Local Area Networking Tutorial
Local Area Networking Tutorial
A network is any collection of independent computers that communicate with one another
over a shared network medium. A computer network is a collection of two or more
connected computers. When these computers are joined in a network, people can share files
and peripherals such as modems, printers, tape backup drives, or CD-ROM drives. When
networks at multiple locations are connected using services available from phone companies,
people can send e-mail, share links to the global Internet, or conduct video conferences in
real time with other remote users. When a network becomes open sourced it can be
managed properly with online collaboration software. As companies rely on applications like
electronic mail and database management for core business operations, computer
networking becomes increasingly more important.
Types of Networks:
A network is any collection of independent computers that communicate with one another
over a shared network medium. LANs are networks usually confined to a geographic area,
such as a single building or a college campus. LANs can be small, linking as few as three
computers, but often link hundreds of computers used by thousands of people. The
development of standard networking protocols and media has resulted in worldwide
proliferation of LANs throughout business and educational organizations.
Wide area networking combines multiple LANs that are geographically separate. This is
accomplished by connecting the different LANs using services such as dedicated leased
phone lines, dial-up phone lines (both synchronous and asynchronous), satellite links, and
data packet carrier services. Wide area networking can be as simple as a modem and remote
access server for employees to dial into, or it can be as complex as hundreds of branch
offices globally linked using special routing protocols and filters to minimize the expense of
sending data sent over vast distances.
Internet
The Internet is a system of linked networks that are worldwide
in scope and facilitate data communication services such as
remote login, file transfer, electronic mail, the World Wide Web.
Intranet
With the advancements made in browser-based software for the Internet, many private
organizations are implementing intranets. An intranet is a private network utilizing Internet-
type tools, but available only within that organization. For large organizations, an intranet
provides an easy access mode to corporate information for employees.
VPN uses a technique known as tunneling to transfer data securely on the Internet to a
remote access server on your workplace network. Using a VPN helps you save money by
using the public Internet instead of making long–distance phone calls to connect securely
with your private network. There are two ways to create a VPN connection, by dialing an
Internet service provider (ISP), or connecting directly to Internet.
Categories of Network:
Network can be divided in to two main categories:
• Peer-to-peer.
• Server – based.
Peer-to-peer networks are good choices for needs of small organizations where the users are
allocated in the same general area, security is not an issue and the organization and the network will
have limited growth within the foreseeable future.
The term Client/server refers to the concept of sharing the work involved in processing data between
the client computer and the most powerful server computer.
Client/server application design also lets the application provider mask the actual location of
application function. The user often does not know where a specific operation is executing.
The entire function may execute in either the PC or server, or the function may be split
between them. This masking of application function locations enables system implementers
to upgrade portions of a system over time with a minimum disruption of application
operations, while protecting the investment in existing hardware and software.
The OSI Model:
Open System Interconnection (OSI)
reference model has become an
International standard and serves as a guide
for networking. This model is the best
known and most widely used guide to
describe networking environments.
Vendors design network products based on
the specifications of the OSI model. It
provides a description of how network
hardware and software work together in a
layered fashion to make communications
possible. It also helps with trouble shooting
by providing a frame of reference that
describes how components are supposed to
function.
There are seven to get familiar with and these are the physical layer, data link layer, network
layer, transport layer, session layer, presentation layer, and the application layer.
• Physical Layer, is just that the physical parts of the network such as wires, cables, and there
media along with the length. Also this layer takes note of the electrical signals that transmit
data throughout system.
• Data Link Layer, this layer is where we actually assign meaning to the electrical signals in the
network. The layer also determines the size and format of data sent to printers, and other
devices. Also I don't want to forget that these are also called nodes in the network. Another
thing to consider in this layer is will also allow and define the error detection and correction
schemes that insure data was sent and received.
• Network Layer, this layer provides the definition for the connection of two dissimilar
networks.
• Transport Layer, this layer allows data to be broken into smaller packages for data to be
distributed and addressed to other nodes (workstations).
