0% found this document useful (0 votes)
66 views35 pages

CN LAB File

Uploaded by

Abhay Raina
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views35 pages

CN LAB File

Uploaded by

Abhay Raina
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 35

Department of Computer Science & Engineering

Chandigarh Engineering College


CGC Landran , Mohali Punjab
Lab File

Subject: CN LAB (BTCS507-18)

5th Semester (B-TECH)

(Branch: CSE)

Submitted by: Submitted to:


Abhishek Kumar Mr. Hardavinder Sir
2101502
S No. Practical Name Date Sign

INDEX
EXPERIMENT - 1

OBJECTIVE:
To study the different types of Network cables and network topologies.

NETWORK CABLE TYPES AND SPECIFICATIONS:


To connect two or more computers or networking devices in a network, network cables are used.
There are three types of network cables; coaxial, twisted-pair, and fiber-optic.

Coaxial cable
This cable contains a conductor, insulator, braiding, and sheath. The sheath covers the
braiding, the braiding covers the insulation, and the insulation covers the conductor.

The following image shows these components.

Fig 1.1: Coaxial Cable

Sheath
This is the outer layer of the coaxial cable. It protects the cable from physical damage.

Braided shield
This shield protects signals from external interference and noise. This shield is built from the
same metal that is used to build the core.

Insulation
Insulation protects the core. It also keeps the core separate from the braided shield. Since both
the core and the braided shield use the same metal, without this layer, they will touch each other
and create a short-circuit in the wire.

Conductor
The conductor carries electromagnetic signals. Based on the conductor a coaxial cable can be
categorized into two types; single-core coaxial cable and multi-core coaxial cable. A single-core
coaxial cable uses a single central metal (usually copper) conductor, while a multi-core coaxial
cable uses multiple thin strands of metal wires. The following image shows both types of cable.

Coaxial cables in computer networks


The coaxial cables were not primarily developed for the computer network. These cables were
developed for general purposes. They were in use even before computer networks came into
existence. They are still used even though their use in computer networks has been completely
discontinued.

At the beginning of computer networking, when there were no dedicated media cables available
for computer networks, network administrators began using coaxial cables to build computer
networks.

Because of its low cost and long durability, coaxial cables were used in computer networking for
nearly two decades (the 80s and 90s). Coaxial cables are no longer used to build any type of
computer network.

Specifications of coaxial cables


Coaxial cables have been in use for the last four decades. During these years, based on several
factors such as the thickness of the sheath, the metal of the conductor, and the material used in
insulation, hundreds of specifications have been created to specify the characteristics of coaxial
cables.

● Coaxial cable uses RG rating to measure the materials used in shielding and conducting
cores.
● RG stands for the Radio Guide. Coaxial cable mainly uses radio frequencies in
transmission.
● Impedance is the resistance that controls the signals. It is expressed in the ohms.
● AWG stands for American Wire Gauge. It is used to measure the size of the core. The
larger the AWG size, the smaller the diameter of the core wire.

Twisted-pair cables
The twisted-pair cable was primarily developed for computer networks. This cable is also known
as Ethernet cable. Almost all modern LAN computer networks use this cable.

This cable consists of color-coded pairs of insulated copper wires. Every two wires are twisted
around each other to form pair. Usually, there are four pairs. Each pair has one solid color and
one stripped color wire. Solid colors are blue, brown, green, and orange. In striped color, the
solid color is mixed with the white color.
Based on how pairs are stripped in the plastic sheath, there are two types of twisted-pair cable;
UTP and STP.
In the UTP (Unshielded twisted-pair) cable, all pairs are wrapped in a single plastic sheath.
In the STP (Shielded twisted-pair) cable, each pair is wrapped with an additional metal shield,
then all pairs are wrapped in a single outer plastic sheath.

Similarities and differences between STP and UTP cables


● Both STP and UTP can transmit data at 10Mbps, 100Mbps, 1Gbps, and 10Gbps.
● Since the STP cable contains more materials, it is more expensive than the UTP cable.
● Both cables use the same RJ-45 (registered jack) modular connectors.
● The STP provides more noise and EMI resistance than the UTP cable.
● The maximum segment length for both cables is 100 meters or 328 feet.
● Both cables can accommodate a maximum of 1024 nodes in each segment.

The following image shows both types of twisted-pair cables.

Fig 1.2: Twisted-Pair Cable


Fiber optic cable
This cable consists of a core, cladding, buffer, and jacket. The core is made from thin strands of
glass or plastic that can carry data over a long distance. The core is wrapped in the cladding; the
cladding is wrapped in the buffer, and the buffer is wrapped in the jacket.

● Core carries the data signals in the form of light.


● Cladding reflects light back to the core.
● Buffer protects the light from leaking.
● The jacket protects the cable from physical damage.

Fiber optic cable is completely immune to EMI and RFI. This cable can transmit data over a long
distance at the highest speed. It can transmit data up to 40 kilometers at the speed of 100Gbps.

Fiber optic uses light to send data. It reflects light from one endpoint to another. Based on how
many beams of light are transmitted at a given time, there are two types of fiber optical cable;
SMF and MMF.
Fig 1.3: Optical Fiber Cable
SMF (Single-mode fiber) optical cable
This cable carries only a single beam of light. This is more reliable and supports much higher
bandwidth and longer distances than the MMF cable. This cable uses a laser as the light source
and transmits 1300 or 1550 nano-meter wavelengths of light.

MMF (multi-mode fiber) optical cable


This cable carries multiple beams of light. Because of multiple beams, this cable carries much
more data than the SMF cable. This cable is used for shorter distances. This cable uses an LED
as the light source and transmits 850 or 1300 nano-meter wavelengths of light.

NETWORK TOPOLOGIES:
A Network Topology is the arrangement with which computer systems or network devices are
connected to each other. Topologies may define both physical and logical aspects of the network.
Both logical and physical topologies could be the same or different in the same network.

Network Devices

Switch
A switch is a device in a computer network that connects other devices together. Multiple data
cables are plugged into a switch to enable communication between different networked devices.

Fig 1.4: Switch


Router
A wireless router connects directly to a modem by a cable. This allows it to receive information
from — and transmit information to — the internet. The router then creates and communicates
with your home Wi-Fi network using built-in antennas. As a result, all of the devices on your
home network have internet access.
Fig 1.5: Router
Difference between a switch and a router?
The most basic explanation is that a switch is designed to connect computers within a network,
while a router is designed to connect multiple networks together.

Hub
Hub is commonly used to connect segments of a LAN (Local Area Network). A hub contains
multiple ports. When a packet arrives at one port, it is copied to the other ports so that all
segments of the LAN can see all packets. Hub acts as a common connection point for devices in
a network.

Topologies

Point-to-Point
Point-to-point networks contain exactly two hosts such as computers, switches or routers, servers
connected back to back using a single piece of cable. Often, the receiving end of one host is
connected to the sending end of the other and vice-versa.

Fig 1.6: Point-to-Point


If the hosts are connected point-to-point logically, then they may have multiple intermediate
devices. But the end hosts are unaware of the underlying network and see each other as if they
are connected directly.

Bus Topology
In the case of Bus topology, all devices share a single communication line or cable. Bus topology
may have problems while multiple hosts sending data at the same time. Therefore, Bus topology
either uses CSMA/CD technology or recognizes one host as Bus Master to solve the issue. It is
one of the simple forms of networking where a failure of a device does not affect the other
devices. But failure of the shared communication line can make all other devices stop
functioning.
Fig 1.7: Bus Topology
Both ends of the shared channel have a line terminator. The data is sent in only one direction and
as soon as it reaches the extreme end, the terminator removes the data from the line.

Star Topology
All hosts in Star topology are connected to a central device, known as hub device, using a point-
to-point connection. That is, there exists a point to point connection between hosts and hub. The
hub device can be any of the following:
● Layer-1 device such as hub or repeater
● Layer-2 device such as switch or bridge
● Layer-3 device such as router or gateway

Fig. 1.8: Star Topology


As in Bus topology, the hub acts as a single point of failure. If the hub fails, connectivity of all
hosts to all other hosts fails. Every communication between hosts takes place through only the
hub. Star topology is not expensive as to connect one more host, only one cable is required and
configuration is simple.

Ring Topology
In ring topology, each host machine connects to exactly two other machines, creating a circular
network structure. When one host tries to communicate or send a message to a host which is not
adjacent to it, the data travels through all intermediate hosts. To connect one more host in the
existing structure, the administrator may need only one more extra cable.
Fig 1.9: Ring Topology

Failure of any host results in failure of the whole ring. Thus, every connection in the ring is a
point of failure. There are methods which employ one more backup ring.

Mesh Topology
In this type of topology, a host is connected to one or multiple hosts. This topology has hosts in
point-to-point connection with every other host or may also have hosts which are in point-to-
point connection to a few hosts only.

Fig: 1.10: Mesh Topology


Hosts in Mesh topology also work as relay for other hosts which do not have direct point-to-
point links. Mesh technology comes into two types:
● Full Mesh: All hosts have a point-to-point connection to every other host in the network.
Thus for every new host n(n-1)/2 connections are required. It provides the most reliable
network structure among all network topologies.
● Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts
connect to each other in some arbitrary fashion. This topology exists where we need to
provide reliability to some hosts out of all.

Tree Topology
Also known as Hierarchical Topology, this is the most common form of network topology in use
presently. This topology imitates the extended Star topology and inherits properties of bus
topology.

This topology divides the network into multiple levels/layers of the network. Mainly in LANs, a
network is bifurcated into three types of network devices. The lowermost is an access-layer
where computers are attached. The middle layer is known as the distribution layer, which works
as a mediator between upper layer and lower layer. The highest layer is known as the core layer,
and is the central point of the network, i.e. root of the tree from which all nodes fork.

Fig 1.11: Tree Topology


All neighbouring hosts have a point-to-point connection between them. Similar to the Bus
topology, if the root goes down, then the entire network suffers even. Though it is not the single
point of failure. Every connection serves as a point of failure, failing of which divides the
network into an unreachable segment.
EXPERIMENT NO. 2

OBJECTIVE:
Practically implement and test the cross-wired cable and straight through cable using clamping
tool and network lab cable tester

APPARATUS (COMPONENTS):
RJ-45 connector, Clamping Tool, Twisted pair Cable

DESCRIPTION:

What is transmission media?

Transmission media is a pathway that carries the information from sender to receiver. We use
different types of cables or waves to transmit data. Data is transmitted normally through
electrical or electromagnetic signals.

An electrical signal is in the form of current. An electromagnetic signal is series of


electromagnetic energy pulses at various frequencies. These signals can be transmitted through
copper wires, optical fibers , atmosphere, water and vacuum Different Medias have different
properties like bandwidth, delay, cost and ease of installation and maintenance. Transmission
media is also called Communication channel.

Types of Transmission Media

1. Wired or Guided Media or Bound Transmission Media

2. Wireless or Unguided Media or Unbound Transmission Media

Wired or Guided Media or Bound Transmission Media: Bound transmission media the
cables that are tangible or have physical existence and are limited by the physical geography.
Popular bound transmission media in use are twisted pair cable, co-axial cable and fiber optical
cable. Each of them has its own characteristics like transmission speed, effect of noise, physical
appearance, cost etc.

Wireless or Unguided Media or Unbound Transmission Media: Unbound transmission media


are the ways of transmitting data without using any cables. These media are not bounded by
physical geography. This type of transmission is called Wireless communication. Nowadays
wireless communication is becoming popular. Wireless LANs are being installed in office and
college campuses. This transmission uses Microwave, Radio wave, Infrared are some of popular
unbound transmission media.
Fig 2.1: Type of Media

Guided Transmission Media

Types of Twisted Pair

The two types of twisted pairs are:

1. Unshielded twisted pair (UTP)


2. Shielded twisted pair (STP)

1. Unshielded Twisted Pair (UTP)

It consists of colour-coded copper wires, but does not include any foil or braiding as insulator to
protect against interference.

Wire pairs within each cable have varied amounts of twists per foot to produce
cancellation. There are different categories of UTP.

The following table shows the UTP categories, the no. of pairs in each, and the grade of cable
each uses and how they are implemented.

Table 2.1 Category table of UTP


2.. Shielded Twisted Pair (STP)

STP is made up of pairs of copper wires that are twisted together.

The pairs are covered in a foil or braided mesh, as well as outer PVC jacket.

This foil or mesh prevents the penetration of electromagnetic noise and eliminate cross talk.

This shielding must be grounded to prevent the foil or braided mesh from becoming a magnet for
electricity.

Fig 2.2 UTP and STP

Advantage of STP over UTP

STP is less susceptible to noise as compared to UTP and therefore reduces the cross talk and
interference.

Disadvantages of STP
1. It must be properly grounded.

2. It is more expensive than UTP.

3. It is difficult to terminate.

Advantages of Twisted pair cable

1. It can be used to carry both analog and digital data.

2. It is the least expensive media of transmission for short distances.

Disadvantages of Twisted pair cable

1. It offers poor noise immunity as a result signal distortion is more?

2. Attenuation is very high.

3. It supports lower bandwidth as compared to other Medias. It supports 10 mbps upto a


distance of 100 meters on a 10BASE-T.

4. It offers very poor security and is relatively easy to tap.

5. Being thin in size, they are likely to break easily.

Coaxial Cable
Coaxial cable has two wires of copper. The core wire lies in center and is made of solid conductor.
Core is enclosed in an insulating sheath. Over the sheath the second wire is wrapped

around and that too in turn encased by insulator sheath. This all is covered by plastic cover.

Fig2.3 Coaxial Cable

Because of its structure coax cables are capable of carrying high frequency signals than that of
twisted pair cables. The wrapped structure provides it a good shield against noise and cross talk.
Coaxial cables provide high bandwidth rates of up to 450 mbps.
There are three categories of Coax cables namely, RG-59 (Cable TV), RG-58 (Thin Ethernet)
and RG-11 (Thick Ethernet. RG stands for Radio Government.

Cables are connected using BNC connector and BNC-T. BNC terminator is used to terminate the
wire at the far ends.

Fiber-Optics Cable

A cable with central glass tube covered with protective shield which transmit data using
photons is fiber optics cable. These cables transmit data via concentrated bursts of laser beams
which are carried through bundles of hair thin glass fibers.

They have advantages over electronic cables technology has revolutionized tele
communication Fiber optics cables as free from electro-magnetic transmission speed and
volume .This applications which used electronic. cables. interference as well as wire tapping

Fig 2.4 Fibre Optic Cables

Unguided Transmission Media:-

Unguided transmission media extend beyond the limiting confines of cabling. They provide
anexcellent Communication Networks alternative for WANS. The lack of physical restrictions
provides larger bandwidth as well as wide area capabilities. Unbound media typically operate at
very high frequencies. The three types of unbound transmission media are:

Radio wave.

Micro wave.

Infrared.
Radiowaves TransmissionAlthough Radio waves are prevalent and wellunderstood, we are just
beginning to realize their enormous potential as a networking medium. Radio waves can operate
on a single or multiple frequency bands

Fig 2.5 Radio Waves

Radio waves are omni directional i.e. they travel in all the directions from the source. Because of
this property, transmitter and receiver need not to be aligned. Radio waves can penetrate
buildings easily, so they are widely use for communication both indoors outdoors.

At high frequencies, radio waves tends to travel in straight line and bounce off the obstacles.
They are also absorbed by rain. Radio waves is widely used for AM and FM radio, television,
cordless telephone, cellular phones, paging and wireless LAN.

Microwave Transmission

Microwaves have been used in data communications for a long time. They have a higher
frequency than radio waves and therefore can handle larger amounts of data.

Microwave transmission is line of sight transmission. The transmit station must be in visible
contact with the receive station. This sets a limit on the distance between stations depending on
the local geography. Typically the line of sight due to the Earth's curvature is only 50 km to the
horizon! Repeater stations must be placed so the data signal can hop, skip and jump across the
country. microwave circuits are considered a broad band communication channel.
Microwaves operate at high operating frequencies of 3 to 10 GHz. This allows them to carry
large quantities of data due to their large bandwidth

List the Advantages of microwaves.

a. They require no right of way acquisition between towers.

b. They can carry high quantities of information due to their high operating frequencies.

c. Low cost land purchase: each tower occupies only a small area.

d. High frequency/short wavelength signals require small antennae.

Disadvantages of Microwaves

a. Attenuation by solid objects: birds, rain, snow and fog.

b. Reflected from flat surfaces like water and metal.

c. Diffracted (split) around solid objects.

d. Refracted by atmosphere, thus causing beam to be projected away from receiver.

InfraRed.

Infrared offers a great unbound photonic solution. Like fiber-optic cabling, infrared
communications use light, so they are not bound by the limitations of electricity.

Crimping tool

A crimping tool is a tool designed to crimp or connect a connector to the end of a cable. For
example, network cables and phone cables are created using a crimping tool to connect the RJ-45
and RJ-11 connectors to the end of the cable. In the example below picture, this crimper is
capable of crimping a RJ-11 (6-Pin) and RJ-45 (8-Pin) connectors and also includes a wire cutter
near the handles that can be used to cut phone or CAT5 cable.
Fig 2.6 Crimping Tool

RJ-45 Connecter

The RJ-45 connector is a form of telephone connector. It sees its most frequent use as a
local-area network connector , and is frequently referred to simply as an Ethernet connector.

Fig 2.7 RJ45 Connector


BNC Connecter

This connector is commonly used on a Token Ring network. BNC is also short for Bayonet
NutConnector or British Naval/Navy Connector although more appropriately known as
theBayonet Neill Concelman. In the picture to the right, is an example of a BNC connector on
the end of a coaxial cable.

Fig 2.8 BNC Connector

Procedure: To do these practical following steps should be done:


1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be very
careful at this point, as to not nick or cut into the wires, which are inside. Doing so could alter
the characteristics of your cable, or even worse render it useless. Check the wires, one more time
for nicks or cuts. If there are any, just whack the whole end off, and start over.
2. Spread the wires apart, but be sure to hold onto the base of the jacket with your other hand.
You do not want the wires to become untwisted down inside the jacket. Category 5 cable must
only have 1/2 of an inch of 'untwisted' wire at the end; otherwise it will be 'out of spec'. At this
point, you obviously have ALOT more than 1/2 of an inch of un-twisted wire.
3. You have 2 end jacks, which must be installed on your cable. If you are using a premade
cable, with one of the ends whacked off, you only have one end to install - the crossed over end.
Below are two diagrams, which show how you need to arrange the cables for each type of cable
end. Decide at this point which end you are making and examine the associated picture below. ¬
Diagram shows you how to prepare straight through wired connection

Ethernet Cable Tips:


∙ A straight-thru cable has identical ends.
∙ A crossover cable has different ends.
∙ A straight-thru is used as a patch cord in Ethernet connections.
∙ A crossover is used to connect two Ethernet devices without a hub or for connecting two hubs. ∙
A crossover has one end with the Orange set of wires switched with the Green set.
∙ Odd numbered pins are always striped; even numbered pins are always solid coloured.
∙ Looking at the RJ-45 with the clip facing away from you, Brown is always on the right, and
pin 1 is on the left.
∙ No more than 1/2" of the Ethernet cable should be untwisted otherwise it will be susceptible to
crosstalk.
∙ Do not deform, do not bend, do not stretch, do not staple, do not run parallel with power
cables, and do not run Ethernet cables near noise inducing components.
Result: Cable Crimping, Standard Cabling and Cross Cabling, IO connector crimping and testing
the crimped cable using a cable tester are done successfully

OUTCOME:
Student will be able to understand the hardware components such as crimping tool and role of
RJ-45 connector in networking. They will also know the different transmission medium such as
co-axial cable, optical cable and twisted pair cable and how these cables are used with different
speeds in different networks.

OUTPUT:
Studied transmission media and Tools: Co-axial cable, UTP Cable, Crimping Tool, Connectors
etc.

RESULT: Understood the different transmission medium such as co-axial cable, optical cable
and twisted pair cable.

APPLICATION: Usage of transmission tools with different speeds in different networks.


EXPERIMENT NO. 3

OBJECTIVE:
Study and familiarization with various network devices.

APPARATUS:
Hubs, Switches, Routers.

DESCRIPTION:

LAN Adapter:-

An expansion board that is used to connect a computer or computing device to a network.


LAN adapter is the most common and generic alternate name for a Network Interface Card
(NIC). However, many similar products, such as a Wireless USB LAN Adapter is also called a
LAN adapter.

Fig 3.1 LAN Adapter

Wireless USB LAN adapter:-


A high-speed wireless network card that is used to access a network through a USB port on a
computer or laptop. Most wireless USB LAN adapters look like small USB flash drives and
usually are based on the 802.11g standard which provides a data rate up to 54-Mbps in a
wireless LAN environment. Some wireless USB LAN adapters may also support the 802.11b
standard.

Fig 3.2 Wireless USB LAN Adapter


Network Hub:-

Definition: In computer networking, a hub is a small, simple, inexpensive device that


joinsmultiple computers together. Many network hubs available today support the Ethernet
standard. Other types including USB hubs also exist, but Ethernet is the type traditionally used
in home networking.

Technically speaking, two different types of hubs exist:

passive
active

Passive hubs do not amplify the electrical signal of incoming packets before broadcasting
themout to the network. Active hubs, on the other hand, do perform this amplification, as does
a different type of dedicated network device called a repeater. Some people use the terms
concentrator when referring to a passive hub and multiport repeater when referring to
anactive hub.

Fig 3.3 HUB

Network switch:-

A network switch (sometimes known as a switching hub) is a computer networking device that
is used to connect devices together on a computer network. A switch is considered more
advanced than a hub because a switch will only send a message to the device that needs or
[1]
requests it, rather than broadcasting the same message out of each of its ports.

A switch is a multi-port network bridge that processes and forwards data at the data link layer
(layer 2) of the OSI model. Some switches have additional features, including the ability to
route packets. These switches are commonly known as layer-3 or multilayer switches.
Fig 3.4: Switch

Router:-

Router: Routers are devices (computers) containing software that help in determining the
bestpath out of the available paths, for a particular transmission. They consist of a combination
of hardware and software. The hardware includes the physical interfaces to the various networks
in the internet work. The two main pieces of software in a router are the operating system and
the routing protocol.

Routers use logical and physical addressing to connect two or more logically separate networks.
They accomplish this connection by organizing the large network into logical network segments
or sub-networks. Each of these sub networks is given a logical address. This allows the networks
to be separate but still access each other and exchange data when necessary. Data is grouped into
packets, or blocks of data. Each packet, in addition to having a physical device address, has a
logical network address.

Routers are frequently used to interconnect identical networks as well as to interconnect


networks with different types of hardware.

How Routers Works

Routers are interconnectivity devices that are used to transfer the datum packets along networks
by visualizing the networks path. Routers visualizing the networks path to many networks such
as Electronic networks, Transport networks and phone networks. Two ways are exist for routers
operation using either control plane or forwarding plane. In control plane the router sends the
precise data packets to their specific location. On the other hand in forwarding plane router does
not remember the sending or receiving information about the packets.
Advantages of Routers
Routers route the data in an organized way. Routers generate a reliable connection between
hosts. Routers is used for alternatively incase the main is fail to transfer data.
OUTPUT:
Studied Networking Components and devices

OUTCOME:
Student will be able to understand all the network components and devices used in the
networking.

RESULT:
Understood various technological devices and its working

APPLICATION:
● Lan connection can be implemented with the help of these technologies.
● Selection of network devices and implementations in LAN connection.
EXPERIMENT NO. 4

OBJECTIVE:
Familiarization with Packet Tracer Simulation tool/any other related tool.

APPARATUS:
Computer, cross-platform visual simulation tool

DESCRIPTION:
Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows
users to create network topologies and imitate modern computer networks. The software allows
users to simulate the configuration of Cisco routers and switches using a simulated command
line interface. Packet Tracer makes use of a drag and drop user interface, allowing users to add
and remove simulated network devices as they see fit. The software is mainly focused towards
Certified Cisco Network Associate Academy students as an educational tool for helping them
learn fundamental CCNA concepts. Previously students enrolled in a CCNA Academy program
could freely download and use the tool free of charge for educational use.
Fig 4.1 Packet Tracker

We will just create a computer lab with the help of the cisco packet tracer and the ‘n’ no of
computers are connected with the help of switches and according to the no of computer required
the no of switches are being used

In the given example we are using the 26 computers to make the local area network in the lab.
Here we are using two switches because a switch can have 24 ports to be connected .

The lab looks like this after the connection of the computers to the switch
Fig 4.2:Switch Connection

Now we are having the work of assigning the I p address to all the computers connected to the
switch . we can assign the I p address by just clicking on the pc and the manual will come just
click on the I p configuration then assign the I p address to the pc .
We will assign the ip address in the static form. after assigning the I p address to the computer it
will automatically generate the subnet mask of the computer itself .

The screen looks like this while assigning the Ip address

Fig 4.3: IP addresses


assigning
OUTPUT:
Studied Networking Components and devices

OUTCOME:
Students will be able to familiarize with the Packet Tracer Simulation tool/any other related tool.

RESULT: Understood Packet Tracer Simulation and its working

APPLICATION:
● Lan connection can be implemented with the help of these technologies.
● Selection of network devices
● Wireless connection
EXPERIMENT NO. 5

OBJECTIVE:
Study and Implementation of IP Addressing Schemes

APPARATUS:
Computers, Class Addressing Knowledge.

DESCRIPTION:

IP Address Classes:-

● IP addressing supports C,five D and E. Only different classes A, B and address C are
available for commercial use.

Class A addresses

Class A addresses are designed for large organizations with a large number of hosts or routers.
1. In this the first octet of the address identifies the network and the next three octets are used
to identify the host.
2. The first bit of the first octet is always 0 and the remaining 7 bits are used to identify the
network address.
3. The next three octets i.e. 24 bits are used to identify the host.
4. The class supports addresses from 0.0.0.0 to 0.255.255.255.
5. The first block of network addresses starts with 1.0.0.0 and the last block of
network address starts with 127.0.0.0.
6. As there are 7 bits in the network address, 27 = 128 blocks of network address are
possible. Out of these two network blocks are reserved. Hence total 126 address blocks
are used.
7. Each network block can have 224--- 2 hosts i.e. 16,777,214 host addresses. Two addresses
are less as one address is reserved for the broadcast address and one address is reserved
for the network.
8. A block in class A is too large for almost any organization. This means most of
the addresses in class A are wasted and are not used.

Class B address

1. The class B addresses are designed for medium sized organizations with tens of
thousands of attached hosts or routers.
2. In this, the first two octets of the address identify the network and the next two
octets identify the host within the network.
3. The first two bits (high order bits) of the first octet are always 1, 0. Thus the remaining
14 bits identify the network.
4. The third and fourth octet i.e. 6 bits are used to identify the hosts.
5. The first network block of this class covers the addresses from 128.0.0.0 to 128.0.255.255
(net id 128.0). The last network block of this class covers addresses from
191.255.255.255.
6. The maximum number of network blocks in class B is 214 = 16384.
7. Each network block in class B can have 216--- 2 = 65,534 hosts.
8. A block in class B is also very large and most of the address in class B is also wasted.

Class C address
1. The class C addresses is designed for small organizations with a small number of
attached hosts or routers.
2. In class C, the first three octets of address are used for network and the last octet is used to
identify the host.
3. The first three bits of first octet are always set to 1, 1,0.
4. The remaining 24 – 3 = 21 bits are used for network identification and only 8 bits are
used for host.
5. In class C, 221 = 2,097,152 network blocks are possible.
6. Thus, each block in class C address can have 28– 2 = 254 hosts.
7. The first block of network covers addresses from 192.0.0.0 to 192.0.0.255.
8. The class C addresses are too less for many organizations as it supports only 254 hosts in
a network.

Following are the classes of IP:-

CLASS
ES Range

1.0.0.0to
Class A 127.255.255.255
128.0.0.0 to
Class B 191.255.255.255
192.0.0.0 to
Class C 223.255.255.255

224.0.0.0 to
Class D 239.255.255.255

Class E 240.0.0.0 to 255.255.255.255

Class D address

1. Class D addresses are used for multicast groups (multicasting)

2. The concept of division of octets into network id and host id does not apply to class D.

3. The first four bits of the first octet in class D are always set to 1,1,1,0.

4. The address range is 224.0.0.0 to 239.255.255.255


Class E address

1. The Class E address is reserved for future use and is experimental.

2. The concept of network id and host id does not apply on class E also.

3. The first four bits of first octet are always set to 1,1,1,1.

4. The address range for class E is 240.0.0.0 to 255.255.255.255.

Fig 5.1 Classes Range

OUTCOME:
Student will be able to understand how to design a network with various class ranges.
Class A,B and C IP addresses can be used to implement the network whereas class D is used for
multicasting with broadcasting while class E is reserved for the researchers.

APPLICATION:
Suppose you want to design a network for an organization then you must be aware of IP
addresses range. Most important question is what is the size of the organization? If it is very
much big in size then class A IP addresses are used; if it is medium in size then class B IP
addresses can be used on the other hand if it is small in size then class C IP addresses can be
used.

RESULT:
Designed and implemented Class A, B, and C Networks

OUTPUT:
Explored the knowledge of computer networks by designing different class networks with
different IP ranges.
EXPERIMENT NO. 6

OBJECTIVE:
Creation of Simple Networking topologies using hubs and switches

APPARATUS:
Computer, hub, switch

PRINCIPLE:
1. Repeater:Functioning at Physical Layer.A repeater is an electronic device that receives
a signal and retransmits it at a higher level and/or higher power, or onto the other side of
an obstruction, so that the signal can cover longer distances. Repeater have two ports ,so
cannot be use to connect for more than two devices.

2. Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator is a
device for connecting multiple twisted pair or fiber optic Ethernet devices together and
making them act as a single network segment. Hubs work at the physical layer (layer 1)
of the OSI model. The device is a form of multiport repeater. Repeater hubs also
participate in collision detection, forwarding a jam signal to all ports if it detects a
collision.

3. Switch:A network switch or switching hub is a computer networking device that


connects network segments.The term commonly refers to a network bridge that processes
and routes data at the data link layer (layer 2) of the OSI model. Switches that
additionally process data at the network layer (layer 3 and above) are often referred to as
Layer 3 switches or multilayer switches.

4. Bridge: A network bridge connects multiple network segments at the data link layer
(Layer 2) of the OSI model. In Ethernet networks, the term bridge formally means a
device that behaves according to the IEEE 802.1D standard. A bridge and switch are very
much alike; a switch being a bridge with numerous ports. Switch or Layer 2 switch is
often used interchangeably with bridge.Bridges can analyze incoming data packets to
determine if the bridge is able to send the given packet to another segment of the
network.
5. Router: A router is an electronic device that interconnects two or more computer
networks, and lectively interchanges packets of data between them. Each data packet
contains address information that a router can use to determine if the source and
destination are on the same network, or if the data packet must be transferred from one
network to another. Where multiple routers are used in a large collection of
interconnected networks, the routers exchange information about target system addresses,
so that each router can build up a table showing the preferred paths between any two
systems on the interconnected networks.
6. Gate Way: In a communications network, a network node equipped for interfacing
with another network that uses different protocols. • A gateway may contain devices such
as protocol translators, impedance matching devices, rate converters, fault isolators, or
signal translators as necessary to provide system interoperability. It also requires the
establishment of mutually acceptable administrative procedures between both networks.
Step 1: Connect the switch to the LAN. a. Using the proper cable, connect the
FastEthernet0/0 on Customer Router to the FastEthernet0/1 on Customer Switch. b.
Using the proper cable, connect the Customer PC to the Customer Switch on port
FastEthernet0/2. c. Using the proper cable, connect the Local Server to the Customer
Switch on port FastEthernet0/3.

Step 2: Verify the switch configuration. a. From the Customer PC, use the terminal
emulation software to connect to the console of the customer Cisco Catalyst 2960 switch.
b. Use the console connection and terminal utility on the Customer PC to verify the
configurations.
Use cisco as the console password. c. Enter privileged EXEC mode and use the show
running-config command to verify the following configurations.
The password is cisco123.
a. VLAN1 IP address = 192.168.1.5
b. Subnet mask = 255.255.255.0
c. Password required for console access
d. Password required for vty access
e. Password enabled for privileged EXEC mode f. Secret enabled for privileged EXEC
mode
f. Verify IP connectivity between the Cisco Catalyst 2960 switch and the Cisco 1841
router by initiating a ping to 192.168.1.1 from the switch CLI.
g. Click the Check Results button at the bottom of this instruction window to check your
work.
Fig 6.1 Creation of network
OUTCOME:
Student will be able to understand how an own private network can be implemented and
how it works.

RESULT:
Studied various LAN topologies and their creation using network devices, cables and
computers

OUTPUT:
Understanding how an own private network can be implemented and how it works.

APPLICATION:

● Creation of private network


● Developing various networks using various topologies.

You might also like