Unit5 - Subjective Questions
CAP321 • Practice Questions with Detailed Answers
Explain the primary differences between wired and wireless network media. Provide standard examples of each.
Wired and wireless media serve as the communication channels in a computer network, but they differ significantly in their physical characteristics and performance:
Wired Media:
- Definition: Utilizes physical cables to transmit electrical or optical data signals between devices.
- Reliability & Speed: Generally offers higher bandwidth, lower latency, and is significantly less susceptible to external interference.
- Security: Highly secure, as physically tapping into the cable is usually required to intercept data.
- Mobility: Very low; devices must remain tethered to the network via cables.
- Examples: Coaxial cable, Unshielded Twisted Pair (UTP), Shielded Twisted Pair (STP), and Fiber-optic cable.
Wireless Media:
- Definition: Uses electromagnetic waves (such as radio or infrared frequencies) to transmit data through the air without physical constraints.
- Reliability & Speed: Prone to interference from physical obstacles, weather, and other electronic signals. Speeds are generally lower or less consistent than wired equivalents.
- Security: Inherently less secure; signals broadcast through the air can be easily intercepted if strong encryption is not implemented.
- Mobility: Extremely high, allowing users to move freely within the coverage area while maintaining a connection.
- Examples: Wi-Fi (IEEE 802.11), Bluetooth, Cellular networks (4G/5G), and Satellite links.
Discuss the primary advantages and disadvantages of deploying wireless media over wired media in a corporate network environment.
Deploying wireless media in a corporate environment involves weighing specific benefits against inherent drawbacks.
Advantages:
- Mobility and Flexibility: Employees can roam around the office with laptops or mobile devices while maintaining seamless network access, boosting productivity and collaboration.
- Ease of Installation: Eliminates the need to run extensive physical cabling through walls, ceilings, and under floors, significantly reducing installation time and physical labor.
- Scalability: Adding a new device to a wireless network is as simple as providing the credentials, whereas wired networks require available physical switch ports and cable runs.
- Cost-Effective in Hard-to-Reach Areas: Ideal for historic buildings or areas where laying cable is structurally impossible or prohibitively expensive.
Disadvantages:
- Security Vulnerabilities: Wireless signals bleed beyond physical building walls. Without robust encryption (like WPA3), unauthorized individuals can intercept data or breach the network from outside.
- Signal Interference and Attenuation: Wireless signals degrade when passing through thick walls, metal structures, or glass. They also suffer interference from other devices operating on similar frequencies (e.g., microwaves, cordless phones).
- Bandwidth Sharing: Wireless access points share total bandwidth among all connected devices. A dense corporate environment with many simultaneous users can experience severe network bottlenecks.
- Lower Reliability: Connections can drop unpredictably due to environmental changes, unlike stable wired connections.
Describe the distinct roles of standard physical network components: Hubs, Switches, and Routers. How do they handle network traffic differently?
Hubs, Switches, and Routers are fundamental hardware components that direct traffic, but they operate at different layers of the OSI model with increasing levels of intelligence.
1. Hub:
- Role: Acts as a central connection point for devices in a Local Area Network (LAN).
- Traffic Handling: Operates at OSI Layer 1 (Physical). It is a "dumb" device; when it receives a data packet on one port, it blindly broadcasts that packet to all other ports.
- Drawback: This broadcasting creates excessive network traffic, leading to data collisions, wasted bandwidth, and inherent security risks.
2. Switch:
- Role: Connects multiple devices on a single LAN, much like a hub, but with intelligent routing capabilities.
- Traffic Handling: Operates at OSI Layer 2 (Data Link). It learns and stores the Media Access Control (MAC) addresses of connected devices in a MAC table. When a data frame arrives, the switch reads the destination MAC address and forwards the data only to the specific port where the target device is located.
- Benefit: Greatly reduces collisions and improves overall network efficiency.
3. Router:
- Role: Connects multiple disparate networks together, such as connecting a home or corporate LAN to the wide area network (Internet).
- Traffic Handling: Operates at OSI Layer 3 (Network). It analyzes destination IP addresses of data packets and uses routing tables to determine the most efficient path to forward the packets across different networks.
- Benefit: Prevents local broadcast traffic from crossing over to other networks and provides a gateway between different network architectures.
What is a Network Interface Card (NIC)? Explain its function and significance in connecting a computer to a local area network.
A Network Interface Card (NIC) is a crucial hardware component (often a circuit board or chip) installed in a computer that allows it to connect to a network.
Function:
- Physical Connection: It provides the physical port (such as an RJ45 jack for Ethernet or an antenna for Wi-Fi) to connect the computer to the network medium.
- Data Conversion: It converts the digital data generated by the computer into electrical signals, optical pulses, or radio waves suitable for transmission over the network media, and vice versa.
- MAC Addressing: Every NIC comes with a unique, hardcoded physical address known as the Media Access Control (MAC) address. This address is used by switches on the local network to direct data frames specifically to that computer.
Significance:
Without a NIC, a computer lacks the hardware circuitry required to physically interface with network cables or wireless signals. It essentially acts as the middleman between the computer's internal bus and the external network, managing data flow, error checking at the physical level, and ensuring data is packaged correctly for the network.
Describe the physical structure of a coaxial cable. Mention its common historical and modern applications.
A coaxial cable is designed to transmit high-frequency signals with minimal loss. Its cross-section reveals four concentric layers:
- Center Conductor: A solid or stranded copper wire located at the very core. This is the element that actually carries the electromagnetic data signal.
- Dielectric Insulator: A thick layer of flexible plastic or Teflon surrounding the core. It ensures the distance between the center conductor and the outer shield remains constant, preventing electrical shorts.
- Metallic Shield: A woven copper braid or metallic foil that completely encases the insulator. This layer acts as a ground and protects the inner signal from external Electromagnetic Interference (EMI) and Radio Frequency Interference (RFI).
- Outer Jacket (Sheath): A durable PVC or Teflon coating on the outside that protects the internal layers from physical damage, moisture, and chemical exposure.
Applications:
- Historical: Extensively used in early legacy Ethernet networks (like 10Base5 "Thicknet" and 10Base2 "Thinnet").
- Modern: Primarily used for Cable Television (CATV) distribution, connecting broadband cable modems to ISPs, and linking radio transmitters/receivers to their antennas.
Compare Unshielded Twisted Pair (UTP) and Shielded Twisted Pair (STP) cables. Why is UTP generally more commonly used in LAN setups?
UTP and STP are both types of twisted-pair cables used in networking, but they differ in their construction regarding electromagnetic protection.
UTP (Unshielded Twisted Pair):
- Construction: Consists of color-coded copper wires twisted together in pairs. The twisting itself helps cancel out Electromagnetic Interference (EMI) from neighboring pairs (crosstalk).
- Shielding: Contains no internal foil or braided shielding.
- Cost & Flexibility: Highly cost-effective, lightweight, and very flexible, making it easy to pull through walls and conduits.
STP (Shielded Twisted Pair):
- Construction: Similar to UTP, but includes an extra layer of metallic foil or braided wire wrapping.
- Shielding: The shielding can wrap individual pairs, the entire bundle of wires, or both. This provides maximum protection against heavy external EMI and RFI.
- Cost & Flexibility: More expensive, thicker, heavier, and less flexible than UTP. It also requires proper grounding to be effective.
Why UTP is more common:
UTP is predominantly used in standard LANs (offices, homes) because the ambient EMI in these environments is generally low enough that the twisting of the wires provides sufficient interference cancellation. The lower cost, ease of termination, and physical flexibility make UTP much more practical unless the network is installed in a high-noise environment like an industrial factory floor.
Explain the physical construction of a fiber-optic cable and the scientific principle it relies on for data transmission. Outline its primary advantages.
Construction:
A typical fiber-optic cable consists of several critical layers:
- Core: The extremely thin, central strand of high-purity glass (or sometimes plastic) through which light pulses travel.
- Cladding: An optical layer wrapped around the core. It has a lower refractive index than the core.
- Buffer Coating: A plastic layer that protects the fragile glass from physical damage and moisture.
- Strengthening Fibers (Kevlar): Materials used to protect the core from crushing and excessive tension during installation.
- Outer Jacket: The final external protective casing.
Scientific Principle:
Fiber optics rely on the principle of Total Internal Reflection. Because the cladding has a lower refractive index than the core, light pulses injected into the core at shallow angles bounce off the boundary between the core and cladding. Instead of escaping, the light reflects continuously down the length of the cable.
Primary Advantages:
- Immunity to EMI: Since data is transmitted as light, not electricity, it is completely immune to electrical noise, lightning, and RFI.
- Massive Bandwidth: Capable of carrying exponentially more data than copper cables.
- Long-Distance Transmission: Experiences extremely low signal attenuation (loss), allowing data to travel dozens of kilometers without needing a repeater.
- Security: Extremely difficult to physically tap without breaking the connection, making it highly secure.
Outline the standard precautions and best practices required when physically installing fiber-optic cables to prevent signal loss and physical damage.
Installing fiber-optic cabling requires strict adherence to precautions because the internal glass core is delicate and highly susceptible to physical stress.
Best Practices and Precautions:
- Observe Bend Radius Limits: Never bend a fiber-optic cable beyond its specified minimum bend radius (typically 10 to 20 times the cable's diameter). Sharp bends cause "macrobending" losses where light escapes the core, or worse, physically snaps the glass.
- Monitor Pulling Tension: Use mechanical pullers carefully. Exceeding the maximum pulling tension can stretch the glass, leading to micro-fractures. Always pull from the strength members (like Kevlar), never the jacket or core.
- Avoid Crushing: Do not use tight zip ties, staples, or heavy weights to secure the cables, as localized pressure crushes the glass and disrupts light flow. Velcro ties are recommended.
- Maintain Extreme Cleanliness: Before splicing or connecting, fiber ends must be flawlessly cleaned using specialized alcohol wipes. A microscopic speck of dust or finger oil on the connector face can severely block or scatter the light signal.
- Eye Safety: Never look directly into the end of a live fiber cable. The high-intensity laser or LED light used for transmission is often in the infrared spectrum (invisible to the naked eye) and can cause severe retinal damage.
Describe the general guidelines and physical installation best practices for deploying Unshielded Twisted Pair (UTP) cables in a building's Local Area Network (LAN).
Proper installation of UTP cables is essential to ensure a reliable and fast local area network. Technicians must follow these general guidelines:
- Respect Distance Limitations: Ensure no single run of UTP cable (like Cat5e or Cat6) exceeds the standard maximum distance of 100 meters (328 feet) from the switch to the end device to prevent signal attenuation and late collisions.
- Avoid EMI Sources: Do not route UTP cables parallel to high-voltage electrical power lines. Keep them a safe distance away from fluorescent light fixtures, heavy electrical motors, microwaves, and elevator shafts, as UTP relies solely on wire twisting to fight electromagnetic interference.
- Manage Bend Radius and Tension: Do not bend UTP cables sharply (generally keep a bend radius of at least 4 times the cable diameter) to avoid untwisting the internal pairs or breaking the copper. Do not pull the cables with excessive force during installation.
- Leave Slack: Always leave a small amount of extra cable (service loop) at both the wall outlet end and the patch panel end to accommodate future re-terminations or equipment moves.
- Use Proper Support: Suspend cables in ceilings using J-hooks or cable trays. Do not allow them to rest directly on ceiling tiles or be tightly bundled with standard plastic zip ties; use hook-and-loop (Velcro) straps to avoid deforming the cable jacket.
What is an RJ45 connector? Provide a detailed, step-by-step guide on the process of "punching down" or crimping an RJ45 connector onto a UTP cable.
An RJ45 connector (Registered Jack 45) is an 8-pin physical connector universally used in Ethernet networking to terminate twisted-pair cables like Cat5e or Cat6.
Step-by-Step Crimping/Punching Guide:
- Preparation: Slide a strain-relief boot onto the cable. Use a wire stripper to carefully remove about 1.5 to 2 inches of the outer PVC cable jacket without nicking the internal wires.
- Untwist and Straighten: Separate the 4 twisted pairs and carefully untwist them. Straighten the individual wires completely by pulling them between your fingers to remove any kinks.
- Arrange the Color Code: Align the 8 wires side-by-side in the correct order based on the desired standard (e.g., T568B: White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown).
- Trim the Wires: Hold the wires tightly flat between your fingers and use flush cutters to snip them straight across, leaving exactly about 0.5 inches of exposed wire extending from the jacket.
- Insert into the Connector: Hold the empty RJ45 connector with the locking clip facing down. Push the arranged wires firmly into the connector. Ensure each wire slides into its respective track and reaches the very front wall of the plug. The outer cable jacket should extend slightly inside the connector to be gripped.
