CN Lab Manual
CN Lab Manual
Mission
To nurture good infrastructure and innovative teaching learning environment.
To facilitate the development of academia-industry collaboration programs to meet the
changing needs of industry and society.
To involve students as well as faculties in research and development to meet the
requirements of software industry.
To boost students to succeed in industry, government and academia.
To identify real life problems and provide solutions which are economically feasible as
well as socially acceptable.
LAB
MANUAL
Computer Network Lab
G.M.Vedak Institute of Technology, Tala – 402411
CSL 502
Computer Network Lab
Description:
Term work:
Lab Objectives:
1 To practically explore OSI layers and understand the usage of simulation tools.
2 To analyze, specify and design the topological and routing strategies for an
IP based networking infrastructure.
3 To identify the various issues of a packet transfer from source to destination,
and how they are resolved by the various existing protocols.
Semester: - V
SR.
TITLE OF EXPERIMENT PAGE NO.
NO.
1 Use of Crimping Tool for RJ45 01 – 03
2 Use basic networking commands in Linux (ping, tracert, nslookup, 04 – 08
netstat, ARP, RARP, ip, ifconfig, dig, route ).
3 Build a simple network topology and configure it for static routing 09
protocol using packet tracer. Setup a network and configure IP
addressing, subnetting, masking.
4 Perform network discovery using discovery tools (eg. Nmap, mrtg) 10 – 12
5 Use Wire shark to understand the operation of TCP/IP layers: 13 – 18
● Ethernet Layer: Frame header, Frame size etc.
● Data Link Layer: MAC address, ARP (IP and MAC
address binding)
● Network Layer: IP Packet (header, fragmentation), ICMP
(Query and Echo)
● Transport Layer: TCP Ports, TCP handshake segments etc.
● Application Layer: DHCP, FTP, HTTP header formats
6 Use simulator (Eg. NS2) to understand functioning of ALOHA, 19 – 23
CSMA/CD
7 a. Set up multiple IP addresses on a single LAN. 24 – 27
b. Using nestat and route commands of Linux, do the following:
● View current routing table
● Add and delete routes
● Change default gateway
Perform packet filtering by enabling IP forwarding using IP tables
in Linux.
8 Study and Installation of Network Simulator (NS3) 28 – 31
9 Design VPN and Configure RIP/OSPF using Packet tracer. 32 – 50
Semester: - V
SR.
TITLE OF EXPERIMENT PAGE NO.
NO.
10 Java program for Socket Programming 51 – 53
11 Perform File Transfer and Access using FTP 54 – 61
12 Perform Remote login using Telnet server 62 – 69
13 Some questions and answers. 70 – 75
Semester: - V
SR.
TITLE OF EXPERIMENT PAGE NO. SOFTWARE
NO.
1 Use of Crimping Tool for RJ45 01 – 03 --
2 Use basic networking commands in Linux (ping, 04 – 08 --
tracert, nslookup, netstat, ARP, RARP, ip,
ifconfig, dig, route ).
3 Build a simple network topology and configure 09 Packet Tracer
it for static routing protocol using packet tracer.
4 Perform network discovery using discovery 10 – 12 Nmap
tools (eg. Nmap, mrtg
5 Use Wireshark to understand the operation of 13 – 18 Wireshark
TCP/IP layers:
6 Use simulator (Eg. NS2) to understand 19 – 23 NS2
functioning of ALOHA, CSMA/CD.
7 Set up multiple IP addresses on a single LAN. 24 – 27 --
Using nestat and route commands of Linux.
8 Study and Installation of Network Simulator 28 – 31 NS3
(NS3)
9 Design VPN and Configure RIP/OSPF using 32 – 50 Packet Tracer
Packet tracer.
10 Java program for Socket Programming 51 – 53 Java
11 54 – 61 Auto FTP
Perform File Transfer and Access using FTP
Manager
12 Perform Remote login using Telnet server 62 – 69 RHEL 6
EXPERIMENT NO. 1
EXPERIMENT NO. 2
AIM:- Use basic networking commands in Linux (ping, tracert, nslookup, netstat,
ARP, RARP, ip, ifconfig, dig, route ).
