0% found this document useful (0 votes)
22 views96 pages

DCCN - Lab Course - Mannual

Uploaded by

umamaheswarivcse
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views96 pages

DCCN - Lab Course - Mannual

Uploaded by

umamaheswarivcse
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 96

CHAITANYA BHARATHI INSTITUTE OF TECHNOLOGY (Autonomous)

(Affiliated to Osmania University; Accredited by NBA(AICTE) and NAAC(UGC), ISO Certified 9001:2015)
GANDIPET, HYDERABAD – 500 075

Department of Computer Science and Engineering

Course File

DATA COMMUNICATION AND COMPUTER NETWORKS LAB


Course Code: (18CSC26)

B.E. VI Semester
Index
Sl. No. Name of the Experiment Page No.
1 Institute & Department Vision & Mission
Course Outcomes
2 I-VII
CO-Mapping, Matrix-Syllabus
3 Lesson Plan- Attainments -Targets
5 TLP- Unit - (I-V) 1-76
6 Lab Internal ( 1&2) Exam Paper 77-80
7 Lab External Exam Paper 81-82
8 Internal & CIE Lab Marks 83-87
Department of Computer Science and Engineering, CBIT, Hyderabad-75
BE VI Sem. (CSE1,CSE-2,CSE-3) (2020-21)
Subject:Data Communication and Computer Networks Lab Code: 18CSC23

Internal CO External CO
Attainment (CIE) Attainment(SEE)

@ 70%' of
CIE @30%' of
SEE SEE Direct
CO Attainm CIE
Attainment attainmen Attainment
ent Attainment
t
CO1 2.88 0.860 2.96 2.070 2.930 #REF! #REF! #REF!
CO2 2.88 0.860 2.96 2.070 2.930 #REF! #REF! #REF!
CO3 2.88 0.860 2.96 2.070 2.930 #REF! #REF! #REF!
CO4 2.88 0.860 2.96 2.070 2.930
#REF! #REF! #REF!
CO5 1.59 0.480 1.61 1.130 1.610
#REF! #REF! #REF!
CO6 2.88 0.860 2.96 2.070 2.930
#REF! #REF! #REF!

SL. NO. CO Direct 80% Indirect 20% Total


Attainmen Attainment Attainment
t (100%)
1 CO1 2.9300 2.344 2.40 0.480 2.82 0.000 2.000 0.2
2 CO2 2.9300 2.344 2.87 0.574 2.92 0.000 2.000 0.2
3 CO3 2.9300 2.344 2.01 0.402 2.75 0.000 2.000 0.2
4 CO4 2.9300 2.344 2.17 0.434 2.78 0.000 2.000 0.2
5 CO5 1.6100 1.288 2.03 0.406 1.69 0.000 1.000 0.1
6 CO6 2.9300 2.344 2.34 0.468 2.81
0.000 2.000 0.2

feedback

Course CO Attainment Matrix


CO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 0.94133 - 0.94133 - 2.82400 - - - - - - - - -
CO2 1.94533 - 0.97267 - 2.91800 - - - - - - - - -
CO3 1.83067 - - 1.83067 - - - - - - - - - -
CO4 1.85200 1.85200 2.77800 0.92600 1.85200 - - - - - - - - 1.85200
CO5 0.56467 1.69400 - 1.12933 1.12933 - - - - - - - - 1.12933
CO6 0.93733 2.81200 - 1.87467 1.87467 - - - - - - - - 1.87467
CNSP 1.34522 2.11933 1.56400 1.44017 2.11960 - - - - - - - - 1.61867

3.1.3 Course Articulation Matrix


PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 1 - 1 - 3 - - - - - - - - -
CO2 2 - 1 - 3 - - - - - - - - -
CO3 2 - - 2 - - - - - - - - - -
CO4 2 2 3 1 2 - - - - - - - - 2
CO5 1 3 - 2 2 - - - - - - - - 2
CO6 1 3 - 2 2 - - - - - - - - 2
Avg 1.500 2.667 1.667 1.750 2.400 - - - - - - - - 2

Target Level for Course


75
PO Attainment Level PO attainment
x>=70 3 P01 P02 P03 P04 P05 P06 P07 P08 P09 P010 P011 P012 PS01 PS02
60<= x <70 2 (2020-21) DCCN Lab 1.13 2 1.25 1.31 1.8 - - - - - - - - 1.5
50<= x <60 1 Direct Attainment 1.35 2.12 1.56 1.44 2.12 - - - - - - - - 1.62
x <= 40 0 Gap -0.22 -0.12 -0.31 -0.13 -0.32 - - - - - - - - -0.12
EXPERIMENT NO- 01
AIM:Study of Network media, cables, and devices and Cable Construction.
OBJECTIVE:To study about different types of network media, cables and devices and
cable constructions.
DESCRIPTION:

