LAB Manual Data and computer communication
LAB Manual Data and computer communication
computer networks
CS08222
Laboratory Manual
Before starting a new lab, you must always read the laboratory manual for that
experiment and the instructor will discuss the experiment with you.
Make sure that your observation for previous week experiment is evaluated by the
faculty member and your have transferred all the contents to your record before
entering to lab.
At the beginning of the class, if the faculty or the instructor finds that a student is
not adequately prepared, they will be marked as absent and not be allowed to
read the lab manual before coming to the laboratory, unannounced questions may
Maintain silence, order and discipline inside the lab. Don’t use cell phones inside
the laboratory.
Report to the instructor if you find equipment that is out of order or you break
something..
Safety Precautions
This is a partial list of basic safety precautions to use when working on a computer:
I have read all of the above, and I agree to conform to its contents.
Name:
Registration No.:
Student Signature:
Date:
Lab Instructor:
VERSION HISTORY TABLE
Sr. Performance
No. Indicator Excellent (5) Good (4) Average (3) Fair (2) Poor (1)
1 Theoretical Student knows Student knows most Student knows few Student knows Student has poor
knowledge all the related of the related of the related very little about understanding of the
/Background concepts about concepts about the concepts about the the related related concepts
knowledge the theoretical theoretical theoretical concepts about the about the theoretical
background of background of the background of the theoretical background of the
the experiment experiment and experiment and background of the experiment and
and rephrase partially rephrase partially rephrase experiment and unable to rephrase
those concepts in those concepts in those concepts in poorly rephrase those concepts in
written and oral written and oral written and oral those concepts in written and oral
assessments assessments assessments written and oral assessments
assessments
2 Calculations All of the data Most of the data Some of the data Most of the data All of the data
analyzed is very analyzed is very analyzed is very analyzed is analyzed is
accurate, precise, accurate, precise, accurate, precise, inaccurate based inaccurate based on
logical and logical and logical and on illogical illogical calculations.
systematic in systematic in terms systematic in terms calculations
terms of of calculations of calculations
calculations
3 Analysis and Always analyzes Most of the time Sometime Analyzes and Analyzes and
Interpretation and interprets Analyzes and Analyzes and interprets data very interprets data
data correctly interprets data interprets data poorly, most of the incorrectly most of
and always correctly; most of accurately, some conclusions are the time; many
draws correct the conclusions are of the conclusions incorrect; Not able conclusions are
conclusions; correct; compares are correct; to compare the incorrect; most of the
always compares theory against sometime able to theory against time never attempts
theory against experimental results compare the theory experimental to compare theory
experimental and calculates against results and against experimental
results and related error most of experimental calculates related results.
calculates related the time. results and error
error. calculates related
error
4 Ability to Fully understand Has good Has average Has fair Has poor
Conduct the the lab understanding of the understanding of understanding of understanding of the
Experiment instruments lab instruments the lab instruments the lab instruments lab instruments
including its including its including its including its including its purpose
purpose and purpose but able to purpose and able purpose and able and unable to
quite able to conduct experiment to conduct to conduct conduct experiment
conduct the with some help experiment with experiment with
entire experiment from lab instructor help and taking help and taking
with negligible more than one more than three
help from lab attempt attempts
instructor
5 Level of Provide complete Provide complete Provide partially Provide very few Provide no answer to
understanding and logical and logical answers correct and logical and illogical the questions asked
of the learned answers based based upon accurate answers based answers to the by examiner.
skill upon accurate technical content to upon minimum questions asked by
technical content the questions asked technical content examiner.
to the questions by examiner with to the questions
asked by few errors asked by examiner
examiner
6 Data collection Students has Students has strong Students has Students has fair Students has poor
and strong grasp on grasp on data partial grasp on grasp on data grasp on data
repeatability data collection collection and can data collection and collection and can collection and can
and can perform perform the same can perform the perform the same perform the same
the same task task with partial same task with task with fair task with poor
with accuracy accuracy partial accuracy accuracy accuracy
7 Responsiveness 1. Responds 1. Generally 1. Generally 1. Not much . 1. Non Responsive
to well, quick and Responsive and Responsive and Responsive and and inaccurate all the
Questions/ very accurate all accurate most of the accurate few times. accurate most of times.
Accuracy the time. times. 2. Some eye the times. 2. No eye contact and
2. Effectively 2. Maintains eye contact, speaks 2. Uses eye contact unable to speak
uses eye contact, contact, speaks clearly and ineffectively and 3. Dresses
speaks clearly, clearly with suitable unclearly in fails to speak inappropriately
effectively and volume and pace. different portions. clearly and audibly
confidently using
suitable volume
and pace.
8 Material/ Procedure, Procedure, results Procedure, results, Procedure, results The content is very
Content results and and conclusions are conclusions and and conclusions poor/ meaningless
conclusions are very well written. Graphs/ have major and presented poorly
very well Data presentation is waveforms have mistakes. Data is without appropriate
written. not up to the mark. few mistakes and not presented using graphs or waveforms
Appropriate are not very well graphs/
graphs/waveform written waveforms.
s are used to
present the data.
9 Work All members are All members are All members Only two members Only one member
Sharing/Team equally equally contributing seems to be seems to be seems to be actively
work contributing in in completing the working actively actively working working on the given
completing the given task with on the task but on the given task task
project and team proportionate load workload is not
leader is sharing shared equally
exhibiting the
leadership skills.
10 Awareness of Student has Student has Student has little Student has little Student has no
Safety sufficient sufficient knowledge of the knowledge of the knowledge of the
Guidelines knowledge of knowledge of the laboratory safety laboratory safety laboratory safety
the laboratory laboratory safety SOPs and protocol SOPs and protocol SOPs and protocol
safety SOPs and SOPs and protocol and is Partially and is non- and is non-compliant
protocol and is and is Partially compliant to the compliant to the to the guidelines
fully compliant compliant to the guidelines guidelines
to the guidelines guidelines
Lab’s Course Learning Outcomes
Course Title : Data and computer communication
Course Code : CS08222
Instructor :____________________________________________________
Designation : _________________________________
E-mail : __________________________________
Students will be able to:
CLO 3: State key concepts of network architecture and components (P2, PLO4)
CLO4: Construct data and computer communication models through knowledge and understanding of physical
layer, data link layer and network layer. (P4, PLO5)
Mapping of Course Learning Outcomes (CLO) to Program Learning Outcomes (PLO) / Graduate Attributes
CS08222 CLO 4 X
Obtained Marks
LAB No. Checked date Checked by
CLO 3 CLO 4
Experiment No. 1
Types of Cables in Networking
Objective:
To study of basic Types of Cables in Networking
Theory:
To connect two or more computers or networking devices in a network, network cables are used.
There are three types of network cables; coaxial, twisted-pair, and fiber-optic. The following
sections discuss the types of cables used in networks and other related topics.
Cat1 1Mbps 1MHz Not used for This Cable contains only two pairs
data (4 wires). This cable was used in
the telephone network for voice
transmission.
Cat 2 4Mbps 10MHz Token Ring This cable and all further cables
have a minimum of 8 wires (4
pairs). This cable was used in the
token-ring network.
Cat 3 10Mbps 16MHz 10BASE-T This is the first Ethernet cable that
Ethernet was used in LAN networks
Cat 4 20Mbps 20MHz Token Ring This cable was used in advanced
Token-ring networks.
5e 1,000 Mbps
6 10,000 Mbps Gigabit Ethernet
Figure.1.2.RJ-45 connector
Shielded Twisted Pair (STP) Cable
Although UTP cable is the least expensive cable, it may be susceptible to radio and
electrical frequency interference (it should not be too close to electric motors, fluorescent lights,
etc.). If you must place cable in environments with lots of potential interference, or if you must
place cable inextremely sensitive environments that may be susceptible to the electrical current
in the UTP, shielded twisted pair may be the solution. Shielded cables can also help to extend
the maximum distance of the cables.
Shielded twisted pair cable is available in three different configurations:
Figure.1.4.Coaxial cable
Figure.1.5.BNC connector
There are two common types of fiber cables -- single mode and multimode. Multimode cable
has a larger diameter; however, both cables provide high bandwidth at high speeds. Single
mode can provide more distance, but it is more expensive.
Table.1.3
LAB Review Questions
QUESTION 1
Define Rj-45 Connector?
Answer:
QUESTION 2
What do you mean by BNC connector?
Answer:
QUESTION 3
What is the purpose of metal shield in Coaxial cable?
Answer
QUESTION 4
What is the function of optical fiber?
LAB Evaluation
Objective:
To study different internetworking devices in a computer network
Theory:
REPEATER
A Repeater is a purely electrical device that extends maximum distance a LAN cable can span
by Amplifying signals passing through it. A Repeater connects two segments and broadcasts
packets between them. Since signal loss is a factor in the maximum length of a segment, a
Repeater is used to amplify the signal and extend the usable length. A common Ethernet rule is
that no more than four repeaters may be used to join segments together. This is a physical
limitation designed to keep collision detection working properly.
Figure.5.1.Repeaters
Features
Repeaters operate at layer 1 (Physical layer) of the OSI model
A Repeater connects two segments of a network cable.
Sometimes it regenerates the signals to proper amplitudes and sends them to
the other segment.
If the signal becomes weak, it can copy the signal bit by bit and regenerate it
at the original strength.
It is a 2-port device.
BRIDGES
The networks bridge provides an inexpensive and easy way to connect network segments. A
bridge provides Amplification function of a repeater plus, ability to select filter packets
based on their addresses. When network grows in size, it is often necessary to partition it in
to smaller group of nodes to help isolate traffic and improve performance. One way to do
this is to use bridge, the operation of it is to keep one segment traffic to that side and other
side will cross the bridge. The bridge learns which packets should cross it as it is used.
Router
A router is a device that connects two LANs together to form an inter-network. A router is
the basic building block of the Internet. Each router connects two or more networks together
by providing an interface for an Ethernet network and ring network to which it is connected.
It serves two primary functions: managing traffic between these networks by
forwarding data packets to their intended IP addresses, and allowing multiple devices to use
the same Internet connection.
Figure.5.3.Routers
The router examines each packet of information to detection weather the packet must be
translated form on one network to another network performing a function similar to a bridge.
Unlike a ridge, a router can connect network that use different technologies, addressing
methods, media type, frame format and speeds. A router is a special purpose device
designed to interconnect networks. Such that three networks can be connected using two
routers. Routers maintain routing tables in their memories to store information about the
physical connection on the network; the router examines each packet of data, checks the
routing table and then forwards the packet if necessary. Every other router in the path
(between any state destinations) performs a similar procedure. Note that a router does not
maintain any state information about the packets; it simply moves them along the network.
Routers are operated at layer 3(network) of OSI model.
GATEWAYS
A gateway is a network node that forms a passage between two networks operating with
different transmission protocols. The most common type of gateways, the network gateway
operates at layer 3, i.e. network layer of the OSI (open systems interconnection) model.
However, depending upon the functionality, a gateway can operate at any of the seven layers
of OSI model. It acts as the entry – exit point for a network since all traffic that flows across
the networks should pass through the gateway. Only the internal traffic between the nodes of a
LAN does not pass through the gateway.
A gateway is node in a network that serves as an entrance to another network. In enterprises,
the gateway node often acts as a proxy server and a firewall. The gateway is also associated
with both a switch, which provides the actual path for the packet in and out of the gateway. It
is also known as a computer system located on earth that switches data signals and voice
signals between satellites and terrestrial networks. A gateway can operate at any layer of the
OSI or TCP/IP reference model. The hub of a gateway, also called a protocol converter, is
much more complex than that of a router or switch. Typically, a gateway must convert from
one protocol stack to another. E.g. a gateway may connect a TCP/IP network to an IPX. /SPX
network. A Circuit Level Gateway function provided by Application level gateway products
enables trusted users on private network to access Internet services with all security of a proxy
server. An Application Level Gateway provide much stricter form of security that packet
filters, but they are designed to regulateaccess only for a particular application.
Figure 5.4 Gateway between a LAN and internet
Features of Gateway
Gateway is located at the boundary of a network and manages all data that inflows or
outflows from that network.
It forms a passage between two different networks operating with different transmission
protocols.
A gateway operates as a protocol converter, providing compatibility between the different
protocols used in the two different networks.
The feature that differentiates a gateway from other network devices is that it can operate
at any layer of the OSI model.
It also stores information about the routing paths of the communicating networks.
When used in enterprise scenario, a gateway node may be supplemented as proxy server
or firewall.
A gateway is generally implemented as a node with multiple NICs (network interface
cards) connected to different networks. However, it can also be configured using software.
It uses packet switching technique to transmit data across the networks.
HUBS
A network hub is a node that broadcasts data to every computer or Ethernet-based device
connected to it. A hub is less sophisticated than a switch, the latter of which can isolate
data transmissions to specific devices.
A hub is a physical layer networking device which is used to connect multiple devices in a
network. They are generally used to connect computers in a LAN.
A hub has many ports in it. A computer which intends to be connected to the network is plugged
in to one of these ports. When a data frame arrives at a port, it is broadcast to every other port,
without considering whether it is destined for a particular destination or not.
Hubs are also called concentrators; expand one Ethernet connection into many.
For example, a four-port hub connects up to four machines via UTP cables. The
hub provides a star connection for the four ports. Many hubs contain a single BNC
connector as well to connect the hub to existing 10base2 network wiring, the hub
can also be connected via one of its ports. One pot is desired to operate in either
straight through or crossover mode, selected by a switch on the hub. Hubs that can
connect in this fashion are called stackable hubs. A hub is similar to a repeater,
expect it broadcasts data received by any port to all other ports on the hub. Most
hubs contain a small amount of intelligence as well. Examining received packets
and checking them for integrity. If a bad packet arrives or the hub determines that
a port is unreliable. It will shut down the line under the error condition is appears.
The hub also acts like a repeater. Because of its slight delay when processing a
packet, the numbers of hubs that may be connected in a series are limited.
Figure.5.6 Hubs
There are three types of HUB passive hub, active hub and intelligent hub.
