1 Practical File CN-merged
1 Practical File CN-merged
VISHWAVIDHYALAYA,INDORE
Lab Manual
Semester: III
Roll No. :
Section: CS-A
Submitted by : Submitted to :
Aayush Gupta Mr. Vikas Jain
Shri Vaishnav Vidyapeeth Vishwavidyalaya
Shri Vaishnav Institute of Information Technology
Department of Computer Science & Engineering
Computer Networks ( BTIT301N )
LIST OF EXPERIMENTS
E
XPERIMENT NO. -
01
AIM: Study of different types of network cables and their fabrication using Virtual Labs.
OBJECTIVES:
1. To practice the color code for different cables.
2. Observe the LAN Tester and make the decision accordingly.
THEORY:
A twisted pair consists of two insulated conductors twisted together in the shape of a spiral. It
can be shielded or unshielded. The unshielded twisted pair cables are very cheap and easy to
install. But they are very badly affected by the electromagnetic noise interference. Twisting of
wires will reduce the effect of noise or external interference. The induced emf into the two
wires due to interference tends to cancel each other due to twisting. Number of twists per unit
length will determine the quality of cable. More twists mean better quality.
2. Crossover cable: Crossover wired cables (commonly called crossover cables) are very
much like Straight-Through cables with the exception that TX and RX lines are crossed
(they are at opposite positions on either end of the cable. Using the 568-B standard as an
example below you will see that Pin 1 on connector A goes to Pin 3 on connector B. Pin 2
on connector A goes to Pin 6 on connector B etc. Crossover cables are most commonly
used to connect two
hosts directly. Examples would be connecting a computer directly to another computer,
connecting a switch directly to another switch, or connecting a router to a router.
Note: While in the past when connecting two host devices directly a crossover cable was
required. Now days most devices have auto sensing technology that detects the cable and
device and crosses pairs when needed. Figure (B) shows you how to prepare Cross wired
connection.
3. Roll-over cable: Rollover wired cables also called rollover cables, have opposite Pin
assignments on each end of the cable or in other words it is "rolled over". Pin 1 of connector
A would be connected to Pin 8 of connector B. Pin 2 of connector A would be connected
to Pin 7 of connector B and so on. Rollover cables, sometimes referred to as Yost cables
are most commonly used to connect to a devices console port to make programming
changes to the device. Unlike crossover and straight-wired cables, rollover cables are not
intended to carry data but instead create an interface with the device. The given figure (C)
shows connection diagram for roll over cable.
FIG (C)
PROCEDURE:
To fabricate a UTP Cable follow the below steps:
1) A choice list would be given for the type of cable to be fabricated.
2) Select the choice out of the three choices given.
3) Once a selection is done then the user must make the cable ready
4) In-order to do so select the color codes on both the sides i.e., Switch port and PC port.
5) After assigning the color codes click on the Start button to observe that the fabricated
cable is correct or not.
6) Based on the observations, if fabrication of cable is not correct then follow the procedure
again by proper connections.
REPORT:
1. What are various transmission media?
2. Explain shielded twisted pair cable.
3. List advantages, disadvantages, and applications of coaxial cable.
REFERENCES:
1. Behrouz A. Forouzan, 'Data communication and Networking", Tata McGraw-Hill, Fourth
Edition, 201l.
2. Andrew S- Tanenbaum, 'Computer Networks", Pearson education, Fourth Edition, 2009.
Sub. Code: BTIT301N Sub. Name: Computer Networks Experiment No.: 02
Student’s Name: Aayush Gupta Batch: 03 No. of Pages: Date:
Details of submissions & performance
Performing: Understanding various types of networking devices. First Submission Second submission
Extra turn Regular turn
E
XPERIMENT NO. -
02
OBJECTIVES:
To learn basics of different networking devices.
THEORY:
Network Devices-
Repeater: A repeater is an electronic device that receives a signal and retransmits it at a higher
power level, or to the other side of an obstruction, so that the signal can cover longer distances
without degradation. In most twisted pair ethernet configurations, repeaters are required for
cable runs longer than 100 meters away from the computer. Repeaters have two ports, so cannot
be used to connect for more than two devices. Repeater is physical layer device.
