Manual Ofc
Manual Ofc
NEC 751
Prepared by
_________________________________
Syllabus
Practical Objectives
Mapping of Program Outcomes with Practical Objectives
Mapping of Program Educational Objectives with Program Outcomes
Session Plan
Laboratory policies & Report format
Evaluation sheet
Each experiment should be with post lab questions with answer key
1 NEC-751 Optical 0 0 2 20 20 30 50 1
Communication &
Networking lab
S. No. Objectives
NEC751.01 Expertise in setting up of optical fiber link and calculating the losses occurring.
NEC751.02 Knowledge of practical usage in networking cables.
COURSE: B.Tech
CREDIT: 01
PREREQUISITES COURSES:
PREREQUISITIES BY TOPIC:
Ray theory transmission, Total internal reflection, acceptance angle, numerical aperture, skew rays.
S.No. Item %
1. Attendance 20
2. In lab performance 40
3. Record 30
4. Post lab Viva-voce 10
2. The lab reports will be written individually. Please use the following format for your lab
reports.
a. Cover Page Include your name, Subject Code, Subject title, Name of the College
3. Your work must be original and prepared independently. However, if you need any guidance
or have any questions or problems, please do not hesitate to approach your staffin charge.
The students should follow the dress code in the Lab session.
5. Reports Due Dates: Reports should be submitted immediately after next week of the
experiment. A late lab report will have 20% of the points deducted for being one day late.If a
report is 3 days late, a grade/marks of D/0 will be assigned.
.
Apparatus Required:-
THEORY:
This experiment is familiarizing the user with OFT. An analog fiber optic link is to be setup in this
experiment. The preparation of the optical fiber for coupling light into it and the coupling of the fiber to
the LED and detector are described in appendix a. the LED used is an 850nm LED. The fiber is a
multimedia fiber with a core diameter of 1000m. The detector is a simple PIN detector. The LED
optical power output is directly proportional to the current driving the LED. Similarly for the pin diode
the current is proportional to the amount of light falling on the detector. Thus even though the LED and
the pin diode are non-linear devices, the current in the pin diode is directly proportional to the driving
current of LED. This makes the optical communication system a linear system.
PROCEDURE:
2. Apply a 1 V P-P sine wave without any D.C. to I/O 3 BNC post.
3. Connect the 3 pin patch cord between I/O 3 and I/O 2 and P11 post.
4. Connect the 1.25m fiber patch cord between LED1 and PD1.
10. Plot the received signal amplitude as a function of frequency using a logarithmic scale and
measure the frequency range for which the response is flat to find the bandwidth.
Result:
Object: The objective of this experiment is to measure the losses in an optical fiber communication
link.
Apparatus Required:-
Attenuation measurement:
Procedure:
1. Set the switch position to Analog in the kit.
2. Apply a 1 V P-P sine wave without any D.C. to I/O 3 BNC post.
3. Connect the 3 pin patch cord between I/O 3 and I/O 2 and P11 post.
4. Connect the 1.25m fiber patch cord between LED1 and PD1.
5. Connect a 2 pin patch cord between P31 and I/O 1.
6. Connect I/O 2 to oscilloscope channel 1 and I/O 1 to channel 2.
7. Observe the input sine wave at channel 1 and output at channel 2.
8. Adjust the gain such that no clipping take place.
9. Measure it as V1.
10. Replace the 1.25m cable with 3.25m cable without changing the gain.
11. Measure the received signal as V3.
Bending loss measurement:
1. Setup an Analog link.
2. Bend the fiber to form a loop.
3. Reduce the diameter of the loop and measure the amplitude of the received signal.
4. Plot the graph between radius of the bend and output amplitude.
Coupling loss:
1. Setup an Analog link.
2. Remove the fiber from LED1 and insert the 3.25m fiber.
3. Now align these two pieces of fiber using the Fiber Alignment Unit.
Formula:
Object:- To estimate the Numerical Aperture of the 1mm diameter plastic fiber at 650 nm.
