experiment no

39
EXPERIMENT NO.1 AIM: To familiarize with the various basic tools (crimping, krone, etc.) used in establishing a LAN. CRIMPING TOOL: Crimping is joining two pieces of metal or other malleable material by deforming one or both of them to hold the other. The bend or deformity is called the crimp. Uses: A crimping tool is a tool designed to crimp or connect a connector to the end of a cable. For example, network cables and phone cables are created using a crimping tool to connect the RJ- 45 and RJ-11 connectors to the end of the cable. Crimping is most extensively used in metalworking . Crimping is commonly used to join bullets to their cartridge cases , and for rapid but lasting electrical connectors . Because it can be a cold-working technique, crimping can also be used to form a strong bond between the work piece and a non-metallic component. Sometimes, a similar deformity created for reasons other than forming a join may also be called a crimp.

Upload: swati-sharma

Post on 24-Aug-2014

520 views

Category:

Documents


17 download

TRANSCRIPT

Page 1: Experiment No

EXPERIMENT NO.1

AIM:To familiarize with the various basic tools (crimping, krone, etc.) used in establishing a LAN.

CRIMPING TOOL:Crimping is joining two pieces of metal or other malleable material by deforming one or both of them to hold the other. The bend or deformity is called the crimp.

Uses:A crimping tool is a tool designed to crimp or connect a connector to the end of a cable. For example, network cables and phone cables are created using a crimping tool to connect the RJ-45 and RJ-11 connectors to the end of the cable.

Crimping is most extensively used in metalworking. Crimping is commonly used to join bullets to their cartridge cases, and for rapid but lasting electrical connectors. Because it can be a cold-working technique, crimping can also be used to form a strong bond between the work piece and a non-metallic component. Sometimes, a similar deformity created for reasons other than forming a join may also be called a crimp.

The Crimping Tool for RJ45/RJ12/RJ11 Modular Connectors is made from very high quality of tool steel which ensures high durability at its user end. This Crimping Tool for RJ45/RJ12/RJ11 Modular Connectors is in high demand in the market. Different sizes and designs are easily available in the market. Crimping Tool for RJ45/RJ12/RJ11 Modular Connectors is available at industrial leading prices. This crimping tool for RJ45/12/11 modular connector is with high standard. The driving part is made of high quality tool steel, 40 Crtool bit and 45 steel with quenching procesing.Plactic parts are injected and molded of inflaming fetarding PC,

Page 2: Experiment No

suitable for the site construction of the engineering of various weak electric wiring system full functions good practicality adaptable to fit with the operation with different plugs, blocks, modules and distnbution frames of clamping, cutting, shearing and crimping.

How to use crimping tool:

Use the cable stripper to remove two-inches of the outer jacket from the end of the cable.

Untwist and separate the individual conductors.

Arrange the conductors in the desired order.

Trim the ends of the wire evenly to within 1/2-inch of the outer jacket with electrician's scissors.

Insert the conductors into the RJ45 plug. Push the wires into the jack until they reach the end of the slots in the plug. When you are finished, the outer jacket of the cable should at least 1/4-inch inside the opening of the plug.

Insert the RJ45 plug into the die (opening) of the crimping tool. The die is shaped like a jack so it will only fit in the correct position.

Squeeze the handles of the crimping tool together firmly.

Release the handles of the crimping tool and remove the jack.

KRONE TOOL:A punch down tool, also called a punchdown tool or a krone tool (named after the KRONE LSA-PLUS connector), is a small hand tool used by telecommunication and network technicians. It is used for inserting wire into insulation-displacement connectors on punch down blocks, patch panels, keystone modules, and surface mount boxes .

Page 3: Experiment No

Most punch down tools is of the impact type, consisting of a handle, an internal spring mechanism, and a removable slotted blade. To use the punch down tool, a wire is pre-positioned into a slotted post, and then the punch down tool is pressed down on top of the wire, over the post. Once the required pressure is reached, the internal spring is triggered, and the blade pushes the wire into the slot, cutting the insulation, and securing the wire. For light-duty use, there are also less expensive punch down tools with fixed blades and no impact mechanism.

To accommodate different connector types, 66, 110, BIX and krone require different blades. Removable blades for 66 or 110 are often double-ended, with one end that only inserts the wire for daisy-chain wiring from post to post, and another end that inserts wire and trims the excess length for termination at a post.[3] The trimming blade cutting edge works against the plastic insulating post. Krone blades require a separate scissor-like mechanism for trimming the wire.

EXPERIMENT NO. 2

Page 4: Experiment No

AIM:To study various topologies for establishing various computer networks.

NETWORK TOPOLOGY:Network topology is the layout pattern of interconnections of the various elements (links, nodes, etc.) of a biological network. Topology can be understood as the shape or structure of a network. This shape does not necessarily correspond to the actual physical design of the devices on the computer network. The computers on a home network can be arranged in a circle but it does not

necessarily mean that it represents a ring topology.

Any particular network topology is determined only by the graphical mapping of the configuration of physical and/or logical connections between nodes. The study of network topology uses graph theory. Distances between nodes, physical interconnections, transmission rates, and/or signal types may differ in two networks and yet their topologies may be identical.

A local area network (LAN) is one example of a network that exhibits both a physical topology and a logical topology. Any given node in the LAN has one or more links to one or more nodes in the network and the mapping of these links and nodes in a graph results in a geometric shape that may be used to describe the physical topology of the network. Likewise, the mapping of the data flow between the nodes in the network determines the logical topology of the network. The physical and logical topologies may or may not be identical in any particular network.

Topology classification:There are two basic categories of network topologies:

Physical topologies Logical topologies

Page 5: Experiment No

Physical topology: The physical topology refers to the physical design of a network including the devices, location and cable installation the shape of the cabling layout used to link devices is called the physical topology of the network. This refers to the layout of cabling, the locations of nodes, and the interconnections between the nodes and the cabling. The physical topology of a network is determined by the capabilities of the network access devices and media, the level of control or fault tolerance desired, and the cost associated with cabling or telecommunications circuits. It relates to the core network.

Logical topology: Logical topology refers to how data is actually transferred in a network as opposed to its physical design. The logical topology, in contrast, is the way that the signals act on the network media, or the way that the data passes through the network from one device to the next without regard to the physical interconnection of the devices. A network's logical topology is not necessarily the same as its physical topology. For example, the original twisted pair Ethernet using repeater was a logical bus topology with a physical star topology layout. Token Ring is a logical ring topology, but is wired a physical star from the Unit. It relates to the basic network.

The logical classification of network topologies generally follows the same classifications as those in the physical classifications of network topologies but describes the path that the data takes between nodes being used as opposed to the actual physical connections between nodes. The logical topologies are generally determined by network protocols as opposed to being determined by the physical layout of cables, wires, and network devices or by the flow of the electrical signals, although in many cases the paths that the electrical signals take between nodes may closely match the logical flow of data, hence the convention of using the terms logical topology and signal topology interchangeably.

Logical topologies are often closely associated with Media Access Control methods and protocols. Logical topologies are able to be dynamically reconfigured by special types of equipment such as routers and switches.

The study of network topology recognizes seven basic topologies: Point-to-point Bus Star Ring Mesh Tree Hybrid Daisy chain.

POINT TO POINT TOPOLOGY:The simplest topology is a permanent link between two endpoints. Switched point-to-point topologies are the basic model of conventional telephony. The value of a permanent point-to-point network is unimpeded communications between the two endpoints. The value of an on-

Page 6: Experiment No

demand point-to-point connection is proportional to the number of potential pairs of subscribers, and has been expressed as Metcalfe's Law.

.BUS TOPOLOGY:It is also known as Horizontal topology. This arrangement is quite popular in Local Area Network (LAN).It is a point to multipoint topology.’ A bus topology consists of a single central cable to which all computers and other devices connect. A bus topology is ‘also known as a bus network. A bus refers to the main physical pathway or central cable where all other devices are connected to it. Like a major motor highway, all traffic flow will be affected if this main “road” is broken. One long cable acts as a ‘backbone’ to link all the devices in the network.Nodes are connected to bus by taps and drop lines. A drop line is a connection between device and the main bus cable. A tap is a connector that either punctures the sheathing of a cable to create a contact with the metallic core or splice into the main cable to create a contact with core. As a signal travels along the backbone some energy loss takes place and signal becomes weaker and weaker farther it has to travel. Therefore, these are a limit on the number of taps a bus can support and on the distance between those taps.

A network terminator is required at both the ends of the bus to avoid any reflection of signal from the open end, which may lead to wrong signal on the bus.It is relatively simple to control traffic flow between DTE’s because the bus permits all stations to receive every transmission .That is a single station “broadcasts” to multiple stations. As a single bus is connecting all the DTE’s any problem on the bus and stop functioning of the entire Network. To avoid such situations many vendors provides by pass switches around every DTE.ADVANTAGES OF BUS TOPOLOGY:

Easy implementation. New devices can be added to the backbone or to the existing nodes. Failure of a node doesn't affect the entire LAN. No disruptions to the network when connecting or removing devices. Network can easily be extended, by adding new devices to the backbone or existing

nodes.

Page 7: Experiment No

Cost of Network is very low as single bus is required to connect all DTE’s. It is useful when broadcasting is often required on the Network.