• Session Layer, this layer helps out with the task to carry information from one node
(workstation) to another node (workstation). A session has to be made before we can
transport information to another computer.
• Presentation Layer, this layer is responsible to code and decode data sent to the node.
• Application Layer, this layer allows you to use an application that will communicate with say
the operation system of a server. A good example would be using your web browser to
interact with the operating system on a server such as Windows NT, which in turn gets the
data you requested.
Network Architectures:
Ethernet
Ethernet is the most popular physical layer LAN technology in use today. Other LAN types
include Token Ring, Fast Ethernet, Fiber Distributed Data Interface (FDDI), Asynchronous
Transfer Mode (ATM) and LocalTalk. Ethernet connection is popular because it strikes a good
balance between speed, cost and ease of installation. These benefits, combined with wide
acceptance in the computer marketplace and the ability to support virtually all popular
network protocols, make Ethernet an ideal networking technology for most computer users
today. The Institute for Electrical and Electronic Engineers (IEEE) defines the Ethernet
standard as IEEE Standard 802.3. This standard defines rules for configuring an Ethernet
network as well as specifying how elements in an Ethernet network interact with one
another. By adhering to the IEEE standard, network equipment and network protocols can
communicate efficiently.
Fast Ethernet
For Ethernet networks that need higher transmission speeds, the Fast Ethernet standard (IEEE
802.3u) has been established. This standard raises the Ethernet speed limit from 10 Megabits
per second (Mbps) to 100 Mbps with only minimal changes to the existing cable structure.
There are three types of Fast Ethernet: 100BASE-TX for use with level 5 UTP cable, 100BASE-
FX for use with fiber-optic cable, and 100BASE-T4 which utilizes an extra two wires for use
with level 3 UTP cable. The 100BASE-TX standard has become the most popular due to its
close compatibility with the 10BASE-T Ethernet standard. For the network manager, the
incorporation of Fast Ethernet into an existing configuration presents a host of decisions.
Managers must determine the number of users in each site on the network that need the
higher throughput, decide which segments of the backbone need to be reconfigured
specifically for 100BASE-T and then choose the necessary hardware to connect the 100BASE-
T segments with existing 10BASE-T segments. Gigabit Ethernet is a future technology that
promises a migration path beyond Fast Ethernet so the next generation of networks will
support even higher data transfer speeds.
Token Ring
FDDI
Although each network protocol is different, they all share the same physical cabling. This
common method of accessing the physical network allows multiple protocols to peacefully
coexist over the network media, and allows the builder of a network to use common
hardware for a variety of protocols. This concept is known as "protocol independence,"
What Is TCP/IP?
TCP stands for Transmission Control Protocol and IP stands for Internet Protocol. The term
TCP/IP is not limited just to these two protocols, however. Frequently, the term TCP/IP is
used to refer to a group of protocols related to the TCP and IP protocols such as the User
Datagram Protocol (UDP), File Transfer Protocol (FTP), Terminal Emulation Protocol (TELNET),
and so on.
In the late 1960s, DARPA (the Defense Advanced Research Project Agency), in the United
States, noticed that there was a rapid proliferation of computers in military communications.
Computers, because they can be easily programmed, provide flexibility in achieving network
functions that is not available with other types of communications equipment. The
computers then used in military communications were manufactured by different vendors
and were designed to interoperate with computers from that vendor only. Vendors used
proprietary protocols in their communications equipment. The military had a multi vendor
network but no common protocol to support the heterogeneous equipment from different
vendors
This type cable is usually yellow in color and used in what is called thicknets, and has two
conductors. This coax can be used in 500-meter lengths. The cable itself is made up of a solid
center wire with a braided metal shield and plastic sheathing protecting the rest of the wire.
As with the thick coaxial cable is used in thicknets the thin version is used in thinnets. This
type cable is also used called or referred to as RG-58. The cable is really just a cheaper
version of the thick cable.
Now you know about cables we need to know about connectors. This is pretty important and you will
most likely need the RJ-45 connector. This is the cousin of the phone jack connector and looks real
similar with the exception that the RJ-45 is bigger. Most commonly your connector are in two flavors
and this is BNC (Bayonet Naur Connector) used in thicknets and the RJ-45 used in smaller networks
using UTP/STP.
This is the most popular form of cables in the network and the cheapest form that you can go
with. The UTP has four pairs of wires and all inside plastic sheathing. The biggest reason that
we call it Twisted Pair is to protect the wires from interference from themselves. Each wire is
only protected with a thin plastic sheath.
Ethernet Cabling
Now to familiarize you with more on the Ethernet and it's cabling we need to look at the 10's.
10Base2, is considered the thin Ethernet, thinnet, and thinwire which uses light coaxial cable
to create a 10 Mbps network. The cable segments in this network can't be over 185 meters in
length. These cables connect with the BNC connector. Also as a note these unused
connection must have a terminator, which will be a 50-ohm terminator.
10Base5, this is considered a thicknet and is used with coaxial cable arrangement such as the
BNC connector. The good side to the coaxial cable is the high-speed transfer and cable
segments can be up to 500 meters between nodes/workstations. You will typically see the
same speed as the 10Base2 but larger cable lengths for more versatility.
10BaseT, the “T” stands for twisted as in UTP (Unshielded Twisted Pair) and uses this for
10Mbps of transfer. The down side to this is you can only have cable lengths of 100 meters
between nodes/workstations. The good side to this network is they are easy to set up and
cheap! This is why they are so common an ideal for small offices or homes.
100BaseT, is considered Fast Ethernet uses STP (Shielded Twisted Pair) reaching data transfer
of 100Mbps. This system is a little more expensive but still remains popular as the 10BaseT
and cheaper than most other type networks. This on of course would be the cheap fast
version.
10BaseF, this little guy has the advantage of fiber optics and the F stands for just that. This
arrangement is a little more complicated and uses special connectors and NIC's along with
hubs to create its network. Pretty darn neat and not to cheap on the wallet.
An important part of designing and installing an Ethernet is selecting the appropriate
Ethernet medium. There are four major types of media in use today: Thickwire for 10BASE5
networks, thin coax for 10BASE2 networks, unshielded twisted pair (UTP) for 10BASE-T
networks and fiber optic for 10BASE-FL or Fiber-Optic Inter-Repeater Link (FOIRL) networks.
This wide variety of media reflects the evolution of Ethernet and also points to the
technology's flexibility. Thickwire was one of the first cabling systems used in Ethernet but
was expensive and difficult to use. This evolved to thin coax, which is easier to work with and
less expensive.
Network Topologies:
What is a Network topology?
A network topology is the geometric arrangement of nodes and cable links in a LAN,
There are three topology's to think about when you get into networks. These are the star,
rind, and the bus.
Star, in a star topology each node has a dedicated set of wires connecting it to a central
network hub. Since all traffic passes through the hub, the hub becomes a central point for
isolating network problems and gathering network statistics.
Ring, a ring topology features a logically closed loop. Data packets travel in a single direction
around the ring from one network device to the next. Each network device acts as a repeater,
meaning it regenerates the signal
Bus, the bus topology, each node (computer, server, peripheral etc.) attaches directly to a
common cable. This topology most often serves as the backbone for a network. In some
instances, such as in classrooms or labs, a bus will connect small workgroups
Collisions:
Ethernet is a shared media, so there are rules for sending packets of data to avoid conflicts
and protect data integrity. Nodes determine when the network is available for sending
packets. It is possible that two nodes at different locations attempt to send data at the same
time. When both PCs are transferring a packet to the network at the same time, a collision
will result.
Minimizing collisions is a crucial element in the design and operation of networks. Increased
collisions are often the result of too many users on the network, which results in a lot of
contention for network bandwidth. This can slow the performance of the network from the
user's point of view. Segmenting the network, where a network is divided into different
pieces joined together logically with a bridge or switch, is one way of reducing an
overcrowded network.
Ethernet Products:
The standards and technology that have just been discussed help define the specific products
that network managers use to build Ethernet networks. The following text discusses the key
products needed to build an Ethernet LAN.
Transceivers
Transceivers are used to connect nodes to the various Ethernet media. Most computers and
network interface cards contain a built-in 10BASE-T or 10BASE2 transceiver, allowing them to
be connected directly to Ethernet without requiring an external transceiver. Many Ethernet
devices provide an AUI connector to allow the user to connect to any media type via an
external transceiver. The AUI connector consists of a 15-pin D-shell type connector, female
on the computer side, male on the transceiver side. Thickwire (10BASE5) cables also use
transceivers to allow connections.
For Fast Ethernet networks, a new interface called the MII (Media Independent Interface)
was developed to offer a flexible way to support 100 Mbps connections. The MII is a popular
way to connect 100BASE-FX links to copper-based Fast Ethernet devices.
Many NIC adapters comply with Plug-n-Play specifications. On these systems, NICs are
automatically configured without user intervention, while on non-Plug-n-Play systems,
configuration is done manually through a setup program and/or DIP switches.
Cards are available to support almost all networking standards, including the latest Fast
Ethernet environment. Fast Ethernet NICs are often 10/100 capable, and will automatically
set to the appropriate speed. Full duplex networking is another option, where a dedicated
connection to a switch allows a NIC to operate at twice the speed.
Hubs/Repeaters:
Hubs/repeaters are used to connect together two or more Ethernet segments of any media
type. In larger designs, signal quality begins to deteriorate as segments exceed their
maximum length. Hubs provide the signal amplification required to allow a segment to be
extended a greater distance. A hub takes any incoming signal and repeats it out all ports.
Ethernet hubs are necessary in star topologies such as 10BASE-T. A multi-port twisted pair
hub allows several point-to-point segments to be joined into one network. One end of the
point-to-point link is attached to the hub and the other is attached to the computer. If the
hub is attached to a backbone, then all computers at the end of the twisted pair segments
can communicate with all the hosts on the backbone. The number and type of hubs in any
one-collision domain is limited by the Ethernet rules. These repeater rules are discussed in
more detail later.
10BASE-T 2 100m
10BASE2 30 185m
10BASE5 100 500m
10BASE-FL 2 2000m
Bridges:
The function of a bridge is to connect separate networks together. Bridges connect different
networks types (such as Ethernet and Fast Ethernet) or networks of the same type. Bridges
map the Ethernet addresses of the nodes residing on each network segment and allow only
necessary traffic to pass through the bridge. When a packet is received by the bridge, the
bridge determines the destination and source segments. If the segments are the same, the
packet is dropped ("filtered"); if the segments are different, then the packet is "forwarded"
to the correct segment. Additionally, bridges do not forward bad or misaligned packets.
Bridges are also called "store-and-forward" devices because they look at the whole Ethernet
packet before making filtering or forwarding decisions. Filtering packets, and regenerating
forwarded packets enable bridging technology to split a network into separate collision
domains. This allows for greater distances and more repeaters to be used in the total
network design.
Ethernet Switches:
Ethernet switches are an expansion
of the concept in Ethernet bridging.
LAN switches can link four, six, ten
or more networks together, and
have two basic architectures: cut-
through and store-and-forward. In
the past, cut-through switches were
faster because they examined the
packet destination address only
before forwarding it on to its
destination segment. A store-and-
forward switch, on the other hand,
accepts and analyzes the entire packet before forwarding it to its destination.
It takes more time to examine the entire packet, but it allows the switch to catch certain
packet errors and keep them from propagating through the network. Both cut-through and
store-and-forward switches separate a network into collision domains, allowing network
design rules to be extended. Each of the segments attached to an Ethernet switch has a full
10 Mbps of bandwidth shared by fewer users, which results in better performance (as
opposed to hubs that only allow bandwidth sharing from a single Ethernet). Newer switches
today offer high-speed links, FDDI, Fast Ethernet or ATM. These are used to link switches
together or give added bandwidth to high-traffic servers. A network composed of a number
of switches linked together via uplinks is termed a "collapsed backbone" network.
Routers:
Routers filter out network traffic by specific protocol rather than by packet address. Routers
also divide networks logically instead of physically. An IP router can divide a network into
various subnets so that only traffic destined for particular IP addresses can pass between
segments. Network speed often decreases due to this type of intelligent forwarding. Such
filtering takes more time than that exercised in a switch or bridge, which only looks at the
Ethernet address. However, in more complex networks, overall efficiency is improved by
using routers.
A network using repeaters, for instance, functions with the timing constraints of Ethernet.
Although electrical signals on the Ethernet media travel near the speed of light, it still takes a
finite time for the signal to travel from one end of a large Ethernet to another. The Ethernet
standard assumes it will take roughly 50 microseconds for a signal to reach its destination.
Ethernet is subject to the "5-4-3" rule of repeater placement: the network can only have five
segments connected; it can only use four repeaters; and of the five segments, only three can
have users attached to them; the other two must be inter-repeater links.
If the design of the network violates these repeater and placement rules, then timing
guidelines will not be met and the sending station will resend that packet. This can lead to
lost packets and excessive resent packets, which can slow network performance and create
trouble for applications. Fast Ethernet has modified repeater rules, since the minimum
packet size takes less time to transmit than regular Ethernet. The length of the network links
allows for a fewer number of repeaters. In Fast Ethernet networks, there are two classes of
repeaters. Class I repeaters have a latency of 0.7 microseconds or less and are limited to one
repeater per network. Class II repeaters have a latency of 0.46 microseconds or less and are
limited to two repeaters per network. The following are the distance (diameter)
characteristics for these types of Fast Ethernet repeater combinations:
Each network connected via one of these devices is referred to as a separate collision domain
in the overall network.
Types of Servers:
Device Servers
Print servers, terminal servers, remote access servers and network time servers are examples
of device servers which are specialized for particular functions. Each of these types of servers
has unique configuration attributes in hardware or software that help them to perform best
in their particular arena.
Print Servers
Print servers allow printers to be shared by other users on the network. Supporting either
parallel and/or serial interfaces, a print server accepts print jobs from any person on the
network using supported protocols and manages those jobs on each appropriate printer.
Print servers generally do not contain a large amount of memory; printers simply store
information in a queue. When the desired printer becomes available, they allow the host to
transmit the data to the appropriate printer port on the server. The print server can then
simply queue and print each job in the order in which print requests are received, regardless
of protocol used or the size of the job.
Given its natural translation ability, a multi-protocol multiport device server can perform conversions
between the protocols it knows, like LAT and TCP/IP. While server bandwidth is not adequate for
large file transfers, it can easily handle host-to-host inquiry/response applications, electronic mailbox
checking, etc. And it is far more economical than the alternatives of acquiring expensive host
software and special-purpose converters. Multiport device and print servers give their users greater
flexibility in configuring and managing their networks.
Whether it is moving printers and other peripherals from one network to another, expanding the
dimensions of interoperability or preparing for growth, multiport device servers can fulfill your needs,
all without major rewiring.
Access Servers
While Ethernet is limited to a geographic area, remote users such as traveling sales people
need access to network-based resources. Remote LAN access, or remote access, is a popular
way to provide this connectivity. Access servers use telephone services to link a user or office
with an office network. Dial-up remote access solutions such as ISDN or asynchronous dial
introduce more flexibility. Dial-up remote access offers both the remote office and the
remote user the economy and flexibility of "pay as you go" telephone services. ISDN is a
special telephone service that offers three channels, two 64 Kbps "B" channels for user data
and a "D" channel for setting up the connection. With ISDN, the B channels can be combined
for double bandwidth or separated for different applications or users. With asynchronous
remote access, regular telephone lines are combined with modems and remote access
servers to allow users and networks to dial anywhere in the world and have data access.
Remote access servers provide connection points for both dial-in and dial-out applications on
the network to which they are attached. These hybrid devices route and filter protocols and
offer other services such as modem pooling and terminal/printer services. For the remote PC
user, one can connect from any available telephone jack (RJ45), including those in a hotel
rooms or on most airplanes.
A network time server is a server specialized in the handling of timing information from
sources such as satellites or radio broadcasts and is capable of providing this timing data to
its attached network. Specialized protocols such as NTP or udp/time allow a time server to
communicate to other network nodes ensuring that activities that must be coordinated
according to their time of execution are synchronized correctly. GPS satellites are one source
of information that can allow global installations to achieve constant timing.
IP Addressing:
An IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP
network. An IP address is a 32 bit binary number usually represented as 4 decimal values,
each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal
points. This is known as "dotted decimal" notation.
Example: 140.179.220.200
10001100.10110011.11011100.11001000
Every IP address consists of two parts, one identifying the network and one identifying the
node. The Class of the address and the subnet mask determine which part belongs to the
network address and which part belongs to the node address.
Address Classes:
There are 5 different address classes. You can determine which class any IP address is in by
examining the first 4 bits of the IP address.
Addresses beginning with 01111111, or 127 decimal, are reserved for loopback and for
internal testing on a local machine. [You can test this: you should always be able to ping
127.0.0.1, which points to yourself] Class D addresses are reserved for multicasting. Class E
addresses are reserved for future use. They should not be used for host addresses.
Now we can see how the Class determines, by default, which part of the IP address belongs
to the network (N) and which part belongs to the node (n).
Class A -- NNNNNNNN.nnnnnnnn.nnnnnnn.nnnnnnn
Class B -- NNNNNNNN.NNNNNNNN.nnnnnnnn.nnnnnnnn
Class C -- NNNNNNNN.NNNNNNNN.NNNNNNNN.nnnnnnnn
In the example, 140.179.220.200 is a Class B address so by default the Network part of the
address (also known as the Network Address) is defined by the first two octets (140.179.x.x)
and the node part is defined by the last 2 octets (x.x.220.200).
In order to specify the network address for a given IP address, the node section is set to all
"0"s. In our example, 140.179.0.0 specifies the network address for 140.179.220.200. When
the node section is set to all "1"s, it specifies a broadcast that is sent to all hosts on the
network. 140.179.255.255 specifies the example broadcast address. Note that this is true
regardless of the length of the node section.
Private Subnets:
There are three IP network addresses reserved for private networks. The addresses are
10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. They can be used by anyone setting up
internal IP networks, such as a lab or home LAN behind a NAT or proxy server or a router. It is
always safe to use these because routers on the Internet will never forward packets coming
from these addresses.
Subnetting an IP Network can be done for a variety of reasons, including organization, use of
different physical media (such as Ethernet, FDDI, WAN, etc.), preservation of address space,
and security. The most common reason is to control network traffic. In an Ethernet network,
all nodes on a segment see all the packets transmitted by all the other nodes on that
segment. Performance can be adversely affected under heavy traffic loads, due to collisions
and the resulting retransmissions. A router is used to connect IP networks to minimize the
amount of traffic each segment must receive.
Subnet Masking
Applying a subnet mask to an IP address allows you to identify the network and node parts of
the address. The network bits are represented by the 1s in the mask, and the node bits are
represented by the 0s. Performing a bitwise logical AND operation between the IP address
and the subnet mask results in the Network Address or Number.
For example, using our test IP address and the default Class B subnet mask, we get:
CIDR was invented several years ago to keep the internet from running out of IP addresses.
The "classful" system of allocating IP addresses can be very wasteful; anyone who could
reasonably show a need for more that 254 host addresses was given a Class B address block
of 65533 host addresses. Even more wasteful were companies and organizations that were
allocated Class A address blocks, which contain over 16 Million host addresses! Only a tiny
percentage of the allocated Class A and Class B address space has ever been actually assigned
to a host computer on the Internet.
People realized that addresses could be conserved if the class system was eliminated. By
accurately allocating only the amount of address space that was actually needed, the address
space crisis could be avoided for many years. This was first proposed in 1992 as a scheme
called Supernetting.
The use of a CIDR notated address is the same as for a Classful address. Classful addresses
can easily be written in CIDR notation (Class A = /8, Class B = /16, and Class C = /24)
PING is used to check for a response from another computer on the network. It can tell you a
great deal of information about the status of the network and the computers you are
communicating again.
Ping returns different responses depending on the computer in question. The responses are
similar depending on the options used.
Ping uses IP to request a response from the host. It does not use TCP
.It takes its name from a submarine sonar search - you send a short sound burst and listen for
an echo - a ping - coming back.
In an IP network, `ping' sends a short data burst - a single packet - and listens for a single
packet in reply. Since this tests the most basic function of an IP network (delivery of single
packet), it's easy to see how you can learn a lot from some `pings'.
To stop ping, type control-c. This terminates the program and prints out a nice summary of
the number of packets transmitted, the number received, and the percentage of packets lost,
plus the minimum, average, and maximum round-trip times of the packets.
The Time To Live (TTL) field can be interesting. The main purpose of this is so that a packet
doesn't live forever on the network and will eventually die when it is deemed "lost." But for
us, it provides additional information. We can use the TTL to determine approximately how
many router hops the packet has gone through. In this case it's 255 minus N hops, where N is
the TTL of the returning Echo Replies. If the TTL field varies in successive pings, it could
indicate that the successive reply packets are going via different routes, which isn't a great
thing.
The time field is an indication of the round-trip time to get a packet to the remote host. The
reply is measured in milliseconds. In general, it's best if round-trip times are under 200
milliseconds. The time it takes a packet to reach its destination is called latency. If you see a
large variance in the round-trip times (which is called "jitter"), you are going to see poor
performance talking to the host
NSLOOKUP
It is very important when troubleshooting problems on a network that you can verify the
components of the networking process. Nslookup allows this by revealing details within the
infrastructure.
NETSTAT
NETSTAT is used to look up the various active connections within a computer. It is helpful to
understand what computers or networks you are connected to. This allows you to further
investigate problems. One host may be responding well but another may be less responsive.
IPconfig
This is a Microsoft windows NT, 2000 command. It is very useful in determining what could
be wrong with a network.
This command when used with the /all switch, reveal enormous amounts of troubleshooting
information within the system.
Windows 2000 IP Configuration
A crimping tool is a tool designed to crimp or connect a connector to the end of a cable. For
example, network cables and phone cables are created using a crimping tool to connect the
RJ-45 and RJ-11 connectors to the end of the cable. In the picture to the right, is an example
of what a crimping tool looks like. This example shows a tool capable of crimping both RJ-11
and RJ-45 connectors.
Crimping RJ-45 connectors onto CAT-5 cable can be frustrating. Some techniques make the process
of installing RJ-45 connectors easier.
Lesson one: Not all RJ-45 connectors are created equally. One reason why CAT-6 cable is much
harder to work with than CAT-5 cable is that CAT-6 is quite a bit thicker. So it's hard to get RJ-45
connectors intended for CAT-5 cable to attach properly to CAT-6 cable. When you're shopping for
RJ-45 connectors, make sure the ones you buy are suitable for CAT-6. The picture below shows a
CAT-5 and a CAT-6 connector the CAT-6 connector is the darker one).
RJ-45 connectors intended for use with CAT-6 cable are larger than their CAT-5 counterparts. But
even with the correct types of connectors, working with CAT-6 cable can be tough. Still, you can
make the process easier. Begin by stripping the outer covering from the end of the cable. Remove
about an inch of covering. Eventually you'll have to cut down the amount of exposed cable, but the
process of installing the RJ-45 connector will be easier if you have plenty of exposed cable to work
with (but not too much).
Once you remove the outer cover, you'll see that some of the pairs of wire are twisted together
(hence the name twisted-pair cable). Untwist these wires. Once all the wires have been separated,
pull them backward, as shown below, so you can cut off the exposed plastic core, as shown below.
