0% found this document useful (0 votes)
80 views43 pages

Data Comm. Lab

This document discusses different types of cables and connectors used for network connections. It describes straight-through cables which have the same pin assignments on each end and are used to connect a host to a client. Crossover cables have crossed TX and RX lines and are used to connect two hosts directly. Rollover cables have opposite pin assignments on each end and are used to connect to a device's console port for programming.

Uploaded by

Priyam Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
80 views43 pages

Data Comm. Lab

This document discusses different types of cables and connectors used for network connections. It describes straight-through cables which have the same pin assignments on each end and are used to connect a host to a client. Crossover cables have crossed TX and RX lines and are used to connect two hosts directly. Rollover cables have opposite pin assignments on each end and are used to connect to a device's console port for programming.

Uploaded by

Priyam Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 43

EXPERIMENT 1 ​13 January 2016

Aim:- Introduction to cables and connectors.


There are basically three types of cables for connection:-
1. Straight- Through Wired Cables
2. Crossover Wired Cables
3. Rollover Wired Cables

Straight-Through Wired Cables


Straight-Through refers to cables that have the pin assignments on each end of the cable. In other
words Pin 1 connector A goes to Pin 1 on connector B, Pin 2 to Pin 2 etc. Straight-Through wired
cables are most commonly used to connect a ​host to client​.

Crossover Wired Cables


Crossover wired cables (commonly called crossover cables) are very much like Straight-Through
cables with the exception that TX and RX lines are crossed (they are at opposite positions on either

1
end of the cable. Using the 568-B standard as an example below it is shown that Pin 1 on connector
A goes to Pin 3 on connector B. Pin 2 on connector A goes to Pin 6 on connector B etc. Crossover
cables are most commonly used ​to connect two hosts directly​. Examples would be connecting a
computer directly to another computer, connecting a switch directly to another switch, or connecting
a router to a router. ​Note: While in the past when connecting two host devices directly a crossover
cable was required. Now days most devices have auto sensing technology that detects the cable
and device and crosses pairs when needed.

Rollover Wired Cables


Rollover wired cables most commonly called rollover cables, have opposite Pin assignments on
each end of the cable or in other words it is "rolled over". Pin 1 of connector A would be connected to
Pin 8 of connector B. Pin 2 of connector A would be connected to Pin 7 of connector B and so on.
Rollover cables, sometimes referred to as Yost cables are most commonly used to connect to a
devices console port to make programming changes to the device. Unlike crossover and
straight-wired cables, rollover cables are ​not intended to carry data but instead create an
interface with the device​.

2
3
EXPERIMENT 2 13 January 2016

Aim:- Cable and RJ-45 Jack outlet installation.


Colour coding schemes to connect RJ-45.

Tool used:-
Crimping tool
A ​crimping tool​ is a device used to conjoin two pieces of metal by deforming
one or both of them in a way that causes them to hold each other. The

4
result of the tool's work is called a ​crimp​. A good example of crimping is the
process of affixing a connector to the end of a cable. For instance, network
cables and phone cables are created using a crimping tool (shown below) to
join the RJ-45 and RJ-11 connectors to the both ends of either phone
or CAT5 cable.

How does it work?


To use this crimping tool, each wire is first placed into the connector. Once
all the wires are in the jack, the connector with wires are placed into the
crimping tool, and the handles are squeezed together. Crimping punctures
the plastic connector and holds each of the wires, allowing for data to be
transmitted through the connector.
Connection in RJ-45:-

5
6
7
EXPERIMENT 3 ​20 January 2016
,Aim:- Introduction to connecting devices.

 
To  understand  what  connecting  devices  are,  it  is  important  to  know 
about  Backbone  Networks.  Backbone  Network  is  a  means  of 
connecting  2  LAN’s.  It  provides  a  transmission  channel  for  packets 
from  being  transmitted  from  one  LAN  to  the  other.  The  individual 
LAN’s  are  connected  to  the  Backbone  Network  by  using  some  types 
of  devices  such  as  Hubs,  Repeaters,  Switches,  Bridges,  Routers  and 
Gateways. 
 
Hub:- 
A  hub  works  in  the  physical  layer  of  the  OSI  model.  It  is  basically  a 
non-intelligent  device,  and  has  no  decision  making  capability.  What 
a  Hub  basically  does  is take the input data from one of the ports and 
broadcast  the  information  to  all  the  other  ports  connected  to  the 
network. 

8
 

  
Fig 1: 4 port network 
 
To  demonstrate  its  working,  consider  a  4  port  network  as  shown  in 
Fig  1.  There  are  4  computers  connected  to  the  4  ports.  Suppose,  if 
Computer  A  wants  to  send  some  data  to  Computer  B  using  a  Hub, 
then,  Computer  A  broadcasts  the  data  on  the  network,  and 
Computer  B,  being  connected  to  the  network,  has  access  to  the 
data.  But,  in  this  case  all  the  other  ports  connected  to  the  network 
has  access  to  the  data  that  is being transmitted by Computer A. This 
happens  because,  the  Hub  works  in  the  Physical  Layer  and  hence  it 
does  not  know  about  the  MAC  addresses  of  the  ports  connected  to 
the network. So, there is a lack of security in the Hub. 

  
Fig 2: USB Hub 

9
 
The  picture  shows  a  USB  Hub,  wherein  the  data  is  fed  into the input 
port  and  is  broadcasted  to  all  the  other  4  ports.  The  Network  Hubs 
are outdated and are out of the market. 
 
Repeater:- 
A  repeater  is  a  device  similar  to  the  Hub,  but  has  additional 
features.  It  also  works  in  the  Physical  layer.  The  repeaters  are  used 
in  places  where  amplification  of  input  signal  is  necessary.  But,  the 
kind  of  amplification  done  by  the  repeater  is  different  from  the 
regular  amplification  by  amplifiers.  The  regular  amplifies  everything 
fed  into  it.  That  means,  if  the  input  signal  has  noise  induced into it, 
both  the  desired  signal  and  noise  signal  are  together  amplified.  But, 
in  the  case  of  a  repeater,  it  regenerates  the  input  signal,  and 
amplifies  only  the  desirable  signal.  Hence,  the  noise  component  of 
the signal is eliminated. 

  
Fig 3: Repeater 
 
The  repeaters  are  necessary  since,  during  the  transmission  of  the 
signals  over  long  distances,  the  signal  has  attenuation,  delay 

10
distortions  and  noise,  which  lead  in  loss  of  data.  Hence,  in  order  to 
prevent  this,  the  regenerative  repeaters  are  used.  Hence,  the 
repeater  regenerates  the  faded  signal.  In  addition,  it  has  all  the 
features  of  a  Hub.  One  common  problem  between the repeaters and 
the  Hubs  are  that  only  one  transmission  can  take  place  on  the 
network  at  a  particular  time.  If  multiple  devices  transmit  data 
simultaneously, there will be data collision. 
 
 
 
Switch:- 
A  switch  is  an  intelligent  device  that  works  in  the  data  link  layer. 
The  term  intelligent  refers  to  the  decision  making  capacity  of  the 
Switch.  Since  it  works  in  the  Data  link layer, it has knowledge of the 
MAC addresses of the ports in the network. 

  
Fig 4: Switch 
 
Hence,  in  the  Fig  1,  if  data  has  to  be  sent  from  Computer  A  to 
Computer  B,  then,  the  data  is  transferred  to  the  Computer  B  only, 
and  not to any other computers connected on the network. Hence, it 

11
establishes  a  link  between  the  sender  and  the  receiver  based  on the 
MAC  addresses.  This  also  means  that  when  data  is  being  sent  from A 
to  B,  Computer  C  can  establish  a  link  with  Computer  D  and 
communication  can  take  place between them. So, simultaneous data 
transfer  is  possible  in  a  switch.  Also,  Hub  divides  bandwidth,  but  a 
Switch does not. 
It  is  also  to  be  noted  that  a  switch  is  a  secure  device,  because  it 
sends  information  only  to  the  desired  destinations,  and  also  certain 
security  features  such  as  firewalls  can  be  implemented  in  the 
Switches. 
 
Bridge:- 
A  bridge  is  also  a  device  which  works  in  the  Data  Link  Layer,  but  is 
more  primitive  when  compared to a switch. Initial bridges were used 
to  connect  only  2  LAN’s,  but  the  most  recent  ones  perform  similar 
operation  as  the  switches.  It  also  works  on  the  principle  of  transfer 
of information using the MAC addresses of the ports. 

  
Fig 5: Bridge 
 
It  can be noted is that the normal ADSL modem can be connected via 
bridging  also.  The  only  difference  is  that,  when  bridging  is  used, 

12
each  time  the  device  has  to  be  connected  to  the  internet,  it  has  to 
dial  to  the  internet  and  establish  a  connection.  Also,  a  bridge  alone 
cannot  be  used  to  connect  to  the  internet,  because,  the  bridge 
works  in  the  Data  Link  Layer,  and  has  no  knowledge  of  the  IP 
Addresses, which are used in the Internet. 
 
Router:- 
Any  computer  can  be  connected  to  the  internet  via  MODEM,  which 
performs  the  MOdulation  and  the  DEModulation  operations.  But, 
when  there  is  more  than  one  computer  at  home  or  in  an 
organization,  and  we  have  a  single  internet  connection,  we  need  a 
Router.  Router  is  a  device  which  is  used when multiple devices need 
to connect to the Internet using the same IP. 
Any  Internet  Service  Provider  (ISP)  provides  a  single  IP,  and 
especially  for  personal  use,  the  IP  address  is  assigned  dynamically. 
This  is  done  because,  suppose,  an  ISP  has  1000  IP  addresses,  it  does 
not  mean  that  it  has  1000  customers.  An  ISP  assumes  that  not  all 
devices  will  be  connected  to  the  internet  at  the  same  time.  Hence, 
when  a  user  wants  to  access  the  internet,  any  IP  address  from  the 
pool  of  IP  addresses  from  the  ISP  will  be  assigned  to  connect  the 
user to the internet. 

  

13
Fig 6: Router 
Hence,  the  router  does  the  job  of  connecting  multiple  devices  in  a 
LAN  to  the  internet  using  the  same  IP  address.  Since  the  router 
works  in  the  Network  Layer,  it  does  forwarding  on  the  basis  of  IP 
addresses. 
 
Brouter or Bridge:- 
 
Brouter  (Bridging  Router)  is  a  device  which  has  two  functions. 
Brouter  acts  as  a  router  for  known  protocols  (known  by  the  router 
and  those  on  the  network)  and  hence  works  in  the  network  layer. 
For  data  packets  with  unknown  protocols,  it  acts  as  a  bridge  by 
connecting  two different networks which is the function of a bridge - 
and this works in the data-link layer. 
 
Gateway:- 
The  Gateway  devices  work  in  the  Transport  layer  and  above,  where 
the  different  network  technologies  are  implemented.  A  gateway  is 
necessary  when there are different technologies implemented by the 
different LAN’s which are to be connected together. 

14
 
Fig 7: Gateway function 
 
The  Fig  7  shows  the  working  of  a  gateway.  Consider  2  networks,  say 
in  New  York,  and  a  network  in  London.  If  data  has  to  be  sent  from 
one  place  to  another,  we  need  to  ensure  that  the  network 
technologies  that  are  being used by both the networks are the same. 
If not, we need to use a Gateway. 
 
 
 
 
 
 
 
 
 
 

15
​ EXPERIMENT 4​ 27​January 2016 

Aim:- Setting up connection b/w host and server. 


Step1:-​ Setting up the basic connection between PC and server using 
switch. 

 
Step2:- ​Configure the IP addresses of the PC and the server. 

16
 

Step3:- ​Open the Desktop of PC and open web browser. 

17
 
Step4:- ​Type the IP address of the HTTP server. 

18
 
Step5:- ​Configure the DNS settings of the server so that we can open 
the webpage by directly entering the name. 

 
Step6:- ​Open the web page by using the name of the web page. 

19
 
 
Result​ :- The connection is successfully set up. 
 
 
 
 

