûi-- 5 \otérêts, loyers, di",. ~i,.\'(e, le/el]. ~'(j Q'~ ~ ~ ~lJx èt\o~ de facteurs de produ Cltavall, capital) B. Relations avec l'Administration (Etat, Collectivités locales, Entreprises publiques) 18 HAL Id: cel-01317527 https://hal.archives-ouvertes.fr/cel-01317527 Submitted on 18 May 2016 HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés. Cours de microéconomie Chancel Bardin Bahouayila Milongo To cite this version: Chancel Bardin Bahouayila Milongo. Cours de microéconomie. DEUG. Congo-Brazzaville. 2016. UNIVERSITÉ LIBRE DU CONGO Cours de MICROÉCONOMIE BAHOUAYILA MILONGO Chancel Bardin ULC ÉPREUVE DE STATISTIQUE DESCRIPTIVE Filière : Tronc commun (1ère année) Année académique : 2013-2014 Rédigé par : BAHOUAYILA MILONGO Chancel Bardin1 1 E-mail : bardinbahouayila@yahoo.fr / bardin.bahouayila@facebook.com Tel : 05 075 33 71 / 06 837 81 85 UNIVERSITÉ LIBRE DU CONGO Cours de MICROÉCONOMIE BAHOUAYILA MILONGO Chancel Bardin ULC INTRODUCTION L’analyse économique se distingue de l’économie que l’on étudie au lycée, principalement par sa démarche. L’économie du lycée est surtout descriptive (elle décrit les systèmes économiques ou l’histoire économique) et aborde les problèmes et théories économiques sur un plan assez général. L’analyse économique par contre adopte en grande partie la démarche hypothético-déductive. C’est à dire qu’on obtient des résultats en partant des hypothèses particulières et ces hypothèses caractérisent complètement le domaine de validité des résultats obtenus. Dans cette démarche les mathématiques sont un outil particulièrement efficace. En effet, les mathématiques permettent de se libérer des contraintes et des ambiguïtés du langage courant et elles nous fournissent un système de représentation objective, protégé des interprétations subjectives diverses. L’économiste doit donc maîtriser tout un ensemble d’outils mathématiques (statistiques, économétrie, etc.) pour conduire son analyse et cela le rapproche dans une certaine mesure de l’ingénieur. Avec cette démarche l’analyse économique aborde des questions de niveaux assez différents : le chômage dans l’économie nationale, l’inflation monétaire, la balance commerciale du pays, mais aussi, l’offre de travail des ménages, la formation des prix sur un marché, les stratégies des entreprises et les processus de concurrence entre les firmes. La dernière partie des questions que nous venons d’évoquer concerne les comportements des agents individuels dans l’économie (entreprises et ménages). Ces questions sont abordées par l’analyse microéconomique qui fait l’objet de ce cours. Les questions de la première partie concernent des phénomènes plus agrégés, qui ne sont observables qu’au niveau d’une économie nationale (un individu peut être au chômage mais le niveau du chômage dans l’économie ne peut être défini au niveau de l’individu). Ces questions sont abordées par l’analyse macroéconomique. L’objet de ce cours est l’analyse microéconomique. Dans ce cours nous allons d’abord présenter quelques notions sur la microéconomie afin de nous familiariser avec le jargon des économistes. Ensuite, nous expliquerons l’équilibre du marché et la détermination du prix, en passant par l’étude des comportements du consommateur et du producteur. Enfin, nous parachèverons avec l’étude de la fonction de la demande. UNIVERSITÉ LIBRE DU CONGO Cours de MICROÉCONOMIE BAHOUAYILA MILONGO Chancel Bardin ULC CHAPITRE 1 La consommation La consommation se caractérise par l’utilisation des biens et services dans le but de satisfaire un besoin. Ces biens et services peuvent être : détruits immédiatement (consommation finale) ; transformés lors du processus de production (consommation intermédiaire). Certains biens peuvent être utilisés dans le processus de production pendant au moins un an (ce sont des biens durables). L’ensemble de ces biens est appelé capital fixe. La consommation du capital fixe est l’utilisation de ces biens. Par conséquent, une règle pratique consiste à inclure dans les consommations intermédiaires (CI) les biens qui durent moins d'un an, par opposition à l'investissement (formation brute de capital fixe) qui représente l'achat de biens d'équipement durables (plus d'un an). Mais le petit outillage est inclus, même s’il dure plus d’un an. L’usure des actifs fixes (machines, équipements), est exclue des CI ; elle est enregistrée dans la consommation de capital fixe (CCF). Si les CI excluent les acquisitions de biens d’équipement, elles incluent leur location (équipements, bureaux, terrains, etc.). Les logiciels achetés ou produits pour compte propre sont exclus des CI. Les dépenses en munitions sont clairement des CI de la production des services de défense ou de police. Les tanks, canons et autres porte-avions, sont, par contre, des investissements productifs. En fait, des règles complexes ont été mises au point – par exemple, les achats d’armes de l’armée sont des CI, mais les achats d’armes ou de camions blindés de la police sont … des investissements. Les agents économiques L'agent économique est une personne physique ou morale prenant des décisions d'ordre économique. La comptabilité nationale regroupe les agents économiques (ou unités institutionnelles) selon leurs fonctions en six types, appelés secteurs institutionnels : Ménages (y compris les entrepreneurs individuels), Sociétés financières (institutions financières, banque centrale, sociétés d'assurance etc.), Quelques notions sur la microéconomie UNIVERSITÉ LIBRE DU CONGO Cours de MICROÉCONOMIE BAHOUAYILA MILONGO Chancel Bardin ULC Sociétés non financières (entreprises), Administrations publiques (État, administrations locales, de sécurité sociale etc.), Institutions sans but lucratif au service des ménages (ISBLSM) « Reste du monde ». Chaque agent économique est caractérisé par ses fonctions dans l'économie (consommation, investissement etc.). L'agent économique est à la base de l'analyse microéconomique, et aussi de la macroéconomie agrégée. La différence entre la microéconomie et la macroéconomie La macroéconomie est l'approche théorique qui étudie l'économie à travers les relations existant entre les grands agrégats économiques (la croissance, le développement, la pauvreté, l’inflation, etc.) La microéconomie (ou micro-économie) est la branche de l'économie qui « analyse les comportements des individus ou des entreprises et leurs choix dans le domaine de la production, de la consommation, de la fixation des prix et des revenus. Elle est le champ privilégié de la théorie néo-classique » 2 . Elle analyse les comportements des agents économiques individuels (la consommation, la production, l’épargne et l’investissement) et de leurs relations sur les différents marchés où s'échangent les produits et les facteurs de production. Le marché Pour les économistes le marché est le lieu physique ou virtuel où se rencontrent l'offre et la demande et où s'opère la détermination du prix d'un bien ou d'un service. Il existe plusieurs types de marchés parmi lesquels on peut citer: Le marché d’emploi : ce marché, désigné aussi par abus de langage comme « marché du travail », est le lieu théorique de rencontre de l'offre d'emploi et de la demande d'emploi. Le travail y est régulé et fait l'objet, dans la majorité des cas, d'une rémunération. Ce marché est rarement à l'équilibre, c'est-à-dire avec une offre égale à la demande. Le plein emploi parfait correspondrait à l'absence de chômage3 . Pour les économistes néoclassiques, le travail est considéré comme une marchandise standard qui suit les règles de l'offre et de la demande et s'ajuste en fonction des quantités et des prix. Cependant, certains économistes keynésiens remettent en cause l’existence d’un marché du travail. Ils considèrent qu'une baisse des salaires a pour conséquence mécanique une baisse de la 2 Dictionnaire d'Economie et de Sciences sociales, Paris , Nathan 1993 3 Rappeler les notions du sous-emploi visible (heures de travail), sous-emploi invisible (revenu, declassement) et du chôme élargi. UNIVERSITÉ LIBRE DU CONGO Cours de MICROÉCONOMIE BAHOUAYILA MILONGO Chancel Bardin ULC demande, donc des besoins de production et, au final, de la demande de travail. Pour eux, il n’existe pas de mécanisme de régulation du marché du travail. Le marché des changes : c’est le marché sur lequel les devises sont échangées l’une contre l’autre à des taux de change qui varient sans cesse. Le marché des capitaux : ce marché permet la rencontre entre les agents économiques ayant un excédent de capitaux et les agents ayant des besoins de financement. Ils se subdivisent en trois compartiments : le marché financier, marché monétaire et le marché obligataire.  Les marchés financiers sont les marchés sur lesquels se rencontrent les demandes et les offres de capitaux à long terme. Le marché financier primaire repose sur l'émission nouvelle d'actions et d'obligations alors que le marché financier secondaire est lui le marché où s'échangent les titres déjà émis. C'est ce marché secondaire qui est traité par les bourses des valeurs mobilières (Wall Street, Douala Stock Exchange : DSX, Bourse des Valeurs Mobilières de l’Afrique Centrale : BMVAC par exemple).  Les marchés monétaires désignent les marchés informels où les institutions financières (Trésors nationaux, banques centrales, banques commerciales, assureurs, etc.) et les grandes entreprises (marché des billets de trésorerie) placent leurs avoirs (DAV) ou empruntent (Compte à vue) à court terme (moins d'un ou deux ans) ;  Le marché obligataire est le marché sur lequel les entreprises ainsi que les États se financent. UNIVERSITÉ LIBRE DU CONGO Cours de MICROÉCONOMIE BAHOUAYILA MILONGO Chancel Bardin ULC CHAPITRE 2 Dans ce chapitre, nous allons expliquer comment le consommateur choisit parmi tous les biens et services disponibles dans l'économie ceux qu'il désire acquérir et en quelles quantités. Le consommateur Le consommateur est un agent économique dont la caractéristique dans l’économie est l’acquisition et la consommation de biens et services grâce à un revenu donné. Il est relié aux entreprises par: son travail; un travail qui lui procure un salaire (rémunération). l’achat de biens et services produits, offerts par l’entreprise. Le consommateur peut être une personne seule, un ménage avec ou sans enfants, ou une communauté. Le consommateur fait son choix de consommation parmi toutes les options qui lui sont ouvertes. Ces options correspondent à toutes les combinaisons possibles de quantités de biens de consommation. Chaque combinaison est appelée un panier de consommation. Nous n’ignorons pas qu’il existe une infinité de paniers à la disposition des consommateurs. Le consommateur classe tous les paniers de consommations par ordre de préférence. La notion de préférence Soit A et B deux paniers de consommation, on distingue : la relation de préférence stricte : Le panier A est strictement préféré au panier B : la relation d’indifférence : Le consommateur est indifférent entre la consommation du panier A ou B quand ils lui procurent la même satisfaction : La relation « préféré ou indifférent » : Les relations (1) et (2) peuvent être combinées en une seule relation : Le panier A est ‘‘au moins aussi désiré’’ que le panier B. La notion de RATIONNALITé Tout consommateur dont le comportement satisfait les 3 axiomes suivants est supposé rationnel : L’axiome de totalité : Tout consommateur est capable de comparer tout panier de biens à un autre de l’ensemble de consommation. Il n’y a pas de panier inclassable par le consommateur. Le consommateur doit pouvoir comparer les 2 paniers A et B : ou L’axiome de réflexivité : Tout panier est indifférent à lui-même: Cet axiome présente un intérêt purement mathématique. Comportement du consommateur UNIVERSITÉ LIBRE DU CONGO Cours de MICROÉCONOMIE BAHOUAYILA MILONGO Chancel Bardin ULC L’axiome de transitivité : La relation de préférence est transitive ce qui pourrait conduire à des situations de préférences suivantes: La notion d’UtiLITé Pour représenter les préférences ou les goûts des consommateurs, les économistes ont d'abord eu recours à la notion d'utilité. Le consommateur achète un certain bien parce qu'il lui procure une certaine satisfaction. S'il préfère du foufou le matin à une tasse de lait, dans certaines circonstances, c'est que le foufou lui procure plus d'utilité que le lait. Formellement, on définit sur l'ensemble des consommations possibles une fonction U, dite fonction d'utilité. La fonction d'utilité introduit une relation de préférences sur l'ensemble des consommations possibles. On dit qu'un panier de consommation 𝑋 1 est préféré à un panier 𝑋 2 si et seulement si 𝑈(𝑋 1 ) ≥ 𝑈(𝑋 2 ). On note cette relation On en déduit aussi que 𝑿 𝟏~𝑿 𝟐 ⇔ 𝑼(𝑿 𝟏 ) = 𝑼(𝑿 𝟐 ) Si la notion d'utilité correspond bien à l'intuition, elle n'est pas cependant sans poser un problème sérieux, celui de la mesure. En effet, l'utilité est subjective et difficilement mesurable. Les économistes ont d'abord raisonné comme si l'utilité était mesurable et ont construit des fonctions d'utilité cardinales où l'utilité est mesurée en termes d'unités appelées "utils". Les économistes modernes se sont néanmoins débarrassés de cette vision peu réaliste et raisonnent maintenant en termes d'utilité ordinale. Ils supposent seulement qu'il est possible d'ordonner les satisfactions procurées par deux paniers différents de consommation, sans attacher à chacun des deux paniers un nombre particulier d'utils. La notion de coUrbe et de carte d’indiFFÉrence Soit un panier de consommation x1 qui procure un niveau de satisfaction U0. Le consommateur peut accepter moins d'un bien contre plus d'un autre bien et garder le même niveau de satisfaction. Par exemple, il peut accepter d'avoir 2 kg de lait de moins pour 1 kg de foufou de plus. Ceci exprime une propriété fréquemment répandue dans l'économie : les biens sont substituables entre eux du point de vue de leur faculté de procurer de la satisfaction au consommateur. Comment se fait donc cette substitution ? Nous allons nous intéresser, pour simplifier, à toutes les combinaisons de consommation de deux biens (x1 , x 2 ) qui donnent la même satisfaction. Ces combinaisons sont représentées dans le plan (x1 , x 2 ) par une courbe C0. Parce que les paniers de consommation représentés par des points sur la courbe C0 donnent tous la même satisfaction, ils sont tous équivalents. Par exemple x1 ~ x 2 . Le consommateur est indifférent entre tous ces paniers. C'est pourquoi cette courbe est appelée courbe d'indifférence UNIVERSITÉ LIBRE DU CONGO Cours de MICROÉCONOMIE BAHOUAYILA MILONGO Chancel Bardin ULC (figure 1.1). La courbe d’indifférence étant une représentation de tous les paniers considérés par le consommateur comme équivalents, donc procurant la même utilité, la forme de cette courbe reflète la manière avec laquelle des quantités de différents biens contribuent à procurer un certain niveau de satisfaction au consommateur. Lorsqu'on fait varier le niveau de satisfaction on obtient d'autres courbes d'indifférence, correspondant chacune à un certain niveau de satisfaction. Par exemple la courbe C1 située au-dessus de C0 correspond à tous les paniers de consommation donnant un niveau d'utilité U1 > U0. Par contre la courbe C2 située au-dessous de C0 représente les paniers de consommation procurant une satisfaction U2 < U0. L'ensemble des courbes d'indifférence d'un même consommateur forment sa carte d'indifférence (figure 1.2). La notion DU TAUX MARGINAL DE SUBSTITUTION En se déplaçant le long d'une courbe d'indifférence de gauche à droite (figure 1.3) on substitue du bien 1 (bien alimentaire) au bien 2 (vêtements), c'est-à-dire qu'on consomme de moins en moins de vêtements et de plus en plus de biens alimentaires. En se déplaçant de droite à gauche on substitue au contraire le bien 2 au bien 1. Soit un panier de consommation représenté par le point A(x1 0 , x2 0 ) et procurant une satisfaction U0. UNIVERSITÉ LIBRE DU CONGO Cours de MICROÉCONOMIE BAHOUAYILA MILONGO Chancel Bardin ULC Considérons maintenant une petite augmentation ∆X2 du bien 2. Pour que la satisfaction ne change pas, il faut qu'il y ait diminution de la consommation du bien 1. Soit ∆X1 < 0 cette diminution. Cette substitution du bien 2 au bien 1 est représentée par le déplacement du point A à un point B proche de A et situé sur la même courbe d’indifférence (figure 1.3). Le rapport − ∆X1 ∆X2 est appelé Taux Marginal de Substitution du bien 2 au bien 1 entre les points A et B de la courbe d’indifférence. Il est noté TMS2/1(A, B). Géométriquement, il est représenté par la valeur absolue de la pente de la droite qui relie les points A et B. Le TMS2/1 exprime ainsi la quantité du bien 2 que le consommateur exige si on lui demande de céder une unité supplémentaire du bien 1 (∆X1 = -1). C’est donc la valeur psychologique qu’attache le consommateur à une unité du bien 1. Cette valeur est exprimée en unités du bien 2. Le TMS du bien 1 au bien 2 est l’inverse du TMS du bien 2 au bien 1. Par conséquent : TMS1/2. TMS2/1 = 1 En gros, le Taux Marginal de Substitution de X à Y noté TMSX/Y est la quantité du bien Y à laquelle il faut renoncer pour avoir une unité supplémentaire du bien X tout en gardant constant le même niveau d’utilité. On définit le taux marginal de substitution entre le bien x et le bien y comme suit : 𝑇𝑀𝑆𝑋/𝑌 = − ∆𝑌 ∆𝑋 = − 𝑑𝑈 𝑑𝑋 𝑑𝑈 𝑑𝑌 = 𝑈𝑚𝑋 𝑈𝑚𝑌 Umx est l’utilité marginale du bien X. En effet, l’utilité marginale d’un bien est le supplément d’utilité procurée par la consommation d’une unité supplémentaire de ce bien, toutes choses étant égale par ailleurs. UNIVERSITÉ LIBRE DU CONGO Cours de MICROÉCONOMIE BAHOUAYILA MILONGO Chancel Bardin ULC L’utilité marginale d’un bien est toujours décroissante car l’utilité procurée par la dernière unité consommée décroit au fur et à mesure que le consommateur augmente sa consommation de ce bien. Exemple : Un voyageur dans le désert qui a soif. Le premier verre d’eau lui procure une grande utilité. Le deuxième verre lui procure une moindre utilité. . . Le nième verre lui procure une satisfaction très faible voire négative (s’il ne peut plus boire). Cet exemple montre que l’utilité marginale de l’eau est décroissante. La NOTION DE LA contrainte budgétaire Etant donné que notre consommateur possède un revenu R déterminé et que les biens 1 et 2 ont respectivement les prix suivants : P1 et P2, alors notre consommateur ne peut pas les acheter que dans la limite de son revenu. D’où on définit la contrainte budgétaire (CB) comme l’ensemble des combinaisons des deux biens (1, 2) donnant lieu à une dépense égale au revenu du consommateur. Dans ce cas, le consommateur doit répartir son revenu entre les deux biens en tenant compte de leurs prix relatifs. Sa contrainte budgétaire s’écrit alors R = P1 ∗ X1 + P2 ∗ X2. La représentation graphique de la contrainte budgétaire (CB) passe par la détermination de ses points extrêmes : Pour X1 = 0 alors X2 =R/P2 ; Pour X2 = 0 alors X1 =R/P1 Une variation des prix des biens 1 et 2 ou de revenu R est accompagnée graphiquement par un déplacement de la contrainte budgétaire comme le décrit le schéma suivant : UNIVERSITÉ LIBRE DU CONGO Cours de MICROÉCONOMIE BAHOUAYILA MILONGO Chancel Bardin ULC Tous les paniers situés en dessous de la CB sont accessibles au consommateur. Par contre, le consommateur n’a pas les moyens d’acquérir les paniers situés en dessus de la CB. Le problème du consommateur est de choisir parmi les paniers qui lui sont accessibles celui/ceux qui lui permettent de maximiser son utilité. Il existe 2 méthodes pour résoudre le problème du consommateur : 1 ère méthode Puisque il s’agit d’un problème de maximisation ( le consommateur cherche toujours à maximiser sa satisfaction ou son utilité), on peut donc utiliser le Lagrangien. Tout d’abord il faut écrire le programme du consommateur A ce programme on peut associer la fonction du Lagrange (ou Lagrangien) suivant : Les conditions de premier ordre du Lagrangien sont: Les équations (1) et (2) permettent de déduire que : L’équation (3) permet de s’assurer que la CB est saturée. A l’optimum, la pente de la CI donnée par -Ux1/Ux2 doit être identique à celle de la CB donnée par –p1/p2. 2 ème méthode La détermination de l’équilibre passe par la résolution du modèle à deux équations et deux inconnues suivant : { 𝑇𝑀𝑆 = 𝑈𝑚1 𝑈𝑚2 = 𝑃1 𝑃2 𝑆/𝑐 𝑅 = 𝑃1 ∗ 𝑋1 + 𝑃2 ∗ 𝑋2 UNIVERSITÉ LIBRE DU CONGO Cours de MICROÉCONOMIE BAHOUAYILA MILONGO Chancel Bardin ULC CHAPITRE 3 Pour de nombreux économistes, réduire le rôle de l’entreprise à celui de simple producteur ne permet pas de comprendre et de saisir toute la complexité de l’acte de produire, d’organiser et de manager l’entreprise. En tant que producteur, l’entreprise dispose de facteurs de production, nécessairement limités. Les ressources étant rares, il est important de les employer du mieux possible. Généralement, les économistes utilisent une fonction de production pour décrire la relation entre les quantités produites (Y) et les quantités de facteurs de production. Cette approche consiste à définir une relation de transformation d’inputs (intrants ou facteur de production) en output, c’est à dire une fonction de production. Cette fonction permet d’étudier les techniques de production et de choisir la combinaison qui permet d’atteindre l’optimum de production. Pour vérifier l’efficacité de la combinaison productive, on calcule la productivité La productivité La productivité apparaît généralement sous la forme d’un rapport entre la production totale et un facteur de production. La productivité indique comment varie la production totale lorsque l’on fait varier l’un des facteurs de production. On recherche en d’autres termes à préciser la contribution du facteur de production à la croissance de la production. On retient en général deux mesures de la productivité : la productivité moyenne (ou produit moyen) et la productivité marginale (ou produit marginal). La productivité moyenne : Elle exprime la contribution de chaque unité du facteur utilisé dans la production totale. Si l’on suppose que Y est la production totale et que les facteurs de production sont des Xi , alors la production moyenne, notée PM serait : 𝑃𝑀(𝑋𝑖) = 𝑌 𝑋𝑖 La productivité marginale: Elle détermine la production supplémentaire suite à l’utilisation d’une unité de plus du facteur de production. Si l’on suppose que Y est la production totale et que les facteurs de production sont des Xi , alors la production marginale, notée Pm serait : 𝑃𝑚(𝑋𝑖) = 𝜕𝑌 𝜕𝑋𝑖 Comportement du producteur UNIVERSITÉ LIBRE DU CONGO Cours de MICROÉCONOMIE BAHOUAYILA MILONGO Chancel Bardin ULC Les facteurs de production Définition Il s’agit des moyens engagés dans les différents processus de la production. Propriétés On peut distinguer les différents facteurs de production selon plusieurs critères. En premier lieu, la provenance des facteurs utilises par la firme permet de distinguer entre les matières premières et les consommations intermédiaires. Les facteurs qui sont directement extraits de la nature (du bois, du charbon, de l’eau) sont des matières premières. Les facteurs qui sont le produit d’une autre firme (du papier, de l’acier, de l’eau lourde) sont des consommations intermédiaires. Certains facteurs de production sont fixes d’autres sont variables. On suppose en général que les équipements lourds comme les bâtiments ou les machines d’une usine (le capital de la firme) et la terre correspondent à des facteurs fixes, tandis que la main d’œuvre (le travail) et les matières premières sont des facteurs variables. Les facteurs de production peuvent être complémentaires (combinés dans les mêmes proportions) ou substituables (remplacer une certaine quantité d’un des facteurs par une quantité supplémentaire de l’autre tout en gardant le même niveau de production). On retient généralement deux facteurs de production : le travail et le capital. 1-Le facteur travail La production réalisée est généralement liée à la quantité de travail disponible et à la qualité de la main d’œuvre. La mesure de la richesse produite par le facteur travail est généralement appréhendée par ce que l’on nomme « productivité du travail ». a- L’approche quantitative du facteur travail La population active est définie comme l’ensemble des personnes en âge de travailler, ayant ou recherchant une activité rémunérée. Elle rassemble donc par convention : les personnes ayant un emploi (actifs occupés) et les chômeurs au sens du BIT (Bureau International du Travail). L’évolution de la population active est liée au taux d’activité, définis comme le rapport entre le nombre d’actifs et l’effectif total des personnes ayant de travailler. La quantité de travail disponible résulte non seulement du nombre de personnes désirant travailler, mais également de la durée moyenne du travail. A cet égard, on peut observer deux phénomènes : l’augmentation du nombre d’emplois à temps partiel et la réduction de la durée du travail. UNIVERSITÉ LIBRE DU CONGO Cours de MICROÉCONOMIE BAHOUAYILA MILONGO Chancel Bardin ULC La réduction de la durée du travail porte sur la durée de vie. Il y a un siècle, un ouvrier travaillait jusqu’à la fin de son existence, sans retraite. Aujourd’hui l’âge moyen de départ à la retraite au Congo est de 65 ans. En 1850, un ouvrier travaillait 3 000 heures par an, sans week-end ni vacances, aujourd’hui la plupart des salariés bénéficient de weekends de deux jours ainsi que de quelques semaines de congés payés ou non. b- L’approche qualitative du facteur travail Au sein d’une entreprise, d’une branche à l’autre, le facteur travail est rarement homogène. Sa diversité est généralement appréhendée sous l’angle de la répartition par âge, par sexe, par qualification et par Catégories Socioprofessionnelles de la population active. L’âge des salariés est une variable prise en compte par les entreprises dans leur politique de gestion du personnel. Les salariés les plus âgés sont nécessaires à l’entreprise en raison de l’expérience qu’ils ont acquise et qu’ils peuvent transmettre. Les jeunes salariés sont susceptibles quant à eux d’apporter des connaissances théoriques récentes, un certain dynamisme et un esprit d’innovation. C’est pourquoi l’entreprise essaie régulièrement de bâtir une pyramide des âges optimale. Le sexe de la population active, et plus précisément la féminisation de l’emploi est un phénomène majeur des sociétés occidentales contemporaines. En France, le taux d’activité des femmes de 25 à 49 ans, qui était en 1970 inférieur à 50%, tourne aujourd’hui autour de 80%. Les écarts entre les différents pays de la Communauté Européenne sont relativement disparates (en Italie, ce taux est passé de 35% à 45%). Bien que cette tendance concerne toutes les professions, il reste cependant plus marqué dans certaines catégories socioprofessionnelles. La qualification requise de la main d’œuvre est différente selon les emplois, mais elle a souvent des fondements communs. On parle généralement d’emplois à dominante de technicité et d’emplois à dominante d’organisation. En ce qui concerne les emplois à dominante de technicité, la qualification repose sur un savoir-faire permettant d’utiliser l’outil (la machine, l’ordinateur...), de repérer d’éventuelles défaillances et d’y remédier. Ce savoir-faire doit sans cesse s’adapter et évoluer. Au niveau des emplois à dominante d’organisation, la qualification suppose sur la capacité d’organisation, l’aptitude au commandement et la maîtrise de plusieurs activités (polyvalence des cadres). La qualification nécessite au préalable une formation, toutefois la grille des qualifications (c’est-à-dire la grille définie par les Conventions Collectives) ne se calque pas entièrement sur les niveaux de formation. La qualification exige en effet l’acquisition d’une expérience professionnelle plus ou moins longue selon les cas. UNIVERSITÉ LIBRE DU CONGO Cours de MICROÉCONOMIE BAHOUAYILA MILONGO Chancel Bardin ULC c- La productivité du travail La productivité est au cœur du débat économique. Sans elle, pas de progrès du niveau de vie, ni réduction du temps de travail. La croissance de la productivité détermine en effet les revenus réels, le taux d’inflation et le taux d’intérêt, les profits et les cours boursiers. La productivité du travail indique la contribution du facteur travail à la croissance de la production. On recherche en d’autres termes à préciser comment varie la production totale lorsque l’on fait varier le facteur travail. On appelle productivité moyenne du travail (ou production par tête), le rapport production sur facteur travail. Si Y représente la production et L le travail, alors la productivité moyenne est égale à Y/L. La productivité moyenne du travail peut être définie comme la quantité produite soit par salarié, soit par heure de travail. En pratique, la mesure la plus utilisée est la production horaire par travailleur dans le secteur industriel. L’inverse de la productivité moyenne du travail est appelée : le coefficient d’utilisation de la main d’œuvre, notée u=L/Y. On appelle productivité marginale du travail, la variation de la production engendrée par une variation du facteur travail (c’est à dire d’une unité supplémentaire de facteur travail). La productivité marginale du travail peut être définie comme la quantité supplémentaire produite à l’aide d’un salarié nouveau, ou d’une heure additionnelle. Certaines observations tirées de l’agriculture, ont montré que lorsque l’on augmentait l’utilisation du facteur travail, les autres facteurs demeurant fixes, à partir d’un certain seuil, la productivité marginale du travail diminuait. Tableau 1 : Productivité moyenne et marginale d’un travailleur Ce résultat, observé dès le XVIIIème siècle et plus connu sous le nom de loi des rendements décroissants, a une importance capitale pour l’entreprise, puisqu’il lui permet de comparer le produit d’un salarié supplémentaire (c’est-à-dire d’une embauche) avec son coût. Si le produit d’un salarié UNIVERSITÉ LIBRE DU CONGO Cours de MICROÉCONOMIE BAHOUAYILA MILONGO Chancel Bardin ULC supplémentaire est appréhendé par la productivité marginale du travail, et le coût par le salaire, on obtient alors la règle suivante : L’entreprise embauchera des salariés jusqu’à ce que la productivité marginale du travail soit égale au salaire (𝜔) : ∆𝑌 ∆𝐿 = 𝜔 Lorsque la productivité marginale du travail est supérieure au coût du travail (salaire), on considère que l’entreprise réalise des gains de productivité. L’origine de ces gains peut être très diverse : il peut s’agir de l’amélioration de la qualité ou de l’intensité du travail, du progrès technique, de la quantité de facteur capital mis à la disposition du salarié. 2-Le facteur capital Dans son ouvrage « Des principes de l’économie politique et de l’impôt », David Ricardo (1821, [1977, p. 83]) proposait une conception large du capital : « Le capital est cette partie de la richesse d’une nation qui est employée à la production. Il se compose des matières alimentaires, des vêtements, des instruments et ustensiles, des machines, des matières premières, etc., nécessaires pour rendre le travail productif ». D’une certaine manière, on peut considérer que le facteur capital est protéiforme. On parle à la fois de capital fixe, capital technique, capital circulant, capital immatériel… Sa mesure passe par le calcul de la productivité moyenne et de la productivité marginale afin de les comparer au coût de l’investissement. a- Les différents concepts du capital Le capital est un concept qui recouvre plusieurs réalités. C’est un bien qui est produit, non pour satisfaire directement des besoins, mais pour permettre de produire d’autres biens. On appelle capital technique, l’ensemble des biens de production utilisés par l’entreprise, que ceux-ci soient détruits au cours du processus de production (matières premières) ou qu’ils puissent servir à plusieurs reprises (biens d’équipement). Le capital technique est généralement composé de capital fixe (terrains, bâtiments, installations, machines), non détruit au cours du processus de production (utilisé sur plusieurs périodes) et de capital circulant (énergie, matières premières, produits semi-finis), transformé et incorporé au produit au cours du processus de production (détruit au cours de la période). On peut noter dans nos sociétés, une forte dématérialisation du capital. Ainsi du matériel informatique ne peut fonctionner sans logiciels. Ces derniers étant assimilés à du capital immatériel. UNIVERSITÉ LIBRE DU CONGO Cours de MICROÉCONOMIE BAHOUAYILA MILONGO Chancel Bardin ULC L’accroissement du rôle de l’Etat dans l’économie, illustrée par la politique des grands travaux (tels que les autoroutes, les routes, chemin de fer, aéroports, ports...) fait apparaître une autre forme de capital. Ce capital appelé capital improductif car il ne participe pas directement à la production, mais est constitué de biens d’équipement collectifs. L’acquisition de ce capital physique stipule cependant que l’entreprise dispose à l’origine de moyens de paiements que l’on désigne sous le nom de d’un capital financier. L’origine de ce capital financier peut être très diverse, il peut s’agir : de l’autofinancement d’une émission de titres sur le marché financier, d’une émission d’un emprunt ou d’un don. b- Le capital humain Le capital constitue un stock de ressources permettant de donner naissance à un flux de revenus futurs. Pour Gary Becker, Prix Nobel d’Economie, cette définition ne s’applique pas seulement au capital matériel, mais également à un autre facteur qu’il appelle capital humain. Cette notion n’est pas nouvelle, elle était déjà présente dans l’ouvrage d’Adam Smith, « Recherches sur la nature et les causes de la richesse (1776) ». Adam Smith considérait que les fonds accumulés par un pays pouvaient être décomposés en trois types : (i) le fonds destiné à servir immédiatement à la consommation et dont le caractère distinctif est de ne rapporter aucun profit ou revenu (vivres, habits, meubles, maison d’habitation…) ; (ii) le fonds capital circulant (argent, vivres, matières premières, ouvrage d’un artisan…) dont la spécificité est de ne rapporter de revenu qu’en circulant ou en changeant de propriétaire ; (iii) le fonds capital fixe susceptible de rapporter un revenu ou un profit sans changer de propriétaire. Ce fonds pouvait prendre la forme de machines, de bâtiments, de terres (tout ce qui a été utilisé pour améliorer ses rendements) et de talents. Ce sont ces derniers qui renvoient au concept de capital humain. Adam Smith (1776, [1991, p. 361]) note que « l’acquisition de ces talents coûte toujours une dépense réelle produite par l’entretien de celui qui les acquiert, pendant le temps de son éducation, de son apprentissage ou de ses études, et cette dépense est un capital fixé et réalisé pour ainsi dire, dans sa personne. Si ces talents composent pareillement une partie de la fortune de la société à laquelle il appartient. La dextérité perfectionnée, dans un ouvrier, peut être considérée sous un même point de vue qu’une machine ou un instrument d’industrie qui facilite et abrège le travail, et qui, malgré la dépense qu’il a coûté, restitue cette dépense avec un profit ». Gary Becker a montré qu’un certain nombre de dépenses, assimilables à des investissements, permettent de valoriser les ressources de ce capital humain et d’accroître sa productivité. Ces investissements en capital humain peuvent être : des investissements en éducation et en formation (initiale ou continue) UNIVERSITÉ LIBRE DU CONGO Cours de MICROÉCONOMIE BAHOUAYILA MILONGO Chancel Bardin ULC des dépenses de santé et d’hygiène pouvant avoir des effets bénéfiques sur le long terme (idée de préserver certaines facultés intellectuelles ou physiques) le temps consacré à la recherche d’un emploi. Il s’agit d’une comparaison entre le coût de la recherche (coût temporel, consultation de revues, achats de journaux, entretiens, rédaction de CV...) et les gains escomptés de la recherche (salaire, possibilité de promotion, qualité de travail, avantages en nature...). Tous ces investissements ont un coût, cependant ils doivent être entrepris dans l’expectative de gains futurs. G.S Becker propose à cet effet, un critère de choix de l’investissement en capital humain : les individus rationnels devraient sélectionner leurs investissements en capital humain de telle sorte que la somme des bénéfices escomptés dans le temps soit supérieure au coût actuel de l’investissement. Au niveau de l’économie prise dans son ensemble et à long terme, on peut considérer que les dépenses d’investissement en capital humain (éducation, formation continue, stage) sont des facteurs de croissance économique. c. La productivité du capital Le capital peut être appréhendé à partir des notions de productivités. La productivité moyenne du capital est la quantité produite par unité de capital utilisée. Si Y est la production et K le capital, alors la productivité moyenne est égale à Y/K. La productivité moyenne du capital peut être définie comme la quantité produite par machine. Son inverse est appelé : coefficient de capital, noté v=K/Y. Le rapport K/L est appelé intensité capitalistique. La productivité marginale du capital mesure la variation de la production engendrée par une variation du facteur capital. Soit le rapport 𝜕𝑌/𝜕𝐾. La productivité marginale du capital peut être définie comme la quantité supplémentaire produite à l’aide d’une nouvelle machine. L’utilisation accrue du facteur capital, les autres facteurs de production restant fixes et sans progrès technique, conduit à la loi des rendements décroissants. On obtient alors la règle suivante : L’entreprise utilisera du capital jusqu’à ce que la productivité marginale du capital soit égale au taux d’intérêt. UNIVERSITÉ LIBRE DU CONGO Cours de MICROÉCONOMIE BAHOUAYILA MILONGO Chancel Bardin ULC 3-Le Progrès technique On peut définir le progrès technique comme une nouvelle manière de faire qui permet de produire plus de produits avec la même quantité des deux facteurs de production à savoir le travail et le capital. De façon plus détaillée, P. Ralle et D. Guellec expliquent que « le progrès technique est défini de façon générale comme un accroissement de la connaissance que les hommes ont des lois de la nature appliquées à la production. Il consiste donc de l’invention de produits et procédés nouveaux, qui augmentent le bien-être des individus soit par un accroissement soit par une transformation de la consommation ». Dans les théories de la croissance économique, le progrès technique est désigné comme l’ensemble des éléments qui contribuent à l’augmentation de la production au-delà de ce qui est expliqué par le capital et le travail. Le progrès technique est alors considéré comme un troisième facteur de production. L’isoqUante Nous allons supposer, pour simplifier, que la production résulte de la combinaison de deux facteurs de production: 𝑌 = 𝑓(𝑋1, 𝑋2) Une isoquante (ou un isoquant) est le lieu géométrique de toutes les combinaisons de facteurs correspondant à un même niveau de production. C’est ce que nous avons appelé par la courbe d’indifférence dans le chapitre précédent. Lorsque les facteurs de production sont substituables, on peut définir un taux marginal de substitution des facteurs. Pour faire la différence entre la substitution des produits de consommation et celle des facteurs de production, on parle respectivement de taux marginal de substitution subjectif (TMSS) et de taux marginal de substitution technique (TMST). De ce fait : 𝑻𝑴𝑺𝑺𝑿𝟏/𝑿𝟐 = − 𝑼𝒎𝑿𝟏 𝑼𝒎𝑿𝟐 𝒆𝒕 𝑻𝑴𝑺𝑻𝑿𝟏/𝑿𝟐 = − 𝑷𝒎𝑿𝟏 𝑷𝒎𝑿𝟐 La fonction homogene Soit une fonction de production ayant deux facteurs de production X1 et X2. Par définition, on dira qu’une fonction de production est homogène de degré m si elle vérifie la condition suivante: ∀ 𝜆 > 1, 𝑌(𝜆𝑋1, 𝜆𝑋2 ) = 𝜆 𝑚𝑌(𝑋1,𝑋2) UNIVERSITÉ LIBRE DU CONGO Cours de MICROÉCONOMIE BAHOUAYILA MILONGO Chancel Bardin ULC Les rendements d’echeLLe Jusqu'ici, nous nous sommes intéressés à la sensibilité de la production à une variation de la quantité utilisée d'un facteur, quand tous les autres facteurs sont maintenus constants. On peut cependant être intéressé par les conséquences d'une variation simultanée de tous les facteurs. Par exemple, on peut s'interroger sur ce qu'adviendra de la production d'une usine de chaussures si on double les machines, le cuir, les bâtiments, la main-d’œuvre et tous les autres inputs ? Une telle question se réfère aux rendements d'échelle, c'est à dire aux conséquences de la variation de l'échelle de production. Les rendements d'échelle ont donc trait à la sensibilité de la production à une variation proportionnelle de tous les facteurs. Si l’on considère une fonction homogène, c’est-à-dire que ∀ 𝜆 > 1, 𝑌(𝜆𝑋1, 𝜆𝑋2 ) = 𝜆 𝑚𝑌(𝑋1, 𝑋2 ) Formellement, il est possible d'identifier les situations suivantes de rendements d'échelle : si m<1, les rendements sont décroissants à l’échelle (si vous augmentez les facteurs de production, la production diminue), si m = 1, les rendements sont dits constants à l’échelle (si vous doublez les quantités de facteurs employés, vous doublerez également la quantité produite). si m > 1, les rendements sont croissants à l’échelle (la production est plus que proportionnelle aux quantités de facteurs). L’analyse économique retient le plus souvent les fonctions de production à rendements constants à l’échelle. Tel est le cas, entre autres, de la fonction Cobb-Douglass. La fonction de production Cobb-Douglas a été inventée par un mathématicien et un économiste en 1928 pour représenter les conditions de production utilisant deux facteurs, le capital en quantité K et le travail en quantité L. Elle a pour forme : 𝑌 = 𝐴𝐾 𝛼𝐿 𝛽 , 𝑎𝑣𝑒𝑐 𝐴 > 0, 0 < 𝛼 < 1 𝑒𝑡 0 < 𝛽 < 1 𝛼 𝑒𝑡 𝛽 représentent respectivement la contribution du travail et du capital. Exercice 1 : Calculer les productivités moyennes et marginales, le TMST et étudier la nature des rendements d’échelle de la fonction Cobb-Douglas. UNIVERSITÉ LIBRE DU CONGO Cours de MICROÉCONOMIE BAHOUAYILA MILONGO Chancel Bardin ULC La combinaison optimale des facteurs de production Pour produire, l’entrepreneur a besoin de facteurs de production. Etant donné qu’il se les procure à titre onéreux sur les marchés du travail et du capital, ils représentent pour lui des coûts. Ses ressources n’étant pas illimitées, il doit intégrer une contrainte dans ses prévisions. Cette contrainte a pour nom isocoût et englobe les diverses combinaisons (exprimées en valeur) de facteurs de production correspondant à une enveloppe de coûts donnée. Soit une entreprise utilise deux types de facteurs de production et C le coût de production. On note 𝐶 = 𝜔1𝑋1 + 𝜔2𝑋2 (1) 𝜔1 𝑒𝑠𝑡 𝑙𝑒 𝑝𝑟𝑖𝑥 𝑢𝑛𝑖𝑡𝑎𝑖𝑟𝑒 𝑑𝑢 𝑓𝑎𝑐𝑡𝑒𝑢𝑟 𝑑𝑒 𝑝𝑟𝑜𝑑𝑢𝑐𝑡𝑖𝑜𝑛 1 𝑒𝑡 𝜔2 𝑒𝑠𝑡 𝑙𝑒 𝑝𝑟𝑖𝑥 𝑢𝑛𝑖𝑡𝑎𝑖𝑟𝑒 𝑑𝑢 𝑓𝑎𝑐𝑡𝑒𝑢𝑟 𝑑𝑒 𝑝𝑟𝑜𝑑𝑢𝑐𝑡𝑖𝑜𝑛 2 Souvent, on considère X2 comme facteur de production fixe et X1 comme le facteur de production variable. Lorsqu’on exprime X2 en fonction de X1 en utilisant l’équation (1), on obtient le sentier d’expansion ou l’isocoût. Par contre, en posant : 𝑇𝑀𝑆𝑇𝑋1/𝑋2 = 𝜔1 𝜔2 (2) On peut exprimer aussi X2 en fonction de X1. Dans ce cas, on parle l’eutope. L’équation (2) est appelé condition d’optimalité. Les équations de l’isocoût et de l’eutope permettent d’obtenir les conditions optimales (ou combinaison optimale). Exercice 2 : La fonction de production d’une entreprise s’écrit: 𝒀 = √𝑲 ∗ 𝑳 1. Montrer que cette fonction peut se mettre sous la forme de la fonction Cobb-Douglas. 2. Quelle est le degré d’homogénéité de cette fonction et interpréter. 3. Représenter les isoquantes pour Y=2 et Y=5 4. Présenter l’expression du taux marginal de substitution technique (T.M.S.T.). 5. Si le prix d’une unité de capital est 5 et celui de travail de 10, l’entreprise disposant d’un budget de 100 : a) Présenter les expressions du sentier d’expansion et de l’eutope. b) Rechercher la condition d’optimalité et la combinaison optimale de capital et de travail; c) Quel volume de production optimale l’entreprise peut-elle alors atteindre ? UNIVERSITÉ LIBRE DU CONGO Cours de MICROÉCONOMIE BAHOUAYILA MILONGO Chancel Bardin ULC CHAPITRE 4 Nous savons comment se comportent le consommateur et le producteur. Les deux étant rationnels, le consommateur achète un panier de bien qui maximise son utilité de manière optimale et le producteur vend son produit en quantité optimale. Chacun vient dans un marché pour atteindre son objectif. Le marché est le lieu de rencontre entre l’offre d’un bien matérialisée par les producteurs de ce bien et la demande matérialisée par les consommateurs qui demandent ce bien. Parmi les marchés qui existent, nous pouvons citer le marché concurrentiel ou marché en concurrence pure et parfaite. Les propriétés de ce marché sont : - L’atomicité du marché : Existence d’une multitude d’acheteurs et de producteurs, de taille comparable, de telle façon qu’aucun d’entre eux ne puisse influencer la détermination du prix du bien; - La fluidité du marché : existence d’une libre entrée et libre sortie du marché pour les agents (absence de barrière à l’entrée) - L’homogénéité du produit : des producteurs différents offrent sur le marché des produits strictement identiques. Le prix est alors la seule variable qui sera prise en compte par l’acheteur ; - La transparence du marché : les offreurs et les demandeurs disposent d’une information parfaite et gratuite sur les conditions du marché et notamment sur les prix des biens proposés par tous les producteurs; - La mobilité parfaite des facteurs de production qui doivent pouvoir, à tout moment, se déplacer du marché d’un bien à celui d’un autre bien. Lorsque l’une de ces propriétés n’est pas vérifiée dans un marché, ce dernier est appelé, marché en concurrence imparfaite. Dans le cas où il y a différenciation des produits et un grand nombre de producteurs, on parle de marché en concurrence monopolistique. L’hypothèse de l’homogénéité du produit caractéristique de la concurrence pure et parfaite est donc abandonnée. Dans ce modèle chaque firme offre un produit qui lui est spécifique, se trouvant ainsi en position de monopole. Les producteurs disposent alors d’une certaine latitude pour déterminer le prix et la quantité offerte puisque la différenciation du produit réduit l’élasticité de la demande en fidélisant les consommateurs. Le marché peut être en situation de monopsone (un seul acheteur et plusieurs producteurs), de monopole (un seul producteur et plusieurs acheteurs), de monopole bilatéral (un seul acheteur et un seul producteur), de duopole (deux offreurs et plusieurs acheteurs), d’oligopole (peu de vendeurs et beaucoup d’acheteurs) ou d’oligopsone (peu d’acheteurs et beaucoup de vendeurs). ÉQUILIBRE DU MARCHÉ ET DÉTERMINATION DU PRIX UNIVERSITÉ LIBRE DU CONGO Cours de MICROÉCONOMIE BAHOUAYILA MILONGO Chancel Bardin ULC La fonction demande La demande est l’ensemble de nécessité ou de besoins que l’on exprime pour obtenir un bien ou service. La demande est toujours exprimée par rapport à un bien ou un service, Elle se présente sous la forme d’une fonction inverse entre la quantité maximale demandée d’un bien et le prix de ce bien. C’est la loi de la demande. Si le prix d’un bien augmente, alors la quantité diminue et inversement. On distingue : - La demande individuelle : c’est une relation qui indique la quantité maximale du bien que le consommateur est prêt à acheter, pendant une période de temps, pour différentes valeurs possibles du prix du bien. - La demande globale d’un bien, appelée aussi demande du marché, est la somme des demandes individuelles de ce même bien. Dans le cas où les consommateurs ont la même fonction de demande individuelle, la demande globale est égale à leur effectif multiplié par la demande individuelle : 𝑫𝑮𝒍𝒐𝒃𝒂𝒍𝒆 = 𝒏 ∗ 𝑫𝒊𝒏𝒅𝒊𝒗𝒊𝒅𝒖𝒆𝒍𝒍𝒆, avec n=nombre de consommateurs. Dans le cas où les consommateurs ont des demandes individuelles différentes, la détermination de la demande globale se fait par la discussion en fonction du niveau du prix. Exemple : Soit deux consommateurs qui présentent chacun les fonctions de demandes suivantes : D1 = 5 – p et D2 = 15 – 5p La demande globale sera alors : 𝐷𝐺𝑙𝑜𝑏𝑎𝑙𝑒 = { 0 𝑠𝑖 𝑃 > 5 5 − 𝑃 𝑠𝑖 3 ≤ 𝑃 ≤ 5 20 − 6𝑃 𝑠𝑖 𝑃 < 3 - Déterminer la demande globale dans les cas suivants : P=1, P=4 ou P=10. - Représenter les courbes des trois demandes. La fonction offre La demande est l’ensemble de biens et services mis à la disposition (d’une clientèle) sur un marché à un prix donné. Elle se présente sous la forme d’une fonction croissante entre la quantité maximale offerte d’un bien et le prix de ce bien. C’est la loi de l’offre. UNIVERSITÉ LIBRE DU CONGO Cours de MICROÉCONOMIE BAHOUAYILA MILONGO Chancel Bardin ULC Si le prix d’un bien augmente, alors la quantité augmente et inversement. On distingue : - L’offre individuelle d’un bien: c’est une relation qui indique la quantité maximale du bien que le producteur est disposer à offrir, pendant une période de temps, pour différentes valeurs possibles du prix du bien. - L’offre globale d’un bien, appelée aussi offre du marché, est la somme des offres individuelles de ce même bien. Dans le cas où les producteurs ont la même fonction d’offre individuelle, l’offre globale est égale à leur effectif multiplié par la demande individuelle : 𝑶𝑮𝒍𝒐𝒃𝒂𝒍𝒆 = 𝒏 ∗ 𝑶𝒊𝒏𝒅𝒊𝒗𝒊𝒅𝒖𝒆𝒍𝒍𝒆, avec n=nombre de producteurs. Dans le cas où les producteurs ont des offres individuelles différentes, la détermination de l’offre globale se fait par la discussion en fonction du niveau du prix. Exemple : Soit deux producteurs qui présentent chacun les fonctions d’offres suivantes : O1 = 5P – 15 et O2 = P - 5 L’offre globale sera alors : 𝑂𝐺𝑙𝑜𝑏𝑎𝑙𝑒 = { 0 𝑠𝑖 𝑃 < 3 5𝑃 − 15 𝑠𝑖 3 ≤ 𝑃 ≤ 5 6𝑃 − 20 𝑠𝑖 𝑃 > 5 - Déterminer la demande globale dans les cas suivants : P=1, P=4 ou P=10. - Représenter les courbes des trois demandes. L’eqUiLibre dU marche L’équilibre du marché désigne l’équilibre qui résulte de la flexibilité des prix et correspond à une situation où, pour un niveau de prix (le prix d’équilibre), il y a égalité entre les quantités offertes (l’offre) et les quantités demandées (la demande). En concurrence pure et parfaite, cet équilibre est également un optimum qui maximise le surplus du consommateur et le surplus du producteur. Exemple : Soit un marché en situation de concurrence pure et parfaite sur lequel se vend un produit au prix P. La demande et l’offre globales sur ce marché sont : D= - 0,5P + 30 et O=2P-20. Déterminer le prix d’équilibre et les quantités optimales offerte et demandée. Représenter graphiquement les deux fonctions et calculer le surplus social (collectif). LA NOTION DE L’eLasticitÉ UNIVERSITÉ LIBRE DU CONGO Cours de MICROÉCONOMIE BAHOUAYILA MILONGO Chancel Bardin ULC L’élasticité est un indicateur de sensibilité : elle donne le sens et mesure l’intensité de la réaction d’une fonction à la variation de sa variable déterminante. Si on a la fonction 𝑦 = 𝑓(𝑥), l’élasticité de y par rapport à x est : 𝑒𝑦/𝑥 = 𝑑𝑦 𝑦 𝑑𝑥 𝑥 = 𝑑𝑦 𝑑𝑥 ∗ 𝑥 𝑦 Il peut y arriver que dans un marché, la demande du bien d’un consommateur puisse dépendre du prix de ce bien, du prix des autres biens et du revenu du consommateur. De ce fait : - L’élasticité de la demande d’un bien par rapport au revenu du consommateur est appelé élasticitérevenu et est notée 𝒆(𝑫𝒊/𝑹) ; - L’élasticité de la demande d’un bien par rapport au prix de ce bien est nommé élasticité-prix directe et est notée 𝒆(𝑫𝒊/𝑷𝒊 ) ; - L’élasticité de la demande d’un bien par rapport au prix d’un autre bien est nommée élasticité-prix croisée et est notée 𝒆(𝑫𝒊/𝑷𝒋 ) . A partir de ces résultats, on a le tableau suivant : Bien inférieur Bien supérieur Bien de luxe Bien normal et nécessaire Elasticité-revenu e < 0 e > 0 e > 1 0 < e ≤ 1 Biens complémentaires Biens indépendants Biens substituables Elasticité-prix croisée e < 0 e = 0 e > 0 Bien ordinaire ou bien typique Bien de Giffen ou bien atypique Elasticité-prix directe e < 0 e > 0 Demande rigide ou inélastique Demande élastique Elasticité-prix directe | e | < 1 | e | > 1 Exemple : Pour consommer du poisson, Jean doit faire le choix entre le consommer avec du manioc ou avec du pain. Cependant, il choisit d’acheter le pain. Or plusieurs études ont montré que la demande du pain dépend de son prix, du revenu du demandeur, du prix du poisson et du prix du manioc. Dans un marché quelconque, la demande du pain s’écrit de la manière suivante : 𝐷𝑝𝑎𝑖𝑛 = 10𝑅 2 20𝑃𝑝𝑎𝑖𝑛 + 5𝑃𝑝𝑜𝑖𝑠𝑠𝑜𝑛 − 2𝑃𝑚𝑎𝑛𝑖𝑜𝑐 UNIVERSITÉ LIBRE DU CONGO Cours de MICROÉCONOMIE BAHOUAYILA MILONGO Chancel Bardin ULC a) Quelle est la nature du pain dans ce marché (bien normal et de nécessité ou bien de luxe)? b) Le pain est-il un bien ordinaire dans ce marché ? c) La demande du pain est-elle rigide ou élastique ? d) Comment sont le manioc et le poisson par rapport au pain (substituable, complémentaire ou indépendant)? SI VOUS AVEZ BESOIN DE LA CORRECTION DES EXERCICES PROPOSÉS, DE NOS EXERCICES DE TRAVAUX DIRIGÉS, DE NOS SUJETS DE DEVOIR OU D’EXAMEN AVEC SOLUTION, CONTACTEZ NOUS : 95, rue Malanda (Moukondo vers la Tsiémé, Ouenzé) VOUS POUVEZ AUSSI APPELER OU ECRIRE A L’AUTEUR DE CE DOCUMENT. E-mail : bardinbahouayila@yahoo.fr / bardinbahouayila@gmail.com Tel : 05 075 33 71 / 06 837 81 85 Skander Belhaj Mathématiques pour l’économie et la gestion Analyse et algèbre Constitué d’un cours complet et de 75 exercices corrigés, ce manuel présente l’ensemble du programme d’algèbre et d’analyse des filières Sciences de gestion, Sciences économiques et Informatique appliquée à la gestion. Il introduit de façon simple et pédagogique les techniques et les résultats des mathématiques de base que les étudiants en première année de Licence doivent maîtriser. -:HSMDLB=UUW\X\: ISBN 978-2-311-00273-7 WWW.VUIBERT.FR Mathématiques pour l’économie et la gestion LICENCE 1 – SCIENCES DE GESTION SCIENCES ÉCONOMIQUES – IAG Cours & exercices corrigés LICENCE 1 SCIENCES DE GESTION SCIENCES ÉCONOMIQUES INFORMATIQUE APPLIQUÉE À LA GESTION Skander Belhaj Directeur du département des méthodes quantitatives de la faculté des Sciences juridiques, économiques et de gestion de Jendouba (Tunisie), Skander Belhaj est docteur en mathématiques appliquées et spécialiste d’algèbre matricielle rapide. Chercheur à l’université de Tunis El Manar (ENIT-LAMSIN) et à l’université de Franche-Comté (Besançon), il enseigne actuellement à l’institut supérieur des arts du multimédia de la Manouba (Tunisie) et à l’université libre de Tunis. Sommaire I. Analyse 1. Fonctions d’une variable réelle 2. Développements limités 3. Fonctions réelles à deux variables 4. Optimisation et recherche d’extremums de deux variables 5. Intégration II. Algèbre 1. Polynômes et fractions rationnelles 2. Espaces vectoriels 3. Applications linéaires, matrices 4. Systèmes d’équations linéaires, déterminant 5. Diagonalisation d’une matrice carrée • Cours complet • Plus de 70 exercices • Tous les corrigés détaillés Mathématiques pour l’économie et la gestion Analyse et algèbre CV_EcoGestion:Mise en page 1 19/10/11 16:59 Page 1 Mathématiques pour l’économie et la gestion Cours & exercices corrigés Skander Belhaj LICENCE 1 SCIENCES DE GESTION SCIENCES ÉCONOMIQUES INFORMATIQUE APPLIQUÉE À LA GESTION Analyse et algèbre Lim_EcoGestion:EP 19/10/11 16:47 Page I Déjà parus dans la nouvelle collection de manuels universitaires scientifiques Anne CORTELLA, Algèbre. Théorie des groupes. Cours et exercices corrigés – L3 & Master, 224 pages Bruno AEBISCHER, Introduction à l’analyse. Cours et exercices corrigés – L1, 288 pages Bruno AEBISCHER, Analyse. Fonctions de plusieurs variables & géométrie analytique. Cours et exercices corrigés – L2, 448 pages Bruno AEBISCHER, Géométrie. Géométrie affine, géométrie euclidienne & introduction à la géométrie projective. Cours et exercices corrigés – L3, 288 pages Ariel DUFETEL, Analyse. CAPES externe et Agrégation interne. Cours et exercices corrigés, 672 pages David LANGLOIS, Introduction à la relativité. Principes fondamentaux & conséquences physiques. Cours et exercices corrigés – L2 & L3, 192 pages Bernard DELCAILLAU, Géomorphologie. Relations tectonique, climat, érosion. Cours et exercices corrigés – L3, M1 & M2, 304 pages Matthieu ROY-BARMAN & Catherine JEANDEL, Géochimie marine. Circulation océanique, cycle du carbone et changement climatique. Cours et exercices corrigés – L3, M1 & M2, collection « Interactions », 368 pages et des dizaines d’autres livres de référence, d’étude ou de culture en mathématiques, informatique et autres spécialités scientifiques www.vuibert.fr En couverture : Escalier en double spirale de Giuseppe Momo, Vatican. © Sylvain Sonnet/Corbis Maquette intérieure : Sébastien Mengin/Edilibre.net Composition et mise en page de l’auteur Couverture : Linda Skoropad/Prescricom ISBN 978-2-311-00273-7 Registre de l’éditeur : 595 La loi du 11 mars 1957 n’autorisant aux termes des alinéas 2 et 3 de l’article 41, d’une part, que les « copies ou reproductions strictement réservées à l’usage privé du copiste et non destinées à une utilisation collective » et, d’autre part, que les analyses et les courtes citations dans un but d’exemple et d’illustration, « toute représentation ou reproduction intégrale, ou partielle, faite sans le consentement de l’auteur ou de ses ayants droit ou ayants cause, est illicite » (alinéa 1er de l’article 40). Cette représentation ou reproduction, par quelque procédé que ce soit, constituerait donc une contrefaçon sanctionnée par les articles 425 et suivants du Code pénal. Des photocopies payantes peuvent être réalisées avec l’accord de l’éditeur. S’adresser au Centre français d’exploitation du droit de copie : 20 rue des Grands Augustins, F-75006 Paris. Tél. : 01 44 07 47 70 © Vuibert – novembre 2011 – 5, allée de la 2e DB 75015 Paris Lim_EcoGestion:EP 19/10/11 16:47 Page II Mathématiques pour l’économie et la gestion Cours & exercices corrigés Skander Belhaj LICENCE 1 SCIENCES DE GESTION SCIENCES ÉCONOMIQUES INFORMATIQUE APPLIQUÉE À LA GESTION Analyse et algèbre Lim_EcoGestion:EP 19/10/11 16:47 Page I Déjà parus dans la nouvelle collection de manuels universitaires scientifiques Anne CORTELLA, Algèbre. Théorie des groupes. Cours et exercices corrigés – L3 & Master, 224 pages Bruno AEBISCHER, Introduction à l’analyse. Cours et exercices corrigés – L1, 288 pages Bruno AEBISCHER, Analyse. Fonctions de plusieurs variables & géométrie analytique. Cours et exercices corrigés – L2, 448 pages Bruno AEBISCHER, Géométrie. Géométrie affine, géométrie euclidienne & introduction à la géométrie projective. Cours et exercices corrigés – L3, 288 pages Ariel DUFETEL, Analyse. CAPES externe et Agrégation interne. Cours et exercices corrigés, 672 pages David LANGLOIS, Introduction à la relativité. Principes fondamentaux & conséquences physiques. Cours et exercices corrigés – L2 & L3, 192 pages Bernard DELCAILLAU, Géomorphologie. Relations tectonique, climat, érosion. Cours et exercices corrigés – L3, M1 & M2, 304 pages Matthieu ROY-BARMAN & Catherine JEANDEL, Géochimie marine. Circulation océanique, cycle du carbone et changement climatique. Cours et exercices corrigés – L3, M1 & M2, collection « Interactions », 368 pages et des dizaines d’autres livres de référence, d’étude ou de culture en mathématiques, informatique et autres spécialités scientifiques www.vuibert.fr En couverture : Escalier en double spirale de Giuseppe Momo, Vatican. © Sylvain Sonnet/Corbis Maquette intérieure : Sébastien Mengin/Edilibre.net Composition et mise en page de l’auteur Couverture : Linda Skoropad/Prescricom ISBN 978-2-311-00273-7 Registre de l’éditeur : 595 La loi du 11 mars 1957 n’autorisant aux termes des alinéas 2 et 3 de l’article 41, d’une part, que les « copies ou reproductions strictement réservées à l’usage privé du copiste et non destinées à une utilisation collective » et, d’autre part, que les analyses et les courtes citations dans un but d’exemple et d’illustration, « toute représentation ou reproduction intégrale, ou partielle, faite sans le consentement de l’auteur ou de ses ayants droit ou ayants cause, est illicite » (alinéa 1er de l’article 40). Cette représentation ou reproduction, par quelque procédé que ce soit, constituerait donc une contrefaçon sanctionnée par les articles 425 et suivants du Code pénal. Des photocopies payantes peuvent être réalisées avec l’accord de l’éditeur. S’adresser au Centre français d’exploitation du droit de copie : 20 rue des Grands Augustins, F-75006 Paris. Tél. : 01 44 07 47 70 © Vuibert – novembre 2011 – 5, allée de la 2e DB 75015 Paris Lim_EcoGestion:EP 19/10/11 16:47 Page II Mathématiques pour l’économie et la gestion Cours & exercices corrigés Skander Belhaj LICENCE 1 SCIENCES DE GESTION SCIENCES ÉCONOMIQUES INFORMATIQUE APPLIQUÉE À LA GESTION Analyse et algèbre Lim_EcoGestion:EP 19/10/11 16:47 Page I Déjà parus dans la nouvelle collection de manuels universitaires scientifiques Anne CORTELLA, Algèbre. Théorie des groupes. Cours et exercices corrigés – L3 & Master, 224 pages Bruno AEBISCHER, Introduction à l’analyse. Cours et exercices corrigés – L1, 288 pages Bruno AEBISCHER, Analyse. Fonctions de plusieurs variables & géométrie analytique. Cours et exercices corrigés – L2, 448 pages Bruno AEBISCHER, Géométrie. Géométrie affine, géométrie euclidienne & introduction à la géométrie projective. Cours et exercices corrigés – L3, 288 pages Ariel DUFETEL, Analyse. CAPES externe et Agrégation interne. Cours et exercices corrigés, 672 pages David LANGLOIS, Introduction à la relativité. Principes fondamentaux & conséquences physiques. Cours et exercices corrigés – L2 & L3, 192 pages Bernard DELCAILLAU, Géomorphologie. Relations tectonique, climat, érosion. Cours et exercices corrigés – L3, M1 & M2, 304 pages Matthieu ROY-BARMAN & Catherine JEANDEL, Géochimie marine. Circulation océanique, cycle du carbone et changement climatique. Cours et exercices corrigés – L3, M1 & M2, collection « Interactions », 368 pages et des dizaines d’autres livres de référence, d’étude ou de culture en mathématiques, informatique et autres spécialités scientifiques www.vuibert.fr En couverture : Escalier en double spirale de Giuseppe Momo, Vatican. © Sylvain Sonnet/Corbis Maquette intérieure : Sébastien Mengin/Edilibre.net Composition et mise en page de l’auteur Couverture : Linda Skoropad/Prescricom ISBN 978-2-311-00273-7 Registre de l’éditeur : 595 La loi du 11 mars 1957 n’autorisant aux termes des alinéas 2 et 3 de l’article 41, d’une part, que les « copies ou reproductions strictement réservées à l’usage privé du copiste et non destinées à une utilisation collective » et, d’autre part, que les analyses et les courtes citations dans un but d’exemple et d’illustration, « toute représentation ou reproduction intégrale, ou partielle, faite sans le consentement de l’auteur ou de ses ayants droit ou ayants cause, est illicite » (alinéa 1er de l’article 40). Cette représentation ou reproduction, par quelque procédé que ce soit, constituerait donc une contrefaçon sanctionnée par les articles 425 et suivants du Code pénal. Des photocopies payantes peuvent être réalisées avec l’accord de l’éditeur. S’adresser au Centre français d’exploitation du droit de copie : 20 rue des Grands Augustins, F-75006 Paris. Tél. : 01 44 07 47 70 © Vuibert – novembre 2011 – 5, allée de la 2e DB 75015 Paris Lim_EcoGestion:EP 19/10/11 16:47 Page II ✐ ✐ “belhaj” — 2011/10/20 — 16:16 — page III — #1 ✐ ✐ ✐ ✐ ✐ ✐ Table des matières Introduction VII Analyse 1 1 Les fonctions numériques d’une variable réelle 3 1.1 Limite d’une fonction . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.2 Fonctions continues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.3 Dérivabilité . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.4 Fonctions convexes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 1.5 Formules de Taylor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 1.6 Différentielle et approximation . . . . . . . . . . . . . . . . . . . . . . 11 1.7 Fonctions usuelles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 1.8 Exercices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 2 Développements limités 29 2.1 Développements limités au voisinage de zéro . . . . . . . . . . . . . . . 29 2.2 Opérations sur les développements limités . . . . . . . . . . . . . . . . 32 2.3 Fonctions équivalentes, définition et opérations . . . . . . . . . . . . . 37 2.4 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 2.5 Exercices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 3 Fonctions réelles à deux variables 43 3.1 Généralités et définitions . . . . . . . . . . . . . . . . . . . . . . . . . . 43 3.2 Fonctions réelles à deux variables . . . . . . . . . . . . . . . . . . . . . 45 3.3 Exercices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 4 Optimisation et recherche d’extremums de deux variables 53 4.1 Cas de recherche sans contrainte . . . . . . . . . . . . . . . . . . . . . 53 4.2 Cas de recherche sous contrainte . . . . . . . . . . . . . . . . . . . . . 55 4.3 Exercices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 ✐ ✐ “belhaj” — 2011/10/20 — 16:16 — page IV — #2 ✐ ✐ ✐ ✐ ✐ ✐ IV Table des matières 5 Intégration 59 5.1 Généralités . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 5.2 Méthodes d’intégration . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 5.3 Calcul pratique des intégrales . . . . . . . . . . . . . . . . . . . . . . . 65 5.4 Exercices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Algèbre 67 6 Polynômes et fractions rationnelles 69 6.1 Polynômes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 6.2 Fractions rationnelles . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 6.3 Exercices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 7 Espaces vectoriels 81 7.1 L’espace vectoriel R n . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 7.2 Espace vectoriel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 7.3 Combinaisons linéaires, sous-espaces vectoriels . . . . . . . . . . . . . . 84 7.4 Indépendance linéaire, base . . . . . . . . . . . . . . . . . . . . . . . . 86 7.5 Exercices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 8 Applications linéaires, matrices 91 8.1 Applications linéaires . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 8.2 Calcul matriciel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 8.3 Exercices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 9 Systèmes d’équations linéaires, déterminant 111 9.1 Systèmes d’équations linéaires . . . . . . . . . . . . . . . . . . . . . . . 111 9.2 Le déterminant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 9.3 Exercices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 10 Diagonalisation d’une matrice carrée 125 10.1 Élément propre d’une matrice carrée . . . . . . . . . . . . . . . . . . . 125 10.2 Diagonalisation d’une matrice carrée . . . . . . . . . . . . . . . . . . . 128 10.3 Exercices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 Corrigés 133 Corrigés du chapitre 1 135 Corrigés du chapitre 2 147 Corrigés du chapitre 3 153 Corrigés du chapitre 4 161 Corrigés du chapitre 5 169 ✐ ✐ “belhaj” — 2011/10/20 — 16:16 — page V — #3 ✐ ✐ ✐ ✐ ✐ ✐ Table des matières V Corrigés du chapitre 6 173 Corrigés du chapitre 7 175 Corrigés du chapitre 8 179 Corrigés du chapitre 9 187 Corrigés du chapitre 10 191 ✐ ✐ “belhaj” — 2011/10/20 — 16:16 — page VI — #4 ✐ ✐ ✐ ✐ ✐ ✐ ✐ ✐ “belhaj” — 2011/10/20 — 16:16 — page VII — #5 ✐ ✐ ✐ ✐ ✐ ✐ Introduction L’ouvrage Le but de ce cours est d’introduire de façon simple et élémentaire les techniques et les résultats mathématiques de bases en algèbre et en analyse que l’étudiant en première année de SG (Sciences de Gestion), SE (Sciences Économique), et IAG (Informatique Appliquée à la Gestion) doit maîtriser et qu’il pourra réutiliser dans d’autres cours d’enseignement. Il ne s’agit pas de démontrer les théorèmes ou les résultats énoncés mais d’expliquer leurs utilisations et leurs règles de calcul. À la fin de chaque chapitre, de nombreux exercices corrigés, permettant aux étudiants de tester leurs connaissances, complètent et illustrent le cours. L’auteur Docteur en mathématiques appliquées, Skander Belhaj est spécialiste d’algèbre matricielle rapide. Chercheur à l’école nationale d’ingénieurs de Tunis (ENIT-LAMSIN) et à l’université de Franche-Comté (Besançon), il enseigne actuellement à l’institut supérieur des arts du multimédia de la Manouba (université de la Manouba, Tunisie) et l’université libre de tunis. Il a été élu directeur de département des méthodes quantitatives et aussi enseignant à la faculté des Sciences juridiques, économiques et de gestion de Jendouba (Tunisie). Le public Étudiants en première année des Licences de Sciences de Gestion, Sciences Économique et Informatique Appliquée à la Gestion (hors prépas hec). ✐ ✐ “belhaj” — 2011/10/20 — 16:16 — page VIII — #6 ✐ ✐ ✐ ✐ ✐ ✐ ✐ ✐ “belhaj” — 2011/10/20 — 16:16 — page 1 — #7 ✐ ✐ ✐ ✐ ✐ ✐ Première partie Analyse ✐ ✐ “belhaj” — 2011/10/20 — 16:16 — page 2 — #8 ✐ ✐ ✐ ✐ ✐ ✐ ✐ ✐ “belhaj” — 2011/10/20 — 16:16 — page 3 — #9 ✐ ✐ ✐ ✐ ✐ ✐ CHAPITRE 1 Les fonctions numériques d’une variable réelle Soit f : Df x −→ 7−→ R f (x) une fonction numérique d’une variable réelle telle que Df = {x ∈ R / f(x) a un sens} est le domaine de définition de f. 1.1 Limite d’une fonction Définition 1.1.1 On dit qu’une fonction f, définie au voisinage 1 de x0 ∈ R, sauf peut être en x0, admet une limite l ∈ R quand x tend vers x0 et on écrit : lim x−→x0 f (x) = l si ∀ > 0, ∃η > 0; ∀x ∈ R tels que |x − x0| < η alors |f (x) − l| < . Remarque 1.1.1 Une fonction peut avoir une limite quand x tend vers x0 sans qu’elle soit définie en x0. Remarque 1.1.2 Dire que x tend vers x0 c’est-à-dire que x s’approche de x0 sans jamais l’atteindre. Remarque 1.1.3 On définit la limite à droite et à gauche de f comme suit : 1. Limite à droite : lim x−→x0 x>x0 f (x) = l si ∀ > 0, ∃η > 0; ∀x ∈ R tels que 0 < x−x0 < η alors |f (x) − l| < , et on note lim x−→x + 0 f (x) = l. 1 Un voisinage d’un point x0 ∈ R est un intervalle ouvert qui contient ce point. ✐ ✐ “belhaj” — 2011/10/20 — 16:16 — page 4 — #10 ✐ ✐ ✐ ✐ ✐ ✐ 4 Chapitre 1. Les fonctions numériques d’une variable réelle 2. Limite à gauche : lim x−→x0 x 0, ∃η > 0; ∀x ∈ R tels que 0 < x0−x < η alors |f (x) − l| < , et on note lim x−→x − 0 f (x) = l. Proposition 1.1.1 La limite d’une fonction, lorsqu’elle existe, est unique. Preuve. Supposons que lim x−→x0 f (x) = l et lim x−→x0 f (x) = l 0 avec l 6= l 0 . Ainsi, ∀ > 0, ∃η > 0; ∀x ∈ R tels que |x − x0| < η alors |f (x) − l| <  et ∀ 0 > 0, ∃η 0 > 0; ∀x ∈ R tels que |x − x0| < η0 alors |f (x) − l 0 | < 0 . On a |l − l 0 | = |l − f (x) + f (x) − l 0 | ≤ |f (x) − l| | {z } < +|f (x) − l 0 | | {z } <0 . Alors, |l − l 0 | <  +  0 | {z }  00 . Pour  00 << 2 , on peut écrire |l − l 0 | < 00. Donc, l = l 0 . Ce qui est absurde. 1.1.1 Opérations sur les limites Supposons que lim x−→x0 f (x) = l1 et lim x−→x0 g (x) = l2 et soit λ ∈ R, alors on a : 1. lim x−→x0 (f + g) (x) = l1 + l2 2. lim x−→x0 (f × g) (x) = l1 × l2 3. lim x−→x0 |f (x)| = |l1| 4. lim x−→x0 (λf) (x) = λl1 5. lim x−→x0  f g  (x) = l1 l2 , (l2 6= 0) 6. Si f ≥ g au voisinage de x0 alors l1 ≥ l2. Exemple 1.1.1 Vérifier que lim x−→1 2 4x 2 − 1 2x − 1 = 2. En effet, il suffit de simplifier : 4x 2−1 2x−1 = (2x−1)(2x+1) 2x−1 = 2x + 1. 1.1.2 Formes indéterminées Les quatres formes indéterminées les plus connues sont : 0 0 , ∞ ∞ , ∞ − ∞, 0 × ∞. D’autres formes indéterminées seront exposées dans le chapitre suivant. 2 Négligeable. ✐ ✐ “belhaj” — 2011/10/20 — 16:16 — page 5 — #11 ✐ ✐ ✐ ✐ ✐ ✐ 1.2 Fonctions continues 5 Exemple 1.1.2 Trouver que lim x−→+∞ r x + q x + √ x − √ x = 1 2 . En effet, multipliant q x + p x + √ x − √ x par son conjugué. On a r x + q x + √ x − √ x = q x + p x + √ x − √ x  q x + p x + √ x + √ x  q x + p x + √ x + √ x = x + p x + √ x − x q x + p x + √ x + √ x = p x + √ x q x + p x + √ x + √ x . Ensuite, mettant √ x en facteur : r x + q x + √ x − √ x = √ x q 1 + √ 1 x  √ x r 1 + q1 x + 1 x √ x + 1. Ainsi, quand x −→ +∞, q x + p x + √ x − √ x  −→ 1 2 . Exercice 1.1.1 Montrer que limx−→0 sin (3x) − 3 sin (x) tan (2x) − sin (2x) = −1. 1.2 Fonctions continues Soit f : Df x −→ 7−→ R f (x) et x0 ∈ R. Définition 1.2.1 On dit que f est continue en x0 ∈ R si : 1. f est définie en x0 (x0 ∈ Df), 2. lim x−→x0 f (x) = f (x0). Remarque 1.2.1 1. On dit que f est continue sur une partie A ⊆ Df si f est continue en tout point de A. 2. Soient f et g deux fonctions continues en x0 et soit λ un réel alors (f + g), (f × g), (λf), f g (g (x0) 6= 0) et |f| sont aussi continues en x0. ✐ ✐ “belhaj” — 2011/10/20 — 16:16 — page 6 — #12 ✐ ✐ ✐ ✐ ✐ ✐ 6 Chapitre 1. Les fonctions numériques d’une variable réelle Exemple 1.2.1 1. Étudier la continuité de la fonction f : R −→ R définie comme suit : f (x) =  0 si x = 0 sin 1 x si x 6= 0 2. Étudier la continuité de la fonction g : R −→ R définie comme suit : g (x) =  1 si x = 0 sin x x si x 6= 0 1.2.1 Propriétés des fonctions continues Théorème 1.2.1 Soit I = [a, b] , a < b, un intervalle fermé borné sur R. Toute fonction continue sur I est bornée et atteint ses bornes. Théorème 1.2.2 (des valeurs intermédiaires) Soit f : I−→ R continue sur I et soient a et b deux points de I tels que f (a) f (b) < 0. Alors, il existe c compris entre a et b tel que f (c) = 0. Exemple 1.2.2 Montrer que x 5 + x 3 + 1 = 0 admet une solution unique comprise entre −1 et 0. Théorème 1.2.3 L’image d’un intervalle de R par une fonction continue est un intervalle de R. Définition 1.2.2 (Prolongement par continuité) soit f : I−→ R une fonction et soit a /∈ I. Si f admet une limite l en a, alors la fonction fe: I ∪ {a} −→ R définie par fe(x) =  f (x) si x 6= a l si x = a est continue sur I ∪ {a} . Cette fonction est appelée prolongement de f par continuité en a. Exemple 1.2.3 Soit f (x) = sin x x . Puisque limx−→0 sin x x = 1. On peut vérifier que fe(x) =  f (x) si x 6= 0 1 si x = 0 est le prolongement par continuité de f en 0. 1.2.2 Théorème des fonctions réciproques Soit I un intervalle de R. Théorème 1.2.4 Toute fonction f : I−→ R, continue et strictement monotone admet une fonction réciproque, notée f −1 , qui est continue, strictement monotone et de même sens de variation que f. Remarque 1.2.2 Le graphe de f −1 s’obtient à partir de celui de f par la symétrie par rapport à la première bissectrice. ✐ ✐ “belhaj” — 2011/10/20 — 16:16 — page 7 — #13 ✐ ✐ ✐ ✐ ✐ ✐ 1.3 Dérivabilité 7 • Exemples de fonctions réciproques : Les fonctions Exponentielle et Logarithme Il existe une fonction notée e (ou exp) définie sur R comme suit : e : R x −→ 7−→ R e x continue et strictement croissante sur R avec e(R) = R ∗ +, donc il existe une fonction notée log telle que : log : ]0, +∞[ t −→ 7−→ R log (t) vérifiant log(e x ) = x ∀x ∈ R et exp(log(t)) = t, ∀t ∈ R ∗ +. Exercice 1.2.1 Étudier la continuité en 0 de la fonction f : R −→ R définie par : f (x) = sin 1 x  e 1 x + 1 si x 6= 0 et f (0) = 0. 1.3 Dérivabilité Soit f : Df ⊆ R −→ R une fonction continue en x0 ∈ Df. Définition 1.3.1 On dit que f est dérivable en x0 si et seulement si la fonction x 7−→ f (x) − f (x0) x − x0 admet une limite finie quand x tend vers x0. Lorsque cette limite existe et finie, elle sera notée f 0 (x0) et elle est appelée la dérivée de f en x0. 1.3.1 Opérations sur les fonctions dérivables Soit f : Df ⊆ R −→ R et g : Dg ⊆ R −→ R deux fonctions dérivables en x0 ∈ Df∩Dg, et soit λ ∈ R. Théorème 1.3.1 1. (f + g) est dérivable en x0 et on a (f + g) 0 (x0) = f 0 (x0) + g 0 (x0). 2. (λf) est dérivable en x0 et on a (λf) 0 (x0) = λf0 (x0). 3. (f ×g) est dérivable en x0 et on a (f ×g) 0 (x0) = f 0 (x0)×g(x0) + f(x0)×g 0 (x0). 4. Si g(x0) 6= 0, f g est dérivable en x0 et on a (f × g) 0 (x0) = f 0 (x0) × g(x0) − f(x0) × g 0 (x0) g 2 (x0) . 5. Si de plus f est dérivable en g(x0), alors (f ◦ g) est dérivable en x0 et on a : (f ◦ g) 0 (x0) = f 0 (g(x0)) × g 0 (x0). Exemple 1.3.1 Calculer la dérivée de la fonction f (x) = log x 2 + 1 x ✐ ✐ “belhaj” — 2011/10/20 — 16:16 — page 8 — #14 ✐ ✐ ✐ ✐ ✐ ✐ 8 Chapitre 1. Les fonctions numériques d’une variable réelle 1.3.2 Règle de l’Hopital Soit f et g deux fonctions dérivables sur un voisinage de x0 avec f(x0) = g(x0) = 0 et g 0 (x0) 6= 0, alors lim x−→x0 f (x) g (x) = f 0 (x0) g 0 (x0) . Exemple 1.3.2 limx−→0 cos x−1 x = 0, pour f (x) = cos x − 1 et g (x) = x, on a f(0) = g(0) = 0 et g 0 (0) 6= 0. Donc, limx−→0 cos x−1 x = f 0 (0) g 0(0) = 0. • Dérivée d’une fonction réciproque Soit f :]a, b[⊆ R −→ R une fonction continue et strictement monotone, on note f −1 sa fonction réciproque. Théorème 1.3.2 Si f est dérivable en x0 ∈ ]a, b[ et si f 0 (x0) 6= 0 alors f −1 est dérivable en y0 = f(x0) et on a : f −1 0 (y0) = 1 f 0 (f −1 (y0)). Exemple 1.3.3 (e x ) 0 = 1 log0 (e x) = 1 1 ex = e x , ∀x ∈ R. 1.3.3 Propriétés des fonctions dérivables Lemme 1.3.1 Soit f une fonction définie sur un intervalle I ⊆ R. Si f admet un extrêmum local en x0 ∈ I et si f est dérivable en x0 alors f 0 (x0) = 0. Remarque 1.3.1 La réciproque est fausse (contre exemple f(x) = x 3 ). Théorème 1.3.3 (Rolle) Soit f : [a, b] −→ R (a 6= b) continue sur [a, b], dérivable sur ]a, b[. Si on a f(a) = f(b) alors ∃c ∈]a, b[ tel que f 0 (c) = 0. Corollaire 1.3.1 (Formule d’égalité des accroissements finis) Soit f : [a, b] −→ R, (a 6= b) continue sur [a, b], dérivable sur ]a, b[ alors ∃c ∈]a, b[ tel que : f(b) − f(a) b − a = f 0 (c). Théorème 1.3.4 (Formule d’inégalité des accroissements finis) Soit f : [a, b] −→ R (a 6= b) continue sur [a, b], dérivable sur ]a, b[ et s’il existe deux réels m et M tels que ∀x ∈ ]a, b[ , m ≤ f 0 (x) ≤ M alors m (b − a) ≤ f(b) − f(a) ≤ M (b − a). Remarque 1.3.2 ∀x ∈ ]a, b[ , |f 0 (x)| ≤ M alors |f(b) − f(a)| ≤ M (b − a) et plus généralement, ∀x, y ∈ [a, b] , |f (x) − f (y)| ≤ M |x − y| ✐ ✐ “belhaj” — 2011/10/20 — 16:16 — page 9 — #15 ✐ ✐ ✐ ✐ ✐ ✐ 1.4 Fonctions convexes 9 1.4 Fonctions convexes Définition 1.4.1 Une fonction f est convexe sur un intervalle I de R si ∀ (x, y) ∈ I 2 et λ ∈ [0, 1] ; f (λx + (1 − λ) y) ≤ λf (x) + (1 − λ) f (y). Remarque 1.4.1 La fonction f est concave si (−f) est convexe. Géométriquement : f convexe c’est-à-dire quelque soit A et B deux points de graphe de f, la droite (AB) est située au "dessus" de l’arc AB. Remarque 1.4.2 Si f est convexe définie sur I intervalle de R alors ∀ (x, y) ∈ I 2 , on a f  x + y 2  ≤ 1 2 [f (x) + f (y)] . Exemple 1.4.1 f (x) = |x| est convexe. En effet, soient x, y ∈ R, λ ∈ [0, 1] , f (λx + (1 − λ) y) = |λx + (1 − λ) y| ≤ |λx| + |(1 − λ) y| ≤ λf (x) + (1 − λ) f (y). D’où, f est convexe. Théorème 1.4.1 Si f est deux fois dérivable sur I alors f convexe sur I si et seulement si ∀ x ∈ I, f00 (x) ≥ 0. Exemple 1.4.2 f (x) = x 2 , f0 (x) = 2x, f00 (x) = 2 > 0. Alors, f est convexe. Exemple 1.4.3 f (x) = log x, f0 (x) = 1 x , f00 (x) = − 1 x2 < 0. Alors, (−f) est convexe. D’où, f est concave. 1.5 Formules de Taylor 1.5.1 Dérivée d’ordre n Soit une fonction f : I−→ R. On pose f (0) = f et on définit par récurrence la fonction dérivée n-ième de f sur I, notée f (n) , comme la dérivée de f (n−1) si elle existe. Exemple 1.5.1 f (x) = x n, f0 (x) = nxn−1 , f00 (x) = n (n − 1) x n−2 , . . . , f(n) (x) = n (n − 1)· · · 1 = n!. Exemple 1.5.2 f (x) = sin x, f0 (x) = cos x, f00 (x) = − sin x, . . . , f(n) (x) = sin x + n π 2  . Exemple 1.5.3 f (x) = cos x, f0 (x) = − sin x, f00 (x) = − cos x, . . . , f(n) (x) = cos x + n π 2  . Théorème 1.5.1 (Formule de Leibnitz) Soient f, g deux fonctions n fois dérivable sur I alors f × g est n fois dérivable sur I et on a : (f × g) n = Xn p=0 C p n f p g n−p . Remarque 1.5.1 On dit que f est de classe C n si et seulement si f (n) (x) est continue. On dit que f est de classe C∞ si elle est indéfiniment et continûment dérivabl ✐ ✐ “belhaj” — 2011/10/20 — 16:16 — page 10 — #16 ✐ ✐ ✐ ✐ ✐ ✐ 10 Chapitre 1. Les fonctions numériques d’une variable réelle 1.5.2 Formule de Taylor-Lagrange Théorème 1.5.2 Soit f une fonction de classe C n sur un intervalle [a, b] de R et telle que f (n+1) soit définie sur ]a, b[ , alors il existe c ∈ ]a, b[ tel que f (b) = f (a) + (b − a) f 0 (a) + · · · + (b − a) n n! f (n) (a) | {z } Partie régulière du développement de Taylor-Lagrange de f + (b − a) n+1 (n + 1)! f (n+1) (c) | {z } Reste de Lagrange . 1.5.3 Formule de Taylor-Young Théorème 1.5.3 Soit f une fonction de classe C n sur un intervalle I contenant x0, alors ∀x ∈ I, on a f (x) = f (x0) + (x − x0) f 0 (x0) + · · · + (x − x0) n n! f (n) (x0) + 0 ((x − x0) n ) | {z } Quantité négligeable . Corollaire 1.5.1 (Formule de Mac-Laurin) Dans le cas particulier où x0 = 0, on obtient la formule de Mac-Laurin suivante : f (x) = f (0) + xf0 (0) + · · · + x n n! f (n) (x0) + 0 (x n ). Exemple 1.5.4 ∀x ∈ R, e x = 1 + x + · · · + x n n! + o (x n) f (n) (0) = 1 . Exemple 1.5.5 ∀x ∈ R, sin x est de classe C∞ sur R et on a : f (n) (x) = sin  x + n π 2  alors f (2k) (0) = 0 et f (2k+1) (0) = (−1)k , k ∈ N. D’où, ∀x ∈ R, sin x = Xn k=0 (−1)k x 2k+1 (2k + 1)! + 0 x 2n+1 = x − x 3 3! + · · · + (−1)n x 2n+1 (2n + 1)! + 0 x 2n+1 . Exemple 1.5.6 ∀x ∈ R, cos x est de classe C∞ sur R et on a : f (n) (x) = cos  x + n π 2  alors f (2k) (0) = (−1)k et f (2k+1) (0) = 0, k ∈ N. D’où, ∀x ∈ R, cos x = Xn k=0 (−1)k x 2k (2k)! + 0 x 2n  = 1 − x 2 2! + · · · + (−1)n x 2n (2n)! + 0 x 2n ✐ ✐ “belhaj” — 2011/10/20 — 16:16 — page 11 — #17 ✐ ✐ ✐ ✐ ✐ ✐ 1.6 Différentielle et approximation 11 1.6 Différentielle et approximation Définition 1.6.1 (Approximation affine) Soit f de classe C 1 au voisinage V (x0). On définit l’approximation affine de f au voisinage V (x0) par f (x0 + h) ' f (x0) + hf0 (x0) avec h = x − x0 | {z } ≡∆x −→ 0. Définition 1.6.2 (Variation absolue) La variation absolue de f entre x0 et x0 + h est définie par ∆f = f (x0 + h) − f (x0) ' f 0 (x0) ∆x. Exemple 1.6.1 f (x) = log (1 + x), x0 = 4 et ∆x = 2. ∆f = f (6) − f (4) = log 7 − log 5 = log  7 5  | {z } 0.3364 ' 1 5 × 2 = 0.4. Définition 1.6.3 (Variation relative) La variation relative de f entre x0 et x0 + h est définie par ∆f f (x0) = f (x0 + h) − f (x0) f (x0) . (exprimée en pourcentage : sans unitée) Définition 1.6.4 (Notion du différentielle) Soit f dérivable au voisinage V (x0). On appelle différentielle de f au voisinage V (x0), la fonction linéaire dfx0 : R h −→ 7−→ R dfx0 (h) = f 0 (x0).h Exemple 1.6.2 f (x) = log x, x0 = 1. df1 (h) = f 0 (1).h = h. Exemple 1.6.3 f (x) = e x , x0 = 1. df1 (h) = f 0 (1).h = e.h. Définition 1.6.5 (Fonction moyenne) On appelle fonction moyenne d’une fonction positive d’une variable x, la fonction notée fM est définie par ∀x > 0, fM (x) = f (x) x . Exemple 1.6.4 On suppose qu’un marchand fixe pour le bien A, les prix suivant : 10e pour une quantité 18e pour deux quantités 25e pour trois quantités Quel est le prix moyen PM du bien A ? PM = 10e +18e +25e 1 + 2 + 3 = 53e 6 ' 8, 8333e . ✐ ✐ “belhaj” — 2011/10/20 — 16:16 — page 12 — #18 ✐ ✐ ✐ ✐ ✐ ✐ 12 Chapitre 1. Les fonctions numériques d’une variable réelle Exercice 1.6.1 La fonction de production d’une entreprise utilisant le travail "L" comme seul facteur de la production est donnée par f (x) = 1 2 √ x = production, notée p en économie. 1. Supposant qu’une entreprise utilise 900 unités pour produire 15 unités. Quelle sera l’augmentation de la production si l’entreprise décide d’utiliser une unité de travail supplémentaire. 2. On suppose que l’entreprise diminue l’effort du travail en passant de 900 à 891 unités. Donner une estimation de la variation de la production qui en résulte. Corrigé 1. On a ∆x = 1, x0 = 900. L’augmentation du produit est ∆f = f (901) − f (900) = 1 2 √ 901 − 1 2 √ 900 = 8.331 × 10−3 ' f 0 (900).∆x = 1 120 . 2. Une estimation de la variation de la production qui en résulte est une estimation de f (900) − f (891), pour ∆x = −9 est f 0 (900).∆x = 1 120 × (−9) = −0.075. Définition 1.6.6 (Notion d’élasticité) L’élasticité est un indicateur qui permet à un économiste ou gestionnaire d’évaluer l’effet d’une variation de ”x” (variable indépendant) sur une variable ”y” (dépendant) : y = f(x), variable endogène. Ainsi, l’élasticité de f par rapport à x au point x0 est donnée par ef/x (x0) = x0 f 0 (x0) f (x0) où f (x0) 6= 0. Exemple 1.6.5 f (x) = x 2 , x0 = 100 donc, ef/x (x0) = 100 × 2×100 1002 = 2. Remarque 1.6.1 L’élasticité ef/x donne une valeur approchée de la variation relative de f divisée par la variation relative de x : ef/x (x0) ' ∆f(x0) f(x0) ∆x x0 . En effet, f 0 (x0) ' f(x)−f(x0) x−x0 au voisinage V (x0) alors ef/x (x0) ' x0 ×  f (x) − f (x0) ∆x  × 1 f (x0) ' x0 ∆x × ∆f (x0) f (x0) . ✐ ✐ “belhaj” — 2011/10/20 — 16:16 — page 13 — #19 ✐ ✐ ✐ ✐ ✐ ✐ 1.7 Fonctions usuelles 13 Remarque 1.6.2 Si ef/x ' 0 alors la variation de x : ∆x à un effet négligeable sur la variation de f : ∆f. Si ef/x ' 1 alors la variation de x : ∆x à un effet sur la variation de f : ∆f qui lui est proportionnelle ou équivalente. Exemple 1.6.6 Pour une fonction de la forme f (x) = axα, on a f 0 (x) = aαxα−1 alors ef/x (x0) = x0 ×  aαxα−1 0 αxα 0  = α. Application 1.6.1 La loi de demande du coton pour 1914-1929 (d’après H. Schutz) est évaluée par la fonction : Q (p) = (0.11) 1 14 p − 1 14 . 1. Chercher l’élasticité. 2. On suppose que le prix du coton varie de p0 = 50 à p1 = 51. Trouver la variation de la demande, puis la calculer numériquement. Corrigé 1. efQ/p = − 1 14 . 2. La variation de la demande est donnée par : ∆Q = Q (p1) − Q (p0) Q (p0) | {z } 0.141% ' efQ/p × ∆p p0 = efQ/p ×  p1 − p0 p0  . Numériquement, ∆Q ' − 1 14 ×  51 − 50 50  = − 1 700 = 0.1428 %. 1.7 Fonctions usuelles 1.7.1 Fonctions logarithmes et exponentielles • Logarithme népérien La fonction x 7→ 1 x est continue sur ]0; +∞[, elle admet une unique primitive qui s’annule en 1, c’est la fonction x 7→ R x 1 dt t (voir Chapitre 5). Définition 1.7.1 L’unique primitive de la fonction x 7→ 1 x sur ]0; +∞[ qui s’annule en 1 est appelée logarithme népérien, elle est notée log ou ln . On a donc ∀x > 0, log (x) = R x 1 dt t . Cette fonction est donc dérivable sur I = ]0; +∞[ et log0 (x) = 1 x , elle est donc strictement croissante sur I. Soit y > 0, la fonction f : x 7→ log (xy) et dérivable sur I et f 0 (x) = y 1 xy = 1 x , on en déduit que f (x) = log (x) + c où c est une constante, on a log (y) = f (1) = log (1) + c = c, par conséquent on obtient : Propriété 1.7.1 (fondamentale du logarithme) ∀x, y > 0, log (xy) = log (x) + log (y). ✐ ✐ “belhaj” — 2011/10/20 — 16:16 — page 14 — #20 ✐ ✐ ✐ ✐ ✐ ✐ 14 Chapitre 1. Les fonctions numériques d’une variable réelle Conséquence 1.7.1 1. Si u est une fonction dérivable qui ne s’annule pas, alors [log (|u|)]0 = u 0 u . 2. ∀x, y ∈ R ∗ , log (|xy|) = log (|x|) + log (|y|). 3. ∀x, y ∈ R ∗ , log  x y  = log (|x|) − log (|y|). 4. ∀n ∈ Z ∗ , ∀x ∈ R ∗ , log (|x n|) = n log (|x|). Limites du logarithme népérien lim x→+∞ log (x) = +∞; lim x→0+ log (x) = −∞; lim x→+∞ log (x) x = 0; limx→1 log (x) x − 1 = 1. x 0 1 +∞ log0 (x) + +∞ % log (x) 0 % −∞ y 2 0 -2 -4 1 2 3 4 5 x Inégalité de convexité ∀x > 0, log (x) ≤ x − 1. • Logarithmes de base a Théorème 1.7.1 Soit f : ]0; +∞[ → R une application dérivable telle que ∀x, y > 0, f (xy) = f (x) + f (y), alors il existe une constante k telle que ∀x > 0, f (x) = k log (x). Lorsque k = 0 la fonction f est nulle, lorsque k 6= 0, il existe un unique réel a > 0 différent de 1 tel que log (a) = 1 k , ce qui donne f (x) = log(x) log(a) . Définition 1.7.2 Soit a ∈ R ∗ +\ {1} , on appelle logarithme de base a la fonction notée loga et définie sur ]0; +∞[ par loga (x) = log(x) log(a) . Remarque 1.7.1 1. ∀x, y ∈ R ∗ +, loga (xy) = loga (x) + loga (y). 2. loga (1) = 0 et loga (a) = 1. 3. On note e l’unique réel strictement positif tel que log (e) = 1, on a alors log = loge ≡ log . 4. La fonction loga est dérivable et ∀x > 0, log0 a (x) = 1 x log(a) . 5. log 1 a = − loga . ✐ ✐ “belhaj” — 2011/10/20 — 16:16 — page 15 — #21 ✐ ✐ ✐ ✐ ✐ ✐ 1.7 Fonctions usuelles 15 • La fonction exponentielle La fonction log est strictement croissante sur I = ]0; +∞[ , elle définit donc une bijection de I sur J = Im (log), comme elle est continue on a Im (log) =  lim 0 log; lim+∞ log = R. Définition 1.7.3 La réciproque est appelée fonction exponentielle et notée exp, elle est définie par : exp : R −→ x 7−→ ]0; +∞[ exp (x) = y tel que y > 0 et log (y) = x Propriété 1.7.2 1. La fonction exp est strictement croissante sur R et continue, de plus exp (0) = 1 et exp (1) = e. 2. La fonction log est dérivable sur ]0; +∞[ et sa dérivée ne s’annule pas, donc la fonction exp est dérivable sur R et exp0 (x) = 1 log0 (exp(x)) = exp (x). 3. Dans un repère orthonormé, la courbe de la fonction exp et celle de la fonction log sont symétriques par rapport à la première bissectrice. y 4 2 -2-4 2 4 x -2 -4 exp log Soit x, y ∈ R, notons X = exp (x) et Y = exp (y) alors X et Y sont dans ]0; +∞[ on peut donc écrire log (XY ) = log (X) + log (Y ) ce qui donne x + y = log (XY ), par conséquent exp (x + y) = XY = exp (x) exp (y), on peut donc énoncer : Propriété 1.7.3 (fondamentale de l’exponentielle) ∀x, y ∈ R, exp (x + y) = exp (x) exp (y). Il en découle en particulier que exp (−x) = 1 exp(x) . ✐ ✐ “belhaj” — 2011/10/20 — 16:16 — page 200 — #206 ✐ ✐ ✐ ✐ ✐ ✐ Skander Belhaj Mathématiques pour l’économie et la gestion Analyse et algèbre Constitué d’un cours complet et de 75 exercices corrigés, ce manuel présente l’ensemble du programme d’algèbre et d’analyse des filières Sciences de gestion, Sciences économiques et Informatique appliquée à la gestion. Il introduit de façon simple et pédagogique les techniques et les résultats des mathématiques de base que les étudiants en première année de Licence doivent maîtriser. -:HSMDLB=UUW\X\: ISBN 978-2-311-00273-7 WWW.VUIBERT.FR Mathématiques pour l’économie et la gestion LICENCE 1 – SCIENCES DE GESTION SCIENCES ÉCONOMIQUES – IAG Cours & exercices corrigés LICENCE 1 SCIENCES DE GESTION SCIENCES ÉCONOMIQUES INFORMATIQUE APPLIQUÉE À LA GESTION Skander Belhaj Directeur du département des méthodes quantitatives de la faculté des Sciences juridiques, économiques et de gestion de Jendouba (Tunisie), Skander Belhaj est docteur en mathématiques appliquées et spécialiste d’algèbre matricielle rapide. Chercheur à l’université de Tunis El Manar (ENIT-LAMSIN) et à l’université de Franche-Comté (Besançon), il enseigne actuellement à l’institut supérieur des arts du multimédia de la Manouba (Tunisie) et à l’université libre de Tunis. Sommaire I. Analyse 1. Fonctions d’une variable réelle 2. Développements limités 3. Fonctions réelles à deux variables 4. Optimisation et recherche d’extremums de deux variables 5. Intégration II. Algèbre 1. Polynômes et fractions rationnelles 2. Espaces vectoriels 3. Applications linéaires, matrices 4. Systèmes d’équations linéaires, déterminant 5. Diagonalisation d’une matrice carrée • Cours complet • Plus de 70 exercices • Tous les corrigés détaillés Mathématiques pour l’économie et la gestion Analyse et algèbre CV_EcoGestion:Mise en page 1 19/10/11 16:59 Page 1 Aspire 5810T/5810TZ/5410T/5810TG Series Service Guide PRINTED IN TAIWAN Service guide files and updates are available on the ACER/CSD web; for more information, please refer to http://csd.acer.com.tw II Revision History Please refer to the table below for the updates made on Aspire 5810T/5810TZ/5410T/5810TG Series service guide. Date Chapter Updates III Copyright Copyright © 2009 by Acer Incorporated. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written permission of Acer Incorporated. Disclaimer The information in this guide is subject to change without notice. Acer Incorporated makes no representations or warranties, either expressed or implied, with respect to the contents hereof and specifically disclaims any warranties of merchantability or fitness for any particular purpose. Any Acer Incorporated software described in this manual is sold or licensed "as is". Should the programs prove defective following their purchase, the buyer (and not Acer Incorporated, its distributor, or its dealer) assumes the entire cost of all necessary servicing, repair, and any incidental or consequential damages resulting from any defect in the software. Acer is a registered trademark of Acer Corporation. Intel is a registered trademark of Intel Corporation. Other brand and product names are trademarks and/or registered trademarks of their respective holders. IV Conventions The following conventions are used in this manual: SCREEN MESSAGES Denotes actual messages that appear on screen. NOTE Gives bits and pieces of additional information related to the current topic. WARNING Alerts you to any damage that might result from doing or not doing specific actions. CAUTION Gives precautionary measures to avoid possible hardware or software problems. IMPORTANT Reminds you to do specific actions relevant to the accomplishment of procedures. V Preface Before using this information and the product it supports, please read the following general information. 1. This Service Guide provides you with all technical information relating to the BASIC CONFIGURATION decided for Acer's "global" product offering. To better fit local market requirements and enhance product competitiveness, your regional office MAY have decided to extend the functionality of a machine (e.g. add-on card, modem, or extra memory capability). These LOCALIZED FEATURES will NOT be covered in this generic service guide. In such cases, please contact your regional offices or the responsible personnel/channel to provide you with further technical details. 2. Please note WHEN ORDERING FRU PARTS, that you should check the most up-to-date information available on your regional web or channel. If, for whatever reason, a part number change is made, it will not be noted in the printed Service Guide. For ACER-AUTHORIZED SERVICE PROVIDERS, your Acer office may have a DIFFERENT part number code to those given in the FRU list of this printed Service Guide. You MUST use the list provided by your regional Acer office to order FRU parts for repair and service of customer machines. VI VII Table of Contents System Specifications 1 Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 Aspire 5810T/5810TZ/5410T System Block Diagram . . . . . . . . . . . . . . . . . . . . . . . . .3 Aspire 5810TG System Block Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 Your Acer Notebook tour . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5 Right View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8 Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11 Easy-Launch Buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 Touchpad basics (with two-click buttons) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11 Using the Keyboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13 Lock Keys and Numeric Keypad . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13 Windows Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14 Hot Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15 Special Key (only for certain models) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15 Windows Mobility Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 Using the System Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17 Acer GridVista (dual-display compatible) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17 Hardware Specifications and Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19 System Utilities 25 BIOS Setup Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25 Navigating the BIOS Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26 Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27 Main . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30 Boot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33 Exit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34 BIOS Flash Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35 Remove HDD and BIOS Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36 Machine Disassembly and Replacement 39 Disassembly Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .39 General Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40 Pre-disassembly Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40 Disassembly Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40 External Module Disassembly Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41 External Modules Disassembly Flowchart . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41 Removing the Battery Pack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42 Removing the Lower Cover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43 Removing the Optical Drive Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44 Removing the DIMM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .45 Removing the Hard Disk Drive Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .46 Removing the SSD Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48 Removing the RTC Battery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48 Main Unit Disassembly Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9 Main Unit Disassembly Flowchart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9 Removing the Keyboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50 Removing the WLAN Board Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51 Separating the Upper Case from the Lower Case . . . . . . . . . . . . . . . . . . . . . . .52 Removing the Power Button Board . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55 Removing the Touchpad Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56 Removing the Speaker Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57 Removing the System Board . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58 Removing the LCD Module 61 VIII Table of Contents Removing the Thermal Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62 Removing the Mini Board Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64 Removing the CRT Board Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65 Removing the Bluetooth Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .66 Removing the Card Reader Board . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67 LCD Module Disassembly Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69 LCD Module Disassembly Flowchart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69 Removing the LCD Bezel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70 Removing the LCD Panel Hinges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71 Removing the LCD Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73 Removing the Webcam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75 Troubleshooting 77 System Check Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78 External Diskette Drive Check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78 External Optical Disk Drive Check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78 Keyboard or Auxiliary Input Device Check . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78 Memory check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .79 Power System Check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .79 Touchpad Check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80 Power-On Self-Test (POST) Error Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .81 Post Code Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .82 Index of Symptom-to-FRU Errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .85 Intermittent Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .89 Undetermined Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90 Connector Locations 91 Top and Bottom Views. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Aspire 5810T/5810TZ/5410T Top View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Aspire 5810T/5810TZ/5410T Bottom View . . . . . . . . . . . . . . . . . . . . . . . . . . . . .92 Aspire 5810TG Top View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93 Aspire 5810TG Bottom View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 Clearing Password Check and BIOS Recovery . . . . . . . . . . . . . . . . . . . . . . . . .95 BIOS Recovery by Crisis Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .96 FRU (Field Replaceable Unit) List 99 Aspire 5810T/5810TZ/5410T Series Exploded Diagram . . . . . . . . . . . . . . . . . . . . .100 Aspire 5810TG Series Exploded Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .101 Model Definition and Configuration 117 Aspire 5810T/5810TZ/5410T/5810TG Series . . . . . . . . . . . . . . . . . . . . . . . . . . . .118 Test Compatible Components 129 Microsoft® Windows® Vista Environment Test . . . . . . . . . . . . . . . . . . . . . . . . . . . .130 Online Support Information 133 Index 135 Chapter 1 1 Features Below is a brief summary of the computer’s many feature: Platform • Intel® Centrino® 2 mobile processor technology, featuring: • Intel® Core™2 Duo processor* • Intel® Core™2 Solo processor* • Mobile Intel® GS45 Express Chipset • Intel® Wireless WiFi Link 5100* • Intel® Wireless WiFi Link 5150* • Intel® Pentium® mobile processor* • Intel® Celeron® mobile processor* • Mobile Intel® GS45 Express Chipset • Acer InviLink™ Nplify™ 802.11b/g/Draft-N* System Memory • Dual-Channel SDRAM support • Up to 2 GB of DDR3 1066 MHz memory, upgradeable to 4 GB using two soDIMM modules* • Up to 4 GB of DDR3 1066 MHz memory, upgradeable to 8 GB using two soDIMM modules* Display and graphics • 16:9 aspect ratio • 15.6" HD 1366 x 768 • Screen resolution support : 800*600 1024*768 1280*720 1280*768 1366*768 Storage subsystem • 2.5" hard disk drive / solid state drive • DVD-Super Multi double-layer drive • 5-in-1 card reader Special keys and controls • 103-/104-/107-key keyboard • Touchpad pointing device System Specifications Chapter 1 2 Chapter 1 Audio • High-definition audio support • S/PDIF (Sony/Philips Digital Interface) support for digital speakers • MS-Sound compatible • Built-in microphone Communication • Integrated Acer Crystal Eye webcam • Wi-Fi/WiMAX: Intel® Wireless WiFi Link 5150* • WWAN: • UMTS/HSPA at 900 MHz/2100 MHz and quad-band GSM/GPRS/EDGE (850/900/1800/1900 MHz)* • UMTS/HSPA at 850 MHz/900 MHz/1900 MHz/2100 MHz and quad-band GSM/GPRS/EDGE (850/900/1800/1900 MHz)* • WLAN: • Intel® Wireless WiFi Link 5100* • Acer InviLink™ Nplify™ 802.11b/g/Draft-N* • WPAN: Bluetooth® 2.0+Enhanced Data Rate (EDR)* • LAN: Gigabit Ethernet; Wake-on-LAN ready I/O Ports • 5-in-1 card reader (SD/MMC/MS/MS PRO/xD) • USB 2.0 port • HDMI™ port with HDCP support • External display (VGA) port • Headphones/speaker/line-out jack with S/PDIF support • Microphone-in jack • Ethernet (RJ-45) port • DC-in jack for AC adapter Environment • Temperature: • Operating: 5 °C to 35 °C • Non-operating: -20 °C to 65 °C • Humidity (non-condensing): • Operating: 20% to 80% • Non-operating: 20% to 80% Dimension and weight • Dimension: 377 x 261.15 x 31.5mm • Weight: For 5810T/5810TZ/5410T Series: 2.395 kg For 5810TG Series: 2.407 kg NOTE: * Only for certain models. NOTE: The specifications listed above are for reference only. The exact configuration of your PC depends on the model purchased. Chapter 1 3 Aspire 5810T/5810TZ/5410T System Block Diagram 4 Chapter 1 Aspire 5810TG System Block Diagram Chapter 1 5 Your Acer Notebook tour After knowing your computer features, let us show you around your new computer. Top View # Icon Item Description 1 Acer Crystal Eye webcam Web camera for video communication. 2 Microphone Internal microphone for sound recording. 3 Display screen Also called Liquid-Crystal Display (LCD), displays computer output (Configuration may vary by models). 4 Power button / indicator Turns the computer on and off. / Indicates the computer's power status. 5 Keyboard For entering data into your computer. 6 Touchpad Touch-sensitive pointing device which functions like a computer mouse. 7 Click buttons (left and right) The left and right buttons function like the left and right mouse buttons. 8 Palmrest Comfortable support area for your hands when you use the computer. 9 Touchpad toggle Turns the internal touchpad on and off. 10 Communication key Enables / disables the WLAN / 3G functions. Backup key Launches Acer Backup Management for three-step data backup. Acer PowerSmart key Puts your computer into power-saving mode. HDD Indicates when the hard disk drive is active. 11 Eject button Presses to eject the optical disk from the drive. 12 Speakers Left and right speakers deliver stereo audio output. 6 Chapter 1 Closed Front View # Icon Item Description 1 Battery Indicates the computer's battery status. 1. Charging: The light shows amber when the battery is charging. 2. Fully charged: The light shows blue when in AC mode. 2 5-in-1 card reader Accepts Secure Digital (SD), MultiMediaCard (MMC), Memory Stick (MS), Memory Stick PRO (MS PRO), xD-Picture Card (xD). Note: Push to remove/install the card. Only one card can operate at any given time. Chapter 1 7 Left View # Icon Item Description 1 Kensington lock slot Connects to a Kensington-compatible computer security lock. Note: Wrap the computer security lock cable around an immovable object such as a table or handle of a locked drawer. Insert the lock into the notch and turn the key to secure the lock. Some keyless models are also available. 2 USB 2.0 port Connect to USB 2.0 devices (e.g., USB mouse, USB camera). 3 Ventilation slots Enable the computer to stay cool, even after prolonged use. 4 External display (VGA) port Connects to a display device (e.g., external monitor, LCD projector). 5 HDMI HDMI port Supports high definition digital video connections. 6 USB 2.0 port Connect to USB 2.0 devices (e.g., USB mouse, USB camera). 7 Microphone-in jack Accepts inputs from external microphones. Headphones/ speaker/line-out jack with S/PDIF support Connects to audio line-out devices (e.g., speakers, headphones). 8 Chapter 1 Right View # Icon Item Description 1 Optical drive Internal optical drive; accepts CDs or DVDs. 2 Optical disk access indicator Lights up when the optical drive is active. 3 Emergency eject hole Ejects the optical drive tray when the computer is turned off. Note: Insert a paper clip to the emergency eject hole to eject the optical drive tray when the computer is off. 4 USB 2.0 port Connects to USB 2.0 devices (e.g., USB mouse, USB camera). 5 Ethernet (RJ-45) port Connects to an Ethernet 10/100/1000-based network. 6 DC-in jack Connects to an AC adapter. Chapter 1 9 Rear View # Icon Item Description 1 Battery bay Houses the computer's battery pack. 10 Chapter 1 Bottom View Icon Item Description 1 Battery bay Houses the computer's battery pack. 2 Battery lock Locks the battery in position. 3 Memory compartment Houses the computer's main memory. 4 Hard disk bay Houses the computer's hard disk (secured with screws). 5 Ventilation slots and cooling fan Enable the computer to stay cool, even after prolonged use. Note: Do not cover or obstruct the opening of the fan. 6 Battery release latch Releases the battery for removal. Chapter 1 11 Indicators The computer has several easy-to-read status indicators. The front panel indicators are visible even when the computer cover is closed. Easy-Launch Buttons Located above the keyboard are application buttons. These buttons are called easy-launch buttons. They are: Backup and Acer PowerSmart indicators/buttons. Touchpad basics (with two-click buttons) The following items show you how to use the touchpad with two-click buttons. • Move your finger across the touchpad (1) to move the cursor. • Press the left (2) and right (3) buttons located beneath the touchpad to perform selection and execution functions. These two buttons are similar to the left and right buttons on a mouse. Tapping on the touchpad is the same as clicking the left button. Icon Function Description WLAN/3G (Manufacturing option) Indicates the status of WLAN/3Gcommunication. Backup key Launches Acer Backup Management for threestep data backup. Acer PowerSmart key Puts your computer into power-saving mode. HDD Indicates when the hard disk drive is active. Power button / indicator Turns the computer on and off. / Indicates the computer's power status. Battery Indicates the computer's battery status. 1. Charging: The light shows amber when the battery is charging. 2. Fully charged: The light shows blue when in AC mode. Icon Function Description Backup key Launches Acer Backup Management for three-step data backup. Acer PowerSmart key Puts your computer into power-saving mode. 1 2 3 12 Chapter 1 NOTE: Illustrations for reference only. The exact configuration of your PC depends on the model purchased. NOTE: When using the touchpad, keep it — and your fingers — dry and clean. The touchpad is sensitive to finger movement; hence, the lighter the touch, the better the response. Tapping harder will not increase the touchpad's responsiveness. NOTE: By default, vertical and horizontal scrolling is enabled on your touchpad. It can be disabled under Mouse settings in Windows Control Panel. Function Left button (2) Right button (3) Main touchpad (1) Execute Quickly click twice. Tap twice (at the same speed as double-clicking a mouse button). Select Click once. Tap once. Drag Click and hold, then use finger on the touchpad to drag the cursor. Tap twice (at the same speed as double-clicking a mouse button); rest your finger on the touchpad on the second tap and drag the cursor. Access context menu Click once. Chapter 1 13 Using the Keyboard The keyboard has full-sized keys and an embedded numeric keypad, separate cursor, lock, Windows, function and special keys. Lock Keys and Numeric Keypad The keyboard has three lock keys which you can toggle on and off. The keyboard has a numeric keypad with cursor-control keys. Lock key Description Caps Lock When Caps Lock is on, all alphabetic characters typed are in uppercase. Num Lock When Num Lock is on, the numeric keypad is in numeric mode. The keys function as a calculator (complete with the arithmetic operators +, -, *, and /). Use this mode when you need to do a lot of numeric data entry. A better solution would be to connect an external keypad. Scroll Lock + When Scroll Lock is on, the screen moves one line up or down when you press the up or down arrow keys respectively. Scroll Lock does not work with some applications. Desired access Num Lock on Num Lock off Number keys on embedded keypad Type numbers in a normal manner. Cursor-control keys on embedded keypad Hold while using cursorcontrol keys. Hold while using cursorcontrol keys. Main keyboard keys Hold while typing letters on embedded keypad. Type the letters in a normal manner. 14 Chapter 1 Windows Keys The keyboard has two keys that perform Windows-specific functions. Key Description Windows key Pressed alone, this key has the same effect as clicking on the Windows Start button; it launches the Start menu. It can also be used with other keys to provide a variety of functions: < >: Open or close the Start menu < > + : Display the desktop < > + : Open Windows Explore < > + : Search for a file or folder < > + : Cycle through Sidebar gadgets < > + : Lock your computer (if you are connected to a network domain), or switch users (if you're not connected to a network domain) < > + : Minimizes all windows < > + : Open the Run dialog box < > + : Cycle through programs on the taskbar < > + : Open Ease of Access Center < > + : Open Windows Mobility Center < > + : Display the System Properties dialog box < > + : Restore minimized windows to the desktop < > + : Cycle through programs on the taskbar by using Windows Flip 3-D < > + : Bring all gadgets to the front and select Windows Sidebar + < > + : Search for computers (if you are on a network) + < > + : Use the arrow keys to cycle through programs on the taskbar by using Windows Flip 3-D Note: Depending on your edition of Windows Vista, some shortcuts may not function as described. Application key This key has the same effect as clicking the right mouse button; it opens the application's context menu. Chapter 1 15 Hot Keys The computer employs hotkeys or key combinations to access most of the computer’s controls like screen brightness, volume output and the BIOS utility. To activate hot keys, press and hold the key before pressing the other key in the hotkey combination. Special Key (only for certain models) You can locate the Euro symbol and the US dollar sign at the upper-center and/or bottom-right of your keyboard. The Euro symbol 1. Open a text editor or word processor. 2. Either press < > at the bottom-right of the keyboard, or hold and then press the <5> key at the upper-center of the keyboard. NOTE: Some fonts and software do not support the Euro symbol. Please refer to www.microsoft.com/ typography/faq/faq12.htm for more information. The US dollar sign 1. Open a text editor or word processor. 2. Either press < > at the bottom-right of the keyboard, or hold and then press the <4> key at the upper-center of the keyboard. NOTE: This function varies according to the language settings. Hotkey Icon Function Description + System property Starts System Property for displaying system information. + Bluetooth Enables/disables the Bluetooth function. (only for certain models) + Sleep Puts the computer in Sleep mode. + Display toggle Switches display output between the display screen, external monitor (if connected) and both. + Screen blank Turns the display screen backlight off to save power. Press any key to return. + Speaker toggle Turns the speakers on and off. + < > Brightness up Increases the screen brightness. + < > Brightness down Decreases the screen brightness. + < > Volume up Increases the sound volume. + < > Volume down Decreases the sound volume. 16 Chapter 1 Windows Mobility Center The Windows Mobility Center collects key mobile-related system settings in one easy-to-find place, so you can quickly configure your Acer system to fit the situation as you change locations, networks or activities. Settings include display brightness, volume, power plan, wireless networking on/off, external display settings, synchronization status and presentation settings. Windows Mobility Center also includes Acer-specific settings like sharing folders overview/sharing service on or off, Bluetooth Add Device (if applicable), and a shortcut to the Acer user guide, drivers and utilities. To launch Windows Mobility Center: q Use the shortcut key < > + . q Start Windows Mobility Center from the Control panel. q Start Windows Mobility Center from the Accessories program group in the Start menu. q Launch Windows Mobility Center by right-clicking in the system tray and select Windows Mobility Center. Chapter 1 17 Using the System Utilities Acer GridVista (dual-display compatible) NOTE: This feature is only available on certain models. To enable the dual monitor feature of the notebook, first ensure that the second monitor is connected, then select Start, Control Panel, Display and click on Settings. Select the secondary monitor (2) icon in the display box and then click the check box Extend my windows desktop onto this monitor. Finally, click Apply to confirm the new settings and click OK to complete the process. Acer GridVista is a handy utility that offers four pre-defined display settings so you can view multiple windows on the same screen. To access this function, please go to Start>All Programs and click on Acer GridVista. You may choose any one of the four display settings indicated below: Double (vertical), Triple (primary at left), Triple (primary at right), or Quad Acer Gridvista is dual-display compatible, allowing two displays to be partitioned independently. Acer Gridvista is dual-display compatible, allowing two displays to be partitioned independently. AcerGridVista is simple to set up: 1. Run Acer GridVista and select your preferred screen configuration for each display from the task bar. 2. Drag and drop each window into the appropriate grid. 3. Enjoy the convenience of a well-organized desktop. Note: Start Control Panel Display Settings (2) Extend my windows desktop onto this monitor Apply OK Start All Programs Acer GridVista 18 Chapter 1 NOTE: Please ensure that the resolution setting of the second monitor is set to the manufacturer's recommended value. Chapter 1 19 Hardware Specifications and Configurations Processor Throttling 50%: On= 99 C; OFF=93 C OS shut down at 105 C; H/W shot down at 110 .C Item Specification CPU type Aspire 5810T/5810TZ/5410T (UMA): Intel® Core™2 Duo Mobile SU9300 (1.20G) Intel® Core™2 Solo SU3500 (1.4G); Intel® Core™2 Duo SU9400 (1.4G) Aspire 5810TG (DIS): Intel Core2 Solo SU3500 1.4G; Intel® Core™2 Duo SU9400 (1.4G) Core logic Mobile Intel® GS45 Express Chipset CPU package Micro-FCBGA ( SU9300 and SU9400) and BGA (SU3500) CPU core voltage 0.775 - 1.1 V CPU Fan True Value Table DTS(degree C) Fan Speed (rpm) Acoustic Level (dBA) 45-50 0-3000 29 55-66 0-3300 33 68-74 3300-3800 38 78-83 3800-4100 40 86-91 4100-4800 40 BIOS Item Specification BIOS vendor Insyde H2O BIOS Version 1.06 System Memory Item Specification Memory controller Built-in Memory size 0MB (no on-board memory) DIMM socket number 2 sockets Supports memory size per socket 2048MB Supports maximum memory size 4G for 64bit OS (with two 2GB SODIMM) Supports DIMM type DDR 3 Synchronous DRAM Supports DIMM Speed 800/1066 MHz Supports DIMM voltage 1.5V Supports DIMM package 204-pin soDIMM Memory module combinations You can install memory modules in any combinations as long as they match the above specifications.     20 Chapter 1 NOTE: Above table lists some system memory configurations. You may combine DIMMs with various capacities to form other combinations. On above table, the configuration of slot 1 and slot 2 could be reversed. Memory Combinations Slot 1 Slot 2 Total Memory 0MB 1024MB 1024MB 0MB 2048MB 2048MB 1024MB 0MB 1024MB 1024MB 1024MB 2048MB 1024MB 2048MB 3072MB 2048MB 0MB 2048MB 2048MB 1024MB 3072MB 2048MB 2048MB 4096MB Item Specification LAN Chipset Atheros AR8131L Supports LAN protocol 10/100/1000 Mbps LAN connector type RJ45 LAN connector location Right side Features Integrated 10/100 BASE-T transceiver Wake on LAN support compliant with ACPI 2.0 PCI v2.2 Bluetooth Interface Item Specification Chipset Broadcom BCM2046 Data throughput 3 Mbps (full speed data rate) Protocol Bluetooth 2.1 Interface USB 2.0 Connector type USB Wireless Module Item Specification Chipset WLAN 802.11ABGN SHIRLEYPEAK1*2 WLAN 802.11ABG SHIRLEYPEAK1*2 WLAN 802.11BGN ATHEROS XB91 MC Data throughput Up to 270 Mbps for Draft-N Protocol IEEE 802.11n/a/b/g Interface PCI bus (mini PCI socket for wireless module) Chapter 1 21 Hard Disk Drive Interface Item Vendor & Model Name HGST HTS543216L9A300 SEAGATE SATA ST9160310AS F/ TOSHIBA MK1655GSX WD WD1600BEVT22ZCT0 HGST HTS545025B9A300 SEAGATE ST9250315AS TOSHIBA MK2555GSX WD WD2500BEVT22ZCT0 HGST HTS545032B9A300 SEAGATE ST9320320A TOSHIBA MK3255GSX WD WD3200BEVT22ZCT0 HGST HTS545050B9A300 SEAGATE ST9500325AS TOSHIBA MK5055GS WD5000BEVT22ZAT0 Capacity (MB) 160000 250000 320000 500000 Bytes per sector 512 512 512 512 Data heads 3/4 2 3 4 Drive Format Disks 2 2 2 2 Spindle speed (RPM) 5400 RPM 5400 RPM 5400 RPM 5400 RPM Performance Specifications Buffer size 8MB 8MB 8MB 8MB Interface SATA SATA SATA SATA Max. media transfer rate (disk-buffer, Mbytes/s) 540 875 (Max. 3.0 Gbit/s Buffer-host data transfer) 875 (Max. 3.0 Gbit/s Buffer-host data transfer) 875 (Max. 3.0 Gbit/s Buffer-host data transfer) DC Power Requirements Voltage tolerance 5V(DC) +/- 5% 5V(DC) +/- 5% 5V(DC) +/- 5% 5V(DC) +/- 5% Optical Disc Drive Item Specification Vendor & model name TOSHIBA Super-Multi DRIVE DL 8X TS-U633A LF PANASONIC Super-Multi DRIVE DL 8X UJ862 LF HLDS Super-Multi DRIVE DL 8X GU10N LF Performance Specification With CD Diskette With DVD Diskette Transfer rate (KB/sec) Sustained: Max 3.6Mbytes/sec Sustained: Max 10.08Mbytes/sec Buffer Memory 2MB Interface SATA 22 Chapter 1 Applicable disc format Applicable disc format CD: CD-DA, CD-ROM, CD-ROM XA, Photo CD (multi-session), Video CD, Cd-Extra (CD+), CD-text DVD: DVD-VIDEO, DVD-ROM, DVD-R (3.9GB, 4.7GB) DVD-R DL, DVD-RW, DVD-RAM, DVD+R, DVD+R DL, DVD+RW CD: CD-DA (Red Book) - Standard Audio CD & CD-TEXT CD-ROM (Yellow Book Mode1 & 2) - Standard Data CD-ROM XA (Mode2 Form1 & 2) - Photo CD, Multi-Session CD-I (Green Book, Mode2 Form1 & 2, Ready, Bridge) CD-Extra/ CD-Plus (Blue Book) - Audio & Text/Video Video-CD (White Book) - MPEG1 Video CD-R (Orange Book Part) CD-RW & HSRW (Orange Book Part Volume1 & Volume 2 Super Audio CD (SACD) Hybrid type US & US+ RW DVD: DVD-ROM (Book 1.02), DVD-Dual DVD-Video (Book 1.1) DVD-R (Book 1.0, 3.9G) DVD-R (Book 2.0, 4.7G) - General & Authoring DVD+R (Version 1.0) DVD+RW DVD-RW (Non CPRM & CPRM) DVD°”R Dual Loading mechanism Load: Manual Release: (a) Electrical Release (Release Button) (b) Release by ATAPI command (c) Emergency Release Power Requirement Input Voltage 5 V +/- 5% (Operating) Audio Interface Item Specification Audio Controller Realtek Audio Codec ALC269X Audio onboard or optional Built-in Mono or Stereo Stereo Resolution 18 bit stereo full duplex Compatibility HD audio Interface; S/PDIF output for PCM or AC-3 content Sampling rate 1Hz resolution VSR (Variable Sampling Rate) Internal microphone Yes Internal speaker / Quantity Yes/2 (1.5W speakers) Optical Disc Drive Item Specification Chapter 1 23 USB Video Memory Item Specification Chipset Intel CS GS45NB (Aspire 5810T/5810TZ/5410T) /AMD M92LP (Aspire 5810TG) Memory size 512M DDR3 (Aspire 5810TG) Item Specification Chipset ICH9M USB Compliancy Level 2.0 OHCI USB 1.1 and USB 2.0 Host controller Number of USB port 4 Location One on the right side/three on the left Serial port function control Enable/Disable by BIOS Setup System Board Major Chips Item Controller Core logic NB Chipset Intel CS GS45NB + SB Chipset Intel CS AM82801IUX VGA AMD M92LP (Aspire 5810TG) /UMA (Aspire 5810T/5810TZ/5410T) USB 2.0 Intel ICH9M Super I/O controller N/A MODEM N/A Bluetooth BCM2046 Wireless 802.11 b+g WLAN 802.11ABGN SHIRLEYPEAK1*2 PCMCIA/ 5 in 1 Card Reader Audio Codec Realtek Audio Codec ALC269X Keyboard Item Specification Keyboard controller Winbond WP CE 773LA Total number of keypads 103-/104-/107-key Windows logo key Yes Internal & external keyboard work simultaneously Plug USB keyboard to the USB port directly: Yes Battery Item Specification Vendor Panasonic/Sanyo/Sony/Simplo Battery Type Li-ion Pack capacity 6-Cell 5600mAh Number of battery cell 6 Package configuration 3 cells in series, 2 series in parallel 24 Chapter 1 LCD 15.6” inch Item Specification Vendor & model name AUO ( B156XW03 V1 LF) LP (LP156WH3-TLA1 LF) Screen Diagonal (mm) 15.6 inches Display resolution (pixels) 1366 x 768 WXGA Glare Pixel Pitch 0.204 x 0.204 Pixel Arrangement R.G.B. Vertical Stripe Display Mode Normally White Typical White Luminance (NIT) also called Brightness 220 Luminance Uniformity 1.25 max. Contrast Ratio 500 typical Response Time msec 8 Nominal Input Voltage VDD +3.3V Viewing Angle (degree) Horizontal: Right/Left Vertical: Upper/Lower 45/45 15/35 Temperature Range( C) Operating Storage (shipping) 0 to +50 -40 to +60 AC Adaptor Item Specification Input 100-240V~ 1.5A, 50-60Hz/ Output 19V 65W System Power Management ACPI mode Power Management Mech. Off (G3) All devices in the system are turned off completely. Soft Off (G2/S5) OS initiated shutdown. All devices in the system are turned off completely. Working (G0/S0) Individual devices such as the CPU and hard disc may be power managed in this state. Suspend to RAM (S3) CPU set power down VGA Suspend PCMCIA Suspend Audio Power Down Hard Disk Power Down CD-ROM Power Down Super I/O Low Power mode Save to Disk (S4) Also called Hibernation Mode. System saves all system states and data onto the disc prior to power off the whole system.  Chapter 2 25 BIOS Setup Utility The BIOS Setup Utility is a hardware configuration program built into your computer’s BIOS (Basic Input/ Output System). Your computer is already properly configured and optimized, and you do not need to run this utility. However, if you encounter configuration problems, you may need to run Setup. Please also refer to Chapter 4 Troubleshooting when problem arises. To activate the BIOS Utility, press F2 during POST (when “Press to enter Setup” message is prompted on the bottom of screen). Press F2 to enter setup. The default parameter of F12 Boot Menu is set to “disabled”. If you want to change boot device without entering BIOS Setup Utility, please set the parameter to “enabled”. Press during POST to enter multi-boot menu. In this menu, user can change boot device without entering BIOS SETUP Utility. System Utilities Chapter 2 26 Chapter 2 Navigating the BIOS Utility There are six menu options: Information, Main, Security, Boot, and Exit. Follow these instructions: • To choose a menu, use the left and right arrow keys. • To choose an item, use the up and down arrow keys. • To change the value of a parameter, press F5 or F6. • A plus sign (+) indicates the item has sub-items. Press Enter to expand this item. • Press Esc while you are in any of the menu options to go to the Exit menu. • In any menu, you can load default settings by pressing F9. You can also press F10 to save any changes made and exit the BIOS Setup Utility. NOTE: You can change the value of a parameter if it is enclosed in square brackets. Navigation keys for a particular menu are shown on the bottom of the screen. Help for parameters are found in the Item Specific Help part of the screen. Read this carefully when making changes to parameter values. Please note that system information is subject to different models. Chapter 2 27 Information The Information screen displays a summary of your computer hardware information. NOTE: The system information is subject to different models. Parameter Description CPU Type This field shows the CPU type and speed of the system. CPU Speed This field shows the speed of the CPU. IDE0 Model Name This field shows the model name of HDD installed on primary IDE master. The hard disk model name is automatically detected by the system. If there is no hard disk present or unknown type, None should be shown on this field. IDE0 Serial Number This field displays the serial number of HDD installed on primary IDE master. If no Hard disk or other devices are installed on Primary IDE master, then it will display a blank line. ATAPI Model Name This field shows the model name of the Optical device installed in the system. System BIOS Version Displays system BIOS version. VGA BIOS Version This field displays the VGA firmware version of the system. KBC Ver This field shows the keyboard Serial Number This field displays the serial number of this unit. Asset Tag Number This field displays the asset tag number of the system. Product Name This field shows product name of the system. Manufacturer Name This field displays the manufacturer of this system. UUID Number Universally Unique Identifier (UUID) is an identifier standard used in software construction, standardized by the Open Software Foundation (OSF) as part of the Distributed Computing Environment (DCE). This will be visible only when there is an internal LAN device present. 28 Chapter 2 Main The Main screen allows the user to set the system time and date as well as enable and disable boot option and recovery. NOTE: The screen above is for your reference only. Actual values may differ. The table below describes the parameters in this screen. Settings in boldface are the default and suggested parameter settings. Parameter Description Format/Option System Time Sets the system time. The hours are displayed with 24-hour format. Format: HH:MM:SS (hour:minute:second) System Time System Date Sets the system date. Format MM/DD/YYYY (month/day/ year) System Date System Memory This field reports the memory size of the system. Memory size is fixed to 640MB Extended Memory This field reports the memory size of the extended memory in the system. Extended Memory size=Total memory size-1MB Video Memory Shows the video memory size. Quiet Boot Determines if Customer Logo will be displayed or not; shows Summary Screen is disabled or enabled. Enabled: Customer Logo is displayed, and Summary Screen is disabled. Disabled: Customer Logo is not displayed, and Summary Screen is enabled. Option: Enabled or Disabled Network Boot Enables, disables the system boot from LAN (remote server). Option: Enabled or Disabled F12 Boot Menu Enables, disables Boot Menu during POST. Option: Disabled or Enabled Ite m Spe c ific He lp This is the help for the hour field. Va lid range is from 0 to 23. REDUCE /INCREASE : F5/F6. S y s t e m Tim e : S y s t e m M e m o r y : Extended Memory: Video Memory: S y s t e m D a t e : Quiet Boot Network Boot F1 2 Boot Me nu D 2 D R e c o v e r y SATA Mode [ ] [ ] :53:38 04/07/2009 640 KB 2046 MB 256 MB 1 4 [Enabled] [Enabled] [Enabled] [Enabled] [AHCI Mode] InsydeH20 Setup Utility Information Security Main Boot Exit R e v. 3.5 F 1 Esc Help Exit Select Item Se le c t Me nu Change Va lues Select►Sub-Menu F5/F6 Enter F 9 F10 Setup Default Sa v e and Ex it Chapter 2 29 NOTE: The sub-items under each device will not be shown if the device control is set to disable or auto. This is because the user is not allowed to control the settings in these cases. D2D Recovery Enables, disables D2D Recovery function. The function allows the user to create a hidden partition on hard disc drive to store operation system and restore the system to factory defaults. Option: Enabled or Disabled SATA Mode Control the mode in which the SATA controller should operate. Option: AHCI or IDE Parameter Description Format/Option 30 Chapter 2 Security The Security screen contains parameters that help safeguard and protect your computer from unauthorized use. NOTE: Please refer to “Remove HDD/BIOS Password” section if you need to know how to remove HDD/BIOS Password. The table below describes the parameters in this screen. Settings in boldface are the default and suggested parameter settings. Parameter Description Option Supervisor Password Is Shows the setting of the Supervisor password Clear or Set User Password Is Shows the setting of the user password. Clear or Set HDD Password Is Shows the setting of the hard disk password. Clear or Set Set Supervisor Password Press Enter to set the supervisor password. When set, this password protects the BIOS Setup Utility from unauthorized access. The user can not either enter the Setup menu nor change the value of parameters. Set User Password Press Enter to set the user password. When user password is set, this password protects the BIOS Setup Utility from unauthorized access. The user can enter Setup menu only and does not have right to change the value of parameters. Set HDD Password Enter HDD Password. Password on Boot Defines whether a password is required or not while the events defined in this group happened. The following sub-options are all requires the Supervisor password for changes and should be grayed out if the user password was used to enter setup. Disabled or Enabled Ite m Spe c ific He lp Ins ta ll or Cha nge the passeord and the length of pa s s wor d mus t be greater than one word. Supervisor Password Is User Password Is H D D P a s s w o r d Se t Us e r Pa s s wor d Powe r on pa s s wor d Set Supervisor Password Se t Hdd Pa s s wor d Clear Clear Clear [Disabled] InsydeH20 Setup Utility Information Main Security Boot Exit R e v. 3.5 F 1 Esc Help Exit Select Item Se le c t Me nu Change Va lues Select►Sub-Menu F5/F6 Enter F 9 F10 Setup Default Sa v e and Ex it Chapter 2 31 NOTE: When you are prompted to enter a password, you have three tries before the system halts. Don’t forget your password. If you forget your password, you may have to return your notebook computer to your dealer to reset it. Setting a Password Follow these steps as you set the user or the supervisor password: 1. Use the up/down keys to highlight the Set Supervisor Password parameter and press the Enter key. The Set Supervisor Password box appears: 2. Type a password in the “Enter New Password” field. The password length can not exceeds 8 alphanumeric characters (A-Z, a-z, 0-9, not case sensitive). Retype the password in the “Confirm New Password” field. IMPORTANT:Be very careful when typing your password because the characters do not appear on the screen. 3. Press Enter. After setting the password, the computer sets the User Password parameter to “Set”. 4. If desired, you can opt to enable the Password on boot parameter. 5. When you are done, press F10 to save the changes and exit the BIOS Setup Utility. Removing a Password Follow these steps: 1. Use the up/down keys to highlight the Set Supervisor Password parameter and press the Enter key. The Set Password box appears: 2. Type the current password in the Enter Current Password field and press Enter. 3. Press e twice without typing anything in the Enter New Password and Confirm New Password fields. The computer then sets the Supervisor Password parameter to “Clear”. 4. When you have changed the settings, press F10 to save the changes and exit the BIOS Setup Utility. 32 Chapter 2 Changing a Password 1. Use the up/down keys to highlight the Set Supervisor Password parameter and press the Enter key. The Set Password box appears: 2. Type the current password in the Enter Current Password field and press Enter. 3. Type a password in the Enter New Password field. Retype the password in the Confirm New Password field. 4. Press Enter. After setting the password, the computer sets the User Password parameter to “Set”. 5. If desired, you can enable the Password on boot parameter. 6. When you are done, press u to save the changes and exit the BIOS Setup Utility. If the verification is OK, the screen will display as following. The password setting is complete after the user presses Enter. If the current password entered does not match the actual current password, the screen will show you the Setup Warning. If the new password and confirm new password strings do not match, the screen will display the following message. Chapter 2 33 Boot This menu allows the user to decide the order of boot devices to load the operating system. Bootable devices includes the diskette drive in module bay, the onboard hard disk drive and the CD-ROM in module bay. 34 Chapter 2 Exit The Exit screen contains parameters that confirmed or discard the changes made to the parameters in the BIOS Setup Utility. The table below describes the parameters in this screen. Parameter Description Exit Saving Changes Exit System Setup and save your changes to CMOS. Exit Discarding Changes Exit utility without saving setup data to CMOS. Load Setup Default Load default values for all SETUP item. Discard Changes Load previous values from CMOS for all SETUP items. Save Changes Save Setup Data to CMOS. Ite m Spe c ific He lp Ex it Sy s te m Se tup and save your changes to CMOS. Exit Saving Changes Exit Discarding Changes D i s c a r d C h a n g e s S a v e C h a n g e s InsydeH20 Setup Utility Information Security Main Boot Exit R e v. 3.5 F 1 Esc Help Exit Select Item Se le c t Me nu Change Va lues Select►Sub-Menu F5/F6 Enter F 9 F10 Setup Default Sa v e and Ex it Chapter 2 35 BIOS Flash Utility The BIOS flash memory update is required for the following conditions: • New versions of system programs • New features or options • Restore a BIOS when it becomes corrupted. Use the Flash utility to update the system BIOS flash ROM. NOTE: If you do not have a crisis recovery disk at hand, then you should create a Crisis Disk (See “Steps for BIOS Recovery by Crisis Disk” on page 117) before you use the Flash utility. NOTE: Do not install memory-related drivers (XMS, EMS, DPMI) when you use the Flash. NOTE: Please connect the AC adapter power supply when you run the Flash utility. If the battery pack does not contain enough power to finish BIOS flash, you may not boot the system because the BIOS is not completely loaded. Follow the steps below to run the Flash utility: 1. Rename the BIOS file as “XXXXXXX.FD” 2. Copy the “XXXXXXX.FD” file to a bootable USB device containing the Crisis Disk. 3. Turn off the system power. 4. Insert the USB device containing the renamed BIOS file and Crisis Disk to any USB port. 5. Make sure the AC adapter is connected to a power outlet and plugged in to the system. 6. Power on the system from an off state (i.e. cold boot) while holding down the Fn + ESC key. 7. After POST, release Fn + ESC key. The system should boot from the USB device and perform crisis recovery action. 36 Chapter 2 Remove HDD and BIOS Passwords This section teaches you how to remove HDD password: Remove HDD Password • If you key in the wrong HDD password thrice, “HDD password error code” will appear on the screen. See the image below. • If you need to solve HDD password locked problem, you can run HDD_PW.EXE 1. Key in “hdd_pw 15494 0” 2. Select “2” 3. Choose one of the uppercase strings • Reboot the system and key in “0KJFN42” or “UVEIQ96” as your HDD user password. Chapter 2 37 Remove BIOS Password • If you key in wrong Supervisor Password for three time, “System Disabled” would display on the screen. See the image below. • If you need to solve BIOS password locked problem, you can run BIOS_PW.EXE 1. Key in “bios_pw 14452 0” 2. Choose one upper-case string • Reboot the system and key in “qjjg9vy” or “07yqmjd” as your BIOS user password. 38 Chapter 2 Chapter 3 39 This chapter contains step-by-step procedures on how to disassemble the notebook computer for maintenance and troubleshooting. Disassembly Requirements To disassemble the computer, you need the following tools: • Wrist grounding strap and conductive mat for preventing electrostatic discharge • Flat screwdriver • Philips screwdriver • Hex screwdriver • Plastic flat screwdriver • Plastic tweezers NOTE: The screws for the different components vary in size. During the disassembly process, group the screws with the corresponding components to avoid mismatch when putting back the components. Chapter 3 Machine Disassembly and Replacement 40 Chapter 3 General Information Pre-disassembly Instructions Before proceeding with the disassembly procedure, make sure that you do the following: 1. Turn off the power to the system and all peripherals. 2. Unplug the AC adapter and all power and signal cables from the system. 3. Place the system on a flat, stable surface. 4. Remove any dummy card that might still be inside the card slot. Disassembly Process The disassembly process is divided into the following stages: • External module disassembly • Main unit disassembly • LCD module disassembly The flowcharts provided in the succeeding disassembly sections illustrate the entire disassembly sequence. Observe the order of the sequence to avoid damage to any of the hardware components. For example, if you want to remove the main board, you must first remove the keyboard, then disassemble the inside assembly frame in that order. Main Screw List Item Screw Color Part No. A M2.5 x L6 Black 86.00E69.736 B M2 x L4 Silver 86.00E13.524 C M3 x L4 Silver 86.9A524.4R0 D M2 x L3 Silver 86.9A552.3R0 E M2 x L2.5 Silver 86.9A526.2R5 F M2.5 x L2.5 Black 86.00F87.735 G M2.5 X L3.5 Silver 86.9A563.3R5 H M2.5 x L11 Black 86.1A353.110 Chapter 3 41 External Module Disassembly Process External Modules Disassembly Flowchart The flowchart below gives you a graphic representation on the entire disassembly sequence and instructs you on the components that need to be removed during servicing. For example, if you want to remove the main board, you must first remove the keyboard, then disassemble the inside assembly frame in that order. Screw List Item Screw Color Part No. A M2.5 x L6 Black 86.00E69.736 C M3 x L4 Silver 86.9A524.4R0 D M2 x L3 Silver 86.9A552.3R0 H M2.5 x L11 Black 86.1A353.110 EXTERNAL MODULE DISASSEMBLY SSD MODULE TURN OFF POWER AND PERIPHERALS UNPLUG POWER CABLES LOWER COVER Captive Screwx4 DIMM MODULES REMOVE BATTERY PACK Dx1 ODD MODULE OPTICAL DISK DRIVE OPTICAL LOCKER BRACKET Cx2 HDD MODULE HARD DISK BRACKET HARD DISK DRIVE Ax1 RTC BATTERY Hx4 42 Chapter 3 Removing the Battery Pack 1. Turn base unit over. 2. Slide the battery lock/unlock latch to the unlock position. 3. Slide and hold the battery release latch to the release position. 4. Then slide out the battery from the battery bay. Note: Battery has been highlighted with the yellow circle as above image shows. Please detach the battery and follow local regulations for disposal. Chapter 3 43 Removing the Lower Cover 1. See “Removing the Battery Pack” on page 42. 2. Remove the four captive screws and four screws (H) securing the lower cover. 3. Use a plastic screw driver to carefully pry open the lower cover. 4. Remove the lower cover from the lower case. Step Size (Quantity) Color Torque 1~4 M2.5 x L11 (4) Black 3.0 kgf-cm 2 1 3 4 44 Chapter 3 Removing the Optical Drive Module 1. See “Removing the Battery Pack” on page 42. 2. See “Removing the Lower Cover” on page 43. 3. Remove the one screw (A) securing the optical drive. 4. Use a screw driver and carefully push out and slide out the optical drive module out of the bay. Step Size (Quantity) Color Torque 1 M2.5 x L6 (1) Black 3.0 kgf-cm Chapter 3 45 5. Remove the one screw (D) securing the locker bracket and remove the locker bracket from the optical disk drive module. Removing the DIMM 1. See “Removing the Battery Pack” on page 42. 2. See “Removing the Lower Cover” on page 43. 3. Push out the latches on both sides of the DIMM socket to release the DIMM and remove it from the socket. Step Size (Quantity) Color Torque 1 M2 x L3 (1) Silver 1.6 kgf-cm 46 Chapter 3 4. Do the same to the other socket if there is any DIMM present. Removing the Hard Disk Drive Module 1. See “Removing the Battery Pack” on page 42. 2. See “Removing the Lower Cover” on page 43. 3. Using the plastic tab, slide the hard disk drive module away from the connector. 4. Lift up the hard disk module to remove from the bay. NOTE: To prevent damage to device, avoid pressing down on it or placing heavy objects on top of it. Chapter 3 47 5. Remove the two screws (C) securing the hard disk to the bracket and remove the hard disk from the bracket. Step Size (Quantity) Color Torque 1~2 M3 x L4 (2) Silver 3.0 kgf-cm 48 Chapter 3 Removing the SSD Module 1. See “Removing the Battery Pack” on page 42. 2. See “Removing the Lower Cover” on page 43. 3. Using the plastic tab, slide the SSD module away from the connector and lift to remove it from the system. Removing the RTC Battery 1. See “Removing the Battery Pack” on page 42. 2. See “Removing the Lower Cover” on page 43. 3. Disconnect the RTC battery cable from the system board and lift to remove it. NOTE: Be careful when removing the RTC battery. It is glued to the system board. Note: Battery has been highlighted with the yellow circle as above image shows. Please detach the battery and follow local regulations for disposal. Chapter 3 49 Main Unit Disassembly Process Main Unit Disassembly Flowchart Screw List Item Screw Color Part No. A M2.5 x L6 Black 86.00E69.736 B M2 x L4 Silver 86.00E13.524 MAIN UNIT KEYBOARD BLUETOOTH MODULE MAIN UNIT DISASSEMBLY LCD MODULE Ax2 UPPER CASE A x 16 WLAN BOARD MODULE FINGERPRINT MODULE TOUCHPAD MODULE POWER BUTTON BOARD B x 1 CARD READER BOARD B x 2 MINI BOARD B x 1 SYSTEM BOARD B x 2 B x 2 CRT BOARD THERMAL MODULE 50 Chapter 3 Removing the Keyboard 1. See “Removing the Battery Pack” on page 42. 2. Release the keyboard from the latches securing it. 3. Carefully pry loose the keyboard. 4. Place the keyboard below the LCD screen to gain access to the keyboard cable. Chapter 3 51 5. Disconnect the keyboard cable from the main board to remove the keyboard. Removing the WLAN Board Module 1. See “Removing the Battery Pack” on page 42. 2. See “Removing the Keyboard” on page 50. 3. Disconnect the antenna cables from the WLAN board. NOTE: There are 2 antenna cables connected to the WLAN board. The Black antenna cable is connected to connector 1and the White antenna cable is connected to connector 2. 52 Chapter 3 4. Remove the one screw (B) on the WLAN board to release the WLAN board. 5. Detach the WLAN board from the WLAN socket. NOTE: When attaching the antenna back to the WLAN board, make sure the cable are arranged properly. Separating the Upper Case from the Lower Case 1. See “Removing the Battery Pack” on page 42. 2. See “Removing the Lower Cover” on page 43. 3. See “Removing the Lower Cover” on page 43. 4. See “Removing the Optical Drive Module” on page 44. 5. See “Removing the DIMM” on page 45. 6. See “Removing the Hard Disk Drive Module” on page 46. 7. See “Removing the SSD Module” on page 48. 8. See “Removing the RTC Battery” on page 48. 9. See “Removing the Keyboard” on page 50. 10. See “Removing the WLAN Board Module” on page 51. Step Size (Quantity) Color Torque 1 M2 x L4 (1) Black 1.6 kgf-cm Chapter 3 53 11. Remove the fourteen screws (A) from the bottom panel. 12. Turn over the unit and remove the two screws (A) on the top panel. 13. Disconnect the touchpad cable from the TPAD1 connector on the main board. Step Size (Quantity) Color Torque 1~14 M2.5 x L6 (14) Black 3.0 kgf-cm Step Size (Quantity) Color Torque 1~2 M2.5 x L6 (2) Black 3.0 kgf-cm 54 Chapter 3 14. Remove the tape securing the WAN antenna cables. 15. Disconnect the function key board cable from the MMB1 connector on the system board. 16. Disconnect the power button cable from the BTB2 connector on the system board. Chapter 3 55 17. Disconnect the speaker cable from the SPK1 connector on the system board. 18. Gently separate the upper case from the lower case. Removing the Power Button Board 1. See “Removing the Battery Pack” on page 42. 2. See “Removing the Lower Cover” on page 43. 3. See “Removing the Lower Cover” on page 43. 4. See “Removing the Optical Drive Module” on page 44. 5. See “Removing the DIMM” on page 45. 6. See “Removing the Hard Disk Drive Module” on page 46. 7. See “Removing the SSD Module” on page 48. 8. See “Removing the RTC Battery” on page 48. 9. See “Removing the Keyboard” on page 50. 10. See “Removing the WLAN Board Module” on page 51. 11. See “Separating the Upper Case from the Lower Case” on page 52. 56 Chapter 3 12. Release the power button board from that latches and remove from the upper case. Removing the Touchpad Module 1. See “Removing the Battery Pack” on page 42. 2. See “Removing the Lower Cover” on page 43. 3. See “Removing the Lower Cover” on page 43. 4. See “Removing the Optical Drive Module” on page 44. 5. See “Removing the DIMM” on page 45. 6. See “Removing the Hard Disk Drive Module” on page 46. 7. See “Removing the SSD Module” on page 48. 8. See “Removing the RTC Battery” on page 48. 9. See “Removing the Keyboard” on page 50. 10. See “Removing the WLAN Board Module” on page 51. 11. See “Separating the Upper Case from the Lower Case” on page 52. 12. Disconnect the touchpad cable from the touchpad board. Chapter 3 57 13. Carefully pry loose and remove the touch pad board. WARNING:The touchpad board is glued to the upper case, only remove the touchpad board if it is defective. Note: Circuit board >10 cm² has been highlighted with the yellow rectangle as above image shows. Please detach the Circuit boards and follow local regulations for disposal. Removing the Speaker Module 1. See “Removing the Battery Pack” on page 42. 2. See “Removing the Lower Cover” on page 43. 3. See “Removing the Lower Cover” on page 43. 4. See “Removing the Optical Drive Module” on page 44. 5. See “Removing the DIMM” on page 45. 6. See “Removing the Hard Disk Drive Module” on page 46. 7. See “Removing the SSD Module” on page 48. 8. See “Removing the RTC Battery” on page 48. 9. See “Removing the Keyboard” on page 50. 10. See “Removing the WLAN Board Module” on page 51. 11. See “Separating the Upper Case from the Lower Case” on page 52. 58 Chapter 3 12. Remove the two screws (B) securing the left and right speaker modules and remove it from the upper case. Removing the System Board 1. See “Removing the Battery Pack” on page 42. 2. See “Removing the Lower Cover” on page 43. 3. See “Removing the Lower Cover” on page 43. 4. See “Removing the Optical Drive Module” on page 44. 5. See “Removing the DIMM” on page 45. 6. See “Removing the Hard Disk Drive Module” on page 46. 7. See “Removing the SSD Module” on page 48. 8. See “Removing the RTC Battery” on page 48. 9. See “Removing the Keyboard” on page 50. 10. See “Removing the WLAN Board Module” on page 51. 11. See “Separating the Upper Case from the Lower Case” on page 52. 12. Disconnect the card reader board cable from the system board. Step Size (Quantity) Color Torque 1~2 M2 x L3 (2) Black 1.6 kgf-cm Chapter 3 59 13. For Aspire 5810T/5810TZ/5410T, disconnect the top CRT cable from the system board and the bottom CRT cable from the CRT board. 14. For Aspire 5810TG, disconnect the CRT cable from CN2 on the system board and disconnect the CRT cable connector from CN3 on the system board. 60 Chapter 3 15. Disconnect the LCD cable from the LCD1 connector on the system board. 16. Remove the two screws (B) securing the system board and the mini board.. 17. Carefully remove the main board. Step Size (Quantity) Color Torque 1 M2 x L4 (1) Black 1.6 kgf-cm Chapter 3 61 Removing the LCD Module 1. See “Removing the Battery Pack” on page 42. 2. See “Removing the Lower Cover” on page 43. 3. See “Removing the Lower Cover” on page 43. 4. See “Removing the Optical Drive Module” on page 44. 5. See “Removing the DIMM” on page 45. 6. See “Removing the Hard Disk Drive Module” on page 46. 7. See “Removing the SSD Module” on page 48. 8. See “Removing the RTC Battery” on page 48. 9. See “Removing the Keyboard” on page 50. 10. See “Removing the WLAN Board Module” on page 51. 11. See “Separating the Upper Case from the Lower Case” on page 52. 12. See “Removing the System Board” on page 58. 13. Release the wireless antenna cables from the latches. 14. Remove the two screws (A) from the left and right hinge of the LCD module. Step Size (Quantity) Color Torque 1~2 M2.5 x L6 (2) Black 3.0 kgf-cm 62 Chapter 3 15. Carefully remove the LCD module from the base unit. NOTE: When connecting the cable back to the unit, please note that the cable should be routed well. Removing the Thermal Module There are two version of thermal module. For this section, we are going to use the UMA model (for Aspire 5810T/5810TZ/5410T). The discrete version (for Aspire 5810TG) looks like the picture below: 1. See “Removing the Battery Pack” on page 42. 2. See “Removing the Lower Cover” on page 43. 3. See “Removing the Lower Cover” on page 43. 4. See “Removing the Optical Drive Module” on page 44. 5. See “Removing the DIMM” on page 45. 6. See “Removing the Hard Disk Drive Module” on page 46. 7. See “Removing the SSD Module” on page 48. 8. See “Removing the RTC Battery” on page 48. 9. See “Removing the Keyboard” on page 50. 10. See “Removing the WLAN Board Module” on page 51. 11. See “Separating the Upper Case from the Lower Case” on page 52. 12. See “Removing the System Board” on page 58. Chapter 3 63 13. Disconnect the thermal module cable from the system board. 14. Turn over the system board and loosen the four captive screws securing the thermal module. For the discrete model (Aspire 5810TG), please loosen the five captive screws securing the thermal module as shown below. 5 2 4 3 1 64 Chapter 3 15. Carefully remove the theral module from the system. Removing the Mini Board Module 1. See “Removing the Battery Pack” on page 42. 2. See “Removing the Lower Cover” on page 43. 3. See “Removing the Lower Cover” on page 43. 4. See “Removing the Optical Drive Module” on page 44. 5. See “Removing the DIMM” on page 45. 6. See “Removing the Hard Disk Drive Module” on page 46. 7. See “Removing the SSD Module” on page 48. 8. See “Removing the RTC Battery” on page 48. 9. See “Removing the Keyboard” on page 50. 10. See “Removing the WLAN Board Module” on page 51. 11. See “Separating the Upper Case from the Lower Case” on page 52. 12. See “Removing the System Board” on page 58. 13. Remove the one screw (B) securing the mini board to the system board. Step Size (Quantity) Color Torque 1 M2 x L4 (1) Black 1.6 kgf-cm Chapter 3 65 14. Detach the system board from the mini board. Note: Circuit boards >10 cm² has been highlighted with the yellow rectangle as above image shows. Please detach the Circuit boards and follow local regulations for disposal. Removing the CRT Board Module 1. See “Removing the Battery Pack” on page 42. 2. See “Removing the Lower Cover” on page 43. 3. See “Removing the Lower Cover” on page 43. 4. See “Removing the Optical Drive Module” on page 44. 5. See “Removing the DIMM” on page 45. 6. See “Removing the Hard Disk Drive Module” on page 46. 7. See “Removing the SSD Module” on page 48. 8. See “Removing the RTC Battery” on page 48. 9. See “Removing the Keyboard” on page 50. 10. See “Removing the WLAN Board Module” on page 51. 11. See “Separating the Upper Case from the Lower Case” on page 52. 12. See “Removing the System Board” on page 58. 13. Release the CRT board from the latch. 66 Chapter 3 14. Carefully lift the CRT board and remove it from the lower case. Removing the Bluetooth Module 1. See “Removing the Battery Pack” on page 42. 2. See “Removing the Lower Cover” on page 43. 3. See “Removing the Lower Cover” on page 43. 4. See “Removing the Optical Drive Module” on page 44. 5. See “Removing the DIMM” on page 45. 6. See “Removing the Hard Disk Drive Module” on page 46. 7. See “Removing the SSD Module” on page 48. 8. See “Removing the RTC Battery” on page 48. 9. See “Removing the Keyboard” on page 50. 10. See “Removing the WLAN Board Module” on page 51. 11. See “Separating the Upper Case from the Lower Case” on page 52. 12. Disconnect the bluetooth module cable from the card reader board. Chapter 3 67 13. Release the bluetooth module from the latches. 14. Remove the bluetooth module from the lower case. Removing the Card Reader Board 1. See “Removing the Battery Pack” on page 42. 2. See “Removing the Lower Cover” on page 43. 3. See “Removing the Lower Cover” on page 43. 4. See “Removing the Optical Drive Module” on page 44. 5. See “Removing the DIMM” on page 45. 6. See “Removing the Hard Disk Drive Module” on page 46. 7. See “Removing the SSD Module” on page 48. 8. See “Removing the RTC Battery” on page 48. 9. See “Removing the Keyboard” on page 50. 10. See “Removing the WLAN Board Module” on page 51. 11. See “Separating the Upper Case from the Lower Case” on page 52. 12. See “Removing the Bluetooth Module” on page 66. 68 Chapter 3 13. Remove the two screws (B) securing the card reader board to the lower case. 14. Remove the card reader board from the lower case. Step Size (Quantity) Color Torque 1~2 M2 x L4 (2) Black 1.6 kgf-cm Chapter 3 69 LCD Module Disassembly Process LCD Module Disassembly Flowchart Screw List Item Screw Color Part No. E M2 x L2.5 Silver 86.9A526.2R5 F M2.5 x L2.5 Black 86.00F87.735 G M2.5 X L3.5 Silver 86.9A563.3R5 LCD MODULE LCD BEZEL Gx4 LCD ASSEMBLY LCD FPC CABLE LCD MODULE DISASSEMBLY WEB CAMERA LEFT HINGE RIGHT HINGE Fx2 Fx2 Ex4 70 Chapter 3 Removing the LCD Bezel 1. See “Removing the Battery Pack” on page 42. 2. See “Removing the Lower Cover” on page 43. 3. See “Removing the Lower Cover” on page 43. 4. See “Removing the Optical Drive Module” on page 44. 5. See “Removing the DIMM” on page 45. 6. See “Removing the Hard Disk Drive Module” on page 46. 7. See “Removing the SSD Module” on page 48. 8. See “Removing the RTC Battery” on page 48. 9. See “Removing the Keyboard” on page 50. 10. See “Removing the WLAN Board Module” on page 51. 11. See “Separating the Upper Case from the Lower Case” on page 52. 12. See “Removing the System Board” on page 58. 13. See “Removing the LCD Module” on page 61. 14. Remove the four rubber screw covers from the LCD bezel. 15. Remove the four screws (G) on the LCD module as shown. Step Size (Quantity) Color Torque 1~4 M2.5 x L6 (4) Silver 3.0 kgf-cm Chapter 3 71 16. Carefully pry open the LCD bezel and and remove the bezel from the LCD panel. Removing the LCD Panel Hinges 1. See “Removing the Battery Pack” on page 42. 2. See “Removing the Lower Cover” on page 43. 3. See “Removing the Lower Cover” on page 43. 4. See “Removing the Optical Drive Module” on page 44. 5. See “Removing the DIMM” on page 45. 6. See “Removing the Hard Disk Drive Module” on page 46. 7. See “Removing the SSD Module” on page 48. 8. See “Removing the RTC Battery” on page 48. 9. See “Removing the Keyboard” on page 50. 10. See “Removing the WLAN Board Module” on page 51. 11. See “Separating the Upper Case from the Lower Case” on page 52. 12. See “Removing the System Board” on page 58. 13. See “Removing the LCD Module” on page 61. 14. See “Removing the LCD Bezel” on page 70. 72 Chapter 3 15. Remove the hinge caps on both side of the hinges. 16. Remove the four screws (F) securing the left and right hinges. 17. Remove the left and right hinges. Step Size (Quantity) Color Torque 1~4 M2.5 x L2.5 (4) Black 3.0 kgf-cm Chapter 3 73 Removing the LCD Panel 1. See “Removing the Battery Pack” on page 42. 2. See “Removing the Lower Cover” on page 43. 3. See “Removing the Lower Cover” on page 43. 4. See “Removing the Optical Drive Module” on page 44. 5. See “Removing the DIMM” on page 45. 6. See “Removing the Hard Disk Drive Module” on page 46. 7. See “Removing the SSD Module” on page 48. 8. See “Removing the RTC Battery” on page 48. 9. See “Removing the Keyboard” on page 50. 10. See “Removing the WLAN Board Module” on page 51. 11. See “Separating the Upper Case from the Lower Case” on page 52. 12. See “Removing the System Board” on page 58. 13. See “Removing the LCD Module” on page 61. 14. See “Removing the LCD Bezel” on page 70. 15. See “Removing the LCD Panel Hinges” on page 71. 74 Chapter 3 16. Remove the four screws (E) securing the LCD panel to the back cover. 17. Carefully lift up the LCD panel and turn it over to gain access to the LCD cable. 18. Detach the acetic tape on the LCD cable. Step Size (Quantity) Color Torque 1~4 M2 x L2.5 (4) Silver 1.6 kgf-cm Chapter 3 75 19. Detach the LCD cable from the LCD panel. 20. Remove the LCD panel from the back cover. Removing the Webcam 1. See “Removing the Battery Pack” on page 42. 2. See “Removing the Lower Cover” on page 43. 3. See “Removing the Lower Cover” on page 43. 4. See “Removing the Optical Drive Module” on page 44. 5. See “Removing the DIMM” on page 45. 6. See “Removing the Hard Disk Drive Module” on page 46. 7. See “Removing the SSD Module” on page 48. 8. See “Removing the RTC Battery” on page 48. 9. See “Removing the Keyboard” on page 50. 10. See “Removing the WLAN Board Module” on page 51. 11. See “Separating the Upper Case from the Lower Case” on page 52. 12. See “Removing the System Board” on page 58. 13. See “Removing the LCD Module” on page 61. 14. See “Removing the LCD Bezel” on page 70. 76 Chapter 3 15. Disconnect the cable from the webcam. 16. Carefully pry loose the webcam. CAUTION: Only remove the webcam if it is defective as it is glued to the back cover. Chapter 4 77 Use the following procedure as a guide for computer problems. NOTE: The diagnostic tests are intended to test only Acer products. Non-Acer products, prototype cards, or modified options can give false errors and invalid system responses. 1. Obtain the failing symptoms in as much detail as possible. 2. Verify the symptoms by attempting to re-create the failure by running the diagnostic test or by repeating the same operation. 3. Use the following table with the verified symptom to determine which page to go to. Symptoms (Verified) Go To Power failure. (The power indicator does not go on or stay on.) See “Power System Check” on page 79.. POST does not complete. No beep or error codes are indicated. See “Post Code Table” on page 82. “Undetermined Problems” on page 90 POST detects an error and displayed messages on screen. See “Post Code Table” on page 82. Other symptoms (i.e. LCD display problems or others). See “Post Code Table” on page 82. Symptoms cannot be re-created (intermittent problems). Use the customer-reported symptoms and go to “Post Code Table” on page 82. See “Intermittent Problems” on page 89. See “Undetermined Problems” on page 90. Troubleshooting Chapter 4 78 Chapter 4 System Check Procedures External Diskette Drive Check Do the following to isolate the problem to a controller, driver, or diskette. A write-enabled, diagnostic diskette is required. NOTE: Make sure that the diskette does not have more than one label attached to it. Multiple labels can cause damage to the drive or cause the drive to fail. Do the following to select the test device. 1. Boot from the diagnostics diskette and start the diagnostics program. 2. See if FDD Test is passed as the program runs to FDD Test. 3. Follow the instructions in the message window. If an error occurs with the internal diskette drive, reconnect the diskette connector on the system board. If the error still remains: 1. Reconnect the external diskette drive/DVD-ROM module. 2. Replace the external diskette drive/CD-ROM module. 3. Replace the main board. External Optical Disk Drive Check Do the following to isolate the problem to a controller, drive, or optical disk. Make sure that the optical disk does not have any label attached to it. The label can cause damage to the drive or can cause the drive to fail. Do the following to select the test device: 1. Boot from the diagnostics disc and start the diagnostics program. 2. See if CD-ROM Test is passed when the program runs to CD-ROM Test. 3. Follow the instructions in the message window. If an error occurs, reconnect the connector on the System board. If the error still remains: 1. Reconnect the optical disk drive module. 2. Replace the optical disk drive module. 3. Replace the main board. Keyboard or Auxiliary Input Device Check Remove the external keyboard if the internal keyboard is to be tested. If the internal keyboard does not work or an unexpected character appears, make sure that the flexible cable extending from the keyboard is correctly seated in the connector on the system board. If the keyboard cable connection is correct, run the Keyboard Test. If the tests detect a keyboard problem, do the following one at a time to correct the problem. Do not replace a non-defective FRU: 1. Reconnect the keyboard cables. 2. Replace the keyboard. 3. Replace the main board. The following auxiliary input devices are supported by this computer: q Numeric keypad Chapter 4 79 q External keyboard If any of these devices do not work, reconnect the cable connector and repeat the failing operation. Memory check Memory errors might stop system operations, show error messages on the screen, or hang the system. 1. Boot from the diagnostics diskette and start the diagnostic program (please refer to main board. 2. Go to the diagnostic memory in the test items. 3. Press F2 in the test items. 4. Follow the instructions in the message window. NOTE: Make sure that the DIMM is fully installed into the connector. A loose connection can cause an error. Power System Check To verify the symptom of the problem, power on the computer using each of the following power sources: 1. Remove the battery pack. 2. Connect the power adapter and check that power is supplied. 3. Disconnect the power adapter and install the charged battery pack; then check that power is supplied by the battery pack. If you suspect a power problem, see the appropriate power supply check in the following list: q “Check the Power Adapter” on page 79 q “Check the Battery Pack” on page 80 Check the Power Adapter Unplug the power adapter cable from the computer and measure the output voltage at the plug of the power adapter cable. See the following figure 1. If the voltage is not correct, replace the power adapter. 2. If the voltage is within the range, do the following: q Replace the System board. q If the problem is not corrected, see “Undetermined Problems” on page 90. q If the voltage is not correct, go to the next step. NOTE: An audible noise from the power adapter does not always indicate a defect. 3. If the power-on indicator does not light up, check the power cord of the power adapter for correct continuity and installation. 4. If the operational charge does not work, see “Check the Battery Pack” on page 80. Pin 1: +19 to +20.5V Pin 2: 0V, Ground 80 Chapter 4 Check the Battery Pack To check the battery pack, do the following: From Software: 1. Check out the Power Management in control Panel 2. In Power Meter, confirm that if the parameters shown in the screen for Current Power Source and Total Battery Power Remaining are correct. 3. Repeat the steps 1 and 2, for both battery and adapter. 4. This helps you identify first the problem is on recharging or discharging. From Hardware: 1. Power off the computer. 2. Remove the battery pack and measure the voltage between battery terminals 1(+) and 6(ground). 3. If the voltage is still less than 7.5 Vdc after recharging, replace the battery. To check the battery charge operation, use a discharged battery pack or a battery pack that has less than 50% of the total power remaining when installed in the computer. If the battery status indicator does not light up, remove the battery pack and let it return to room temperature. Re-install the battery pack. If the charge indicator still does not light up, replace the battery pack. If the charge indicator still does not light up, replace the DC/DC charger board. Touchpad Check If the touchpad doesn’t work, do the following actions one at a time to correct the problem. Do not replace a non-defective FRU: 1. Reconnect the touchpad cables. 2. Replace the touchpad. 3. Replace the system board. After you use the touchpad, the pointer drifts on the screen for a short time. This self-acting pointer movement can occur when a slight, steady pressure is applied to the touchpad pointer. This symptom is not a hardware problem. No service actions are necessary if the pointer movement stops in a short period of time. Chapter 4 81 Power-On Self-Test (POST) Error Messages The POST error message index lists the error message and their possible causes. The most likely cause is listed first. NOTE: Perform the FRU replacement or actions in the sequence shown in FRU/Action column, if the FRU replacement does not solve the problem, put the original part back in the computer. Do not replace a non-defective FRU. This index can also help you determine the next possible FRU to be replaced when servicing a computer. If the symptom is not listed, see “Undetermined Problems” on page 90. The following lists the error messages that the BIOS displays on the screen and the error symptoms classified by function. NOTE: Most of the error messages occur during POST. Some of them display information about a hardware device, e.g., the amount of memory installed. Others may indicate a problem with a device, such as the way it has been configured. NOTE: If the system fails after you make changes in the BIOS Setup Utility menus, reset the computer, enter Setup and install Setup defaults or correct the error. 82 Chapter 4 Post Code Table POST Code Description 01 Prepare PEI Event Log service (bios debug purpose) 02 OEM service Initialization (bios debug purpose) 04 Status code report service initialization (bios debug purpose) 05 CPU IO and PCI IO (bios debug purpose) 08 CPU Initialization 09 PC Init at stage 1 (SB related init) 0A Firmware Flash Device (for BIOS ROM) Read Services (bios debug purpose) 0D PC Init at stage 2 (NB related init) 0E SMbus 10 Memory Initialization 11 Restore system configuration for S3 resume (bios debug purpose) 12 Clock generator Initialization 13 Provide TPM Presence policy (bios debug purpose) 14 TPM Module 2F Extract BIOS ROM to memory 32 Prepare services for S3 resume (bios debug purpose) 33 Prepare services for S3 resume (bios debug purpose) 34 8254 timer chip initialization 36 PCX decoder 37 CPU Initialization 38 Prepare stall (delay) related services (bios debug purpose) 39 BIOS ROM reclaims relative 3A Install EFI Runtime Protocol (bios debug purpose) 3B The counter for System boot times (bios debug purpose) 3C Watchdog timer service initialization (bios debug purpose) 3D EFI driver format verification (bios debug purpose) 3E Provide CPU IO protocol service (bios debug purpose) 3F Provide reset service (bios debug purpose) 40 Real Time Clock Initialization 41 Status code report service initialization (bios debug purpose) 42 Firmware Flash Device (for BIOS ROM) Read/Write Services 43 Firmware Flash Device Read/Write for BIOS ROM recovery (bios debug purpose) 46 PC Init at stage 1 (SB related init) 46 PCI Host Bridge Initialization 47 PCI-E Initialization 48 SB Controller Initialization 4A SATA Controller Initialization 4B SM Bus Initialization 4D NB Initialization 4D ISA Bus Initialization 4E ISA Serial Device Initialization Chapter 4 83 4F IDE Bus Initialization (bios debug purpose) 50 PCI Bus Initialization (bios debug purpose) 51 Boot option policy services initialization (bios debug purpose) 52 Firmware Flash Device (for BIOS ROM) Read/Write Services 53 ACPI Table creation (bios debug purpose) 54 PCI Hot Plug Services Initialization (bios debug purpose) 55 Platform policy services initialization (bios debug purpose) 56 IDE device platform policy relative services initialization (bios debug purpose) 57 SmBios Services (bios debug purpose) 58 Memory relative SmBios creation (bios debug purpose) 59 SmBios Creation (bios debug purpose) 5A Console In/Out Device 5C ACPI Table creation services (bios debug purpose) 5D Console In/Out Device 5E Console Out Device 5F DataHub Service (bios debug purpose) 61 Memory Test 63 Legacy 8259 Interrupt router relative initialization 64 Shadow RAM Control Service 65 Legacy Interrupt router relative initialization 66 PS2 Keyboard Service 67 VGA device Service 68 The service of monitor insert key from Keyboard (bios debug purpose) 69 EFI CSM service (bios debug purpose) 6A EFI CSM service (bios debug purpose) 6B PCI Bus platform policy relative services initialization (bios debug purpose) 6C Acer INT15 Hook 6B Acer WMI 6E USB relative initialization 6F USB relative initialization 70 USB relative initialization 71 USB Keyboard 72 USB Mass Storage (CD-ROM, HD…) 73 USB UHCI Controller 74 USB Mouse 75 USB Bus 76 Setup Utility Services (bios debug purpose) 78 USB relative service 78 CCD Detcction 79 Console Out Device 7A Console In/Out Device 7B DataHub Service (bios debug purpose) POST Code Description 84 Chapter 4 7E BIOS Human Interface Font Services (bios debug purpose) 80 BIOS Human Interface Services (bios debug purpose) 82 BIOS Human Interface Services (bios debug purpose) 83 Logo service Initialization 84 Mouse service 8A Prepare BDS Protocol service (bios debug purpose) 8F USB EHCI Controller 93 EFI EBC-VM service initialization (bios debug purpose) 99 AHCI Bus Initialization (bios debug purpose) A1 SPI Flash ROM A3 ICH Serial GPIO Interface (bios debug purpose) A5 System Management Mode IO Trap service (bios debug purpose) A6 System Management Mode service for ICH S3 resume A6 HD Password AB Acer Int15 Function AB System Password relative Initialization AC System Password relative Initialization AD DataHub relative service (bios debug purpose) AE TPM Module B1 BIOS Human Interface Services (bios debug purpose) B6 Prepare services for Firmware File Extract (bios debug purpose) B7 OEM service Initialization (bios debug purpose) C0 RAM accessed in System Management Mode service C1 System Management Interrupt services initialization C2 System Management Mode Core Initialization C4 System Management Mode Core Initialization C5 System Management Mode Core Initialization C7 System Management Mode runtime services initialization C8 System Management services initialization C9 System Management Mode Thunk initialization CC Platform policy services for System Management Mode CE Firmware Flash Device (for BIOS ROM) Read/Write Services CF Firmware Flash Device (for BIOS ROM) Read/Write Services D0 Insyde Flash Service Initialization D1 Microcode Update Service D2 Desktop Management Service Initialization D7 HD Password D8 System Management Mode OEM service Initialization (bios debug purpose) D9 Provide OEM override ASPM DA Digital Thermal Sensor POST Code Description Chapter 4 85 Index of Symptom-to-FRU Errors LCD-Related Symptoms Symptom / Error Action in Sequence LCD backlight doesn't work LCD is too dark LCD brightness cannot be adjusted LCD contrast cannot be adjusted Enter BIOS Utility to execute “Load Setup Default Settings”, then reboot system. Reconnect the LCD connectors. Keyboard (if contrast and brightness function key doesn't work). LCD inverter ID LCD cable LCD inverter LCD System board Unreadable LCD screen Missing pels in characters Abnormal screen Wrong color displayed Reconnect the LCD connector LCD inverter ID LCD cable LCD inverter LCD System board LCD has extra horizontal or vertical lines displayed. LCD inverter ID LCD inverter LCD cable LCD System board Indicator-Related Symptoms Symptom / Error Action in Sequence Indicator incorrectly remains off or on, but system runs correctly Reconnect the inverter board Inverter board System board Power-Related Symptoms Symptom / Error Action in Sequence Power shuts down during operation Power source (battery pack and power adapter). See “Power System Check” on page 79. Battery pack Power adapter Hard drive & battery connection board System board The system doesn’t power-on. Power source (battery pack and power adapter). See “Power System Check” on page 79. Battery pack Power adapter Hard drive & battery connection board System board 86 Chapter 4 The system doesn’t power-off. Power source (battery pack and power adapter). See “Power System Check” on page 79. Hold and press the power switch for more than 4 seconds. System board Battery can’t be charged See “Check the Battery Pack” on page 80. Battery pack System board PCMCIA-Related Symptoms Symptom / Error Action in Sequence System cannot detect the PC Card (PCMCIA) PCMCIA slot assembly System board PCMCIA slot pin is damaged. PCMCIA slot assembly Memory-Related Symptoms Symptom / Error Action in Sequence Memory count (size) appears different from actual size. Enter BIOS Setup Utility to execute “Load Default Settings, then reboot system. DIMM System board Speaker-Related Symptoms Symptom / Error Action in Sequence In Windows, multimedia programs, no sound comes from the computer. Audio driver Speaker System board Internal speakers make noise or emit no sound. Speaker System board Power Management-Related Symptoms Symptom / Error Action in Sequence The system will not enter hibernation See “Save to Disk (S4)” on page 24. Keyboard (if control is from the keyboard) Hard disk drive System board The system doesn't enter hibernation mode and four short beeps every minute. Press Fn+o and see if the computer enters hibernation mode. Touchpad Keyboard Hard disk connection board Hard disk drive System board The system doesn’t enter standby mode after closing the LCD See “Save to Disk (S4)” on page 24. LCD cover switch System board Power-Related Symptoms Symptom / Error Action in Sequence Chapter 4 87 The system doesn't resume from hibernation mode. See “Save to Disk (S4)” on page 24. Hard disk connection board Hard disk drive System board The system doesn't resume from standby mode after opening the LCD. See “Save to Disk (S4)” on page 24. LCD cover switch System board Battery fuel gauge in Windows doesn’t go higher than 90%. Remove battery pack and let it cool for 2 hours. Refresh battery (continue use battery until power off, then charge battery). Battery pack System board System hangs intermittently. Reconnect hard disk/CD-ROM drives. Hard disk connection board System board Peripheral-Related Symptoms Symptom / Error Action in Sequence System configuration does not match the installed devices. Enter BIOS Setup Utility to execute “Load Default Settings”, then reboot system. Reconnect hard disk/CD-ROM/diskette drives. External display does not work correctly. Press Fn+F5, LCD/CRT/Both display switching System board USB does not work correctly System board Print problems. Ensure the “Parallel Port” in the “Onboard Devices Configuration” of BIOS Setup Utility is set to Enabled. Onboard Devices Configuration Run printer self-test. Printer driver Printer cable Printer System Board Serial or parallel port device problems. Ensure the “Serial Port” in the Devices Configuration” of BIOS Setup Utility is set to Enabled. Device driver Device cable Device System board Keyboard/Touchpad-Related Symptoms Symptom / Error Action in Sequence Keyboard (one or more keys) does not work. Reconnect the keyboard cable. Keyboard System board Power Management-Related Symptoms Symptom / Error Action in Sequence 88 Chapter 4 NOTE: If you cannot find a symptom or an error in this list and the problem remains, see “Undetermined Problems” on page 90. Touchpad does not work. Reconnect touchpad cable. Touchpad board System board Modem-Related Symptoms Symptom / Error Action in Sequence Internal modem does not work correctly. Modem phone port modem combo board System board Keyboard/Touchpad-Related Symptoms Symptom / Error Action in Sequence Chapter 4 89 Intermittent Problems Intermittent system hang problems can be caused by a variety of reasons that have nothing to do with a hardware defect, such as: cosmic radiation, electrostatic discharge, or software errors. FRU replacement should be considered only when a recurring problem exists. When analyzing an intermittent problem, do the following: 1. Run the advanced diagnostic test for the system board in loop mode at least 10 times. 2. If no error is detected, do not replace any FRU. 3. If any error is detected, replace the FRU. Rerun the test to verify that there are no more errors. 90 Chapter 4 Undetermined Problems The diagnostic problems does not identify which adapter or device failed, which installed devices are incorrect, whether a short circuit is suspected, or whether the system is inoperative. Follow these procedures to isolate the failing FRU (do not isolate non-defective FRU). NOTE: Verify that all attached devices are supported by the computer. NOTE: Verify that the power supply being used at the time of the failure is operating correctly. (See “Power System Check” on page 79.): 1. Power-off the computer. 2. Visually check them for damage. If any problems are found, replace the FRU. 3. Remove or disconnect all of the following devices: q Non-Acer devices q Printer, mouse, and other external devices q Battery pack q Hard disk drive q DIMM q CD-ROM/Diskette drive Module q PC Cards 4. Power-on the computer. 5. Determine if the problem has changed. 6. If the problem does not recur, reconnect the removed devices one at a time until you find the failing FRU. 7. If the problem remains, replace the following FRU one at a time. Do not replace a non-defective FRU: q System board q LCD assembly Chapter 5 91 Top and Bottom Views Aspire 5810T/5810TZ/5410T Top View No. Code Connector 1 SPK1 Speaker cable connector 2 KB1 Keyboard cable connector 3 TP1 Touchpad cable connector 4 CN1 Card reader cable connector 5 CN3 Top CRT cable connector 6 FAN1 Thermal module fan cable connector 7 LCD1 LCD cable connector 8 BTB2 Power button cable connector Connector Locations Chapter 5 92 Chapter 5 Aspire 5810T/5810TZ/5410T Bottom View No. Code Connector 1 DM1 DIMM slot 1 2 DM2 DIMM slot 2 3 CN2 Bottom CRT cable connector 4 SSD1 SSD connector 5 BTB1 Miniboard connector Chapter 5 93 Aspire 5810TG Top View No. Code Connector 1 SPK1 Speaker cable connector 2 KB1 Keyboard cable connector 3 TP1 Touchpad cable connector 4 CN1 Card reader cable connector 5 CN3 CRT cable connector 6 CN2 CRT cable connector 7 FAN1 Thermal module fan cable connector 8 LCD1 LCD cable connector 9 BTB2 Power button cable connector 94 Chapter 5 Aspire 5810TG Bottom View No. Code Connector 1 DM1 DIMM slot 1 2 DM2 DIMM slot 2 3 SSD1 SSD connector 4 BTB1 Miniboard connector Chapter 5 95 Clearing Password Check and BIOS Recovery This section provides the standard operating procedures for clearing the password and BIOS recovery for Aspire 5810T/5810TZ/5410T/5810TG Series. There is one Hardware Open Gap on the main board for clearing the password check and one Hotkey for enabling BIOS Recovery. Clearing Password Check Hardware Open Gap Description HW Gap position on M/B space: Gap name is G61. Hardware Default Setting Operation Description Gap Open (Normal) Short (Clearing Password Check) G61 96 Chapter 5 Steps for Clearing BIOS Password Check If the user sets the BIOS Password (Supervisor Password and/or User Password) for a security reason, the BIOS will ask for the password during system POST or when the system enters into the BIOS Setup menu. If it is necessary to bypass the password check, the user needs to short the hardware gap to clear the password by following these steps: • Power off the system, and remove the HDD, AC adapter and battery from the computer. • Open the back cover of the computer and look for the hardware gap on the main board as shown in the picture(s) above. • Use an electric conductivity tool to short the two points of the hardware gap. • Plug in the AC adapter while retaining the short condition on the hardware gap. Press the power button to turn on the computer until the BIOS POST routine is finished. Finally, remove the tool from the hardware gap. • Restart the system. Press the F2 key to enter BIOS Setup menu. • If there is no password request, the BIOS Password is cleared. Otherwise, repeat the steps above and try again. NOTE: The steps are only for clearing the BIOS password (Supervisor Password and User Password). BIOS Recovery by Crisis Disk BIOS Recovery Boot Block BIOS Recovery Boot Block is a special block of the BIOS. It is used to boot up the system with minimum BIOS initialization. Users can enable this feature to restore the BIOS firmware to a successful one once the previous BIOS flashing process failed. BIOS Recovery Hotkey The system provides a function hotkey: Fn+Esc, for enabling the BIOS Recovery process at system power-on during BIOS POST. To use this function, the AC adapter and the battery must be connected. If this function is enabled, the system will force the BIOS to enter a special BIOS block called Boot Block. Steps for BIOS Recovery by Crisis Disk Before doing this, prepare a Crisis Disk (refer to the “Steps for Creating the Crisis Disk in Windows XP/Vista” section below) and keep it ready in hand. Follow these steps for BIOS recovery: 1. Power off the system. 2. Connect a removable USB storage device containing the Crisis Disk to a USB port connected to the BIOS flash failed system. 3. Under power-off state, press and hold Fn+Esc and then press the power button. The system should be powered on with the Crisis BIOS Recovery process. 4. BIOS Boot Block starts to restore the BIOS code from the Crisis Disk to BIOS ROM on the failed system. 5. After the crisis flashing process is finished, the system will restart. After the Crisis Recovery process is finished, the system should have a successful and workable BIOS after power on. The user can then update the latest BIOS version for this system using the regular BIOS flashing process. Chapter 5 97 Creating the Crisis Disk in Windows XP/Vista Follow these steps to create the Crisis Disk: 1. Prepare a removable USB storage device (size greater than 10MB). Note that all data on the USB storage device will be cleared during the creation of the Crisis Disk. 2. Set up another computer loaded with Windows XP or Vista operating system. 3. Decompress the Crisis Package Source. Select WINCRIS.EXE and then select Run as administrator under Vista. 4. Keep the default settings and then click on the Start button. 5. When the pop-up warning dialog box appears, press OK to continue creating the Crisis Disk. 98 Chapter 5 6. The Crisis Disk will be created after a few seconds. 7. Press No if you do not want to create another Crisis Disk. 8. Reconnect the USB removable storage device and check if it contains the 3 files shown in the following figure. Chapter 6 107 This chapter gives you the FRU (Field Replaceable Unit) listing in global configurations of Aspire 5810T/ 5810TZ/5410T/5810TG Series. Refer to this chapter whenever ordering for parts to repair or for RMA (Return Merchandise Authorization). Please note that WHEN ORDERING FRU PARTS, you should check the most up-to-date information available on your regional web or channel. For whatever reasons a part number change is made, it will not be noted on the printed Service Guide. For ACER AUTHORIZED SERVICE PROVIDERS, your Acer office may have a DIFFERENT part number code from those given in the FRU list of this printed Service Guide. You MUST use the local FRU list provided by your regional Acer office to order FRU parts for repair and service of customer machines. To scrap or to return the defective parts, you should follow the local government ordinance or regulations on how to dispose it properly, or follow the rules set by your regional Acer office on how to return it. FRU (Field Replaceable Unit) List Chapter 6 108 Chapter 6 Aspire 5810T/5810TZ/5410T Series Exploded Diagram Chapter 6 109 Aspire 5810TG Series Exploded Diagram 110 Chapter 6 Aspire 5810T/5810TZ/5410T Series FRU List 1. ACER_ASPIRE 5810T UMACSS_JM51_MS(NO:LX.PBB0X.056) Category No. Part Name Acer Part No. ADAPTER 1 ADAPTER 65W 19V GREEN HIPRO HP-A0652R3B 1.7X5.5X11 YELLOW 1LF LV5 LED LF AP.06501.027 1 ADAPTER 65W 19V GREEN LITEON PA-1650-22AC 1.7X5.5X11 YELLOW LV5 LED LF AP.0650A.013 1 ADAPTER 65W 19V GREEN DELTA ADP-65JH DB A 1.7X5.5X11 YELLOW LV5 LED LF AP.06503.026 BATTERY 1 BATTERY SANYO AS-2009D LI-ION 3S2P SANYO 6 CELL 5600MAH MAIN COMMON BT.00607.082 1 BATTERY SIMPLO AS-2009D LI-ION 3S2P SAMSUNG 6 CELL 5600MAH MAIN COMMON ID : AS09D70 BT.00603.080 1 BATTERY SONY AS-2009D LI-ION 3S2P SONY 6 CELL 4400MAH MAIN COMMON ID : AS09D41 BT.00607.080 1 BATTERY SANYO AS-2009D LI-ION 3S2P SANYO 6 CELL 4400MAH MAIN COMMON ID: AS09D31 BT.00604.039 1 BATTERY PANASONIC AS-2009D LI-ION 3S2P PANASONIC 6 CELL 4400MAH MAIN COMMON ID: AS09D51 BT.00603.082 1 BATTERY SIMPLO AS-2009D LI-ION 3S2P PANASONIC 6 CELL 4400MAH MAIN COMMON 2.2CG , ID: AS09D71 BT.00605.041 1 BATTERY SIMPLO AS-2009D LI-ION 3S2P LGC 6 CELL 4400MAH MAIN COMMON 2.2S3 , ID: AS09D73 BT.00607.078 1 BATTERY SIMPLO AS-2009D LI-ION 3S2P SAMSUNG 6 CELL 4400MAH MAIN COMMON 2.2F , ID: AS09D75 BT.00607.079 1 BATTERY SANYO AS-2009D LI-ION 3S2P SANYO 6 CELL 5200MAH MAIN COMMON BT.00603.079 1 BATTERY PANASONIC LI-ION 3S2P PANASONIC 6 CELL 5800MAH MAIN COMMON BT.00605.038 BOARDS 1 BLUETOOTH BOARD FOXCONN BCM2045 V2 T60H928.11 BT.21100.005 1 CARD READER BOARD UMA 5 IN 1-BUILD IN W/RTC BATTERY & CARD READER CABLE WITH LOCK TOUCHPAD BUTTON 55.PBB01.005 1 CRT BOARD UMA 55.PBB01.004 1 MINI BOARD UMA/DIS NON-3G 55.PBB01.003 Chapter 6 111 1 TOUCHPAD BOARD SYNAPTICS TM-01277-001 56.17010.211 1 TOUCHPAD BOARD ALPS KGDFF0040A 56.17025.101 1 MULTI MEDIA BUTTON BOARD NS-JM4151-CY 56.41010.211 1 MULTI MEDIA BUTTON BOARD NS-JM4151-AQ 56.41010.201 1 POWER BUTTON BOARD UMA W/CABLE 55.PBB01.006 1 WIRELESS LAN BOARD 512AN_HMWG SHIRLEY PEAK 5100 MM#895373 KI.SPH01.003 1 WIRELESS LAN BOARD 512AN_MMWG SHIRLEY PEAK 5100 MM#895361 KI.SPM01.003 1 WIRELESS LAN BOARD INTEL 512AG_HMWG SHIRLEYPEAK1*2 5100 MM#897072 KI.SPH01.005 1 WIRELESS LAN BOARD 512AG_MMWG SHIRLEY PEAK 5100 MM#897004 KI.SPM01.005 CABLES 1 BLUETOOTH BOARD CABLE 50.4CR04.021 1 BLUETOOTH BOARD CABLE 50.4CR04.001 1 BLUETOOTH BOARD CABLE 50.4CR04.011 2 CARD READER CABLE 50.4CR08.011 2 CARD READER CABLE 50.4CR08.001 2 CRT BOARD CABLE 32PIN 50.4CR09.011 2 CRT BOARD CABLE 32PIN 50.4CR09.001 2 CRT BOARD CABLE 40PIN 50.4CR10.011 2 CRT BOARD CABLE 40PIN 50.4CR10.001 2 LED LCD/CAMERA/MICROPHONE CABLE 50.4CR03.021 2 LED LCD/CAMERA/MICROPHONE CABLE 50.4CR03.001 2 LED LCD/CAMERA/MICROPHONE CABLE 50.4CR03.011 1 MULTI MEDIA BUTTON BOARD CABLE 50.4CR11.011 1 MULTI MEDIA BUTTON BOARD CABLE 50.4CR11.001 2 POWER BUTTON CABLE 50.4CR05.021 2 POWER BUTTON CABLE 50.4CR05.001 2 POWER BUTTON CABLE 50.4CR05.011 1 POWER CORD 250V 3PIN EUR BK 27.01518.731 1 POWER CABLE 16A 250V 3PIN EUR BK 27.01518.601 1 POWER CORD 3A 250V 3PIN UK 27.03118.001 1 POWER CORD 5A 250V 3PIN UK BK 27.01518.541 1 POWER CORD 2.5A 125V USA 27.01518.781 1 POWER CORD 10A 250V SWISS 27.01518.691 Category No. Part Name Acer Part No. 112 Chapter 6 CABLES 1 POWER CORD 10A 250V 3PIN SWISS BK 27.01518.581 1 POWER CORD 10A 250V ARGENTINE 27.01518.0U1 1 POWER CORD 10A 125V US 27.01518.641 1 POWER CORD 10A 125V 3PIN US BK 27.01518.521 1 POWER CORD 7A 250V 2PIN KOREAN 27.01518.531 1 POWER CORD 7A 125V 2PIN JAPAN 27.01518.551 1 POWER CORD 10A 3PIN BK DENMARK 27.01518.671 1 POWER CORD 10A 250V 3PIN DENMARK BK 27.01518.561 1 POWER CORD 10A 250V 3PIN BK SOUTH AFRICA 27.01518.681 1 POWER CORD 16A 250V SOUTH AFRICA BK 27.01518.571 1 POWER CORD 10A 250V 3PIN CHINA 27.01518.701 1 POWER CORD 10A 250V 3PIN CHINA BK 27.01518.591 1 POWER CORD 10A 250V 3PIN ITALY 27.01518.711 1 POWER CORD 10A 250V 3PIN ITALY BK 27.01518.611 1 POWER CORD 2.5A 250V AUSTRALIA 27.01518.621 1 POWER CORD 2.5A 250V SOUTH AFRICA BK (INDIA) 27.01518.721 1 POWER CORD 10A 250V SOUTH AFRICA BK (INDIA) 27.01518.631 1 POWER CORD 7A 125V 2PIN JAPAN BK 27.01518.661 1 POWER CORD 250V 10A 3PIN ISRAEL 27.01518.761 1 POWER CORD 2.5A 125V USA 27.01518.A11 1 POWER CORD 2.5A 125V 1.8M BLACK TAIWANESE 27.01518.781 1 POWER CORD 10A 250V 1.8M BRAZIL BLK 27.01518.A41 1 POWER CORD ACA / ACNZ 27.03218.051 1 POWER CORD 7.5A 250V 3P AUSTRALIA BK 27.03218.021 1 POWER CODE 7A 125V 2PIN JAPAN 27.03518.161 2 TOUCHPAD BOARD CABLE RESERVE CAMERA 2 CAMERA 1.0M SUYIN CN1014-S36D-OV05 LAVENDER_G 56.18007.273 2 CAMERA 1.0M CHICONY CNF911321004970L 56.18012.113 CASE/COVER/BRACKET ASSEMBLY 2 DVD-RW SUPER-MULTI BEZEL FOR GBAS 42.PBB01.002 2 DVD-RW SUPER-MULTI BEZEL NONE GBAS 42.PBB01.003 2 HDD BRACKET 2.5 "33.PBB01.002 2 LCD BEZEL 15.6" NONE FLUSH W/LOGO & CAMERA HOLE 60.PBB01.004 2 LED LCD HINGE LEFT 34.4CR01.011 2 LED LCD HINGE LEFT 34.4CR01.001 Category No. Part Name Acer Part No. Chapter 6 113 2 LED LCD HINGE RIGHT 34.4CR02.011 2 LED LCD HINGE RIGHT 34.4CR02.001 2 LED LCD BEZEL CAP LEFT 42.PBB01.004 2 LED LCD BEZEL CAP RIGHT 42.PBB01.005 2 LED LCD COVER 15.6" ALUMINUM SLIVER W/ ANTENNA*2 & MICROPHONE 60.PBB01.005 1 LOWER CASE 60.PBB01.001 2 OPTICAL BRACKET 33.PBB01.001 1 UNITLOAD COVER 42.PBB01.001 1 UPPER CASE SLIVER W/TOUCHPAD BOARD CABLE & SPEAKER (NONE 3G) 60.PBB01.002 DVD-RW DRIVE 1 DVD-RW SUPER-MULTI MODULE 8X 9.5MM SATA FOR GBAS 6M.PBB01.001 1 DVD-RW SUPER-MULTI MODULE 8X 9.5MM SATA NONE GBAS 6M.PBB01.002 2 ODD TOSHIBA SUPER-MULTI DRIVE 8X 9.5MM TRAY DL TS-U633A LF SATA GBAS2.0 W/O BEZEL KU.0080D.046 2 ODD HLDS SUPER-MULTI DRIVE 8X 9.5MM TRAY DL GU10N LF W/O BEZEL FW:AP03 HF SATA KU.00801.031 2 ODD PANASONIC SUPER-MULTI DRIVE 8X 9.5MM TRAY DL UJ862 LF W/O BEZEL SATA NON GBASE KU.00807.069 2 ODD PANASONIC SUPER-MULTI DRIVE 8X 9.5MM TRAY DL UJ862AC LF W/O BEZEL SATA NON GBASE FW1.10 KU.00807.067 HDD/HARD DISK DRIVE 2 HDD 160GB 5400RPM SATA SEAGATE ST9160310AS F/ W:2010 KH.16008.022 Category No. Part Name Acer Part No. 114 Chapter 6 HDD/HARD DISK DRIVE 2 HDD 160GB 5400RPM SATA TOSHIBA LIBRA-BS MK1655GSX F/W:FG0101J 5.4 KH.16001.034 2 HDD 160GB 5400RPM 2.5" SATA HGST HTS543216L9A300 F/W:C30C KH.16004.006 2 HDD 160GB 5400RPM 2.5" SATA WD WD1600BEVT22ZCT0 FW:11.01A11 KH.16007.019 2 HDD 250GB 5400RPM SATA HGST HTS545025B9A300 PANTHER-B LF KH.25008.021 2 HDD 2.5" 5400RPM 250GB SEAGATE ST9250315AS WYATT SATA LF F/W:0001SDM1 KH.25007.015 2 HDD 250GB 5400RPM SATA TOSHIBA LIBRA-BS MK2555GSX F/W:FG000J 5.4K KH.25001.016 2 HDD 250GB 5400RPM SATA WD WD2500BEVT-22ZCT0 F/ W:11.01A11 KH.25004.003 2 HDD 320GB 5400RPM SATA HGST HTS545032B9A300 PANTHER B LF KH.32008.013 2 HDD 320GB 5400RPM SATA SEAGATE ST9320320AS F/ W:2010 KH.32007.007 2 HDD 320GB 5400RPM SATA TOSHIBA MK3255GSX LIBRA LF F/W:FG010J KH.32001.008 2 HDD 320GB 5400RPM SATA WD WD3200BEVT-22ZCT0 ML125 F/W:01.01A01 KH.32004.002 2 HDD 500GB 5400RPM SEAGATE ST9500325AS SATA LF F/W:0001SDM1 KH.50008.013 2 HDD 2.5" 5400RPM 500GB TOSHIBA MK5055GSX LIBRA SATA LF F/W:FG001J KH.50001.011 2 HDD 500GB 5400RPM HGST SATA HTS545050B9A300 PANTHER B LF KH.50004.001 2 HDD 500GB 5400RPM WD SATA WD5000BEVT-22ZAT0 F/ W:01.01A01 KH.50007.009 HEATSINK 1 CPU HEATSINK UMA W/FAN 60.4CR10.001 1 CPU HEATSINK UMA W/FAN 60.4CR08.001 KEYBOARD 1 KEYBOARD 103KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY RUSSIAN KB.I170A.075 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY UK KB.I170A.082 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY SWISS/G KB.I170A.079 1 KEYBOARD 103KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY CHINESE KB.I170A.063 1 KEYBOARD 103KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY THAILAND KB.I170A.080 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY PORTUGUESE KB.I170A.074 1 KEYBOARD 103KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY ARABIC KB.I170A.059 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY DANISH KB.I170A.064 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY ITALIAN KB.I170A.070 Category No. Part Name Acer Part No. Chapter 6 115 KEYBOARD 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY FRENCH KB.I170A.066 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY GERMAN KB.I170A.067 1 KEYBOARD 103KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY US INTERNATIONAL W/ HEBREW KB.I170A.084 1 KEYBOARD 107KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY JAPANESE KB.I170A.071 1 KEYBOARD 103KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY GREEK KB.I170A.068 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY NORWEGIAN KB.I170A.073 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY HUNGARIAN KB.I170A.069 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY SPANISH KB.I170A.077 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY TURKISH KB.I170A.081 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY SWEDEN KB.I170A.078 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY CZ/SK KB.I170A.062 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY BELGIUM KB.I170A.060 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY BRAZILIAN PORTUGUESE KB.I170A.061 1 KEYBOARD 103KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY US INTERNATIONAL KB.I170A.083 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY SLO/CRO KB.I170A.076 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY NORDIC KB.I170A.072 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY FR/ARABIC KB.I170A.065 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY US W/ CANADIAN FRENCH KB.I170A.085 LCD 1 LED LCD MODULE 15.6" WXGA GLARE ALUMINUM SLIVER W/ANTENNA*2&CAMERA 1.0M NONE 3G&FLUSH 6M.PBB01.003 2 LED LCD AUO 15.6"W WXGA GLARE B156XW03 V1 LF 220NIT 8MS 500:1 LK.15608.003 2 LED LCD LPL 15.6"W WXGA GLARE LP156WH3-TLA1 LF 200NIT 8MS 500:1 LK.15605.004 MAINBOARD 1 MAINBOARD JM41/51 UMA GS45 ICH9M CPU INTEL CORE2SOLO SU3500 1.4G 3M 800 5.5W W/CARD READER BOARD CABLE&CRT BOARD CABLE 32PIN&40PIN W/O MEMORY NONE 3G MB.PBB01.003 Category No. Part Name Acer Part No. 116 Chapter 6 MEMORY 1 SODIMM 1GB DDRIII 1066MHZ SAMSUNG M471B2873EH1-CF8 KN.1GB0B.019 1 SODIMM 1GB DDRIII 1066MHZ MICRON MT8JSF12864HY-1G1D1 KN.1GB0B.028 1 SODIMM 1GB DDRLLL 1066MHZ ELPIDA EBJ11UE6BBS0- AE-F KN.1GB04.003 1 SODIMM 1GB DDRIII 1066MHZ SAMSUNG M471B2874DZ1-CF8 KN.1GB09.011 1 SODIMM 2GB DDRIII 1066MHZ SAMSUNG M471B5673DZ1-CF8 KN.2GB0B.012 1 SODIMM 2GB DDRIII 1066MHZ MICRON MT16JSF25664HY-1G1D1 KN.2GB0B.005 1 SODIMM 2GB DDRLLL 1066MHZ ELPIDA EBJ21UE8BBS0- AE-F KN.2GB04.004 1 SODIMM 2GB DDRIII 1066MHZ SAMSUNG M471B5673EH1-CF8 KN.2GB09.004 MICROPHONE 3 MICROPHONE RESERVE MISCELLANEOUS 1 NAME PLATE 5810T 40.4CR28.011 1 NAME PLATE 5810T 40.4CR28.001 1 LCD SCREW RUBBER NONE FLUSH 47.PBB01.001 SCREWS 1 SCREW 86.00E13.524 1 SCREW M2.5 X L6 CR+3 86.00E69.736 1 SCREW M2.5 X L4 NYLOK RED B-ZN 86.00K04.734 1 SCREW M2.5 X L2.5 NYLOK 86.00K60.630 1 SCREW M2.5 X L11 NYLOK 86.1A353.110 1 SCREW M3 X L4 86.9A524.4R0 1 SCREW WAFER NYLOK NI M2 X L3 86.9A552.3R0 1 SCREW M2 X 2.5 NYLOK 86.9A562.2R5 1 SCREW M2.5 X L3.5 86.9A563.3R5 SPEAKER 2 SPEAKER 23.PBB01.001 Category No. Part Name Acer Part No. Chapter 6 117 2. ACER_ASPIRE 5810TZ UMACSS_JM51_MS(NO:LX.PDM0X.001) Category No. Part Name Acer Part No. ADAPTER 1 ADAPTER 65W 19V GREEN HIPRO HP-A0652R3B 1.7X5.5X11 YELLOW 1LF LV5 LED LF AP.06501.027 1 ADAPTER 65W 19V GREEN LITEON PA-1650-22AC 1.7X5.5X11 YELLOW LV5 LED LF AP.0650A.013 1 ADAPTER 65W 19V GREEN DELTA ADP-65JH DB A 1.7X5.5X11 YELLOW LV5 LED LF AP.06503.026 BATTERY 1 BATTERY SANYO AS-2009D LI-ION 3S2P SANYO 6 CELL 5600MAH MAIN COMMON BT.00607.082 1 BATTERY SIMPLO AS-2009D LI-ION 3S2P SAMSUNG 6 CELL 5600MAH MAIN COMMON ID : AS09D70 BT.00603.080 1 BATTERY SONY AS-2009D LI-ION 3S2P SONY 6 CELL 4400MAH MAIN COMMON ID : AS09D41 BT.00607.080 1 BATTERY SANYO AS-2009D LI-ION 3S2P SANYO 6 CELL 4400MAH MAIN COMMON ID: AS09D31 BT.00604.039 1 BATTERY PANASONIC AS-2009D LI-ION 3S2P PANASONIC 6 CELL 4400MAH MAIN COMMON ID: AS09D51 BT.00603.082 1 BATTERY SIMPLO AS-2009D LI-ION 3S2P PANASONIC 6 CELL 4400MAH MAIN COMMON 2.2CG , ID: AS09D71 BT.00605.041 1 BATTERY SIMPLO AS-2009D LI-ION 3S2P LGC 6 CELL 4400MAH MAIN COMMON 2.2S3 , ID: AS09D73 BT.00607.078 1 BATTERY SIMPLO AS-2009D LI-ION 3S2P SAMSUNG 6 CELL 4400MAH MAIN COMMON 2.2F , ID: AS09D75 BT.00607.079 1 BATTERY SANYO AS-2009D LI-ION 3S2P SANYO 6 CELL 5200MAH MAIN COMMON BT.00603.079 1 BATTERY PANASONIC LI-ION 3S2P PANASONIC 6 CELL 5800MAH MAIN COMMON BT.00605.038 BOARDS 1 BLUETOOTH BOARD FOXCONN BCM2045 V2 T60H928.11 1 CARD READER BOARD UMA 5 IN 1-BUILD IN W/RTC BATTERY & CARD READER CABLE WITH LOCK TOUCHPAD BUTTON 55.PBB01.005 1 CRT BOARD UMA 55.PBB01.004 1 MINI BOARD UMA/DIS NON-3G 1 MULTI MEDIA BUTTON BOARD NS-JM4151-AQ 56.41010.201 1 MULTI MEDIA BUTTON BOARD NS-JM4151-CY 56.41010.211 118 Chapter 6 1 POWER BUTTON BOARD UMA W/CABLE 55.PBB01.006 1 TOUCHPAD BOARD SYNAPTICS TM-01277-001 56.17010.211 1 TOUCHPAD BOARD ALPS KGDFF0040A 56.17025.101 1 WIRELESS LAN BOARD 802.11BGN QMI EM303-AR ATHEROS AR5B91 1X2 MINICARD 54.03346.001 1 WIRELESS LAN BOARD 802.11BGN FOXCONN T77H053.00 ATHEROS AR5B91 1X2 54.03345.011 CABLES 1 BLUETOOTH BOARD CABLE 50.4CR04.021 1 BLUETOOTH BOARD CABLE 50.4CR04.001 1 BLUETOOTH BOARD CABLE 50.4CR04.011 2 CARD READER BOARD CABLE 50.4CR08.011 2 CARD READER BOARD CABLE 50.4CR08.001 2 CRT BOARD CABLE 32PIN 50.4CR09.011 2 CRT BOARD CABLE 32PIN 50.4CR09.001 2 CRT BOARD CABLE 40PIN 50.4CR10.011 2 CRT BOARD CABLE 40PIN 50.4CR10.001 2 LED LCD/CAMERA/MICROPHONE CABLE 50.4CR03.021 2 LED LCD/CAMERA/MICROPHONE CABLE 50.4CR03.001 2 LED LCD/CAMERA/MICROPHONE CABLE 50.4CR03.011 1 MULTI MEDIA BUTTON BOARD CABLE 50.4CR11.011 1 MULTI MEDIA BUTTON BOARD CABLE 50.4CR11.001 2 POWER BUTTON CABLE 50.4CR05.021 2 POWER BUTTON CABLE 50.4CR05.001 2 POWER BUTTON CABLE 50.4CR05.011 1 POWER CORD 3A 250V 3PIN UK 27.03118.001 1 POWER CORD 5A 250V 3PIN UK BK 27.01518.541 1 POWER CORD 2.5A 125V USA 27.01518.781 1 POWER CORD 10A 250V SWISS 27.01518.691 1 POWER CORD 10A 250V 3PIN SWISS BK 27.01518.581 1 POWER CORD 10A 250V ARGENTINE 27.01518.0U1 1 POWER CORD 10A 125V US 27.01518.641 1 POWER CORD 10A 125V 3PIN US BK 27.01518.521 1 POWER CORD 7A 250V 2PIN KOREAN 27.01518.531 1 POWER CORD 7A 125V 2PIN JAPAN 27.01518.551 1 POWER CORD 10A 3PIN BK DENMARK 27.01518.671 1 POWER CORD 10A 250V 3PIN DENMARK BK 27.01518.561 1 POWER CORD 10A 250V 3PIN BK SOUTH AFRICA 27.01518.681 Category No. Part Name Acer Part No. Chapter 6 119 CABLES 1 POWER CORD 16A 250V SOUTH AFRICA BK 27.01518.571 1 POWER CORD 10A 250V 3PIN CHINA 27.01518.701 1 POWER CORD 10A 250V 3PIN CHINA BK 27.01518.591 1 POWER CORD 250V 3PIN EUR BK 27.01518.731 1 POWER CABLE 16A 250V 3PIN EUR BK 27.01518.601 1 POWER CORD 10A 250V 3PIN ITALY 27.01518.711 1 POWER CORD 10A 250V 3PIN ITALY BK 27.01518.611 1 POWER CORD 2.5A 250V AUSTRALIA 27.01518.621 1 POWER CORD 2.5A 250V SOUTH AFRICA BK (INDIA) 27.01518.721 1 POWER CORD 10A 250V SOUTH AFRICA BK (INDIA) 27.01518.631 1 POWER CORD 7A 125V 2PIN JAPAN BK 27.01518.661 1 POWER CORD 250V 10A 3PIN ISRAEL 27.01518.761 1 POWER CORD 2.5A 125V USA 27.01518.A11 1 POWER CORD 2.5A 125V 1.8M BLACK TAIWANESE 27.01518.781 1 POWER CORD 10A 250V 1.8M BRAZIL BLK 27.01518.A41 1 POWER CORD ACA / ACNZ 27.03218.051 1 POWER CORD 7.5A 250V 3P AUSTRALIA BK 27.03218.021 1 POWER CODE 7A 125V 2PIN JAPAN 27.03518.161 2 TOUCHPAD BOARD CABLE RESERVE CAMERA 2 CAMERA 1.0M SUYIN CN1014-S36D-OV05 LAVENDER_G 56.18007.273 2 CAMERA 1.0M CHICONY CNF911321004970L 56.18012.113 CASE/COVER/BRACKET ASSEMBLY 2 DVD-RW SUPER-MULTI BEZEL FOR GBAS 42.PBB01.002 2 DVD-RW SUPER-MULTI BEZEL NONE GBAS 42.PBB01.003 2 HDD BRACKET 2.5 "33.PBB01.002 2 LCD BEZEL 15.6" NONE FLUSH W/LOGO & CAMERA HOLE 60.PBB01.004 2 LED LCD BEZEL CAP LEFT 42.PBB01.004 2 LED LCD BEZEL CAP RIGHT 42.PBB01.005 Category No. Part Name Acer Part No. 120 Chapter 6 2 LED LCD COVER 15.6" ALUMINUM SLIVER W/ ANTENNA*2 & MICROPHONE 60.PBB01.005 2 LED LCD HINGE LEFT 34.4CR01.011 2 LED LCD HINGE LEFT 34.4CR01.001 2 LED LCD HINGE RIGHT 34.4CR02.011 2 LED LCD HINGE RIGHT 34.4CR02.001 1 LOWER CASE 60.PBB01.001 2 OPTICAL BRACKET 33.PBB01.001 1 UNITLOAD COVER 42.PBB01.001 1 UPPER CASE SLIVER W/TOUCHPAD BOARD CABLE & SPEAKER (NONE 3G) 60.PBB01.002 DVD-RW DRIVE 1 DVD-RW SUPER-MULTI MODULE 8X 9.5MM SATA FOR GBAS 6M.PBB01.001 2 ODD TOSHIBA SUPER-MULTI DRIVE 8X 9.5MM TRAY DL TS-U633A LF SATA GBAS2.0 W/O BEZEL KU.0080D.046 2 ODD HLDS SUPER-MULTI DRIVE 8X 9.5MM TRAY DL GU10N LF W/O BEZEL FW:AP03 HF SATA KU.00801.031 1 DVD-RW SUPER-MULTI MODULE 8X 9.5MM SATA NONE GBAS 6M.PBB01.002 2 ODD PANASONIC SUPER-MULTI DRIVE 8X 9.5MM TRAY DL UJ862 LF W/O BEZEL SATA NON GBASE KU.00807.069 2 ODD PANASONIC SUPER-MULTI DRIVE 8X 9.5MM TRAY DL UJ862AC LF W/O BEZEL SATA NON GBASE FW1.10 KU.00807.067 Category No. Part Name Acer Part No. Chapter 6 121 HDD/HARDDISKDRIVE 2 HDD 160GB 5400RPM SATA SEAGATE ST9160310AS F/ W:2010 KH.16008.022 2 HDD 160GB 5400RPM SATA SEAGATE ST9160310AS F/ W:2010 KH.16001.034 2 HDD 160GB 5400RPM SATA TOSHIBA LIBRA-BS MK1655GSX F/W:FG0101J 5.4 KH.16001.034 2 HDD 160GB 5400RPM 2.5" SATA HGST HTS543216L9A300 F/W:C30C KH.16004.006 2 HDD 160GB 5400RPM 2.5" SATA WD WD1600BEVT22ZCT0 FW:11.01A11 KH.16007.019 2 HDD 250GB 5400RPM SATA HGST HTS545025B9A300 PANTHER-B LF KH.25008.021 2 HDD 2.5" 5400RPM 250GB SEAGATE ST9250315AS WYATT SATA LF F/W:0001SDM1 KH.25007.015 2 HDD 250GB 5400RPM SATA TOSHIBA LIBRA-BS MK2555GSX F/W:FG000J 5.4K KH.25001.016 HDD/HARDDISKDRIVE 2 HDD 250GB 5400RPM SATA WD WD2500BEVT-22ZCT0 F/ W:11.01A11 KH.25004.003 2 HDD 320GB 5400RPM SATA SEAGATE ST9320320AS F/ W:2010 KH.32008.013 2 HDD 320GB 5400RPM SATA TOSHIBA MK3255GSX LIBRA LF F/W:FG010J KH.32001.008 2 HDD 320GB 5400RPM SATA HGST HTS545032B9A300 PANTHER B LF KH.32004.002 2 HDD 320GB 5400RPM SATA WD WD3200BEVT-22ZCT0 ML125 F/W:01.01A01 KH.32007.007 2 HDD 500GB 5400RPM SEAGATE ST9500325AS SATA LF F/W:0001SDM1 KH.50008.013 2 HDD 2.5" 5400RPM 500GB TOSHIBA MK5055GSX LIBRA SATA LF F/W:FG001J KH.50001.011 2 HDD 500GB 5400RPM HGST SATA HTS545050B9A300 PANTHER B LF KH.50004.001 2 HDD 500GB 5400RPM WD SATA WD5000BEVT-22ZAT0 F/ W:01.01A01 KH.50007.009 HEATSINK 1 CPU HEATSINK UMA W/FAN 60.4CR10.001 1 CPU HEATSINK UMA W/FAN 60.4CR08.001 KEYBOARD 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY UK KB.I170A.082 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY SWISS/G KB.I170A.079 1 KEYBOARD 103KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY CHINESE KB.I170A.063 1 KEYBOARD 103KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY THAILAND KB.I170A.080 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY PORTUGUESE KB.I170A.074 1 KEYBOARD 103KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY ARABIC KB.I170A.059 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY DANISH KB.I170A.064 Category No. Part Name Acer Part No. 122 Chapter 6 KEYBOARD 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY ITALIAN KB.I170A.070 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY FRENCH KB.I170A.066 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY GERMAN KB.I170A.067 1 KEYBOARD 103KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY US INTERNATIONAL W/ HEBREW KB.I170A.084 1 KEYBOARD 107KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY JAPANESE KB.I170A.071 1 KEYBOARD 103KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY GREEK KB.I170A.068 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY NORWEGIAN KB.I170A.073 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY HUNGARIAN KB.I170A.069 1 KEYBOARD 103KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY RUSSIAN KB.I170A.075 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY SPANISH KB.I170A.077 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY TURKISH KB.I170A.081 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY SWEDEN KB.I170A.078 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY CZ/SK KB.I170A.062 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY BELGIUM KB.I170A.060 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY BRAZILIAN PORTUGUESE KB.I170A.061 1 KEYBOARD 103KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY US INTERNATIONAL KB.I170A.083 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY SLO/CRO KB.I170A.076 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY NORDIC KB.I170A.072 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY FR/ARABIC KB.I170A.065 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY US W/ CANADIAN FRENCH KB.I170A.085 LCD 1 LED LCD MODULE 15.6" WXGA GLARE ALUMINUM SLIVER W/ANTENNA*2&CAMERA 1.0M NONE 3G&FLUSH 6M.PBB01.003 2 LED LCD AUO 15.6"W WXGA GLARE B156XW03 V1 LF 220NIT 8MS 500:1 LK.15608.003 2 LED LCD LPL 15.6"W WXGA GLARE LP156WH3-TLA1 LF 200NIT 8MS 500:1 LK.15605.004 MAINBOARD 1 MAINBOARD JM41/51 UMA GS45 ICH9M CPU INTEL PENTIUM SINGLE-CORE SU2700 1.3G 2M 800 10W W/ CARD READER BOARD CABLE&CRT BOARD CABLE 32PIN&40PIN W/O MEMORY NONE 3G MB.PDM01.001 Category No. Part Name Acer Part No. Chapter 6 123 MEMORY 1 SODIMM 1GB DDRIII 1066MHZ SAMSUNG M471B2873EH1-CF8 KN.1GB0B.019 1 SODIMM 1GB DDRIII 1066MHZ MICRON MT8JSF12864HY-1G1D1 KN.1GB0B.028 1 SODIMM 1GB DDRLLL 1066MHZ ELPIDA EBJ11UE6BBS0- AE-F KN.1GB04.003 1 SODIMM 1GB DDRIII 1066MHZ SAMSUNG M471B2874DZ1-CF8 KN.1GB09.011 1 SODIMM 2GB DDRIII 1066MHZ SAMSUNG M471B5673DZ1-CF8 KN.2GB0B.012 1 SODIMM 2GB DDRIII 1066MHZ MICRON MT16JSF25664HY-1G1D1 KN.2GB0B.005 1 SODIMM 2GB DDRLLL 1066MHZ ELPIDA EBJ21UE8BBS0- AE-F KN.2GB04.004 1 SODIMM 2GB DDRIII 1066MHZ SAMSUNG M471B5673EH1-CF8 KN.2GB09.004 MICROPHONE 3 MICROPHONE RESERVE MISCELLANEOUS 1 LCD SCREW RUBBER NONE FLUSH 47.PBB01.001 1 NAME PLATE 5810TZ 40.4CR37.011 1 NAME PLATE 5810TZ 40.4CR37.001 SCREWS 1 SCREW M2 X L4 86.00E13.524 1 SCREW M2.5 X L6 CR+3 86.00E69.736 1 SCREW M2.5X4 NYLOK RED B-ZN 86.00K04.734 1 SCREW M2.5 X L2.5 NYLOK 86.00K60.630 1 SCREW M2.5 X L11 NYLOK 86.1A353.110 1 SCREW M3 X L4 86.9A524.4R0 1 SCREW WAFER NYLOK NI M2 X L3 86.9A552.3R0 1 SCREW M2 X L2.5 NYLOK 86.9A562.2R5 1 SCREW M2.5 X L3.5 86.9A563.3R5 SPEAKER 2 SPEAKER 23.PBB01.001 Category No. Part Name Acer Part No. 124 Chapter 6 3. AS5810TG_M92LP512Css_V3 Category No. Part Name Acer Part No. ADAPTER 1 ADAPTER 65W 19V GREEN DELTA ADP-65JH DB A 1.7X5.5X11 YELLOW LV5 LED LF AP.06503.026 1 ADAPTER 65W 19V GREEN LITEON PA-1650-22AC 1.7X5.5X11 YELLOW LV5 LED LF AP.0650A.013 1 ADAPTER 65W 19V GREEN HIPRO HP-A0652R3B 1.7X5.5X11 YELLOW 1LF LV5 LED LF AP.06501.027 BATTERY 1 BATTERY SANYO AS-2009D LI-ION 3S2P SANYO 6 CELL 4400MAH MAIN COMMON ID: AS09D31 BT.00604.039 1 BATTERY SONY AS-2009D LI-ION 3S2P SONY 6 CELL 4400MAH MAIN COMMON ID : AS09D41 BT.00604.043 1 BATTERY SONY AS-2009D LI-ION 3S2P SANYO 6 CELL 4400MAH MAIN COMMON AS09D41 BT.00605.041 1 BATTERY PANASONIC AS-2009D LI-ION 3S2P PANASONIC 6 CELL 4400MAH MAIN COMMON ID: AS09D51 BT.00607.078 1 BATTERY SIMPLO AS-2009D LI-ION 3S2P PANASONIC 6 CELL 4400MAH MAIN COMMON 2.2CG , ID: AS09D71 BT.00607.079 1 BATTERY SIMPLO AS-2009D LI-ION 3S2P LGC 6 CELL 4400MAH MAIN COMMON 2.2S3 , ID: AS09D73 BT.00607.080 1 BATTERY SIMPLO AS-2009D LI-ION 3S2P SAMSUNG 6 CELL 4400MAH MAIN COMMON 2.2F , ID: AS09D75 BT.00603.082 1 BATTERY SANYO AS-2009D LI-ION 3S2P SANYO 6 CELL 5200MAH MAIN COMMON BT.00603.079 1 BATTERY SIMPLO AS-2009D LI-ION 3S2P SAMSUNG 6 CELL 5600MAH MAIN COMMON ID : AS09D70 BT.00607.080 1 BATTERY SANYO AS-2009D LI-ION 3S2P SANYO 6 CELL 5600MAH MAIN COMMON BT.00607.082 1 BATTERY PANASONIC LI-ION 3S2P PANASONIC 6 CELL 5800MAH MAIN COMMON BT.00605.038 BOARD 1 BLUETOOTH BOARD FOXCONN BCM2045 V2 T60H928.11 BT.21100.005 1 CARD READER BOARD UMA/DIS 5 IN 1-BUILD IN W/RTC BATTERY WITH LOCK TOUCHPAD BUTTON 55.PBB01.005 1 CRT BOARD DIS W/CRT BOARD CABLE 40PIN 55.PDU01.002 1 MINI BOARD UMA/DIS NON-3G 55.PDU01.001 1 MULTI MEDIA BUTTON BOARD NS-JM4151-CY 55.PBB01.001 1 MULTI MEDIA BUTTON BOARD NS-JM4151-AQ 55.PBB01.002 1 POWER BUTTON BOARD 55.PBB01.006 Chapter 6 125 1 TOUCHPAD BOARD ALPS KGDFF0040A 56.PBB01.001 1 TOUCHPAD BOARD SYNAPTICS TM-01277-001 56.PBB01.002 1 WIRELESS LAN BOARD 512AN_HMWG SHIRLEY PEAK 5100 MM#895373 KI.SPH01.003 1 WIRELESS LAN BOARD INTEL 512AG_HMWG SHIRLEYPEAK1*2 5100 MM#897072 KI.SPH01.005 1 WIRELESS LAN BOARD 512AN_MMWG SHIRLEY PEAK 5100 MM#895361 KI.SPM01.003 1 WIRELESS LAN BOARD 512AG_MMWG SHIRLEY PEAK 5100 MM#897004 KI.SPM01.005 CABLE 1 BLUETOOTH BOARD CABLE 50.PBB01.002 2 LED LCD/CAMERA/MICROPHONE CABLE 50.PBB01.003 1 MULTI MEDIA BUTTON BOARD CABLE 50.PBB01.001 1 POWER BUTTON BOARD CABLE 50.PDU01.001 1 POWER CORD 10A 125V US 27.01518.641 1 POWER CORD 10A 125V 3PIN US BK 27.T30V1.001 1 POWER CORD 250V 3PIN EUR BK 27.01518.731 1 POWER CORD 16A 250V 3PIN EUR BK 27.T30V1.004 1 POWER CORD 3A 250V 3PIN UK 27.03118.001 1 POWER CORD 5A 250V 3PIN UK BK 27.01518.541 1 POWER CORD 10A 3PIN BK DENMARK 27.01518.671 1 POWER CORD 10A 250V 3PIN DENMARK BK 27.01518.561 1 POWER CORD 10A 250V SWISS 27.01518.691 1 POWER CORD 10A 250V 3PIN SWISS BK 27.01518.581 CABLE 1 POWER CORD 10A 250V 3PIN ITALY 27.01518.711 1 POWER CORD 10A 250V 3PIN ITALY BK 27.01518.611 1 POWER CORD 10A 250V 3PIN BK SOUTH AFRICA 27.01518.681 1 POWER CORD 16A 250V SOUTH AFRICA BK 27.01518.571 1 POWER CORD 2.5A 250V AUSTRALIA 1 POWER CORD ACA / ACNZ 27.03218.051 1 POWER CORD 7.5A 250V 3P AUSTRALIA BK 27.03218.021 1 POWER CORD 2.5A 250V SOUTH AFRICA BK (INDIA) 27.01518.721 1 POWER CORD 10A 250V SOUTH AFRICA BK (INDIA) 27.01518.631 1 POWER CORD 7A 125V 2PIN JAPAN 27.01518.661 1 POWER CORD 7A 125V 2PIN JAPAN BK 27.03518.161 1 POWER CODE 7A 125V 2PIN JAPAN 27.01518.551 1 POWER CORD 10A 250V 3PIN CHINA 27.01518.701 1 POWER CORD 10A 250V 3PIN CHINA BK 27.01518.591 1 POWER CORD 2.5A 125V USA 27.01518.A11 1 POWER CORD 2.5A 125V 1.8M BLACK TAIWANESE 27.01518.781 1 POWER CORD 250V 10A 3PIN ISRAEL 27.01518.761 1 POWER CORD 10A 250V ARGENTINE 27.01518.0U1 1 POWER CORD 10A 250V 1.8M BRAZIL BLK 27.01518.A41 126 Chapter 6 CAMERA 2 CAMERA 1.0M CHICONY CNF911321004970L 57.PBB01.001 2 CAMERA 1.0M SUYIN CN1014-S36D-OV05 LAVENDER_G 57.PBB01.002 CASE/COVER/BRACKET ASSEMBLY 1 CARD READER DUMMY CARD 42.TQ901.003 2 DVD-RW SUPER-MULTI BEZEL FOR GBAS 42.PBB01.002 2 DVD-RW SUPER-MULTI BEZEL NONE GBAS 42.PBB01.003 1 HDD BRACKET 2.5 "33.PBB01.002 2 LCD BEZEL 15.6" NONE FLUSH W/LOGO & CAMERA HOLE FOR JAPAN 60.PDU01.003 2 LCD BEZEL 15.6" NONE FLUSH W/LOGO & CAMERA HOLE 60.PBB01.004 2 2 LED LCD BEZEL CAP LEFT 42.PBB01.004 LED LCD BEZEL CAP RIGHT 42.PBB01.005 2 LED LCD HINGE LEFT 33.PBB01.003 2 LED LCD HINGE RIGHT 33.PBB01.004 2 LED LCD COVER 15.6" ALUMINUM SLIVER W/ANTENNA*2 & MICROPHONE W/O HINGE 60.PBB01.005 1 LOWER CASE FOR DIS 60.PDU01.001 2 OPTICAL BRACKET 33.PBB01.001 1 UNITLOAD COVER 42.PBB01.001 1 UPPER CASE SLIVER W/TOUCHPAD BOARD CABLE & SPEAKER (NONE 3G) 60.PBB01.002 Chapter 6 127 DVD-RW DRIVE 1 DVD-RW SUPER-MULTI MODULE 8X 9.5MM SATA FOR GBAS 6M.PBB01.001 1 DVD-RW SUPER-MULTI MODULE 8X 9.5MM SATA NONE GBAS 6M.PBB01.002 2 ODD TOSHIBA SUPER-MULTI DRIVE 8X 9.5MM TRAY DL TS-U633A LF SATA GBAS2.0 W/O BEZEL KU.0080D.046 2 ODD HLDS SUPER-MULTI DRIVE 8X 9.5MM TRAY DL GU10N LF W/O BEZEL FW:AP03 HF SATA KU.00801.031 2 ODD PANASONIC SUPER-MULTI DRIVE 8X 9.5MM TRAY DL UJ862 LF W/O BEZEL SATA NON GBASE KU.00807.069 2 ODD PANASONIC SUPER-MULTI DRIVE 8X 9.5MM TRAY DL UJ862AC LF W/O BEZEL SATA NON GBASE FW1.10 KU.00807.067 HDD/HARD DISK DRIVE 1 HDD 160GB 5400RPM SATA SEAGATE ST9160310AS F/ W:2010 KH.16001.034 1 HDD 160GB 5400RPM SATA TOSHIBA LIBRA-BS MK1655GSX F/W:FG0101J 5.4 KH.16004.006 1 HDD 160GB 5400RPM 2.5" SATA HGST HTS543216L9A300 F/W:C30C KH.16007.019 1 HDD 160GB 5400RPM 2.5" SATA WD WD1600BEVT22ZCT0 FW:11.01A11 KH.16008.022 1 HDD 2.5" 5400RPM 250GB SEAGATE ST9250315AS WYATT SATA LF F/W:0001SDM1 KH.25001.016 1 HDD 250GB 5400RPM SATA TOSHIBA LIBRA-BS MK2555GSX F/W:FG000J 5.4K KH.25004.003 1 HDD 250GB 5400RPM SATA HGST HTS545025B9A300 PANTHER-B LF KH.25007.015 1 HDD 250GB 5400RPM SATA WD WD2500BEVT-22ZCT0 F/ W:11.01A11 KH.25008.021 1 HDD 320GB 5400RPM SATA SEAGATE ST9320320AS F/ W:2010 KH.32001.008 1 HDD 320GB 5400RPM SATA TOSHIBA MK3255GSX LIBRA LF F/W:FG010J KH.32004.002 1 HDD 320GB 5400RPM SATA HGST HTS545032B9A300 PANTHER B LF KH.32007.007 1 HDD 320GB 5400RPM SATA WD WD3200BEVT-22ZCT0 ML125 F/W:01.01A01 KH.32008.013 1 HDD 500GB 5400RPM SEAGATE ST9500325AS SATA LF F/ W:0001SDM1 KH.50001.011 1 HDD 2.5" 5400RPM 500GB TOSHIBA MK5055GSX LIBRA SATA LF F/W:FG001J KH.50004.001 1 HDD 500GB 5400RPM HGST SATA HTS545050B9A300 PANTHER B LF KH.50007.009 1 HDD 500GB 5400RPM WD SATA WD5000BEVT-22ZAT0 F/ W:01.01A01 KH.50008.013 HEATSINK 1 CPU HEATSINK DIS W/FAN 60.PDU01.002 KEYBOARD 1 KEYBOARD 103KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY ARABIC KB.I170A.059 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY BELGIUM KB.I170A.060 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY BRAZILIAN PORTUGUESE KB.I170A.061 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY CZ/SK KB.I170A.062 128 Chapter 6 KEYBOARD 1 KEYBOARD 103KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY CHINESE KB.I170A.063 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY DANISH KB.I170A.064 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY FR/ARABIC KB.I170A.065 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY FRENCH KB.I170A.066 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY GERMAN KB.I170A.067 1 KEYBOARD 103KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY GREEK KB.I170A.068 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY HUNGARIAN KB.I170A.069 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY ITALIAN KB.I170A.070 1 KEYBOARD 107KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY JAPANESE KB.I170A.071 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY NORDIC KB.I170A.072 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY NORWEGIAN KB.I170A.073 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY PORTUGUESE KB.I170A.074 1 KEYBOARD 103KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY RUSSIAN KB.I170A.075 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY SLO/CRO KB.I170A.076 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY SPANISH KB.I170A.077 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY SWEDEN KB.I170A.078 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY SWISS/G KB.I170A.079 1 KEYBOARD 103KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY THAILAND KB.I170A.080 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY TURKISH KB.I170A.081 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY UK KB.I170A.082 1 KEYBOARD 103KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY US INTERNATIONAL KB.I170A.083 1 KEYBOARD 103KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY US INTERNATIONAL W/ HEBREW KB.I170A.084 1 KEYBOARD 104KEYS AC7G JM51/JM70 INTERNAL 17 STANDARD BLACK UV GLOSSY US W/ CANADIAN FRENCH KB.I170A.085 Chapter 6 129 LCD 1 LED LCD MODULE 15.6" WXGA GLARE ALUMINUM SLIVER W/ANTENNA*2&CAMERA 1.0M NONE 3G&FLUSH 6M.PBB01.003 2 LED LCD AUO 15.6"W WXGA GLARE B156XW03 V1 LF 220NIT 8MS 500:1 LK.15605.004 2 LED LCD LPL 15.6"W WXGA GLARE LP156WH3-TLA1 LF 200NIT 8MS 500:1 LK.15608.003 1 LED LCD MODULE 15.6" WXGA GLARE ALUMINUM SLIVER W/ANTENNA*2&CAMERA 1.0M NONE 3G&FLUSH FOR JAPAN 6M.PDU01.001 2 LED LCD AUO 15.6"W WXGA GLARE B156XW03 V1 LF 220NIT 8MS 500:1 LK.15605.004 2 LED LCD LPL 15.6"W WXGA GLARE LP156WH3-TLA1 LF 200NIT 8MS 500:1 LK.15608.003 MAINBOARD 1 MAINBOARD JM41/51 DIS GS45 ICH9M VRAM DDRIII 800 1GB CPU INTEL CORE2SOLO SU3500 BGA 1.4G 3M 800 5.5W ULV LF W/CARD READER BOARD CABLE&CRT BOARD CABLE 20PIN W/O MEMORY NONE 3G MB.PDU01.002 1 MAINBOARD JM41/51 DIS GS45 ICH9M VRAM DDRIII 800 1GB CPU INTEL CORE2DUAL SU9400 BGA 3M 800 ULV R0 LF W/CARD READER BOARD CABLE&CRT BOARD CABLE 20PIN W/O MEMORY MB.PDU01.001 MEMORY 1 SODIMM 1G DDRIII 1066MHZ NANYA NT1GC64BH8A1PSBE LF 64*16 0.07UM KN.1GB03.031 1 SODIMM 1GB DDRIII 1066MHZ ELPIDA EBJ11UE6BAU0- AE-E LF 64*16 0.07UM KN.1GB09.009 1 SODIMM 1GB DDRLLL 1066MHZ ELPIDA EBJ11UE6BBS0- AE-F KN.1GB09.011 1 SODIMM 1GB DDRIII 1066MHZ SAMSUNG M471B2874DZ1-CF8 KN.1GB0B.019 1 SODIMM 1GB DDRIII 1066MHZ SAMSUNG M471B2873EH1-CF8 KN.1GB0B.028 1 SODIMM 2GB DDRIII 1066MHZ NANYA NT2GC64B8HA1NS-BE LF 128*8 0.07UM KN.2GB03.012 1 SODIMM 2GB DDRIII 1066MHZ ELPIDA EBJ21UE8BAU0- AE-E KN.2GB09.002 1 SODIMM 2GB DDRIII 1066MHZ ELPIDA EBJ21UE8BBS0- AE-F KN.2GB09.004 1 SODIMM 2GB DDRIII 1066MHZ SAMSUNG M471B5673DZ1-CF8 KN.2GB0B.005 1 SODIMM 2GB DDRIII 1066MHZ SAMSUNG M471B5673EH1-CF8 KN.2GB0B.012 MEMORY 1 SODIMM 2GB DDRIII 1066MHZ HYNIX HMT125S6AFP8CG7N0 KN.2GB0G.009 1 SODIMM 2GB DDRIII 1066MHZ HYNIX HMT125S6BFR8CG7 N0 LF 128*8 0.055UM KN.2GB0G.014 MISCELLANEOUS 1 NAME PLATE 5810T 40.PBB01.001 1 LCD SCREW RUBBER NONE FLUSH 47.PBB01.001 130 Chapter 6 SCREW 1 SCREW M2 X L4 86.00E13.524 1 SCREW M2.5 X L6 NYLOK 86.00E33.736 1 SCREW M2.5 X L3 NYLOK 86.W2301.006 1 SCREW M2.5 X L4 NYLOK RED B-ZN 86.00K04.734 1 SCREW M2.5 X L2.5 NYLOK 86.00K60.630 1 SCREW M2.5 X L4 HALF NYLOK 86.00K61.534 1 SCREW M2.5 X L6 HALF NYLOK 86.00K62.536 1 SCREW M2.5 XL11 NYLOK 86.1A353.110 1 SCREW M3 X L4 86.9A524.4R0 1 SCREW 2M X L3 WAFER NYLOK NI 86.9A552.3R0 1 SCREW M2 X 2.5 NYLOK 86.9A562.2R5 1 SCREW M2.5 X L3.5 86.9A563.3R5 SPEAKER 2 SPEAKER 23.PBB01.001 Appendix A 117 Model Definition and Configuration Appendix A Appendix A 118 Aspire 5810T/5810TZ/5410T/5810TG Series Model RO Country Acer Part No Description CPU LCD VGA Chip VRAM 1 Memory 1 Memory 2 HDD 1(GB) ODD Card Reader Wireless LAN Wireless LAN1 Bluetooth Battery Adapter Camera AS5810TG- 354G32Mn EMEA Eastern Europe LX.PDU0X.054 AS5810TG-354G32Mn VHP32ATEU7 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_SL11 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 354G32Mn EMEA Finland LX.PDU0X.055 AS5810TG-354G32Mn VHP32ATFI2 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_FI11 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 354G32Mn EMEA France LX.PDU0X.056 AS5810TG-354G32Mn VHP32ATFR1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_FR23 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 354G32Mn EMEA Italy LX.PDU0X.059 AS5810TG-354G32Mn VHP32ATIT1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_IT12 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 354G32Mn EMEA Israel LX.PDU0X.058 AS5810TG-354G32Mn VHP32ATIL1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_HE12 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 354G32Mn EMEA Greece LX.PDU0X.057 AS5810TG-354G32Mn VHP32ATGR1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_EL32 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 354G32Mn EMEA Luxembou rg LX.PDU0X.060 AS5810TG-354G32Mn VHP32ATLU3 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_IT41 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 354G32Mn EMEA Middle East LX.PDU0X.062 AS5810TG-354G32Mn EM VHP32ATME2 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_AR23 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 354G32Mn EMEA Middle East LX.PDU0X.053 AS5810TG-354G32Mn EM VHP32ATME3 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_FR23 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 354G32Mn EMEA Ukraine LX.PDU0X.046 AS5810TG-354G32Mn VHP32ATUK1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_RU11 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 354G32Mn EMEA Poland LX.PDU0X.067 AS5810TG-354G32Mn VHP32ATPL1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_PL11 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 354G32Mn EMEA Holland LX.PDU0X.068 AS5810TG-354G32Mn VHP32ATNL1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_NL12 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 354G32Mn EMEA Middle East LX.PDU0X.065 AS5810TG-354G32Mn EM VHP32ATME6 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_EN15 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 354G32Mn EMEA Middle East LX.PDU0X.052 AS5810TG-354G32Mn EM VHP32ATME4 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_RU61 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 354G32Mn EMEA Middle East LX.PDU0X.064 AS5810TG-354G32Mn EM VHP32ATME4 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_EN11 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 354G32Mn EMEA Middle East LX.PDU0X.063 AS5810TG-354G32Mn EM VHP32ATME2 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_EN15 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 354G32Mn EMEA Middle East LX.PDU0X.061 AS5810TG-354G32Mn EM VHP32ATME2 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_AR13 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 354G32Mn EMEA Turkey LX.PDU0X.044 AS5810TG-354G32Mn EM VHP32ATTR1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_TR33 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 354G32Mn EMEA Sweden LX.PDU0X.045 AS5810TG-354G32Mn VHP32ATSE1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_FI13 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 354G32Mi EMEA Russia LX.PDU0X.050 AS5810TG-354G32Mi VHP32ATRU1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_abg_1.0D_AL_RU11 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2MAB G BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 354G32Mn EMEA Portugal LX.PDU0X.051 AS5810TG-354G32Mn VHP32ATPT1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_PT12 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 354G32Mn EMEA Middle East LX.PDU0X.066 AS5810TG-354G32Mn EM VHP32ATME9 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_FR22 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 354G32Mn EMEA South Africa LX.PDU0X.047 AS5810TG-354G32Mn EM VHP32ATZA4 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_ENI1 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV 119 Appendix A AS5810TG- 354G32Mn EMEA South Africa LX.PDU0X.049 AS5810TG-354G32Mn EM VHP32ATZA2 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_EN16 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 354G32Mn EMEA South Africa LX.PDU0X.048 AS5810TG-354G32Mn EM VHP32ATZA1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_FR23 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Middle East LX.PDU0X.043 AS5810TG-944G32Mn EM VHP32ATME3 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_FR23 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Middle East LX.PDU0X.042 AS5810TG-944G32Mn EM VHP32ATME2 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_EN15 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Denmark LX.PDU0X.037 AS5810TG-944G32Mn VHP32ATDK1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_NO13 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Denmark LX.PDU0X.029 AS5810TG-944G32Mn VHP32ATDK2 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_ENS3 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Austria LX.PDU0X.028 AS5810TG-944G32Mn VHP32ATAT1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_DE11 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Spain LX.PDU0X.030 AS5810TG-944G32Mn VHP32ATES1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_ES22 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Eastern Europe LX.PDU0X.032 AS5810TG-944G32Mn VHP32ATEU5 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_PL13 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Eastern Europe LX.PDU0X.034 AS5810TG-944G32Mn VHP32ATEU7 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_ENR2 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Finland LX.PDU0X.036 AS5810TG-944G32Mn VHP32ATFI2 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_FI11 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA UK LX.PDU0X.038 AS5810TG-944G32Mn VHP32ATGB1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_EN14 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Middle East LX.PDU0X.019 AS5810TG-944G32Mn EM VHP32ATME4 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_RU61 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Belgium LX.PDU0X.020 AS5810TG-944G32Mn VHP32ATBE1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_NL13 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Switzerlan d LX.PDU0X.022 AS5810TG-944G32Mn VHP32ATCH1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_IT42 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Middle East LX.PDU0X.021 AS5810TG-944G32Mn EM VHP32ATME4 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_EN11 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Middle East LX.PDU0X.023 AS5810TG-944G32Mn EM VHP32ATME2 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_AR23 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Middle East LX.PDU0X.041 AS5810TG-944G32Mn EM VHP32ATME2 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_AR13 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Luxembou rg LX.PDU0X.024 AS5810TG-944G32Mn VHP32ATLU3 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_IT41 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Italy LX.PDU0X.040 AS5810TG-944G32Mn VHP32ATIT1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_IT12 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Israel LX.PDU0X.025 AS5810TG-944G32Mn VHP32ATIL1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_HE12 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Hungary LX.PDU0X.039 AS5810TG-944G32Mn VHP32ATHU1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_HU13 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Greece LX.PDU0X.026 AS5810TG-944G32Mn VHP32ATGR1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_EL32 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA France LX.PDU0X.027 AS5810TG-944G32Mn VHP32ATFR1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_FR23 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Eastern Europe LX.PDU0X.035 AS5810TG-944G32Mn VHP32ATEU7 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_SL11 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV Model RO Country Acer Part No Description CPU LCD VGA Chip VRAM 1 Memory 1 Memory 2 HDD 1(GB) ODD Card Reader Wireless LAN Wireless LAN1 Bluetooth Battery Adapter Camera Appendix A 120 AS5810TG- 944G32Mn EMEA Eastern Europe LX.PDU0X.033 AS5810TG-944G32Mn VHP32ATEU5 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_RO12 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Eastern Europe LX.PDU0X.031 AS5810TG-944G32Mn VHP32ATEU3 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_RU23 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA South Africa LX.PDU0X.006 AS5810TG-944G32Mn EM VHP32ATZA1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_FR23 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Portugal LX.PDU0X.009 AS5810TG-944G32Mn VHP32ATPT1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_PT12 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Sweden LX.PDU0X.010 AS5810TG-944G32Mn VHP32ATSE1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_FI13 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA South Africa LX.PDU0X.003 AS5810TG-944G32Mn EM VHP32ATZA4 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_ENI1 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Eastern Europe LX.PDU0X.015 AS5810TG-944G32Mn VHP32ATEU4 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_SV22 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Norway LX.PDU0X.007 AS5810TG-944G32Mn VHP32ATNO1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_NO12 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Holland LX.PDU0X.011 AS5810TG-944G32Mn VHP32ATNL1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_NL12 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Germany LX.PDU0X.016 AS5810TG-944G32Mn VHP32ATDE1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_DE13 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Czech LX.PDU0X.017 AS5810TG-944G32Mn VHP32ATCZ2 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_SK12 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA South Africa LX.PDU0X.004 AS5810TG-944G32Mn EM VHP32ATZA2 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_EN16 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mi EMEA Russia LX.PDU0X.008 AS5810TG-944G32Mi VHP32ATRU1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_abg_1.0D_AL_RU11 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2MAB G BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Poland LX.PDU0X.012 AS5810TG-944G32Mn VHP32ATPL1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_PL11 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Turkey LX.PDU0X.014 AS5810TG-944G32Mn EM VHP32ATTR1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_TR33 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Middle East LX.PDU0X.018 AS5810TG-944G32Mn EM VHP32ATME6 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_EN15 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Middle East LX.PDU0X.013 AS5810TG-944G32Mn EM VHP32ATME9 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_FR22 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 944G32Mn EMEA Ukraine LX.PDU0X.005 AS5810TG-944G32Mn VHP32ATUK1 MC M92LP512Css 2*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_RU11 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 352G32Mn TWN GCTWN LX.PDU0X.002 AS5810TG-352G32Mn VHP32ATTW1 MC M92LP512Css_V3 1*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_TC11 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 N N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 942G32Mn CHINA China LX.PDU0Y.003 AS5810TG-942G32Mn VHB32ATCN1 MC M92LP512Css_V3 2*1G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_SC11 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO1GBIII10 SO1GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 352G32Mn TWN GCTWN LX.PDU0Y.001 AS5810TG-352G32Mn VHB32ATTW1 MC M92LP512Css_V3 1*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_TC11 C2SSU3500B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 N N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 942G32Mn TWN GCTWN LX.PDU0X.001 AS5810TG-942G32Mn VHP32ATW1 MC M92LP512Css_V3 1*2G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_TC11 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO2GBIII10 N N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TG- 942G32Mn CHINA Hong Kong LX.PDU0Y.002 AS5810TG-942G32Mn VHB32ATHK2 MC M92LP512Css_V3 2*1G/320/BT/6L2.8/5R/ CB_n2_1.0D_AL_ZH31 C2DSU9400B NLED15.6W XGAGS M92LP 512M-DDR3 (64*16*4) SO1GBIII10 SO1GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Austria LX.PDM0X.078 AS5810TZ-273G25Mn VHP32ATAT1 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_DE11 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Belgium LX.PDM0X.081 AS5810TZ-273G25Mn VHP32ATBE1 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_NL13 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV Model RO Country Acer Part No Description CPU LCD VGA Chip VRAM 1 Memory 1 Memory 2 HDD 1(GB) ODD Card Reader Wireless LAN Wireless LAN1 Bluetooth Battery Adapter Camera 121 Appendix A AS5810TZ- 273G25Mn EMEA Germany LX.PDM0X.080 AS5810TZ-273G25Mn VHP32ATDE1 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_DE13 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Czech LX.PDM0X.079 AS5810TZ-273G25Mn VHP32ATCZ2 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_SK12 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Switzerlan d LX.PDM0X.085 AS5810TZ-273G25Mn VHP32ATCH1 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_IT42 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Denmark LX.PDM0X.083 AS5810TZ-273G25Mn VHP32ATDK2 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_ENS3 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Eastern Europe LX.PDM0X.082 AS5810TZ-273G25Mn VHP32ATEU3 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_RU23 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 274G25Mn EMEA France LX.PDM0X.087 AS5810TZ-274G25Mn VHP32ATFR1 MC UMACss 2*2G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_FR23 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Eastern Europe LX.PDM0X.076 AS5810TZ-273G25Mn VHP32ATEU7 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_ENR2 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Eastern Europe LX.PDM0X.075 AS5810TZ-273G25Mn VHP32ATEU5 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_RO12 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Eastern Europe LX.PDM0X.074 AS5810TZ-273G25Mn VHP32ATEU5 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_PL13 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Eastern Europe LX.PDM0X.077 AS5810TZ-273G25Mn VHP32ATEU4 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_SV22 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Spain LX.PDM0X.086 AS5810TZ-273G25Mn VHP32ATES1 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_ES22 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Denmark LX.PDM0X.084 AS5810TZ-273G25Mn VHP32ATDK1 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_NO13 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Middle East LX.PDM0X.060 AS5810TZ-273G25Mn EM VHP32ATME4 MC UMACss 2G+1G/250/6L2.8/5R/ CB_bgn_1.0D_AL_EN11 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA South Africa LX.PDM0X.054 AS5810TZ-273G25Mn EM VHP32ATZA1 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_FR23 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Turkey LX.PDM0X.053 AS5810TZ-273G25Mn EM VHP32ATTR1 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_TR33 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Ukraine LX.PDM0X.052 AS5810TZ-273G25Mn VHP32ATUK1 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_RU11 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA South Africa LX.PDM0X.047 AS5810TZ-273G25Mn EM VHP32ATZA2 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_EN16 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Middle East LX.PDM0X.063 AS5810TZ-273G25Mn EM VHP32ATME3 MC UMACss 2G+1G/250/6L2.8/5R/ CB_bgn_1.0D_AL_FR23 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Middle East LX.PDM0X.057 AS5810TZ-273G25Mn EM VHP32ATME9 MC UMACss 2G+1G/250/6L2.8/5R/ CB_bgn_1.0D_AL_FR22 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Sweden LX.PDM0X.048 AS5810TZ-273G25Mn VHP32ATSE1 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_FI13 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Middle East LX.PDM0X.058 AS5810TZ-273G25Mn EM VHP32ATME6 MC UMACss 2G+1G/250/6L2.8/5R/ CB_bgn_1.0D_AL_EN15 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Greece LX.PDM0X.070 AS5810TZ-273G25Mn VHP32ATGR1 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_EL32 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mi EMEA Russia LX.PDM0X.049 AS5810TZ-273G25Mi VHP32ATRU1 MC UMACss 2G+1G/250/6L2.8/5R/CB_bg_1.0D_AL_RU11 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi BG N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Portugal LX.PDM0X.051 AS5810TZ-273G25Mn VHP32ATPT1 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_PT12 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Poland LX.PDM0X.050 AS5810TZ-273G25Mn VHP32ATPL1 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_PL11 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Norway LX.PDM0X.055 AS5810TZ-273G25Mn VHP32ATNO1 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_NO12 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Holland LX.PDM0X.059 AS5810TZ-273G25Mn VHP32ATNL1 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_NL12 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Middle East LX.PDM0X.056 AS5810TZ-273G25Mn EM VHP32ATME4 MC UMACss 2G+1G/250/6L2.8/5R/ CB_bgn_1.0D_AL_RU61 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Middle East LX.PDM0X.061 AS5810TZ-273G25Mn EM VHP32ATME2 MC UMACss 2G+1G/250/6L2.8/5R/ CB_bgn_1.0D_AL_EN15 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Middle East LX.PDM0X.062 AS5810TZ-273G25Mn EM VHP32ATME2 MC UMACss 2G+1G/250/6L2.8/5R/ CB_bgn_1.0D_AL_AR23 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV Model RO Country Acer Part No Description CPU LCD VGA Chip VRAM 1 Memory 1 Memory 2 HDD 1(GB) ODD Card Reader Wireless LAN Wireless LAN1 Bluetooth Battery Adapter Camera Appendix A 122 AS5810TZ- 273G25Mn EMEA Middle East LX.PDM0X.064 AS5810TZ-273G25Mn EM VHP32ATME2 MC UMACss 2G+1G/250/6L2.8/5R/ CB_bgn_1.0D_AL_AR13 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Luxembou rg LX.PDM0X.069 AS5810TZ-273G25Mn VHP32ATLU3 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_IT41 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Italy LX.PDM0X.068 AS5810TZ-273G25Mn VHP32ATIT1 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_IT12 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Israel LX.PDM0X.065 AS5810TZ-273G25Mn VHP32ATIL1 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_HE12 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Hungary LX.PDM0X.067 AS5810TZ-273G25Mn VHP32ATHU1 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_HU13 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA UK LX.PDM0X.066 AS5810TZ-273G25Mn VHP32ATGB1 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_EN14 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA France LX.PDM0X.071 AS5810TZ-273G25Mn VHP32ATFR1 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_FR23 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Finland LX.PDM0X.072 AS5810TZ-273G25Mn VHP32ATFI2 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_FI11 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Eastern Europe LX.PDM0X.073 AS5810TZ-273G25Mn VHP32ATEU7 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_SL11 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA South Africa LX.PDM0X.046 AS5810TZ-273G25Mn EM VHP32ATZA4 MC UMACss 2G+1G/250/6L2.8/5R/CB_bgn_1.0D_AL_ENI1 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 272G32Mn AAP Australia/ New Zealand LX.PDM0X.045 AS5810TZ-272G32Mn VHP32ATAU1 MC UMACss 1*2G/320/BT/6L2.8/5R/CB_bgn_1.0D_AL_EN12 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 N N320GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G32Mn PA Canada LX.PDM0X.044 AS5810TZ-273G32Mn VHP32ATCA2 MC UMACss 2G+1G/320/6L2.8/5R/CB_bgn_1.0D_AL_ENJ1 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 272G32Mn CHINA China LX.PDM0Y.003 AS5810TZ-272G32Mn VHB32ATCN1 MC UMACss 2*1G/320/BT/6L2.8/5R/CB_bgn_1.0D_AL_SC11 PMSSU2700B NLED15.6W XGAGS UMA N SO1GBIII10 SO1GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 272G32Mn CHINA Hong Kong LX.PDM0Y.002 AS5810TZ-272G32Mn VHB32ATHK2 MC UMACss 2*1G/320/BT/6L2.8/5R/CB_bgn_1.0D_AL_ZH31 PMSSU2700B NLED15.6W XGAGS UMA N SO1GBIII10 SO1GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 272G25Mn TWN GCTWN LX.PDM0Y.001 AS5810TZ-272G25Mn VHB32ATTW1 MC UMACss 1*2G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_TC11 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 N N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA South Africa LX.PDM0X.042 AS5810TZ-273G25Mn EM VHP32ATZA2 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_EN16 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Norway LX.PDM0X.028 AS5810TZ-273G25Mn VHP32ATNO1 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_NO12 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Austria LX.PDM0X.031 AS5810TZ-273G25Mn VHP32ATAT1 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_DE11 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Czech LX.PDM0X.033 AS5810TZ-273G25Mn VHP32ATCZ2 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_SK12 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Eastern Europe LX.PDM0X.035 AS5810TZ-273G25Mn VHP32ATEU7 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_ENR2 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Middle East LX.PDM0X.037 AS5810TZ-273G25Mn EM VHP32ATME6 MC UMACss 2G+1G/250/BT/6L2.8/5R/ CB_bgn_1.0D_AL_EN15 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Middle East LX.PDM0X.039 AS5810TZ-273G25Mn EM VHP32ATME2 MC UMACss 2G+1G/250/BT/6L2.8/5R/ CB_bgn_1.0D_AL_AR13 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G32Mn PA USA LX.PDM0X.043 AS5810TZ-273G32Mn VHP32ATUS1 MC UMACss 2G+1G/320/6L2.8/5R/CB_bgn_1.0D_AL_EN33 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN N 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Switzerlan d LX.PDM0X.041 AS5810TZ-273G25Mn VHP32ATCH1 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_IT42 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Middle East LX.PDM0X.040 AS5810TZ-273G25Mn EM VHP32ATME2 MC UMACss 2G+1G/250/BT/6L2.8/5R/ CB_bgn_1.0D_AL_AR23 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Middle East LX.PDM0X.038 AS5810TZ-273G25Mn EM VHP32ATME4 MC UMACss 2G+1G/250/BT/6L2.8/5R/ CB_bgn_1.0D_AL_EN11 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Italy LX.PDM0X.036 AS5810TZ-273G25Mn VHP32ATIT1 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_IT12 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Eastern Europe LX.PDM0X.034 AS5810TZ-273G25Mn VHP32ATEU7 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_SL11 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Sweden LX.PDM0X.032 AS5810TZ-273G25Mn VHP32ATSE1 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_FI13 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mi EMEA Russia LX.PDM0X.030 AS5810TZ-273G25Mi VHP32ATRU1 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bg_1.0D_AL_RU11 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi BG BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Norway LX.PDM0X.029 AS5810TZ-273G25Mn VHP32ATNO3 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_ENS3 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV Model RO Country Acer Part No Description CPU LCD VGA Chip VRAM 1 Memory 1 Memory 2 HDD 1(GB) ODD Card Reader Wireless LAN Wireless LAN1 Bluetooth Battery Adapter Camera Appendix A 123 AS5810TZ- 273G25Mn EMEA South Africa LX.PDM0X.019 AS5810TZ-273G25Mn EM VHP32ATZA1 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_FR23 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA France LX.PDM0X.023 AS5810TZ-273G25Mn VHP32ATFR1 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_FR23 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA UK LX.PDM0X.001 AS5810TZ-273G25Mn VHP32ATGB1 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_EN14 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Ukraine LX.PDM0X.002 AS5810TZ-273G25Mn VHP32ATUK1 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_RU11 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Turkey LX.PDM0X.003 AS5810TZ-273G25Mn EM VHP32ATTR1 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_TR33 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Poland LX.PDM0X.004 AS5810TZ-273G25Mn VHP32ATPL1 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_PL11 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Greece LX.PDM0X.018 AS5810TZ-273G25Mn VHP32ATGR1 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_EL32 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Spain LX.PDM0X.017 AS5810TZ-273G25Mn VHP32ATES1 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_ES22 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Portugal LX.PDM0X.016 AS5810TZ-273G25Mn VHP32ATPT1 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_PT12 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Hungary LX.PDM0X.015 AS5810TZ-273G25Mn VHP32ATHU1 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_HU13 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Finland LX.PDM0X.014 AS5810TZ-273G25Mn VHP32ATFI2 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_FI11 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Eastern Europe LX.PDM0X.013 AS5810TZ-273G25Mn VHP32ATEU5 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_RO12 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Eastern Europe LX.PDM0X.012 AS5810TZ-273G25Mn VHP32ATEU3 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_RU23 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Eastern Europe LX.PDM0X.011 AS5810TZ-273G25Mn VHP32ATEU5 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_PL13 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Eastern Europe LX.PDM0X.010 AS5810TZ-273G25Mn VHP32ATEU4 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_SV22 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Middle East LX.PDM0X.005 AS5810TZ-273G25Mn EM VHP32ATME3 MC UMACss 2G+1G/250/BT/6L2.8/5R/ CB_bgn_1.0D_AL_FR23 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Middle East LX.PDM0X.006 AS5810TZ-273G25Mn EM VHP32ATME4 MC UMACss 2G+1G/250/BT/6L2.8/5R/ CB_bgn_1.0D_AL_RU61 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Middle East LX.PDM0X.007 AS5810TZ-273G25Mn EM VHP32ATME2 MC UMACss 2G+1G/250/BT/6L2.8/5R/ CB_bgn_1.0D_AL_EN15 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Middle East LX.PDM0X.008 AS5810TZ-273G25Mn EM VHP32ATME9 MC UMACss 2G+1G/250/BT/6L2.8/5R/ CB_bgn_1.0D_AL_FR22 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Israel LX.PDM0X.009 AS5810TZ-273G25Mn VHP32ATIL1 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_HE12 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Belgium LX.PDM0X.025 AS5810TZ-273G25Mn VHP32ATBE1 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_NL13 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Luxembou rg LX.PDM0X.027 AS5810TZ-273G25Mn VHP32ATLU3 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_IT41 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Holland LX.PDM0X.026 AS5810TZ-273G25Mn VHP32ATNL1 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_NL12 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Germany LX.PDM0X.024 AS5810TZ-273G25Mn VHP32ATDE1 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_DE13 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Denmark LX.PDM0X.022 AS5810TZ-273G25Mn VHP32ATDK2 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_ENS3 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA Denmark LX.PDM0X.021 AS5810TZ-273G25Mn VHP32ATDK1 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_NO13 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810TZ- 273G25Mn EMEA South Africa LX.PDM0X.020 AS5810TZ-273G25Mn EM VHP32ATZA4 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_bgn_1.0D_AL_ENI1 PMSSU2700B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in 3rd WiFi 1x2 BGN 3rd WiFi 1x2 BGN BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G50Mn EMEA Italy LX.PBB0X.094 AS5810T-354G50Mn VHP32ATIT1 MC UMACss 2*2G/ 500_L/BT/6L2.8/5R/CB_n2_1.0D_AL_IT12 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N500GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 944G50Mn PA ACLA- Spanish LX.PBB0X.093 AS5810T-944G50Mn EM VHP64ATEA1 MC UMACss 2*2G/500_L/BT/6L2.8/5R/CB_n2_1.0D_AL_ES21 C2DSU9400B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N500GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn PA Mexico LX.PBB0X.076 AS5810T-354G32Mn EM VHP64ATMX2 MC UMACss 2*2G/320/6L2.8/5R/CB_n2_1.0D_AL_ES51 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW N 6CELL2.8 65W 1.0M DV AS5810T- 942G32Mn TWN GCTWN LX.PBB0Y.003 AS5810T-942G32Mn VHB32ATTW1 MC UMACss 1*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_TC11 C2DSU9400B NLED15.6W XGAGS UMA N SO2GBIII10 N N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV Model RO Country Acer Part No Description CPU LCD VGA Chip VRAM 1 Memory 1 Memory 2 HDD 1(GB) ODD Card Reader Wireless LAN Wireless LAN1 Bluetooth Battery Adapter Camera Appendix A 124 AS5810T- 354G32Mn PA Canada LX.PBB0X.091 AS5810T-354G32Mn VHP64ATCA2 MC UMACss 2*2G/320/6L2.8/5R/CB_n2_1.0D_AL_FR32 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW N 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn PA Canada LX.PBB0X.089 AS5810T-354G32Mn VHP64ATCA2 MC UMACss 2*2G/320/6L2.8/5R/CB_n2_1.0D_AL_FR81 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW N 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn PA USA LX.PBB0X.087 AS5810T-354G32Mn VHP64ATUS1 MC UMACss 2*2G/320/6L2.8/5R/CB_n2_1.0D_AL_EN11 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW N 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn PA USA LX.PBB0X.085 AS5810T-354G32Mn VHP64ATUS1 MC UMACss 2*2G/320/6L2.8/5R/CB_n2_1.0D_AL_EN33 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW N 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn PA USA LX.PBB0X.083 AS5810T-354G32Mn VHP64ATUS1 MC UMACss 2*2G/320/6L2.8/5R/CB_n2_1.0D_AL_ENP2 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW N 6CELL2.8 65W 1.0M DV AS5810T- 352G32Mn TWN GCTWN LX.PBB0Y.004 AS5810T-352G32Mn VHB32ATTW1 MC UMACss 1*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_TC11 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 N N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn PA Chile LX.PBB0X.077 AS5810T-354G32Mn EM VHP64ATCL3 MC UMACss 2*2G/320/6L2.8/5R/CB_n2_1.0D_AL_ES52 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW N 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn PA ACLA- Spanish LX.PBB0X.078 AS5810T-354G32Mn EM VHP64ATEA1 MC UMACss 2*2G/320/6L2.8/5R/CB_n2_1.0D_AL_ES21 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW N 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn PA ACLA- Spanish LX.PBB0X.079 AS5810T-354G32Mn EM VHP64ATEA3 MC UMACss 2*2G/320/6L2.8/5R/CB_n2_1.0D_AL_ES21 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW N 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn PA ACLA- Portugues e LX.PBB0X.080 AS5810T-354G32Mn EM VHP64ATXC2 MC UMACss 2*2G/320/6L2.8/5R/CB_n2_1.0D_AL_XC21 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW N 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn PA USA LX.PBB0X.081 AS5810T-354G32Mn VHP64ATUS1 MC UMACss 2*2G/320/6L2.8/5R/CB_n2_1.0D_AL_EN34 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW N 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn PA USA LX.PBB0X.082 AS5810T-354G32Mn VHP64ATUS1 MC UMACss 2*2G/320/6L2.8/5R/CB_n2_1.0D_AL_EN32 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW N 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn PA USA LX.PBB0X.084 AS5810T-354G32Mn VHP64ATUS1 MC UMACss 2*2G/320/6L2.8/5R/CB_n2_1.0D_AL_ENP1 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW N 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn PA USA LX.PBB0X.086 AS5810T-354G32Mn VHP64ATCA2 MC UMACss 2*2G/320/6L2.8/5R/CB_n2_1.0D_AL_EN12 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW N 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn PA USA LX.PBB0X.088 AS5810T-354G32Mn VHP64ATUS1 MC UMACss 2*2G/320/6L2.8/5R/CB_n2_1.0D_AL_EN31 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW N 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn PA Canada LX.PBB0X.090 AS5810T-354G32Mn VHP64ATCA2 MC UMACss 2*2G/320/6L2.8/5R/CB_n2_1.0D_AL_FR82 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW N 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn PA Canada LX.PBB0X.092 AS5810T-354G32Mn VHP64ATCA2 MC UMACss 2*2G/320/6L2.8/5R/CB_n2_1.0D_AL_FR31 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW N 6CELL2.8 65W 1.0M DV AS5810T- 944G32Mn AAP Singapore LX.PBB0X.075 AS5810T-944G32Mn VHP32ATSG1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_EN12 C2DSU9400B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 352G32Mn AAP Singapore LX.PBB0X.074 AS5810T-352G32Mn VHP32ATSG1 MC UMACss 1*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_EN12 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 N N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 353G32Mn AAP Singapore LX.PBB0X.073 AS5810T-353G32Mn VHP32ATSG1 MC UMACss 2G+1G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_EN12 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 353G25Mn AAP Singapore LX.PBB0X.072 AS5810T-353G25Mn VHP32ATSG1 MC UMACss 2G+1G/250/BT/6L2.8/5R/CB_n2_1.0D_AL_EN12 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO1GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 352G25Mn AAP Singapore LX.PBB0X.071 AS5810T-352G25Mn VHP32ATSG1 MC UMACss 1*2G/250/BT/6L2.8/5R/CB_n2_1.0D_AL_EN12 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 N N250GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 944G50Mi WW WW S2.PBB0X.002 AS5810T-944G50Mi VHP32AWW1 MC UMACss 2*2G/ 500_L/BT/6L2.8/5R/CB_1.0D_AL_EN11 C2DSU9400B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N500GB5.4KS NSM8XS9.5 5 in 1-Build in EP1x2HMW EP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 944G50Mn AAP Australia/ New Zealand LX.PBB0X.023 AS5810T-944G50Mn VHP32ATAU1 MC UMACss 2*2G/500_L/BT/6L2.8/5R/CB_n2_1.0D_AL_EN12 C2DSU9400B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N500GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 944G50Mn AAP Singapore LX.PBB0X.022 AS5810T-944G50Mn VHP32ATSG1 MC UMACss 2*2G/500_L/BT/6L2.8/5R/CB_n2_1.0D_AL_EN12 C2DSU9400B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N500GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 352G25Mn CHINA China LX.PBB0Y.002 AS5810T-352G25Mn VHB32ATCN1 MC UMACss 1*2G/250/6L2.8/5R/CB_n2_1.0D_AL_SC11 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 N N250GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W N 6CELL2.8 65W 1.0M DV AS5810T- 942G32Mn TWN GCTWN LX.PBB0X.070 AS5810T-942G32Mn VHP32ATTW1 MC UMACss 1*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_TC11 C2DSU9400B NLED15.6W XGAGS UMA N SO2GBIII10 N N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 352G32Mn TWN GCTWN LX.PBB0X.069 AS5810T-352G32Mn VHP32ATTW1 MC UMACss 1*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_TC11 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 N N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 352G25Mn AAP Japan LX.PBB0X.025 AS5810T-352G25Mn VHP32APJP1 MC UMACss 1*2G/250/BT/6L2.8/5R/CB_n2_1.0D_AL_JA11_S22F C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 N N250GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 963G32Mn WW WW S2.PBB0X.001 AS5810T-963G32Mn VHP32AWW1 MC UMACss 1G+2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_EN11 C2DSU9600B NLED15.6W XGAGS UMA N SO1GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 352G25Mn CHINA Hong Kong LX.PBB0Y.001 AS5810T-352G25Mn VHB32ATHK2 MC UMACss 1*2G/250/6L2.8/5R/CB_n2_1.0D_AL_ZH31 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 N N250GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W N 6CELL2.8 65W 1.0M DV AS5810T- 352G25Mn AAP Japan LX.PBB0X.026 AS5810T-352G25Mn VHP32AJP1 MC UMACss 1*2G/ 250/BT/6L2.8/5R/CB_n2_1.0D_AL_JA11_S22 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 N N250GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV Model RO Country Acer Part No Description CPU LCD VGA Chip VRAM 1 Memory 1 Memory 2 HDD 1(GB) ODD Card Reader Wireless LAN Wireless LAN1 Bluetooth Battery Adapter Camera 125 Appendix A AS5810T- 944G50Mn AAP India LX.PBB0X.021 AS5810T-944G50Mn VHP32ATIN1 MC UMACss 2*2G/ 500_L/BT/6L2.8/5R/CB_n2_1.0D_AL_EN12 C2DSU9400B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N500GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 944G50Mn AAP Indonesia LX.PBB0X.020 AS5810T-944G50Mn EM VHP32ATID1 MC UMACss 2*2G/500_L/BT/6L2.8/5R/CB_n2_1.0D_AL_ID22 C2DSU9400B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N500GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 944G50Mn AAP Philippines LX.PBB0X.019 AS5810T-944G50Mn EM VHP32ATPH1 MC UMACss 2*2G/500_L/BT/6L2.8/5R/CB_n2_1.0D_AL_EN14 C2DSU9400B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N500GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 944G50Mn AAP Malaysia LX.PBB0X.018 AS5810T-944G50Mn EM VHP32ATMY1 MC UMACss 2*2G/500_L/BT/6L2.8/5R/CB_n2_1.0D_AL_EN14 C2DSU9400B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N500GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 352G25Mn AAP Malaysia LX.PBB0X.011 AS5810T-352G25Mn EM VHP32ATMY1 MC UMACss 1*2G/250/BT/6L2.8/5R/CB_n2_1.0D_AL_EN14 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 N N250GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 352G25Mn AAP Indonesia LX.PBB0X.012 AS5810T-352G25Mn EM VHP32ATID1 MC UMACss 1*2G/250/BT/6L2.8/5R/CB_n2_1.0D_AL_ID24 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 N N250GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 352G25Mn AAP India LX.PBB0X.013 AS5810T-352G25Mn VHP32ATIN1 MC UMACss 1*2G/ 250/BT/6L2.8/5R/CB_n2_1.0D_AL_EN12 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 N N250GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 352G25Mn AAP Singapore LX.PBB0X.014 AS5810T-352G25Mn VHP32ATSG1 MC UMACss 1*2G/250/BT/6L2.8/5R/CB_n2_1.0D_AL_EN12 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 N N250GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 352G25Mn AAP Australia/ New Zealand LX.PBB0X.015 AS5810T-352G25Mn VHP32ATAU1 MC UMACss 1*2G/250/BT/6L2.8/5R/CB_n2_1.0D_AL_EN12 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 N N250GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 944G50Mn AAP Thailand LX.PBB0X.017 AS5810T-944G50Mn EM VHP32ATTH1 MC UMACss 2*2G/500_L/BT/6L2.8/5R/CB_n2_1.0D_AL_TH22 C2DSU9400B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N500GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 944G50Mn AAP Vietnam LX.PBB0X.016 AS5810T-944G50Mn EM VHP32ATVN1 MC UMACss 2*2G/500_L/BT/6L2.8/5R/CB_n2_1.0D_AL_EN13 C2DSU9400B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N500GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 352G25Mn AAP Thailand LX.PBB0X.010 AS5810T-352G25Mn EM VHP32ATTH1 MC UMACss 1*2G/250/BT/6L2.8/5R/CB_n2_1.0D_AL_TH22 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 N N250GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 944G32Mn AAP Indonesia LX.PBB0X.005 AS5810T-944G32Mn EM VHP32ATID1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_ID22 C2DSU9400B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 944G32Mn AAP India LX.PBB0X.006 AS5810T-944G32Mn VHP32ATIN1 MC UMACss 2*2G/ 320/BT/6L2.8/5R/CB_n2_1.0D_AL_EN12 C2DSU9400B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 944G32Mn AAP Singapore LX.PBB0X.007 AS5810T-944G32Mn VHP32ATSG1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_EN12 C2DSU9400B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 352G25Mn AAP Vietnam LX.PBB0X.009 AS5810T-352G25Mn EM VHP32ATVN1 MC UMACss 1*2G/250/BT/6L2.8/5R/CB_n2_1.0D_AL_EN13 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 N N250GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 944G32Mn AAP Australia/ New Zealand LX.PBB0X.008 AS5810T-944G32Mn VHP32ATAU1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_EN12 C2DSU9400B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 944G32Mn AAP Philippines LX.PBB0X.004 AS5810T-944G32Mn EM VHP32ATPH1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_EN14 C2DSU9400B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 944G32Mn AAP Thailand LX.PBB0X.002 AS5810T-944G32Mn EM VHP32ATTH1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_TH22 C2DSU9400B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 944G32Mn AAP Vietnam LX.PBB0X.001 AS5810T-944G32Mn EM VHP32ATVN1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_EN13 C2DSU9400B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 944G32Mn AAP Malaysia LX.PBB0X.003 AS5810T-944G32Mn EM VHP32ATMY1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_EN14 C2DSU9400B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 944G32Mn WW GCTWN S2.PBB0Y.001 AS5810T-944G32Mn VHB32AWW1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_ENX1 C2DSU9400B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Eastern Europe LX.PBB0X.055 AS5810T-354G32Mn VHP32ATEU5 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_PL13 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Eastern Europe LX.PBB0X.056 AS5810T-354G32Mn VHP32ATEU3 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_RU23 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Eastern Europe LX.PBB0X.057 AS5810T-354G32Mn VHP32ATEU5 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_RO12 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Finland LX.PBB0X.058 AS5810T-354G32Mn VHP32ATFI2 MC UMACss 2*2G/ 320/BT/6L2.8/5R/CB_n2_1.0D_AL_FI11 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Hungary LX.PBB0X.036 AS5810T-354G32Mn VHP32ATHU1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_HU13 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Portugal LX.PBB0X.037 AS5810T-354G32Mn VHP32ATPT1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_PT12 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Spain LX.PBB0X.038 AS5810T-354G32Mn VHP32ATES1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_ES22 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Greece LX.PBB0X.035 AS5810T-354G32Mn VHP32ATGR1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_EL32 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Israel LX.PBB0X.039 AS5810T-354G32Mn VHP32ATIL1 MC UMACss 2*2G/ 320/BT/6L2.8/5R/CB_n2_1.0D_AL_HE12 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Italy LX.PBB0X.034 AS5810T-354G32Mn VHP32ATIT1 MC UMACss 2*2G/ 320/BT/6L2.8/5R/CB_n2_1.0D_AL_IT12 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV Model RO Country Acer Part No Description CPU LCD VGA Chip VRAM 1 Memory 1 Memory 2 HDD 1(GB) ODD Card Reader Wireless LAN Wireless LAN1 Bluetooth Battery Adapter Camera Appendix A 126 AS5810T- 354G32Mn EMEA Middle East LX.PBB0X.040 AS5810T-354G32Mn EM VHP32ATME9 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_FR22 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Middle East LX.PBB0X.033 AS5810T-354G32Mn EM VHP32ATME6 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_EN15 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Middle East LX.PBB0X.041 AS5810T-354G32Mn EM VHP32ATME2 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_EN15 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Middle East LX.PBB0X.032 AS5810T-354G32Mn EM VHP32ATME4 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_EN11 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Eastern Europe LX.PBB0X.046 AS5810T-354G32Mn VHP32ATEU4 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_SV22 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Eastern Europe LX.PBB0X.047 AS5810T-354G32Mn VHP32ATEU7 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_ENR2 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Eastern Europe LX.PBB0X.048 AS5810T-354G32Mn VHP32ATEU7 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_SL11 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Germany LX.PBB0X.062 AS5810T-354G32Mn VHP32ATDE1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_DE13 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA France LX.PBB0X.063 AS5810T-354G32Mn VHP32ATFR1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_FR23 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Denmark LX.PBB0X.064 AS5810T-354G32Mn VHP32ATDK2 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_ENS3 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Denmark LX.PBB0X.065 AS5810T-354G32Mn VHP32ATDK1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_NO13 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA South Africa LX.PBB0X.066 AS5810T-354G32Mn EM VHP32ATZA4 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_ENI1 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA South Africa LX.PBB0X.067 AS5810T-354G32Mn EM VHP32ATZA1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_FR23 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA South Africa LX.PBB0X.068 AS5810T-354G32Mn EM VHP32ATZA2 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_EN16 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Middle East LX.PBB0X.042 AS5810T-354G32Mn EM VHP32ATME4 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_RU61 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Middle East LX.PBB0X.031 AS5810T-354G32Mn EM VHP32ATME2 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_AR13 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Czech LX.PBB0X.049 AS5810T-354G32Mn VHP32ATCZ2 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_SK12 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Sweden LX.PBB0X.050 AS5810T-354G32Mn VHP32ATSE1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_FI13 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Austria LX.PBB0X.051 AS5810T-354G32Mn VHP32ATAT1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_DE11 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mi EMEA Russia LX.PBB0X.052 AS5810T-354G32Mi VHP32ATRU1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_abg_1.0D_AL_RU11 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2MAB G BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Norway LX.PBB0X.053 AS5810T-354G32Mn VHP32ATNO3 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_ENS3 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Norway LX.PBB0X.054 AS5810T-354G32Mn VHP32ATNO1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_NO12 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Luxembou rg LX.PBB0X.059 AS5810T-354G32Mn VHP32ATLU3 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_IT41 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Holland LX.PBB0X.060 AS5810T-354G32Mn VHP32ATNL1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_NL12 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Belgium LX.PBB0X.061 AS5810T-354G32Mn VHP32ATBE1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_NL13 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Middle East LX.PBB0X.043 AS5810T-354G32Mn EM VHP32ATME3 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_FR23 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Middle East LX.PBB0X.044 AS5810T-354G32Mn EM VHP32ATME2 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_AR23 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Poland LX.PBB0X.045 AS5810T-354G32Mn VHP32ATPL1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_PL11 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Switzerlan d LX.PBB0X.030 AS5810T-354G32Mn VHP32ATCH1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_IT42 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Turkey LX.PBB0X.029 AS5810T-354G32Mn EM VHP32ATTR1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_TR33 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA Ukraine LX.PBB0X.028 AS5810T-354G32Mn VHP32ATUK1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_RU11 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 354G32Mn EMEA UK LX.PBB0X.027 AS5810T-354G32Mn VHP32ATGB1 MC UMACss 2*2G/320/BT/6L2.8/5R/CB_n2_1.0D_AL_EN14 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2HMW SP1x2HMW BT 2.0 6CELL2.8 65W 1.0M DV Model RO Country Acer Part No Description CPU LCD VGA Chip VRAM 1 Memory 1 Memory 2 HDD 1(GB) ODD Card Reader Wireless LAN Wireless LAN1 Bluetooth Battery Adapter Camera 127 Appendix A AS5810T- 353G25Mn WW WW S2.PBW0Y.001 AS5810T-353G25Mn VHB32AWW1 MC UMAGCss 1G+2G/250/BT/6L2.8/5R/CB_n2_1.0D_3G_AL_EN11 C2SSU3500B NLED15.6W XGAGS UMA N SO1GBIII10 SO2GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.8 65W 1.0M DV AS5810T- 353G25Mn WW WW S2.PBW0X.001 AS5810T-353G25Mn VHP32AWW1 MC UMAGCss 1G+2G/250/BT/6L/5R/CB_n2_1.0D_3G_AL_EN11 C2SSU3500B NLED15.6W XGAGS UMA N SO1GBIII10 SO2GBIII10 N250GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.2 65W 1.0M DV AS5810T- 354G32Mn WW WW S2.PBW0Y.002 AS5810T-354G32Mn VHB32AWW1 MC UMAGCss 2*2G/320/BT/6L2.6/5R/CB_n2_1.0D_3G_AL_EN11 C2SSU3500B NLED15.6W XGAGS UMA N SO2GBIII10 SO2GBIII10 N320GB5.4KS NSM8XS9.5 5 in 1-Build in SP1x2MMW SP1x2MM W BT 2.0 6CELL2.6 65W 1.0M DV Model RO Country Acer Part No Description CPU LCD VGA Chip VRAM 1 Memory 1 Memory 2 HDD 1(GB) ODD Card Reader Wireless LAN Wireless LAN1 Bluetooth Battery Adapter Camera Appendix A 128 Appendix B 129 This computer’s compatibility is tested and verified by Acer’s internal testing department. All of its system functions are tested under Windows® XP Home, Windows® XP Pro environment. Refer to the following lists for components, adapter cards, and peripherals which have passed these tests. Regarding configuration, combination and test procedures, please refer to the Aspire 5810T/5810TZ/5410T/ 5810TG series Compatibility Test Report released by the Acer Mobile System Testing Department. Test Compatible Components Appendix B 130 Appendix B Microsoft® Windows® Vista Environment Test Item Specification CRT Port Test CRT Monitor Acer 211c 21”, ViewSonic G220F, ViewSonic PF790 19” LCD Monitor Acer FP751 17” TFT LCD, Acer AL1521, Acer AL1721, ViewSonic VD201b, Westinghouse W37G, HP LP2065, HP S9500 Projector Dell 3300MP USB Port Test USB Keyboard/Mouse Microsoft Natural Keyboard Pro Dell USB Keyboard Logicool USB Mouse (OWCM-USB) Logitech USB Wheel Mouse Logitech First Wheel Mouse Dell by Logitech Dell Internet Navigator Keyboard Dell Smart Card Keyboard HP USB Optical Austin Mouse Belkin Miniglow Optical USB Mouse HP USB Optical Mouse (RB129AA) USB Speaker/Joystick Aiwa Multimedia Digital Speaker (SC-UC78) Panasonic USB Speaker EAB-MPC57USB USB Storage Drive Iomega USB Zip 250MB Transcend 80G HDD Plextor DVD+R/RW LG DVD+R/RW Sony DVD+R/RW USB Camera Intel Easy PC Camera (A20953-001) Orange Micro USB 2.0 Web Cam USB HUB and Others A TEN UH-204 IOGEAR 4-Port Hub Corega CG-WLUSBST11 USB Printer/Scanner HP 450WBT Deskjet Printer USB Flash Drive Sony Memory Key 128MB Sony Micro Vault Pro USD-5G IBM 128MB Memory Key IBM 512MB Memory Key Apacer Handy Drive Apacer The USB Flash Drive 256MB USB ODD Logitec CDRW+DVDROM combo LG DVD+R/RW Sony DVD+R/RW 1394 Camera Sony DV-TRV10 Access Point 802.11a Intel Pro/Wireless 5000 NetGear HE 102 Access Point 802.11g D-Link Building Networks People WiFi Certified a/b/g Wireless 108AG Access Point 802.11n Belkin N1MIMO Wireless Router High Performance wireless 802.11n Bluetooth Device Sony Ericsson Wireless Headset Sony Ericsson T610 X Bridge Bluetooth Access Point BT300 Appendix B 131 PCMCIA Test LAN/Modem Card TDK CardBus Ethernet 10/100 32-Bit CBE-10/100BTX Storage Card Hitachi Microdrive 4G 1394 Card Buffalo 1394 Interface Cardbus (IFC-ILCB/DV) USB2.0 Card IBM EtherJet CardBus Adapter 10/100 Wireless Lan Card (Not recommended for wireless ready model) Cisco Wireless LAN Card 802.11a NETGEAR Wireless LAN card 802.11a ISDN Card Toshiba Type B for Bluetooth 128K ISDN Card GPRS Card Vodafone QL1ACC-21581 3G/GPRS card Sony Ericsson GC83 GPRS card Sony Ericsson GC89 GPRS card ExpressCard Test Express Card Abcom 5-in-1 Adapter ExpressCard Reader Abcom GigaLan ExpressCard Sunix ECF2400 2 Ports 1394A ExpressCard Memory Card Test (SD/MS/MMC/SM/CF/Microdrive/XD) SD Card Apacer 128/256MB SanDisk 256MB Apacer 2GB (150x Hi-Speed) KINGMAX 1GB (66x Hi-Speed) SanDisk 1GB RiDATA 4GB SD PRO Memory Card MS Card Sony 512 MS PRO Lexar 512MB MS PRO Lexar 1GB MS PRO Sony 2GB MS PRO MMC Card SanDisk 32MB Transcend 64/128MB Transcend 256MB SanDisk RS-MMC 128MB PQI RS-MMC 256MB Transcend 512MB A-DATA Turbo 200X 2GB MMC Card XD Card Apacer 256/512MB SanDisk 2GB Olympus 512MB CF Card Apacer 256/512 SanDisk 2GB Item Specification 132 Appendix B Appendix C 133 This section describes online technical support services available to help you repair your Acer Systems. If you are a distributor, dealer, ASP or TPM, please refer your technical queries to your local Acer branch office. Acer Branch Offices and Regional Business Units may access our website. However some information sources will require a user i.d. and password. These can be obtained directly from Acer CSD Taiwan. Acer's Website offers you convenient and valuable support resources whenever you need them. In the Technical Information section you can download information on all of Acer's Notebook, Desktop and Server models including: q Service guides for all models q User's manuals q Training materials q Bios updates q Software utilities q Spare parts lists q TABs (Technical Announcement Bulletin) For these purposes, we have included an Acrobat File to facilitate the problem-free downloading of our technical material. Also contained on this website are: q Detailed information on Acer's International Traveller’s Warranty (ITW) q Returned material authorization procedures q An overview of all the support services we offer, accompanied by a list of telephone, fax and email contacts for all your technical queries. We are always looking for ways to optimize and improve our services, so if you have any suggestions or comments, please do not hesitate to communicate these to us. Online Support Information Appendix C 134 Appendix C 135 A Audio 22 B Battery bay 9 battery pack removing 42 bay battery 10 hard disk 10 BIOS 19 vendor 19 Version 19 BIOS Recovery Boot Block 96 BIOS Recovery by Crisis Disk 96 steps 96 BIOS Recovery Hotkey 96 BIOS Utility 25–35 Flash 35 Navigating 26 Button eject 5 button / indicator 5 button/indicator Acer PowerSmart 5 Backup 5 C Clearing BIOS Password steps 96 compartment memory 10 Connector Locations 91 cooling fan 10 Core logic 19 CPU core voltage 19 CPU Fan True Value Table 19 CPU package 19 CPU type 19 Creating the Crisis Disk in Windows XP/Vista 97 Crisis Disk creating 97 Crisis Recovery Disk 35 D DIMM module removing 45 Disassembly Requirements 39 E Emergency eject hole 8 Environment Test 130 error messages Power-On Self-Test (POST) 81 Euro 15 Euro symbol 15 External CD-ROM Drive Check 78 External Diskette Drive Check 78 F Features 1 Flowchart External Module Disassembly 41 LCD Module Disassembly 69 Main Unit Disassembly 49 FRU (Field Replaceable Unit) List 99 H Hard disk 21 hard disk drive module removing 46 HDD 21 Hot key Bluetooth 15 brightness down 15 brightness up 15 Display 15 Screen blank 15 Sleep 15 Speaker 15 System property 15 volume down 15 volume up 15 Hot Keys 13, 15 I Indicator battery 11 HDD 5, 11 WLANG/3G 11 indicator optical disk access 8 Indicator/button Acer PowerSmart key 11 backup key 11 power 11 Indicators 11 Intermittent Problems 89 Index 136 J jack DC-in 8 headphones/speaker/line-out with S/PDIF support 7 microphone-in 7 K Key Communication 5 touchpad toggle 5 Keyboard 23 removing 50 using 13 Keyboard or Auxiliary Input Device Check 78 L Launch Board 55 LCD bezel removing 70 LCD hinges removing 71 LCD panel removing 73 lock battery 10 Lock key Caps Lock 13 Num Lock 13 Scroll Lock 13 Lock Keys 13 lower cover removing 43 M Main screw list 40 Memory Check 79 Menu Boot 33 Exit 34 Main 28 Security 30 Model Definition 117 N Numeric Keypad 13 O Online Support Information 133 P password changing 32 removing 31 port Ethernet (RJ-45) 8 external display (VGA) 7 HDMI 7 USB 2.0 7, 8 power button board removing 55 Power System Check 79 Battery Pack 79 Power Adapter 79 Processor 19 R release latch battery 10 S slot Kensington lock 7 slots ventilation 7,10 Special Key 15 SSD module removing 48 System Block Diagram 3 System Block Diagram Discrete 4 System block diagram UMA 3 system board removing 58 System board Layout top 92 System board layout bottom 92 top 91, 93 top and bottom 91 system board layout bottom 94 System Check Procedures 78 System Memory 19 System Utilities 25 T Test Compatible Components 129 Top 91 Touchpad 11 touchpad board module removing 56 Touchpad Check 80 137 Troubleshooting 77 U Undetermined Problems 90 utility BIOS 25–35 V View top 5 view bottom 10 closed front 6 left 7 rear 9 right 8 W webcam removing 75 Windows 2000 Environment Test 130 WLAN board module removing 51 138

Guide de référence du matériel HP Compaq Business PC Minitour convertible 8200 Elite Microtour 8200 Elite Ordinateur compact 8200 Elite Ordinateur de bureau Ultra-Slim 8200 Elite Microtour 6200 Pro Ordinateur compact 6200 Pro © Copyright 2010 Hewlett-Packard Development Company, L.P. Les informations contenues dans ce document sont susceptibles d'être modifiées sans préavis. Microsoft, Windows et Windows Vista sont des marques commerciales ou des marques déposées de Microsoft Corporation aux États-Unis et/ou dans d’autres pays/régions. Les garanties applicables aux produits et services HP sont énoncées dans les textes de garantie accompagnant ces produits et services. Aucune partie du présent document ne saurait être interprétée comme constituant un quelconque supplément de garantie. HP ne peut être tenue responsable des erreurs ou omissions techniques ou de rédaction de ce document. Ce document contient des informations protégées par des droits d’auteur. Aucune partie de ce document ne peut être photocopiée, reproduite ou traduite dans une autre langue sans l’accord écrit préalable de Hewlett-Packard. Guide de référence du matériel HP Compaq Business PC Minitour convertible 8200 Elite Microtour 8200 Elite Ordinateur compact 8200 Elite Ordinateur de bureau Ultra-Slim 8200 Elite Microtour 6200 Pro Ordinateur compact 6200 Pro Première édition (décembre 2010) Référence du document : 636509-051 À propos de ce livre Ce guide fournit des informations de base pour la mise à niveau de PC HP Compaq Business. AVERTISSEMENT ! Le non-respect de ces instructions expose l’utilisateur à des risques potentiellement très graves. ATTENTION : Le non-respect de ces instructions présente des risques, tant pour le matériel que pour les informations qu’il contient. REMARQUE : Le texte ainsi défini fournit des informations importantes supplémentaires. FRWW iii iv À propos de ce livre FRWW Sommaire 1 Caractéristiques du produit ........................................................................................................................... 1 Caractéristiques de la configuration standard ...................................................................................... 1 Composants du panneau avant de la microtour convertible (CMT) ..................................................... 3 Composants du panneau avant de la microtour (MT) .......................................................................... 4 Composants du panneau avant de l'ordinateur compact (SFF) ........................................................... 5 Composants du panneau avant de l'ordinateur de bureau Ultra-Slim (USDT) .................................... 6 Composants du panneau arrière de la minitour convertible (CMT) ...................................................... 7 Composants du panneau arrière de la microtour (MT) ........................................................................ 8 Composants du panneau arrière de l'ordinateur compact (SFF) ......................................................... 9 Composants du panneau arrière de l'ordinateur de bureau Ultra-Slim (USDT) ................................. 10 Composants du lecteur de cartes multimédia .................................................................................... 11 Clavier ................................................................................................................................................ 12 Utilisation des touches de logo Windows .......................................................................... 13 Emplacement du numéro de série ..................................................................................................... 14 2 Mises à niveau matérielles de la minitour convertible (CMT) ................................................................... 17 Fonctionnalités de maintenance ......................................................................................................... 17 Avertissements et précautions ........................................................................................................... 17 Retrait du panneau d'accès à l'ordinateur .......................................................................................... 18 Remise en place du panneau d'accès de l'ordinateur ........................................................................ 19 Retrait du panneau avant ................................................................................................................... 20 Retrait des caches protecteurs ........................................................................................................... 21 Remise en place du panneau avant ................................................................................................... 22 Connexions de la carte mère ............................................................................................................. 22 Installation de mémoire supplémentaire ............................................................................................. 24 Modules DIMM ................................................................................................................... 24 DDR3-SDRAM DIMM ........................................................................................................ 24 Remplissage des supports DIMM ...................................................................................... 25 Installation de modules DIMM ........................................................................................... 25 Retrait ou installation d'une carte d'extension .................................................................................... 27 Emplacement des unités .................................................................................................................... 31 Retrait d'un lecteur d'une baie de lecteur ........................................................................................... 32 Installation des lecteurs ...................................................................................................................... 36 Installation d'un lecteur 5,25 pouces dans une baie de lecteur ......................................... 38 Installation d’un disque dur dans une baie de lecteur interne ............................................ 42 Transformation de la minitour en ordinateur de bureau ..................................................................... 47 FRWW v Transformation de l'ordinateur de bureau en minitour ....................................................................... 49 Installation d’un dispositif antivol ........................................................................................................ 51 Verrou de câble de sécurité HP/Kensington MicroSaver ................................................... 52 Cadenas ............................................................................................................................ 53 Verrou de sécurité HP Business PC .................................................................................. 53 Sécurité du panneau avant ................................................................................................ 57 3 Mises à niveau matérielles de la microtour (MT) ....................................................................................... 59 Fonctionnalités de maintenance ......................................................................................................... 59 Avertissements et précautions ........................................................................................................... 59 Retrait du panneau d'accès à l'ordinateur .......................................................................................... 60 Remise en place du panneau d'accès à l'ordinateur .......................................................................... 61 Retrait du panneau avant ................................................................................................................... 62 Retrait des caches protecteurs ........................................................................................................... 62 Remise en place du panneau avant ................................................................................................... 63 Connexions de la carte mère ............................................................................................................. 64 Installation de mémoire supplémentaire ............................................................................................. 67 DIMM ................................................................................................................................. 67 DDR3-SDRAM DIMM ........................................................................................................ 67 Remplissage des supports DIMM ...................................................................................... 68 Installation des modules DIMM .......................................................................................... 68 Retrait ou installation d'une carte d'extension .................................................................................... 70 Emplacement des unités .................................................................................................................... 74 Installation et retrait de lecteurs ......................................................................................................... 75 Retirer un lecteur 5,25 pouces ou 3,5 pouces dans une baie de lecteur ........................... 77 Installation d'un lecteur 5,25 pouces ou 3,5 pouces dans une baie de lecteur ................. 79 Retrait d'un disque dur d'une baie de lecteur .................................................................... 82 Installation d’un disque dur dans une baie de lecteur interne ............................................ 84 Installation d'un dispositif antivol ........................................................................................................ 87 Verrou de câble de sécurité HP/Kensington MicroSaver ................................................... 88 Cadenas ............................................................................................................................ 88 Verrou de sécurité HP Business PC .................................................................................. 89 Sécurité du panneau avant ................................................................................................ 92 4 Mise à niveau du matériel de l'ordinateur compact (SFF) ........................................................................ 95 Fonctionnalités de maintenance ......................................................................................................... 95 Avertissements et précautions ........................................................................................................... 95 Retrait du panneau d'accès à l'ordinateur .......................................................................................... 96 Remise en place du panneau d'accès à l'ordinateur .......................................................................... 97 Retrait du panneau avant ................................................................................................................... 98 Retrait des caches protecteurs ........................................................................................................... 98 vi FRWW Remise en place du panneau avant ................................................................................................. 100 Conversion de la configuration bureau en minitour .......................................................................... 100 Connexions de la carte mère ........................................................................................................... 101 Installation de mémoire supplémentaire ........................................................................................... 105 DIMM ............................................................................................................................... 105 DDR3-SDRAM DIMM ...................................................................................................... 105 Remplissage des supports DIMM .................................................................................... 106 Installation des modules DIMM ........................................................................................ 106 Retrait ou installation d'une carte d'extension .................................................................................. 109 Emplacement des unités .................................................................................................................. 113 Installation et retrait de lecteurs ....................................................................................................... 114 Retrait d'un lecteur 5,25 pouces d'une baie de lecteur .................................................... 116 Installation d'un lecteur 5,25 pouces dans une baie de lecteur ....................................... 118 Retrait d'un lecteur 3.5 pouces d'une baie de lecteur ...................................................... 121 Installation d'un lecteur 3.5 pouces dans une baie de lecteur ......................................... 122 Retrait et remplacement du disque dur interne 3,5 pouces principal ............................... 126 Installation d’un dispositif antivol ...................................................................................................... 130 Verrou de câble de sécurité HP/Kensington MicroSaver ................................................. 130 Cadenas .......................................................................................................................... 131 Verrou de sécurité HP Business PC ................................................................................ 131 Sécurité du panneau avant .............................................................................................. 135 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) ............................................. 137 Fonctionnalités de maintenance ....................................................................................................... 137 Avertissements et précautions ......................................................................................................... 137 Branchement du cordon d'alimentation ............................................................................................ 138 Retrait du panneau d'accès à l'ordinateur ........................................................................................ 139 Remise en place du panneau d'accès à l'ordinateur ........................................................................ 140 Retrait du panneau avant ................................................................................................................. 141 Retrait d'un cache protecteur ........................................................................................................... 141 Remise en place du panneau avant ................................................................................................. 142 Conversion de la configuration bureau en minitour .......................................................................... 143 Connexions de la carte mère ........................................................................................................... 144 Installation de mémoire supplémentaire ........................................................................................... 145 modules SODIMM ........................................................................................................... 145 Modules SODIMM DDR3-SDRAM .................................................................................. 145 Remplissage des supports SODIMM ............................................................................... 146 Installation des barrettes SODIMM .................................................................................. 147 Remplacement de l’unité optique ..................................................................................................... 149 Extraction d’une unité optique ......................................................................................... 149 Préparation d’un nouveau lecteur optique ....................................................................... 150 FRWW vii Installation d’un nouveau lecteur optique ........................................................................ 151 Remise en position du disque dur .................................................................................................... 152 Installation et retrait d'un couvercle de port ...................................................................................... 155 Installation d’un dispositif antivol ...................................................................................................... 157 Verrou de câble de sécurité HP/Kensington MicroSaver ................................................. 157 Cadenas .......................................................................................................................... 158 Verrou de sécurité HP Business PC ................................................................................ 158 Sécurité du panneau avant .............................................................................................. 163 Annexe A Remplacement de la pile ............................................................................................................. 165 Annexe B Retrait et remplacement d'un disque dur SATA amovible 3,5 pouces ................................... 168 Annexe C Désactivation du verrou Smart Cover ........................................................................................ 173 Clé Smart Cover FailSafe ................................................................................................................. 173 Utilisation de la clé Smart Cover FailSafe pour retrait du verrou Smart Cover ................................ 173 Annexe D Décharges électrostatiques ........................................................................................................ 176 Prévention des décharges électrostatiques ..................................................................................... 176 Méthodes de mise à la terre ............................................................................................................. 176 Annexe E Utilisation, entretien courant et préparation au transport ........................................................ 177 Utilisation et entretien courant de l’ordinateur .................................................................................. 177 Précautions relatives à l’unité optique .............................................................................................. 178 Procédure ........................................................................................................................ 178 Nettoyage ........................................................................................................................ 178 Sécurité ............................................................................................................................ 178 Préparation au transport ................................................................................................................... 178 Index ................................................................................................................................................................. 