Fig 3.2: Twisted pair cable

advertisement
[Type the document title]
PRACTICAL NO:1
SPECIFICATION OF LATEST DESKTOPS AND LAPTOPS:
What do you understand by specifications?
Before buying a computer desktop or laptop one must keep in mind certain things that must be
present within the system. These things or parameters are refered to as specifications of a
computer system.
These parameters are:







Operating System
Software Suite
Virus and Spyware protection
Computer hardware
Ethernet cable
NIC/Ethernet Card
Insurance
WHAT IS A DESKTOP?
A desktop computer is a personal computer (PC) in a form intended for regular use at a single
location, as opposed to a mobile laptop or portable computer. Early desktop computers are
designed to lie flat on the desk, while modern towers stand upright. Most modern desktop
computers have separate screens and keyboards.
Computer Networks
Page1
[Type the document title]
Motherboard:
A motherboard (sometimes alternatively known as the mainboard, system board, planar board or logic
board,or colloquially, a mobo) is the main printed circuit board (PCB) found in computers and other
expandable systems. It holds many of the crucial electronic components of the system, such as the
central processing unit (CPU) and memory, and provides connectors for other peripherals. Unlike a
backplane, a motherboard contains significant sub-systems such as the processor and other
components.
Computer Networks
Page2
[Type the document title]
Video Card:
A video card (also called a video adapter, display card, graphics card, graphics board, display adapter
or graphics adapter and sometimes preceded by the word discrete or dedicated to emphasize the
distinction between this implementation and integrated graphics) is an expansion card which generates
a feed of output images to a display (such as a computer monitor). Within the industry, video cards are
sometimes called graphics add-in-boards, abbreviated as AIBs,[1] with the word "graphics" usually
omitted. Virtually all current video cards are built with either AMD-sourced or Nvidia-sourced graphics
chips.[1] Most video cards offer various functions such as accelerated rendering of 3D scenes and 2D
graphics, MPEG-2/MPEG-4 decoding, TV output, or the ability to connect multiple monitors (multimonitor).
Computer Networks
Page3
[Type the document title]
RAM:
Random-access memory (RAM /ræm/) is a form of computer data storage. A random-access device
allows stored data to be accessed directly in any random order. In contrast, other data storage media
such as hard disks, CDs, DVDs and magnetic tape, as well as early primary memory types such as drum
memory, read and write data only in a predetermined order, consecutively, because of mechanical
design limitations. Therefore, the time to access a given data location varies significantly depending on
its physical location.
Today, random-access memory takes the form of integrated circuits. Strictly speaking, modern types of
DRAM are not random access, as data is read in bursts, although the name DRAM / RAM has stuck.
However, many types of SRAM, ROM, OTP, and NOR flash are still random access even in a strict sense.
RAM is normally associated with volatile types of memory (such as DRAM memory modules), where its
stored information is lost if the power is removed.
Computer Networks
Page4
[Type the document title]
Processor
The microprocessor is a multipurpose, programmable device that accepts digital data as input,
processes it according to instructions stored in its memory, and provides results as output. It is an
example of sequential digital logic, as it has internal memory. While 64-bit microprocessor
designs have been in use in several markets since the early 1990s (including the Nintendo 64
gaming console in 1996), the early 2000s saw the introduction of 64-bit microprocessors targeted
at the PC market.
Nowadays, multi-core processors are used in computer systems. A multi-core processor is simply
a single chip that contains more than one microprocessor core. This effectively multiplies the
processor's potential performance by the number of cores (as long as the operating system and
software is designed to take advantage of more than one processor core). Some components,
such as bus interface and cache, may be shared between cores. Because the cores are physically
very close to each other, they can communicate with each other much faster than separate
processors in a multiprocessor system, which improves overall system performance.
In the processors markets, Intel and AMD have been arch-rivals since a long time. While Intel
focuses on performance and compatibility, AMD focuses more on price and overall performance.
For example, Intel's cheapest Sandy Bridge quad-core CPUs often cost almost twice as much as
AMD's cheapest Athlon II, Phenom II, and FX quad-core CPUs but Intel has dual-core CPUs in
the same price ranges as AMD's cheaper quad core CPUs. In an application that uses one or two
threads, the Intel dual cores outperform AMD's similarly priced quad-core CPUs—and if a
program supports three or four threads the cheap AMD quad-core CPUs outperform the similarly
priced Intel dual-core CPUs.
Computer Networks
Page5
[Type the document title]
SPECIFICATIONS OF DESKTOP:

ACER ASPIRE AME600 UR378:
Type:
Processor Family:
RAM:
Storage Capacity:
Graphics Card:
Primary Optical Drive:
Operating System:
Price:

Gaming
Intel Core i7
8GB
1750GB
nVidia GeForce GT 545M
BD/DVD/CD +/-RW
Microsoft Windows 7
$981.79
GATEWAY DX4870 UR11P:
Type:
Processor:
RAM:
Storage Capacity:
Graphics Card:
Primary Optical Drive:
Operating System:
Price:

2000
ASUS ESSENTIO CM6870:
Type:
Processor Family:
RAM:
Storage Capacity:
Graphics Card:
Primary Optical Drive:
Operating System:
Price:

Mainstream, Multimedia
Intel Core i7
10 GB
2000 GB
Intel HD Graphics 4000
Dual-Layer DVD+/-RW
Microsoft Windows 8
$719.86
Mainstream
Intel Core i7
10 GB
200 GB
Intel HD Graphics
DVD+RW (Plus)
Microsoft Windows 7
$879.00
DELL VOSTRO 470:
Type:
Processor:
RAM:
Storage Capacity:
Graphics Card:
Primary Optical Drive:
Operating System:
Price:
Computer Networks
Business
Intel Core i7
8 GB
1000 GB
AMD Radeon HD 7570M
DVD+/-RW
Microsoft Windows 7
$649.00
Page6
[Type the document title]

HP PAVILION P7 1380T:
Type:
Processor:
RAM:
Storage Capacity:
Graphics Card:
Primary Optical Drive:
Operating System:
Price:
Multimedia
Intel Core i5 3330
6 GB
1TB
Integrated Intel HD Graphics
Super multi DVD burner
Microsoft Windows 7
Rs.30975.00
WHAT IS A LAPTOP?
A laptop computer is a personal computer for mobile use.[1] A laptop has most of the same
components as a desktop computer, including a display, a keyboard, a pointing device such as
a touchpad (also known as a trackpad) and/or a pointing stick, and speakers into a single unit.
A laptop is powered by mains electricity via an AC adapter, and can be used away from an
outlet using a rechargeable battery. Laptops are also sometimes called notebook
computers, notebooks, ultrabook or netbook.
SPECIFICATIONS OF LAPTOPS:

HP ENVY d6t
Processor:
Video Card:
Audio:
Operating System:
Memory(RAM):
Hard Drive Storage:
Screen Resolution:

APPLE MACBOOK PRO
Processor:
Video Card:
Audio:
Operating System:
Memory(RAM):
Hard Drive Storage:
Screen Resolution:

Intel Core i7
Ge Force GT 650M
Beats Audio
Windows 8 Home Premium
8 GB
750 GB
1366 x 768080
Intel Core i7
AMD Radeon HD 6770M
Integrated d Stereo
Mac OS X v10. 7 Lion
4 GB
750 GB
1920 x 1200
DELL XPS 15z
Processor:
Video Card:
Computer Networks
Intel Core i5 2430M
NVIDIA Ge Force GT 525M
Page7
[Type the document title]
Audio:
Operating System:
Memory(RAM):
Hard Drive Storage:
Screen Resolution:

APPLE MACBOOK AIR
Processor:
Video Card:
Audio:
Operating System:
Memory(RAM):
Hard Drive Storage:
Screen Resolution:

Wavws MaxxAudi 0.3
Windows 7 Home Premium 64
6 GB
500 GB
1280 x 720
Intel Core i5-560UM
Intel HD Graphics 4000
Integrated d Stereo
Mac OS X v10. 7 Lion
4 GB
128 GB
1366 x 768
SONY VAIO S SERIES
Processor:
Video Card:
Audio:
Operating System:
Memory(RAM):
Hard Drive Storage:
Screen Resolution:
Computer Networks
Intel Core i5-2450M
NVIDIA Ge Force GT 640M LE
Integrated d
Windows 7 Home Premium
6 GB
640 Gb
1600 x 900
Page8
[Type the document title]
PRACTICAL NO:2
FAMILARIZATION WITH NETWORKING COMPONENTS AND DEVICES
NETWORKING COMPONENTS/DEVICES:Networking hardware or networking equipment typically refers to devices facilitating the use
of a computer network. Typically, this includes gateways, routers, network bridges, switches,
hubs, and repeaters. Also, hybrid network devices such as multilayer switches, protocol
converters, bridge routers, proxy servers, firewalls, network address translators, multiplexers,
network interface controllers, wireless network interface controllers, modems, ISDN terminal
adapters, line drivers, wireless access points, networking cables and other related hardware.
Computer networking devices are units that mediate data in a computer network. Computer
networking devices are also called network equipment, Intermediate Systems (IS) or
Interworking Unit (IWU). Units which are the last receiver or generate data are called hosts or
data terminal equipment.
VARIOUS NETWORKING DEVICES : SWITCHES:- A network switch is a computer networking device that links network
segments or network devices. The term commonly refers to a multi-port network bridge
that processes and routes data at the data link layer of the OSI model. Switches that
additionally process data at the network layer and above are often called or multilayer
switches.Switches exist for various types of networks including Fibre Channel,
Asynchronous Transfer Mode, Infini Band, Ethernet and others.
USES:- A switch is a telecommunication device which receives a message from any
device connected to it and then transmits the message only to the device for which the
message was meant. This makes the switch a more intelligent device than a hub (which
receives a message and then transmits it to all the other devices on its network). The
network switch plays an integral part in most modern Ethernet local area networks
(LANs). Mid-to-large sized LANs contain a number of linked managed switches.
Computer Networks
Page9
[Type the document title]
Fig2.1 Representing a switch
 HUB:- It is a device for connecting multiple Ethernet devices together and making
them act as a single network segment. It has multiple input/output (I/O) ports, in which
a signal introduced at the input of any port appears at the output of every port except
the original incoming. A hub works at the physical layer of the OSI model. The
device is a form of multiport repeater. Repeater hubs also participate in collision
detection, forwarding a jam signal to all ports if it detects a collision.
USES OF HUB:-


For inserting a protocol analyzer into a network connection, a hub is an alternative to a
network tap or port mirroring.
When a switch is accessible for end users to make connections, for example, in a
conference room, an inexperienced or careless user can bring down the network by
connecting two ports together, causing a switching loop. This can be prevented by using a
hub, where a loop will break other users on the hub, but not the rest of the network.

Fig2.2 Representing a hub
ROUTER:- It is a device that forwards data packets between computer networks,
creating an overlay internetwork. A router is connected to two or more data lines from
different networks. When a data packet comes in one of the lines, the router reads the
address information in the packet to determine its ultimate destination. Then, using
Computer Networks
Page10
[Type the document title]
information in its routing table or routing policy, it directs the packet to the next
network on its journey. Routers perform the "traffic directing" functions on the
Internet. A data packet is typically forwarded from one router to another through the
networks that constitute the internetwork until it gets to its destination node.
USES OF ROUTER:

Routers may provide connectivity within enterprises, between enterprises and the
Internet, and between internet service providers (ISPs) networks. The largest routers
(such as the Cisco CRS-1 or Juniper T1600) interconnect the various ISPs, or may be
used in large enterprise networks.
Routers may also be used to connect two or more logical groups of computer devices
known as subnets, each with a different sub-network address. The subnets addresses
recorded in the router do not necessarily map directly to the physical interface
connections.[2] A router has two stages of operation called planes:[
Fig2.3 Repesenting a router.
 LAN ADAPTER:- It is a device used to allow a computer to interface with a
network. Many computers may have some sort of LAN adapter already installed, but
others may require a special installation, which is accomplished by adding a network
interface card to the system or possibly connecting the adapter to a USB port.
USES OF LAN ADAPTER:

Most networks that are used in an office or home environment are known as local area
networks (LANs). This type of network is one used over a limited geographic area. Most
of the time, the network goes no further than the building which houses its main
components, though that is not always the case. A LAN adapter is simply one that is able
to access this type of network.
A LAN adapter can be used with a wireless or wired network, though when purchasing
on, it is important to understand what type of network and connection is needed. In most
Computer Networks
Page11
[Type the document title]
cases, a wireless LAN adapter cannot be used for a wired network and vice versa. Those
needing an adapter but unsure of the type should consult their network administrators for
more information.
Fig2.4 Representing LAN adapter
Other hardware for establishing networks or dial-up connections:
 NETWORK INTERFACE CONTROLLER:- (also known as a network interface
card, network adapter, LAN adapter and by similar terms) is a computer hardware
component that connects a computer to a computer network.


Early network interface controllers were commonly implemented on expansion cards that
plugged into a computer bus; the low cost and ubiquity of the Ethernet standard means
that most newer computers have a network interface built into the motherboard.
The network controller implements the electronic circuitry required to communicate
using a specific physical layer and data link layer standard such as Ethernet, Wi-Fi or
Token Ring. This provides a base for a full network protocol stack, allowing
communication among small groups of computers on the same LAN and large-scale
network communications through routable protocols, such as IP.
Fig2.7 Representing NIC
 MODEM (modulator-demodulator):- It is a device that modulates an analog carrier
signal to encode digital information, and also demodulates such a carrier signal to
decode the transmitted information. The goal is to produce a signal that can be
transmitted easily and decoded to reproduce the original digital data. Modems can be
used over any means of transmitting analog signals, from light emitting diodes to
Computer Networks
Page12
[Type the document title]
radio. The most familiar example is a voice band modem that turns the digital data of
a personal computer into modulated electrical signals in the voice frequency range of
a telephone channel. These signals can be transmitted over telephone lines and
demodulated by another modem at the receiver side to recover the digital data.
Representing a modem
Computer Networks
Page13
[Type the document title]
PRACTICAL NO:3
Familiarization with Transmission media and tools: Co-axial cable, UTP cable, Crimping
tools, Connectors etc.
Transmission media:The means through which data is transformed from one place to another is called transmission or
communication media. Transmission media is a pathway through which data are transmitted in
communication networks. So, a transmission medium can be defined as anything that can carry
information from a source to destination. For example, the transmission medium for sound
received by the ears is usually air, but solids and liquids may also act as transmission media for
sound. There are two categories of transmission media used in computer communications.

BOUNDED/GUIDED MEDIA

UNBOUNDED/UNGUIDED MEDIA
GUIDED MEDIA:Guided media, which are those that provide a conduit from one device to another, include
twisted-pair cable, coaxial cable, and fiber-optic cable.Guided Transmission Media uses a
"cabling" system that guides the data signals along a specific path. The data signals are bound by
the "cabling" system. Guided Media is also known as Bound Media. Cabling is meant in a
generic sense in the previous sentences and is not meant to be interpreted as copper wire cabling
only. Cable is the medium through which information usually moves from one network device to
another.
Twisted pair cable and coaxial cable use metallic (copper) conductors that accept and transport
signals in the form of electric current. Optical fiber is a glass or plastic cable that accepts and
transports signals in the form of light. Three common types of bounded media are used of the
data transmission. These are

Coaxial Cable

Twisted Pairs Cable

Fiber Optics Cable
COAXIAL CABLE:
Coaxial cable is very common & widely used commutation media. For example TV wire is
usually coaxial. Coaxial cable gets its name because it contains two conductors that are parallel
Computer Networks
Page14
[Type the document title]
to each other. The center conductor in the cable is usually copper. The copper can be either a
solid wire or stranded martial.
Fig 3.1: Coaxial cable
Gauge is the measure of the cable thickness. It is measured by the Radio grade measurement, or
RG number. The high the RG number, the thinner the central conductor core, the lower the
number the thicker the core.
Here the most common coaxial standards.




50-Ohm RG-7 or RG-11 : used with thick Ethernet.
50-Ohm RG-58 : used with thin Ethernet
75-Ohm RG-59 : used with cable television
93-Ohm RG-62 : used with ARCNET.
 Characteristics of Coaxial cable:

Low cost

Easy to install

Up to 10Mbps capacity

Medium immunity form EMI

Medium of attenuation
Computer Networks
Page15
[Type the document title]
 Advantages Coaxial cable:

Inexpensive

Easy to wire

Easy to expand

Moderate level of EMI immunity
 Disadvantage Coaxial cable:

Single cable failure can take down an entire network.
TWISTED PAIR CABLE:
The most popular network cabling is Twisted pair. It is light weight, easy to install, inexpensive
and support many different types of network. It also supports the speed of 100 mps. Twisted pair
cabling is made of pairs of solid or stranded copper twisted along each other. The twists are done
to reduce vulnerably to EMI and cross talk. The number of pairs in the cable depends on the
type. The copper core is usually 22-AWG or 24-AWG.
Fig 3.2: Twisted pair cable
There are two types of twisted pairs cabling:
1. Unshielded twisted pair (UTP)
2. Shielded twisted pair (STP)
1. Unshielded twisted pair (UTP):UTP is more common. It can be either voice grade or data grade depending on the condition.
UTP cable normally has an impedance of 100 ohm. UTP cost less than STP and easily available
due to its many use. These are used in telephone lines and low speed data cable. These cable supports up to
Computer Networks
Page16
[Type the document title]
16 mps and are mostly used in 10 mps. UTP cables consist of 2 or 4 pairs of twisted cable. Cable with 2 pair
use RJ-11 connector and 4 pair cable use RJ-45 connector. Tighter the twisting, the higher is the supported
transmission rate and greater the cost per foot.
Fig 3.3: Unshielded twisted pair cable
Fig 3.3.1 : Categories
Characteristics of UTP:

low cost

easy to install

High speed capacity

High attenuation
Advantages of UTP:

Easy installation

Capable of high speed for LAN

Low cost
Computer Networks
Page17
[Type the document title]
Disadvantages of UTP:

Short distance due to attenuation
2. Shielded twisted pair (STP)
Shielded twisted pair cable has a mesh shielding that’s protects it from EMI which allows for higher
transmission rate. STP features two pairs of 22-AWG. This type include type 1 with 4 telephone pairs. This
type of STP consist of 1 pair of standard shielded 26-AWG.
Fig 3.4: Shielded Twisted pair
Characteristics of STP:

Medium cost

Easy to install

Higher capacity than UTP

Higher attenuation, but same as UTP

Medium immunity from EMI

100 meter limit
Computer Networks
Page18
[Type the document title]
Advantages of STP:

Shielded

Faster than UTP and coaxial
Disadvantages of STP:

More expensive than UTP and coaxial

More difficult installation

High attenuation rate
FIBER OPTICS
Fiber optic cable uses electrical signals to transmit data. It uses light. In fiber optic cable light
only moves in one direction for two way communication to take place a second connection must
be made between the two devices. It is actually two stands of cable. Each stand is responsible for
one direction of communication. A laser at one device sends pulse of light through this cable to
other device. These pulses translated into “1’s” and “0’s” at the other end.In the center of fiber
cable is a glass stand or core. The light from the laser moves through this glass to the other
device around the internal core is a reflective material known as CLADDING.
Fig 3.5: Fiber optical cable
Characteristics Of Fiber Optic Cable:

Expensive

Very hard to install

Capable of extremely high speed

Extremely low attenuation
Computer Networks
Page19
[Type the document title]

No EMI interference
Advantages Of Fiber Optic Cable:

Fast

Low attenuation

No EMI interference
Disadvantages Fiber Optics:

Very costly

Hard to install
UNGUIDED MEDIA
Unguided media or wireless media doesn't use any physical connectors between the two
devices communicating. Usually the transmission is send through the atmosphere but sometime
it can be just across the rule. Wireless media is used when a physical obstruction or distance
blocks are used with normal cable media. The three types of wireless media are:

Radio waves

Micro waves

Infrared waves
RADIO WAVES:
Radio waves are a type of electromagnetic radiation with wavelengths in the electromagnetic
spectrum longer than infrared light. Radio waves have frequencies from 300 GHz to as low as
3 kHz, and corresponding wavelengths from 1 millimeter to 100 kilometers. Like all other
electromagnetic waves, they travel at the speed of light. Naturally occurring radio waves are
made by lightning, or by astronomical objects. Artificially generated radio waves are used for
fixed
and
mobile radio
communication, broadcasting, radar and
other
navigation
systems, communications satellites, computer networks and innumerable other applications.
Different frequencies of radio waves have different propagation characteristics in the Earth's
atmosphere; long waves may cover a part of the Earth very consistently, shorter waves can
reflect off the ionosphere and travel around the world, and much shorter wavelengths bend or
reflect very little and travel on a line of sight.
Computer Networks
Page20
[Type the document title]
Fig 3.6: RADIO WAVES:
MICRO WAVES
Microwaves are radio waves with wavelengths ranging from as long as one meter to as short as
one millimeter, or equivalently, with frequencies between 300 MHz (0.3 GHz) and
300 GHz. This broad definition includes both UHF and EHF (millimeter waves), and various
sources use different boundaries. In all cases, microwave includes the entire SHF band (3 to
30 GHz, or 10 to 1 cm) at minimum, with RF engineering often putting the lower boundary at
1 GHz (30 cm), and the upper around 100 GHz (3 mm).
Fig 3.7 : MICRO WAVES
Computer Networks
Page21
[Type the document title]
INFRARED
Infrared technology allows computing devices to communicate via short-range wireless signals.
With infrared, computers can transfer files and other digital data bidirectionally. The infrared
transmission technology used in computers is similar to that used in consumer product remote
control units. Infrared communications span very short distances. Place two infrared devices
within a few feet (no more than 5 meters) of each other when networking them. Unlike WiFi and Bluetooth technologies, infrared network signals cannot penetrate walls or other
obstructions and work only in the direct "line of sight."
Fig 3.7 : INFRARED
CRIMPING TOOL
A crimping tool is a tool designed to crimp or connect a connector to the end of a cable. For
example, network cables and phone cables are created using a crimping tool to connect the RJ45 and RJ-11 connectors to the end of the cable. In the picture to the right, is an example of what
a crimping tool looks like. This example shows a tool capable of crimping both RJ-11 and RJ-45
connectors.
Computer Networks
Page22
[Type the document title]
Fig 3.8: Crimping tool
CONNECTORS
The world of connectors has a much smaller world of acronyms all its own. They consist of such
acronyms as RJ, SMA, ST, TNC, BNC, V.32, DIN, DB, N and more. One aspect that might
complicate the world of connectors is that many of these connectors are also known by more
than one name. Most of us know that a connector is best known for providing the physical link
between two components. Some example of the use of a connector might be a connector linking
a cable and a network interface card or NIC card, a connector linking a transceiver and a cable or
even a connector linking two cable segments.
Optical fiber connector: - Optical fiber connectors are used to join optical fibers where a
connect/disconnect capability is required. The basic connector unit is a connector assembly. A
connector assembly consists of an adapter and two connector plugs.
Fig 3.8: Optical fiber connector
Computer Networks
Page23
[Type the document title]
Registered jack:A registered jack (RJ) is a standardized physical network interface — both jack construction and
wiring pattern — for connecting telecommunications or data equipment to a service provided by
a local exchange carrier or long distance carrier. The standard designs for these connectors and
their wiring are named RJ11, RJ14, RJ21, RJ45, RJ48, etc. Many of these interface standards are
commonly used in North America, though some interfaces are used world-wide.
The physical connectors that registered jacks use are mainly of the modular connector and 50-pin
miniature ribbon connector types. For example, RJ11 uses a 6 position 2 conductor (6P2C)
modular plug and jack, while RJ21 uses a 50-pin miniature ribbon connector.
Fig 3.9: RJ 45 Connectors
RF connector:A coaxial RF connector is an electrical connector designed to work at radio frequencies in the
multi-megahertz range. RF connectors are typically used with coaxial cables and are designed to
maintain the shielding that the coaxial design offers. Better models also minimize the change in
transmission line impedance at the connection. Mechanically, they provide a fastening
mechanism (thread, bayonet, braces, push pull) and springs for a low ohmic electric contact
while sparing the gold surface, thus allowing above 1000 reconnects and reducing the insertion
force. Research activity in the area of radio-frequency (RF) circuit design has surged in the
2000s in direct response to the enormous market demand for inexpensive, high-data-rate wireless
transceivers.
Computer Networks
Page24
[Type the document title]
Fig 3.10: RF connector Connectors
Computer Networks
Page25
[Type the document title]
PRACTICAL NO:4
TO PREPARE STRAIGHT AND CROSS CABLES
Straight cable: Straight-Cable refers to cables that have the pin assignments on each end of the
cable. In other words Pin 1 connector A goes to Pin 1 on connector B, Pin 2 to Pin 2 ect.
Straight-Cable wired cables are most commonly used to connect a host to client. When we talk
about cat5e patch cables, the Straight-Through wired cat5e patch cable is used to connect
computers, printers and other network client devices to the router switch or hub (the host device
in this instance).
Making Straight Cable:
Requirements: Two RJ45 Connectors, Crimping tool & CAT 5 cable of desired
length(less than 250 meters).
Nomenclature: Brown (8), Brown White (7),
Green (6), Green White (3), Blue (4), Blue White (5),
Orange (2), Orange White (1)
Steps:
1. Remove the covering of CAT 5 cable.
2. Straighten the eight wires of the cable.
3. Using Crimping tool’s cutter cut the end of wires so that they are of same length
4. Arrange the wire in order 1, 2, 3, 4, 5, 6, 7 & 8 respectively as I have mention or as shown in
the diagram.
5. Insert the arranged cable in the RJ45 connector with clip pointing down exactly as shown in
the figure.
6. In crimping tool insert the head of RJ45 connector and crimp (press) it hardly.
7. Follow same step with same color order for the other end of cable too.
8. The wire you made by following these steps is a STRAIGHT cable.
Fig.4.1: Straight cable
Computer Networks
Page26
[Type the document title]
Fig.4.2: Reference Diagram(Straight Cable)
Making Cross Cable:
Of the Eight wires in Cat 5 not all are used for data transfer when using 100Mbps Ethernet card.
Only 2 pairs of cable are used i.e. 2 wire for transmitting signal and two wires for receiving
signal.
So now you can guess why we have to make CROSS CABLE for connecting same kind of
devices. Because if use same color coding on both the side than transmitter of one m/c will send
data to transmitter of another and data packets will lost, so we have to change wiring code so that
transmitter of one connects to reciver of other and vice-versa.
Reference diagram:
Fig.4.3: Refrence Diagram (Cross Cable)
Computer Networks
Page27
[Type the document title]
Steps:
Steps 1 to 6 are same as for STRAIGHT through cables
7. Only difference is in color coding of other side of wire.
8. Wire that is on 1st number on A-side (one end) should be on 3rd number on Bside (other side) & vice-versa.
9. Wire that is on 2st number on A-side (one end) should be on 6rd number on Bside (other side) & vice versa.
10. Now Crimp the RJ45 connector.
11. Your CROSS wire is completed.
Fig.4.3: Cross Cable
Computer Networks
Page28
[Type the document title]
PRACTICAL NO:5
Study of various LAN topologies and their creation using network devices, cables and
computers.
local area network (LAN) is a computer network covering a small physical area, like a home,
office, or small group of buildings, such as a school, or an airport. The defining characteristics of
LANs, in contrast to wide-area networks (WANs), include their usually higher data-transfer
rates, smaller geographic range, and lack of a need for leased telecommunication lines.
Components:-1.LAN Card: A network card, network adapter, network interface controller (NIC), network interface
card, or LAN adapter is a computer hardware component designed to allow computers to communicate
over a computer network. It is both an OSI layer 1 (physical layer) and layer 2 (data link layer) device, as
it provides physical access to a networking medium and provides a low-level addressing system through
the use of MAC addresses. It allows users to connect to each other either by using cables or wirelessly.
Although other network technologies exist, Ethernet has
achieved near-ubiquity since the mid-1990s. Every Ethernet
network card has a unique 48-bit serial number called a
MAC address, which is stored in ROM carried on the card.
Every computer on an Ethernet network must have a card
with a unique MAC address. Normally it is safe to assume
that no two network cards will share the same address,
because card vendors purchase blocks of addresses from the
Institute of Electrical and Electronics Engineers (IEEE) and
Computer Networks
Page29
[Type the document title]
assign a unique address to each card at the time of manufacture.
The card implements the electronic circuitry required to communicate using a specific physical
layer and data link layer standard such as Ethernet or token ring. This provides a base for a full
network protocol stack, allowing communication among small groups of computers on the same
LAN and large-scale network communications through routable protocols, such as IP.
There are four techniques used to transfer data, the NIC may use one or more of these
techniques.




Polling is where the microprocessor examines the status of the peripheral under program
control.
Programmed I/O is where the microprocessor alerts the designated peripheral by applying
its address to the system's address bus.
Interrupt-driven I/O is where the peripheral alerts the microprocessor that it's ready to
transfer data.
DMA is where the intelligent peripheral assumes control of the system bus to access
memory directly. This removes load from the CPU but requires a separate processor on
the card.
A network card typically has a twisted pair, BNC, or AUI socket where the network cable is
connected, and a few LEDs to inform the user of whether the network is active, and whether or
not there is data being transmitted on it. Network Cards are typically available in 10/100/1000
Mbit/s varieties. This means they can support a transfer rate of 10, 100 or 1000 Megabits per
second.
2.Network Switch.
Network switch is a computer networking device that connects network segments. The term
commonly refers to a Network bridge that processes and routes data at the Data link layer (layer
2) of the OSI model. Switches that additionally process data at the Network layer (layer 3 and
above) are often referred to as Layer 3 switches or Multilayer
switches.
The term network switch does not generally encompass
unintelligent or passive network devices such as hubs and
repeaters. The first Ethernet switch was introduced by Kalpana
in 1990.
As with hubs, Ethernet implementations of network switches
support either 10/100 Mbit/s or 10/100/1000 Mbit/s ports
Ethernet standards. Large switches may have 10 Gbit/s ports.
Switches differ from hubs in that they can have ports of
different speed.
Computer Networks
Page30
[Type the document title]
The network switch, packet switch (or just switch) plays an integral part in most Ethernet local
area networks or LANs. Mid-to-large sized LANs contain a number of linked managed switches.
Small office, home office (SOHO) applications typically use a single switch, or an all-purpose
converged device such as gateway access to small office/home office broadband services such as
DSL router or cable, Wi-Fi router. In most of these cases, the end user device contains a router
and components that interface to the particular physical broadband technology, as in the Linksys
8-port and 48-port devices. User devices may also include a telephone interface to VoIP.
In the context of a standard 10/100 Ethernet switch, a switch operates at the data-link layer of the
OSI model to create a different collision domain per switch port. If you have 4 computers
A/B/C/D on 4 switch ports, then A and B can transfer data between them as well as C and D at
the same time, and they will never interfere with each others' conversations. In the case of a
"hub" then they would all have to share the bandwidth, run in half-duplex and there would be
collisions and retransmissions. Using a switch is called micro-segmentation. It allows you to
have dedicated bandwidth on point to point connections with every computer and to therefore
run in full duplex with no collisions.
Topologies:
1.Bus
In computer architecture, a bus is a subsystem that transfers data between computer components
inside a computer or between computers. Unlike a point-to-point connection, a bus can logically
connect several peripherals over the same set of wires. Each bus defines its set of connectors to
physically plug devices, cards or cables together.
Early computer buses were literally parallel electrical buses with multiple connections, but the
term is now used for any physical arrangement
that provides the same logical functionality as a
parallel electrical bus. Modern computer buses
can use both parallel and bit-serial connections,
and can be wired in either a multidrop (electrical
parallel) or daisy chain topology, or connected by
switched hubs, as in the case of USB.
In a network, the master scheduler controls the
data traffic. If data is to be transferred the requesting computer sends a message to the scheduler,
which puts the request into a queue. The message contains an identification code which is
broadcast to all nodes of the network. The scheduler works out priorities and notifies the receiver
as soon as the bus is available.
The identified node takes the message and performs the data transfer between the two computers.
Having completed the data transfer the bus becomes free for the next request in the scheduler's
queue.
Computer Networks
Page31
[Type the document title]
Bus benefit: any computer can be accessed directly and messages can be sent in a relatively
simple and fast way. Disadvantage: needs a scheduler to assign frequencies and priorities to
organize the traffic.
2.Ring
A ring network is a network topology in which each
node connects to exactly two other nodes, forming a
single continuous pathway for signals through each
node - a ring. Data travels from node to node, with each
node along the way handling every packet.
Because a ring topology provides only one pathway
between any two nodes, ring networks may be
disrupted by the failure of a single link. A node failure
or cable break might isolate every node attached to the
ring. FDDI networks overcome this vulnerability by
sending data on a clockwise and a counterclockwise ring: in the event of a break data is wrapped
back onto the complementary ring before it reaches the end of the cable, maintaining a path to
every node along the resulting "C-Ring". 802.5 networks -- also known as IBM Token Ring
networks -- avoid the weakness of a ring topology altogether: they actually use a star topology at
the physical layer and a Multistation Access Unit to imitate a ring at the datalink layer.
3. Star Topology
A star configuration is simple: Each of several devices has its own cable that connects to a
central hub, or sometimes a switch, multipoint repeater, or even a Multistation Access Unit
(MAU). Data passes through the hub to reach other devices on the network. Ethernet over
unshielded twisted pair (UTP), whether it is 10BaseT, 100BaseT, or Gigabit, all use a star
topology.
Star networks are one of the most common computer network topologies. In its simplest form, a
star network consists of one central switch, hub or computer which acts as a router to transmit
messages. If the central node is passive, the originating node must be able to tolerate the
reception of an echo of its own transmission, delayed by the two-way transmission time (i.e. to
and from the central node) plus any delay generated in the central node. An active star network
has an active central node that usually has the means to prevent echo-related problems.
The star topology reduces the chance of network failure by connecting all of the systems to a
central node. When applied to a bus-based network, this central hub rebroadcasts all
transmissions received from any peripheral node to all peripheral nodes on the network,
sometimes including the originating node. All peripheral nodes may thus communicate with all
others by transmitting to, and receiving from, the central node only. The failure of a transmission
Computer Networks
Page32
[Type the document title]
line linking any peripheral node to the central node will result in the isolation of that peripheral
node from all others, but the rest of the systems will be unaffected.
Computer Networks
Page33
[Type the document title]
You will find that a star topology is most common in networks. This is mainly because of the
ease of configuring and troubleshooting it. If a wire or a single port on the hub or switch goes
bad, only one network node goes down, which prevents a huge impact on productivity overall
(unless the entire hub or switch fails-in which case, the whole LAN goes down). However,
because a star topology involves a central hub or switch as well as a lot more cabling, it costs
more to implement.
Disadvantages of a Star Network



Twisted pair cables typically used in star topologies are not as immune to interferences as
coxial cable
Expensive because of additional cabling and central hub require
If the centralize device fails the entire system is affected.
Advantages of Star Network








Easy to Install: Each device on network simply requires a cable run between it and the
concentrator device.
Flexible: Devices can be added or removed without affecting the other devices on the
network.
A single device or cable failure will not bring down the network
Easy to set up and to expand.as each device on the network simply requires a cable run
between it and the concentrator device
Any non-centralised failure will have very little effect on the network, whereas on a ring
network it would all fail with one fault.
Data Packets are sent quickly as they do not have to travel through any unnecessary
nodes.
Performance is greater with speeds capable of 10mbps to 100mbps or more
The ability to isolate individual devices in troubleshooting An intelligent central hub or
switch that can help diagnose and manage the network Adjusting traffic levels so that
computers that place heavy loads on the network are moved to separate hubs
4. TREE Topology
The type of network topology in which a central 'root' node (the top level of the hierarchy) is
connected to one or more other nodes that are one level lower in the hierarchy (i.e., the second
level) with a point-to-point link between each of the second level nodes and the top level central
'root' node, while each of the second level nodes that are connected to the top level central 'root'
node will also have one or more other nodes that are one level lower in the hierarchy (i.e., the
third level) connected to it, also with a point-to-point link, the top level central 'root' node being
the only node that has no other node above it in the hierarchy - the hierarchy of the tree is
symmetrical, each node in the network having a specific fixed number, f, of nodes connected to
it at the next lower level in the hierarchy, the number, f, being referred to as the 'branching factor'
of the hierarchical tree.
Computer Networks
Page34
[Type the document title]
A network that is based upon the physical hierarchical topology must have at least three levels in
the hierarchy of the tree, since a network with a central 'root' node and only one hierarchical
level below it would exhibit the physical topology of a star.


A network that is based upon the physical hierarchical topology and with a branching
factor of 1 would be classified as a physical linear topology.
The branching factor, f, is independent of the total number of nodes in the network and,
therefore, if the nodes in the network require ports for connection to other nodes the total
number of ports per node may be kept low even though the total number of nodes is large
Computer Networks
Page35
[Type the document title]


- this makes the effect of the cost of adding ports to each node totally dependent upon the
branching factor and may therefore be kept as low as required without any effect upon
the total number of nodes that are possible.
The total number of point-to-point links in a network that is based upon the physical
hierarchical topology will be one less that the total number of nodes in the network.
If the nodes in a network that is based upon the physical hierarchical topology are
required to perform any processing upon the data that is transmitted between nodes in the
network, the nodes that are at higher levels in the hierarchy will be required to perform
more processing operations on behalf of other nodes than the nodes that are lower in the
hierarchy.
5.Mesh Topology
A Mesh topology Provides each device with a point-to-point connection to every other device in
the network. These are most commonly used in WAN's, which connect networks over
telecommunication links. Mesh topologies use routers to determine the best path. Mesh networks
provide redundancy, in the event of a link failure, meshed networks enable data to be routed
through any other site connected to the network. Because each device has a point-to-point
connection to every other device, mesh topologies are the most expensive and difficult to
maintain.
Mesh networks differ from other networks in that the component parts can all connect to each
other via multiple hops, and they generally are not mobile. Mobile ad-hoc networking
(MANET), featured in many consumer devices, is a subsection of mesh networking. Mesh
networks are self-healing: the network can still operate even when a node breaks down or a
connection goes bad. As a result, a very reliable network is formed.
This concept is applicable to wireless networks, wired networks, and software interaction. There
are three distinct generations of wireless mesh architectures. In the first generation one radio
provides both backhaul (packet relaying) and client services (access to a laptop). In the second
generation, one radio relayed packets over multiple hops while another provided client access.
This significantly improved backhaul bandwidth and latency. Third generation wireless mesh
products use two or more radios for the backhaul for higher bandwidth and low latency. Third
Computer Networks
Page36
[Type the document title]
generation mesh products are replacing previous generation products as more demanding
applications like voice and video need to be relayed wirelessly over many hops of the mesh
network.
6. Hybrid
Hybrid networks use a combination of any two or more topologies in such a way that the
resulting network does not exhibit one of the standard topologies (e.g., bus, star, ring, etc.). For
example, a tree network connected to a tree network is still a tree network topology. A hybrid
topology is always produced when two different basic network topologies are connected. Two
common examples for Hybrid network are: star ring network and star bus network


A Star ring network consists of two or more star topologies connected using
a multistation access unit (MAU) as a centralized hub.
A Star Bus network consists of two or more star topologies connected using a bus
trunk (the bus trunk serves as the network's backbone).
While grid and torus networks have found popularity in high-performance
computing applications, some systems have used genetic algorithms to design custom networks
that have the fewest possible hops in between different nodes. Some of the resulting layouts are
nearly incomprehensible, although they function quite well.
Computer Networks
Page37
Download