DCCN - Lab Course - Mannual
DCCN - Lab Course - Mannual
(Affiliated to Osmania University; Accredited by NBA(AICTE) and NAAC(UGC), ISO Certified 9001:2015)
GANDIPET, HYDERABAD – 500 075
Course File
B.E. VI Semester
Index
Sl. No. Name of the Experiment Page No.
1 Institute & Department Vision & Mission
Course Outcomes
2 I-VII
CO-Mapping, Matrix-Syllabus
3 Lesson Plan- Attainments -Targets
5 TLP- Unit - (I-V) 1-76
6 Lab Internal ( 1&2) Exam Paper 77-80
7 Lab External Exam Paper 81-82
8 Internal & CIE Lab Marks 83-87
Department of Computer Science and Engineering, CBIT, Hyderabad-75
BE VI Sem. (CSE1,CSE-2,CSE-3) (2020-21)
Subject:Data Communication and Computer Networks Lab Code: 18CSC23
Internal CO External CO
Attainment (CIE) Attainment(SEE)
@ 70%' of
CIE @30%' of
SEE SEE Direct
CO Attainm CIE
Attainment attainmen Attainment
ent Attainment
t
CO1 2.88 0.860 2.96 2.070 2.930 #REF! #REF! #REF!
CO2 2.88 0.860 2.96 2.070 2.930 #REF! #REF! #REF!
CO3 2.88 0.860 2.96 2.070 2.930 #REF! #REF! #REF!
CO4 2.88 0.860 2.96 2.070 2.930
#REF! #REF! #REF!
CO5 1.59 0.480 1.61 1.130 1.610
#REF! #REF! #REF!
CO6 2.88 0.860 2.96 2.070 2.930
#REF! #REF! #REF!
feedback
ii.Unguided media(wireless)
GUIDED MEDIA:
Guided media is also called as wired media. It uses a system that guides the data signals along a
specific path. Signals being transmitted are directed and confined in a narrow pathway by using
physical links.
Features: High speed, secure, used for comparatively shorter
distances There are 3 types of guided media:
2
Twisted pair cable is of two types:
Shielded twistedpaircable:
It consists of special jacket to block external interface. It is used in fast data rate Ethernet and in
voice and data channels of telephone lines. It is bulky.
Disadvantages
o It is more expensive as compared to UTP and coaxialcable.
o It has a higher attenuationrate
Un Shielded Twistedpaircable:
This type of cable has the ability to block interface and does not depend on a physical shield for this
purpose.
Advantages:
o Leastexpensive.
o Easy toinstall
o Short distance transmission due toattenuation
3
b) Coaxial cable:
It has an outer plastic covering containing 2 parallel conductors eachhaving a separate insulated
protection cover. The coaxial cable transmits information in 2 modes :
1) Baseband Mode - dedicated cable bandwidth
2) Broadband mode - bandwidth is split intoseparate ranges
Cable TV‘s and analog television networks use coaxial cables.They transmit signals over large
distances at higher speed as compared to twisted cables.
Advantages:
1. HighBandwidth
2. Better noiseimmunity
3. Easy to install andexpand
4. Inexpensive
c) Optical Fiber:
It uses the concept of reflection of light through a core made up of glass or plastic.
It is a transparent and flexible fiber made up of glass, which carries information in the form of light
pulses from one end to another. Fiber optics is used for long distance and high performance
network.Used in internet, telephone and television.
Core is surrounded by less dense glass or plastic covering called the cladding. Used to transfer large
volumes of data. It can be uni-directional or bi-directional.
4
Basic elements of Fiber optic cable:
o Core: The optical fiber consists of a narrow strand of glass or plastic known as a core. A core is a light
transmission area of the fiber. The more the area of the core, the more light will be transmitted into thefibre.
o Cladding: The concentric layer of glass is known as cladding. The main functionality of the cladding is
to provide the lower refractive index at the core interface as to cause the reflection within the core so that the
light waves are transmitted through thefibre.
o Jacket: The protective coating consisting of plastic is known as a jacket. The main purpose of a jacket is
to preserve the fiber strength, absorb shock and extra fiberprotection.
ii) UNGUIDEDMEDIA
An unguided transmission transmits the electromagnetic waves without using any physical medium.
Therefore it is also known as wireless transmission. In unguided media, air is the media through
which the electromagnetic energy can floweasily.
Unguided transmission is broadly classified into three categories:
i) Radiowaves:
Radio waves are electromagnetic waves and are omnidirectional. When an antenna transports radio
waves they are propagated in all directions in free space which means the sending and receiving
antennas do not have to be aligned that is any receiving antenna canreceive that transmitted wave.
The frequency of radio waves about 30 hertz (Hz) to 300 gigahertz (GHz) and like all other
electromagnetic waves radio waves travel at the speed of light in vacuum.
5
Applications of Radio waves
These waves are omnidirectional so they are useful for multicasting in which one sender
but manyreceivers.
Examples of radio waves are television, AM and FM radio, cordless phones,andpaging.
Advantages anddisadvantages
Radio waves are easy to generate and penetrate buildings also can travel long distances.
Radio waves cover a large area and can penetrate the buildings. By this, an AM radio can receive
signals inside abuilding.
This can also be disadvantageous because we cannot isolate a communication just inside or outside a
building. Cause of this, governments strictly legislate theuse of radio transmitters.
ii) Microwaves:
Micro Waves includes a line of sight transmission that is the sending and receiving antennas that
need to be properly aligned with each other. The distance is directly proportional to the height of the
antenna which is covered by the signal. In mobile phone communication and television distribution,
these are majorly used.
Microwave Transmission
2. SatelliteMicrowave
6
iii) Infrared waves:
The frequency of Infrared waves is about 300 GHz to 430 THz, which can be used for short-range
communication. Infrared waves of high frequencies cannot penetrate walls. This characteristic of
Infrared waves prevents interference between one system and another. This means a short-range
communication system in a room cannot be affected by another system in the adjacent room.
If we are using the infrared remote control, we do not interfere with the use of the remote by our
neighbors. However, by this characteristic, infrared signals become useless for long-range
communication. Also, we cannot use infrared waves outside a building because the sun's rays
contain infrared waves that can interfere with communication.
NETWORKDEVICES
Hardware devices that are used to connect computers, printers, fax machines and other electronic
devices to a network are called network devices. These devices transfer data in a fast, secure and
correct way over same or different networks. Network devices may be inter-network or intra-
network. Some devices are installed on the device, like NIC card or RJ45 connector, whereas some
are part of the network, like router, switch, etc. Let us explore some of these devices in greater
detail.
1. REPEATER
A repeater operates at the physical layer. Its job is to regenerate the signal over the same network
before the signal becomes too weak or corrupted so as to extend the length to which the signal can
be transmitted over the same network. An important point to benotedabout repeaters is that they do
not amplify the signal. When the signal becomes weak, they copy the signal bit by bit and regenerate
it at the original strength. It is a 2 port device.
Repeaters are network devices operating at physical layer of the OSI model that amplify or
regenerate an incoming signal before retransmitting it. They are incorporated in networks to expand
its coverage area. They are also known as signal boosters.
7
2. HUB
A hub is basically a multiport repeater. A hub connects multiple wires coming from different
branches, for example, the connector in star topology which connects different stations.
Hubs cannot filter data, so data packets are sent to all connected devices. Inotherwords, collision
domain of all hosts connected through Hub remains one. Also, they do not have the intelligence to
find out best path for data packets which leads to inefficiencies and wastage.
Types of Hub
Active Hub: -These are the hubs which have their own power supply and can clean, boost, and relay the
signal along with the network. It serves both as a repeater as well as wiring centre. These are used to extend
the maximum distance betweennodes.
Passive Hub: -These are the hubs which collect wiring from nodes and power supply fromactive hub.
These hubs relay signals onto the network without cleaning and boosting them and can‘t be used to extend
the distance betweennodes.
Intelligent Hub: -It work like active hubs and include remote management capabilities. They also
provide flexible data rates to network devices. It also enables an administrator tomonitor the traffic passing
through the hub and to configure each port in thehub.
3. BRIDGE
A bridge operates at data link layer. A bridge is a repeater, with add on the functionality of
filtering content by reading the MAC addresses of source and destination. It is also used for
interconnecting two LANs working on the same protocol. It has a single input and single output port,
thus making it a 2 portdevice.
Types of Bridges
Transparent Bridges:-These are the bridge in which the stations are completely unawareof the bridge‘s
existence i.e. whether or not a bridge is added or deleted from the network, reconfiguration of the stations is
unnecessary. These bridges make use of two processes i.e.bridge forwarding and bridgelearning.
8
Source Routing Bridges:-In these bridges, routing operation is performed by source stationand
the frame specifies which route to follow. The host can discover frame by sending a special frame called
discovery frame, which spreads through the entire network using all possible paths todestination.
4. TWO LAYERSWITCH
A layer 2 switch is a type of network switch or device that works on the data link layer (OSI Layer
2) and utilizes MAC Address to determine the path through where the frames are to be forwarded. It
uses hardware based switching techniques to connect and transmit data in a local area network
(LAN).A layer 2 switch can also be referred to as a multiport bridge.
A layer 2 switch is primarily responsible for transporting data on a physical layer and in performing
error checking on each transmitted and received frame. A layer 2 switch requires MAC address of
NIC on each network node to transmit data. They learn MAC addresses automatically by copying
MAC address of each frame received, or listening to devices on the network and maintaining their
MAC address in a forwarding table. This also enables a layer 2 switch to send frames quickly to
destination nodes. However, like other layer switches (3,4 onwards), a layer 2 switch cannot transmit
packet on IP addresses and don‘t have any mechanism to prioritize packets based on
sending/receivingapplication.
5. THREE LAYERSWITCH
A layer 3 switch combines the functionality of a switch and a router. It acts as a switch to connect
devices that are on the same subnet or virtual LAN at lightning speeds and has IP routing
intelligence built into it to double up as a router. It can support routing protocols, inspect incoming
packets, and can even make routing decisions based on the source and destination addresses. This is
how a layer 3 switch acts as both a switch and a router.Often referred to as a multilayer switch, a
layer 3 switch adds a ton of flexibility toanetwork.
9
Performs on two OSI layers — layer 2 and layer3.
10
Originally, layer 3 switches were conceived to improve routing performance on large networks,
especially corporate intranets. To understand the purpose, let‘s step back a bit in time to see how
these switches evolved.
Layer 2 switches work well when there is low to medium traffic in VLANs. But these switches
would hang when traffic increased. So, it became necessary to augment layer 2‘s functionality.
One option was to use a router instead of a switch, but then routers are slower than switches, so this
CABLECONSTRUCTION
A cable used for the transmission and distribution of electrical energy is called electrical power
cable. Power cable consists two or more electrical conductors join with an over sheath. It is used for
the transmission of extra high voltages in a place where overhead lines are impracticable to use like,
the sea, airfield crossing, etc. But underground cable is more costly as compared to aerial cable for
the same voltage which is one of the main draws back of electrical power cable.
The power cable mainly consists of three main components, namely, conductor, dielectric,
andsheath.The conductor in the cable provides the conducting path for the current. The insulation or
dielectric withstands the service voltage and isolates the conductor with other objects. The sheath
does not allow the moistures to enter and protects the cables from all external influences like
chemical or electrochemical attack, fire, etc. The main components of electrical power cables are
explained below indetails.
11
CONDUCTOR
Coppers and aluminum wires are used as a conductor material in cables because of their high
electrical conductivity. Solid or number of bare wires made of either copper or aluminum are used
tomake a power cable.
For a conductor having more than three wires, the wire is arranged around a center wire such that
there are six in the first layer, twelve in the second, eighteen in the third, and so on. The number of
wires in the conductors are 7, 19, 37, 61, 91, etc., The size of the conductor is represented by 7/A,
19/B, 37/C, etc., in which first figures represent the number of strands and the second figure A, B,
C,etc., represents the diameters in cm or mm of the individual wire of the conductors.
INSULATION
The most commonly used dielectric in power cables is impregnated paper, butyl rubber, polyvinyl
chloride cable, polyethylene, cross-linked polyethylene. Paper insulated cables are mostly preferred
because their current carrying capacity is high, generally reliable and having a long life. The
dielectric compound used for the cable should have following properties.
The insulator must have high insulationresistance.
It should have high dielectric strength so that it does not allow the leakage current to passthrough it.
The material must have good mechanicalstrength.
The dielectric material should be capable of operating at hightemperature.
The cables used for submarine and damp soil should use synthetic dielectrics like polyvinyl chloride,
polyethylene, etc. These materials are comparatively lighter and have nonmigratory dielectric. Also,
such type of dielectric material has good dielectric strength, low power loss, and low thermal
resistance.
INNERSHEATH
It is used for protecting the cable from moistures which would affect the insulation. Cable sheath is
made up of lead alloy, and these strengths withstand the internal pressures of the pressurized
cables.The material used for inner sheath should be nonmagnetic material.
The aluminum sheath is also used in a power cable because it is cheaper, smaller in weight and high
mechanical strength than the lead sheath. In oil-filled cables and telephone, cables corrugated
seamless aluminum sheath is used because it has better-bending properties, reduced thickness, and
lesser weight
PROTECTIVE COVERING
Lead sheath cables when directly laid down on the ground are damaged by corrosion and
12
electrolyte.For protecting the cables against corrosion layers of fibrous material like paper, hessian,
etc., or polyvinyl chloride is used. Layers of fibrous material spread with the waterproof compound
to the outside of the electrical cable are called serving.
ARMOURING
Armoring is the process in which layers of galvanized steel wires or two layers of metal tape are
applied over sheath for protecting it from mechanical damage.The steel wires are normally used for
armoring because it has high longitudinal strength. Armoring is also used for earthing thecable.
When the fault occurs in the cable (due to insulation failure) the fault current flows through the
armor and get earthed.
OVERSHEATH
It gives the mechanical strength to the cables. It protects the cable from overall damage like
moisture,corrosion, dirt, dust, etc. The thermosetting or thermoplastic material is used for making
over the sheath.
RESULT:Network media, cables, and devices and Cable Construction are discussed.
13
EXPERIMENT NO- 02
AIM:Demonstration of basic network commands/utilities in Windows.
OBJECTIVE:To list commands and execute on the CLI to obtain results such as the IP address
and ping among manyotherresults.
DESCRIPTION AND EXECUTION:
1) Ipconfig
Ipconfig (Internet Protocol configuration) is among the most common networking toolthatallows
you to query and show current TCP/IP (Transmission Control Protocol/Internet Protocol)network
configuration.
When you type ipconfig at the Command Prompt. You‘ll see a list of all the network connections
your computer is using. Look under ―Wireless LAN adapter‖ if you‘re connected toWi-Fior
―Ethernetadapter‖if you‘re connectedtoawirednetwork.
2) Ipconfig/all
all – Displays additional information for all network adapters
14
3) Ping:
Verifies IP-level connectivity to another TCP/IP computer by sending Internet Control Message
Protocol (ICMP) Echo Request messages. The receipt of corresponding Echo Reply messages are
displayed, along with round-trip times. Ping is the primary TCP/IP command used totroubleshoot
connectivity, reachability, and name resolution.
It is one of the most basic yet useful network commands to utilize in the command prompt
application. It tells you whether your computer can reach some destination IP address ordomain
name, and if it can, how long it takes data to travel there and back again.
15
4) Tracert
tracert stands for traceroute like ping it sends out a data packet as a way to troubleshoot any network
issues you might have, but instead tracks the route of the packet as it hops from serverto server
4.1 Tracert
16
5) nslookup:
The nslookup (Name Server Lookup) tool can show valuable details to troubleshoot and resolve
DNS-related issues. You can use this command to display the default DNS name and address ofthe
local device, determine the domain name of an IP address or the name servers for a specific node.
7) netstat:
The netstat (Network Statistics) tool displays statistics for all network connections. It allows you to
understand open and connected ports to monitor and troubleshoot networking problems forWindows
10 and apps.When using the netstat tool, you can list active network connections and listening ports.
You can view network adapter and protocols statistics. You can even display the current routing
table and much more.
8) Arp:
Windows 10 maintains an arp (Address Resolution Protocol) table, which stores IP to Media Access
Control (MAC) entries that the system has resolved. The arp tool lets you view the entire table,
modify the entries, and use it to determine a remote computer's MAC address.
Type the following command to view the current arp table cache on Windows 10 and press Enter:
`arp -a'
17
9) net
Used for: Displaying available Net switches Command to enter: net
The net command is definitely a versatile one, allowing you to manage many different aspects of a
network and its settings such as network shares, users and print jobs, as just a fewexamples.
Running just net won‘t do much, but it will present you with a list of all the switches thatare
available.
These include accounts to set password and logon requirements, file to show a list of open files and
sessions to list, or even disconnect, sessions on the network.
10) hostname
The hostname command provides you with an easy way of identifying the hostname that has been
assigned to your Windows device.
RESULTS:
Ipconfig, ping, tracert, nslookup, netstat, arp, net, hostname and some other commands have been
executed and the results have been displayed.
18
EXPERIMENT NO- 03:
19
255.255.x.x.
Class B has 16384 (214) Network addresses and 65534 (216-2) Host addresses.
3) ClassC:
The first octet of Class C IP address has its first 3 bits set to 110.
Class C IP addresses range from 192.0.0.x to 223.255.255.x. The default subnet mask for Class C is
255.255.255.x.
Class C gives 2097152 (221) Network addresses and 254 (28-2) Host addresses.
ClassD:
Very first four bits of the first octet in Class D IP addresses are set to 1110.
Class D has IP address range from 224.0.0.0 to 239.255.255.255. Class D is reserved for
Multicasting. In multicasting data is not destined for a particular host, that is why there is no need
to extract host address from the IP address, and Class D does not have any subnet mask.
4) ClassE:
This IP Class is reserved for experimental purposes only for R&D or Study. IP addresses in this
class ranges from 240.0.0.0 to 255.255.255.254. Like Class D, this class too is not equipped
with any subnet mask.
DESCRIPTION AND EXECUTION:
Network Configuration: Open Control
Panel: Open Network and Internet:
20
Open Network and Sharing Center:
21
22
Details:
The IP address, Subnet mask and default gateways can be obtained here.
Wireless Properties:
23
24
Wi-Fi Properties:
25
RESULTS:IP classes are studied and PC network configuration info is noted.
26
EXPERIMENT NO- 04
OBJECTIVE: To demonstrate
building a switch – based network /
Configuration Cisco Catalyst Switch3560.
ALGORITHM:
1. Start
2. Setup the Topology and initializedevices
3. Configure Devices and verifyconnectivity
4. Display Deviceinformation
5. End
27
Connecting the devices using cables:
28
Configuring PC-A and PC-B:
29
30
Configuring Switch S1:
31
RESULTS:After the configuration andconnection of all devices, the ping is
successful from PC-A toPC-B.
32
EXPERIMENT NO- 05
1. Start
2. Setup the Topology and initializedevices
3. Configure Devices and router and verifyconnectivity
4. Display Deviceinformation
5. End
DESCRIPTION AND EXECUTION:
Resources: 2 Switch, 2 PCs, 2 Router.
R1
S0/0/0 192.168.2.1 255.255.255.0 N/A
R2
S0/0/0 192.168.2.2 255.255.255.0 N/A
33
PC2 N/A 192.168.3.10 255.255.255.0 192.168.3.1
34
Configuring PC-A and PC-B:
35
Configuring router 1:
36
37
Configuring router 2:
38
Checking ping from PCA to PCB:
RESULTS:After the configuration and connection of all devices, the ping is successful
from PC-A to PC-B.
39
EXPERIMENT NO- 06
ALGORITHM:
1. Start
2. Setup the Topology and initializedevices
3. Configure Devices and verifyconnectivity
4. Display Deviceinformation
5. End
• OSPF is a link-state routing protocol. Link-state protocols use the shortest path first
(SPF) algorithm to populate the routing table. OSPF shares information with everyrouter in
thenetwork.
40
41
Configuring PC‘s:
42
43
Configuring Routers:
Router 0: Config
44
Router 1: config
45
Name of the Student: R.Dinesh Section:C2 Roll No. :160118733093
Router 0: CLI
1.
46
Name of the Student: R.Dinesh Section:C2 Roll No. :160118733093
36 | Pa g e
Router 1: CLI
1.
47
Checking Ping:
RESULTS: After the configuration and connection of all devices, the ping is successful
from PC-A to PC-B.
48.
EXPERIMENT NO- 07
ALGORITHM:
49
Setup topological network:
Router configuration:
50
51
52
53
54
PC configuration:
55
56
57
Verification:
58
59
RESULTS: Basic EIGRP Configuration isdemonstrated.
60
EXPERIMENT NO- 08
ALGORITHM:
1. Start
2. Open Command Prompt and run with administratorrights
3. Run windump to locate your network adapter using the command windump -D
4. Run windump to collect packets and write to a file and also run all
windump commands.
5. End
DESCRIPTION AND EXECUTION:
Windump prints out a description of the contents of packets on a network
interface that match the Boolean expression. It can also be run with the -w flag, which causes it
to save the packet data to a file for later analysis, and/or with the -r flag, which causes it to read
from a saved packet file rather than to read packets from a network interface. In all cases, only
packets that match expression will be processed bywindump.
Windump -D: displays the list of interfaces which are connected to the system. We can use any of the
interfaces by specifying its number.
61
Windump -i 2: By giving this command we will get the list of packets captured from the interface 2.
Windump -i 2 -c5: By giving this command we will get the list of filters captured from the interface 2
but only limited to 5 filters since, we mentioned count as 5 (-c5).
Windump -I 2 -c5 -w cap.pcap: this filter is used to write in to a file in which the file nameis cap.pcap
.but its limited to only 5packets.
62
Windump -I 2 -r cap.pcap: this filter is used to read from a file in which the file nameis cap.pcap .but
its limited to only 5packets.
Windump -I -nnip: this filter captures the packets and DNS will be converts in to IP address.
63
Windump -I -c5 -nnip:this filter captures only 5 packets and DNS will be converts in to IP address
Windump -I port 80: this filter captures the packets whose port number is 80.
Windump -I 2 host 172.20.3.159: this filter is used to connect to the specified host and captures the packets
from that host.
64
RESULTS:The network packets received and sent are analyzed using the tcpdump
utility.
65
EXPERIMENT NO- 09
ALGORITHM:
1. Start
2. ip.src ==‗address‘
3. ip.addr ==‗address‘
4. ip.dst ==‗address‘
5. tcp
6. http
7. tcp.port
8. tcp.analysis.flags
9. tcpcontains
10. udpcontains
11. http.response.code
12. end
66
o Wireshark is a packet sniffer and analysis tool. It captures network traffic on the local
network and stores that data for offlineanalysis.
o Wireshark captures network traffic from Ethernet, Bluetooth, Wireless (IEEE.802.11),
Token Ring, Frame Relay connections, andmore.
o Wireshark allows you to filter the log either before the capture starts or during analysis, so
you can narrow down and zero into what you are looking for in the networktrace.
o For example, you can set a filter to see TCP traffic between two IPaddresses.
o You can set it only to show you the packets sent from one computer. The filters
in Wireshark are one of the primary reasons it became the standard tool for packetanalysis.
67
o When you open Wireshark, you see a screen that shows you a list of all of the network
connections you can monitor. You also have a capture filter field, so you only capture the network
traffic you want to see
o You can select one or more of the network interfaces using ―shift left-click.‖ Once you
have the network interface selected, you can start the capture, and there are several ways
todothat.Clickthefirstbuttononthetoolbar,titled―StartCapturingPackets.‖
68
got captured. You can change this value in the Settings menu if you need something differentdisplayed.
Source: This is the address of the system that sent thepacket.
Destination: This is the address of the destination of thatpacket.
Protocol: This is the type of packet, for example, TCP, DNS, DHCPv6, orARP.
Length: This column shows you the length of the packet inbytes.
Info: This column shows you more information about the packet contents, and will
vary depending on what kind of packet itis.
69
o Wireshark Capture FiltersCommands
Capture filters limit the captured packets by the filter. Meaning if the packets don‘t
match the filter, Wireshark won‘t save them. Here are some examples of capture filters:
host IP-address: this filter limits the capture to traffic to and from the IP address net
192.168.0.0/24: this filter captures all traffic on thesubnet.
dst host IP-address: capture packets sent to the specified host. port 53: capture traffic
on port 53only.
port not 53 and not arp: capture all traffic except DNS and ARPtraffic
Filters:
1. ip.src = =‗address‘
70
2. ip.addr = =‗address‘
3.ip.dst == ‗address‘
71
4. tcp
5. http
72
6. tcp.port
7. tcp.analysis.flags
73
8. tcpcontains
74
9. udp contains
75
10. http.request
11. http.response.code
RESULTS:The packets received and sent are analyzed using filters in wireshark.
76