CN LAB File
CN LAB File
(Branch: CSE)
INDEX
EXPERIMENT - 1
OBJECTIVE:
To study the different types of Network cables and network topologies.
Coaxial cable
This cable contains a conductor, insulator, braiding, and sheath. The sheath covers the
braiding, the braiding covers the insulation, and the insulation covers the conductor.
Sheath
This is the outer layer of the coaxial cable. It protects the cable from physical damage.
Braided shield
This shield protects signals from external interference and noise. This shield is built from the
same metal that is used to build the core.
Insulation
Insulation protects the core. It also keeps the core separate from the braided shield. Since both
the core and the braided shield use the same metal, without this layer, they will touch each other
and create a short-circuit in the wire.
Conductor
The conductor carries electromagnetic signals. Based on the conductor a coaxial cable can be
categorized into two types; single-core coaxial cable and multi-core coaxial cable. A single-core
coaxial cable uses a single central metal (usually copper) conductor, while a multi-core coaxial
cable uses multiple thin strands of metal wires. The following image shows both types of cable.
At the beginning of computer networking, when there were no dedicated media cables available
for computer networks, network administrators began using coaxial cables to build computer
networks.
Because of its low cost and long durability, coaxial cables were used in computer networking for
nearly two decades (the 80s and 90s). Coaxial cables are no longer used to build any type of
computer network.
● Coaxial cable uses RG rating to measure the materials used in shielding and conducting
cores.
● RG stands for the Radio Guide. Coaxial cable mainly uses radio frequencies in
transmission.
● Impedance is the resistance that controls the signals. It is expressed in the ohms.
● AWG stands for American Wire Gauge. It is used to measure the size of the core. The
larger the AWG size, the smaller the diameter of the core wire.
Twisted-pair cables
The twisted-pair cable was primarily developed for computer networks. This cable is also known
as Ethernet cable. Almost all modern LAN computer networks use this cable.
This cable consists of color-coded pairs of insulated copper wires. Every two wires are twisted
around each other to form pair. Usually, there are four pairs. Each pair has one solid color and
one stripped color wire. Solid colors are blue, brown, green, and orange. In striped color, the
solid color is mixed with the white color.
Based on how pairs are stripped in the plastic sheath, there are two types of twisted-pair cable;
UTP and STP.
In the UTP (Unshielded twisted-pair) cable, all pairs are wrapped in a single plastic sheath.
In the STP (Shielded twisted-pair) cable, each pair is wrapped with an additional metal shield,
then all pairs are wrapped in a single outer plastic sheath.
Fiber optic cable is completely immune to EMI and RFI. This cable can transmit data over a long
distance at the highest speed. It can transmit data up to 40 kilometers at the speed of 100Gbps.
Fiber optic uses light to send data. It reflects light from one endpoint to another. Based on how
many beams of light are transmitted at a given time, there are two types of fiber optical cable;
SMF and MMF.
Fig 1.3: Optical Fiber Cable
SMF (Single-mode fiber) optical cable
This cable carries only a single beam of light. This is more reliable and supports much higher
bandwidth and longer distances than the MMF cable. This cable uses a laser as the light source
and transmits 1300 or 1550 nano-meter wavelengths of light.
NETWORK TOPOLOGIES:
A Network Topology is the arrangement with which computer systems or network devices are
connected to each other. Topologies may define both physical and logical aspects of the network.
Both logical and physical topologies could be the same or different in the same network.
Network Devices
Switch
A switch is a device in a computer network that connects other devices together. Multiple data
cables are plugged into a switch to enable communication between different networked devices.
Hub
Hub is commonly used to connect segments of a LAN (Local Area Network). A hub contains
multiple ports. When a packet arrives at one port, it is copied to the other ports so that all
segments of the LAN can see all packets. Hub acts as a common connection point for devices in
a network.