DISADVANTAGES OF BUS TOPOLOGY : If the backbone fails, the entire bus network will be affected. Network speed decreases when the number of nodes increases. Troubleshooting is difficult when one of the nodes fails. There is no security /control on the flow of data, as information transmitted is available to

each DTE.

RING TOPOLOGY:The ring topology is named so because of the circular aspect of the data flow. A ring topology consists of all computers and other devices that are connected in a loop. Ring topology is also known as a ring network. A ring network can be found in Local Area Networks. In a ring network each node directly connects to two neighboring nodes. A server may exist in a ring network, but it will not connect to all the nodes in the network. The server, like other nodes, will only communicate to its two neighboring nodes.

In most instance data flow in one direction only with one single station receiving the signal and relaying it to the next station on the ring. It is useful as no bottle neck takes place in it.In a ring topology each device has a dedicated ‘point to point’ channel configuration, only with the two devices on either side of it. A signal is passed along the ring through token in one direction, from device to device until it reaches its destination.

Page 8: Experiment No

Token is a special sequence of bits, which is used for carrying data from one station to another in the ring. Each device in the ring incorporates a repeater. When a device receives a signal into for another device, its repeater regenerates the end passes them further.DEPENDENCE OF A RING TOPOLOGY : If one of the nodes fails, the network will fail to function. ADVANTAGES OF A RING TOPOLOGY :

Troubleshooting is easy when one of the nodes fails. Repair or remove the failing nodes and the network will continue to function. A ring is relatively easy to install and reconfigure. As each device is directly linked to its

immediate neighbor only. To add or delete a device requires moving only two connectors.

The amount of cabling involved in a ring topology is less in comparison to star, tree and mesh topology and comparable with bus topology.

ASM ring topology data flow is unidirectional it is suitable for using optical fiber as a medium of transmission in ring topology.

DISADVANTAGES OF A RING TOPOLOGY : Implementation is difficult. Network administrator has to terminate the entire network to

install a new node between existing nodes. A failing node will affect the entire LAN. Connecting or removing devices is difficult because network administrator needs to

terminate the network in order to do it. Network speed decreases when the number of nodes increases. Network reconfiguration is going on it makes down the entire network. As it is not

possible to shut down a small section of the ring while keeping the majority of it working normally.

Difficult to diagnose faults: The fact that failure of one node will affect all other nodes has serious implication for fault diagnosis. It may be required to examine a series of adjacent nodes to determine the faulty one.

Page 9: Experiment No

STAR TOPOLOGY: In the early days of computer networking, all computers were connected to a centralized mainframe computer. All resources and management of information were centered in this main computer. The idea of a centralized mainframe computer is where the basic concept of a star topology comes from. A star topology consists of a central host which acts as the centre, and all nodes connect to the host. A star topology is also known as star network.

In a star topology the devices are not directly linked to each other, each device has a dedicated point to point link only to a central Hub or primary station .The primary acts as an exchange and any two devices in star network can communicate through this primary only. A star network is found in a Local Area Network setting. A star network must have a host which acts as the centre. The host can be a server, hub or router. In a star network, every node will not connect to the neighboring nodes. Every node must connect to the host in order to communicate. The host will control the flow of communication in the network. All traffic emanates from hub of the star the central site, which is typically a computer, to control the communication of all other DTEs attached to it .Site is responsible for routing traffic to the other DTEs, it is responsible for fault isolation as well.

DEPENDENCE OF A STAR TOPOLOGY:If one of the nodes fails, the star network can still function as long as the host is working. If the host fails, the network will fail to function.ADVANTAGES OF STAR TOPOLOGY:

It is easy to implement. You only add nodes to the host. The failure of a node does not affect the entire LAN. There are no disruptions to the network when connecting or removing devices. The network can be extended by adding new devices to the host or nodes. Troubleshooting is easy when the host fails. Simply repair or replace the host and the

network will continue to function. Star topology is useful when a centralized control is required.

Page 10: Experiment No

DISADVANTAGES OF STAR TOPOLOGY: If the host fails, the entire LAN will be affected. Network speed decreases when the number of nodes increases. Troubleshooting is difficult when one of the nodes fails. A host must be installed to control the network. Cost of Network is high as point to point connection from each device to central site is

required.

TREE TOPOLOGY:It is also known as hierarchical Topology. The software to control the network is relatively simple and the topology provides a concentration point for control and error detection. The DTE at the root of the tree acts as primary for the Network.

The word tree is appropriate because the Networks often resembles with a inverted tree with branches emanating from the root of the tree and then branches are further divided into subbranches.Traffic flow among DTE’s initiated by DTEs; A distributed aspect is implemented for tree Network by providing methods for subordinates DTEs to directly control the DET’s below them in the hierarchy. This reduces the workload of the central host at site.

ADVANTAGES OF TREE TOPOLOGY: Addition of a New DTE is very easy. More Layers of control and security for Data flow is possible as traffic is controlled at

Page 11: Experiment No

every node. Failure of any DTE will impact on that branch only and not on rest of the DTE’s which

are not in that branch. Fault diagnosis and removal is easy because of hierarchical structure.DISADVANTAGES OF TREE TOPOLOGY: It presents significant bottle-neck problem. (Though in comparison to star Network

chances are less as traffic load is distributed at subordinate DTE’s at different branch nodes).

As number of controlling station’s have increased (at each branch node, DTE works as controlling DTE for DTE’s below it), cost of Network is high.

As between any two DTE in tree Network there exists a single path, if any link failure occurs there is no alternate path available.

If root DTE fails then entire Network will not function properly if this DTE is not fully backed up by another computer.

MESH TOPOLOGY:When every device has a dedicated point to point link to every other device, it is known as mesh topology. The term dedicated means that the link carries traffic only between the two devices it connects. To find the number of physical links in a fully connected mesh network with n nodes, we first consider that each node must be connected to every other node.Node1 must be connected to n-1 nodes, node 2 must be connected to n-1 nodes, and finally node n must be connected to n-1 nodes. We need n (n-1) physical links .However .if each physical link allows communication in both directions, we can divide the number of links by 2.In other words, and we can say need n (n-1) /2 duplex mode links.

To accommodate that many links, every device on the network must have n-1 input/output ports to be connected to the other n-1 stations.TYPES OF MESH TOPOLOGY:

Fully connected :

Page 12: Experiment No

The number of connections in a full mesh = n (n - 1) / 2. The physical fully connected mesh topology is generally too costly and complex for practical networks, although the topology is used when there are only a small number of nodes to be interconnected.

Partially connected: The type of network topology in which some of the nodes of the network are connected to more than one other node in the network with a point-to-point link – this makes it possible to take advantage of some of the redundancy that is provided by a physical fully connected mesh topology without the expense and complexity required for a connection between every node in the network.

In most practical networks that are based upon the partially connected mesh topology, all of the data that is transmitted between nodes in the network takes the shortest path between nodes, except in the case of a failure or break in one of the links, in which case the data takes an alternative path to the destination. This requires that the nodes of the network possess some type of logical 'routing' algorithm to determine the correct path to use at any particular time.ADVANTAGES OF MESH TOPOLOGY: The use of dedicated links assures that each connection can carry its own data load that

means no bottleneck problem. As every message travels on a dedicated line, only the intended recipient can receives it. If one link fails the data can be transmitted through alternate path.

Page 13: Experiment No

Fault identification and fault isolation is easy due to ‘point to point link’. Traffic can be routed through other paths to avoid links with suspected problems.

DISADVANTAGES OF MESH TOPOLOGY: Cost of Network is very high, as every device is to be connected to every other device

amount of cabling and number of I/O ports required very high which in turn leads to high cost.

As every device is to be connected to every other device installation and reconfiguration are difficult.

Bulk of wire requires large space to accommodate it. Bulk of wires and large number of ports lead to complexity in fault diagnosis.

HYBRID TOPOLOGY:Hybrid networks use a combination of any two or more topologies in such a way that the resulting network does not exhibit one of the standard topologies (e.g., bus, star, ring, etc.). For example, a tree network connected to a tree network is still a tree network topology. A hybrid topology is always produced when two different basic network topologies are connected. Two common examples for Hybrid network are: star ring network and star bus network A Star ring network consists of two or more star topologies connected using a

multistation access unit (MAU) as a centralized hub. A Star Bus network consists of two or more star topologies connected using a bus trunk

(the bus trunk serves as the network's backbone).

While grid networks have found popularity in high-performance computing applications, some systems have used genetic algorithms to design custom networks that have the fewest possible hops in between different nodes. Some of the resulting layouts are nearly incomprehensible, although they function quite well.

DAISY CHAIN TOPOLOGY:Except for star-based networks, the easiest way to add more computers into a network is by

Page 14: Experiment No

daisy-chaining, or connecting each computer in series to the next. If a message is intended for a computer partway down the line, each system bounces it along in sequence until it reaches the destination. A daisy-chained network can take two basic forms: linear and ring.

A linear topology puts a two-way link between one computer and the next. However, this was expensive in the early days of computing, since each computer (except for the ones at each end) required two receivers and two transmitters.

By connecting the computers at each end, a ring topology can be formed. An advantage of the ring is that the number of transmitters and receivers can be cut in half, since a message will eventually loop all of the way around. When a node sends a message, the message is processed by each computer in the ring. If a computer is not the destination node, it will pass the message to the next node, until the message arrives at its destination. If the message is not accepted by any node on the network, it will travel around the entire ring and return to the sender. This potentially results in a doubling of travel time for data.

EXPERIMENT NO.3

AIM:To familiarize with switch, hub, connectors, cables (cabling standards) used in networks.

SWITCH:

Page 15: Experiment No

A switch is a multi-port bridge, meaning that it is an active element working on layer 2 of the OSI model. The switch analyses the frames coming in on its entry ports and filters the data in order to focus solely on the right ports (this is called switching and is used in switched networks). As a result, the switch can act as both a port when filtering and as a hub when handling connections. A switch can be considered a 'smart' hub.  It will actively look at the traffic it receives and based on the destination address it will direct that traffic only to the port needed.  The switch listens to each port at the same time without any interference.  A computer plugged directly into the switch will not receive unnecessary traffic and can transmit to the switch whenever it needs to; this leaves all the bandwidth available to each machine.The switch memorizes the MAC address of each host and which port it resides on.  This is how it can intelligently direct traffic.

A network switch or switching hub is a computer networking device that connects segments. The first Ethernet switch was introduced by Kalpana in 1990.

Network switch. Back view of Atlantis network switch with

Ethernet ports.

Function:The network switch plays an integral part in most modern Ethernet local area networks (LANs). Mid-to-large sized LANs contain a number of linked managed switches. Small office/home office (SOHO) applications typically use a single switch, or an all-purpose converged device such as a gateway to access small office/home broadband services such as DSL or cable internet. In most of these cases, the end-user device contains a router and components that interface to the particular

Page 16: Experiment No

An Ethernet switch operates at the data link layer of the OSI model to create a separate collision domain for each switch port. With 4 computers (e.g., A, B, C, and D) on 4 switch ports, A and B can transfer data back and forth, while C and D also do so simultaneously, and the two conversations will not interfere with one another. In the case of a hub, they would all share the bandwidth and run in half duplex, resulting in collisions, which would then necessitate retransmissions. Using a switch is called micro segmentation. This allows computers to have dedicated bandwidth on point-to-point connections to the network and to therefore run in full duplex without collisions.

Role of switches in networks:Switches may operate at one or more layers of the OSI model, including data link, network, or transport (i.e., end-to-end). A device that operates simultaneously at more than one of these layers is known as a multilayer switch.

In switches intended for commercial use, built-in or modular interfaces make it possible to connect different types of networks, including Ethernet, Fiber Channel, ATM, 802.11. This connectivity can be at any of the layers mentioned. While Layer 2 functionality is adequate for

Page 17: Experiment No

bandwidth-shifting within one technology, interconnecting technologies such as Ethernet and token ring are easier at Layer 3.

Interconnection of different Layer 3 networks is done by routers. If there are any features that characterize "Layer-3 switches" as opposed to general-purpose routers, it tends to be that they are optimized, in larger switches, for high-density Ethernet connectivity.

In some environments where there is a need for a great deal of analysis of network performance and security, switches may be connected between WAN routers as places for analytic modules. Some vendors provide firewall network intrusion detection, and performance analysis modules that can plug into switch ports.

In other cases, the switch is used to create a mirror image of data that can go to an external device. Since most switch port mirroring provides only one mirrored stream, hub scan be useful for fanning out data to several read-only analyzers, such as intrusion detection systems and packet sniffers.

TYPES OF SWITCHES:

Unmanaged   switches — these switches have no configuration interface or options. They are plug_and_play. They are typically the least expensive switches, found in home, SOHO, or small businesses. They can be desktop or rack mounted.

Managed   switches — these switches have one or more methods to modify the operation of the switch. Common management methods include: a command-line interface (CLI) accessed via serial console, telnet or Secure Shell, an embedded Simple Network Management Protocol (SNMP) agent allowing management from a remote console or management station, or a web interface for management from a web browser. Examples of configuration changes that one can do from a managed switch include: enable features such as Spanning Tree Protocol, set port bandwidth, create or modify Virtual LANs (VLANs), etc. Two sub-classes of managed switches are marketed today: Smart   (or intelligent) switches — these are managed switches with a limited set of

management features. Likewise "web-managed" switches are switches which fall in a market niche between unmanaged and managed.

Enterprise Managed   (or fully managed) switches — these have a full set of management features, including CLI, SNMP agent, and web interface. They may have additional features to manipulate configurations, such as the ability to display, modify, backup and restore configurations. Compared with smart switches, enterprise switches have more features that can be customized or optimized, and are generally more expensive than smart switches.

Page 18: Experiment No

48-port switch.

