CN Practical File

Download as pdf or txt
Download as pdf or txt
You are on page 1of 69

VAISH COLLEGE OF ENGINEERING

Computer Networks
PRACTICAL FILE

SUBMITTEDTO:SUBMITTEDBY:
Mr. Alok Gupta Name:-
AP, CSE Roll no:-
VCE, ROHTAK
INDEX
S.NO CO PROGRAM/EXPERIMENT

1 1 To study the different components of a data communication network, such as sender, receiver,
protocol, and channel.

2 2 To study the characteristics and differences between different types of transmission media, including
twisted-pair, coaxial, and fiber-optic cables.

3 3 Use knowledge of interconnection of cables to create a LAN using cross-wire and straight-wire cables
for data communication in LAN.

4 4 Analyze the results of basic network commands and network configuration commands to troubleshoot
connectivity issues and improve network performance.

5 5 Evaluate the strengths and weaknesses of different network simulation tools like Packet Tracer, NS-2,
and LAN Training System and determine which tool is best suited for a given scenario.

6 6 Design and implement a star topology using the Packet Tracer simulation tool, selecting appropriate
cables and connectors for the devices.

7 6 Implement a point-to-point& star topology using the Packet Tracer simulation tool, configuring the
devices and ensuring connectivity between them.

8 6 Implement a mesh & ring topology using the Packet Tracer simulation tool, selecting appropriate
devices, cables, and connectors and configuring them to ensure proper connectivity.

9 6 Implement a bus& tree topology using the Packet Tracer simulation tool, selecting appropriate
devices, cables, and connectors and configuring them to ensure proper connectivity.

10 6 Create and simulate routing using the Packet Tracer 5.0 tool, selecting appropriate routing protocols
and configuring routers to ensure proper connectivity between networks.
Program No: 1
Aim: To study the different components of a data communication
network, such as sender, receiver, protocol, and channel.
Computer Networks:-
Computer Network is collection of interconnected collection of autonomous computers.

Two Computers are said to be interconnected if they are able to exchange or information or
resources through a medium.

The term Autonomous means independent i.e.no computer can forcibly start or stop the other
computers.

Two computers can be connected by medium but without protocols data communication is not
possible.

Purpose of Network: Purpose of network is to share resources. A resource may be

⚫ Afile

⚫ Afolder

⚫ Aprinter

⚫ A diskdrive

⚫ Or just about anything else that exists on acomputer.


Need of Network:

1. Low cost transfer ofdata.


2. To improve communicationspeed.
3. To share the computerfiles.
4. MultimediaTransfer
5. Instantaneous availability ofinformation.
6. ProvideReliability.

Components of a Computer Network:


1. Sending &Receivingdevices
2. HardwareComponents
3. SoftwareComponents

Sending & Receiving Devices:

Sending device is computer or any other device that sends the data or information through medium
whereas receiving device receives the data or information manipulates it and uses it as required.
Minimum two computers are required to establish a network.Oneact as sending device & other act
as receiving device or vice-versa. Mode of transmission depends on theprotocol used.

Hardware Components:

There are various hardware components such as

➢ Modem: Modulator Demodulator used for transmission ofsignals.


➢ Network Interface Card(NIC): NIC provides the physical interface between computer and
cabling. It prepares data, sends data, and controls the flow ofdata.
➢ Switches
➢ Bridges
➢ Router
➢ Hub
➢ Repeaters

Software Components:

There are various hardware components such as

➢ Protocols: These are set of rules that specifies datacommunication.


➢ NetworkOperating System: NetworkOperating System runs on a server and provides server
the capability to manage data, users, groups, security, applications, and other networking
functions. The primary purpose of the network operating system isto
allow shared file and printer access among multiple computers in a network.

Network Models:
Peer-to-Peer Network

A Peer-to-Peer Network is a network where the computers acts as both workstations and servers.
These networks are good for small, simple, and inexpensive networks. In a strict Peer-to-Peer
Networking setup, every computer is an equal, a peer in the network. Each resources can have
resources that are shared with any other machine. There is no assigned role of any particular
device, and each of the devices usually runs similar software. Any device can and will send
requests to any other.

Peer-to-Peer Network
Client Server Network

In this design a, small number of computers are designated as centralized servers and given task of
providing serviceas to a larger number of users machine calledClients.
Server Computer is a core component of the network, providing a link to the resources necessary
to perform any task. The link it provides could be to a resource existing on the server itself or a
resource on client computer. Client computers normally requests and receive information over the
network client. Client computers also depends primarily on the central server for processing
activities.

Client Server Network


Types of Computer Networks:
Local Area Networks (LANs):

A local area network (LAN) is a computer network covering a small geographic area, like a home,
office, or group of buildings. LANs connect computers and peripheral devices in a limited physical
area, such as a business, office,laboratory or college campus by means of permanent links (wires)
that transmit data rapidly. A LAN consists of two or more personal computer, printers and high
capacitydisk storage device called file servers, which enable each computer on the network to
access a common offiles.

Wide Area Networks (WANs):

⚫ Wide Area Network (WAN) is a computer network that covers a broad area (i.e., any
network whose communications links cross metropolitan, regional, or national boundaries).
Or, less formally, a network that uses routers and public communications links

⚫ The largest and most well-known example of a WAN is theInternet.

⚫ WANs are used to connect LANs and other types of networks together, so that users and
computers in one location can communicate with users and computers in otherlocations
Metropolitan Area Network (MAN):

o A metropolitan area network (MAN) is a network that interconnects users with computer
resources in a geographic area or region larger than that coveredby even a large local area
network (LAN) but smaller than the area covered by a wide area network (WAN). The term
is applied to the interconnection of networks in a city into a single larger network (which
may then also offer efficient connection to awide area network).Itis also used to mean the
interconnection of several local area networks by bridging them with backbone lines. The
latter usage is also sometimes referred to as a campusnetwork.

Advantages of Computer Network:


➢ Connectivity andCommunication

➢ DataSharing

➢ HardwareSharing

➢ Internet Access

➢ Internet AccessSharing

➢ Data Security andManagement

➢ Performance Enhancement andBalancing

➢ Entertainment
Network Devices:
Repeater –
Connecting device that operates only in the physicallayer:

1. receive signal on one end→

2. regenerate original bit patterns→

3. send refreshed signal on the otherend

Connects only segments of the same LAN segments must run the same protocol

Has nofiltering capability every frame received will be regenerated (not amplified) and
forwarded

Location of a repeater is crucial –repeater must be placed so that a signal reaches it before noise
changes the meaning of any of its bits

Hub–multiport repeater !!!

1. receive signal on one end→

2. regenerate original bit patterns→


3. send refreshed signal over all otherports

Passive hubs: simply send signal to all connected hosts, without amplifying it

Active hubs: are connected to electric power source, and are used to refresh the signal sent to all
ports

Bridge-
1. Connecting device thatoperates in both physical & data linklayer.

2. As a physical-layer device, bridge regenerates the signal itreceives

3. As a data link layer device, bridge checks physical / MAC addresses (both source and
destination) inframes.
4. If frame sent in LAN 1 is destined for a device on LAN 2 –receive and forward the frame;
otherwise ignore theframe.

5. Tobeable toproperlyforward/ filter frames, bridge must build /learn a ‘


forwarding
table’
,aka‘
forwardingdatabase’
Switches:-
A network switch is a small hardware device that joins multiple computers together within
one local area network (LAN). Ethernetswitch devices were commonly used on home
networks before home routers becamepopular; broadband routersintegrate Ethernet
switches directly into the unit as one of their many functions. High-performance network
switches are still widely used in corporate networks and datacenters.

Network Interface Card(NIC):-


Anetworkinterfacecard(NIC)isacircuitboardorcardthatisinstalledinacomputersothatit
canbeconnectedtoanetwork.

Anetworkinterfacecardprovidesthecomputerwithadedicated,full-timeconnectiontoa
network.Personalcomputersandworkstationsonalocalareanetwork(LAN)typicallycontaina
networkinterfacecardspecificallydesignedfortheLANtransmissiontechnology.

Some NIC cards work with wiredconnections while others are wireless. Most NICs support either wired
Ethernet or Wi-Fiw ireless standards. Ethernet NICs plug into the system bus of the PC and include jacks
for network cables, while Wi-Fi NICs contain built-in transmitters / receivers(transceivers).

In new computers, many NICs are now pre-installed by the manufacturer. All NICs feature a speed rating
such as 11 Mbps, 54 Mbps or 100 Mbps that suggest the general performance ofthe unit.
Program No:2

Aim: To study the characteristics and differences between different


types of transmission media, including twisted-pair, coaxial, and
fiber-optic cables..
Cable:
A cable is two or more wires running side by side and bonded, twisted, or braided together toform
a single assembly. The term originally referred to a nautical line of specific length where multiple
ropes, each laid clockwise, are then laid together anti-clockwise and shackled to produce a strong
thick line, resistant to water absorption, that was used to anchor large ships. In mechanics, cables,
otherwise known as wire ropes, are used for lifting, hauling, and towing or conveying force
throughtension. In electrical engineering cables are used to carry electric currents. An optical cable
contains one or more optical fibers in a protective jacket that supports thefibers.
Twisted cable
A type of cable that consists of two independently insulated wires twisted around one another. The
use of two wires twisted together helps to reduce crosstalkand electromagnetic induction. While
twisted-pair cable is used by older telephone networksand is the least expensive type of local-area
network (LAN)cable, most networks contain some twisted-pair cabling at some point along the
network. Other types of cables used for LANs include coaxial cablesand fiber opticcables. It was
invented by Alexander GrahamBell.
TYPES OF TWISTED PAIR CABLE :

