Power Mac G5 Disassembly Manual

Read online or download PDF. Page 24 / 36. Apple Power Mac G5 User Manual. Apple Computers. Mar 27, 2019 You are going to find that to disassemble the G5 you will need some or all of the following: T10 Torx Screwdriver, T15 Torx Screwdriver, Phillips #1 Screwdriver, Optional Alan Wrenches instead of Torx, a wrench or thick pliers for taking off original standoffs and a knife or other thin metal tool.

Repair/Overhaul of PowerMac G5 Liquid Cooling System and CPU Boards
2.7 GHz Dual-CPU G5 built May 2005 - Delphi LCS

By Bill S.
Posted: July 22, 2010
(This is Page 2 of the 6 page article)


Disassembly (Follow ESD precautions before touching circuit boards, etc. - Discharge yourself by touching the case w/AC power cord connected, then disconnect power cord. A wrist (ground) strap can also be used. ESD precautions are also included in Apple's (limited) Power Mac G5 DIY Instructions. Apple's G5 related HT2580 article link now goes to their general Manuals page.)

11) The CPU/LCS assembly is secured to the computer interior (see Figure 6 above) by means of eight screws with tapered cones just under their heads. They are installed in split cylindrical standoffs. When tight, the screws' tapered heads spread the tops of the standoffs, trapping the assembly. Following up the ifixit article, when the LCS is removed, the assembly looks from the CPU board side as shown in Figure 7. The 'L'-shaped copper tubes are heat pipes, each connecting a Memory Controller chip (I think) to the aluminum heat sink secured to the bottom plate of the LCS. (These chips are not liquid cooled.) At this point you should have very good visual access to the LCS radiator, hoses, and radiator coolant pump. The 'white rice' area between the other side of the CPU board and the heat transfer modules of the LCS is still not easy to see. The following steps assume you want to continue and separate the CPUs from the LCS assembly.


Figure 7. LCS with CPU Boards Removed


12) Removing the CPU boards first requires removing the bottom plate to release the Memory Controller heat sinks. The bottom plate is connected to the bottom of the frame with two Allen screws as shown in Figure 8. Figure 9 shows the bottom plate's clips holding the bottoms of the heat sinks. Removing the screws allows the bottom plate to be slid carefully off the Memory Controller heat sinks. In Figure 10 which shows the bottom plate removed, you can just see portions of the bottoms of the Memory Controller heat sinks at the top of the picture. These heat sinks are fragile sheet aluminum - handle with care! Leave the Memory Controller heat sinks and pipes attached to the CPU boards.


Figure 8. LCS Bottom Plate



Figure 9. Bottom Plate Clips Holding Memory Controller Heat Sinks
Tower_Computer.part1.rar



Figure 10. Bottom Plate Removed (from a later disassembly step)


13) Once the bottom plate is off, there are 10 fasteners holding a CPU board to the LCS chassis. There are six Philips screws around the periphery of each board, and four Allen screws securing it to the heat transfer module. This is shown in Figure 11.


Figure 11. CPU Boards A and B with all fasteners present


14) I removed the four Allen screws on CPU A first, which released the board from the heat transfer module, then removed the six Philips screws, then lifted CPU A up and away from the LCS chassis. Same routine for CPU B. Be careful of the Memory Controller heat sinks when moving the CPU boards and setting them in a safe place.

Once the CPUs are off the LCS, you can clearly see the undersides of those boards. Figure 12 shows both CPUs. Figures 13 and 14 are closeups of the contamination. The solid white crystals were probably created by a chemical reaction from leaking coolant on the heat transfer modules.


Figure 12. Undersides of CPU Boards removed from LCS



Figure 13. CPU A Close-Up



Figure 14. CPU B Close-Up


15) The 'white rice' is actually bridging components surrounding the CPU chips. The OEM thermal grease on the center raised boss of the CPU chip has overflowed the boss down through the clearance cutout of the plastic shield over the chip, and flowed partially onto the chip's small integrated circuits. However, the computer was acting normally; there were no bad system effects from that amount of leakage.


16) The source of the contaminants is shown in Figure 15. This is a view of the heat transfer modules' top surfaces. The problem is clearly caused by leakage of coolant past the rubber O-rings in the heat transfer modules. Apparently the coolant has attacked the metal plating on the module surfaces and resulted in some sort of salt deposits. Close-ups are in Figures 16 and 17.



Figure 15. Contamination Source - Heat Transfer Modules

Figure 16. CPU A Heat Transfer Module Contamination

Figure 17. CPU B Heat Transfer Module Contamination


= Continue to Page 3=
Index of PowerMac G5 LCS Repair Article

Page 1 | Page 2 | Page 3 | Page 4 | Page 5 | Page 6

Imac G5 Service Manual

- or -
Back to www.XLR8YOURMAC.com

Copyright 1997-2018. All Rights Reserved.
All brand or product names mentioned are properties of their respective companies.
Legal:Site Privacy and terms/conditions of use.

Power Mac G5 Disassembly Manual
How to uninstall MacShiny?

Tired of your Mac running slow?

Safely boost its daily performance by removing tons of the unneeded junk! Start System status to access all tools you need to swiftly scan your system and detect which unnecessary files can be deleted forever.

It quickly scans your Mac, showing a progress in a radial progress indicator and the files being scanned to the right. The application swiftly detects unused files which occupy valuable space on your computer. The unnecessary files detected by MacShiny can be successfully removed from your machine without causing any harm.

