113 - CN Lab Manual - 2022

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 76

COMPUTER NETWORKS

LAB MANUAL
(3161007)
ACADEMIC YEAR 2021-22
B.E. 6th Semester

Department of Electronics & Communication Engineering , L.D. College of


Engineering, Ahmedabad

Name : Saiyed Ismabanu A.


Enrollment no. : 190280111113
Div : B
Batch : B3

1
Enrollment No. : 190280111113 Computer Networks
CERTIFICATE

This is to certify that SAIYED ISMABANU ANWARULHAQUE


Enrollment No. 190280111113 of B.E. SEMESTER 6 class has
satisfactorily completed the Course in COMPUTER NETWORKS
(3161007) within four walls of L.D. College of Engineering, Ahmedabad –
380015.

Date of submission : 26/04/2022


Staff in charge : Prof. Kirit V. Shah
Head of Department : Prof. Mihir V. Shah

2
Enrollment No. : 190280111113 Computer Networks
INDEX :
Sr. No. Experiment Date SIGN

1 Exp - 1 : Introduction about the Cisco packet tracer. 27/10/2021

2 Exp - 2 : To design and simulate small LAN using 27/10/2021


Switch in Cisco packet tracer.
3 Exp - 3 : To study ICMP message using different 29/11/2021
Ping command.
4 Exp - 4 : To study router to switch configuration 26/11/2021
using cisco packet tracer.
5 Exp - 5 : To study router to router configuration 30/11/2021
using Cisco packet tracer.
6 Exp - 6 : To study difference between Hub and 11/01/2022
Switch using cisco packet tracer.
7 Exp - 7 : To study five Router to Router 11/01/2022
configuration using cisco packet tracer.
8 Exp - 8 : To perform static routing using Cisco 18/01/2022
Packet Tracer (Four Router).
9 Exp - 9 : To configure RIP on packet tracer. 25/01/2022

10 Exp - 10 : To configure wireless network and 25/01/2022


connect PC, Laptop, Smart phone.
11 Exp - 11 : To configure campus network using Cisco 01/02/2022
Packet Tracer.
12 Exp - 12 : To study the different type of Ethernet 08/02/2022
Cable and its Characteristics.
13 Exp - 13 : DHCP. 15/02/2022

14 Exp - 14 : Implement bit stuffing framing methods of 22/02/2022


the data link layer in C language.

3
Enrollment No. : 190280111113 Computer Networks
15 Exp - 15 : Implement Character stuffing framing 21/03/2022
methods of the data link layer in C language.
16 Exp - 16 : To configure home wireless network that 22/03/2022
connect/control home appliances.
17 Exp-17 : Write a C program to compute Cyclic 29/03/2022
redundancy code.
18 Exp-18 : To Study different types of Network 05/04/2022
Devices.
19 CERTIFICATE of cisco course. 12/04/2022

4
Enrollment No. : 190280111113 Computer Networks
EXPERIMENT - 1

Date : 27/10/2021

Aim : Introduction about the Cisco packet tracer.

What is Packet Tracer?Packet Tracer is a protocolsimulatordeveloped by Dennis Frezzoand his


team at Cisco Systems.Packet Tracer (PT) is apowerful anddynamic toolthat displaysthe various
protocols used in networking,in either Real Time or Simulation mode. This includes layer 2
protocols such as Ethernet and PPP, layer 3protocols such as IP, ICMP, and ARP, and layer 4
protocols such as TCP andUDP.Routing protocols canalso be traced.
Purpose: The purpose of this lab is to become familiar with the Packet Tracer interface.Learn how
to use existing topologies and build your own.
Requisite knowledge:This lab assumes some understanding of the Ethernet protocol.At this
point we have not discussed other protocols, but will use PacketTracer in later labs todiscuss
those as well.
Version: This lab is basedon Packet Tracer 4.0 Beta, Test1.

Introduction to the Packet Tracer Interface using aHubTopology


Step1: StartPacketTracerandEntering Simulation Mode.

5
Enrollment No. : 190280111113 Computer Networks
Step 2: Open anexistingtopology

Perform the following steps to open the2c1.pkt topology.

By default, the topology opens in Realtimemode. We will examine the difference between
Realtimeand Simulation modes in a moment.
Help can be
obtained by
using the Help
menu. Both
online help
one each topic
and tutorials
are available.
Please take
advantage of
this facilities.

To view the Ip address, subnet mask, default gateway, and MAC address of a host, move the cursor
over that computer. Be sure the Select box is checked at the top of the tool box.

6
Enrollment No. : 190280111113 Computer Networks
Viewing PC0
information using
the Select tool:

Once the file is


opened, clickthe
Simulation icon,
to enter
simulation
mode.
Simulation
mode allows you
to view the a
sequence of
events
associated with
the
communications
between twoor
more devices.
Realtimemode
performs the
operation with
all of the
sequence of
events
happening at
“real time”.

7
Enrollment No. : 190280111113 Computer Networks
Step3: PC0pingingPC1
For those notfamiliar with ping: We will examine pings and the ICMP protocol in much more detail
later. The ping program generates an IP packet with an encapsulated ICMP Echo Request message.It
is a tool used to test basic layer 2 and layer 3 communications between two devices.When the user
issues the ping command, most operating systems send multiple (four or five) ICMP Echo
messages.When the destination device receives the ping, Echo Request, it issues an Echo Reply.

Command issued from PC0: ping 192.168.10.37


Packet Tracer allows us to either issue the command from the command promptor to use the Add
Simple PDU tool. We will look at both ways to do this.
In order to view only the “pings”, in the Event List,click on ALL/NONE to clear all protocols, and
then click on ICMP to select only that protocol.

2
1
Using the Simple PDU Tool

One method for pinging a device from another device is to use the Simple PDU tool. This tool
performs the ping without having to issue the ping command.

Choose the Add Simple PDU tool from the tool box:

8
Enrollment No. : 190280111113 Computer Networks
Click once onPC0, the device
issuing the ping (ICMP Echo
Request) and then click once
on PC1 (the destination of the
ICMP Echo Request).
By clicking ontheCapture/Forward button, this will forward each event.For example, the firstevent
is the building of the ICMP packet and encapsulating it in an Ethernet frame.The next event will
send this Ethernet frame from the Ethernet NIC in PC0 to the Hub.

Continue to click on the Capture/Forward button and watch the ICMP Echo Requests and ICMP
Echo Replies. Notice that the hub floods all of the frames out all ports except the port incoming
port.
Normally, before the ICMPEcho Request, ping, is sent out by PC0, an ARP Request might first be
sent.We will discuss this later, but we disabled the display of ARP in the Event List earlier.
Note:Using this tool, only a single ping,ICMP Echo Request is sent by PC0, instead of the four
pingswhen using the command prompt.
When the ICMP Echo Request and ICMP Echo Reply isfinished,you will receive the following message

9
Enrollment No. : 190280111113 Computer Networks
Step 4: Viewing the frame (Protocol Analyzer)

To examine the actual protocols being sent, click on the coloredInfobox in the Event List.The
Event List shows where this Ethernet Frame is currently, “At Device”, the previous devices, “Last
Device”, and the type of information encapsulated in the Ethernet Frame, “Info”.
Single click on the first event’s Info box to view the Ethernet frame with the encapsulated IP
Packet and the encapsulatedICMP message “At Device” PC0.

The PDU (ProtocolData Unit) is displayed in two different formats, OSI Modeland Outbound PDU
Details. View them both, paying particular attention to the Layer 2 Ethernet frame.We will discuss
IP and ICMP later.

The default is the OSI Model view with a brief description with whatis occurring with this packet.
Click on the Outbound PDU Details tab to see the protocol details including the layer 2 Ethernet
frame, the layer 3IP packet and ICMP message.

10
Enrollment No. : 190280111113 Computer Networks
Looking at the Switch Algorithm and Switch MAC Address Tables

Step 1: Open the following topology

Open the file3s1.pkt

Notice that it is similar to the previous topology, but thelayer1 hub has been replacewith a layer2

switch. Click on theSimulation icon to switch to simulation mode.

11
Enrollment No. : 190280111113 Computer Networks
Use the Select tool
to view IP address
and
MAC address
information for the
various hosts.

Step 2: Viewing the Switch MAC Address Table

Use the
Inspect tool
to view the
MAC Address
Table of the
switch.

The MAC Address Table is empty as it has not learned any Source Ethernet MAC
Addresses.Notice that there is alsoa VLAN column in this table. This will be discussed in future
courses.

12
Enrollment No. : 190280111113 Computer Networks
Waiting for Spanning Tree Protocol (STP)

Note:Because of how Packet Tracer also simulates the SpanningTree Protocol(later), at times the
switch may show amber lights on its interfaces.Tocorrectthis,click the Realtimemode icon, wait for
the lights to turn green, and then click the Simulation mode icon, returning to where you left off.

Step 3: Setting the Event List Protocols and Viewing the MACAddress Table

Set the Event List Filtersto include both ICMP andARP.We need to includethe display of ARP to
better examine how the switch MAC Address Table gets updated.(morelater)

If you haven’t
doneso
already, use
the Inspect
tool to view
the MAC
Address
Table of the
switch.

13
Enrollment No. : 190280111113 Computer Networks
Step 3: Issuing a Ping and Viewing the MACAddress Table

Using the Add Simple PDU perform a ping from PC0to PC1.Choose theAddSimple PDU tool
from the tool box:

This is the same as doing:

Click once onPC0, the device issuing the ping (ICMP Echo Request) andthen click once on PC1 (the
destination of the ICMP Echo Request).

ARP Request
Before PC0can send the ICMP EchoRequest, ping, it needs to send an ARP Request.We will talk
about this later, butan ARP (Address Resolution Protocol)Request is how a host that knows the
Destination IP Address of a device discovers the Ethernet Destination MACAddress for that same
device.(more later)So, the ICMP Echo Request, ping is puton hold, stored in memory and an
ARPRequest is transmitted first.

14
Enrollment No. : 190280111113 Computer Networks
To view the ARP Request, click on the Info box in theEvent List.Notice the Destination
MACAddress is a broadcast, 481 bits or 12Hexadecimal Fs.

Click the Capture/Forwardbutton to advance to the next event, theARP Request going
fromPC0 to the switch.

Notice that the switch’s MAC Address Table is updated with the Source MAC Address of PC0
and the incoming portnumber.

