100% found this document useful (1 vote)
1K views

SVVV CN Lab Manual

Mr./Ms. _______________________ Apparatus Required: 1. Switch 2. Router 3. Modem 4. Network Interface Card (NIC) 5. Patch Panel 6. Patch Cord 7. Crimping Tool 8. Cable Tester 9. Connectors (RJ-45, RJ-11) 10. CAT 5/CAT 6 Cable Theory: Network equipment are hardware devices that are used to interconnect devices in a computer network. Some common network equipment are: 1. Switch: A switch is a networking device that connects devices together on a computer network by using packet switching to receive and forward data to the destination device. Sw

Uploaded by

Ab V
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
1K views

SVVV CN Lab Manual

Mr./Ms. _______________________ Apparatus Required: 1. Switch 2. Router 3. Modem 4. Network Interface Card (NIC) 5. Patch Panel 6. Patch Cord 7. Crimping Tool 8. Cable Tester 9. Connectors (RJ-45, RJ-11) 10. CAT 5/CAT 6 Cable Theory: Network equipment are hardware devices that are used to interconnect devices in a computer network. Some common network equipment are: 1. Switch: A switch is a networking device that connects devices together on a computer network by using packet switching to receive and forward data to the destination device. Sw

Uploaded by

Ab V
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

Shri Vaishnav Vidhyapeeth

Vishwavidyalaya, Indore (M.P.)


Department of Information Technology

Lab Manual

Subject: Computer Network

Semester: IV

Subject Code: BTIT-502

Name :

Roll No. :

Section :

1
Shri Vaishnav Institute of Information
Technology, Indore (M.P.)

VISION

“To be renowned for excellence in Computer Science & Engineering.”

MISSION

“To impart quality education, meeting the latest industry requirements,


futuristic research & developments in Computer Science &
Engineering.”

2
TEACHING & EVALUATION SCHEME
THEORY PRACTICAL

CREDITS
COURSE

Assessment

Assessment
END SEM

END SEM
University

University
CATEGORY COURSE NAME L T P

Teachers

Teachers
Two Term
CODE

Exam

Exam
Exam

*
Computer
BTIT502 UG 3 1 2 5 60 20 20 30 20
Networks

Legends: L - Lecture; T - Tutorial/Teacher Guided Student Activity; P - Practical; C - Credit;


*Teacher Assessment shall be based following components: Quiz/Assignment/ Project/Participation
in Class, given that no component shall exceed more than 10 marks.

COURSE OBJECTIVES
The student should be made to:

1. Understanding the fundamental concepts of computer networking.


2. Creating students interest in the basic taxonomy and terminology of the
computer networking area.
3. Applying advanced networking concepts for student knowledge.
4. Creating the student for entry Advanced courses in computer networking.

COURSE OUTCOMES
Upon completion of the subject, students will be able to:

1. Understanding basic computer network technology.


2. Understanding and explain Data Communications System and its
components.
3. Evaluating the different types of network topologies and protocols.
4. Remembering the layers of the OSI model and TCP/IP.
5. Evaluating the different types of network devices and their functions
within a network.

3
SYLLABUS:

UNIT–I
Computer Network: Definitions, Goals, components, Architecture,
Classifications & Types. Layered Architecture: Protocol hierarchy, Design
Issues, Interfaces and Services, Connection Oriented & Connectionless
Services, Service primitives, Design issues & its functionality. ISO- OSI
Reference Model: Principle, Model, TCP/IP model overview, Descriptions of
various layers and its comparison with TCP/IP. Network standardization.

UNIT–II
Data Link Layer: Need, Services Provided, Framing, Flow Control, Error
control. Data Link Layer Protocol: Elementary & Sliding Window protocol: 1-
bit, Go-Back-N, Selective Repeat, Hybrid ARQ. Bit oriented protocols: SDLC,
HDLC, BISYNC, LAP and LAPB.

UNIT–III
MAC Sublayer: Overview of MAC Layer, MAC Addressing, Binary
Exponential Back-off (BEB) Algorithm, Distributed Random Access
Schemes/Contention Schemes: for Data Services (ALOHA and Slotted-
ALOHA), CSMA/CA, CSMA/CD Ethernet, token bus, token ring, (IEEE
802.3, IEEE 802.4, IEEE 802.5, IEEE 802.11 wireless Communication.

UNIT–IV
Network Layer: Need, Services Provided, Design issues, Routing and
congestion in network layer, wired & wireless routing protocol examples,
Routing algorithms: Least Cost Routing algorithm, Dijkstra's algorithm,
Bellman-ford algorithm, Hierarchical Routing, Broadcast Routing, Multi cast
Routing. IP protocol, IP Addresses, subnetting, Comparative study of IPv4 &
IPv6, Mobile IP.

UNIT–V
Transport Layer: Overview, Design Issues, UDP: Header Format, Per-
Segment Checksum, Carrying Unicast/Multicast Real-Time Traffic, TCP:
Connection Management, Reliability of Data Transfers, TCP Flow Control,
TCP Congestion Control, TCP Header Format, TCP Timer Management.
Session layer: Overview, Authentication, Session layer protocol. Presentation
layer: Overview, Data conversion, Encryption and Decryption, Presentation
layer protocol (LPP, Telnet, X.25 packet Assembler/Disassembler).Application
Layer: Overview, WWW and HTTP, FTP, SSH.
4
Text Books:

1. Andrew S Tanenbaum, Computer Networks, 6th Edition, Pearson


Education, 2016.
2. Behrouz A.Forouzan, TCP/IP-Protocol suite, 4th edition, McGraw-Hill,
2010.
3. William Stallings, Data and Computer Communication, 10th edition
Pearson, 2014.
4. Comer, Internet working with TCP/IP Volume one, Addison-Wesley,
2015.
5. W. Richard Stevens, TCP/IP Illustrated, Volume 1, 2nd Edition
Addison-Wesley Professional Computing Series.

References:

1. Kaveh Pahlavan, Prashant Krishnamurthy,


Networking Fundamentals, Wiley Publication,2009.
2. Michael A. Gallo & William M. Hancock, Computer Communications
& Networking Technologies, Cengagepearsen publications, 2001.
3. Dimitri Bertsekas, Robert Gallager, Data Networks, PHI Publication,
Second Edition, 1992.
4. Uyless Black, Computer Networks, PHI Publication, Second Edition,
1993.

LIST OF EXPERIMENTS:
1. Demonstrate Different Types of Network Equipment’s.
2. Color coding standard of CAT 5, 6, 7 and crimping of cable in RJ-45.
3. LAN installations and Configurations.
4. Experiment with basic network command and Network configuration
commands.
5. Examine network IP.
6. Write a program to implement various types of error correcting
techniques.
7. Write a program to implement various types of farming methods.
8. Implement & simulate various types of routing algorithm.
9. Installation of ONE (Opportunistic Network Environment) Simulator
for High Mobility Networks.
10. Simulate STOP AND WAIT Protocols on NS-2.
11. Simulate various Routing Protocol on NS-2.
12. Simulate various Network Topologies on NS-2.
13. Configuring routers, bridges and switches and gateway on NS-2.
5
BTIT-502 Computer Network

BTIT-502 – COMPUTER NETWORK LAB


CONTENTS
S.No. Name of the Experiment Page
No.

1. Demonstrate Different Types of Network Equipment’s.


2. Color coding standard of CAT 5, 6, 7 and crimping of cable in RJ-45.
3. LAN installations and Configurations.
4. Experiment with basic network command and Network configuration
commands.
5. Examine network IP.
6. Write a program to implement various types of error correcting techniques.
7. Write a program to implement various types of farming methods.
8. Implement & simulate various types of routing algorithm.
9. Installation of ONE (Opportunistic Network Environment) Simulator for High
Mobility Networks.
10. Simulate STOP AND WAIT Protocols on NS-2.
11. Simulate various Routing Protocol on NS-2.
12. Simulate various Network Topologies on NS-2.
13. Configuring routers, bridges and switches and gateway on NS-2.

