Computer Network Lab
Computer Network Lab
Computer Network Lab
Class: Second
Year IT Course
Code:20UIT409L
Course Title: Computer Network
Semester: IV
Faculty Name: Ansari Mohsin Hafeez
i
Practical Record
Name of Student: Yashraj Mahesh Mohrir
This is to certify that Mr. Yashraj Mahesh Mohrir of Class SY-IT Roll
No.202001106039 has performed the workbook exercises mentioned above in the
premises of institution.
ii
1. Study of network devices:
Introduction:
Hardware devices that are used to connect computers,
printers, fax machines and other electronic devices to a
network are called network devices. These devices
transfer data in a fast, secure and correct way over same
or different networks. Network devices may be inter-
network or intra-network. Some devices are installed on
the device, like NIC card or RJ45 connector, whereas
some are part of the network, like router, switch, etc.
Network devices, or networking hardware, are physical
devices that are required for communication and
interaction between hardware on a computer network.
Description:
1. Repeater:Functioning at Physical Layer.Arepeater is an
electronic device that receives a signal and retransmits it
at a higher level and/or higher power, or onto the other
side of an obstruction, so that the signal can cover longer
distances. Repeater have two ports ,so cannot be use to
connect for more than two devices
iii
segment. Hubs work at the physical layer (layer 1) of the
OSI model. The device is a form of multiport repeater.
Repeater hubs also participate in collision detection,
forwarding a jam signal to all ports if it detects a collision.
Demonstration:
Binary format like as (0s and 1s) bits form that is easily understandable by
machines, and packets which are group of these bits, they traverse over the
network. Entire mechanism through those series of packets transmits over the
network that is managed by the IP (Internet Protocol).
End devices such as (PC, laptop or phone) which generate the few sequences
of data into Bit form and then IP always ready to send these packets to further
processing. If, massive amount of information to be broadcasted then huge
amount of bit are required for sending along with packets format.
v
All IP (Internet Protocol) packets are transmitted along with their paths
across the network, then router has responsible for getting to packet routing
to destination point.
While sending and receiving all data packets, each device appends the IP
address with these packets; IP address means unique address like as your
postal house address. The main goal of IP address like as postal address, it
means it identifies the sender and receiver over the network.
So, router has the all information that which path is better to send packets
across network. This information is stores into routing table, but before
sending any packet, it takes the decision that route is OK for forwarding
them, and this processing is known as the “Routing Process“.
Router has own ports or other interfaces which are getting to make interface
along with other connected network devices. Interfaces help to make
communication with links that are used for packet forwarding. Links means
that cable, fiber or even wireless.
When packet reaches on the interface, then router must be known that
which interface is needed to use for sending out the packet.
Router monitors the Routing Table which has entries related to every
aware to Destination point.
Every Routing Entry holds the destination address and address of
further device on path known Next HOP device.
vi
Then, existing NEXT HOP address, router has capable to check the
outgoing interface and ready to sends the packets.
Conclusion:
With a solid knowledge of the types of network devices, you can
develop and build a secure network that is good for your company.
Nonetheless, you need to carefully monitor your network devices and
behaviour around them to ensure continued safety and reliability of
your network in order to identify hardware problems, problems with
configuration and attacks quickly.
Description:
There are three types of IP addresses used in a network:
vii
Network Address:This is the first IP address in the network. This
Demonstration:
Classification of IP address As show in figure we teach how the ip
addresses are classified and when they are used.
Sub netting Why we Develop sub netting and How to calculate subnet mask and
how to identify subnet address.
vii
i
Super netting Why we develop super netting and How to calculate supernet mask
and how to identify supernet address.
Conclusion:
In essence, IP addresses are the identifier that allows information
to be sent between devices on a network: they contain location
information and make devices accessible for communication.
Introduction:
A LAN may be wired, wireless, or a combination of the two. A standard
wired LAN uses Ethernet to connect devices together. Wireless LANs are
typically created using a Wi-Fi signal. If a router supports both Ethernet and
Wi-Fi connections, it can be used to create a LAN with both wired and
wireless devices. A local area network (LAN) consists of a series of
computers linked together to form a network in a circumscribed location.
The computers in a LAN connect to each other via TCP/IP ethernet or Wi-
Fi. A LAN is normally exclusive to an organization.
Description:
Stands for "Local Area Network" and is pronounced "lan." A
LAN is a network of connected devices that exist within a
specific location. LANs may be found in homes, offices,
educational institutions, and other areas.
A LAN may be wired, wireless, or a combination of the two. A
standard wired LAN uses Ethernet to connect devices
together. Wireless LANs are typically created using a Wi-
Fi signal. If a router supports both Ethernet and Wi-Fi
ix
connections, it can be used to create a LAN with both wired
and wireless devices.
Most residential LANs use a single router to create the
network and manage all the connected devices. The router
acts as the central connection point and enables devices,
such as computers, tablets, and smartphones to communicate
with each other. Typically, the router is connected to
a cable or DSL modem, which provides Internet access to
connected devices.
A computer may also be the central access point of a LAN. In
this setup, the computer acts as a server, providing connected
machines with access to files and programs located on the
server. It also includes LAN software used to manage the
network and connected devices. LAN servers are more
common in business and educational networks, since the
extra capabilities are not required by most home users. In a
server-based LAN, devices may connect directly to the server
or indirectly via a router or switch.
Demonstration:
On the host computer, follow these steps to share the Internet connection:
1. Log on to the host computer as Administrator or as Owner.
2. Click Start, and then click Control Panel.
3. Click Network and Internet Connections.
4. Click Network Connections.
5. Right-click the connection that you use to connect to the Internet. For
example, if you connect to the Internet by using a modem, right-click the
connection that you want under Dial-up / other network available.
6. Click Properties.
7. Click the Advanced tab.
x
8. Under Internet Connection Sharing, select the Allow other network users
to connect through this computer's Internet connection check box. 9. If you
are sharing a dial-up Internet connection, select the Establish a dial-up
connection whenever a computer on my network attempts to access the
Internet check box if you want to permit your computer to automatically
connect to the Internet.
10. Click OK. You receive the following message: When Internet
Connection Sharing is enabled, your LAN adapter will be set to use IP
address 192.168.0. 1. Your computer may lose connectivity with other
computers on your network. If these other computers have static IP
addresses, it is a good idea to set them to obtain their IP addresses
automatically. Are you sure you want to enable Internet Connection
Sharing?
11. Click Yes. The connection to the Internet is shared to other computers
on the local area network (LAN). The network adapter that is connected to
the LAN is configured with a static IP address of 192.168.0. 1 and a subnet
mask of 255.255.255.0 On the client computer
To connect to the Internet by using the shared connection, you must
confirm the LAN adapter IP configuration, and then configure the client
computer. To confirm the LAN adapter IP configuration, follow these steps:
1. Log on to the client computer as Administrator or as Owner.
2. Click Start, and then click Control Panel.
3. Click Network and Internet Connections.
4. Click Network Connections.
5. Right-click Local Area Connection and then click Properties.
6. Click the General tab, click Internet Protocol (TCP/IP) in the connection
uses the following items list, and then click Properties.
7. In the Internet Protocol (TCP/IP) Properties dialog box, click Obtain an IP
address automatically (if it is not already selected), and then click OK.
Note: You can also assign a unique static IP address in the range of
192.168.0.2 to 254. For example, you can assign the following static IP
address, subnet mask, and default gateway:
xi
8. IP Address 192.168.31.202
9. Subnet mask 255.255.255.0
10. Default gateway 192.168.31.1
11. In the Local Area Connection Properties dialog box, click OK.
12. Quit Control Panel.
xii
4.Study of basic network commands and
basic configuration commands:
Introduction:
The operating system consists of various built-in, command-line networking
utilities that are used for network troubleshooting. We will see various
networking commands which are most essentials for every network
administrator.
Demonstration:
xii
i
Traceroute: Tracert is a command which can show you the path a
packet of information takes from your computer to one you specify. It
will list all the routers it passes through until it reaches its destination,
or fails to and is discarded. In addition to this, it will tell you how long
each 'hop' from router to router takes.
xi
v
nslookup: Displays information from Domain Name System (DNS)
name servers. NOTE :If you write the command as above it shows as
default your pc's server name firstly.
pathping: A better version of tracert that gives you statics about
packet lost and latency.
xv
Getting Help In any command mode, you can get a list of available
commands by entering a question mark (?). Router>? To obtain a list
of commands that begin with a particular character sequence, type in
those haracters followed immediately by the question mark (?).
Router#co? configure connect copy To list keywords or arguments,
enter a question mark in place of a keyword or argument. Include a
space before the question mark. Router#configure ? memory
Configure from NV memory network Configure from a TFTP network
host terminal Configure from the terminal You can also abbreviate
commands and keywords by entering just enough characters to make
the command unique from other commands. For example, you can
abbreviate the show command to sh. Configuration Files Any time
you make changes to the router configuration, you must save the
changes to memory because if you do not they will be lost if there is a
system reload or power outage. There are two types of configuration
files: the running (current operating) configuration and the startup
configuration. Use the following privileged mode commands to work
with configuration files.
xv
i
Experiment no. 5
Introduction - The IP header has 32 bits assigned for addressing a
desired device on the network. An IP address is a unique identifier used to
locate a device on the IP network. To make the system scalable, the
address structure is subdivided into the network ID and the host ID.
xv
ii
Step 4: Verify the addressing configuration. a. Test connectivity
between HostA, HostB, ISP Workstation, and ISP Server. You can use
the Add Simple PDU tool to create pings between the devices. You can
also click HostA or HostB, then the Desktop tab, and then Command
Prompt. Use the ping command to test connectivity to other devices.
To obtain the IP address of another device, place your mouse pointer
over the device. b. Check results. On the Connectivity Tests tab, the
status of each test should be successful.
xv
iii
Experiment no 6 - Static and dynamic routing
Introduction - Static routing and dynamic routing are two methods used
to determine how to send a packet toward its destination.
Description -
Demonstration –
Step 1: Test Connectivity Using Static and Default Routing. Open a Command Prompt on PC0.
Trace (tracert) a connection to the Edge1 FastEthernet 0/0 address. This should be successful.
Step 2: Bring down Frame Relay Network and Observe Routing. On the BR2 router, shutdown
the link to the Frame Relay network.
Step 3: Configure Dynamic Routing and Observe Routing a. Configure EIGRP (AS 10) on the BR2
and ISP2 routers. Be sure to include all directly connected networks and turn off auto-summary.
b. Do a third trace from PC0 to the Edge1 FastEthernet 0/0 interfaces.
xi
x
conclusion –
Static routing provides some advantages over dynamic routing, including:
Static routes are not advertised over the network, resulting in better security.
Static routes use less bandwidth than dynamic routing protocols, as routers do not exchange
routes.
No CPU cycles are used to calculate and communicate routes.
The path a static route uses to send data is known.
xx
Experiment no 7 – Demonstration of Wire shark
It is used to track the packets so that each one is filtered to meet our specific needs. It is
commonly called as a sniffer, network protocol analyzer, and network analyzer. It is
also used by network security engineers to examine security problems.
Wireshark is a free to use application which is used to apprehend the data back and
forth. It is often called as a free packet sniffer computer application. It puts the network
card into an unselective mode, i.e., to accept all the packets which it receives.
Description –
Uses of Wireshark:
What is a packet?
A packet is a unit of data which is transmitted over a network between the origin and
the destination. Network packets are small, i.e., maximum 1.5 Kilobytes for Ethernet
packets and 64 Kilobytes for IP packets. The data packets in the Wireshark can be
viewed online and can be analyzed offline.
. There are around 600 contributed authors for the Wireshark product website.
xx
i
Functionality of Wireshark:
Wireshark is similar to tcpdump in networking. Tcpdump is a common packet analyzer
which allows the user to display other packets and TCP/IP packets, being transmitted
and received over a network attached to the computer. It has a graphic end and some
sorting and filtering functions. Wireshark users can see all the traffic passing through the
network.
Wireshark can also monitor the unicast traffic which is not sent to the network's MAC
address interface. But, the switch does not pass all the traffic to the port. Hence, the
promiscuous mode is not sufficient to see all the traffic. The various network taps
or port mirroring is used to extend capture at any point.
Features of Wireshark
o It is multi-platform software, i.e., it can run on Linux, Windows, OS X, FreeBSD, NetBSD,
etc.
o It is a standard three-pane packet browser.
o It performs deep inspection of the hundreds of protocols.
o It often involves live analysis, i.e., from the different types of the network like the
Ethernet, loopback, etc., we can read live data.
o It has sort and filter options which makes ease to the user to view the data.
o It is also useful in VoIP analysis.
o It can also capture raw USB traffic.
o Various settings, like timers and filters, can be used to filter the output.
Demonstration -
xx
ii
o Select the Windows installer according to your system configuration, either 32-bt or 64-
bit. Save the program and close the browser.
o Now, open the software, and follow the install instruction by accepting the license.
o The Wireshark is ready for use.
On the network and Internet settings option, we can check the interface connected to
our computer.
If you are Linux users, then you will find Wireshark in its package repositories.
By selecting the current interface, we can get the traffic traversing through that
interface. The version used here is 3.0.3. This ver
xx
iii
sion will open as:
The Wireshark software window is shown above, and all the processes on the network
are carried within this screen only.
The options given on the list are the Interface list options. The number of interface
options will be present. Selection of any option will determine all the traffic. For
xx
iv
example, from the above fig. select the Wi-Fi option. After this, a new window opens
up, which will show all the current traffic on the network. Below is the image which tells
us about the live capture of packets and our Wireshark will look like:
xx
v
Conclusion - Wireshark interactively examines and investigates data from http requests,
Cookies, Forms, Ethernet, Token-Ring, FDDI, live network, or a captured file. It can easily
decipher data and displays it as clear as possible. It does contain some powerful features like
TCP Stream which allows viewing reconstructed stream of TCP session and it also has the
capability to monitor UDP and SSL streams.
It's basically a quick, easy way to verify that you can reach a
destination on the internet. If you can, great! If not, you can use
traceroute to investigate what's happening at every step
between your device and the destination.
xx
vii
Then another 3 datagrams are sent, with the TTL set to 2,
causing the second router (your ISP) in the path to respond with
an ICMP TEM.
Demonstration –
xx
vii
Step 1: Test connectivity using ping from a host computer and a router.
Click N-Host, click the Desktop tab, and then click Command Prompt.
From the Command Prompt window, ping the Cisco server at
www.cisco.com. Packet Tracer PC Command Line 1.0 PC>ping
www.cisco.com Pinging 64.100.1.185 with 32 bytes of data: Request
timed out.
Step 3: Practice
the ping and trace route commands. Throughout
this course, you will often use ping and traceroute to test
connectivity and troubleshoot problems. To practice these
commands, ping and trace from W-Host and S-Host to any other
destination in the network. You can also ping and trace from N-
Branch to other locations.
Conclusion - Ping and Traceroute seem like cousins, as both of them can be
used to test the status of the destination server. However, Ping is an easier and
quicker method to check the destination server’s utility, as well as how long it
should take to receive and send data to the specific server. In contrast, the
traceroute searches for the “exact route” taken to connect with a server and the
hop (, i.e. time spent by each step) between points and the next.
xx
ix
xx
x
xx
xi