179 viii FRWW 1 Caractéristiques du produit Caractéristiques de la configuration standard Ses caractéristiques peuvent varier en fonction du modèle. Pour obtenir une liste complète du matériel et des logiciels installés sur l'ordinateur, exécutez l'utilitaire de diagnostic (uniquement fourni sur certains modèles d'ordinateurs). Figure 1-1 Configuration minitour convertible REMARQUE : La minitour convertible HP Compaq peut facilement être convertie en un ordinateur de bureau. Reportez-vous à la section Transformation de la minitour en ordinateur de bureau à la page 47 de ce manuel pour plus de détails. Figure 1-2 Configuration microtour FRWW Caractéristiques de la configuration standard 1 Figure 1-3 Configuration compact REMARQUE : L’ordinateur compact peut aussi être utilisé dans une orientation tour. Reportez-vous à la section Conversion de la configuration bureau en minitour à la page 100 de ce manuel pour plus de détails. Figure 1-4 Configuration d'ordinateur de bureau Ultra-Slim 2 Chapitre 1 Caractéristiques du produit FRWW Composants du panneau avant de la microtour convertible (CMT) La configuration des unités peut être différente selon le modèle. Certains modèles sont munis d’un cache protecteur qui recouvre un ou plusieurs compartiments d’unité. Figure 1-5 Éléments du panneau avant Tableau 1-1 Éléments du panneau avant 1 Unités optiques 5,25 pouces 5 Connecteur pour microphone/casque 2 Lecteur de cartes multimédia de 5,25 pouces (en option) 6 Voyant d’alimentation 3 Bouton d’alimentation double état 7 Connecteur de casque 4 Voyant d’activité du disque dur 8 Ports USB (Universal Serial Bus) ATTENTION : Le compartiment 5,25 pouces inférieur est moins profond que les deux compartiments supérieurs. Le compartiment inférieur peut recevoir une unité demi-hauteur ou tout autre périphérique dont la longueur ne dépasse pas 14,5 cm (5,7 pouces). Ne forcez pas une unité plus longue, comme une unité optique, dans le compartiment inférieur. Vous pourriez abîmer l’unité et la carte mère. Si vous forcez trop en mettant une unité de disque en place, vous risquez de l’endommager. REMARQUE : Lorsqu-un périphérique sera branché sur le connecteur Microphone/Casque, une boîte de dialogue apparaîtra et vous demandera si vous souhaitez utilisez le connecteur pour un périphérique d'entrée de ligne microphone ou un casque. Vous pouvez reconfigurer le connecteur à tout moment en double-cliquant sur l'icône Realtek HD Audio Manager de la barre des tâches Windows. REMARQUE : Le voyant d’alimentation est normalement vert lorsque l'ordinateur est sous tension. S’il clignote en rouge, un problème est survenu au niveau de l’ordinateur et un code de diagnostic est affiché. Reportez-vous au Guide de maintenance et d'entretien pour pouvoir interpréter le code. FRWW Composants du panneau avant de la microtour convertible (CMT) 3 Composants du panneau avant de la microtour (MT) La configuration des unités peut être différente selon le modèle. Certains modèles sont munis d’un cache protecteur qui recouvre un ou plusieurs compartiments d’unité. Tableau 1-2 Éléments du panneau avant 1 Unités optiques 5,25 pouces 5 Lecteur de cartes multimédias de 3,5 pouces (en option) 2 Voyant d'activité du disque dur 6 Bouton d'alimentation double état 3 Connecteur pour microphone/casque 7 Voyant d'alimentation 4 Ports USB (Universal Serial Bus) 2.0 8 Connecteur de casque REMARQUE : Lorsqu-un périphérique sera branché sur le connecteur Microphone/Casque, une boîte de dialogue apparaîtra et vous demandera si vous souhaitez utilisez le connecteur pour un périphérique d'entrée de ligne microphone ou un casque. Vous pouvez reconfigurer le connecteur à tout moment en double-cliquant sur l'icône Realtek HD Audio Manager de la barre des tâches Windows. REMARQUE : Le voyant d’alimentation est normalement vert lorsque l'ordinateur est sous tension. S’il clignote en rouge, un problème est survenu au niveau de l’ordinateur et un code de diagnostic est affiché. Reportez-vous au Guide de maintenance et d'entretien pour pouvoir interpréter le code. 4 Chapitre 1 Caractéristiques du produit FRWW Composants du panneau avant de l'ordinateur compact (SFF) La configuration des unités peut être différente selon le modèle. Certains modèles sont munis d’un cache protecteur qui recouvre un ou plusieurs compartiments d’unité. Figure 1-6 Éléments du panneau avant Tableau 1-3 Éléments du panneau avant 1 Unité optique 5,25 pouces 5 Connecteur pour microphone/casque 2 Bouton d’alimentation double état 6 Lecteur de cartes multimédia de 3,5 pouces (en option) 3 Voyant d’alimentation 7 Voyant d’activité du disque dur 4 Ports USB (Universal Serial Bus) 8 Connecteur de casque REMARQUE : Lorsqu-un périphérique sera branché sur le connecteur Microphone/Casque, une boîte de dialogue apparaîtra et vous demandera si vous souhaitez utilisez le connecteur pour un périphérique d'entrée de ligne microphone ou un casque. Vous pouvez reconfigurer le connecteur à tout moment en double-cliquant sur l'icône Realtek HD Audio Manager de la barre des tâches Windows. REMARQUE : Le voyant d’alimentation est normalement vert lorsque l'ordinateur est sous tension. S’il clignote en rouge, un problème est survenu au niveau de l’ordinateur et un code de diagnostic est affiché. Reportez-vous au Guide de maintenance et d'entretien pour pouvoir interpréter le code. FRWW Composants du panneau avant de l'ordinateur compact (SFF) 5 Composants du panneau avant de l'ordinateur de bureau Ultra-Slim (USDT) La configuration des unités peut être différente selon le modèle. Certains modèles sont munis d'un cache protecteur pour la baie de lecteur optique. Figure 1-7 Éléments du panneau avant Tableau 1-4 Éléments du panneau avant 1 Lecteur optique 5 Connecteur pour microphone/casque 2 Voyant d’alimentation 6 Ports USB (Universal Serial Bus) 3 Lecteur de cartes multimédia SD (en option) 7 Voyant d’activité du disque dur 4 Connecteur de casque 8 Interrupteur d'alimentation double état REMARQUE : Lorsqu-un périphérique sera branché sur le connecteur Microphone/Casque, une boîte de dialogue apparaîtra et vous demandera si vous souhaitez utilisez le connecteur pour un périphérique d'entrée de ligne microphone ou un casque. Vous pouvez reconfigurer le connecteur à tout moment en double-cliquant sur l'icône Realtek HD Audio Manager de la barre des tâches Windows. REMARQUE : Le voyant d’alimentation est normalement vert lorsque l'ordinateur est sous tension. S’il clignote en rouge, un problème est survenu au niveau de l’ordinateur et un code de diagnostic est affiché. Reportez-vous au Guide de maintenance et d'entretien pour pouvoir interpréter le code. 6 Chapitre 1 Caractéristiques du produit FRWW Composants du panneau arrière de la minitour convertible (CMT) Figure 1-8 Éléments situés à l’arrière Tableau 1-5 Identification des éléments situés à l’arrière 1 Connecteur du cordon d’alimentation 6 Connecteur audio de sortie de ligne pour périphériques audio alimentés (vert) 2 Connecteur pour clavier PS/2 (violet) 7 Connecteur audio d'entrée de ligne (bleu) 3 Connecteur de moniteur VGA 8 Connecteur pour souris PS/2 (vert) 4 Connecteur de moniteur DisplayPort 9 Connecteur série 5 Ports USB (Universal Serial Bus) 10 Connecteur réseau RJ-45 REMARQUE : Un deuxième port série et un port parallèle sont disponibles en option auprès de HP. Lorsqu’un périphérique est branché au connecteur d’entrée audio bleu, une boîte de dialogue s’ouvre, vous demandant si vous souhaitez utiliser le connecteur pour un périphérique d’entrée ou pour un microphone. Vous pouvez reconfigurer le connecteur à tout moment en double-cliquant sur l’icône Realtek HD Audio Manager de la barre des tâches Windows. Les connecteurs de moniteur sur la carte mère sont inactifs si une carte graphique est installée sur l’ordinateur. Si une carte graphique est installée sur l'un des ports de la carte mère, les connecteurs de la carte graphique et les connecteurs de la carte mère peuvent être utilisés simultanément. Il se peut que certains paramètres doivent être modifiés dans Computer Setup (Configuration de l'ordinateur) pour utiliser les deux connecteurs. FRWW Composants du panneau arrière de la minitour convertible (CMT) 7 Composants du panneau arrière de la microtour (MT) Figure 1-9 Composants du panneau arrière Tableau 1-6 Identification des éléments situés à l’arrière 1 Connecteur du cordon d’alimentation 6 Connecteur audio de sortie de ligne pour périphériques audio alimentés (vert) 2 Connecteur audio d'entrée de ligne (bleu) 7 Connecteur pour clavier PS/2 (violet) 3 Connecteur pour souris PS/2 (vert) 8 Connecteur de moniteur VGA 4 Connecteur série 9 Connecteur de moniteur DisplayPort 5 Connecteur réseau RJ-45 10 Ports USB (Universal Serial Bus) REMARQUE : Un deuxième port série et un port parallèle sont disponibles en option auprès de HP. Lorsqu'un périphérique sera branché au connecteur audio d'entrée de ligne bleu, une boîte de dialogue apparaîtra et vous demandera si vous souhaitez utiliser le connecteur pour un périphérique d'entrée de ligne ou un microphone. Vous pouvez reconfigurer le connecteur à tout moment en double-cliquant sur l'icône Realtek HD Audio Manager de la barre des tâches Windows. Les connecteurs de moniteur sur la carte mère sont inactifs si une carte graphique est installée sur l'ordinateur. Si une carte graphique est installée sur l'un des ports de la carte mère, les connecteurs de la carte graphique et les connecteurs de la carte mère peuvent être utilisés simultanément. Il se peut que certains paramètres doivent être modifiés dans Computer Setup (Configuration de l'ordinateur) pour utiliser les deux connecteurs. 8 Chapitre 1 Caractéristiques du produit FRWW Composants du panneau arrière de l'ordinateur compact (SFF) Figure 1-10 Éléments situés à l’arrière 1 Connecteur réseau RJ-45 6 Connecteur de moniteur DisplayPort 2 Connecteur série 7 Connecteur de moniteur VGA 3 Connecteur pour souris PS/2 (vert) 8 Connecteur pour clavier PS/2 (violet) 4 Connexion du cordon d’alimentation 9 Connecteur audio de sortie de ligne pour périphériques audio alimentés (vert) 5 Ports USB (Universal Serial Bus) 10 Connecteur audio d'entrée de ligne (bleu) REMARQUE : Un deuxième port série et un port parallèle sont disponibles en option auprès de HP. Lorsqu'un périphérique sera branché au connecteur audio d'entrée de ligne bleu, une boîte de dialogue apparaîtra et vous demandera si vous souhaitez utiliser le connecteur pour un périphérique d'entrée de ligne ou un microphone. Vous pouvez reconfigurer le connecteur à tout moment en double-cliquant sur l'icône Realtek HD Audio Manager de la barre des tâches Windows. Les connecteurs de moniteur sur la carte mère sont inactifs si une carte graphique est installée sur l'ordinateur. Si une carte graphique est installée sur l'un des ports de la carte mère, les connecteurs de la carte graphique et les connecteurs de la carte mère peuvent être utilisés simultanément. Il se peut que certains paramètres doivent être modifiés dans Computer Setup (Configuration de l'ordinateur) pour utiliser les deux connecteurs. FRWW Composants du panneau arrière de l'ordinateur compact (SFF) 9 Composants du panneau arrière de l'ordinateur de bureau Ultra-Slim (USDT) Figure 1-11 Éléments situés à l’arrière Tableau 1-7 Composants du panneau arrière 1 Connecteur audio de sortie de ligne pour périphériques audio alimentés (vert) 6 Connexion du cordon d’alimentation 2 Connecteur pour clavier PS/2 (violet) 7 Tuner TV (en option) 3 Ports USB (Universal Serial Bus) 8 Connecteur audio d'entrée de ligne (bleu) 4 Connecteur de moniteur DisplayPort 9 Connecteur pour souris PS/2 (vert) 5 Connecteur de moniteur VGA 10 Connecteur réseau RJ-45 REMARQUE : Sur certains modèles, le tuner TV en option est remplacé par une antenne sans fil en option. Sur d'autres, il n'y a pas de composant en option à cet emplacement. Lorsqu'un périphérique sera branché au connecteur audio d'entrée de ligne bleu, une boîte de dialogue apparaîtra et vous demandera si vous souhaitez utiliser le connecteur pour un périphérique d'entrée de ligne ou un microphone. Vous pouvez reconfigurer le connecteur à tout moment en double-cliquant sur l'icône Realtek HD Audio Manager de la barre des tâches Windows. 10 Chapitre 1 Caractéristiques du produit FRWW Composants du lecteur de cartes multimédia Le lecteur de cartes multimédia est un périphérique en option disponible sur certains modèles uniquement. Reportez-vous à l’illustration et au tableau suivants pour identifier les composants du lecteur de cartes multimédia. Figure 1-12 Composants du lecteur de cartes multimédia Tableau 1-8 Composants du lecteur de cartes multimédia N° Connecteur Support 1 xD ● xD-Picture Card (xD) 2 MicroSD ● MicroSD (T-Flash) ● MicroSDHC 3 Voyant d’activité du lecteur de cartes multimédia 4 SD/MMC+/miniSD ● Secure Digital (SD) ● SDHC (Secure Digital High Capacity) ● MiniSD ● MiniSDHC ● MultiMediaCard (MMC) ● Carte MultiMediaCard de taille réduite (RS MMC) ● MultiMediaCard 4.0 (MMC Plus) ● Carte MultiMediaCard 4.0 de taille réduite (RS MMC) ● MMC Micro (adaptateur requis) 5 USB ● Port USB (Universal Serial Bus) 6 CompactFlash I/II ● Carte CompactFlash Type 1 ● Carte CompactFlash Type 2 ● MicroDrive 7 MS PRO/MS PRO DUO ● Memory Stick (MS) ● MagicGate Memory Stick (MG) ● MagicGate Memory Duo ● Memory Stick Select ● Memory Stick Duo (MS Duo) ● Memory Stick PRO (MS PRO) ● Memory Stick PRO Duo (MS PRO Duo) ● Memory Stick PROHG Duo ● Memory Stick Micro (M2) (adaptateur requis) FRWW Composants du lecteur de cartes multimédia 11 Clavier Figure 1-13 Éléments du clavier Tableau 1-9 Éléments du clavier 1 Touches de fonction Ces touches permettent d’effectuer des fonctions spéciales, selon l’application utilisée. 2 Touches d’édition Exemples : Inser, Origine, Page précédente, Suppr, Fin et Page suivante. 3 Voyants d’état Indiquent l’état des paramètres de l’ordinateur et du clavier (Verr num, Verr maj et Arrêt défil). 4 Touches numériques Ces touches offrent la même fonction que le clavier numérique d’une calculatrice. 5 Touches de direction Ces touches sont utilisées pour parcourir un document ou un site Web. Elles permettent de se déplacer vers la gauche, la droite, le haut ou le bas à l’aide du clavier plutôt que d’utiliser la souris. 6 Touche Ctrl Utilisée en combinaison avec une autre touche ; les effets varient en fonction des applications. 7 Touche Application1 Utilisée (comme le bouton droit de la souris) pour ouvrir les menus contextuels dans une application Microsoft Office. D’autres fonctions peuvent lui être associées dans d’autres applications. 8 Touches logo Windows1 Ces touches permettent d’ouvrir le menu Démarrer de Microsoft Windows. Utilisées avec d’autres touches pour exécuter d’autres fonctions. 9 Touche Alt Utilisée en combinaison avec une autre touche ; les effets varient en fonction des applications. 1 Touches disponibles dans certaines régions géographiques. 12 Chapitre 1 Caractéristiques du produit FRWW Utilisation des touches de logo Windows La combinaison de la touche logo Windows avec d’autres touches permet d’accomplir certaines fonctions dans le système d’exploitation Windows. Pour identifier la touche logo Windows, reportezvous à la section Clavier à la page 12. Tableau 1-10 Fonctions de la touche logo Windows Les fonctions suivantes de la touche logo Windows sont disponibles dans Microsoft Windows XP, Microsoft Windows Vista et Microsoft Windows 7. Touche logo Windows Permet d’afficher ou de dissimuler le menu Démarrer Touche logo Windows + d Permet d’afficher le Bureau Touche logo Windows + m Réduit toutes les applications ouvertes Maj + Touche logo Windows + m Annule la réduction de toutes les applications Touche logo Windows + e Permet d’exécuter le Poste de travail Touche logo Windows + f Lance Rechercher : tous Touche logo Windows + Ctrl + f Lance la boíte de dialogue Rechercher : ordinateur Touche logo Windows + F1 Permet d’exécuter l’Aide de Windows Touche logo Windows + l Permet de verrouiller l’ordinateur si vous êtes connecté à un domaine de réseau ou, dans le cas contraire, permet de passer d’un utilisateur à l’autre Touche logo Windows + r Exécute la boíte de dialogue Exécuter Touche logo Windows + u Exécute Utility Manager Touche logo Windows + Tab Windows XP : permet de naviguer entre les boutons de la barre des tâches Windows Vista et Windows 7 : permet de naviguer entre les programmes de la barre des tâches à l’aide de Windows Flip 3- D En plus des fonctions de la touche logo Windows décrites ci-dessus, les fonctions suivantes sont également disponibles dans Microsoft Windows Vista et Windows 7. Ctrl + Touche logo Windows + Tab Utilisez les touches de direction pour naviguer entre les programmes de la barre des tâches à l’aide de Windows Flip 3-D Touche logo Windows + Barre espace Place tous les gadgets à l’avant et sélectionne la barre latérale Windows Touche logo Windows + g Permet de naviguer entre les gadgets de la barre latérale Touche logo Windows + t Permet de naviguer entre les programmes de la barre des tâches Touche logo Windows + u Permet d’exécuter les options d’ergonomie Touche logo Windows + n’importe quelle touche Permet d’exécuter le raccourci de lancement rapide correspondant au numéro (par exemple, la touche logo Windows + 1 lance le premier raccourci du menu de lancement rapide) En plus des fonctions de la touche logo Windows décrites ci-dessus, les fonctions suivantes sont également disponibles dans Microsoft Windows 7. FRWW Clavier 13 Tableau 1-10 Fonctions de la touche logo Windows (suite) Touche logo Windows + Ctrl + b Bascule vers le programme ayant affiché un message dans la zone de notification Touche logo Windows + p Choisissez un mode d’affichage de la présentation Touche logo Windows + flèche haut Agrandit la fenêtre Touche logo Windows + flèche gauche Positionne la fenêtre à gauche de l’écran Touche logo Windows + flèche droite Positionne la fenêtre à droite de l’écran Touche logo Windows + flèche bas Réduit la fenêtre Touche logo Windows + Maj + flèche haut Étire la fenêtre vers le haut et vers le bas de l’écran Touche logo Windows + Maj + flèche gauche ou flèche droite Déplace une fenêtre d’un moniteur à un autre Touche logo Windows + + (sur le pavé numérique) Effectue un zoom avant Touche logo Windows + - (sur le pavé numérique) Effectue un zoom arrière Emplacement du numéro de série Chaque ordinateur possède un numéro de série unique et un ID de produit situés sur son capot supérieur. Ayez toujours ces numéros à portée de main lorsque vous contactez le service clientèle. Figure 1-14 Emplacement du numéro de série et de l'ID de produit de la minitour convertible 14 Chapitre 1 Caractéristiques du produit FRWW Figure 1-15 Emplacement du numéro de série et de l’ID de produit de la microtour Figure 1-16 Emplacement du numéro de série et de l'ID de produit de l'ordinateur compact FRWW Emplacement du numéro de série 15 Figure 1-17 Emplacement du numéro de série et de l'ID de produit de l'ordinateur de bureau UltraSlim (USDT) 16 Chapitre 1 Caractéristiques du produit FRWW 2 Mises à niveau matérielles de la minitour convertible (CMT) Fonctionnalités de maintenance L’ordinateur possède des fonctions facilitant sa mise à niveau et son entretien. La plupart des procédures d’installation décrites dans ce chapitre ne nécessitent aucun outil. Avertissements et précautions Avant toute mise à niveau, suivez scrupuleusement toutes les instructions s’y rapportant et n’oubliez pas de lire les notes d’avertissement et d’attention de ce manuel. AVERTISSEMENT ! Afin de réduire les risques de blessures provenant de choc électrique, de surface à haute température ou d’incendie : Déconnectez le cordon d’alimentation de la prise murale et laissez refroidir les éléments internes du système avant de les toucher. Ne branchez pas de connecteurs de téléphone ou de télécommunication sur les prises de carte réseau. Utilisez toujours la fiche de terre du cordon d’alimentation. La fiche de terre est un élément de sécurité important. Branchez le cordon d’alimentation sur une prise secteur avec conducteur de terre, accessible facilement. Pour éviter tout risque de blessure grave, lisez le manuel Sécurité et ergonomie du poste de travail. Ce manuel explique comment agencer correctement un poste de travail et comment s’installer confortablement devant un ordinateur. Il contient également d’importantes informations sur la sécurité électrique et mécanique. Ce manuel est disponible sur le Web à l’adresse http://www.hp.com/ergo. AVERTISSEMENT ! Cet équipement contient des pièces sous tension et mobiles. Débranchez-le avant d’ôter son boîtier. Remettez en place ce boîtier et assurez-vous qu’il est bien fixé avant de remettre l’équipement sous tension. ATTENTION : L’électricité statique peut endommager les composants électriques de l’ordinateur ou de l’équipement en option. Il est conseillé de toucher un objet métallique relié à la terre avant de commencer l'installation. Consultez Décharges électrostatiques à la page 176 pour plus d'informations. Quand l’ordinateur est branché sur le secteur, la carte mère est sous tension. Vous devez déconnecter le cordon d’alimentation avant d’ouvrir l’ordinateur pour prévenir toute détérioration des composants internes. FRWW Fonctionnalités de maintenance 17 Retrait du panneau d'accès à l'ordinateur Pour accéder aux composants internes, vous devez enlever le panneau d’accès : 1. Retirez/dégagez tout périphérique de sécurité qui gêne l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Mettez l'ordinateur hors tension sans risque via le système d'exploitation, puis mettez les périphériques externes hors tension. 4. Débranchez le cordon d'alimentation de la prise électrique, puis débranchez tout périphérique externe. ATTENTION : Quel que soit l'état de mise sous tension, une tension est toujours présente sur la carte mère tant que le système est branché sur une prise secteur active. Vous devez débrancher le cordon d'alimentation pour éviter d'endommager les composants internes de l'ordinateur. 5. Soulevez la poignée du panneau d’accès (1) puis soulevez le panneau d’accès de l’ordinateur (2). Figure 2-1 Retrait du panneau d'accès à l'ordinateur 18 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) FRWW Remise en place du panneau d'accès de l'ordinateur Faites glisser l’onglet situé à l’avant du panneau d’accès sous l’onglet situé à l’avant du châssis (1), puis appuyez l’arrière du panneau d’accès dans l’appareil jusqu’à ce qu’il s’emboîte (2). Figure 2-2 Remise en position du panneau d’accès de l’ordinateur FRWW Remise en place du panneau d'accès de l'ordinateur 19 Retrait du panneau avant 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Retirez le panneau d’accès de l’ordinateur. 6. Soulevez les trois onglets sur le côté du cache avant (1), puis faites pivoter le cache avant pour le retirer du châssis (2). Figure 2-3 Retrait du cache avant 20 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) FRWW Retrait des caches protecteurs Sur certains modèles, des caches protecteurs pour baies de lecteur 5,25 pouces doivent être retirés avant d'installer un lecteur. Pour retirer un cache protecteur : 1. Retirez le panneau d'accès et le panneau avant. 2. Retirez doucement le sous-panneau du cache avant, caches protecteurs fixés, puis retirez le cache protecteur voulu. ATTENTION : Maintenez le sous-panneau droit lorsque vous le retirez du cache avant. L’inclinaison du sous-panneau pendant son retrait pourrait endommager les broches permettant de l’aligner sur le cache avant. Figure 2-4 Retrait des caches protecteurs du sous-panneau (sur l’ordinateur de bureau) REMARQUE : Lorsque vous remettez le sous-panneau en place, assurez-vous que les broches d’alignement et les caches protecteurs restants sont orientés correctement. Le panneau secondaire est correctement orienté lorsque son logo se trouve en bas. FRWW Retrait des caches protecteurs 21 Remise en place du panneau avant Insérez les trois crochets en bas du cache avant dans les trous rectangulaires du châssis (1), puis faites pivoter le haut du cache avant dans le châssis (2) jusqu’à ce qu’il s’emboîte. Figure 2-5 Remise en position du cache avant Connexions de la carte mère Reportez-vous à l'illustration et au tableau suivants pour identifier les connecteurs de la carte mère. Figure 2-6 Connexions de la carte mère 22 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) FRWW Tableau 2-1 Connexions de la carte mère N Connecteur de la carte mère Étiquette de carte mère Couleur Composant 1 PCI PCI3 blanc Carte d'extension 2 PCI PCI2 blanc Carte d'extension 3 PCI PCI1 blanc Carte d'extension 4 Port parallèle PAR noir Port parallèle 5 PCI Express x16 rétrogradé en x4 X4PCIEXP blanc Carte d'extension 6 PCI Express x16 X16PCIEXP noir Carte d'extension 7 PCI Express x1 X1PCIEXP1 noir Carte d'extension 8 Verrou de la protection HLCK noir Verrou de la protection 9 Détecteur d'ouverture du capot HSENSE blanc Détecteur d'ouverture du capot 10 DIMM4 (canal A) DIMM4 blanc Module de mémoire 11 DIMM3 (canal A) DIMM3 noir Module de mémoire 12 DIMM2 (canal B) DIMM2 blanc Module de mémoire 13 DIMM1 (canal B) DIMM1 noir Module de mémoire 14 Alimentation SATA PWR1 noir Lecteurs optiques SATA 15 Alimentation SATA PWR0 noir Disques durs SATA 16 USB MEDIA noir Périphérique USB tel qu'un lecteur de cartes multimédias 17 USB MEDIA2 noir Périphérique USB tel qu'un lecteur de cartes multimédias 18 SATA 2.0 SATA2 blanc 3ème disque dur ou 1er lecteur optique s'il n'y a pas de 3ème disque dur 19 SATA 3.0 SATA0 bleu foncé 1er disque dur 20 SATA 3.0 SATA1 bleu clair 2ème disque dur 21 SATA 2.0 SATA3 blanc 2ème lecteur optique ou 1er lecteur optique si un 3ème disque dur est installé 22 eSATA ESATA noir Câble adaptateur eSATA ou 2ème lecteur optique si un 3ème disque dur est installé 23 Port série COMB noir Port série FRWW Connexions de la carte mère 23 Installation de mémoire supplémentaire L’ordinateur est fourni avec des modules mémoire DDR3-SDRAM DIMM. Modules DIMM Les supports mémoire de la carte mère peuvent recevoir un maximum de quatre modules DIMM standard. À la livraison, ces connecteurs pour module mémoire accueillent au moins un module mémoire préinstallé. Pour exploiter entièrement la prise en charge de mémoire, vous pouvez équiper la carte mère d’un maximum de 16 Go de mémoire dans une configuration hautes performances à deux canaux. DDR3-SDRAM DIMM ATTENTION : Ce produit NE prend PAS en charge la mémoire DDR3 Ultra Low Voltage (tension ultra faible) (DDR3U). Le processeur n'est pas compatible avec la mémoire DDR3U et si vous branchez de la mémoire DDR3U sur la carte mère, cela peut endommager physiquement le module DIMM ou provoquer un dysfonctionnement du système. Pour que le système fonctionne correctement, les modules mémoire DDR3-SDRAM DIMM doivent être : ● standard à 240 broches ● sans tampon, non-ECC, conformes à la norme PC3-8500 DDR3-1066 MHz ou à la norme PC3-10600 DDR3-1333 MHz ● 1,5 volt DDR3-SDRAM DIMM Les modules mémoire DDR3-SDRAM DIMM doivent également : ● prendre en charge une latence CAS 7 DDR3 1066 MHz (rythme 7-7-7) et une latence CAS 9 DDR3 1333 MHz (rythme 9-9-9) ● contenir les informations obligatoires du JEDEC SPD De plus l’ordinateur doit prendre en charge : ● les technologies de mémoire non-ECC à 512 Mbits, 1 Gbit et 2 Gbits ● les modules DIMM à une face ou deux faces ● les modules DIMM construits avec des puces x8 et x16 DDR ; les puces x4 SDRAM ne sont pas prises en charge REMARQUE : Le système ne fonctionnera pas correctement si vous installez des modules DIMM non pris en charge. 24 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) FRWW Remplissage des supports DIMM La carte mère est équipée de quatre supports DIMM, deux par canal. Ceux-ci sont identifiés DIMM1, DIMM2, DIMM3 et DIMM4. Les sockets DIMM1 et DIMM2 fonctionnent sur le canal mémoire B. Les sockets DIMM3 et DIMM4 fonctionnent sur le canal mémoire A. Le système fonctionnera automatiquement en mode à un canal, à deux canaux ou flexible, en fonction de la position des modules DIMM. ● Le système fonctionne dans le mode à un canal si les modules DIMM sont installés dans les supports d’un même canal. ● Le système fonctionne en mode performant entrelacé à deux canaux si la capacité totale des modules DIMM du canal A est égale à celle des modules du canal B. Cependant, la technologie et la capacité des modules peuvent être différentes entre les deux canaux. Par exemple, si le canal A comporte deux modules DIMM de 1 Go et le canal B un module de 2 Go, le système fonctionnera en mode double canal. ● Le système fonctionne en mode flexible entrelacé si la capacité totale des modules DIMM du canal A n’est pas égale à celle des modules du canal B. En mode flexible, le canal doté de la quantité la plus faible de mémoire décrit la capacité totale de mémoire attribuée aux deux canaux et le reste est alloué à un canal unique. Pour obtenir une vitesse optimale, les canaux doivent être équilibrés afin que la quantité la plus élevée de mémoire soit répartie entre les deux canaux. Si un canal doit disposer de plus de mémoire que l’autre, la plus grande quantité doit être attribuée au canal A. Par exemple, si vous remplissez les supports avec un module DIMM de 2 Go et trois modules DIMM de 1 Go, le canal A devra être rempli avec le module DIMM de 2 Go et un module DIMM de 1 Go, tandis que le canal B devra être rempli avec les deux autres modules DIMM de 1 Go. Dans cette configuration, 4 Go sont exécutés en tant que double canal et 1 Go en tant que canal unique. ● Dans chaque mode, le module DIMM le plus lent du système détermine la vitesse maximum de fonctionnement. Installation de modules DIMM ATTENTION : Avant d'ajouter ou de retirer des modules mémoire, vous devez déconnecter le cordon d'alimentation et attendre environ 30 secondes pour éliminer toute énergie résiduelle. Quel que soit l'état de mise sous tension, une tension est toujours fournie aux modules mémoire tant que l'ordinateur est branché sur une prise secteur active. L'ajout ou le retrait de modules mémoire alors qu'une tension est toujours présente peut endommager de manière irrémédiable les modules mémoire ou la carte mère. Les supports des modules mémoire possèdent des contacts en or. Lors de la mise à niveau de la mémoire, il convient d’utiliser des modules DIMM avec des contacts en or, afin d’éviter les risques de corrosion et/ou d’oxydation pouvant résulter du contact de deux métaux incompatibles. L'électricité statique peut endommager les composants électroniques de l'ordinateur ou des cartes en option. Il est conseillé de toucher un objet métallique relié à la terre avant de commencer l'installation. Pour plus d'informations, reportez-vous à Décharges électrostatiques à la page 176. Lorsque vous manipulez un module mémoire, ne touchez aucun contact, car vous risqueriez d’endommager le module. 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. FRWW Installation de mémoire supplémentaire 25 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Avant d'ajouter ou de retirer des modules mémoire, vous devez déconnecter le cordon d'alimentation et attendre environ 30 secondes pour éliminer toute énergie résiduelle. Quel que soit l'état de mise sous tension, une tension est toujours fournie aux modules mémoire tant que l'ordinateur est branché sur une prise secteur active. L'ajout ou le retrait de modules mémoire alors qu'une tension est toujours présente peut endommager de manière irrémédiable les modules mémoire ou la carte mère. 5. Retirez le panneau d’accès de l’ordinateur. AVERTISSEMENT ! Afin d’éviter toute brûlure, il est conseillé de laisser refroidir les éléments internes du système avant de les toucher. 6. Ouvrez les deux loquets du support de module mémoire (1) et insérez le module mémoire dans le support (2). Figure 2-7 Installation d’un module DIMM REMARQUE : Un module mémoire ne peut être installé que dans un sens. Faites coïncider l’encoche du module avec la languette du support de mémoire. Occupez les sockets DIMM noirs avant d'occuper les sockets DIMM blancs. Pour obtenir des performances maximales, remplissez les supports afin que la capacité de mémoire soit répartie autant que possible entre les canaux A et B. Reportez-vous à la section Remplissage des supports DIMM à la page 25 pour plus d’informations. 7. Enfoncez le module dans le connecteur jusqu’à ce qu’il soit complètement inséré et correctement enclenché. Assurez-vous de refermer les loquets (3). 8. Répétez les étapes 6 et 7 pour installer d’autres modules. 9. Remettez en place le panneau d’accès de l’ordinateur. 10. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 11. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d’accès. L’ordinateur doit reconnaître automatiquement la mémoire ajoutée à la mise sous tension qui suit. 26 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) FRWW Retrait ou installation d'une carte d'extension L’ordinateur possède trois connecteurs d’extension PCI pleine hauteur standard : un connecteur d’extension PCI Express x1, un connecteur d’extension PCI Express x16 et un connecteur d’extension PCI Express x16 rétrogradé en connecteur x4. REMARQUE : Vous pouvez installer une carte d’extension PCI Express x1, x8 ou x16 dans les connecteurs PCI Express x16. Pour les configurations à deux cartes graphiques, la première carte (principale) doit être installée dans le connecteur PCI Express x16 NON rétrogradé en connecteur x4. Pour retirer, remplacer ou ajouter une carte d’extension : 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Retirez le panneau d’accès de l’ordinateur. 6. Repérez le support de carte d’extension approprié sur la carte mère, ainsi que le support de carte d’extension correspondant à l’arrière du châssis de l’ordinateur. 7. Appuyez sur les deux languettes vertes à l’intérieur du châssis (1) et relevez le bras servant à maintenir la carte d’extension (2). Figure 2-8 Ouverture du dispositif de retenue 8. Avant d’installer une carte d’extension, retirez le cache du support d’extension ou la carte d’extension existante. FRWW Retrait ou installation d'une carte d'extension 27 REMARQUE : Avant de retirer une carte d’extension déjà installée, débranchez tous les câbles qui y sont rattachés. a. Si vous installez une carte d’extension dans un support libre, retirez l’obturateur correspondant à l’arrière du châssis. Faites-le glisser hors du châssis en tirant dessus. Figure 2-9 Retrait d'un cache de carte d'extension b. Si vous retirez une carte PCI standard ou PCI Express x1, tenez-la à chaque extrémité et faites-la délicatement basculer d’avant en arrière jusqu’à ce qu’elle sorte de son support. Soulevez la carte à la verticale pour la retirer. Veillez à ne pas la rayer en heurtant d’autres composants. Figure 2-10 Retrait d'une carte d'extension PCI standard 28 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) FRWW c. Si vous retirez une carte PCI Express x16, tirez sur le bras de fixation à l’arrière du support pour l’écarter de la carte, puis faites délicatement basculer la carte jusqu’à ce qu’elle sorte de son support. Dégagez-la ensuite en tirant verticalement. Prenez garde de ne pas rayer la carte contre d’autres éléments. Figure 2-11 Retrait d'une carte d'extension PCI Express x16 9. Placez la carte retirée dans un emballage antistatique. 10. Si vous n’installez pas de nouvelle carte d’extension, installez l’obturateur d’extension pour fermer l’orifice. ATTENTION : Après avoir retiré une carte d'extension, vous devez la remplacer par une nouvelle carte ou par un cache pour permettre le refroidissement des composants internes pendant leur fonctionnement. FRWW Retrait ou installation d'une carte d'extension 29 11. Pour installer une nouvelle carte, insérez l’équerre de l’extrémité de la carte d’extension dans la fente à l’arrière du châssis et appuyez fermement sur la carte pour qu’elle s’emboîte à fond dans son support. Figure 2-12 Installation d’une carte d’extension REMARQUE : Lorsque vous installez une carte d’extension, appuyez fermement sur la carte, de sorte que l’ensemble du connecteur soit correctement enclenché dans le connecteur de carte d’extension. 12. Fermez le mécanisme de retenue en veillant à ce qu’il s’enclenche convenablement. 13. Le cas échéant, branchez les câbles extérieurs sur la carte installée. Connectez les câbles intérieurs à la carte mère, si nécessaire. 14. Remettez en place le panneau d’accès de l’ordinateur. 15. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 16. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d’accès de l’ordinateur. 17. Le cas échéant, reconfigurez l’ordinateur. 30 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) FRWW Emplacement des unités Figure 2-13 Positions des lecteurs (configuration présentée pour la minitour) Tableau 2-2 Emplacements des unités 1 Trois baies de lecteur 5,25 pouces pour les lecteurs optionnels (lecteurs optiques et lecteurs de cartes multimédias présentés) 2 Trois compartiments de disque dur interne de 3,5 pouces REMARQUE : La configuration d’unité de votre ordinateur peut être différente de celle illustrée ci-dessus. Le compartiment 5,25 pouces inférieur est moins profond que les deux compartiments supérieurs. Le compartiment inférieur peut recevoir une unité demi-hauteur ou tout autre périphérique dont la longueur ne dépasse pas 14,5 cm (5,7 pouces). Ne forcez pas une unité plus longue, comme une unité optique, dans le compartiment inférieur. Vous pourriez abîmer l’unité et la carte mère. Si vous forcez trop en mettant une unité de disque en place, vous risquez de l’endommager. Pour vérifier le type et la taille des périphériques de stockage installés dans l’ordinateur, exécutez l’utilitaire Computer Setup. FRWW Emplacement des unités 31 Retrait d'un lecteur d'une baie de lecteur ATTENTION : Avant de retirer une unité de l’ordinateur, veillez à ce qu’elle ne contienne pas de support amovible. 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Retirez le panneau d'accès et le cache avant. 6. Déconnectez les câbles d’unité, comme indiqué par les illustrations suivantes. ATTENTION : Lorsque vous déconnectez un câble, tirez sur son connecteur et pas sur le câble lui-même, car vous pourriez l’endommager. ● Si vous retirez une unité optique, déconnectez le cordon d’alimentation (1) et le câble de données (2) à l’arrière de l’unité. Figure 2-14 Déconnexion des câbles de l’unité optique 32 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) FRWW ● Si vous retirez un lecteur de cartes multimédias, déconnectez le câble USB de la carte mère. Figure 2-15 Déconnexion du câble USB du lecteur de cartes multimédia ● Si vous retirez un disque dur, déconnectez le câble d'alimentation (1) et le câble de données (2) à l'arrière du disque. Figure 2-16 Déconnexion des câbles du disque dur FRWW Retrait d'un lecteur d'une baie de lecteur 33 7. Retirez l’unité de son compartiment en procédant comme suit : ● Pour retirer une unité 5,25 pouces dans la configuration bureau, appuyez sur le mécanisme de blocage jaune (1) et faites glisser l’unité hors du compartiment (2). ATTENTION : Lorsque vous appuyez sur le mécanisme de verrouillage de disques jaune, tous les lecteurs 5,25 pouces sont déverrouillés. N'inclinez donc pas l'unité centrale et ne laissez pas les lecteurs tomber. Figure 2-17 Retrait d’une unité 5,25 pouces dans la configuration bureau (unité optique illustrée) ● Pour retirer une unité de 5,25 pouces dans la configuration minitour, tirez sur son mécanisme de verrouillage d’unité vert (1) et faites-la glisser hors du compartiment (2). Figure 2-18 Retrait d’une unité de 5,25 pouces dans la configuration minitour (unité optique illustrée) 34 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) FRWW ● Pour retirer un disque dur de l'une des baies de disque dur interne, tirez le mécanisme de verrouillage de disque dur (1) de ce disque et faites glisser le disque hors de la baie de disque dur (2). Figure 2-19 Retrait d'un disque dur des deux baies inférieures ● Pour retirer un disque dur d'une baie de disque dur interne supérieure, retirez la vis fixant le disque à sa place sur le côté de la baie (1) puis faites glisser le disque hors de la baie (2). Figure 2-20 Retrait d'un disque dur de la baie supérieure FRWW Retrait d'un lecteur d'une baie de lecteur 35 Installation des lecteurs Lors de l'installation de lecteurs, suivez ces consignes : ● Le disque dur principal Serial ATA (SATA) doit être relié au connecteur SATA bleu foncé de la carte mère. Il porte l'inscription SATA0. Si vous ajoutez un deuxième disque dur, reliez-le au connecteur SATA1 bleu clair. ● Connectez la première unité optique SATA au connecteur SATA blanc libellé SATA2 sur la carte mère. Si vous ajoutez un deuxième lecteur optique, reliez-le au connecteur SATA3 blanc. ● Reliez un câble adaptateur eSATA optionnel au connecteur SATA noir de la carte mère. Il porte l'inscription ESATA. ● Connectez un câble USB de lecteur de cartes multimédias au connecteur USB de la carte mère libellé MEDIA. ● Le câble d'alimentation destiné aux lecteurs optiques SATA est un câble à deux connecteurs. Il est branché à la carte mère, le premier connecteur est acheminé vers la baie 5,25 pouces du milieu et le deuxième connecteur est acheminé vers la baie 5,25 pouces du haut. ● Le câble d'alimentation destiné aux disques durs SATA est un câble à trois connecteurs. Il est branché à la carte mère, le premier connecteur est acheminé vers la baie 3,5 pouces du bas, le deuxième connecteur est acheminé vers la baie 3,5 pouces du milieu et le troisième connecteur est acheminé vers la baie 3,5 pouces du haut. ● Le système ne prend pas en charge les unités optiques PATA (Parallel ATA) ni les disques durs PATA. ● Vous devez installer les vis de guidage pour garantir que le lecteur s'alignera correctement dans la cage de lecteur et qu'il se verrouillera en place. Des vis de guidage supplémentaires installées sur le châssis sont fournies par HP. Le disque dur nécessite des vis de guidage d'isolation 6-32 pour les deux baies inférieures et des vis standard 6-32 pour la baie supérieure. Quatre de ces vis s'installent sur le support de disque dur sous le panneau d'accès. Tous les autres lecteurs nécessitent des vis métriques M3. Huit d'entre elles s'installent sur le support de lecteur optique situé sous le panneau d'accès. Les vis de guidage métriques fournies par HP sont noires. Les vis de guidage d’isolation 6-32 fournies par HP sont de couleur argent et bleue. Les vis standard 6-32 fournies par HP sont de couleur argent. Si vous remplacez le disque dur principal, vous 36 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) FRWW devez retirer les quatre vis de guidage d'isolation 6-32 de couleur argent et bleue de l'ancien disque dur et installez-les sur le nouveau disque dur. Figure 2-21 Emplacements des vis de guidage supplémentaires N° Vis de guidage Périphérique 1 Vis métriques M3 noires Unités de 5,25 pouces 2 Vis standard 6-32 de couleur argent Disque dur 3,5 pouces dans la baie de lecteur du haut (baie 4) 3 Vis d’isolation 6-32 de couleur argent et bleu Disques durs 3,5 pouces dans les baies de lecteur du milieu et du bas (baie 5 et 6) ATTENTION : Pour éviter tout risque de perte de données et de dégât à l’ordinateur ou à une unité : Si vous insérez ou retirez une unité, arrêtez correctement le système d’exploitation, mettez l’ordinateur hors tension, puis débranchez le cordon d’alimentation. Ne retirez pas une unité lorsque l’ordinateur est sous tension ou en mode veille. Il est conseillé de toucher un objet métallique relié à la terre avant de manipuler une unité. Évitez de toucher les connecteurs lorsque vous manipulez une unité. Pour plus d'informations vous permettant d'éviter les endommagements provoqués par de l'électricité statique, reportez-vous à Décharges électrostatiques à la page 176. Manipulez l’unité avec précaution ; ne la laissez pas tomber. Ne forcez pas lors de l’insertion d’une unité. Évitez d’exposer l’unité à des liquides, des températures extrêmes ou au champ magnétique émis par des appareils tels que des moniteurs ou des haut-parleurs. Si vous devez envoyer une unité par la poste, prenez soin de la placer dans un emballage à bulles d’air ou tout autre emballage offrant une protection suffisante. Veuillez également apposer sur le colis une étiquette indiquant « Fragile : à manipuler avec précaution ». FRWW Installation des lecteurs 37 Installation d'un lecteur 5,25 pouces dans une baie de lecteur 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Retirez le panneau d’accès de l’ordinateur. 6. Retirez le panneau avant. Si vous installez une unité dans un compartiment couvert par un cache protecteur, retirez ce dernier. Pour plus d’informations, reportez-vous à la section Retrait des caches protecteurs à la page 21. 38 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) FRWW 7. Installez quatre vis de guidage métriques M3 dans les trous inférieurs de chaque côté de l’unité (1). Quatre vis de guidage métriques M3 supplémentaires sont fournies par HP sur le support d’unité de 5,25 pouces, sous le panneau d’accès. Les vis de guidage métriques M3 sont noires. Reportez-vous à la section Installation des lecteurs à la page 36 pour une illustration de l’emplacement des vis de guidage métriques M3 supplémentaires. REMARQUE : Lorsque vous remplacez une unité de disque, placez les quatre vis M3 de l’ancienne unité sur la nouvelle. ATTENTION : Utilisez uniquement des vis de guidage de 5 mm de long. Des vis plus longues peuvent endommager les composants internes de l’unité. Figure 2-22 Installation d’une unité 5,25 pouces dans les configurations minitour (haut) et bureau (bas) 8. Installez l’unité dans le compartiment d’unité voulu en la faisant glisser entièrement à l’avant de la cage d’unité jusqu’à ce qu’elle s’enclenche (2). Le dispositif de verrouillage la maintient en place automatiquement. ATTENTION : Le compartiment 5,25 pouces inférieur est moins profond que les deux compartiments supérieurs. Le compartiment inférieur peut recevoir une unité demi-hauteur ou tout autre périphérique dont la longueur ne dépasse pas 14,5 cm (5,7 pouces). Ne forcez pas une unité plus longue, comme une unité optique, dans le compartiment inférieur. Vous pourriez abîmer l’unité et la carte mère. Si vous forcez trop en mettant une unité de disque en place, vous risquez de l’endommager. FRWW Installation des lecteurs 39 9. Connectez le cordon d'alimentation et le câble de données à l'unité comme indiqué par les illustrations suivantes. a. Si vous installez une unité optique, connectez le cordon d'alimentation (1) et le câble de données (2) à l'arrière de l'unité. REMARQUE : Le câble d'alimentation destiné aux lecteurs optiques est un câble à deux connecteurs acheminé de la carte mère jusqu'à l'arrière des baies de lecteur optique. Figure 2-23 Connexion des câbles d'unité optique b. Si vous installez un lecteur de cartes multimédia, connectez le câble USB au connecteur USB de la carte mère libellé MEDIA. Figure 2-24 Connexion du câble USB du lecteur de cartes multimédia 10. Si vous installez une nouvelle unité, connectez l’autre extrémité du câble de données au connecteur approprié de la carte mère. 40 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) FRWW REMARQUE : Si vous installez un nouveau lecteur optique SATA, reliez le câble de données destiné au premier lecteur optique au connecteur SATA blanc de la carte mère. Il porte l'inscription SATA2. Reliez le câble de données destiné à un deuxième lecteur optique au connecteur SATA blanc de la carte mère. Il porte l'inscription SATA3. Reportez-vous à Connexions de la carte mère à la page 22 pour obtenir une illustration des connecteurs de lecteurs de la carte mère. 11. Replacez le cache avant et le panneau d’accès de l’ordinateur. 12. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 13. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d’accès de l’ordinateur. FRWW Installation des lecteurs 41 Installation d’un disque dur dans une baie de lecteur interne REMARQUE : Le système ne prend pas en charge les disques durs PATA (Parallel ATA). Avant de retirer l’ancien disque dur, assurez-vous de sauvegarder ses données de manière à pouvoir les transférer sur le nouveau disque. Pour installer un disque dur dans un compartiment d’unité interne 3,5 pouces : 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Retirez le panneau d’accès de l’ordinateur. 6. Installez des vis de guidage sur les côtés du lecteur. Le type de vis utilisé dépend de la baie de lecteur utilisée pour accueillir le lecteur. Si vous installez un disque 2,5 pouces, vous devez installer le disque dans un support adaptateur. REMARQUE : Des vis supplémentaires sont installées sur le support de disque dur sous le panneau d'accès. Reportez-vous à Installation des lecteurs à la page 36 pour obtenir une illustration des emplacements des vis de guidage supplémentaires. Si vous remplacez une unité de disque, placez les vis de l’ancienne unité sur la nouvelle. ● Si vous installez un disque 3,5 pouces dans l'une des deux baies inférieures (baies 5 et 6), installez les quatre vis de guidage d'isolation 6-32 de couleur argent et bleu (deux de chaque côté du disque). Figure 2-25 Installation des vis de guidage d'isolation sur un disque dur 3,5 pouces 42 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) FRWW ● Si vous installez un disque dur 2,5 pouces dans l'une des deux baies inférieures (baies 5 et 6), effectuez les opérations suivantes : ◦ Installez les quatre vis de guidage d'isolation 6-32 de couleur argent et bleue sur le support adaptateur (deux de chaque côté du support). Figure 2-26 Installation des vis de guidage d'isolation sur le support adaptateur 2,5 pouces ◦ Installez le disque dans l'emplacement du support adaptateur en orientant le côté PCA vers le bas et en alignant les trois onglets du support adaptateur avec le disque. Assurez-vous que le connecteur de données et que le connecteur d'alimentation du disque sont correctement orientés. Figure 2-27 Installation du disque dans le support adaptateur FRWW Installation des lecteurs 43 ◦ Maintenez fermement le disque et le support et retournez l'ensemble. Insérez quatre vis M3 pour fixer le disque au support. Figure 2-28 Fixation du disque sur le support adaptateur ● Si vous installez le disque dans la baie du haut (baie 4), installez les trois vis de guidage 6-32 standard de couleur argent (deux sur le côté droit et une sur le côté gauche, dans le trou de vis le plus proche du connecteur de données et du connecteur d'alimentation). Figure 2-29 Installation des vis de guidage standard 7. Insérez le disque dur dans la baie de la manière suivante : 44 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) FRWW ATTENTION : Assurez-vous que les vis de guidage sont alignées sur les rails de guidage du compartiment. Si vous forcez trop en mettant une unité de disque en place, vous risquez de l’endommager. ● Si vous installez un disque dur dans l'une des deux baies inférieures (baies 5 et 6), faites glisser le disque dur dans la baie de lecteur jusqu'à ce qu'il se verrouille. Le dispositif de verrouillage la maintient en place automatiquement. Figure 2-30 Installation d'un disque dur dans les deux baies inférieures ● Si vous installez un disque dur dans la baie supérieure (baie 4), faites glisser le disque dur dans la baie de lecteur (1) puis fixez le disque à sa place avec une vis standard 6-32 (2). Figure 2-31 Installation d'un disque dur dans la baie supérieure FRWW Installation des lecteurs 45 8. Connectez le cordon d’alimentation (1) et le câble de données (2) à l’arrière du disque dur. REMARQUE : Le câble d'alimentation destiné aux disques durs est un câble à trois connecteurs acheminé de la carte mère jusqu'à l'arrière des baies de disque dur. Figure 2-32 Connexion du cordon d’alimentation et du câble de données à un disque dur SATA 9. Connectez l’autre extrémité du câble de données au connecteur approprié de la carte mère. REMARQUE : Si le système est équipé d'un seul disque dur SATA, le câble de données du disque dur doit être raccordé au connecteur bleu foncé de la carte mère, libellé SATA0, pour éviter toute détérioration des performances du disque dur. Si vous ajoutez un second disque dur, connectez le câble de données au connecteur bleu clair identifié SATA1. 10. Remettez en place le panneau d’accès de l’ordinateur. 11. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 12. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d’accès de l’ordinateur. 46 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) FRWW Transformation de la minitour en ordinateur de bureau 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Retirez le panneau d’accès de l’ordinateur. 6. Retirez le cache avant. 7. Débranchez les câbles d’alimentation et de données de l’arrière des unités du compartiment 5,25 pouces. 8. Pour retirer les unités du compartiment d’unité de 5,25 pouces, soulevez la languette de dégagement sur le support de verrouillage de l’unité (1). Faites ensuite glisser l’unité hors de son compartiment tout en maintenant la languette de dégagement (2). Répétez cette étape pour chaque unité de 5,25 pouces. Figure 2-33 Dégagement des unités du compartiment 5,25 pouces (minitour) FRWW Transformation de la minitour en ordinateur de bureau 47 9. Faites glisser délicatement la première unité dans le compartiment le plus haut, jusqu’à ce qu’elle se verrouille automatiquement. Le verrou permet de fixer l’unité lorsque celle-ci est insérée correctement. Répétez cette opération pour chaque unité. Figure 2-34 Installation d’une unité dans la configuration bureau ATTENTION : Le compartiment 5,25 pouces inférieur est moins profond que les deux compartiments supérieurs. Le compartiment inférieur peut recevoir une unité demi-hauteur ou tout autre périphérique dont la longueur ne dépasse pas 14,5 cm (5,7 pouces). Ne forcez pas une unité plus longue, comme une unité optique, dans le compartiment inférieur. Vous pourriez abîmer l’unité et la carte mère. Si vous forcez trop en mettant une unité de disque en place, vous risquez de l’endommager. 10. Rebranchez tous les câbles d’alimentation et de transmission de données sur les unités placées dans les compartiments d’unités 5,25 pouces. 11. Retirez le panneau secondaire du cache avant comme décrit dans la section Retrait des caches protecteurs à la page 21. ATTENTION : Maintenez le sous-panneau droit lorsque vous le retirez du cache avant. L’inclinaison du sous-panneau pendant son retrait pourrait endommager les broches permettant de l’aligner sur le cache avant. 12. Replacez les caches d’unité dans le panneau secondaire en les orientant convenablement pour la configuration de bureau. 48 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) FRWW 13. Replacez le panneau secondaire dans le cache avant en le tournant de 90° pour placer le logo en bas. Figure 2-35 Conversion d’une configuration minitour au format de bureau 14. Replacez le cache avant et le panneau d’accès de l’ordinateur. 15. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 16. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d’accès de l’ordinateur. Transformation de l'ordinateur de bureau en minitour 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Retirez le panneau d’accès de l’ordinateur. 6. Retirez le cache avant. 7. Débranchez les câbles d’alimentation et de données de l’arrière des unités du compartiment 5,25 pouces. FRWW Transformation de l'ordinateur de bureau en minitour 49 8. Pour retirer les unités du compartiment d’unité de 5,25 pouces, appuyez sur le petit mécanisme de verrouillage d’unité jaune tel qu’illustré (1). Retirez ensuite les unités du compartiment tout en maintenant le mécanisme de verrouillage d’unité (2). Figure 2-36 Dégagement des unités du compartiment 5,25 pouces (position bureau) 9. Faites glisser délicatement la première unité dans le compartiment le plus haut, jusqu’à ce qu’elle se verrouille automatiquement. Le verrou permet de fixer l’unité lorsque celle-ci est insérée correctement. Répétez cette opération pour chaque unité. Figure 2-37 Installation d’une unité dans la configuration minitour ATTENTION : Le compartiment 5,25 pouces inférieur est moins profond que les deux compartiments supérieurs. Le compartiment inférieur peut recevoir une unité demi-hauteur ou tout autre périphérique dont la longueur ne dépasse pas 14,5 cm (5,7 pouces). Ne forcez pas une unité plus longue, comme une unité optique, dans le compartiment inférieur. Vous pourriez abîmer l’unité et la carte mère. Si vous forcez trop en mettant une unité de disque en place, vous risquez de l’endommager. 10. Rebranchez tous les câbles d’alimentation et de transmission de données sur les unités placées dans les compartiments d’unités 5,25 pouces. 50 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) FRWW 11. Retirez le panneau secondaire du cache avant comme décrit dans la section Retrait des caches protecteurs à la page 21. ATTENTION : Maintenez le sous-panneau droit lorsque vous le retirez du cache avant. L’inclinaison du sous-panneau pendant son retrait pourrait endommager les broches permettant de l’aligner sur le cache avant. 12. Replacez les caches d’unité dans le panneau secondaire en les orientant convenablement pour la configuration minitour. 13. Replacez le panneau secondaire dans le cache avant en le tournant de 90° pour placer le logo en bas. Figure 2-38 Conversion du format de bureau en configuration minitour 14. Replacez le cache avant et le panneau d’accès de l’ordinateur. 15. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 16. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d’accès de l’ordinateur. Installation d’un dispositif antivol Les dispositifs de sécurité illustrés ci-dessous et à la page suivante peuvent être utilisés pour protéger l’ordinateur contre le vol. FRWW Installation d’un dispositif antivol 51 Verrou de câble de sécurité HP/Kensington MicroSaver Figure 2-39 Installation d’un câble de sécurité 52 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) FRWW Cadenas Figure 2-40 Installation d’un cadenas Verrou de sécurité HP Business PC 1. Attachez le câble de sécurité en l’enroulant autour d’un objet statique. Figure 2-41 Fixation du câble à un objet fixe FRWW Installation d’un dispositif antivol 53 2. Insérez le verrou Kensington dans la fente du verrou Kensington à l'arrière du moniteur et fixez le verrou au moniteur en insérant la clé à l'arrière du verrou et en tournant la clé de 90 degrés. Figure 2-42 Installation du verrou Kensington sur le moniteur 3. Introduisez le câble de sécurité dans le trou du verrou Kensington à l'arrière du moniteur. Figure 2-43 Sécurisation du moniteur 54 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) FRWW 4. Utilisez le support de montage fourni dans le kit pour sécuriser d'autres unités périphériques en introduisant le câble du périphérique dans le centre du support (1) et en insérant le câble de sécurité dans l'un des deux trous du support de montage (2). Utilisez le trou du support de montage sécurisant le mieux le câble de l'unité périphérique. Figure 2-44 Sécurisation des unités périphériques (imprimante présentée) 5. Enfilez les câbles du clavier et de la souris dans le verrou du châssis de l'ordinateur. Figure 2-45 Passage des câbles du clavier et de la souris FRWW Installation d’un dispositif antivol 55 6. Vissez le verrou au châssis dans le trou de la vis à ailettes à l'aide de la vis fournie. Figure 2-46 Fixation du verrou sur le châssis 7. Insérez la prise du câble de sécurité dans le verrou (1) et enfoncez le bouton (2) pour fermer le verrou. Utilisez la clé fournie pour ouvrir le verrou. Figure 2-47 Fermeture du dispositif antivol 56 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) FRWW 8. Une fois l'opération terminée, tous les périphériques dans votre station de travail sont sécurisés. Figure 2-48 Station de travail sécurisée Sécurité du panneau avant Le cache avant peut s’enclencher à l’aide d’une vis de sécurité fournie par HP. Pour installer la vis de sécurité : 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Retirez le panneau d’accès et le cache avant. FRWW Installation d’un dispositif antivol 57 6. Enlevez la vis de sécurité de l’intérieur du cache avant. Figure 2-49 Récupération de la vis de sécurité du cache avant 7. Repositionnez le cache avant. 8. Installez la vis dans le cache avant par l’avant du châssis. Le trou de vis se situe sur le côté gauche du châssis, à côté du compartiment de disque dur supérieur. Figure 2-50 Installation de la vis de sécurité du cache avant 9. Remettez en place le panneau d’accès. 10. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 11. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d’accès. 58 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) FRWW 3 Mises à niveau matérielles de la microtour (MT) Fonctionnalités de maintenance L'ordinateur possède des fonctions facilitant sa mise à niveau et son entretien. La plupart des procédures d'installation décrites dans ce chapitre ne nécessitent aucun outil. Avertissements et précautions Avant toute mise à niveau, suivez scrupuleusement toutes les instructions s’y rapportant et n’oubliez pas de lire les notes d’avertissement et d’attention de ce manuel. AVERTISSEMENT ! Afin de réduire les risques de blessures provenant de choc électrique, de surface à haute température ou d’incendie : Déconnectez le cordon d’alimentation de la prise murale et laissez refroidir les éléments internes du système avant de les toucher. Ne branchez pas de connecteurs de téléphone ou de télécommunication sur les prises de carte réseau. Utilisez toujours la fiche de terre du cordon d’alimentation. La fiche de terre est un élément de sécurité important. Branchez le cordon d’alimentation sur une prise secteur avec conducteur de terre, accessible facilement. Pour éviter tout risque de blessure grave, lisez le manuel Sécurité et ergonomie du poste de travail. Ce manuel explique comment agencer correctement un poste de travail et comment s'installer confortablement devant un ordinateur. Il contient également d'importantes informations sur la sécurité électrique et mécanique. Ce manuel est disponible sur le Web à l'adresse http://www.hp.com/ergo. AVERTISSEMENT ! Cet ordinateur contient des pièces sous tension et amovibles. Débranchez le cordon d'alimentation avant de retirer le boîtier. Remettez le boîtier en place et fixez-le avant d'alimenter l'équipement. ATTENTION : L’électricité statique peut endommager les composants électriques de l’ordinateur ou de l’équipement en option. Il est conseillé de toucher un objet métallique relié à la terre avant de commencer l'installation. Consultez Décharges électrostatiques à la page 176 pour plus d'informations. Quand l’ordinateur est branché sur le secteur, la carte mère est sous tension. Vous devez déconnecter le cordon d’alimentation avant d’ouvrir l’ordinateur pour prévenir toute détérioration des composants internes. FRWW Fonctionnalités de maintenance 59 Retrait du panneau d'accès à l'ordinateur Pour accéder aux composants internes, vous devez enlever le panneau d’accès : 1. Retirez/désengagez tout périphérique de sécurité qui entrave l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d'arrêt du système d'exploitation, puis mettez l'ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d'alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l'état de mise sous tension, une tension est toujours présente sur la carte mère tant que l'ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d'alimentation pour éviter d'endommager les composants internes de l'ordinateur. 5. Desserrez les deux vis à molette (1) qui fixent le panneau d’accès au châssis de l’ordinateur. 6. Retirez le panneau d’accès de l’appareil en le soulevant à l’aide de la poignée située entre les vis à molette (2). REMARQUE : Pour installer des pièces internes, vous pouvez coucher l'ordinateur sur son flanc. Assurez-vous que le côté du panneau d'accès est dirigé vers le haut. Figure 3-1 Retrait du panneau d'accès de l'ordinateur 60 Chapitre 3 Mises à niveau matérielles de la microtour (MT) FRWW Remise en place du panneau d'accès à l'ordinateur 1. Faites glisser l’onglet situé à l’avant du panneau d’accès sous l’onglet situé à l’avant du châssis (1), puis appuyez l’arrière du panneau d’accès dans l’appareil (2). Figure 3-2 Remise en position du panneau d'accès de l'ordinateur 2. Vérifiez que le panneau est complètement fermé (1), puis serrez les deux vis à molette qui fixent le panneau d’accès au châssis (2). Figure 3-3 Serrage des vis à molette du panneau d’accès FRWW Remise en place du panneau d'accès à l'ordinateur 61 Retrait du panneau avant 1. Retirez/désengagez tout périphérique de sécurité qui entrave l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d'arrêt du système d'exploitation, puis mettez l'ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d'alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l'état de mise sous tension, une tension est toujours présente sur la carte mère tant que l'ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d'alimentation pour éviter d'endommager les composants internes de l'ordinateur. 5. Retirez le panneau d'accès de l'ordinateur. 6. Soulevez les trois onglets sur le côté du cache avant (1), puis faites pivoter le cache avant pour le retirer du châssis (2). Figure 3-4 Retrait du cache avant Retrait des caches protecteurs Sur certains modèles, des caches protecteurs recouvrent les baies de lecteur 3,5 et 5,25 pouces. Ces caches doivent être retirés avant d'installer un lecteur. Pour retirer un cache protecteur : 1. Retirez le panneau d'accès et le panneau avant. 62 Chapitre 3 Mises à niveau matérielles de la microtour (MT) FRWW 2. Pour retirer un cache protecteur, poussez les languettes de fixation qui maintiennent le cache en place vers le bord extérieur droit du panneau (1) et faites glisser le cache vers l'arrière et vers la droite pour le retirer (2). Figure 3-5 Retrait d'un cache protecteur Remise en place du panneau avant Insérez les trois crochets sur le côté gauche du cache avant dans les trous rectangulaires du châssis (1), puis faites pivoter le côté droit du cache avant dans le châssis (2) jusqu’à ce qu’il s’emboîte. Figure 3-6 Remise en position du cache avant FRWW Remise en place du panneau avant 63 Connexions de la carte mère Reportez-vous aux illustrations et aux tableaux suivants pour identifier les connecteurs de la carte mère de votre modèle. Figure 3-7 Branchements de la carte mère 8200 Elite Tableau 3-1 Branchements de la carte mère 8200 Elite N Connecteur de la carte mère Étiquette de carte mère Couleur Composant 1 DIMM4 (canal A) DIMM4 blanc Module de mémoire 2 DIMM3 (canal A) DIMM3 noir Module de mémoire 3 DIMM2 (canal B) DIMM2 blanc Module de mémoire 4 DIMM1 (canal B) DIMM1 noir Module de mémoire 5 Alimentation SATAPWR0 noir Lecteurs optiques SATA 6 Alimentation SATAPWR1 noir Disques durs SATA 7 SATA 3.0 SATA0 bleu foncé 1er disque dur 8 SATA 3.0 SATA1 bleu clair 2ème disque dur ou 2ème lecteur optique si un câble adaptateur ESATA est présent 9 SATA 2.0 SATA2 blanc 1er lecteur optique 10 eSATA ESATA noir Câble adaptateur eSATA ou 2ème lecteur optique 11 Port parallèle PAR noir Port parallèle 12 Port série COMB noir Port série 13 USB MEDIA noir Périphérique USB tel qu'un lecteur de cartes multimédias 14 Verrou de la protection HLCK noir Périphérique USB tel qu'un lecteur de cartes multimédias 15 USB MEDIA2 noir Deuxième lecteur de cartes multimédias 64 Chapitre 3 Mises à niveau matérielles de la microtour (MT) FRWW Tableau 3-1 Branchements de la carte mère 8200 Elite (suite) N Connecteur de la carte mère Étiquette de carte mère Couleur Composant 16 Détecteur d'ouverture du capot HSENSE blanc Détecteur d'ouverture du capot 17 PCI Express x1 X1PCIEXP1 noir Carte d'extension 18 PCI Express x16 rétrogradé en x4 X4PCIEXP blanc Carte d'extension 19 PCI Express x16 X16PCIEXP noir Carte d'extension 20 PCI PCI blanc Carte d'extension Figure 3-8 Branchements de la carte mère 6200 Pro Tableau 3-2 Branchements de la carte mère 6200 Pro N Connecteur de la carte mère Étiquette de carte mère Couleur Composant 1 DIMM4 (canal A) DIMM4 blanc Module de mémoire 2 DIMM3 (canal A) DIMM3 noir Module de mémoire 3 DIMM2 (canal B) DIMM2 blanc Module de mémoire 4 DIMM1 (canal B) DIMM1 noir Module de mémoire 5 Alimentation SATAPWR0 noir Lecteurs optiques SATA 6 Alimentation SATAPWR1 Disques durs SATA 7 SATA 3.0 SATA0 bleu foncé 1er disque dur 8 SATA 2.0 SATA1 blanc 2ème disque dur ou 2ème lecteur optique si un câble adaptateur ESATA est présent 9 SATA 2.0 SATA2 blanc 1er lecteur optique 10 eSATA ESATA noir Câble adaptateur eSATA ou 2ème lecteur optique FRWW Connexions de la carte mère 65 Tableau 3-2 Branchements de la carte mère 6200 Pro (suite) N Connecteur de la carte mère Étiquette de carte mère Couleur Composant 11 Port parallèle PAR noir Port parallèle 12 Port série COMB noir Port série 13 USB MEDIA noir Périphérique USB tel qu'un lecteur de cartes multimédias 14 Verrou de la protection HLCK noir Verrou de la protection 15 USB MEDIA2 noir Périphérique USB tel qu'un lecteur de cartes multimédias 16 Détecteur d'ouverture du capot HSENSE blanc Détecteur d'ouverture du capot 17 PCI Express x1 X1PCIEXP1 noir Carte d'extension 18 PCI Express x1 X4PCIEXP noir Carte d'extension 19 PCI Express x16 X16PCIEXP noir Carte d'extension 20 PCI PCI blanc Carte d'extension 66 Chapitre 3 Mises à niveau matérielles de la microtour (MT) FRWW Installation de mémoire supplémentaire L'ordinateur est fourni avec des modules DIMM (dual inline memory modules) de SDRAM (synchronous dynamic random access memory) DDR3 (double data rate 3). DIMM Les supports mémoire de la carte mère peuvent recevoir un maximum de quatre modules DIMM standard. À la livraison, ces connecteurs pour module mémoire accueillent au moins un DIMM préinstallé. Pour exploiter entièrement la prise en charge de mémoire, vous pouvez équiper la carte mère d'un maximum de 16 Go de mémoire dans une configuration hautes performances à deux canaux. DDR3-SDRAM DIMM ATTENTION : Ce produit NE prend PAS en charge la mémoire DDR3 Ultra Low Voltage (tension ultra faible) (DDR3U). Le processeur n'est pas compatible avec la mémoire DDR3U et si vous branchez de la mémoire DDR3U sur la carte mère, cela peut endommager physiquement le module DIMM ou provoquer un dysfonctionnement du système. Pour que le système fonctionne correctement, les modules mémoire DDR3-SDRAM DIMM doivent être : ● standard à 240 broches ● sans tampon, non-ECC, conformes à la norme PC3-8500 DDR3-1066 MHz ou à la norme PC3-10600 DDR3-1333 MHz ● 1,5 volt DDR3-SDRAM DIMM Les modules mémoire DDR3-SDRAM DIMM doivent également : ● prendre en charge une latence CAS 7 DDR3 1066 MHz (rythme 7-7-7) et une latence CAS 9 DDR3 1333 MHz (rythme 9-9-9) ● contenir les informations JEDEC SPD obligatoires En outre, l'ordinateur prend en charge : ● les technologies de mémoire non-ECC à 512 Mbits, 1 Gbit et 2 Gbits ● les modules DIMM monoface/double face. ● Modules DIMM conçus à partir de dispositifs DDR x8 et x16 ; Les modules DIMM conçus à partir de SDRAM x4 ne sont pas pris en charge REMARQUE : Le système ne fonctionnera pas correctement si vous installez des modules DIMM non pris en charge. FRWW Installation de mémoire supplémentaire 67 Remplissage des supports DIMM La carte mère est équipée de quatre supports DIMM, deux par canal. Ceux-ci sont identifiés DIMM1, DIMM2, DIMM3 et DIMM4. Les sockets DIMM1 et DIMM2 fonctionnent sur le canal mémoire B. Les sockets DIMM3 et DIMM4 fonctionnent sur le canal mémoire A. Le système fonctionnera automatiquement en mode canal unique, en mode double canal ou en mode flexible. Cela dépendra de l’installation des modules DIMM. ● Le système fonctionne en mode canal unique si les supports DIMM sont remplis dans un seul canal. ● Le système fonctionne en mode performant entrelacé à deux canaux si la capacité totale des modules DIMM du canal A est égale à celle des modules du canal B. Cependant, la technologie et la capacité des modules peuvent être différentes entre les deux canaux. Par exemple, si le canal A comporte deux modules DIMM de 1 Go et le canal B un module de 2 Go, le système fonctionnera en mode double canal. ● Le système fonctionnera en mode flexible si la capacité mémoire totale des modules DIMM du canal A n'est pas égale à la capacité mémoire totale des modules DIMM du canal B. En mode flexible, le canal occupé par le moins de mémoire représente la mémoire totale attribuée au double canal et la mémoire restante est attribuée au canal unique. Pour obtenir une vitesse optimale, les canaux doivent être équilibrés afin que la quantité la plus élevée de mémoire soit répartie entre les deux canaux. Si un canal dispose de plus de mémoire que l'autre, la plus grande capacité doit être attribuée au canal A. Par exemple, si vous occupez les sockets avec un module DIMM 2 Go et avec trois modules DIMM 1 Go, le canal A devra être occupé par le module DIMM 2 Go et par un module DIMM 1 Go. Le canal B devra être occupé par les deux autres modules DIMM 1 Go. Dans cette configuration, 4 Go sont exécutés en tant que double canal et 1 Go en tant que canal unique. ● Quel que soit le mode, la vitesse de fonctionnement maximale est déterminée par le module DIMM le plus lent du système. Installation des modules DIMM ATTENTION : Avant d'ajouter ou de retirer des modules mémoire, vous devez déconnecter le cordon d'alimentation et attendre environ 30 secondes pour éliminer toute énergie résiduelle. Quel que soit l'état de mise sous tension, une tension est toujours fournie aux modules mémoire tant que l'ordinateur est branché sur une prise secteur active. L'ajout ou le retrait de modules mémoire alors qu'une tension est toujours présente peut endommager de manière irrémédiable les modules mémoire ou la carte mère. Les supports de modules mémoire ont des contacts en métal doré. Lorsque vous mettez à niveau la mémoire, il est important d'utiliser des modules mémoire avec des contacts en métal doré pour éviter la corrosion et/ou l'oxydation due à l'incompatibilité des métaux en contact les uns avec les autres. L'électricité statique peut endommager les composants électroniques de l'ordinateur ou des cartes en option. Il est conseillé de toucher un objet métallique relié à la terre avant de commencer l'installation. Pour plus d'informations, reportez-vous à Décharges électrostatiques à la page 176. Lorsque vous manipulez un module de mémoire, ne touchez aucun contact, vous risqueriez d'endommager le module. 1. Retirez/dégagez tout périphérique de sécurité qui gêne l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Mettez l'ordinateur hors tension sans risque via le système d'exploitation, puis mettez les périphériques externes hors tension. 68 Chapitre 3 Mises à niveau matérielles de la microtour (MT) FRWW 4. Débranchez le cordon d'alimentation de la prise électrique, puis débranchez tout périphérique externe. ATTENTION : Avant d'ajouter ou de retirer des modules mémoire, vous devez déconnecter le cordon d'alimentation et attendre environ 30 secondes pour éliminer toute énergie résiduelle. Quel que soit l'état de mise sous tension, une tension est toujours fournie aux modules mémoire tant que l'ordinateur est branché sur une prise secteur active. L'ajout ou le retrait de modules mémoire alors qu'une tension est toujours présente peut endommager de manière irrémédiable les modules mémoire ou la carte mère. 5. Retirez le panneau d’accès de l’ordinateur. AVERTISSEMENT ! Afin d'éviter tout risque de blessures dues aux surfaces brûlantes, laissez les composants du système interne refroidir avant de les toucher. 6. Ouvrez les deux loquets du support de module mémoire (1), puis insérez le module dans le support (2). Figure 3-9 Installation d'un DIMM REMARQUE : Un module mémoire ne peut être installé que d'une seule façon. Faites coïncider l'encoche située sur le module avec la patte du support de mémoire. Occupez les sockets DIMM noirs avant les blancs. Pour obtenir des performances maximales, occupez les sockets de façon à ce que la capacité mémoire soit répartie d'une manière aussi égale que possible entre le canal A et le canal B. Reportez-vous à Remplissage des supports DIMM à la page 68 pour plus d'informations. 7. Poussez le module dans le socket en vous assurant qu'il est complètement et correctement inséré. assurez-vous que les loquets sont en position fermée (3). 8. Répétez les étapes 6 et 7 pour installer les modules supplémentaires. 9. Remettez en place le panneau d’accès de l’ordinateur. 10. Rebranchez le cordon d'alimentation et mettez l'ordinateur sous tension. 11. Verrouillez tout périphérique de sécurité qui aurait pu bouger lors du retrait du panneau d'accès. L'ordinateur devrait automatiquement détecter la mémoire supplémentaire la prochaine fois où vous l'allumerez. FRWW Installation de mémoire supplémentaire 69 Retrait ou installation d'une carte d'extension L'ordinateur 8200 Elite dispose d'un port d'extension PCI, d'un port d'extension PCI Express x1, d'un port d'extension PCI Express x16 et d'un port d'extension PCI Express x16 rétrogradé en port x4. L'ordinateur 6200 Pro dispose d'un port d'extension PCI, de deux ports d'extension PCI Express x1 et d'un port d'extension PCI Express x16. REMARQUE : Vous pouvez installer une carte d’extension PCI Express x1, x4, x8 ou x16 dans le connecteur PCI Express x16. Pour les configurations disposant de deux cartes graphiques, la première carte (principale) doit être installée sur le port d'extension PCI Express x16 qui n'est PAS rétrogradé en port x4 (modèles 8200 Elite). Pour retirer, remplacer ou ajouter une carte d’extension : 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Retirez le panneau d’accès de l’ordinateur. 6. Repérez le support de carte d’extension approprié sur la carte mère, ainsi que le support de carte d’extension correspondant à l’arrière du châssis de l’ordinateur. 7. Ouvrez le dispositif de blocage des obturateurs de support PCI en soulevant le levier vert et en faisant pivoter le dispositif en position ouverte. Figure 3-10 Ouverture du dispositif de retenue 70 Chapitre 3 Mises à niveau matérielles de la microtour (MT) FRWW 8. Avant d’installer une carte d’extension, retirez le cache du support d’extension ou la carte d’extension existante. REMARQUE : Avant de retirer une carte d’extension déjà installée, débranchez tous les câbles qui y sont rattachés. a. Si vous installez une carte d’extension dans un support libre, retirez l’obturateur correspondant à l’arrière du châssis, Tirez le cache du support vers le haut, puis de l’intérieur du châssis. Figure 3-11 Retrait d'un cache de carte d'extension FRWW Retrait ou installation d'une carte d'extension 71 b. Si vous retirez une carte PCI standard ou PCI Express x1, tenez-la à chaque extrémité et faites-la délicatement basculer d’avant en arrière jusqu’à ce qu’elle sorte de son support. Tirez la carte d'extension à la verticale hors de son support, puis retirez-la complètement du châssis. Veillez à ne pas abîmer la carte en heurtant d'autres composants. Figure 3-12 Retrait d’une carte d’extension PCI standard c. Si vous retirez une carte PCI Express x16, tirez sur le bras de fixation à l’arrière du support pour l’écarter de la carte, puis faites délicatement basculer la carte jusqu’à ce qu’elle sorte de son support. Tirez la carte d’extension à la verticale hors de son support, puis retirez-la complètement du châssis. Veillez à ne pas abîmer la carte en heurtant d’autres composants. Figure 3-13 Retrait d'une carte d'extension PCI Express x16 9. Placez la carte retirée dans un emballage antistatique. 72 Chapitre 3 Mises à niveau matérielles de la microtour (MT) FRWW 10. Si vous n’installez pas de nouvelle carte d’extension, installez l’obturateur d’extension pour fermer l’orifice. ATTENTION : Après avoir retiré une carte d'extension, vous devez la remplacer par une nouvelle carte ou par un cache pour permettre le refroidissement des composants internes pendant leur fonctionnement. 11. Pour installer une nouvelle carte d'extension, tenez la carte à la verticale de son connecteur sur la carte mère, puis déplacez-la vers l'arrière du châssis de manière à aligner son support sur la fente prévue à l'arrière du châssis. Appuyez sur la carte pour l'insérer dans son connecteur sur la carte mère. Figure 3-14 Installation d’une carte d’extension REMARQUE : Lorsque vous installez une carte d’extension, appuyez fermement sur la carte, de sorte que l’ensemble du connecteur soit correctement enclenché dans le connecteur de carte d’extension. 12. Remettez en place le dispositif de blocage des cartes d’extension. Figure 3-15 Fermeture du dispositif de retenue FRWW Retrait ou installation d'une carte d'extension 73 13. Le cas échéant, branchez les câbles extérieurs sur la carte installée. Connectez les câbles intérieurs à la carte mère, si nécessaire. 14. Remettez en place le panneau d’accès de l’ordinateur. 15. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 16. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d'accès. 17. Reconfigurez l’ordinateur si nécessaire. Emplacement des unités Figure 3-16 Emplacements des unités Tableau 3-3 Emplacements des unités 1 Deux baies de lecteur 5,25 pouces pour les lecteurs en option (lecteurs optiques présentés) 2 Une baie de lecteur 3,5 pouces pour un lecteur en option (lecteur de cartes multimédias présenté) 3 Compartiment secondaire de disque dur 3,5 pouces interne pour disque dur en option 4 Compartiment principal de disque dur 3,5 pouces interne REMARQUE : La configuration du lecteur sur votre ordinateur peut être différente de la configuration affichée ci-dessus. Pour vérifier le type et la taille des périphériques de stockage installés dans l’ordinateur, exécutez l’utilitaire Computer Setup. 74 Chapitre 3 Mises à niveau matérielles de la microtour (MT) FRWW Installation et retrait de lecteurs Lors de l'installation de lecteurs supplémentaires, suivez ces consignes : ● Le disque dur SATA (Serial ATA) principal doit être connecté au contrôleur SATA (bleu foncé, libellé SATA 0) principal sur la carte mère. Si vous ajoutez un deuxième disque dur, branchez-le sur le connecteur bleu clair (modèles 8200 Elite) ou sur le connecteur blanc (modèles 6200 Pro) à l'emplacement de la carte mère où est marqué SATA1. ● Connectez la première unité optique SATA au connecteur SATA blanc libellé SATA2 sur la carte mère. Si vous ajoutez un second lecteur optique, branchez-le sur un connecteur SATA noir sur la carte mère, là où est marqué ESATA. Si le connecteur ESATA est déjà occupé, branchez le deuxième lecteur optique sur le connecteur bleu clair de la carte mère, là où vous pouvez lire SATA1 (modèle 8200 Elite) ou le connecteur blanc SATA1 (modèles 6200 Pro). ● Connectez un câble adaptateur eSATA en option au connecteur SATA noir sur la carte mère. ● Connectez un câble USB de lecteur de cartes multimédias au connecteur USB de la carte mère libellé MEDIA. ● Le câble d'alimentation destiné aux lecteurs optiques SATA est un câble à deux connecteurs. Il est branché à la carte mère, le premier connecteur est acheminé vers la baie 5,25 pouces et le deuxième connecteur est acheminé vers la baie 5,25 pouces du bas. ● Le câble d'alimentation destiné aux disques durs SATA est un câble à deux connecteurs. Il est branché à la carte mère, le premier connecteur est acheminé vers la baie 3,5 pouces du bas et le deuxième connecteur est acheminé vers la baie 5,25 pouces du haut. ● Le système ne prend pas en charge les unités optiques PATA (Parallel ATA) ni les disques durs PATA. ● Vous devez installer des vis de guidage pour garantir le bon alignement et l’emboîtement du lecteur dans la cage d’unité. HP a fourni des vis de guidage supplémentaires pour les baies de lecteurs (quatre vis de guidage d’isolation 6-32 et huit vis métriques M3), situées sur le côté des compartiments d’unités. Les vis d’isolation 6-32 sont nécessaires en cas de disque dur secondaire. Toutes les autres unités (excepté le disque dur principal) utilisent des vis métriques M3. Les vis métriques fournies par HP sont noires et les vis d’isolation fournies par HP sont de couleur argent et bleu. Si vous procédez au remplacement du disque dur principal, vous devez FRWW Installation et retrait de lecteurs 75 retirer les quatre vis de guidage d’isolation 6-32 de couleur argent et bleu du disque que vous remplacez et les installer dans le nouveau disque. Figure 3-17 Emplacements des vis de guidage supplémentaires N Vis de guidage Périphérique 1 Vis métriques M3 noires Toutes les unités (sauf les disques durs) 2 Vis d’isolation 6-32 de couleur argent et bleu Disque dur secondaire ATTENTION : Pour éviter tout risque de perte de données et de dégât à l’ordinateur ou à une unité : Si vous insérez ou retirez une unité, arrêtez correctement le système d'exploitation, mettez l'ordinateur hors tension, puis débranchez le cordon d'alimentation. Ne retirez pas une unité lorsque l'ordinateur est sous tension ou en mode veille. Il est conseillé de toucher un objet métallique relié à la terre avant de manipuler une unité. Évitez de toucher les connecteurs lorsque vous manipulez une unité. Pour savoir comment éviter les dommages dus à l’électricité statique, reportez-vous à la section Décharges électrostatiques à la page 176. Manipulez l’unité avec précaution ; ne la laissez pas tomber. Ne forcez pas lors de l’insertion d’une unité. Évitez d’exposer l’unité à des liquides, des températures extrêmes ou au champ magnétique émis par des appareils tels que des moniteurs ou des haut-parleurs. Si vous devez envoyer une unité par la poste, prenez soin de la placer dans un emballage à bulles d’air ou tout autre emballage offrant une protection suffisante. Veuillez également apposer sur le colis une étiquette indiquant « Fragile : à manipuler avec précaution ». 76 Chapitre 3 Mises à niveau matérielles de la microtour (MT) FRWW Retirer un lecteur 5,25 pouces ou 3,5 pouces dans une baie de lecteur ATTENTION : Avant de retirer une unité de l'ordinateur, veillez à ce qu'elle ne contienne pas de support amovible. 1. Retirez/désengagez tout périphérique de sécurité qui entrave l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d'arrêt du système d'exploitation, puis mettez l'ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d'alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l'état de mise sous tension, une tension est toujours présente sur la carte mère tant que l'ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d'alimentation pour éviter d'endommager les composants internes de l'ordinateur. 5. Retirez le panneau d'accès et le cache avant. 6. Déconnectez les câbles d'unité, comme indiqué par les illustrations suivantes. ATTENTION : Lorsque vous déconnectez un câble, tirez sur son connecteur et pas sur le câble lui-même, car vous pourriez l’endommager. a. Si vous retirez une unité optique, déconnectez le cordon d’alimentation (1) et le câble de données (2) à l’arrière de l’unité. Figure 3-18 Déconnexion des câbles de l'unité optique FRWW Installation et retrait de lecteurs 77 b. Si vous retirez un lecteur de cartes multimédias, déconnectez le câble USB de la carte mère. Figure 3-19 Déconnexion du câble USB du lecteur de cartes multimédias 7. Un support de verrouillage doté d'onglets retient les unités dans leur compartiment. Soulevez l'onglet de retenue sur le support de verrouillage (1) de l'unité à retirer, puis faites glisser l'unité hors de son logement (2). Figure 3-20 Extraction des unités 78 Chapitre 3 Mises à niveau matérielles de la microtour (MT) FRWW Installation d'un lecteur 5,25 pouces ou 3,5 pouces dans une baie de lecteur 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Retirez le panneau d’accès de l’ordinateur. 6. Retirez le panneau avant. Si vous installez une unité dans un compartiment couvert par un cache protecteur, retirez ce dernier. Consultez Retrait des caches protecteurs à la page 62 pour plus d'informations. 7. Mettez en place quatre vis de guidage métriques M3 dans les trous inférieurs de chaque côté de l’unité. Huit vis de guidage métriques M3 supplémentaires sont fournies par HP à l’avant du châssis, sous le cache avant. Les vis de guidage métriques M3 sont noires. Reportez-vous à la section Installation et retrait de lecteurs à la page 75 pour une illustration de l’emplacement des vis de guidage métriques M3 supplémentaires. REMARQUE : Lorsque vous remplacez une unité de disque, placez les quatre vis M3 de l’ancienne unité sur la nouvelle. ATTENTION : Utilisez uniquement des vis de guidage de 5 mm de long. Des vis plus longues peuvent endommager les composants internes de l’unité. Figure 3-21 Installation des vis de guidage (unité optique illustrée) FRWW Installation et retrait de lecteurs 79 8. En veillant à aligner les têtes de vis sur les rainures de guidage, faites glisser l'unité dans son compartiment jusqu'à son enclenchement. Figure 3-22 Insertion des lecteurs dans leur compartiment 9. Connectez le cordon d'alimentation et le câble de données à l'unité comme indiqué par les illustrations suivantes. a. Si vous installez une unité optique, connectez le cordon d'alimentation (1) et le câble de données (2) à l'arrière de l'unité. REMARQUE : Le câble d'alimentation destiné aux lecteurs optiques est un câble à deux connecteurs acheminé de la carte mère jusqu'à l'arrière des baies de lecteur optique. Figure 3-23 Connexion des câbles d'unité optique 80 Chapitre 3 Mises à niveau matérielles de la microtour (MT) FRWW b. Si vous installez un lecteur de cartes multimédia, connectez le câble USB au connecteur USB de la carte mère libellé MEDIA. Figure 3-24 Connexion du câble USB du lecteur de cartes multimédia 10. Si vous installez une nouvelle unité, connectez l'autre extrémité du câble de données au connecteur approprié de la carte mère. REMARQUE : Si vous installez un nouveau lecteur optique SATA, reliez le câble de données destiné au premier lecteur optique au connecteur SATA blanc de la carte mère. Il porte l'inscription SATA2. Reliez le câble de données destiné à un deuxième lecteur optique au connecteur SATA noir de la carte mère. Il porte l'inscription ESATA. Si le connecteur ESATA est déjà occupé, branchez le deuxième lecteur optique sur le connecteur bleu clair de la carte mère, là où vous pouvez lire SATA1 (modèle 8200 Elite) ou le connecteur blanc SATA1 (modèles 6200 Pro). Reportez-vous à Connexions de la carte mère à la page 64 pour obtenir une illustration des connecteurs de lecteurs de la carte mère. 11. Replacez le cache avant et le panneau d'accès de l'ordinateur. 12. Reconnectez le cordon d'alimentation et tous les périphériques externes, puis mettez l'ordinateur sous tension. 13. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d'accès. FRWW Installation et retrait de lecteurs 81 Retrait d'un disque dur d'une baie de lecteur REMARQUE : Avant de retirer l’ancien disque dur, assurez-vous de sauvegarder ses données de manière à pouvoir les transférer sur le nouveau disque. 1. Retirez/désengagez tout périphérique de sécurité qui entrave l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d'arrêt du système d'exploitation, puis mettez l'ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d'alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l'état de mise sous tension, une tension est toujours présente sur la carte mère tant que l'ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d'alimentation pour éviter d'endommager les composants internes de l'ordinateur. 5. Retirez le panneau d’accès de l’ordinateur. 6. Déconnectez le cordon d'alimentation (1) et le câble de données (2) de l'arrière du disque dur. Figure 3-25 Déconnexion des câbles du disque dur 82 Chapitre 3 Mises à niveau matérielles de la microtour (MT) FRWW 7. Dégagez l'unité en éloignant le loquet de celle-ci (1) et en faisant glisser l'unité hors du compartiment (2). Figure 3-26 Retrait d'un disque dur 8. Ôtez les quatre vis, deux de chaque côté, de l'ancienne unité. Vous en aurez besoin lors de l'installation de la nouvelle unité. FRWW Installation et retrait de lecteurs 83 Installation d’un disque dur dans une baie de lecteur interne REMARQUE : Le système ne prend pas en charge les disques durs ATA parallèle (PATA). 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Retirez le panneau d’accès. 6. Installez des vis de guidage sur les côtés du lecteur. Si vous installez un disque 2,5 pouces, vous devez installer le disque dans un support adaptateur. REMARQUE : Le disque dur utilise des vis de guidage d’isolation 6-32. Quatre vis de guidage supplémentaires sont installées à l’extérieur des baies de disque dur. Les vis de guidage d’isolation fournies par HP sont de couleur argent et bleue. Reportez-vous à la section Installation et retrait de lecteurs à la page 75 pour une illustration de l’emplacement des vis de guidage d’isolation 6-32 supplémentaires. Si vous remplacez une unité de disque, placez les vis de l'ancienne unité sur la nouvelle. ● Si vous installez un disque dur au format 3,5 pouces, installez quatre vis de guidage d'isolation (deux de chaque côté du lecteur). Figure 3-27 Installation des vis de guidage d'isolation sur un lecteur3,5 pouces 84 Chapitre 3 Mises à niveau matérielles de la microtour (MT) FRWW ● Si vous installez un disque dur au format 2,5 pouces : ◦ Installez les quatre vis de guidage d'isolation 6-32 de couleur argent et bleue sur le support adaptateur (deux de chaque côté du support). Figure 3-28 Installation des vis de guidage d'isolation sur le support adaptateur 2,5 pouces ◦ Installez le disque dans l'emplacement du support adaptateur en orientant le côté PCA vers le bas et en alignant les trois onglets du support adaptateur avec le disque. Assurez-vous que le connecteur de données et que le connecteur d'alimentation du disque sont correctement orientés. Figure 3-29 Installation du disque dans le support adaptateur FRWW Installation et retrait de lecteurs 85 ◦ Maintenez fermement le disque et le support et retournez l'ensemble. Insérez quatre vis M3 pour fixer le disque au support. Figure 3-30 Fixation du disque sur le support adaptateur 7. Faites glisser le disque dans le compartiment d’unité en veillant à aligner les vis de guidage avec les ouvertures correspondantes jusqu’à ce que le disque s’emboîte. Le compartiment inférieur est destiné au disque dur principal. Le compartiment supérieur est destiné au disque dur secondaire en option. Figure 3-31 Installation d'un disque dur dans le compartiment d'unité 86 Chapitre 3 Mises à niveau matérielles de la microtour (MT) FRWW 8. Connectez le cordon d'alimentation (1) et le câble de données (2) à l'arrière du disque dur. REMARQUE : Le câble d'alimentation destiné aux disques durs est un câble à deux connecteurs acheminé de la carte mère jusqu'à l'arrière des baies de disque dur. Figure 3-32 Connexion des câbles du disque dur 9. Si vous installez une nouvelle unité, connectez l'autre extrémité du câble de données au connecteur approprié de la carte mère. REMARQUE : Si le système est équipé d'un seul disque dur SATA, le câble de données du disque dur doit être raccordé au connecteur bleu foncé de la carte mère, libellé SATA0, pour éviter toute détérioration des performances du disque dur. Si vous ajoutez un deuxième disque dur, branchez le câble de données sur le connecteur bleu clair (modèles 8200 Elite) ou sur le connecteur blanc (modèles 6200 Pro) à l'emplacement où est marqué SATA1. 10. Faites passer le cordon d'alimentation et le câble de données dans les dispositifs de retenue de câbles. 11. Remettez en place le panneau d'accès à l'ordinateur. 12. Reconnectez le cordon d'alimentation et tous les périphériques externes, puis mettez l'ordinateur sous tension. 13. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d'accès. Installation d'un dispositif antivol Les dispositifs de sécurité illustrés ci-dessous et aux pages suivantes peuvent être utilisés pour protéger l'ordinateur contre le vol. FRWW Installation d'un dispositif antivol 87 Verrou de câble de sécurité HP/Kensington MicroSaver Figure 3-33 Installation d'un câble de sécurité Cadenas Figure 3-34 Installation d'un cadenas 88 Chapitre 3 Mises à niveau matérielles de la microtour (MT) FRWW Verrou de sécurité HP Business PC 1. Attachez le câble de sécurité en l’enroulant autour d’un objet statique. Figure 3-35 Fixation du câble à un objet fixe 2. Insérez le verrou Kensington dans la fente du verrou Kensington à l'arrière du moniteur et fixez le verrou au moniteur en insérant la clé à l'arrière du verrou et en tournant la clé de 90 degrés. Figure 3-36 Installation du verrou Kensington sur le moniteur FRWW Installation d'un dispositif antivol 89 3. Introduisez le câble de sécurité dans le trou du verrou Kensington à l'arrière du moniteur. Figure 3-37 Sécurisation du moniteur 4. Utilisez le support de montage fourni dans le kit pour sécuriser d'autres unités périphériques en introduisant le câble du périphérique dans le centre du support (1) et en insérant le câble de sécurité dans l'un des deux trous du support de montage (2). Utilisez le trou du support de montage sécurisant le mieux le câble de l'unité périphérique. Figure 3-38 Sécurisation des unités périphériques (imprimante présentée) 90 Chapitre 3 Mises à niveau matérielles de la microtour (MT) FRWW 5. Enfilez les câbles du clavier et de la souris dans le verrou du châssis de l'ordinateur. Figure 3-39 Passage des câbles du clavier et de la souris 6. Vissez le verrou au châssis dans le trou de la vis à ailettes à l'aide de la vis fournie. Figure 3-40 Fixation du verrou sur le châssis FRWW Installation d'un dispositif antivol 91 7. Insérez la prise du câble de sécurité dans le verrou (1) et enfoncez le bouton (2) pour fermer le verrou. Utilisez la clé fournie pour ouvrir le verrou. Figure 3-41 Fermeture du dispositif antivol 8. Une fois l'opération terminée, tous les périphériques dans votre station de travail sont sécurisés. Figure 3-42 Station de travail sécurisée Sécurité du panneau avant Le cache avant peut s’enclencher à l’aide d’une vis de sécurité fournie par HP. Pour installer la vis de sécurité : 1. Retirez/dégagez tout périphérique de sécurité qui gêne l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 92 Chapitre 3 Mises à niveau matérielles de la microtour (MT) FRWW 3. Mettez l'ordinateur hors tension sans risque via le système d'exploitation, puis mettez les périphériques externes hors tension. 4. Débranchez le cordon d'alimentation de la prise électrique, puis débranchez tout périphérique externe. ATTENTION : Quel que soit l'état de mise sous tension, une tension est toujours présente sur la carte mère tant que le système est branché sur une prise secteur active. Vous devez débrancher le cordon d'alimentation pour éviter d'endommager les composants internes de l'ordinateur. 