Apparatus Required:-
THEORY:
Numerical aperture of the fiber is a measure of the acceptance angle of light in the fiber. Light which is
launched at angles greater than this maximum acceptable angle does not get coupled to propagating
modes in the fiber, and therefore does not reach the receiver at other end of the fiber. The NA is useful
in the computation of optical power coupled from an optical source to the fiber, from fiber to a photo
detector, and between two fibers.
PROCEDURE:
1. The interfaces used in the experiment are summarized in Table. Identify them on OFT kit with the
layout diagram. The block diagram is shown in fig. ensure that the shorting plugs of Tx data shorting
link S4, coded data shorting link S6, and Tx clock shorting link S5 in the Manchester coder block are
in position. Also ensure that the shorting plug of clock select jumper JP1 is across the posts B&A1. A
TTL signal from the multiplexer should now be driving LED2 in optical Tx2 block. This experiment is
best performed in a less illuminated room.
2. Ensure that the cut planes of the 1m plastic fiber are perpendicular to the axis of the fiber. If
required, prepare 1m of plastic fiber as per the instructions in appendix A.
3. Insert one end of fiber in to NA measurement unit as shown in figure. Adjust the fiber such that its
tip is 10mm from the screen.
4. Gently tighten the screw to hold the fiber firmly in place.
5. Connect the other end of the fiber to LED2 through the simplex connector. The fiber will project a
circular patch of red light on to the screen. Now measure the diameter of the circular patch of red light
in two perpendicular directions (BC and DE in Fig). The mean radius of the circular patch is given by
X = (DE +BC)/4
6. Carefully measure the distance d between the tip of the fiber and the illuminated screen (OA in Fig).
The Numerical Aperture of the fiber is given by
NA = Sin () =X/ ( (d2+X2)
7. Repeat steps 3 to 6 for different values of d. compute the average value of Numerical aperture.
The Numerical Aperture of the 1mm diameter plastic fiber at 650 nm is measured.
Object:- The objective of this experiment is to learn to set up the multiplexer and de-multiplexer and
to observe the simultaneous transmission of several channels (two voice and 8 data channels) using
Time Division Multiplexing.
Apparatus Required:-
THEORY:
OFT is as much a synchronous Time Division Multiplexing unit as it is a fiber optic communication
unit. The basic Multiplexer has twelve 64 kbps channels which are time multiplexed. The multiplexed
data stream is Manchester coded and the resulting TTL bit-stream drives the LEDs (E/O
converters).At the receiver the TTL signal is fed to a Manchester decoder which recovers the clock and
the data. Time Division Multiplexing is also the basis of time- switching used today in telecom
services. While multiplexing, say the voice signal from port1,V1 is transmitted before V2, the voice
signal from port2.but the receiver ,the first received signal can be fed to port2,and the later signal to
port1 ,resulting in switching between the two ports. If an asynchronous low bit rate signal is to be
inserted in a synchronous mux the simplest technique is to sample the input signal using submultiples
of mux output clock. However this gives rise to jitter in the received signal. This phenomenon is
studied in this experiment.
PROCEDURE:
Set up:
1. Set the jumpers and switches and short the shorting links as given in table. The experiment
requires the setting up of an 850 nm or 650 nm digital links as discussed in experiment.
2. Turn on at least one of the switches SW0-SW7 in the 8 bit data transmit block. This ensures
that this multiplexer is correctly aligned, and should be the normal practice when-ever the mux-
demux are being used.
3. Connect LED1 in the optical Tx1 block and PD1 in the optical Rx1 block using the 1m optical
fiber to set up the 850 nm digital link. Adjust the GAIN control until the LEDs L0-L7 in 8 bit
data receiver block light up corresponding to the ON positions of SW0-SW7.when the TDM
link is working the LEDs L8 and L9 in the marker detection block will be off without any
flicker. Toggle SWO and observe the toggling of L0.The digital link and the TDM MUX-
Department of Electronics and Communication Engineering
DEMUX are now set up. Connect the telephone handsets at PHONE1&PHONE 2.If there is
any difficulty in setting up the link, first set up the digital link as described in
experiment2.Ensure that the marker pattern settings are as per the power-on settings given in
table. Turn the power off and turn it on again to reset the markers in case they are different.
