CN Prabhat
CN Prabhat
AND RESEARCH
SESSION:-2023-24
Computer Networks Lab file
CODE=CSIT-501
2.
Study of Transmission Media and Tools: Co-axial
cable, Twisted Cable,
Fibre optic Cables, Crimping Tool,
Connectors(RJ45,RJ11) etc.
Diagram
9.
Bridges:
Bridges are used to connect two sub networks that use interchangeable protocols. It
combines two LANs to form an extended LAN. The main difference between the
bridge and repeater is that the bridge has a penetrating efficiency.
A gateway is a network node that forms a passage between two networks operating
with different transmission protocols. The most common type of gateways, the
network gateway operates at layer 3, i.e. network layer of the OSI (open systems
interconnection) model. However, depending upon the functionality, a gateway can
operate at any of the seven layers of OSI model. It acts as the entry – exit point for a
network since all traffic that flows across the networks should pass through the
gateway. Only the internal traffic between the nodes of a LAN does not pass through
the gateway.
Modem:
Modem stands for Modulator and Demodulator. It is a device that modulates signals
to encode digital information for transmission and demodulates signals to decode the
transmitted information. A modem transmits data in bits per Second (bps). It is
necessary for communication between digital devices and Analog devices. Modem is
necessary because it acts as a translator between the devices and rapidly transmits
the information.
A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the
size of a modem. It converts a digital data frame from local area network (LAN)
communication technology into a frame appropriate for a wide area network (WAN)
and vice versa.
CSU/DSUs have been in use for decades, and they're reasonably priced and easily
adapted to a variety of networking requirements. They can interface
with Ethernet and other network connectors. And routers can function as
CSU/DSUs.
A Wireless Access Point (WAP) is a networking device that allows connecting the
devices with the wired network. A Wireless Access Point (WAP) is used to create the
WLAN (Wireless Local Area Network), it is commonly used in large offices and
buildings which have expanded businesses.
It is easier and simpler to understand and implant the device. It can be fixed, mobile
or hybrid proliferated in the 21st century. The availability, confidentiality, and
integrity of the communication and network are a responsibility and to be ensured
about that.
ISDN adapters were devices used to connect computers or networks to ISDN lines, a
digital telecommunications standard. They converted digital signals for
transmission over ISDN networks, offering faster and more reliable data transfer
than analog technologies. Available in Basic Rate Interface (BRI) and Primary Rate
Interface (PRI) configurations, ISDN adapters have become largely obsolete due to
the rise of faster broadband technologies.
Transceivers:
Transceivers are electronic devices that combine both transmitter and receiver
functions. They enable the transmission and reception of data or signals over a
network or communication channel. Common in networking equipment, they
convert electrical signals into a format suitable for transmission and back again,
facilitating communication between devices.
Firewalls:
Firewalls are security systems that monitor and control incoming and outgoing
network traffic based on an applied rule set. They act as a barrier between a trusted
internal network and an untrusted external network, preventing unauthorized
access and protecting against cyber threats. Firewalls are crucial for network
security and can be implemented as hardware or software solutions.
Conclusion:
Aim: Study of Transmission Media and Tools: Co-axial cable, Twisted Cable, Fibre optic
Cables, Crimping Tool, Connectors (RJ45, RJ11) etc.
Theory:
Advantages: Disadvantages:
⇢ Least expensive
⇢ Susceptible to external
⇢ Easy to install interference
⇢ High-speed capacity ⇢ Lower capacity and performance
in comparison to STP
⇢ Short distance transmission due
to attenuation
Prabhat Shukla 0827CI211135 Page 8
Applications:
Used in telephone connections and LAN networks
• Shielded Twisted Pair (STP):
This type of cable consists of a special jacket (a copper braid covering or a foil shield)
to block external interference. It is used in fast-data-rate Ethernet and in voice and
data channels of telephone lines.
Advantages:
⇢ Better performance at a higher data rate in comparison to UTP
⇢ Eliminates crosstalk
⇢ Comparatively faster
Disadvantages:
⇢ Comparatively difficult to install and manufacture
⇢ More expensive
⇢ Bulky
Applications:
The shielded twisted pair type of cable is most frequently used in extremely cold
climates, where the additional layer of outer covering makes it perfect for withstanding
such temperatures or for shielding the interior components.
