Cnprac 1
Cnprac 1
Cnprac 1
no:211100107039
Practical-01
Date:14/08/20223
(img: Repeater)
a. Digital Repeater
b. Analog Repeater
b. Wireless Repeaters:
c. Wireless Repeaters
d. Radio Repeater
a. Local Repeaters
b. Remote Repeaters
2. Hub:
The main purpose of a hub is to connect all present network devices together on a
predefined internal network. Hub is a device consisting of multiple ports that accept
Ethernet connections from network devices. Hub is not considered to be an intelligent one
because it doesn't filter any data present or has no intelligence to assume as to where the
data is actually supposed to be sent, and that’s the reason because the only thing a hub
knows is that when a device is actually connected to one of its ports. So whenever a data
packet arrives at one of the ports, it is copied to all the other ports. So all the devices
present on that hub see that data packet. So again, when a data packet comes into one port,
the hub will just rebroadcast that data to every port that has a device connected to it.
(img: Hub)
1. Passive hub
2. Active hub
3. Intelligent hubs
A hub works at the physical layer of the OSI model. Hubs are manufactured by Vishal
Industries, Jashan Auto Industries, Jay Shakti Enterprise, Progressive Gear Industries (P) Ltd,
etc.
3. Gateway:
4. IOT Gateway
5. Media Gateway
Gateway work as network layer. Gateways are also called protocol converters and
can operate at any network layer.
4. Switch:
The switch can perform error checking before forwarding data, which makes it very
efficient as it does not forward packets that have errors and forward good packets
selectively to the correct port only.
(img: switch)
Types of Switch:
1. Layer 2 switches
2. Layer 3 switches
3. PoE switches
4. Gigabit switches
5. Rack-mounted switches
6. Desktop switches
5. Router:
A router is a device like a switch that routes data packets based on their IP
addresses.
(img: Router)
The router is mainly a Network Layer device. Routers normally connect LANs and
WANs and have a dynamically updating routing table based on which they make decisions
on routing the data packets. The router divides the broadcast domains of hosts connected
through it. Cisco Enterprise Routers and Switching can change your network to become
more protected with the high-security protocol. The router is Rs.2000 in India.
6. Bridge:
(img: Bridge)
The bridge is data link layer. A bridge in a computer network is a device used to
connect multiple LANs together with a larger Local Area Network (LAN). Digi key I the
manufacture company of bridge devices. The bridge devices prices is $45.
Types of bridge:
1. Transparent bridge
2. Source routing bridge
3. Translational bridge
4. Transparent Bridge
5. Source Routing Bridge
6. Translational Bridge
7. Server:
A Server is a program or a device that provides functionality for called clients which
are other programs or devices. This architecture is called the client-server model.
(Img: Server)
Types of servers:
1. Application Server
2. Catalog Server
3. Communication Server
4. Computing server
5. Fax server
6. File server
7. Game server
8. Mail server
9. Print server
10. Proxy server
11. Web server
8. NIC:
NIC stands for Network Interface Card NIC is additionally called Ethernet or physical
or network card. NIC is one of the major and imperative components to associate a gadget
to the network.
It is shown on layer 2 of the OSI show which is an information interface layer that
employs MAC address.
Common manufacture of NIC is intel, Realtek. NIC Ethernet Card price ₹ 16,650.00.
Practical-02
Date:
Aim: Study of different types of network cables and practically implement the cross-wired
cable and straight through cable using crimping tool.
Materials and Tools Needed:
This cable contains a conductor, insulator, braiding, and sheath. The sheath covers the
braiding, the braiding covers the insulation, and the insulation covers the conductor.
Sheath
This is the outer layer of the coaxial cable. It protects the cable from physical damage.
Braided shield
This shield protects signals from external interference and noise. This shield is built from the
same metal that is used to build the core.
Insulation
Insulation protects the core. It also keeps the core separate from the braided shield. Since
both the core and the braided shield use the same metal, without this layer, they will touch
each other and create a short-circuit in the wire.
Conductor
The conductor carries electromagnetic signals. Based on conductor a coaxial cable can be
categorized into two types; single-core coaxial cable and multi-core coaxial cable.
A single-core coaxial cable uses a single central metal (usually copper) conductor, while
a multi-core coaxial cable uses multiple thin strands of metal wires. The following image
shows both types of cable.
Twisted pair is a copper wire cable in which two insulated copper wires are twisted around
each other to reduce interference or crosstalk. It uses 10BASE-T, 100BASE-T, and some
other newer ethernet variants. It uses RJ-45 connectors.
A twisted pair cable usually contains two or more conducting wires either shielded by an
insulator or not and, further these twisted pairs of wires are coated for protection from any
damage.
Shielded Twisted Pair (STP) Cable: In STP the wires are covered by a copper braid
covering or a foil shield, this foil shield adds a layer that protects it against
interference leaking into and out of the cable. Hence, they are used for longer
distances and higher transmission rates.
Unshielded Twisted Pair (UTP) Cable: Unshielded twisted pair cable is one of the
most commonly used cables in computer networks at present time. UTP consists of
two insulated copper wires twisted around one another, the twisting of wires helps
in controlling interference.
Fiber optic cables use optical fibers which are made of glass cores surrounded by several
layers of cladding material usually made of PVC or Teflon, it transmits data in the form of
light signals due to which there are no interference issues in fiber optics. Fiber optics can
transmit signals over a very long distance as compared to twisted pairs or coaxial cables. It
uses 10BaseF, 100BaseFX, 100BaseBX, 100BaseSX, 1000BaseFx, 1000BaseSX, and
1000BaseBx ethernet variants. Hence, it is capable of carrying information at a great speed.