Press the reset switch in the marker detection block. The multiplexer demultiplexer should now
work.
4. OFT is now being used in the loop-back mode. The data and multiplexed on the transmit side
and demultiplexed on the receive side of the trainer. The voice input at the mouth piece is now
being looped backed through the fiber to the earpiece. Check this by disturbing the fiber link by
removing the fiber from PD1, while speaking into the mouth piece of one of the handsets.
5. Establish the fiber link again. Remove the shorting plugs of the voice enable shorting links S7
andS8 in the timing and control block on the transmitter side. Using the patch cards,
interchange the voice slots by interconnecting the slot Select 1 signal (postA of S7) to the voice
enable2 (postB of S8) and the slot select2 signal (post A of S8) to the voice enable1 (postB of
S7) at the TX side.voice1 and voice2 are cross connected and the conversation can be carried
out between the two people using the two phones. The two slots carrying voice data are now
time switched to provide necessary connection. Carry on a conversation, while at the same time
turning data switches SW0-SW7 on and off, to observe the simultaneous transmission of 8-bit
data in one channel and two voice channels on the link. Reconnect the shorting links S7and S8
to restore the original connection. However now remove the shorting plugs of voice enable
shorting links S27&S28 in the timing& control block on the receiver side, and cross connect
them as explained before. Note that once again the voice1 &voice2 are cross connected. This
cross connection is now on the Rx side. Now remove S7&S8 again and cross connect as before.
Note that voice 1 TX signal is now connected back to voice1 Rx. switching at both transmitter
and receiver cancel out each other.
6. Reconnect shorting links S7, S8, S27 and S28.Remove the shorting plugof voice1 shorting
linkS1 in the voice coder block (the phone1 mike is now detached).Feed a sinusoidal signal of
1KHz and 1V p-p with zero DC at postB of S1 and display it on channel 1 of the oscilloscope
.Trigger the scope on channel1.Observe the received signal at voice1 signal postP23 on
channel2 of the scope. Vary the frequency of the input signal and observe the received signal.
Note the lower frequency cutoff and higher frequency cutoff when the out put voltage falls to
0.7V peak to peak (3 db below 1V p-p).The signal is being digitized by a CODEC at 64 kbps,
multiplexed and transmitted on the fiber link. The received optical signal is converted to a TTL
signal demultiplexed to obtain the transmitted signal back. The signal at P23 is the
reconstructed version of the signal. The frequency response obtained is that of the CODEC
used to digitize and reconstruct the voice signal. Observe the received signal closely on the
oscilloscope. Note that it is a step approximation of the original signal as shown in fig .can you
explain why?
RESULT:
The simultaneous transmission of several channels (two voice and 8 data channels) using Time
Division Multiplexing are observed.
Aim: - The objective of this experiment is to study the Manchester Coding/Decoding used in the OFT
Trainer. The circuits used for Manchester coding and decoding, as well as their functioning at different
bit rates.
Apparatus: -
S. No. Name of Apparatus Specifications
1 OFT
2 Two channel 20 MHz Oscilloscope
3 Function generator, 1Hz-1MHz
Theory:
Most line coding techniques introduce extra transitions, and in the process increase the overall
bandwidth of the signal. The simplest of the line coding schemes used in optical communications is
MANCHESTER CODING. Here each ZERO is transmitted as a ZERO followed by a ONE and
each ONE is transmitted as a ONE followed by a ZERO as shown in Fig. Thus a transition is
introduced at the middle of each data bit, which can be used to easily recover the CLOCK at the
receiver. The price paid is the doubling of the effective bit rate on the fiber. In other line coding
schemes like mBnB, each m bits of data are coded into n bits, with n greater than m [usually by 1].
