0% found this document useful (0 votes)
29 views

Computer Networks Lab Report

Lab report which includes lab works that are in the computer networks course in cse department.

Uploaded by

Sampad Singha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views

Computer Networks Lab Report

Lab report which includes lab works that are in the computer networks course in cse department.

Uploaded by

Sampad Singha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

Table of Contents

Experiment 1 : Configuration of LAN .............................................................................................. 1


Experiment 2 : Configuration of Switch .......................................................................................... 3
Experiment 3 : Configuration of One Static Routing .................................................................. 5
Experiment 4 : Configuration of Two Static Routing ................................................................... 7
Experiment 5 : Configuration of Three Static Routing ............................................................... 9
Experiment 6 : Configuration of Triangular Static Routing ..................................................... 11
Experiment 7 : Configuration of Square Static Routing........................................................... 13
Experiment 8 : Configuration of RIP Routing.............................................................................. 15
Experiment 9 : Configuration of Open shortest Path First (OSPF) Algorithm................... 17
Experiment 10 : Configuration of VLAN (Virtual Local Area Network) .................................. 19
Experiment 11 : Configuration of HTTP Server ............................................................................ 21
Page |1

Experiment 1: Configuration of LAN

Aim:

To evaluate the performance of a LAN network using a hub-based connection by


observing data transfer across different configurations and protocols.

Requirements:

 3 Windows PCs
 CISCO Packet Tracer Software (Student Version)
 8-port hub
 Cat-5 LAN cable

Theory:

A Local Area Network (LAN) connects devices within a confined geographic space,
such as a building or campus, allowing them to share resources and communicate. In
this experiment,
we use a Hub, a basic networking device, to connect multiple devices. Hubs broadcast
incoming data to all connected devices, regardless of the intended recipient. This
broadcasting leads to shared bandwidth, which can result in network congestion and
packet collisions, especially as the number of connected devices increases.
Ethernet cables (Cat-5) are used to physically connect the devices in a LAN. The IP
addressing follows a specific range based on the subnet mask, and devices can
communicate with each other through protocols like ICMP (used for pinging).

Results (Simulation Mode Output):

When pinging from PC1 to PC2 and PC3, you will observe the following packet
exchange:

 Ping from PC1 to PC2:


Pinging 192.168.1.2 with 32 bytes of data:
Reply from 192.168.1.2: bytes=32 time=4ms TTL=128
Reply from 192.168.1.2: bytes=32 time=3ms TTL=128
Ping statistics for 192.168.1.2
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss)
Minimum = 3ms, Maximum = 4ms, Average = 3ms

 Ping from PC1 to PC3:


Pinging 192.168.1.3 with 32 bytes of data:
Reply from 192.168.1.3: bytes=32 time=5ms TTL=128
Ping statistics for 192.168.1.3:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss)
Minimum = 5ms, Maximum = 6ms, Average = 5ms
Page |2

Network Topology Diagram:

The following diagram represents the LAN setup using a hub:


Page |3

Experiment 2: Configuration of Switch

Aim:

To assess the performance of a LAN network using a switch-based connection and


monitor data transfer across various configurations and protocols.

Requirements:

 3 Windows PCs
 CISCO Packet Tracer Software (Student Version)
 8-port switch
 Cat-5 LAN cable

Theory:

A Local Area Network (LAN) connects devices within a limited geographic area, such
as an office, home, or campus, allowing them to share resources and communicate. In
modern LANs, switches are critical for efficient data management, as they provide
better performance than hubs.

Switches operate at the Data Link Layer (Layer 2) of the OSI model. Unlike hubs,
which broadcast data to all devices in the network, switches maintain a MAC address
table that stores the physical addresses of connected devices. When a switch receives
data, it forwards it only to the intended recipient, thereby optimizing network
performance and reducing the likelihood of data collisions.

Cat-5 Ethernet cables are used to physically connect the devices within the LAN.
Devices on the same subnet use IP addressing to communicate with each other
directly, ensuring smooth data transfer.

Results (Simulation Mode Output):

When pinging from PC1 to PC2 and PC3, you will observe the following packet
exchange:

 Ping from PC1 to PC2:

Pinging 192.168.1.2 with 32 bytes of data:


Reply from 192.168.1.2: bytes=32 time=2ms TTL=128
Reply from 192.168.1.2: bytes=32 time=2ms TTL=128
Ping statistics for 192.168.1.2:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss)
Minimum = 2ms, Maximum = 2ms, Average = 2ms
Page |4

 Ping from PC1 to PC3:

Pinging 192.168.1.3 with 32 bytes of data:


Reply from 192.168.1.3: bytes=32 time=3ms TTL=128
Reply from 192.168.1.3: bytes=32 time=3ms TTL=128
Ping statistics for 192.168.1.3:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss)
Minimum = 3ms, Maximum = 3ms, Average = 3ms

Network Topology Diagram:

The following diagram represents the LAN setup using a switch:


Page |5

Experiment 3: Configuration of One Static Routing

Aim

To configure static routing on a router using CISCO Packet Tracer and evaluate data
transfer between two different networks.

Requirements

 2 Windows PCs (PC1 and PC2)


 CISCO Packet Tracer Software (Student Version)
 1 Router (Cisco 1841 or any available router in Packet Tracer)
 2 Switches
 Cat-5 LAN cables

Theory

Static Routing is a method of network routing in which routes are manually defined by
the network administrator. It is ideal for smaller networks with stable topologies that do
not require frequent updates. In static routing, explicit routes are configured on the
router, specifying how traffic should be forwarded between networks.

In this lab, a router is used to connect two distinct networks: Network 1


(192.168.1.0/24) and Network 2 (192.168.2.0/24). Each network has multiple devices
connected through switches, while the router is responsible for routing traffic between
the two networks using manually configured static routes.

A typical static route configuration involves:

 Destination network: The IP address of the network to which you want to send
traffic.
 Subnet mask: Defines the range of IP addresses within the network.
 Next-hop IP address or exit interface: Specifies where the router should send
packets destined for the remote network.

To test network connectivity, the ping command is used. It sends ICMP echo request
packets from one device to another and waits for a reply. If the ping is successful, it
confirms that the router is correctly forwarding packets based on the static routes.

Results (Ping Test Output)

 Ping from PC1 (192.168.1.2) to PC2 (192.168.2.2):

Pinging 192.168.2.2 with 32 bytes of data:


Reply from 192.168.2.2: bytes=32 time=10ms TTL=128
Reply from 192.168.2.2: bytes=32 time=11ms TTL=128
Page |6

Reply from 192.168.2.2: bytes=32 time=10ms TTL=128


Reply from 192.168.2.2: bytes=32 time=10ms TTL=128
Ping statistics for 192.168.2.2:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milliseconds:
Minimum = 10ms, Maximum = 11ms, Average = 10ms

 Ping from PC2 (192.168.2.2) to PC1 (192.168.1.2):

Pinging 192.168.1.2 with 32 bytes of data:


Reply from 192.168.1.2: bytes=32 time=8ms TTL=128
Reply from 192.168.1.2: bytes=32 time=8ms TTL=128
Reply from 192.168.1.2: bytes=32 time=9ms TTL=128
Reply from 192.168.1.2: bytes=32 time=8ms TTL=128

Ping statistics for 192.168.1.2:


Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milliseconds:

Network Topology Diagram


Page |7

Experiment 4: Configuration of Two Static Routing

Aim:

To configure static routing between two routers in a network using CISCO Packet
Tracer and verify connectivity between devices located in different networks.

Requirements:

 3 Windows PCs (PC1, PC2, PC3)


 CISCO Packet Tracer Software (Student Version)
 2 Routers (Cisco 1841 or similar)
 2 Switches
 Cat-5 LAN cables

Theory:

Static Routing is a process where routing paths are manually configured on routers.
Unlike dynamic routing, which adapts to changes in the network topology, static routing
requires manual updates by the network administrator whenever there are changes.
Static routes are best suited for smaller networks with stable, fixed paths and fewer
devices.

In this experiment, two routers are configured to connect two distinct networks:

 Network 1: 192.168.1.0/24
 Network 2: 192.168.2.0/24

The routers are interconnected through a Serial DCE (Data Communication Equipment)
interface using a point-to-point link with the IP range 10.10.10.0/30. This allows data to
be exchanged between the two networks.

To confirm network connectivity, the ping command is used. It sends ICMP echo
requests from one device to another. A successful ping response indicates that the
routers are properly forwarding data between the two networks, based on the static
routes manually set up on each router.

Results (Ping Test Output):

 Ping from PC1 (192.168.1.2) to PC2 (192.168.2.2):

Pinging 192.168.2.2 with 32 bytes of data:


Reply from 192.168.2.2: bytes=32 time=10ms TTL=128
Reply from 192.168.2.2: bytes=32 time=10ms TTL=128
Reply from 192.168.2.2: bytes=32 time=11ms TTL=128
Reply from 192.168.2.2: bytes=32 time=10ms TTL=128
Page |8

Ping statistics for 192.168.2.2:


Packets: Sent = 4, Received = 4, Lost = 0 (0% loss)
Approximate round trip times in milli-seconds:
Minimum = 10ms, Maximum = 11ms, Average = 10ms

 Ping from PC2 (192.168.2.2) to PC1 (192.168.1.2):

Pinging 192.168.1.2 with 32 bytes of data:


Reply from 192.168.1.2: bytes=32 time=9ms TTL=128
Reply from 192.168.1.2: bytes=32 time=9ms TTL=128
Reply from 192.168.1.2: bytes=32 time=9ms TTL=128
Reply from 192.168.1.2: bytes=32 time=9ms TTL=128

Ping statistics for 192.168.1.2:


Packets: Sent = 4, Received = 4, Lost = 0 (0% loss)
Approximate round trip times in milli-seconds:
Minimum = 9ms, Maximum = 9ms, Average = 9ms

Network Topology Diagram:

The following diagram represents the two-router setup with two separate networks:
Page |9

Experiment 5: Configuration of Three Static Routing

Aim:

To configure static routing between three routers in separate networks using CISCO
Packet Tracer and verify network connectivity between all end devices.

Requirements:

 3 Windows PCs (PC1, PC2, PC3)


 CISCO Packet Tracer Software (Student Version)
 3 Routers (Cisco 1841 or similar)
 3 Switches
 Cat-5 LAN cables
 Serial DCE cables

Theory:

Static Routing is a method where routes are manually configured on routers by the
network administrator. Unlike dynamic routing, which automatically adjusts to changes
in the network topology, static routing requires manual updates whenever there are
changes in the network. This method is ideal for smaller, stable networks where the
routing paths remain relatively constant.

In static routing, administrators have full control over how data is routed between
networks, ensuring that traffic follows specific paths. However, this requires manual
intervention to modify or add routes if the network expands or changes. Although it
provides greater control, static routing is less flexible compared to dynamic routing
protocols, which can adapt automatically to network changes.

In this experiment, three routers are used to interconnect three different networks:

 Network 1: 192.168.1.0/24
 Network 2: 192.168.2.0/24
 Network 3: 192.168.3.0/24

The routers are linked using point-to-point serial connections. Static routes are
manually configured on each router, allowing communication between devices on these
different networks. The goal is to ensure that data can be routed correctly between all
networks by configuring the appropriate static routes.

Results (Ping Test Output):

 Ping from PC1 (192.168.1.2) to PC2 (192.168.2.2) and PC3 (192.168.3.2):

Pinging 192.168.2.2 with 32 bytes of data:


P a g e | 10

Reply from 192.168.2.2: bytes=32 time=10ms TTL=128


Pinging 192.168.3.2 with 32 bytes of data:
Reply from 192.168.3.2: bytes=32 time=10ms TTL=128

 Ping from PC2 (192.168.2.2) to PC1 (192.168.1.2) and PC3 (192.168.3.2):

Pinging 192.168.1.2 with 32 bytes of data:


Reply from 192.168.1.2: bytes=32 time=9ms TTL=128
Pinging 192.168.3.2 with 32 bytes of data:
Reply from 192.168.3.2: bytes=32 time=10ms TTL=128

Network Topology Diagram:

The following diagram represents the two-router setup with two separate networks:
P a g e | 11

Experiment 6: Configuration of Triangular Static Routing

Aim:

To configure and verify static routing in a triangular topology between three routers
using Cisco Packet Tracer, enabling communication between different networks.

Requirements:

 3 Windows PCs (PC1, PC2, PC3)


 Cisco Packet Tracer Software (Student Version)
 3 Routers (e.g., Cisco 1841)
 3 Switches
 Straight-through Ethernet cables (for PC-Switch and Switch-Router connections)
 Serial DCE cables (for router-to-router connections)

Theory:

Static Routing involves manually configuring routing paths on routers. It is commonly


used in smaller, stable networks due to its simplicity and reliability. Unlike dynamic
routing protocols, static routing requires administrators to manually input routes for each
network, which can become cumbersome as the network grows. Despite this limitation,
static routing offers precise control over traffic flow and is often more secure since
routes are explicitly defined.

In a triangular static routing topology, three routers are connected in a triangle, with
each router linked to its own local network. To enable communication between devices
across different networks, static routes must be configured on each router, specifying
the correct next-hop IP addresses. This ensures that data is forwarded appropriately
between the routers, enabling successful communication between all connected
networks.

Results (Ping Test Output):

 From PC1 to PC2:


Pinging 192.168.2.2 with 32 bytes of data:
Reply from 192.168.2.2: bytes=32 time=5ms TTL=128

 From PC1 to PC3:


Pinging 192.168.3.2 with 32 bytes of data:
Reply from 192.168.3.2: bytes=32 time=5ms TTL=128

 From PC2 to PC3:


Pinging 192.168.3.2 with 32 bytes of data:
Reply from 192.168.3.2: bytes=32 time=5ms TTL=128
P a g e | 12

Network Topology Diagram:


P a g e | 13

Experiment 7: Configuration of Square Static Routing

Aim

To analyse the performance and configuration of a square static routing setup using
four routers in a local area network (LAN).

Requirements:

 Windows PCs - 4 Units (Simulated in CISCO Packet Tracer)


 CISCO Packet Tracer Software (Student Version)
 4 Routers
 4 PCs
 Serial Cable - To connect routers
 Cat-5 LAN Cable - To connect PCs to routers

Theory

Static Routing is a method where network administrators manually configure routing


tables on routers to control the path that data packets take within a network. In a
square static routing topology, four routers are arranged in a square formation, each
connecting to a different network. Static routes are manually set up on each router to
allow data to flow between the four networks.

Advantages

 Control: Administrators can precisely define the routes for data packets,
optimizing network performance.
 Security: Static routes are less vulnerable to unauthorized changes since the
routing tables are manually configured and not dynamically updated.
 No Overhead: Unlike dynamic routing protocols, static routing doesn’t consume
network resources for route discovery or updating routing tables.

Disadvantages

 Complexity in Large Networks: Increased manual configuration and potential


for errors as the network grows.
 Manual Updates Required: Network topology changes require administrators to
manually update routing tables.

Results (Ping Test Outputs):

 From PC1 to PC2:


Pinging 192.168.2.2 with 32 bytes of data:
Reply from 192.168.2.2: bytes=32 time=5ms TTL=128
P a g e | 14

 From PC1 to PC3:


Pinging 192.168.3.2 with 32 bytes of data:
Reply from 192.168.3.2: bytes=32 time=5ms TTL=128

 From PC1 to PC4:


Pinging 192.168.4.2 with 32 bytes of data:
Reply from 192.168.4.2: bytes=32 time=5ms TTL=128

 From PC2 to PC3:


Pinging 192.168.3.2 with 32 bytes of data:
Reply from 192.168.3.2: bytes=32 time=5ms TTL=128

 From PC2 to PC4:


Pinging 192.168.4.2 with 32 bytes of data:
Reply from 192.168.4.2: bytes=32 time=5ms TTL=128

 From PC3 to PC4:


Pinging 192.168.4.2 with 32 bytes of data:
Reply from 192.168.4.2: bytes=32 time=5ms TTL=128

Network Topology Diagram


P a g e | 15

Experiment 8: Configuration of RIP Routing

Aim:

To analyse the performance and configuration of the Routing Information Protocol (RIP)
in a local area network (LAN) environment using routers.

Requirements:

 Windows PCs - 4 Units (Simulated in CISCO Packet Tracer)


 CISCO Packet Tracer Software (Student Version)
 4 Routers
 4 PCs
 Serial Cable - To connect routers
 Cat-5 LAN Cable - To connect PCs to routers

Theory

The Routing Information Protocol (RIP) is a distance-vector routing protocol used


to manage routing decisions in local area networks (LANs). RIP relies on the Bellman-
Ford algorithm to determine the best route for data packets by counting the number of
hops (intermediate devices like routers) between the source and destination. The route
with the fewest hops is considered the optimal path.
RIP has a limitation of 15 hops, meaning it cannot support networks where a path
between two devices exceeds this number. This constraint makes RIP most suitable for
smaller networks, where the number of routers between devices is relatively low.
Networks that require more than 15 hops need more advanced routing protocols such
as OSPF (Open Shortest Path First) or BGP (Border Gateway Protocol).

Advantages

 Simplicity: Easy to configure and understand, making it a suitable choice for


small networks.
 Automatic Updates: Routers share their routing tables with neighbors at regular
intervals, ensuring that routes are up to date.

Disadvantages

 Hop Count Limitation: The maximum hop count of 15 limits the size of the
network it can effectively manage.
 Slow Convergence: Changes in the network topology can take time to
propagate through the network.

Results (Ping Test Outputs)


P a g e | 16

 From PC1 to PC2:


Pinging 192.168.2.1 with 32 bytes of data:
Reply from 192.168.2.1: bytes=32 time=5ms TTL=128

 From PC1 to PC3:


Pinging 192.168.3.1 with 32 bytes of data:
Reply from 192.168.3.1: bytes=32 time=5ms TTL=128

 From PC1 to PC4:


Pinging 192.168.4.1 with 32 bytes of data:
Reply from 192.168.4.1: bytes=32 time=5ms TTL=128

 From PC2 to PC3:


Pinging 192.168.3.1 with 32 bytes of data:
Reply from 192.168.3.1: bytes=32 time=5ms TTL=128

 From PC3 to PC4:


Pinging 192.168.4.1 with 32 bytes of data:
Reply from 192.168.4.1: bytes=32 time=5ms TTL=128

Network Topology Diagram:


P a g e | 17

Experiment 9: Configuration of Open shortest Path First (OSPF) Algorithm

Aim:

To analyse the performance and configuration of the Open Shortest Path First (OSPF)
routing protocol in a local area network (LAN) environment using routers.

Requirements:

 Windows PCs - 4 Units (Simulated in CISCO Packet Tracer)


 CISCO Packet Tracer Software (Student Version)
 4 Routers
 4 PCs
 Serial Cable - To connect routers
 Cat-5 LAN Cable - To connect PCs to routers

Theory:

Open Shortest Path First (OSPF) is a link-state routing protocol that utilizes a link-
state routing algorithm to identify the most efficient path for data transmission. Unlike
distance-vector protocols, which rely on hop counts, OSPF builds a complete map of
the network topology and uses this information to calculate the shortest path based on
various metrics, such as bandwidth.

OSPF is widely adopted in enterprise networks because of its scalability and ability to
efficiently manage large and complex networks. It can support a vast number of routers
and subnets, making it suitable for dynamic environments where network topologies
frequently change. Additionally, OSPF offers faster convergence times compared to
distance-vector protocols, ensuring that routing decisions adapt quickly to network
changes. By dividing networks into areas, OSPF optimizes routing efficiency and
reduces overhead, further enhancing its performance in large-scale deployments.

Key Features of OSPF:

 Link-State Protocol: OSPF routers share information about their direct


connections to other routers, allowing them to create a complete map of the
network.
 Cost-Based Routing: OSPF calculates the best path based on the cost of
routes, which can be adjusted by network administrators.
 Hierarchical Design: OSPF supports a hierarchical network structure with
areas, enhancing scalability and efficiency.

Advantages of OSPF:

 Scalability: OSPF can efficiently manage large networks with thousands of


routers.
P a g e | 18

 Faster Convergence: OSPF typically converges faster than distance-vector


protocols like RIP.
 Support for Multiple Network Types: OSPF can operate on various network
types, including point-to-point, broadcast, and non-broadcast multi-access
networks.

Results (Ping Test Outputs):

 From PC1 to PC2:


Pinging 192.168.2.1 with 32 bytes of data:
Reply from 192.168.2.1: bytes=32 time=5ms TTL=128

 From PC1 to PC3:


Pinging 192.168.3.1 with 32 bytes of data:
Reply from 192.168.3.1: bytes=32 time=5ms TTL=128

 From PC1 to PC4:


Pinging 192.168.4.1 with 32 bytes of data:
Reply from 192.168.4.1: bytes=32 time=5ms TTL=128

 From PC2 to PC3:


Pinging 192.168.3.1 with 32 bytes of data:
Reply from 192.168.3.1: bytes=32 time=5ms TTL=128

Network Topology Diagram for OSPF


P a g e | 19

Experiment 10: Configuration of VLAN (Virtual Local Area Network)

Aim:

To analyze the configuration and performance of Virtual Local Area Networks (VLANs)
in a network environment using CISCO Packet Tracer.

Requirements:

 Windows PCs - 4 Units (Simulated in CISCO Packet Tracer)


 CISCO Packet Tracer Software (Student Version)
 1 Switch (with VLAN support)
 Straight-through Ethernet cables - For PC connections
 Console cable (optional for CLI access to the switch

Theory:

A Virtual Local Area Network (VLAN) is a logical grouping of devices within a LAN,
regardless of their physical location. VLANs improve security by isolating traffic,
enhance performance by reducing broadcast domains, and simplify network
management through logical organization rather than physical reconfiguration.

Key Features of VLANs:

 Segmentation: VLANs allow for network segmentation, reducing broadcast


domains and improving network performance.
 Security: By separating traffic, VLANs enhance security, preventing
unauthorized access to sensitive information.
 Scalability: VLANs provide scalability by allowing devices to be grouped
logically, regardless of their physical location.
 Ease of Management: VLANs simplify network management, enabling
administrators to modify and organize the network without changing physical
connections.

Results (Ping Test Outputs):

 From PC1 to PC2:


Pinging 192.168.1.20 with 32 bytes of data:
Reply from 192.168.1.20: bytes=32 time=1ms TTL=128

 From PC1 to PC3:


Pinging 192.168.2.10 with 32 bytes of data:
Request timed out.

 From PC2 to PC4:


Pinging 192.168.2.20 with 32 bytes of data:
P a g e | 20

Request timed out.

 From PC3 to PC7:


Pinging 192.168.2.10 with 32 bytes of data:
Request timed out.

Network Topology Diagram:


P a g e | 21

Experiment 11: Configuration of HTTP Server

Aim:

To configure and test an HTTP server using CISCO Packet Tracer, enabling web
access for clients on a local area network (LAN).

Requirements:

 Windows PCs - 2 Units (Simulated in CISCO Packet Tracer)


 CISCO Packet Tracer Software (Student Version)
 1 Router
 1 Server (configured as an HTTP server)
 1 Switch
 Straight-through Ethernet cables - For PC and server connections

Theory:

An HTTP server is a software application or hardware device that delivers web content
to clients (such as web browsers) over the Internet or a local network. It utilizes the
Hypertext Transfer Protocol (HTTP) to transmit data, enabling communication
between clients and servers for accessing websites and resources.

Key Features of HTTP Servers:

 Protocol Support: HTTP servers support various protocols, including HTTP and
HTTPS (secure HTTP).
 Static and Dynamic Content: They can serve static web pages and generate
dynamic content using server-side scripting languages.
 File Handling: HTTP servers can handle multiple file types (HTML, CSS,
images, etc.) for web delivery.

Advantages of HTTP Servers

 Ease of Access: HTTP allows clients to easily access resources on the web
using a uniform resource locator (URL).
 Scalability: HTTP servers can handle multiple requests simultaneously, serving
many users.
 Flexibility: They can serve a wide variety of content and applications,
accommodating various client needs.

Disadvantages of HTTP Servers

 Performance Issues: Under heavy load, HTTP servers may experience


performance bottlenecks, affecting response times.
P a g e | 22

 Security Vulnerabilities: HTTP traffic can be intercepted, making it vulnerable to


attacks; hence, HTTPS is often preferred for secure transactions.

Results (Ping Test Outputs):

 From PC1 to Server:


Pinging 192.168.1.100 with 32 bytes of data:
Reply from 192.168.1.100: bytes=32 time=1ms TTL=128

 From PC2 to Server:


Pinging 192.168.1.100 with 32 bytes of data:
Reply from 192.168.1.100: bytes=32 time=1ms TTL=128

Accessing the HTTP Server:

 From PC1:

HTTP/1.1 200 OK
Content-Type: text/html
<html>
<head>
<title>HTTP Server of Sampad Singha</title>
</head>
<body>
<h1>Hello. This is Sampad Singha</h1>
<p>This is my first web page served by an HTTP server.</p>
</body>
</html>

Network Topology Diagram

You might also like