Typical switch management features:

Turn particular port range on or off Link bandwidth and duplex settings Priority settings for ports IP Management by IP Clustering. MAC filtering and other types of "port security" features which prevent MAC flooding Use of Spanning Tree Protocol SNMP monitoring of device and link health Port mirroring (also known as: port monitoring, spanning port, SPAN port, roving analysis

port or link mode port) Link aggregation (also known as bonding, trunking or teaming) VLAN settings 802.1X network access control IGMP snooping

HUBS:The term ‘hub’ is sometimes used to refer to any piece of network equipment that connects PCs together, but it actually refers to a multi-port repeater. This type of device simply passes on (repeats) all the information it receives, so that all devices connected to its ports receive that information.

Page 19: Experiment No

Hubs repeat everything they receive and can be used to extend the network. However, this can result in a lot of unnecessary traffic being sent to all devices on the network. Hubs pass on traffic to the network regardless of the intended destination; the PCs to which the packets are sent use the address information in each packet to work out which packets are meant for them. In a small network repeating is not a problem but for a larger, more heavily used network, another piece of networking equipment (such as a switch) may be required to help reduce the amount of unnecessary traffic being generated.Hubs form the heart of a network, with every separate node of the network connected to the hub through its ports. Anything from a file server to a workstation to a print server can be connected to the hub, making it accessible to every other node of the network.

There are three main points to remember about hubs:1. Many kinds of nodes can be connected to the hub with networking cable.2. All hubs can be uplinked together, either with straight-through cable or cross-over cable,

depending on whether or not the hub has an uplink port.3. Performance will decrease as the number of users is increased.

Types of hubs:1. 10baseT, which will support a speed of 10Mbps; 2. 100baseTX, which supports 100Mbps. A standard 10baseT hub cannot connect to

hardware that runs at 100Mbps unless a switch or hub with auto-sensing capabilities is used between them.

Page 20: Experiment No

Many hubs have one or more of the following extra features, which can increase ease of use, efficiency, and expandability:

Auto-sensing or dual-speed 10/100Mbps. Hubs with this feature can support hardware running at both speeds, increasing the length of time you can use your old 10baseT hardware.

Stackable hubs. Hubs with this feature are very expandable, operating as a single hub when stacked together. While standard hubs can only be uplinked through four hubs, a stacked hub is considered a single hub and there is no uplinking required.

SNMP (Simple Network Management Protocol). Hubs that support SNMP allow configuration of the hub from anywhere on the network. This feature can be extremely useful in LANs that span two or more floors, or have more than 50 users.

Function of hub:

Hubs can only communicate in half duplex mode, which means that a computer on the network can only send data when it is not receiving. When a hub receives a packet (chunk) of data (a

Page 21: Experiment No

frame in Ethernet lingo) at one of its ports from a PC on the network, it transmits (repeats) the packet to all of its ports and, thus, to all of the other PCs on the network.  If two or more PCs on the network try to send packets at the same time a collision is said to occur.  When that happens all of the PCs have to go though a routine to resolve the conflict.  The process is prescribed in the Ethernet Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol. 

Two computers can be connected directly together in an Ethernet with a crossover cable.  A crossover cable doesn't have a collision problem.  It hardwires the Ethernet transmitter on one computer to the receiver on the other.   The result is a crossover cable doesn't have delays caused by collisions, data can be sent in both directions simultaneously, the maximum available bandwidth is 200 Mbps, 100 Mbps each way, and there are no other PC's with which the bandwidth must be shared.

CONNECTORS:RJ-45 connector:The RJ-45 connector is commonly used for network cabling and for telephony applications.  It's also used for serial connections in special cases. Although used for a variety of purposes, the RJ-45 connector is probably most commonly used for 10Base-T and 100Base-TX Ethernet connections.

Because only two pairs of wires in the eight-pin RJ-45 connector are used to carry Ethernet signals, and both 10BASE-T and 100BASE-TX use the same pins, a crossover cable made for one will also work with the other. A single pair can be used for pins 3 and 6.

Page 22: Experiment No

Pinout for Ethernet:-

Pin #Ethernet 10BASE-T

100BASE-TX

EIA/TIA 568AEIA/TIA 568B or

AT&T 258A

1 Transmit + White with green strip

White with orange stripe

2 Transmit - Green with white stripe or solid green

Orange with white stripe or solid orange

3 Receive + White with orange stripe

White with green stripe

4 N/A Blue with white stripe or solid blue

Blue with white stripe or solid blue

5 N/A White with blue stripe

White with blue stripe

6 Receive - Orange with white stripe or solid orange

Green with white stripe or solid

7 N/A White with brown strip or solid brown

White with brown strip or solid brown

8 N/A Brown with white stripe or solid brown.

Brown with white stripe or solid brown.

Page 23: Experiment No

NETWORK CABLES:

Network cables have evolved significantly since the original standard was created in the early 1980s. From the original 10Base2 (Thin Coaxial) cable terminated with BNC connectors to the fiber optic technology we see today the change has been dramatic. For a network to function at its most efficient it is critical for the correct cable to be matched to the type of network being deployed as well as keeping the maximum distance specifications within tolerance.

Types of cables:Twisted pair cable:It consists of two insulated copper wires arranged in a regular spiral pattern. A wire pair acts as a single communication link. A number of these pairs are bundled together into a cable by wrapping them in a tough protective sheath. Over longer distances, cables may contain hundreds of pairs. The twisting tends to decrease the crosstalk interference between adjacent pairs in a cable. On long distance links, the twist length typically varies from 5 t0 15 cm.The wires in a pair have thickness of from 0.4 to 0.9 mm.

Crossover Cable - standard Ethernet cables are "straight-thru".  Pin 1 on one end connects to Pin 1 on the far end, Pin2 to Pin2, and so on.  There are only 4 pins that are used, since you only need two wires for transmit, and two for receive. The two pairs used are 1-2, and 3-6.  With a crossover cable, the wires connected to Pins 1-2 on one end are "crossed over" and connected to Pins 3-6 on the far end.  The same is done with the wires connected to Pins 3-6 - they are crossed over and connected to Pins 1-2 on the far end.

Page 24: Experiment No

TIA/EIA 568-A and 568-B Color Schemes (Twisted Pair):

There are two wiring sequences, where the wires and color codes are matched to the RJ-45 pins.  Which of these two wiring pin and coloring standards you need to use will depend mostly on your locale.  For example, Virginia stipulates that 568-A must be used.  Actually, 568-A is more common and is even called "preferred".  Just be aware that you need to check with the building manager before installing cables.

Preferred - TIA/EIA 568-A  Optional - TIA/EIA 568-B (comes from the old AT&T standard, 258A) 

Rj45 receptacle-not plug.

Page 25: Experiment No

Ethernet Send/Receive Pairs 2 and 3 positions are reversed.  However - in both cases:

Pair 2 = White/Orange and Orange Pair 3 = White/Green and Green

The colors schemes are listed below with traditional nomenclature of Base/Stripe, where the Base coat color is listed first, followed by the Stripe color.  For example, White/Blue means the insulated sheath base color is white (not paint - the actual material is white), with stripes or dashes of the secondary color, Blue, painted on.

Types of twisted pair cables:

Unshielded Twisted Pair: It is ordinary telephone wire. Office buildings, by universal practice, are prewired with excess unshielded twisted pair, more than is needed for simple telephone support. In UTP two insulated color coded copper wires are twisted around each other to decrease crosstalk or electromagnetic induction between wire pairs and does not include any foil or branding as insulator to protect against interference.

Page 26: Experiment No

Shielded Twisted Pair: The twisted pair is shielded with a metallic braid or sheathing that reduces interference. This STP provides better performance at higher data rates.STP is made up of copper wires that are twisted together and offers a protective sheathing around the copper wire. The pairs are covered in a foil or braided mesh as well as outer PVC jacket which prevent electromagnetic noise and Crosstalk.

Coaxial cable:

Coaxial cables are a type of cable that is used by cable TV and that is common for data communications. Taking a round cross-section of the cable, one would find a single center solid wire symmetrically surrounded by a braided or foil conductor. Between the center wire and foil is a insulating dielectric. This dialectric has a large affect on the fundamental characteristics of the cable. In this lab, we show the how the permittivity and permeability of the dialectric contributes to the cable's inductance and capacitance. Also, the Data is transmitted through the center wire, while the outer braided layer serves as a line to ground. Both of these conductors are parallel and share the same axis. This is why the wire is called coaxial! The impedance of coaxial cables depends on the dialectric material and the radii of each conducting material 

Page 27: Experiment No

In this lab we used a RG-580/U coaxial cable. This is just one of many types of cables that are used today to transmit data. The dialectric of the RG-580/U was made of polyethylene. The radius of our cable's inner copper wire was .42mm and there was 2.208mm of polyethylene between the inner wire and outer mesh conductors.

Optical Fiber Cable:

It is a thin, medium capable of guiding an optical ray. It has cylindrical shape and consists of three concentric sections: the core, the cladding and the jacket. The core is the inner section and consists of one or more very thin fibers of glass or plastic; core has diameter in the range of 8 to 50 micrometer. Each fiber is surrounded by its own cladding, a glass or plastic coating that has optical properties different from those of the core and a diameter of 125 micrometer. The interface between core and cladding acts as a reflector to confine light that would otherwise escape the core. The outermost layer, surrounding one or a bundle of cladded fibres, is the jacket. The jacket is composed of plastic and other material layered to protect against moisture, abrasion, crushing and other environmental dangers.