Procedure:
Result:
Manchester Coding/Decoding was studied.
Apparatus: -
S. No. Name of Apparatus Specifications
1 OFT
2 Two channel 20 MHz Oscilloscope
3 Function generator, 1Hz-1MHz
Theory:-
Attenuation is loss of power. During transit, light pulse lose some of their photons, thus reduce their
amplitude. Attenuation for a fiber is usually specified in decibels per kilometre. For commercially
available fibers attenuation ranges from 1dB/km for premium small-core glass fibres to over
2000dB/Km for a large core plastic fiber. Loss is by definition negative decibels. In common usage,
discussions of loss omit the negative sign. The basic measurement for loss in a fiber is done by taking
the logarithmic ratio of the input power (Pi) to the output power (Po).
= 10log (Pi/Po),
Where is Loss in dB / Meter
Procedure:
1. Connect Power Supply to board.
2. Make the following connections.
Function generators 1 KHz sine wave output to Input 1 socket of emitter 1circuit via 4 mm
lead.
Connect 0.5 m optic fiber between emitter 1 output and detector l's input.
Connect detector 1 output to amplifier 1 input socket via 4mm lead.
3. Switch on the Power Supply.
4. Set the Oscilloscope channel 1 to 0.5 V / Div and adjust 4log - 6 div amplitude by using X 1 probe
with the help of variable pot in function generator block at input 1 of Emitter 1.
5. Observe the output signal from detector TP10 on CRO.
6. Adjust the amplitude of the received signal same as that of transmitted one with the help of gain
adjust potentiometer in AC amplifier block. Note this amplitude and name it V1.
7. Now replace the previous FG cable with 1 m cable without disturbing any previous setting.
8. Measure the amplitude at the receiver side again at output of amplifier 1 socketTP 28. Note this
value end name it V2.
Calculate the propagation (attenuation) loss with the help of following formula.
V1 / V2 = e- (L1 + L2)
RESULT:
Propagation loss for optical fiber was calculated.
Apparatus Used:
S. No. Name of Apparatus Specifications
1 Cat5 cable
2 RJ 45 Connector
3 Crimping Tool
4 Wire Stripper
Theory:
Category 5 cable, commonly referred to as cat 5, is a twisted pair cable for carrying signals. This type
of cable is used in structured cabling for computer networks such as Ethernet. The cable standard
provides performance of up to 100 MHz and is suitable for 10BASE-T, 100BASE-TX (Fast Ethernet),
and 1000BASE-T (Gigabit Ethernet). Cat 5 is also used to carry other signals such as telephony and
video. This cable is commonly connected using punch-down blocks and modular connectors. Most
category 5 cables are unshielded, relying on the balanced line twisted pair design and differential
signaling for noise rejection. Category 5 was superseded by the category 5e (enhanced)
specification and later category 6 cable.
The specification for category 5 cable was defined in ANSI/TIA/EIA-568-A, with clarification in TSB-
95 These documents specify performance characteristics and test requirements for frequencies up to
100 MHz. Cable types, connector types and cabling topologies are defined by TIA/EIA-568-B. Nearly
always, 8P8C modular connectors (often referred to as RJ45 connectors) are used for connecting
category 5 cable. The cable is terminated in either the T568A scheme or the T568B scheme. The two
schemes work equally well and may be mixed in an installation so long as the same scheme is used on
both ends of each cable.
Begin by stripping the outer covering from the end of the cable. Remove about an inch of covering.
Eventually you'll have to cut down the amount of exposed cable, but the process of installing the RJ-45
connector will be easier if you have plenty of exposed cable to work with (but not too much). Once
you remove the outer cover, you'll see that some of the pairs of wire are twisted together (hence the
name twisted-pair cable). Untwist these wires. Once all the wires have been separated, pull them
backward, as shown below, so you can cut off the exposed plastic core, as shown below. Remove as
much of this core as you can. Be careful not to accidentally cut the wires in the process.
Orange
Blue
Green
Brown
Since the leftmost wire is the orange with the white stripe, there's a natural tendency to start with
this wire on the left. Although it's possible to get the wires in the correct order using this
technique, getting the wires to stay in order when you insert the RJ-45 connector becomes very
difficult. Rather than starting with the orange and white wire, lining up the wires is a lot easier if
Now that the wires are in the correct order, hold the RJ-45 connector next to the cable, as shown
below, to determine how much wire needs to be cut off, as shown below. You'll want to make
the cut so that the ends of the wires line up evenly. The proper length can be determined by
looking at the cable's outer insulation. The insulation should stop just inside of the RJ-45
connector. It's better to make a series of small cuts to determine the appropriate cable length than
to try to get it exactly right on the first cut. Test-fit the RJ-45 connector between each cut. If you
try to get the length exactly right on the first cut, you risk cutting the wires too short.
The easiest way to slide the RJ-45 connector onto the cable is to use your thumb to apply
pressure to the cable in the spot where the wires are first exposed from beneath the insulation.
This will help keep the wires in order. When the cable is finally cut to the correct length, you
should check a few things before crimping the cable. First, make sure the wires go all the way to
the end of the RJ-45 connector, as shown below. The easiest way to do this is to look at the end
of the connector and make sure you see copper in each wire slot. This is difficult to photograph,
the figure below shows that the wire goes all the way to the end of the connector.
Crimping Tool: A crimping tool is a device used to conjoin two pieces of metal by deforming
one or both of them in a way that causes them to hold each other. The result of the tool's work is
called a crimp. A good example of crimping is the process of affixing a connector to the end of a
cable. For instance, network cables and phone cables are created using a crimping tool (shown
below) to join the RJ-45 and RJ-11 connectors to the both ends of either phone or CAT5 cable.
Result: Hence, We have successfully studied about the different types of cables.
Apparatus Used:
S. No. Name of Apparatus Specifications
1 Cat5 cable
2 RJ 45 Connector
3 Crimping Tool
4 Wire Stripper
Theory:
Straight Cable
Straight cable is usually used to connect dissimilar devices. This type of cable will be used most
of the time and can be used to:
Crossover Cable
Crossover cable, is usually used to connect same type of devices. A crossover cable can be used
to:
Both side (side A and side B) of cable have wire arrangement with following different color .
Ping command: The ping command is a Command Prompt command used to test the ability of
the source computer to reach a specified destination computer. The ping command is usually
used as a simple way to verify that a computer can communicate over the network with another
computer or network device.
TRACERT prints out an ordered list of the intermediate routers that return ICMP "Time
Exceeded" messages. In the following example of the tracert command and its output, the packet
travels through two routers (157.54.48.1 and 11.1.0.67) to get to host 11.1.0.1. In this example,
the default gateway is 157.54.48.1 and the IP address of the router on the 11.1.0.0 network is at
11.1.0.67.
The command:
C:\>tracert 11.1.0.1
The output from the command:
---------------------------------------------------
1 2 ms 3 ms 2 ms 157.54.48.1
2 75 ms 83 ms 88 ms 11.1.0.67
3 73 ms 79 ms 93 ms 11.1.0.1
Trace complete.
Ifconfig is used to configure the kernel-resident network interfaces. It is used at boot time to set
up interfaces as necessary. After that, it is usually only needed when debugging or when system
tuning is needed.
If no arguments are given, ifconfig displays the status of the currently active interfaces. If a
single interface argument is given, it displays the status of the given interface only; if a single -
a argument is given, it displays the status of all interfaces, even those that are down. Otherwise,
it configures an interface.
