Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Hardware

Cracking Open nComputing’s L200 PC Expanion

By Erik Eckel November 19, 2007, 6:39 AM PST

Image
1
of 17

176708.jpg
176708.jpg
Cracking Open nComputing’s L200 PC Expanion

nComputing L200 PC Expanion

nComputing L200 PC Expanion

ntBy Erik Eckel
nt
ntThe L200 PC Expanion packaging boasts the ability to connect 30 users to a single system.
nt
ntCurious about whether it is the Right Tool for the Job? Read a concise summary of the nComputing L200 PC Expanion’s strengths and weaknesses in this blog post.
nt
ntView this image gallery to see what I found when I cracked it open.

Cracking Open nComputing’s L200 PC Expanion

PC Expanion Packaging

PC Expanion Packaging

The PC Expanion ships in a box with a power adapter, quick installation guide, the PC Expanion device itself, a CD, Ethernet cable and a User’s Guide.

Cracking Open nComputing’s L200 PC Expanion

The PC Expanion Device: Rear View

The PC Expanion Device: Rear View

The PC Expanion’s rear possesses all the ports required to connect a user to a shared host. In addition to serial and USB ports, the unit boasts Ethernet, PS/2, VGA and speaker ports.

Cracking Open nComputing’s L200 PC Expanion

The PC Expanion Device: Bottom Side

The PC Expanion Device: Bottom Side

The PC Expanion’s bottom features a molded plastic shell possessing numerous vents.

Cracking Open nComputing’s L200 PC Expanion

Cracking Open The L200 PC Expanion

Cracking Open The L200 PC Expanion

Removing the rubberized feet reveals Philips heads screws. The four screws (one in each corner) must be removed to disassemble the computer terminal.

Cracking Open nComputing’s L200 PC Expanion

Opening The L200 PC Expanion

Opening The L200 PC Expanion

The L200’s Philips head screws are easily removed from beneath the unit’s rubberized feet.

Cracking Open nComputing’s L200 PC Expanion

Inside The PC Expanion

Inside The PC Expanion

Once the four Philips head screws are removed, the unit’s top cover easily slides free.

Cracking Open nComputing’s L200 PC Expanion

Inside The PC Expanion

Inside The PC Expanion

With the top cover removed, here’s a glimpse inside the PC Expanion. Readily evident, just to the left of center, is the CPU that powers the computer access terminal.

Cracking Open nComputing’s L200 PC Expanion

The nComputing CPU

The nComputing CPU

Here’s a close up look at the nComputing proprietary CPU, as well as a supporting Integrated Silicon Solution, Inc. (ISSI) chip (to the right).

The nComputing device uses a UTMA platform design using System on Chip (SoC) architecture, 512KB flash ROM for the network computer operating system (NCOS) and 8MB SDRAM.

Cracking Open nComputing’s L200 PC Expanion

nComputing L200 Capacitors

nComputing L200 Capacitors

In addition to several capacitors that help power the access terminal’s printed circuit board and corresponding components, you can make out the power adapter switch connection (red) to the bottom right in this view.

Cracking Open nComputing’s L200 PC Expanion

Removing The Circuit Board

Removing The Circuit Board

The entire circuit board is secured to the L200’s bottom plastic case by a single Philips head screw (shown here).

Cracking Open nComputing’s L200 PC Expanion

The nComputing Circuit Board

The nComputing Circuit Board

With the single securing Philips head screw removed, the nComputing access terminal’s circuit board is easily removed from its plastic housing.

Cracking Open nComputing’s L200 PC Expanion

The nComputing Circuit Board

The nComputing Circuit Board

Here’s a close look, from the front, of the nComputing circuit board. nComputing manufacturers the board, as well as the main processor.

Scanning the board, moving from the top left to right, you can see the power switch (with the red connector), the power adapter port, the stereo speaker connection (in green), the (blue) VGA port, the keyboard and mouse PS/2 connectors, the Ethernet and serial ports and the USB port.

Cracking Open nComputing’s L200 PC Expanion

The L200's Bottom Plastic Shell

The L200's Bottom Plastic Shell

This is the black bottom plastic shell that holds the nComputing circuit board. In this image the backside of the bottom shell is closest to you.

Cracking Open nComputing’s L200 PC Expanion

The L200's Bottom Plastic Shell

The L200's Bottom Plastic Shell

Here’s the PC Expanion’s bottom plastic shell, upside right and seen from the front.

Cracking Open nComputing’s L200 PC Expanion

Inside the L200's Top Cover

Inside the L200's Top Cover

Here’s a look inside the L200’s top cover.

Cracking Open nComputing’s L200 PC Expanion

nComputing L200 PC Expanion: Disassembled

nComputing L200 PC Expanion: Disassembled

Here are all the components that compose the L200 PC Expanion.

The black bottom plastic cover can be seen to the left, while the circuit board (and corresponding screws and rubberized feet) occupy the center. To the right is the unit’s silver plastic top.

Curious about whether the L200 PC Expanion is the Right Tool for the Job? Read a concise summary of the nComputing L200 PC Expanion’s strengths and weaknesses in this blog post.

  • Hardware
  • Account Information

    Share with Your Friends

    Cracking Open nComputing’s L200 PC Expanion

    Your email has been sent

Share: Cracking Open nComputing's L200 PC Expanion
Image of Erik Eckel
By Erik Eckel
Erik Eckel is a managing partner at Louisville Geek and president of Eckel Media Corp. He previously served as Executive Editor at CNET Networks' TechRepublic. He earned his Bachelor's Degree in English from the University of Louisville and received
  • Account Information

    Contact Erik Eckel

    Your message has been sent

  • |
  • See all of Erik's content

TechRepublic Premium

  • TechRepublic Premium

    Shadow IT policy

    Shadow IT is a concept whereby an organization’s employees use technology, services or systems without the knowledge of or approval from the IT department. It has arisen due to several reasons: Advances in cloud computing, which involve the usage of applications or sharing of data in public environments previously owned by IT. The evolution of ...

    Published:  February 2, 2023, 11:00 AM EST Modified:  February 3, 2023, 2:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Auditing and logging policy

    Auditing and logging are essential measures for protecting mission-critical systems and troubleshooting problems. This policy outlines the appropriate auditing and logging procedures for computer systems, networks and devices that store or transport critical data. From the policy: Many computer systems, network devices and other technological hardware used in the enterprise can audit and log various ...

    Published:  February 2, 2023, 11:00 AM EST Modified:  February 3, 2023, 3:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Vendor contract renewal planner

    Determining how and when to renew support contracts can be tedious and time-consuming. Our vendor contract renewal planner will help you schedule support renewals and budget the related costs. From the planner: Some companies schedule their support contract renewals to take effect all at once, such as on January 1. This provides a convenient renewal ...

    Published:  February 1, 2023, 11:00 AM EST Modified:  February 2, 2023, 12:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Access management policy

    Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the appropriate level of access in order to do their jobs, while reducing the potential for damage or harm to the company. The purpose of this policy ...

    Downloads
    Published:  February 1, 2023, 11:00 AM EST Modified:  February 2, 2023, 4:00 PM EST Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice