Professional Documents
Culture Documents
Practical 1: Aim: Study of Different Types of Cables
Practical 1: Aim: Study of Different Types of Cables
There are four twisted pairs with Pair 1 as Blue, Pair 2 as Orange, Pair 3 as Green
and Pair 4 as Brown. Colors are always shown with the Base Color first, then the
Stripe Color.
Straight-through Cabling:
In a straight-through cable, the colored wires are in the same sequence at both
ends of the cable. The coloring standard may be different from different
manufacturers. One of the most commonly used standards is as follow:
Pin 1 White/Orange
Pin 2 Orange/White
Pin 3 White/Green
Pin 4 Blue/White
Pin 5 White/Blue
Pin 6 Green/White
Pin 7 White/Green
Pin 8 Brown/White
Crossover Cable:
In a crossover cable, the first (Pin 1) and second (Pin 2) coloured wire at one end
of the cable is connected to the third (Pin 3) and sixth (Pin 6) coloured wire at the
other end respectively.
LAN Cable Tester can be used to test the correct wiring of the cables.
Connection of Computers:
When more than two computers are to be connected, hubs or routers will be the
choice.
When installing cable one should always use more cable than is expected
and be sure to leave plenty of slack. Frequent tests for network connections are
expected after each setup is complete. To prevent cable damage, those that are
installed in ceilings should be at least three feet from florescent lights or any
other source of electrical interference. Cable ties opposed to tape should be used
to keep order to groups of cable.
Type Use
Coaxial cable:
o Coaxial cable, called “coax” for short, was the cable of choice for
Ethernet networks throughout the 1970s and 1980s.
o Coaxial cable consists of a central copper core that carries data. It is
surrounded by plastic insulation, braided metal shielding, and an
Twisted-pair cable:
Categories of UTP:
• Cat 1 – used for telephone communication
• Cat 2 – transmits up to 4 Mbps
• Cat 3 – transmits data up to 10 Mbps; used in both
Ethernet or Token Ring
• Cat 4 – transmits data up to 16 Mbps; used in both
Ethernet or Token Ring
• Cat 5 – transmits data up to 100 Mbps; used by
Ethernet
• Cat 5e – higher grade of Cat5; transmit data up to 1000
Mbps; used by Ethernet
• Cat 6 – transmit data up to 1000 Mbps; additional foil
insulation to protect against noise; used by Ethernet
• Cat 7 – in development
Fiber-optic cable:
o Fiber-optic cable has a core of several glass or plastic fibers. Data
is transmitted via pulsing light sent from a laser through the central
fibers.
Surrounding the fiber is a layer of more dense glass known as
cladding which reflects light back to the core.
– 5 represents the 500 m max cable – 2 represents the 200 m max cable
length length
10Base-T 100Base-T
– developed in 1990 – also known as “Fast Ethernet”
100Base-TX 1000Base-T
The model is called the ISO OSI (open system interconnection) reference
model because it deals with connecting open systems, i.e. systems that are open
for communication with other systems.
The OSI model has seven layers. The principals that were applied to arrive
at the seven layers can be briefly summarized as follows:
Figure -1
The main task of the data link layer is to transform a raw transmitting
facility into a line that appears free of undetected transmission errors to the
network layer. It accomplishes this task by having the sender break up the input
data into data frames and transmits the frames sequentially. If the service is
reliable, the receiver confirms correct receipt of each frame by sending bake an
acknowledgement frame. Another issue arises in the data link layer is how to keep
a fast transmitter from drowning a slow receiver in data.
The network layer controls the operation of the subnet. A key designing
issue is determining how packets are routed from source to destination. Routes
can be based on the static tables that are “wired into” the network and rarely
changed. They can also be determined at the start of each conversation. Finally,
they can be highly dynamic, being determined a new for each packet, to reflect
the current network load.
In broadcast networks, the routing problem is dimple, so the network layer is often
thin or even nonexistent.
The basic function of the transport layer is to accept data from above, split
is up in smaller units if needed, pass this to network layer and ensure that all the
pieces arrive correctly at the other end. Furthermore, all this must be done
efficiently and in a way that isolates the upper layer from the in evitable changes
in the hardware technology.
The difference between layer 1 and 3, which are chained, and layers 4
through 7, which are end to end, is illustrated in the figure.
The presentation layer is concerned with the syntax and semantics of the
information transmitted. In order to possible for computers with different data
representations to communicate, the data structures to exchange can be
Let us now turn from the OSI reference model to the reference model used
in the grandparent of all wide area computer networks, the ARPANET and its
successor, the worldwide internet. Although we will give a brief history of
ARPANET later, it is useful to mention some of the key factors of it now. The
ARPANET was a research network sponsored by the DoD.
Thus, the ability to connect multiple networks in a seamless way was one of
the major design goals from the very beginning. This architecture later becomes
known as TCP/IP reference model, after its two primary protocols. It was first
defined in (cert. and Khan, 1974). A layer perspective is given in C leinternals.
1985. The design philosophy (Clark 1988).it has 4 layers.
The internet layer defines the official packet format and protocol called IP
(Internet Protocol). The job of the internet layer is to deliver IP packets where they
are supposed to go. Packet routing is clearly the major issue here, as is avoiding
congestion. For these reasons, it is reasonable to say that TCP/IP internet layer is
similar in functionally to the OSI network layer. Figure (a) shows this
correspondence.
2. Transport Layer
The TCP/IP model does not have session or presentation layer. No need for
them was perceived so they were not included. Experience with the OSI model has
proven this view correct. They are of little use to most application.
On top of the transport layer is application layer. It contains all the higher
level protocols. The early once included virtual terminal (telnet), file transfer (FTP)
and electronic mail (SMTP) as shown in figure (b). The virtual terminal protocol
allows a user on one machine to logon to a distance machine and work there. The
file transfer protocol provides a way to move data efficiently from one machine to
another. Email was original was just a kind of file transfer, but later a specialized
protocol (SMTP) was developed for it, many other protocols have been added to
this over the years. The domain name system (DNS) for mapping host names onto
their network addresses, MNTP, the protocol for moving use-net news articles
Below the internet layer is a great void. The TCP/P reference model does
not really say much about what happens here accept to point out that host has to
connect to network using some protocol, so it can send IP packets to it.
This protocol is not defined and varies from host to host and network to
network. Books and papers about TCP/IP model rarely discuss it.
History
Main procedure
The simplest form of Ethernet uses a passive bus operated at 10 Mbps. The bus is
formed from a 50 Ohm co-axial cable which connects all the computers in the
LAN. A single LAN may have up to 1024 attached systems, although in practice
most LANs have far fewer. One or more pieces of coaxial cable are joined end to
end to create the bus, known as an "Ethernet Cable Segment". Each segment is
terminated at both ends by 50 Ohm resistors (to prevent reflections from the
discontinuity at the end of the cable) and is also normally earthed at one end (for
electrical safety). Computers may attach to the cable using transceivers and
network interface cards.
Frames of data are formed using a protocol called Medium Access Control
(MAC), and encoded using Manchester line encoding. Ethernet uses a simple
Carrier-Sense Multiple Access protocol with Collision Detection (CSMA/CD) to
prevent two computers trying to transmit at the same time (or more correctly to
ensure both computers retransmit any frames which are corrupted by
simultaneous transmission).
The different frame types have different formats and MTU values, but can
coexist on the same physical medium.
Novell's "raw" 802.3 frame format was based on early IEEE 802.3 work.
Novell used this as a starting point to create the first implementation of its own
IPX Network Protocol over Ethernet. They did not use any LLC header but
started the IPX packet directly after the length field. This does not conform to the
IEEE 802.3 standard, but since IPX has always FF at the first two bytes (while in
IEEE 802.2 LLC that pattern is theoretically possible but extremely unlikely), in
practice this mostly coexists on the wire with other Ethernet implementations,
Novell NetWare used this frame type by default until the mid nineties, and
since Netware was very widespread back then, while IP was not, at some point in
time most of the world's Ethernet traffic ran over "raw" 802.3 carrying IPX.
