0% found this document useful (0 votes)
42 views15 pages

Networking Assignment

The document compares different network topologies and network devices. It discusses the bus, star, ring, tree, hybrid and mesh network topologies and describes their advantages and disadvantages. It also compares hubs, switches and routers. Hubs operate at the physical layer and broadcast data to all ports. Switches operate at the data link layer and can filter and forward data to specific ports. Routers connect different networks and forward data between them.

Uploaded by

abcd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views15 pages

Networking Assignment

The document compares different network topologies and network devices. It discusses the bus, star, ring, tree, hybrid and mesh network topologies and describes their advantages and disadvantages. It also compares hubs, switches and routers. Hubs operate at the physical layer and broadcast data to all ports. Switches operate at the data link layer and can filter and forward data to specific ports. Routers connect different networks and forward data between them.

Uploaded by

abcd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Compare different Network Topologies

Types of Network Topologies


Network topology goes beyond logical or physical arrangement of devices. This brings us to
the various types of network topologies available today. These topologies are Bus, Star,
Ring, Tree, Hybrid and Mesh network topologies. Let us take a closer look at each of these
types mentioned. 

Bus Topology – Advantages and Disadvantages


 

Bus topology has a network arrangement where nodes make use of a single communication
line for data transmission.
 

Many networks at the beginning of computer networking era made use of this topology due
to easy implementation. 
Advantages

 Since there is a single communication line, means the same medium is shared.
Therefore, the major advantage of using this topology is its simplicity.
 Easy to setup and extend.
 Less costly. Less cabling needs.

Disadvantages

 On the other hand, having a single communication line for data transmission
makes it easier for collision to occur, which is seen as a disadvantage of using
this network topology.
 If the single network cable has a problem or disconnection, the whole network
breaks.
 Difficult to identify a problem.
 All devices receive all signals from every other host. This is not efficient.

Star Topology – Advantages and Disadvantages


 

The star network topology is one of the most commonly used topologies today because of
its simplicity and efficiency.
In this kind of topology, a centralized node is located at the core of the network topology, in
which all the other nodes must communicate through.
This topology is mostly used in homes and offices today. For example, the classic Ethernet
LAN networks are using the Star Topology. There is an Ethernet Switch (centralized node)
on which all computers and network devices are connected to. 
Advantages

 Easy to install and implement with wiring etc.


 Easy to troubleshoot and detect problems in the network.
 If one device fails, it does not affect the other devices in the network.
 You can easily add or remove devices without affecting the rest of the network.
 Centralized management and monitoring through the central switch/hub.

Disadvantages

 The main disadvantage of using this topology is that it has a single point of
failure, i.e. when the central switch node is down, there will be a break in
communication for all connected devices.
 More cabling is needed since you connect each individual devices to the central
node.
 Performance of the whole network depends on the performance of the central
node.

Ring Topology – Advantages and Disadvantages


 

Ring topology presents devices that are arranged in a circular form or just like a ring.
Although the layout of the devices is very similar to bus a topology, ring topology is a closed
loop.
Ring networks are not used much nowadays.
Advantages

 The advantage of using this network topology is the ability to have fast network
throughput.
 Less packet collisions.
 High speed transfers.
 Token is used between nodes thus making this performing better than bus
topology.

Disadvantage

 The disadvantage is the point of failure, as a single node can break the
transmission of data on the network.

Hybrid Topology – Advantages and Disadvantages


 

This network topology is basically made up of several topologies i.e. a combination of two
or more topologies, which could be bus, star, ring, etc.
Advantages
 In terms of the advantages of using this kind of topology, we find that it has a
high level of fault tolerance, which makes it reliable and flexible.
 Scalable as you can add new nodes easily.
 You can design it in such a way as to use the best features of various other
topologies.

Disadvantages

 The disadvantages include things such as high cost and complexity of


maintenance. This topology is used in real-life where scalability and high
performance is important, for example Internet Service Providers.
 Costly infrastructure.

Tree Topology – Advantages and Disadvantages


 

This network topology is ideal for when you have a device acting as the root device on the
network.
This topology works with the design of a star and bus topology combined. This has to do
with linking star topologies together to form a single network topology, which is linked
using a bus topology.
The disadvantage of using this topology is the multiple points of failures that are created, i.e.
both the star and bus topology needs to be up at all times.  

Mesh Topology – Advantages and Disadvantages


 

Mesh network topologies create a scenario where there is connection to and from each
node that is connected on the network. That is, all network nodes are interconnected
between them just like a mesh.
Mesh topologies are used in mission critical network environments such as hospitals or
financial institutions, where availability is of utmost importance.
Advantages

 The main advantage of this type is fault tolerance, which is because of the
redundant links that are created.
 If one device/node in the network fails, the rest of the devices can work
normally without interruption.
 Adding more devices in the network does not affect the rest of the devices.

Disadvantages

 The obvious disadvantage of using this type of network is the high cost of
implementation.
 Implementation and maintenance of such a topology is time consuming and
difficult.
 Cabling cost is high.

Compare Network devices. i.e. Hub, Switch,


Router
Hubs
Hubs are networking devices operating at a physical layer of the OSI model that are used to connect
multiple devices in a network. They are generally used to connect computers in a LAN.
A hub has many ports in it. A computer which intends to be connected to the network is plugged in
to one of these ports. When a data frame arrives at a port, it is broadcast to every other port,
without considering whether it is destined for a particular destination device or not.
 

Features of Hubs

 A hub operates in the physical layer of the OSI model.


 A hub cannot filter data. It is a non-intelligent network device that sends message to all
ports.
 It primarily broadcasts messages. So, the collision domain of all nodes connected
through the hub stays one.
 Transmission mode is half duplex.
 Collisions may occurs during setup of transmission when more than one computers
place data simultaneously in the corresponding ports.
 Since they lack intelligence to compute best path for transmission of data packets,
inefficiencies and wastage occur.
 They are passive devices, they don’t have any software associated with it.
 They generally have fewer ports of 4/12

Network Switch
Switches are networking devices operating at layer 2 or a data link layer of the OSI model. They
connect devices in a network and use packet switching to send, receive or forward data packets or
data frames over the network.
A switch has many ports, to which computers are plugged in. When a data frame arrives at any port
of a network switch, it examines the destination address, performs necessary checks and sends the
frame to the corresponding device(s).It supports unicast, multicast as well as broadcast
communications.
 
 

Features of Switches

 A switch operates in the layer 2, i.e. data link layer of the OSI model.
 It is an intelligent network device that can be conceived as a multiport network bridge.
 It uses MAC addresses (addresses of medium access control sublayer) to send data
packets to selected destination ports.
 It uses packet switching technique to receive and forward data packets from the source
to the destination device.
 It is supports unicast (one-to-one), multicast (one-to-many) and broadcast (one-to-all)
communications.
 Transmission mode is full duplex, i.e. communication in the channel occurs in both the
directions at the same time. Due to this, collisions do not occur.
 Switches are active devices, equipped with network software and network management
capabilities.
 Switches can perform some error checking before forwarding data to the destined port.
 The number of ports is higher – 24/48.

 
What is a router?
A router is a device that connects two or more packet-switched networks or sub-networks. It serves
two primary functions: managing traffic between these networks by forwarding data packets to their
intended IP addresses, and allowing multiple devices to use the same Internet connection.
There are several types of routers, but most routers pass data between LANs (local area
networks) and WANs (wide area networks). A LAN is a group of connected devices restricted to a
specific geographic area. A LAN usually requires a single router.
A WAN, by contrast, is a large network spread out over a vast geographic area. Large organizations
and companies that operate in multiple locations across the country, for instance, will need separate
LANs for each location, which then connect to the other LANs to form a WAN. Because a WAN is
distributed over a large area, it often necessitates multiple routers and switches.
How does a router work?
Think of a router as an air traffic controller and data packets as aircraft headed to different airports
(or networks). Just as each plane has a unique destination and follows a unique route, each packet
needs to be guided to its destination as efficiently as possible. In the same way that an air traffic
controller ensures that planes reach their destinations without getting lost or suffering a major
disruption along the way, a router helps direct data packets to their destination IP address.
In order to direct packets effectively, a router uses an internal routing table — a list of paths to
various network destinations. The router reads a packet's header to determine where it is going,
then consults the routing table to figure out the most efficient path to that destination. It then
forwards the packet to the next network in the path.
 

 
 

Difference between Hubs and Switch

S.NO HUB SWITCH

While switch is operated on Data link layer of


1. Hub is operated on Physical layer of OSI model. OSI Model.

While switch is a Unicast, multicast and


2. Hub is a broadcast type transmission. broadcast type transmission.

3. Hub have 4/12 ports. While switch can have 24 to 48 ports.

While in switch, different ports have own


4. In hub, there is only one collision domain. collision domain.

While switch is a full duplex transmission


5. Hub is a half duplex transmission mode. mode.

6. In hub, Packet filtering is not provided. While in switch, Packet filtering is provided.

7. Hub cannot be used as a repeater. While switch can be used as a repeater.

Hub is not an intelligent device that sends While switch is an intelligent device that
message to all ports hence it is comparatively sends message to selected destination so it is
8. inexpensive. expensive.

Hub is simply old type of device and is not While switch is very sophisticated device and
9. generally used. widely used.

Hacking of systems attached to switch is little


10. Hacking of systems attached to hub is complex. easy.

CAT5 Cable
Alternatively known as an Ethernet cable or LAN cable, a Cat 5 or category 5 is a network cable that
consists of four twisted pairs of copper wire terminated by an RJ-45 connector. The picture shows an
example of a Cat 5 cable.
Cat 5 cable is used in home and business networks, providing data transmission speeds of up to
100 Mbps. The maximum recommended length of a Cat 5 cable is 100 meters. Exceeding this length
without the aid of a bridge or other network device could cause network issues, including data
packet loss and data transmission speed degradation.
RJ 45 Connector
A registered jack (RJ) is a standardized physical network interface for connecting
telecommunications or data equipment. The physical connectors that registered jacks use are mainly
of the modular connector and 50-pin miniature ribbon connector types. The most common twisted-
pair connector is an 8-position, 8-contact (8P8C) modular plug and jack commonly referred to as
an RJ45 connector.
 
Crimping Tool
A crimping tool is a device used to conjoin two pieces of metal by deforming one or both of them to
hold each other. The result of the tool's work is called a crimp. An example of crimping is affixing a
connector to the end of a cable. For instance, network cables and phone cables are created using a
crimping tool (shown below) to join RJ-45 and RJ-11 connectors to both ends of phone or Cat
5 cable.

To study crimping: RJ-45, RJ-11, Cross-over


Cable and Create a Network cable using RJ45
connectors

Purchasing Ethernet cables can be quite expensive and pre-made lengths are not always the length
you need.  Making Ethernet cables is easy with a box of bulk Category 5e Ethernet cable and RJ-45
connectors that are attached to the cut ends of your preferred cable length.
  

(You may also use Category 6 or CAT6 cabling which has higher performance specifications and is
about 20% more expensive than CAT5e.)
 

RJ45 Crimpable Connectors for CAT-5e or RJ45 Crimpable Connectors for CAT-6
 

There are two kinds of Ethernet cables you can make, Straight Through and Crossover.
 

STRAIGHT THROUGH Ethernet cables are the standard cable used for almost all purposes, and are
often called "patch cables". It is highly recommend you duplicate the color order as shown on the
left. Note how the green pair is not side-by-side as are all the other pairs. This configuration allows
for longer wire runs.
 

CROSSOVER CABLES - The purpose of a Crossover Ethernet cable is to directly connect one computer
to another computer (or device) without going through a router, switch or hub.
Here's how to make a standard cable:
Step 1: Cut into the plastic sheath about 1 inch (2.5 cm) from the end of the cut cable. The crimping
tool has a razor blade that will do the trick with practice.
 

Step 2: Unwind and pair the similar colors.


 

 
Step 3: Pinch the wires between your fingers and straighten them out as shown. The color order is
important to get correct. 
 

Step 4: Use scissors or crimper to make a straight cut across the 8 wires to shorten them to  1/2
Inch (1.3 cm) from the cut sleeve to the end of the wires.  
 

Step 5: Carefully push all 8 unstripped colored wires into the connector. Note the position of the
blue plastic sleeve. Also note how the wires go all the way to the end. Carefully push all 8 unstripped
colored wires into the connector. Note the position of the blue plastic sleeve. Also note how the
wires go all the way to the end.
 

Step 6: CRIMPING THE CABLE ... carefully place the connector into the Ethernet Crimper and cinch
down on the handles tightly. The copper splicing tabs on the connector will pierce into each of the
eight wires. There is also a locking tab that holds the blue plastic sleeve in place for a tight
compression fit. When you remove the cable from the crimper, that end is ready to use.

To study the different expansion slots of a


motherboard, set the NIC to expansion slot and to
install the driver
Throughout the generation of computing, various expansion motherboard slots have been used on
the system board. Now, there are different types of slots on the motherboard introduced in order
to expand and improve its functionality.
Since computers generally come with a basic set of input and output devices when assembling. Due
to this reason, computers have expansion slots because many desktop PCs need to be upgraded or
customized with extra hardware & features to carry out specific tasks that are not provided in the
primary PC.
In the beginning, the usage of expansion slots was a lot because the motherboards were not as
complete as they are now, and specific peripherals were needed. In fact, newer motherboards have
enough options for expansion slots and features built right into the motherboard, eliminating the
need for many cards additional expansion units.
And today you are in the right place because, in this article, you will discover the “All Types of
Motherboard Slots” below:

Different Types of Slots on Motherboard


You may notice, most motherboards have PCIe slots, but this is not the case before. If you come
across an old motherboard, you will appreciate that it does not have this type of slot, but somewhat
different ones. Let’s get to know the different types of slots on the motherboard.
1. PCI Slots
A PCI slot is an interface on the motherboard that allows you to put in a device that requires power,
famous for coming with the first Intel Pentiums in 1993.
The PCI stands for ‘peripheral components interconnect’, a standard computer bus to
connect peripheral devices directly to your motherboard. Its name comes from its physical location
between two other elements and from the electrical signals it sends and receives.
A PCI slot is an interface on the motherboard that allows you to put in a device that requires power,
famous for coming with the first Intel Pentiums in 1993.
The PCI stands for ‘peripheral components interconnect’, a standard computer bus to
connect peripheral devices directly to your motherboard. Its name comes from its physical location
between two other elements and from the electrical signals it sends and receives.
2. PCIe Slots
PCIe or PCI Express slots are the most common slots on the motherboard that optimize the
communication with the microprocessor.
Well, it was a milestone in the history of computing, becoming a standard that has not yet been
replaced but has been improved. It began to be used in 2005 developed by Intel, gradually replacing
the rest of the expansion slot models.
When you need to mount a TV Tuner Card, Power Supply, Video Cards, or Storage Drives to the PC,
PCI Express Slots will be used for that purpose. There might be several numbers of PCIe slots on the
motherboard.
 

3. PCI-X Slots
As a presence of the PCI slot, the PCI-X slot was also developed. You should not confuse these
acronyms with PCI Express. The ‘X’ in this case refers to ‘expanded’.
One PCI-X slot on the motherboard is for the PCI Express (PCI-E)-based graphics card connected to
the CPU via a dedicated 16x or 32x direct link to provide high bandwidth and low latency. The
remaining slots are used for other functions as follows: –

 PCMCIA Card,
 Wireless LAN Card,
 Bluetooth Card.

The motherboard may not have any slots left available if it has two PCI slots used by a RAID
controller or another function.
Also, this type of slot isn’t widely used in the range of desktop motherboards. They are  more
oriented to server or workstation environments since they allowed higher bandwidths than
conventional PCI.
 

4. AGP Slots
The acronym AGP stands for ‘Advanced/Accelerated Graphics Port’, and they are mainly designed to
support video/graphic cards with high bandwidth requirements. The main advantage of these slots
type is that they support a simple direct connection between the CPU and the motherboard without
any connectors or cables needed.
AGP slots are a type of motherboard used for personal computers which were popular in the early
2000s. Initially, AGP slots were designed as an upgrade to plain PCI slots. Now, this slot is the
successor to the original PCI.
AGP was the mainstream until the successor standard PCI Express was put into practical use. It first
appeared around 1997, and the version was released up to AGP 3.0, but due to the limit of transfer
speed, it was almost replaced by the PCI Express standard around 2005.
The appearance of a new evolution known as PCI-Express provides more excellent performance in
terms of frequency and bandwidth. Thus, the leading manufacturers of graphics cards, such as ATI
and Nvidia, have presented fewer and fewer products for this port.
5. ISA Slots
ISA expansion slots are the oldest types of slots on the motherboard. ISA stands for ‘Industry
Standard Architecture’ because no other slots were invented at that time. The components designed
to install on ISA slot were huge in size and among the first slots to be used in personal computers.
Network cards, video cards, and other extended hardware are installed with the help of ISA slots.
Today, Modern motherboards no longer have ISA slots. These slots were included until the first
models of the Pentium III microprocessor, then it was replaced in 2000 by the PCI slot.

6. VESA Slots
VESA stands for ‘Video-Electronics Standards Association’, it is a group of monitor and graphics card
manufacturers that establish video bus and display standards. The aim of VESA slots is to optimize
the video operations.
Although, VESA slots were only used in the PCs for a little amount of time. VESA Company
introduced these slots but after some time, ISA Bus replaced VESA.

7. RAM Slots
The RAM slot on the motherboard determines the type of RAM your computer can utilize.
Depending on the motherboard, typically numbering 2 or 4 (sometimes more on high-end
motherboards), usually located at the motherboard’s upper-right corner.
Although the RAM slots are the last thing that comes to your mind when you’re purchasing
your computer, it would be good to check that out too. Sometimes a motherboard can be a bit
older, meaning that you can’t plug in the latest RAM modules in it.
 

Set the NIC to expansion slot and to install the driver.

Before getting started

1. Difficulty of installing a PC network card should be a 4 out of 5.


2. Write down important information from the top or bottom of the card such as the
Model Number, Serial Number, and specifications.
3. Ensure you are familiar with ESD and its potential dangers.
4. When physically installing the network card, ensure the computer is powered down and
unplugged.

Set jumpers
Before installing the network card, verify that the jumpers are properly set. Today, most computers
do not have jumpers for a network card installation and allow the network card to be set up and
configured through software or plug and play. If available, we recommend it be used.

Install into expansion slot


Today, network cards connect to the PCI slot. Locate an available expansion slot in the computer and
gently push the card into the slot until it snaps into place. Once the card is inserted, place a screw
into the top of the card to hold the card into position.

Attach internal cables


Most network cards will not include internal cables, but you may find Wake-on-LAN cable, which
wakes the computer when network activity is present. If cables are included with the network card
and your computer supports these cables, install the cables now.
The Wake-on-LAN cable must also be a supported feature of the computer motherboard. The cable
will connect to the Wake-on-LAN or similar connection on the motherboard. Consult the
motherboard documentation or manufacturer for additional information if this is a supported
feature or where the cable should be connected.

Attach external cables


Once the network card is physically installed, replace the case panel and connect the keyboard,
mouse, monitor, power, and network cables. Then, connect the other end of the network cable to
the network outlet on a hub, switch, or router.

Software setup
Step 1
Insert the adapter onto your computer.
 Step 2
Right click Computer, and then click Manage.
Step 3
Open Device Manager. Right click the adapter and then click Update Driver Software....
Step 4
Click Browse my computer for driver software.
Step 5
Click  Let me pick from a list of device drivers on my computer.
Step 6
Highlight Show All Devices and click Next.
Step 7
Click Have Disk.
 Step 8
Click Browse.
Step 9
Point to the inf file in the driver folder, and then click Open.
 Note: Please click start button, right click Computer and go to properties to confirm operating
system and system type of your computer.
Step 10
Click Next.
Step 11
Click Install this driver software anyway.
 Step 12
Click Close.

To make a peer-to-peer Network System


Hardware You Will Need
1.  At least two computers.
2.  Network adapters for each computer.
3.  If you have 10Base-T adapters, and only two computers, you can directly connect one  computer
to the other with a crossover cable.
4. If you have 10Base-T adapters and more than two computers you will need a  10Base-T hub to
connect them.
Adding Your Network Adapter
1.  With the computer off, install the NIC card in an open bay (Slot 1 is recommended)
2.  Start the Computer
3. Open up the Control Panel
4. Click on Add New Hardware
5. Click the Next button
6. You can either have Windows95 search for the adapter by selecting YES or select NO to manually
enter the adapter
7. Click the Next button
8. If you selected NO, you will need to manually select an adapter.
9. If you have a driver diskette for your network adapter, use it to install the appropriate driver for
your NIC card
7. Reboot if requested
Adding the Protocol Stack
1. You will need to decide which protocol stack you want to use for your local network.
2. If you are going to be totally isolated and never dial-up to the Internet, you could use NetBEUI or
IPX.
3. If you are going to dial to the Internet, you can select TCP/IP and just assign dummy IP addresses
for your local LAN. This way you only need to install one protocol stack. You can also have NetBEUI
or IPX as well as TCP/IP installed. NetBEUI or IPX  would be used for your local LAN and TCP/IP for
the Internet Dial-Up.
4. Open the Control Panel
5. Double-click on the Network icon
6. From your network adapter detection in previous table, you should have Client for Microsoft
Networks, Client for Netware, your Adapter, IPX and NetBEUI already installed.
7. If you just want NetBEUI, highlight and remove IPX or vice versa.
8. If you want to add TCP/IP, click on the Add button
9. Click on Protocol
10. Click on Microsoft
11. Click on TCP/IP
Configuring the Network
1.  Under Control Panel / Network / Identification make sure each Computer has a unique name.
2.  Make sure that the Workgroup name is the SAME for all computers.
3.  Do not have any spaces in either the Computer or Workgroup names. Keep them simple.
4.  If you have TCP/IP installed, select different IP address with the same subnet mask. You do not
need to fill in WINS, Gateway, or DNS IP addresses.
5.  Click on the File and Print Sharing button and check off whether you want share Files or Printers.

Configuring Windows clients for TCP/IP involves installing and configuring the TCP/IP network
protocol.
The following instructions are based on the Configuring TCP/IP function of Windows XP.

1. Click Start > Settings > Control Panel.
2. On the control panel, double-click Network and Dial-Up Connections.
3. Right-click Local Area Connection.
4. Click Properties. If Internet Protocol (TCP/IP) does not appear in the list, do the
following:
a. Click Install.
b. Select Protocol, and then click Add.
c. Select Internet Protocol (TCP/IP).
d. Click OK. This returns you to the Local Area Connection Properties window.
5. Select Internet Protocol (TCP/IP), and then click on Properties.
6. Select Using the Following IP Address. Check with your network administrator to
determine the correct settings for this tab. If your PC does not automatically obtain IP
and DNS addresses, do the following:
a. Enter the IP address of your PC (for example, 199.5.83.205).
b. Enter the subnet mask (for example, 255.255.255.0).
c. Enter the default gateway (for example, 199.5.83.1).
d. Enter the preferred DNS server (for example, 199.5.100.75).
e. Enter the alternate DNS server (for example, 199.5.100.76).
7. If you are using a Windows Internet Name Server, click the Advanced tab, select WINS
Address, and do the following:
a. Click Add.
b. Enter the primary WINS server (for example, 199.5.83.205).
c. Enter the secondary WINS server (for example, 199.5.83.206).
d. The remaining settings should remain as the defaults.
8. Click OK on the Local Area Connection Properties window. It is not necessary to restart
your PC.

Configuring Windows clients for TCP/IP involves installing and configuring the TCP/IP network
protocol.
The following instructions are based on the Configuring TCP/IP function of Windows XP.

1. Click Start > Settings > Control Panel.
2. On the control panel, double-click Network and Dial-Up Connections.
3. Right-click Local Area Connection.
4. Click Properties. If Internet Protocol (TCP/IP) does not appear in the list, do the
following:
a. Click Install.
b. Select Protocol, and then click Add.
c. Select Internet Protocol (TCP/IP).
d. Click OK. This returns you to the Local Area Connection Properties window.
5. Select Internet Protocol (TCP/IP), and then click on Properties.
6. Select Using the Following IP Address. Check with your network administrator to
determine the correct settings for this tab. If your PC does not automatically obtain IP
and DNS addresses, do the following:
a. Enter the IP address of your PC (for example, 199.5.83.205).
b. Enter the subnet mask (for example, 255.255.255.0).
c. Enter the default gateway (for example, 199.5.83.1).
d. Enter the preferred DNS server (for example, 199.5.100.75).
e. Enter the alternate DNS server (for example, 199.5.100.76).
7. If you are using a Windows Internet Name Server, click the Advanced tab, select WINS
Address, and do the following:
Click Add.
a.
Enter the primary WINS server (for example, 199.5.83.205).
b.
Enter the secondary WINS server (for example, 199.5.83.206).
c.
The remaining settings should remain as the defaults.
d.
8. Click OK on the Local Area Connection Properties window. It is not necessary to restart
your PC.

A loopback test is the process of sending digital data streams from a source back to the same point
without any intentional modifications. It’s generally performed to determine whether a device works
properly and whether there are failing nodes in a network.
In order to test your local machine, an address is reserved that always refers to your local host
rather than any other hosts on a network. For IPv4, this class A network address is 127.0.0.1. 
Command:
                ping 127.0.0.1 -t

You might also like