Topologies
Point-to-Point
Point-to-point networks contain exactly two hosts such as computers, switches or routers, servers
connected back to back using a single piece of cable. Often, the receiving end of one host is
connected to the sending end of the other and vice-versa.
Bus Topology
In the case of Bus topology, all devices share a single communication line or cable. Bus topology
may have problems while multiple hosts sending data at the same time. Therefore, Bus topology
either uses CSMA/CD technology or recognizes one host as Bus Master to solve the issue. It is
one of the simple forms of networking where a failure of a device does not affect the other
devices. But failure of the shared communication line can make all other devices stop
functioning.
Fig 1.7: Bus Topology
Both ends of the shared channel have a line terminator. The data is sent in only one direction and
as soon as it reaches the extreme end, the terminator removes the data from the line.
Star Topology
All hosts in Star topology are connected to a central device, known as hub device, using a point-
to-point connection. That is, there exists a point to point connection between hosts and hub. The
hub device can be any of the following:
● Layer-1 device such as hub or repeater
● Layer-2 device such as switch or bridge
● Layer-3 device such as router or gateway
Ring Topology
In ring topology, each host machine connects to exactly two other machines, creating a circular
network structure. When one host tries to communicate or send a message to a host which is not
adjacent to it, the data travels through all intermediate hosts. To connect one more host in the
existing structure, the administrator may need only one more extra cable.
Fig 1.9: Ring Topology
Failure of any host results in failure of the whole ring. Thus, every connection in the ring is a
point of failure. There are methods which employ one more backup ring.
Mesh Topology
In this type of topology, a host is connected to one or multiple hosts. This topology has hosts in
point-to-point connection with every other host or may also have hosts which are in point-to-
point connection to a few hosts only.
Tree Topology
Also known as Hierarchical Topology, this is the most common form of network topology in use
presently. This topology imitates the extended Star topology and inherits properties of bus
topology.
This topology divides the network into multiple levels/layers of the network. Mainly in LANs, a
network is bifurcated into three types of network devices. The lowermost is an access-layer
where computers are attached. The middle layer is known as the distribution layer, which works
as a mediator between upper layer and lower layer. The highest layer is known as the core layer,
and is the central point of the network, i.e. root of the tree from which all nodes fork.
OBJECTIVE:
Practically implement and test the cross-wired cable and straight through cable using clamping
tool and network lab cable tester
APPARATUS (COMPONENTS):
RJ-45 connector, Clamping Tool, Twisted pair Cable
DESCRIPTION:
Transmission media is a pathway that carries the information from sender to receiver. We use
different types of cables or waves to transmit data. Data is transmitted normally through
electrical or electromagnetic signals.
Wired or Guided Media or Bound Transmission Media: Bound transmission media the
cables that are tangible or have physical existence and are limited by the physical geography.
Popular bound transmission media in use are twisted pair cable, co-axial cable and fiber optical
cable. Each of them has its own characteristics like transmission speed, effect of noise, physical
appearance, cost etc.
It consists of colour-coded copper wires, but does not include any foil or braiding as insulator to
protect against interference.
Wire pairs within each cable have varied amounts of twists per foot to produce
cancellation. There are different categories of UTP.
The following table shows the UTP categories, the no. of pairs in each, and the grade of cable
each uses and how they are implemented.
The pairs are covered in a foil or braided mesh, as well as outer PVC jacket.
This foil or mesh prevents the penetration of electromagnetic noise and eliminate cross talk.
This shielding must be grounded to prevent the foil or braided mesh from becoming a magnet for
electricity.
STP is less susceptible to noise as compared to UTP and therefore reduces the cross talk and
interference.
Disadvantages of STP
1. It must be properly grounded.
3. It is difficult to terminate.
Coaxial Cable
Coaxial cable has two wires of copper. The core wire lies in center and is made of solid conductor.
Core is enclosed in an insulating sheath. Over the sheath the second wire is wrapped
around and that too in turn encased by insulator sheath. This all is covered by plastic cover.
Because of its structure coax cables are capable of carrying high frequency signals than that of
twisted pair cables. The wrapped structure provides it a good shield against noise and cross talk.
Coaxial cables provide high bandwidth rates of up to 450 mbps.
There are three categories of Coax cables namely, RG-59 (Cable TV), RG-58 (Thin Ethernet)
and RG-11 (Thick Ethernet. RG stands for Radio Government.
Cables are connected using BNC connector and BNC-T. BNC terminator is used to terminate the
wire at the far ends.
Fiber-Optics Cable
A cable with central glass tube covered with protective shield which transmit data using
photons is fiber optics cable. These cables transmit data via concentrated bursts of laser beams
which are carried through bundles of hair thin glass fibers.
They have advantages over electronic cables technology has revolutionized tele
communication Fiber optics cables as free from electro-magnetic transmission speed and
volume .This applications which used electronic. cables. interference as well as wire tapping
Unguided transmission media extend beyond the limiting confines of cabling. They provide
anexcellent Communication Networks alternative for WANS. The lack of physical restrictions
provides larger bandwidth as well as wide area capabilities. Unbound media typically operate at
very high frequencies. The three types of unbound transmission media are:
Radio wave.
Micro wave.
Infrared.
Radiowaves TransmissionAlthough Radio waves are prevalent and wellunderstood, we are just
beginning to realize their enormous potential as a networking medium. Radio waves can operate
on a single or multiple frequency bands
Radio waves are omni directional i.e. they travel in all the directions from the source. Because of
this property, transmitter and receiver need not to be aligned. Radio waves can penetrate
buildings easily, so they are widely use for communication both indoors outdoors.
At high frequencies, radio waves tends to travel in straight line and bounce off the obstacles.
They are also absorbed by rain. Radio waves is widely used for AM and FM radio, television,
cordless telephone, cellular phones, paging and wireless LAN.
Microwave Transmission
Microwaves have been used in data communications for a long time. They have a higher
frequency than radio waves and therefore can handle larger amounts of data.
Microwave transmission is line of sight transmission. The transmit station must be in visible
contact with the receive station. This sets a limit on the distance between stations depending on
the local geography. Typically the line of sight due to the Earth's curvature is only 50 km to the
horizon! Repeater stations must be placed so the data signal can hop, skip and jump across the
country. microwave circuits are considered a broad band communication channel.
Microwaves operate at high operating frequencies of 3 to 10 GHz. This allows them to carry
large quantities of data due to their large bandwidth
b. They can carry high quantities of information due to their high operating frequencies.
c. Low cost land purchase: each tower occupies only a small area.
Disadvantages of Microwaves
InfraRed.
Infrared offers a great unbound photonic solution. Like fiber-optic cabling, infrared
communications use light, so they are not bound by the limitations of electricity.
Crimping tool
A crimping tool is a tool designed to crimp or connect a connector to the end of a cable. For
example, network cables and phone cables are created using a crimping tool to connect the RJ-45
and RJ-11 connectors to the end of the cable. In the example below picture, this crimper is
capable of crimping a RJ-11 (6-Pin) and RJ-45 (8-Pin) connectors and also includes a wire cutter
near the handles that can be used to cut phone or CAT5 cable.
Fig 2.6 Crimping Tool
RJ-45 Connecter
The RJ-45 connector is a form of telephone connector. It sees its most frequent use as a
local-area network connector , and is frequently referred to simply as an Ethernet connector.
This connector is commonly used on a Token Ring network. BNC is also short for Bayonet
NutConnector or British Naval/Navy Connector although more appropriately known as
theBayonet Neill Concelman. In the picture to the right, is an example of a BNC connector on
the end of a coaxial cable.
OUTCOME:
Student will be able to understand the hardware components such as crimping tool and role of
RJ-45 connector in networking. They will also know the different transmission medium such as
co-axial cable, optical cable and twisted pair cable and how these cables are used with different
speeds in different networks.
OUTPUT:
Studied transmission media and Tools: Co-axial cable, UTP Cable, Crimping Tool, Connectors
etc.
RESULT: Understood the different transmission medium such as co-axial cable, optical cable
and twisted pair cable.
OBJECTIVE:
Study and familiarization with various network devices.
APPARATUS:
Hubs, Switches, Routers.
DESCRIPTION:
LAN Adapter:-
passive
active
Passive hubs do not amplify the electrical signal of incoming packets before broadcasting
themout to the network. Active hubs, on the other hand, do perform this amplification, as does
a different type of dedicated network device called a repeater. Some people use the terms
concentrator when referring to a passive hub and multiport repeater when referring to
anactive hub.
Network switch:-
A network switch (sometimes known as a switching hub) is a computer networking device that
is used to connect devices together on a computer network. A switch is considered more
advanced than a hub because a switch will only send a message to the device that needs or
[1]
requests it, rather than broadcasting the same message out of each of its ports.
A switch is a multi-port network bridge that processes and forwards data at the data link layer
(layer 2) of the OSI model. Some switches have additional features, including the ability to
route packets. These switches are commonly known as layer-3 or multilayer switches.
Fig 3.4: Switch
Router:-
Router: Routers are devices (computers) containing software that help in determining the
bestpath out of the available paths, for a particular transmission. They consist of a combination
of hardware and software. The hardware includes the physical interfaces to the various networks
in the internet work. The two main pieces of software in a router are the operating system and
the routing protocol.
Routers use logical and physical addressing to connect two or more logically separate networks.
They accomplish this connection by organizing the large network into logical network segments
or sub-networks. Each of these sub networks is given a logical address. This allows the networks
to be separate but still access each other and exchange data when necessary. Data is grouped into
packets, or blocks of data. Each packet, in addition to having a physical device address, has a
logical network address.
Routers are interconnectivity devices that are used to transfer the datum packets along networks
by visualizing the networks path. Routers visualizing the networks path to many networks such
as Electronic networks, Transport networks and phone networks. Two ways are exist for routers
operation using either control plane or forwarding plane. In control plane the router sends the
precise data packets to their specific location. On the other hand in forwarding plane router does
not remember the sending or receiving information about the packets.
Advantages of Routers
Routers route the data in an organized way. Routers generate a reliable connection between
hosts. Routers is used for alternatively incase the main is fail to transfer data.
OUTPUT:
Studied Networking Components and devices
OUTCOME:
Student will be able to understand all the network components and devices used in the
networking.
RESULT:
Understood various technological devices and its working
APPLICATION:
● Lan connection can be implemented with the help of these technologies.
● Selection of network devices and implementations in LAN connection.
EXPERIMENT NO. 4
OBJECTIVE:
Familiarization with Packet Tracer Simulation tool/any other related tool.
APPARATUS:
Computer, cross-platform visual simulation tool
DESCRIPTION:
Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows
users to create network topologies and imitate modern computer networks. The software allows
users to simulate the configuration of Cisco routers and switches using a simulated command
line interface. Packet Tracer makes use of a drag and drop user interface, allowing users to add
and remove simulated network devices as they see fit. The software is mainly focused towards
Certified Cisco Network Associate Academy students as an educational tool for helping them
learn fundamental CCNA concepts. Previously students enrolled in a CCNA Academy program
could freely download and use the tool free of charge for educational use.
Fig 4.1 Packet Tracker
We will just create a computer lab with the help of the cisco packet tracer and the ‘n’ no of
computers are connected with the help of switches and according to the no of computer required
the no of switches are being used
In the given example we are using the 26 computers to make the local area network in the lab.
Here we are using two switches because a switch can have 24 ports to be connected .
The lab looks like this after the connection of the computers to the switch
Fig 4.2:Switch Connection
Now we are having the work of assigning the I p address to all the computers connected to the
switch . we can assign the I p address by just clicking on the pc and the manual will come just
click on the I p configuration then assign the I p address to the pc .
We will assign the ip address in the static form. after assigning the I p address to the computer it
will automatically generate the subnet mask of the computer itself .
OUTCOME:
Students will be able to familiarize with the Packet Tracer Simulation tool/any other related tool.
APPLICATION:
● Lan connection can be implemented with the help of these technologies.
● Selection of network devices
● Wireless connection
EXPERIMENT NO. 5
OBJECTIVE:
Study and Implementation of IP Addressing Schemes
APPARATUS:
Computers, Class Addressing Knowledge.
DESCRIPTION:
IP Address Classes:-
● IP addressing supports C,five D and E. Only different classes A, B and address C are
available for commercial use.
Class A addresses
Class A addresses are designed for large organizations with a large number of hosts or routers.
1. In this the first octet of the address identifies the network and the next three octets are used
to identify the host.
2. The first bit of the first octet is always 0 and the remaining 7 bits are used to identify the
network address.
3. The next three octets i.e. 24 bits are used to identify the host.
4. The class supports addresses from 0.0.0.0 to 0.255.255.255.
5. The first block of network addresses starts with 1.0.0.0 and the last block of
network address starts with 127.0.0.0.
6. As there are 7 bits in the network address, 27 = 128 blocks of network address are
possible. Out of these two network blocks are reserved. Hence total 126 address blocks
are used.
7. Each network block can have 224--- 2 hosts i.e. 16,777,214 host addresses. Two addresses
are less as one address is reserved for the broadcast address and one address is reserved
for the network.
8. A block in class A is too large for almost any organization. This means most of
the addresses in class A are wasted and are not used.
Class B address
1. The class B addresses are designed for medium sized organizations with tens of
thousands of attached hosts or routers.
2. In this, the first two octets of the address identify the network and the next two
octets identify the host within the network.
3. The first two bits (high order bits) of the first octet are always 1, 0. Thus the remaining
14 bits identify the network.
4. The third and fourth octet i.e. 6 bits are used to identify the hosts.
5. The first network block of this class covers the addresses from 128.0.0.0 to 128.0.255.255
(net id 128.0). The last network block of this class covers addresses from
191.255.255.255.
6. The maximum number of network blocks in class B is 214 = 16384.
7. Each network block in class B can have 216--- 2 = 65,534 hosts.
8. A block in class B is also very large and most of the address in class B is also wasted.
Class C address
1. The class C addresses is designed for small organizations with a small number of
attached hosts or routers.
2. In class C, the first three octets of address are used for network and the last octet is used to
identify the host.
3. The first three bits of first octet are always set to 1, 1,0.
4. The remaining 24 – 3 = 21 bits are used for network identification and only 8 bits are
used for host.
5. In class C, 221 = 2,097,152 network blocks are possible.
6. Thus, each block in class C address can have 28– 2 = 254 hosts.
7. The first block of network covers addresses from 192.0.0.0 to 192.0.0.255.
8. The class C addresses are too less for many organizations as it supports only 254 hosts in
a network.
CLASS
ES Range
1.0.0.0to
Class A 127.255.255.255
128.0.0.0 to
Class B 191.255.255.255
192.0.0.0 to
Class C 223.255.255.255
224.0.0.0 to
Class D 239.255.255.255
Class D address
2. The concept of division of octets into network id and host id does not apply to class D.
3. The first four bits of the first octet in class D are always set to 1,1,1,0.
2. The concept of network id and host id does not apply on class E also.
3. The first four bits of first octet are always set to 1,1,1,1.
OUTCOME:
Student will be able to understand how to design a network with various class ranges.
Class A,B and C IP addresses can be used to implement the network whereas class D is used for
multicasting with broadcasting while class E is reserved for the researchers.
