SlideShare a Scribd company logo
1 of 8
Download to read offline
TCP/IP Networking Basics
& Troubleshooting
DVR Connection, Inc ™ Discovery Series – © TCP/IP Networking Basics & Troubleshooting by Mike Bijan Page 1
Networking is by far the most complex task in installing a DVR (or any PC) that will be remotely
monitored. There are many connection requirements as well as having ample knowledge of networking
for successfully completing a remote connection configuration. In this article you will learn the very
basic knowledge about networking and configuring a DVR for remote access via the Internet Protocol as
well as some common troubleshooting procedures.
What is networking?
With regards to computers, networking is the act of connecting a minimum of two computing devices
together for the purpose of sharing information. Computing devices may comprise of variety of
computer hardware such personal computers, printers, modems, routers and computer software.
There are several ways to classify networks. Each network classification establishes the hardware and
software requirements by that network. These include:
 Local Area Network
 Wide Area Network
 Internet
Local area network or LAN for short consists of a group of computers (a minimum of two) that are
located in close proximity to each other such as in a home office, small office building or a school. A LAN
is useful for sharing resources like files, printers, games or other applications. The requirement for this
type of network is an appropriate network adapter in each computer and a distribution device such as a
HUB or a SWITCH.
Wide Area Network or WAN for short is the means for small networks such as multiple LAN to
communicate with each other within a specific geographic area, such as a city, state or a multiple
branches of a large business. This type of WAN is managed by a private centralized group of computers
and personnel.
Internet is a network configuration that consists of millions of other smaller private and public WANs
and LANs for the purpose of sharing information in a much larger scale. The Internet is the largest public
network in the world.
Just as people from different parts of the world communicate using language, computers also use
language to communicate with each other. This language is known as protocol. There are many
different protocols that computers within a network may use to communicate; however, the most
widely used is called TCP/IP.
TCP/IP - TCP/IP stands for "Transmission Control Protocol / Internet (working) Protocol". It is a
description of a networking protocol that has evolved over several decades. It is also the protocol that
forms the "backbone" of the way the internet works. Since TCP/IP networks are connected across the
world, each computer must have a unique identification or address in order for the data to be sent or
received by that computer correctly.
TCP/IP Networking Basics
& Troubleshooting
DVR Connection, Inc ™ Discovery Series – © TCP/IP Networking Basics & Troubleshooting by Mike Bijan Page 2
TCP/IP networks in general are made up of the following parts:
 IP Address
 Subnet Mask
 Gateway
 Domain Name Service (DNS)
The Internet Protocol (IP) uses a 32-bit address structure and since a computer can only work with 0s
and 1s; this address is divided into four 8-bit long set of numbers. This numbering system is called
binary. For example, the following numbers is the address for a specific computer.
However, for us to use and understand this address, it is usually written in a decimal (factor of 10) form
separated by a decimal point as shown in figure 2.
Figure 2
This is a much easier number to remember and enter into the computer. As shown in figure 2 an IP
address is a set of numbers that designate an exact location for a device on a network.
 There are EXACTLY (no more, no less) four sets of numbers separated by a "period".
 Each number MUST be equal or greater than 0 and no more than 255.
 We know that this IP address is on a "Private" network. (More on this later)
A Subnet is used to segregate the traffic between different networks based on a network configuration
by organizing computers into groups. This provides security and performance to attached networks. A
subnet mask is the part of a subnet and just as an IP address is represented by four sets of 8-bit binary
numbers. A commonly used subnet mask in a private network is shown in figure 3.
Figure 3
Figure 4 shows the decimal representation of the above subnet mask.
Figure 4
Figure 1
TCP/IP Networking Basics
& Troubleshooting
DVR Connection, Inc ™ Discovery Series – © TCP/IP Networking Basics & Troubleshooting by Mike Bijan Page 3
A network Gateway is a network device that connects different subnets together. This device that can
be implemented in completely hardware, completely software or a combination of both, connects a
local network to the Internet or to other networks with different subnet or networks that use different
base protocols. Because a network gateway is configured at the entry point to a network, functions
such as Firewalls may be integrated within it. On home networks as well as small office networks a
broadband router usually serves as the network gateway. A default gateway address is usually already
configured within the router by the manufacturer and below are the binary (figure 5) and decimal
(figure 6) examples of it.
Figure 5
Figure 6
Understanding its function and the configuration application associated with a router is crucial in
obtaining connectivity between a DVR (a PC) and a remote viewing PC.
Domain Name System (DNS) is a distributed internet directory service. DNS is mainly used to translate
between domain names and IP addresses, and to control email delivery. What that means is that, it is