- Crimp: Insert the prepared plug into an RJ45 crimping tool. Squeeze the handles tightly. This action forces the gold-plated pins down into the copper wires to create an electrical connection and presses a plastic wedge into the jacket for strain relief.
- Test: Use a network cable tester to verify continuity, correct pinout mapping, and absence of shorts.
Mention the essential physical tools required for terminating (punching) an RJ45 connector, and briefly explain the mechanical function of an RJ45 crimping tool.
Essential Tools Required:
- Cable Stripper: A small tool with a blade set to a specific depth to cleanly cut the outer jacket of the UTP cable without damaging the inner twisted pairs.
- Wire Cutters / Flush Snips: Used to cut the untwisted wires cleanly and uniformly in a straight line before insertion into the connector.
- RJ45 Connectors: The physical clear plastic 8-pin plugs.
- RJ45 Crimping Tool: The main specialized mechanical hand tool used to secure the connector.
- Cable Tester: Used post-termination to verify the connection works correctly.
Mechanical Function of a Crimping Tool:
A crimping tool resembles a pair of heavy-duty pliers with specialized die heads. When you insert the un-crimped RJ45 connector (with wires inside) into the tool's slot and squeeze the handles, the tool performs two mechanical actions simultaneously:
- It pushes a set of precise metal teeth down against the gold contacts on the RJ45 connector, driving those contacts through the insulation of the 8 individual wires so they touch the bare copper.
- It depresses a plastic tab at the rear of the connector to securely pinch the outer cable jacket, ensuring that any physical tension on the cable does not pull the wires out of the pins.
Distinguish between a straight-through cable and a crossover cable. In what specific networking scenarios would you use each type?
Straight-through and crossover cables are two different ways to wire an Ethernet cable, designed to ensure that the Transmit (Tx) pins on one device connect to the Receive (Rx) pins on the other device.
Straight-Through Cable:
- Wiring Concept: Both ends of the cable are wired identically using the same standard (either T568A on both ends or T568B on both ends). Pin 1 on one side goes to Pin 1 on the other.
- Usage Scenario: Used to connect dissimilar networking devices. One device transmits on specific pins, and the other expects to receive on those exact pins.
- Examples: Connecting a Computer to a Switch; connecting a Switch to a Router.
Crossover Cable:
- Wiring Concept: The wiring sequence is crossed. One end is wired using the T568A standard, and the other end is wired using the T568B standard. This physically routes the Transmit pins of one end to the Receive pins of the other end.
- Usage Scenario: Used to connect similar networking devices directly to each other. Because both devices try to transmit on the exact same pins, the cable itself must cross the wires so transmissions hit the receiving circuits.
- Examples: Connecting a Computer directly to another Computer; connecting a Switch directly to another Switch (without using an uplink port).
Detail the specific color-coding sequences for both the T568A and T568B wiring standards from Pin 1 to Pin 8. Explain how these standards are applied to construct both straight-through and crossover cables.
T568A Color Code (Pin 1 to 8):
- White/Green
- Green
- White/Orange
- Blue
- White/Blue
- Orange
- White/Brown
- Brown
T568B Color Code (Pin 1 to 8):
- White/Orange
- Orange
- White/Green
- Blue
- White/Blue
- Green
- White/Brown
- Brown
Notice that between the two standards, the Green and Orange pairs are swapped (Pins 1/2 swap with Pins 3/6).
Application of Standards:
- Straight-Through Cable Construction: To build a straight-through cable, a technician must choose one of the standards and apply it to both ends of the cable. For example, if End A is wired as T568B, End B must also be wired exactly as T568B.
- Crossover Cable Construction: To build a crossover cable, the technician applies different standards to the ends. End A must be wired according to T568A, and End B must be wired according to T568B. This physical mismatch automatically crosses the transmit (Tx) pins to the receive (Rx) pins.
Define the concept of network topology. Describe the physical Star and Ring topologies, highlighting their respective advantages and disadvantages.
Network Topology refers to the physical or logical layout of a network. It dictates how different nodes (computers, printers, routers) are connected to each other and how they communicate.
1. Star Topology:
- Description: All network nodes are connected individually to a central hub or switch. Data passes through this central device before reaching its destination.
- Advantages:
- Highly reliable from a node perspective: if one cable fails, only the node connected to it is isolated; the rest of the network functions normally.