6
BTIT-502 Computer Network

Ex. No. :01


Demonstrate Different Types of Network Equipment’s.
Date:__/__/____

Aim: Demonstrate Different Types of Network Equipment’s.

• Repeater
• Hub
• Switch
• Bridge
• Router
• Gate Way

7
1. Repeater: Functioning at Physical Layer. A repeater is an electronic device that receives
a signal and retransmits it at a higher level and/or higher power, or onto the other side of
an obstruction, so that the signal can cover longer distances. Repeater have two ports ,so
cannot be use to connect for more than two devices.

2. Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator is a
device for connecting multiple twisted pair or fiber optic Ethernet devices together and
making them act as a single network segment. Hubs work at the physical layer (layer 1)
of the OSI model. The device is a form of multiport repeater. Repeater hubs also
participate in collision detection, forwarding a jam signal to all ports if it detects a
collision

3. Switch: A network switch or switching hub is a computer networking device that


connects network segments. The term commonly refers to a network bridge that
processes and routes data at the data link layer (layer 2) of the OSI model. Switches that
additionally process data at the network layer (layer 3 and above) are often referred to as
Layer 3 switches or multilayer switches.

4. Bridge: A network bridge connects multiple network segments at the data link layer
(Layer 2) of the OSI model. In Ethernet networks, the term bridge formally means a device
that behaves according to the IEEE 802.1D standard. A bridge and switch are very much
alike; a switch being a bridge with numerous ports. Switch or Layer 2 switch is often used
interchangeably with bridge .Bridges can analyze incoming data packets to determine if the
bridge is able to send the given packet to another segment of the network.

5. Router: A router is an electronic device that interconnects two or more computer


networks, and selectively interchanges packets of data between them. Each data packet
contains address information that a router can use to determine if the source and
destination are on the same network, or if the data packet must be transferred from one
network to another. Where multiple routers are used in a large collection of
interconnected networks, the routers exchange information about target system addresses,
so that each router can build up a table showing the preferred paths between any two
systems on the interconnected networks.
6. Gate Way: In a communications network, a network node equipped for interfacing with
another network that uses different protocols.
• A gateway may contain devices such as protocol translators, impedance matching
devices, rate converters, fault isolators, or signal translators as necessary to provide
system interoperability. It also requires the establishment of mutually acceptable
administrative procedures between both networks.
• A protocol translation/mapping gateway interconnects networks with different
network protocol technologies by performing the required protocol conversions.

8
BTIT-502 Computer Network

Ex. No. :02


Color coding standard of CAT 5, 6, 7 and crimping of cable in RJ-45.
Date:__/__/____

Aim: Color coding standard of CAT 5, 6, 7 and crimping of cable in RJ-45.


To do the following
 Cable Crimping
 Standard Cabling
 Cross Cabling
 IO connector crimping
 Testing the crimped cable using a cable tester

Apparatus/Tools/Equipments/Components:
RJ-45 connector, IO Connector, Crimping Tool, Twisted pair Cable, Cable Tester.

Principle:
Standard Cabling:
 10BaseT and 100BaseT are most common mode of LAN. You can use UTP
category-5 cable for both modes.
 A straight cable is used to connect a computer to a hub

9
BTIT-502 Computer Network

Cross Cabling:
A cross cable is used to connect 2 computers directly (with ONLY the UTP cable). It is also
used then you connect 2 hubs with a normal port on both hubs

Procedure:
Cable Crimping steps:
1. Remove the outmost vinyl shield for 12mm at one end of the cable (we call this side
A-side).
2. Arrange the metal wires in parallel
3. Insert the metal wires into RJ45 connector on keeping the metal wire arrangement.
4. Set the RJ45 connector (with the cable) on the pliers, and squeeze it tightly.
5. Make the other side of the cable (we call this side B-side) in the same way.
6. After you made it, you don't need to take care of the direction of the cable.

10
BTIT-502 Computer Network

IO connector crimping: Run the full length of Ethernet cable in place,


from endpoint to endpoint, making sure to leave excess.
 At one end, cut the wire to length leaving enough length to work, but not too much
excess. Strip off about 2 inches of the Ethernet cable sheath.
 Align each of the colored wires according to the layout of the jack. Use the punch down
tool to insert each wire into the jack.
 Repeat the above steps for the second RJ45 jack.

11
BTIT-502 Computer Network

Testing the crimped cable using a cable tester:


Step 1: Skin off the cable jacket 3.0 cm long cable stripper up to cable
Step 2: Untwist each pair and straighten each wire 190 0 1.5 cm long.
Step 3: Cut all the wires
Step 4: Insert the wires into the RJ45 connector right white orange left brown the pins facing
up
Step 5: Place the connector into a crimping tool, and squeeze hard so that the handle reaches
its full swing.
Step 6: Use a cable tester to test for proper continuity

Result:
Cable Crimping, Standard Cabling and Cross Cabling, IO connector crimping and testing the
crimped cable using a cable tester are done successfully
12
BTIT-502 Computer Network

Ex. No. :03


LAN installations and Configurations.
Date:__/__/____

Procedure: On the host computer

On the host computer, follow these steps to share the Internet connection:
Log on to the host computer as Administrator or as Owner.

1. Click Start, and then click Control Panel.


2. Click Network and Internet Connections.
3. Click Network Connections.
4. Right-click the connection that you use to connect to the Internet. For example, if you
connect to the Internet by using a modem, right-click the connection that you want under
Dial-up other network available.
5. Click Properties.
6. Click the Advanced tab.

7. Under Internet Connection Sharing, select the Allow other network users to connect
through this computer's Internet connection check box.

8. If you are sharing a dial-up Internet connection, select the Establish a dial-up
connection whenever a computer on my network attempts to access the Internet check
box if you

9. Click OK. You receive the following message:

When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP
address 192.168.0. 1. Your computer may lose connectivity with other computers on your
network. If these other computers have static IP addresses, it is a good idea to set them to
obtain their IP addresses automatically. Are you sure you want to enable Internet
Connection Sharing?

10.Click Yes.
The connection to the Internet is shared to other computers on the local area network
(LAN).

The network adapter that is connected to the LAN is configured with a static IP address of
192.168.0. 1 and a subnet mask of 255.255.255.0

13
BTIT-502 Computer Network
On the client computer

To connect to the Internet by using the shared connection, you must confirm the LAN
adapter IP configuration, and then configure the client computer. To confirm the LAN
adapter IP configuration, follow these steps:

1. Log on to the client computer as Administrator or as Owner.


2. Click Start, and then click Control Panel.
3. Click Network and Internet Connections.
4. Click Network Connections.
5. Right-click Local Area Connection and then click Properties.
6. Click the General tab, click Internet Protocol (TCP/IP) in the connection uses the
following items list, and then click Properties.
7. In the Internet Protocol (TCP/IP) Properties dialog box, click Obtain an IP address
automatically (if it is not already selected), and then click OK.

Note: You can also assign a unique static IP address in the range of 192.168.0.2 to 254. For
example, you can assign the following static IP address, subnet mask, and default gateway:

8. IP Address 192.168.31.202
9. Subnet mask 255.255.255.0
10. Default gateway 192.168.31.1
11. In the Local Area Connection Properties dialog box, click OK.

Quit Control Panel.

14
BTIT-502 Computer Network

Ex. No. :04


Experiment with basic network command and Network
Date:__/__/____ configuration commands.

Apparatus (Software): Command Prompt and Packet Tracer.

Procedure: To do this EXPERIMENT- follows these steps:


 In this EXPERIMENT- students have to understand basic networking commands e.g
ping, tracert etc.
 All commands related to Network configuration which includes how to switch to
privilege mode and normal mode and how to configure router interface and how to save
this configuration to flash memory or permanent memory.

