You are on page 1of 7

CCN LAB MANUAL #1

Transmission Media

UNIVERSITY OF ENGINEERING AND TECHNOLOGY


TAXILA, Rawalpindi
Transmission media
The transmission media is nothing but the physical media over which communication takes place in
computer networks.

Categories:

There are two categories of transmission media known as guided transmission media and non-
guided transmission media.

 Guided transmission media


 Unguided transmission media

Guided transmission media

The signal requires a physical path for transmission. We will deal with this kind of media only.

In this type the most commonly used media are:-

1. Twisted pair cable


2. Coaxial cable
3. Fiber optic cable

Twisted Pair Cable


It has two types.
i. STP (Shielded twisted pair cable)
STP cables comes with twisted wire pair covered in metal foil. This makes it more indifferent to noise
and crosstalk.

ii. UTP (Unshielded twisted pair cable)


There is no metal foil covering on twisted pairs.
UTP has seven categories, each suitable for specific use. In computer networks, Cat-5, Cat-5e, and
Cat-6 cables are mostly used. UTP cables are connected by RJ45 connectors.

Categories of unshielded twisted pair cable.


Cabling Standards

Cabling Types:
 Straight-through
 Crossover
 Rollover Wiring

Straight-Through Wired Cables

Straight-Through refers to cables that have the pin assignments on each end of the cable. In other
words Pin 1 connector A goes to Pin 1 on connector B, Pin 2 to Pin 2 ect. Straight-Through wired
cables are most commonly used to connect a host to client. When we talk about cat5e patch cables,
the Straight-Through wired cat5e patch cable is used to connect computers, printers and other
network client devices to the router switch or hub (the host device in this instance).

Crossover Wired Cables

Crossover wired cables are very much like Straight-Through cables with the exception that TX and RX
lines are crossed (they are at oposite positions on either end of the cable. Using the 568-B standard
as an example below you will see that Pin 1 on connector A goes to Pin 3 on connector B. Pin 2 on
connector A goes to Pin 6 on connector B ect. Crossover cables are most commonly used to connect
two hosts directly. Examples would be connecting a computer directly to another computer,
connecting a switch directly to another switch, or connecting a router to a router. Note: While in the
past when connecting two host devices directly a crossover cable was required. Now a days most
devices have auto sensing technology that detects the cable and device and crosses pairs when
needed.

Rollover Wired Cables

Rollover wired cables most commonly called rollover cables, have opposite Pin assignments on each
end of the cable or in other words it is "rolled over". Pin 1 of connector A would be connected to Pin
8 of connector B. Pin 2 of connector A would be connected to Pin 7 of connector B and so on.
Rollover cables, sometimes referred to as Yost cables are most commonly used to connect to a
devices console port to make programming changes to the device. Unlike crossover and straight-
wired cables, rollover cables are not intended to carry data but instead create an interface with the

device.
Crimping Tool:
A crimping tool is a device used to conjoin two pieces of metal by
deforming one or both of them in a way that causes them to hold
each other. For instance, network cables and phone cables are
created using a crimping tool (shown below) to join the RJ-45 and
RJ-11 connectors to the both ends of either phone or CAT5 cable.

Cable Tester:
Always remove the cable from both the computer and router or
modem before connecting the tester. The majority of testers consist of
two main components: the tester itself and the remote. Most testers
have either two or three connectors: RJ-45 for Ethernet, RJ-11 for
telephone cable, and BNC for coaxial cable.. The smaller remote has
two connectors, one each for RJ-11 and RJ-45. If the network cable
tester supports coaxial cable networking, it comes with a terminator..
Users simply plug the network cable into the appropriate port on the
cable tester itself, and then connect the remote to the other end of the
cable.

Reading a Network Cable Tester

The standard network cable tester has a row of 10 LEDs on the body and 9 LEDs on the remote to
match up with the standard connector pinouts. The tester sends a signal down each pair in turn,
lighting the LEDs up. The order in which they either light or do not light indicates the cable type and
whether or not it is working.

Cable Condition Reading


Straight Through Light in same sequence on both units
Crossover Light in reverse order on remote
Open Circuit No lights on either main unit or remote
Short Circuit Lights on main unit but not remote
4-Pair Telephone Wire Only first four LEDs light and ground
6-Pair Telephone Wire Only first six LEDs light and ground
Ethernet Cable Eight LEDs plus ground all light in sequence
Coaxial Cable Bottom LED and LED on terminator light

Basic Networking Commands:


 Ping
 Tracert
 Ipconfig & ipconfig /all
Ping

Ping is a computer network administration software utility used to test the reachability of a host on
an Internet Protocol (IP) network. It measures the round-trip time for messages sent from the
originating host to a destination computer that are echoed back to the source.

Ping is a basic Internet program that allows a user to verify that a particular IP address exists and can
accept requests.

Ping is used diagnostically to ensure that a host computer the user is trying to reach is actually
operating. Ping works by sending an Internet Control Message Protocol (ICMP) Echo Request to a
specified interface on the network and waiting for a reply. This tool can help you troubleshoot
Internet connection problems, but bear in mind that many servers and devices are configured not to
reply to pings.

Ping responses:

1. Reply
2. Destination host unreachable
3. Request timed out

traceroute / tracert / tracepath

The traceroute, tracert, or tracepath command is similar to ping, but provides information about the
path a packet takes. traceroute sends packets to a destination, asking each Internet router along the
way to reply when it passes on the packet. This will show you the path packets take when you send
them between your location and a destination.

This tool can help troubleshoot connection problems. For example, if you can’t communicate with a
server, running traceroute may show you where the problem is occurring between your computer
and the remote host.

Ipconfig & ipconfig/all

The ipconfig command is used on Windows, while the ifconfig command is used on Linux, Mac OS X,
and other Unix-like operating systems. These commands allow you to configure your network
interfaces and view information about them.

For example, you can use the ipconfig /all command on Windows to view all your configured
network interfaces, their IP addresses, DNS servers, and other information. Or, you can use the
ipconfig /flushdns command to flush your DNS cache, forcing Windows to get new addresses from
its DNS servers every time you contact a new hostname. Other commands can force your computer
to release its IP address and get a new one from its DHCP server. This utility can quickly display your
computer’s IP address or help you troubleshoot problems.

whois

The whois command looks up the registration record associated with a domain name. This can show
you more information about who registered and owns a domain name, including their contact
information.
This command isn’t included with Windows itself, but Microsoft’s Windows Sysinternals provides a
Whois tool you can download. This information is also available from many websites that can
perform whois lookups for you.

netstat

netstat stands for network statistics. This command displays incoming and outgoing network
connections as well as other network information. It’s available on Windows, Mac, and Linux — each
version has its own command-line options you can tweak to see different types of information.

The netstat utility can show you the open connections on your computer, which programs are
making which connections, how much data is being transmitted, and other information.

You might also like