Wireless Embedded Systems
Wireless Embedded Systems
1. Microcontroller/Microprocessor:
• Description: The core of any embedded system, responsible for executing instructions and
controlling peripheral devices.
• Function: Manages data processing, controls communication protocols, and interfaces with sensors
or actuators.
• Examples: ARM Cortex-M series, ESP32, Raspberry Pi Pico.
• Microcontroller: The processing unit of the system, responsible for data manipulation and control
functions.
• Microcontroller/Processor: The brain of the system that executes code and handles data processing.
2.Wireless Communication Modules Components of Wireless Embedded Systems
• A communication module refers to hardware component within a device that enables data
exchange with devices .
• Communication protocol is a standard set of rules defining how data is structured and transmitted
between devices.
• Communication interface is the physical connect point through which data is exchanged
,essentially acting as the gate way between the module and eternal network.
• All three elements work together to facilitate seamless communication between different systems.
• Each protocol differs in terms of range, power consumption, data rate, and suitability for
specific applications.
• Choosing the right protocol depends on application-specific factors such as power efficiency,
communication range, data rate, and network architecture.
2.Wireless Communication Modules Components of Wireless Embedded Systems
Medical devices:
o Glucose meters, heart monitors
Wireless environmental sensors
o Temperature, pressure, sound, luminous intensity
Household automation
o Security/temperature controllers
o Smoke/motion detectors
4.LoRa / LoRaWAN:
LoRa (Long Range) is a low-power, wide-area network (LPWAN) protocol that enables
long-range communication with minimal power consumption for IoT applications.
Applications: smart cities ,Smart agriculture, environmental monitoring and logistics.
• Examples: RN2483/RN2903
LoRaWAN provides the ability to connect millions of devices with data rates ranging from
0.3 kbps to 50 kbps.
The distance for LoRaWAN application is up to 5 km in urban areas and up to 15 km or
more in rural areas.
With hundreds of millions of devices connected to networks in more than 100 countries and
growing, LoRa is creating a smarter planet.
5.Cellular Modules
• Functionality: Enable cellular network connectivity for data
transmission over long distances using mobile networks (2G/3G/4G).
• The fifth generation of cellular networks is 5G.
• Examples: SIM800L/SIM7000
• Applications: Remote monitoring solutions and GPS tracking.
Components of Wireless Embedded Systems
3. Sensors 4. Actuators
Sensors is devices that gather data from the • Actuator acts as an output device
environment or the system itself. • Components that perform actions based on sensor
Collect data from the environment, like input (motors for movement or relays for
temperature, pressure, or motion. switching).
Devices that convert physical phenomena into • A form of transducer device (mechanical or
electrical signals. electrical) which converts signals to
A transducer device which converts energy from corresponding physical action (motion).
one form to another for any measurement or • Actuators receive commands from the
control purpose. microcontroller to execute physical actions in
Sensors acts as input device. response to sensor inputs.
Examples include temperature sensors, humidity • Examples include motors for movement control or
sensors, smoke sensors accelerometers, GPS relays for switching electrical loads.
receivers, motion detectors.
Components of Wireless Embedded Systems
5. Power Supply
• Wireless embedded systems often rely on batteries or energy harvesters (like solar panels).
• Power management is critical to ensure long battery life.
6. Memory Components 7 . User Interface
• Include both volatile memory (RAM) for Depending on application needs; this could
temporary data storage during operation and involve basic LED indicators/status displays
non-volatile memory (Flash) for storing through LCD screens/touchscreens providing
firmware/software and persistent data. interactive user control.
Together these components form a complete Wireless Embedded System capable of collecting data remotely
then processing it accordingly before transmitting results back effectively!
Networking and connectivity
Key points:
Networking:
• Networking and connectivity is about
• The overall system of connecting devices to share information,
linking various devices, such as
including physical cables and wireless technologies.
computers, servers, and smartphones, so
• communications system connecting two or more computers.
they can share data and communicate
Connectivity:
with each other.
• The ability of devices to establish a connection and exchange
• This connection can be made through
data within a network.
methods like wired cables or wireless
• the capability of microcomputer to share information with
signals.
other computers
• Types of Connectivity:
• Wired Connectivity: This includes connections made through physical cables (like Ethernet cables, fiber optics)
which provide stable and high-speed communication.
• -Wireless Connectivity: This involves the use of radio waves or infrared signals for communication (such as
Wi-Fi, Bluetooth, cellular networks). It offers and mobility but can be subject to interference.
• Network connectivity means setting up communication paths that allow different devices to connect and talk to
each other.
• This is done using various technologies and rules (called protocols) so that they can share information and
interact effectively within a network.
• Network connectivity also shows how well parts of the network connect to each other.
Network Medium
• The computer networks that use environment or air as the media , through which
information is transmitted without any cable or wires or the electronic conductor , rather
by using electromagnetic waves like: IR(infrared) , RF(radio frequencies) , satellite , etc
are wireless computer networks
When hosts and server are connected with one another through guided
media(wireless communication). Like, micro wave, radio waves ,satellite etc.
Networking and connectivity refers to the process of connecting different devices together to exchange
data, while "infrared connectivity" and "radio connectivity" are specific types of wireless
connections used in networking.
Infrared connectivity:
• infrared offering short-range, line-of-sight data transmission
• Wireless technology that Uses infrared light beam to transmit data between devices.
• requiring a direct line of sight between devices( where focus beam is directed at a
receiver to send commands(transmitter).
• IR light is invisible to human eyes ,but can be detected by some cameras and electronics.
• IR used in remote controls for TVs ,DVD players and other appliances.
• In TV remote controls, where the remote send infrared signal to the TV to control
functions like volume and channel changing.
Networking and connectivity
Radio connectivity:
• Uses radio waves to transmit data between devices.
• WI-FI that has become common word today also use radio waves to transmit data among connected devices.
• Some More Examples: TV,AM,FM Radio Signals.
• Radio waves easily travel through the atmosphere and many materials.
• Can cover longer distances than infrared.
• Used in technologies like Wi-Fi, Bluetooth, and cellular networks.
• A short-range radio technology primarily used for connecting devices like headphones, speakers, and
smartwatches.
• Mobile phone networks that use radio signals to provide internet access on the go.
Key Differences:
Transmission medium:
Infrared uses light waves in the infrared spectrum, while radio connectivity uses radio waves.
Line of sight:
Infrared connectivity strictly requires a direct line of sight between devices, meaning no obstructions
can be present between them. Radio waves can penetrate walls and other obstacles, allowing for greater
flexibility in device placement.
Range:
Infrared typically has a much shorter range than radio connectivity, usually limited to a few meters.
Internet
• Switch: A network device that sends traffic it receives to a specific connected device, such as a
single desktop computer or laptop.
• Hosts on a network share the same IP address space.
• A switch is a intelligent hub that forwards incoming frames to a specific port that will take data to its
intended destination. Reads the intended MAC address from the received data frame and
determines the forwarding port from the Switching Table and connect the received frame to the
intended port.
• Switch operates on MAC sub layer of the layer 2 : the data link layer.
• A switch is a device that can be used in all places where a hub is used.
Modem
Modem is a device that converts the digital signal into an
analog signal and vice versa. A computer only reads digital
signals, while signals out on the internet are to analog.
the process of converting digital to analog signal is
modulation and analog to digital signal is known as
demodulation. Cable modem and DSL modems.
A modem is a communication device that converts one form
of signal to another that is suitable for transmission over
communication network such as telephone lines, typically
from digital to analogue and from analogue to digital.
Hubs
A hub is device used to connect several computers together by Ethernet cables.
Hubs cannot filter data, so data packets are sent to all connected devices.
Also, they do not have intelligence to find out best path for data packets which leads to inefficiencies and wastage.
A network device used to transmit data packets to all connected devices.
When a packet arrives at one port, it is copied unmodified to all ports of the hub for transmission. A hub operates on
layer 1 : physical layer
Every data frame it receives ,send it through all of his ports. Because his do not know which port destination
computers connect to.
The destination address in the frame is not changed to a broadcast address.
A network host is a computer or other device connected to a computer network. A network host may offer
information resources, services, and applications to users or other nodes on the network.
networking device
Packet (Bridge)
Transport Layer Transport Layer TCP, UDP
Port-to-Port
TCP Connection Response
Datagram (Router)
Network Layer Host-to-Host
Network Layer IP Get http://www.ibm.com/index.html
Physical Network
Security protocols:
• Secure Socket Layer(SSL)
• Hypertext Transfer Protocol(HTTPS)
• Transport Layer Security(TLS)
Network Protocols
Dynamic Host Configuration Protocol (DHCP): Automates the process of configuring devices on IP
networks and devices to keep networks running smoothly.
LoRa Wireless Protocols: A group of wireless communication technologies that use low power and have a
long range.
Simple Network Management Protocol(SNMP):-for managing nodes on an IP network.
Post office protocol (POP): is designed to receive incoming emails.
Simple Mail Transfer Protocol (SMTP): A protocol that sends emails between computers. It also alerts
users when new emails arrive.
Telnet:It is a protocol that allows the user to connect to a remote computer program
Secure Socket Layer(SSL):protecting sensitive data and securing internet connections.
Hypertext Transfer Protocol(HTTPS):ensures secure communication between two computers where one
sends the request through the browser and the other fetches the data from the web server.
Transport Layer Security(TLS):data security and privacy over the internet, its functionality is encryption,
checking the integrity of data .
What is Network connection type?
• Computer Networks are often differentiated based on the connection mode, like wired or wireless.
• Not all computer networks are the same.
• The network established is used to connect multiple devices to share software and hardware
resources and tools.
• According to the communication requirements, multiple types of network connections are available.
• The most basic type of network classification depends on the network's geographical coverage.
Connectivity devices:
• Devices like cables, routers, switches, access points Types of wireless Network connections:
enable connections.. Different types of networks exist based on their
Network Topologies: geographical reach, including
• The arrangement of different elements in a network • Wireless Personal Area Network (WPAN),
affects its performance and scalability. • Wireless Local Area Network (WLAN),
• Common topologies include star, mesh, bus, and ring • Wireless Metropolitan Area Network (WMAN),
configurations. • Wireless Wide Area Network (WWAN).
• Wireless body area networks(WBAN)
Classification of wireless networks
Work
Laptop Station Laptop Laptop Laptop
Laptop
Printer
Server
WAP
Controls access between a wired and a wireless network. I.E. allows wireless clients to gain access to a wired network
and vice versa.
• There are two basic forms of WLAN installations:
Ad-hoc Network Ad-hoc mode
Infrastructure mode
• Wireless ad hoc network is built ,enable two or more
wireless devices to connected without requirement Infrastructure Mode
wireless or Access point. • Although an ad-hoc arrangement may be good for
The simplest form of a wireless network is created by small networks, larger networks require a single
connecting two or more wireless clients together in a device that controls communications in the wireless
peer-to-peer network and does not include an AP. cell.
All clients within an ad-hoc network are equal. • If present, an AP will take over this role and control
The area covered by this network is known as an who can talk and when.
Independent Basic Service Set (IBSS). • This is known as infrastructure mode and is the mode
A simple ad-hoc network can be used to exchange files of wireless communication most often used in the
and information between devices without the expense home and business environment.
and complexity of purchasing and configuring an AP. • In this form of WLAN, individual laptop can not
Temporary network communicate directly with each other.
Using wireless adapter • To communicate, each device must obtain permission
Setting up an ad hoc network from the AP.
In windows 10 or 8,you can use command prompt to set • The AP controls all communications and ensures that
up an ad hoc network. all laptop have equal access to the medium.
Cmd • The area covered by a single AP is known as a Basic
>netsh wlan set hostednetwork mode =allow Service Set (BSS) or cell.
ssid=network name key=123456
What Is Metropolitan Area Network (MAN)?
• A metropolitan area network (MAN) is a network that connects two or more LANs or campus
area networks together but does not extend beyond the boundaries of the immediate town/city.
• Routers, switches and hubs are connected to create a metropolitan area network.
• It is a network type that covers the network connection of an entire city or connection of a small
area.
• The area covered by the network is connected using a wired network, like data cables.
• Data transmission speed is relatively high due to the installation of optical cables and wired
connections.
Classification of wireless networks
Wi-Fi users
WiMAX BS may be
connected to
the WiMAX
network
Mobile devices
might have WMAN might
built in WiMAX be owned and
adapter or may operated by
be externally organizations
plugged or public
institutions
What Is Wide Area Network (WAN)?
• The Wide Area Network (WAN) is designed to
connect devices over large distances like states or
between countries, uses radio towers for
communication.
• A wide area network (WAN) is a computer network that covers a broad area (i.e. any network whose
communications links cross metropolitan, regional, or national boundaries ).
• The information connected to every device in the relevant network can be shared through the WAN
network.
Classification of wireless networks
3G and others.
Classification of wireless networks
Wireless Body Area Network (WBAN)
• Controller Area Network (CAN) is a low-level network that provides connections between simple
industrial devices (such as sensors, actuators, and valves) and higher-level devices (such as PLC
controllers and computers).
It is widely used in automotive, industrial automation,
and embedded systems due to its reliability, fault
tolerance, and ability to operate in electrically noisy
environments.
Robustness : Resistant electromagnetic interface and faults.
Controller Area Network (CAN): • Twisted wire (twisted pair)(300bps to
100Mbps)
• Coaxial Cable(56Kbps to 550Mbps)
CAN bus a type of communication network used between controllers.
• Fiber Optics(500Kbps to 30Gbps)
Communication protocol used in automobile systems.
In a car different ECUs need to communicate with each other and the CAN bus allows them to do that
efficiently.
CAN bus typically used a twisted pair of wires, which helps reduce electromagnetic interface.
CAN messages are broadcast ,meaning all node receives every message ,but process only relevant
ones(filtered by identifier).
How do nodes know which messages to process?
Each message has an identifier , and nodes can be programmed to listen for specific identifiers.
• A CAN is vehicles bus standard designed to enable efficient communication between electronic control units
(ECUs) within in vehicle,
• essentially allow different part of car to talk to each other through standardized message system,
reducing wiring complexity and cost.
• Examples of such devices include engine management systems, active suspension, Anti-block systems (ABS),
gear and lighting control, air conditioning, airbags and central locking.
• All this means more safety and more comfort for the driver and certainly a reduction of fuel consumption
and exhaust emissions.
Controller Area Network (CAN):
• Message –based protocol
• The CAN bus is a high integrity serial bus system for networking • CAN is message based communication
intelligent devices. protocol, meaning data is sent in packets
• The CAN standard defines a communication network that links all with priority levels to ensure critical
the nodes connected to a bus and enables them to talk with one information is delivery quickly.
another. • meaning devices send messages to each
• There may or may not be a central control nodes, nodes may be other over the network without central
added or remove at any time ,even while the network is operating. controller.
• Each device can be a node on the network.
• With the use of CAN, point-to-point wiring is replaced by one serial bus connecting all control systems.
Key Features of CAN:
Applications of CAN
Message-based protocol:
1.Automotive:
1. Engine control units CAN transmits data in "messages" which contain information about
(ECUs). the sending device and the data itself, enabling multiple devices to
2. Transmission control. receive and process the information.
3. Body electronics (e.g., Priority-based arbitration:
lighting, windows). In Ethernet ,you have CSMA/CD ,but CAN uses Priority-based
2.Industrial Automation: arbitration allowing critical messages to be transmitted first collision
1. PLC communication. issues.
2. Robotics and machinery If multiple devices try to send data at the same time, the CAN protocol
control.
prioritizes the message with the highest priority(lowest identifier
3.Medical Devices:
1. Patient monitoring value) , ensuring critical messages is transmitted first.
systems. Fault Tolerance:
2. Diagnostic equipment. CAN has built-in error detection mechanisms to ensure data integrity
4.Aerospace: and reliability even in noisy environments.
