EXPERIMENT NO.
1
A. To study various Network hardware & Network software.
Learning Objectives: know about network hardware & software
Switches
Routers
Hubs
Gateways, Access Points, NICs, Bridges, Modems, Firewalls, and Cables (Classifications).
Network Protocols (IP, TCP, UDP, HTTP, FTP, ARP, ICMP, IGMP)
Software/OS used: Ubuntu 12.04
Theory:
What is Computer Network?
Computer network means an interconnected collection of autonomous computers. Two computes said to be
connected if they are able to exchange information. The connection needs not to be via a copper wire, fiber
optics, microwares and communication satellite can also be used. By requiring the computer to be
autonomous, we wish to include from our definition system in which there is a clear master/slave relation. If
one computer can forcibly start, stop or control another one, the computers are not autonomous. A system
with one control unit and many slaves is not a network, nor is a large computer with remote printers.
Advantages of Computer network:
Resource Sharing
High Reliability
Saving Money
SERVER
Concept of a server is based on one or more personal computers to perform specific tasks for a number of
other PCs. The most common function is disk, file and print servers. A Disk Server provides low-level
support and performs basic read/write operation to disk sectors. A File Sever is a higher-level support
mechanism, performing such function as lockout and dynamic allocation of space on disk. In a star layout
the server is the principal connection point. All nodes, including the server, are connected to a hub. This
enables the server to house and administer software, fie sharing, file saving and to allocate printers or other
peripherals. In a bus layout, the server acts like arbitrator, each node talks to the server when requesting
information. The server then locates the information on one of the connected clients and sends it to the
requesting client. Servers in any network can be an ordinary node but having more capabilities of handling
the data and having more speed.
WORKSTATION
A node or stand-alone PC that is connected with network is called Workstation. A workstation is generally a
Client. NIC (Network Interface Card): The network Interface Card (NIC) is the interface between the PC
and physical network connection. In Ethernet systems, the NIC connection to a segment of coaxial or UTP
cable (fiber NICs are available but not very common yet). As with any other type of adapter card NICs come
in ISA, PCMCIA, and PCI bus varieties. The NIC is responsible for the operation that tasks place in the
physical layer of the OSI model. It is only concerned with sending and receiving) 0s and 1s, using the IEEE
802.3 Ethernet standard. In windows, the NIC card is identified in the network property; to use protocol with
NIC you must bind the protocol to the adapter car. This is typical done automatically when the protocol is
added. All the NICs are manufactured with a unique 4-bit Mac address using the WINIPCFG utility (from
the run menu). IT is also called as Network Adapter Card.
Function of NIC:
Ø Data Transfer
Ø Data Buffering
Ø Frame Construction
Ø Media Access Control
Ø Parallel/Serial Conversion
Ø Data Encoding/Decoding
Ø Data Transmission/Reception
CABLES
To transmit the data the medium must exist, usually in the form of cables or wireless media. Here are some
most commonly used cable types.
1. Thick Coaxial Cables (thick net) (RG-11)
Thick coaxial cables or thick wire is known as the Ethernet standard RG-11. This cable is mostly used as
backbone cable, distributing Ethernet signal through out a building, an office complex or other large
installation. It is used in 10base5 Ethernet standard. RG-11 is thicker and more study than RG-58 coax. The
length may be up to 500 maters with a max of five segments connected by repeaters. This gives a total
distance of 2500 meters. This is called a network diameter. RG-11 cable is typically orange; with black rings
around the cable every 2.5-meter to allow taps into the cable.
2. Thin coaxial cables (thin net) (RG-58)
RG-58 is typically used for wiring laboratories and offices, or another small group of computers. The
maximum length of thin wire Ethernet segment is 185 meters, Which is due to the nature of the CSMA/CD
method of operation, the cable attenuation, and the speed at which signals propagate inside the coax. The
length is limited to guarantee that collision is detected when machines that are apart transmit at the same
time. BNC connectors are used to terminate each end of the cable. When many machines are connected to
the same Ethernet segment, a daisy chain approach is used. The BNC connectors allow the network interface
card to the next machine. The machine each end of the cable must use a terminating resistor to eliminate
collision-causing reflection in the cable.
3. Twisted pair cables
Twisted pair is probably the most widely used cabling system in Ethernet in networks. Two copper wires
twist around each other to form the twisted pair cable. Depending on category several insulated wire strands
can reside in the cable. Twisted pair is available in two basic types Unshielded Twisted Pair (UTP)
Shielded Twisted Pair (STP)
Unshielded Twisted Pair Mostly the UTP is used. A twisted pair segment can’t exceed 100 meters. This
limitation is the only drawback to twisted pair. Twisted pair is used for 10/100 based Ethernet networks.
UTP cables are wired as straight through or crossover cables. Straight through cables typically connect the
computer’s networks interface can’t to be a port on the hub. Crossover cables are used for NIC to
communication and for hub-to-hub connections when no crossover port is available.
Category-5 cables can be purchased or crimped as either straight through or crossed. A category-5 cable has
8 thin. Colors coded wires inside that run from one end of the cable to the other. Ethernet networks for
communication use only wires 1, 2, 3 and to be connected in both jacks. Straight through cables are used for
connecting to a hub. Crossed cables are used for connecting a hub to another hub (there is an exception:
some hubs are a built in uplink port that is crossed internally, which allows you to uplink hubs with a straight
cable instead.)
Shielded Twisted Pair
It is 150Ω cable containing additional shielding that protects signals against electromagnetic Interference
(EMI) produced by electric motors power lines etc. It is primarily used in Token Ring Network & where
UTP cable would provide insufficient protection against interface. Wires within cables are encased in a
metallic sheath that is conductive as copper in wires. This sheath when properly grounded converts it
ambient noise into current, like antenna. This current is carried to wires within where it creates an equal and
opposite current flowing in twisted pair thus getting cancelled and no noise signal is resulted.
4. Fiber Optic.
Fiber Optic relies on pulsed as light to carry information. Two types of plastic or glass with different
physical properties are used (the inner core and the outer cladding) to allow a beam of light to reflect off the
boundary between the core and cladding. Some fiber optic cables allow many different paths other allow one
single mode. They are called multimode and single mode fibers. A popular multimode fiber has
core/cladding dimensions of 62.5/125 nanometers.
REPEATER
A Repeater is a purely electrical device that extends maximum distance a LAN cable can span by
Amplifying signals passing through it. A Repeater connects two segments and broadcasts packets between
them. Since signal loss is a factor in the maximum length of a segment, a Repeater is used to amplify the
signal and extend the usable length. A common Ethernet rule is that no more than four repeaters may be used
to join segments together. This is a physical limitation designed to keep collision detection working properly.
Repeaters operate at layer 1 (Physical layer) of the OSI model.
BRIDGES
This networks bridge provides an inexpensive and easy way to connect network segments. A bridge provides
Amplification function of a repeater plus, ability to select filter packets based on their addresses. When
network grows in size, it is often necessary to partition it in to smaller group of nodes to help isolate traffic
and improve performance. One way t do this is to use bridge, the operation of it is to keep one segment
traffic to that side and other to other side will cross the bridge, The bridge learns which packets should cross
it as it is used.
ROUTERS
A router is a device that connects two LANs together to form an inter-network. A router is the basic building
block of the Internet. Each router connects two or more networks together by providing an interface for an
Ethernet network and ring network to which it is connected. The router examines each packet of information
to detection weather the packet must be translated form on one network to another network performing a
function similar to a bridge. Unlike a bridge, a router can connect network that use different technologies,
addressing methods, media type, frame format and speeds. A router is a special purpose device designed to
interconnect networks. Such that three networks can be connected using two routers. Routers maintain
routing tables in their memories to store information about the physical connection on the network; the
router examines each packet of data, checks the routing table and then forwards the packet if necessary.
Every other router in the path (between any state destinations) performs a similar procedure. Note that a
router does not maintain any state information about the packets; it simply moves them along the network.
Routers are operated at layer 3(network) of OSI model.
GATEWAYS
A node on a network that serves as an entrance to another network. In enterprises, the gateway node often
acts as a proxy server and a firewall. The gateway is also associated with both a switch, which provides the
actual path for the packet in and out of the gateway. It is also known as a computer system located on earth
that switches data signals and voice signals between satellites and terrestrial networks. A gateway can
operate at any layer of the OSI/RM. The hob of a gateway, also called a protocol converter, is much more
complex than that of a router or switch. Typically, a gateway must convert from one protocol stack to
another. E.g. a gateway may connect a TCP/IP network to an IPX. /SPX network. A Circuit Level Gateway
function provided by Application level gateway products enables trusted users on private network to access
Internet services with all security of a proxy server. An Application Level Gateway provide much stricter
form of security that packet filters, but they are designed to regulate access only for a particular application.
HUBS
Hubs are also called concentrators; expand one Ethernet connection into many. For example, a four-port hub
connects up to four machines via UTP cables. The hub provides a star connection for the four ports. Many
hubs contain a single BNC connector as well to connect the hub to existing 10base2 network wiring, the hub
can also be connected via one of its ports. One pot is desired to operate in either straight through or crossover
mode, selected by a switch on the hub. Hubs that can connect in this fashion are called stackable hubs. A hub
is similar to a repeater, expect it broadcasts data received by any port to all other ports on the hub. Most hubs
contain a small amount of intelligence as well. Examining received packets and checking them for integrity.
If a bad packet arrives or the hub determines that a port is unreliable. It will shut down the line under the
error condition is appears. The hub also acts like a repeater. Because of its slight delay when processing a
packet, the numbers of hubs that may be connected in a series are limited.
There are three types of HUB passive hub, active hub and intelligent hub. The Passive hubs do not
process data signals with only purpose to combine the signal from several networks cables segments. All
devices attached to the passive hub receive another packets that pass through the hub .Hub does not clear up
or amplify the signals, on the contrary absorbs a small part of the signals that is why the distance between a
hub and a computer should not be more than half of the permissible distance between two computers.
Passive hubs have limited functionality so are inexpensive and easy to configure. It has four ports with four
BNC (British Naval Connectors) female connectors to configure networks station or terminated with a 93 Ω
BNC Terminator. The active hubs incorporate electronic components that amplify and cleanup the signals,
that flaw between devices on the network. The process of cleaning up signal is called “signal regeneration”.
The benefits of signals regeneration are:
A network is more robust i.e. less sensitive errors.
Distance between devices can be increased.
Active hubs cost is considerable more than passive hub (active hub function impart as multi port repeaters).
Intelligent hubs are enhanced active hubs the following functions add intelligence to a hub. Intelligent Hubs
are units have form of integrated management capability. Hub Management A hub supports networks
network management protocols that enable the hub to send packets to central network console. Theses
protocols enable network console to manage or control hub. Switching hubs Switching hubs include
circuitry that quickly routes signals between ports on the hub. Insured of repeating a packet to all ports on
the hub, it repeats a packet only to the port that connects to the destination computer for the packet.
SWITCHES It is similar to a bridge, with some important enhancement. First, as witch may have multiple
ports, thus directing packets to several different segments further partitioning and isolating network traffic in
as way similar to router. For ex., if 8-port n way switch is there it can route packets from any input to any
output. Some or all of incoming packet is called store and forward, which stores the received packet before
examining it to for error before retransmitting. Bad packets are not forwarded. A switch typically has auto-
sensing 10/100 mbps ports and will just the speed of each port accordingly; furthermore, a managed switch
supports SNMP for further control over network traffic. Switches operated at layer 2 (Data Link) of OSI
model.
SWITCHES
A network switch is a computer networking device that connects devices together on a computer
network by using packet switching to receive, process, and forward data to the destination device. Multiple
data cables are plugged into a switch to enable communication between different networked devices.
Switches manage the flow of data across a network by transmitting a received network packet only to the
one or more devices for which the packet is intended. Each networked device connected to a switch can be
identified by its network address, allowing the switch to regulate the flow of traffic. This maximizes the
security and efficiency of the network.
NETWORK SOFTWARE
IP(Internet Protocol)
The Internet Protocol (IP) is a network-layer (Layer 3) protocol that contains addressing information and some control
information that enables packets to be routed. IP is documented in RFC 791 and is the primary network-layer protocol
in the Internet protocol suite. Along with the Transmission Control Protocol (TCP), IP represents the heart of the
Internet protocols. IP has two primary responsibilities: providing connectionless, best-effort delivery of datagrams
through an internetwork; and providing fragmentation and reassembly of datagrams to support data links with different
maximum-transmission unit (MTU) sizes.
ARP (Address Resolution Protocol )
The Address Resolution Protocol (ARP) was developed to enable communications on an internetwork and is defined
by RFC 826. Layer 3 devices need ARP to map IP network addresses to MAC hardware addresses so that IP packets
can be sent across networks. Before a device sends a datagram to another device, it looks in its ARP cache to see if
there is a MAC address and corresponding IP address for the destination device. If there is no entry, the source device
sends a broadcast message to every device on the network. Each device compares the IP address to its own. Only the
device with the matching IP address replies to the sending device with a packet containing the MAC address for the
device (except in the case of “proxy ARP”). The source device adds the destination device MAC address to its ARP
table for future reference, creates a data-link header and trailer that encapsulates the packet, and proceeds to transfer
the data.
RARP (Reverse Address Resolution Protocol)
Reverse ARP (RARP) as defined by RFC 903 works the same way as the Address Resolution Protocol (ARP), except
that the RARP request packet requests an IP address instead of a media access control (MAC) address. RARP often is
used by diskless workstations because this type of device has no way to store IP addresses to use when they boot. The
only address that is known is the MAC address because it is burned in to the hardware.
ICMP
To make efficient use of the network resources, IP was designed to provide unreliable and connectionless best-effort
datagram delivery service. As a consequence, IP has no error-control mechanism and also lacks mechanism for host
and management queries. A companion protocol known as Internet Control Message Protocol (ICMP), has been
designed to compensate these two deficiencies. ICMP messages can be broadly divided into two broad categories:
error reporting messages and query messages
Error reporting Messages: Destination unreachable, Time exceeded, Source quench, Parameter problems,
Redirect
Query: Echo request and reply, Timestamp request and reply, Address mask request and reply
RIP
The Routing Information Protocol (RIP) is one of the most commonly used Interior Gateway Protocol on internal
networks which helps a router dynamically adapt to changes of network connections by communicating information
about which networks each router can reach and how far away those networks are. RIP is based on distance vector
routing using the Bellman-Ford algorithm for calculating the distance between nodes (routers). The routing tables at
every node are updated every 30 seconds by transmitting routing table updates. The distance vector metric can be
number of hops or time delay. The router has a table indicating the distance to each of its neighbor. The table at a
router (node) has the first column to show the distance vector metric. The third column in the table indicates the next
node.
OSPF (Open Shortest Path First)
Open Shortest Path First (OSPF) is another Interior Gateway Protocol. It is a routing protocol developed for Internet
Protocol (IP) networks by the Interior Gateway Protocol (IGP) working group of the Internet Engineering Task Force
(IETF). The working group was formed in 1988 to design an IGP based on the Shortest Path First (SPF) algorithm for
use in the Internet. OSPF was created because in the mid-1980s, the Routing Information Protocol (RIP) was
increasingly incapable of serving large, heterogeneous internetworks. OSPF being a SPF algorithm scales better than
RIP.
Conclusion: Hence we have studied various network hardware & software.
Learning Outcomes: Students will able to
1. Identify the various hardware of computer network.
2. Understand the protocol Hierarchy.
3. Devices used at different layer.
4. Know the applications of network hardware and software.
B. Use of Crimping Tool for RJ45.
THEORY: Crimping an RJ45 Connector Correctly Proper Wiring for Ethernet
Cat5/Cat5e/Cat 6Cables
Cables can transmit information along their length. To actually get that information where it needs to
go, you need to make the right connections to an RJ45 connector.
Your cable run needs to terminate into a connector, and that connector needs a jack to plug into.
Registered Jack 45 (RJ45) is a standard type of physical connector for network cables. RJ45 connectors
are commonly seen with Ethernet cables and networks.
Modern Ethernet cables feature a small plastic plug on each end of the cable. That plug is inserted into
RJ45 jacks of Ethernet devices. The term “plug” refers to the cable or “male” end of the connection
while the term “jack” refers to the port or “female” end.
T568A or T568B Wiring Standard:
T568A and T568B are the two color codes used for wiring eight-position modular plugs. Both are
allowed under the ANSI/TIA/EIA wiring standards. The only difference between the two color codes is
that the orange and green pairs are interchanged.
There are no transmission differences between T568A and T568B cabling schemes. North
America’s preference is for T568B. Both ends must use the same standard. It makes no difference
to the transmission characteristics of data.
T568B wiring pattern is recognized as the preferred wiring pattern.
STEP 1:
Using a Crimping Tool, trim the end of the cable you're
terminating, to ensure that the ends of the conducting
wires are even.
STEP 2:
Being careful not to damage the inner conducting wires, strip off approximately 1 inch of the
cable's jacket, using a modular crimping tool or a UTP cable stripper.
STEP 3:
Separate the 4 twisted wire pairs from each other, and
then unwind each pair, so that you end up with 8
individual wires. Flatten the wires out as much as
possible, since they'll need to be very straight for proper
insertion into the connector.
STEP 4:
Holding the cable with the wire ends facing away from you. Moving from left to
right, arrange the wires in a flat, side-by-side ribbon formation, placing them in
the following order: white/orange, solid orange, white/green, solid blue,
white/blue, solid green, white/brown, solid brown.
STEP 5:
Holding the RJ45 connector so that its pins are facing
away from you and the plug-clip side is facing down,
carefully insert the flattened, arranged wires into the
connector, pushing through until the wire ends emerge
from the pins. For strength of connection, also push as
much of the cable jacket as possible into the connector.
STEP 6:
Check to make sure that the wire ends coming out of the
connector's pin side are in the correct order; if not, remove
them from the connector, rearrange into proper formation, and
re-insert. Remember, once the connector is crimped onto the
cable, it's permanent. If you realize that a mistake has been
made in wire order after termination, you'll have to cut the
connector off and start all over again!
STEP 7:
Insert the prepared connector/cable assembly into the
RJ45 slot in your crimping tool. Firmly squeeze the
crimper's handles together until you can't go any further.
Release the handles and repeat this step to ensure a
proper crimp.
STEP 8:
If your crimper doesn't automatically trim the wire ends upon
termination, carefully cut wire ends to make them as flush with the
connector's surface as possible. The closer the wire ends are
trimmed, the better your final plug-in connection will be.
STEP 9:
After the first termination is complete, repeat process on the opposite end
of your cable
CONCLUSION: Thus, we have studied the use of crimping tool for RJ-45.