Ansh CN
Ansh CN
Ansh CN
Acropolis Institute of
Technology and
Research, Indore Department of CSE
CERTIFICATE
This is to certify that the experimental work entered in this journal as per
the B. TECH. III year syllabus prescribed by the RGPV was done by Ms.
In this lab, this course provides students with hands on training regarding the design,
troubleshooting, modeling and evaluation of computer networks. In this course,
students are going to experiment in real test-bed networking environment and learn
about network design and troubleshooting topics and tools such as: network
addressing, MAC Protocols like Aloha, CSMA, CSMA/CD and CSMA/CA ,Address
Resolution Protocol (ARP), basic troubleshooting tools (e.g, ping, ICAM), IP
routing (e.g, RIP), route discovery (e.g. traceroute), DNS, HTTP, HTTPS, FTP and
TelNet and may others.
Hardware and Software Requirements
Sr. No. Software Requirements Hardware Requirements
1 Cisco Packet Tracer 8.2 One of the following operating
systems: Microsoft Windows 8.1,
10, 11 (64bit), Ubuntu 20.04, 22.04
LTS (64bit) or macOS 10.
2 amd64(x86-64) CPU
3 4GB of free RAM
1.4 GB of free disk space
DONT’S
1. Students bringing the bags inside the laboratory.
2. Students using the computers in an improper way.
3. Students scribbling on the desk and mishandling the chairs.
4. Students using mobile phones inside the laboratory.
5. Students making noise inside the laboratory.
PREREQUISITE:-
An introduction to the design and analysis of computer communication networks.
◻ Course Objectives
1. Build an understanding of the fundamental concepts of computer networking.
2. Familiarize the student with the basic taxonomy and terminology of the
computer networking area.
3. Introduce the student to advanced networking concepts, preparing the student
for entry Advanced courses in computer networking.
4. Identify the different types of network topologies and protocols.
Course Outcomes
At the end of the course student will be able to:
.
Index
Grade &
Date of Page Date of
S.No Name of the Experiment Sign of the
Exp. No. Submission
Faculty
1 26/03/24 Study of Different type of Network cables. 01 28/03/24
Experiment No. 01
Experiment Title - Study of Different types of Network cables.
Concept Theory
Network Cables :
Network Cable is the medium through which information usually moves from one network device
to another. There are several types of cable which are commonly used with LANs. In some cases,
a network will utilize only one type of cable, other networks will use a variety of cable types. The
type of cable chosen for a network is related to the network's topology, protocol, and size.
Understanding the characteristics of different types of cable and how they relate to other aspects
of a network is necessary for the development of a successful network.
Figure: 1
A single-core coaxial cable uses a single central metal (usually copper) conductor, while a
multi-core coaxial cable uses multiple thin strands of metal wires. The following image
shows both types of cable.
Figure : 2
The coaxial cables were not primarily developed for the computer network. These cables were
developed for general purposes. They were in use even before computer networks came into
existence. They are still used even their use in computer networks has been completely
discontinued.At the beginning of computer networking, when there were no dedicated media
cables available for computer networks, network administrators began using coaxial cables to build
computer networks.Because of its low cost and long durability, coaxial cables were used in
computer networking for nearly two decades (the 80s and 90s). Coaxial cables are no longer used
to build any type of computer network.
RG-8 50 10 Solid copper Used in the earliest computer networks. This cable
was used as the backbone cable in the bus topology.
In Ethernet standards, this cable is documented as the
10base5 Thicknet cable.
RG- 50 24 Several thin This cable is thinner, easier to handle and install than
58 strands of the RG-8 cable. This cable was used to connect a
copper system with the backbone cable. In Ethernet
standards, this cable is documented as the 10base2
Thinnet cable.
Table: 1
2. Twisted-pair cables
The twisted-pair cable was primarily developed for computer networks. This cable is also
known as Ethernet cable. Almost all modern LAN computer networks use this cable. This
cable consists of color-coded pairs of insulated copper wires. Every two wires are twisted
around each other to form a pair. Usually, there are four pairs. Each pair has one solid color
and one striped color wire. Solid colors are blue, brown, green, and orange. In striped color,
the solid color is mixed with the white color.
Based on how pairs are stripped in the plastic sheath, there are two types of twisted-pair
cable; UTP and STP.
In the UTP (Unshielded twisted-pair) cable, all pairs are wrapped in a single plastic sheath.
In the STP (Shielded twisted-pair) cable, each pair is wrapped with an additional metal
shield, then all pairs are wrapped in a single outer plastic sheath.
Figure: 3
Cat 1 1Mbps 1MHz Not used This cable contains only two pairs (4
for data wires). This cable was used in the
telephone network for voice
transmission.
Cat 2 4Mbps 10MHz Token This cable and all further cables have a
Ring minimum of 8 wires (4 pairs). This
cable was used in the token-ring
network.
Cat 3 10Mbps 16MHz 10BASE- This is the first Ethernet cable that was
T Ethernet used in LAN networks.
Cat 4 20Mbps 20MHz Token This cable was used in advanced Token-
Ring ring networks.
Cat 5 100Mbps 100MHz 100BASE This cable was used in advanced (fast)
-T LAN networks.
Ethernet
Cat 6 10Gbps 250MHz 10GBASE This cable uses a plastic core to prevent
-T cross-talk between twisted-pair. It also
Ethernet uses a fire-resistant plastic sheath.
Cat 7 10Gbps 600MHz Not This cable sets a base for further
drafted development. This cable uses multiple
yet twisted-pair and shields each pair by its
plastic sheath.
Table: 2
● Cat 1, 2, 3, 4, 5 are outdated and not used in any modern LAN network.
● Cat 7 is still a new technology and not commonly used.
● Cat 5e, 6, 6a are the commonly used twisted-pair cables.
Figure: 4
SMF (Single-mode fiber) optical cable
This cable carries only a single beam of light. This is more reliable and supports much
higher bandwidth and longer distances than the MMF cable. This cable uses a laser as the
light source and transmits 1300 or 1550 nano-meter wavelengths of light.
4. If it is necessary to run cable across the floor, cover the cable with cable protectors.
5. Label both ends of each cable.
6. Use cable ties (not tape) to keep cables in the same location together.
Practical Implementation :
Step 1: Use your cable strippers at about 1-2 inches from the end of the cable to remove the outer
jacket.
Step 2: Untwist the twisted pair wires all the way back to the jacket. This can be done just like a
regular twist-tie on a loaf of bread, but with four of them of different colors.
Step 3: Align the untwisted wires in the order necessary for your needs.
Step 4: Cut the extra wire. Once you've untwisted the wires, you'll have a superfluous amount of
copper wiring left; we don't need this much. Use the wire-cutting scissors to cut these off.
Step 5: Push the remaining wires into the RJ45 head according to color code. Be careful not to
bend the wires while pushing them in or you run the risk of creating a bad cable.
Step 6: Push the connector inside the crimping tool and squeeze the crimper all the way down.
Step 7: Repeat steps 1-6 for the other end of the cable.
Step 8: To make sure you've successfully terminated each end of the cable, use a cable tester to
test each pin.
Figure: 5
Figure: 6
Experiment No. 02
Experiment Title - Study of all Network and Network Devices in detail.
Concept Theory
Computer Network
Computer Network is a group of computers connected with each other through wires, optical fibres
or optical links so that various devices can interact with each other through a network. The aim of
the computer network is the sharing of resources among various devices. In the case of computer
network technology, there are several types of networks that vary from simple to complex level.
Figure: 7
Figure: 8
Characteristics of PAN
● It is mostly a personal devices network equipped within a limited area.
● Allows you to handle the interconnection of IT devices at the surroundings of a
single user.
● PAN includes mobile devices, tablet, and laptop.
● It can be wirelessly connected to the internet called WPAN.
● Appliances used for PAN: cordless mice, keyboards, and Bluetooth systems.
Advantages of PAN
● PAN networks are relatively secure and safe
● It offers only short-range solution up to ten meters
● Strictly restricted to a small area
Disadvantages of PAN
● It may establish a bad connection to other networks at the same radio bands.
● Distance limits.
widely useful network for sharing resources like files, printers, games, and other
applications. The simplest type of LAN network is to connect computers and a printer in
someone’s home or office. In general, LAN will be used as one type of transmission
medium. It is a network which consists of less than 5000 interconnected devices across
several buildings.
Figure: 9
Characteristics of LAN
● It is a private network, so an outside regulatory body never controls it.
● LAN operates at a relatively higher speed compared to other WAN systems.
● There are various kinds of media access control methods like token ring and
ethernet.
Advantages of LAN
● Computer resources like hard-disks, DVD-ROM, and printers can share local area
networks. This significantly reduces the cost of hardware purchases.
● You can use the same software over the network instead of purchasing the licensed
software for each client in the network.
● Data of all network users can be stored on a single hard disk of the server computer.
● You can easily transfer data and messages over networked computers.
● It will be easy to manage data at only one place, which makes data more secure.
Disadvantages of LAN
● LAN will indeed save cost because of shared computer resources, but the initial
cost of installing Local Area Networks is quite high.
● The LAN admin can check personal data files of every LAN user, so it does not
offer good privacy.
● Unauthorized users can access critical data of an organization in case LAN admin
is not able to secure a centralized data repository.
● Local Area Network requires a constant LAN administration as there are issues
related to software setup and hardware failures
Characteristics of MAN
● It mostly covers towns and cities in a maximum 50 km range
● Mostly used medium is optical fibers, cables
● Data rates adequate for distributed computing applications.
Figure: 10
Advantages of MAN
● It offers fast communication using high-speed carriers, like fiber optic cables.
● It provides excellent support for an extensive size network and greater access to
WANs.
● The dual bus in MAN network provides support to transmit data in both directions
concurrently.
● A MAN network mostly includes some areas of a city or an entire city.
Disadvantages of MAN
● You need more cable to establish a MAN connection from one place to another.
● In MAN network it is tough to make the system secure from hackers
Characteristics of WAN
● The software files will be shared among all the users; therefore, all can access the
latest files.
● Any organization can form its global integrated network using WAN.
Figure: 11
Advantages of WAN
● WAN helps you to cover a larger geographical area. Therefore business offices
situated at longer distances can easily communicate.
● Contains devices like mobile phones, laptop, tablet, computers, gaming consoles,
etc.
● WLAN connections work using radio transmitters and receivers built into client
devices.
Disadvantages of WAN
● The initial setup cost of investment is very high.
● It is difficult to maintain the WAN network. You need skilled technicians and
network administrators.
● There are more errors and issues because of the wide coverage and the use of
different technologies.
● It requires more time to resolve issues because of the involvement of multiple wired
and wireless technologies.
● Offers lower security compared to other types of network in computers.
Figure: 12
Figure: 13
7. Virtual Private Network (VPN) :
A VPN is a type of computer network that extends a private network across the internet
and lets the user send and receive data as if they were connected to a private network even
though they are not. Through a virtual point-to-point connection users can access a private
network remotely. VPN protects you from malicious sources by operating as a medium
that gives you a protected network connection.
Figure: 14
Networking Devices
Network devices are physical devices that enable communication and interaction between
hardware on a computer network. Network devices are building blocks that permit
communication between services and the endpoints that consume those services.
In other words, they're connectors that allow devices on a network to communicate with
one another. Enabling communication on a network means anything that helps data get
from source to destination.
When a network contains a large number of devices, too many data packets are transmitted
over the same network path. This can cause congestion and performance reduction. The
goal of networking devices is to provide for smooth communication between various
hardware linked to a network. Adding a network device facilitates the seamless sharing of
network resources between different systems.
Figure : 15
interfaces. Whenever a hub receives a bit from one of its interfaces, it sends a copy
to all other interfaces.
In particular, if a hub receives frames from two different interfaces at the same time
, a collision occurs, and the nodes that created the frames must retransmit. A
network hub does not have routing tables or intelligence that is utilized to transfer
information and disseminate all network data across all connections.
Flooding is a simple computer network routing technique in which a source or node
sends packets through every outgoing link. The flooding algorithm is easy to
implement. The hubs use the flooding algorithm to forward data.
Figure: 16
2. Switch
A switch is a multiport network device with a buffer and design that can improve
its efficiency (having a large number of ports means less traffic) and performance.
A switch is a networking device that operates at the data link layer. A switch has
numerous ports into which computers can be plugged. When a data frame arrives
at any network switch port, it evaluates the destination address(destination MAC
address ), performs the necessary checks, and sends the frame to the associated
device. The switch performs error checking before forwarding the data, making it
very efficient because it does not forward packets with errors and only forwards
good packets to the correct port.
Enrolment No.:0827AL211016 Page No. 20
Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602
The working of the switch can easily be illustrated by the diagram given below in
which Host A wants to send some data to Host B.
Figure: 17
3. Router
A router is a network device similar to a switch that routes data packets based on
their IP addresses . The router is primarily a Network Layer device. A router is also
known as an intelligent device because it can automatically calculate the best route
to pass network packets from source to destination. A router examines a data
packet's destination IP address and uses headers and forwarding tables to determine
the best way to transfer the packets. It communicates between two or more
networks using protocols such as ICMP.
Figure: 18
4. Bridge
A bridge is a network device that operates at the data link layer device. A bridge is
a repeater with the added functionality of filtering content by reading the MAC
addresses of the source and destination. It is also used to connect two LANs that
use the same protocol. It has a single input and output port, making it a two-port
device.
Figure: 19
5. Gateway
A gateway is a network node in telecommunications that connects two networks
that use different transmission protocols. Gateways serve as network entry and exit
points because all data must pass through or communicate with the gateway before
being routed. Traffic that does not go through at least one gateway in most IP-based
networks is traffic between the nodes on the same local area network (LAN)
segment. The primary benefit of using a gateway in personal or business scenarios
is that it consolidates internet connectivity into a single device.
Figure: 20
6. Modem
A modem is a network device that modulates and demodulates analog carrier
signals (known as sine waves) to encode and decode digital data for processing.
Because modems perform both of these tasks simultaneously, the term modem is a
combination of "modulate" and "demodulate".
Figure: 21
7. Repeater
A repeater is a two-port device that operates at the physical layer . It is used to
regenerate the signal over the same network before it becomes too weak or
corrupted, allowing the signal to be transmitted for a longer distance over the same
network. It is important to understand that repeaters do not amplify the signal.
When the signal weakens, repeaters copy it bit by bit and regenerate it at its original
strength.
Figure: 22
Enrolment No.:0827AL211016 Page No. 23
Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602
Figure: 23
Experiment No. 03
Experiment Title - Study of Network IP.
Concept Theory
An IP address represents an Internet Protocol address. A unique address that identifies the device
over the network. It is almost like a set of rules governing the structure of data sent over the Internet
or through a local network. An IP address helps the Internet to distinguish between different
routers, computers, and websites. It serves as a specific machine identifier in a specific network
and helps to improve visual communication between source and destination.
IP address structure:
IP addresses are displayed as a set of four digits- the default address may be 192.158.1.38. Each
number on the set may range from 0 to 255. Therefore, the total IP address range ranges from
0.0.0.0 to 255.255.255.255.
IP address is basically divided into two parts: X1. X2. X3. X4
1. [X1. X2. X3] is the Network ID
2. [X4] is the Host ID
Network ID
It is the part of the left-hand IP address that identifies the specific network where the device is
located. In the normal home network, where the device has an IP address 192.168.1.32, the
192.168.1 part of the address will be the network ID. It is customary to fill in the last part that is
not zero, so we can say that the device’s network ID is 192.168.1.0.
Hosting ID
The host ID is part of the IP address that was not taken by the network ID. Identifies a specific
device (in the TCP / IP world, we call devices “host”) in that network. Continuing with our
example of the IP address 192.168.1.32, the host ID will be 32- the unique host ID on the
192.168.1.0 network.
Version of IP address:
1. IPV4 (Internet Protocol Version 4):
It is the first version of Internet Protocol address. The address size of IPV4 is 32 bit number.
In this Internet Protocol Security (IPSec) with respect to network security is optional. It is
having 4,294,967,296 number of address still we are seeing a shortage in network addresses
as the use of network & virtual devices are increasing rapidly.
2. IPV6 (Internet Protocol Version 6):
It is the recent version of Internet Protocol address. The address size of IPV6 is 128 bit
number. In this Internet Protocol Security (IPSec) with respect to network security is
mandatory. It allows 3.4 x 10^38 unique IP addresses which seems to be more than
sufficient to support trillions of internet devices present now or coming in future.
IP Address Types:
There are 4 types of IP Addresses- Public, Private, Fixed, and Dynamic. Among them, public and
private addresses are derived from their local network location, which should be used within the
network while public IP is used offline.
1. Public IP address
A public IP address is an Internet Protocol address, encrypted by various servers/devices.
That’s when you connect these devices with your internet connection. This is the same IP
address we show on our homepage. So why the second page? Well, not all people speak
the IP language. We want to make it as easy as possible for everyone to get the information
they need. Some even call this their external IP address. A public Internet Protocol address
is an Internet Protocol address accessed over the Internet. Like the postal address used to
deliver mail to your home, the public Internet Protocol address is a different international
Internet Protocol address assigned to a computer device. The web server, email server, and
any server device that has direct access to the Internet are those who will enter the public
Enrolment No.:0827AL211016 Page No. 26
Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602
Internet Protocol address. Internet Address Protocol is unique worldwide and is only
supplied with a unique device.
2. Private IP address
Everything that connects to your Internet network has a private IP address. This includes
computers, smartphones, and tablets but also any Bluetooth-enabled devices such as
speakers, printers, or smart TVs. With the growing internet of things, the number of private
IP addresses you have at home is likely to increase. Your router needs a way to identify
these things separately, and most things need a way to get to know each other. Therefore,
your router generates private IP addresses that are unique identifiers for each device that
separates the network.
3. Static IP Address
A static IP address is an invalid IP address. Conversely, a dynamic IP address will be
provided by the Dynamic Host Configuration Protocol (DHCP) server, which can change.
The Static IP address does not change but can be changed as part of normal network
management.
Static IP addresses are incompatible, given once, remain the same over the years. This type
of IP also helps you get more information about the device.
4. Dynamic IP address
It means constant change. A dynamic IP address changes from time to time and is not
always the same. If you have a live cable or DSL service, you may have a strong IP address.
Internet Service Providers provide customers with dynamic IP addresses because they are
too expensive. Instead of one permanent IP address, your IP address is taken out of the
address pool and assigned to you. After a few days, weeks, or sometimes even months, that
number is returned to the lake and given a new number. Most ISPs will not provide a static
IP address to customers who live there and when they do, they are usually more expensive.
Dynamic IP addresses are annoying, but with the right software, you can navigate easily
and for free.
4. Anycast addressing
In anycast addressing the data, a packet is not transmitted to all the receivers on the
network. When a data packet is allocated to an anycast address, it is delivered to the closest
interface that has this anycast address.
Experiment No. 04
Experiment Title - Study and configures all topology using packet tracer software.
Concept Theory
Topology :
Network topologies or topologies of the internet architecture define the structuring of computer
networks or how various network components within the computer are connected. In other words,
they are the arrangements of different network nodes and connected lines. The term topology was
derived from the Greek words – "topo" which means "place" and "logos" which means "to study."
1. P2P Topology :
We can expand P2P as a Point-to-Point network topology. It is the simplest topology
wherein two nodes, computers, or other network devices remain connected to each other
directly through a piece of cable. The most obvious scenario for creating a P2P network is
connecting two computers via an Ethernet cable (twisted pair cables like UTP Cat 5e, STP
Cat 6e, etc.) in the RJ-45 port.
Figure: 24
Advantages of P2P Topology:
● The construction and maintenance cost of this overall topology is very inexpensive.
● Since the P2P network is not dependent on any centralized system, the two nodes or computers
can independently function with each other.
● It does not require advanced knowledge to set up or design network topologies.
● Troubleshooting is the easiest in such topologies.
● Because of its straightforward structure with limited one-to-one connectivity, the performance
of such topology remains the maximum.
2. Bus topology:
It is another simple network topology where the topology uses a common bus or cable
called the backbone to connect all the nodes within the communication system. It uses tap
devices to connect drop lines through which all other computer systems get connected. This
network topology also adds terminators installed at each end of the backbone to avoid the
reflection of signals.
Figure : 25
3. Ring topology:
As the name suggests, the ring topology is circular and is a modified version of the bus
topology. In this topology, all the system remains connected to the other system on either
side. In other words, there will be two neighbors of the station. The data transmission
occurs in one direction, making the entire network act as a half-duplex. In a dual ring
topology, the data transmission occurs bi-directional.
Figure: 26
4. Star Topology:
It has become one of the most straightforward & most prominent network topologies. It is
widespread because of its several advantages. The topology has a centralized system,
usually a switch, which contains multiple ports to connect one system or node with the
other. In this topology design, no direct connection resides between the two systems. All
the communication between multiple systems goes via the switch (central unit). If any
system fails to connect to the centrally located unit/device, it does not impact other systems
connected to it.
Enrolment No.:0827AL211016 Page No. 33
Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602
Figure: 27
Advantages of Star Topology:
● No data collision occurs in this topology. That makes star topology a high-performing
topology.
● It is very reliable because of its straightforward design structure.
● Fault detection is also easy.
● Each device requires only one port.
● If one system or station disturbs or becomes faulty, it does not affect other systems within the
topology.
● Scalability becomes easy.
● This topological design is less expensive because it requires limited cables and ports.
● Understanding and troubleshooting such a topology is also easy.
● The central system (Hub or Switch) requires more maintenance because of its maximum
utilization.
● A hub instead of a switch can reduce the device cost but leads to privacy compromise (because
the Hub does broadcasting).
● It requires extra hardware (usually a Hub or Switch) that might make the topology costlier
than the ring topology.
5. Tree Topology:
This topology is an extended version of the star topology and uses a hierarchical tree-like
structure by branching into a more complex network. Designing and maintaining a tree
topology is easy and is suitable for large networks. Because of its high scalability and easy-
to-troubleshoot feature, large enterprises and organizations use it to design their networks.
Figure: 28
6. Mesh Topology:
In this topology, each node or system can connect to the other directly and indirectly.
Network administrators can set multiple paths (directly or indirectly) to connect two or
more systems. Mesh topology is of two types: a. Full mesh: In this connected mesh, each
system remains connected to all other systems within the network. b. Partial mesh: In this
connected mesh, at least two systems will remain connected to all other systems.
Figure: 29
7. Hybrid Topology:
Hybrid topology, as the name suggests, is a mixture of two or more mentioned
topologies. Network engineers and administrators prefer to leverage the benefits of
different topologies into one using the hybrid topology. Practically, it is the most widely
implemented topology. It gives flexibility to the network administrators to determine
which topological combination to use, depending on the requirement.
Figure: 30
Advantages of Hybrid Topology:
● Such topologies are flexible to implement and configure.
● By combining the different topology types, network architects and engineers can leverage the
benefits of multiple topologies wherever necessary.
● It has the potential to endure a large volume of traffic.
● The speed of the topologies went faster when two or more topologies get appropriately
configured.
● They help create large enterprise networks with full customization.
Experiment No. 05
Experiment Title - Creating a LAN using a Hub and a Switch in Cisco Packet Tracer.
Concept Theory
In a LAN (Local Area Network), devices such as computers, printers, and servers are connected
together within a small geographic area, such as a building or campus. A hub and a switch are two
types of network devices that can be used to connect devices in a LAN.
A hub is a simple device that receives data packets from one device and broadcasts them to all
other devices connected to the hub. This means that all devices connected to the hub receive all
data packets, even if the packets are not intended for them. This can lead to network congestion
and slower network speeds.
Procedure- To create a LAN using a hub and a switch in Cisco Packet Tracer, follow these steps:
Step 1: Open Cisco Packet Tracer and select the "New" option to create a new project.
Step 2: From the left panel, select "End Devices" and drag and drop two PCs onto the workspace.
Step 3: From the left panel, select "Hub" and drag and drop it onto the workspace.
Step 4: Connect the two PCs to the hub by selecting the copper straight-through cable from the left
panel and dragging it from the PC's Ethernet port to the hub's port.
Step 5: From the left panel, select "Switch" and drag and drop it onto the workspace.
Step 6: Connect the switch to the hub by selecting the copper straight-through cable from the left
panel and dragging it from one of the switch's ports to the hub's port.
Step 7: Connect one of the PCs to the switch by selecting the copper straight-through cable from
the left panel and dragging it from the PC's Ethernet port to one of the switch's ports.
Step 8: Click on the hub and switch to configure their settings, such as the IP address, subnet mask,
and default gateway.
Step 9: Save the project by selecting "File" and then "Save" from the top menu.
Figure: 31
Figure: 32
Experiment No. 06
Experiment Title - Connecting two LAN through Cisco packet Tracer.
Concept Theory
Connecting two LANs (Local Area Networks) can be done using a variety of methods, such as
using routers or switches with routing capabilities. Cisco Packet Tracer is a simulation tool that
can be used to create and configure network devices to connect multiple LANs.
Procedure-To connect two LANs in Cisco Packet Tracer, you can follow these general steps:
Step 1: Create two LANs with different IP address ranges, subnet masks, and default gateways.
For example, LAN A could have an IP address range of 192.168.1.1 to 192.168.1.254 with a subnet
mask of 255.255.255.0 and a default gateway of 192.168.1.1. LAN B could have an IP address
range of 192.168.2.1 to 192.168.2.254 with a subnet mask of 255.255.255.0 and a default gateway
of 192.168.2.1.
Step 2: Connect a router to each LAN. The routers should have at least two Ethernet ports each,
one for each LAN.
Step 3: Configure the IP addresses, subnet masks, and default gateways for each router interface.
Step 4: Configure static routes on each router to direct traffic between the two LANs. For example,
on Router A, you would add a static route for the LAN B network to be sent to the Router B
interface connected to LAN A. On Router B, you would add a static route for the LAN A network
to be sent to the Router A interface connected to LAN B.
Output
Figure: 33
Experiment No. 07
Experiment Title - Study of basic network command and Network configuration
commands.
Concept Theory
1. Ping: Ping is a basic network command that is used to test the connectivity between two
devices on a network. The ping command sends a small packet of data to the destination
device and waits for a response. If a response is received, it means that the destination
device is reachable and the network connection is working.
2. Tracert/Trace Route: The tracert (Windows) or traceroute (Linux and macOS) command
is used to trace the route taken by packets sent from a source device to a destination device.
It shows the path that packets take through the network, including the number of hops, IP
addresses, and response times of each device in the path.
3. Ipconfig/ifconfig: The ipconfig command is used in Windows and the ifconfig command
is used in Linux and macOS to display information about the IP configuration of a device.
This includes the IP address, subnet mask, default gateway, and DNS server information.
4. Netstat: The netstat command is used to display active network connections, listening
ports, and network statistics on a device.
5. Nslookup: The nslookup command is used to query the Domain Name System (DNS) to
resolve a domain name into an IP address. This is useful for troubleshooting network
connectivity issues.
Solution –
1. Ping
Figure: 34
2. Tracert
Figure: 35
3. ipconfig
Figure: 36
4. Netstat
Figure: 37
5. Nslookup
Figure: 38
Experiment No. 08
Experiment Title - Implement & simulate various types of routing algorithm.
Concept Theory
A routing algorithm is a procedure that lays down the route or path to transfer data packets from
source to the destination. They help in directing Internet traffic efficiently. After a data packet
leaves its source, it can choose among the many different paths to reach its destination. Routing
algorithm mathematically computes the best path, i.e. “least – cost path” that the packet can be
routed through.
Static Routing :
Figure: 39
Figure: 40
Experiment No. 09
Enrolment No.:0827AL211016 Page No. 50
Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602
Experiment Title - Study & Simulation of MAC Protocols like Aloha, CSMA, CSMA/CD
and CSMA/CA using Standard Network Simulators.
Concept Theory
MAC Protocols :
When a sender and receiver have a dedicated link to transmit data packets, the data link control is
enough to handle the channel. Suppose there is no dedicated path to communicate or transfer the
data between two devices. In that case, multiple stations access the channel and simultaneously
transmit the data over the channel. It may create collisions and cross talk. Hence, the multiple
access protocol is required to reduce the collision and avoid crosstalk between the channels.
● Pure Aloha
Whenever data is available for sending over a channel at stations, we use Pure Aloha. In
pure Aloha, when each station transmits data to a channel without checking whether the
channel is idle or not, the chances of collision may occur, and the data frame can be lost.
When any station transmits the data frame to a channel, the pure Aloha waits for the
receiver's acknowledgment. If it does not acknowledge the receiver end within the specified
time, the station waits for a random amount of time, called the backoff time (Tb). And the
station may assume the frame has been lost or destroyed. Therefore, it retransmits the frame
until all the data are successfully transmitted to the receiver.
● Slotted Aloha
The slotted Aloha is designed to overcome the pure Aloha's efficiency because pure Aloha
has a very high possibility of frame hitting. In slotted Aloha, the shared channel is divided
into a fixed time interval called slots. So that, if a station wants to send a frame to a shared
channel, the frame can only be sent at the beginning of the slot, and only one frame is
allowed to be sent to each slot. And if the stations are unable to send data to the beginning
of the slot, the station will have to wait until the beginning of the slot for the next time.
However, the possibility of a collision remains when trying to send a frame at the beginning
of two or more station time slot.
CSMA/ CD
It is a carrier sense multiple access/ collision detection network protocol to transmit data frames.
The CSMA/CD protocol works with a medium access control layer. Therefore, it first senses the
shared channel before broadcasting the frames, and if the channel is idle, it transmits a frame to
check whether the transmission was successful. If the frame is successfully received, the station
sends another frame. If any collision is detected in the CSMA/CD, the station sends a jam/ stop
signal to the shared channel to terminate data transmission. After that, it waits for a random time
before sending a frame to a channel.
CSMA/ CA
It is a carrier sense multiple access/collision avoidance network protocol for carrier transmission
of data frames. It is a protocol that works with a medium access control layer. When a data frame
is sent to a channel, it receives an acknowledgment to check whether the channel is clear. If the
station receives only a single (own) acknowledgments, that means the data frame has been
Enrolment No.:0827AL211016 Page No. 52
Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602
successfully transmitted to the receiver. But if it gets two signals (its own and one more in which
the collision of frames), a collision of the frame occurs in the shared channel. Detects the collision
of the frame when a sender receives an acknowledgment signal.
Experiment No. 10
Experiment Title - Study of Application layer protocols-DNS, HTTP, HTTPS, FTP and
TelNet.
Concept Theory
Application layer protocols define how application processes (clients and servers), running on
different end systems, pass messages to each other. In particular, an application layer is an abstract
layer that handles the sharing protocol of the TCP/IP and OSI model.
● TELNET
Telnet stands for the TELetype NETwork. It helps in terminal emulation. It allows Telnet
clients to access the resources of the Telnet server. It is used for managing files on the
internet. It is used for the initial setup of devices like switches. The telnet command is a
command that uses the Telnet protocol to communicate with a remote device or system.
Port number of telnet is 23.
● FTP
FTP stands for file transfer protocol. It is the protocol that actually lets us transfer files. It
can facilitate this between any two machines using it. But FTP is not just a protocol but it
is also a program.FTP promotes sharing of files via remote computers with reliable and
efficient data transfer. The Port number for FTP is 20 for data and 21 for control.
● DNS
It stands for Domain Name System. Every time you use a domain name, therefore, a DNS
service must translate the name into the corresponding IP address. For example, the domain
name www.abc.com might translate to 198.105.232.4.
The Port number for DNS is 53.
● HTTP
An HTTP stands for Hypertext Transfer Protocol. The HTTP protocol provides
communication between different communication systems. When the user makes an HTTP
request on the browser, then the web server sends the requested data to the user in the form
of web pages. In short, we can say that the HTTP protocol allows us to transfer the data
from the server to the client.
● HTTPS
The full form of HTTPS is Hypertext Transfer Protocol Secure. The HTTP protocol does
not provide the security of the data, while HTTP ensures the security of the data. Therefore,
we can say that HTTPS is a secure version of the HTTP protocol. This protocol allows
transferring the data in an encrypted form. The use of HTTPS protocol is mainly required
where we need to enter the bank account details. The HTTPS protocol is mainly used where
it is required to enter the login credentials. In modern browsers such as chrome, both the
protocols, i.e., HTTP and HTTPS, are marked differently.