CN Record
CN Record
An Autonomous Institution
Affiliated to Anna University, Chennai,
Rajalakshmi Nagar, Thandalam – 602 105
SRIHARINI S
Name : ………………………………………………………………………………………………
2116221501141
Register No. : ...……………………………………………………………………………………..
III / AIML /C
Year / Branch / Section : …………………………………………………………………………...
V
Semester : …………………………………………………………………………………………..
2024-2025
AcademicYear: ...…………………………………………………………………………………...
RAJALAKSHMI ENGINEERING COLLEGE
An Autonomous Institution
Affiliated to Anna University, Chennai,
Rajalakshmi Nagar, Thandalam – 602 105
BONAFIDE CERTIFICATE
Name: SRIHARINI S
……………………………………………………………………………
2024-2025 V AIML
Academic Year: …………… Semester: …………… Branch: ………………
Certified that this is the bonafide record of work done by the above student in
CS19541-COMPUTER NETWORKS
the .......................................................................................................... Laboratory
20-11-2024
Submitted for the Practical Examination held on……………………………
List of Experiments
List of Experiments
1. Study of various Network commands used in Linux and [4]
Windows:
Hands-on practice of various network commands.
4. a) Setup and configure a LAN (Local area network) using a Switch [2]
and Ethernet cables in your lab.
1. Connect 3-4 host machines to a switch.
2. Assign ip addresses to each host machine.
3. Check the connectivity between the machines by using ping
command.
4. Share and access files and folder across the machines of the
LAN.
2|Page 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
5. Experiments on Packet capture tool: Wireshark [4]
To understand the features of wireshark as a packet capture tool
and understand encapsulation of information at various layers
of a Protocol stack.
[2]
Wireless LAN:
c) Configuration of Wireless LAN using CISCO Packet Tracer.
3|Page 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
10. Internetworking with routers in CISCO PACKET TRACER
simulator.
a) Design and configure a simple internetwork using a router. [4]
1. Design different networks (with 3 to 4 hosts) and connect via
Router.
2. Allot static ip address to machines and router interfaces.
3. Perform simulation and trace how routing is done in packet
transmission.
b) Design and configure an internetwork using wireless router
DHCP server and internet cloud.
[2]
c) Design and configure an inter-network in your lab using
switch, router and Ethernet cables.
14. Write a code using RAW sockets to implement packet sniffing. [4]
Total 60 hours
4|Page 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
5|Page 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
Practical -1
arp –a:- ARP is short form of address resolution protocol, It will show the IP address of your
computer along with the IP address and MAC address of your router.
hostname: This is the simplest of all TCP/IP commands. It simply displays the name of your
computer.
ipconfig /all: This command displays detailed configuration information about your TCP/IP
connection including Router, Gateway, DNS, DHCP, and type of Ethernet adapter in your
system
nbtstat –a: This command helps solve problems with NetBIOS name resolution. (Nbt stands
for NetBIOS over TCP/IP)
netstat: (network statistics) netstat displays a variety of statistics about a computers active
TCP/IP connections. It is a command line tool for monitoring network connections both
incoming and outgoing as well as viewing routing tables, interface statistics etc.
e.g.:- netstat -r
nslookup: (name server lookup) is a tool used to perform DNS lookups in Linux. It is used to
display DNS details, such as the IP address of a particular computer, the MX records for a
domain or the NS servers of a domain. nslookup can operate in two modes: interactive and
non-interactive.
e.g.:- nslookup www.google.com
pathping: Pathping is unique to Window’s, and is basically a combination of the Ping and
Tracert commands. Pathping traces the route to the destination address then launches a 25
second test of each router along the way, gathering statistics on the rate of data loss along each
hop.
ping: (Packet INternet Groper) command is the best way to test connectivity between two
nodes. Ping use ICMP (Internet Control Message Protocol) to communicate to other devices.
1. #ping hostname( ping localhost)
2. #ping ip address (ping 4.2.2.2)
3. #ping fully qualified domain name(ping www.facebook.com
Route: route command is used to show/manipulate the IP routing table. It is primarily used
to setup static routes to specific host or networks via an interface.
6|Page 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Some important Linux networking commands
1. ip
The ip command is one of the basic commands every administrator will need in daily
work, from setting up new systems and assigning IPs to troubleshooting existing systems.
The ip command can show address information, manipulate routing, plus display network
various devices, interfaces, and tunnels.
c. To delete an IP on an interface:
a. [root@server ~]# ip address del 192.168.1.254/24 dev enps03
d. Alter the status of the interface by bringing the interface eth0 online:
[root@server ~]# ip link set eth0 up
e. Alter the status of the interface by bringing the interface eth0 offline:
[root@server ~]# ip link set eth0 down
f. Alter the status of the interface by enabling promiscuous mode for eth0:
[root@server ~]# ip link set eth0 promisc on
g. Add a default route (for all addresses) via the local gateway 192.168.1.254 that can be
reached on device eth0:
[root@server ~]# ip route add default via 192.168.1.254 dev eth0
7|Page 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
2. ifconfig
The ifconfig command was/is a staple in many sysadmin's tool belt for configuring and
troubleshooting networks. It has since been replaced by the ip command discussed above.
3. mtr
a. The basic mtr command shows you the statistics, including each hop (hostnames) with
time and loss%:
[root@server ~]# mtr google.com
b. Show numeric IP addresses (if you use -g, you will get IP addresses (numbers) instead
of hostnames):
[root@server ~]# mtr -g google.com
4. tcpdump
Before starting any capture, you need to know which interfaces tcpdump can use. You
will need to use sudo or have root access in this case.
