Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Networking

Cracking Open A Linksys Desktop Switch

By Erik Eckel October 22, 2008, 2:07 AM PDT

Image
1
of 19

243160.jpg
243160.jpg
Cracking Open A Linksys Desktop Switch

The Linksys EtherFast EZXS55W Switch

The Linksys EtherFast EZXS55W Switch

The Linksys EtherFast EZXS55W switch features five 10/100 auto-sensing ports with both half and full duplex modes. This model also features a dedicated Uplink port for connecting the device to other switches or similar network devices.nnSince each port is independently switched at up to 100 Mbps, full 200 Mbps bandwidth performance is possible when the device operates in full duplex mode. Both network cables and connected network adapters must support these higher speeds to achieve the maximum bandwidth.

Photos by Erik Eckel for TechRepublic.com

Cracking Open A Linksys Desktop Switch

EZXS55W Front View

EZXS55W Front View

Numerous LED indicators display the desktop switch’s status. A green LED (to the bottom left) lights when the unit has power. Link, collision and 100 Mbps indicators also appear for each port.

Photos by Erik Eckel for TechRepublic.com

Cracking Open A Linksys Desktop Switch

EZXS55W Rear View

EZXS55W Rear View

The Linksys EZXS55W includes five 10/100 ports, shown here, and an Uplink port. The unit’s power port, toward the far right, is also located on the rear panel.

Photos by Erik Eckel for TechRepublic.com

Cracking Open A Linksys Desktop Switch

EZXS55W Bottom View

EZXS55W Bottom View

Four rubber feet help keep the desktop switch in place. That said, in my experience, zip ties or another object are often needed to keep small desktop switches in place, as the weight of four or five Ethernet cables can often pull the lightweight device out of position.

Photos by Erik Eckel for TechRepublic.com

Cracking Open A Linksys Desktop Switch

AC Adapter

AC Adapter

The Linksys desktop switch is powered by this ITE-manufactured power supply. This model converts AC wall electricity to 7.5-volt DC current.

Photos by Erik Eckel for TechRepublic.com

Cracking Open A Linksys Desktop Switch

Uplink Port

Uplink Port

The EZXS55W’s Uplink port is the last Ethernet port on the right. When an Ethernet cable is plugged into this port, the port next door (port number 5) is disabled. This is because the Uplink port is a shared port.nnThe Uplink port was provided for connecting another network switch or similar device straight-through using category 5 cabling, thereby eliminating the need for a cross-over cable.

Photos by Erik Eckel for TechRepublic.com

Cracking Open A Linksys Desktop Switch

Tamper Tape

Tamper Tape

Breaking this tamper-proof tape voids the unit’s warranty. However, the action is necessary to disassemble this model.

Photos by Erik Eckel for TechRepublic.com

Cracking Open A Linksys Desktop Switch

Separating The Two Covers

Separating The Two Covers

Two plastic covers, front and back pieces, compose the switch’s simple shell. To separate them, forceful pressure must be supplied where the two shells meet, as shown here.

Photos by Erik Eckel for TechRepublic.com

Cracking Open A Linksys Desktop Switch

Cover Separation

Cover Separation

With the two plastic halves separated, the two shells can be pulled apart.

Photos by Erik Eckel for TechRepublic.com

Cracking Open A Linksys Desktop Switch

View Inside The Front Cover

View Inside The Front Cover

Here’s a look inside the molded plastic front cover shell. All the circular cut-outs accommodate the device’s LED status indicators.

Photos by Erik Eckel for TechRepublic.com

Cracking Open A Linksys Desktop Switch

View Inside The Switch

View Inside The Switch

With the front cover removed, the green sysem board is visible. Prominent up front in this image are the LED status indicators. To their right you can make out the black heat sink that sits atop the device’s switch controller microchip.

Photos by Erik Eckel for TechRepublic.com

Cracking Open A Linksys Desktop Switch

Main Board Removal

Main Board Removal

With the plastic front cover removed, the main system board slides out of the rear shell.

Photos by Erik Eckel for TechRepublic.com

Cracking Open A Linksys Desktop Switch

The EZXS55W Main System Board

The EZXS55W Main System Board

This is where all the action is. The Linksys mainboard does all the work routing network packets between ports.