Since Netware 4.10, Netware now defaults to IEEE 802.2 with LLC (Netware
Frame Type Ethernet_802.2) when using IPX.
Mac OS
The IEEE 802.1Q tag, if present, is placed between the Source Address
and the EtherType or Length fields. The first two bytes of the tag are the Tag
Protocol Identifier (TPID) value of 0x8100. This is located in the same place as
the EtherType/Length field in untagged frames, so an EtherType value of 0x8100
means the frame is tagged, and the true EtherType/Length is located after the Q-
tag. The TPID is followed by two bytes containing the Tag Control Information
Types of Ethernet
10Base5
10Base2
10BaseT
10BaseF
100BaseT
100VG
GIGA ETHERNET
History
Since that time, faster 10 gigabit Ethernet standards have become available
as the IEEE ratified a fiber-based standard in 2002, and a twisted pair standard in
2006.
Summary
There are four different physical layer standards for gigabit Ethernet using optical
fiber, twisted pair cable, or balanced copper cable.
The IEEE 802.3z standard includes 1000BASE-SX for transmission over multi-
mode fiber, 1000BASE-LX for transmission over single-mode fiber, and the
nearly obsolete 1000BASE-CX for transmission over balanced copper cabling.
These standards use 8B/10B encoding, which inflates the line rate by 25%, from
1000 Mbit/s to 1250 Mbit/s to ensure a DC balanced signal. The symbols are then
sent using NRZ.
IEEE 802.3ab, which defines the widely used 1000BASE-T interface type, uses a
different encoding scheme in order to keep the symbol rate as low as possible,
allowing transmission over twisted pair.
1000BASE-X
1000BASE-SX
1000BASE-LX
1000BASE-BX10
1000BASE-CX
1000BASE-T details
The data is transmitted over four copper pairs, eight bits at a time. First,
eight bits of data are expanded into four 3-bit symbols through a non-trivial
scrambling procedure based on a linear feedback shift register; this is similar to
what is done in 100BASE-T2, but uses different parameters. The 3-bit symbols
are then mapped to voltage levels which vary continuously during transmission.
One example mapping is as follows:
000 0
010 +2
011 -1
100 0
101 +1
110 -2
111 -1
Non-trivial DSP algorithms and processing power were involved with the
introduction of PAM-5, hence its delayed introduction after 802.3z.
1000BASE-TX
Practical 4
Apparatus:
(1) ETB for AM and ADM
(2) Function generator
(3) CRO
(4) CRO probe
(5) Path Cards
Theory:
In the case of AM of carrier signal varied in proportion to the instances
amplitude of information signal. Amplitude of carrier signal changes but
frequency and phase don’t greater the amplitude, of information signal,
greater the functions in the amplitude of carrier signals.
The function of modulator is to mix these two waves in such a way that (a)
is transmitted along with (b). All stations broadcasting on the standard
broadcast band (550-1550 KHz) use AM.
If you observe the envelope of the modulated carrier wave you will realize
that is an exact replica and AF signal.
In summary,
(1) Function in the amplitude of the carrier (signal) wave depends on
amplitude of its signal.
(2) Rate at which these fluctuations take places depends on the frequency of
audio signal.
m= 100
m= 100
m= 100
So,
m=μ 100
em = Im sin 2πfmt
= β sin pt.
Where p = 2πfm, β = Im
em = Em sin 2πfmt
= β sin pt.
Where p = 2πfm, β = Em
As seen from figure (3), the amplitude of the modulated carrier wave at any
instance is,
= A + Em
= A + β sin pt
These 3 frequencies are not a mathematical function but actually exist. In fact
with the help of a narrow band, after filter we can separate side frequency
from the carrier wave.
Procedure:
(1) Observe the carrier signal wave form on CRO.
(2) Observe the information signal wave form on CRO, available from
function generator.
(3) Apply carrier signal and information signal to amplitude modulator.
(4) Observe the amplitude modulated wave-form on the CRO.
(5) Calculate the value of Vmax and Vmin.
(6) Provide the output of amplitude modulator to input of demodulator to
observe the demodulated output on the CRO.
Observations:
Vmax = 2 volt
Vmin = 2 volt
M.I. = 100 %
= 100 %
= 100 %
M.I. = 100 %
Conclusion:
Here, the modulation index is 100 % by experiment.
Apparatus:
(1) ETB for Sampling and Reconstructing theorem.
(2) Function Generator.
(3) CRO.
(4) CRO probes.
(5) Patch Cards.
Theory:
Any real signal will be transmitted along same form of channel which will
have a finite bandwidth. As a result, received signal’s spectrum can not
n ≤
part.”
T and which we know can not contain any f above . We can sample this
q signal to obtain q series a values , which represent the signal level at the
low n (i.e. low values of 2π ) will be zero. This limits the number of spectral
components present in the signal just as upper limit means that there are
Procedure:
(1) Observe the sine wave to be sampled.
(2) Observe the sampled output.
(3) Change the frequency.
(4) Provide the output of sampling act to different reconstruction circuits.
(5) Vary the duty cycle and note the changes.
Conclusion:
“In order to convey faithfully all the information in a signal with a
bandwidth of N Hz only 2N samples per second n to be sent.”
Apparatus:
(1) CRO
(2) CRO Probe
(3) ETB for RAM and RAD
Theory:
Types of modulation:
Experiment No: 1
To demonstrate sampling of a sine wave audio signal thereby converting at
into (PAM) pulse amplitude modulated signal.
Procedure:
Using connecting loads connect the output of sampling pulse generator to
input 1 of PAM modulator and o/p of modulating signal generator to input 2
of the PAM modulator.
Turn the toggle switch marked to “H” position and the potentiometer
marked “frequency” to completely anticlockwise position. Potentiometer
marked “level” under the modulating signal generator to fully clockwise
position.
Observe PAM signal at socket marked TB^3 (TB’s cube) on a CRO after
switching on main power to training board adjust level of modulating signal
so that the peaks of the sampling, pulses clearly makes outline of an end is
started as shown in figure.
Experiment No: 2
Procedure:
(1) In continuous with above experiment now connect the above of PAM
modulation to the input of PAM demodulation with a connecting load.
(2) Observe the o/p of PAM, demodulation at sockets marked “DEMO
OUTPUT” on CRO.
Conclusion:
Thus, pulse amplitude modulation is one type of digital modulation in
which amplitude of pulse is varied in accordance with the modulating
waveform.
Apparatus:
(1) ETB for FDM
(2) CRO
(3) CRO Probes
(4) Patch Cords
Theory:
Frequency Division Multiplexing (FDM):
FDM is used with both wire links and radio links. The idea of FDM is to
modulate the signals of the various users into carries at different frequency.
These modulated signals can then share the same path (wire, air, or vacuum)
and they occupy different parts and the overall electronic spectrum. Before
multiplexing they have the same shape and bandwidth, but each user signal is
centered, that is shown in figure (1).
In FDM, the total bandwidth required is equal to the sum of the individual
sum of the individual b/w plus any guard bands that are required since the
link-air, wire, vacuum or assigned frequency band usually has a b/w much
wider than the b/w of the individual user signal, the link’s capacity is used
more efficiently. A link made up of 22 gauge copper wire has a bandwidth of
about 100 KHz, depending on wire spacing, insulation and other factors.
Therefore sending a single voice signal of several KHz b/w using this sort of
link is very wasteful.
An FDM system requires equipments as shown in figure (2) for each user
there are modulating circuitry, a transmitter, a receiver and a demodulator.
The channel is common to all users since each transmitter is using a carrier of
a different frequency, there is no interface unless the sidebands or carries are
incorrectly assigned and these overlapped. In same designer it is practical to
share a signal transmitter or receiver.
Procedure:
(1) Observe the signal, and signal 2 on CRO screen.
(2) Observe 16 KHz and 32 KHz subcarrier signals on CRO screen.
(3) Observe the output signals of modulator 1 and modulator 2.
(4) Observe the output of band pass filter having bands 12-16 KHz and 28-32
KHz.
(5) Observe the summing amplifier o/p.