Unshielded twisted-pair Cable


UTP cable is a medium that is composed of pairs of wires. UTP cable is used in a variety of
networks. Each of the eight individual copper wires in UTP cable \is covered by an insulating
material. In addition, the wires in each pair are twisted around each other.
UTP cable relies solely on the cancellation effect produced by the twisted wire pairs to limit signal
degradation caused by electromagnetic interference (EMI) and radio frequency interference (RFI).
To further reduce crosstalk between the pairs in UTP cable, the number of twists in the wire pairs
varies. UTP cable must follow precise specifications governing how many twists or braids are
permitted per meter (3.28 feet) ofcable.

Shielded Twisted-Pair Cable


Shielded twisted-pair (STP) cable combines the techniques of shielding, cancellation, and wire
twisting. Each pair of wires is wrapped in a metallic foil .The four pairs of wires then are wrappedin
an overall metallic braid or foil, usually 150-ohm cable. As specified for use in Ethernet network
installations, STP reduces electrical noise both within the cable (pair-to-pair coupling, or crosstalk)
and from outside the cable (EMI and RFI). STP usually is installed with STP data connector, which
is created especially for the STP cable. However, STP cabling alsocan use the same RJ connectors
that UTPuses.
Although STP prevents interference better than UTP, it is more expensive and difficult to install.
In addition, the metallic shielding must be grounded at both ends. If it is improperly grounded,
theshield acts like an antenna and picks up unwanted signals. Because of its cost and difficulty with
termination, STP is rarely used in Ethernet networks. STP is primarily used inEurope.

Advantages

1. Cheaper and far easier tosplice


2. Less susceptible to electrical interference caused by nearby equipment orwires.
3. In turn are less likely to cause interferencethemselves.
4. Because it is electrically "cleaner", STP wire can carry data at a fasterspeed.

Disadvantages

1. STP wire is that it is physically larger and more expensive than twisted pairwire.
2. STP is more difficult to connect to a terminatingblock.

Coaxial cable

Coaxial cable is the kind of copper cable used by cable TVcompanies between the community
antenna and user homes and businesses. Coaxial cable is sometimes usedbytelephone companies
from their central office to the tele phone poles near users. It is alsowidely installed for use in
business and corporation Ethernetand other types of local areanetwork.
Coaxial cable is called "coaxial" because it includes one physical channel
that carries the signal surrounded (after a layer of insulation) by another
concentric physical channel, both running along the same axis.The outer
channel serves as a ground. Many of these cables or pairs of coaxial tubes can be placed in a
singleouter sheathing and, with repeaters, can carry information for a greatdistance.

Coaxial cable was invented in 1929 and first used commercially in 1941. AT&T established its first
cross-continental coaxial transmission system in 1940. Depending on the carrier technology used
and other factors, twisted paircopper wire and optical fiberare alternatives to coaxialcable.

Advantages
1. Coaxial cable can support greater cable lengths between network devices than twisted pair
cable.
2. Thick coaxial cable has an extra protective plastic cover that help keepmoisture
away.

Disadvantages

1. Thick coaxial is that it does not bend easily and is difficult to install.

Fiber Optics
An optical fiber is a flexible, transparent fiber made of high quality extruded glass (silica) or plastic,
slightly thickerthan a human hair. It can function as a waveguide, or “ light pipe” ,[1]totransmit
light between the two ends of the fiber.[2]The field of applied scienceand engineering
concerned with the design and application of optical fibers is known as fiber optics.

Optical fibers are widely used in fiber-optic communications, which permits transmission over
longer distances and at higher bandwidths (data rates) than other forms of communication. Fibers
are used instead of metal wires because signals travel along them with less loss and are also immune
to electromagnetic interference .Fibers are also used for illumination, and are wrapped in bundles
so that they may be used to carry images, thus allowing viewing in confined spaces. Specially
designed fibers are used for a variety of other applications, including sensors and fiber lasers.
Optical fibers typically include a transparent core surrounded by transparent cladding material with
a lower index of refraction. Light is kept in the core by total internal reflection. This causes the fiber
to act as a waveguide. Fibers that support manypropagation paths or transverse modes are called
multi-mode fibers (MMF), while those that only support a single mode are called single-mode
fibers (SMF). Multi-mode fibers generally have a wider core diameter, and are used for short-
distance communication links and for applications where high power must be transmitted. Single-
mode fibers are used for most communication links longer than 1,000meters.

