Networking Assignment
Networking Assignment
Bus topology has a network arrangement where nodes make use of a single communication
line for data transmission.
Many networks at the beginning of computer networking era made use of this topology due
to easy implementation.
Advantages
Since there is a single communication line, means the same medium is shared.
Therefore, the major advantage of using this topology is its simplicity.
Easy to setup and extend.
Less costly. Less cabling needs.
Disadvantages
On the other hand, having a single communication line for data transmission
makes it easier for collision to occur, which is seen as a disadvantage of using
this network topology.
If the single network cable has a problem or disconnection, the whole network
breaks.
Difficult to identify a problem.
All devices receive all signals from every other host. This is not efficient.
The star network topology is one of the most commonly used topologies today because of
its simplicity and efficiency.
In this kind of topology, a centralized node is located at the core of the network topology, in
which all the other nodes must communicate through.
This topology is mostly used in homes and offices today. For example, the classic Ethernet
LAN networks are using the Star Topology. There is an Ethernet Switch (centralized node)
on which all computers and network devices are connected to.
Advantages
Disadvantages
The main disadvantage of using this topology is that it has a single point of
failure, i.e. when the central switch node is down, there will be a break in
communication for all connected devices.
More cabling is needed since you connect each individual devices to the central
node.
Performance of the whole network depends on the performance of the central
node.
Ring topology presents devices that are arranged in a circular form or just like a ring.
Although the layout of the devices is very similar to bus a topology, ring topology is a closed
loop.
Ring networks are not used much nowadays.
Advantages
The advantage of using this network topology is the ability to have fast network
throughput.
Less packet collisions.
High speed transfers.
Token is used between nodes thus making this performing better than bus
topology.
Disadvantage
The disadvantage is the point of failure, as a single node can break the
transmission of data on the network.
This network topology is basically made up of several topologies i.e. a combination of two
or more topologies, which could be bus, star, ring, etc.
Advantages
In terms of the advantages of using this kind of topology, we find that it has a
high level of fault tolerance, which makes it reliable and flexible.
Scalable as you can add new nodes easily.
You can design it in such a way as to use the best features of various other
topologies.
Disadvantages
This network topology is ideal for when you have a device acting as the root device on the
network.
This topology works with the design of a star and bus topology combined. This has to do
with linking star topologies together to form a single network topology, which is linked
using a bus topology.
The disadvantage of using this topology is the multiple points of failures that are created, i.e.
both the star and bus topology needs to be up at all times.
Mesh network topologies create a scenario where there is connection to and from each
node that is connected on the network. That is, all network nodes are interconnected
between them just like a mesh.
Mesh topologies are used in mission critical network environments such as hospitals or
financial institutions, where availability is of utmost importance.
Advantages
The main advantage of this type is fault tolerance, which is because of the
redundant links that are created.
If one device/node in the network fails, the rest of the devices can work
normally without interruption.
Adding more devices in the network does not affect the rest of the devices.
Disadvantages
The obvious disadvantage of using this type of network is the high cost of
implementation.
Implementation and maintenance of such a topology is time consuming and
difficult.
Cabling cost is high.
Features of Hubs
Network Switch
Switches are networking devices operating at layer 2 or a data link layer of the OSI model. They
connect devices in a network and use packet switching to send, receive or forward data packets or
data frames over the network.
A switch has many ports, to which computers are plugged in. When a data frame arrives at any port
of a network switch, it examines the destination address, performs necessary checks and sends the
frame to the corresponding device(s).It supports unicast, multicast as well as broadcast
communications.
Features of Switches
A switch operates in the layer 2, i.e. data link layer of the OSI model.
It is an intelligent network device that can be conceived as a multiport network bridge.
It uses MAC addresses (addresses of medium access control sublayer) to send data
packets to selected destination ports.
It uses packet switching technique to receive and forward data packets from the source
to the destination device.
It is supports unicast (one-to-one), multicast (one-to-many) and broadcast (one-to-all)
communications.
Transmission mode is full duplex, i.e. communication in the channel occurs in both the
directions at the same time. Due to this, collisions do not occur.
Switches are active devices, equipped with network software and network management
capabilities.
Switches can perform some error checking before forwarding data to the destined port.
The number of ports is higher – 24/48.
What is a router?
A router is a device that connects two or more packet-switched networks or sub-networks. It serves
two primary functions: managing traffic between these networks by forwarding data packets to their
intended IP addresses, and allowing multiple devices to use the same Internet connection.
There are several types of routers, but most routers pass data between LANs (local area
networks) and WANs (wide area networks). A LAN is a group of connected devices restricted to a
specific geographic area. A LAN usually requires a single router.
A WAN, by contrast, is a large network spread out over a vast geographic area. Large organizations
and companies that operate in multiple locations across the country, for instance, will need separate
LANs for each location, which then connect to the other LANs to form a WAN. Because a WAN is
distributed over a large area, it often necessitates multiple routers and switches.
How does a router work?
Think of a router as an air traffic controller and data packets as aircraft headed to different airports
(or networks). Just as each plane has a unique destination and follows a unique route, each packet
needs to be guided to its destination as efficiently as possible. In the same way that an air traffic
controller ensures that planes reach their destinations without getting lost or suffering a major
disruption along the way, a router helps direct data packets to their destination IP address.
In order to direct packets effectively, a router uses an internal routing table — a list of paths to
various network destinations. The router reads a packet's header to determine where it is going,
then consults the routing table to figure out the most efficient path to that destination. It then
forwards the packet to the next network in the path.
6. In hub, Packet filtering is not provided. While in switch, Packet filtering is provided.
Hub is not an intelligent device that sends While switch is an intelligent device that
message to all ports hence it is comparatively sends message to selected destination so it is
8. inexpensive. expensive.
Hub is simply old type of device and is not While switch is very sophisticated device and
9. generally used. widely used.
CAT5 Cable
Alternatively known as an Ethernet cable or LAN cable, a Cat 5 or category 5 is a network cable that
consists of four twisted pairs of copper wire terminated by an RJ-45 connector. The picture shows an
example of a Cat 5 cable.
Cat 5 cable is used in home and business networks, providing data transmission speeds of up to
100 Mbps. The maximum recommended length of a Cat 5 cable is 100 meters. Exceeding this length
without the aid of a bridge or other network device could cause network issues, including data
packet loss and data transmission speed degradation.
RJ 45 Connector
A registered jack (RJ) is a standardized physical network interface for connecting
telecommunications or data equipment. The physical connectors that registered jacks use are mainly
of the modular connector and 50-pin miniature ribbon connector types. The most common twisted-
pair connector is an 8-position, 8-contact (8P8C) modular plug and jack commonly referred to as
an RJ45 connector.
Crimping Tool
A crimping tool is a device used to conjoin two pieces of metal by deforming one or both of them to
hold each other. The result of the tool's work is called a crimp. An example of crimping is affixing a
connector to the end of a cable. For instance, network cables and phone cables are created using a
crimping tool (shown below) to join RJ-45 and RJ-11 connectors to both ends of phone or Cat
5 cable.
Purchasing Ethernet cables can be quite expensive and pre-made lengths are not always the length
you need. Making Ethernet cables is easy with a box of bulk Category 5e Ethernet cable and RJ-45
connectors that are attached to the cut ends of your preferred cable length.
(You may also use Category 6 or CAT6 cabling which has higher performance specifications and is
about 20% more expensive than CAT5e.)
RJ45 Crimpable Connectors for CAT-5e or RJ45 Crimpable Connectors for CAT-6
There are two kinds of Ethernet cables you can make, Straight Through and Crossover.
STRAIGHT THROUGH Ethernet cables are the standard cable used for almost all purposes, and are
often called "patch cables". It is highly recommend you duplicate the color order as shown on the
left. Note how the green pair is not side-by-side as are all the other pairs. This configuration allows
for longer wire runs.
CROSSOVER CABLES - The purpose of a Crossover Ethernet cable is to directly connect one computer
to another computer (or device) without going through a router, switch or hub.
Here's how to make a standard cable:
Step 1: Cut into the plastic sheath about 1 inch (2.5 cm) from the end of the cut cable. The crimping
tool has a razor blade that will do the trick with practice.
Step 3: Pinch the wires between your fingers and straighten them out as shown. The color order is
important to get correct.
Step 4: Use scissors or crimper to make a straight cut across the 8 wires to shorten them to 1/2
Inch (1.3 cm) from the cut sleeve to the end of the wires.
Step 5: Carefully push all 8 unstripped colored wires into the connector. Note the position of the
blue plastic sleeve. Also note how the wires go all the way to the end. Carefully push all 8 unstripped
colored wires into the connector. Note the position of the blue plastic sleeve. Also note how the
wires go all the way to the end.
Step 6: CRIMPING THE CABLE ... carefully place the connector into the Ethernet Crimper and cinch
down on the handles tightly. The copper splicing tabs on the connector will pierce into each of the
eight wires. There is also a locking tab that holds the blue plastic sleeve in place for a tight
compression fit. When you remove the cable from the crimper, that end is ready to use.
3. PCI-X Slots
As a presence of the PCI slot, the PCI-X slot was also developed. You should not confuse these
acronyms with PCI Express. The ‘X’ in this case refers to ‘expanded’.
One PCI-X slot on the motherboard is for the PCI Express (PCI-E)-based graphics card connected to
the CPU via a dedicated 16x or 32x direct link to provide high bandwidth and low latency. The
remaining slots are used for other functions as follows: –
PCMCIA Card,
Wireless LAN Card,
Bluetooth Card.
The motherboard may not have any slots left available if it has two PCI slots used by a RAID
controller or another function.
Also, this type of slot isn’t widely used in the range of desktop motherboards. They are more
oriented to server or workstation environments since they allowed higher bandwidths than
conventional PCI.
4. AGP Slots
The acronym AGP stands for ‘Advanced/Accelerated Graphics Port’, and they are mainly designed to
support video/graphic cards with high bandwidth requirements. The main advantage of these slots
type is that they support a simple direct connection between the CPU and the motherboard without
any connectors or cables needed.
AGP slots are a type of motherboard used for personal computers which were popular in the early
2000s. Initially, AGP slots were designed as an upgrade to plain PCI slots. Now, this slot is the
successor to the original PCI.
AGP was the mainstream until the successor standard PCI Express was put into practical use. It first
appeared around 1997, and the version was released up to AGP 3.0, but due to the limit of transfer
speed, it was almost replaced by the PCI Express standard around 2005.
The appearance of a new evolution known as PCI-Express provides more excellent performance in
terms of frequency and bandwidth. Thus, the leading manufacturers of graphics cards, such as ATI
and Nvidia, have presented fewer and fewer products for this port.
5. ISA Slots
ISA expansion slots are the oldest types of slots on the motherboard. ISA stands for ‘Industry
Standard Architecture’ because no other slots were invented at that time. The components designed
to install on ISA slot were huge in size and among the first slots to be used in personal computers.
Network cards, video cards, and other extended hardware are installed with the help of ISA slots.
Today, Modern motherboards no longer have ISA slots. These slots were included until the first
models of the Pentium III microprocessor, then it was replaced in 2000 by the PCI slot.
6. VESA Slots
VESA stands for ‘Video-Electronics Standards Association’, it is a group of monitor and graphics card
manufacturers that establish video bus and display standards. The aim of VESA slots is to optimize
the video operations.
Although, VESA slots were only used in the PCs for a little amount of time. VESA Company
introduced these slots but after some time, ISA Bus replaced VESA.
7. RAM Slots
The RAM slot on the motherboard determines the type of RAM your computer can utilize.
Depending on the motherboard, typically numbering 2 or 4 (sometimes more on high-end
motherboards), usually located at the motherboard’s upper-right corner.
Although the RAM slots are the last thing that comes to your mind when you’re purchasing
your computer, it would be good to check that out too. Sometimes a motherboard can be a bit
older, meaning that you can’t plug in the latest RAM modules in it.
Set jumpers
Before installing the network card, verify that the jumpers are properly set. Today, most computers
do not have jumpers for a network card installation and allow the network card to be set up and
configured through software or plug and play. If available, we recommend it be used.
Software setup
Step 1
Insert the adapter onto your computer.
Step 2
Right click Computer, and then click Manage.
Step 3
Open Device Manager. Right click the adapter and then click Update Driver Software....
Step 4
Click Browse my computer for driver software.
Step 5
Click Let me pick from a list of device drivers on my computer.
Step 6
Highlight Show All Devices and click Next.
Step 7
Click Have Disk.
Step 8
Click Browse.
Step 9
Point to the inf file in the driver folder, and then click Open.
Note: Please click start button, right click Computer and go to properties to confirm operating
system and system type of your computer.
Step 10
Click Next.
Step 11
Click Install this driver software anyway.
Step 12
Click Close.
Configuring Windows clients for TCP/IP involves installing and configuring the TCP/IP network
protocol.
The following instructions are based on the Configuring TCP/IP function of Windows XP.
1. Click Start > Settings > Control Panel.
2. On the control panel, double-click Network and Dial-Up Connections.
3. Right-click Local Area Connection.
4. Click Properties. If Internet Protocol (TCP/IP) does not appear in the list, do the
following:
a. Click Install.
b. Select Protocol, and then click Add.
c. Select Internet Protocol (TCP/IP).
d. Click OK. This returns you to the Local Area Connection Properties window.
5. Select Internet Protocol (TCP/IP), and then click on Properties.
6. Select Using the Following IP Address. Check with your network administrator to
determine the correct settings for this tab. If your PC does not automatically obtain IP
and DNS addresses, do the following:
a. Enter the IP address of your PC (for example, 199.5.83.205).
b. Enter the subnet mask (for example, 255.255.255.0).
c. Enter the default gateway (for example, 199.5.83.1).
d. Enter the preferred DNS server (for example, 199.5.100.75).
e. Enter the alternate DNS server (for example, 199.5.100.76).
7. If you are using a Windows Internet Name Server, click the Advanced tab, select WINS
Address, and do the following:
a. Click Add.
b. Enter the primary WINS server (for example, 199.5.83.205).
c. Enter the secondary WINS server (for example, 199.5.83.206).
d. The remaining settings should remain as the defaults.
8. Click OK on the Local Area Connection Properties window. It is not necessary to restart
your PC.
Configuring Windows clients for TCP/IP involves installing and configuring the TCP/IP network
protocol.
The following instructions are based on the Configuring TCP/IP function of Windows XP.
1. Click Start > Settings > Control Panel.
2. On the control panel, double-click Network and Dial-Up Connections.
3. Right-click Local Area Connection.
4. Click Properties. If Internet Protocol (TCP/IP) does not appear in the list, do the
following:
a. Click Install.
b. Select Protocol, and then click Add.
c. Select Internet Protocol (TCP/IP).
d. Click OK. This returns you to the Local Area Connection Properties window.
5. Select Internet Protocol (TCP/IP), and then click on Properties.
6. Select Using the Following IP Address. Check with your network administrator to
determine the correct settings for this tab. If your PC does not automatically obtain IP
and DNS addresses, do the following:
a. Enter the IP address of your PC (for example, 199.5.83.205).
b. Enter the subnet mask (for example, 255.255.255.0).
c. Enter the default gateway (for example, 199.5.83.1).
d. Enter the preferred DNS server (for example, 199.5.100.75).
e. Enter the alternate DNS server (for example, 199.5.100.76).
7. If you are using a Windows Internet Name Server, click the Advanced tab, select WINS
Address, and do the following:
Click Add.
a.
Enter the primary WINS server (for example, 199.5.83.205).
b.
Enter the secondary WINS server (for example, 199.5.83.206).
c.
The remaining settings should remain as the defaults.
d.
8. Click OK on the Local Area Connection Properties window. It is not necessary to restart
your PC.
A loopback test is the process of sending digital data streams from a source back to the same point
without any intentional modifications. It’s generally performed to determine whether a device works
properly and whether there are failing nodes in a network.
In order to test your local machine, an address is reserved that always refers to your local host
rather than any other hosts on a network. For IPv4, this class A network address is 127.0.0.1.
Command:
ping 127.0.0.1 -t