Uploaded by Faria Shoaib

Lab 1 final

advertisement
Cables and Connectors Remarks: Basic Cable
Construction and Testing
Lab Report 1
Faria Shoaib
F20604022
Supervisor: Engr. Adeel Ijaz
Department of Computer Engineering
National University of Technology
November 20, 2022
Table of Contents
Contents
Abstract ......................................................................................................................4
1. Objectives ............................................................................................................5
2. Tools ....................................................................................................................5
3. Introduction..........................................................................................................5
4. Procedure .............................................................................................................9
5. Post lab tasks........................................................................................................9
5.Conclusion ............................................................................................................15
6. References ..........................................................................................................16
Table of figures
Figure 1 Coaxial Cable ................................................................................................................................. 6
Figure 2 Fibre Optic Cable ........................................................................................................................... 6
Figure 3 UTP cable ....................................................................................................................................... 7
Figure 4 STP Cable ....................................................................................................................................... 7
Figure 5 RJ 45 Connectors ............................................................................................................................ 8
Figure 6 Colour Coding for Straight Through Cables .................................................................................. 8
Figure 7 Colour Coding scheme for Crossover Cable .................................................................................. 9
Abstract
The aim of this report is to discuss and analyze the different cables, their
construction, and color coding to connect them. Furthermore, the procedure to
construct the cable is discussed. The protocols and standards for the ethernet by
IEEE were described too.
1. Objectives
• To be familiar with the type and construction of different cables used in data
networks and connections.
• To make your own ethernet cable.
2. Tools
The following tools will be needed to perform this experiment.
•
•
•
•
Ethernet Cable
Crimping Tool
RJ45 Connectors
Cable Tester
3. Introduction
A conductor or collection of conductors used in electrical and electronic systems to
transport electrical power or telecommunication signals from one location to another
is known as a cable. The part you attach to the end of a cable so it can plug into a
port, or an interface of an electrical system is called a cable connector. The size,
topology, and protocol of a network all influence the kind of cable that is used for it.
The following list includes several typical network cables. That are:
•
•
•
•
Coaxial Cable
Fibre Optic Cable
Unshielded Twisted Pair (UTP) Cable
Shielded Twisted Pair (STP) Cable
A form of copper cable known as coaxial cable is specifically designed with a
metal shield and other signal-blocking components. Cable TV providers employ it
to link their satellite antenna installations to customer residences and places of
business.
The connection between central offices and phone poles close to clients is
occasionally employed by telephone providers. Coaxial cable is also used in some
homes and workplaces, but the widespread usage of twisted pair cabling as an
Ethernet networking medium in businesses and data centres has replaced it.
Figure 1 Coaxial Cable
The real glass layers that make up fibre optic cable are the cladding, which
surrounds the core, and the core, which carries the actual light transmission.
The refractive index of the cladding is lower than that of the core. The core
experiences Total Internal Reflection as a result. Most fibres work in duplex
pairs, where one fibre is used for transmission and the other for reception.
Nevertheless, it is possible to send both signals via a single thread. Fibre
optic cables come in two primary varieties: Single Mode Fibre (SMF) and
Multi-Mode Fibre (MMF). The size of the core is really what is effective.
The broader core of MMF enables the propagation of numerous modes (or
"rays") of light.
Figure 2 Fibre Optic Cable
Unshielded Twisted Pair cable is known as UTP. A 100-ohm copper cable
called a UTP cable has 2 to 1800 unshielded twisted pairs that are encased in
an outer jacket. They do not have a metal shield. As a result, the wire has a
small diameter yet is not shielded from electrical interference. Its resistance
to EMI and electrical noise is increased by the twist.
Figure 3 UTP cable
In some commercial installations, shielded twisted pair (STP), a specific variety of
copper telephone and local area network (LAN) wire, is employed. It upgrades
standard twisted pair wiring by adding an external covering or shield that serves as
a ground.
The common copper wire known as twisted pair is used to link many computer
networks to the telephone provider. Two insulated copper wires are wound around
each other in a spiral pattern to minimise electromagnetic induction or crosstalk
between pairs of wires. Twisted pair signals require both wires to run.
Figure 4 STP Cable
RJ-45 is the common name for the connectors used on the ends of Ethernet cables.