(ii) Coaxial Cable –
It has an outer plastic covering containing an insulation layer made of PVC or Teflon and
2 parallel conductors each having a separate insulated protection cover. The coaxial
cable transmits information in two modes: Baseband mode(dedicated cable bandwidth)
and Broadband mode(cable bandwidth is split into separate ranges). Cable TVs and
analog television networks widely use Coaxial cables.
Advantages:
• Increased capacity and bandwidth
• Lightweight
• Less signal attenuation
• Immunity to electromagnetic interference
• Resistance to corrosive materials
Disadvantages:
• Difficult to install and maintain
• High cost
• Fragile
Applications:
• Medical Purpose: Used in several types of medical instruments.
• Defence Purpose: Used in transmission of data in aerospace.
A crimping tool is a device that is used to make cold weld joints between wires and a
connector through deforming one or both to hold the other. A special connector is used to
join metals together. The weld joint properties (mechanical and
electrical) are strong as the parent materials when the tool works
and offer some result, which is known as crimp. An instance of
crimping is to be affixing a connector to the end of a wire. For
example, a crimping tool is used to create phone cable sand network
cables to combine RJ-11 and RJ-45 connectors to both ends of the
phone or Cat 5 cable. The below picture is an example of RJ-11 (6-pin) and RJ-45 (8-pin)
crimping tools.
RJ45 Connector
RJ45 stands for Registered Jack 45 and is the most commonly used connector in wired
networks. The jacks are mainly used to connect to the Local Area Network (LAN). It was
earlier devised for telephones but is now widely used in Ethernet Networking. The 45 in
RJ45 basically stands for the listing number. The width of RJ45 is usually greater than that
of the telephone cables or other Registered Jacks. Compared to additional jacks the
bandwidth provided by these is high and the range is usually 10 Gbps. Because of speed
and enhanced security, they are used to connect personal computers to
servers, routers etc. These jacks are mostly used in Star Topology.
_ Objective:
The objective of this experiment is to gain hands-on experience in creating three types of Ethernet
cables – Cross-Wired, Roll-Over, and Straight-Through – using RJ45 connectors and a clamping tool.
Understanding these cable configurations is essential for networking professionals as they are
commonly used in various networking scenarios.
__________________________________________________________________________________________
Description:
1. RJ45 Connector:
RJ45 (Registered Jack 45) is a standardized physical connector used for connecting
Ethernet cables to network devices, such as computers, routers, and switches.
It has eight pins and is designed for twisted pair cables.
The RJ45 connector uses a modular eight-position, eight-contact (8P8C) design.
It is the most common connector type for Ethernet cables, supporting data rates up to
10 Gbps.
Application:
RJ45 connectors are used to terminate the ends of twisted pair cables in networking
applications.
________________________________________________________________
2. UTP Cable:
Unshielded Twisted Pair (UTP) cable consists of pairs of insulated copper wires
twisted together.
It is widely used in networking for Ethernet connections.
The twisted pairs help reduce electromagnetic interference (EMI) and crosstalk,
ensuring better signal quality.
Different categories (Cat5e, Cat6, etc.) represent varying levels of performance and
bandwidth.
Prabhat Shukla 0827CI211135 Page 12
Application:
UTP cables are used for a variety of networking applications, including Ethernet
connections and telephone lines.
________________________________________________________________
Clamping tools are essential for creating reliable connections in networking by ensuring
proper termination of cables.
________________________________________________________________
4. Wire Stripper:
A wire stripper is a tool used to remove the outer insulation from cables.
It has various sized cutting notches to accommodate different cable thicknesses.
The tool is designed to strip the outer insulation without damaging the inner
conductors.
Application:
Wire strippers are used to prepare cables for termination by exposing the twisted pairs.
________________________________________________________________
5. Cable Tester:
A cable tester is a device used to verify the continuity and proper wiring of a cable.
It sends signals through the cable and checks for proper connectivity between the
pins.
It can identify issues such as short circuits or open circuits.
Application:
Cable testers are used to ensure the cables are correctly terminated and can reliably
transmit data.
________________________________________________________________
Prabhat Shukla 0827CI211135 Page 13
6. Marker or Labeling Tool:
A marker or labeling tool is used to label or mark cables for easy identification.
Proper labeling helps in quickly identifying the type and purpose of each cable.
It aids in troubleshooting and maintenance.
Application:
Labels are applied to cables to indicate their type (Cross-Wired, Roll-Over, Straight-
Through) and purpose.
Description:
Commonly used to connect two computers or similar devices directly without the need for
a network switch.
2. Roll-Over Cable:
Description:
A Roll-Over Cable, also known as a Yost cable, is a type of Ethernet cable where the
pinouts at one end of the cable are rolled over or flipped compared to the other end.
The pinout for a Roll-Over Cable involves connecting pin 1 at one end to pin 8 at the
other end, pin 2 to pin 7, pin 3 to pin 6, and so on.
It is commonly used for connecting a computer to the console port of a router or a
switch for configuration purposes.
Primarily used for establishing a direct connection between a computer and a network
device's console port for management and configuration.
3. Straight-Through Cable:
Description:
A Straight-Through Cable is the most common type of Ethernet cable where the wire
connections at both ends are identical.
The pinout for a Straight-Through Cable involves connecting pin 1 at one end to pin
1 at the other end, pin 2 to pin 2, and so on.
This type of cable is used to connect different devices, such as a computer to a switch
or a router.
Application:
Widely used for connecting computers to network switches or routers, as it facilitates the
proper transmission of signals between devices.
2. Cable Preparation:
a. Cut the UTP cable to the desired length using the wire stripper.
b. Strip about 1.5 inches of the outer insulation to expose the twisted pairs.
3. Cable Termination:
a. Separate the twisted pairs and arrange them according to the pinout for the specific
cable type.
b. Insert the wires into the RJ45 connector in the correct order.
c. Use the clamping tool to crimp the connector onto the cable securely.
________________________________________________________________
Conclusion:
This experiment provides hands-on experience in creating different types of Ethernet
cables using RJ45 connectors. Understanding cable types and their applications is crucial
for networking professionals, and the skills gained in this experiment are applicable in real-
world networking scenarios.
Prabhat Shukla 0827CI211135 Page 15
Experiment No: 04
Title: Study of different networking models. (OSI, TCP/IP)
Theory:
1. Explain OSI model- Diagram, roles of 7 layers, write its practical implementation by
considering and case study.
▪ Diagram:
▪ Roles of 7 layers:
➢ Layer 1 - Physical Layer:
▪ Role/Functions:
• Manages the physical medium, including cables, connectors, and signal transmission.
• Bit synchronization
• Bit rate control
• Physical topologies
• Transmission mode
2. Explain TCP/IP model- Diagram, roles of 4 layers, write its practical implementation by
considering and case study.
▪ Diagram:
Conclusion:
Main use case Educational and in-depth analysis Internet and modern technology
Prominent protocols Variety of protocols for each layer Primarily relies on IP, TCP, and UDP
Suppose, the N number of devices are connected with each other in a mesh topology, the total
number of ports that are required by each device is N-1.
Suppose, N number of devices are connected with each other in a mesh topology, then the total
number of dedicated links required to connect them is NC2 i.e. N(N-1)/2.
Advantages
Communication is very fast between the nodes.
Mesh Topology is robust.
The fault is diagnosed easily. Data is reliable because data is transferred among the devices
through dedicated channels or links.
Provides security and privacy.
Disadvantages
Installation and configuration are difficult.
The cost of cables is high as bulk wiring is required, hence suitable for less number of devices.
The cost of maintenance is high.
Application
A common example of mesh topology is the internet backbone, where various internet service
providers are connected to each other via dedicated channels. This topology is also used in military
communication systems and aircraft navigation systems.
