Documente Academic
Documente Profesional
Documente Cultură
Version 1.0
CONTENTS : 1. Introduction 2. Numbering Systems and Conversion a. Binary numbers to decimal numbers conversion and vice versa b. Binary to Hexadecimal conversion and vice versa c. Decimal to Hexadecimal conversion and vice versa 3. IPv4 Addressing 4. Subnetting 5. DHCP (Dynamic Host Configuration Protocol) a. Common DHCP configuration parameters b. Configuring TCP/IP Configuration Settings Manually Without a DHCP Server 6. DOS Utilities for Troubleshooting Network problems a. PING b. TRACERT c. IPCONFIG d. IPCONFIG/ALL e. NBTSTAT f. NETSTAT g. NETSH 7. Frequently used TCP/IP Protocols a. HTTP b. FTP c. Telnet d. Email-Protocols (SMTP, POP, and IMAP) 8. Connectors and Cabling a. DB9 b. DB25 c. USB
Version 1.0 Copyright 2002 - 2012 CertExams.com
d. RJ-11 e. RJ-45 f. DB9 to USB 9. Appendix a. Troubleshooting Network Interface Card (NIC) For Physical Connectivity b. Modem connectivity and Troubleshooting 10. Additional Resources
Version 1.0
1. Introduction:
This manual provides information that was previously assumed that a candidate will have prior to working with Juniper router networks. The manual covers topics such as number conversion, networking connectors and cables, and troubleshooting network connectivity.
128 64
There are eight bits in the binary number. The decimal value for each bit position is given below:
128 64 32 16 8 4 2 1 1 0 0 1 1 1 0 1 Decimal equivalent of the binary position Given binary number
To convert, you simply take a value from the top row wherever there is a 1 below, and then add the values together. For instance, in our example we would have 1*27 + 0*26 + 0*25 + 1*24 + 1*23 + 1*22 + 0*21 + 1*20 =128 + 0 + 0 + 16 + 8 + 4 + 0 + 1
= 157 (decimal value) ii. Converting decimal to binary To convert decimal to binary is also very simple, you simply divide the decimal value by 2 and then write down the remainder, repeat this process until you cannot divide by 2 anymore. For example, take the decimal value 157:
157 78 39 19 9 4 2 1 2 2 2 2 2 2 2 2 = = = = = = = = 78 39 19 9 4 2 1 0 with with with with with with with with a a a a a a a a remainder remainder remainder remainder remainder remainder remainder remainder of of of of of of of of 1 0 1 1 1 0 0 1 <---
Next write down the value of the remainders from bottom to top (in other words write down the bottom remainder first and work your way up the list) which gives: 10011101 = 157
Version 1.0
0 1 2 3 4 5 6 7 8 9 A B C D E F
0000 0001 0010 0011 0100 0101 0110 0111 1000 1001 1010 1011 1100 1101 1110 1111
Example: To convert 11110010110001 into hexadecimal, group the numbers into 4 bits each, if there is shortage of numbers, we can add '0s' at the beginning so that groups of four digits are formed.
0111 1100 1011 0001 7 C B 1
Therefore the hexadecimal equivalent of 111110010110001 is 7CB1.Note that we have added one 0 bit at the left most position to make it a block of 4 bits.
Version 1.0
The remainders in reverse order are : 6-15-1-4 which is 6F14 in Hexadecimal (Replace 15 by F). ii. Hexadecimal to Decimal To convert hexadecimal to decimal, just multiply the digits with 160, 161, 162 and so on from right to left, and then add the results to get the decimal number. Example: Convert B61F h to its equivalent decimal value. B61F = B*163+6*162+1*161+F*160 = (11*4096)+(6*256)+(1*16)+(15*1) = 45056+1536+16+15 = 46623 Therefore the decimal equivalent of B61F is 46623.
Version 1.0
3. IPv4 Addressing:
An IP address is a unique logical identifier for a node or host connection on an IP network. An IPv4 address is a 32 bit binary number, and represented as 4 decimal values of 8 bits each. The decimal values range from 0 to 255. This is known as "dotted decimal" notation. Example: 192.189.210.078 It is sometimes useful to view the values in their binary form. 192 .189 .210 .078 11000000.10111101.11010010.1001110 Every IP address consists of network identifier and node identifier. The IP network is divided based on Class of network. The class of network is determined by the leading bits of the IP address as shown below. Address Classes There are 5 different address classes. You can determine which class any IP address is in by examining the first 4 bits of the IP address.