20
​ EXPERIMENT​ 5 03 February 2016 

Aim:- Setting up basic local area network(LAN) using 


star topology. 
Pre-requisite knowledge :- 
 
ARP 
Address  Resolution  Protocol  (ARP)  is  a protocol for  mapping  an 
Internet  Protocol  address  (IP  address)  to  a  physical  machine  address 
that  is  recognized  in  the  local  network.  For  e.g.  In  IPV 4, an address 
is  32  bits  long.  In local  area  network,  however,  addresses  for 
attached  devices  are  48  bits  long  (MAC  address.)  A  table,  usually 
called  the  ARP  cache,  is  used  to  maintain  a  correlation  between 
each  MAC  address  and  its corresponding IP address. ARP provides the 
protocol  rules  for  making  this  correlation  and  providing  address 
conversion in both directions. 
ICMP 
Internet  Control  Message  Protocol  is  an  error-reporting  protocol 
network  devices  like  routers  use  to  generate  error  messages  to  the 
source  IP  address  when  network  problems  prevent  delivery  of  IP 
packets.  ICMP  creates  and  sends  messages  to  the  source  IP  address 
indicating  that  a gateway to  the  Internet  that  a  router,  service  or 
host  cannot  be  reached  for  packet  delivery.  Any  IP  network  device 
has the capability to send, receive or process ICMP messages. 

21
 
 
 
 
Step1:- ​Set up the connections b/w the host and the hub using star 
topology. 
 

 
Step2:- ​Configure the IP addresses of the hosts. 

22
 
Step3:- ​Switch to Simulation panel and set the ARP and ICMP filters. 

23
 
 
Step4:- ​Open the ARP tables of all the hosts. 

24
 
 
Step5:- ​Send a simple PDU from PC0 to PC2 and PC0 will obtain the 
MAC address of the PC2 using ARP. 

 
 
Result:- ​The LAN was successfully established using star 
topology 

25
​ EXPERIMENT 6 
Aim:- Configuring a router in a network topology. 
Step1:-  Set  up  the  basic  connection  between  the  two  PCs  using 
router. 
 

 
 
Step2:-  Open  the  command  line  interface  of  the  router  and  enter 
the following commands 
 

26
 
 
Step3:-​ Set the IP configuration of both the PCs. 
 

27
 

 
 
Step4:-  Now  in  simulation  mode  send  a  simple  PDU  from  PC  2  to  PC 
3. 
 

28
 
 
Result:-​ The router was successfully configured. 
 
 
 
 
 
 
16 March 2016 

 
   

29
​ ​ ​EXPERIMENT 7 
Aim:-  To  implement  concept  of  subnetting  in  ring 
topology. 
 
Step1:- ​Set up the ring basic ring topology as shown in figure. 
 

 
 
Step2:- ​Configure all the four end devices by setting up their IP 
addresses and subnet masks. 
 

30
 

 
 

 
 

 
 
Step3:- ​Send a message from one end device to another. 

31
 
 
Step4:- ​The message is successfully sent from one end device to 
another. 
 
 

32
 
 
 
 
 
 
 
 
 
 
 
 
 

33
​ EXPERIMENT 8  
 
Aim:- To setup DHCP (Dynamic Host Control 
Protocol) of a router. 
 
Step1​:- Set up the network as shown in the figure. 
 

 
 
Step2​:- Now configure the router as shown in the figure below. 
 

34
 

35
Step3​:- The IP addresses are allotted to the devices as shown in the 
figure. 

 
Step4​:- The message is successfully sent from one host to another. 
 

36
 
 
 
Result:- ​The DHCP of router was successfully established. 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

37
​ EXPERIMENT 9 ​30 March 2016 
 
Aim:- To perform static routing in routers. 
 
 
Step1:- ​Set up the network as shown in the figure below. 
 
 

 
 
 
 
Step2:- ​Now configure the routers and hosts and assign the IP 
addresses to hosts and routers statically as shown in figure. 

38
 
 
Step3​:- Configure Routers R0 and R1 in CLI so that they can send 
messages between each other. 
 

 
 

 
 
Step4​:- Check the network status by sending an ICMP packet. 

39
 
 
The message was successfully sent from one device to another. 
 
Result​:- Successfully performed static routing in routers. 
 
 
 
   
 
 
 
​ EXPERIMENT 10

40
​Aim:- To configure telnet in a network. 
 
Step1​:- Set up the network as given in the figure below. 
 

 
 
Step2​:- Now configure the routers, switches and end devices by 
providing the IP addresses and Default Gateways and establish the 
connection between the two routers . Assign the IP addresses as 
shown in the figure below. 
 

41
 
 
Step3​:- Configure the Router Router1 in CLI as shown in the figure 
below. 
 

 
 

42
 
 
 
 
Step4​:- Now send a ping request and telnet request from PC0’s 
Command Line as shown in the figure below. 
 

 
 
Result​:- The telnet was successfully configured in a network. 

43

You might also like