[root@server ~]# tcpdump -D
If you want to capture traffic on eth0, you can initiate that with tcpdump -i eth0 sample
output:
[root@server ~]# tcpdump -i eth0
8|Page 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
[root@server ~]# tcpdump -i eth0 -c 10
Capture traffic to and from one host
You can filter out traffic coming from a specific host. For example, to find traffic coming
from and going to 8.8.8.8, use the command:
[root@server ~]# tcpdump -i eth0 -c 10 host 8.8.8.8
9|Page 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
5. ping
Ping is a tool that verifies IP-level connectivity to another TCP/IP computer by sending
Internet Control Message Protocol (ICMP) Echo Request messages. The receipt of
corresponding Echo Reply messages is displayed, along with round-trip times. Ping is the
primary TCP/IP command used to troubleshoot connectivity, reachability, and name
resolution.
If you want to ping a host ten times, use the following command:
[root@server ~]# ping -c 10 google.com
While pinging a host, you'll find different output from the ping results, including the
following three examples.
Destination Host Unreachable
The possible best reason is there is no route from the local host system and to the
destination desired destination host, or a remote router reports that it has no route to the
destination host.
Request timed out
This result means that no Echo Reply messages were received within the default time of
one second or the time that you set while you are pinging that host. This can be due to
many different causes; the most common include network congestion, failure of the ARP
request, packet filtering/firewall, etc.
Unknown host/Ping Request Could Not Find Host
Maybe you misspelled the hostname or the host does not exist at all in the network.
You must have 0% packet loss for every ping result with a good latency or lower
response time. Depending on which transmission medium (UTP, fibre optics cable, Wi-
Fi) you're using, your latency will differ.
10 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Configuring an Ethernet connection by using nmcli
If you connect a host to the network over Ethernet, you can manage the connection’s
settings on the command line by using the nmcli utility.
Procedure
connection.interface-name: enp1s0
connection.autoconnect: yes
ipv4.method: auto
ipv6.method: auto
...
5. Configure the IPv4 settings:
To use DHCP, enter:
To set a static IPv4 address, network mask, default gateway, DNS servers, and
search domain, enter:
11 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
To set a static IPv6 address, network mask, default gateway, DNS servers, and
search domain, enter:
Verification
# cat /etc/resolv.conf
search example.com
nameserver 192.0.2.200
nameserver 2001:db8:1::ffbb
If multiple connection profiles are active at the same time, the order
of nameserver entries depend on the DNS priority values in these profile and the
connection types.
12 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
5. Use the ping utility to verify that this host can send packets to other hosts:
# ping <host-name-or-IP-address>
Troubleshooting
Verify that the network cable is plugged-in to the host and a switch.
Check whether the link failure exists only on this host or also on other hosts connected
to the same switch.
Verify that the network cable and the network interface are working as expected.
Perform hardware diagnosis steps and replace defect cables and network interface cards.
If the configuration on the disk does not match the configuration on the device, starting
or restarting NetworkManager creates an in-memory connection that reflects the
configuration of the device.
Student Observation:
1. Which command is used to find the reachability of a host machine from your
device?
2. Which command will be give the details of hops taken by a packet to reach its
destination?
3. Which commands displays the ip configuration of your machine.
4. Which command displays the TCP port status in your machine?
5. Write the modify the ip configuration in a Linux machine.
13 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Practical-2
14 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
High bandwidth Speed of signal is
Immune to 500m
interference Television
Low loss network
bandwidth High speed
RG-6
Coaxial internet
RG-59 10-100Mbps Versatile
cable connections
RG-11
Disadvantages
Limited distance
Cost
Size is bulky
Advantages Maximum
High speed distance of fibre
High bandwidth optics cable is
fibre High security around
Single mode 100meters
optics
Multi mode
100Gbps Long distance
cable Disadvantages
Expensive
Requires skilled
installers
15 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
16 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Step 1: To start construction of the device, begin by threading shields onto the cable.
Step 2: Next, strip approximately 1.5 cm of cable shielding from both ends. The
crimping tool has a round area to complete this task.
17 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
Step 3: After, you will need to untangle the wires; there should be four “twisted pairs.”
Referencing back to the sheet, arrange them from top to bottom. One end should be in
arrangement A and the other in B.
Step 4: Once the order is correct, bunch them together in a line, and if there are any that
stick out farther than others, snip them back to create an even level. The difficult aspect
is placing these into the RJ45 plug without messing up the order. To do so, hold the plug
with the clip side facing away from you and have the gold pins facing toward you, as
shown.
18 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
Step 5: Next, push the cable right in. The notch at the end of the plug needs to be just
over the cable shielding, and if it isn’t, that means that you stripped off too much
shielding. Simply snip the cables back a little more.
Step 6: After the wires are securely sitting inside the plug, insert it into the crimping tool
and push down.
It should be shaped correctly, but pushing too hard can crack the fragile plastic plug.
Step 7: Lastly, repeat for the other end using diagram B (to make a crossover cables)/
using diagram A (to make a straight through cable)
Student observation:-
19 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
Practical -3
AIM: To study the Packet tracer tool Installation and User Interface
Overview
INTRODUCTION:
A simulator, as the name suggests, simulates network devices and its environment. Packet Tracer
is an exciting network design, simulation and modelling tool.
1. It allows you to model complex systems without the need for dedicated equipment.
2. It helps you to practice your network configuration and troubleshooting skills via
computer or an Android or iOS based mobile device.
3. It is available for both the Linux and Windows desktop environments.
4. Protocols in Packet Tracer are coded to work and behave in the same way as they would
on real hardware.
20 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
The layout of Packet Tracer is divided into several components. The components of the Packet
Tracer interface are as follows: match the numbering with explanations.
1. Menu bar – This is a common menu found in all software applications; it is used to open,
save, print, change preferences, and so on.
2. Main toolbar – This bar provides shortcut icons to menu options that are commonly
accessed, such as open, save, zoom, undo, and redo, and on the right-hand side is an icon
for entering network information for the current network.
3. Logical/Physical workspace tabs – These tabs allow you to toggle between the Logical and
Physical work areas.
4. Workspace – This is the area where topologies are created and simulations are displayed.
5. Common tools bar – This toolbar provides controls for manipulating topologies, such as
select, move layout, place note, delete, inspect, resize shape, and add simple/complex
PDU.
6. Real-time/Simulation tabs – These tabs are used to toggle between the real and simulation
modes. Buttons are also provided to control the time, and to capture the packets.
7. Network component box – This component contains all of the network and end devices
available with Packet Tracer, and is further divided into two areas: Area 7a: Device-type
selection box – This area contains device categories Area 7b: Device-specific selection box
– When a device category is selected, this selection box displays the different device models
within that category
21 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
8. User-created packet box – Users can create highly-customized packets to test their
topology from this area, and the results are displayed as a list.
2. Click on Connections:
a. Click on Copper Straight-Through cable,
b. Select one of the PC and connect it to HUB using the cable. The link LED should glow
in green, indicating that the link is up. Similarly connect remaining 3 PCs to the HUB.
c. Similarly connect 4 PCs to the switch using copper straight-through cable.
22 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
3. Click on the PCs connected to hub, go to the Desktop tab, click on IP Configuration, and
enter an IP address and subnet mask. Here, the default gateway and DNS server information
is not needed as there are only two end devices in the network.
Click on the PDU (message icon) from the common tool bar,
a. Drag and drop it on one of PC (source machine) and then drop it on another PC
(destination machine) connected to the HUB.
4. Observe the flow of PDU from source PC to destination PC by selecting the Realtime mode
of simulation.
6. Observe how HUB and switch are forwarding the PDU and write your observation and
conclusion about the behaviors of Switch and HUB.
Student observation:
a. From your observation write down the behavior of Switch and HUB in terms of
forwarding the packets received by them.
b. Find out the network topology implemented in your college and draw and label that
topology in your observation book.
23 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
Practical -4
AIM: Setup and configure a LAN (Local area network) using a Switch and
Ethernet cables in your lab.
What is a LAN?
A Local Area Network (LAN) refers to a network that connects devices within a limited area,
such as an office building, school, or home. It enables users to share resources, including data,
printers, and internet access. LAN connects devices to promote collaboration and transfer
information between users, such as computers, printers, servers, and switches. A local area
network (LAN) switch serves as the primary connecting device, managing and directing
communications within the local network. Each connected device on a LAN switch can
communicate directly with each other, allowing for fast and secure data transfer.
Step 1. Plan and Design an appropriate network topology taking into account network
requirements and equipment location.
Step 2. You can take 4 Computers, a Switch with 8, 16, or 24 ports which is sufficient for
networks of these sizes, and 4 Ethernet cables.
Step3: Connect your computers to network switch via an Ethernet cable, which is as simple as
plugging one end of the Ethernet cable into your computer and the other end into your network
switch.
24 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Step 6:- Check the connectivity between switch and other machine by using ping command in
the command prompt of the device.
25 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
Step 7: Select a folder, ->go to properties-> click Sharing tab->share it with everyone on the
same LAN.
Step 8. Try to access the shared folder from others Computers of the network.
Student observation:
Draw a neat diagram of the LAN in the configuration observation book. that you have
implemented in your lab. Write the ip configuration of each and every device. Write the
outcome and challenges faced while configuring the LAN.
26 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Practical-5
AIM Experiments on Packet capture tool: Wireshark
Packet Sniffer
● Sniffs messages being sent/received from/by your computer
● Store and display the contents of the various protocol fields in the messages
● Passive program
– never sends packets itself
– no packets addressed to it
27 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
DESCRIPTION:
WIRESHARK
Wireshark, a network analysis tool formerly known as Ethereal, captures packets in real time and
display them in human-readable format. Wireshark includes filters, color coding, and other
features that let you dig deep into network traffic and inspect individual packets. You can use
Wireshark to inspect a suspicious program’s network traffic, analyze the traffic flow on your
network, or troubleshoot network problems.
What we can do with Wireshark:
Capture network traffic
Decode packet protocols using dissectors
Define filters – capture and display
Watch smart statistics
Analyze problems
Interactively browse that traffic
Getting Wireshark
Wireshark can be downloaded for Windows or macOS from its official website. For Linux or
another UNIX-like system, Wireshark will be found in its package repositories. For Ubuntu,
Wireshark will be found in the Ubuntu Software Center.
Capturing Packets
After downloading and installing Wireshark, launch it and double-click the name of a network
interface under Capture to start capturing packets on that interface
As soon as you click the interface’s name, you’ll see the packets start to appear in real time.
Wireshark captures each packet sent to or from your system.
If you have promiscuous mode enabled—it’s enabled by default—you’ll also see all the other
packets on the network instead of only packets addressed to your network adapter. To check if
promiscuous mode is enabled, click Capture > Options and verify the “Enable promiscuous mode
on all interfaces” checkbox is activated at the bottom of this window.
28 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Packet
List
Packet
Details
Packet
Bytes
Click the red “Stop” button near the top left corner of the window wh en you want t o stop
capturing traffic.
Color Coding
You’ll probably see packets highlighted in a variety of different colors. Wireshark uses colors to
help you identify the types of traffic at a glance. By default, light purple is TCP traffic, light blue
is UDP traffic, and black identifies packets with errors—for example, they could have been
delivered out of order.
To view exactly what the color codes mean, click View > Coloring Rules. You can also customize
and modify the coloring rules from here, if you like.
29 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Sample Captures
If there’s nothing interesting on your own network to inspect, Wireshark’s wiki has you covered.
The wiki contains a page of sample capture files that you can load and inspect. Click File > Open
in Wireshark and browse for your downloaded file to open one.
You can also save your own captures in Wireshark and open them later. Click File > Save to save
your captured packets.
Filtering Packets
If you’re trying to inspect something specific, such as the traffic a program sends when phoning
home, it helps to close down all other applications using the network so you can narrow down the
traffic. Still, you’ll likely have a large amount of packets to sift through. That’s where Wireshark’s
filters come in.
30 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
The most basic way to apply a filter is by typing it into the filter box at the top of the window and
clicking Apply (or pressing Enter). For example, type “dns” and you’ll see only DNS packets.
When you start typing, Wireshark will help you autocomplete your filter.
You can also click Analyze > Display Filters to choose a filter from among the default filters
included in Wireshark. From here, you can add your own custom filters and save them to easily
access them in the future.
For more information on Wireshark’s display filtering language, read the Building display filter
expressions page in the official Wireshark documentation.
Another interesting thing you can do is right-click a packet and select Follow > TCP Stream.
You’ll see the full TCP conversation between the client and the server. You can also click other
protocols in the Follow menu to see the full conversations for other protocols, if applicable.
31 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Close the window and you’ll find a filter has been applied automatically. Wireshark is showing you
the packets that make up the conversation.
Inspecting Packets
Click a packet to select it and you can dig down to view its details.
32 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
You can also create filters from here — just right-click one of the details and use the Apply as
Filter submenu to create a filter based on it.
33 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
Wireshark is an extremely powerful tool, and this tutorial is just scratching the surface of what you
can do with it. Professionals use it to debug network protocol implementations, examine security
problems and inspect network protocol internals.
34 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
CAPTURING AND ANALYSING PACKETS USING WIRESHARK TOOL
Procedure
Select Local Area Connection in Wireshark.
Go to capture option
Select stop capture automatically after 100 packets.
Then click Start capture.
Save the packets.
Output
1. Create a Filter to display only TCP/UDP packets, inspect the packets and provide
the flow graph
Procedure
Select Local Area Connection in Wireshark.
Go to capture option
Select stop capture automatically after 100 packets.
Then click Start capture.
Search TCP packets in search bar.
To see flow graph click StatisticsFlow graph.
Save the packets.
35 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Flow Graph
2. Create a Filter to display only ARP packets and inspect the packets.
Procedure
Go to capture option
Select stop capture automatically after 100 packets.
Then click Start capture.
Search ARP packets in search bar.
Save the packets.
36 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Output
3. Create a Filter to display only DNS packets and provide the flow graph.
Procedure
Go to capture option
Select stop capture automatically after 100 packets.
Then click Start capture.
Search DNS packets in search bar.
To see flow graph click StatisticsFlow graph.
Save the packets.
37 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
4. Create a Filter to display only HTTP packets and inspect the packets
Procedure
Select Local Area Connection in Wireshark.
Go to capture option
Select stop capture automatically after 100 packets.
Then click Start capture.
Search HTTP packets in search bar.
Save the packets.
38 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
5. Create a Filter to display only IP/ICMP packets and inspect the packets.
Procedure
Select Local Area Connection in Wireshark.
Go to capture option
Select stop capture automatically after 100 packets.
Then click Start capture.
Search ICMP/IP packets in search bar.
Save the packets
6. Create a Filter to display only DHCP packets and inspect the packets.
Procedure
Select Local Area Connection in Wireshark.
Go to capture option
Select stop capture automatically after 100 packets.
Then click Start capture.
Search DHCP packets in search bar.
Save the packets
Output
Student observation:
1. What is promiscuous mode?
2. Does ARP packets has transport layer header? Explain.
3. Which transport layer protocol is used by DNS?
4. What is the port number used by http protocol?
5. What is a broadcast ip address?
39 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
Practical-6
Student observation:-
Write the code here:
import numpy as np
Practical-6
hamming_code = ['0'] * (m + r)
j=0
k=1
for i in range(1, m + r + 1):
if i == 2 ** j:
j += 1
else:
hamming_code[i - 1] = data[-k]
k += 1
for i in range(r):
x = 2 ** i
one_count = 0
for j in range(1, m + r + 1):
if j & x and hamming_code[j - 1] == '1':
one_count += 1
hamming_code[x - 1] = '1' if one_count % 2 != 0 else '0'
return ''.join(hamming_code[::-1])
if error_position > 0:
print(f"Error detected at position: {error_position}")
data = list(data)
data[-error_position] = '1' if data[-error_position] == '0' else '0'
data = ''.join(data)
else:
print("No error detected.")
Practical-6
j += 1
return ''.join(corrected_data[::-1])
# Sender Program
def sender(text):
binary_data = text_to_binary(text)
encoded_data = apply_hamming_code(binary_data)
with open("channel.txt", "w") as f:
f.write(encoded_data)
print("Data has been sent to channel.txt.")
# Receiver Program
def receiver():
with open("channel.txt", "r") as f:
encoded_data = f.read()
print(f"Received encoded data: {encoded_data}")
corrected_data = detect_and_correct_hamming_code(encoded_data)
decoded_text = binary_to_text(corrected_data)
print(f"Decoded text after error correction: {decoded_text}")
# Example Usage
# Enter text to send
text_to_send = "Hello" # Modify the text to test
sender(text_to_send)
receiver()
Input:-
Text to send: "Hello"
Output:
Received encoded data: 0100100001100110101101100011010100011001110100
No error detected.
