Broadband Technician: National Skill Development Corporation
Broadband Technician: National Skill Development Corporation
Corporation
BROADBAND TECHNICIAN
INTRODUCTION TO COMMUNICATION
SYSTEM
STRUCTURE
1.1 INTRODUCTION
1.2 OBJECTIVES
1.4 BYTES
1.10 SUMMARY
1.13 WORKSHEET
1.1 INTRODUCTION
Communication, whether between human beings or computer systems, involves the transfer of
information from a sender to receiver. Data communication refers to exchanger of digital
information between two digital devices. In this chapter, we examine some of the basic concepts
and terminology relating to data communication. Data representation, serial/parallel data
transmission and asynchronous/synchronous data transmission concepts are discussed first. We
then proceed to examine some practical concepts of Bit rate, Baud rate, Noise and attenuation and
their impact in data communication.Communication is the process of sending, receiving &
interpreting data by means of a protocol or bilateral agreement.Transmission means the transfer of
data from the source to the destination. Thus, every communication session involves transmission
sessions but, every transmission may not involve communication.
1.2 OBJECTIVES
The objective of this session is to make trainee aware of concepts of data communication and its
related important terms, definations and parameters.
Therefore, a group of bits is used as a code to represent a symbol. The code can be7 to 32 bits
long depending on the type of code being used. An 7-bit code can represent 27 = 128 symbols
whereas 32-bit code can represent 232 symbols. ASCII (American Standard Code for information
Interchange) code is 7 bit code whereas Unicode is 32 bit code. Unicode can represent character
of any language available in the world.
1.4 BYTES
Byte is a group of bits which is considered as a single unit during processing. It is usually eight
bits long. The byte is a unit of digital information that most commonly consists of eight bits. The
byte is the number of bits used to encode a single character of text in a computer and for this
reason it is the smallest addressable unit of memory in many computer architectures. The unit
symbol kB is commonly used for kilobyte, but may be confused with the still often-used
abbreviation of kb for kilobit.In data transmission systems, the byte is defined as a contiguous
sequence of bits in a serial data stream, representing is the smallest distinguished unit of data.
In serial transmission, bits are transmitted serially one after the other (Fig.2). The least significant
1 1 0 1 0 0 1 0
1 1 0 1 0 0 1 0
Transmitter Receiver
Fig. 2 Serial transmission
Bit (LSB) is usually transmitted first. Note that as compared to transmission, serial transmission
requires only one circuit interconnecting the two devices. Therefore, serial transmission is suitable
for transmission over long distances.
Due to the arbitrary delay between consecutive bytes, the time occurrences of the clock pulses at
the receiving end need to be synchronized repeatedly for each byte. This is achieved by providing
two extra bits, a start bit at the beginning and a stop bit at the end of a byte.
Start Bit. The start bit is always “0” and is prefixed to each byte. At the onset transmission of a
byte, it ensures that the electrical signal changes form idle state “1” to “0” and remains at “0” for
one bit duration. The leading edge of the start bit used as a time reference for generating the clock
pulses at the required sampling instants. Thus, each onset of a byte results in resynchronization of
the receiver clock.
Stop Bit. To ensure that the transition from “1” to “0” is always present at the beginning of a
byte, it is necessary that polarity of the electrical signal should correspond to “1” before
occurrence of the start bit. That is why the idle state is kept at “1”. But there may be two bytes,
one immediately following the other and if the last bit of the first byte is “0”, the transition from
“1” to “0” will not occur. Therefore, a stop bit is also suffixed to each byte. It is always “1” and
its duration is usually 1, 1.5 or 2 bits.
Synchronous Transmission
A synchronous action, unlike an asynchronous action, is carried out under the control of a timing
source. In synchronous transmission, bits are always synchronized to a reference clock
irrespective of the bytes they belong to. There are no start or stop bits. bytes are transmitted as a
block (group of bytes) in a continuous stream of bits (Fig. 4). Even the inter block idle time is
filled with idle characters.
Direction of Transmission
Fla Block Of bytes Flag Idle data Flag Block Of bytes Flag
g
Block 2 Block 1
which the electrical signal changes its levels. It is expressed in bauds (“per second” is implied).
Note that there is one to one correspondence between bits and electrical levels.
It is possible to associate more than one bit to one electrical level. For example, if the electrical
signal has four distinct levels, two bits can be associated with one electrical level (Fig. 6). In this
case, the bit rate is twice the baud rate.
1.10 SUMMARY
Binary codes are used for representing the symbols for computer communications. ASCII is the
most common code set used worldwide. The bits of a binary code can be transmitted in parallel or
in serial form. Transmission is always serial unless the devices are near each other. Serial
transmission mode can be asynchronous or synchronous. Asynchronous transmission is byte by
byte transmission and start/stop bits are appended to each byte. In synchronous transmission, data
is transmitted in the form of frames having flags to identify the start of a frame.Data
communication has wider scope as compared to data transmission. Asynchronous and
-------------------------------------------------------------------------------------------------------
Convert 34 into binary.
-------------------------------------------------------------------------------------------------------
What is difference between communication & transmission?
-------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------
What are different types of communications?
-------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------
How is bit rate different from Baud rate?
-------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------
What are major reasons effecting the quality of communication signal?
-------------------------------------------------------------------------------------------------------
What is the unit for measuring SNR & attenuation?
-------------------------------------------------------------------------------------------------------
1.12 REFERENCES AND SUGGESTED FURTHER READINGS
http://mybroadband.co.za/
http://www.rapidtables.com/electric
http://www.globalguideline.com/
1.13 WORKSHEET
--------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------
BROADBAND TECHNICIAN
2.1 INTRODUCTION
2.2 OBJECTIVES
2.6 SUMMARY
2.1 INTRODUCTION
There are so many different types of computer networks in existence, it can be hard to understand
the differences between them, particularly the ones with very similar-sounding names. This lesson
explains the structures and functions of some of the most popular computer networks.
There are several different types of computer networks. Computer networks can be characterized
by their size as well as their purpose.
The size of a network can be expressed by the geographic area they occupy and the number of
computers that are part of the network. Networks can cover anything from a handful of devices
within a single room to millions of devices spread across the entire globe.
Some of the different networks based on size are:
Local area network, or LAN
Metropolitan area network, or MAN
Wide area network, or WAN
In terms of purpose, many networks can be considered general purpose, which means they are
used for everything from sending files to a printer to accessing the Internet. Some types of
networks, however, serve a very particular purpose. Some of the different networks based on their
main purpose are:
Storage area network, or SAN
Enterprise private network, or EPN
Virtual private network, or VPN
2.2 OBJECTIVES
The objective of this session is to make trainee aware of different type of network and their
importance w.r.t data communication and their related important terms, definations and
parameters.
A metropolitan area network (MAN) is a network that interconnects users with computer
resources in a geographic area or region larger than that covered by even a large local area
network (LAN) but smaller than the area covered by a wide area network (WAN). The term is
applied to the interconnection of networks in a city into a single larger network (which may then
also offer efficient connection to a wide area network). It is also used to mean the interconnection
of several local area networks by bridging them with backbone lines. The latter usage is also
sometimes referred to as a campus network.
It’s all about benefits reason why a particular campus, town, city of metro would go for a MAN.
MAN is a computer network infrastructure which facilitates the communications among local
government, private businesses, organizations, utilities, educational institutions, libraries, and
citizens within a specific physical area. Obviously, one of the strong reasons why MANs are in
expansion nowadays is all due to its enormous benefits. Besides allowing access to resources
available in this networking infrastructure, lately majority of service providers in MANs networks
are providing for its users the Internet access as well. Looking this from a philosophic point of
view, it would be that the benefit alone is the existence of MAN itself. This in turn, facilitates the
process of establishing an IT oriented society.
The Broadband equipments deployed in a city is also considered as a MAN.
wide area network may be privately owned or rented, but the term usually denotes the inclusion of
public (shared user) networks. An intermediate form of network in terms of geography is a
metropolitan area network (MAN).
Computers connected to a wide-area network are often connected through public networks, such
as the telephone system. They can also be connected through leased lines or satellites. The largest
WAN in existence is the Internet.
A WAN connects more than one LAN and is used for larger geographical areas. WANs are
similar to a banking system, where hundreds of branches in different cities are connected with
each other in order to share their official data.
A WAN works in a similar fashion to a LAN, just on a larger scale. Typically, TCP/IP is the
protocol used for a WAN in combination with devices such as routers, switches, firewalls and
modems.
A WAN is different from a MAN because of the distance between each of the networks. In a
WAN, one network may be anywhere from several hundred miles away, to across the globe in a
different country. The same difference applies to a LAN. Computers in a LAN are usually close to
each other, but a WAN can have larger distances between computers and networks within the
WAN.
WANs generally utilize different and much more expensive networking equipment than do LANs.
Key technologies often found in WANs include SONET, Frame Relay, and ATM.
2.6 SUMMARY
LAN, MAN & WAN are the category of the network on basis of geographical area supported by
them. LAN supports smaller area while WAN supports bigger one. The bifurcation of the network
help in identifying the equipments that can be utilized as per the demand of network type and
thereby makes the management of network easier. For example, in case of LAN, router is not
necessary while it is mandatory in case of WAN. Similarly, modems or switches with fiber ports
can be used for configuration of MAN.
…………………………………………………………………………………………
…………………………………………………………………………………………
http://searchnetworking.techtarget.com/
http://www.webopedia.com/
https://www.quora.com
https://www.techopedia.com
2.9.4 Exercise:
Preparation of Straight Cable used for dissimilar devices such as PC and Switch.
a) Cut required length of cat 5 cable with Wire stripper or facility available in
Crimping tool.
b) Get the cat5 cable properly stripped at both ends with help of Wire stripper or
facility available in Crimping tool. And Study internal Structure of cable.
c) Arrange the wires as per the color code using T568 B Standard (or it is also called
EIA 568 B standard) given on both sides for preparing straight cable. for both the
ends. Unwind and pair of the similar colors.
e) Pinch the wires between your fingers and straighten them out as shown. (The wire
colors line up to form a straight through standard cat 5 cable as described below).
Use scissors to make a straight cut across the wires 1/2 Inch from the cut sleeve to
the end of the wires.
f) Push the wires into the connector. Note the position of the blue plastic shielding.
Also note how the wires go all the way to the end.
g) View from the top. All the wires are all the way in. There are no short wires.
WRONG WAY (Fig Below)- Note how the blue plastic shielding is not inside the
connector where it can be locked into place. The wires are too long. They should be
1/2 inch from the sleeve.
WRONG WAY (fig below)- Note how the cables do not go all the way to the end of
the connector.
h) CRIMPING THE CABLE ... carefully place the connector into the Ethernet
Crimper and cinch down on the handles tightly. The copper splicing tabs on the
connector will pierce into each of the eight wires. There is also a locking tab that
holds the blue plastic sleeve in place for a tight compression fit. When you remove
the cable from the crimper, the cable is ready to use.
i) Repeat all steps on the other end of the Ethernet cable exactly. There is no need to
reverse any order of the wires.
j) Make sure to test the cables before installing them. An inexpensive Ethernet cable
tester does this quite well.
or
Crimper and cinch down on the handles tightly. The copper splicing tabs on the
connector will pierce into each of the eight wires. There is also a locking tab that
holds the blue plastic sleeve in place for a tight compression fit. When you remove
the cable from the crimper, the cable is ready to use.
i) Repeat all steps on the other end (Use cable pair as per standard T568 A shown in
9.6.2 c)
j) Make sure to test the cables before installing them. An inexpensive Ethernet cable
tester does this quite well.
or
2.9.5 Notes:
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
Notes contd.:
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
BROADBAND TECHNICIAN
STRUCTURE
3.1 INTRODUCTION
3.2 OBJECTIVES
3.10 SUMMARY
3.1 INTRODUCTION
Network Topology refers to layout of a network and how different nodes in a network are
connected to each other and how they communicate. Topologies are either physical (the physical
layout of devices on a network) or logical (the way that the signals act on the network media, or
the way that the data passes through the network from one device to the next).The most common
nodes are computers and peripheral devices. Network topology is illustrated by showing these
nodes and their connections using cables.
Computers in a network have to be connected in some logical manner. The layout pattern of the
interconnections between computers in a network is called network topology. You can think of
topology as the virtual shape or structure of the network. Network topology is also referred to as
'network architecture.'
3.2 OBJECTIVES
The objective of this session is to make trainee aware of different type of network topologies and
their advantages and drawbacks thereby making them understand the approach which can be used
with respect to connnectivity of equipments so that whole network and its resources can be
optimally utilised.
or more topologies. . The ring network and bus network are connected to another network through
point-to-point connection. Star topologies are connected using Multistation Access Unit (MAU)
as a centralized hub. MAU connects network computers in a star topology. It has the ability to
identify non-operating devices and maintain the structure of the network.
Complex in design.
Costly.
Thus the point-to-point WAN is best when there are only two or three major locations.
The Ring WAN is developed by having point to point connections that connect the major nodes in
a ring. This is illustrated in the next image.
The Star WAN. A WAN star is laid out in a star configuration with one location as the "hub".
In this case this hub will make use of something called a concentrator router. In the following
figure the concentrator router is located in Chicago.
3.10 SUMMARY
Topology visualization is crucial. Doctors rely on X-rays and CT scans to diagnose problems and
plan how to solve them. Truck drivers use GPS to plan a long-haul shipment. Filmmakers use
storyboards. Without visual insight into their network, how can IT professionals expect to get to
the root cause of a problem?
While visual insight into physical and logical topology is helpful, it has limitations. It presents
information that must be interpreted and evaluated by a talented network administrator.
So why does the topology, or shape, of the network matter? There are a number of reasons:
The path traveled by a data packet--the distance traveled and the layout of the path--as it moves
from the sending computer to the receiving computer on the network greatly impacts the speed of
communication. Knowing the layout of your network will help you to not only optimize your
network's operation, but also troubleshoot performance issues. Different Lan topologies include
Mesh, Ring, Star, Hybrid whereas WAN topologies are point-to-point, Star and Ring.
http://www.studytonight.com/computer-networks
http://www.webopedia.com/quick_ref/topologies.asp
https://networking-communications.knoji.com
http://zaielacademic.net/networking
3.13 WORKSHEET
3.13.4 Exercise:
a) Find out which Broadband components are connected in Ring and which are
connected in star topology.
….………………………………………………………………………..
….………………………………………………………………………..
b) Which ports are used for connecting RPR Tier2 switch with DSLAM
…………………………………………………………………………..
c) Which port is used to connect RPR Tier2 switch with RPR Tier1 switch
…………………………………………………………………………..
d) Which ports of RPR Tier1 and RPR Tier2 are interconnected? Which topology they
represents?
.………………………………………………………………………..
.………………………………………………………………………..
.…………………………………………………………………………
.…………………………………………………………………………
e) How the ports in switches are interconnected to build up Ring Topology?
………………………………………………………………………..
………………………………………………………………………..
………………………………………………………………………..
………………………………………………………………………..
………………………………………………………………………..
f) Identify the slot number in RPR Tier1 and RPR Tier2 switches whose ports are used
to build Ring topology?
………………………………………………………………………..
g) Identify the slot number in DSLAM which are used to connect RPR switches?
………………………………………………………………………..
………………………………………………………………………..
3.13.5 Notes :
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
……………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
BROADBAND TECHNICIAN
4.1 INTRODUCTION
4.2 OBJECTIVE
4.3 WHAT IS TCP IP
4.4 HOW DOES TCP/IP WORKS
4.5 THREE MOST COMMON PROTOCOLS
4.6 DOMAIN NAMES AND TCP/IP ADDRESS
4.7 IP ADDRESSING
4.8 SUMMARY
4.9 WORKSHEET
4.1 INTRODUCTION
Short for Transmission Control Protocol/Internet Protocol, TCP/IP is a set of rules
(protocols) governing communications among all computers on the Internet. More specifically,
TCP/IP dictates how information should be packaged (turned into bundles of information
called packets), sent, and received, as well as how to get to its destination. TCP/IP was developed
in 1978 and driven by Bob Kahn and Vint Cerf.
4.2 OBJECTIVE
After completion of this chapter participants will be able to understand
Use of TCP/IP.
Protocols used in communication.
IP addressing with version 4
Computer Hope website and computerhope.com is the domain name. Using this method, instead
of a set of numbers, makes it much easier for users to remember Computer Hope's web address.
4.7 IP Addressing
S
i
z
e
Size
o Nu
Le of n Add
C f mb Sta
ad etw ress
l r er rt
in ork es End
a e of add
g num per address
s st net res
bit ber netw
s b wor s
s bit ork
it ks
field
fi
e
l
d
16,7
128 77,2 0.0 127.255
2
A 0 8 (27 16 .0. .255.25
4
) (224 0 5
)
16, 65,5 12
191.255
1 384 36 8.0
B 10 16 .255.25
6 (21 (216 .0.
5
4) ) 0
2,0
19
97, 223.255
11 256 2.0
C 24 8 152 .255.25
0 (28) .0.
(22 5
0
1)
Classful network design served its purpose in the startup stage of the Internet, but it
lacked scalability in the face of the rapid expansion of the network in the 1990s. The class system
of the address space was replaced with Classless Inter-Domain Routing (CIDR) in 1993. CIDR is
based on variable-length subnet masking (VLSM) to allow allocation and routing based on
arbitrary-length prefixes.
Today, remnants of classful network concepts function only in a limited scope as the default
configuration parameters of some network software and hardware components (e.g. netmask), and
in the technical jargon used in network administrators' discussions.
Private addresses
Early network design, when global end-to-end connectivity was envisioned for communications
with all Internet hosts, intended that IP addresses be uniquely assigned to a particular computer or
device. However, it was found that this was not always necessary as private networks developed
and public address space needed to be conserved.
Computers not connected to the Internet, such as factory machines that communicate only with
each other via TCP/IP, need not have globally unique IP addresses. Three non-overlapping ranges
of IPv4 addresses for private networks were reserved in RFC 1918. These addresses are not
routed on the Internet and thus their use need not be coordinated with an IP address registry.
Today, when needed, such private networks typically connect to the Internet through network
address translation (NAT).
No. of
Start End
addresses
4.8 SUMMARY
TCP/IP is a large set—sometimes called a suite—of communications protocols that fit in the
middle of a larger set of mechanisms. These protocols provide the linkage between applications
that can communicate and a physical network that carries the communicated data. Thus, TCP/IP
complements and extends the capability of a physical network, but can't work without it.
4.9 WORKSHEET
Qu.1 Fill in the blanks:
1. Abbreviate TCP ………………..
2. Bit length of Ipv4 is …….
3. Number of network bits in class A is………...
4. Number of network bits in class B is………...
Qu.3 Write down the different classes of IP address along with their subnet mask?
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------
Qu.5 Write down name of components that will require to build a LAN and also make a diagram
for computer connectivity inside a LAN?
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------
Notes:
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
------------------------------
BROADBAND TECHNICIAN
IP Version 6
5 IP VERSION 6
5.1 INTRODUCTION
5.2 OBJECTIVE
5.3 PRIVATE ADDRESSES
5.3 IP SUB NETWORK
5.4IP ADDRESS ASSIGNMENT
5.5 STICKY DYNAMIC IP ADDRESS
5.6 ROUTING
5.7 PUBLIC ADDRESS
5.8 DIAGNOSTIC TOOLS
5.9 SUMMARY
5.10 KEY LEARNING
5.11 WORKSHEET
5.1 INTRODUCTION
The intent of the new design was not to provide just a sufficient quantity of addresses, but also
redesign routing in the Internet by more efficient aggregation of subnetwork routing prefixes. This
resulted in slower growth of routing tables in routers. The smallest possible individual allocation
is a subnet for 264 hosts, which is the square of the size of the entire IPv4 Internet. At these levels,
actual address utilization rates will be small on any IPv6 network segment. The new design also
provides the opportunity to separate the addressing infrastructure of a network segment, i.e. the
local administration of the segment's available space, from the addressing prefix used to route
traffic to and from external networks. IPv6 has facilities that automatically change the routing
prefix of entire networks, should the global connectivity or the routing policy change, without
requiring internal redesign or manual renumbering.
The large number of IPv6 addresses allows large blocks to be assigned for specific purposes and,
where appropriate, to be aggregated for efficient routing. With a large address space, there is no
need to have complex address conservation methods as used in CIDR.
All modern desktop and enterprise server operating systems include native support for the IPv6
protocol, but it is not yet widely deployed in other devices, such as residential networking
routers, voice over IP (VoIP) and multimedia equipment, and network peripherals.
5.2 OBJECTIVE
After reading this chapter participants will be able
1. Identify the format of IP v6 address.
2. IP v6 features.
3. IPV6 troubleshooting and diagnosis.
5.3 PRIVATE ADDRESSES
Just as IPv4 reserves addresses for private networks, blocks of addresses are set aside in IPv6. In
IPv6, these are referred to as unique local addresses (ULA). RFC 4193reserves the routing prefix
fc00::/7 for this block which is divided into two /8 blocks with different implied policies. The
addresses include a 40-bit pseudorandom number that minimizes the risk of address collisions if
sites merge or packets are misrouted.[8]
Early practices used a different block for this purpose (fec0::), dubbed site-local
addresses.[9] However, the definition of what constituted sites remained unclear and the poorly
defined addressing policy created ambiguities for routing. This address type was abandoned and
must not be used in new systems.[10]
Addresses starting with fe80:, called link-local addresses, are assigned to interfaces for
communication on the attached link. The addresses are automatically generated by the operating
system for each network interface. This provides instant and automatic communication between
all IPv6 host on a link. This feature is required in the lower layers of IPv6 network administration,
such as for the Neighbor Discovery Protocol.
enabled by default so that a user does not need to manually enter any settings to connect to a
network with a DHCP server. DHCP is not the only technology used to assign IP addresses
dynamically. Dialup and some broadband networks use dynamic address features of the Point-to-
Point Protocol.
5.6 STICKY DYNAMIC IP ADDRESS
A sticky dynamic IP address is an informal term used by cable and DSL Internet access
subscribers to describe a dynamically assigned IP address which seldom changes. The addresses
are usually assigned with DHCP. Since the modems are usually powered on for extended periods
of time, the address leases are usually set to long periods and simply renewed. If a modem is
turned off and powered up again before the next expiration of the address lease, it will most likely
receive the same IP address.
Address autoconfiguration
RFC 3330 defines an address block, 169.254.0.0/16, for the special use in link-local
addressing for IPv4 networks. In IPv6, every interface, whether using static or dynamic address
assignments, also receives a local-link address automatically in the block fe80::/10.
These addresses are only valid on the link, such as a local network segment or point-to-point
connection, that a host is connected to. These addresses are not routable and like private addresses
cannot be the source or destination of packets traversing the Internet.
When the link-local IPv4 address block was reserved, no standards existed for mechanisms of
address autoconfiguration. Filling the void, Microsoft created an implementation that is called
Automatic Private IP Addressing (APIPA). APIPA has been deployed on millions of machines
and has, thus, become a de facto standard in the industry. In RFC 3927, the IETF defined a formal
standard for this functionality, entitled Dynamic Configuration of IPv4 Link-Local Addresses.
Uses of static addressing
Some infrastructure situations have to use static addressing, such as when finding the Domain
Name System (DNS) host that will translate domain names to IP addresses. Static addresses are
also convenient, but not absolutely necessary, to locate servers inside an enterprise. An address
obtained from a DNS server comes with a time to live, or caching time, after which it should be
looked up to confirm that it has not changed. Even static IP addresses do change as a result of
network administration (RFC 2072).
Conflict
An IP address conflict occurs when two devices on the same local physical or wireless network
claim to have the same IP address – that is, they conflict with each other. Since only one of the
devices is supposed to be on the network at a time, the second one to arrive will generally stop the
IP functionality of one or both of the devices. In many cases with modern Operating Systems, the
Operating System will notify the user of one of the devices that there is an IP address conflict
(displaying the symptom error message[11][12]) and then either stop functioning on the network
or function very badly on the network, and the user will then be stumped as to how to resolve the
conflict, probably considering the situation an emergency. In some unfortunate cases, both
devices will function very badly on the network. In severe cases in which one of the devices is the
gateway, the network will be crippled. Since IP addresses are assigned by multiple people and
systems in multiple ways, any of them can be at fault.
5.7ROUTING
IP addresses are classified into several classes of operational characteristics: unicast,
multicast, anycast and broadcast addressing.
Unicast addressing
The most common concept of an IP address is in unicast addressing, available in
both IPv4 and IPv6. It normally refers to a single sender or a single receiver, and can be used for
both sending and receiving. Usually, a unicast address is associated with a single device or host,
but a device or host may have more than one unicast address. Some individual PCs have several
distinct unicast addresses, each for its own distinct purpose. Sending the same data to multiple
unicast addresses requires the sender to send all the data many times over, once for each recipient.
Broadcast addressing
In IPv4 it is possible to send data to all possible destinations ("all-hosts broadcast"), which
permits the sender to send the data only once, and all receivers receive a copy of it. In the IPv4
protocol, the address 255.255.255.255 is used for local broadcast. In addition, a directed (limited)
broadcast can be made by combining the network prefix with a host suffix composed entirely of
binary 1s. For example, the destination address used for a directed broadcast to devices on the
192.0.2.0/24 network is 192.0.2.255. IPv6 does not implement broadcast addressing and replaces
it with multicast to the specially-defined all-nodes multicast address.
Multicast addressing
A multicast address is associated with a group of interested receivers. In IPv4, addresses 224.0.0.0
through 239.255.255.255 (the former Class D addresses) are designated as multicast
addresses. IPv6 uses the address block with the prefix ff00::/8 for multicast applications. In either
case, the sender sends a single datagram from its unicast address to the multicast group address
and the intermediary routers take care of making copies and sending them to all receivers that
have joined the corresponding multicast group.
Anycast addressing
Like broadcast and multicast, anycast is a one-to-many routing topology. However, the data
stream is not transmitted to all receivers, just the one which the router decides is logically closest
in the network. Anycast address is an inherent feature of only IPv6. In IPv4, anycast addressing
implementations typically operate using the shortest-path metric of BGP routing and do not take
into account congestion or other attributes of the path. Anycast methods are useful for global load
balancing and are commonly used in distributedDNS systems.
5.8PUBLIC ADDRESS
A public IP address, in common parlance, is a globally routable unicast IP address, meaning that
the address is not an address reserved for use in private networks, such as those reserved by RFC
1918, or the various IPv6 address formats of local scope or site-local scope, for example for link-
local addressing. Public IP addresses may be used for communication between hosts on the global
Internet.
5.9DIAGNOSTIC TOOLS
Computer operating systems provide various diagnostic tools to examine their network interface
and address configuration. Windows provides the command-line
interface toolsipconfig and netsh and users of Unix-like systems can
use ifconfig, netstat, route, lanstat, fstat, or iproute2 utilities to accomplish the task.
5.10 SUMMARY
TCP/IP is a large set—sometimes called a suite—of communications protocols that fit in the
middle of a larger set of mechanisms. These protocols provide the linkage between applications
that can communicate and a physical network that carries the communicated data. Thus, TCP/IP
complements and extends the capability of a physical network, but can't work without it.
5.11 WORKSHEET
Qu.1 Fill in the blanks:
Qu.3 Write down the steps and command to check Ipv6 address assigned to computer?
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
--------------------------------------
Qu. 4 Write down steps to check whether remote system with IP 192.168.2.45 is alive on network
or not?
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------
Notes:
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
--------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
--------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
--------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
--------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
--------------------------------
BROADBAND TECHNICIAN
BROADBAND CONCEPTS
6.1 INTRODUCTION
6.2 OBJECTIVE
6.3 BROADBAND TECHNOLOGY EVOLUTION
6.4 CABLE MODEM
6.5 DIGITAL SUBSCRIBER LINE (DSL)
6.6 FEATURES OF DSL TECHNOLOGY
6.7 ADSL TECHNOLOGY
6.8 ADSL 2+ TECHNOLOGY
6.9 ADSL APPLICATIONS
6.10 DMT MODULATION
6.11 SUMMARY
6.12 WORKSHEET
6.1 INTRODUCTION
Before the late 1990s, people connected remotely to their offices or the Internet using dial up
connections. An always-on remote network connection was not possible for a reasonable price. To
connect to the corporate network, the user ran a program that dialed a phone number. Unless the
user had a second phone line, being online prohibited incoming or outgoing phone calls. The user
entered a user ID and password to gain access to the system. The fastest speed available over
phone lines was 56 kbps, which was fine until the web became popular in the 1990s.
Downloading large pictures, documents, applications, and audio files took what seemed like
forever. Then, along came broadband. Broadband networking offered a reasonable high-speed
alternative to traditional dialup networking. Using existing service connections to houses (such as
phone wiring, cable TV coaxial cable, or even satellite), service providers offered Internet
services at many times the speed of dialup. Downloading large files became palatable with
broadband. Broadband technologies allow service providers to offer always-on connectivity
similar to what people use in a corporate network. Computers on the broadband network always
have access to the network; there is no intermediate dialup step. Sit down, load the browser, and
off you go. High-speed Internet access to homes offers new levels of productivity and
entertainment not possible before the commercialization of the Internet and the web. Aside from
apparent uses such as online shopping and video streaming, corporations can accommodate road
warriors and work-from-home folks in a way not previously possible. Using encryption
technologies, an employee with a laptop computer can securely access her corporate network
from any Internet access point in the world. Additionally, employees can attach IP phones,
allowing them to work on their computers and make calls from their office-phone extensions as if
they were sitting at their desks.
6.2 OBJECTIVE
After reading this chapter participants will be able
1. To understand basic concept of broad band technology.
2. To understand basic concept of DSL.
3. To understand basic concept of modulation technology.
Cable modems provide high-speed data communication using existing cable television coaxial
cabling. Current implementations of cable-modem technologies offer speeds as fast as Ethernet
(greater than 10 Mbps). This means that a file that takes 2 minutes to transfer over ISDN takes 2
seconds over a cable modem. Cable modem can provide higher speeds than traditional leased
lines, with lower cost and easier installation. Because a cable-modem connection is permanently
established, it cannot dial multiple locations directly. As a result, cable-modem access must be to
the Internet. This restriction means that employees can connect to their company’s network only if
the company provides access through the Internet. Usually, this is done through a secure VPN
connection.
Used for applications which require greater download bandwidth but require relatively
little in opposite direction like Web browsing; File downloads etc.
An ADSL circuit connects an ADSL modem on each end of a twisted pair telephone line
creating three information channels
A high speed downstream channel
A medium speed duplex channel for both upstream & downstream applications
A basic telephone service channel
The basic telephone service channel is split off from the digital modem by splitter at
client site
Allows simultaneous access of the line by the telephone and the computer
In case of power/ADSL failure, data transmission is lost but basic telephone service will
be operational
Can work up to a distance of 3.7 to 5.5 kms.
6.8 ADSL 2+ TECHNOLOGY
Second generation of ADSL
G.992.5 standard
Doubles the max. frequency used for downstream data transmission from 1.1 Mhz
to 2.2 Mhz.
Offers a greater data rates of 25 Mb/s downstream and upto 1.5 Mb/s upstream.
Can work upto 6.3 Kms with reduced data rates
Has all the other benefits of ADSL 2 like improved power management ,
seamless adaptation of data rate in real time to meet the changing line conditions,
bonding of copper pairs for higher data rates etc.
6.9 ADSL APPLICATIONS
Internet access ( SOHO)
LAN Access ( Telecommuting)
Distance Learning
Tele-medicine
Broadcast TV
Home shopping
Interactive Games
Movies
ADSL/ADSL2
1.1MHz
Voice
No
of
Bit Downstream
s 6 3 0.14M
1 7 Hz
5
0
4 3 25
8 5
Frequency
6.11 SUMMARY
Broad band access technology works with the help of DSL (Disgital Subscriber line)
which is having always on feature and this differs it from existing technologies.
6.12 WORKSHEET
Qu.1 Fill in the blanks:
1. Abbreviate PPPoE…………………………….
2. Abbreviate DSL ………………………………
3. G.992.1standered defines……………………
Qu.5 Write down steps for making physical connectivity of broad band equipments at subscriber
premises?
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------
Notes:
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
---------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
----------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
---------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
----------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
---------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
----------
BROADBAND TECHNICIAN
BROADBAND ACCESS
TECHNOLOGIES
- -
7.1 INTRODUCTION
7.2 OBJECTIVE
7.3 HARDWIRED BROADBAND ACCESS
7.4 DIAL-UP ACCESS
7.5 MULTILINK DIAL-UP
7.6 INTEGRATED SERVICES DIGITAL NETWORK
7.7 LEASED LINES
7.8 CABLE INTERNET ACCESS
7.9 DIGITAL SUBSCRIBER LINE (DSL, ADSL, SDSL, AND VDSL)
7.10 DSL RINGS
7.11 FIBER TO THE HOME
7.12 POWER-LINE INTERNET
7.13 ATM AND FRAME RELAY
7.14 WIRELESS BROADBAND ACCESS
7.15 SATELLITE BROADBAND
7.16 MOBILE BROADBAND
7.17 WI-MAX
7.18 WIRELESS ISP
7.19 LOCAL MULTIPOINT DISTRIBUTION SERVICE
7.20 SUMMARY
7.21 WORKSHEET
7.1 INTRODUCTION
Internet access is the process that enables individuals and organisations to connect to
the Internet using computer terminals,computers, mobile devices, sometimes via computer
networks. Once connected to the Internet, users can access Internet services, such as email and
the World Wide Web. Internet service providers (ISPs) offer Internet access through various
technologies that offer a wide range of data signaling rates (speeds).
Consumer use of the Internet first became popular through dial-up Internet access in the 1990s.
By the first decade of the 21st century, many consumers in developed nations used
faster, broadband Internet access technologies. As of 2014, broadband was ubiquitous around the
world, with a global average connection speed exceeding 4 Mbit/s
7.2 OBJECTIVE
After reading this chapter participants will be able
1. To understand different means for internet connectivity.
2. Wired and wireless internet access.
3. Different technologies working for broad band access.
7.3 HARDWIRED BROADBAND ACCESS
The term broadband includes a broad range of technologies, all of which provide higher data rate
access to the Internet. The following technologies use wires or cables in contrast to wireless
broadband described later.
7.4 DIAL-UP ACCESS
Dial-up Internet access uses a modem and a phone call placed over the public switched telephone
network (PSTN) to connect to a pool of modems operated by an ISP. The modem converts a
computer's digital signal into an analog signal that travels over a phone line's local loop until it
reaches a telephone company's switching facilities or central office (CO) where it is switched to
another phone line that connects to another modem at the remote end of the connection.
Operating on a single channel, a dial-up connection monopolizes the phone line and is one of the
slowest methods of accessing the Internet. Dial-up is often the only form of Internet access
available in rural areas as it requires no new infrastructure beyond the already existing telephone
network, to connect to the Internet. Typically, dial-up connections do not exceed a speed of
56 kbit/s, as they are primarily made using modems that operate at a maximum data rate of 56
kbit/s downstream (towards the end user) and 34 or 48 kbit/s upstream (toward the global
Internet).
7.5 MULTILINK DIAL-UP
Multilink dial-up provides increased bandwidth by channel bonding multiple dial-up connections
and accessing them as a single data channel. It requires two or more modems, phone lines, and
dial-up accounts, as well as an ISP that supports multilinking – and of course any line and data
charges are also doubled. This inverse multiplexing option was briefly popular with some high-
end users before ISDN, DSL and other technologies became available. Diamond and other
vendors created special modems to support multilinking.
termination system, all nodes for cable subscribers in a neighborhood connect to a cable
company's central office, known as the "head end." The cable company then connects to the
Internet using a variety of means – usually fiber optic cable or digital satellite and microwave
transmissions. Like DSL, broadband cable provides a continuous connection with an ISP.
Downstream, the direction toward the user, bit rates can be as much as 400 Mbit/s for business
connections, and 250 Mbit/s for residential service in some countries. Upstream traffic,
originating at the user, ranges from 384 kbit/s to more than 20 Mbit/s. Broadband cable access
tends to service fewer business customers because existing television cable networks tend to
service residential buildings and commercial buildings do not always include wiring for coaxial
cable networks. In addition, because broadband cable subscribers share the same local line,
communications may be intercepted by neighboring subscribers. Cable networks regularly
provide encryption schemes for data traveling to and from customers, but these schemes may be
thwarted.
7.9 DIGITAL SUBSCRIBER LINE (DSL, ADSL, SDSL, AND VDSL)
Digital Subscriber Line (DSL) service provides a connection to the Internet through the telephone
network. Unlike dial-up, DSL can operate using a single phone line without preventing normal
use of the telephone line for voice phone calls. DSL uses the high frequencies, while the low
(audible) frequencies of the line are left free for regular telephonecommunication. These
frequency bands are subsequently separated by filters installed at the customer's premises.
DSL originally stood for "digital subscriber loop". In telecommunications marketing, the term
digital subscriber line is widely understood to mean Asymmetric Digital Subscriber Line (ADSL),
the most commonly installed variety of DSL. The data throughput of consumer DSL services
typically ranges from 256 kbit/s to 20 Mbit/s in the direction to the customer (downstream),
depending on DSL technology, line conditions, and service-level implementation. In ADSL, the
data throughput in the upstream direction, (i.e. in the direction to the service provider) is lower
than that in the downstream direction (i.e. to the customer), hence the designation of asymmetric.
With a symmetric digital subscriber line (SDSL), the downstream and upstream data rates are
equal.
Very-high-bit-rate digital subscriber line (VDSL or VHDSL, ITU G.993.1)[38] is a digital
subscriber line (DSL) standard approved in 2001 that provides data rates up to 52 Mbit/s
downstream and 16 Mbit/s upstream over copper wiresand up to 85 Mbit/s down- and upstream
on coaxial cable. VDSL is capable of supporting applications such as high-definition television, as
well as telephone services (voice over IP) and general Internet access, over a single physical
connection.
VDSL2 (ITU-T G.993.2) is a second-generation version and an enhancement of VDSL. Approved
in February 2006, it is able to provide data rates exceeding 100 Mbit/s simultaneously in both the
upstream and downstream directions. However, the maximum data rate is achieved at a range of
about 300 meters and performance degrades as distance and loop attenuation increases.
7.10 DSL RINGS
DSL Rings (DSLR) or Bonded DSL Rings is a ring topology that uses DSL technology over
existing copper telephone wires to provide data rates of up to 400 Mbit/s.[42]
7.11 FIBER TO THE HOME
Fiber-to-the-home (FTTH) is one member of the Fiber-to-the-x (FTTx) family that includes Fiber-
to-the-building or basement (FTTB), Fiber-to-the-premises (FTTP), Fiber-to-the-desk (FTTD),
Fiber-to-the-curb (FTTC), and Fiber-to-the-node (FTTN).[43] These methods all bring data closer
to the end user on optical fibers. The differences between the methods have mostly to do with just
how close to the end user the delivery on fiber comes. All of these delivery methods are similar
to hybrid fiber-coaxial (HFC) systems used to provide cable Internet access.
The use of optical fiber offers much higher data rates over relatively longer distances. Most high-
capacity Internet and cable television backbones already use fiber optic technology, with data
switched to other technologies (DSL, cable, POTS) for final delivery to customers.
Australia began rolling out its National Broadband Network across the country using fiber-optic
cables to 93 percent of Australian homes, schools, and businesses. The project was abandoned by
the subsequent LNP government, in favour of a hybrid FTTN design, which turned out to be more
expensive and introduced delays. Similar efforts are underway in Italy, Canada, India, and many
other countries (see Fiber to the premises by country).
7.12 POWER-LINE INTERNET
Power-line Internet, also known as Broadband over power lines (BPL), carries Internet data on a
conductor that is also used for electric power transmission. Because of the extensive power line
infrastructure already in place, this technology can provide people in rural and low population
areas access to the Internet with little cost in terms of new transmission equipment, cables, or
wires. Data rates are asymmetric and generally range from 256 kbit/s to 2.7 Mbit/s.
Because these systems use parts of the radio spectrum allocated to other over-the-air
communication services, interference between the services is a limiting factor in the introduction
of power-line Internet systems. The IEEE P1901 standard specifies that all power-line protocols
must detect existing usage and avoid interfering with it.
Power-line Internet has developed faster in Europe than in the U.S. due to a historical difference
in power system design philosophies. Data signals cannot pass through the step-down
transformers used and so a repeater must be installed on each transformer. In the U.S. a
transformer serves a small cluster of from one to a few houses. In Europe, it is more common for
a somewhat larger transformer to service larger clusters of from 10 to 100 houses. Thus a typical
U.S. city requires an order of magnitude more repeaters than in a comparable European city.
7.13 ATM AND FRAME RELAY
Asynchronous Transfer Mode (ATM) and Frame Relay are wide-area networking standards that
can be used to provide Internet access directly or as building blocks of other access technologies.
For example, many DSL implementations use an ATM layer over the low-level bitstream layer to
enable a number of different technologies over the same link. Customer LANs are typically
connected to an ATM switch or a Frame Relay node using leased lines at a wide range of data
rates.
While still widely used, with the advent of Ethernet over optical fiber, MPLS, VPNs and
broadband services such as cable modem and DSL, ATM and Frame Relay no longer play the
prominent role they once did.
7.14 WIRELESS BROADBAND ACCESS
Wireless broadband is used to provide both fixed and mobile Internet access with the following
technologies.
• LTE-Advanced:
The download (to the user) and upload (to the Internet) data rates given above are peak or
maximum rates and end users will typically experience lower data rates.
WiMAX was originally developed to deliver fixed wireless service with wireless mobility added
in 2005. CDPD, CDMA2000 EV-DO, and MBWA are no longer being actively developed.
In 2011, 90% of the world's population lived in areas with 2G coverage, while 45% lived in areas
with 2G and 3G coverage.
7.17 WIMAX
Worldwide Interoperability for Microwave Access (WiMAX ) is a set of interoperable
implementations of the IEEE 802.16 family of wireless-network standards certified by
theWiMAX Forum. WiMAX enables "the delivery of last mile wireless broadband access as an
alternative to cable and DSL".The original IEEE 802.16 standard, now called "Fixed WiMAX",
was published in 2001 and provided 30 to 40 megabit-per-second data rates.[68] Mobility support
was added in 2005. A 2011 update provides data rates up to 1 Gbit/s for fixed stations. WiMax
offers a metropolitan area network with a signal radius of about 50 km (30 miles), far surpassing
the 30-metre (100-foot) wireless range of a conventional Wi-Fi local area network (LAN).
WiMAX signals also penetrate building walls much more effectively than Wi-Fi.
7.18 WIRELESS ISP
Wireless Internet service providers (WISPs) operate independently of mobile phone operators.
WISPs typically employ low-cost IEEE 802.11 Wi-Firadio systems to link up remote locations
over great distances (Long-range Wi-Fi), but may use other higher-power radio communications
systems as well.
Traditional 802.11b is an unlicensed omnidirectional service designed to span between 100 and
150 m (300 to 500 ft). By focusing the radio signal using a directional antenna 802.11b can
operate reliably over a distance of many km(miles), although the technology's line-of-sight
requirements hamper connectivity in areas with hilly or heavily foliated terrain. In addition,
compared to hard-wired connectivity, there are security risks (unless robust security protocols are
enabled); data rates are significantly slower (2 to 50 times slower); and the network can be less
stable, due to interference from other wireless devices and networks, weather and line-of-sight
problems.
Deploying multiple adjacent Wi-Fi access points is sometimes used to create city-wide wireless
networks. Some are by commercial WISPs but grassroots efforts have also led to wireless
community networks. Rural wireless-ISP installations are typically not commercial in nature and
are instead a patchwork of systems built up by hobbyists mounting antennas on radio masts and
towers, agricultural storage silos, very tall trees, or whatever other tall objects are available. There
are a number of companies that provide this service.
Proprietary technologies like Motorola Canopy & Expedience can be used by a WISP to offer
wireless access to rural and other markets that are hard to reach using Wi-Fi or WiMAX.
7.19 LOCAL MULTIPOINT DISTRIBUTION SERVICE
Local Multipoint Distribution Service (LMDS) is a broadband wireless access technology that
uses microwave signals operating between 26 GHz and 29 GHz. Originally designed for digital
television transmission (DTV), it is conceived as a fixed wireless, point-to-multipoint technology
for utilization in the last mile. Data rates range from 64 kbit/s to 155 Mbit/s. Distance is typically
limited to about 1.5 miles (2.4 km), but links of up to 5 miles (8 km) from the base station are
possible in some circumstances.
LMDS has been surpassed in both technological and commercial potential by the LTE and
WiMAX standards.
7.20 SUMMARY
Broad band access technology covers variety of technology with wired and wireless access
like DSL broad band, WiFi, Wi-Max etc that all together working as a backbone for connecting
people each other.
7.21 WORKSHEET
Qu.1 Fill in the blanks:
1. …………………. Can be checked by observing internet LED on modem.
2. ………..port is used for connecting PC with modem.
3. …………….. signal can be used to connect mobile devices with modem.
4. Green LED shows………………..Mbps speed in modem.
5. To load factory setting in modem ………………….can be used.
Qu.2 Mark True or False
1. Green LED shows 10Mbps speed for communication in modem.
2. Broad band is also known as ADSL modem.
3. Broad band modem cannot be reset by web interface.
4. IP address of Broad band modem is 192.168.1.2.
5. For broad band modem configuration goggle chrome can be used.
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
-------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------
Qu.5 Write steps to troubleshoot problem if LAN icon in PC is showing red cross(i.e.
disconnection)?
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
---------------------
Notes:
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------
BROADBAND TECHNICIAN
BROADBAND INSTALLATION
8. BROADBAND INSTALLATION
8.1 Overview
8.2 Lying the cables at customer premises -conectivity of dsl-cpe.
8.3 Establishing connectivity between pc and adsl modem.
8.4 Configuration of dsl modem in bridge mode.
8.5 Configuration of broad band dialer at computer.
8.1 OVERVIEW
In telecommunications, broadband is a wide bandwidth data transmission with an ability to
simultaneously transport multiple signals and traffic types. The medium can be coaxial
cable, optical fiber, radio or twisted pair.
In the context of Internet access broadband is used much more loosely to mean any high-speed
Internet access that is always on and faster than traditional dial-up access.
Modes of configuration of modem- There are two ways to configure an ADSL modem for
broadband connection. One in PPPoE (Point to Point Protocol over Ethernet) and the another is
Bridge mode.
PPPoE Mode
In this mode the modem works as router and the PPPoE session terminates on WAN port of
router. The PPPoE client is in built in the modem and allocated by BRAS server gets assigned to
WAN port of modem. The Internal network has to use the private IP and for Internet access
NATing happens in modem. In PPPoE mode the modem is configured in such a way that the user
id and password are stored inside the Modem. Internet connection will be established as you
switch on the Modem.
Bridge Mode
In this mode the modem works as transparent Ethernet bridge and therefore you need to run the
PPPoE client software ( for login authentication) on your PC/server. WIN XP systems have this
feature inbuilt ti
Both the modes can be used as per the requirement and application. Here enumerating the main
differences
PPPoE mode
1. User id and password stored inside the Modem.
2. Multiple PCs can be connected. For example most of the basic ADSL Modems having at
least one ADSL port and one USB port. In PPPoE mode, can connect one PC to Ethernet
port and one PC to USB port which enable simultaneous internet usage in both the PCs.
3. PPPoE mode is more secured.
4. For Torrents download, appropriate ports need to be forwarded.
Bridge Mode
1. In bridge mode user id and password to be entered in the dialer of computer.
2. Only single PC can be connected.
3. For torrents download port forwarding is not required.
4. Less secured because all the ports are open need good firewall to avoid virus infection.
STB
Splitter CPE PC
Telephone Exchange
230V
OFC
Telephone
DSLAM MDF
The DSL-CPE connectivity is provided with single user or multiusers. In case of ADSL Router it
is possible to connect the user PCs with the help of hub or switch.
8.1
The above result shows that there is good connectivity between the PC and ADSL Modem
Open Internet Explorer and type http://192.168.1.1 in the web browser, the following Window
appears:-
1. Go to Management menu.
2. Select Save/Reboot submenu
3. click on Save/Reboot.
Select create new connect and select Broad Band connection and click next
Select Broad Band dialer that requires username and password and click next
Enter user name and password given by ISP for your Broad Band connection and click on
connect button.
1. Open Internet Explorer and type http://192.168.1.1 in the web browser, the following
Window appears:-
a. Type Username admin and Password admin and click OK.
6. Type username and password as given to the customer for broadband access.
8. Click on next
9. click on save.
10.Click on Save/Reboot.
Key points
Note that while using wifi the modem should be configured in multiuser mode/ pppoe
/router mode.
The wifi should not be left open. It should be protected all time to prevent unauthorized
access.
Every wireless router or access point comes with a built-in configuration page, this will
look like an internal web page that is accessed from your web browser. Usually, the
password is either blank or says something along the lines of ?admin.? Changing both the
username as well as the password is an important step in keeping your wireless broadband
connection secure.
Most wireless broadband access points and routers make their SSID public. While this
makes it easy to connect to the network, it also announces to everyone that you are using a
wireless network. Disabling this broadcasting prevents others from easily knowing that
you are using a wireless network for your broadband connection.
Change the default IP number to something different so hackers cannot easily find the
configuration menu. The default IP number is something the manufacturer's put in to make
the system easy to use. All hackers are familiar with the default IP number, so changing it
will help secure your wireless system.
With the WEP (Wired Equivalent Privacy) or WPA (Wi-Fi Protected Access) box options
checked off, a user has to have a correct encryption key to connect to the wireless
network. WEP comes with different encryption levels, and the higher the level, the more
difficult it is to break the encryption code.
8.9 SUMMARY
Broadband modem is combination of hardware and software. The configuration of modem can
be done through web interface of modem. If we follow the steps of configuring the modem in
the order as discussed in the above paragraph, then hardly we will face any problem related to
configuration of modem.
………………………………………………………………………………….
…………………………………………………………………………….........
………………………………………………………………………………….
………………………………………………………………………………….
………………………………………………………………………………....
…………………………………………………………………………………
………………………………………………………………………………….
………………………………………………………………………………....
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
………………………………………………………………………………..
Q.4 explain creating dialer in bridge mode? Also mention the advantages of bridge mode?
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
……………………………………………………………………………….
BROADBAND TECHNICIAN
9.1 INTRODUCTION
9.2 OBJECTIVE
9.7 SUMMARY
9.9 WORKSHEET
9.1 INTRODUCTION
The use of light for transmitting information from one place to another place is a very old
technique. In 800 BC., the Greeks used fire and smoke signals for sending information like
victory in a war, alerting against enemy, call for help, etc. Mostly only one type of signal was
conveyed. During the second century B.C. optical signals were encoded using signaling lamps so
that any message could be sent. There was no development in optical communication till the end
of the 18th century. The speed of the optical communication link was limited due to the
requirement of line of sight transmission paths, the human eye as the receiver and unreliable
nature of transmission paths affected by atmospheric effects such as fog and rain.
In the late 19th and early 20th centuries, light was guided through bent glass rods to illuminate
body cavities. Alexander Graham Bell invented a 'Photophone' to transmit voice signals over an
optical beam. By 1964, a critical and theoretical specification was identified by Dr. Charles K.
Kao for long-range communication devices, the 10 or 20 dB of light loss per kilometer standard.
Dr. Kao also illustrated the need for a purer form of glass to help reduce light loss. By 1970
Corning Glass invented fiber-optic wire or "optical waveguide fibers" which was capable of
carrying 65,000 times more information than copper wire, through which information carried by a
pattern of light waves could be decoded at a destination even a thousand miles away. Corning
Glass developed fiber with loss of 17 dB/ km at 633 nm by doping titanium into the fiber core. By
June of 1972, multimode germanium-doped fiber had developed with a loss of 4 dB per kilometer
and much greater strength than titanium-doped fiber.
In April 1977, General Telephone and Electronics tested and deployed the world's first live
telephone traffic through a fiber-optic system running at 6 Mbps, in Long Beach, California. They
were soon followed by Bell in May 1977, with an optical telephone communication system
installed in the downtown Chicago area, covering a distance of 1.5 miles (2.4 kilometers). Each
optical-fiber pair carried the equivalent of 672 voice channels. Today more than 80 percent of the
world's long-distance voice and data traffic is carried over optical-fiber cables.
An optical fiber is a thin, flexible, transparent fiber that acts as a waveguide, or "light pipe", to
transmit light between the two ends of the fiber. Optical fibers are widely used in fiber-optic
communications, which permits transmission over longer distances and at higher bandwidths
(data rates) than other forms of communication. Fibers are used instead of metal wires because
signals travel along them with less loss and are also immune to electromagnetic interference.
With increase in population struggle for survival increased Its impacts on appearing in human life
in many ways. There have been shortage of utilizes resources. The resources consist of materials,
technology, money, human recourse, information, interconnectivity etc.
Due to consistent pressure there has been different ways of innovations in almost every
stream of life. In the field of telecommunication also development are happening in the fields of
client terminals access technique, aggregation technique, multiplexing technique, transport
technique. There has been different access technique and different type of client terminals as per
respective access technique. The basic contents were limitations of transmission media and low
order multiplexing and switching. The initial transmission started with attaching information
leaflet with visions. The same concept was utilized on building semaphore. That came the
evolution telegraphs lines after the invention of more score in which use of guided media has got
important. In this era use of open wire communications having overhead line with minimal
multiplexing was the latest things. However has the requirement of reliable telecommunication
has increased need was well to have proper voice communications and switching like manual,
electro mechanical, fully digital involving automatic increasing order of multiplexing were
implemented. In this era the main access network comprised of cable network made up of copper
and transmission network was predominately of over head lines. Later on, seeing the limitations
of over-head lines, like deterioration weather due to electro magnetite interference less carrying
capacity etc. were found. Use of optical fiber as a transmission media got thrust due to less cost,
improve technology in multiplexing, virtually infants capacity and immunity to electro-magnetic
interference. Requirement of bandwidth which was around 20Kbps have reached to around
1Gbps. The accesses network is also converging with the development of IP & MPLS
technologies of dada communication. Multiplexing is also migrating in TDM, FDM to packet
base statistical multiplexing. Client terminals are also converging having all capabilities of voice,
video, text, web and multimedia. The network is converging to one by using architecture of IMS
and Next Generation network. Applications which were accesses network depended are also
becoming universally accessible and a accesses network agnostic. The human interface is also
improve presentably because of manufacturing line terminal incorporating signals of sensory
organs like touch, vision, mind etc.. Today client terminals have improve GUI based web
interface having faster processing multimedia capacity and capability to communicate to multiple
secessions over multiple windows having full mobility as well as portability.
Due to competitions and rapid growth of innovation, the world are become faster and expectations
of prominent service delivery are also been increased. Delay in providing services has also been
reduced and overall connectivity in becoming P-P i.e. pair to pair.
9.2 OBJECTIVE
After reading this unit, you should be able to understand:
Fiber-Optic Applications
Basic optical fiber communication system:
The Structure of an Optical Fiber
Principle of Operation – Theory
Inexpensive light sources available. Repeater spacing increases along with operating
speeds because low loss fibres are used at high data rates.
Cladding
Core
(a) Cross section and (b) longitudinal cross section of a typical optical fiber
The light stays confined to the core because the cladding has a lower refractive index—a measure
of its ability to bend light. Refinements in optical fibers, along with the development of new lasers
and diodes, may one day allow commercial fiber-optic networks to carry trillions of bits of data
per second.
The light stays confined to the core because the cladding has a lower refractive index—a measure
of its ability to bend light. Refinements in optical fibers, along with the development of new lasers
and diodes, may one day allow commercial fiber-optic networks to carry trillions of bits of data
per second.
The diameters of the core and cladding are as follows.
8 125
50 125
62.5 125
100 140
Fibre sizes are usually expressed by first giving the core size followed by the cladding size. Thus
50/125 means a core diameter of 50m and a cladding diameter of 125m.
Core Cladding
Typical
Fig : 4Core and Cladding
Typical Core and Diameters
Cladding Diameter
9.7 SUMMARY
Fiber optic technology is a revolutionary technological departure from the traditional
copper wires twisted-pair cable or coaxial cable. The usage of optical fiber in the
telecommunications industry has grown a few decades ago. Today, many industries particularly
telecommunications industry chooses optical fiber over copper wire because of its ability to
transmit large amount of information at a time.
An optical fiber is a flexible filament of very clear glass capable of carrying information in
the formof light. Optical fibers are hair-thin structures created by forming pre-forms, which are
glass rodsdrawn into fine threads of glass protected by a plastic coating.
9.8 WORKSHEET
Qu.1 Fill in the blanks:
1. An optical fiber is a thin, flexible, transparent fiber that acts as a ………………..
2. Propagation of light through fiber is governed by the indices of the…….
3. The optical fiber has two concentric layers called the………...
4. The index of the cladding is approximately …….. % lower than that of the core.
5. Propagation of light is based on the principle of………………………………..
Qu.2 Mark True or False
1. Core and cladding have same refractive indices.
2. The transmitted signal through the fibers does not radiate.
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------------
Notes:
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
------
BROADBAND TECHNICIAN
UNINTERRUPTED POWER
SUPPLY & EARTHING
10.1 INTRODUCTION
10.2 OBJECTIVE
10.9 EARTHING
10.13 SUMMARY
10.1 INTRODUCTION
A UPS is a device that provides backup power when utility power fails, either long enough for
critical equipment to shut down gracefully so that no data is lost, or long enough to keep required
loads operational until a generator comes online. It also conditions incoming power so that all-
too-common sags and surges don’t damage sensitive electronic gear.
An uninterrupted power supply is an electrical apparatus that provides emergency power to a load
when the input power source or mains power fails. A UPS differs from an auxiliary or emergency
power system or standby generator in that it will provide near-instantaneous protection from input
power interruptions, by supplying energy stored in batteries, supercapacitors, or flywheels. The
on-battery runtime of most uninterruptible power sources is relatively short (only a few minutes)
but sufficient to start a standby power source or properly shut down the protected equipment.
In electricity supply systems, an earthing system or grounding system is circuitry which connects
parts of the electric circuit with the ground, thus defining the electric potential of the conductors
relative to the Earth's conductive surface. The choice of earthing system can affect
the safety and electromagnetic compatibility of the power supply. In particular, it affects the
magnitude and distribution of short circuit currents through the system, and the effects it creates
on equipment and people in the proximity of the circuit. If a fault within an electrical device
connects a live supply conductor to an exposed conductive surface, anyone touching it while
electrically connected to the earth will complete a circuit back to the earthed supply conductor and
receive an electric shock.
10.2 OBJECTIVE
After reading this unit, you should be able to understand:
UPS system & types
Need of UPS
Selection of UPS for the given situation
Earthing need & types
• The problems and risks are intensifying. Today’s storage systems, servers and network
devices use components so miniaturized that they falter and fail under power conditions earlier-
generation equipment easily withstood.
• Generators and surge suppressors aren’t enough. Generators can keep systems operational
during a utility outage, but they take time to startup and provide no protection from power spikes
and other electrical disturbances. Surge suppressors help with power spikes but not with issues
like power loss, under-voltage and brownout conditions.
• Availability is everything these days. Once, IT played a supporting role in the enterprise.
These days it’s absolutely central to how most companies compete and win. When IT systems are
down, core business processes quickly come to a standstill.
• Availability is everything, but power costs must be managed. The cost of power and cooling
has spiraled out of control in recent years. Data center managers are typically held responsible for
achieving high availability while simultaneously reducing power costs. Highly-efficient UPS
systems can help with this goal, and products are available today that were not an option even a
few years ago.
Multi-mode systems
Isolation: The UPS should have grounding and bonding provisions to reduce neutral-to-ground
noise to zero, thereby preventing common mode noise from reaching the protected equipment.
Line noise can cause possible malfunction to equipment.
Voltage regulation: Equipment voltage requirements must be maintained within the limits
prescribed by the manufacturer.
Continuous, no-break power: A true UPS continuously serves the load through the UPS support
battery, and the load never sees a power break when utility power is lost. Some units are standby
power systems, whereby the load is transferred to the UPS only when utility power is lost or
deviates from prescribed power quality parameters. A continuous no-break power unit must be
used if no power interruption, even of a momentary nature, can be tolerated by the load.
Output power waveform: Electronic equipment and computers are designed with the assumption
that input power is an ac sine wave. All UPSs transform dc battery power from a constant output,
straight line, to a variable output, sine wave, or a reasonable approximation of a thereof. With
some low cost units, a "reasonable approximation" may be an abrupt square wave. It is important
to adhere to the requirements prescribed by the manufacturer of the protected equipment.
Load rating basis. More than 90 % of computer equipment employs input switching-mode power
supplies. The UPS load rating should be based on a switching-mode power supply load, rather
than some unrelated load such as lighting or motors.
The first step in any UPS installation would be to first size up your requirements and identify the
devices that you intend to connect to the UPS. While trying to match the correct UPS model to
your devices is not that complicated, it can be overwhelming if you are not a hardware type of
person.Some manufacturers like APC will gladly field such enquiries and give you exact
recommendations if your devices are fairly mainstream brands, and you are able to furnish them
with the model number of your devices.
UPS installation can be grouped into three "sizes" — small, medium, and large.
Small: Low-capacity UPS that is normally used to power a couple of desktops or a single
server. These can be easily purchased off-the-shelf.
Medium: Any UPS that is designed to serve more than a single server, yet still plug-and-
play. These have to be purchased from IT equipment vendors.
Large: Any UPS that cannot be directly powered off of an unmodified wall socket is
classified as "large." Also, unless you have prior experience with electrical matters, you
should get the engineer from your UPS manufacturer to come in, or else engage the services
of a qualified electrician. These UPSs tend to be available only from the manufacturers
themselves, or from select vendors.
Most server rooms will probably consist of a number of medium-size UPSs. They might run
independently, or are cascaded with battery packs to prolong runtime. I am generalizing here, but
two or three of these is usually sufficient to support a rack of equipment.
Unless you have a very good reason not to, you should always install your UPS at the bottom-
most section of your server racks. The primary reason is that UPS are heavy beasts, and it makes
sense to place them as low as you can.
Some UPSs come with adjustable rails, allowing you to easily slide the UPS in and out of your
server rack. Should you use them? Well, feel free to go ahead if your vendor offers free
installation. Otherwise, my advice is — don't bother, assuming that you can replace the UPS
battery even when it is mounted directly into the server rack.
I have not experienced any particular benefits from having the rails. It could mean a lot of time
wasted trying to get them adjusted correctly. This is especially true if you are doing it yourself,
have not done it before, or are just not confident. In these scenarios, just install it in place without
the adjustable rails.
3. Prepare for installation
A very important point to bear in mind is that you should never attempt to install a UPS by
yourself, unless you are handling a simple, small UPS. The weight of most UPSs is substantial.
Even if you can carry your eight-year-old on your shoulder just fine, you must remember that the
weight of a UPS is condensed into a relatively small package with an extremely poor weight
distribution — the dense battery is normally located in one end, and it has hard metal edges on
most sides to boot.
In addition, keep in mind that you are dealing with electrical equipment, and there is always the
chance of an accident. While you might like the peace and quiet of installing it over a weekend or
late at night, to be safe, make sure there is someone else around.
Periodic maintenance is required to maintain the integrity and lifetime of the battery. Power
electronic equipment also requires scheduled maintenance even though solid-state devices are
used. Preventive maintenance may require that the UPS system be shut down. A transfer of the
critical load which may not provide the power enhancement capabilities of an UPS system is
something that the user must tolerate in order to obtain maximum reliability and minimize
downtime and repair costs.
Equipment record
This record should list the basic information on the equipment itself, e.g., manufacturer’s
identification, style, serial, size, location, etc., and incorporate inventory-control data for spare
parts. Warranty requirements covering uninterruptible operating conditions should be abstracted
from the user’s manual.
This record should provide a history of repair and associated costs of maintenance for the UPS
system. It is an essential diagnostic record for avoiding future difficulties, especially for systems
determined to be of poor quality, misapplied, or marginal for the application.
Inspection check list
This list should provide necessary and pertinent information on points to be checked and establish
the recommended recurring dates when these checks should be made. Since shutdown may
require a sliding window period, the amount of time for which this request must precede the
shutdown window should also be stated.
Periodic maintenance schedule
This schedule provides a complete listing of the day-to-day, weekly, monthly, and annual duties
which should be reviewed on the same periodic time basis so that potential trouble situations can
be investigated and corrected as soon as possible.
Maintenance inspection and repair records
These necessary and vital documents should be completed in detail by the inspector or an
assigned individual in the maintenance department. Maintenance personnel usually report their
findings and corrective action on assignment sheets or job cards. Permanent records are a useful
guide to each UPS system’s general condition and reliability. It is important to know the
frequency and type of repair and how often there is a need for a complete overhaul.
Use of records
These records provide for a workable preventive maintenance program. The information obtained
from the necessary periodic inspections can be quickly lost. This is particularly true when test
results are required. Unless records and data on the test and performance of equipment are
retained, the maintenance program will be defeated. Unless records are updated at each
succeeding test period, valuable information is lost. Comparative test data materially assists an
UPS specialist in defining problems, especially when test results differ from manufacturers’
recommended settings or actual factory test data. Significant changes in comparative test data can,
in general, be related to the equipment’s condition.
Scheduling
The continued monitoring of the operating status of any electronic equipment greatly enhances the
probability that failure of that equipment will be prevented. Daily observation is advised but do
not provide less than weekly checks. Personnel involved in status monitoring should be those
most concerned with the equipment’s proper functioning.
UPS Maintenance Checklist
Regular equipment testing should be part of a facility’s UPS maintenance schedule. Such a
schedule might include the following elements:
Quarterly:
Visually inspect equipment for loose connections, burned insulation or any other signs of wear.
Semiannually:
Conduct thermal scans on electrical connections to ensure all are tight and not generating heat,
which is the first and sometimes only indication of a problem. A non-evasive diagnostic tool helps
technicians identify hot spots invisible to the human eye. Technicians should retorque if thermal
scan provides evidence of a loose connection. Provide a complete operational test of the system,
including a monitored battery-rundown test to determine if any battery strings or cells are near the
end of their useful lives.
Biannually:
Test UPS transfer switches, circuit breakers and maintenance bypasses. If a generator is part of
the building’s emergency-power system and feeds the UPS, it also will need to be tested monthly
or quarterly. Most facilities have a generator-maintenance schedule in place in which testing
frequency is defined. A UPS typically is sized to carry the load for a short period of time. Longer
outages require backup-power generation to maintain critical services. Each facility is unique, and
managers need to develop a maintenance schedule to suit each site’s specific needs.
(5) Mains voltages may still be present within traffic equipment even whenthe site mains supply
has been isolated or switched off. The UPSSolution must be completely off to ensure no mains
power is supplied toconnected traffic equipment.
(6) Only trained / competent persons should work on this equipment.
(7) Surfaces within the associated traffic equipment get hot, e.g. lamp, lensand reflector.
Therefore care should be taken when working in suchareas.
(8) Any power tools must be regularly inspected and tested.
(9) Any ladders used must be inspected before use to ensure they aresound and not damaged.
(10) When using a ladder, before climbing it, ensure that it is erected properlyand is not liable to
collapse or movement. If using a ladder near acarriageway, ensure that the work area is properly
signed and coned.
(11) Any personnel working on site must wear the appropriate protectiveclothing with high
visibility jackets and safety boots as a minimum.
10.9 EARTHING
Earthing is an essential part of any electric /electronic system. Utmost care is required to be taken
for provision of proper and effective earthing for various telecom installations. This chapter
discusses about various types of earthing which are used in telecom installations.
The objective of Earthing system may be summarized as follows:-
Reduction of Crosstalk and Noise is achieved through proper Earthing System in the
Telecom Network.
Earthing is used to afford convenience & reliability, in the operative path of the circuits
involved in the switching apparatus of telecom circuits.
Used as return path in telegraph and voice circuits.
Earthing is used for protection of costly apparatus and persons against foreign voltages and
leakage currents.
Earthing is used for protection of buildings and equipment from lightning strikes.
Earthing in power supply systems is used to affect reliability of power as it helps to provide
stability of voltage regulations, preventing excess fluctuations and provides a measure for
protection against lightening.
To divert stray RF energy from sensitive audio, video control and computer equipment.
Earthing or grounding means to connect the equipment or electrical system to the general mass of
the earth. There are two types of earthing.
System earthing.
Equipment earthing.
It constitutes the connecting of non-current carrying metal parts of a equipment to the earth. It
provides protection to operating personnel and equipment by ensuring operation of protective
control gear.
Advantages of Neutral Earthing:-
Connecting the neutral of an electrical system to earth has following advantages.
Arcing grounds are eliminated.
Voltage of healthy phases with respect to earth does not rise √3 times to normal value.
Insulation is prevented from stress of high surge voltage and hence provides long life to
insulation & equipment.
The measurement of earth resistance is done using Earth Resistance Tester. The procedure for
measuring the earth resistance is as follows:
Drive two spikes into ground in a straight line at an equal distance of 15 meters in-
between spikes.
Connect the spikes to the terminals.- the first to C2, the second to P2 and loop the terminal
P1 and C1 and connect the same to earth strip point, whose resistance is to be measured.
Rotate the handle of the generator slowly and watch the deflection of the detector.
Rotate the handle of the generator at about 160 to 180 R.P.M. and the tester will display
the value of earth resistance in ohms. The value should be less than or equal to 0.5 ohms.
10.11 SUMMARY
A UPS is typically used to protect hardware such as computers, data
centers, telecommunication equipment or other electrical equipment where an unexpected power
disruption could cause injuries, fatalities, serious business disruption or data loss. UPS units range
in size from units designed to protect a single computer without a video monitor (around 200volt-
ampere rating) to large units powering entire data centers or buildings. In electrical power
distribution systems, a protective ground conductor is an essential part of the safety Earthing
system. Electrical circuits may be connected to ground (earth) for several reasons.
In mains powered equipment, exposed metal parts are connected to ground to prevent user contact
with dangerous voltage when electrical insulation fails. Connection to ground also limits the
build-up of static electricity when handling flammable products or electrostatic-sensitive devices.
In some telegraph and power transmission circuits, the earth itself can be used as one conductor of
the circuit, saving the cost of installing a separate return conductor.
3. The resistance of Earth Electrode shall not be more than (10 Ohms/5 Ohms)
4. ________type of earthing is mainly used for tower earthing(Mesh/Plate/Ring)
5. The output of the UPS System is___
6. When output voltage becomes high UPS will be tripped and ______ alarm comes.
7. The Input given to the UPS System is ________ ( 220V/230V/440v).
8. The objective of Earthing system is Reduction of _____________ & _____________.
(Crosstalk/Noise/Protection)
9. Basic requirement of a UPS is to provide protection from _____________ & _________
(Lightning/Surge/Power/Current).
10.14 WORKSHEET
Q.1 Answer the following questions by referring to the UPS available in the lab:
a. What are the lamp indications available in the front panel of UPS?
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------
b. What are the points that should be checked while inspection of earthing.?
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------
Notes:
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------
BROADBAND TECHNICIAN
11.1 INTRODUCTION
11.2 OBJECTIVES
11.3 MULTIMETER
11.5 MEGGER
11.10 SUMMARY
11.13 WORKSHEET
11.1 INTRODUCTION
Any sytem cannot be made perfect till its components are interconnected to match
perfection in all respect so that any incompatibility or loopholes between them can be removed.
For e.g. DSL modem cannot be given power supply using any power adapter connecting it to AC
supply. It is because DSL or broadband modem have their own specification with respect to
power requirement. The modem input voltage and current should match with output voltage and
current of its power adapter otherwise either modem will not work properly or its circuit may get
damaged permanently.
Similarly, preparation of ethernet cable is one aspect while whether that cable is working
perfectly in LAN is another aspect because if the cable is not prepared using proper colour codes
as defined for the cable, there is no chances that the cable provides you LAN services. Therefore,
once cable is prepared, it is better to check it with a tool, so that we can identify whether the cable
is prepared properly or not. In the same fashion, sometimes we need to check or measure output
voltage or current of a power source just to ensure that our equipment with a specific power
requirement can work perfectly with that source.
Here, we shall deal with all such measurement tools and their usage and will study how
they are helpful to us in setting up broadband connection and trouble shooting any problem
.
11.2 OBJECTIVES
The objective of this session is to understand the functions and usage of different
measurement tools like :-
Multimeter
Meager
Crimping tool
Punching tool
DSL tester
LAN cable fault locator
11.3 MULTIMETER
A multimeter is a handy tool that you use to measure electricity, just like you would use a
ruler to measure distance, a stopwatch to measure time, or a scale to measure weight. The neat
thing about a multimeter is that unlike a ruler, watch, or scale, it can measure different things —
kind of like a multi-tool. Most multimeters have a knob on the front that lets you select what you
want to measure. Below is a picture of a typical multimeter. There are many different multimeter
models
Almost all multimeters can measure voltage, current, and resistance.Some multimeters have
a continuity check, resulting in a loud beep if two things are electrically connected. This is
helpful if, for instance, you are building a circuit and connecting wires or soldering; the beep
indicates everything is connected and nothing has come loose. You can also use it to make sure
two things arenot connected, to help prevent short circuits.
Some multimeters also have a diode check function. A diode is like a one-way valve that only
lets electricity flow in one direction. The exact function of the diode check can vary from
multimeter to multimeter. If you're working with a diode and can't tell which way it goes in the
circuit, or if you're not sure the diode is working properly, the check feature can be quite handy. If
your multimeter has a diode check function, read the manual to find out exactly how it works.
Advanced multimeters might have other functions, such as the ability to measure and identify
other electrical components, like transistors or capacitors.
Remember that voltage, current, and resistance are measurable quantities that are each measured
in a unit that has a symbol, just like distance is a quantity that can be measured in meters, and the
symbol for meters is m.
Voltage is how hard electricity is being "pushed" through a circuit. A higher voltage means
the electricity is being pushed harder. Voltage is measured involts. The symbol for volts is V.
Current is how much electricity is flowing through the circuit. A higher current means more
electricity is flowing. Current is measured in amperes. The symbol for amperes is A.
Resistance is how difficult it is for electricity to flow through something. A higher resistance
means it is more difficult for electricity to flow. Resistance is measured in ohms. The symbol
for ohms is Ω (the capital Greek letter omega).
A simple analogy to better understand voltage, current, and resistance: imagine water flowing
through a pipe. The amount of water flowing through the pipe is like current. More water flow
means more current. The amount of pressure making the water flow is like voltage; a higher
pressure will "push" the water harder, increasing the flow. Resistance is like an obstruction in the
pipe. For instance, a pipe that is clogged with debris or objects will be harder for water to flow
through, and will have a higher resistance than a pipe that is free of obstruction.
11.5 MEGGER
Megger is the device used to measure earth resistance. Earth/soil resistance value plays a very
critical role in providing proper earthing to the electrical equipments/instruments to make them
shock free.
Nothing is quite so common or abundantly available throughout the world as the earth’s soil. We
are more apt to think of earth as something to be tilled for planting or to be excavated for a
building foundation. Yet, it also has an electrical property -- conductivity (or low resistance) --
that is put to practical use every day in industrial plants and utilities. Broadly speaking, “earth
resistance” is the resistance of soil to the passage of electric current. Actually, the earth is a
relatively poor conductor of electricity compared to normal conductors like copper wire. But, if
the area of a path for current is large enough, resistance can be quite low and the earth can be a
good conductor. It is the earth’s abundance and availability that make it an indispensable
component of a properly functioning electrical system.
Earth resistance is measured in two ways for two important fields of use:
1. Determining effectiveness of “ground” grids and connections that are used with electrical
systems to protect personnel and equipment.
2. Prospecting for good (low resistance) “ground” locations, or obtaining measured resistance
values that can give specific information about what lies some distance below the earth’s surface
(such as depth to bed rock).
Consider three factors that can change the earth electrode requirements from year to year:
■ A plant or other electrical facility can expand in size. Also, new plants continue to be built
larger and larger. Such changes create different needs in the earth electrode. What was
formerly a suitably low earth resistance can become an obsolete “standard.”
The crimping tool has three major parts : cable stripper, cable cutter & crimping slot. Cable
stripper is used to remove insulation from the cable. Cable cutter can be used for cutting a
particular portion of the cable. It is very helpful in cases when a connector crimped to the cable
has stopped functioning and needs to be replaced. In such cases, the portion of the cable having
the connector crimped can be cut down with the help of cutter. The crimping slot can be used to
place the cable along with the connector so that whenever the tool is pressed, the connector gets
crimped to the cable.
Most punch down tools are of the impact type, consisting of a handle, an internal spring
mechanism, and a removable slotted blade. To use the punch down tool, a wire is pre-positioned
into a slotted post on a punch block, and then the punch down tool is pressed down on top of the
wire, over the post. Once the required pressure is reached, an internal spring is triggered, and the
blade pushes the wire into the slot, simultaneously cutting the insulation and securing the
wire. The tool blade does not cut through the wire insulation to make contact, but rather the sharp
edges of the slot in the contact post itself slice through the insulation.
However, the punch down tool blade also is usually used to cut off excess wire, in the same
operation as making the connection; this is done with a sharp edge of the punch down tool blade
trapping the wire to be cut against the plastic punch block. If this cutoff feature is heavily used,
the tool blade must be resharpened or replaced from time to time. Tool blades without the sharp
edge are also available; these are used for continuing a wire through a slotted post to make
connections with another slotted post ("daisy-chained" wiring).
Thus a punch down tool or krone tool can be used to connect the telephone line or DSL line of
user to one of the slot of the tag block available in its DP (Distribution point). This type of
connectivity creates the flexibility of changing a particular section of telephone line in case of
break or failure, rather than replacing the complete line. Thus punch tool plays an important role
in maintenance of telephone or DSL line.
DSL technologies are robust and highly suited for use over existing poor-quality copper. However,
degradation of the local loop can lead to physical layer problems which cannot be found using
conventional service test measurements. A typical xDSL service from customer modem to ISP
consists of several different layered technologies. DSL tester quickly and correctly locates and
identifies fault conditions on the DSL, ATM, AAL5, PPP, IP and Application layers. DSL tester
allows effective fault finding at the physical layer on the local loop.
A cable tester is used to verify that all of the intended connections exist and that there are no
unintended connections in the cable being tested. When an intended connection is missing it is
said to be "open". When an unintended connection exists it is said to be a "short" (ashort circuit).
If a connection "goes to the wrong place" it is said to be "miswired" (the connection has two
faults: it is open to the correct contact and shorted to an incorrect contact). The cable tester can be
used as continuity tester to identify whether ethernet cable is properly crimped or not.
A continuity tester is an item of electrical test equipment used to determine if an electrical path
can be established between two points; that is if an electrical circuit can be made. The circuit
under test is completely de-energized prior to connecting the apparatus.
The tester consists of an indicator in series with a source of electrical power - normally a battery,
terminating in two test leads. If a complete circuit is established between the test-leads, the
indicator is activated.
The indicator may be an electric light or a buzzer. This led to the term "buzzing out a circuit"
(which means to test for continuity). Audible continuity buzzers or beepers are built into some
models of multimeter.
11.10 SUMMARY
Different measuring tools are required by technicians to prevent any incompatibility that may
develop in a system due to different parameters or factors like voltage, current, distance, speed
etc. Some tools are totally mechanic like crimping tool and crone tools. Crimping tool can be used
to prepare ethernet cable or RJ-11 cable. Crone tools are used to fix telephone line or DSL line to
a particular slot of permanent structure (which may contain number of slots.). While most of
measuring tools are electrical tools like multimeter, meager, DSL tester and LAN/ethernet cable
tester.
11.13 WORKSHEET
11.13.1 Title:Measurement of voltage and current using multimeter and testing DSL line using
DSL tester
11.13.3Exercise:
Measuring voltage using multimeter
Let us measure voltage on a AA battery:
Plug the black probe into COM and the red probe into mAVΩ. Set the multimeter to “2V”
in the DC (direct current) range. Almost all portable electronics use direct current),
not alternating current.
Connect the black probe to the battery’s ground or ‘-’ and the red probe to power or ‘+’.
Squeeze the probes with a little pressure against the positive and negative terminals of the
AA battery. If you’ve got a fresh battery, you should see around 1.5V on the display (this
battery is brand new, so its voltage is slightly higher than 1.5V).
If you’re measuring DC voltage (such as a battery) you want to set the knob where the V
has a straight line. AC voltage (like what comes out of the wall) can be dangerous, so we
rarely need to use the AC voltage setting (the V with a wavy line next to it). If you’re
messing with AC, we recommend you get a non-contact tester rather than use a digital
multimeter.
a) Examine all the 6 LEDs being tested by tester during booting, that may help you identify
any LED which is not working.
c) Once the tester is booted, you will find SYNC LED is blinking.
d) This LED will blink till the tester gets connected to a DSL line.
e) Connect the DSL line you want to test to the interface connector labeled “ADSL modem”
at the bottom of tester.
g) If SYNC LED is stable it means the line is DSL line otherwise it is not.
h) Select the auto test option available on the main screen display of tester using the enter
key available on the keypad.
i) Now select the DSL layer option by pressing the enter key. If it is already selected, no
need to press the enter key.
k) As soon as the test is started, the tester tries to resynchronize with the line and you may
find SYNC LED starts blinking.
l) At the same time, on the top right corner of screen display, you may find label “Seeking”
and after some time “training” label will appear. This indicates that the
tester is finding and learning the parameters of the line.
m) The test gets completed hardly within 30 seconds. The completion of test is identified by
label on the screen as “auto test finished”. Also the tester gives three or more beeps to
convey the completion of test.
o) The result will contain different parameters like Sno, DSL technology, upstream data rate,
downstream data rate, Power in upstream and downstream, Noise Margin in upstream and
downstream, ATU-R(ADSL Terminal Unit- Remote) pass or fail.
p) This result is identified by the sno which is randomly given by tester and it is hard to
be remembered.
q) To save the session with other name, come back to home screen of tester.
v) Press F1 to name the test and enter the name by using the keypad. Usually the name
should be the telephone number where the tested line was being used.
11.13.4 Notes:
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
…………………………………..………………………………………………..
BROADBAND TECHNICIAN
TROUBLESHOOTING LAN
12.1 OVERVIEW
12.3 SUMMARY
12.1 OVERVIEW
When you’re troubleshooting a network environment, a systematic approach works best. Define
the specific symptoms, identify all potential problems that could be causing the symptoms, and
thensystematically eliminate each potential problem (from most likely to least likely) until the
symptomsdisappear.
Figure 1-1 illustrates the process flow for the general problem-solving model. This process flow
isnot a rigid outline for troubleshooting an internetwork; it is a foundation from which you can
builda problem-solving process to suit your particular environment.
The following steps detail the problem-solving process outlined in Figure 1-1:
Step 1 When analyzing a network problem, make a clear problem statement. You should
definethe problem in terms of a set of symptoms and potential causes.
To properly analyze the problem, identify the general symptoms and then ascertain whatkinds of
problems (causes) could result in these symptoms. For example, hosts might notbe responding to
service requests from clients (a symptom). Possible causes mightinclude a misconfigured host,
bad interface cards, or missing router configurationcommands.
Step 2 Gather the facts you need to help isolate possible causes.Ask questions of affected users,
network administrators, managers, and other key people.Collect information from sources such as
network management systems, protocolanalyzer traces, output from router diagnostic commands,
or software release notes.
Step 3 Consider possible problems based on the facts you gathered. Using the facts yougathered,
you can eliminate some of the potential problems from your list. Depending on the data, you
might, for example, be able to eliminate hardware as aproblem, so that you can focus on software
problems. At every opportunity, try to narrowthe number of potential problems so that you can
create an efficient plan of action.
Step 4 Create an action plan based on the remaining potential problems. Begin with the most
likely problem and devise a plan in which only one variable is manipulated. Changing only one
variable at a time allows you to reproduce a given solution to a specific problem. If you alter more
than one variable simultaneously, you might solve the problem, but identifying the specific
change that eliminated the symptom becomes farmore difficult and will not help you solve the
same problem if it occurs in the future.
Step 5 Implement the action plan, performing each step carefully while testing to see whetherthe
symptom disappears.
Step 6 Whenever you change a variable, be sure to gather results. Generally, you should use
thesame method of gathering facts that you used in Step 2 (that is, working with the keypeople
affected in conjunction with utilizing your diagnostic tools).
Step 7 Analyze the results to determine whether the problem has been resolved. If it has, thenthe
process is complete.
Step 8 If the problem has not been resolved, you must create an action plan based on the nextmost
likely problem in your list. Return to Step 4, change one variable at a time, andreiterate the
process until the problem is solved.
The ping tool, one of the simplest network troubleshooting tools available, is present in most
common operating systems. It provides the ability to monitor attempts to transfer and return a
network packet from one point in the network to another, thus proving that basic communication
is possible.
A command line tool which allows the user to trace the route taken by a packet from the source
host to the target host. The IP address and hostname of each host are listed, along with the return
time in milliseconds, allowing the user to find the source of delays in their network infrastructure,
good sources for download mirrors and deciding which DNS server to use. A similar tool is
available for Linux and MacOS and is known as traceroute.
A Windows tool which displays IP configuration information via the command line. A robust
version of the network configuration options available via the Control Panel, ipconfig also allows
for forced DHCP lease renewal via the /release and /renew switches. Some of the information
display features of ipconfig are available on MacOS and Linux distrubutions using a tool called
ifconfig.
iperf
Iperf is an open source, cross-platform tool which measures network throughput from one host to
another, allowing the user to confirm that their network is transferring at the expected rate.
Angry IP Scanner
Angry IP Scanner is an open source application used for traversing a subnet and providing
information on each of its active hosts. Helpful for finding unwanted devices on your network,
confirming that your DHCP is performing as expected and finding the IP for a lost device. For
more advanced purposes, nmap is available for most major operating systems.
Surprisingly enough, the troubleshooting tool provided with Windows 7 does an impressive job of
automatically resolving common networking problems. It achieves this by performing tasks such
as refreshing its lease with the DHCP server, resetting the network adaptor and confirming
connection to its listed default gateway.
All network troubleshooting is predicated on the assumption that your basic network connectivity
is working as expected. The following are some simple checks that you can perform to confirm
the presence of staple network connectivity.
On a cabled network, the simplest way to confirm a physical connection is to check that the link
lights on the devices at each end of each cable are lit. If a light isn’t lit, check the plugs at each
end to ensure that they’re securely pressed into the network sockets. Link lights are usually found
on the network socket, or on the front of devices such as switches or LAN-capable routers.
By default, your router will act as a DHCP (Dynamic Host Configuration Protocol) server. The
advantage of using a DHCP server is that it will automatically manage the distribution of IP
addresses to every device connected to your network. In Windows, check that your IP address is
correctly configured by bringing up a command prompt (Windows Key+R, cmd, Enter) and
typing ipconfig. Your router most likely defaults to providing addresses in either the
192.168.xxx.xxx, or 10.0.x.x ranges. If the IP address for your primary network adaptor is listed
as something other than these ranges use ipconfig /release, then ipconfig /renew to renew your IP
lease with the DHCP server.
Using your Ping tool, attempt to confirm your connection to an internal host. Your router is a
good option because if you can ping it, there is nothing between it and you that should be causing
Internet connectivity issues. To do so, bring up a command prompt and enter ping [the IP address
of your router]. By default, your router will most likely be found at 192.168.0.1, or 10.0.0.1.
Having successfully pinged an internal host, attempt to ping a host external to your network using
the command "ping google.com".
Having proven that a physical and logical connection exists for your network, it’s time to check
the higher functioning services such as file sharing and media streaming. Attempt to copy a file
from your current machine to another on the network. Use a small, but reasonably sized file for
this to ensure that transfer rates are performing as expected. Next, attempt to stream media in
much the same way. This time, use a large file like HD video to confirm that the network is able
to maintain the transfer at a steady rate. Using iperf to confirm your network transfer rates is also
suggested.
The most common and arguably the most frustrating problem that faces users of any network is
loss of access to the Internet. Right in the middle of an important IM conversation, gaming
session or video stream, access can evaporate without warning or reason. There are a plethora of
potential causes for this sort of outage, so the best approach is a systematic one. Check your local
machine’s network connectivity. Is the operating system reporting that your machine is still
connected to your local network? Check your physical cable or wireless connection to confirm
whether or not local network access has been affected.
If you are still connected to your local network, the next step is to confirm connectivity to your
router. Do this by attempting to navigate to its administration panel using a web browser. Simply
type the IP address of the router into your address bar. Note that some brands of routers require
the user to specify the network port for access to the admin panel. Do this by appending the
necessary port number to the IP address in your address bar using a colon. Most routers that
require a defined port will default to :8080.
Now that you’ve logged into your router’s admin panel, it is possible to determine whether
external hosts are accessible from that point. Most good routers will have a ping tool built into the
admin panel, often included in a diagnostics tab. If your router can successfully ping external
hosts, while you cannot from your local machine the you can confirm that the problem exists
within your network and can subsequently be fixed. As opposed to problems which exist outside
of your network, and thus are out of your control.
If you’re unable to access external sources at all, it’s time for one last ditch effort--reboot your
router. Even good quality routers can require a reboot from time to time, cheaper products, or
those provided for free from some ISPs can require rebooting on a much more regular basis. This
can solve a surprising number of problems from external connectivity problems, to spotty wireless
performance.
Having failed all of these tests, it’s time to get your Internet Service Provider involved. Firstly
you should check to see if they have any current advisories which are affecting your area and
might be causing the problem. These are often listen on ISP websites, so use a 3G device or call a
friend to get the info. Most ISPs will provide a time frame for these advisories which should give
you a rough idea when it will be likely for your service to resume. If no advisories exist, call
through to your ISP’s tech support and ask them for help. They’ll probably try to take you through
a number of the steps listed above, but that’s ok. At least you’ll know what they’re asking you
now!
Keep at least one spare network cable around for testing or as a replacement.
Either repair or replace network cables with broken plug clips to reduce accidental
disconnections.
Have a backup plan for infrastructure failure.
Don’t rely on a wireless connection for critical services.
Ping: It stands for Packet InterNet Gopher. (Gopher = Status). For more help on PING open a
command windows in your computer and type in PING/? and check the options.
Tracert: It is a command used to display the number of routers on the path to the destination
host. You can get more on the Tracert command by typing tracert/? in a command window in
your computer.
IPConfig: It shows you the IP address configuration of your computer on a network. (It
also shows you your computer’s IP address on a network.
12.3 SUMMARY
In this chapter we have studied various proactive local area network problem
troubleshooting techniques.
Q.1What are the steps taken to Diagnose and Repair Basic Network Connection Problems ?
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
Q.3 What are the key points of general problem solving model?
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
BROADBAND TECHNICIAN
TROUBLESHOOTING BROADBAND
If DSL LED does not glow, then do following actions in this order:-
1. Check whether the DSL line is terminated properly at splitter side. If it is terminated
on port labeled as “phone” or “Line” then this could be the problem because DSL line
should be terminated on port labeled as “Modem” on splitter.
2. Modem may be faulty. Connect another modem with the same line and see the status
again for DSL LED. If the status remains same, then problem is with the line.
3. Check whether the line is physically ok at customer side. You can also check the line
physically by dialing number through telephone of customer. If any available number
can be dialed, it means line is physically ok.
4. The telephone line may not properly terminated on DSLAM side. In that case, ask the
SDE of DSLAM to check the DSL line at his end.
Note:- In order to save your time and of that customer as well, the reasons should be identified
starting from step 1 and then using next step, if the previous step reason does not exit.
2. If the internet LED does not glow?
If the internet LED does not glow/blink, then there perform following actions in
correct order :-
1. Check that Ethernet cable is properly terminated on Ethernet card. In most of
the cases, the cable is loose and needs to be tightened. Ensure the cable is
tight.
2. Check the LED status of Ethernet card. If there is a stable link on Ethernet
card, that means Ethernet cable is physically ok.
3. Check another LED of Ethernet card which shows activity on network. (Also
known as ‘ACT’ Link). If it is glowing/blinking, it means traffic is being
detected by card.
4. Replace modem by another modem and find the statud. If internet LED is
glowing/blinking, it means that modem was faulty. If still the LED is not
glowing, then check whether driver of network card is working properly.
5. If driver is not working properly, reinstall the driver.
6. After reinstallation of driver, you should get the correct status of Internet
LED. If it is not glowing , then check whether modem has received IP
address or not from broadband network.
7. If IP address not receieved then contact nearest NIB node.
3. If power LED of modem does not glow
If power LED does not glow then follow following steps in order given below:-
1. Ensure the power switch of modem is on.
2. Ensure the power adapter is tightly connected to modem.
3. Ensure the power rating of adapter matches with the rating of modem. If not, replace
adapter by correct power rating adapter.
4. Modem may be faulty. Replace it by some other working modem.
Problem Error-678
If problem is not solved then Reset Modem [Back pin (in the
hole) to be pressed in switched ON condition]
[Note : Link PC in black type Modem or WAN / LAN in white
type Modem will go Off and then ON and system may be stable.
Then retry.
Problem Error-691
Problem Error-769
Remedy The LAN Card has to be enabled by following the steps given
below.
i)Go to Desktop.
ii)Click "My Network Place".
iii)Select Properties.
iv)Click "Enable the local network".
Problem Error-718
Remedy Theuserhastosetitrightbyre-
installingtheO/SorInternetBrowser(I.E. etc).
To Log in to selfcare.wdc.bsnl.co.in.
change
Enter the username and password of the user to login into
password
portal.
(This username and password is entirely different from
username and password of ADSL line).
Click on + sign in front of option My profile available in
the left panel. Then click on Change Password.
Give your details i.e UserId, Current Password, New
Password and Confirm new password.
13.4 TROUBLESHOOTINGBROADBANDMODEM
Failure Instructions
s
Power Ensurepower adapter iswellconnected;
light is
Ensurethe right power adapteris used.
out.
LANL
Ensure you use the right cables from the Modem to your PC;
INK Ensure the connection is secured;
light Check if the NIC LED lights up;
is out.
Ensure your Network Adapter works normally by examining
whether the item of “Networking Adapters” is labeled with “? or
“!”. If it is, you may delete it and then click “Refresh” to reinstall.
Otherwise, you may try the NIC in another slot. As a last resort, you
have to replace the NIC.
CheckthatLANcableisproperlyconnectedtoPCandLANlinkLEDisglowing instable
condition.IfLANLED isnotstable then checkthatLANcable is connectedproperly
orreplacethecableandcheck.IncasetheLANcableis connectedtoLAN switchor
HUB,youhave to use a crosscable.IftheLANLED
isstillnotglowing,thenveifythatLANcardisproperly installedwithsuitable driverorget
thehelp ofyour computer serviceperson fordoingso.
TheTCP/IPsettingareconfiguredasdesiredwithcorrectgatewayaddress
andDNSserverIPaddresses.Toverify opentheDOSwindowandtypeping
192.168.1.1 it should give output „Reply from 192.168.1.1: bytes=32 time<1ms
TTL=64‟.
EnsurethatnoproxysettingisconfiguredinBrowser.InInternetexplorer you can
verifyas following–
Open theInternet explorer and Click on Tools and selectInternet Options.
ClickonConnectionstabandselectLANSettings.Seeifanyproxysetting
areconfigured. Uncheckthe proxysettings boxand click OK.
Ifstillitisnotworking,thenlogintoCPEconfigurationpage(http://192.168
.1.1) throughInternet Explorer.
ObservetheinformationdisplayedonSummarypage.NotewhethertheADSL linkspeedfor
upstream/downstreamisdisplayed.ADSLstateshouldbe„Show Time’.The SNRvalue
shouldbe 10or more.TheCRC value shouldbe zero ora low figure and itshould not be
increasing.
ScrolldownthepageandseetheWANChannelinformation.AgainstPVC0,it shoulddisplay
IPaddress(59.92.xx.xx)andGatewayaddress,Encapsulation should be PPPoEand
Statusshould inGREEN colour. If thisinformation isnot appearing, then check for
correctness of PPPoE configuration inHome->Wan Settingspage. Check whetheryou
haveenteredcorrect usernameand password and Default Gatewayisenabled.
Do's
5. Your computer must be loaded and enabled with Java (J2RE) and also be loaded with
licensed version of operating system for opening the usage details as well as change
password page.
6. You can download free version of Java (J2RE) from www.java.com or any other available
location.
7. Please note that the Surfing, Listening Live Music, Chatting, Online Gaming, Internet
Telephony, E-mail, Anti-virus and any other software updates through Internet etc. are
part of download/upload.
8. Please keep disable automatic updates of your computer software (e.g. Windows update,
Anti-virus update, different Driver update) to avoid unanticipated high usage.
9. Please update your computer software manually.
10. Please clean your computer virus regularly.
11. Please log off from broadband connection and switch off modem when not in use.
Dont’s
1. Please do not disclose your DataOne User Id and Password to any body
2. Please do not disclose your User Id and Password to computer vendors coming to your
office/home for repair.
13.6 SUMMARY
Broadband troubleshooting is very crucial aspect these days. Internet has become part and parcel
of customers life routine. And so the need of broadband troubleshooting is very
important.similarly speed is also an important parameter of concern.we have seen that how our
system parameters can also be a cause of slow broadband speed.
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
……………………………………………………………………………………..
Q.2 Write few common errors in broadband?
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
……………………………………………………………………………………..
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
……………………………………………………………………………………..
………………………………………………………………………………………
……………………………………………………………………………………..
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
……………………………………………………………………………………..