Sunday, 26 April 2020

6 Dynamic Host Configuration Protocol

The Dynamic Host Configuration Protocol (DHCP)  provides configuration parameters to Internet hosts. DHCP consists of two components: a protocol for delivering host-specific configuration parameters from a DHCP server to a host and a mechanism for allocation of network addresses to hosts. DHCP is built on a client-server model, where designated DHCP server hosts allocate network addresses and deliver configuration parameters to dynamically configured hosts. In this project, you should implement a DCHP client and a DHCP server.


Figure : DHCP.

\includegraphics[height=2in, keepaspectratio]{fig-dhcp.eps}

Figure  gives a brief overview of the DHCP protocol. A host that does not have a static IP address assigned to it invokes the DHCP client. The client broadcasts a DHCP discover msg. A or multiple DHCP servers on the same network receive this message and broadcast a DCHP offer message. The message contains the IP address that is offered to the client by a server and further configuration parameters such as the IP address of a router. The client picks one of the offered IP addresses and broadcasts a DHCP request message to let the DHCP servers know of its choice. Finally, the DHCP server whose IP address got picked by the client confirms this choice with a DHCP ack packet.
Typically, a dynamic IP address is assigned a finite lease, allowing for serial reassignment of network addresses to different clients. If a lease expires, a client should renew its lease or get a new IP address. If a client no longer needs its address, it should issue a message back to the server to release it.
Both the DHCP client and DHCP server are user-level applications. Your DHCP server should be called dhcp_server and have the following interface:
dhcp_server --topology=FILE --config=FILE --default_lease=LENGTH --max_lease=LENGTH
The topology file contains the topology of your network. This file is identical to the one you need for starting up the simulator. You need to pass this file to read_config() (defined in $PDIR/include/rconfig.h). The configuration file lists each interface of the server that supports DHCP. Also, for each interface, it contains the IP address that should be handed out on that interface. An example configuration file is given below:
1 192.168.0.1
2 192.168.0.5
The fact that only one address can be handed out on an interface is due to a limitation of the simulator. Typically, a DHCP server connected to an Ethernet can hand out multiple IP addresses to different hosts on the interface to the Ethernet. However, the simulator does not provide Ethernet support. It supports only direct links between hosts. Therefore, there can be only one client host per interface that requests an address from the DHCP server.
The default lease argument gives the default lease time of addresses handed out to clients and the maximum lease argument their maximum length.
Your DHCP client should be called dhcp_client and have the following interface:
dhcp_client --lease_length=LENGTH --release_time=LENGTH
The lease length gives the suggested length of the lease. A server should return a shorter length if the suggested length is longer than the maximum lease length. The release time indicates after how many seconds a client should release its assigned IP address. If the release time is after the expiration time of a lease, the client needs to renew the lease before.
The DHCP protocol is specified in RFC 2131 [5]. DHCP options are specified in RFC 2132 [6]. Your protocol should support at least the DHCPDISCOVER, DHCPOFFER, DHCPREQUEST, DHCPACK, and DHCPRELEASE messages. Some more requirements/suggestions:
  • The simulator does not support hardware addresses. Therefore, the chaddr field in DHCP messages should always be zero and the DHCPDISCOVER and DHCPREQUEST messages should contain a client identifier option. The client identifier needs to be unique per client. We suggest that you use the node number of a client for this purpose. The function get_node_number() (defined in $PDIR/include/rconfig.h) returns this number.
  • Nodes in the simulator can receive only messages that are sent to their destination address or to the broadcast address 255.255.255.255. Therefore, a client should set the BROADCAST flag in DHCPDISCOVER and DHCPREQUEST messages.
  • Neither the server nor the client should probe the network before allocating an address and receiving an address, respectively.
  • A client can immediately accept an offered address and does not have to wait for other offers.
  • You do not need to handle reboots of clients/servers.
  • In DHCPOFFER and DHCPACK messages, the server should return a router option that is set to the IP address of the interface over which the server received the DHCP request. The client should use this address as default gateway for routing. Information about the default gateway of a node is available in the simulator handout.
  • The server should be able to handle DHCP requests from multiple interfaces. Note that you are not allowed to create new processes or threads.
  • The client and server should be able to deal with lost DHCP messages.
You can set the IP address of an interface using Setsockopt(). The socket must be a routing socket, the level is IPPROTO_IP, the option name IP_IF_SET, and the option value a pointer to struct if_info (defined in $PDIR/include/route.h).

Saturday, 25 April 2020


7 Layers Of The OSI Model


OSI Reference Model stands for Open system interconnection reference model which is used for communication in various networks.
The ISO (International organization for standardization) has developed this reference model for communication to be followed worldwide on a given set of a platform.

What Is OSI Model?

Open system interconnection (OSI) reference model consists of seven layers or seven steps which concludes the overall communication system.

Architecture Of The OSI Reference Model

seven layers of OSI Reference Model

elationship Between Each Layer

Let’s see how each layer in the OSI reference model communicates with one another with the help of the below diagram.
Relationsip between the layers of osi reference model
Enlisted below is the expansion of each Protocol unit exchanged between the layers:
  • APDU– Application protocol data unit.
  • PPDU– Presentation protocol data unit.
  • SPDU– Session protocol data unit.
  • TPDU– Transport protocol data unit (Segment).
  • Packet– Network layer host-router protocol.
  • Frame– Data-link layer host-router protocol.
  • Bits– Physical layer host-router protocol.

Roles & Protocols Used At Each Layer

7 layers

Features Of The OSI Model

The various features of the OSI Model are enlisted below:
  • Easy to understand the communication over wide networks through the OSI Reference Model architecture.
  • Helps to know the details, so that we can get a better understanding of the software and hardware working together.
  • Troubleshooting of faults is easier as the network is distributed in seven layers. Each layer has its own functionality, hence the diagnosis of the issue is easy and less time is taken.
  • Understanding new technologies generation by generation becomes easier and adaptable with the help of the OSI Model.

7 Layers Of The OSI Model

Before exploring the details about the functions of all 7 layers, the problem generally faced by first-timers is, How to memorize the hierarchy of the seven OSI Reference layers in sequence?
Here is the solution which I personally use to memorize it.
Try to remember it as A- PSTN- DP.
Starting from top to bottom A-PSTN-DP stands for Application-Presentation-Session-Transport-Network-Data-link-Physical.
Here are the 7 Layers of the OSI Model:

#1) Layer 1 – Physical layer

  • The physical layer is the first and bottom-most layer of the OSI Reference Model. It mainly provides the bitstream transmission.
  • It also characterizes the media type, connector type and signal type to be used for communication. Basically, the raw data in the form of bits i.e. 0’s & 1’s are converted into signals and exchanged over this layer. Data encapsulation is also done at this layer. The sender end and the receiving end should be in synchronization and the transmission rate in the form of bits per second is also decided at this layer.
  • It provides a transmission interface between the devices and the transmission media and the type of topology to be used for networking along with the type of transmission mode required for transmission is also defined at this level.
  • Usually, star, bus or ring topologies are used for networking and the modes used are half-duplex, full-duplex or simplex.
  • Examples of layer 1 devices include hubs, repeaters & Ethernet cable connectors. These are the basic devices that are used at the physical layer to transmit data through a given physical medium which is suitable as per the network need.
Physical layer

#2) Layer 2 – Data-link Layer

  • Data-link layer is the second layer from the bottom of the OSI Reference Model. The main function of the data-link layer is to perform error detection and combine the data bits into frames. It combines the raw data into bytes and bytes to frames and transmits the data packet to the network layer of the desired destination host. At the destination end, the data-link layer receives the signal, decodes it into frames and delivers it to the hardware.
Data-link Layer
  • MAC Address: Data-link layer supervises the physical addressing system called the MAC address for the networks and handles the access of the assorted network components to the physical medium.
  • A media access control address is a unique device address and each device or component in a network has a MAC address on the basis of which we can uniquely identify a device of the network. It is a 12 digit unique address.
  • Example of MAC address is 3C-95-09-9C-21-G1 (having 6 octets, where the first 3 represent the OUI, the next three represent the NIC). It can also be known as the physical address. The structure of a MAC address is decided by the IEEE organization as it is globally accepted by all firms.
The structure of MAC address representing the various fields and bit length can be seen below.
Variable length
  • Error Detection: Only error detection is done at this layer, not error correction. Error correction is done at the Transport layer.
  • Sometimes data signals encounter some unwanted signals known as error bits. In order to conquer with the errors, this layer performs error detection. Cyclic Redundancy check (CRC) and checksum are few efficient methods of error checking. We will discuss these in the transport layer functions.
  • Flow control & Multiple Access: Data which is sent in the form of a frame between the sender and a receiver over a transmission media at this layer, should transmit and receive at the same pace. When a frame is sent over a medium at a faster speed than the receiver’s working speed, then the data to be received at receiving node will be lost due to a mismatch in speed.
  • In order to overcome these type of issues, the layer performs flow control mechanism.
There are two types of flow control process:
Stop and Wait for flow control: In this mechanism, it pushes the sender after the data is transmitted to stop and wait from the receiver's end to get the acknowledgment of the frame received at the receiver end. The second data frame is sent over the medium, only after the first acknowledgment is received, and the process will go on.
Sliding window: In this process, both the sender and the receiver will decide the number of frames after which the acknowledgment should be exchanged. This process is time-saving as fewer resources are used in the flow control process.
  • This layer also provisions to provide access to multiple devices to transmit through the same media without collision by using CSMA/CD (carrier sense multiple access/collision detection) protocols.
  • Synchronization: Both the devices between which data sharing is taking place should be in synchronization with each other at both the ends so that data transfer can take place smoothly.
  • Layer-2 Switches: Layer-2 switches are the devices which forward the data to the next layer on the basis of the physical address (MAC address) of the machine. Firstly it gathers the MAC address of the device on the port on which the frame is to be received and later learns the destination of the MAC address from the address table and forwards the frame to the destination of the next layer. If the destination host address is not specified then it simply broadcasts the data frame to all the ports except the one from which it learned the address of the source.
  • Bridges: Bridges is the two port device which works on the data link layer and is used to connect two LAN networks. In addition to this, it behaves like a repeater with an additional function of filtering the unwanted data by learning the MAC address and forwards it further to the destination node. It is used for the connectivity of networks working on the same protocol.

#3) Layer 3 – Network Layer

The network layer is the third layer from the bottom. This layer has the accountability to accomplish the routing of data packets from the source to destination host between the inter and intra networks operating on the same or different protocols.
Apart from the technicalities, if we try to understand what it really does?
The answer is very simple that it finds out the easy, shortest, and time-efficient way out between the sender and the receiver to exchange data using routing protocols, switching, error detection and addressing techniques.
  • It performs the above task by using a logical network addressing and subnetting designs of the network. Irrespective of the two different networks working on the same or different protocol or different topologies the function of this layer is to route the packets from the source to destination by using the logical IP addressing and routers for communication.
Network Layer
  • IP Addressing: The IP address is a logical network address and is a 32-bit number which is globally unique for each network host. It principally consists of two parts i.e. network address & host address. It is generally denoted in a dotted-decimal format with four numbers split by dots. For Example, the dotted-decimal representation of the IP address is 192.168.1.1 which in binary will be 11000000.10101000.00000001.00000001, and is very hard to remember. Thus usually the first one is used. These eight bits sector are known as octets.
  • Routers work at this layer and are used for communication for inter and intra network-wide area networks (WAN’s). Routers who transmit the data packets between the networks do not know the exact destination address of the destination host for which the packet is routed, rather they only know the location of the network to which they belong to and use the information that is stored in the routing table to establish the path along which the packet is to be delivered to the destination. After the packet is delivered to the destination network, it then is delivered to the desired host of that particular network.
  • For the above series of procedure to be done the IP address has two parts. The first part of IP address is network address and the last part is the host address.
    • Example: For the IP address 192.168.1.1. The network address will be 192.168.1.0 and the host address will be 0.0.0.1.
Subnet Mask: The network address and the host address defined in the IP address is not solely efficient to determine that the destination host is of the same sub-network or remote network. The subnet mask is a 32-bit logical address that is used along with the IP address by the routers to determine the location of the destination host to route the packet data.
Example for combined usage of IP address & subnet mask is shown below:
Subnet mask
For the above Example, by using a subnet mask 255.255.255.0, we get to know that the network ID is 192.168.1.0 and the host address is 0.0.0.64. When a packet arrives from 192.168.1.0 subnet and has a destination address as 192.168.1.64, then the PC will receive it from the network and process it further to the next level.
Thus by using subnetting, the layer-3 will provide an inter-networking between the two different subnets as well.
The IP addressing is a connectionless service, thus the layer -3 provides a connectionless service. The data packets are sent over the medium without waiting for the recipient to send the acknowledgment. If the data packets which are big in size are received from the lower level to transmit, then it splits it into small packets and forwards it.
At the receiving end, it again reassembles them to the original size, thus becoming space efficient as a medium less load.

#4) Layer 4 – Transport Layer

transport layer
The fourth layer from the bottom is called the transport layer of the OSI Reference model.
(i) This layer guarantees an end to end error-free connection between the two different hosts or devices of networks. This is the first one which takes the data from the upper layer i.e. the application layer, and then splits it into smaller packets called the segments and dispenses it to the network layer for further delivery to the destination host.
It ensures that the data received at host end will be in the same order in which it was transmitted. It provides an end to end supply of the data segments of both inter and intra sub-networks. For an end to end communication over the networks, all devices are equipped with a Transport service access point (TSAP) and are also branded as port numbers.
A host will recognize its peer host at the remote network by its port number.
(ii) The two transport layer protocols include:
  • Transmission control protocol (TCP)
  • User Datagram Protocol (UDP)
TCP is a connection-oriented and reliable protocol. In this protocol, firstly the connection is established between the two hosts of the remote end, only then the data is sent over the network for communication. The receiver always sends an acknowledgment of the data received or not received by the sender once the first data packet is transmitted.
After receiving the acknowledgment from the receiver, the second data packet is sent over the medium. It also checks the order in which the data is to be received otherwise data is re-transmitted. This layer provides an error correction mechanism and flow control. It also supports client/server model for communication.
UDP is a connectionless and unreliable protocol. Once data is transmitted between two hosts, the receiver host doesn’t send any acknowledgment of receiving the data packets. Thus the sender will keep on sending data without waiting for an acknowledgment.
This makes it very easy to process any network requirement as no time is wasted in waiting for acknowledgment. The end host will be any machine like a computer, phone or tablet.
This type of protocol is widely used in video streaming, online games, video calls, voice over IP where when some data packets of video are lost then it doesn’t have much significance, and can be ignored as it doesn’t make much impact on the information it carries and doesn’t have much relevance.
(iii) Error Detection & Control: Error checking is provided in this layer because of the following two reasons:
Even if no errors are introduced when a segment is moving over a link, it can be possible for errors to be introduced when a segment is stored in the router’s memory (for queuing). The data link layer is not able to detect an error in this scenario.
There is no assurance that all the links between the source and destination will provide error scrutiny. One of the links may be using a link layer protocol which doesn’t offer the desired outcomes.
The methods used for error check and control are CRC (cyclic redundancy check) and checksum.
CRC: The concept of CRC (Cyclic Redundancy Check) grounds on the binary division of the data component, as the remainder of which (CRC) is appended to the data component and sent to the receiver. The recipient divides data component by an identical divisor.
If the remainder comes up to zero then the data component is allowed to pass to forward the protocol, else, it is assumed that the data unit has been distorted in transmission and the packet is discarded.
Checksum Generator & checker:  In this method, the sender uses the checksum generator mechanism in which initially the data component is split into equal segments of n bits. Then, all the segments are added together by employing 1’s complement.
Later, it complements once again, and now it turns into checksum and then is sent along with the data component.
Example: If 16 bits is to be sent to the receiver and bits are 10000010 00101011, then the checksum that will be transmitted to the receiver will be 10000010 00101011 01010000.
Upon receiving the data unit, the receiver divides it into n equal size segments. All the segments are added using 1’s complement. The result is complemented once more and If the result is zero, the data is accepted, else discarded.
This error detection & control method permits a receiver to rebuild the original data whenever it is found corrupted in transit.

#5) Layer 5 – Session Layer

This layer permits the users of different platforms to set up an active communication session between themselves.
The main function of this layer is to provide sync in the dialogue between the two distinctive applications. The synchronization is necessary for efficient delivery of data without any loss at the receiver end.
Let's understand this with the help of an Example.
Assume that a sender is sending a big data file of more than 2000 pages. This layer will add some checkpoints while sending the big data file. After sending a small sequence of 40 pages, it ensures the sequence & successful acknowledgment of data.
If verification is OK, it will keep repeating it further till the end otherwise it will re-synchronize and re-transmit.
This will help in keeping the data safe and the whole data host will never completely get lost if some crash happens. Also, token management, will not allow two networks of heavy data and of the same type to transmit at the same time.
Session layer

#6) Layer 6 – Presentation Layer

As suggested by the name itself, the presentation layer will present the data to its end users in the form in which it can easily be understood. Hence, this layer takes care of the syntax, as the mode of communication used by the sender and receiver may be different.
It plays the role of a translator so that the two systems come on the same platform for communication and will easily understand each other.
The data which is in the form of characters and numbers are split into bits before transmission by the layer. It translates the data for networks in the form in which they require it and for devices like phones, PC, etc in the format they require it.
The layer also performs data encryption at the sender's end and data decryption at the receiver's end.
It also performs data compression for multimedia data before transmitting, as the length of multimedia data is very big and much bandwidth will be required to transmit it over media, this data is compressed into small packets and at the receiver's end, it will be decompressed to get the original length of data in its own format.

#7) Top Layer – Application Layer

This is the topmost and seventh layer of the OSI reference model. This layer will communicate with the end users & user applications.
This layer grants a direct interface and access to the users with the network. The users can directly access the network at this layer. Few Examples of services provided by this layer include e-mail, sharing data files, FTP GUI based software like Netnumen, Filezilla (used for file sharing), telnet network devices etc.
There is vagueness in this layer as is not all user-based information and the software can be planted into this layer.
For Example, any designing software can’t be put directly at this layer while on the other hand when we access any application through a web browser, it can be planted at this layer as a web browser is using HTTP (hypertext transfer protocol) which is an application layer protocol.
Therefore irrespective of the software used, it is the protocol used by the software that is considered at this layer.
Software testing programs will work on this layer as the application layer provides an interface to its end users to test the services and their uses. The HTTP protocol is mostly used for testing at this layer but FTP, DNS, TELNET can also be used as per the requirement of the system and network in which they are operating.

Conclusion

From this tutorial, we learned about the functionalities, roles, inter-connection, and relationship between each layer of the OSI reference model.
The bottom four layers (from physical to transport) are used for data transmission between the networks and the top three layers (session, presentation & application) are for data transmission between hosts.


How to Setup and Configure TFTP Server


Installing TFTP Client

The next step would be to install the TFTP Client on the remote or local system. To install the TFTP client, do the following:
  1. Go to the Start Menu and open up the Control Panel.
  2. Navigate to Programs and features and then on the left-hand side, click ‘Turn Windows features on or off’.
  3. Scroll down and locate TFTP Client. Check the box
  4. Click OK to install the client.
  5. Wait for it to complete.
  6. Remember that this has to be on the system which isn’t running the server.

    Transferring Files using TFTP

    Finally, after installing the TFTP client and forwarding UDP port 69, you are ready to transfer files remotely or locally. To do this, make sure the server is running and then follow the given instructions:
    1. Press Windows Key + R to open Run.
    2. Type in ‘cmd’ to open up the command prompt.
    3. Before you transfer the files, make sure that the files that you want to send are in the Server Root Directory.
    4. Now, if you want to receive a file, you will have to use the GET parameter. In case you want to send a file, you will just have to use the PUT parameter. The command goes as follows:
      Tftp -i [server IP address] [GET or PUT] [path of file]
    5. An example would be the following:
      Tftp -i 192.168.10.8 put E:\hello.txt
    6. If you want to receive a file, then the command will go as follows:
      Tftp -i 192.168.10.8 get hello.txt




Router – BASIC HARDWARE CHECK – LAN/DHCP server issue
Below steps should be performed to check the LAN/DHCP server of a Router:
1.    Router should be connected to the power source and must be plugged in using the power adapter provided by Netgear

2.    Make sure the power adapter is properly plugged into a power source and the power button should be in the “ON” state

3.    Power LED must turn solid green/white depending upon the router’s model

4.    If power LED failed to turn solid green/white, try different power outlet. If the power LED doesn’t turn solid green/white after changing the power outlet, perform a hard reset (Router should be plugged into the power source while performing reset)

5.    If the issue persists, hard wire a laptop or desktop to the router and assign static IP in the range of the router (192.168.1.xx), subnet mask as 255.255.255.0 and gateway as 192.168.1.1

6.    Ping the default gateway 192.168.1.1 and see if there are ping responses received from the gateway IP address. If response is received from the gateway, configure the router by logging into the GUI
(Or)

If no response is obtained during the ping test, educate customer that router is defective

7.    If ping response was successful while pinging 192.168.1.1, but cannot access GUI, try performing TFTP firmware upgrade

8.    If TFTP firmware upgrade fails, perform it again after doing reset to the router

9.    If TFTP firmware upgrade fails again, educate customer that router is defective


LED status:

                         


Description of Light Status:

LED
 Description
 Power
• Solid amber. The router is starting.
• Blinking amber. The firmware is upgrading, or the Reset button was pressed.
• Solid white. The router is ready.
• Blinking white. The firmware is corrupted.
• Off. Power is not supplied to the router.
 Internet
• Solid white. The Internet connection is ready.
• Solid amber. The router has detected an Ethernet cable connection to the modem.
• Off. No Ethernet cable is connected between the router and the modem.
 2.4 GHz Wireless 
• Solid white. The 2.4 GHz WiFi radio is operating.
• Blinking. The router is sending or receiving WiFi traffic.
• Off. The 2.4 GHz WiFi radio is off.
 5 GHz WiFi1
• Solid white. The 5 GHz-1 WiFi radio is operating.
• Blinking. The router is sending or receiving WiFi traffic.
• Off. The 5 GHz-1 WiFi radio is off.
 5 GHz WiFi2
• Solid white. The 5 GHz-2 WiFi radio is operating.
• Blinking. The router is sending or receiving WiFi traffic.
• Off. The 5 GHz-2 WiFi radio is off.
 USB 2.0 and 3.0 port
The USB 1 LED is for the USB 3.0 USB port on the front panel. The USB 2 LED is for the USB 2.0 port on the rear panel.
• Solid white. A USB device is connected and is ready.
• Blinking. A USB device is plugged in and is trying to connect.
• Off. No USB device is connected or someone clicked the Safely Remove Hardware button, and it is now safe to remove the attached USB device.
 Ethernet ports 1-4
The LED color indicates the speed: white for Gigabit Ethernet connections and amber for 100 Mbps or 10 Mbps Ethernet connections.
• Solid. A powered-on device is connected to the Ethernet port.
• Blinking. The port is sending or receiving traffic.
• Off. No device is connected to this Ethernet port.
 WiFi On/Off button with LED
Pressing this button for two seconds turns the 2.4 GHz and 5 GHz WiFi radios on and off.
If this LED is lit, the WiFi radios are on. If this LED is off, the WiFi radios are turned off and you cannot use WiFi to connect to the router.
 WPS button with LED
This button lets you use WPS to join the WiFi network without typing the WiFi password. The WPS LED blinks white during this process and then lights solid white.




Experts needs to confirm the following on a call:

Power                                        – Should be light (Solid Green/White)
Internet                                      – Need to confirm if issue is based on WAN/internet connectivity
Wireless (2.4 & 5GHz – 1 & 2)        – Need to confirm only if issue is based on wireless connectivity
LAN (1 through 4 or 6)                  – Should be light (Solid Green/White)
WPS                                         – Need not confirm
USB                                          – Need not confirm

Router – BASIC HARDWARE CHECK – WLAN (Wireless issue)
Below steps should be performed to check the WLAN (Wireless) of a Router:
1.    Router should be connected to the power source and must be plugged in using the power adapter provided by Netgear

2.    Make sure the power adapter is properly plugged into a power source and the power button should be in the “ON” state

3.    Power LED must turn solid green/white depending upon the router’s model (If it fails, please refer to first article)

4.    WLAN (Wireless) LED must turn Green/Amber/White based on model of the router

5.    If it doesn’t turn on, hold the Wi-Fi button at the front/back (based on router’s model) for few seconds till you see the Wi-Fi LED/s turn on

6.    If it doesn’t turn on, access GUI of router and check if “Enable router radio” is checked

7.    If problem persist, check for firmware update for router if any followed by soft reset

Router – BASIC HARDWARE CHECK – WAN (Internet port issue)
Below steps should be performed to check the WAN (Internet port) of a Router:
1.    Router should be connected to the power source and must be plugged in using the power adapter provided by Netgear

2.    Make sure the power adapter is properly plugged into a power source and the power button should be in the “ON” state

3.    Power LED must turn solid green/white depending upon the router’s model (If it fails, please refer to first article)

4.    Make sure to connect the Ethernet cable from internet resource (Modem/Gateway/Wall – If it is an apartment) to the WAN port of the router

5.    WAN LED must turn Amber/Green/White based on model of the router

6.    If it doesn’t turn on, try different cable followed by loop back test (only if issue persist) by running cable between WAN to LAN port of router and check if WAN and appropriate LAN LED turns on

7.    If it doesn’t turn on, educate customer that the WAN port on router is defective

8.    If it turns on, disconnect cable from WAN to LAN and connect it between internet resource (Modem/Gateway/Wall – If it is an apartment) to the WAN port of the router

9.    Access GUI and run setup wizard to complete setup

10. If it throws error “No internet connection detected”, try to configure the router manually based on the settings of ISP/Modem

11. If internet LED remains OFF, perform network power cycle

12. If problem persist, upgrade firmware followed by reset

13. Try configuring internet connection again using wizard and educate customer that WAN port is defective if issue persist