- Easy to troubleshoot, manage, and scale by simply plugging new devices into the central switch.
- Disadvantages:
- Requires a significant amount of cabling.
- Has a Single Point of Failure: if the central switch goes down, the entire network collapses.
2. Ring Topology:
- Description: Nodes are connected in a closed-loop configuration. Each device is connected to exactly two other devices. Data travels in one direction (unidirectional) from node to node until it reaches its destination.
- Advantages:
- Handles high volumes of traffic better than a bus topology, as data flows systematically (often using token passing, preventing data collisions).
- Equal access for all computers; no central server is strictly needed to control connectivity.
- Disadvantages:
- Highly vulnerable: in a standard ring, if one cable breaks or one node fails, the entire ring breaks, halting all network traffic.
- Adding or removing devices requires briefly shutting down the network.
Explain the Mesh network topology. Differentiate between a full mesh and a partial mesh. Derive the mathematical formula to calculate the number of physical links required in a full mesh network.
Mesh Topology:
A mesh topology is a network setup where each computer and network device is directly interconnected with others. This web-like structure is designed for high routing efficiency and extreme fault tolerance. Data can take multiple paths to reach its destination.
Types of Mesh:
- Full Mesh: Every single node in the network is directly connected to every other node. It offers unparalleled redundancy (if one link fails, traffic simply takes another direct path) but is highly expensive and complex to wire as the network grows.
- Partial Mesh: Some central or critical nodes are connected to all others, but peripheral nodes are only connected to one or two other nodes. It strikes a balance between cost, complexity, and redundancy.
Mathematical Formula for Full Mesh Links:
To connect every node to every other node without duplicating connections, the number of required physical links () depends on the number of nodes ().
- The first node connects to nodes.
- The second node connects to the remaining nodes (since it's already connected to the first).
- This forms an arithmetic progression:
- The sum of this progression gives the formula for the total number of links:
For example, a full mesh network consisting of 6 computers would require separate cables.
What is a Bus topology? Discuss the reasons why this topology is rarely used in modern computer networks despite its simplicity.
Bus Topology:
In a bus topology, all devices (nodes) on the network are connected to a single, continuous central cable, known as the "bus" or "backbone." Data transmitted by any device travels along the bus in both directions to all other nodes. Terminators are required at both ends of the cable to absorb the signal and prevent it from bouncing back.
Why it is rarely used today:
Despite being cheap and easy to set up for very small networks, it has severe limitations:
- Single Point of Failure: If the main backbone cable is cut or breaks anywhere along its length, the entire network goes down because the electrical circuit is broken and signals will bounce.
- High Collisions: Because all devices share the exact same physical medium, if two computers transmit at the same time, a data collision occurs. This heavily degrades performance as the network grows.
- Troubleshooting Difficulty: If the network goes down, identifying exactly where the cable fault lies is extremely difficult without specialized tools.
- Security Risks: Since all data travels across the single bus, every computer sees every transmission, making eavesdropping trivially easy.
Describe Client-Server and Peer-to-Peer (P2P) network architectures. How do they differ primarily in terms of resource management and network security?
Network architecture defines how resources and services are structured and accessed among network computers.
Client-Server Architecture:
- Description: The network consists of centralized, powerful computers (Servers) that store data, manage printers, and host applications, and less powerful computers (Clients) that request these services.
- Resource Management: Highly centralized. The server controls who has access to which files or resources. Backups and software updates are easily managed centrally on the server.
- Security: High and centralized. User accounts, passwords, and file permissions are controlled centrally by the server administrator.
Peer-to-Peer (P2P) Architecture:
- Description: All computers (nodes) on the network have equal status. There is no central server. Each computer functions as both a client and a server, directly sharing files or peripherals with others.
- Resource Management: Decentralized. Every user manages their own resources. If a user turns off their computer, any files shared from that computer become unavailable to the rest of the network. Backups must be done individually on each machine.
- Security: Low and decentralized. Each user sets up their own security and passwords. It is very difficult to enforce consistent security policies across the network.
Summary: Client-Server is ideal for large, secure enterprise environments, while P2P is suited for very small, low-budget home or office setups with minimal security requirements.
List common physical layer network issues. How would a network technician use a Cable Tester to troubleshoot a faulty connection?
Common Physical Layer Issues:
Network outages are frequently traced back to OSI Layer 1 (Physical) problems, which include:
- Broken or Severed Cables: Physical damage to the copper wires or fiber strands inside the jacket.
- Improper Terminations: Poorly punched down RJ45 connectors where pins don't make contact with the wires, or incorrect wiring (crossed wires).
- Electromagnetic Interference (EMI): Cables routed too closely to power lines or machinery causing signal corruption.
- Distance Limitations: Cable runs exceeding the maximum standard distance (e.g., UTP > 100 meters) resulting in severe signal attenuation.
Using a Cable Tester:
When a workstation cannot access the network, a technician will use a basic cable tester to check the physical link.
- They disconnect the Ethernet cable from the PC and the Switch.
- They plug one end of the cable into the tester's "Main" unit and the other end into the "Remote" unit.
- Upon turning the tester on, it sends electrical pulses down each of the 8 pins in sequence.
- The LED lights on both the main and remote units should light up sequentially (1 through 8).
- If a light skips, it indicates an "open" (broken wire). If lights flash out of order, it indicates crossed wires (improper termination). This confirms the cable must be repaired or replaced.
Explain the functions of the basic command-line troubleshooting tools ping and tracert (traceroute). Provide examples of how they are used to diagnose network connectivity issues.
Both ping and tracert are built-in operating system command-line utilities that use the ICMP (Internet Control Message Protocol) to diagnose network issues.
1. Ping (Packet Internet Groper):
- Function: Tests basic reachability and measures the round-trip time between a source computer and a destination IP address or domain name.
- How it works: It sends ICMP Echo Request packets to the target. If the target is online and reachable, it responds with ICMP Echo Reply packets.
- Troubleshooting Use: By typing
ping 8.8.8.8orping google.com, a technician can immediately see if their computer has internet access. If the request times out, there is a connection break. High latency (e.g., >200ms) or dropped packets indicate network congestion or a faulty link.
2. Tracert / Traceroute:
- Function: Maps the exact routing path that data packets take from the source computer to the final destination, displaying every router (hop) along the way.
- How it works: It sends packets with progressively increasing Time-To-Live (TTL) values. Each router decreases the TTL. When TTL hits zero, the router sends back a "Time Exceeded" message, revealing its IP address.
- Troubleshooting Use: By typing
tracert google.com, the technician can pinpoint exactly where a connection is failing. If the trace successfully hops through the local router (e.g.,192.168.1.1) but fails at an ISP router, the technician knows the local network is fine, and the fault lies with the Internet Service Provider.
Discuss the step-by-step troubleshooting methodology a technician should employ when a single client computer cannot access the local network, but all other computers function normally.
When isolated to a single computer, the issue is typically local to that machine or its immediate physical connection. A logical, bottom-to-top OSI model troubleshooting approach should be used:
Step 1: Check the Physical Connection (OSI Layer 1)
- Inspect the Ethernet cable plugged into the PC's Network Interface Card (NIC). Are the link lights on the NIC glowing/blinking?
- Ensure the cable is firmly seated in the wall jack or switch port.
- Swap the Ethernet cable with a known working one to rule out a broken cable.
Step 2: Check the Network Adapter Status (OSI Layer 2)
- Open the OS network settings. Is the NIC enabled? (Sometimes users accidentally disable the adapter in Windows or flip a Wi-Fi switch on a laptop).
- Check Device Manager for any driver warnings (yellow exclamation marks) next to the Network Adapter. Reinstall drivers if necessary.
Step 3: Check IP Configuration (OSI Layer 3)
- Open the command prompt and run
ipconfig(Windows) orifconfig(Linux/Mac). - Look at the IPv4 address. If it shows an APIPA address (starting with
169.254.x.x), the computer is failing to reach the DHCP server to get a valid IP address. - Try releasing and renewing the IP address using
ipconfig /releasefollowed byipconfig /renew. - Ensure a static IP address hasn't been accidentally configured that conflicts with another device or is outside the correct subnet.
Step 4: Ping Tests
- Ping 127.0.0.1 (Loopback): Tests if the local TCP/IP stack is functioning.
- Ping Local IP: Tests the NIC.
- Ping Default Gateway (Router): Tests the connection to the local network hub/switch/router.
- If the gateway responds, but external websites do not, check DNS settings.