[go: up one dir, main page]

0% found this document useful (0 votes)
11 views40 pages

CN - Lab - Manual

The document is a laboratory manual for the Computer Networks course at SAL Engineering & Technical Institute for the academic year 2025-2026. It includes a series of experiments covering topics such as data transmission, network topologies, wired transmission media, CRC generation, and IP configuration. Each experiment outlines objectives, theory, exercises, and evaluation criteria to help students understand and implement networking concepts.

Uploaded by

harshal131634
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views40 pages

CN - Lab - Manual

The document is a laboratory manual for the Computer Networks course at SAL Engineering & Technical Institute for the academic year 2025-2026. It includes a series of experiments covering topics such as data transmission, network topologies, wired transmission media, CRC generation, and IP configuration. Each experiment outlines objectives, theory, exercises, and evaluation criteria to help students understand and implement networking concepts.

Uploaded by

harshal131634
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

SAL Engineering & Technical Institute

CE, CSE, IT Department

Computer Networks

(3150710)

Laboratory Manual
Year: 2025-2026

Prepared By:

Prof. Krupa Patel


Prof. Yogesh Vaghela
Prof. Dimple Shah
INDEX

Page No.
Sr.
No. Experiment From To Date Marks Signature

1. Introduction to Data transmission in


Network.
Implementation of star topology
2. using switch and Hub in Packet
Tracer.

3. Introduction to different types of


Wired Transmission Media.
4. Implementation of CRC
generator.
5. Perform TCP/IP Configuration
for PC Network
6. Implementation of VLAN

7. IP Addressing Basics

8. Implementation of Dynamic
Routing (Using RIP)
9. Introduction to Networking and
Internetworking Devices
10. Implementation of DHCP in
network

Page 2 of 40
Experiment No: 1 Date: / /

TITLE: Introduction to Data Transmission in Network.

OBJECTIVES:
After completing study of this practical the students will be familiarized with…
➢ Basics concepts of OSI model.
➢ Data transmission in Network.
➢ Concept of computer code conversion.
➢ Convert the given binary digits into character and given character into binary.

THEORY:
What is Network?

• In the simplest terms, a network consists of two or more computers that are connected
together to share information.
• Networking may be defined as two computers being linked together, either physically
through a cable or through a wireless device. This link allows the computers to share
files, printers and even internet connections

Data Communication:-

It is an exchange of data between two devices via some form of transmission


medium.

Components of networks:

A data communication System is made of five components.

1) Message
2) Source
3) Destination
4) Medium
5) Protocol

Source sends data to destination

Page 3 of 40
OSI Model

• OSI stands for Open System Interconnections.


• OSI model is used for understanding the concept of network architecture.
• OSI consists of seven separate but related layers, each of which defines a segment of
the process of moving information across a network.

Communication between Source and Destination

Traveling of Message from Node A to Node B

Transmission of Data at Physical Layer

Program 1: To convert the given character into binary.


Steps for convert a character into its equivalent binary codes:
1) Accept any Character from User.
2) Convert character into its Equivalent ASCII

Page 4 of 40
3) Perform modulo by 2 of ASCII Value and store Reminder until ASCII
Value equal to1.
4) Print stored Reminder Values in the Reverse order
The above algorithm will convert the given character into its binary equivalent and
store in the array. Observe the sequence stored in the array.

Program 2: To convert the given binary digits into character.


Steps for convert the given binary codes into its equivalent character:

1) Accept the Binary Value form User


2) Perform Binary to decimal conversion.
3) Convert decimal Value to its appropriate Character.

EXCERCISE:
1) Write a program to convert character into binary and binary digits into
character.

QUIZ:
Answer the Followings:
1) Write ASCII range for A-Z, a-z,0-9.
2) In the second program why the “for loop” appears in reverse order?
3) Give difference between ISO and OSI.
4) What is Protocol?
5) Differentiate “Node to Node Communication” and “End to End
Communication”

EVALUATION:

Problem Timely
Understanding Mock
Analysis & Completion Total (10)
Level (3) (2)
Solution (3) (2)

Signature with date:

Page 5 of 40
Experiment No: 2 Date: / /

TITLE: Implementation of star topology using switch and Hub in Packet Tracer.
OBJECTIVES:
After completing study of this practical student will be familiarized with…
➢ Concept of Packet Tracer Simulator.
➢ Concept of Basic N/W.

THEORY:
Packet Tracer:
Packet Tracer is a protocol simulator developed by Dennis Frezzo and his team at Cisco
Systems. Packet Tracer (PT) is a powerful and dynamic tool that displays the various protocols
used in networking, in either Real Time or Simulation mode. This includes layer 2 protocols
such as Ethernet and PPP, layer 3 protocols such as IP, ICMP, and ARP, and layer 4 protocols
such as TCP and UDP. Routing protocols can also be traced.
Step 1: Start Packet Tracer and Entering Simulation Mode

Step 2: Choosing Devices and Connections


We will begin building our network topology by selecting devices and the media in which to
connect them.
Several types of devices and network connections can be used. For this lab we will keep it
simple by using End Devices, Switches, Hubs, and Connections.

Single click on each group of devices and connections to display the various choices.

Page 6 of 40
Step 3: Building the Topology – Adding Hosts Single click on the End Devices.

Move the cursor into topology area. You will notice it turns into a plus “+” sign.
Single click in the topology area and it copies the device.

Step 4: Building the Topology – Connecting the Hosts to Hubs and Switches
Adding a Hub
Select a hub, by clicking once on Hubs and once on a Generic hub.

Page 7 of 40
Perform the following steps to connect PC0 to Hub0:
1. Click once onPC0
2. Choose Fast Ethernet
3. Drag the cursor toHub0
4. Click once on Hub0 and choose Port0
5. Notice the green link lights on both the PC0 Ethernet NIC and the Hub0 Port 0 showing -
that the link is active.

Adding a Switch
Select a switch, by clicking once on Switches and once on a 2950-24 switch.

Add the switch by moving the plus sign “+” below PC2 and PC3 and click once.

Connect PC2 to Switch0 by first choosing Connections. Click once on the Copper Straight-
through cable.

Page 8 of 40
Perform the following steps to connect PC2 to Switch0:
1. Click once onPC2
2. Choose Fast Ethernet
3. Drag the cursor toSwitch0
4. Click once on Switch0 and choose FastEthernet0/1
5. Notice the green link lights on PC2 Ethernet NIC and amber light Switch0FastEthernet0/1
port. The switch port is temporarily not forwarding frames, while it goes through the stages
for the Spanning Tree Protocol (STP)process.
6. After a about 30 seconds the amber light will change to green indicating that the port has
entered the forwarding stage. Frames can now forwarded out the switch port.

Step 5: Configuring IP Addresses and Subnet Masks on the Hosts


Before we can communicate between the hosts we need to configure IP Addresses and
Subnet Masks on the devices.
Click once on PC0.

Choose the Config tab. It is here that you can change the name of PC0. It is also here where
you would enter a Gateway IP Address, also known as the default gateway. We will discuss
this later, but this would be the IP address of the local router. If you want, you can enter the
IP Address 172.16.1.1, although it will not be used in this lab.

Click on Fast Ethernet. Although we have not yet discussed IP Addresses, add the
IP Address to 172.16.1.10. Click once in the Subnet Mask field to
enter the default Subnet Mask. You can leave this at 255.255.0.0. We will discuss this later.

Page 9 of 40
Repeat these steps for the other hosts. Use the information below for IP Addresses and
Subnet Masks.

Host IP Address Subnet Mask


PC0 172.16.1.10 255.255.0.0
PC1 172.16.1.11 255.255.0.0
PC2 172.16.1.12 255.255.0.0
PC3 172.16.1.13 255.255.0.0
Verify the information
To verify the information that you entered, move the Select tool (arrow) over each host.

Also verify the connection by ping command


EXCERCISE:
1) Create and draw the LAN of 10 computers using Class C Address.
2) Connect and draw two LAN (Each of having 6 Computer) with each other using
class B Address.
3) Connect Three LAN with Master Switch (in Tree structure)

EVALUATION:

Problem Timely
Understanding Mock
Analysis & Completion Total (10)
Level (3) (2)
Solution (3) (2)

Signature with date:

Page 10 of 40
Experiment No: 3 Date: / /

TITLE: Introduction to different types of Wired Transmission Media.

OBJECTIVES:
After completing study of this practical the students will be familiarized with…
➢ Concept of Wired Media.
THEORY:
Introduction:
There are two types of transmission media

• Guided – copper wires, fiber optic cable


• Unguided – Wireless (Radio Frequency /Microwave)
Information is transmitted over:

• Copper wire by varying the voltage or current time


• Fiber optic cable by pulsing light on / off in a fiber optic cable overtime
• Radio waves or Microwaves by varying the frequency or amplitude overtime
Guided transmission basics

• To transmit a single bit down a copper wire, we must send some electrical signal
having two discrete states to represent 0 and1
• Examples:
Voltage +5v= 1 0V = 0

Frequency 980 Hz =1 1180 Hz =0

Guided transmission media

• Guided transmission is where the signal (information or data) is sent through some
sort of cable, usually copper or optical fiber.
• There are many different types of cabling:
▪ Twisted Pair:
▪ Coaxial Cable (Coax)
▪ Fiber Optic Cable
Twisted Pair:

• This consists of two or more insulated wires twisted together in a shape similar to a
helix.
• Use metallic conductor

Page 11 of 40
• The cables are twisted around each other to reduce the amount of external
interference
• It consists of two conductors (copper), each with its colored plastic insulation.
• This cable can be used at speeds of several Mb/s for a few kilometers.
• Used for telephone line and lab network.

STP & UTP

UTP connector

Advantages of UTP

• Cost is less, Easy to use, Easy to install, Flexible


• UTP Used in Ethernet and Token ring
• STP has a metal foil or cover.
• Crosstalk (effect of one channel on the other channel) is less in STP.
• STP has the same consideration as UTP
• Shield must connect with ground.
• Disadvantage of STP : cost is high

Coaxial Cable (coax)

• This consists of a copper cable inside a layer of insulating material.


• The insulating material is then inside a braided outer conductor.
• A layer of plastic is on the outer most layer.
• This type of cable was commonly used in the telephone system but has since
been replaced by fiber optics on longer routes
• This cable has also been used for Cable TV.

Page 12 of 40
Categories of coaxial cables

RG-Radio Government., Each cable define by RG ratting.


RG-8 &RG-9 also used in Thin Ethernet.
RG number denotes a unique set of physical Specification, including the wire gauge
of the inner conductor.
Connector of coaxial cables

The most common connector is barrel connector.


The most popular type is BNC (Bayonet Network connector)
Two other types are T-connectors and terminators.
T-connectors and terminators are used in bus topology.
Advantages:-

• Easy to Install.
• In expensive installation.
• It is better for Higher Distance at Higher speed than twisted pair.
• Excellent noise immunity.
Disadvantage:-

• High Cost
• Harder to work

Fiber Optic Cable:

Components of Fiber Optics:-

o Light Source
o Transmission Medium
o Light Detector

Page 13 of 40
• This consists of a central glass core, surrounded by a glass cladding of lower
refractive index, so that the light stays in the core (using Total Internal Reflection)
• outside is covered with plastic jacket
• Many fibers may be bundled together surrounded by another plastic cover

Refraction:-

When Light travels from one medium to another medium changes occurs in its speed
and direction, this changes is called refraction.

I - Angle of Incidence.

R- Angle of Refraction.

• Critical Angle:-
At some points, the changes in the incident angle results in the refracted angle of 90
degrees, with the refracted beam lying along the Horizontal. The incident angle at this
point is known as Critical Angle.

• Reflection:-
When the angle of incidence becomes greater than the critical angle, a new phenomenon
is Occurs is called reflection.

• Light traveling of fiber optic cable


o The source of light is usually a Light Emitting Diode (LED) or a LASER. The light
source is placed at one end of the optical fiber.
o Thedetector,whichisplacedattheotherendofthefiber,isusuallyaPhotoDiode
and it generates an electrical pulse when light falls on it.
o Hence by attaching a light source on one end of an optical fiber and a detector at the
other end, we have a unidirectional data transmission system(Simplex)
o The light source would accepts an electrical signal, converts and transmits it as light
pulses
o The detector at the far end reconverts the light pulses into an electrical signal to be
then interpreted as 1 or a0.

Page 14 of 40
• Propagations Mode:-

o Fiber optic cables and network interface cards to connect a computer to the
fiber are an order of magnitude more expensive than their corresponding
copper cable equivalents
o Cost is high
o Installation and maintenance is difficult.
o Higher Bandwidth.
• Fiber cable Connector

EXERCISE:

1. Compare different types of light source which we can use in optical fiber.
2. List out different type of wired media used in computer Lab with their specification.
3. Give difference between following:
a. Twisted pair Cable and Coaxial Cable.
b. Twisted Pair Cable and Fiber Optics Cable.
c. Fiber Optic Cable and Coaxial Cable.
d. Wire Communication and Wireless Communication.

QUIZ:
Answer the Followings:

1. List out advantages of Fiber Optic over Copper Cable.


2. In which topology BNC connector is used?
3. RJ-11 connector is used for which communication device.

EVALUATION:

Problem Timely
Understanding Mock
Analysis & Completion Total (10)
Level (3) (2)
Solution (3) (2)

Signature with date:

Page 15 of 40
Experiment No: 4 Date: / /

TITLE: Implementation of CRC generator.

OBJECTIVES:
After completing study of this practical the students will be familiarized with…
➢ Understand the concept of CRC.
➢ Understand the concept of Error checking Techniques.

THEORY:
Program: Generate a CRC code from given String and Fixed code.

Steps for Generate a CRC code


5) Accept the any string and fixed code from User.
6) Check that whichever data is entering by user that contains only 1 and0.
7) If user enters n number of fixed code then append n-1 0 in the original string.
8) If 1’st bit of string is 1 then put 1 in Quotient and do Ex-Or between n bit of string
and fixed code.
9) If 1’st bit of string is 0 then put 0 in Quotient and do Ex-Or between n bit of string
and n ZERO.
10) Apply same method for remaining bits, Derive 1 by 1 bit from string.
11) Find the Reminder.
12) Append reminder with original string which called CRC and Display it.

Example:-

Page 16 of 40
Exercise
1) Write a C Program for the CRC Generator.

QUIZ:
Answer the Followings:

1. What is CRC?
2. CRC is used at which Layer?
3. Find CRC for String/Frame 1101011011 and Fixed code/Generator10011?

EVALUATION:

Problem Timely
Understanding Mock
Analysis & Completion Total (10)
Level (3) (2)
Solution (3) (2)

Signature with date:

Page 17 of 40
Experiment No: 5 Date: //

TITLE: Perform TCP/IP Configuration for PC Network


OBJECTIVES:
After completing study of this practical the students will be familiarized with…
➢ Identify tools used to discover a computer network configuration with
various operating systems.
➢ Gather information including connection, host name, Layer 2 MAC address
and Layer 3 TCP/IP network address information.
➢ Compare network information to other PCs on the network.

THEORY:
Note: Windows NT/2000/XP users complete Steps 1 to4
Step 1 Gather TCP/IP configuration information
Use the Start menu to open the Command Prompt, an MS-DOS-like window.
Press Start >Programs >Accessories >Command Prompt or Start >Programs >Command
Prompt.
The following figure shows the Command screen. Type ipconfig and press the Enter key.
The spelling of ipconfig is critical while case is not. It is short for IP Configuration.

This first screen shows the IP address, subnet mask, and default gateway. The IP address
and the default gateway should be in the same network or subnet, otherwise this host would
not be able to communicate outside the network. In the figure the subnet mask tells us that
the first three octets must be the same to be in the samenetwork.

Note: If this computer is on a LAN, the default gateway might not be seen if it is running
behind a Proxy Server.

Step 2 Record the following TCP/IP information for Your computer


IP address:
Subnet Mask:
Default Gateway:

Step 3 Compare the TCP/IP configuration of this computer to others on the LAN

Page 18 of 40
If this computer is on a LAN, compare the information of several machines.
Are there any similarities?

What is similar about the IP addresses?

What is similar about the default gateways?

The IP addresses should share the same network portion. All machines in the LAN should
share the same default gateway.
Step 4 Check additional TCP/IP configuration information

To see detailed information, type ipconfig /all and press Enter. The figure shows the
detailed IP configuration screen.

The host name, including the computer name and NetBIOS name should be displayed. Also,
the DHCP server address, if used, and the date the IP lease starts and ends should be
displayed.
Look over the information. Entries for the DNS, used in name resolution servers, may also
be present.
The previous figure reveals that the router is performing DHCP services for this network.
This would likely be a small office or home office (SOHO) or small branch office
implementation.

Page 19 of 40
Notice the Physical Address (MAC) and the NIC model (Description).

In the LAN, what similarities about the Physical (MAC) Addresses are seen?

While not a requirement, most LAN administrators try to standardize components like
NICs.
Therefore, it would not be surprising to find all machines share the first three Hex pairs in
the adapter address. These three pairs identify the manufacturer of the adapter.

Exercise:-
Based on observations, what can be deduced about the following results taken from four
computers connected to one switch?
Computer 1
IP Address: 192.168.12.113 , Subnet Mask: 255.255.255.0, Default Gateway: 192.168.12.1
Computer 2
IP Address: 192.168.12.205, Subnet Mask: 255.255.255.0, Default Gateway: 192.168.12.1
Computer 3
IP Address: 192.168.112.97 , Subnet Mask: 255.255.255.0, Default Gateway: 192.168.12.2
Computer 4
IP Address: 168.19.112.97, Subnet Mask: 255.255.0.0, Default Gateway: 192.168.12.1

Should they be able to talk to each other? Are they all on the same network? Why or why
not? If something is wrong, what is most likely the problem?

QUIZ:
Answer the Followings:
1. Where IP Address is Stored?
2. Where MAC Address is Stored?
3. IP Address and MAC Address is used at which Layer?

EVALUATION:

Problem Timely
Understanding Mock
Analysis & Completion Total (10)
Level (3) (2)
Solution (3) (2)

Signature with date:

Page 20 of 40
Experiment No: 6 Date: / /

TITLE: Implementation of VLAN

OBJECTIVES:
After completing study of this practical the students will be familiarized with…
➢ Concept of VLAN
THEORY:
VLAN:
● VLAN refers to Virtual Local Area Network
● VLAN that extends its functionalities beyond a single LAN through VLAN a network is
divided into different logical segments which known as broadcast domains.
● In technical terms, a VLAN is a broadcast domain created by switches.
● All devices, by default, are in VLAN 1.
● For devices in different VLAN’s to communicate, you must use a router or Layer 3
switch.
● The standard range consists of VLANs 1 to1024.
● The extended range consists of VLANs 1025 to4096.

Create Simple VLAN


We are creating simple VLAN. We will take Four PC & one switch. We will create two VLAN
named “VLAN8” and “VLAN9”.Then we put ports 1 & 2 into VLAN8 and ports 3 & 4 into
VLAN9.Then we will check how the communication is done between different nodes.

Step 1: configuration of VLAN in Switch


Switch>enable
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#hostname Vlan_Switch
Vlan_Switch(config)#vlan 8
VLAN8 added: Name:VLAN0008
Vlan_Switch(config)#vlan 8 name ajay
Vlan_Switch(config)#vlan 9 namejashvant

Page 21 of 40
VLAN9 added: Name:jashvant
Vlan_Switch(config)#interface fastethernet0/1
Vlan_Switch(config-if)#switchport mode access
Vlan_Switch(config-if)#switchport access vlan 8
Vlan_Switch(config-if)#exit
Vlan_Switch(config)#interface fastethernet0/2
Vlan_Switch(config-if)#switchport mode access
Vlan_Switch(config-if)#switchport access vlan 8
Vlan_Switch(config-if)#exit
Vlan_Switch(config)#interface fastethernet0/3
Vlan_Switch(config-if)#switchport mode access
Vlan_Switch(config-if)#switchport access vlan 9
Vlan_Switch(config-if)#exit
Vlan_Switch(config)#interface fastethernet0/4
Vlan_Switch(config-if)#switchport mode access
Vlan_Switch(config-if)#switchport access vlan 9
Vlan_Switch(config-if)#exit

Step 2: configuration of PC.


PC1
IP Address. ...................... : 10.1.1.1
Subnet Mask...................... : 255.0.0.0
Default Gateway ..................: 10.1.1.4
PC2

IP Address. ...................... :10.1.1.2


Subnet Mask...................... : 255.0.0.0
Default Gateway ................. : 10.1.1.4
PC3
IP Address. ...................... :10.1.1.3
Subnet Mask...................... : 255.0.0.0
Default Gateway ................. : 10.1.1.4
PC4
IP Address. ...................... :10.1.1.4
Subnet Mask...................... : 255.0.0.0
Default Gateway ................. : 10.1.1.4
Step 3: Check connectivity.

PC1:>ping 10.1.1.2
Pinging 10.1.1.2 with 32 bytes of data:

Replyfrom10.1.1.2:bytes=32 time=60msTTL=241
Replyfrom10.1.1.2:bytes=32 time=60msTTL=241

Page 22 of 40
Reply from 10.1.1.2: bytes=32 time=60ms TTL=241
Reply from 10.1.1.2: bytes=32 time=60ms TTL=241
Reply from 10.1.1.2: bytes=32 time=60ms TTL=241

Ping statistics for 10.1.1.2: Packets: Sent = 5, Received = 5, Lost = 0 (0% loss),
Approximate round trip times inmilli-seconds:
Minimum = 50ms, Maximum = 60ms, Average =55ms

PC1:>ping 10.1.1.3
Pinging 10.1.1.3 with 32 bytes of data:

Request timed out.


Request timed out.
Request timed out.
Request timed out.
Request timed out.

Ping statistics for 10.1.1.3:


Packets: Sent = 5, Received = 0, Lost = 5 (100% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms

PC1:>ping 10.1.1.4
Pinging 10.1.1.4 with 32 bytes of data:

Request timed out.


Request timed out.
Request timed out.
Request timed out.
Request timed out.
Ping statistics for 10.1.1.4:
Packets: Sent = 5, Received = 0, Lost = 5 (100% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
Here we get pinging from PC1 to PC2 only.
So Here Switch is decided into two logical segment.
Step 4: Verify Configuration.
Vlan_Switch#
Vlan_Switch#showvlan

Page 23 of 40
VLANName Status Ports
---- -------------------------------- --------- -------------------------------
1 default active Fa0/5, Fa0/6, Fa0/7, Fa0/8
Fa0/9, Fa0/10, Fa0/11,Fa0/12
8 ajay active Gi0/-11,Gi0/-10
9 jashvant active Gi0/-9, Gi0/-8
1002fddi-default active
1003token-ring-default active
1004fddinet-default active
1005trnet-default active

VLANType SAID MTU Parent RingNoBridgeNoStpBrdgMode Trans1Trans2


---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
1 enet 100001 1500 - - - - - 0 0
8 enet 100008 1500 - - - - - 0 0
9 enet 100009 1500 - - - - - 0 0
1002fddi 101002 1500- - - - - 0 0
1003tr 101003 1500- - - - - 0 0
1004fdnet 101004 1500 - - - ieee- 0 0
1005trnet101005 1500- - - ibm- 0 0

EXCERCISE:
1) Create the Two VLAN from one LAN and write the configuration steps.

QUIZ:
Answer the Followings:
1) Give different types of VLAN.
2) List out advantages of VLAN.

EVALUATION:

Problem Timely
Understanding Mock
Analysis & Completion Total (10)
Level (3) (2)
Solution (3) (2)

Signature with date:

Page 24 of 40
Experiment No: 7 Date: / /

TITLE: IP Addressing Basics

OBJECTIVES:

After completing this experiment students will be able to…

➢ Describe the characteristics and use of the different IP address classes

➢ Identify the class of an IP address based on the network number

➢ Determine which part, or octet, of an IP address is the network ID and which

part is the host ID

➢ Identify valid and invalid IP host addresses based on the rules of IP

addressing

➢ Define the range of addresses and default subnet mask for each class

THEORY:
IP addresses are used to uniquely identify individual TCP/IP networks and hosts, such

as computers and printers, on those networks in order for devices to communicate.

Workstations and servers on a TCP/IP network are called hosts and each has a unique

IP address.

This address is referred to as its host address.

TCP/IP is the most widely used protocol in the world.

The Internet or World Wide Web only uses IP addressing.

In order for a host to access the Internet, it must have an IP address.

In its basic form, the IP address has two parts:

▪ A network address

▪ A host address

IP addresses are 32 bits long according to the current version IPv4 and are divided

into 4 octets of 8 bits each.

They operate at the network layer (Layer 3) of the Open System Interconnection

(OSI) model, which is the Internet layer of the TCP/IP model.

IP addresses are assigned in the following ways:

▪ Statically – manually, by a network administrator

▪ Dynamically – automatically, by a Dynamic Host Configuration Protocol

(DHCP)server

Page 25 of 40
The IP address of a workstation or host is a logical address, meaning it can be

changed.

The Media Access Control (MAC) address of the workstation is a 48-bit physical

address.

This address is burned into the network interface card (NIC) and cannot change

unless the NIC is replaced.

The combination of the logical IP address and the physical MAC address helps route

packets to their proper destination

There are five different classes of IP addresses, and depending on the class, the

network and host part of the address will use a different number of bits.

Step 1: Review IP address classes and their characteristics

Address classes

• There are five classes of IP addresses, A through E.

• Only the first three classes are used commercially.

• The first column is the class of IP address. The second column is the first octet, which

must fall within the range shown for a given class of addresses.

• The Class A address must start with a number between 1 and126.

• The first bit of a Class A address is always a zero, meaning the High Order Bit (HOB)

or the 128 bit cannot be used. 127 is reserved for loopback testing.

Default subnet mask

• The default subnet mask uses all binary ones, decimal 255, to mask the first 8 bits of

the Class A address.

• The default subnet mask helps routers and hosts determine if the destination host is

on this network or another one.

• Because there are only 126 Class A networks, the remaining 24 bits, or 3 octets, can be

used for hosts.

• Each Class A network can have 224, or over 16 million hosts. It is common to

subdivide the network into smaller groupings called subnets

Page 26 of 40
Network and host address

• The network or host portion of the address cannot be all ones or all zeros.
• As an example, the Class A address of 118.0.0.5 is a valid IP address.
• The network portion, or first 8 bits, which are equal to 118, is not all zeros and the host

portion, or last 24 bits, is not all zeros or all ones. If the host portion were all zeros, it

would be the network address itself.

• If the host portion were all ones, it would be a broadcast for the network address. The

value of any octet can never be greater than decimal 255 or binary11111111.

Step 2: Determine basic IP addressing

Use the IP address chart and your knowledge of IP address classes to answer the following
questions:

1. What is the decimal and binary range of the first octet of all possible Class B IP addresses?

Decimal: From: To:

Binary: From: To:

2. Which octet(s) represent the network portion of a Class C IP address?

3. Which octet(s) represent the host portion of a Class A IP address?

4. What is the maximum number of useable hosts with a Class C network address?

5. How many Class B networks are there?

6. How many hosts can each Class B network have?

7. How many octets are there in an IP address?

How many bits per octet?

Page 27 of 40
Step 3: Given an IP address of 142.226.0.15 and a subnet mask of 255.255.255.0, answer the
following questions:

What is the binary equivalent of the second octet?

What is the class of the address?

What is the network address of this IP address?

Step 4: Determine which IP host addresses are valid for commercial networks

For the following IP host addresses, determine which are valid for commercial networks

Fill in the following table

Sub netting

• Subneting is a process to divide network into subnetworks.


• Host ID bit is used in NetID
• A Network with Two Levels of Hierarchy

Page 28 of 40
• A Network with Three Levels of Hierarchy

• Addresses with and without Subnetting

• Masking: Masking is a process that extracts the address of the physical network from
an IP address.

Fill the appropriate values in this table

Network Subnet Subnet Hosts per


Prefix Mask
Address Bits Possible Subnets

172.16.0.0 /16 255.255.0.0 0 1 65534

172.16.0.0 /17 255.255.128.0 1 2 32766

172.16.0.0 /18

172.16.0.0 /19

172.16.0.0 /20

172.16.0.0 /21

172.16.0.0 /22

Page 29 of 40
172.16.0.0 /23

172.16.0.0 /24

172.16.0.0 /25

172.16.0.0 /26

172.16.0.0 /27

172.16.0.0 /28

172.16.0.0 /29

172.16.0.0 /30

EXERCISE:

1. Prepare the Network diagram of SAL Engineering & Technical Institute College.

QUIZ:
Answer the Followings:

1. IP Address is used at which Layer?

2. Give difference between IP Address and MAC Address

EVALUATION:

Problem Timely
Understanding Mock
Analysis & Completion Total (10)
Level (3) (2)
Solution (3) (2)

Signature with date:

Page 30 of 40
Experiment No: 8 Date: / /

TITLE: Implementation of Dynamic Routing (Using RIP)


Routing protocols can be classified into different groups according to their characteristics.
Specifically, routing protocols can be classified by their:
● Purpose: Interior Gateway Protocol (IGP) or Exterior Gateway Protocol(EGP)
● Operation: Distance vector protocol, link-state protocol, or path-vector protocol
● Behavior: Classful (legacy) or classless protocol

RIPv1 RIPv2
Interior/ Exterior Interior Interior
Type Distance vector Distance vector
Speed of Convergence Slow Slow
Scalability – Size of Network Small Small
Use of VLSM No Yes
Resource Usage Low Low
Implementation and Maintenance Simple Simple
Classful/
Classful Classless
Classless
Metric Hop Hop
Time Period 30 sec 30 sec
Administrative Distance(AD) 120 120
Algorithm Bellman-Ford Bellman-Ford
Updates Full Table Full Table

● RIP is a standardized vector distance routing protocol and uses a form of distance as hop
count metric. It is a distance vector. Through limiting the number of hop counts allowed
in paths between sources and destinations, RIP prevents routing loops. Typically, the
maximum number of hops allowed for RIP is 15. However, by achieving this routing loop
prevention, the size of supporting networks is sacrificed. Since the maximum number of
hop counts allowed for RIP is 15, as long as the number goes beyond 15, the route will be
considered as unreachable.
● When first developed, RIP only transmitted full updates every 30 seconds. In the early
distributions, traffic was not important because the routing tables were small enough. As
networks become larger, massive traffic burst becomes more likely during the 30 seconds
period, even if the routers had been initialized at different times. Because of this random
initialization, it is commonly understood that the routing updates would spread out in
time, but that is not the case in real practice.

Page 31 of 40
RIP Configuration

Router configuration:
Router-1 Configuration
Router>
Router>enable
Router#configure terminal
Router(config)#hostname Router1
Router1(config)#interface fastethernet 0/0
Router1(config-if)#ip address 10.1.1.100 255.0.0.0
Router1(config-if)#noshutdown
Router1(config-if)#exit
Router1(config)#interface fastethernet 1/0
Router1(config-if)#ip address 20.1.1.100 255.0.0.0
Router1(config-if)#noshutdown
Router1(config-if)#exit
Router1(config)#router rip
Router1(config-router)#network10.0.0.0
Router1(config-router)#network20.0.0.0
Router-2 Configuration
Router>
Router>enable
Router#configure terminal
Router(config)#hostname Router2
Router2(config)#interface fastethernet 0/0
Router2(config-if)#ip address 20.1.1.200 255.0.0.0
Router2(config-if)#noshutdown
Router2(config-if)#exit
Router2(config)#interface fastethernet 1/0
Router2(config-if)#ip address 30.1.1.100 255.0.0.0
Router2(config-if)#noshutdown
Router2(config-if)#exit
Router2(config)#router rip
Router2(config-router)#network 20.0.0.0

Page 32 of 40
Router2(config-router)#network 30.0.0.0
Router-3 Configuration
Router>
Router>enable
Router#configure terminal
Router(config)#hostname Router3
Router3(config)#interface fastethernet 0/0
Router3(config-if)#ip address 30.1.1.200 255.0.0.0
Router3(config-if)#noshutdown
Router3(config-if)#exit
Router3(config)#interface fastethernet 1/0
Router3(config-if)#ip address 40.1.1.100 255.0.0.0
Router3(config-if)#noshutdown
Router3(config-if)#exit
Router3(config)#router rip
Router3(config-router)#network30.0.0.0
Router3(config-router)#network40.0.0.0

EXCERCISE:
1) Connect two different networks using three routers and configure using RIP
protocols. (Write the steps for each Routing Configuration.)

EVALUATION:

Problem Timely
Understanding Mock
Analysis & Completion Total (10)
Level (3) (2)
Solution (3) (2)

Signature with date:

Page 33 of 40
Experiment No: 9 Date: / /
TITLE: Introduction to Networking and Internetworking Devices
OBJECTIVES:
After completing this experiment students will be able to…
➢ Understand Networking and Internetworking Devices
THEORY:
Introduction

Different category of connecting devices

Repeater

• Repeater is also known as a Regenerator.


• It’s an electronic device.
• Used at Physical layer of OSI model.
• Used for carry information at longer distance.
• Not work as an amplifier, it’s not amplifying the signal.
• It regenerates the original bit patterns from weak signal patterns.
• So, Repeater is a regenerator not an amplifier.
• It’s not an intelligent device.

Bridge

• Bridge operates at both the physical layer and data link layer.
• Bridge divides a larger network onto smaller segments.
• Maintain traffic for each segment.
• Maintain physical address of each node of each segment.
• Store address into look-up table.

Page 34 of 40
• Types of bridge
1. Simple Bridge
o Used to connect two segments
o Least expensive
o Address of each node entered manually
o Installation and maintenance is high & time consuming

2. Multiport Bridge
o Used to connect more than two LAN
o Maintain physical address of each station
o If three segment is connected then it maintain three tables
o Address of each node entered manually
o Installation and maintenance is high & time consuming

3. Transparent Bridge
o It’s also known as a learning Bridge
o Maintain physical address of each station
o Manually entry of each node is not required
o Maintain address by its own
o At initial level table is empty
o After each process its storing details of each node
o Its self updating

Router

• It is used at network layer of OSI model


• Maintain logical address of each node

Page 35 of 40
• It’s an intelligent device
• It has its own software
• Determines the best path among available different path
• Used to connect two different networks
• Manually handling is not required
• We can configure the router according to our requirement
• Maintain address by its own
• At initial level table is empty
• After each process its storing details of each node
• Its self updating
• Routing is classified as a Non adaptive and Adaptive routing
1. Non-adaptive Routing
o Path to the destination is selected first
o Router sends each packet through the same path
o All the packets follow the same path
o Routing decision is not taken based on the condition or topology of the
network
2. Adaptive Routing
o Router may select a different path for each packet
o Routing decision is taken based on the condition or topology of the network
o Find the best path among available path

Gateway

• Operates In all seven layer of OSI model


• Gateway is a protocol converter
• Both network is working on different protocol then accept a packet from one
network and transmit packet to the different network.
• It convert’s packet into suitable form
• A gateway is software installed within a router.
• A gateway adjusts the data rate size and format of each packet.

Switch

• Two type of switch: Layer two and Layer three switch

Page 36 of 40
• Layer two switch is operates at second layer and layer three switch is operates at
third layer
• We can configure layer three switch
• Switch(l2) maintain physical address of each node
• L3 switch handle logical address
• Not manually handling is required for tables
• For the first time broadcast the message if destination address is not available inthe
table.
• Two different strategies of switch
o Store and forward Switch: store the frame in the input buffer until the whole
packet has arrived.
o Cut through Switch: Not wait for other frames; just transmit it towards the
destination
Hub
• Used at physical layer
• Dump device
• Not maintaining any type of node details
• Each time broadcast the packets
• Cheaper
• Used to connect two or more number of computers

EXERCISE:

1) Prepare the difference between Hub, Switch, Router.(Min 10)

QUIZ:
Answer the Followings:

1) What is Brouter?
2) What is Multiprotocol Router?
3) Give difference between Store and forward Switch and Cut through Switch

EVALUATION:

Problem Timely
Understanding Mock
Analysis & Completion Total (10)
Level (3) (2)
Solution (3) (2)

Signature with date:

Page 37 of 40
Experiment No: 10 Date: / /

TITLE: Implementation of DHCP in network

The Dynamic Host Configuration Protocol (DHCP) is a network protocol that is used to
configure network devices. DHCP allows a computer to join an IP-based network without
having a pre-configured IP address. DHCP is a protocol that assigns unique IP addresses to
devices, then releases and renews these addresses as devices leave and re-join the network.
Internet Service Providers (ISPs) usually use DHCP to allow customers to join the Internet
with minimum effort. The DHCP server maintains a database of available IP addresses and
configuration information. When it receives a request from a client, the DHCP server
determines the network to which the DHCP client is connected, and then allocates an IP
address. DHCP servers typically grant IP addresses to clients only for a limited interval.
Lets apply DHCP on packet tracer.
First, let us make a topology with one router on which we will apply DHCP and several client
PCs. More like this one,

Now, we will apply DHCP on the router.


The commands in sequence are as follows.

In the following command “ipdhcp pool cisco”, we are creating a pool for DHCP called
cisco. cisco is the name here and we can name it whatever we want.
Similarly, in the command “default-router “ we are telling the DHCP about the default route
to follow.

Page 38 of 40
Notice, after we exit from DHCP mode, we are excluding some IP addresses by applying this
command “ipdhcp excluded-addresses x-x”, where x is the starting and ending IP address
respectively. We are basically reserving some IPs for our use. It can be used to attach printers,
or assign it to some specific users for security purposes. You can also give dns address in
dhcp by using the following command. dns-server192.168.1.15.
Now, open the PC.

Click on IP Configuration

Select from Static to DHCP

And after DHCP request is completed you will see the following screen.

Now, after applying some IPs in sequence, DHCP will skip the IPs that we have excluded
from our DHCP pool.

Page 39 of 40
That is all, we have applied DHCP on packet tracer.

EXCERCISE:
1) Create wireless home network which only allow 6 wireless nodes in network.
(Write Steps)
2) Explain DHCP IP allocation.

EVALUATION:

Problem Timely
Understanding Mock
Analysis & Completion Total (10)
Level (3) (2)
Solution (3) (2)

Signature with date:

Page 40 of 40

You might also like