[go: up one dir, main page]

0% found this document useful (0 votes)
25 views64 pages

CN LAB Manual

Uploaded by

Smit Patel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views64 pages

CN LAB Manual

Uploaded by

Smit Patel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 64

A Laboratory Manual for

Computer Networks
(3150710)

B.E. Semester 5
(Information Technology)

Directorate of Technical Education, Gandhinagar,


Gujarat
L.D.College of Engineering, Ahmedabad
Certificate
This is to certify that Mr./Ms. ___________________________________
________ Enrollment No. _______________ of B.E. Semester _____
Information Technology of this Institute (GTU Code: 28 ) has satisfactorily
completed the Practical / Tutorial work for the subject Computer Networks
(3150710) for the academic year 2022-23.

Place: __________
Date: __________

Name and Sign of Faculty member

Head of the Department


Preface

Main motto of any laboratory/practical/field work is for enhancing required skills as well as
creating ability amongst students to solve real time problem by developing relevant
competencies in psychomotor domain. By keeping in view, GTU has designed competency
focused outcome-based curriculum for engineering degree programs where sufficient weightage
is given to practical work. It shows importance of enhancement of skills amongst the students
and it pays attention to utilize every second of time allotted for practical amongst students,
instructors and faculty members to achieve relevant outcomes by performing the experiments
rather than having merely study type experiments. It is must for effective implementation of
competency focused outcome-based curriculum that every practical is keenly designed to serve
as a tool to develop and enhance relevant competency required by the various industry among
every student. These psychomotor skills are very difficult to develop through traditional chalk
and board content delivery method in the classroom. Accordingly, this lab manual is designed
to focus on the industry defined relevant outcomes, rather than old practice of conducting
practical to prove concept and theory.

By using this lab manual students can go through the relevant theory and procedure in advance
before the actual performance which creates an interest and students can have basic idea prior to
performance. This in turn enhances pre-determined outcomes amongst students. Each
experiment in this manual begins with competency, industry relevant skills, course outcomes as
well as practical outcomes (objectives). The students will also achieve safety and necessary
precautions to be taken while performing practical.

This manual also provides guidelines to faculty members to facilitate student centric lab
activities through each experiment by arranging and managing necessary resources in order that
the students follow the procedures with required safety and necessary precautions to achieve the
outcomes. It also gives an idea that how students will be assessed by providing rubrics.

Utmost care has been taken while preparing this lab manual however always there is chances of
improvement. Therefore, we welcome constructive suggestions for improvement and removal
of errors if any.
Practical – Course Outcome matrix

Course Outcomes (COs):

CO-1 Familiarize with the basic taxonomy - terminologies used in networking and the layered
architecture of computer networks
CO-2 Explain work of layers of OSI and TCP/IP model according to how they can be used to
assist in network design and implementation.
CO-3 Examine work of protocols of TCP/IP protocol suite.
CO-4 Design network architecture, assign IP addressing and apply various networking algorithms
CO-5 Implement different types of network using different tools and simulators
Sr. Platform to
Objective(s) of Experiment CO1 CO2 CO3 CO4 CO5
No. be used
Study of different network devices in Network
1. detail √
Devices
Cables,
Study of different types of network
cables and practically implement the Clamping
2. √ √
cross-wired cable and straight through tool,
cable using clamping tool. Connectors
Perform basic network command and
3. Network configuration commands Computer √

Implement different LAN topologies Cisco Packet


4. √
using Network Simulator tracer

Implement the concept of VLAN using Cisco Packet


5. √
Network Simulator. tracer
Cisco Packet
6. Implement the concept of static routing. √
tracer

Implement the concept of dynamic Cisco Packet


7. √
routing (RIP, OSPF, BGP). tracer
Packet capture and header analysis by Wireshark
8. √
wire-shark (TCP,UDP,IP)

9 Visit to Server room of Institute √ √


Industry Relevant Skills

The following industry relevant competencies are expected to be developed in the student by
undertaking the practical work of this laboratory.
1. Identify, connect various network devices.
2. Prepare LAN cable
3. Configuration network and understand protocols behaviors on simulator.

Guidelines for Faculty members


1. Teacher should provide the guideline with demonstration of practical to the students
with all features.
2. Teacher shall explain basic concepts/theory related to the experiment to the students
before starting of each practical
3. Involve all the students in performance of each experiment.
4. Teacher is expected to share the skills and competencies to be developed in the
students and ensure that the respective skills and competencies are developed in the
students after the completion of the experimentation.
5. Teachers should give opportunity to students for hands-on experience after the
demonstration.
6. Teacher may provide additional knowledge and skills to the students even though not
covered in the manual but are expected from the students by concerned industry.
7. Give practical assignment and assess the performance of students based on task
assigned to check whether it is as per the instructions or not.
8. Teacher is expected to refer complete curriculum of the course and follow the
guidelines for implementation.

Instructions for Students


1. Students are expected to carefully listen to all the theory classes delivered by the faculty
members and understand the COs, content of the course, teaching and examination
scheme, skill set to be developed etc.
2. Students shall organize the work in the group and make record of all observations.
3. Students shall develop maintenance skill as expected by industries.
4. Student shall attempt to develop related hand-on skills and build confidence.
5. Student shall develop the habits of evolving more ideas, innovations, skills etc. apart from
those included in scope of manual.
6. Student shall refer technical magazines and data books.
7. Student should develop a habit of submitting the experimentation work as per the schedule
and s/he should be well prepared for the same.
Index
(Progressive Assessment Sheet)

Sr. Objective(s) of Experiment Page Date of Date of Assessme Sign. of Remar


No. No. perform submiss nt Teacher ks
ance ion Marks with date

Total
Experiment No: 0

1. Vision & Mission

1.1.1 Vision of DTE

 To provide globally competitive technical education;


 Remove geographical imbalances and inconsistencies;
 Develop student friendly resources with a special focus on girls’ education and support
to weaker sections;
 Develop programs relevant to industry and create a vibrant pool of technical
professionals.

1.2.1 Vision of L. D. College of Engineering

 To contribute for sustainable development of nation through achieving excellence in


technical education and research while facilitating transformation of students into
responsible citizens and competent professionals.

1.2.2 Mission of L. D. College of Engineering

 To impart affordable and quality education in order to meet the needs of industries and
achieve excellence in teaching-learning process.
 To create a conducive research ambience that drives innovation and nurtures research-
oriented scholars and outstanding professionals.
 To collaborate with other academic & research institutes as well as industries in order
to strengthen education and multidisciplinary research.
 To promote equitable and harmonious growth of students, academicians, staff, society
and industries, thereby becoming a center of excellence in technical education.
 To practice and encourage high standards of professional ethics, transparency and
accountability.

1.3.1 Vision of Information Technology Department, L.D.College of Engineering

 To shape the young minds of aspiring Information Technology engineers to become


the front runner in the sustainable technological growth of our country, conserving its
rich cultural heritage and catering to its socioeconomic needs.

1.3.2 Mission of Information Technology Department, L.D.College of Engineering

 Bringing innovative approach in teaching-learning process to produce competent


Information Technology engineers.
 Provide opportunities and necessary exposure to the young engineers to develop
themselves into responsible professionals.
 Infusing lifelong learning ability in the aspiring minds with the view of making them
sensible towards their social responsibilities.
2. Program outcomes as prescribed by NBA

Engineering Graduates will be able to:

1. Engineering knowledge: Apply the knowledge of mathematics, science, engineering


fundamentals, and an engineering specialization to the solution of complex engineering
problems.

2. Problem analysis: Identify, formulate, review research literature, and analyze complex
engineering problems reaching substantiated conclusions using first principles of
mathematics, natural sciences, and engineering sciences.

3. Design/development of solutions: Design solutions for complex engineering problems


and design system components or processes that meet the specified needs with appropriate
consideration for the public health and safety, and the cultural, societal, and environmental
considerations.

4. Conduct investigations of complex problems: Use research-based knowledge and


research methods including design of experiments, analysis and interpretation of data, and
synthesis of the information to provide valid conclusions.

5. Modern tool usage: Create, select, and apply appropriate techniques, resources, and
modern engineering and IT tools including prediction and modeling to complex
engineering activities with an understanding of the limitations.

6. The engineer and society: Apply reasoning informed by the contextual knowledge to
assess societal, health, safety, legal and cultural issues and the consequent responsibilities
relevant to the professional engineering practice.

7. Environment and sustainability: Understand the impact of the professional engineering


solutions in societal and environmental contexts, and demonstrate the knowledge of, and
need for sustainable development.

8. Ethics: Apply ethical principles and commit to professional ethics and responsibilities
and norms of the engineering practice.

9. Individual and team work: Function effectively as an individual, and as a member or


leader in diverse teams, and in multidisciplinary settings.

10. Communication: Communicate effectively on complex engineering activities with the


engineering community and with society at large, such as, being able to comprehend and
write effective reports and design documentation, make effective presentations, and give
and receive clear instructions.

11. Project management and finance: Demonstrate knowledge and understanding of the
engineering and management principles and apply these to one’s own work, as a member
and leader in a team, to manage projects and in multidisciplinary environments.

12. Life-long learning: Recognize the need for, and have the preparation and ability to
engage in independent and life-long learning in the broadest context of technological
change.
3. PSOs of the Information Technology Department, L. D. College of Engineering

The Information technology engineers of L D College of engineering College will be able to


1. Apply the detailed knowledge of code optimization to complex application problems.
2. Write programs with strong skill set with standard coding practices.
3. Assess risk and vulnerability through standard security practices.

4. PEOs of the Information Technology Department, L. D. College of Engineering

1. Pursue a professional career in the field of Information Technology Engineering and excel in it.
2. Enhance their knowledge by continuing higher education and research.
3. Work as torch bearer in a multidisciplinary environment to bring innovation and to improvise the
existing technology as entrepreneurs.
4. Keep pace with cutting edge scenario of the field with the view of contributing to the social and
environmental needs in efficient ways.

5. Course outcomes of Computer Networks course

CO-1: Familiarize with the basic taxonomy - terminologies used in networking and the layered
architecture of computer networks
CO-2: Explain work of layers of OSI and TCP/IP model according to how they can be used to
assist in network design and implementation.
CO-3: Examine work of protocols of TCP/IP protocol suite.
CO-4: Design network architecture, assign IP addressing and apply various networking algorithms
CO-5: Implement different types of network using different tools and simulators
Experiment No: 1
AIM : Study of different Network devices

Date:

Competency and Practical Skills: Identify, connect various network devices.

Relevant CO: CO1: Familiarize with the basic taxonomy - terminologies used in networking
and the layered architecture of computer networks

Objectives: (a) To observe various network devices


(b) Find out usage of each in different case with advantage and disadvantage
(c) Connect devices to establish network of two or more devices

Equipment/Instruments: Desktop/laptop, Hub, Switch, Router, Bridge, Gateway, Modem,


Repeater, NIC

Theory:
Ref: http://swayam.gov.in/
Computer Networking- A Top-Down approach (6th edition), Kurose and Ross, Pearson

Observations: (Give detailed answer of each question with required figure)

1. Hub:
1. What is hub?
2. Features of Hub:
3. Applications of Hub:
4. Types of Hub:
2. Router
1. What is Router?
2. Features of Router:
3. Applications of Router:
4. Types of Router:

3. Bridge
1. What is Bridge?
2. Features of Bridge:
3. Applications of Bridge:
4. Types of Bridge:

4. Gateway
1. What is Gateway?
2. Features of Gateway:
3. Applications of Gateway:
4. Types of Gateway:
5. Modem
1. What is Modem?
2. Features of Modem:
3. Applications of Modem:
4. Types of Modem:

6. Repeater

7. NIC

Quiz:
1. Find out the cases where above devices are used?
2. Differentiate each device?
3. Give approximate cost of each device with name of 2 manufactures.

References used by the students:

Rubric wise marks obtained:

3 2 1
Ability to identify and Clear( Good) Average/partial Poor/not at all
connect networking
device
Organization Can easily tell from Can tell with Cannot tell from
which sources difficulty from where which source
information was information came information came
drawn
Bibliography All relevant Bibliography contains Bibliography
bibliographic most relevant contains very little
information is information information
included
Experiment No: 2
AIM: Study of different types of network cables and practically implements the cross-
wired cable and straight through cable using clamping tool
Date:

Competency and Practical Skills: Identify different types of network cables and
Prepare own LAN Cable

Relevant CO: CO1: Familiarize with the basic taxonomy - terminologies used in networking
and the layered architecture of computer networks

Objectives: (a) To see and check various network Cables


(b) Find out usage of each in different case with advantage and disadvantage
(c) Prepare own cross-wired cable and straight through cable using clamping
tool

Equipment/Instruments: RJ-45 connector, Clamping Tool, Twisted pair Cable

Theory

Study four different types of cables:

1. Coaxial Cable
 A coaxial cable is an electrical cable with a copper conductor and an insulator
shielding around it and a braided metal mesh that prevents signal interference and
cross talk.
 Coaxial cable is also known as coax.
 The term coaxial refers to the inner conductor and the outer shield sharing a
geometric axis.

Fig. 1. Coaxial Cable


Structure of coaxial cable:

Copper conductor: A central conductor, which consists of copper. The conductor is the
point at which data transmits.

Insulator: Dielectric plastic insulation around the copper conductor. It is used to maintain
the spacing between the center conductor and shield.

Braided mesh: A braided mesh of copper helps to shield from electromagnetic interference,
the braid provides a barrier against EMI moving into and out of the coaxial cable

Protective plastic layer: An external polymer layer, which has a plastic coating. It is used
to protect internal layers from damages.

Types of coaxial cables:

 Hard line coaxial cable.


 Flexible coaxial cable.
 Semi-rigid coaxial cable.
 Formable coaxial cable.
 Rigid coaxial cable.
 Twin axial cable.
 Triaxial cable.

Advantages:
1. Coaxial cables have better cut-through resistance so they are more reliable and
durable.
2. Less affected by noise or cross-talk or electromagnetic inference.
3. Coaxial cables support multiple channels

Disadvantages:
1. Coaxial cables are expensive.
2. The coaxial cable must be grounded in order to prevent any crosstalk.
3. As a Coaxial cable has multiple layers it is very bulky.

2. Twisted Pair Cable

 Shielded Twisted Pair (STP) Cable


 Unshielded Twisted Pair (UTP) Cable

3. Fibre Optical Cable

4. Patch Cable
(Sufficient space to be provided)
(Give Details, Give Figure, Discuss Advantages, Discuss Disadvantages, and Discuss
Applications of each)

Ref: http://swayam.gov.in/
Computer Networking- A Top-Down approach (6th edition), Kurose and Ross, Pearson

Procedure to prepare cross-wired cable and straight through cable using


clamping tool

1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable.
Be very careful at this point, as to not nick or cut into the wires, which are inside.
Doing so could alter the characteristics of your cable, or even worse render is
useless. Check the wires, one more time for nicks or cuts. If there are any, just
whack the whole end off, and start over.

2. Spread the wires apart, but be sure to hold onto the base of the jacket with your
other hand. You do not want the wires to become untwisted down inside the jacket.
Category 5 cable must only have 1/2 of an inch of 'untwisted' wire at the end;
otherwise it will be 'out of spec'. At this point, you obviously have ALOT more
than 1/2 of an inch of un-twisted wire.

3. You have 2 end jacks, which must be installed on your cable. If you are using a
pre-made cable, with one of the ends whacked off, you only have one end to install
- the crossed over end. Below are two diagrams, which show how you need to
arrange the cables for each type of cable end. Decide at this point which end you
are making and examine the associated picture below.

Following diagram shows you how to prepare Cross wired connection

Fig. 2. Cross Wired Connections.


Following diagram shows you how to prepare straight through wired connection

Fig. 3. Straight Through Wired Connections.

Quiz:
1. Find out the cases where above cables are used?
2. Differentiate each device.
3. Give approximate cost of each cable with name of 2 manufactures.

References used by the students: (Sufficient space to be provided)

Rubric wise marks obtained:

3 2 1
Ability to identify and Clear( Good) Average/partial Poor/not at all
connect networking
cables
Organization Can easily tell from Can tell with Cannot tell from
which sources difficulty from where which source
information was information came information came
drawn
Bibliography All relevant Bibliography contains Bibliography
bibliographic most relevant contains very little
information is information information
included
cross-wired cable and Cable working Cable working Cable not working
straight through cable properly with all properly with all properly
using clamping tool connections looks connections looks
proper poorly connected
Experiment No: 3

AIM: Study of basic network command and Network configuration commands

Date:

Competency and Practical Skills: Exploration of network commands to


troubleshoot networking errors.

Relevant CO: CO1: Familiarize with the basic taxonomy - terminologies used in networking
and the layered architecture of computer networks

Objectives: (a) To understand the usage of various network commands


(b) Perform commands with various options on given OS.
(c) Prepare the report with screenshots/Output and analyze the usage of each
command.

Equipment/Instruments: Desktop/laptop

Theory:

The operating system consists of various built-in, command-line networking utilities that are
used for network troubleshooting. There are many various commands such as:
 Ping
 Ipconfig
 Tracert
 Hostname
 Pathping
 Route
 Nslookup
 Netstat
 ARP
 Getmac

1.) Ping:

 The ping command is also known as Packet Internet Groper.


 The ping command is used to ensure that a computer can communicate to a specified
device over the network.
 The pings command sends Internet Control Message Protocol (ICMP) Echo
Request messages in the form of packets to the destination computer and waits in
order to get the response back. Once the packets are received by the destined
computer, it starts sending the packets back.
 This command keeps executing until it si interrupted.
 ping command provides details such as
 number of packets transmitted
 number of packets received
 time taken by the packet to return

 ping command in generally used for the following purposes:


 measuring the time taken by the packets to return to determine the speed of
the connection
 to make sure that the network connection between the host and the destined
computer can be established

 The ping command uses various options such as :


 target - This is the destination IP address or a hostname user want to ping.
 -a - This option resolves the hostname of an IP address target.
 -t - This ping command option will ping the target until you stop it by pressing
Ctrl-C.
 -n count - This option is used to set the number of ICMP Echo Requests to
send, from 1 to 4294967295. If -n is not specified, the ping command will
return 4 by default.

Fig. 1. Use of PING command to check connection

Fig. 2. Use of PING command with “–a” option


Getting Help

In any command mode, you can get a list of available commands by entering a
question mark (?).
Router>?

To obtain a list of commands that begin with a particular character sequence, type in
those characters followed immediately by the question mark (?).
Router#co?
Configure connect copy

To list keywords or arguments, enter a question mark in place of a keyword or


argument. Include a space before the question mark.
Router#configure ?
memory Configure from NV memory
network Configure from a TFTP network
host terminal Configure from the terminal

You can also abbreviate commands and keywords by entering just enough
characters to make the command unique from other commands. For example, you
can abbreviate the show command to sh.

Configuration Files

Any time you make changes to the router configuration, you must save the
changes to memory because if you do not they will be lost if there is a system
reload or power outage. There are two types of configuration files: the running
(current operating) configuration and the startup configuration.
Use the following privileged mode commands to work with configuration files.

• configure terminal – modify the running configuration manually from the


terminal.

• show running-config – display the running configuration.

• show startup-config – display the startup configuration.

• copy running-config startup-config – copy the running configuration


to the startup configuration.

• copy startup-config running-config – copy the startup configuration to


the running configuration.

• erase startup-config – erase the startup-configuration in NVRAM.


• copy tftp running-config – load a configuration file stored on a Trivial File
Transfer Protocol (TFTP) server into the running configuration.

• copy running-config tftp – store the running configuration on a TFTP


server.

IP Address Configuration

Take the following steps to configure the IP address of an interface.

Step 1: Enter privileged EXEC mode:


Router>enable password

Step 2: Enter the configure terminal command to enter global configuration mode.
Router#config terminal

Step 3: Enter the interface type slot/port (for Cisco 7000 series) or interface type
port (for Cisco 2500 series) to enter the interface configuration mode.
Example:
Router (config)#interface ethernet 0/1

Step 4: Enter the IP address and subnet mask of the interface using the ip address
ipaddress subnetmask command.
Example,
Router (config-if)#ip address 192.168.10.1 255.255.255.0

Step 5: Exit the configuration mode by pressing Ctrl-Z


Router(config-if)#[Ctrl-Z]

(Give details of each command as above)

Observations:

Quiz: (Sufficient space to be provided for the answers)

1.Give the sequence of troubleshoots commands you will perform with proper
justification if your network is not working.

Suggested Reference: https://www.cisco.com/c/en/us/td/docs/routers/nfvis/switch_command/b-


nfvis-switch-command-reference.html

References used by the students: (Sufficient space to be provided)


Rubric wise marks obtained:

3 2 1
Ability to understand Clear( Good) Average/partial Poor/not at all
the output of each
command
Organization Can easily tell from Can tell with Cannot tell from
which sources difficulty from where which source
information was information came information came
drawn
Bibliography All relevant Bibliography contains Bibliography
bibliographic most relevant contains very little
information is information information
included
Experiment No: 4

AIM: Implement different LAN topologies using Network Simulator

Date:

Competency and Practical Skills: Exploration of network layout to connect devices


with each other to establish network

Relevant CO: CO-5 Implement different types of network using different tools and
simulators

Objectives: (a) Download network simulator – preferably cisco packet tracer


(b) Implement topologies by configuring interconnecting devices and
computing devices.
(c) Analyze the performance of connecting devices in different ways

Equipment/Instruments: Desktop/laptop, Network simulator

Theory:

What is Network Topology?


The arrangement of a network that comprises nodes and connecting lines via sender and
receiver is referred to as network topology.
There are various types of topologies and they are:
 Bus Topology
 Star Topology
 Ring Topology
 Mesh Topology
 Hybrid Topology

1. Bus Topology:
(Give details of each topology with advantages, disadvantages and applications.)

Bus topology using Packet Tracer:

 Take 4 switches, connect them through single cable.


 Each of the switches will be connected with an end device whose IP addresses are
given.
 To configure the IP addresses of the devices “Click on the device for which you want
to configure the IP address-> Click Desktop -> IP configuration -> Provide IP of your
choice -> Press Tab for automatically having Subnet Mask which is: 255.0.0.0 for all
the devices available in the topology.
 Provide IP addresses to all the End devices only and then you can send the data among
these devices.
Fig. 1. Bus Topology.

Fig. 2. Static IP Configuration


 Check the network by sending messages/packets from one device to another and check
the status of the message as “Successful”. If the messages are not sent due to some
reasons it will show “Failed” as the status of the message.

Fig. 3. Bus topology configuration in simulator

Fig. 4. Bus topology simulation


2. Star Topology:

 A star topology is a topology for a Local Area Network (LAN) in which all nodes
are individually connected to a ccentral
entral connection point, sort of a hub or a switch.

Star Topology Using Packet Tracer:

 Have
ave a single switch which will be the central node.
 All
ll the end devices are connected with the central switch so if any of the cable fail
occurs it does not affect th
the whole system.
 Configure
onfigure the IP address of all the connected devices.
 Send messages to other devices connected to the same Switch.
 As we can see in the below image we can send the messages from one device to
another and we can also see the status of the m message
essage as “Successful” here. If the
messages are not sent due to some reasons it will show “Failed” as the status of the
message.

Fig. 5. Star Topology.

Fig. 6. Star Topology in simulator.


3. Ring Topology:

 In this topology, it forms a ring connect


connecting
ing devices with exactly two neighboring
devices.
 It is a network configuration where device connections create a circular data path. In
this each device is connected to with its exactly two neighboring devices, like points
on a circle which forms like a rring structure.
 The most common access method of ring topology is token passing.

Fig. 7. Ring Topology.

Ring Topology using Packet Tracer:

 Take 4 switches and connec


connect them with each other.
 Each of the hubs is connected with an end device whose IP ad addresses
dresses can be
configured
 After configuring the IP addresses send messages to other devices connected in the
Network.
 As we can see in the below image we can send the messages from one device to
another and also see the status of the message as “Successful”
“Successful” here. If the messages
are not sent due to some reasons it will show “Failed” as the status of the message.

Fig. 8. Ring Topology in simulator.


4. Mesh Topology:

 In a mesh topology, every device is connected to another device via a particular


channel.
 There are two types of Mesh topologies:
1. Fully-connected
connected Mesh Topology
2. Partially-connected
connected Mesh Topology

Fig. 9. Mesh Topology

Mesh Topology using Packet Tracer:

 4 network switches which are connected to each other through network cables.
 Each of the switch is connected all the other switches as well as an end device.
 Configure
onfigure the end devices and then can send the message to any other device
connected to particular network.
 As we can see in the below image we can send the messages from one device dev to
another and we can also see the status of the message as “Successful” here. If the
messages are not sent due to some reasons it will show “Failed” as the status of the
message.

Fig. 10. Mesh Topology in simulator.


5. Hybrid Topology:

 A networkrk structure whose design contains more than one topology is said to be
hybrid topology. Hybrid topology inherits merits and demerits of all the incorporating
topologies.

Hybrid Topology Using Packet Tracer:

 Have
ave 4 network switches which are connected to each other through network cables
forming ring.
 Then have central switch which is connected to one of the switches used in forming
ring and also to other devices forming star, thus forming hybrid topology.
 Each of the switch is connected all the other switches
switches as well as an end device.
 We can configure the end devices as seen before and then can send the message to any
other device connected to particular network.

Fig. 11. Hybrid Topology.

Fig. 12. Hybrid Topology in simulator (Packet Sent).


Sent)
Fig.
ig. 13. Hybrid Topology in simulator (Packet lost).
lost)

 As we can see in the below image we can send the messages from one device to
another and we can also see the status of the message as “Successful” here. If the
messages are not sent due to some reasons it will show “Failed” as the status of the
message.

Fig. 14. Status of the sent message in simulator.

Observations:

(1) Which topology or topologies are implemented at your institute?


(2) If there is a small setup of your office having 10 Computers connected, which
topology you will prefer? Why?
(3) Interpret and analyze the output of each topology
Quiz: (Sufficient space to be provided for the answers)

1. Give Advantages, disadvantages of each topology


2. Find out application case of each topology
3. Which topology you will implement in your campus and why?

Suggested Reference:

1.https://www.netacad.com/courses/packet-tracer
2.Computer Networks- A Top-Down approach, Behrouz Forouzan, McGraw Hill

References used by the students: (Sufficient space to be provided)

Rubric wise marks obtained:

Program (Excellent)(4) (Good)(3) (Fair)(2) (Beginning)(1)


Installation of Tool installed Tool executes Tool executes with Tool does not
tool Properly with a minor multiple minor execute (0-1)
error (easily fixed error)
Topology Tool displays Output has minor Output has Output is
Implementation correct output with errors multiple errors incorrect (0-1)
no errors
Analysis/Interpr Analysis and Analysis and Multiple Analysis and
etation of understanding are understanding misunderstanding understanding
output as per requirement are not as per are not proper
requirement
Documentation Practical is well Missing required Missing two or Most or all
documented comment more required documentation
comments missing (0-1)
Experiment No: 5

AIM: Implement the concept of VLAN using Network Simulator.

Date:

Competency and Practical Skills: Exploration of network layout and configuration to


connect devices with each other to establish VLAN

Relevant CO: CO-5: Implement different types of network using different tools and simulators

Objectives: (a) Download network simulator – preferably cisco packet tracer


(b) Implement VLAN by configuring interconnecting and computing devices.
(c) Analyze the performance of Network

Equipment/Instruments: Desktop/laptop, Network simulator

Theory:

What is VLAN?
Virtual Local Area Networks or Virtual LANs (VLANs) are a logical group of computers that
appear to be on the same LAN irrespective of the configuration of the underlying physical
network.
Features of VLANs:

VLAN ranges:

Steps to Implement a Virtual Local Area Network (VLAN):


1) Take a switch and 4 end devices (PCs), and connect the switch with end devices using
Copper Straight-Through cable. While connecting the cables it is needed to select the
port through which you want to connect the switch to the end devices.

Fig. 1. Configuring VLAN in simulator.


 As in the above images to connect switch to PC0 choose ‘FastEthernet0/1’ port
in the switch and then in PC0 is selected ‘FastEthernet0’ port. Similarly, connect
the entire PC with the switch.

2) Now, to configure two VLANs in which take 2 PC for each VLAN. Separate 2 PCs for
each VLAN which are numbered as VLAN 2 and VLAN 3. We cannot use VLAN 1
because it default VLAN used by the switch. Let us assume that the VLAN 2 is being
used by the Sales Department of the organization and VLAN 3 being used by the HR
Department of the organization

Fig. 2. Configuring two VLANs in simulator.

3) Provide the IP addresses and gateways to the end devices as shown in the below
image.

Fig. 3. Providing IP address and gateways to end devices.


Note: To provide IP address and gateways click on the PC you want provide IP
address to and then click Desktop -> IP Configuration

Fig. 4. Providing IP addresses to VLANs

4) Configure the VLAN


click on the switch -> go to CLI and press “Enter” then write the following
commands to configure the VLANs andprovide the names to VLANs.

 Commands:

 en/enable: Logs you into enable mode, which is also known as user
exec mode or privileged mode.

 confi/configure terminal: Logs you into configuration mode.

 vlan number(except 1): Creates a VLAN and enters VLAN configuration


mode for further definitions of specified number of the VLAN.

 name vlan_name: Provides the specified name to the VLAN chosen by the
vlan number command. To provide name to VLAN 2 we have to write name
Sales after vlan 2 command. To provide name to VLAN 3 we have to
write name HR after vlan 3 command.

 exit: Exits from VLAN configuration mode.


Fig. 5. Providing specific name to VLANs

5) Now, both the VLANs have been configured. To verify whether the VLANs have been
activated or not we have to write “show vlan” command. And after pressing Enter
we can see both the created VLANs as shown in thebelow image.

Fig. 6. VLANs activation status.

Here we can see in the above image that both the VLANs (VLAN 2 & VLAN3)which
are “Sales” & “HR” are successfully configured and are active.

6) Now, to make the VLANs work properly we have to assign the devices among the
manually configured host which are “VLAN 2(Sales)” & “VLAN 3(HR)”.

 To assign devices among the VLANs we have to write series of commands which
are:

1. confi/configure terminal: Logs you into configuration mode.


2. interface: Enters interface configuration mode for the specified fast ethernet
interface
3. switchport access vlan: Sets the VLAN that the interface belongs to. It means it
assigns the previously specified interface using interface command to work in
the specific VLAN only if the device from the other VLAN tries to
communicate with the specific interface it will not be successful.

Fig. 7. Configuring interface to VLANs

Now we can see in the below image that if we send the message to the device in the
same VLAN then the message is sent successfully, but if we send the message to the
device in the different VLAN it cannot be sent to successfully.

Fig. 8. Sending message to different VLAN


Now to check whether the message can be sent to the device in another VLAN we will
click the PC from which we have to send the message and then click “Desktop” and then
go to “Command Prompt” and then give command “ping IP address” here the IP address
in the command specifies the destination device’s IP address

Fig. 9. Sending message to same VLAN

As we can see in the above image if we ping to the device from another VLAN it will not
give reply as it is in the other VLAN. But if we ping to the device which is in the same
VLAN as the sender is then the message will be successfully sent.

Now to check whether the message can be sent to the device in another VLAN we will
click the PC from which we have to send the message and then click “Desktop” and then
go to “Command Prompt” and then give command “ping IP address” here the IP address
in the command specifies the destination device’s IP address

Observations:

(1) Differentiate LAN and VLAN


(2) Interpret and analyze the output

Quiz: (Sufficient space to be provided for the answers)

1. Give Advantages, disadvantages of VLAN


2. Find out application case of VLAN
Suggested Reference:

1.https://www.netacad.com/courses/packet-tracer
2.Computer Networks- A Top-Down approach, Behrouz Forouzan, McGraw Hill

References used by the students: (Sufficient space to be provided)

Rubric wise marks obtained:

Program (Excellent)(4) (Good)(3) (Fair)(2) (Beginning)(1)

Installation of Tool installed Tool executes Tool executes with Tool does not
tool Properly with a minor error multiple minor execute (0-1)
(easily fixed error)
Topology Tool displays Output has minor Output has Output is
Implementation correct output with errors multiple errors incorrect (0-1)
no errors
Analysis/Interpr Analysis and Analysis and Multiple Analysis and
etation of understanding are understanding are misunderstanding understanding
output as per requirement not as per are not proper
requirement
Documentation Practical is well Missing required Missing two or Most or all
documented comment more required documentation
comments missing (0-1)
Experiment No: 6

AIM: Implement the concept of static routing.

Date:

Competency and Practical Skills: Exploration of network routing and configuration


to connect devices to establish static routing

Relevant CO: CO-4: Design network architecture, assign IP addressing and apply various
networking algorithms

Objectives: (a) Download network simulator – preferably cisco packet tracer


(b) Implement static routing algorithm by configuring interconnecting devices
and computing devices.
(c) Analyze the performance of Network

Equipment/Instruments: Desktop/laptop, Network simulator

Theory:

 Static routing is a form of routing that occurs when a router uses a manually-
configured routing entry, rather than information from dynamic routing traffic.

 In many cases, static routes are manually configured by a network administrator by


adding in entries into a routing table, though this may not always be the case.
Unlike dynamic routing, static routes are fixed and do not change if the network is
changed or reconfigured.

 Static routing and dynamic routing are not mutually exclusive. Both dynamic routing
and static routing are usually used on a router to maximize routing efficiency and to
provide backups in the event that dynamic routing information fails to be exchanged.
Static routing can also be used in stub networks, or to provide a gateway of last resort.

Implementation of Static Routing:

1) Take 2 routers, 2 switches and 4 end devices and connect them as shown in below
image. Connect both the routers with each other using Serial DTE cable, and to
connect router-switch and switch-end devices use copper straight-through cables.
Fig. 1. Static routing

2) Configure both the routers and provide them IP addresses as shown in the below
images. We need to take care that both the routers be in the same network so that they
will be accessible to each other. To achieve the same we need to give IP address to the
routers as following: click on router -> go to config -> go to serial 2/0 (in our case)
and provide IP as 192.168.1.1 and 192.168.1.2 to router0 and router1 respectively.

Fig. 2. Router configuration


3) Now, we need to connect the router to the switch, for that we need to provide the IP
address in the FastEthernet0/0(in our case). In both the routers we will provide
192.168.2.1 and 192.168.3.1 respectively. Here after providing the IP addresses and
connecting the router with the switch there are 2 networks are separated which are
192.168.2.0 and 192.168.3.0 hence, now both the routers are connected to switches
and also to the end devices via switch.

Fig. 3. Connecting Routers with switch

Fig. 4. Providing IP address to end devices


4) Provide the IP addresses and default gateways to the end devices, and be careful about
the network they reside in. In our case we give the IP addresses to the end devices as
shown above. And the default gateways will be the IP address of the routers they are
connected with which are 192.168.1.1 and 192.168.1.2(in our case). To provide IP
address and default gateway click on end device -> go to desktop -> go to IP
configuration and provide IP address and default gateway to all the end devices.

5) Select the static routing path from router0 to router 1 and router1 to router0 for that
again click on router -> go to config -> go to static available under ROUTING, and
provide the details as follows. In network field provide the IP address of the network
you want to communicate with which for router0 is 192.168.3.0, it means that the end
devices with the IP address containing the 3rd digit as 3 (i.e 192.168.3.2 or 192.168.3.3
in our case) can be communicated through router0. And in next hop field provide the
IP address of the router of the network you want to communicate (i.e 192.168.1.2 IP
address of router1).

Router0:

Fig. 5. Providing static routing path from router0


Router1:

Fig. 6. Providing static routing path from router1

6) To check whether the static routing is done or not, check the routing tables of the
routers for that select the magnify icon and click on the router you wish to check the
routing table and select the routing table from the dropdown.

Routing table for Router0:

Routing table Router1:


7) After the completion of all the above steps we can say that the static routing concept is
implemented successfully by sending the messages from 1 network to the other via the
routers.

Observations:

(1) What is the range of IP addresses given to Devices?


(2) Interpret and analyze the output

Quiz: (Sufficient space to be provided for the answers)

1. Give Advantages, disadvantages of Static routing


2. Find out application case of Static routing
3. What is Ethernet?

Suggested Reference:

1. https://www.netacad.com/courses/packet-tracer
2. Computer Networks- A Top-Down approach, Behrouz Forouzan, McGraw Hill

References used by the students: (Sufficient space to be provided)

Rubric wise marks obtained:

Program (Excellent)(4) (Good)(3) (Fair)(2) (Beginning)(1)


Installation of Tool installed Tool executes Tool executes with Tool does not
tool Properly with a minor error multiple minor execute (0-1)
Topology Tool displays Output has minor Output has Output is
Implementation correct output with errors multiple errors incorrect (0-1)
no errors
Analysis/Interpr Analysis and Analysis and Multiple Analysis and
etation of understanding are understanding are misunderstanding understanding
output as per requirement not as per are not proper
requirement
Documentation Practical is well Missing required Missing two or Most or all
documented comment more required documentation
comments missing (0-1)
Experiment No: 7
AIM: Implement the concept of dynamic routing (RIP, OSPF, and BGP).

Date:

Competency and Practical Skills: Exploration of Routing Algorithms to configure


network.

Relevant CO: CO-4: Design network architecture, assign IP addressing and apply various
networking algorithms

Objectives: (a) Download network simulator – preferably cisco packet tracer Configure all
workstations
(b) Implement dynamic routing algorithm (RIP, OSPF, and BGP) by
configuring interconnecting devices and computing devices.
(c) Analyze the performance of Network

Equipment/Instruments: Desktop/laptop, Packet Tracer Software

Theory:

What Is Dynamic Routing?


 Dynamic routing is a networking technique that provides optimal data routing.
Unlike static routing, dynamic routing enables routers to select paths according to
real-time logical network layout changes.

 Dynamic routing uses multiple algorithms and protocols. The most popular are
Routing Information Protocol (RIP) and Open Shortest Path First (OSPF).

 Dynamic routing protocols allow routers to share information about the network with
other routers to allow them to select the best path to reach a destination.

About Dynamic routing :

Advantages of dynamic routing:

Disadvantages of Dynamic Routing:

1) RIP Routing Protocol

About RIP :
Steps To Implement RIP Routing Protocol:

1) Prepare topology as shown in below figure.

 The network PC is connected to the switch with Copper-Straight through Cable.

 Each Switch is connected to the router using Copper-Straight through Cable.

 And to connect two routers with each other add Serial ports to the router for that
turn off the router Select WIC-2T and add it to the router and turn on the router.

 Two routers are connected using serial DTE cable.

Fig. 1. Network using two switch and two routers

2) Set the IP Address of the each PC with respect to network address for example here PC0
is in the 192.168.1.0 network so the IP address of PC0 is 192.168.1.1.

Fig. 2. Setting up IP address for PC0


3) Once the IP address of each PC is set, set the IP address of the fast Ethernet port of router
to which switch is connected. And then turn on the port. Follow the same process for
second (Router 1) router.

Fig. 3. Setting up connection with fast Ethernet port for Router0

Fig. 4. Setting up connection with fast Ethernet port for Router1


4) Set the IP address serial port of all routers.

Fig. 5. Setting up IP address serial port for Router0

Fig. 6. Setting up IP address serial port for Router1


5) Add number of network in RIP routing.

 To add number of network - open the settings of router head to the RIP category.
And in there add the network address of another network to which we want to
connect our router.
 For example in above image if we want to access network 192.168.1.0 add that
network address in network.
 Follow the same process for Router 1. And with this our routing is completed.

Fig. 7. Network using two switch and two routers

Fig. 8. Adding network to RIP


6) Test the network. - Transfer the data packet from one network pc to other network pc.

Fig. 9. Transferring the data packet from one network pc to other network pc

2) OSPF Routing Protocol:

 Open Shortest Path First is the dynamic routing protocol used in large to very large IP
networks.
o About OSPF
o Advantages of OSPF
o Disadvantages of OSPF
o Applications of OSPF

o Steps To Implement OSPF Routing Protocol:

1) Add Network Devices in Network As Following:

 Here in the network PC is connected to the switch with Copper-Straight through


Cable. Each Switch is connected to the router using Copper-Straight through Cable.

 To connect two routers with each other we have to add Serial ports to the router for
that turn off the router Select WIC-2T and add it to the router and turn on the router.

 Three routers are connected using serial DTE cable.


Fig. 10. Network using two switch and two routers through OSPF

2) Set the IP Address of the each PC with respect to network address for example here PC0
is in the 192.168.1.0 network so the IP address of PC0 is 192.168.1.1.

Fig. 11. Setting up the IP Address


3) Once the IP address of each PC is set, set the IP address of the fast Ethernet port of
router to which switch is connected. And then turn on the port. Follow the same process
for second (Router 1) router.

Fig. 12. Setting up connection with fast Ethernet port for Router0

Fig. 13. Setting up connection with fast Ethernet port for Router1
4) Now we will have to set the IP address serial port of all routers.

Fig. 14. Setting up connection with fast Ethernet port for Router0

Fig. 15. Setting up connection with fast Ethernet port for Router1
Fig. 16. Setting up connection with fast Ethernet port for Router2

5) Our network is ready only one thing is left to do which is to add number of network
through OSPF Command.

Fig. 17. Setting up connection with Router0 through OSPF


Fig. 18. Setting up connection with Router1 through OSPF

Fig. 19. Setting up connection with Router2 through OSPF


6) Test the network. Transfer the data packet from one network pc to other network pc.

Fig. 20. Testing the network

3) BGP Routing Protocol:

 Border Gateway Protocol (BGP) is the postal service of the Internet. When someone
drops a letter into a mailbox, the postal service processes that piece of mail and
chooses a fast, efficient route to deliver that letter to its recipient. Similarly, when
someone submits data across the Internet, BGP is responsible for looking at all of
the available paths that data could travel and picking the best route, which usually
means hopping between autonomous systems.

 BGP is the protocol that makes the Internet work. It does this by enabling data
routing on the Internet. When a user in Singapore loads a website with origin
servers in Argentina, BGP is the protocol that enables that communication to
happen quickly and efficiently.
o Steps To Implement BGP Routing Protocol:

1) Draw BGP Topology Diagram:

Fig. 21. BGP Topology Diagram

2) Assign ip address on each device as mentioned in Diagram:

Fig. 22. Assigning IP address to PC0


Fig. 23. Assigning IP address to PC2

3) BGP configuration on Router 1:

R1(config)#router bgp 1
R1(config-router)#neighbor 172.16.0.2 remote-as 71
R1(config-router)#network 10.0.0.0 mask 255.0.0.0
R1(config-router)#exit
R1(config)#do write
Building configuration...[OK]
R1(config)#

4) BGP configuration on Router 2:

R2(config)#router bgp 71
R2(config-router)#neighbor 172.16.0.1 remote-as 1
R2(config-router)#neighbor 172.14.0.2 remote-as 79
R2(config-router)#network 40.0.0.0 mask 255.0.0.0
R2(config-router)#exit
R2(config)#do write
Building configuration...[OK]
R2(config)#
5) BGP Configuration on Router 3:

R3(config)#router bgp 79
R3(config-router)#neighbor
router)#neighbor 172.14.0.1 remote
remote-as 71
R3(config-router)#network
router)#network 40.0.0.0 mask 255.0.0.0
R3(config-router)#exit
)#exit
R3(config)#do write
Building configuration...[OK
R3(config)#

Fig. 23
23. Testing the Network

Observations:

(1) Find out the algorithms/ protocol used in your network


(2) Give name of protocol of which the packets sent for testing

Quiz: (Sufficient
cient space to be provided for the answers)

1. Differentiate static and dynamic algorithm


2. What is the approximate cost of establishing the network of 10 devices? (Take devices
as per your requirements and choice) give details
Suggested Reference:

1. https://www.netacad.com/courses/packet-tracer
2. Computer Networks- A Top-Down approach, Behrouz Forouzan, McGraw Hill

References used by the students: (Sufficient space to be provided)

Rubric wise marks obtained:

Program (Excellent)(4) (Good)(3) (Fair)(2) (Beginning)(1)


Installation of Tool installed Tool executes Tool executes with Tool does not
tool Properly with a minor error multiple minor execute (0-1)
(easily fixed error)
Topology Tool displays Output has minor Output has Output is
Implementation correct output with errors multiple errors incorrect (0-1)
no errors
Analysis/Interpr Analysis and Analysis and Multiple Analysis and
etation of understanding are understanding are misunderstanding understanding
output as per requirement not as per are not proper
requirement
Documentation Practical is well Missing required Missing two or Most or all
documented comment more required documentation
comments missing (0-1)
Experiment No: 8

AIM: Packet capture and header analysis by wire-shark (TCP, UDP, IP).

Date:

Competency and Practical Skills: Exploration of Network protocols and header


using wireshark tool

Relevant CO: CO3: Examine work of protocols of TCP/IP protocol suite.

Objectives: (a) Download Wireshark.


(b) Capture the Packet
(c) Perform header analysis
(d) Answer the given questions with screenshots

Equipment/Instruments: Desktop/laptop

Theory:

What is wireshark?

 Wireshark is an open-source packet analyzer, which is used for education, analysis,


software development, communication protocol development, and network
troubleshooting.

How to capture Packet in Wireshark?

 Connect to Router from which you want to capture packet.


 Next step is to launch wireshark in your pc.
 Click on capture to start capturing the packets with optional filter option.

Fig. 1. Wireshark Network Analyzer


Capture Different Types of packets and analyze them:

1) TCP Packets:

Fig. 2. Capturing TCP packet from Wireless Network

2) UDP Packets:

Fig. 3. Capturing UDP packet from Wireless Network


Observations:

Use Wireshark tool and explore the packet format and content at each TCP/IP layer
Answer following questions for one packet
(1) What is the source and destination IP address?
(2) What is the MAC address of source and destination?
(3) What is the port address of source and destination?
(4) What is the TTL fields value in IP layer of the packet
Add screenshots of all above answers in your document.

Quiz: (Sufficient space to be provided for the answers)

1. Explain various planes or windows shown in user interface of Wireshark tool


2. What is the use of Wireshark tool?
3. Explore various important options available in Wireshark tool

Suggested Reference: https://www.wireshark.org/

References used by the students: (Sufficient space to be provided)

Rubric wise marks obtained:

Program (Excellent)(4) (Good)(3) (Fair)(2) (Beginning)(1)


Installation of Tool installed Tool executes Tool executes with Tool does not
tool Properly with a minor error multiple minor execute (0-1)
(easily fixed error)
Correct Tool displays Output has minor Output has Output is
commands correct output with errors multiple errors incorrect (0-1)
usage no errors
Analysis of Analysis and Analysis and Multiple Analysis and
output understanding are understanding are misunderstanding understanding
as per requirement not as per are not proper
requirement
Documentation Practical is well Missing required Missing two or Most or all
documented comment more required documentation
comments missing (0-1)
Experiment No: 9

AIM: A Visit to Server Room at LDCE

Date:

Competency and Practical Skills: Exploration of computer network to build


private Network.

Relevant CO: CO-4: Design network architecture, assign IP addressing and apply various
networking algorithms
CO-5: Implement different types of network using different tools and
simulators

Objectives: (a) Visit the Server Room and network in Institute


(b) Understand the configurations and equipments
(c) Prepare Detailed report of Institute network with proper diagrams

Equipment/Instruments: Desktop/laptop

Observations:

(1) The type of switch used in network = _________


(2) The list of equipments used in network = ________
(3) IP Address given to departments = _________

Quiz: (Sufficient space to be provided for the answers)

1. Which actors are involved in networks?


2. Who is your internet service provider?
3. What is the cost involved in configuration of network?

Suggested Reference:
Fig. 1. Network equipment at server room

Fig. 2. Rack in the server room

References used by the students: (Sufficient space to be provided)


Rubric wise marks obtained:

Program (Excellent)(4) (Good)(3) (Fair)(2) (Beginning)(1)

Analysis of Analysis and Analysis and Multiple Analysis and


output understanding are understanding are misunderstanding understanding
as per requirement not as per are not proper
requirement
Documentation Practical is well Missing required Missing two or Most or all
documented comment more required documentation
comments missing (0-1)

You might also like