0% found this document useful (0 votes)
1K views53 pages

Lan Project Report of Vissj Polytechnic

The document discusses implementing a LAN in a computer laboratory. It begins by introducing LANs and describing their basic components and uses. A LAN connects devices like computers, printers and servers within a small geographic area like a building to share resources. The laboratory will use a client-server network with Ethernet as the standard protocol. The summary describes the key aspects of the LAN implementation project for the computer laboratory.

Uploaded by

Chandu Chandu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views53 pages

Lan Project Report of Vissj Polytechnic

The document discusses implementing a LAN in a computer laboratory. It begins by introducing LANs and describing their basic components and uses. A LAN connects devices like computers, printers and servers within a small geographic area like a building to share resources. The laboratory will use a client-server network with Ethernet as the standard protocol. The summary describes the key aspects of the LAN implementation project for the computer laboratory.

Uploaded by

Chandu Chandu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 53

IMPLEMENTATION OF L.A.

N IN COMPUTER LABOROTARY

CHAPTER-1

1.1 INTRODUCTION

This chapter introduces the general overview of local area network (LAN). It is
a computer network that spans a relatively small area. A LAN consists of computers
& peripheral devices that share a common communication media. A LAN is confined
to a single room, building or group of buildings & typically located within a distinct
geographic area. However, one LAN can be connected to other LAN’s over any
distance via telephone lines. LAN can share resources (data, program, equipment)
with each other which typically share files, printers, scanners and other devices.

In our local area network, there is one dominant protocol called


“ETHERNET”. This is the technology that we use for wired LANs. Ethernet is a
standard, published by the IEEE (Institute of Electrical and Electronics Engineers)
which describes protocols, cabling, connectors, etc. that we use. A minimum required
LAN server (server), the coupling device (Repeater, Hub, Switch, Bridge), the
computer (Client), network card (Network Interface Card – NIC) and cable are used
to connect the computers together.

What is a LAN?
Local area network (LAN) is used for Information Interchange between devices of
network users. LAN is a high-speed data network that covers a relatively small
geographic area. It typically connects workstations, personal computers, printers,
servers, and other devices. LANs offer computer users many advantages, including
shared access to devices and applications, file exchange between connected users, and
communication between users via electronic mail and other applications. LAN is
secure because there is no outside connection with the local area network. Thus the
data which is shared is safe on the local area network and cannot be accessed outside.
LAN due to their small size are considerably faster, their speed can range anywhere
from 100 to 1000Mbps or up to 10Gbps.

VISSJ GOVERNMENT POLYTECHNIC Page 1


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

LAN Protocols and the OSI Reference Mode

LAN protocols function at the lowest two layers of the OSI reference model that is
between the physical layer and the data link layer. Figure 1.2 illustrates how several
popular LAN protocols map to the OSI reference model.

Fig: 1.1 LAN Protocols Mapped to the OSI Reference Model

LAN Transmission Methods

LAN data transmissions fall into three classifications: unicast, multicast, and
broadcast. In each type of transmission, a single packet is sent to one or more nodes.
In a unicast transmission, a single packet is sent from the source to destination
on a network. First, the source node addresses the packet by using the address of the
destination node. The package is then sent onto the network, and finally, the network
passes the packet to its destination.

VISSJ GOVERNMENT POLYTECHNIC Page 2


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

A multicast transmission consists of a single data packet that is copied and sent to a
specific subset of nodes on the network. First, the source node addresses the packet by
using a multicast address. The packet is then sent into the network, which makes
copies of the packet and sends a copy to each node that is part of the multicast
address.

A broadcast transmission consists of a single data packet that is copied and


sent to all nodes on the network. In these types of transmissions, the source node
addresses the packet by using the broadcast address. The packet is then sent on to the
network, which makes copies of the packet and sends a copy to every node on the
network.

NETWORK

A Network is a collection of computers & other devices that allow computer


users to send and receive information to and from each other.

A Network allows you to:

 Share information and resources.

 Access shared information.

 Share printers or other devices.

VISSJ GOVERNMENT POLYTECHNIC Page 3


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

1.2 Types of LANs

On a LAN, we expect to share files, programs or printers, all without being


particularly aware of where the physical resources we're using are actually located.
LANs providing these types of services are typically set up either as "Peer-to-Peer" or
"Client-Server" LANs, or perhaps as a combination of the two.

1. Peer-to-peer LANs:
It is a network of computers in which each machine sends and receives data files and
process data using those files. The absence of a dedicated file server lowers hardware
and maintenance cost. Performance is slower, especially if the network has many
nodes. Since each computer has the same potential to access and process data, these
types networks are called peer-to-peer network.
All the machines on a peer-to-peer LAN are equal. Peer-to-peer LANs do not
require any one machine to be a dedicated, high-performance server; service by a
peer-to- peer LAN is often cheaper for this reason. Peer-to-peer LANs work well
when only a small number of machines are connected to it. But as the size of the LAN
grows, peer-to-peer services can become quite disorganized, and because each
machine on the LAN must be powerful enough to serve all of its peers, the cost
increases. For larger LANs, the dedicated client-server LAN architecture becomes
more cost effective.