5. Retirez le panneau d'accès et le panneau avant. 6. Enlevez la vis de sécurité de l’intérieur du cache avant. Figure 3-43 Réinstallation de la vis de sécurité du cache avant 7. Remplacez le panneau avant. FRWW Installation d'un dispositif antivol 93 8. Installez la vis dans le cache avant par l’avant du châssis dans le panneau avant. Le trou de vis se situe au milieu du bord droit du châssis, entre le compartiment de disque dur et le hautparleur. Figure 3-44 Installation de la vis de sécurité du cache avant 9. Remplacer le panneau d'accès. 10. Rebranchez le cordon d'alimentation et mettez l'ordinateur sous tension. 11. Verrouillez tout périphérique de sécurité qui aurait pu bouger lors du retrait du panneau d'accès. 94 Chapitre 3 Mises à niveau matérielles de la microtour (MT) FRWW 4 Mise à niveau du matériel de l'ordinateur compact (SFF) Fonctionnalités de maintenance L’ordinateur possède des fonctions facilitant sa mise à niveau et son entretien. La plupart des procédures d’installation décrites dans ce chapitre ne nécessitent aucun outil. Avertissements et précautions Avant de procéder aux mises à niveau, veillez à lire attentivement les instructions, les avertissements et les précautions applicables mentionnés dans ce manuel. AVERTISSEMENT ! Afin d'éviter tout risque de blessures dues à un choc électrique, à des surfaces chaudes ou à un incendie : Débranchez le cordon d'alimentation de la prise murale et laissez refroidir les composants du système interne avant de les toucher. Ne branchez pas de connecteurs de télécommunication ou de téléphone sur les prises de carte réseau. Ne désactivez pas la fiche de mise à la terre du cordon d'alimentation. La mise à la terre est une caractéristique de sécurité importante Branchez le cordon d'alimentation dans une prise mise à la terre à laquelle vous pouvez facilement accéder à tout moment. Pour réduire les risques de blessures graves, lisez le Guide de sécurité et ergonomie du poste de travail. Ce manuel explique comment agencer correctement un poste de travail et quelle posture les utilisateurs d'ordinateurs doivent adopter pour travailler de manière ergonomique. Il contient également d’importantes informations sur la sécurité électrique et mécanique. Ce manuel est disponible sur le Web à l’adresse http://www.hp.com/ergo. AVERTISSEMENT ! Cet ordinateur contient des pièces sous tension et amovibles. Débranchez le cordon d'alimentation avant de retirer le boîtier. Remettez le boîtier en place et fixez-le avant d'alimenter l'équipement. ATTENTION : L’électricité statique peut endommager les composants électriques de l’ordinateur ou de l’équipement en option. Il est conseillé de toucher un objet métallique relié à la terre avant de commencer l'installation. Consultez Décharges électrostatiques à la page 176 pour plus d'informations. Lorsque l'ordinateur est branché sur le secteur, la carte mère est sous tension. Vous devez débrancher le cordon d’alimentation de la source d’alimentation avant d’ouvrir l’ordinateur pour éviter toute détérioration des composants internes. FRWW Fonctionnalités de maintenance 95 Retrait du panneau d'accès à l'ordinateur Pour accéder aux composants internes, vous devez enlever le panneau d’accès : 1. Retirez/dégagez tout périphérique de sécurité qui gêne l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Mettez l'ordinateur hors tension sans risque via le système d'exploitation, puis mettez les périphériques externes hors tension. 4. Débranchez le cordon d'alimentation de la prise électrique, puis débranchez tout périphérique externe. ATTENTION : Quel que soit l'état de mise sous tension, une tension est toujours présente sur la carte mère tant que le système est branché sur une prise secteur active. Vous devez débrancher le cordon d'alimentation pour éviter d'endommager les composants internes de l'ordinateur. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier et posez l’ordinateur sur une surface plane. 6. Soulevez la poignée du panneau d’accès (1) puis soulevez le panneau d’accès de l’ordinateur (2). Figure 4-1 Retrait du panneau d'accès de l'ordinateur 96 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) FRWW Remise en place du panneau d'accès à l'ordinateur Faites glisser l’onglet situé à l’avant du panneau d’accès sous l’onglet situé à l’avant du châssis (1), puis appuyez l’arrière du panneau d’accès dans l’appareil jusqu’à ce qu’il s’emboîte (2). Figure 4-2 Remise en position du panneau d'accès de l'ordinateur FRWW Remise en place du panneau d'accès à l'ordinateur 97 Retrait du panneau avant 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier et posez l’ordinateur sur une surface plane. 6. Retirez le panneau d’accès de l’ordinateur. 7. Soulevez les trois onglets sur le côté du cache avant (1), puis faites pivoter le cache avant pour le retirer du châssis (2). Figure 4-3 Retrait du panneau avant Retrait des caches protecteurs Sur certains modèles, des caches protecteurs recouvrent les baies de lecteur 3,5 et 5,25 pouces. Ces caches doivent être retirés avant d'installer un lecteur. Pour retirer un cache protecteur : 1. Retirez le panneau d'accès et le panneau avant. 98 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) FRWW 2. Pour retirer un cache protecteur, poussez les languettes de fixation qui maintiennent le cache en place vers le bord extérieur droit du panneau (1) et faites glisser le cache vers l'arrière et vers la droite pour le retirer (2). Figure 4-4 Retrait d'un cache protecteur FRWW Retrait des caches protecteurs 99 Remise en place du panneau avant Insérez les trois crochets en bas du cache avant dans les trous rectangulaires du châssis (1), puis faites pivoter le haut du cache avant dans le châssis (2) jusqu’à ce qu’il s’emboîte. Figure 4-5 Remise en position du cache avant Conversion de la configuration bureau en minitour L’ordinateur compact peut être positionné comme une tour à l’aide d’un socle pour tour en option que vous pouvez acheter auprès de HP. 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 100 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) FRWW 5. Positionnez l’ordinateur de façon à ce que le côté droit soit orienté vers le bas et placez l’ordinateur sur le socle en option. Figure 4-6 Conversion du format de bureau en orientation tour REMARQUE : Pour stabiliser l’ordinateur en orientation tour, HP vous recommande d’utiliser un socle en option. 6. Reconnectez le cordon d’alimentation et tous les périphériques externes, puis mettez l’ordinateur sous tension. REMARQUE : Veillez à garder un espace libre de 10 cm tout autour de l’ordinateur. 7. Verrouillez tout périphérique de sécurité qui aurait pu bouger lors du retrait du panneau d'accès. Connexions de la carte mère Reportez-vous à l'illustration et au tableau suivants pour identifier les connecteurs de la carte mère. Figure 4-7 Branchements de la carte mère 8200 Elite FRWW Connexions de la carte mère 101 Tableau 4-1 Branchements de la carte mère 8200 Elite N Connecteur de la carte mère Étiquette de carte mère Couleur Composant 1 DIMM4 (canal A) DIMM4 blanc Module de mémoire 2 DIMM3 (canal A) DIMM3 noir Module de mémoire 3 DIMM2 (canal B) DIMM2 blanc Module de mémoire 4 DIMM1 (canal B) DIMM1 noir Module de mémoire 5 Alimentation SATAPWR0 noir Lecteurs optiques SATA 6 Alimentation SATAPWR1 noir Disques durs SATA 7 SATA 3.0 SATA0 bleu foncé 1er disque dur 8 SATA 3.0 SATA1 bleu clair 2ème disque dur ou 2ème lecteur optique si un câble adaptateur ESATA est présent 9 SATA 2.0 SATA2 blanc 1er lecteur optique 10 eSATA ESATA noir Câble adaptateur eSATA ou 2ème lecteur optique 11 Port parallèle PAR noir Port parallèle 12 Port série COMB noir Port série 13 USB MEDIA noir Périphérique USB tel qu'un lecteur de cartes multimédias 14 Verrou de la protection HLCK noir Verrou de la protection 15 USB MEDIA2 noir Périphérique USB tel qu'un lecteur de cartes multimédias 16 Détecteur d'ouverture du capot HSENSE blanc Détecteur d'ouverture du capot 17 PCI Express x1 X1PCIEXP1 noir Carte d'extension 18 PCI Express x16 rétrogradé en x4 X4PCIEXP blanc Carte d'extension 19 PCI Express x16 X16PCIEXP noir Carte d'extension 20 PCI PCI blanc Carte d'extension 102 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) FRWW Figure 4-8 Branchements de la carte mère 6200 Pro Tableau 4-2 Branchements de la carte mère 6200 Pro N Connecteur de la carte mère Étiquette de carte mère Couleur Composant 1 DIMM4 (canal A) DIMM4 blanc Module de mémoire 2 DIMM3 (canal A) DIMM3 noir Module de mémoire 3 DIMM2 (canal B) DIMM2 blanc Module de mémoire 4 DIMM1 (canal B) DIMM1 noir Module de mémoire 5 Alimentation SATAPWR0 noir Lecteurs optiques SATA 6 Alimentation SATAPWR1 Disques durs SATA 7 SATA 3.0 SATA0 bleu foncé 1er disque dur 8 SATA 2.0 SATA1 blanc 2ème disque dur ou 2ème lecteur optique si un câble adaptateur ESATA est présent 9 SATA 2.0 SATA2 blanc 1er lecteur optique 10 eSATA ESATA noir Câble adaptateur eSATA ou 2ème lecteur optique 11 Port parallèle PAR noir Port parallèle 12 Port série COMB noir Port série 13 USB MEDIA noir Périphérique USB tel qu'un lecteur de cartes multimédias 14 Verrou de la protection HLCK noir Verrou de la protection 15 USB MEDIA2 noir Périphérique USB tel qu'un lecteur de cartes multimédias 16 Détecteur d'ouverture du capot HSENSE blanc Détecteur d'ouverture du capot 17 PCI Express x1 X1PCIEXP1 noir Carte d'extension 18 PCI Express x1 X4PCIEXP noir Carte d'extension FRWW Connexions de la carte mère 103 Tableau 4-2 Branchements de la carte mère 6200 Pro (suite) N Connecteur de la carte mère Étiquette de carte mère Couleur Composant 19 PCI Express x16 X16PCIEXP noir Carte d'extension 20 PCI PCI blanc Carte d'extension 104 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) FRWW Installation de mémoire supplémentaire L'ordinateur est fourni avec des modules DIMM (dual inline memory modules) de SDRAM (synchronous dynamic random access memory) DDR3 (double data rate 3). DIMM Les supports mémoire de la carte mère peuvent recevoir un maximum de quatre modules DIMM standard. À la livraison, ces connecteurs pour module mémoire accueillent au moins un DIMM préinstallé. Pour exploiter entièrement la prise en charge de mémoire, vous pouvez équiper la carte mère d'un maximum de 16 Go de mémoire dans une configuration hautes performances à deux canaux. DDR3-SDRAM DIMM ATTENTION : Ce produit NE prend PAS en charge la mémoire DDR3 Ultra Low Voltage (tension ultra faible) (DDR3U). Le processeur n'est pas compatible avec la mémoire DDR3U et si vous branchez de la mémoire DDR3U sur la carte mère, cela peut endommager physiquement le module DIMM ou provoquer un dysfonctionnement du système. Pour que le système fonctionne correctement, les modules mémoire DDR3-SDRAM DIMM doivent être : ● standard à 240 broches ● sans tampon, non-ECC, conformes à la norme PC3-8500 DDR3-1066 MHz ou à la norme PC3-10600 DDR3-1333 MHz ● 1,5 volt DDR3-SDRAM DIMM Les modules mémoire DDR3-SDRAM DIMM doivent également : ● prendre en charge une latence CAS 7 DDR3 1066 MHz (rythme 7-7-7) et une latence CAS 9 DDR3 1333 MHz (rythme 9-9-9) ● contenir les informations JEDEC SPD obligatoires En outre, l'ordinateur prend en charge : ● les technologies de mémoire non-ECC à 512 Mbits, 1 Gbit et 2 Gbits ● les modules DIMM monoface/double face. ● Modules DIMM conçus à partir de dispositifs DDR x8 et x16 ; Les modules DIMM conçus à partir de SDRAM x4 ne sont pas pris en charge REMARQUE : Le système ne fonctionnera pas correctement si vous installez des modules DIMM non pris en charge. FRWW Installation de mémoire supplémentaire 105 Remplissage des supports DIMM La carte mère est équipée de quatre supports DIMM, deux par canal. Ceux-ci sont identifiés DIMM1, DIMM2, DIMM3 et DIMM4. Les sockets DIMM1 et DIMM2 fonctionnent sur le canal mémoire B. Les sockets DIMM3 et DIMM4 fonctionnent sur le canal mémoire A. Le système fonctionnera automatiquement en mode canal unique, en mode double canal ou en mode flexible. Cela dépendra de l’installation des modules DIMM. ● Le système fonctionne en mode canal unique si les supports DIMM sont remplis dans un seul canal. ● Le système fonctionne en mode performant entrelacé à deux canaux si la capacité totale des modules DIMM du canal A est égale à celle des modules du canal B. Cependant, la technologie et la capacité des modules peuvent être différentes entre les deux canaux. Par exemple, si le canal A comporte deux modules DIMM de 1 Go et le canal B un module de 2 Go, le système fonctionnera en mode double canal. ● Le système fonctionnera en mode flexible si la capacité mémoire totale des modules DIMM du canal A n'est pas égale à la capacité mémoire totale des modules DIMM du canal B. En mode flexible, le canal occupé par le moins de mémoire représente la mémoire totale attribuée au double canal et la mémoire restante est attribuée au canal unique. Pour obtenir une vitesse optimale, les canaux doivent être équilibrés afin que la quantité la plus élevée de mémoire soit répartie entre les deux canaux. Si un canal dispose de plus de mémoire que l'autre, la plus grande capacité doit être attribuée au canal A. Par exemple, si vous occupez les sockets avec un module DIMM 2 Go et avec trois modules DIMM 1 Go, le canal A devra être occupé par le module DIMM 2 Go et par un module DIMM 1 Go. Le canal B devra être occupé par les deux autres modules DIMM 1 Go. Dans cette configuration, 4 Go sont exécutés en tant que double canal et 1 Go en tant que canal unique. ● Quel que soit le mode, la vitesse de fonctionnement maximale est déterminée par le module DIMM le plus lent du système. Installation des modules DIMM ATTENTION : Avant d'ajouter ou de retirer des modules mémoire, vous devez déconnecter le cordon d'alimentation et attendre environ 30 secondes pour éliminer toute énergie résiduelle. Quel que soit l'état de mise sous tension, une tension est toujours fournie aux modules mémoire tant que l'ordinateur est branché sur une prise secteur active. L'ajout ou le retrait de modules mémoire alors qu'une tension est toujours présente peut endommager de manière irrémédiable les modules mémoire ou la carte mère. Les supports de modules mémoire ont des contacts en métal doré. Lorsque vous mettez à niveau la mémoire, il est important d'utiliser des modules mémoire avec des contacts en métal doré pour éviter la corrosion et/ou l'oxydation due à l'incompatibilité des métaux en contact les uns avec les autres. L'électricité statique peut endommager les composants électroniques de l'ordinateur ou des cartes en option. Il est conseillé de toucher un objet métallique relié à la terre avant de commencer l'installation. Pour plus d'informations, reportez-vous à Décharges électrostatiques à la page 176. Lorsque vous manipulez un module de mémoire, ne touchez aucun contact, vous risqueriez d'endommager le module. 1. Retirez/dégagez tout périphérique de sécurité qui gêne l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Mettez l'ordinateur hors tension sans risque via le système d'exploitation, puis mettez les périphériques externes hors tension. 106 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) FRWW 4. Débranchez le cordon d'alimentation de la prise électrique, puis débranchez tout périphérique externe. ATTENTION : Avant d'ajouter ou de retirer des modules mémoire, vous devez déconnecter le cordon d'alimentation et attendre environ 30 secondes pour éliminer toute énergie résiduelle. Quel que soit l'état de mise sous tension, une tension est toujours fournie aux modules mémoire tant que l'ordinateur est branché sur une prise secteur active. L'ajout ou le retrait de modules mémoire alors qu'une tension est toujours présente peut endommager de manière irrémédiable les modules mémoire ou la carte mère. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier. 6. Retirez le panneau d’accès de l’ordinateur. AVERTISSEMENT ! Afin d'éviter tout risque de blessures dues aux surfaces brûlantes, laissez les composants du système interne refroidir avant de les toucher. 7. Faites pivoter le boîtier du compartiment du lecteur interne vers le haut pour accéder aux supports des modules de mémoire sur la carte mère. Figure 4-9 Rotation de la cage d'unité vers le haut FRWW Installation de mémoire supplémentaire 107 8. Ouvrez les deux loquets du support de module mémoire (1), puis insérez le module dans le support (2). Figure 4-10 Installation d'un DIMM REMARQUE : Un module mémoire ne peut être installé que d'une seule façon. Faites coïncider l'encoche située sur le module avec la patte du support de mémoire. Occupez les sockets DIMM noirs avant les blancs. Pour obtenir des performances maximales, occupez les sockets de façon à ce que la capacité mémoire soit répartie d'une manière aussi égale que possible entre le canal A et le canal B. Reportez-vous à Remplissage des supports DIMM à la page 106 pour plus d'informations. 9. Poussez le module dans le socket en vous assurant qu'il est complètement et correctement inséré. assurez-vous que les loquets sont en position fermée (3). 10. Répétez les étapes 8 et 9 pour installer les modules supplémentaires. 11. Remplacer le panneau d'accès. 12. Si l’ordinateur était sur un socle, replacez-le sur ce dernier. 13. Rebranchez le cordon d'alimentation et mettez l'ordinateur sous tension. 14. Verrouillez tout périphérique de sécurité qui aurait pu bouger lors du retrait du panneau d'accès. L'ordinateur devrait automatiquement détecter la mémoire supplémentaire la prochaine fois où vous l'allumerez. 108 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) FRWW Retrait ou installation d'une carte d'extension L'ordinateur 8200 Elite dispose d'un port d'extension PCI, d'un port d'extension PCI Express x1, d'un port d'extension PCI Express x16 et d'un port d'extension PCI Express x16 rétrogradé en port x4. L'ordinateur 6200 Pro dispose d'un port d'extension PCI, de deux ports d'extension PCI Express x1 et d'un port d'extension PCI Express x16. REMARQUE : Les supports pour cartes PCI et PCI Express sont uniquement compatibles avec les cartes de petit format. Vous pouvez installer une carte d’extension PCI Express x1, x4, x8 ou x16 dans le connecteur PCI Express x16. Pour les configurations disposant de deux cartes graphiques, la première carte (principale) doit être installée sur le port d'extension PCI Express x16 qui n'est PAS rétrogradé en port x4 (modèles 8200 Elite). Pour retirer, remplacer ou ajouter une carte d’extension : 1. Retirez/dégagez tout périphérique de sécurité qui gêne l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Mettez l'ordinateur hors tension sans risque via le système d'exploitation, puis mettez les périphériques externes hors tension. 4. Débranchez le cordon d'alimentation de la prise électrique, puis débranchez tout périphérique externe. ATTENTION : Quel que soit l'état de mise sous tension, une tension est toujours présente sur la carte mère tant que le système est branché sur une prise secteur active. Vous devez débrancher le cordon d'alimentation pour éviter d'endommager les composants internes de l'ordinateur. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier. 6. Retirez le panneau d’accès de l’ordinateur. 7. Recherchez un connecteur d'extension libre et approprié sur la carte mère et le connecteur d'extension correspondant à l'arrière du châssis de l'ordinateur. FRWW Retrait ou installation d'une carte d'extension 109 8. Ouvrez le dispositif de blocage des obturateurs de support PCI en soulevant le levier vert et en faisant pivoter le dispositif en position ouverte. Figure 4-11 Ouverture du dispositif de retenue 9. Avant d'installer une carte d'extension, retirez le cache de carte d'extension ou la carte d'extension existante. REMARQUE : Avant de retirer une carte d’extension déjà installée, débranchez tous les câbles qui y sont rattachés. a. Si vous installez une carte d'extension dans un connecteur libre, vous devez ôter le cache obturateur correspondant à l'arrière du châssis, Ôtez le cache obturateur à la verticale puis mettez-le à l'extérieur du châssis. Figure 4-12 Retrait d'un cache de carte d'extension 110 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) FRWW b. Si vous retirez une carte PCI standard ou PCI Express x1, tenez-la à chaque extrémité et faites-la délicatement basculer d’avant en arrière jusqu’à ce qu’elle sorte de son support. Tirez la carte d’extension hors du support à la verticale (1), puis retirez-la complètement du châssis (2). Veillez à ne pas rayer par mégarde d'autres composants avec la carte. Figure 4-13 Retrait d’une carte d’extension PCI standard c. Si vous retirez une carte PCI Express x16, éloignez le bras de rétention situé à l'arrière du support d'extension de la carte et faites délicatement basculer la carte jusqu'à ce qu'elle sorte de son support. Tirez la carte d’extension hors du support à la verticale, puis retirez-la complètement du châssis. Veillez à ne pas rayer par mégarde d'autres composants avec la carte. Figure 4-14 Retrait d'une carte d'extension PCI Express x16 10. Conservez la carte retirée dans un emballage antistatique. 11. Si vous n'installez pas de nouvelle carte, installez un cache de carte d'extension pour fermer le connecteur ouvert. FRWW Retrait ou installation d'une carte d'extension 111 ATTENTION : Après avoir retiré une carte d'extension, vous devez la remplacer par une nouvelle carte ou par un cache pour permettre le refroidissement des composants internes pendant leur fonctionnement. 12. Pour installer une nouvelle carte d’extension, tenez-la à la verticale du connecteur de la carte mère, puis déplacez-la vers l’arrière du châssis (1) de manière à aligner son support sur le connecteur prévu à l’arrière du châssis. Appuyez sur la carte pour l’insérer dans son connecteur sur la carte mère (2). Figure 4-15 Installation d'une carte d'extension REMARQUE : Lorsque vous installez une carte d'extension, appuyez fermement dessus pour que tout le connecteur s'emboîte correctement dans le logement de la carte d'extension. 13. Remettez en place le dispositif de blocage des cartes d’extension. Figure 4-16 Fermeture du dispositif de retenue 14. Branchez les câbles externes à la carte installée, si besoin est. Branchez les câbles internes à la carte mère, si besoin est. 15. Remettez en place le panneau d’accès de l’ordinateur. 112 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) FRWW 16. Si l’ordinateur était sur un socle, replacez-le sur ce dernier. 17. Rebranchez le cordon d'alimentation et mettez l'ordinateur sous tension. 18. Verrouillez tout périphérique de sécurité qui aurait pu bouger lors du retrait du panneau d'accès. 19. Reconfigurez l’ordinateur si nécessaire. Emplacement des unités Figure 4-17 Emplacements des unités Tableau 4-3 Emplacements des unités 1 Compartiment de disque dur interne 3,5 pouces 2 Baie de lecteur 3.5 pouces pour les lecteurs en option (lecteur de cartes multimédia illustré) 3 Baie de lecteur 5,25 pouces pour les lecteurs en option (lecteur optique illustré) REMARQUE : La configuration du lecteur sur votre ordinateur peut être différente de la configuration affichée ci-dessus. Pour vérifier le type et la taille des périphériques de stockage installés dans l’ordinateur, exécutez l’utilitaire Computer Setup. FRWW Emplacement des unités 113 Installation et retrait de lecteurs Lors de l'installation de lecteurs supplémentaires, suivez ces consignes : ● Le disque dur SATA (Serial ATA) principal doit être connecté au contrôleur SATA (bleu foncé, libellé SATA 0) principal sur la carte mère. Si vous ajoutez un deuxième disque dur, branchez-le sur le connecteur bleu clair (modèles 8200 Elite) ou sur le connecteur blanc (modèles 6200 Pro) à l'emplacement de la carte mère où est marqué SATA1. ● Connectez un lecteur optique SATA au connecteur SATA blanc libellé SATA2 sur la carte mère. ● Connectez un câble adaptateur eSATA en option au connecteur SATA noir sur la carte mère. ● Connectez un câble USB de lecteur de cartes multimédias au connecteur USB de la carte mère libellé MEDIA. ● Le câble d'alimentation pour les lecteurs SATA est un câble trois connecteurs branché sur la carte mère, le premier connecteur raccordé à l'arrière du disque dur, le second connecteur à l'arrière du disque 3.5 po., et le troisième connecteur à l'arrière du lecteur optique 5.25 po. ● Le système ne prend pas en charge les unités optiques, ni les disques durs PATA. ● Vous devez installer des vis de guidage pour garantir le bon alignement et l’emboîtement du lecteur dans la cage d’unité. HP a fourni des vis de guidage supplémentaires pour les baies de lecteurs (cinq vis standard 6-32 et quatre vis métriques M3), situées à l’avant du châssis, sous le cache avant. Les vis standard 6-32 sont nécessaires en cas de disque dur secondaire. Toutes les autres unités (excepté le disque dur principal) utilisent des vis métriques M3. Les vis métriques fournies par HP sont noires et les vis standard fournies par HP sont de couleur argent. Si vous procédez au remplacement du disque dur principal, vous devez retirer les quatre vis de guidage d’isolation 6-32 de couleur argent et bleu du disque que vous remplacez et les installer dans le nouveau disque. Figure 4-18 Emplacements des vis de guidage supplémentaires N Vis de guidage Périphérique 1 Vis métriques M3 noires Tous les lecteurs (sauf les disques durs primaires et secondaires) 2 Vis standard 6-32 de couleur argent Disque dur secondaire Au total, cinq vis standard 6-32 de couleur argent supplémentaires sont fournies. Quatre sont utilisées comme vis de guidage pour le disque dur secondaire. La cinquième vis est utilisée pour sécuriser le cache avant (pour plus d’informations, consultez Sécurité du panneau avant à la page 135). 114 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) FRWW ATTENTION : Pour éviter toute perte de travail et endommagement de l'ordinateur ou de l'unité : Si vous insérez ou retirez une unité, arrêtez le système d'exploitation correctement, mettez l'ordinateur hors tension et débranchez le cordon d'alimentation. Ne retirez jamais une unité pendant que l'ordinateur est sous tension ou en mode Veille. Il est conseillé de toucher un objet métallique relié à la terre avant de manipuler une unité. Évitez de toucher les connecteurs lorsque vous manipulez une unité. Pour savoir comment éviter les dommages dus à l’électricité statique, reportez-vous à la section Décharges électrostatiques à la page 176. Manipulez vos unités de disques délicatement ; Ne le laissez jamais tomber. Ne forcez pas lorsque vous tentez d'insérer une unité. Évitez d'exposer un disque dur aux liquides, températures extrêmes ou produits qui ont des champs magnétiques, par exemple un moniteur ou un hautparleur. Si une unité doit être expédiée, enveloppez-la dans du papier à bulles ou utilisez un conditionnement approprié et indiquez sur le paquet qu'il est fragile et doit être manipulé avec précaution. FRWW Installation et retrait de lecteurs 115 Retrait d'un lecteur 5,25 pouces d'une baie de lecteur ATTENTION : Tous les supports amovibles doivent être retirés d'une unité avant le retrait de celleci de l'ordinateur. 1. Retirez/dégagez tout périphérique de sécurité qui gêne l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Mettez l'ordinateur hors tension sans risque via le système d'exploitation, puis mettez les périphériques externes hors tension. 4. Débranchez le cordon d'alimentation de la prise électrique, puis débranchez tout périphérique externe. ATTENTION : Quel que soit l'état de mise sous tension, une tension est toujours présente sur la carte mère tant que le système est branché sur une prise secteur active. Vous devez débrancher le cordon d'alimentation pour éviter d'endommager les composants internes de l'ordinateur. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier. 6. Retirez le panneau d’accès de l’ordinateur. 7. Redressez le compartiment d’unité en le faisant pivoter. Figure 4-19 Rotation de la cage d'unité vers le haut 116 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) FRWW 8. Si vous retirez un lecteur optique, déconnectez le cordon d'alimentation (1) et le câble de données (2) à l'arrière du lecteur optique. ATTENTION : Lorsque vous déconnectez un câble, tirez sur son connecteur et pas sur le câble lui-même, car vous pourriez l’endommager. Figure 4-20 Débranchement des câbles d'alimentation et de données 9. En le faisant pivoter, abaissez le compartiment d’unité en position normale. ATTENTION : Veillez à ne pas coincer les câbles en abaissant le compartiment d’unité de disque. Figure 4-21 Rotation de la cage de lecteurs vers le bas FRWW Installation et retrait de lecteurs 117 10. Appuyez sur le bouton vert de retenue situé à gauche de l'unité pour la désengager du compartiment d'unité (1). Tout en appuyant sur le bouton de retenue, faites coulisser l'unité vers l'arrière jusqu'à ce qu'elle se bloque, puis soulevez-la à la verticale hors de son compartiment (2). Figure 4-22 Retrait de l’unité de 5,25 pouces Installation d'un lecteur 5,25 pouces dans une baie de lecteur 1. Retirez/dégagez tout périphérique de sécurité qui gêne l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Mettez l'ordinateur hors tension sans risque via le système d'exploitation, puis mettez les périphériques externes hors tension. 4. Débranchez le cordon d'alimentation de la prise électrique, puis débranchez tout périphérique externe. ATTENTION : Quel que soit l'état de mise sous tension, une tension est toujours présente sur la carte mère tant que le système est branché sur une prise secteur active. Vous devez débrancher le cordon d'alimentation pour éviter d'endommager les composants internes de l'ordinateur. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier. 6. Retirez le panneau d’accès de l’ordinateur. 7. Si vous installez une unité dans un compartiment couvert par un cache protecteur, retirez le cache avant, puis le cache protecteur. Consultez Retrait des caches protecteurs à la page 98 pour plus d'informations. 118 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) FRWW 8. Mettez en place quatre vis de guidage métriques M3 dans les trous inférieurs de chaque côté de l’unité. Quatre vis de guidage métriques M3 supplémentaires sont fournies par HP à l’avant du châssis, sous le cache avant. Les vis de guidage métriques M3 sont noires. Reportez-vous à la section Installation et retrait de lecteurs à la page 114 pour une illustration de l’emplacement des vis de guidage métriques M3 supplémentaires. REMARQUE : Lors du remplacement d’un lecteur, placez les quatre vis de guidage métrique M3 de l’ancien sur le nouveau. ATTENTION : Utilisez uniquement des vis de guidage de 5 mm de long. Des vis plus longues peuvent endommager les composants internes de l’unité. Figure 4-23 Installation des vis de guidage dans l’unité optique (1 de 2) Figure 4-23 Installation des vis de guidage dans l’unité optique (2 de 2) 9. Placez les vis de guidage sur l’unité dans les connecteurs J du compartiment de l’unité. Faites ensuite glisser l’unité vers l’avant de l’ordinateur pour la bloquer. Figure 4-24 Installation d’une unité optique FRWW Installation et retrait de lecteurs 119 10. Redressez le compartiment d’unité en le faisant pivoter. Figure 4-25 Redressement du compartiment d’unité de disque 11. Connectez le câble de données SATA au connecteur SATA blanc libellé SATA2 sur la carte mère. 12. Faites passer le câble de données dans les guides de câbles. ATTENTION : Il existe deux guides de câbles qui empêchent le câble de données d’être pincé par le compartiment lors de son soulèvement ou abaissement. L’un est situé sur le côté inférieur du compartiment. L’autre est situé sur le cadre du châssis, sous le compartiment. Assurez-vous que le câble de données passe via ces guides avant de le connecter à l’unité optique. 13. Connectez le cordon d’alimentation (1) et le câble de données (2) à l’arrière de l’unité optique. REMARQUE : Le câble d'alimentation du lecteur optique est un câble à trois connecteurs qui va de la carte mère au disque dur, puis à l'arrière du lecteur optique. Figure 4-26 Branchement du câble d’alimentation et du câble de données 120 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) FRWW 14. En le faisant pivoter, abaissez le compartiment d’unité en position normale. ATTENTION : Veillez à ne pas coincer les câbles en abaissant le compartiment d’unité de disque. Figure 4-27 Remise en position normale du compartiment d’unité de disque 15. Remettez en place le panneau avant (s'il a été retiré) et le panneau d'accès. 16. Si l’ordinateur était sur un socle, replacez-le sur ce dernier. 17. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 18. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d’accès. Retrait d'un lecteur 3.5 pouces d'une baie de lecteur ATTENTION : Avant de retirer une unité de l’ordinateur, veillez à ce qu’elle ne contienne pas de support amovible. L’unité de 3,5 pouces se situe sous l’unité de 5,25 pouces. Vous devez retirer le lecteur 5,25 pouces avant de retirer le lecteur 3,5 pouces. 1. Suivez la procédure de la section Retrait d'un lecteur 5,25 pouces d'une baie de lecteur à la page 116 pour retirer le lecteur 5.25 pouces et accéder au lecteur 3,5 pouces. ATTENTION : Assurez-vous que l’ordinateur est arrêté et que le cordon d’alimentation est débranché de la prise électrique avant de commencer. FRWW Installation et retrait de lecteurs 121 2. Débranchez les câbles de l’arrière de l’unité ou, si vous retirez un lecteur de cartes multimédia, déconnectez le câble USB de la carte mère comme indiqué sur les illustrations suivantes. Figure 4-28 Déconnexion du câble USB du lecteur de cartes multimédias 3. Appuyez sur le bouton vert de retenue situé à gauche de l’unité pour la désengager du compartiment d’unité (1). Tout en appuyant sur le bouton de retenue, faites coulisser l’unité vers l’arrière jusqu’à ce qu’elle se bloque, puis soulevez-la à la verticale hors de son compartiment (2). Figure 4-29 Retrait d’une unité de 3,5 pouces (lecteur de cartes multimédia illustré) Installation d'un lecteur 3.5 pouces dans une baie de lecteur Le compartiment de 3,5 pouces se situe sous l’unité de 5,25 pouces. Pour installer une unité dans le compartiment de 3,5 pouces : 122 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) FRWW REMARQUE : Pour un alignement correct et le blocage de l’unité dans la cage, vous devez installer des vis de guidage. HP a fourni des vis de guidage supplémentaires pour les baies de lecteurs (quatre vis standard 6-32 et quatre vis métriques M3), situées à l’avant du châssis, sous le cache avant. Les disques durs secondaires nécessitent des vis 6-32 standard. Toutes les autres unités (excepté le disque dur principal) utilisent des vis métriques M3. Les vis métriques M3 fournies par HP sont noires et les vis standard 6-32 fournies par HP sont de couleur argent. Reportez-vous à la section Installation et retrait de lecteurs à la page 114 pour une illustration des emplacements des vis de guidage. 1. Suivez la procédure de la section Retrait d'un lecteur 5,25 pouces d'une baie de lecteur à la page 116 pour retirer l’unité de 5.25 pouces et accéder au compartiment d’unité de 3,5 pouces. ATTENTION : Assurez-vous que l’ordinateur est arrêté et que le cordon d’alimentation est débranché de la prise électrique avant de commencer. 2. Si vous installez une unité dans un compartiment couvert par un cache protecteur, retirez le cache avant, puis le cache protecteur. Pour plus d’informations, reportez-vous à la section Retrait des caches protecteurs à la page 98. 3. Installez les vis de guidage dans les orifices de chaque côté du lecteur. Figure 4-30 Installation des guides de vidage (lecteur de cartes multimédia illustré) 4. Placez les vis de guidage sur l’unité dans les connecteurs J du compartiment de l’unité. Faites ensuite glisser l’unité vers l’avant de l’ordinateur pour la bloquer. Figure 4-31 Installation d’une unité dans le compartiment d’unité de 3,5 pouces (lecteur de cartes multimédia illustré) FRWW Installation et retrait de lecteurs 123 5. Connectez les câbles d’unité appropriés : a. Si vous installez un deuxième disque dur, branchez le câble d'alimentation (1) et le câble de données (2) à l'arrière du lecteur et branchez l'autre extrémité du câble de données au connecteur bleu clair (modèles 8200 Elite) ou au connecteur blanc (modèles 6200 Pro) sur la carte mère, là où vous lisez SATA1. Figure 4-32 Branchement du câble d’alimentation et du câble de données du deuxième disque dur b. Si vous installez un lecteur de cartes multimédias, connectez son câble USB au connecteur USB de la carte mère libellé MEDIA. Figure 4-33 Connexion du câble USB du lecteur de cartes multimédia REMARQUE : Reportez-vous à Connexions de la carte mère à la page 101 pour obtenir une illustration des connecteurs de lecteurs de la carte mère. 6. Repositionnez l’unité de 5,25 pouces. 7. Remettez en place le panneau avant (s'il a été retiré) et le panneau d'accès. 8. Si l’ordinateur était sur un socle, replacez-le sur ce dernier. 124 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) FRWW 9. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 10. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d’accès. FRWW Installation et retrait de lecteurs 125 Retrait et remplacement du disque dur interne 3,5 pouces principal REMARQUE : Avant de retirer l’ancien disque dur, assurez-vous de sauvegarder ses données de manière à pouvoir les transférer sur le nouveau disque. Le disque dur 3,5 pouces préinstallé est situé sous le bloc d’alimentation. Pour enlever et remettre en place le disque dur : 1. Retirez/dégagez tout périphérique de sécurité qui gêne l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Mettez l'ordinateur hors tension sans risque via le système d'exploitation, puis mettez les périphériques externes hors tension. 4. Débranchez le cordon d'alimentation de la prise électrique, puis débranchez tout périphérique externe. ATTENTION : Quel que soit l'état de mise sous tension, une tension est toujours présente sur la carte mère tant que le système est branché sur une prise secteur active. Vous devez débrancher le cordon d'alimentation pour éviter d'endommager les composants internes de l'ordinateur. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier. 6. Retirez le panneau d’accès de l’ordinateur. 7. Redressez le compartiment pour les unités internes. Figure 4-34 Redressement du compartiment d’unité de disque 126 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) FRWW 8. Redressez le bloc d’alimentation en le faisant pivoter. Le disque dur se trouve sous le bloc d’alimentation. Figure 4-35 Redressement du bloc d’alimentation 9. Débranchez le câble d’alimentation (1) et le câble de données (2) de l’arrière du disque dur. Figure 4-36 Déconnexion des câbles du disque dur FRWW Installation et retrait de lecteurs 127 10. Appuyez sur le loquet de dégagement vert situé à côté du disque dur (1). Tout en appuyant sur le loquet, faites glisser l’unité vers l’avant jusqu’à l’arrêt et soulevez-la pour la sortir du compartiment (2). Figure 4-37 Retrait du disque dur 11. Pour installer un disque dur, vous devez retirer les quatre vis de guidage d’isolation argentées et bleues de l’ancien disque dur et les installer sur le nouveau disque dur. Figure 4-38 Installation des vis de guidage de disque dur 128 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) FRWW 12. Alignez les vis de guidage avec les connecteurs du compartiment d’unité du châssis, enfoncez le disque dur dans le compartiment, puis faites-le glisser en arrière jusqu’à ce qu’il s’arrête et s’enclenche. Figure 4-39 Installation du disque dur 13. Connectez le cordon d'alimentation (1) et le câble de données (2) à l'arrière du disque dur. REMARQUE : Si le système est équipé d’un seul disque dur SATA, le câble de données doit être raccordé au connecteur SATA0 bleu foncé de la carte mère pour éviter toute détérioration des performances de disque dur. Figure 4-40 Connexion des câbles du disque dur 14. Faites pivoter le compartiment pour les unités internes et abaissez l'alimentation à leurs positions normales. 15. Remettez en place le panneau d’accès. 16. Si l’ordinateur était sur un socle, replacez-le sur ce dernier. 17. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 18. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d’accès. FRWW Installation et retrait de lecteurs 129 Installation d’un dispositif antivol Les dispositifs de sécurité illustrés ci-dessous et aux pages suivantes peuvent être utilisés pour protéger l’ordinateur contre le vol. Verrou de câble de sécurité HP/Kensington MicroSaver Figure 4-41 Installation d’un câble de sécurité 130 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) FRWW Cadenas Figure 4-42 Installation d’un cadenas Verrou de sécurité HP Business PC 1. Attachez le câble de sécurité en entourant un objet fixe. Figure 4-43 Fixation du câble autour d'un objet fixe FRWW Installation d’un dispositif antivol 131 2. Insérez le verrou Kensington dans la fente du verrou Kensington à l'arrière du moniteur et fixez le verrou au moniteur en insérant la clé à l'arrière du verrou et en tournant la clé de 90 degrés. Figure 4-44 Installation du verrou Kensington sur le moniteur 3. Introduisez le câble de sécurité dans le trou du verrou Kensington à l'arrière du moniteur. Figure 4-45 Sécurisation du moniteur 132 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) FRWW 4. Utilisez le support de montage fourni dans le kit pour sécuriser d'autres unités périphériques en introduisant le câble du périphérique dans le centre du support (1) et en insérant le câble de sécurité dans l'un des deux trous du support de montage (2). Utilisez le trou du support de montage sécurisant le mieux le câble de l'unité périphérique. Figure 4-46 Sécurisation des unités périphériques (imprimante présentée) 5. Enfilez les câbles du clavier et de la souris dans le verrou du châssis de l'ordinateur. Figure 4-47 Enfilage des câbles du clavier et de la souris FRWW Installation d’un dispositif antivol 133 6. Vissez le verrou au châssis dans le trou de la vis à ailettes à l'aide de la vis fournie. Figure 4-48 Fixation du verrou au châssis 7. Insérez le côté prise du câble de sécurité dans le verrou (1) et poussez le bouton (2) pour engager le verrou. Utilisez la clé fournie pour désengager le verrou. Figure 4-49 Engagement du verrou 134 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) FRWW 8. Une fois l'opération terminée, tous les périphériques dans votre station de travail sont sécurisés. Figure 4-50 Station de travail sécurisée Sécurité du panneau avant Le cache avant peut s’enclencher à l’aide d’une vis de sécurité fournie par HP. Pour installer la vis de sécurité : 1. Retirez/dégagez tout périphérique de sécurité qui gêne l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Mettez l'ordinateur hors tension sans risque via le système d'exploitation, puis mettez les périphériques externes hors tension. 4. Débranchez le cordon d'alimentation de la prise électrique, puis débranchez tout périphérique externe. ATTENTION : Quel que soit l'état de mise sous tension, une tension est toujours présente sur la carte mère tant que le système est branché sur une prise secteur active. Vous devez débrancher le cordon d'alimentation pour éviter d'endommager les composants internes de l'ordinateur. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier. 6. Retirez le panneau d'accès et le panneau avant. FRWW Installation d’un dispositif antivol 135 7. Enlevez l’une des cinq vis standard 6-32 de couleur argent situées à l’avant du châssis, derrière la face avant. Figure 4-51 Réinstallation de la vis de sécurité du cache avant 8. Remplacez le panneau avant. 9. Installez la vis de sécurité à côté de la patte de fixation située au milieu du cache avant afin de fixer le cache avant. Figure 4-52 Installation de la vis de sécurité du cache avant 10. Remplacer le panneau d'accès. 11. Si l’ordinateur était sur un socle, replacez-le sur ce dernier. 12. Rebranchez le cordon d'alimentation et mettez l'ordinateur sous tension. 13. Verrouillez tout périphérique de sécurité qui aurait pu bouger lors du retrait du panneau d'accès. 136 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) FRWW 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) Fonctionnalités de maintenance L’ordinateur possède des fonctions facilitant sa mise à niveau et son entretien. La plupart des procédures d’installation décrites dans ce chapitre ne nécessitent aucun outil. Avertissements et précautions Avant toute mise à niveau, suivez scrupuleusement toutes les instructions s’y rapportant et n’oubliez pas de lire les notes d’avertissement et d’attention de ce manuel. AVERTISSEMENT ! Afin de réduire les risques de blessures ou un endommagement de l’équipement provenant de choc électrique, de surface à haute température ou d’incendie : Déconnectez le cordon d’alimentation de la prise setceur et laissez refroidir les éléments internes du système avant de les toucher. Ne branchez pas de connecteurs de téléphone ou de télécommunication sur les prises de carte réseau. Utilisez toujours la fiche de terre du cordon d’alimentation. La fiche de terre est un élément de sécurité important. Branchez le cordon d’alimentation sur une prise secteur avec conducteur de terre, accessible facilement. Pour éviter tout risque de blessure grave, lisez le manuel Sécurité et ergonomie du poste de travail. Ce manuel explique comment agencer correctement un poste de travail et comment s’installer confortablement devant un ordinateur. Il contient également d’importantes informations sur la sécurité électrique et mécanique. Ce manuel est disponible sur le Web à l’adresse http://www.hp.com/ergo. AVERTISSEMENT ! Cet ordinateur contient des pièces sous tension et amovibles. Débranchez le cordon d'alimentation avant de retirer le boîtier. Remettez le boîtier en place et fixez-le avant d'alimenter l'équipement. ATTENTION : L’électricité statique peut endommager les composants électriques de l’ordinateur ou de l’équipement en option. Il est conseillé de toucher un objet métallique relié à la terre avant de commencer l'installation. Consultez Décharges électrostatiques à la page 176 pour plus d'informations. Quand l’ordinateur est branché sur le secteur, la carte mère est sous tension. Vous devez déconnecter le cordon d’alimentation avant d’ouvrir l’ordinateur pour prévenir toute détérioration des composants internes. FRWW Fonctionnalités de maintenance 137 Branchement du cordon d'alimentation Lorsque vous connectez l’alimentation, il est important de suivre les étapes ci-après pour vous assurer que le cordon d’alimentation ne se détache pas de l’ordinateur. 1. Connectez l’extrémité arrondie du cordon d’alimentation au connecteur d’alimentation situé à l’arrière de l’ordinateur (1). 2. Insérez le dispositif de retenue du cordon d’alimentation dans un logement de la ventilation pour empêcher que le cordon ne se débranche de l’ordinateur (2). 3. Assemblez l’excédent de cordon d’alimentation à l’aide du bracelet fourni (3). 4. Connectez la prise femelle de l’autre cordon d’alimentation dans le boîtier d’alimentation (4). 5. Connectez l’autre extrémité du cordon d’alimentation à une prise secteur (5). Figure 5-1 Connexion du cordon d’alimentation ATTENTION : Si vous ne sécurisez pas le câble d’alimentation à l’aide du dispositif de retenue, le cordon d’alimentation peut se débrancher et entraîner la perte de données. 138 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) FRWW Retrait du panneau d'accès à l'ordinateur Pour accéder aux composants internes, vous devez enlever le panneau d’accès : 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier et posez l’ordinateur sur une surface plane. 6. Desserrez la vis à l’arrière de l’ordinateur (1), faites glisser le panneau d’accès vers l’arrière de l’ordinateur, puis soulevez-le pour le retirer (2). Figure 5-2 Retrait du panneau d’accès de l’ordinateur FRWW Retrait du panneau d'accès à l'ordinateur 139 Remise en place du panneau d'accès à l'ordinateur 1. Alignez les languettes du panneau sur les fentes du châssis, puis faites glisser le panneau vers l’avant du châssis jusqu’à ce qu’il s’arrête (1). 2. Serrez la vis moletée pour fixer le panneau d'accès (2). Figure 5-3 Remise en place du panneau d'accès à l'ordinateur 140 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) FRWW Retrait du panneau avant 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier et posez l’ordinateur sur une surface plane. 6. Retirez le panneau d’accès de l’ordinateur. 7. Soulevez les trois onglets sur le côté du cache avant (1), puis faites pivoter le cache avant pour le retirer du châssis (2). Figure 5-4 Retrait du cache avant Retrait d'un cache protecteur Sur certains modèles, un cache protecteur pour baie de lecteur interne qui doit être retiré avant d'installer un lecteur. Pour retirer un cache protecteur : 1. Retirez le panneau d'accès et le panneau avant. FRWW Retrait du panneau avant 141 2. Pour retirer le cache protecteur, poussez les deux languettes de fixation du cache protecteur vers le côté extérieur gauche de ce dernier (1) et tirez-le vers l’intérieur pour le retirer (2). Figure 5-5 Retrait d’un cache protecteur Remise en place du panneau avant Insérez les trois crochets en bas du cache avant dans les trous rectangulaires du châssis (1), puis faites pivoter le haut du cache avant dans le châssis (2) jusqu’à ce qu’il s’emboîte. Figure 5-6 Remise en position du cache avant 142 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) FRWW Conversion de la configuration bureau en minitour L'ordinateur de bureau Ultra-Slim peut être utilisé en configuration tour avec le socle pour tour fourni avec l'ordinateur. 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Positionnez l’ordinateur de façon à ce que le côté gauche soit orienté vers le bas et placez fermement l’ordinateur sur le socle. Figure 5-7 Placement de l’ordinateur sur le socle 6. Reconnectez l’équipement externe, branchez le cordon d’alimentation sur une prise électrique, puis remettez l’ordinateur sous tension. REMARQUE : Veillez à garder un espace libre de 10 cm tout autour de l’ordinateur. 7. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du capot ou du panneau d’accès de l’ordinateur. REMARQUE : Une équerre de montage de disque dur en option est disponible auprès de HP pour monter l’ordinateur au mur, sur un bureau ou un bras articulé. FRWW Conversion de la configuration bureau en minitour 143 Connexions de la carte mère Reportez-vous à l'illustration et au tableau suivants pour identifier les connecteurs de la carte mère. Figure 5-8 Connexions de la carte mère N Connecteur de la carte mère Étiquette de carte mère Couleur Composant 1 SATA 3.0 SATA1 bleu clair Lecteur optique 2 Alimentation SATA PWR1 blanc Lecteur optique 3 Module PCI Express Mobile MXM noir Carte graphique 4 Détecteur d'ouverture du capot HSENSE blanc Détecteur d'ouverture du capot 5 USB MEDIA noir Lecteur de cartes multimédia SD 6 PCI Express x1 X1PCIEXP1 noir Carte d'extension 144 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) FRWW Installation de mémoire supplémentaire L’ordinateur est fourni avec des modules mémoire SODIMM DDR3-SDRAM. modules SODIMM Les supports de module mémoire de la carte mère peuvent recevoir au maximum deux modules SODIMM standard. À la livraison, ces supports de module mémoire accueillent au moins un SODIMM préinstallé. Pour exploiter entièrement la prise en charge de mémoire, vous pouvez équiper la carte mère d’un maximum de 8 Go de mémoire. Modules SODIMM DDR3-SDRAM ATTENTION : Ce produit NE prend PAS en charge la mémoire DDR3 Ultra Low Voltage (tension ultra faible) (DDR3U). Le processeur n'est pas compatible avec la mémoire DDR3U et si vous branchez de la mémoire DDR3U sur la carte mère, cela peut endommager physiquement le module SODIMM ou provoquer un dysfonctionnement du système. Pour le bon fonctionnement du système, les modules SODIMM doivent être du type suivant : ● standard à 204 broches ● sans tampon, non-ECC, conformes à la norme PC3-8500 DDR3-1066 MHz ou à la norme PC3-10600 DDR3-1333 MHz ● modules SODIMM DDR3-SDRAM de 1,5 volt Les modules SODIMM DDR3-SDRAM doivent également : ● prendre en charge une latence CAS 7 DDR3 1066 MHz (rythme 7-7-7) et une latence CAS 9 DDR3 1333 MHz (rythme 9-9-9) ● contenir les spécifications du JEDEC (Joint Electronic Device Engineering Council) De plus l’ordinateur doit prendre en charge : ● les technologies de mémoire non-ECC à 512 Mbits, 1 Gbit et 2 Gbits ● les modules SODIMMS à une face ou deux faces ● les modules SODIMM construits avec des puces x8 et x16 DDR ; les SODIMM construits avec des puces x4 SDRAM ne sont pas pris en charge REMARQUE : Le système ne fonctionnera pas correctement si vous installez des modules SODIMM non pris en charge. FRWW Installation de mémoire supplémentaire 145 Remplissage des supports SODIMM La carte mère est équipée de deux supports SODIMM, un par canal. Ces supports sont identifiés XMM1 et XMM3. Le support XMM1 correspond au canal de mémoire A ; le support XMM3 correspond au canal de mémoire B. Figure 5-9 Emplacement des supports SODIMM Tableau 5-1 Emplacement des supports SODIMM Repère Description Étiquette de carte mère Couleur du support 1 Support SODIMM1 canal B XMM1 Noir 2 Support SODIMM3 canal A XMM3 Noir Le système fonctionne automatiquement en mode à un canal, à deux canaux ou flexible, en fonction de la position des modules SODIMM. ● Le système fonctionne dans le mode à un canal si les modules SODIMM sont installés dans les supports d’un même canal. ● Le système fonctionne dans le mode performant entrelacé à deux canaux si la capacité totale des modules SODIMM du canal A est égale à celle des modules du canal B. ● Le système fonctionne en mode flexible entrelacé si la capacité totale des modules SODIMM du canal A n’est pas égale à celle des modules du canal B. En mode flexible, le canal doté de la quantité la plus faible de mémoire décrit la capacité totale de mémoire attribuée aux deux canaux et le reste est alloué à un canal unique. Si un canal dispose de plus de mémoire que l’autre, la plus grande quantité doit être attribuée au canal A. ● Dans chaque mode, le module SODIMM le plus lent du système détermine la vitesse maximum de fonctionnement. 146 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) FRWW Installation des barrettes SODIMM ATTENTION : Avant d'ajouter ou de retirer des modules mémoire, vous devez déconnecter le cordon d'alimentation et attendre environ 30 secondes pour éliminer toute énergie résiduelle. Quel que soit l'état de mise sous tension, une tension est toujours fournie aux modules mémoire tant que l'ordinateur est branché sur une prise secteur active. L'ajout ou le retrait de modules mémoire alors qu'une tension est toujours présente peut endommager de manière irrémédiable les modules mémoire ou la carte mère. Les supports des modules mémoire possèdent des contacts en or. Lors de la mise à niveau de la mémoire, il convient d’utiliser des modules DIMM avec des contacts en or, afin d’éviter les risques de corrosion et/ou d’oxydation pouvant résulter du contact de deux métaux incompatibles. L'électricité statique peut endommager les composants électroniques de l'ordinateur ou des cartes en option. Il est conseillé de toucher un objet métallique relié à la terre avant de commencer l'installation. Pour plus d'informations, reportez-vous à Décharges électrostatiques à la page 176. Lorsque vous manipulez un module mémoire, ne touchez aucun contact, car vous risqueriez d’endommager le module. 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Avant d’ajouter ou de retirer des modules mémoire, vous devez déconnecter le cordon d’alimentation et attendre environ 30 secondes pour éliminer toute énergie résiduelle. Quel que soit l’état de mise sous tension, une tension est toujours fournie aux modules mémoire tant que l’ordinateur est branché sur une prise secteur active. L’ajout ou le retrait de modules mémoire alors qu’une tension est toujours présente peut endommager de manière irrémédiable les modules mémoire ou la carte mère. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier et posez l’ordinateur sur une surface plane. 6. Retirez le panneau d’accès de l’ordinateur. 7. Repérez les supports des modules mémoire sur la carte mère. AVERTISSEMENT ! Afin d’éviter toute brûlure, il est conseillé de laisser refroidir les éléments internes du système avant de les toucher. FRWW Installation de mémoire supplémentaire 147 8. Si vous retirez un module SODIMM, poussez les deux loquets de chaque côté du module SODIMM vers l'extérieur (1), puis tirez sur le module SODIMM pour le retirer du support (2). Figure 5-10 Retrait d’un module SODIMM 9. Faites glisser le nouveau module SODIMM dans le support à un angle de 30° (1), puis appuyez sur le module SODIMM (2) de façon à ce que les loquets le retiennent en place. Figure 5-11 Installation d’un module SODIMM REMARQUE : Un module mémoire ne peut être installé que dans un sens. Faites coïncider l’encoche du module avec la languette du support de mémoire. 10. Remettez en place le panneau d’accès. 11. Si l’ordinateur était sur un socle, replacez-le sur ce dernier. 12. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 13. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du capot ou du panneau d’accès de l’ordinateur. 148 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) FRWW L’ordinateur détecte automatiquement la mémoire ajoutée à sa prochaine mise sous tension. Remplacement de l’unité optique L’ordinateur de bureau ultra-plat utilise une unité optique SATA (Serial ATA) ultra-plate. Extraction d’une unité optique ATTENTION : Avant de retirer une unité de l’ordinateur, veillez à ce qu’elle ne contienne pas de support amovible. 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier et posez l’ordinateur sur une surface plane. 6. Retirez le panneau d'accès de l'ordinateur et le cache avant. 7. Débranchez les câbles de l'arrière de l'unité optique (1), appuyez sur le loquet de dégagement vert à l'arrière droit de l'unité vers le centre de l'unité (2), puis faites glisser l'unité vers l'avant et l'extérieur du compartiment en passant par le cache avant (3). ATTENTION : Lorsque vous déconnectez un câble, tirez sur son connecteur et pas sur le câble lui-même, car vous pourriez l’endommager. Figure 5-12 Extraction d’une unité optique FRWW Remplacement de l’unité optique 149 Préparation d’un nouveau lecteur optique Avant de pouvoir utiliser la nouvelle unité optique, le loquet de dégagement doit être fixé. 1. Décollez la bande adhésive du loquet de dégagement. 2. Sans permettre au loquet de dégagement de toucher l’unité optique, alignez les orifices sur le loquet de dégagement en orientant les broches sur le côté de l’unité optique. Assurez-vous que le loquet de dégagement est correctement orienté. 3. Insérez la broche à l’avant de l’unité optique dans l’orifice à l’arrière du loquet de dégagement et appuyez fermement. 4. Insérez la seconde broche, puis appuyez fermement sur le loquet entier pour le fixer sur l’unité optique. Figure 5-13 Alignement du loquet de dégagement 150 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) FRWW Installation d’un nouveau lecteur optique REMARQUE : Si vous installez une unité optique dans un compartiment qui ne contenait pas d’unité auparavant, vous devez retirer le panneau d’accès et le cache recouvrant l’ouverture du compartiment avant de commencer. Suivez les instructions des sections Retrait du panneau d'accès à l'ordinateur à la page 139 et Retrait d'un cache protecteur à la page 141. 1. Suivez les instructions du retrait du lecteur optique. Reportez-vous à Extraction d’une unité optique à la page 149. 2. Attachez le loquet de dégagement à la nouvelle unité optique. Reportez-vous à la section Préparation d’un nouveau lecteur optique à la page 150. 3. Tournez l’arrière de l’unité optique vers l’ordinateur et placez le loquet de dégagement vers l’intérieur de l’unité ; alignez l’unité sur l’ouverture du cache avant. 4. Faites glisser l’unité optique par le cache avant jusqu’au fond du compartiment de façon à ce qu’elle s’emboîte (1), puis branchez le câble à l’arrière de l’unité (2). Figure 5-14 Installation d’une unité optique 5. Remettez en place le panneau avant et le panneau d'accès. 6. Si l’ordinateur était sur un socle, replacez-le sur ce dernier. 7. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 8. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du capot ou du panneau d’accès de l’ordinateur. FRWW Remplacement de l’unité optique 151 Remise en position du disque dur REMARQUE : L'ordinateur de bureau Ultra-Slim MP 8000r prend en charge uniquement les disques durs internes de 2,5 pouces SATA (Serial ATA). Avant de retirer l’ancien disque dur, assurez-vous de sauvegarder ses données de manière à pouvoir les transférer sur le nouveau disque. Le disque dur 2,5 pouces est logé dans un support sous l’unité optique. 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier et posez l’ordinateur sur une surface plane. 6. Retirez le panneau d’accès de l’ordinateur. 7. Retirez l’unité optique. Reportez-vous à la section Extraction d’une unité optique à la page 149 pour plus d’instructions. 8. Appuyez sur le loquet de dégagement sur le côté gauche du support de disque dur (1), puis faites pivoter le levier du support vers la droite (2). Figure 5-15 Déverrouillage du support du disque dur 152 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) FRWW 9. Soulevez le support du disque dur tout droit pour l’extraire du châssis. Figure 5-16 Retrait du support du disque dur 10. Retirez les quatre vis de guidage sur les côtés du support de disque dur. Figure 5-17 Retrait des vis de guidage 11. Soulevez le disque dur dans le support (1) et faites-le glisser hors de ce dernier (2). Figure 5-18 Retrait du disque dur du support FRWW Remise en position du disque dur 153 12. Positionnez le disque dur de manière à ce que sa partie supérieure se trouve contre la partie supérieure du support (1) afin que la carte de circuit intégré qui se trouve sous le disque dur n’entre pas en contact avec les languettes de la partie inférieure du support, puis faites glisser le nouveau disque dur dans le support (2). ATTENTION : Veillez à ne pas rayer la carte de circuit intégrée sous le disque dur contre les languettes de la partie inférieure du support lorsque vous le faites glisser dans ce dernier. Cela pourrait endommager de manière irrémédiable le disque dur. Figure 5-19 Insertion du disque dur dans le support 13. Posez le disque dur dans la partie inférieure du support (1), puis replacez les quatre vis de guidage sur les côtés pour maintenir le disque dans le support (2). Figure 5-20 Positionnement du disque dur et réinstallation des vis de guidage 154 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) FRWW 14. Pour replacer le support du disque dur dans le châssis, alignez les vis de guidage avec les connecteurs du compartiment de disque, lâchez le support dans le compartiment (1) et appuyez sur le levier du support jusqu’au fond (2) de façon à ce que l’unité soit parfaitement maintenue en place. Figure 5-21 Installation du support du disque dur 15. Replacez l’unité optique et rebranchez le câble à l’arrière de cette dernière. 16. Remettez en place le panneau d’accès de l’ordinateur. 17. Si l’ordinateur était sur un socle, replacez-le sur ce dernier. 18. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 19. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du capot ou du panneau d’accès de l’ordinateur. REMARQUE : Aucune configuration du disque dur SATA n’est requise ; l’ordinateur le reconnaît automatiquement à la prochaine mise sous tension. Installation et retrait d'un couvercle de port Un cache de port arrière en option est disponible pour l’ordinateur. FRWW Installation et retrait d'un couvercle de port 155 Pour installer le cache de port : 1. Faites passer les câbles dans le trou inférieur du cache de port (1) et connectez-les aux ports arrière de l’ordinateur. 2. Insérez les crochets du cache de port dans les connecteurs à l’arrière du châssis, puis faites glisser le cache vers la droite pour le maintenir en place (2). Figure 5-22 Installation d’un cache de port REMARQUE : Pour des raisons de sécurité, il est possible d’installer un dispositif antivol en option au châssis de façon à verrouiller le cache de port et à fixer l’ordinateur. Reportez-vous à la section Installation d’un dispositif antivol à la page 157. Le cache de port est maintenu en place par un levier de blocage situé à l’intérieur de l’ouverture du cache. Pour supprimer le cache du port, tirez le levier en arrière vers l’ouverture du cache (1), puis faites glisser le cache vers la gauche pour l’ôter de l’ordinateur (2). Figure 5-23 Retrait d’un cache de port 156 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) FRWW Installation d’un dispositif antivol Verrou de câble de sécurité HP/Kensington MicroSaver Il y a deux orifices pour câble antivol à l’arrière de l’ordinateur. L’orifice près de la vis moletée doit être utilisé lorsqu’il n’y a pas de cache de port. L’orifice situé à l’extrême droite doit être utilisé lorsqu’un cache de port est installé. Figure 5-24 Installation d’un câble de sécurité sans cache de port Figure 5-25 Installation d’un câble avec un cache de port FRWW Installation d’un dispositif antivol 157 Cadenas Figure 5-26 Installation d’un cadenas Verrou de sécurité HP Business PC 1. Attachez le câble de sécurité en entourant un objet fixe. Figure 5-27 Fixation du câble autour d'un objet fixe 158 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) FRWW 2. Insérez le verrou Kensington dans la fente du verrou Kensington à l'arrière du moniteur et fixez le verrou au moniteur en insérant la clé à l'arrière du verrou et en tournant la clé de 90 degrés. Figure 5-28 Installation du verrou Kensington sur le moniteur 3. Introduisez le câble de sécurité dans le trou du verrou Kensington à l'arrière du moniteur. Figure 5-29 Sécurisation du moniteur FRWW Installation d’un dispositif antivol 159 4. Utilisez le support de montage fourni dans le kit pour sécuriser d'autres unités périphériques en introduisant le câble du périphérique dans le centre du support (1) et en insérant le câble de sécurité dans l'un des deux trous du support de montage (2). Utilisez le trou du support de montage sécurisant le mieux le câble de l'unité périphérique. Figure 5-30 Sécurisation des unités périphériques (imprimante présentée) 5. Enfilez les câbles du clavier et de la souris dans le verrou du châssis de l'ordinateur. Figure 5-31 Enfilage des câbles du clavier et de la souris 160 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) FRWW 6. Vissez le verrou au châssis dans le trou de la vis à ailettes à l'aide de la vis fournie. Figure 5-32 Fixation du verrou au châssis 7. Insérez le côté prise du câble de sécurité dans le verrou (1) et poussez le bouton (2) pour engager le verrou. Utilisez la clé fournie pour désengager le verrou. Figure 5-33 Engagement du verrou FRWW Installation d’un dispositif antivol 161 8. Une fois l'opération terminée, tous les périphériques dans votre station de travail sont sécurisés. Figure 5-34 Station de travail sécurisée 162 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) FRWW Sécurité du panneau avant Le cache avant peut s’enclencher à l’aide d’une vis de sécurité fournie par HP. Pour installer la vis de sécurité : 1. Retirez/dégagez tout périphérique de sécurité qui gêne l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Mettez l'ordinateur hors tension sans risque via le système d'exploitation, puis mettez les périphériques externes hors tension. 4. Débranchez le cordon d'alimentation de la prise électrique, puis débranchez tout périphérique externe. ATTENTION : Quel que soit l'état de mise sous tension, une tension est toujours présente sur la carte mère tant que le système est branché sur une prise secteur active. Vous devez débrancher le cordon d'alimentation pour éviter d'endommager les composants internes de l'ordinateur. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier. 6. Retirez le panneau d'accès et le panneau avant. 7. Retirez la vis noire à l’avant du châssis derrière le cache. Elle se situe à proximité de l’unité optique et porte la mention « BEZEL ». Figure 5-35 Réinstallation de la vis de sécurité du cache avant 8. Remplacez le panneau avant. FRWW Installation d’un dispositif antivol 163 9. Installez la vis de sécurité dans la languette de dégagement située au milieu du cache avant et dans le châssis afin de fixer le cache avant. Figure 5-36 Installation de la vis de sécurité du cache avant 10. Remplacer le panneau d'accès. 11. Si l’ordinateur était sur un socle, replacez-le sur ce dernier. 12. Rebranchez le cordon d'alimentation et mettez l'ordinateur sous tension. 13. Verrouillez tout périphérique de sécurité qui aurait pu bouger lors du retrait du panneau d'accès. 164 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) FRWW A Remplacement de la pile La pile livrée avec l’ordinateur alimente l’horloge temps réel. Lorsque vous devez remplacer la pile, utilisez une pile équivalente à celle installée d’origine dans l’ordinateur. Votre ordinateur est livré avec une pile bouton au lithium de 3 volts. AVERTISSEMENT ! L’ordinateur contient une pile interne au lithium et dioxyde de manganèse. Il existe un danger d’incendie et de brûlures si la pile n’est pas manipulée correctement. Pour réduire les risques de blessure : Ne pas tenter de recharger la pile. Ne pas exposer la pile à des températures supérieures à 60 °C (140 °F). Ne pas démonter, écraser, perforer ou court-circuiter les contacts externes. Ne pas jeter au feu ou dans l’eau. Remplacer la pile uniquement avec une pile de rechange HP adaptée à ce type de produit. ATTENTION : Avant de remplacer la pile, veillez à sauvegarder les paramètres CMOS de l'ordinateur. Lorsque vous retirerez la pile, les paramètres CMOS seront effacés. L’électricité statique peut endommager les composants électroniques de l’ordinateur ou de l’équipement optionnel. Il est conseillé de toucher un objet métallique relié à la terre avant de commencer l’installation. REMARQUE : Vous pouvez économiser l’énergie de la pile au lithium en laissant l’ordinateur branché sur une prise secteur sous tension. L’énergie de la pile au lithium s’épuise uniquement lorsque l’ordinateur n’est PAS branché sur une prise secteur. Hewlett-Packard encourage ses clients à recycler le matériel électronique usagé, les cartouches d’impression de marque HP et les piles rechargeables. Pour plus d’informations sur les programmes de recyclage, consultez le site http://www.hp.com/recycle. 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Retirez le panneau d’accès de l’ordinateur. 6. Repérez la pile et son support sur la carte mère. REMARQUE : Sur certains modèles d’ordinateur, il peut s’avérer nécessaire de retirer un composant interne pour accéder à la pile. 7. En fonction du type de pile et de support équipant la carte mère, procédez comme suit : FRWW 165 Type 1 a. Retirez la pile de son support. Figure A-1 Retrait d’une pile bouton (type 1) b. Faites glisser la pile de rechange dans l’emplacement, le pôle positif tourné vers le haut. Le support maintient la pile en place automatiquement. Type 2 a. Pour libérer la pile de son support, appuyez sur la languette métallique qui bloque le bord de la pile. Lorsque la pile est libérée, retirez-la de son support (1). b. Pour installer une nouvelle pile, insérez un bord de la pile sous la lèvre du support, en veillant à orienter le pôle positif vers le haut. Appuyez sur le bord opposé jusqu’à ce que la languette s’enclenche sur la pile (2). Figure A-2 Retrait et remplacement d’une pile bouton (type 2) Type 3 a. Repoussez la griffe (1) qui maintient la pile en place et retirez la pile de son support (2). 166 Annexe A Remplacement de la pile FRWW b. Insérez la nouvelle pile et remettez la griffe en place. Figure A-3 Retrait d’une pile bouton (type 3) REMARQUE : Une fois la nouvelle pile en place, effectuez les opérations suivantes pour terminer la procédure. 8. Remettez en place le panneau d’accès de l’ordinateur. 9. Branchez l’ordinateur et démarrez-le. 10. Réglez à nouveau la date et l’heure, les mots de passe et tous les paramètres spéciaux à l’aide de l’utilitaire Computer Setup. 11. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d’accès de l’ordinateur. FRWW 167 B Retrait et remplacement d'un disque dur SATA amovible 3,5 pouces Certains modèles sont équipés d’un boîtier de disque dur SATA amovible dans la baie de lecteur externe de 5,25 pouces. Le disque dur est logé dans un support qui peut se retirer facilement du compartiment d’unité de disque. Pour enlever et remonter une unité dans le support : REMARQUE : Avant de retirer l’ancien disque dur, assurez-vous de sauvegarder ses données de manière à pouvoir les transférer sur le nouveau disque. 1. Déverrouillez le support du disque dur avec la clé fournie et faites-le glisser hors du boítier. 2. Retirez la vis de l’arrière du support (1) et faites glisser le capot supérieur du support (2). Figure B-1 Retrait du capot du support 168 Annexe B Retrait et remplacement d'un disque dur SATA amovible 3,5 pouces FRWW 3. Retirez le ruban adhésif qui retient le capteur thermique au-dessus du disque dur (1) et retirez le capteur thermique du support (2). Figure B-2 Retrait du capteur thermique 4. Retirez les quatre vis du bas du support du disque dur. Figure B-3 Retrait des vis de sécurité FRWW 169 5. Refaites glisser le disque dur pour le déconnecter du support, puis soulevez-le pour le faire sortir du support. Figure B-4 Retrait du disque dur 6. Placez le nouveau disque dur dans le support, puis faites glisser le disque dur de façon à l’insérer dans le connecteur SATA de la carte à circuits imprimés du support. Assurez-vous que le connecteur du disque dur est complètement enfoncé dans le connecteur SATA de la carte à circuits imprimés du support. Figure B-5 Remise en position du disque dur 170 Annexe B Retrait et remplacement d'un disque dur SATA amovible 3,5 pouces FRWW 7. Replacez les quatre vis au bas du support pour maintenir le disque en place. Figure B-6 Remise en position des vis de sécurité 8. Placez le capteur thermique sur le disque dur de façon à ce qu’il ne recouvre pas l’étiquette (1) et attachez-le avec le ruban adhésif (2). Figure B-7 Remise en position du capteur thermique FRWW 171 9. Faites glisser le capot du support (1) et replacez la vis à l’arrière du support pour maintenir le capot (2). Figure B-8 Remise en position du capot du support 10. Faites glisser le support du disque dur dans le boîtier de l’ordinateur et verrouillez-le avec la clé fournie. REMARQUE : Le support doit être verrouillé pour que l’alimentation arrive au disque dur. 172 Annexe B Retrait et remplacement d'un disque dur SATA amovible 3,5 pouces FRWW C Désactivation du verrou Smart Cover REMARQUE : Le verrou Smart Cover n’est disponible que sur certains modèles. Le verrou Smart Cover est commandé par logiciel et géré à partir du mot de passe de configuration. Ce système empêche tout accès non autorisé aux composants internes de l’ordinateur. L’ordinateur est livré avec le verrou débloqué. Pour plus d’informations sur le fonctionnement du verrou Smart Cover, reportez-vous au Manuel de supervision des ordinateurs de bureau. Clé Smart Cover FailSafe Si vous activez le verrou Smart Cover et que vous ne pouvez pas entrer le mot de passe pour désactiver le verrou, vous aurez besoin d’une clé Smart Cover FailSafe pour ouvrir le capot de l’ordinateur. Vous aurez besoin de cette clé pour accéder aux composants internes de l’ordinateur si l’un des cas suivants se présente : ● Coupure de courant ● Panne au démarrage ● Défaillance d’un élément de l’ordinateur (processeur ou alimentation par exemple) ● Oubli d’un mot de passe REMARQUE : La clé Smart Cover FailSafe est un outil spécialisé fourni par HP. Pour parer à toute éventualité, commandez cette clé avant d’avoir à vous en servir. Pour obtenir une clé FailSafe : ● Adressez-vous à un revendeur ou à un fournisseur de services agréé HP. Utilisez la référence de commande PN 166527-001 pour l’outil en forme de clé ou la référence PN 166527-002 pour l’outil en forme de tournevis. ● Consultez le site Web HP (http://www.hp.com) pour obtenir des informations relatives aux commandes. ● Pour appeler l’assistance technique, reportez-vous aux numéros indiqués sur la carte de garantie ou au guide intitulé Numéros de téléphone de l’assistance clientèle. Utilisation de la clé Smart Cover FailSafe pour retrait du verrou Smart Cover Pour ouvrir le panneau d’accès lorsque le verrou Smart Cover est engagé : 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. FRWW Clé Smart Cover FailSafe 173 ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Utilisez la clé Smart Cover FailSafe pour retirer les deux vis de sécurité qui fixent le verrou Smart Cover au châssis. Figure C-1 Retrait des vis du verrou du capot intelligent de la minitour convertible Figure C-2 Retrait des vis du verrou du capot intelligent de la microtour 174 Annexe C Désactivation du verrou Smart Cover FRWW Figure C-3 Retrait des vis du verrou du capot intelligent de l'ordinateur compact Vous pouvez maintenant retirer le panneau d'accès. Pour fixer à nouveau le verrou Smart Cover, mettez le verrou en place à l’aide des vis de sécurité. FRWW Utilisation de la clé Smart Cover FailSafe pour retrait du verrou Smart Cover 175 D Décharges électrostatiques Une décharge d’électricité statique, provenant des doigts ou de tout autre conducteur, peut endommager les cartes du système ou d’autres unités sensibles à l’électricité statique. Ce type de dégât peut diminuer la durée de vie du dispositif. Prévention des décharges électrostatiques Afin d’éviter tout risque de dégât par l’électricité statique, prenez les précautions suivantes : ● Évitez tout contact avec les mains, en transportant et en rangeant les produits dans des emballages antistatiques. ● Laissez les éléments sensibles à l’électricité statique dans leur emballage jusqu’au moment de l’installation. ● Placez les éléments sur une surface mise à la terre, avant de les retirer de leur emballage. ● Évitez de toucher les broches, les conducteurs et les circuits. ● Veillez à toujours être relié à la terre lorsque vous touchez un élément ou un assemblage sensible à l’électricité statique. Méthodes de mise à la terre Il en existe plusieurs. Prenez au moins l’une des précautions suivantes lorsque vous installez ou manipulez des éléments sensibles à l’électricité statique : ● Utilisez un bracelet électrostatique relié par un cordon de terre au châssis de l’ordinateur ou à une station de travail. Les bracelets électrostatiques sont des bracelets flexibles dont les cordons ont une résistance d’au moins 1 mégohm +/- 10 %. Pour une mise à la terre optimale, veillez à maintenir le bracelet serré contre la peau. ● Utilisez les autres types de bracelets antistatiques disponibles lorsque vous travaillez debout. Portez-les à chaque pied lorsque vous vous trouvez sur des sols ou des tapis conducteurs. ● Utilisez des outils d’entretien conducteurs. ● Utilisez un kit de réparation équipé d’un tapis antistatique. Si vous ne disposez d’aucun des équipements suggérés pour une mise à la terre correcte, contactez votre revendeur ou fournisseur de services agréé HP. REMARQUE : Pour plus d’informations sur l’électricité statique, adressez-vous à votre revendeur ou fournisseur de services agréé HP. 176 Annexe D Décharges électrostatiques FRWW E Utilisation, entretien courant et préparation au transport Utilisation et entretien courant de l’ordinateur Les instructions suivantes doivent être suivies pour installer et entretenir convenablement l’ordinateur et son moniteur : ● Protégez l’ordinateur de l’humidité, des rayons du soleil et des températures extrêmes. ● Faites fonctionner l’ordinateur sur une surface stable et plane. Laissez un espace libre d’au moins 10 cm tout autour des côtés ventilés de l’ordinateur et au-dessus du moniteur afin d’assurer une bonne aération. ● Ne réduisez jamais l’aération en bloquant les orifices d’aération ou les entrées d’air. Ne placez pas le clavier - pieds repliés - directement contre l’avant de l’ordinateur de bureau, car cela gêne également la circulation de l’air. ● Ne faites jamais fonctionner l’ordinateur lorsque le panneau d’accès ou l’un des caches de connecteur de carte d’extension est ouvert. ● N’empilez pas les ordinateurs l’un sur l’autre ou ne les placez pas l’un à côté de l’autre pour éviter de faire recirculer l’air chaud qu’ils évacuent. ● Si l’ordinateur doit être utilisé dans un boîtier séparé, celui-ci doit être pourvu d’orifices d’aération (aspiration et refoulement) ; les autres instructions d’utilisation énoncées ci-dessus restent d’application. ● Ne laissez pas de liquides à proximité de l’ordinateur ou du clavier. ● N’obstruez jamais les grilles d’aération du moniteur (n’y déposez aucun objet). ● Installez ou activez les fonctions d’économie d’énergie du système d’exploitation ou d’un autre logiciel, y compris les états de veille. ● Mettez l’ordinateur hors tension avant d’effectuer l’une des opérations suivantes : ◦ Essuyez l’extérieur de l’ordinateur avec un chiffon doux humide. Les produits d’entretien pourraient ternir ou abímer la finition de l’ordinateur. ◦ Nettoyez de temps à autre toutes les entrées d’air de l’ordinateur. Les poussières, les matières pelucheuses et autres corps étrangers peuvent obstruer les entrées et réduire l’aération. FRWW Utilisation et entretien courant de l’ordinateur 177 Précautions relatives à l’unité optique Assurez-vous de respecter les recommandations suivantes lorsque vous utilisez ou nettoyez l’unité optique. Procédure ● Ne déplacez pas l’unité pendant son fonctionnement car vous risqueriez de provoquer une erreur de lecture. ● N’exposez pas l’unité à des changements subits de température. Il pourrait se former de la condensation à l’intérieur de l’unité. En cas de changement brutal de la température en cours d’utilisation de l’unité, attendez au moins une heure avant de mettre l’équipement hors tension. Si vous l’utilisiez immédiatement, des erreurs de lecture pourraient se produire. ● Évitez de placer l’unité dans un environnement soumis à une forte humidité, à des températures extrêmes, à des vibrations mécaniques ou aux rayons du soleil. Nettoyage ● Nettoyez le panneau et les boutons avec un chiffon doux et sec ou légèrement humecté d’un produit détergent doux. Ne vaporisez jamais de liquides nettoyants directement sur l’unité. ● N’employez pas de dissolvants, comme l’alcool ou l’essence, qui risqueraient d’abímer la surface. Sécurité Si un objet ou un liquide pénètre dans l’unité, débranchez immédiatement l’ordinateur et faites-le contrôler par un fournisseur de services agréé HP. Préparation au transport Pour préparer l’ordinateur en vue de son transport, suivez les recommandations suivantes : 1. Sauvegardez les fichiers du disque dur sur des disques PD, des cartouches de bande, des CD ou des lecteurs flash USB. Assurez-vous que le support de sauvegarde n’est pas exposé à des impulsions électriques ou magnétiques pendant qu’il est stocké ou en transit. REMARQUE : Le disque dur se verrouille automatiquement lorsque le système est mis hors tension. 2. Retirez et stockez tous les supports amovibles. 3. Éteignez l’ordinateur et les périphériques externes. 4. Débranchez le cordon d’alimentation de la prise secteur, puis de l’ordinateur. 5. Débranchez les composants du système et les périphériques externes de leur source d’alimentation, puis de l’ordinateur. REMARQUE : Assurez-vous que toutes les cartes sont correctement fixées et verrouillées dans leurs connecteurs avant d’expédier l’ordinateur. 6. Emballez les composants du système ainsi que les périphériques externes dans leur emballage d’origine ou dans un emballage similaire suffisamment protégé. 178 Annexe E Utilisation, entretien courant et préparation au transport FRWW Index A alimentation Branchement du câble à l'USDT 138 C cache de carte d'extension Retrait du CMT 28 Retrait du MT 71 Retrait du SFF 110 carte d'extension Installation du CMT 27 Installation du MT 70 Installation du SFF 109 Retrait du CMT 27 Retrait du MT 70 Retrait du SFF 109 clavier éléments 12 touche de logo Windows 13 clé FailSafe 173 connexions d'unité de carte mère CMT 22 MT 64 SFF 101 USDT 144 conversion de la tour CMT 49 USDT 100, 143 conversion en ordinateur de bureau CMT 47 couvercle des ports Installation de l'USDT 155 D déverrouillage du panneau d’accès 173 directives d'installation 95 disque dur Installation de l'USDT 152 Installation du CMT 42 Installation du MT 84 Installation du SFF 126 Retrait du CMT 32 Retrait du MT 82 Retrait du SFF 126 Retrait du USDT 152 E électricité statique, prévention 176 éléments de la face arrière CMT 7 MT 8 SFF 9 USDT 10 éléments du panneau avant CMT 3 MT 4 SFF 5 USDT 6 emplacements de l'ID du produit 14 emplacements du numéro de série 14 I installation Câbles des lecteurs du CMT 36 câbles du lecteur du MT 75 Câbles du lecteur SFF 114 carte d'extension CMT 27 carte d'extension MT 70 carte d'extension SFF 109 Couvercle de port USDT 155 Disque dur CMT 42 Disque dur MT 84 Disque dur SFF 126 Disque dur USDT 152 lecteur de cartes multimédia du MT 79 lecteur de cartes multimédia du SFF 122 lecteur de cartes multimédias du CMT 38 Lecteur optique CMT 38 Lecteur optique MT 79 Lecteur optique SFF 118 Lecteur optique USDT 151 Mémoire du CMT 24 Mémoire du MT 67 Mémoire SFF 105 Mémoire USDT 145 pile 165 instructions d’aération 177 instructions pour l’installation 17, 59, 137 L lecteur de cartes multimédia caractéristiques 11 Installation du MT 79 Installation du SFF 122 Retrait du MT 77 Retrait du SFF 121 lecteur de cartes multimédias Installation du CMT 38 Retrait du CMT 32 lecteur optique Fixation du loquet de dégagement de l'USDT 150 Installation de l'USDT 151 Installation du CMT 38 Installation du SFF 118 Installation MT 79 Retrait du CMT 32 Retrait du MT 77 Retrait du SFF 116 Retrait du USDT 149 lecteurs branchements de câbles du MT 75 Branchements des câbles du CMT 36 branchements des câbles du SFF 114 Emplacements sous CMT 31 Emplacements sous MT 74 Emplacements sous SFF 113 Installation du CMT 36 Installation du MT 75 Installation du SFF 114 FRWW Index 179 M mémoire Installation de l'USDT 145 Installation du CMT 24 Installation du MT 67 Installation du SFF 105 Occupation des sockets du MT 68 Occupation du socket de l'USDT 146 Occupation du socket du CMT 25 Occupation du socket du SFF 106 Spécifications du CMT 24 Spécifications du MT 67 Spécifications SFF 105 Spécifications USDT 145 Modules de mémoire DIMM. Voir modules DIMM. Voir mémoire P panneau avant Remise en place du CMT 22 Remplacement du MT 63 Remplacement du SFF 100 Remplacement du USDT 142 Retrait des caches du CMT 21 Retrait des caches du SFF 98 Retrait du cache de l'USDT 141 Retrait du cache du MT 62 Retrait du CMT 20 Retrait du MT 62 Retrait du SFF 98 Retrait du USDT 141 sécurité CMT 57 sécurité MT 92 sécurité SFF 135 sécurité USDT 163 panneau d’accès Remise en place du CMT 19 Remplacement du MT 61 Remplacement du SFF 97 Remplacement du USDT 140 retrait du CMT 18 Retrait du MT 60 Retrait du SFF 96 Retrait du USDT 139 verrouillage et déverrouillage 173 préparation au transport 178 R remplacement de la pile 165 retrait Cache du port d'extension du CMT 28 cache du port d'extension du MT 71 Caches protecteurs de l'USDT 141 caches protecteurs du CMT 21 caches protecteurs du panneau du MT 62 caches protecteurs du SFF 98 carte d'extension CMT 27 carte d'extension MT 70 carte d'extension SFF 109 Couvercle de port USDT 155 Disque dur MT 82 Disque dur SFF 126 Disque dur USDT 152 lecteur de cartes multimédia du MT 77 lecteur de cartes multimédia du SFF 121 lecteur de cartes multimédias du CMT 32 Lecteur optique MT 77 Lecteur optique SFF 116 Lecteur optique USDT 149 lecteurs CMT 32 Obturateur d'extension du SFF 110 Panneau avant de l'USDT 141 panneau avant du CMT 20 panneau avant du MT 62 panneau avant du SFF 98 Panneau d'accès à l'ordinateur CMT 18 panneau d'accès à l'ordinateur compact SFF 96 panneau d'accès à l'ordinateur MT 60 panneau d’accès de l'ordinateur USDT 139 pile 165 verrou Smart Cover 173 S sécurité Cadenas de l'USDT 158 Cadenas du CMT 53 cadenas du MT 88 Cadenas du SFF 131 Panneau avant de l'USDT 163 panneau avant du CMT 57 panneau avant du MT 92 panneau avant du SFF 135 Verrou de câble USDT 157 Verrou de sécurité HP Business PC de l'USDT 158 verrou de sécurité HP Business PC du CMT 53 Verrou de sécurité HP Business PC du MT 89 Verrou de sécurité HP Business PC du SFF 131 verrou pour câbles du CMT 52 verrou pour câble SFF 88, 130 verrou Smart Cover 173 spécifications Mémoire du CMT 24 Mémoire du MT 67 Mémoire SFF 105 Mémoire USDT 145 T touche de logo Windows 13 U unité optique nettoyage 178 précautions 178 utilisation de l’ordinateur 177 V verrou verrou Smart Cover 173 verrous Cadenas de l'USDT 158 180 Index FRWW Cadenas du CMT 53 cadenas du MT 88 Cadenas du SFF 131 Panneau avant de l'USDT 163 panneau avant du CMT 57 panneau avant du MT 92 panneau avant du SFF 135 Verrou de câble USDT 157 Verrou de sécurité HP Business PC de l'USDT 158 verrou de sécurité HP Business PC du CMT 53 Verrou de sécurité HP Business PC du MT 89 Verrou de sécurité HP Business PC du SFF 131 verrou pour câbles du CMT 52 verrou pour câble SFF 88, 130 verrou Smart Cover 173 vis de guidage CMT location (Emplacement SNMP) 37 MT location (Emplacement SNMP) 76 SFF location (Emplacement SNMP) 114 FRWW Index 181 Guide de référence du matériel HP Compaq Business PC Minitour convertible Elite Série 8300 Microtour Elite Série 8300 Unité Elite Série 8300 petit format Unité Elite Série 8300 ultra-plate © Copyright 2012 Hewlett-Packard Development Company, L.P. JFE GIR FJKLDFJIERO GJIOFJEKGJTRI GARFNJBRKJ GR K Microsoft, Windows et Windows Vista sont des marques commerciales ou des marques déposées de Microsoft Corporation aux États-Unis et/ou dans d’autres pays/régions. Les garanties applicables aux produits et services HP sont énoncées dans les textes de garantie accompagnant ces produits et services. Aucune partie du présent document ne saurait être interprétée comme constituant un quelconque supplément de garantie. HP ne peut être tenue responsable des erreurs ou omissions techniques ou de rédaction de ce document. Ce document contient des informations protégées par des droits d’auteur. Aucune partie de ce document ne peut être photocopiée, reproduite ou traduite dans une autre langue sans l’accord écrit préalable de Hewlett-Packard. Guide de référence du matériel HP Compaq Business PC Minitour convertible Elite Série 8300 Microtour Elite Série 8300 Unité Elite Série 8300 petit format Unité Elite Série 8300 ultra-plate Première édition (mars 2012) Référence du document : 686563–051 À propos de ce livre Ce guide fournit des informations de base pour la mise à niveau de PC HP Compaq Business. AVERTISSEMENT ! Le non-respect de ces instructions expose l’utilisateur à des risques potentiellement très graves. ATTENTION : Le non-respect de ces instructions présente des risques, tant pour le matériel que pour les informations qu’il contient. REMARQUE : Le texte ainsi défini fournit des informations importantes supplémentaires. iii iv À propos de ce livre Sommaire 1 Caractéristiques du produit ........................................................................................................................... 1 Caractéristiques de la configuration standard ...................................................................................... 1 Composants du panneau avant de la microtour convertible (CMT) ..................................................... 3 Composants du panneau avant de la microtour (MT) .......................................................................... 4 Composants du panneau avant de l'ordinateur compact (SFF) ........................................................... 5 Composants du panneau avant de l'ordinateur de bureau Ultra-Slim (USDT) .................................... 6 Composants du panneau arrière de la minitour convertible (CMT) ...................................................... 7 Composants du panneau arrière de la microtour (MT) ........................................................................ 8 Composants du panneau arrière de l'ordinateur compact (SFF) ......................................................... 9 Composants du panneau arrière de l'ordinateur de bureau Ultra-Slim (USDT) ................................. 10 Composants du lecteur de cartes multimédia .................................................................................... 11 Clavier ................................................................................................................................................ 12 Utilisation des touches de logo Windows .......................................................................... 13 Emplacement du numéro de série ..................................................................................................... 14 2 Mises à niveau matérielles de la minitour convertible (CMT) ................................................................... 17 Fonctionnalités de maintenance ......................................................................................................... 17 Avertissements et précautions ........................................................................................................... 17 Retrait du panneau d'accès à l'ordinateur .......................................................................................... 18 Remise en place du panneau d'accès de l'ordinateur ........................................................................ 19 Retrait du panneau avant ................................................................................................................... 20 Retrait des caches protecteurs ........................................................................................................... 21 Remise en place du panneau avant ................................................................................................... 22 Connexions de la carte mère ............................................................................................................. 22 Installation de mémoire supplémentaire ............................................................................................. 24 Modules DIMM ................................................................................................................... 24 DDR3-SDRAM DIMM ........................................................................................................ 24 Remplissage des supports DIMM ...................................................................................... 25 Installation de modules DIMM ........................................................................................... 25 Retrait ou installation d'une carte d'extension .................................................................................... 27 Emplacement des unités .................................................................................................................... 31 Retrait d'un lecteur d'une baie de lecteur ........................................................................................... 32 Installation des lecteurs ...................................................................................................................... 36 Installation d'un lecteur 5,25 pouces dans une baie de lecteur ......................................... 38 Installation d’un disque dur dans une baie de lecteur interne ............................................ 42 Transformation de la minitour en ordinateur de bureau ..................................................................... 47 v Transformation de l'ordinateur de bureau en minitour ....................................................................... 49 Installation d’un dispositif antivol ........................................................................................................ 51 Câble antivol ...................................................................................................................... 52 Cadenas ............................................................................................................................ 53 Verrou de sécurité HP Business PC .................................................................................. 53 Sécurité du panneau avant ................................................................................................ 57 3 Mises à niveau matérielles de la microtour (MT) ....................................................................................... 59 Fonctionnalités de maintenance ......................................................................................................... 59 Avertissements et précautions ........................................................................................................... 59 Retrait du panneau d'accès à l'ordinateur .......................................................................................... 60 Remise en place du panneau d'accès à l'ordinateur .......................................................................... 61 Retrait du panneau avant ................................................................................................................... 62 Retrait des caches protecteurs ........................................................................................................... 62 Remise en place du panneau avant ................................................................................................... 63 Connexions de la carte mère ............................................................................................................. 64 Installation de mémoire supplémentaire ............................................................................................. 66 DIMM ................................................................................................................................. 66 DDR3-SDRAM DIMM ........................................................................................................ 66 Remplissage des supports DIMM ...................................................................................... 67 Installation des modules DIMM .......................................................................................... 67 Retrait ou installation d'une carte d'extension .................................................................................... 69 Emplacement des unités .................................................................................................................... 73 Installation et retrait de lecteurs ......................................................................................................... 74 Retirer un lecteur 5,25 pouces ou 3,5 pouces dans une baie de lecteur ........................... 76 Installation d'un lecteur 5,25 pouces ou 3,5 pouces dans une baie de lecteur ................. 78 Retrait d'un disque dur d'une baie de lecteur .................................................................... 81 Installation d’un disque dur dans une baie de lecteur interne ............................................ 83 Installation d'un dispositif antivol ........................................................................................................ 86 Câble antivol ...................................................................................................................... 87 Cadenas ............................................................................................................................ 87 Verrou de sécurité HP Business PC .................................................................................. 88 Sécurité du panneau avant ................................................................................................ 91 4 Mise à niveau du matériel de l'ordinateur compact (SFF) ........................................................................ 94 Fonctionnalités de maintenance ......................................................................................................... 94 Avertissements et précautions ........................................................................................................... 94 Retrait du panneau d'accès à l'ordinateur .......................................................................................... 95 Remise en place du panneau d'accès à l'ordinateur .......................................................................... 96 Retrait du panneau avant ................................................................................................................... 97 Retrait des caches protecteurs ........................................................................................................... 97 vi Remise en place du panneau avant ................................................................................................... 99 Conversion de la configuration bureau en minitour ............................................................................ 99 Connexions de la carte mère ........................................................................................................... 100 Installation de mémoire supplémentaire ........................................................................................... 102 DIMM ............................................................................................................................... 102 DDR3-SDRAM DIMM ...................................................................................................... 102 Remplissage des supports DIMM .................................................................................... 103 Installation des modules DIMM ........................................................................................ 103 Retrait ou installation d'une carte d'extension .................................................................................. 106 Emplacement des unités .................................................................................................................. 110 Installation et retrait de lecteurs ....................................................................................................... 111 Retrait d'un lecteur 5,25 pouces d'une baie de lecteur .................................................... 113 Installation d'un lecteur 5,25 pouces dans une baie de lecteur ....................................... 115 Retrait d'un lecteur 3.5 pouces d'une baie de lecteur ...................................................... 118 Installation d'un lecteur 3.5 pouces dans une baie de lecteur ......................................... 119 Retrait et remplacement du disque dur interne 3,5 pouces principal ............................... 123 Installation d’un dispositif antivol ...................................................................................................... 127 Câble antivol .................................................................................................................... 127 Cadenas .......................................................................................................................... 128 Verrou de sécurité HP Business PC ................................................................................ 128 Sécurité du panneau avant .............................................................................................. 132 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) ............................................. 134 Fonctionnalités de maintenance ....................................................................................................... 134 Avertissements et précautions ......................................................................................................... 134 Branchement du cordon d'alimentation ............................................................................................ 135 Retrait du panneau d'accès à l'ordinateur ........................................................................................ 136 Remise en place du panneau d'accès à l'ordinateur ........................................................................ 137 Retrait du panneau avant ................................................................................................................. 138 Retrait d'un cache protecteur ........................................................................................................... 138 Remise en place du panneau avant ................................................................................................. 139 Conversion de la configuration bureau en minitour .......................................................................... 140 Connexions de la carte mère ........................................................................................................... 141 Installation de mémoire supplémentaire ........................................................................................... 142 modules SODIMM ........................................................................................................... 142 Modules SODIMM DDR3-SDRAM .................................................................................. 142 Remplissage des supports SODIMM ............................................................................... 143 Installation des barrettes SODIMM .................................................................................. 144 Remplacement de l’unité optique ..................................................................................................... 146 Extraction d’une unité optique ......................................................................................... 146 Préparation d’un nouveau lecteur optique ....................................................................... 147 vii Installation d’un nouveau lecteur optique ........................................................................ 148 Remise en position du disque dur .................................................................................................... 149 Installation et retrait d'un couvercle de port ...................................................................................... 152 Installation d’un dispositif antivol ...................................................................................................... 154 Câble antivol .................................................................................................................... 154 Cadenas .......................................................................................................................... 155 Verrou de sécurité HP Business PC ................................................................................ 155 Sécurité du panneau avant .............................................................................................. 160 Annexe A Remplacement de la pile ............................................................................................................. 162 Annexe B Retrait et remplacement d'un disque dur SATA amovible 3,5 pouces ................................... 165 Annexe C Désactivation du verrou Smart Cover ........................................................................................ 170 Clé Smart Cover FailSafe ................................................................................................................. 170 Utilisation de la clé Smart Cover FailSafe pour retrait du verrou Smart Cover ................................ 170 Annexe D Décharges électrostatiques ........................................................................................................ 173 Prévention des décharges électrostatiques ..................................................................................... 173 Méthodes de mise à la terre ............................................................................................................. 173 Annexe E Utilisation, entretien courant et préparation au transport ........................................................ 174 Utilisation et entretien courant de l’ordinateur .................................................................................. 174 Précautions relatives à l’unité optique .............................................................................................. 175 Procédure ........................................................................................................................ 175 Nettoyage ........................................................................................................................ 175 Sécurité ............................................................................................................................ 175 Préparation au transport ................................................................................................................... 175 Index ................................................................................................................................................................. 176 viii 1 Caractéristiques du produit Caractéristiques de la configuration standard Ses caractéristiques peuvent varier en fonction du modèle. Pour obtenir une liste complète du matériel et des logiciels installés sur l'ordinateur, exécutez l'utilitaire de diagnostic (uniquement fourni sur certains modèles d'ordinateurs). Figure 1-1 Configuration minitour convertible REMARQUE : La minitour convertible HP Compaq peut facilement être convertie en un ordinateur de bureau. Reportez-vous à la section Transformation de la minitour en ordinateur de bureau à la page 47 de ce manuel pour plus de détails. Figure 1-2 Configuration microtour Caractéristiques de la configuration standard 1 Figure 1-3 Configuration compact REMARQUE : L’ordinateur compact peut aussi être utilisé dans une orientation tour. Reportez-vous à la section Conversion de la configuration bureau en minitour à la page 99 de ce manuel pour plus de détails. Figure 1-4 Configuration d'ordinateur de bureau Ultra-Slim 2 Chapitre 1 Caractéristiques du produit Composants du panneau avant de la microtour convertible (CMT) La configuration des unités peut être différente selon le modèle. Certains modèles sont munis d’un cache protecteur qui recouvre un ou plusieurs compartiments d’unité. Figure 1-5 Éléments du panneau avant Tableau 1-1 Éléments du panneau avant 1 Unités optiques 5,25 pouces 5 Connecteur pour microphone/casque 2 Lecteur de cartes multimédia de 5,25 pouces (en option) 6 Voyant d’alimentation 3 Bouton d’alimentation double état 7 Connecteur de casque 4 Voyant d’activité du disque dur 8 Ports USB (Universal Serial Bus) REMARQUE : Lorsqu-un périphérique sera branché sur le connecteur Microphone/Casque, une boîte de dialogue apparaîtra et vous demandera si vous souhaitez utilisez le connecteur pour un périphérique d'entrée de ligne microphone ou un casque. Vous pouvez reconfigurer le connecteur à tout moment en double-cliquant sur l'icône Realtek HD Audio Manager de la barre des tâches Windows. REMARQUE : Le voyant d’alimentation est normalement vert lorsque l'ordinateur est sous tension. S’il clignote en rouge, un problème est survenu au niveau de l’ordinateur et un code de diagnostic est affiché. Reportez-vous au Guide de maintenance et d'entretien pour pouvoir interpréter le code. Composants du panneau avant de la microtour convertible (CMT) 3 Composants du panneau avant de la microtour (MT) La configuration des unités peut être différente selon le modèle. Certains modèles sont munis d’un cache protecteur qui recouvre un ou plusieurs compartiments d’unité. Tableau 1-2 Éléments du panneau avant 1 Unités optiques 5,25 pouces 5 Lecteur de cartes multimédias de 3,5 pouces (en option) 2 Voyant d'activité du disque dur 6 Bouton d'alimentation double état 3 Connecteur pour microphone/casque 7 Voyant d'alimentation 4 Ports USB (Universal Serial Bus) 2.0 8 Connecteur de casque REMARQUE : Lorsqu-un périphérique sera branché sur le connecteur Microphone/Casque, une boîte de dialogue apparaîtra et vous demandera si vous souhaitez utilisez le connecteur pour un périphérique d'entrée de ligne microphone ou un casque. Vous pouvez reconfigurer le connecteur à tout moment en double-cliquant sur l'icône Realtek HD Audio Manager de la barre des tâches Windows. REMARQUE : Le voyant d’alimentation est normalement vert lorsque l'ordinateur est sous tension. S’il clignote en rouge, un problème est survenu au niveau de l’ordinateur et un code de diagnostic est affiché. Reportez-vous au Guide de maintenance et d'entretien pour pouvoir interpréter le code. 4 Chapitre 1 Caractéristiques du produit Composants du panneau avant de l'ordinateur compact (SFF) La configuration des unités peut être différente selon le modèle. Certains modèles sont munis d’un cache protecteur qui recouvre un ou plusieurs compartiments d’unité. Figure 1-6 Éléments du panneau avant Tableau 1-3 Éléments du panneau avant 1 Unité optique 5,25 pouces 5 Connecteur pour microphone/casque 2 Bouton d’alimentation double état 6 Lecteur de cartes multimédia de 3,5 pouces (en option) 3 Voyant d’alimentation 7 Voyant d’activité du disque dur 4 Ports USB (Universal Serial Bus) 8 Connecteur de casque REMARQUE : Lorsqu-un périphérique sera branché sur le connecteur Microphone/Casque, une boîte de dialogue apparaîtra et vous demandera si vous souhaitez utilisez le connecteur pour un périphérique d'entrée de ligne microphone ou un casque. Vous pouvez reconfigurer le connecteur à tout moment en double-cliquant sur l'icône Realtek HD Audio Manager de la barre des tâches Windows. REMARQUE : Le voyant d’alimentation est normalement vert lorsque l'ordinateur est sous tension. S’il clignote en rouge, un problème est survenu au niveau de l’ordinateur et un code de diagnostic est affiché. Reportez-vous au Guide de maintenance et d'entretien pour pouvoir interpréter le code. Composants du panneau avant de l'ordinateur compact (SFF) 5 Composants du panneau avant de l'ordinateur de bureau Ultra-Slim (USDT) La configuration des unités peut être différente selon le modèle. Certains modèles sont munis d'un cache protecteur pour la baie de lecteur optique. Figure 1-7 Éléments du panneau avant Tableau 1-4 Éléments du panneau avant 1 Lecteur optique 5 Connecteur pour microphone/casque 2 Voyant d’alimentation 6 Ports USB (Universal Serial Bus) 3 Lecteur de cartes multimédia SD (en option) 7 Voyant d’activité du disque dur 4 Connecteur de casque 8 Interrupteur d'alimentation double état REMARQUE : Lorsqu-un périphérique sera branché sur le connecteur Microphone/Casque, une boîte de dialogue apparaîtra et vous demandera si vous souhaitez utilisez le connecteur pour un périphérique d'entrée de ligne microphone ou un casque. Vous pouvez reconfigurer le connecteur à tout moment en double-cliquant sur l'icône Realtek HD Audio Manager de la barre des tâches Windows. REMARQUE : Le voyant d’alimentation est normalement vert lorsque l'ordinateur est sous tension. S’il clignote en rouge, un problème est survenu au niveau de l’ordinateur et un code de diagnostic est affiché. Reportez-vous au Guide de maintenance et d'entretien pour pouvoir interpréter le code. 6 Chapitre 1 Caractéristiques du produit Composants du panneau arrière de la minitour convertible (CMT) Figure 1-8 Éléments situés à l’arrière Tableau 1-5 Identification des éléments situés à l’arrière 1 Connecteur du cordon d’alimentation 7 Connecteur audio de sortie de ligne pour périphériques audio alimentés (vert) 2 Connecteur pour clavier PS/2 (violet) 8 Connecteur audio d'entrée de ligne (bleu) 3 Connecteur de moniteur VGA 9 Connecteur pour souris PS/2 (vert) 4 Connecteur de moniteur DisplayPort 10 Connecteur série 5 Ports USB 2.0 11 Connecteur réseau RJ-45 6 Ports USB 3.0 REMARQUE : Un deuxième port série et un port parallèle sont disponibles en option auprès de HP. Lorsqu’un périphérique est branché au connecteur d’entrée audio bleu, une boîte de dialogue s’ouvre, vous demandant si vous souhaitez utiliser le connecteur pour un périphérique d’entrée ou pour un microphone. Vous pouvez reconfigurer le connecteur à tout moment en double-cliquant sur l’icône Realtek HD Audio Manager de la barre des tâches Windows. Les connecteurs de moniteur sur la carte mère sont inactifs si une carte graphique est installée sur l’ordinateur. Si une carte graphique est installée sur l'un des ports de la carte mère, les connecteurs de la carte graphique et les connecteurs de la carte mère peuvent être utilisés simultanément. Il se peut que certains paramètres doivent être modifiés dans Computer Setup (Configuration de l'ordinateur) pour utiliser les deux connecteurs. Composants du panneau arrière de la minitour convertible (CMT) 7 Composants du panneau arrière de la microtour (MT) Figure 1-9 Composants du panneau arrière Tableau 1-6 Identification des éléments situés à l’arrière 1 Connecteur du cordon d’alimentation 6 Connecteur audio de sortie de ligne pour périphériques audio alimentés (vert) 2 Connecteur audio d'entrée de ligne (bleu) 7 Connecteur pour clavier PS/2 (violet) 3 Connecteur pour souris PS/2 (vert) 8 Connecteur de moniteur VGA 4 Connecteur série 9 Connecteur de moniteur DisplayPort 5 Connecteur réseau RJ-45 10 Ports USB 3.0 11 Ports USB 2.0 REMARQUE : Un deuxième port série et un port parallèle sont disponibles en option auprès de HP. Lorsqu'un périphérique sera branché au connecteur audio d'entrée de ligne bleu, une boîte de dialogue apparaîtra et vous demandera si vous souhaitez utiliser le connecteur pour un périphérique d'entrée de ligne ou un microphone. Vous pouvez reconfigurer le connecteur à tout moment en double-cliquant sur l'icône Realtek HD Audio Manager de la barre des tâches Windows. Les connecteurs de moniteur sur la carte mère sont inactifs si une carte graphique est installée sur l'ordinateur. Si une carte graphique est installée sur l'un des ports de la carte mère, les connecteurs de la carte graphique et les connecteurs de la carte mère peuvent être utilisés simultanément. Il se peut que certains paramètres doivent être modifiés dans Computer Setup (Configuration de l'ordinateur) pour utiliser les deux connecteurs. 8 Chapitre 1 Caractéristiques du produit Composants du panneau arrière de l'ordinateur compact (SFF) Figure 1-10 Éléments situés à l’arrière Tableau 1-7 Identification des éléments situés à l’arrière 1 Connecteur réseau RJ-45 7 Connecteur de moniteur DisplayPort 2 Connecteur série 8 Connecteur de moniteur VGA 3 Connecteur pour souris PS/2 (vert) 9 Connecteur pour clavier PS/2 (violet) 4 Connexion du cordon d’alimentation 10 Connecteur audio de sortie de ligne pour périphériques audio alimentés (vert) 5 Ports USB 2.0 11 Connecteur audio d'entrée de ligne (bleu) 6 Ports USB 3.0 REMARQUE : Un deuxième port série et un port parallèle sont disponibles en option auprès de HP. Lorsqu'un périphérique sera branché au connecteur audio d'entrée de ligne bleu, une boîte de dialogue apparaîtra et vous demandera si vous souhaitez utiliser le connecteur pour un périphérique d'entrée de ligne ou un microphone. Vous pouvez reconfigurer le connecteur à tout moment en double-cliquant sur l'icône Realtek HD Audio Manager de la barre des tâches Windows. Les connecteurs de moniteur sur la carte mère sont inactifs si une carte graphique est installée sur l'ordinateur. Si une carte graphique est installée sur l'un des ports de la carte mère, les connecteurs de la carte graphique et les connecteurs de la carte mère peuvent être utilisés simultanément. Il se peut que certains paramètres doivent être modifiés dans Computer Setup (Configuration de l'ordinateur) pour utiliser les deux connecteurs. Composants du panneau arrière de l'ordinateur compact (SFF) 9 Composants du panneau arrière de l'ordinateur de bureau Ultra-Slim (USDT) Figure 1-11 Éléments situés à l’arrière Tableau 1-8 Composants du panneau arrière 1 Connecteur audio de sortie de ligne pour périphériques audio alimentés (vert) 6 Connecteur de moniteur VGA 2 Connecteurs pour moniteur DisplayPort 7 Connexion du cordon d’alimentation 3 Ports USB 3.0 8 Connecteur audio d'entrée de ligne (bleu) 4 Ports USB 2.0 9 Connecteur réseau RJ-45 5 Connecteur pour clavier PS/2 (violet) 10 Connecteur pour souris PS/2 (vert) REMARQUE : Si une carte graphique MXM est installée, les trois ports du moniteur sont tous activés. Les cartes graphiques intégrées utilisent le port DisplayPort2 (port supérieur). Les pilotes MXM/ATI utilisent le port DisplayPort1 (port inférieur) et le port VGA. Si les cartes graphiques intégrées sont désactivées dans les paramètres du BIOS, le port DisplayPort2 (port supérieur) n'est pas activé. Si une carte graphique MXM n'est pas installée, les trois ports du moniteur sont tous commandés par les cartes graphiques intégrées. Sur certains modèles, les trois ports du moniteur sont tous activés, mais avec certaines limitations. Par exemple, si un adaptateur DisplayPort vers DVI ou HDMI est installé, le port VGA n'est pas activé. Sur d'autres modèles, un seul port DisplayPort peut être activé à la fois. Les deux ports DisplayPort fonctionnent, mais un seul peut être utilisé. Lorsqu'un périphérique sera branché au connecteur audio d'entrée de ligne bleu, une boîte de dialogue apparaîtra et vous demandera si vous souhaitez utiliser le connecteur pour un périphérique d'entrée de ligne ou un microphone. Vous pouvez reconfigurer le connecteur à tout moment en double-cliquant sur l'icône Realtek HD Audio Manager de la barre des tâches Windows. 10 Chapitre 1 Caractéristiques du produit Composants du lecteur de cartes multimédia Le lecteur de cartes multimédia est un périphérique en option disponible sur certains modèles uniquement. Reportez-vous à l’illustration et au tableau suivants pour identifier les composants du lecteur de cartes multimédia. Figure 1-12 Composants du lecteur de cartes multimédia Tableau 1-9 Composants du lecteur de cartes multimédia N° Connecteur Support 1 xD ● xD-Picture Card (xD) 2 MicroSD ● MicroSD (T-Flash) ● MicroSDHC 3 Voyant d’activité du lecteur de cartes multimédia 4 SD/MMC+/miniSD ● Secure Digital (SD) ● SDHC (Secure Digital High Capacity) ● MiniSD ● MiniSDHC ● MultiMediaCard (MMC) ● Carte MultiMediaCard de taille réduite (RS MMC) ● MultiMediaCard 4.0 (MMC Plus) ● Carte MultiMediaCard 4.0 de taille réduite (RS MMC) ● MMC Micro (adaptateur requis) 5 USB ● Port USB (Universal Serial Bus) 6 CompactFlash I/II ● Carte CompactFlash Type 1 ● Carte CompactFlash Type 2 ● MicroDrive 7 MS PRO/MS PRO DUO ● Memory Stick (MS) ● MagicGate Memory Stick (MG) ● MagicGate Memory Duo ● Memory Stick Select ● Memory Stick Duo (MS Duo) ● Memory Stick PRO (MS PRO) ● Memory Stick PRO Duo (MS PRO Duo) ● Memory Stick PROHG Duo ● Memory Stick Micro (M2) (adaptateur requis) Composants du lecteur de cartes multimédia 11 Clavier Figure 1-13 Éléments du clavier Tableau 1-10 Éléments du clavier 1 Touches de fonction Ces touches permettent d’effectuer des fonctions spéciales, selon l’application utilisée. 2 Touches d’édition Exemples : Inser, Origine, Page précédente, Suppr, Fin et Page suivante. 3 Voyants d’état Indiquent l’état des paramètres de l’ordinateur et du clavier (Verr num, Verr maj et Arrêt défil). 4 Touches numériques Ces touches offrent la même fonction que le clavier numérique d’une calculatrice. 5 Touches de direction Ces touches sont utilisées pour parcourir un document ou un site Web. Elles permettent de se déplacer vers la gauche, la droite, le haut ou le bas à l’aide du clavier plutôt que d’utiliser la souris. 6 Touche Ctrl Utilisée en combinaison avec une autre touche ; les effets varient en fonction des applications. 7 Touche Application1 Utilisée (comme le bouton droit de la souris) pour ouvrir les menus contextuels dans une application Microsoft Office. D’autres fonctions peuvent lui être associées dans d’autres applications. 8 Touches logo Windows1 Ces touches permettent d’ouvrir le menu Démarrer de Microsoft Windows. Utilisées avec d’autres touches pour exécuter d’autres fonctions. 9 Touche Alt Utilisée en combinaison avec une autre touche ; les effets varient en fonction des applications. 1 Touches disponibles dans certaines régions géographiques. 12 Chapitre 1 Caractéristiques du produit Utilisation des touches de logo Windows La combinaison de la touche logo Windows avec d’autres touches permet d’accomplir certaines fonctions dans le système d’exploitation Windows. Pour identifier la touche logo Windows, reportezvous à la section Clavier à la page 12. Tableau 1-11 Fonctions de la touche logo Windows Les fonctions suivantes de la touche logo Windows sont disponibles dans Microsoft Windows XP, Microsoft Windows Vista et Microsoft Windows 7. Touche logo Windows Permet d’afficher ou de dissimuler le menu Démarrer Touche logo Windows + d Permet d’afficher le Bureau Touche logo Windows + m Réduit toutes les applications ouvertes Maj + Touche logo Windows + m Annule la réduction de toutes les applications Touche logo Windows + e Permet d’exécuter le Poste de travail Touche logo Windows + f Lance Rechercher : tous Touche logo Windows + Ctrl + f Lance la boíte de dialogue Rechercher : ordinateur Touche logo Windows + F1 Permet d’exécuter l’Aide de Windows Touche logo Windows + l Permet de verrouiller l’ordinateur si vous êtes connecté à un domaine de réseau ou, dans le cas contraire, permet de passer d’un utilisateur à l’autre Touche logo Windows + r Exécute la boíte de dialogue Exécuter Touche logo Windows + u Exécute Utility Manager Touche logo Windows + Tab Windows XP : permet de naviguer entre les boutons de la barre des tâches Windows Vista et Windows 7 : permet de naviguer entre les programmes de la barre des tâches à l’aide de Windows Flip 3- D En plus des fonctions de la touche logo Windows décrites ci-dessus, les fonctions suivantes sont également disponibles dans Microsoft Windows Vista et Windows 7. Ctrl + Touche logo Windows + Tab Utilisez les touches de direction pour naviguer entre les programmes de la barre des tâches à l’aide de Windows Flip 3-D Touche logo Windows + Barre espace Place tous les gadgets à l’avant et sélectionne la barre latérale Windows Touche logo Windows + g Permet de naviguer entre les gadgets de la barre latérale Touche logo Windows + t Permet de naviguer entre les programmes de la barre des tâches Touche logo Windows + u Permet d’exécuter les options d’ergonomie Touche logo Windows + n’importe quelle touche Permet d’exécuter le raccourci de lancement rapide correspondant au numéro (par exemple, la touche logo Windows + 1 lance le premier raccourci du menu de lancement rapide) En plus des fonctions de la touche logo Windows décrites ci-dessus, les fonctions suivantes sont également disponibles dans Microsoft Windows 7. Clavier 13 Tableau 1-11 Fonctions de la touche logo Windows (suite) Touche logo Windows + Ctrl + b Bascule vers le programme ayant affiché un message dans la zone de notification Touche logo Windows + p Choisissez un mode d’affichage de la présentation Touche logo Windows + flèche haut Agrandit la fenêtre Touche logo Windows + flèche gauche Positionne la fenêtre à gauche de l’écran Touche logo Windows + flèche droite Positionne la fenêtre à droite de l’écran Touche logo Windows + flèche bas Réduit la fenêtre Touche logo Windows + Maj + flèche haut Étire la fenêtre vers le haut et vers le bas de l’écran Touche logo Windows + Maj + flèche gauche ou flèche droite Déplace une fenêtre d’un moniteur à un autre Touche logo Windows + + (sur le pavé numérique) Effectue un zoom avant Touche logo Windows + - (sur le pavé numérique) Effectue un zoom arrière Emplacement du numéro de série Chaque ordinateur possède un numéro de série unique et un ID de produit situés sur son capot supérieur. Ayez toujours ces numéros à portée de main lorsque vous contactez le service clientèle. Figure 1-14 Emplacement du numéro de série et de l'ID de produit de la minitour convertible 14 Chapitre 1 Caractéristiques du produit Figure 1-15 Emplacement du numéro de série et de l’ID de produit de la microtour Figure 1-16 Emplacement du numéro de série et de l'ID de produit de l'ordinateur compact Emplacement du numéro de série 15 Figure 1-17 Emplacement du numéro de série et de l'ID de produit de l'ordinateur de bureau UltraSlim (USDT) 16 Chapitre 1 Caractéristiques du produit 2 Mises à niveau matérielles de la minitour convertible (CMT) Fonctionnalités de maintenance L’ordinateur possède des fonctions facilitant sa mise à niveau et son entretien. La plupart des procédures d’installation décrites dans ce chapitre ne nécessitent aucun outil. Avertissements et précautions Avant toute mise à niveau, suivez scrupuleusement toutes les instructions s’y rapportant et n’oubliez pas de lire les notes d’avertissement et d’attention de ce manuel. AVERTISSEMENT ! Afin de réduire les risques de blessures provenant de choc électrique, de surface à haute température ou d’incendie : Déconnectez le cordon d’alimentation de la prise murale et laissez refroidir les éléments internes du système avant de les toucher. Ne branchez pas de connecteurs de téléphone ou de télécommunication sur les prises de carte réseau. Utilisez toujours la fiche de terre du cordon d’alimentation. La fiche de terre est un élément de sécurité important. Branchez le cordon d’alimentation sur une prise secteur avec conducteur de terre, accessible facilement. Pour éviter tout risque de blessure grave, lisez le manuel Sécurité et ergonomie du poste de travail. Ce manuel explique comment agencer correctement un poste de travail et comment s’installer confortablement devant un ordinateur. Il contient également d’importantes informations sur la sécurité électrique et mécanique. Ce manuel est disponible sur le Web à l’adresse http://www.hp.com/ergo. AVERTISSEMENT ! Cet équipement contient des pièces sous tension et mobiles. Débranchez-le avant d’ôter son boîtier. Remettez en place ce boîtier et assurez-vous qu’il est bien fixé avant de remettre l’équipement sous tension. ATTENTION : L’électricité statique peut endommager les composants électriques de l’ordinateur ou de l’équipement en option. Il est conseillé de toucher un objet métallique relié à la terre avant de commencer l'installation. Consultez Décharges électrostatiques à la page 173 pour plus d'informations. Quand l’ordinateur est branché sur le secteur, la carte mère est sous tension. Vous devez déconnecter le cordon d’alimentation avant d’ouvrir l’ordinateur pour prévenir toute détérioration des composants internes. Fonctionnalités de maintenance 17 Retrait du panneau d'accès à l'ordinateur Pour accéder aux composants internes, vous devez enlever le panneau d’accès : 1. Retirez/dégagez tout périphérique de sécurité qui gêne l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Mettez l'ordinateur hors tension sans risque via le système d'exploitation, puis mettez les périphériques externes hors tension. 4. Débranchez le cordon d'alimentation de la prise électrique, puis débranchez tout périphérique externe. ATTENTION : Quel que soit l'état de mise sous tension, une tension est toujours présente sur la carte mère tant que le système est branché sur une prise secteur active. Vous devez débrancher le cordon d'alimentation pour éviter d'endommager les composants internes de l'ordinateur. 5. Soulevez la poignée du panneau d’accès (1) puis soulevez le panneau d’accès de l’ordinateur (2). Figure 2-1 Retrait du panneau d'accès à l'ordinateur 18 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) Remise en place du panneau d'accès de l'ordinateur Faites glisser l’onglet situé à l’avant du panneau d’accès sous l’onglet situé à l’avant du châssis (1), puis appuyez l’arrière du panneau d’accès dans l’appareil jusqu’à ce qu’il s’emboîte (2). Figure 2-2 Remise en position du panneau d’accès de l’ordinateur Remise en place du panneau d'accès de l'ordinateur 19 Retrait du panneau avant 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Retirez le panneau d’accès de l’ordinateur. 6. Soulevez les trois onglets sur le côté du cache avant (1), puis faites pivoter le cache avant pour le retirer du châssis (2). Figure 2-3 Retrait du cache avant 20 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) Retrait des caches protecteurs Sur certains modèles, des caches protecteurs pour baies de lecteur 5,25 pouces doivent être retirés avant d'installer un lecteur. Pour retirer un cache protecteur : 1. Retirez le panneau d'accès et le panneau avant. 2. Retirez doucement le sous-panneau du cache avant, caches protecteurs fixés, puis retirez le cache protecteur voulu. ATTENTION : Maintenez le sous-panneau droit lorsque vous le retirez du cache avant. L’inclinaison du sous-panneau pendant son retrait pourrait endommager les broches permettant de l’aligner sur le cache avant. Figure 2-4 Retrait des caches protecteurs du sous-panneau (sur l’ordinateur de bureau) REMARQUE : Lorsque vous remettez le sous-panneau en place, assurez-vous que les broches d’alignement et les caches protecteurs restants sont orientés correctement. Le panneau secondaire est correctement orienté lorsque son logo se trouve en bas. Retrait des caches protecteurs 21 Remise en place du panneau avant Insérez les trois crochets en bas du cache avant dans les trous rectangulaires du châssis (1), puis faites pivoter le haut du cache avant dans le châssis (2) jusqu’à ce qu’il s’emboîte. Figure 2-5 Remise en position du cache avant Connexions de la carte mère Reportez-vous à l'illustration et au tableau suivants pour identifier les connecteurs de la carte mère. Figure 2-6 Connexions de la carte mère 22 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) Tableau 2-1 Connexions de la carte mère N Connecteur de la carte mère Étiquette de carte mère Couleur Composant 1 PCI PCI3 blanc Carte d'extension 2 PCI PCI2 blanc Carte d'extension 3 PCI PCI1 blanc Carte d'extension 4 Verrou de la protection HLCK noir Verrou de la protection 5 Port parallèle PAR noir Port parallèle 6 PCI Express x16 rétrogradé en x4 X4PCIEXP blanc Carte d'extension 7 PCI Express x16 X16PCIEXP noir Carte d'extension 8 PCI Express x1 X1PCIEXP1 noir Carte d'extension 9 Détecteur d'ouverture du capot HSENSE blanc Détecteur d'ouverture du capot 10 DIMM4 (canal A) DIMM4 blanc Module de mémoire 11 DIMM3 (canal A) DIMM3 noir Module de mémoire 12 DIMM2 (canal B) DIMM2 blanc Module de mémoire 13 DIMM1 (canal B) DIMM1 noir Module de mémoire 14 Alimentation SATA PWR1 noir Lecteurs optiques SATA 15 Alimentation SATA PWR0 noir Disques durs SATA 16 USB MEDIA noir Périphérique USB tel qu'un lecteur de cartes multimédias 17 USB MEDIA2 noir Périphérique USB tel qu'un lecteur de cartes multimédias 18 SATA 2.0 SATA2 blanc 3ème disque dur ou 1er lecteur optique s'il n'y a pas de 3ème disque dur 19 SATA 3.0 SATA0 bleu foncé 1er disque dur 20 SATA 3.0 SATA1 bleu clair 2ème disque dur 21 SATA 2.0 SATA3 blanc 2ème lecteur optique ou 1er lecteur optique si un 3ème disque dur est installé 22 eSATA ESATA noir Câble adaptateur eSATA ou 2ème lecteur optique si un 3ème disque dur est installé 23 Port série COMB noir Port série Connexions de la carte mère 23 Installation de mémoire supplémentaire L’ordinateur est fourni avec des modules mémoire DDR3-SDRAM DIMM. Modules DIMM Les supports mémoire de la carte mère peuvent recevoir un maximum de quatre modules DIMM standard. À la livraison, ces connecteurs pour module mémoire accueillent au moins un module mémoire préinstallé. Pour exploiter entièrement la prise en charge de mémoire, vous pouvez équiper la carte mère d’un maximum de 16 Go de mémoire dans une configuration hautes performances à deux canaux. DDR3-SDRAM DIMM ATTENTION : Ce produit NE prend PAS en charge la mémoire DDR3 Ultra Low Voltage (tension ultra faible) (DDR3U). Le processeur n'est pas compatible avec la mémoire DDR3U et si vous branchez de la mémoire DDR3U sur la carte mère, cela peut endommager physiquement le module DIMM ou provoquer un dysfonctionnement du système. Pour que le système fonctionne correctement, les modules mémoire DDR3-SDRAM DIMM doivent être : ● standard à 240 broches ● sans tampon, non-ECC PC3-12800 DDR3-1600 MHz ● 1,5 volt DDR3-SDRAM DIMM Les modules mémoire DDR3-SDRAM DIMM doivent également : ● prendre en charge une latence CAS 11 DDR3 1600 MHz (synchronisation 11-11-11) ● contenir les informations obligatoires du JEDEC SPD De plus l’ordinateur doit prendre en charge : ● les technologies de mémoire non-ECC à 512 Mbits, 1 Gbit et 2 Gbits ● les modules DIMM à une face ou deux faces ● les modules DIMM construits avec des puces x8 et x16 DDR ; les puces x4 SDRAM ne sont pas prises en charge REMARQUE : Le système ne fonctionnera pas correctement si vous installez des modules DIMM non pris en charge. 24 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) Remplissage des supports DIMM La carte mère est équipée de quatre supports DIMM, deux par canal. Ceux-ci sont identifiés DIMM1, DIMM2, DIMM3 et DIMM4. Les sockets DIMM1 et DIMM2 fonctionnent sur le canal mémoire B. Les sockets DIMM3 et DIMM4 fonctionnent sur le canal mémoire A. Le système fonctionnera automatiquement en mode à un canal, à deux canaux ou flexible, en fonction de la position des modules DIMM. ● Le système fonctionne dans le mode à un canal si les modules DIMM sont installés dans les supports d’un même canal. ● Le système fonctionne en mode performant entrelacé à deux canaux si la capacité totale des modules DIMM du canal A est égale à celle des modules du canal B. Cependant, la technologie et la capacité des modules peuvent être différentes entre les deux canaux. Par exemple, si le canal A comporte deux modules DIMM de 1 Go et le canal B un module de 2 Go, le système fonctionnera en mode double canal. ● Le système fonctionne en mode flexible entrelacé si la capacité totale des modules DIMM du canal A n’est pas égale à celle des modules du canal B. En mode flexible, le canal doté de la quantité la plus faible de mémoire décrit la capacité totale de mémoire attribuée aux deux canaux et le reste est alloué à un canal unique. Pour obtenir une vitesse optimale, les canaux doivent être équilibrés afin que la quantité la plus élevée de mémoire soit répartie entre les deux canaux. Si un canal doit disposer de plus de mémoire que l’autre, la plus grande quantité doit être attribuée au canal A. Par exemple, si vous remplissez les supports avec un module DIMM de 2 Go et trois modules DIMM de 1 Go, le canal A devra être rempli avec le module DIMM de 2 Go et un module DIMM de 1 Go, tandis que le canal B devra être rempli avec les deux autres modules DIMM de 1 Go. Dans cette configuration, 4 Go sont exécutés en tant que double canal et 1 Go en tant que canal unique. ● Dans chaque mode, le module DIMM le plus lent du système détermine la vitesse maximum de fonctionnement. Installation de modules DIMM ATTENTION : Avant d'ajouter ou de retirer des modules mémoire, vous devez déconnecter le cordon d'alimentation et attendre environ 30 secondes pour éliminer toute énergie résiduelle. Quel que soit l'état de mise sous tension, une tension est toujours fournie aux modules mémoire tant que l'ordinateur est branché sur une prise secteur active. L'ajout ou le retrait de modules mémoire alors qu'une tension est toujours présente peut endommager de manière irrémédiable les modules mémoire ou la carte mère. Les supports des modules mémoire possèdent des contacts en or. Lors de la mise à niveau de la mémoire, il convient d’utiliser des modules DIMM avec des contacts en or, afin d’éviter les risques de corrosion et/ou d’oxydation pouvant résulter du contact de deux métaux incompatibles. L'électricité statique peut endommager les composants électroniques de l'ordinateur ou des cartes en option. Il est conseillé de toucher un objet métallique relié à la terre avant de commencer l'installation. Pour plus d'informations, reportez-vous à Décharges électrostatiques à la page 173. Lorsque vous manipulez un module mémoire, ne touchez aucun contact, car vous risqueriez d’endommager le module. 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. Installation de mémoire supplémentaire 25 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Avant d'ajouter ou de retirer des modules mémoire, vous devez déconnecter le cordon d'alimentation et attendre environ 30 secondes pour éliminer toute énergie résiduelle. Quel que soit l'état de mise sous tension, une tension est toujours fournie aux modules mémoire tant que l'ordinateur est branché sur une prise secteur active. L'ajout ou le retrait de modules mémoire alors qu'une tension est toujours présente peut endommager de manière irrémédiable les modules mémoire ou la carte mère. 5. Retirez le panneau d’accès de l’ordinateur. AVERTISSEMENT ! Afin d’éviter toute brûlure, il est conseillé de laisser refroidir les éléments internes du système avant de les toucher. 6. Ouvrez les deux loquets du support de module mémoire (1) et insérez le module mémoire dans le support (2). Figure 2-7 Installation d’un module DIMM REMARQUE : Un module mémoire ne peut être installé que dans un sens. Faites coïncider l’encoche du module avec la languette du support de mémoire. Occupez les sockets DIMM noirs avant d'occuper les sockets DIMM blancs. Pour obtenir des performances maximales, remplissez les supports afin que la capacité de mémoire soit répartie autant que possible entre les canaux A et B. Reportez-vous à la section Remplissage des supports DIMM à la page 25 pour plus d’informations. 7. Enfoncez le module dans le connecteur jusqu’à ce qu’il soit complètement inséré et correctement enclenché. Assurez-vous de refermer les loquets (3). 8. Répétez les étapes 6 et 7 pour installer d’autres modules. 9. Remettez en place le panneau d’accès de l’ordinateur. 10. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 11. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d’accès. L’ordinateur doit reconnaître automatiquement la mémoire ajoutée à la mise sous tension qui suit. 26 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) Retrait ou installation d'une carte d'extension L’ordinateur possède trois connecteurs d’extension PCI pleine hauteur standard : un connecteur d’extension PCI Express x1, un connecteur d’extension PCI Express x16 et un connecteur d’extension PCI Express x16 rétrogradé en connecteur x4. REMARQUE : Vous pouvez installer une carte d’extension PCI Express x1, x8 ou x16 dans les connecteurs PCI Express x16. Pour les configurations à deux cartes graphiques, la première carte (principale) doit être installée dans le connecteur PCI Express x16 NON rétrogradé en connecteur x4. Pour retirer, remplacer ou ajouter une carte d’extension : 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Retirez le panneau d’accès de l’ordinateur. 6. Repérez le support de carte d’extension approprié sur la carte mère, ainsi que le support de carte d’extension correspondant à l’arrière du châssis de l’ordinateur. 7. Appuyez sur les deux languettes vertes à l’intérieur du châssis (1) et relevez le bras servant à maintenir la carte d’extension (2). Figure 2-8 Ouverture du dispositif de retenue Retrait ou installation d'une carte d'extension 27 8. Avant d’installer une carte d’extension, retirez le cache du support d’extension ou la carte d’extension existante. REMARQUE : Avant de retirer une carte d’extension déjà installée, débranchez tous les câbles qui y sont rattachés. a. Si vous installez une carte d’extension dans un support libre, retirez l’obturateur correspondant à l’arrière du châssis. Faites-le glisser hors du châssis en tirant dessus. Figure 2-9 Retrait d'un cache de carte d'extension b. Si vous retirez une carte PCI standard ou PCI Express x1, tenez-la à chaque extrémité et faites-la délicatement basculer d’avant en arrière jusqu’à ce qu’elle sorte de son support. Soulevez la carte à la verticale pour la retirer. Veillez à ne pas la rayer en heurtant d’autres composants. Figure 2-10 Retrait d'une carte d'extension PCI standard 28 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) c. Si vous retirez une carte PCI Express x16, tirez sur le bras de fixation à l’arrière du support pour l’écarter de la carte, puis faites délicatement basculer la carte jusqu’à ce qu’elle sorte de son support. Dégagez-la ensuite en tirant verticalement. Prenez garde de ne pas rayer la carte contre d’autres éléments. Figure 2-11 Retrait d'une carte d'extension PCI Express x16 9. Placez la carte retirée dans un emballage antistatique. 10. Si vous n’installez pas de nouvelle carte d’extension, installez l’obturateur d’extension pour fermer l’orifice. ATTENTION : Après avoir retiré une carte d'extension, vous devez la remplacer par une nouvelle carte ou par un cache pour permettre le refroidissement des composants internes pendant leur fonctionnement. Retrait ou installation d'une carte d'extension 29 11. Pour installer une nouvelle carte, insérez l’équerre de l’extrémité de la carte d’extension dans la fente à l’arrière du châssis et appuyez fermement sur la carte pour qu’elle s’emboîte à fond dans son support. Figure 2-12 Installation d’une carte d’extension REMARQUE : Lorsque vous installez une carte d’extension, appuyez fermement sur la carte, de sorte que l’ensemble du connecteur soit correctement enclenché dans le connecteur de carte d’extension. 12. Fermez le mécanisme de retenue en veillant à ce qu’il s’enclenche convenablement. 13. Le cas échéant, branchez les câbles extérieurs sur la carte installée. Connectez les câbles intérieurs à la carte mère, si nécessaire. 14. Remettez en place le panneau d’accès de l’ordinateur. 15. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 16. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d’accès de l’ordinateur. 17. Le cas échéant, reconfigurez l’ordinateur. 30 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) Emplacement des unités Figure 2-13 Positions des lecteurs (configuration présentée pour la minitour) Tableau 2-2 Emplacements des unités 1 Trois baies de lecteur 5,25 pouces pour les lecteurs optionnels (lecteurs optiques et lecteurs de cartes multimédias présentés) 2 Trois compartiments de disque dur interne de 3,5 pouces REMARQUE : La configuration d’unité de votre ordinateur peut être différente de celle illustrée ci-dessus. Le compartiment 5,25 pouces inférieur est moins profond que les deux compartiments supérieurs. Le compartiment inférieur peut recevoir une unité demi-hauteur ou tout autre périphérique dont la longueur ne dépasse pas 14,5 cm (5,7 pouces). Ne forcez pas une unité plus longue, comme une unité optique, dans le compartiment inférieur. Vous pourriez abîmer l’unité et la carte mère. Si vous forcez trop en mettant une unité de disque en place, vous risquez de l’endommager. Pour vérifier le type et la taille des périphériques de stockage installés dans l’ordinateur, exécutez l’utilitaire Computer Setup. Emplacement des unités 31 Retrait d'un lecteur d'une baie de lecteur ATTENTION : Avant de retirer une unité de l’ordinateur, veillez à ce qu’elle ne contienne pas de support amovible. 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Retirez le panneau d'accès et le cache avant. 6. Déconnectez les câbles d’unité, comme indiqué par les illustrations suivantes. ATTENTION : Lorsque vous déconnectez un câble, tirez sur son connecteur et pas sur le câble lui-même, car vous pourriez l’endommager. ● Si vous retirez une unité optique, déconnectez le cordon d’alimentation (1) et le câble de données (2) à l’arrière de l’unité. Figure 2-14 Déconnexion des câbles de l’unité optique 32 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) ● Si vous retirez un lecteur de cartes multimédias, déconnectez le câble USB de la carte mère. Figure 2-15 Déconnexion du câble USB du lecteur de cartes multimédia ● Si vous retirez un disque dur, déconnectez le câble d'alimentation (1) et le câble de données (2) à l'arrière du disque. Figure 2-16 Déconnexion des câbles du disque dur Retrait d'un lecteur d'une baie de lecteur 33 7. Retirez l’unité de son compartiment en procédant comme suit : ● Pour retirer une unité 5,25 pouces dans la configuration bureau, appuyez sur le mécanisme de blocage jaune (1) et faites glisser l’unité hors du compartiment (2). ATTENTION : Lorsque vous appuyez sur le mécanisme de verrouillage de disques jaune, tous les lecteurs 5,25 pouces sont déverrouillés. N'inclinez donc pas l'unité centrale et ne laissez pas les lecteurs tomber. Figure 2-17 Retrait d’une unité 5,25 pouces dans la configuration bureau (unité optique illustrée) ● Pour retirer une unité de 5,25 pouces dans la configuration minitour, tirez sur son mécanisme de verrouillage d’unité vert (1) et faites-la glisser hors du compartiment (2). Figure 2-18 Retrait d’une unité de 5,25 pouces dans la configuration minitour (unité optique illustrée) 34 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) ● Pour retirer un disque dur de l'une des baies de disque dur interne, tirez le mécanisme de verrouillage de disque dur (1) de ce disque et faites glisser le disque hors de la baie de disque dur (2). Figure 2-19 Retrait d'un disque dur des deux baies inférieures ● Pour retirer un disque dur d'une baie de disque dur interne supérieure, retirez la vis fixant le disque à sa place sur le côté de la baie (1) puis faites glisser le disque hors de la baie (2). Figure 2-20 Retrait d'un disque dur de la baie supérieure Retrait d'un lecteur d'une baie de lecteur 35 Installation des lecteurs Lors de l'installation de lecteurs, suivez ces consignes : ● Le disque dur principal Serial ATA (SATA) doit être relié au connecteur SATA bleu foncé de la carte mère. Il porte l'inscription SATA0. Si vous ajoutez un deuxième disque dur, reliez-le au connecteur SATA1 bleu clair. ● Connectez la première unité optique SATA au connecteur SATA blanc libellé SATA2 sur la carte mère. Si vous ajoutez un deuxième lecteur optique, reliez-le au connecteur SATA3 blanc. ● Reliez un câble adaptateur eSATA optionnel au connecteur SATA noir de la carte mère. Il porte l'inscription ESATA. ● Connectez un câble USB de lecteur de cartes multimédias au connecteur USB de la carte mère libellé MEDIA. ● Le câble d'alimentation destiné aux lecteurs optiques SATA est un câble à deux connecteurs. Il est branché à la carte mère, le premier connecteur est acheminé vers la baie 5,25 pouces du milieu et le deuxième connecteur est acheminé vers la baie 5,25 pouces du haut. ● Le câble d'alimentation destiné aux disques durs SATA est un câble à trois connecteurs. Il est branché à la carte mère, le premier connecteur est acheminé vers la baie 3,5 pouces du bas, le deuxième connecteur est acheminé vers la baie 3,5 pouces du milieu et le troisième connecteur est acheminé vers la baie 3,5 pouces du haut. ● Le système ne prend pas en charge les unités optiques PATA (Parallel ATA) ni les disques durs PATA. ● Vous devez installer les vis de guidage pour garantir que le lecteur s'alignera correctement dans la cage de lecteur et qu'il se verrouillera en place. Des vis de guidage supplémentaires installées sur le châssis sont fournies par HP. Le disque dur nécessite des vis de guidage d'isolation 6-32 pour les deux baies inférieures et des vis standard 6-32 pour la baie supérieure. Quatre de ces vis s'installent sur le support de disque dur sous le panneau d'accès. Tous les autres lecteurs nécessitent des vis métriques M3. Huit d'entre elles s'installent sur le support de lecteur optique situé sous le panneau d'accès. Les vis de guidage métriques fournies par HP sont noires. Les vis de guidage d’isolation 6-32 fournies par HP sont de couleur argent et bleue. Les vis standard 6-32 fournies par HP sont de couleur argent. Si vous remplacez le disque dur principal, vous 36 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) devez retirer les quatre vis de guidage d'isolation 6-32 de couleur argent et bleue de l'ancien disque dur et installez-les sur le nouveau disque dur. Figure 2-21 Emplacements des vis de guidage supplémentaires N° Vis de guidage Périphérique 1 Vis métriques M3 noires Unités de 5,25 pouces 2 Vis standard 6-32 de couleur argent Disque dur 3,5 pouces dans la baie de lecteur du haut (baie 4) 3 Vis d’isolation 6-32 de couleur argent et bleu Disques durs 3,5 pouces dans les baies de lecteur du milieu et du bas (baie 5 et 6) ATTENTION : Pour éviter tout risque de perte de données et de dégât à l’ordinateur ou à une unité : Si vous insérez ou retirez une unité, arrêtez correctement le système d’exploitation, mettez l’ordinateur hors tension, puis débranchez le cordon d’alimentation. Ne retirez pas une unité lorsque l’ordinateur est sous tension ou en mode veille. Il est conseillé de toucher un objet métallique relié à la terre avant de manipuler une unité. Évitez de toucher les connecteurs lorsque vous manipulez une unité. Pour plus d'informations vous permettant d'éviter les endommagements provoqués par de l'électricité statique, reportez-vous à Décharges électrostatiques à la page 173. Manipulez l’unité avec précaution ; ne la laissez pas tomber. Ne forcez pas lors de l’insertion d’une unité. Évitez d’exposer l’unité à des liquides, des températures extrêmes ou au champ magnétique émis par des appareils tels que des moniteurs ou des haut-parleurs. Si vous devez envoyer une unité par la poste, prenez soin de la placer dans un emballage à bulles d’air ou tout autre emballage offrant une protection suffisante. Veuillez également apposer sur le colis une étiquette indiquant « Fragile : à manipuler avec précaution ». Installation des lecteurs 37 Installation d'un lecteur 5,25 pouces dans une baie de lecteur 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Retirez le panneau d’accès de l’ordinateur. 6. Retirez le panneau avant. Si vous installez une unité dans un compartiment couvert par un cache protecteur, retirez ce dernier. Pour plus d’informations, reportez-vous à la section Retrait des caches protecteurs à la page 21. 38 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) 7. Installez quatre vis de guidage métriques M3 dans les trous inférieurs de chaque côté de l’unité (1). Quatre vis de guidage métriques M3 supplémentaires sont fournies par HP sur le support d’unité de 5,25 pouces, sous le panneau d’accès. Les vis de guidage métriques M3 sont noires. Reportez-vous à la section Installation des lecteurs à la page 36 pour une illustration de l’emplacement des vis de guidage métriques M3 supplémentaires. REMARQUE : Lorsque vous remplacez une unité de disque, placez les quatre vis M3 de l’ancienne unité sur la nouvelle. ATTENTION : Utilisez uniquement des vis de guidage de 5 mm de long. Des vis plus longues peuvent endommager les composants internes de l’unité. Figure 2-22 Installation d’une unité 5,25 pouces dans les configurations minitour (haut) et bureau (bas) 8. Installez l’unité dans le compartiment d’unité voulu en la faisant glisser entièrement à l’avant de la cage d’unité jusqu’à ce qu’elle s’enclenche (2). Le dispositif de verrouillage la maintient en place automatiquement. ATTENTION : Le compartiment 5,25 pouces inférieur est moins profond que les deux compartiments supérieurs. Le compartiment inférieur peut recevoir une unité demi-hauteur ou tout autre périphérique dont la longueur ne dépasse pas 14,5 cm (5,7 pouces). Ne forcez pas une unité plus longue, comme une unité optique, dans le compartiment inférieur. Vous pourriez abîmer l’unité et la carte mère. Si vous forcez trop en mettant une unité de disque en place, vous risquez de l’endommager. Installation des lecteurs 39 9. Connectez le cordon d'alimentation et le câble de données à l'unité comme indiqué par les illustrations suivantes. a. Si vous installez une unité optique, connectez le cordon d'alimentation (1) et le câble de données (2) à l'arrière de l'unité. REMARQUE : Le câble d'alimentation destiné aux lecteurs optiques est un câble à deux connecteurs acheminé de la carte mère jusqu'à l'arrière des baies de lecteur optique. Figure 2-23 Connexion des câbles d'unité optique b. Si vous installez un lecteur de cartes multimédia, connectez le câble USB au connecteur USB de la carte mère libellé MEDIA. Figure 2-24 Connexion du câble USB du lecteur de cartes multimédia 40 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) 10. Si vous installez une nouvelle unité, connectez l’autre extrémité du câble de données au connecteur approprié de la carte mère. REMARQUE : Si vous installez un nouveau lecteur optique SATA, reliez le câble de données destiné au premier lecteur optique au connecteur SATA blanc de la carte mère. Il porte l'inscription SATA2. Reliez le câble de données destiné à un deuxième lecteur optique au connecteur SATA blanc de la carte mère. Il porte l'inscription SATA3. Reportez-vous à Connexions de la carte mère à la page 22 pour obtenir une illustration des connecteurs de lecteurs de la carte mère. 11. Replacez le cache avant et le panneau d’accès de l’ordinateur. 12. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 13. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d’accès de l’ordinateur. Installation des lecteurs 41 Installation d’un disque dur dans une baie de lecteur interne REMARQUE : Le système ne prend pas en charge les disques durs PATA (Parallel ATA). Avant de retirer l’ancien disque dur, assurez-vous de sauvegarder ses données de manière à pouvoir les transférer sur le nouveau disque. Pour installer un disque dur dans un compartiment d’unité interne 3,5 pouces : 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Retirez le panneau d’accès de l’ordinateur. 6. Installez des vis de guidage sur les côtés du lecteur. Le type de vis utilisé dépend de la baie de lecteur utilisée pour accueillir le lecteur. Si vous installez un disque 2,5 pouces, vous devez installer le disque dans un support adaptateur. REMARQUE : Des vis supplémentaires sont installées sur le support de disque dur sous le panneau d'accès. Reportez-vous à Installation des lecteurs à la page 36 pour obtenir une illustration des emplacements des vis de guidage supplémentaires. Si vous remplacez une unité de disque, placez les vis de l’ancienne unité sur la nouvelle. ● Si vous installez un disque 3,5 pouces dans l'une des deux baies inférieures (baies 5 et 6), installez les quatre vis de guidage d'isolation 6-32 de couleur argent et bleu (deux de chaque côté du disque). Figure 2-25 Installation des vis de guidage d'isolation sur un disque dur 3,5 pouces 42 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) ● Si vous installez un disque dur 2,5 pouces dans l'une des deux baies inférieures (baies 5 et 6), effectuez les opérations suivantes : ◦ Faites glisser le disque dans le support d'adaptation de la baie, en vous assurant que le connecteur du disque est complètement inséré dans le connecteur du support d'adaptation. Figure 2-26 Insertion du disque 2,5 pouces dans le support d'adaptation ◦ Fixez le disque sur le support d'adaptation de la baie en installant quatre vis pour support d'adaptation M3 noires sur les côtés du support dans le disque. Figure 2-27 Fixation du disque sur le support d'adaptation Installation des lecteurs 43 ◦ Installez quatre vis de guidage pour support d'isolation 6-32 de couleur argent et bleue sur le support d'adaptation (deux de chaque côté du support). Figure 2-28 Installation des vis de guidage pour support d'isolation sur le support d'adaptation ● Si vous installez le disque dans la baie du haut (baie 4), installez les trois vis de guidage 6-32 standard de couleur argent (deux sur le côté droit et une sur le côté gauche, dans le trou de vis le plus proche du connecteur de données et du connecteur d'alimentation). Figure 2-29 Installation des vis de guidage standard 44 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) 7. Insérez le disque dur dans la baie de la manière suivante : ATTENTION : Assurez-vous que les vis de guidage sont alignées sur les rails de guidage du compartiment. Si vous forcez trop en mettant une unité de disque en place, vous risquez de l’endommager. ● Si vous installez un disque dur dans l'une des deux baies inférieures (baies 5 et 6), faites glisser le disque dur dans la baie de lecteur jusqu'à ce qu'il se verrouille. Le dispositif de verrouillage la maintient en place automatiquement. Figure 2-30 Installation d'un disque dur dans les deux baies inférieures ● Si vous installez un disque dur dans la baie supérieure (baie 4), faites glisser le disque dur dans la baie de lecteur (1) puis fixez le disque à sa place avec une vis standard 6-32 (2). Figure 2-31 Installation d'un disque dur dans la baie supérieure Installation des lecteurs 45 8. Connectez le cordon d’alimentation (1) et le câble de données (2) à l’arrière du disque dur. REMARQUE : Le câble d'alimentation destiné aux disques durs est un câble à trois connecteurs acheminé de la carte mère jusqu'à l'arrière des baies de disque dur. Figure 2-32 Connexion du cordon d’alimentation et du câble de données à un disque dur SATA 9. Connectez l’autre extrémité du câble de données au connecteur approprié de la carte mère. REMARQUE : Si le système est équipé d'un seul disque dur SATA, le câble de données du disque dur doit être raccordé au connecteur bleu foncé de la carte mère, libellé SATA0, pour éviter toute détérioration des performances du disque dur. Si vous ajoutez un second disque dur, connectez le câble de données au connecteur bleu clair identifié SATA1. 10. Remettez en place le panneau d’accès de l’ordinateur. 11. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 12. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d’accès de l’ordinateur. 46 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) Transformation de la minitour en ordinateur de bureau 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Retirez le panneau d’accès de l’ordinateur. 6. Retirez le cache avant. 7. Débranchez les câbles d’alimentation et de données de l’arrière des unités du compartiment 5,25 pouces. 8. Pour retirer les unités du compartiment d’unité de 5,25 pouces, soulevez la languette de dégagement sur le support de verrouillage de l’unité (1). Faites ensuite glisser l’unité hors de son compartiment tout en maintenant la languette de dégagement (2). Répétez cette étape pour chaque unité de 5,25 pouces. Figure 2-33 Dégagement des unités du compartiment 5,25 pouces (minitour) Transformation de la minitour en ordinateur de bureau 47 9. Faites glisser délicatement la première unité dans le compartiment le plus haut, jusqu’à ce qu’elle se verrouille automatiquement. Le verrou permet de fixer l’unité lorsque celle-ci est insérée correctement. Répétez cette opération pour chaque unité. Figure 2-34 Installation d’une unité dans la configuration bureau ATTENTION : Le compartiment 5,25 pouces inférieur est moins profond que les deux compartiments supérieurs. Le compartiment inférieur peut recevoir une unité demi-hauteur ou tout autre périphérique dont la longueur ne dépasse pas 14,5 cm (5,7 pouces). Ne forcez pas une unité plus longue, comme une unité optique, dans le compartiment inférieur. Vous pourriez abîmer l’unité et la carte mère. Si vous forcez trop en mettant une unité de disque en place, vous risquez de l’endommager. 10. Rebranchez tous les câbles d’alimentation et de transmission de données sur les unités placées dans les compartiments d’unités 5,25 pouces. 11. Retirez le panneau secondaire du cache avant comme décrit dans la section Retrait des caches protecteurs à la page 21. ATTENTION : Maintenez le sous-panneau droit lorsque vous le retirez du cache avant. L’inclinaison du sous-panneau pendant son retrait pourrait endommager les broches permettant de l’aligner sur le cache avant. 12. Replacez les caches d’unité dans le panneau secondaire en les orientant convenablement pour la configuration de bureau. 48 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) 13. Replacez le panneau secondaire dans le cache avant en le tournant de 90° pour placer le logo en bas. Figure 2-35 Conversion d’une configuration minitour au format de bureau 14. Replacez le cache avant et le panneau d’accès de l’ordinateur. 15. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 16. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d’accès de l’ordinateur. Transformation de l'ordinateur de bureau en minitour 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Retirez le panneau d’accès de l’ordinateur. 6. Retirez le cache avant. 7. Débranchez les câbles d’alimentation et de données de l’arrière des unités du compartiment 5,25 pouces. Transformation de l'ordinateur de bureau en minitour 49 8. Pour retirer les unités du compartiment d’unité de 5,25 pouces, appuyez sur le petit mécanisme de verrouillage d’unité jaune tel qu’illustré (1). Retirez ensuite les unités du compartiment tout en maintenant le mécanisme de verrouillage d’unité (2). Figure 2-36 Dégagement des unités du compartiment 5,25 pouces (position bureau) 9. Faites glisser délicatement la première unité dans le compartiment le plus haut, jusqu’à ce qu’elle se verrouille automatiquement. Le verrou permet de fixer l’unité lorsque celle-ci est insérée correctement. Répétez cette opération pour chaque unité. Figure 2-37 Installation d’une unité dans la configuration minitour ATTENTION : Le compartiment 5,25 pouces inférieur est moins profond que les deux compartiments supérieurs. Le compartiment inférieur peut recevoir une unité demi-hauteur ou tout autre périphérique dont la longueur ne dépasse pas 14,5 cm (5,7 pouces). Ne forcez pas une unité plus longue, comme une unité optique, dans le compartiment inférieur. Vous pourriez abîmer l’unité et la carte mère. Si vous forcez trop en mettant une unité de disque en place, vous risquez de l’endommager. 10. Rebranchez tous les câbles d’alimentation et de transmission de données sur les unités placées dans les compartiments d’unités 5,25 pouces. 50 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) 11. Retirez le panneau secondaire du cache avant comme décrit dans la section Retrait des caches protecteurs à la page 21. ATTENTION : Maintenez le sous-panneau droit lorsque vous le retirez du cache avant. L’inclinaison du sous-panneau pendant son retrait pourrait endommager les broches permettant de l’aligner sur le cache avant. 12. Replacez les caches d’unité dans le panneau secondaire en les orientant convenablement pour la configuration minitour. 13. Replacez le panneau secondaire dans le cache avant en le tournant de 90° pour placer le logo en bas. Figure 2-38 Conversion du format de bureau en configuration minitour 14. Replacez le cache avant et le panneau d’accès de l’ordinateur. 15. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 16. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d’accès de l’ordinateur. Installation d’un dispositif antivol Les dispositifs de sécurité illustrés ci-dessous et à la page suivante peuvent être utilisés pour protéger l’ordinateur contre le vol. Installation d’un dispositif antivol 51 Câble antivol Figure 2-39 Installation d’un câble de sécurité 52 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) Cadenas Figure 2-40 Installation d’un cadenas Verrou de sécurité HP Business PC 1. Attachez le câble de sécurité en l’enroulant autour d’un objet statique. Figure 2-41 Fixation du câble à un objet fixe Installation d’un dispositif antivol 53 2. Insérez le câble antivol dans la fente pour câble antivol située à l'arrière du moniteur, puis fixez le verrou sur le moniteur en insérant la clé dans la serrure située à l'arrière du verrou et en tournant la clé de 90 degrés. Figure 2-42 Installation du câble antivol sur le moniteur 3. Insérez le câble de sécurité dans le trou du câble antivol situé à l'arrière du moniteur. Figure 2-43 Sécurisation du moniteur 54 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) 4. Utilisez le support de montage fourni dans le kit pour sécuriser d'autres unités périphériques en introduisant le câble du périphérique dans le centre du support (1) et en insérant le câble de sécurité dans l'un des deux trous du support de montage (2). Utilisez le trou du support de montage sécurisant le mieux le câble de l'unité périphérique. Figure 2-44 Sécurisation des unités périphériques (imprimante présentée) 5. Enfilez les câbles du clavier et de la souris dans le verrou du châssis de l'ordinateur. Figure 2-45 Passage des câbles du clavier et de la souris Installation d’un dispositif antivol 55 6. Vissez le verrou au châssis dans le trou de la vis à ailettes à l'aide de la vis fournie. Figure 2-46 Fixation du verrou sur le châssis 7. Insérez la prise du câble de sécurité dans le verrou (1) et enfoncez le bouton (2) pour fermer le verrou. Utilisez la clé fournie pour ouvrir le verrou. Figure 2-47 Fermeture du dispositif antivol 56 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) 8. Une fois l'opération terminée, tous les périphériques dans votre station de travail sont sécurisés. Figure 2-48 Station de travail sécurisée Sécurité du panneau avant Le cache avant peut s’enclencher à l’aide d’une vis de sécurité fournie par HP. Pour installer la vis de sécurité : 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Retirez le panneau d’accès et le cache avant. Installation d’un dispositif antivol 57 6. Enlevez la vis de sécurité de l’intérieur du cache avant. Figure 2-49 Récupération de la vis de sécurité du cache avant 7. Repositionnez le cache avant. 8. Installez la vis dans le cache avant par l’avant du châssis. Le trou de vis se situe sur le côté gauche du châssis, à côté du compartiment de disque dur supérieur. Figure 2-50 Installation de la vis de sécurité du cache avant 9. Remettez en place le panneau d’accès. 10. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 11. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d’accès. 58 Chapitre 2 Mises à niveau matérielles de la minitour convertible (CMT) 3 Mises à niveau matérielles de la microtour (MT) Fonctionnalités de maintenance L'ordinateur possède des fonctions facilitant sa mise à niveau et son entretien. La plupart des procédures d'installation décrites dans ce chapitre ne nécessitent aucun outil. Avertissements et précautions Avant toute mise à niveau, suivez scrupuleusement toutes les instructions s’y rapportant et n’oubliez pas de lire les notes d’avertissement et d’attention de ce manuel. AVERTISSEMENT ! Afin de réduire les risques de blessures provenant de choc électrique, de surface à haute température ou d’incendie : Déconnectez le cordon d’alimentation de la prise murale et laissez refroidir les éléments internes du système avant de les toucher. Ne branchez pas de connecteurs de téléphone ou de télécommunication sur les prises de carte réseau. Utilisez toujours la fiche de terre du cordon d’alimentation. La fiche de terre est un élément de sécurité important. Branchez le cordon d’alimentation sur une prise secteur avec conducteur de terre, accessible facilement. Pour éviter tout risque de blessure grave, lisez le manuel Sécurité et ergonomie du poste de travail. Ce manuel explique comment agencer correctement un poste de travail et comment s'installer confortablement devant un ordinateur. Il contient également d'importantes informations sur la sécurité électrique et mécanique. Ce manuel est disponible sur le Web à l'adresse http://www.hp.com/ergo. AVERTISSEMENT ! Cet ordinateur contient des pièces sous tension et amovibles. Débranchez le cordon d'alimentation avant de retirer le boîtier. Remettez le boîtier en place et fixez-le avant d'alimenter l'équipement. ATTENTION : L’électricité statique peut endommager les composants électriques de l’ordinateur ou de l’équipement en option. Il est conseillé de toucher un objet métallique relié à la terre avant de commencer l'installation. Consultez Décharges électrostatiques à la page 173 pour plus d'informations. Quand l’ordinateur est branché sur le secteur, la carte mère est sous tension. Vous devez déconnecter le cordon d’alimentation avant d’ouvrir l’ordinateur pour prévenir toute détérioration des composants internes. Fonctionnalités de maintenance 59 Retrait du panneau d'accès à l'ordinateur Pour accéder aux composants internes, vous devez enlever le panneau d’accès : 1. Retirez/désengagez tout périphérique de sécurité qui entrave l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d'arrêt du système d'exploitation, puis mettez l'ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d'alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l'état de mise sous tension, une tension est toujours présente sur la carte mère tant que l'ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d'alimentation pour éviter d'endommager les composants internes de l'ordinateur. 5. Desserrez les deux vis à molette (1) qui fixent le panneau d’accès au châssis de l’ordinateur. 6. Retirez le panneau d’accès de l’appareil en le soulevant à l’aide de la poignée située entre les vis à molette (2). REMARQUE : Pour installer des pièces internes, vous pouvez coucher l'ordinateur sur son flanc. Assurez-vous que le côté du panneau d'accès est dirigé vers le haut. Figure 3-1 Retrait du panneau d'accès de l'ordinateur 60 Chapitre 3 Mises à niveau matérielles de la microtour (MT) Remise en place du panneau d'accès à l'ordinateur 1. Faites glisser l’onglet situé à l’avant du panneau d’accès sous l’onglet situé à l’avant du châssis (1), puis appuyez l’arrière du panneau d’accès dans l’appareil (2). Figure 3-2 Remise en position du panneau d'accès de l'ordinateur 2. Vérifiez que le panneau est complètement fermé (1), puis serrez les deux vis à molette qui fixent le panneau d’accès au châssis (2). Figure 3-3 Serrage des vis à molette du panneau d’accès Remise en place du panneau d'accès à l'ordinateur 61 Retrait du panneau avant 1. Retirez/désengagez tout périphérique de sécurité qui entrave l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d'arrêt du système d'exploitation, puis mettez l'ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d'alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l'état de mise sous tension, une tension est toujours présente sur la carte mère tant que l'ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d'alimentation pour éviter d'endommager les composants internes de l'ordinateur. 5. Retirez le panneau d'accès de l'ordinateur. 6. Soulevez les trois onglets sur le côté du cache avant (1), puis faites pivoter le cache avant pour le retirer du châssis (2). Figure 3-4 Retrait du cache avant Retrait des caches protecteurs Sur certains modèles, des caches protecteurs recouvrent les baies de lecteur 3,5 et 5,25 pouces. Ces caches doivent être retirés avant d'installer un lecteur. Pour retirer un cache protecteur : 1. Retirez le panneau d'accès et le panneau avant. 62 Chapitre 3 Mises à niveau matérielles de la microtour (MT) 2. Pour retirer un cache protecteur, poussez les languettes de fixation qui maintiennent le cache en place vers le bord extérieur droit du panneau (1) et faites glisser le cache vers l'arrière et vers la droite pour le retirer (2). Figure 3-5 Retrait d'un cache protecteur Remise en place du panneau avant Insérez les trois crochets sur le côté gauche du cache avant dans les trous rectangulaires du châssis (1), puis faites pivoter le côté droit du cache avant dans le châssis (2) jusqu’à ce qu’il s’emboîte. Figure 3-6 Remise en position du cache avant Remise en place du panneau avant 63 Connexions de la carte mère Reportez-vous aux illustrations et aux tableaux suivants pour identifier les connecteurs de la carte mère de votre modèle. Figure 3-7 Connexions de la carte système Tableau 3-1 Connexions de la carte système N Connecteur de la carte mère Étiquette de carte mère Couleur Composant 1 DIMM4 (canal A) DIMM4 blanc Module de mémoire 2 DIMM3 (canal A) DIMM3 noir Module de mémoire 3 DIMM2 (canal B) DIMM2 blanc Module de mémoire 4 DIMM1 (canal B) DIMM1 noir Module de mémoire 5 Alimentation SATAPWR1 noir Lecteurs optiques SATA 6 Alimentation SATAPWR0 noir Disques durs SATA 7 SATA 3.0 SATA0 bleu foncé 1er disque dur 8 SATA 3.0 SATA1 bleu clair 2ème disque dur ou 2ème lecteur optique si un câble adaptateur ESATA est présent 9 SATA 2.0 SATA2 blanc 1er lecteur optique 10 eSATA ESATA noir Câble adaptateur eSATA ou 2ème lecteur optique 11 Port parallèle PAR noir Port parallèle 12 Port série COMB noir Port série 13 USB MEDIA noir Périphérique USB tel qu'un lecteur de cartes multimédias 14 Verrou de la protection HLCK noir Périphérique USB tel qu'un lecteur de cartes multimédias 15 Détecteur d'ouverture du capot HSENSE blanc Détecteur d'ouverture du capot 64 Chapitre 3 Mises à niveau matérielles de la microtour (MT) Tableau 3-1 Connexions de la carte système (suite) N Connecteur de la carte mère Étiquette de carte mère Couleur Composant 16 USB MEDIA2 noir Deuxième lecteur de cartes multimédias 17 PCI Express x1 X1PCIEXP1 noir Carte d'extension 18 PCI Express x16 rétrogradé en x4 X4PCIEXP blanc Carte d'extension 19 PCI Express x16 X16PCIEXP noir Carte d'extension 20 PCI PCI1 blanc Carte d'extension Connexions de la carte mère 65 Installation de mémoire supplémentaire L'ordinateur est fourni avec des modules DIMM (dual inline memory modules) de SDRAM (synchronous dynamic random access memory) DDR3 (double data rate 3). DIMM Les supports mémoire de la carte mère peuvent recevoir un maximum de quatre modules DIMM standard. À la livraison, ces connecteurs pour module mémoire accueillent au moins un DIMM préinstallé. Pour exploiter entièrement la prise en charge de mémoire, vous pouvez équiper la carte mère d'un maximum de 16 Go de mémoire dans une configuration hautes performances à deux canaux. DDR3-SDRAM DIMM ATTENTION : Ce produit NE prend PAS en charge la mémoire DDR3 Ultra Low Voltage (tension ultra faible) (DDR3U). Le processeur n'est pas compatible avec la mémoire DDR3U et si vous branchez de la mémoire DDR3U sur la carte mère, cela peut endommager physiquement le module DIMM ou provoquer un dysfonctionnement du système. Pour que le système fonctionne correctement, les modules mémoire DDR3-SDRAM DIMM doivent être : ● standard à 240 broches ● sans tampon, non-ECC PC3-12800 DDR3-1600 MHz ● 1,5 volt DDR3-SDRAM DIMM Les modules mémoire DDR3-SDRAM DIMM doivent également : ● prendre en charge une latence CAS 11 DDR3 1600 MHz (synchronisation 11-11-11) ● contenir les informations JEDEC SPD obligatoires En outre, l'ordinateur prend en charge : ● les technologies de mémoire non-ECC à 512 Mbits, 1 Gbit et 2 Gbits ● les modules DIMM monoface/double face. ● Modules DIMM conçus à partir de dispositifs DDR x8 et x16 ; Les modules DIMM conçus à partir de SDRAM x4 ne sont pas pris en charge REMARQUE : Le système ne fonctionnera pas correctement si vous installez des modules DIMM non pris en charge. 66 Chapitre 3 Mises à niveau matérielles de la microtour (MT) Remplissage des supports DIMM La carte mère est équipée de quatre supports DIMM, deux par canal. Ceux-ci sont identifiés DIMM1, DIMM2, DIMM3 et DIMM4. Les sockets DIMM1 et DIMM2 fonctionnent sur le canal mémoire B. Les sockets DIMM3 et DIMM4 fonctionnent sur le canal mémoire A. Le système fonctionnera automatiquement en mode canal unique, en mode double canal ou en mode flexible. Cela dépendra de l’installation des modules DIMM. ● Le système fonctionne en mode canal unique si les supports DIMM sont remplis dans un seul canal. ● Le système fonctionne en mode performant entrelacé à deux canaux si la capacité totale des modules DIMM du canal A est égale à celle des modules du canal B. Cependant, la technologie et la capacité des modules peuvent être différentes entre les deux canaux. Par exemple, si le canal A comporte deux modules DIMM de 1 Go et le canal B un module de 2 Go, le système fonctionnera en mode double canal. ● Le système fonctionnera en mode flexible si la capacité mémoire totale des modules DIMM du canal A n'est pas égale à la capacité mémoire totale des modules DIMM du canal B. En mode flexible, le canal occupé par le moins de mémoire représente la mémoire totale attribuée au double canal et la mémoire restante est attribuée au canal unique. Pour obtenir une vitesse optimale, les canaux doivent être équilibrés afin que la quantité la plus élevée de mémoire soit répartie entre les deux canaux. Si un canal dispose de plus de mémoire que l'autre, la plus grande capacité doit être attribuée au canal A. Par exemple, si vous occupez les sockets avec un module DIMM 2 Go et avec trois modules DIMM 1 Go, le canal A devra être occupé par le module DIMM 2 Go et par un module DIMM 1 Go. Le canal B devra être occupé par les deux autres modules DIMM 1 Go. Dans cette configuration, 4 Go sont exécutés en tant que double canal et 1 Go en tant que canal unique. ● Quel que soit le mode, la vitesse de fonctionnement maximale est déterminée par le module DIMM le plus lent du système. Installation des modules DIMM ATTENTION : Avant d'ajouter ou de retirer des modules mémoire, vous devez déconnecter le cordon d'alimentation et attendre environ 30 secondes pour éliminer toute énergie résiduelle. Quel que soit l'état de mise sous tension, une tension est toujours fournie aux modules mémoire tant que l'ordinateur est branché sur une prise secteur active. L'ajout ou le retrait de modules mémoire alors qu'une tension est toujours présente peut endommager de manière irrémédiable les modules mémoire ou la carte mère. Les supports de modules mémoire ont des contacts en métal doré. Lorsque vous mettez à niveau la mémoire, il est important d'utiliser des modules mémoire avec des contacts en métal doré pour éviter la corrosion et/ou l'oxydation due à l'incompatibilité des métaux en contact les uns avec les autres. L'électricité statique peut endommager les composants électroniques de l'ordinateur ou des cartes en option. Il est conseillé de toucher un objet métallique relié à la terre avant de commencer l'installation. Pour plus d'informations, reportez-vous à Décharges électrostatiques à la page 173. Lorsque vous manipulez un module de mémoire, ne touchez aucun contact, vous risqueriez d'endommager le module. 1. Retirez/dégagez tout périphérique de sécurité qui gêne l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Mettez l'ordinateur hors tension sans risque via le système d'exploitation, puis mettez les périphériques externes hors tension. Installation de mémoire supplémentaire 67 4. Débranchez le cordon d'alimentation de la prise électrique, puis débranchez tout périphérique externe. ATTENTION : Avant d'ajouter ou de retirer des modules mémoire, vous devez déconnecter le cordon d'alimentation et attendre environ 30 secondes pour éliminer toute énergie résiduelle. Quel que soit l'état de mise sous tension, une tension est toujours fournie aux modules mémoire tant que l'ordinateur est branché sur une prise secteur active. L'ajout ou le retrait de modules mémoire alors qu'une tension est toujours présente peut endommager de manière irrémédiable les modules mémoire ou la carte mère. 5. Retirez le panneau d’accès de l’ordinateur. AVERTISSEMENT ! Afin d'éviter tout risque de blessures dues aux surfaces brûlantes, laissez les composants du système interne refroidir avant de les toucher. 6. Ouvrez les deux loquets du support de module mémoire (1), puis insérez le module dans le support (2). Figure 3-8 Installation d'un DIMM REMARQUE : Un module mémoire ne peut être installé que d'une seule façon. Faites coïncider l'encoche située sur le module avec la patte du support de mémoire. Occupez les sockets DIMM noirs avant les blancs. Pour obtenir des performances maximales, occupez les sockets de façon à ce que la capacité mémoire soit répartie d'une manière aussi égale que possible entre le canal A et le canal B. Reportez-vous à Remplissage des supports DIMM à la page 67 pour plus d'informations. 7. Poussez le module dans le socket en vous assurant qu'il est complètement et correctement inséré. assurez-vous que les loquets sont en position fermée (3). 8. Répétez les étapes 6 et 7 pour installer les modules supplémentaires. 9. Remettez en place le panneau d’accès de l’ordinateur. 10. Rebranchez le cordon d'alimentation et mettez l'ordinateur sous tension. 11. Verrouillez tout périphérique de sécurité qui aurait pu bouger lors du retrait du panneau d'accès. L'ordinateur devrait automatiquement détecter la mémoire supplémentaire la prochaine fois où vous l'allumerez. 68 Chapitre 3 Mises à niveau matérielles de la microtour (MT) Retrait ou installation d'une carte d'extension L'ordinateur possède un connecteur d'extension PCI, un connecteur d'extension PCI Express x1, un connecteur d'extension PCI Express x16 et un connecteur d'extension PCI Express x16 rétrogradé en connecteur x4. REMARQUE : Vous pouvez installer une carte d’extension PCI Express x1, x4, x8 ou x16 dans le connecteur PCI Express x16. Pour les configurations à deux cartes graphiques, la première carte (principale) doit être installée dans le connecteur PCI Express x16 NON rétrogradé en connecteur x4. Pour retirer, remplacer ou ajouter une carte d’extension : 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Retirez le panneau d’accès de l’ordinateur. 6. Repérez le support de carte d’extension approprié sur la carte mère, ainsi que le support de carte d’extension correspondant à l’arrière du châssis de l’ordinateur. 7. Ouvrez le dispositif de blocage des obturateurs de support PCI en soulevant le levier vert et en faisant pivoter le dispositif en position ouverte. Figure 3-9 Ouverture du dispositif de retenue Retrait ou installation d'une carte d'extension 69 8. Avant d’installer une carte d’extension, retirez le cache du support d’extension ou la carte d’extension existante. REMARQUE : Avant de retirer une carte d’extension déjà installée, débranchez tous les câbles qui y sont rattachés. a. Si vous installez une carte d’extension dans un support libre, retirez l’obturateur correspondant à l’arrière du châssis, Tirez le cache du support vers le haut, puis de l’intérieur du châssis. Figure 3-10 Retrait d'un cache de carte d'extension 70 Chapitre 3 Mises à niveau matérielles de la microtour (MT) b. Si vous retirez une carte PCI standard ou PCI Express x1, tenez-la à chaque extrémité et faites-la délicatement basculer d’avant en arrière jusqu’à ce qu’elle sorte de son support. Tirez la carte d'extension à la verticale hors de son support, puis retirez-la complètement du châssis. Veillez à ne pas abîmer la carte en heurtant d'autres composants. Figure 3-11 Retrait d’une carte d’extension PCI standard c. Si vous retirez une carte PCI Express x16, tirez sur le bras de fixation à l’arrière du support pour l’écarter de la carte, puis faites délicatement basculer la carte jusqu’à ce qu’elle sorte de son support. Tirez la carte d’extension à la verticale hors de son support, puis retirez-la complètement du châssis. Veillez à ne pas abîmer la carte en heurtant d’autres composants. Figure 3-12 Retrait d'une carte d'extension PCI Express x16 9. Placez la carte retirée dans un emballage antistatique. Retrait ou installation d'une carte d'extension 71 10. Si vous n’installez pas de nouvelle carte d’extension, installez l’obturateur d’extension pour fermer l’orifice. ATTENTION : Après avoir retiré une carte d'extension, vous devez la remplacer par une nouvelle carte ou par un cache pour permettre le refroidissement des composants internes pendant leur fonctionnement. 11. Pour installer une nouvelle carte d'extension, tenez la carte à la verticale de son connecteur sur la carte mère, puis déplacez-la vers l'arrière du châssis de manière à aligner son support sur la fente prévue à l'arrière du châssis. Appuyez sur la carte pour l'insérer dans son connecteur sur la carte mère. Figure 3-13 Installation d’une carte d’extension REMARQUE : Lorsque vous installez une carte d’extension, appuyez fermement sur la carte, de sorte que l’ensemble du connecteur soit correctement enclenché dans le connecteur de carte d’extension. 12. Remettez en place le dispositif de blocage des cartes d’extension. Figure 3-14 Fermeture du dispositif de retenue 72 Chapitre 3 Mises à niveau matérielles de la microtour (MT) 13. Le cas échéant, branchez les câbles extérieurs sur la carte installée. Connectez les câbles intérieurs à la carte mère, si nécessaire. 14. Remettez en place le panneau d’accès de l’ordinateur. 15. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 16. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d'accès. 17. Reconfigurez l’ordinateur si nécessaire. Emplacement des unités Figure 3-15 Emplacements des unités Tableau 3-2 Emplacements des unités 1 Deux baies de lecteur 5,25 pouces pour les lecteurs en option (lecteurs optiques présentés) 2 Une baie de lecteur 3,5 pouces pour un lecteur en option (lecteur de cartes multimédias présenté) 3 Compartiment secondaire de disque dur 3,5 pouces interne pour disque dur en option 4 Compartiment principal de disque dur 3,5 pouces interne REMARQUE : La configuration du lecteur sur votre ordinateur peut être différente de la configuration affichée ci-dessus. Pour vérifier le type et la taille des périphériques de stockage installés dans l’ordinateur, exécutez l’utilitaire Computer Setup. Emplacement des unités 73 Installation et retrait de lecteurs Lors de l'installation de lecteurs supplémentaires, suivez ces consignes : ● Le disque dur Serial ATA principal (SATA) doit être raccordé au connecteur SATA bleu foncé principal de la carte système "SATA0". Si vous ajoutez un second disque dur, raccordez-le au connecteur bleu clair de la carte système "SATA1". ● Raccordez le premier disque optique SATA au connecteur SATA blanc de la carte système "SATA2". Si vous ajoutez un second disque optique, raccordez-le au connecteur SATA noir de la carte système "ESATA". Si le connecteur ESATA est déjà utilisé, raccordez le second disque optique au connecteur bleu clair de la carte système "SATA1". ● Connectez un câble adaptateur eSATA en option au connecteur SATA noir sur la carte mère. ● Connectez un câble USB de lecteur de cartes multimédias au connecteur USB de la carte mère libellé MEDIA. ● Le câble d'alimentation destiné aux lecteurs optiques SATA est un câble à deux connecteurs. Il est branché à la carte mère, le premier connecteur est acheminé vers la baie 5,25 pouces et le deuxième connecteur est acheminé vers la baie 5,25 pouces du bas. ● Le câble d'alimentation destiné aux disques durs SATA est un câble à deux connecteurs. Il est branché à la carte mère, le premier connecteur est acheminé vers la baie 3,5 pouces du bas et le deuxième connecteur est acheminé vers la baie 5,25 pouces du haut. ● Le système ne prend pas en charge les unités optiques PATA (Parallel ATA) ni les disques durs PATA. ● Vous devez installer des vis de guidage pour garantir le bon alignement et l’emboîtement du lecteur dans la cage d’unité. HP a fourni des vis de guidage supplémentaires pour les baies de lecteurs (quatre vis de guidage d’isolation 6-32 et huit vis métriques M3), situées sur le côté des compartiments d’unités. Les vis d’isolation 6-32 sont nécessaires en cas de disque dur secondaire. Toutes les autres unités (excepté le disque dur principal) utilisent des vis métriques M3. Les vis métriques fournies par HP sont noires et les vis d’isolation fournies par HP sont de couleur argent et bleu. Si vous procédez au remplacement du disque dur principal, vous devez 74 Chapitre 3 Mises à niveau matérielles de la microtour (MT) retirer les quatre vis de guidage d’isolation 6-32 de couleur argent et bleu du disque que vous remplacez et les installer dans le nouveau disque. Figure 3-16 Emplacements des vis de guidage supplémentaires N Vis de guidage Périphérique 1 Vis métriques M3 noires Toutes les unités (sauf les disques durs) 2 Vis d’isolation 6-32 de couleur argent et bleu Disque dur secondaire ATTENTION : Pour éviter tout risque de perte de données et de dégât à l’ordinateur ou à une unité : Si vous insérez ou retirez une unité, arrêtez correctement le système d'exploitation, mettez l'ordinateur hors tension, puis débranchez le cordon d'alimentation. Ne retirez pas une unité lorsque l'ordinateur est sous tension ou en mode veille. Il est conseillé de toucher un objet métallique relié à la terre avant de manipuler une unité. Évitez de toucher les connecteurs lorsque vous manipulez une unité. Pour savoir comment éviter les dommages dus à l’électricité statique, reportez-vous à la section Décharges électrostatiques à la page 173. Manipulez l’unité avec précaution ; ne la laissez pas tomber. Ne forcez pas lors de l’insertion d’une unité. Évitez d’exposer l’unité à des liquides, des températures extrêmes ou au champ magnétique émis par des appareils tels que des moniteurs ou des haut-parleurs. Si vous devez envoyer une unité par la poste, prenez soin de la placer dans un emballage à bulles d’air ou tout autre emballage offrant une protection suffisante. Veuillez également apposer sur le colis une étiquette indiquant « Fragile : à manipuler avec précaution ». Installation et retrait de lecteurs 75 Retirer un lecteur 5,25 pouces ou 3,5 pouces dans une baie de lecteur ATTENTION : Avant de retirer une unité de l'ordinateur, veillez à ce qu'elle ne contienne pas de support amovible. 1. Retirez/désengagez tout périphérique de sécurité qui entrave l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d'arrêt du système d'exploitation, puis mettez l'ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d'alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l'état de mise sous tension, une tension est toujours présente sur la carte mère tant que l'ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d'alimentation pour éviter d'endommager les composants internes de l'ordinateur. 5. Retirez le panneau d'accès et le cache avant. 6. Déconnectez les câbles d'unité, comme indiqué par les illustrations suivantes. ATTENTION : Lorsque vous déconnectez un câble, tirez sur son connecteur et pas sur le câble lui-même, car vous pourriez l’endommager. a. Si vous retirez une unité optique, déconnectez le cordon d’alimentation (1) et le câble de données (2) à l’arrière de l’unité. Figure 3-17 Déconnexion des câbles de l'unité optique 76 Chapitre 3 Mises à niveau matérielles de la microtour (MT) b. Si vous retirez un lecteur de cartes multimédias, déconnectez le câble USB de la carte mère. Figure 3-18 Déconnexion du câble USB du lecteur de cartes multimédias 7. Un support de verrouillage doté d'onglets retient les unités dans leur compartiment. Soulevez l'onglet de retenue sur le support de verrouillage (1) de l'unité à retirer, puis faites glisser l'unité hors de son logement (2). Figure 3-19 Extraction des unités Installation et retrait de lecteurs 77 Installation d'un lecteur 5,25 pouces ou 3,5 pouces dans une baie de lecteur 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Retirez le panneau d’accès de l’ordinateur. 6. Retirez le panneau avant. Si vous installez une unité dans un compartiment couvert par un cache protecteur, retirez ce dernier. Consultez Retrait des caches protecteurs à la page 62 pour plus d'informations. 7. Mettez en place quatre vis de guidage métriques M3 dans les trous inférieurs de chaque côté de l’unité. Huit vis de guidage métriques M3 supplémentaires sont fournies par HP à l’avant du châssis, sous le cache avant. Les vis de guidage métriques M3 sont noires. Reportez-vous à la section Installation et retrait de lecteurs à la page 74 pour une illustration de l’emplacement des vis de guidage métriques M3 supplémentaires. REMARQUE : Lorsque vous remplacez une unité de disque, placez les quatre vis M3 de l’ancienne unité sur la nouvelle. ATTENTION : Utilisez uniquement des vis de guidage de 5 mm de long. Des vis plus longues peuvent endommager les composants internes de l’unité. Figure 3-20 Installation des vis de guidage (unité optique illustrée) 78 Chapitre 3 Mises à niveau matérielles de la microtour (MT) 8. En veillant à aligner les têtes de vis sur les rainures de guidage, faites glisser l'unité dans son compartiment jusqu'à son enclenchement. Figure 3-21 Insertion des lecteurs dans leur compartiment 9. Connectez le cordon d'alimentation et le câble de données à l'unité comme indiqué par les illustrations suivantes. a. Si vous installez une unité optique, connectez le cordon d'alimentation (1) et le câble de données (2) à l'arrière de l'unité. REMARQUE : Le câble d'alimentation destiné aux lecteurs optiques est un câble à deux connecteurs acheminé de la carte mère jusqu'à l'arrière des baies de lecteur optique. Figure 3-22 Connexion des câbles d'unité optique Installation et retrait de lecteurs 79 b. Si vous installez un lecteur de cartes multimédia, connectez le câble USB au connecteur USB de la carte mère libellé MEDIA. Figure 3-23 Connexion du câble USB du lecteur de cartes multimédia 10. Si vous installez une nouvelle unité, connectez l'autre extrémité du câble de données au connecteur approprié de la carte mère. REMARQUE : Si vous installez un nouveau disque optique SATA, raccordez le câble de données du premier disque optique au connecteur SATA blanc de la carte système "SATA2". Raccordez le câble de données du second disque optique au connecteur SATA noir de la carte système "ESATA". Si le connecteur ESATA est déjà utilisé, raccordez le second disque optique au connecteur bleu clair "SATA1". Reportez-vous à Connexions de la carte mère à la page 64 pour obtenir une illustration des connecteurs de lecteurs de la carte mère. 11. Replacez le cache avant et le panneau d'accès de l'ordinateur. 12. Reconnectez le cordon d'alimentation et tous les périphériques externes, puis mettez l'ordinateur sous tension. 13. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d'accès. 80 Chapitre 3 Mises à niveau matérielles de la microtour (MT) Retrait d'un disque dur d'une baie de lecteur REMARQUE : Avant de retirer l’ancien disque dur, assurez-vous de sauvegarder ses données de manière à pouvoir les transférer sur le nouveau disque. 1. Retirez/désengagez tout périphérique de sécurité qui entrave l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d'arrêt du système d'exploitation, puis mettez l'ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d'alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l'état de mise sous tension, une tension est toujours présente sur la carte mère tant que l'ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d'alimentation pour éviter d'endommager les composants internes de l'ordinateur. 5. Retirez le panneau d’accès de l’ordinateur. 6. Déconnectez le cordon d'alimentation (1) et le câble de données (2) de l'arrière du disque dur. Figure 3-24 Déconnexion des câbles du disque dur Installation et retrait de lecteurs 81 7. Dégagez l'unité en éloignant le loquet de celle-ci (1) et en faisant glisser l'unité hors du compartiment (2). Figure 3-25 Retrait d'un disque dur 8. Ôtez les quatre vis, deux de chaque côté, de l'ancienne unité. Vous en aurez besoin lors de l'installation de la nouvelle unité. 82 Chapitre 3 Mises à niveau matérielles de la microtour (MT) Installation d’un disque dur dans une baie de lecteur interne REMARQUE : Le système ne prend pas en charge les disques durs ATA parallèle (PATA). 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Retirez le panneau d’accès. 6. Installez des vis de guidage sur les côtés du lecteur. Si vous installez un disque 2,5 pouces, vous devez installer le disque dans un support adaptateur. REMARQUE : Le disque dur utilise des vis de guidage d’isolation 6-32. Quatre vis de guidage supplémentaires sont installées à l’extérieur des baies de disque dur. Les vis de guidage d’isolation fournies par HP sont de couleur argent et bleue. Reportez-vous à la section Installation et retrait de lecteurs à la page 74 pour une illustration de l’emplacement des vis de guidage d’isolation 6-32 supplémentaires. Si vous remplacez une unité de disque, placez les vis de l'ancienne unité sur la nouvelle. ● Si vous installez un disque dur au format 3,5 pouces, installez quatre vis de guidage d'isolation (deux de chaque côté du lecteur). Figure 3-26 Installation des vis de guidage d'isolation sur un lecteur3,5 pouces Installation et retrait de lecteurs 83 ● Si vous installez un disque dur au format 2,5 pouces : ◦ Faites glisser le disque dans le support d'adaptation de la baie, en vous assurant que le connecteur du disque est complètement inséré dans le connecteur du support d'adaptation. Figure 3-27 Insertion du disque 2,5 pouces dans le support d'adaptation ◦ Fixez le disque sur le support d'adaptation de la baie en installant quatre vis pour support d'adaptation M3 noires sur les côtés du support dans le disque. Figure 3-28 Fixation du disque sur le support d'adaptation 84 Chapitre 3 Mises à niveau matérielles de la microtour (MT) ◦ Installez quatre vis de guidage pour support d'isolation 6-32 de couleur argent et bleue sur le support d'adaptation (deux de chaque côté du support). Figure 3-29 Installation des vis de guidage pour support d'isolation sur le support d'adaptation 7. Faites glisser le disque dans le compartiment d’unité en veillant à aligner les vis de guidage avec les ouvertures correspondantes jusqu’à ce que le disque s’emboîte. Le compartiment inférieur est destiné au disque dur principal. Le compartiment supérieur est destiné au disque dur secondaire en option. Figure 3-30 Installation d'un disque dur dans le compartiment d'unité Installation et retrait de lecteurs 85 8. Connectez le cordon d'alimentation (1) et le câble de données (2) à l'arrière du disque dur. REMARQUE : Le câble d'alimentation destiné aux disques durs est un câble à deux connecteurs acheminé de la carte mère jusqu'à l'arrière des baies de disque dur. Figure 3-31 Connexion des câbles du disque dur 9. Si vous installez une nouvelle unité, connectez l'autre extrémité du câble de données au connecteur approprié de la carte mère. REMARQUE : Si le système est équipé d'un seul disque dur SATA, le câble de données du disque dur doit être raccordé au connecteur bleu foncé "SATA0" afin d'éviter toute détérioration des performances du disque dur. Si vous ajoutez un second disque dur, raccordez le câble de données au connecteur bleu clair "SATA1". 10. Faites passer le cordon d'alimentation et le câble de données dans les dispositifs de retenue de câbles. 11. Remettez en place le panneau d'accès à l'ordinateur. 12. Reconnectez le cordon d'alimentation et tous les périphériques externes, puis mettez l'ordinateur sous tension. 13. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d'accès. Installation d'un dispositif antivol Les dispositifs de sécurité illustrés ci-dessous et aux pages suivantes peuvent être utilisés pour protéger l'ordinateur contre le vol. 86 Chapitre 3 Mises à niveau matérielles de la microtour (MT) Câble antivol Figure 3-32 Installation d'un câble de sécurité Cadenas Figure 3-33 Installation d'un cadenas Installation d'un dispositif antivol 87 Verrou de sécurité HP Business PC 1. Attachez le câble de sécurité en l’enroulant autour d’un objet statique. Figure 3-34 Fixation du câble à un objet fixe 2. Insérez le câble antivol dans la fente pour câble antivol située à l'arrière du moniteur, puis fixez le verrou sur le moniteur en insérant la clé dans la serrure située à l'arrière du verrou et en tournant la clé de 90 degrés. Figure 3-35 Installation du câble antivol sur le moniteur 88 Chapitre 3 Mises à niveau matérielles de la microtour (MT) 3. Insérez le câble de sécurité dans le trou du câble antivol situé à l'arrière du moniteur. Figure 3-36 Sécurisation du moniteur 4. Utilisez le support de montage fourni dans le kit pour sécuriser d'autres unités périphériques en introduisant le câble du périphérique dans le centre du support (1) et en insérant le câble de sécurité dans l'un des deux trous du support de montage (2). Utilisez le trou du support de montage sécurisant le mieux le câble de l'unité périphérique. Figure 3-37 Sécurisation des unités périphériques (imprimante présentée) Installation d'un dispositif antivol 89 5. Enfilez les câbles du clavier et de la souris dans le verrou du châssis de l'ordinateur. Figure 3-38 Passage des câbles du clavier et de la souris 6. Vissez le verrou au châssis dans le trou de la vis à ailettes à l'aide de la vis fournie. Figure 3-39 Fixation du verrou sur le châssis 90 Chapitre 3 Mises à niveau matérielles de la microtour (MT) 7. Insérez la prise du câble de sécurité dans le verrou (1) et enfoncez le bouton (2) pour fermer le verrou. Utilisez la clé fournie pour ouvrir le verrou. Figure 3-40 Fermeture du dispositif antivol 8. Une fois l'opération terminée, tous les périphériques dans votre station de travail sont sécurisés. Figure 3-41 Station de travail sécurisée Sécurité du panneau avant Le cache avant peut s’enclencher à l’aide d’une vis de sécurité fournie par HP. Pour installer la vis de sécurité : 1. Retirez/dégagez tout périphérique de sécurité qui gêne l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. Installation d'un dispositif antivol 91 3. Mettez l'ordinateur hors tension sans risque via le système d'exploitation, puis mettez les périphériques externes hors tension. 4. Débranchez le cordon d'alimentation de la prise électrique, puis débranchez tout périphérique externe. ATTENTION : Quel que soit l'état de mise sous tension, une tension est toujours présente sur la carte mère tant que le système est branché sur une prise secteur active. Vous devez débrancher le cordon d'alimentation pour éviter d'endommager les composants internes de l'ordinateur. 5. Retirez le panneau d'accès et le panneau avant. 6. Enlevez la vis de sécurité de l’intérieur du cache avant. Figure 3-42 Réinstallation de la vis de sécurité du cache avant 7. Remplacez le panneau avant. 92 Chapitre 3 Mises à niveau matérielles de la microtour (MT) 8. Installez la vis dans le cache avant par l’avant du châssis dans le panneau avant. Le trou de vis se situe au milieu du bord droit du châssis, entre le compartiment de disque dur et le hautparleur. Figure 3-43 Installation de la vis de sécurité du cache avant 9. Remplacer le panneau d'accès. 10. Rebranchez le cordon d'alimentation et mettez l'ordinateur sous tension. 11. Verrouillez tout périphérique de sécurité qui aurait pu bouger lors du retrait du panneau d'accès. Installation d'un dispositif antivol 93 4 Mise à niveau du matériel de l'ordinateur compact (SFF) Fonctionnalités de maintenance L’ordinateur possède des fonctions facilitant sa mise à niveau et son entretien. La plupart des procédures d’installation décrites dans ce chapitre ne nécessitent aucun outil. Avertissements et précautions Avant de procéder aux mises à niveau, veillez à lire attentivement les instructions, les avertissements et les précautions applicables mentionnés dans ce manuel. AVERTISSEMENT ! Afin d'éviter tout risque de blessures dues à un choc électrique, à des surfaces chaudes ou à un incendie : Débranchez le cordon d'alimentation de la prise murale et laissez refroidir les composants du système interne avant de les toucher. Ne branchez pas de connecteurs de télécommunication ou de téléphone sur les prises de carte réseau. Ne désactivez pas la fiche de mise à la terre du cordon d'alimentation. La mise à la terre est une caractéristique de sécurité importante Branchez le cordon d'alimentation dans une prise mise à la terre à laquelle vous pouvez facilement accéder à tout moment. Pour réduire les risques de blessures graves, lisez le Guide de sécurité et ergonomie du poste de travail. Ce manuel explique comment agencer correctement un poste de travail et quelle posture les utilisateurs d'ordinateurs doivent adopter pour travailler de manière ergonomique. Il contient également d’importantes informations sur la sécurité électrique et mécanique. Ce manuel est disponible sur le Web à l’adresse http://www.hp.com/ergo. AVERTISSEMENT ! Cet ordinateur contient des pièces sous tension et amovibles. Débranchez le cordon d'alimentation avant de retirer le boîtier. Remettez le boîtier en place et fixez-le avant d'alimenter l'équipement. ATTENTION : L’électricité statique peut endommager les composants électriques de l’ordinateur ou de l’équipement en option. Il est conseillé de toucher un objet métallique relié à la terre avant de commencer l'installation. Consultez Décharges électrostatiques à la page 173 pour plus d'informations. Lorsque l'ordinateur est branché sur le secteur, la carte mère est sous tension. Vous devez débrancher le cordon d’alimentation de la source d’alimentation avant d’ouvrir l’ordinateur pour éviter toute détérioration des composants internes. 94 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) Retrait du panneau d'accès à l'ordinateur Pour accéder aux composants internes, vous devez enlever le panneau d’accès : 1. Retirez/dégagez tout périphérique de sécurité qui gêne l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Mettez l'ordinateur hors tension sans risque via le système d'exploitation, puis mettez les périphériques externes hors tension. 4. Débranchez le cordon d'alimentation de la prise électrique, puis débranchez tout périphérique externe. ATTENTION : Quel que soit l'état de mise sous tension, une tension est toujours présente sur la carte mère tant que le système est branché sur une prise secteur active. Vous devez débrancher le cordon d'alimentation pour éviter d'endommager les composants internes de l'ordinateur. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier et posez l’ordinateur sur une surface plane. 6. Soulevez la poignée du panneau d’accès (1) puis soulevez le panneau d’accès de l’ordinateur (2). Figure 4-1 Retrait du panneau d'accès de l'ordinateur Retrait du panneau d'accès à l'ordinateur 95 Remise en place du panneau d'accès à l'ordinateur Faites glisser l’onglet situé à l’avant du panneau d’accès sous l’onglet situé à l’avant du châssis (1), puis appuyez l’arrière du panneau d’accès dans l’appareil jusqu’à ce qu’il s’emboîte (2). Figure 4-2 Remise en position du panneau d'accès de l'ordinateur 96 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) Retrait du panneau avant 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier et posez l’ordinateur sur une surface plane. 6. Retirez le panneau d’accès de l’ordinateur. 7. Soulevez les trois onglets sur le côté du cache avant (1), puis faites pivoter le cache avant pour le retirer du châssis (2). Figure 4-3 Retrait du panneau avant Retrait des caches protecteurs Sur certains modèles, des caches protecteurs recouvrent les baies de lecteur 3,5 et 5,25 pouces. Ces caches doivent être retirés avant d'installer un lecteur. Pour retirer un cache protecteur : 1. Retirez le panneau d'accès et le panneau avant. Retrait du panneau avant 97 2. Pour retirer un cache protecteur, poussez les languettes de fixation qui maintiennent le cache en place vers le bord extérieur droit du panneau (1) et faites glisser le cache vers l'arrière et vers la droite pour le retirer (2). Figure 4-4 Retrait d'un cache protecteur 98 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) Remise en place du panneau avant Insérez les trois crochets en bas du cache avant dans les trous rectangulaires du châssis (1), puis faites pivoter le haut du cache avant dans le châssis (2) jusqu’à ce qu’il s’emboîte. Figure 4-5 Remise en position du cache avant Conversion de la configuration bureau en minitour L’ordinateur compact peut être positionné comme une tour à l’aide d’un socle pour tour en option que vous pouvez acheter auprès de HP. 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. Remise en place du panneau avant 99 5. Positionnez l’ordinateur de façon à ce que le côté droit soit orienté vers le bas et placez l’ordinateur sur le socle en option. Figure 4-6 Conversion du format de bureau en orientation tour REMARQUE : Pour stabiliser l’ordinateur en orientation tour, HP vous recommande d’utiliser un socle en option. 6. Reconnectez le cordon d’alimentation et tous les périphériques externes, puis mettez l’ordinateur sous tension. REMARQUE : Veillez à garder un espace libre de 10 cm tout autour de l’ordinateur. 7. Verrouillez tout périphérique de sécurité qui aurait pu bouger lors du retrait du panneau d'accès. Connexions de la carte mère Reportez-vous à l'illustration et au tableau suivants pour identifier les connecteurs de la carte mère. Figure 4-7 Connexions de la carte système 100 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) Tableau 4-1 Connexions de la carte système N Connecteur de la carte mère Étiquette de carte mère Couleur Composant 1 DIMM4 (canal A) DIMM4 blanc Module de mémoire 2 DIMM3 (canal A) DIMM3 noir Module de mémoire 3 DIMM2 (canal B) DIMM2 blanc Module de mémoire 4 DIMM1 (canal B) DIMM1 noir Module de mémoire 5 Alimentation SATAPWR1 noir (non utilisé) 6 Alimentation SATAPWR0 noir Disques durs et optiques SATA 7 SATA 3.0 SATA0 bleu foncé 1er disque dur 8 SATA 3.0 SATA1 bleu clair 2ème disque dur ou 2ème lecteur optique si un câble adaptateur ESATA est présent 9 SATA 2.0 SATA2 blanc 1er lecteur optique 10 eSATA ESATA noir Câble adaptateur eSATA ou 2ème lecteur optique 11 Port parallèle PAR noir Port parallèle 12 Port série COMB noir Port série 13 USB MEDIA noir Périphérique USB tel qu'un lecteur de cartes multimédias 14 Verrou de la protection HLCK noir Verrou de la protection 15 Détecteur d'ouverture du capot HSENSE blanc Détecteur d'ouverture du capot 16 USB MEDIA2 noir Périphérique USB tel qu'un lecteur de cartes multimédias 17 PCI Express x1 X1PCIEXP1 noir Carte d'extension 18 PCI Express x16 rétrogradé en x4 X4PCIEXP blanc Carte d'extension 19 PCI Express x16 X16PCIEXP noir Carte d'extension 20 PCI PCI1 blanc Carte d'extension Connexions de la carte mère 101 Installation de mémoire supplémentaire L'ordinateur est fourni avec des modules DIMM (dual inline memory modules) de SDRAM (synchronous dynamic random access memory) DDR3 (double data rate 3). DIMM Les supports mémoire de la carte mère peuvent recevoir un maximum de quatre modules DIMM standard. À la livraison, ces connecteurs pour module mémoire accueillent au moins un DIMM préinstallé. Pour exploiter entièrement la prise en charge de mémoire, vous pouvez équiper la carte mère d'un maximum de 16 Go de mémoire dans une configuration hautes performances à deux canaux. DDR3-SDRAM DIMM ATTENTION : Ce produit NE prend PAS en charge la mémoire DDR3 Ultra Low Voltage (tension ultra faible) (DDR3U). Le processeur n'est pas compatible avec la mémoire DDR3U et si vous branchez de la mémoire DDR3U sur la carte mère, cela peut endommager physiquement le module DIMM ou provoquer un dysfonctionnement du système. Pour que le système fonctionne correctement, les modules mémoire DDR3-SDRAM DIMM doivent être : ● standard à 240 broches ● sans tampon, non-ECC PC3-12800 DDR3-1600 MHz ● 1,5 volt DDR3-SDRAM DIMM Les modules mémoire DDR3-SDRAM DIMM doivent également : ● prendre en charge une latence CAS 11 DDR3 1600 MHz (synchronisation 11-11-11) ● contenir les informations JEDEC SPD obligatoires En outre, l'ordinateur prend en charge : ● les technologies de mémoire non-ECC à 512 Mbits, 1 Gbit et 2 Gbits ● les modules DIMM monoface/double face. ● Modules DIMM conçus à partir de dispositifs DDR x8 et x16 ; Les modules DIMM conçus à partir de SDRAM x4 ne sont pas pris en charge REMARQUE : Le système ne fonctionnera pas correctement si vous installez des modules DIMM non pris en charge. 102 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) Remplissage des supports DIMM La carte mère est équipée de quatre supports DIMM, deux par canal. Ceux-ci sont identifiés DIMM1, DIMM2, DIMM3 et DIMM4. Les sockets DIMM1 et DIMM2 fonctionnent sur le canal mémoire B. Les sockets DIMM3 et DIMM4 fonctionnent sur le canal mémoire A. Le système fonctionnera automatiquement en mode canal unique, en mode double canal ou en mode flexible. Cela dépendra de l’installation des modules DIMM. ● Le système fonctionne en mode canal unique si les supports DIMM sont remplis dans un seul canal. ● Le système fonctionne en mode performant entrelacé à deux canaux si la capacité totale des modules DIMM du canal A est égale à celle des modules du canal B. Cependant, la technologie et la capacité des modules peuvent être différentes entre les deux canaux. Par exemple, si le canal A comporte deux modules DIMM de 1 Go et le canal B un module de 2 Go, le système fonctionnera en mode double canal. ● Le système fonctionnera en mode flexible si la capacité mémoire totale des modules DIMM du canal A n'est pas égale à la capacité mémoire totale des modules DIMM du canal B. En mode flexible, le canal occupé par le moins de mémoire représente la mémoire totale attribuée au double canal et la mémoire restante est attribuée au canal unique. Pour obtenir une vitesse optimale, les canaux doivent être équilibrés afin que la quantité la plus élevée de mémoire soit répartie entre les deux canaux. Si un canal dispose de plus de mémoire que l'autre, la plus grande capacité doit être attribuée au canal A. Par exemple, si vous occupez les sockets avec un module DIMM 2 Go et avec trois modules DIMM 1 Go, le canal A devra être occupé par le module DIMM 2 Go et par un module DIMM 1 Go. Le canal B devra être occupé par les deux autres modules DIMM 1 Go. Dans cette configuration, 4 Go sont exécutés en tant que double canal et 1 Go en tant que canal unique. ● Quel que soit le mode, la vitesse de fonctionnement maximale est déterminée par le module DIMM le plus lent du système. Installation des modules DIMM ATTENTION : Avant d'ajouter ou de retirer des modules mémoire, vous devez déconnecter le cordon d'alimentation et attendre environ 30 secondes pour éliminer toute énergie résiduelle. Quel que soit l'état de mise sous tension, une tension est toujours fournie aux modules mémoire tant que l'ordinateur est branché sur une prise secteur active. L'ajout ou le retrait de modules mémoire alors qu'une tension est toujours présente peut endommager de manière irrémédiable les modules mémoire ou la carte mère. Les supports de modules mémoire ont des contacts en métal doré. Lorsque vous mettez à niveau la mémoire, il est important d'utiliser des modules mémoire avec des contacts en métal doré pour éviter la corrosion et/ou l'oxydation due à l'incompatibilité des métaux en contact les uns avec les autres. L'électricité statique peut endommager les composants électroniques de l'ordinateur ou des cartes en option. Il est conseillé de toucher un objet métallique relié à la terre avant de commencer l'installation. Pour plus d'informations, reportez-vous à Décharges électrostatiques à la page 173. Lorsque vous manipulez un module de mémoire, ne touchez aucun contact, vous risqueriez d'endommager le module. 1. Retirez/dégagez tout périphérique de sécurité qui gêne l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Mettez l'ordinateur hors tension sans risque via le système d'exploitation, puis mettez les périphériques externes hors tension. Installation de mémoire supplémentaire 103 4. Débranchez le cordon d'alimentation de la prise électrique, puis débranchez tout périphérique externe. ATTENTION : Avant d'ajouter ou de retirer des modules mémoire, vous devez déconnecter le cordon d'alimentation et attendre environ 30 secondes pour éliminer toute énergie résiduelle. Quel que soit l'état de mise sous tension, une tension est toujours fournie aux modules mémoire tant que l'ordinateur est branché sur une prise secteur active. L'ajout ou le retrait de modules mémoire alors qu'une tension est toujours présente peut endommager de manière irrémédiable les modules mémoire ou la carte mère. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier. 6. Retirez le panneau d’accès de l’ordinateur. AVERTISSEMENT ! Afin d'éviter tout risque de blessures dues aux surfaces brûlantes, laissez les composants du système interne refroidir avant de les toucher. 7. Faites pivoter le boîtier du compartiment du lecteur interne vers le haut pour accéder aux supports des modules de mémoire sur la carte mère. Figure 4-8 Rotation de la cage d'unité vers le haut 104 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) 8. Ouvrez les deux loquets du support de module mémoire (1), puis insérez le module dans le support (2). Figure 4-9 Installation d'un DIMM REMARQUE : Un module mémoire ne peut être installé que d'une seule façon. Faites coïncider l'encoche située sur le module avec la patte du support de mémoire. Occupez les sockets DIMM noirs avant les blancs. Pour obtenir des performances maximales, occupez les sockets de façon à ce que la capacité mémoire soit répartie d'une manière aussi égale que possible entre le canal A et le canal B. Reportez-vous à Remplissage des supports DIMM à la page 103 pour plus d'informations. 9. Poussez le module dans le socket en vous assurant qu'il est complètement et correctement inséré. assurez-vous que les loquets sont en position fermée (3). 10. Répétez les étapes 8 et 9 pour installer les modules supplémentaires. 11. Remplacer le panneau d'accès. 12. Si l’ordinateur était sur un socle, replacez-le sur ce dernier. 13. Rebranchez le cordon d'alimentation et mettez l'ordinateur sous tension. 14. Verrouillez tout périphérique de sécurité qui aurait pu bouger lors du retrait du panneau d'accès. L'ordinateur devrait automatiquement détecter la mémoire supplémentaire la prochaine fois où vous l'allumerez. Installation de mémoire supplémentaire 105 Retrait ou installation d'une carte d'extension L'ordinateur possède un connecteur d'extension PCI, un connecteur d'extension PCI Express x1, un connecteur d'extension PCI Express x16 et un connecteur d'extension PCI Express x16 rétrogradé en connecteur x4. REMARQUE : Les supports pour cartes PCI et PCI Express sont uniquement compatibles avec les cartes de petit format. Vous pouvez installer une carte d’extension PCI Express x1, x4, x8 ou x16 dans le connecteur PCI Express x16. Pour les configurations à deux cartes graphiques, la première carte (principale) doit être installée dans le connecteur PCI Express x16 NON rétrogradé en connecteur x4. Pour retirer, remplacer ou ajouter une carte d’extension : 1. Retirez/dégagez tout périphérique de sécurité qui gêne l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Mettez l'ordinateur hors tension sans risque via le système d'exploitation, puis mettez les périphériques externes hors tension. 4. Débranchez le cordon d'alimentation de la prise électrique, puis débranchez tout périphérique externe. ATTENTION : Quel que soit l'état de mise sous tension, une tension est toujours présente sur la carte mère tant que le système est branché sur une prise secteur active. Vous devez débrancher le cordon d'alimentation pour éviter d'endommager les composants internes de l'ordinateur. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier. 6. Retirez le panneau d’accès de l’ordinateur. 7. Recherchez un connecteur d'extension libre et approprié sur la carte mère et le connecteur d'extension correspondant à l'arrière du châssis de l'ordinateur. 106 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) 8. Ouvrez le dispositif de blocage des obturateurs de support PCI en soulevant le levier vert et en faisant pivoter le dispositif en position ouverte. Figure 4-10 Ouverture du dispositif de retenue 9. Avant d'installer une carte d'extension, retirez le cache de carte d'extension ou la carte d'extension existante. REMARQUE : Avant de retirer une carte d’extension déjà installée, débranchez tous les câbles qui y sont rattachés. a. Si vous installez une carte d'extension dans un connecteur libre, vous devez ôter le cache obturateur correspondant à l'arrière du châssis, Ôtez le cache obturateur à la verticale puis mettez-le à l'extérieur du châssis. Figure 4-11 Retrait d'un cache de carte d'extension Retrait ou installation d'une carte d'extension 107 b. Si vous retirez une carte PCI standard ou PCI Express x1, tenez-la à chaque extrémité et faites-la délicatement basculer d’avant en arrière jusqu’à ce qu’elle sorte de son support. Tirez la carte d’extension hors du support à la verticale (1), puis retirez-la complètement du châssis (2). Veillez à ne pas rayer par mégarde d'autres composants avec la carte. Figure 4-12 Retrait d’une carte d’extension PCI standard c. Si vous retirez une carte PCI Express x16, éloignez le bras de rétention situé à l'arrière du support d'extension de la carte et faites délicatement basculer la carte jusqu'à ce qu'elle sorte de son support. Tirez la carte d’extension hors du support à la verticale, puis retirez-la complètement du châssis. Veillez à ne pas rayer par mégarde d'autres composants avec la carte. Figure 4-13 Retrait d'une carte d'extension PCI Express x16 10. Conservez la carte retirée dans un emballage antistatique. 108 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) 11. Si vous n'installez pas de nouvelle carte, installez un cache de carte d'extension pour fermer le connecteur ouvert. ATTENTION : Après avoir retiré une carte d'extension, vous devez la remplacer par une nouvelle carte ou par un cache pour permettre le refroidissement des composants internes pendant leur fonctionnement. 12. Pour installer une nouvelle carte d’extension, tenez-la à la verticale du connecteur de la carte mère, puis déplacez-la vers l’arrière du châssis (1) de manière à aligner son support sur le connecteur prévu à l’arrière du châssis. Appuyez sur la carte pour l’insérer dans son connecteur sur la carte mère (2). Figure 4-14 Installation d'une carte d'extension REMARQUE : Lorsque vous installez une carte d'extension, appuyez fermement dessus pour que tout le connecteur s'emboîte correctement dans le logement de la carte d'extension. 13. Remettez en place le dispositif de blocage des cartes d’extension. Figure 4-15 Fermeture du dispositif de retenue Retrait ou installation d'une carte d'extension 109 14. Branchez les câbles externes à la carte installée, si besoin est. Branchez les câbles internes à la carte mère, si besoin est. 15. Remettez en place le panneau d’accès de l’ordinateur. 16. Si l’ordinateur était sur un socle, replacez-le sur ce dernier. 17. Rebranchez le cordon d'alimentation et mettez l'ordinateur sous tension. 18. Verrouillez tout périphérique de sécurité qui aurait pu bouger lors du retrait du panneau d'accès. 19. Reconfigurez l’ordinateur si nécessaire. Emplacement des unités Figure 4-16 Emplacements des unités Tableau 4-2 Emplacements des unités 1 Compartiment de disque dur interne 3,5 pouces 2 Baie de lecteur 3.5 pouces pour les lecteurs en option (lecteur de cartes multimédia illustré) 3 Baie de lecteur 5,25 pouces pour les lecteurs en option (lecteur optique illustré) REMARQUE : La configuration du lecteur sur votre ordinateur peut être différente de la configuration affichée ci-dessus. Pour vérifier le type et la taille des périphériques de stockage installés dans l’ordinateur, exécutez l’utilitaire Computer Setup. 110 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) Installation et retrait de lecteurs Lors de l'installation de lecteurs supplémentaires, suivez ces consignes : ● Le disque dur Serial ATA principal (SATA) doit être raccordé au connecteur SATA bleu foncé principal de la carte système "SATA0". Si vous ajoutez un second disque dur, raccordez-le au connecteur bleu clair de la carte système "SATA1". ● Connectez un lecteur optique SATA au connecteur SATA blanc libellé SATA2 sur la carte mère. ● Connectez un câble adaptateur eSATA en option au connecteur SATA noir sur la carte mère. ● Connectez un câble USB de lecteur de cartes multimédias au connecteur USB de la carte mère libellé MEDIA. ● Le câble d'alimentation pour les lecteurs SATA est un câble trois connecteurs branché sur la carte mère, le premier connecteur raccordé à l'arrière du disque dur, le second connecteur à l'arrière du disque 3.5 po., et le troisième connecteur à l'arrière du lecteur optique 5.25 po. ● Le système ne prend pas en charge les unités optiques, ni les disques durs PATA. ● Vous devez installer des vis de guidage pour garantir le bon alignement et l’emboîtement du lecteur dans la cage d’unité. HP a fourni des vis de guidage supplémentaires pour les baies de lecteurs (cinq vis standard 6-32 et quatre vis métriques M3), situées à l’avant du châssis, sous le cache avant. Les vis standard 6-32 sont nécessaires en cas de disque dur secondaire. Toutes les autres unités (excepté le disque dur principal) utilisent des vis métriques M3. Les vis métriques fournies par HP sont noires et les vis standard fournies par HP sont de couleur argent. Si vous procédez au remplacement du disque dur principal, vous devez retirer les quatre vis de guidage d’isolation 6-32 de couleur argent et bleu du disque que vous remplacez et les installer dans le nouveau disque. Figure 4-17 Emplacements des vis de guidage supplémentaires N Vis de guidage Périphérique 1 Vis métriques M3 noires Tous les lecteurs (sauf les disques durs primaires et secondaires) 2 Vis standard 6-32 de couleur argent Disque dur secondaire Au total, cinq vis standard 6-32 de couleur argent supplémentaires sont fournies. Quatre sont utilisées comme vis de guidage pour le disque dur secondaire. La cinquième vis est utilisée pour sécuriser le cache avant (pour plus d’informations, consultez Sécurité du panneau avant à la page 132). Installation et retrait de lecteurs 111 ATTENTION : Pour éviter toute perte de travail et endommagement de l'ordinateur ou de l'unité : Si vous insérez ou retirez une unité, arrêtez le système d'exploitation correctement, mettez l'ordinateur hors tension et débranchez le cordon d'alimentation. Ne retirez jamais une unité pendant que l'ordinateur est sous tension ou en mode Veille. Il est conseillé de toucher un objet métallique relié à la terre avant de manipuler une unité. Évitez de toucher les connecteurs lorsque vous manipulez une unité. Pour savoir comment éviter les dommages dus à l’électricité statique, reportez-vous à la section Décharges électrostatiques à la page 173. Manipulez vos unités de disques délicatement ; Ne le laissez jamais tomber. Ne forcez pas lorsque vous tentez d'insérer une unité. Évitez d'exposer un disque dur aux liquides, températures extrêmes ou produits qui ont des champs magnétiques, par exemple un moniteur ou un hautparleur. Si une unité doit être expédiée, enveloppez-la dans du papier à bulles ou utilisez un conditionnement approprié et indiquez sur le paquet qu'il est fragile et doit être manipulé avec précaution. 112 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) Retrait d'un lecteur 5,25 pouces d'une baie de lecteur ATTENTION : Tous les supports amovibles doivent être retirés d'une unité avant le retrait de celleci de l'ordinateur. 1. Retirez/dégagez tout périphérique de sécurité qui gêne l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Mettez l'ordinateur hors tension sans risque via le système d'exploitation, puis mettez les périphériques externes hors tension. 4. Débranchez le cordon d'alimentation de la prise électrique, puis débranchez tout périphérique externe. ATTENTION : Quel que soit l'état de mise sous tension, une tension est toujours présente sur la carte mère tant que le système est branché sur une prise secteur active. Vous devez débrancher le cordon d'alimentation pour éviter d'endommager les composants internes de l'ordinateur. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier. 6. Retirez le panneau d’accès de l’ordinateur. 7. Redressez le compartiment d’unité en le faisant pivoter. Figure 4-18 Rotation de la cage d'unité vers le haut Installation et retrait de lecteurs 113 8. Si vous retirez un lecteur optique, déconnectez le cordon d'alimentation (1) et le câble de données (2) à l'arrière du lecteur optique. ATTENTION : Lorsque vous déconnectez un câble, tirez sur son connecteur et pas sur le câble lui-même, car vous pourriez l’endommager. Figure 4-19 Débranchement des câbles d'alimentation et de données 9. En le faisant pivoter, abaissez le compartiment d’unité en position normale. ATTENTION : Veillez à ne pas coincer les câbles en abaissant le compartiment d’unité de disque. Figure 4-20 Rotation de la cage de lecteurs vers le bas 114 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) 10. Appuyez sur le bouton vert de retenue situé à gauche de l'unité pour la désengager du compartiment d'unité (1). Tout en appuyant sur le bouton de retenue, faites coulisser l'unité vers l'arrière jusqu'à ce qu'elle se bloque, puis soulevez-la à la verticale hors de son compartiment (2). Figure 4-21 Retrait de l’unité de 5,25 pouces Installation d'un lecteur 5,25 pouces dans une baie de lecteur 1. Retirez/dégagez tout périphérique de sécurité qui gêne l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Mettez l'ordinateur hors tension sans risque via le système d'exploitation, puis mettez les périphériques externes hors tension. 4. Débranchez le cordon d'alimentation de la prise électrique, puis débranchez tout périphérique externe. ATTENTION : Quel que soit l'état de mise sous tension, une tension est toujours présente sur la carte mère tant que le système est branché sur une prise secteur active. Vous devez débrancher le cordon d'alimentation pour éviter d'endommager les composants internes de l'ordinateur. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier. 6. Retirez le panneau d’accès de l’ordinateur. 7. Si vous installez une unité dans un compartiment couvert par un cache protecteur, retirez le cache avant, puis le cache protecteur. Consultez Retrait des caches protecteurs à la page 97 pour plus d'informations. Installation et retrait de lecteurs 115 8. Mettez en place quatre vis de guidage métriques M3 dans les trous inférieurs de chaque côté de l’unité. Quatre vis de guidage métriques M3 supplémentaires sont fournies par HP à l’avant du châssis, sous le cache avant. Les vis de guidage métriques M3 sont noires. Reportez-vous à la section Installation et retrait de lecteurs à la page 111 pour une illustration de l’emplacement des vis de guidage métriques M3 supplémentaires. REMARQUE : Lors du remplacement d’un lecteur, placez les quatre vis de guidage métrique M3 de l’ancien sur le nouveau. ATTENTION : Utilisez uniquement des vis de guidage de 5 mm de long. Des vis plus longues peuvent endommager les composants internes de l’unité. Figure 4-22 Installation des vis de guidage dans le disque optique 9. Placez les vis de guidage sur l’unité dans les connecteurs J du compartiment de l’unité. Faites ensuite glisser l’unité vers l’avant de l’ordinateur pour la bloquer. Figure 4-23 Installation d’une unité optique 116 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) 10. Redressez le compartiment d’unité en le faisant pivoter. Figure 4-24 Redressement du compartiment d’unité de disque 11. Connectez le câble de données SATA au connecteur SATA blanc libellé SATA2 sur la carte mère. 12. Faites passer le câble de données dans les guides de câbles. ATTENTION : Il existe deux guides de câbles qui empêchent le câble de données d’être pincé par le compartiment lors de son soulèvement ou abaissement. L’un est situé sur le côté inférieur du compartiment. L’autre est situé sur le cadre du châssis, sous le compartiment. Assurez-vous que le câble de données passe via ces guides avant de le connecter à l’unité optique. 13. Connectez le cordon d’alimentation (1) et le câble de données (2) à l’arrière de l’unité optique. REMARQUE : Le câble d'alimentation du lecteur optique est un câble à trois connecteurs qui va de la carte mère au disque dur, puis à l'arrière du lecteur optique. Figure 4-25 Branchement du câble d’alimentation et du câble de données Installation et retrait de lecteurs 117 14. En le faisant pivoter, abaissez le compartiment d’unité en position normale. ATTENTION : Veillez à ne pas coincer les câbles en abaissant le compartiment d’unité de disque. Figure 4-26 Remise en position normale du compartiment d’unité de disque 15. Remettez en place le panneau avant (s'il a été retiré) et le panneau d'accès. 16. Si l’ordinateur était sur un socle, replacez-le sur ce dernier. 17. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 18. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d’accès. Retrait d'un lecteur 3.5 pouces d'une baie de lecteur ATTENTION : Avant de retirer une unité de l’ordinateur, veillez à ce qu’elle ne contienne pas de support amovible. L’unité de 3,5 pouces se situe sous l’unité de 5,25 pouces. Vous devez retirer le lecteur 5,25 pouces avant de retirer le lecteur 3,5 pouces. 1. Suivez la procédure de la section Retrait d'un lecteur 5,25 pouces d'une baie de lecteur à la page 113 pour retirer le lecteur 5.25 pouces et accéder au lecteur 3,5 pouces. ATTENTION : Assurez-vous que l’ordinateur est arrêté et que le cordon d’alimentation est débranché de la prise électrique avant de commencer. 118 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) 2. Débranchez les câbles de l’arrière de l’unité ou, si vous retirez un lecteur de cartes multimédia, déconnectez le câble USB de la carte mère comme indiqué sur les illustrations suivantes. Figure 4-27 Déconnexion du câble USB du lecteur de cartes multimédias 3. Appuyez sur le bouton vert de retenue situé à gauche de l’unité pour la désengager du compartiment d’unité (1). Tout en appuyant sur le bouton de retenue, faites coulisser l’unité vers l’arrière jusqu’à ce qu’elle se bloque, puis soulevez-la à la verticale hors de son compartiment (2). Figure 4-28 Retrait d’une unité de 3,5 pouces (lecteur de cartes multimédia illustré) Installation d'un lecteur 3.5 pouces dans une baie de lecteur Le compartiment de 3,5 pouces se situe sous l’unité de 5,25 pouces. Pour installer une unité dans le compartiment de 3,5 pouces : Installation et retrait de lecteurs 119 REMARQUE : Pour un alignement correct et le blocage de l’unité dans la cage, vous devez installer des vis de guidage. HP a fourni des vis de guidage supplémentaires pour les baies de lecteurs (quatre vis standard 6-32 et quatre vis métriques M3), situées à l’avant du châssis, sous le cache avant. Les disques durs secondaires nécessitent des vis 6-32 standard. Toutes les autres unités (excepté le disque dur principal) utilisent des vis métriques M3. Les vis métriques M3 fournies par HP sont noires et les vis standard 6-32 fournies par HP sont de couleur argent. Reportez-vous à la section Installation et retrait de lecteurs à la page 111 pour une illustration des emplacements des vis de guidage. 1. Suivez la procédure de la section Retrait d'un lecteur 5,25 pouces d'une baie de lecteur à la page 113 pour retirer l’unité de 5.25 pouces et accéder au compartiment d’unité de 3,5 pouces. ATTENTION : Assurez-vous que l’ordinateur est arrêté et que le cordon d’alimentation est débranché de la prise électrique avant de commencer. 2. Si vous installez une unité dans un compartiment couvert par un cache protecteur, retirez le cache avant, puis le cache protecteur. Pour plus d’informations, reportez-vous à la section Retrait des caches protecteurs à la page 97. 3. Installez les vis de guidage dans les orifices de chaque côté du lecteur. Figure 4-29 Installation des guides de vidage (lecteur de cartes multimédia illustré) 4. Placez les vis de guidage sur l’unité dans les connecteurs J du compartiment de l’unité. Faites ensuite glisser l’unité vers l’avant de l’ordinateur pour la bloquer. Figure 4-30 Installation d’une unité dans le compartiment d’unité de 3,5 pouces (lecteur de cartes multimédia illustré) 120 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) 5. Connectez les câbles d’unité appropriés : a. Si vous installez un second disque dur, raccordez le câble d'alimentation (1) et le câble de données (2) à l'arrière du disque, puis raccordez l'autre extrémité du câble de données au connecteur bleu clair de la carte système "SATA1". Figure 4-31 Branchement du câble d’alimentation et du câble de données du deuxième disque dur b. Si vous installez un lecteur de cartes multimédias, connectez son câble USB au connecteur USB de la carte mère libellé MEDIA. Figure 4-32 Connexion du câble USB du lecteur de cartes multimédia REMARQUE : Reportez-vous à Connexions de la carte mère à la page 100 pour obtenir une illustration des connecteurs de lecteurs de la carte mère. 6. Repositionnez l’unité de 5,25 pouces. 7. Remettez en place le panneau avant (s'il a été retiré) et le panneau d'accès. 8. Si l’ordinateur était sur un socle, replacez-le sur ce dernier. Installation et retrait de lecteurs 121 9. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 10. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d’accès. 122 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) Retrait et remplacement du disque dur interne 3,5 pouces principal REMARQUE : Avant de retirer l’ancien disque dur, assurez-vous de sauvegarder ses données de manière à pouvoir les transférer sur le nouveau disque. Le disque dur 3,5 pouces préinstallé est situé sous le bloc d’alimentation. Pour enlever et remettre en place le disque dur : 1. Retirez/dégagez tout périphérique de sécurité qui gêne l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Mettez l'ordinateur hors tension sans risque via le système d'exploitation, puis mettez les périphériques externes hors tension. 4. Débranchez le cordon d'alimentation de la prise électrique, puis débranchez tout périphérique externe. ATTENTION : Quel que soit l'état de mise sous tension, une tension est toujours présente sur la carte mère tant que le système est branché sur une prise secteur active. Vous devez débrancher le cordon d'alimentation pour éviter d'endommager les composants internes de l'ordinateur. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier. 6. Retirez le panneau d’accès de l’ordinateur. 7. Redressez le compartiment pour les unités internes. Figure 4-33 Redressement du compartiment d’unité de disque Installation et retrait de lecteurs 123 8. Redressez le bloc d’alimentation en le faisant pivoter. Le disque dur se trouve sous le bloc d’alimentation. Figure 4-34 Redressement du bloc d’alimentation 9. Débranchez le câble d’alimentation (1) et le câble de données (2) de l’arrière du disque dur. Figure 4-35 Déconnexion des câbles du disque dur 124 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) 10. Appuyez sur le loquet de dégagement vert situé à côté du disque dur (1). Tout en appuyant sur le loquet, faites glisser l’unité vers l’avant jusqu’à l’arrêt et soulevez-la pour la sortir du compartiment (2). Figure 4-36 Retrait du disque dur 11. Pour installer un disque dur, vous devez retirer les quatre vis de guidage d’isolation argentées et bleues de l’ancien disque dur et les installer sur le nouveau disque dur. Figure 4-37 Installation des vis de guidage de disque dur Installation et retrait de lecteurs 125 12. Alignez les vis de guidage avec les connecteurs du compartiment d’unité du châssis, enfoncez le disque dur dans le compartiment, puis faites-le glisser en arrière jusqu’à ce qu’il s’arrête et s’enclenche. Figure 4-38 Installation du disque dur 13. Connectez le cordon d'alimentation (1) et le câble de données (2) à l'arrière du disque dur. REMARQUE : Si le système est équipé d’un seul disque dur SATA, le câble de données doit être raccordé au connecteur SATA0 bleu foncé de la carte mère pour éviter toute détérioration des performances de disque dur. Figure 4-39 Connexion des câbles du disque dur 14. Faites pivoter le compartiment pour les unités internes et abaissez l'alimentation à leurs positions normales. 15. Remettez en place le panneau d’accès. 16. Si l’ordinateur était sur un socle, replacez-le sur ce dernier. 17. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 18. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d’accès. 126 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) Installation d’un dispositif antivol Les dispositifs de sécurité illustrés ci-dessous et aux pages suivantes peuvent être utilisés pour protéger l’ordinateur contre le vol. Câble antivol Figure 4-40 Installation d’un câble de sécurité Installation d’un dispositif antivol 127 Cadenas Figure 4-41 Installation d’un cadenas Verrou de sécurité HP Business PC 1. Attachez le câble de sécurité en entourant un objet fixe. Figure 4-42 Fixation du câble autour d'un objet fixe 128 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) 2. Insérez le câble antivol dans la fente pour câble antivol située à l'arrière du moniteur, puis fixez le verrou sur le moniteur en insérant la clé dans la serrure située à l'arrière du verrou et en tournant la clé de 90 degrés. Figure 4-43 Installation du câble antivol sur le moniteur 3. Insérez le câble de sécurité dans le trou du câble antivol situé à l'arrière du moniteur. Figure 4-44 Sécurisation du moniteur Installation d’un dispositif antivol 129 4. Utilisez le support de montage fourni dans le kit pour sécuriser d'autres unités périphériques en introduisant le câble du périphérique dans le centre du support (1) et en insérant le câble de sécurité dans l'un des deux trous du support de montage (2). Utilisez le trou du support de montage sécurisant le mieux le câble de l'unité périphérique. Figure 4-45 Sécurisation des unités périphériques (imprimante présentée) 5. Enfilez les câbles du clavier et de la souris dans le verrou du châssis de l'ordinateur. Figure 4-46 Enfilage des câbles du clavier et de la souris 130 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) 6. Vissez le verrou au châssis dans le trou de la vis à ailettes à l'aide de la vis fournie. Figure 4-47 Fixation du verrou au châssis 7. Insérez le côté prise du câble de sécurité dans le verrou (1) et poussez le bouton (2) pour engager le verrou. Utilisez la clé fournie pour désengager le verrou. Figure 4-48 Engagement du verrou Installation d’un dispositif antivol 131 8. Une fois l'opération terminée, tous les périphériques dans votre station de travail sont sécurisés. Figure 4-49 Station de travail sécurisée Sécurité du panneau avant Le cache avant peut s’enclencher à l’aide d’une vis de sécurité fournie par HP. Pour installer la vis de sécurité : 1. Retirez/dégagez tout périphérique de sécurité qui gêne l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Mettez l'ordinateur hors tension sans risque via le système d'exploitation, puis mettez les périphériques externes hors tension. 4. Débranchez le cordon d'alimentation de la prise électrique, puis débranchez tout périphérique externe. ATTENTION : Quel que soit l'état de mise sous tension, une tension est toujours présente sur la carte mère tant que le système est branché sur une prise secteur active. Vous devez débrancher le cordon d'alimentation pour éviter d'endommager les composants internes de l'ordinateur. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier. 6. Retirez le panneau d'accès et le panneau avant. 132 Chapitre 4 Mise à niveau du matériel de l'ordinateur compact (SFF) 7. Enlevez l’une des cinq vis standard 6-32 de couleur argent situées à l’avant du châssis, derrière la face avant. Figure 4-50 Réinstallation de la vis de sécurité du cache avant 8. Remplacez le panneau avant. 9. Installez la vis de sécurité à côté de la patte de fixation située au milieu du cache avant afin de fixer le cache avant. Figure 4-51 Installation de la vis de sécurité du cache avant 10. Remplacer le panneau d'accès. 11. Si l’ordinateur était sur un socle, replacez-le sur ce dernier. 12. Rebranchez le cordon d'alimentation et mettez l'ordinateur sous tension. 13. Verrouillez tout périphérique de sécurité qui aurait pu bouger lors du retrait du panneau d'accès. Installation d’un dispositif antivol 133 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) Fonctionnalités de maintenance L’ordinateur possède des fonctions facilitant sa mise à niveau et son entretien. La plupart des procédures d’installation décrites dans ce chapitre ne nécessitent aucun outil. Avertissements et précautions Avant toute mise à niveau, suivez scrupuleusement toutes les instructions s’y rapportant et n’oubliez pas de lire les notes d’avertissement et d’attention de ce manuel. AVERTISSEMENT ! Afin de réduire les risques de blessures ou un endommagement de l’équipement provenant de choc électrique, de surface à haute température ou d’incendie : Déconnectez le cordon d’alimentation de la prise setceur et laissez refroidir les éléments internes du système avant de les toucher. Ne branchez pas de connecteurs de téléphone ou de télécommunication sur les prises de carte réseau. Utilisez toujours la fiche de terre du cordon d’alimentation. La fiche de terre est un élément de sécurité important. Branchez le cordon d’alimentation sur une prise secteur avec conducteur de terre, accessible facilement. Pour éviter tout risque de blessure grave, lisez le manuel Sécurité et ergonomie du poste de travail. Ce manuel explique comment agencer correctement un poste de travail et comment s’installer confortablement devant un ordinateur. Il contient également d’importantes informations sur la sécurité électrique et mécanique. Ce manuel est disponible sur le Web à l’adresse http://www.hp.com/ergo. AVERTISSEMENT ! Cet ordinateur contient des pièces sous tension et amovibles. Débranchez le cordon d'alimentation avant de retirer le boîtier. Remettez le boîtier en place et fixez-le avant d'alimenter l'équipement. ATTENTION : L’électricité statique peut endommager les composants électriques de l’ordinateur ou de l’équipement en option. Il est conseillé de toucher un objet métallique relié à la terre avant de commencer l'installation. Consultez Décharges électrostatiques à la page 173 pour plus d'informations. Quand l’ordinateur est branché sur le secteur, la carte mère est sous tension. Vous devez déconnecter le cordon d’alimentation avant d’ouvrir l’ordinateur pour prévenir toute détérioration des composants internes. 134 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) Branchement du cordon d'alimentation Lorsque vous connectez l’alimentation, il est important de suivre les étapes ci-après pour vous assurer que le cordon d’alimentation ne se détache pas de l’ordinateur. 1. Connectez l’extrémité arrondie du cordon d’alimentation au connecteur d’alimentation situé à l’arrière de l’ordinateur (1). 2. Insérez le dispositif de retenue du cordon d’alimentation dans un logement de la ventilation pour empêcher que le cordon ne se débranche de l’ordinateur (2). 3. Assemblez l’excédent de cordon d’alimentation à l’aide du bracelet fourni (3). 4. Connectez la prise femelle de l’autre cordon d’alimentation dans le boîtier d’alimentation (4). 5. Connectez l’autre extrémité du cordon d’alimentation à une prise secteur (5). Figure 5-1 Connexion du cordon d’alimentation ATTENTION : Si vous ne sécurisez pas le câble d’alimentation à l’aide du dispositif de retenue, le cordon d’alimentation peut se débrancher et entraîner la perte de données. Branchement du cordon d'alimentation 135 Retrait du panneau d'accès à l'ordinateur Pour accéder aux composants internes, vous devez enlever le panneau d’accès : 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier et posez l’ordinateur sur une surface plane. 6. Desserrez la vis à l’arrière de l’ordinateur (1), faites glisser le panneau d’accès vers l’arrière de l’ordinateur, puis soulevez-le pour le retirer (2). Figure 5-2 Retrait du panneau d’accès de l’ordinateur 136 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) Remise en place du panneau d'accès à l'ordinateur 1. Alignez les languettes du panneau sur les fentes du châssis, puis faites glisser le panneau vers l’avant du châssis jusqu’à ce qu’il s’arrête (1). 2. Serrez la vis moletée pour fixer le panneau d'accès (2). Figure 5-3 Remise en place du panneau d'accès à l'ordinateur Remise en place du panneau d'accès à l'ordinateur 137 Retrait du panneau avant 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier et posez l’ordinateur sur une surface plane. 6. Retirez le panneau d’accès de l’ordinateur. 7. Soulevez les trois onglets sur le côté du cache avant (1), puis faites pivoter le cache avant pour le retirer du châssis (2). Figure 5-4 Retrait du cache avant Retrait d'un cache protecteur Sur certains modèles, un cache protecteur pour baie de lecteur interne qui doit être retiré avant d'installer un lecteur. Pour retirer un cache protecteur : 1. Retirez le panneau d'accès et le panneau avant. 138 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) 2. Pour retirer le cache protecteur, poussez les deux languettes de fixation du cache protecteur vers le côté extérieur gauche de ce dernier (1) et tirez-le vers l’intérieur pour le retirer (2). Figure 5-5 Retrait d’un cache protecteur Remise en place du panneau avant Insérez les trois crochets en bas du cache avant dans les trous rectangulaires du châssis (1), puis faites pivoter le haut du cache avant dans le châssis (2) jusqu’à ce qu’il s’emboîte. Figure 5-6 Remise en position du cache avant Remise en place du panneau avant 139 Conversion de la configuration bureau en minitour L'ordinateur de bureau Ultra-Slim peut être utilisé en configuration tour avec le socle pour tour fourni avec l'ordinateur. 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Positionnez l’ordinateur de façon à ce que le côté gauche soit orienté vers le bas et placez fermement l’ordinateur sur le socle. Figure 5-7 Placement de l’ordinateur sur le socle 6. Reconnectez l’équipement externe, branchez le cordon d’alimentation sur une prise électrique, puis remettez l’ordinateur sous tension. REMARQUE : Veillez à garder un espace libre de 10 cm tout autour de l’ordinateur. 7. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du capot ou du panneau d’accès de l’ordinateur. REMARQUE : Une équerre de montage de disque dur en option est disponible auprès de HP pour monter l’ordinateur au mur, sur un bureau ou un bras articulé. 140 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) Connexions de la carte mère Reportez-vous à l'illustration et au tableau suivants pour identifier les connecteurs de la carte mère. Figure 5-8 Connexions de la carte mère N Connecteur de la carte mère Étiquette de carte mère Couleur Composant 1 SATA 3.0 SATA1 bleu clair Lecteur optique 2 Alimentation SATA PWR1 blanc Lecteur optique 3 Module PCI Express Mobile MXM noir Carte graphique 4 Détecteur d'ouverture du capot HSENSE blanc Détecteur d'ouverture du capot 5 USB MEDIA noir Lecteur de cartes multimédia SD 6 Mini-carte PCI Express x1 X1PCIEXP1 noir Carte d'extension (par exemple, carte WLAN) 7 Mini-SATA mSATA blanc SSD ultra-fin Connexions de la carte mère 141 Installation de mémoire supplémentaire L’ordinateur est fourni avec des modules mémoire SODIMM DDR3-SDRAM. modules SODIMM Les supports de module mémoire de la carte mère peuvent recevoir au maximum deux modules SODIMM standard. À la livraison, ces supports de module mémoire accueillent au moins un SODIMM préinstallé. Pour exploiter entièrement la prise en charge de mémoire, vous pouvez équiper la carte mère d’un maximum de 8 Go de mémoire. Modules SODIMM DDR3-SDRAM ATTENTION : Ce produit NE prend PAS en charge la mémoire DDR3 Ultra Low Voltage (tension ultra faible) (DDR3U). Le processeur n'est pas compatible avec la mémoire DDR3U et si vous branchez de la mémoire DDR3U sur la carte mère, cela peut endommager physiquement le module SODIMM ou provoquer un dysfonctionnement du système. Pour le bon fonctionnement du système, les modules SODIMM doivent être du type suivant : ● standard à 204 broches ● sans tampon, non-ECC PC3-12800 DDR3-1600 MHz ● modules SODIMM DDR3-SDRAM de 1,5 volt Les modules SODIMM DDR3-SDRAM doivent également : ● prendre en charge une latence CAS 11 DDR3 1600 MHz (synchronisation 11-11-11) ● contenir les spécifications du JEDEC (Joint Electronic Device Engineering Council) De plus l’ordinateur doit prendre en charge : ● les technologies de mémoire non-ECC à 512 Mbits, 1 Gbit et 2 Gbits ● les modules SODIMMS à une face ou deux faces ● les modules SODIMM construits avec des puces x8 et x16 DDR ; les SODIMM construits avec des puces x4 SDRAM ne sont pas pris en charge REMARQUE : Le système ne fonctionnera pas correctement si vous installez des modules SODIMM non pris en charge. 142 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) Remplissage des supports SODIMM La carte mère est équipée de deux supports SODIMM, un par canal. Ces supports sont identifiés XMM1 et XMM3. Le support XMM1 correspond au canal de mémoire A ; le support XMM3 correspond au canal de mémoire B. Figure 5-9 Emplacement des supports SODIMM Tableau 5-1 Emplacement des supports SODIMM Repère Description Étiquette de carte mère Couleur du support 1 Support SODIMM1 canal B XMM1 Noir 2 Support SODIMM3 canal A XMM3 Noir Le système fonctionne automatiquement en mode à un canal, à deux canaux ou flexible, en fonction de la position des modules SODIMM. ● Le système fonctionne dans le mode à un canal si les modules SODIMM sont installés dans les supports d’un même canal. ● Le système fonctionne dans le mode performant entrelacé à deux canaux si la capacité totale des modules SODIMM du canal A est égale à celle des modules du canal B. ● Le système fonctionne en mode flexible entrelacé si la capacité totale des modules SODIMM du canal A n’est pas égale à celle des modules du canal B. En mode flexible, le canal doté de la quantité la plus faible de mémoire décrit la capacité totale de mémoire attribuée aux deux canaux et le reste est alloué à un canal unique. Si un canal dispose de plus de mémoire que l’autre, la plus grande quantité doit être attribuée au canal A. ● Dans chaque mode, le module SODIMM le plus lent du système détermine la vitesse maximum de fonctionnement. Installation de mémoire supplémentaire 143 Installation des barrettes SODIMM ATTENTION : Avant d'ajouter ou de retirer des modules mémoire, vous devez déconnecter le cordon d'alimentation et attendre environ 30 secondes pour éliminer toute énergie résiduelle. Quel que soit l'état de mise sous tension, une tension est toujours fournie aux modules mémoire tant que l'ordinateur est branché sur une prise secteur active. L'ajout ou le retrait de modules mémoire alors qu'une tension est toujours présente peut endommager de manière irrémédiable les modules mémoire ou la carte mère. Les supports des modules mémoire possèdent des contacts en or. Lors de la mise à niveau de la mémoire, il convient d’utiliser des modules DIMM avec des contacts en or, afin d’éviter les risques de corrosion et/ou d’oxydation pouvant résulter du contact de deux métaux incompatibles. L'électricité statique peut endommager les composants électroniques de l'ordinateur ou des cartes en option. Il est conseillé de toucher un objet métallique relié à la terre avant de commencer l'installation. Pour plus d'informations, reportez-vous à Décharges électrostatiques à la page 173. Lorsque vous manipulez un module mémoire, ne touchez aucun contact, car vous risqueriez d’endommager le module. 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Avant d’ajouter ou de retirer des modules mémoire, vous devez déconnecter le cordon d’alimentation et attendre environ 30 secondes pour éliminer toute énergie résiduelle. Quel que soit l’état de mise sous tension, une tension est toujours fournie aux modules mémoire tant que l’ordinateur est branché sur une prise secteur active. L’ajout ou le retrait de modules mémoire alors qu’une tension est toujours présente peut endommager de manière irrémédiable les modules mémoire ou la carte mère. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier et posez l’ordinateur sur une surface plane. 6. Retirez le panneau d’accès de l’ordinateur. 7. Repérez les supports des modules mémoire sur la carte mère. AVERTISSEMENT ! Afin d’éviter toute brûlure, il est conseillé de laisser refroidir les éléments internes du système avant de les toucher. 144 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) 8. Si vous retirez un module SODIMM, poussez les deux loquets de chaque côté du module SODIMM vers l'extérieur (1), puis tirez sur le module SODIMM pour le retirer du support (2). Figure 5-10 Retrait d’un module SODIMM 9. Faites glisser le nouveau module SODIMM dans le support à un angle de 30° (1), puis appuyez sur le module SODIMM (2) de façon à ce que les loquets le retiennent en place. Figure 5-11 Installation d’un module SODIMM REMARQUE : Un module mémoire ne peut être installé que dans un sens. Faites coïncider l’encoche du module avec la languette du support de mémoire. 10. Remettez en place le panneau d’accès. 11. Si l’ordinateur était sur un socle, replacez-le sur ce dernier. 12. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 13. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du capot ou du panneau d’accès de l’ordinateur. Installation de mémoire supplémentaire 145 L’ordinateur détecte automatiquement la mémoire ajoutée à sa prochaine mise sous tension. Remplacement de l’unité optique L’ordinateur de bureau ultra-plat utilise une unité optique SATA (Serial ATA) ultra-plate. Extraction d’une unité optique ATTENTION : Avant de retirer une unité de l’ordinateur, veillez à ce qu’elle ne contienne pas de support amovible. 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier et posez l’ordinateur sur une surface plane. 6. Retirez le panneau d'accès de l'ordinateur et le cache avant. 7. Débranchez les câbles de l'arrière de l'unité optique (1), appuyez sur le loquet de dégagement vert à l'arrière droit de l'unité vers le centre de l'unité (2), puis faites glisser l'unité vers l'avant et l'extérieur du compartiment en passant par le cache avant (3). ATTENTION : Lorsque vous déconnectez un câble, tirez sur son connecteur et pas sur le câble lui-même, car vous pourriez l’endommager. Figure 5-12 Extraction d’une unité optique 146 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) Préparation d’un nouveau lecteur optique Avant de pouvoir utiliser la nouvelle unité optique, le loquet de dégagement doit être fixé. 1. Décollez la bande adhésive du loquet de dégagement. 2. Sans permettre au loquet de dégagement de toucher l’unité optique, alignez les orifices sur le loquet de dégagement en orientant les broches sur le côté de l’unité optique. Assurez-vous que le loquet de dégagement est correctement orienté. 3. Insérez la broche à l’avant de l’unité optique dans l’orifice à l’arrière du loquet de dégagement et appuyez fermement. 4. Insérez la seconde broche, puis appuyez fermement sur le loquet entier pour le fixer sur l’unité optique. Figure 5-13 Alignement du loquet de dégagement Remplacement de l’unité optique 147 Installation d’un nouveau lecteur optique REMARQUE : Si vous installez une unité optique dans un compartiment qui ne contenait pas d’unité auparavant, vous devez retirer le panneau d’accès et le cache recouvrant l’ouverture du compartiment avant de commencer. Suivez les instructions des sections Retrait du panneau d'accès à l'ordinateur à la page 136 et Retrait d'un cache protecteur à la page 138. 1. Suivez les instructions du retrait du lecteur optique. Reportez-vous à Extraction d’une unité optique à la page 146. 2. Attachez le loquet de dégagement à la nouvelle unité optique. Reportez-vous à la section Préparation d’un nouveau lecteur optique à la page 147. 3. Tournez l’arrière de l’unité optique vers l’ordinateur et placez le loquet de dégagement vers l’intérieur de l’unité ; alignez l’unité sur l’ouverture du cache avant. 4. Faites glisser l’unité optique par le cache avant jusqu’au fond du compartiment de façon à ce qu’elle s’emboîte (1), puis branchez le câble à l’arrière de l’unité (2). Figure 5-14 Installation d’une unité optique 5. Remettez en place le panneau avant et le panneau d'accès. 6. Si l’ordinateur était sur un socle, replacez-le sur ce dernier. 7. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 8. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du capot ou du panneau d’accès de l’ordinateur. 148 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) Remise en position du disque dur REMARQUE : L'ordinateur de bureau Ultra-Slim MP 8000r prend en charge uniquement les disques durs internes de 2,5 pouces SATA (Serial ATA). Avant de retirer l’ancien disque dur, assurez-vous de sauvegarder ses données de manière à pouvoir les transférer sur le nouveau disque. Le disque dur 2,5 pouces est logé dans un support sous l’unité optique. 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier et posez l’ordinateur sur une surface plane. 6. Retirez le panneau d’accès de l’ordinateur. 7. Retirez l’unité optique. Reportez-vous à la section Extraction d’une unité optique à la page 146 pour plus d’instructions. 8. Appuyez sur le loquet de dégagement sur le côté gauche du support de disque dur (1), puis faites pivoter le levier du support vers la droite (2). Figure 5-15 Déverrouillage du support du disque dur Remise en position du disque dur 149 9. Soulevez le support du disque dur tout droit pour l’extraire du châssis. Figure 5-16 Retrait du support du disque dur 10. Retirez les quatre vis de guidage sur les côtés du support de disque dur. Figure 5-17 Retrait des vis de guidage 11. Soulevez le disque dur dans le support (1) et faites-le glisser hors de ce dernier (2). Figure 5-18 Retrait du disque dur du support 150 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) 12. Positionnez le disque dur de manière à ce que sa partie supérieure se trouve contre la partie supérieure du support (1) afin que la carte de circuit intégré qui se trouve sous le disque dur n’entre pas en contact avec les languettes de la partie inférieure du support, puis faites glisser le nouveau disque dur dans le support (2). ATTENTION : Veillez à ne pas rayer la carte de circuit intégrée sous le disque dur contre les languettes de la partie inférieure du support lorsque vous le faites glisser dans ce dernier. Cela pourrait endommager de manière irrémédiable le disque dur. Figure 5-19 Insertion du disque dur dans le support 13. Posez le disque dur dans la partie inférieure du support (1), puis replacez les quatre vis de guidage sur les côtés pour maintenir le disque dans le support (2). Figure 5-20 Positionnement du disque dur et réinstallation des vis de guidage Remise en position du disque dur 151 14. Pour replacer le support du disque dur dans le châssis, alignez les vis de guidage avec les connecteurs du compartiment de disque, lâchez le support dans le compartiment (1) et appuyez sur le levier du support jusqu’au fond (2) de façon à ce que l’unité soit parfaitement maintenue en place. Figure 5-21 Installation du support du disque dur 15. Replacez l’unité optique et rebranchez le câble à l’arrière de cette dernière. 16. Remettez en place le panneau d’accès de l’ordinateur. 17. Si l’ordinateur était sur un socle, replacez-le sur ce dernier. 18. Reconnectez le cordon d’alimentation et mettez l’ordinateur sous tension. 19. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du capot ou du panneau d’accès de l’ordinateur. REMARQUE : Aucune configuration du disque dur SATA n’est requise ; l’ordinateur le reconnaît automatiquement à la prochaine mise sous tension. Installation et retrait d'un couvercle de port Un cache de port arrière en option est disponible pour l’ordinateur. 152 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) Pour installer le cache de port : 1. Faites passer les câbles dans le trou inférieur du cache de port (1) et connectez-les aux ports arrière de l’ordinateur. 2. Insérez les crochets du cache de port dans les connecteurs à l’arrière du châssis, puis faites glisser le cache vers la droite pour le maintenir en place (2). Figure 5-22 Installation d’un cache de port REMARQUE : Pour des raisons de sécurité, il est possible d’installer un dispositif antivol en option au châssis de façon à verrouiller le cache de port et à fixer l’ordinateur. Reportez-vous à la section Installation d’un dispositif antivol à la page 154. Le cache de port est maintenu en place par un levier de blocage situé à l’intérieur de l’ouverture du cache. Pour supprimer le cache du port, tirez le levier en arrière vers l’ouverture du cache (1), puis faites glisser le cache vers la gauche pour l’ôter de l’ordinateur (2). Figure 5-23 Retrait d’un cache de port Installation et retrait d'un couvercle de port 153 Installation d’un dispositif antivol Câble antivol Il y a deux orifices pour câble antivol à l’arrière de l’ordinateur. L’orifice près de la vis moletée doit être utilisé lorsqu’il n’y a pas de cache de port. L’orifice situé à l’extrême droite doit être utilisé lorsqu’un cache de port est installé. Figure 5-24 Installation d’un câble de sécurité sans cache de port Figure 5-25 Installation d’un câble avec un cache de port 154 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) Cadenas Figure 5-26 Installation d’un cadenas Verrou de sécurité HP Business PC 1. Attachez le câble de sécurité en entourant un objet fixe. Figure 5-27 Fixation du câble autour d'un objet fixe Installation d’un dispositif antivol 155 2. Insérez le câble antivol dans la fente pour câble antivol située à l'arrière du moniteur, puis fixez le verrou sur le moniteur en insérant la clé dans la serrure située à l'arrière du verrou et en tournant la clé de 90 degrés. Figure 5-28 Installation du câble antivol sur le moniteur 3. Insérez le câble de sécurité dans le trou du câble antivol situé à l'arrière du moniteur. Figure 5-29 Sécurisation du moniteur 156 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) 4. Utilisez le support de montage fourni dans le kit pour sécuriser d'autres unités périphériques en introduisant le câble du périphérique dans le centre du support (1) et en insérant le câble de sécurité dans l'un des deux trous du support de montage (2). Utilisez le trou du support de montage sécurisant le mieux le câble de l'unité périphérique. Figure 5-30 Sécurisation des unités périphériques (imprimante présentée) 5. Enfilez les câbles du clavier et de la souris dans le verrou du châssis de l'ordinateur. Figure 5-31 Enfilage des câbles du clavier et de la souris Installation d’un dispositif antivol 157 6. Vissez le verrou au châssis dans le trou de la vis à ailettes à l'aide de la vis fournie. Figure 5-32 Fixation du verrou au châssis 7. Insérez le côté prise du câble de sécurité dans le verrou (1) et poussez le bouton (2) pour engager le verrou. Utilisez la clé fournie pour désengager le verrou. Figure 5-33 Engagement du verrou 158 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) 8. Une fois l'opération terminée, tous les périphériques dans votre station de travail sont sécurisés. Figure 5-34 Station de travail sécurisée Installation d’un dispositif antivol 159 Sécurité du panneau avant Le cache avant peut s’enclencher à l’aide d’une vis de sécurité fournie par HP. Pour installer la vis de sécurité : 1. Retirez/dégagez tout périphérique de sécurité qui gêne l'ouverture de l'ordinateur. 2. Retirez tout support amovible de l'ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Mettez l'ordinateur hors tension sans risque via le système d'exploitation, puis mettez les périphériques externes hors tension. 4. Débranchez le cordon d'alimentation de la prise électrique, puis débranchez tout périphérique externe. ATTENTION : Quel que soit l'état de mise sous tension, une tension est toujours présente sur la carte mère tant que le système est branché sur une prise secteur active. Vous devez débrancher le cordon d'alimentation pour éviter d'endommager les composants internes de l'ordinateur. 5. Si l’ordinateur est sur un socle, retirez-le de ce dernier. 6. Retirez le panneau d'accès et le panneau avant. 7. Retirez la vis noire à l’avant du châssis derrière le cache. Elle se situe à proximité de l’unité optique et porte la mention « BEZEL ». Figure 5-35 Réinstallation de la vis de sécurité du cache avant 8. Remplacez le panneau avant. 160 Chapitre 5 Mises à niveau du matériel de l'ordinateur de bureau Ultra-Slim (USDT) 9. Installez la vis de sécurité dans la languette de dégagement située au milieu du cache avant et dans le châssis afin de fixer le cache avant. Figure 5-36 Installation de la vis de sécurité du cache avant 10. Remplacer le panneau d'accès. 11. Si l’ordinateur était sur un socle, replacez-le sur ce dernier. 12. Rebranchez le cordon d'alimentation et mettez l'ordinateur sous tension. 13. Verrouillez tout périphérique de sécurité qui aurait pu bouger lors du retrait du panneau d'accès. Installation d’un dispositif antivol 161 A Remplacement de la pile La pile livrée avec l’ordinateur alimente l’horloge temps réel. Lorsque vous devez remplacer la pile, utilisez une pile équivalente à celle installée d’origine dans l’ordinateur. Votre ordinateur est livré avec une pile bouton au lithium de 3 volts. AVERTISSEMENT ! L’ordinateur contient une pile interne au lithium et dioxyde de manganèse. Il existe un danger d’incendie et de brûlures si la pile n’est pas manipulée correctement. Pour réduire les risques de blessure : Ne pas tenter de recharger la pile. Ne pas exposer la pile à des températures supérieures à 60 °C (140 °F). Ne pas démonter, écraser, perforer ou court-circuiter les contacts externes. Ne pas jeter au feu ou dans l’eau. Remplacer la pile uniquement avec une pile de rechange HP adaptée à ce type de produit. ATTENTION : Avant de remplacer la pile, veillez à sauvegarder les paramètres CMOS de l'ordinateur. Lorsque vous retirerez la pile, les paramètres CMOS seront effacés. L’électricité statique peut endommager les composants électroniques de l’ordinateur ou de l’équipement optionnel. Il est conseillé de toucher un objet métallique relié à la terre avant de commencer l’installation. REMARQUE : Vous pouvez économiser l’énergie de la pile au lithium en laissant l’ordinateur branché sur une prise secteur sous tension. L’énergie de la pile au lithium s’épuise uniquement lorsque l’ordinateur n’est PAS branché sur une prise secteur. Hewlett-Packard encourage ses clients à recycler le matériel électronique usagé, les cartouches d’impression de marque HP et les piles rechargeables. Pour plus d’informations sur les programmes de recyclage, consultez le site http://www.hp.com/recycle. 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Retirez le panneau d’accès de l’ordinateur. 6. Repérez la pile et son support sur la carte mère. REMARQUE : Sur certains modèles d’ordinateur, il peut s’avérer nécessaire de retirer un composant interne pour accéder à la pile. 162 Annexe A Remplacement de la pile 7. En fonction du type de pile et de support équipant la carte mère, procédez comme suit : Type 1 a. Retirez la pile de son support. Figure A-1 Retrait d’une pile bouton (type 1) b. Faites glisser la pile de rechange dans l’emplacement, le pôle positif tourné vers le haut. Le support maintient la pile en place automatiquement. Type 2 a. Pour libérer la pile de son support, appuyez sur la languette métallique qui bloque le bord de la pile. Lorsque la pile est libérée, retirez-la de son support (1). b. Pour installer une nouvelle pile, insérez un bord de la pile sous la lèvre du support, en veillant à orienter le pôle positif vers le haut. Appuyez sur le bord opposé jusqu’à ce que la languette s’enclenche sur la pile (2). Figure A-2 Retrait et remplacement d’une pile bouton (type 2) Type 3 a. Repoussez la griffe (1) qui maintient la pile en place et retirez la pile de son support (2). 163 b. Insérez la nouvelle pile et remettez la griffe en place. Figure A-3 Retrait d’une pile bouton (type 3) REMARQUE : Une fois la nouvelle pile en place, effectuez les opérations suivantes pour terminer la procédure. 8. Remettez en place le panneau d’accès de l’ordinateur. 9. Branchez l’ordinateur et démarrez-le. 10. Réglez à nouveau la date et l’heure, les mots de passe et tous les paramètres spéciaux à l’aide de l’utilitaire Computer Setup. 11. Verrouillez tout périphérique de sécurité que vous avez désengagé lors du retrait du panneau d’accès de l’ordinateur. 164 Annexe A Remplacement de la pile B Retrait et remplacement d'un disque dur SATA amovible 3,5 pouces Certains modèles sont équipés d’un boîtier de disque dur SATA amovible dans la baie de lecteur externe de 5,25 pouces. Le disque dur est logé dans un support qui peut se retirer facilement du compartiment d’unité de disque. Pour enlever et remonter une unité dans le support : REMARQUE : Avant de retirer l’ancien disque dur, assurez-vous de sauvegarder ses données de manière à pouvoir les transférer sur le nouveau disque. 1. Déverrouillez le support du disque dur avec la clé fournie et faites-le glisser hors du boítier. 2. Retirez la vis de l’arrière du support (1) et faites glisser le capot supérieur du support (2). Figure B-1 Retrait du capot du support 165 3. Retirez le ruban adhésif qui retient le capteur thermique au-dessus du disque dur (1) et retirez le capteur thermique du support (2). Figure B-2 Retrait du capteur thermique 4. Retirez les quatre vis du bas du support du disque dur. Figure B-3 Retrait des vis de sécurité 166 Annexe B Retrait et remplacement d'un disque dur SATA amovible 3,5 pouces 5. Refaites glisser le disque dur pour le déconnecter du support, puis soulevez-le pour le faire sortir du support. Figure B-4 Retrait du disque dur 6. Placez le nouveau disque dur dans le support, puis faites glisser le disque dur de façon à l’insérer dans le connecteur SATA de la carte à circuits imprimés du support. Assurez-vous que le connecteur du disque dur est complètement enfoncé dans le connecteur SATA de la carte à circuits imprimés du support. Figure B-5 Remise en position du disque dur 167 7. Replacez les quatre vis au bas du support pour maintenir le disque en place. Figure B-6 Remise en position des vis de sécurité 8. Placez le capteur thermique sur le disque dur de façon à ce qu’il ne recouvre pas l’étiquette (1) et attachez-le avec le ruban adhésif (2). Figure B-7 Remise en position du capteur thermique 168 Annexe B Retrait et remplacement d'un disque dur SATA amovible 3,5 pouces 9. Faites glisser le capot du support (1) et replacez la vis à l’arrière du support pour maintenir le capot (2). Figure B-8 Remise en position du capot du support 10. Faites glisser le support du disque dur dans le boîtier de l’ordinateur et verrouillez-le avec la clé fournie. REMARQUE : Le support doit être verrouillé pour que l’alimentation arrive au disque dur. 169 C Désactivation du verrou Smart Cover REMARQUE : Le verrou Smart Cover n’est disponible que sur certains modèles. Le verrou Smart Cover est commandé par logiciel et géré à partir du mot de passe de configuration. Ce système empêche tout accès non autorisé aux composants internes de l’ordinateur. L’ordinateur est livré avec le verrou débloqué. Pour plus d’informations sur le fonctionnement du verrou Smart Cover, reportez-vous au Manuel de supervision des ordinateurs de bureau. Clé Smart Cover FailSafe Si vous activez le verrou Smart Cover et que vous ne pouvez pas entrer le mot de passe pour désactiver le verrou, vous aurez besoin d’une clé Smart Cover FailSafe pour ouvrir le capot de l’ordinateur. Vous aurez besoin de cette clé pour accéder aux composants internes de l’ordinateur si l’un des cas suivants se présente : ● Coupure de courant ● Panne au démarrage ● Défaillance d’un élément de l’ordinateur (processeur ou alimentation par exemple) ● Oubli d’un mot de passe REMARQUE : La clé Smart Cover FailSafe est un outil spécialisé fourni par HP. Pour parer à toute éventualité, commandez cette clé avant d’avoir à vous en servir. Pour obtenir une clé FailSafe : ● Adressez-vous à un revendeur ou à un fournisseur de services agréé HP. Utilisez la référence de commande PN 166527-001 pour l’outil en forme de clé ou la référence PN 166527-002 pour l’outil en forme de tournevis. ● Consultez le site Web HP (http://www.hp.com) pour obtenir des informations relatives aux commandes. ● Pour appeler l’assistance technique, reportez-vous aux numéros indiqués sur la carte de garantie ou au guide intitulé Numéros de téléphone de l’assistance clientèle. Utilisation de la clé Smart Cover FailSafe pour retrait du verrou Smart Cover Pour ouvrir le panneau d’accès lorsque le verrou Smart Cover est engagé : 1. Retirez/désengagez tout périphérique de sécurité qui entrave l’ouverture de l’ordinateur. 2. Retirez tout support amovible de l’ordinateur, par exemple des CD ou des lecteurs flash USB. 3. Exécutez la procédure d’arrêt du système d’exploitation, puis mettez l’ordinateur et les périphériques externes hors tension. 170 Annexe C Désactivation du verrou Smart Cover 4. Retirez le cordon d’alimentation de la prise secteur et débranchez tous les périphériques externes. ATTENTION : Quel que soit l’état de mise sous tension, une tension est toujours présente sur la carte mère tant que l’ordinateur est branché sur une prise secteur active. Vous devez déconnecter le cordon d’alimentation pour éviter d’endommager les composants internes de l’ordinateur. 5. Utilisez la clé Smart Cover FailSafe pour retirer les deux vis de sécurité qui fixent le verrou Smart Cover au châssis. Figure C-1 Retrait des vis du verrou du capot intelligent de la minitour convertible Figure C-2 Retrait des vis du verrou du capot intelligent de la microtour Utilisation de la clé Smart Cover FailSafe pour retrait du verrou Smart Cover 171 Figure C-3 Retrait des vis du verrou du capot intelligent de l'ordinateur compact Vous pouvez maintenant retirer le panneau d'accès. Pour fixer à nouveau le verrou Smart Cover, mettez le verrou en place à l’aide des vis de sécurité. 172 Annexe C Désactivation du verrou Smart Cover D Décharges électrostatiques Une décharge d’électricité statique, provenant des doigts ou de tout autre conducteur, peut endommager les cartes du système ou d’autres unités sensibles à l’électricité statique. Ce type de dégât peut diminuer la durée de vie du dispositif. Prévention des décharges électrostatiques Afin d’éviter tout risque de dégât par l’électricité statique, prenez les précautions suivantes : ● Évitez tout contact avec les mains, en transportant et en rangeant les produits dans des emballages antistatiques. ● Laissez les éléments sensibles à l’électricité statique dans leur emballage jusqu’au moment de l’installation. ● Placez les éléments sur une surface mise à la terre, avant de les retirer de leur emballage. ● Évitez de toucher les broches, les conducteurs et les circuits. ● Veillez à toujours être relié à la terre lorsque vous touchez un élément ou un assemblage sensible à l’électricité statique. Méthodes de mise à la terre Il en existe plusieurs. Prenez au moins l’une des précautions suivantes lorsque vous installez ou manipulez des éléments sensibles à l’électricité statique : ● Utilisez un bracelet électrostatique relié par un cordon de terre au châssis de l’ordinateur ou à une station de travail. Les bracelets électrostatiques sont des bracelets flexibles dont les cordons ont une résistance d’au moins 1 mégohm +/- 10 %. Pour une mise à la terre optimale, veillez à maintenir le bracelet serré contre la peau. ● Utilisez les autres types de bracelets antistatiques disponibles lorsque vous travaillez debout. Portez-les à chaque pied lorsque vous vous trouvez sur des sols ou des tapis conducteurs. ● Utilisez des outils d’entretien conducteurs. ● Utilisez un kit de réparation équipé d’un tapis antistatique. Si vous ne disposez d’aucun des équipements suggérés pour une mise à la terre correcte, contactez votre revendeur ou fournisseur de services agréé HP. REMARQUE : Pour plus d’informations sur l’électricité statique, adressez-vous à votre revendeur ou fournisseur de services agréé HP. Prévention des décharges électrostatiques 173 E Utilisation, entretien courant et préparation au transport Utilisation et entretien courant de l’ordinateur Les instructions suivantes doivent être suivies pour installer et entretenir convenablement l’ordinateur et son moniteur : ● Protégez l’ordinateur de l’humidité, des rayons du soleil et des températures extrêmes. ● Faites fonctionner l’ordinateur sur une surface stable et plane. Laissez un espace libre d’au moins 10 cm tout autour des côtés ventilés de l’ordinateur et au-dessus du moniteur afin d’assurer une bonne aération. ● Ne réduisez jamais l’aération en bloquant les orifices d’aération ou les entrées d’air. Ne placez pas le clavier - pieds repliés - directement contre l’avant de l’ordinateur de bureau, car cela gêne également la circulation de l’air. ● Ne faites jamais fonctionner l’ordinateur lorsque le panneau d’accès ou l’un des caches de connecteur de carte d’extension est ouvert. ● N’empilez pas les ordinateurs l’un sur l’autre ou ne les placez pas l’un à côté de l’autre pour éviter de faire recirculer l’air chaud qu’ils évacuent. ● Si l’ordinateur doit être utilisé dans un boîtier séparé, celui-ci doit être pourvu d’orifices d’aération (aspiration et refoulement) ; les autres instructions d’utilisation énoncées ci-dessus restent d’application. ● Ne laissez pas de liquides à proximité de l’ordinateur ou du clavier. ● N’obstruez jamais les grilles d’aération du moniteur (n’y déposez aucun objet). ● Installez ou activez les fonctions d’économie d’énergie du système d’exploitation ou d’un autre logiciel, y compris les états de veille. ● Mettez l’ordinateur hors tension avant d’effectuer l’une des opérations suivantes : ◦ Essuyez l’extérieur de l’ordinateur avec un chiffon doux humide. Les produits d’entretien pourraient ternir ou abímer la finition de l’ordinateur. ◦ Nettoyez de temps à autre toutes les entrées d’air de l’ordinateur. Les poussières, les matières pelucheuses et autres corps étrangers peuvent obstruer les entrées et réduire l’aération. 174 Annexe E Utilisation, entretien courant et préparation au transport Précautions relatives à l’unité optique Assurez-vous de respecter les recommandations suivantes lorsque vous utilisez ou nettoyez l’unité optique. Procédure ● Ne déplacez pas l’unité pendant son fonctionnement car vous risqueriez de provoquer une erreur de lecture. ● N’exposez pas l’unité à des changements subits de température. Il pourrait se former de la condensation à l’intérieur de l’unité. En cas de changement brutal de la température en cours d’utilisation de l’unité, attendez au moins une heure avant de mettre l’équipement hors tension. Si vous l’utilisiez immédiatement, des erreurs de lecture pourraient se produire. ● Évitez de placer l’unité dans un environnement soumis à une forte humidité, à des températures extrêmes, à des vibrations mécaniques ou aux rayons du soleil. Nettoyage ● Nettoyez le panneau et les boutons avec un chiffon doux et sec ou légèrement humecté d’un produit détergent doux. Ne vaporisez jamais de liquides nettoyants directement sur l’unité. ● N’employez pas de dissolvants, comme l’alcool ou l’essence, qui risqueraient d’abímer la surface. Sécurité Si un objet ou un liquide pénètre dans l’unité, débranchez immédiatement l’ordinateur et faites-le contrôler par un fournisseur de services agréé HP. Préparation au transport Pour préparer l’ordinateur en vue de son transport, suivez les recommandations suivantes : 1. Sauvegardez les fichiers du disque dur sur des disques PD, des cartouches de bande, des CD ou des lecteurs flash USB. Assurez-vous que le support de sauvegarde n’est pas exposé à des impulsions électriques ou magnétiques pendant qu’il est stocké ou en transit. REMARQUE : Le disque dur se verrouille automatiquement lorsque le système est mis hors tension. 2. Retirez et stockez tous les supports amovibles. 3. Éteignez l’ordinateur et les périphériques externes. 4. Débranchez le cordon d’alimentation de la prise secteur, puis de l’ordinateur. 5. Débranchez les composants du système et les périphériques externes de leur source d’alimentation, puis de l’ordinateur. REMARQUE : Assurez-vous que toutes les cartes sont correctement fixées et verrouillées dans leurs connecteurs avant d’expédier l’ordinateur. 6. Emballez les composants du système ainsi que les périphériques externes dans leur emballage d’origine ou dans un emballage similaire suffisamment protégé. Précautions relatives à l’unité optique 175 Index A alimentation Branchement du câble à l'USDT 135 C cache de carte d'extension Retrait du CMT 28 Retrait du MT 70 Retrait du SFF 107 carte d'extension Installation du CMT 27 Installation du MT 69 Installation du SFF 106 Retrait du CMT 27 Retrait du MT 69 Retrait du SFF 106 clavier éléments 12 touche de logo Windows 13 clé FailSafe 170 connexions d'unité de carte mère CMT 22 MT 64 SFF 100 USDT 141 conversion de la tour CMT 49 USDT 99, 140 conversion en ordinateur de bureau CMT 47 couvercle des ports Installation de l'USDT 152 D déverrouillage du panneau d’accès 170 directives d'installation 94 disque dur Installation de l'USDT 149 Installation du CMT 42 Installation du MT 83 Installation du SFF 123 Retrait du CMT 32 Retrait du MT 81 Retrait du SFF 123 Retrait du USDT 149 E électricité statique, prévention 173 éléments de la face arrière CMT 7 MT 8 SFF 9 USDT 10 éléments du panneau avant CMT 3 MT 4 SFF 5 USDT 6 emplacements de l'ID du produit 14 emplacements du numéro de série 14 I installation Câbles des lecteurs du CMT 36 câbles du lecteur du MT 74 Câbles du lecteur SFF 111 carte d'extension CMT 27 carte d'extension MT 69 carte d'extension SFF 106 Couvercle de port USDT 152 Disque dur CMT 42 Disque dur MT 83 Disque dur SFF 123 Disque dur USDT 149 lecteur de cartes multimédia du MT 78 lecteur de cartes multimédia du SFF 119 lecteur de cartes multimédias du CMT 38 Lecteur optique CMT 38 Lecteur optique MT 78 Lecteur optique SFF 115 Lecteur optique USDT 148 Mémoire du CMT 24 Mémoire du MT 66 Mémoire SFF 102 Mémoire USDT 142 pile 162 instructions d’aération 174 instructions pour l’installation 17, 59, 134 L lecteur de cartes multimédia caractéristiques 11 Installation du MT 78 Installation du SFF 119 Retrait du MT 76 Retrait du SFF 118 lecteur de cartes multimédias Installation du CMT 38 Retrait du CMT 32 lecteur optique Fixation du loquet de dégagement de l'USDT 147 Installation de l'USDT 148 Installation du CMT 38 Installation du SFF 115 Installation MT 78 Retrait du CMT 32 Retrait du MT 76 Retrait du SFF 113 Retrait du USDT 146 lecteurs branchements de câbles du MT 74 Branchements des câbles du CMT 36 branchements des câbles du SFF 111 Emplacements sous CMT 31 Emplacements sous MT 73 Emplacements sous SFF 110 Installation du CMT 36 Installation du MT 74 Installation du SFF 111 176 Index M mémoire Installation de l'USDT 142 Installation du CMT 24 Installation du MT 66 Installation du SFF 102 Occupation des sockets du MT 67 Occupation du socket de l'USDT 143 Occupation du socket du CMT 25 Occupation du socket du SFF 103 Spécifications du CMT 24 Spécifications du MT 66 Spécifications SFF 102 Spécifications USDT 142 Modules de mémoire DIMM. Voir modules DIMM. Voir mémoire P panneau avant Remise en place du CMT 22 Remplacement du MT 63 Remplacement du SFF 99 Remplacement du USDT 139 Retrait des caches du CMT 21 Retrait des caches du SFF 97 Retrait du cache de l'USDT 138 Retrait du cache du MT 62 Retrait du CMT 20 Retrait du MT 62 Retrait du SFF 97 Retrait du USDT 138 sécurité CMT 57 sécurité MT 91 sécurité SFF 132 sécurité USDT 160 panneau d’accès Remise en place du CMT 19 Remplacement du MT 61 Remplacement du SFF 96 Remplacement du USDT 137 retrait du CMT 18 Retrait du MT 60 Retrait du SFF 95 Retrait du USDT 136 verrouillage et déverrouillage 170 préparation au transport 175 R remplacement de la pile 162 retrait Cache du port d'extension du CMT 28 cache du port d'extension du MT 70 Caches protecteurs de l'USDT 138 caches protecteurs du CMT 21 caches protecteurs du panneau du MT 62 caches protecteurs du SFF 97 carte d'extension CMT 27 carte d'extension MT 69 carte d'extension SFF 106 Couvercle de port USDT 152 Disque dur MT 81 Disque dur SFF 123 Disque dur USDT 149 lecteur de cartes multimédia du MT 76 lecteur de cartes multimédia du SFF 118 lecteur de cartes multimédias du CMT 32 Lecteur optique MT 76 Lecteur optique SFF 113 Lecteur optique USDT 146 lecteurs CMT 32 Obturateur d'extension du SFF 107 Panneau avant de l'USDT 138 panneau avant du CMT 20 panneau avant du MT 62 panneau avant du SFF 97 Panneau d'accès à l'ordinateur CMT 18 panneau d'accès à l'ordinateur compact SFF 95 panneau d'accès à l'ordinateur MT 60 panneau d’accès de l'ordinateur USDT 136 pile 162 verrou Smart Cover 170 S sécurité Cadenas de l'USDT 155 Cadenas du CMT 53 cadenas du MT 87 Cadenas du SFF 128 Panneau avant de l'USDT 160 panneau avant du CMT 57 panneau avant du MT 91 panneau avant du SFF 132 Verrou de sécurité HP Business PC de l'USDT 155 verrou de sécurité HP Business PC du CMT 53 Verrou de sécurité HP Business PC du MT 88 Verrou de sécurité HP Business PC du SFF 128 verrou Smart Cover 170 security câble antivol CMT 52 câble antivol SFF 87, 127 câble antivol USDT 154 spécifications Mémoire du CMT 24 Mémoire du MT 66 Mémoire SFF 102 Mémoire USDT 142 systèmes antivol câble antivol CMT 52 câble antivol SFF 87, 127 câble antivol USDT 154 T touche de logo Windows 13 U unité optique nettoyage 175 précautions 175 utilisation de l’ordinateur 174 Index 177 V verrou verrou Smart Cover 170 verrous Cadenas de l'USDT 155 Cadenas du CMT 53 cadenas du MT 87 Cadenas du SFF 128 Panneau avant de l'USDT 160 panneau avant du CMT 57 panneau avant du MT 91 panneau avant du SFF 132 Verrou de sécurité HP Business PC de l'USDT 155 verrou de sécurité HP Business PC du CMT 53 Verrou de sécurité HP Business PC du MT 88 Verrou de sécurité HP Business PC du SFF 128 verrou Smart Cover 170 vis de guidage CMT location (Emplacement SNMP) 37 MT location (Emplacement SNMP) 75 SFF location (Emplacement SNMP) 111 178 Index MARQUE: HP REFERENCE: COMPAQ 100-441NF CODIC: 4070712 12” (30cm) HDMI DVI VGA DisplayPort DVI/HDMI DVI/VGA http://www.hp.com/go/contactHP http://welcome.hp.com/country/us/en/wwcontact_us.html Droit d'auteur et licence © Copyright 2012 Hewlett-Packard Development Company, L.P. Les informations contenues dans ce document peuvent être modifiées sans préavis. Les garanties relatives aux produits et aux services HP sont décrites dans les déclarations de garantie limitée expresse qui les accompagnent. Aucun élément du présent document ne peut être interprété comme constituant une garantie supplémentaire. HP ne saurait être tenu pour responsable des erreurs ou omissions de nature technique ou rédactionnelle qui pourraient subsister dans le présent document. Ce produit intègre une technologie de protection des droits d’auteur qui est protégée par des brevets américains et par d’autres droits à la propriété intellectuelle. L'utilisation de cette technologie de protection des droits d’auteur doit être autorisée par Macrovision et est destinée à l'usage des particuliers ou d'autres utilisations de visualisation limitée dans l'absence d'autre autorisation de Macrovision. La rétroingénierie ou le désassemblage du produit sont interdits. Microsoft et Windows sont des marques commerciales de Microsoft Corporation aux Etats-Unis et dans d'autres pays. HP est en faveur d'une utilisation licite des technologies et n'appuie pas ni n'encourage l'utilisation de produits pour d'autres fins que celles autorisées par la loi sur les droits d'auteur. Informations sur le produit Ce manuel décrit des fonctions communes à la plupart des modèles. Cependant, certaines fonctions peuvent ne pas être disponibles sur votre ordinateur. Les informations contenues dans le présent document peuvent faire l’objet de modifications sans préavis. Déclaration de garantie d'impression à la demande Vous trouverez la garantie limitée HP expressément fournie applicable à votre produit dans le même emplacement que les guides de l'utilisateur sur votre ordinateur et/ou dans le CD/DVD livré dans la boîte. Pour certains pays/ certaines régions, une garantie limitée HP imprimée est fournie dans l'emballage. Dans certains pays/régions où la garantie n'est pas fournie au format imprimé, vous pouvez demander une copie imprimée via l'adresse hp.com/go/orderdocuments ou écrire à : Amérique du nord : Hewlett-Packard, MS POD, 11311 Chinden Blvd., Boise, ID 83714, ÉtatsUnis Europe, Moyen-Orient, Afrique : HewlettPackard, POD, Via G. Di Vittorio, 9, 20063, Cernusco s/Naviglio (MI), Italie Asie du Pacifique : Hewlett-Packard, POD, P.O. Box 200, Alexandra Post Office, Singapour 911507 Lorsque vous demandez une copie de votre garantie, veuillez inclure votre numéro de produit, la période de garantie (indiquée sur votre étiquette de maintenance), votre nom et votre adresse postale. IMPORTANT NE retournez PAS votre produit HP aux adresses indiquées ci-dessus. Pour des produits provenant des États-Unis, accédez au site http://www.hp.com/go/contactHP. Pour une assistance technique au niveau international, accédez au site http://welcome.hp.com/country/ us/en/wwcontact_us.html. 1 Obtenir des informations Type d’informations Où trouver ● Configurer l'ordinateur. Quick Setup (Installation rapide) (ce guide) ● Utiliser l'ordinateur. ● Connectez-vous à Internet. Quick Setup (Installation rapide) (ce guide) ● Restaurer les paramètres d’usine. Guide de dépannage et de maintenance sur votre ordinateur. Sélectionnez l'application le HP Support Assistant (Service d'assistance HP) sur l'écran de démarrage, sélectionnez Poste de travail, puis sélectionnez les User guides (guides de l'utilisateur). ● Regarder les vidéos de démonstration sur l'utilisation des fonctions de l'ordinateur. Rendez-vous sur http://www.hp.com/supportvideos (en anglais uniquement) ● Apprenez à utiliser le système d’exploitation Microsoft Windows. ● Trouver des informations sur le mot de passe Windows. ● Trouver des liens vers les mises à jour des pilotes. ● Lire les questions fréquemment posées. Aide et support À partir de l'écran de démarrage, appuyez sur la touche a, puis sélectionnez Aide et support. Pour une assistance technique sur les États-Unis, accédez au site http://www.hp.com/go/contactHP. Pour une assistance technique au niveau international, accédez au site http://welcome.hp.com/country/us/en/wwcontact_us.html. Outils de dépannage Windows 1. À partir de l'écran de démarrage, appuyez sur la touche p, puis sélectionnez Panneau de configuration. 