Decoded text after error correction: Hello
42 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
Practical-7
AIM: Write a program to implement flow control at data link layer using
SLIDING WINDOW PROTOCOL. Simulate the flow of frames from one
node to another.
Program should achieve at least below given requirements. You can make it a bidirectional
program wherein receiver is sending its data frames with acknowledgement (Piggybacking).
Student observation:
44 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
Practical-7
Input:
Output:
Practical-7
--- SENDING WINDOW ---
Sent frame 4 with data 'O'.
--- RECEIVER WINDOW ---
Frame 4 received correctly.
Sending ACK.
All frames in the window acknowledged correctly.
Moving window forward.
All frames sent and acknowledged successfully.
46 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
Practical-8
Addressing Table
48 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
In Part 2, you will create Management, Operations, Parking Lot, and Native VLANs on
both switches. You will then assign the VLANs to the appropriate interface. The show
vlan command is used to verify your configuration settings.
49 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
a. Use the no switchport access vlan command to remove the VLAN 99 assignment to
F0/24.
S1(config)# interface f0/24
S1(config-if)# no switchport access vlan
S1(config-if)# end
b. Verify that the VLAN change was made.
Question:
50 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
a. Add VLAN 30 to interface F0/24 without issuing the global VLAN command.
S1(config)# interface f0/24
S1(config-if)# switchport access vlan 30
% Access VLAN does not exist. Creating vlan 30
Note: Current switch technology no longer requires that the vlan command be issued to add
a VLAN to the database. By assigning an unknown VLAN to a port, the VLAN will be
created and added to the VLAN database.
c. Use the no vlan 30 command to remove VLAN 30 from the VLAN database.
S1(config)# no vlan 30
S1(config)# end
d. Issue the show vlan brief command. F0/24 was assigned to VLAN 30.
Question:
After deleting VLAN 30 from the VLAN database, why is F0/24 no longer displayed in the
output of the show vlan brief command? What VLAN is port F0/24 now assigned to? What
happens to the traffic destined to the host that is attached to F0/24?
f. Issue the show vlan brief command to determine the VLAN assignment for F0/24.
Questions:
To which VLAN is F0/24 assigned?
Note: Before removing a VLAN from the database, it is recommended that you reassign all
the ports assigned to that VLAN.
Why should you reassign a port to another VLAN before removing the VLAN from the
VLAN database?
Close configuration window.
52 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
Reflection Questions
1. What is needed to allow hosts on VLAN 10 to communicate to hosts on VLAN 99?
2. What are some primary benefits that an organization can receive through effective use of
VLANs?
There are 10 faculty in Robotics department, sitting in 3 different blocks. Design and configure a
Virtual LAN for Robotics department (using switch and Ethernet cables) so that all the faculty
are logically in the same LAN.
Student observation:-
a) Draw and Label the VLAN for Qb).
b) Show the ip configuration for each device.
c) Write the commands used for VLAN configuration in switch.
53 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
Practical-8
Design a topology with three PCs connected from Linksys Wireless routers.
• Select Administration tab from top Menu, set username and password to admin
and click on Save Setting.
54 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
55 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
• Now it's time to connect PC's from Wireless router. To do so click PC select Desktop
click on PC Wireless
As you can see in image that Wireless device is accessing MotherNetwork on CH 6 and signal
strength is 100%. In left side you can see that WEP security is configured in network. Click on
connect button to connect MotherNetwork
• It will ask for WAP key insert 0123456789 and click connect
56 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
As you can see in image below that system is connected. And PCI card is active.
57 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Student observation:
c) What is SSID of a wireless router?
d) What is a security key in wireless router?
e) Configure a simple Wireless LAN in your lab using a real access point
and write down the configurations in your notebook.
58 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
Practical-9
SUBNETTING:
To subnet the network address of 192.168.1.0/24 to provide enough space for at least 5 addresses
for end devices, the switch, and the router, we can use a /27 subnet mask. This will give us 8
subnets with 30 host addresses each.
59 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
The IP addressing for the network shown in the topology can be as follows:
Router R1:
GigabitEthernet0/0: 192.168.1.1
GigabitEthernet0/1: 192.168.2.1
Switch S1:
FastEthernet0/1: 192.168.1.0/27
PC1: 192.168.1.11
PC2: 192.168.1.12
PC3: 192.168.1.13
PC4: 192.168.1.14
PC5: 192.168.1.15
FastEthernet0/2: 192.168.2.0/27
PC1: 192.168.2.11
PC2: 192.168.2.12
PC3: 192.168.2.13
PC4: 192.168.2.14
PC5: 192.168.2.15
Router R2:
FastEthernet0/0: 192.168.3.1
FastEthernet0/1: 192.168.4.1
Switch S2:
FastEthernet0/1: 192.168.3.0/27
PC1: 192.168.3.11
PC2: 192.168.3.12
PC3: 192.168.3.13
PC4: 192.168.3.14
PC5: 192.168.3.15
FastEthernet0/2: 192.168.4.0/27
PC1: 192.168.4.11
PC2: 192.168.4.12
PC3: 192.168.4.13
PC4: 192.168.4.14
PC5: 192.168.4.15
interface FastEthernet0/1
ip address {IP address} {subnet mask}
no shutdown
exit
60 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
Replace "{IP address}" and "{subnet mask}" with your desired IP address and subnet mask.
The first interface, FastEthernet0/0, will be connected to the switch, while the second interface,
FastEthernet0/1, will be connected to one of the PCs. These commands configure the router's
interfaces with IP addresses and subnet masks.
Next, we will configure the switch. Right-click on the switch and select "CLI". In the CLI, enter
the following commands:
enable
configure terminal
interface FastEthernet0/1
switchport mode access
exit
interface FastEthernet0/2
switchport mode access
exit
These commands configure the switch to operate in access mode on its two ports, which are
connected to the two PCs.
Finally, we will configure the PCs. Right-click on each PC and select "Config". In the
configuration window, enter the IP address, subnet mask, default gateway, and DNS server
information. The IP address and subnet mask should be within the same subnet as the router's
FastEthernet0/1 interface.
To configure the GigabitEthernet interface on the router, you can follow these steps:
1. Right-click on the router and select "CLI".
2. Enter the following commands:
enable
configure terminal
interface GigabitEthernet0/0
ip address {IP address} {subnet mask}
no shutdown
exit
Replace "{IP address}" and "{subnet mask}" with your desired IP address and subnet mask.
These commands configure the GigabitEthernet interface with an IP address and subnet mask,
and enable the interface.
61 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
Student observation:
a) Write down your understanding of subnetting.
b) What is the advantage of implementing subnetting within a Network?
c) Find out whether subnetting is implemented in your college. If yes, draw and list down
the subnets used with ip addresses.
62 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Practical-10
AIM:-a) Internetworking with routers in CISCO PACKET TRACER
simulator.
d) Design and configure a simple internetwork using a router.
In this network, a router and 2 PCs are used. Computers are connected with routers using a
copper straight-through cable. After forming the network, to check network connectivity a
simple PDU is transferred from PC0 to PC1.
Procedure:
Step-1(Configuring Router1):
1. Select the router and Open CLI.
2. Press ENTER to start configuring Router1.
3. Type enable to activate the privileged mode.
Router1 Command Line Interface:
Router>enable
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface FastEthernet0/0
Router(config-if)#ip address 192.168.10.1 255.255.255.0
Router(config-if)#no shutdown
Router(config-if)#
%LINK-5-CHANGED: Interface GigabitEthernet0/0, changed state to up
Router(config-if)#interface FastEthernet0/1
Router(config-if)#ip address 192.168.20.1 255.255.255.0
Router(config-if)#no shutdown
Step-2(Configuring PCs):
63 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
IP address
Device IP Address
FastEthernet0 Subnet Mask Subnet Mask
Name FastEthernet0/1
/0
PC Configuration Table:
Device
IP address Subnet Mask Gateway
Name
64 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Designed Network topology:
Simulation of Designed Network Topology:
65 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Acknowledgment From PC1 to PC0:
66 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Practical 10
AIM:- b) Design and configure an internetwork using wireless router, DHCP server
and internet cloud.
Addressing Table
Default
Device Interface IP Address Subnet Mask
Gateway
PC Ethernet0 DHCP 192.168.0.1
67 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Part 2: Configure the Network Devices
Part 3: Test Connectivity between
Network Devices Part 4: Save the File
and Close Packet Tracer
Using the device selection box, add the network devices to the workspace as
shown in the topology diagram.
To place a device onto the workspace, first choose a device type from the
Device-Type Selection box. Then, click on the desired device model from the
Device-Specific Selection box. Finally, click on a location in the workspace to
put your device in that location. If you want to cancel your selection, click the
Cancel icon for that device. Alternatively, you can click and drag a device from
the Device-Specific Selection box onto the workspace.
Using the device selection box, add the physical cabling between devices on the
workspace as shown in the topology diagram.
The PC will need a copper straight-through cable to connect to the wireless router.
Select the copper straight-through cable in the device selection box and attach it to
the FastEthernet0 interface of the PC and the Ethernet 1 interface of the wireless
router.
68 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
The wireless router will need a copper straight-through cable to connect to the cable
modem. Select the copper straight-through cable in the device-selection box and attach it
to the Internet interface of the wireless router and the Port 1 interface of the cable modem.
The cable modem will need a coaxial cable to connect to the Internet cloud. Select the
coaxial cable in the device-selection box and attach it to the Port 0 interface of the cable
modem and the coaxial interface of the Internet cloud.
The Interne cloud will need copper straight-through cable to connect to the Cisco.com
server. Select the copper straight-through cable in the device-selection box and attach it
to the Ethernet interface of the Internet cloud and the FastEthernet0 interface of the
Cisco.com server.
69 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
In the DHCP Server settings verify that the Enabled button is selected and configure the
static IP address of the DNS server as 208.67.220.220 as shown in the figure.
Click on the Desktop tab at the top of the Laptop configuration window and select the PC
Wireless icon.
Once the Wireless-N Notebook Adapter settings are visible, select the Connect tab. The
wireless network “HomeNetwork” should be visible in the list of wireless networks as shown
in the figure.
Select the network, and click on the Connect tab found below the Site Information pane.
71 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Click on the Command Prompt icon. Verify that the PC has received an IPv4 address by
issuing the ipconfig /all command from the command prompt as shown in the figure. The
PC should receive an IPv4 address in the 192.168.0.x range.
72 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
73 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
b. Configure the Cisco.com server as a DNS server to provide domain name to IPv4 address
resolution.
While still in the Services tab, select DNS from the SERVICES listed in the left pane.
Configure the DNS service using the following settings as shown in the figure.
• Click On to turn the DNS service on
• Name: Cisco.com
• Type: A Record
• Address: 208.67.220.220
74 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
75 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Click on the PC on the Packet Tracer Logical workspace and then the select the Desktop
tab of the PC configuration window.
In the command prompt refresh the IP settings by issuing the commands ipconfig
/release and then ipconfig /renew. The output should show that the PC has an
IP address in the 192.168.0.x range, a subnet mask, a default gateway, and DNS server
address as shown in the figure.
76 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
From the command prompt, issue the command ping Cisco.com. It may take a
few seconds for the ping to return. Four replies should be received as shown in the
figure.
77 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Student observation:
1. Write down the key features of configuring Wireless router and DHCP server.
2. What is the significance of DHCP sever in internetworking.
3. Design and configure an inter-network in your lab using switch, router and
Ethernet cables. Draw and label the design in your notebook. Also, show the ip
address configuration of each and every device.
78 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
Practical 11
In this lab, each network has two routes to reach. We will configure one route as the main route
and another route as the backup route. If the link bandwidth of all routes is the same, we use the
route that has the least number of routers as the main route. If the link bandwidth and the number
of routers are the same, we can use any route as the main route and another route as the backup
route.
If we specify two routes for the same destination, the router automatically selects the best route
for the destination and adds the route to the routing table. If you manually want to select a route
that the router should add to the routing table, you have to set the AD value of the route lower
than other routes. For example, if you use the following commands to create two static routes for
network 30.0.0/8, the route will place the first route to the routing table.
If the first route fails, the router automatically adds the second route to the routing table.
79 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
networks. Network 30.0.0.0/8 and network 50.0.0.0/8 are not available on Router0. We have to
create and add routes only for these networks.
Let's create static routes on each router for networks that are not available on the router.
Router0 requirements
Create two routes for network 30.0.0.0/8 and configure the first route (via -Router1) as the main
route and the second route (via-Router2) as a backup route.
Create two routes for the host 30.0.0.100/8 and configure the first route (via -Router2) as the
main route and the second route (via-Router1) as a backup route.
Create two routes for network 50.0.0.0/8 and configure the first route (via -Router2) as the main
route and the second route (via-Router1) as a backup route.
Verify the router adds only main routes to the routing table.
Router0 configuration
Access the CLI prompt of Router0 and run the following commands.
Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#ip route 30.0.0.0 255.0.0.0 20.0.0.2 10
Router(config)#ip route 30.0.0.0 255.0.0.0 40.0.0.2 20
Router(config)#ip route 30.0.0.100 255.255.255.255 40.0.0.2 10
Router(config)#ip route 30.0.0.100 255.255.255.255 20.0.0.2 20
Router(config)#ip route 50.0.0.0 255.0.0.0 40.0.0.2 10
Router(config)#ip route 50.0.0.0 255.0.0.0 20.0.0.2 20
Router(config)#exit
Router#show ip route static
30.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
S 30.0.0.0/8 [10/0] via 20.0.0.2
S 30.0.0.100/32 [10/0] via 40.0.0.2
S 50.0.0.0/8 [10/0] via 40.0.0.2
Router#
80 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Router1 requirements
Create two routes for network 10.0.0.0/8 and configure the first route (via -Router0) as the main
route and the second route (via-Router1) as a backup route.
Create two routes for network 40.0.0.0/8 and configure the first route (via -Router0) as the main
route and the second route (via-Router2) as a backup route.
Verify the router adds only main routes to the routing table.
Router1 configuration
Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#ip route 10.0.0.0 255.0.0.0 20.0.0.1 10
Router(config)#ip route 10.0.0.0 255.0.0.0 50.0.0.1 20
Router(config)#ip route 40.0.0.0 255.0.0.0 20.0.0.1 10
Router(config)#ip route 40.0.0.0 255.0.0.0 50.0.0.1 20
Router(config)#exit
Router#show ip route static
S 10.0.0.0/8 [10/0] via 20.0.0.1
S 40.0.0.0/8 [10/0] via 20.0.0.1
Router#
81 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Router2 requirements
Create static routes for network 10.0.0.0/8 and network 30.0.0.0/8 and verify the router adds both
routes to the routing table.
Router2 configuration
Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#ip route 10.0.0.0 255.0.0.0 40.0.0.1
Router(config)#ip route 30.0.0.0 255.0.0.0 50.0.0.2
Router(config)#exit
Router#show ip route static
S 10.0.0.0/8 [1/0] via 40.0.0.1
S 30.0.0.0/8 [1/0] via 50.0.0.2
Router#
82 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
By sending ping requests to a PC of network 30.0.0.0/8 and tracing the path they take to reach the
network 30.0.0.0/8. For this, you can use 'tracert' command on a PC of network 10.0.0.0/8.
The 'tracert' command sends ping requests to the destination host and tracks the path they take
to reach the destination.
By listing the routing table entries on Router0. Since a router uses the routing table to forward data
packets, you can check the routing table to figure out the route the router uses to forward data
packets for each destination.
83 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
The following image shows the above testing.
84 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
We also configured a separate static host route for the host 30.0.0.100/8. The router must use this
route to forward data packets to the host 30.0.0.100/8. To verify this, you can do the same testing
for the host 30.0.0.100/8.
85 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
We also configured a backup route for network 30.0.0.0/8. The router must put the backup route
to the routing table and use it to forward data packets to network 30.0.0.0/8 when the main route
fails. To verify this, we have to simulate the failure of the main route.
To simulate the failure of the main route, you can delete the link between Router0 and Router1.
After deleting the link, do the same testing again for the network 30.0.0.0/8.
The following link provides the configured packet tracer lab of the above example.
Packet Tracer Lab with Static Routing Configuration
Deleting a static route
To delete a static route, use the following steps.
Use the 'show ip route static' command to print all static routes.
Note down the route you want to delete.
Use the 'no ip route' command to delete the route.
If you have a backup route, the backup route becomes the main route when you delete the main
route.
