CN Frontpage
CN Frontpage
CN Frontpage
Experiment-2
Internetworking Devices:-
Switches: A network switch is a device that forwards and filters OSI layer 2 datagrams
(chunk of data communication) between ports (connected cables) based on the MAC
addresses in the packets. This is distinct from a hub in that it only forwards the frames to
the ports involved in the communication rather than all ports connected. A switch breaks
the collision domain but represents itself a broadcast domain. Switches make forwarding
decisions of frames on the basis of MAC addresses. A switch normally has numerous
ports, facilitating a star topology for devices, and cascading additional switches. Some
switches are capable of routing based on Layer 3 addressing or additional logical levels;
these are called multi-layer switches. The term switch is used loosely in marketing to
encompass devices including routers and bridges, as well as devices that may distribute
traffic on load or by application content (e.g., a Web URL identifier).
Specification of Switch
D-Link DES-1016D (16 port Switch).
D-Link DES-1024D (24 port Switch).
KVM Switch (4 port, Manufacturer D-Link)
Routers: A router is a networking device that forwards packets between networks using
information in protocol headers and forwarding tables to determine the best next router
for each packet. Routers work at the Network Layer (layer 3) of the OSI model and the
Internet Layer of TCP/IP.
Category 5 & 6 cable: It is a twisted pair high signal integrity cable type often referred
to as Cat5 or Cat-5. Most cables are unshielded, relying on the twisted pair design for
noise rejection, and some are shielded. Category 5 has been superseded by the Category
5e specification structured cabling for computer networks such as Ethernet, and is also
used to carry many other signals such as basic voice services, token ring, and ATM (at
up to 155 Mbit/s, over short distances).
Topology used in LAN:-
Star Topology: All computers/devices connect to a central device called hub or switch.
Each device requires a single cable point-to-point connection between the device and hub.
It is widely implemented in most organisations. Hub is the single point of failure.
Technical Details
Result: Hence we have learned about the network topology of our college which is a
star configuration.
Signature of Faculty
Experiment-4
Aim: Study & Verification of standard Network topologies i.e. Star, Tree, Bus etc.
Apparatus (Software): Packet tracer Software
Procedure: To implement this practical following network topology is required to be
configured using the commands learned in previous practical.
After configuring the given network a packet should be ping from any one machine to
another.
Network topology is the arrangement of the various elements (links, nodes, etc.) of a
computer network.
Essentially, it is the topological structure of a network, and may be depicted physically or
logically.
Physical topology refers to the placement of the network's various components, including
device location and cable installation, while logical topology shows how data flows within
a network, regardless of its physical design. Distances between nodes, physical
interconnections, transmission rates, and/or signal types may differ between two
networks, yet their topologies may be identical.
A good example is a local area network (LAN): Any given node in the LAN has one or
more physical links to other devices in the network; graphically mapping these links
results in a geometric shape that can be used to describe the physical topology of the
network. Conversely, mapping the data flow between the components determines the
logical topology of the network.
There are two basic categories of network topologies:-
Physical topologies: The shape of the cabling layout used to link devices is called the
physical topology of the network. This refers to the layout of cabling, the locations of
nodes, and the interconnections between the nodes and the cabling.
Logical topologies: The physical topology of a network is determined by the capabilities
of the network access devices and media, the level of control or fault tolerance desired,
and the cost associated with cabling or telecommunications circuits.
Logical topologies are often closely associated with Media Access Control methods and
protocols. Logical topologies are able to be dynamically reconfigured by special types of
equipment such as routers and switches.
The study of network topology recognizes eight basic topologies:
• Bus Topology
• Star Topology
• Ring or circular Topology
• Mesh Topology
• Tree Topology
Creating of network topology using Cisco Packet tracer is Very easy. By help of its inbuilt
tools and functionality user can create topology in very easy ways.
Tree Topology
Result: Hence we have learned about the different types of topology using Cisco Packet
Tracer 8.0.
Signature of Faculty
Experiment-5
Aim: LAN installation and Configuration in Windows 7 or later version.
Procedure:
Network interface card (NIC) or an on-the-motherboard network port for each computer.
HP and Compaq computers are network ready with NICs installed. Confirm the computer
has a RJ-45 network port on the back. Network hub (or router). A separate network hub
may not be necessary if your home is already equipped with RJ-45 jacks in the walls or if
your DSL or cable modem provides RJ-45 ports (select models). If you need a network
hub, consult with a network specialist at your local computer store to determine a hub that
meets your needs.
NOTE: A crossover cable can be used to connect two computers without a hub. However,
it only allows two computers to connect and is not expandable. Network cables for each
computer. Disconnect the Internet. If you have a DSL or cable modem, disconnect it.
Disable any firewall software. Firewall software may interfere with network setup. You
can enable the firewall after network setup is complete.
Step 1: Connecting the network hardware and cables to set up a local network. Do the
following to set up the network hardware and connect the networking cables.
• Set up and turn on the power for the network hub or other networking device.
• Connect the computers to the networking device. If a crossover cable is used,
connect the cable to the RJ45 network ports on each computer.
• Connect the computer power cords and turn the computers on.
Step 2: Turning on Network discovery and file sharing in Windows 7. Turn on Network
discovery and file sharing on each computer that you want to access on the network.
• Click Start, and then click Control Panel.
• Under Network and Internet, click Choose Home group and sharing.
• In the Home group settings window, click Change advanced sharing settings.
• Turn on network discovery and file and printer sharing. Review the other settings
and turn them on or off.
Step 3: Sharing drives, folders, and files in a Windows 7 network. To share non-public
folders with other computers on a local network, follow these steps:
• Click Start , and then click Computer.
• Browse to the folder you want to share.
• Right-click the folder, select Share with, and then click Home group (Read), Home
group (Read/Write), or Specific people.
• If you chose Specific people, the File Sharing window displays.
• Click the down arrow and select the account you want to share with, and then click
• Click an arrow under Permission Level to set the permission level for each account
or group.
• Click Share.
Step 4: Testing a local network in Windows 7. Open the Windows 7 network window
and browse through the shared folders in each computer on the network. If the computer
is able to read and access files from a remote computer, the remote computer is set up
correctly. Browse to every available computer from each computer on the network. If
there are any issues, go back through these steps and verify that the settings are correct.
Result: Hence we have configured a LAN interface in windows 7.
Signature of Faculty
Experiment-06
Aim: Implement & configure various types of routing algorithm using packet tracer.
Distance Vector Routing protocol.
Apparatus (Software): Cisco Packet Tracer
Procedure:-
Establish the network in this format.
• This topology needs the network segmentation in the above mentioned format.
• Each router has to be given the global knowledge of the routers present in this
topology.
• Once each router is configured with global knowledge to global topology, then start
the simulation and let it run for few seconds so that all routers can send their
distance vector tables to their neighbouring routers.
• Once the simulation settle downs, run the ping test from left most network to the
pc in right most network.
Result: Hence we have learned about the simulation of distance vector routing (RIP) in
Cisco Packet Tracer.
Signature of Faculty
Experiment-07
Aim: Implement & configure various types of routing algorithm using packet tracer.
Link state Routing protocol.
Apparatus (Software): Cisco Packet Tracer
Theory: The Link state Routing protocol belongs to the Intra domain routing protocol
where the routers share their link state table with other routers in the domain using
FLOODING OF LINK STATE TABLE. In Distance vector routing the router sends its
distance vector table to its neighbouring tables only, but in link state the router floods the
domain with its link state table to ensure the transmission to the remote corners of the
domain. This makes each router capable to implementing the shortest path first algorithm
on the knowledge of the topology of the domain.
This topology for link state routing protocol implementation makes the routers to flood
intra domain network with their link state table. Initially the tables will look like.
Upon flooding each router in domain can have its own graph of router upon which it can
apply dijkstra’s shortest path algorithm.
Result: Hence we have discussed about the on paper details of Link State routing
algorithm.
Signature of Faculty
Experiment-08
Aim: Study and Configure DHCP protocol by creating the pool.
Apparatus (Software): Cisco Packet Tracer
Procedure: First establish a simple start topology using a switch and a root router which
will be our DHCP server.
• Once done, let the simulation run for few seconds and when the simulation settles
down you will see that each PC which was configures for DHCP IP allocation
would have been allocated with a IP address.
Result: Hence we have established a DHCP server using a router as a root node in the
network topology.
Signature of Faculty
Experiment-09
Aim: Study and Configure of Application Layer Protocols: DNS, HTTP, HTTPS, FTP
and Telnet.
Domain Name System: Domain Name System (DNS) is a critical component of the
global Internet infrastructure. The Domain Name System is a hierarchical distributed
naming system for computers, services or any resource connected to the internet or a
private network. It associates various information with domain name assigned to each of
entities. Most prominently, it translates domain names, which can be easily memorized
by humans, to the numerical IP addresses needed for the purpose of computer services
and devices worldwide. Domain Name System distributes the responsibility of assigning
domain name and mapping those names to IP addresses by designating authorities name
serves for each domain. It also specifies the technical functionality of the database service
which is at its core. It defines the Domain Name System protocol, detailed specification
of structure and data communication exchanges used in Domain Name System, a part of
the Internet Protocol Suite.
FEATURES OF DNS:
• Scalability: No limit to the size of the database (i.e. one server can have 40,000,000
names). No limit to the number of queries (24,000 queries are easily handled per
second). Queries distributed among masters, slaves and caches.
• Reliability: Data is replicated (data from master is copied to multiple slaves &
system can deal with outrage of servers) Clients will typically query local catches.
DNS protocol can use either UDP or TCP.
• Dynamicity: Database can be updated dynamically (add/delete/modification)
Modification of master database triggers replication. Clients can query (master
server, any of the copies at slave servers).
• Loose Coherency: The database is always internally consistent. Cached data
expires according to timeout set by zone administrator.
• Top Level Domain: Some types of top-level domains:
o Organizational: It’s a 3 character code/domain. It indicates the function of
the organization. Examples: .gov, .edu, .org, .com, .net, etc.
o Geographical: it’s a 2 character code that represents any specific geographic
location like country or region. Examples: .us, .in, etc. used IP address-to-
name mapping. There are more than 200 top-level∙ domains.
Hyper Text Transfer Protocol Secure (HTTPS): It is the secure version of
HTTP, the protocol over which data is sent between your browser and the website that
you are connected to. The 'S' at the end of HTTPS stands for 'Secure'. It means all
communications between your browser and the website are encrypted. HTTPS is often
used to protect highly confidential online transactions like online banking and online
shopping order forms.
Web browsers such as Internet Explorer, Firefox and Chrome also display a padlock icon
in the address bar to visually indicate that a HTTPS connection is in effect.
File Transfer Protocol: File Transfer Protocol (FTP) is an application layer protocol
which moves files between local and remote file systems. It runs on the top of TCP, like
HTTP. To transfer a file, 2 TCP connections are used by FTP in parallel: control
connection and data connection.
What is control connection?
For sending control information like user identification, password, commands to change
the remote directory, commands to retrieve and store files, etc., FTP makes use of control
connection. The control connection is initiated on port number 21.
What is data connection?
For sending the actual file, FTP makes use of data connection. A data connection is
initiated on port number 20. FTP sends the control information out-of-band as it uses a
separate control connection. Some protocols send their request and response header lines
and the data in the same TCP connection. For this reason, they are said to send their
control information in-band. HTTP and SMTP are such examples.
FTP Session: When a FTP session is started between a client and a server, the client
initiates a control TCP connection with the server side. The client sends control
information over this. When the server receives this, it initiates a data connection to the
client side. Only one file can be sent over one data connection. But the control connection
remains active throughout the user session. As we know HTTP is stateless i.e. it does not
have to keep track of any user state. But FTP needs to maintain a state about its user
throughout the session.
Data Structures: FTP allows three types of data structures:
• File Structure: In file-structure there is no internal structure and the file is
considered to be a continuous sequence of data bytes.
• Record Structure: In record-structure the file is made up of sequential records.
• Page Structure: In page-structure the file is made up of independent indexed
pages.
TELNET: It stands for Terminal Network. It is a type of protocol that enables one
computer to connect to local computer. It is a used as a standard TCP/IP protocol for
virtual terminal service which is given by ISO. Computer which starts connection
known as the local computer. Computer which is being connected to i.e. which accepts
the connection known as remote computer. When the connection is established
between local and remote computer. During telnet operation whatever that is being
performed on the remote computer will be displayed by local computer. Telnet
operates on client/server principle. Local computer uses telnet client program and the
remote computers uses telnet server program. It is a general-purpose client/server
application program. This program enables the establishment of the connection to the
remote system in such a way that the local system starts to appear as a terminal at the
remote system. It is a standard TCP/IP protocol that is used for virtual terminal service.
In simple words, we can say that the telnet allows the user to log on to a remote
computer. After logging on the user can use the services of the remote computer and
then can transfer the results back to the local computer.
The TELNET was mainly designed at the time when most operating systems operate
in the time-sharing environment. And in this type of environment, a large computer
can support multiple users. Usually, the interaction between the computer and user
occurs via terminal (It is a combination of keyboard, mouse, and monitor). TELNET
makes the use of only one TCP/IP connection.
Signature of Faculty