You are on page 1of 151

TERHAD

Bahan Pembelajaran Bertulis

Institusi Latihan
Jabatan Tenaga Manusia

TEKNOLOGI TELEKOMUNIKASI
KERTAS PENERANGAN

Semester 5
ESTABLISHMENT
SIGN

TERHAD
Edisi Pertama Jun 2016

Institusi Latihan Jabatan Tenaga Manusia


http ://www.jtm.gov.my/kurikulum

Hak Milik Terpelihara. Dokumen ini diklasifikasikan sebagai TERHAD untuk kegunaan
ILJTM SAHAJA. Pihak luar tidak dibenarkan mengeluar ulang mana-mana bahagian
dalam kandungan Bahan Pembelajaran Bertulis (WIM) dalam apa jua bentuk sebelum
mendapat keizinan bertulis daripada Jabatan Tenaga Manusia (JTM).

Bahan Pembelajaran SEMESTER LIMA ini dibangunkan bagi kursus sepenuh masa di
Institusi Latihan Jabatan Tenaga Manusia (ILJTM) oleh Ahli Jawatankuasa
Pembangunan WIM dan disemak serta diluluskan oleh Jawatankuasa Pemandu
Kurikulum untuk tujuan gunapakai bagi semua ILJTM yang terlibat.

Kod Pengesahan WIM : WIM/L03/12016/S05


Kod Pengesahan Silibus : SFB/L03/12007/P2(32014)
Tarikh Pengesahan WIM : 14 Jun 2016
PENGESAHAN JAWATANKUASA PEMANDU KURIKULUM
KLUSTER ELEKTRONIK

Dengan ini adalah dimaklumkan bahawa Bahan Pembelajaran Bertulis (WIM) Kluster
Elektronik bagi kursus peringkat Sijil Teknologi Telekomunikasi - Semester Lima telah
DISEMAK dan DISAHKAN dalam Mesyuarat Jawatankuasa Pemandu Kurikulum (MJPK)
Bil.1/2016 yang diadakan pada 14 Jun 2016. Sehubungan itu, Bahan Pembelajaran
Bertulis (WIM) ini hendaklah digunapakai bermula Julai 2016 di seluruh Institusi Latihan
Jabatan Tenaga Manusia (ILJTM).

............................................. ................................................
(MOHAMAD HISAM BIN MOHD ADAM ) (SYED MOHAMAD NOOR BIN SYED MAT ALI)
Pengerusi Kluster Pengerusi
Jawatankuasa Pemandu Kurikulum
TABLE OF CONTENT

LIST OF MEMBERS OF WIM ............................................................................................. i


INFORMATION SHEET MODULE 1 .................................................................................1
L03-05-21 TRANSMISSION MANAGEMENT................................................................1
GROUP CLUSTERING MODULE 1 ..............................................................................2
LA1 CONDUCT HIGH END EQUIPMENT INSTALLATION ACTIVITIES 4
LA2 REPORT HIGH END EQUIPMENT MAINTENANCE ACTIVITIES 42
INFORMATION SHEET MODULE 2 ...............................................................................68
L03-05-22 NETWORK MANAGEMENT .....................................................................68
GROUP CLUSTERING MODULE 2 ............................................................................69
LA1 PLAN PROVISIONING AND MONITORING ACTIVITIES 71
LA2 CONDUCT NETWORK ADMINISTRATION & MANAGEMENT
SYSTEM (NMS) PROVISIONING AND MONITORING
ACTIVITIES 105
LIST OF MEMBERS OF WIM
DIPLOMA IN TELECOMMUNICATION TECHNOLOGY

Committee Member :

1. Mohamad Hisam Bin Mohd Adam ADTEC Kulim


(Chairman of the Electronics Cluster)

2. Rezawati Binti Ismail ADTEC Melaka


(Assistant Chairman of the Electronics Cluster)

3. Rozitah Binti Mohd Kassim ADTEC Melaka


(Chief Coordinator)

4. Ayub Bin Mohd Rasidi ILP Kepala Batas


(Assistant Chief Coordinator)

Secretariat :

1. Norida binti Othman BKT, Ibu Pejabat

2. Syed Azmir Bin Syed Zamri BKT, Ibu Pejabat

Session 1 :
Development date : 25 – 28 Mei 2015
Place : Hotel Wana Riversid, Melaka

Session 2 :
Development date : 27– 30 Julai 2015
Place : Hotel Midah, Kuala Lumpur

Session 3 :
Development date : 28 – 1 Oktober 2015
Place : Hotel Cititel Express, Kuala Lumpur

i
SHORT LIST

IS INFORMATION SHEET
WS WORK SHEET
AS ASSIGNMENT SHEET

KOD KURSUS

SEMESTER

KOD MODUL

NO. LA

JENIS WIM

L03-05-21-LA1-IS

ii
INFORMATION
SHEET MODULE 1
L03-05-21 TRANSMISSION MANAGEMENT
GROUP CLUSTERING MODULE 1

L03-05-21-LA1 CONDUCT HIGH END EQUIPMENT INSTALLATION ACTIVITIES

C04.01 Identify High End Equipment Installation And Maintenance Requirement


C04.02 Plan High End Equipment Maintenance Activities
C04.03 Conduct High End Equipment Installation Activities
C04.04 Conduct High End Equipment Maintenance Activities

L03-05-21-LA2 REPORT HIGH END EQUIPMENT MAINTENANCE ACTIVITIES

C04.05 Report High End Equipment Maintenance Activities

2
INSTITUSI LATIHAN
JABATAN TENAGA MANUSIA
KEMENTERIAN SUMBER MANUSIA
MALAYSIA

INFORMATION SHEET
COURSE CODE
L03 DIPLOMA IN TELECOMMUNICATION TECHNOLOGY
AND NAME

MODULE CODE
L03-05-21 TRANSMISSION MANAGEMENT
AND NAME

LA1 CONDUCT HIGH END EQUIPMENT INSTALLATION


LEARNING ACTIVITIES
ACTIVITY (LA) LA2 REPORT HIGH END EQUIPMENT MAINTENANCE ACTIVITIES

C04.01/L4,
C04.02/L4,
CU.WA NO./
C04.03/L4,
LEVEL
C04.04/L4,
C04.05/L4

PERFORM TRANSMISSION MANAGEMENT USING WORK ORDER,


CHECKLIST, MEASURING AND TEST EQUIPMENT, HIGH END
TERMINAL EQUIPMENT, FLOOR PLAN LAYOUT/ DIAGRAM, MANUFACTURER
PERFORMANCE TECHNICAL MANUAL & HAND TOOLS SO THAT HIGH END
OBJECTIVE EQUIPMENT INSTALLATION & MAINTENANCE ACTIVITIES
CONDUCTED AND REPORTED IN ACCORDANCE WITH RULES AND
REGULATIONS AND STATUTORY BODY REQUIREMENTS.

WIM/L03/12016/S05 PAGE 3
LA1 CONDUCT HIGH END EQUIPMENT INSTALLATION ACTIVITIES

1. IDENTIFY HIGH END EQUIPMENT INSTALLATION AND MAINTENANCE


REQUIREMENT

1.1. Occupational Safety and Health (OSHA) Requirement

Prior to the 1980s, communication and broadcast tower erection, servicing


and maintenance were a very small and highly specialized industry. Over the past
30 years, the growing demand for wireless and broadcast communications has
spurred a dramatic increase in communication tower construction and
maintenance.

In order to erect or maintain communication towers, employees regularly


climb towers, using fixed ladders, support structures or step bolts, from 100 feet
to heights in excess of 1000 or 2000 feet. Employees climb towers throughout the
year, including during inclement weather conditions.Some of the more
frequently encountered hazards include:

 Falls from great heights


 Electrical hazards
 Hazards associated with hoisting personnel and equipment with base-
mounted drum hoists
 Inclement weather
 Falling object hazards
 Equipment failure
 Structural collapse of towers

In 2013, OSHA recorded a total number of 13 communication tower-


related fatalities. In the first half of 2014, there have already been nine fatalities at
communication tower work sites. This represents a significant increase in
fatalities and injuries from previous years, and OSHA is concerned at this trend.
OSHA is working with industry stakeholders to identify the causes of these
injuries and fatalities, and to reduce the risks faced by employees in the
communication tower industry.

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 4


1.1.1. You have the right to save workplace
You have the right to save workplace.The Occupational Safety
and Health Act of 1970 (OSH Act) was passed to prevent workers from
being killed or seriously harmed at work. The law requires employers to
provide their employees with working conditions that are free of known
dangers. The Act created the Occupational Safety and Health
Administration (OSHA), which sets and enforces protective workplace
safety and health standards. OSHA also provides information, training
and assistance to workers and employers. Workers may file a
complaint to have OSHA inspect their workplace if they believe that
their employer is not following OSHA standards or that there are
serious hazards.

1.1.2. Worker Right under the OSH Act


To help assure a safe and healthful workplace, OSHA also
provides workers with the right to: Ask OSHA to inspect their
workplace;
Use their rights under the law without retaliation and
discrimination;
 Receive information and training about hazards, methods to
prevent harm, and the OSHA standards that apply to their
workplace. The training must be in a language you can
understand;
 Get copies of test results done to find hazards in the workplace;
 Review records of work-related injuries and illnesses;
 Get copies of their medical records;

1.1.3. OSHA standards: Protection on the Job


OSHA standards are rules that describe the methods that
employers must use to protect their employees from hazards. There
are OSHA standard for construction work, Agriculture, Maritime
operations and General Industry, which are the standards that apply to
most work sites. These standards limit the amount of hazardous
chemicals workers can be exposed to, require the use of certain
safe practices and equipment, and require employers to include

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 5


requirements to: provide fall protection, prevent trenching caveins,
prevent some infectious diseases, assure that workers safely enter
confined spaces, prevent exposure to harmful substances like
asbestos, put guards on machines, provide respirators or other safety
equipment, and provide training for certain dangerous jobs. Employers
must also comply with the General Duty Clause of the OSH Act, which
requires employers to keep their workplace free of serious recognized
hazards. This clause is generally cited when no OSHA standard applies
to the hazard.

1.1.4. Employer Responsibilities


Employers have the responsibility to provide a safe
workplace. Employers relevant OSHA safety and health standards.
Employers must find and correct safety and health problems. OSHA
further requires employers to try to eliminate or reduce hazards first by
making changes in working conditions rather than just relying on
masks, gloves, ear plugs or other types of personal protective
equipment PPE). Switching to safer chemicals, enclosing
processes to trap harmful fumes, or using ventilation systems to clean
the air are examples of effective ways to get rid of or minimize risks.
Employers MUST also:

 Inform employees about hazards through training, labels, alarms,


color-coded systems, chemical information sheets and other
methods.
 Keep accurate records of work-related injuries and illnesses.
 Perform tests in the workplace, such as air sampling required by
some OSHA standards.
 Provide hearing exams or other medical tests required by OSHA
standards.
 Post OSHA citations, injury and illness data, and the OSHA
poster in the workplace where workers will see them.

 Notify OSHA of all work-related fatalities within 8 hours, and all


work-related inpatient hospitalizations, all amputations and all
losses of an eye within 24 hours. [Employers under federal OSHA's
L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 6
jurisdiction were required to begin reporting by Jan. 1, 2015.
Establishments in a state with a state-run OSHA program should
contact their state plan for the implementation date.
 Not discriminate or retaliate against a worker for using their rights
under the law.

1.1.5. Your right to report injuries


As a worker, you have the right to report work-related injuries and
illnesses. Under OSHA law, your employer must develop a process for
workers to report a workplace injury or illness and ensure that you are
able to use this process. It is your employer's responsibility to
guarantee that workplace practices do not discourage workers from
reporting their injuries or illnesses. If your employer does discriminate
or retaliate against you for trying to report an injury or illness, you have
the right to file a retaliation complaint with OSHA. You must file the
complaint with OSHA within 30 days of the alleged reprisal.

1.1.6. What to do if there is a Dangerous Situation at Work


If you believe working conditions are unsafe or unhealthful, we
Recommend that you bring the conditions to your employer's attention,
if possible.You may file a complaint with OSHA concerning a
hazardous working condition at any time. However, you should not
leave the work site merely because you have filed a complaint. If the
condition clearly presents a risk of death or serious physical harm,
there is not sufficient time for OSHA to inspect, and, where possible,
you have brought the condition to the attention of your employer, you
may have a legal right to refuse to work in a situation in which you
would be exposed to the hazard.

1.2. Purpose of Work Order


To provide an orderly means of communication between Facilities
Management and the community to report and track needed maintenance
work.
• Facilities Management uses the system to assign work to various crafts,

Track progress, and keep up with cost of labor and materials.

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 7


• Facilities Management's function is to provide material and labor to
maintain ETSU buildings, equipment and grounds.

1.3. Procedure to acquire Work Order

The example of procedures to acquire the work order as follow below:


• Fill out a work order for maintenance problems that need the attention of

Facilities Management or submit a request through the i Service Desk


system.
Please include the following information with your request:
• Name of Requester

• Phone number of requester

• E-mail address of requester (if applicable)

• Building where work is needed

• Room number where work is needed

• Description of request or needed work

• Funding source (if a Special Service Request and funding has been

Identified) Account

• Time Frame

• Be as specific as possible as to the location and nature of the problem.

• List any special conditions such as desired or preferred time to perform


the work as well as times when work can't be done.

• Work orders will be assigned a numerical number and entered into our
computer system. Work orders are assigned a priority as to completion
time:

Routine: 30 days or less

Low Priority: 60 days or less

Set Date: Specific Dates requested for set-ups or events

Urgent: 1-7 days response

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 8


Emergency: 1 day response

1.4. Procedure of high end installation and maintenance


Introduction Communication systems are made of physical things that
wears out (or changes) over time. It is difficult to see the change, because
there are very few moving parts. However, the components (transistors,
capacitors, microprocessors, etc.) that make up devices that are part of a
communication system do change, and lose their performance tolerances.
When enough components operate at less than specification, the overall
system (or device) will not perform as required. Operationally speaking, there
is not a huge difference between a freeway system and a communication
network. Both wear out from use and require maintenance and revitalization.

Communication networks should be treated as any other element of a


modern transportation system. DOTs need to provide an adequate budget for
maintenance, and training for personnel to become familiar with the elements
of the communication equipment. The DOT technicians don't have to be
capable of repairing the communications equipment. They simply have to be
able to determine when the communication hardware is not functioning, and
in many cases replace the device with a spare.
Most manufacturers provide a detailed manual of installation, testing
and maintenance recommendations. Many provide on-site and factory depot
service plans. The use of these plans may be a critical part of your overall
maintenance program.
Systems maintenance and upgrade is crucial to efficient operations. All
communication equipment does eventually wear out, or reach the end of
useful operational life. The communication system is the glue that unites the
elements of a traffic signal, Fault Management System (FMS), or ITS system,
keep it operating with an efficient maintenance and upgrade program.
Some manufacturers will make significant claims about the reliability of
their products. Many will claim MTBFs (mean-time-between-failures) that
make it seem as though failures occur once in a million years. But, nothing
lasts forever.
Communication hardware normally fails either during, or just after,
installation. These failures are the direct result of manufacturing "birth

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 9


defects" – that is, the manufacturing testing process fails to identify a
manufacturing error, or substandard component. However, the leading cause
of near term failures is the result of improper installation or operation.
Hardware manufacturers have standard component testing procedures to
help assure that virtually all equipment leaving the production facility meets
specifications (more on this subject later in the chapter).
Installation failures are caused when technicians fail to familiarize
themselves with the manufacturer's recommendations. Many technicians will
try to use shortcuts to reduce the installation time, or because they have
installed similar equipment and believe that there are no differences between
devices manufactured by different companies. Another common error is to
assume that there won't be differences between old and new versions of the
same device.
On a long term basis, most failures are the result of electronic
component aging (through constant heating and cooling components will fail
to meet original specifications). Systems will either fail, or develop
substandard functional characteristics.
Don't forget that equipment also fails because of lightning strikes,
electrical power surges, and connection of electrical power to a
communications port.
The following are examples of types of telecommunications equipment
installers and repairers procedures:
i. Central office technicians set up and maintain switches, routers, fiber optic
cables, and other equipment at switching hubs, called central offices. These
hubs send, process, and amplify data from thousands of telephone, Internet,
and cable connections. Technicians receive alerts on equipment
malfunctions from auto-monitoring switches and are able to correct the
problems remotely.

ii. Head end technicians perform similar work to central office installers and
repairers, but work at distribution centers for cable and television companies,
called head ends.

iii. PBX installers and repairers set up and service private branch exchange
or PBX switchboards. This equipment relays incoming, outgoing, and
L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 10
interoffice telephone calls at a single location. Some systems use computers
to run Internet access, network applications, and telephone communications,
and support Voice over Internet Protocol or VoIP technology.

iv PBX installers connect telecommunication equipment to communications


cables. They test the connections to ensure that adequate power is available
and communication links work properly. They install frames, supports, power
systems, alarms, and telephone sets. Because switches and switchboards
are computerized, Private Branch eXchenge (PBX) installers also install
software or program the equipment.

v Station installers and repairers sometimes known as home installers and


repairers set up and repair telecommunications equipment in customers’
homes and businesses. For example, they set up modems to install
telephone, Internet, or cable television services.

vi. When customers have problems, station repairers test the customer’s
lines to determine if the problem is inside or outside. If the problem is inside,
they try to repair it. If the problem is outside, they refer the problem to line
repairers.

1.5. Type of maintenance

1.5.1. General rules


• Check that the equipment is operating with all the shields properly

Positioned (dummy covers, Electro Static Discharge (ESD) connector


protections, etc).

• In order to reduce the risk of damage the electrostatic sensitive

Devices, is mandatory to use the elasticized band (around the wrist) and
the coiled cord joined connect with the ground rack during the touching
of the equipment.

1.5.2. Maintenance Aspects


Maintenance consists of a set of operations which maintain or
bring back the assembly to optimum operating conditions in a very
short time, with the aim of obtaining maximum operational availability.

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 11


Maintenance is classified as:

• ROUTINE

• CORRECTIVE

1.5.3. Instruments and accessories


There is a local terminal (PC) which permits to display all the
alarms and manages the Equipment. The relative processing is
described in the operator's handbook. Where Telecommunication
Management Network (TNM) is implemented, an Operation System
displays alarms and manages all the connected Equipment's of the
network. Refer to the relevant handbooks. The need of special tools
and accessories to perform possible routine and corrective
maintenance procedures is described inside the procedures
themselves.

1.5.4. Routine Maintenance


Routine maintenance is a periodic set of measurements and
checks. This maintenance discovers those devices whose function has
deteriorated with time and therefore need adjustment or replacement.
Typically, digital equipment requires no routine maintenance. The
equipment allows to assess the quality of the connection links for
SECTION and PATH o counting the error events and obtaining
performance data. The Performance Monitoring Application, described
in the Operator's Handbook, allows this function.

1.5.5. Routine maintenance every three months


According to the filter type It is suggested to carry out the
following operations every three months:
–Metallic filter cleaning
–Dust filter substitution

1.5.6. Routine maintenance every year


It is suggested to carry out the following operations yearly:

•power cables check

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 12


1.5.7. Routine Maintenance every five year
It is suggested the replacement of each FANS UNIT equipped in
the Fans Sub rack or in the “Mechanical Structure with Integrated
Fans" after five years of working.

Table 1.1 : Routine Maintenance Scheduling


Item Maintenance
Item Maintenance
Fans unit Substitution every 2 years.
Fan unit dust filter Cleaning every 6 (or 12) months.
Substitution every 2 years.
Shelf airflow Check the internal airflow every 6 months.
Power cables Check fixing every year.

1.5.8. Corrective Maintenance (Troubleshooting)


Purpose of the procedure
Troubleshooting involves the detection, location and correction of
failures in the equipment and the replacement of the defective parts.

Since the Troubleshooting procedure is carried out with the use of the
Craft Terminal, please refer, for details, to the Maintenance Section of
the Operator's Handbook.

FIXING THE UNITS (AND MODULES) INTO THE SUBRACK

(caution to avoid equipment damage)

The screw tightening torque for fixing the units (and modules, if any and
if fixed by screws) into the subrack must be:

2.8 kg x cm (0.28 Newton x m) +/- 10 %

Exceeding this value may result in screw breaking.

Fan unit substitution


DANGER: Possibility of personal injury. Personal injury can be
!
caused by -48 V dc.

DANGER: Possibility of personal injury. Short circuiting, low–


voltage, low–impedance, dc circuits can cause severe arcing
L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 13
that can result in burns and/or eye damage. Remove rings,
watches, and other metal jewellery before working with primary
circuits. Exercise caution to avoid shorting power input
terminals. When an ALM_URG alarm is displayed on C.T or
O.S. (associated to an Housekeeping alarm) it means that at
least one fan is broken, so it is necessary to replace the “FAN
unit" involved.

These alarm indications are also displayed on the Fans front panel.

– With the “FANS Shelf"

• unscrew the screws that ensure the Fan unit to the fans shelf

• extract the Fan unit from the Fan shelf by means the extractors kit,
using the central hole under the led

• insert the new Fan unit into the Fan shelf

• ensure the Fan unit to the “FAN shelf“ using the relevant screw

– With the “Mechanical Structure with Integrated Fans"

• unscrew the screws that ensure the Fan unit to the fans shelf

• extract the Fan unit from the shelf by means the two card lever

• insert the new Fan unit into the Fan shelf

• ensure the Fan unit to the “FAN shelf“ using the relevant screw

1.6. Site Survey Documentation

1.6.1. Site Survey


The Site Survey is a critical step in the successful deployment of
the wireless system. It is important in that it will yield a quick
assessment of the feasibility of any given proposed site antenna and
equipment location. Using the Site Survey Checklist, enter the
information as required. Is the necessary physical space available for
installing the radio equipment cabinet and server/workstation? Verify
that the required space is available.
i. Is this area readily accessible by Service and Installation
personnel? If not, what are the restrictions, and are they

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 14


acceptable to the operator / service contractor? Are access key(s) or
contact with specific person(s) required?
ii. Are building environmental codes prohibitive? Be sure to check
local by- laws for compliance.
iii. What is the elevation above ground level (AGL) of the antennas at
the intended locations? This may be measured by altimeter (typically
these devices are accurate to within 1meter, but must be calibrated
frequently), or worst-case by simply counting number of floors in a
building or sections on a tower, etc. This data is critical in assessing
Fresnel zone clearances.
iv. What are the geographic coordinates of the proposed sites? A
hand-held GPS unit should be used to measure the coordinates and
distance between sites accurate to within 50ft. This data is required
for link budget calculations necessary in evaluating the
feasibility of the proposed link. Note that in the case of extremely
short links of 1km or less, it is often easy to estimate distance quite
accurately without the use of tools such as GPS units, and obvious
when clear line-of-sight conditions exist. However, as a rule, thorough
documentation of site data including geographic co-ordinates is
recommended.
v. Is Line-of-Sight available between the antennas? Refer to the link
path analysis tool. For most reliable communication, the first Fresnel
zone must be clear of all obstructions, including ground.
vi. Is the proposed antenna location sufficiently far from objects in
immediate vicinity? For directional antennas, no objects (especially
metallic ones) should be within 3meters of the antenna main beam.
For Omni-directional antennas, the above applies in 360-degree
direction.
i. Is the proposed mechanical antenna support adequate, or must
additional work be done?
• Is a civil engineering study required?
• Is an engineering stamp required on drawings?

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 15


ii. Is a physical cable run feasible? Do access paths exist, or must
holes be drilled through floors and/or ceiling? What is the minimum
length required to connect antenna and radio, and radio to
network? Remember that transmission line loss (hence length)
should be minimized. What are the restrictions, if any, on cable
size, and bend radius? What are the lengths for the Ethernet cable
runs?
iii. Is the environment (temperature, humidity, etc.) maintained within
the operating requirements of the wireless radios? Is heating or air-
conditioning required? Most radio requirements are:
Operating temperature range: min. 0º, max. +55ºC
Humidity: 10% to 90%, non-condensing
iv. Is Primary Power available where needed? Nominal primary power
is 110-220VAC, 50/60Hz. UPS are used throughout the radio
system. Power circuits with known susceptibility to surges should
be avoided.
v. Is existing grounding adequate or must additional measures are
taken? That good grounding is especially important where the
installation of the lightning arrestor is concerned. The ground
should be attached within two (2) feet of the first entry point into
the building or structure housing the radio system. Typically, the
ground used may be the building structural steel or existing
lightning arrestor ground conductors. Do not use water pipes, gas
lines, or electrical system conduit. In cases where the ground
conditions are in question, a ground resistance measurement must
be done. This requires specialized equipment and is best
performed by the appropriate contractor.

1.6.2. Site survey Documentation


Request that the customer provides all or some of the following
documents and drawings:

 Site plan

 Floor plans

 Elevation plans
L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 16
 Roof plans

1.6.3. Reflected ceiling plans with light fixture locations


 Power plans with possible EMI sources

 Outlet location plans

 Mechanical plan with HVAC duct locations

 Sprinkler plan with sprinkler pipe locations

1.6.4. Site Survey Checklist


Before going to site checklist where possible, before going to site
obtain the following information:

 Does the fault require immediate attention?

 Determine who is the best-placed person to attend the


fault.

 Confirm the nature and severity of the reported fault, its


location, MPT type, frequency band, high/ low end
MPT, capacity modulation and configuration.
Ask:

 Is just one link affected, or a number of links in the same


geographical area?

 Is the path down completely or is traffic passing but with a


BER alarm?

 Could the fault be in the equipment connected to MPT,


rather than in MPT? Are there alarms on other, connected
equipment?

 Is it a hard or intermittent fault?

 Do alarms confirm which end of an alarmed link is faulty?

 Could the weather (rain, ice, high wind, temperature) be a


factor in the reported fault?

 Note: If the fault suggests a rain fade or other weather


related fade condition and it matches the prevailing
weather conditions, do not take any action until the
weather abates.

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 17


 Does link history suggest any fault trends?

 Does the fault history for the link indicate a likely cause?

 Is the link newly installed?

 Has there been any recent work done on the link?

Ensure that you have with you:


 Appropriate spares. Where an equipment failure is
suspected, these should include replacement of the
MPR-e. If an MPR-e is suspected then local/national
climbing safety requirements must be adhered to.

 A laptop PC loaded with Craft Terminal, and an Ethernet


cable. If an Ethernet connection is to be used, you need
the IP address and also the addresses for any remote
sites to be accessed.

 If lo gin security has been enabled, you need the password


for the local and also any remote sites to be accessed.

 Any special test equipment that may be needed, such as a


BER (Bit Error rate) tester.

 Tool kits.

 Key(s) for access to the sit

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 18


Site Name: ______________ Site Address:
________________________________________________________________

Site Latitude: Deg.: _____ Min: ______ Sec.: ______


Site Longitude: Deg.: _____ Min: ______ Sec.: ______
Site Access hours: ______________ Access route: _________ (year-
round?)
FCC Tower ID#: ______________
Contact Name: ______________________
Tel. No.: _________________
Waypoint No.: __________

S.A. Filename Frequency Azimuth (Mag. Polarization


North)

Attach Floor Plan/Elevation Plan Sketch to scale, indicating proposed


location of equipment

Site Photograph available? Yes___ No___

Is grounding adequate? _____________(Especially important for lightning


arrestor installation at transmission line entry point into building).Indicate
(on sketch) proposed grounding connections.

Is primary power provision adequate? Yes___ No____ TBD___

Indicate (on sketch) proposed primary power connection point.


Is Line-of-Sight available to facing site(s)? Yes___ No____ TBD ___

Sketch on scale map, the location of possible obstructions. Use a GPS


unit to identify location of each potential obstruction, including
coordinates and distance from one of the antenna sites.

Horizon Photograph in direction of facing site____


L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 19
Ground elevation AMSL _______ m. / ft.

Height of antenna AGL, at proposed location on tower_______ m. / ft.

Height of Tower AGL, if used1: _______ m. / ft.

Site Agreement required? Yes___ No____ TBD ___

Approval to install antenna required? Yes___ No____

Nearest Airport _______km / miles

Estimated Transmission Line length ______ m. / ft.

Indicate Transmission line proposed routing on layout drawing.

CAT5 Cable length required _______ m. / ft. (EUM / NMS Workstation /


NAP Router)

List any possible cable routing difficulty (e.g., bend-radius


limitations)____________________________

Is temperature environment within LMS specification limits? Yes___


No____ TBD ___

Recommended:

Site Noise Level ________ dBm, maximum level across 2400 to


2483.5MHz band (Spectrum Analyzer measurement required, using a
directional antenna of known gain)

Note any spot-frequency interference

1.7. Site Survey Report


Site identification
On-Site multiservice node - Final test

ON-SITE MULTISERVICE NODE FINAL TEST

SITE

EQUIPMENT TYPE

EQUIPMENT RELEASE

SUBRACK Serial Number

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 20


On-Site multiservice node - Final test: Local measurements
Unit Type Serial number

Slot 1

Slot 2

Slot 3

Slot 4

Slot 5

Slot 6

Slot 7

Slot 8

Slot 9

Slot 10

Slot 11

Slot 12

Slot 13

Slot 14

Slot 15

Slot 16

Slot 17

Slot 18

Slot 19

Slot 20

Slot 21

Slot 22-30

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 21


Electrical ports check
Expected Value
Measure Measured UM
and Tolerance
Value

Free-running frequency check 2048 + - 4.6ppm kHZ

2 Mbit/s
– Multi-demultiplexing check and AIS 0 errors errors
forwarding to the ports. 0 errors errors
– EPS protection check. 0 errors errors
– Electrical ports Daisy Chain.

34/45 Mbit/s
0 errors errors
– Multi-demultiplexing check and AIS
forwarding to the ports. 0 errors errors
– EPS protection check. 0 errors errors

– Electrical ports Daisy Chain.

0 errors . errors
GETH MB/ATX 0 errors errors
– Multi-demultiplexing check and AIS
forwarding to the ports
– EPS protection chec

ETH MB/ATX 0 errors errors


– Multi-demultiplexing check and AIS 0 errors errors
forwarding to the ports.
– EPS protection check.

STM-1 0 errors errers


– Multi-demultiplexing check and AIS 0 errors errors
forwarding to the ports. 0 errors errors
– EPS protection check.
– Electrical ports Daisy Chain.

DVB-ASI check
– Multi-demultiplexing MPEG2 check. 0 errors errors
– EPS protection check. 0 errors errors

ISA-BCE E1 check 0 errors errors


– Multi-demultiplexing SHDSL check.

ISA-BCE ETH check 0 errors errors


Multi-demultiplexing SHDSL check.

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 22


1.8. Technical Manual
General characteristics

Optical Line bit rate SDH:155.520 Mbit/s (STM-1)


622.080 Mbit/s (STM-4)
2488.320 Mbit/s (STM-16)
9953.280 Mbit/s (STM-64)
SONET:155.520 Mbit/s (OC-3)
622.080 Mbit/s (OC12)
Electrical Line bit SDH:155.520 Mbit/s (STM-1)
rate SONET:155.520 Mbit/s (OC-3)
PDH:139.264 Mbit/s (PDH)
Type of optical fiber Single mode according to ITU-TG.652, G.654 and Multimode
G.651.
Wave length See page 604, Table 63. on page 611, Table 65. on page 613
and Table 67. on page 616 .
Span length Depending on fiber type and and optical power budget
reported on page 604, Table 63. on page 611, Table 65. on
page 613 and Table 67. on page 616.
Application types TM and ADM in protected and unprotected linear links and
rings
DXC (64 STM-1 equivalent port at VC12 level)
ITU-T G.703 for electrical interfaces
Applied standards ITU-T G.707 for SDH frame and multiplexing structure
ITU-T G.957 and G.958 for optical interfaces
ITU-T G.821 and G.826 for transmission quality
ITU-T G813 for synchronization
ITU-T G.783 and G.841 for network protection architectures
ITU-T G.784 and G.774 for system management functions
ITU-T G.662 and G.663 for optical amplification
Max quantity of 378 x 2Mbit/s interfaces
each interface per 48 x 34 or 45 Mbit/s interfaces
shelf 64 x 140Mbit/s interfaces
256 x STM-1 electrical or optical interfaces
64 x STM-4 optical interfaces
16 x STM-16 optical interfaces
4 x STM-64 optical interfaces
300 x Ethernet 10/100 Base T
64 x Ethernet 1000 Base SX/LX

Add-Drop and
Crossconnect
features
–Cross- (256 x 256) STM1 equivalent ports at VC12 and VC3 levels
Connections (384 x 384) STM-1 equivalent ports at VC-4 level.
capacity
–Cross connect 1660SM has a symmetrical architecture. All traffic port (PDH
features SDH) of the same type have the same functionality and
behavior and there is no inherent split between tributaries and
aggregates. This means that it is possible the allocation of the
PDH and VCi signals into every port.
Connection of concatenated AU4-4c among STM4,STM-16,
STM-64 ports is supported
Transmission 125 μs maximum for any traffic pathway
delay
L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 23
1.9. Functionality of High End equipment

1.9.1. Common units

A. EQUICOE unit (also called PQ2/EQC and PQ2/EQCN)

The unit provides the following functionality:

 Equipment Controller (EC) function

 F interface for Local Craft Terminal

 USB interface for Local Craft Terminal (not operative


in current release)

 Communication with the Operation System (OS)


through different interface (DCC, QB3 etc.)

B. MATRIXE unit

The unit provides the following functionality:

 Matrix that performs HPC, LPC and protection


functions

 Synchronization functions

 Shelf Controller (SC) function

C. SERVICE unit

Two units are provided to manage the Services Interfaces


(in alternative).The first type of SERVICE unit provides all
the following functionality:

 Auxiliary channels

 Engineering Order Wire (EOW)

 MHz Input/Output (synch)

The second type of SERVICE unit provides the 2 MHz


Input/Output (synch.) functionality only.

D. CONGI unit

The unit provides the following functionality:


 Power Supply
 QB3 Interface
 Housekeeping and remote alarm
L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 24
 Q2/RQ2 interface

1.9.2. Port units


A. 2 or 34/45Mbit/s PDH Electrical unit

Different PDH Electrical unit are available


- 2Mbit/s PDH Electrical unit" provides the interface for the
asynchronous mapping G.703 2Mbit/s signals into SDH
VC12s.Each unit supports 63 interface. The unit is the same for
75 Ω and 120 Ω. Applications; impedance match is performed
at the “access card" level.
- "34Mbit/s / 45Mbit/s unit" provides the interface for the
asynchronous mapping of G.703 34Mbit/s or 45Mbit/s
signals into SDH VC-3s. Each unit supports 3 interface.The
selection of the working mode (3 x 34 Mb/s or 3 x 45 Mb/s) is
controlled via software.Two different access module are used for
the 34 Mb/s and 45 Mb/s applications.For both units the Lower
Order Interface (LOI) block includes PPI (physically on the
Access Card), LPA, LPT functionality

B. 4 x 140 Electrical or 155Mbit/s E/O unit

The unit provide four 140 PDH electrical or 155Mbit/s STM-1

Electrical/Optical interfaces.The selection of the working mode


(per port) is controlled via software:
- When the 140Mbit/s mode is selected, the port provides an
interface for the asynchronous mapping of G.703 140Mbit/s
signals into SDH VC-4. The functions performed in the High
Order Interface (HOI) block are: PPI (Physically on the Access
Card), LPA, HPT (Two of the four PPI blocks are present on the
board, the other two are on the Access Card.
- When the 155Mbit/s STM-1 mode is selected, the VC-4
can either be unstructured or structured into lower order VCs.
The functions performed are Total Transmit Frame (TTF) and
HOA. Two of the four SPI blocks are present on the board, the
other two are on the Access Card.

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 25


2. PLAN HIGH END EQUIPMENT MAINTENANCE ACTIVITIES

2.1. Site location


Navigator area
The Navigator menu depends on the selected function in the upper tab-
panels. Four tab-panels are available:

i. Commissioning

 Inventory

 Software download for MPR-e standalone

 Configuration

 Date/time

 Site information

 Radio scheme configuration

 1+1 HSB configuration

 Radio

 Advanced Radio

 Ethernet traffic QoS

 TDM cross-connections

 Networking

 Backup / restore

 Monitoring

ii. Performance monitoring

 Performance history file upload

 Normalized

 Adaptive modulation

 Qos (Quality of Services) Ethernet

 Traffic port Ethernet

 Monitoring
L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 26
iii. Troubleshooting

 Inventory

 Troubleshooting

 Monitoring

iv. Maintenance

 Inventory

 Software download for MPR-e standalone

 Configuration > Radio

 Monitoring

The System Overview tab-panel (Figure 53 and Figure 58) is a read-only


screen, which shows all the configuration parameters of the MPT.

2.2. High end equipment installation procedure


MPR-e standalone: installation & interconnection overview. This section
describes the possible final hardware configurations of MPR-e standalone.

Figure 1.1 : Station interconnections with MPT-MC (Power Injector box/MPT


Extended Power Unit)

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 27


Figure 1.2 : Station interconnections with MPT-Medium Capacity (Power Injector
card)

Figure 1.3 : Station interconnections with MPT-High Capacity V2/9558HC (Power


Injector box/ MPT Extended Power Unit)

Figure 1.4 : Station interconnections with MPT-HC V2/9558HC (Power Injector card)

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 28


Figure 1.5 : Station interconnections with MPT-HC V2/9558HC
(MPT power unit)

Figure 1.6 : Station interconnections with MPT-HC V2/MPT-XP/9558HC


(MPT Extended Power Unit)

Figure 1.7 : Station interconnections with MPT-HC V2 - 1+0 repeater configuration


L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 29
Figure 1.8 : Station interconnections with MPT-HC V2/9558HC -
1+0 repeater configuration (MPT Power Unit)

Figure 1.9 : Station interconnections with MPT-HC V2/MPT-XP(high Power) 9558HC


-1+0 repeater configuration (MPT Extended Power Unit)

Figure 1.10 : Station interconnections with MPT-HC V2 - co-


channel XPolarized Interference Cancellation (Power Injector box)

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 30


Figure 1.11 : Station interconnections with MPT-HC V2 - co-
channel XPIC (7705 SAR)

Figure 1.12 : Station interconnections with MPT-HC V2/MPT-XP - co-channel XPIC


(MPT Extended Power Unit)

Figure 1.13 : Station interconnections with MPT-HC V2/MPT-XP -


co-channel XPIC

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 31


Figure 1.14 : Station interconnection with MPT-HC V2/MPT-XP/9558HC -1+0
repeater configuration

2.3. High end equipment installation method


A How to connect the MPT-HC V2 to the battery
Figure 1.15 shows the devices used to connect a MPR-e directly
to a battery.
Note: this type of powering is only possible when the connection
to the MPR-e is by optical fiber. From front to back:

 Coaxial cable with N connectors

 Wall mount support 3CC50149AAXX (max 4 MPT)

 Lightning arrestor with its grounding cable

 Low pass filter

 Cable N to two wires ("pigtail")

 Grounding kits

 Cable N to RJ-45 (.pigtail.)

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 32


Figure 1.15 : MPT-HC V2 directly connected to the battery

B MPR-e in Single NE with 7705 SAR : installation &


interconnection

Overview
The figures 1.16 in this section describes the possible final
hardware configurations of MPR-e in Single NE with 7705 SAR.

Figure 1.16 : Station interconnections with MPT-MC/MPT-HC v2 (Power


Injector card)

Figure 1.17 : Station interconnections with MPT-HC V2 (MPT power unit)

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 33


Figure 1.18 : Station interconnections with MPT-HC V2/MPT-XP (MPT
Extended Power Unit)

Figure 1.19 : Station interconnections with MPT-HC V2 - co-channel


XPIC (7705 SAR)

Figure 1.20 : Station interconnections with MPT-HC V2 .

C. Hardware installation

 Power consumption

 MPT-HC V2/MPT-XP/9558HC installation on


 MPT-MC installation
 Power injector
 Installation items
 Antenna alignment

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 34


2.4. Installation information for high end installation and maintenance
including:-

A Equipment list

A wide range of ports can be added/dropped/connected by the


equipment according to the traffic type to be managed:
- 2.048Mbit/s Electrical/Optical signal (with asynchronous
mapping)
Processing of unstructured and structured (Integrated Services
Digital Network -ISDN-PRA) 2Mb/s Signal.

 34/45 Mbit/s

 STM-1 Electrical/Optical (Synchronous Transport Module)

 STM-4 Optical Signal

 STM-16 Optical Signal

 STM-64 Optical Signal

 OC3 Electrical/Optical (Out Door Unit -ODU Controller)

 A mixing of SDH and Data Services is possible by inserting


the

4xANY board in the 1660SM sub-rack.

It allows to multiplex in the time domain up to 4 client signals into


one single 2.5Gb/s optical channel (server signal). Server
STM-16 signal is connected to SDH matrix through 1660SM back
panel.Multiplexing scheme delivers a fully compliant SDH frame.
The signal can hence be directly connected to a SDH Add Drop
Multiplex (ADM)/DXC without requiring prior d-concentration.

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 35


B. Material List

This section includes:


 Indoor accessories for MPT-HC V2/MPT-XP/9558HC
 Accessories and cables for MPT-HC V2/MPT-XP/9558HC
 connections MPR-E Accessories and cables for MPT-MC
 connections Nose Adapter for MPT-HC V2/MPT-MC,MPT-
XP, and 9558HC
 Flextwists and N cable for MPT-HC V2/MPT-MC,MPT-XP,
and 9558HC
 Ethernet electrical cables
C Drawing and Site Information

Radio Synthesis

Radio Synthesis with XPIC configured (only with MPT-HC


V2/MPT-XP/9558HC)

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 36


Network Supervision

2.5. Procedure to dismantle high end equipment

A. How to disassemble equipment

This equipment is designed for easy disassemble, by using


screws and rivets for mechanical assembly of sub-racks and modules.
The variety of screw types is minimize
The disassemble process depends on the respective recycling
methods and can be derived from the delivered assembly instructions
of the product.These guidelines are not mandatory.They are given in
order to optimize the disassembling process and material recovery as
whole

B. Tools necessary for disassemble

The following tools are necessary for unit dis assembly:

# T9 TORX screw driver


# T20 TORX screw driver
# Cross head screwdriver
# Wrench
# Scissors
# Protection gloves

2.6. Conduct high end equipment installation activities

A Safety requirements for installation activities

This chapter describes the equipment labeling and the mandatory


and suggested norms that must be considered to avoid injuries to
persons and/or damage to the equipment.

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 37


This chapter is organized as follows:

 MPR-E: declaration of conformity to CE marking and


countries list

 Specific label for MPR equipment

 Applicable standards and recommendations

 Safety rules

 Electromagnetic compatibility (EMC norms)

 Equipment protection against electrostatic discharges

 Cautions to avoid equipment damage

 MPR-E: waste from electrical and electronic equipment


(WEEE)

 Standards and compliance

B Sources of installation manual


This section includes:

 Indoor accessories for MPT-HC V2/MPT-XP/9558HC


 Accessories and cables for MPT-HC V2/MPT-XP/9558HC
 connections MPR-E Accessories and cables for MPT-MC
 connections Nose Adapter for MPT-HC V2/MPT-MC,MPT-XP,
and 9558HC
 Flextwists and N cable for MPT-HC V2/MPT-MC,MPT-XP, and
9558HC
 Ethernet electrical cables
C Types of installation tools, equipment and material for high
end equipment

The MPT-MC installation section is divided in:


 Types of MPT-MC

 MPT-MC operative information

 How to change polarization in the MPT-MC

 Types of pole mounting installation kits

 Types of nose adapters

 1+0 MPT-MC installation (integrated antenna) - all frequencies

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 38


 1+0 MPT-MC installation (non integrated antenna) - all
frequencies

 To terminate the Ethernet cable (MPT-MC side) and to pull it


up from indoor to MPT-MC

 Installing the .Flextwist. waveguide (not integrated antenna


cases)

 MPT-MC system grounding

 Cable grounding

D Procedure to obtain installation manual

The complete list of handbooks related to the present one


1. 1660SM Rel. 5.5 Operator’s Handbook - Version A2
8DG15711AAAA THIS Provides Craft Terminal screens and
operational procedure for SDH Configuration. MANUAL
2. 1660SM Rel. 5.5 Technical Handbook - Version A2
8DG15642AAAA. Provide information regarding Equipment
description, composition, features of the equipment and
detailed unit description, front view, characteristics, hardware
setting documentation of common units used in all the
various configuration and routine maintenance. Dismantling
and recycling procedures are included.
In particular refer to Common Technical Handbook to obtain the
following information:
 SAFETY RULES AND NORMS
 ELECTROMAGNETIC COMPATIBILITY (EMC)
 ELECTROSTATIC DISCHARGERS (ESD)
 LABELS AFFIXED TO THE EQUIPMENT
 DISMANTLING & RECYCLING

E Procedures to dismantle high end equipment Sub rack dis


assembly

The same rules can be applied to the specific equipment to be


dismantled. In order to disassemble the sub rack first remove the
boards eventually present, included termination bus.

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 39


Figure 1.21 : Sub rack front and rear view sub rack

Procedure:

 Remove the two screws (A) in order to disassemble the handle

 Repeat the same procedure on the other handle.

 Separate the two plastic blocks of the handle

 Unscrew all the screws present on rear cover

 Remove the rear cover in order to access the sub rack Back Panel.

 Remove the upper and lower guides from the sub rack access area
by unscrewing the relevant screws

 Remove the side wall by unscrewing the relevant screw

 Remove the two contact springs from the side wall

 Remove the two guides of the “basic area" and the two optical fibre
ducts by pulling them out.

 Unscrew all the screws present on the other “side wall" in order to
complete the sub rack dis assembly.

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 40


F Procedure to check functionality for installed high end
equipment

Free running frequency check procedure


1. Connect the outgoing synchronous to the frequency counter
2. In the Element Management Layer -USM

3. Select the Timing Reference Block


4. Select Synchronization Remove Timing Reference

 Check that the free running indication is present in the


timing reference block dedicated to the internal oscillator
G.783. If the Hold Over indication is displayed, first
switch the equipment off and then back on again.
Afterwards repeat all the procedures.
5. Select Synchronization Set T0 Equal T4
 Check that the frequency counter reads a measured
value of 2048 kHz ±4.6 ppm.

REFERENCES:
 BUKU:
L.R.Mauri-L.Fenzi, Alcatel -Lucent 1660SM Rel.5.5 (Operator’s Handbook),
Sept 2010,Ed.03, “STM-64 Multiservice Metro Node ”, K. O’Rourke-
M.Modena -G.Grassi.

 INTERNET :
http://www.alcatel-lucent.com/myaccess,9500 MPR for ANSI and ETSI,
28.1.2014,11.45AM

L03-05-21-LA1-IS WIM/L03/12016/S05 PAGE 41


LA2 REPORT HIGH END EQUIPMENT MAINTENANCE ACTIVITIES

1. CONDUCT HIGH END EQUIPMENT MAINTENANCE ACTIVITIES

1.1. High end equipment maintenance tools


General Rules

- Check that the equipment is operating with all the shields properly
positioned (dummy covers, ESD connector protections, etc.

- In order to reduce the risk of damage the electrostatic sensitive devices, is


mandatory to use the elasticized band (around the wrist) and the coiled cord
joined connect with the ground rack during the touching of the equipment.

Instruments and Accessories


- There is a local terminal (PC) which permits to display all the alarms and
manages the Equipment. The relative processing is described in the
operator's Handbook.Where TMN is implemented, an Operation System
displays alarms and manages all the connected equipment of the network.
Refer to the relevant handbooks.The need of special tools and accessories to
perform possible routine and corrective maintenance procedures is described
inside the procedures themselves

1.2. Type of high end equipment material fault


Routine Maintenance:- Type of material fault according to the filter
type It is suggested to carry out the following operations every three months:
- Metallic filter cleaning
- Dust filter substitution
- Power Cable Check (every year)
- Replace Fans Unit (every 5yeas)

Corrective Maintenance:- Type of material fault:


- Fan unit substitution

1.3. Procedure to carry out high end maintenance work activity.


Metallic Filter Cleaning: Replace the “Metallic filter" from the “FANS
Shelf" or from the “Mechanical Structure with Integrated Fans" as follow:

• unscrew the screws that ensure the Metallic filter to the shelf

L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 42


• extract the Metallic filter

• clean the metallic filter removing the dust

• Insert and ensure the “Metallic filter" to the shelf using the relevant
screw
Dust Liter Substitution: Replace the “Dust filter" from the “FANS
Shelf" or from the “Mechanical Structure with Integrated Fans" as follow:
• unscrew the screws that ensure the dust filter to the shelf
• extract the Dust filter
• insert the new Dust filter
• ensure the “Dust filter" to the shelf using the relevant screw

Power Cable Check :


• Check that the power cable is perfectly safety grounded.
• Make sure that the sub rack has been tightly fastened to the rack with
screws, to guarantee grounding (the rack is connected to the station
ground).

Replace Fan Unit :- Procedure is carried out with the use of the Craft
Terminal

Fan Unit Substitution


When an ALM_URG alarm is displayed on C.T or O.S. (associated to
an Housekeeping alarm) it means that at least one fan is broken, so it is
necessary to replace the “FAN unit" involved. These alarm indications are
also displayed on the Fans front panel.
i. With the “FANS Shelf"

• unscrew the screws that ensure the Fan unit to the fans shelf
• extract the Fan unit from the Fan shelf by means the extractors kit,
using the central hole under the led
• insert the new Fan unit into the Fan shelf
• ensure the Fan unit to the “FAN shelf“ using the relevant screw
ii. With the “Mechanical Structure with Integrated Fans"
• unscrew the screws that ensure the Fan unit to the fans shelf
• extract the Fan unit from the shelf by means the two card lever
L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 43
• insert the new Fan unit into the Fan shelf
• ensure the Fan unit to the “FAN shelf“ using the relevant screw

1.4. Procedure to dismantle high end equipment.

In next paragraphs is given a description example of how to


disassemble an equipment; the same principle can be applied to all the sub
racks and units composing the equipment. The unit chosen for dis assembly
is one of the most complex.

– Describes the equipment dis assembly in detail:


• Lists the tools necessary for dis assembly
• Describes the sub rack dis assembly
• Describes the unit dis assembly
• Describes the procedure to apply in order to manage Hazardous materials
and components (example battery)
– Reports the ECO declaration info.

1.4.1. Unit dis assembly


Procedure:
– Remove twe two screws (A) from the side cover plate as indicated
in Figure 2.1 below:

Figure 2.1 : Side cover plate removal

L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 44


- Remove the screws (B) that fix the two levers and subsequently
pull out them from the front plate as indicated in Figure 2.2

Figure 2.2 : Levers removal

– Unscrew and extract the two optical connectors (C) as indicated


Figure 2.3
– Remove the screw (D) fixing the connectors support as indicate
in Figure 2.3
– Rotate the connectors support (E) and pull it sidely to be removed
as indicated Figure 2.3

L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 45


Figure 2.3 : Optical connectors support removal

– Remove the two screws (F) from the side cover plate as indicated
in Figure 2.4
– Extract from the top the contact spring (G) as indicated in Figure
2.4 (refer for info about hazardous parts dismantling).
– Extract the fibers from the cavity (H) as indicated in Figure 2.4

L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 46


G
F

Figure 2.4 : Side cover plate and contact spring removal

– Disconnect the two flat cables (M) as indicated in Figure 2.5


– Unscrew (L) connectors with the aid of a wrench as indicated
Figure 2.5
– Remove the fibers (N) from supports pulling them out Figure 2.5.

L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 47


L

M L

N
N

Figure 2.5 : Internal connectors removal

- Remove the two screws (O) on the other side of the board that
fixes the dissipator to the Printed Circuit Board (PCB) as indicated in
Figure 2.6

Figure 2.6 : Dissipator removal


L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 48
P
P
P
P

P
P
P
P

Figure 2.7 : Modules removal from dissipator

– The dissipator can now be removed (refer to Figure 2.7)


– Remove the screws (P) from dissipator as indicated in Figure 2.7
– Now the two modules on the other side of the dissipator are free to
be removed (refer to Figure 2.9)

! Pay attention during modules removal because of white


conductive paste (refer to info about hazardous parts dismantling).
– Remove the plastic part (X) in Figure 2.8 by unscrewing the screw
present on the rear side of the dissipator.
– Remove the screws (Q) and (R) that fix the daugther board and
pull it out from the mother board (refer to Figure 2.8).
– Cutaway golded connector (S) from daughter board (refer to
Figure 2.9).

L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 49


Mother Board

Daughter Board

R
Q Q

Figure 2.8: Daughter boad removal

Figure 2.9 : Gold connector removal

– Remove all internal cables as indicated in Figure 2.10. To remove

cables it is enough to pull them out from their support.

– Remove screws (T) that fix the metal support to the mother board

as indicated in Figure 2.11

– Remove the metal support.

– Cutaway the golded connector (U) from mother board.


L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 50
Figure 2.10 : Internal cables removal

U
Metal Support

metal support removal

Figure 2.11 : Connector metal support removal

L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 51


1.4.2. Hazardous materials and components

Table 1 below lists the presence or not of hazardous substance.


Note:The system cabling is designed for reduced halogen content. All
the traffic cabling is fully PVC free.

Table 2.1 : List of hazardous materials and components present in the


equipment
Materials/substances Presence
in the
equipment
1. Batteries External NO
2. (Mercury/NiCad/Lithiu
m/Other)
3. Batteries Internal NO
4. (Mercury/NiCad/Lithiu
m/Other)
5. Mercury NO
6. Cadmium NO
7. Capacitors with PCB's
8. Capacitors with NO
substances of concern + height >
25 mm, diameter > 25 mm or pro-
portionately similar volume
9. Gas discharge lamps NO
10. Mercury containing NO
Backlighting lamps
11. Plastic containing NO
brominated flame retar-dants other
than in Printed Circuit Assem-blies
12. Liquid Crystal NO
Displays with a surface greater
than 100 cm2
13. Asbestos NO
14. Refractory ceramic NO
fibres
15. Thermal YES In all units where dissipate are
present a withe thermal
conductive paste is used in
between mechanical parts.
Figure 129 an examples shown.
Note : Protective plastic gloves
must be used in order to avoid
contact between hands and
thermal conductive paste. Pay
attention to avoid contact of
thermal conductive paste with
eye

L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 52


1.5. Procedure to check card and card module for defect

i. Units and access cards insertion / extraction


Unit/circuit pack extraction

a) Unscrew the top and bottom screws before extracting the units.
b) Open the levers gently as shown in the picture.
c) Slide the unit out of the sub rack.

Units and access cards insertion

a) Open the two levers and then line up circuit card edges in orange
plastic card guides.
b) Push on the front panel without pushing on the levers until the
front panel touches the front of the subrack. The unit connectors
are now starting to mate with the backplane connectors.
c) Close the levers in order to finish the unit/pack insertion.

L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 53


d) Slightly press on the left side of the unit (eventually on the lever) to
oppose the strength of the adjacent unit fingertips and tighten the
two face plate screws before installing the next unit

ii. SFP module replacement

SFP module extraction

1) Collect the “SFP Plug-in tool”


2) Insert the “SFP Plug-in tool” in the front of the SFP module with
the slide latch on the left side.

Figure 2.12 : SFP Plug-in tool insertion

3) Press the slide latch to the SFP module in order to unlock the
module.

Figure 2.13 : SFP module extraction

4) Pull out the SFP module from the unit.

Figure 2.14: SFP module extracted

L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 54


SFP module insertion
After having placed the unit into the subrack, insert the SFP module in
the special cavity and push on it until the SFP module connector starts
to mate with the unit connector.

Figure 2.15 : SFP module insertion

1.6. Type of default alarm


Alarm synthesis

The CT provides an alarm functionality that informs the operator on the


severity of the different alarms in the NE as well as on the number of current
alarms. There are five different alarm severity levels. In the CT these different
levels are associated with colors.

. Red: Critical alarm (CRI)

. Orange: Major alarm (MAJ)

. Yellow: Minor alarm (MIN)

. Cyan: Warning alarm (WAR)

. Blue: Indeterminate (IND)

The meaning of each icon in the Alarm Synthesis is:

[1] CRI - Critical alarm Synthesis of alarms relevant to the reach ability
of the NE (typical: NE isolation)

[2] MAJ - Major (Urgent) alarm Synthesis of alarms that need


immediate troubleshooting

[3] MIN - Minor (Not Urgent) alarm Synthesis of alarms for which an
intervention can be deferred

L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 55


[4] WAR - Warning alarm Synthesis of alarms due to failure of another
NE in the network

[5] IND - Indeterminate alarm Synthesis of alarms not associated with


the previous severity. Not operative.

Each alarm severity is represented by an alarm icon situated in the top


left hand corner of the view. These alarm icons are always represented on
the different Equipment views so that the operator is always aware of the
alarms occurring in the system.

Furthermore the number in the alarm icon indicates the number of


active alarms with that specific severity.

Domain alarm synthesis area


This area contains the icons representing the alarms per domain. Each
icon indicates the number of alarm occurrences for each domain.
The meaning of each icon in the Domain alarm synthesis area is:

[1] COM . Communication alarm

Synthesis of alarms in the Communication domain

[2] EQP . Equipment alarm

Synthesis of alarms in the Equipment domain

Alarms surveillance

It is possible to show all the Alarms or filter the alarms report. Select
the diagnosis pull down menu. You can then select the following option from
the Alarms pull down menu:

– NE Alarms: all the NE alarms are listed in the Alarm Surveillance


report which is activated.(“Inside Failure Additional Text”)

– Object Alarms: only the alarms of the selected object are listed in
the Alarm Surveillance report

– Sub trees Alarm: only the alarms of the selected object and of the
relevant sub trees are listed in the Alarm Surveillance report

– Equipment Alarms: only the alarms of the equipment management


are listed in the Alarm Surveillance report

L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 56


– Transmission Alarms: only the alarms of the transmission
management are listed in the Alarm Surveillance report
– External Points Alarms: only the alarms of the input external point
management are listed in the Alarm Surveillance report
Selecting any of the previously seen options, the Alarm surveillance
report is displayed as for the example of the following figure.
This view shows first a synthesis of the NE alarms (Counter Summary)
with the sum of all alarms, then a detailed list of alarms of the selected filter
(Alarms Sublist).

Figure 2.16 : Alarm Surveillance (example)

L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 57


Detailed information for each alarm is supplied.
For example the board in which the alarm is detected, the status of the alarm,
the alarm type, the probable cause.
The information supplied help the operator, typically during
troubleshooting operation, presented in next section of this handbook.
(Maintenance section, where more details about alarms are given).

Inside Failure Additional Text

The Inside failure “Additional Text” is a field of the “AS current: more
alarm information” window as displayed in Figure 2.17.
This function improves, the diagnostic associated to the hardware
failure.
The presence of a failure on RX or Tx side for the signal incoming/outgoing
from/to the active/ standby Matrix board is detected.

Figure 2.17 : Additional text field

To display the “AS current USM: More Alarm Information” windows


select the Diagnosis->Alarms- >NE Alarms pull down menu.

L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 58


A new windows will be opened as in Figure 2.18; select the row
corresponding to the Inside failure “Probable cause” and double click on it.
The AS current: more alarm information window will be opened; select
the Diagnosis Tab to display the Additional Text Field as depicted in Figure
2.17.

Figure 2.18 : AS Current USM window

1.7. Type of network abnormalities

Abnormal Condition List

The abnormal condition provides the synthesis of NE “not normal


conditions" listing the events that contribute to abnormal condition.

Select Diagnosis->Abnormal Condition List.

Figure 139 opens.

L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 59


Figure 2.19 : Example of abnormal condition list

The abnormal condition are the following:

• Loopback

• ALS is disable and the laser is forced on or off

• Protection units (in case of EPS, SNCP and MSP) are in lockout or
in forced status

• Board (or sub-board) is placed in a not configured slot

Select an abnormal condition and click on “OK" to open the relative


dialog window. Figure 2.20. Opens.

Figure 2.10 : Example of loopback dialog window management

L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 60


The other abnormal condition types will open the corresponding
management window or will open the window to navigate towards the
management window.

1.8. Network Administration and Management System

General introduction on views and menus

In this chapter the organization of the EML-USM screen, presented


after the NE login, is described.

First is introduced the view organization, than the accessible menu


options are listed. At the end some further advice are given for Navigation
principles.

EML-USM view organization

The EML-USM view is the first window presented to the operator after
the login. The first view is different according to the Equipment type but the
navigation principles are the same for all. Figure 2.21 . shows an example.

L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 61


Severity alarm
synthesis Domain alarm synthesis

Menu bar

View title

Management
Message/state area states control panel

Figure 2.21 : EML-USM main view organization

EML-USM view contains the following fields, that provide you with
information needed to manage the NE:

• Severity alarm synthesis

• Domain alarm synthesis

• Management status control panel

• View title

• View area

• Message/state area
L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 62
The Menu bar and the View area contained in the same NE view
permits to performs all the configuration and supervision and display the
specific selected item.
The view organization is detailed in the Basic Craft Terminal Operator
Handbook to which refer for the description, except for the following
information, that differs according the NE type:
Domain alarm synthesis

The different alarm domain type in which can be subdivided the NE are:
Synchronization, External Point, Equipment, Transmission.
Information about the alarms and status is given in the Maintenance
section of this handbook.
NE management states
The elementary building blocks of any telecommunication network are
the Network Elements (NEs).Operating with the Craft Terminal the NE can
present different management states according to the condition of the
connection (supervision, local access, connection state, etc). Also general
Alarm status are presented. Management states are present at Network
Element Synthesis view level and at USM-EML view level.

All the information referred to the management states are inserted in


the Basic Craft Terminal Operator's Handbook.

Any disruption in the communication link between the CT and the NE


results in an update of the management states when the CT has detected the
communication failure.

NE supervision and login

The Network Element Synthesis views enable you to get access to the
current NE EML-USM view described in this handbook. The Network
Element Synthesis views enable you to work on “local" or “remote" NE,
selecting it and activating “Supervision" and “Show Equipment", as described
in the Basic Craft Terminal Operator's Handbook.

The Element Management Layer (EML -USM) Main view is presented


as for the following figures.

L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 63


Figure 2.22: EML-USM Main view

NE management general configuration

In this paragraph general configuration referred to the equipment


management are described (Craft Terminal access, NE Time, Alarms
configuration, etc).
Access state (allow or inhibit NE Craft access)
The NE can be managed by the Operating System (OS) or by the Craft
Terminal. To control the competition of the OS and the CT, a Local Access
Control (LAC) is available. If the LAC is “Granted!" that means the CT is
allowed to manage the NE, the icon “LCA" has a green rectangular shape.

If the LAC is "Denied" that means the OS manages the NE and the CT
is not allowed to modify NE configuration (it can only “read"), the icon “LCA"
has a cyan circular shape.

L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 64


If the LAC is "Requested!" that means the Craft Terminal (CT) has
requested permission to the Operating System (OS) and is waiting for a
replay, the icon “LCA" has a blue circular shape.

However the OS does continue to provide a certain number of services.


These services includes :

– Reception and processing of alarms

– Performance processing on TPs

– Switching back to the OS access state


The access state of an NE can be modified from two types of views.
NE Time management

The NE local time of a selected NE can be visualized and/or re-aligned


on the OS time basis. In this view the OS indication identifies the Craft
Terminal. The status of the Network Time Protocol can be checked.
Select the Configuration ->NE Time .. pull down menu.

The following dialogue box is opened from which you can get and/or
set the local NE time and check the NTP Status.

L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 65


Figure 2.23 : NE Time dialogue box

The following fields are available:


– Network Time Protocol (NTP) Status section (read only) with the
following parameters:
• NTP protocol

It can be enabled (in the NTP Server Configuration)or disabled or


empty (grey).

• NTP Main and NTP Spare

It displays the status of the Main and Spare NTP: reachable or


unreachable.

– Time section with the following data:

• NE Time and OS Time

It displays (read only) the time of the Network Element and of the OS
(Craft Terminal).

• Set NE Time With OS Time

It permits to align the NE time with the time of the Craft Terminal.

Two different operative conditions can be defined:


– NTP protocol enabled

L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 66


In this case, NTP Main and NTP Spare will be reachable or
unreachable. When both are reachable the NE uses the Main.
The Set NE Time With OS Time message is not operative and the user
cannot set manually the NE Time.

– NTP protocol disabled

In this case, the NTP Main and NTP Spare are empty (greyed); the Set
NE Time With OS Time message is operative and the user can set manually
the NE Time (i.e. change the NE time with the Time of the Craft Terminal).

EXERCISES

1. List the purpose of Work Order.

2. Describes the procedures of Work Order

3. Give two examples of routine maintenance for three years equipment

4. List down five tools that required disassembling high end equipment.

5. Describes the procedures to dismantle high end equipment (Sub rack)

6. Give five different alarm severity levels and describes the meaning of each.

REFERENCES:
1. TX300 Portable SDH/ Ethernet Test Set, 2008
2. 9500 MPR(Microwave Packet Radio), R5.0 Global Market Node (MSS-
1/MSS-4/MSS-8) Functional and Jhardware Description, Edition 1, 2008

L03-05-21-LA2-IS WIM/L03/12016/S05 PAGE 67


INFORMATION
SHEET MODULE 2
L03-05-22 NETWORK MANAGEMENT

68
GROUP CLUSTERING MODULE 2

L03-05-22-LA1 PLAN PROVISIONING AND MONITORING ACTIVITIES

C05.01 Identify Network Administration & Management System (NMS)


provisioning and monitoring requirements
C05.02 Plan Provisioning and Monitoring Activities

L03-05-22-LA2 CONDUCT NETWORK ADMINISTRATION & MANAGEMENT SYSTEM


(NMS) PROVISIONING AND MONITORING ACTIVITIES

C05.03 Conduct Network Administration & Management System (NMS)


Provisioning and monitoring activities.
C05.04 Report Network Administration

PAGE 69
INSTITUSI LATIHAN
JABATAN TENAGA MANUSIA
KEMENTERIAN SUMBER MANUSIA
MALAYSIA

INFORMATION SHEET
COURSE CODE
L03 DIPLOMA IN TELECOMMUNICATION TECHNOLOGY
AND NAME

MODULE CODE
L03-05-22 NETWORK MANAGEMENT
AND NAME

LA1 PLAN PROVISIONING AND MONITORING ACTIVITIES


LEARNING LA2 CONDUCT NETWORK ADMINISTRATION & MANAGEMENT
ACTIVITY (LA) SYSTEM (NMS) PROVISIONING AND MONITORING
ACTIVITIES

C05.01/L4,
CU.WA NO./ C05.02/L4,
LEVEL C05.03/L4
C05.04/L4

PERFORM NETWORK MANAGEMENT USING WIRED TRANSMISION


PROJECT IMPLEMENTATION TRACKER & WIRED TRANSMISION
TERMINAL
SYSTEM SO THAT NETWORK ADMINISTRATION & MANAGEMENT
PERFORMANCE
SYSTEM (NMS) PROVISIONING AND MONITORING PLANNED AND
OBJECTIVE
CONDUCTED IN ACCORDANCE WITH RULES AND REGULATIONS
AND STATUTORY BODY REQUIREMENTS.

WIM/L03/12016/S05 PAGE 70
LA1 PLAN PROVISIONING AND MONITORING ACTIVITIES

1. NETWORKING
A network can be defined as a group of computers and other devices

Connected in some ways so as to be able to exchange data..

1.1. Introduction of Networking


A computer network consists of a collection of computers, printers and other
equipment that is connected together so that they can communicate with
each other.
1.1.1. Definition

In information technology, networking is the construction, design, and


use of a network, including the physical (cabling, hub, bridge, switch, router,
and so forth), the selection and use of telecommunication protocol and
computer software for using and managing the network, and the establishment
of operation policies and procedures related to the network

1.1.2. Advantages Of Networking


a. Easy Communication and Speed
It is very easy to communicate through a network. People can
communicate efficiently using a network with a group of people. They can
enjoy the benefit of emails, instant messaging, telephony, video conferencing,
chat rooms, etc.
b. Ability to Share Files, Data and Information

This is one of the major advantages of networking computers. People


can find and share information and data because of networking. This is
beneficial for large organizations to maintain their data in an organized manner
and facilitate access for desired people.
c. Sharing Hardware

Another important advantage of networking is the ability to share


hardware. For an example, a printer can be shared among the users in a
network so that there’s no need to have individual printers for each and every
computer in the company. This will significantly reduce the cost of purchasing
hardware.

L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 71


d. Sharing Software

Users can share software within the network easily. Networkable


versions of software are available at considerable savings compared to
individually licensed version of the same software. Therefore large companies
can reduce the cost of buying software by networking their computers.
e. Security

Sensitive files and programs on a network can be password protected.


Then those files can only be accessed by the authorized users. This is another
important advantage of networking when there are concerns about security
issues. Also each and every user has their own set of privileges to prevent
them accessing restricted files and programs.
f. Speed

Sharing and transferring files within networks is very rapid, depending on


the type of network. This will save time while maintaining the integrity o

1.1.3. Numbering System


Computers only understand numbers.
The first thing to understand about computers is that they are nothing
more than a powerful, glorified calculator. The only thing they know, the only
thing they understand, is numbers. You may see words on the screen when
you're chatting with your friend via AOL, or breathtaking graphics while playing
your favorite game, but all the computer sees are numbers. Millions and
millions of numbers. That is the magic of computers - they can calculate
numbers, lots of numbers - really fast.
But why is this? Why do computers only understand numbers? To
understand that we need to go deep into the heart of a computer, break it
down to its most basic functionality. When you strip away all the layers of
fancy software and hardware, what you will find is nothing but a collection of
switches. You know the kind, you have them all over your house - light
switches. They only have two positions: On or Off. It's the same for computers,
only they have millions and millions of the little buggers. Everything a
computer does comes down to keeping track of and flipping these millions of
switches back and forth between on and off. Everything you type, download,
save, listen to or read eventually gets converted to a series of switches in a
particular on/off pattern that represents your data.

L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 72


What does this have to do with Binary and Hexadecimal numbers?
Let's back up for a minute and look at how human beings deal with
numbers first. Most people today use the Arabic numbering system, which is
known as the decimal, or Base-10, numbering system (dec means ten). What
this means is that we have ten digits in our numbering system:
0123456789
We use these ten digits in various combinations to represent any
number that we might need. How we combine these numbers follows a very
specific set of rules.
Hexadecimal

Binary numbers are well and good for computers but having only two
digits to work with means that your place-columns get very large very fast. As
it turns out, there is another numbering scheme that is very common when
dealing with computers: Hexadecimal. Hex means six, and recall that dec
means ten, so hexadecimal numbers are part of a Base-16 numbering
scheme.
Years ago, when computers were still a pretty new-fangled contraption,
the people designing them realized that they needed to create a standard for
storing information. Since computers can only think in binary numbers, letters,
text and other symbols have to be stored as numbers. Not only that, but they
had to make sure that the number that represented 'A' was the same number
on every computer. To facilitate this ASCII standard was born. The ASCII
Chart listed 128 letters (both upper- and lower-case), punctuation and symbols
that could be used and recognized by any computer that conformed to the
ASCII standard. It also included non-printable values that aren't displayed but
perform some other function, such as a tab placeholder (09), an audible bell
(07) or an end-of-line marker (13). The various combinations of only eight
binary digits, or bits, could be used to represent any character on the ASCII
Chart (28 = 128). (There were also other competing standards at the time,
some of which used a different number of bits and defined different charts, but
in the end ASCII became the dominant standard.)
128 characters may have seemed like a lot but it didn't take long to
notice that the ASCII Chart lacked many of the special vowels used by latin-
based languages other than English, such as ä, é, û and Æ. Also lacking were
common mathematical symbols (±, µ, °, ¼) and monetary symbols other than

L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 73


the dollar sign ($) for United States currency (£, ¥, ¢). To make up for this
oversight these symbols and a series of simple graphical shapes, mostly for
drawing borders, were assembled as an extension to the original ASCII Chart.
These additional 128 characters brought the new total to 256 (216), with the
pair of charts being referred to collectively as the Extended ASCII Chart.
Did you notice that the value 256 can be represented as 2 (the base of a
binary numbering system) to the 16th power? This brings us back to
hexadecimal (Base-16) numbers. It turns out, through the magic of
mathematical relationships, that every character on the Extended ASCII Chart
can be represented by the a two-digit hexadecimal number: 00 - FF (0 - 255
decimal).
1.1.4. OSI Model (Packet Data Transfer)

The objective of the OSI model is to provide a structured approach for


the development of all types of networks. The model specifies the sequence of
processes required for network message transfer between applications
running on different systems.

Layer 7 Application Layer

Layer 6 Presentation Layer

Layer 5 Session Layer

Layer 4 Transport Layer

Layer 3 Network Layer

Layer 2 Data Link Layer

Layer 1 Physical Layer

Table 1.1 : A layer Function

In the OSI model, each layer provides services to the layer above, while
hiding from that layer the processes used to implement the services. Ideally,
changes can be made to any layer without requiring changes to any of the
other layers, as long as the inputs and outputs of the changed layer remain the
same.
For example, specifications for transmission over optical fiber cabling
can be incorporated into Layer 1 of an existing Layer 2 network technology
(e.g., Ethernet) without modifying any of the existing Layer 2 specifications.

L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 74


This makes it possible to take advantage of new technologies within a given
layer without sacrificing compatibility with existing networks.
The layers in the OSI model are commonly described as being
connected to each other in vertical form, also called a stack or protocol stack.
The stack defines how network hardware and software interact at various
levels to transfer messages between devices on a network and between
networks on an internet work.

Service access points (SAPs) are the connection points between layers.

When a message needs to be transferred between two systems, a peer-


to-peer relationship is established between the corresponding layers in the
protocol stack of each system—a given layer at one end communicates with
its counterpart at the other end over the network. The message, along with
any control information, is passed down from the sending layer to the layer
below.
This process continues until the lowest layer in the stack is reached. The
data is then transmitted from the lowest layer of the sending system to the
lowest layer in the receiving system, where it is passed up through the layers
until it reaches the counterpart, or peer, of the sending layer.
Layer 7 services make it possible for identical or non-identical
applications running on different systems to use a network to exchange
information. Services defined by this layer include file transfer, message
handling, and remote management. For example, various types and versions
of e-mail software can use the same Layer 7 protocols to exchange messages
over the Internet.
Layer 6 services are responsible for various forms of data conversion.
This layer negotiates and establishes a common form for data representation,
which includes character code translations, data compression, and message
encryption.
Layer 5 services are responsible for synchronizing and managing data
transfer between network devices. For example, a Layer 5 protocol can direct
a device to start, stop, restart, or abandon data transfer activity.
L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 75
Layer 4 services make it possible to assign various levels of quality to
the data transfer process. When a connection is being established between
network devices, the Layer 4 protocol can be used to select a particular class
of service. This layer can also monitor the transfer for billing purposes, ensure
that the appropriate service quality is maintained, and generate an alert if this
quality has been compromised.
Layer 3 services are responsible for internet work data transfer (e.g.,
between five Ethernet networks linked using the Internet). If multiple routes
exist between the networks, a Layer 3 protocol can choose the most
appropriate one, based on such criteria as message priority, route congestion,
or route cost.
Layer 2 services are responsible for intranet working data transfer (e.g.,
between devices on an Ethernet network). Some of the functions of a Layer 2
protocol include device identification and managed access to a shared
transmission channel.
Layer 1 services are responsible for the transfer of bits over various
media.

1.1.5. TCP/IP Model


Like OSI network model, TCP/IP also has a network model. TCP/IP was
on the path of development when the OSI standard was published and there
was interaction between the designers of OSI and TCP/IP standards. The
TCP/IP model is not same as OSI model. OSI is a seven-layered standard, but
TCP/IP is a four layered standard. The OSI model has been very influential in
the growth and development of TCP/IP standard, and that is why much OSI
terminology is applied to TCP/IP. The following figure compares the TCP/IP
and OSI network models.

L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 76


Figure 1.1 : A TCP/IP Models

As we can see from the above figure, presentation and session layers
are not there in TCP/IP model. Also note that the Network Access Layer in
TCP/IP model combines the functions of Datalink Layer and Physical Layer.
Layer 5. Application Layer
Application layer is the top most layer of four layer TCP/IP model.
Application layer is present on the top of the Transport layer. Application layer
defines TCP/IP application protocols and how host programs interface with
Transport layer services to use the network.
Application layer includes all the higher-level protocols like DNS (Domain
Naming System), HTTP (Hypertext Transfer Protocol), Telnet, SSH, FTP (File
Transfer Protocol), TFTP (Trivial File Transfer Protocol), SNMP (Simple
Network Management Protocol), SMTP (Simple Mail Transfer Protocol) ,
DHCP (Dynamic Host Configuration Protocol), X Windows, RDP (Remote
Desktop Protocol) etc.
Layer 4. Transport Layer
Transport Layer is the third layer of the four layer TCP/IP model. The
position of the Transport layer is between Application layer and Internet layer.
The purpose of Transport layer is to permit devices on the source and
destination hosts to carry on a conversation. Transport layer defines the level
of service and status of the connection used when transporting data.
The main protocols included at Transport layer are TCP (Transmission
Control Protocol) and UDP (User Data gram Protocol).
Layer 3. Internet Layer

L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 77


Internet Layer is the second layer of the four layer TCP/IP model. The
position of Internet layer is between Network Access Layer and Transport
layer. Internet layer pack data into data packets known as IP data grams,
which contain source and destination address (logical address or IP address)
information that is used to forward the data grams between hosts and across
networks. The Internet layer is also responsible for routing of IP data grams.
Packet switching network depends upon a connection less internet work
layer. This layer is known as Internet layer. Its job is to allow hosts to insert
packets into any network and have them to deliver independently to the
destination. At the destination side data packets may appear in a different
order than they were sent. It is the job of the higher layers to rearrange them in
order to deliver them to proper network applications operating at the
Application layer.
The main protocols included at Internet layer are IP (Internet Protocol),
ICMP (Internet Control Message Protocol), ARP (Address Resolution
Protocol), RARP (Reverse Address Resolution Protocol) and IGMP (Internet
Group Management Protocol).
Layer 2. Network Access Layer
Network Access Layer is the first layer of the four layer TCP/IP model.
Network Access Layer defines details of how data is physically sent through
the network, including how bits are electrically or optically signaled by
hardware devices that interface directly with a network medium, such as
coaxial cable, optical fiber, or twisted pair copper wire.
The protocols included in Network Access Layer are Ethernet, Token
Ring, FDDI, X.25, Frame Relay etc.
The most popular LAN architecture among those listed above is
Ethernet. Ethernet uses an Access Method called CSMA/CD (Carrier Sense
Multiple Access/Collision Detection) to access the media, when Ethernet
operates in a shared media. An Access Method determines how a host will
place data on the medium.
IN CSMA/CD Access Method, every host has equal access to the
medium and can place data on the wire when the wire is free from network
traffic. When a host wants to place data on the wire, it will check the wire to
find whether another host is already using the medium. If there is traffic
already in the medium, the host will wait and if there is no traffic, it will place

L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 78


the data in the medium. But, if two systems place data on the medium at the
same instance, they will collide with each other, destroying the data. If the data
is destroyed during transmission, the data will need to be re-transmitted. After
collision, each host will wait for a small interval of time and again the data will
be re-transmitted.

1.1.6. Networking Protocol


A network protocol can be viewed as a common network
communication standard, which is used to define a method of exchanging data
over a computer network. Network protocols define rules and conventions for
communication between different devices, participating in a computer network.

Almost all protocols used in the Internet are common standards defined
by RFC (Request for Comments).
Examples of standard network protocols are TCP (Transmission Control
Protocol), UDP (User Datagram Protocol), IP (Internet Protocol), ARP
(Address Resolution Protocol), HTTP (Hypertext Transfer Protocol), FTP (File
Transfer Protocol), TFTP (Trivial File Transfer Protocol), SMTP (Simple Mail
Transfer Protocol), SSH (Secure Shell), Telnet etc.
Devices participating in network communication should know about the
common network protocol and communicate according to the way, defined by
the network protocol. In other words, standard network protocol software must
be running on both devices participating in network communication.
To explain it more clearly, if you are using your browser to browse web
pages from a web server (example, www.omnisecu.com), you are using a
protocol called HTTP (Hypertext Transfer Protocol). Your computer must
request web pages from web server using HTTP and the web server must
response back to your computer using HTTP.
How HTTP (Hypertext Transfer Protocol) should work is defined as a
common standard, RFC (Request for Comments) 2616. Anyone can follow the
common standard and create their own Browser or Web server.
Two terms are often used in networking industry, when describing
network protocols.
1) Proprietary Protocol 2) Standard Protocol
Proprietary protocols are usually developed by a single company for the
devices (or Operating System) which they manufacture. Apple talk is a
proprietary protocol developed by Apple Inc. Apple talk protocol may work well
L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 79
in network environments consisting only Apple devices. But other vendors may
not support Apple talk protocol. Proprietary protocols will not scale well in
network environments consisting of multi-vendor equipments.
Standard protocols are agreed and accepted by whole industry.
Standard protocols are not vendor specific. Standard protocols are often
developed by collaborative effort of experts from different organizations.
Examples of standard protocols are IP, TCP, UDP etc. A RFC (Request
for Comments) is an IETF platform to develop Standard Protocols. A RFC
(Request for Comments) is a pure technical document published by the
Internet Engineering Task Force (IETF). Request for Comments (RFCs) are
mainly used to develop a "standard" network protocol, a function of a network
protocol or any feature which is related with network communication.

Some RFCs are informational and others are published Internet


standards. The final version of the RFC becomes the standard and is
published with a number. No further comments or changes are permitted for
the final version. Changes are permitted only via subsequent RFCs that
supersede the previous RFCs.
At the early stages of network communication, each vendor had their
own proprietary network communication protocols. Different network protocols
for the same purpose were a serious problem in heterogeneous network
environments, consisting of devices and Operating Systems from different
vendors.
"Standard" network protocols are not considered as proprietary. Any
vendor can develop application software or drivers based on defined RFC
standard. Hence RFC provides a strong base for cross platform network
communication.
All the standard network protocols (like, HTTP, FTP, SMTP, TCP, UDP,
IP etc) are defined as RFCs. Individuals may join the IETF working groups to
help draft and develop networking standards or network protocols.

1.2. Network Infrastructures

Network infrastructure refers to the hardware and software resources of an


entire network that enable network connectivity, communication, operations and
management of an enterprise network.

L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 80


Network infrastructure provides the communication path and services between
users, processes, applications, services and external networks/the Internet..

1.2.1. Local Area Network (LAN)

Local Area Network (LAN) is a computer network, which is limited to a


small office, single building, multiple buildings inside a campus etc. Typically a
Local Area Network (LAN) is a private network owned and maintained by a
single organization.
Below image shows a small Local Area Network (LAN) connected
together using a Network Switch.

Figure 1.2 : A small LAN

A Peer-to-Peer network has no dedicated Servers. Here in Peer-to-Peer


network, a number of workstations (or clients) are connected together for the
purpose of sharing devices, information or data. All the workstations are
considered as equal. Any one computer can act as client or server at any
instance. This network is ideal for small networks where there is no need for
dedicated servers, like home networks, small business networks, or retail
shops. The Microsoft term for Peer-to-Peer network is “Work group”.

L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 81


There is no limitation for the number of computers in a peer-to-peer
network. But Peer-to-Peer implementations are meant for small networks.
Typically a Work group contain less than 10 workstations..
Client-Server Network

Peer-to-Peer computer networks are good for small business


organizations. For example: A small pharmacy outlet, An automobile service
center, A small clinic etc. The main disadvantage of Peer-to-Peer networks are
listed below.
• Everything is kept distributed in different computers.
• User generated files are stored in individual computers. Data backup is
extremely difficult.
• Each computer has its own user database. There is no centralized user
& user privilege management. Users need to remember their user ids and
passwords in every computers. Managing network users is extremely difficult.
As the organization's network grows, they must gradually upgrade their
Peer-to-Peer network to Client-Server based network.
The Client/Server computer network model is made-up of Client
computers and Server computers. Now we need to understand the terms
Client and Server.
What is a Client? A computer which is seeking any resource from
another computer is a Client Computer. You can think a client as a computer
in your network, where a network user is performing some network activity.
For Example: Downloading a file from a File Server, Browsing Intranet/Internet
etc. The network user normally uses a client computer to perform his day to
day work.
What is a Server? If a computer has a resource which is served to
another computer, it is a Server computer. The client establishes a connection
to a Server and accesses the services installed on the Server. A Server is not
meant for a network user to browse in internet or do spreadsheet work. A
Server computer is installed with appropriate Operating System and related
Software to serve the network clients with one or more services, continuously
without a break.
In a Client-Server network, high-end servers, installed with the Network
Operating System (Server Operating System) and the related software, serve

L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 82


the clients continuously on a network, by providing them with specific services
upon request.
Well known Server Operating System Products are Windows 2012 /
Windows 2012 R2, Unix (Oracle Solaris, IBM AIX, HP UX, FreeBSD, NetBSD,
OpenBSD, SCO Unix etc), GNU/Linux (RedHat Enterprise Linux, Debian
Linux, SUSE Enterprise, Ubuntu Server, CentOS Server, Mandriva, Fedora
etc.
Client-Server networks require dedicated servers. Server hardware is
more costlier than normal Desktop computers. Client-Server networks cost
more than peer-to-peer networks. Network Operating System (Server
Operating System) are also costlier than Desktop Operating Systems.
Bus Topology

A bus topology consists of a main run of cable with a terminator at each


end. All nodes like workstations, printers, laptops, servers etc., are connected
to the linear cable. The terminator is used to absorb the signal when the signal
reaches the end, preventing signal bounce. When using bus topology, when a
computer sends out a signal, the signal travels the cable length in both
directions from the sending computer. When the signal reaches the end of the
cable length, it bounces back and returns in the direction it came from. This is
known as signal bounce. Signal bounce will create problem in the network,
because if another signal is sent on the cable length at the same time, the two
signals will collide.

Figure 1.3 : Bus Topology

L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 83


Ring Topology

In a ring topology, all computers are connected via a cable that loops in
a ring or circle. A ring topology is a circle that has no start and no end and
terminators are not necessary in a ring topology. Signals travel in one direction
on a ring while they pass from one computer to the next, with each computer
regenerating the signal so that it may travel the distance required.
The main advantage of Ring topology is that the signal degeneration is
low since each workstation participating in the network is responsible for
regenerating the weak signal. The disadvantage of ring topology is, if one
workstation fails, the entire network will fail

Figure 1.4 : Ring Topology

L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 84


Star Topology

A star topology is designed with each node (like workstations, printers,


laptops, servers etc.) connected directly to a central device called as a
network switch. Each workstation has a cable that goes from its network card
to a network switch.
Most popular and widely used LAN technology Ethernet currently
operates in Star Topology.
Advantages of Star Topology
• Easy to install and wire.
• No disruptions to the network when connecting or removing devices.
• Easy to detect faults and to remove parts.
Disadvantages of Star Topology

• Requires more cable length than a linear bus topology.


• If the connecting network device (network switch) fails, nodes attached
are disabled and cannot participate in network communication.
• More expensive than linear bus topology because of the cost of the
connecting devices (network switches).

Figure 1.5 : Star Topology

1.2.2. Metropolitan Area Network (MAN)


Metropolitan Area Network (MAN) is larger than Campus Area Networks
(CAN) when considering the area covered, but, smaller than a Wide Area
Networks (WAN). Metropolitan Area Network (MAN) interconnects a number

L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 85


of Local Area Networks (LANs) using a high-bandwidth backbone links inside
a city.

1.2.3. Wide Area Network (WAN)


Wide Area Network is a computer network that covers relatively larger
geographical area such as a state, province or country. It provides a solution
to companies or organizations operating from distant geographical locations
who want to communicate with each other for sharing and managing central
data or for general communication.
WAN is made up of two or more Local Area Networks (LANs) or
Metropolitan Area Networks (MANs) that are interconnected with each other,
thus users and computers in one location can communicate with users and
computers in other locations.
In ‘Wide Area Network’, Computers are connected through public
networks, such as the telephone systems, fiber-optic cables, and satellite links
or leased lines. The ‘Internet’ is the largest WAN in a world. WANs are mostly
private and arebuild for a particular organization by ‘Internet Service Providers
(ISPs)’ which connects the LAN of the organization to the internet. WANs are
frequently built using expensive leased lines where with each end of the
leased line a router is connected to extend the network capability across sites.
For low cost solutions, WAP is also built using a ‘circuit switching’ or ‘packet
switching’ methods.

Figure 1.6 : Wide Area Network Diagram


L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 86
Analog Modem

Since analog modems are built into most new computers, they represent
the most convenient method of connecting to the Internet for the first time and
are very familiar to most computer users. “Modems”(a modulator/demodulator)
convert analog data transmitted over phone lines into digital data that
computers can read (demodulation) and also convert digital data into analog
data so it can be transmitted (modulation) Because they use regular analog
phone lines, these are called analog modems to distinguish them from other
sorts of modems.
Speed: the common speeds were 14.4 kilobits per second (Kbps), 28.8
Kbps and 33.6Kbps, and currently the fastest speed is 56 Kbps, which is built
into almost every computer. Individuals and small businesses that find they
surfing the web with increasing frequency often regard these low-speed
modems as an inconvenience. There is an important thing to remember
regarding the speed-not just of analog modems-. Even if one has a fast
modem, this doesn’t mean that one is able to connect at the fastest possible
speed. For example, 56 Kbps modems are represented as being capable of
transmission up to 56 Kbps. In fact, due to quality problems with most
conventional phone lines, maximum connection speeds of 40 kbps to 48 kbps
are far more typical. The actual connection speed varies depending on the
amount of static on the telephone line as well as the amount of traffic caused
by Internet and telephone users traveling the networks.

ISDN: INTERGRATED SERVICES DIGITAL NETWORK

ISDN uses fully digital signals over copper phone wire, a standard
telephone line. This means there is no conversion from digital to analog and
back again in the manner that an analog modem works. Most ISDN lines
offered by telephone companies give users two lines at once, called B
channels. The users can use one line for voice and the other for data, or they
can use both lines for data to give them data rates of 128 Kbps. Another
version, called B-ISDN, is able to support transmission rates of 1.5 Mbps. B-
ISDN requires fiber optic cables and is not widely available.
Speed: At the time it was introduced (a decade ago), ISDN offered very
significant speed advantage over regular modems, which were then limited to
14.4 Kbps or slower. Most of the other broadband connections did not exist at

L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 87


that time either. For many years, therefore, ISDN was the option of choice for
those who needed faster internet access, but who could not afford a leased
line. ISDN offers connections ranging from 64Kbps to 128 Kbps. But the speed
of ISDN does not come close to that of options such as cable of xDSL.

DSL (Digital Subscriber Lines)

DSL, also known as xDSL (a generic name), is another broadband


service that many telephone companies and other providers offer to
consumers. It is composed of several subcategories, the most common being
ADSL (Asymmetric Digital Subscriber Line), SDSL (Symmetric Digital
Subscriber Line), and HDSL (High-data-rate Digital Subscriber Line). ADSL
technology is a transport that allows faster flow of information downstream
than upstream, while SDLS supports one speed regardless of upstream or
downstream flow. These all work in the same general fashion. That is, DSL
squeezes the maximum capacity out of a telephone line. DSL services let the
user the current copper phone lines in his/her home for both data and voice
communication and (s)he can even use them simultaneously over the same
copper pair. This means that the user can surf the Internet and talk on the
phone at the same time. The DSL services do this by sending and receiving
data at a different frequency than the user’s voice.
ADSL is more popular in North America, whereas SDSL is being
developed primarily in Europe.
Speed: ADSL supports data rates from 1.5 to 9 Mbps when receiving
data (known as the downstream rate) and from 16 to 640 Kbps when sending
data (known as the upstream rate). SDSL supports data rates up to 3 Mbps.

1.2.4. Wireless LAN


A wireless local area network (WLAN) is a local area network (LAN) that
doesn't rely on wired Ethernet connections. A WLAN can be either an
extension to a current wired network or an alternative to it.
WLANs have data transfer speeds ranging from 1 to 54Mbps, with some
manufacturers offering proprietary 108Mbps solutions. The 802.11n standard
can reach 300 to 600Mbps.
Because the wireless signal is broadcast so everybody nearby can share
it, several security precautions are necessary to ensure only authorized users
can access your WLAN.
L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 88
A WLAN signal can be broadcast to cover an area ranging in size from a
small office to a large campus. Most commonly, a WLAN access point
provides access within a radius of 65 to 300 feet.
WLAN types
Private home or small business WLAN

Commonly, a home or business WLAN employs one or two access


points to broadcast a signal around a 100- to 200-foot radius. You can find
equipment for installing a home WLAN in many retail stores.
With few exceptions, hardware in this category subscribes to the
802.11a, b, or g standards (also known as Wi-Fi); some home and office
WLANs now adhere to the new 802.11n standard. Also, because of security
concerns, many home and office WLANs adhere to the Wi-Fi Protected
Access 2 (WPA2) standard.

Enterprise class WLAN


An enterprise class WLAN employs a large number of individual access
points to broadcast the signal to a wide area. The access points have more
features than home or small office WLAN equipment, such as better security,
authentication, remote management, and tools to help integrate with existing
networks. These access points have a larger coverage area than home or
small office equipment, and are designed to work together to cover a much
larger area. This equipment can adhere to the 802.11a, b, g, or n standard, or
to security-refining standards, such as 802.1x and WPA2.
WLAN Technologies

The 802.11 wireless standard is constrained by a scarcity of channels,


client-centric portability (rather than mobility), and unreliable bandwidth. But
what really limits WLAN is the way it has been implemented to date.

Figure 1.7 : WLAN Topology


L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 89
The traditional cell-based WLAN topology is fundamentally challenged
by its inability to adjust to channelization issues, AP-to-AP handoffs, and the
unpredictability of system bandwidth. These problems are multiplied when
different traffic types (voice and data) contend for the same airspace.
The end result is trade-offs between coverage, capacity, mobility, and
security. But trade-offs that were once acceptable when WLAN was only
peripheral to your networking strategy are no longer acceptable when Wi-Fi
becomes a critical component to business success.
What distinguishes Extricom from all other WLAN solutions on the
market is its ability to enable multiple blankets from the same infrastructure.
The system is therefore unique in combining multi-channel capacity with
channel blanket mobility and robustness. This makes an Extricom WLAN the
most operationally flexible system in the market, and has profound
implications for the All Wireless Enterprise.
The ultimate challenge to Enterprise WLAN is how to support multiple
applications with conflicting system requirements, such as voice and data.
Extricom has resolved this problem with an elegant simplicity: separate the
applications on different Channel Blankets. The result is the only integrated
system that delivers predictable grade of service, by enabling different
applications to operate in parallel, without contention, on the same physical
infrastructure.
In addition, the multiple concurrent Channel Blanket capability makes
Extricom the only solution that can support both 802.11n and legacy
802.11a/b/g at full performance and without necessitating a radical cutover
from what you have today.

1.2.5. Network Migration Process


Merging, renumbering, and migrating networks has traditionally been
largely a cumber-some manual process. The Network Controller automates
many of these changes via its real-time inventory and reporting modules. The
result is lowered cost and risk.

L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 90


1.4. Networking Transmission Medium

1.4.1. Unshielded Twisted Pair & Connector


This cable is the most commonly used and is cheaper than others. It is
lightweight, cheap, can be installed easily, and they support many different
types of network. Some important points :

 Its frequency range is 0 to 3.5 kHz.

 Typical attenuation is 0.2 dB/Km @ 1kHz.

 Typical delay is 50 µs/km.

 Repeater spacing is 2km.


Twisted Pair is of two types :

 Unshielded Twisted Pair (UTP)

 Shielded Twisted Pair (STP)

 Unshielded Twisted Pair Cable


It is the most common type of telecommunication when compared with
Shielded Twisted Pair Cable which consists of two conductors usually copper,
each with its own colour plastic insulator. Identification is the reason behind
coloured plastic insulation.
UTP cables consist of 2 or 4 pairs of twisted cable. Cable with 2 pair use
RJ-11 connector and 4 pair cable use RJ-45 connector.

Figure 1.8 : Unshielded twisted pair

L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 91


Advantages :

 Installation is easy

 Flexible

 Cheap

 It has high speed capacity,

 100 meter limit

 Higher grades of UTP are used in LAN technologies like Ethernet.


It consists of two insulating copper wires (1mm thick). The wires are
twisted together in a helical form to reduce electrical interference from similar
pair.
Disadvantages :

 Bandwidth is low when compared with Coaxial Cable

 Provides less protection from interference.

1.4.2. Shielded Twisted Pair & Connector

This cable has a metal foil or braided-mesh covering which encases each
pair of insulated conductors. Electromagnetic noise penetration is prevented
by metal casing. Shielding also eliminates crosstalk (explained in KEY TERMS
Chapter).
It has same attenuation as unshielded twisted pair. It is faster the
unshielded and coaxial cable. It is more expensive than coaxial and
unshielded twisted pair.

Figure 1.9 : Shielded Twisted Pair Cable

L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 92


Advantages :

 Easy to install

 Performance is adequate

 Can be used for Analog or Digital transmission

 Increases the signalling rate

 Higher capacity than unshielded twisted pair

 Eliminates crosstalk
Disadvantages :

 Difficult to manufacture

 Heavy points

1.4.3. Coaxial Cable & Connector

Coaxial is called by this name because it contains two conductors that are
parallel to each other. Copper is used in this as centre conductor which can be
a solid wire or a standard one. It is surrounded by PVC installation, a sheath
which is encased in an outer conductor of metal foil, barid or both.
Outer metallic wrapping is used as a shield against noise and as the
second conductor which completes the circuit. The outer conductor is also
encased in an insulating sheath. The outermost part is the plastic cover which
protects the whole cable. Connector type used are bnc and F connector.
Here the most common coaxial standards.

 50-Ohm RG-7 or RG-11 : used with thick Ethernet.

 50-Ohm RG-58 : used with thin Ethernet

 75-Ohm RG-59 : used with cable television

 93-Ohm RG-62 : used with ARCNET.

Figure 1.10: Coaxial Cable


L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 93
There are two types of Coaxial cables :
BaseBand

This is a 50 ohm (Ω) coaxial cable which is used for digital transmission.
It is mostly used for LAN’s. Baseband transmits a single signal at a time with
very high speed. The major drawback is that it needs amplification after every
1000 feet.
BroadBand

This uses analog transmission on standard cable television cabling. It


transmits several simultaneous signal using different frequencies. It covers
large area when compared with Baseband Coaxial Cable.
Advantages :

 Bandwidth is high

 Used in long distance telephone lines.

 Transmits digital signals at a very high rate of 10Mbps.

 Much higher noise immunity

 Data transmission without distortion.

 The can span to longer distance at higher speeds as they have


better shielding when compared to twisted pair cable
Disadvantages :

 Single cable failure can fail the entire network.

 Difficult to install and expensive when compared with twisted pair.

 If the shield is imperfect, it can lead to grounded loop. cable is the


most

1.4.4. Fiber Optic & Connector

Fiber optic "cable" refers to the complete assembly of fibers, other


internal parts like buffer tubes, ripcords, stiffeners, strength members all
included inside an outer protective covering called the jacket. Fiber optic
cables come in lots of different types, depending on the number of fibers and
how and where it will be installed. It is important to choose cable carefully as
the choice will affect how easy the cable is to install, splice or terminate and
what it will cost.

L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 94


Cable's job is to protect the fibers from the environment encountered in an
installation. Will the cable become wet or moist? Will it have to withstand high
pulling tension for installation in conduit or continual tension as in aerial
installations? Does it have to be flame-retardant? Ultra flexible? Will the cable
be exposed to chemicals or have to withstand a wide temperature range?
What about being gnawed on by a woodchuck or prairie dog? Inside buildings,
cables don't have to be so strong to protect the fibers, but they have to meet
all fire code provisions. Outside the building, it depends on whether the cable
is buried directly, pulled in conduit, strung aerially or whatever.

All cables are comprised of layers of protection for the fibers. Most all start
with standard fiber with a primary buffer coating (250 microns) and add:

Tight buffer coating (tight buffer cables like simplex, zipcord, distribution
and breakout types): A soft protective coating applied directly to the 250
micron coated fiber to provide additional protection for the fiber, allowing
easier handling, even direct termination on the fiber.

Loose Tubes (loose tube cables): Small, thin plastic tubes containing as
many as a dozen 250 micron buffered fibers used to protect fibers in cables
rated for outside plant use. They allow the fibers to be isolated from high
pulling tension and can be filled with water-blocking materials to prevent
moisture entry.

Strength members and stiffeners: Usually aramid yarn, the same used in
bulletproof vests, often called by the duPont trade name Kevlar, which absorbs
the tension needed to pull the cable and provides cushioning for the fibers.
Aramid fibers are used not only because they are strong, but they do not
stretch. If pulled hard, they will not stretch but eventually break when tension
exceeds their limits. This ensures that the strength members will not stretch
and then relax, binding the fibers in the cable. The proper method of pulling
fiber optic cables is always to attach the pull rope, wire or tape to the strength
members.

L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 95


Some cables also include a central fiberglass rod used for additional
strength and to stiffen the cable to prevent kinking and damaging the fibers.
When included, these rods should be attached to swivel pulling eyes.

Jacket: The outermost layer of protection for the fibers that is chosen to
withstand the environment in which the cable is installed. Outside cables will
generally be black polyethelene (PE) which resists moisture and sunlight
exposure. Indoor cables use flame-retardant jackets that can be color-coded
to identify the fibers inside the cable. Some outdoor cables may have double
jackets with a metallic armor between them to protect from chewing by rodents
or kevlar for strength to allow pulling by the jackets. Indoor-outdoor cables
have a PE outer jacket that can be removed to expose a flame-retardant inner
jacket for use within buildings.

Protection against Water and Moisture: Cables installed outdoors require


protecting the fibers from water. Either a gel or absorbent tape or powder is
used to prevent water from entering the cable and causing harm to the fibers.
Generally, this applies to loose tube or ribbon cables, but dry water-blocking is
used on some tight buffer cables used in short outdoor runs, such as building
to building on a campus or to an outdoor wireless antenna or CCTV camera.

Cable Types
Tight buffer cables (Simplex, Zipcord, Distribution and Breakout) are used
where cable flexibility and ease of termination are important, more so than
ruggedness and pulling strength which characterize loose tube and ribbon
types of cable. Generally, tight buffer cables are used indoors and loose
tube/ribbon cables outdoors.