This commands includes


• Configuring the Router commands
• General Commands to configure network
• Privileged Mode commands of a router
• Router Processes & Statistics
• IP Commands
• Other IP Commands e.g. show ip route etc.

ping:ping(8) sends an ICMP ECHO_REQUEST packet to the specified host. If the host
responds, you get an ICMP packet back. Sound strange? Well, you can “ping” an IP address
to see if a machine is alive. If there is no response, you know something is wrong.

15
BTIT-502 Computer Network

Traceroute:

Tracert is a command which can show you the path a packet of information taken from your
computer to one you specify. It will list all the routers it passes through until it reaches its
destination, or fails to and is discarded. In addition to this, it will tell you how long each
'hop' from router to router takes.

nslookup:
Displays information from Domain Name System (DNS) name servers.
NOTE :If you write the command as above it shows as default your pc's server name firstly.

pathping:

A better version of tracert that gives you statics about packet lost and latency.

16
BTIT-502 Computer Network

Getting Help
In any command mode, you can get a list of available commands by entering a question
mark (?). Router>?

To obtain a list of commands that begin with a particular character sequence, type in those
haracters followed immediately by the question mark (?).

Router#co?
configure connect copy

To list keywords or arguments, enter a question mark in place of a keyword or argument.


Include a space before the question mark.

Router#configure ?

memory Configure from NV memory network Configure from a TFTP network host
terminal Configure from the terminal
You can also abbreviate commands and keywords by entering just enough characters to
make the command unique from other commands. For example, you can abbreviate the
show command to sh.
Configuration Files
Any time you make changes to the router configuration, you must save the changes to
memory because if you do not they will be lost if there is a system reload or power outage.
There are two types of configuration files: the running (current operating) configuration and
the startup configuration.
Use the following privileged mode commands to work with configuration files.
17
BTIT-502 Computer Network

Ex. No. :05


Examine network IP.
Date:__/__/____

• Classification of IP address
• Sub netting
• Super netting
Procedure: Following is required to be study under this practical.
• Classification of IP address

As show in figure we teach how the ip addresses are classified and when they are used.
Class Address Range Supports
Class A 1.0.0.1 to 126.255.255.254 Supports 16 million hosts on each of 127 networks.
Class B 128.1.0.1 to 191.255.255.254 Supports 65,000 hosts on each of 16,000 networks.
Class C 192.0.1.1 to 223.255.254.254 Supports 254 hosts on each of 2 million networks.
Class D 224.0.0.0 to 239.255.255.255 Reserved for multicast groups.
Class E 240.0.0.0 to 254.255.255.254 Reserved.

• Sub netting
Why we Develop sub netting and How to calculate subnet mask and how to identify subnet address.
• Super netting
Why we develop super netting and How to calculate supernet mask and how to identify supernet address.

18
BTIT-502 Computer Network

Ex. No. :06


Write a program to implement various types of error correcting
Date:__/__/____ techniques.

19
BTIT-502 Computer Network

Ex. No. :07


Write a program to implement various types of farming methods.
Date:__/__/____

20
BTIT-502 Computer Network

Ex. No. :08


Implement & simulate various types of routing algorithm.
Date:__/__/____

21
BTIT-502 Computer Network

Ex. No. :09


Installation of ONE (Opportunistic Network Environment)
Date:__/__/____ Simulator for High Mobility Networks.

22
BTIT-502 Computer Network

Ex. No. :10


Simulate STOP AND WAIT Protocols on NS-2.
Date:__/__/____

23
BTIT-502 Computer Network

Ex. No. :11 Simulate various Routing Protocol on NS-2.

Date:__/__/____

24
BTIT-502 Computer Network

Ex. No. :12


Simulate various Network Topologies on NS-2.
Date:__/__/____

25
BTIT-502 Computer Network

Ex. No. :13


Configuring routers, bridges and switches and gateway on NS-2.
Date:__/__/____

26

You might also like