Professional Documents
Culture Documents
COMPUTER NETWORKS
PRACTICAL FILE
0
B-Tech CSE 5th Sem CN
LAB
TABLE OF CONTENTS
S. No. EXPERIMENTS
Practically implement and test the cross-wired cable and straight through cable
2
using clamping tool and network lab cable tester.
1
B-Tech CSE 5th Sem CN
LAB
EXPERIMENT - 1
CABLES
Networking cables are networking hardware used to connect one network device to other
network devices or to connect two or more computers to share printers, scanners etc. Different
types of network cables, such as coaxial cable, optical fiber cable, and twisted pair cables, are
used depending on the network's physical layer, topology, and size. The devices can be
separated by a few meters or nearly unlimited distances. There are several technologies used
for network connections. Patch cables are used for short distances in offices and wiring closets.
Electrical connections using twisted pair or coaxial cable are used within a building. Optical
fiber cable is used for long distances or for applications requiring high bandwidth or electrical
isolation. Many installations use structured cabling practices to improve reliability and
maintainability. In some home and industrial applications power lines are used as network
cabling.
Coaxial Cable
Coaxial cable, is a type of cable that has an inner conductor surrounded by a tubular insulating
layer, surrounded by a tubular conducting shield. Many coaxial cables also have an insulating
outer sheath or jacket. The term coaxial comes from the inner conductor and the outer shield
sharing a geometric axis. Coaxial cable was invented by English engineer and mathematician
Oliver Heaviside, who patented the design in 1880.Coaxial cable differs from other shielded
cable used for carrying lower-frequency signals, in that the dimensions of the cable are
controlled to give a precise, constant conductor spacing, which is needed for it to function
efficiently as a transmission line.
2
B-Tech CSE 5th Sem CN
LAB
Coaxial cable conducts electrical signal using an inner conductor (usually a solid copper,
stranded copper or copper plated steel wire) surrounded by an insulating layer and all enclosed
by a shield, typically one to four layers of woven metallic braid and metallic tape. The cable is
protected by an outer insulating jacket. Normally, the shield is kept at ground potential and a
signal carrying voltage is applied to the center conductor.
The advantage of coaxial design is that electric and magnetic fields are restricted to the
dielectric with little leakage outside the shield. Conversely, electric and magnetic fields outside
the cable are largely kept from interfering with signals inside the cable. Larger diameter cables
and cables with multiple shields have less leakage. This property makes coaxial cable a good
choice for carrying weak signals that cannot tolerate interference from the environment or for
stronger electrical signals that must not be allowed to radiate or couple into adjacent structures
or circuits. Common applications of coaxial cable include video and CATV distribution, RF
and microwave transmission, and computer and instrumentation data connections.
Twisted pair cabling is a type of wiring in which two conductors of a single circuit are twisted
together for the purposes of canceling out electromagnetic interference (EMI) from external
sources.
3
B-Tech CSE 5th Sem CN
LAB
For instance, electromagnetic radiation from unshielded twisted pair (UTP) cables, and
crosstalk between neighboring pairs. It was invented by Alexander Graham Bell.
❖ Shielded Twisted Pair Cable (STP): It has a fine wire mesh surrounding the wires to protect
the transmission. This shielding can be applied to individual pairs or quads, or to the
collection of pairs. Individual pairs are foiled, while overall cable may use braided screen,
foil, or braiding with foil. Because the shielding is made of metal, it may also serve as a
ground. Usually, a shielded twisted pair cable has a special grounding wire added called a
drain wire which is electrically connected to the shield or screen.
The drain wire simplifies connection to ground at the connectors. Shielded cable is used in
older telephone networks, as well as network and data communications to reduce outside
interference.
❖ Unshielded Twisted Pair Cable (UTP): These are found in many Ethernet networks and
telephone systems. For indoor telephone applications, UTP is often grouped into sets of 25
pairs according to a standard 25-pair color code originally developed by AT&T
Corporation. A typical subset of these colors (white/blue, blue/white, white/orange,
orange/white) shows up in most UTP cables. For urban outdoor telephone cables containing
hundreds or thousands of pairs, the cable is divided into small but identical bundles.