Power Mac G5 Bluetooth Antenna

The results of system scan are indicated in three speedometers: Cleaning, Security and Performance. If you wish to inspect and remove some files from a certain category simply click a 'Show Details' button under each speedometer. In the new window you'll see a complete list of files detected so you are able to select any files and safely remove them.

Find and delete various types of junk

Advanced cleanup of your system can be amazingly fast! System scan lets you not only scan your Mac completely, but also find and delete various junk files: Universal Binaries, Development Junk, User Cache Files, System Cache Files, Language Files, System Log Files and User Log Files. It's safe to manually review each file suggested for deletion and automatically remove the detected junk files altogether.

System Scan

As a result of the System Scan you’ll be located to the System scan window. In this resulting window you’ll see some or all types of unneeded system files, which are recommended for removal: Language Files, User Cache Files, Development Junk, User Log Files, System Cache Files, Universal Binaries, System Log Files.

  • Language Files

    Each application installed on your Mac has different localizations. Normally we use programs only in one language, so other unneeded language files can be removed.

  • User Cache Files

    User Cache Files are all temporary files created by various web browsers and applications installed.

  • System Cache Files

    Many system programs create temporary files for their faster launching and operating.

  • User Log Files

    Special text files created to record all requests made to applications and websites used by user are user log files. Despite you install and uninstall different apps such log files keep piling up on your system in bulk, that’s why must be removed from time to time.

  • System Log Files

    Information about system changes, operations, drivers and more system events is tracked by the system itself. Such information is stored in System Log Files, some of which become unneeded after some time and can be get rid of safely with no harm to the system.

  • Universal Binaries

    Universal Binaries are special files that allow applications run on both Intel and PowerPC computer architectures. Since your Mac requires only one architecture the part of Universal binaries necessary for second architecture can be completely removed.

  • Development Junk

    During installation of applications some of them can create support files in order to finish installation process of those apps on your Mac successfully. When the installation is finished those created files can be deleted in order to free space on your machine.

Classic Apple Macintosh Computer Repair Manuals and Resources

Power Mac G5 Disassembly Manual

Select the files you would like to get rid of and click 'Clean'

Did you know that junk files can be found all over your Mac?

There are even several Trash folders on your system, which are created by different applications. With Trash Cleanup you are able to delete all trash folders at once, because MacShiny scans your Mac thoroughly and finds all those folders very fast.

Protect your Mac from malware and incorrectly performing apps

MacShiny provides your Mac with a solid protection against malware attacks. The 'Security' module lets you immediately enable Firewall to prevent unsafe connection for all or some of the applications used on your system. Utilize 'Update' control to check if all your applications are freshly updated and ensure that none are slowing your Mac down. Update all apps, turn on Firewall - safe solution by MacShiny!

Security module lets you protect your Mac against harmful viruses, online threats and incorrect performance of outdated apps. The Security bloc comprises two components: 'Update' control and 'Firewall' manager. We recommend make use of both tabs to ensure the highest level of protection for your Mac OS system.

Big files are always a big problem when it comes to occupying free disk space. So don’t wait any second longer to locate and delete all the huge files you forgot about on your Mac. Enjoy more free space on your hard drive after proper cleanup and removal of the files that you frankly don’t need anymore.

Discover and remove file copies

Speed up your system by getting rid of duplicate files that simply clutter up disk space. Those file copies don’t serve you at all, but might still be located in various file folders on your Mac. MacShiny runs a quick system scan, locates duplicates and safely deletes them. What you get is more free space and much higher speed of your Mac!

Get rid of old apps and their leftovers in a safe way with Uninstaller. It’s absolutely easy to locate and remove all programs that you don’t use any longer. MacShiny smartly detects all the accompanied files of the old applications that hide on your system and can be removed safely too.

Uninstall plugins

Cached

Many of us install the plugins which we don’t use afterwards. If you don’t want different extensions to slow down your Mac then use Extensions Manager to simply uninstall the ones you don't need. MacShiny will make sure that the unnecessary plugins will not clutter your disk space anymore.

Power Mac G5 Operating System

Depending on your individual scan results you will see some or all of the mentioned extensions: Dictionaries, Quick Look plugins, Spotlight plugins, Web browser plugins, QuickTime Player, Tunes plugins and Login items.

Power

If you wish to safely delete private or any sensitive data forever then Eraser is the right option. Securely delete all files that didn’t went into Trash folders somehow but must be wiped out from your system without any chance of recovery. Eraser is a ‘virtual shredder’ that makes deletion of any files permanent and real.

Power Mac G5 Service Manual

Do you want to run programs on the Mac stably and smoothly? It is necessary to periodically update them to the latest version - most recent programs have a minimum of errors and work several times faster.

If you do not have time to up-to-date programs installed on your Mac manually, leave it to Macshiny Updater! Just one click required to update all your apps to the latest version.

MacShiny antivirus toolkit able to detect many types of malicious software, including viruses.

The Internet is dangerous place to surf without reliable protection. A huge number of malware, viruses and unsafe websites that harm the system and steal your confidential data. Protect your Mac with Macshiny Antivirus!

Integrated anti-virus protection will provide a safe Internet surfing, protect data from unauthorized access, detect and eliminate potential threats and protects your Mac against malware and trojans.