Professional Documents
Culture Documents
Signature of Faculty
Experiment-2
Signature of Faculty
Experiment-3
Aim: Study of College Network.
Computer network is defined as the collection of large number of computers which are
interconnected with each other through some physical medium and internetworking
devices like twisted pair cable, switch, and router etc. for exchanging of information and
sharing of resources.
Our internet service provider is BSNL. 100 Mbps leased line is provided by this service
provider. This 100 Mbps lease line is connected to an internet switch. The ISP provides
pool of ten public IP addresses, which are allocated to various computers according to
the need, like one is allocated to the Director’s office; one is for Exam control office and
so on. One of the sub links is connected to the Proxy Server which is used as the internet
resource for whole college. Other than Proxy Server, the server like IBM (configuration
of this is server is given separately) is also available in our college for preventing data
from sudden disaster. Another link is connected to the Web Server (for College website)
The main connection is carried forward by the proxy server through a switch. The one
port of this switch is connected to the RIS and DHCP is configured in RIS. This port of
the switch connects the host of first floor labs in star and tree topology and the third port
is connected to the PCs of second floor labs. From the switch of first floor and second
floor Wi-Fi devices are also connected which provide the wireless services.
The fourth port is connected to third floor which splits connection on that floor and also
in library. These two floors 3rd and 2nd floors having backup on FTP server according to
their need, they can access files which they need.
The main line from the A block is also extended to the B-Block and C-Block. In this
manner large numbers of computers are interconnected.
Internetworking Devices:-
Switches: A network switch is a device that forwards and filters OSI layer 2
datagrams (chunk of data communication) between ports (connected cables) based on
the MAC addresses in the packets. This is distinct from a hub in that it only forwards
the frames to the ports involved in the communication rather than all ports connected. A
switch breaks the collision domain but represents itself a broadcast domain. Switches
make forwarding decisions of frames on the basis of MAC addresses. A switch normally
has numerous ports, facilitating a star topology for devices, and cascading additional
switches. Some switches are capable of routing based on Layer 3 addressing or
additional logical levels; these are called multi-layer switches. The term switch is used
loosely in marketing to encompass devices including routers and bridges, as well as
devices that may distribute traffic on load or by application content (e.g., a Web URL
identifier).
Specification of Switch
D-Link DES-1016D (16 port Switch).
D-Link DES-1024D (24 port Switch).
KVM Switch (4 port, Manufacturer D-Link)
Routers: A router is a networking device that forwards packets between networks
using information in protocol headers and forwarding tables to determine the best next
router for each packet. Routers work at the Network Layer (layer 3) of the OSI model
and the Internet Layer of TCP/IP.
Category 5 & 6 cable: It is a twisted pair high signal integrity cable type often
referred to as Cat5 or Cat-5. Most cables are unshielded, relying on the twisted pair
design for noise rejection, and some are shielded. Category 5 has been superseded by
the Category 5e specification structured cabling for computer networks such as
Ethernet, and is also used to carry many other signals such as basic voice services,
token ring, and ATM (at up to 155 Mbit/s, over short distances).
Topology used in LAN:-
Star Topology: All computers/devices connect to a central device called hub or switch.
Each device requires a single cable point-to-point connection between the device and
hub. It is widely implemented in most organisations. Hub is the single point of failure.
Technical Details
Result: Hence we have learned about the network topology of our college which is a
star configuration.
Signature of Faculty
Experiment-4
Aim: Study & Verification of standard Network topologies i.e. Star, Tree, Bus etc.
Apparatus (Software): Packet tracer Software
Procedure: To implement this practical following network topology is required to be
configured using the commands learned in previous practical.
After configuring the given network a packet should be ping from any one machine to
another.
Network topology is the arrangement of the various elements (links, nodes, etc.) of a
computer network.
Essentially, it is the topological structure of a network, and may be depicted physically
or logically.
Physical topology refers to the placement of the network's various components,
including device location and cable installation, while logical topology shows how data
flows within a network, regardless of its physical design. Distances between nodes,
physical interconnections, transmission rates, and/or signal types may differ between
two networks, yet their topologies may be identical.
A good example is a local area network (LAN): Any given node in the LAN has one or
more physical links to other devices in the network; graphically mapping these links
results in a geometric shape that can be used to describe the physical topology of the
network. Conversely, mapping the data flow between the components determines the
logical topology of the network.
