You are on page 1of 16

Troubleshooting bandwidth issues with pausing, buffering, skipping, starting, stopping, and inability to see a video

Poor sound or video quality, excessive stuttering or buffering, and lack of a video signal are usually due to a computer resource issue. There are a few things you can do to enhance your video experience:

If you're experiencing stuttering or excessive buffering, your Internet connection may not be fast enough. Please use a broadband (e.g., T1, cable, or DSL) connection of at least 150Kbps. Try not to view other websites or run other applications while streaming videos. If you're accessing videos through a Local Area Network (LAN), you may experience excessive buffering or connectivity delays as a result of the number of users and/or PCs on your LAN. Bandwidth tends to fluctuate throughout the day, and it will vary by provider. This can cause problems with video streams.

Note: If you continue to have ongoing bandwidth issues, please contact your Internet Service Provider (ISP) for further assistance. How to Troubleshoot WAN Troubleshooting and monitoring the performance of the WAN-enabled applications and hardware is an emerging business. There are many products and solutions are available to accommodate the requirements of the enterprises and small businesses. WAN links are usually built up through the dial up connections, dedicated connections, circuit switching and packet switching and other WAN technologies. The basic troubleshooting for every kind of network is done through the free utility that is built in every TCP/IP stack. The first step in troubleshooting is to use the PING command. Go to run > type CMD > press enter > go to command prompt and at the command prompt type ping [IP address] where the IP address is the 32 bit numeric address of the destination computer like 10.11.10.1. If you get the reply from the remote computer this means the physical connectivity between the two computers or devices is okay and if get the error message like this Request Time Out this means there is some problem in the physical connectivity. The common troubleshooting problems are associated with the faulty network devices such as LAN card, router, switch, misconfigured router, misconfigured firewall, too many simultaneous connections, server crash down, network congestions and inadequate bandwidth problems. Isolating the root cause of the WAN problems is very important and this can be done by using the right troubleshooting tools. Using the right tools and managed services are important for isolating the problem. The tools can help to determine whether the root cause of the problem lies carrier network infrastructure (telecommunication companies, network applications or on a switch, firewall or router or it just due to the human error. The technologies and products that are used in troubleshooting and optimizing the WAN performance are rapidly evolving. While troubleshooting the problems it is important to dissect the components of a WAN circuit. Following are some basic tips that can help you in determining and isolating the problems in your WAN network.

Make sure that the network cards settings are correct on each computer. Make sure that the cables on the routers are tightly plugged. Turn off your router for almost 30 seconds after it turn it on again. Ping the WAN IP address of the remote router. Ensure that all the network devices such as router, switch and CSU/DSU are turned on and working on the both ends. Apply local loop testing, framing, clocking, signaling and signal encoding techniques. Check the bandwidth allocation and see how much bandwidth is allocated to each remote site. With the help of right WAN troubleshooting tool check if it is a legitimate WAN problem, network congestion due to the distributed application or bandwidth problem. Check if someone is sending large chunks of data. Check to see that if there is a malfunctioning in the remote routers/switches or centralized router/switches. Make sure that is there NIC problem on a computer. Make sure the firewall software or hardware is configured correctly.

Troubleshooting/Monitoring Tools Report Analyzer SuperAgent Netflow Tracker Net Watch Net Where Net Voyant Response Watch Optiview By using the right WAN Management/Monitoring and Troubleshooting tool it would be very easy to isolate and troubleshoot the problem. An Overview of the Wireless Networking Here you will find wireless networking tutorials, what is wifi, general security overview, wlans, wpans, wmans, wep and wireless access control overview. Whether you want to make a phone call from your mobile, received a message on your pager, checked your email from a PDA we have come across a wireless data or voice network. If a user or a company wants to make a data portable then Wireless networking is the answer. A wireless networking system can avoid the downtime, which may be caused in the wired network. A wireless network is also save your time and efforts in installing the lot of cables. Also, if you need to relocate a client machine in your office, you only need to move the computer with wireless network card. Wireless networking is very useful in the public places, libraries, hotels, schools, airports, railway stations where one might find wireless access to the internet. A drawback in the wireless internet is that quality of service (QOS) is not guaranteed if there is any interference then the connection may be dropped. Wireless Network Types Wireless Local Area Networks (WLANS) WLANS allow users in local area, such as in a university or a library to form a network and gain wireless access to the internet. A temporary network can be formed by a small number of users without the need of access point; given that they do not need to access the resources.