Advantages
1. One single mode fiber can replace a metal of time larger andheavier.
2. Multi-mode optical cable has a larger diameter and can be used to carry signal
over shortdistance.

Disadvantages
1. Fiber optic versus metal cable is that it is difficult to make connections to
fiber opticcable.
2. The optical fiber must be highly polished to allow light to pass with littleloss.

CONNECTORS
Anelectrical connectoris anelectro-mechanicaldevice for joining electricalcircuitsas an
interfaceusing a mechanical assembly. Connectors consist of plugs (male-ended) and jacks
(female-ended). The connection may be temporary, as for portable equipment, require a tool for
assembly and removal, or serve as a permanent electrical joint between two wires or devices.[1]An
adapter can be used to effectively bring together dissimilarconnectors.
There are hundreds of types of electrical connectors. Connectors may join two lengthsof
flexible copper wireor cable, or connect a wire or cable or optical interface to an electrical
terminal.
In computing, an electrical connector can also be known as a physical interface (compare
Physical Layerin OSI modelof networking). Cable glands, known as cable connectors in the US,
connect wires to devices mechanically rather than electrically and are distinct from quick-
disconnects performing thelatter.

BNC CONNECTOR CONNECTOR FOR COAXIAL CABLE

A BNC (Bayonet Neil-Concleman, or sometimes British Naval Connector) connector is used to


connect a computer to a coaxial cablein a 10BASE-2 Ethernetnetwork. 10BASE-2 is a 10 MHz
basebandnetwork on a cable extending up to 185 meters - the 2 is a rounding up to 200 meters -
without a repeater cable. 10BASE-2 Ethernets are also known as "Thinnet", "thin Ethernet", or
"cheaper nets". The wiring in this type of Ethernet is thin, 50 ohm, baseband coaxial cable. The
BNC connector in particular is generally easier to install and less expensive than other coaxial
connectors.

A BNC male connector has a pin that connects to the primary conducting wire and then is locked in
place with an outer ring that turns into locked position.Different sources offer different meanings
for the letters BNC. However, our most knowledgeable source indicates that the B stands for a
bayonet-type connection (as in the way a bayonet attaches to a rifle) and the NC for the inventors
of the connector, Neil andConcleman.

BNCs differ from many connectors because of their snap-lock architecture, which keeps the plug
firmly in itssocket.

BNC CONNECTOR

APPLICATIONS
1. The BNC was originally designed for military use and has gained wide acceptance in video and
RF applications to 2GHz.
2. The BNC connector is used for signal connections suchas:
• analogandserial digital interfacevideosignals
• amateur radioantennas
• aerospace electronics(avionics)
• test equipment.

3. It is an alternative to theRCA connectorwhen used forcomposite videoon commercial video


devices, although manyconsumer electronicsdevices with RCA jacks can be used with BNC- only
commercial video equipment via a simpleadapter.
4. BNC connections can also be found in recording studios. Digital recording equipment uses the
connection for synchronization of various components via the transmission ofword clocktiming
signals.

SC, ST and MT-RJ connectors : (CONNECTORS FOR FIBER OPTICS.)


Connector types that are generally used for connecting fiber-optic cabling to networking devices.
Both are recognized by the Electronic Industries Alliance/Telecommunications Industry
Association (EIA/TIA) 568A standard.

SC stands for subscriber connector and is a standard-duplex fiber-optic connector with a square
molded plastic body and push-pull locking features. SC connectors are typically used in data
communication, CATV, and telephony environments.

SCCONNECTOR STCONNECTOR

ST stands for straight tip, a high-performance fiber-optic connector with round ceramic ferrules
and bayonet locking features. STconnectors are more common thanSC connectors. You can
generally use SC and ST connectors with either single-mode or multimode fiber-optic cabling.
Coupling receptacles for these connectors come in either panel-mount or free-handing designs. For
narrow space installations, you can get 90-degree boot versions instead of straight versions. SC and
ST connectors come in both simplex and duplexform.

MT-RJ (Mechanical Transfer Registered Jack)


• MT-RJ uses a form factor and latch similar to the8P8C(RJ45) connectors. Two separate fibers
are included in one unified connector. It is easier to terminate and install than ST or SC
connectors. The smaller size allows twice the port density on a face plate than ST or SC
connectors do. The MT-RJ connector was designed byAMP, but was late r standardized as
FOCIS 12 (Fiber Optic Connector Interminability Standards) in EIA/TIA-604-12. There are
two variations: pinned and no-pin. The pinned variety, which has two small stainless steel guide
pins on the face of the connector, is used in patch panels to mate with the no-pin connectors on
MT-RJ patchcords.