In Star Topology, all the devices are connected to a single hub through a cable. This hub is the
central node and all other nodes are connected to the central node. The hub can be passive in nature
i.e., not an intelligent hub such as broadcasting devices, at the same time the hub can be intelligent
known as an active hub. Active hubs have repeaters in them. Coaxial cables or RJ-45 cables are used
to connect the computers. In Star Topology, many popular Ethernet LAN protocols are used as
CD(Collision Detection), CSMA (Carrier Sense Multiple Access), etc.
A star topology having four systems connected to a single point of connection i.e. hub.
If N devices are connected to each other in a star topology, then the number of cables required to
connect them is N.
Each device requires only 1 port i.e. to connect to the hub, therefore the total number of ports
required is N.
Advantages
So, it is easy to set up.
It is Robust.
If one link fails only that link will affect and not other than that.
Easy to fault identification and fault isolation.
Star topology is cost-effective as it uses inexpensive coaxial cable.
D
Disadvantages of Star Topology
If the concentrator (hub) on which the whole topology relies fails, the whole system will crash
down.
The cost of installation is high.
Performance is based on the single concentrator i.e. hub.
Applications
A common example of star topology is a local area network (LAN) in an office where all computers are
connected to a central hub. This topology is also used in wireless networks where all devices are
connected to a wireless access point.
Prabhat Shukla 0827CI211135 Page 23
Bus Topology
Bus Topology is a network type in which every computer and network device is connected to a
single cable. It is bi-directional. It is a multi-point connection and a non-robust topology because if the
backbone fails the topology crashes. In Bus Topology, various MAC (Media Access Control) protocols
are followed by LAN ethernet connections like TDMA, Pure Aloha, CDMA, Slotted Aloha, etc.
A bus topology with shared backbone cable. The nodes are connected to the channel via drop lines.
Advantages of Bus Topgy
Advantages
• If N devices are connected to each other in a bus topology, then the number of cables required
to connect them is 1, known as backbone cable, and N drop lines are required.
• Coaxial or twisted pair cables are mainly used in bus-based networks that support up to 10
Mbps.
• The cost of the cable is less compared to other topologies, but it is used to build small
networks.
• Bus topology is familiar technology as installation and troubleshooting techniques are well
known.
• CSMA is the most common method for this type of topology.
Disadvantages
• A bus topology is quite simpler, but still, it requires a lot of cabling.
• If the common cable fails, then the whole system will crash down.
• If the network traffic is heavy, it increases collisions in the network.
• To avoid this, various protocols are used in the MAC layer known as Pure Aloha, Slotted Aloha,
CSMA/CD, etc.
• Adding new devices to the network would slow down networks.
• Security is very low.
Application
A common example of bus topology is the Ethernet LAN, where all devices are connected to a single
coaxial cable or twisted pair cable. This topology is also used in cable television networks.
Tree Topology
This topology is the variation of the Star topology. This topology has a hierarchical flow of
data. In Tree Topology, protocols like DHCP and SAC (Standard Automatic Configuration ) are used.
In this, the various secondary hubs are connected to the central hub which contains the repeater. This
data flow from top to bottom i.e. from the central hub to the secondary and then to the devices or
from bottom to top i.e. devices to the secondary hub and then to the central hub. It is a multi-point
connection and a non-robust topology because if the backbone fails the topology crashes.
Application
A common example of a tree topology is the hierarchy in a large organization. At the top of the tree is
the CEO, who is connected to the different departments or divisions (child nodes) of the company.
Each department has its own hierarchy, with managers overseeing different teams (grandchild
nodes). The team members (leaf nodes) are at the bottom of the hierarchy, connected to their
respective managers and departments.
Application
A common example of a hybrid topology is a university campus network. The network may have a
backbone of a star topology, with each building connected to the backbone through a switch or
router. Within each building, there may be a bus or ring topology connecting the different rooms and
offices. The wireless access points also create a mesh topology for wireless devices. This hybrid
topology allows for efficient communication between different buildings while providing flexibility
and redundancy within each building.
Conclusion:
We can conclude that Topology in computer networks refers to the physical or logical
arrangement of network devices and how data flows between them. There are six commonly
used topologies: bus, star, tree, ring, mesh, and hybrid. Each topology in computer network
has its own strengths and weaknesses.