Professional Documents
Culture Documents
CN Practicals
CN Practicals
CN Practicals
2028192
Practical 1. To study the different types of Network Cables and Network topologies.
Page 1
Subject Code: BTCS-507-18 Roll No. 2028192
Fibre optic cable: Fiber optic cabling consists of a center glass core surrounded by
several layers of protective materials .It transmits light rather than electronic signals
eliminating the problem of electrical interference. This makes it ideal for certain
environments that contain a large amount of electrical interference. It has also made it
the standard for connecting networks between buildings, due to its immunity to the
effects of moisture and lighting. Fiber optic cable has the ability to transmit signals
overmuch longer distances than coaxial and twisted pair. It also has the capability to
carry information at vastly greater speeds. The outer insulating jacket made of teflonor
PVC.
Shielded and Unshielded Twisted Pair (STP) Cable : Although UTP cable is the least
expensive cable, it may be susceptible to radio and electrical frequency interference (it
should not be too close to electric motors, fluorescent lights, etc.). If you must place
cable in environments with lots of potential interference, or if you must place cable in
extremely sensitive environments that may be susceptible to the electrical current in
the UTP, shielded twisted pair may be the solution. Shielded cables can also help to
extend the maximum distance of the cables.UTP Cable is a shorter way of saying
unshielded twisted pair. This is one of the least expensive wires and works for basic
needs of phone systems so it is one of the most commonly installed in residential
industries. The twisted cable pairs work to cancel out EMI (electromagnetic
interference) from external sources. This would be interference from electromagnetic
radiation, ground water, pressure, root systems and more. It also cuts down on
crosstalk. Interestingly enough, UTP wire is accredited with being discovered by
Alexander Graham Bell. It is no surprise that UTP Cable is the single most common type
of copper telephone wire. The two wires in each pair carry opposite signals. Each signal
Page 2
Subject Code: BTCS-507-18 Roll No. 2028192
is detected as the opposite end when the signal reaches the receiver. Twisting the
pairs together is how the effects of crosstalk are countered.
Shielded twisted pair cable is available in three different configuration:
E ach pair of wires is individually shielded with foil.
There is a foil or braid shield inside the jacket covering all wires (as a group).
There is a shield around each individual pair, as well as around the entire group of
wires (referred to as double shield twisted pair).
Ethernet cable: Ethernet is a way of connecting computers and other network devices
in a physical space. This is often referred to as a local area network or LAN. The idea of
an Ethernet network is that computers and other devices can share files, information
and data between each other efficiently.
Ethernet was released in 1980. By 1982, the Institute of Electrical and Electronics
Engineers (IEEE) standardized the format, so all networking and computer devices
would use the same ports. are a type of network cable. They are designed to work with
Ethernet ports. Ethernet ports can be found on routers, computers, TVs and most
internet and network-enabled devices.
Page 3
Subject Code: BTCS-507-18 Roll No. 2028192
Network Topologies:
1.Star 2.Bus 3.Mesh 4. Ring
Star Topology: in star topology each device in the network is connected to a central
device called hub. Unlike Mesh topology, star topology doesn’t allow direct
communication between devices, a device must have to communicate through hub. If
one device wants to send data to other device, it has to first send the data to hub and
then the hub transmit that data to the designated device.
Advantages of a Star Topology
Easy to install and wire.
No disruptions to the network when connecting or removing devices. Easy to detect
faults and to remove parts.
Disadvantages of a Star Topology
Requires more cable length than a linear topology.
If the hub, switch, or concentrator fails, nodes attached are disabled. More expensive
than linear bus topologies because of the cost of the hubs etc.
Bus Topology: A linear bus topology consists of a main run of cable with a terminator a
teach end. All nodes (fileserver, workstations, and peripherals) are connected to the
linear cable.
Page 4
Subject Code: BTCS-507-18 Roll No. 2028192
Mesh Topology : In a mesh topology there is no central connection point. Instead, each
node is connected to at least one other node and usually to more than one.
Eachnodeiscapableofsendingmessagestoandreceivingmessagesfromothernodes.Theno
desactas relays, passing on a message towards its final destination.
Page 5
Subject Code: BTCS-507-18 Roll No. 2028192
Page 6
Subject Code: BTCS-507-18 Roll No. 2028192
Page 7
Subject Code: BTCS-507-18 Roll No. 2028192
Page 8
Subject Code: BTCS-507-18 Roll No. 2028192
HUB: A hub is a physical layer networking device which is used to connect multiple
devices in a network. They are generally used to connect computers in a LAN.
A hub has many ports in it. A computer which intends to be connected to the
network is plugged into one of these ports. When a data frame arrives at a port, it is
broadcast to every other port, without considering whether it is destined for a
particular destination or not.
Page 9
Subject Code: BTCS-507-18 Roll No. 2028192
Bridge: A network bridge connects multiple network segments at the data link layer
(Layer2) of the OSI model. In Ethernet networks, the term bridge formally means a
device that behaves according to the IEEE 802.1D standard. A bridge and switch are
very much alike a switch being a bridge with numerous ports. Switch or Layer 2 switch
is often used interchangeably with bridge. Bridges can analyze incoming data packets
to determine if the bridge is able to send the given packet to another segment of the
network.
Page 10
Subject Code: BTCS-507-18 Roll No. 2028192
Page 11
Subject Code: BTCS-507-18 Roll No. 2028192
Page 12
Subject Code: BTCS-507-18 Roll No. 2028192
Page 13
Subject Code: BTCS-507-18 Roll No. 2028192
Classful Addressing
The 32 bit IP address is divided into five sub-classes.
These are: Class A Class B Class C
Class D Class E
Each of these classes has a valid range of IP addresses. Classes D and E are reserved
for multicast and experimental purposes respectively. The order of bits in the first
octet determine the classes of IP address.
IPv4address is divided into two parts:
Network ID
Host ID
CLASS A: IP address belonging to class A are assigned to the networks that contain a
large number of hosts.
The network ID is 8 bits long.
The higher order bit of the first octet in class A is always set to 0. The remaining 7 bits
in first octet are used to determine network ID. The 24 bits of host ID are used to
determine the host in any network. The default subnet mask for class A is255.x.x.x.
CLASS B: IP address belonging to class B are assigned to the networks that ranges from
medium-sized to large-sized networks.
The network ID is 16 bits long. The host ID is 16bits long.
The higher order bits of the first octet of IP addresses of class B are always set to 10.
The remaining 14 bits are used to determine network ID. The 16 bits of host ID is used
to determine the host in any network. The default sub-net mask for class B is
255.255.x.x.
CLASS D: IP address belonging to class D are reserved for multi-casting. The higher
order bits of the first octet of IP addresses belonging to class D are always set to 1110.
The remaining bits are for the address that interested hosts recognize. Class D does
not posses any sub-net mask. IP addresses belonging to class D ranges from 224.0.0.0 –
239.255.255.255
Class E: IP addresses belonging to class E are reserved for experimental and research
purposes. IP addresses of class E ranges from 240.0.0.0 -255.255.255.254. This class
Page 15
Subject Code: BTCS-507-18 Roll No. 2028192
doesn’t have any sub-net mask. The higher order bits of first octet of class E are always
set to 1111.
Host ID’s are used to identify a host within a network. The host ID are assigned based
on the following rules: Within any network, the host ID must be unique to that
network.
Host ID in which all bits are set to 0 cannot be assigned because this host ID is used to
represent the network ID of the IP address.
Host ID in which all bits are set to 1 cannot be assigned because this host ID is
reserved as a broadcast address to send packets to all the hosts present on that
particular network.
Page 16
Subject Code: BTCS-507-18 Roll No. 2028192
Add connection:
5. To connect PC’s hub , switch we require cables. Select connections from the tool bar
and select crosswire.
Assigning IP addresses:
6. To add IP address to PC’s uniquely and manually we will add dhcp server to network
or we can give one by one IP address to each and every PC.
To check successful connection:
7. From secondary toolbar at the top ,select add sample PDU that is second last icon of
that bar.
8. Then select PC’s from where you want to send and receive that PDU.
9. Successful transmission means successful connection in the network topology.
Page 17
Subject Code: BTCS-507-18 Roll No. 2028192
Page 18
Subject Code: BTCS-507-18 Roll No. 2028192
Click on Edit Filters, and then select All/None to deselect every filter. Then choose ARP
and ICMP and click in the workspace to close the Edit Filters window.
Select a Simple PDU by clicking the closed envelope in the Common Tools Bar on the
right. Move to PC0 and click to establish the source. Move to PC1 and click to establish
the destination. Notice that two envelopes are now positioned beside PC0. This is
referred to as a data traffic scenario. One envelope is an ICMP packet, while the other is
an ARP packet. The Event List in the Simulation Panel will identify exactly which
envelope represents ICMP and which represents an ARP.A scenario may be deleted by
clicking on the Delete button in the Scenario panel.
Page 19
Subject Code: BTCS-507-18 Roll No. 2028192
Multiple scenarios can be created by clicking on the New button in the Scenario panel.
The scenarios can then be toggled between without deleting.
Select Auto Capture/ Play from the Simulation Panel Play Controls.
Below the Auto Capture / Play button is a horizontal bar, with a vertical button that
controls the speed of the simulation. Dragging the button to the right will speed up the
simulation, while dragging it to the left will slow down the simulation.
Choose the Reset Simulation button in the Simulation window.
Notice that the ARP envelope is no longer present. This has reset the simulation but has
not cleared any configuration changes or MAC / ARP table entries.
Page 20
Subject Code: BTCS-507-18 Roll No. 2028192
1. Configure the LAPTOP terminal software with the right console parameters.
2. Configure the router host name to "GATEWAY".
3. Configure the enable password and secret to "cisco".
4. Configure password encryption on the router to secure stored passwords
5. Configure the console access:
- Login: yes
- Password: "cisco"
- History: 10commands
- Logging synchronous
- Timeout: 2 minutes 45 seconds.
Page 21
Subject Code: BTCS-507-18 Roll No. 2028192
The terminal software is not correctly configured on the laptop. You have to change the
settings to 9600/8/None/1 to connect to the router's console.
Procedure:
1. Open cisco packet tracer.
2. Select end devices, switch, hub and drag them one by one on logical
workspace screen.
3. Then drop routers on workspace as well.
4. Connect all end devices and network devices accordingly with suitable cables.
5. Allocate IP addresses manually or with the help of DHCP server.
6. Set the required gateways for network.
7. Configure the routers and set RIP routing paths for routers .
8. Verify the successful network by sending a simple PDU from sender to receiver.
9. If successfully sent network is working properly.
Page 23
Subject Code: BTCS-507-18 Roll No. 2028192
Subnetting is the practice of dividing a network into two or more smaller networks. It
increases routing efficiency, enhances the security of the network and reduces the size
of the broad cast domain.
In the picture above we have one huge network: 10.0.0.0/24. All hosts on the network
are in the same subnet, which has the following Disadvantages:
A single broadcast domain– All hosts are in the same broadcast domain. A broadcast
sent by any device on the network will be processed by all hosts, creating lots of
unnecessary traffic.
Network security– Each device can reach any other device on the network, which can
present security problems. For example, a server containing sensitive information
shouldn’t be in the same network as user’s workstations.
Now, two subnets were created for different departments: 10.0.0.0/24 for Accounting
and 10.1.0.0/24 for Marketing. Devices in each subnet are now in a different broadcast
domain. This will reduce the amount of traffic flowing on the network and allow us to
implement packet filtering on the router.
Page 25
Subject Code: BTCS-507-18 Roll No. 2028192
Ping (8) sends an ICMP ECHO_REQUEST packet to the specified host. If the host
responds, you get an ICMP packet back. Sound strange? Well, you can “ping” an IP
address to see if a machine is alive. If there is no response, you know something is
wrong.
Page 26
Subject Code: BTCS-507-18 Roll No. 2028192
Trace route:
Tracert is a command which can show you the path a packet of information takes from
your computer to one you specify. It will list all the routers it passes through until it
reaches its destination, or fails to and is discarded.
In addition to this, it will tell you how long each 'hop' from router to router takes.
nslookup:
Displays information from Domain Name System(DNS) name servers.
NOTE: If you write the command as above it shows as default your pc's server name
firstly.
pathping:
A better version of tracert that gives you statics about packet lost and latency.
Page 27
Subject Code: BTCS-507-18 Roll No. 2028192
Getting Help
In any command mode, you can get a list of available commands by entering a
question mark (?).Router>?To obtain a list of commands that begin with a particular
character sequence, type in those characters followed immediately by the question
mark (?).
Router#co?
configure connect copy
To list keywords or arguments, enter a question mark in place of a keyword or
argument. Include a space before the question mark.
Router#configure?
memory Configure from NV memory network Configure fromat FTP network host
terminal Configure from the terminal
You can also abbreviate commands and keywords by entering just enough characters
to make the command unique from other commands. For example, you can abbreviate
the show command to sh.
Configuration Files
Any time you make changes to the router configuration, you must save the changes to
memory because if you do not they will be lost if there is a system reload or power
outage. There are two types of configuration files: the running (current operating)
configuration and the start up configuration.
Page 28
Subject Code: BTCS-507-18 Roll No. 2028192
Page 29
Subject Code: BTCS-507-18 Roll No. 2028192
Page 30
Subject Code: BTCS-507-18 Roll No. 2028192
All routes that identify a specific destination with a larger subnet mask
take precedence over the default route.
Page 31