An optical fiber consists of a core and a cladding, chosen for their total internal reflection
due to the difference in refractive index between the two. In real optical fibers, the cladding
is usually covered with a layer of acrylate or polyimide polymer. The coating protects the
fiber from damage and several layers of protective sheathing, depending on the application,
are added to form the cable.
SMF (Single-mode fiber)- it uses one single ray of light to transmit data, it is used for
long-distance transmission.
Types of Connectors Used: Mainly these four connectors are used with fiber optic cable:
ST (Straight-tip) Connector
SC (Subscriber) Connector
LC (Lucent) Connector
Practical-03
Date:
1. PING:
The "ping" command is a network utility tool used to test the reachability of a host on an
Internet Protocol (IP) network and measure the round-trip time for packets sent from your
computer to the target host and back. It is available on most operating systems, including
Windows, macOS, and various Linux distributions.
2. NETSTAT:
3. TRACERT:
The tracert command, also known as traceroute on Unix-like systems (Linux, macOS), is a
network diagnostic tool used to trace the route that packets take from your computer to a
destination host or IP address. It shows a list of all the intermediate routers (hops) that the
packets pass through to reach the destination, along with the round-trip times for each hop.
This information is useful for diagnosing network connectivity issues and understanding the
path packets take through the Internet.
4. NSLOOKUP:
The nslookup (short for Name Server Lookup) command is a network tool available on most
operating systems, including Windows, Linux, and macOS. It is used to query Domain Name
System (DNS) servers to obtain information about domain names, IP addresses, and DNS
records. nslookup is a valuable utility for troubleshooting DNS-related issues and performing
various DNS-related tasks.
5. Ipconfig:
The ipconfig (IP Configuration) command is a Windows command-line utility that provides
information about the network configuration on a Windows computer. It displays
information such as the IP address, subnet mask, default gateway, and more for all network
interfaces on the computer. This command is often used for diagnosing network issues and
configuring network settings.
6. NETSH:
Netsh is a command-line scripting utility that allows you to display or modify the
network configuration of a computer that is currently running. oNetsh commands
can be run by typing commands at the netsh prompt and they can be used in batch
files or scripts.
To run a netsh command, you must start netsh from the command prompt by typing
netsh and then pressing ENTER.
Next, you can change to the context that contains the command you want to use.
The contexts that are available depend on the networking components that you
have installed.
For example, if you type dhcp at the netsh prompt and press ENTER, netsh changes
to the DHCP server context.
If you do not have DHCP installed, however, the following message appears:
7. GETMAC:
The getmac command is a Windows command-line utility used to retrieve the Media Access
Control (MAC) address for one or more network interfaces on a Windows computer. The
MAC address is a unique hardware address assigned to network interfaces, such as Ethernet
or Wi-Fi adapters, and it's used for identifying devices on a local network.
8. HOSTNAME:
The hostname command is a command-line utility used to display or set the hostname of a
computer. The hostname is the name assigned to a computer or device on a network, and it
is used to identify that device on the network. The hostname is often a human-readable
name and is used for various purposes, such as network identification, remote access, and
more.
9. ARP:
The arp (Address Resolution Protocol) command is a network utility available on various
operating systems, including Windows, Linux, and macOS. It is used to view and manipulate
the ARP cache, which is a table that maps IP addresses to their corresponding MAC (Media
Access Control) addresses on a local network. ARP is essential for network communication
within a local subnet.
10. SYSTEMINFO:
Original Install Date: The date when the operating system was originally installed.
System Boot Time: The date and time when the system was last booted.
Windows Directory: The directory where the Windows operating system files are
located.
System Directory: The directory where critical Windows system files are located.
Page File Space: Information about the page file (virtual memory) usage.
Domain: The name of the Windows domain (if the computer is part of a domain).
Logon Server: The name of the server that authenticated the user's logon session.
Hotfix(es): A list of installed hotfixes (Windows updates) with their names and
installation dates.
Practical-04
Date:
1. Bus Topology:
Bus topology is a network design in which all devices are connected to a single central
cable or bus. Data is transmitted as electrical signals along the bus, and all devices on the
network can access and listen to these signals. While it's simple and cost-effective, a
single point of failure in the bus can disrupt the entire network. Bus topologies are less
common in modern networking, with star and ring topologies being more prevalent.
2. Star Topology
3. Ring Topology:
4. Mesh Topology:
Mesh topology is a network design where each device is directly connected to every
other device, forming a redundant and highly reliable network. It offers robust fault
tolerance, as data can still flow even if a connection fails. However, it's costly and
complex to implement due to the numerous connections required. Mesh topologies are
commonly used in critical applications like military and financial systems.
5. Tree Topology:
6. Hybrid Topology:
A hybrid network topology combines two or more traditional topologies, such as star,
bus, ring, or mesh, within a single network. This approach offers increased flexibility and
robustness, allowing for the customization of network segments based on specific
requirements. Hybrid topologies are often used in larger, complex networks to optimize
performance, scalability, and fault tolerance.
Practical-05
Date:
Virtual LAN (VLAN) is a concept in which we can divide the devices logically on layer 2 (data
link layer). Generally, layer 3 devices divide the broadcast domain but the broadcast domain
can be divided by switches using the concept VLAN.
Configuration of router:
Switch>enable
Switch#config terminal
Switch(config)#int fa0/1
Switch(config-if)#int fa0/2
Switch(config-if)#int fa0/3
Switch(config-if)#int fa0/4
Switch(config)#int fa 0/5
Router>enable
Router#config terminal
Router(config)#int fa0/0
Router(config-if)#no shutdown
Practical-06
Date: