CN Final
CN Final
Aim: Study of different types of Network cable connections and practically implement
the cross-wired cable and straight through cable using clamping tool.
Materials Required:
● Cat5e/Cat6 Cable
● RJ45 Connectors
● Crimping Tool
● Cable Tester
Network devices work as a mediator between two devices for data transmission, and thus
play a very important role in the functioning of a computer network. Below are some
common network devices used in modern networks:
Modem
A Modem (Modulator-Demodulator) is a device that converts
digital data from a computer into analog signals for transmission
over telephone lines and vice versa. It is essential for internet access
over DSL or cable networks.
Repeater
A Repeater is a network device used to regenerate and amplify weak
signals in a network. It extends the coverage area by ensuring data
signals travel long distances without loss.
Hub
A Hub is a basic networking device that connects multiple devices
in a network and broadcasts incoming data to all connected devices.
It operates at the physical layer and does not differentiate between
devices, making it less efficient than a switch.
Bridge
A Bridge is a networking device that connects two or more network segments, allowing
data to pass between them efficiently. It works at the data link layer and helps manage
network traffic by filtering and forwarding data based on MAC addresses.
Switch
A Switch is an intelligent network device that connects multiple devices within a LAN.
It operates at the data link layer and forwards data based on MAC addresses, improving
network efficiency by reducing collisions.
Router
A Router is a critical networking device that connects multiple
networks and directs data packets based on IP addresses. It
determines the best path for data transmission and enables
communication between different networks, including the internet.
Gateway
A Gateway is a networking device that serves as a bridge between
different networks using different communication protocols. It
enables seamless data transfer between dissimilar systems, such as
connecting an internal enterprise network to the internet.
Network Interface Card (NIC)
A Network Interface Card (NIC) is a hardware component that
enables a computer to connect to a network. It provides a physical
interface for wired (Ethernet) or wireless (Wi-Fi) connections,
facilitating communication between devices.
Access Point
A Wireless Access Point (WAP) is a device that allows wireless
devices connect to a wired network using Wi-Fi. It extends the
range of a network and enables seamless wireless communication
in large areas.
Firewall
A Firewall is a network security device that monitors and controls
incoming and outgoing network traffic. It acts as a barrier between
trusted and untrusted networks, protecting systems from cyber
threats and unauthorized access.
Types of Cables:
Cables are essential components in networking, used to transmit data between
devices. They vary based on speed, distance, and interference resistance. Common
types include twisted pair, coaxial, and fiber optic cables, each serving specific
networking needs.
Twisted Pair Cable
● Two types: Unshielded Twisted Pair (UTP) and Shielded Twisted Pair (STP).
Coaxial Cable
2. Crossover Cable
o Used to connect similar devices (e.g., PC to PC, switch to switch).
o One end follows T568A, and the other follows T568B.
3. Rollover Cable (Console Cable)
o Used to connect a computer to a network device’s console port for
configuration.
Types of Cable Connections
1. RJ45 Connector – Used for Ethernet cables in networking. It has an eight-pin configuration
and is commonly found in wired networking setups, including home and office environments. RJ45
connectors provide a secure connection for transmitting data and are widely used in LANs, ensuring
reliable and high-speed internet connectivity.
2. BNC Connector – Used with coaxial cables in CCTV and radio applications. It features a quick-
connect bayonet-style mechanism, allowing for easy and secure connections. BNC connectors are
commonly used in video surveillance systems, radio- frequency transmissions, and test equipment,
providing a stable signal transmission with minimal loss and interference.
3. SC, ST, and LC Connectors – Used in Fiber optic cables for network communication. SC
(Subscriber Connector) is known for its push-pull mechanism, while ST (Straight Tip) features a
bayonet lock. LC (Lucent Connector) is compact and widely used in high-density networking
applications. These connectors ensure efficient light signal transmission with minimal signal loss.
Connector A Connector B
Pin 1 Pin 1
Pin 2 Pin 2
Pin 3 Pin 3
Pin 4 Pin 4
Pin 5 Pin 5
Pin 6 Pin 6
Pin 7 Pin 7
Pin 8 Pin 8
Crossover wired cables (commonly called crossover cables) are very much like
Straight- Through cables with the exception that TX and RX lines are . Using the
568-B standard as an example below, you will see that Pin 1 on connector A goes to
Pin 3 on connector B. Pin 2 on connector A goes to Pin 6 on connector B, etc.
