Partial Data Communication and Networking Lab Manual
Partial Data Communication and Networking Lab Manual
EXPERIMENT-1
AIM: Demonstration and study about different physical equipment used for networking;
NIC (Network Interface Card), types of cable, Fiber Optics
Learning Objective:
At the end of the session you will be able to become familiar with different types
of equipment’s and cables used in the networked lab.
1
saving and to allocate printers or other peripherals. In a bus topology, the server
acts like arbitrator, each node talks to the server when requesting information. The
server then locates the information on one of the connected clients and sends it to
the requesting client. Servers in any network can be an ordinary node but having
more capabilities of handling the data and having more speed.
1.1.2 Workstation
A node or stand-alone PC that is connected with network is called Workstation. A
workstation is generally a Client.
NIC (Network Interface Card): The network Interface Card (NIC) is the
interface between the PC and physical network connection. It is also called as
Network Adapter Card. The NIC is responsible for the operation that tasks place
in the physical layer of the OSI model. It is only concerned with sending and
receiving) 0s and 1s, using the IEEE 802.3 Ethernet standard.
In windows, the NIC card is identified in the network property; to use protocol
with NIC you must bind the protocol to the adapter card.
Function of NIC:
Data Transfer
Data Buffering
Frame Construction
Media Access Control
Parallel/Serial Conversion
Data Encoding/Decoding
Data Transmission/Reception
1.1.3 Cables
To transmit the data the medium must exist, usually in the form of cables or
wireless media. Here are some most commonly used cable types.
1.1.3.1 Thick Coaxial Cables (thick net) (RG-11)
Thick coaxial cables or thick wire is known as the Ethernet standard RG-11. This
cable is mostly used as backbone cable, distributing Ethernet signal throughout a
building, an office complex or other large installation. It is used in 10base5
Ethernet standard. The length may be up to 500 meters with a max of
2
five segments connected by repeaters. This gives a total distance of 2500 meters.
This is called a network diameter. RG-11 cable is typically orange; with black
rings around the cable every 2.5-meter to allow taps into the cable.
1.1.3.2 Thin coaxial cables (thin net) (RG-58)
RG-58 is typically used for wiring laboratories and offices, or another small group
of computers. The maximum length of thin wire Ethernet segment is 185 meters,
which is due to the nature of the CSMA/CD method of operation, the cable
attenuation, and the speed at which signals propagate inside the coax.
The length is limited to guarantee that collision is detected when machines that
are apart transmit at the same time. BNC connectors are used to terminate each
end of the cable. When many machines are connected to the same Ethernet
segment, a daisy chain approach is used. The BNC connectors allow the network
interface card to the next machine. The machine each end of the cable must use a
terminating resistor to eliminate collision-causing reflection in the cable.
3
The BNC terminator is used at the end of the cable to prevent the reflection of
the signal.
Applications
1. Coaxial cable was widely used in analog telephone networks, and later with
digital telephone networks.
2. Cable TV networks use coaxial cables (RG-59) at the network boundaries.
However, coaxial cable has largely been replaced today with fiber-optic
cable due to its higher attenuation.
3. Traditional Ethernet LAN
– 10Base-2, or thin Ethernet, uses RG-58 coax cable with BNC connectors.
– 10Base-5, or thick Ethernet, uses RG-11 coax cable with specialized
connectors.
1.1.3.4 Twisted pair cables
Twisted pair is probably the most widely used cabling system in Ethernet in
networks. Two copper wires twist around each other to form the twisted pair cable.
Depending on category several insulated wire strands can reside in the cable.
Twisted pair is available in two basic types
a) Unshielded Twisted Pair (UTP)
b) Shielded Twisted Pair (STP)
4
communication and for hub-to-hub connections when no crossover port is
available.
Category Descriptor
1 Used for voice for data.
2 Contains four twisted pair and a data transmission up to 4 Mbps.
Used for some token ring network.
3 Contains four twisted pair and a data transmission up to 10 Mbps.
Used for some token ring network.
4 Contains four twisted pair and a data transmission up to 16 Mbps.
Used for some token ring network.
5 Contains four twisted pair and a data transmission up to 100 Mbps.
Used for some token ring network.
