Cnprac 1
Cnprac 1
Cnprac 1
no:211100107039
Practical-01
Date:14/08/20223
(img: Repeater)
a. Digital Repeater
b. Analog Repeater
b. Wireless Repeaters:
c. Wireless Repeaters
d. Radio Repeater
a. Local Repeaters
b. Remote Repeaters
2. Hub:
The main purpose of a hub is to connect all present network devices together on a
predefined internal network. Hub is a device consisting of multiple ports that accept Ethernet
connections from network devices. Hub is not considered to be an intelligent one because it
doesn't filter any data present or has no intelligence to assume as to where the data is actually
supposed to be sent, and that’s the reason because the only thing a hub knows is that when
a device is actually connected to one of its ports. So whenever a data packet arrives at one of
the ports, it is copied to all the other ports. So all the devices present on that hub see that
data packet. So again, when a data packet comes into one port, the hub will just rebroadcast
that data to every port that has a device connected to it.
(img: Hub)
1. Passive hub
2. Active hub
3. Intelligent hubs
A hub works at the physical layer of the OSI model. Hubs are manufactured by Vishal
Industries, Jashan Auto Industries, Jay Shakti Enterprise, Progressive Gear Industries (P) Ltd,
etc.
3. Gateway:
4. IOT Gateway
5. Media Gateway
Gateway work as network layer. Gateways are also called protocol converters and
can operate at any network layer.
4. Switch:
The switch can perform error checking before forwarding data, which makes it very
efficient as it does not forward packets that have errors and forward good packets
selectively to the correct port only.
(img: switch)
A switch is a data link layer device. Switches are manufactured by ADTRAN, Aerohive,
Alaxala Networks, Alcatel-Lucent Enterprise, Allied Telesis, Arista Networks. Avaya - acquired
Nortel, Buffalo Technology.
Types of Switch:
1. Layer 2 switches
2. Layer 3 switches
3. PoE switches
4. Gigabit switches
5. Rack-mounted switches
6. Desktop switches
5. Router:
A router is a device like a switch that routes data packets based on their IP addresses.
(img: Router)
The router is mainly a Network Layer device. Routers normally connect LANs and
WANs and have a dynamically updating routing table based on which they make decisions on
routing the data packets. The router divides the broadcast domains of hosts connected
through it. Cisco Enterprise Routers and Switching can change your network to become more
protected with the high-security protocol. The router is Rs.2000 in India.
6. Bridge:
(img: Bridge)
The bridge is data link layer. A bridge in a computer network is a device used to
connect multiple LANs together with a larger Local Area Network (LAN). Digi key I the
manufacture company of bridge devices. The bridge devices prices is $45.
Types of bridge:
1. Transparent bridge
2. Source routing bridge
3. Translational bridge
4. Transparent Bridge
5. Source Routing Bridge
6. Translational Bridge
7. Server:
A Server is a program or a device that provides functionality for called clients which
are other programs or devices. This architecture is called the client-server model.
(Img: Server)
The server is session layer. 3Uheatsink is manufacturing the server model. Server
price starting at ₹ 98,454.34.
Types of servers:
1. Application Server
2. Catalog Server
3. Communication Server
4. Computing server
5. Fax server
6. File server
7. Game server
8. Mail server
9. Print server
10. Proxy server
11. Web server
8. NIC:
NIC stands for Network Interface Card NIC is additionally called Ethernet or physical
or network card. NIC is one of the major and imperative components to associate a gadget
to the network.
It is shown on layer 2 of the OSI show which is an information interface layer that
employs MAC address.
Common manufacture of NIC is intel, Realtek. NIC Ethernet Card price ₹ 16,650.00.
Practical-02
Date:
Aim: Study of different types of network cables and practically implement the cross-wired
cable and straight through cable using crimping tool.
Materials and Tools Needed:
1. Ethernet cable (Cat5e or Cat6)
2. RJ-45 connectors (8P8C)
3. Crimping tool
4. Wire stripper or cutter
5. Cable tester (optional but recommended)
Procedure:
Step 1 – Spool out your length of cable
Pull out enough cable to run the length required for your installation. Be sure to allow enough to
trim several inches off each end. It’s always better to go a little longer than to not have enough
cable!
This cable contains a conductor, insulator, braiding, and sheath. The sheath covers the
braiding, the braiding covers the insulation, and the insulation covers the conductor.
Sheath
This is the outer layer of the coaxial cable. It protects the cable from physical damage.
Braided shield
This shield protects signals from external interference and noise. This shield is built from the
same metal that is used to build the core.
Insulation
Insulation protects the core. It also keeps the core separate from the braided shield. Since
both the core and the braided shield use the same metal, without this layer, they will touch
each other and create a short-circuit in the wire.
Conductor
The conductor carries electromagnetic signals. Based on conductor a coaxial cable can be
categorized into two types; single-core coaxial cable and multi-core coaxial cable.
A single-core coaxial cable uses a single central metal (usually copper) conductor, while
a multi-core coaxial cable uses multiple thin strands of metal wires. The following image
shows both types of cable.
Twisted pair is a copper wire cable in which two insulated copper wires are twisted around
each other to reduce interference or crosstalk. It uses 10BASE-T, 100BASE-T, and some other
newer ethernet variants. It uses RJ-45 connectors.
A twisted pair cable usually contains two or more conducting wires either shielded by an
insulator or not and, further these twisted pairs of wires are coated for protection from any
damage.
• Shielded Twisted Pair (STP) Cable: In STP the wires are covered by a copper braid
covering or a foil shield, this foil shield adds a layer that protects it against interference
leaking into and out of the cable. Hence, they are used for longer distances and higher
transmission rates.
• Unshielded Twisted Pair (UTP) Cable: Unshielded twisted pair cable is one of the most
commonly used cables in computer networks at present time. UTP consists of two
insulated copper wires twisted around one another, the twisting of wires helps in
controlling interference.
Fiber optic cables use optical fibers which are made of glass cores surrounded by several
layers of cladding material usually made of PVC or Teflon, it transmits data in the form of light
signals due to which there are no interference issues in fiber optics. Fiber optics can transmit
signals over a very long distance as compared to twisted pairs or coaxial cables. It uses
10BaseF, 100BaseFX, 100BaseBX, 100BaseSX, 1000BaseFx, 1000BaseSX, and 1000BaseBx
ethernet variants. Hence, it is capable of carrying information at a great speed.
An optical fiber consists of a core and a cladding, chosen for their total internal reflection due
to the difference in refractive index between the two. In real optical fibers, the cladding is
usually covered with a layer of acrylate or polyimide polymer. The coating protects the fiber
from damage and several layers of protective sheathing, depending on the application, are
added to form the cable.
• SMF (Single-mode fiber)- it uses one single ray of light to transmit data, it is used for
long-distance transmission.
• MMF (Multi-mode Fiber)- it uses multiple light rays to transmit data, it is
comparatively less expensive.
Types of Connectors Used: Mainly these four connectors are used with fiber optic cable:
• ST (Straight-tip) Connector
• FC (Fiber Channel) Connector
• SC (Subscriber) Connector
• LC (Lucent) Connector
Practical-03
Date:
1. PING:
The "ping" command is a network utility tool used to test the reachability of a host on an
Internet Protocol (IP) network and measure the round-trip time for packets sent from your
computer to the target host and back. It is available on most operating systems, including
Windows, macOS, and various Linux distributions.
2. NETSTAT:
3. TRACERT:
The tracert command, also known as traceroute on Unix-like systems (Linux, macOS), is a
network diagnostic tool used to trace the route that packets take from your computer to a
destination host or IP address. It shows a list of all the intermediate routers (hops) that the
packets pass through to reach the destination, along with the round-trip times for each hop.
This information is useful for diagnosing network connectivity issues and understanding the
path packets take through the Internet.
4. NSLOOKUP:
The nslookup (short for Name Server Lookup) command is a network tool available on most
operating systems, including Windows, Linux, and macOS. It is used to query Domain Name
System (DNS) servers to obtain information about domain names, IP addresses, and DNS
records. nslookup is a valuable utility for troubleshooting DNS-related issues and performing
various DNS-related tasks.
5. Ipconfig:
The ipconfig (IP Configuration) command is a Windows command-line utility that provides
information about the network configuration on a Windows computer. It displays
information such as the IP address, subnet mask, default gateway, and more for all network
interfaces on the computer. This command is often used for diagnosing network issues and
configuring network settings.
6. NETSH:
Netsh is a command-line scripting utility that allows you to display or modify the
network configuration of a computer that is currently running. oNetsh commands can
be run by typing commands at the netsh prompt and they can be used in batch files
or scripts.
To run a netsh command, you must start netsh from the command prompt by typing
netsh and then pressing ENTER.
Next, you can change to the context that contains the command you want to use.
The contexts that are available depend on the networking components that you have
installed.
For example, if you type dhcp at the netsh prompt and press ENTER, netsh changes to
the DHCP server context.
If you do not have DHCP installed, however, the following message appears:
7. GETMAC:
The getmac command is a Windows command-line utility used to retrieve the Media Access
Control (MAC) address for one or more network interfaces on a Windows computer. The MAC
address is a unique hardware address assigned to network interfaces, such as Ethernet or Wi-
Fi adapters, and it's used for identifying devices on a local network.
8. HOSTNAME:
The hostname command is a command-line utility used to display or set the hostname of a
computer. The hostname is the name assigned to a computer or device on a network, and it
is used to identify that device on the network. The hostname is often a human-readable name
and is used for various purposes, such as network identification, remote access, and more.
9. ARP:
The arp (Address Resolution Protocol) command is a network utility available on various
operating systems, including Windows, Linux, and macOS. It is used to view and manipulate
the ARP cache, which is a table that maps IP addresses to their corresponding MAC (Media
Access Control) addresses on a local network. ARP is essential for network communication
within a local subnet.
10. SYSTEMINFO:
Practical-04
Date:
1. Bus Topology:
Bus topology is a network design in which all devices are connected to a single central
cable or bus. Data is transmitted as electrical signals along the bus, and all devices on
the network can access and listen to these signals. While it's simple and cost-effective, a
single point of failure in the bus can disrupt the entire network. Bus topologies are less
common in modern networking, with star and ring topologies being more prevalent.
2. Star Topology
between devices. It offers high reliability and scalability but can be vulnerable if the
central hub fails. It is commonly used in Ethernet networks and home Wi-Fi setups.
3. Ring Topology:
4. Mesh Topology:
Mesh topology is a network design where each device is directly connected to every
other device, forming a redundant and highly reliable network. It offers robust fault
tolerance, as data can still flow even if a connection fails. However, it's costly and
complex to implement due to the numerous connections required. Mesh topologies are
commonly used in critical applications like military and financial systems.
5. Tree Topology:
6. Hybrid Topology:
A hybrid network topology combines two or more traditional topologies, such as star, bus,
ring, or mesh, within a single network. This approach offers increased flexibility and
robustness, allowing for the customization of network segments based on specific
requirements. Hybrid topologies are often used in larger, complex networks to optimize
performance, scalability, and fault tolerance.
Practical-05
Date:
Virtual LAN (VLAN) is a concept in which we can divide the devices logically on layer 2 (data
link layer). Generally, layer 3 devices divide the broadcast domain but the broadcast domain
can be divided by switches using the concept VLAN.
Configuration of router:
Switch>enable
Switch#config terminal
Switch(config)#int fa0/1
Switch(config-if)#int fa0/2
Switch(config-if)#int fa0/3
Switch(config-if)#int fa0/4
Switch(config)#int fa 0/5
Router>enable
Router#config terminal
Router(config)#int fa0/0
Router(config-if)#no shutdown
Practical-06
Date: