6. Simple network assembly and configuration

advertisement
Computer Networks, lab. 6
IFE
The aim of the laboratory is getting familiar with basic networking and to have some
practice with using simple equipment. Each student should practice preparing twisted pair
cable and test it with the aid of dedicated tester. Properly prepared cables are needed to create
connections between pairs of computers. Connected computers will be configured afterwards.
To test the created simplest-case computer network the previously learned software tools will
be applied. The first section of this document presents some simplified background.
1. Computer networks structures, net topologies
Fundamentals:
OSI reference model:
Layer 7
Application layer
Layer 6
Presentation layer
Layer 5
Session layer
Layer 4
Transport layer
Layer 3
Network layer
Layer 2
Data link layer
Layer 1
Physical laser
Simplified communication model:
Basic networking terms:
Communication protocol – set of rules and conventions needed for information exchange
and distribution among computers connected with the aid of transmission medium .
Frame – an information unit, which source and destination in the OSI model is the Data link
layer. It consists of a header, data and ending.
Packet - an information unit, which source and destination in the OSI model is the transport
layer.
Datagram - an information unit, which source and destination in the OSI model is the
network layer.
Segment - an information unit, which source and destination in the OSI model is the
application layer.
1
Computer Networks, lab. 6
IFE
1.2. Local Area Networks LAN
LAN (Local Area Network) consists of both hardware and software. Most important LAN
elements are as follows:
√ transmission medium, eg. twisted pair, coaxial cable, optical fiber,
√ information transmission control mechanism – it prevents conflicts occurring
between users simultaneously tending to access the transmission medium
√ network interface – interface of devices connected to the network, it conducts
necessary tests and converts coded information.
LAN networks enables easy access for multiple users sharing the same resources
(devices, data and applications), exchange files, users communication with the aid of
electronic mail and other applications.
LAN types:
Nowadays there are three most popular cable LAN technologies:
 Ethernet technology,
 Token-Ring technology,
 FDDI (Fiber Distributed Data Interface) technology
Ethernet – a family of LAN technologies; three major are:
 Ethernet and IEEE 802.3 – several sets of LAN specifications, working at max with 10
Mb/s.
 Ethernet 100 Mb/s (Fast Ethernet) - LAN specification, working at max with 100 Mb/s.
 Ethernet 1000 Mb/s (Gigabit Ethernet) - LAN networks specifications 1000 Mb/s (1
Gb/s).
Token-Ring. Technology originaly developed in IBM laboratories in seventies; stall widely
used. Workstations are connected directly to MAU (Multistation Access Unit) device, which
join them in one common ring.
FDDI. FDDI (Fiber Distributed Data Interface) technology is now used in WAN networks. Its
biggest advantage is huge bitrate (100 Mb/s) and high reliability. Optical fiber is the
transmission medium. There is a double ring topology in this approach. Primary Ring is used
for data transmission, and the Secondary Ring is not busy during normal work. In the LAN
networks FDDI is stall too expensive comparing to other solutions.
Przykładowe metody komunikacji – sposób dostępu do medium komunikacyjnego sieci:
CSMA/CD (Carrier Sense Multiple Access with Collision Detection) – Device is transmitting
only when it has exclusive medium access. When two devices begin to transmit at the same
time, the collision occurs. Then devices stop transmission after detecting such situation. After
waiting a random period of time the transmission is reactivated. This method causes limiting
the effective bus length to 2500 meters (with longer segments this mechanism no longer
works).
Token Ring – The dedicated packed is employed to transfer information. It is called Token.
Device tending to start the transmission have to get this packet. It changes one bit inside it
(converts into SFS frame - start of frame) and sends information. Token is then passed from
one workstation to another according to topology. Logical ring is related to physical one.
Changing of priority is also possible.
Token Bus – This mechanism is similar to the previous one, except Token is transferred in
different sequence. Order is dependent on the device address, and not the physical location.
Logical ring is not related to physical one. Nowadays this method is not very popular.
2
Computer Networks, lab. 6
IFE
1.3. Networks topologies in Physical layer.
Physical layer - IEEE 802.3
10 Base 2
10 Base 5
10 Base T
10 Base F
10 Broad 36
100Base X
100VGAnyLAN
Coaxial cable (RG58 A/U) max segment length 185m. Transmission
bitrate 10 Mb/s. CSMA/CD method.
Coaxial cable max segment length 500m,
Twisted pair segment length 100m. Twisted pair types: UTP, STP, ScTP,
FTP. Transmission bitrate 10 Mb/s. CSMA/CD method.
Optical fibre cables max segment length 2000 m. Single and multimode
optical fibres. Transmission bitrate 10 Mb/s. CSMA/CD method.
Coaxial cable (RG59/A/U/CATV) max segment length 3600 m. Mostly
used for broadband transmission. Transmission bitrate 10 Mb/s. CSMA/CD
method.
Twisted pair max segment length 100m. Transmission bitrate 100 Mb/s.
CSMA/CD method.
Twisted pair segment length 50m. Transmission bitrate 100 Mb/s. Access
upon request with priority method. 802.12 standard.
Abbreviations:
XXX – stands for network transmission bitrate in Mbps
„Base” – stands for Baseband
„Broad” – stands for Broadband
YY – means: segment length times 100 m
Example:10 Base 5 means Baseband network with transmission bitrate up to 10
Megabits per second with max segment length of 200 meters.
XXX Base YY -
1.3. Cables types and categories
Coaxial cable (nonsymmetrical cable) – similar to a usual tv antenna cable, RG58 A/U, RG58
C/U.
Twisted pair (symmetrical cable) – usually a copper cable consisting of several pairs of wires
twisted together in pairs (2 up to even few thousands pairs of twisted wires) put in the same
shield. Other names for twisted pair cables depending on max bitrate are for example:
10BASE-T, 100BASE-T or 1000BASE-T. Nowadays it is a most popular transmission
medium. Twisted pair cables are higly reliable and low cost. Cables classification:
Category 1 – used in telephony networks
Category 2 - data transmission up to 4 Mb/s,
Category 3 - data transmission up to 10 Mb/s (10BaseT), 3-5 twists/feet
Category 4 - data transmission up to 16 Mb/s (TR), 5-8 twists/feet
Category 5 - data transmission up to 100-150 Mb/s (Fast Ethernet, FDDI, CDDI, 100VGanyLAN), 8-10 twists/feet
There are basically 2 types of twisted pair cables: shielded (STP, FTP) and unshielded
(UTP). Some common abbreviations are listed below:
UTP – Unshielded Twisted Pair
STP – Shielded Twisted Pair
ScTP – Screened Twisted Pair
FTP – Foil tape screen Twisted Pair
3
Computer Networks, lab. 6
IFE
In general, the shielded ones are covered with shield and are better protected, which provides
low transmission losses and gives better resistance to interference. However UTP cables are
still widely used. Max length of UTP segments are about 100 m, whereas for STP it is 250 m.
These limits can be easily extended with the aid of repeaters. The impedance of the twisted
pair is 100 ohms in both cases. RJ-45 connector is needed to plug twisted pair cable into
computer network card interface. RJ11-14 connectors are used in telephony networks. There
are some pictures with cables and connectors below:
It is STP cable category 5 on the right.
RJ45 connector unshielded; with 8 pins
RJ11 telephonic connector with 4 pins
100BaseT network adapter, 1x RJ45 connector versus 2x RJ45 socket
Transmission media types in networks of different logical topologies:
10Base T
10Base 2
10 Base 5
Twisted Pair
Coaxial
Coaxial
Topology
Star, Tree
Bus
Bus
Segment
length
100 m
185 m
457 m
Devices per
segment
32
30
100
Devices per
network
1024
1024
1024
Media
2. Connecting computers with twisted pair cable
2.1. Cable and connector structure
The easiest way of constructing local area network is connecting two computers
equipped with network interface cards with the aid of cable. One can do it with coaxial cable
4
Computer Networks, lab. 6
IFE
or with the twisted pair cable. Type of cable depends on the computer network cards type.
There are computers equipped with the twisted pair enabled cards in the laboratory. Therefore
in order to connect two computers the 1 meter long, cross-over cable should be prepared.
Then the correctness of fabricated cables will be tested with dedicated equipment. Schematic
construction of RJ-45 connector is presented on the figure below:
Usual twisted pair pin-wires connections:
1.white-orange
2. orange
3. white-green
4. blue
5. white-blue
6. green
7. white-brown
8. brown
In the twisted pair transmission medium there are different types of wires pairs
assigned to different tasks. It has significant importance when trying to connect two
computers directly without any patch panel, hub or switch, etc. The reason is that the one pair
is used for sending data and another one is supposed to expect receiving frames, therefore
connecting two computers with the ordinary twisted pair cable would cause a situation when
both computers would expect frames on the same pair of wires. To eliminate need for using
patch panel or other equipment one should switch appropriate pairs of wires to create the so
called cross-over cable. There are two pairs of wires switched in this type of cable. On the one
end of cable we prepare the connector in a usual way with standard positions of wires like for
the computer-patch panel or computer-hub, etc connection. On the other end, we change the
position of two pairs of wires, in a manner that signal send from one computer on the 1 and 2
pins could be received by the other computer on the 3 and 6 pins. The correct way of
preparing the cross-over cable is presented in the figure below:
Cross-over connector pin scheme:
1. white-green
2. green
3. white-orange
4. blue
5. white-blue
6. orange
7. white-brown
8. brown
2.1. Practical tips
The following procedure can be helpful during mounting connectors with the cables.
1. Cut the end of the cable to make it “smooth” at the cross section.
5
Computer Networks, lab. 6
IFE
2. Remove 1 cm of the external isolation shield. Do not remove individual wires isolation.
3. Form the desired configuration of wires according to schemes provided above.
4. Push the cable into the connector to the very bottom.
5. Put connector together with the cables hold deep in the connector into the squeezing device.
6. Squeeze the device – that’s it!
3. Local network connection configuration
The properties of each installed network card interface are presented in the Network
Connections dialog window. This window can be invoked through the Control Panel or by the
Network Neighborhood context menu (depending on the Windows version). To configure
Local Area Connection, one should right click and choose Properties option. Dialog window
Local Area Connection Properties presents information about network card, clients, services
and protocols.
6
Computer Networks, lab. 6
IFE
In order to link the communication based on the TCP/IP protocol, one should
configure the properties of this protocol. First, mark the connection element: Internet Protocol
(TCP/IP) and press Properties button. The TCP/IP Internet protocol Properties window
enables the manual configuration of IP address settings, subnet mask and default gateway. In
standard, the IP address is automatically assigned by the DHCP (Dynamic Host Configuration
Protocol) server, but it is enough to switch the option button to change it from dynamic to
static mode.
During laboratory classes one can choose IP class C addresses with appropriate subnet
mask. Working in pairs, the task is to configure two cooperating workstations with the
following settings:
Computer #1 IP address: 192.168.1.2
Computer #2 IP address: 192.168.1.3
Subnet mask: 255. 255. 255.0
Default gateway: 192.168.1.1
The prepared and saved configuration should be tested – communication between
computers should be checked. In order to do that ping application employment should be
enough. However, the full network interface configuration can be also presented with the aid
of ipconfig or ifconfig tools.
7
Download