Class A addresses begin with 0xxx, or 1 to 126 decimal. Class B addresses begin with 10xx, or 128 to 191 decimal. Class C addresses begin with 110x, or 192 to 223 decimal. Class D addresses begin with 1110, or 224 to 239 decimal.
Version 1.0
Addresses beginning with 01111111, or 127 decimal, are reserved for loopback and for internal testing on a local machine. Class D addresses are reserved for multicasting. Class E addresses are reserved for future use. They should not be used for host addresses. Now we can see how the Class determines, by default, which part of the IP address belongs to the network (N) and which part belongs to the Host/node (H). Class A: NNNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH Class B: NNNNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH Class C: NNNNNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH In the example, 192.189.210.078 is a Class C address so by default the Network part of the address (also known as the Network Address) is defined by the first three octets (192.189.210.XXX) and the node part is defined by the last one octets (XXX.XXX.XXX.078). In order to specify the network address for a given IP address, the node section is set to all "0"s. In our example, 192.189.210.0 specifies the network address for 192.189.210.078. When the node section is set to all "1"s, it specifies a broadcast that is sent to all hosts on the network. 192.189.210.255 specifies the broadcast address. b. Private Subnets There are three IP network addresses reserved for private networks. The addresses are 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. They can be used by anyone setting up internal IP networks, such as an intranet. Internet routers never forward the private addresses over the public Internet.
Version 1.0
4. Subnetting:
Subnetting an IP Network is done primarily for better utilization of available IP address space, and routing purpose. Other reasons include better organization, use of different physical media (such as Ethernet, WAN, etc.), and securing network resources. A subnet mask enables you to identify the network and node parts of the address. The network bits are represented by the 1s in the mask, and the node bits are represented by the 0s. A logical AND operation between the IP address and the subnet mask provides the Network Address. For example, using our test IP address and the default Class C subnet mask, we get: 192.189.210.078: 1100 0000.1011 1101.1101 0010.0100 1110 Class C IP Address 255.255.255.000: 1111 1111.1111 1111.1111 1111.0000 0000 Default Class C subnet mask 192.189.210.0 1100 0000 1011 1101 1101 0010 0000 0000 As can be seen above, by using and AND operator, we can compute the network portion of an IP address. The network portion for the IP address given in the above example is 192.189.210.0, and the host portion of the IP address is 078. CIDR Notation A Subnetmask normally contains the host portion of the bits also. This is called Classless Inter Domain Routing (CIDR). This will enable more networks for a given class of network address. For example, allowing 3 host bits towards subnet portion in our previous IP address, will allow us to offer 2X2X2 or 8 additional subnetworks. Traditionally, all zeros, and all ones subnets are not used, and hence we are left with 6 subnets. 192.189.210.078: 1100 0000.1011 1101.1101 0010.0100 1110 Class C IP Address 255.255.255.224: 1111 1111.1111 1111.1111 1111.1110 0000 Class C subnet mask with 3 additional bits of host portion used for Subnetting. Broadcast address: 1100 0000.1011 1101.1101 0010.0101 1111 :192.189.210.95 The above is the broadcast address for a given subnet (192.189.210.078). Under Classful routing, the broadcast address would have been 192.189.210.255. Note that by using Subnetting, we are able to increase the number of networks available within a given IP address. On the otherhand, we will be loosing the number of hosts available within a subnet to 24 or 16 hosts per subnet. Again, all zeros, and all ones host addresses are traditionally reserved for other purposes. CIDR (Classless InterDomain Routing) notation: Subnet mask is also represented as below: 192.189.210.078/27, where 27 is the number of bits in the network portion of the IP address. Why use CIDR? Normally, ISPs allocate the IP addresses for individuals or Corporates. The reason being that it is almost
Version 1.0 Copyright 2002 - 2012 CertExams.com
impossible to allocate a classful IP address to every individual or a corporate. Using CIDR, the biggest ISPs are given large pool of IP address space. The ISP's customers such as individual or Corporates are then allocated networks from the big ISP's pool. This kind of arrangement will enable efficient management and utilization of the Internet. Classful addresses can easily be written in CIDR notation Class A = A.B.C.D/8, Class B = A.B.C.D/16, and Class C = A.B.C.D/24 Where A,B,C,D are dotted decimal octets. CIDR Chart CIDR Block Prefix /30 /27 /26 /25 /24 /23 /22 /21 /20 /19 /18 /17 /16 # Equivalent Class C 1/128th of a Class C 1/8th of a Class C 1/4th of a Class C 1/2 of a Class C 1 Class C 2 Class C 4 Class C 8 Class C 16 Class C 32 Class C 64 Class C 128 Class C 256 Class C = 1 Class B # of Host Addresses (2-2 ) 2 hosts 30 hosts 62 hosts 126 hosts 254 hosts 510 hosts 1022 hosts 2046 hosts 4094 hosts 8190 hosts 16382 hosts 32766 hosts 65534 hosts
Version 1.0
10
*Important points to note: A subnet mask is used to determine the break between network and host subsections of an IP addressing VLSM allows for conservation of address space by allowing the subnet mask to allocate bits across the entire range of the IP address An address where all the host bits are set to 1 is the broadcast An address where all the host bits are set to 0 is the network There are 2-2 addresses in a CIDR block, where n is the number of host bits
Version 1.0
11
loopback
The following sections describe the DHCP configuration for Windows 7 client computers. It is assumed that the DHCP server computer is already configured and available. 1. Steps for configuring the workstation (DHCP Client) from the DHCP server
Version 1.0 Copyright 2002 - 2012 CertExams.com
12
are given below: Using GUI applet Right-click on " Network" icon on the desktop and click properties which opens "Network and Sharing" window as shown.
Network and Sharing window shows up the basic network information and also shows all the current connections.
Click on "Local Area Connection" on the previous screen that opens Local Area Connection Properties window as shown below
Version 1.0 Copyright 2002 - 2012 CertExams.com
13
. Double-click on Internet Protocol Version 4 (TCP/IPv4) option, the window Internet Protocol Version4(TCP/IPv4) Properties shows up as below. If your DHCP is configured with IPv6, please use TCP/IPv6.
Version 1.0
14
Click on "OK" until the network dialogue boxes are closed. This specific adapter is now set for DHCP. Reboot your system for the changes to take effect. Further, it is assumed that the DHCP server is already configured and present. Note : These steps are with respect to Windows 7 operating system. Other operating systems like windows 2000/XP etc, the steps are almost the same. 2. Using Command Prompt Netsh.exe, dos utility can be used to configure NIC to automatically obtain an IP address from a DHCP server. The command is given below: netsh interface ip set address "Local Area Connection" dhcp To configure DNS and WINS addresses from the Command Prompt, use the following command:
Version 1.0 Copyright 2002 - 2012 CertExams.com
15
netsh interface ip set dns "Local Area Connection" static 192.168.0.200 To configure your NIC to dynamically obtain it's DNS settings using DHCP: netsh interface ip set dns "Local Area Connection" dhcp
Version 1.0
16
Now click on "Local Area Connection" that opens Local Area Connection Properties window as shown below
Version 1.0
17
. Double-click on Internet Protocol Version4(TCP/IPv4) option, the window Internet Protocol Version4(TCP/IPv4) Properties shows up as shown below
Version 1.0
18
Now select the option "Use the following IP Address" and enter the IP Address, Subnet Mask and Default Gateway. Enter the values as required. These values may be obtained from your network administrator. Note: In a home network environment, the Internet router acts as the default gateway. Therefore, you need to enter the IP address of the router as default gateway on your host computer. The router and your client work station will be in the same subnet. The subnet mask is same as that of the router interface. DNS information is usually optional, and check with your service provider if you need to enter the DNS Server information.
Version 1.0
19
Click on Ok, also on "Internet Protocol Version4 (TCP/IPv4) Properties" window. Reboot the computer if prompted. Usually, rebooting is not necessary. The settings can then be checked using DOS command "ipconfig". Note : These steps are with respect to Windows 7 operating system. Other operating systems like windows 2000/XP etc, the steps are almost the same. 2. Configure TCP/IP settings using Windows 2000/XP/Vista, and Windows7 Using Command Prompt The same thing can be achieved using command prompt utility called netsh.exe. Netsh.exe is a command-line scripting utility that allows you to, either locally or remotely, display or modify the network configuration of a computer that is currently running. In order to configure TCP/IP settings such as the IP address, Subnet Mask, Default Gateway, DNS and WINS addresses and many other options you can use Netsh.exe.
Version 1.0
20
To view TCP/IP settings, use the below command: netsh interface ip show config Configuration is also easy. The following command configures the interface named Local Area Connection with the static IP address 192.168.0.100, the subnet mask of 255.255.255.0, and a default gateway of 192.168.0.1: netsh interface ip set address name="Local Area Connection" static 192.168.0.100 255.255.255.0 192.168.0.1 1
The first ever step in troubleshooting is testing layer 1 of the OSI model, i.e, verifying the cabling. Ensure that the network connector (usually, RJ-45) is properly connected and the network card LEDs are active.
a. PING:
After verifying the physical connectivity, test the functionality of NIC and the computer for its ability to communicate with networking by using ping to any address on the loopback network (127.0.0.1 to 127.255.255.254). A sample output of pinging the local host is given below:
Version 1.0
21
Next is to test the basic connection between your workstation and default gateway using ping. If the ping to the default gateway is not successful, then check the IP Address, subnet mask, and default gateway address on the workstation and reboot the system if necessary. A successful ping to default gateway is given below:
Ping sends out a packet to a designated internet host or network computer and measures its response time. The target computer will return (hopefully) a signal. It is often used to test connections on local networks.
b. TRACERT:
The actual path between two computers on the internet consists of numerous segments or "hops" from one intermediate computer to another. Tracert shows each node of the path taken to reach the destination host.
Version 1.0
22
As seen in the above figure, the output contains i. the times for each hop, ii. the IP addresses for each intermediate computer, and iii. the time taken are displayed. Tracert shows up to 30 hops. It is convenient for finding if there is one particular segment that is causing a slow or bad connection.
c. IPCONFIG:
IPCONFIG is a command line utility available on windows that gets the IP Address information on a computer, it is an alternative to "winipcfg" utility. The output of the default command contains the IP address, network mask and gateway for all physical and virtual network adapters.
Version 1.0
23
d. IPCONFIG/ALL:
This option displays the same IP addressing information for each adapter as the default option. Additionally, it displays DNS and WINS settings for each adapter.
e. NBTSTAT:
NBTSTAT is a DOS utility that displays protocol statistics and current TCP/IP connections. NBTSTAT is a useful tool for troubleshooting NetBIOS name resolution problems. In a purely TCP/IP network, NBTSTAT is not used.
Version 1.0
24
f. NETSTAT:
NETSTAT is a tool that can be used for checking network configuration and utility. The netstat a command displays all connections, and netstat r displays the route table plus active connections. The netstat e command displays Ethernet statistics, and netstat s displays perprotocol statistics.
g. NETSH:
NETSH is a utility that allows you to, either locally or remotely, display or modify the network configuration of a computer that is currently running. In order to configure TCP/IP settings such as the IP address, Subnet Mask, Default Gateway, DNS and WINS addresses and many other options, NETSH.exe can be used.
Version 1.0
25
Version 1.0
26
using binary or ASCII mode. However, using anonymous FTP, one can transfer files without supplying login credentials. The following topics are discussed here: 1. FTP to a Remote Host Using Command Prompt 2. FTP to a Remote Host Using GUI based Software (FileZilla) 1. FTP to a Remote Host Using Command Prompt FTP can be accessed using "ftp" command on the command prompt, the prompt changes to <ftp> prompt, after which the FTP site can be opened using the command "Open". The user will be prompted for "Username" and "Password", after which the files can be viewed, uploaded or downloaded.
