Professional Documents
Culture Documents
Version 1.0
CONTENTS :
1. Introduction
10. Appendix
a. Troubleshooting Network Interface Card (NIC) For Physical Connectivity
b. Modem connectivity and Troubleshooting
a. Decimal - The Decimal system is what you use everyday when you count. The system
uses ten digits: 0, 1, 2, 3, 4, 5, 6, 7, 8 and 9. These digits are what we call the symbols of
the decimal system.
b. Binary - The Binary system uses two symbols, 0 and 1. Basically, a computer uses binary
digits for all its operations and understands only binary values. Each symbol is
represented by low level or high level signal.
c. Hexadecimal - This system uses 16 symbols, these are 0 - 9, A, B, C, D, E, F. The need
for Hex system aroused because the Hex numbers can easily broken in to binary digits for
consumption by digital computers and vice versa. For example, a large binary number
such as 1101 1011 1110 1001 is equivalent to B7D2 H (H or h is used for hexadecimal
system). Another advantage of hex system is that it is easy to be understood by humans.
The following sections explain conversion from one numbering system to another.
Decimal is a Base 10 system with 10 possible values (0 to 9) and Binary is a Base 2 system with only
two numbers 0 or 1.
i. Converting binary to decimal - The weightage of binary digits from right most bit
position to the left most bit position is given below.
27 26 25 24 23 22 21 20
128 64 32 16 8 4 2 1
To convert, you simply take a value from the top row wherever there is a 1 below,
and then add the values together.
=128 + 0 + 0 + 16 + 8 + 4 + 0 + 1
To convert decimal to binary is also very simple, you simply divide the decimal value
by 2 and then write down the remainder, repeat this process until you cannot divide
by 2 anymore.
Next write down the value of the remainders from bottom to top (in other words write
down the bottom remainder first and work your way up the list) which gives:
10011101 = 157
Equivalent
Hex digit
binary value
1 0001
2 0010
3 0011
4 0100
5 0101
6 0110
7 0111
8 1000
9 1001
A 1010
B 1011
C 1100
D 1101
E 1110
F 1111
Example: To convert 11110010110001 into hexadecimal, group the numbers into 4 bits each, if
there is shortage of numbers, we can add '0s' at the beginning so that groups of four digits are
formed.
i. Decimal to Hexadecimal
To convert hexadecimal to decimal, just multiply the digits with 160, 161, 162 and so
on from right to left, and then add the results to get the decimal number.
B61F = B*163+6*162+1*161+F*160
= (11*4096)+(6*256)+(1*16)+(15*1)
= 45056+1536+16+15
Normally the DHCP server provides the client with at least this basic information:
Other information can be provided as well, such as Domain Name Service (DNS) server
addresses and Windows Internet Name Service (WINS) server addresses. DNS resolution is the
procedure used to resolve an IP address from a domain name. It occurs when a client queries a
name server to obtain the IP Address with which it wants to connect. All computers communicate
by addressing each other using IP Addresses over any TCP/IP network. So every time we connect
to a website or send an email, DNS resolution occurs.
Note: Sometimes, you may want to bypass DNS look up for certain addresses. Then, you can use
what is known as HOSTS file to map hostnames to IP addresses. The hosts file contains lines of
text consisting of an IP address in the first text field followed by one or more hostnames, each
field separated by white space (blanks or tabulation characters).
207.46.197.32 office.microsoft.com
96.0.7.166 practicetests.info
127.0.0.1 localhost loopback
::1 localhost
The following sections describe the DHCP configuration for Windows 7 client computers. It is
assumed that the DHCP server computer is already configured and available.
1. Steps for configuring the workstation (DHCP Client) from the DHCP server
are given below: Using GUI applet
Right-click on " Network" icon on the desktop and click properties which opens
"Network and Sharing" window as shown.
Click on "Local Area Connection" on the previous screen that opens Local Area
Connection Properties window as shown below
This specific adapter is now set for DHCP. Reboot your system for the changes to
take effect. Further, it is assumed that the DHCP server is already configured and
present.
Note : These steps are with respect to Windows 7 operating system. Other operating
systems like windows 2000/XP etc, the steps are almost the same.
• To configure DNS and WINS addresses from the Command Prompt, use
the following command:
Note : These steps are with respect to Windows 7 operating system. Other
operating systems like windows 2000/XP etc, the steps are almost the
same.
The same thing can be achieved using command prompt utility called
netsh.exe. Netsh.exe is a command-line scripting utility that allows you
to, either locally or remotely, display or modify the network configuration
of a computer that is currently running. In order to configure TCP/IP
settings such as the IP address, Subnet Mask, Default Gateway, DNS and
WINS addresses and many other options you can use Netsh.exe.
When there is a network of computers connected in a LAN, then we can use DOS utilities like PING,
TRACERT, etc. for testing the connectivity between the workstations and also for troubleshooting the
problems.
Given below are some frequently used DOS utilities for troubleshooting network related problems:
a. Ping
b. Tracert
c. Ipconfig
d. NBTstat
e. netstat, and
f. netsh
The first ever step in troubleshooting is testing layer 1 of the OSI model, i.e, verifying the cabling. Ensure
that the network connector (usually, RJ-45) is properly connected and the network card LEDs are active.
a. PING:
After verifying the physical connectivity, test the functionality of NIC and the computer for its
ability to communicate with networking by using ping to any address on the loopback network
(127.0.0.1 to 127.255.255.254). A sample output of pinging the local host is given below:
Ping sends out a packet to a designated internet host or network computer and measures its
response time. The target computer will return (hopefully) a signal. It is often used to test
connections on local networks.
b. TRACERT:
The actual path between two computers on the internet consists of numerous segments or "hops"
from one intermediate computer to another. Tracert shows each node of the path taken to reach
the destination host.
c. IPCONFIG:
IPCONFIG is a command line utility available on windows that gets the IP Address information
on a computer, it is an alternative to "winipcfg" utility. The output of the default command
contains the IP address, network mask and gateway for all physical and virtual network adapters.
This option displays the same IP addressing information for each adapter as the default option.
Additionally, it displays DNS and WINS settings for each adapter.
e. NBTSTAT:
NBTSTAT is a DOS utility that displays protocol statistics and current TCP/IP connections.
NBTSTAT is a useful tool for troubleshooting NetBIOS name resolution problems. In a purely
TCP/IP network, NBTSTAT is not used.
NETSTAT is a tool that can be used for checking network configuration and utility. The netstat –
a command displays all connections, and netstat –r displays the route table plus active
connections. The netstat –e command displays Ethernet statistics, and netstat –s displays per-
protocol statistics.
g. NETSH:
NETSH is a utility that allows you to, either locally or remotely, display or modify the network
configuration of a computer that is currently running. In order to configure TCP/IP settings such
as the IP address, Subnet Mask, Default Gateway, DNS and WINS addresses and many other
options, NETSH.exe can be used.
a. HTTP
b. FTP
c. Telnet
d. Email Protocols (SMTP, POP, and IMAP)
This is the most widely used protocol on the web. In order to fetch a web page for
you, your web browser must "talk" to a web server on the Internet. When web
browsers talk to web servers, they use HTTP protocol (HyperText Transfer Protocol).
All browsers use this protocol whether they are Windows based or Linux based.
File Transfer Program is used to transfer files from one computer to another. FTP is
the most widely used protocol by network administrators for:
i. Taking backups
ii. Uploading or downloading files to/from the server machine
iii. Providing a platform for file storage among many different hosts (such as
workstations, routers, servers, etc.)
Note that in order to upload or download a file from FTP site, the login details, FTP
username and FTP password must be known. Once connected, files can be transferred
FTP can be accessed using "ftp" command on the command prompt, the
prompt changes to <ftp> prompt, after which the FTP site can be opened
using the command "Open". The user will be prompted for "Username"
and "Password", after which the files can be viewed, uploaded or
downloaded.
A software based FTP is almost inevitable for effective control over the
file transfer. There are several software based FTP programs available
including FileZilla, CuteFTP, SmartFTP, etc. Among these, FileZilla is
the most widely used software. It is a free FTP open source solution. It
can be downloaded here.
c. Telnet:
Telnet is another most widely used application layer protocol in the TCP/IP stack.
Telnet is a protocol underlying TCP/IP protocol for accessing remote computers and
use the resources present there. On the web, FTP and HTTP protocols allows to
request specific files from remote computers but not to actually be logged on as a user
of that computer, with telnet it is possible to log on as a regular user with only those
privileges that are granted to the specific application and data on that computer.
2. Telnet Software
After HTTP, arguably, the most widely used web resource is email. A network
administrator configures an email client on host computers quite often, and therefore
need to know the functioning and configuration of email client software. The
protocols that are commonly used when accessing email over the Internet or intranet
are given below:
• SMTP,
• POP3, and IMAP
SMTP is the protocol used for accessing the Email Server for sending email messages
from client computer to the Server, whereas POP and IMAP are used for receiving
email messages from the Email Server to the client computer. Note that an Email
Server may be a Web Server doing the additional duty of Email Server.
1. CORE LAYER
2. DISTRIBUTION LAYER and
3. ACCESS LAYER
a. Core Layer:
The Core layer is the backbone network of the enterprise through which most of the traffic flows.
It is responsible for transporting large amounts of traffic with least amount of delay. It requires
highest level of reliability because a failure of Core layer device may result in total network
breakdown if hot standby devices are not put in place. Speed and fault tolerance are two
important issues to be considered in this layer.
Cisco's Core layer devices that can handle huge amounts of traffic reliably include the following:
b. Distribution Layer:
The Distribution layer is the communication point between the Core and Access layers. The
primary functions include routing between VLANs, network policy implementations, filtering
etc. This layer provides policy-based connectivity. Distribution layer is also known as
Workgroup layer.
Cisco's Distribution Layer devices that can be used for policy based routing, VLAN routing, and
filtering include the following:
c. Access Layer:
The Access layer is also known as desktop layer because it focuses on connecting client nodes,
such as workstations, servers, and remote computers to the network.
Cisco's Access layer devices that can be used to provide access to the computers, and remote
networks include the following:
700 routers, 800 routers , 2500 routers, 1900 switches, and 2820 switches.
Finally, please note that the layering of an enterprise wide network is done for the convenience of
planning, implementation, and maintenance. It is a theoretical approach, and a Distribution layer
device may perform the functions of a Core layer device or an Access layer device, or both.
a. DB9:
DB9 connector is an analog 9-pin plug of the D-Subminiature connector family, mainly used for
serial connections. The connector is "D" shaped, and easy to recognize.
Actual DB-9 Connector (both Male and Female) Pin Diagram of DB9 Connector
Pin
Name
number
1 CD - Carrier Detect
9 RI - Ring Indicator
Shield
b. DB25:
DB25 connector is an analog 25-pin plug of the D-Subminiature connector family, mainly used
for serial connections, also used for parallel port connections. DB25 serial ports on computer
generally have male connectors, while parallel port connectors are DB25 female plugs.
Pin
Name
number
8 CD - Carrier Detect
22 RI - Ring Indicator
Universal Serial Bus (USB) is an input-output interface which is much faster than standard serial
ports.
PIN Details
Pin
Function
number
2 Data (D-)
3 Data (D+)
4 Ground (GND)
1. "Type A" connectors, rectangular in shape, generally used for devices which consume little
bandwidth
2. "Type B" connectors, square-shaped , generally used for devices with heavy bandwidth
requirements
d. RJ-11:
RJ-11 is a 4-wire connector, commonly used with a modem. It should not be confused with
bigger RJ-45 cable and connector. RJ-45 is commonly used for Ethernet network interface card
(NIC).
PIN Details
Pin # Function
A1 Ground
A2 Rx (Data Input)
A3 Tx (Data Output)
A4 Vc (Power)
e. RJ-45:
The RJ-45 connector is commonly used for network cabling and for telephony applications. An
RJ-45 connector has 4 pairs of wires as shown in the schematic diagram below. RJ-45 connector
is commonly used for Ethernet Networking ports. Devices that normally use RJ-45 ports include
NICs, Hubs, Switches, and Routers. It's also used for serial connections in special cases.
PIN Details
Bi-directional
4 BI_D3+
Data+
Bi-directional
7 BI_D4+
Data+
Cisco routers either have RJ-45 based or DB-25 DCE/DTE console and AUX ports.
Hold the two ends of the cable next to one another such that the colored wires can be seen. There
are eight colored strips or pins at each end. If the order of the colored pins is same at each end,
the cable is straight and if the order of the colors is reversed at each end, the cable is rolled.
i. Straight-Through Cable
In this, the colored wires are in the same sequence at both ends of the cable.
RJ-45 RJ-45
Signal Signal
Pin Pin
Tx+ 1 1 Tx+
Tx– 2 2 Tx–
Rx+ 3 3 Rx+
– 4 4 –
Rx– 6 6 Rx–
– 7 7 –
– 8 8 –
In this, the first (far left) colored wire at one end of the cable is the third colored wire
at the other end of the cable.
Tx+ 1 3 Rx+
Tx– 2 6 Rx–
Rx+ 3 1 Tx+
– 4 4 –
– 5 5 –
– 7 7 –
– 8 8 –
In this, the colored wires at one end of the cable are in the reverse sequence of the
colored wires at the other end of the cable.
– 1 8 –
– 2 7 –
– 3 6 –
– 4 5 –
– 5 4 –
– 6 3 –
– 7 2 –
– 8 1 –
DB9 connectors are used to link external peripheral devices using serial communication. Some
computers, such as laptops do not have DB9/DB25 ports. You may need to convert the
DB9/DB25 to USB for communicating to a router using a laptop computer. Therefore, an adapter
cable is required to convert DB9 (or DB25) to USB. Note that, the conversion requires a signal
adapter so that DB9 (or DB25) signals are made compatible to USB pinout. It is important to
know that the conversion is not a passive process (matching the pinouts) like DB9 to DB25 or
RJ-45. This adapter, powered by the USB 2.0 port, takes care of converting from the old serial
communications to USB and vice versa. Each USB-RS232 cable contains a small internal
electronic circuit board, which is encapsulated into the USB/DB-9 connector.
Connecting a USB to DB9 is a simple task that you can perform with an adapter cable.
1. Purchase a USB to DB9 cable. Remember to note if the cable ends are either male or female. A
male cable inserts into a female cable. A male cable has the pins while the female cable has the
slots.
2. Plug the male end of the USB adapter cable into the female end of the device you're
connecting. Plug and then screw the DB9 end of the adapter cable into the next device.
3. Check the connection by checking the data that you are transferring over the cable. There are
numerous applications for using a USB to DB9 adapter cable.
Ref: http://www.ehow.com/how_7226288_connect-usb-db9.html
http://encyclopedia.jrank.org/articles/pages/cn5lebz4bp/Db9-Usb-Upgrading-from-DB9-
USB-Technology.html
When a router is purchased, it is likely to contain a console cable kit for connecting the router to
a Desktop PC or a notebook computer. Usually, it will contain the following items:
The console port parameters may be obtained by looking at the manual supplied with the router
or switch. Typically, the default console port parameters for the console port are:
Note that the parameters have to match at both the router (or switch) end and the PC end for
communication to take place. Also check if the router's console port has the ability to auto sense
the communication parameters.
1. Identify the console port on the back of the router (see figure)
2. Connect the console (or rollover) cable to the console port on the router
3. The console cable may need an RJ-45 to DB-9 or DB-25 adapter for some Cisco routers.
Usually, the adapter is supplied with the router.
4. Using the correct adapter, connect the other end of the cable to PC (after identifying the serial
port on the PC or workstation.
5. If PC has a console port that does not fit one of the adapters, correct adapter for that port is to
be provided.
One can connect to a router using DOS directly. However, there are several programs that can be
used for connecting to a serial port. One of these program is HyperTerminal, an application that
is provided by Microsoft for connecting your computer to other systems using serial port.
1. Connect the router from the console port to COM1 on your workstation using a rollover cable.
2. Check for the existence of the HyperTerminal program on windows workstation. It can be
found in the path Start->All Programs-->Accessories-->Communications--->HyperTerminal. If
not installed, use the windows CD, follow the instructions and install the same.
3. Once the HyperTerminal window opens, enter the name for the session and select an icon from
the options provided and click ok.
4. Select "Connect using COM1" in the Connect To window.
5. On the "COM1 properties" window, make the following settings
6. Now turn "On" the router, after which you can see a blinking cursor on the HyperTerminal
window.
7. From the HyperTerminal menu, select File->Save, so that the session is saved for future use.
The Auxiliary port on a Cisco router is intended for connecting to the router remotely. If the
technician is unable to travel to the remote location, he can ask a local person (at the remote
location) to connect a modem to the router and power the devices ON so that the tech can
configure the router. Once configured, this modem can be used for remotely accessing the router
just as if you were at the console.
In order to connect a modem to the auxiliary port, use the RJ-45-to-RJ-45 rollover cable and the
RJ-45-to-DB-25 male DCE adapter.
Connecting an AUX port to a Modem:: The AUX port on Cisco routers is either RJ-45 or DB-25.
1. If the AUX port is RJ-45, use a rolled RJ-45--RJ-45 cable (Console cable), and RJ-45 to DB-
25 adapter marked "MODEM" (DCE adapter) to connect the rolled cable to the DB-25 port on
the modem.
2. If your router has a DB-25 AUX port, use a straight-through DB-25Female - DB25Male RS-
232 cable to connect the modem to the router.
Note that a console port may also be used with a modem for remote access. However, the console
port usually does not support hardware flow control (Clear to Send/Ready to Send (CTS/RTS)).
Therefore, it is recommended to use no flow control or use software (XON/XOFF) flow control
may be enabled.
References:
http://www.cisco.com/en/US/tech/tk801/tk36/technologies_tech_note09186a0080094bbc.shtml
http://www.cisco.com/en/US/tech/tk801/tk36/technologies_tech_note09186a008009428b.shtml#
modemconfig
The table in this section lists the Cisco router series and the corresponding console and AUX
ports are given for a few routers. As can be seen, some routers have RJ-45, whereas others have
DB-25 connectors. Please check with the router manual for correct configuration.
4000 DB-25 DCE RS 232 / RJ-45 Rolled DB-25 DTE RS 232 / RJ-45 Rolled
7200 DB-25 DCE RS 232 / RJ-45 Rolled DB-25 DTE RS 232 / RJ-45 Rolled
Source:
http://www.cisco.com/en/US/products/hw/routers/ps332/products_tech_note09186a0080094ce6.s
html
Though 802.11a and 802.11b standards have been developed around the same time, 802.11b has
become very popular due affordability of the hardware for small business and home networking.
However, considering any future expansion, it is desirable to buy equipment that is capable of
operating in duel modes (802.11 a/b).
Bluetooth supports a very short range (approximately 10 meters) and relatively low bandwidth (1
Mbps). In practice, Bluetooth networks PDAs or cell phones with PCs but not used widely for
general-purpose Wireless LAN networking. The very low manufacturing cost of Bluetooth makes
it a viable solution for wireless devices like PDAs and Cell phones. Note that the 801.11 and
Bluetooth standards are incompatible with each other.
In wireless LANs with infrastructure, there is a high-speed wired or wireless backbone. Wireless
nodes access the wired backbone through Access Points (AP).
These Access Points allow the wireless clients to share the available network resources efficiently. Prior to
communicating data, wireless clients and APs must establish a relationship, or an association. Only after
an association is established can the two wireless stations exchange data.
An enterprise corporation occupies multiple floors in a building. Because of this, they had to pay attention
Figure 11.5 illustrates the selection of channels for the wireless APs on a building floor. The
wireless AP channels were selected to ensure that no two overlapping areas of coverage have the
same channel (frequency).
• Identify any wireless networks owned by other organizations in the same building. Find
out the placement of their wireless APs and the channel frequencies assigned to the Aps.
Radio waves travel through floors and ceilings, so APs located near each other on
different floors need to be set to non-overlapping channels. If another organization located
on a floor adjacent to your organization’s offices has a wireless network, the wireless APs
for that organization might interfere with the wireless APs in your network. Contact the
other organization to determine the placement and frequencies of their wireless Aps so
that you can ensure that any of your own wireless APs that provide overlapping coverage
use a different channel frequency.
• Identify overlapping wireless signals on adjacent floors within your own organization.
• After identifying overlapping coverage areas outside and within your organization, assign
channel frequencies for your wireless APs.
• Assign channel 1 to the first wireless AP.
• Assign channels 6 and 11 to any wireless APs that overlap coverage areas with the
first wireless AP, to ensure that those APs do not interfere with one another.
• Continue assigning channel frequencies to the wireless APs, ensuring that any two
wireless APs with overlapping coverage are assigned different channel frequencies.
Note that for roaming, a little bit of channel overlap (10-15%) is required. Otherwise, the
communication will be interrupted when a user is travelling from one AP to another AP.
The devices used in WLAN communications may be classified into Access Points (AP), Client Adapters,
Client Software, Antennas, and Wireless LAN Controller.
• Access Point (AP): Examples of APs are Cisco Aironet 3600 Series, Cisco Aironet 3500 Series, Cisco
Aironet 2600 Series equipment.
• Client Adapters: Wireless client adapters connect a variety of devices to a wireless network either in
ad hoc peer-to-peer mode or in infrastructure mode with access points. Cisco Aironet Wireless LAN
Client Adapters may be used to connect desktop and mobile computing devices to the wireless LAN
in 802.11a, 802.11b, or 802.11g-compliant networks. Most recent mobile devices and computers have
built in client adapters.
• Antennas: For home networks, omni directional antennas that come with the APs may be sufficient.
However, for communications between buildings, directional and omnidirectional antennas, low-loss
cable, mounting hardware, and other accessories can be used to customize a wireless solution that
meets the requirements
• Wireless LAN Controllers: Wireless controllers provide the visibility, scalability, and reliability for
large businesses that needs to build highly secure, enterprise-scale wireless networks. As the WLAN
becomes very large and spans several buildings, it becomes imperative to secure the network and
manage from a central location. This is where WLCs become handy. Cisco relates WLCs include
Cisco 5500 Series Wireless Controllers, Cisco 2500 Series Wireless Controllers, and Cisco Flex 7500
Series Wireless Controllers.
10. Appendix:
a. Troubleshooting Network Interface Card (NIC) For Physical Connectivity:
NIC is the interface between the computer Operating System and the external network, and
therefore a critical element in the networking of computers. Typically, an NIC consists of MAC
address, and driver software. The driver software is controlled by the TCP/IP protocol residing in
the Operating System.
The D-Link DGE-550SX 1000Base SX Network adapter has two LED indicators:
1. Link indicator (Link: Link up/down). This indicator goes green when the fiber port is
connected to the Ethernet network successfully.
2. Activity indicator (ACT - Transmitting/Receiving): When this indicator is blinking green, the
network adapter is either transmitting or receiving data to/from the Ethernet network.
A MODEM (MOdulator-DEModulator) is typically used to send digital data over a phone line. It
is a DCE device and connects a computer ( or any other DTE device) to the voice channel (dial-
up line). While transmitting the data, modem modulates the data into a signal that is compatible
with the phone line, and while receiving the data, the modem demodulates the signal back into
digital data.
i. Analog modem
ii. Digital modem
The analog modem is the one commonly used for connecting remotely to a router or switch. The
diagram below shows an analog modem.
As seen from the above figure, you can use an external modem, internal modem that sits on the
internal extension bus such as PCI bus, or and USB modem. For installing an analog modem, you
will be needing modem driver software. This software will be different for different Operating
Systems and you need to make sure that you have the right version of the driver software loaded
on to the computer before attempting to connect to any external host. Usually, the software will
also have self testing abilities that can be used for troubleshooting any problems with the
installation.
The following features are configured frequently for communicating between hosts
using a modem:
1. Speed : The speed at which the modem can send data in bps (bits per second).
Typically modem speeds are: 300, 600, 1200, 2400, 4800, 9600, 14.4K, 19.2K, 28.8K
bps
2. Auto Dial /Redial : Smart Modems can dial the phone number and & auto redial if
a busy signal is received.
3. Auto Answer : Most modems can automatically answer the phone when an
incoming call comes in. They have Ring Detect capability.
4. Self-Testing : New modems have self-testing features. They can test the digital
connection to the terminal /computer and the analog connection to a remote modem.
They can also check the modem's internal electronics.
5. Voice over Data : Voice over Data modems allow a voice conversation to take
place while data is being transmitted. This requires both the source and destination
modems to have this feature.
Analog Modems are used for dial-up connections. Modem configurations vary by
manufacturer. They use their own language for communication. The common
alphabets of modem speak is given below:
a-z -->“alphabet”
* -->“asterisk”
^ -->“carat”
- -->“hyphen”
$ -->“dollar sign”
: -->“colon”
% -->“percent sign”
@ -->“character command set”
& -->“ampersand”
\ -->“backslash”
)--> “parenthesis”
#--> “character command set”
1. AT Command Set
Ex: AT&FS0=1&C1&D3&K3&Q9&W
A digital modem is faster than a analog modem, it does not have to convert between
analog and digital signals. The types of digital modems are :
2. DSL Modem : DSL (Digital Subscriber Line) modem uses a copper wire
transmission technology to access high speed broadband Internet over telephone
lines. For more details on how to install and set up a DSL modem, click here.
Disclaimer
CertExams.com is neither affiliated with Cisco® Systems, Inc., Microsoft® Corporation, Inc., CompTIA® ,
Check Point Software Corp., Prosoft® or any other company. All trademarks are trademarks of their
respective owners and duly acknowledged.