0% found this document useful (0 votes)
52 views86 pages

CN LAB Manual Keval

The document outlines a lab manual for computer network experiments. It provides an introduction, objectives, rubrics for assessment, and descriptions of experiments across multiple modules related to networking concepts like cables, switches, routers and protocols. The experiments aim to help students understand fundamental networking components and their configuration as well as analyze network performance through simulations and packet analysis.

Uploaded by

pdacollege9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views86 pages

CN LAB Manual Keval

The document outlines a lab manual for computer network experiments. It provides an introduction, objectives, rubrics for assessment, and descriptions of experiments across multiple modules related to networking concepts like cables, switches, routers and protocols. The experiments aim to help students understand fundamental networking components and their configuration as well as analyze network performance through simulations and packet analysis.

Uploaded by

pdacollege9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 86

Computer Network Lab Manual

HyderabadKarnatakaEducationSociety’s

PoojyaDoddappaAppaEngineeringCollegeKalaburagi
(AnAutonomousInstitution)

Aiwan-E-ShahiArea,Kalaburagi,Karnataka585102

Department of Computer Science & Engineering

Computer Network Lab Manual

Prepared By

Dr. Soumya M Anakal


Smt Jayanti K

VISION OF THE DEPARTMENT


Computer Network Lab Manual

To become a premier department in computer education, research and to prepare highly


competent IT professionals to serve industry and society at local and global levels.

MISSION OF THE DEPARTMENT

 To impart high quality professional education to become a leader in Computer


Science and Engineering.
 To achieve excellence in research for contributing to the development of the society.
 To inculcate professional and ethical behaviour to serve the industry.

PROGRAM EDUCATIONAL OBJECTIVES (PEOS)

PEO1: To prepare graduates with core competencies in mathematical and


engineering fundamentals to solve and analyze Computer Science and
Engineering problems.

PEO2: To adapt to evolving technologies and tools for serving the society.

PEO3: To perform as team leader, effective communicator and socially responsible


computer professional in multidisciplinary fields following ethical values.
PEO4: To encourage students to pursue higher studies, engage in research and to
become entrepreneurs.

Rubrics for Assessment of Student’s Performance in Laboratory:


Evaluation Criteria for each Experiment:
Evaluation criteria for each lab Courses is as follows

Department of Computer Science & Engineering Page 2


Computer Network Lab Manual

Evaluation Weightage in Weightage in


Sl.No
Criteria percentage Marks

Conduct of
1 60% 30
Experiments
Open-ended
2 20% 10
Experiments
Internal
3 20% 10
Assessments

Conduct of Experimental work: Thirty marks is distributed among all the experiments
in the lab courses

Marking Criteria for conduct of experimental work

Marking Criteria for Conduct of experimental work


3 2 1

Student is able to Student can develop

develop a solution solution with Student can implement

to implement and moderate the solution without

understand understanding of the involvement

applications of the concept


concept

Marking Criteria for open ended experiment:

Marking Criteria for Open Ended Experiment

Department of Computer Science & Engineering Page 3


Computer Network Lab Manual

10-8 5-7 1-4

Student is able to Student is able to Student is able to


successfully find the design and develop identify, define and
solution and analyze the solution for understand the problem
efficiently. identified problem

Evaluation of Open End Experiment::The purpose Open Ended


Experiment is enabling the students to apply theoretical concepts to
develop real world applications.

Marking Criteria for internal Assessment test

Internal Assessments:Two Internal Assessments tests are conducted each carrying five
marks based on the lab experiments within the lab

Marking criterion for Internal Assessment Tests


5 4 3 2 1
Student is able to Student is able Student is Student is able to
successfully Student is able to to execute the able to write the program
execute and successfully execute programs write the
Interpret results and interpret results program
and and
develop execute
alternative partially
Solutions

Department of Computer Science & Engineering Page 4


Computer Network Lab Manual

Table of Contents

Department of Computer Science & Engineering Page 5


S.No Experiments
Computer Network Lab Manual
Module 1

a. Experimental Study of various network components and


1. devices(StudyCAT6UTPEIA/TIA568A/B straight and cross-over cable,
crimp and test and/verify its connectivity).
b. Install and configure wired and wireless NIC . Demonstrate file transfer in
wired and wireless LAN.
c. Install and configure network devices like hub, switch, and router

2 Use CISCO packet tracer to


a. Build a Local Area Network of 4 to 6 nodes using hub /repeater.
b. Build a peer to peer network
Module 2
1. Implement sliding window protocol
2. Implement go backN protocol
Module 3
1. Install & Configure network devices switch
Use CISCO packet tracer to
a. Build a local area network of 4 to 6 nodes using switch
2. b. Build a local area network of 4 to 6 nodes using hub & a switch & Study the
differences between repeater, hub & Switch
c. Identify Broadcast & Collision Domain
3. Use wireshark to examine Ethernet packets and ARP packets
4. To study Performance of CSMA/CD Prtocol
Module 4

1. Install & configure network devices routers

Use Cisco packet tracer to


a. Design and apply IP addressing scheme for a given topology
b. Connect two or three LAN’s via a router. Trace how routing happens via
Simulation, and study the working of router.
c. Design multiple subnets with suitable number of hosts
2.
d. Demonstrate static routing and dynamic routing for given topology
e. Configure DHCP server
Departmentf.ofCreate subnets
Computer , Configure
Science HostPage
& Engineering IP, Subnet
6 Mask and Default Gateway in a
LAN
g. Configure RIP/OSPF
Computer Network Lab Manual

Course Outcomes

After successful completions of the course the students will be able:

 Demonstrate the use of different network cabling components and devices


 Analysis performance of LAN and wireless LAN
 Illustrate basic networks utilities and demonstrate client server communication.
 Demonstrate working of routing algorithms.
 Perform packet capture analysis the packet contents.

SOFTWARES USED: CISCO packet tracer. Wireshark & C/Java

Module-1
1. Experimental Study of various network components and
devices(StudyCAT6UTPEIA/TIA568A/B straight and cross-over cable, crimp and test
and/verify its connectivity).
Aim: This experimental study investigates the performance and connectivity of different
network components and devices commonly used in Ethernet networks. Specifically, the
study focuses on CAT6 Unshielded Twisted Pair (UTP) cables configured according to
EIA/TIA568A/B standards, including straight and cross-over cables. The process of crimping

Department of Computer Science & Engineering Page 7


Computer Network Lab Manual

and testing these cables to verify connectivity is thoroughly examined. By conducting


experiments and analyses, this study aims to provide insights into the effectiveness and
reliability of network infrastructure components, contributing to the optimization of network
setups and troubleshooting procedures.

Description:
1. Selection of Components: High-quality CAT6 UTP cables, connectors, crimping tools, and
cable testers are selected for the experiments.
2. Cable Configuration: CAT6 UTP cables are configured according to EIA/TIA568A/B
standards to create straight and cross-over cables.
3. Crimping Process: The cables are crimped with connectors at both ends using standard
crimping techniques.
4. Testing Procedure: Cable testers are employed to verify the connectivity of the crimped
cables, ensuring proper signal transmission and absence of faults.
5. Data Collection: Connectivity test results, including cable length, signal strength, and error
rates, are recorded for analysis.
6. Analysis: The performance of straight and cross-over cables is compared, and the
effectiveness of the crimping process is evaluated based on test results.

Coaxialcable:
This cable contains aconductor,insulator, braiding, and sheath.The sheath covers the
braiding,braidingcoverstheinsulation,andtheinsulation coverstheconductor.

Department of Computer Science & Engineering Page 8


Computer Network Lab Manual

ComponentsofCoaxialcable:
Sheath
Thisistheouterlayerofthecoaxialcable.Itprotectsthecablefromphysicaldamage.

Braided-shield
Thisshieldprotectssignalsfromexternalinterferenceandnoise.Thisshieldisbuiltfromthesamemet
althatisusedtobuildthecore.

Insulation
Insulationprotectsthecore.Italsokeepsthecoreseparatefromthebraided-
shield.Sinceboththecoreandthebraided-
shieldusethesamemetal,withoutthislayer,theywilltoucheachotherandcreateashort-
circuitinthewire.
Conductor
Theconductorcarrieselectromagneticsignals.Basedonconductoracoaxialcablecanbecategoriz
edintotwotypes;single-corecoaxial cableandmulti-corecoaxialcable.
Asingle-corecoaxialcableusesasinglecentralmetal(usuallycopper)conductor,whileamulti-
corecoaxialcableusesmultiplethinstrandsofmetalwires.Thefollowingimageshowsbothtypeso
fcable.

Department of Computer Science & Engineering Page 9


Computer Network Lab Manual

Coaxialcablesincomputernetworks

Thecoaxialcableswerenotprimarilydevelopedforthecomputernetwork.Thesecablesweredev
elopedforgeneralpurposes.Theywereinuseevenbeforecomputernetworkscameintoexistence.
Theyarestillusedeventheirusein computernetworkshasbeencompletelydiscontinued.
Atthebeginningofcomputernetworking,whentherewerenodedicatedmediacablesavailablefor
computernetworks,networkadministratorsbeganusingcoaxialcablestobuildcomputernetwor
ks.Becauseoflow-
costandlongdurability,coaxialcableswereusedincomputernetworkingfornearlytwodecades(
80sand90s).
Coaxialcablesarenolongerusedtobuildanytypeofcomputernetwork.CoaxialcableusesRGrati
ngtomeasurethematerialsusedinshieldingandconductingcores.RGstandsfortheRadioGuide.
Coaxialcablemainlyusesradiofrequenciesintransmission.Impedanceistheresistancethatcontr
olsthesignals.It is expressedintheohms.
AWGstandsforAmericanWireGauge.Itisusedtomeasurethesizeofthecore.ThelargertheAW
Gsize,thesmallerthediameterofthecorewire.

Twisted-paircables:

Twisted pair cables consist offourpairs of


wires.Eachpairhasonesolidcolorandonestrippedcolorwire.Solidcolorsareblue,brown,greenand
orange.Instrippedcolor,thesolidcolorismixedwiththewhitecolor.
Basedonhowpairsarestrippedintheplasticsheath,therearetwotypesoftwisted-
paircable;UTPandSTP.IntheUTP(Unshieldedtwisted-
pair)cable,allpairsarewrappedinasingleplasticsheath.
IntheSTP(Shieldedtwisted-
pair)cable,eachpairiswrappedwithanadditionalmetalshield,thenallpairsarewrappedinasingleou
terplasticsheath.

SimilaritiesanddifferencesbetweenSTPandUTPcables

Department of Computer Science & Engineering Page 10


Computer Network Lab Manual

STP UTP
Cantransmitdataat10Mbps,100Mbps,1Gbps, Cantransmitdataat10Mbps,100Mbps,1Gb
and10Gbps. ps,and10Gbps.
TheSTPcablecontainsmorematerials, TheUTPcablecontainslessmaterials,

ItismoreexpensivethantheUTPcable itislessexpensivethantheSTPcable
BothcablesusethesameRJ- BothcablesusethesameRJ-
45(registeredjack)modularconnectors. 45(registeredjack)modularconnectors
TheSTPprovidesmorenoiseandEMIresistantt TheUTPprovideslessnoiseandEMIresista
hantheUTPcable. ntthantheSTPcable.
Themaximumsegmentlengthforbothcablesis Themaximumsegmentlengthforbothcable
100metersor328feet. sis100metersor328feet.
Bothcablescanaccommodatemaximumof102 Bothcablescanaccommodateamaximumof
4nodesineachsegment. 1024nodesineachsegment.

Fiber optic cable

Department of Computer Science & Engineering Page 11


Computer Network Lab Manual

Thiscableconsistsofcore,cladding,buffer,andjacket.Thecoreismadefromthethinstrandsofglass
orplasticthatcancarrydataoverthelongdistance.Thecoreiswrappedinthecladding;thecladdingis
wrappedinthebuffer,andthebuffer is
wrappedinthejacket.Corecarriesthedatasignalsintheformofthelight.Claddingreflectslightbackt
othecore.
Bufferprotectsthelightfromleaking.Thejacketprotectsthecablefromphysicaldamage.Fi
beropticcableiscompletelyimmunetoEMIandRFI.Thiscablecantransmitdataoveralongdistance
atthehighestspeed.Itcantransmitdataupto40kilometersatthespeedof100Gbps.
Fiberopticuseslighttosenddata.Itreflectslightfromoneendpointtoanother.Basedonhow
manybeamsoflightaretransmittedatagiventime,therearetwotypesoffiberopticalcable;SMFand
MMF.

SMF(Single-modefiber)opticalcable
Thiscablecarriesonlyasinglebeamoflight.Thisismorereliableandsupportsmuchhigherbandwi
dthandlongerdistancesthantheMMFcable.Thiscableusesalaserasthelightsourceandtransmits
1300or1550nano-meterwavelengthsoflight.
MMF(multi-modefiber)opticalcable
Thiscablecarriesmultiplebeamsoflight.Becauseofmultiplebeams,thiscablecarriesmuchmored
atathantheSMFcable.Thiscableisusedinshorterdistances.ThiscableusesanLEDasthelightsourc
eandtransmits850or1300nano-meterwavelengthsoflight.
That’sallforthistutorial.Inthenextpartofthisarticle,wewillunderstandthetypesofconnectorsth

Department of Computer Science & Engineering Page 12


Computer Network Lab Manual

atareusedtoconnectcableswithnetworkingdevices.Ifyoulikethistutorial,pleasedon’tforgettos
hareitwithfriendsthroughyourfavoritesocial channel.

Fiber OpticCablingSolutions
The largestsolutions of pre-terminatedfiber optics,including multimode andsingle-mode
patch
cords,MTP/MPOfibertrunksandharnesses,plug-n-playmodules/cassettesandfiberenclosures
.

DifferenceofStraightthroughandCrossoverCable
Ethernet cables canbe wired as straight through or crossover.The straightthroughis themost
common
typeandisusedtoconnectcomputerstohubsorswitches.Theyaremostlikelywhatyouwillfindwh
enyougotoyourlocalcomputerstoreandbuyapatchcable.CrossoverEthernetcableismorecom
monlyusedtoconnectacomputertoacomputerandmaybealittlehardertofindsincetheyaren’tuse
dnearlyasmuchasstraightthroughEthernetcable.Then,what’sthedifferencebetweenstraightth
roughvscrossovercable?Readthroughthisposttofindtheanswer.

T568AAndT568BWiringStandardBasis
ARJ45connectorisamodular8position,8pinconnectorusedforterminatingCAT5epatchcableo
rCAT6cable.Apinoutisaspecificarrangementofwiresthatdictatehowtheconnectoristerminate
d.TherearetwostandardsrecognizedbyANSI,TIAandEIAforwiringEthernetcables.Thefirstist
heT568AwiringstandardandthesecondisT568B.T568Bhassurpassed568Aandisseenasthedef
aultwiringschemefortwistedpairstructuredcabling.Ifyouareunsureofwhichtouse,choose568
B.

Department of Computer Science & Engineering Page 13


Computer Network Lab Manual

StraightThroughvsCrossoverCable

WhatIsStraightThroughCable?
Astraightthroughcableisatypeoftwistedpaircablethatisusedinlocalareanetworkstoconne
ctacomputertoanetworkhubsuchasarouter.Thistypeofcableisalsosometimescalledapatchcablean
disanalternativetowirelessconnectionswhereoneormorecomputersaccessarouterthroughwireles
ssignal.Onastraightthroughcable,thewiredpinsmatch.Straightthroughcableuseonewiringstandar
d:bothendsuseT568AwiringstandardorbothendsuseT568Bwiringstandard.Thefollowingfigures
howsastraightthroughcableofwhichbothendsarewiredastheT568Bstandard.

Department of Computer Science & Engineering Page 14


Computer Network Lab Manual

WhatIsCrossoverCable?
AcrossoverEthernetcableisatypeofEthernetcableusedtoconnectcomputingdevicestogether
directly.Unlikestraightthroughcable,theRJ45crossovercableusestwodifferentwiringstandar
ds:oneendusestheT568AwiringstandardandtheotherendusestheT568Bwiringstandard.Thei
nternalwiringofEthernetcrossovercablesreversesthetransmitandreceivesignals.Itismostofte
nusedtoconnecttwodevicesofthesametype:e.g.twocomputers(vianetworkinterfacecontrolle
r) ortwoswitchestoeachother.

Department of Computer Science & Engineering Page 15


Computer Network Lab Manual

StraightthroughvsCrossoverCable,How to select?
Straightthroughvscrossovercable,whichoneshouldIchoose?
Usually,straightthroughcablesareprimarilyusedforconnectingunlikedevices.Andcrossov
ercablesareusedforconnectingalikedevices.UsestraightthroughEthernet
cableforthefollowingcabling:
Switchtorouter
SwitchtoPCorserver
HubtoPCorserver
Usecrossovercablesforthefollowingcabling:
Switchto switch
Switchtohub
Hubtohub
Routertorouter
Ethernetportto PCNIC
PCtoPC

Department of Computer Science & Engineering Page 16


Computer Network Lab Manual

ConclusiononStraightThroughvsCrossoverCable
Straightthroughandcrossovercablesarewireddifferentlyfromeachother.Oneeasywayto
tellwhatyouhaveistolookattheorderofthecoloredwiresinsidetheRJ45connector.Iftheorderof
thewiresisthesameonbothends,thenyouhaveastraightthroughcable.Ifnot,thenit’smostlikely
acrossovercableorwaswiredwrong.Atpresent,thestraightthroughcableismuchmorepopulart
hancrossovercableandiswidelyusedbypeople.

NetworkcableCrimpingTools
Thispartofexperimentexplainsthemostcommontwisted-
pairnetworkcablecrimpingtoolsindetail.Learnthetoolsthatyoucanusetocrimpandtesttwisted-
pairnetworkcables.Cablesarethebackboneofawirednetwork.Thestability,reliability,andperfor
manceofawirednetworkdependoncables.Installingandmaintainingcablesinawirednetworkisa

Department of Computer Science & Engineering Page 17


Computer Network Lab Manual

difficulttask.Tomakethistaskeasier,avarietyofnetworkcablecrimpingandtestingtoolsareavaila
ble.Inthistutorial,wewillnotonlydiscusssomeofthemostcommonnetworkcablecrimpingandtes
tingtoolsbutalsounderstandtheirfeaturesandfunctions.

Twisted-pair(STPandUTP)networkcablecrimpingtools

Crimpingtoolsareusedforthefollowingpurposes.
1. Tocutthenetworkcableoftherequiredlengthfromthebundle.
2. Toremovetheouterandinnerjacketsofthenetworkcable.
3. Toattachtheconnectorsonbothendsofthecable.
Somecrimpingtoolsprovideallthefunctionalitywhileothersprovideoneortwofunctionalities.
Themostcommontwisted-pairnetworkcablecrimpingtoolsaredescribedbelow.
Wire Cutter: - To cut the network cable of the required length from the bundle, you can
use any standard wirecutter tool or can use a wire cutter tool that is specially designed for
the twisted-pair cable. A twisted-pair wirecutterusuallyincludes additionalblades
forstrippingthewire.
Wire Stripper: - This tool is used to remove the outer and inner jackets of the network
cable. Typically, you do notneedtopurchasethistoolseparatelyasallstandardtwisted-
pairwirecuttersareequippedwithwire-strippers.

Crimp tool: - This tool is used to attach the connectors to the cable. Typically, this tool
also includes a wire-cutterandwire-
stripper.Soifyoubuyacrimptool,youdon'thavetobuyawire-cutterandwire-striperseparately.

Department of Computer Science & Engineering Page 18


Computer Network Lab Manual

Department of Computer Science & Engineering Page 19


Computer Network Lab Manual

1. Installandconfigurenetworkdevices likehub, switch,androuterandcreatea


LANandperformconnectivitytest.

LAN Devices:

1. NIC (Network Interface Card): Also called Network Adapter. It connects a host to a
network medium. It provides the physical interface between computer and cabling. It
prepares data, sends data, and controls the flow of data. It can also receive and translate
data into bytes for the CPU to understand. Contain unique MAC Address to control data
communication.

2. Repeater: Functioning at Physical Layer. A repeater is an electronic device that


receives a signal and retransmits it at a higher level and/or higher power, or on to the
other side of an obstruction, so that the signal can cover longer distances. Repeater have
two ports, so cannot be use to connect for more than two devices.

3. Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator is a
device for connecting multiple twisted pair or fiber optic Ethernet devices together and
making them act as a single network segment. Hubs work at the physical layer (layer 1) of
the OSI model. The device is a form of multi port repeater. Repeater hubs also participate
in collision detection, forwarding a jam signal to all ports if it detects a collision.

4. Switch: A network switch or switching hub is a computer networking device that


connects network segments. The term commonly refers to a network bridge that
processes and routes data at the Data link layer (layer 2) of the OSI model. Switches that
additionally process data at the network layer (layer 3 and above) are often referred to as
Layer 3 switches or multilayer switches.

5. Bridge: A network bridge connects multiple network segments at the data link layer
(Layer 2) of the OSI model. In Ethernet networks, the term bridge formally means a device
that behaves according to the IEEE802.1 standard. A bridge and switch are very much
alike; a switch being a bridge with numerous ports. Bridges can analyze incoming data
packets to determine if the bridge is able to send the given packet to another segment of
the network.

6. Router: A router is an electronic device that interconnects two or more computer

Department of Computer Science & Engineering


Page
20
Computer Network Lab Manual

networks, and selectively interchanges packets of data between them. Each data packet
contains address information that a router can use to determine if the source and
destination are on the same network, or if the data packet must be transferred from one
network to another. Where multiple routers are used in a large collection of interconnected
networks, the routers exchange information about target system addresses, so that each
router can build up a table showing the preferred paths between any two systems on the
interconnected networks.

7. Gate Way: A gateway is a hardware device that acts as a "gate" between two
networks. A gate way may contain devices such as protocol translators, impedance
matching devices, rate converters, fault isolators, or signal translators as necessary to
provide system interoperability

Department of Computer Science & Engineering


Page
21
Computer Network Lab Manual

Speaking of local area networks, or LANs, they are smaller networks, usually within an
office base. LAN is used to connect computing resources, typically inside one building. The
computing resources can be computers, printers, servers, IP phones, or routers. Connections
between the workstations are physical, with cables, and all the office resources are shared and
distributed between the network workstations. The most common type of LAN is that of Ethernet.
This is a family of frame-based computer networking technologies for LANs. You must first identify
which services you need to provide locally on the LAN. Computers are connected to a switch with
Ethernet cables. Each device has a unique IP address.

What You Need While Setting up LAN Network: Cable router, Crossover Ethernet
cables, Ethernet cables, Ethernet switch, Network interfaces

Department of Computer Science & Engineering


Page
22
Computer Network Lab Manual

Create Network

1. Identify the local services that you want available on the network. Identify network-attached printers,
network disk drives, any server that will share printers or disks.

2. Identify how many devices will have to connect to the network. Each device, server or workstation will
require a unique address.

3. Run cables to workstations where possible. A wired LAN will always get better performance and be more
secure than a wireless LAN. Wherever possible, run a cable to servers, printers, IP phones or work
locations. Run a cable to any area where you are likely to work. Use standard Ethernet cables or building
wiring as installed according to the TIA-568 standard.

4. Select and purchase a switch or cable router. The simple secure way to connect to the Internet is to use a
cable router. Many makes and models are available. If the model you choose does not have enough ports to
connect all of your computers, then you will need to purchase a switch as well.

5. Configure the WAN port of the cable router. Configuration details will vary from vendor to vendor. Key
information you will need to configure the WAN port will be supplied by your internet service provider.

6. Configure the LAN ports of your cable router. Most cable routers will act as a Dynamic Host Configuration
Server, or DHCP server. This means that the router will give addresses to workstations automatically. Be
certain that the address pool has enough addresses for all of the workstations. Make certain that there are
enough addresses outside of the range for any hosts that need static addresses. For example, a network
address with a mask of 255.255.255.0 has a total of 254 hosts. If the dynamic pool has 200 addresses
available, that means the remaining 54 addresses are available to give printers or servers static addresses.

7. Connect the wires for the network. Workstations and servers can be connected with standard Ethernet
cables. Connect the switch to the cable router LAN ports by using the up-link or straight port on the switch. If
the switch does not have an up-link port, connect any standard port of the switch to a LAN port on the cable
router with an Ethernet crossover cable. Ethernet rossover cables can be purchased at any electronics
store.
Department of Computer Science & Engineering
Page
23
Computer Network Lab Manual

8. Test the services and Internet connectivity. Test each of the workstations to ensure they can connect to
the Internet and test any local servers and printers. Print test pages on the shared printers. Tests read and
write permissions on shared file servers by copying files to the servers and copying files from the server to a
workstation.

2. ConfigurehostIP, subnetmaskandgatewayinLAN.

Objectives:
1. Study of Class full IP Addressing
2. To learn Classes, Blocks and Masking

Description
IP Addressing v4: The identifier used in network layer to identify each device connected to the
Internet is called the Internet address or IP address.

Rules for Class full addressing:

1. Format of IP address IPv4 is made up of four parts, in the pattern as w.x.y.z. Each
part has 8 binary bits and the values in decimal can range from 0 to 255.
2. IP addresses are divided into different classes. These classes determine the maximum
number of hosts per network ID. Only three classes are actually used for network
connectivity. The following table lists all of the address class.

Class Address Range Supports


Class A 1.0.0.1 to 126.255.255.254 Supports 16 million hosts on each of 127 networks.
Class B 128.1.0.1 to Supports 65,000 hosts on each of 16,000 networks.
191.255.255.254
Class C 192.0.1.1 to Supports 254 hosts on each of 2 million networks.
223.255.254.254
Class D 224.0.0.0 to Reserved for multicast groups.
239.255.255.255
Class E 240.0.0.0 to Reserved.
254.255.255.254

3. Grouping of IP addresses into different classes.


Department of Computer Science & Engineering
Page
24
Computer Network Lab Manual

a) Class A, B, C, D, E
b) Class A: first bit in w is 0 and others can be anything
i. 0.0.0.0 to 127.255.255.255
ii. First bits are used for network part and the remaining for host part.
c) Class B: First bit in w is 1 and second bit is 0.
i. 128.0.0.0 to 191.255.255.255
ii. First 16 bits for network part and remaining host part
d) Class C: first bit in w is 1, second bit in w is 1 and third bit is 0
i. 192.0.0.0 to 223.255.255.255
ii. First 24 bits for network part and last 8 bits for host part.
e) Class D: first, second, third bits in w are 1 and fourth bit is 0; used for
multicast. i. 224.0.0.0 to 247.255.255.255
f) Class E: future use or experimental purposes.

4. Default Subnet mask it is used to identify the network part from the host part. Put binary
one for the parts that represent network part and zero for the part that represent host part.
a) Class A: 255.0.0.0
b) Class B: 255.255.0.0
c) Class C: 255.255.255.0
d) We can’t have mix of 1s and 0s in subnet mask. Only consecutive 1s is followed by
consecutive 0s.
\
Session 3: Concept of Network IP Address (Part-2)

Department of Computer Science & Engineering


Page
25
1. Study of Classless IP Addressing
2. To learn the concept of Sub netting and Super netting

Description
Why Class less Addressing?

To overcome address depletion and give more organizations access to the Internet, classless
addressing was designed and implemented. In this scheme, there are no classes, but the
addresses are still granted in blocks.

Rules for Class less addressing


1. Format of Class less is made up of variable-length block with the slash notation
A.B.C.D/n. Slash notation n is also called CIDR (Class less Interdomain Routing)
notation/prefix length represented using ‘1’, as masking.
2. The addresses in a block must be contiguous, one after another.
3. The number of addresses in a block must be a power of 2 (1, 2, 4, 8, ... ).
4. The first address must be evenly divisible by the number of addresses.
Subnetting
A network is divided into several smaller networks. Each smaller network is called a
Subnetwork or a Subnet.

3. StudyofbasicNetworkconfigurationcommands.
4. StudyofbasicNetworkconfigurationcommandsandutilitiestodebugthenetworkissues.

5. Case StudyofCampus NetworkOperationCenter.


6. Packet capture and header analysis by wire-shark (TCP,UDP,IP)USING
WIRESHARKoranyothertool.
7. Implement clientservercommunicationusingsockets
Computer Network Lab Manual

PART-B

EXPERIMENT NO 1.

Simulate a three point-to-point network with duplex links between them. Set
the queue size and vary the bandwidth and find the number of packets
dropped.

Step 1:Select Default icon from Standard Toolset window and Place
thethree nodes on the canvas.

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 2:Connect point-to-point link between three nodes using link from
Standard Toolset window

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 3:Double click on link to set duplex link and bandwidth between
thenodes by configure 802.3 as MAC Protocol.

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 4:To set queue size of each node in the scenario double click on
thenodes, go to Node Configuration tab->Network Layer-> Schedulers
and Queues.

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 5:Select the Applications tab of Standard Toolset window

Select CBR and draw the application between Node 1 and Node 2.
Similarly Node 2 to Node 3 and Node 3 Node 1

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 6:To set CBR Application parameters, go to Table View (bottom


panelof GUI) ->Application Tab-> double click on CBR Application

Set the Number. of CBR packets(Items to send) as per the user requirement

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 7:Save the changes by clicking on the Save button. Click on the Run
button. Click on the Play button to execute the scenario.

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 8:On completion of the Scenario execution, check the


correspondingStatistics for the desired results click on Analyze statistic.

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 9:To check the no. of packets at sender, go to Application tab-


>CBRClient->Total Unicast Messages Sent

To check the no. of packets at receiver, go to Application tab->CBR


Server->Total Unicast Messages Received

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Note:The packet drop is calculated as follows:

Packet drop =Total no. of packets sent – Total no. of packets received

[Type text] [Type text] [Type text]


Computer Network Lab Manual

EXPERIMENT NO 2

Simulate a four node point-to-point network with the links connected as


follows:

n1-n3, n2-n3 and n3-n4, Apply TCP agent between n1-n4 and UDP between
n2-n4. Apply relevant application over TCP and UDP agents changing the
parameters and determine the number of packets sent by TCP/UDP.

Step1:Select Default icon from Standard Toolset window and Place


thefour nodes on the canvas.

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 2:Connect point-to-point link between four nodes using link from
Standard Toolset window

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 3:Select the Applications tab of Standard Toolset window


Select CBR and set the application between Node 2 and Node 4.

Similarly Select FTP Generic and set the application between Node 1
and Node 4

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 4:To set CBR Application parameters, go to Table View (bottom


panelof GUI) ->Application Tab-> double click on CBR Application

Set the Number Of CBR packets (Items to send) as per the user requirement

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 5:To set FTP Generic Application parameters, go to Table


View(bottom panel of GUI) ->Application Tab-> double click on FTP
Generic Application

Set the no. of FTP Genericpackets(Items to Send) as per the user


requirement

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 6:Save the changes by clicking on the Save button. Click on the Run
button. Click on the Play button to execute the scenario.

Step 7:On completion of the Scenario execution, check the


correspondingStatistics for the desired results click on Analyze statistic.

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 8:To check the no. of packets at UDP, go to Transport tab-


>UDPTo check the no. of packets at TCP, go to Transport tab->TCP

[Type text] [Type text] [Type text]


Computer Network Lab Manual

EXPERIMENT NO 3

Simulate the transmission of ping message over a network topology


consisting of 6 nodes and find the number of packets dropped due
to congestion.

Step 1:Select Default icon from Standard Toolset window and Place
theSix nodes on the canvas.

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 2:Connect point-to-point link between three nodes using link from
Standard Toolset window

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 3:To set ICMP of each node in the scenario double click on the
nodes,go to Node Configuration tab->Network Layer-> Enable ICMP.

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 4:Select the Applications tab of Standard Toolset window

Select CBR and draw the application between Node 3 and Node 4.

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 6:To set CBR Application parameters, go to Table View (bottom


panelof GUI) ->Application Tab-> double click on CBR Application

Set the Number. of CBR packets(Items to send) as per the user requirement

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 7:Save the changes by clicking on the Save button. Click on the Run
button. Click on the Play button to execute the scenario.

Step 8:On completion of the Scenario execution, check the


correspondingStatistics for the desired results click on Analyze statistic.

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 9:To check the no. of packets at sender, go to Application tab-


>CBRClient->Total Unicast Messages Sent

To check the no. of packets at receiver, go to Application tab->CBR


Server->Total Unicast Messages Received

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Note:The packet drop is calculated as follows

Packet drop =Total no. of packets sent – Total no. of packets received

[Type text] [Type text] [Type text]


Computer Network Lab Manual

EXPERIMENT NO 4

Simulate an Ethernet LAN using n nodes (6-10), change error rate and
data rate and compare throughput.

Step 1:Select Default icon from Standard Toolset window and Place
thenine nodes on the canvas.

Select hubs from Standard Toolset window and Place the two hubs on the
canvas.

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 2:To configure node as router double click on the node 1, go to


NodeConfiguration tab->Router Properties->Change Type of Router as
predefined.

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 3:Connect point-to-point link between three nodes using link from
Standard Toolset window

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 4:To set error rate of the nodes double click on the nodes, go to
NodeConfiguration tab->Faults->configure start time and end time.

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 5:Select the Applications tab of Standard Toolset window

Select CBR and draw the application between Node 2 and Node 9.Similarly
node 5 to node 6 and node 3 to node 8.

To set date rate of the nodes, change item to send packets and time intervals.

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 6:To set CBR Application parameters, go to Table View (bottom


panelof GUI) ->Application Tab-> double click on CBR Application

Set the no. of CBR packet as per the user requirement

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 7:Save the changes by clicking on the Save button. Click on the Run
button. Click on the Play button to execute the scenario.

Step 8:On completion of the Scenario execution, check the


correspondingStatistics for the desired results click on Analyze statistic.

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 9:To check the throughput, go to Application tab-


>CBR Server->Unicast Received Throughput

[Type text] [Type text] [Type text]


Computer Network Lab Manual

EXPERIMENT NO 5

Simulate an Ethernet LAN using n nodes and set multiple traffic nodes and
plot congestion window for different source/destination.

Step 1:Select Default icon from Standard Toolset window and Place
theseven nodes on the canvas.

Select hubs from Standard Toolset window and Place the two hubs on the
canvas.

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 2:To configure node as router double click on the node 1, go to


NodeConfiguration tab->Router Properties->Change Type of Router as
predefined.

[Type text] [Type text] [Type text]


Computer Network Lab Manual

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 3:Connect point-to-point link between three nodes using link from
Standard Toolset window

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 4:To set TCP protocol double click on the nodes, go to


NodeConfiguration tab->Transport Layer->configure TCP as
YES.

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 5:Select the FTP Generic tab of Standard Toolset window

Select FTP Generic and set the application between Node 2 to Node 4,
Node 3 to Node 7 and Node 5 to Node 6.

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 6:To set FTP Generic Application parameters, go to Table


View(bottom panel of GUI) ->Application Tab-> double click on FTP
Generic Application

Set the no. of FTP Generic packets as per the user requirement

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 7:Save the changes by clicking on the Save button. Click on the Run
button. Click on the Play button to execute the scenario.

Step 8:On completion of the Scenario execution, check the


correspondingStatistics for the desired results click on Analyze statistic.

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 9:To check the Congestion Window at TCP, go to Transport tab->TCP

[Type text] [Type text] [Type text]


Computer Network Lab Manual

EXPERIMENT NO 6

Simulate simple ESS and with transmitting nodes in wireless LAN by


simulation and determine the performance with respect to transmission
of packets.

Step 1:Select “Network Components” tab of Standard Toolset


windowSelect “Wireless Network” icon and place 2 subnets for the desired
coverage areas

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 2:Select “Devices” tab of Scenario Designer window

Select “Default” icon and place 3 nodes for each of the Wireless Subnets

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 3:Select “Links”tab from standard Toolset.

Select “Link” icon and connect all nodes to their appropriate


“Wireless Subnet” cloud.

And also using link icon connect point-to-point link between node 2 and
node 5(access points)

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 4:To configure channel frequency of each network go


toScenario Properties->Channel Properties -> Number of Channels ->
2. Set channel frequencies 1 Channels for each network

Select “Channel Frequency” and type in desired frequencies for


each channel

 Channel0- Frequency = 2.4 GHz

 Channel1- Frequency = 2.401 GHz

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 5:To configure wireless physical layer and Mac Layer double
clickon first wireless subnet1 and go to Wireless Subnet Properties-
>Physical Layer

Set “Listenable Channel Mask” as channel0, channnel1


Set “Listening Channel Mask” as channnel0

Set “Radio Type” as 802.11b Radio under Physical Layer


Set “Mac Protocol” as 802.11 Radio under Mac Layer

[Type text] [Type text] [Type text]


Computer Network Lab Manual

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 6:To configure wireless physical layer and Mac Layer double
clickon first wireless subnet2 and go to Wireless Subnet Properties-
>Physical Layer

Set “Listenable Channel Mask” as channel0, channnel1


Set “Listening Channel Mask” as channnel1

Set “Radio Type” as 802.11b Radio under Physical Layer


Set “Mac Protocol” as 802.11 Radio under Mac Layer

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 7:To set node 2 as Access Point, double click on node 2 go


tointerfaces tab-> Interface 0-> Mac Layer

Select “Station Association Type” as


Dynamic Select “Set as Access Point” as Yes

Similarly configure node 5 as Access Point

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 8:Select the Applications tab of Standard Toolset window

Select CBR and draw the application between Node 1 and Node 6.

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 9:To set CBR Application parameters, go to Table View


(bottompanel of GUI) ->Application Tab-> double click on CBR
Application

Set the no. of CBR Application packets (Items to send)as per the user
requirement

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 10:To set Simulation Time of the scenario, go


toScenario Properties->General->Simulation Time

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 11:Save the changes by clicking on the Save button. Click on the Run
button. Click on the Play button to execute the scenario.

Step 12:On completion of the Scenario execution, check the


correspondingStatistics for the desired results click on Analyze statistic.

[Type text] [Type text] [Type text]


Computer Network Lab Manual

Step 13:To check the no. of packets at sender, go to Application tab-


>CBRClient->Total Unicast Messages Sent

To check the no. of packets at receiver, go to Application tab->CBR


Server->Total Unicast Messages Received

[Type text] [Type text] [Type text]


Computer Network Lab Manual

PROGRAM OUTCOMES

[Type text] [Type text] [Type text]


Computer Network Lab Manual

01.Engineering knowledge: Apply the knowledge of mathematics, science, engineering


fundamentals, and an engineering specialization to the solution of complex engineering
problems.
02.Problem analysis: Identify, formulate, review research literature, and analyse
complex engineering problems reaching substantiated conclusions using first principles of
mathematics, natural sciences, and engineering sciences.
03. Design/development of solutions: Design solutions for complex engineering problems and
design system components or processes that meet the specified needs with
appropriate consideration for the public health and safety, and the cultural, societal, and
environmental considerations.
04.Conduct investigations of complex problems: Use research-based knowledge and research
methods including design of experiments, analysis and interpretation of data, and synthesis of the
information to provide valid conclusions.
05.Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern
engineering and IT tools including prediction and modelling to complex engineering activities
with an understanding of the limitations.
06.The engineer and society: Apply reasoning informed by the contextual knowledge to
assess societal, health, safety, legal and cultural issues and the consequent responsibilities
relevant to the professional engineering practice.
07.Environment and sustainability: Understand the impact of the professional engineering
solutions in societal and environmental contexts, and demonstrate the knowledge of,
and need for sustainable development.
08.Ethics: Apply ethical principles and commit to professional ethics and responsibilities and
norms of the engineering practice.
09.Individual and team work: Function effectively as an individual, and as a member or leader
in diverse teams, and in multidisciplinary settings.
10.Communication: Communicate effectively on complex engineering activities with the
engineering community and with society at large, such as, being able to comprehend and write
effective reports and design documentation, make effective presentations, and give and receive
clear instructions.

[Type text] [Type text] [Type text]


Computer Network Lab Manual

11.Project management and finance: Demonstrate knowledge and understanding of the


engineering and management principles and apply these to one‘s own work, as a member and
leader in a team, to manage projects and in multidisciplinary environments.
12.Life-long learning: Recognize the need for, and have the preparation and ability to
engage in independent and life-long learning in the broadest context of technological change.

PROGRAM SPECIFIC OUTCOMES (PSOs)

PSO1: Acquire competency in hardware and software working principles to analyze and
solve computing problems.

PSO2: Design quality software to develop scientific and business applications following
Software Engineering practices.

PSO3: Apply cutting edge technologies using modern tools to find novel solutions
ethically to existing problems.

[Type text] [Type text] [Type text]


Computer Network Lab Manual

VISION OF THE INSTITUTION

 To be an institute of excellence in technical education and research to serve the needs of


the industry and society at local and global levels.

MISSION OF THE INSTITUTION

 To provide a high quality educational experience for students with values and ethics
that enables them to become leaders in their chosen professions.

[Type text] [Type text] [Type text]


Computer Network Lab Manual

 To explore, create and develop innovations in engineering and science through research
and development activities.

 To provide beneficial service to the national and multinational industries and


communities through educational, technical, and professional activities

[Type text] [Type text] [Type text]

You might also like