Wireless Personal Area Networks (WPANS) There are two current technologies for wireless personal network Bluetooth and Infra Red. These technologies will allow the connectivity of personal devices within an area of 30 feet. Infra Red requires a direct line and the range is less as compared to Bluetooth technology. Wireless Metropolitan Area Networks (WMANS) WMANS allow the connectivity of multiple networks in a metropolitan area such as building in a city. The network connectivity is the alternative of copper or fiber cabling. Wireless Wide Area Networks (WWANS) WWANS or Wireless Area Networks can be maintained over large areas such as in different cities or between different countries, via multiple satellite systems or antenna sites. The types of system are called 2G systems. The following table shows the range those different types of wireless network covers. Network Meter Personal Area Network 0-10 Local Area Network 0-100 Wide Are Network 0-10000 Security in Wireless Networking The following different types of security methods are available in the wireless networking. Wired Equivalent Privacy (WEP) Wired Equivalent Privacy is intended to stop the interference of radio frequency that is signaled by unauthorized users and this security measure is most suitable for the small networks. There is not key management protocol and each key is entered manually into the clients thats why this is very time consuming administrative task. The WEP security method is based on the RC4 encryption algorithm. In the WEP all the client computers and Access points are configured with the same encryption and decryption keys. Service Set Identifier (SSID) Service Set Identifier (SSID) acts a simple password by allowing WLAN network to be split up into different networks and each having a unique identifier. These identifiers are configured in the multiple access points. To access any of any networks, a computer is configured in such a way that each is having a corresponding SSID identifier for that network. If the SSID match between the two computers or networks then access is granted to each other. Media Access Control filtering (MAC Access Control) A list of the MAC addresses of the client computers can be inputted into an Access point and only those computers are granted to give the access to the network. When a computer makes a request, its MAC address is compared to the list of the MAC addresses to the Access point and based on this access permission granted to deny. This is a good security method but it is mainly involved in the small wireless networks because there is more manual work is involved of entering the MAC address into the Access point.

Bluetooth

Bluetooth is a simple type of the wireless networking that operates in the digital devices, like mobiles phones, personal computers, PDA, Laptops, digital camera, MP3 players and other Bluetooth enabled devices to form a small network. In the Bluetooth technology eight devices can be connected to each other at the same time. Bluetooth can also be found in the headsets, hands-free kits, wireless keyboards and mouse. Bluetooth technology was invented by Ericsson in 1994 and after four years in 1998 some major mobile phone companies such as Nokia, Ericsson, Intel and Toshiba formed a group to promote this technology. Bluetooth technology falls in the category of personal area networking because it operates in the range of 30 to 300 feet. Bluetooth uses the radio waves technology, which is not very expensive and has low power consumption. Many different companies are intended to add the Bluetooth chip in their digital devices. Bluetooth technology is getting very popularity because of its low cost and portability. The Future of Wireless Networking WLANS wireless networking type is very popular in home networking and more than 20 percent homes with broadband internet are using WLANS and this number is increasing. In a general estimate worldwide hotspots have now reached more than 30,000 and will grow about 210,000 in the next few years. Most large hotels already offer Wi-Fi and the business travelers are willing to pay wireless access. 802.11 is the next Wi-Fi speed standard is set to offer bandwidth around 108Mbps and is still under development. With the speed of 70 Mbps and a range up to 30 miles, the 80216 standard, known as WiMAX is sure to get boost. Some Tips & Tricks When purchasing a wireless NIC card try to get one that is having external antenna. When you are out and using Wi-Fi enabled laptop, disable Microsoft file and sharing, which enables other computers in a network to access data and resources on your computer. In this way, your computer or laptop will be saved from hackers. If you are concerned about the interference from the other wireless access point set the AP and wireless computers to use a non-overlapping channel. Change the configuration interface password of the access point before you enable it. Only buy an access point that is having upgradeable capabilities. By this way you can take the advantage of security enhancements. Keep the access point up to date. What is WAN Networking In this section you will learn the basic overview of the wan networking overview, wide area communication methods, lan, atm, sonets and x.25 protocols.. There are three basic types of computer networking LAN (local area network), MAN (metropolitan area network) and WAN (Wide area network). A wide area network is a geographically dispersed large network. A wide area network can be privately owned or rented. A WAN covers a large geographical area such as a city, province or a country. A widea area network may consist of a multiple LANs or MANs. The worlds most popular wide arae network in the world is is the internet. WANs are the corporate network that utilizes leased lines. Wide area networks generally utilize much expensive equipment. The main communication technologies that are included in the WAN are SONET, Frame Relay and ATM. The computers that are connected to the WANs are generally connected through the public networks and they can also be connected through the satellites. WANs are used to connect the computers in the one part of the world with the other part of the world. So the users and computers from the different parts of the world can communicate with each other. Many WANs are generally built for one organization. Other types of WAN networking are the Internet service providers that connect the LANS or individual computers to the Internet. WAN networks are built using the leased lines and a router is connected to the one end of the WAN and a hub is connected to the other end.

With this hub a number of computers and other hubs and switches are connected. Among the other methods of building the WANs are the circuit switching or packet switching methods. The general protocols and the communication technologies that are involved in the overall wide area networking/communication are TCP/IP, SONET, MPLS, ATM and X.25, which closely works with frame relay. Typical a WAN consists of a number of interconnected switching nodes. Networking Methods Networking is a complex part of the computing and it covers the broader range of the IT industry. All the communication in the world including satellite communication, mobile communication, internet, telephones and WANs is due to the networking. There are two main types of the networking. Local Area Network (LAN) A local area network is relatively covers small space and provides services to a small amount of people. A local area can be divided into two major types, peer to peer and the client server. Depending on the number of the users a network is configured. Among the few examples of the peer to peer networks are small office network and home networks. On the other hand, in the client/server networking model all the client computers depends on the server for resources like (modem, printer, scanner, cd-rom) and they are connected with the server. The servers in the client/server networking model works in different capacities like single service server and multiple service servers. Wide Area Network (WAN) A wide area network is a network where are large number of the resources are deployed in a very wide geographically area. The best example of the WAN is the internet itself which is a largest network in the world. In order for communication to take place between the computers the mediums must be used. These mediums can be cables, Routers, Repeaters, Ethernet, Protocols and switches etc. These different mediums make the data communication possible in different scenarios. Types of WANs There are two basic types of Widea Area Networking. A computer network is set of computers and devices that are connected with each other. Examples of the networks are the Internet, local area network, Wide area network and satellite networks. Centralized WANS: A WAN that consists of a server or a group of servers in a central location to which client computers connect, the server provides the most of the functionalities of a network. Many banks, large stores, large schools and universities use centralized WAN. A centralized wide area network may have a number of the servers in the centralized location. Distributed WAN: A widea area network that consists of the client and server computers that are distributed throughout the WAN, the functionalities of the network are distributed throughout the WAN. The internet is an example of the wide area network. The impact of Wide Area Networking on business

In this age of information, data communication (sending and receiving data) over a long distance is a necessity. There have been number of technologies developed that enable networks and their users to communicate with each other, and exchange data easily even if they are at the different end of the world. Geographical area is no more a matter in todays communication age. Because of this the communication through WAN has been become vital. Wide area networks make it feasible for the companies to have a single network, which will connect their several offices and departments. Companies, banks, large organizations often have their offices spread over a large distance. Without wide area networking the people of a multinational organization can face difficulties to communicate with each. WANs are important in connecting institutes they are very far from each other. The main purpose of the wan is to establish a secure, fast and reliable communicate channel among the people who are widely away from each other. Wide area networks are often privately owned networks. A wide area network uses many types of network devices such as WAN switches, access servers, CSU/DSU, modems, ISDN terminal adapters, routers, multiplexers, ATM switches and other networking devices. An example of the WAN is SURFnet, which is a research network and that connects the universities and research centers of the Netherlands with each other.

HOW TO TROUBLESHOOT DHCP


DHCP Stands for the Dynamic Host Configuration protocol and it is used to assign the IP addresses to the network computers dynamically. It saves the lot of time and the administrative efforts of the network administrators by providing the TCP/IP configurations such as IP address, subnet mask, default gateway address, DNS, router, proxy server and the settings to the client computers. With the DHCP, the process of connecting the new client computer with the server is very easy. Just imagine that if you are assigned a task of provide the IP addresses and other TCP/IP configurations to1000 client computers manually then how lengthy and tiring task it can be. DHCP sever assigns the IP addresses from its predefined fixed pool of the IP addresses.

In the DHCP pool, you can define the range, leased duration and map the IP addresses with the specific computers. The IP addresses allocation can be manual, automatic and dynamic. Sometimes in the computer networks, DHCP failure occur due to several reasons and in this situation the client computer will not be able to connect to the server and get the server resources. The problems may arise at the client end or the DHCP server end. DHCP Client Troubleshooting Many Client Computers are unable to get the IP Addressees from the DHCP Server It can be due to the reason that the IP address of the DHCP server has been changed and the client computers are not able to connect to the DHCP server. Additionally the client computers are located behind the firewall or are connected to the DHCP server through the router. It is also possible that the multiple DHCP servers exist in the same LAN. The solutions of these problems are to make sure that the DHCP servers IP address fall in the same range of the IP addresses as the scope it is serving. For a DHCP server to provide the IP address to the remote subnets, the router should act as DHCP relay. Make sure that you are not configuring the multiple DHCP servers on the same LAN with the same scope of the IP addresses as it can cause the conflicts in the IP addresses. The DHCP client does not have IP addresses configured It can happen due to the reason that the client computer is unable to connect to the DHCP server and obtain the IP address from it or the DHCP server is unavailable. To resolve this issue, you need to make sure that the client

computer has connectivity with the DHCP server and the network cable and network connections are accurate. Then try to ping the DHCP server and make sure that you are getting reply from the server. DHCP client has automatically assigned IP address to itself In the Windows 98, XP Professional and the Windows ME sometimes the client computers are unable to connect to the DHCP server so they assign the IP addresses automatically through the IP auto configuration. DHCP Server Troubleshooting Sometimes if the multiple client computers are experiencing problems in leasing the IP address from the DHCP server then the problem is most likely with the DHCP server itself. The common problems that can arise in the DHCP server are the following. DHCP server has been stopped You need to check the log files and the system event files for details about this problem. These log files will provide the detailed information, causes and the solution of this problem. One of Two DHCP Server is not serving the client If this happens and if the server is a domain member then you need to authorize the DHCP server in the Active directory. DHCP Servers data is corrupted. The DHCP servers data has been corrupted or missing and possibly it generates the JET database errors. You need to use the DHCP data recovery options to recover the lost data and correct any of the generate errors. You can also use the reconcile feature in the DHCP console to verify and reconcile any inconsistencies in the database. If you specific issue is not mentioned above then you need to visit the Microsofts website and review the DHCP troubleshooting articles for more details.

Introduction to Wireless Network Wireless network is a type of network in which computers and network devices are interconnected with each other without wires. The common methods of the wireless connectivity are Wi-Fi, WI-MAX, fixed wireless network, Bluetooth, GSM, Infrared and WLAN. The components used in implementing the local area wireless network are wireless LAN cards, wireless routers and access points etc. Wireless networking is very useful in the places where the clustered and snaking cables are not possible also in the places such as university campuses, hostels, libraries, airports, hospitals, government institutes and in the organizations with multi storey offices.

Gateway or router is used to connect the wireless network with the existing network to share the resources such as internet, printer, scanner, CD/DVD-ROM and hard disks. There are some well known security issues and they can be overcome if proper security mechanisms and have been implemented such as WEP (Wired equivalent privacy), WEP2 (Wired equivalent privacy version 2), MAC address filtering, SSID (service set identifier), VPN link and 802.1x.

The common types of the wireless network are WLANS, WPANS, WMANS and WWANS. Like in the wired networks there are certain common problems that can occur in the wireless networks. Following tips are useful in resolving the problems in your wireless computer network. Wireless Network Troubleshooting Tips Troubleshooting the wireless network starts with checking network configurations and the hardware devices such as LAN card, router and access points. The following steps are useful in identifying and troubleshooting the problems.

Check the cables. Make sure that the wires with the DSL or Cable modem are properly connected and the power light is on of the modems. Make sure that the wireless router is connected with the power adapter and DSL/Cable modem. Turn off the devices. Turn the DSL/Cable modem and wireless router off and unplug the power cables and with the break of 30-60 seconds reestablish the wireless connection. Check Network Settings. Verify that the wireless network adapter is turned on. If you are using Windows XP Professional, let the Windows redetect the wireless adapter remove the wireless adapter from its respective slot and reinsert in the slot while the Windows is running. Verify the lights on the wireless adapter are turned on. If the lights are not turned on, then again insert the adapter. Update the driver/software of the wireless network adapter and download the latest version of the driver from the manufacturers website. Check wireless Router/Access Point. Make sure that the power light is turned on. The internet link light of the router should be on if the router is connected to the DSL, LAN or cable modem. The wireless lights should be on all the time even there are no wireless devices are connected. The WLAN activity should flash when the data is sent or receive from any computer that is connected through the router. Verify Computers TCP/IP Settings. Use the Ping command to verify the network connectivity with the other computers in the network. Also make sure that the clients wireless network adapter is installed and working properly. Check Firewall Settings. Make sure that the firewall software or hardware at the gateway computer is not blocking the TCP/IP requests from other computers in your wireless network. Miscellaneous settings. Check that the router and network adapter use the same settings, channels, wireless mode and SSID. Verify that the routers LAN port is active. Repair Wireless Connect. If you are using Windows XP Professional operating system, install the service pack II because the repair capability in the service pack II has been enhanced for repairing the wireless connection. To access the repair capability, double click the wireless connection icon and click the supporting tab. WEP or WPA Keys. The most common cause of the wireless network is the incorrect settings of the encryption WEP or WPA. 1. To resolve the encryption problem click Start > Connect to > Show All connections. 2. Double click wireless network connection 3. Click Properties > Wireless network tab 4. In the preferred network box, double click the network name you are connecting to. 5. In the network key box, enter your encryption key and reenter the key in the Confirm Network Key box.

In case you have lost your wireless encryption keys or passwords then you have to reset the encryption keys in the router configurations. Hopefully the above tips are helpful in resolving the issues in your wireless network.

WLAN Technologies

Wireless LAN or WLAN is a very popular option for building a network in home, office, and for accessing the internet. The increased demand of the mobility, flexibility and the scalability are the key factors in the development of the WLAN. Wireless networking and the wireless LAN technologies provide the multiple benefits to the network users and the organizations such as reduced setup cost, cable free network infrastructure, easy deployment, mobility and the easy management. The major use of the Wireless LAN technologies is to provide the secure and high speed voice, data and video communications by using various applications and devices. In the WLAN communication is made through the high speed radio waves without the use of cluttered wires. The wireless LAN communication is based on the following communication standards. 1. IEEE 802.11. a. 802.11a b. 802.11b c. 802.11g 2. HiperLAN/2. 3. Bluetooth. 4. HomeRF 5. Infrared Wide Industry support, the operating system support, easy installation and the flexibility has made the WLAN a popular choice of the business and home users. There are different vendors that are manufacturing the various WLAN products. The major vendors include Cisco, Lucent, Motorola, 3Com, Apple, D-Link and Nortel etc. There are the many standards in the WLAN and the most popular standard are Wi-Fi and HomeRF. Advantages of WLAN WLAN provides numerous benefits to the home and corporate users. Some of the key benefits include the following.

WLAN technologies can be used to create temporary network for a specific period of time. It provides the access to the internet at the public places. WLAN can be a part of an existing network and it can connect two physically different networks (in two separate buildings) be establishing a wireless link. WLAN technology is a perfect solution for the places where wired network is not possible. It provides the mobility, scalability, flexibility and the ease of management. WLAN can coexist with the wired Ethernet networks. Wireless networking is supported by different wireless standards like 802.11, 802.11b, 802.11a, 802.11g, 802.11n and the 802.11g is the most popular WLAN standard. WLAN provides the more productivity, expandability, convenience and the easy deployment at very low cost.

LAN/WAN Networking Support Here you will get network administration overview and consultation resources, system consultancy, IT help desk overview, lan troubleshooting guide. A person that is responsible for managing and maintaining the Local Area Network or an organization. Network administrators normally focus on making sure that a LAN is fine tuned for best performance, delivering necessary information to the end user and interacting with the Wide Area Networks. The network administrators responsibilities include installing new application, maintaining the network security, distribution software upgrades, monitoring daily activities, enforcing licensing agreements and taking up backups regularly.

The term network administrator, network specialist and network analyst designates on job positions of the engineers that are involved in managing the computer networks. Network administrators are basically equivalent to the Systems administrators who maintain the hardware and software necessary for the network.

Network administration normally includes the deployment, monitoring and maintaining the networks as well as working on the routers, switches, firewalls, proxy servers and file servers. Other tasks includes in the job description of a network administrator are network address assignment, assigning of routing protocols, configuring and authorization of the directory services. It also includes the maintenance of the network facilities in the individual computers, such as drivers, printer settings, settings of personal computers and providing the server access to the client computers. It also includes the maintenance of the network servers such as file servers, VPN gateways, database server and virus protection. Network analysts and specialists concentrate on network security and design, particularly troubleshooting network related problems. Their work can also include the maintenance of the network authorization as well as network backup systems. They are also responsible for providing network management functions. Providing network/system support services They ensure that the network is used efficiently, and They also ensure prescribed service-quality objectives are met. The common challenges we face as systems and network administrators tie us together both in managing the servers and addressing the immediate problems. A vulnerability is often documented in a security release that creates the attack in a lab environment and this can lead to real problems like a bank account is being hijacked via identify theft or a server that handles patient data crashing. Similarly, a poor performing network or a server can ruin an organization or cause difficulties for the employees who want to access the data and resources from the network servers. In the last decade, computers have become a vital part of our life; they are in use for variety of reasons at home, store, banks, offices, schools, universities, airports and almost everywhere. It is very likely that a computer user encounters a problem occasionally, whether it is a crashing of the hard disks or the annoyance of a forgotten password. The explosive use of the computers has led to the specialists to provide the proper support and advice to the users, as well as for day to day administration, support, maintenance of the systems and network. Computer support specialists provide technical assistance, support and advice to the customers. This occupational group includes system support engineers, help desk staff, IT manager, and network and system administrator. These technical persons interpret the problems and provide technical support for software, hardware, system and network. They answers telephone calls, analyze problems by using automated diagnostic programs troubleshoot the problems. These specialists can work either within a company that uses computers or they work directly with the vendors. Technical support specialists answer the telephone calls. They work on monitors, printers, mice, keyboards and they install, modify, clean and repair computer hardware and software. In addition, technical support specialists oversee the daily performance of their companys computer system. Help desk specialists assist computer users with the hardware and software questions that are not addressed in the products manual. In responding to these questions for guidance, help desk technicians must listen the customers carefully, ask those questions and find the solution of the problems. Network administrators and computer systems administrators design, install and support a companys LAN, WAN, network segment, internet or intranet systems. They provide day to day administrative support for the end users in a variety of work environments, including professional offices, small businesses, small and large corporations and government offices.

They gather the data to identify customers need and then they use the information for identifying and evaluating the system and network problems. Systems administrators are the information technology employees who are responsible for maintenance and efficient use of the computer networks. Furthermore they adjust the performance of existing networks, troubleshoot the problems reported by the users and make recommendations for enhancement in the implementation of future servers and networks. In some organizations, computer security specialists may plan, coordinate and implement the organizations security system. These security specialists may be called upon to train the users about computer security, install security software, monitor the network for security breaches, respond to cyber attacks, installing antivirus and gather the data that may be used in prosecuting the cyber crime. As computer networks expands, more computer support specialist and system administrators may be able to connect to the customers remotely using modems, laptops, emails and the internet to provide the support to the end users. Systems and network administrators can also administer and configure the servers remotely. Due to the wide range of skills required, there are many paths of entry to a job as a computer support, specialist or a system administrator. A bachelor degree in the computer science or information systems is a prerequisite for some jobs. For system administration jobs many employers seek applicants with the bachelor degrees in computer science and the certifications such as MCSE, MCSA and CCNA etc. A number of companies are becoming more flexible about requiring a college degree for these positions. However, certifications and practical experience in the related field is much preferred. The completion of a certification training program, offered by a variety of vendors and product makers may help some people to quality those positions. Beginning computer support specialists usually work for organizations that deal directly with customers by visiting their sites or in house work. With the passage of time they may advance to more responsible positions to apply their skills. Job promotion mostly depends on the performance and not on the education. Eventually, some computer support specialist may become applications developers and designing the products. Computer support specialists of hardware and software companies enjoy great upward mobility. Entry level network and system administrators are involved in the routine maintenance and monitoring of computer systems. After gaining some experience and expertise they are able to advance their career in senior level positions. Persons who are interested in the administration must have strong problem solving, analytical and communication skills because troubleshooting and providing support to the end users and the clients is a vital part of the job. Strong writing skills are useful in preparing manuals for employees and the clients. If you like to work in the computer field and enjoy troubleshooting then network administration job is suitable for you. The main job description of a network administrator is to maintain LAN and connect computers in the same office building. You could even maintain the vast servers, which host the websites and these servers are called web servers. Being a network administrator you must have a good knowledge of computer hardware, software and the network devices such as router, switches, hubs, modems and NIC cards. Additionally, you will have to constantly update yourself with the latest advancements and updates in this field. A network administrator must have the knowledge of the following things. TCP/IP OSPF RIP BGP File and Print server Network devices. NETWARE VPN RAS Servers Proxy Server

Frame Relay Leased Lines (T-1 and T-3) Cisco IOS Firewall He/she must also have the knowledge of the following things. Deploy network equipments He/she can Configure routers, switches, and firewalls Make recommendations to the management concerning network upgrades Maintain and monitor the organizations network Maintain a network addresses and network address translation scheme Document all network maintenance, security breaches and their solutions and upgrades Maintain routing tables using RIP, OSPF and BGP. Can work on routers efficiently. In this section you will learn about computer network how to, troubleshooting tips, configurations, IT help, basic configurations help, wireless access point, hardware components and cables. Data commmunication is an important thing to share the data and resources and if you want to share the one internet connection with the other PCs, share your server's hard drive with the client computers, share printer, fax, scanner, DVD writer then this information will help you make the right choice. Before starting the installation and configurations you should be aware of all the hardware, software, cables, drivers and all the necessary other things. Basic Introduction STEP 1: Router: A router relays the data between your computers and your internet connection. STEP 2: Network Adapter: A Network Adapter or NIC card is connected to each computer and it is used to send the data to each every computer and the router. STEP 3: IP Address (Internet Protocol) is your computers unique identification on the computer network and over the internet. In your home network and a small network of a company all the computers share the same IP address over the internet. STEP 4: Print Server A print server is a specialized network adapter that is used to connect the printer machine to a network and with the print server several computers in a network share the same printer or print device. How to Choose a Right Network Type STEP 1: Connecting your computer wirelessly over the radio waves is carried out by a specialized router called an access point. One access point is enough for networking an averaged sized home. The trade name of this technology is Wi-Fi or 802.11b. One important thing is that all the Wi-Fi products should be compatible with each other. Wireless communication is important for the people who go from room to room with their wireless laptops or they want to use their laptops in airports, hotels, cafes and other places where wireless service is available. STEP 2: Next you use your homes wiring to connect the router to each computer with a powerline network. HomePlug is the trade name of this technology. It is seen that HomePlug networks are more secure than the Wi-Fi. But as compared to the Wi-Fi it is a new technology and is more expensive than Wi-Fi technology. STEP 3: Hook up with the Ethernet 10-Base-T or 100-Base-7. Ethernet is the best choice if your router, broadband internet connection and all the computers all in one room. Due to the cabling, involved in the Ethernet, its less flexible than the others. Buying Equipment Instructions

STEP 1: First of all get one router and if you want to go wireless this router will called an access point. STEP 2: Next get compatible NIC cards for each computer and plug them into the computers universal serial bus (USB STEP 3: If you are using a wired network the purchased extra long CAT 5 Ethernet cables. STEP 4: Next buy a print server if you want to put a printer in your home. One important thing to note is that all the hardware should be compatible with each other. Setup Instructions STEP 1: First of all read the manuals of the devices and start experimenting. Many products have good manuals and online support. You can easily get answers of the basic and advance questions. Many manufacturers provide online help and advice so there is no need to worry about any kind of technical support. Good technical support can save your lot of time and efforts. So before starting make a thorough plan to work on it. STEP 2: If you are planning to install a wired Ethernet, then run the cables to your home theaters or stereo. Now many new digital home products like digital video recorders and game systems are having the internet capability. General Tips In summary you should look for these things for installing a home network such as Router or access point, Ethernet cables, NIC adapter, Print Server and the technical support from the vendor or a useful website or forum on the internet. Hybrid networks have many advantages and so they are very popular. For example, you can have Ethernet going to a desktop computer and printer in your home office and additionally wireless router or access point for a roaming laptop and desktop computer in your bedroom. Some cordless phones and the microwave ovens can interfere with a wireless communication. If you have any interference problems then move the access point and router and place them at some different positions. It is very important that when you setup your router for the first time at your home, change its password because every hacker on the internet can know the default password of a router. Additionally, while making the wireless connectivity you must enalbe the WEP to keep the information private and secure from the hackers. Additionally, install some anti spyware, good anti virus software on your server and client machines in your computer network and regulary update Windows operating sytem through the Microsoft's website.

What is a Optical Network?


In this general optical network tutorial you will find basic overview of the fiber optic technology, communication glossary, lan/wan cables, communication devices and the fiber optic industry trends.. Optical network is a network of the fiber optics cables in which data travels on the thin fibers at the speed of the light. Today, many ISPs, corporate offices, LANS and even home networks are connected through the fiber optics though its still very costly but it provides a high bandwidth and data transfer capacity. Fiber optic cables act as a backbone when they connect different ISPs with each other and in case of any breakdown or any kind of problem in the backbone results in a communication failure at very large scale. There are a large number of the fiber optic cables are involved in making the whole internet. Fiber Optic Technology Fiber optic technology is most popular in the telecommunication industries as well as Local Area networks. Fiber optic cable is a bundle of various cables which are thin and provides a large bandwidth. The cost of the fiber optic cables is much higher and same is the installation of the fiber optic cables. Today, a large number of the

communication networks depend on the fiber optics. Fiber optics is less susceptible to the outer interference than the metal cables. CCTV network, long distance switches, central offices, subscribers loop careers and industrial networks use fiber optics for communication purposes. In the near future, fiber optical cables will repalce the conventional coaxial and ethernet cables for the LAN networking. Enterprise Optical Network. Fiber optics also provides solutions for the enterprise networking like NAS (network attached storage) and SAN (storage area network). A NAS is a server that is used to data sharing in a network. NAS allows more hard disk storage space to be added to a network. A NAS device does not require to be attached to the server directly and it can be placed anywhere in the network. A NAS can be made up of two or more NAS and being a part of a network, the network user can access it from anywhere in the LAN. NAS is an efficient way of storage and file sharing. Fiber optics provide more efficiency and reliability in the NAS performance by providing more bandwidth and data capacity. SAN is a subnet of the shared storage devices in a LAN or a WAN. Fiber optics provide more high speed connectivity and speed among the SAN in a LAN or WAN. Optical Network Devices Fiber optic devices are in use in a number of ways like Networking, storage, industrial, medical, defense, broadcasting, telecommunication systems. Optical testers are designed for a variety of measurements and tests with a single meter. Attenuators are designed for single mode applications, multimode applications and for attenuation settings. Fiber Optic connectors are used to connect a fiber with another fiber or equipment. There are different types of connectors are being used today such as SMA, FC and SC connectors. Optical Switch is a handheld device for calibration sets and measurements automation. Optical Routers connects twisted pair LONWORK notes to the fiber optic backbones or subnets. They also reroutes the data automatically due to power failure of fiber break. Major Optical Network Terms Adaptor: It is a device for connecting two or connectors. ADSL: Asymmetric Digital Subscriber lines is a most common form of the DSL Amplifier: It is a device that is used to amplify the signals without destroying the original wave shapes. ATM: An abbreviation for the asynchronous transfer mode. Attenuation: The reduction of the optical power as it passes through the fiber optic. Attenuation: A device that is used to reduce the signal power in a fiber optic. Backbone: Backbone is a high speed telecommunication network. Bandwidth: The capacity of the medium. Base band: A simplest method of the transmission in the LANS. Biconic Connector: A type of the fiber optic connector. Bit: An electrical pulse that carry signals. Bandwidth: Capability of dealing with high speed, high capacity data transmission. Cable: One or more fibers enclosed in the protecting covering. CATV: An abbreviation of the community Antenna television of cable TV. Coax: An abbreviation of the coaxial cable. COMSAT: Communication satellite. Coupler: A device that is used to distribute the power between two or more ports. CWDM: Course wavelength division multiplexing. Detector: Converts fiber signals into the electrical signals. Duplex: The simultaneous operations of a circuit in both directions in a communication network. FDDN: Fiber data distribution network. Fiber optic modems: Used for sending and receiving data.

Fiber Storage: High speed network technology used for storage. MT Connector: Multi fiber connector used to hold 24 fibers. ODS: Optical data storage. PHY: Known as physical layer device. POF: Plastic optical fiber. Port: Connection point. PTO: Public telecommunication operators. RFI: Radio frequency interface. SONET: Synchronous optical network. TDM: Time division multiplexing. Trunk: Circuit that connects two switching centers. X Band: Frequency ranges between 8.0 to 8.4 GHz.

Introductio to IP Multicasting
IP Multicasting is a technique of distributing the data across multiple servers over the WAN. It is simply the delivery of the same data packets to the multiple destinations. It allows the multiple recipients to receive the same data packets from a single source. Multicasting allows the distributed applications to work over the WAN with great performance. It is an excellent alternative for the unicast and broadcast transmissions. In Multicasting, the information is sent to only the destined recipients. It is like the TV or radio transmission system in which only those terminals receive the information who have tuned themselves to receive it. It is the bandwidth-conserving technology that reduces the traffic load over the network. The ideal applications that uses the multicast technology includes video conferencing, stock quotes, distance learning, weather updates, video streaming, news and other distributed software applications in the LAN/WAN network. IP multicasting mechanisms depends upon the two protocols i.e. group management protocol and the routing protocols. Group Management protocols establish the multicast groups and the routing protocols routes the traffic to the destination. Multicast routing protocols makes the distribution tree for the data forwarding in the network. It is an ideal solution for the distribution applications in the TCP/IP based LAN/WAN networks. Though it has been successful in many businesses but it is not extensively deployed and used by the average users. Special addressing scheme is assigned while implementing the IP multicasting. These addresses are assigned from the Class D i.e. 224.0.0.0 to 239.255.255.255. The typical multicast applications include the following.

Video conferencing Audio conferencing Stock Quotes Distributed LAN/WAN Software Applications Weather Updates Data Conferencing Network-based games Online Training Database replication

Multicasting applications minimize the demand of the network bandwidth while sending the information from one source to multiple destinations via same stream. Multicasting can be implementing in the following situations.

For better bandwidth utilization. Less Router/Hosts Processing.

When sending the same data to the multiple receivers is required. When the recipient address is unknown. When a one-to-many communication systems model is required.

It has many advantages over the unicast and broadcast communication system such as the following.

Enhanced performance. Optimized performance. One-to-many communication system.

You might also like