Old Acn File
Old Acn File
Old Acn File
By
-: INDEX :-
Sr. No Experiment Page No. Remarks
Familiarization with Networking
1. Components and devices:- LAN
Adapters, Switches, Routers ets.
Familiarization with Transmission
2. media and Tools:- Co-axial cable, UTP
Cable, Crimping Tool, Connectors etc.
3. Preparing Straight and Cross Cables.
Study of various LAN Topologies and
4. their creation using Network devices,
Cables and Computers.
5. Configuration of TCP/IP Protocols in
Windows and Linux.
6. Implementation of File and Printer
sharing.
7. Designing and Implementing Class A,
B, C Network.
8. Subnet Planning and its
Implementation.
9. Installation of ftp server and client.
To develop programs for simulating
10. routing algorithms for Adhoc networks.
To install any one open source packet
11. capture software like packet tracer etc.
12. To configure Wireless Local Loop.
13. To configure WLAN.
14. To configure Adhoc Networks.
To install and configure wireless access
15. points.
2
Experiment:- 01
Aim:- Familiarization with Networking Components and devices:- LAN
Adapters, Switches, Routers etc.
Switches:-
Switches are networking devices operating at layer 2 or a data
link layer of the OSI model.
They connect device in a network and use packet switching to
send, receive or forward data packets or data frames over the
network.
A switch has many ports, to which computers are plugged in.
3
Routers:-
A router is the first line of security from intrusion into a
network.
Enabling the highest level of security on the router turns on
things like the firewall, and is the best way to keep your
computer system and information safe from attack.
4
Experiment:- 02
Aim:- Familiarization with Transmission media and Tools: Co-axial
cable, UTP Cable, Crimping Tool, Connectors etc.
Material Required:- Co-axial cable, UTP Cable, Crimping tools and
connectors.
Co-axial Cable:-
1. Coaxial cable or coax is a type of electrical cable consisting of
an inner conductor surrounded by a concentric conducting
shield, with the two separated by a dielectric ; many coaxial
cable also have a protective outer sheath or jacket.
2. The term coaxial refers to the inner conductor and the outer
shield sharing a geometric axis. It is used in such applications
as telephone ,trunk lines, broadband internet networking cables,
high-speed computer data busses and cable television.
UTP Cable:-
1. UTP stands for unshielded twisted pair cable. It is a type of
wiring in which two conductors of a single circuit are twisted
together for the purpose improving electromagnetic
compatibility.
2. Compared to a single conductor or an untwisted balanced pair,
a twisted pair reduces electromagnetic radiation from the pair
and crosstalk electromagnetic radiation from the pair and
crosstalk between neighbouring pairs and improves rejection of
external electromagnetic interference.
5
Crimping Tool:-
1. A crimping tool is a device that is used to make cold weld
joints between wires and a connector through deforming one or
both of then to hold the other.
2. A special connector is used to join metals together .The weld
joint properties are strong as the parent materials when the tool
works and offer some result, which is known as crimp.
Connectors:-
1. A device that eliminates a section of cabling or implements a
state of access for network devices, including PC’s, hubs, and
switches.
2. Connectors can be famous for their physical presentation and
mating features, including jacks and attachment or attachments
and ports.
3. Connectors are used to connect the guided transmission media
to devices like the hub, server, workstations etc.
6
Experiment:- 03
Aim:- Preparing Straight and Cross Cables.
Materials Required:- Straight Cables and Cross Cables.
Straight Cable:-
1. Straight cable is used to connect different type of devices.
2. This type of cable will be used most of the time and can be
used to:-
Connect a computer to a switch/hub’s normal port.
Connect a computer to a cable/DSL modem’s LAN port.
Connect a router’s WAN port to a cable/DSL modem’s
LAN port.
Cross Cables:-
1. It is usually used to connect same type of devices.
2. A crossover cable can be used to:-
Connect two computers directly.
Connect a router’s LAN port to a switch/hub’s normal
port.
Connect 2 switches/hubs by using normal port in both
switches/hubs.
7
Experiment:- 04
Aim:- Study of various LAN Topologies and their creation using
Network devices, Cables and Computers.
Materials Required:- Network devices, cables and Computers.
LAN Topologies:-
The arrangement of a network that comprises nodes and connecting
lines via sender and receiver is referred to as network topology.
The various network topologies are:-
1. Bus Topology:-
Bus topology are multipoint electrical circuits that can be
implemented using coaxial cable, UTP or STP.
Data transmission is bi-directional, with the attached
devices transmitting in both directions. While generally
operating at a raw data rate of 10 Mbps, actual throughput
is much less.
8
2. Ring:-
The ring architecture is a distributed architecture, with
minimal connectivity and a topology of two links
connected to every node and forms unbroken circular
configurations.
Transmitted messages travel from node to node around
the ring. Each node must be able to recognize its own
address in order to accept messages.
9
3. Star Topology:-
The distinguishing feature of star topology is that all nodes
are joined at a single point.
This single point is called the central node, hub or switch to
which all other devices are attached directly, generally via
UTP or STP.
This topology is frequently used for networks in which
control of the network is located in the central node.
10
4. Mesh Topology:-
In a mesh network topology, each of the network node,
computer and other devices, are interconnected with one
another.
Every node not only sends its own signals but also relays
data from other nodes.
In fact a true mesh topology is the one where every node
is connected to every other node in the network.
This type of topology is very expensive as there are many
redundant connections, thus it is not mostly used in
computer networks.
It is commonly used in wireless networks. Flooding or
routing technique is used in mesh topology.
11
5. Tree Topology:-
Tree Topology integrates the characteristics of Star and
Bus Topology.
Earlier we saw how in Physical Star network Topology,
computers (nodes) are connected by each other through
central hub. And we also saw in Bus Topology, work
station devices are connected by the common cable called
Bus.
After understanding these two network configurations, we
can understand tree topology better.
In Tree Topology, the numbers of Star networks are
connected using Bus.
This main cable seems like a main stem of a tree, and
other star networks as the branches.
It is also called Expanded Star Topology.
Ethernet protocol is commonly used in this type of
topology.
The diagram below will make it clear:-
12
6. Hybrid Topology:-
Before starting about Hybrid topology, we saw that a
network topology is a connection of various links and
nodes, communicating with each other for transfer of
data.
We also saw various advantages and disadvantages of
Star, Bus, Ring, Mesh and Tree topologies.
Hybrid, as the name suggests, is mixture of two different
things. Similarly in this type of topology we integrate two
or more different topologies to form a resultant topology
which has good points (as well as weaknesses) of all the
constituent basic topologies rather than having
characteristics of one specific topology. This combination
of topologies is done according to the requirements of the
organization.
For example, if there exists a ring topology in one office
department while a bus topology in another department,
connecting these two will result in Hybrid topology.
Remember connecting two similar topologies cannot be
termed as Hybrid topology. Star-Ring and Star-Bus
networks are most common examples of hybrid network.
13
Experiment:- 05
Aim:- Configuration of TCP/IP Protocols in Windows and Linux.
Materials Required:- System with Windows and Linux Operating
System.
Configuration of TCP/IP protocol in Windows:-
1. Click Start > Settings > Control Panel.
2. On the control panel, double-click Network and Dial-Up
Connections.
3. Right-click Local Area Connection.
4. Click Properties. If Internet Protocol (TCP/IP) does not appear in the
list, do the following:
a. Click Install.
b. Select Protocol, and then click Add.
c. Select Internet Protocol (TCP/IP).
d. Click OK. This returns you to the Local Area Connection
Properties window.
5. Select Internet Protocol (TCP/IP), and then click on Properties.
6. Select Using the Following IP Address. Check with your network
administrator to determine the correct settings for this tab. If your PC
does not automatically obtain IP and DNS addresses, do the
following:
a. Enter the IP address of your PC (for example, 199.5.83.205).
b. Enter the subnet mask (for example, 255.255.255.0).
14
c. Enter the default gateway (for example, 199.5.83.1).
d. Enter the preferred DNS server (for example, 199.5.100.75).
e. Enter the alternate DNS server (for example, 199.5.100.76).
7. If you are using a Windows Internet Name Server, click
the Advanced tab, select WINS Address, and do the following:
a. Click Add.
b. Enter the primary WINS server (for example, 199.5.83.205).
c. Enter the secondary WINS server (for example, 199.5.83.206).
d. The remaining settings should remain as the defaults.
8. Click OK on the Local Area Connection Properties window. It is not
necessary to restart your PC.
You set up your TCP/IP network as you normally would, set up all hosts
on the same subnet, and test the host name resolution and connectivity.
Experiment-6
16
Aim: Implementation of File and Printer Sharing.
Materials Required: Pc, Printer
Sharing Printer :
Server PC Settings:
1. Install the printer driver
2. Click Start => Devices and Printers => Printers and Faxes.
3. Right-click Brother XXXXXX (your model name) and then
click Printer properties.
4. Open the Sharing tab and check Share this printer.
5. Click OK.
Client PC Settings:
1. Click Start => Control Panel => Network and Internet.
2. Click Network and Sharing center.
3. Click Change advanced sharing settings.
4. Check Turn on network discovery and Turn on file and printer
sharing, click Save changes
5. Click Start => Devices and Printers.
6. Click Add a printer.
7. Click Add a network wireless or Bluetooth printer.
8. Choose a printer and click Next.
9. Click Next.
10. Choose Share this printer so that others on your network can
find and use it and click Next.
11. Click Finish..
17
Select a file, select the Share tab at the top of File Explorer, and then
in the Share with section select Specific people.
If you select multiple files at once, you can share them all in the
same way. It works for folders, too—share a folder, and all files in it
will be shared.
18
Experiment-7
Aim: Designing and Implementing A,B,C Network.
Materials Required: System connecting with variety of networks.
Class A Network:
A class A network number uses the first eight bits of the IP address
as its "network part." The remaining 24 bits comprise the host part of
the IP address . The values assigned to the first byte of class A
network numbers fall within the range 0-127. Consider the IP address
75.4.10.4. The value 75 in the first byte indicates that the host is on a
class A network. The remaining bytes, 4.10.4, establish the host
address. The InterNIC assigns only the first byte of a class A
number. Use of the remaining three bytes is left to the discretion of
the owner of the network number. Only 127 class A networks can
exist. Each one of these numbers can accommodate up to 16,777,214
hosts.
Class B Network:
A class B network number uses 16 bits for the network number and
16 bits for host numbers. The first byte of a class B network number
is in the range 128-191. In the number 129.144.50.56, the first two
bytes, 129.144, are assigned by the InterNIC, and comprise the
network address. The last two bytes, 50.56, make up the host
address, and are assigned at the discretion of the owner of the
network number. Class B is typically assigned to organizations with
many hosts on their networks.
Class C Network:
Class C network numbers use 24 bits for the network number and 8
bits for host numbers. Class C network numbers are appropriate for
networks with few hosts--the maximum being 254. A class C
network number occupies the first three bytes of an IP address. Only
the fourth byte is assigned at the discretion of the network owners.
The first byte of a class C network number covers the range 192-223.
The second and third each cover the range 1- 255. A typical class C
19
address might be 192.5.2.5. The first three bytes, 192.5.2, form the
network number.
Experiment-8
21
In this example since all computers belong to same network, they will
receive all broadcast messages regardless the broadcast messages which
they are receiving are relevant to them or not.
Just like town is divided in sectors, this network can also be divided in
subnets. Once network is divided in subnets, computers will receive only
the broadcasts which belong to them.
Since company has four departments, it can divide its network in four
subnets. Following figure shows same network after Subnetting.
22
Experiment-9
Aim: Installation of ftp server and clients.
Materials Required: Pc connected with a network.
FTP can run in two modes: active and passive. And, it uses two channels
between the client and server: the command channel and the data channel.
The command channel is for sending the commands and responses, and the
data channel is for sending the actual data. As for active and passive
modes, in active mode, the client launches the command channel, and the
server establishes the data channel. In passive mode, both the command
and data channels are established by the client.
Most organizations prefer passive mode. In this mode, the client initiates
both channels; therefore, the organization has little or no alterations to
make on the client firewall. The connection is from the client to the server,
and the data will be return traffic to the client. Overall, organizations can
allow their users (clients) to connect to FTP servers without compromising
network security.
23
Primarily, the command channel is opened by the client to the FTP
server on port 21. The client also opens two random, unprivileged ports on
the client (typically a port greater than 1023). We’ll call the first port P and
the second port P+1. The FTP client initiates the connection to the server
by sending a PASV command. The client connects to the server from port
P to server port 21 with the PASV command. The server then opens
another unprivileged port Q (any port greater than 1023) and sends the port
information back as a reply to the PASV command. Now the client
initiates the connection from port P+1 to port Q on the server to start the
data transfer.
Steps:
1. The client contacts the server using the PASV command on port 21.
2. The server replies using port 2000. Here, port 2000 is the port the
server will be listening to for the data connection.
3. The client initiates the connection from port 1025 to 2000 (on the
server).
4. The server sends back the ACK (acknowledgement).
24
Experiment-10
When using the wizard method, the first task to perform requires the
selection of „Set up a new connection or network‟ option from the main
window; this is shown in Figure
1. Go to Start Menu
25
2. Click on Search -enter the word “ad-hoc”
3. Click “Set up an ad-hoc (computer-to-computer) network”
4. This brings up the window: Set up a Wireless ad-hoc network;
Click Next
5. Create a name for the ad-hoc network (ex. Type Ella). This must be
the same on Both computers.
6. Set security type to “No authentication (Open)”
7. Leave Security Key blank
8. Click box “Save this network”
9. Click Next. The prompt will say Setting up the Type Ella network”
10. The next screen should say “The Type Ella network is ready to use
26
Dynamic Destination-Sequenced Distance-Vector Routing Protocol
(DSDV)
In this algorithm each node exchanges its neighbor table periodically
with its
neighbours. Changes at one node in the network propagate slowly
through the
network. Each node maintains a table which stores next hope, cost
metric toward
Experiment-11
Aim: To install any open source packet capture software like packet tracer
etc.
Once the downloading is finished, open the folder that contains the
downloaded file.
The first screen of the installation wizard presents the license agreement.
Select the "I accept the agreement" option and click the "Next" button.
27
The next screen provides an option to customize the installation directory.
By default, Packet Tracer is installed in the "Program File" folder of the
Windows partition. If you want to install Packet Tracer in another folder,
click the Browse button and select the folder in which you want to install
Packet Tracer.
28
Keep default selections and click the Next button.
29
Experiment-12
The local loop is the dedicated link between the subscriber terminal and
the switch. In cities and towns, the local loop uses twisted pair as the
transmission medium because the distance between the switch and the
subscriber terminal generally will be less than 5 km. Because the
subscriber density is high in cities and towns, the cost of installing a switch
for subscribers within a radius of 5 km is justified. In remote and rural
areas, the subscriber density will be less, the number of calls made by the
subscribers will not be very high, and the areas are separated by long
distances from the nearby towns. As a result, laying a cable from one town
to another is not cost effective. Installing a switch to cater to a small
number of subscribers is also prohibitively costly.
30
Wireless local loops can be in two configurations. A radio base station
will be connected to the switch. The base station is generally located in a
town at the same premises as the switch. A number of remote stations
communicate with the base station through radio. Each remote station can
be installed in an area, and it can support anywhere between 1 and 32
telephones. The distance between the base station and each remote
generally can be up to 30 km. A base station can provide telephone
facilities to subscribers in a radius of 30 km. This configuration is used
extensively for providing telephone facilities in rural and remote areas.
31
Experiment-13
32
1 Acquire a wireless router. There are a variety of factors that will
determine which router is best for you. These include distance,
interference, transfer speed, and security.
Experiment-14
33
Aim: To configure Adhoc Networks.
34
8. Enter the Network name such as "UplinkNetwork".
9. Select the Security WAP (or WEP).
10. Enter the Security Key or password.
11. Check Save this network check box.
12. Click Turn on Internet connection sharing.
Experiment-15
35
2. Connect the router to a power outlet and switch it on. PoE-compatible
devices will not require a power outlet—just an Ethernet cable. Also, some
devices turn on automatically as soon as they are connected to a power
source.
Step-2: Deploy the Access Point.
1. Find a good spot for the device.
If the local area network has other wireless devices, such as a router, place
the access point in a location where its wireless signal would have
minimum or no interference with other wireless devices within the LAN
and where it would provide effective coverage with respect to the
premises.
36
Step 3. Connect the Cables. There are several cables that the user will need
to connect.
1. Use an Ethernet cable to connect the access point to the router. The
cable should be inserted into a LAN port on the router and into the
main Ethernet port on the access point. This introduces the access
point to the router’s created local area network.
2. Use an Ethernet cable to connect the router to the computer. The
cable should be inserted into a LAN port on the router and into the
Ethernet port on the computer (typically there is only one). This puts
the computer onto the network and allows direct access point and
LAN management.
3. If it is necessary to provide access to the Internet over the local area
network, use an Ethernet cable to connect the router to the modem.
Insert the cable into the main Ethernet port on the router and into the
Ethernet port on the modem (typically there is only one).
If any basic setup is necessary either for the access point or for the network
in general, the computer or the user manual should provide instructions on
what specific steps to take.
Users can also change optional and advanced router settings by connecting
to the router via the computer using the IP address 192.168.0.1 or
192.168.1.1 (or the address noted in the manual).
Step-5:The setup is complete! User can now enjoy expanded wireless
coverage and improved wireless signal with the newly deployed access
point!
38