CN LAB Manual Keval
CN LAB Manual Keval
HyderabadKarnatakaEducationSociety’s
PoojyaDoddappaAppaEngineeringCollegeKalaburagi
(AnAutonomousInstitution)
Aiwan-E-ShahiArea,Kalaburagi,Karnataka585102
Prepared By
PEO2: To adapt to evolving technologies and tools for serving the society.
Conduct of
1 60% 30
Experiments
Open-ended
2 20% 10
Experiments
Internal
3 20% 10
Assessments
Conduct of Experimental work: Thirty marks is distributed among all the experiments
in the lab courses
Internal Assessments:Two Internal Assessments tests are conducted each carrying five
marks based on the lab experiments within the lab
Table of Contents
Course Outcomes
Module-1
1. Experimental Study of various network components and
devices(StudyCAT6UTPEIA/TIA568A/B straight and cross-over cable, crimp and test
and/verify its connectivity).
Aim: This experimental study investigates the performance and connectivity of different
network components and devices commonly used in Ethernet networks. Specifically, the
study focuses on CAT6 Unshielded Twisted Pair (UTP) cables configured according to
EIA/TIA568A/B standards, including straight and cross-over cables. The process of crimping
Description:
1. Selection of Components: High-quality CAT6 UTP cables, connectors, crimping tools, and
cable testers are selected for the experiments.
2. Cable Configuration: CAT6 UTP cables are configured according to EIA/TIA568A/B
standards to create straight and cross-over cables.
3. Crimping Process: The cables are crimped with connectors at both ends using standard
crimping techniques.
4. Testing Procedure: Cable testers are employed to verify the connectivity of the crimped
cables, ensuring proper signal transmission and absence of faults.
5. Data Collection: Connectivity test results, including cable length, signal strength, and error
rates, are recorded for analysis.
6. Analysis: The performance of straight and cross-over cables is compared, and the
effectiveness of the crimping process is evaluated based on test results.
Coaxialcable:
This cable contains aconductor,insulator, braiding, and sheath.The sheath covers the
braiding,braidingcoverstheinsulation,andtheinsulation coverstheconductor.
ComponentsofCoaxialcable:
Sheath
Thisistheouterlayerofthecoaxialcable.Itprotectsthecablefromphysicaldamage.
Braided-shield
Thisshieldprotectssignalsfromexternalinterferenceandnoise.Thisshieldisbuiltfromthesamemet
althatisusedtobuildthecore.
Insulation
Insulationprotectsthecore.Italsokeepsthecoreseparatefromthebraided-
shield.Sinceboththecoreandthebraided-
shieldusethesamemetal,withoutthislayer,theywilltoucheachotherandcreateashort-
circuitinthewire.
Conductor
Theconductorcarrieselectromagneticsignals.Basedonconductoracoaxialcablecanbecategoriz
edintotwotypes;single-corecoaxial cableandmulti-corecoaxialcable.
Asingle-corecoaxialcableusesasinglecentralmetal(usuallycopper)conductor,whileamulti-
corecoaxialcableusesmultiplethinstrandsofmetalwires.Thefollowingimageshowsbothtypeso
fcable.
Coaxialcablesincomputernetworks
Thecoaxialcableswerenotprimarilydevelopedforthecomputernetwork.Thesecablesweredev
elopedforgeneralpurposes.Theywereinuseevenbeforecomputernetworkscameintoexistence.
Theyarestillusedeventheirusein computernetworkshasbeencompletelydiscontinued.
Atthebeginningofcomputernetworking,whentherewerenodedicatedmediacablesavailablefor
computernetworks,networkadministratorsbeganusingcoaxialcablestobuildcomputernetwor
ks.Becauseoflow-
costandlongdurability,coaxialcableswereusedincomputernetworkingfornearlytwodecades(
80sand90s).
Coaxialcablesarenolongerusedtobuildanytypeofcomputernetwork.CoaxialcableusesRGrati
ngtomeasurethematerialsusedinshieldingandconductingcores.RGstandsfortheRadioGuide.
Coaxialcablemainlyusesradiofrequenciesintransmission.Impedanceistheresistancethatcontr
olsthesignals.It is expressedintheohms.
AWGstandsforAmericanWireGauge.Itisusedtomeasurethesizeofthecore.ThelargertheAW
Gsize,thesmallerthediameterofthecorewire.
Twisted-paircables:
SimilaritiesanddifferencesbetweenSTPandUTPcables
STP UTP
Cantransmitdataat10Mbps,100Mbps,1Gbps, Cantransmitdataat10Mbps,100Mbps,1Gb
and10Gbps. ps,and10Gbps.
TheSTPcablecontainsmorematerials, TheUTPcablecontainslessmaterials,
ItismoreexpensivethantheUTPcable itislessexpensivethantheSTPcable
BothcablesusethesameRJ- BothcablesusethesameRJ-
45(registeredjack)modularconnectors. 45(registeredjack)modularconnectors
TheSTPprovidesmorenoiseandEMIresistantt TheUTPprovideslessnoiseandEMIresista
hantheUTPcable. ntthantheSTPcable.
Themaximumsegmentlengthforbothcablesis Themaximumsegmentlengthforbothcable
100metersor328feet. sis100metersor328feet.
Bothcablescanaccommodatemaximumof102 Bothcablescanaccommodateamaximumof
4nodesineachsegment. 1024nodesineachsegment.
Thiscableconsistsofcore,cladding,buffer,andjacket.Thecoreismadefromthethinstrandsofglass
orplasticthatcancarrydataoverthelongdistance.Thecoreiswrappedinthecladding;thecladdingis
wrappedinthebuffer,andthebuffer is
wrappedinthejacket.Corecarriesthedatasignalsintheformofthelight.Claddingreflectslightbackt
othecore.
Bufferprotectsthelightfromleaking.Thejacketprotectsthecablefromphysicaldamage.Fi
beropticcableiscompletelyimmunetoEMIandRFI.Thiscablecantransmitdataoveralongdistance
atthehighestspeed.Itcantransmitdataupto40kilometersatthespeedof100Gbps.
Fiberopticuseslighttosenddata.Itreflectslightfromoneendpointtoanother.Basedonhow
manybeamsoflightaretransmittedatagiventime,therearetwotypesoffiberopticalcable;SMFand
MMF.
SMF(Single-modefiber)opticalcable
Thiscablecarriesonlyasinglebeamoflight.Thisismorereliableandsupportsmuchhigherbandwi
dthandlongerdistancesthantheMMFcable.Thiscableusesalaserasthelightsourceandtransmits
1300or1550nano-meterwavelengthsoflight.
MMF(multi-modefiber)opticalcable
Thiscablecarriesmultiplebeamsoflight.Becauseofmultiplebeams,thiscablecarriesmuchmored
atathantheSMFcable.Thiscableisusedinshorterdistances.ThiscableusesanLEDasthelightsourc
eandtransmits850or1300nano-meterwavelengthsoflight.
That’sallforthistutorial.Inthenextpartofthisarticle,wewillunderstandthetypesofconnectorsth
atareusedtoconnectcableswithnetworkingdevices.Ifyoulikethistutorial,pleasedon’tforgettos
hareitwithfriendsthroughyourfavoritesocial channel.
Fiber OpticCablingSolutions
The largestsolutions of pre-terminatedfiber optics,including multimode andsingle-mode
patch
cords,MTP/MPOfibertrunksandharnesses,plug-n-playmodules/cassettesandfiberenclosures
.
DifferenceofStraightthroughandCrossoverCable
Ethernet cables canbe wired as straight through or crossover.The straightthroughis themost
common
typeandisusedtoconnectcomputerstohubsorswitches.Theyaremostlikelywhatyouwillfindwh
enyougotoyourlocalcomputerstoreandbuyapatchcable.CrossoverEthernetcableismorecom
monlyusedtoconnectacomputertoacomputerandmaybealittlehardertofindsincetheyaren’tuse
dnearlyasmuchasstraightthroughEthernetcable.Then,what’sthedifferencebetweenstraightth
roughvscrossovercable?Readthroughthisposttofindtheanswer.
T568AAndT568BWiringStandardBasis
ARJ45connectorisamodular8position,8pinconnectorusedforterminatingCAT5epatchcableo
rCAT6cable.Apinoutisaspecificarrangementofwiresthatdictatehowtheconnectoristerminate
d.TherearetwostandardsrecognizedbyANSI,TIAandEIAforwiringEthernetcables.Thefirstist
heT568AwiringstandardandthesecondisT568B.T568Bhassurpassed568Aandisseenasthedef
aultwiringschemefortwistedpairstructuredcabling.Ifyouareunsureofwhichtouse,choose568
B.
StraightThroughvsCrossoverCable
WhatIsStraightThroughCable?
Astraightthroughcableisatypeoftwistedpaircablethatisusedinlocalareanetworkstoconne
ctacomputertoanetworkhubsuchasarouter.Thistypeofcableisalsosometimescalledapatchcablean
disanalternativetowirelessconnectionswhereoneormorecomputersaccessarouterthroughwireles
ssignal.Onastraightthroughcable,thewiredpinsmatch.Straightthroughcableuseonewiringstandar
d:bothendsuseT568AwiringstandardorbothendsuseT568Bwiringstandard.Thefollowingfigures
howsastraightthroughcableofwhichbothendsarewiredastheT568Bstandard.
WhatIsCrossoverCable?
AcrossoverEthernetcableisatypeofEthernetcableusedtoconnectcomputingdevicestogether
directly.Unlikestraightthroughcable,theRJ45crossovercableusestwodifferentwiringstandar
ds:oneendusestheT568AwiringstandardandtheotherendusestheT568Bwiringstandard.Thei
nternalwiringofEthernetcrossovercablesreversesthetransmitandreceivesignals.Itismostofte
nusedtoconnecttwodevicesofthesametype:e.g.twocomputers(vianetworkinterfacecontrolle
r) ortwoswitchestoeachother.
StraightthroughvsCrossoverCable,How to select?
Straightthroughvscrossovercable,whichoneshouldIchoose?
Usually,straightthroughcablesareprimarilyusedforconnectingunlikedevices.Andcrossov
ercablesareusedforconnectingalikedevices.UsestraightthroughEthernet
cableforthefollowingcabling:
Switchtorouter
SwitchtoPCorserver
HubtoPCorserver
Usecrossovercablesforthefollowingcabling:
Switchto switch
Switchtohub
Hubtohub
Routertorouter
Ethernetportto PCNIC
PCtoPC
ConclusiononStraightThroughvsCrossoverCable
Straightthroughandcrossovercablesarewireddifferentlyfromeachother.Oneeasywayto
tellwhatyouhaveistolookattheorderofthecoloredwiresinsidetheRJ45connector.Iftheorderof
thewiresisthesameonbothends,thenyouhaveastraightthroughcable.Ifnot,thenit’smostlikely
acrossovercableorwaswiredwrong.Atpresent,thestraightthroughcableismuchmorepopulart
hancrossovercableandiswidelyusedbypeople.
NetworkcableCrimpingTools
Thispartofexperimentexplainsthemostcommontwisted-
pairnetworkcablecrimpingtoolsindetail.Learnthetoolsthatyoucanusetocrimpandtesttwisted-
pairnetworkcables.Cablesarethebackboneofawirednetwork.Thestability,reliability,andperfor
manceofawirednetworkdependoncables.Installingandmaintainingcablesinawirednetworkisa
difficulttask.Tomakethistaskeasier,avarietyofnetworkcablecrimpingandtestingtoolsareavaila
ble.Inthistutorial,wewillnotonlydiscusssomeofthemostcommonnetworkcablecrimpingandtes
tingtoolsbutalsounderstandtheirfeaturesandfunctions.
Twisted-pair(STPandUTP)networkcablecrimpingtools
Crimpingtoolsareusedforthefollowingpurposes.
1. Tocutthenetworkcableoftherequiredlengthfromthebundle.
2. Toremovetheouterandinnerjacketsofthenetworkcable.
3. Toattachtheconnectorsonbothendsofthecable.
Somecrimpingtoolsprovideallthefunctionalitywhileothersprovideoneortwofunctionalities.
Themostcommontwisted-pairnetworkcablecrimpingtoolsaredescribedbelow.
Wire Cutter: - To cut the network cable of the required length from the bundle, you can
use any standard wirecutter tool or can use a wire cutter tool that is specially designed for
the twisted-pair cable. A twisted-pair wirecutterusuallyincludes additionalblades
forstrippingthewire.
Wire Stripper: - This tool is used to remove the outer and inner jackets of the network
cable. Typically, you do notneedtopurchasethistoolseparatelyasallstandardtwisted-
pairwirecuttersareequippedwithwire-strippers.
Crimp tool: - This tool is used to attach the connectors to the cable. Typically, this tool
also includes a wire-cutterandwire-
stripper.Soifyoubuyacrimptool,youdon'thavetobuyawire-cutterandwire-striperseparately.
LAN Devices:
1. NIC (Network Interface Card): Also called Network Adapter. It connects a host to a
network medium. It provides the physical interface between computer and cabling. It
prepares data, sends data, and controls the flow of data. It can also receive and translate
data into bytes for the CPU to understand. Contain unique MAC Address to control data
communication.
3. Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator is a
device for connecting multiple twisted pair or fiber optic Ethernet devices together and
making them act as a single network segment. Hubs work at the physical layer (layer 1) of
the OSI model. The device is a form of multi port repeater. Repeater hubs also participate
in collision detection, forwarding a jam signal to all ports if it detects a collision.
5. Bridge: A network bridge connects multiple network segments at the data link layer
(Layer 2) of the OSI model. In Ethernet networks, the term bridge formally means a device
that behaves according to the IEEE802.1 standard. A bridge and switch are very much
alike; a switch being a bridge with numerous ports. Bridges can analyze incoming data
packets to determine if the bridge is able to send the given packet to another segment of
the network.
networks, and selectively interchanges packets of data between them. Each data packet
contains address information that a router can use to determine if the source and
destination are on the same network, or if the data packet must be transferred from one
network to another. Where multiple routers are used in a large collection of interconnected
networks, the routers exchange information about target system addresses, so that each
router can build up a table showing the preferred paths between any two systems on the
interconnected networks.
7. Gate Way: A gateway is a hardware device that acts as a "gate" between two
networks. A gate way may contain devices such as protocol translators, impedance
matching devices, rate converters, fault isolators, or signal translators as necessary to
provide system interoperability
Speaking of local area networks, or LANs, they are smaller networks, usually within an
office base. LAN is used to connect computing resources, typically inside one building. The
computing resources can be computers, printers, servers, IP phones, or routers. Connections
between the workstations are physical, with cables, and all the office resources are shared and
distributed between the network workstations. The most common type of LAN is that of Ethernet.
This is a family of frame-based computer networking technologies for LANs. You must first identify
which services you need to provide locally on the LAN. Computers are connected to a switch with
Ethernet cables. Each device has a unique IP address.
What You Need While Setting up LAN Network: Cable router, Crossover Ethernet
cables, Ethernet cables, Ethernet switch, Network interfaces
Create Network
1. Identify the local services that you want available on the network. Identify network-attached printers,
network disk drives, any server that will share printers or disks.
2. Identify how many devices will have to connect to the network. Each device, server or workstation will
require a unique address.
3. Run cables to workstations where possible. A wired LAN will always get better performance and be more
secure than a wireless LAN. Wherever possible, run a cable to servers, printers, IP phones or work
locations. Run a cable to any area where you are likely to work. Use standard Ethernet cables or building
wiring as installed according to the TIA-568 standard.
4. Select and purchase a switch or cable router. The simple secure way to connect to the Internet is to use a
cable router. Many makes and models are available. If the model you choose does not have enough ports to
connect all of your computers, then you will need to purchase a switch as well.
5. Configure the WAN port of the cable router. Configuration details will vary from vendor to vendor. Key
information you will need to configure the WAN port will be supplied by your internet service provider.
6. Configure the LAN ports of your cable router. Most cable routers will act as a Dynamic Host Configuration
Server, or DHCP server. This means that the router will give addresses to workstations automatically. Be
certain that the address pool has enough addresses for all of the workstations. Make certain that there are
enough addresses outside of the range for any hosts that need static addresses. For example, a network
address with a mask of 255.255.255.0 has a total of 254 hosts. If the dynamic pool has 200 addresses
available, that means the remaining 54 addresses are available to give printers or servers static addresses.
7. Connect the wires for the network. Workstations and servers can be connected with standard Ethernet
cables. Connect the switch to the cable router LAN ports by using the up-link or straight port on the switch. If
the switch does not have an up-link port, connect any standard port of the switch to a LAN port on the cable
router with an Ethernet crossover cable. Ethernet rossover cables can be purchased at any electronics
store.
Department of Computer Science & Engineering
Page
23
Computer Network Lab Manual
8. Test the services and Internet connectivity. Test each of the workstations to ensure they can connect to
the Internet and test any local servers and printers. Print test pages on the shared printers. Tests read and
write permissions on shared file servers by copying files to the servers and copying files from the server to a
workstation.
2. ConfigurehostIP, subnetmaskandgatewayinLAN.
Objectives:
1. Study of Class full IP Addressing
2. To learn Classes, Blocks and Masking
Description
IP Addressing v4: The identifier used in network layer to identify each device connected to the
Internet is called the Internet address or IP address.
1. Format of IP address IPv4 is made up of four parts, in the pattern as w.x.y.z. Each
part has 8 binary bits and the values in decimal can range from 0 to 255.
2. IP addresses are divided into different classes. These classes determine the maximum
number of hosts per network ID. Only three classes are actually used for network
connectivity. The following table lists all of the address class.
a) Class A, B, C, D, E
b) Class A: first bit in w is 0 and others can be anything
i. 0.0.0.0 to 127.255.255.255
ii. First bits are used for network part and the remaining for host part.
c) Class B: First bit in w is 1 and second bit is 0.
i. 128.0.0.0 to 191.255.255.255
ii. First 16 bits for network part and remaining host part
d) Class C: first bit in w is 1, second bit in w is 1 and third bit is 0
i. 192.0.0.0 to 223.255.255.255
ii. First 24 bits for network part and last 8 bits for host part.
e) Class D: first, second, third bits in w are 1 and fourth bit is 0; used for
multicast. i. 224.0.0.0 to 247.255.255.255
f) Class E: future use or experimental purposes.
4. Default Subnet mask it is used to identify the network part from the host part. Put binary
one for the parts that represent network part and zero for the part that represent host part.
a) Class A: 255.0.0.0
b) Class B: 255.255.0.0
c) Class C: 255.255.255.0
d) We can’t have mix of 1s and 0s in subnet mask. Only consecutive 1s is followed by
consecutive 0s.
\
Session 3: Concept of Network IP Address (Part-2)
Description
Why Class less Addressing?
To overcome address depletion and give more organizations access to the Internet, classless
addressing was designed and implemented. In this scheme, there are no classes, but the
addresses are still granted in blocks.
3. StudyofbasicNetworkconfigurationcommands.
4. StudyofbasicNetworkconfigurationcommandsandutilitiestodebugthenetworkissues.
PART-B
EXPERIMENT NO 1.
Simulate a three point-to-point network with duplex links between them. Set
the queue size and vary the bandwidth and find the number of packets
dropped.
Step 1:Select Default icon from Standard Toolset window and Place
thethree nodes on the canvas.
Step 2:Connect point-to-point link between three nodes using link from
Standard Toolset window
Step 3:Double click on link to set duplex link and bandwidth between
thenodes by configure 802.3 as MAC Protocol.
Step 4:To set queue size of each node in the scenario double click on
thenodes, go to Node Configuration tab->Network Layer-> Schedulers
and Queues.
Select CBR and draw the application between Node 1 and Node 2.
Similarly Node 2 to Node 3 and Node 3 Node 1
Set the Number. of CBR packets(Items to send) as per the user requirement
Step 7:Save the changes by clicking on the Save button. Click on the Run
button. Click on the Play button to execute the scenario.
Packet drop =Total no. of packets sent – Total no. of packets received
EXPERIMENT NO 2
n1-n3, n2-n3 and n3-n4, Apply TCP agent between n1-n4 and UDP between
n2-n4. Apply relevant application over TCP and UDP agents changing the
parameters and determine the number of packets sent by TCP/UDP.
Step 2:Connect point-to-point link between four nodes using link from
Standard Toolset window
Similarly Select FTP Generic and set the application between Node 1
and Node 4
Set the Number Of CBR packets (Items to send) as per the user requirement
Step 6:Save the changes by clicking on the Save button. Click on the Run
button. Click on the Play button to execute the scenario.
EXPERIMENT NO 3
Step 1:Select Default icon from Standard Toolset window and Place
theSix nodes on the canvas.
Step 2:Connect point-to-point link between three nodes using link from
Standard Toolset window
Step 3:To set ICMP of each node in the scenario double click on the
nodes,go to Node Configuration tab->Network Layer-> Enable ICMP.
Select CBR and draw the application between Node 3 and Node 4.
Set the Number. of CBR packets(Items to send) as per the user requirement
Step 7:Save the changes by clicking on the Save button. Click on the Run
button. Click on the Play button to execute the scenario.
Packet drop =Total no. of packets sent – Total no. of packets received
EXPERIMENT NO 4
Simulate an Ethernet LAN using n nodes (6-10), change error rate and
data rate and compare throughput.
Step 1:Select Default icon from Standard Toolset window and Place
thenine nodes on the canvas.
Select hubs from Standard Toolset window and Place the two hubs on the
canvas.
Step 3:Connect point-to-point link between three nodes using link from
Standard Toolset window
Step 4:To set error rate of the nodes double click on the nodes, go to
NodeConfiguration tab->Faults->configure start time and end time.
Select CBR and draw the application between Node 2 and Node 9.Similarly
node 5 to node 6 and node 3 to node 8.
To set date rate of the nodes, change item to send packets and time intervals.
Step 7:Save the changes by clicking on the Save button. Click on the Run
button. Click on the Play button to execute the scenario.
EXPERIMENT NO 5
Simulate an Ethernet LAN using n nodes and set multiple traffic nodes and
plot congestion window for different source/destination.
Step 1:Select Default icon from Standard Toolset window and Place
theseven nodes on the canvas.
Select hubs from Standard Toolset window and Place the two hubs on the
canvas.
Step 3:Connect point-to-point link between three nodes using link from
Standard Toolset window
Select FTP Generic and set the application between Node 2 to Node 4,
Node 3 to Node 7 and Node 5 to Node 6.
Set the no. of FTP Generic packets as per the user requirement
Step 7:Save the changes by clicking on the Save button. Click on the Run
button. Click on the Play button to execute the scenario.
EXPERIMENT NO 6
Select “Default” icon and place 3 nodes for each of the Wireless Subnets
And also using link icon connect point-to-point link between node 2 and
node 5(access points)
Step 5:To configure wireless physical layer and Mac Layer double
clickon first wireless subnet1 and go to Wireless Subnet Properties-
>Physical Layer
Step 6:To configure wireless physical layer and Mac Layer double
clickon first wireless subnet2 and go to Wireless Subnet Properties-
>Physical Layer
Select CBR and draw the application between Node 1 and Node 6.
Set the no. of CBR Application packets (Items to send)as per the user
requirement
Step 11:Save the changes by clicking on the Save button. Click on the Run
button. Click on the Play button to execute the scenario.
PROGRAM OUTCOMES
PSO1: Acquire competency in hardware and software working principles to analyze and
solve computing problems.
PSO2: Design quality software to develop scientific and business applications following
Software Engineering practices.
PSO3: Apply cutting edge technologies using modern tools to find novel solutions
ethically to existing problems.
To provide a high quality educational experience for students with values and ethics
that enables them to become leaders in their chosen professions.
To explore, create and develop innovations in engineering and science through research
and development activities.