Fig 1.2 (a) Peer to Peer network

VISSJ GOVERNMENT POLYTECHNIC Page 4


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

2. Client-server LANs:
Client – Server network is a computing or processing environment in which the
hardware, software and data resource of two or more computers are combined to solve
a problem. It involves multiple clients, connecting to at least one central server. Most
data and applications are installed on the server. Servers often have private user
directories as well as multiple public directories. When clients need access to these
resources, they access them from the server. Client-server networks tend to have
faster access speeds, Because of the large number of clients they are designed and
support. The clients are allowed to function as workstations without sharing any
resources. It is easier to upgrade software applications and files because they are held
on single computer. System-wide services can be provided through the server
software. The clients share the software and data resources (data, program,
equipment). These resources are placed at computers called servers.
A client-server LAN consists of one or more server machines. The LAN
server machines are usually big and fast because they must serve many users, while
the client machines need only be fast enough for one person to use at a time. Security
is enhanced on a client server network because the security is handled by the server.
Shared printers are either attached directly to a server, or to a print server (a
specialized computer attached to the network), or to a personal computer on network
that acts as a print server.

Fig 1.2 (b) Client server network


In this project we use Client-Server network.

VISSJ GOVERNMENT POLYTECHNIC Page 5


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

1.3 LAN Topologies:


Topology is a term used to describe the way in which the computers are connected in
a network. These topologies are logical architectures, but the actual devices need not
be physically organized in these configurations. There are six basic topologies are as
follows:

1. BUS TOPOLOGY:
It is alternatively referred as Line topology. A bus topology consists of a single cable
with the terminator at each end. All present nodes or network devices are connected to
the single cable which acts as the backbone of the entire network. The bus topology
carries the transmitted data along the cable. As the data reaches each node, the node
checks the destination address (MAC/IP address). One of the nodes transmits the
data from one end to the other in a single direction. When the data reaches extreme
end, the terminator removes the data from the line.

Fig: 1.3 (a) Bus Topology

Advantages: it works well when you have a small network. It’s the easiest network
topology for connecting computers or peripherals in a linear fashion. Easy to connect
& remove devices in a network without affecting any other device.
Dis-Advantages: Additional devices slow the network speed. If a main cable is
damaged, the network fails. Proper termination is required to prevent bouncing of
signals.

VISSJ GOVERNMENT POLYTECHNIC Page 6


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

2. RING TOPOLOGY:
It is a network configuration in which device connection creates a circular data path.
In ring topology, packets of data travel from one device to the next until they reach
destination. Most of ring topologies allow packets to travel only in one direction,
called a unidirectional ring network.

Fig: 1.3 (b) Ring Topology


Advantages: it performs better than bus topology under heavy traffic. It doesn’t
require a central node to manage the connectivity between the computers. Reduced
chances of data packet after the receiving the token.
Dis-Advantages: Single point of failure that means of a node goes down entire
network goes down. Communication delay is directly proportional to nodes in the
network.

3. TREE TOPOLOGY:

Tree topology is also known as star bus topology. It incorporates elements of


both a bus and star topology. Below is an example network diagram of a tree
topology, in which the central nodes of two star networks are connected to one
another.

Fig 1.3 (c) Tree Topology

VISSJ GOVERNMENT POLYTECHNIC Page 7


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

Advantages: It is easy to find the fault. Other nodes in a network don’t get affected if
one of their nodes gets damaged. Computer can be added by simply adding a hub in a
network topology so this topology is flexible. It reduces traffic too.
Dis-Advantages: Wiring the network is difficult. If the backbone of the entire
network breaks both part of the network may not communicate to each other but a
part of the network continues to communicate alone.

4. MESH TOPOLOGY:
A network setup where each computer and network device is interconnected with one
another, allowing for most transmissions to be distributed even if one of the
connections go down. It is a topology commonly used for wireless networks. Below is
a visual example of a simple computer setup on a network using a mesh topology.

Fig 1.3 (d) Mesh topology


Advantages: a failure of one device does not cause a break in the network or
transmission of data. Adding additional devices does not disrupt data transmission
between other devices.
It doesn’t have traffic congestion problems as there are dedicated direct links.
Network can be incredible fast.
Dis-Advantages: mesh topology requires huge amount of cable. As a result, cost and
quality cost and complexity are higher than other network topologies. Building and
maintaining the topology is difficult and time consuming.

VISSJ GOVERNMENT POLYTECHNIC Page 8


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

5. HYBRID TOPOLOGY:
A Hybrid topology is a type of network topology that uses two or more differing
network topologies. These topologies can include a mix of bus topology, mesh
topology, ring topology, mesh topology, star topology, and tree topology.
The choice to use a hybrid topology over a standard topology depends on the need of
a business, school, or the users. The two most commonly used types of hybrid
topologies are the fallowing.

 Star-Ring Hybrid Topology.

Fig 1.3 (e) Star-Ring Hybrid topology

 Star-Bus Hybrid Topology.

Fig 1.3 (f) Star-Bus Hybrid topology

VISSJ GOVERNMENT POLYTECHNIC Page 9


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

6. STAR TOPOLOGY:

A Star topology is a LAN architecture in which every node in a network is connected


to a common central hub or switch, by dedicated links. In a star network, every host is
connected to a central hub or switch. In its simplest form, one central hub or switch
acts as a channel to transmit messages. The star network is one of the most
common computer network topologies. Data on a star network passes through the hub
or switch before continuing to its destination. The hub or switch manages and controls
all functions of the network. It also acts as a repeater for the data flow. The star
topology reduces the impact of a transmission line failure by independently
connecting each host to the hub. Each host may thus communicate with all others by
transmitting to, and receiving from, the hub. The failure of a transmission line linking
any host to the hub or switch will result in the isolation of that host from all others,
but the rest of the network will be unaffected. The star configuration is commonly
used with twisted pair cable and optical fibre cable. However, it can also be used
with coaxial cable.

Fig 1.3 (g) Star topology

VISSJ GOVERNMENT POLYTECHNIC Page 10


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

MERITS:

 Works well under heavy load.

 Appropriate for a large network.

 Star topology is cheaper than mesh topology.

 It is relatively easy to install, maintain.

 Link failure has no effect on the rest of the network.

 Failure of an individual workstation does not affect the system.

 Devices can be added or removed without disturbing the network.

 Fault indication is easy. A defective node can easily be isolated from the network
by removing its connection at the center.

DEMERITS:

 Because each node is directly connected to the center, star topology necessities a
large quantity of cable.

 System reliability is dependent on central server. Failure of the hub results in total
breakdown of the network.

 The central hub is a single point of failure for the network.

In our project we have used star topology

VISSJ GOVERNMENT POLYTECHNIC Page 11


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

CHAPTER-2

TRANSMISSION MEDIA

Transmission channel:

Transmission channel is also referred as Transmission media; it is a path


between two nodes in a network. It may refer to the physical Cable, the signal
transmitted within the cable or to a sub channel within a carrier frequency. In radio &
TV, it refers to the assigned carrier frequency.

In a transmission medium you can allocate bandwidth in two ways:

 Base band Transmission


1. These signals are bidirectional.
2. The baseband signals can both transmit & receive signals
simultaneously.
3. It utilizes the full bandwidth of the media like a single transmission
path.
4. This method is generally used by digital signals, as it is more reliable
than the broadband method.
5. Baseband signals can be regenerated using repeaters in order to travel
distances before weakening & becoming unusable, because of attenuation.

 Broad band transmission


1. These signals are unidirectional.
2. Broadband system can generally either transmit or receive but cannot
do both simultaneously.
3. It distributes the full bandwidth of the media in to a number of
transmission paths.

VISSJ GOVERNMENT POLYTECHNIC Page 12


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

4. This method is generally used by analog signals but it is less reliable


than base band method.
5. You can use frequency modulation to allow each channel to use a
different range of frequencies.
6. These signals can be regenerated using amplifiers in order to travel
longer distances before becoming attenuated.

2.1 CABLES
It is a physical signal conductor like, twisted pair or fiber optic that is used to
connect two or more devices on the network.

1. Shielded Twisted Pair (STP) Cable.

Fig 2.1 (a) Shielded Twisted Pair Cable

 STP cabling is twisted pair cabling with additional shielding to reduce crosstalk
and other forms of electromagnetic interference (EMI).
 The outer insulating jacket contains an inner braided copper mesh to shield the
pairs of twisted cables, which themselves are wrapped in foil.
 STP cabling is more expensive and it has an impedance of 150 ohms, has a
maximum length of 90 meters, and is used primarily in networking environments
with a high amount of EMI due to motors, air conditioners, power lines, or other
noisy electrical components.

2. COAXIAL CABLE

VISSJ GOVERNMENT POLYTECHNIC Page 13


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

Fig 2.1 (b) Coaxial Cable

 Coaxial cable is a type of copper cable specially built with a metal shield and
other components engineered to block signal interference.
 Coaxial or coax cable is made of two conductors, which share the same axis
due to which they have been named as “co” and “ax” coax.
 The copper wire enclosed in a plastic insulation is the main conductor of the
coax cable while the wire mesh acts as the second conductor.
 The wire mesh also acts as a shield. It gives the protection against EMI and
surrounds the insulating material.
 A tough plastic sheath protects the cable.

3. FIBER OPTIC CABLE

Fig 2.1 (c) Fiber Optic Cable


 An optical fiber is a flexible, transparent fiber made by drawing glass (silica)
or plastic to a diameter slightly thicker than that of human hair.
 Fibers are used instead of metal wires because signals travel along them with
less loss.

VISSJ GOVERNMENT POLYTECHNIC Page 14


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

 It uses light signal instead of electrical signals and comprises of glass core,
which is surround by a glass layer known as cladding.
 Cladding is used to reflect the signals back into the waveguide by multiple
internal reflections.
 Covering the cladding with a tough plastic sheath, it provides additional
corrosion protection for the copper sheath.

4. UNSHIELDED TWISTED PAIR CABLE

Fig 2.1 (d) Unshielded Twisted Pair Cable


 Unshielded Twisted Pair (UTP) cables are widely used in computer and
telecommunications industry as Ethernet cables and telephone wires.
 In an UTP cable, the 2 individual wires in a single pair are twisted around each
other in order to reduce electromagnetic interference (EMI) and crosstalk, each of
which can degrade network performance.
 Twisted pairs are color-coded to make it easy to identify each pair.
 Inside a UTP cable is up to 4 twisted pairs of copper wires, enclosed in a protective
plastic cover, with a greater number of pairs corresponding to more bandwidth.
 UTP cable is a 100-ohm copper cable that consists of 2 to 1800 unshielded twisted
pairs surrounded by an outer jacket.
 They have no metallic shield. This makes the cable small in diameter but
unprotected against electrical interference.
 The twist helps to improve its immunity to electrical noise and EMI.
 For horizontal cables, the number of pairs is typically 4 pair as shown in above
figure.
VISSJ GOVERNMENT POLYTECHNIC Page 15
IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

2.2 UTP CABLE PERFORMANCE:


UTP cables were invented for voice applications. Voice UTP cables only
needed to carry analog signals, which are very robust and not easily corrupted by
electrical noise or EMI. However, as UTP cables were used for different systems,
higher quality UTP cables were required to support data systems that used digital
signaling.
Higher category UTP cables are referred to as data grade UTP cable and lower
category UTP cables are referred to as voice grade UTP cables.

UTP CABLE CONNECTOR:


RJ45 Jack and Plug
Four pair UTP horizontal cables are terminated with an 8-position modular
connector. The RJ45 Jack is an 8-conductor, compact, modular jack used to terminate
UTP data cable. RJ45 jacks are engineered to maintain specific category 5, 5e, 6 or
6A performance, and therefore must match the category of the cable they are
terminating.

2.3 Cat-5e cable


CAT5e cable is a data grade UTP cable. CAT5e network cabling consists of
four twisted pairs of copper wire terminated by RJ45 connectors. Cat-5e cabling
supports frequencies up to 100 MHz and speeds up to 1000 Mbps. It can be used for
ATM, token ring, 1000Base-T, 100Base-T, and 10Base-T networking.
CAT-5e is used in ETHERNET based LAN s, CAT5e contains 4 twisted pairs.
It supports 1-Gbps for 100 meters. Computers hooked up to LAN s are connected
using Cat-5e cables, so if you're on a LAN, most likely the cable running out of the
back of your PC is Category 5e.
Cat-5e is based on the EIA/TIA 568 Commercial Building Telecommunications
Wiring Standard developed by the Electronics Industries Association as requested by
the Computer Communications Industry Association in 1985.

VISSJ GOVERNMENT POLYTECHNIC Page 16


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

CHAPTER-3
CRIMPING

3.1 RJ-45 Connector


RJ-45 Connector Pin Numbering

Fig: 3.1 (a) RJ45 connector

Registered jack 45 (RJ45) is a standard type of physical connector for


network cables. Registered jack (RJ) is a standardized telecommunication network
interface for connecting voice and data equipment to a service provided by a local
exchange carrier or long-distance carrier. RJ45 connectors are commonly seen with
Ethernet cables and networks. The term “plug” refers to the “cable” or “male” end of
the connection, while the term “Jack” refers to the port or “female” end.

RJ45 plugs feature eight (8) pins to which the wire strands of a cable interface
electrically. Each plug has eight locations (positions), spaced about 1mm apart.
Individual wires are inserted using special cable crimping tools. The industry calls
this type of connector 8P8C (Eight position, Eight contact). Cables can transmit

VISSJ GOVERNMENT POLYTECHNIC Page 17


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

information along their length. To actually get that information where it needs to go,
you need to make the right connections to an RJ45 connector.

Fig: 3.1 (b) Internal cable structure & color coding

Inside the Ethernet cable, there are 8 color coded wires. These wires are twisted
into 4 pairs of wires, each pair has a common color theme. One wire in the pair being
a solid or primarily solid colored wire and the other being a primarily white wire with
a colored stripe.

568A or 568B wiring standard

Fig: 3.1 (c) 568A or 568B Wiring standards


568A and 568B are the two-color codes used for wiring eight-position
modular plugs. Both are allowed under the ANSI/TIA/EIA wiring standards. The only
difference between the two-color codes is that the orange and green pairs are
interchanged.
There is no transmission difference between 568A and 568B cabling schemes.
North America’s preference is for 568B. Both ends must use the same standard. It
makes no difference to the transmission characteristics of data.
T568B wiring pattern is recognized as the preferred wiring pattern.

VISSJ GOVERNMENT POLYTECHNIC Page 18


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

3.2 Wiring an RJ45 to the T568B Specification

Fig: 3.2 T568B Specification


When wiring the connector, follow the layout shown. Your connector will
confirm to the T568B standard.

3.3 How to crimp RJ45?


You can quickly and easily crimp an RJ-45 to a cable with a
crimping tool. By using crimping tool strip away a portion of the sheath, untangle and
arrange the wires in the correct order, fit them into the connector, and use the
crimping part of your tool to squeeze the small pins into the wires and secure the
connector.
Methods:
1. Strip the cable back 1 inch (25mm) from the end.

Fig: 3.3 (a) stripping the cable


Insert the cable into the stripper section of the tool and squeeze it tight.
Then, rotate the crimping tool around the cable in a smooth and even motion to
create a clean cut. Keep the tool clamped and pull away towards the end of the
wire to remove the sheathing.
 The sheathing should come off cleanly, leaving the wires exposed.

2. Untwist and straighten the wires in the cable.

VISSJ GOVERNMENT POLYTECHNIC Page 19


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

Fig: 3.3 (b) Untwist and straighten of the wires in the cable
Inside the cable you see a bunch of smaller wires twisted together.
Separate the twisted wires and straighten them out so they’re easier to sort into right
order.
 Cutoff the small plastic wire separator or core so it’s out of the way.
 Don’t cutoff or remove any of the wires, because you won’t be able to crimp them
into the connector.
3. Arrange the wires into the right order.

Fig: 3.3 (c) arranging the wires into the right order

The wires should be arranged in correct order so they can be properly


crimped. The proper sequence is as follows from left to right: Orange/white, Orange,
Green/white, Blue, Blue/white, Green, Brown/white and Brown.

 Note that wires labeled Orange/white or Brown/white indicate the small wires that
have 2 colors.

4. Cut the wires into an even line ½ inch (13mm) from sheathing.

VISSJ GOVERNMENT POLYTECHNIC Page 20


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

Fig: 3.3 (d) cutting the wires into an even line

Hold the wire with your thumb and index finger to keep them in order.
Then use the cutting section of the crimping tool to cut them into an even line.

 The wires must be in an even line to be crimped into the RJ-45 connector properly.
If you cut them in an uneven line, move further down the wires and cut them again.

5. Insert the wires into the RJ-45 connector.

Fig: 3.3 (e) Inserting the wire into the RJ-45 connector

Hold the RJ-45 connector so the clip is on the underside and the small metal pins are
facing up. Insert the cable into the connector so that each of the small wires fits into
the small grooves in the connector.

 The sheathing of the cable should fit just inside of the connector.
 If any of the small wires bend or don’t fit into a groove correctly, take the cable out
and straighten the wires with your fingers before crimping.
 The wires must be inserted in the correct order and each wire must fit into a groove
before you crimp the connector.

6. Stick the connector into the crimping part of the tool and squeeze twice

VISSJ GOVERNMENT POLYTECHNIC Page 21


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

Fig: 3.3 (f) stickking the connector into the crimping part of the tool and squeeze twice

Insert the connector in the crimping section of the tool until it can’t fit any
further. Squeeze the handles to crimp the connector and secure the wires. Release the
handles, then squeeze the tool again to make sure all of the pins are pushed down.

 The crimping tool pushes small pins in the grooves down on to the wires to hold
and connect them to the RJ-45 connector.

7. Remove the cable from the tool and check that all of the pins are down.

Fig: 3.3 (g) cabled removed from tool after squeezing

Take the connector out of the tool and look at the pins to see that they
are all pushed down in an even line. Lightly tug at the connector to make sure it is
attached to the cable.

 If any of the pins are not pushed down, put the wire back into the crimping tool
and crimp it again.

VISSJ GOVERNMENT POLYTECHNIC Page 22


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

Fig: 3.3 (h) CRIMPING STEPS

CHAPTER-4
NETWORK INTERFACE CARD

A Network card or NIC (Network interface card) is a piece of computer


hardware designed to allow computers to communicate over a computer network. A
network interface card (Ethernet card) will be installed in the computer’s slot, so that
it can connect to a network. Modern NIC’s provide functionality to computers such as
support for I/O Interrupt, direct memory access (DMA) interfaces, data transmission,
network traffic engineering and partitioning.

A computer’s network card works by taking the data given to it CPU and
sending it to a destination. It translates the data via cables. A NIC provides a
computer with a dedicated, full time connection to a network by implementing the
physical layer circuitry necessary for communicating with a data link layer standard,
such as Ethernet or Wi-Fi. Each card represents a device and can prepare, transmit
and control the flow of data on network. The NIC uses the OSI model to send the

VISSJ GOVERNMENT POLYTECHNIC Page 23


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

signals at the physical layer transmit data packets at the network layer and operate as
an interface at the TCP/IP layer.

Fig 4.1 NIC

4.1 Components of network interface cards:

 Speed: -All NICs have a speed rating in terms of Mbps that suggest the general
performance of the card when implemented in a computer network. The average
Ethernet NICs are offered in 10 Mbps, 100 Mbps, 1000 Mbps and 1-Gbps.

 Driver: -This is the required software that passes data between the computers
operating system (OS) and the NIC.

 MAC Address: -These are assigned to NICs that is used to deliver Ethernet
packets to the computer.

 Connectivity LED: -Most NICs have an LED indicator integrated into the
connector to notify the user of when the network is connected and data is being
transmitted.

VISSJ GOVERNMENT POLYTECHNIC Page 24


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

 Router: -A router is also sometimes needed to allow communication between a


computer and other devices. In this case, the NIC connects to the router which is
connected to the internet.

4.2 SWITCH

A network switch is a computer networking device that connects network segments.

Fig 4.2. 16 port D Link


switch
Low-end network switches appear nearly identical to network hubs, but a switch
contains more "intelligence" (and comes with a correspondingly slightly higher price
tag) than a network hub. Network switches are capable of inspecting data packets as
they are received, determining the source and destination device of that packet, and
forwarding it appropriately.
The first Ethernet switch was introduced by Kalpana in 1989.

FUNCTION

As with hubs, Ethernet implementations of network switches support either


10/100 Mbit/s or 10/100/1000 Mbit/s ports Ethernet standards. Large switches may
have 10-Gbps ports. Switches differ from hubs in that they can have ports of different
speed.

VISSJ GOVERNMENT POLYTECHNIC Page 25


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

Fig 4.3 A rack-mounted switch with network cables

The network switch, packet switch (or just switch) plays an integral part in
most local area networks or LANs. Small Office, Home Office (SOHO) applications
typically use a single switch.

ROLE OF SWITCHES IN NETWORK

In a network, a switch is a hardware device that filters and forwards network


packets from one networking device (switch, router, computer, server, etc) to another.
It controls a number of errors generated in a port and indicates if signal is online or
offline. The statistics are extremely usefull in determining faulty network nodes. It is
widely used in LANs to send each incoming message frame by looking at the physical
device address, known as MAC address.

4.3 INSTALLING NIC:

Follow the steps below to prepare the system for installation of your network interface
hardware.
1. At the HP-UX prompt, execute the command:

VISSJ GOVERNMENT POLYTECHNIC Page 26


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

2. Wait for the system to respond with a message indicating that the system has
been halted.
3. Observe antistatic precautions by following the guidelines as described in the
installation instructions in the hardware manual or the Antistatic Precautions Note.
4. Install your network interface card by referring to your hardware installation
and service manual.
5. Power up the system to complete the process. The network interface card will
run a self-test automatically. Any error messages will appear on the terminal
display or system console.
6. Proceed, "Configuring LAN/9000 Using SAM."

CHAPTER-5
IP ADDRESS

VISSJ GOVERNMENT POLYTECHNIC Page 27


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

An IP address (Internet Protocol address) is a unique address that certain


electronic devices use in order to identify and communicate with each other on a
computer network utilizing the Internet Protocol standard (IP) in simpler terms, a
computer address. Any participating network device including routers, switches,
computers, infrastructure servers (e.g., NTP, DNS, DHCP, SNMP, etc.) printers,
Internet fax machines, and some telephones can have its own address that is unique
within the scope of the specific network. Some IP addresses are intended to be unique
within the scope of the global Internet, while others need to be unique only within the
scope of an enterprise.

The IP address acts as a locator for one IP device to find another and interact
with it. It is not intended. However, to act as an identifier that always uniquely
identifies a particular device. In current practice, an IP address is not always a unique
identifier, due to technologies such as dynamic assignment and network address
translation.

IP addresses are managed and created by the Internet Assigned Numbers


Authority (IANA). The IANA generally allocates super-blocks to Regional Internet
Registries, who in turn allocate smaller blocks to Internet service providers and

5.1 How to set up a Static IP for Windows

Setting up a static IP is usually simple processes are the steps you should
follow:

1. Click on the Start Button and then choose Run. The Run window should open.
2. Type command in the Run box and click OK. A new black window should
open up with a prompt.
3. At the prompt, type IP config/all and click Enter. You should now see lots of
information related to your IP. Some of this information you will need later either
print the screen or copy down the info for the following fields; IP address, Default
Gateway, Subnet Mask and Name Servers (Name Servers are also called DNS
Servers). Once all the information has been copied or printed, exit this window.
4. Click Start and then Control Panel, then select Network Connections. Once the
Network Connections window opens, you should see your network connection

VISSJ GOVERNMENT POLYTECHNIC Page 28


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

labeled. Many networks and computers have more than one network connection.
Choose the network connection that you use to connect to the internet. Once this
network connection is selected, right click and choose properties.

 Hint: If you are having difficulties finding the network connection that is used to
connect to the internet, one way to make your search easier is to disable one
connection at a time and then test using your browser if your internet still works. If
your internet no longer works, then the network connection you disabled is the one
that you use to connect to the internet.
5. In the Properties window, select the General tab and then click on Internet
Protocol (TCP/IP). Once this is selected click on the Properties button.
6. On this screen, choose the following radio button: Use the Following IP
Address and then you will fill in the following information regarding:
o IP Address
o Subnet Mask
o Default Gateway

There will also be two radio buttons. Choose the radio Button: Use the Following
DNS Server Address. There are two more fields to fill in, they are:

o Preferred DNS Server


o Alternate DNS Address

5.2 TCP/IP Settings:

To setup TCP/IP connection on an XP computer, open the Network Connections


folder, right click the "LAN Connection", and select Properties.

VISSJ GOVERNMENT POLYTECHNIC Page 29


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

Fig 5.1 Network connections

Click the "Internet Protocol (TCP/IP)"

VISSJ GOVERNMENT POLYTECHNIC Page 30


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

Fig 5.2 local area connection properties

IMPORTANT:

Make sure that ONLY the "Internet Protocol (TCP/IP)" is checked. DO NOT
check any other network type unless you are sure what you are doing. Please note that
enabling "File and printer sharing for Microsoft Networks" is extremely
dangerous. If you have to enable this feature to make disks/printers on your PC to be
available to other computers (like others at home or at your office) you should also
install a firewall program to limit access to your PC. We recommend Zone Alarm
which is a free utility for non-profit use.

Click the "Properties" button.

VISSJ GOVERNMENT POLYTECHNIC Page 31


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

Click the "Use the following IP address" option and fill in the form with the
parameters provided to you during Loj-Net registration. All the IP numbers shown in
the following screenshot are examples. You should fill-in the IP addresses that start
with "139.179....”

Fill in the IP Addresses for the Primary and Secondary DNS Servers too.

Fig 5.3 internet protocol (TCP/IP) properties

Click OK to finish TCP/IP Settings.

VISSJ GOVERNMENT POLYTECHNIC Page 32


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

5.3 WORK GROUP

A workgroup is Microsoft's terminology for a peer-to-peer PC computer


network.

Microsoft operating systems in the same workgroup may allow each other access to
their files, printers, or Internet connection. Members of different workgroups on the
same local area network segment and TCP/IP network can only access resources in
workgroups to which they are joined.

SETTING OF WORK GROUP:

Windows XP:

Go to Control Panel > System > and click the Computer Name Tab:

Fig 5.4 System properties

VISSJ GOVERNMENT POLYTECHNIC Page 33


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

If you are happy with the Workgroup name then just click "Cancel".

If you want to change it then click "Change" and you will get the following
dialog:

Fig 5.5 Computer name changes

The Computer Name must be different for each PC on the network; the Workgroup
should be the same for each PC on the network.

Make sure the Computer Name is different to any other PC’s on the network. Click
the “Workgroup” radio button and enter an appropriate workgroup name in the text
box then press "OK".

VISSJ GOVERNMENT POLYTECHNIC Page 34


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

CHAPTER-6
NETMEETING

Definition:
NetMeeting is a software application for audio and video conferencing.
NetMeeting offers sharing of desktop video, audio, chat and file transfer functionality.

NetMeeting supports directory servers and services. NetMeeting uses may


automatically register with a directory when they start their NetMeeting client. The
directory then allows users to find online users by name or location. If no directory is
available, NetMeeting users can also call each other directly by computer name or IP
address.

Once connected to other users, NetMeeting places all parties in a "call."


NetMeeting tracks the call roster and allows users to share their desktop windows, to
chat, transfer files, or share a VoIP (Voice over Internet Protocol) feed. NetMeeting
supports dozens of simultaneous users in a call. It supports users over any type of IP
network connection including dialup service. However, the overall performance of a
NetMeeting call generally suffers when dialup users are connected.

Microsoft ships NetMeeting with the Microsoft Windows operating system.


"Conf.exe" is the NetMeeting client executable. Windows XP leaves conf.exe inactive
by default and requires special user configuration to enable it.

Microsoft has ceased future development of NetMeeting and announced plans


to phase out this tool in favor of a new service called Office Live Meeting.

VISSJ GOVERNMENT POLYTECHNIC Page 35


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

6.1 Setting up Net Meeting

Providing long-distance Web site design assistance has become easier, since the
discovery of Microsoft NetMeeting. This program allows people to connect to each
other’s computers, view the other person's desktop remotely, and even take control of
the desktop for the demonstration of programs.

Setting up NetMeeting is simple. Just follow the illustrated instructions below.

On your task bar, click "Start," and then "Run." Type "conf" into the window, and
click "OK."

Fig 6.1

The next window informs you about the capabilities of NetMeeting. Click "Next."

In the following window, enter information about yourself. The First Name, Last
Name, and E-Mail Address fields are required. You may enter any location or
comments, if you choose.

Fig 6.2

VISSJ GOVERNMENT POLYTECHNIC Page 36


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

The next Window allows you to log onto a directory server. It is strongly
recommended that you do not do so. Leave these check boxes blank.

Fig 6.3

Set your network speed on the next window. I don't recommend using this
program for a dial-up modem. Most people would do well to select "Local Area
Network." If you know that your Internet access is provided by cable, DSL, or ISDN,
select the appropriate radio button.

Fig 6.4

VISSJ GOVERNMENT POLYTECHNIC Page 37


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

Unless you intend to use NetMeeting frequently (and most of us won't), do not
choose to put a shortcut on your desktop or Quick Launch bar. You may have to
uncheck these choices.

Fig 6.5

Next you will be asked to tune your audio settings. It is generally more
convenient to use the telephone, so the thing to do here is to simply click through the
next few screens until a Window tells you "You have tuned your audio settings."

Fig 6.6

VISSJ GOVERNMENT POLYTECHNIC Page 38


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

Of course, if you have speakers and a microphone, expect to be conducting Net


Meetings with people who are similarly equipped, you could save long distance
charges by tuning your audio settings.

When you click "Finish" on the final window, NetMeeting will launch.

Fig 6.7

To commence a NetMeeting, you need only enter the IP address of the other
meeting participant and hit enter. If you need to give someone your IP address, you
can view this under "Help," "About Windows Net meeting."

To share your applications or desktop, just click the Share icon on the lower-left
corner. Select your application and click the "Share" button.

VISSJ GOVERNMENT POLYTECHNIC Page 39


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

6.2 Remote accesses desktop:

- Right-click My Computer and click Properties [See pic below]

Fig 6.8
- Click the Remote tab
- Tick the Allow users to connect remotely to your computer check box [See pic
below]

VISSJ GOVERNMENT POLYTECHNIC Page 40


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

Fig 6.9
- Click OK

Note:
You must be logged on as an Administrator or be a member of the Administrators
group to enable Remote Desktop.
1. To allow other users to connect to your computer:

VISSJ GOVERNMENT POLYTECHNIC Page 41


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

 In the Remote tab, click the Select Remote Users button [See pic below]

Fig 6.10

- On the Remote Desktop Users dialog box, click Add


- Type the name of the user you want to be able to connect remotely to your computer
- Click Check Names
- When the name is located, click OK. Click OK again, and once again.
The name now appears

2. Client Computer Settings

 Windows XP:

VISSJ GOVERNMENT POLYTECHNIC Page 42


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

o The remote desktop connection software is pre-installed with Windows


XP Professional and can be found at Start->Programs->Accessories-
>Communications
o This software package can also be installed from the Windows XP
Professional or Windows XP Home Edition product CD

3. Start Remote Desktop Session

 Open the Remote Desktop Connection Client software on Client computer


 Type the computer name or IP address of the Host computer that has Remote
Desktop enabled and click Connect button:

Fig 6.11

 In the Log On to Windows dialog box, type your user name, password, and
domain (if required), and then click OK. The Remote Desktop window will open
and you will see the desktop settings, files, and programs that are on a remote
computer.

Now you can use Universal Document Converter on a remote computer the same way

 You use it on local computer! In the list of users on the Remote Desktop Users
dialog box.

VISSJ GOVERNMENT POLYTECHNIC Page 43


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

VISSJ GOVERNMENT POLYTECHNIC Page 44


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

6.3 Setting up Guest net Printer in Windows XP


This page shows how to set up your Windows XP machine to print to the
CCRMA guest net printers.

These instructions assume that you have already successfully connected to the
guest net and registered your machine as shown here.

The examples shown use the names and paths for the printer in the Knoll. The
machine name in the knoll is cm-guestnet-1 and the printer name is np. In the trailer, the
machine is cm-guestnet-2 and the printer is np2.

VISSJ GOVERNMENT POLYTECHNIC Page 45


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

Substitute names where appropriate when setting up to print in the trailer.

First, open My Computer from the start menu. You'll see the following window.
On the left side, under Other Places choose Control Panel.

Fig 6.12 control panel

You should then see this window.


Choose Printers and Other Hardware from the upper right.

Now, in this window, under Pick a task... choose add a printer

VISSJ GOVERNMENT POLYTECHNIC Page 46


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

Fig 6.13

You're now greeted by the Add Printer Wizard.


Click Next.

Fig 6.14 Printer wizard

VISSJ GOVERNMENT POLYTECHNIC Page 47


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

Choose network printer and click Next.

Fig 6.15

Choose connect to this printer and fill in the path to the printer.
In the knoll, the path is \\cm-guestnet-1\np and in trailer, it's \\cm-guestnet-2\np2.

Then, click Next.

VISSJ GOVERNMENT POLYTECHNIC Page 48


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

Fig 6.16

This window will pop up. Click OK.

Fig 6.17

The next window will prompt you to choose a printer driver.


Click Have Disk...

VISSJ GOVERNMENT POLYTECHNIC Page 49


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

Fig 6.18

In the next window, enter the path to the drivers.


It's \\cm-guestnet-1\drivers\winXP in the Knoll
and \\cm-guestnet-2\drivers\winXP in the trailer.

Fig 6.19

Choose the driver and click OK.

Fig 6.20

VISSJ GOVERNMENT POLYTECHNIC Page 50


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

Now click Finish

Fig 6.21

You should now be able to print from any application.

CHAPTER 7

7.1 CONCLUSION
 In conclusion, a network is two or more computers connected together using a
telecommunication system for the purpose of communicating and sharing
resources.

 LAN is simple to understand and implement.

VISSJ GOVERNMENT POLYTECHNIC Page 51


IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

 In this project we have successfully installed local area network in our lab. Local
Area Network allows students to access the internet using Local Area Network.

 We can install Wi-Fi router with the help of LAN arrangement.

 In our lab we have connected 10 to 12 computers. In future we can extend up to 16


computers.

 By this project, we got more information about LAN cable, switch and other LAN
equipments. Finally, we are satisfied with our project.

7.2 REFERENCE

Reference books:
 Communication Electronics- Louis E Frensel, 3rd Edition.
 Communication an computers network- K. Shashidhar
VISSJ GOVERNMENT POLYTECHNIC Page 52
IMPLEMENTATION OF L.A.N IN COMPUTER LABOROTARY

 Bobbi Sandberg. ”Networking Third Edition”.

E- Resources:
 https://www.techopedia.com

 Etworking.techtarget.com
 www.webopedia.com

 https://ecomputernotes.com
 m.wikihow.com

VISSJ GOVERNMENT POLYTECHNIC Page 53

You might also like