Category-5 cables can be purchased or crimped as either straight through or
crossed. A category-5 cable has 8 thin. Colours coded wires inside that run from
one end of the cable to the other. Ethernet networks for communication use only
wires 1, 2, 3 and to be connected in both jacks. Straight through cables are used
for connecting to a hub. Crossed cables are used for connecting a hub to another
hub (there is an exception: some hubs are a built in uplink port that is crossed
internally, which allows you to uplink hubs with a straight cable instead.) In a
straight through cable wires 1, 2, 3…. and 6 at the other end. In a crossed cable,
one order of the wires change from one end to the other wire 1 becomes 3 and 2
becomes 6.
For PC 2 PC Communication without HUB (Cross Cable Connection)
Sl. No. One Site Second Site Pin Configuration
01 Orange White Green White Transmit
02 Orange Green Transmit
03 Green White Orange White Receive
04 Blue Blue Not Use
05 Blue White Blue White Ground
06 Green Green Receive
07 Brown White Brown White DTR
08 Brown Brown DTS
For PC 2 PC Communication with HUB (Simple Cable Connection)
5
03 Green White Orange White Receive
04 Blue Blue Not Use
05 Blue White Blue White Ground
06 Green Green Receive
07 Brown White Brown White DTR
08 Brown Brown DTS
For One Cable in Two PC Communication through HUB (Simple Cable
Connection)
First Connection
Sl. No. One Site Second Site Pin Configuration
01 Orange White Green White Transmit
02 Orange Orange Transmit
03 Green White Green White Receive
04 Green Green Receive
Second Connection:
Sl. No. One Site Second Site Pin Configuration
01 Blue Green White Transmit
02 Blue White Orange Transmit
03 Brown White e Green White Receive
04 Brown Green Receive
Shielded Twisted Pair It is 150Ω cable containing additional shielding that
protects signals against electromagnetic Interference (EMI) produced by electric
motors power lines etc. It is primarily used in Token Ring Network & where UTP
cable would provide insufficient protection against interface. Wires within cables
are encased in a metallic sheath that is conductive as copper in wires. This sheath
when properly grounded converts it ambient noise into current, like antenna. This
current is carried to wires within where it creates an equal and opposite current
flowing in twisted pair thus getting cancelled and no noise signal is resulted.
Inside the Ethernet cable, there are 8 color coded wires, with all eight pins used as
conductors. These wires are twisted into 4 pairs and each pair has a common
6
color theme. RJ45 specifies the physical male and female connectors as well as
the pin assignments of the wires.
RJ45 uses 8P8C modular connector, which stands for 8 Position 8 Contact. It is a
keyed connector which means that the connector can be inserted only in a single
way. RJ45 is used almost exclusively to refer to Ethernet-type computer
connectors.
7
EXPERIMENT-2
1.0 Learning Objective: At the end of the session you will be able to be
familiar with different types of internetworking devices and their functions.
1.1 REPEATER
Repeaters
A common Ethernet rule is that no more than four repeaters may be used to join
segments together. This is a physical li/h WE7TxSAW2`` Zmitation designed
to keep collision detection working properly. Repeaters operate at layer 1
(Physical layer) of the OSI model.
1.2 BRIDGES
The networks bridge provides an inexpensive and easy way to connect network
segments. A bridge provides Amplification function of a repeater plus, ability to
select filter packets based on their addresses. When network grows in size, it is
often necessary to partition it in to smaller group of nodes to help isolate traffic
8
and improve performance. One way to do this is to use bridge, the operation of it
is to keep one segment traffic to that side and other side will cross the bridge. The
bridge learns which packets should cross it as it is used.
Bridged network
1.3 ROUTERS
A router is a device that connects two LANs together to form an inter-network. A
router is the basic building block of the Internet. Each router connects two or more
networks together by providing an interface for an Ethernet network and ring
network to which it is connected.
Routers
The router examines each packet of information to detection weather the packet
must be translated form on one network to another network performing a function
similar to a bridge. Unlike a ridge, a router can connect network that use
9
different technologies, addressing methods, media type, frame format and speeds.
A router is a special purpose device designed to interconnect networks. Such that
three networks can be connected using two routers. Routers maintain routing
tables in their memories to store information about the physical connection on he
network; the router examines each packet of data, checks the routing table and
then forwards the packet if necessary. Every other router in the path (between any
state destinations) performs a similar procedure. Note that a router does not
maintain any state information about the packets; it simply moves them along the
network. Routers are operated at layer 3(network) of OSI model.
1.4 GATEWAYS
A gateway is node in a network that serves as an entrance to another network. In
enterprises, the gateway node often acts as a proxy server and a firewall. The
gateway is also associated with both a switch, which provides the actual path for
the packet in and out of the gateway. It is also known as a computer system located
on earth that switches data signals and voice signals between satellites and
terrestrial networks. A gateway can operate at any layer of the OSI or TCP/IP
reference model. The hub of a gateway, also called a protocol converter, is much
more complex than that of a router or switch. Typically a gateway must convert
from one protocol stack to another. E.g. a gateway may connect a TCP/IP network
to an IPX. /SPX network. A Circuit Level Gateway function provided by
Application level gateway products enables trusted users on private network to
access Internet services with all security of a proxy server. An Application Level
Gateway provide much stricter form of security that packet filters, but they are
designed to regulate access only for a particular application.
1.5 HUBS
Hubs are also called concentrators; expand one Ethernet connection into many.
For example, a four-port hub connects up to four machines via UTP cables. The
hub provides a star connection for the four ports. Many hubs contains a single
BNC connectors as well to connect the hub to existing 10base2 network wiring,
the hub can also be connected via one of its ports. One pot is desired to operate
10
in either straight through or crossover mode, selected by a switch on the hub. Hubs
that can connect in this fashion are called stackable hubs. A hub is similar to a
repeater, expect it broadcasts data received by any port to all other ports on the
hub. Most hubs contain a small amount of intelligence as well. Examining
received packets and checking them for integrity. If a bad packet arrives or the
hub determines that a port is unreliable. It will shut down the line under the error
condition is appears. The hub also acts like a repeater. Because of its slight delay
when processing a packet, the numbers of hubs that may be connected in a series
are limited.
There are three types of HUB passive hub, active hub and intelligent hub.
The Passive hubs do not process data signals with only purpose to combine the
signal from several networks cables segments. All devices attached to the
passive hub receive another packets that pass through the hub .Hub does not
clear up or amplify the signals, on the contrary absorbs a small part of the signals
that is why the distance between a hub and a computer should not be more than
half of the permissible distance between two computers. Passive hubs have
limited functionality so are inexpensive and easy to configure. It has four ports
with four BNC (British Naval Connectors) female connectors to configure
networks station or terminated with a 93 Ω BNC Terminator. The active hubs
incorporate electronic components that amplify and cleanup the signals, that flaw
between devices on the network. The process of cleaning up signal is called
“signal regeneration”. The benefits of signals regeneration are:
A network is more robust i.e. less sensitive errors.
Distance between devices can be increased.
11
Active hubs cost is considerable more than passive hub (active hub function impart
as multi port repeaters). Intelligent hubs are enhanced active hubs the following
functions add intelligence to a hub. Intelligent Hubs are units have form of
integrated management capability.
Hub Management A hub supports networks network management protocols that
enable the hub to send packets to central network console. Theses protocols enable
network console to manage or control hub.
Switching hubs
Switching hubs include circuitry that quickly routes signals between ports on the
hub. Insured of repeating a packet to all ports on the hub, it repeats a packet only
to the port that connects to the destination computer for the packet.
1.6 SWITCHES
It is similar to a bridge, with some important enhancement. First, as witch may
have multiple ports, thus directing packets to several different segments further
partitioning and isolating network traffic in as way similar to router. For example,
if 8-port n way switch is there it can route packets from any input to any output.
Some or all of incoming packet is called store and forward, which stores the
received packet before examining it to for error before retransmitting. Bad packets
are not forwarded. A switch typically has auto-sensing 10/100 mbps ports and will
just the speed of each port accordingly; furthermore, a managed switch supports
SNMP for further control over network traffic. Switches operated at layer 2 (Data
Link) of OSI model.
12
EXPERIMENT-3
Aim: To study the working of Basic Networking Commands; hostname, ipconfig, ping,
host, telnet, ftp, net, arp, winipcg, nslookup, netstat
1.0 Learning objective:
At the end of the session you will be able to be familiar with working of different
networking commands like: hostname, ifconfig, ping, host, telnet, ftp, net, arp,
Winipcg, nslookup etc.
Networking Commands: The following commands are essentially used for
network management.
1.1 hostname
This command is used for finding host/domain name and IP address.
Example:
hostname with no options displays the machines host name
hostname –d displays the domain name the machine belongs to
hostname –f displays the fully qualified host and domain name
hostname –i displays the IP address for the current machine
1.2 ifconfig
This command will display the assigned IP address of ETHERNET
adapter.
Ubuntu : ifconfig | grep inet
Windows : ipconfig
1.3 ping
This command is used for checking the network connectivity.
Ping verifies IP-level connectivity to another TCP/IP device by sending
Internet Control Message Protocol (ICMP) Echo Request messages. If
received, the corresponding Echo Reply messages are displayed, along
with round-trip times. Otherwise, a timed-out request or an ICMP
unreachable message is displayed.
(i.e. You can “ping” an IP address to see if a machine is alive. If there is
no response, you know something is wrong)
1.4 host
This command is used for mapping name to IP addresses?
Example: host www.google.com
www.google.com has address 74.125.200.147
www.google.com has address 74.125.200.106
13
www.google.com has address 74.125.200.103
www.google.com has address 74.125.200.104
www.google.com has address 74.125.200.105
www.google.com has address 74.125.200.99
www.google.com has IPv6 address 2404:6800:4003:c00:: 69
1.5 telnet
This command is used for connecting to a host on a particular port.
Example: telnet osou.ac.in 80
telnet command is also used to make a connection to a remote machine
and execute programs as if one were physically present.
telnet (data are travelled without encryption; not secured)
1.6 ftp
This command allows you to send and receive files between two computers.
1.7 net
net command is used for checking/starting/stopping networking services,
users, messaging, configuration and so on... ?
1.8 arp
This command is used for displaying or manipulating the ARP (Address
Resolution Protocol) information on a network device or computer.
Explanation: The ARP protocol maps Layer 3 IP addresses to Layer 2
MAC addresses. If a packet must move across networks, the Layer 2 MAC
address changes with each hop across a router, but the Layer 3 address
never changes. ARP cache stores ARP address mappings. If the entry was
learned dynamically, it will eventually be deleted from cache. If the entry
was manually inserted in ARP cache, it is a static entry and will remain
until the computer is turned off or the ARP cache is manually flushed.
On Windows, arp displays and modifies entries in the Address Resolution
Protocol (ARP) cache, which contains one or more tables that are used to
store IP addresses and their resolved Ethernet or Token Ring physical
addresses. There is a separate table for each Ethernet or Token Ring
network adapter installed on your computer. Used without parameters, arp
displays help.
14
1.9 Winipcg
This command is used to know the IP configuration of the PC in a
graphical form. It shows the following in the windows command prompt.
IP Address
Subnet Mask
Type of H/W used for communication & it’s address
1.10 nslookup
This command displays information from Domain Name System (DNS)
name servers.
NOTE: If you write the command as above it shows as default your pc's
server name firstly.
1.11 netstat
This command is used for finding connection to and from the host?
Example:
netstat nap| grep port will display process id of application which is using
that port
netstat a or netstat –all will display all connections including TCP and
UDP
netstat tcp or netstat –t will display only TCP connection
netstat udp or netstat –u will display only UDP connection
netstat g will display all multicast network subscribed by this host.
15
EXPERIMENT-4
Note: The mouse does not work while installing Packed Tracer using CLI.
d. Use the tab key to select <Yes> and press Enter to accept the License Agreement.
16
Packet Tracer Download and Installation Instructions
Now you should be able to open Packet Tracer via the Application menu or the
command packettracer in the terminal.
macOS
a. Navigate to the location where you saved the Packet Tracer disk image (.dmg) file.
b. Double click the Packet Tracer disk image file.
c. Select Open.
d. The Setup dialog appears. Click Continue to view and accept the License Agreement. Read
through the agreement, click I accept the agreement, and then click Continue.
e. In the Ready to Install window, select Install. You may be prompted to enter your system
account password or security PIN for Packet Tracer to write system configurations.
f. When installation is finished, if the Create Maintenance Tool window opens, click Continue.
g. Click Done to complete the installation process.
h. Open Finder and go the Applications folder. Open the Cisco Packet Tracer folder and launch the
Cisco Packet Tracer application.