Simplex and zip cord

These types are used mostly for patch cord and backplane applications, but
zipcord can also be used for desktop connections. Simplex cables are one
fiber, tight-buffered (coated with a 900 micron buffer over the primary buffer
coating) with Kevlar (aramid fiber) strength members and jacketed for indoor
use. The jacket is usually 3mm (1/8 in.) diameter. Zipcord is simply two of
these joined with a thin web.
L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 96
Distribution cables

Distribution cable is the most popular indoor cable, as it is small in size and
light in weight. They contain several tight-buffered fibers bundled under the
same jacket with Kevlar strength members and sometimes fiberglass rod
reinforcement to stiffen the cable and prevent kinking. These cables are small
in size, and used for short, dry conduit runs, riser and plenum applications.
The fibers are double buffered and can be directly terminated, but because
their fibers are not individually reinforced, these cables need to be broken out
with a "breakout box" or terminated inside a patch panel or junction box to
protect individual fibers.

Breakout cables

Breakout cable is a favorite where rugged cables are desirable or direct


termination without junction boxes, patch panels or other hardware is needed.
They are made of several simplex cables bundled together insdie a common
jacket. This is a strong, rugged design, but is larger and more expensive than
the distribution cables. It is suitable for conduit runs, riser and plenum
applications. It's perfect for industrial applications where ruggedness is
needed. Because each fiber is individually reinforced, this design allows for
quick termination to connectors and does not require patch panels or boxes.
Breakout cable can be more economic where fiber count isn't too large and
distances too long, because is requires so much less labor to terminate.

Loose tube cables

Loose tube cables are the most widely used cables for outside plant trunks
because it offers the best protection for the fibers under high pulling tensions
and can be easily protected from moisture with water-blocking gel or
tapes.These cables are composed of several fibers together inside a small
plastic tube, which are in turn wound around a central strength member,
surrounded by aramid strength members and jacketed, providing a small, high
fiber count cable. This type of cable is ideal for outside plant trunking
applications, as it can be made with the loose tubes filled with gel or water
absorbent powder to prevent harm to the fibers from water. It can be used in
conduits, strung overhead or buried directly into the ground. Some outdoor
cables may have double jackets with a metallic armor between them to protect

L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 97


from chewing by rodents or kevlar for strength to allow pulling by the jackets.
Since the fibers have only a thin buffer coating, they must be carefully handled
and protected to prevent damage. Loose tube cables with singlemode fibers
are generally terminated by spicing pigtails onto the fibers and protecting them
in a splice closure. Multimode loose tube cables can be terminated directly by
installing a breakout kit, also called a furcation or fan-out kit, which sleeves
each fiber for protection.

Ribbon Cable

Ribbon cable is preferred where high fiber counts and small diameter cables
are needed.This cable has the most fibers in the smallest cable, since all the
fibers are laid out in rows in ribbons, typically of 12 fibers, and the ribbons are
laid on top of each other. Not only is this the smallest cable for the most
number of fibers, it's usually the lowest cost. Typically 144 fibers only has a
cross section of about 1/4 inch or 6 mm and the jacket is only 13 mm or 1/2
inch diameter! Some cable designs use a "slotted core" with up to 6 of these
144 fiber ribbon assemblies for 864 fibers in one cable! Since it's outside plant
cable, it's gel-filled for water blocking or dry water-blocked. Another advantage
of ribbon cable is Mass Fusion Splicers can join a ribbon (12 fibers) at once,
making installation fast and easy. Ribbon pigtails are spliced onto the cable for
quick termination.

Armored Cable

Armored cable is used in direct buried outside plant applications where a


rugged cable is needed and/or rodent resistance. Armored cable withstands
crush loads well, needed for direct burial applications. Cable installed by direct
burial in areas where rodents are a problem usually have metal armoring
between two jackets to prevent rodent penetration. Another application for
armored cable is in data centers, where cables are installed underfloor and
one worries about the fiber cable being crushed. Armored cable is conductive,
so it must be grounded properly.

L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 98


Aerial cable

Aerial cables are for outside installation on poles. They can be lashed to a
messenger or another cable (common in CATV) or have metal or aramid
strength members to make them self supporting. The cable shown has a steel
messenger for support. It must be grounded properly.
A widely used aerial cable is optical power ground wire (OPGW) which is a
high voltage distribution cable with fiber in the center. The fiber is not affected
by the electrical fields and the utility installing it gets fibers for grid
management and communications. This cable is usually installed on the top of
high voltage towers but brought to ground level for splicing or termination.

1.4.5. Wired Transmition medium Test Gear


Networks are everywhere, and even as home Wi-Fi routers proliferate,
there is still a tremendous need for wired networks. Wired networks are more
robust, faster, and often less expensive than wireless ones. Best of all, wired
networks never have to worry about interference because the neighbors are
on the same channel. The one issue with wired networks is that when they
stop working, it can be difficult to troubleshoot. This is where a network cable
tester comes in. This simple device is vital for checking cable continuity to
ensure that the signal is getting through, and eliminating cable connectivity
issues when troubleshooting network problems.

Network Cable Tester Basics


In its simplest form, a network cable tester relies on the simple fact that
network cables transmit data electronically. Because electricity requires a
continuous physical connection, any breaks in the wiring inside the network
cable prevent it from functioning. The other problem cables can face is that of
cross-wiring, where some of the internal wires make the wrong connections,
causing a short-circuit.

Network Cables

Most network cable testers can test two basic types of cable: coaxial and
twisted pair.. Coaxial cable, the kind used for cable TV, uses a single shielded
conductor that runs down the center of the cable. Twisted pair relies on
multiple pairs of wire wrapped together. Both kinds of twisted pair use similar
connectors, but the one for an is larger than that for telephone. Coaxial cable
L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 99
normally uses the same kind of barrel connectors found in cable TV
installations

Using a Network Cable Tester

Never connect a cable tester to a live circuit. Always remove the cable
from both the computer and router or modem before connecting the tester.
The majority of testers consist of two main components: the tester itself and
the remote. Most testers have either two or three connectors: RJ-45 for
Ethernet, RJ-11 for telephone cable, and BNC for coaxial cable.. The smaller
remote has two connectors, one each for RJ-11 and RJ-45. If the network
cable tester supports coaxial cable networking, it comes with a terminator..
Users simply plug the network cable into the appropriate port on the cable
tester itself, and then connect the remote to the other end of the cable.

Running a Network Cable Test


Once the cable is connected to both the tester and the remote, users
should turn the tester on to send a signal up the cable, which lights up the
LEDs on both the tester and remote. It not only works as a continuity tester,
but more importantly, shows the user exactly what kind of network cable they
have and indicates any potential problem, leaving no need for guesswork. The
tester distinguishes between straight through patch and crossover cable,, as
well as showing both shorts and open circuits. Note that this is only necessary
for twisted pair, such as Category 5 Ethernet cable,, as a coaxial network
cable only needs a continuity tester.

Reading a Network Cable Tester

The standard network cable tester has a row of 10 LEDs on the body and 9
LEDs on the remote to match up with the standard connector pinouts. The
tester sends a signal down each pair in turn, lighting the LEDs up. The order in
which they either light or do not light indicates the cable type and whether or
not it is working.

L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 100


Figure 1.11: UTP & coxial Cable Tester

Cable Condition Reading

Straight Through Light in same sequence on both units

Crossover Light in reverse order on remote

Open Circuit No lights on either main unit or remote

Short Circuit Lights on main unit but not remote

Ethernet Cable Eight LEDs plus ground all light in sequence

Coaxial Cable Bottom LED and LED on terminator light

1.4.6. Building UTP Cable cat5e & Cat 6


Before start building a patch cable we will need to cut a length of stranded
Cat5e. When cutting the length you should make sure to measure. Nothing is
worse than the patch cable you just built being an inch too short for your
application.
After cutting the desired length we will start building our cable by stripping
back approximately 1 inch of the jacket. We have a variety of tools.

When striping back the jacket make sure that the depth of your stripper is set
deep enough to cut the jacket but not so deep that it nicks the conductors. If
you do nick the conductors while stripping the cable, the cable may work fine

L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 101


at first, but after time the conductors will break, or even worse, begin to short
out..

Figure 1.12: UTP Cable Stripper

Step 2: Now that we have the jacket stripped back we'll want to separate and
straighten the pairs. We'll start by pulling the first pair and the last pair to their
respective sides (Orange to the left and Brown to the right). Untwist these
pairs making sure not to untwist the cable any further than you've stripped
back the jacket. Now we'll split the green pair. Pull the white/green conductor
to the left and the green conductor to the right. This leaves you with the blue
pair in the middle. Untwist the blue taking care to ensure that the white/blue
conductor is on the left and the blue conductor on the right.

Figure 1.13: UTP Cable untwist

Step 3: Now that we've separated and straightened the pairs we need to
arrange the conductors in the proper order according to which wiring standard
you are using. For this example we will be wiring via the 568-B standard (most
common in patch cables). Please consult the pin-out for the proper color
codes. After you have the wires arranged, place them tightly together as show

L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 102


in the picture to the right. Once this is done, verify that the wires are still in the
proper order and continue to step 4.

Figure 1.14: UTP Cable align

Step 4: Now we need to trim the conductors down to fit into the RJ45
connector. While trimming, make sure you make a nice clean cut at a 90
degree angle about 1/2 of an inch from the end of the jacket. If you fail to
make a straight cut, some of the conductors may not reach the connector
contacts. If you cut the conductors too short, again they will not make contact.
If you leave the conductors too long, when crimping the connector, the
jacketing will not be gripped leaving the strain on the conductors. This is not a
good situation! For proper trimming, hold the wires securely just at the end of
the jacket as shown in the picture to the left. Be sure to keep the conductors in
the proper order.

Figure 1.15: UTP Cable cut to proper length

Step 5: Our Cat5e patch cable is almost done. While still holding the cable
firmly, we now need to place the conductors into their proper location in the
RJ45 Cat5e Modular Connector. Hold the RJ45 modular plug with the
contacts facing up (towards you) and carefully insert the conductors in their

L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 103


proper locations. Apply a moderate amount of force in order to properly seat
the wires against the contacts in the connector. When the wires have been
correctly inserted into the RJ45 modular connector, observe the tip. As
illustrated in the picture to the left you should be able to see the end of each
conductor, indicating that the conductors were fully inserted. Also, take note of
the colors. All whites should be on the top and all the colored conductors on
the bottom. Once this is achieved, continue to Step 6.

Figure 1.16: UTP Cable inserted to RJ45 for Cat5e and Cat6 connector

Step 6: Carefully insert the assembly which you have just completed into a
modular crimping tool, taking care to verify the conductors stay fully inserted.
When crimping the connector, use the full stroke of the crimp tool so that the
contacts properly "bite" into the conductors. After you have completed the
crimp, take time to look at the connector and make sure all the pins were
crimped and that they made good contact with the conductors.

Figure 1.17: Cat5e and Cat6 connector crimper

Step 7: That's it! Use a tester to test for continuity and your diy Cat 5, 5e
patch cable is complete.

L03-05-22-LA1-IS WIM/L03/12016/S05 PAGE 104


LA2 CONDUCT NETWORK ADMINISTRATION & MANAGEMENT SYSTEM (NMS)
PROVISIONING AND MONITORING ACTIVITIES

1. Networking Equipment and Devices

1.1. Basic Equipment

NICs (Network Interface Card)

Network Interface Card, or NIC is a hardware card installed in a


computer so it can communicate on a network. The network adapter provides
one or more ports for the network cable to connect to, and it transmits and
receives data onto the network cable.

Figure 2.1: Wireless Lan card

Every networked computer must also have a network adapter driver,


which controls the network adapter. Each network adapter driver is
configured to run with a certain type of network adapter.

Figure 2.2: network card

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 105


Network Interface Adapter Functions

Network interface adapters perform a variety of functions that are


crucial to getting data to and from the computer over the network.

These functions are as follows:

a. Data encapsulation

The network interface adapter and its driver are responsible for building
the frame around the data generated by the network layer protocol, in
preparation for transmission. The network interface adapter also reads the
contents of incoming frames and passes the data to the appropriate network
layer protocol.

b. Signal encoding and decoding

The network interface adapter implements the physical layer encoding


scheme that converts the binary data generated by the network layer-now
encapsulated in the frame-into electrical voltages, light pulses, or whatever
other signal type the network medium uses, and converts received signals to
binary data for use by the network layer.

c. transmission and reception

The primary function of the network interface adapter is to generate


and transmit signals of the appropriate type over the network and to receive
incoming signals. The nature of the signals depends on the network medium
and the data-link layer protocol. On a typical LAN, every computer receives
all of the packets transmitted over the network, and the network interface
adapter examines the destination address in each packet, to see if it is
intended for that computer. If so, the network interface adapter passes the
packet to the computer for processing by the next layer in the protocol stack;
if not, the network interface adapter discards the packet.

d. Data buffering

Network interface adapters transmit and receive data one frame at a


time, so they have built-in buffers that enable them to store data arriving
either from the computer or from the network until a frame is complete and
ready for processing.

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 106


e. Serial/parallel conversion

The communication between the computer and the network interface


adapter runs in parallel, that is, either 16 or 32 bits at a time, depending on
the bus the adapter uses. Network communications, however, are serial
(running one bit at a time), so the network interface adapter is responsible for
performing the conversion between the two types of transmissions.

f. Media access control

The network interface adapter also implements the MAC mechanism


that the data-link layer protocol uses to regulate access to the network
medium. The nature of the MAC mechanism depends on the protocol used.

g. HUB

Networks using a Star topology require a central point for the devices to
connect. Originally this device was called a concentrator since it consolidated
the cable runs from all network devices. The basic form of concentrator is the
hub. the hub is a hardware device that contains multiple, independent ports
that match the cable type of the network. Most common hubs interconnect
Category 3 or 5 twisted-pair cable with RJ-45 ends, although Coax BNC and
Fiber Optic BNC hubs also exist. The hub is considered the least common
denominator in device concentrators. Hubs offer an inexpensive option for
transporting data between devices, but hubs don't offer any form of
intelligence. Hubs can be active or passive.

An active hub strengthens and regenerates the incoming signals before


sending the data on to its destination.

Passive hubs do nothing with the signal.

h. SWITCHES

Switches are a special type of hub that offers an additional layer of


intelligence to basic, physical-layer repeater hubs. A switch must be able to
read the MAC address of each frame it receives. This information allows
switches to repeat incoming data frames only to the computer or computers
to which a frame is addressed. This speeds up the network and reduces

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 107


congestion. Switches operate at both the physical layer and the data link
layer of the OSI Model.

Figure 2.3: network Switches

i. BRIDGE

A bridge is used to join two network segments together, it allows


computers on either segment to access resources on the other. They can
also be used to divide large networks into smaller segments. Bridges have all
the features of repeaters, but can have more nodes, and since the network is
divided, there is fewer computers competing for resources on each segment
thus improving network performance.

Bridges can also connect networks that run at different speeds,


different topologies, or different protocols. But they cannot, join an Ethernet
segment with a Token Ring segment, because these use different networking
standards. Bridges operate at both the Physical Layer and the MAC sublayer
of the Data Link layer. Bridges read the MAC header of each frame to
determine on which side of the bridge the destination device is located, the
bridge then repeats the transmission to the segment where the device is
located.

j. Routers

Routers Are networking devices used to extend or segment networks


by forwarding packets from one logical network to another. Routers are most
often used in large internetworks that use the TCP/IP protocol suite and for

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 108


connecting TCP/IP hosts and local area networks (LANs) to the Internet
using dedicated leased lines.

Routers work at the network layer (layer 3) of the Open Systems


Interconnection (OSI) reference model for networking to move packets
between networks using their logical addresses (which, in the case of
TCP/IP, are the IP addresses of destination hosts on the network). Because
routers operate at a higher OSI level than bridges do, they have better
packet-routing and filtering capabilities and greater processing power, which
results in routers costing more than bridges.

1.2. Power Over Ethernet (POE) Equipment

Power over Ethernet (POE) is a technology that lets network cables


carry electrical power. For example, a digital security camera normally
requires two connections to be made when it is installed:

A network connection, in order to be able to communicate with video


recording and display equipment

A power connection, to deliver the electrical power the camera needs to


operate. However, if the camera is POE-enabled, only the network
connection needs to be made, as it will receive its electrical power from this
cable as well.

Power over Ethernet reduces the number of cables required to connect


a POE IP camera

Figure 2.4: Ip Camera

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 109


1.3. Why use POE?

Specifying Power over Ethernet brings many advantages to an


installation:

Time and cost savings - by reducing the time and expense of having
electrical power cabling installed. Network cables do not require a qualified
electrician to fit them, and can be located anywhere.

Flexibility - without being tethered to an electrical outlet, devices such


as IP cameras and wireless access points can be located wherever they are
needed most, and repositioned easily if required. Safety - POE delivery is
intelligent, and designed to protect network equipment from overload, under
powering, or incorrect installation.

Reliability - POE power comes from a central and universally


compatible source, rather than a collection of distributed wall adapters. It can
be backed-up by an uninterruptible power supply, or controlled to easily
disable or reset devices.

Scalability - having power available on the network means that


installation and distribution of network connections is simple and effective.

Devices that use Power over Ethernet

POE has many applications, but the three key areas are:

VoIP phones - the original POE application. Using POE means phones
have a single connection to a wall socket, and can be remotely powered
down, just like with the older analog systems.

IP cameras - POE is now ubiquitous on networked surveillance


cameras, where it enables fast deployment and easy repositioning.

Wireless - Wifi and Bluetooth APs and RFID readers are commonly
PoE-compatible, to allow remote location away from AC outlets, and
relocation following site surveys.

How to upgrade to POE

Adding POE to your network is straightforward, and there are two


routes you can choose:

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 110


A POE switch is a network switch that has Power over Ethernet
injection built-in. Simply connect other network devices to the switch as
normal, and the switch will detect whether they are POE-compatible and
enable power automatically.

POE switches are available to suit all applications, from low-cost


unmanaged edge switches with a few ports, up to complex multi-port rack-
mounted units with sophisticated management.

Adding Power over Ethernet using a POE Switch

Figure 2.5: Injected POE

A midspan (or POE injector) is used to add POE capability to regular


non-POE network links. Midspans can be used to upgrade existing LAN
installations to POE, and provide a versatile solution where fewer POE ports
are required. Upgrading each network connection to POE is as simple as
patching it through the midspan, and as with POE switches, power injection
is controlled and automatic.

Midspans are available as multi-port rack-mounted units or low-cost


single-port injectors.

Adding Power over Ethernet using a POE Midspan

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 111


Figure 2.6: Multinetwork

It is also possible to upgrade powered devices, such as IP cameras, to


POE by using a POE splitter. The POE splitter is patched in to the camera's
network connection, and taps off the POE power, which it converts into a
lower voltage suitable for the camera.

1.4. Network Operating System (NOS)

A network operating system (NOS) is a computer operating system


system that is designed primarily to support workstation, personal computer,
and, in some instances, older terminal that are connected on a local area
network (LAN). Artisoft's LANtastic, Banyan VINES, Novell's NetWare, and
Microsoft's LAN Manager are examples of network operating systems. In
addition, some multi-purpose operating systems, such as Windows NT and
Digital's OpenVMS come with capabilities that enable them to be described
as a network operating system.

1.5. Routing Procedure

Routing is the process of selecting best paths in a network. In the past,


the term routing also meant forwarding network traffic among networks.
However, that latter function is better described as forwarding. Routing is
performed for many kinds of networks, including the telephone network
(circuit switching), electronic data networks (such as the Internet), and
transportation networks. This article is concerned primarily with routing in
electronic data networks using packet switching technology.

In packet switching networks, routing directs packet forwarding (the


transit of logically addressed network packets from their source toward their

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 112


ultimate destination) through intermediate nodes. Intermediate nodes are
typically network hardware devices such as routers, bridges, gateways,
firewalls, or switches. General-purpose computers can also forward packets
and perform routing, though they are not specialized hardware and may
suffer from limited performance. The routing process usually directs
forwarding on the basis of routing tables, which maintain a record of the
routes to various network destinations. Thus, constructing routing tables,
which are held in the router's memory, is very important for efficient routing.
Most routing algorithms use only one network path at a time. Multipath
routing techniques enable the use of multiple alternative paths.

1.6. Switching Procedure

Switching is an approach of delivering frames across the network.


Switching method decides how a switch receives, processes, and forwards
the frames. Switch may supports three switching methods store-forward, cut-
through and fragment-free. In this article we will explain these methods in
details with switching concept used by various layer two devices.

Switching concept may confuse sometime, as a lot of terms are


associated with switching such as packet switching, circuit switching. These
are the WAN implementation of layer 2 LAN technology. To make this
process easier to understand we will start from LAN and gradually extend it
to WAN.

1.6.1. Switching Concepts in Computer Network


Hub and repeater works at Layer 1 ( Physical layer ). These devices
only understand the signals. Signals received on incoming port are forwarded
from all available ports.

Bridge and switch work at layer 2 ( Data Link Layer). Bridge and switch
both are capable to read frames. Switching is a method of dealing with
frames. Switching is described in Layer 2 of OSI model. Switch is the
upgraded version of bridge. Bridge was the earlier implementation that has
been replaced by the switch.

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 113


Switching concept was developed to solve two major issues of Ethernet
bandwidth and collision.

1.6.2. Bandwidth
Bandwidth is the data ( in data unit such as kb, mb, gb etc) transferred
through the media in particular time unit ( such as second, minute, hour ). It is
a measurement of bit-rate of available or consumed data communication
resources expressed in bits per second or multiples of it.

Bandwidth is a critical resource for network. Bandwidth is limited by


media type and technology. In WAN, bandwidth is the costly resource. To
save bandwidth different switching approach are used such as packet switch,
circuit switch, frame really. We will cover these approach later in this article.

1.6.3. Collision
In LAN network multiple devices can share the same segment that
create the collision. Collision is the effect of two devices sending
transmissions simultaneously in Ethernet. When they meet on the physical
media, the frames from each device collide and damaged.

Collision domain

Group of devices that share same collision effects over the Ethernet
network.

1.6.4. CSMA/CD
It is mechanism of removing collision from network. When two or more
nodes simultaneously sense the wire and found no frame, and each device
places its frame on the wire. These frame would be collide in wire and a
collision will occur. NIC (Network Interface Card) actually examine wire
before placing any frame on it, this collision detection method is known as
CSMA/CD.

1.7. IP Addressing

1.7.1. Classful Addressing

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 114


Classful networks use the 'classful' sub-net mask according to the
leading bits in the first block of the IP address:

Class A begins with binary 0 (0-127.x.x.x)

So and IP address 0.0.0.0 to 127.255.255.255 use sub-net mask =


255.0.0.0

Class B begins with binary 10 (128-191)

So IP addresses 128.0.0.0 to 192.255.255.255 use sub-net mask =


255.255.0.0

Class C begin with binary 110 (192-223)

So IP addresses 192.0.0.0 to 255.255.255.0 use a sub-net mask =


255.255.255.0

1.7.2. Classless Addressing

Classless IP addressing means we can use any sub-net mask want,


even assigning partial blocks. For example sub-net 172.16.0.0 is a class B
network.

But you have two physical interfaces on your router that connect to
switches with 5 VLANs. Classless routing allows me to break up this IP
address into more useful segments.

Switch 1 Switch 2

VLAN1 172.16.1.0/24 VLAN10 172.16.10.0/24

VLAN2 172.16.2.0/24 VLAN11 172.16.11.0/24

VLAN3 172.16.3.0/24 VLAN12 172.16.12.0/24

VLAN4 172.16.4.0/24 VLAN13 172.16.13.0/24

VLAN5 172.16.5.0/24 VLAN14 172.16.14.0/24

So we have10 useful sub-nets from a single network. Here's the real


advantage:

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 115


When router is configured for classless routing it can advertise all 10
networks as one IP address 172.16.0.0 255.255.240.0, or can advertise each
physical interface using 172.16.0.0 and 172.16.8.0 using this sub-net mask
255.255.248.0

Still have spare room in the 172.16.0.0/16 for lots more sub-nets. If we
want to create another group, do the binary math, next available sub-nets are
172.16.24.0 255.255.248.0. If #no auto-summary command on routing
protocol. We can place the new 172.16.x.x sub-nets anywhere in my
network.

1.7.3. IP v4 vs IPv6

IPv4 stands for Internet Protocol version 4. It is the underlying


technology that makes it possible for us to connect our devices to the web.
Whenever a device access the Internet (whether it's a PC, Mac, smart phone
or other device), it is assigned a unique, numerical IP address such as
99.48.227.227. To send data from one computer to another through the web,
a data packet must be transferred across the network containing the IP
addresses of both devices.

Without IP addresses, computers would not be able to communicate


and send data to each other. It's essential to the infrastructure of the web.
IPv4 uses 32 bits for its Internet addresses. That means it can support 2^32
IP addresses in total — around 4.29 billion. That may seem like a lot, but all
4.29 billion IP addresses have now been assigned to various institutions,
leading to the crisis we face today.

IPv6 is the sixth revision to the Internet Protocol and the successor to
IPv4. It functions similarly to IPv4 in that it provides the unique, numerical IP
addresses necessary for Internet-enabled devices to communicate. However,
it does sport one major difference: it utilizes 128-bit addresses. As previously
stated, IPv6 utilizes 128-bit Internet addresses. Therefore, it can support
2^128 Internet addresses—
340,282,366,920,938,000,000,000,000,000,000,000,000 of them to be exact.
That's a lot of addresses, so many that it requires a hexadecimal system to
display the addresses. In other words, there are more than enough IPv6
addresses to keep the Internet operational for a very, very long time. Most
operating systems actually support IPv6, including Mac OS X 10.2 and
L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 116
Windows XP SP 1. However, many routers and servers don't support it,
making a connection between a device with an IPv6 address to a router or
server that only supports IPv4 impossible. IPv6 is also still in its infancy; it
has a lot of bugs and security issues that still need to be fixed, which could
result in one giant mess.

Figure 2.7 : Ipv4 vs Ipv6

1.7.5. Subnet Mask

A subnet mask is a screen of numbers used for routing traffic within a


subnet. Once a packet has arrived at an organization's gateway or
connection point with its unique network number, it can be routed to its
destination within the organization's internal gateways using the sub-net
number.

1.7.6. Broadcast Address

A broadcast address is a logical address at which all devices


connected to a multiple-access communications network are enabled to
receive data grams. A message sent to a broadcast address is typically
received by all network-attached hosts, rather than by a specific host.

1.7.7. Designing Ip Address Usage

The IPv4 address is a 32-bit number that uniquely identifies a network


interface on a system, as explained in How IP Addresses Apply to Network

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 117


Interfaces. An IPv4 address is written in decimal digits, divided into four 8-bit
fields that are separated by periods. Each 8-bit field represents a byte of the
IPv4 address. This form of representing the bytes of an IPv4 address is often
referred to as the dotted-decimal format.

The following figure shows the component parts of an IPv4 address,


172.16.50.56.

The figure divides the IPv4 address into two parts, network part and
network host, which are described in the next context.

172.16 Registered IPv4 network number. In class-based IPv4 notation,


this number also defines the IP network class, Class B in this example, that
would have been registered by the IANA.

50.56 Host part of the IPv4 address. The host part uniquely identifies
an interface on a system on a network. Note that for each interface on a local
network, the network part of the address is the same, but the host part must
be different.

1.7.8. IP Address Troubleshooting

When use TCP/IP as network protocol, an incorrect TCP/IP setting


(such as an incorrect IP address or an incorrect sub-net mask) can cause
communication problems. To determine whether Windows NT or 2000 has
recorded an error due to an incorrect TCP/IP setting, examine the Event
Viewer system log and look for any entry with TCP/IP or DHCP as the
source. To read an Event Viewer entry, double-click the entry.

If you receive TCP/IP errors in the Event Viewer system log, resolve
each error received as indicated by the error message. For example, if you
receive an error stating that the IP address parameter is incorrect, you should
verify that your IP address is valid.

If there are no errors in the Event Viewer system log, follow these steps
to make sure that the correct TCP/IP configuration information is being used:

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 118


Use the IPCONFIG command to determine your computer's basic
TCP/IP settings. To do so, type ipconfig at a command prompt.

Verify that the IP address and sub-net mask displayed by the


IPCONFIG command are the correct values for your computer. If you are not
sure what the correct values are, contact your network administrator.

a. Ping the Loop back Address


Use the PING command to verify that TCP/IP is working properly. To
do so, ping the loop back address (127.0.0.1) by typing the following
command at a command prompt:

ping 127.0.0.1

You should receive a response similar to the following:

Pinging 127.0.0.1 with 32 bytes of data:

Reply from 127.0.0.1: bytes=32 time=<10ms TTL=128

Reply from 127.0.0.1: bytes=32 time=<10ms TTL=128

Reply from 127.0.0.1: bytes=32 time=<10ms TTL=128

Reply from 127.0.0.1: bytes=32 time=<10ms TTL=128

If you receive an error message at this point, TCP/IP is not properly


installed. To remove and reinstall TCP/IP, follow these steps:

NOTE: You must be logged on as a user with Administrator rights to


complete these steps.

i. In Control Panel, double-click Network, and then click the Protocols


tab.

ii. Click TCP/IP Protocol to select it, click Remove, and then click yes.

iii. Click Close, and then click Yes to restart the computer.

iv. Log on as a user with Administrator rights.

v. In Control Panel, double-click Network, and then click the Protocols


tab.

vi. Click Add, click TCP/IP Protocol to select it, and then click OK.

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 119


vii. If you want to use DHCP, click Yes when prompted. If you do not
want to use DHCP, click No.

viii. When prompted, type the path for the Windows NT source files,
click Continue, and then click Close.

If you are not using DHCP, you are prompted for your TCP/IP
configuration information. Provide the appropriate values, and then click OK.
If you are not sure what the appropriate values are, contact your network
administrator.

Click No when you are prompted to restart your computer. If you have
installed a Windows NT Service Pack, you need to re-install the Service Pack
before you restart your computer.

b. Restart your computer.

If you receive an error message while removing and re-installing


TCP/IP, you may need to manually remove TCP/IP from the Windows NT
registry. For information about manually removing TCP/IP from the Windows
NT registry, see the following article in the Microsoft Knowledge Base:

151237 Error Message When Installing TCP/IP or Adding TCP/IP


Service

c. Ping Your Computer's IP Address

If you can ping the loop back address successfully, attempt to ping your
own IP address by typing ping <IP address> at a command prompt, where
<IP address> is your computer's IP address.

NOTE: If you do not know your computer's IP address, you can obtain
that information by typing ipconfig at a command prompt.

You should receive a response similar to the following:

Pinging <###.###.###.###> with 32 bytes of data:

Reply from <###.###.###.###>: bytes=32 time=77ms TTL=28

Reply from <###.###.###.###>: bytes=32 time=80ms TTL=28

Reply from <###.###.###.###>: bytes=32 time=78ms TTL=28

Reply from <###.###.###.###>: bytes=32 time=79ms TTL=28

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 120


Where <###.###.###.###> is your computer's IP address.

If you receive an error message at this point, there may be a


communication problem between Windows NT and your network adapter. To
correct this problem, remove and re-install your network adapter driver. To do
so, follow these steps:

NOTE: You must be logged on as a user with Administrator rights to


complete these steps.

i. In Control Panel, double-click Network, and then click the Adapters


tab.

ii. Click your network adapter driver to select it, click Remove, and
then click Yes.

iii. Click Close, and then click Yes to restart your computer.

iv. Log on as a user with Administrator rights.

v. In Control Panel, double-click Network, and then click the Adapters


tab.

vi. Click Add, click your network adapter driver to select it, and then
click OK.

vii. Use the dialog box(es) provided to configure your network adapter,
and then click OK.

viii. When prompted, type the path for the Windows NT source files,
click Continue, and then click Close.

When you are prompted for your TCP/IP configuration information,


provide the appropriate values, and then click OK. If you are not sure what
the appropriate values are, contact your network administrator.

Click No when you are prompted to restart your computer. If you have
installed a Windows NT Service Pack, you need to re-install the Service Pack
before you restart your computer.

d. Restart your computer.

If you are unable to ping your computer's IP address after removing


and re-installing your network adapter driver, contact the manufacturer of
L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 121
your network adapter to verify that you are using the appropriate Windows
NT driver for your network adapter.

e. Clear the Address Resolution Protocol (ARP) Cache

The address resolution protocol (ARP) cache is a list of recently


resolved IP address to Media Access Control (MAC) address mappings. The
MAC address is the unique physical address embedded in each network
adapter.

If an entry in the ARP cache is incorrect, IP data grams may be sent to


the wrong computer. To display all mappings currently in the ARP cache, use
the ARP command by typing arp-a at a command prompt. You should
receive either a "No ARP Entries Found" message (if the ARP cache is
empty) or a response similar to the following:

Interface: 10.1.1.3 on Interface 2

Internet Address Physical Address Type

10.1.1.7 08-00-02-06-ed-20 dynamic

10.1.1.254 08-00-02-0a-a3-10 dynamic

Figure 2.8 : 10.1.1.3 on Interface 2

To remove any incorrect entries in the ARP cache, clear all entries
using the following command:

arp -d <IP address>

Where <IP address> is an Internet address stored in the ARP cache.


Use this command for each entry in the ARP cache until all entries have
been deleted.

For more information on the syntax, options, and usage of the ARP
command, type arp -? at a command prompt.

f. Verify the Default Gateway

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 122


Use the IPCONFIG command to determine the IP address that your
computer uses to access your default gateway. To do so, type "ipconfig"
(without quotation marks) at a command prompt. Verify that the IP address
displayed for your default gateway is correct. If you do not know the correct
IP address for your default gateway, contact your network administrator.

When you have verified that you have the correct IP address for your
default gateway, use the PING command to verify that you can ping your
default gateway's IP address. You should receive a response similar to the
following:

Pinging <###.###.###.###> with 32 bytes of data:

Reply from <###.###.###.###>: bytes=32 time=77ms TTL=28

Reply from <###.###.###.###>: bytes=32 time=80ms TTL=28

Reply from <###.###.###.###>: bytes=32 time=78ms TTL=28

Reply from <###.###.###.###>: bytes=32 time=79ms TTL=28

Where <###.###.###.###> is the IP address of your default gateway.

If your default gateway is not connected to the network or not


functioning properly, you may receive a response similar to the following:

Pinging <###.###.###.###> with 32 bytes of data:

Request timed out.

Request timed out.

Request timed out.

Request timed out.

If you cannot successfully ping your default gateway's IP address,


contact your network administrator to verify that your default gateway is
connected to the network and functioning properly.

g. Ping the IP Address of the Other Computer

Try to ping the IP address of the other computer. To do so, type ping
<IP address> where <IP address> is the IP address of the other computer.
You should receive a response similar to the following:

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 123


Pinging <###.###.###.###> with 32 bytes of data:

Reply from <###.###.###.###>: bytes=32 time=77ms TTL=28

Reply from <###.###.###.###>: bytes=32 time=80ms TTL=28

Reply from <###.###.###.###>: bytes=32 time=78ms TTL=28

Reply from <###.###.###.###>: bytes=32 time=79ms TTL=28

Where <###.###.###.###> is the IP address of the other computer.

If there is an improperly configured router between your computer and


the other computer, or if there is a problem with the other computer, you may
receive a response similar to the following:

Pinging <###.###.###.###> with 32 bytes of data:

Request timed out.

Request timed out.

Request timed out.

Request timed out.

If your computer is on a different sub-net than the other computer, try to


ping the other computer from a computer that is on the same sub-net as the
other computer. If you cannot ping the other computer from a computer on
the same sub-net, ensure that the other computer is connected to the
network and that you have the correct IP address for the other computer. If
you can ping the other computer from a computer on the same sub-net,
contact your network administrator to resolve any routing problems that may
exist on your network.

h. Verify Persistent Route Table Entries

Any computer using TCP/IP as a network protocol has a route table.


The route a network packet takes from one computer using TCP/IP to
another computer using TCP/IP is determined by the route table of the
computer that sent the network packet.

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 124


Your computer's route table is automatically rebuilt each time you
restart your computer. You or your network administrator can add persistent
(static) entries to your computer's route table. Persistent entries are
automatically reinserted in your route table each time your computer's route
table is rebuilt.

To view your computer's route table, use the ROUTE command. To do


so, type route print at a command prompt. You should receive a response
similar to the following:

Active Routes:

Network Address Net mask Gateway Address Interface Metric

0.0.0.0 0.0.0.0 10.1.1.254 10.1.1.3 1

10.1.0.0 255.255.0.0 10.1.1.3 10.1.1.3 1

10.1.1.3 255.255.255.255 127.0.0.1 127.0.0.1 1

10.255.255.255 255.255.255.255 10.1.1.3 10.1.1.3 1

127.0.0.1 255.0.0.0 127.0.0.1 127.0.0.1 1

224.0.0.0 224.0.0.0 10.1.1.3 10.1.1.3 1

255.255.255.255 255.255.255.255 10.1.1.3 10.1.1.3 1

Figure 2.9 : Active Routes

Verify with your network administrator that all persistent entries in your
computer's route table are valid.

For more information on routing, route tables, and the ROUTE


command, see the following article in the Microsoft Knowledge Base:

i. 140859 TCP/IP Routing Basics for Windows NT

ii. Use the TRACERT Command

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 125


The TRACERT command reports each router or gateway crossed by a
TCP/IP packet on its way to another host. To use the TRACERT command to
trace the route between your computer and the other computer, type tracer
<IP address> at a command prompt, where <IP address> is the IP address
of the other computer. You should receive a response similar to the following:

Tracing route to <IP address> over a maximum of 30 hops:

1 <10 ms <10 ms <10 ms <###.###.###.###>

2 50 ms 50 ms 51 ms <###.###.###.###>

3 250 ms 80 ms 50 ms <###.###.###.###>

Trace complete.

Where each <###.###.###.###> is the IP address of a different router.

If there is a problem with one of the routers that the network packet
tries to cross, you may receive a response similar to the following:

Tracing route to <IP address> over a maximum of 30 hops:

1 <10 ms <10 ms <10 ms <###.###.###.###>

2 * * * Request timed out.

3 * * * Request timed out.

4 * * * Request timed out.

If there is a configuration error on one of the routers between your


computer and the other computer, you may receive a response similar to the
following:

Tracing route to <IP address> over a maximum of 30 hops:

1 <10 ms <10 ms <10 ms <###.###.###.###>

2 50 ms 50 ms 51 ms <###.###.###.###>

3 <###.###.###.###> reports: Destination net unreachable.

You may also receive a response similar to the one above when there
is a proxy or a firewall between your computer and the other computer.

If you are not able to obtain a successful response using the TRACERT
command to trace the route between your computer and the other computer,

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 126


contact your network administrator to determine if there is a routing problem
between your computer and the other computer.

For more information on the TRACERT command, see the following


article in the Microsoft Knowledge Base:

162326 Using TRACERT to Troubleshoot TCP/IP Problems in


Windows NT

i. Verify Server Services on the Other Computer

Verify that the appropriate server services are running on the other
computer. For example, if you are attempting to use the Telnet tool to
connect to the other computer, make sure that the other computer is
configured as a Telnet server.

To verify that the appropriate server service is running on the other


computer, attempt to connect to the other computer from another computer
that is on the same sub-net as the other computer. If you cannot connect to
the other computer from a computer on the same sub-net, contact the
network administrator to verify that the server service is configured and
functioning properly on the other computer. If you can connect to the other
computer from a computer on the same sub-net, contact your network
administrator to resolve any routing problems that may exist on your network.

j. Check IP Security on the Server

Port settings for services on the other computer may be different than
the port settings you are using to connect. The following chart lists some
standard port settings for various protocols:

Port: Protocol:

----- ---------

80 HTTP

21 FTP

23 Telnet

70 Gopher

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 127


Use the Telnet tool to verify that the other computer is configured to
permit connections on the same port you are using to connect. To do so, type
the following line at a command prompt:

telnet <IP address> <port>

Where <IP address> is the IP address of the other computer and


<port> is the port you are attempting to make a connection on. For example,
if you are attempting to make an ftp connection to the other computer on port
21, type telnet <IP address> 21.

If you do not receive an error message, the other computer is


configured to permit connections on that port. You should be able to make a
connection using the appropriate service on that port.

If you receive an error message, the other computer may not be


configured to permit connections on that port. Contact the network
administrator to obtain a valid port number for the service on the other
computer.

k. Unable to Connect to a Specific Host or NETBios Name

If you are able to connect to the other computer using its IP address,
but you are not able to connect to the other computer using its host or
NetBIOS name, there may be a name resolution problem. There are many
methods that can be used to accomplish name resolution on a network
including the following:

i. HOSTS files

ii. Domain Name Service (DNS)

iii. LMHOSTS files

l. Windows Internet Name Service (WINS)

If you are uncertain which methods are used to accomplish name


resolution on your network, contact your network administrator. Follow the
procedures in each of the following sections in order. After you finish each
procedure, check to see if you can connect to the other computer using its
host name or NetBIOS name.

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 128


m. Check the HOSTS File

The HOSTS file is a text file that you can edit with any text editor (such
as Notepad). If your network uses HOSTS files for host name resolution and
you cannot connect to the other computer using its host name, there may be
an invalid entry in your HOSTS file. Search your HOSTS file for the host
name of the other computer, verify that there is only one entry per host name,
and then verify that the entry for the host name of the other computer is valid.

For more information on the HOSTS file, see the sample HOSTS file in
the %SystemRoot%\System32\Drivers\Etc folder.

n. Check Your Domain Name Service (DNS) Configuration

A Domain Name Service (DNS) server provides host name resolution.


If your network uses DNS for host name resolution and you cannot connect
to the other computer using its host name, there may be a problem with your
computer's DNS configuration or with the DNS server on your network.

To determine if there is a problem with your computer's DNS


configuration, follow these steps:

i. Type ipconfig /all at a command prompt to display the IP address


of your DNS server. If the IP address for your DNS server is not
displayed, contact your network administrator to obtain the IP
address for your DNS server.

ii. Verify that you can communicate with your DNS server by pinging
your DNS server's IP address. You should see a reply similar to
the following:

Pinging <###.###.###.###> with 32 bytes of data:

Reply from <###.###.###.###>: bytes=32 time=77ms TTL=28

Reply from <###.###.###.###>: bytes=32 time=80ms TTL=28

Reply from <###.###.###.###>: bytes=32 time=78ms TTL=28

Reply from <###.###.###.###>: bytes=32 time=79ms TTL=28

Where <###.###.###.###> is the IP address of the DNS server.

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 129


iii. If you cannot ping the IP address of your DNS server successfully,
contact your network administrator to verify that you have the
correct IP address for your DNS server and that your DNS server
is connected to the network and functioning properly.

iv. If you can ping the IP address of your DNS server, but cannot
resolve the host name of the other computer, your DNS server may
not be resolving host names properly. If more than one DNS server
is available on your network, configure your computer to use a
different DNS server. If another DNS server resolves the host
name of the other computer properly or if there is no other DNS
server to use, contact your network administrator to correct the
problem with the original DNS server.

v. When you have verified the correct IP address for your DNS
server, update your computer's TCP/IP settings. If you are using a
dial-up connection to connect to your network, you need to change
only the TCP/IP settings in your Dial-Up Networking phone book
entry with the correct IP address for your DNS server.

To change or add a valid IP address for your DNS server in your


computer's TCP/IP settings, follow these steps:

i. In Control Panel, double-click Network, and then click the Protocols


tab.

ii. Click TCP/IP Protocol to select it, click Properties, and then click
the DNS tab.

iii. If you are adding a DNS server, click Add. If you are editing an
existing server, click the IP address for the appropriate DNS
server, and then click Edit.

iv. Type the correct IP address for the DNS server, and then click OK.

v. Click OK, and then click OK again. You may need to restart your
computer after this step.

vi. To change or add a valid IP address for your DNS server for a
Dial-Up Networking phone book entry, follow these steps:

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 130


vii. In Dial-Up Networking, click the appropriate entry in the Phone
book Entry to Dial box.

viii. Click more, and then click Edit Entry and Modem Properties.

ix. Click the Server tab, and then click the TCP/IP Settings button.

x. Click Specify Name Server Addresses, and then type the correct IP
address in the Primary DNS box.

o. Check the LMHOSTS File

The LMHOSTS file is a text file that you can edit with any text editor
(such as Notepad). If your network uses LMHOSTS files for NetBIOS name
resolution and you cannot connect to the other computer using its NetBIOS
name, there may be an invalid entry in your LMHOSTS file. Search your
LMHOSTS file for the NetBIOS name of the other computer, verify that there
is only one entry per NetBIOS name, and then verify that the entry for the
NetBIOS name of the other computer is correct.

If there are any #INCLUDE entries or any #BEGIN_ALTERNATE to


#END_ALTERNATE blocks of lines in your LMHOSTS file, temporarily
disable all such lines or blocks of lines by placing the pound (#) character
and one space at the beginning of each line to be disabled.

If disabling these lines or blocks of lines resolves the problem, re-


enable the lines or blocks of lines one at a time until the problem reoccurs.
When you have determined that a specific line or block of lines causes a
problem, check the LMHOSTS files that the lines point to.

For more information on the LMHOSTS file, see the Lmhosts.sam


sample file located in the %SystemRoot%\System32\Drivers\Etc folder.

p. Check Your Windows Internet Name Service (WINS) Configuration

A Windows Internet Name Service (WINS) server provides NetBIOS


name resolution. If your network uses WINS for NetBIOS name resolution
and you cannot connect to the other computer using its NetBIOS name, there
may be a problem with your computer's WINS configuration or with the WINS
server on your network.

To determine if there is a problem with your computer's WINS


configuration, follow these steps:

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 131


i. Type ipconfig /all at a command prompt to display the IP address
of your WINS server. If the IP address for your WINS server is not
displayed, contact your network administrator to obtain the IP
address for your WINS server.

ii. Verify that you can communicate with your WINS server by pinging
your WINS server's IP address. You should see a reply similar to
the following:

Pinging <###.###.###.###> with 32 bytes of data:

Reply from <###.###.###.###>: bytes=32 time=77ms TTL=28

Reply from <###.###.###.###>: bytes=32 time=80ms TTL=28

Reply from <###.###.###.###>: bytes=32 time=78ms TTL=28

Reply from <###.###.###.###>: bytes=32 time=79ms TTL=28

Where <###.###.###.###> is the IP address of the WINS server.

If you cannot ping the IP address of your WINS server, contact your
network administrator to verify that you have the correct IP address for your
WINS server and that your WINS server is connected to the network and
functioning properly.

If you can ping the IP address of your WINS server, but cannot resolve
the NetBIOS name of the other computer, your WINS server may not be
resolving NetBIOS names properly. If more than one WINS server is
available on your network, configure your computer to use a different WINS
server. If another WINS server resolves the NetBIOS name of the other
computer properly or if there is no other WINS server to use, contact your
network administrator to correct the problem with the original WINS server.

When you have verified the correct IP address for your WINS server,
update your computer's TCP/IP settings. If you are using a dial-up
connection to connect to your network, you need to change only the TCP/IP
settings in your Dial-Up Networking phone book entry with the correct IP
address for your WINS server.

To change or add a valid IP address for your WINS server in your


computer's TCP/IP settings, follow these steps:

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 132


i. In Control Panel, double-click Network, and then click the Protocols
tab.

ii. Click TCP/IP Protocol to select it, click Properties, and then click
the WINS Address tab.

iii. Type the correct WINS server IP address in the Primary WINS
Server box, and then click OK.

iv. Click Close, and then click Yes to restart your computer.

To change or add a valid IP address for your WINS server for a Dial-Up
Networking phonebook entry, follow these steps:

i. In Dial-Up Networking, click the appropriate entry in the


Phonebook Entry To Dial box.

ii. Click more, and then click Edit Entry and Modem Properties.

iii. Click the Server tab, and then click the TCP/IP Settings button.

iv. Click Specify Name Server Addresses, and then type the correct IP
address in the Primary WINS box.

1.8. Network Maintenance

1.8.1. Network Security

a. Security Standard: Network

This standard applies to all Network Devices (except personally-owned


devices within the residential network) that connect to the centrally-managed
RIT network infrastructure or that process RIT Confidential or RIT
Operationally Critical information whether or not they are part of the RIT
centrally-managed infrastructure.

Controls are in place through policy, standards, guidelines and


practices to support Cal Poly’s Information Security Program. Various sets of
controls are required to protect information contained on computing devices
connected to the university’s network. These controls are determined based
on the classification of the data, services provided and associated risk to the
university if these assets were compromised.

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 133


Controls established through policy and standards specific to
computing devices on campus protect against vulnerabilities such as:

i. Weak physical security

ii. Vulnerabilities in software (operating system and/or application)

iii. Unsecured configuration / mis-configuration

iv. Inappropriate user access configurations (e.g. access too broad,


no longer used, etc.)

v. Poor user practices (e.g. easily cracked passwords, saving


confidential data on unprotected computers, installing software
from a non-trusted source, etc.)

The network security standard identifies requirements that enhance the


protection against and detection of security threats. The CSU ITRP Baseline
Network Standard Architecture defines a ‘defense in depth’ strategy utilizing
network zones to organize the placement of information and computing
resources on the network, manage appropriate access to those resources,
and enable protection and detection management of threats and attacks on
those resources.

This standard follows the same principles.

Standard:

i. Boundary Protection:

The campus network interface to the public network is


configured to deny traffic inbound to the campus network by default
and to allow inbound network traffic by exception following the ITS
Firewall Pinhole request process.

ii. Asset placement on the network:

High Risk Enterprise Devices must be attached to the


network such that the asset resides in a Critical Services Zone
identified by ITS Network Administration.

A Critical Services Zone must ensure that network traffic to


and from a device in the zone can be restricted using a CSU ITRP
Standard firewall. This includes traffic in and out of the Critical

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 134


Services Zone and between computing devices within the zone
itself. It must also deny network traffic by default and allow network
traffic by exception.

All university and auxiliary organization owned assets must


be registered (using the IP Address Request) with ITS Network
Administration before connecting to the campus network.

University and auxiliary organization owned assets


connecting to the Trusted Asset Zone must comply with university
configuration and maintenance standards.

Non-Cal Poly or non-auxiliary owned assets connecting to


the network must connect using the Public User Access Zone.

iii. Access:

Access to the Cal Poly network must be authenticated at a


user level with a unique identifier.

iv. Transport:

Level 1 data must be transported across the campus network in


accordance with the IT Security: Computing Devices standard for
encryption.

v. Management:

Network traffic in support of the management of networking


devices must be logically segmented into a Network Management
Zone. Access to the Network Management Zone is restricted to
authorized devices used for Network Management purposes.

Network traffic is monitored for unusual or unauthorized


activities or conditions at interfaces with Critical Network Zones and the
campus network border.

vi. Recommended:

Asset placement on the network: Enterprise devices should be


attached to the network such that the asset resides in a Critical
Services Zone identified by ITS Network Administration.

vii. Definitions:

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 135


Critical Asset Zone - A collection of High Risk Enterprise
devices that are grouped together and segmented from the rest of the
campus network via perimeter and access controls.

Trusted Asset Zone - A collection of university or auxiliary


owned assets connected to the campus network that are included in
the scope of the IT Security: Computing Device Standard and do not
contain Level 1 data in a persistent manner and are connected to
network segments designated for trusted assets.

Public User Access Zone - A collection of non-university or non-


auxiliary owned assets connected to the campus network on segments
designated for assets not specifically configured or managed in
accordance with the IT Security: Computing Device Standard.

viii. Responsibilities:

 ITS Network Administration

a. Responsible for implementation and management of


network based controls in association with this
standard.

b. Responsible for communicating to the campus


appropriate connection points (zones) based on this
standard.

 Computing Device Administrators/Application Administrators

a. Ensures devices are placed on the network in


compliance with this standard.

b. Communicates with application users the capability


of the application to encrypt appropriate data when
transported across the network.

c. Responsible for registering devices with ITS Network


Administration before placement on the network.

d. Responsible for updating device registration


information following the university network asset
review process.

 Computing Device Users


L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 136
a. Responsible for understanding that all university or
auxiliary owned computing devices must be in
compliance with university information security
standards in order to connect to the network in a
Trusted Asset Zone.

b. Responsible for understanding that all non-university


or non-auxiliary owned computing devices must be
granted an exception before connecting to the
network in a Trusted Asset Zone.

1.9. Site Maintenance

Safety checks—it is crucial that maintenance personnel adhere to strict


regulations regarding safe work practices. As an example, recently the
National Institute for Occupational Safety and Health (NIOSH) requested
assistance in averting the high risk of fatal falls of workers involved in
maintenance of wireless telecommunications towers. Investigation of seven
deaths resulting from falls during construction and maintenance of
telecommunications towers revealed that lack of awareness of the serious
safety hazards related to the task, and unavailability of well-documented
safety procedures were the main causes of the fatalities.

To perform certain routine maintenance tasks to avoid problems that


can affect server performance or cause the server to fail. software and
hardware includes a number of useful tools and indicators to help you
monitor your server performance quickly and easily. With these tools, and
some other helpful techniques you can develop daily, weekly, monthly, and
semi-annual preventative maintenance routines.

Maintain a daily log book with recorded maintenance activity. The log
book is extremely useful for diagnosing problems. The log book should
describe the activity, indicate who performed it, and when it was performed.
Include the following activities:

a. system operations such as

 installations

 upgrades

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 137


b. PEP installations

c. hardware replacement

d. administrative updates, such as

 user additions, deletions, or modifications

 system parameter changes

e. problem investigation

 Ensure recovery media is on-site

A current full system backup is essential for system


recovery in case an error occurs during an upgrade or if hardware
fails. A full system backup applies to all systems, RAID-equipped or
not.

 Ensure recovery hardware is on-site

 Ensure that any required hardware is on-site. This hardware


includes the following items:

i. Replacement hard drive

ii. Replacement multimedia cards

iii. Replacement RAID controller (if your system has RAID)

iv. Tape drive

v. Optionally: Replacement CD-ROM drive or DVD-ROM


drive

Anti-virus is a must for all computers regardless of situation. Even


a computer not connected to a network or the Internet can get infected if an
infected disc is placed into the computer unbeknown to the user.

As well as anti-virus any network or terminal that has access to the


Internet needs software or a hardware firewall. There are simply too many
risks involved from hackers and malicious worm viruses for a modern office
not to have firewall protection for their I.T. system.

With as much experience in Firewall and anti-virus systems in


Facilities Management and Installations, try installing and configuring, a
comprehensive and secure VPN and Firewall solution for the network.
L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 138
Figure 2.8 : Firewall installed to protect Local network

1.9.1. Equipment Performance (Server)

In some cases a server hardware upgrade can solve performance


issues at a fraction of the price of a new server. Adding CPUs or memory can
significantly increase a server’s performance. However, not all systems are
upgradable, and upgrades don’t always fix poor-performing hardware.
Moreover, new technology often provides new opportunities, allowing
administrators to deploy more virtual machines or adopt more demanding
workloads. Administrators should weigh these pros and cons and consider
the expected return on investment and the impact on business operations
before deciding whether to buy or opt for a server hardware upgrade.

1.10. Network Documentation

1.10.1.Advantages of Networking Documentation

Network documentation is like an organization chart for your network. It


is the blueprint of how a network is configured; how the applications and
hardware work together.

Although network documentation assists with planning and expanding


an information technology infrastructure, most people think about the need
when a problem occurs. Without having workable software and hardware
there is a good chance your business will not be able to function efficiently.

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 139


When your network is down, productivity is normally lost and customers and
clients many not be supported.

If network documentation is available, when there is a problem that


needs to be resolved, a service provider can quickly obtain an understanding
of your network and minimize the time to fix the problem resulting is a lower
cost to you. If your business is too small for a full-time technical person but
you a have a person on staff capable of providing first line support, he/she
may be able to resolve the problem without contacting a service provider.
The easiest way to explain why network documentation is important is to
provide an example of what happens when documentation is and is not
available.

Example: Due to an environmental mishap, a router with an integrated


security solution needs replacement. The service provider purchases a
replacement, but there is no router configuration documentation. Instead of
taking 1.5 hours to replace the router, the entire process ends up taking
about 2 days (16 hours) and 2 weeks in lapse time. If you are using an
outside service provider:

Rate

Provider Hourly Rate $100 $150

Cost With Documentation $150 $225

Cost Without Documentation $1600 $2400

Consideration also needs to be given to the additional lost productivity


costs by staff. What should be included in Network Documentation Manual?
Every organization’s network documentation manual will have some similar
items, but each will also have items that are unique to their organization.
Some basic items that should be included are:

a. Visual diagram of the network layout including IP addresses

b. Hardware and software inventory,

c. Server (s) configuration,

d. Cable mapping and patch panel diagram,

e. Policies and Procedures (i.e. backup) and

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 140


f. Vendor contact information.

Figure 2.9: network Switches

Administrative Accounts and Passwords for all devices need to be


recorded as well and kept under lock and key. We recommend the entire
manual be stored in a secure, if not locked, location.

1.10.2.List Of Networking documentation


Where Should the Documentation be Stored?

Network documentation is never complete. Every time a new piece of


hardware or software is added to the network, the documentation should be

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 141


updated. In this sense it is a “living” document. You may want to store a soft
copy of the network documentation manual on the network so that it is easy
to update. Certain documents can be scanned (agreements, invoices, etc.)
and added to the manual so that a soft copy is available of all necessary
documents. A copy should be printed for reference and stored for easy
access by either you or a service provider. Consideration should be given to
storing a copy offsite as part your disaster recovery documentation.

Who is Responsible to Create and Maintain the Documentation?

Reasons for lack of network documentation vary. Many businesses do


not ask for the documentation; others are not willing to pay to have the
documentation created or maintained. Further, many in the technical
community claim “the system is self documenting.” This is true only to the
extent that equipment and software can be accessed. The service provider
who designed the network may not think about providing documentation, may
not want to spend the time creating the documentation (it can be boring task),
or assumes you will always be their customer so there is no need.

Creating and maintaining the documentation is the responsibility of the


business as well as the Service Provider.

Although every network has its own unique features, many common
elements are candidates for documentation. These include:

a. Network topology

This is usually done in the form of a diagram that shows the major
network nodes, such as routers, switches, firewalls, and servers, and how
they are all interconnected. Normally, printers and workstations are not
included.

b. Server information

This is all of the information on servers that you will need to manage or
administer them, such as name, functions, IP address, disk configuration, OS
and service pack, date and place of purchase, warranty, and so forth.

c. Router and switch port assignments

This includes detailed information on WAN configuration, VLANs, or


even the assignment of a port to a network node via the patch panel.

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 142


d. Configuration of network services

Network services, such as DNS, WINS, DHCP, and RAS, are critical to
the operation of the network. You should describe in detail how they are
structured. Although it would be possible to derive that information by
inspecting the servers, the point is to save that time by having it documented
in an easy-to-decipher format.

e. Domain policies and profiles

You can restrict the capabilities of network users with the Policy Editor
in Windows NT or with Group Policies in Windows 2000. You can also create
roaming profiles that are stored on a server rather than on local machines.
This kind of configuration, if used, should be documented.

f. Mission-critical applications

You must document how these are maintained, as well as what


typically goes wrong with them and how you resolve problems.

g. Procedures

This in itself can be a major undertaking. Procedures are basically the


means by which we carry out policies, and they can be quite extensive. For
instance, a policy can state, “The network shall be secure against
unauthorized users.” However, it takes a great deal of effort to implement that
policy. There are procedures for the firewall, for network protocols,
passwords, physical security, and so forth. You would probably also have
procedures for dealing with problems that are reported by users and for
routine maintenance of the servers.

Conclusion

If you do not have network documentation, ask your internal technical


support staff or your service provider to create the necessary documentation.
Create an internal procedure and/or add to a service provider’s contract a
documentation update requirement. Determine up front how much detail is to
be included. One point to be aware of it will cost money to create and
maintain the necessary documentation. If you do nothing at least create a
visual network diagram.

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 143


The reality is networks change due to changes in business, periodically
networks have problems, disasters occur, and technical people leave. The
reality also is a business needs to continue regardless of what happens to
the network or staff. Being proactive and documenting the network provides
a much needed insurance policy.

1.10.3.Maintenance Report
Since the Organization may possess information systems and tools
purchased from different vendors in a long time period, an efficient record
keeping of the systems in hand is essential for maintenance management;
hence performing a hardware, software and telecommunications inventory is
the first step of an efficient maintenance program. Appropriate maintenance
of the records and transaction monitoring result to keeping the information
up-to-date, which in turn allows statistical data extraction to be used as input
to further consideration about system maintainability, sustainability and
related costs. For record keeping, simple techniques like spreadsheets and
custom databases may be used;

A data preservation survey must be conducted, indicating volumes,


importance and retention period of data, which in turn results to decisions
about data retention periods, backups and requirements on availability and
security.

A well documented system (covering the entire architecture as well as


all of its elements) is very important, especially for software maintenance.
Furthermore, an updated documentation, reflecting the changes derived from
the maintenance activities, should be provided for future purposes. Good
documentation aims in providing structured instead of unstructured
maintenance:

a. Unstructured maintenance wades straight into the source code


and makes changes based on that alone

b. Structured maintenance examines and modifies the original


design, and then reworks the code to match it.

c. Clearly structured maintenance is a more reliable and (usually)


a more efficient process.

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 144


d. Unfortunately, it's not possible without detailed design
documentation. Storing activities.

EXERCISES

1 Give the example of class B IP Address

2 What is max speed for ISDN?

3 What is the difference between unshielded and shielded twisted Pair cable?

4 How Repeater work with Access Point?

5 When to perform data backup for server?

RUJUKAN:
 BUKU:
Patrick Reagen, Local Area Network, Prentice Hall, 2004

 INTERNET :

Local Area Network(2015). From www.cisco.com

L03-05-22-LA2-IS WIM/L03/12016/S05 PAGE 145

You might also like