ARP
Request

15
Enrollment No. : 190280111113 Computer Networks
The packet is flooded out all ports because the Destination MAC Address of an ARP Request is a
broadcast(48 1 bits or all F’s in Hex).

ARP
Request

ARP Reply
PC2 and PC3ignore the ARP Request because PC0isonly asking for the owner of the IP Address
172.16.1.2 toreply.PC1 now sends back an ARP Reply with its MAC Address.(Again, thiswill be
discussed later.)This time the switch updatesits MAC Address Table withthe Ethernet Source MAC
Address of PC1 and the incoming port number.

ARP
Repl
y

16
Enrollment No. : 190280111113 Computer Networks
If you want to view the protocol details ofthe ARP Reply, click on the Info box in the Event List.

Continue to click on the Capture/Forward button until the ARP Reply reaches PC0.Because the ARP
Reply is encapsulated in an Ethernet frame with a unicastDestination MAC Address andthat MAC
Address is in the switch’s MAC Address Table, theswitch filters the frame by only sending it out Port
FastEthernet0/1.

ARP
Repl
y

17
Enrollment No. : 190280111113 Computer Networks
Ping: ICMP Echo Request

PC0 now has the Destination MAC Address for PC1’s IPAddress, so it can nowsend out the ICMP
EchoRequest, ping.

ICMP Echo
Request,
ping

If you want to view the protocol details ofthe ICMP Echo Request, click on the Info box in the
Event List. Notice that the DestinationMAC Address is a unicast.

18
Enrollment No. : 190280111113 Computer Networks
The switch has the Source MAC Address in its table so it resets the 5 minute timer.The switch also
has theDestination MAC address in its table so itfilters the frame by forwarding it out of only port
FastEthernet0/2.

ICMP Echo
Request,
ping

Ping: ICMP Echo Reply

PC1 returns an ICMP Echo Reply.

ICMP
Echo
Reply
, ping

19
Enrollment No. : 190280111113 Computer Networks
If you want to view the protocol details ofthe ICMP Echo Reply, click on the Info box in the
Event List. Notice that the DestinationMAC Address is a unicast.

The switch has the Source MAC Address in its table so itresets the 5 minute timer.The switch also
has theDestination MAC address in its table so itfilters the frame by forwarding it out of only port
FastEthernet0/1.

ICMP
Echo
Reply
, ping

20
Enrollment No. : 190280111113 Computer Networks
Output
The result of the command is:

Step 4: Play
A good way to learn newsoftware is to play and experiment.Trydifferent tools, look at various
protocols using the Event List and the Info box, and use the Help and Tutorials. Have fun!
Resetting the Network
Whenever you want to reset the network and begin the simulation again, perform the following
tasks: Click Delete in the PDU area.

Now, reset the network and confirm the action.

21
Enrollment No. : 190280111113 Computer Networks
Conclusion:-
Hence from this experiment we have studied about the full introduction about the Cisco Packet
tracer. I have also certificate of this experiment.

22
Enrollment No. : 190280111113 Computer Networks
EXPERIMENT - 2

Date : 27/10/2021

AIM : To design and simulate small LAN using Switch in Cisco packet
tracer.

LAN NETWORK:
LAN stands for Local Area Network.
A local area network is a computer network that interconnects computers within
a limited area such as a residence, school, laboratory, university campus or office
building.

NECESSARY EQUIPMENTS:
1. Switch PT
2. PCs
3. Wires

PROCEDURE:
1. Configure a Small LAN using switch, PCs and wires.
2. Give IP address to each PC.
3. IP address of PC0 : 192.168.0.1
4. IP address of PC1 : 192.168.0.2
5. IP address of PC2 : 192.168.0.3
6. Test connectivity between network devices.
7. Transfer Packet from Source to Destination and check status for the same.

23
Enrollment No. : 190280111113 Computer Networks
SIMULATION IN CISCO PACKET TRACER:

24
Enrollment No. : 190280111113 Computer Networks
CONCLUSION :
From this experiment we have studied about the simulation of small LAN network
in cisco packet tracer and after that we have verified the network.

25
Enrollment No. : 190280111113 Computer Networks
EXPERIMENT - 3

Date : 29/11/2021

AIM: To study ICMP message using different Ping command.


THE PING COMMAND :
The ping command is a very common method for troubleshooting the accessibility of
devices. It uses a series of Internet Control Message Protocol (ICMP) Echo messages
to determine:
• Whether a remote host is active or inactive.

• The round-trip delay in communicating with the host.

• Packet loss.

The ping command first sends an echo request packet to an address, then waits for a
reply. The ping is successful only if:
• the echo request gets to the destination, and

• the destination is able to get an echo reply back to the source within a
predetermined time called a timeout. The default value of this timeout is two
seconds on Cisco routers.

NECESSARY EQUIPMENTS:
1. Switch PT
2. PCs
3. Wires

PROCEDURE:
1. Configure a network using Switch, PCs and wires.
2. Verify connectivity.
3. Go to the PC0.
4. On PC0, access the command prompt from desktop tab.
26
Enrollment No. : 190280111113 Computer Networks
5. In command prompt type IP address of PC0 in this way : ping 10.0.0.1.
6. In this way, do this procedure on all PCs.

SIMULATION IN CISCO PACKET TRACER:

27
Enrollment No. : 190280111113 Computer Networks
CONCLUSION :
After doing this experiment we can conclude that, Ping command calculates
packet loss statics and display a brief summary on completion.

28
Enrollment No. : 190280111113 Computer Networks
EXPERIMENT - 4

Date : 26/11/2021

AIM : To study router to switch configuration using cisco packet tracer.

ROUTER TO SWITCH CONFIGURATION :


NECESSARY EQUIPMENTS:
1. Switch PT
2. Router
3. PCs
4. Laptop
5. Wires

PROCEDURE :
1. Configure a network using Routers, Switches, PCs, Laptop and Wires.
2. Give IP address and gateway to all PCs and Laptop.
3. Click on Router0.
4. In Config go to the FastEthernet0/0 and give IP address and subnet mask.
5. In Config go to the FastEthernet1/0 and give IP address and subnet mask.
6. Then turn it ON.
7. At the end, Transfer packets from source to Destination and check status for
the same.

29
Enrollment No. : 190280111113 Computer Networks
SIMULATION IN CISCO PACKET TRACER:

30
Enrollment No. : 190280111113 Computer Networks
CONCLUSION :
Hence, From this experiment we have studied about how to create router to switch
configuration network using cisco packet tracer.

31
Enrollment No. : 190280111113 Computer Networks
EXPERIMENT - 5

Date : 30/11/2021

AIM : To study router to router configuration using Cisco packet tracer.


ROUTER TO ROUTER CONFIGURATION :
A router is a networking device that forwards data packets between computer
networks. Routers perform the traffic directing functions on the Internet. Data sent
through the internet, such as a web page or email, is in the form of data packets. A
packet is typically forwarded from one router to another router through the
networks that constitute an internetwork (e.g. the Internet) until it reaches its
destination node.

NECESSARY EQUIPMENTS:
1. Routers
2. Switches
3. PCs
4. Wires

PROCEDURE:
1. Configure a network using Routers, Switches, PCs and Wires.
2. Give IP address and gateway to all PCs.
3. Click on Router0.
4. In Config go to the FastEthernet0/0 and give IP address and subnet mask.
5. Then turn it ON.
6. Then go to the serial2/0 and give IP address and subnet mask and turn it on.
7. Follow same procedure for Router1.
8. At the end, Transfer packets and check status for the same.
32
Enrollment No. : 190280111113 Computer Networks
SIMULATION IN CISCO PACKET TRACER:

33
Enrollment No. : 190280111113 Computer Networks
CONCLUSION :
Hence, From this experiment we have studied about how to create router to router
configuration network using cisco packet tracer.

34
Enrollment No. : 190280111113 Computer Networks
EXPERIMENT - 6

Date : 11/01/2022

AIM : To study difference between Hub and Switch using cisco packet tracer.

HUB:
Hub is a networking devices which is used to transmit the signal to each port
(except one port) to respond from which the signal was received. Hub is operated
on Physical layer. In this packet filtering is not available. It is of two types: Active
Hub, Passive Hub.

SWITCH:
Switch is a network device which is used to enable the connection establishment
and connection termination on the basis of need. Switch is operated on Data link
layer. In this packet filtering is available. It is type of full duplex transmission mode
and it is also called efficient bridge.

35
Enrollment No. : 190280111113 Computer Networks
NECESSARY EQUIPMENTS:
1. Hub
2. Switch
3. PCs
4. Wires

PROCEDURE:
1. Configure a network using Hub, Switche, PCs and Wires.
2. Give IP address and gateway to all PCs.
3. Test connectivity between network devices.
4. Transfer Packet from Source to Destination and check status for the same.

SIMULATION IN CISCO PACKET TRACER:

36
Enrollment No. : 190280111113 Computer Networks
CONCLUSION :
After doing this experiment we can conclude that, Hub transfers data to all ports
which are connected and Switch transfers data onto the port which are addressed.

37
Enrollment No. : 190280111113 Computer Networks
EXPERIMENT - 7

Date : 11/01/2022

AIM : To study five Router to Router configuration using cisco packet tracer.
ROUTER TO ROUTER CONFIGURATION :
A router is a networking device that forwards data packets between computer
networks. Routers perform the traffic directing functions on the Internet. Data sent
through the internet, such as a web page or email, is in the form of data packets. A
packet is typically forwarded from one router to another router through the
networks that constitute an internetwork (e.g. the Internet) until it reaches its
destination node.

NECESSARY EQUIPMENTS:
1. Routers
2. Switches
3. PCs
4. Laptop
5. Wires

PROCEDURE:
1. Configure a network using Routers, Switches, PCs, Laptop and Wires.
2. Give IP address and gateway to all PCs.
3. Click on Router0.
4. In Config go to the FastEthernet0/0 and give IP address and subnet mask.
5. Then turn it ON.
6. Then go to the serial2/0 and give IP address and subnet mask and turn it on.
7. Follow same procedure for Router1, Router2, Router3, Router4.
8. Test connectivity between network devices.
38
Enrollment No. : 190280111113 Computer Networks
9. Transfer Packet from Source to Destination and check status for the same.

SIMULATION IN CISCO PACKET TRACER:

39
Enrollment No. : 190280111113 Computer Networks
CONCLUSION :
Hence, From this experiment we have studied about how to create five router to
router configuration network using cisco packet tracer.

40
Enrollment No. : 190280111113 Computer Networks
EXPERIMENT - 8

Date : 18/01/2022

AIM : To perform static routing using Cisco Packet Tracer (Four Router).

STATIC ROUTINE USING FOUR ROUTER:


Static routing is a form of routing that occurs when a router uses a manually-
configured routing entry, rather than information from dynamic routing traffic. [1]
In many cases, static routes are manually configured by a network administrator by
adding in entries into a routing table, though this may not always be the case.[2]
Unlike dynamic routing, static routes are fixed and do not change if the network is
changed or reconfigured.

NECESSARY EQUIPMENTS:
1. Routers
2. Switches
3. PCs
4. Wires

PROCEDURE:
1. Configure a network using Routers, Switches, PCs and Wires.
2. Assign IP address to each PC with gateway IP.
3. Assign IP address to each router one by one.
4. Configure Static route over all four routers.
5. At the end check the communication between two PCs to test whether
routing is properly configured or not.

41
Enrollment No. : 190280111113 Computer Networks
SIMULATION IN CISCO PACKET TRACER:

42
Enrollment No. : 190280111113 Computer Networks
CONCLUSION :
Hence, From this experiment we have studied about how to create static routing
network using cisco packet tracer.

43
Enrollment No. : 190280111113 Computer Networks
EXPERIMENT - 9

Date : 25/01/2022

AIM : To configure RIP on packet tracer.

RIP CONFIGURATION :
RIP Stands for Routing Information Protocol.

Routing Information Protocol (RIP) is a dynamic routing protocol which uses


hop count as a routing metric to find the best path between the source and
the destination network.

NECESSARY EQUIPMENTS:
1. Routers
2. Switches
3. PCs
4. Wires

PROCEDURE:
1. Configure a network using Routers, Switches, PCs and Wires.
2. Assign IP address to each PC with gateway IP.
3. Assign IP address to each router one by one.
4. Click on Router0.
5. In Config go to the RIP Routing and give Network addresses.
6. Follow same procedure for Router1 and Router2.
7. At the end, Transfer packets and check status for the same.

44
Enrollment No. : 190280111113 Computer Networks
SIMULATION IN CISCO PACKET TRACER:

45
Enrollment No. : 190280111113 Computer Networks
CONCLUSION :
Hence, From this experiment we have studied about how to configure RIP
network using cisco packet tracer.

46
Enrollment No. : 190280111113 Computer Networks
EXPERIMENT - 10

Date : 25/01/2022

AIM : To configure wireless network and connect PC, Laptop, Smart phone.
WIRELESS NETWORK :
Computer networks that are not connected by cables are called wireless networks.
A wireless network is a computer network that uses wireless data connections
between network nodes.
Wireless networking is a method by which homes, telecommunications networks
and business installations avoid the costly process of introducing cables into a
building, or as a connection between various equipment locations. Admin
telecommunications networks are generally implemented and administered using
radio communication. This implementation takes place at the physical level (layer)
of the OSI model network structure.
Examples of wireless networks include cell phone networks, wireless local area
networks (WLANs), wireless sensor networks, satellite communication networks,
and terrestrial microwave networks.

NECESSARY EQUIPMENTS:
1. Router
2. Switch
3. PCs
4. Access Point
5. Printer
6. Laptop
7. Tablet
8. Smartphone
9. Wires

47
Enrollment No. : 190280111113 Computer Networks
PROCEDURE:
1. Configure a network using Router, Switch, Access point, Printer, Laptop,
Tablet, Smartphone, PCs and Wires.
2. Assign IP address to each component.
3. Configure DHCP on wireless components.
4. Enter Default as SSID.
5. Enter WEP key as 1234567890.
6. At the end, Transfer packets and check status for the same.

SIMULATION IN CISCO PACKET TRACER:

48
Enrollment No. : 190280111113 Computer Networks
CONCLUSION :

Hence, From this experiment we have studied about how to configure wireless
network using cisco packet tracer.

49
Enrollment No. : 190280111113 Computer Networks
EXPERIMENT - 11

Date : 01/02/2022

AIM : To configure campus network using cisco packet tracer.

NECESSARY EQUIPMENTS:
1. Router
2. Switches
3. PCs
4. Access point
5. Printers
6. Wires

PROCEDURE:
1. Configure a network using Router, Switch, Access point, Printer, PCs and
Wires.
2. Assign IP address to PCs.
3. Assign IP address to Router.
4. Configure a wireless network using Access point.
5. Check connectivity.
6. At the end, Transfer packets and check status for the same.

50
Enrollment No. : 190280111113 Computer Networks
SIMULATION IN CISCO PACKET TRACER:

51
Enrollment No. : 190280111113 Computer Networks
CONCLUSION :
Hence, From this experiment we have studied about how to configure campus
network using cisco packet tracer.

52
Enrollment No. : 190280111113 Computer Networks
EXPERIMENT - 12

Date : 08/02/2022

AIM : To study the different type Ethernet Cable and it’s characteristics.
CASE STUDY ON ETHERNET CABLE
WHAT IS AN ETHERNET CABLE :
An Ethernet cable, sometimes referred to as a network cable, is a cord that runs from a router,
modem, or network switch to your computer, giving your device access to the local area
network (LAN) — in other words, giving it internet access.

HOW TO CONNECT AN ETHERNET CABLE?


Connecting an Ethernet cable is easy. Here's how simple it is:

1. Plug an Ethernet cable into your computer.

2. Plug the other end of the Ethernet cable into one of your hub's Ethernet ports.

3. You should now have established an Ethernet connection, and your computer is now
ready to start surfing the internet.

TYPES OF ETHERNET CABLES :


There are three cable types commonly used for Ethernet cabling: coaxial, twisted pair, and
fiber-optic cabling. In today’s LANs, the twisted pair cabling is the most popular type of cabling,
but the fiber-optic cabling usage is increasing, especially in high performance networks. Coaxial
cabling is generally used for cable Internet access. Let’s expain all three cable types in more
detail.

53
Enrollment No. : 190280111113 Computer Networks
Coaxial cabling :
A coaxial cable has an inner conductor that runs down the middle of the cable. The conductor is
surrounded by a layer of insulation which is then surrounded by another conducting shield,
which makes this type of cabling resistant to outside interference. This type of cabling comes in
two types – thinnet and thicknet. Both types have maximum transmission speed of 10 Mbps.
Coaxial cabling was previously used in computer networks, but today are largely replaced by
twisted-pair cabling

Twisted-pair cabling :
A twisted-pair cable has four pair of wires. These wires are twisted around each other to reduce
crosstalk and outside interference. This type of cabling is common in current LANs.

Twisted-pair cabling can be used for telephone and network cabling. It comes in two
versions, UTP (Unshielded Twisted-Pair) and STP (Shielded Twisted-Pair). The difference
between these two is that an STP cable has an additional layer of insulation that protects data
from outside interferences.

54
Enrollment No. : 190280111113 Computer Networks
Fiber-optic cabling :
This type of cabling uses optical fibers to transmit data in the form of light signals. The cables
have strands of glass surrounded by a cladding material

This type of cabling can support greater cable lengths than any other cabling type (up to a couple of
miles). The cables are also immune to electromagnetic interference. As you can see, this cabling method
has many advantages over other methods but its main drawback is that it is more expensive

USES OF ETHERNET :
1. Ethernet is used to connect different devices in a network with each other and even
now this method is the best one for creating a Local Area Network that is LAN or Wide
Area Network that is WAN.
2. Ethernet is also used to connect Wi-Fi router or modem to the internet entry port or
telephone line.
3. It can also be used to wirelessly connect items that require the internet or a network
to function, such as televisions, laptops, and other electronic gadgets.
4. For different organizations, such as company headquarters, school campuses, and
hospitals, local networks are employed. Ethernet is popular because of its speed,
security, and dependability.
5. Ethernet is sometimes also used for creating a same environment in the gaming for 2-
3 players and is liable because of it’s high speed without any interference.

55
Enrollment No. : 190280111113 Computer Networks
WHAT IS RJ45 AND WHAT ARE ITS USES?
RJ45 is a kind of connector usually employed for Ethernet networking. It looks very similar to a
phone jack but is slightly bigger. Considering that Ethernet wires have an RJ45 connector on
each end, Ethernet cables are usually also named RJ45 cables. RJ45 is the most recognized and
popular connector type in the IT industry.

An RJ45 cable is fundamentally utilized to connect devices over an Ethernet connection. Devices
like computers, printers, network storage devices, and cable or DSL modems are able to use an
RJ45 connection. Being able to identify an RJ45 cable is necessary when trying to connect
devices to a network. RJ45 wires could be wired in two different ways. One version is called T-
568B and the other is known as T-568A.

WHAT IS STRAIGHT THROUGH CABLE?

Straight Through Cable


Straight-through cable is a type of CAT5 with RJ-45 connectors at each end, and each has the
same pin out. It is in accordance with either the T568A or T568B standards. It uses the same
color code throughout the LAN for consistency. This type of twisted-pair cable is used in LAN to
connect a computer or a network hub such as a router. It is one of the most common types of
network cable.

56
Enrollment No. : 190280111113 Computer Networks
WHAT IS CROSSOVER CABLE?

Crossover Cable
A Crossover cable is a type of CAT 5 where one end isT568A configuration and the other end as
T568BConfiguration. In this type of cable connection, Pin 1 is crossed with Pin 3, and Pin 2 is
crossed with Pin 6.

Crossover cable is used to connect two or more computing devices. The internal wiring of
crossover cables reverses the transmission and receive signals. It is widely used to connect two
devices of the same type: e.g., two computers or two switches to each other.

EXAMPLE :

57
Enrollment No. : 190280111113 Computer Networks
EXPERIMENT - 13

Date : 15/02/2022

AIM : To study network using DHCP.

NECESSARY EQUIPMENTS:
1. Routers
2. Switch
3. PCs
4. Server
5. Wires

PROCEDURE:
1. Configure a network using Router, Switch, Server, PCs and Wires.
2. Configure DHCP to PCs.
3. Assign IP address to Routers.
4. Configure network using DHCP.
5. Check Connectivity.
6. At the end, Transfer packets and check status for the same.

58
Enrollment No. : 190280111113 Computer Networks
SIMULATION IN CISCO PACKET TRACER:

59
Enrollment No. : 190280111113 Computer Networks
CONCLUSION :
Hence, From this experiment we have studied about how to configure DHCP
network using cisco packet tracer.

60
Enrollment No. : 190280111113 Computer Networks
EXPERIMENT - 14

Date : 22/02/2022

AIM : Implement bit stuffing framing methods of the data link layer in C
language.

BIT STUFFING METHOD :


Bit Stuffing is a process of inserting an extra bit as 0, once the frame sequence
encountered 5 consecutive 1’s. Given an array, arr[] of size N consisting of 0’s
and 1’s, the task is to return an array after the bit stuffing.

BIT STUFFING IN C COMPILER :

61
Enrollment No. : 190280111113 Computer Networks
CONCLUSION :
Hence, From this experiment we have studied about how to implement bit stuffing
framing method of data link layer using C code in any C compiler.

62
Enrollment No. : 190280111113 Computer Networks
EXPERIMENT - 15

Date : 21/03/2022

AIM : Implement Character stuffing framing methods of the data link layer in C
language.

CHARACTER STUFFING METHOD :


In byte stuffing (or character stuffing), a particular byte is added to the data section of
the frame when there is a character with the same pattern as the flag. The data section
is stuffed with an extra byte. This byte is usually known as the escape character
(ESC), which has a predefined bit pattern. Whenever the receiver encounters the ESC
character, it deletes it from the data section and treats the next character as data, not a
delimiting flag.

CHARACTER STUFFING IN C COMPILER :

63
Enrollment No. : 190280111113 Computer Networks
CONCLUSION :
Hence, From this experiment we have studied about how to implement character
stuffing framing method of data link layer using C code in any C compiler.

64
Enrollment No. : 190280111113 Computer Networks
EXPERIMENT - 16

Date : 22/03/2022

AIM : To configure home wireless network that connect/control home


appliances.

HOME AUTOMATION :
Home automation or domotics is building automation for a home, called a smart
home or smart house. A home automation system will monitor and/or control
home attributes such as lighting, climate, entertainment systems, and appliances.
It may also include home security such as access control and alarm systems. When
connected with the Internet, home devices are an important constituent of the
Internet of Things ("IoT").

NECESSARY EQUIPMENTS:
1. Switch
2. Server
3. Laptop
4. Wireless Router
5. Fan
6. Door
7. Window
8. Light
9. Garage Door
10.Wires

PROCEDURE:
1. Configure a network using Router, Switch, Server, Laptop, Fan, Door,
Window, Light, Garage Door and Wires.
2. Assign IP address and Gateway IP to Server.
65
Enrollment No. : 190280111113 Computer Networks
3. Assign IP address and Gateway IP to Laptop.
4. Click on server.
5. In services go to the AAA and Assign Client name and Client IP and turn it
ON.
6. Then Enter username and password of each component.
7. Click On Fan.
8. In Config go to the wireless0 and Enter SSID.
9. Then select WPA2 and Enter user id and password.
10.Follow the same process for Door, Window, Light and Garage Door.
11.In Laptop go to the desktop and then IOT monitor and Enter Username and
password.
12.At the last turn on and off components using server and check status for all
components.

SIMULATION IN CISCO PACKET TRACER:

66
Enrollment No. : 190280111113 Computer Networks
CONCLUSION :
Hence, From this experiment we have studied about how to configure home
wireless network that connect or control home appliances on packet tracer.

67
Enrollment No. : 190280111113 Computer Networks
EXPERIMENT - 17

Date : 29/03/2022

AIM : Write a C program to compute Cyclic redundancy code.

CYCLIC REDUNDANCY IN COMPUTER NETWORK :


A cyclic redundancy check (CRC) is an error-detecting code commonly used
in digital networks and storage devices to detect accidental changes to
digital data. Blocks of data entering these systems get a short check value
attached, based on the remainder of a polynomial division of their contents.

PROGRAM TO IMPLEMENTCYCLIC REDUNDANCY


CHECK:

68
Enrollment No. : 190280111113 Computer Networks
CONCLUSION :
Hence, From this experiment we have studied about how to implement cyclic
redundancy code of data link layer using C code in any C compiler.

69
Enrollment No. : 190280111113 Computer Networks
EXPERIMENT - 18

Date : 05/04/2022

AIM : Case study on Network devices.


NETWORK DEVICES
DEFINITION :
The devices employed for interaction between various hardware in the
computer network are known as networking devices.

TYPES OF NETWORK DEVICES :


Here is the common network device list:

• Hub
• Switch
• Router
• Gateway
• Access Point

HUB :
Hubs connect multiple computer networking devices together. A hub also acts as a
repeater in that it amplifies signals that deteriorate after traveling long distances over

70
Enrollment No. : 190280111113 Computer Networks
connecting cables. A hub is the simplest in the family of network connecting devices
because it connects LAN components with identical protocols.

A hub can be used with both digital and analog data, provided its settings have
been configured to prepare for the formatting of the incoming data. For example, if

the incoming data is in digital format, the hub must pass it on as packets; however,
if the incoming data is analog, then the hub passes it on in signal form.

Hubs do not perform packet filtering or addressing functions; they just send data
packets to all connected devices. Hubs operate at the Physical layer of the Open
Systems Interconnection (OSI) model. There are two types of hubs: simple and
multiple port.

SWITCH :
Switches generally have a more intelligent role than hubs. A switch is a multiport
device that improves network efficiency. The switch maintains limited routing
information about nodes in the internal network, and it allows connections to
systems like hubs or routers. Strands of LANs are usually connected using switches.

Generally, switches can read the hardware addresses of incoming packets to


transmit them to the appropriate destination.

71
Enrollment No. : 190280111113 Computer Networks
Using switches improves network efficiency over hubs or routers because of the
virtual circuit capability. Switches also improve network security because the virtual
circuits are more difficult to examine with network monitors. You can think of a
switch as a device that has some of the best capabilities of routers and hubs
combined. A switch can work at either the Data Link layer or the Network layer of
the OSI model. A multilayer switch is one that can operate at both layers, which
means that it can operate as both a switch and a router. A multilayer switch is a
high-performance device that supports the same routing protocols as routers.

ROUTER :
Routers help transmit packets to their destinations by charting a path through the
sea of interconnected networking devices using different network topologies.
Routers are intelligent devices, and they store information about the networks
they’re connected to. Most routers can be configured to operate as packet-filtering
firewalls and use access control lists (ACLs). Routers, in conjunction with a channel
service unit/data service unit (CSU/DSU), are also used to translate from LAN
framing to WAN framing. This is needed because LANs and WANs use different
network protocols. Such routers are known as border routers. They serve as the
72
Enrollment No. : 190280111113 Computer Networks
outside connection of a LAN to a WAN, and they operate at the border of your
network.

Router are also used to divide internal networks into two or more subnetworks.
Routers can also be connected internally to other routers, creating zones that
operate independently. Routers establish communication by maintaining tables
about destinations and local connections. A router contains information about the
systems connected to it and where to send requests if the destination isn’t known.
Routers usually communicate routing and other information using one of three
standard protocols: Routing Information Protocol (RIP), Border Gateway Protocol
(BGP) or Open Shortest Path First (OSPF).

Routers are your first line of defense, and they must be configured to pass only
traffic that is authorized by network administrators. The routes themselves can be
configured as static or dynamic. If they are static, they can only be configured
manually and stay that way until changed. If they are dynamic, they learn of other
routers around them and use information about those routers to build their
routing tables.

Routers are general-purpose devices that interconnect two or more heterogeneous


networks. They are usually dedicated to special-purpose computers, with separate
input and output network interfaces for each connected network. Because routers
and gateways are the backbone of large computer networks like the internet, they

73
Enrollment No. : 190280111113 Computer Networks
have special features that give them the flexibility and the ability to cope with
varying network addressing schemes and frame sizes through segmentation of big
packets into smaller sizes that fit the new network components. Each router
interface has its own Address Resolution Protocol (ARP) module, its own LAN
address (network card address) and its own Internet Protocol (IP) address. The
router, with the help of a routing table, has knowledge of routes a packet could take
from its source to its destination. The routing table, like in the bridge and switch,
grows dynamically. Upon receipt of a packet, the router removes the packet
headers and trailers and analyzes the IP header by determining the source and
destination addresses and data type, and noting the arrival time. It also updates the
router table with new addresses not already in the table. The IP header and arrival
time information is entered in the routing table. Routers normally work at the
Network layer of the OSI model.

GATEWAY :
Gateways normally work at the Transport and Session layers of the OSI model. At
the Transport layer and above, there are numerous protocols and standards from
different vendors; gateways are used to deal with them. Gateways provide
translation between networking technologies such as Open System Interconnection
(OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP). Because of this,
gateways connect two or more autonomous networks, each with its own routing
algorithms, protocols, topology, domain name service, and network administration
procedures and policies.

74
Enrollment No. : 190280111113 Computer Networks
ACCESS POINT :
While an access point (AP) can technically involve either a wired or wireless
connection, it commonly means a wireless device. An AP works at the second OSI
layer, the Data Link layer, and it can operate either as a bridge connecting a
standard wired network to wireless devices or as a router passing data
transmissions from one access point to another.

Wireless access points (WAPs) consist of a transmitter and receiver (transceiver)


device used to create a wireless LAN (WLAN). Access points typically are separate
network devices with a built-in antenna, transmitter and adapter. APs use the
wireless infrastructure network mode to provide a connection point between
WLANs and a wired Ethernet LAN. They also have several ports, giving you a way to
expand the network to support additional clients. Depending on the size of the
network, one or more APs might be required to provide full coverage. Additional
APs are used to allow access to more wireless clients and to expand the range of
the wireless network. Each AP is limited by its transmission range — the distance a
client can be from an AP and still obtain a usable signal and data process speed.
The actual distance depends on the wireless standard, the obstructions and
environmental conditions between the client and the AP. Higher end APs have high-
powered antennas, enabling them to extend how far the wireless signal can travel.

APs might also provide many ports that can be used to increase the network’s size,
firewall capabilities and Dynamic Host Configuration Protocol (DHCP) service.
Therefore, we get APs that are a switch, DHCP server, router and firewall.

75
Enrollment No. : 190280111113 Computer Networks
CERTIFICATE OF CISCO COURSE

76
Enrollment No. : 190280111113 Computer Networks

You might also like