1. Avionics systems. High-Speed Communication:
2. Flight control systems. CAN networks can transmit data at speeds up 1 Mbps or higher.
5.Embedded Systems: Multi-Master Configuration:
1. Home automation. All nodes can send messages on the bus; there’s no designated master
2. IoT devices.
node
Within a WLAN, the lack of well-defined boundaries
makes it impossible to detect if collisions occur
during transmission.
Therefore, it is necessary to use an access method on a
wireless network that ensures collisions do not occur.
Wireless technology uses an access method called
Carrier Sense Multiple Access with Collision
Avoidance (CSMA/CA).
It network protocol that helps prevent collisions when
multiple devices send data over a network.
In this protocol ,each device first sense the channel
before sending the data.
CSMA/CA creates a reservation on the channel for use
by a specific conversation.
If a device requires use of a specific communication
channel in a BSS, it must ask permission from the AP.
While a reservation is in place, no other device may
transmit on the channel thus possible collisions are
avoided.
Local Interconnect Network (LIN)
• LIN (Local Interconnect Network) is a network protocol used for communication between
components in modern vehicles.
• Commonly used for non-critical functions such as controlling interior lighting, seat
adjustments, window actuators, or climate control systems within automobiles.
• But CAN was designed for high reliability and speed protocol (up to 1 Mbit/s) for the harsh
environment of the car electrical bus.
• It is a low-cost single-wire serial protocol that supports communications up to 19.2 Kbit/s
with a maximum bus length of 40 metres (131.2 ft).
• LIN operates on a master-slave configuration where one master node controls the
communication while slave nodes respond to the master's requests.
• LIN clusters consist of 1 master and up to 15 slave nodes
• Time triggered scheduling with guaranteed latency time.
• LIN supports error detection, checksums & configuration
• LIN nodes are typically bundled in clusters, each with a master that
interfaces with the backbone CAN bus.
• Example: In a car's right seat you can roll down the left seat window.
• To do so, you press a button to send a message via one LIN cluster
to another LIN cluster via the CAN bus.
• This triggers the second LIN cluster to roll down the left seat window.
• LIN particularly useful when multiple LIN cluster are connected the CAN bus with vehicle.
• if the driver wants to roll down the passage window ,pushes a button on the driver door ,
this triggers one link cluster to send a message to another LIN cluster
via the CAN bus telling the second LIN cluster to roll down the passage window
similarly the driver could hit a button on the door .
• To lock all the vehicles doors the LIN cluster would again send messages to the CAN bus
which passes it along to other LIN clusters alerting them to the lock their door.
LIN bus vs CAN bus
• USB is a plug and play interface that allows a computer to communicate with
peripheral and other devices.
• USB-connected devices cover a broad range; anything from keyboards and mice,
to music players and flash drives.
• USB may also be used to send power to certain devices, such as powering
smartphones and tablets and charging their batteries.
• The USB connector is the head present at the two ends USB Male Connector:
of the USB cable, have different shapes and sizes. • The Male connector is commonly known as the plug.
• There are two classes of USB connectors, i.e., a male • It is the plug that goes inside the socket.
connector and a female connector. • Used to plug into the USB output port on a device.
• A male part will plug into a female counterpart.
They are used in any computer-like device like video game consoles, audio systems,
DVRs, DVDs, Blu-rays, etc.
These are found at one end of various USB cables that connect the host to a receiver
device.
They are also found at the end of cables hard-wired to USB devices like USB keyboards, a
mouse, joystick, etc
• USB Type-A plug-ins are used for small devices that don’t need cable, like a flash drive.
Moving beyond connectors, it’s vital to grasp the distinctions among various USB standards.
In essence, these standards define how data moves between your devices—a kind of rulebook, if you will.
USB 2.0 has two pins and supports one-way communication only.
USB 2.0 comes with a black port with a maximum 5m cable
length.
Mini A and B USB types were launched in the USB 2.0 version.
Ethernet is a communication technology developed in the 1970s by Xerox that links computers in a
network via a wired connection.
It connects local area network (LAN) and WAN systems.