NETWORK MEDIA (TRANSMISSIONMEDIA):


Network media refers to the communication channels used to interconnect nodes on a computer
network. Typical examples of network media include copper coaxial cable, copper twistedpair
cables and optical fiber cables used in wired networks, and radio waves used in wireless
datacommunications networks.
Network medium is the actual physical path between the transmitter and the receiver i.e., It
is thechannel through which data is sent from one place to another.
It is classified into two types:
i.Guided media(wired)

ii.Unguided media(wireless)

GUIDED MEDIA:
Guided media is also called as wired media. It uses a system that guides the data signals along a
specific path. Signals being transmitted are directed and confined in a narrow pathway by using
physical links.
Features: High speed, secure, used for comparatively shorter
distances There are 3 types of guided media:

a) Twisted pair cable:


Twisted pair is a physical media made up of a pair of cables twisted with each other.
A twisted pair cable is cheap as compared to other transmission media. Installation of the twisted
pair cable is easy, and it is a lightweight cable. The frequency range for twisted pair cable is from 0
to 3.5KHz.A twisted pair consists of two insulated copper wires arranged in a regular spiral
pattern.The degree of reduction in noise interference is determined by the number of turns per foot.
Increasing the number of turns per foot decreases noiseinterference.

2
Twisted pair cable is of two types:

Shielded twistedpaircable:
It consists of special jacket to block external interface. It is used in fast data rate Ethernet and in
voice and data channels of telephone lines. It is bulky.

Characteristics of Shielded Twisted Pair:


o The cost of the shielded twisted pair cable is not very high and not verylow.
o An installation of STP iseasy.

o It has higher capacity as compared to unshielded twisted paircable.


o It has a higherattenuation.
o It is shielded that provides the higher data transmissionrate.

Disadvantages
o It is more expensive as compared to UTP and coaxialcable.
o It has a higher attenuationrate

There are 3 types of guided media:

Un Shielded Twistedpaircable:
This type of cable has the ability to block interface and does not depend on a physical shield for this
purpose.
Advantages:
o Leastexpensive.
o Easy toinstall
o Short distance transmission due toattenuation

3
b) Coaxial cable:
It has an outer plastic covering containing 2 parallel conductors eachhaving a separate insulated
protection cover. The coaxial cable transmits information in 2 modes :
1) Baseband Mode - dedicated cable bandwidth
2) Broadband mode - bandwidth is split intoseparate ranges
Cable TV‘s and analog television networks use coaxial cables.They transmit signals over large
distances at higher speed as compared to twisted cables.

Advantages:
1. HighBandwidth

2. Better noiseimmunity
3. Easy to install andexpand
4. Inexpensive

c) Optical Fiber:
It uses the concept of reflection of light through a core made up of glass or plastic.
It is a transparent and flexible fiber made up of glass, which carries information in the form of light
pulses from one end to another. Fiber optics is used for long distance and high performance
network.Used in internet, telephone and television.
Core is surrounded by less dense glass or plastic covering called the cladding. Used to transfer large
volumes of data. It can be uni-directional or bi-directional.

4
Basic elements of Fiber optic cable:
o Core: The optical fiber consists of a narrow strand of glass or plastic known as a core. A core is a light
transmission area of the fiber. The more the area of the core, the more light will be transmitted into thefibre.
o Cladding: The concentric layer of glass is known as cladding. The main functionality of the cladding is
to provide the lower refractive index at the core interface as to cause the reflection within the core so that the
light waves are transmitted through thefibre.
o Jacket: The protective coating consisting of plastic is known as a jacket. The main purpose of a jacket is
to preserve the fiber strength, absorb shock and extra fiberprotection.

Advantages of Optical Fiber


Optical fiber is fast replacing copper wires because of these advantages that it offers:-
 Highbandwidth
 Immune to electromagneticinterference
 Suitable for industrial and noisyareas
 Signals carrying data can travel long distances withoutweakening

Disadvantages of Optical Fibre


Despite long segment lengths and high bandwidth, using optical fibre may not be a viable option for
every one due to these disadvantages −
 Optical fibre cables areexpensive
 Sophisticated technology required for manufacturing, installing and maintainingopticalfibre cables
 Light waves are unidirectional, so two frequencies are required for full duplex transmission

ii) UNGUIDEDMEDIA

An unguided transmission transmits the electromagnetic waves without using any physical medium.
Therefore it is also known as wireless transmission. In unguided media, air is the media through
which the electromagnetic energy can floweasily.
Unguided transmission is broadly classified into three categories:

i) Radiowaves:
Radio waves are electromagnetic waves and are omnidirectional. When an antenna transports radio
waves they are propagated in all directions in free space which means the sending and receiving
antennas do not have to be aligned that is any receiving antenna canreceive that transmitted wave.
The frequency of radio waves about 30 hertz (Hz) to 300 gigahertz (GHz) and like all other
electromagnetic waves radio waves travel at the speed of light in vacuum.

5
Applications of Radio waves
 These waves are omnidirectional so they are useful for multicasting in which one sender
but manyreceivers.
 Examples of radio waves are television, AM and FM radio, cordless phones,andpaging.

Advantages anddisadvantages

 Radio waves are easy to generate and penetrate buildings also can travel long distances.
 Radio waves cover a large area and can penetrate the buildings. By this, an AM radio can receive
signals inside abuilding.
 This can also be disadvantageous because we cannot isolate a communication just inside or outside a
building. Cause of this, governments strictly legislate theuse of radio transmitters.

ii) Microwaves:
Micro Waves includes a line of sight transmission that is the sending and receiving antennas that
need to be properly aligned with each other. The distance is directly proportional to the height of the
antenna which is covered by the signal. In mobile phone communication and television distribution,
these are majorly used.

Applications of Micro Waves


Due to the unidirectional properties of Micro Waves, they are very useful when unicast (one-to-one)
communication is needed between the sender and the receiver. Cellular phones, satellite networks,
and wireless LANs are using Micro Waves.

Microwave Transmission

Two types of Microwave Transmission are as follows,


1. TerrestrialMicrowave

2. SatelliteMicrowave

6
iii) Infrared waves:
The frequency of Infrared waves is about 300 GHz to 430 THz, which can be used for short-range
communication. Infrared waves of high frequencies cannot penetrate walls. This characteristic of
Infrared waves prevents interference between one system and another. This means a short-range
communication system in a room cannot be affected by another system in the adjacent room.
If we are using the infrared remote control, we do not interfere with the use of the remote by our
neighbors. However, by this characteristic, infrared signals become useless for long-range
communication. Also, we cannot use infrared waves outside a building because the sun's rays
contain infrared waves that can interfere with communication.

Characteristics of infrared waves


 This type of wide bandwidth can be used to transmit digital data with a veryhighdatarate.
 The Infrared Data Association (IrDA) has established standards for using these signals for
communication between devices such as keyboards, mouse, PCs, andprinters and it is also responsible
for sponsoring the use of infraredwaves.
 This type of communication provides better security with minimum interference.

 NETWORKDEVICES
Hardware devices that are used to connect computers, printers, fax machines and other electronic
devices to a network are called network devices. These devices transfer data in a fast, secure and
correct way over same or different networks. Network devices may be inter-network or intra-
network. Some devices are installed on the device, like NIC card or RJ45 connector, whereas some
are part of the network, like router, switch, etc. Let us explore some of these devices in greater
detail.

1. REPEATER
A repeater operates at the physical layer. Its job is to regenerate the signal over the same network
before the signal becomes too weak or corrupted so as to extend the length to which the signal can
be transmitted over the same network. An important point to benotedabout repeaters is that they do
not amplify the signal. When the signal becomes weak, they copy the signal bit by bit and regenerate
it at the original strength. It is a 2 port device.
Repeaters are network devices operating at physical layer of the OSI model that amplify or
regenerate an incoming signal before retransmitting it. They are incorporated in networks to expand
its coverage area. They are also known as signal boosters.

7
2. HUB
A hub is basically a multiport repeater. A hub connects multiple wires coming from different
branches, for example, the connector in star topology which connects different stations.
Hubs cannot filter data, so data packets are sent to all connected devices. Inotherwords, collision
domain of all hosts connected through Hub remains one. Also, they do not have the intelligence to
find out best path for data packets which leads to inefficiencies and wastage.

Types of Hub
 Active Hub: -These are the hubs which have their own power supply and can clean, boost, and relay the
signal along with the network. It serves both as a repeater as well as wiring centre. These are used to extend
the maximum distance betweennodes.
 Passive Hub: -These are the hubs which collect wiring from nodes and power supply fromactive hub.
These hubs relay signals onto the network without cleaning and boosting them and can‘t be used to extend
the distance betweennodes.
 Intelligent Hub: -It work like active hubs and include remote management capabilities. They also
provide flexible data rates to network devices. It also enables an administrator tomonitor the traffic passing
through the hub and to configure each port in thehub.

3. BRIDGE

A bridge operates at data link layer. A bridge is a repeater, with add on the functionality of
filtering content by reading the MAC addresses of source and destination. It is also used for
interconnecting two LANs working on the same protocol. It has a single input and single output port,
thus making it a 2 portdevice.

Types of Bridges
 Transparent Bridges:-These are the bridge in which the stations are completely unawareof the bridge‘s
existence i.e. whether or not a bridge is added or deleted from the network, reconfiguration of the stations is
unnecessary. These bridges make use of two processes i.e.bridge forwarding and bridgelearning.

8
 Source Routing Bridges:-In these bridges, routing operation is performed by source stationand
the frame specifies which route to follow. The host can discover frame by sending a special frame called
discovery frame, which spreads through the entire network using all possible paths todestination.

4. TWO LAYERSWITCH
A layer 2 switch is a type of network switch or device that works on the data link layer (OSI Layer
2) and utilizes MAC Address to determine the path through where the frames are to be forwarded. It
uses hardware based switching techniques to connect and transmit data in a local area network
(LAN).A layer 2 switch can also be referred to as a multiport bridge.
A layer 2 switch is primarily responsible for transporting data on a physical layer and in performing
error checking on each transmitted and received frame. A layer 2 switch requires MAC address of
NIC on each network node to transmit data. They learn MAC addresses automatically by copying
MAC address of each frame received, or listening to devices on the network and maintaining their
MAC address in a forwarding table. This also enables a layer 2 switch to send frames quickly to
destination nodes. However, like other layer switches (3,4 onwards), a layer 2 switch cannot transmit
packet on IP addresses and don‘t have any mechanism to prioritize packets based on
sending/receivingapplication.

5. THREE LAYERSWITCH
A layer 3 switch combines the functionality of a switch and a router. It acts as a switch to connect
devices that are on the same subnet or virtual LAN at lightning speeds and has IP routing
intelligence built into it to double up as a router. It can support routing protocols, inspect incoming
packets, and can even make routing decisions based on the source and destination addresses. This is
how a layer 3 switch acts as both a switch and a router.Often referred to as a multilayer switch, a
layer 3 switch adds a ton of flexibility toanetwork.

Features of a layer 3 switch


 Comes with 24 Ethernet ports, but no WANinterface.
 Acts as a switch to connect devices within the samesubnet.
 Switching algorithm is simple and is the same for most routedprotocols.

9
 Performs on two OSI layers — layer 2 and layer3.

10
Originally, layer 3 switches were conceived to improve routing performance on large networks,
especially corporate intranets. To understand the purpose, let‘s step back a bit in time to see how
these switches evolved.
Layer 2 switches work well when there is low to medium traffic in VLANs. But these switches
would hang when traffic increased. So, it became necessary to augment layer 2‘s functionality.
One option was to use a router instead of a switch, but then routers are slower than switches, so this

could lead to slower performance.

 CABLECONSTRUCTION
A cable used for the transmission and distribution of electrical energy is called electrical power
cable. Power cable consists two or more electrical conductors join with an over sheath. It is used for
the transmission of extra high voltages in a place where overhead lines are impracticable to use like,
the sea, airfield crossing, etc. But underground cable is more costly as compared to aerial cable for
the same voltage which is one of the main draws back of electrical power cable.
The power cable mainly consists of three main components, namely, conductor, dielectric,
andsheath.The conductor in the cable provides the conducting path for the current. The insulation or
dielectric withstands the service voltage and isolates the conductor with other objects. The sheath
does not allow the moistures to enter and protects the cables from all external influences like
chemical or electrochemical attack, fire, etc. The main components of electrical power cables are
explained below indetails.

11
CONDUCTOR
Coppers and aluminum wires are used as a conductor material in cables because of their high
electrical conductivity. Solid or number of bare wires made of either copper or aluminum are used
tomake a power cable.
For a conductor having more than three wires, the wire is arranged around a center wire such that
there are six in the first layer, twelve in the second, eighteen in the third, and so on. The number of
wires in the conductors are 7, 19, 37, 61, 91, etc., The size of the conductor is represented by 7/A,
19/B, 37/C, etc., in which first figures represent the number of strands and the second figure A, B,
C,etc., represents the diameters in cm or mm of the individual wire of the conductors.

INSULATION
The most commonly used dielectric in power cables is impregnated paper, butyl rubber, polyvinyl
chloride cable, polyethylene, cross-linked polyethylene. Paper insulated cables are mostly preferred
because their current carrying capacity is high, generally reliable and having a long life. The
dielectric compound used for the cable should have following properties.
 The insulator must have high insulationresistance.
 It should have high dielectric strength so that it does not allow the leakage current to passthrough it.
 The material must have good mechanicalstrength.
 The dielectric material should be capable of operating at hightemperature.

 It should have low thermalresistance.


 It should have a low powerfactor.

The cables used for submarine and damp soil should use synthetic dielectrics like polyvinyl chloride,
polyethylene, etc. These materials are comparatively lighter and have nonmigratory dielectric. Also,
such type of dielectric material has good dielectric strength, low power loss, and low thermal
resistance.

INNERSHEATH
It is used for protecting the cable from moistures which would affect the insulation. Cable sheath is
made up of lead alloy, and these strengths withstand the internal pressures of the pressurized
cables.The material used for inner sheath should be nonmagnetic material.
The aluminum sheath is also used in a power cable because it is cheaper, smaller in weight and high
mechanical strength than the lead sheath. In oil-filled cables and telephone, cables corrugated
seamless aluminum sheath is used because it has better-bending properties, reduced thickness, and
lesser weight

PROTECTIVE COVERING
Lead sheath cables when directly laid down on the ground are damaged by corrosion and

12
electrolyte.For protecting the cables against corrosion layers of fibrous material like paper, hessian,
etc., or polyvinyl chloride is used. Layers of fibrous material spread with the waterproof compound
to the outside of the electrical cable are called serving.

ARMOURING
Armoring is the process in which layers of galvanized steel wires or two layers of metal tape are
applied over sheath for protecting it from mechanical damage.The steel wires are normally used for
armoring because it has high longitudinal strength. Armoring is also used for earthing thecable.
When the fault occurs in the cable (due to insulation failure) the fault current flows through the
armor and get earthed.

OVERSHEATH
It gives the mechanical strength to the cables. It protects the cable from overall damage like
moisture,corrosion, dirt, dust, etc. The thermosetting or thermoplastic material is used for making
over the sheath.

RESULT:Network media, cables, and devices and Cable Construction are discussed.

13
EXPERIMENT NO- 02
AIM:Demonstration of basic network commands/utilities in Windows.
OBJECTIVE:To list commands and execute on the CLI to obtain results such as the IP address
and ping among manyotherresults.
DESCRIPTION AND EXECUTION:
1) Ipconfig
Ipconfig (Internet Protocol configuration) is among the most common networking toolthatallows
you to query and show current TCP/IP (Transmission Control Protocol/Internet Protocol)network
configuration.
When you type ipconfig at the Command Prompt. You‘ll see a list of all the network connections
your computer is using. Look under ―Wireless LAN adapter‖ if you‘re connected toWi-Fior
―Ethernetadapter‖if you‘re connectedtoawirednetwork.

2) Ipconfig/all
all – Displays additional information for all network adapters

14
3) Ping:
Verifies IP-level connectivity to another TCP/IP computer by sending Internet Control Message
Protocol (ICMP) Echo Request messages. The receipt of corresponding Echo Reply messages are
displayed, along with round-trip times. Ping is the primary TCP/IP command used totroubleshoot
connectivity, reachability, and name resolution.
It is one of the most basic yet useful network commands to utilize in the command prompt
application. It tells you whether your computer can reach some destination IP address ordomain
name, and if it can, how long it takes data to travel there and back again.

15
4) Tracert
tracert stands for traceroute like ping it sends out a data packet as a way to troubleshoot any network
issues you might have, but instead tracks the route of the packet as it hops from serverto server

4.1 Tracert

16
5) nslookup:
The nslookup (Name Server Lookup) tool can show valuable details to troubleshoot and resolve
DNS-related issues. You can use this command to display the default DNS name and address ofthe
local device, determine the domain name of an IP address or the name servers for a specific node.

7) netstat:
The netstat (Network Statistics) tool displays statistics for all network connections. It allows you to
understand open and connected ports to monitor and troubleshoot networking problems forWindows
10 and apps.When using the netstat tool, you can list active network connections and listening ports.
You can view network adapter and protocols statistics. You can even display the current routing
table and much more.

8) Arp:
Windows 10 maintains an arp (Address Resolution Protocol) table, which stores IP to Media Access
Control (MAC) entries that the system has resolved. The arp tool lets you view the entire table,
modify the entries, and use it to determine a remote computer's MAC address.
Type the following command to view the current arp table cache on Windows 10 and press Enter:
`arp -a'

17
9) net
Used for: Displaying available Net switches Command to enter: net
The net command is definitely a versatile one, allowing you to manage many different aspects of a
network and its settings such as network shares, users and print jobs, as just a fewexamples.
Running just net won‘t do much, but it will present you with a list of all the switches thatare
available.
These include accounts to set password and logon requirements, file to show a list of open files and
sessions to list, or even disconnect, sessions on the network.

10) hostname
The hostname command provides you with an easy way of identifying the hostname that has been
assigned to your Windows device.

RESULTS:
Ipconfig, ping, tracert, nslookup, netstat, arp, net, hostname and some other commands have been
executed and the results have been displayed.

18
EXPERIMENT NO- 03:

AIM:PC Network Configuration.


OBJECTIVE:To demonstrate PC Network Configuration.
ALGORITHM:
1. Start
2. Connect to theinternet
3. Gather TCP/IP configurationinformation
4. Record IP address, Subnet Mask and Default gateway for thecomputer
5. Compare TCP/IP information with othercomputers
6. Check additional TCP/IPinformation
7. End
DESCRIPTION AND EXECUTION:
IP Address:
An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a
computer network that uses the Internet Protocol for communication. An IP address serves two main
functions: host or network interface identification and location addressing.
Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number.
IPv4 Classes:
There are 5 classes of IPv4 addresses:
1) ClassA:
The first bit of the first octet is always set to 0 (zero). Thus the first octet ranges from 1 – 127. Class
A addresses only include IP starting from 1.x.x.x to 126.x.x.x only. The IP range 127.x.x.x is
reserved for loopback IP addresses.
The default subnet mask for Class A IP address is 255.0.0.0 which implies that Class A
addressing can have 126 networks (27-2) and 16777214 hosts (224-2).
2) ClassB:
An IP address which belongs to class B has the first two bits in the first octet set to 10.
Class B IP Addresses range from 128.0.x.x to 191.255.x.x. The default subnet mask for Class B is

19
255.255.x.x.

Class B has 16384 (214) Network addresses and 65534 (216-2) Host addresses.
3) ClassC:
The first octet of Class C IP address has its first 3 bits set to 110.
Class C IP addresses range from 192.0.0.x to 223.255.255.x. The default subnet mask for Class C is
255.255.255.x.
Class C gives 2097152 (221) Network addresses and 254 (28-2) Host addresses.
ClassD:
Very first four bits of the first octet in Class D IP addresses are set to 1110.
Class D has IP address range from 224.0.0.0 to 239.255.255.255. Class D is reserved for
Multicasting. In multicasting data is not destined for a particular host, that is why there is no need
to extract host address from the IP address, and Class D does not have any subnet mask.
4) ClassE:
This IP Class is reserved for experimental purposes only for R&D or Study. IP addresses in this
class ranges from 240.0.0.0 to 255.255.255.254. Like Class D, this class too is not equipped
with any subnet mask.
DESCRIPTION AND EXECUTION:
Network Configuration: Open Control
Panel: Open Network and Internet:

20
Open Network and Sharing Center:

Go to Connection (Wi-Fi or LAN)

21
22
Details:

The IP address, Subnet mask and default gateways can be obtained here.

Wireless Properties:

23
24
Wi-Fi Properties:

Internet Protocol Version 4 (TCP/IPv4):

The IP address and DNS server addresses can be set manually:

25
RESULTS:IP classes are studied and PC network configuration info is noted.

26
EXPERIMENT NO- 04

AIM:Building a switch – based network / Configuration of Cisco Catalyst Switch 3560

OBJECTIVE: To demonstrate
building a switch – based network /
Configuration Cisco Catalyst Switch3560.

ALGORITHM:
1. Start
2. Setup the Topology and initializedevices
3. Configure Devices and verifyconnectivity
4. Display Deviceinformation
5. End

DESCRIPTION AND EXECUTION:


Resources: 1 Switch, 2 PCs, 1 Router.

The devices are connected in a star topology:

Laying out required devices:

27
Connecting the devices using cables:

28
Configuring PC-A and PC-B:

29
30
Configuring Switch S1:

Checking ping from PCA to PCB:

31
RESULTS:After the configuration andconnection of all devices, the ping is
successful from PC-A toPC-B.

32
EXPERIMENT NO- 05

AIM:Configuration Of Cisco Router 2900


OBJECTIVE:To demonstrate Configuration Of Cisco Router 2900.
ALGORITHM:

1. Start
2. Setup the Topology and initializedevices
3. Configure Devices and router and verifyconnectivity
4. Display Deviceinformation
5. End
DESCRIPTION AND EXECUTION:
Resources: 2 Switch, 2 PCs, 2 Router.

Devic Interfa IP Address Subnet Mask Def. Gateway


e ce

Fa0/0 192.168.1.1 255.255.255.0 N/A

R1
S0/0/0 192.168.2.1 255.255.255.0 N/A

Fa0/0 192.168.3.1 255.255.255.0 N/A

R2
S0/0/0 192.168.2.2 255.255.255.0 N/A

PC1 N/A 192.168.1.10 255.255.255.0 192.168.1.1

33
PC2 N/A 192.168.3.10 255.255.255.0 192.168.3.1

Connecting the devices using cables:

34
Configuring PC-A and PC-B:

35
Configuring router 1:

36
37
Configuring router 2:

38
Checking ping from PCA to PCB:

RESULTS:After the configuration and connection of all devices, the ping is successful
from PC-A to PC-B.

39
EXPERIMENT NO- 06

AIM:Basic OPSF Configuration

OBJECTIVE:To demonstrate Basic OPSF Configuration.

ALGORITHM:

1. Start
2. Setup the Topology and initializedevices
3. Configure Devices and verifyconnectivity
4. Display Deviceinformation
5. End

DESCRIPTION AND EXECUTION:

• OSPF is a link-state routing protocol. Link-state protocols use the shortest path first
(SPF) algorithm to populate the routing table. OSPF shares information with everyrouter in
thenetwork.

• OSPF is considered a difficult protocol to configure and requires athorough understanding


of terms that are commonlyused.

Connecting the devices using cables:

40
41
Configuring PC‘s:

42
43
Configuring Routers:
Router 0: Config

44
Router 1: config

45
Name of the Student: R.Dinesh Section:C2 Roll No. :160118733093

Router 0: CLI

1.
46
Name of the Student: R.Dinesh Section:C2 Roll No. :160118733093

36 | Pa g e
Router 1: CLI

1.
47
Checking Ping:

RESULTS: After the configuration and connection of all devices, the ping is successful
from PC-A to PC-B.

48.
EXPERIMENT NO- 07

AIM:Basic EIGRP Configuration

OBJECTIVE:To demonstrate Basic EIGRP Configuration and To display EIGRP with


a process ID of1.

ALGORITHM:

1. Start Cisco Packet Tracerapplication.


2. Setup devices and cable them according to the topologicaldiagram.
3. Configure fastethernet interface for router 1, 2 and3.
4. Configure serial 0/0/0 interface for router 1 and3.
5. Configure serial 0/1/0 interface for router2.
6. Configure eigrp network forrouters.
7. ConfigurePC‘s.
8. To verify connectivity, ping all PC‘s through commandprompt.
9. Exit.

DESCRIPTION AND EXECUTION:


Enhanced Interior Gateway Routing Protocol is an interior gateway protocol suited for many different
topologies and media. In a well-designed network, EIGRP scales well and provides extremely quick
convergence times with minimal network traffic. It has very low usage of network resources during normal
operations; only hello packets are transmitted on a stable network.
When a change occurs, only routing table changes are propagated, not the entire routing table; this reduces the
load on the routing protocol itself places on the network. It has rapid convergence times for changes in the
network topology (in some situations convergence can be almost instantaneous). It is an enhanced distance
vector protocol, relying on the Diffused Update Algorithm (DUAL) to calculate the shortest path to a
destination within anetwork.

49
Setup topological network:

Router configuration:

50
51
52
53
54
PC configuration:

55
56
57
Verification:

58
59
RESULTS: Basic EIGRP Configuration isdemonstrated.

60
EXPERIMENT NO- 08

AIM:Analysis of network traces using Tcpdump

OBJECTIVE:To demonstrate Analysis of network traces using Tcpdump.

ALGORITHM:

1. Start
2. Open Command Prompt and run with administratorrights
3. Run windump to locate your network adapter using the command windump -D
4. Run windump to collect packets and write to a file and also run all
windump commands.
5. End
DESCRIPTION AND EXECUTION:
 Windump prints out a description of the contents of packets on a network
interface that match the Boolean expression. It can also be run with the -w flag, which causes it
to save the packet data to a file for later analysis, and/or with the -r flag, which causes it to read
from a saved packet file rather than to read packets from a network interface. In all cases, only
packets that match expression will be processed bywindump.

Windump -D: displays the list of interfaces which are connected to the system. We can use any of the
interfaces by specifying its number.

61
Windump -i 2: By giving this command we will get the list of packets captured from the interface 2.

Windump -i 2 -c5: By giving this command we will get the list of filters captured from the interface 2
but only limited to 5 filters since, we mentioned count as 5 (-c5).

Windump -I 2 -c5 -w cap.pcap: this filter is used to write in to a file in which the file nameis cap.pcap
.but its limited to only 5packets.

62
Windump -I 2 -r cap.pcap: this filter is used to read from a file in which the file nameis cap.pcap .but
its limited to only 5packets.

Windump -I -nnip: this filter captures the packets and DNS will be converts in to IP address.

63
Windump -I -c5 -nnip:this filter captures only 5 packets and DNS will be converts in to IP address

Windump -I port 80: this filter captures the packets whose port number is 80.

Windump -I 2 host 172.20.3.159: this filter is used to connect to the specified host and captures the packets
from that host.

Windump -I 2 tcp: this filter captures all tcp packets.

64
RESULTS:The network packets received and sent are analyzed using the tcpdump
utility.

65
EXPERIMENT NO- 09

AIM: Analysis of network traces using Whireshark

OBJECTIVE:To demonstrate Analysis of network traces using Whireshark.

ALGORITHM:
1. Start
2. ip.src ==‗address‘
3. ip.addr ==‗address‘
4. ip.dst ==‗address‘
5. tcp
6. http
7. tcp.port
8. tcp.analysis.flags
9. tcpcontains
10. udpcontains
11. http.response.code
12. end

DESCRIPTION AND EXECUTION:


o Several filters such as ip.src, ip.dst are applied to packets on wireshark and the packets
are analysed.
o Wireshark is an open-source network protocol analysis software program started by
Gerald Combs in1998.
o A global organization of network specialists and software developers support Wireshark
and continue to make updates for new network technologies and encryption methods.

66
o Wireshark is a packet sniffer and analysis tool. It captures network traffic on the local
network and stores that data for offlineanalysis.
o Wireshark captures network traffic from Ethernet, Bluetooth, Wireless (IEEE.802.11),
Token Ring, Frame Relay connections, andmore.
o Wireshark allows you to filter the log either before the capture starts or during analysis, so
you can narrow down and zero into what you are looking for in the networktrace.
o For example, you can set a filter to see TCP traffic between two IPaddresses.
o You can set it only to show you the packets sent from one computer. The filters
in Wireshark are one of the primary reasons it became the standard tool for packetanalysis.

67
o When you open Wireshark, you see a screen that shows you a list of all of the network
connections you can monitor. You also have a capture filter field, so you only capture the network
traffic you want to see

o You can select one or more of the network interfaces using ―shift left-click.‖ Once you
have the network interface selected, you can start the capture, and there are several ways
todothat.Clickthefirstbuttononthetoolbar,titled―StartCapturingPackets.‖

o Analyzing Data Packets onWireshark


Wireshark shows you three different panes for inspecting packet data. The Packet List, the top pane, is
a list of all the packets in the capture. When you click on a packet, the other two panes change to show
you the details about the selected packet. You can also tell if the packet is part of a conversation. Here
are some details about each column in the top pane:
 No.: This is the number order of the packet that got captured. The bracket indicates
that this packet is part of aconversation.
 Time: This column shows you how long after you started the capture that this packet

68
got captured. You can change this value in the Settings menu if you need something differentdisplayed.
 Source: This is the address of the system that sent thepacket.
 Destination: This is the address of the destination of thatpacket.
 Protocol: This is the type of packet, for example, TCP, DNS, DHCPv6, orARP.
 Length: This column shows you the length of the packet inbytes.
 Info: This column shows you more information about the packet contents, and will
vary depending on what kind of packet itis.

69
o Wireshark Capture FiltersCommands
 Capture filters limit the captured packets by the filter. Meaning if the packets don‘t
match the filter, Wireshark won‘t save them. Here are some examples of capture filters:
 host IP-address: this filter limits the capture to traffic to and from the IP address net
192.168.0.0/24: this filter captures all traffic on thesubnet.
 dst host IP-address: capture packets sent to the specified host. port 53: capture traffic
on port 53only.

 port not 53 and not arp: capture all traffic except DNS and ARPtraffic

Filters:
1. ip.src = =‗address‘

70
2. ip.addr = =‗address‘

3.ip.dst == ‗address‘

71
4. tcp

5. http

72
6. tcp.port

7. tcp.analysis.flags

73
8. tcpcontains

74
9. udp contains

75
10. http.request

11. http.response.code

RESULTS:The packets received and sent are analyzed using filters in wireshark.

76

You might also like