The Passive hubs do not process data signals with only purpose to combine the signal from
several networks cables segments. All devices attached to the passive hub receive another
packets that pass through the hub. Hub does not clear up or amplify the signals, on the
contrary absorbs a small part of the signals that is why the distance between a hub and a
computer should not be more than half of the permissible distance between two computers.
Passive hubs have limited functionality so are inexpensive and easy to configure. It has four
ports with four BNC (British Naval Connectors) female connectors to configure networks
station or terminated with a 93 Ω BNC Terminator. The active hubs incorporate electronic
components that amplify and cleanup the signals, that flaw between devices on the network.
The process of cleaning up signal is called “signal regeneration”. The benefits of signals
regeneration are:
A network is more robust i.e. less sensitive errors.
Distance between devices can be increased.
Active hubs cost is considerable more than passive hub (active hub function impart as
multi-port repeaters). Intelligent hubs are enhanced active hubs the following functions add
intelligence to a hub. Intelligent Hubs are units have form of integrated management
capability.
Hub Management
A hub supports networks network management protocols that enable the hub to send
packets to central network console. Theses protocols enable network console to manage or
control hub.
Switching hubs
Switching hubs include circuitry that quickly routes signals between ports on the hub.
Insured of repeating a packet to all ports on the hub, it repeats a packet only to the port that
connects to the destination computer for the packet.
SWITCHES
A switch is a data link layer networking device which connects devices in a network and uses
packet switching to send and receive data over the network.
Like a hub, a switch also has many ports, to which computers are plugged in. However, when a
data frame arrives at any port of a network switch, it examines the destination address and
sends the frame to the corresponding device(s). Thus, it supports both unicast and multicast
communications.
Figure 5.7 Switch
It is similar to a bridge, with some important enhancement. First, as witch may have multiple
ports, thus directing packets to several different segments further partitioning and isolating
network traffic in as way similar to router. For example, if 8-port n way switch is there it can
route packetsfrom any input to any output.
Figure.5.8 Switches
Some or all of incoming packet is called store and forward, which stores the received packet
before examining it to for error before retransmitting. Bad packets are not forwarded. A
switch typically has auto-sensing 10/100 mbps ports and will just the speed of each port
accordingly; furthermore, a managed switch supports SNMP for further control over
network traffic. Switches operated at layer 2 (Data Link) of OSI model.
Differences between Hub and Switch
Hub Switch
They operate in the physical layer of the OSI They operate in the data link layer of the
model. OSI model.
It is a non-intelligent network device that sends It is an intelligent network device that sends
message to all ports. message to selected destination ports.
Collisions may occurs during setup of transmission Collisions do not occur since the
when more than one computers place data communication is full duplex.
simultaneously in the corresponding ports.
They are passive devices, they don’t have any They are active devices, equipped with
software associated with it. network software.
They generally have fewer ports of 4/12. The number of ports is higher – 24/48.
LAB Review Questions
Question 1
Define Switches
Solution
Question 2
Define Hubs and its purpose?
Solution
Question 3
Define Router and its purpose?
Solution
Question No 4
Define network element
Solution
LAB Evaluation
A modem is a hardware networking device that helps to convert signals from one computer
network to another. It is used to connect the computer to the internet where it converts data
signal in to digital and analog forms. Modem establishes a dedicated link or connection to your
Internet Service Provider (ISP) to give access to the internet. It works as signal translator because
it translates one signal to another signal so the computers and telephone line can interact with
each other.
Modems are used to transmit digital information via analog systems. The word "modem" is
derived from the term "modulator-demodulator." The essential functions of a modem are to
modulate an analog carrier signal to carry digital information; and to demodulate a similar signal
so as to decodethe digital information from the analog carrier signal.
Figure.3.1.Modem
A computer or a machine can only understand digital signals (1’s and 0’s), but the telephone lines can only
transmit data in analog form, so to convert the signals from digital to analog and analog to digital, we used
a device called modem which comes from the term modulator and demodulator. So a modem can modulate
the signals and also demodulate the signals.
Modulated Signals
Modulated signal means to convert computer’s digital data signals into analog data signals so the data can
travel on the internet. The essential function of a modem is to create an easily transmitted and decoded
signal that allows digital data to be sent from place to place without the loss of information. The most
familiar use of modems is to send information over a telephone channel
Demodulated Signals
Demodulated signal means to convert analog data signals from the internet into digital data signals so a
computer can understand it.
Data Compression
To reduce the amount of time it takes to send data and to cut down on the amount of error in the signal,
modems need to employ data compression. This was especially necessary in the early days of modem
technology, since data had to be sent via conventional phone lines. Not being designed for digital
information, phone lines placed heavy limitations on the size and speed of signals sent over them.Data
compression techniques reduce the size of the signal needed to send the required data.
Error Correction
When information is transmitted between modems, it can sometimes be damaged meaning that parts of the
data are altered or lost. To get around this, modems use error correction. Information is grouped into
batches, called frames. Each frame is tagged with a checksum, a small piece of data derived from the
information in the frame. A checksum can be thought of as a kind of fingerprint, unique to the data in a
particular frame. The modem that receives the information derives its own checksum from the frame it has
been sent, then compares its checksum data with the checksum sent by the transmitting modem. If the
checksums match, the information is undamaged. If they don't match, the data has been corrupted in
transmission; the receiving modem sends it back and waits for the transmitting modem to re-send that
frame.
Flow Control
Individual modems send information at different speeds. It's necessary for faster modems to slow down so
that slower modems can catch up, otherwise the slower modem will receive more data than it can process.
If this starts to happen, the slower modem transmits a character to the faster one. This character is a signal
for the fast modem to pause in sending information until the slow modem gets caught up. When the slow
modem is ready for more data, it sends a different character that signals to the fast modem that it can start
transmitting again. In this way, the two modems canmatch their speeds.
Modem Speed Classification
The speed of a modem is typically classified by the amount of data it can send in a specific length of time.
This is generally expressed in terms of bits per second (bps). An alternative way of classifying modem
speed is the change in the state of the signal per unit time -- the number of times a modem sends a new
signal in a given length of time. This is known as the symbol rate and is measured in units called baud (Bd).
Types of Modems
Dial up Modem
Internal Modem
External Modem
Cable Modem
ADSL Modem
Dial up Modem
Dial-up modems are the old technology-based modems, used with the telephone lines to connect
with the internet by using the dial-up connections.
Dial-up modems are the old technology-based modems, used with the telephone lines to connect
with the internet by using the dial-up connections.
To use the dial-up modems, we had to dial the telephone number to connect with the internet.
To establish a dial-up connection, we need an active phone line that is not in use and we dial up the
phone number (like we calling someone) to the receiver’s phone that’s attached to another
computer.
When the connection is made, our computer can check emails, share files, etc.
The speed of the dial-up modems can only reach up to 56kbps due to technical limitations.
DSL Modem
DSL means Digital Subscriber Line also called DSL broadband.
DSL modems are also used with the local telephone lines like dial-up, but they are totally different
from the dial-up connections.
DSC uses separate frequencies for phones and the internet, so we can use both the phone and the
internet at the same time.
It helps to connect a single computer or with the help of a DSL router, can connect multiple
computers through multiple Ethernet ports.
External Modems
As the name suggests, these types of modems are used externally, connected outside the computer
using a cable.
External modems are easy to use, but they are a little bit expensive.
It provides a high-speed data transmission rate and helps to avoid interruption in network
connectivity.
Internal Modems
They are not portable, and cannot move or replace easily from one computer to another and they are
used for dedicated computers.
Broadband: Cable and ADSL Modems
Cable modems use the same radio frequency range as cable television. Cable modems have the advantage
of using the existing cable television infrastructure, allowing cable TV companies to provide Internet
services. Asymmetric Digital Subscriber Line (ADSL) modems use telephone lines to send and receive
data but make use of a different frequency band than modems using the voice band range of frequencies.
ADSL modems are much faster than conventional voice band modems. ADSL and cable modems are used
to provide broadband Internet, which allows more data to be transmitted and thus makes using the Internet
faster.
QUESTION 1
Define Modem?
QUESTION 2
Purpose of Modem
QUESTION 3
Define ADSL Modems?
QUESTION 4
Difference b/w Internal and External Modems?
LAB Evaluation
Topology is used to explain how a network is physically connected and the logical flow of
information in the network. A topology mainly describes how devices are connected and interact
with each other using communication links. The Internet continues to grow at a phenomenal
rate. This is reflected in the tremendous popularity of the World Wide Web (WWW), the
opportunities that businesses see in reaching customers from virtual storefronts, and the
emergence of new ways of doing business. It is clear that expanding business and public
awareness will continue to increase demand for access to resources on the Internet
Theory:
In computer networks, there are mainly two types of topologies, they are
Physical Topology
A physical topology describes the way in which the computers or nodes are connected with each
other in a computer network. It is the arrangement of various elements (link, nodes, etc.), including
the device location and code installation of a computer network. In other words, we can say that it
is the physical layout of nodes, workstations, and cables in the network.
Logical Topology
A logical topology describes the way, data flow from one computer to another. It is bound to a
network protocol and defines how data is moved throughout the network and which path it takes.
In other words, it is the way in which the devices communicate internally.
Ring Topology
In a ring network, every device has exactly two neighboring devices for communication purpose. It
is called a ring topology as its formation is like a ring. In this topology, every computer is
connected to another computer. Here, the last node is combined with a first one. This topology uses
token to pass the information from one computer to another. In this topology, all the messages
travel through a ring in the same direction.
Advantages:
Easy to troubleshoot, set up, and modify.
Only those nodes are affected, that has failed. Other nodes still work.
Fast performance with few nodes and very low network traffic.
In Star topology, addition, deletion, and moving of the devices are easy.
Disadvantages:
If the hub or concentrator fails, attached nodes are disabled.
Cost of installation of star topology is costly.
Heavy network traffic can sometimes slow the bus considerably.
Performance depends on the hub's capacity
A damaged cable or lack of proper termination may bring the network down.
Tree Topology
Tree topologies have a root node, and all other nodes are connected which form a hierarchy. So it
is also known as hierarchical topology. This topology integrates various star topologies together
in a single bus, so it is known as a Star Bus topology. Tree topology is a very common network
which is similar to a bus and star topology.
Advantages
Failure of one node never affects the rest of the network.
Node expansion is fast and easy.
Detection of error is an easy process
It is easy to manage and maintain
Disadvantages
It is heavily cabled topology
If more nodes are added, then its maintenance is difficult
If the hub or concentrator fails, attached nodes are also disabled.
Figure.4.5.Mesh Topology
Advantages:
The network can be expanded without disrupting current users.
Need extra capable compared with other LAN topologies.
Complicated implementation.
No traffic problem as nodes has dedicated links.
It has multiple links, so if any single route is blocked, then other routes
should be used for data communication.
Disadvantages:
Installation is complex because every node is connected to every node.
Dedicated links help you to eliminate the traffic problem.
A mesh topology is robust.
Every system has its privacy and security
It is expensive due to the use of more cables. No proper utilization of systems.
Hybrid Topology
Hybrid topology combines two or more topologies. You can see in the above architecture in
such a manner that the resulting network does not exhibit one of the standard topologies. For
example, as you can see in the above image that in an office in one department, Star and P2P
topology is used. A hybrid topology is always produced when two different basic network
topologies are connected.
IP Addressing
IP Address is short for Internet Protocol Address.
It is a unique address assigned to each computing device in an IP network.
ISP assigns IP Address to all the devices present on its network.
Computing devices use IP Address to identify and communicate with other devices in the IP
network.
Types of IP Address-
IP Addresses may be of the following two types-
1. Static IP Address
Static IP Address is an IP Address that once assigned to a network element always remains the
same.
They are configured manually.
Some ISPs do not provide static IP addresses.
Static IP Addresses are more costly than dynamic IP Addresses
2. Dynamic IP Address-
Dynamic IP Address is a temporarily assigned IP Address to a network element.
It can be assigned to a different device if it is not in use.
DHCP or PPPoE assigns dynamic IP addresses.
IP Address Format
IP Address is a 32 bit binary address written as 4 numbers separated by dots.
The 4 numbers are called as octets where each octet has 8 bits.
The octets are divided into 2 components- Net ID and Host ID.
1. Network ID represents the IP Address of the network and is used to identify the network.
2. Host ID represents the IP Address of the host and is used to identify the host within the
network.
IP Address Example
Class A
If the 32 bit binary address starts with a bit 0, then IP Address belongs to class A. In
class A IP Address,
The first 8 bits are used for the Network ID.
The remaining 24 bits are used for the Host ID.
From here,
Range of 1st octet = [0, 127]
But 2 networks are reserved and unused.
So, Range of 1st octet = [1, 126]
Use- Class A is used by organizations requiring very large size networks like NASA,
Pentagon etc.
Class B- If the 32 bit binary address starts with bits 10, then IP Address belongs to class B.
In class B IP Address,
The first 16 bits are used for the Network ID.
The remaining 16 bits are used for the Host ID.
Class C- If the 32 bit binary address starts with bits 110, then IP Address belongs to
class C. In class C IP Address,
The first 24 bits are used for the Network ID.
The remaining 8 bits are used for the Host ID.
Total Number of IP Addresses-
Total number of IP Addresses available in class C
= Numbers possible due to remaining available 29 bits= 229
Total Number of Networks-
Total number of networks available in class C
= Numbers possible due to remaining available 21 bits in the Net ID = 221
Total Number of Hosts-
Total number of hosts that can be configured in class C
= Numbers possible due to available 8 bits in the Host ID – 2 = 28 – 2
Range of 1st Octet-We have-
Minimum value of 1st octet = 11000000 = 192
Maximum value of 1st octet = 110111111 = 223
Class D- If the 32 bit binary address starts with bits 1110, then IP Address belongs to
class D.
Class D is not divided into Network ID and Host ID.
Use-
Class D is reserved for multicasting.
In multicasting, there is no need to extract host address from the IP Address.
This is because data is not destined for a particular host.
Class E- If the 32 bit binary address starts with bits 1111, then IP Address belongs to class E
Class E is not divided into Network ID and Host ID.
Classes of IP Address- All the classes of IP Address are summarized in the following
table-
CIDR Block
When a user asks for specific number of IP Addresses,
CIDR dynamically assigns a block of IP Addresses based on certain rules.
This block contains the required number of IP Addresses as demanded by the user.
This block of IP Addresses is called as a CIDR block.
CIDR Notation
CIDR IP Addresses look like- a.b.c.d / n
They end with a slash followed by a number called as IP network prefix.
IP network prefix tells the number of bits used for the identification of network.
Remaining bits are used for the identification of hosts in the network.
Subnetting in Networking-
In networking,
The process of dividing a single network into multiple sub networks is called as subnetting.
The sub networks so created are called as subnets.
Example-Following diagram shows the subnetting of a big single network into 4 smaller subnets-
Advantages- The two main advantages of subnetting a network are-
It improves the security.
The maintenance and administration of subnets is easy.
Subnet ID-Each subnet has its unique network address known as its Subnet ID.
The subnet ID is created by borrowing some bits from the Host ID part of the IP Address.
The number of bits borrowed depends on the number of subnets created.
Example
192.168.5.85 /24 Address.
Let’s determine the network and host part of this address.
IP Address : 192.168.5.85
Subnet Mask : 255.255.255.0
For this example, firstly we will convert this decimal numbers to the binary equals.
As you can see below, the 1s in the Subnet Mask will show the number of bits that
network part has. And the 0s will show the host part bits.
So, here, the first 24 bits (First 3 octets) are network bits and the last 8 bits (Last
octet) are the host bits.
For this IP and Subnet Mask, to determine the Network Address of this IP address,
we will use “AND” operation between IP Address and Subnet Mask in binary mode.
Example
Consider-
We have a big single network having IP Address 200.1.2.0.
We want to do subnetting and divide this network into 2 subnets.
Clearly, the given network belongs to class C.
For creating two subnets and to represent their subnet IDs, we require 1 bit.
So,
We borrow one bit from the Host ID part.
After borrowing one bit, Host ID part remains with only 7 bits.
LAB Evaluation
Apparatus
Computer System
Required Software
Lab Outcomes
By the end of this experiment, student will have basic understanding of CISCO packet tracer
software
Theory
CISCO system Inc. is an American Multinational Technology Conglomerate. It’s headquarter is in
San Jose, California, United States. Its CEO is Chuck Robbins. It is powerful network simulation
program that allows students to experiment with network behavior
Step 1
Open CISCO packet Tracer
Packet Tracer Workspace
Cisco Packet Tracer has two workspaces; one physical and another logical. The logical
workspace allows users to build virtual networks by providing virtual switches, hubs, PCs,
Routers and connecting devices as cables, connecting wires. Users can make virtual network
topologies by placing, connecting the virtual network devices. The physical workspace shows
the graphical representation of the logical network.
Details:
The components of the Packet Tracer interface are as follows:
Area 1: Menu bar
This is a common menu found in all software applications; it is used to open, save,
print, change preferences, and so on.
Area 2: Main Toolbar
This bar provides shortcut icons to menu options that are commonly accessed, such
as open, save, zoom, undo, and redo, and on the right-hand side is an icon for entering
networkinformation for the current network.
Area 3: Logical/ Physical workspace tabs
These tabs allow you to toggle between the Logical and Physical work areas.
Area 4: Workspace
This is the area where topologies are created and simulations are displayed.
Area 5: Common tools bar
This toolbar provides controls for manipulating topologies, such as select, move
layout, place note, delete, inspect, resize the shape, and add simple/complex PDU.
Area 6: Real-time/Simulation tabs
These tabs are used to toggle between the real and simulation modes. Buttons are
also provided to control the time, and to capture the packets.
Area 7: Network component box
This component contains all of the network and end devices available with Packet
Tracer, and is further divided into two areas:
Area 7a: Device-type selection box
Area 7b: Device- specific selection box
When a device category is selected, this selection box displays the different
device modelswithin that category.
Area 8: User-created packet box –
Users can create highly-customized packets to test their topology from this area,
and the results are displayed as a list.
Selection of Wires
Example
Connect two computers and deliver message in between them
Step 1
Select End Devices PC0 and PC1
Step 2
Select automatic cable connection type
Step
Add IP address to the PC0 and PC1 by using IP configuration
No of computers IP Address Subnet Mask
PC0 192.168.2.1 255.255.255.0
PC1 192.168.2.2 255.255.255.0
Run Simulation
LAB Review Questions
Question No 1
Why we use CISCO packet Tracer?
Question No 2
What is network device?
Question No. 3
What is the purpose of Real-time/Simulation tabs?
Question No. 4
Connect more than 2 computers with a wire in CISCO packet tracer and observe the transmission
of messages in between them.
LAB Evaluation
Student Name: Instructor Name Syed M Hamedoon
Registration No: Assessment CLO3, P2 / CLO4, P4
Date: Total Marks
Apparatus
Computer System
Required Software
Lab Outcomes
By the end of this experiment, student will have basic understanding of computer communication
itself and with switch
LAB Scenario 1
To connect two computers and perform communication in between
Step 1
Open CISCO packet tracer
Step 2
Sketch diagram
Figure 6.1 sketch of connected 2 computers
Step 3
Assign IP Address to each computer
Computer 1:
IP address: 192.168.10.1
Subnet mask:255.255.255.0
Computer 2 :
IP address: 192.168.10.2
Subnet mask:255.255.255.0
Figure 6.3 Assign IP address of computer 2
Step4:
Perform Simulation
Step 5:
Check the status of transmission
Step 5:
Check the status of transmission of two computers by using ping command. If you want to check
the status of computer 2 from computer wheather the transmission is successful or not. You must
need to ping the IP address of computer 2 in command terminal
At Computer 1:
Command window: ping 192.168.10.2
If you received acknowledge from computer 2. That means the computer 2 is ready for
communication with computer 1
Figure 6.7 Command Window
LAB Scenario 2
Two connect 3 computers with switch
Step 1
Open CISCO packet tracer
Step 2
Sketch diagram
Step 4
Perform simulation
Transmission Status
Step 5:
Check the status of transmission of two computers by using ping command. If you want to check
the status of computer 2 from computer wheather the transmission is successful or not. You must
need to ping the IP address of computer 2 in command terminal
At Computer 1:
Command window: ping 192.168.10.2
If you received acknowledge from computer 2. That means the computer 2 is ready for
communication with computer 1.
Similarly you can check the ping command on computer 2 and computer 3
Figure 6.14 Command Window
LAB Review Questions
Question No. 1
Create a LAB scenario in CISCO packet tracer which includes 4 computers that are connected
together. The message transmission is performed from computer 1 to computer 2 and computer 2
to computer 3, computer 3 to computer 4.Perform all steps to justify your answer.
Question No. 2
Create a LAB scenario in CISCO packet tracer which includes 6 computers that are connected
with switch.
1) The message transmission is performed from computer 1 to computer 2,3,4,5,6.
2) The message transmission only perform from computer 1,3,5
LAB Evaluation
Note: Lab rubrics page must be attached at the end of the lab
Experiment No 7
To connect computers using HUB
Introduction
A hub is a physical layer networking device which is used to connect multiple devices in a
network. They are generally used to connect computers in a LAN. A hub has many ports in it. A
computer which intends to be connected to the network is plugged in to one of these ports. When
a data frame arrives at a port, it is broadcast to every other port, without considering whether it is
destined for a particular destination or not.
LAB Objectives
To understand the working of HUB in CISCO packet tracer
Apparatus
Computer System
Required Software
Lab Outcomes
By the end of this experiment, student will have basic understanding of hub in computer
communication
Theory
HUB is operate at physical layer of the OSI model. It has multiple ports. When a packet arrives at
one port it is copied to other ports so that all the segments of the LAN can see all packets. Since
computer and hub are different devices so we need Ethernet straight through cable. When a
computer send a packet to one port of the hub the same message is copied to all the other ports of
a hub.
Figure 7.1 HUB working
LAB Scenario 1
To connect multiple computers and perform communication in between using HUB
Step 1
Open CISCO packet tracer
Step 2
Sketch diagram
Step 4
Select the straight through cable and select Fast Ethernet
Figure 7.4 selection of cable
Step 6
Check the status of hub
Step 7
Assign IP Address to each computers
No of computers IP address Subnet mask
Step 8:
Check the status of IP of each computer type ipconfig in command window for selected computer
Step 9
Perform simulation by selecting the message signal then click on the source computer and then
click on the destination computer.
Transmit the packet from source computer 1 to destination computer 6. You can see in this figure
the hub broadcast the message to all computers 1 to 6. But the computers 2 to 5 denied the
message only computer 6 accept the message and send the acknowledgment to the hub
Figure 7.9 Simulation window 1
Question No 3 (CLO3,P2)
Write down the difference between hub and switch
Question No 4 (CLO4,P4)
Create a network, to connect 8 computers with the hub and verify the message delivery between
them.
Question No 5 (CLO4,P4)
Perform the network scenario 1 from lab and observe the result
LAB Evaluation
Note: Lab rubrics page must be attached at the end of the lab
Experiment No 8
To connect computers using Router
Introduction
A router is a physical or virtual appliance that passes information between two or more packet-
switched computer networks. A router inspects a given data packet's destination Internet Protocol
address (IP address), calculates the best way for it to reach its destination and then forwards it
accordingly.
LAB Objectives
To understand the working of router in CISCO packet tracer
Apparatus
Computer System
Router
Cable
Required Software
CISCO Packet Tracer
Lab Outcomes
By the end of this experiment, student will have basic understanding of router working in
computer communication
Theory
Routers are networking devices operating at layer 3 or a network layer of the OSI model. They are
responsible for receiving, analyzing, and forwarding data packets among the connected computer
networks. When a data packet arrives, the router inspects the destination address, consults its
routing tables to decide the optimal route and then transfers the packet along this route.
Routing Table
The functioning of a router depends largely upon the routing table stored in it. The routing table
stores the available routes for all destinations. The router consults the routing table to determine
the optimal route through which the data packets can be sent.
Types of Routers
A variety of routers are available depending upon their usages. The main types of routers are
following
Wireless Router − They provide WiFi connection WiFi devices like laptops, smartphones
etc. They can also provide standard Ethernet routing. For indoor connections, the range is
150 feet while its 300 feet for outdoor connections.
Broadband Routers − They are used to connect to the Internet through telephone and to
use voice over Internet Protocol (VoIP) technology for providing high-speed Internet
access. They are configured and provided by the Internet Service Provider (ISP).
Core Routers − They can route data packets within a given network, but cannot route the
packets between the networks. They helps to link all devices within a network thus forming
the backbone of network. It is used by ISP and communication interfaces.
Edge Routers − They are low-capacity routers placed at the periphery of the networks.
They connect the internal network to the external networks, and are suitable for transferring
data packets across networks. They use Border Gateway Protocol (BGP) for connectivity.
There are two types of edge routers, subscriber edge routers and label edge routers.
Brouters − Brouters are specialised routers that can provide the functionalities of bridges
as well. Like a bridge, brouters help to transfer data between networks. And like a router,
they route the data within the devices of a network.
LAB Observation
LAB Exercise No. 1
Network Scenario 1
To connect 3 computers with a router
Step 1
Sketch a network
Figure 8.2 Network Sketch
Step 2
Use a copper straight through cable for connection PC to router
Step 4
Make router configuration. Click the router and then click the config, click each gigabitethernet
and assign IP address with subnet
Step 3
Simulation
Check the message from source PC0 to destination PC1 and PC1 to PC2 then check PC2 to PC1
LAB Evaluation
Note: Lab rubrics page must be attached at the end of the lab
Experiment No 9
Static IP configuration with routers and switches
Introduction
An IP address refers to a unique number allocated to devices connected over a network. It is used
by network devices to communicate with each other. There are four types of IP addresses: private,
public, dynamic, and static. A static IP address is a permanent non-changeable IP address.
LAB Objectives
To understand the working of static IP configuration connected with router and
switches
Apparatus
Computer System
Router
Switch
Cable
Required Software
CISCO Packet Tracer
Lab Outcomes
By the end of this experiment, student will have basic understanding of static IP configuration and
connection of computers with router and switches
Theory
A static IP address can be described as a non-changing network address. Just as a house number in
an XYZ format is constant, a static IP address is a permanent address that informs servers or
computers of the location of a specific device connected to the Internet. A static IP address is
beneficial for organizations with internet-related needs, including FTP servers, hosting a webcam,
videoconferencing applications, or email.
Most devices have a dynamic IP address that is regularly changed or updated. The internet service
provider assigns the dynamic IP addresses to the network's router and is changed almost every
time the device is disconnected and reconnected to the Internet. Unlike dynamic IP addresses,
static IP addresses do not change. They are fixed IP addresses assigned to the route. Unless the
network architecture is changed or the device is withdrawn, the device's IP address remains the
same. Most devices with static IP addresses are servers or essential business equipment that allow
easy communication.
A static IP address can be either IPv6 or IPv4. It is manually assigned to the device and cannot be
easily updated. A complete machine reset will be required to modify the static IP address. This
can be troublesome if the device requires multiple IP addresses at different locations, for example,
a mobile phone. Therefore, static IP addresses are mostly used for servers and must be avoided
when using regular computers.
Figure 9.1 Router interfacing
Step 9
To make the complete network design
Step 4
Assign IP address of the network address of LAN 1 and LAN 2 in RIP table for both routers
Step 5
Simulation
Figure 9.24 Simulation Window 1
LAB Evaluation
Note: Lab rubrics page must be attached at the end of the lab
Experiment No 10
Serial Port Router configuration
Introduction
A serial port can be used for administrative terminal access or as a communication channel,
depending on the capabilities and configuration of the router. A router is a physical or virtual
appliance that passes information between two or more packet-switched computer networks. A
router inspects a given data packet's destination Internet Protocol address (IP address), calculates
the best way for it to reach its destination and then forwards it accordingly.
LAB Objectives
To understand the working of router configuration using CISCO packet tracer
Apparatus
Computer System
Router
Cable
Required Software
CISCO Packet Tracer
Lab Outcomes
By the end of this experiment, student will have basic understanding of serial port of router
interfacing with computer
Network Scenario 1
Step 1
Create a network. Connect the computers with switch and router by using straight through cables.
Step 4
Assign IP address to each computer
Step 5
Sketch a network
Figure 10.8 Network Scenario 1
Step 6
Assign IP address to each serial port
Router No. IP address (serial port)
Router 0 10.0.0.1
Router 1 10.0.0.2
11.0.0.1
Router 2 11.0.0.2
Step 8
Perform Simulation
LAB Evaluation
Note: Lab rubrics page must be attached at the end of the lab
Experiment No 11
To connect computers using Dynamic Host Configuration Protocol (DHCP)
Introduction
A switch is a data link layer networking device which connects devices in a network and uses
packet switching to send and receive data over the network. Like a hub, a switch also has many
ports, to which computers are plugged in. However, when a data frame arrives at any port of a
network switch, it examines the destination address and sends the frame to the corresponding
device(s). Thus, it supports both unicast and multicast communications. Packet Tracer is a
cross-platform visual simulation tool designed by Cisco Systems that allows users to create
network topologies and imitate modern computer networks. The software allows users to
simulate the configuration of Cisco routers and switches using a simulated command line
interface
LAB Objectives
Understand CISCO packet tracer
Understand the working of router
Apparatus
Computer System
Router
Cable
Required Software
Lab Outcomes
By the end of this experiment, student will have basic understanding of computer communication
itself and with switch
Theory
Network Scenario 1
Step 2
Assign IP to server 192.168.1.0
Step 3
Click on services of server and turn On the server and then add default gateway address and add
IP in DNS server
Step 4
Then click on PC and then go to IP configuration settings click on DHCP they get the addresses
automatically
Step 5
Run on simulation
LAB Network Scenario 2
Step 1:
Create a network
Step 2:
Select the straight through cable and connected all the devices
Step 3
Set the configuration of router and assign IP address
Step 4
Set the configuration of server
Step 5
Go to click on PCs and check to verify to assign the IP automatically or not using DHCP.
Step 6
Run simulation
Transmission is successful
LAB Review Questions
Question No.1 (CLO4, P4, PLO5)
Create a network 1 and 2 from lab and observe the result by using CISCO packet tracer
Question No. 2 (CLO4, P4, PLO5)
Create a network which consist of 1 server and 1 router, 1 switch which must be connected with 4
computers and verify the result using CISCO packet tracer
Question No. 4
Identify the difference between static IP and dynamic IP
LAB Evaluation
Note: Lab rubrics page must be attached at the end of the lab
Experiment No 12
To connect computers with routers using DHCP
Introduction
DHCP (Dynamic Host Configuration Protocol) configuration is performed on routers to assign an
IP address, subnet mask, gateway address ad DNS server address to the host systems. With this
configuration, the dynamic IP address is assigned, which enables the administrator to easily
connect a new host in the configured network.
LAB Objectives
To understand the working of DHCP in router
Apparatus
Computer System
Router
Cable
Required Software
Lab Outcomes
By the end of this experiment, student will have basic understanding of DHCP configuration of
router
LAB Task
Network Scenario 1
Step 1
A network topology is created in the Cisco Packet Tracer, which includes a router, a switch, and
three host systems connected to a network.
Step 3
In this step, a range of IP addresses is excluded from the addresses defined in the subnet mask of
the DHCP pool. Excluded IP addresses will be not assigned to any host system in the network.
Figure 12.3 command used to exclude IP range
Step 4
The interface of the router connected with the switch is assigned with the IP address defined as
the default router during the DHCP configuration. This route will be taken by the data packets to
reach their destination system. Also, the ‘no shutdown command is used to change the state of
the connected interface to up.
Network Scenario 2
Step 1:
Create a network topology
Step 2
Router configuration
This step is used to enable system by assigning IP addressing
Commands used for router configuration
Router>en
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int fa0/0
Router(config-if)#ip address 192.168.0.1 255.255.255.0
Router(config-if)#no shutdown
For saving router configuration give command
Step 3
Enable DHCP mode of the router
Step 4
Router configuration:
Now we configure the 2nd interface of the router Ethernet 0/1
Step 5
Now enable DHCP for the 2nd interface of router
You can see the 2nd interface of the router are link up which green color shows the link is
successfully up
Step 6
Assign IP address to the systems using DHCP
In last step we click on PC and assign IP address dynamically then click on PC and go to IP
configuration mode then click on DHCP. The automatically assign IP address to all the systems if
the DHCP is successfully enabled
Step 7
Add the network address in router RIP table
Run Simulation
LAB Review Questions
Question 1 (CLO4, P4)
Create a network scenario 1 from this lab and observe the result also attached the network diagram
with simulation
Question 2 (CLO4, P4)
Create a network scenario 2 from this lab and observe the result also attached the network diagram
with simulation
Question 3 (CLO3, P2)
What is role of DHCP in router and why we used this?
LAB Evaluation
Note: Lab rubrics page must be attached at the end of the lab
Experiment No 13
To study the network commands in communication networks
This lab explains the basic networking commands and their arguments, options, and parameters.
Learn the essential networking commands that are used to troubleshoot computer networks.
LAB Objectives
To understand the networks commands
Apparatus
Computer System
Lab Outcomes
By the end of this experiment, student will have basic understanding of computer communication
network commands
1. Tracert
The tracert command prints the path. If all routers on the path are functional, this command prints
the full path. If a router is down on the path, this command prints the path up to the last
operational router.
The following command traces the path to the host named www.google.co.in.
tracert www.google.co.in
The ping command is used to test connectivity between two hosts. It sends ICMP echo request
messages to the destination. The destination host replies with ICMP reply messages. If the ping
command gets a reply from the destination host, it displays the reply along with round-trip times.
The following command tests connectivity between the host computer and Google's server.
ping google.com
3. Ipconfig
This command displays all current TCP/IP network configuration values and refreshes Dynamic
Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. This command
is mainly used to view the IP addresses on the computers that are configured to obtain their IP
address automatically.
ipconfig /all – displays more information about the network setup on your systems including the
MAC address.
ipconfig /release – release the current IP address
4. Hostname Command
A very simple command that displays the host name of your machine. This is much quicker than
going to the control panel>system route.
5. Arp
To send IP packets, a computer needs two addresses. These addresses are the MAC address and
the IP address. A MAC address is the physical or hardware address of the NIC. An IP address is
the logical or software address of NIC. If a computer knows the IP address of the destination
computer but it does not know the MAC address of the destination computer, it uses the ARP
protocol to know the MAC address of the destination computer.
The ARP protocol broadcasts a given IP address over a local network. The corresponding host
responds to the broadcast with its MAC address. To avoid repetition, ARP stores the answer in a
table known as ARP table. ARP maintains a separate ARP table for each NIC.