Photos by Erik Eckel for TechRepublic.com

Cracking Open A Linksys Desktop Switch

Capacitor Collection

Capacitor Collection

The main board relies upon several capacitors, several shown here in a close-up, to deliver bursts of energy when and where needed.

Photos by Erik Eckel for TechRepublic.com

Cracking Open A Linksys Desktop Switch

IC Plus Corp. Chip

IC Plus Corp. Chip

With the heat sink removed, the integrated switching chip is revealed. According to IC Plus’ technical documentation, the IP175C chip integrates switch controller, SSRAM and Ethernet transceivers, each of which complies with the IEEE 803.3, IEEE 802.3u and IEEE 802.3x specifications. The chip supports flow control, auto MDI (which helps manage uplink operations) and bandwidth control, among other functions.

Photos by Erik Eckel for TechRepublic.com

Cracking Open A Linksys Desktop Switch

Bothhand USA Electronics

Bothhand USA Electronics

The black rectangular chip to the far left (16PT8520X) is a Bothhand USA 10/100 Base-T transformer. It helps power 10/100 Mbps data transmission.nnTo the right are two Bothhand USA 20PT1024X 10/100 Base-TX LAN Magnetics for Auto MDI/MDIX Application, according to the manufacturer’s data sheet. In other words, these chips help provide the switch’s autosensing network functionality.

Photos by Erik Eckel for TechRepublic.com

Cracking Open A Linksys Desktop Switch

Main System Board Backside View

Main System Board Backside View

The back of the main board carries model information. This unit is model number GEB1040.

Photos by Erik Eckel for TechRepublic.com

Cracking Open A Linksys Desktop Switch

View Inside The Rear Cover

View Inside The Rear Cover

With the main board removed, the rear cover is empty. In this image you can just make out the top cover vent holes that help the unit operate within an acceptable temperature range.

Photos by Erik Eckel for TechRepublic.com

Cracking Open A Linksys Desktop Switch

The EZXS55W Disassembled

The EZXS55W Disassembled

Here are all the components that compose the Linksys EtherFast EZXS55W desktop switch.

Photos by Erik Eckel for TechRepublic.com

  • Networking
  • Account Information

    Share with Your Friends

    Cracking Open A Linksys Desktop Switch

    Your email has been sent

Share: Cracking Open A Linksys Desktop Switch
Image of Erik Eckel
By Erik Eckel
Erik Eckel is a managing partner at Louisville Geek and president of Eckel Media Corp. He previously served as Executive Editor at CNET Networks' TechRepublic. He earned his Bachelor's Degree in English from the University of Louisville and received
  • Account Information

    Contact Erik Eckel

    Your message has been sent

  • |
  • See all of Erik's content

TechRepublic Premium

  • TechRepublic Premium

    Hardware inventory policy

    This policy describes guidelines your organization can follow to track, process and decommission IT equipment. From the policy: SUMMARY An organization’s IT hardware inventory constitutes a significant capital investment in order to perform company operations. Because hardware represents a critical asset and often holds organizational data, it is important for the company to track each ...

    Published:  January 23, 2023, 11:00 AM EST Modified:  January 24, 2023, 11:00 AM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Malware response checklist

    Whether an infection is the result of a disgruntled employee, hardware vulnerability, software-based threat, social engineering penetration, robotic attack or human error, all organizations must be prepared to immediately respond effectively to such an issue if the corresponding damage is to be minimized. Because even the best protected networks become infected, all organizations must have ...

    Published:  January 22, 2023, 11:00 AM EST Modified:  January 23, 2023, 1:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Checklist: Securing Windows 10 systems

    Every operating system should be appropriately secured, especially end user workstations which often contain or permit access to company data and upon which most employee job duties are based. To get the maximum security protection out of your Windows 10 deployments follow this checklist from TechRepublic Premium. Also included in this checklist: Security solutions Product ...

    Published:  January 22, 2023, 11:00 AM EST Modified:  January 23, 2023, 2:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Cloud data storage policy

    Third-party cloud-based file storage applications such as Dropbox, OneDrive and Google Drive have all contributed to the success of business cloud data storage. These products have brought proven flexibility and ease of data access to users and businesses alike while ensuring security of confidential information. Cloud data storage offers many benefits to consumers and companies ...

    Published:  January 22, 2023, 11:00 AM EST Modified:  January 23, 2023, 3:00 PM EST Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice