0% found this document useful (0 votes)
15 views47 pages

CN Labmanual

The document is a laboratory manual for the Computer Engineering Department at Ahmedabad Institute of Technology, focusing on Computer Networks. It outlines the department's vision, mission, program educational objectives, and program outcomes, emphasizing hands-on training in network design, troubleshooting, and evaluation. The manual includes a series of practical experiments using Cisco Packet Tracer and covers various types of network cables and their applications.

Uploaded by

hsathvara18
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views47 pages

CN Labmanual

The document is a laboratory manual for the Computer Engineering Department at Ahmedabad Institute of Technology, focusing on Computer Networks. It outlines the department's vision, mission, program educational objectives, and program outcomes, emphasizing hands-on training in network design, troubleshooting, and evaluation. The manual includes a series of practical experiments using Cisco Packet Tracer and covers various types of network cables and their applications.

Uploaded by

hsathvara18
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 47

Ahmedabad Institute of Technology

COMPUTER ENGINEERING DEPARTMENT


COMPUTER NETWORK
(3150710)
2024

Laboratory Manual

NAME

ENROLLMENT NUMBER

BATCH

YEAR
DEPARTMENT OF COMPUTER ENGINEERING

Vision of the Department:

“To create competent professionals in the field of Computer


Engineering and promote research with a motive to serve as a valuable
resource for the IT industry and society.”

Mission of the Department:

1. To produce technically competent and ethically sound Computer


Engineering professionals by imparting quality education, training,
hands on experience and value-based education.
2. To pursue creative research, adapt to rapidly changing technologies
and promote self-learning approaches in Computer Engineering and
across disciplines to serve the dynamic needs of industry, government
and society.
3. To inculcate ethical attitude, sense of responsibility towards society
and leadership ability required for a responsible professional computer
engineer.

Program Educational Objectives (PEO):


PEO1: To provide the fundamentals of science, mathematics, electronics and
computer science and engineering and skills necessary for a successful IT
professional.
PEO2: To provide scope to learn, apply skills, techniques and competency to
use modern engineering tools to solve computational problems.
PEO3: To enable young graduates to adapt to the challenges of evolving career
opportunities in their chosen fields of career including higher studies, research
avenues, entrepreneurial activities etc.
PEO4: To inculcate life-long learning aptitude, leadership qualities and
teamwork ability with sense of ethics for a successful professional career in
their chosen field.

Enrollment No CN(3150710)
Page 2
PROGRAM OUTCOMES (POs)
Engineering Graduates will be able to:
1. Engineering knowledge: Apply the knowledge of mathematics, science,
engineering fundamentals, and an engineering specialization to the solution
of complex engineering problems.
2. Problem analysis: Identify, formulate, review research literature, and analyze
complex engineering problems reaching substantiated conclusions using
first principles of mathematics, natural sciences, and engineering sciences.
3. Design/development of solutions: Design solutions for complex
engineering problems and design system components or processes that
meet the specified needs with appropriate consideration for the public
health and safety, and the cultural, societal, and environmental
considerations.
4. Conduct investigations of complex problems: Use research-based
knowledge and research methods including design of experiments, analysis
and interpretation of data, and synthesis of the information to provide valid
conclusions.
5. Modern tool usage: Create, select, and apply appropriate techniques,
resources, and modern engineering and IT tools including prediction and
modeling to complex engineering activities with an understanding of the
limitations.
6. The engineer and society: Apply reasoning informed by the contextual
knowledge to assess societal, health, safety, legal and cultural issues and
the consequent responsibilities relevant to the professional engineering
practice.
7. Environment and sustainability: Understand the impact of the professional
engineering solutions in societal and environmental contexts, and
demonstrate the knowledge of, and need for sustainable development.
8. Ethics: Apply ethical principles and commit to professional ethics and
responsibilities and norms of the engineering practice.
9. Individual and team work: Function effectively as an individual, and as a
member or leader in diverse teams, and in multidisciplinary settings.
10. Communication: Communicate effectively on complex engineering
activities with the engineering community and with society at large, such as,
being able to comprehend and write effective reports and design
documentation, make effective presentations, and give and receive clear
instructions.
11. Project management and finance: Demonstrate knowledge and
understanding of the engineering and management principles and apply
these to one’s own work, as a member and leader in a team, to manage
projects and in multidisciplinary environments.

Enrollment No CN(3150710)
Page 3
12. Life-long learning: Recognize the need for, and have the preparation and
ability to engage in independent and life-long learning in the broadest
context of technological change.

COMPUTER NETWORK PRACTICAL BOOK


DEPARTMENT OF COMPUTER ENGINEERING
PREFACE

It gives us immense pleasure to present the first edition of Computer


Network Practical Book for the B.E. 3rd year students of Ahmedabad
Institute of Technology.
This manual provides student the hands on training regarding the design
,troubleshooting ,modelling and evaluation of computer networks .In this
course student are going to experiment in a real testbed networking ,and
learn about network design tool .Student also get opportunity to build some
simple networking models the tool and simulation that will help them
evaluate their design approaches and expected network performances ,the
will get basic troubleshooting tools like ping ,ICMP,IP routing (RIP),ARp,TCp
and UDP .In addition, the effort put into the laboratory experiments will
ultimately reward the student with a better understanding of the concepts
presented in the classroom.
The student is required to keep a laboratory manual in which the raw data
will be recorded as well as the questions will be kept. The lab write-ups
form a permanent record of your work.

Enrollment No CN(3150710)
Page 4
1. Be punctual in arriving at the laboratory with your lab manual and always
wear your ID card.

