CN FILE(ST-1)
CN FILE(ST-1)
Materials Required:
Cat5e/Cat6 Cable
RJ45 Connectors
Crimping Tool
Cable Tester
Network devices work as a mediator between two devices for data transmission, and thus
play a very important role in the functioning of a computer network. Below are some
common network devices used in modern networks:
Modem
A Modem (Modulator-Demodulator) is a device that converts digital data from a
computer into analog signals for transmission over telephone lines and vice versa. It is
essential for internet access over DSL or cable networks.
Repeater
A Repeater is a network device used to regenerate and amplify weak signals in a
network. It extends the coverage area by ensuring data signals travel long distances
without loss.
Hub
A Hub is a basic networking device that connects multiple devices in a network and
broadcasts incoming data to all connected devices. It operates at the physical layer and
does not differentiate between devices, making it less efficient than a switch.
Bridge
A Bridge is a networking device that connects two or more network segments, allowing
data to pass between them efficiently. It works at the data link layer and helps manage
network traffic by filtering and forwarding data based on MAC addresses.
Switch
A Switch is an intelligent network device that connects multiple devices within a LAN.
It operates at the data link layer and forwards data based on MAC addresses, improving
network efficiency by reducing collisions.
Router
A Router is a critical networking device that connects multiple networks and directs data
packets based on IP addresses. It determines the best path for data transmission and enables
communication between different networks, including the internet.
Gateway
A Gateway is a networking device that serves as a bridge between different networks using
different communication protocols. It enables seamless data transfer between dissimilar
systems, such as connecting an internal enterprise network to the internet.
Network Interface Card (NIC)
A Network Interface Card (NIC) is a hardware component that enables a computer
to connect to a network. It provides a physical interface for wired (Ethernet) or
wireless (Wi-Fi) connections, facilitating communication between devices.
Access Point
A Wireless Access Point (WAP) is a device that allows wireless devices connect to
a wired network using Wi-Fi. It extends the range of a network and enables seamless
wireless communication in large areas.
Firewall
A Firewall is a network security device that monitors and controls incoming and
outgoing network traffic. It acts as a barrier between trusted and untrusted networks,
protecting systems from cyber threats and unauthorized access.
Types of Cables:
Cables are essential components in networking, used to transmit data between
devices. They vary based on speed, distance, and interference resistance. Common
types include twisted pair, coaxial, and fiber optic cables, each serving specific
networking needs
Two types: Unshielded Twisted Pair (UTP) and Shielded Twisted Pair
(STP).
1. Straight-Through Cable
o Used to connect different types of devices (e.g., PC to switch, switch to router).
o Both ends follow the same wiring standard (T568A-T568A or
T568B- T568B).
2. Crossover Cable
o Used to connect similar devices (e.g., PC to PC, switch to switch).
o One end follows T568A, and the other follows T568B.
1. RJ45 Connector – Used for Ethernet cables in networking. It has an eight-pin configuration
and is commonly found in wired networking setups, including home and office environments. RJ45
connectors provide a secure connection for transmitting data and are widely used in LANs, ensuring
reliable and high-speed internet connectivity.
2. BNC Connector – Used with coaxial cables in CCTV and radio applications. It features a quick-
connect bayonet-style mechanism, allowing for easy and secure connections. BNC connectors are
commonly used in video surveillance systems, radio- frequency transmissions, and test equipment,
providing a stable signal transmission with minimal loss and interference.
3. SC, ST, and LC Connectors – Used in Fiber optic cables for network communication. SC
(Subscriber Connector) is known for its push-pull mechanism, while ST (Straight Tip) features a
bayonet lock. LC (Lucent Connector) is compact and widely used in high-density networking
applications. These connectors ensure efficient light signal transmission with minimal signal loss.
3. You have 2 end jacks, which must be installed on your cable. If you are using a
pre- made cable, with one of the ends whacked off, you only have one end to install
- the crossed over end. Below are two diagrams, which show how you need to arrange
the cables for each type of cable end. Decide at this point which end you are making
and examine the associated picture below.
Straight-Through refers to cables that have the pin assignments on each end of the cable.
In other words, Pin 1 connector A goes to Pin 1 on connector B, Pin 2 to Pin 2, etc.
Straight-Through wired cables are most commonly used to connect a host to a client.
When we talk about cat5e patch cables, the Straight-Through wired cat5e patch cable
is used to connect computers, printers, and other network client devices to the router
switch or hub (the host device in this instance).
Connector A Connector B
Pin 1 Pin 1
Pin 2 Pin 2
Pin 3 Pin 3
Pin 4 Pin 4
Pin 5 Pin 5
Pin 6 Pin 6
Pin 7 Pin 7
Pin 8 Pin 8
Crossover wired cables (commonly called crossover cables) are very much like Straight-
Through cables with the exception that TX and RX lines are . Using the 568-B
standard as an example below, you will see that Pin 1 on connector A goes to Pin 3
on connector B. Pin 2 on connector A goes to Pin 6 on connector B, etc. Crossover
cables are most commonly used to connect two hosts directly. Examples
would be connecting a computer directly to another computer, connecting a switch
directly to another switch etc.
Connector A Connector B
Pin 1 Pin 1
Pin 2 Pin 2
Pin 3 Pin 3
Pin 4 Pin 4
Pin 5 Pin 5
Pin 6 Pin 6
Pin 7 Pin 7
Pin 8 Pin 8
Rollover wired cables, most commonly called rollover cables, have opposite Pin
assignments on each end of the cable or, in other words, it is "rolled over." Pin 1 of
connector A would be connected to Pin 8 of connector B. Pin 2 of connector A would be
connected to Pin 7 of connector B and so on. Rollover cables, sometimes referred to as
Yost cables are most commonly used to connect to a device's console port to make
programming changes to the device. Unlike crossover and straight-wired cables, rollover
cables are not intended to carry data but instead create an interface with the device.
Connector A Connector B
Pin 1 Pin 1
Pin 2 Pin 2
Pin 3 Pin 3
Pin 4 Pin 4
Pin 5 Pin 5
Pin 6 Pin 6
Pin 7 Pin 7
Pin 8 Pin 8
Experiment-2
Material Required:
• Laptop/Desktop
• CISCO Packet Tracer program
Setting Up:
Follow the below steps to initiate the setup for the connection:
Step 1: Download Cisco Packet Tracer.
Step 2: Run and install the setup (You can be requested to log in to your Cisco Networking Academy
Account or you can also log in as a guest).
Step 3: After the installation procedure has completed this display (below) will appear when you run
the Cisco Packet Tracer-Start the application.
Implementation:
Follow the below steps to implement the connection:
Step 1: From the bottom toolbar, click on ‘End Devices’ and select ‘PC’ and then click on the screen (for
two PC’s do this step twice).
Step 3: After selecting the wire click on the computer on the screen(here PC0) and select FastEthernet0.
Then, drag the wire to the other pc (here PC1) and do the same.
Step 4: Now, we will assign the IP address to both the PCs (PC0 & PC1).
Now if in Realtime box- PDU list window it shows successful, that means all the connections are correct
and the data transfer is successful
You have successfully connected two computers, using the virtual program Cisco Packet Tracer .
Experiment-3
Materials Required:
Cisco Packet Tracer software.
Virtual PCs, Switch, and Copper Straight-Through Cables (within Packet Tracer)
Now, let’s focus on the “privileged exec” mode, its purpose, and why it is a crucial component of
router administration.
Topology Diagram
Background / Preparation:
In this activity, you will configure these settings on the customer Cisco Catalyst 2960 switch:
Host name
Console password
vty password
Privileged EXEC mode password
Privileged EXEC mode secret
IP address on VLAN1 interface
Default gateway
a. From the Customer PC, use a console cable and terminal emulation software to connect to the
console of the customer Cisco Catalyst 2960 switch.
b. Set the host name on the switch to CustomerSwitch using these commands.
CustomerSwitch(config-line)#password cisco
CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit
CustomerSwitch(config)#line vty 0 15
b. From line configuration mode, set the password to cisco and require the password to be entered at
login.
CustomerSwitch(config-line)#password cisco
CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit
From global configuration mode, switch to interface configuration mode for VLAN1, and assign the IP address
192.168.1.5 with the subnet mask of 255.255.255.0.
CustomerSwitch(config)#interface vlan 1
CustomerSwitch(config- if)#ip address 192.168.1.5 255.255.255.0
CustomerSwitch(config- if)#no shutdown
CustomerSwitch(config-if)#exit
Materials Required:
Cisco Packet Tracer software.
Switch and multiple PCs (simulated in Packet Tracer).
THEORY:
A Virtual Local Area Network (VLAN) is a logical grouping of devices in a network, enabling segmentation
to improve performance, security, and manageability. VLANs create multiple broadcast domains within a
single switch, ensuring traffic is contained within each VLAN unless routed externally.
Benefits of VLANs:
PROCEDURE:
4. Create VLANs:
Create VLAN 10 and VLAN 20:
Switch(config)# vlan 10
Switch(config-vlan)# name Sales
Switch(config-vlan)# exit
Switch(config)# vlan 20
Switch(config-vlan)# name IT
Switch(config-vlan)# exit
The output should show VLAN 10 with ports Fa0/1, Fa0/2 and VLAN 20 with port Fa0/3.
7. Test Connectivity:
Open the Command Prompt on each PC.
PC0 should be able to ping PC1 (since they’re in the same VLAN).
ping 192.168.10.2
PC0 should not be able to ping PC2 (since they’re in different VLANs).
OBSERVATION:
PCs in the same VLAN communicated successfully.
PCs in different VLANs could not communicate without additional configuration like inter-VLAN
routing.
RESULT:
VLANs were successfully created and configured, ensuring proper network segmentation.