difficult for most Internet users to remember the IP address of a particular website such as
64.236.29.120, but it is very easy to remember www.cnn.com. Most internet services rely on DNS to
operate. If DNS fails or is too slow, web sites cannot be located and service delivery stalls.
Note: To configure a network for the DVR we must first establish if our network is independent
(private) or will it be attached to an outside network (Public).
Private Network (LAN) - A private network could be like the one that you have at home or in the office.
It may (optionally) be connected to a public network (i.e. Internet). IP addresses in a private network
need to be unique but do not need to be globally unique. It is important that you follow international
standards when setting up private networks. You must use IP addresses that are in certain ranges so as
not to duplicate ones already in use on public networks. This is particularly important where your
private network is connected up to the internet. The standards (as defined by Internet Assigned
Numbers Authority (IANA)) for private network addresses are:
10.0.0.0 to 10.255.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
Also, IP addresses in the range of 169.254.0.0 to 169.254.255.255 are reserved for Automatic Private IP
Addressing (such as in Windows XP).
TCP/IP Networking Basics
& Troubleshooting
DVR Connection, Inc ™ Discovery Series – © TCP/IP Networking Basics & Troubleshooting by Mike Bijan Page 4
Public Network (WAN) - The Internet is a public network. A public network in fact is comprised of
literally millions of smaller private networks across the world connected to each other through gateway
routers. The purpose of a public network is to allow sharing of information and resources between
smaller private networks. Every IP address on the Internet must be globally unique. Figure 7 shows a
typical configuration of small networks connected to the Internet by a Broadband Router. In order for a
host (a DVR or a PC) on the private network to be accessible from the hosts within other private
networks (Remote PC) or in this case the Internet, the router for the network must allow incoming
communications to have access to the particular host within the private network. The process of
providing this access is called Port Forwarding or IP Routing. As with a telephone switchboard, the
router receives a request for communication with particular software on a particular host. The port
forwarding feature of the router verifies the information with its internal pre programmed configuration
and if the information for the host is available and correct, then it forwards it to the targeted host.
Configuring Port Forwarding or IP Routing within a router is done through a special program provided by
the manufacturer of the router. This program differs from one manufacturer to the next, making it
difficult to have one standard procedure for all the routers.
Although there are literally tens of different manufacturer of routers, some of the most commonly used
routers in smaller networks are manufactured by Linksys, D-Link and NETGEAR. Before configuring the
router, we must first configure the TCP/IP networking for the DVR (or host PC). Following the DVR users
guide or Windows Local Area Connection interface, we can select a unique IP address and fill in the
blank fields within the interface as shown in figure 8. Keep in mind that the Default Gateway and
Subnet Mask must conform to the routers internal address configuration. For example the following will
not communicate with a router that is configured with an IP address of 192.168.0.1.
Figure 7
TCP/IP Networking Basics
& Troubleshooting
DVR Connection, Inc ™ Discovery Series – © TCP/IP Networking Basics & Troubleshooting by Mike Bijan Page 5
Figure 8
After saving this information, ensure all Ethernet cables are tested and all connections are made
between the devices. Next, the router configuration and setup screen must be accessed in order to
open the appropriate ports for incoming traffic. Figure 9 shows an example of the port forwarding
section of a Linksys router. Keep in mind that every DVR and application uses a different port or
multiple ports for communication with the remote client software. Refer to the User’s Guide for your
DVR or contact your dealer for the correct information. With the port information in hand, fill in the
columns with that information. In the case of DCI’s PC based DVR, ports 2000 and 2100 will have to be
forwarded to the assigned DVR private IP address (192.168.1.100 as shown in figure 8). Once completed
select Enable, Apply and reboot the router. This procedure will complete the connection between the
remote PC and the DVR.
Figure 9
TCP/IP Networking Basics
& Troubleshooting
DVR Connection, Inc ™ Discovery Series – © TCP/IP Networking Basics & Troubleshooting by Mike Bijan Page 6
Troubleshooting the Network Connections
Troubleshooting network issues require a logical process and a reliable approach to zero in on the
source of the problem. The process is to change one thing at a time and to start with the basics and
work through the entire network one piece at a time. As with the CCTV system troubleshooting, the
most basic and the first component of any network to inspect is the transmission cable. There are two
main types of transmission Ethernet cables; Straight Through and Cross-Over. Cross over is used for
connecting only two devices together. If there is a hub or router in the equipment loop, a straight
through cable should be used (unless otherwise specified by the equipment manufacturer). Turn the
cable ends so the gold pins are facing you, referring to figure 10 verify the type of cable you are using.
Straight-Through Cross-Over
Figure 10
Ensure the cable being used is of the correct type for your network and securely attached to the
network devices. Although visual inspection is good for selecting the correct cable type, it is however,
not a replacement for a good reliable cable tester. Once the cable inspection is complete, the next tool
to use in troubleshooting a network should be the Ping command. Ping is a command prompt
command that provides basic information about how the connection is performing and if that
connection is in place. To start the Ping command:
1. Click on Start > Run
2. Type cmd in the Run window, and click OK
a. (You will notice a black window with white command line that pops up)
3. Type ping followed by an IP address of the remote site (where the DVR is located)
4. Press Enter to execute the command
When there is no problem, the ping results look as shown in the figure 11.
TCP/IP Networking Basics
& Troubleshooting
DVR Connection, Inc ™ Discovery Series – © TCP/IP Networking Basics & Troubleshooting by Mike Bijan Page 7
Figure 11
The first line shows the computer being contacted for a reply (in this case it is the address for
www.google.com). The reply lines are the results of the information (packets) sent to Google server and
the return results and the time it took for the return of the reply from the Google server. The third
section shows that Ethernet packets have "0% loss". This is the best possible result. It means that the
network connection and traffic flow are good. If packet loss result is not 0%, sometimes this indicates a
severe problem, but in other situations it doesn't indicate any problem whatever. However anything
higher than 5% is definitely a problem.
The last section shows the average time it took for the server to answer. "Average = 0ms" is the best
possible result. Probably you'll only get responses this quickly from computers on your own network.
However, if the average round trip time is > 500 ms, there's possible latency problem. Contact your
Internet Service Provider (ISP) for further assistance.
Interpreting Ping when There's a Problem
The most common error message when using the ping command is Request Timed out. Usually, this
message indicates that your PC was not able to receive the ping reply back from the destination network
device within certain time period. Assuming that your connections are in place, your network is
properly configured on your system, this typically indicates that the destination network device or other
devices within the destination network is not connected to the network, it is turned off, it is not
configured properly or it is not operating correctly. In rare situations, it can also indicate that there may
be heavy traffic or congestion on the network that the delivery of the ping message will not be
completed in a timely manner. An invalid IP address will also produces the same result. In any of these
cases, a failed ping results requires additional troubleshooting process that may involve other network
tools, manual inspection, and possibly reconfiguration.
Another error that may be displayed as the ping result is Unknown host, which indicates that the host or
IP address you typed doesn't exist. It probably is a typing error.
TCP/IP Networking Basics
& Troubleshooting
DVR Connection, Inc ™ Discovery Series – © TCP/IP Networking Basics & Troubleshooting by Mike Bijan Page 8
There are other results that may be displayed by the ping command; however, they are outside the
scope of this article and often they are problems with your ISP and they should be contacted for further
information.
Limitations of the Ping Tool
 Ping is not a good tool for diagnosing intermittent problems.
 Good results are reliable, but “bad results” could be caused by any number of things, and are
not necessarily reliable!
 Ping uses ICMP, which has low priority, showing speeds that are slower than regular network
traffic. Some computers reject ICMP, and therefore pinging, entirely.
If the DVR TCP/IP setup, Router configuration, physical inspection of the devices and the ping results are
successfully completed but the connection is still not being established between the remote PC and the
DVR, the most common issue could be related to software firewalls included with an anti-Virus software
running on the remote PC, or security setting within the remote PC’s Windows operating system. In
majority of instances, these issues are most evident when the DVR is being accessed using Internet
Explorer (IE) and not the remote client software provided with the DVR. When using IE, the DVR is
accessed using a series of software components known as Active-X. For security reasons, Active-X
components are generally disabled within the IE security panel, hindering the browser version of the
remote access software from communicating or installing the required communication components on
the remote PC. These problems however, can be resolved with minor changes in the IE or the anti-virus
software settings where the Internet Explorer can easily be utilized as the means to communicate with
the DVR.
Until recently, installing and configuring a network, in most part, has been a task performed by network
System Administrators or Information Technology professionals. With the changes in the consumer
market place, including the CCTV market, more and more non-IT professionals are being involved in
basic networking in order to service their customers. Although this article may not provide all of the
information you need to tackle every networking environment, it should however, provide the basic
knowledgebase required to successfully complete a simple networking configuration and establish a
connection between a remote PC and a DVR or any other PC that will be remotely accessed over the
LAN, WAN or Internet.

More Related Content

What's hot

Videoconferencing Technology
Videoconferencing TechnologyVideoconferencing Technology
Videoconferencing TechnologyVideoguy
 
Indigo Product And Technology Overivew 2005
Indigo Product And Technology Overivew 2005 Indigo Product And Technology Overivew 2005
Indigo Product And Technology Overivew 2005 ir. Carmelo Zaccone
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4Irsandi Hasan
 
Cisco discovery d homesb module 10 final exam - v.4 in english.
Cisco discovery   d homesb module 10 final exam - v.4 in english.Cisco discovery   d homesb module 10 final exam - v.4 in english.
Cisco discovery d homesb module 10 final exam - v.4 in english.igede tirtanata
 
skype-peer to peer protocol
skype-peer to peer protocolskype-peer to peer protocol
skype-peer to peer protocolDhwaniHingorani
 
Raisul Haq Rajib (063435056)
Raisul Haq Rajib  (063435056)Raisul Haq Rajib  (063435056)
Raisul Haq Rajib (063435056)mashiur
 
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...thesakshi12
 
Voice over Internet Protocol (VoIP) using Asterisk
Voice over Internet Protocol (VoIP) using AsteriskVoice over Internet Protocol (VoIP) using Asterisk
Voice over Internet Protocol (VoIP) using AsteriskSameer Verma
 
VoIP - Technology To Business Models
VoIP - Technology To Business ModelsVoIP - Technology To Business Models
VoIP - Technology To Business Modelsguesta5f2fb
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Serious_SamSoul
 

What's hot (18)

Videoconferencing Technology
Videoconferencing TechnologyVideoconferencing Technology
Videoconferencing Technology
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
Indigo Product And Technology Overivew 2005
Indigo Product And Technology Overivew 2005 Indigo Product And Technology Overivew 2005
Indigo Product And Technology Overivew 2005
 
Skype
SkypeSkype
Skype
 
SKYPE AS OVERLAY NETWORK
SKYPE AS OVERLAY NETWORKSKYPE AS OVERLAY NETWORK
SKYPE AS OVERLAY NETWORK
 
Lis 4482 final report
Lis 4482 final reportLis 4482 final report
Lis 4482 final report
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
Cisco discovery d homesb module 10 final exam - v.4 in english.
Cisco discovery   d homesb module 10 final exam - v.4 in english.Cisco discovery   d homesb module 10 final exam - v.4 in english.
Cisco discovery d homesb module 10 final exam - v.4 in english.
 
skype-peer to peer protocol
skype-peer to peer protocolskype-peer to peer protocol
skype-peer to peer protocol
 
Raisul Haq Rajib (063435056)
Raisul Haq Rajib  (063435056)Raisul Haq Rajib  (063435056)
Raisul Haq Rajib (063435056)
 
CCNA project-report
CCNA project-reportCCNA project-report
CCNA project-report
 
Chapter09
Chapter09Chapter09
Chapter09
 
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
 
Vpn
VpnVpn
Vpn
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
Voice over Internet Protocol (VoIP) using Asterisk
Voice over Internet Protocol (VoIP) using AsteriskVoice over Internet Protocol (VoIP) using Asterisk
Voice over Internet Protocol (VoIP) using Asterisk
 
VoIP - Technology To Business Models
VoIP - Technology To Business ModelsVoIP - Technology To Business Models
VoIP - Technology To Business Models
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-
 

Viewers also liked

Per non scioccare un italiano
Per non scioccare un italianoPer non scioccare un italiano
Per non scioccare un italianoIldikó Weltler
 
Gatti 090624135127-phpapp02
Gatti 090624135127-phpapp02Gatti 090624135127-phpapp02
Gatti 090624135127-phpapp02Creazioni
 
Is animeddas
Is animeddasIs animeddas
Is animeddasst3fy_182
 
Historieta
HistorietaHistorieta
Historietashanned
 
MyAccess il sistema innovativo per crescere il tuo business all'estero
MyAccess il sistema innovativo per crescere il tuo business all'esteroMyAccess il sistema innovativo per crescere il tuo business all'estero
MyAccess il sistema innovativo per crescere il tuo business all'esteroAlessandro Fichera
 

Viewers also liked (8)

Per non scioccare un italiano
Per non scioccare un italianoPer non scioccare un italiano
Per non scioccare un italiano
 
Consumi petrolio 2012_06
Consumi petrolio 2012_06Consumi petrolio 2012_06
Consumi petrolio 2012_06
 
Gatti 090624135127-phpapp02
Gatti 090624135127-phpapp02Gatti 090624135127-phpapp02
Gatti 090624135127-phpapp02
 
Is animeddas
Is animeddasIs animeddas
Is animeddas
 
Historieta
HistorietaHistorieta
Historieta
 
MyAccess il sistema innovativo per crescere il tuo business all'estero
MyAccess il sistema innovativo per crescere il tuo business all'esteroMyAccess il sistema innovativo per crescere il tuo business all'estero
MyAccess il sistema innovativo per crescere il tuo business all'estero
 
Menu
MenuMenu
Menu
 
Cristales
CristalesCristales
Cristales
 

Similar to Tcpip networking basics_and_troubleshooting

Network And Network Address Translation
Network And Network Address TranslationNetwork And Network Address Translation
Network And Network Address TranslationErin Moore
 
Google global Cache operations for youtube
Google global Cache operations for youtubeGoogle global Cache operations for youtube
Google global Cache operations for youtubeShahinAlam930521
 
Network Address Translation ( Nat ) Essay
Network Address Translation ( Nat ) EssayNetwork Address Translation ( Nat ) Essay
Network Address Translation ( Nat ) EssayJill Crawford
 
Welcome to IP Surveillance 101
Welcome to IP Surveillance 101Welcome to IP Surveillance 101
Welcome to IP Surveillance 101grantsupplies
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security conceptssonuagain
 
Guide to home networking
Guide to home networkingGuide to home networking
Guide to home networkingDilan Gilluly
 
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Vanitha Joshi
 
Network configuration in Linux
Network configuration in LinuxNetwork configuration in Linux
Network configuration in LinuxMohammed Yazdani
 
Ch18 Internet Security
Ch18 Internet SecurityCh18 Internet Security
Ch18 Internet Securityphanleson
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesVamsi Krishna Kalavala
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Serious_SamSoul
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwoAKHIL969626
 
BASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALSBASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALSVarinder Singh Walia
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For CybersecurityMohammed Adam
 

Similar to Tcpip networking basics_and_troubleshooting (20)

Digital network lecturer2
Digital network  lecturer2Digital network  lecturer2
Digital network lecturer2
 
Network And Network Address Translation
Network And Network Address TranslationNetwork And Network Address Translation
Network And Network Address Translation
 
Google global Cache operations for youtube
Google global Cache operations for youtubeGoogle global Cache operations for youtube
Google global Cache operations for youtube
 
Network Address Translation ( Nat ) Essay
Network Address Translation ( Nat ) EssayNetwork Address Translation ( Nat ) Essay
Network Address Translation ( Nat ) Essay
 
Tcpip Intro
Tcpip IntroTcpip Intro
Tcpip Intro
 
Welcome to IP Surveillance 101
Welcome to IP Surveillance 101Welcome to IP Surveillance 101
Welcome to IP Surveillance 101
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
 
Iap final
Iap finalIap final
Iap final
 
Guide to home networking
Guide to home networkingGuide to home networking
Guide to home networking
 
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
 
Telephony DNS
Telephony DNSTelephony DNS
Telephony DNS
 
Network configuration in Linux
Network configuration in LinuxNetwork configuration in Linux
Network configuration in Linux
 
Dasar komputer chapter8
Dasar komputer chapter8Dasar komputer chapter8
Dasar komputer chapter8
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Ch18 Internet Security
Ch18 Internet SecurityCh18 Internet Security
Ch18 Internet Security
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
BASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALSBASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALS
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
 

More from Kumar

Graphics devices
Graphics devicesGraphics devices
Graphics devicesKumar
 
Fill area algorithms
Fill area algorithmsFill area algorithms
Fill area algorithmsKumar
 
region-filling
region-fillingregion-filling
region-fillingKumar
 
Bresenham derivation
Bresenham derivationBresenham derivation
Bresenham derivationKumar
 
Bresenham circles and polygons derication
Bresenham circles and polygons dericationBresenham circles and polygons derication
Bresenham circles and polygons dericationKumar
 
Introductionto xslt
Introductionto xsltIntroductionto xslt
Introductionto xsltKumar
 
Extracting data from xml
Extracting data from xmlExtracting data from xml
Extracting data from xmlKumar
 
Xml basics
Xml basicsXml basics
Xml basicsKumar
 
XML Schema
XML SchemaXML Schema
XML SchemaKumar
 
Publishing xml
Publishing xmlPublishing xml
Publishing xmlKumar
 
Applying xml
Applying xmlApplying xml
Applying xmlKumar
 
Introduction to XML
Introduction to XMLIntroduction to XML
Introduction to XMLKumar
 
How to deploy a j2ee application
How to deploy a j2ee applicationHow to deploy a j2ee application
How to deploy a j2ee applicationKumar
 
JNDI, JMS, JPA, XML
JNDI, JMS, JPA, XMLJNDI, JMS, JPA, XML
JNDI, JMS, JPA, XMLKumar
 
EJB Fundmentals
EJB FundmentalsEJB Fundmentals
EJB FundmentalsKumar
 
JSP and struts programming
JSP and struts programmingJSP and struts programming
JSP and struts programmingKumar
 
java servlet and servlet programming
java servlet and servlet programmingjava servlet and servlet programming
java servlet and servlet programmingKumar
 
Introduction to JDBC and JDBC Drivers
Introduction to JDBC and JDBC DriversIntroduction to JDBC and JDBC Drivers
Introduction to JDBC and JDBC DriversKumar
 
Introduction to J2EE
Introduction to J2EEIntroduction to J2EE
Introduction to J2EEKumar
 

More from Kumar (20)

Graphics devices
Graphics devicesGraphics devices
Graphics devices
 
Fill area algorithms
Fill area algorithmsFill area algorithms
Fill area algorithms
 
region-filling
region-fillingregion-filling
region-filling
 
Bresenham derivation
Bresenham derivationBresenham derivation
Bresenham derivation
 
Bresenham circles and polygons derication
Bresenham circles and polygons dericationBresenham circles and polygons derication
Bresenham circles and polygons derication
 
Introductionto xslt
Introductionto xsltIntroductionto xslt
Introductionto xslt
 
Extracting data from xml
Extracting data from xmlExtracting data from xml
Extracting data from xml
 
Xml basics
Xml basicsXml basics
Xml basics
 
XML Schema
XML SchemaXML Schema
XML Schema
 
Publishing xml
Publishing xmlPublishing xml
Publishing xml
 
DTD
DTDDTD
DTD
 
Applying xml
Applying xmlApplying xml
Applying xml
 
Introduction to XML
Introduction to XMLIntroduction to XML
Introduction to XML
 
How to deploy a j2ee application
How to deploy a j2ee applicationHow to deploy a j2ee application
How to deploy a j2ee application
 
JNDI, JMS, JPA, XML
JNDI, JMS, JPA, XMLJNDI, JMS, JPA, XML
JNDI, JMS, JPA, XML
 
EJB Fundmentals
EJB FundmentalsEJB Fundmentals
EJB Fundmentals
 
JSP and struts programming
JSP and struts programmingJSP and struts programming
JSP and struts programming
 
java servlet and servlet programming
java servlet and servlet programmingjava servlet and servlet programming
java servlet and servlet programming
 
Introduction to JDBC and JDBC Drivers
Introduction to JDBC and JDBC DriversIntroduction to JDBC and JDBC Drivers
Introduction to JDBC and JDBC Drivers
 
Introduction to J2EE
Introduction to J2EEIntroduction to J2EE
Introduction to J2EE
 

Recently uploaded

Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 

Recently uploaded (20)

Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 

Tcpip networking basics_and_troubleshooting

  • 1. TCP/IP Networking Basics & Troubleshooting DVR Connection, Inc ™ Discovery Series – © TCP/IP Networking Basics & Troubleshooting by Mike Bijan Page 1 Networking is by far the most complex task in installing a DVR (or any PC) that will be remotely monitored. There are many connection requirements as well as having ample knowledge of networking for successfully completing a remote connection configuration. In this article you will learn the very basic knowledge about networking and configuring a DVR for remote access via the Internet Protocol as well as some common troubleshooting procedures. What is networking? With regards to computers, networking is the act of connecting a minimum of two computing devices together for the purpose of sharing information. Computing devices may comprise of variety of computer hardware such personal computers, printers, modems, routers and computer software. There are several ways to classify networks. Each network classification establishes the hardware and software requirements by that network. These include:  Local Area Network  Wide Area Network  Internet Local area network or LAN for short consists of a group of computers (a minimum of two) that are located in close proximity to each other such as in a home office, small office building or a school. A LAN is useful for sharing resources like files, printers, games or other applications. The requirement for this type of network is an appropriate network adapter in each computer and a distribution device such as a HUB or a SWITCH. Wide Area Network or WAN for short is the means for small networks such as multiple LAN to communicate with each other within a specific geographic area, such as a city, state or a multiple branches of a large business. This type of WAN is managed by a private centralized group of computers and personnel. Internet is a network configuration that consists of millions of other smaller private and public WANs and LANs for the purpose of sharing information in a much larger scale. The Internet is the largest public network in the world. Just as people from different parts of the world communicate using language, computers also use language to communicate with each other. This language is known as protocol. There are many different protocols that computers within a network may use to communicate; however, the most widely used is called TCP/IP. TCP/IP - TCP/IP stands for "Transmission Control Protocol / Internet (working) Protocol". It is a description of a networking protocol that has evolved over several decades. It is also the protocol that forms the "backbone" of the way the internet works. Since TCP/IP networks are connected across the world, each computer must have a unique identification or address in order for the data to be sent or received by that computer correctly.
  • 2. TCP/IP Networking Basics & Troubleshooting DVR Connection, Inc ™ Discovery Series – © TCP/IP Networking Basics & Troubleshooting by Mike Bijan Page 2 TCP/IP networks in general are made up of the following parts:  IP Address  Subnet Mask  Gateway  Domain Name Service (DNS) The Internet Protocol (IP) uses a 32-bit address structure and since a computer can only work with 0s and 1s; this address is divided into four 8-bit long set of numbers. This numbering system is called binary. For example, the following numbers is the address for a specific computer. However, for us to use and understand this address, it is usually written in a decimal (factor of 10) form separated by a decimal point as shown in figure 2. Figure 2 This is a much easier number to remember and enter into the computer. As shown in figure 2 an IP address is a set of numbers that designate an exact location for a device on a network.  There are EXACTLY (no more, no less) four sets of numbers separated by a "period".  Each number MUST be equal or greater than 0 and no more than 255.  We know that this IP address is on a "Private" network. (More on this later) A Subnet is used to segregate the traffic between different networks based on a network configuration by organizing computers into groups. This provides security and performance to attached networks. A subnet mask is the part of a subnet and just as an IP address is represented by four sets of 8-bit binary numbers. A commonly used subnet mask in a private network is shown in figure 3. Figure 3 Figure 4 shows the decimal representation of the above subnet mask. Figure 4 Figure 1
  • 3. TCP/IP Networking Basics & Troubleshooting DVR Connection, Inc ™ Discovery Series – © TCP/IP Networking Basics & Troubleshooting by Mike Bijan Page 3 A network Gateway is a network device that connects different subnets together. This device that can be implemented in completely hardware, completely software or a combination of both, connects a local network to the Internet or to other networks with different subnet or networks that use different base protocols. Because a network gateway is configured at the entry point to a network, functions such as Firewalls may be integrated within it. On home networks as well as small office networks a broadband router usually serves as the network gateway. A default gateway address is usually already configured within the router by the manufacturer and below are the binary (figure 5) and decimal (figure 6) examples of it. Figure 5 Figure 6 Understanding its function and the configuration application associated with a router is crucial in obtaining connectivity between a DVR (a PC) and a remote viewing PC. Domain Name System (DNS) is a distributed internet directory service. DNS is mainly used to translate between domain names and IP addresses, and to control email delivery. What that means is that, it is difficult for most Internet users to remember the IP address of a particular website such as 64.236.29.120, but it is very easy to remember www.cnn.com. Most internet services rely on DNS to operate. If DNS fails or is too slow, web sites cannot be located and service delivery stalls. Note: To configure a network for the DVR we must first establish if our network is independent (private) or will it be attached to an outside network (Public). Private Network (LAN) - A private network could be like the one that you have at home or in the office. It may (optionally) be connected to a public network (i.e. Internet). IP addresses in a private network need to be unique but do not need to be globally unique. It is important that you follow international standards when setting up private networks. You must use IP addresses that are in certain ranges so as not to duplicate ones already in use on public networks. This is particularly important where your private network is connected up to the internet. The standards (as defined by Internet Assigned Numbers Authority (IANA)) for private network addresses are: 10.0.0.0 to 10.255.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255 Also, IP addresses in the range of 169.254.0.0 to 169.254.255.255 are reserved for Automatic Private IP Addressing (such as in Windows XP).
  • 4. TCP/IP Networking Basics & Troubleshooting DVR Connection, Inc ™ Discovery Series – © TCP/IP Networking Basics & Troubleshooting by Mike Bijan Page 4 Public Network (WAN) - The Internet is a public network. A public network in fact is comprised of literally millions of smaller private networks across the world connected to each other through gateway routers. The purpose of a public network is to allow sharing of information and resources between smaller private networks. Every IP address on the Internet must be globally unique. Figure 7 shows a typical configuration of small networks connected to the Internet by a Broadband Router. In order for a host (a DVR or a PC) on the private network to be accessible from the hosts within other private networks (Remote PC) or in this case the Internet, the router for the network must allow incoming communications to have access to the particular host within the private network. The process of providing this access is called Port Forwarding or IP Routing. As with a telephone switchboard, the router receives a request for communication with particular software on a particular host. The port forwarding feature of the router verifies the information with its internal pre programmed configuration and if the information for the host is available and correct, then it forwards it to the targeted host. Configuring Port Forwarding or IP Routing within a router is done through a special program provided by the manufacturer of the router. This program differs from one manufacturer to the next, making it difficult to have one standard procedure for all the routers. Although there are literally tens of different manufacturer of routers, some of the most commonly used routers in smaller networks are manufactured by Linksys, D-Link and NETGEAR. Before configuring the router, we must first configure the TCP/IP networking for the DVR (or host PC). Following the DVR users guide or Windows Local Area Connection interface, we can select a unique IP address and fill in the blank fields within the interface as shown in figure 8. Keep in mind that the Default Gateway and Subnet Mask must conform to the routers internal address configuration. For example the following will not communicate with a router that is configured with an IP address of 192.168.0.1. Figure 7
  • 5. TCP/IP Networking Basics & Troubleshooting DVR Connection, Inc ™ Discovery Series – © TCP/IP Networking Basics & Troubleshooting by Mike Bijan Page 5 Figure 8 After saving this information, ensure all Ethernet cables are tested and all connections are made between the devices. Next, the router configuration and setup screen must be accessed in order to open the appropriate ports for incoming traffic. Figure 9 shows an example of the port forwarding section of a Linksys router. Keep in mind that every DVR and application uses a different port or multiple ports for communication with the remote client software. Refer to the User’s Guide for your DVR or contact your dealer for the correct information. With the port information in hand, fill in the columns with that information. In the case of DCI’s PC based DVR, ports 2000 and 2100 will have to be forwarded to the assigned DVR private IP address (192.168.1.100 as shown in figure 8). Once completed select Enable, Apply and reboot the router. This procedure will complete the connection between the remote PC and the DVR. Figure 9
  • 6. TCP/IP Networking Basics & Troubleshooting DVR Connection, Inc ™ Discovery Series – © TCP/IP Networking Basics & Troubleshooting by Mike Bijan Page 6 Troubleshooting the Network Connections Troubleshooting network issues require a logical process and a reliable approach to zero in on the source of the problem. The process is to change one thing at a time and to start with the basics and work through the entire network one piece at a time. As with the CCTV system troubleshooting, the most basic and the first component of any network to inspect is the transmission cable. There are two main types of transmission Ethernet cables; Straight Through and Cross-Over. Cross over is used for connecting only two devices together. If there is a hub or router in the equipment loop, a straight through cable should be used (unless otherwise specified by the equipment manufacturer). Turn the cable ends so the gold pins are facing you, referring to figure 10 verify the type of cable you are using. Straight-Through Cross-Over Figure 10 Ensure the cable being used is of the correct type for your network and securely attached to the network devices. Although visual inspection is good for selecting the correct cable type, it is however, not a replacement for a good reliable cable tester. Once the cable inspection is complete, the next tool to use in troubleshooting a network should be the Ping command. Ping is a command prompt command that provides basic information about how the connection is performing and if that connection is in place. To start the Ping command: 1. Click on Start > Run 2. Type cmd in the Run window, and click OK a. (You will notice a black window with white command line that pops up) 3. Type ping followed by an IP address of the remote site (where the DVR is located) 4. Press Enter to execute the command When there is no problem, the ping results look as shown in the figure 11.
  • 7. TCP/IP Networking Basics & Troubleshooting DVR Connection, Inc ™ Discovery Series – © TCP/IP Networking Basics & Troubleshooting by Mike Bijan Page 7 Figure 11 The first line shows the computer being contacted for a reply (in this case it is the address for www.google.com). The reply lines are the results of the information (packets) sent to Google server and the return results and the time it took for the return of the reply from the Google server. The third section shows that Ethernet packets have "0% loss". This is the best possible result. It means that the network connection and traffic flow are good. If packet loss result is not 0%, sometimes this indicates a severe problem, but in other situations it doesn't indicate any problem whatever. However anything higher than 5% is definitely a problem. The last section shows the average time it took for the server to answer. "Average = 0ms" is the best possible result. Probably you'll only get responses this quickly from computers on your own network. However, if the average round trip time is > 500 ms, there's possible latency problem. Contact your Internet Service Provider (ISP) for further assistance. Interpreting Ping when There's a Problem The most common error message when using the ping command is Request Timed out. Usually, this message indicates that your PC was not able to receive the ping reply back from the destination network device within certain time period. Assuming that your connections are in place, your network is properly configured on your system, this typically indicates that the destination network device or other devices within the destination network is not connected to the network, it is turned off, it is not configured properly or it is not operating correctly. In rare situations, it can also indicate that there may be heavy traffic or congestion on the network that the delivery of the ping message will not be completed in a timely manner. An invalid IP address will also produces the same result. In any of these cases, a failed ping results requires additional troubleshooting process that may involve other network tools, manual inspection, and possibly reconfiguration. Another error that may be displayed as the ping result is Unknown host, which indicates that the host or IP address you typed doesn't exist. It probably is a typing error.
  • 8. TCP/IP Networking Basics & Troubleshooting DVR Connection, Inc ™ Discovery Series – © TCP/IP Networking Basics & Troubleshooting by Mike Bijan Page 8 There are other results that may be displayed by the ping command; however, they are outside the scope of this article and often they are problems with your ISP and they should be contacted for further information. Limitations of the Ping Tool  Ping is not a good tool for diagnosing intermittent problems.  Good results are reliable, but “bad results” could be caused by any number of things, and are not necessarily reliable!  Ping uses ICMP, which has low priority, showing speeds that are slower than regular network traffic. Some computers reject ICMP, and therefore pinging, entirely. If the DVR TCP/IP setup, Router configuration, physical inspection of the devices and the ping results are successfully completed but the connection is still not being established between the remote PC and the DVR, the most common issue could be related to software firewalls included with an anti-Virus software running on the remote PC, or security setting within the remote PC’s Windows operating system. In majority of instances, these issues are most evident when the DVR is being accessed using Internet Explorer (IE) and not the remote client software provided with the DVR. When using IE, the DVR is accessed using a series of software components known as Active-X. For security reasons, Active-X components are generally disabled within the IE security panel, hindering the browser version of the remote access software from communicating or installing the required communication components on the remote PC. These problems however, can be resolved with minor changes in the IE or the anti-virus software settings where the Internet Explorer can easily be utilized as the means to communicate with the DVR. Until recently, installing and configuring a network, in most part, has been a task performed by network System Administrators or Information Technology professionals. With the changes in the consumer market place, including the CCTV market, more and more non-IT professionals are being involved in basic networking in order to service their customers. Although this article may not provide all of the information you need to tackle every networking environment, it should however, provide the basic knowledgebase required to successfully complete a simple networking configuration and establish a connection between a remote PC and a DVR or any other PC that will be remotely accessed over the LAN, WAN or Internet.