THEORY:- ifconfig
ifconfig(interface configuration) command is used to configure the kernel-resident network
interfaces. It is used at the boot time to set up the interfaces as necessary. After that, it is
usually used when needed during debugging or when you need system tuning. Also, this
command is used to assign the IP address and netmask to an interface or to enable or disable a
given interface.
nslookup
nslookup (stands for “Name Server Lookup”) is a useful command for getting information
from DNS server. It is a network administration tool for querying the Domain Name System
(DNS) to obtain domain name or IP address mapping or any other specific DNS record. It is
also used to troubleshoot DNS related problems.
ping
(Packet Internet Groper) command is used to check the network connectivity
between host and server/host. This command takes as input the IP address or the URL and sends
a data packet to the specified address with the message “PING” and get a response from the
server/host this time is recorded which is called latency. Fast ping low latency means faster
connection. Ping uses ICMP(Internet Control Message Protocol) to send an ICMP echo
message to the specified host if that host is available then it sends ICMP reply message. Ping
is generally measured in millisecond every modern operating system has this ping pre-installed.
traceroute
Traceroute command in Linux prints the route that a packet takes to reach the host. This
command is useful when you want to know about the route and about all the hops that a
packet takes. Below image depicts how traceroute command is used to reach the
Google(172.217.26.206) host from the local machine and it also prints detail about all the
hops that it visits in between.
netstat
netstat command in Linux prints the route that a packet takes to reach the host. This
command is useful when you want to know about the route and about all the hops that a
packet takes. Below image depicts how traceroute command is used to reach the
Google(172.217.26.206) host from the local machine and it also prints detail about all the
hops that it visits in between.
arp
arp command manipulates the System’s ARP cache. It also allows a complete dump of the
ARP cache. ARP stands for Address Resolution Protocol. The primary function of this
protocol is to resolve the IP address of a system to its mac address, and hence it works
between level 2(Data link layer) and level 3(Network layer).
ip
ip command in Linux is present in the net-tools which is used for performing several
network administration tasks. IP stands for Internet Protocol. This command is used to show
or manipulate routing, devices, and tunnels. It is similar to ifconfig command but it is much
more powerful with more functions and facilities attached to it. ifconfig is one of the
deprecated commands in the net-tools of Linux that has not been maintained for many years.
ip command is used to perform several tasks like assigning an address to a network interface
or configuring network interface parameters.
It can perform several other tasks like configuring and modifying the default and static
routing, setting up tunnel over IP, listing IP addresses and property information, modifying
the status of the interface, assigning, deleting and setting up IP addresses and routes
dig
dig command for Domain Information Groper. It is used for retrieving information about
DNS name servers. It is basically used by network administrators. It is used for verifying and
troubleshooting DNS problems and to perform DNS lookups. Dig command replaces older
tools such as nslookup and the host.
EXPERIMENT NO. 3
AIM:- Build a simple network topology and configure it for static routing protocol
using packet tracer. Setup a network and configure IP addressing, subnetting,
masking.
THEORY:- Cisco Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that
allows users to create network topologies and imitate modern computer networks. The software
allows users to simulate the configuration of Cisco routers and switches using a simulated
command line interface. Packet Tracer makes use of a drag and drop user interface, allowing
users to add and remove simulated network devices as they see fit. The software is mainly
focused towards Certified Cisco Network Associate Academy students as an educational tool
for helping them learn fundamental CCNA concepts.
STEPS:- 1. Pick a total of 4 pcs in the packet tracer application.
2. We need 2 routers.
3. We need a single router.
4. Give the appropriate IP addresses to the pcs accordingly.
5. Test the network with the help of packets.
EXPERIMENT NO. 4
AIM:- Perform network discovery using discovery tools (eg. nmap, mrtg)
THEORY:- nmap (Network Mapper) is a security scanner originally written by Gordon Lyon (also known
by his pseudonym Fyodor Vaskovich) used to discover hosts and services on a computer
network, thus creating a "map" of the network. To accomplish its goal, Nmap sends specially
crafted packets to the target host and then analyzes the responses. Unlike many simple port
scanners that just send packets at some predefined constant rate, Nmap accounts for the network
conditions (latency fluctuations, network congestion, the target interference with the scan)
during the run. Also, owing to the large and active user community providing feedback and
contributing to its features, Nmap has been able to extend its discovery capabilities beyond
simply figuring out whether a host is up or down and which ports are open and closed; it can
determine the operating system of the target, names and versions of the listening services,
estimated uptime, type of device, and presence of a firewall.
• Port Scanning – Enumerating the open ports on one or more target hosts.
• Version Detection – Interrogating listening network services listening on remote
devices to determine the application name and version number.
EXPERIMENT NO. 5
AIM:-
Use Wire shark to understand the operation of TCP/IP layers:
● Ethernet Layer: Frame header, Frame size etc.
● Data Link Layer: MAC address, ARP (IP and MAC address binding)
● Network Layer: IP Packet (header, fragmentation), ICMP (Query and
Echo)
● Transport Layer: TCP Ports, TCP handshake segments etc.
Application Layer: DHCP, FTP, HTTP header formats.
THEORY:- Wireshark, a network analysis tool formerly known as Ethereal, captures packets in real time
and display them in human-readable format. Wireshark includes filters, color coding, and other
features that let you dig deep into network traffic and inspect individual packets.
Capturing Packets
After downloading and installing Wireshark, you can launch it and double-click the name of a
network interface under Capture to start capturing packets on that interface. For example, if you
want to capture traffic on your wireless network, click your wireless interface. You can
configure advanced features by clicking Capture > Options, but this isn’t necessary for now.
As soon as you click the interface’s name, you’ll see the packets start to appear in real time.
Wireshark captures each packet sent to or from your system.
If you have promiscuous mode enabled—it’s enabled by default—you’ll also see all the other
packets on the network instead of only packets addressed to your network adapter. To check if
promiscuous mode is enabled, click Capture > Options and verify the “Enable promiscuous
mode on all interfaces” checkbox is activated at the bottom of this window.
Click the red “Stop” button near the top left corner of the window when you want to stop
capturing traffic.
Color Coding
You’ll probably see packets highlighted in a variety of different colors. Wireshark uses colors to
help you identify the types of traffic at a glance. By default, light purple is TCP traffic, light
blue is UDP traffic, and black identifies packets with errors—for example, they could have been
delivered out of order.
To view exactly what the color codes mean, click View > Coloring Rules. You can also
customize and modify the coloring rules from here, if you like,
Sample Captures
If there’s nothing interesting on your own network to inspect, Wireshark’s wiki has you
covered. The wiki contains a page of sample capture files that you can load and inspect. Click
File > Open in Wireshark and browse for your downloaded file to open one.
You can also save your own captures in Wireshark and open them later. Click File > Save to
save your captured packets.
Filtering Packets
If you’re trying to inspect something specific, such as the traffic a program sends when phoning
home, it helps to close down all other applications using the network so you can narrow down
the traffic. Still, you’ll likely have a large amount of packets to sift through. That’s where
Wireshark’s filters come in.
The most basic way to apply a filter is by typing it into the filter box at the top of the window
and clicking Apply (or pressing Enter). For example, type “dns” and you’ll see only DNS
packets. When you start typing, Wireshark will help you auto complete your filter.
You can also click Analyze > Display Filters to choose a filter from among the default filters
included in Wireshark. From here, you can add your own custom filters and save them to easily
access them in the future.
For more information on Wireshark’s display filtering language, read the Building display filter
expressions page in the official Wireshark documentation.
Another interesting thing you can do is right-click a packet and select Follow > TCP Stream.
You’ll see the full TCP conversation between the client and the server. You can also click other
protocols in the Follow menu to see the full conversations for other protocols, if applicable.
Close the window and you’ll find a filter has been applied automatically. Wireshark is showing
you the packets that make up the conversation.
Inspecting Packets
Click a packet to select it and you can dig down to view its details.
You can also create filters from here — just right-click one of the details and use the Apply as
Filter submenu to create a filter based on it.
Wireshark is an extremely powerful tool, and this tutorial is just scratching the surface of what
you can do with it. Professionals use it to debug network protocol implementations, examine
security problems and inspect network protocol internals.
EXPERIMENT NO. 6
4. Set the appropriate permissions for the ns-allinone-2.34 to allow executing the files
inside it. To do that: Right click the folder -> Properties -> Permissions , and choose the
appropriate group with the appropriate file access, then click "Allow executing file as
program" and then click "Apply permissions to enclosed files".
7. You need to be in the directory where you placed the ns-allinone-2.34 folder
8. If you are not in the /home/e , then move to it by using the command cd
9. Now, supposing you are in the directory /home/e (e can be any other user) type the
following command to move inside the ns-allinone-2.34 using the command cd $ cd ns-
allinone-2.34
10. Then, type the following command (you will be asked to enter the system password to
process. Also, you will be asked if you want to continue, type: y to continue): $ sudo
apt-get install build-essential autoconf automake libxmu-dev.
We have obtained the following characteristic plot for the Slotted ALOHA, which matches the
theoretical result.
EXPERIMENT NO. 7
sudo ifconfig
Sample output:
collisions:0 txqueuelen:1000
collisions:0 txqueuelen:0
Now let us add an additional IP address, for example 192.168.1.104, to the Interface
card.
Open your Terminal and run the following command to add additional IP.
Sample output:
$ netstat -rn
Adding route
sudo route add -net 192.168.3.0 gw 192.168.1.1 netmask 255.255.255.0 dev eth0
Deleting route
sudo route del -net 192.168.3.0 gw 192.168.1.1 netmask 255.255.255.0 dev eth0
CONCLUSION:- Thus, we have studied and successfully add the multiple IP address and
also perform actions in Linux.
EXPERIMENT NO. 8
The purpose of this tutorial is to introduce new ns-3 users to the system in a structured way. It is
sometimes difficult for new users to glean essential information from detailed manuals and to
convert this information into working simulations. In this tutorial, we will build several example
simulations, introducing and explaining key concepts and features as we go.
As the tutorial unfolds, we will introduce the full ns-3 documentation and provide pointers to
source code for those interested in delving deeper into the workings of the system.
A few key points are worth noting at the onset
ns-3 is open-source, and the project strives to maintain an open environment for
researchers to contribute and share their software.
ns-3 is not a backwards-compatible extension of ns-2; it is a new simulator. The two
simulators are both written in C++ but ns-3 is a new simulator that does not support
the ns-2 APIs.
For the installation of NS3, VMware workstation is required to be installed, along with an
Ubuntu system.
1. Download VMWare workstation from the website:
https://my.vmware.com/en/web/vmware/downloads/info/slug/desktop_end_user_compu
ting/vmware_workstation_player/15_0
2. Download Ubuntu 20.04.01 Desktop AMD 64 from the website:
https://ubuntu.com/download/desktop
3. Install VMWare workstation onto the computer system and open it.
4. Set up the VMware workstation.
a. Create a new virtual machine by selecting “Create New Virtual Machine.”
4. b. In the installer wizard, select installer disc image file(iso) and select the downloaded
Ubuntu 20.04.01 AMD 64 iso file by browsing through the computer download files.
11. If all of the tests were passed, Congratulations! NS3 has now been installed
successfully.
EXPERIMENT NO. 9
Hop Count:
Hop count is the number of routers occurring in between the source and destination
network. The path with the lowest hop count is considered as the best route to reach a
network and therefore placed in the routing table. RIP prevents routing loops by limiting
the number of hopes allowed in a path from source and destination. The maximum hop
count allowed for RIP is 15 and hop count of 16 is considered as network unreachable.
Features of RIP:
1. Updates of the network are exchanged periodically.
2. Updates (routing information) are always broadcast.
3. Full routing tables are sent in updates.
Routers always trust on routing information received from neighbour routers. This is also known
as Routing on rumours.
Steps for implementing RIP:
Step1:
Select Router – select 1841 router and drag it to the screen (Router0).
Select another Router – select 1841 and drag it to right of the outer0 (Router1).
Select Switches – select 2950-24 and drag it below the Router0 (Switch0).
Select Switches – select 2950-24 and drag it below the Router1 (Switch1).
Select End Device – select Generic and drag it below Switch0 (PC-PT PC0).
Select End Device – select Generic and drag it below Switch1 (PC-PT PC1).
Select End Device – select Generic and drag it below Switch1 (PC-PT PC2).
Select Connections – Connect routers, switches and PCs to each other.
Step2:
Step3:
Click on PC1 and go to Desktop > IP Configuration
Add IP Address, as you will add the IP Address, Subnet Mask will be automatically added
and displayed.
Add Default Gateway and close the window.
Step4:
Step5:
Click on Router0. Go to Config > FastEthernet0/0.
Here, add IP Address and On the Port Status.
Step6:
Click on Router1. Go to Config > FastEthernet0/1.
As you will see above, there is green dots which means connections are done
successfully between Router, Switches and PCs.
Step7:
Click on Router0. Go to Config > FastEthernet0/1.
Here, add IP Address and On the Port Status
Step8:
Click on Router1. Go to Config > FastEthernet0/0.
Here, add IP Address and On the Port Status
As you can see above, connection is done between both the Routers successfully.
Step9:
Click on Router1. Go to Config > RIP.
Here, add the network address to connect router1 with switch1, PC1, PC2 and router0.
Step10:
Click on Router0. Go to Config > RIP.
Here, add the network address to connect router0 with switch0, PC0 and router1.
Now, all the connections are done successfully, you can check it by clicking on this symbol.
And then, click on any two PCs, you will get the status as successful.
Final Output:
Step2:
Click on PC0 and go to Desktop > IP Configuration
Add IP Address, as you will add the IP Address, Subnet Mask will be automatically added
and displayed.
Add Default Gateway and close the window.
Step3:
Click on PC1 and go to Desktop > IP Configuration
Add IP Address, as you will add the IP Address, Subnet Mask will be automatically added
and displayed.
Add Default Gateway and close the window.
Step4:
Click on PC2 and go to Desktop > IP Configuration
Add IP Address, as you will add the IP Address, Subnet Mask will be automatically added
and displayed.
Add Default Gateway and close the window.
Step5:
Click on Router0. Go to Config > FastEthernet0/0.
Here, add IP Address and On the Port Status.
Step6:
Click on Router1. Go to Config > FastEthernet0/1.
Here, add IP Address and On the Port Status.
As you will see above, there is green dots which means connections are done successfully
between Router, Switches and PCs.
Step7:
Click on Router0. Go to Config > FastEthernet0/1.
Here, add IP Address and On the Port Status.
Step8:
Click on Router1. Go to Config > FastEthernet0/0.
Here, add IP Address and On the Port Status.
As you can see above, connection is done between both the Routers successfully.
Step9:
Click on Router1. Go to Config > RIP.
Here, add the network address to connect router1 with switch1, PC1, PC2 and router0.
Step10:
Click on Router0. Go to Config > RIP.
Here, add the network address to connect router0 with switch0, PC0 and router1.
Now, all the connections are done successfully, you can check it by clicking on this symbol.
And then, click on any two PCs , you will get the status as successful.
Step12:
Click on PC3 and go to Desktop > IP Configuration
Add IP Address, as you will add the IP Address, Subnet Mask will be automatically added
and displayed.
Add Default Gateway and close the window.
Step13:
Click on PC3 and go to Desktop > IP Configuration
Add IP Address, as you will add the IP Address, Subnet Mask will be automatically added
and displayed.
Add Default Gateway and close the window.
Step14:
Click on Switch1 and go to CLI
Add type the VLAN code – VLAN CODE:
VLAN
enable
config t
vlan 20
name purchase
exit
vlan 30
name sales
exit
int fa0/2
switchport access vlan 20
exit
int fa0/3
switchport access vlan 20
exit
int fa0/4
switchport access vlan 20
exit
int fa0/5
switchport access vlan 20
exit
Final Output:
Now, PC1, PC2 are not connected to PC3 and PC4.
EXPERIMENT NO. 10
main(String[]
args){ try
{
ServerSocket ss=new
ServerSocket(6666);
Socket
s=ss.accept();//establishes
connection
DataInputStream dis=new
DataInputStream(s.getInputStream()); String
str=(String)dis.readUTF();
System.out.printl
n("message=
"+str); ss.close();
}
catch(Exception e){System.out.println(e);}
}
}
MyClient.java file
import java.io.*; import
java.net.*; public class
MyClient
{
public static void main(String[] args)
{
try
{
Socket s=new Socket("localhost",6666);
DataOutputStream dout=new
DataOutputStream(s.getOutputStream());
dout.writeUTF("Hello Server");
dout.flush();
dout.close();
s.close();
}catch(Exception e){System.out.println(e);}
}
}
Output:
To execute this program open two command prompts and execute each program at
each command prompt as displayed in the below figures.
First run Myserver.java file in terminal/cmd,
Running MyServer.java
Then in new terminal/cmd run MyClient.java file
Running MyServer.java
As soon as you run MyClient program a message is sent to server and displayed in
MyServer Terminal/CMD as shown below,
EXPERIMENT NO. 11
We can download the file using anonymous user but cannot upload the file. Also the default
data location (or pwd ) of FTP server will be pub directory during anonymous access.
Step 5: b. Access the FTP server and transfer files using command prompt.
First go to browser then and type FTP://192.168.10.10. It will show default
location of pub directory.
CONCLUSION:- The File Transfer Protocol (FTP) is a standard network protocol used
to transfer computer files from one host to another host over a TCP-
based network, such as the Internet. FTP is built on a client-server
architecture and uses separate control and data connections between
the client and the server.
During the Anonymous access of FTP server default location of FTP
data will be pub directory. However during user specific access default
location of ftp data will be user directory in /home on server.
EXPERIMENT NO. 12
-server
-client
Step 1: Installation of Packages
1. Login using root account. Necessary rpm for telnet server is xinetd, telnet-
server and telnet.
# rpm –ivh xinetd-2.3.14-31.e16.X86_64
# rpm –ivh telnet-server-
# rpm –ivh telnet-
2, To check whether the package is installed on the system.
The version numbers of the package should not matter, Red Hat Network
(RHN) will always provide you with the latest version of the package.
01 Digital Data
Digital data take on discrete values; examples are text and integers.
02 Analog Signal
An analog signal is a continuously varying electromagnetic wave that may be propagated over a
variety of media, depending on frequency; examples are copper wire media, such as twisted pair
and coaxial cable.
03 Digital Signal
A digital signal is a sequence of voltage pulses that may be transmitted over a copper wire
medium; for example, a constant positive voltage level may represent binary 0 and a constant
negative voltage level may represent binary 1.
04 channel capacity
The maximum rate at which data can be transmitted over a given communication path, or
channel, under given conditions is referred to as the channel capacity.
05 Transmission medium and its type
The transmission medium is the physical path between transmitter and receiver. Transmission
media can be classified as guided or unguided.
06 Infrared
Infrared (IR) light is electromagnetic radiation with longer wavelengths than those of visible
light, extending from the nominal red edge of the visible spectrum at 0.74 micro meters (µm)to
300 µm.
07 Multiplexing
Is a method by which multiple analog message signals or digital data streams are combined into
one signal over a shared medium.
08 Demultiplexing
Demultiplexer (or demux) is a device taking a single input signal and selecting one of many
data-output-lines, which is connected to the single input.
09 frequency division multiplexing (FDM)
FDM is a technique by which the total bandwidth available in a communication medium is
divided into a series of non-overlapping frequency sub-bands, each of which is used to carry a
separate signal.
10 Time division multiplexing (TDM).
TDM is a type of digital (or rarely analog) multiplexing in which two or more bit streams or
signals are transferred appearing simultaneously as sub-channels in one communication channel,
but are physically taking turns on the channel.
11 guard bands
A guard band is an unused part of the radio spectrum between radio bands, for the purpose of
preventing interference.
12 What techniques are used for multiplexing?
Two techniques for multiplexing in telecommunications networks are in common use: frequency
division multiplexing (FDM) and time division multiplexing (TDM).
13 LAN,MAN,WAN
LAN: (local area network as listed in our computer terms page) A group of computers that
share a common connection and are usually in a small area or even in the same building.
MAN: (metropolitan area network) This is a larger network that connects computer users in a
particular geographic area or region. For example a large university may have a network so large
that it may be classified as a MAN. The MAN networks usually exist to provide connectivity to
local ISPs, cable tv, or large corporations.
WAN: (wide area network) This is the largest network and can interconnect networks
throughout the world and is not restricted to a geographical location. The Internet is an example
of a worldwide public WAN.
14 Switching Techniques
A. Circuit switching: Communication via circuit switching implies that there is a dedicated
communication path between two stations.
B. Packet switching: Packet switching is a digital networking communications method that
groups all transmitted data – regardless of content, type, or structure – into suitably sized
blocks, called packets.
15 Asynchronous transfer mode
Asynchronous transfer mode (ATM), also known as cell relay, is in some ways similar to packet
switching. Like packet switching, ATM involves the transfer of data in discrete chunks. Also,
like packet switching, ATM allows multiple logical connections to be multiplexed over a single
physical interface.
16 TCP IP Protocol
Is the basic communication language or protocol of the Internet. It can also be used as a
communications protocol in a private network.
17 OSI Model
The Open Systems Interconnection (OSI) model (ISO/IEC 7498-1) is a product of the Open
Systems Interconnection effort at the International Organization for Standardization. It is a
prescription of characterizing and standardizing the functions of a communications system in
terms of abstraction layers.
18 Internetworking
Internetworking (a combination of the words inter (“between”) and networking; it is not internet-
working or international-network) is the practice of connecting a computer network with other
networks through the use of gateways that provide a common method of routing information
packets between the networks. The resulting system of interconnected networks is called an
internetwork, or simply an internet
19 Routers
A router is a device that forwards data packets between computer networks, creating an overlay
internetwork. A router is connected to two or more data lines from different networks. When a
data packet comes in one of the lines, the router reads the address information in the packet to
determine its ultimate destination. Then, using information in its routing table or routing policy,
it directs the packet to the next network on its journey.
20 IPv4 & IPv6
IPv4 IPv6
Addresses are 32 bits (4 bytes) in length. Addresses are 128 bits (16 bytes) in length.
Header includes a checksum. Header does not include a checksum.
Must support a 576-byte packet size (possibly Must support a 1280-byte packet size
fragmented). (without fragmentation).
unavoidable.
25 Crosstalk
Cross talk is a noise that is caused by the inductive coupling between two wires that are closed to
each other. Sometime when talking on the telephone, you can hear another conversation in the
background. That is cross talk.
26 Distortion
Communication line has distributed inductance and capacitance which distort the amplitude
of signals and also delay the signals at different frequencies by different amounts. It is caused by
the fact that different Fourier components travel at different speed.
27 What is fading? What are their types?
The term fading refers to the time variation of received signal power caused by changes in the
transmission medium or path(s).
Fast fading: Fast fading occurs when the coherence time of the channel is small relative to the
delay constraint of the channel. In this regime, the amplitude and phase change imposed by the
channel varies considerably over the period of use.
Slow Fading: slow-fading channel, it is not possible to use time diversity because the
transmitters see only a single realization of the channel within its delay constraint. A deep fade
therefore lasts the entire duration of transmission and cannot be mitigated using coding.
28 What is error correction? What are its type?
a) Forward error correction (FEC) or channel coding is a technique used for controlling
errors in data transmission over unreliable or noisy communication channels.
b) Backward error correction: in which the receiver merely detects the presence of errors
and then sends a request back to the transmitter to retransmit the data in error. Backward
error correction is not practical in many wireless applications.
29 What is ASK, FSK, PSK
ASK refers to a type of amplitude modulation that assigns bit values to discrete amplitude levels.
The carrier signal is then modulated among the members of a set of discrete values to transmit
information.
FSK refers to a type of frequency modulation that assigns bit values to discrete frequency levels.
FSK is divided into non coherent and coherent forms. In non-coherent forms of FSK, the
instantaneous frequency shifts between two discrete values termed the “mark” and “space”
frequencies. In coherent forms of FSK, there is no phase discontinuity in the output signal. FSK
modulation formats generate modulated waveforms that are strictly real values, and thus tend
not to share common features with quadrature modulation schemes.
PSK in a digital transmission refers to a type of angle modulation in which the phase of the
Cisco® Packet Tracer is a powerful network simulation program that allows students to
experiment with network behavior and ask “what if” questions. ... Students can build, configure,
and troubleshoot networks using virtual equipment and simulated connections, alone or in
collaboration with other students.
36 Nmap
Nmap (Network Mapper) is a free and open-source network scanner created by Gordon
Lyon (also known by his pseudonym Fyodor Vaskovich). Nmap is used to
discover hosts and services on a computer network by sending packets and analyzing the
responses.
It is used by network administrator to map their networks.
37 Wireshark
Wireshark is a packet sniffer and analysis tool. It captures network traffic on the local network
and stores that data for offline analysis. Wireshark captures network traffic from Ethernet,
Bluetooth, Wireless.
Wireshark is a network protocol analyzer, or an application that captures packets from a
network connection, such as from your computer to your home office or the internet.
38 CSMA/CD
Carrier Sense Multiple Access/Collision Detection, CSMA/CD is a MAC (Media Access
Control) protocol used in LAN. It defines how network devices respond when two devices
attempt to use a data channel simultaneously and encounter a data collision.
39 RHEL
Red Hat Enterprise Linux (RHEL) is a distribution of the Linux operating system developed for
the business market. RHEL was formerly known as Red Hat Linux Advanced Server. RHEL is
based on free, open source code. The RHEL operating system (OS) supports diverse workloads
in physical, virtualized and cloud environments.