T4 Computer Network
T4 Computer Network
T4 Computer Network
COMPUTER NETWORK
1. Objectives
1. To test, assemble and familiarise with network equipment
2. To connect, configure, and access a network
3. To test, inspect and diagnose a network service
2. Introduction
In a network system, the terminals are connected to each other to enable
information sharing. The main reasons for designing a network system are:
T4-1
Computer Network UKM
a. Data transfer medium that is hard to replace once connected to the network.
b. Network infrastructure in terms of the equipment that need to be upgraded from time
to time.
c. Network size i.e. LAN, WAN and MAN.
d. The available facilities in handling and managing the network.
LAN Technology
LAN technology currently can support a data rate of 10 to 100 Mbps with low
latency, which is only around 10s, and has low transfer error. Network topologies that
are typically used are star, ring and bus as shown in the diagram in Figure 1.
Ring
topology
Bus
topology
Star
topology
T4-2
Computer Network UKM
The star topology consists of a computer that acts as a network centre for all
other computers that are connected to it.
The ring topology on the other hand does not have any centre computer. All
information transfer from one terminal will go through all the other terminals in turns
before coming to the correct delivery address.
In the bus topology, the terminals are connected to one another by using the bus
system therefore they can be connected and disconnected easily. This also enables the
network to be expanded easily by simply connecting new computers.
There are some popular LAN technology such as Ethernet, Token Ring and
FDDI. Each technology has its own protocol and hardware configuration. Ethernet is by
far the most popular LAN technology to date. It uses Carrier Sense Multiple Access with
Collision Detection (CSMA/CD) protocol based on the IEEE 802.3 convention. Ethernet
provides a range of transfer medium with different bit rates from 1Mbps to 1000Mbps.
10Base5 is also called Thicknet (basic band frequency of 500 MHz) with
maximum connection length of 500m, distance between transceiver of 2.5m, 100
maximum number of nodes, length of Attachment Unit Interface (AUI) up to 50m and
maximum network size of 2500m. This type of connection is typically used as the
backbone for an entire network. There are other categories of cables available such as the
category three (Cat3 10BaseT) with frequency 16MHz and the category five (Cat 5
10BaseT and 100BaseT). Other than that, fibre optic cables are also widely used as
1000BaseT connection or Gigabit Ethernet with no frequency limit.
WAN Network
T4-3
Computer Network UKM
There are several types of protocol and each has its own specific function and
role in the OSI seven layer model. All types of protocol have its own advantages and
disadvantages based on their applications and the network product used. One type of
protocol might only work in one layer in the OSI seven layer model while others might
work in more than one layer. Despite the differences, all protocols essentially work
within the OSI layers.
For example, Ethernet works in the second OSI layer, which is the data
connection layer. Each layer needs to follow a certain working procedure and all the
works must be done consistently between all communication levels in OSI. The role of
protocol in a data-transmitting computer is to divide the data into smaller chunks called
packets, to add addressing information in each packet and to prepare the packets for
transmission to the destination using a network card via cable. At the destination
computer, the protocol will prompt the received data packets to be collected via a
network card at the buffer, compiled and converted into executable form.
One of the most used protocols in campus network is the Transmission Control
Protocol/ Internet protocol (TCP/IP). To enable computers to communicate with each
other in a network, the IP address and other parameters such as Domain Name System
(DNS) and gateway have to be configured. These parameters can be set to be unique
(static) or dynamic through the data server base called Dynamic Host Configuration
Protocol (DHCP).
There are a number of utilities that can be used to test the physical connection
and the performance of a network such as the Packet Internet Grouper (PING) and
TRACEROUTE. Ping is the simplest and most useful trouble-shooting tool for analysing
network problems. It uses one of the TCP/IP protocol families called Message Control
Protocol (ICMP) that works at the network layer. The other useful utility is traceroute,
which records the packet route from the senders computer to the specified destination.
Every router or network that the packet goes through is called a hop. With Traceroute
utility, the location of a problematic router can be determined. Traceroute works in the
third layer, which is the network layer and is usually, implemented using the User
Datagram Protocol (UDP).
Computers that have been networked can provide and accept various services
using specific protocols. Some of most used protocols are Hypertext Transfer Protocol
(HTTP or WWW), File Transfer Protocol (FTP), electronic mailing or email using Post
T4-4
Computer Network UKM
Office Protocol (POP), Simple Mail Transfer Protocol (SMTP), Internet Relay Chat
(IRC), FINGER, ARCHIE and TELNET. With all these protocols and their respective
applications, computer and network security has become one of the most important
aspects of networking that needs to be given special attention.
3. Pre-Laboratory
1. Explain the types and wiring diagram of UTP cable in networking.
2. Explain the types and wiring diagram of coaxial cable and BNC connector in
networking.
3. Identify the procedure to test UTP and coaxial cable.
4. Explain the function of a router, terminator, repeater and access point.
4. Equipment
A. Hardware
1. 3 desktop computers
2. Network interface card (NIC)
3. UTP cable, coaxial cable
4. Router, terminator, repeater
5. Access point and wireless bus card
6. Network testing equipment
B. Software
T4-5
Computer Network UKM
5. Experiment
ALL OBSERVATIONS DURING EXPERIMENTS MUST BE DOCUMENTED.
DISCUSS YOUR OBSERVATIONS AND RESULTS OBTAINED FOR EACH
EXPERIMENT.
a. Identify the type and properties of all the NIC cards provided.
b. Test all the cards whether they are functioning properly.
B. Network Configuration
a. Obtain the computer name, workgroup, IP, gateway and DNS parameters for all
computers.
a. Choose the best access point that will give the strongest signal.
b. Run a ping test on the WAP address from each computer that has been connected
to the network.
a. Test your configuration using the ipconfig command at the command line prompt.
b. Test the connection between the connected computers by using the ping
<gateway address> command at the command line prompt.
c. Test the connection between the connected computers by using the nbtstat a
<IP address of another computer> command at the command line prompt.
d. Use the Map Network Drive command by doing the following steps :
i. Right click My Computer.
ii. Type in the command :
T4-6
Computer Network UKM
C. Service Test
1. Open server test software, Ping Plotter. Another software includes :
Ping Plotter : (http://www.pingplotter.com)
VisualRoute : (http://www.visualware.com)
2. Test the network performance in the faculty, campus and outside the campus. Write
down the website address for each test. Example of test window as in Figure 3.
Discuss your observations and results obtained from the software.
3. Using any web-based test you know, conduct an internet performance test for both
computers.
T4-7
Computer Network UKM
6. Questions
1. What is the main difference between a straight through and a crossed-over cable
connection?
2. Explain the actual hardware configuration and connection of a network based on a
star and wireless topology.
3. How do you assemble, test and configure if there are more than one network in the
same computer?
4. Explain other methods to configure WAP using arp command (Address Resolution
Protocol) at the command line prompt.
5. What does subnet mean and how do you classify an IP address? How many
computers can be connected to the Campus Network based on the allocated IP
address?
6. Recommend a list of hardware, software and network topology that can be used to
build a network in a Cyber Caf.
7. Reference
1. http://www.cisco.com
2. http://www.microsoft.com
3. https://web.archive.org/web/20090730172718/http://www.geocities.com/CapeCanaveral/
Lab/3731/computer_internet/internet/internet.html
T4-8