Anda di halaman 1dari 38

DC LAB (CS214)

Global Institutes of Management & Emerging Technologies


Department of CSE LAB MANUAL OF DATA COMMUNICATION (DC)

Subject: DC Semester: 4th

Code: CS-214 Branch: CSE

DC LAB (CS214)

Prepared By: Dilbag (Instructor)

Checked By:

EXPERIMENT NO. 1 S No.


1. 2. 3. 4. 5. 6. 7. 8. 9.

List of Practical
Familiarization with computer hardware Introduction with network Computing. Study of Peer to Peer networking Study the different Topologies used in LAN TCP/IP. Client/Server Architecture. Familiarization with transmission media viz coaxial cable, twisted pair cable, optical cable, connectors. Configuring Network Neighborhood. Sharing of resources with two connected nodes. Implementation of protocol & their configuration services.

Page No.
1-3 4-9 10-13 14-17 18 19-26 27-34 35-37 38-42

NAME : FAMILIARIZATION WITH COMPUTER HARDWARE OBJECTIVE :TO UNDERSTAND ALL COMPONENTS OF COMPUTER HARDWARE.
Hardware is defined as the physical, or the tangible, parts of your computer. All components that can be connected or plugged into your computer are considered hardware. Programs, or software are required so that these components can function well. There are two main divisions of hardwareinternal and external.

DC LAB (CS214)

COMPUTER PARTS : MOTHERBOARD OR MAINBOARD PROCESSOR HEAT SINKS MONITOR KEYBOARD MOUSE PRINTER CD-ROM FLOPPY DRIVE HARD DRIVE

Keyboard:- The keyboard is the part with the letters and numbers where you put hands and type on most traditional computers, it is a separate device, connected by a card but it may be attached to or built into one of the other parts, particularly in a laptop computer.

DC LAB (CS214) Monitor:- the monitor is the part that looks a lot like a TV set when you type things on the keyboard the letters and numbers show up on the monitor. It is not like a computer, its just the part that makes pictures for you to see. Computer or CPU box:- CPU stands for central processing unit. This is the main component of computer all the data is stored in the memory through it CPU has arithmetic logic unit, control unit etc. CPU boxes computers in two special types called tower Desktop:- the desktop is designed to lie down flat even through you can stand it on its side of you want to .in the desktop box, we can find that the opening for CD and floppy disk drivers are horizontal when the CPU box is lying down flat. A tower CPU box is designed to stand up tall. We can find out the opening for the CD and floppy disk drivers vertically. Mouse:- The mouse is a pointing device with a roller on its base, when a mouse rolls on a flat surface, the cursor on the screen also moves in the screen also moves in the direction of the mouses movement of mouse cause the roller to move and potentiometers coupled to the roller, sense the relative motion. This motion is then converted to digital values that determine the direction of movement. A mouse generally has two or three buttons which can be used to input commands other operations. Printer:- the most convenient and useful method by which computer can deliver information is by means of printed characters. Printers can be dived into two categories: 1. Impact printer:- In these printers there is a mechanical contact between the print head and proper. 2. Non impact printer:- In these printers, there is no mechanical contact between the print head and paper. External modem:-Unless you have a really old computers. The modem is almost certain to be built in, inside the CPU box although technical people persist in thinking of it as an accessory however in the old days modems really were exotic accessceries that had to be attached lots of wires and plugs. External disk drivers:-another kind of accessory is an external disk driver. This is becoming more rare as the computer disk driver such as cd drivers into the computer cpu box and you did not have to a attach them with lots of wires and extra plugs.

DC LAB (CS214)

EXPERIMENT NO. 2
NAME : INTRODUCTION WITH NETWORK COMPUTING. OBJECTIVE :TO UNDERSTAND CONCEPT OF NETWORK & ITS COMPONENTS.
What is Network: - A network is a connection between at least two computers so that they can share resources. Although most networks are more complex than this two computer scenario, all networks are based on the concept of sharing. In addition there are many types of physical connections and related software to consider. The different types of network are LAN: - LAN stands for local area network within a single building or campus of upto few kilometers in size. They are widely used to connect and workstations in factories etc to share resources and exchange information. LANs are distinguished from other kinds of networks by three characteristics 1. Their size 2. their transmission technology 3. their topology MAN: - Metropolital area network covers a city. The best- known example of man is cable television network.. MAN uses wan technologies to interconnect LANs with in a specific geographical area. WAN:- Wide area network or WAN spans a large geographical area often a country or continent. In wan, the sub net consists of two distinct components: 1. Transmission line 2. Switching line 1. Transmission line:- transmission line moves bits between machines. They are made of copper wire, optical fiber. 2. Switching line:- switching elements are specialized computer that are connected three or more transmission line NETWORKING HARDWARE What is Networking Hardware? Networking hardware includes all computers, peripherals, interface cards and other equipment needed to perform data-processing and communications within the network. CLICK on the terms below to learn more about those pieces of networking hardware. This section provides information on the following components: File Servers Workstations Network Interface Cards Switches Repeaters Bridges Routers

DC LAB (CS214)

File Servers A file server stands at the heart of most networks. It is a very fast computer with a large amount of RAM and storage space, along with a fast network interface card. The network operating system software resides on this computer, along with any software applications and data files that need to be shared. The file server controls the communication of information between the nodes on a network. For example, it may be asked to send a word processor program to one workstation, receive a database file from another workstation, and store an e-mail message during the same time period. This requires a computer that can store a lot of information and share it very quickly. File servers should have at least the following characteristics: 800 megahertz or faster microprocessor (Pentium 3 or 4, G4 or G5) A fast hard drive with at least 120 gigabytes of storage A RAID (Redundant Array of Inexpensive Disks) to preserve data after a disk casualty A tape back-up unit (i.e. DAT, JAZ, Zip, or CD-RW drive) Numerous expansion slots Fast network interface card At least of 512 MB of RAM Workstations All of the user computers connected to a network are called workstations. A typical workstation is a computer that is configured with a network interface card, networking software, and the appropriate cables. Workstations do not necessarily need floppy disk drives because files can be saved on the file server. Almost any computer can serve as a network workstation. Network Interface Cards The network interface card (NIC) provides the physical connection between the network and the computer workstation. Most NICs are internal, with the card fitting into an expansion slot inside the computer. Some computers, such as Mac Classics, use external boxes which are attached to a serial port

DC LAB (CS214) or a SCSI port. Laptop computers can now be purchased with a network interface card built-in or with network cards that slip into a PCMCIA slot. Network interface cards are a major factor in determining the speed and performance of a network. It is a good idea to use the fastest network card available for the type of workstation you are using. The three most common network interface connections are Ethernet cards, LocalTalk connectors, and Token Ring cards. According to a International Data Corporation study, Ethernet is the most popular, followed by Token Ring and LocalTalk (Sant'Angelo, R. (1995). NetWare Unleashed, Indianapolis, IN: Sams Publishing). Ethernet Cards Ethernet cards are usually purchased separately from a computer, although many computers (such as the Macintosh) now include an option for a pre-installed Ethernet card. Ethernet cards contain connections for either coaxial or twisted pair cables (or both) (See fig. 1). If it is designed for coaxial cable, the connection will be BNC. If it is designed for twisted pair, it will have a RJ-45 connection. Some Ethernet cards also contain an AUI connector. This can be used to attach coaxial, twisted pair, or fiber optics cable to an Ethernet card. When this method is used there is always an external transceiver attached to the workstation. (See the Cabling section for more information on connectors.)

Fig.1. Ethernet card. From top to bottom: RJ-45, AUI, and BNC connectors LocalTalk Connectors LocalTalk is Apple's built-in solution for networking Macintosh computers. It utilizes a special adapter box and a cable that plugs into the printer port of a Macintosh (See fig. 2). A major disadvantage of LocalTalk is that it is slow in comparison to Ethernet. Most Ethernet connections operate at 10 Mbps (Megabits per second). In contrast, LocalTalk operates at only 230 Kbps (or .23 Mbps). Token Ring Cards

DC LAB (CS214) Token Ring network cards look similar to Ethernet cards. One visible difference is the type of connector on the back end of the card. Token Ring cards generally have a nine pin DIN type connector to attach the card to the network cable.

SWITCH A concentrator is a device that provides a central connection point for cables from workstations, servers, and peripherals. In a star topology, twisted-pair wire is run from each workstation to a central switch/hub. Most switches are active, that is they electrically amplify the signal as it moves from one device to another. Switches no longer broadcast network packets as hubs did in the past, they memorize addressing of computers and send the information to the correct location directly. Switches are: Usually configured with 8, 12, or 24 RJ-45 ports Often used in a star or star-wired ring topology Sold with specialized software for port management Also called hubs Usually installed in a standardized metal rack that also may store netmodems, bridges, or routers

REPEATERS Since a signal loses strength as it passes along a cable, it is often necessary to boost the signal with a device called a repeater. The repeater electrically amplifies the signal it receives and rebroadcasts it. Repeaters can be separate devices or they can be incorporated into a concentrator. They are used when the total length of your network cable exceeds the standards set for the type of cable being used. A good example of the use of repeaters would be in a local area network using a star topology with unshielded twisted-pair cabling. The length limit for unshielded twisted-pair cable is 100 meters. The most common configuration is for each workstation to be connected by twisted-pair cable to a multi-port active concentrator. The concentrator amplifies all the signals that pass through it allowing for the total length of cable on the network to exceed the 100 meter limit. BRIDGES A bridge is a device that allows you to segment a large network into two smaller, more efficient networks. If you are adding to an older wiring scheme and want the new network to be up-to-date, a bridge can connect the two. 8

DC LAB (CS214) A bridge monitors the information traffic on both sides of the network so that it can pass packets of information to the correct location. Most bridges can "listen" to the network and automatically figure out the address of each computer on both sides of the bridge. The bridge can inspect each message and, if necessary, broadcast it on the other side of the network. The bridge manages the traffic to maintain optimum performance on both sides of the network. You might say that the bridge is like a traffic cop at a busy intersection during rush hour. It keeps information flowing on both sides of the network, but it does not allow unnecessary traffic through. Bridges can be used to connect different types of cabling, or physical topologies. They must, however, be used between networks with the same protocol. ROUTERS A router translates information from one network to another; it is similar to a superintelligent bridge. Routers select the best path to route a message, based on the destination address and origin. The router can direct traffic to prevent head-on collisions, and is smart enough to know when to direct traffic along back roads and shortcuts. While bridges know the addresses of all computers on each side of the network, routers know the addresses of computers, bridges, and other routers on the network. Routers can even "listen" to the entire network to determine which sections are busiest -- they can then redirect data around those sections until they clear up. If you have a school LAN that you want to connect to the Internet, you will need to purchase a router. In this case, the router serves as the translator between the information on your LAN and the Internet. It also determines the best route to send the data over the Internet. Routers can: Direct signal traffic efficiently Route messages between any two protocols Route messages between linear bus, star, and star-wired ring topologies Route messages across fiber optic, coaxial, and twisted-pair cabling

DC LAB (CS214)

EXPERIMENT NO. 3
NAME OBJECTIVE : STUDY OF PEER TO PEER NETWORKING. :TO UNDERSTAND CABLING AND PEER TO PEER NETWORK.

Peer-to-Peer Networking Using Windows, there are numerous ways to connect computers or create a network. For homes and small offices, the most common model is peer-to- peer networking. A peer -to-peer network, also called a workgroup, is commonly used for home and small business networks. In this model, computers directly communicate with each other and do not require a server to manage network resources. In general, a peer-to-peer network is most appropriate for arrangements where there are less than ten computers located in the same general area. The computers in a workgroup are considered peers because they are all equal and share resources among each other without requiring a server. Each user determines which data on their computer will be shared with the network. Sharing common resources allows users to print from a single printer, access information in shared folders, and work on a single file without transferring it to a floppy disk. Peer-to-Peer connection of two computers using crossover cable Step 1: Prepare a cross cable using the above mentioned color-coding. This would require a UTP-5 cable, two RJ-45 connectors and the crimping tool. Step 2: Before connecting the two computers, first check whether the network adapter is configured or not. This is done by right clicking My Computer > Properties > Device Manager > Network Adapter. If the adapter is configured then proceed otherwise configure it by following the prompts. Step 3 : Right click on my computer and click on properties then go to the network identification tab give a computer name and a workgroup. Do the same with the other computer make sure that workgroup is same in both the cases.

10

DC LAB (CS214)

Step 4 : Both the computers to be connected should have the same network id in the ip address. This can be verified by right clicking Network Neighborhood > Properties > Internet Protocol (TCP/IP) > Properties. Here enable Use the following IP option and assign same network id to both the computers.

Step 5 : Go to the command prompt and type in e:/ipconfig/all

11

DC LAB (CS214)

Step 6 :Ping the other computer with its ip address from the run command to see weather the connection is established or not. If it replies with the message then the connection is established successfully. Types of Cabling Straight-through Crossover Rolled Note: The console port does not support modem control or hardware flow control.

How to Identify an RJ-45 Cable To identify the RJ-45 cable type, hold the two ends of the cable next to one another so you can see the colored wires inside the ends, as shown in the following figure.

There are three types of commonly used RJ-45 cabling: straight, cross and rolled. If you hold the two ends of an RJ-45 cable side by side, you'll see eight colored strips, or pins, at each end. If the order of the colored pins is the same at each end, then the cable is straight. If the order of the colors is reversed at each end, then the cable is rolled.

12

DC LAB (CS214) Step 7:Putting the other computer with its ip address from the run command to see wheather the connection or established or not if it replies with the message then the connection is established successfully.

13

DC LAB (CS214)

EXPERIMENT NO. 4
NAME : STUDY THE DIFFERENT TOPOLOGIES USED IN LAN TCP/IP. OBJECTIVE:TO UNDERSTAND CONFIGURING DIFFERENT TOPOLOGIES IN LAN.
Transmission Control Protocol/Internet Protocol (TCP/IP) is the most popular network protocol and the basis for the Internet. Its routing capabilities provide maximum flexibility in an enterprise-wide network. In Windows XP TCP/IP is automatically installed. On a TCP/IP network, you must provide IP addresses to clients. Clients may also require a naming service or a method for name resolution. This section explains IP addressing and name resolution for Network Connections on TCP/IP networks. It also describes the FTP and Telnet tools that are provided by TCP/IP. Topology:The physical topology of a network refers to the configuration of cables, computers, and other peripherals. Physical topology should not be confused with logical topology which is the method used to pass information between workstations. Logical topology was discussed in the Protocol chapter . Main Types of Physical Topologies The following sections discuss the physical topologies used in networks and other related topics. Linear Bus Star Star-Wired Ring Tree Considerations When Choosing a Topology Summary Chart LINEAR BUS A linear bus topology consists of a main run of cable with a terminator at each end (See fig. 1). All nodes (file server, workstations, and peripherals) are connected to the linear cable. Ethernet and LocalTalk networks use a linear bus topology.

Fig. 1. Linear Bus topology

14

DC LAB (CS214) Advantages of a Linear Bus Topology Easy to connect a computer or peripheral to a linear bus. Requires less cable length than a star topology. Disadvantages of a Linear Bus Topology Entire network shuts down if there is a break in the main cable. Terminators are required at both ends of the backbone cable. Difficult to identify the problem if the entire network shuts down. Not meant to be used as a stand-alone solution in a large building. STAR A star topology is designed with each node (file server, workstations, and peripherals) connected directly to a central network hub or concentrator (See fig. 2). Data on a star network passes through the hub or concentrator before continuing to its destination. The hub or concentrator manages and controls all functions of the network. It also acts as a repeater for the data flow. This configuration is common with twisted pair cable; however, it can also be used with coaxial cable or fiber optic cable.

Fig. 2. Star topology Advantages of a Star Topology Easy to install and wire. No disruptions to the network then connecting or removing devices. Easy to detect faults and to remove parts. Disadvantages of a Star Topology Requires more cable length than a linear topology. If the hub or concentrator fails, nodes attached are disabled. More expensive than linear bus topologies because of the cost of the concentrators. The protocols used with star configurations are usually Ethernet or LocalTalk. Token Ring uses a similar topology, called the star-wired ring. Star-Wired Ring 15

DC LAB (CS214) A star-wired ring topology may appear (externally) to be the same as a star topology. Internally, the MAU (multistation access unit) of a star-wired ring contains wiring that allows information to pass from one device to another in a circle or ring (See fig. 3). The Token Ring protocol uses a star-wired ring topology. TREE A tree topology combines characteristics of linear bus and star topologies. It consists of groups of starconfigured workstations connected to a linear bus backbone cable (See fig. 4). Tree topologies allow for the expansion of an existing network, and enable schools to configure a network to meet their needs.

Fig. 4. Tree topology Advantages of a Tree Topology Point-to-point wiring for individual segments. Supported by several hardware and software venders. Disadvantages of a Tree Topology Overall length of each segment is limited by the type of cabling used. If the backbone line breaks, the entire segment goes down. More difficult to configure and wire than other topologies. 5-4-3 Rule A consideration in setting up a tree topology using Ethernet protocol is the 5-4-3 rule. One aspect of the Ethernet protocol requires that a signal sent out on the network cable reach every part of the network within a specified length of time. Each concentrator or repeater that a signal goes through adds a small amount of time. This leads to the rule that between any two nodes on the network there can only be a maximum of 5 segments, connected through 4 repeaters/concentrators. In addition, only 3 of the segments may be populated (trunk) segments if they are made of coaxial cable. A populated segment is 16

DC LAB (CS214) one which has one or more nodes attached to it . In Figure 4, the 5-4-3 rule is adhered to. The furthest two nodes on the network have 4 segments and 3 repeaters/concentrators between them. This rule does not apply to other network protocols or Ethernet networks where all fiber optic cabling or a combination of a fiber backbone with UTP cabling is used. If there is a combination of fiber optic backbone and UTP cabling, the rule is simply translated to 7-6-5 rule. Considerations When Choosing a Topology: Money. A linear bus network may be the least expensive way to install a network; you do not have to purchase concentrators. Length of cable needed. The linear bus network uses shorter lengths of cable. Future growth. With a star topology, expanding a network is easily done by adding another concentrator. Cable type. The most common cable in schools is unshielded twisted pair, which is most often used with star topologies. Summary Chart: Physical Topology Linear Bus Common Cable Twisted Coaxial Fiber Twisted Fiber Twisted Pair Twisted Coaxial Fiber Pair Ethernet Pair Common Protocol Ethernet LocalTalk

Star Star-Wired Ring Tree

Pair Ethernet LocalTalk Token Ring

17

DC LAB (CS214)

EXPERIMENT NO. 5
NAME : CLIENT/SERVER ARCHITECTURE. OBJECTIVE : TO UNDERSTAND CLIENT/SERVER ARCHITECTURE.
Centralized Computing Here the application operates on the server and all clients interact with the central application through client side interface terminals - dumb terminals when a client requests data from a database, the system moves all the data across the network to the client this causes the network to slow down for other clients The Client The front end client runs an application that presents an interface to the user (this doesn't reside on the server at all) formats requests for data displays data it receives from the server. The user uses an onscreen form, called a search key to specify search requests the data can be presented to the user in various ways - different users access the same database to present information in a way that suits them Front End Tools query tools user applications e.g. Excel provides front end access to back end databases program development tools. Visual Basic is used to develop front end tools to access backend data. The Server usually dedicated to STORING and MANAGING data most of the database activity happens on the server sorting data updates, additions, deletions, and protection .Stored procedures short, pre-written data-processing routines used by client applications stored on the server and can be used by any client one stored process can be called by any number of client applications instead of having to incorporate the same routine into the code of each program Client / Server Architecture Single server Multiple servers with special tasks Distributed server arrangements Servers across a WAN link synchronized to endure they all have the same data in common Data Warehouse. One server stores large amounts of data and forwards the most sought after data to intermediate servers that format the data. This off loads some of the processing from the intermediate servers that care contacted by clients Advantages of the Client / Server Environment:Less network traffic => only results of query are sent over the network The server is more powerful that the client and does most of the processing More RAM and storage space on server means you don't have to spend as much MONEY on each client Back end data is more easily secured and BACKED UP

18

DC LAB (CS214)

EXPERIMENT NO. 6
NAME : FAMILIARIZATION WITH TRANSMISSION MEDIA VIZ COAXIAL CABLE, TWISTED PAIR CABLE, OPTICAL CABLE, CONNECTORS. OBJECTIVE :TO UNDERSTAND DIFFERENT TYPES OF TRANSMISSION MEDIA AND THEIR CONNECTORS.
The Electromagnetic Spectrum

All electronic communication operates within the electromagnetic spectrum travelling, theoretically, at the speed of light. 8 That is 2.997925 x 10 metres per second. We have already seen that the velocity and strength over distance of electronic signals is affected by the transmission media and as such this media has to be selected carefully.

Media used for communication can be classified as guided or unguided. Network Cabling:Cable is the medium through which information usually moves from one network device to another. There are several types of cable which are commonly used with LANs. In some cases, a network will 19

DC LAB (CS214) utilize only one type of cable, other networks will use a variety of cable types. The type of cable chosen for a network is related to the network's topology, protocol, and size. Understanding the characteristics of different types of cable and how they relate to other aspects of a network is necessary for the development of a successful network. The following sections discuss the types of cables used in networks and other related topics. Unshielded Twisted Pair (UTP) Cable Shielded Twisted Pair (STP) Cable Coaxial Cable Fiber Optic Cable Wireless LANs Cable Installation Guides Unshielded Twisted Pair (UTP) Cable Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded twisted pair (UTP) is the most popular and is generally the best option for school networks (See fig. 1).

Fig.1. Unshielded twisted pair The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The cable has four pairs of wires inside the jacket. Each pair is twisted with a different number of twists per inch to help eliminate interference from adjacent pairs and other electrical devices. The tighter the twisting, the higher the supported transmission rate and the greater the cost per foot. The EIA/TIA (Electronic Industry Association/Telecommunication Industry Association) has established standards of UTP and rated five categories of wire. Categories of Unshielded Twisted Pair Type Category 1 Category 2 Category 3 Category 4 Category 5 Use Voice Only (Telephone Wire) Data to 4 Mbps (LocalTalk) Data to 10 Mbps (Ethernet) Data to 20 Mbps (16 Mbps Token Ring) Data to 100 Mbps (Fast Ethernet)

Buy the best cable you can afford; most schools purchase Category 3 or Category 5. If you are designing a 10 Mbps Ethernet network and are considering the cost savings of buying Category 3 wire instead of Category 5, remember that the Category 5 cable will provide more "room to grow" as transmission technologies increase. Both Category 3 and Category 5 UTP have a maximum segment length of 100 meters. In Florida, Category 5 cable is required for retrofit grants. 10BaseT refers to the specifications

20

DC LAB (CS214) for unshielded twisted pair cable (Category 3, 4, or 5) carrying Ethernet signals. Category 6 is relatively new and is used for gigabit connections. Unshielded Twisted Pair Connector The standard connector for unshielded twisted pair cabling is an RJ-45 connector. This is a plastic connector that looks like a large telephone-style connector (See fig. 2). A slot allows the RJ-45 to be inserted only one way. RJ stands for Registered Jack, implying that the connector follows a standard borrowed from the telephone industry. This standard designates which wire goes with each pin inside the connector.

Fig. 2. RJ-45 connector Shielded Twisted Pair (STP) Cable A disadvantage of UTP is that it may be susceptible to radio and electrical frequency interference. Shielded twisted pair (STP) is suitable for environments with electrical interference; however, the extra shielding can make the cables quite bulky. Shielded twisted pair is often used on networks using Token Ring topology. Coaxial Cable Coaxial cabling has a single copper conductor at its center. A plastic layer provides insulation between the center conductor and a braided metal shield (See fig. 3). The metal shield helps to block any outside interference from fluorescent lights, motors, and other computers.

Fig. 3. Coaxial cable Although coaxial cabling is difficult to install, it is highly resistant to signal interference. In addition, it can support greater cable lengths between network devices than twisted pair cable. The two types of coaxial cabling are thick coaxial and thin coaxial. Thin coaxial cable is also referred to as thinnet. 10Base2 refers to the specifications for thin coaxial cable carrying Ethernet signals. The 2 refers to the approximate maximum segment length being 200 meters. In actual fact the maximum segment length is 185 meters. Thin coaxial cable is popular in school networks, especially linear bus networks.

21

DC LAB (CS214) Thick coaxial cable is also referred to as thicknet. 10Base5 refers to the specifications for thick coaxial cable carrying Ethernet signals. The 5 refers to the maximum segment length being 500 meters. Coaxial Cable Connectors The most common type of connector used with coaxial cables is the Bayone-Neill-Concelman (BNC) connector (See fig. 4). Different types of adapters are available for BNC connectors, including a Tconnector, barrel connector, and terminator. Connectors on the cable are the weakest points in any network. To help avoid problems with your network, always use the BNC connectors that crimp, rather than screw, onto the cable.

Fig. 4. BNC connector Fiber Optic Cable Fiber optic cabling consists of a center glass core surrounded by several layers of protective materials (See fig. 5). It transmits light rather than electronic signals eliminating the problem of electrical interference. This makes it ideal for certain environments that contain a large amount of electrical interference. It has also made it the standard for connecting networks between buildings, due to its immunity to the effects of moisture and lighting. Fiber optic cable has the ability to transmit signals over much longer distances than coaxial and twisted pair. It also has the capability to carry information at vastly greater speeds. This capacity broadens communication possibilities to include services such as video conferencing and interactive services. The cost of fiber optic cabling is comparable to copper cabling; however, it is more difficult to install and modify. 10BaseF refers to the specifications for fiber optic cable carrying Ethernet signals. Fig.5. Fiber optic cable

Facts about fiber optic cables: Outer insulating jacket is made of Teflon or PVC. Kevlar fiber helps to strengthen the cable and prevent breakage. A plastic coating is used to cushion the fiber center. Center (core) is made of glass or plastic fibers. Fiber Optic Connector The most common connector used with fiber optic cable is an ST connector. It is barrel shaped, similar to a BNC connector. A newer connector, the SC, is becoming more popular. It has a squared face and is easier to connect in a confined space. Ethernet Cable Summary 22

DC LAB (CS214) Specification 10BaseT 10Base2 10Base5 10BaseF 100BaseT 100BaseTX Cable Type Unshielded Twisted Pair Thin Coaxial Thick Coaxial Fiber Optic Unshielded Twisted Pair Unshielded Twisted Pair Maximum length 100 meters 185 meters 500 meters 2000 meters 100 meters 220 meters

Wireless LANs Not all networks are connected with cabling; some networks are wireless. Wireless LANs use high frequency radio signals, infrared light beams, or lasers to communicate between the workstations and the file server or hubs. Each workstation and file server on a wireless network has some sort of transceiver/antenna to send and receive the data. Information is relayed between transceivers as if they were physically connected. For longer distance, wireless communications can also take place through cellular telephone technology, microwave transmission, or by satellite. Wireless networks are great for allowing laptop computers or remote computers to connect to the LAN. Wireless networks are also beneficial in older buildings where it may be difficult or impossible to install cables. Scattered infrared communication is a broadcast of infrared transmissions sent out in multiple directions that bounces off walls and ceilings until it eventually hits the receiver. Networking communications with laser are virtually the same as line-of-sight infrared networks. Wireless LANs have several disadvantages. They provide poor security, and are susceptible to interference from lights and electronic devices. They are also slower than LANs using cabling. Installing Cable - Some Guidelines When running cable, it is best to follow a few simple rules: Always use more cable than you need. Leave plenty of slack. Test every part of a network as you install it. Even if it is brand new, it may have problems that will be difficult to isolate later. Stay at least 3 feet away from fluorescent light boxes and other sources of electrical interference. If it is necessary to run cable across the floor, cover the cable with cable protectors. Label both ends of each cable. Use cable ties (not tape) to keep cables in the same location together.

23

DC LAB (CS214)

Unguided media - wireless transmission Wireless transmission radiates electromagnetic energy from antennae. This can be directional - in a beam - or omnidirectional i.e. all around radiation. Terrestrial Microwave Communication is accomplished through line of sight parabolic dish antenna located on elevated sites. Satellite Microwave Overcomes the line of sight problems of terrestrial microwave and can be used for point to point or broadcast transmission. Uses an uplink and downlink frequency, a common frequency set is referred to as the 4/6 range which uses a downlink frequency of 4GHz and an uplink frequency of 6GHz.

24

DC LAB (CS214)

Typical uses of satellite microwave - television distribution, long distance telephone transmission, private business networks for global organisations. Suffers the same attenuation problems as terrestrial microwave. Broadcast radio transmission Broadcast radio is omnidirectional and does not require complex dish antenna but allows a great deal of flexibility and is tolerant of alignment needs. Covers the frequency range 3KHz to 1GHz. The concepts of broadcast radio are well known to the general public. Lower frequency signals are reflected off the ionosphere and this helps bounce signals between the atmosphere and the earth for wide reception coverage. Frequencies above 30MHz are not reflected from the atmosphere and rely on line of sight transmission. Low frequencies are less susceptible to attenuation from atmospheric conditions but are affected by ionospheric changes. Higher frequencies can be affected by reflection of signals.

25

DC LAB (CS214) Infrared transmission Infrared communication is now common as a means of wireless communication between devices. It will not penetrate buildings and therefore is secure. Used for very short line of sight transmission, remote car locking systems, wireless security alarms,remote TV channel changes etc.

26

DC LAB (CS214)

EXPERIMENT NO. 7
NAME : CONFIGURING NETWORK NEIGHBORHOOD. OBJECTIVE : TO UNDERSTAND HOW TO CONFIGURE NETWORK.
Configuring the Network: 1. Under Control panel/Network/identification make sure each computer has a unique name. 2. Make sure that workgroup is same for all computers. 3. Do not have any spaces in either the computer or workgroup names. Keep them simple. 4. Select different IP addresses for each computer. Use same subnet mask. If you are connecting to internet enter in gateway & DNS IP addresses. 5. Click on the file & print sharing button & check off whether you want to share files or Printers. After configuring the Networking card on each computer, it is necessary to know how many systems have to be configured on network. If there are two systems on n/w then they have to be connected through cross cable otherwise a HUB or Switch have to be used to connect more than two computers. Trouble Shooting of NIC: To check whether NIC is properly configured or not, open command prompt & type. How does the "Network Neighborhood"/"My Computer Places" work ? Please, spend the time to learn about this, it explains the sometimes strange behavior. On a network based on Microsoft networking, there MUST be for each workgroup one system acting as the book-keeper, this system is called the "Browse-Master". When you have a network of Windows95/98/ME/2000/XP systems and you switch on these systems, one of first things done by the network-software is to check on the network for the presence of a Browse-Master: - If no Browse-Master is found, then a Browse-Master is elected. - Only a system with "File-and-Printer Sharing" installed can be elected to become a Browse-Master - On a network with a mixture of Windows95/98.ME and Windows NT/2000/XP systems, the "strongest system" wins the election and becomes the Browse-Master. strength of Windows Versions : - Windows 3.x ------------- > "weakess system" - Windows 95 - Windows 98 - Windows ME - Windows NT4 Workstation - Windows 2000 Workstation (internal name : NT 5.0) - Windows XP (internal name : NT 5.1 ) -----> "Strongest system" - On a network with a Windows NT or 2000 server, the server becomes the Browse-Master, ( a server is always "stronger" than a workstation ) - each system sends the list of available shared resources to the Browse-Master:

27

DC LAB (CS214)

28

DC LAB (CS214)

Important : to be able to use the network, it is required on Windows95/98/ME to have as part of the Network configuration the "Client for Microsoft Networks" and you must define as "Primary Network Logon" to use the "Client for Microsoft Networks"

and when powering on / starting up your system , you must "Logon" to the system using the Network login ("Enter Network Password" ) :

If you press the ESC-key or click on "Cancel" then you did NOT validate your network Username and will not have access to the network , i.e. you can not use the "Network Neighborhood"/"My Computer Places" ! This "Master Browser" configuration and its election process explains now some of the "strange" behavior of the Network-Neighborhood:

29

DC LAB (CS214) Your own system does NOT have "File-and-Printer Sharing" installed: Your system could not find a "Browse-Master" on the network.

Your own system has "File-and-Printer Sharing" installed: Only your own system is displayed, not any other system on the network.

First: after switching on Windows, it can take a few minutes to elect the Browse-Master, it may help to close the "Network Neighborhood" and open it again after a few minutes. Second: when a system is switched on or off later, it can take up to 15 minutes before the display-list of the Browse-Master is updated (for deatils, see the Resource-kit ) If you are still not getting a proper display, then check the following: - verify, that all systems are defined to use the SAME workgroup. - only systems with "File-and-Printer Sahring" installed and SOMETHING shared are displayed. - test the network connection There are some network configurations, where you can not use the Network Neighborhood, like on some Dialup-Network connections (via modem) or when using a Direct-Cable connection. In such cases, use "Find Computer" to access other systems.

Select in the Windows menu "Find", then "Computer",

30

DC LAB (CS214)

and enter the computername of the system to access , then use "Find Now". It will search the network, ( not asking the Master Browser)

When using "My Network Places", use the "Search" button and then enter the system, which you like to access (with or without the help of Fido/Rover, the animated dog)

( all WIndows versions) You can also search for a system by entering in the RUN- windows (on the windows menu) the computer-name preceeded by double-backslash, like: \\nt4wsp120 On networks using TCP/IP-protocol, you can find out which system is acting as Browse-Master. If you like to control yourself, which system is acting as the Browse-Master :

31

DC LAB (CS214)

view the "Properties" of the "File and Printer Sharing": by default, the setting for "Browse Master" is "Automatic", which is causing the systems to elect a Browse-Master. You can name a system to be the Browse-Master by changing the "Browse Master" value to "Enabled", but then you MUST on ALL other systems in this workgroup change the value to "Disabled".

32

DC LAB (CS214)

EXPERIMENT NO. 8
NAME :SHARING OF RESOURCES WITH TWO CONNECTED NODES. OBJECTIVE:TO UNDERSTAND SHARING OF RESOURCES OF NETWORK.
COMPNENTS NEEDED: 1. A Computer with an operating system capable of peer-to-peer such as windows 95/98/XP/2000 Professional. 2. Communication protocols such as TCP/IP OR Net BEUI. 3. A physical interface for each computer. 4. Physical connectivity components such as cables & connections. 5. Three 10 Mbs Hubs. 6. A printer and printer cable. 7. Introduction to networking text. (1). Setup at least two isolated groups of computer and have each of these computer share files with other members of their own group through a 10 Mbs Hub.Record the transfer times of these exchanges in order to document throughput .Then connect all the groups together into a shared central 10 Mbs hub to transfer files & compare the level of throughput with first configuration. Begin by nothing the hardware of our n/w ready to share resources via the Ethernet peer-to-peer connected. Now configure the Windows 98 software to allow sharing of hard disk 2 CD-ROM drives so that peers will have access to each. a).Double click on the My Computer Icon.Then right click the c:drive icon scroll half down the box & select sharing by clicking on it. b).Now clicks the sharing tab at the right of this window. Select the shared as radio buttons & enter a share name in the text box as follows: h disk #where# is the same as the number following the last . In your machine IP address. In other words name your shared hard drive as h disk followed by the host ID portion of m/cs IP address. c).Now move down to the Access type area & select full. Leave the Full Access password text box blank in the password sections and click O.K. password confirmation window is displayed leave the entry blank & select OK at the top right position of the window. d).The hard disk drive on computer should now be available to other members of the network. Note the c:drive icon has a hand under it to denote it is shared,Double-click on one of the icons that depicts other members of n/w. This should bring up a folder labeled as that nodes hard disk. (2). Now setup the CD-ROM Drive for sharing but allow read only access rather then full. a).Double-Click on My Computer icon displayed on your computer screen. Then right click on D : drive icon. Scroll half way down the box and select sharing by clicking on it. b).Now click the sharing tab at the right of this window. Select the shared as radio button & enter a share name in the text box as follows: CD-ROM #where# is the same as no. following the last. In m/cs IP

33

DC LAB (CS214) address. In Other words name your shared hard drive as CD-ROMfollowed by the host ID portion of the machines IP address. c).Now move down Access type area & select read only. Leave the Read only password: text box blank in the password section & click O.K. If a password configure confirmation window is display leave the entry blank & select OK at the top right portion of the window. d).CD-ROM Drive is the shared resources on the network. It is important to note that purpose of configuring desktop Operating System to allow for sharing of CD-ROM drive was to reinforce the procedure of sharing a resource.

Sharing is like this in XP Then

this is how sharing can be done in XP 34

DC LAB (CS214)

EXPERIMENT NO.9
NAME :IMPLEMENTATION OF PROTOCOL & THEIR CONFIGURATION SERVICES. OBJECTIVE : TO UNDERSTAND HOW TO IMPLEMENT PROTOCOL AND THEIR SERVICES.
Services are the basic method of connecting to the server from any host or server .In general, a service is required on the server before any job. Network Protocol: A network protocol describes the data connected in Ethernet packet. The n/w protocol provided by server is completely different other than use of Ethernet of data layer. The following steps are followed to implement the protocol. To add a protocol: Select the adapter that will use the protocol from the display list, and then select add protocol. To modify protocol configuration: Select the protocol to modify from the displayed list, then select protocol configuration. Enter new configuration parameters as you did when adding protocols. To view protocol configuration: Select the protocol to view from displayed list, then select protocol view protocol configuration. To remove a protocol configuration: Select the protocol to remove from the displayed list, and then select protocol-to remove. We will be prompted to confirm choice & informed when the operation is completed. Configuring & Implementation of TCP/IP protocol. TCP/IP overview Transmission Control Protocol/Internet Protocol (TCP/IP) is the most popular network protocol and the basis for the Internet. Its routing capabilities provide maximum flexibility in an enterprise-wide network. In Windows XP TCP/IP is automatically installed. On a TCP/IP network, you must provide IP addresses to clients. Clients may also require a naming service or a method for name resolution. This section explains IP addressing and name resolution for Network Connections on TCP/IP networks. It also describes the FTP and Telnet tools that are provided by TCP/IP. Assigning IP addresses to dial-up and virtual private network (VPN) connections Each remote computer connecting to a remote access server on a Windows TCP/IP network is provided an IP address by the remote access server. If you use a specific IP address, the remote access server must be configured to permit users to request a specific address.

35

DC LAB (CS214) Name resolution for network and dial-up connections In addition to requiring an IP address, network and dial-up connections on a TCP/IP network may require a mechanism to map computer names to IP addresses. Four name resolution options are available: DNS, WINS, broadcast name resolution, and the Hosts files. In small networks where IP addresses do not change, network and dial-up connections can use a Hosts file for name resolution. By using these files on the local drive, you do not need to transmit name resolution requests to a WINS or DNS server and wait for the response.Internet tools/IP provides File Transfer Protocol (FTP) and Telnet. FTP is a character-based utility that permits you to connect to FTP servers and transfer files. Telnet is graphical application that lets you log in to remote computers and issue commands as if you were at the keyboard of the computer. Multiple variations of FTP, Telnet, and other programs based on earlier Internet standards are also available on the Internet or commercially. For information about configuring a connection, see To configure a connection. For information about configuring TCP/IP, see To configure TCP/IP settings. To configure TCP/IP settings Open Network Connections. Click the connection you want to configure, and then, under Network Tasks, click Change settings of this connection. Do one of the following: If the connection is a local area connection, on the General tab, under This connection uses the following items, click Internet Protocol (TCP/IP), and then click Properties. If this is a dial-up, VPN, or incoming connection, click the Networking tab. In This connection uses the following items, click Internet Protocol (TCP/IP), and then click Properties. Do one of the following: If you want IP settings to be assigned automatically, click Obtain an IP address automatically, and then click OK. If you want to specify an IP address or a DNS server address, do the following: Click Use the following IP address, and in IP address, type the IP address. Click Use the following DNS server addresses, and in Preferred DNS server and Alternate DNS server, type the addresses of the primary and secondary DNS servers. To configure DNS, WINS, and IP Settings, click Advanced. To open Network Connections, click Start, click Control Panel, click Network and Internet Connections, and then click Network Connections. You should use automated IP settings (DHCP) whenever possible, for the following reasons: DHCP is enabled by default. If your location changes, you do not have to modify your IP settings. Automated IP settings are used for all connections, and they eliminate the need to configure settings such as DNS, WINS, and so on. To install Simple TCP/IP Services Open Add or Remove Programs in Control Panel. Click Add/Remove Windows Components. In Components, click Networking Services, and then click Details. In Subcomponents of Networking Services, click Simple TCP/IP Services, and then click OK. Click Next. If prompted to do so, type the path where the Windows XP distribution files are located, and then click OK. Click Finish and then click Close.

