0% found this document useful (0 votes)
11 views

Computer Networks PRACTICAL

its easy to understand

Uploaded by

prock6451
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Computer Networks PRACTICAL

its easy to understand

Uploaded by

prock6451
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

NAME :: PRIYANSHU PATEL CN(3150710)

PRACTICAL-1
AIM: Study of different network devices in detail.

 Different network devices are:


1. HUB
2. BRIDGE
3. REPEATER
4. SWITCH
5. ROUTER
6. GATEWAY

HUB

 A hub is a physical layer networking device which is used to connect


multiple devices in a network. They are generally used to connect
computers in a LAN.
 A hub has many ports in it. A computer which intends to be
connected to the network is plugged in to one of these ports.
 When a data frame arrives at a port, it is broadcast to every other port,
without considering
whether it is destined for a particular destination or not.

There are two types of hubs:-

1. Active Hub: They have a power supply for regenerating, and amplifying the signals. Active hubs are
expensive in costs as compared to passive hubs.
2. Passive Hub: Passive hubs are simply used to connect signals from different network cables as they do
not have any computerised element. They simply connect the wires of different devices in the star
topology.
3. Intelligent Hub: Intelligent hubs as the name suggests are smarter than active and passive hubs. The
intelligent hub comprises a special monitoring unit named a Management Information Base (MIB).

Advantages of Hub:-
1. It provides support for different types of Network Media.
2. It can be used by anyone as it is very cheap.
3. It can easily connect many different media types.
4. The use of a hub does not impact on the network performance.

Disadvantages of Hub:-
1. It has no ability to choose the best path of the network.
2. It does not include mechanisms such as collision detection.
3. It does not operate in full-duplex mode and cannot be divided into the Segment.
4. It cannot reduce the network traffic as it has no mechanism.
5. Furthermore, it is not capable of connecting various network architectures like a ring, token, and 1ethernet,
and more.

VIEAT/BE/CE/SEM-5 [230943107041] Page 1


NAME :: PRIYANSHU PATEL CN(3150710)
BRIDGE

 A bridge in a computer network is a device used to connect multiple LANs together with a larger Local Area
Network (LAN).
 The mechanism of network aggregation is known as bridging.
 The bridge is a physical or hardware device but operates at the OSI model’s data link layer and is also
known as a layer of two switches.
 Here bridge is used to improve network performance.

There are 3 types of Bridges:-


1. Transparent bridge :- Transparent bridges are invisible to other devices on the network. This bridge doesn’t
reconfigure the network on the addition or deletion of any station.
2. Source routing bridge :- Source routing bridges were developed and designed by IBM specifically for token
ring networks.
3. Translational bridge :- Translational bridges convert the received data from one networking system to
another. Or it is used to communicate or transmit data between two different types of networking systems.
Advantages of Bridge:
 Bridges can be used as a network extension like they can connect two network topologies together.
 It has a separate collision domain, which results in increased bandwidth.
 It can create a buffer when different MAC protocols are there for different segments.
 Highly reliable and maintainable. The network can be divided into multiple LAN segments.
 Simple installation, no requirement of any extra hardware or software except the bridge itself.
 Protocol transparency is higher as compared to other protocols.

Disadvantages of Bridge:
 Expensive as compared to hubs and repeaters.
 Slow in speed.
 Poor performance.
 As the traffic received is in bulk or is broadcasted traffic, individual filtering of data is not possible.
 During the broadcasting of data, the network has high broadcast traffic and broadcast storms can be formed.

REPEATER
 Repeaters are network devices operating at physical layer of the OSI
model that amplify or regenerate an incoming signal before
retransmitting it.
 They are incorporated in networks to expand its coverage area.
 They are also known as signal boosters.

VIEAT/BE/CE/SEM-5 [230943107041] Page 2


1
NAME :: PRIYANSHU PATEL CN(3150710)
Types of Repeaters :-

1. Analog Repeaters − They can only amplify the analog signal.


2. Digital Repeaters − They can reconstruct a distorted signal.
3. Wired Repeaters − They are used in wired LANs.
4. Wireless Repeaters − They are used in wireless LANs and cellular networks.
5. Local Repeaters − They connect LAN segments separated by small distance.
6. Remote Repeaters − They connect LANs that are far from each other.

Advantages of Repeaters :-
 Repeaters are simple to install and can easily extend the length or the coverage area of
networks.
 They are cost effective.
 Repeaters don’t require any processing overhead. The only time they need to be investigated is
in case of degradation of performance.
 They can connect signals using different types of cables.

Disadvantages of Repeaters
 Repeaters cannot connect dissimilar networks.
 They cannot differentiate between actual signal and noise.
 They cannot reduce network traffic or congestion.
 Most networks have limitations upon the number of repeaters that can be deployed.

SWITCH
 Switches are networking devices operating at layer 2 or a data link layer of the OSI model. They connect devices
in a network and use packet switching to send, receive or forward data packets or data frames over the network.
 A switch has many ports, to which computers are plugged in.
 When a data frame arrives at any port of a network switch, it examines the destination address, performs necessary
checks and sends the frame to the corresponding device. It supports unicast, multicast as well as broadcast
communications.

There are four types of Switches


1. Unmanaged Switch :-These are inexpensive switches commonly used in home networks and
small businesses. They can be set up by simply plugging in to the network, after which they
instantly start operating.
2. Managed Switch :- These are costly switches that are used in organizations with large and complex networks,
since they can be customized to augment the functionalities of a standard switch.
3. LAN Switch :- Local Area Network (LAN) switches connects devices in the internal LAN of an
organization.

VIEAT/BE/CE/SEM-5 [230943107041] Page 1


NAME :: PRIYANSHU PATEL CN(3150710)
4. PoE Switch :- Power over Ethernet (PoE) switches are used in PoE Gogabit Ethernets. PoE
technology combine data and power transmission over the same cable so that devices
connected to it can receive both electricity as well as data over the same line. PoE switches
offer greater flexibility and simplifies the cabling connections.

Advantages of Switches :-
 They increment the accessible data transfer capacity of the organization.
 They help in lessening the outstanding burden on individual host PCs.
 They increment the presentation of the organization.
 Networks that use switches will have fewer casing impacts. This is because of the way that switches make
impact areas for every association.
 Switches can be associated straightforwardly with workstations.
 It increases the available bandwidth of the network.
 Networks that use switches will have fewer frame collisions
 More secure

Disadvantages of Switches :-
 They are more costly in contrast with network spans.
 Network availability issues are hard to be followed through the organization switch.
 Broadcast traffic might be problematic.
 Need for Proper Planning
 The switch’s mechanical component can wear out with time.

ROUTER

 Routers are networking devices operating at layer 3 or a


network layer of the OSI model.
 They are responsible for receiving, analysing, and forwarding
data packets among the connected computer networks.

Types of Routers :-
1. Wireless Router :- They provide Wi-Fi connection Wi-Fi devices like laptops, smartphones etc. They can
also provide standard Ethernet routing. For indoor connections, the range is 150 feet while its 300 feet for
outdoor connections.
2. Broadband Routers :- They are used to connect to the Internet through telephone and to use voice over
Internet Protocol (VoIP) technology for providing high-speed Internet access.
3. Core Routers :- They can route data packets within a given network, but cannot route the packets between
the networks.
4. Edge Routers :- They are low-capacity routers placed at the periphery of the networks. They use Border
Gateway Protocol (BGP) for connectivity. There are two types of edge routers, subscriber edge routers and
label edge routers.
5. Brouters :- Brouters are specialised routers that can provide the functionalities of bridges as well. Like a
bridge, brouters help to transfer data between networks. And like a router, they route the data within the
devices of a network.

VIEAT/BE/CE/SEM-5 [230943107041] Page 1


NAME :: PRIYANSHU PATEL CN(3150710)
Advantages of Router
 Association –The essential capacity of switch is to divide a solitary organization association between various
machines.
 Security –Having a Routers is unquestionably an initial move towards making sure about an organization
association. Since interfacing with the web straightforwardly with a modem opens your PC to assortment of
security dangers.
 Dynamic Routing –For encouraging internetwork correspondence, the Routers utilizes dynamic directing
strategies.
 Filtering –Different administrations of Routers incorporates bundle exchanging and parcel separating Routers
channel the organization utilizing a bunch of separating rules.
 Routers take utilization of Network Address Translation (NAT). With NAT Routers can share the association by
utilizing single public IP address and portion of UDP ports

Disadvantages of Router
 Speed –In contrast to repeaters and scaffolds, Routers doesn’t simply peruse 2 layers of information’s.
 Cost Routers –Are expensive more than some other systems administration gadgets.
 Similarity –There is likewise a similarity issues for the Routers particularly for the 5GHz recurrence.
 Unwavering quality –Not all the time switches are dependable. Still some cutting edge gadgets utilize 2.4GHz
range which often gets disengaged.
 Dynamic directing methods are utilized by the switches for the correspondence purposes.
 Routers just does it tasks utilizing routable conventions. A convention that is routable can give IP delivers to
the gadgets so it very well may be recognized across networks.