2. Sélectionnez System and Security (Système et sécurité), puis dans Centre de maintenance, sélectionnez Résoudre des problèmes informatiques courants. ● Dépannez les problèmes matériels et logiciels les plus courants sur votre ordinateur. Guide de dépannage et de maintenance sur votre ordinateur. Sélectionnez l'application le HP Support Assistant (Service d'assistance HP) sur l'écran de démarrage, sélectionnez Poste de travail, puis sélectionnez les User guides (guides de l'utilisateur). 1 Type d’informations Où trouver ● Recherchez les manuels de l’utilisateur électroniques et les caractéristiques de votre modèle d’ordinateur. ● Commandez des pièces et recherchez une aide supplémentaire pour le dépannage. Site Web Assistance HP : http://www.hp.com/go/contactHP ● Mettez à niveau ou remplacez des composants de votre ordinateur. Guide de mise à niveau et d'entretien courant Site Web Assistance HP : http://www.hp.com/go/contactHP ● Recherchez des informations sur la garantie de votre ordinateur. HP Worldwide Limited Warranty and Technical Support (Garantie HP limitée internationale et support technique) incluse sur votre ordinateur. Sélectionnez l'application le HP Support Assistant (Service d'assistance HP) sur l'écran de démarrage, sélectionnez Poste de travail, puis sélectionnez les User guides (guides de l'utilisateur). ● Recevez des informations à jour et de l’aide de la part de la communauté Windows. http://www.hp.com/support/consumer-forum ● Raccorder à un téléviseur. Guide « Regarder et enregistrer des émissions télévisées » Sélectionnez l'application le HP Support Assistant (Service d'assistance HP) sur l'écran de démarrage, sélectionnez Poste de travail, puis sélectionnez les User guides (guides de l'utilisateur). Si le manuel ne s’y trouve pas, rendez-vous sur http://www.hp.com/go/ contactHP. 2 Chapitre 1 Obtenir des informations Type d’informations Où trouver ● Maintenir votre ordinateur. HP Support Assistant (Service d'assistance HP) : maintient les performances de votre ordinateur et résout les problèmes plus rapidement grâce aux mises à jour automatisées, aux diagnostics intégrés et à l’assistance guidée. Sélectionnez l'application HP Support Assistant (Service d'assistance HP) sur l'écran de démarrage. Guide de dépannage et de maintenance Sélectionnez l'application le HP Support Assistant (Service d'assistance HP) sur l'écran de démarrage, sélectionnez Poste de travail, puis sélectionnez les User guides (guides de l'utilisateur). Maintaining Your Computer (Maintenir votre ordinateur) (ce guide) ● Accédez aux notifications réglementaires et relatives à la sécurité. Notifications réglementaires, relatives à la sécurité et à l'environnement Sélectionnez l'application HP Support Assistant (Service d'assistance HP) sur l'écran de démarrage, sélectionnez Poste de travail, puis sélectionnez les User guides (guides de l'utilisateur) ou rendez-vous sur http://www.hp.com/go/contactHP. ● Trouver des informations relatives à l'ergonomie. Guide de sécurité et ergonomie du poste de travail Sélectionnez l'application HP Support Assistant (Service d'assistance HP) sur l'écran de démarrage, sélectionnez Poste de travail, puis sélectionnez les User guides (guides de l'utilisateur) ou rendez-vous sur http://www.hp.com/ergo. 3 2 Configuration de votre ordinateur AVERTISSEMENT ! Afin d'éviter tout risque de choc électrique ou de dommages à votre équipement : • Placez l'ordinateur dans un endroit éloigné et protégé de la poussière, de l'humidité et de la suie. Ces éléments peuvent augmenter la température interne, provoquer un incendie ou entraîner une électrocution. • Ne désactivez pas la fiche de mise à la terre du cordon d'alimentation. La mise à la terre est une caractéristique de sécurité importante. • Branchez le cordon d'alimentation dans une prise électrique mise à la terre à laquelle vous pouvez facilement accéder à tout moment. • Mettez l'équipement hors tension en débranchant le cordon d'alimentation de la prise électrique. Afin d'éviter une exposition directe au rayon laser, ne tentez pas d'ouvrir le boîtier du lecteur de CD-ROM ou de DVD. • Le bloc d'alimentation électrique est préréglé pour le pays ou la région où vous avez acheté votre ordinateur. Si vous déménagez, vérifiez bien la tension requise dans ce nouvel environnement avant de relier votre ordinateur à une prise de courant. L'ordinateur peut être très lourd ; veillez à adopter une position ergonomique adéquate lors de sa manipulation. Pour réduire les risques de blessures graves, lisez le manuel Sécurité et ergonomie du poste de travail. Le manuel est disponible sur le Web à l'adresse http://www.hp.com/ergo. 1. Placez l'ordinateur de telle sorte qu'aucune ouverture de ventilation ne soit obstruée et que le câblage ne se trouve pas dans un passage ou à un endroit où quelqu’un risque de marcher dessus ou de l'endommager en plaçant un meuble dessus. 2. Branchez tous les cordons d'alimentation du moniteur, de l'ordinateur et des accessoires à un appareil de protection contre les sautes de puissance sur lequel est mentionné tout spécialement une protection contre les sautes de puissance, une alimentation sans coupure (UPS) ou tout autre appareil similaire. Si l'ordinateur dispose d’un syntoniseur de télévision, d’un modem ou d’une connexion téléphonique, protégez aussi votre ordinateur en utilisant la protection contre les sautes de puissance à l’aide de ces entrées des signaux. Connectez le câble de votre téléviseur ou le cordon de téléphone à l’appareil de protection contre les sautes de puissance, puis connectez l'appareil à l’ordinateur. 3. Télécharger et installer les mises à jour du système d'exploitation. 4 Chapitre 2 Configuration de votre ordinateur a. Identifiez le système d'exploitation et la version actuels de votre ordinateur. (À partir de l'écran de démarrage, appuyez sur la touche p, sélectionnez Panneau de configuration, sélectionnez System and Security (Système et sécurité), puis sélectionnez Système. Le système d'exploitation et la version sont indiqués sous Spécifications.) b. Ouvrez votre navigateur Internet et allez sur http://welcome.hp.com/ country/us/en/wwcontact_us.html. c. Si besoin est, choisissez votre pays et la langue, puis cliquez sur Support et pilotes. d. Sélectionnez Téléchargement de pilotes et logiciels, tapez le nom et la référence de votre ordinateur dans le champ du produit, puis appuyez sur la touche Entrée. e. Si nécessaire, sélectionnez votre modèle d'ordinateur dans les résultats de la recherche du produit. f. Sélectionnez le système d'exploitation de votre ordinateur. g. Cliquez sur Télécharger pour chaque mise à jour que vous souhaitez télécharger. h. Suivez les instructions à l'écran pour installer chaque mise à jour téléchargée. 4. Vérifiez si le carton d'emballage de l'ordinateur contient des informations détaillées supplémentaires sous forme imprimée ou des mises à jour. 5. Lisez les Notifications réglementaires, relatives à la sécurité et à l'environnement incluses avec votre ordinateur. Sélectionnez l'application HP Support Assistant (Service d'assistance HP) sur l'écran de démarrage, sélectionnez Poste de travail, puis sélectionnez les User guides (guides de l'utilisateur). 6. Lisez le Guide de sécurité et ergonomie du poste de travail pour installer correctement votre poste de travail, savoir quelle posture prendre, avoir quelques conseils relatifs à la santé et aux habitudes de travail et connaître les consignes de sécurité concernant la mécanique et l’alimentation électrique de votre système. Sélectionnez l'application HP Support Assistant (Service d'assistance HP) sur l'écran de démarrage, sélectionnez Poste de travail, puis sélectionnez les User guides (guides de l'utilisateur) ou rendez-vous sur http://www.hp.com/ergo. Après la configuration initiale de l’ordinateur, vous pouvez, si vous le souhaitez, y installer des logiciels ou périphériques supplémentaires. Vérifiez la configuration requise (système d’exploitation, mémoire, etc.) avant d'acheter un nouveau logiciel ou un nouveau matériel pour votre ordinateur. Respectez les consignes du fabricant du logiciel pour installer le nouveau logiciel. 5 REMARQUE : N'utilisez que des logiciels originaux concédés sous licence. L'installation de logiciels copiés peut s'avérer instable, infecter l'ordinateur par un virus, ou être illégale. Les solutions de sécurité peuvent détecter le vol, les mauvaises manipulations et les attaques logicielles, mais elles ne peuvent pas les éviter. Connexion à Internet Étapes pour vous connecter à Internet : 1. Branchez le matériel conformément aux instructions de mise en route. 2. Accédez à un service Internet. Ouvrir un compte auprès d'un fournisseur de services Internet (ISP) Si vous disposez déjà d’un compte d’accès, passez cette étape et suivez les instructions données par le fournisseur. 3. En utilisant votre connexion Internet par le biais de votre FAI, ouvrez un navigateur Web et parcourez Internet. REMARQUE : Si vous avez des problèmes pour vous connecter à Internet, consultez Accès à Internet à la page 19. 6 Chapitre 2 Configuration de votre ordinateur 3 Installation de fonctionnalités supplémentaires Utilisation de Beats Audio™ Votre PC HP TouchSmart présente des connecteurs audio (écouteurs et sortie audio) qui sont optimisés pour des écouteurs Beats Audio™ et des systèmes audio externes (achetés séparément). Les modèles Select HP TouchSmart PC incluent également quatre haut-parleurs internes optimisés grâce à la technologie Beats et un bouton de basculement Beats sur le clavier. Votre ordinateur est prêt à l'utilisation pour que vous puissiez écouter de la musique avec le système Beats activé. Pour désactiver Beats, appuyez sur le bouton de basculement Beats ; l'icône de désactivation de Beats apparaît à l'écran. Pour activer Beats, appuyez à nouveau sur le bouton de basculement Beats. Si votre clavier ne présente pas le bouton de basculement Beats, appuyez sur Fn+B pour activer et désactiver Beats. Pour afficher l'interface de l'utilisateur de Beats, à partir de l'écran de démarrage, appuyez sur la touche b, puis sélectionnez HP Beats Audio (HP Beats Audio). Tout ce que vous avez à faire c'est de brancher les écouteurs Beats Audio dans le connecteur latéral pour écouteurs afin d'avoir une séparation des sons nette et claire. Afin de profiter du plein potentiel du système audio BEATS à l'aide des haut-parleurs internes, HP recommande de connecter un caisson de basse HP au connecteur Sub sur le panneau arrière. Si vous utilisez un système audio externe, branchez-le dans le connecteur de sortie audio sur le panneau arrière. Utilisation d'un moniteur HDMI Si votre ordinateur présente une carte graphique avec un connecteur HDMI (High Definition Multimedia Interface), Hewlett-Packard recommande d'utiliser un connecteur DVI ou VGA pour un moniteur, et d'utiliser le HDMI pour raccorder un téléviseur. Si vous utilisez le port HDMI pour connecter votre moniteur, il vous faudra peutêtre régler certains paramètres pour pouvoir entendre le son (reportez-vous aux procédures suivantes). C'est pour cela que HP vous recommande de connecter des haut-parleurs analogiques à l’ordinateur si vous souhaitez entendre le son lors de son installation initiale. Pour un affichage optimal, il se peut que vous ayez à ajuster le réglage de la résolution pour le moniteur (voir Ajustement de la résolution à la page 8). Conservez ce document pour référence future. REMARQUE : Si vous devez un jour restaurer le système d'exploitation de l'ordinateur avec le Gestionnaire de restauration, vous devrez également répéter ces procédures pour activer le son et ajuster la résolution pour le connecteur HDMI. Utilisation de Beats Audio™ 7 IMPORTANT : Vous devez connecter le moniteur HDMI à la carte graphique avant d'activer le son et d'ajuster la résolution. Activation du son 1. Appuyez sur la touche Windows du clavier pour afficher le Bureau. 2. Faites un clic droit sur l'icône du Volume (haut-parleur blanc) dans la zone de notification, à l'extrémité droite de la barre des tâches. 3. Sélectionnez les Périphériques de lecture. La fenêtre Son s'ouvre. 4. Dans l’onglet Lecture, recherchez le périphérique par défaut. Il est possible qu’il soit repéré par un cercle vert muni d’une coche. Si le périphérique par défaut est l’un des suivants, votre moniteur HDMI est déjà activé : ● Audio haute définition NVIDIA (certains modèles uniquement) ● Audio haute définition ATI (certains modèles uniquement) ● Sortie HDMI Realtek Sélectionnez le bouton Annuler pour fermer la fenêtre, puis continuez avec la procédure suivante « Ajuster la résolution », si nécessaire. Si le périphérique par défaut n’est pas l’un de ces périphériques, passez à l’étape 5. 5. Si l’une des options HDMI suivantes est disponible dans l’onglet Lecture, sélectionnez-la : ● Audio haute définition NVIDIA (certains modèles uniquement) ● Audio haute définition ATI (certains modèles uniquement) Dans le cas contraire, sélectionnez la Sortie HDMI Realtek. 6. Sélectionnez Définir par défaut. 7. Sélectionnez OK pour fermer la fenêtre. Cela termine la procédure pour activer le son HDMI. Ajustement de la résolution Pour ajuster la résolution, suivez les instructions concernant votre type de carte graphique. Appuyez sur la touche Windows du clavier pour afficher le Bureau. Cliquez avec le bouton droit sur un endroit vide du bureau, puis : ● Si le Panneau de configuration NVIDIA est présent, suivez la procédure indiquée dans « Cartes graphiques NVIDIA ». ● Si le Catalyst Control Center est disponible, suivez la procédure indiquée dans « Cartes graphiques ATI ». ● Si uniquement la Résolution de l’écran est disponible, suivez la procédure indiquée dans « Autres cartes graphiques ». 8 Chapitre 3 Installation de fonctionnalités supplémentaires Cartes graphiques NVIDIA 1. Cliquez avec le bouton droit de la souris sur une zone vide du Bureau, puis cliquez sur Panneau de configuration NVIDIA. La fenêtre Sélection de l’affichage s’ouvre. 2. Dans la zone Sélection d'une tâche, sur la gauche, dans Afficher, cliquez sur Changer la résolution. La fenêtre Changer la résolution s’ouvre. 3. Si votre ordinateur HP est connecté à un moniteur HP, assurez-vous que la case Afficher uniquement les résolutions TV n’est pas cochée. Si votre ordinateur HP est connecté à un moniteur autre que HP, assurez-vous que la case Afficher uniquement les résolutions TV est cochée. Au besoin, cliquez dans la case pour la décocher ou la cocher. 4. Fermez le panneau de configuration NVIDIA. Cela termine la procédure d'ajustement de la résolution pour les cartes graphiques NVIDIA. Cartes graphiques ATI 1. Cliquez avec le bouton droit de la souris sur une zone vide du Bureau, puis cliquez sur Centre de contrôle Catalyst™. La fenêtre Catalyst Control Center s’ouvre. 2. Sélectionnez Cartes graphiques puis Ordinateurs de bureau et affichages dans le coin supérieur gauche de la fenêtre. 3. Dans la fenêtre Ordinateurs de bureau et affichages, cliquez avec le bouton droit de la souris sur l’icône du moniteur dans le coin inférieur gauche de la fenêtre et sélectionnez Configurer. La fenêtre DTV (HDMITM) 2 s’ouvre. 4. Si votre ordinateur HP est connecté à un moniteur HP, assurez-vous que la case Afficher uniquement les résolutions TV n’est pas cochée. Si votre ordinateur HP est connecté à un moniteur autre que HP, assurez-vous que la case Afficher uniquement les résolutions TV est cochée. Au besoin, cliquez dans la case pour la décocher ou la cocher. 5. Cliquez sur OK. Cela termine la procédure d'ajustement de la résolution pour cette option. Autres cartes graphiques 1. Cliquez avec le bouton droit de la souris sur une zone vide du Bureau, puis cliquez sur Résolution d'écran. 2. Sélectionnez la résolution dans le menu déroulant. 3. Cliquez sur Appliquer, puis sur Conserver les modifications. Cela termine la procédure d'ajustement de la résolution pour cette option. Installation d'affichages multiples Utilisez les étapes suivantes pour vous connecter et installer des moniteurs supplémentaires : Installation d'affichages multiples 9 Ces instructions concernent une installation standard à deux moniteurs. Si vous avez acheté un système à double moniteur avec le logiciel ATI™ Eyefinity, suivez ces instructions pour une installation à deux (ou trois) moniteurs, puis passez aux instructions pour l'installation d'ATI Eyefinity Catalyst™. 1. Vérifiez que le PC est configuré selon les instructions dans l'affichage de l'installation. N'allumez pas le PC ou le moniteur. 2. Branchez les moniteurs à un connecteur d’affichage disponible à l’arrière du PC. Le type de connexion du moniteur doit correspondre au connecteur sur le PC. REMARQUE : L'installation à trois moniteurs requiert que vous achetiez séparément un moniteur et un câble supplémentaires. Le moniteur devrait avoir un connecteur DVI, HDMI, ou VGA. Un adaptateur DVI-to-VGA est requis pour les moniteurs avec un connecteur VGA. DisplayPort HDMI DVI ● Raccordez le câble DisplayPort au connecteur DisplayPort (requis). ● Raccordez le câble DVI au connecteur DVI inférieur. 3. Mettez chaque moniteur supplémentaire sous tension. 4. Appuyez sur le bouton d'alimentation de chaque écran d'affichage puis sur celui de l'ordinateur. Le témoin d'alimentation de chaque écran d'affichage prendra une couleur ambre ; ils deviendront bleus lorsque le PC démarrera. REMARQUE : Lors de l'installation initiale, seul un écran d'affichage est actif ; il se peut que vous voyiez divers états d'affichage (comme des écrans blancs, bleus, etc.) sur les autres écrans d'affichage jusqu'à ce que l'installation soit terminée. 5. Une fois l'installation terminée, vous verrez le bureau étendu sur tous les écrans d'affichage connectés. 6. Pour modifier le mode d'affichage d'un écran, sélectionnez Démarrer, à partir de l'écran de démarrage, appuyez sur la touche p, sélectionnez Panneau de configuration, sélectionnez Apparence et personnalisation, sélectionnez Afficher, puis sélectionnez l'option que vous souhaitez modifier et suivez les instructions à l'écran. 10 Chapitre 3 Installation de fonctionnalités supplémentaires Installation d'ATI Eyefinity Catalyst™ 1. Faites un clic droit sur l'icône Eyefinity Catalyst™ sur le bureau pour afficher ATI Catalyst Control Center™. 2. Sélectionnez CCC-Advanced, sélectionnez Carte graphique, sélectionnez Bureau et moniteurs puis suivez les instructions à l’écran pour configurer la disposition de l’affichage des deux ou trois moniteurs. Installation d'affichages multiples 11 4 Maintenir votre ordinateur Procédures de nettoyage Garder l’ordinateur propre, sans poussière ni saletés et à l’abri de la chaleur, permet de prolonger sa durée de vie. ● De la poussière, des poils d'animaux et autres particules peuvent s'accumuler, produisant un effet de « couverture » ; il peut en résulter une surchauffe des composants ou, dans le cas du clavier et de la souris, un fonctionnement incorrect et inefficace. ● Vérifiez votre système au minimum une fois par mois pour tout signe visible de poussière et de débris, et nettoyez-le au moins une fois tous les trois mois. ● Rendez-vous sur http://www.hp.com/go/contactHP pour des instructions de nettoyage supplémentaires. Nettoyage des grilles d’aération de l’ordinateur Les fentes d'aération permettent de refroidir l'ordinateur. Nettoyez ces fentes à l'aide d'un petit aspirateur manuel fonctionnant sur piles. Vous éviterez ainsi tout risque d'électrocution. 1. Passez l'aspirateur sur les fentes d'aération du boîtier de l'ordinateur. 2. Retirez tout débris accumulé sur ou autour des ports de l’ordinateur (par exemple, les connecteurs Ethernet et USB). Nettoyage du clavier et de la souris Pour le nettoyage des touches du clavier, utilisez un petit aspirateur à piles pour éviter d'endommager les touches ou les ressorts. 1. Aspirez entre les touches du clavier et le long des rainures. 2. Utilisez un chiffon sec et propre imbibé d’alcool isopropylique (à friction) pour nettoyer l’accumulation de débris sur les touches et les bords du clavier. 3. Nettoyez la souris et son cordon avec des chiffons nettoyants. Si vous utilisez une souris avec une boule, nettoyez aussi la boule et les roulettes à l’intérieur : 1. Retournez la souris et tournez la couronne du couvercle au-dessus de la boule dans le sens contraire des aiguilles d’une montre pour retirer la couronne et dégager la boule. 2. Rincez la boule avec de l’eau tiède savonneuse. 3. Nettoyez les roulettes à l’intérieur de la souris avec un coton-tige imbibé d’alcool isopropylique (à friction). 4. Une fois la boule et les roulettes complètement sèches, remettez-les en place, ainsi que la couronne du couvercle. 12 Chapitre 4 Maintenir votre ordinateur 5 Dépannage et maintenance Reportez-vous à la documentation fournie par le fabricant du produit pour obtenir de plus amples informations sur les problèmes spécifiques aux périphériques, comme les problèmes de moniteur ou d’imprimante. Les tableaux suivants présentent quelques problèmes que vous pourriez rencontrer lors de l’installation, du démarrage, ou de l’utilisation de votre ordinateur, ainsi que des solutions possibles. Pour plus d’informations ou des options supplémentaire pour le dépannage, consultez Obtenir des informations à la page 1. L’ordinateur ne démarre pas Symptôme Solution Message d'erreur : Erreur de disque dur. Redémarrez l'ordinateur. 1. Appuyez simultanément sur les touches Ctrl+Alt+Supprimer du clavier. 2. Sélectionnez l'icône Power (Mise sous tension), puis sélectionnez Redémarrer. Ou, appuyez sur le bouton Power (Mise sous tension) pendant cinq secondes ou plus pour éteindre l’ordinateur, puis appuyez sur le bouton de mise sous tension (Power) pour redémarrer l'ordinateur. 3. Si Windows s'ouvre, procédez à une sauvegarde immédiate de toutes vos données importantes sur un disque dur de sauvegarde. 4. Que vous ayez pu démarrer Windows ou non, contactez l'assistance technique. Le remplacement du lecteur de disque dur ou de la carte mère peut s'avérer nécessaire. L'ordinateur refuse de démarrer ou de s'allumer. Assurez-vous que les câbles qui relient l’ordinateur à la source d’alimentation externe sont correctement branchés. Lorsque les câbles reliant l’ordinateur à la source d’alimentation externe sont bien branchés et que la prise murale fonctionne correctement, le témoin d’alimentation vert à l’arrière de l’ordinateur doit s’allumer. Si ce n’est pas le cas, contactez l’assistance technique. Si l’écran (moniteur) n’affiche rien, le moniteur est probablement mal connecté. Connectez le moniteur à l’ordinateur, puis branchez-le et allumez-le. Voir Affichage (moniteur) à la page 15. Testez la prise murale en y connectant un autre dispositif électrique. L’ordinateur ne démarre pas 13 Symptôme Solution L’ordinateur semble bloqué et ne répond pas. Utilisez le Gestionnaire des tâches pour fermer les programmes qui ne répondent pas, ou pour redémarrer votre ordinateur : 1. Appuyez simultanément sur les touches Ctrl+Alt+Supprimer du clavier. 2. Sélectionnez le Gestionnaire des tâches. 3. Sélectionnez le programme qui ne répond pas, puis sélectionnez Fin de tâche. Si le problème persiste après avoir fermé le programme, redémarrez l’ordinateur : 1. Appuyez simultanément sur les touches Ctrl+Alt+Supprimer du clavier. 2. Sélectionnez l'icône Power (Mise sous tension), puis sélectionnez Redémarrer. Ou, appuyez sur le bouton de mise sous tension (Power) pendant cinq secondes ou plus pour éteindre l’ordinateur, puis appuyez sur le bouton de mise sous tension (Power) pour redémarrer l'ordinateur. Message d'erreur : Disque système invalide ou Disque non système ou Erreur disque. Lorsque le voyant d'activité s'éteint, retirez le disque et appuyez sur la barre d'espace du clavier. L'ordinateur doit maintenant démarrer. Alimentation Symptôme Solution L'ordinateur ne s'éteint pas lorsque vous appuyez sur le bouton de mise sous tension. Appuyez sur le bouton d'alimentation (Power) et maintenez-le enfoncé jusqu’à ce que l’ordinateur s’éteigne. Vérifiez les paramètres d’alimentation. L’ordinateur s’éteint automatiqueme nt. ● La température ambiante est peut-être trop élevée. Laissez-le refroidir. ● Vérifiez que les aérations de l’ordinateur ne sont pas obstruées et que le ventilateur interne fonctionne — consultez Procédures de nettoyage à la page 12. (Il est possible que votre ordinateur ne soit pas équipé d’un ventilateur interne.) 14 Chapitre 5 Dépannage et maintenance Affichage (moniteur) Symptôme Solution L’écran n'affiche rien, et le voyant d’alimentation du moniteur est éteint. Rebranchez le câble d’alimentation au dos du moniteur et à la prise murale. Appuyez sur l'interrupteur du moniteur. L’écran n’affiche rien. Appuyez sur la barre d'espace du clavier ou déplacez la souris pour réactiver l'affichage. Appuyez sur le bouton de Veille (certains modèles uniquement) ou sur la touche Échap du clavier pour sortir du mode Veille. Appuyez sur le bouton de mise sous tension (Power) pour mettre l'ordinateur en marche. Assurez-vous qu’aucune broche du connecteur vidéo du moniteur n’est endommagée : ● Si l’une des broches est endommagée, remplacez le câble de connexion du moniteur. ● Si toutes les broches sont en bon état, rebranchez le câble de connexion du moniteur à l’ordinateur. Si vous avez une installation à plusieurs moniteurs, reportez-vous à Installation d'affichages multiples à la page 9. Clavier et souris (avec câble) Symptôme Solution Votre ordinateur ne reconnaît pas les commandes ou les combinaisons de touches du clavier. Utilisez la souris pour éteindre l’ordinateur, déconnectez et reconnectez le clavier à l’arrière de l’ordinateur, puis redémarrez votre ordinateur. La souris (avec câble) ne fonctionne pas ou n'est pas détectée après l'installation. Débranchez et rebranchez le câble de la souris à l’ordinateur. Si la souris n’est toujours pas détectée, éteignez l’ordinateur, déconnectez et reconnectez le câble de la souris, puis rallumez l’ordinateur. Affichage (moniteur) 15 Symptôme Solution Le curseur ne se déplace pas lorsque les touches fléchées du clavier numérique sont utilisées. Appuyez sur Verr Num sur le clavier pour désactiver Verr Num, afin de pouvoir utiliser les touches fléchées du clavier numérique. Le curseur ne suit pas les mouvements de la souris. Utilisez le clavier pour enregistrer les modifications dans tous les programmes ouverts, puis redémarrez votre ordinateur. 1. Appuyez simultanément sur les touches Alt+Tabulation pour accéder à un programme ouvert. 2. Appuyez simultanément sur les touches Ctrl et S pour enregistrer vos modifications dans le programme choisi. (Ctrl+S est le raccourci clavier de l'option Enregistrer dans la plupart des programmes mais pas tous.) 3. Répétez les étapes 1 et 2 pour enregistrer les modifications dans tous les programmes ouverts. 4. Après avoir sauvegardé toutes les modifications dans tous les programmes ouverts, appuyez sur le bouton de mise sous tension (Power) pour éteindre l'ordinateur. 5. Une fois la procédure d'arrêt terminée, débranchez et rebranchez la prise de la souris à l'arrière de l'ordinateur et redémarrez votre ordinateur. 16 Chapitre 5 Dépannage et maintenance Clavier et souris (sans fil) Symptôme Solution Le clavier ou la souris sans fil ne fonctionne pas ou n'est pas détecté(e) après l'installation. ● Assurez-vous d’utiliser un clavier ou une souris sans fil situé à portée du récepteur, approximativement 3 mètres (10 pieds) pour une utilisation normale, et 30 cm (12 pouces) lors de la configuration initiale ou de la resynchronisation. ● Assurez-vous que la souris n’est pas en mode veille (après 20 minutes d'inactivité). Cliquez sur le bouton gauche de la souris pour la réactiver. ● Remplacez les piles du clavier et de la souris. ● Resynchronisez le clavier et la souris avec le récepteur en exécutant les étapes suivantes. Le récepteur, le clavier sans fil et la souris sans fil illustrés ci-après ne sont que de simples exemples. Vos modèles peuvent varier. IMPORTANT : Au cours de ces étapes, placez le clavier et la souris sans fil au même niveau que le récepteur, à 30 cm (12 pouces) du récepteur, et à l’écart de toute source d’interférences, comme d’autres périphériques. 1. Débranchez le récepteur d’un connecteur USB de votre ordinateur, puis rebranchez-le. Le modèle de votre ordinateur peut disposer d’un connecteur dédié pour le récepteur. Le cas échéant, utilisez un des connecteurs USB situés à l'avant de l’ordinateur. 2. Vérifiez que la souris est bien allumée (A), puis appuyez et maintenez le bouton Connexion enfoncé (B) sous la souris pendant 5 à 10 secondes jusqu'à ce que le témoin lumineux du récepteur s'allume ou s'arrête de clignoter. Le récepteur se déconnecte au bout de 60 secondes. Afin de vous assurer que la connexion a bien été établie et que le récepteur ne s'est pas déconnecté, déplacez la souris et vérifiez la réponse sur l'écran. Off On Connect A B 3. Une fois la connexion avec la souris établie, continuez en suivant les étapes suivantes pour répéter la procédure pour le clavier. 4. Appuyez sur le bouton Connexion (C) sous le clavier et maintenez-le enfoncé pendant 5 à 10 secondes jusqu'à ce que le témoin du récepteur s'allume ou s'arrête de clignoter. C Clavier et souris (sans fil) 17 Haut-parleurs et son Symptôme Solution Il n’y a pas de son. 1. À partir de l'écran de démarrage, appuyez sur la touche p, sélectionnez Panneau de configuration, puis sélectionnez System and Security (Système et sécurité). 2. Sous Centre de maintenance, sélectionnez Résoudre des problèmes informatiques courants, puis sélectionnez Résoudre les problèmes liés aux lectures audio. Si vous utilisez un connecteur HDMI avec la carte graphique (certains modèles uniquement) pour connecter votre moniteur à l'ordinateur, connectez également des haut-parleurs analogiques au connecteur de sortie audio pour entendre les sons lors de la configuration initiale de votre ordinateur. Reportez-vous aux instructions de mise en route pour savoir comment connecter les haut-parleurs analogiques. Si vous utilisez des haut-parleurs intégrés dans le moniteur, utilisez le bouton de volume du panneau avant du moniteur pour régler le volume. Utilisez les boutons du panneau avant pour ouvrir l'interface OSD (réglage à l'écran) et vous assurer que le son (audio) est activé et que le volume est réglé comme il se doit. Assurez-vous d’avoir branché des haut-parleurs sous tension (actifs) et qu’ils sont allumés. Éteignez l'ordinateur, débranchez et rebranchez les haut-parleurs. Assurez-vous que les haut-parleurs sont branchés dans un connecteur audio, pas dans un connecteur Line In ou de casque d’écoute. Pour quitter le mode Veille, appuyez sur le bouton Veille (certains modèles uniquement) ou sur la touche Echap. Débranchez les éventuels écouteurs connectés à l'ordinateur, ou votre système de hautparleurs. Le volume est très faible ou insatisfaisant. Assurez-vous d’avoir connecté les haut-parleurs au connecteur Audio Out (vert pâle) à l’arrière de l’ordinateur. (D’autres connecteurs audio sont utilisés pour les haut-parleurs à plusieurs canaux.) Des haut-parleurs non alimentés (haut-parleurs sans source d’alimentation propre, comme des piles ou un câble d’alimentation) ne fournissent pas un son suffisant. Remplacez-les par des haut-parleurs alimentés. 18 Chapitre 5 Dépannage et maintenance Accès à Internet Symptôme Solution Les programmes Internet ne démarrent pas automatiquement. Ouvrez une session Internet et lancez le programme de votre choix. Impossible d’établir une connexion à Internet. 1. À partir de l'écran de démarrage, appuyez sur la touche p, puis sélectionnez Panneau de configuration. 2. Sous Réseau et Internet, sélectionnez Connexion à Internet. Vérifiez si vous utilisez des câbles adaptés à votre type de connexion Internet. Votre ordinateur peut être équipé d’un modem pour réseau commuté et d’une carte réseau Ethernet (également appelée carte d’interface réseau ou NIC). Un modem utilise un câble de téléphone standard alors que la carte réseau utilise un câble réseau pour se connecter à un réseau local (LAN). Ne connectez pas un câble téléphonique à la carte réseau, et ne branchez pas un câble réseau sur une ligne téléphonique ; cela pourrait endommager la carte réseau. Exécutez l'assistant de configuration sans fil. 1. À partir de l'écran de démarrage, appuyez sur la touche p, sélectionnez Panneau de configuration, sélectionnez Réseau et Internet, puis sélectionnez Centre Réseau et partage. 2. Dans la fenêtre Centre Réseau et partage, sélectionnez Configurer une nouvelle connexion ou un nouveau réseau pour ouvrir l’assistant, puis suivez les instructions qui s’affichent à l’écran. Si votre système dispose d’une antenne externe, essayez de placer l’antenne dans une meilleure position. Si l’antenne est interne, essayez de déplacer l’ordinateur. Essayez de vous connecter plus tard, ou prenez contact avec votre fournisseur d'accès à Internet (FAI) pour obtenir de l’aide. Accès à Internet 19 Dépannage du logiciel Pour corriger des problèmes logiciels, essayez ces méthodes : ● Éteignez complètement l'ordinateur puis rallumez-le. C'est la manière la plus facile (et parfois la meilleure). ● Mettez à jour les pilotes (voir section suivante, "Mise à jour des pilotes de périphériques"). ● Utilisez le programme Restauration du système de Microsoft et procédez à une réinstallation des pilotes matériels (voir Restauration du système Microsoft plus loin dans ce tableau). — Restaure la configuration qu'utilisait votre ordinateur avant l'installation du logiciel. ● Réinstallez le programme ou le pilote matériel (voir "Réinstallation des logiciels et des pilotes matériels" plus loin dans ce tableau). — Restaure les paramètres d'usine du logiciel (s'il a été fourni avec le produit) ou du pilote matériel. ● Réinstallation système (voir Guide de dépannage et de maintenance sur votre ordinateur. Sélectionnez l'application HP Support Assistant (Service d'assistance HP) sur l'écran de démarrage, sélectionnez Poste de travail, puis sélectionnez les User guides (guides de l'utilisateur)). — Efface et reformate le disque dur, puis réinstalle le système d’exploitation, les programmes et les pilotes. Cela efface tous les fichiers de données que vous avez créés. Mise à jour des pilotes de périphériques Effectuez la procédure suivante pour mettre à jour un pilote ou revenir à une version antérieure du pilote si le plus récent ne résout pas votre problème : 1. À partir de l'écran de démarrage, appuyez sur la touche p, puis sélectionnez Panneau de configuration. 2. Sélectionnez System and Security (Système et sécurité), puis dans la zone Système, sélectionnez Gestionnaire de périphériques. 3. Sélectionnez la flèche pour développer le type de périphérique que vous souhaitez mettre à jour ou que vous voulez restaurer. (Les pilotes DVD/CD-ROM par exemple.) 4. Double-cliquez sur l'élément concerné (par exemple, HP DVD Writer 640b). 5. Sélectionnez l'onglet Pilote. 6. Pour mettre un pilote à jour, sélectionnez Mettre à jour le pilote et suivez les instructions à l'écran. Ou, pour revenir à une version antérieure d’un pilote, sélectionnez Restaurer le pilote, puis suivez les instructions à l'écran. 20 Chapitre 5 Dépannage et maintenance Restauration du système de Microsoft Si vous rencontrez un problème qui peut être dû à un logiciel installé sur votre ordinateur, utilisez la fonction Restauration du système pour ramener votre ordinateur à son état lors d’un point de reprise précédent. Vous pouvez aussi établir ces points manuellement. REMARQUE : Utilisez toujours la procédure Restauration du système avant d’utiliser le programme Récupération système. Pour commencer la restauration d'un système ou pour ajouter des points de restauration manuellement : 1. Fermez tous les programmes. 2. À partir de l'écran de démarrage, appuyez sur la touche p, puis sélectionnez Panneau de configuration. 3. Sélectionnez System and Security (Système et sécurité), sélectionnez Système, puis sélectionnez Protection du système. 4. Sélectionnez l'onglet Protection du système sur l'écran des Propriétés système. 5. Conformez-vous aux instructions qui s’affichent à l’écran. Dépannage du logiciel 21 Réinstallation des logiciels et des pilotes Si une application ou un pilote installé en usine est endommagé, vous pouvez les réinstaller à l'aide du programme Gestionnaire de réinstallation (certains modèles uniquement). REMARQUE : N'utilisez pas le Gestionnaire de réinstallation pour réinstaller les logiciels contenus sur les CD ou les DVD qui se trouvaient dans l’emballage de votre ordinateur. Réinstallez ces programmes directement à partir des CD ou des DVD. Avant de désinstaller un programme, assurez-vous que vous disposez d’un moyen de le réinstaller ultérieurement. Assurez-vous d'être certain qu’il est encore disponible à l’endroit d’où vous l’aviez installé initialement (par exemple, un disque ou Internet). Vous pouvez aussi vous assurer que la liste des programmes que vous pouvez réinstaller à partir du Gestionnaire de récupération. Pour consulter la liste des programmes installables à partir du Gestionnaire de réinstallation : 1. À partir de l'écran de démarrage, appuyez sur la touche g, puis sélectionnez Gestionnaire de réinstallation. Si vous y êtes invité, cliquez sur Oui pour autoriser le programme à continuer. 2. Sous I need help immediately (J’ai besoin d’aide immédiatement), sélectionnez Software Program Reinstallation (Réinstallation des logiciels). 3. Sélectionnez Suivant sur l’écran de bienvenue. Une liste de programmes s’ouvre. Vérifiez si votre programme est présent. Pour réinstaller un programme à l'aide du Gestionnaire de récupération : 1. À partir de l'écran de démarrage, appuyez sur la touche g, puis sélectionnez Gestionnaire de réinstallation. 2. Sélectionnez Software Program Reinstallation (Réinstallation des logiciels), puis sélectionnez Suivant sur l'écran de Bienvenue. 3. Choisissez le programme que vous souhaitez réinstaller, sélectionnez Suivant et suivez les instructions qui apparaissent à l’écran. 4. Après la récupération, redémarrez l'ordinateur. Cette dernière étape est impérative. Vous devez toujours redémarrer l'ordinateur lorsque vous avez terminé de réinstaller des applications ou des pilotes. Pour désinstaller un programme : 1. Fermez tous les programmes et les dossiers. 2. À partir de l'écran de démarrage, appuyez sur la touche p, puis sélectionnez Panneau de configuration. 3. Sous Programme, sélectionnez Désinstaller un programme. 4. Sélectionnez le programme à supprimer, puis sélectionnez Désinstaller. 22 Chapitre 5 Dépannage et maintenance 6 Informations sur l'assistance technique Informations sur l'assistance technique Simple d'accès. Facile à utiliser. Le service d'assistance clientèle HP déjà plusieurs fois récompensé incarne notre engagement à vous aider pour profiter au mieux de votre ordinateur. Que ce soit par le biais des outils installés sur votre ordinateur, des informations disponibles sur Internet, par téléphone ou par l'entremise de votre détaillant local, vous trouverez des réponses à tout. Avant de contacter le Centre d'aide à la clientèle de HP, il est important d'avoir les informations suivantes à portée de main. ● Numéro de modèle ● Numéro du produit ● Numéro de série ● Numéro de version logicielle ● Système d'exploitation ● Date d'achat Nous vous invitons à prendre note des informations suivantes concernant votre ordinateur en vue d'y faire référence ultérieurement. Les quatre premiers éléments de la liste (numéro de modèle, numéro de produit, numéro de série et numéro de version logicielle) peuvent être consultés à l'aide du HP Support Information (Informations sur le support technique HP). À partir de l'écran de démarrage, appuyez sur la touche s, puis sélectionnez HP Support Information (Informations sur le support technique HP). N'oubliez pas d'enregistrer votre achat ! Rendez-vous sur : http://www.hp.com/apac/register. Obtenir de l'aide 1. Utilisez Aide et support Windows pour répondre à vos questions concernant le matériel et les logiciels. À partir de l'écran de démarrage, appuyez sur la touche a, puis sélectionnez Aide et support. 2. Utilisez le service d'assistance. À partir de l'écran de démarrage, appuyez sur la touche s, puis sélectionnez HP Support Assistant (Service d'assistance HP). Le HP Support Assistant (Service d'assistance HP) vous apportera des informations utiles concernant le dépannage et les diagnostics, vous pourrez y trouver : Informations sur l'assistance technique 23 ● support par e-mail ● conversation en temps réel avec des spécialistes de l’assistance technique HP qualifiés ● numéros de téléphone du support technique 3. Pour obtenir une aide en ligne, allez sur le site Web du HP Customer Care Center (Centre d'aide à la clientèle HP) à l'adresse suivante : http://www.hp.com/go/contactHP. Une assistance téléphonique pour que vous puissiez démarrer est assurée pendant trente (30) jours à partir de la date à laquelle vous avez acheté votre ordinateur. Après trente (30) jours, des frais peuvent être facturés, mais l'assistance est toujours disponible. Service clientèle pour les réparations Si votre ordinateur a besoin de réparations ou de remplacement de pièces, vous avez deux options : ● Vous pouvez facilement remplacer de nombreux éléments de votre ordinateur qui sont considérés comme des pièces remplaçables par l'utilisateur. Il s'agit de la méthode de réparation la plus rapide, étant donné que nous pouvons souvent envoyer la pièce directement à votre domicile ou à votre bureau en quelques jours. (Il se peut que cette option ne soit pas disponible dans tous les pays ou toutes les régions.) ● Si une réparation s'impose, le HP Customer Care Center (Centre d'aide à la clientèle HP) prendra les dispositions nécessaires pour réparer votre ordinateur. Ces services sont assurés pendant la période de garantie. Il existe quelques limitations et exclusions de garantie (ainsi que certains détails importants), qui sont décrits dans le guide de la HP Worldwide Limited Warranty and Technical Support (Garantie HP limitée internationale et support technique). Avant de mettre à niveau votre matériel Les mises à niveau matérielles que vous avez l'intention de faire devraient être effectuées uniquement après que vous ayez entièrement configuré votre nouvel ordinateur. Reportez-vous aux instructions de configuration au début de ce guide pour vous aider. Si vous rencontrez des problèmes pour configurer votre système et le mettre en marche, veuillez immédiatement contacter le HP Customer Care Center (Centre d'aide à la clientèle HP) indiqué précédemment dans ce guide, et un représentant à la clientèle HP vous aidera. Cela doit être fait avant de tenter toute mise à niveau de votre système. En brisant le sceau de sécurité à l'arrière de l'ordinateur, vous confirmez que l'ordinateur fonctionnait correctement avant que vous ne tentiez de mettre à niveau votre système. Une fois le sceau de sécurité brisé, votre ordinateur est alors, dans la mesure permise par la loi locale, couvert par les conditions figurant 24 Chapitre 6 Informations sur l'assistance technique dans le guide HP Worldwide Limited Warranty and Technical Support (Garantie HP limitée internationale et support technique). Avant de mettre à niveau votre matériel 25 Printed in The power to make a change Thank you for your purchase. HP is dedicated to producing the highest quality, best performing, and easiest to use computers in the world. HP also designed this product with the environment in mind. If this computer is a replacement for an older computer you no longer need, go to www.hp.com/go/recycle to find out if HP can help you dispose of your old computer with minimum impact on the planet. Le pouvoir de changer les choses Nous vous remercions pour votre achat. HP est spécialisé dans le développement et la fabrication d'ordinateurs de très haute qualité et parmi les plus performants et les plus simples à utiliser dans le monde. HP a également conçu ce produit dans un souci de respect de l'environnement. Si cet ordinateur vient en remplacement d'un ancien ordinateur dont vous n'avez plus besoin, rendez-vous sur la page www.hp.com/go/recycle pour savoir si HP peut vous aider à vous débarrasser de votre ancien ordinateur avec un impact minimal pour la planète. *700601-DN1* 700601-DN1

MARQUE: HP REFERENCE: COMPAQ 100-425 NFM CODIC: 4039220 12” (30cm) HDMI DVI VGA DisplayPort DVI/HDMI DVI/VGA http://www.hp.com/go/contactHP http://welcome.hp.com/country/us/en/wwcontact_us.html Droit d'auteur et licence © Copyright 2012 Hewlett-Packard Development Company, L.P. Les informations contenues dans ce document peuvent être modifiées sans préavis. Les garanties relatives aux produits et aux services HP sont décrites dans les déclarations de garantie limitée expresse qui les accompagnent. Aucun élément du présent document ne peut être interprété comme constituant une garantie supplémentaire. HP ne saurait être tenu pour responsable des erreurs ou omissions de nature technique ou rédactionnelle qui pourraient subsister dans le présent document. Ce produit intègre une technologie de protection des droits d’auteur qui est protégée par des brevets américains et par d’autres droits à la propriété intellectuelle. L'utilisation de cette technologie de protection des droits d’auteur doit être autorisée par Macrovision et est destinée à l'usage des particuliers ou d'autres utilisations de visualisation limitée dans l'absence d'autre autorisation de Macrovision. La rétroingénierie ou le désassemblage du produit sont interdits. Microsoft et Windows sont des marques commerciales de Microsoft Corporation aux Etats-Unis et dans d'autres pays. HP est en faveur d'une utilisation licite des technologies et n'appuie pas ni n'encourage l'utilisation de produits pour d'autres fins que celles autorisées par la loi sur les droits d'auteur. Informations sur le produit Ce manuel décrit des fonctions communes à la plupart des modèles. Cependant, certaines fonctions peuvent ne pas être disponibles sur votre ordinateur. Les informations contenues dans le présent document peuvent faire l’objet de modifications sans préavis. Déclaration de garantie d'impression à la demande Vous trouverez la garantie limitée HP expressément fournie applicable à votre produit dans le même emplacement que les guides de l'utilisateur sur votre ordinateur et/ou dans le CD/DVD livré dans la boîte. Pour certains pays/ certaines régions, une garantie limitée HP imprimée est fournie dans l'emballage. Dans certains pays/régions où la garantie n'est pas fournie au format imprimé, vous pouvez demander une copie imprimée via l'adresse hp.com/go/orderdocuments ou écrire à : Amérique du nord : Hewlett-Packard, MS POD, 11311 Chinden Blvd., Boise, ID 83714, ÉtatsUnis Europe, Moyen-Orient, Afrique : HewlettPackard, POD, Via G. Di Vittorio, 9, 20063, Cernusco s/Naviglio (MI), Italie Asie du Pacifique : Hewlett-Packard, POD, P.O. Box 200, Alexandra Post Office, Singapour 911507 Lorsque vous demandez une copie de votre garantie, veuillez inclure votre numéro de produit, la période de garantie (indiquée sur votre étiquette de maintenance), votre nom et votre adresse postale. IMPORTANT NE retournez PAS votre produit HP aux adresses indiquées ci-dessus. Pour des produits provenant des États-Unis, accédez au site http://www.hp.com/go/contactHP. Pour une assistance technique au niveau international, accédez au site http://welcome.hp.com/country/ us/en/wwcontact_us.html. 1 Obtenir des informations Type d’informations Où trouver ● Configurer l'ordinateur. Quick Setup (Installation rapide) (ce guide) ● Utiliser l'ordinateur. ● Connectez-vous à Internet. Quick Setup (Installation rapide) (ce guide) ● Restaurer les paramètres d’usine. Guide de dépannage et de maintenance sur votre ordinateur. Sélectionnez l'application le HP Support Assistant (Service d'assistance HP) sur l'écran de démarrage, sélectionnez Poste de travail, puis sélectionnez les User guides (guides de l'utilisateur). ● Regarder les vidéos de démonstration sur l'utilisation des fonctions de l'ordinateur. Rendez-vous sur http://www.hp.com/supportvideos (en anglais uniquement) ● Apprenez à utiliser le système d’exploitation Microsoft Windows. ● Trouver des informations sur le mot de passe Windows. ● Trouver des liens vers les mises à jour des pilotes. ● Lire les questions fréquemment posées. Aide et support À partir de l'écran de démarrage, appuyez sur la touche a, puis sélectionnez Aide et support. Pour une assistance technique sur les États-Unis, accédez au site http://www.hp.com/go/contactHP. Pour une assistance technique au niveau international, accédez au site http://welcome.hp.com/country/us/en/wwcontact_us.html. Outils de dépannage Windows 1. À partir de l'écran de démarrage, appuyez sur la touche p, puis sélectionnez Panneau de configuration. 2. Sélectionnez System and Security (Système et sécurité), puis dans Centre de maintenance, sélectionnez Résoudre des problèmes informatiques courants. ● Dépannez les problèmes matériels et logiciels les plus courants sur votre ordinateur. Guide de dépannage et de maintenance sur votre ordinateur. Sélectionnez l'application le HP Support Assistant (Service d'assistance HP) sur l'écran de démarrage, sélectionnez Poste de travail, puis sélectionnez les User guides (guides de l'utilisateur). 1 Type d’informations Où trouver ● Recherchez les manuels de l’utilisateur électroniques et les caractéristiques de votre modèle d’ordinateur. ● Commandez des pièces et recherchez une aide supplémentaire pour le dépannage. Site Web Assistance HP : http://www.hp.com/go/contactHP ● Mettez à niveau ou remplacez des composants de votre ordinateur. Guide de mise à niveau et d'entretien courant Site Web Assistance HP : http://www.hp.com/go/contactHP ● Recherchez des informations sur la garantie de votre ordinateur. HP Worldwide Limited Warranty and Technical Support (Garantie HP limitée internationale et support technique) incluse sur votre ordinateur. Sélectionnez l'application le HP Support Assistant (Service d'assistance HP) sur l'écran de démarrage, sélectionnez Poste de travail, puis sélectionnez les User guides (guides de l'utilisateur). ● Recevez des informations à jour et de l’aide de la part de la communauté Windows. http://www.hp.com/support/consumer-forum ● Raccorder à un téléviseur. Guide « Regarder et enregistrer des émissions télévisées » Sélectionnez l'application le HP Support Assistant (Service d'assistance HP) sur l'écran de démarrage, sélectionnez Poste de travail, puis sélectionnez les User guides (guides de l'utilisateur). Si le manuel ne s’y trouve pas, rendez-vous sur http://www.hp.com/go/ contactHP. 2 Chapitre 1 Obtenir des informations Type d’informations Où trouver ● Maintenir votre ordinateur. HP Support Assistant (Service d'assistance HP) : maintient les performances de votre ordinateur et résout les problèmes plus rapidement grâce aux mises à jour automatisées, aux diagnostics intégrés et à l’assistance guidée. Sélectionnez l'application HP Support Assistant (Service d'assistance HP) sur l'écran de démarrage. Guide de dépannage et de maintenance Sélectionnez l'application le HP Support Assistant (Service d'assistance HP) sur l'écran de démarrage, sélectionnez Poste de travail, puis sélectionnez les User guides (guides de l'utilisateur). Maintaining Your Computer (Maintenir votre ordinateur) (ce guide) ● Accédez aux notifications réglementaires et relatives à la sécurité. Notifications réglementaires, relatives à la sécurité et à l'environnement Sélectionnez l'application HP Support Assistant (Service d'assistance HP) sur l'écran de démarrage, sélectionnez Poste de travail, puis sélectionnez les User guides (guides de l'utilisateur) ou rendez-vous sur http://www.hp.com/go/contactHP. ● Trouver des informations relatives à l'ergonomie. Guide de sécurité et ergonomie du poste de travail Sélectionnez l'application HP Support Assistant (Service d'assistance HP) sur l'écran de démarrage, sélectionnez Poste de travail, puis sélectionnez les User guides (guides de l'utilisateur) ou rendez-vous sur http://www.hp.com/ergo. 3 2 Configuration de votre ordinateur AVERTISSEMENT ! Afin d'éviter tout risque de choc électrique ou de dommages à votre équipement : • Placez l'ordinateur dans un endroit éloigné et protégé de la poussière, de l'humidité et de la suie. Ces éléments peuvent augmenter la température interne, provoquer un incendie ou entraîner une électrocution. • Ne désactivez pas la fiche de mise à la terre du cordon d'alimentation. La mise à la terre est une caractéristique de sécurité importante. • Branchez le cordon d'alimentation dans une prise électrique mise à la terre à laquelle vous pouvez facilement accéder à tout moment. • Mettez l'équipement hors tension en débranchant le cordon d'alimentation de la prise électrique. Afin d'éviter une exposition directe au rayon laser, ne tentez pas d'ouvrir le boîtier du lecteur de CD-ROM ou de DVD. • Le bloc d'alimentation électrique est préréglé pour le pays ou la région où vous avez acheté votre ordinateur. Si vous déménagez, vérifiez bien la tension requise dans ce nouvel environnement avant de relier votre ordinateur à une prise de courant. L'ordinateur peut être très lourd ; veillez à adopter une position ergonomique adéquate lors de sa manipulation. Pour réduire les risques de blessures graves, lisez le manuel Sécurité et ergonomie du poste de travail. Le manuel est disponible sur le Web à l'adresse http://www.hp.com/ergo. 1. Placez l'ordinateur de telle sorte qu'aucune ouverture de ventilation ne soit obstruée et que le câblage ne se trouve pas dans un passage ou à un endroit où quelqu’un risque de marcher dessus ou de l'endommager en plaçant un meuble dessus. 2. Branchez tous les cordons d'alimentation du moniteur, de l'ordinateur et des accessoires à un appareil de protection contre les sautes de puissance sur lequel est mentionné tout spécialement une protection contre les sautes de puissance, une alimentation sans coupure (UPS) ou tout autre appareil similaire. Si l'ordinateur dispose d’un syntoniseur de télévision, d’un modem ou d’une connexion téléphonique, protégez aussi votre ordinateur en utilisant la protection contre les sautes de puissance à l’aide de ces entrées des signaux. Connectez le câble de votre téléviseur ou le cordon de téléphone à l’appareil de protection contre les sautes de puissance, puis connectez l'appareil à l’ordinateur. 3. Télécharger et installer les mises à jour du système d'exploitation. 4 Chapitre 2 Configuration de votre ordinateur a. Identifiez le système d'exploitation et la version actuels de votre ordinateur. (À partir de l'écran de démarrage, appuyez sur la touche p, sélectionnez Panneau de configuration, sélectionnez System and Security (Système et sécurité), puis sélectionnez Système. Le système d'exploitation et la version sont indiqués sous Spécifications.) b. Ouvrez votre navigateur Internet et allez sur http://welcome.hp.com/ country/us/en/wwcontact_us.html. c. Si besoin est, choisissez votre pays et la langue, puis cliquez sur Support et pilotes. d. Sélectionnez Téléchargement de pilotes et logiciels, tapez le nom et la référence de votre ordinateur dans le champ du produit, puis appuyez sur la touche Entrée. e. Si nécessaire, sélectionnez votre modèle d'ordinateur dans les résultats de la recherche du produit. f. Sélectionnez le système d'exploitation de votre ordinateur. g. Cliquez sur Télécharger pour chaque mise à jour que vous souhaitez télécharger. h. Suivez les instructions à l'écran pour installer chaque mise à jour téléchargée. 4. Vérifiez si le carton d'emballage de l'ordinateur contient des informations détaillées supplémentaires sous forme imprimée ou des mises à jour. 5. Lisez les Notifications réglementaires, relatives à la sécurité et à l'environnement incluses avec votre ordinateur. Sélectionnez l'application HP Support Assistant (Service d'assistance HP) sur l'écran de démarrage, sélectionnez Poste de travail, puis sélectionnez les User guides (guides de l'utilisateur). 6. Lisez le Guide de sécurité et ergonomie du poste de travail pour installer correctement votre poste de travail, savoir quelle posture prendre, avoir quelques conseils relatifs à la santé et aux habitudes de travail et connaître les consignes de sécurité concernant la mécanique et l’alimentation électrique de votre système. Sélectionnez l'application HP Support Assistant (Service d'assistance HP) sur l'écran de démarrage, sélectionnez Poste de travail, puis sélectionnez les User guides (guides de l'utilisateur) ou rendez-vous sur http://www.hp.com/ergo. Après la configuration initiale de l’ordinateur, vous pouvez, si vous le souhaitez, y installer des logiciels ou périphériques supplémentaires. Vérifiez la configuration requise (système d’exploitation, mémoire, etc.) avant d'acheter un nouveau logiciel ou un nouveau matériel pour votre ordinateur. Respectez les consignes du fabricant du logiciel pour installer le nouveau logiciel. 5 REMARQUE : N'utilisez que des logiciels originaux concédés sous licence. L'installation de logiciels copiés peut s'avérer instable, infecter l'ordinateur par un virus, ou être illégale. Les solutions de sécurité peuvent détecter le vol, les mauvaises manipulations et les attaques logicielles, mais elles ne peuvent pas les éviter. Connexion à Internet Étapes pour vous connecter à Internet : 1. Branchez le matériel conformément aux instructions de mise en route. 2. Accédez à un service Internet. Ouvrir un compte auprès d'un fournisseur de services Internet (ISP) Si vous disposez déjà d’un compte d’accès, passez cette étape et suivez les instructions données par le fournisseur. 3. En utilisant votre connexion Internet par le biais de votre FAI, ouvrez un navigateur Web et parcourez Internet. REMARQUE : Si vous avez des problèmes pour vous connecter à Internet, consultez Accès à Internet à la page 19. 6 Chapitre 2 Configuration de votre ordinateur 3 Installation de fonctionnalités supplémentaires Utilisation de Beats Audio™ Votre PC HP TouchSmart présente des connecteurs audio (écouteurs et sortie audio) qui sont optimisés pour des écouteurs Beats Audio™ et des systèmes audio externes (achetés séparément). Les modèles Select HP TouchSmart PC incluent également quatre haut-parleurs internes optimisés grâce à la technologie Beats et un bouton de basculement Beats sur le clavier. Votre ordinateur est prêt à l'utilisation pour que vous puissiez écouter de la musique avec le système Beats activé. Pour désactiver Beats, appuyez sur le bouton de basculement Beats ; l'icône de désactivation de Beats apparaît à l'écran. Pour activer Beats, appuyez à nouveau sur le bouton de basculement Beats. Si votre clavier ne présente pas le bouton de basculement Beats, appuyez sur Fn+B pour activer et désactiver Beats. Pour afficher l'interface de l'utilisateur de Beats, à partir de l'écran de démarrage, appuyez sur la touche b, puis sélectionnez HP Beats Audio (HP Beats Audio). Tout ce que vous avez à faire c'est de brancher les écouteurs Beats Audio dans le connecteur latéral pour écouteurs afin d'avoir une séparation des sons nette et claire. Afin de profiter du plein potentiel du système audio BEATS à l'aide des haut-parleurs internes, HP recommande de connecter un caisson de basse HP au connecteur Sub sur le panneau arrière. Si vous utilisez un système audio externe, branchez-le dans le connecteur de sortie audio sur le panneau arrière. Utilisation d'un moniteur HDMI Si votre ordinateur présente une carte graphique avec un connecteur HDMI (High Definition Multimedia Interface), Hewlett-Packard recommande d'utiliser un connecteur DVI ou VGA pour un moniteur, et d'utiliser le HDMI pour raccorder un téléviseur. Si vous utilisez le port HDMI pour connecter votre moniteur, il vous faudra peutêtre régler certains paramètres pour pouvoir entendre le son (reportez-vous aux procédures suivantes). C'est pour cela que HP vous recommande de connecter des haut-parleurs analogiques à l’ordinateur si vous souhaitez entendre le son lors de son installation initiale. Pour un affichage optimal, il se peut que vous ayez à ajuster le réglage de la résolution pour le moniteur (voir Ajustement de la résolution à la page 8). Conservez ce document pour référence future. REMARQUE : Si vous devez un jour restaurer le système d'exploitation de l'ordinateur avec le Gestionnaire de restauration, vous devrez également répéter ces procédures pour activer le son et ajuster la résolution pour le connecteur HDMI. Utilisation de Beats Audio™ 7 IMPORTANT : Vous devez connecter le moniteur HDMI à la carte graphique avant d'activer le son et d'ajuster la résolution. Activation du son 1. Appuyez sur la touche Windows du clavier pour afficher le Bureau. 2. Faites un clic droit sur l'icône du Volume (haut-parleur blanc) dans la zone de notification, à l'extrémité droite de la barre des tâches. 3. Sélectionnez les Périphériques de lecture. La fenêtre Son s'ouvre. 4. Dans l’onglet Lecture, recherchez le périphérique par défaut. Il est possible qu’il soit repéré par un cercle vert muni d’une coche. Si le périphérique par défaut est l’un des suivants, votre moniteur HDMI est déjà activé : ● Audio haute définition NVIDIA (certains modèles uniquement) ● Audio haute définition ATI (certains modèles uniquement) ● Sortie HDMI Realtek Sélectionnez le bouton Annuler pour fermer la fenêtre, puis continuez avec la procédure suivante « Ajuster la résolution », si nécessaire. Si le périphérique par défaut n’est pas l’un de ces périphériques, passez à l’étape 5. 5. Si l’une des options HDMI suivantes est disponible dans l’onglet Lecture, sélectionnez-la : ● Audio haute définition NVIDIA (certains modèles uniquement) ● Audio haute définition ATI (certains modèles uniquement) Dans le cas contraire, sélectionnez la Sortie HDMI Realtek. 6. Sélectionnez Définir par défaut. 7. Sélectionnez OK pour fermer la fenêtre. Cela termine la procédure pour activer le son HDMI. Ajustement de la résolution Pour ajuster la résolution, suivez les instructions concernant votre type de carte graphique. Appuyez sur la touche Windows du clavier pour afficher le Bureau. Cliquez avec le bouton droit sur un endroit vide du bureau, puis : ● Si le Panneau de configuration NVIDIA est présent, suivez la procédure indiquée dans « Cartes graphiques NVIDIA ». ● Si le Catalyst Control Center est disponible, suivez la procédure indiquée dans « Cartes graphiques ATI ». ● Si uniquement la Résolution de l’écran est disponible, suivez la procédure indiquée dans « Autres cartes graphiques ». 8 Chapitre 3 Installation de fonctionnalités supplémentaires Cartes graphiques NVIDIA 1. Cliquez avec le bouton droit de la souris sur une zone vide du Bureau, puis cliquez sur Panneau de configuration NVIDIA. La fenêtre Sélection de l’affichage s’ouvre. 2. Dans la zone Sélection d'une tâche, sur la gauche, dans Afficher, cliquez sur Changer la résolution. La fenêtre Changer la résolution s’ouvre. 3. Si votre ordinateur HP est connecté à un moniteur HP, assurez-vous que la case Afficher uniquement les résolutions TV n’est pas cochée. Si votre ordinateur HP est connecté à un moniteur autre que HP, assurez-vous que la case Afficher uniquement les résolutions TV est cochée. Au besoin, cliquez dans la case pour la décocher ou la cocher. 4. Fermez le panneau de configuration NVIDIA. Cela termine la procédure d'ajustement de la résolution pour les cartes graphiques NVIDIA. Cartes graphiques ATI 1. Cliquez avec le bouton droit de la souris sur une zone vide du Bureau, puis cliquez sur Centre de contrôle Catalyst™. La fenêtre Catalyst Control Center s’ouvre. 2. Sélectionnez Cartes graphiques puis Ordinateurs de bureau et affichages dans le coin supérieur gauche de la fenêtre. 3. Dans la fenêtre Ordinateurs de bureau et affichages, cliquez avec le bouton droit de la souris sur l’icône du moniteur dans le coin inférieur gauche de la fenêtre et sélectionnez Configurer. La fenêtre DTV (HDMITM) 2 s’ouvre. 4. Si votre ordinateur HP est connecté à un moniteur HP, assurez-vous que la case Afficher uniquement les résolutions TV n’est pas cochée. Si votre ordinateur HP est connecté à un moniteur autre que HP, assurez-vous que la case Afficher uniquement les résolutions TV est cochée. Au besoin, cliquez dans la case pour la décocher ou la cocher. 5. Cliquez sur OK. Cela termine la procédure d'ajustement de la résolution pour cette option. Autres cartes graphiques 1. Cliquez avec le bouton droit de la souris sur une zone vide du Bureau, puis cliquez sur Résolution d'écran. 2. Sélectionnez la résolution dans le menu déroulant. 3. Cliquez sur Appliquer, puis sur Conserver les modifications. Cela termine la procédure d'ajustement de la résolution pour cette option. Installation d'affichages multiples Utilisez les étapes suivantes pour vous connecter et installer des moniteurs supplémentaires : Installation d'affichages multiples 9 Ces instructions concernent une installation standard à deux moniteurs. Si vous avez acheté un système à double moniteur avec le logiciel ATI™ Eyefinity, suivez ces instructions pour une installation à deux (ou trois) moniteurs, puis passez aux instructions pour l'installation d'ATI Eyefinity Catalyst™. 1. Vérifiez que le PC est configuré selon les instructions dans l'affichage de l'installation. N'allumez pas le PC ou le moniteur. 2. Branchez les moniteurs à un connecteur d’affichage disponible à l’arrière du PC. Le type de connexion du moniteur doit correspondre au connecteur sur le PC. REMARQUE : L'installation à trois moniteurs requiert que vous achetiez séparément un moniteur et un câble supplémentaires. Le moniteur devrait avoir un connecteur DVI, HDMI, ou VGA. Un adaptateur DVI-to-VGA est requis pour les moniteurs avec un connecteur VGA. DisplayPort HDMI DVI ● Raccordez le câble DisplayPort au connecteur DisplayPort (requis). ● Raccordez le câble DVI au connecteur DVI inférieur. 3. Mettez chaque moniteur supplémentaire sous tension. 4. Appuyez sur le bouton d'alimentation de chaque écran d'affichage puis sur celui de l'ordinateur. Le témoin d'alimentation de chaque écran d'affichage prendra une couleur ambre ; ils deviendront bleus lorsque le PC démarrera. REMARQUE : Lors de l'installation initiale, seul un écran d'affichage est actif ; il se peut que vous voyiez divers états d'affichage (comme des écrans blancs, bleus, etc.) sur les autres écrans d'affichage jusqu'à ce que l'installation soit terminée. 5. Une fois l'installation terminée, vous verrez le bureau étendu sur tous les écrans d'affichage connectés. 6. Pour modifier le mode d'affichage d'un écran, sélectionnez Démarrer, à partir de l'écran de démarrage, appuyez sur la touche p, sélectionnez Panneau de configuration, sélectionnez Apparence et personnalisation, sélectionnez Afficher, puis sélectionnez l'option que vous souhaitez modifier et suivez les instructions à l'écran. 10 Chapitre 3 Installation de fonctionnalités supplémentaires Installation d'ATI Eyefinity Catalyst™ 1. Faites un clic droit sur l'icône Eyefinity Catalyst™ sur le bureau pour afficher ATI Catalyst Control Center™. 2. Sélectionnez CCC-Advanced, sélectionnez Carte graphique, sélectionnez Bureau et moniteurs puis suivez les instructions à l’écran pour configurer la disposition de l’affichage des deux ou trois moniteurs. Installation d'affichages multiples 11 4 Maintenir votre ordinateur Procédures de nettoyage Garder l’ordinateur propre, sans poussière ni saletés et à l’abri de la chaleur, permet de prolonger sa durée de vie. ● De la poussière, des poils d'animaux et autres particules peuvent s'accumuler, produisant un effet de « couverture » ; il peut en résulter une surchauffe des composants ou, dans le cas du clavier et de la souris, un fonctionnement incorrect et inefficace. ● Vérifiez votre système au minimum une fois par mois pour tout signe visible de poussière et de débris, et nettoyez-le au moins une fois tous les trois mois. ● Rendez-vous sur http://www.hp.com/go/contactHP pour des instructions de nettoyage supplémentaires. Nettoyage des grilles d’aération de l’ordinateur Les fentes d'aération permettent de refroidir l'ordinateur. Nettoyez ces fentes à l'aide d'un petit aspirateur manuel fonctionnant sur piles. Vous éviterez ainsi tout risque d'électrocution. 1. Passez l'aspirateur sur les fentes d'aération du boîtier de l'ordinateur. 2. Retirez tout débris accumulé sur ou autour des ports de l’ordinateur (par exemple, les connecteurs Ethernet et USB). Nettoyage du clavier et de la souris Pour le nettoyage des touches du clavier, utilisez un petit aspirateur à piles pour éviter d'endommager les touches ou les ressorts. 1. Aspirez entre les touches du clavier et le long des rainures. 2. Utilisez un chiffon sec et propre imbibé d’alcool isopropylique (à friction) pour nettoyer l’accumulation de débris sur les touches et les bords du clavier. 3. Nettoyez la souris et son cordon avec des chiffons nettoyants. Si vous utilisez une souris avec une boule, nettoyez aussi la boule et les roulettes à l’intérieur : 1. Retournez la souris et tournez la couronne du couvercle au-dessus de la boule dans le sens contraire des aiguilles d’une montre pour retirer la couronne et dégager la boule. 2. Rincez la boule avec de l’eau tiède savonneuse. 3. Nettoyez les roulettes à l’intérieur de la souris avec un coton-tige imbibé d’alcool isopropylique (à friction). 4. Une fois la boule et les roulettes complètement sèches, remettez-les en place, ainsi que la couronne du couvercle. 12 Chapitre 4 Maintenir votre ordinateur 5 Dépannage et maintenance Reportez-vous à la documentation fournie par le fabricant du produit pour obtenir de plus amples informations sur les problèmes spécifiques aux périphériques, comme les problèmes de moniteur ou d’imprimante. Les tableaux suivants présentent quelques problèmes que vous pourriez rencontrer lors de l’installation, du démarrage, ou de l’utilisation de votre ordinateur, ainsi que des solutions possibles. Pour plus d’informations ou des options supplémentaire pour le dépannage, consultez Obtenir des informations à la page 1. L’ordinateur ne démarre pas Symptôme Solution Message d'erreur : Erreur de disque dur. Redémarrez l'ordinateur. 1. Appuyez simultanément sur les touches Ctrl+Alt+Supprimer du clavier. 2. Sélectionnez l'icône Power (Mise sous tension), puis sélectionnez Redémarrer. Ou, appuyez sur le bouton Power (Mise sous tension) pendant cinq secondes ou plus pour éteindre l’ordinateur, puis appuyez sur le bouton de mise sous tension (Power) pour redémarrer l'ordinateur. 3. Si Windows s'ouvre, procédez à une sauvegarde immédiate de toutes vos données importantes sur un disque dur de sauvegarde. 4. Que vous ayez pu démarrer Windows ou non, contactez l'assistance technique. Le remplacement du lecteur de disque dur ou de la carte mère peut s'avérer nécessaire. L'ordinateur refuse de démarrer ou de s'allumer. Assurez-vous que les câbles qui relient l’ordinateur à la source d’alimentation externe sont correctement branchés. Lorsque les câbles reliant l’ordinateur à la source d’alimentation externe sont bien branchés et que la prise murale fonctionne correctement, le témoin d’alimentation vert à l’arrière de l’ordinateur doit s’allumer. Si ce n’est pas le cas, contactez l’assistance technique. Si l’écran (moniteur) n’affiche rien, le moniteur est probablement mal connecté. Connectez le moniteur à l’ordinateur, puis branchez-le et allumez-le. Voir Affichage (moniteur) à la page 15. Testez la prise murale en y connectant un autre dispositif électrique. L’ordinateur ne démarre pas 13 Symptôme Solution L’ordinateur semble bloqué et ne répond pas. Utilisez le Gestionnaire des tâches pour fermer les programmes qui ne répondent pas, ou pour redémarrer votre ordinateur : 1. Appuyez simultanément sur les touches Ctrl+Alt+Supprimer du clavier. 2. Sélectionnez le Gestionnaire des tâches. 3. Sélectionnez le programme qui ne répond pas, puis sélectionnez Fin de tâche. Si le problème persiste après avoir fermé le programme, redémarrez l’ordinateur : 1. Appuyez simultanément sur les touches Ctrl+Alt+Supprimer du clavier. 2. Sélectionnez l'icône Power (Mise sous tension), puis sélectionnez Redémarrer. Ou, appuyez sur le bouton de mise sous tension (Power) pendant cinq secondes ou plus pour éteindre l’ordinateur, puis appuyez sur le bouton de mise sous tension (Power) pour redémarrer l'ordinateur. Message d'erreur : Disque système invalide ou Disque non système ou Erreur disque. Lorsque le voyant d'activité s'éteint, retirez le disque et appuyez sur la barre d'espace du clavier. L'ordinateur doit maintenant démarrer. Alimentation Symptôme Solution L'ordinateur ne s'éteint pas lorsque vous appuyez sur le bouton de mise sous tension. Appuyez sur le bouton d'alimentation (Power) et maintenez-le enfoncé jusqu’à ce que l’ordinateur s’éteigne. Vérifiez les paramètres d’alimentation. L’ordinateur s’éteint automatiqueme nt. ● La température ambiante est peut-être trop élevée. Laissez-le refroidir. ● Vérifiez que les aérations de l’ordinateur ne sont pas obstruées et que le ventilateur interne fonctionne — consultez Procédures de nettoyage à la page 12. (Il est possible que votre ordinateur ne soit pas équipé d’un ventilateur interne.) 14 Chapitre 5 Dépannage et maintenance Affichage (moniteur) Symptôme Solution L’écran n'affiche rien, et le voyant d’alimentation du moniteur est éteint. Rebranchez le câble d’alimentation au dos du moniteur et à la prise murale. Appuyez sur l'interrupteur du moniteur. L’écran n’affiche rien. Appuyez sur la barre d'espace du clavier ou déplacez la souris pour réactiver l'affichage. Appuyez sur le bouton de Veille (certains modèles uniquement) ou sur la touche Échap du clavier pour sortir du mode Veille. Appuyez sur le bouton de mise sous tension (Power) pour mettre l'ordinateur en marche. Assurez-vous qu’aucune broche du connecteur vidéo du moniteur n’est endommagée : ● Si l’une des broches est endommagée, remplacez le câble de connexion du moniteur. ● Si toutes les broches sont en bon état, rebranchez le câble de connexion du moniteur à l’ordinateur. Si vous avez une installation à plusieurs moniteurs, reportez-vous à Installation d'affichages multiples à la page 9. Clavier et souris (avec câble) Symptôme Solution Votre ordinateur ne reconnaît pas les commandes ou les combinaisons de touches du clavier. Utilisez la souris pour éteindre l’ordinateur, déconnectez et reconnectez le clavier à l’arrière de l’ordinateur, puis redémarrez votre ordinateur. La souris (avec câble) ne fonctionne pas ou n'est pas détectée après l'installation. Débranchez et rebranchez le câble de la souris à l’ordinateur. Si la souris n’est toujours pas détectée, éteignez l’ordinateur, déconnectez et reconnectez le câble de la souris, puis rallumez l’ordinateur. Affichage (moniteur) 15 Symptôme Solution Le curseur ne se déplace pas lorsque les touches fléchées du clavier numérique sont utilisées. Appuyez sur Verr Num sur le clavier pour désactiver Verr Num, afin de pouvoir utiliser les touches fléchées du clavier numérique. Le curseur ne suit pas les mouvements de la souris. Utilisez le clavier pour enregistrer les modifications dans tous les programmes ouverts, puis redémarrez votre ordinateur. 1. Appuyez simultanément sur les touches Alt+Tabulation pour accéder à un programme ouvert. 2. Appuyez simultanément sur les touches Ctrl et S pour enregistrer vos modifications dans le programme choisi. (Ctrl+S est le raccourci clavier de l'option Enregistrer dans la plupart des programmes mais pas tous.) 3. Répétez les étapes 1 et 2 pour enregistrer les modifications dans tous les programmes ouverts. 4. Après avoir sauvegardé toutes les modifications dans tous les programmes ouverts, appuyez sur le bouton de mise sous tension (Power) pour éteindre l'ordinateur. 5. Une fois la procédure d'arrêt terminée, débranchez et rebranchez la prise de la souris à l'arrière de l'ordinateur et redémarrez votre ordinateur. 16 Chapitre 5 Dépannage et maintenance Clavier et souris (sans fil) Symptôme Solution Le clavier ou la souris sans fil ne fonctionne pas ou n'est pas détecté(e) après l'installation. ● Assurez-vous d’utiliser un clavier ou une souris sans fil situé à portée du récepteur, approximativement 3 mètres (10 pieds) pour une utilisation normale, et 30 cm (12 pouces) lors de la configuration initiale ou de la resynchronisation. ● Assurez-vous que la souris n’est pas en mode veille (après 20 minutes d'inactivité). Cliquez sur le bouton gauche de la souris pour la réactiver. ● Remplacez les piles du clavier et de la souris. ● Resynchronisez le clavier et la souris avec le récepteur en exécutant les étapes suivantes. Le récepteur, le clavier sans fil et la souris sans fil illustrés ci-après ne sont que de simples exemples. Vos modèles peuvent varier. IMPORTANT : Au cours de ces étapes, placez le clavier et la souris sans fil au même niveau que le récepteur, à 30 cm (12 pouces) du récepteur, et à l’écart de toute source d’interférences, comme d’autres périphériques. 1. Débranchez le récepteur d’un connecteur USB de votre ordinateur, puis rebranchez-le. Le modèle de votre ordinateur peut disposer d’un connecteur dédié pour le récepteur. Le cas échéant, utilisez un des connecteurs USB situés à l'avant de l’ordinateur. 2. Vérifiez que la souris est bien allumée (A), puis appuyez et maintenez le bouton Connexion enfoncé (B) sous la souris pendant 5 à 10 secondes jusqu'à ce que le témoin lumineux du récepteur s'allume ou s'arrête de clignoter. Le récepteur se déconnecte au bout de 60 secondes. Afin de vous assurer que la connexion a bien été établie et que le récepteur ne s'est pas déconnecté, déplacez la souris et vérifiez la réponse sur l'écran. Off On Connect A B 3. Une fois la connexion avec la souris établie, continuez en suivant les étapes suivantes pour répéter la procédure pour le clavier. 4. Appuyez sur le bouton Connexion (C) sous le clavier et maintenez-le enfoncé pendant 5 à 10 secondes jusqu'à ce que le témoin du récepteur s'allume ou s'arrête de clignoter. C Clavier et souris (sans fil) 17 Haut-parleurs et son Symptôme Solution Il n’y a pas de son. 1. À partir de l'écran de démarrage, appuyez sur la touche p, sélectionnez Panneau de configuration, puis sélectionnez System and Security (Système et sécurité). 2. Sous Centre de maintenance, sélectionnez Résoudre des problèmes informatiques courants, puis sélectionnez Résoudre les problèmes liés aux lectures audio. Si vous utilisez un connecteur HDMI avec la carte graphique (certains modèles uniquement) pour connecter votre moniteur à l'ordinateur, connectez également des haut-parleurs analogiques au connecteur de sortie audio pour entendre les sons lors de la configuration initiale de votre ordinateur. Reportez-vous aux instructions de mise en route pour savoir comment connecter les haut-parleurs analogiques. Si vous utilisez des haut-parleurs intégrés dans le moniteur, utilisez le bouton de volume du panneau avant du moniteur pour régler le volume. Utilisez les boutons du panneau avant pour ouvrir l'interface OSD (réglage à l'écran) et vous assurer que le son (audio) est activé et que le volume est réglé comme il se doit. Assurez-vous d’avoir branché des haut-parleurs sous tension (actifs) et qu’ils sont allumés. Éteignez l'ordinateur, débranchez et rebranchez les haut-parleurs. Assurez-vous que les haut-parleurs sont branchés dans un connecteur audio, pas dans un connecteur Line In ou de casque d’écoute. Pour quitter le mode Veille, appuyez sur le bouton Veille (certains modèles uniquement) ou sur la touche Echap. Débranchez les éventuels écouteurs connectés à l'ordinateur, ou votre système de hautparleurs. Le volume est très faible ou insatisfaisant. Assurez-vous d’avoir connecté les haut-parleurs au connecteur Audio Out (vert pâle) à l’arrière de l’ordinateur. (D’autres connecteurs audio sont utilisés pour les haut-parleurs à plusieurs canaux.) Des haut-parleurs non alimentés (haut-parleurs sans source d’alimentation propre, comme des piles ou un câble d’alimentation) ne fournissent pas un son suffisant. Remplacez-les par des haut-parleurs alimentés. 18 Chapitre 5 Dépannage et maintenance Accès à Internet Symptôme Solution Les programmes Internet ne démarrent pas automatiquement. Ouvrez une session Internet et lancez le programme de votre choix. Impossible d’établir une connexion à Internet. 1. À partir de l'écran de démarrage, appuyez sur la touche p, puis sélectionnez Panneau de configuration. 2. Sous Réseau et Internet, sélectionnez Connexion à Internet. Vérifiez si vous utilisez des câbles adaptés à votre type de connexion Internet. Votre ordinateur peut être équipé d’un modem pour réseau commuté et d’une carte réseau Ethernet (également appelée carte d’interface réseau ou NIC). Un modem utilise un câble de téléphone standard alors que la carte réseau utilise un câble réseau pour se connecter à un réseau local (LAN). Ne connectez pas un câble téléphonique à la carte réseau, et ne branchez pas un câble réseau sur une ligne téléphonique ; cela pourrait endommager la carte réseau. Exécutez l'assistant de configuration sans fil. 1. À partir de l'écran de démarrage, appuyez sur la touche p, sélectionnez Panneau de configuration, sélectionnez Réseau et Internet, puis sélectionnez Centre Réseau et partage. 2. Dans la fenêtre Centre Réseau et partage, sélectionnez Configurer une nouvelle connexion ou un nouveau réseau pour ouvrir l’assistant, puis suivez les instructions qui s’affichent à l’écran. Si votre système dispose d’une antenne externe, essayez de placer l’antenne dans une meilleure position. Si l’antenne est interne, essayez de déplacer l’ordinateur. Essayez de vous connecter plus tard, ou prenez contact avec votre fournisseur d'accès à Internet (FAI) pour obtenir de l’aide. Accès à Internet 19 Dépannage du logiciel Pour corriger des problèmes logiciels, essayez ces méthodes : ● Éteignez complètement l'ordinateur puis rallumez-le. C'est la manière la plus facile (et parfois la meilleure). ● Mettez à jour les pilotes (voir section suivante, "Mise à jour des pilotes de périphériques"). ● Utilisez le programme Restauration du système de Microsoft et procédez à une réinstallation des pilotes matériels (voir Restauration du système Microsoft plus loin dans ce tableau). — Restaure la configuration qu'utilisait votre ordinateur avant l'installation du logiciel. ● Réinstallez le programme ou le pilote matériel (voir "Réinstallation des logiciels et des pilotes matériels" plus loin dans ce tableau). — Restaure les paramètres d'usine du logiciel (s'il a été fourni avec le produit) ou du pilote matériel. ● Réinstallation système (voir Guide de dépannage et de maintenance sur votre ordinateur. Sélectionnez l'application HP Support Assistant (Service d'assistance HP) sur l'écran de démarrage, sélectionnez Poste de travail, puis sélectionnez les User guides (guides de l'utilisateur)). — Efface et reformate le disque dur, puis réinstalle le système d’exploitation, les programmes et les pilotes. Cela efface tous les fichiers de données que vous avez créés. Mise à jour des pilotes de périphériques Effectuez la procédure suivante pour mettre à jour un pilote ou revenir à une version antérieure du pilote si le plus récent ne résout pas votre problème : 1. À partir de l'écran de démarrage, appuyez sur la touche p, puis sélectionnez Panneau de configuration. 2. Sélectionnez System and Security (Système et sécurité), puis dans la zone Système, sélectionnez Gestionnaire de périphériques. 3. Sélectionnez la flèche pour développer le type de périphérique que vous souhaitez mettre à jour ou que vous voulez restaurer. (Les pilotes DVD/CD-ROM par exemple.) 4. Double-cliquez sur l'élément concerné (par exemple, HP DVD Writer 640b). 5. Sélectionnez l'onglet Pilote. 6. Pour mettre un pilote à jour, sélectionnez Mettre à jour le pilote et suivez les instructions à l'écran. Ou, pour revenir à une version antérieure d’un pilote, sélectionnez Restaurer le pilote, puis suivez les instructions à l'écran. 20 Chapitre 5 Dépannage et maintenance Restauration du système de Microsoft Si vous rencontrez un problème qui peut être dû à un logiciel installé sur votre ordinateur, utilisez la fonction Restauration du système pour ramener votre ordinateur à son état lors d’un point de reprise précédent. Vous pouvez aussi établir ces points manuellement. REMARQUE : Utilisez toujours la procédure Restauration du système avant d’utiliser le programme Récupération système. Pour commencer la restauration d'un système ou pour ajouter des points de restauration manuellement : 1. Fermez tous les programmes. 2. À partir de l'écran de démarrage, appuyez sur la touche p, puis sélectionnez Panneau de configuration. 3. Sélectionnez System and Security (Système et sécurité), sélectionnez Système, puis sélectionnez Protection du système. 4. Sélectionnez l'onglet Protection du système sur l'écran des Propriétés système. 5. Conformez-vous aux instructions qui s’affichent à l’écran. Dépannage du logiciel 21 Réinstallation des logiciels et des pilotes Si une application ou un pilote installé en usine est endommagé, vous pouvez les réinstaller à l'aide du programme Gestionnaire de réinstallation (certains modèles uniquement). REMARQUE : N'utilisez pas le Gestionnaire de réinstallation pour réinstaller les logiciels contenus sur les CD ou les DVD qui se trouvaient dans l’emballage de votre ordinateur. Réinstallez ces programmes directement à partir des CD ou des DVD. Avant de désinstaller un programme, assurez-vous que vous disposez d’un moyen de le réinstaller ultérieurement. Assurez-vous d'être certain qu’il est encore disponible à l’endroit d’où vous l’aviez installé initialement (par exemple, un disque ou Internet). Vous pouvez aussi vous assurer que la liste des programmes que vous pouvez réinstaller à partir du Gestionnaire de récupération. Pour consulter la liste des programmes installables à partir du Gestionnaire de réinstallation : 1. À partir de l'écran de démarrage, appuyez sur la touche g, puis sélectionnez Gestionnaire de réinstallation. Si vous y êtes invité, cliquez sur Oui pour autoriser le programme à continuer. 2. Sous I need help immediately (J’ai besoin d’aide immédiatement), sélectionnez Software Program Reinstallation (Réinstallation des logiciels). 3. Sélectionnez Suivant sur l’écran de bienvenue. Une liste de programmes s’ouvre. Vérifiez si votre programme est présent. Pour réinstaller un programme à l'aide du Gestionnaire de récupération : 1. À partir de l'écran de démarrage, appuyez sur la touche g, puis sélectionnez Gestionnaire de réinstallation. 2. Sélectionnez Software Program Reinstallation (Réinstallation des logiciels), puis sélectionnez Suivant sur l'écran de Bienvenue. 3. Choisissez le programme que vous souhaitez réinstaller, sélectionnez Suivant et suivez les instructions qui apparaissent à l’écran. 4. Après la récupération, redémarrez l'ordinateur. Cette dernière étape est impérative. Vous devez toujours redémarrer l'ordinateur lorsque vous avez terminé de réinstaller des applications ou des pilotes. Pour désinstaller un programme : 1. Fermez tous les programmes et les dossiers. 2. À partir de l'écran de démarrage, appuyez sur la touche p, puis sélectionnez Panneau de configuration. 3. Sous Programme, sélectionnez Désinstaller un programme. 4. Sélectionnez le programme à supprimer, puis sélectionnez Désinstaller. 22 Chapitre 5 Dépannage et maintenance 6 Informations sur l'assistance technique Informations sur l'assistance technique Simple d'accès. Facile à utiliser. Le service d'assistance clientèle HP déjà plusieurs fois récompensé incarne notre engagement à vous aider pour profiter au mieux de votre ordinateur. Que ce soit par le biais des outils installés sur votre ordinateur, des informations disponibles sur Internet, par téléphone ou par l'entremise de votre détaillant local, vous trouverez des réponses à tout. Avant de contacter le Centre d'aide à la clientèle de HP, il est important d'avoir les informations suivantes à portée de main. ● Numéro de modèle ● Numéro du produit ● Numéro de série ● Numéro de version logicielle ● Système d'exploitation ● Date d'achat Nous vous invitons à prendre note des informations suivantes concernant votre ordinateur en vue d'y faire référence ultérieurement. Les quatre premiers éléments de la liste (numéro de modèle, numéro de produit, numéro de série et numéro de version logicielle) peuvent être consultés à l'aide du HP Support Information (Informations sur le support technique HP). À partir de l'écran de démarrage, appuyez sur la touche s, puis sélectionnez HP Support Information (Informations sur le support technique HP). N'oubliez pas d'enregistrer votre achat ! Rendez-vous sur : http://www.hp.com/apac/register. Obtenir de l'aide 1. Utilisez Aide et support Windows pour répondre à vos questions concernant le matériel et les logiciels. À partir de l'écran de démarrage, appuyez sur la touche a, puis sélectionnez Aide et support. 2. Utilisez le service d'assistance. À partir de l'écran de démarrage, appuyez sur la touche s, puis sélectionnez HP Support Assistant (Service d'assistance HP). Le HP Support Assistant (Service d'assistance HP) vous apportera des informations utiles concernant le dépannage et les diagnostics, vous pourrez y trouver : Informations sur l'assistance technique 23 ● support par e-mail ● conversation en temps réel avec des spécialistes de l’assistance technique HP qualifiés ● numéros de téléphone du support technique 3. Pour obtenir une aide en ligne, allez sur le site Web du HP Customer Care Center (Centre d'aide à la clientèle HP) à l'adresse suivante : http://www.hp.com/go/contactHP. Une assistance téléphonique pour que vous puissiez démarrer est assurée pendant trente (30) jours à partir de la date à laquelle vous avez acheté votre ordinateur. Après trente (30) jours, des frais peuvent être facturés, mais l'assistance est toujours disponible. Service clientèle pour les réparations Si votre ordinateur a besoin de réparations ou de remplacement de pièces, vous avez deux options : ● Vous pouvez facilement remplacer de nombreux éléments de votre ordinateur qui sont considérés comme des pièces remplaçables par l'utilisateur. Il s'agit de la méthode de réparation la plus rapide, étant donné que nous pouvons souvent envoyer la pièce directement à votre domicile ou à votre bureau en quelques jours. (Il se peut que cette option ne soit pas disponible dans tous les pays ou toutes les régions.) ● Si une réparation s'impose, le HP Customer Care Center (Centre d'aide à la clientèle HP) prendra les dispositions nécessaires pour réparer votre ordinateur. Ces services sont assurés pendant la période de garantie. Il existe quelques limitations et exclusions de garantie (ainsi que certains détails importants), qui sont décrits dans le guide de la HP Worldwide Limited Warranty and Technical Support (Garantie HP limitée internationale et support technique). Avant de mettre à niveau votre matériel Les mises à niveau matérielles que vous avez l'intention de faire devraient être effectuées uniquement après que vous ayez entièrement configuré votre nouvel ordinateur. Reportez-vous aux instructions de configuration au début de ce guide pour vous aider. Si vous rencontrez des problèmes pour configurer votre système et le mettre en marche, veuillez immédiatement contacter le HP Customer Care Center (Centre d'aide à la clientèle HP) indiqué précédemment dans ce guide, et un représentant à la clientèle HP vous aidera. Cela doit être fait avant de tenter toute mise à niveau de votre système. En brisant le sceau de sécurité à l'arrière de l'ordinateur, vous confirmez que l'ordinateur fonctionnait correctement avant que vous ne tentiez de mettre à niveau votre système. Une fois le sceau de sécurité brisé, votre ordinateur est alors, dans la mesure permise par la loi locale, couvert par les conditions figurant 24 Chapitre 6 Informations sur l'assistance technique dans le guide HP Worldwide Limited Warranty and Technical Support (Garantie HP limitée internationale et support technique). Avant de mettre à niveau votre matériel 25 Printed in The power to make a change Thank you for your purchase. HP is dedicated to producing the highest quality, best performing, and easiest to use computers in the world. HP also designed this product with the environment in mind. If this computer is a replacement for an older computer you no longer need, go to www.hp.com/go/recycle to find out if HP can help you dispose of your old computer with minimum impact on the planet. Le pouvoir de changer les choses Nous vous remercions pour votre achat. HP est spécialisé dans le développement et la fabrication d'ordinateurs de très haute qualité et parmi les plus performants et les plus simples à utiliser dans le monde. HP a également conçu ce produit dans un souci de respect de l'environnement. Si cet ordinateur vient en remplacement d'un ancien ordinateur dont vous n'avez plus besoin, rendez-vous sur la page www.hp.com/go/recycle pour savoir si HP peut vous aider à vous débarrasser de votre ancien ordinateur avec un impact minimal pour la planète. *700601-DN1* 700601-DN1 Compaq recommande Windows. Compaq 15-h002sf Notebook PC (ENERGY STAR) Le PC idéal pour tous vos besoins et rien de plus. Le produit peut différer des images présentées. © 2013 Hewlett-Packard Development Company, L.P. Les informations contenues dans le présent document sont sujettes à modification sans préavis. Les fonctions spécifiques peuvent varier d'un modèle à un autre. Les seules garanties applicables aux produits et services HP sont énoncées dans les déclarations de garantie expresses accompagnant ces produits et services. Aucune déclaration dans le présent document ne pourra être interprétée comme constituant une garantie supplémentaire. HP ne peut en aucun cas être tenu responsable des éventuelles erreurs ou omissions de nature technique ou rédactionnelle de ce document. Toutes les fonctionnalités ne sont pas disponibles dans toutes les éditions de Windows 8 et Windows 8.1. Les systèmes peuvent nécessiter des mises à jour et/ou l'achat de matériel, les pilotes et/ou logiciels supplémentaire pour profiter pleinement des fonctionnalités de Windows 8 et Windows 8.1. Reportez-vous à la page http://windows.microsoft.com/fr-FR/. Toutes les autres marques commerciales sont la propriété de leurs détenteurs respectifs. Novembre 2013 Système d'exploitation ● Windows 8.1 64 Processeurs ● AMD Dual-Core E1-2100 APU avec carte graphique Radeon HD 8210 (1 GHz, 1 Mo de mémoire cache) ● Famille de processeurs: Processeur Série E AMD Dual-Core Mémoire ● 4 Go de mémoire SDRAM 1600 MHz DDR3L (1 x 4 Go) ● 1 logement pour mémoire accessible Stockage ● SATA 750 Go, 5400 tr/min ● Graveur DVD SuperMulti Communication ● LAN Ethernet 10/100 Base-T intégré ● 802.11b/g/n (1x1) ● 1 lecteur de cartes multimédias SD multiformat Ecran ● Webcam TrueVision HD HP avec microphone numérique intégré ● Emplacement verrou Kensington® MicroSaver ; Mot de passe de mise sous tension ; Accepte les verrouillages de sécurité tiers ● Écran HD BrightView de 39,6 cm (15,6 pouces) en diagonale à rétroéclairage LED (1366 x 768) Vidéo ● Carte graphique AMD Radeon HD 8210 Son ● Doubles haut-parleurs Clavier ● Clavier chiclet de grande taille avec pavé numérique ● Pavé tactile avec prise en charge de gestes multipoints Ports ● 1 port HDMI ● 1 prise combo casque/microphone ● 2 ports USB 2.0 ● 1 port USB 3.0 ● 1 port RJ-45 Alimentation ● Adaptateur secteur 45 W ● Batterie Li-ion 4 cellules (41 W/h) Logiciels ● Assurez un fonctionnement optimal de votre ordinateur avec HP Support Assistant www.hp.eu/supportassistant ● HP Connected Music ● HP Connected Photo ● HP SimplePass ● Jeux HP par WildTangent ● HP ePrint ● Windows Live Essentials ● CyberLink PowerDVD ● CyberLink YouCam DE ● Internet Explorer 11 ● 7-Zip ● Box (25 Go de stockage gratuit) Assistance et services ● McAfee LiveSafe ● Enregistrement HP pour Windows 8 ● guide de mise en route avec Windows 8 ● HP Utility Center ● Gestionnaire de récupération HP (partition de récupération, outil de création d'unité USB/Flash de récupération) Informations complémentaires ● P/N: F6P85EA #ABF ● UPC/EAN code: 888182454336 ● Fabriqué en Chine Couleur du produit ● Housse gris anthracite, noir brillant Poids ● 2,23 kg ● Le poids varie selon la configuration Dimensions ● 37,8 x 26 x 2,5 cm ● Emballé Les dimensions varient selon la configuration Conformité en matière d'économie d'énergie ● Certifié ENERGY STAR® ; EPEAT® Silver Garantie ● Garantie limitée d'un an comprenant pièces, main d'œuvre et service d'enlèvement et de retour à l'usine ● Vous pouvez prolonger la garantie de votre produit jusqu'à trois ans au total ; pour plus d'informations, consultez la section « Options et accessoires » sur les pages produits du site hp.com.