0% found this document useful (0 votes)
7 views

Dc Lab Report

The document is a report detailing various experiments conducted in a data communication course at Pokhara University. It covers practical applications such as crimping twisted-pair cables, transferring data between computers using Ethernet cables, and simulating sine and cosine functions using MATLAB. Additionally, it explores frequency and amplitude modulation techniques, demonstrating their principles and applications in electronic communication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Dc Lab Report

The document is a report detailing various experiments conducted in a data communication course at Pokhara University. It covers practical applications such as crimping twisted-pair cables, transferring data between computers using Ethernet cables, and simulating sine and cosine functions using MATLAB. Additionally, it explores frequency and amplitude modulation techniques, demonstrating their principles and applications in electronic communication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

Pokhara University (PoU)

United Technical College,

A REPORT OF DATA COMMUNICATION (DC)

Submitted by: Submitted to:


Shiraj Karmacharya Er. Mini Madav Khanal.
Level: Bachelor Subject Teacher
Division: 3rd semester (BE Comp)

For the partial fulfillment of the requirement of the curriculum designed by BCE,
United Technical College under PoU
Submission Date: 2081/10/14

0
Lab:- 1 Date:-081-08-27
TITLE: CRIMPING OF TWISTED-PAIR CABLE WITH RJ45 CONNECTOR DOR STRAIGHT
THROUGH, CROSS-OVER, ROLL-OVER.

Introduction
Crimping twisted-pair cables with RJ45 connectors is an essential
networking skill, allowing the assembly of Ethernet cables for
different uses. This report details the steps for crimping cables in three
configurations: straight-through, crossover, and rollover. Each type
serves a distinct networking function, making it important to
understand their differences for efficient network setup and design.

Straight-Through Wired Cables


Straight-through cable is a type of CAT5 with RJ-45 connectors
at each end, and each has the same pin out. It is in accordance
with either the T568A or T568B standards. It uses the same
color code throughout the LAN for consistency. This type of
twisted-pair cable is used in LAN to connect a computer or a
network hub such as a router. It is one of the most common
types of network cable.
Here are applications where you should use Straight Through
Cable:

It helps you to connect a computer to a switch/hub's normal


port.

You can use it to connect a computer to a cable/DSL modem's LAN port.

It allows you to connect a router's WAN port to a cable/DSL modem's LAN port.

Connect 2 switches or hubs with one of the hub or switch using an upline port and the other one using
a normal port.

Cross Wired Cables


A crossover cable is a type of CAT5 cable with one end wired in the
T568A configuration and the other in the T568B configuration. In this
setup, Pin 1 is crossed with Pin 3, and Pin 2 is crossed with Pin 6. This
cable type is designed to connect two or more computing devices by
reversing the transmission and receive signals within the internal
wiring. Crossover cables are commonly used to link two similar
devices, such as two computers or two switches, directly to each other.

1
Rollover Cables
A rollover cable is a null-modem cable that connects a computer to a
device's console port. It's used to make programming changes to the
device, such as during its initial configuration.

Steps of crimp rj45 cable using crimping tools


1) Strip the cable back 1 inch (25 mm) from the
end. Insert the cable into the stripper section of the
tool and squeeze it tight. Then, rotate the crimping
tool around the cable in a smooth and even motion
to create a clean cut. Keep the tool clamped and pull
away towards the end of the wire to remove the
sheathing.
 The stripping section is a
round hole near the handle of
the tool.
 The sheathing should come off cleanly, leaving the wires exposed.

2) Untwist and straighten the wires inside of the cable. Inside of the cable you’ll see a bunch
of smaller wires twisted together. Separate the twisted wires and straighten
them out so they’re easier to sort into the right order.
 Cut off the small plastic wire separator or core so it’s out of the way.
 Don’t cut off or remove any of the wires or you won’t be able to crimp them
into the connector.

3) Arrange the wires into the right order. Use your fingers to put the wires in the correct order
so they can be properly crimped. The proper sequence is as
follows from left to right: Orange/White, Orange,
Green/White, Blue, Blue/White, Green, Brown/White,
Brown
 There are 8 wires in total that need to be arranged in
the right sequence.
 Note that the wires labeled Orange/White or
Brown/White indicate the small wires that have 2 colors.

4) Cut the wires into an even line 1⁄2 inch (13 mm) from
sheathing. Hold the wires with your thumb and index finger to keep
them in order. Then, use the cutting section of the crimping tool to
cut them into an even line.
 The cutting section of the tool will resemble wire cutters.
 The wires must be in an even line to be crimped into the RJ-
45 connector properly. If you cut them in an uneven line,
move further down the wires and cut them again.

2
5) Insert the wires into the RJ-45 connector. Hold the RJ-45 connector so the clip is on the
underside and the small metal pins are facing up. Insert the
cable into the connector so that each of the small wires fits
into the small grooves in the connector.
 The sheathing of the cable should fit just inside of the
connector so it’s past the base.
 If any of the small wires bend or don’t fit into a groove
correctly, take the cable out and straighten the wires with
your fingers before trying again
 The wires must be inserted in the correct order and each
wire must fit into a groove before you crimp the connector.

6) Stick the connector into the crimping part of the tool


and squeeze twice. Insert the connector in the crimping
section of the tool until it can’t fit any further. Squeeze
the handles to crimp the connector and secure the wires.
Release the handles, then squeeze the tool again to
make sure all of the pins are pushed down.
 The crimping tool pushes small pins in the grooves
down onto the wires to hold and connect them to
the RJ-45 connector.
7) Remove the cable from the tool and check that all of
the pins are down. Take the connector out of the tool and
look at the pins to see that they’re all pushed down in an
even line. Lightly tug at the connector to make sure it’s
attached to the cable.
 If any of the pins aren’t pushed down, put the wire
back into the crimping tool and crimp it again.

Result
Following the above step i.e clipping of RJ45 cable looks like this.

3
Conclusion: The final step in the crimping process is using a cable tester. This
ensures that the cable is properly wired and fully functional for its intended
application, helping to prevent potential connectivity issues in the network.

4
Lab:- 2 Date:-081-09-03

TITLE: TRANSFERRING DATA BETWEEN TWO


COMPUTERS USING AN ETHERNET CABLE.

INTRODUCTION:
This experiment shows how to transfer data between two computers using an
Ethernet cable. By creating a direct connection, it removes the need for external
storage or internet access. The process includes setting static IP addresses and
enabling file sharing for smooth communication. The goal is to understand and
apply the steps for efficient data transfer in a local network..
Procedure for Transferring Data Between Two Computers Using an
Ethernet Cable:
1. Connect the Two PCs:
o Use an Ethernet or LAN cable to connect both computers. Ensure
that both computers are connected to the same network.

2. Open Network Settings:


o Right-click the Start button, select Control Panel, and then
navigate to Network and Sharing Center. You will see the active
network (Ethernet) listed.
3. Configure the IP Address:

0
o Click on Ethernet > Properties > Internet Protocol Version 4
(TCP/IPv4) > Properties.
o Select Use the following IP address and input the following
settings:

On the 1st PC:


 IP Address: 192.168.1.2
 Subnet Mask: 255.255.255.0
On the 2nd PC:

 IP Address: 192.168.1.35
 Subnet Mask: 255.255.255.0
o After this, both PCs should be visible in the network settings.
4. Gather Computer Information (Optional):
o Use the dxdiag command to retrieve detailed information about
both computers.
o NOTE: -dxdiag command stands for DirectX Diagnostic Tool
-commonly used to troubleshoot and diagnose issues related
to DirectX, but it can also offer a general overview of the system's
configuration.
5. Enable File Sharing:
o Go to Control Panel > Network and Internet > Network and
Sharing Center > Change advanced sharing settings.
o Enable the following options:
 Turn on network discovery.
 Turn on file and printer sharing.
 Turn on sharing so anyone with network access can read and
write files in the Public folders.
o Click Save changes.
6. Disable Password Protected Sharing:
o Select Turn off password protected sharing to avoid entering a
password when accessing files from another PC.
o Ensure to turn password protection back on after the transfer is
complete for security.
7. Select Files for Sharing:
o Right-click the file or folder you want to transfer and select Share
with > Specific people.
8. Set Sharing Permissions:
o In the File Sharing window, select Everyone > Add > Share. This
will allow the file to be accessed from the second PC.
9. Access Shared Files on the Target PC:
o The file or folder should now be transferred. You can check and
access the shared files on the second PC through the Network
section in File Explorer.

Results:
By following the outlined procedure, the data transfer between the two
computers using an Ethernet cable was successfully completed without any
issues. After configuring static IP addresses and enabling file sharing, both
computers communicated seamlessly. The files were transferred smoothly and
efficiently, demonstrating the effectiveness of Ethernet cable transfers in a
local network setup.
Conclusion:
Using an Ethernet cable for data transfer between two computers proved to be
an efficient and reliable method. The configuration of static IP addresses and
enabling file sharing facilitated smooth communication and seamless file
transfer. This approach provides a fast and convenient solution for local data
sharing without the need for external storage or internet access
Experiment-3 Date:-081-09-19
TITLE: SIMULATION OF SINE AND COSINE FUNCTIONS USING MATLAB.

Introduction
Sine and cosine functions are fundamental in mathematics and engineering, describing periodic
oscillations commonly seen in waves and circular motion. These functions are crucial in fields such as
signal processing, physics, and control systems. MATLAB provides an efficient platform to simulate
and visualize these functions, enabling a deeper understanding of their behavior. In this lab, we simulate
the sine (sin(t)) and cosine (cos(t)) functions, explore their periodic nature, and analyze their phase
relationship using MATLAB.

Objective
The purpose of this lab is to simulate and visualize the sine (sin(t)) and cosine (cos(t)) functions
using MATLAB, analyze their properties, and demonstrate their relationship graphically.

0
Results
The sine and cosine functions were successfully simulated and plotted. Below are the key observations
from the plot:
1. Both functions exhibit periodic behavior with a period of 2π.
2. The amplitude of both functions is bounded between −1 and 1.
3. The cosine function leads the sine function by a phase shift of π/2 radians.

Plot
 The blue curve represents the sine function sin(t).
 The red curve represents the cosine function cos(t).

Conclusion
The sine and cosine functions were successfully simulated and plotted using MATLAB. The graphs
clearly show their periodic behavior, amplitude, and phase relationship. MATLAB effectively
visualized these essential trigonometric functions.
Experiment-4 Date:-081-10-03
TITLE: PLOTTING FREQUENCY MODULATION AND DEMODULATION.

Introduction
Frequency Modulation (FM) is a technique used in electronic communication, most notably for
transmitting information over radio waves. In FM, the frequency of the carrier signal is varied in
accordance with the amplitude of the input (modulating) signal. This report details an experiment
designed to explore the principles of FM modulation and demodulation, analyze the resulting
waveforms, and evaluate the performance of different demodulation techniques.

Objective
 To understand the principles of frequency modulation and demodulation.
 To observe and analyze the waveforms of modulated and demodulated signals.
 To calculate the modulation index and frequency deviation.

Program
clc;
clear all;
close all;
fm=2000;
fc = 5000;
fs = 200000;
mi=2;
t = (0:1/fs:0.01);
%t=0:0.001:0.1;
m=sin(2*pi*fm*t);
subplot(4,1,1);
plot(t,m);
xlabel('Time');
ylabel('Amplitude');
title(['Plotted by sagar dhakal ' ...
'Message Signal']);
grid on;
0
c=sin(2*pi*fc*t);
subplot(4,1,2);
plot(t,c);
xlabel('Time');
ylabel('Amplitude');
title('Carrier Signal');
grid on;
y=sin(2*pi*fc*t+(mi.*sin(2*pi*fm*t)));%Frequency changing w.r.t Message
subplot(4,1,3);
plot(t,y);
xlabel('Time');
ylabel('Amplitude');
title('FM Signal');
grid on;
y=diff(y);
y=abs(y);
subplot(4,1,4);
[b,a]=butter(1,0.005);
z=filter(b,a,y);
z=10.*z;
plot(z);
xlabel('Time');
ylabel('Amplitude');
title('Fm Demodulation');
grid on;
Results
Frequency Modulation Observations
 The FM output showed significant frequency variations in response to changes in input
voltage, confirming the relationship between input signal amplitude and frequency deviation.
 Spectrum analysis using Fast Fourier Transform (FFT) revealed distinct sidebands,
characteristic of frequency modulation.

Frequency Demodulation Observations


 The output from the PLL demodulator closely resembled the original message waveform for
sinusoidal inputs, demonstrating effective signal recovery.
 Some distortion was observed when using triangular waveforms, indicating potential
limitations in demodulating certain waveform types.

Conclusion
This lab provided valuable insights into frequency modulation and demodulation techniques. Future
experiments could explore advanced demodulation methods or variations in modulation index to
further analyze their effects on signal integrity.
Experiment-5 Date:-081-10-10
TITLE: PLOTTING AMPLITUDE MODULATION AND DEMODULATION.

Introduction
Amplitude Modulation (AM) is a method used in electronic communication to transmit information by
varying the amplitude of a carrier wave. This technique enables the effective transmission of audio and
other signals over long distances, making it a key concept in radio broadcasting and
telecommunications.

Objective
The main objective of this experiment is to understand and analyze the processes of amplitude
modulation (AM) and demodulation. This includes generating an AM signal, visualizing it, and
recovering the original message signal through demodulation. The goal is to plot and interpret these
signals in both the time and frequency domains.

Program
%================AM Modulation ====================
clc;
clear all;
close all;
%######################## AM modulation Index ####################
disp('Enter the modulation Index.M<1(under)M>1(over)
M=1(100%)modulation');
m=input(' Enter the value of modulation index M = ');
%########## modulating signal generation ####################XXXX
Am=1; % Amplitude of modulating signal
fa=2000; % Frequency of modulating signal
Ta=1/fa; % Time period of modulating signal
t=0:Ta/1000:6*Ta; % Total time for simulation
ym=Am*sin(2*pi*fa*t); % Eqation of modulating signal
figure(1)
subplot(4,1,1);
plot(t,ym), grid on;% plot of Modulating signal
0
title ( ' Modulating Signal or Base band singnal ');
xlabel ( ' time(sec) ');
ylabel (' Amplitud(volt) ');
%#################### carrier signal ####################
Ac=Am/m;% Amplitude of carrier signal , modulation Index M=Am/Ac ]
fc=fa*10;% Frequency of carrier signal
Tc=1/fc;% Time period of carrier signal
yc=Ac*sin(2*pi*fc*t);% Eqation of carrier signal
subplot(4,1,2);
plot(t,yc), grid on;% plot of carrier signal
title ( ' Carrier Signal ');
xlabel ( ' time(sec) ');
ylabel (' Amplitud(volt) ');
%########################AM Modulation #########################
y=Ac*(1+m*sin(2*pi*fa*t)).*sin(2*pi*fc*t); % Equation of Amplitude
%modulated signal
subplot(4,1,3);
plot(t,y);% Graphical representation of AM signal
title ( ' Amplitude Modulated signal ');
grid on;
xlabel ( ' time(sec) ');
ylabel (' Amplitud(volt) ');
%####################### AM Demodulation ########################
z=y.*yc;
[b a]=butter(1,0.001); %BUTTERWORTH FILTER
lpf=filter(b,a,z);
Rx=1.5.*lpf; %Amplification
subplot(4,1,4);
plot(t,Rx);% Graphical representation of AM signal
title ( ' Amplitude Demodulated signal ');
grid on;
xlabel ( ' time(sec) ');
ylabel (' Amplitud(volt) ');
Enter the modulation Index.M<1(under)M>1(over) M=1(100%)modulation
Enter the value of modulation index M =
0.2

Conclusion
The experiment successfully demonstrated the processes of amplitude modulation and
demodulation. The time and frequency domain plots supported the theoretical principles of AM. The
recovered message signal confirmed the effectiveness of the demodulation process, though minor
deviations were observed, likely due to noise and circuit limitations.
Experiment-6 Date:-081-10-10
TITLE: PLOTTING & ANALYSIS OF PCM (Pulse Code Modulation).

Introduction
Pulse Code Modulation (PCM) is a technique used to digitally represent analog signals. In PCM, the
analog signal is sampled at regular intervals, quantized into discrete values, and then encoded into
binary format. PCM is commonly used in telecommunication systems and audio signal processing
because of its resilience to noise and ability to represent signals in a digital format.
The key processes involved in PCM are:
1. Sampling: Capturing the amplitude of the analog signal at regular time intervals.
2. Quantization: Approximating each sample value to the nearest level in a set of discrete levels.
3. Encoding: Converting the quantized levels into binary code.
4. Reconstruction: Converting the binary code back into an analog signal (optional for analysis).

Objective
The objective of this lab is to understand the principles of Pulse Code Modulation (PCM),
perform the plotting of PCM waveforms, and analyze the characteristics of PCM signals. This includes
the process of sampling, quantization, encoding, and the reconstruction of signals.

Program
% ============% PCM ENCODING % ============
f = 2;
fs = 20;
Ts = 1/fs;
fss = 1.e4;
Tss = 1/fss;
t = 0:Tss:2-Tss;
d = Ts/40:Ts:2+Ts/40;
p = pulstran(t,d,'rectpuls',1/(fs*40));
% ===============% Analog MSG Signal% ===============
m = sin(2*pi*f*t)+1.1;
% =================% Sampled signal% =================
ms = m.*p;
0
% =================% Quantized Msg% =================
qm = quant(ms,2/16);
em = 8*(qm);
% ===============% ENCODING MSG% ===============
j = 1;
for i=1:length(em)
if ((((i>1)&&(em(i)~=em(i-1)))||(i==1))&&(em(i)~=0))
x(j) = em(i)-1;
j=j+1;
end
end
z = dec2bin(x,5);
z = z';
z = z(:);
z = str2num(z);
s = 2*(z')-1;
Tb = 2/length(s);
fb = 0.5/Tb;
BL = Tb/Tss;
y = ones(BL,1);
bit = 5*y*s;
bit = bit(:);
bit = bit'; % Polar NRZ bit stream
% =============% PCM DE-CODING% =============
rb = bit(ceil(Tb/(Tss)):(Tb/Tss):length(bit));
rb = (rb+5)/10;
l = length(rb);
for i = 1:l/5
q = rb((5*i)-4:5*i);
q = num2str(q);
x1(i) = bin2dec(q);
e(i) = x1(i)+1;
end
e = e/8;
y1 = ones(1,ceil((Ts/40)/Tss));
y2 = zeros(1,(Ts/Tss)-length(y1));
y3 = [y1 y2];
y3 = y3';
ms1 = y3*e; % Sampled signal from Encoded Signal
ms1 = ms1(:);
% Filtering Sampled Signal
[n,w] = buttord(f/fss,(f+1)/fss,.6,4);
[a,b] = butter(n,w,'low');
rm = filter(a,b,ms1);
rm = rm*50; % Recieved Orignal Signal
% =================% Plotting Signals% ================
figure(1);
subplot(2,1,1)
plot(t,m,'b',t,ms,'r');
legend('Analog Msg','Sampled Msg')
grid;
xlabel('t -->');
ylabel('Amplitude');
axis([0 2 0 2.25]);
subplot(2,1,2)
plot(t,ms,'k',t,qm,'r');
legend('Sampled Msg','Quantized Msg')
grid; Output:- Figure-1
xlabel('t -->');
ylabel('Amplitude');
axis([0 2 0 2.25]);
figure(2);
subplot(2,1,1)
plot(t,em,'b')
xlabel('t -->');
ylabel('Amplitude');
title('Leveled Msg');
grid;
axis([0 2 -0.5 16.5]);
subplot(2,1,2)
plot(t,bit,'k')
xlabel('t -->'); Output:- Figure-2
ylabel('Amplitude');
title('POLAR NRZ ENCODED');
grid;
axis([0 2 -5.25 5.25]);
figure(3);
subplot(2,1,1)
plot(t,ms1,'b');
title('Recovered Sampled Msg')
grid;
xlabel('t -->');
ylabel('Amplitude');
axis([0 2 0 2.25]);

subplot(2,1,2)
plot(t,rm,'b'); Output:- Figure-3
title('Recovered Analog Msg')
grid;
xlabel('t -->');
ylabel('Amplitude');
axis([0 2 0 2.25]);

Discussion
1. Sampling Rate: The results validate the Nyquist theorem. Sampling below the Nyquist rate
causes aliasing, preventing accurate signal recovery.
2. Quantization Resolution: Higher resolution (more bits) improves signal fidelity but also
increases data size.
3. PCM Encoding: The binary PCM format enables digital transmission, but higher bit depths and
sampling rates lead to increased bandwidth requirements.

Conclusion
This lab demonstrated the processes of Pulse Code Modulation, including sampling, quantization,
encoding, and reconstruction. The experiments emphasized the need to carefully select sampling rates
and quantization resolutions to balance fidelity and data size. PCM’s capability to represent analog
signals in digital form is a key element in modern communication systems.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy