You are on page 1of 19

COMPUTER NETWORKS LAB

PRACTICAL FILE

EXAM CODE: ETCS-354

SUBMITTED BY : SUBMITTED TO
Ishan Sharma MS. Megha Kumar
00618007220
B.TECH (CSE 3RD YEAR )
SECTION B

DELHI TECHINCAL CAMPUS


KNOWNLEDGE PARK -III , GREATER NOIDA .
( AFFILIATED TO GGSIPU , NEW DELHI )
TABLE OF CONTENT

S.NO LIST OF PROGRAMS DATE SIGN

1 Implementation of bus topology


using Cisco Packet Tracer

2 Implementation of ring topology


using Cisco Packet Tracer

3 Implementation of star topology


using Cisco Packet Tracer

4 Implementation of mesh topology


using Cisco Packet Tracer

5 Execution of Telnet using Switch


Configuration in Cisco Packet
Tracer

6 To connect Wireless Router using


Cisco Packet Tracer

7 Implementation of Static Routing


using Cisco Packet Tracer

8 Implementation of Routing
Information Protocol using Cisco
Packet Tracer
Experiment no. 1
AIM: Implementation of bus topology using cisco packet tracer .

APPARATUS REQUIRED : Cicso Packet Tracer software .

DESCRIPITON :

Multiple computers are connected to each other through a link. These computers in a network are
known as Nodes. They are connected either through cable or wireless radio links. These computers
connected in the network share resources such as files, network access, printers, etc…By connecting in a
network a computer can do many tasks.In Bus Topology used in computer networks, all the computers
are connected through a single cable. Usually Ethernet cable is used for Bus Topology. In this topology,
the information intended for the last node has to pass through all the computers present in the
network. If this cable is damaged then the connection of all the computers will be lost.

Instead of cable either network card, co-axial cable or RJ-47 can be used depending on the type of
computers used in the network. When Bus Topology has only two endpoints, it is known as Linear
Topology. In Bus topology data is transmitted only in one direction.

Here, the node that transmits data is known as Host. All the computers connected in the network will
receive all the network traffic. Each node is given equal priority for data transmission. The nodes use
Media Access Technology such as a bus master to share the bus.

Advantages
• It is very simple to design.
• Require less cabling compared to other topologies.
• Each to implement for small networks.
• It is easy to expand by simply joining two cables together.
• Very cost-effective.
Disadvantages
• The network stands on a single cable. So, if any damage caused to this cable the whole
network falls.
• As the traffic is shared by all the nodes in the network, the performance of the network
decreases as the traffic increases.
• It is difficult to find the flaws and faults in the network connected with this method.
• Packet loss is high.
• This topology is very slow compared to other topologies.

Network Model :

Stimulated Output :
Experiment no. 2
AIM: Implementation of ring topology using cisco packet tracer .

APPARATUS REQUIRED : Cicso Packet Tracer software .

DESCRIPITON :

A ring topology is a network configuration where device connections create a


circular data path. Each networked device is connected to two others, like points on a circle.
Together, devices in a ring topology are referred to as a ring network.

In a ring network, packets of data travel from one device to the next until they reach their
destination. Most ring topologies allow packets to travel only in one direction, called
a unidirectional ring network. Others permit data to move in either direction,
called bidirectional.

Advantages

1. Flow of data is in circular direction which minimizes the chance of packet collision.
2. The uni-directional ring topology provides very high speed.
3. It has better performance than bus topology, even when the nodes are increased.
4. Ring network can handle high volume of nodes in a network (Robust).
5. It can handle heavy traffic as compared to bus topology due to Token passing principal.

Disadvantages

1. A single break in the cable can cause disturbance in the entire network
2. In Uni-directional Ring, a data packet (token) must pass through all the nodes.
3. Addition and removal of any node in a network is difficult and can cause issue in network
activity.
4. Ring network is much slower than Ethernet network under normal load conditions.

Network Model and Stimulated Output


Experiment no. 3
AIM: Implementation of star topology using cisco packet tracer .

APPARATUS REQUIRED : Cicso Packet Tracer software .

DESCRIPITON :

Star topology is a network topology in which each network component is physically connected
to a central node such as a router, hub or switch.

In a star topology, the central hub acts like a server and the connecting nodes act like clients.
When the central node receives a packet from a connecting node, it can pass the packet on to
other nodes in the network. A star topology is also known as a star network.

Star networks require a point-to-point connection between the central node and connecting
devices. To improve communication between the devices on the network, the central node can
provide signal reconditioning and amplification services.

Advantage

The main advantage of a star IoT network is that it delegates communication complexity to the
central node. All the rest IoT devices can communicate according to their time or frequency
slot. In case of a device failure, the rest devices are not affected. Likewise, in the case of a
security attack against an IoT device, only a single node is compromised, as endpoints operate
independently of each other. Hence, star topologies offer better security than mesh networks.
It is also easy and straightforward to add or remove nodes from the central connection point.
This makes star topologies flexible and scalable. As already outlined, popular LPWAN networks
rely on star topologies in order to minimize power consumption and to ensure that sensors and
IoT devices can operate for large intervals without a battery change
Disadvantage
One of the main drawbacks of a star topology is that the radio link between the gateway and
the devices can be very long, which increases the amount of energy needed for relaying a
message. Nevertheless, contrary to mesh networks, in star topologies devices do not consume
energy continuously, but rather only when they transmit data.

Network Model and Stimulated Output


Experiment no. 4
AIM: Implementation of mesh topology using cisco packet tracer .

APPARATUS REQUIRED : Cicso Packet Tracer software .

DESCRIPITON :

Mesh topology is a type of networking in which all the computers are inter-connected to each
other. In Mesh Topology, the connections between devices take place randomly. The connected
nodes can be computers, switches, hubs, or any other devices. In this topology setup, even if
one of the connections goes down, it allows other nodes to be distributed. This type of
topology is very expensive and does not have any hierarchy, interdependency, and uniform
pattern between nodes. The connections of the mesh topology are not easier to establish.

All computers, in a mesh topology, not only responsible for sending their own signals but also
relays for other nodes. Usually, it is used for wireless networks, and its connections can be
wired or wireless. Also, there is a point-to-point connection between all nodes in the mesh
topology setup.

Advantages
• Failure during a single device won’t break the network.
• There is no traffic problem as there is a dedicated point to point links for every computer.
• Fault identification is straightforward.
• This topology provides multiple paths to succeed in the destination and tons of
redundancy.
• It provides high privacy and security.
• Data transmission is more consistent because failure doesn’t disrupt its processes.
Disadvantages
• It’s costly as compared to the opposite network topologies i.e. star, bus, point to point
topology.
• Installation is extremely difficult in the mesh.
• Power requirement is higher as all the nodes will need to remain active all the time and
share the load.
• Complex process.
• The cost to implement mesh is above other selections.

Network Model and Stimulated Output


Experiment no. 5
AIM: execution of telnet using switch configuration using packet tracer .

APPARATUS REQUIRED : Cicso Packet Tracer software .

DESCRIPITON :

TELNET stands for TErminaL NETwork. It is a type of protocol that enables one computer to
connect to local computer. It is a used as a standard TCP/IP protocol for virtual terminal
service which is given by ISO. Computer which starts connection known as the local
computer. Computer which is being connected to i.e. which accepts the connection known
as remote computer. When the connection is established between local and remote
computer. During telnet operation whatever that is being performed on the remote computer
will be displayed by local computer. Telnet operates on client/server principle. Local
computer uses telnet client program and the remote computers uses telnet server program.

Advantages of Telnet
⚫ It can be used to send/receive information.
⚫ It helps in administration of the network elements.
⚫ It supports user authentication.
⚫ All the telnet clients and servers implement a network virtual terminal (NVT).
⚫ Automation test facilities are used by remote computers on shared basis. This saves cost by
limiting costly test equipments/facilities at selected locations for all the users across the
world.
Disadvantage
⚫ User ID and password are transmitted without any encryption. This leads to security risk in
Telnet protocol as eavesdropping and snooping are easier to implement by intruders or
hackers.
⚫ It is not possible to run GUI based tools over Telnet connection as it is character based
communication tool. It is not possible to transmit cursor movements and other GUI
information.
⚫ It is very inefficient protocol.
Each keystrokes require several context switches before it reaches the other end
⚫ It is expensive due to slow typing speeds.
Code

Configuration
Network Model and Stimulated Output
Experiment no. 6
AIM: To connect wireless router using cisco packet tracer .

APPARATUS REQUIRED : Cicso Packet Tracer software .

DESCRIPITON :

Router : A router is a device that connects two or more packet-switched networks or


subnetworks. It serves two primary functions: managing traffic between these networks by
forwarding data packets to their intended IP addresses, and allowing multiple devices to use
the same Internet connection.

Wireless router : A wireless router connects directly to a modem by a cable. This allows it to
receive information from — and transmit information to — the internet. The router then
creates and communicates with your home Wi-Fi network using built- in antennas.
This provides all the devices on your home network with internet access.

Advanatge of Wireless Router


It provides connection between different network architectures such as ethernet & token ring
etc.
➨It can choose best path across the internetwork using dynamic routing algorithms.
➨It can reduce network traffic by creating collision domains and also by creating broadcast
domains.
➨It provides sophisticated routing, flow control and traffic isolation.
➨They are configurable which allows network manager to make policy based on routing
decisions.

Disadvantage of wireless router

They operate based on routable network protocols.


➨They are expensive compare to other network devices.
➨Dynamic router communications can cause additional network overhead. This results into
less bandwidth for user data.
➨They are slower as they need to analyze data from layer-1 through layer-3.
➨They require considerable amount of initial configurations.
➨They are protocol dependent devices which must understand the protocol they are
forwarding.
Network Model

Stimulated Output
Experiment no. 7
AIM: Implementation of static routing using cisco packet tracer .

APPARATUS REQUIRED : Cicso Packet Tracer software .

DESCRIPITON :

Static routing is a routing type in which a network administrator configures the routes into the
routing table to be used by the router to send packets to a destination network.
Static routing is only optimal in a few situations. Network degradation, latency and congestion
are inevitable consequences of the non-flexible nature of static routing because there is no
adjustment when the primary route is unavailable.

Static routing performs routing decisions with preconfigured routes in the routing table, which
can be changed manually only by administrators. Static routes are normally implemented in
those situations where the choices in route selection are limited, or there is only a single
default route available. Also, static routing can be used if you have only few devices for route
configuration and there is no need for route change in the future.

Advantage of static routing

• Static routes are not advertised through the network, which increases security.
• Static routes consume less bandwidth than dynamic routing protocols. No CPU cycle is
used to calculate and communicate routes.
• The route that uses a static route to send data is known.

Disadvantage of static routing

• Static routes are not advertised through the network, which increases security.
• Static routes consume less bandwidth than dynamic routing protocols. No CPU cycle is
used to calculate and communicate routes.
• The route that uses a static route to send data is known.
Network Model and Stimulated Output
Experiment no. 8
AIM: Implementation of routing information protocol using cisco packet tracer .

APPARATUS REQUIRED : Cicso Packet Tracer software .

DESCRIPITON :

Routing Information Protocol (RIP) is a dynamic routing protocol that uses hop count as a
routing metric to find the best path between the source and the destination network. It is a
distance-vector routing protocol that has an AD value of 120 and works on the Network layer
of the OSI model. RIP uses port number 520.

Hop Count
Hop count is the number of routers occurring in between the source and destination network.
The path with the lowest hop count is considered as the best route to reach a network and
therefore placed in the routing table. RIP prevents routing loops by limiting the number of
hops allowed in a path from source and destination. The maximum hop count allowed for RIP
is 15 and a hop count of 16 is considered as network unreachable.

Features of RIP
1. Updates of the network are exchanged periodically.
2. Updates (routing information) are always broadcast.
3. Full routing tables are sent in updates.
4. Routers always trust routing information received from neighbor routers. This is also
known as Routing on rumors.

Advantages of RIP
• It is easy to configure.
• that it does not require an update every time the topology of network changes.
• Guaranteed to support almost all routers

Disadvantages of RIP
• It is only based on hop count. So, if there is a better route available with better
bandwidth then it will not select that route.
Network Model and Stimulated Output

You might also like