Data Communication & Computer Networks Laboratory
Data Communication & Computer Networks Laboratory
Practical File
Of
Aakash Raj
1507884
D2ITA1
Bachelor of technology
(Information Technology)
At
Date: Date:
INDEX
S. Objective Page Signature
No No
1 Familiarization with Networking Components 1
and devices: LAN Adapters, Hubs, Switches,
Routers etc.
2 Familiarization with Transmission media and 4
Tools: Co-axial cable, UTP Cable, Crimping
Tool, Connectors etc.
3 Preparing straight and cross cables. 10
4 Study of various LAN tpologies and their 12
creation using network devices, cables and
computers.
5 Configuration of TCP/IP Protocols in Windows 18
and Linux.
6 Implementation of file and printer sharing. 24
7 Use of commands like ping, ipconfig etc for 27
troubleshooting network related problems.
8 Installing QualNet on Windows. 30
9 Visualization of network using QualNet. 35
University Roll No 1507884
Network Hub
Definition: In computer networking, a hub is a small, simple, inexpensive device that
joins multiple computers together. Many network hubs available today support the
Ethernet standard. Other types including USB hubs also exist, but Ethernet is the type
traditionally used in home networking.
1
University Roll No 1507884
Technically speaking, two different types of hubs exist:
• passive
• active
Passive hubs do not amplify the electrical signal of incoming packets before broadcasting
them out to the network. Active hubs, on the other hand, do perform this amplification, as
does a different type of dedicated network device called a repeater. Some people use the
terms concentrator when referring to a passive hub and multiport repeater when referring to
an active hub.
Network switch
A network switch (sometimes known as a switching hub) is a computer networking device
that is used to connect devices together on a computer network. A switch is considered
more advanced than a hub because a switch will only send a message to the device that
needs or requests it, rather than broadcasting the same message out of each of its ports.
A switch is a multi-port network bridge that processes and forwards data at the data link
layer (layer 2) of the OSI model. Some switches have additional features, including the
ability to route packets. These switches are commonly known as layer-3 or multilayer
switches.
Router
Router: Routers are devices (computers) containing software that help in determining the
best path out of the available paths, for a particular transmission. They consist of a
combination of hardware and software. The hardware includes the physical interfaces to
the various networks in the internet work. The two main pieces of software in a router are
the operating system and the routing protocol.
2
University Roll No 1507884
Routers use logical and physical addressing to connect two or more logically separate
networks. They accomplish this connection by organizing the large network into logical
network segments or sub-networks. Each of these sub networks is given a logical
address. This allows the networks to be separate but still access each other and
exchange data when necessary. Data is grouped into packets, or blocks of data. Each
packet, in addition to having a physical device address, has a logical network address.
Routers are frequently used to interconnect identical networks as well as to interconnect
networks with different types of hardware.
3
University Roll No 1507884
4
University Roll No 1507884
The following table shows the UTP categories, the no. of pairs in each, and the grade of
cable each uses and how they are implemented.
5
University Roll No 1507884
Coaxial Cable
Coaxial cable has two wires of copper. The core wire lies in center and is made of solid
conductor. Core is enclosed in an insulating sheath. Over the sheath the second wire is
wrapped around and that too in turn encased by insulator sheath. This all is covered by
plastic cover.
Because of its structure coax cables are capable of carrying high frequency signals than
that of twisted pair cables. The wrapped structure provides it a good shield against noise
and cross talk. Coaxial cables provide high bandwidth rates of up to 450 mbps.
There are three categories of Coax cables namely, RG-59 (Cable TV), RG-58 (Thin
Ethernet) and RG-11 (Thick Ethernet. RG stands for Radio Government.
Cables are connected using BNC connector and BNC-T. BNC terminator is used to
terminate the wire at the far ends.
Fiber-Optics Cable
A cable with central glass tube covered with protective shield which transmit data using
photons is fiber optics cable. These cables transmit data via concentrated bursts of laser
beams which are carried through bundles of hair thin glass fibers.
They have advantages over electronic cables in transmission speed and volume. This
technology has revolutionized telecommunication applications which used electronic
cables. Fiber optics cables as free from electro-magnetic interference as well as wire
tapping. fiber optics cable considered a broad band communication channel.
6
University Roll No 1507884
• Radio wave.
• Micro wave.
• Infrared.
Radiowaves Transmission
Although Radio waves are prevalent and well understood, we are just beginning to realize
their enormous potential as a networking medium. Radio waves can operate on a single
or multiple frequency bands.
Radiowaves are omni directional i.e. they travel in all the directions from the source.
Because of this property, transmitter and receiver need not to be aligned. Radiowaves
can penetrate buildings easily, so they are widely use for communication both indoors
outdoors.
At high frequencies, radiowaves tends to travel in straight line and bounce off the
obstacles. They are also absorbed by rain. Radiowaves me widely used for AM and FM
radio, television, cordless telephone, cellular phones, paging and wireless LAN.
Microwave Transmission
Microwaves have been used in data communications for a long time. They have a higher
frequency than radio waves and therefore can handle larger amounts of data.
7
University Roll No 1507884
List the Advantages of microwaves.
A. They require no right of way acquisition between towers.
B. They can carry high quantities of information due to their high operating frequencies.
C. Low cost land purchase: each tower occupies only a small area.
Disadvantages of Microwaves
A. Attenuation by solid objects: birds, rain, snow and fog.
Crimping tool
A crimping tool is a tool designed to crimp or connect a connector to the end of a cable.
For example, network cables and phone cables are created using a crimping tool to
connect the RJ-45 and RJ-11 connectors to the end of the cable. In the example below
picture, this crimper is capable of crimping a RJ-11 (6-Pin) and RJ-45 (8-Pin) connectors
and also includes a wire cutter near the handles that can be used to cut phone or CAT5
cable.
8
University Roll No 1507884
RJ-45 Connecter
The RJ-45 connector is a form of telephone connector. It sees its most frequent use as a
local- area network connector, and is frequently referred to simply as an Ethernet
connector.
BNC Connecter
This connector is commonly used on a Token Ring network. BNC is also short for
Bayonet Nut Connector or British Naval/Navy Connector although more appropriately
known as the Bayonet Neill Concelman. In the picture to the right, is an example of a BNC
connector on the end of a coaxial cable.
9
University Roll No 1507884
10
University Roll No 1507884
11
University Roll No 1507884
Bus topology
Bus Topology is the simplest of network topologies. In this type of topology, all the nodes
(computers as well as servers) are connected to the single cable (called bus), by the help
of interface connectors. This central cable is the backbone of the network and is known
as Bus (thus the name). Every workstation communicates with the other device through
this Bus.
4) Linear Bus network is mostly used in small networks. Good for LAN.
12
University Roll No 1507884
Star topology
In Star topology, all the components of network are connected to the central device called
“hub” which may be a hub, a router or a switch. Unlike Bus topology (discussed earlier),
where nodes were connected to central cable, here all the workstations are connected to
central device with a point-to-point connection. So it can be said that every computer is
indirectly connected to every other node by the help of “hub”.
2) Easy to connect new nodes or devices. In star topology new nodes can be added
easily without affecting rest of the network. Similarly components can also be removed
easily.
3) Centralized management. It helps in monitoring the network.
4) Failure of one node or link doesn’t affect the rest of network. At the same time its easy
to detect the failure and troubleshoot it.
3) Performance and as well number of nodes which can be added in such topology is
depended on capacity of central device.
Ring Topology
In Ring Topology, all the nodes are connected to each-other in such a way that they make
a closed loop. Each workstation is connected to two other components on either side,
and it communicates with these two adjacent neighbors. Data travels around the network,
in one direction. Sending and receiving of data takes place by the help of TOKEN.
13
University Roll No 1507884
3) There is no need for network server to control the connectivity between workstations.
4) Additional components do not affect the performance of network.
5) Each computer has equal access to resources.
2) If one workstation or port goes down, the entire network gets affected.
3) Network is highly dependent on the wire which connects different components.
4) MAU’s and network cards are expensive as compared to Ethernet cards and hubs.
Mesh Topology
In a mesh network topology, each of the network node, computer and other devices, are
interconnected with one another. Every node not only sends its own signals but also
relays data from other nodes. In fact a true mesh topology is the one where every node is
connected to every other node in the network. This type of topology is very expensive as
there are many redundant connections, thus it is not mostly used in computer networks. It
is commonly used in wireless networks. Flooding or routing technique is used in mesh
topology.
Tree Topology
Tree Topology integrates the characteristics of Star and Bus Topology. Earlier we saw how
in Physical Star network Topology, computers (nodes) are connected by each other
through central hub. And we also saw in Bus Topology, work station devices are
connected by the common cable called Bus. After understanding these two network
configurations, we can understand tree topology better. In Tree Topology, the numbers of
Star networks are connected using Bus. This main cable seems like a main stem of a tree,
and other star networks as the branches. It is also called Expanded Star Topology. Ethernet
protocol is commonly used in this type of topology. The diagram below will make it clear.
15
University Roll No 1507884
Advantages of Tree Topology
1. It is an extension of Star and bus Topologies, so in networks where these topologies
can't be implemented individually for reasons related to scalability, tree topology is the
best alternative.
3. Here, we divide the whole network into segments (star networks), which can be easily
managed and maintained.
2. As more and more nodes and segments are added, the maintenance becomes
difficult.
Hybrid Topology
Before starting about Hybrid topology, we saw that a network topology is a connection of
various links and nodes, communicating with each other for transfer of data. We also saw
various advantages and disadvantages of Star, Bus, Ring, Mesh and Tree topologies.
Now lets discuss what Hybrid Network topology is and why it finds its application in Wide
Area Networks. Hybrid, as the name suggests, is mixture of two different things. Similarly
in this type of topology we integrate two or more different topologies to form a resultant
topology which has good points (as well as weaknesses) of all the constituent basic
topologies rather than having characteristics of one specific topology. This combination of
topologies is done according to the requirements of the organization.
For example, if there exists a ring topology in one office department while a bus topology
in another department, connecting these two will result in Hybrid topology. Remember
connecting two similar topologies cannot be termed as Hybrid topology. Star-Ring and
Star-Bus networks are most common examples of hybrid network.
16
University Roll No 1507884
Advantages of Hybrid Network Topology
1) Reliable: Unlike other networks, fault detection and troubleshooting is easy in this type
of topology. The part in which fault is detected can be isolated from the rest of network
and required corrective measures can be taken, WITHOUT affecting the functioning of
rest of the network.
2) Scalable: Its easy to increase the size of network by adding new components, without
disturbing existing architecture.
3) Flexible: Hybrid Network can be designed according to the requirements of the
organization and by optimizing the available resources. Special care can be given to
nodes where traffic is high as well as where chances of fault are high.
4) Effective: Hybrid topology is the combination of two or more topologies, so we can
design it in such a way that strengths of constituent topologies are maximized while there
weaknesses are neutralized. For example we saw Ring Topology has good data reliability
(achieved by use of tokens) and Star topology has high tolerance capability (as each node
is not directly connected to other but through central device), so these two can be used
effectively in hybrid star-ring topology.
3) Costly Infrastructure: As hybrid architectures are usually larger in scale, they require a
lot of cables, cooling systems, sophisticate network devices, etc.
17
University Roll No 1507884
Step 2
Double-click the Local Area Connection icon; highlight Internet Protocol (TCP/IP) tab in
the
Step 3
Double click it or click Properties. The TCP/IP Properties window will display.
Step 4
Now you have two ways to configure the TCP/IP protocol below:
Select Obtain an IP address automatically and Obtain DNS Server address automatically,
as shown in the figure below. These may be selected by default. Then click OK to save
setting.
2. Assigned manually
2) Select Use the following DNS server addresses, as shown in the following figure. And
then type the DNS server IP address, which should be provided by your ISP. Finally
remember to click OK to save settings.
18
University Roll No 1507884
Note: In most cases, type your local area DNS server IP addresses into it.
The Preferred DNS server is same to default gateway. For Secondary DNS server, you
could leave it blank or type in 8.8.8.8.
19
University Roll No 1507884
Step 5
Click OK to save and apply your settings.
Step 2
Type ncpa.cpl in the box, then press OK.
!
Step 3
Select the local area connection, right click it and select Properties.
Step 4
Select Internet Protocol Version 4(TCP/IPv4), double click it or click Properties.
Step 5
There are two ways to configure the TCP/IP Properties, Assigned by DHCP server
automatically or manually.
2. Assigned manually
1) Select Use the following IP address, type IP address, subnet mask and default
gateway IP address into it.
20
University Roll No 1507884
2) Select Use the following DNS server addresses, as shown in the following figure.
And then type the DNS server IP address, which should be provided by your ISP. If
necessary, then click OK to save the settings.
Note: In most cases, type your local area DNS server IP addresses into it.
The Preferred DNS server is same to default gateway. For Secondary DNS server, you
could leave it blank or type in 8.8.8.8.
21
University Roll No 1507884
Step 6
Click OK to save and apply your settings
On most Linux systems, you can access the TCP/IP connection details within 'X
Windows' from Applications > Others > Network Connections. The same may also be
reached through Application > System Settings > Network > Configure. This opens up
a window, which offers configuration of IP parameters for wired, wireless, mobile
broadband, VPN and DSL connections:
2. route - Used to set static routes and view the routing table
3. hostname - Necessary for viewing and setting the hostname of the system
4. netstat - Flexible command for viewing information about network statistics, current
connections, listening ports
6. ip - Multi-purpose command for viewing and setting TCP/IP parameters and routes.
7. tc - Traffic control command, used for classifying, prioritizing, sharing, and limiting
both inbound and outbound traffic.
22
University Roll No 1507884
23
University Roll No 1507884
Properties:
(If you do not have this screen, go to the Control Panel and selected Network
Connection.)
24
University Roll No 1507884
Select Local Area Connection and right click and select Properties.
In the next diagram File and Printer Sharing for Microsoft Networks has already been
installed, on your screen it should not be listed, if it is, it is already installed. Now hit the
Install button.
Now select Service form the list of component types and hit OK.
!
On the next screen select File and Printer Sharing for Microsoft Networks and hit OK.
25
University Roll No 1507884
File and Printer Sharing for Microsoft Networks should now be added to the list. Hit
Close to exit.
26
University Roll No 1507884
Tracert/traceroute
Typically, once the ping utility has been used to determine basic connectivity, the
tracert/traceroute utility can used to determine more specific information about the
path to the destination host including the route the packet takes and the response
time of these intermediate hosts. Figure 2 below shows an example of the tracert
utility being used to find the path from a host inside an office to www.google.com. The
tracert utility and traceroute utilities perform the same function but operate on
different operating systems, Tracert for Windows machines and traceroute for Linux/
*nix based machines.
27
University Roll No 1507884
Ipconfig/ifconfig
One of the most important things that must be completed when troubleshooting a
networking issue is to find out the specific IP configuration of the variously affected
hosts. Sometimes this information is already known when addressing is configured
statically, but when a dynamic addressing method is used, the IP address of each
host can potentially change often. The utilities that can be used to find out this IP
configuration information include the ipconfig utility on Windows machines and the
ifconfig utility on Linux/*nix based machines. Figure 3 below shows an example of the
ifconfig utility showing the IP configuration information of a queries host.
Nslookup
Some of the most common networking issues revolve around issues with Dynamic
Name System (DNS) address resolution issues. DNS is used by everyone using the
Internet to resolve commonly known domain names (i.e. google.com) to commonly
unknown IP addresses (i.e. 74.125.115.147). When this system does not work, most
of the functionality that people are used to goes away, as there is no way to resolve
this information. The nslookup utility can be used to lookup the specific IP address(es)
associated with a domain name. If this utility is unable to resolve this information,
there is a DNS issue. Along with simple lookup, the nslookup utility is able to query
specific DNS servers to determine an issue with the default DNS servers configured
28
University Roll No 1507884
on a host. Figure 4 below shows an example of how the nslookup utility can be used
to query the associated IP address information.
Route
The last of the tools covered in this article is the route utility. This utility is used to
display the current status of the routing table on a host. While the use of the route
utility is limited in common situations where the host only has a single IP address with
a single gateway, it is vital in other situations where multiple IP address and multiple
gateways are available. Figure 13 below shows an example of the route utility being
used on a Windows machine.
29
University Roll No 1507884
30
University Roll No 1507884
5. Select the components to install in the Choose Components dialog box. The
default type of install is Full. Click Next. (It is recommended that you select Desktop
Shortcuts. Although this is not required, it will make compilation from command line
easier.)
6. The Destination Folder dialog box is displayed. Select an installation folder and
click Install to begin the installation.
31
University Roll No 1507884
Note: If any of the setup information needs to change, click Back to make those
changes.
If a floating license server is not used, the license file name is of the form qualnet-
<date>.lic, where <date> is the license expiration date. For example, the license file
may be named qualnet- 2008.06.30.lic. If a floating license server is used, the license
file name is of the form client-<ip- address>.lic, where <ip-address> is the IP address
of the client.
Copy the license file into QUALNET_HOME\license_dir, where QUALNET_HOME is
the directory where QualNet is installed.
32
University Roll No 1507884
Notes:
A. Be sure to check the file extension on your license file. It should end in “.lic”.
Depending on your system and method of copying, you may end up with an extra
extension, such as qualnet- -2007.12.31.lic.txt, which will not work.
B. If this file cannot be located, inquire with the purchaser of QualNet. For users with
the evaluation version of QualNet, the license file is sent as an email attachment
from Scalable Network Technologies.
C. If a license server is used, follow the instructions provided with the license files to
install the server and client license files.
9. Once the installation process has finished, the following screen will be displayed:
Click Next.
33
University Roll No 1507884
Select from the options and click Close.
The Installer will place the following icons on the desktop if the Desktop Shortcuts
option was selected in
Step 5:
The following startup screen is displayed when the QualNet GUI starts:
34
University Roll No 1507884
3D Visualizer
35