Remove as much of this core as you can. Be careful not to accidentally cut the wires in the process.
Now that the core has been removed, your next task is to straighten the wires that were previously
twisted. The easiest way to do this is by using two pairs of tweezers. Use one set of tweezers to firmly
hold the wire just beneath a bend, and the other pair to straighten the bend. The wires don't have to
be perfectly straight, but the straighter they are, the easier your job will be.
Once you've straightened the wires, your next task is to arrange them in the order they'll be placed
into the RJ-45 connector. Working from left to right, the order of the wires is:
Orange with a white stripe
Orange
Green with a white stripe
Blue
Blue with a white stripe
Green
Brown with a white stripe
Brown
Since the leftmost wire is the orange with the white stripe, there's a natural tendency to start with
this wire on the left. Although it's possible to get the wires in the correct order using this technique,
getting the wires to stay in order when you insert the RJ-45 connector becomes very difficult.
Rather than starting with the orange and white wire, lining up the wires is a lot easier if you start with
the green wire with the white stripe, and then work on lining up the blue, blue and white, and green
wires. When all is said and done, the wires will still have to be in the correct order, but starting with
the green and white wire forces you to turn the cable a different direction than if you were initially
working with the orange and white wire. This seems to make all the difference
The easiest way to slide the RJ-45 connector onto the cable is to use your thumb to apply pressure to
the cable in the spot where the wires are first exposed from beneath the insulation. This will help
keep the wires in order.
When the cable is finally cut to the correct length, you should check a few things before crimping the
cable. First, make sure the wires go all the way to the end of the RJ-45 connector, as shown below.
The easiest way to do this is to look at the end of the connector and make sure you see copper in
each wire slot. This is difficult to photograph, the figure below shows that the wire goes all the way to
the end of the connector.
Network: How to Make CROSS & STRAIGHT cable
STEP 1: Choose the right cable…
1. To Connect PC to PC Cross Cable.
Nomenclature: let us first give a number scheme for cabling which we will
follow throughout this tuto. BROWN (8), BROWN WHITE (7),
GREEN (6), GREEN WHITE (3), BLUE (4), BLUE WHITE (5),
ORANGE (2), ORANGE WHITE (1)
Requirements: Two RJ45 Connectors, Crimping tool & CAT 5 cable of desired
length(less than 250 meters).
STEP 3.1:
There are two standards adopted for Cabling EIA/TIA 568A & EIA/TIA 568B.
When you use single standard (either EIA/TIA 568A or EIA/TIA 568B) on both the end of cable
then the resulting cable is STRAIGHT CABLE.
On the other hand if you use different cabling standard on the ends of cable then the
resulting cable is CROSS CABLE
I’ll use EIA/TIA 568B standard for creating cross and straight cable
The figure below very well define the EIA/TIA 568B standard…
1. Remove the covering of CAT 5 cable.
2. Straighten the eight wires of the cable.
3. Using Crimping tool’s cutter cut the end of wires so that they are of same length
4. Arrange the wire in order 1, 2, 3, 4, 5, 6, 7 & 8 respectively as I have mention or as shown
in the diagram.
5. Insert the arranged cable in the RJ45 connector with clip pointing down exactly as shown
in the figure.
6. In crimping tool insert the head of RJ45 connector and crimp (press) it hardly.
7. Follow same step with same color order for the other end of cable too.
8. The wire you made by following these steps is a STRAIGHT cable.
Of the Eight wires in Cat 5 not all are used for data transfer when using 100Mbps Ethernet
card. Only 2 pairs of cable are used i.e. 2 wire for transmitting signal and two wires for
receiving signal.
So now you can guess why we have to make CROSS CABLE for connecting same kind of
devices. Because if use same color coding on both the side than transmitter of one m/c will
send data to transmitter of another and data packets will lost, so we have to change wiring
code so that transmitter of one connects to reciver of other and vice-versa.