RJ-45 CONNECTOR FOR TWISTED PAIR CABLE

RJ45 is a standard type of connector for network cables. RJ45 connectors are most commonly
seen with Ethernetcables and networks.

RJ45 connectors feature eight pins to which the wire strands of a cable interface electrically.
Standard RJ-45 pin outs define the arrangement of the individual wires needed when attaching
connectors to a cable.

Several other kinds of connectors closely resemble RJ45 and can be easily confused for each other.
The RJ-11 connectors used with telephone cables, for example, are only slightly smaller (narrower)
than RJ-45 connectors.

Also Known As: Registered Jack 45


The physical connectors that registered jacks use are mainlyof the modular connectorand 50- pin
miniature ribbonconnector types. For example, RJ11 uses a six-position two-conductor ( 6P2C),
RJ14 uses a six-position four-conductor (6P4C) modular plug and jack, while RJ21 uses a 25-pair
(50-pin) miniature ribbonconnector.

The standard designs for these connector sand their wiring are named RJ11, RJ14, RJ21, RJ35,
RJ45, RJ48, etc. Many of these interface standards are commonly used in North America, though
some interfaces are used world-wide. It is common to find a dash (hyphen) between the RJ and the
number, but the actual standard has no dash or hyphen.

WORKING STEPS
1 Start by stripping of about 2 inches of plastic jacket of the end of the cable. Be very careful at this point
asto not cut into the wires which are inside. Check the wires one or more time for the cuts, if there are any cut
just short the whole process fromstarting.
2 Spreadthewiresapartbutbesuretohold ontothebaseofthejacketwithyour otherhandyoudon’ t want the wires
become untwisted down inside the jacket. Category 5 cable must only have half inch of untwisted wire at the
end. Otherwiseit will be out ofspace.

3 You have two end jacks which must be installed on cables. If you are using premade cable with one of the
endis removed you have only one end toinstall.

Below diagram to show how to arrange the cable for each type of cable end .Beside at this point which end
you are making and examine the associated picturebelow.
Program No:3

Aim : Use knowledge of interconnection of cables to create a LAN using


cross-wire and straight-wire cables for data communication in LAN
Step1. First and foremost, attach the RJ-45 connector to the Ethernet network port on your PC

Step2.Rightclickon‘
MyNetworkplacesiconslocatedonthedesktopandinthepopupmenu
clickonproperties.YoucanalsofinditthroughtheMyComputerwindow.Alternatively,click

Startfromthetaskbar andrightclickon‘
MyNetworkplacesoptionfromthepopupmenu.In
themenuthatappearsselect‘
Properties
Step3InthenewWindowthatappears,undertheLANorHigh-Speedinternet,righton‘
Local
AreaConnectionandselectpropertiesinthepopupmenuthatappears.

Step 4.Inthe local area connection dialog box that appears under the connection box, scroll
down and select ‘
Internet Protocol (TCP/IP) and click on ‘
Properties.
Step5.ToconfigureyourPC,youcanoptforobtainingtheconfigurationsettingsautomatically
ormanually.Toobtain thesettingsautomatically, select‘
ObtainanIP AddressAutomatically’
.
However,tousethisoption,youwillneedtohaveaDHCPserverthatwillfunctioninallocating and
managing IP address to ensure that there are no conflicts. To configure your PC to the network
manually, follow the procedures listedbelow:

• Clicktheoption‘
UsethefollowingIPAddress’
.EntertheIPaddresstouse.Itisimportantthat youconsult
your network administrator on the IP to use so as to avoid conflicts occurring in the network,
i.e. a situation where two PCs have similar IP addresses. Thereafter, enter theSubnet
MaskandDefaultgateway.#*Thesubnetmaskisusedtoidentifythenetworklevelyouarein while
the default gateway identifies the routerconnection.

• Thereafter, enter the Preferred DNS server and Alternate DNS serveraddress.
• Clickacceptthechangesor‘
cancelexitthesetup.

Step 6. Check the option ‘


Show icon in notification area when connectedand #click ‘
OK”
. This
will enable you to know if the local area connection is connected or disconnected.

Here's how to share a folder on your Windows machine?


Step 1. Locate the folder you want to share and right click on it..

Step 2. Choose "Share with..." and then select "Specific People".

Step 3. A sharing panel will appear with the option to share with any users on the computer or your
home group. You can also choose to share with "Everyone", which means the files will be accessible
on your local network (basically just in your home) to anyone even if they don't have a password.
This is convenient but not secure. If you want to choose this option, you can find it by click on the
drop downmenu towards the top of the panel.
Step 4. After making your selection, click Share.

After you've clicked Share, Windows will take a moment to set up your new shared folder and it'll
be accessible from other computers on your local network. To access it, simply look for your
computer's name in the Network section on your other computer. When you choose it, you'll have
a new option to connect to thisfolder.

How to access shared folder in LAN networking?

Step 1. Go to My Computer.

Step 2. Go to search option.

Step 3. Select the option named Computer and People.


Step 4. Select the option computer on the network

Step 5. Enter the name of computer whose shared folder you want to access.
Step 6. Now you can access the shared folder.
Program No:4
Aim:- Analyze the results of basic network commands and network
configuration commands to troubleshoot connectivity issues and improve
network performance.

Basic Network Commands & Network Configuration Commands:-


1. HostName:- hostname with no options displays the machines hostname

hostname–ddisplaysthedomainnamethemachinebelongsto
hostname–fdisplaysthefullyqualifiedhostanddomainname
hostname–idisplaystheIPaddressforthecurrentmachine.

2. Ping :- The pingcommandis aCommand Prompt commandused to test the ability of the
source computer to reach a specified destination computer. The ping command is usually
used as a simple way verify that a computer can communicate over the network with another
computer or networkdevice.
Various ping commands
ping [-t] [-a] [-n count] [-l size] [-f] [-r count] [-w timeout]

-t = Using this option will ping the target until you force it to stop using Ctrl-C.

-a = This ping command option will resolve, if possible, the hostnameof an IP addresstarget.

-n count = This option sets the number of ICMP Echo Request messages to send. If you execute
the ping command without this option, four requests will be sent.

-l size = Use this option to set the size, in bytes, of the echo request packet from 32 to 65,527.
The ping command will send a 32 byte echo request if you don't use the -l option.

-f = Use this ping command option to prevent ICMP Echo Requests from being fragmented by
routers between you and the target. The -f option is most often used to troubleshoot Path
Maximum Transmission Unit (PMTU)issues.

-r count = Use this ping command option to specify the number of hopsbetween the your
computer and the target computer or device that you'd like to be recorded and displayed. The
maximum value for count is 9 so use the tracert commandinstead if you're interested in viewing
all hops between two devices.

-w timeout = Specifying a timeout value when executing the ping command adjusts the amount
of time, in milliseconds, that ping waits for each reply. If you don't use the -w option, the default
timeout value is used which is 4000, or 4 seconds.
3. Netstat :- Most useful and very versatile for finding connection to and from the host. You
can find out all the multicast groups (network) subscribed by this host by issuing "netstat -
g"

Netstat-nap|greyportwilldisplayprocessidofapplicationwhichisusingthatport
netstat -a or netstat –all will display all connections including TCP and UDP
netstat--Tcpornetstat–twilldisplayonlyTCP connection
Netstat--udpornetstat–uwilldisplayonlyUDP connection
Netstat -g will display all multicast network subscribed by this host.
4. Nslookup:-If you know the IP address it will display hostname. To find all the IP addresses
for a given domain name, the commandslookup is used. You must have a connection to the
internet for this utility to beuseful.
E.g.nslookup blogger.com

5. Traceroute:-The tracecommandis aCommand Prompt commandthat's used to show


several details about the path that a packet takes from the computer or device you're on to
whatever destination youspecify.
6. FTP:-The FTP (File Transfer Protocol) utility program is commonly used for copying files to
and from other computers. These FTP is a general protocol that works on UNIX systems as
well as a variety of other (non-UNIX)systems.

For the purposes of this Web page, the local machine refers to the machine you are
initially logged into, the one on which you type the ftp command. The remote machine is
the other one, the one that is the argument of the ftp command.

To connect your local machine to the remote machine, type

ftp machinename

where machine name is the full machine name of the remote machine, e.g.,
purcell.cs.colostate.edu. If the name of the machine is unknown, you may type

ftp machinenumber
7. GetMac:-DOS command used to show both local and remote MAC addresses. When run
with no parameters (i.e.Get \Mac) it displays MAC addresses for the local system. When run
with the /s parameter (e.g. Get Mac /s \\foo) it displays MAC addresses for the remote
computer. When the /v parameter is used, it also displays the associated connection name and
network adaptername.

8. Netsh:-MS-DOS command that enables users to change network settings such as changing
their network device from a dynamic address to a static address or changing the IP address.
Netsh
Enter the netsh command.
netsh dump
Dump all the network information as a script to the screen. Can also be sent to a file by doing
netsh dump >file.txt . This script can then be executed using the exec command.
9. Arp:-Displays, adds, and removesarpinformation from networkdevices.

10. Finger:-Displays information about a user or users on a specified remote computer


(typically a computer running UNIX) that is running the Finger service or daemon. The
remote computer specifies the format and output of the user information display. Used
without parameters, finger displayshelp.

User : Specifies the user about which you want information. If you omit the Userparameter,
finger displays information about all users on the specifiedcomputer.

@host : Specifies the remote computer running the Finger service where you are looking
for user information. You can specify a computer name or IPaddress.
11. NET:-The netcommandis aCommand Prompt commandthat can be used to manage almost
every aspect of a network and its settings including managing network shares, network print
jobs, network users, and muchmore.
Net Command Syntax:

net [accounts | computer | con-fig | continue | file | group | help | helpmsg | localgroup | name| pause | print | send |
session | share | start | statistics | stop | time | use | user | view]

Net Commands:

Net Accounts:-The net accounts command is used to set password and logon requirements for users. Net

Computer:-The net computer command is used to add or remove a computer from a domain.

Net Con-fig:-Use the net con-fig command to show information about the configuration of the Server or
Workstation service.

Net File:-Net file is used to show a list of open files on a server. The command can also be used to close a
shared file and remove a file lock.

Net Group:-The net group command is used to add, delete, and manage global groups on servers. Net

Help:-The net help command is used to get detailed help on each of the net subset commands. Net

Name:-Net name is used to add or delete a messaging alias at a computer.


12. Path-ping:-Similar to thetracert command, pathping provides users with the ability of
locating spots that have network latency and networkloss.

13. Nbtstat:-MS-DOS utility that displays protocol statistics and current TCP/IP connections
usingNBT(NetBIOSoverTCP/IP), which allow the user to troubleshoot NetBIOS name
resolution issues. Normally, name resolution is done when NetBIOS over TCP/IP is
functioning correctly. It does this through local cachelookup.
14. Route:-Command to manually configure the routes in the routingtable.

Examples:-> route PRINT,


Program NO:5

Aim: Evaluate the strengths and weaknesses of different network simulation tools like Packet Tracer, NS-
2, and LAN Training System and determine which tool is best suited for a given scenario.

NS (from network simulator) is a name for series of discrete event network simulators, specifically
ns-1 ,ns-2 and ns-3. All of them are discrete-event network simulator, primarily used in
research[4]and teaching. ns-3 is free software, publicly available under the GNU GPLv2 license for
research, development, anduse.
The goal of the ns-3 project is to create an open simulation environment for networking research
that will be preferred inside the research community:
• It should be aligned with the simulation needs of modern networkingresearch.
• It should encourage community contribution, peer review, andvalidation of the software.

NS Tool
Ns2 simulation tool :-
In 1996-97, ns version 2 (ns-2) was initiated based on a refactoring by Steve McCanne. Use of
Tclwas replaced by MIT's Object Tcl(OTcl), an object-orienteddialect of Tcl. The core of ns-2 is
also written in C++, but the C++ simulation objects are linked to shadow objects in OTcland
variables can be linked between both language realms. Simulation scripts are written in the
OTcllanguage, an extension of the Tcl scriptinglanguage.

Presently, ns-2 consists of over 300,000 lines ofsource code, and there is probably a
comparable amount of contributed code that is not integrated directly into the main distribution
(many forksof ns-2 exist, both maintained and unmaintained). It runs on GNU/Linux, FreeBSD,
Solaris, Mac OS Xand Windows versions that support Cygwin. It is licensed for use under version
2of the GNU General PublicLicense.

Packet Tracer :-
Cisco Packet Tracer is a network simulation program that allows students to experiment with
network behaviorandask what ifquestio ns. As anintegralpartof theNetworkingAcademy
comprehensive learning experience, Packet Tracer provides simulation, visualization, authoring,
assessment, and collaboration capabilities and facilitates the teaching and learning of complex
technology concepts.
Choosing Devices and Connections:
We will begin building our network topology by selecting devices and the media in which to connect
them. Several types of devices and network connections can be used. For thislab we will keep it
simple by using End Devices, Switches, Hubs, and Connections. We can select various devices
available in the packettracer.

Hubs Switches

Connections
EndDevices WanEmulation

CustomMadeDevices MultiuserConnection

Packet Tracer features :-


The current version of Packet Tracer supports an array of simulated Application Layer protocols,
as welas basic routing with RIP, OSPF, and EIGRP, to the extents required by the current
CCNAcurriculum.While Packet Tracer aims to provide a realistic simulation of functional networks,
the application itself utilizes only a small number of features found within the actual hardware
running a current Cisco IOSversion. Thus, Packet Tracer is unsuitable for modeling production
networks. With the introduction of version 5.3, several new features were added, including BGP.
BGP is not part of the CCNA curriculum, but part of the CCNPcurricul
Program No.:6

Aim: Design and implement a star topology using the Packet Tracer simulation
tool, selecting appropriate cables and connectors for the devices.
Destination

Steps to follow to create Star topology:-

1. Select 4 computers and a hub and drag them on the editorscreen.


2. Use copper straight wire and connect all the computers withhub.
3. Assign different IP address to all thePCs.
4. Select a Message and send it to PC0 toPC2.
5. Result aresuccessful as shown infig.
Program No:7

Aim: Implement a point-to-point& star topology using the Packet Tracer simulation
tool, configuring the devices and ensuring connectivity between them.
Steps to follow to create Point-to-Point topology:-

1. Select two computers and drag them on the editorscreen.


2. Use a copper straight wire and connectthem.
3. Assign different IP address to both ofthem.
4. Select a Message and send it to PC0 toPC1.
5. Result aresuccessful as shown infig.
Program NO:8

Aim: Implement a mesh & ring topology using the Packet Tracer simulation tool,
selecting appropriate devices, cables, and connectors and configuring them to
ensure proper connectivity.
Destination

Steps to follow to create Mesh Topology:-

1. Select 4 computers and 4 switches and drag them on the editorscreen.


2. Use a copper straight wire to connect the computers with switches and copper cross-over
to connect switches.
3. Assign different IP address to all thePCs.
4. Select a Message and send it to PC3 toPC0.
5. Result aresuccessful as shown infig.
Destination

Steps to follow to create Ring Topology:-

1. Select 6 computers and 6 switches and drag them on the editorscreen.


2. Use a copper straight wire to connect PCs with switches and cross-over wire toconnect
switches.
3. Assign different IP address to all thePCs.
4. Select a Message and send it to PC2 toPC1.
5. Result aresuccessful as shown infig.
Program NO:9

Aim: Implement a bus& tree topology using the Packet Tracer simulation tool,
selecting appropriate devices, cables, and connectors and configuring them to
ensure proper connectivity.
Destination

Steps to follow to create BusTopology:-


1. Select 4computers , 1 Server and 4 Switches and drag them on the editorscreen.
2. Use a copper straight wire to connect the PCs with switches and copper cross-over to
connect switches.
3. Assign different IP address to all thePCs.
4. Select a Message and send it to PC3 toPC0.
5. Result aresuccessful as shown infig.
Destination

Acknowledgement

Steps to follow to create Tree Topology:-

1. Select 6 computers and 5 Hubs and drag them on the editorscreen.


2. Use a copper straight wire to connect the PCs with switches and copper cross-overto
connect hubs with each other.
3. Assign different IP address to all thePCs.
4. Select a Message and send it to PC0 toPC4.
5. Result aresuccessful as shown infig.
Program NO:10
Aim:To create and simulate Routing and also configure the Routers using
Packet Tracer 5.0
Before Routing:
Destinatio
n
Steps to follow:

1. Select4computers,2switches,2routersanddragthemoncomputerscreen.
2. UsecopperstraightwiretoconnecttheroutersandPCswithswitchesandcopper-crosswireto
connect therouters.
3. AssigndifferentIPaddressesoalthePCs.
4. SelectaMessageandsenditfromPC0toPC1.

Butherewearenotabletosendthemessagebetweenthecomputersconnectedtodifferent
routers.SoweneedtoperformRouting.

In routing ,we write commands for each routers. The commands are used to make the
connections uplink connected with routers .

For Router0:-
--- System Configuration Dialog ---

Continue with configuration dialog? [yes/no]: no

Press RETURN to get started!


Router>enable

Router#configure terminal

Enter configuration commands, one per line. End with CNTL/Z. Router(con-

fig)#interface fa0/0

Router(con-fig-if)#ip address 10.1.1.1

255.255.255.0 Router(con-fig-if)#no shutdown

%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up

Router(con-fig-if)#interface fa0/1

Router(con-fig-if)#ip address 192.168.1.20 255.255.255.0

Router(con-fig-if)#no shutdown

%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to up

Router(con-fig-if)#exit

Router(con-fig)#ip route 192.150.1.0 255.255.255.0 10.1.1.2

Router(config)#

For Router1:-
--- System Configuration Dialog ---

Continue with configuration dialog? [yes/no]: no

Press RETURN to get started!

Router>enable
Router#configure terminal

Enter configuration commands, one per line. End with CNTL/Z. Router(con-

fig)#interface fa0/0

Router(con-fig-if)#ip address 10.1.1.2 255.255.255.0

Router(con-fig-if)#no shutdown

%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up

Router(config-if)#exit

Router(config)#interface fa0/1

Router(config-if)#ip address 192.150.1.20 255.255.255.0

Router(config-if)#no shutdown

%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to up

Router(con-fig-if)#exit

Router(con-fig)#ip route 192.168.1.0 255.255.255.0 10.1.1.1

Router(con-fig)#
After Routing :
Destination

Acknowledgement
Now we are able to sendthe message from PC0 to PC2.

You might also like