Dig: The preferred way to query for DNS information from the command line is the Domain
Information Groper or dig dns tool. Using dig, you can find out what a particular DNS server
Result: Hence, We have successfully studied about the different types of commands.
a) Understand the working of a router & method to access the router via console or using telnet, different
types of cables used for connectivity.
Theory:
Subnetting is a process of dividing large network into the smaller networks based on layer 3 IP
address. Every computer on network has an IP address that represent its location on network.
Two version of IP addresses are available IPv4 and IPv6. In this article we will perform
subnetting on IPv4.
IPv4
IP addresses are displayed in dotted decimal notation, and appear as four numbers separated by
dots. Each number of an IP address is made from eight individual bits known as octet. Each octet
can create number value from 0 to 255. An IP address would be 32 bits long in binary divided
into the two components, network component and host component. Network component is used
to identify the network that the packet is intend for, and host component is used to identify the
individual host on network.
IP addresses are broken into the two components:
Subnetting breaks large network in smaller networks and smaller networks are easier to
manage.
Subnetting reduces network traffic by removing collision and broadcast traffic, that overall
improve performance.
Subnetting allows you to apply network security polices at the interconnection between
subnets.
Subnetting allows you to save money by reducing requirement for IP range.
Routers are special computers built to handle internetwork traffic. Routers are very important
network infrastructure devices and they serve many users at same time. The end users not
communicate with the routers, but the network traffic generated by the end users communicate
through the router.
There are no input devices for router like a monitor, a keyboard, or a mouse. An administrator
can choose any of the following methods to communicate with the router.
By connecting the router's console port to a workstation through a console cable. The console
port is the management port which is used by administrators to log into a router directly-that
without using a network connection. You require a terminal emulator application like hyper
terminal or PuTTY to connect to router. Console port connection is a way to connect to the
router when a router cannot be accessed over the network. Click the following link to learn how
to connect and access a router using console connection.
The routers can be managed over the network by using standard TCP/IP protocols like Telnet,
SSH, HTTP or HTTPS. Telnet was developed in the early days of the UNIX operating system to
manage computers remotely. A Telnet client and server application ships with Cisco's IOS
software and most computer operating systems.
Result: Hence, We have successfully studied about the subnet and configuring router.
Theory:
The Dynamic Host Configuration Protocol (DHCP) is a standardized network protocol used
on Internet Protocol (IP) networks. The DHCP protocol is controlled by a DHCP server that
dynamically distributes network configuration parameters, such as IP addresses, for interfaces
and services. A router or a residential gateway can be enabled to act as a DHCP server. A DHCP
server enables computers to request IP addresses and networking parameters automatically,
reducing the need for a network administrator or a user to configure these settings manually. In
the absence of a DHCP server, each computer or other device (eg., a printer) on the network
needs to be statically (ie., manually) assigned an IP address.
Requirements
Before you begin:
Determine the IP address pools and the lease durations to use for each subnet.
Obtain the MAC addresses of the clients that require permanent IP addresses. Determine the IP
addresses to use for these clients.
List the IP addresses that are available for the servers and devices on your network; for example,
DNS, NetBIOS servers, boot servers, and gateway devices. See the Understanding Management
Predefined Policy Applications.
Determine the DHCP options required by the subnets and clients in your network.
Overview
In this example, you configure the device as a DHCP server. You specify the IP address pool as
192.168.2.0/24 and from a low range of 192.168.2.2 to a high range of 192.168.2.254. You set
the default-lease-time to 1,209,600 and the maximum-lease-time to 2,419,200. You then set the
Then you specify the DNS server IP address as 192.168.10.2. You set the IP address for the
device solicitation address option (option 32) as 192.168.2.33. The IP address excluded from the
IP address pool is reserved for this option. Finally, you assign a fixed IP address as 192.168.2.50
with the MAC address of the client, 01:03:05:07:09:0B.
Configuration:
set system services dhcp pool 192.168.2.0/24 address-range low 192.168.2.2 high 192.168.2.254
Result: Hence, We have successfully studied about the DHCP servers and IIS tool.