You are on page 1of 44

DR.

AKHILESH DAS GUPTA INSTITUTE


OF TECHNOLOGY & MANAGEMENT
(NEW DELHI)

Operating Systems(AIML301)

SUBMITTED BY:
SUBMITTED TO:
NAME: Vansh Verma
Suman Bhatia

ROLL NO: 04015611621


Experiment - 1
AIM : - To study the wireless networking commands

1. Ping : it is used to testing a network host capacity to interact with another


host. This is performed using ICMP protocol which allows to echo the packet
to be sent to destination host and listening mechanism

ping followed by target host name or ip address

2. Hostname : it is used to display the name of the current host system.


3. ipconfig : it is used to display basic ip address configuration info for
the device
4. tracert : it is used to diagnose path related problems on the ip network
router exchange ip packets between the source and the destination. They take ip
packets from the source host and forward them in a sequence until they reach
the destination host. It prints the path if all routers on the path are functional
this command prints the whole path.

If router is down on the path this command prints the path upto the last
operational router
5. arp : it displays and modifies the internet-to-adapter address
translation tables used by Address in networks and communication
management
EXPERIMENT-2

Aim :- Introduction to Cisco Packet Tracer.


Cisco Packet Tracer is a network simulation and visualization tool that allows
students, network administrators, and engineers to design, configure, and
troubleshoot complex network topologies in a virtual environment. It is a
powerful tool used for network modeling, creating virtual networks, and
simulating network behavior.

Packet Tracer provides a simulated environment that allows users to build and
configure virtual networks using a variety of Cisco devices and software. Users
can create a network topology and simulate network traffic, enabling them to
observe and analyze network behavior. Packet Tracer supports a wide range of
protocols, including TCP/IP, DHCP, OSPF, EIGRP, VLAN, and NAT, among
others.

Packet Tracer is commonly used in networking courses to help students gain


practical experience in network design, configuration, and troubleshooting. It
allows students to explore different network scenarios and see how changes to
network configurations affect network behavior. Additionally, Packet Tracer
provides a safe environment for students to experiment with network design and
configuration without the risk of damaging real network equipment.

Packet Tracer is available for free download from Cisco's website for
educational purposes. It is compatible with Windows and Linux operating
systems and offers a user-friendly interface that makes it easy to use for both
beginners and advanced network engineers.
EXPERIMENT-3

Aim: To study pc-pc communication using LAN.

Software used: Cisco Packet Tracer

Procedure:

1. Launch Cisco Packet Tracer and create a new project.

2. From the "End Devices" section of the toolbar, drag and drop two PCs
onto the workspace.

3. Connect the PCs by dragging cables from one PC to other. (Refer the
given screenshot).

4. Configure the IP addresses of the PCs by right-clicking on them, selecting


"Config " and entering the IP address and subnet mask or choosing the
DHCP option.

5. Test the connectivity between the PCs by sending a message from one pc
to other using message button in side tool bar .

6. Check the simulation of the packet transfer by clicking on the


simulation button in the bottom right corner.
Result:
EXPERIMENT-4
Aim: To create a LAN using a star topology in Cisco Packet Tracer.
Software used: Cisco Packet Tracer
Theory: A star topology is a network topology where all the devices in a
network are connected to a central hub or switch. In this topology, the central
hub acts as a communication point for all the devices in the network.
This topology is commonly used in Local Area Networks (LANs) due to its
scalability and ease of installation. It is easy to add or remove devices without
disrupting the network, as only the cable connected to the new device needs to
be added or removed.

Procedure:
1. Open Cisco Packet Tracer and click on "New" to create a new project.
2. Select "Generic" from the "Available Templates" section and
click "Create".
3. In the workspace area, click on the "End Devices" tab in the lower
left hand corner and drag a "PC" to the workspace area.
4. Repeat step 3 to add more PC to the work space area.
5. In the workspace area, click on the "Connections" tab in the lower
left hand corner and select "Copper Straight-Through" cable.
6. Drag the cable from one of the PCs to the middle of the work space area.
7. Repeat step 6 to connect all PCs to the middle of the work space
area, creating a star topology.
8. To connect the PCs to a switch, click on the "Switches and Hubs" tab in
the lower left-hand corner and drag a "Switch" to the middle of the
work space area.
9. Repeat step 8 to add more switches to the workspace area, if needed.
10.Connect each PC to a switch by dragging a cable from the PC to one
of
the switch ports.
11.To configure IP addresses on the PCs, click on a PC, select "Desktop,"
and click on "IP Configuration."
12. Enter the IP address, subnet mask, and default gateway for each PC.
Result:-
EXPERIMENT-5

Aim: To create a LAN using a bus topology in Cisco Packet Tracer.

Software used: Cisco Packet Tracer

Theory: Bus Topology is a type of network topology in which all devices


are connected to a single cable, called a backbone or a trunk. It is the simplest
and least expensive type of topology but also the most vulnerable to faults. In a
Bus Topology, all devices receive all the data that is transmitted on the
network, and the data is processed by the devices that are intended to receive it.
If two devices transmit data simultaneously, a collision occurs, and the data
becomes corrupted.

Procedure:

1. Launch Cisco Packet Tracer and create new project.


2. From the "End Devices" section the tool bar, drag and drop two PC’s
and a Hub onto the workspace.
3. Connect the PCs to the Hubby dragging cables from the PC’s to the
Hub's ports.
4. Configure the IP addresses of the PCs by right-clicking them,
selecting "Config," and entering the IP address and subnet mask.
5. Test the connectivity between the PCs by opening the command
prompt on one PC and pinging the other PC.
6. Send data from one PC to the other by opening a file on one PC
and copying it to the other PC.
Result:
EXPERIMENT-6

Aim: To create a LAN using a ring topology in Cisco Packet Tracer.


Software used: Cisco Packet Tracer
Procedure:
Step 1-

1. First, open the cisco packet tracer desktop and from the “end
device” section of toolbar, drag and drop four pc and four switches.

2. Then, create a network topology as shown in the image.


3. Use an Automatic connecting cable to connect the devices with others.

Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask.

 To assign an IP address in PC0, click on PC0.

 Then, go to desktop and then IP configuration and there you will


IPv4 configuration.
 Fill IPv4 address and subnet mask.

 Assigning IP address using the ipconfig command, or we can also assign


an IP address with the help of a command.

 Go to the command terminal of the PC.

 Then, type ip config <IPv4 address><subnet mask><default


gateway> (if needed).

 Repeat the same procedure with other PCs to configure them thoroughly.
Step 3: Verify the connection by pinging the IP address of any host in PC0.

 Use the ping command to verify the connection.


 As we can see we are getting replies from a targeted node on both PCs.
 Hence the connection is verified.
 A simulation of the experiment in which we have sent two PDU
packets one targeted from PC0 to PC2 and another targeted from PC1
to PC3.
Result:
EXPERIMENT-7

Aim: To create a LAN using a mesh topology in Cisco Packet Tracer .

Software used: Cisco Packet Tracer

Procedure:

Step 1:
 First, open the cisco packet tracer desktop and from the “end
device” section of toolbar, drag and drop four pcs and four switches.
 Then, create a network topology as shown in the image.
 Use an Automatic connecting cable to connect the devices with others.
Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask.
 To assign an IP address in PC0, click on PC0.
 Then, go to desktop and then IP configuration and there you will
IPv4 configuration.
 Fill IPv4 address and subnet mask.
 Assigning IP address using the ip config command, or we can also
assign an IP address with the help of a command.
 Go to the command terminal of the PC.
•Then, type ip config <IPv4 address><subnet mask><default
gateway> (if needed).
 Repeat the same procedure with other PCs to configure them thoroughly.
Step 3: Verify the connection by pinging the IP address of any host in PC0.
 Use the ping command to verify the connection.
 As we can see we are getting replies from a targeted node on both PCs.
 Hence the connection is verified.
 A simulation of the experiment in which we have sent two PDU
packets one targeted from PC0 to PC2 and another targeted from PC1
to PC3.
Result:
EXPERIMENT-8

Aim: To configure a hub/switch in order to set up a local area network (LAN)

Requirement:
 A hub/switch
 Ethernet cables
 A computer with Cisco Packet Tracer installed

Procedure:
1. Open Cisco Packet Tracer and create a new blank network.
2. Drag and drop a hub/switch device from the "Switches" category onto
the workspace.
3. Connect the hub/switch to a computer by dragging and dropping an Ethernet
cable from the computer's network interface card (NIC) to the hub/switch's
port.
4. Double-click the hub/switch to open its configuration window.
5. Set a hostname for the hub/switch.
6. Configure an IP address and subnet mask for the hub/switch.
7. Set a default gateway for the hub/switch.
8. Configure the hub/switch ports.
9. Save the configuration by entering the following
command: Switch# copy running-config startup-config

Output:
By following this guide, you should be able to successfully configure a
hub/switch using Cisco Packet Tracer. This will enable you to set up a LAN for
communication between multiple devices. You will have learned how to set a
hostname, configure an IP address and default gateway, and configure ports.
You can test the configuration by connecting additional devices to the
hub/switch and verifying connectivity. This will help you gain a better
understanding of how to configure network devices and prepare you for real
world scenarios.
Result:
EXPERIMENT – 9

AIM: Introduction to Datadog tool for data monitoring in network.

Datadog is a popular monitoring and analytics platform that provides


comprehensive visibility into the performance and health of IT infrastructure,
including networks. While it offers a wide range of monitoring capabilities
across various domains, including applications, infrastructure, and logs, it also
provides features specifically designed for network monitoring.

FEATURES:

Network Performance Monitoring: Datadog allows you to monitor network


performance metrics such as network latency, throughput, packet loss, and jitter.
It provides real-time visibility into network performance, helping you identify
issues and optimize network performance.

Traffic Analysis: Datadog enables the analysis of network traffic patterns and
trends. It provides insights into network utilization, top talkers, and traffic
distribution across different network segments. This information helps in
capacity planning and optimizing network resources.

Network Device Monitoring: Datadog can monitor network devices such as


routers, switches, firewalls, and load balancers. It collects and visualizes key
device metrics, monitors device health, and provides alerts for issues such as
high CPU utilization, memory usage, or interface errors.

Network Flow Monitoring: Datadog supports monitoring network flows using


technologies such as NetFlow, IPFIX, or sFlow. It collects flow data to analyze
network traffic patterns, detect anomalies, and troubleshoot network
performance issues.
Alerting and Notification: Datadog allows you to configure custom alerts based
on network metrics and thresholds. You can receive proactive notifications via
various channels such as email, Slack, or PagerDuty, enabling you to respond
quickly to network issues.

Visualization and Reporting: Datadog provides rich visualizations and


dashboards to represent network performance and metrics. It offers
customizable reporting capabilities, allowing you to generate and share reports
on network health, performance trends, and SLA compliance.

Integration and Automation: Datadog integrates with a wide range of network


devices, technologies, and monitoring tools, enabling centralized monitoring
and management. It also provides APIs and automation capabilities for
seamless integration into existing workflows and processes.
EXPERIMENT – 10

Aim: Introduction to Network Bandwidth analyser tool for network


monitoring.

A network bandwidth analyzer is a tool used for network monitoring and


analysis to measure and analyze network bandwidth utilization. It helps in
understanding network traffic patterns, identifying bottlenecks, optimizing
network performance, and ensuring efficient utilization of network resources.

Popular network bandwidth analyzer tools:

SolarWinds Network Performance Monitor: SolarWinds NPM offers


comprehensive network monitoring capabilities, including bandwidth analysis.
It provides real-time visibility into bandwidth utilization, network traffic
patterns, and historical data. The tool allows you to monitor network devices,
interfaces, and applications, providing insights into bandwidth usage and
identifying potential issues affecting network performance.

PRTG Network Monitor: PRTG is a powerful network monitoring tool that


includes bandwidth monitoring and analysis features. It provides real-time
monitoring of network traffic, bandwidth utilization, and detailed bandwidth
reports. With PRTG, you can monitor network devices, interfaces, and
protocols, enabling you to optimize network performance and troubleshoot
network congestion.

ManageEngine NetFlow Analyzer: NetFlow Analyzer by ManageEngine is a


network bandwidth analysis tool that uses flow-based technologies such as
NetFlow, sFlow, and IPFIX to monitor and analyze network traffic. It provides
insights into bandwidth consumption, top talkers, and applications using
bandwidth. The tool offers customizable dashboards, real-time alerts, and
detailed reports for network performance optimization.
Wireshark: Wireshark is a widely-used open-source network protocol analyzer
that can also be used for bandwidth analysis. It captures and analyzes network
packets, allowing you to examine network traffic patterns and identify
bandwidth utilization. Wireshark provides detailed packet-level information and
can be used to troubleshoot network performance issues.

ntopng: ntopng is an open-source network traffic monitoring and analysis


tool that includes bandwidth monitoring capabilities. It provides real-time
monitoring of network traffic, bandwidth usage, and application protocols.
ntopng offers detailed dashboards, historical reports, and the ability to drill
down into network traffic for deeper analysis.

These tools can assist in network bandwidth monitoring and analysis, helping
you gain insights into network traffic patterns, optimize bandwidth utilization,
and troubleshoot network performance issues. Each tool has its own set of
features and capabilities, so it's important to evaluate them based on your
specific requirements and preferences.
Experiment – 9
AIM: Introduction to Datadog tool for data monitoring in network.

Datadog is a popular monitoring and analytics platform that provides


comprehensive visibility into the performance and health of IT infrastructure,
including networks. While it offers a wide range of monitoring capabilities
across various domains, including applications, infrastructure, and logs, it also
provides features specifically designed for network monitoring.

FEATURES:
Network Performance Monitoring: Datadog allows you to monitor network
performance metrics such as network latency, throughput, packet loss, and
jitter. It provides real-time visibility into network performance, helping you
identify issues and optimize network performance.

Traffic Analysis: Datadog enables the analysis of network traffic patterns and
trends. It provides insights into network utilization, top talkers, and traffic
distribution across different network segments. This information helps in
capacity planning and optimizing network resources.

Network Device Monitoring: Datadog can monitor network devices such as


routers, switches, firewalls, and load balancers. It collects and visualizes key
device metrics, monitors device health, and provides alerts for issues such as
high CPU utilization, memory usage, or interface errors.
Network Flow Monitoring: Datadog supports monitoring network flows using
technologies such as NetFlow, IPFIX, or sFlow. It collects flow data to analyze
network traffic patterns, detect anomalies, and troubleshoot network
performance issues.
Alerting and Notification: Datadog allows you to configure custom alerts
based on network metrics and thresholds. You can receive proactive
notifications via various channels such as email, Slack, or PagerDuty, enabling
you to respond quickly to network issues.
Visualization and Reporting: Datadog provides rich visualizations and
dashboards to represent network performance and metrics. It offers
customizable reporting capabilities, allowing you to generate and share
reports on network health, performance trends, and SLA compliance.
Integration and Automation: Datadog integrates with a wide range of network
devices, technologies, and monitoring tools, enabling centralized monitoring
and management. It also provides APIs and automation capabilities for
seamless integration into existing workflows and processes.
Experiment – 10
AIM: Introduction to network Bandwidth Analyser tool for network
monitoring.

WHAT IS NETWORK MONITORING?

Your organization needs various network amplification devices such as


routers, wireless access points, gateways, modems, ethernet cables, switches,
repeaters, hubs, and more to provide good network connectivity and
performance to the workforce. Emerging technologies like wireless, IoT
(internet of things), cloud, and VPN have broadened the networking spectrum
for data transfer, mobile or remote communication, and service delivery.
Network elements and devices have also evolved from flat switches to
multilayer switches, proxy servers, bridge routers, firewalls, protocol
converters, and so on.

Despite this transformation, monitoring how well or efficiently your network


is performing remains a critical factor. Network monitoring is the continuous
analysis of a computer network or the entire network infrastructure using a
system for discovering any slow or failing elements across the network. Once
the issues are detected, network administrators are notified about these
failures immediately via alerts (email, SMS, or other means), so they can take
the required actions. The process of network monitoring falls under the
network management umbrella.

 LAN (Local Area Network), WAN (Wide Area Network),


 VoIP (Voice over Internet Protocol), multilayered connections,
MPLS (Multiprotocol Label Switching)
 The state of network nodes, such as the access or distribution
 Tandem switches, servers, routers, firewalls, client computers

The following factors are essential for analyzing and measuring your network
performance:
 Uptime, responsiveness, or availability
 Bandwidth and throughput
 Network latency, reliability, and consistency
 WAN efficiency
 Measurement of round-trip delays

KEY ASPECTS OF NETWORK MONITORING

Outlined below are some critical measurement areas in network monitoring:


Internet Server Monitoring: Internet server monitoring tools continuously
check web servers and alerts the server hosting provider or your internal
admin team if any of the network servers go down. Server monitoring can be
both internal and external.
Protocol Monitoring: Network monitoring services check and test various
types of protocols—SNMP, SMTP, HTTPS, FTP, DNS, POP3, UDP, IMAP, SSL,
TCP, TELNET, ICMP, SIP, and other network ports at predefined time intervals.
Network Tomography: Network tomography uses end-to-end probing to
monitor the health of your network links. The UDP probe packets are sent by
agents to responders at various network points.
Route Analytics: Route analytics is the monitoring of network routing
postures and identifying performance issues causing downtimes or latencies
in your network, using advanced systems, algorithms, and tools.
Experiment – 11
AIM: To configure the Router.
Software Used – Cisco packet tracer kit.
Theory –

In this network, a router and 2 PCs are used. Computers are connected with
routers using a copper straight-through cable. After forming the network, to
check network connectivity a simple PDU is transferred from PC0 to PC1.
The network simulation status is successful. From this network, it can be
observed that the router handles data transfers between multiple devices.
Step-1(Configuring Router1):
1. Select the router and Open CLI.
2. Press ENTER to start configuring Router1.
3. Type enable to activate the privileged mode.
4. Type config t(configure terminal) to access the configuration menu.
5. Configure interfaces of Router1:
6. Type no shutdown to finish.
Router1 Command Line Interface:
Router>enable
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface FastEthernet0/0
Router(config-if)#ip address 192.168.10.1 255.255.255.0
Router(config-if)#no shutdown
Router(config-if)#%LINK-5-CHANGED: Interface GigabitEthernet0/0,
changed state to up
Router(config-if)#interface FastEthernet0/1
Router(config-if)#ip address 192.168.20.1 255.255.255.0
Router(config-if)#no shutdown
Step-2(Configuring PCs):
1. Assign IP Addresses to every PC in the network.
2. Select the PC, Go to the desktop and select IP Configuration and
assign an IP address, Default gateway, Subnet Mask
3. Assign the default gateway of PC0 as 192.168.10.1.
4. Assign the default gateway of PC1 as 192.168.20.1.
Step-3(Connecting PCs with Router):
1. Connect FastEthernet0 port of PC0 with FastEthernet0/0 port of
Router1 using a copper straight-through cable.
2. Connect FastEthernet0 port of PC1 with FastEthernet0/1 port of
Router1 using a copper straight-through cable.

Router Configuration Table:

IP address IP Address
Device Subnet Subnet
FastEthernet0/ FastEthernet0/ 1
Name Mask Mask
0

Router 192.168.10. 255.255.255. 192.168.20. 255.255.255.


1 1 0 1 0

PC Configuration Table:

Device Name IP address Subnet Mask Gateway

PC 0 192.168.10.2 255.255.255.0 192.168.10.1

PC 1 192.168.20.2 255.255.255.0 192.168.20.1

Designed Network topology:

Simulation of Designed Network Topology:


Sending a PDU From PC0 to PC1:
Acknowledgment From PC1 to PC0:
Experiment – 12
Aim: Introduction to Wireshark and Network Miner.

Introduction:

Wireshark is an open-source packet analyzer, which is used for education,


analysis, software development, communication protocol development,
and network troubleshooting.

It is used to track the packets so that each one is filtered to meet our specific
needs. It is commonly called as a sniffer, network protocol analyzer, and
network analyzer. It is also used by network security engineers to examine
security problems.

Wireshark is a free to use application which is used to apprehend the data back
and forth. It is often called as a free packet sniffer computer application. It puts
the network card into an unselective mode, i.e., to accept all the packets which
it receives.

Uses of Wireshark:

Wireshark can be used in the following ways:

1. It is used by network security engineers to examine security problems.


2. It allows the users to watch all the traffic being passed over the network.
3. It is used by network engineers to troubleshoot network issues.
4. It also helps to troubleshoot latency issues and malicious activities on
your network.
5. It can also analyze dropped packets.
6. It helps us to know how all the devices like laptop, mobile phones,
desktop, switch, routers, etc., communicate in a local network or the rest
of the world.

Network Miner

NetworkMiner is an open source network forensics tool that extracts artifacts,


such as files, images, emails and passwords, from captured network traffic in
PCAP files. NetworkMiner can also be used to capture live network traffic by
sniffing a network interface. Detailed information about each IP address in the
analyzed network traffic is aggregated to a network host inventory, which can
be used for passive asset discovery as well as to get an overview of which
devices that are communicating. NetworkMiner is primarily designed to run in
Windows, but can also be used in Linux.
NetworkMiner showing files extracted from sniffed network traffic to disk

You might also like