36

DC LAB (CS214) To open Add or Remove Programs, click Start, click Control Panel, and then click Add or Remove Programs. You must be logged on as an administrator or a member of the Administrators group in order to complete this procedure. If your computer is connected to a network, network policy settings may also prevent you from completing this procedure. Simple TCP/IP Services for Windows XP provides support for the optional TCP/IP protocol services listed in the following table. Protocol Description RFC Character Sends data made up of the set of 95 printable ASCII characters. Useful as Generator 864 a debugging tool for testing or troubleshooting line printers. (CHARGEN) Returns messages containing the day of the week, month, day, year, current time (in hh:mm:ss format), and time-zone information. Some Daytime 867 programs can use the output from this service for debugging or monitoring variations in system clock time or on a different host. Discards all messages received on this port without response or acknowledgment. Can serve as a null port for receiving and routing Discard 863 TCP/IP test messages during network setup and configuration or, in some cases, can be used by programs as a message discard function. Echoes back data from any messages it receives on this server port. Can Echo 862 be useful as a network debugging and monitoring tool. Returns a quotation as one or more lines of text in a message. Quotations are taken at random from the following file: Quote of the Day systemroot\System32\Drivers\Etc\Quotes. A sample quote file is installed 865 (QUOTE) with the Simple TCP/IP Services. If this file is missing, the quote service fails. All of these protocol services are classified as elective Internet standards and are defined and described in the specified Request for Comments (RFC) document listed in the table. For more information on these protocol services, see the RFCs. Do not install Simple TCP/IP Services unless you specifically need this computer to support communication with other systems that use these protocol services. After Simple TCP/IP Services are installed, you cannot enable or disable the separate services individually. To force a network adapter to acquire an IP address Open Network Connections. Click the icon for the adapter that connects this computer to the Internet or to other network computers. Under Network Tasks, click Repair this connection. To open Network Connections, click Start, click Control Panel, click Network and Internet Connections, and then click Network Connections. Internet Connection Sharing, Internet Connection Firewall, Discovery and Control, and Network Bridge are not available on Windows XP 64-Bit Edition. If you are having difficulty connecting the Internet Connection Sharing (ICS) host to the Internet, you can use Repair to obtain refreshed IP address configurations from your Internet service provider (ISP). If a computer on your network is unable to communicate with other network computers, you can use Repair to force the connection to refresh its IP address configuration from the ICS host.

37

DC LAB (CS214) If the icon for the shared Internet connection does not automatically appear on a client computer (and the Allow other network users to control or disable the shared Internet connection check box has not been disabled), it may be because ICS has not assigned an IP address to your network adapter. An IP address is required in order for a client computer to use ICS Discovery and Control features, connect with to the Internet, or to communicate with other computers on the network. When ICS is enabled, it automatically provides an IP address for the ICS host's private connection. The ISP assigns an IP address to the shared Internet connection. Before using the Repair menu command on the ICS host computer, ensure that you have plugged in the adapter that is used for the Internet connection. Before using the Repair menu command, ensure that the client computer is plugged into the network and that the ICS host is running, configured, and connected to the network. To test a TCP/IP configuration by using the ping command To quickly obtain the TCP/IP configuration of a computer, open Command Prompt, and then type ipconfig. From the display of the ipconfig command, ensure that the network adapter for the TCP/IP configuration you are testing is not in a Media disconnected state. At the command prompt, ping the loopback address by typing ping 127.0.0.1. Ping the IP address of the computer. Ping the IP address of the default gateway. If the ping command fails, verify that the default gateway IP address is correct and that the gateway (router) is operational. Ping the IP address of a remote host (a host that is on a different subnet). If the ping command fails, verify that the remote host IP address is correct, that the remote host is operational, and that all of the gateways (routers) between this computer and the remote host are operational. Ping the IP address of the DNS server. If the ping command fails, verify that the DNS server IP address is correct, that the DNS server is operational, and that all of the gateways (routers) between this computer and the DNS server are operational. To open command prompt, click Start, point to All Programs, point to Accessories, and then click Command Prompt. If the ping command is not found or the command fails, you can use Event Viewer to check the System Log and look for problems reported by Setup or the Internet Protocol (TCP/IP) service. The ping command uses Internet Control Message Protocol (ICMP) Echo Request and Echo Reply messages. Packet filtering policies on routers, firewalls, or other types of security gateways might prevent the forwarding of this traffic. The ipconfig command is the command-line equivalent to the winipcfg command, which is available in Windows Millennium Edition, Windows 98, and Windows 95. Windows XP does not include a graphical equivalent to the winipcfg command; however, you can get the equivalent functionality for viewing and renewing an IP address by opening Network Connections, right-clicking a network connection, clicking Status, and then clicking the Support tab. Used without parameters, ipconfig displays the IP address, subnet mask, and default gateway for all adapters. To run ipconfig, open the command prompt, and then type ipconfig. To open Network Connections, click Start, click Control Panel, click Network and Internet Connections, and then click Network Connections.

38

Anda mungkin juga menyukai