Ansh CN

Download as pdf or txt
Download as pdf or txt
You are on page 1of 62

2023-24

Acropolis Institute of
Technology and
Research, Indore Department of CSE

(Artificial Intelligence & Machine


Learning)

Computer Network (AL602)

Submitted To: Submitted By:


Asst. Prof. Shilpa Barkalle Name of Student: Ansh Dube
Enrollment No.: 0827AL211016
Class/Year/Sem: AIML/3rd / 6th

[LAB ASSIGNMENT COMPUTER NETWORK (AL-602)]


ACROPOLIS INSTITUTE OF TECHNOLOGY & RESEARCH,
INDORE

Department of CSE (Artificial Intelligence & Machine Learning)

CERTIFICATE

This is to certify that the experimental work entered in this journal as per

the B. TECH. III year syllabus prescribed by the RGPV was done by Ms.

Ansh DubeB.TECH III year VI semester in the Computer Network

Laboratory of this institute during the academic year 2023- 2024.

Signature of the Faculty


ABOUT THE LABORATORY

In this lab, this course provides students with hands on training regarding the design,
troubleshooting, modeling and evaluation of computer networks. In this course,
students are going to experiment in real test-bed networking environment and learn
about network design and troubleshooting topics and tools such as: network
addressing, MAC Protocols like Aloha, CSMA, CSMA/CD and CSMA/CA ,Address
Resolution Protocol (ARP), basic troubleshooting tools (e.g, ping, ICAM), IP
routing (e.g, RIP), route discovery (e.g. traceroute), DNS, HTTP, HTTPS, FTP and
TelNet and may others.
Hardware and Software Requirements
Sr. No. Software Requirements Hardware Requirements
1 Cisco Packet Tracer 8.2 One of the following operating
systems: Microsoft Windows 8.1,
10, 11 (64bit), Ubuntu 20.04, 22.04
LTS (64bit) or macOS 10.

2 amd64(x86-64) CPU
3 4GB of free RAM
1.4 GB of free disk space

General Instructions for Laboratory Classes


DO’S
1. Without Prior permission do not enter the Laboratory.
2. While entering the LAB students should wear their ID cards.
3. The students should come with proper uniform.
4. Students should sign in the LOGIN REGISTER before entering the laboratory.
5. Students should come with observation and record notebook to the laboratory.
6. Students should maintain silence inside the laboratory.
7. After completing the laboratory exercise, make sure to shut down the system properly.

DONT’S
1. Students bringing the bags inside the laboratory.
2. Students using the computers in an improper way.
3. Students scribbling on the desk and mishandling the chairs.
4. Students using mobile phones inside the laboratory.
5. Students making noise inside the laboratory.
PREREQUISITE:-
An introduction to the design and analysis of computer communication networks.

COURSE OBJECTIVES AND OUTCOMES

◻ Course Objectives
1. Build an understanding of the fundamental concepts of computer networking.
2. Familiarize the student with the basic taxonomy and terminology of the
computer networking area.
3. Introduce the student to advanced networking concepts, preparing the student
for entry Advanced courses in computer networking.
4. Identify the different types of network topologies and protocols.

 Course Outcomes
At the end of the course student will be able to:

1. To establish communicate among computers in the network using various network


hardware components.
2. Simulating various network topologies and designing
3. Implementation of various routing techniques.
4. Identification and Implement the various protocols for establishing the network
using simulation tools like Cisco Packet Tracer.

.
Index

Grade &
Date of Page Date of
S.No Name of the Experiment Sign of the
Exp. No. Submission
Faculty
1 26/03/24 Study of Different type of Network cables. 01 28/03/24

2 02/04/24 Study of all Network and Network Devices in 10 04/04/24


detail.
3 04/04/24
Study of Network IP. 24 09/04/24

4 09/04/24 Study and configures all topology using packet 29 16/04/24


Tracer software.

5 16/04/24 Creating a LAN using a Hub and a Switch in 39 18/04/24


Cisco Packet Tracer.

6 23/04/24 Connecting two LAN through Cisco packet 42 25/04/24


Tracer.

7 30/04/24 Study of basic network command and Network 44 02/05/24


Configuration commands.

8 02/05/24 Implement & simulate various types of routing 48 07/05/24


algorithm.
9 07/05/24 Study & Simulation of MAC Protocols like Aloha, 50 09/05/24
CSMA, CSMA/CD and CSMA/CA using Standard
Network Simulators.

10 09/05/24 Study of Application layer protocols-DNS, HTTP, 53 16/05/24


HTTPS, FTP and TelNet.
Program Outcome (PO)

The engineering graduate of this institute will demonstrate:


a) Apply knowledge of mathematics, science, computing and engineering fundamentals to
computer science engineering problems.
b) Able to identify, formulate, and demonstrate with excellent programming, and problem
solving skills.
c) Design solutions for engineering problems including design of experiment and processes
to meet desired needs within reasonable constraints of manufacturability, sustainability,
ecological, intellectual and health and safety considerations.
d) Propose and develop effective investigational solution of complex problems using
research methodology; including design of experiment, analysis and interpretation of
data, and combination of information to provide suitable conclusion. synthesis
e) Ability to create, select and use the modern techniques and various tools to solve
engineering problems and to evaluate solutions with an understanding of the limitations.
f) Ability to acquire knowledge of contemporary issues to assess societal, health and
safety, legal and cultural issues.
g) Ability to evaluate the impact of engineering solutions on individual as well as
organization in a societal and environmental context, and recognize sustainable
development, and will be aware of emerging technologies and current professional issues.
h) Capability to possess leadership and managerial skills, and understand and commit to
professional ethics and responsibilities.
i) Ability to demonstrate the team work and function effectively as an individual, with an
ability to design, develop, test and debug the project, and will be able to work with a
multi-disciplinary team.
j) Ability to communicate effectively on engineering problems with the community, such
as being able to write effective reports and design documentation.
k) Flexibility to feel the recognition of the need for, and have the ability to engage in
independent and life- long learning by professional development and quality
enhancement programs in context of technological change.
l) A practice of engineering and management principles and apply these to one’s own
work, as a member and leader in a team, to manage projects and entrepreneurship
Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Experiment No. 01
Experiment Title - Study of Different types of Network cables.

Concept Theory
Network Cables :
Network Cable is the medium through which information usually moves from one network device
to another. There are several types of cable which are commonly used with LANs. In some cases,
a network will utilize only one type of cable, other networks will use a variety of cable types. The
type of cable chosen for a network is related to the network's topology, protocol, and size.
Understanding the characteristics of different types of cable and how they relate to other aspects
of a network is necessary for the development of a successful network.

Types of Network Cables :


1. Coaxial cable
This cable contains a conductor, insulator, braiding, and sheath. The sheath covers the
braiding, the braiding covers the insulation, and the insulation covers the conductor.

Figure: 1

Enrolment No.:0827AL211016 Page No. 1


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Components of Coaxial Cable :


● Sheath
This is the outer layer of the coaxial cable. It protects the cable from physical
damage.
● Braided shield
This shield protects signals from external interference and noise. This shield is built
from the same metal that is used to build the core.
● Insulation
Insulation protects the core. It also keeps the core separate from the braided shield.
Since both the core and the braided shield use the same metal, without this layer,
they will touch each other and create a short-circuit in the wire.
● Conductor
The conductor carries electromagnetic signals. Based on the conductor a coaxial
cable can be categorized into two types; single-core coaxial cable and multi-core
coaxial cable.

A single-core coaxial cable uses a single central metal (usually copper) conductor, while a
multi-core coaxial cable uses multiple thin strands of metal wires. The following image
shows both types of cable.

Figure : 2
The coaxial cables were not primarily developed for the computer network. These cables were
developed for general purposes. They were in use even before computer networks came into
existence. They are still used even their use in computer networks has been completely

Enrolment No.:0827AL211016 Page No. 2


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

discontinued.At the beginning of computer networking, when there were no dedicated media
cables available for computer networks, network administrators began using coaxial cables to build
computer networks.Because of its low cost and long durability, coaxial cables were used in
computer networking for nearly two decades (the 80s and 90s). Coaxial cables are no longer used
to build any type of computer network.

Specification of Coaxial Cables :

Type Ohms AWG Conductor Description

RG-6 75 18 Solid copper Used in cable networks to provide cable Internet


service and cable TV over long distances.

RG-8 50 10 Solid copper Used in the earliest computer networks. This cable
was used as the backbone cable in the bus topology.
In Ethernet standards, this cable is documented as the
10base5 Thicknet cable.

RG- 50 24 Several thin This cable is thinner, easier to handle and install than
58 strands of the RG-8 cable. This cable was used to connect a
copper system with the backbone cable. In Ethernet
standards, this cable is documented as the 10base2
Thinnet cable.

RG- 75 20 - Solid copper Used in cable networks to provide short-distance


59 22 service.

Table: 1
2. Twisted-pair cables
The twisted-pair cable was primarily developed for computer networks. This cable is also
known as Ethernet cable. Almost all modern LAN computer networks use this cable. This
cable consists of color-coded pairs of insulated copper wires. Every two wires are twisted

Enrolment No.:0827AL211016 Page No. 3


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

around each other to form a pair. Usually, there are four pairs. Each pair has one solid color
and one striped color wire. Solid colors are blue, brown, green, and orange. In striped color,
the solid color is mixed with the white color.
Based on how pairs are stripped in the plastic sheath, there are two types of twisted-pair
cable; UTP and STP.
In the UTP (Unshielded twisted-pair) cable, all pairs are wrapped in a single plastic sheath.
In the STP (Shielded twisted-pair) cable, each pair is wrapped with an additional metal
shield, then all pairs are wrapped in a single outer plastic sheath.

Figure: 3

Category/ Maximum Bandwidth/ Ethernet Description


Name of Supported Support Standard
Cable Speed Signals
Rate

Enrolment No.:0827AL211016 Page No. 4


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Cat 1 1Mbps 1MHz Not used This cable contains only two pairs (4
for data wires). This cable was used in the
telephone network for voice
transmission.

Cat 2 4Mbps 10MHz Token This cable and all further cables have a
Ring minimum of 8 wires (4 pairs). This
cable was used in the token-ring
network.

Cat 3 10Mbps 16MHz 10BASE- This is the first Ethernet cable that was
T Ethernet used in LAN networks.

Cat 4 20Mbps 20MHz Token This cable was used in advanced Token-
Ring ring networks.

Cat 5 100Mbps 100MHz 100BASE This cable was used in advanced (fast)
-T LAN networks.
Ethernet

Cat 5e 1000Mbps 100MHz 1000BAS This cable/category is the minimum


E-T requirement for all modern LAN
Ethernet networks.

Cat 6 10Gbps 250MHz 10GBASE This cable uses a plastic core to prevent
-T cross-talk between twisted-pair. It also
Ethernet uses a fire-resistant plastic sheath.

Cat 6a 10Gbps 500MHz 10GBASE This cable reduces attenuation and


-T cross-talk. This cable also potentially
Ethernet removes the length limit. This is the
recommended cable for all modern
Ethernet LAN networks.

Enrolment No.:0827AL211016 Page No. 5


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Cat 7 10Gbps 600MHz Not This cable sets a base for further
drafted development. This cable uses multiple
yet twisted-pair and shields each pair by its
plastic sheath.

Table: 2
● Cat 1, 2, 3, 4, 5 are outdated and not used in any modern LAN network.
● Cat 7 is still a new technology and not commonly used.
● Cat 5e, 6, 6a are the commonly used twisted-pair cables.

3. Fiber optic cable


This cable consists of a core, cladding, buffer, and jacket. The core is made from thin
strands of glass or plastic that can carry data over a long distance. The core is wrapped in
the cladding; the cladding is wrapped in the buffer, and the buffer is wrapped in the jacket.
● Core carries the data signals in the form of light.
● Cladding reflects light back to the core.
● Buffer protects the light from leaking.
● The jacket protects the cable from physical damage.
Fiber optic cable is completely immune to EMI and RFI. This cable can transmit data over
a long distance at the highest speed. It can transmit data up to 40 kilometers at the speed of
100Gbps.
Fiber optic uses light to send data. It reflects light from one endpoint to another. Based on
how many beams of light are transmitted at a given time, there are two types of fiber optical
cable; SMF and MMF.

Enrolment No.:0827AL211016 Page No. 6


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Figure: 4
SMF (Single-mode fiber) optical cable
This cable carries only a single beam of light. This is more reliable and supports much
higher bandwidth and longer distances than the MMF cable. This cable uses a laser as the
light source and transmits 1300 or 1550 nano-meter wavelengths of light.

MMF (multi-mode fiber) optical cable


This cable carries multiple beams of light. Because of multiple beams, this cable carries
much more data than the SMF cable. This cable is used for shorter distances. This cable
uses an LED as the light source and transmits 850 or 1300 nano-meter wavelengths of
light.

Installing Cable Guidelines


When running cable, it is best to follow a few simple rules:
1. Always use more cable than you need. Leave plenty of slack.
2. Test every part of a network as you install it. Even if it is brand new, it may have problems
that will be difficult to isolate later.
3. Stay at least 3 feet away from fluorescent light boxes and other sources of electrical
interference.
Enrolment No.:0827AL211016 Page No. 7
Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

4. If it is necessary to run cable across the floor, cover the cable with cable protectors.
5. Label both ends of each cable.
6. Use cable ties (not tape) to keep cables in the same location together.

Practical Implementation :
Step 1: Use your cable strippers at about 1-2 inches from the end of the cable to remove the outer
jacket.

Step 2: Untwist the twisted pair wires all the way back to the jacket. This can be done just like a
regular twist-tie on a loaf of bread, but with four of them of different colors.

Step 3: Align the untwisted wires in the order necessary for your needs.

Step 4: Cut the extra wire. Once you've untwisted the wires, you'll have a superfluous amount of
copper wiring left; we don't need this much. Use the wire-cutting scissors to cut these off.

Step 5: Push the remaining wires into the RJ45 head according to color code. Be careful not to
bend the wires while pushing them in or you run the risk of creating a bad cable.

Step 6: Push the connector inside the crimping tool and squeeze the crimper all the way down.

Step 7: Repeat steps 1-6 for the other end of the cable.

Step 8: To make sure you've successfully terminated each end of the cable, use a cable tester to
test each pin.

Diagram of straight wired connection

Enrolment No.:0827AL211016 Page No. 8


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Figure: 5

Enrolment No.:0827AL211016 Page No. 9


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Diagram of cross wired connection

Figure: 6

Enrolment No.:0827AL211016 Page No. 10


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Experiment No. 02
Experiment Title - Study of all Network and Network Devices in detail.

Concept Theory
Computer Network
Computer Network is a group of computers connected with each other through wires, optical fibres
or optical links so that various devices can interact with each other through a network. The aim of
the computer network is the sharing of resources among various devices. In the case of computer
network technology, there are several types of networks that vary from simple to complex level.

Figure: 7

Types of computer network


1. Personal Area Network
A Personal Area Network (PAN) is the smallest network which is very personal to a user.
This may include Bluetooth enabled devices or infra-red enabled devices. PAN has
connectivity range up to 10 meters. PAN may include wireless computer keyboard and
mouse, Bluetooth enabled headphones, wireless printers and TV remotes.

Enrolment No.:0827AL211016 Page No. 11


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Figure: 8
Characteristics of PAN
● It is mostly a personal devices network equipped within a limited area.
● Allows you to handle the interconnection of IT devices at the surroundings of a
single user.
● PAN includes mobile devices, tablet, and laptop.
● It can be wirelessly connected to the internet called WPAN.
● Appliances used for PAN: cordless mice, keyboards, and Bluetooth systems.

Advantages of PAN
● PAN networks are relatively secure and safe
● It offers only short-range solution up to ten meters
● Strictly restricted to a small area

Disadvantages of PAN
● It may establish a bad connection to other networks at the same radio bands.
● Distance limits.

2. Local Area Network


A Local Area Network (LAN) is a group of computer and peripheral devices which are
connected in a limited area such as school, laboratory, home, and office building. It is a
Enrolment No.:0827AL211016 Page No. 12
Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

widely useful network for sharing resources like files, printers, games, and other
applications. The simplest type of LAN network is to connect computers and a printer in
someone’s home or office. In general, LAN will be used as one type of transmission
medium. It is a network which consists of less than 5000 interconnected devices across
several buildings.

Figure: 9
Characteristics of LAN
● It is a private network, so an outside regulatory body never controls it.
● LAN operates at a relatively higher speed compared to other WAN systems.
● There are various kinds of media access control methods like token ring and
ethernet.

Advantages of LAN
● Computer resources like hard-disks, DVD-ROM, and printers can share local area
networks. This significantly reduces the cost of hardware purchases.
● You can use the same software over the network instead of purchasing the licensed
software for each client in the network.
● Data of all network users can be stored on a single hard disk of the server computer.

Enrolment No.:0827AL211016 Page No. 13


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

● You can easily transfer data and messages over networked computers.
● It will be easy to manage data at only one place, which makes data more secure.

Disadvantages of LAN
● LAN will indeed save cost because of shared computer resources, but the initial
cost of installing Local Area Networks is quite high.
● The LAN admin can check personal data files of every LAN user, so it does not
offer good privacy.
● Unauthorized users can access critical data of an organization in case LAN admin
is not able to secure a centralized data repository.
● Local Area Network requires a constant LAN administration as there are issues
related to software setup and hardware failures

3. Metropolitan Area Network


The Metropolitan Area Network (MAN) generally expands throughout a city such as a
cable TV network. It can be in the form of Ethernet,Token-ring, ATM, or Fiber Distributed
Data Interface (FDDI). Metro Ethernet is a service which is provided by ISPs. This service
enables its users to expand their Local Area Networks. For example, MAN can help an
organization to connect all of its offices in a city. Backbone of MAN is high-capacity and
high-speed fiber optics. MAN works in between Local Area Network and Wide Area
Network. MAN provides uplink for LANs to WANs or the internet.

Characteristics of MAN
● It mostly covers towns and cities in a maximum 50 km range
● Mostly used medium is optical fibers, cables
● Data rates adequate for distributed computing applications.

Enrolment No.:0827AL211016 Page No. 14


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Figure: 10

Advantages of MAN
● It offers fast communication using high-speed carriers, like fiber optic cables.
● It provides excellent support for an extensive size network and greater access to
WANs.
● The dual bus in MAN network provides support to transmit data in both directions
concurrently.
● A MAN network mostly includes some areas of a city or an entire city.

Disadvantages of MAN
● You need more cable to establish a MAN connection from one place to another.
● In MAN network it is tough to make the system secure from hackers

4. Wide Area Network


As the name suggests,the Wide Area Network (WAN) covers a wide area which may span
across provinces and even a whole country. Generally, telecommunication networks are
Wide Area Networks. These networks provide connectivity to MANs and LANs. Since
they are equipped with a very high speed backbone, WANs use very expensive network
equipment.WAN may use advanced technologies such as Asynchronous Transfer Mode
(ATM), Frame Relay, and Synchronous Optical Network (SONET).

Enrolment No.:0827AL211016 Page No. 15


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Characteristics of WAN
● The software files will be shared among all the users; therefore, all can access the
latest files.
● Any organization can form its global integrated network using WAN.

Figure: 11

Advantages of WAN
● WAN helps you to cover a larger geographical area. Therefore business offices
situated at longer distances can easily communicate.
● Contains devices like mobile phones, laptop, tablet, computers, gaming consoles,
etc.
● WLAN connections work using radio transmitters and receivers built into client
devices.

Disadvantages of WAN
● The initial setup cost of investment is very high.
● It is difficult to maintain the WAN network. You need skilled technicians and
network administrators.
● There are more errors and issues because of the wide coverage and the use of
different technologies.

Enrolment No.:0827AL211016 Page No. 16


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

● It requires more time to resolve issues because of the involvement of multiple wired
and wireless technologies.
● Offers lower security compared to other types of network in computers.

5. Storage Area Network (SAN) :


SAN is a type of computer network that is high speed and connects groups of storage
devices to several servers. This network does not depend on LAN or WAN.. Instead, a
SAN moves the storage resources from the network to its own high-powered network. A
SAN provides access to block-level data storage.

Examples of SAN are a network of disks accessed by a network of servers.

Figure: 12

6. System Area Network (SAN) :


A SAN is a type of computer network that connects a cluster of high-performance
computers. It is a connection-oriented and high bandwidth network. A SAN is a
type of LAN that handles high amounts of information in large requests. This

Enrolment No.:0827AL211016 Page No. 17


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

network is useful for processing applications that require high network


performance.
Microsoft SQL Server 2005 uses SAN through a virtual interface adapter.

Figure: 13
7. Virtual Private Network (VPN) :
A VPN is a type of computer network that extends a private network across the internet
and lets the user send and receive data as if they were connected to a private network even
though they are not. Through a virtual point-to-point connection users can access a private
network remotely. VPN protects you from malicious sources by operating as a medium
that gives you a protected network connection.

Figure: 14

Enrolment No.:0827AL211016 Page No. 18


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Networking Devices
Network devices are physical devices that enable communication and interaction between
hardware on a computer network. Network devices are building blocks that permit
communication between services and the endpoints that consume those services.
In other words, they're connectors that allow devices on a network to communicate with
one another. Enabling communication on a network means anything that helps data get
from source to destination.
When a network contains a large number of devices, too many data packets are transmitted
over the same network path. This can cause congestion and performance reduction. The
goal of networking devices is to provide for smooth communication between various
hardware linked to a network. Adding a network device facilitates the seamless sharing of
network resources between different systems.

Figure : 15

Types Of Network Devices


1. Hub
A hub is a physical-layer device that acts on individual bits rather than frames.
When a bit, representing a zero or a one, arrives from one interface, the hub simply
recreates the bit, boosts its energy strength, and transmits the bit into all the other

Enrolment No.:0827AL211016 Page No. 19


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

interfaces. Whenever a hub receives a bit from one of its interfaces, it sends a copy
to all other interfaces.
In particular, if a hub receives frames from two different interfaces at the same time
, a collision occurs, and the nodes that created the frames must retransmit. A
network hub does not have routing tables or intelligence that is utilized to transfer
information and disseminate all network data across all connections.
Flooding is a simple computer network routing technique in which a source or node
sends packets through every outgoing link. The flooding algorithm is easy to
implement. The hubs use the flooding algorithm to forward data.

Figure: 16
2. Switch
A switch is a multiport network device with a buffer and design that can improve
its efficiency (having a large number of ports means less traffic) and performance.
A switch is a networking device that operates at the data link layer. A switch has
numerous ports into which computers can be plugged. When a data frame arrives
at any network switch port, it evaluates the destination address(destination MAC
address ), performs the necessary checks, and sends the frame to the associated
device. The switch performs error checking before forwarding the data, making it
very efficient because it does not forward packets with errors and only forwards
good packets to the correct port.
Enrolment No.:0827AL211016 Page No. 20
Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

The working of the switch can easily be illustrated by the diagram given below in
which Host A wants to send some data to Host B.

Figure: 17

3. Router
A router is a network device similar to a switch that routes data packets based on
their IP addresses . The router is primarily a Network Layer device. A router is also
known as an intelligent device because it can automatically calculate the best route
to pass network packets from source to destination. A router examines a data
packet's destination IP address and uses headers and forwarding tables to determine
the best way to transfer the packets. It communicates between two or more
networks using protocols such as ICMP.

Enrolment No.:0827AL211016 Page No. 21


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Figure: 18
4. Bridge
A bridge is a network device that operates at the data link layer device. A bridge is
a repeater with the added functionality of filtering content by reading the MAC
addresses of the source and destination. It is also used to connect two LANs that
use the same protocol. It has a single input and output port, making it a two-port
device.

Figure: 19

5. Gateway
A gateway is a network node in telecommunications that connects two networks
that use different transmission protocols. Gateways serve as network entry and exit
points because all data must pass through or communicate with the gateway before
being routed. Traffic that does not go through at least one gateway in most IP-based
networks is traffic between the nodes on the same local area network (LAN)
segment. The primary benefit of using a gateway in personal or business scenarios
is that it consolidates internet connectivity into a single device.

Enrolment No.:0827AL211016 Page No. 22


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Figure: 20
6. Modem
A modem is a network device that modulates and demodulates analog carrier
signals (known as sine waves) to encode and decode digital data for processing.
Because modems perform both of these tasks simultaneously, the term modem is a
combination of "modulate" and "demodulate".

Figure: 21

7. Repeater
A repeater is a two-port device that operates at the physical layer . It is used to
regenerate the signal over the same network before it becomes too weak or
corrupted, allowing the signal to be transmitted for a longer distance over the same
network. It is important to understand that repeaters do not amplify the signal.
When the signal weakens, repeaters copy it bit by bit and regenerate it at its original
strength.

Figure: 22
Enrolment No.:0827AL211016 Page No. 23
Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

8. Network Interface Card (NIC)


A network interface card (NIC) is a hardware component without which a computer
cannot be connected over a network. It is a circuit board installed in a computer that
provides a dedicated network connection to the computer. It is also called network
interface controller, network adapter or LAN adapter.

Figure: 23

Enrolment No.:0827AL211016 Page No. 24


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Experiment No. 03
Experiment Title - Study of Network IP.

Concept Theory
An IP address represents an Internet Protocol address. A unique address that identifies the device
over the network. It is almost like a set of rules governing the structure of data sent over the Internet
or through a local network. An IP address helps the Internet to distinguish between different
routers, computers, and websites. It serves as a specific machine identifier in a specific network
and helps to improve visual communication between source and destination.

IP address structure:
IP addresses are displayed as a set of four digits- the default address may be 192.158.1.38. Each
number on the set may range from 0 to 255. Therefore, the total IP address range ranges from
0.0.0.0 to 255.255.255.255.
IP address is basically divided into two parts: X1. X2. X3. X4
1. [X1. X2. X3] is the Network ID
2. [X4] is the Host ID

Network ID
It is the part of the left-hand IP address that identifies the specific network where the device is
located. In the normal home network, where the device has an IP address 192.168.1.32, the
192.168.1 part of the address will be the network ID. It is customary to fill in the last part that is
not zero, so we can say that the device’s network ID is 192.168.1.0.

Hosting ID
The host ID is part of the IP address that was not taken by the network ID. Identifies a specific
device (in the TCP / IP world, we call devices “host”) in that network. Continuing with our

Enrolment No.:0827AL211016 Page No. 25


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

example of the IP address 192.168.1.32, the host ID will be 32- the unique host ID on the
192.168.1.0 network.

Version of IP address:
1. IPV4 (Internet Protocol Version 4):
It is the first version of Internet Protocol address. The address size of IPV4 is 32 bit number.
In this Internet Protocol Security (IPSec) with respect to network security is optional. It is
having 4,294,967,296 number of address still we are seeing a shortage in network addresses
as the use of network & virtual devices are increasing rapidly.
2. IPV6 (Internet Protocol Version 6):
It is the recent version of Internet Protocol address. The address size of IPV6 is 128 bit
number. In this Internet Protocol Security (IPSec) with respect to network security is
mandatory. It allows 3.4 x 10^38 unique IP addresses which seems to be more than
sufficient to support trillions of internet devices present now or coming in future.

IP Address Types:
There are 4 types of IP Addresses- Public, Private, Fixed, and Dynamic. Among them, public and
private addresses are derived from their local network location, which should be used within the
network while public IP is used offline.
1. Public IP address
A public IP address is an Internet Protocol address, encrypted by various servers/devices.
That’s when you connect these devices with your internet connection. This is the same IP
address we show on our homepage. So why the second page? Well, not all people speak
the IP language. We want to make it as easy as possible for everyone to get the information
they need. Some even call this their external IP address. A public Internet Protocol address
is an Internet Protocol address accessed over the Internet. Like the postal address used to
deliver mail to your home, the public Internet Protocol address is a different international
Internet Protocol address assigned to a computer device. The web server, email server, and
any server device that has direct access to the Internet are those who will enter the public
Enrolment No.:0827AL211016 Page No. 26
Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Internet Protocol address. Internet Address Protocol is unique worldwide and is only
supplied with a unique device.
2. Private IP address
Everything that connects to your Internet network has a private IP address. This includes
computers, smartphones, and tablets but also any Bluetooth-enabled devices such as
speakers, printers, or smart TVs. With the growing internet of things, the number of private
IP addresses you have at home is likely to increase. Your router needs a way to identify
these things separately, and most things need a way to get to know each other. Therefore,
your router generates private IP addresses that are unique identifiers for each device that
separates the network.
3. Static IP Address
A static IP address is an invalid IP address. Conversely, a dynamic IP address will be
provided by the Dynamic Host Configuration Protocol (DHCP) server, which can change.
The Static IP address does not change but can be changed as part of normal network
management.
Static IP addresses are incompatible, given once, remain the same over the years. This type
of IP also helps you get more information about the device.
4. Dynamic IP address
It means constant change. A dynamic IP address changes from time to time and is not
always the same. If you have a live cable or DSL service, you may have a strong IP address.
Internet Service Providers provide customers with dynamic IP addresses because they are
too expensive. Instead of one permanent IP address, your IP address is taken out of the
address pool and assigned to you. After a few days, weeks, or sometimes even months, that
number is returned to the lake and given a new number. Most ISPs will not provide a static
IP address to customers who live there and when they do, they are usually more expensive.
Dynamic IP addresses are annoying, but with the right software, you can navigate easily
and for free.

Enrolment No.:0827AL211016 Page No. 27


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Types of Website IP address:


1. Dedicated IP address
A dedicated IP address is one that is unique for each website. This address is not used by
any other domain. A dedicated IP address is beneficial in many ways. It provides increased
speed when the traffic load is high and brings in increased security. But dedicated IPs are
costly as compared to shared IPs.
2. Shared IP address
A shared IP address is one that is not unique. It is shared between multiple domains. A
shared IP address is enough for most users because common configurations don’t require
a dedicated IP.

IP Address Classification Based on Operational Characteristics:


1. Broadcast addressing
The term ‘Broadcast’ means to transmit audio or video over a network. A broadcast packet
is sent to all users of a local network at once. They do not have to be explicitly named as
recipients. The users of a network can open the data packets and then interpret the
information, carry out the instructions or discard it. This service is available in IPv4. The
IP address commonly used for broadcasting is 255.255.255.255
2. Unicast addressing
This address identifies a unique node on the network. Unicast is nothing but one-to-one
data transmission from one point in the network to another. It is the most common form of
IP addressing. This method can be used for both sending and receiving data. It is available
in IPv4 and IPv6.
3. Multicast IP addresses
These IP addresses mainly help to establish one-to-many communication. Multicast IP
routing protocols are used to distribute data to multiple recipients. The class D addresses
(224.0.0.0 to 239.255.255.255) define the multicast group.

Enrolment No.:0827AL211016 Page No. 28


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

4. Anycast addressing
In anycast addressing the data, a packet is not transmitted to all the receivers on the
network. When a data packet is allocated to an anycast address, it is delivered to the closest
interface that has this anycast address.

Enrolment No.:0827AL211016 Page No. 29


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Experiment No. 04
Experiment Title - Study and configures all topology using packet tracer software.

Concept Theory
Topology :
Network topologies or topologies of the internet architecture define the structuring of computer
networks or how various network components within the computer are connected. In other words,
they are the arrangements of different network nodes and connected lines. The term topology was
derived from the Greek words – "topo" which means "place" and "logos" which means "to study."

Types of Network Topologies :

1. P2P Topology :
We can expand P2P as a Point-to-Point network topology. It is the simplest topology
wherein two nodes, computers, or other network devices remain connected to each other
directly through a piece of cable. The most obvious scenario for creating a P2P network is
connecting two computers via an Ethernet cable (twisted pair cables like UTP Cat 5e, STP
Cat 6e, etc.) in the RJ-45 port.

Figure: 24
Advantages of P2P Topology:

Enrolment No.:0827AL211016 Page No. 30


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

● The construction and maintenance cost of this overall topology is very inexpensive.
● Since the P2P network is not dependent on any centralized system, the two nodes or computers
can independently function with each other.
● It does not require advanced knowledge to set up or design network topologies.
● Troubleshooting is the easiest in such topologies.
● Because of its straightforward structure with limited one-to-one connectivity, the performance
of such topology remains the maximum.

Disadvantages of P2P Topology:


● The resources within the network are not centrally stored and thus are not organized.
● The security postures in P2P topology are very limited.
● There is no way to backup network resources and files, which make them prone to infection
by virus or other malware.
● P2P network activities might expose your confidential details or private information.

2. Bus topology:
It is another simple network topology where the topology uses a common bus or cable
called the backbone to connect all the nodes within the communication system. It uses tap
devices to connect drop lines through which all other computer systems get connected. This
network topology also adds terminators installed at each end of the backbone to avoid the
reflection of signals.

Advantages of Bus Topology:


● It works efficiently when the network is small.
● The length of the bus topology is less than that of other network topologies.
● It is easy to configure due to its simple design.
● Understanding bus topology is easy.
● Expansion is easy just by joining two cables together.
Disadvantages of Bus Topology:
Enrolment No.:0827AL211016 Page No. 31
Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

● If the backbone fails, the entire network topology fails.


● It is not the right choice when it comes to designing large networks.
● Troubleshooting individual devices and their associated cables become a minor challenge.
● Adding unlimited devices to the backbone often slows the entire topology.
● Data packet loss remains high in bus topology.

Figure : 25

3. Ring topology:
As the name suggests, the ring topology is circular and is a modified version of the bus
topology. In this topology, all the system remains connected to the other system on either
side. In other words, there will be two neighbors of the station. The data transmission
occurs in one direction, making the entire network act as a half-duplex. In a dual ring
topology, the data transmission occurs bi-directional.

Advantages of Ring Topology:


● All the systems within the network get equal access to the resources.
● It is less expensive to design this topology and expand it.
● Even if the traffic grows, the token passing technique increases the performance of ring
topology.
● It is easily manageable.
● The topology remains organized in a proper order, which makes it easy to understand.
Enrolment No.:0827AL211016 Page No. 32
Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Figure: 26

Disadvantages of Ring Topology:


● Since it follows a unidirectional data flow, data packets should pass through all the nodes.
● Adding or removing a node is difficult when the network is active. It might also cause issues
in the network.
● Once the ring topology gets created, it is not feasible to scale the design by adding new nodes.
● For communication of one computer with the other, all the computers within the network
should remain on & active.
● Each device requires two ports, which may not always be there.

4. Star Topology:
It has become one of the most straightforward & most prominent network topologies. It is
widespread because of its several advantages. The topology has a centralized system,
usually a switch, which contains multiple ports to connect one system or node with the
other. In this topology design, no direct connection resides between the two systems. All
the communication between multiple systems goes via the switch (central unit). If any
system fails to connect to the centrally located unit/device, it does not impact other systems
connected to it.
Enrolment No.:0827AL211016 Page No. 33
Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Figure: 27
Advantages of Star Topology:
● No data collision occurs in this topology. That makes star topology a high-performing
topology.
● It is very reliable because of its straightforward design structure.
● Fault detection is also easy.
● Each device requires only one port.
● If one system or station disturbs or becomes faulty, it does not affect other systems within the
topology.
● Scalability becomes easy.
● This topological design is less expensive because it requires limited cables and ports.
● Understanding and troubleshooting such a topology is also easy.

Disadvantages of Star Topology:


● If the central device fails or gets corrupt, the entire network goes down or becomes useless.
Enrolment No.:0827AL211016 Page No. 34
Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

● The central system (Hub or Switch) requires more maintenance because of its maximum
utilization.
● A hub instead of a switch can reduce the device cost but leads to privacy compromise (because
the Hub does broadcasting).
● It requires extra hardware (usually a Hub or Switch) that might make the topology costlier
than the ring topology.

5. Tree Topology:
This topology is an extended version of the star topology and uses a hierarchical tree-like
structure by branching into a more complex network. Designing and maintaining a tree
topology is easy and is suitable for large networks. Because of its high scalability and easy-
to-troubleshoot feature, large enterprises and organizations use it to design their networks.

Advantages of Tree Topology:


● Lots of network device vendors support such a topology.
● It follows a hierarchical approach with a centralized arrangement of data.
● It leverages point-to-point wiring for individual segments, making the topological design
straightforward.
● The Wide Area Network (WAN) leverages this topology for efficient communication.
● Networks created using the tree topology are reliable.

Disadvantages of Tree Topology:


● Configuring such a massive topology often becomes difficult.
● The segment length is limited & the segment limit relies on the type of cables utilized.
● It requires a large number of cables, which makes it costlier compared to other topologies.
● It requires two or more network devices to make them the centralized unit. It counts additional
costs to the entire network.
● Often the backbone or the top-most central device (switch) emerges as the failure point for
the entire network segment.
Enrolment No.:0827AL211016 Page No. 35
Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Figure: 28

6. Mesh Topology:
In this topology, each node or system can connect to the other directly and indirectly.
Network administrators can set multiple paths (directly or indirectly) to connect two or
more systems. Mesh topology is of two types: a. Full mesh: In this connected mesh, each
system remains connected to all other systems within the network. b. Partial mesh: In this
connected mesh, at least two systems will remain connected to all other systems.

Advantages of Mesh Topology:


● If a single device or system fails, it won't impact or break the network.
● This topology is robust enough to withstand any topological issues or situations.
● If any wiring fails, multiple other wirings keep one system connected to the other.
● Including a new device does not disrupt standard data transmission.
Enrolment No.:0827AL211016 Page No. 36
Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

● It is very straightforward to identify faults.


● This topology does not face traffic problems as all the nodes remain connected with
dedicated point-to-point links.
● Communication remains fast because of point-to-point connectivity.

Figure: 29

Disadvantages of Mesh Topology:


● Installation and configuration are intricate in this topology.
● It is costly because it requires a massive amount of cables.
● It consumes more power because all the different nodes have to remain alive/active to share
the load.

Enrolment No.:0827AL211016 Page No. 37


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

● Maintenance is a challenge in this topology.


● There is a high possibility of having a redundant connection.
● In an enterprise scenario, because of such massive connectivity, it takes a larger space to
install and set up such a network.

7. Hybrid Topology:
Hybrid topology, as the name suggests, is a mixture of two or more mentioned
topologies. Network engineers and administrators prefer to leverage the benefits of
different topologies into one using the hybrid topology. Practically, it is the most widely
implemented topology. It gives flexibility to the network administrators to determine
which topological combination to use, depending on the requirement.

Figure: 30
Advantages of Hybrid Topology:
● Such topologies are flexible to implement and configure.
● By combining the different topology types, network architects and engineers can leverage the
benefits of multiple topologies wherever necessary.
● It has the potential to endure a large volume of traffic.

Enrolment No.:0827AL211016 Page No. 38


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

● The speed of the topologies went faster when two or more topologies get appropriately
configured.
● They help create large enterprise networks with full customization.

Disadvantages of Hybrid Topology:


● Often appending more and more topologies of different types makes the entire hybrid
topology complicated.
● Such topologies are more expensive than any other topologies mentioned in this article.
● Often, such topology requires changing the hardware to connect one topology with the other.
● As the network grows, it becomes challenging for the network administrators to keep all the
aspects of the topology functionally optimal.

Enrolment No.:0827AL211016 Page No. 39


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Experiment No. 05
Experiment Title - Creating a LAN using a Hub and a Switch in Cisco Packet Tracer.

Concept Theory
In a LAN (Local Area Network), devices such as computers, printers, and servers are connected
together within a small geographic area, such as a building or campus. A hub and a switch are two
types of network devices that can be used to connect devices in a LAN.

A hub is a simple device that receives data packets from one device and broadcasts them to all
other devices connected to the hub. This means that all devices connected to the hub receive all
data packets, even if the packets are not intended for them. This can lead to network congestion
and slower network speeds.

Procedure- To create a LAN using a hub and a switch in Cisco Packet Tracer, follow these steps:

Step 1: Open Cisco Packet Tracer and select the "New" option to create a new project.

Step 2: From the left panel, select "End Devices" and drag and drop two PCs onto the workspace.

Step 3: From the left panel, select "Hub" and drag and drop it onto the workspace.

Step 4: Connect the two PCs to the hub by selecting the copper straight-through cable from the left
panel and dragging it from the PC's Ethernet port to the hub's port.

Step 5: From the left panel, select "Switch" and drag and drop it onto the workspace.

Step 6: Connect the switch to the hub by selecting the copper straight-through cable from the left
panel and dragging it from one of the switch's ports to the hub's port.

Step 7: Connect one of the PCs to the switch by selecting the copper straight-through cable from
the left panel and dragging it from the PC's Ethernet port to one of the switch's ports.

Enrolment No.:0827AL211016 Page No. 40


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Step 8: Click on the hub and switch to configure their settings, such as the IP address, subnet mask,
and default gateway.

Step 9: Save the project by selecting "File" and then "Save" from the top menu.

Figure: 31

Enrolment No.:0827AL211016 Page No. 41


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Figure: 32

Enrolment No.:0827AL211016 Page No. 42


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Experiment No. 06
Experiment Title - Connecting two LAN through Cisco packet Tracer.

Concept Theory

Connecting two LANs (Local Area Networks) can be done using a variety of methods, such as
using routers or switches with routing capabilities. Cisco Packet Tracer is a simulation tool that
can be used to create and configure network devices to connect multiple LANs.

Procedure-To connect two LANs in Cisco Packet Tracer, you can follow these general steps:

Step 1: Create two LANs with different IP address ranges, subnet masks, and default gateways.
For example, LAN A could have an IP address range of 192.168.1.1 to 192.168.1.254 with a subnet
mask of 255.255.255.0 and a default gateway of 192.168.1.1. LAN B could have an IP address
range of 192.168.2.1 to 192.168.2.254 with a subnet mask of 255.255.255.0 and a default gateway
of 192.168.2.1.

Step 2: Connect a router to each LAN. The routers should have at least two Ethernet ports each,
one for each LAN.

Step 3: Configure the IP addresses, subnet masks, and default gateways for each router interface.

Step 4: Configure static routes on each router to direct traffic between the two LANs. For example,
on Router A, you would add a static route for the LAN B network to be sent to the Router B
interface connected to LAN A. On Router B, you would add a static route for the LAN A network
to be sent to the Router A interface connected to LAN B.

Step 5: Test the connection by pinging devices on the other LAN.

Enrolment No.:0827AL211016 Page No. 43


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Output

Figure: 33

Enrolment No.:0827AL211016 Page No. 44


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Experiment No. 07
Experiment Title - Study of basic network command and Network configuration
commands.

Concept Theory
1. Ping: Ping is a basic network command that is used to test the connectivity between two
devices on a network. The ping command sends a small packet of data to the destination
device and waits for a response. If a response is received, it means that the destination
device is reachable and the network connection is working.
2. Tracert/Trace Route: The tracert (Windows) or traceroute (Linux and macOS) command
is used to trace the route taken by packets sent from a source device to a destination device.
It shows the path that packets take through the network, including the number of hops, IP
addresses, and response times of each device in the path.
3. Ipconfig/ifconfig: The ipconfig command is used in Windows and the ifconfig command
is used in Linux and macOS to display information about the IP configuration of a device.
This includes the IP address, subnet mask, default gateway, and DNS server information.
4. Netstat: The netstat command is used to display active network connections, listening
ports, and network statistics on a device.
5. Nslookup: The nslookup command is used to query the Domain Name System (DNS) to
resolve a domain name into an IP address. This is useful for troubleshooting network
connectivity issues.

Enrolment No.:0827AL211016 Page No. 45


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Solution –

1. Ping

Figure: 34

2. Tracert

Figure: 35

Enrolment No.:0827AL211016 Page No. 46


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

3. ipconfig

Figure: 36

4. Netstat

Figure: 37

Enrolment No.:0827AL211016 Page No. 47


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

5. Nslookup

Figure: 38

Enrolment No.:0827AL211016 Page No. 48


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Experiment No. 08
Experiment Title - Implement & simulate various types of routing algorithm.

Concept Theory
A routing algorithm is a procedure that lays down the route or path to transfer data packets from
source to the destination. They help in directing Internet traffic efficiently. After a data packet
leaves its source, it can choose among the many different paths to reach its destination. Routing
algorithm mathematically computes the best path, i.e. “least – cost path” that the packet can be
routed through.

Types of Routing Algorithms :


Routing algorithms can be broadly categorized into two types,
adaptive and nonadaptive routing algorithms. They can be further
categorized as shown in the following diagram −

● Static Routing Algorithm


Network administrators use static routing, or nonadaptive routing, to define a route when
there is a single route or a preferred route for traffic to reach a destination. Static routing
uses small routing tables with only one entry for each destination. It also requires less
computation time than dynamic routing because each route is preconfigured. Because static
routes are preconfigured, administrators must manually reconfigure routes to adapt to
changes in the network when they occur. Static routes are generally used in networks where
administrators don't expect any changes.

● Dynamic Routing Algorithm (RIP Routing Algorithm)


The Routing Information Protocol (RIP) is a distance vector protocol that routers use to
exchange information about available routes in a local area network. Routers using RIP
send periodic update messages to other routers in the network and when the network
topology changes. These updates allow a router to learn the network topology and calculate
the best path to a destination network.

Enrolment No.:0827AL211016 Page No. 49


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Static Routing :

Figure: 39

Dynamic Routing(RIP Routing) :

Figure: 40

Experiment No. 09
Enrolment No.:0827AL211016 Page No. 50
Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Experiment Title - Study & Simulation of MAC Protocols like Aloha, CSMA, CSMA/CD
and CSMA/CA using Standard Network Simulators.

Concept Theory

MAC Protocols :
When a sender and receiver have a dedicated link to transmit data packets, the data link control is
enough to handle the channel. Suppose there is no dedicated path to communicate or transfer the
data between two devices. In that case, multiple stations access the channel and simultaneously
transmit the data over the channel. It may create collisions and cross talk. Hence, the multiple
access protocol is required to reduce the collision and avoid crosstalk between the channels.

ALOHA Random Access Protocol


It is designed for wireless LAN (Local Area Network) but can also be used in a shared medium to
transmit data. Using this method, any station can transmit data across a network simultaneously
when a data frameset is available for transmission. There are two types of ALOHA :

● Pure Aloha
Whenever data is available for sending over a channel at stations, we use Pure Aloha. In
pure Aloha, when each station transmits data to a channel without checking whether the
channel is idle or not, the chances of collision may occur, and the data frame can be lost.
When any station transmits the data frame to a channel, the pure Aloha waits for the
receiver's acknowledgment. If it does not acknowledge the receiver end within the specified
time, the station waits for a random amount of time, called the backoff time (Tb). And the
station may assume the frame has been lost or destroyed. Therefore, it retransmits the frame
until all the data are successfully transmitted to the receiver.
● Slotted Aloha

Enrolment No.:0827AL211016 Page No. 51


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

The slotted Aloha is designed to overcome the pure Aloha's efficiency because pure Aloha
has a very high possibility of frame hitting. In slotted Aloha, the shared channel is divided
into a fixed time interval called slots. So that, if a station wants to send a frame to a shared
channel, the frame can only be sent at the beginning of the slot, and only one frame is
allowed to be sent to each slot. And if the stations are unable to send data to the beginning
of the slot, the station will have to wait until the beginning of the slot for the next time.
However, the possibility of a collision remains when trying to send a frame at the beginning
of two or more station time slot.

CSMA (Carrier Sense Multiple Access)


It is a carrier sense multiple access based on media access protocol to sense the traffic on a channel
(idle or busy) before transmitting the data. It means that if the channel is idle, the station can send
data to the channel. Otherwise, it must wait until the channel becomes idle. Hence, it reduces the
chances of a collision on a transmission medium.

CSMA/ CD
It is a carrier sense multiple access/ collision detection network protocol to transmit data frames.
The CSMA/CD protocol works with a medium access control layer. Therefore, it first senses the
shared channel before broadcasting the frames, and if the channel is idle, it transmits a frame to
check whether the transmission was successful. If the frame is successfully received, the station
sends another frame. If any collision is detected in the CSMA/CD, the station sends a jam/ stop
signal to the shared channel to terminate data transmission. After that, it waits for a random time
before sending a frame to a channel.

CSMA/ CA
It is a carrier sense multiple access/collision avoidance network protocol for carrier transmission
of data frames. It is a protocol that works with a medium access control layer. When a data frame
is sent to a channel, it receives an acknowledgment to check whether the channel is clear. If the
station receives only a single (own) acknowledgments, that means the data frame has been
Enrolment No.:0827AL211016 Page No. 52
Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

successfully transmitted to the receiver. But if it gets two signals (its own and one more in which
the collision of frames), a collision of the frame occurs in the shared channel. Detects the collision
of the frame when a sender receives an acknowledgment signal.

Enrolment No.:0827AL211016 Page No. 53


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

Experiment No. 10
Experiment Title - Study of Application layer protocols-DNS, HTTP, HTTPS, FTP and
TelNet.

Concept Theory
Application layer protocols define how application processes (clients and servers), running on
different end systems, pass messages to each other. In particular, an application layer is an abstract
layer that handles the sharing protocol of the TCP/IP and OSI model.

● TELNET
Telnet stands for the TELetype NETwork. It helps in terminal emulation. It allows Telnet
clients to access the resources of the Telnet server. It is used for managing files on the
internet. It is used for the initial setup of devices like switches. The telnet command is a
command that uses the Telnet protocol to communicate with a remote device or system.
Port number of telnet is 23.

● FTP
FTP stands for file transfer protocol. It is the protocol that actually lets us transfer files. It
can facilitate this between any two machines using it. But FTP is not just a protocol but it
is also a program.FTP promotes sharing of files via remote computers with reliable and
efficient data transfer. The Port number for FTP is 20 for data and 21 for control.

● DNS
It stands for Domain Name System. Every time you use a domain name, therefore, a DNS
service must translate the name into the corresponding IP address. For example, the domain
name www.abc.com might translate to 198.105.232.4.
The Port number for DNS is 53.

● HTTP
An HTTP stands for Hypertext Transfer Protocol. The HTTP protocol provides
communication between different communication systems. When the user makes an HTTP
request on the browser, then the web server sends the requested data to the user in the form
of web pages. In short, we can say that the HTTP protocol allows us to transfer the data
from the server to the client.

Enrolment No.:0827AL211016 Page No. 54


Acropolis Institute of Technology & Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Computer Networks AL602

● HTTPS
The full form of HTTPS is Hypertext Transfer Protocol Secure. The HTTP protocol does
not provide the security of the data, while HTTP ensures the security of the data. Therefore,
we can say that HTTPS is a secure version of the HTTP protocol. This protocol allows
transferring the data in an encrypted form. The use of HTTPS protocol is mainly required
where we need to enter the bank account details. The HTTPS protocol is mainly used where
it is required to enter the login credentials. In modern browsers such as chrome, both the
protocols, i.e., HTTP and HTTPS, are marked differently.

Enrolment No.:0827AL211016 Page No. 55

You might also like