Crossover cables are most commonly used to connect two hosts directly. Examples
would be connecting a computer directly to another computer, connecting a switch
directly to another switch etc
Connector A Connector B
● Pin 1 Pin 1
● Pin 2 Pin 2
● Pin 3 Pin 3
● Pin 4 Pin 4
● Pin 5 Pin 5
● Pin 6 Pin 6
● Pin 7 Pin 7
● Pin 8 Pin 8
Rollover wired cables, most commonly called rollover cables, have opposite Pin
assignments on each end of the cable or, in other words, it is "rolled over." Pin 1 of
connector A would be connected to Pin 8 of connector B. Pin 2 of connector A would be
connected to Pin 7 of connector B and so on. Rollover cables, sometimes referred to as
Yost cables are most commonly used to connect to a device's console port to make
programming changes to the device. Unlike crossover and straight-wired cables, rollover
cables are not intended to carry data but instead create an interface with the device.
Connector A Connector B
● Pin 1 Pin 1
● Pin 2 Pin 2
● Pin 3 Pin 3
● Pin 4 Pin 4
● Pin 5 Pin 5
● Pin 6 Pin 6
● Pin 7 Pin 7
● Pin 8 Pin 8
Experiment-2
AIM: Connecting Devices on Cisco Packet Tracer
Material Required:
• Laptop/Desktop
• CISCO Packet Tracer program
Setting Up:
Follow the below steps to initiate the setup for the connection:
Step 1: Download Cisco Packet Tracer.
Step 2: Run and install the setup (You can be requested to log in to your Cisco Networking Academy
Account or you can also log in as a guest).
Step 3: After the installation procedure has completed this display (below) will appear when you run the
Cisco Packet Tracer-Start the application.
Implementation:
Follow the below steps to implement the connection:
Step 1: From the bottom toolbar, click on ‘End Devices’ and select ‘PC’ and then click on the screen (for
two PC’s do this step twice).
Step 3: After selecting the wire click on the computer on the screen(here PC0) and select FastEthernet0.
Then, drag the wire to the other pc (here PC1) and do the same.
Step 4: Now, we will assign the IP address to both the PCs (PC0 & PC1).
After clicking on IP configuration this is what will appear
Now in IPv4 Address, write 192.168.1.1, Subnet mask will be 255.255.255.0
Now if in Realtime box- PDU list window it shows successful, that means all the connections are correct
and the data transfer is successful
You have successfully connected two computers, using the virtual program Cisco Packet Tracer .
Experiment-3
AIM: Configuration of an IP Address on a Router Interface: Packet Tracer
Materials Required:
● Cisco Packet Tracer software.
● Virtual PCs, Switch, and Copper Straight-Through Cables (within Packet Tracer)
Now, let’s focus on the “privileged exec” mode, its purpose, and why it is a crucial component of
router administration.
Topology Diagram
Background / Preparation:
In this activity, you will configure these settings on the customer Cisco Catalyst 2960 switch:
● Host name
● Console password
● vty password
● Privileged EXEC mode password
● Privileged EXEC mode secret
● IP address on VLAN1 interface
● Default gateway
a. From the Customer PC, use a console cable and terminal emulation software to connect to the
console of the customer Cisco Catalyst 2960 switch.
b. Set the host name on the switch to CustomerSwitch using these commands.
a. From global configuration mode, switch to configuration mode to configure the console line.
CustomerSwitch(config)#line console 0
b. From line configuration mode, set the password to cisco and require the password to be entered at
login.
CustomerSwitch(config-line)#password cisco
CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit
CustomerSwitch(config)#line vty 0 15
b. From line configuration mode, set the password to cisco and require the password to be entered at
login.
CustomerSwitch(config-line)#password cisco
CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit
From global configuration mode, switch to interface configuration mode for VLAN1, and assign the IP address
192.168.1.5 with the subnet mask of 255.255.255.0.
CustomerSwitch(config)#interface vlan 1
CustomerSwitch(config- if)#ip address 192.168.1.5 255.255.255.0
CustomerSwitch(config- if)#no shutdown
CustomerSwitch(config-if)#exit
Materials Required:
● Cisco Packet Tracer software.
● Switch and multiple PCs (simulated in Packet Tracer).
THEORY:
A Virtual Local Area Network (VLAN) is a logical grouping of devices in a network, enabling segmentation
to improve performance, security, and manageability. VLANs create multiple broadcast domains within a
single switch, ensuring traffic is contained within each VLAN unless routed externally.
Benefits of VLANs:
PROCEDURE:
4. Create VLANs:
● Create VLAN 10 and VLAN 20:
Switch(config)# vlan 10
Switch(config-vlan)# name Sales
Switch(config-vlan)# exit
Switch(config)# vlan 20
Switch(config-vlan)# name IT
Switch(config-vlan)# exit
● The output should show VLAN 10 with ports Fa0/1, Fa0/2 and VLAN 20 with port Fa0/3.
7. Test Connectivity:
● Open the Command Prompt on each PC.
● PC0 should be able to ping PC1 (since they’re in the same VLAN).
ping 192.168.10.2
● PC0 should not be able to ping PC2 (since they’re in different VLANs).
OBSERVATION: