0% found this document useful (0 votes)
7 views81 pages

PR 1 - Merged

The document outlines the study of various LAN topologies, including Bus, Star, Ring, Mesh, Tree, and Hybrid topologies, detailing their features, advantages, and disadvantages. It also covers network devices such as Repeaters, Hubs, Switches, Bridges, Routers, and Gateways, explaining their functions and characteristics. Additionally, the document discusses transmission media, focusing on coaxial cables and their structure and categories.

Uploaded by

ayushsatvase
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views81 pages

PR 1 - Merged

The document outlines the study of various LAN topologies, including Bus, Star, Ring, Mesh, Tree, and Hybrid topologies, detailing their features, advantages, and disadvantages. It also covers network devices such as Repeaters, Hubs, Switches, Bridges, Routers, and Gateways, explaining their functions and characteristics. Additionally, the document discusses transmission media, focusing on coaxial cables and their structure and categories.

Uploaded by

ayushsatvase
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 81

Name : Ayush.J.

Satwase Roll No : 12

PRACTICAL NO. 1

Aim:
Study of various LAN topologies and their creation using network devices, cables and computers.

Theory:
Geometric representation of how the computers are connected to each other is known as
topology. There are five types of topologies – Mesh, Star, Bus, Ring and Hybrid.

Network topology
A network topology is the arrangement of a network, including its nodes and connecting lines.
There are two ways of defining network geometry: the physical topology and the logical (or signal)
topology. The physical topology of a network is the actual geometric layout of work-stations.
There are several common physical topologies, as described below and as shown in the illustration.
Types of Topology
1. Bus Topology
2. Star Topology
3. Ring Topology
4. Mesh Topology
5. Tree Topology
6. Hybrid Topology

A) Bus topology:
In the bus network topology, every workstation is connected to a main cable called the bus.
Name : Ayush.J.Satwase Roll No : 12

Therefore, in effect, each workstation is directly connected to every other workstation in the
network.

Features of Bus Topology


1. It transmits data only in one direction.
2. Every device is connected to a single cable
Advantages of Bus Topology
1. It is cost effective.
2. Cable required is least compared to other network topology.
3. Used in small networks.
4. It is easy to understand.
5. Easy to expand joining two cables together.

Disadvantages of Bus Topology


1. Cables fails then whole network fails.
2. If network traffic is heavy or nodes are more the performance of the network decreases. 3.
Cable has a limited length.
4. It is slower than the ring topology.
B) Star topology:
In the star network topology, there is a central computer or server to which all the workstations are
directly connected. Every workstation is indirectly connected to every other through the central
computer.
Name : Ayush.J.Satwase Roll No : 12

Features of Star Topology


1. Every node has its own dedicated connection to the hub.
2. Hub acts as a repeater for data flow.
3. Can be used with twisted pair, Optical Fibre or coaxial cable.

Advantages of Star Topology


1. Fast performance with few nodes and low network traffic.
2. Hub can be upgraded easily.
3. Easy to troubleshoot.
4. Easy to setup and modify.
5. Only that node is affected which has failed, rest of the nodes can work smoothly.

Disadvantages of Star Topology


1. Cost of installation is high.
2. Expensive to use.
3. If the hub fails then the whole network is stopped because all the nodes depend on the hub. 4.
Performance is based on the hub that is it depends on its capacity
C) Ring topology:
In the ring network topology, the workstations are connected in a closed loop configuration.
Adjacent pairs of workstations are directly connected. Other pairs of workstations are indirectly
connected, the data passing through one or more intermediate nodes.
Name : Ayush.J.Satwase Roll No : 12

Features of Ring Topology


1. A number of repeaters are used for Ring topology with large number of nodes, because if
someone wants to send some data to the last node in the ring topology with 100 nodes, then the
data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data loss
repeaters are used in the network.
2. The transmission is unidirectional, but it can be made bidirectional by having 2 connections
between each Network Node, it is called Dual Ring Topology.

Advantages of Ring Topology


1. Transmitting network is not affected by high traffic or by adding more nodes, as only the
nodes having tokens can transmit data.
2. Cheap to install and expand

Disadvantages of Ring Topology


1. Troubleshooting is difficult in ring topology.
2. Adding or deleting the computers disturbs the network activity.
D) Mesh topology:
The mesh network topology employs either of two schemes, called full mesh and partial mesh. In
the full mesh topology, each workstation is connected directly to each of the others. In the partial
mesh topology, some workstations are connected to all the others, and some are connected only to
those other nodes with which they exchange the most data.
Name : Ayush.J.Satwase Roll No : 12

Features of Mesh Topology


1. Fully connected.
2. Robust.
3. Not flexible.
Advantages of Mesh Topology
1. Each connection can carry its own data load.
2. It is robust.
3. Fault is diagnosed easily.
4. Provides security and privacy.
Disadvantages of Mesh Topology
1. Installation and configuration is difficult.
2. Cabling cost is more.
3. Bulk wiring is required.
E) Tree topology:
The tree network topology uses two or more star networks connected together. The central
computers of the star networks are connected to a main bus. Thus, a tree network is a bus
network of star networks.
Name : Ayush.J.Satwase Roll No : 12

Features of Tree Topology


1. Ideal if workstations are located in groups.
2. Used in Wide Area Network.
Advantages of Tree Topology
1. Extension of bus and star topologies.
2. Expansion of nodes is possible and easy.
3. Easily managed and maintained.
4. Error detection is easily done.
Disadvantages of Tree Topology
1. Heavily cabled.
2. Costly.
3. If more nodes are added maintenance is difficult.
4. Central hub fails, network fails.
F) Hybrid Topology:
A combination of two or more topology is known as hybrid topology. For example a
combination of star and mesh topology is known as hybrid topology.
Name : Ayush.J.Satwase Roll No : 12

Advantages of Hybrid topology


1. We can choose the topology based on the requirement for example, scalability is our concern
then we can use star topology instead of bus technology.
2. Scalable as we can further connect other computer networks with the existing networks with
different topologies.

Disadvantages of Hybrid topology


1. Fault detection is difficult.
2. Installation is difficult.
3. Design is complex so maintenance is high thus expensive.

Conclusion:
In this experiment, I have study different LAN topologies and their creation using network
devices, cables and computers.
Name : Ayush.J.Satwase Roll No : 12

PRACTICAL NO. 2

Aim:
Study of following network devices in details
a) Repeater b) Hubs c) Switches d) Bridge e) Router f) Gateway

Theory:

Network Device
Network devices are components used to connect computers or other electronic devices together so that
they can share files or resources like printers or fax machines, etc. Devices used to setup a local area network
(LAN) are the most common types of network devices used by the public. A LAN requires a Hub, Switch,
router. Network Devices are called Communicating Devices.

Identify the purpose, features, and functions of the following network Components:
a. Repeater
b. Hubs
c. Switches
d. Bridges
e. Routers
f. Gateways

a. Repeater
A repeater operates at the physical layer. Its job is to regenerate the signal over the same network before
the signal becomes too weak or corrupted so as to extend the length to which the signal can be transmitted
over the same network. An important point to be noted about repeaters is that they do not amplify the signal.
When the signal becomes weak, they copy the signal bit by bit and regenerate it at the original strength. It
is a 2-port device.
b. Hubs
A hub is basically a multiport repeater. A hub connects multiple wires coming from different branches, for
example, the connector in star topology which connects different stations. Hubs cannot filter data, so data
packets are sent to all connected devices. Also, they do not have the intelligence to find out best path for
data packets which leads to inefficiencies and wastage.
Name : Ayush.J.Satwase Roll No : 12

Types of Hubs
Active Hub: - These are the hubs which have their own power supply and can clean, boost, and relay the
signal along with the network. It serves both as a repeater as well as wiring centre. These are used to extend
the maximum distance between nodes.
Passive Hub: - These are the hubs which collect wiring from nodes and power supply from active hub.
These hubs relay signals onto the network without cleaning and boosting them and can’t be used to extend
the distance between nodes.
Intelligent Hub: - It work like active hubs and include remote management capabilities. They also provide
flexible data rates to network devices. It also enables an administrator to monitor the traffic passing through
the hub and to configure each port in the hub.
Advantages of Hub:
1) Hub is less expensive product.
2) Hubs can extend a network total distance.
3) Hubs do not seriously affect network performance.
Disadvantages of Hub:
1) It will broadcast to all the ports
2) It runs half duplex
3) If 10 Ports in a hub it will share bandwidth of 100 Mb Ps. So each port share 10 Mbps c.
Switches
A switch is a multiport bridge with a buffer and a design that can boost its efficiency (a large number of
ports imply less traffic) and performance. A switch is a data link layer device. The switch can perform error
checking before forwarding data, that makes it very efficient as it does
not forward packets that have errors and forward good packets selectively to correct port only. In other
words, switch divides collision domain of hosts, but broadcast domain remains same.
Name : Ayush.J.Satwase Roll No : 12

Advantages of Switches:
1) Reduces the number of Broadcast Domains.
2) Intellegent device [compared to Hub's] which can make use of CAM table for Port to MAC mapping
3) Compared to Bridge, Switches are more H/w oriented therefore operations are less CPU intense [Basic
operations].
4) The cost to number of ports ratio is best for a cheaper cost you get switches with more number of ports
available than Routers.

Disadvantages of Switches:
1) Not as good as a router in limiting Broadcasts
2) Communication b/w VLAN's need inter VLAN routing [Router],but these days there are a number of
Multilayer switches available in the market.
3) Handling Multicast packets needs quite a bit of configuration & proper designing. d.
Bridges
A bridge operates at data link layer. A bridge is a repeater, with add on the functionality of filtering content
by reading the MAC addresses of source and destination. It is also used for interconnecting two LANs
working on the same protocol. It has a single input and single output port, thus making it a 2-port device.
How Network Bridges Work
Bridge devices inspect incoming network traffic and determine whether to forward or discard it according
to its intended destination. An Ethernet bridge, for example, inspects each incoming
Ethernet frame - including the source and destination MAC addresses, and sometimes the frame size - in
making individual forwarding decisions. Bridge devices operate at the data link layer (Layer 2) of the OSI
model.
Name : Ayush.J.Satwase Roll No : 12

Advantages of Bridges
1. Network Extend
Sometimes bridges act as repeaters to extend a network. Networks with different architectures can be
connected together using bridges.
2. Increased Bandwidth
Few of the nodes present on a network share a separate collision domain. For these individual nodes,
bridges increase bandwidth.
3. High Reliability
Overall, the network reliability is basically high in a bridge which makes it easier to maintain the
network. And also, network congestion can be reduced by dividing LAN into small segments.
4. Frame Buffering
Different segments use different MAC protocols. As a result, it creates frame buffers. Therefore, bridges
work to interconnect different segments.

Disadvantages of Bridges
1. Cost
On average a bridge costs more than the hub and repeaters. That is the reason why it is only preferred when
there is LAN network traffic load. In other situations of variable data load, it is advisable to use either a
hub or a repeater.
2. Speed
A bridge does more buffering of frames and introduce more relays. This makes them slower compare to a
repeater.
3. Network Performance
Since bridges make extra processing by viewing all of the MAC addresses, they can potentially
downgrade network performance.

d. Routers
Name : Ayush.J.Satwase Roll No : 12

A router is a device like a switch that routes data packets based on their IP addresses. Router is mainly a
Network Layer device. Routers normally connect LANs and WANs together and have a dynamically
updating routing table based on which they make decisions on routing the data packets. Router divide
broadcast domains of hosts connected through it.
How does a router work?
A router may create or maintain a table of the available routes and their conditions and use this information
along with distance and cost algorithms to determine the best route for a given packet. Typically, a packet
may travel through a number of network points with routers before arriving at its destination. Routing is a
function associated with the network layer (Layer 3) in the standard model of network programming, the
Open Systems Interconnection (OSI) model.

Advantage of Routers -
1) Router limits the collision domain.
2) Router can function on LAN & WAN.
3) Router can connect different media & architectures.
4) Router can determine best path/route for data to reach the destination.
5) Router can filter the broadcasts.

Disadvantage of Routers -
1) Router is more expensive than Hub, Bridge & Switch.
2) Router only works with routable protocol.
3) Routing updates consume bandwidth.
4) Increase latency due to greater degree of packet filtering.
Name : Ayush.J.Satwase Roll No : 12

e. Gateways
A gateway, as the name suggests, is a passage to connect two networks together that may work upon
different networking models. They basically work as the messenger agents that take data from one system,
interpret it, and transfer it to another system. Gateways are also called protocol converters and can operate
at any network layer. Gateways are generally more complex than switch or router.

Following are the advantages of using a Gateway:

• It can connect the devices of two different networks having dissimilar structures. • It is an
intelligent device with filtering capabilities.
• It has control over both collisions as well as a broadcast domain.

• It uses a full-duplex mode of communication.

• It has the fastest data transmission speed amongst all network connecting devices. • It can
encapsulate and decapsulate the data packets.
• It has improved security than any other network connecting device.

Following are the disadvantages of using a Gateway:

• It is complex to design and implement.

• The implementation cost is very high.

• It requires a special system administration configuration.

Conclusion:
In this experiment, I have study different network devices Repeater, Hub, Switch, Bridge,
Router, Gateway with advantages and disadvantages in details.
Name : Ayush.J.Satwase Roll No : 12

EXPERIMENT NO. 3

Aim:
Familiarization with Transmission media and Tools: Co-axial, Twisted Pair and Fiber Optic
cable, Crimping Tool, Connectors etc.

Theory:
1) Transmission Mediums
Data is represented by computers and other telecommunication devices using signals. Signals are
transmitted in the form of electromagnetic energy from one device to another. Electromagnetic
signals travel through vacuum, air or other transmission mediums to travel between one point to
another (from source to receiver).
Electromagnetic energy (includes electrical and magnetic fields) includes power, voice, visible
light, radio waves, ultraviolet light, gamma rays etc.
Transmission medium is the means through which we send our data from one place to another. The
first layer (physical layer) of Communication Networks OSI Seven layer model is dedicated to the
transmission media, we will study the OSI Model later.

A) Bounded/Guided Transmission Media


Name : Ayush.J.Satwase Roll No : 12

It is the transmission media in which signals are confined to a specific path using wire or cable.
The types of Bounded/ Guided are discussed below.

a) Coaxial Cable

Coaxial cables, commonly called coax, are copper cables with metal shielding designed to
provide immunity against noise and greater bandwidth. Coax can transmit signals over larger
distances at a higher speed as compared to twisted pair cables.

Structure of Coaxial Cables


Coax has a central core of stiff copper conductor for transmitting signals. This is covered by
an insulating material. The insulator is encased by a closely woven braided metal outer
conductor that acts as a shield against noise. The outer conductor is again enclosed by a plastic
insulating cover. The structure is shown in the following figure –

Categories of Coaxial Cables


Coaxial cables are categorized into three types as per radio
government (RG) ratings −

RG – 59: Has impedance of 75W and used in cable TV


RG – 58: Has impedance of 50W and used in thin Ethernet
RG – 11: Has impedance of 50W and used in thick Ethernet

Advantages of Coaxial Cable: -


• Bandwidth is high

• Used in long distance telephone lines.

• Transmits digital signals at a very high rate of 10Mbps.

• Much higher noise immunity


Name : Ayush.J.Satwase Roll No : 12

• Data transmission without distortion.

• They can span to longer distance at higher speeds as they have better shielding when
compared to twisted pair cable
Disadvantages:
• Single cable failure can fail the entire network.

• Difficult to install and expensive when compared with twisted pair.

• If the shield is imperfect, it can lead to grounded loop.

Applications of Coaxial Cables


• In analog telephone networks: A single coaxial network can carry about 10,000 voice
signals.
• In digital telephone networks: A coax has a data rate of 600 Mbps.

• In cable TV networks

• In traditional Ethernet LANs

• In MANs

b) Twisted Pair Cable


One of the earliest guided transmission media is twisted pair cables. A twisted pair cable
comprises of two separate insulated copper wires, which are twisted together and run in parallel.
The copper wires are typically 1mm in diameter. One of the wires is used to transmit data and
the other is the ground reference.
Name : Ayush.J.Satwase Roll No : 12

Reason for Twisting


All transmissions are prone to noise, interferences, and crosstalk’s. When the wires are twisted,
some part of the noise signals is in the direction of data signals while the other parts are in the
opposite directions. Thus, the external waves cancel out due to the different twists. The receiver
calculates the difference in the voltages of the two wires for retrieving data. Thus, a much better
immunity against noise is obtained.
Types of Twisted–Pair Cables
There are two types of twisted pair cables −
Unshielded Twisted Pair (UTP): These generally comprise of wires and insulators.
Shielded Twisted Pair (STP): They have a braided wired mesh that encases each pair of
insulated wires.

Advantages of Twisted pair cable


1. It can be used to carry both analog and digital data.

2. It is relatively easy to implement and terminate.

3. It is the least expensive media of transmission for short distances.

4. If portion of a twisted pair cable is damaged it does not affect the entire network.

Disadvantages of Twisted pair cable


1. It offers poor noise immunity as a result signal distortion is more?
Name : Ayush.J.Satwase Roll No : 12

2. Attenuation is very high.

3. It supports lower bandwidth as compared to other Medias. It supports 10 mbps up to a distance


of 100 meters on a 10BASE-T.

4. It offers very poor security and is relatively easy to tap.

Applications of Twisted Pair Cables:


Some of the applications of twisted pair cables are as follows:

(1) In telephone lines to carry voice and data channels.

(2) In the local loop.

(3) In the DSL line (ADSL)

(4) Local area networks such as 10 Base-T and 100 Base-T. Use the twisted pair

cables. (5) In the ISDN (Integrated Services Digital Network).

c) Fiber Optic Cable


A fiber optic cable is made of glass or plastic and transmits signals in the structure of light signals.
The structure of an optical fiber cable is displayed in the figure. It involves an inner glass core
surrounded by a glass cladding that reflects the light into the core. Each fiber is encircled by a
plastic jacket.

In fibre optics, semiconductor lasers transmit data in the form of light along with hair-thin glass
(optical) fibres at the speed of light (186,000 miles second) with no significant loss of intensity
over very long distances. The system includes fibre optic cables that are made of tiny threads of
glass or plastic.
Name : Ayush.J.Satwase Roll No : 12

Advantages of Optical Fibers


The advantage of optical fiber is as follows −

• Small Size and lightweight − The size (diameter) of the optical fibers is minimal
(comparable to the diameter of a human hair).
• Easily available and low cost − The material used for producing the optical fibers is
silica glass. This material is readily applicable. Therefore, the optical fibers cost lower than the
cables with metallic conductors.

• No electrical or electromagnetic interface − Since the transmission occurs in


light rays, the signal is not affected by electrical or electromagnetic interference.

• Large Bandwidth − As the light arrays have a very high frequency in the GHz range, the
optical fiber bandwidth is vast. This allows the transmission of more numbers of channels.
Therefore, the information-carrying capacity of an optical fiber is much higher than that of a
Co-axial cable.

Disadvantages of Optical Fibers


The disadvantage of optical fiber are as follows −

• High Cost − The cable and the interfaces are associatively more expensive than those of
other guided media.

• Unidirectional light propagation − Since the optical transmission is inherently


unidirectional two-way communication requires either two fibers or two frequency bands on
one fibre.
Name : Ayush.J.Satwase Roll No : 12

• Installation and Maintenance − Fiber is different technology requiring skills; most


engineers do not occupy.

B) Unbounded / Unguided Transmission Media


It is also referred to as Wireless or Unbounded transmission media. No physical medium is
required for the transmission of electromagnetic signals.

Features:

• The signal is broadcasted through air

• Less Secure

• Used for larger distances


There are 3 types of Signals transmitted through unguided media:

(i) Radio waves –


These are easy to generate and can penetrate through buildings. The sending and receiving
antennas need not be aligned. Frequency Range:3KHz – 1GHz. AM and FM radios and cordless
phones use Radio waves for transmission.

Further Categorized as (i) Terrestrial and (ii) Satellite.

(ii) Microwaves –
It is a line-of-sight transmission i.e., the sending and receiving antennas need to be properly aligned
with each other. The distance covered by the signal is directly proportional to the height of the
antenna. Frequency Range:1GHz – 300GHz. These are majorly used for mobile phone
communication and television distribution.

(iii) Infrared –
Infrared waves are used for very short distance communication. They cannot penetrate through
obstacles. This prevents interference between systems. Frequency Range:300GHz – 400THz. It is
used in TV remotes, wireless mouse, keyboard, printer, etc.
Name : Ayush.J.Satwase Roll No : 12

2) Crimping tool
A crimping tool is a device used to conjoin two pieces of metal by deforming one or both of them
in a way that causes them to hold each other. The result of the tool's work is called a crimp. A good
example of crimping is the process of affixing a connector to the end of a cable. For instance,
network cables and phone cables are created using a crimping tool (shown below) to join the RJ
45 and RJ-11 connectors to the both ends of either phone or CAT5 cable.
Crimp tool: - This tool is used to attach the connectors to the cable. Typically, this tool also
includes a wire-cutter and wire-stripper. So, if you buy a crimp tool, you don't have to buy a wire
cutter and wire-striper separately.
The following image shows a crimping device equipped with a wire-stripper and wire-cutter.

3) Connector
A device that terminates a segment of cabling or provides a point of entry for networking devices
such as computers, hubs, and routers. Connectors can be distinguished according to their physical
appearance and mating properties, such as jacks and plugs (male connectors) or sockets and ports
(female connectors).
Connectors: RJ-11, RJ-45
Name : Ayush.J.Satwase Roll No : 12

Conclusion:
In this experiment, I have study different transmission media with advantages and disadvantages
also Crimping tool and Connector in details.
Name : Ayush.J.Satwase Roll No : 12

PRACTICAL NO. 4

Aim:
Study of Cisco Packet Tracer (CPT) 8.0 - Networking Simulation Tool.
Theory:
Overview of Packet Tracer
Cisco Packet Tracer is an innovative network simulation and visualization tool. This free software
helps you to practice your network configuration and troubleshooting skills via your desktop
computer or an Android or iOS based mobile device. Packet Tracer is available for both the Linux
and Windows desktop environments.

With Packet Tracer you can choose to build a network from scratch, use a pre-built sample
network, or complete classroom lab assignments. Packet Tracer allows you to easily explore how
data traverses your network. Packet Tracer provides an easy way to design and build networks of
varying sizes without expensive lab equipment.

Website Cisco Packet Tracer: https://www.netacad.com/courses/packet-tracer.


Download and Install Packet Tracer
To obtain and install your copy of Cisco Packet Tracer (CPT) follow these simple steps: First
go to website netacad.com then,

• Log into your Cisco Networking Academy “I’m Learning” page.


• Select Resources from the menu in the upper right portion of your screen.
• Select Download Packet Tracer.
• Select the version of Packet Tracer you require.
• Save the file to your computer.
• Launch the Packet Tracer install program.
• After installation, close and restart your web browser.
• Launch Cisco Packet Tracer by selecting the appropriate icon.
• When prompted, use your Neta cad login information to authenticate.
• Packet Tracer will launch and you are ready to explore its features.
Name : Ayush.J.Satwase Roll No : 12

Menu bar – This is a common menu found in all software applications; it is used to open, save, print,
change preferences, and so on.

Main toolbar – This bar provides shortcut icons to menu options that are commonly accessed,
such as open, save, zoom, undo, and redo, and on the right-hand side is an icon for entering network
information for the current network.

Logical/Physical workspace tabs – These tabs allow you to toggle between the Logical and Physical
work areas.
Workspace – This is the area where topologies are created and simulations are displayed.

Interface:
If you open the Cisco Packet Tracer you will see a blank workspace. On the bottom left corner, you
can see a lot of devices and cables. Different series of routers and switches are available to work with.
If you click on any module, you can see exactly how many types of devices are available. Just drag
Name : Ayush.J.Satwase Roll No : 12

and drop a device to workspace if you want to configure it. Different types of cables are also available
to connect those devices. With the help of cables and devices, you can create a topology and configure
it.

The top row of icons represents the category list consisting of: [Networking Devices], [End
Devices], [Components], [Connections], [Miscellaneous], and [Multiuser]. Each category contains
at least one sub-category group.

1) How to create Network Devices

Workspace
Name : Ayush.J.Satwase Roll No : 12

a) Routers

Routers

Router Models:
Main function of a router is Internetwork Communication means connecting two or more different
networks. There are a lot of routers available in CPT such as,

4331,4321,1941,2901,2911,819IOX,819HGW,829,1240, Generic Router-PT, Generic Router, 1841,


2620XM, 2621XM, 2811.
Name : Ayush.J.Satwase Roll No : 12

b) Switches

Switches

Switch Models:

2960, Generic Switch-PT, Generic Switch Empty, 3560-24PS, 3650-24PS, IE 2000, Generic Bridge-
PT, 2950-24, 2950T.
Name : Ayush.J.Satwase Roll No : 12

c) Hubs

Hubs

Hub Models:

Generic Hub-PT, Generic Repeater-PT, Coaxial Splitter-PT.


Name : Ayush.J.Satwase Roll No : 12

d) Wireless Devices

Wireless
Devices

Wireless Device Models:

Meraki, LAP-PT,3702i, WLC,3504,2504, Home Router, Generic Access Point-PT, Generic Access
Point-PT-A, Generic Access Point-PT-N and so on.
Name : Ayush.J.Satwase Roll No : 12

2) How to create End Devices:


a) End Devices

End Devices

End Device Models:

• Generic PC-PT, Generic Laptop-PT, Generic Server-PT, Generic Printer-PT, IP Phone7960 and
so on.
Name : Ayush.J.Satwase Roll No : 12

b) Multiuser Connection

Multiuser
Connections

• Multiuser Remote Network


Name : Ayush.J.Satwase Roll No : 12
Components:

Components

• MCU Board, SBC-PT SBC0, Thing.


• Components are physical objects that connect to microcontroller (MCU-PT) or single
boarded computers (SBC-PT). They typically do not have a network interface and rely on
the MCU-PT or SBC-PT for network access. These are simple devices that only
communicate through their analog or digital slots.
Name : Ayush.J.Satwase Roll No : 12
Connections Media
We got the devices to work with, now we need a media to connect those devices. Media can be
wired or wireless. In Cisco Packet Tracer, we have a lot of cables under the name “Connections”.
We have Copper Media, Coaxial media, Fiber media, Phone Media and some more. We can use
them in our topology to connect devices. For wireless connection, Packet Tracer has some wireless
devices as well like access points, cell towers, wireless desktops, laptops etc.

Copper Straight-
Connections
Through
Serial DCE
Automatically Copper Cross-Over
Serial DTE
Console
Fibre
Models

Connection Models:
• Automatically Choose Connection Type, Console. Fiber, Phone, Coaxial, Serial DCE,
Serial DTE.
• Copper Straight-Through: Straight-through cables are mainly used for connecting
nonsimilar devices.
Name : Ayush.J.Satwase Roll No : 12
• Copper Cross-Over: It is widely used to connect two devices of the same type: e.g., two
computers or two switches to each other.

Common Tools

Add
Place Add
Inspect Delete Complex
Note Simple
tool tool PDU
tool PDU

Select
tool

The Common Tools Bar contains tools you will use regularly to interact with the work
space:

• The Select tool is used to drag, highlight and select devices


• Inspect tool for viewing device tables.
• The Delete tool is used to delete devices and links
• The Place Note tool is used to add notes or labels in the workspace
• Add Simple PDU (Protocol Data Unit) tool to create quick pings.
• Add Complex PDU tool to customize packet type.
Name : Ayush.J.Satwase Roll No : 12

Editing and Zoom viewing tools (Main Toolbar)

Copy Undo ZoomOut Show Workspace


ZoomIn
list
Paste
Redo
ZoomReset
You can change the
background with this button

• ZoomIn (Ctrl+I) to zoom into the workspace.


• ZoomOut (Ctrl+U) to zoom out of the workspace.
• ZoomReset (Ctrl+T) to reset the zoom of the workspace.
• Copy (Ctrl+C) to copy the selected item.
• Paste (Ctrl+V) to paste the selected item.
• Undo (Ctrl+Z) to undo the previous action.
• Show Workspace list.
• Show Viewport.
• View Command log.
• Custom Devices Dialog and Cluster Association Dialog.
Name : Ayush.J.Satwase Roll No : 12
Conclusion: In this practical, I have studied packet tracer 8.0 simulation tools with networking
devices, End Devices, Multiuser connections, Component, Common tools, Connection’s media,
zooming tools, editing tools in details.
Name : Ayush.J.Satwase Roll No : 12

PRACTICAL NO. 5

Aim:
How to Connect and Configure networking Devices in Cisco Packet Tracer Simulation Tool.
a) Configuring Router hostname, Fast Ethernet Interface.
b) Configure the PC Gateway and PC IP Address.
Software: Cisco packet tracer.

Theory:
1) Create and Connecting network devices

The large white space that opens by default is the workspace where you will create your topology.
You can use the entire white space and can even scroll down and to the right to utilize a larger area.
Since our topology is very small, we will use only the left portion of the screen. This will help us
with workspace later when we are running a simulation.
Name : Ayush.J.Satwase Roll No : 12

a) Create 3-Devices Router, Switch and End Device (PC):


In this demonstration, we can use any of the routers listed. In other topologies, use specific
router types, as you may need specific modules added to the devices.

Router Switch End Device (PC)

• Do the same thing on the Switch and End Device icon. So, you can see 3 devices on the
workspace (Router, Switch, and End Device).

b) Connecting Devices:
• Click on the Connection icon for the choosing connection models, you can choose
smart connection (automatically). But this we choose the copper straight.
• Choose the Copper Straight icon to connecting the Router and Switch Device. And after
you click on the Copper icon, then click on the Router Device.
Name : Ayush.J.Satwase Roll No : 12

3. Click on the
Router device.

1. Choose the
2. Choose the Copper
Connection icon. Straight icon.

• Next, select FastEthernet0/0 on the Router.

1. Choose
FastEthernet 0/0
Name : Ayush.J.Satwase Roll No : 12
• Click on the Switch device and select FastEthernet0/1. And then You can see the Router
and Switch Connected with the Copper Straight but the link between the Router and
Switch is down.

2. Click on the Switch


device and select
FastEthernet0/1

• Click on the Copper Straight icon again.


• Click on the Switch device and select FastEthernet0/2.
Name : Ayush.J.Satwase Roll No : 12

3. Click on the Switch


device and select
FastEthernet0/ 2
4. Click on the Copper
Straight icon again

• And finally, click on the End Device (PC) and select the Fast Ethernet0.

5. Click on the End device (PC)


and choose FastEthernet

• And you get like this one:


Name : Ayush.J.Satwase Roll No : 12

Remember default state of a


router interface is shutdown
6. Red indicates that
the link is down

c) Port Status

• Point out that the link between the switch and the router is down. This is because the Fast
Ethernet interface on the router is “shutdown”.
• The link between the PC and the switch is up, because the interfaces on these devices start up
in an operational state.
• These link lights are a quick visual way to determine if your links are operational.
Name : Ayush.J.Satwase Roll No : 12

7. Mouse over the connection to see


which ports packet tracer selected

d) Viewing Port Labels


• You may need to mouse over the connection to determine which ports on the devices were used
for the connection.
Name : Ayush.J.Satwase Roll No : 12
Name : Ayush.J.Satwase Roll No : 12

2) Configuring Device:

GUI Interface:
In this example, we learned to make some basic configuration changes through a GUI interface,
while also showing them the equivalent IOS commands.

a) Configuring Router Hostname:

2. Type hostname in both


places; one for display
2. Device name is
name and one for hostname
updated in
topology

1. Configure a device click on it


4. Equivalent IOS and then click the config tab
Command are
shown here

• To begin configuring a router or a switch, click on it and then click on the Config tab.
• In Global Settings, type in the Router Name in both the Display Name field (updates the
topology) and the Hostname field (updates the configuration).
• In the “Equivalent IOS Commands” window, you will see the commands for every action
you take under the Config tab.
Name : Ayush.J.Satwase Roll No : 12
• Change the name of Router0 to “My Router”.
b)
Configure Router Fast Ethernet Interface:

3. Activate the interface.


1. Click on an interface FastEthernet
0/0 to configure it.

2. IOS Commands are


updated and the link
light is now green.

4. Enter the IP address


and Subnet Mask.

• To configure an interface under the Config tab, choose the interface, configure its addressing,
and then set the “Port Status” to “On”. The actual commands are shown in the “Equivalent IOS
Commands” window.
• Configure the FastEthernet0/0 interface o IP Address: 192.168.1.1
o Subnet Mask: 255.255.255.0 (The subnet mask will automatically be populated.) o
Turn Port Status to on to activate the interface.
o IOS commands are updated and the link light is now green.
c)
Configure the PC Gateway:

2. Under Global settings, you


can change the PC name
and enter the gateway IP
Address.

1. Click on a PC and then click on


the config tab to configure it.

• After clicking the PC icon in the topology, navigate to the Config tab to enter settings for the
Gateway and Display Name.
• No two devices can share the same name in Packet Tracer, therefore, if you have a router named
“My Router”, no other device can have this name.
d)

Configure the PC IP Address:

1. Click on
FasrEthernet
under INTERFACE
to configure the
IP Address and
Subnet Mask.

• Select the Fast Ethernet link to configure the IP address and Subnet Mask.
• The default subnet mask will be filled in automatically when you tab from the IP address field.
• Note that Bandwidth and Duplex can be set to “Auto”. Add Notes:

Click on Note tool button to add notes to the topology.

• Notes are helpful reminders of configuration settings.


• Notes can be added, moved and deleted from the topology just like devices.
Output :

Conclusion: In this practical, I have studied how to connect the Network Devices and
Configuring initial settings of a device in Cisco Packet Tracer Simulation Tool.
Name : Ayush.J.Satwase Roll No : 12

PRACTICAL NO. 6

Aim:
Verify Connectivity of a small network in Cisco Packet Tracer Simulation Tool.
a) Verifying connectivity using Realtime Mode.
b) Verifying connectivity using Simulation Mode.
Apparatus (Software): Cisco packet tracer 8.0.
Theory:
A) Create 3-Devices Router, Switch and End Device (PC):
In this demonstration, we can use any of the routers listed. In other topologies, use specific router
types, as you may need specific modules added to the devices.

Router Switch End Device (PC)


Name : Ayush.J.Satwase Roll No : 12

• Do the same thing on the Switch and End Device icon. So, you can see 3 devices on the
workspace (Router, Switch, and End Device).
a) Connecting Devices:
• Click on the Connection icon for the choosing connection models, you can choose connection
models. And you get like this one:

Remember default state of a


router interface is shutdown
1. Red indicates that
the link is down

Configuring Router Hostname, PC Gateway, PC IP Address and Add notes:


Name : Ayush.J.Satwase Roll No : 12

B) Verifying Connectivity:
There are several ways to verify connectivity in Packet Tracer.
• In Realtime mode, open a command prompt from the PC desktop and issue a ping just as
you would in the classroom with real equipment.
• In Simulation Mode, create a simulation that allows you to open up the packet at different
points along the path to view how the device is processing the packet.

a) Verifying in Realtime Mode:


• Click the PC icon in the workspace to open the PC options window.
• Select the Desktop tab.
• Click the Command Prompt icon to open a command prompt window from the PC.
Name : Ayush.J.Satwase Roll No : 12

1. Click the PC icon, Select the


Desktop tab.

2. Click the Command Prompt icon


to open a command prompt

Ping the Gateway:


Name : Ayush.J.Satwase Roll No : 12

Issue a ping to the Gateway.

• Remember that this is Realtime mode, so packets are processed in real time just as they are
using real equipment.

b) Verifying in Simulation Mode:


Name : Ayush.J.Satwase Roll No : 12

Switch to Simulation Mode.

• Most of the work so far has been completed in the Realtime Mode. In Realtime Mode, your
network is always running (like a real network) whether you are working on the network or
not. Your configurations are created and modified in real time, and the network responds in
real time.
• Simulation Mode is used to observe network traffic in a detailed and controlled pace to
observe the paths that packets take and inspect packets in detail.
• Simulation Mode allows us to create and examine packets.

Create a PDU
Name : Ayush.J.Satwase Roll No : 12

1. Click the Add


Simple PDU icon.

3. Select the 2. Select the Source


Destination Device. Device.

• The Add Simple PDU button is essentially a quick, graphical way to send pings.
• You can send pings between devices that have at least one interface with an IP address.
• To send a ping, press the Add Simple PDU button (the cursor changes to a “packet” icon),
click on the source device, and then click on the destination device. Note that pings will only
work if the devices have configured ports.
• After you make the request, the source device will queue an ICMP or ARP packet (or both),
which will be on standby until you press the Auto Capture/Play or Capture/Forward button.
When you press one of these buttons, the packets will start moving and you can observe the
ping process.
Name : Ayush.J.Satwase Roll No : 12

1. Event list window records.

4. As the simulation runs, events will be added to the list. These


events show the packets state at each step along the path.

6. Successful ping
will show a green
check mark.
5. PDU list show
PDU information. 2. Event list can be filtered to
show specific kinds of traffic.

3. Click the auto Capture/Play


button to begin the simulation.

Event List
• The Event List window records (or “captures”) what happens as your PDU propagates the
network.
• If you filter out some type of PDUs on the Event List Filters, they will not show up on the
Event List. They are still in the network; you just do not see them.
• The simulation runs more quickly because you will not see the filtered events, but all filtered
PDUs still affect the network.
Playing the Simulation
• Auto Capture/Play will play the simulation from beginning to end.
• Capture/Forward will move the packet forward one hop at a time with each click of the
Capture/Forward button.
Name : Ayush.J.Satwase Roll No : 12

Output :

Results
• Packet Tracer simulations do not run on a linear time scale. Time is determined by the events
that occur. An event can be defined as any instance of a PDU that is generated in
Name : Ayush.J.Satwase Roll No : 12

the network. The Event List keeps track of all such PDU instances and lists their
information in various fields:

Conclusion: In this practical, I have studied how to Verify Connectivity of a small network in
Cisco Packet Tracer Simulation Tool.
Name : Ayush.J.Satwase Roll No : 12

EXPERIMENT NO. 7

Aim:
Create a Star Topology in Cisco Packet Tracer Simulation Tool.
Apparatus (Software): Cisco packet tracer 8.0.
Theory: Create this Star topology: There are 5 PCs and 1-Hub.

Step 1: Start packet Tracer.


You will see the start screen as shown below.
Name : Ayush.J.Satwase Roll No : 12

• We will begin building our network topology by selecting devices and media in which to
connect them. Several types of devices and network connections can be used.
• In which we will keep it simple by using End devices, Switches, Hubs and Connections.

Step 2: Choose “Hub” and then select “Generic”.

• After selecting “Generic” click on the main area (Workspace).

Step 3: Select “End Devices” and then select “PC-PT(Generic)”.


• After selecting “Generic” click on the main area (Workspace).
• Repeat above process to place as many PCs as you want to create star topology.
Name : Ayush.J.Satwase Roll No : 12

Step 4: Select “Connections” and then select “Automatically choose connection types •
Draw connections from Hub to all PCs.
Name : Ayush.J.Satwase Roll No : 12

Step 5: Double click on a PC, a box will appear. Click on Desktop tab and then select IP
Configuration.
• Configure the IP address and Subnet Mask.
• The default subnet mask will be filled in automatically when you tab from the IP address
field.

Step 6: Repeat “Step 5” to set the Ips for all the PCs.
• Click on Note tool button to add notes to the topology.
• Notes are helpful reminders of configuration settings.
Name : Ayush.J.Satwase Roll No : 12

Step 7: Select “Add Simple PDU”.


• Drag and drop message to the source device and then destination device.
• Consider our Source device PC1 and Destination device PC4.

Step 8: Select the Simulation Mode at the bottom right corner.


Name : Ayush.J.Satwase Roll No : 12

• Click at “Auto Capture/Play” mode.


• Observe the path of the message from source to Hub, then to all devices. And then from
destination to Hub and then back to source.
• Finally, observe the green marks.

• If the source PC is marked correct it means you have successfully established the connections.

• PDU list window shows successful message.


Name : Ayush.J.Satwase Roll No : 12
Name : Ayush.J.Satwase Roll No : 12

Output :

Conclusion: In this practical, I have created star topology using Cisco Packet Tracer Simulation Tool
and connection between source and destination device established successfully.
Name : Ayush.J.Satwase Roll No : 12

PRACTICAL NO. 8

Aim:
Implement a Bit stuffing program by using C programming.

Theory:

Definition
Bit stuffing is the mechanism of inserting one or more non-information bits into a message to be
transmitted, to break up the message sequence, for synchronization purpose.

Purpose of Bit Stuffing

In Data Link layer, the stream of bits from the physical layer is divided into data frames. The data
frames can be of fixed length or variable length. In variable - length framing, the size of each frame
to be transmitted may be different. So, a pattern of bits is used as a delimiter to mark the end of
one frame and the beginning of the next frame. However, if the pattern occurs in the message, then
mechanisms need to be incorporated so that this situation is avoided.

The two common approaches are −

Byte - Stuffing − A byte is stuffed in the message to differentiate from the delimiter. This is also
called character-oriented framing.

Bit - Stuffing − A pattern of bits of arbitrary length is stuffed in the message to differentiate from
the delimiter. This is also called bit - oriented framing

Bit Stuffing Mechanism:


In a data link frame, the delimiting flag sequence generally contains six or more consecutive 1s. In
order to differentiate the message from the flag in case of the same sequence, a single bit is
stuffed in the message. Whenever a 0 bit is followed by five consecutive 1bits in the message, an
extra 0 bit is stuffed at the end of the five 1s.
Name : Ayush.J.Satwase Roll No : 12

When the receiver receives the message, it removes the stuffed 0s after each sequence of five 1s.
The un-stuffed message is then sent to the upper layers.
Name : Ayush.J.Satwase Roll No : 12

C Program:
#include<stdio.h>
int main() { int
i=0,count=0;
char databits[80];

printf("Enter Data Bits: ");


scanf("%s",databits);

printf("Data Bits Before Bit Stuffing:%s",databits);


printf("\nData Bits After Bit stuffing :");

for(i=0; i<strlen(databits); i++)


{ if(databits[i]=='1')
count++; else
count=0;
printf("%c",databits[i]);
if(count==5)
{
printf("0");
count=0;
} }
return 0;
}
Name : Ayush.J.Satwase Roll No : 12

Output:

Conclusion:
In this practical, I have Implement a Bit stuffing program by using C programming.
Name : Ayush.J.Satwase Roll No : 12

PRACTICAL NO. 9

Aim:
Implement a C Program to find class (A, B, C, D or E) of an IP Address.
Theory:

Definition
In this example, we will see a C program through which we can find the class of a given IP
address.
An IPv4 has range between 0 to 255 and IP Addresses are divided into 5 classes.

Approach

For determining the class:

The idea is to check first octet of IP address. As we know,

• for class A first octet will range from 1 – 126.


• for class B first octet will range from 128 – 191.
• for class C first octet will range from 192- 223.
• for class D first octet will range from 224 – 239.
• for class E first octet will range from 240 – 255.
Name : Ayush.J.Satwase Roll No : 12

C Program:
#include <stdio.h>
#include <string.h>

/*
Function : extractIpAddress Arguments
:
1) sourceString - String pointer that contains ip address
2) ipAddress - Target variable short type array pointer that will store ip address octets
*/
void extractIpAddress(unsigned char *sourceString,short *ipAddress)
{
unsigned short len=0;
unsigned char oct[4]={0},cnt=0,cnt1=0,i,buf[5];

len=strlen(sourceString);
for(i=0;i<len;i++)
{
if(sourceString[i]!='.'){
buf[cnt++] =sourceString[i];
}
if(sourceString[i]=='.' || i==len-1){
buf[cnt]='\0'; cnt=0;
oct[cnt1++]=atoi(buf);
}
}
ipAddress[0]=oct[0];
Name : Ayush.J.Satwase Roll No : 12

ipAddress[1]=oct[1];
ipAddress[2]=oct[2]; ipAddress[3]=oct[3];
}

int main() {
unsigned char ip[20]={0};
short ipAddress[4];

printf("Enter IP Address (xxx.xxx.xxx.xxx format): ");


scanf("%s",ip);

extractIpAddress(ip,&ipAddress[0]);

printf("\nIp Address: %03d. %03d. %03d.


%03d\n",ipAddress[0],ipAddress[1],ipAddress[2],ipAddress[3]);

if(ipAddress[0]>=0 && ipAddress[0]<=127)


printf("Class A Ip Address.\n");
if(ipAddress[0]>127 && ipAddress[0]<191)
printf("Class B Ip Address.\n");
if(ipAddress[0]>191 && ipAddress[0]<224)
printf("Class C Ip Address.\n");
if(ipAddress[0]>224 && ipAddress[0]<=239)
printf("Class D Ip Address.\n");
if(ipAddress[0]>239) printf("Class E Ip
Address.\n");

return 0;
}
Name : Ayush.J.Satwase Roll No : 12

Output:

Conclusion:
In this practical, I have Implement a C Program to find class (A, B, C, D or E) of an IP Address.
Name : Ayush.J.Satwase Roll No : 12

PRACTICAL NO. 10

Aim:
Implement an Error detecting technique (Cyclic Redundancy Check) using C programming.
Theory:

Errors and Error Detection


When bits are transmitted over the computer network, they are subject to get corrupted due to
interference and network problems. The corrupted bits lead to spurious data being received by
the receiver and are called errors.

Error detection techniques are responsible for checking whether any error has occurred or not in
the frame that has been transmitted via network. It does not take into account the number of error
bits and the type of error.

For error detection, the sender needs to send some additional bits along with the data bits. The
receiver performs necessary checks based upon the additional redundant bits. If it finds that the
data is free from errors, it removes the redundant bits before passing the message to the upper
layers.

There are three main techniques for detecting errors in data frames: Parity Check, Checksum and
Cyclic Redundancy Check (CRC).

Cyclic Redundancy Check (CRC)


Cyclic Redundancy Check (CRC) is a block code invented by W. Wesley Peterson in 1961. It is
commonly used to detect accidental changes to data transmitted via telecommunications
networks and storage devices.

CRC involves binary division of the data bits being sent by a predetermined divisor agreed upon
by the communicating system. The divisor is generated using polynomials. So, CRC is also
called polynomial code checksum.
Name : Ayush.J.Satwase Roll No : 12

The process is illustrated as follows –

Encoding using CRC


• The communicating parties agrees upon the size of message block and the CRC divisor. For
example, the block chosen may be CRC (7, 4), where 7 is the total length of the block and 4 is the
number of bits in the data segment. The divisor chosen may be 1011.

• The sender performs binary division of the data segment by the divisor.

• It then appends the remainder called CRC bits to the end of data segment. This makes the
resulting data unit exactly divisible by the divisor.

Decoding
• The receiver divides the incoming data unit by the divisor.

• If there is no remainder, the data unit is assumed to be correct and is accepted.

• Otherwise, it is understood that the data is corrupted and is therefore rejected. The
receiver may then send an erroneous acknowledegment back to the sender for
retransmission.
Name : Ayush.J.Satwase Roll No : 12

C Program:
#include<stdio.h>
#include<conio.h>
//C Program: Cyclic Redundancy Check - CodeWithC.com
void main() {
int i,f[20],n[50],div[50],j,temp,quotient[20],z[10];
printf("enter the number\n"); for(i=0;i<8;i++)
{ scanf("%d",&n[i]);
}
printf("enter the divisor\n"); for(i=0;i<4;i++)
{ scanf("%d",&div[i]);
} for(i=8;i<12;i++)
{ n[i]=0; }
for(i=0;i<8;i++)
{ temp=i;
if(n[i]==1) { for
(j=0;j<4;j++)
{
if (n[temp]==div[j])
{n[temp]=0;
f[j]=0;} else
{n[temp]=1; f[j]=1;}
temp=temp+1;

} quotient[i]=1; } else
quotient[i]=0; }
printf("\nthe quotient is \n");
Name : Ayush.J.Satwase Roll No : 12

for(i=0;i<8;i++)
printf("%d",quotient[i]);

printf("\n and the remainder is \n ");

for(j=0;j<4;j++) printf("%d",f[j]);

}
Name : Ayush.J.Satwase Roll No : 12

Output:

Conclusion:
In this practical, I have Implemented an Error detecting technique (Cyclic Redundancy Check)
using C programming.

You might also like