2. It is mandatory to bring a lab manual in every practical session.

3. Students have to maintain discipline in the lab and should not create any
unnecessary chaos.

4. Students are supposed to occupy the systems allotted to them and are not
supposed to talk or make noise in the lab.

5. Students are required to carry their observation book and lab records with
completed exercises while entering the lab.

6. Lab records need to be submitted every week.

7. Students are not supposed to use pen drives in the lab.

8. All the observations have to be neatly recorded in the Practical Book and
verified by the instructor before leaving the laboratory.

Enrollment No CN(3150710)
Page 5
Ahmedabad Institute of Technology
Computer Engineering Department

CERTIFICATE
This is to certify that Mr. / Ms._________________________________ Of
Enrolment No ___________________________has Satisfactorily
completed the course in ____________________________________as by
the Gujarat Technological University for ____ Year (B.E.) semester___
of Computer Engineering in the Academic year ______.
Date of Submission:-

Faculty Name : Dr.Dushyantsinh


Rathod Signature (Head Of
Department)

Enrollment No CN(3150710)
Page 6
INDEX

Sr. EXPERIMENT PAGE DATE SIGN


No NO
1 Installation And Study of CPT(Cisco Packet Tracer)

2 Study Of Different Type Of Network Cable

3 Study Of Various Network Devices In Details

4 Designing Of Various Network Topologies With CPT

5 (a)Implementing Various Routing Algorithm Using


CPT
(b) DHCP Manual Configuration

6 VLAN Creation Using CPT

7 Creation Of LAN Cable With Various Tool

8 Study Of Basic Network Commands In CPT

Enrollment No CN(3150710)
Page 7
EXPERIMENT 1 DATE:

TITLE: Installation And Study of CPT(Cisco Packet Tracer)

OBJECTIVES: On completion of this experiment student


familiarize with Concept of Packet Tracer Simulator.

THEORY
Packet Tracer:
Packet Tracer is a protocol simulator developed by Dennis Frezzo and his team at
Cisco Systems. Packet Tracer (PT) is a powerful and dynamic tool that displays the
various protocols used in networking, in either Real Time or Simulation mode. This
includes layer 2 protocols such as Ethernet and PPP, layer 3 protocols such as IP,
ICMP, and ARP, and layer 4 protocols such as TCP and UDP. Routing protocols can
also be traced.

The layout of Packet Tracer is divided into several components similar to a photo
editor. Match the numbering in the following screenshot with the explanations given
after it:

Enrollment No CN(3150710)
Page 8
● Area 1: Menu bar – This is a common menu found in all software applications; it is used to
open, save, print, change preferences, and so on.

● Area 2: Main toolbar – This bar provides shortcut icons to menu options that are commonly
accessed, such as open, save, zoom, undo, and redo, and on the right-hand side is an icon for
entering network information for the current network.

● Area 3: Logical/Physical workspace tabs – These tabs allow you to toggle between the
Logical and Physical work areas.

● Area 4: Workspace – This is the area where topologies are created and simulations are
displayed.

● Area 5: Common tools bar – This toolbar provides controls for manipulating topologies,
such as select, move layout, place note, delete, inspect, resize shape, and add
simple/complex PDU.

● Area 6: Realtime/Simulation tabs – These tabs are used to toggle between the real and
simulation modes. Buttons are also provided to control the time, and to capture the packets.

● Area 7: Network component box – This component contains all of the network and end
devices available with Packet Tracer, and is further divided into two areas:

● Area 7a: Device-type selection box – This area contains device categories

● Area 7b: Device-specific selection box – When a device category is selected, this

Enrollment No CN(3150710)
Page 9
selection box displays the different device models within that category

● Area 8: User-created packet box – Users can create highly-customized packets to test their
topology from this area, and the results are displayed as a list.

Make sure you are familiar with these names, because moving forward we will be referring to them
frequently.

WORKSPACES AND MODES

Packet Tracer has two workspaces (Logical and Physical) and two modes (Realtime and
Simulation). Upon startup, you are in the Logical Workspace in Realtime Mode. You can build your
network and see it run in real time in this configuration. You can switch to Simulation Mode to run
controlled networking scenarios. You can also switch to the Physical Workspace to arrange the
physical aspects (such as the location) of your devices. Note that you view a simulation while you
are in the Physical Workspace. You should return to the Logical Workspace after you are done in the
Physical Workspace.

IMPLEMENTING PEER TO PEER CONNECTION

STEP 1: First, add two computers, by going to the [End device] menu and dragging the PC icon until
it looks like this:

STEP 2: Then, connect the two PC using a cross-over cable or you can directly use an automatic
cable so that it will look like this:

STEP 3: Then after the two PC are physically connected, the next step is to provide IP
addresses to the two PCs. In this way, “click PC0 – Desktop – IP Configuration” and adjust
the ip address for example:

Enrollment No CN(3150710)
Page 10
○ Ip address : 192.168.2.1
○ subnet mask : 255.255.255.0

STEP 4: Do the same on another PC (PC1) with a different host ip address but on the same network
for example (192.168.1.3) and subnet mask 255.255.255.0

STEP 5: So if indeed the two computers are connected and can communicate with each other then
PC1 will send a response back with the message “reply from 192.168.1.3 …” which is a sign of
success. However, if the process does not occur (timed out) on your display, pay attention to the IP
addresses of the two computers (PC0 and PC1) must be in one segment, namely 192.168.1…..you
can change the host number as long as the two hosts are different then the range of numbers that
can be used is 1-255.

STEP 6: To do a ping test we can use the Command Prompt on virtual computers (PC0 and
PC1), by clicking on one of the computers (PC0) then go to “Command Prompt” and type:

EXERCISES:

Enrollment No CN(3150710)
Page 11
i)Implement Peer to Peer network connection using CPT
ii)Implement network connection more than two nodes using hubs and Switch in
CPT
iii) What are benefits of CISCO PACKET TRACER
iv) What is difference between peer to peer and client server
v)Write difference between CPT and GNS3
vi) What is the difference between Hub and Switch

EVALUATION:

Involvement(4) Understanding/Probl Timely Total(10)


em Solving(3) Completion(3)

Signature with
date

_________________

EXPERIMENT 2 DATE:

TITLE: Study Of Different Type Of Network Cable

OBJECTIVES: After completing study of this practical the students will be

Enrollment No CN(3150710)
Page 12
familiarized with Concept of Wired Media.

THEORY
There are two types of transmission media
• Guided – copper wires, fiber optic cable
• Unguided – Wireless (Radio Frequency / Microwave)
Information is transmitted over:

Guided transmission basics


• To transmit a single bit down a copper wire, we must send some electrical signal
having two discrete states to represent 0 and 1
• Examples: Voltage +5v = 1 0V = 0 Frequency 980 Hz =1 1180 Hz = 0

Guided transmission media


• Guided transmission is where the signal (information or data) is sent through some
sort of cable, usually copper or optical fiber.
• There are many different types of cabling:
▪ Twisted Pair:
▪ Coaxial Cable (Coax)
▪ Fiber Optic Cable

Twisted Pair:

Enrollment No CN(3150710)
Page 13
• This consists of two or more insulated wires twisted together in a shape similar to a
helix.
• Use metallic conductor , The cables are twisted around each other to reduce the
amount of external interference
• It consists of two conductors (copper), each with its colored plastic insulation.
• This cable can be used at speeds of several Mb/s for a few kilometers.
• Used for telephone lines and lab networks.

Advantages of UTP

• Cost is less, Easy to use, Easy to install, Flexible


• UTP Used in Ethernet and Token ring
• STP has a metal foil or cover.
• Crosstalk (effect of one channel on the other channel) is less in STP.
• STP has the same consideration as UTP
• Shield must connect with the ground.
• Disadvantage of STP : cost is high

Coaxial Cable (coax)


• This consists of a copper cable inside a layer of insulating material.
• The insulating material is then inside a braided outer conductor.
• A layer of plastic is on the outermost layer.
• This type of cable was commonly used in the telephone system but has since been
replaced by fiber optics on longer routes

Enrollment No CN(3150710)
Page 14
• This cable has also been used for Cable TV.

Categories of coaxial cables

RG-Radio Government., Each cable define by RG ratting.


RG-8 &RG-9 also used in Thin Ethernet.
RG number denotes a unique set of physical Specification, including the wire gauge
of the inner conductor.

Connector of coaxial cables

The most common connector is barrel connector.


The most popular type is BNC (Bayonet Network connector)
Two other types are T-connectors and terminators.
T-connectors and terminators are used in bus topology.

Advantages:-
• Easy to Install.
• Inexpensive installation.
• It is better for Higher Distance at Higher speed than twisted pair.
• Excellent noise immunity.

Disadvantage:-

Enrollment No CN(3150710)
Page 15
• High Cost
• Harder to work

Fiber Optic Cable:


Components of Fiber Optics:-

o Light Source
o Transmission Medium
o Light Detector
This consists of a central glass core, surrounded by a glass cladding of lower refractive
index, so that the light stays in the core (using Total Internal Reflection)
• outside is covered with plastic jacket
• Many fibers may be bundled together surrounded by another plastic cover

Refraction:- When Light travels from one medium to another medium changes occurs in
its speed
and direction, this change is called refraction.
I - Angle of Incidence.
R- Angle of Refraction.

Enrollment No CN(3150710)
Page 16
● Critical Angle:- At some points, the changes in the incident angle results in the
refracted angle of 90 degrees, with the refracted beam lying along the Horizontal.
The incident angle at this point is known as Critical Angle.
● Reflection:- When the angle of incidence becomes greater than the critical angle, a
new phenomenon is Occurs is called reflection.
● Light traveling of fiber optic cable
● The source of light is usually a Light Emitting Diode (LED) or a LASER. The light
source is placed at one end of the optical fiber.
● The detector, which is placed at the other end of the fiber, is usually a Photo Diode
and it generates an electrical pulse when light falls on it.
● Hence by attaching a light source on one end of an optical fiber and a detector at the
other end, we have a unidirectional data transmission system (Simplex)
● The light source would accepts an electrical signal, converts and transmits it as light
pulses
● The detector at the far end reconverts the light pulses into an electrical signal to be
then interpreted as 1 or a 0.
Propagations Mode:

● Fiber optic cables and network interface cards to connect a computer to the fiber are
an order of magnitude more expensive than their corresponding copper cable
equivalents
● Cost is high
● Installation and maintenance is difficult.
● Higher Bandwidth.

Unguided transmission media

Enrollment No CN(3150710)
Page 17
Information is usually transmitted by either radio or microwave transmission. Unguided
media transport electromagnetic waves without using a physical conductor. Signals are
broadcast through air (or in a few cases, water).

1. Radio Transmission:
● Radio waves are easy to generate and can travel long distances and penetrate
buildings.
● Radio waves are omni-directional which basically means that they can
transmit both ways.
● The transmitter and receiver do not have to be in direct line of sight

2. Microwave Transmission:
● Different types of Propagation
● Surface Propagation (Ground Propagation)
● Sky Propagation.(Tropospheric Propagation, Ionospheric Propagation, Space
Propagation)
● Line-of-sight Propagation.

● Unlike radio waves, microwaves typically do not pass through solid objects.
● Some Waves can be refracted due to atmospheric conditions and may take longer to
arrive than direct waves. These delayed waves can arrive out of phase with the direct
wave, causing destructive interference and corrupting the received signal This effect
is called multipath fading.
● Because of increased demand for more spectrum (range of frequencies used to
transmit), transmitters are using higher and higher frequencies.
● Microwave communication is widely used for long distance telephone
communication and cell phones.
● Microwave signals propagates in one direction at a time which means two different
frequencies are necessary for two way communication.

3. Infrared:
● Infrared signals can be used for short-range communication in a closed area using
line-of-sight propagation.
Enrollment No CN(3150710)
Page 18
● Transceivers must be within line of sight of each other or via reflection.
● Does not penetrate walls like microwave.
● No frequency allocation or licensing.

EXERCISES:

i)Compare different types of light source which we can use in optical fiber.
ii)List out different types of wired media used in computer labs with their
specification.
iii) Give difference between following:
a. Twisted pair Cable and Coaxial Cable.
b. Twisted Pair Cable and Fiber Optics Cable.
c. Fiber Optic Cable and Coaxial Cable.
d. Wire Communication and Wireless Communication.

EVALUATION:

Involvement(4) Understanding/Probl Timely Total(10)


em Solving(3) Completion(3)

Signature with
date

________________

EXPERIMENT 3 DATE:

TITLE: Study Of Various Network Devices In Details

OBJECTIVES: On completion of this experiment student will able to…


know more about switching devices and its uses

Enrollment No CN(3150710)
Page 19
THEORY:

NAME FUNCTION

Modem: Modem is a device that enables a computer


to send or receive data over telephone or
cable lines. The data stored on the
computer is digital whereas a telephone line
or cable wire can transmit only analog data.
The main function of the modem is to

Enrollment No CN(3150710)
Page 20
convert digital signal into analog and vice
versa. Modem is a combination of two
devices − modulator and demodulator. The
modulator converts digital data into analog
data when the data is being sent by the
computer. The demodulator converts analog
data signals into digital data when it is being
received by the computer.

RJ45 is the acronym for Registered Jack 45.


RJ45 RJ45 connector is an 8-pin jack used by
Connector devices to physically connect to Ethernet
based local area networks (LANs). Ethernet
is a technology that defines protocols for
establishing a LAN. The cable used for
Ethernet LANs are twisted pair ones and
have RJ45 connector pins at both ends.
These pins go into the corresponding socket
on devices and connect the device to the
network.

Ethernet card, also known as network


Ethernet interface card (NIC), is a hardware
component used by computers to connect
Card(NIC)
to Ethernet LAN and communicate with
other devices on the LAN. The earliest
Ethernet cards were external to the system
and needed to be installed manually. In
modern computer systems, it is an internal
hardware component. The NIC has RJ45
socket where network cable is physically
plugged in.
Ethernet card speeds may vary depending
upon the protocols it supports. Old Ethernet
cards had maximum speed of 10 Mbps.
However, modern cards support fast
Ethernets up to a speed of 100 Mbps. Some
cards even have capacity of 1 Gbps.

Enrollment No CN(3150710)
Page 21
Repeater A repeater operates at the physical layer.
Its job is to regenerate the signal over
the same network before the signal
becomes too weak or corrupted so as to
extend the length to which the signal can
be transmitted over the same network.
An important point to be noted about
repeaters is that they do not amplify the
signal. When the signal becomes weak,
they copy the signal bit by bit and
regenerate it at the original strength. It is
a 2 port device.

Hubs: The hub or network hub connects


computers and devices and sends
messages and data from any one device
to all the others. If the desktop computer
wants to send data to the lapop and it
sends a message to the laptop through
the hub, the message will get sent by the
hub to all the computers and devices on
the network. They need to do work to
figure out that the message is not for
them. The message also uses up
bandwidth (room) on the network wires or
wireless radio waves and limits how much
communication can go on. Hubs are not
used often these days.

Bridges are used to divide larger networks


into smaller sections. They do this by
Bridges: sitting between two physical network
segments and managing the flow of data
between the two. By looking at the MAC
address of the devices connected to each
segment, bridges can elect to forward the
data (if they believe that the destination
address is on another interface), or block
it from crossing (if they can verify that it is
on the interface from which it came).

Enrollment No CN(3150710)
Page 22
Switch is a network device that connects
Switch other devices to Ethernet networks through
twisted pair cables. It uses packet switching
technique to receive, store and forward data
packets on the network. The switch
maintains a list of network addresses of all
the devices connected to it.
On receiving a packet, it checks the
destination address and transmits the
packet to the correct port. Before
forwarding, the packets are checked for
collision and other network errors. The data
is transmitted in full duplex mode

A router is a network layer hardware device


Router that transmits data from one LAN to another
if both networks support the same set of
protocols. So a router is typically connected
to at least two LANs and the internet service
provider (ISP). It receives its data in the form
of packets, which are data frames with their
destination address added. Router also
strengthens the signals before transmitting
them. That is why it is also called repeater.

Gateway is a network device used to


Gateway connect two or more dissimilar networks. In
networking parlance, networks that use
different protocols are dissimilar networks.
A gateway usually is a computer with
multiple NICs connected to different
networks. A gateway can also be configured
completely using software. As networks
connect to a different network through
gateways, these gateways are usually hosts
or end points of the network.
Gateway uses packet switching technique to
transmit data from one network to another.
In this way it is similar to a router, the only
difference being router can transmit data
only over networks that use same protocols.

Enrollment No CN(3150710)
Page 23
Wi-Fi is the acronym for wireless fidelity. Wi-
Wi-Fi Card Fi technology is used to achieve wireless
connection to any network. Wi-Fi card is a
card used to connect any device to the local
network wirelessly. The physical area of the
network which provides internet access
through Wi-Fi is called Wi-Fi hotspot.
Hotspots can be set up at home, office or
any public space. Hotspots themselves are
connected to the network through wires.
A Wi-Fi card is used to add capabilities like
teleconferencing, downloading digital
camera images, video chat, etc. to old
devices. Modern devices come with their in-
built wireless network adapter.

EXERCISES:

i) What are the different types of HUBS


ii)Explain different types of switches.
iii)What is the difference between HUBS , SWITCH and ROUTERS

EVALUATION:

Involvement(4) Understanding/Probl Timely Total(10)


em Solving(3) Completion(3)

Signature with
date

________________

Enrollment No CN(3150710)
Page 24
EXPERIMENT 4 DATE:

TITLE: Designing Of Various Network Topologies With CPT

OBJECTIVES: On completion of this experiment students will be able to…


know more different types of topologies

THEORY:

1) BUS Topology

Bus topology is a network type in which every computer and network device is connected to
single cable. When it has exactly two endpoints, then it is called Linear Bus topology.

Features of Bus Topology


● Uses a single backbone cable.
● All the Nodes connect directly to this backbone.
● Cable required is least compared to other network topology.
● Used in small networks.
● It is easy to understand.

Advantage:-
● Easy to Construct
● Cost is Low

Disadvantage:-
● Traffic is High
● If Link is Break Then no one can communicate with others.
● Difficult to add new add Devices.

Enrollment No CN(3150710)
Page 25
● If Link is Break Then no one can communicate with others.

2) STAR TOPOLOGY

In this type of topology all the computers are connected to a single hub through a cable.
This hub is the central node and all others nodes are connected to the central node.

Features of Star Topology


● Every node has its own dedicated connection to the hub.
● Hub acts as a repeater for data flow.
● Can be used with twisted pair, Optical Fibre or coaxial cable.

Advantages of Star Topology


● Fast performance with few nodes and low network traffic.
● Hub can be upgraded easily.
● Easy to troubleshoot.
● Easy to setup and modify.
● Only that node is affected which has failed, rest of the nodes can work smoothly.

Disadvantages of Star Topology


● Cost of installation is high.
● Expensive to use.
● If the hub fails then the whole network is stopped because all the nodes depend on
the hub.
● Performance is based on the hub that is it depends on its capacity

Enrollment No CN(3150710)
Page 26
3) RING TOPOLOGY

It is called ring topology because it forms a ring as each computer is connected to another
computer, with the last one connected to the first. Exactly two neighbours for each device.

Features of Ring Topology


● A number of repeaters are used for Ring topology with large number of nodes,
because if someone wants to send some data to the last node in the ring topology
with 100 nodes, then the data will have to pass through 99 nodes to reach the 100th
node. Hence to prevent data loss repeaters are used in the network.
● The transmission is unidirectional, but it can be made bidirectional by having 2
connections between each Network Node, it is called Dual Ring Topology.
● In Dual Ring Topology, two ring networks are formed, and data flow is in the opposite
direction in them. Also, if one ring fails, the second ring can act as a backup, to keep
the network up.
● Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to
pass through each node of the network, till the destination node.

Advantages of Ring Topology


● Transmitting network is not affected by high traffic or by adding more nodes, as only
the nodes having tokens can transmit data.
● Cheap to install and expand

Disadvantages of Ring Topology


● Troubleshooting is difficult in ring topology.
● Adding or deleting the computers disturbs the network activity.

Enrollment No CN(3150710)
Page 27
● Failure of one computer disturbs the whole network

4) MESH TOPOLOGY

It is a point-to-point connection to other nodes or devices. All the network nodes are
connected to each other. Mesh has n(n-1)/2 physical channels to link n devices.All the node
has multiple paths to reach at Particular any one location.

Advantage:-

● Reachability is high.
● Provide much Protection.
● Used at a nuclear power plant

Disadvantage:-

● Cost is high.
● Very Complex to Build.
● Maintenance is also high.

5) HYBRID TOPOLOGY

It is two different types of topologies which is a mixture of two or more topologies. For
example if in an office in one department ring topology is used and in another star topology
is used, connecting these topologies will result in Hybrid Topology (ring topology and star
topology).

Enrollment No CN(3150710)
Page 28
Features of Hybrid Topology
● It is a combination of two or topologies
● Inherits the advantages and disadvantages of the topologies included

Advantages of Hybrid Topology


● Reliable as Error detecting and troubleshooting is easy.
● Effective.
● Scalable as size can be increased easily.
● Flexible.

Disadvantages of Hybrid Topology


● Complex in design.
● Costly.

EXERCISES:

i) Implement bus , star ,ring ,mesh and hybrid topology in CPT


ii)What is topology explain its type
iii)What are the advantage of ring topology over the star topology
iv) Write the difference between ring topology and mesh topology

EVALUATION:

Involvement(4) Understanding/Probl Timely Total(10)


em Solving(3) Completion(3)

Signature with
date

Enrollment No CN(3150710)
Page 29
________________

EXPERIMENT 5 DATE:

TITLE: (a)Implementing Various Routing Algorithm Using CPT


(b) DHCP Manual Configuration

OBJECTIVES: On completion of this experiment students will be able to…


know more different types of static and dynamic routing and how
to configure DHCP using CPT
THEORY:

Distance Vector Routing using RIP


Distance vector routing algorithms operate by having each router maintain a table (i.e, a
vector) giving the best known distance to each destination and which line to use to get
there. These tables are updated by exchanging information with the neighbors. The
distance vector routing algorithm is sometimes called by other names, most commonly the
distributed Bellman-Ford routing algorithm and the Ford-Fulkerson algorithm, after the
researchers who developed it (Bellman, 1957; and Ford and Fulkerson, 1962). It was the
original ARPANET routing algorithm and was also used on the Internet under the name RIP.
In distance vector routing, each router maintains a routing table indexed by, and containing
one entry for, each router in the subnet. This entry contains two parts: the preferred
outgoing line to use for that destination and an estimate of the time or distance to that
destination. The metric used might be number of hops, time delay in milliseconds, total
number of packets queued along the path, or something similar.

Enrollment No CN(3150710)
Page 30
Router configuration:
Router-1 Configuration
Router>
Router>enable
Router#configure terminal
Router(config)#hostname Router1
Router1(config)#interface fastethernet 0/0
Router1(config-if)#ip address 10.1.1.100 255.0.0.0
Router1(config-if)#no shutdown
Router1(config-if)#exit
Router1(config)#interface fastethernet 1/0
Router1(config-if)#ip address 20.1.1.100 255.0.0.0
Router1(config-if)#no shutdown
Router1(config-if)#exit
Router1(config)#router rip
Router1(config-router)#network 10.0.0.0
Router1(config-router)#network 20.0.0.0
Router-2 Configuration
Router>
Router>enable
Router#configure terminal
Router(config)#hostname Router2
Router2(config)#interface fastethernet 0/0
Router2(config-if)#ip address 20.1.1.200 255.0.0.0
Router2(config-if)#no shutdown
Router2(config-if)#exit
Router2(config)#interface fastethernet 1/0
Router2(config-if)#ip address 30.1.1.100 255.0.0.0
Router2(config-if)#no shutdown
Router2(config-if)#exit
Router2(config)#router rip
Router2(config-router)#network 20.0.0.0
Router2(config-router)#network 30.0.0.0
Router-3 Configuration
Router>
Router>enable
Router#configure terminal
Router(config)#hostname Router3
Router3(config)#interface fastethernet 0/0
Router3(config-if)#ip address 30.1.1.200 255.0.0.0
Router3(config-if)#no shutdown
Router3(config-if)#exit
Router3(config)#interface fastethernet 1/0
Router3(config-if)#ip address 40.1.1.100 255.0.0.0
Router3(config-if)#no shutdown
Enrollment No CN(3150710)
Page 31
Router3(config-if)#exit
Router3(config)#router rip
Router3(config-router)#network 30.0.0.0
Router3(config-router)#network 40.0.0.0

Link State Routing


1. Develop a Topology shown in figure given below.
2. Configure all the workstations
3. Configure all switches
4. Configure all Routers
5. Implement OSPF protocols in Router to configure Network.

Implementation of DHCP in network


The Dynamic Host Configuration Protocol (DHCP) is a network protocol that is used to
configure network devices. DHCP allows a computer to join an IP-based network without
having a pre-configured IP address. DHCP is a protocol that assigns unique IP addresses to
devices, then releases and renews these addresses as devices leave and re-join the network.
Internet Service Providers (ISPs) usually use DHCP to allow customers to join the Internet
with minimum effort. The DHCP server maintains a database of available IP addresses and
configuration information. When it receives a request from a client, the DHCP server
determines the network to which the DHCP client is connected, and then allocates an IP
address. DHCP servers typically grant IP addresses to clients only for a limited interval.
Let's apply DHCP on a packet tracer.
First, let us make a topology with one router on which we will apply DHCP and several client
PCs. More like this one,

Enrollment No CN(3150710)
Page 32
Now, we will apply DHCP on the router. The commands in sequence are as follows.

In the following command “ip dhcp pool cisco”, we are creating a pool for DHCP called
cisco. cisco is the name here and we can name it whatever we want. Similarly, in the
command “default-router “ we are telling the DHCP about the default route to follow.

Notice, after we exit from DHCP mode, we are excluding some IP addresses by applying
this command “ip dhcp excluded-addresses x-x”, where x is the starting and ending IP
address respectively. We are basically reserving some IPs for our use. It can be used to
attach printers, or assign it to some specific users for security purposes. You can also give

dns address in dhcp by using the following command. dns- server 192.168.1.15.

Now, open the PC.

Click on IP Configuration

Enrollment No CN(3150710)
Page 33
Select from Static to DHCP

And after DHCP request is completed you will see the following screen.

Now, after applying some IPs in sequence, DHCP will skip the IPs that we have excluded
from our DHCP pool.

That is all, we have applied DHCP on the packet tracer.

EXERCISE:
1) Connect different networks using two routers and configure them using RIP protocols.
(Write the steps for each Routing Configuration.)
2) Connect different networks using three routers and configure them using RIP protocols.
Enrollment No CN(3150710)
Page 34
(Write the steps for each Routing Configuration.)

EVALUATION:

Involvement(4) Understanding/Probl Timely Total(10)


em Solving(3) Completion(3)

Signature with date

________________

EXPERIMENT 6 DATE:

TITLE: (a)VLAN Creation Using CPT

OBJECTIVES: After completing study of this practical the students will be


familiarized with...
➢ Concept of VLAN
THEORY:

VLAN:
● VLAN refers to Virtual Local Area Network

● VLAN extends its functionalities beyond a single LAN through VLAN a network is
divided into different logical segments which are known as broadcast domains.

● In technical terms, a VLAN is a broadcast domain created by switches.

● All devices, by default, are in VLAN 1.

● For devices in different VLANs to communicate, you must use a router or Layer 3
switch.

● The standard range consists of VLANs 1 to 1024.

● The extended range consists of VLANs 1025 to 4096.


Enrollment No CN(3150710)
Page 35
Create Simple VLAN

We are creating a simple VLAN. We will take Four PC & one switch. We will create two VLAN
name “VLAN8” and “VLAN9”.Then we put ports 1 & 2 into VLAN 8 and ports 3 & 4 into
VLAN9.Then we will check how the communication is done between different nodes.

Step 1: configuration of VLAN in Switch

Switch>enable

Switch#configure terminal

Enter configuration commands, one per line. End with CNTL/Z.

Switch(config)#hostname Vlan_Switch

Vlan_Switch(config)#vlan 8

VLAN 8 added: Name:VLAN0008

Vlan_Switch(config)#vlan 8 name ajay

Vlan_Switch(config)#vlan 9 name jashvant

VLAN 9 added: Name:jashvant

Vlan_Switch(config)#interface fastethernet0/1

Vlan_Switch(config-if)#switchport mode access

Vlan_Switch(config-if)#switchport access vlan 8

Vlan_Switch(config-if)#exit

Vlan_Switch(config)#interface fastethernet0/2

Vlan_Switch(config-if)#switchport mode access


Enrollment No CN(3150710)
Page 36
Vlan_Switch(config-if)#switchport access vlan 8

Vlan_Switch(config-if)#exit

Vlan_Switch(config)#interface fastethernet0/3

Vlan_Switch(config-if)#switchport mode access

Vlan_Switch(config-if)#switchport access vlan 9

Vlan_Switch(config-if)#exit

Vlan_Switch(config)#interface fastethernet0/4

Vlan_Switch(config-if)#switchport mode access

Vlan_Switch(config-if)#switchport access vlan 9

Vlan_Switch(config-if)#exit

Step 2: configuration of PC.

PC1

IP Address....................... : 10.1.1.1

Subnet Mask...................... : 255.0.0.0

Default Gateway...................: 10.1.1.4

PC2

IP Address....................... : 10.1.1.1

Subnet Mask...................... : 255.0.0.0

Default Gateway...................: 10.1.1.4

IP Address....................... : 10.1.1.2

Subnet Mask...................... : 255.0.0.0

Default Gateway.................. : 10.1.1.4

PC3

IP Address....................... : 10.1.1.3

Subnet Mask...................... : 255.0.0.0

Default Gateway.................. : 10.1.1.4

PC4

IP Address....................... : 10.1.1.4
Enrollment No CN(3150710)
Page 37
Subnet Mask...................... : 255.0.0.0

Default Gateway.................. : 10.1.1.4

Step 3: Check connectivity.

PC1:>ping 10.1.1.2

Pinging 10.1.1.2 with 32 bytes of data:

Reply from 10.1.1.2: bytes=32 time=60ms TTL=241

Reply from 10.1.1.2: bytes=32 time=60ms TTL=241

Reply from 10.1.1.2: bytes=32 time=60ms TTL=241

Reply from 10.1.1.2: bytes=32 time=60ms TTL=241

Reply from 10.1.1.2: bytes=32 time=60ms TTL=241

Ping statistics for 10.1.1.2: Packets: Sent = 5, Received = 5, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 50ms, Maximum = 60ms, Average = 55ms

PC1:>ping 10.1.1.3

Pinging 10.1.1.3 with 32 bytes of data:

Request timed out.

Request timed out.

Request timed out.

Request timed out.

Request timed out.

Ping statistics for 10.1.1.3:

Packets: Sent = 5, Received = 0, Lost = 5 (100% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

PC1:>ping 10.1.1.4

Pinging 10.1.1.4 with 32 bytes of data:

Request timed out.

Request timed out.


Enrollment No CN(3150710)
Page 38
Request timed out.

Request timed out.

Request timed out.

Ping statistics for 10.1.1.4:

Packets: Sent = 5, Received = 0, Lost = 5 (100% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

Here we get pinging from PC1 to PC2 only.

So Here Switch is decided into two logical segment.

Step 4: Verify Configuration.

Vlan_Switch#

Vlan_Switch#show vlan

EXERCISES:

i) Create the Two VLAN from one LAN and write the configuration steps.
ii)Give different types of VLAN.

Enrollment No CN(3150710)
Page 39
iii)List out advantages of VLAN.

EVALUATION:

Involvement(4) Understanding/Proble Timely Total(10)


m Solving(3) Completio
n(3)

Signature with date

________________

EXPERIMENT 7 DATE:

TITLE: Creation Of LAN Cable With Various Tool

OBJECTIVES: After completing study of this practical the students will be able to
Practically implement the cross- wired cable and straight through
cable using crimping tool.

THEORY:

Apparatus (Components): RJ-45 connector, Crimping Tool, Twisted pair Cable

Procedure: To do these practical following steps should be done:


1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be very
careful at this point, as to not nick or cut into the wires, which are inside. Doing so could
alter the characteristics of your cable, or even worse render is useless. Check the wires, one
more time for nicks or cuts. If there are any, just whack the whole end off, and start over.

Enrollment No CN(3150710)
Page 40
2. Spread the wires apart, but be sure to hold onto the base of the jacket with your other
hand. You do not want the wires to become untwisted down inside the jacket. Category 5
cable must only have 1/2 of an inch of 'untwisted#39; wire at the end; otherwise it will
be 'out of spec v#39;. At this point, you obviously have A LOT more than 1/2 of an inch
of un-twisted wire.

3. You have 2 end jacks, which must be installed on your cable. If you are using a pre- made
cable, with one of the ends whacked off, you only have one end to install - the crossed over
end. Below are two diagrams, which show how you need to arrange the cables for each type
of cable end. Decide at this point which end you are making and examine the associated
picture below.

Diagram shows you how to prepare Cross wired connection

Diagram shows you how to prepare straight through wired connection

Enrollment No CN(3150710)
Page 41
4. Align the untwisted wires in the order necessary for your needs. For this scenario,
you'll be making a straight-through cable, which has both ends of the cable with the
same alignment of wires, so it's easy enough to do. Since this is your first cable, we'll
consult the cheat sheet to know what order we're aligning in!

5. Cut the extra wire. Once you've untwisted the wires, you'll have a superfluous amount of
copper wiring left; we don't need this much, but it's good to have it in the previous step to
help in aligning the colors properly. Use the wire-cutting scissors to cut these off.

6. Push the remaining wires into the RJ45 head. Be careful not to bend the wires while
pushing them in or you run the risk of creating a bad cable. You also don't want too little or
too much wire left in the head; there's no definite length necessary, but it's pretty obvious to
tell if there's too much cable or not enough. A short length of the jacket should be up the
RJ45 head; use this knowledge as a reference.

7. Push the head into the open space of the crimping tool and squeeze it closed, hard. If you
don't crimp the cable all the way, the head may come off.
Enrollment No CN(3150710)
Page 42
EVALUATION:
Involvement(4 Understanding/Proble Timely Total(10)
) m Solving(3) Completion(3)

Signature with
date

________________

EXPERIMENT 8 DATE:

TITLE: Study Of Basic Network Commands In CPT

OBJECTIVES: After completing study of this practical the students will be


familiarized with...
➢ Identify tools used to discover a computer network
configuration with
various operating systems.
➢ Gather information including connection, host name, Layer 2
MAC address
and Layer 3 TCP/IP network address information.
➢ Compare network information to other PCs on the network.

THEORY:

1) Ping
ping: ping(8) sends an ICMP ECHO_REQUEST packet to the specified host. If the

Enrollment No CN(3150710)
Page 43
host responds, you get an ICMP packet back. Sound strange? Well, you can “ping” an
IP address to see if a machine is alive. If there is no response, you know something
is wrong.

2) ipconfig
shows the IP address, subnet mask, and default gateway. The IP address and the
default gateway should be in the same network or subnet, otherwise this host would
not be able to communicate outside the network. In the figure the subnet mask tells
us tha the first three octets must be the same to be in the same network.

3) ipconfig /all
The host name, including the computer name and NetBIOS name should be
displayed. Also, the DHCP server address, if used, and the date the IP lease starts
and ends should be displayed. Look over the information. Entries for the DNS, used
in name resolution servers, may also be present. The previous figure reveals that the
router is performing DHCP services for this network. This would likely be a small
office or home office (SOHO) or small branch office implementation.

Enrollment No CN(3150710)
Page 44
4) Traceroute:
Tracert is a command which can show you the path a packet of information takes
from your computer to one you specify. It will list all the routers it passes through
until it reaches its destination, or fails to and is discarded. In addition to this, it will
tell you how long each hop from router to router takes.

5) nslookup
Displays information from Domain Name System (DNS) name servers.

NOTE :If you write the command as above it shows as default your pc server name
firstly.

6) pathping
A better version of tracert that gives you statics about packet lost and latency.

Enrollment No CN(3150710)
Page 45
7) Getting help
In any command mode, you can get a list of available commands by entering a
question mark (?).

Router>?- To obtain a list of commands that begin with a particular character


sequence, type in those characters followed immediately by the question mark (?).

Router#co?-configure connect copy, To list keywords or arguments, enter a question


mark in place of a keyword or argument. Include a space before the question mark.

Router#configure ?- memory Configure from NV memory network , Configure from a


TFTP network host terminal Configure from the terminal .You can also abbreviate
commands and keywords by entering just enough characters to make the command
unique from other commands. For example, you can abbreviate the show command
to sh.

Configuration Files

Any time you make changes to the router configuration, you must save the changes
to memory because if you do not they will be lost if there is a system reload or power
outage. There are two types of configuration files: the running (current operating)
configuration and the startup configuration.

Use the following privileged mode commands to work with configuration files.

• configure terminal – modify the running configuration manually from the terminal.

• show running-config – display the running configuration.

• show startup-config – display the startup configuration.

• copy running-config startup-config – copy the running configuration to the startup


configuration.

Enrollment No CN(3150710)
Page 46
• copy startup-config running-config – copy the startup configuration to the running
configuration.

• erase startup-config – erase the startup-configuration in NVRAM. • copy tftp


running-config – load a configuration file stored on a Trivial File Transfer Protocol
(TFTP) server into the running configuration.

• copy running-config tftp – store the running configuration on a TFTP server.

EXERCISES:

i)Implement all the given command in CMD and CPT

EVALUATION:

Involvement(4) Understanding/Probl Timely Total(10)


em Solving(3) Completion(3)

Signature with
date

_________________

Enrollment No CN(3150710)
Page 47

You might also like