cn
cn
cn
COMPUTER NETWORK
Prepared by:-
Ranjan Thakur
(Asst. Professor)
List of Experiments:
1 Study of Different Type of LAN& Network Equipments.
2 Study and Verification of standard Network topologies i.e. Star, Bus, Ring etc.
7 To Study of Application layer protocols- DNS, HTTP, HTTPS, FTP and TelNet.
In wireless networks, devices communicate via radio waves and do not require
physical connections. In wired networks, cables are used. These cables are
equipped with connectors for a specific port or interface type. For example,
attachment unit interface (AUI) cables are equipped with 15-pin connectors that
mate with a 15-pin receptacle on network transceivers.
The Engineering 360 Spec Search database allows industrial buyers to search for
and select the following types of network equipment.
Study and Verification of standard Network topologies i.e. Star, Bus, Ring etc.
BUS Topology
Bus topology is a network type in which every computer and network device is
connected to single cable. When it has exactly two endpoints, then it is called
Linear Bus topology.
1. A number of repeaters are used for Ring topology with large number of
nodes, because if someone wants to send some data to the last node in the
ring topology with 100 nodes, then the data will have to pass through 99
nodes to reach the 100th node. Hence to prevent data loss repeaters are used
in the network.
2. The transmission is unidirectional, but it can be made bidirectional by
having 2 connections between each Network Node, it is called Dual Ring
Topology.
3. In Dual Ring Topology, two ring networks are formed, and data flow is in
opposite direction in them. Also, if one ring fails, the second ring can act as
a backup, to keep the network up.
4. Data is transferred in a sequential manner that is bit by bit. Data transmitted,
has to pass through each node of the network, till the destination node.
Advantages of Ring Topology
1. Transmitting network is not affected by high traffic or by adding more
nodes, as only the nodes having tokens can transmit data.
2. Cheap to install and expand
STAR Topology
In this type of topology all the computers are connected to a single hub through a
cable. This hub is the central node and all others nodes are connected to the central
node.
MESH Topology
It is a point-to-point connection to other nodes or devices. All the network nodes
are connected to each other. Mesh has n(n-1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are :
1. Routing
2. Flooding
Routing
In routing, the nodes have a routing logic, as per the network requirements. Like
routing logic to direct the data to reach the destination using the shortest distance.
Or, routing logic which has information about the broken links, and it avoids those
node etc. We can even have routing logic, to re-configure the failed nodes.
Flooding
In flooding, the same data is transmitted to all the network nodes; hence no routing
logic is required. The network is robust, and the its very unlikely to lose the data.
But it leads to unwanted load over the network.
Types of Mesh Topology
1. Partial Mesh Topology: In this topology some of the systems are connected
in the same fashion as mesh topology but some devices are only connected
to two or three devices.
2. Full Mesh Topology: Each and every nodes or devices are connected to
each other.
HYBRID Topology
It is two different types of topologies which is a mixture of two or more topologies.
For example if in an office in one department ring topology is used and in another
star topology is used, connecting these topologies will result in Hybrid Topology
(ring topology and star topology).
Features of Hybrid Topology
1. It is a combination of two or topologies
2. Inherits the advantages and disadvantages of the topologies included
Easy to install, most switches are self learning. They determine the Ethernet
addresses in use on each segment, building a table as packets are passed through
the switch. This "plug and play" element makes switches an attractive alternative
to hubs.
Switches can connect different networks types (such as Ethernet and Fast Ethernet)
or networks of the same type. Many switches today offer high-speed links, like
Fast Ethernet or FDDI that can be used to link the switches together or to give
added bandwidth to important servers that get a lot of traffic. A network composed
of a number of switches linked together via these fast uplinks is called a "collapsed
backbone" network.
Network switch:-
Fig1-Ethernet Switch
Switches may operate at one or more layers of the OSI model, including data
link and network. A device that operates simultaneously at more than one of these
layers is known as a multilayer switch.
In switches intended for commercial use, built-in or modular interfaces make it
possible to connect different types of networks, including Ethernet, Fibre
Channel, ATM, ITU-T G.hn and 802.11. This connectivity can be at any of the
layers mentioned. While Layer 2 functionality is adequate for bandwidth-shifting
within one technology, interconnecting technologies such as Ethernet and token
ring is easier at Layer 3.
Devices that interconnect at Layer 3 are traditionally called routers, so "Layer-3
switches" can also be regarded as (relatively primitive) routers.
In some service provider and other environments where there is a need for a great
deal of analysis of network performance and security, switches may be connected
between WAN routers as places for analytic modules. Some vendors
provide firewall,network intrusion detection,and performance analysis modules
that can plug into switch ports. Some of these functions may be on combined.
Router:-
Routers do not look at the destination node address; they only look at the network
address. Routers will only pass the information if the network address is known.
This ability to control the data passing through the router reduces the amount of
traffic between networks and allows routers to use these links more efficiently than
bridge.
Repeater
In the following figure, a bridge is used to connect two segment segment 1 and
segment 2.
Fig 4- A Bridge
Bridges can be used to:
I.Expand the distance of a segment.
Ii.Provide for an increased number of computers on the network.
Iii.Reduce traffic bottlenecks resulting from an excessive number of attached
computers.
Bridges work at the Data Link Layer of the OSI model. Because they work at this
layer, all information contained in the higher levels of the OSI model is
unavailable to them. Therefore, they do not distinguish between one protocol and
another. Bridges simply pass all protocols along the network. Because all protocols
pass across the bridges, it is up to the individual computers to determine which
protocols they can Recognize.A Bridge works on the principle that each network
node has its own address. A bridge forwards the packets based on the address of
the particular destination node. As traffic passes through the bridge, information
about the computer addresses is then stored in the bridge's RAM. The bridge will
then use this RAM to build a routing table based on source addresses.
Gateways:-
i. Communication protocols
ii. Data formatting structures
iii. Languages
iv. Architecture
EXPERIMENT NO. 4
Connectors:-
Network cards have three main types of connectors. Below is an example of what a
network card may look like.
DB9 (RJ45 JACK): The DB9 connector not to be confused with the Serial
Port or sometimes referred to as the RJ45 JACK not to be confused with the
RJ45 connection is used with Token Ring networks
Fig 7- DB 9 connector
DB15 Connector: The DB15 connector is used for a Thick net or 10Base-5
Local area network.
Fig 8- DB 15
RJ45 connector: Today one of the most popular types of connections used
with computer networks. RJ45 looks similar to a phone connector or RJ11
connector however is slightly larger.
Cables:-
The following is a few examples of some of the more commonly used types of
cables found with networks.
Experiment 5
IP Addresses
Every IP address is really made up of two pieces: a "network" portion, which tells
routers what group of devices a packet should go to (e.g., any, a campus, etc.) and
a "host" portion which tells routers what specific device among that group the
packet should go to.
If your network is, or will be, connected to the Internet, you will need to get a
unique network address from your ISP or network administrator.
How much of any given address is the network part and how much is the host part
is determined by the "class" of the network. In each case, the part of the address
not used for the network portion is left as the host portion.
You can always tell what class an address is by looking at the first octet and
comparing it to the chart above. For instance, the address at the top of this
appendix has 198 as the first octet, so it is Class C.
Subnet Masks
A subnet mask tells a router how much of an address it should treat as the network
portion. The masks for traditional Class A, B and C networks are shown below
in Table A-2
A 255.0.0.0
B 255.255.0.0
C 255.255.255.0
Experiment 6
Local Area Networks (LANs): "...are concerned with the interconnection of items
of computing equipment (office workstations, intelligent instruments etc.) which
are distributed over a localized area such as a university campus or process plant.
They are referred to, therefore as Local Area Networks". (Halsall, 1988).
LANs can be distinguished from other networks because of their short distance.
The total coverage may be from 1 km to 10 kms. The data transmission speed
of LANs is much higher than in other types of networks. When a WANs works
at a speed of 1 mbps, LANs can transmit data at a speed of 1 - 10 mbps. The
error rate in data transmission is slow because of the shorter distance between
the equipment. Since LANs are within a single building or a smaller area, they
are owned by the specific organization. This localized control provides greater
flexibility in LANs than other types of networks.
Components of a LAN
Types of LANs
Star Each workstation is connected to the control unit in the form of a star.
Communication between two workstations has to be done through this central
controller. A particular station which wants to communicate with another station
builds up a connection, through the central controlling center, with the destination.
Once this connection is established data can be communicated from one to the
other station.
Ring This category has no central controller but devices are joint together in a
form of a ring. Data has to pass some other workstations to reach its destination.
―A station wishing to trans-mit waits until its turn and then places a data packet on
to the ring. This circulates around until it reaches its destination where the node
copies the data into a local buffer. The packet then continues to circulate until
arrives back at its source. This then provides a form of acknowledgment."
(Winfield, 1984).
Bus This takes the form of a data highway connecting all equipment to a linear
communication media. A transmission from any station can be received by any
other station like in the ring type. Hence there is no sufficient data security in these
types. ―Obviously if all these devices started transmitting at once there would be
chaos, so only one device is allowed to 'talk' at any one time. A form of access
control is enforced to determine who can transmit next. The most commonly used
medium access control is known as Career Sense Multiple Access with Collision
Detection." (Winfield, 1988).
EXPERIMENT -7
Study of Application layer protocols- DNS, HTTP, HTTPS, FTP and TelNet.
Country Domain: The country domain section follows the same format
as the generic domain but uses 2 characters country abbreviations (e.g.,
US for United States) in place of 3 characters.
Inverse Domain: The inverse domain is used to map an address to a
name.
EXPERIMENT -8
Network simulator
A network simulator is software that predicts the behavior of a computer
network. Since communication Networks have become too complex for traditional
analytical methods to provide an accurate understanding of system behavior,
etwork simulators are used. In simulators, the computer network is modeled with
devices, links, applications etc. and the performance is analysed. Simulators come
with support for the most popular technologies and networks in use today such as
Wireless LANs, Mobile Adhoc Networks, Wireless Sensor Networks, Vehicular
Adhoc Networks, Cognitive Radio networks, LTE / LTE- Advanced Networks,
Internet of things (IOT) etc.
Simulations
Most of the commercial simulators are GUI driven, while some network simulators
are CLI driven. The network model / configuration describe the network (nodes,
routers, switches, links) and the events (data transmissions, packet error etc.).
Output results would include network level metrics, link metrics, device metrics
etc. Further, drill down in terms of simulations trace files would also be available.
Trace files log every packet, every event that occurred in the simulation and are
used for analysis. Most network simulators use discrete event simulation, in which
a list of pending "events" is stored, and those events are processed in order, with
some events triggering future events—such as the event of the arrival of a packet at
one node triggering the event of the arrival of that packet at a downstream node.
Network emulation
Network emulation allows users to introduce real devices and applications into a
test network (simulated) that alters packet flow in such a way as to mimic the
behavior of a live network. Live traffic can pass through the simulator and be
affected by objects within the simulation.
The typical methodology is that real packets from a live application are sent to the
emulation server (where the virtual network is simulated). The real packet gets
'modulated' into a simulation packet. The Simulation packet gets demodulated into
real packet after experiencing effects of loss, errors, delay, jitter etc., thereby
transferring these network effects into the real packet. Thus it is as-if the real
packet flowed through a real network but in reality it flowed through the simulated
network.
Emulation is widely used in the design stage for validating communication
networks prior to deployment.
List of network simulators
There are both free/open-source and proprietary network simulators available.
Examples of notable network simulators / emulators include:
ns (open source)
OPNET (proprietary software)
TETCOS NetSim (proprietary software)
Uses of network simulators /emulators
Network simulators provide a cost-effective method for
a. Network design validation for enterprises / data centers /sensor networks etc.
b. Analyzing Utilities distribution communication, railway signaling /
communication etc.
c. Network R & D (More than 70 % of all Network Research paper reference a
network simulator)
d. Defense applications such as HF / UHF / VHF MANET networks, Tactical data
links etc
e. Education - Lab experimentation. Most universities use a network simulation to
teach / experiment on networking since its too expensive to buy hardware
equipment
f. Experimentation on Machine learning for networks
There are a wide variety of network simulators, ranging from the very simple to the
very complex. Minimally, a network simulator must enable a user to
EXPERIMENT 9
To study of network scanning tools (nmap and Wireshark).
Nmap (Network Mapper) is a security scanner, originally written by Gordon
Lyon (also known by his n used to discover hosts and services on a computer
network, thus building a "map" of the network. To accomplish its goal, Nmap
sends specially crafted packets to the target host(s) and then analyzes the
responses.
The software provides a number of features for probing computer networks,
including host discovery and service and operating-system detection. These
features are extensible by scripts that provide more advanced service
detection,[3]vulnerability detection,[3] and other features. Nmap can adapt to
network conditions including latency and congestion during a scan. The Nmap
user community continues to develop and refine the tool.
Features:-
Nmap features include:
Host discovery – Identifying hosts on a network. For example, listing the hosts
that respond to TCP and/or ICMP requests or have a particular port open.
Port scanning – Enumerating the open ports on target hosts.
Version detection – Interrogating network services on remote devices to
determine application name and version number.[7]
OS detection – Determining the operating system and hardware characteristics
of network devices.
Scriptable interaction with the target – using Nmap Scripting Engine (NSE)
and Lau programming language.
Nmap can provide further information on targets, including reverse DNS names,
device types, and MAC addresses.
Typical uses of Nmap:
Auditing the security of a device or firewall by identifying the network
connections which can be made to, or through it.[10]
Identifying open ports on a target host in preparation for auditing.[11]
Network inventory, network mapping, and maintenance and asset management.
Auditing the security of a network by identifying new servers.[12]
Generating traffic to hosts on a network, response analysis and response time
measurement.[13]
Finding and exploiting vulnerabilities in a network.
Wireshark
Wireshark is a free and open source packet analyzer. It is used
for network troubleshooting, analysis, software and communications
protocol development, and education. Originally named Ethereal, the project was
renamed Wireshark in May 2006 due to trademark issues.[4]
Wireshark is cross-platform, using the Qt widget toolkit in current releases to
implement its user interface, and using pcap to capture packets; it runs
on Linux, macOS, BSD, Solaris, some other Unix-like operating systems,
and Microsoft Windows. There is also a terminal-based (non-GUI) version called
TShark. Wireshark, and the other programs distributed with it such as TShark,
are free software, released under the terms of the GNU General Public License.
Features
Wireshark is a data-capturing program that "understands" the structure
(encapsulation) of different networking protocols. It can parse and display the
fields, along with their meanings as specified by different networking protocols.
Wireshark uses pcap to capture packets, so it can only capture packets on the types
of networks that pcap supports.
Data can be captured "from the wire" from a live network connection or read
from a file of already-captured packets.
Live data can be read from different types of networks,
including Ethernet, IEEE 802.11, PPP, and loopback.
Captured network data can be browsed via a GUI, or via the terminal
(command line) version of the utility, TShark.
Captured files can be programmatically edited or converted via command-line
switches to the "editcap" program.
Data display can be refined using a display filter.
Plug-ins can be created for dissecting new protocols.[19]
VoIP calls in the captured traffic can be detected. If encoded in a compatible
encoding, the media flow can even be played.
Raw USB traffic can be captured.
Wireless connections can also be filtered as long as they traverse the
monitored Ethernet.
Various settings, timers, and filters can be set to provide the facility
of filtering the output of the captured traffic.
Experiment 10
Remember when typing from the command prompt you can only type one
command per line, and press Enter after each one to execute it.
C:\>arp –a: is short for address resolution protocol, It will show the IP address of
your computer along with the IP address and MAC address of your router.
C:\>hostname: This is the simplest of all TCP/IP commands. It simply displays the
name of your computer.
C:\>ipconfig: The ipconfig command displays information about the host (the
computer your sitting at)computer TCP/IP configuration.
C:\>ipconfig /all: This command displays detailed configuration information about
your TCP/IP connection including Router, Gateway, DNS, DHCP, and type of
Ethernet adapter in your system.
C:\>Ipconfig /renew: Using this command will renew all your IP addresses that
you are currently (leasing) borrowing from the DHCP server. This command is a
quick problem solver if you are having connection issues, but does not work if you
have been configured with a static IP address.
C:\>Ipconifg /release: This command allows you to drop the IP lease from the
DHCP server.
C:\>ipconfig /flushdns: This command is only needed if you’re having trouble with
your networks DNS configuration. The best time to use this command is after
network configuration frustration sets in, and you really need the computer to reply
with flushed.
C:\>nbtstat –a: This command helps solve problems with NetBIOS name
resolution. (Nbt stands for NetBIOS over TCP/IP) Definitions
______________________________________________________