GATEWAY

 A gateway is a network node that forms a passage between two networks operating with different transmission
protocols.
 Depending upon the functionality, a gateway can operate at any of the seven layers of OSI model.
 It acts as the entry – exit point for a network since all traffic that flows across the networks should pass through
the gateway.

Types of Gateways

1. Unidirectional Gateways − They allow data to flow in


only one direction. Changes made in the source node are replicated in the destination node, but not vice versa.
They can be used as archiving tools.
2. Bidirectional Gateways − They allow data to flow in both directions. They can be used as synchronization tools.
3. Network Gateway − This is the most common type of gateway that provides as interface between two dissimilar
networks operating with different protocols.
4. Cloud Storage Gateway − It is a network node or server that translates storage requests with different cloud
storage service API calls, such as SOAP (Simple Object Access Protocol) or REST (REpresentational State
Transfer).
5. Internet - To-Orbit Gateway (I2O) − It connects devices on the Internet to satellites and spacecraft orbiting the
earth. Two prominent I2O gateways are Project HERMES and Global Educational Network for Satellite

VIEAT/BE/CE/SEM-5 [230943107041] Page 1


NAME :: PRIYANSHU PATEL CN(3150710)
Operations (GENSO).
6. IoT Gateway − IoT gateways assimilates sensor data from IoT (Internet of Things) devices in the field and
translates between sensor protocols before sending it to the cloud network.
7. VoiP Trunk Gateway − It facilitates data transmission between plain old telephone service (POTS) devices like
landline phones and fax machines, with VoIP (voice over Internet Protocol) network.

Advantages of Gateway
 As mentioned earlier, the main benefit of gateway is the connectivity it provides.
 Gateways are known to posses improved security since they allow user authentication
 Filtering process is another important capability of a gateway.
 When the number of Collision and Broadcast domain increases, the network provider can assure that they
will be able to provide better bandwidth.
 Besides filtering, a gateway can also convert data packets according to the destination needs.

Disadvantages of Gateway :-
 Implementation-Generally gateways on default are installed on the routers itself.
 Configuration-Configuration of devices through a gateway is made even more difficult or impossible. There
must be special system administration for this purpose.
 Time Delay-Gateway networks always causes time delay since information must be translated. There is no way
can an instant transfer take place.
 Troubleshooting-Computers on a network are with different protocols.

VIEAT/BE/CE/SEM-5 [230943107041] Page 1


NAME :: PRIYANSHU PATEL CN(3150710)
PRACTICAL- 2
AIM: Study of different type of network cable.

 Different network cable are :-


1. Coaxial cable
2. Cross wire OR Twisted Pair
Cable
3. Optical Fiber

COAXIAL CABLE

 Coaxial cables, commonly called coax, are copper cables with metal shielding designed to provide
immunity against noise and greater bandwidth.
 Coax can transmit signals over larger distances at a higher speed as compared to twisted pair cables.

Types of coaxial cable :-

1. Hardline coaxial cable: Hardline coaxial cable’s center conductor is made of copper, silver and has a
larger diameter when compared to other coaxial cables.
2. Flexible coaxial cable: The flexible coaxial cables are very flexible and the inner conductor is surrounded
by a flexible polymer.
3. Semi-rigid coaxial cable: Semi-rigid coaxial cable uses a solid copper outer sheath with a dielectric of
Polytetrafluoroethylene.
4. Formable coaxial cable: It is an alternative to semi-rigid cable, instead of a rigid copper outer sheath a
flexible metal sheath is utilized.
5. Twinaxial cable: It has two central conductors in the core and a single outer core and dielectric. these
cables are best for low-frequency digital and video transmission.
6. Rigid coaxial cable: Rigid coaxial cable is made up of two copper tubes supported at cable ends and fixed
intervals across the length of the cable using PTFE supports or disk insulators.

Advantages of coaxial cable:

 Coaxial cables support high bandwidth.

VIEAT/BE/CE/SEM-5 [230943107041] Page 1


NAME :: PRIYANSHU PATEL CN(3150710)
 It is easy to install coaxial cables.
 coaxial cables have better cut-through resistance so they are more reliable and durable.
 Less affected by noise or cross-talk or electromagnetic inference. Coaxial cables support multiple
channels.
Disadvantages of coaxial cable:
 Coaxial cables are expensive.
 The coaxial cable must be grounded in order to prevent any crosstalk.
 As a Coaxial cable has multiple layers it is very bulky.
 There is a chance of breaking the coaxial cable and attaching a “t-joint” by hackers, this compromises the
security of the data.
CROSS WIRE OR TWISTED PAIR CABLE

 A crossover cable connects two devices of the same type. You can wire the ends of a patch cable in any
way as long as both ends are identical.
 Compared to straight-through Ethernet cables, the internal wiring of a crossover cable reverses the
transmit and receive signals.

Types of cross wire:


1. Shielded Twisted Pair (STP) Cable: In STP the wires are covered by a copper braid covering or a foil
shield, this foil shield adds a layer that protects it against interference leaking into and out of the cable.
Hence, they are used for longer distances and higher transmission rates.
2. Unshielded Twisted Pair (UTP) Cable: Unshielded twisted pair cable is one of the most commonly
used cables in computer networks at present time. UTP consists of two insulated copper wires twisted
around one another, the twisting of wires helps in controlling interference.

Advantages of cross wire:


 It are often wont to carry both analog and digital data.
 It’s relatively easy to implement and terminate.
 It is the smallest amount expensive media of transmission for brief distances.
 If portion of a twisted pair cable is broken it doesn’t effect the whole network.
 It cause interference themselves.
 Best performance in short distances.
 High-cost performance

Disadvantages of cross wire:


 It result signal distortion in a very effective manner.
 Attenuation is very high.
 It provides poor security and is relatively easy to tap.
 As they a thin so can be easily breakable.
 Low durability (must be maintained regularly).
 Susceptible to electromagnetic interference (EMI).

VIEAT/BE/CE/SEM-5 [230943107041] Page 1


NAME :: PRIYANSHU PATEL CN(3150710)
OPTICAL FIBER
 A fibre optic cable is made of glass or plastic and transmits signals in the structure of light signals.
 The structure of an optical fibre cable is displayed in the figure.
 It involves an inner glass core surrounded by a glass cladding that reflects the light into the core. Each
fibre is encircled by a plastic jacket.

Functionality of optical fiber:


1. On the basis of the Number of Modes:
It is classified into 2 types:
a) Single-mode fiber
b) Multi-mode fiber

2. On the basis of Refractive Index:


It is also classified into 2 types:
a) Step-index optical fiber
b) Graded index optical fiber

Advantages of optical fiber:


 Bandwidth is above copper cables
 Less power loss and allows data transmission for extended distances
 Optical cable is resistance for electromagnetic interference
 Installation is extremely easy thanks to less weight.
 Light has fastest speed within universe, such a lot faster signals

Disadvantages of optical fiber:


 These cable are very difficult to merge so there’ll be loss of beam within cable
 These cable are highly vulnerable while fitting
 These cables are more delicate than copper wires.
 Special devices are needed to ascertain transmission of fiber cable.
RJ-45
 Ethernet is a technology that allows the connection of multiple devices in a Local Area
Network (LAN) OR Wide Area
Network(WAN).
 The Ethernet has also some protocols that
are also responsible for effective
communication between the devices in the
wired network.
 RJ stands for Registered Jacks.
 They are mainly used to connect to different
types of networking media. Different types
of RJ are available, including RJ11, RJ45,
RJ48, RJ61 etc.
 The classes are usually classified based on
structure, functionality and suitability.
These jacks are generally used for Ethernet Networking.

Crimping steps of RJ-45 :-


Step 1) Strip the cable back 1 inch (25 mm) from the end : Insert the cable into the stripper section
of the tool and squeeze it tight. Then, rotate the crimping tool around the cable in a smooth and even
motion to create a clean cut. Keep the tool clamped and pull away towards the end of the wire to
VIEAT/BE/CE/SEM-5 [230943107041] Page 1
NAME :: PRIYANSHU PATEL CN(3150710)
remove the sheathing.
Step 2) Untwist and straighten the wires inside of the cable: Inside of the cable you’ll see a bunch
of smaller wires twisted together. Separate the twisted wires and straighten them out so they’re easier
to sort into the right order.
Step 3) Arrange the wires into the right order: Use your fingers to put the wires in the correct order
so they can be properly crimped. The proper sequence is as follows from left to right: Orange/White,
Orange,Green/White, Blue, Blue/White, Green, Brown/White ,Brown
Step 4) Cut the wires into an even line 1Ú2 inch (13 mm) from sheathing: Hold the wires with your
thumb and index finger to keep them in order. Then, use the cutting section of the crimping tool to cut
them into an even line.
Step 5) Insert the wires into the RJ-45 connector: Hold the RJ-45 connector so the clip is on the
underside and the small metal pins are facing up. Insert the cable into the connector so that each of the
small wires fits into the small grooves in the connector.
Step 6) Stick the connector into the crimping part of the tool and squeeze twice: Insert the
connector in the crimping section of the tool until it can’t fit any further. Squeeze the handles to crimp
the connector and secure the wires. Release the handles, then squeeze the tool again to make sure all of
the pins are pushed down.
Step 7) Remove the cable from the tool and check that all of the pins are down: Take the
connector out of the tool and look at the pins to see that they’re all pushed down in an even line.
Lightly tug at the connector to make sure it’s attached to the cable.
Advantages of RJ-45 :-
 It is easy to install and configured with different devices.
 It is a reliable cable, and the connection speed with the telecommunication interface is high.
Advantages of RJ-45 :-
 It is only used for the shortest distance to connect with telecommunication devices.
 Today most devices are wireless, so the use of registered jacks is becoming obsolete. It has the limited
mobility of the wire.

Crimping tool

 A crimping tool is a device that is used to make cold weld


joints between wires and a connector through deforming one
or both of them to hold the other.
 A special connector is used to join metals together.
 The weld joint properties (mechanical and electrical) are
strong as the parent materials when the tool works and offer
some result, which is known as crimp.
 An instance of crimping is to affixing a connector to the end
of a wire.
 For example, a crimping tool is used to create phone cable
sand network cables to combine RJ-11 and RJ-45 connectors
to both ends of the phone or Cat 5 cable.

VIEAT/BE/CE/SEM-5 [230943107041] Page 1


NAME :: PRIYANSHU PATEL CN(3150710)

VIEAT/BE/CE/SEM-5 [230943107041] Page 1


NAME :: PRIYANSHU PATEL CN(3150710)
PRACTICAL-3
AIM: study of network command.

(1) Ping/tracert : www.gtu.ac.in


Ping:- ping is a computer network administration software utility used to test the reachability of a host on
an Internet Protocol (IP) network. It is available for virtually all operating systems that have networking
capability, including most embedded network administration software.
Tracert:- From the command-line prompt, type “tracert” followed by the hostname or IP address you'd like to
trace to.

(2) Ipconfig :
ipconfig (standing for "Internet Protocol configuration") is a console application program of some
computer operating systems that displays all current TCP/IP network configuration values and refreshes Dynamic
Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings.

(3) Arp : The acronym ARP stands for Address Resolution Protocol which is one of the most important
protocols of the Data link layer in the OSI model. It is responsible to find the hardware address of a host from
a known IP address. There are three basic ARP terms.
Arp_a : The arp -a command is used to display the ARP cache on a computer, including both dynamic and
static entries. This command is similar to the arp command without any options, but it also displays the status of
the entries in the cache.

VIEAT/BE/CE/SEM-5 [230943107041] Page 1


NAME :: PRIYANSHU PATEL CN(3150710)

(4) Netstat :
This command displays the connections active on the computer and the ports the computer is listening to. The
command displays the four parameters: proto, local address, foreign address, and state. The proto column shows
the type of connection, and the local address shows the IP address and the port number of the connection local
machine. The proto column also indicates the foreign address, specifies the IP address and port number of the
connection in the host server, and the state shows whether the connection is established or not.

(5) Netstat_a :
The netstat command is used to show the network connection, routing list, and interface status.

(6) Netstat/? :
The netstat command is a Command Prompt command that displays information about how a computer
communicates with other computers or network devices.

(7) Hostname :
The HOSTNAME command displays the hostname of the system. The hostname command is much easier to use
than going into the system settings to search for it.

VIEAT/BE/CE/SEM-5 [230943107041] Page 1


NAME :: PRIYANSHU PATEL CN(3150710)

(8) Nslookup : www.google.com


Nslookup (stands for “Name Server Lookup”) is a useful command for getting information from the DNS server. It
is a network administration tool for querying the Domain Name System (DNS) to obtain domain name or IP
address mapping or any other specific DNS record. It is also used to troubleshoot DNS-related problems

(10) Systeminfo :
Displays detailed configuration information about a computer and operating system, including
operating system configuration, security information, product ID, and hardware properties.

(11) Pathping :
The PathPing command is a network utility in Windows NT operating systems that combines the
functionality of ping and tracert to help identify network latency and loss. It sends packets to a target
device and measures the response time and packet loss at each hop along the path. This can help diagnose
network-related issues and identify points of failure or delays in the network path.

VIEAT/BE/CE/SEM-5 [230943107041] Page 1


NAME :: PRIYANSHU PATEL CN(3150710)
(12) Pathping : www.google.com

(14) getmac :
Returns the media access control (MAC) address and list of network protocols associated with each address
for all network cards in each computer, either locally or across a network. This command is particularly
useful either when you want to enter the MAC address into a network
analyzer, or when you need to know what protocols are currently in use on each network adapter on a
computer.

VIEAT/BE/CE/SEM-5 [230943107041] Page 1


NAME :: PRIYANSHU PATEL CN(3150710)
PRACTICAL-4
AIM: Implement different LAN topologies using network simulator.

MESH TOPOLOGY
In a mesh topology, every device is connected to another device via a particular channel. In Mesh
Topology, the protocols used are AHCP (Ad Hoc Configuration Protocols), DHCP (Dynamic
Host Configuration Protocol), etc.

STAR Topology
In Star Topology, all the devices are connected to a single hub through a cable. This hub is the
central node and all other nodes are connected to the central node. The hub can be passive in
nature i.e., not an intelligent hub such as broadcasting devices, at the same time the hub can be
intelligent known as an active hub. Active hubs have repeaters in them. Coaxial cables or RJ-45
cables are used to connect the computers. In Star Topology, many popular Ethernet LAN
protocols are used as CD(Collision Detection), CSMA (Carrier Sense Multiple Access), etc.

BUS Topology
Bus Topology is a network type in which every computer and network device is connected to a
single cable. It is bi-directional. It is a multi-point connection and a non-robust topology because
if the backbone fails the topology crashes. In Bus Topology, various MAC (Media Access
Control) protocols are followed by LAN ethernet connections like TDMA, Pure Aloha, CDMA,
Slotted Aloha, etc.

VIEAT/BE/CE/SEM-5 [230943107041] Page 1


NAME :: PRIYANSHU PATEL CN(3150710)

RING TOPOLOGY
In a Ring Topology, it forms a ring connecting devices with exactly two neighboring devices. A
number of repeaters are used for Ring topology with a large number of nodes, because if someone
wants to send some data to the last node in the ring topology with 100 nodes, then the data will
have to pass through 99 nodes to reach the 100th node. Hence to prevent data loss repeaters are
used in the network.
The data flows in one direction, i.e. it is unidirectional, but it can be made bidirectional by having
2 connections between each Network Node, it is called Dual Ring Topology. In-Ring Topology,
the Token Ring Passing protocol is used by the workstations to transmit the data.

TREE TOPOLOGY
This topology is the variation of the Star topology. This topology has a hierarchical flow of
data. In Tree Topology, protocols like DHCP and SAC (Standard Automatic Configuration) are
used.

VIEAT/BE/CE/SEM-5 [230943107041] Page 1


NAME :: PRIYANSHU PATEL CN(3150710)
HYBRID TOPOLOGY
This topological technology is the combination of all the various types of topologies we have
studied above. Hybrid Topology is used when the nodes are free to take any form. It means these
can be individuals such as Ring or Star topology or can be a combination of various types of
topologies seen above. Each individual topology uses the protocol that has been discussed
earlier.

VIEAT/BE/CE/SEM-5 [230943107041] Page 1


NAME :: PRIYANSHU PATEL CN(3150710)
PRACTICAL-5
AIM : Implement the concept of VLAN using Network Simulator.
VLAN:-
Virtual LAN (VLAN) is a concept in which we can divide the devices logically on layer 2 (data link layer).
Generally, layer 3 devices divide the broadcast domain but the broadcast domain can be divided by switches
using the concept of VLAN.
A broadcast domain is a network segment in which if a device broadcast a packet then all the devices in
the same broadcast domain will receive it. The devices in the same broadcast domain will receive all
the broadcast packets but it is limited to switches only as routers don’t forward out the broadcast
packet. To forward out the packets to different VLAN (from one VLAN to another) or broadcast domains,
inter Vlan routing is needed. Through VLAN, different small-size sub-networks are created which are
comparatively easy to handle.
Advantage:-
Solve broadcast problem.
Reduce the size of broadcast domains.
Make device management easier.
Allow us to implement the logical grouping of devices by function instead of location.
Disadvantage:-
Increase network cost.
Add complexity to the network.

VIEAT/BE/CE/SEM-5 [230943107041] Page 1


NAME :: PRIYANSHU PATEL CN(3150710)
PRACTICAL-6
AIM : Implement the concept of static routing.

Static Routing:-
Static routing algorithm is a form of routing which occurs when a router uses a manual configuration
routing entry rather than dynamic entry.
In different cases, static routes are manually configured by a network administrator by adding entries into
the routing table. It is not possible in all cases. Static routes are fixed and do not change if the network is
changed or reconfigured.
Static and dynamic routing is not mutually exclusive. They are usually used on a router to maximise routing
efficiency and to provide backups in the event that dynamic routing information fails to be exchanged.
Step-1:-Add a switch,enddevice and router then make a network.

Step-2:- Give the Static IPAddress of all end device.

Step-3:-Give the address in router 0/0 and 0/1.

VIEAT/BE/CE/SEM-5 [230943107041] Page 19


NAME :: PRIYANSHU PATEL CN(3150710)

Step-4:-In router go to static and add network address.

VIEAT/BE/CE/SEM-5 [230943107041] Page 20


NAME :: PRIYANSHU PATEL CN(3150710)
Step-5:-Message transfer using static routing.

Advantages:-

 Static routing keeps a little load on the CPU of the router and produces no traffic to other routers.
 It leaves the network administrator with full control over the routing behavior of the network.
 It is easy to configure on small networks.

Disadvantages:-

 Human error − Static routes are manually configured by the administrator, so there may be a
chance of mistakes in human entry.
 Fault tolerance − Static routing is not fault tolerant.
 Administrative distance − static routes may prevent routing protocols from working as intended.
A solution is to manually modify the administrative distance.
 Administrative overhead − Static route configuration takes a long time if there are many routers.
The reconfiguration can also be slow and inefficient.

VIEAT/BE/CE/SEM-5 [230943107041] Page 21


NAME :: PRIYANSHU PATEL CN(3150710)

PRACTICAL-7
AIM : Implement the concept of dynamic routing (RIP, OSPF, BGP).

Routing Information Protocol (RIP)


Routing Information Protocol (RIP) is an older routing protocol that pre-dates the internet era. It was
designed for smaller network domains with basic routing and no subnetting. RIP is a distance vector
protocol that is not scalable, with slow convergence, and classful addressing only.

Open Shortest Path First (OSPF):-


Open Shortest Path First (OSPF) is a link-state routing protocol that routes IP-only. It is a scalable,
open standard interior gateway protocol (IGP) that supports multivendor network devices. OSPF routers
build and maintains a global topology database with the exchange of link-state advertisements (LSA).

Border Gateway Protocol (BGP)


Border Gateway Protocol (BGP) is the de facto internet routing protocol responsible for interdomain
routing between private IGP routing domains. It is an exterior gateway protocol (EGP) that is
considered a path vector protocol.

STEP 1: - From Connection section select copper straight through cable and make a connection
between PCs to the Switch. Connect the switches with routers using copper straight through cable and
after that connect the two routers with serial-DCE connection.

STEP 2: - Click on PC0, box will appear. Select Desktop then IP configuration and write IP Address,
next field is subnet mask it will appear automatically based on your IP Address. Then click on default
gateway and write it. This information automatically saved when you close that tab. Repeat this
procedure for other end devices also.

HOST IP Address Default Gateway


PC0 192.168.1.2 192.168.1.1
PC1 192.168.1.3 192.168.1.1

VIEAT/BE/CE/SEM-5 [230943107041] Page 22


NAME :: PRIYANSHU PATEL CN(3150710)
Laptop0 192.168.1.4 192.168.1.1
PC2 192.168.2.2 192.168.2.1
PC3 192.168.2.3 192.168.2.1
Laptop1 192.168.2.4 192.168.2.1

STEP 3: - Double click on the router 2 then go to the config tab, in that select FastEthernet0/0 and
enter the IP Address and Subnet Mask and don’t forget to ON it. Do the same for router 3.

Router IPv4 Address Subnet mask


2 192.168.1.1 255.255.255.0
3 192.168.2.1 255.255.255.0

Router IPv4 Address Subnet mask


0 10.10.0.2 255.0.0.0
1 10.10.0.3 255.0.0.0

STEP 4: Double click on the router 0 then go to the config tab, in that select serial 2/0 and enter the
IP Address and Subnet Mask and don’t forget to ON it. Do the same for router 1.
Router IPv4 Address Subnet mask
0 10.10.0.2 255.0.0.0
1 10.10.0.3 255.0.0.0

VIEAT/BE/CE/SEM-5 [230943107041] Page 23


NAME :: PRIYANSHU PATEL CN(3150710)

STEP 5: - Double click on the router 0 then go to the config tab, in that select “RIP” then enter
Network address, (192.168.1.0) and (10.0.0.0) click on Add. Do the same for router 1.

STEP 6: - Then transmit the message between (PC0 and PC2) and (Laptop0 and Laptop1). It shows
successful, then it is working properly.

VIEAT/BE/CE/SEM-5 [230943107041] Page 24


NAME :: PRIYANSHU PATEL CN(3150710)
PRACTICAL-8
AIM : Packet capture and header analysis by wire-shark (TCP,UDP,IP)

Packet Capture in Wire-Shark:

In the main Wireshark window, we'll see a list of available network interfaces. These interfaces could be
Ethernet, Wi-Fi, or any other network device connected to our computer. Choose the interface we
want to capture packets from by clicking on it.
Once we've selected the desired network interface, click the "Start" or "Capture" button ( icon). This
initiates the packet capture process.
Wireshark will begin capturing packets in real-time as they traverse the selected network interface.
We'll see packets being displayed in the main Wireshark window.

To stop the packet capture, click the "Stop" button ( icon in the toolbar. This will halt the capture
process.
After stopping the capture, we can analyse the captured packets by scrolling through the list of captured
packets in the main window.
Click on any packet in the list to view detailed information in the lower pane of the Wireshark window.
We can expand each packet to inspect its headers and payload.
To focus on specific packets or types of traffic, we can apply display filters. For example, we can filter
by protocol (e.g., "http" for HTTP traffic) or by source/destination IP addresses.
Wireshark provides a rich set of tools for protocol analysis, including the ability to follow streams,
detect errors, and inspect header fields (e.g., TCP, UDP, IP).
Header Analysis in Wire-Shark:
1. ICMP Header Analysis:
 Type: Indicates the type of ICMP message (e.g., Echo Request, Echo Reply, Destination
Unreachable, Time Exceeded).
 Code: Provides additional information related to the ICMP message type.

VIEAT/BE/CE/SEM-5 [230943107041] Page 25


NAME :: PRIYANSHU PATEL CN(3150710)

 Checksum: A checksum value used to verify the integrity of the ICMP packet.
 Identifier and Sequence Number (for Echo Request/Reply): Used to match Echo
Request and Echo Reply messages.
 Data (Payload): Contains additional data or information specific to the ICMP message
type. For example, in an Echo Request (ping) packet, this field might include the data you
sent in the ping request.
2. TCP Header Analysis:

● Source Port (2 bytes): The source port is a 16-bit field that identifies the port
number from which the packet originates. It helps the recipient know which
application or service on the sender's side initiated the TCP packet.
● Destination Port (2 bytes): The destination port is also a 16-bit field and
specifies the port number at the receiving end, indicating which application or
service should process the TCP packet.
Sequence Number (4 bytes): The sequence number field is a 32-bit value used
to establish and maintain the correct order of data packets. It's essential for
reliable data transmission and is used in conjunction with the acknowledgment
number.
● Acknowledgment Number (4 bytes): The acknowledgment number is a 32-bit
value that acknowledges the receipt of data up to a certain point. It indicates the
next expected sequence number the sender should receive.
● Data Offset (4 bits): The data offset field, also known as the header length,
specifies the length of the TCP header in 32-bit words. It is used to determine
where the data section (payload) of the packet begins.
● Reserved (3 bits): These bits are reserved for future use and should be set to zero.

VIEAT/BE/CE/SEM-5 [230943107041] Page 26


NAME :: PRIYANSHU PATEL CN(3150710)
● Flags (9 bits): The flags field consists of various control flags.
● URG (Urgent Pointer): Used to indicate the presence of urgent data in the
packet.
● ACK (Acknowledgment): Set when the acknowledgment number is valid.
● PSH (Push): Indicates that the receiving application should process the data
immediately.

● RST (Reset): Used to reset a connection.


● SYN (Synchronise): Used to initiate a connection.
● FIN (Finish): Indicates the end of a data stream or the termination of a
connection.
3. UDP Header Analysis:

● Source Port (2 bytes): The source port is a 16-bit field that indicates the port
number from which the packet is being sent. It helps the recipient know which
application on the sender's side initiated the UDP packet.
● Destination Port (2 bytes): The destination port is also a 16-bit field and specifies
the port number at the receiving end, indicating which application should process
the UDP packet.
● Length (2 bytes): The length field indicates the total length of the UDP packet,
including the header and the data, in bytes.
● Checksum (2 bytes): The checksum field is used to detect errors in the UDP
packet. It helps ensure data integrity during transmission. Wireshark calculates
and displays the checksum value.
● Data (Payload): The payload section contains the actual data being transmitted.
This could be application-specific data, such as DNS queries, DHCP requests, or
other information relevant to the application that's using UDP for communication.
The length of the payload can vary.

VIEAT/BE/CE/SEM-5 [230943107041] Page 27

You might also like