Page 28: Experiment No

Fiber optic cable functions as a "light guide," guiding the light introduced at one end of the cable through to the other end. The light source can either be a light-emitting diode (LED) or laser.

There are three types of fiber optic cable commonly used: single mode, multimode and plastic optical fiber (POF).

Single Mode cable is a single stand (most applications use 2 fibers) of glass fiber with a diameter of 8.3 to 10 microns that has one mode of transmission.  Single Mode Fiber with a relatively narrow diameter, through which only one mode will propagate typically 1310 or 1550nm. Carries higher bandwidth than multimode fiber, but requires a light source with a narrow spectral width.

sMulti-Mode cable Multimode fiber gives you high bandwidth at high speeds (10 to 100MBS - Gigabit to 275m to 2km) over medium distances. Light waves are dispersed into numerous paths, or modes, as they travel through the cable's core typically 850 or 1300nm. Typical multimode fiber core diameters are 50, 62.5, and 100 micrometers. However, in long cable runs (greater than 3000 feet [914.4 meters), multiple paths of light can cause signal distortion at the receiving end, resulting in an unclear and incomplete data transmission .

Page 29: Experiment No

ANSI TIA/EIA 568-B2   -   Twisted Pair Categories of Cable Standards:

In the mid 1980s, the Electronic Industries Association (EIA) developed a standard called TIA/EIA-568-A.  The higher the standard, the more twists per inch the pairs have, and the better the quality of the jack (RJ-45).

ANSI/EIA (American National Standards Institute/Electronic Industries Association) Standard 568 is one of several standards that specify "categories" (the singular is commonly referred to as "CAT") of twisted pair cabling systems (wires, junctions, and connectors) in terms of the data rates that they can sustain.

ANSI Category Maximum data rate Usual application

CAT 1 Up to 1 Mbps (1 MHz )analog voice (POTS)Integrated Services Digital Network Basic Rate Interface in ISDN Doorbell wiring

CAT 2 4 Mbps Mainly used in the IBM Cabling System for Token Ring networks

CAT 3 16 Mbps Voice and data on 10BASE-T Ethernet

CAT 4 20 Mbps Used in 16 Mbps Token RingOtherwise not used much

CAT 5 100 Mbps1000 Mbps (4 pair)

100 Mbps TPDDI155 Mbps ATM

CAT 5E(ISO Class D)

100 Mbps TPDDI155 Mbps ATM

CAT 6(ISO Class E) Up to 400 MHz Super-fast broadband applications (proposed standard).  Used with GigE

(1000 Mbps or 1 Gbps)

CAT 7(ISO Class F) 600-700 MHz Even faster broadband applications (proposed standard)

CAT 5 CABLE:

Page 30: Experiment No

Cat-5 cable, sometimes called Ethernet cable, is short for Category 5 cable, a current industry standard for network and telephone wiring. Cat-5 cable is unshielded wire containing four pairs of 24-gauge twisted copper pairs, terminating in an RJ-45 jack.

The outer sheath of Cat-5 cable can come in many colors, with bright blue being quite common. Inside, the twisted pairs are also sheathed in plastic with a standard color scheme: Solid orange, blue, green and brown wires twisted around mates that are white and striped with a solid color. The twisted pairs inside a Cat-5 cable reduce interference and crosstalk, and should be left twisted except at the termination point. Some experts recommend untwisting only ½ inch (12.7 mm) of the pairs to strip and make connections. Cat-5 cable can be purchased off a spool in varying lengths, or bought pre-cut to standard lengths with RJ-45 jacks already attached.

Cat-5 cable replaces Cat-3 cable, which could only carry data at speeds up to 10 megabits per second (mbps), while Cat-5 cable supports data speeds of 100 mbps or more. A Cat-5e is enhanced Cat-5 cable that supports 1000 mbps or gigabit Ethernet, or it can be used with 100 Base-T networks for long-distance runs of 1150 feet (350 meters). This type of Cat-5 cable meets a specific standard referred to as "EIA/TIA 568A-5," which should be stamped on the outer sheath.

Among Cat-5 cables, there are three different configurations for pinouts, or wiring of the RJ-45 connectors. Various network devices utilize one of the three types of pinouts. The three pinouts are referred to as straight through, crossover and roll-over.

The Cat-5 cable that runs from a computer to a switch will be a straight through cable, for example. If two PCs or two switches are connected, the Cat-5 crossover cable would be used. Finally, a Cat-5 roll-over cable will connect a PC to a router.