To view the ARP table, you can use the following command.
arp
By default, this command displays the ARP table of the active NIC. If multiple NICs are installed
on the computer, you can use the -a option with this command. If the -a option is used, the ARP
command displays all ARP tables.
The following image shows the output of the arp command when used with the -a option.
To display the ARP cache entry for a specific IP address, specify the IP address with the -
N option. For example, the following command displays the ARP cache table for the interface that
is assigned the IP address 192.168.42.171.
Arp -a -N 192.168.42.171
The following image shows the output of the above command.
6. Netstat
This command displays active connections, ports on which the computer is listening, Ethernet
statistics, the IP routing table, and IP statistics.
The output of this command is organized in rows and columns. Each row represents a new
connection or an entry in the output. It contains four columns. These columns provide the
following information about the row.
Proto: - This column displays the name of the protocol (TCP or UDP).
Local Address: - This column displays the IP address of the local computer and the port number
being used. If the port is not yet established, the port number is shown as an asterisk (*).
Foreign Address: - This column displays the IP address and port number of the remote computer
to which the port is connected.
Another very simple command that shows the MAC address of your network interfaces
8. NSLOOKUP
Used for: Troubleshooting network connection issues
Command to enter: nslookup
NSLookup is useful for diagnosing DNS name resolution problems. By typing nslookup into the
command prompt, you will be presented with the name and IP address of your device’s DNS
server. For you at home, this will more than likely be your router, but in enterprise environments,
this will probably be a dedicated DNS server. NSLookup can be used to find the IP address of a
device, find the domain name of an IP address and find mail servers for a domain.
9. SYSTEMINFO
Used for: Displaying system information
Command to enter: systeminfo
If you need to know anything about the device you are using, be it details of the processor used,
the version of Windows you are operating on, or what the boot device is configured as, you can
find it all through the Windows GUI. But why would you want to spend time doing that when you
can run this simple command to see it all in one place? This command will poll your device and
display the most important information in a clean, easy to read format.
LAB Review Questions
Question 1 (CLO3,P2)
Run all the network commands as mention in lab and observe their working
Question 2 (CLO3,P2)
LAB Evaluation
Note: Lab rubrics page must be attached at the end of the lab
Experiment No 14
Wireless network configuration
Introduction
A switch is a data link layer networking device which connects devices in a network and uses
packet switching to send and receive data over the network. Like a hub, a switch also has many
ports, to which computers are plugged in. However, when a data frame arrives at any port of a
network switch, it examines the destination address and sends the frame to the corresponding
device(s). Thus, it supports both unicast and multicast communications. Packet Tracer is a
cross-platform visual simulation tool designed by Cisco Systems that allows users to create
network topologies and imitate modern computer networks. The software allows users to
simulate the configuration of Cisco routers and switches using a simulated command line
interface
LAB Objectives
Understand CISCO packet tracer
Understand the working of router
Apparatus
Computer System
Router
Cable
Required Software
Lab Outcomes
By the end of this experiment, student will have basic understanding of computer communication
itself and with switch
Theory
Create a network scenario
Double click the wireless router
Go to the physical
Then delete the port interface
Then select the wireless interface in PC WMP300N
Then turn On the button
Then go to Desktop and select PC Wireless
Then you can see the window is open which shows that there is no connection of PC with wireless
router
Then click on tab connect
Then click on connect and enter the wireless key
Link Status
Same procedure is apply for the other PC’s
Run simulation
Go to promt command for each pc and ping the IP address of the connected PC
Network Scenario 2
Router configuration
Assign IP address 192.168.2.1
Assign IP address 192.168.2.7 to the PC0 by using IP configuration settings
Connect the PC1 to the wireless router so we need to add wireless interface in the PC
Then assign the IP address 192.168.2.8 to the PC1 by using IP configuration command
Then assign the IP address 192.168.2.9 to the Labptop by using IP configuration settings
Then go the access point configuration
LAB Evaluation
Note: Lab rubrics page must be attached at the end of the lab
Experiment No 15
To implement virtual local area network (VLAN)
A virtual local area network (VLAN) is a virtualized connection that connects multiple devices
and network nodes from different LANs into one logical network. Virtual local area networks
have become crucial for organizations with complex networking systems. Organizations require
solutions that allow them to scale their networks, segment them to increase security measures, and
decrease network latency. While LAN is used to connect a group of devices such as computers
and printers to a server via cables, VLANs allow multiple LANs and associated devices to
communicate via wireless internet.
LAB Objectives
To understand the virtual local area network by considering network scenario
Apparatus
Computer System
Required Software
CISCO packet tracer
Lab Outcomes
By the end of this experiment, student will have basic understanding of virtual local area network
of computer communication
Theory
VLAN is a custom network which is created from one or more local area networks. It enables a
group of devices available in multiple networks to be combined into one logical network. The
result becomes a virtual LAN that is administered like a physical LAN. The full form of VLAN is
defined as Virtual Local Area Network. While VLANs are a type of subnet, they have their own
unique capabilities and characteristics that differentiate them from subnets. However, the OSI
model plays a major role in both.
The below topology as shown in figure 15.1 depicts a network having all hosts inside the same
virtual LAN:
Figure 15.1 VLAN
Network Scenario 1
Step 1
Step 2
Connect the computers with the switch
Step 3
Label the network
Step 4
Switch configuration
Click on switch and open CLI mode
After typing exit we return in config mode of switch
Then go to the config mode of switch and create VLAN 20 for service department
You can observe inside the table no ports is assigned to the VLAN
Step 5
Port configuration inside switch. First we configure the port of PC0 with switch interface fa0/1 then we
assigned the vlan 10 to port
In the next step we need to assigned the ports to the interface of the switch with connected computers
From fa0/20-24
In the next step, we show the vlan by typing command show vlan in back to previlegede window
You can observe from the figure, the ports are assigned to the VLAN successfully
Step 6
Assign IP addresses to the computers
Open the command window of PC3 and type the command ipconfig then ping the IP of the PC2 computer
You can observe the response of PC2 comes at PC3
When we ping the IP of the VLAN 10 of HR department you can observe no response is coming
Step 7
Run the status of switch. Double click on switch then open CLI command then type sh run
Step 8
Run the simulation.
If we want to transmit the message from PC0 to PC1. We know PC0 and PC1 both are connected in
different VLAN and using virtual local area network configuration we are able to restrict the PC0 to send
data to the PC1 of the other network.
If we want to transmit the message from PC1 to PC3 within the same network the data should be send. You
can observe in the figure the transmission is successful between PC1 to PC3.
LAB Review Questions
Question No. 1 (CLO4, P4)
Create network scenario 1 as mention in lab. Verify the results with your instructor and attached
the result.
Question No. 2 (CLO4, P4)
Create a network scenario in which you 3 department exist (Technology, HR, Café) on the same
network. Using VLAN our goal is to secure the network and create sub networks independent. In
technology department we have 3 computers are connected to the switch. In HR department we
have 2 computers are connected to the switch. In café, we have 5 computers are connected to the
switch.
Question No.3 (CLO3, P2)
Identify the benefits of VLAN and why we used VLAN ?
LAB Evaluation
Note: Lab rubrics page must be attached at the end of the lab