According to the 802.3 wiring standards, these connectors are officially known as
"8P8C," which stands for "eight positions, eight connectors." This plastic connector
resembles a sizable telephone connector. The RJ-45 can only be inserted one way
into a slot.
Figure 5 RJ 45 Connectors
The wired pins of a straight-through cable line up. One wiring standard is used for
straight-through cables; either T568A or T568B is used on both ends.
Figure 6 Colour Coding for Straight Through Cables
As the name implies, a crossover cable crosses over or swaps while travelling from
one end to the other. Instead, then using one wiring standard on both ends like patch
cable, crossover cable employs two: one end uses the T568A wiring standard and
the other end uses the T568B wiring standard.
Figure 7 Colour Coding scheme for Crossover Cable
4. Procedure
1. Remove the outer sheath of the Ethernet cable by two inches.
2. Untwist the pairs but stop after the exposed portion. The more cable that is
untwisted, the more issues you may meet.
3. Arrange the colored wires in accordance with the wiring schematics shown
above.
4. Cut the wires all the same length, leaving about one-half" to 3/4" of the sheath
exposed.
5. Connect the wires to the RJ45 plug, making sure they are all fully entered and
arranged in the proper order. The crimp will secure the Ethernet cable's sheath,
which should protrude into the plug by about one-half".
6. Using the crimper tool, crimp the RJ45 plug.
7. Check that the wires are arranged in the proper sequence, extend to the RJ45
plug's front, and set up excellent contact with its metal contacts.
8. Cut the Ethernet cable to the proper length, making sure it is long enough to
meet your demands.
9. For the second RJ45 plug, repeat the same procedure.
5. Post lab tasks
• What is Power over Ethernet (PoE)?
By the IEEE 802.3af and 802.3at standards, the networking functionality known as
Power over Ethernet (PoE) is described. With PoE, Ethernet connections may power
network devices while using the same existing data connection.
Power sourcing equipment (PSE), powered devices (PDs), or occasionally both, can
be PoE-capable devices. A PSE is a device that transfers power, whereas a PD is a
device that is powered. Network switches or PoE injectors designed for use with
non-PoE switches make up most PSEs. VoIP phones, wireless access points, and IP
cameras are typical instances of PDs.
a. PoE saves you money by allowing you to power and transmit data over the
same cable, which is ideal for VoIP phones and networking equipment.
b. In buildings where it is too expensive or inconvenient to install additional
power lines, PoE greatly simplifies and reduces the cost of creating or
expanding a network.
c. You can mount devices using PoE in locations where it would be difficult to
install electricity, like drop ceilings.
d. In a cramped equipment room or wiring closet, PoE can reduce the number of
cables and electrical outlets required.
• Explain the following Protocols and Standards
i.
10Base-T
→IEEE 802.3
10BaseT uses unshielded twisted pair (UTP) cable. The cable is flexible and
easy to work with. The cable has a characteristic impedance of one hundred
ohms. There are two pairs of twisted wires used with 10BaseT. Separate Rx
(receive) and Tx (transmit) pairs are used. The lines are balanced lines to
minimize noise and there are a Rx+ & Rx- pair and a Tx+ & Tx- pair. The
nodes are connected to an MPR (multiport repeater) also called a Concentrator
or Hub. The cables are wired as straight-through cables meaning the Node's Rx
& Tx lines connect directly to the Hub's Rx & Tx lines, respectively. Two
nodes can be directly connected bypassing the Hub by using a Cross-over (Xover) cable. In an X-over cable, the Tx and Rx lines are crossed so that one
node's Tx lines go to the other nodes Rx lines and vice versa. To minimize noise
on the segment, the cable is a balanced line with Rx- & Rx+ and Tx- & Tx+. There
is no shielding and any noise that appears on the Rx+ wire will appear on the Rxwire. When the 2 signals are combined, the noise cancels due to Rx- & Rx+ being
180 degrees out of phase.
The physical layer and MAC sublayer of the data connection layer of wired
Ethernet are defined by the IEEE 802.3 protocol standards. In accordance with
IEEE 802.3, access is provided via Carrier Sense Multiple Access with
Collision Detection (CSMA/CD) at various speeds and through a range of
physical media. Ethernet at 10 Mbps is covered by the IEEE 802.3 standard.
ii.
100Base-TX →IEEE 802.3u
The formal name for Fast Ethernet over twisted pair wires is 100BASE-TX. In
local area networks, it is the most common type of Fast Ethernet, transporting data
traffic at 100 Mbps (Megabits per second) (LAN). In 1995, it was introduced as the
IEEE 802.3u standard. Here, one hundred stands for the maximum speed (100
Mbps), BASE for baseband transmission, and TX for twisted pair connections used
in fast ethernet.
One of the most popular types of Ethernets is IEEE 802.3u Fast Ethernet, which is
100Base-T. Because of how simple it is to use and the fact that systems can
determine whether 10Base-T or 100Base-T speeds are being utilized, it is
frequently regarded as universal for LAN applications. Under the 802.3u family of
standards, 100BaseT Ethernet is established. Each node within a 100BaseT
network shares the network's 100Mbps bandwidth. The first figure in the name for
100Base-T is the designation for the speed in Mbps, which is taken from the
standard format for Ethernet connections. The letters denote the cable or transfer
medium, and the base denotes the baseband the system operates at.
iii.
1000Base-T →IEEE 802.3ab
1000Base-T is a type of gigabit Ethernet networking technology that uses copper
cables as a medium. 1000Base-T uses four pairs of Category 5 unshielded twisted
pair cables to achieve gigabit data rates. The standard is designated as IEEE
802.3ab and allows 1 Gbps data transfer for distances of up to 330 feet. 1000BaseT came into wide use in 1999, gradually replacing fast Ethernet for wired local
networks simply because it was ten times as fast. Equipment and cables are
remarkably like previous Ethernet standards and by 2011 were very common and
economical. These were the biggest factors that ensured this standard's wide
acceptance.
iv.
2.5GBase-T →IEEE 802.3bz
A new data rate called IEEE 802.3bz 2.5 gigabit was created to bridge the gap
between gigabit Ethernet and ten gigabit Ethernet. The specification is known as
2.5GBase-T. 2.5GBase-T, formerly known as 802.3bz and developed by the IEEE,
is meant to function over current Category 5e and Category 6 infrastructure. It makes
use of all four pairs of the cable, just like gigabit Ethernet. It uses the entire 0-100
MHz band, unlike the slower gigabit Ethernet, making it appropriate for Category 6
infrastructures but potentially problematic for Category 5e ones. It is severely
distance limited, just like 10-gigabit Ethernet, which can operate over some
Category 6 cables. As the installation will affect actual performance, it can be used
with Category 6A infrastructure, which offers higher performance.
v.
5GBase-T
→IEEE 802.3bz
Ethernet over twisted pair is supported by the IEEE 802.3bz, NBASE-T, and
MGBASE-T protocols at 2.5 and 5 Gbit/s rates. These have faster speeds while
still using the same cable as Gigabit Ethernet, which is widely used.
vi.
10GBase-T
→IEEE 802.3an
A kind of Ethernet signalling known as 10GBASE-T offers twisted-pair cable
speeds exceeding 1 Gigabit per second (Gbps) over distances of up to one hundred
metres.
Over Cat5e and Cat6 cables, this IEEE 802.3an® standard can deliver 2.5 and 5
Gbps. Signals may be able to travel at new speeds of up to 10 Gbps depending on
the network infrastructure. The NBASE-T Alliance's concentrated work led to the
recent ratification and standardisation of 10GBASE-T.
vii.
25GBase-T
→IEEE 802.3bq
A kind of Ethernet signalling called 10GBASE-T offers speeds over twisted-pair
cabling that are greater than 1 Gigabit per second (Gbps) for lengths of up to one
hundred metres. Over Cat5e and Cat6 cable, this IEEE 802.3an® standard has
speeds of 2.5 and 5 Gbps. Signals may be capable of reaching up to 10 Gbps in
speed, depending on the network infrastructure. Focused work from the NBASE-T
Alliance led to the recent ratification and standardisation of 10GBASE-T.
viii.
40GBase-T
→IEEE 802.3bq
There are indications of the 40GBASE-T pillars. The emphasis is on data centre
infrastructure, which over the following few years will inescapably need to
transition to 40 Gigabit Ethernet. The required capacity could be provided using
fibre optic or Twinax cabling. However, conventional twisted-pair copper wiring,
preferably with the versatile, useful RJ45 style for communication technologies,
continues to be the more affordable and adaptable option.
As a result, 40GBASE-T is the preferred standard. A transmission channel with
two connectors and a 30-metre length will be specified by the IEEE. With a margin
of error of up to 2000 MHz, the transmission frequency will be increased to 1600
MHz
• Why are cables twisted in UTP/STP?
The twisting is done to aid in the cancellation of external electromagnetic
interference. Interference from other pairs within a cable can cause crosstalk. Each
twisted pair cable has its own bandwidth and data rate parameters.
• Explain firewall and the difference between the hardware and software
firewall? Describe at least ten features of the hardware firewall.
On a computer or server, firewall software is installed as security software.
An independent device with its own CPU, memory, operating system, and
software is a hardware firewall. The router also includes several hardware
firewalls that are embedded into it.
An application that is installed on a computer or server is a firewall. The
Windows VPS proprietary firewall, which can be accessed via the Windows
Security Settings screen or Pfsense for Linux VPS, is one of the most widely
used software firewalls. Additionally, security software providers like
Kaspersky, Panda, and others create their own firewalls that often come in
several versions. Some of them are made for use with personal computers,
while others are made to be installed on network servers and in business
settings.
Because otherwise, it should be valuable to every computer linked to the
network, it is so that with just one installation on the server, other network
machines will be under its security umbrella. Purchase and set up a standalone
security system, which will cost a lot of money and take a long time to setup
and run across dozens or even hundreds of machines. Some software firewalls
can watch outgoing network traffic in addition to receiving network traffic.
Additionally, software firewalls are typically more adaptable and have more
security settings and possibilities.
The hardware firewall is located at the network boundary, i.e., between the router
and the outside world (Internet or other networks). Therefore, it is the first line of
defense at the entrance to the network. Any data must go through the hardware
firewall before it reaches the router and then the computers on the network.
Another advantage of a hardware firewall rather than a software firewall is that it
hides the computer or local area network from the outside world. So, the external
monitor sees only a hardware device instead of the network that has an unfamiliar
operating system (because it was said that the operating system of the hardware
firewalls is proprietary). This method of secrecy is called network address translation
(NAT). Of course, this measure does not work against the entry of e-mail viruses.
•
•
•
•
•
•
•
•
VPN: This is critical if an extremely secure Firewall is required. VPN
provides site-to-site encryption. This will make the user invisible to even the
hackers as he will be only seen as using a VPN Server.
·High Availability: with the secondary Firewall taking over the security in
case of the primary Firewall breaking down. This is important for critical
data-centric organizations.
Packet Filtering: a device like a router is sufficient for smaller companies.
Stateful inspection: Firewalls which investigate the information in the data
packets are required for the medium enterprises.
Proxy Firewall: This hides the origin of the user and gives anonymity.
·Host-based Firewall: They operate on a single computer. For more
systems, each one will need to have an individual Firewall.
Network Firewalls: This is required for a network made up of many
computers.
Enterprise Firewalls: These incorporate most of the sophisticated features
like VPN, which are required for top-end security in large corporations.
6. Conclusion
In this introductory lab, we were familiarized with the type and construction of
different cables connectors and the colour coding to connect them used in
networks. We learnt to construct a cable. Diverse types of cables, standards of
protocols for the ethernet over the years and PoE were being discussed too.
7. References
1. https://www.fiberoptics4sale.com/blogs/archive-posts/95046918-what-is-unshieldedtwisted-pair-utp-cable
2. https://www.techtarget.com/searchnetworking/definition/shielded-twisted-pair
3. https://www.plcacademy.com/how-to-make-an-ethernet-cable/
4. https://kb.netgear.com/209/What-is-PoE-Power-over-Ethernet
5. https://zymitry.com/fast-ethernet-specification-ieee-8023u/
6. https://operavps.com/hardware-or-softwarefirewall/#:~:text=Firewall%20software%20is%20a%20security,and%20are%20integrate
d%20into%20it.
7. https://www.jigsawacademy.com/blogs/cyber-security/hardware-firewall/
8. https://www.versatek.com/what-is-10gbase-t/
Download