Repeater
Hub:
An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator is a device for
connecting multiple twisted pair or fiber optic ethernet devices together and making them act
as a single network segment. Hubs work at the physical layer of the OSI model. The device is
a form of multiport repeater. When a packet arrives at one port, it is copied to all the ports of
the hub for transmission. In a hub, a frame is passed along or "broadcast" to every one of its
ports. It doesn't matter that the frame is only destined for one port.
Hub
Bridge:
A network bridge connects multiple network segments at the data link layer of the OSI model.
Bridges do not copy traffic to all ports, as hubs do, but learn which MAC addresses are
reachable through specific ports. Once the bridge associates a port and an address, it will send
traffic for that address only to that port. Bridges do broadcasts to all ports except the one on
which the broadcast was received.
Bridge
Switch:
A network switch or switching hub is a computer networking device that connects network
segments. The term commonly refers to a network bridge that processes and routes data at the
data link layer of the OSI model. Switches that additionally process data at the network layer
are often referred to as Layer 3 switches or multilayer switches.
The switch is a relatively new network device that has replaced both hubs and bridges in LANs.
A switch uses an internal address table to route incoming data frames via the port associated
with
their destination MAC address. Switches can be used to connect a number of end-user devices
such as workstations, or to interconnect multiple network segments. A switch that interconnects
end-user devices is often called a workgroup switch. Switches provide dedicated full-duplex
links for every possible pairing of ports, effectively giving each attached device its own
network segment. This significantly reduces the number of intra-segment and inter-segment
collisions.
Switch
Router:
A router is an electronic device that interconnects two or more computer networks. Routers are
networking devices that forward data packets between networks using headers and forwarding
tables to determine the best path to forward the packets. Each data packet contains address
information that a router can use to determine if the source and destination are on the same
network, or if the data packet must be transferred from one network to another.
A network environment that consists of several interconnected networks employing different
network protocols and architectures requires a sophisticated device to manage the flow of
traffic between these diverse networks. Such a device, sometimes referred to as an intermediate
system, but more commonly called a router, must be able to determine how to get incoming
packets (or datagrams) to the destination network by the most efficient route.
Router
Gateway:
A gateway is a hardware device that acts as a "gate" between two networks. A gate way may
contain devices such as protocol translators, impedance matching devices, rate converters, fault
isolators, or signal translators as necessary to provide system interoperability. Gateways are the
most complex of network devices because they perform translations at multiple layers of the
OSI model. Router considered as a gateway because it combines LAN environment and WAN
environment.
NIC: The network interface card (NIC) is the expansion card you install in your computer to
connect, your computer to the network. This device provides the physical, electrical, and
electronic connections to the network media. A NIC is either an expansion card (the most
popular implementation) or built into the motherboard of the computer.
NIC
Conclusion: By the help of this lab, we are now familiar with different networking devices.
REPORT:
1. Define computer network and categorize.
2. What are the three criteria necessary for an effective and efficient network?
3. Differentiate router with gateway.
REFERENCES:
1. Behrouz A. Forouzan, 'Data communication and Networking", Tata McGraw-Hill, Fourth
Edition, 201l.
2. Andrew S- Tanenbaum, 'Computer Networks", Pearson education, Fourth Edition, 2009.
Sub. Code: BTIT301N Sub. Name: Computer Networks Experiment No.: 03
Student’s Name: Aayush Gupta Batch: 03 No. of Pages: Date:
Details of submissions & performance
Performing: Study of network IP address and subnetting. First Submission Second submission
Extra turn Regular turn
E
XPERIMENT NO. -
03
AIM: Study of network IP address and subnetting with the help of Virtual Labs.
OBJECTIVES:
1. To give IP Address and subnet mask of different classes in given Network id.
2. Verify that the nodes are in network for different classes.
THEORY:
IPv4 Addressing
IP addresses enable computers to communicate by providing unique identifiers for the
computer itself and for the network over which it is located. An IP address is a 32-bit value that
contains a network identifier (net -id) and a host identifier (host-id).
Generally, there are two notations in which IP address is written, dotted decimal notation and
hexadecimal notation.
The network administrators need to assign IP addresses to the system on their network. This
address needs to be a unique one. All the computers on a particular subnet will have the same
network identifier but different host identifiers. The Internet Assigned Numbers Authority
(IANA) assigns network identifiers to avoid any duplication of addresses.
The 32-bit IPv4 address is grouped into groups of eight bits, separated by dots. Each 8-bit group
is then converted into its equivalent binary number. Thus, each octet (8bit) can take value from
0 to 255. The IPv4 in the dotted decimal notation can range from 0.0.0.0 to 255.255.255.255.
The IPv4 Address is classified into 4 types as follows:
Class First Octet Range Default Subnet Mask
Class A 1 - 127 255.0.0.0
Class B 128 - 191 255.255.0.0
Class C 192 - 223 255.255.255.0
Class D 224 - 239 -
Class A: Class A networks range from 1 to 127. The default subnet mask is 255.0.0.0. Thus,
by default, the first octet defines the network, and the last three octets define the host. The first
bit of the first octet is always set to 0 (zero). This results in a maximum of 127 Class A
networks, with 16,777,214 hosts per network.
Class B:
Class B networks range from 128 to 191. The default subnet mask is 255.255.0.0. Thus, by
default, the first two octets define the network, and the last two octets define the host. An IP
address which belongs to class B has the first two bits in the first octet set to 10, i.e., 10000000
– 10111111. This results in a maximum of 16,384 Class B networks, with 65,534 hosts per
network.
Class C:
Class C networks range from 192 to 223. The default subnet mask is 255.255.255.0. Thus, by
default, the first three octets define the network, and the last octet defines the host. The first
octet
of Class C IP address has its first 3 bits set to 110, i.e., 11000000 – 11011111. This results in a
maximum of 2,097,152 Class C networks, with 254 hosts per network.
Class D:
Class D networks are reserved for multicast traffic. Class D addresses do not use a subnet mask.
Class E:
Class E networks are for future use or experimental purposes.
Default Subnet mask: It is used to identify the network part from the host part. Put binary
one for the parts that represent network part and zero for the part that represent host part.
a) Class A: 255.0.0.0
b) Class B: 255.255.0.0
c) Class C: 255.255.255.0
d) We can’t have mix of 1s and 0s in subnet mask. Only consecutive 1s is followed by
consecutive 0s
REPORT:
1. What is the purpose of subnetting?
2. What is the difference between physical address and logical address?
3. Given an IP address in decimal dotted notation, how can its class be determined?
REFERENCES:
1. Behrouz A. Forouzan, 'Data communication and Networking", Tata McGraw-Hill, Fourth
Edition, 201l.
2. Andrew S- Tanenbaum, 'Computer Networks", Pearson education, Fourth Edition, 2009.
Sub. Code: BTIT301N Sub. Name: Computer Networks Experiment No.: 04
Student’s Name: Aayush Gupta Batch: 03 No. of Pages: Date:
Details of submissions & performance
Performing: Implement a LAN using Cisco Packet Tracer. First Submission Second submission
Extra turn Regular turn
E
XPERIMENT NO. -
04
AIM: To implement a LAN using Cisco Packet Tracer.
OBJECTIVES:
1. LAN network implementation using HUB.
2. LAN network implementation using SWITCH.
THEORY:
LAN-
Local Area Network (LAN)is limited to a specific area, usually an office, and cannot extend
beyond the boundaries of a single building. The first LANs were limited to a range (from a
central point to the most distant computer) of 185 meters (about 600 feet) and no more than 30
computers. Today’s technology allows a larger LAN, but practical administration limitations
require dividing it into small, logical areas called workgroups. A workgroup is a collection of
individuals who share the same files and databases over the LAN.
The main objective is to set up a Local Area Network and simulate the result at cisco packet
tracer.
Packet Tracer is a protocol simulator developed by Dennis Frezzo and his team at Cisco
Systems. Packet Tracer (PT) is a powerful and dynamic tool that displays the various protocols
used in networking, in either Real Time or Simulation mode. This includes layer 2 protocols
such as Ethernet and PPP, layer 3 protocols such as IP, ICMP, and ARP, and layer 4 protocols
such as TCP and UDP. Routing protocols can also be traced. The required equipments are three
PC`s equipped with at least one NIC, one HUB or Switch and the necessary cables. Once the
physical LAN is set up the hosts need to be configured. To verify communication among the machines
the ping command is used.
PROCEDURE:
1. Open The CISCO PACKET TRACER software.
2. You will see the start screen as shown below.
3. Choose “Hub” and then select any hub suitable for the network. In this case “PT-Hub” is
chosen.
4. After selecting “PT-Hub” click on the main area. You will see a Hub.
5. Select “End Devices” and then click at any end devices required. “PC” and “Laptop” is
chosen shown below.
6. Select “Connections” from Power Cycle Devices and click on “Automatically choose
Connection Type” or the dedicated cable from connections can be chosen i.e.,
“crossover”
cable for similar devices (PC to PC) and “straight through” cable for different devices
(router to switch) etc.
11. Repeat Step 10 to set the IPs for all the PCs.
12. Select “Add simple message”
13. Drag and drop the message from the source device and then to the Destination device. In
this case the source device is PC0, and destination device is PC1.
15. Click at “Auto Capture / Play” Conclusion: Connection established successfully between
Source and Destination.
16. Observe the path of the Message from source to Hub, then to all devices. And then from
Destination to Hub then back to the source.
17. Finally observe the marks. If the source PC is marked correct it means you have
successfully established the connection.
RESULTS: Simulation of LAN network has been done successfully using HUB/SWITCH.
Note: Perform all the above-mentioned steps by taking switch in place
of hub and include the simulation result in the experiment.
RESULTS: Simulation of LAN network has been done successfully using SWITCH.
REFERENCES:
1. Behrouz A. Forouzan, 'Data communication and Networking", Tata McGraw-Hill, Fourth
Edition, 201l.
2. Andrew S- Tanenbaum, 'Computer Networks", Pearson education, Fourth Edition, 2009.
Sub. Code: BTIT301N Sub. Name: Computer Networks Experiment No.: 05
Student’s Name: Aayush Gupta Batch: 03 No. of Pages: Date:
Details of submissions & performance
Performing: Analyse the performance of various configurations and First Submission Second submission
protocols in LAN.
Extra turn Regular turn
E
XPERIMENT NO. -
05
OBJECTIVES: Connecting two LANs using router and the communication between the
devices of both the LANs.
THEORY:
The main objective is to extend connection between two LANs by using router. The concepts
include IP addressing and basic network routing principles to connect two LANs topology.
During router configuration attention is paid to the types of interfaces as additional issues are
involved with set-up. For example, the serial interfaces require clocking mechanisms to be set
correctly. Once the interfaces are working the ping command is used to check for
communication between LANs. The failure of communication illustrates the need for routes to
be established inside the routing infrastructure. Static routes are used to show how packets can
be transported through any reasonable route. It is run trace route on two different configurations
to demonstrate the implementation of different routes.
In Packet Tracer, you can add a router, switch and PC to the working environment to create a
basic network and examine how data communication takes place between computers.
Now, follow the steps below to examine how computers on two segments (two different LANs)
connected to the Cisco router on packet tracer to communicate.
STEP 1: Add one router, two switches and four PCs on the programs workspace as shown
below. Now, you need to assign an IP address to the computers that you add to the topology.
To do this, click on the PC to which you will assign an IP, and on the desktop tab click IP
configuration. Then you need to assign the IP address to all the PCs connected in LAN1 and a
different set of IP address to the PCs connected in LAN2 as given in the figurer below.
Then note the port and slot numbers of the routers Gigabit Ethernet interfaces in the
workspace. Double click on the router to open the iOS command interface.
STEP 2: In the router configuration window, assign an IP address to the Gigabit Ethernet
0/0 interface based on LAN1 and make the port status ON.
STEP 3: Like step 2, in the router configuration window, assign an IP address to the
Gigabit Ethernet 0/1 interface based on LAN2 and make the port status ON.
STEP 4: After configuring the Gigabit Ethernet 0/0 and Gigabit Ethernet 0/1 interface, the
port will be green. The meaning of this color is that the interface is active and working. Also
mention
the port addressing for Gigabit Ethernet 0/0 and Gigabit Ethernet 0/1 interface towards both
side of the routers (LAN1 and LAN2 side) on the screen.
STEP 5: Configure the default gateway settings for PC1, PC2 as per the Gigabit Ethernet 0/0
interface address towards LAN1 and for PC3, PC4 as per the Gigabit Ethernet 0/1 interface
address towards LAN2 in the following image
STEP 6: Click the command prompt on PC1 and then ping the PC4 computer IP address to
test the network connection.
RESULTS: Thus, the network is configured successfully connecting two different LAN
networks via router.
REFERENCES:
1. Behrouz A. Forouzan, 'Data communication and Networking", Tata McGraw-Hill, Fourth
Edition, 201l.
2. Andrew S- Tanenbaum, 'Computer Networks", Pearson education, Fourth Edition, 2009.
Sub. Code: BTIT301N Sub. Name: Computer Networks Experiment No.: 06
Student’s Name: Aayush Gupta Batch: 03 No. of Pages: Date:
Details of submissions & performance
Performing: Simulation of various network topologies using Packet Tracer. First Submission Second submission
Extra turn Regular turn
E
XPERIMENT NO. -
06
THEORY: Topology is a pattern of network devices and describes the way in which these
devices are connected. Topologies can be physical or logical. Physical topology refers to the
actual physical structure of the network, while a logical topology determines the way in which
the data actually passes through the network from one device to the other. Different types of
topologies are:
1. Ring topology
2. Bus topology
3. Star topology
4. Mesh topology
5. Tree topology
6. Hybrid topology
BUS TOPOLOGY: In a bus topology, devices share a common backbone cable to send and
receive data. A thick coaxial cable is used to connect all devices. Bus topology uses Daisy
chain scheme to add more devices in a network. In a Daisy chain scheme, device 1 is connected
to
device 2; device 2 is connected to device 3. The first and last devices are connected to the
terminator.
STAR TOPOLOGY: In Star topology, multiple devices are connected to a central connection
point known as hub or switch. Devices are attached to the switch by using either copper cables
or fiber optics cable. Star networks provide a cost-effective method for sharing information
between different users. Start topology can be used in airline reservation counters and small
business offices where employee want an access to common application and files.
RING TOPOLOGY: In ring topology, each device is connected to adjacent devices forming
a circle. Data flows in only one direction, clockwise or anticlockwise. Each device in the ring
topology acts as a repeater. It amplifies the signal and transmits it to the next device.
MESH TOPOLOGY: In mesh topology each device is connected to each other device. A
device can send data to all the devices in the network. Data sent by the other device can take
any possible path to reach the destination.
TREE TOPOLOGY: A tree topology combines the characteristics of linear bus and star
topology. In tree topology, group of star network are connected to the linear bus backbone.
Tree topology enables the user to expand and configure the existing network depending on the
requirement. Twisted pair of cable is commonly used by tree topology. Tree topology is also
called as hierarchical structure.
⮚ Ring Topology
⮚ Bus Topology
⮚ Star Topology
⮚ Mesh Topology
⮚ Tree Topology
⮚ Hybrid Topology
REPORT:
1. What are various topologies?
2. What is the difference between client server and peer to peer networking?
3. List advantages and disadvantages of peer-to-peer network.
REFERENCES:
1. Behrouz A. Forouzan, 'Data communication and Networking", Tata McGraw-Hill, Fourth
Edition, 201l.
2. Andrew S- Tanenbaum, 'Computer Networks", Pearson education, Fourth Edition, 2009.