With LAN and WAN, several devices, such as printers and laptops, may be connected across
buildings, residences, and even small communities.
Ethernet is a networking technology that including the protocol ,port ,cable and computer chip
needed to plug a desktop or laptop into LAN for speedy data transmission via coaxial or fiber
optics or twisted pair cables.
Ethernet uses physical cables to establish a wired connection between devices.
For example, if you plug your desktop computer to laptop into a router at home or work ,you use
Ethernet to connect to the network.
Ethernet: A technology that connects wired local area networks (LANs) and enables the devices to
communicate with each other through a protocol which is the common network language.
Key components of an Ethernet connection
An Ethernet connection encompasses the following:
•The Ethernet protocol: It is a series of standards that governs how data is sent between Ethernet components.
•The Ethernet port:
Ethernet ports (commonly known as jacks or sockets) are openings on computer network infrastructure into
which one may plug in Ethernet cables.
It supports cables with RJ-45 connectors.
The Ethernet port of a computer is linked to an Ethernet network adapter, also known as an Ethernet card,
mounted on the motherboard.
A router may contain numerous Ethernet ports to support various wired network devices.
Ethernet ports: physical sockets on devices that Ethernet cables plug into.
Ethernet jacks: Wall sockets that allow you to plug into an Ethernet network.
Ethernet Cables Structure
You may be familiar with the outer appearance of Ethernet cables, but do you know the inner
structure of Ethernet cables?
Ethernet cables come in different lengths, types, and categories, and the structure can differ.
But all of them feature eight wires twisted into four pairs and a rip cord.
Inside the cable, there are 8 color coded wires.
Wires are twisted into 4 pairs of wires, each pair has a common color theme.
One wire in the pair being a solid or primarily solid colored wire and the other being a primarily white
wire with a colored stripe.
RJ45 Connector
• The "RJ" in RJ45 stands for "registered jack," since it is a standardized networking
interface.
• Different types of RJ are available, including RJ11, RJ45, RJ48, RJ61 etc.
• These jacks are generally used for Ethernet Networking.
• RJ45 stands for Registered Jack 45 and is the most commonly used connector in wired
networks. The "45" simply refers to the number of the interface standard.
• The 45 in RJ45 basically stands for the listing number.
• Ports are the physical socket on devices that Ethernet cables plug into
using a standard RJ45 connector.
• An RJ45 cable is primarily used to connect devices to the internet by providing a wired
connection through an Ethernet network,
• essentially acting as the physical cable that allows you to access the internet via a router or
modem to your computer or other devices like a smart TV or gaming console.
An RJ45 cable, also commonly called an "Ethernet cable," is used to connect a
computer to the internet by plugging one end into the router (which is connected to
the internet service provider) and the other end into the Ethernet port on your
computer, essentially providing a wired connection to access the internet.
Key points about RJ45 cables:
Function:
• Primarily used for connecting devices within a Local Area Network (LAN) to facilitate internet access, file
sharing, and other network communications, allowing them to communicate with each other over a wired
connection.
Connector type:
• The "RJ45" refers to the specific connector type used on the cable ends.
• The RJ45 connector is the standard plug used on Ethernet cables, fitting into dedicated Ethernet ports on
devices like computers, routers, and switches.
Common usage:
• Connecting a computer to a router, modem, or other network devices with an Ethernet port.
• Compared to Wi-Fi, using an RJ45 cable can provide a more stable and faster internet connection due to its
direct wired connection. Uses of RJ 45 Connector
• In system to connect with network.
• Connection of system with a hub or router.
• Used for transmits digital signals between devices.
Structure of RJ45 cable
• The colours of RJ45 wiring include
• RJ45 has a transparent plastic structure and is an 8-pin connector.
• Green / Green-white,
• It is an 8P8C connector and the number of wires that can be connected is 8.
• Orange / Orange-white,
• Blue / Blue-white
• The classification of RJ45 is done based on the wiring. Some of them
• Brown / Brown-white
include Cat 5e, Cat 6, and Cat 7.
• A RJ45 connector is a modular 8 position, 8 pin connector used for
terminating Cat5e patch cable or Cat6 twisted pair cable.