There are two basic categories of network topologies:-
Physical topologies: The shape of the cabling layout used to link devices is called the
physical topology of the network. This refers to the layout of cabling, the locations of
nodes, and the interconnections between the nodes and the cabling.
Logical topologies: The physical topology of a network is determined by the
capabilities of the network access devices and media, the level of control or fault
tolerance desired, and the cost associated with cabling or telecommunications circuits.
Logical topologies are often closely associated with Media Access Control methods and
protocols. Logical topologies are able to be dynamically reconfigured by special types
of equipment such as routers and switches.
The study of network topology recognizes eight basic topologies:
Bus Topology
Star Topology
Ring or circular Topology
Mesh Topology
Tree Topology
Creating of network topology using Cisco Packet tracer is Very easy. By help of its
inbuilt tools and functionality user can create topology in very easy ways.
Tree Topology
Result: Hence we have learned about the different types of topology using Cisco
Packet Tracer 8.0.
Signature of Faculty
Experiment-5
Aim: LAN installation and Configuration in Windows 7 or later version.
Procedure:
Network interface card (NIC) or an on-the-motherboard network port for each computer.
HP and Compaq computers are network ready with NICs installed. Confirm the
computer has a RJ-45 network port on the back. Network hub (or router). A separate
network hub may not be necessary if your home is already equipped with RJ-45 jacks in
the walls or if your DSL or cable modem provides RJ-45 ports (select models). If you
need a network hub, consult with a network specialist at your local computer store to
determine a hub that meets your needs.
NOTE: A crossover cable can be used to connect two computers without a hub.
However, it only allows two computers to connect and is not expandable. Network
cables for each computer. Disconnect the Internet. If you have a DSL or cable modem,
disconnect it. Disable any firewall software. Firewall software may interfere with
network setup. You can enable the firewall after network setup is complete.
Step 1: Connecting the network hardware and cables to set up a local network. Do the
following to set up the network hardware and connect the networking cables.
Set up and turn on the power for the network hub or other networking device.
Connect the computers to the networking device. If a crossover cable is used,
connect the cable to the RJ45 network ports on each computer.
Connect the computer power cords and turn the computers on.
Step 2: Turning on Network discovery and file sharing in Windows 7. Turn on Network
discovery and file sharing on each computer that you want to access on the network.
Click Start, and then click Control Panel.
Under Network and Internet, click Choose Home group and sharing.
In the Home group settings window, click Change advanced sharing settings.
Turn on network discovery and file and printer sharing. Review the other settings
and turn them on or off.
Step 3: Sharing drives, folders, and files in a Windows 7 network. To share non-public
folders with other computers on a local network, follow these steps:
Click Start , and then click Computer.
Browse to the folder you want to share.
Right-click the folder, select Share with, and then click Home group (Read),
Home group (Read/Write), or Specific people.
If you chose Specific people, the File Sharing window displays.
Click the down arrow and select the account you want to share with, and then
click
Click an arrow under Permission Level to set the permission level for each
account or group.
Click Share.
Step 4: Testing a local network in Windows 7. Open the Windows 7 network window
and browse through the shared folders in each computer on the network. If the computer
is able to read and access files from a remote computer, the remote computer is set up
correctly. Browse to every available computer from each computer on the network. If
there are any issues, go back through these steps and verify that the settings are correct.
Result: Hence we have configured a LAN interface in windows 7.
Signature of Faculty
Experiment-06
Aim: Implement & configure various types of routing algorithm using packet tracer.
Distance Vector Routing protocol.
Apparatus (Software): Cisco Packet Tracer
Procedure:-
Establish the network in this format.
This topology needs the network segmentation in the above mentioned format.
Each router has to be given the global knowledge of the routers present in this
topology.
Once each router is configured with global knowledge to global topology, then
start the simulation and let it run for few seconds so that all routers can send their
distance vector tables to their neighbouring routers.
Once the simulation settle downs, run the ping test from left most network to the
pc in right most network.
Result: Hence we have learned about the simulation of distance vector routing (RIP) in
Cisco Packet Tracer.
Signature of Faculty
Experiment-07
Aim: Implement & configure various types of routing algorithm using packet tracer.
Link state Routing protocol.
Apparatus (Software): Cisco Packet Tracer
Theory: The Link state Routing protocol belongs to the Intra domain routing protocol
where the routers share their link state table with other routers in the domain using
FLOODING OF LINK STATE TABLE. In Distance vector routing the router sends its
distance vector table to its neighbouring tables only, but in link state the router floods
the domain with its link state table to ensure the transmission to the remote corners of
the domain. This makes each router capable to implementing the shortest path first
algorithm on the knowledge of the topology of the domain.
This topology for link state routing protocol implementation makes the routers to flood
intra domain network with their link state table. Initially the tables will look like.
Upon flooding each router in domain can have its own graph of router upon which it can
apply dijkstra’s shortest path algorithm.
Result: Hence we have discussed about the on paper details of Link State routing
algorithm.
Signature of Faculty
Experiment-08
Aim: Study and Configure DHCP protocol by creating the pool.
Apparatus (Software): Cisco Packet Tracer
Procedure: First establish a simple start topology using a switch and a root router
which will be our DHCP server.
Once done, let the simulation run for few seconds and when the simulation settles
down you will see that each PC which was configures for DHCP IP allocation
would have been allocated with a IP address.
Result: Hence we have established a DHCP server using a router as a root node in the
network topology.
Signature of Faculty
Experiment-09
Aim: Study and Configure of Application Layer Protocols: DNS, HTTP, HTTPS, FTP
and Telnet.
Domain Name System: Domain Name System (DNS) is a critical component of the
global Internet infrastructure. The Domain Name System is a hierarchical distributed
naming system for computers, services or any resource connected to the internet or a
private network. It associates various information with domain name assigned to each of
entities. Most prominently, it translates domain names, which can be easily memorized
by humans, to the numerical IP addresses needed for the purpose of computer services
and devices worldwide. Domain Name System distributes the responsibility of assigning
domain name and mapping those names to IP addresses by designating authorities name
serves for each domain. It also specifies the technical functionality of the database
service which is at its core. It defines the Domain Name System protocol, detailed
specification of structure and data communication exchanges used in Domain Name
System, a part of the Internet Protocol Suite.
FEATURES OF DNS:
Scalability: No limit to the size of the database (i.e. one server can have
40,000,000 names). No limit to the number of queries (24,000 queries are easily
handled per second). Queries distributed among masters, slaves and caches.
Reliability: Data is replicated (data from master is copied to multiple slaves &
system can deal with outrage of servers) Clients will typically query local catches.
DNS protocol can use either UDP or TCP.
Dynamicity: Database can be updated dynamically (add/delete/modification)
Modification of master database triggers replication. Clients can query (master
server, any of the copies at slave servers).
Loose Coherency: The database is always internally consistent. Cached data
expires according to timeout set by zone administrator.
Top Level Domain: Some types of top-level domains:
o Organizational: It’s a 3 character code/domain. It indicates the function of
the organization. Examples: .gov, .edu, .org, .com, .net, etc.
o Geographical: it’s a 2 character code that represents any specific
geographic location like country or region. Examples: .us, .in, etc. used IP
address-to-name mapping. There are more than 200 top-level∙ domains.
TELNET: It stands for Terminal Network. It is a type of protocol that enables one
computer to connect to local computer. It is a used as a standard TCP/IP protocol for
virtual terminal service which is given by ISO. Computer which starts connection
known as the local computer. Computer which is being connected to i.e. which accepts
the connection known as remote computer. When the connection is established between
local and remote computer. During telnet operation whatever that is being performed on
the remote computer will be displayed by local computer. Telnet operates on
client/server principle. Local computer uses telnet client program and the remote
computers uses telnet server program. It is a general-purpose client/server application
program. This program enables the establishment of the connection to the remote system
in such a way that the local system starts to appear as a terminal at the remote system. It
is a standard TCP/IP protocol that is used for virtual terminal service. In simple words,
we can say that the telnet allows the user to log on to a remote computer. After logging
on the user can use the services of the remote computer and then can transfer the results
back to the local computer.
The TELNET was mainly designed at the time when most operating systems operate in
the time-sharing environment. And in this type of environment, a large computer can
support multiple users. Usually, the interaction between the computer and user occurs
via terminal (It is a combination of keyboard, mouse, and monitor). TELNET makes the
use of only one TCP/IP connection.
Signature of Faculty