Each bundle consists of twisted pairs that have different twist rates. The bundles are in turn
twisted together to make up the cable. Pairs having the same twist rate within the cable can
still experience some degree of crosstalk. Wire pairs are selected carefully to minimize
crosstalk within a large cable. UTP cable is also the most common cable used in computer
4
B-Tech CSE 5th Sem CN
LAB
networking. Modern Ethernet, the most common data networking standard, can use UTP
cables. Twisted pair cabling is often used in data networks for short and medium length
connections because of its relatively lower costs compared to optical fiber and coaxial
cable.
Optical Fiber
An optical fiber cable is a cable containing one or more optical fibers that are used to carry
light. The optical fiber elements are typically individually coated with plastic layers and
contained in a protective tube suitable for the environment where the cable will be deployed.
Different types of cable are used for different applications, for example long distance
telecommunication, or providing a high-speed data connection between different parts of a
building.
Optical fiber consists of a core and a cladding layer, selected for total internal reflection due to
the difference in the refractive index between the two. In practical fibers, the cladding is usually
coated with a layer of acrylate polymer or polyimide. This coating protects the fiber from
damage but does not contribute to its optical waveguide properties. Individual coated fibers (or
fibers formed into ribbons or bundles) then have a tough resin buffer layer and/or core tube(s)
extruded around them to form the cable core. Several layers of protective sheathing, depending
5
B-Tech CSE 5th Sem CN
LAB
on the application, are added to form the cable. Rigid fiber assemblies sometimes put light-
absorbing ("dark") glass between the fibers, to prevent light that leaks out of one fiber from
entering another. This reduces cross-talk between the fibers, or reduces flare in fiber bundle
imaging applications.
Optical fibers are very strong, but the strength is drastically reduced by unavoidable
microscopic surface flaws inherent in the manufacturing process.
The initial fiber strength, as well as its change with time, must be considered relative to the
stress imposed on the fiber during handling, cabling, and installation for a given set of
environmental conditions. There are three basic scenarios that can lead to strength degradation
and failure by inducing flaw growth: dynamic fatigue, static fatigues, and zero-stress aging.
CONNECTORS
In information science, connectors, normally called "input-output connectors" (or I/O for
short), are interfaces for linking devices by using cables. They generally have a male end with
pins protruding from it. This plug is meant to be inserted into a female part (also called a
socket), which includes holes for accommodating the pins. However, there are
"hermaphroditic" plugs which can act as either male or female plugs, and can be inserted into
either one.
BNC Connector
6
B-Tech CSE 5th Sem CN
LAB
The BNC (Bayonet Neill–Counselman) connector used with coaxial cables such as the RG-58
A/U cable used with the 10Base-2 Ethernet system. The basic BNC connector is a male type
mounted at each end of a cable. This connector has a center pin connected to the center cable
conductor and a metal tube connected to the outer cable shield. A rotating ring outside the tube
locks the cable to any female connector.
It is a miniature quick connect/disconnect radio frequency connector used for coaxial cable. It
features two bayonet lugs on the female connector; mating is fully achieved with a quarter turn
of the coupling nut. BNC connectors are used with miniature-to-subminiature coaxial cable in
radio, television, and other radio-frequency electronic equipment, test instruments, and video
signals. BNC connectors can also be used to connect some monitors, which increases the
accuracy of the signals sent from the video adapter.
BNC T-connectors (used with the 10Base-2 system) are female devices for connecting two
cables to a network interface card (NIC).
RJ Connector
A family of push-and-click connectors for twisted-pair wiring in telephone and network wiring.
RJ stands for Registered Jack. RJ types define both a jack or receptacle (female) and a plug
(male) type of connector. The most common types of RJ connectors are as follows:
7
B-Tech CSE 5th Sem CN
LAB
❖ RJ-45 Connector: An 8-wire telephone-type connector used with twisted-pair cabling for
connecting computers, wall plates, patch panels, and other networking components. RJ-45
is the standard type of connector for both unshielded twisted-pair (UTP) and shielded
twisted-pair (STP) cabling in star-topology Ethernet networks such as 10BaseT and
100BaseT4. RJ-45 is defined in International Organization for Standardization (ISO)
standard 8877.
❖ RJ-48 Connector: An 8-wire telephone-type connector used with twisted-pair cabling for
connecting T1 and 56-KB digital data service (DDS) lines. RJ-48 uses the same jack as RJ-
45 but uses a different pinning, with one pair of wires to transmit signals, one pair to receive
signals, one pair for drain, and one unused pair (reserved for future use). RJ-48 connectors
come in three varieties: RJ-48C and RJ-48X for connecting T1 lines, and RJ-48S for
connecting 56-KB DDS lines.
ST Connector
ST stands for Straight Tip - a quick release bayonet style Connector developed by AT&T. ST
Connectors are among the most commonly used Fiber optic connectors in networking
applications. They are cylindrical with twist lock coupling, 2.5mm keyed ferrule. ST
Connectors are used both short distance applications and long line systems. The ST connector
has a bayonet mount and a long cylindrical Ferrule to hold the fiber. Because they are spring-
loaded, you have to make sure they are seated properly. They are easily inserted and removed
8
B-Tech CSE 5th Sem CN
LAB
due to their design. If you experience high Light loss, try reconnecting. ST connectors come in
two versions: ST and ST-II. These are keyed and spring-loaded. They are push-in and twist
types. They are rated for 500 mating cycles. The typical Insertion Loss for matched ST
connectors is 0.25 db. View all Fiber Optic Connectors.
SC Connector
SC stands for Subscriber Connector- a general purpose push/pull style Connector developed
by NTT. SC has an advantage in keyed duplexibility to support send/receive channels. SC
Connectors are frequently used for newer Network applications. The SC is a snap-in connector
that is widely used in single mode systems for its performance. The SC connector is also
available in a Duplex configuration. They offer low cost, simplicity, and durability. SC
connectors provide for accurate alignment via their ceramic ferrules.
NETWORK TOPOLOGIES
a) Mesh Topology:
In a mesh topology, every device is connected to another device via a particular channel.
9
B-Tech CSE 5th Sem CN
LAB
Every device is connected with another via dedicated channels. These channels are known as
links.
• Suppose, N number of devices are connected with each other in a mesh topology,
the total number of ports that are required by each device is N-1. In Figure 1, there
are 5 devices connected to each other, hence the total number of ports required by
each device is 4. Total number of ports required=N*(N-1).
• Suppose, N number of devices are connected with each other in a mesh topology,
then the total number of dedicated links required to connect them is NC2 i.e., N(N-
1)/2. In Figure 1, there are 5 devices connected to each other, hence the total
number of links required is 5*4/2 = 10.
Advantages of this topology:
• It is robust.
• The fault is diagnosed easily. Data is reliable because data is transferred among
the devices through dedicated channels or links.
• Provides security and privacy.
Problems with this topology:
• Installation and configuration are difficult.
• The cost of cables is high as bulk wiring is required, hence suitable for a smaller
number of devices.
• The cost of maintenance is high.
b) Star Topology:
In star topology, all the devices are connected to a single hub through a cable. This hub is the
central node and all other nodes are connected to the central node. The hub can be passive in
nature i.e., not an intelligent hub such as broadcasting devices, at the same time the hub can
be intelligent known as an active hub. Active hubs have repeaters in them.
10
B-Tech CSE 5th Sem CN
LAB
A star topology having four systems connected to a single point of connection i.e., hub.
an Advantages of this topology:
• If N devices are connected to each other in a star topology, then the number of
cables required to connect them is N. So, it is easy to set up.
• Each device requires only 1 port i.e., to connect to the hub, therefore the total
number of ports required is N.
Problems with this topology:
• If the concentrator (hub) on which the whole topology relies fails, the whole
system will crash down.
• The cost of installation is high.
• Performance is based on the single concentrator i.e., hub.
c) Bus Topology:
Bus topology is a network type in which every computer and network device is connected to
a single cable. It transmits the data from one end to another in a single direction. No bi-
directional feature is in bus topology. It is a multi-point connection and a non-robust topology
because if the backbone fails the topology crashes.
A bus topology with shared backbone cable. The nodes are connected to the channel via drop
lines.
11
B-Tech CSE 5th Sem CN
LAB
d) Ring Topology:
In this topology, it forms a ring connecting devices with its exactly two neighbouring devices.
A number of repeaters are used for Ring topology with a large number of nodes, because if
someone wants to send some data to the last node in the ring topology with 100 nodes, then
the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data
loss repeaters are used in the network.
The transmission is unidirectional, but it can be made bidirectional by having 2 connections
between each Network Node, it is called Dual Ring Topology.
12
B-Tech CSE 5th Sem CN
LAB
2. To transmit the data, the station has to hold the token. After the transmission is
done, the token is to be released for other stations to use.
3. When no station is transmitting the data, then the token will circulate in the ring.
4. There are two types of token release techniques: Early token release releases the
token just after transmitting the data and Delay token release releases the token
after the acknowledgment is received from the receiver.
e) Tree Topology:
This topology is the variation of Star topology. This topology has a hierarchical flow of data.
In this, the various secondary hubs are connected to the central hub which contains the
repeater. In this data flow from top to bottom i.e., from the central hub to secondary and then
to the devices or from bottom to top i.e., devices to the secondary hub and then to the central
hub. It is a multi-point connection and a non-robust topology because if the backbone fails
the topology crashes.
13
B-Tech CSE 5th Sem CN
LAB
• It allows more devices to be attached to a single central hub thus it decreases the
distance that is travelled by the signal to come to the devices.
• It allows the network to get isolate and also prioritize from different computers.
Problems with this topology:
• If the central hub gets failed, the entire system fails.
• The cost is high because of cabling.
14
B-Tech CSE 5th Sem CN
LAB
EXPERIMENT - 2
Practically implement and test the cross-wired cable and straight through
cable using clamping tool and network lab cable tester.
Straight Through & Cross Over Cable
Requirement:
There are four pairs of wires in an Ethernet cable, and an Ethernet connector has eight pin
slots. Each pin is identified by a number, starting from left to right, with the clip facing away
from you. The two standards for wiring Ethernet cables are T568A and T568B. T568B is the
most common and is what we'll be using for our straight Ethernet cable. The tables below
show the proper orientation of the colored wires to the pins.
15
B-Tech CSE 5th Sem CN
LAB
2. Spread the four pairs of twisted wire apart. For Cat 5e, you can use the pull string to
strip the jacket farther down if you need to, then cut the pull string. Cat 6 cables have a
spine that will also need to be cut.
3. Untwist the wire pairs and neatly align them in the fig2.4 orientation. Be sure not to
untwist them any farther down the cable than where the jacket begins; we want to leave
as much of the cable twisted as possible.
16
B-Tech CSE 5th Sem CN
LAB
4. Cut the wires as straight as possible, about 0.5 inch above the end of the jacket.
5. Carefully insert the wires all the way into the modular connector, making sure that each
wire passes through the appropriate guides inside the connector.
6. Push the connector inside the crimping tool and squeeze the crimper all the way down.
8. To make sure you've successfully terminated each end of the cable, use a cable tester
to test each pin.
17
B-Tech CSE 5th Sem CN
LAB
9. When you're all done, the connectors should look like this:
18
B-Tech CSE 5th Sem CN
LAB
There are two basic ethernet cable pin outs. A straight through ethernet cable, which is used to
connect to a hub or switch, and a crossover ethernet cable used to operate in a peer-to-peer
fashion without a hub/switch.
Generally, all fixed wiring should be run as straight through. Some ethernet interfaces can cross
and un-cross a cable automatically as needed, a handy feature.
19
B-Tech CSE 5th Sem CN
LAB
EXPERIMENT - 3
HUB
Hub serves as a central device through which data bound for workstation travel. It contains
multiple ports. When packets arrive at one port, it is copied, unmodified to all the ports of the
hub for transmission. It uses star topology network.
❖ Advantages
❖ Drawbacks- It broadcasts to all the ports; it runs half duplex. If 10 ports in a hub, it will
share bandwidth of 100 Mbps. So, each port shares 10 Mbps.
❖ Applications
20
B-Tech CSE 5th Sem CN
LAB
❖ Types of Hubs- On the basis of its working methods, the Hubs can be divided into three
types, given as:
I. Active Hub: As its name suggests, Active Hub is a hub which can amplify or regenerate
the information signal. This type of bus has an advantage as it also amplifies the
incoming signal as well as forwards it to multiple devices. This Bus is also known as
Multiport Repeater. It can upgrade the properties if incoming signal before sending
them to destination.
II. Passive Hub: Passive Hub works like a simple Bridge. It is used for just creating a
connection between various devices. It does not have the ability to amplify or
regenerate any incoming signal. It receives signal and then forward it to multiple
devices.
III. Intelligent Hub: This is the third and last type of Bus. It can perform tasks of both Active
and Passive buses. Also, it can perform some other tasks like Bridging and routing. It
increases the speed and effectiveness of total network thus makes the performance of
whole network fast and efficient.
SWITCHES
A switch is used to network multiple computers together. Switches made for the consumer
market are typically small, flat boxes with 4 to 8 Ethernet ports. These ports can connect to
computers, cable or DSL modems, and other switches. High-end switches can have more than
50 ports and often are rack mounted.
Switches are more advanced than hubs, and less capable than routers. Unlike hubs, switches
can limit the traffic to and from each port so that each device connected to the switch has a
sufficient amount of bandwidth. For this reason, you can think of a switch as a "smart hub."
However, switches don't provide the firewall and logging capabilities that routers do. Routers
can often be configured by software (typically via a Web interface), while switches only work
the way the hardware was designed. Switch can perform error checking before forwarding data
21
B-Tech CSE 5th Sem CN
LAB
that makes it very efficient as it does not forward packets that have errors and forward good
packets selectively to correct port only.
The term "switch" can also be used to refer to a small lever or button on computer hardware.
And while it has nothing to do with computers, "riding switch" means riding backwards in
skateboarding and snowboarding.
ROUTERS
A router is a device like a switch that routes data packets based on their IP addresses. Router
is mainly a Network Layer device. Routers normally connect LANs and WANs together and
have a dynamically updating routing table based on which they make decisions on routing the
data packets. Router divide broadcast domains of hosts connected through it.
A router is a networking device that forwards data packets between computer networks.
Routers perform the traffic directing functions on the Internet. A data packet is typically
forwarded from one router to another router through the networks that constitute an
internetwork until it reaches its destination node.
❖ Advantages
a) Router limits the collision domain.
b) Router can function on LAN and WAN.
c) Router can connect different media & architectures.
d) Router can determine best path/route for data to reach the destination.
❖ Disadvantages
a) Router is more expensive than Hub, Bridge & Switch.
b) Router only works with routable protocol.
22
B-Tech CSE 5th Sem CN
LAB
BRIDGE
A bridge is a computer networking device that builds the connection with the other bridge
networks which use the same protocol. It works at the Data Link layer of the OSI Model and
connects the different networks together and develops communication between them. It
connects two local-area networks; two physical LANs into larger logical LAN or two segments
of the same LAN that use the same protocol.
23
B-Tech CSE 5th Sem CN
LAB
Apart from building up larger networks, bridges are also used to segment larger networks into
smaller portions. The bridge does so by placing itself between the two portions of two physical
networks and controlling the flow of the data between them. Bridges nominate to forward the
data after inspecting into the MAC address of the devices connected to every segment. The
forwarding of the data is dependent on the acknowledgement of the fact that the destination
address resides on some other interface. It has the capacity to block the incoming flow of data
as well. Today Learning bridges have been introduced that build a list of the MAC addresses
on the interface by observing the traffic on the network.
24
B-Tech CSE 5th Sem CN
LAB
EXPERIMENT - 4
Cisco Packet Tracer is an essential tool in simulating the network system. It was developed by
Dennis Frezo and his team at Cisco System. It is a powerful tool that displays the various
protocols in Networking, a dynamic way in showing the configuration and a systematic method
to experience networking even without the real equipment used in Networking. Packet Tracer
is just a supplement not replacement for real devices used in Networking System. It will just
show the dynamic way in either Real-Time or Stimulation Packet. Tracer is a powerful network
simulator that can be utilized in training for CCNA.
➢ Learn the basic operations of Packet Tracer: - File commands, visualization and
configuration of networking devices.
➢ Simulate the interactions of data traveling through the network.
➢ Learn to visualize the network in logical and physical modes.
➢ Reinforce your understanding with extensive hands-on networking and activities.
25
B-Tech CSE 5th Sem CN
LAB
There are different modules and panels available in the packet tracer. Some important modules,
which are important to understand for the working in Packet Tracer, are as given below: -
• Toolbar: - We can pick our network devices, end devices or cables etc. from the toolbar
as required by our network stimulation. Some of the devices are as router, switches, end
devices etc.
• With the Toolbar we have another panel to select required type of device with certain
specifications from all the types available. For example, Selecting ‘1941’ router from
Routers in toolbar.
• Editing Tools: - These are the tools with some important purpose used in construction
of different network topologies e.g., ‘delete’ to erase the selected part of network or
‘select’ to select a specific part of the network
• Work Space: - It is the empty space available between where all the network topologies
are constructed.
• Menu Bar: - It contains the basic features like New, Save, Save As, Undo etc.
• Real-Time/Simulation: - By this feature of packet tracer we can choose if we want to
see network topology working in real-time or through simulation. Simulation facilitates
the understanding of how the topology is working.
EXPERIMENT - 5
26
B-Tech CSE 5th Sem CN
LAB
IPV6 Address: - An Internet Protocol Version 6 address is a numerical label that is used to
identify a network interface of a computer or other network node participating in an IPv6
network. An IP address serves the purpose of uniquely identifying an individual network
interface of a host, locating it on the network, and thus permitting the routing of IP packets
between hosts IPv6 is an Internet Protocol (IP) for packet-switched internetworking that
specifies the format of packets (also called datagram) and the addressing scheme across
multiple IP networks. In comparing the two protocols IPv6 expands upon the addressing and
routing capabilities of IPv4 in a number of ways including:
• In IPv6 the IP address size is increased from 32 bits to 128 bits.
• IPv6 supports a greater number of addressable nodes.
• IPv6 provides more levels of addressing hierarchy.
• IPv6 offers simpler auto-configuration of addresses.
• Ipv6 also supports simplified header format.
Working modes of router: - There are 5 mail modes of router: User Execution Mode,
Privilege Mode, ROM Monitor Mode, Sub interface Configuration Mode, Interface
Configuration Mode, Global Configuration Mode.
Link local:
27
B-Tech CSE 5th Sem CN
LAB
1. A link local address is an ipv6 unicast address that can be automatically/ manually
configured on any interface using the prefix “FE80:”
2. These addresses mostly used for addressing on a single link for purposes such as automatic
address configuration and neighbor discovery.
3. All ipv6 enabled interfaces have a link local unicast address.
• No shutdown: This command enables an interface and brings it up. It is mostly used for
new interfaces or troubleshooting purposes.
• Show IP route: It is used to show the list of the networks that router can reach, their metric.
• Show IP interface: It is used to list all the interface brief of all IP’s connected.
Steps:
• Step1: Scenario Created
28
B-Tech CSE 5th Sem CN
LAB
• Step4: To configure ipv6 routing in the network. Go to cmd interface of router0 and type
following commands:
➢ Enable
➢ Configure terminal
➢ Ipv6 unicast-routing
➢ Interface fastethernet 0/0
➢ Ipv6 enable
➢ Ipv6 address FE80::202:4AFF:FE9D:5630 LINK-LOCAL
➢ Ipv6 address 2000:1:1:1:1:1:1:1111/112
➢ No shutdown
➢ Press “CTRL” to exit from current working mode of router
➢ Configure terminal
➢ Ipv6 unicast-routing
➢ Interface fastethernet 0/1
➢ Ipv6 enable
➢ Ipv6 address FE80::202:4AFF:FE9D:5630 LINK-LOCAL
➢ Ipv6 address 4000:1:1:1:1:1:1:1112/112
➢ No shutdown
➢ Press “CTRL” to exit from current working mode of router
29
B-Tech CSE 5th Sem CN
LAB
30
B-Tech CSE 5th Sem CN
LAB
• Step5: After completely executing these commands the IPV6 address scheme plan will be
enabled and all connections will be established.
31
B-Tech CSE 5th Sem CN
LAB
EXPERIMENT - 6
Steps:
32
B-Tech CSE 5th Sem CN
LAB
33
B-Tech CSE 5th Sem CN
LAB
EXPERIMENT -
34
Simulation of Web Traffic.
Steps:
34
B-Tech CSE 5th Sem CN
LAB
EXPERIMENT - 8
Study and implementation of various router configuration commands.
Steps:
35
B-Tech CSE 5th Sem CN
LAB
36
B-Tech CSE 5th Sem CN
LAB
EXPERIMENT - 9
37
B-Tech CSE 5th Sem CN
LAB
38
B-Tech CSE 5th Sem CN
LAB
39
B-Tech CSE 5th Sem CN
LAB
EXPERIMENT - 10
Step1: Open control panel -> Network and Internet ->Network and Sharing Center.
Step 2: Click on Change Adapter Settings.
40
B-Tech CSE 5th Sem CN
LAB
Step 5:Enter the new IP address, subnet mask and default gateway, and other required
options. Then, click ok.
41
B-Tech CSE 5th Sem CN
LAB
Step 6:Check the connection has been established using command prompt:-
Start>Run >CMD>ipconfig
42
B-Tech CSE 5th Sem CN
LAB
EXPERIMENT – 11
The tracert command prints the path. If all routers on the path are functional, this command
prints the full path. If a router is down on the path, this command prints the path up to the last
operational router
tracert www.google.co.in
The following image shows the output of this command.
The following table lists some important options of the tracert command.
43
B-Tech CSE 5th Sem CN
LAB
Option Description
-d Do not resolve the IP addresses of intermediate routers to their names.
-h Specifies the maximum number of hops (routers) to search on the path. The default is 30 hops.
-w Specifies the amount of time in milliseconds to wait for a reply message from the router. If not receiv
default time-out is 4000 (4 seconds).
Ping
The ping command is used to test connectivity between two hosts. It sends ICMP echo request
messages to the destination. The destination host replies with ICMP replies messages. If the
ping command gets a reply from the destination host, it displays the reply along with round-
trip times.
ping google.com
The following image shows the output of this command.
If you specify the hostname as an argument, the ping command uses the configured DNS client
service to automatically translate the hostname into the IP address.
Arp
To send IP packets, a computer needs two addresses. These addresses are the MAC address
and the IP address. A MAC address is the physical or hardware address of the NIC. An IP
address is the logical or software address of NIC. If a computer knows the IP address of the
44
B-Tech CSE 5th Sem CN
LAB
destination computer but it does not know the MAC address of the destination computer, it
uses the ARP protocol to know the MAC address of the destination computer.
The ARP protocol broadcasts a given IP address over a local network. The corresponding host
responds to the broadcast with its MAC address. To avoid repetition, ARP stores the answer in
a table known as ARP table. ARP maintains a separate ARP table for each NIC.
To view the ARP table, you can use the following command.
arp
By default, this command displays the ARP table of the active NIC. If multiple NICs are
installed on the computer, you can use the -a option with this command. If the -a option is used,
the ARP command displays all ARP tables.
The following image shows the output of the arp command when used with the -a option.
To display the ARP cache entry for a specific IP address, specify the IP address with the -
N option. For example, the following command displays the ARP cache table for the interface
that is assigned the IP address 192.168.42.171.
Arp -a -N 192.168.42.171
The following image shows the output of the above command.
45
B-Tech CSE 5th Sem CN
LAB
Netstat
This command displays active connections, ports on which the computer is listening, Ethernet
statistics, the IP routing table, and IP statistics.
The output of this command is organized in rows and columns. Each row represents a new
connection or an entry in the output. It contains four columns. These columns provide the
following information about the row.
Proto: - This column displays the name of the protocol (TCP or UDP).
Local Address: - This column displays the IP address of the local computer and the port
number being used. If the port is not yet established, the port number is shown as an asterisk
(*).
Foreign Address: - This column displays the IP address and port number of the remote
computer to which the port is connected.
46
B-Tech CSE 5th Sem CN
LAB
Option Description
-a Displays all active TCP connections and the TCP and UDP ports on which the
computer is listening.
-e Displays Ethernet statistics, such as the number of bytes and packets sent and
received.
-n Displays active TCP connections, however, addresses and port numbers are
expressed numerically and no
-o Displays active TCP connections and includes the process ID (PID) for each
connection.
47
B-Tech CSE 5th Sem CN
LAB
-p Shows connections for the protocol specified by Protocol. In this case, the Protocol
can be
-s Displays statistics by protocol. By default, statistics are shown for the TCP, UDP,
ICMP, and IP protocols.
The following table lists some common options of the netstat command.
Ipconfig
This command displays all current TCP/IP network configuration values and refreshes
Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings.
This command is mainly used to view the IP addresses on the computers that are configured to
obtain their IP address automatically. The following image shows the sample output of this
command.
48
B-Tech CSE 5th Sem CN
LAB
EXPERIMENT - 12
49
B-Tech CSE 5th Sem CN
LAB
• Now to enable messaging from Router0 to Router2 set a static route from Router0 to
Router2
• Click on Router0 and open config then in settings > static fill the fields of IP address,
subnet mask and Next hop as 10.10.2.0, 255.255.255.0, 10.10.1.1 respectively.
• Now again try sending now it will be successful
• Do similar for Router2 so it can also send messages to Router0
50