CN File P1
CN File P1
RGPV, BHOPAL
VISHWAVIOY
RGPY AMOPAL
Laboratory Manual
COMPUTER NETWORKS
NO LIST OF EXPERIMENTS P.NO
Paye I
Experiment No: 1
Experiment: Dothe following Cabling works ina network a) Cable Crimping b) Standard Cabling
and c)Cross Cabling d) 10 connector crimping e) Testing the erimped cable using acable tester.
Aim:
To do the following
a) Cable Crimping
b) Standard Cabling
c) Cross Cabling
d)10 conncctor crimping
e) Testing the crimped cable using a cable tester
Apparatus/Tools/Equipments/Components:
RJ-45 connector,
1O Connector,
Crimping Tool,
Twisted pair Cable,
Cable Tester.
Principle:
Standard Cabling:
1. 10BaseT and 100BaseT are most common mode of LAN. You can use UTP category-5 cable for
both modes.
2. A straight cable is used to connect a computer to a hub
RJ45 RJ45
Pin # Wire Diagram Pin # Wire Diagram
(END Color End #1 (END Color End #2
1) 2)
1- White/Orange ON 1 Whte/Green
2 Orange 2 Green
3 MateGreen White/Orange
4 Blue White/Brown
Brown 8 White/Blue
Page 2
Cross Cabling:
Across cable is used to connect 2computers directly (with ONLY the UTP cable). It is also used then youconnect 2hubs
with a normal port on both hubs
B Brown 8 whte/Blue
Procedure:
Cable Crimping steps:
1. Remove the outmost vinyl shield for 12mm at one end of the cable (we call this side A-side).
2. Arrange the metal wires in parallel
3. Insert the metal wires into RJ45 connector on keeping the metal wire arrangement.
4.Set the RJ45connector (with the cable) on the pliers, and squeeze it tightly.
Page 3
5. Make the other side of the cable (we callthis side B-side) in the same way.
6. After youmade it, you don't need to take care of the direction df the cable.
PC PC CROS3OV eR PC
ST RAIGHT-THRu HU
1 R TX+1 1 TX
2 R
31 3 TX 3 HK+
4
5
6 ROK
Align each of the colored wires according to the layout of the jack. Use
the punch down toolto insert each wire into the jack.
Repeat the above steps for the second RJ45 jack.
1Rs Interaetnr
Step 4:Insert the wires into the RJ45 connector right white orange left brovwn the pins facing up
Page 4
Step 5 : Place the conncctor into a crimping tool, and squeeze hard so that the handle reaches its fullswing,.
Step 6: Use acable tester totest for proper continuity
Result:
Cable Crimping, Standard Cabling and Cross Cabling, IO connector crimping and testing the crimpedcable using a
cable tester are done successfully.
Page 5
EXPERIMENT No -2
Experinment: STUDY OF VARIOUS NETWORK TOPOLIGIES
AIM: students shallbe able to know how different computers can be connected in different ways.
THEORY: Network topology is the layout pattern of interconnections of the various elements (links,
nodes, ctc.) of a computer network. Network topologies may be physical or logical. Physical topology
means the physical design of a network including the devices, location and cable installation. Logical
topology refers to how data is actually transferred in a network as opposed to its physical design.
A local area network (LAN) is one example of a network that exhibits both a physical topology and a
logical topology. Any given node in the LAN has one or more links to one or more nodes in the
network and the mapping of these links and nodes in a graph results in a geometric shape that may be
used to describe the physical topology of the network. Likewise, the mapping of the data flow
between the nodes in the network determines the logical topology of the network. The physical and
logical topologies may or may not be identical in any particular network.
1. Physical topologies
The mapping of the nodes of anetwork and the physical connections between them -i.e., the layout
of wiring,cables, the locations of nodes, and the interconnections between the nodes and the cabling
or wiring system
Classification of physicaltopologies
The study of network topology recognizes seven basic topologies:
a) Single Node Topology or Point to Point topology
b) Bus topology
c) Star topology
d) Ring topology
e) Tree topology
f) Mesh topology
g) Hybrid topology
a) Single Node Topology or Point to Point topology: The simplest topology is a permanent
link between two endpoints. Switched point-to-point topologies are the basic model of conventional
telephony.
Permanent (dedicated)
Point-to-point topology is a point-to-point communications channel that appears, to the user,
to be permanently associated with the two endpoints. Children's "tincan telephone" is one
Page 6
example.
Switched:
Using circuit-switchingor packet-switching technologies, a point-to-point circuit can be set
up dynamically, and dropped when no longer needed. This is the basic mode of conventional
telephony.
b) Bus topology: In local area networks where bus topology is used, each machine is connected
to a single cable. Each computer or server is connected to the single bus cable through some kind of
connector. A terminator is required at cach end of the bus cable to prevent the signal from bouncing
back and forth on the bus cable. A signal from the source travels in both directions to all machines
connected on the bus cable until it finds the MACaddress or IP address on the network that is the
intended recipient. If the machine address does not match the intended address for the data, the
machine ignores the data. Alternatively, if the data does match the machine address, the data is
accepted. Since the bus topology consists of only one wire, it is rather inexpensive to implement when
compared to other topologies. However, the low cost of implementing the technology is offset by the
high cost of managing the network. Additionally, since only one cable is utilized, it can be the single
point of failure. If the network cable breaks, the entire network will be down.
c) Star topology: In local area networks with a star topology, each network host is connected to
acentral hub. In contrast to the bus topology, the star topology connects each node to the hub with a
point-to-point connection. AIl traffic that traverses the network passes through the central hub. The
hub acts as a signal booster or repeater.
Page 7
Advantages of a Star Topology
Easy to installand wire.
Nodisruptions to the network when connecting or removing devices.
Easy to detect faults and to remove parts.
d)Tree or Expanded Star: A tree topology combines characteristics of linear bus and star
topologies. It consists of groupsof star-configured workstations connected toa linear bus
backbone cable. Tree topologies allow for the expansion of an existing network, and enable
schools to configure a network to meet their needs.
e) Ring topology: In local area networks where the ring topology is used, cach computer is
Page &
connected to the network in a closed loop or ring. Each machine or computer has a unique address
that is used for identification purposes. The signal passes through each machine or computer
connected to the ring in one direction. Ring topologies typically utilize a token passing scheme,
used to control access to the network. By utilizing this scheme, only one machine can transmit on
the network at a time. The machines or computers connected to the ring act as signal boosters or
repeaters which strengthen the signals that traverse the network. The primary disadvantage of ring
topology is the failure of one machine will cause the entire network to fail.
Ring
f) Mesh topology: The value of fully meshed networks is proportional to the exponent of the
number of subscribers, assuming that communicating groups of any two endpoints, up to and
including all the endpoints, is approximated by Reed's Law.
Fully connected mesh topology: The physical fully connected mesh topology is generally toocostly
and complex for practicalnetworks, although the topology is used when there are only asmall
number of nodes to be interconnected.
The number of connections in a full mesh = n(n - 1)/2
Partially connected mesh topology: The type of network topology in which some of the nodes of the
network are connected to more than one other node in the network with a point-to-point link this
makes it possible to take advantage of some of the redundancy that is provided by a physical fully
connected mesh topology without the expense and complexity required for a connection between
every node in the network.
g) Hybrids topology: Hybrid networks use a combination of any two or more topologies in such a
way that the resulting network does not exhibit one of the standard topologies (e.g., bus, star, ring,
etc.). For example, a tree network connected to a tree network is still a tree network, but two star
networks connected together exhibit a hybrid network topology. A hybrid topology is always
producedwhen two different basic network topologies are connected. Two comimon examples for
Hybrid network are: star ring network and star bus network
2) Signal topology
Page 9
The mapping of the actual connections between the nodes ofa network, as evidenced by the path that
the signals take when propagating between the nodes. The term 'signal topology' is often used
synonymously with the term 'logical topology. By definition, the term logical topology' refers to the
apparent path that the data takes between nodes in a network while the term 'signal topology'
generally refers to the actual path that the signals (e.g., optical, electrical, electromagnetic, etc.) take
when propagating between nodes.
3) Logicaltopology
The logical topology, in contrast to the "physical", is the way that the signals act on the network media, or the way
that the data passes through the network from one device to the next without regard to the physical interconnection
of the devices. A network's logical topology is not necessarily the same as its physical topology. For example,
twisted pair Ethernet is a logical bus topology in a physical star topology layout. While IBM's Token Ring is a
logical ring topology, it is physically set up in a star topology.
Page 10
EXPERIMENT No. -3
Experiment: STUDY OF SLIDING WINDOW PROTOCOL.
AIM: Students shallbe able to learn reliability and sequential delivery of data frames.
THEORY: The sliding window is a technique for sending multiple frames at a time. It controls the data packcts
between the two devices where reliable and gradual delivery of data frames is needed. It is also used in TCP
(Transmission Control Protocol).
Working Principle
In these protocols, the sender has a buffer called the sending window and the receiver has buffer called the
receiving window.
Types of Sliding WindowProtocol
Sliding window protocol has two types:
1, Go-Back-N ARQ
Sender Receiver
SRDforev
Repeat forever Page I|
Algorithrn for Sondor Time-out Algorthm for Receiver
gite
Event:
Sonder Receiver
Deliver Network
Network Get data
Data frame ACK frame data
The Sliding Window mainly provides the upper limnit on the number of frames that can be transmitted before the
requirement of an acknowledgment.
1 The frames get acknowledged by the receiver at any point even when the window is not completely
full on the receiver side.
2 Also, the Frames may be transmitted by the source side even when at the time the window is not
yet full on the sender side.
3 There is the specific size of the window, where the frames are numbered modulo- n, which simply
means frames are numbered from 0 to n-1. For e.g. if n= 10, the frames are numbered 0, 1,2,3,4,5,6, 7,8,9,
0, 1,2,3,4,5,6, 7, 8,9,0, 1, ...
4. Whenever the receiver sends an acknowledgment (ACK)it also includes the number of the next
frame that it expects to receive. For example, in the order to acknowledge the group of frames that ends in
frame 6,the receiver needs to send the ACK that contains the number 7. When the sender sees an ACK
with the number 7,then the sender comes to know that all the frames up to number 6 have been
successfully received.
Page 12
EXPERIMENT No,-4
Experiment:Configure Host IP, Subnet Mask and Default Gateway in a System in LAN (TCP/P
Configuration).
Aim:To Configure IP Address in asystem in LAN (TCP/TP Configuration) and Configure DNS to establish
interconnection between systems
Principle: Following is required to be study under this practical.
" Classification of IP address
"Super netting
Why we develop super netting and How to calculate supernet mask and how to identify
supernet address.
Procedure:
(a)Steps to configure IP address, Subnet mask and Default Gateway:
1.Click on the Start button and select Control Panel then Networ7 and Internet Connections.
2. Click Network and Internet Connections.
3. Right click on the Local Area Connection icon and select Properties.
4. Select Internet Protocol (TCP/IP).
5. Click on the Properties button.
6. Uncheck that Obtain an IP address automatically and Obtain DNS server address automatically and put
IP,Subnet mask & Default Gateways.
7. Click on the Advanced button and select the DNS tab in the Advanced TCP/LP Settings window.
8. Ensure that Register this connection's addresses in DNS is not selected.
9. Click OK, OK, then Close to close all boxes.
Result :
Configuration of IP Address in a system in LAN (TCP/IP Configuration) and Configuration to establishinterconnection
between systems have been done successfully, Screenshot of practical output should be attached
Page 13
EXPERIMENT No -5
Experiment: Study of IEEE802.3, 802.4 ,802.5.
AIM: Students shall be able to know the concept of IEEE standards 802 are used for controlling the Local Arca
Network and Metropolitan Arca Network.
THEORY:
1. IEEE 802.3:The IEEE 802.3 standard determines the CSMA/CD access control protocol. The best
known scheme for controlling a local area network on a bus structure is carrier sense multiple action with
collision detection(CSMA/CD).
2. IEEE802.4: IEEE 802.4 describes a token bus LAN standards.In token passing methods, stations
connected on a bus are arranged in a logical ring. In this method only the station having token(token
holder)is being permitted to transmit frames.
3. IEEE802.5:IEEE 802.5 describes the token ring standards. In a token ring a special bit pattern,
called the token, circulates around the ring whenever all stations are idle.The sequence of token is
determined by the physical locations of the stations on the ring.
Classic Ethernet is the original form of Ethernet that provides data rates between 3 to 10 Mbps. The varieties are
commonly referred as 10BASE-X. Here, 10 is the maximum throughput, i.e. 10 Mbps, BASE denoted use of
baseband transmission, and X is the type of medium used. Most varieties of classic Ethernet have become obsolete
in present communication scenario.
A switched Ethernet uses switches to connect to the stations in the LAN. It replaces the repeaters used in classic
Ethernet and allows full bandwidth utilization.
A Token Bus IEEE 802.4) is a popular standard for token passing LANs. In a token bus LAN, the plhysical media
is a bus or a tree, and a logical ring is created using coaxial cable. The
token is passed from one user to another in a sequence (clockwise or anticlockwise). Each station knows the address
of the station to its left" and "right" as per the sequence in the logical ring. A station can only transmit data when it
has the token.
TOKEN
Station 2
The above diagram shows alogical ring formed in a bus-based token-passing LAN. The logical ring is shown with
Page 14
the arrows,
t A token ring is an outdated form of network technology, and today Ethernet is the most prevalent type of wired
LANconnection. But that doesn't make the old technology any less interesting. Older methods, now confined tothe
realms of history, can also help us understand modern networks and why technology has developed as it has.
However, a tokcn ring is not really aring nctwork, also referred to as a ring topology, even if the name suggests this.
In fact, the only ring created is a logical onc, not a physical one.
Token Ring
Page 15
Experiment No.-6
Topology Diagram
192.168.1.0/24
2960-24TT
PC-PT 1841
N-Host
N-Switch
N-Branch
192168.1.10 Server-PT 192.168.4.0/24
Fww.public.com
192168.20/24
296024TT PC-P7
E-Spitch E-Host
PC-PT
296024TT
W-Svitch 192.168.4.10
W-Host
192.168.2.10
1841
E-Branch
1841 ASP Netiork
W-Branch
192.168.3.0/24
Server-PT
2960-24TT 1841 www.cisco.com
PC-PT
S-Switch S-Branch
S-Host
192.168.3.10 Server-PT
www.domain.com
Background / Preparation
In this activity, you willtest end-to-end connectivity using ping and traceroute. At the end of
this activty, you will be able to distinguish the difference between successful and
unsuccessful ping and traceroute attempts.
Note: Before beginning this activity, make sure that the network is converged. To
converge the network quickly, switch between Simulation mode and Realtime mode
until all the link lights turn green.
Step 1: Test connectivity using ping from a host computer and a router.
Click N-Host, click the Desktop tab, and then click Command Prompt. From the Command
Prompt window, ping the Cisco server at www.cisco.com.
Page l6
Packet Tracer PC Command
Line 1.0 PC>ping
www.cisco.com
From the output, you can see that N-Host was able to obtain an IP address for the Cisco server.
The IP address was obtained using (DNS). Also notice that the first ping failed. This failure is
most likely due to lack of ARP convergence between the source and destination. If you repeat
the ping, you will notice that all pings succeed.
From the Command Prompt window on N-Host, ping E-Host åt 192.168.4.10. The pings fail. If
you do not want to wait for all four unsuccessful ping attempts, press Ctrl+C to abort the
command, as shown below.
PC>ping 192.168.4.10
PC
Click the N-Branch router, and then click the CLItab. Press Enter to get the router prompt. From
Page 17
the router prompt, ping the Cisco server at www.cisco.com.
N-Branch>ping www.cisco.com
Translating "www.cisco.com"...domain server
(64.100.1.242) Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 64.100.1.185, timeout is 2 seconds:
.!!!
Success rate is 80 percent (4/5), round-trip min/avg/max =
210/211/213 ms N-Branch>
As you can see, the ping output on a router is different from a PChost. Notice that the N-Branch
router resolved the domain name to the same IP address that N-Host used to send its pings. Also
notice that the first ping fails, which is indicated by a period (), and that the next four pings
succeed, as shown with an exclamation point (!).
From the CLItab on N-Branch, ping E-Host at 192.168.4.10. Again, the pings fail. To not wait
for all the failures, press CtrHC.
N-Branch>ping 192.168.4.10
(0/4) N-Branch>
Step 2: Test connectivity using traceroute from a host computer and a router.
a Click N-Host, click the Desktop tab, and then click Command Prompt. From the
Command Prompt window, trace the route to the Cisco server at www.cisco.com.
PC>tracert www.cisco.com
Trace complete.
PC>
Page 18
The above output shows that youcan successfully trace a routeall the way to the Cisco server at
64.100.1.185. Each hop in the path is a router responding three times to trace messages from N
Host. The trace continues until the destination for the trace (64.100.1.185) responds three times.
From the Command Prompt window on N-Host, trace a route to E-Host at 192.168.4.10. The
trace fails, but notice that the tracert command traces up to 30 hops. If you do not want to wait
for all 30attempts to time out, press Ctrl+C.
PC>tracert 192.168.4.10
PC
The tracert command can be helpful in finding the potential source of a problem.
The last device to respond was 64.100.1.154, so you would start troubleshooting by
determining which device is configured with the IP address 64.100.1.154. The source
of the problem might not be that device, but the trace has given you a starting point,
whereas a ping simply tells you that the destination is either reachable or unreachable.
Click the N-Branch router, and then click the CLItab. Press Enter to get the router prompt. From
the router prompt, trace the route to the Cisc0 server at www.cisco.com.
N-Branch>traceroute www.cisco.com
Translating "www.cisco.com"...domain server
As you can see, traceroute output on a router is very similar to the output on a
PC host. The only difference is that on a PC host, the IP address is listed after
the three millisecond outputs.
From the CLItab on N-Branch, trace the route to E-Host at 192.168.4.10. The trace fails at the
same IP address as it failed when tracing from N-Host. Again, you can use Ctrl+C to abort the
command.
N-Branch>traceroute 192.168.4.10
Type escape sequence to
abort. Tracing the route to
192.168.4.10
N-Branch>
Page 20
Experiment No.-7
Topology Diagram
PC-PT
PC-PT KP Workstation
Customer
1841 2960-224N
2960-24TT 1841 ISP Switci
ISP Router
Lustomer Switch Custorner Router
Server-PT Server-PT
Local Server ISP Server
Background / Preparation
In this activity, you willconfigure these settings on the customer Cisco Catalyst 2960 switch:
Host name
Console password
Vty pasSword
Page 21
Switch>enable
Switch#configure
terminal
Switch(config)#hostname CustomerSwitch
b. From line configuration mode, set the password to cisco and require the
password to be entered at login.
CustomerSwitch(config
line)#password cisco
CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit
CustomerSwitch(config)#line vty 0 15
b. From line configuration mode, set the password to cisco and require the
password to be entered at login.
CustomerSwitch(config
line)#password cisco
CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit
CustomerSwitch(config)#interface vlan 1
Page 22
CustomerSwitch(config-i)#ip address 192.168.1.5 255.255.255.0
CustomerSwitch(config-if #noshutdown
CustomerSwitch(config-if)#exit
Reflection
What the significance of assigning the IP address to the VLANIinterface instead
of any of the Fast Ethernet interfaces?
b What command is necessary to enforce password authentication on the console and vty lines?
C. How many gigabit ports are available on the Cisco Catalyst 2960 switch that you used in the
activity?
Page 23
Experiment No.-8
Experiment: Performing an Initial Router Configuration
AIM
Topology Diagram
1841%| "PC-PT
PC-P 1841 ISP Router
Customer Zustomer Router ySP Workstation
2960-24TT 2960-22T
Customer Switch ISP Switch
Server-PT Server-PT
Customer Server ISP Server
Background/ Preparation
In this activity, you will use the Cisco IOS CLI to apply an initial configuration to a
router, including host name, passwords, a message-of-the-day (MOTD) banner, and
other basic settings.
Note: Some of the steps are not graded by Packet Tracer.
Page 24