Dypiu: Lab Manual
Dypiu: Lab Manual
Lab Manual
Mission
– To provide a diverse, vibrant and inspirational learning
environment.
– To establish the university as a leading experiential
learning and research-oriented center.
– To Become a responsive university serving the needs of
industry and society.
– To embed internationalization, employability and value
thinking.
Course Outcomes:
– On completion of the course, learner will be able to
– CO1: Summarize the fundamental concepts of computer network,
topologies, – CO2: Illustrate the working functions of physical and
data link layer.
– CO3: To illustrate different routing algorithms.
– CO4: Implement client server application.
– CO5: Illustrate any one automation system using cisco packet tracer.
CERTIFICATE
This is to certify that Mr. Pratik Tangadpalliwar PRN No. 20220802368 of B. tech CSE Class
has completed practical in the course of Computer Networks Second Year, within DYPIU Akurdi,
Pune during the academic year 2023 - 2024.
Theory:
1) Ring Topology -
– Objective: Build a network with a ring topology.
– Topology: Connect multiple PCs or switches in a circular configuration, ensuring
that each node has exactly two neighbors.
– Configuration: Configure IP addresses for devices. Test connectivity by sending
data packets around the ring.
2) Star Topology -
– Objective: Build a network with a Star topology.
– Topology: Connect multiple PCs or switches to a central switch or router.
– Configuration: Assign IP addresses to devices. Test connectivity between devices
and the central switch/router.
4) Mesh Topology
– Objective: Implement a network with a mesh topology.
– Topology: Create a fully connected mesh network where every node is connected
to every other node.
– Configuration: Assign IP addresses to devices. Test connectivity between any
two nodes within the mesh.
5) Hybrid Topology -
– Objective: Design a network with a hybrid topology.
– Topology: Combine elements of different topologies such as star, ring, and mesh
to form a hybrid network.
– Configuration: Configure IP addresses for devices. Test connectivity and analyze
the advantages of the hybrid approach.
Steps:
1. Take the required amount of switch and end devices to represent respective
topology.
2. Connect them using the respective type of connector required.
3. Assign IP to every end device.
4. Use CPT protocol data unit to check the connection is properly established or
not.
Conclusion:
Theory:
Output:
1. Email
2. FTP
Conclusion:
Through these lab exercises, I gained practical experience in configuring and
managing essential network services such as DHCP, Email, and Web servers using
Cisco Packet Tracer. This hands-on approach will deepen my understanding of
server administration principles and prepare them for real-world deployment and
maintenance of network services.
Theory:
1: Basic Device Configuration
Objective: Familiarize students with different networking devices and their physical
characteristics.
Topology: Create a simple network topology with devices such as routers, switches,
PCs, and servers.
Configuration: Drag and drop various devices onto the workspace. Examine the
physical attributes of each device, including ports, interfaces, LEDs, and chassis.
Output:
Conclusion:
Through these lab exercises, I gained practical experience in understanding the
physical view of networking using Cisco Packet Tracer. By exploring devices,
cables, racks, and documentation tools, students will develop a solid foundation in
network hardware and physical infrastructure. This hands-on approach will prepare
them for real-world scenarios in network design, implementation, and maintenance.
Theory:
1: Static Routing
– Configuration Objective: Configure static routes to establish network
communication between multiple networks.
– Topology: Create a network topology with multiple routers and subnets. Ensure
each network is connected to a router.
– Configuration: Configure static routes on routers. Test connectivity between
devices in different networks by sending packets or using ping commands.
Output:
Theory:
Wireshark
– Wireshark is a packet sniffer and analysis tool. It captures network traffic from
ethernet, Bluetooth, wireless (IEEE.802.11), token ring, and frame relay
connections, among others, and stores that data for offline analysis.
– Note: A “packet” is a single message from any network protocol (e.g., TCP,
DNS, etc.).
– LAN traffic is in broadcast mode, meaning a single computer with Wireshark can
see traffic between two other computers. To see traffic to an external site, you
need to capture the packets on the local computer.
– Wireshark allows you to filter the log before the capture starts or during analysis,
so you can narrow down and zero in on what you’re looking for in the network
trace. For example, you can set a filter to see TCP traffic between two IP
addresses, or you can set it only to show you the packets sent from one computer.
The filters in Wireshark are one of the primary reasons it has become the
standard tool for packet analysis.
Download: http://www.wireshark.org/download.html
Socket Programming
– Sockets and the socket API are used to send messages across a network. They
provide a form of inter-process communication (IPC). The network can be a
logical, local network to the computer, or one that’s physically connected to an
external network, with its own connections to other networks.
– A network socket is an endpoint of an inter-process communication flow across a
computer network. Sockets may communicate within a process, between
processes on the same machine, or between processes on different continents.
Today, most communication between computers is based on the internet
protocol; therefore most network sockets are internet sockets. To create a
connection between machines, Python programs import the socket module,
create a socket object, and call the object’s methods to establish connections and
send and receive data. Sockets are the endpoints of a bidirectional
communications channel.
Server Code:
Network/Packets Analysis
– Wireshark shows you three different panes for inspecting packet data. The Packet
List, the top pane, lists all the packets in the capture. When you click on a packet,
the other two panes change to show you the details about the selected packet.
You can also tell if the packet is part of a conversation. Here are details about
each column in the top pane:
– No.: This is the number order of the packet captured. The bracket indicates that
this packet is part of a conversation.
– Time: This column shows how long after you started the capture this particular
packet was captured. You can change this value in the Settings menu to display a
different option.
➢ Source: This is the address of the system that sent the packet.
➢ Destination: This is the address of the packet destination.
➢ Protocol: This is the type of packet. For example: TCP, DNS, DHCPv6, or Arp.
➢ Length: This column shows you the packet’s length, measured in bytes.
Output:
Client Side
Server Side
Wireshark
Conclusion:
This lab offered a fascinating glimpse into the inner workings of network communication.
We delved into two powerful tools:
– Socket Programming: We explored the low-level mechanisms that applications use to
establish connections, exchange data, and control communication flows across
networks. By manipulating sockets, we gained a deeper appreciation for the
complexities involved in sending and receiving data over a network.
– Wireshark: This network protocol analyser acted as our window into the invisible world
of network traffic. We learned to capture, dissect, and analyse packets, allowing us to
visualize the data flowing between devices and troubleshoot potential network issues.