19

Click here to load reader

cn_writeups1(lan)

Embed Size (px)

Citation preview

Page 1: cn_writeups1(lan)

NAME: DATE OF PERFORMANCE:

ROLL NO: DATE OF SUBMISSION:

SIGN:

Implementation of LAN using star topology and connectivity

Aim: To Implement of LAN using star topology and connectivity between two computers using cross over UTP CAT5 cable.

Objective:1. Introduction to Windows 2000 operating systems.2. Creating accounts and changing passwords.3. Introduction to networking devices, cables, connectors, etc.4. Build a small network using Windows 2000 Operating System.5. Install TCP/IP.6. Manually configure TCP/IP parameters.7. Use the IPCONFIG utility to view configured IP parameters.8. Use the PING utility to test TCP/IP communications and its differentoptions.9. Share a folder.10. Connect to a shared folder.11. Stop sharing a folder.12. Install and test NetBEUI.Requirements:

PCs, Switch, hub, Cat5 cables, Ethernet cable

Theory:Local Area Network:Ethernet:Name "Ethernet" stands for LAN technology and protocol at the same time. The Ethernet protocol was originally developed by companies DEC, Intel and Xerox. Its 10 MHZ variant denotes like Ethernet II. Later Ethernet has been normalized by IEEE institute like norm 802.3. This norm has been assumed by ISO and has been publicized like ISO 8802-3. Frames pattern according to specification Ethernet II has gently contradistinguished from pattern ISO 8802-3. Progress time come into being norm IEEE 802.3u for Ethernet on frequency 100 MHZ (Fast Ethernet) and norm IEEE 802.3z for frequency 1 GHZ (Gigabit Ethernet).Network active parts :Ethernet cardsEthernet cards are usually purchased separately from a computer, although many computers (such as the Macintosh) now include an option for a pre-installed Ethernet card. Ethernet cards contain connections for either coaxial or twisted pair cables (or both). If it is designed for coaxial cable, the connection will be BNC. If it is designed for twisted pair, it will have a RJ-45 connection. Some Ethernet cards also contain an AUI connector. This can be used to attach coaxial, twisted pair, or fiber optics cable to an Ethernet card. When this method is used there is always an external transceiver attached to the workstation

Page 2: cn_writeups1(lan)

Ethernet card.From top to bottom:RJ-45, AUI, and BNC connectors

Network Topology:The physical topology of a network refers to the configuration of cables, computers, and other peripherals. Physical topology should not be confused with logical topology which is the method used to pass information between workstations

Main Types of Physical Topologies:The following are the physical topologies used in networks.

Linear Bus Star Star-Wired Ring Tree We will discuss about star topology.

Star: A star topology is designed with each node (file server, workstations, and peripherals) connected directly to a central network hub or concentrator Data on a star network passes through the hub or concentrator before continuing to its destination. The hub or concentrator manages and controls all functions of the network. It also acts as a repeater for the data flow. This configuration is common with twisted pair cable; however, it can also be used with coaxial cable or fiber optic cable.Advantages of a Star Topology:

1. Easy to install and wire. 2. No disruptions to the network then connecting or removing devices. 3. Easy to detect faults and to remove parts.

Page 3: cn_writeups1(lan)

Star topology Disadvantages of a Star Topology:

Requires more cable length than a linear topology. If the hub or concentrator fails, nodes attached are disabled. More expensive than linear bus topologies because of the cost of the

concentrators. The protocols used with star configurations are usually Ethernet or LocalTalk. Token Ring uses a similar topology, called the star-wired ring. Cables:Straight cablesThe following diagram shows the Normal use of Crossed and Straight cables (see also the notes below).

Category 5(e) (UTP) colour coding table:The following table shows the normal colour coding for category 5 cables (4 pair) based on the two standards supported by TIA/EIA (see also our primer on this topic)

10baseT Straight Cable (PC to HUB/SWITCH):Straight cables are used to connect PCs or other equipment to a HUB or Switch. If your connection is PC to PC or HUB to HUB you MUST use a Crossed cable. The following cable description is for the wiring of both ends (RJ45 Male connectors) with the 568B category 5(e) wiring colors you could, of course, use the 568A colour scheme.

Page 4: cn_writeups1(lan)

Connectors:RJ-45The RJ-45 connector is commonly used for network cabling and for telephony applications.  It's also used for serial connections in special cases.  Here's a look at it:

Because only two pairs of wires in the eight-pin RJ-45 connector are used to carry Ethernet signals, and both 10BASE-T and 100BASE-TX use the same pins, a crossover cable made for one will also work with the other.

NetBIOS:

NetBIOS is an acronym for Network Basic Input/Output System. It provides services related to the session layer of the OSI model allowing applications on separate computers to communicate over a local area network. As strictly an API, NetBIOS is not a networking protocol. Older operating systems ran NetBIOS over IEEE 802.2 and IPX/SPX using the NetBIOS Frames (NBF) and NetBIOS over IPX/SPX (NBX) protocols, respectively. In modern networks, NetBIOS normally runs over TCP/IP via the NetBIOS over TCP/IP (NBT) protocol. This results in each computer in the network having both an IP address and a NetBIOS name corresponding to a (possibly different) host name.

NetBIOS was developed in 1983 by Sytek Inc. as an API for software communication over IBM's PC-Network LAN technology. On PC-Network, as an API

Pin No. strand color Name

1 white and orange TX+

2 Orange TX-

3 white and green RX+

4 NC *

5 NC *

6 Green RX-

7 NC *

8 NC *

Page 5: cn_writeups1(lan)

alone, NetBIOS relied on proprietary Sytek networking protocols for communication over the wire. Because PC-Network only supported up to 80 devices in its most accommodating mode (baseband), NetBIOS was itself designed with limited nodes in mind.

In 1985, IBM went forward with the token ring network scheme and a NetBIOS emulator was produced to allow NetBIOS-aware applications from the PC-Network era to work over this new design. This emulator, named NetBIOS Extended User Interface (NetBEUI), expanded the base NetBIOS API with, among other things, the ability to deal with the greater node capacity of token ring. A new networking protocol, NBF, was simultaneously produced to allow NetBEUI (NetBIOS) to provide its services over token ring — specifically, at the IEEE 802.2 Logical Link Control layer.

NetBIOS provides three distinct services:

Name service for name registration and resolution.

Session service for connection-oriented communication.

Datagram distribution service for connectionless communication

NetBIOS Extended User Interface:

The Microsoft adaptation of the IBM NetBIOS protocol. NetBEUI expands on NetBIOS by adding a Transport layer component. NetBEUI is a fast and efficient protocol that consumes few network resources, provides excellent error correction, and requires little configuration.

Acronym for basic input/output system, the built-in software that determines what a computer can do without accessing programs from a disk. On PCs, the BIOS contains all the code required to control the keyboard, display screen, disk drives, serial communications, and a number of miscellaneous functions.The BIOS is typically placed in a ROM chip that comes with the computer (it is often called a ROM BIOS). This ensures that the BIOS will always be available and will not be damaged by disk failures. It also makes it possible for a computer to boot itself. Because RAM is faster than ROM, though, many computer manufacturers design systems so that the BIOS is copied from ROM to RAM each time the computer is booted. This is known as shadowing.Many modern PCs have a flash BIOS, which means that the BIOS has been recorded on a flash memory chip, which can be updated if necessary.The PC BIOS is fairly standardized, so all PCs are similar at this level (although there are different BIOS versions). Additional DOS functions are usually added through software modules. This means you can upgrade to a newer version of DOS without changing the BIOS.PC BIOSes that can handle Plug-and-Play (PnP) devices are known as PnP BIOSes, or PnP-aware BIOSes. These BIOSes are always implemented with flash memory rather than ROM. Short for Network Basic Input Output System, an API that augments the DOS BIOS by adding special functions for local-area networks (LANs). Almost all Windows-based LANs for PCs are based on the NetBIOS. Some LAN manufacturers have even extended it, adding additional network capabilities.Pronounced net-booey, NetBEUI is short for NetBios Extended User

Page 6: cn_writeups1(lan)

Interface. It is an enhanced version of the NetBIOS protocol used by network operating systems such as LAN Manager, LAN Server, Windows for Workgroups, Windows 95 and Windows NT.Netbeui was originally designed by IBM for their Lan Manager server and later extended by Microsoft and Novell.

Procedure:

Configuring Windows 2000 OS for Network Connectivity.1. Log on as Administrator.Log on as: administratorPassword: {The password is left blank}2. In the Control Panel, select and double-click on Network and Dial-UpConnections.3. In the Network and Dial-Up Connections dialog box, double-click onLocal Area Connection.4. Report the following information about the Network Interface Card:

5. In the Local Area Connection Status dialog box, click on Propertiestab.

6. In the Local Area Connection Properties dialog box, select Configure,and then report the following information:

Click on OK once you finish.7. Select Internet Protocol (TCP/IP) to view its properties.8. Select the radio button Use the following IP address:IP Address: 196.15.60.xSubnet Mask: 255.255.255.0Click OK and then Close.9. To test that IP is working and bound to your Network adapter, type:D:\> ping 127.0.0.1And then press ENTER.This internal loop-back test should give you four replies if TCP/IP isbound to the Network adapter.Note: Ping allows you to check connectivity and reachability of any

Page 7: cn_writeups1(lan)

computer connected to your LAN, or to the internet.

10. What is the purpose of pinging 127.0.0.1?________________________________________________________________________________________________________________11. To test TCP/IP connectivity with LABSERVER, type:D:\> ping 196.15.60.220Four Replies from 196.15.60.220 messages should appear.12. Ping other computers in your classroom. Recall that IP addresses areassigned, as w.x.y.z, where w.x.y is exactly the same as in your own IPaddress, and the remainder, z, is unique to each student’s system.13. To test sending a message to another computer. In Windows platform, amachine name is called a NetBIOS name:D:\> net send netbios-name messageExample:D:\> net send LABSERVER hello world14. To verify TCP/IP parameters for your computer, type:D:\> ipconfigAnd then press ENTER.Document the output of this command:

15. In this step of part C, you will experiment different possibilities offeredby ping to check reachability of a device connected to the network. Findout the difference between different ping options.D:\> ping –t 196.15.60.220D:\> ping –a 196.15.60.220D:\> ping –n 10 196.15.60.220D:\> ping –n 20 196.15.60.220D:\> ping –l 64 196.15.60.220D:\> ping –l 512 196.15.60.220D:\> ping –i 5 196.15.60.220D:\> ping –i 20 196.15.60.220_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Page 8: cn_writeups1(lan)

________________________________________________________________________________________________

Sharing a Folder:1. Log on as Administrator.Log on as: administratorPassword: {The password is left blank}2. Create a folder named Public on the D drive of your computer.3. Click Start, point to Programs, point to Accessories, and then clickWindows Explorer.4. Right-click the appropriate folder (Public), and then click Sharing.5. In the folder's properties, click Share this folder. Use the default namefor the share. Click Permissions.6. In the Permissions for dialog box, click Add.7. In the Select Users, Computers, or Groups dialog box, double-click theAuthenticated Users group, and then click OK.8. In the Permissions for dialog box, click the Authenticated Users group.9. In the Permissions list, for the Full Control permission, click Allow.After you have set the appropriate permissions, click the Everyonegroup, and then click Remove.Connecting to a shared folder using My NetworkPlaces1. On the desktop, double-click My Network Places.2. Double-click Computers Near Me.3. Double-click the appropriate computer in your workgroup (selectLABSERVER). If you are prompted to do so, type the user name andpassword that is required to gain access to the computer to which you areconnecting. After you type the appropriate credentials, a window opensthat displays all of the shared folders and printers on the computer towhich you are connecting.4. Double-click the shared folder to which you want to gain access (SelectSample folder). You then see all of the subfolders and files in that sharedfolder. What you can do with those subfolders and files depends on thelevel of permission you have been granted

Conclusion: ______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Objective Question:

1.If a computer on the network shares resources for others to use, it is called__2. Terminators are used in a______ topology.3. In _____ topology, if a computer’s network cable is broken, whole network goes down.

Page 9: cn_writeups1(lan)

4. For large networks, _______ topology is used.5. ISO stands for6. ISO OSI model is used in 7. Network cable lies on _____ layer8. ____ layer decides which physical pathway the data should take.9. ISDN is an example of ______ network10. X.25 is an example of ______ network11. ____________ allows LAN users to share computer programs and data.12. Print server uses ________ which is a buffer that holds data before it is send to the printer.14. The ______ portion of LAN management software restricts access, records user activities and audit data etc.15. What is the max cable length of STP?16. What is the max data capacity of STP?17. Which connector STP uses? 18. What is the central device in star topology? 19. What is max data capacity for optical fiber cable?

Subjective Question:

1. What is LAN? 2. What are the topologies? 3. What are the types of media used for LAN? 4. What is UTP CAT-5 cable? 5. What is ethernet card/NIC card/LAN card? 6. What is IEEE 802.3 standard? 7. What are networking devices? 8. What is Switch? 9. What is cross cable & straight cable?10. What is meant by10baseT straight cable?11. What are the colour combinations in cable?12. What is pinging?13. What is internet?14. What are the broadcast technologies used in LAN?15. Compare wired & wireless LAN.16. What is NETBEUI and NETBIOS.

Page 10: cn_writeups1(lan)
Page 11: cn_writeups1(lan)
Page 12: cn_writeups1(lan)
Page 13: cn_writeups1(lan)
Page 14: cn_writeups1(lan)
Page 15: cn_writeups1(lan)