2. FTP to a Remote Host Using GUI-based Software - FileZilla A software based FTP is almost inevitable for effective control over the file transfer. There are several software based FTP programs available including FileZilla, CuteFTP, SmartFTP, etc. Among these, FileZilla is the most widely used software. It is a free FTP open source solution. It can be downloaded here. A few useful options available with FileZilla are synchronous browsing (local and remote folders are synchronized with each other), multiple sessions (several FTP sessions can be opened at the same time transferring 2 or more files at the same time), and storing connections to multiple remote servers so that we don't need to enter the settings again for connecting to remote servers.
c. Telnet:
Telnet is another most widely used application layer protocol in the TCP/IP stack. Telnet is a protocol underlying TCP/IP protocol for accessing remote computers and use the resources present there. On the web, FTP and HTTP protocols allows to request specific files from remote computers but not to actually be logged on as a user of that computer, with telnet it is possible to log on as a regular user with only those privileges that are granted to the specific application and data on that computer.
Version 1.0 Copyright 2002 - 2012 CertExams.com
27
Note that to telnet to a computer, Username and Password should be known. 1. Telneting to a remote host from command prompt on local work station Syntax is : telnet open hostname [port] hostname : specifies the hostname or IP address of the remote computer to connect to port : Specifies the port number or service name. 2. Telnet Software There are a number of third-party telnet programs (terminal emulation) available with offering features in addition to the one that comes with the operating system. Examples to this are Van Dyke CRT program, Putty, etc.
Version 1.0
28
For fetching emails from a remote server, you need to configure an email client such as Outlook or Mozilla Thunderbird.
a. DB9:
DB9 connector is an analog 9-pin plug of the D-Subminiature connector family, mainly used for serial connections. The connector is "D" shaped, and easy to recognize. Actual DB-9 Connector (both Male and Female) Pin Diagram of DB9 Connector
PIN Details Pin number Name 1 2 3 4 5 CD - Carrier Detect RXD - Receive Data TXD - Transmit Data DTR - Data Terminal Ready GND - Signal Ground
Version 1.0
29
6 7 8 9
DSR - Data Set Ready RTS - Request To Send CTS - Clear To Send RI - Ring Indicator Shield
b. DB25:
DB25 connector is an analog 25-pin plug of the D-Subminiature connector family, mainly used for serial connections, also used for parallel port connections. DB25 serial ports on computer generally have male connectors, while parallel port connectors are DB25 female plugs. DB-25 Physical Connector (Male) DB-25 Connector Pin Out
Pins (Serial Connection) Pin number Name 2 3 4 TXD - Transmit Data RXD - Receive Data RTS - Request To Send
Version 1.0
30
5 6 7 8 20 22
CTS - Clear To Send DSR - Data Set Ready GND - Signal Ground CD - Carrier Detect DTR - Data Terminal Ready RI - Ring Indicator
c. USB:
Universal Serial Bus (USB) is an input-output interface which is much faster than standard serial ports. USB Connectors (Physical) USB Connector Pin Outs
Version 1.0
31
PIN Details Pin number 1 2 3 4 Function Power supply +5V (VBUS) 100mA maximum Data (D-) Data (D+) Ground (GND)
Two kinds of USB connectors: 1. "Type A" connectors, rectangular in shape, generally used for devices which consume little bandwidth 2. "Type B" connectors, square-shaped , generally used for devices with heavy bandwidth requirements The difference between the two is in the physical layout of pins in the connector. USB "A" plugs are used towards the host system and USB "B" plugs are used towards the USB device.
d. RJ-11:
RJ-11 is a 4-wire connector, commonly used with a modem. It should not be confused with bigger RJ-45 cable and connector. RJ-45 is commonly used for Ethernet network interface card (NIC). RJ-11 Connector with Cable RJ-11 Connector Pin Out
Version 1.0
32
PIN Details Pin # A1 A2 A3 A4 Function Ground Rx (Data Input) Tx (Data Output) Vc (Power)
e. RJ-45:
The RJ-45 connector is commonly used for network cabling and for telephony applications. An RJ-45 connector has 4 pairs of wires as shown in the schematic diagram below. RJ-45 connector is commonly used for Ethernet Networking ports. Devices that normally use RJ-45 ports include NICs, Hubs, Switches, and Routers. It's also used for serial connections in special cases.
Version 1.0
33
3 RX_D2+ Receive data + 4 5 6 7 8 BI_D3+ Bi-directional Data+ BI_D3- Bi-directional DataRX_D2- Receive data BI_D4+ Bi-directional Data+ BI_D4- Bi-directional Data-
CABLING Cisco routers either have RJ-45 based or DB-25 DCE/DTE console and AUX ports. RJ-45 cabling types are i. Straight-through : Straight-through cable is used for connecting a work station to a hub ii. Crossover : Cross cable is used for connecting two hubs or switches iii. Rolled : Rollover cable is used to connect console port of cisco router to a pc Identifying a RJ-45 Cable Hold the two ends of the cable next to one another such that the colored wires can be seen. There are eight colored strips or pins at each end. If the order of the colored pins is same at each end, the cable is straight and if the order of the colors is reversed at each end, the cable is rolled. i. Straight-Through Cable In this, the colored wires are in the same sequence at both ends of the cable.
Version 1.0 Copyright 2002 - 2012 CertExams.com
34
RJ-45 Straight-Through Cable Pinouts Signal Tx+ Tx Rx+ Rx RJ-45 Pin 1 2 3 4 5 6 7 8 RJ-45 Pin Signal 1 2 3 4 5 6 7 8 Tx+ Tx Rx+ Rx
35
In this, the first (far left) colored wire at one end of the cable is the third colored wire at the other end of the cable. RJ-45 Crossover Cable Pinouts Signal RJ-45 Pin RJ-45 Pin Signal Tx+ Tx Rx+ Rx 1 2 3 4 5 6 7 8 3 6 1 4 5 2 7 8 Rx+ Rx Tx+ Tx
iii. Rolled Cable In this, the colored wires at one end of the cable are in the reverse sequence of the colored wires at the other end of the cable.
Version 1.0
36
RJ-45 Rolled Cable Pinouts Signal RJ-45 Pin RJ-45 Pin Signal 1 2 3 4 5 6 7 8 8 7 6 5 4 3 2 1
f. DB9 to USB:
DB9 connectors are used to link external peripheral devices using serial communication. Some computers, such as laptops do not have DB9/DB25 ports. You may need to convert the DB9/DB25 to USB for communicating to a router using a laptop computer. Therefore, an adapter cable is required to convert DB9 (or DB25) to USB. Note that, the conversion requires a signal adapter so that DB9 (or DB25) signals are made compatible to USB pinout. It is important to know that the conversion is not a passive process (matching the pinouts) like DB9 to DB25 or RJ-45. This adapter, powered by the USB 2.0 port, takes care of converting from the old serial communications to USB and vice versa. Each USB-RS232 cable contains a small internal electronic circuit board, which is encapsulated into the USB/DB-9 connector.
Version 1.0
37
Connecting a USB to DB9 is a simple task that you can perform with an adapter cable. Steps are given below 1. Purchase a USB to DB9 cable. Remember to note if the cable ends are either male or female. A male cable inserts into a female cable. A male cable has the pins while the female cable has the slots. 2. Plug the male end of the USB adapter cable into the female end of the device you're connecting. Plug and then screw the DB9 end of the adapter cable into the next device. 3. Check the connection by checking the data that you are transferring over the cable. There are numerous applications for using a USB to DB9 adapter cable.
9. Appendix:
a. Troubleshooting Network Interface Card (NIC) For Physical Connectivity:
NIC is the interface between the computer Operating System and the external network, and therefore a critical element in the networking of computers. Typically, an NIC consists of MAC address, and driver software. The driver software is controlled by the TCP/IP protocol residing in the Operating System.
Version 1.0
38
As shown in the above diagram, a Network Interface Card consists of a PCI connector (Edge connector) to connect to one of the PC expansion slots, and an RJ-45 connector to connect to external Ethernet. Note that the interface connectors may differ depending upon the expansion bus being used (for example, PCI, ISA, EISA, USB etc.), and the networking media being used (for example, Token Ring, 100BaseT, etc.). The LED indicators provide information about the status of communication. The D-Link DGE-550SX 1000Base SX Network adapter has two LED indicators: 1. Link indicator (Link: Link up/down). This indicator goes green when the fiber port is connected to the Ethernet network successfully. 2. Activity indicator (ACT - Transmitting/Receiving): When this indicator is blinking green, the network adapter is either transmitting or receiving data to/from the Ethernet network.
