Data Link layer has two sub layers: the LLC and the MAC sub
layer.
Data Link
Cont…
LLC sublayer :
The Logical Link Control is the upper sublayer of the Data Link layer.
LLC masks the underlying network technology by hiding their
differences hence providing a single interface to the network layer. This
layer is also responsible for frames sequencing and
acknowledgements.
MAC sublayer :
The Media Access Control layer takes care of physical addressing and
allows upper layers access to the physical media, handles frame
addressing, error checking. This layer controls and communicates
directly with the physical network media through the network interface
card. It converts the frames into bits to pass them on to the Physical
layer who puts them on the wire (and vice versa)
Physical
This layer communicates directly with the physical media, it is
responsible for activating, maintaining and deactivating the
physical link. It handles a raw bits stream and places it on the
wire to be picked up by the Physical layer at the receiving node.
It defines electrical and optical signaling, voltage levels, data
transmission rates and distances as well as mechanical
specifications such as cable lengths and connectors, the
amount of pins and their function.
The steps are known as the 5 steps of data encapsulation. When the bits stream
arrives at the destination, the Physical layer takes it of the wire and converts it
into frames, each layer will remove their corresponding header while the data
flows up the OSI model until it is converted back to data and presented to the
user, this is known as de-capsulation.
TCP/IP Protocol
Introduction to TCP/IP
The TCP/IP Suite defines a set of rules to enable
computers to communicate over a network. TCP/IP provides
end-to-end connectivity specifying how data should be
formatted, addressed, shipped, routed and delivered to the
right destination .
Application Layer
Handles high-level protocols, issues of
representation, encoding, and dialog control.
Transport
Five basic services:
Layer
• Segmenting upper-layer application data
• Establishing end-to-end operations
• Sending segments from one end host to another end
host
• Ensuring data reliability
• Providing flow control
Internet Layer
Best path determination and packet switching
IP as a Routed Protocol
IP is a connectionless,
unreliable, best-effort
delivery protocol.
As information flows down
the layers of the OSI model;
the data is processed at
each layer.
IP accepts whatever data is
passed down to it from the
upper layers.
Packet Propagation and Switching
Within a Router
Network Access Layer
The network access layer is concerned with all of the issues that an
IP packet requires to actually make a physical link to the network
media. It includes the LAN and WAN technology details, and all the
details contained in the OSI physical and data link layers.
Types of cables
Coaxial Cable:
• widely used for radio frequency applications
• not susceptible to the effects of
– RFI
– EMI
• Ethernet originally used coaxial cables
• longer distances & higher transmission rates
– 10base2 - 200m (185m), 10 Mbps
– 10base5 - 500m, 10 Mbps
• Ethernet/802.3 coax - 50, ARCNET coax 93
Types of cables cont…
Coaxial – cont…
• Advantages:
– higher speeds than UTP
– supports broad band (multi channel) LANs
• Disadvantages:
– easily damaged
– difficult to work with
– expensive than UTP
– for different LANs specific coax types needed
Types of cables cont…
Twisted Pair
• The type depends on:
– no. of pairs
– no. of twists per unit length
– gauge of the wire
– type of insulation
• Linear topology
– uses terminators
• Star topology
– uses a hub (concentrator or Multi-station
Access Unit (MAU))
• star wired bus
– signals passed to all stations as in a bus
• star wired ring
– signals passed from one station to the other by the hub
Connectors
• UTP:
• RJ-11 (6 pins)
• RJ-45 (8 pins)
– pin-outs will differ according to LAN type
• Thin Coaxial(10base2):
• BNC (BayoNet Connector)
• Terminator 50
• Thick Ethernet (10base5)
• Transceiver
• Attachment Unit Interface(AUI) < 50
Interfaces
• AUI – Attachment Unit Interface
Medium independent attachment for 10 Mbps media systems
• MAU – Medium Attachment Unit
• MDI – Medium Dependent Interface
• MII – Medium Independent Interface
• GMII – Gigabit Medium Independent Interface
• TBI – Gigabit Ten-Bit Interface
To accommodate 8B/10B signal encoding in Gigabit Ethernet if
1000 BASE X is used
• GBIC – Gigabit Interface Converter
Hot swappable
Media signaling components are contained
Interfaces cont…
External transceiver
Hub (MAU)
40 pin MII connector for
100 BASE T
DTE
DTE
2 SC connectors to fibre
optic 20 pin connector to
Ethernet port
Cable Types
• UTP – 10 BASE T
– Voice grade cabling
– RJ-45 jack used
– 100m maximum
– 300mV signal squelch level (to eliminate cross talk signals)
• but after 100m, due to attenuation, data signals also will go below this
– 100 impedance (in some implementations 120 )
0 high
-1 V DC offset
-2 V low
300 mV
300 mV
Cable Types cont…
• 100 BASE T
– unshielded or shielded (for Token Ring)
twisted pair
– 100m, 100, RJ-45 jack
– 40 pin MII connector also may be used with
an external transceiver (not commonly used)
– data is scrambled to eliminate electro-
magnetic effects
Cable Types cont…
• 100 BASE FX
– 40 pin MII may be used
– if transceiver is built-in, fibre optic can be directly
connected
– Non-Return-to-Zero, Invert-on-Ones (NRZI) encoding
is used
– Peek optical transmission power is 200-400 W for
62.5/125 m fibre
– No data scrambling needed
– Two strands of multi-mode fibre optics are used for Tx
and Rx
Cable Types cont…
• 1000 BASE T
– Gigabit Ethernet twisted pair – defined by 802.3ab
– UTP all 4 pairs are used – requires CAT-5 or higher quality cables
• All patch panels also should be of high quality
– Each pair has Tx and Rx wires (total of four Tx and four Rx wires in a cable)
• hence total of 8bit at a time
• 125 Mbaud achieves 1000 Mbps
– A combination of signaling and encoding is used to achieve the speed
– No external transceivers or MIIs available – requires a built in transceiver
– Digital Signal Processing (DSP) is used to handle cross talk
• echo cancellation
• near end cross talk (NEXT) cancellation
• far end cross talk (FEXT) cancellation
• signal equalization for distortion compensation
– Auto negotiation possible (10/100/1000 Mbps) if the interface supports that
Cable Types cont…
• 1000 BASE X
– Gigabit Ethernet for fibre optic
– SX – Short Wave Length
• Most widely used
• Less expensive
• Short distance
• Inside buildings
– LX – Long Wave Length
• 500 m
• long haul version – 10 km
• extended reach version – 70-100 km
– CX – Short Copper Jumper
• 25 m maximum
• used for linking equipment in computer rooms, racks etc.
Structured Cabling
– TIA
• Telecommunications Industry Association
– EIA
• Electronics Industries Association
– TIA/EIA 568 A
• Commercial Building Telecommunications Cabling Standard
– Aim
• To provide a generic vendor independent cabling system to
support both voice and data
– Similar international standard
• ISO/IEC 11801:1995
• Generic cabling for customer premises
• (IEC: International Electrotechnical Commission)
What TIA/EIA 568 A specifies
– horizontal cables
– backbone cables
– interconnection equipment
– telecommunication closets (place where hubs,
switches, connectors, etc. are placed)
– equipment rooms
– cable pathways
– uniform administration schemes
– grounding practices
Elements of Structured Cabling
Building Entrance Facilities
– Cables
– surge protection equipment
– connecting hardware for linking the cables
inside the building
Elements of Structured Cabling
cont…
Equipment Rooms
– More complex equipment
– Major cable terminations
– Grounding equipment
Elements of Structured Cabling
cont…
Building Backbone Cabling
– Using star topology
– Provides connections between
• Telecommunication closets
• Equipment rooms
• Entrance facilities
Elements of Structured Cabling
cont…
Telecommunications Closets
– Also called wiring closets
– Provides a location for the termination of the
horizontal cabling on a given floor of a building
– Mechanical cable terminations and cross connects for
the horizontal and backbone cabling system
– Interconnection equipment (Ethernet hubs and
switches etc.)
Elements of Structured Cabling
cont…
Horizontal Cabling
– Extends from the telecommunications closets
to the communications outlets located in the
work area
– Work area outlets and patch panels (used for
cable termination) are also included
– Patch cables
Elements of Structured Cabling
cont…
Work Area
– An office space
– Computers and other equipment are located
– Telephones and other devices connecting to
the communications outlet on the wall
Structured Cabling Topology
Structured cabling described in TIA/EIA 568 is
based on star topology
EIA/TIA-232, EIA/TIA-449,
V.24, V.35, X.21, G.703,
EIA-530, ISDN, T1, T3, E1,
E3, xDSL, SONET (OC-3,
OC-12, OC-48, OC-192)
Lab Setup
• Unlike the lab setup, the serial cables in the
real world are not connected back to back
• In the lab, devices that make up the WAN
cloud are simulated by the connection
between the back-to-back DTE-DCE cables.
Ports
• 3 types of interfaces
– LAN-
• Ethernet,Token Ring or FDDI
– WAN-
• Serial, ISDN, and integrated Channel Service Unit (CSU)
– Management-
• Console and Aux port
• EIA-232 asynchronous serial ports connects to the
computers COM port
• Computers must use a terminal emulation program that
provides a text-based session with the router
• DB9-RJ45 connector and a rollover cable
• not designed as networking ports
Management port connections
•Recommended for initial
configuration
•Displays router startup,
debugging, and error
messages by default
•Used for password
recovery procedures
Connecting Console Interfaces
1. Configure terminal emulation software on the PC for:
– The appropriate com port
– 9600 baud
– 8 data bits
– No parity
– 1 stop bit
– No flow control
2. Connect the RJ-45 connector of the rollover cable to the
router console port.
3. Connect the other end of the rollover cable to the RJ-45
to DB-9 adapter.
4. Attach the female DB-9 adapter to a PC
Connecting LAN interfaces
• A router is a host that communicates
with the LAN via a hub or a switch using
a straight through cable
• The router is connected to the LAN
using an Ethernet or Fast Ethernet
interface
• A 10/100BaseTX router interface
requires UTP, Cat 5 or better cable
Connecting WAN interfaces
• The customer premises equipment (CPE) is often a router and is
the data terminal equipment (DTE)
• The DTE is connected to the service provider using a data circuit-
terminating equipment (DCE) device, commonly a modem or
channel service unit/data service unit (CSU/DSU).
• The DCE is used to convert the data from the DTE into a form
acceptable to the WAN service provider.
Connecting WAN interfaces
IP Addressing
IPv4 Addressing
Overview
Internet address’s architecture
Classes of IP addresses
Subnet mask
IP Address
An IP address is a 32-bit sequence of 1s and 0s.
To make the IP address easier to use, the address is usually
written as four decimal numbers separated by periods.
This way of writing the address is called the dotted decimal
format.
IP Address
Every IP address has two parts:
Network
Host
Class B - 255.255.0.0
11111111.11111111.00000000.00000000
Class C - 255.255.255.0
11111111.11111111.11111111.00000000
Establishing the Subnet Mask
Address
To determine the number of bits to be used, the network
designer needs to calculate how many hosts the largest
subnetwork requires and the number of subnetworks needed.
Subnetting
• Subnetting an IP network can be done for
various reasons including:
– Organization
– Use of different physical media
– Preservation of address space
– Security
– Control network traffic
Subnetting
• Subnetting is a way of taking an existing class
license and breaking it down to create more
Network Addresses.
• Boot-sector viruses:
– Replicate themselves in the boot sector of the hard drive
• Logic bombs:
– Activate when certain conditions are met
• Time bombs:
– are viruses that are triggered by the passage of time or
on a certain date.
• Worms:
– Travel between systems through networks
Types of Viruses
• Script viruses:
– Hidden on Web pages
– Mini programs
• Macro viruses:
– Attached to documents
– Series of commands
• Trojan horses:
– Backdoor programs
– Control remote computers
Virus Classifications
• Polymorphic viruses:
– Periodically rewrite themselves to avoid
detection
• Multipartite viruses:
– Infect multiple file types
• Stealth viruses:
– Erase their code from the hard drive and
reside in the active memory
Antivirus Software
• Programs designed to detect viruses:
– Scan files looking for virus signatures (unique code)
– Provides options for deleting or fixing infected files
• Detect known viruses
• Antivirus programs need to be updated frequently
Lease Line Looping System
FIBER
FIBER COPPER
DDF,
NIC Jaipur NTR, Jaipur
Jaipur
COPPER
IP Address: 172.16.2.2/16
IP Address: 172.16.1.2/16 Gateway: 172.16.1.1
Gateway: 172.16.1.1
NIC VC over Lease Line Network
NIC, Delhi
MCU
ISDN PRI
Line
Lease Line
E1/G.703 BSNL
NTU/V.35 E1/G.703 Lease Line
Lease Line Network NTU/V.35
NIC-District
Router Router
NIC , Jaipur
ISDN BRI Switch
Switch Line
NT1
Users
NT1
Kota
ISDN BRI
NT1 Line
ISDN
Netwrok
NT1 NT1
Features Features
Phone Phone
Jaipur Jodhpur
Troubleshooting of VC
PING
VC Set Top Box IP
VC Gateway
NICNET Gateway
Status of Switch/ Router/ MODEM
BSNL
NICNET iNOC
Troubleshooting of VC
Cables
Audio Video Cable (Color Coding)
LAN Cable
UTP Cable (Rx & Tx Pair)
Straight & Cross Cable
ISDN Cable (Rx & Tx Pair)
MIC
Troubleshooting of VC
POWER Supply
220 VC
N. E. L.
N-E Voltage: 2 Volt
Voltage of ISDN line will be 96 Volt DC.
Voltage of PSTN line will be 48 Volt DC.
Troubleshooting of VC
• ISDN problems.
Check the power of NT box, voltage of
ISDN line it will be 96 Volt DC. If both are
ok then contact to BSNL.
• In case of Audio problems, check the
volume level in TV as well as VC system
and Mic.
• In case of Video problems, check the AV
selection in the TV, ISDN line.
System Maintenance and
Troubleshooting
Network Troubleshooting
Troubleshooting Windows Startup
Problems
Repairing Internet Explorer 6
Troubleshooting MS Outlook
Network Troubleshooting
U
We will learn how to troubleshoot basic
N
I network related problems
T
O
N
E
Troubleshooting
Determine Windows
the TCP/IP Settings: In XP,
open the Network
Networks
Connections folder, right click the LAN
connection, and click
Status | Support | Details.
Description of TCP/IP Settings:
Troubleshooting Windows
Here are the TCP/IP settings that are used in network
troubleshooting:
Networks
IP Address:
Unique address assigned to a network adapter. A
computer with multiple network adapters has an IP
address for each one, and each one must be in a
different subnet.
Subnet Mask:
Used in conjunction with the IP address to determine
which subnet an adapter belongs to. At the simplest
level, communication is only possible between two
network adapters when they’re in the same subnet.
Default Gateway:
Troubleshooting Windows
IP address of a computer or router, on one of this
Networks
computer’s local area networks, that knows how to
communicate with subnets not present on this computer.
For an Internet connection, the default gateway is a
router belonging to your Internet service provider, and all
access to sites on the Internet goes through it. For an
ICS client, the default gateway is the ICS host. If you use
a hardware router, it serves as the default gateway.
DHCP Server:
If an adapter is configured to obtain an IP address
automatically, this is the address of the server that
provides it. It could be your ISP, an ICS host, or a
hardware router.
Troubleshooting Windows Networks
DNS Servers – IP address of one or more
Domain Name Server computers. DNS servers
translate Internet names (like 3i-infotech.com) to
their IP addresses (like 63.146.109.227).
Pinging:
Troubleshooting Windows
Networks
The ping command is the basic tool for testing
TCP/IP connectivity. It sends a special packet
(called ICMP Echo) to a particular IP address
and looks for a reply. If everything is working
right, the reply comes back. If not, the ping
times out in a few seconds. By default, the ping
command repeats the process four times.
Here’s an example of an ICS client computer
pinging a Windows XP Home Edition ICS host,
using the host’s IP address and its computer
name.
When ping fails, you’ll see one of these error messages:
Troubleshooting Windows
Request timed out :
Networks
The IP address is valid, but there’s no reply from it. If the IP
address is on a local area network, the most likely cause is a
firewall program blocking the ping.
Unknown host <name> or Ping request could not find host
<name>:
The computer name doesn’t exist on the local area network. Make
sure that NetBIOS over TCP/IP is enabled.
Destination host unreachable:
The IP address isn’t on a local area network, and the default
gateway can’t access it. Either there’s no default gateway, its
address is wrong, or it isn’t functioning.
Troubleshooting Windows
Networks
Series of ping commands to use in finding where a problem occurs
on a local area network
Layer 1: Physical
Layer 2: Data Link
Layer 3: Network
Layer 4: Transport
Layer 5: Session
Layer 6: Presentation
Layer 7: Application
Network troubleshooting
methodology
Bottom-up Approach:
This approach involves a little more intuition. With the divide and
conquer method, start at whichever layer you best feel is the root
cause of the problem. From there, you can go either up or down
through the layers.
Network troubleshooting
Choosing an approach
methodology
Which approach you decide to use may depend on where you
believe the problem lies. For example, if a user is unable to
browse the Web and you think most users have a lot of problems
with spyware and Internet Explorer settings, then you may want to
start with the top-down approach. On the other hand, if the user
mentions that he or she just connected a laptop to the network and
can't browse the Web, you might want to use the bottom-up
method since there's a good chance the user has a disconnected
cable or similar problem.
Troubleshooting Startup
Problems
Hardware failure
Bad driver
Corrupt file or volume
System misconfiguration
Virus infection
Common error Messages & Probable
Causes:Troubleshooting Startup
Symptom Problems
Probable Cause
"Invalid Partition Table" Master boot record is corrupt due to
"Missing Operating System" hard disk errors or virus infection
“NTLDR is missing" Boot sector is corrupt due to hard disk
"A disk read error occurred" errors or virus infection
System hangs after BIOS POST
finishes
“Windows could not start because of a Boot.ini file is corrupt, missing, or
computer” needs updating
“disk hardware configuration problem"
"Could not read from selected boot
disk"
"Check boot path and disk hardware “
"Windows could not start because the Boot volume is corrupt or the
following file is missing or corrupt” referenced system file is missing.
Troubleshooting Startup
In addition to these error messages, a variety of other startup
Problems
problems can occur including:
Blue screens:
These are typically caused by hardware failure or driver
problems
but can also be due to virus infection.
Hung system:
These are typically caused by buggy drivers or by registry
corruption but can also be due to virus infection.
Dialog box saying "One or more services failed to start”:
This is typically caused by misconfiguration or registry
corruption
but can also be caused by application incompatibility of some
form.
Troubleshooting Startup
How to resolve startup problems:
Problems
Last known good Configuration Option:
Restores the HKLM\System\CurrentControlSet portion of the
registry its version during the last successful logon to the system.
Repair:
Run Windows Setup from your product CD
and select the option to
try and repair your installation
ProblemTroubleshooting
Resolution Table: Startup
Problem/Symptom Problems
Tool's) to Use
1.Click Start, click Run type sfc /scannow, and then press ENTER
2.Follow the prompts throughout the System File Checker process.
3.Restart the computer when System File Checker process is complete
Repairing Internet Explorer 6
Methods to follow:
Method 4: Reinstall Internet Explorer 6 by using the ie.inf
file:
If you already have Windows XP Service Pack 2 installed, and
you
do not want to install Internet Explorer 7, you may be able to
resolve problems with Internet Explorer 6 by using the ie.inf file
to
reinstall Internet Explorer 6. To do this, follow these steps:
*0x800ccc15
*0x80042108
*0x800ccc0e
*0x8004210b
*0x800ccc0b
*0x800ccc67
CAUSES:Troubleshooting Ms Outlook
Express
These error messages are frequently caused by one of the
following:
Express
The most common causes of these error messages are
problems
with Internet connectivity and incorrectly configured account
settings in Outlook or Outlook Express.
Express
If there is a damaged message in your mailbox, we can resolve
this by doing one of the following:
Contact your ISP and ask them to delete any suspicious e-mail.
Delete any suspicious e-mail by accessing your mailbox by
using your ISP's Web-based e-mail program.
Method 4: Check your antivirus vendor's Web site for
additional
suggestions
If your antivirus solution includes an e-mail scanning feature,
you
May have to do additional configuration to use Outlook or
Outlook
Express with the antivirus e-mail scanning feature.
Troubleshooting Ms Outlook
Advanced Troubleshooting
Method 5: Remove and then reinstall Outlook Express:
Express
If Outlook Express has been removed from your computer or
the
installation of Outlook Express is damaged, Outlook will not
function correctly and may generate one of the error messages
that are mentioned in the "Symptoms" section. To resolve this
problem, reinstall Outlook Express.
Method 6: Verify that all SMTP e-mail addresses in a
distribution list
Are Valid:
If one SMTP address in a distribution list is corrupted or
incorrectly
formed, error 0x8004210b can occur
Advanced Troubleshooting
Troubleshooting Ms Outlook
Method 5: Remove and then reinstall Outlook Express:
Express
If Outlook Express has been removed from your computer or the
installation of Outlook Express is damaged, Outlook will not
function correctly and may generate one of the error messages
that are mentioned in the "Symptoms" section. To resolve this
problem, reinstall Outlook Express.
Method 6: Verify that all SMTP e-mail addresses in a
distribution list
Are Valid:
If one SMTP address in a distribution list is corrupted or
incorrectly
formed, error 0x8004210b can occur .
Method 7: Examine the configuration of your firewall
software
THANK YOU