•RJ45 Male :-
•It is commonly called as RJ45 connector .
•It is plugged with the network port of system
•RJ45 Female :-
• It is a port in which RJ45 connector is plugged in.
•It is also called a network port.
Color-Coding of the Wires in the Connectors
•RJ45 Pinout
Pin T568B T568A
• A Pinout is a specific arrangement of wires that dictate how the
white with
connector is terminated. white with green
1 orange
• RJ45 Pinout can be wired in two different ways. stripe
stripe
• The first is the T-568A wiring standard and the second is T-568B .
• The main difference between T568A and T568B is the color order of 2 orange green
green and orange pairs.
• In RJ45 T-568 A the green color wiring comes before orange wiring and white with white with orange
in the case of RJ45 T-568 B orange wiring comes before green wiring. 3
green stripe stripe
• Another difference between the two is RJ45 T568 A provides backward
compatibility with the old wirings whereas RJ45 T568B offers more
4 blue blue
resistance to noises in the signals.
white with
5 white with blue stripe
blue stripe
6 green orange
8 brown brown
Ethernet Cable Wiring
A "Straight Through" cable is primarily used to connect different types of network devices,
like a computer to a router, a computer to a switch, or a router to a switch,
essentially linking devices that operate at different network layers;
making it the most common type of Ethernet cable used for typical network
connections.
A crossover cable uses T568A wiring on one end and T568B wiring on the other end,
allowing for a direct connection between two similar devices like two computers or two
switches without the need for a switch or hub;
essentially, it's used to connect devices of the same type directly to each other.
• A straight-through cable is a type of Ethernet cable used to connect different types of devices within a
network.
• Straight-through cables work well with the flow of data between the two dissimilar connections, on the
other hand, crossover cables work with similar connectors.
• When connecting between two dissimilar devices, for example, from the computer to the router, a straight-
through cable will be needed.
• A crossover cable is a type of Ethernet cable used to connect similar devices directly to each other without
needing an intermediate network device like a switch or hub.
• A difference between straight-through and crossover cables is that the order of the wires differs at each end
of the cable.
• There are no left or right constrictions on the straight-through cable, as both ends have the same wiring
signals, so the wires correspond to the same pins at the other end, too.
• One easy way to tell what you have is to look at the order of the colored wires inside the RJ45 connector.
• If the order of the wires is the same on both ends, then you have a straight through cable.
• If not, then it’s most likely a crossover cable or was wired wrong.
Straight Through vs Crossover Cable
Wiring The same wiring sequence on both ends. Different wiring sequences on each end.
Transmit/Receive Lines Transmit and receive lines remain straight. Transmit and receive lines are crossed over.
Commonly used for connections between computers and Used for direct connections between similar devices such as computers or
Devices Connected
networking devices. switches.
Typically requires Auto MDI-X support in devices to Bypasses the need for Auto MDI-X support as it manually swaps transmit
Auto MDI-X Support
auto-negotiate connection. and receive lines.
Common Color Coding Typically follows the TIA/EIA-568B standard. Often follows the TIA/EIA-568A standard.
Configuration Complexity Simple to use as it requires no adjustments. Requires careful consideration and configuration based on device types.
Widely available and commonly used in networking Less common and often found in specialized cable kits or custom-made
Availability
hardware. cables.
RJ45 cable testers allow you to guarantee that you did the job
correctly!.
They have two place that separate from each other ,and you plug
each end of your crimped Ethernet cable into the port on each piece
.Then you turn it on and the cable tester will test the connection for
all 8 pins.
If there are any missing lights on any of the pin, it means that you
missed up somewhere and have to restart!.
Slide the two pieces of the tester apart and plug each of the cable ends
into either piece. Turn the switch to “On” or “Slow” .
It it’s working, all 8 numbers should be flashing green.
If any of then are not showing green, it means something is wrong and
you have to redo it!
The RJ45 connector can’t be reused once it’s crimped, so you should just
cut the end off and start again.
If everything is green ,then you’re done if you had a cable boot, you can
push the boots onto the RJ45 connector now.