Professional Documents
Culture Documents
Modem Configuration
Modem Configuration
The first two are system software and the third is application software.
Examples of application software for communications: e-mail, FTP, Web
browser, newsgroup/message boards, chat rooms, instant messaging,
video conferencing, and VoIP.
Modem
Modem Configuration
Step 1
First, you need to plug the phone line splitter to your broadband line (which
is directly connected to your Internet Service Provider) to split or divide the
main line into two different lines so you can easily use both of your
telephone and modem.
Step 2
Then, Join the one end of the RJ-11 cable to the splitter/main line and the
other to the modem, and after that, you’ll need to do the same for your
telephone too.
Step 3
Now, connect one end of the RJ-45 cable to the modem and the other one
into your computer and this will allow your computer to do data transferring
and receiving over the wires.
Step 4
In order to configure your modem, first, you’ll need to find the gateway IP of
your modem to open the configuration page.
Step 5
Now select the connection type and configure it by adding all the details
that your ISP gave you.
● PPPoE: Select this option if your ISP requires you to use a PPPoE
(Point to Point Protocol over Ethernet) DSL providers typically use
this option. This method of connection requires you to enter a
Username and Password (provided by your Internet Service Provider)
to gain access to the Internet. The supported authentication protocols
are PAP and CHAP.
● Dynamic IP: If the ISP’s servers assign the router’s IP addressing
upon establishing a connection, select this option.
● Static IP: If your ISP has assigned a fixed IP address, select this
option. The ISP provides the value for the IP Address.
Then just save the setting and try to use the internet connection.
Step 6 – When you’ve done with the ADSL Setting, now you’ll need to
move on to the wireless router setting to add a password into your Wi-Fi
connection.
Dial-Up Connection
A dial-up connection is the least expensive way to access the Internet, but
it is also the slowest connection.
Free services can sometimes be found, along with pay services like AOL,
MSN, Earthlink and other ISP companies.
Call an internet service provider to obtain your internet service. While you
are on the phone setting up your account the customer care person should
There are two types of ISDN networks — BRI (Basic Rate Interface) and
PRI (Primary Rate Interface).
FTTP stands for Fiber to the Premises, uses fiber-optic cable to provide
extremely high-speed Internet access to a user's physical permanent
location. Two specific types of FTTP are FTTH (Fiber to the Home) and
FTTB (Fiber to the Building).
The most popular T-carrier line is the T1 line. Businesses often use T1 lines
to connect to the Internet.
Protocol Options
The physical layer is now connected and LCP performs the basic setup of
the link. Device A sends an LCP configuration request message to device
B over the physical link, specifying the parameters it wishes to use. If
Device B agrees, it replies with an acknowledgement. If B doesn't agree, it
sends back a negative acknowledgment or rejection, telling device A what it
won't accept. Device A can then try a different configuration request with
new parameters that device B will hopefully accept.
Authentication Phase
After all necessary NCPs have been invoked, the link proceeds to the Link
Open state, even if none were successfully opened
In this state, the LCP link and one or more NCP links are open and
operational. Data can be passed for each NCP that has been successfully
set up.
The link can be terminated at any time by either device for a variety of
reasons
The device terminating the link sends a special LCP termination frame, and
the other device acknowledges it. The link then goes back to the Link Dead
phase. In the case where the termination was by request and the physical
layer connection is still active, the PPP implementation is supposed to
specifically signal the physical layer to terminate the layer one connection.
The most basic use of SSH is to connect to a remote host for a terminal
session. The form of that command is the following:
ssh UserName@SSHserver.example.com
This command will cause the client to attempt to connect to the server
named server.example.com, using the user ID UserName. If this is the first
time negotiating a connection between the local host and the server, the
user will be prompted with the remote host's public key fingerprint and
prompted to connect, despite there having been no prior connection: