Dc Lab Report
Dc Lab Report
For the partial fulfillment of the requirement of the curriculum designed by BCE,
United Technical College under PoU
Submission Date: 2081/10/14
0
Lab:- 1 Date:-081-08-27
TITLE: CRIMPING OF TWISTED-PAIR CABLE WITH RJ45 CONNECTOR DOR STRAIGHT
THROUGH, CROSS-OVER, ROLL-OVER.
Introduction
Crimping twisted-pair cables with RJ45 connectors is an essential
networking skill, allowing the assembly of Ethernet cables for
different uses. This report details the steps for crimping cables in three
configurations: straight-through, crossover, and rollover. Each type
serves a distinct networking function, making it important to
understand their differences for efficient network setup and design.
It allows you to connect a router's WAN port to a cable/DSL modem's LAN port.
Connect 2 switches or hubs with one of the hub or switch using an upline port and the other one using
a normal port.
1
Rollover Cables
A rollover cable is a null-modem cable that connects a computer to a
device's console port. It's used to make programming changes to the
device, such as during its initial configuration.
2) Untwist and straighten the wires inside of the cable. Inside of the cable you’ll see a bunch
of smaller wires twisted together. Separate the twisted wires and straighten
them out so they’re easier to sort into the right order.
Cut off the small plastic wire separator or core so it’s out of the way.
Don’t cut off or remove any of the wires or you won’t be able to crimp them
into the connector.
3) Arrange the wires into the right order. Use your fingers to put the wires in the correct order
so they can be properly crimped. The proper sequence is as
follows from left to right: Orange/White, Orange,
Green/White, Blue, Blue/White, Green, Brown/White,
Brown
There are 8 wires in total that need to be arranged in
the right sequence.
Note that the wires labeled Orange/White or
Brown/White indicate the small wires that have 2 colors.
4) Cut the wires into an even line 1⁄2 inch (13 mm) from
sheathing. Hold the wires with your thumb and index finger to keep
them in order. Then, use the cutting section of the crimping tool to
cut them into an even line.
The cutting section of the tool will resemble wire cutters.
The wires must be in an even line to be crimped into the RJ-
45 connector properly. If you cut them in an uneven line,
move further down the wires and cut them again.
2
5) Insert the wires into the RJ-45 connector. Hold the RJ-45 connector so the clip is on the
underside and the small metal pins are facing up. Insert the
cable into the connector so that each of the small wires fits
into the small grooves in the connector.
The sheathing of the cable should fit just inside of the
connector so it’s past the base.
If any of the small wires bend or don’t fit into a groove
correctly, take the cable out and straighten the wires with
your fingers before trying again
The wires must be inserted in the correct order and each
wire must fit into a groove before you crimp the connector.
Result
Following the above step i.e clipping of RJ45 cable looks like this.
3
Conclusion: The final step in the crimping process is using a cable tester. This
ensures that the cable is properly wired and fully functional for its intended
application, helping to prevent potential connectivity issues in the network.
4
Lab:- 2 Date:-081-09-03
INTRODUCTION:
This experiment shows how to transfer data between two computers using an
Ethernet cable. By creating a direct connection, it removes the need for external
storage or internet access. The process includes setting static IP addresses and
enabling file sharing for smooth communication. The goal is to understand and
apply the steps for efficient data transfer in a local network..
Procedure for Transferring Data Between Two Computers Using an
Ethernet Cable:
1. Connect the Two PCs:
o Use an Ethernet or LAN cable to connect both computers. Ensure
that both computers are connected to the same network.
0
o Click on Ethernet > Properties > Internet Protocol Version 4
(TCP/IPv4) > Properties.
o Select Use the following IP address and input the following
settings:
IP Address: 192.168.1.35
Subnet Mask: 255.255.255.0
o After this, both PCs should be visible in the network settings.
4. Gather Computer Information (Optional):
o Use the dxdiag command to retrieve detailed information about
both computers.
o NOTE: -dxdiag command stands for DirectX Diagnostic Tool
-commonly used to troubleshoot and diagnose issues related
to DirectX, but it can also offer a general overview of the system's
configuration.
5. Enable File Sharing:
o Go to Control Panel > Network and Internet > Network and
Sharing Center > Change advanced sharing settings.
o Enable the following options:
Turn on network discovery.
Turn on file and printer sharing.
Turn on sharing so anyone with network access can read and
write files in the Public folders.
o Click Save changes.
6. Disable Password Protected Sharing:
o Select Turn off password protected sharing to avoid entering a
password when accessing files from another PC.
o Ensure to turn password protection back on after the transfer is
complete for security.
7. Select Files for Sharing:
o Right-click the file or folder you want to transfer and select Share
with > Specific people.
8. Set Sharing Permissions:
o In the File Sharing window, select Everyone > Add > Share. This
will allow the file to be accessed from the second PC.
9. Access Shared Files on the Target PC:
o The file or folder should now be transferred. You can check and
access the shared files on the second PC through the Network
section in File Explorer.
Results:
By following the outlined procedure, the data transfer between the two
computers using an Ethernet cable was successfully completed without any
issues. After configuring static IP addresses and enabling file sharing, both
computers communicated seamlessly. The files were transferred smoothly and
efficiently, demonstrating the effectiveness of Ethernet cable transfers in a
local network setup.
Conclusion:
Using an Ethernet cable for data transfer between two computers proved to be
an efficient and reliable method. The configuration of static IP addresses and
enabling file sharing facilitated smooth communication and seamless file
transfer. This approach provides a fast and convenient solution for local data
sharing without the need for external storage or internet access
Experiment-3 Date:-081-09-19
TITLE: SIMULATION OF SINE AND COSINE FUNCTIONS USING MATLAB.
Introduction
Sine and cosine functions are fundamental in mathematics and engineering, describing periodic
oscillations commonly seen in waves and circular motion. These functions are crucial in fields such as
signal processing, physics, and control systems. MATLAB provides an efficient platform to simulate
and visualize these functions, enabling a deeper understanding of their behavior. In this lab, we simulate
the sine (sin(t)) and cosine (cos(t)) functions, explore their periodic nature, and analyze their phase
relationship using MATLAB.
Objective
The purpose of this lab is to simulate and visualize the sine (sin(t)) and cosine (cos(t)) functions
using MATLAB, analyze their properties, and demonstrate their relationship graphically.
0
Results
The sine and cosine functions were successfully simulated and plotted. Below are the key observations
from the plot:
1. Both functions exhibit periodic behavior with a period of 2π.
2. The amplitude of both functions is bounded between −1 and 1.
3. The cosine function leads the sine function by a phase shift of π/2 radians.
Plot
The blue curve represents the sine function sin(t).
The red curve represents the cosine function cos(t).
Conclusion
The sine and cosine functions were successfully simulated and plotted using MATLAB. The graphs
clearly show their periodic behavior, amplitude, and phase relationship. MATLAB effectively
visualized these essential trigonometric functions.
Experiment-4 Date:-081-10-03
TITLE: PLOTTING FREQUENCY MODULATION AND DEMODULATION.
Introduction
Frequency Modulation (FM) is a technique used in electronic communication, most notably for
transmitting information over radio waves. In FM, the frequency of the carrier signal is varied in
accordance with the amplitude of the input (modulating) signal. This report details an experiment
designed to explore the principles of FM modulation and demodulation, analyze the resulting
waveforms, and evaluate the performance of different demodulation techniques.
Objective
To understand the principles of frequency modulation and demodulation.
To observe and analyze the waveforms of modulated and demodulated signals.
To calculate the modulation index and frequency deviation.
Program
clc;
clear all;
close all;
fm=2000;
fc = 5000;
fs = 200000;
mi=2;
t = (0:1/fs:0.01);
%t=0:0.001:0.1;
m=sin(2*pi*fm*t);
subplot(4,1,1);
plot(t,m);
xlabel('Time');
ylabel('Amplitude');
title(['Plotted by sagar dhakal ' ...
'Message Signal']);
grid on;
0
c=sin(2*pi*fc*t);
subplot(4,1,2);
plot(t,c);
xlabel('Time');
ylabel('Amplitude');
title('Carrier Signal');
grid on;
y=sin(2*pi*fc*t+(mi.*sin(2*pi*fm*t)));%Frequency changing w.r.t Message
subplot(4,1,3);
plot(t,y);
xlabel('Time');
ylabel('Amplitude');
title('FM Signal');
grid on;
y=diff(y);
y=abs(y);
subplot(4,1,4);
[b,a]=butter(1,0.005);
z=filter(b,a,y);
z=10.*z;
plot(z);
xlabel('Time');
ylabel('Amplitude');
title('Fm Demodulation');
grid on;
Results
Frequency Modulation Observations
The FM output showed significant frequency variations in response to changes in input
voltage, confirming the relationship between input signal amplitude and frequency deviation.
Spectrum analysis using Fast Fourier Transform (FFT) revealed distinct sidebands,
characteristic of frequency modulation.
Conclusion
This lab provided valuable insights into frequency modulation and demodulation techniques. Future
experiments could explore advanced demodulation methods or variations in modulation index to
further analyze their effects on signal integrity.
Experiment-5 Date:-081-10-10
TITLE: PLOTTING AMPLITUDE MODULATION AND DEMODULATION.
Introduction
Amplitude Modulation (AM) is a method used in electronic communication to transmit information by
varying the amplitude of a carrier wave. This technique enables the effective transmission of audio and
other signals over long distances, making it a key concept in radio broadcasting and
telecommunications.
Objective
The main objective of this experiment is to understand and analyze the processes of amplitude
modulation (AM) and demodulation. This includes generating an AM signal, visualizing it, and
recovering the original message signal through demodulation. The goal is to plot and interpret these
signals in both the time and frequency domains.
Program
%================AM Modulation ====================
clc;
clear all;
close all;
%######################## AM modulation Index ####################
disp('Enter the modulation Index.M<1(under)M>1(over)
M=1(100%)modulation');
m=input(' Enter the value of modulation index M = ');
%########## modulating signal generation ####################XXXX
Am=1; % Amplitude of modulating signal
fa=2000; % Frequency of modulating signal
Ta=1/fa; % Time period of modulating signal
t=0:Ta/1000:6*Ta; % Total time for simulation
ym=Am*sin(2*pi*fa*t); % Eqation of modulating signal
figure(1)
subplot(4,1,1);
plot(t,ym), grid on;% plot of Modulating signal
0
title ( ' Modulating Signal or Base band singnal ');
xlabel ( ' time(sec) ');
ylabel (' Amplitud(volt) ');
%#################### carrier signal ####################
Ac=Am/m;% Amplitude of carrier signal , modulation Index M=Am/Ac ]
fc=fa*10;% Frequency of carrier signal
Tc=1/fc;% Time period of carrier signal
yc=Ac*sin(2*pi*fc*t);% Eqation of carrier signal
subplot(4,1,2);
plot(t,yc), grid on;% plot of carrier signal
title ( ' Carrier Signal ');
xlabel ( ' time(sec) ');
ylabel (' Amplitud(volt) ');
%########################AM Modulation #########################
y=Ac*(1+m*sin(2*pi*fa*t)).*sin(2*pi*fc*t); % Equation of Amplitude
%modulated signal
subplot(4,1,3);
plot(t,y);% Graphical representation of AM signal
title ( ' Amplitude Modulated signal ');
grid on;
xlabel ( ' time(sec) ');
ylabel (' Amplitud(volt) ');
%####################### AM Demodulation ########################
z=y.*yc;
[b a]=butter(1,0.001); %BUTTERWORTH FILTER
lpf=filter(b,a,z);
Rx=1.5.*lpf; %Amplification
subplot(4,1,4);
plot(t,Rx);% Graphical representation of AM signal
title ( ' Amplitude Demodulated signal ');
grid on;
xlabel ( ' time(sec) ');
ylabel (' Amplitud(volt) ');
Enter the modulation Index.M<1(under)M>1(over) M=1(100%)modulation
Enter the value of modulation index M =
0.2
Conclusion
The experiment successfully demonstrated the processes of amplitude modulation and
demodulation. The time and frequency domain plots supported the theoretical principles of AM. The
recovered message signal confirmed the effectiveness of the demodulation process, though minor
deviations were observed, likely due to noise and circuit limitations.
Experiment-6 Date:-081-10-10
TITLE: PLOTTING & ANALYSIS OF PCM (Pulse Code Modulation).
Introduction
Pulse Code Modulation (PCM) is a technique used to digitally represent analog signals. In PCM, the
analog signal is sampled at regular intervals, quantized into discrete values, and then encoded into
binary format. PCM is commonly used in telecommunication systems and audio signal processing
because of its resilience to noise and ability to represent signals in a digital format.
The key processes involved in PCM are:
1. Sampling: Capturing the amplitude of the analog signal at regular time intervals.
2. Quantization: Approximating each sample value to the nearest level in a set of discrete levels.
3. Encoding: Converting the quantized levels into binary code.
4. Reconstruction: Converting the binary code back into an analog signal (optional for analysis).
Objective
The objective of this lab is to understand the principles of Pulse Code Modulation (PCM),
perform the plotting of PCM waveforms, and analyze the characteristics of PCM signals. This includes
the process of sampling, quantization, encoding, and the reconstruction of signals.
Program
% ============% PCM ENCODING % ============
f = 2;
fs = 20;
Ts = 1/fs;
fss = 1.e4;
Tss = 1/fss;
t = 0:Tss:2-Tss;
d = Ts/40:Ts:2+Ts/40;
p = pulstran(t,d,'rectpuls',1/(fs*40));
% ===============% Analog MSG Signal% ===============
m = sin(2*pi*f*t)+1.1;
% =================% Sampled signal% =================
ms = m.*p;
0
% =================% Quantized Msg% =================
qm = quant(ms,2/16);
em = 8*(qm);
% ===============% ENCODING MSG% ===============
j = 1;
for i=1:length(em)
if ((((i>1)&&(em(i)~=em(i-1)))||(i==1))&&(em(i)~=0))
x(j) = em(i)-1;
j=j+1;
end
end
z = dec2bin(x,5);
z = z';
z = z(:);
z = str2num(z);
s = 2*(z')-1;
Tb = 2/length(s);
fb = 0.5/Tb;
BL = Tb/Tss;
y = ones(BL,1);
bit = 5*y*s;
bit = bit(:);
bit = bit'; % Polar NRZ bit stream
% =============% PCM DE-CODING% =============
rb = bit(ceil(Tb/(Tss)):(Tb/Tss):length(bit));
rb = (rb+5)/10;
l = length(rb);
for i = 1:l/5
q = rb((5*i)-4:5*i);
q = num2str(q);
x1(i) = bin2dec(q);
e(i) = x1(i)+1;
end
e = e/8;
y1 = ones(1,ceil((Ts/40)/Tss));
y2 = zeros(1,(Ts/Tss)-length(y1));
y3 = [y1 y2];
y3 = y3';
ms1 = y3*e; % Sampled signal from Encoded Signal
ms1 = ms1(:);
% Filtering Sampled Signal
[n,w] = buttord(f/fss,(f+1)/fss,.6,4);
[a,b] = butter(n,w,'low');
rm = filter(a,b,ms1);
rm = rm*50; % Recieved Orignal Signal
% =================% Plotting Signals% ================
figure(1);
subplot(2,1,1)
plot(t,m,'b',t,ms,'r');
legend('Analog Msg','Sampled Msg')
grid;
xlabel('t -->');
ylabel('Amplitude');
axis([0 2 0 2.25]);
subplot(2,1,2)
plot(t,ms,'k',t,qm,'r');
legend('Sampled Msg','Quantized Msg')
grid; Output:- Figure-1
xlabel('t -->');
ylabel('Amplitude');
axis([0 2 0 2.25]);
figure(2);
subplot(2,1,1)
plot(t,em,'b')
xlabel('t -->');
ylabel('Amplitude');
title('Leveled Msg');
grid;
axis([0 2 -0.5 16.5]);
subplot(2,1,2)
plot(t,bit,'k')
xlabel('t -->'); Output:- Figure-2
ylabel('Amplitude');
title('POLAR NRZ ENCODED');
grid;
axis([0 2 -5.25 5.25]);
figure(3);
subplot(2,1,1)
plot(t,ms1,'b');
title('Recovered Sampled Msg')
grid;
xlabel('t -->');
ylabel('Amplitude');
axis([0 2 0 2.25]);
subplot(2,1,2)
plot(t,rm,'b'); Output:- Figure-3
title('Recovered Analog Msg')
grid;
xlabel('t -->');
ylabel('Amplitude');
axis([0 2 0 2.25]);
Discussion
1. Sampling Rate: The results validate the Nyquist theorem. Sampling below the Nyquist rate
causes aliasing, preventing accurate signal recovery.
2. Quantization Resolution: Higher resolution (more bits) improves signal fidelity but also
increases data size.
3. PCM Encoding: The binary PCM format enables digital transmission, but higher bit depths and
sampling rates lead to increased bandwidth requirements.
Conclusion
This lab demonstrated the processes of Pulse Code Modulation, including sampling, quantization,
encoding, and reconstruction. The experiments emphasized the need to carefully select sampling rates
and quantization resolutions to balance fidelity and data size. PCM’s capability to represent analog
signals in digital form is a key element in modern communication systems.