In our example, we have a backup route and a main route for the host 30.0.0.100/8. The following
image shows how to delete both routes.
86 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
87 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Practical 11
Initial IP configuration
Device Interface IP Configuration Connected with
PC0 Fast Ethernet 10.0.0.2/8 Router0’s Fa0/1
Router0 Fa0/1 10.0.0.1/8 PC0’s Fast Ethernet
Router0 S0/0/1 192.168.1.254/30 Router2’s S0/0/1
Router0 S0/0/0 192.168.1.249/30 Router1’s S0/0/0
Router1 S0/0/0 192.168.1.250/30 Router0’s S0/0/0
Router1 S0/0/1 192.168.1.246/30 Router2’s S0/0/0
Router2 S0/0/0 192.168.1.245/30 Router1’s S0/0/1
Router2 S0/0/1 192.168.1.253/30 Router0’s S0/0/1
Router2 Fa0/1 20.0.0.1/30 PC1’s Fast Ethernet
PC1 Fast Ethernet 20.0.0.2/30 Router2’s Fa0/1
Double click PCs and click Desktop menu item and click IP Configuration. Assign IP address
referring the above table.
We need to configure IP address and other parameters on interfaces before we could actually use
them for routing. Interface mode is used to assign IP address and other parameters. Interface
mode can be accessed from global configuration mode. Following commands are used to access
the global configuration mode.
Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#
From global configuration mode we can enter in interface mode. From there we can configure the
interface. Following commands will assign IP address on FastEthernet0/0.
Router(config)#interface fastEthernet 0/0
Router(config-if)#ip address 10.0.0.1 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#
88 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB RECORD
Fourth line of output confirms that DCE end of serial cable is attached. If you see DTE here
instead of DCE skip these parameters.
Now we have necessary information let’s assign IP address to serial interface.
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface serial 0/0/0
Router(config-if)#ip address 192.168.1.249 255.255.255.252
Router(config-if)#clock rate 64000
Router(config-if)#bandwidth 64
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface serial 0/0/1
Router(config-if)#ip address 192.168.1.254 255.255.255.252
Router(config-if)#clock rate 64000
Router(config-if)#bandwidth 64
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#
89 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface serial 0/0/1
Router(config-if)#ip address 192.168.1.246 255.255.255.252
Router(config-if)#clock rate 64000
Router(config-if)#bandwidth 64
Router(config-if)#no shutdown
Router(config-if)#exit
Now routers have information about the networks that they have on their own interfaces. Routers
will not exchange this information between them on their own. We need to implement RIP routing
protocol that will insist them to share this information.
Configure RIP routing protocol
Configuration of RIP protocol is much easier than you think. It requires only two steps to
configure the RIP routing.
Enable RIP routing protocol from global configuration mode.
Tell RIP routing protocol which networks you want to advertise.
Let’s configure it in Router0
Router0
Router0(config)#router rip
Router0(config-router)# network 10.0.0.0
Router0(config-router)# network 192.168.1.252
Router0(config-router)# network 192.168.1.248
router rip command tell router to enable the RIP routing protocol.
network command allows us to specify the networks which we want to advertise. We only need
to specify the networks which are directly connected with the router.
That’s all we need to configure the RIP. Follow same steps on remaining routers.
Router1
Router1(config)#router rip
Router1(config-router)# network 192.168.1.244
Router1(config-router)# network 192.168.1.248
Router2
Router2(config)#router rip
90 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Router2(config-router)# network 20.0.0.0
Router2(config-router)# network 192.168.1.252
Router2(config-router)# network 192.168.1.244
That’s it. Our network is ready to take the advantage of RIP routing. To verify the setup we will
use ping command. ping command is used to test the connectivity between two devices.
Access the command prompt of PC1 and use ping command to test the connectivity from PC0.
RIP protocol automatically manage all routes for us. If one route goes down, it automatically
switches to another available. To explain this process more clearly we have added one more route
in our network.
Currently there are two routes between PC0 and PC1.
Route 1
PC0 [Source / destination – 10.0.0.2] <==> Router0 [FastEthernet0/1 – 10.0.0.1] <==> Router0
[Serial0/0/1 – 192.168.1.254] <==> Router2 [Serial 0/0/1 – 192.168.1.253] <==> Router2
[FastEthernet0/0 – 20.0.0.1] <==> PC1 [Destination /source – 20.0.0.2]
Route 2
PC0 [Source / destination – 10.0.0.2] <==> Router0 [FastEthernet0/1 – 10.0.0.1] <==> Router0
[Serial0/0/0 – 192.168.1.249] <==> Router1 [Serial 0/0/0 – 192.168.1.250] <==> Router1
[Serial 0/0/1 – 192.168.1.246] <==> Router2 [Serial 0/0/0 – 192.168.1.245] <==> Router2
[FastEthernet0/0 – 20.0.0.1] <==> PC1 [Destination /source – 20.0.0.2]
By default RIP will use the route that has low hops counts between source and destination. In our
network route1 has low hops counts, so it will be selected. We can use tracert command to verify
it.
Now suppose route1 is down. We can simulate this situation by removing the cable attached
between Router0 [s0/0/1] and Router2 [s0/0/1].
What will happen now? There is no need to worry. RIP will automatically reroute the traffic.
Use tracert command again to see the magic of dynamic routing.
91 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Practical 15
AIM:- To analyze the different types of web logs using Webalizer tool.
Procedure
Step1: Run webalizer windows version
Step2. Input web log file (down load from web)
Step3: Press Run webalizer
Output:
97 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
Monthly statistics
Hosts
98 | P a g e 2024-25
CS19541-COMPUTER NETWORKS-LAB
RECORD
User-agents
99 | P a g e 2024-25