i. Analog modems:
The analog modem is the one commonly used for connecting remotely to a router or switch. The
Version 1.0 Copyright 2002 - 2012 CertExams.com
39
As seen from the above figure, you can use an external modem, internal modem that sits on the internal extension bus such as PCI bus, or and USB modem. For installing an analog modem, you will be needing modem driver software. This software will be different for different Operating Systems and you need to make sure that you have the right version of the driver software loaded on to the computer before attempting to connect to any external host. Usually, the software will also have self testing abilities that can be used for troubleshooting any problems with the installation. The following features are configured frequently for communicating between hosts using a modem: 1. Speed : The speed at which the modem can send data in bps (bits per second). Typically modem speeds are: 300, 600, 1200, 2400, 4800, 9600, 14.4K, 19.2K, 28.8K bps 2. Auto Dial /Redial : Smart Modems can dial the phone number and & auto redial if a busy signal is received. 3. Auto Answer : Most modems can automatically answer the phone when an incoming call comes in. They have Ring Detect capability. 4. Self-Testing : New modems have self-testing features. They can test the digital connection to the terminal /computer and the analog connection to a remote modem. They can also check the modem's internal electronics. 5. Voice over Data : Voice over Data modems allow a voice conversation to take place while data is being transmitted. This requires both the source and destination modems to have this feature. 6. Synchronous or Asynchronous Transmission : Newer modems allow a choice of synchronous or asynchronous transmission of data. Normally, modem transmission is asynchronous. We send individual characters with just start and stop bits. Synchronous transmission or packet transmission is used in specific applications. Analog Modems - AT command set and Modem scripts
Version 1.0 Copyright 2002 - 2012 CertExams.com
40
Analog Modems are used for dial-up connections. Modem configurations vary by manufacturer. They use their own language for communication. The common alphabets of modem speak is given below: a-z -->alphabet * -->asterisk ^ -->carat - -->hyphen $ -->dollar sign : -->colon % -->percent sign @ -->character command set & -->ampersand \ -->backslash )--> parenthesis #--> character command set 1. AT Command Set AT commands allows to control many of the functions of modem. AT commands can be used by typing them at the command line of any Terminal program. See Appendix for AT command set. 2. Writing Modem Scripts Scripts are those where-in we combine modem-speak commands. Ex: AT&FS0=1&C1&D3&K3&Q9&W AT&F load factory defaults and settings S0=1 set modem to answer on first ring &C1&D3 set modem up for action (cd/dtr) &K3 set hardware flow control &Q9 set compression &W save configuration to modem Connecting to a telephone line When the modem is turned on or after reset, the modem always goes to command state. It enters on-line state after successfully making a connection with a remote modem, either when answering or originating a call. When you return to command state from on-line state, the modem goes to local command state, which allows you to maintain the connection and enter commands. To go to local command state, type the escape sequence +++
Version 1.0 Copyright 2002 - 2012 CertExams.com
41
AT refers to the command prefix (attention sequence) that precedes each command to the modem. D Dial (Originate mode) : This command signals the modem that the numbers, letters, and commas that follow are all part of a telephone number that it should dial. T Touch-Tone dialing / Enable tone (DTMF dialing) : When "T" is used as a subcommand of the "D" command (ATDT 12345) this causes all following numbers to be Touch-Tone dialed (default). When it is used as ATT it sets the default dialing mode to Touch-Tone mode. Can be used in dial string (default). Ex: ATDT15551235 <Enter> ATDT is the command for dial and enable tone i.e, connecting to a telephone line. Disconnecting a telephone line Hn Hook (hang up) When the modem is on-line, you must first enter the +++ escape sequence to take the modem back to command state before issuing the hang up command, ATH. 0 - Forces the modem on-hook. Hangs up the modems connection to the telephone line and place modem in command state. 1 - Forces the modem off-hook. After going off hook, operate auxiliary relay. Ex: ATH 1 <Enter>
Version 1.0
42
Disclaimer
CertExams.com is neither affiliated with Juniper Systems, Inc., Microsoft Corporation, Inc., CompTIA , Check Point Software Corp., Prosoft or any other company. All trademarks are trademarks of their respective owners and duly acknowledged.
Version 1.0
43