17
EXPERIMENT-5
Aim: Design and Simulation of star and bus topology on Cisco Packet Tracer
Learning objective:
At the end of the session, you will be able to create and simulate the
star and bus topology on Cisco Packet Tracer
Steps
Place 2 PCs and connect with cross cable .
18
-Similarly for second PC
- then assign the IP address to both PC for this click on PCs and go to
Desktop
19
-Click on IP configuration
20
Now click on simulation button
21
Add a pdu to PC A
22
Ipconfig for given connection.
23
Steps 1
Just place the 4 PC AND RENAME
24
Then connect all 4 pc to HUB with straight cable (not similar device)
Assign IP address to all Pcs and ping any PC to check the connectivity
25
Do a simulation and observe the behavior of the hub
26
Make the same topology with the switch and observe the behavior.
Creation of BUS topology
Step 1: Put 5 PC on design panel
Step 3; connect the similar devices with a cross cable and dissimilar device with straight cable
27
Step 4 : Assign IP to each PC e.g. 192.168.1.1 to 192.168.1.5
Step 5 : Test connection by ping any of the PC ( e.g. go to the command prompt in packet tracer
and ping 192.168.1.4
28
Step 6: for ease of observation put IP address of the PC aside with it using the note option
29
Step: 8 Observe the stepwise simulation and behavior of the topology
30
EXPERIMENT-6
Aim: Design and Simulation of mesh and Ring topology on Cisco Packet Tracer
Learning objective:
At the end of the session, you will be able to create and simulate the Mesh
and Ring topology on Cisco Packet Tracer
Designing of Mesh topology
31
Step 3: Connect all Switches in mesh form as shown in the screenshot.
Step 4: Connect all switches with their respective PCs as shown in the screenshot.
32
Step 6: Take a Simple PDU and select source and destination and do the simulation; observe the
behavior.
33
Step 2: Put 8 switches respective to each PC as shown in the screenshot.
Step 4: Connect all switches to their respective PCs with a straight cable.
34
Step 5: Assign IP address to Each PCs 192.168.0.1 to 192.168.0.8
Step 6: Take simple PDU and select the source and destination ,the do the simulation and observe
the behavior.
35
EXPERIMENT-7
Aim: Creating a simple Topology using a Router in Cisco Packet Tracer
Learning objective:
At the end of the session, Student will be able to create Topology using a
Router in Cisco Packet
Step 1: Place 1 router and 2 switches on the design panel, as shown in the figure below, and
change their names.
Step 2: Place 3 PC for each switch on the design panel, as shown in the figure below, and change
their names.
36
Step 3: Now connect the arrangement with a suitable cable. as shown in the figure below.
Step 4: To show the 2 different networks, just place a rectangular boundary as shown in the figure
below and tag each network by Name LAN1 And LAN 2
37
Note-> As you can see the connection from the route to the switch shows red triangles just because
yet we have not configured the router.
Step 5: To configure the router, just click on the router then go to the “config: tab. then click
Gigabit Ethernet 0/0
38
Step 6.1: Now Give the IP address 192.168.0.1 for left side Network (subnet mask automatically
appears) as shown in the figure.
Step 6.2 Now tick the check box “PORT STATUS” to on As shown in the figure.
39
Step 7: Similarly assign the IP Address 10.0.0.1 for right side Network, by assigning the IP address
Gigabit Ethernet 0/1 as step 6.
Note Now it has been observed the red triangles on the connections will appear green.
40
Step 8.1 : Now assign the IP addresses to LAN1’ PC’s ( Left side Network) from 192.168.0.2 to
192.168.0.4. and assign default gateway to each LAN1’s PC, IP ofGigabyteEthernet0/0 of router
i.e 192.168.0.1 as shown in figure
Step 8.2: Similarly assign the IP addresses to LAN2’ PC’s ( Right side Network) from 10.0.0.2 to
10.0.0.4 and assign default gateway to each LAN2’s PC, IP ofGigabyteEthernet0/1 of router i.e
10.0.0.1 as shown in figure.
41
Step 9: Now Take a simple PDU and select the ANY source (Any PC) from LAN1 and select the
destination (any PC ) from LAN 2. And observe the step-wise simulation.
42