(6) Observe the main carrier signal.
(7) Observe the FDM output.
Practical 8
Apparatus:
( 11 ETB for TDM
( 11 CRO
( 11 CRO probes
( 11 Patch Cards.
Theory:
In most systems, there is a need to have more than one user. Share the
channel with other users. This means that various types information from
different sources need to have access to the channel “multiplexing” is the
general name for various different ways of achieving this.
This allows many users to make use of the links. TDM is used within
computer systems and integrated ckts too. Many ups and their associated
buses multiplex add and data bits to reduce the number of line drivers and
receives and IC pins needed.
Procedure:
(1) Observe the 3 input waveforms i.e. sine waveform, triangular waveform
and square waveform separately on the CRO screen.
(2) Supply these 3 i/p signals to the input of the TDM ckt.
(3) Observe the TDM o/p.
(4) Supply the TDM o/p to the i/p of the Demultiplexing ckt.
(5) Observe the demultiplexed o/p i.e. sine, triangular, square waveforms
separately on CRO screen.
Conclusion:
TDM is one of the best multiplexing techniques.
#include<stdio.h>
#include<conio.h>
#include<math.h>
void main()
{
char c;
int a[9]={0,0,0,0,0,0,0,0,0};
int i=1,sum=0;
clrscr();
printf("Enter Char: ");
scanf("%c",&c);
while(c!='o')
{
a[i++]=c%2;
for(i=1;i<9;i++)
{
sum=sum+a[i];
if(sum%2==0)
a[0]=1;
}
for(i=0;i<9;i++)
{
printf("%d",a[i]);
}
getch();
}
#include<stdio.h>
#include<conio.h>
#include<math.h>
void main()
{
int a[16];
int sum=0,j,len=0,rev[8],x=0,i;
clrscr();
for(j=0;j<16;j++)
{
scanf("%d",&a[i]);
len++;
}
for(j=0;j<len/2;j++)
{
printf("\n");
for(j=len/2;j<len;j++)
{
rev[x++]=a[j];
printf("%d",a[j]);
}
printf("\n");
while(sum != len/2)
{
if(rev[sum] == a[sum])
printf("0");
else
printf("1");
sum++;
}
getch();
}
#include<stdio.h>
#include<conio.h>
#include<math.h>
void main()
{
int i,j,k,x,y,z;
int a[10],b[5],c[4],r[14];
clrscr();
for(i=0;i<x;i++)
{
scanf("%d",&a[i]);
}
printf("\n");
for(i=0;i<y;i++)
{
scanf("%d",&b[i]);
}
printf("\n");
c[j]=0;
k=x+j;
for(i=0;i<k;i++)
{
if(k<x)
{
printf("%d",a[i]);
}
else
{
a[i]=0;
printf("%d",a[i]);
}
}
i=0;
while(i<k)
{
if(i<y)
printf("%d",r[i]);
i++;
}
else
{
for(z=0;z<y;z++)
{
if(z==j)
{
r[z]=a[i];
}
else
{
r[z]=r[++z];
if(r[z]==b[z])
r[z]=0;
else
r[z]=1;
printf("%d",r[z]);
}
}
}
i++;
}
#include<stdio.h>
#include<conio.h>
void main()
{
int a[8],b[8],c[8],d[8],i;
clrscr();
for(i=0;i<8;i++)
{
scanf("%d",&a[i]);
}
for(i=0;i<8;i++)
{
scanf("%d",&b[i]);
}
printf("\n---------------------\n");
printf("\n-----------------\n");
for(i=0;i<8;i++)
{
if(a[i]==1)
{
c[i]=0;
}
else
{
c[i]=1;
}
printf("%d",c[i]);
}
printf("\n------------------\n");
for(i=0;i<8;i++)
{
if(d[i]%2==0)
d[i]=0;
else
d[i]=1;
printf("%d",d[i]);
}
printf("\n is complement\n");
printf("\n-----------------------\n");
for(i=0;i<8;i++)
{
if(d[i]==1)
d[i]=0;
else
d[i]=1;
printf("%d",d[i]);
}
getch();
}