APPLICATION:
Suppose you want to design a network for an organization then you must be aware of IP
addresses range. Most important question is what is the size of the organization? If it is very
much big in size then class A IP addresses are used; if it is medium in size then class B IP
addresses can be used on the other hand if it is small in size then class C IP addresses can be
used.
RESULT:
Designed and implemented Class A, B, and C Networks
OUTPUT:
Explored the knowledge of computer networks by designing different class networks with
different IP ranges.
EXPERIMENT NO. 6
OBJECTIVE:
Creation of Simple Networking topologies using hubs and switches
APPARATUS:
Computer, hub, switch
PRINCIPLE:
1. Repeater:Functioning at Physical Layer.A repeater is an electronic device that receives
a signal and retransmits it at a higher level and/or higher power, or onto the other side of
an obstruction, so that the signal can cover longer distances. Repeater have two ports ,so
cannot be use to connect for more than two devices.
2. Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator is a
device for connecting multiple twisted pair or fiber optic Ethernet devices together and
making them act as a single network segment. Hubs work at the physical layer (layer 1)
of the OSI model. The device is a form of multiport repeater. Repeater hubs also
participate in collision detection, forwarding a jam signal to all ports if it detects a
collision.
4. Bridge: A network bridge connects multiple network segments at the data link layer
(Layer 2) of the OSI model. In Ethernet networks, the term bridge formally means a
device that behaves according to the IEEE 802.1D standard. A bridge and switch are very
much alike; a switch being a bridge with numerous ports. Switch or Layer 2 switch is
often used interchangeably with bridge.Bridges can analyze incoming data packets to
determine if the bridge is able to send the given packet to another segment of the
network.
5. Router: A router is an electronic device that interconnects two or more computer
networks, and lectively interchanges packets of data between them. Each data packet
contains address information that a router can use to determine if the source and
destination are on the same network, or if the data packet must be transferred from one
network to another. Where multiple routers are used in a large collection of
interconnected networks, the routers exchange information about target system addresses,
so that each router can build up a table showing the preferred paths between any two
systems on the interconnected networks.
6. Gate Way: In a communications network, a network node equipped for interfacing
with another network that uses different protocols. • A gateway may contain devices such
as protocol translators, impedance matching devices, rate converters, fault isolators, or
signal translators as necessary to provide system interoperability. It also requires the
establishment of mutually acceptable administrative procedures between both networks.
Step 1: Connect the switch to the LAN. a. Using the proper cable, connect the
FastEthernet0/0 on Customer Router to the FastEthernet0/1 on Customer Switch. b.
Using the proper cable, connect the Customer PC to the Customer Switch on port
FastEthernet0/2. c. Using the proper cable, connect the Local Server to the Customer
Switch on port FastEthernet0/3.
Step 2: Verify the switch configuration. a. From the Customer PC, use the terminal
emulation software to connect to the console of the customer Cisco Catalyst 2960 switch.
b. Use the console connection and terminal utility on the Customer PC to verify the
configurations.
Use cisco as the console password. c. Enter privileged EXEC mode and use the show
running-config command to verify the following configurations.
The password is cisco123.
a. VLAN1 IP address = 192.168.1.5
b. Subnet mask = 255.255.255.0
c. Password required for console access
d. Password required for vty access
e. Password enabled for privileged EXEC mode f. Secret enabled for privileged EXEC
mode
f. Verify IP connectivity between the Cisco Catalyst 2960 switch and the Cisco 1841
router by initiating a ping to 192.168.1.1 from the switch CLI.
g. Click the Check Results button at the bottom of this instruction window to check your
work.
Fig 6.1 Creation of network
OUTCOME:
Student will be able to understand how an own private network can be implemented and
how it works.
RESULT:
Studied various LAN topologies and their creation using network devices, cables and
computers
OUTPUT:
Understanding how an own private network can be implemented and how it works.
APPLICATION: