Professional Documents
Culture Documents
HUB-
An Ethernet hub, active hub, network hub, repeater hub, hub or
concentrator is a device for connecting multiple twisted pair or fibre optic
Ethernet devices together and making these act as a single network
segment. Hubs work at the physical layer (layer 1) of the OSI model. The
device is a form of multiport repeater. Repeater hubs also participate in
collision detection, forwarding a jaw signal to all ports if it detects a
collision.
SWITCH-
A network switch or switching hub is a computer networking device that
connects network segments. The term commonly refers to a network bridge
that processes and routes data at the data link layer (layer 2) of the OSI
model. Switches that additionally process data at the network layer (layer 3
and above) are often referred to as layer 3 switches or multiplayer
switches. Switch divides collision domain.
BRIDGE-
A network bridge connects multiple network segments at data link
layer(layer 2) of the OSI model. In Ethernet networks, the term bridge
formally means a device that behaves according to the IEEE 702- 1D
standard. A bridge and switches are very much alike; a switch being a
bridge with numerous ports. Switch or layer 2 switch is often used
interchangeably with bridge. Bridges can analyze incoming data packets to
determine if the bridge is able to send the packets to another segment of the
network.
ROUTER-
A router is an electronic device that interconnects two or more
computer networks and selectively interchanges packets of data
between them. Each data packet contains address information that a
router can use to determine if the source and destination are on the
same network, or if the data packet must be transferred from one
network to another where multiple routers are used in a large
collection of interconnected networks, the routers exchange
information about target system addresses, so that each router can
build up a table showing the preferred paths between any two systems
on the interconnected networks.
GATE WAY-
In a communication network, a network node equipped for interfacing
with another network that uses different protocols. A gate way contain
devices such as protocol, translators, impedance, matching devices,
rate converters, fault isolators, or signal translators as necessary to
provide system interoperability. It also requires the establishment of
mutually acceptable administrative produces between both networks.
A protocol translation mapping gateway interconnects networks with
different network technologies by performing the required protocol
conversion.
NETWORK DEVICES-
OSI model – open system interconnection model.
V. Session layer
The OSI model is a conceptual model that characterises and
standardises the communication functions of a telecommunication or
communicating system without regard to its underlying internal
structures and technology. Its goal is the interoperability of diverse
communication system into abstraction layers. The original version of
the model defined seven layer.
A layer serves the layer above it and is served by the layer below it.
For example, a layer that provides error free communications across a
network provides the path needed by application above it. While it
calls the next lower layer is send and receive packets that comprise the
contents of the path. Two instances at the same layer are visualized as
connected by a horizontal connection in that layer.
CONCLUSION-
From this experiment we have learnt about different devices such as
repeater, hub, switch, router, gate way and how they work. Moreover,
we have also learnt about the OSI model.
Experiment No-2
Aim-
Study of network IP
Classification of IP address
Sub netting
Super netting
Apparatus(Software) - NA
IP Address-
IP Addressing-
An IP (Internet Protocol) address is a unique identification for a node or
host connection on an IP network. An IP address is a 32 bit binary number
usually represented at 4 decimal values, each representing 8 bits, in the
range 0 to 255(known as octet) separated by decimal points. This is known
as ‘dotted decimal’ notation.
Example: 140.179.220.200
140.179.220.200
10001100.10110011.11011100.11001000
Every IP address consists of two parts, one identifying the network and one
identifying the node. The clan of address and the subnet mark determine
which part belongs to the network address and which part belongs to the
node address.
Address Classes-
There are 5 different address classes. You can determine which class any
IP address is in by examining the first 4 bits of the IP address.
Class A addresses begin with 0xxx, or 1 to 126 decimal.
Class B addresses begin with 10xx, or 128 to 191 decimal.
Class C addresses begin with 110x, or 192 to 223 decimal.
Class D addresses begin with 1110, or 224 to 239decimal.
Class E addresses begin with 1111, or 240 to 254decimal.
Addresses beginning with 0111 1111, 0H 127 decimal, are reserved for
loopback and for internal testing on a local machine.
Class A - - NNNNNNNN.nnnnnnnn.nnnnnnnn.nnnnnnnn.
Class B - - NNNNNNNN.NNNNNNNN.nnnnnnnn.nnnnnnnn.
Class C - - NNNNNNNN.NNNNNNNN.NNNNNNNN.nnnnnnnn.
Sub - Netting-
Sub netting an IP Network can be done for a variety of reasons, including
organization, use of different media (such as Ethernet, FDDI, WAN, etc.),
preservation of address space, and security. The most common reason is to
control network traffic. In an Ethernet network, all nodes on a segment see
all the packets transmitted by all the other nodes on that segment.
Performance can be adverse by affected under heavy traffic loads due to
collisions and the resulting retransmissions. A router is used to connect IP
networks to minimize the amount of traffic each segment must receive.
Subnet- Hacking-
Applying a subnet mask to an IP address allows you to identify the network
and node parts of the address. Performing a bitwise logical AND operation
between the IP address and the subnet mask results in the Network
Address or Number.
For example, using our test IP address and the default class B subnet mask,
we got:
More Restrictive Subnet masks Additional bits can be added to the default
subnet mask for a given class to further subnet, or break down a network.
When a bitwise logical AND operation is performed between the subnet
mask and IP address, the result defines the subnet address. There are some
restrictions on the subnet address. Node addresses of all ‘0’s and all ‘1’s are
reserved for specifying the local network (when a host does not know it’s
network address) and all hosts on the network (broadcast address)
respectively. This also applies to subnets. A subnet address cannot be all
‘0’s or all ‘1’s. This also implies that a 1 bitsubnet mask is not allowed. This
restriction is required because older standards enforced this restriction.
Recent standards that allow one of these subnets have superseded these
standards, but many ‘legacy’ devices do not support the newer standards.
If you are operating in a controlled environment such as a lab, you can
safely use the restricted subnets. To calculate the number of subnets or
nodes, use the formula (2n-2) where n = no of bits in ether field. Multiplying
the no of subnets by the no of nodes available per subnet gives you the total
no of nodes available for your class and subnet mask. Also, note that
although subnet masks with non- contiguous mask bits are allowed they are
not recommended.
Example 1:
These tables list all the possible subnet masks for each class, along with
calculations of the no. of networks ,nodes and total hosts for each subnet.
An example:
Here is another more detailed example. Say you are assigned a class e
network number of 200.133.175.0. you want to utilize this network across
multiple small groups with in an organisation. You can do this by
subnetting that network with a subnet address. We will break this network
into 14 subnets of 14 nodes each.
This will limit us to 196 nodes on the network, instead of 284 we would
have without subnetting , but gives us the advantages of traffic isolation
and security.
To accomplish this we need to use a subnet mask 4 bits long.
Recall that the default class C subnet mask is
255.255.255.0(11111111.11111111.11111111.00000000 binary)
Extending this by 4 bits yields a subnet mask of
255.255.255.240(11111111.11111111.11111111.11110000 binary)
This gives us 16 possible network numbers, 2 of which cannot be used:
Subnet bits network number node addresses broadcast address.
0000 200.133.175.0 Reserved none.
0001 200.133.175.16.17 through .30 200.133.175.31
0010 200.133.175.32.33 through .46 200.133.175.47
0011 200.133.175.48.49 through .62 200.133.175.63
0100 200.133.175.64.65 through .78 200.133.175.79
0101 200.133.175.80.81 through .94 200.133.175.95
0110 200.133.175.96.97 through .110 200.133.175.111
0111 200.133.175.112.113 through .126 200.133.175.127
1000 200.133.175.128.129 through .142 200.133.175.143
1001 200.133.175.144.145 through .158 200.133.175.159
1010 200.133.175.160.161 through .174 200.133.175.175
1011 200.133.175.176.177 through .190 200.133.175.191
In this example the subnet 192.60.1258.0 includes all the address from
192.60.128.0 to 192.60.131.255 The network portion of the address is 22 bits
long and the host portion is 10 bits long. Under CIDR, the subnet mask
notation is reduced to simplified shorthand. Instead of spelling out of the
bits of the subnet mask, it is simply listed on the number of 1’s bits that
start the mask.
In the above example , the network address would be written simply as:
192.60.128.0/22 which indicates starting address of the network and no. of
0/1’s bits in the network portion of the address.
It is currently almost impossible to be allocated IP address blocks, you will
simply told to get them from your ISP. The reason for this is the even
growing size of the internet routing table. Today there are over 80,000
network router in the entire internet. Using CIDR,ISP are allocated large
chunks of address spaces; the ISP’s customers are accessible via network
rout on the internet. It is expected that CIDR will keep the internet happily
in IP address for the next few years at least.
Example 1:
IP address : 192.168.10.0/25
Subnet address:255.255.255.128
a )How many subnet addresses?
b) How many host addresses?
c)What is the block size?
Example 2:
IPaddress : 192.168.10.0/27
No. of subnetworks=2^3=8
No. of hosts=2^5=32
Block size=256-224=32
Valid subnet=0,32,64,96,128,160,192
N/W address
192.168.10.158 192.168.10.160 192.168.10.192 192.168.10.224
Broadcast
address 192.168.10.154 192.168.10.191 192.168.10.223 192.168.10.225
Conclusion:
Thus we have studied about network IP,how IP addresses are classified
and how subnetting is done. We also have studied some examples regarding
the same.
EXPERIMENT NO- 3
AIM-
To study different types of network cables and practically implement the cross-
wired cable and straight through the cable using clamping tool.
APPARATUS-
RJ-45 connector.
Clamping tool.
Twisted pair cable.
EQUIPMENT DESCRIPTION-
All the cables used in the lab are terminated with data rate connectors on both
ends. Two major types of cables will be used in the lab, power supply and data
cables. The power cables are necessary for the equipment to be powered, but it
does not participate in the transmission of data signals.
For data communication, we will use different cables depending on the Link
layer technology, though the media will always be copper. For the Ethernet
connections, we will use four- pair category 5 unshielded twisted pair (UTP)
cabling with RJ-45 plugs on both ends. This type of cable contains eight
individually insulated wires twisted in pairs. Each pair is coloured with one wire
having a stripe of the same colour over with background. Each wire is named by
its colour when it is solid (eg: green) on by pair white and colour of the stripe
otherwise (eg: white green). The pairs are identified by the solid colours (eg:
green pair).The RJ-45 has eight pins, numbered from 1 to 8. So that each one of
the wire of the four-pair UTP cable will be connected to one pin. The
assignment of wires to pins is named colour code and it is different depending
on the standard.
PROCEDURE-
1. We should start by stripping of about 2 inches of the thick plastic jacket
of the end of the cable. We should be very careful at this point as to not
cut into the wires which are inside. Doing so, should allow the
characteristics of the cable, or even worse render to useless. The wires
should he checked one more time cuts. If there is any cut, we should just
whack the whole end off and start over.
2. We should spread the wires apart holding on to the bow of the jacket
with other hand. We do not want the wires to become untwisted down
inside the jacket. Category V cable must only have half open inch of
untwisted wire at the end otherwise it will be out of space. At this point
we obviously have a lot more than half an inch of untwisted wires.
3. We have two end jacks which must be installed on our cable. If we are
using a pre-made cables with one of the ends wacked of we only have
one end to install.
Below are two diagrams which shows how we need to arrange the cables of
each type of cable end.
RJ-45 pin# Wire Diagram End#1 RJ-45 pin# Wire Diagram End#2
End1 colour End2 colour
1 White 1 White
green orange
2 Green 2 Orange
3 White 3 White
orange green
4 Blue 4 Blue
5 White 5 White
Blue Blue
6 Orange 6 Green
7 White 7 White
brown brown
8 Brown 8 Brown
RJ-45 pin# Wire Diagram End#1 RJ-45 pin# Wire Diagram End#2
End1 colour End2 colour
1 White 1 White
green green
2 Green 2 Green
3 White 3 White
orange orange
4 Blue 4 Blue
5 White 5 White
Blue Blue
6 Orange 6 Green
7 White 7 White
brown brown
8 Brown 8 Brown
CONCLUSION-
Thus we have studied different types of network cables and practically
implemented RJ-45 cable port clamping tool.
EXPERIMENT NO-4
AIM-
To study different types of router commands.
The following table describes for used modes and the resulting prompts.
The prompts will help in identification of mode and therefore which
commands are available
Command Access method Prompt Exit Exit method
mode
USER EXESC Log in Router> Use the logout
command
Privileged From user Router# To return to
EXEC EXEC mode, user EXEC
use the enable mode use the
EXEC disable
command. command.
Global From Router(config)# To return to
Configuration privileged privileged
EXEC mode, EXEC mode
use from global
configuration configuration
terminal mode use the
privileged exit or end
EXEC command or
command. press Ctrl-z.
Interface From global Router(config.if)# To return to
Configuration configuration Or global
mode, specify Router(configuration)# configuration
an interface for mode use the
router exit command.
command. To return to
privileged
EXEC mode,
use the end
command or
press Ctrl-z.
.
CONFIGURATION MODE-
Configuration mode has a set of sub modes that you use for modifying interface
settings, router protocol setting, line settings and so forth. Use caution with
configuration mode because all changes entered take effect immediately. To
enter configuration mode, enter the command configure terminal and exit by
pressing Ctrl-z.
NO FORM-
Almost every configuration command also has a no form. In general, we use the
no form to disable a feature or function. The command is used without the
keyword no to re-enable a disabled feature or to enable a feature that is disabled
by default. For example, IP routing is enabled by default. To disable IP routing,
enter the no i/p routing command and enter i/p router to re-enable it.
GETTING HELP-
In any command mode, we can get a list of available commands by entering a
question mark (?)
Router>?
To obtain a list of command that begin with a particular character sequence,
type in those characters followed immediately by the question mark(?)
Router#Co?
Configure correct copy.
To hit keyword or arguments, enter a question mark in place of a keyword or
argument. Include a space before the question mark.
Router #configure?
Memory configure from NV memory.
Network configure from a TFTF network host.
Terminal configures from the terminal.
We can also abbreviate commands and keywords by entering just enough
characters to make the command unique from other commands. For example we
can abbreviate the show command to sh.
CONFIGURATION FILES–
Any time we can make changes to the router configuration. We must save the
changes to memory because if we do not they will be lost if there is a system
reload or power outage. There are two types of configuration files: the running
(current operating) configuration and the start up configuration, which is loaded
up in re- booting of router.
Following privileged mode are used with configuration files:
Configure terminal- modify the running configuration manually, from the
terminal.
Show running config- displays the running configuration.
Show start up config- displays the start up configuration.
Copy start up config running config- copy the running configuration to
the running configuration.
Erase start up config- erase the start up configuration in NVRAM.
Copy tftp running config- load a configuration file stored on a Trivial File
Transfer Protocol (TFTP) server into the running configuration.
Copy running config tftp- store the running configuration on a TFTP
server.
CONFIGURATION SYSTEM(SETUP)-
In privileged EXEC mode we can setup the whole system, for example setup
network cards, put IP addresses. Start simple RIP routing. Router# setup. In
CISO routers interfaces are name as Fast Ethernet 0/0 and Fast Ethernet 0/1.
Some of our lab routers also include serial cable interfaces.
CONCLUSION-
Thus we have studied different types of router command and practiced the same
using GNS3 software.
EXPERIMENT NO-5
AIM-
Familiarization with Static Routing.
THEORY:
There are two basic method of obtaining a routing table
1. Static Routing
2. Dynamic Routing
Static Routing: A static routing table is created, maintained and updated
by a network administrator manually. It becomes impractical on large
networks.
Routers will not share static routers with each other,
thus reducing CPU/RAM overhead and saving bandwidth. However static
routing is not fault tolerant, as to any change in routing infrastructure requires
manual intervention. Routers operating on a purely static environment cannot
seamlessly chase a better router if a link becomes unavailable. Static routers
have an administrative defence (AD) and thus always preferred over dynamic
routers, unless the fault is changed.
2. No bandwidth overhead
APPLICATION OF ROUTERS:
When multiple routers are used as interconnected networks the router exchange
information about destination address, using a dynamic routing protocol. Each
routers build up a table listing the preferred routers between two systems on the
interconnected networks.
Routers may also be used to connect two or more logical groups of computer
devices known as subnets each with a different sub network address. The subnet
addresses recorded in the routers do not necessarily map directly to the physical
interface connections. A router has two stages of operations –
Control Panel: A router records a routing table listing what rout should
be used to form a data packet and through which physical interface
connections. It does this using interval pre-configured address called
static routes.
EXPERIMENT NO-6
AIM-
To Study the Dynamic Routing Protocol.
THEORY-
In it the administrators configure a routing protocol on the network interfaces
routing protocol learns about other routers automatically. Routers and other
routers and each learn about the network that other is connected to when new
networks are added or removed the router update each other.
Dynamic routing protocols are not perfect and can experience routing
loops in some cases.
CONCLUSION-
Thus we have studied how dynamic routing works and how to ping a router no
matter whether neighbour or remote from a specific routers.