Data Communication
Data Communication
Data Communication
For
DATA COMMUNICATION AND NETWORK
By
2013-14
Nigeria
1 | P a g e
EXPERIMENT-1
EXPERIMENT-2
EXPERIMENT-3
Study of network IP
· Classification of IP address
· Sub netting
Super netting......................................................................................................................................10
EXPERIMENT-4
EXPERIMENT-5
EXPERIMENT-6
Configure a Network using Distance Vector Routing protocol.
• RIP
• IGRP(Case Study)…………….......................................................................................... 33
EXPERIMENT-7
• OSPF ................................................................................................................................. 37
EXPERIMENT-8
EXPERIMENT-9
2 | P a g e
EXPERIMENT-10
3 | P a g e
2. Hub: In computer networking, a hub is a small, simple, inexpensive device for connecting
multiple twisted pair or fiber optic Ethernet devices together and making them act as a
single network segment. Ethernet hubs operate as Layer 2 devices in the OSI model, the
same as network switches. Although offering comparable functionality, nearly all
mainstream home network equipment today utilizes network switch technology instead of
hubs due to the performance benefits of switches. A hub can be useful for temporarily
replacing a broken network switch or when performance is not a critical factor on the
network.
4 | P a g e
To network a group of computers using an Ethernet hub, first connect an Ethernet cable into
the unit, then connect the other end of the cable to each computer's network interface card
(NIC). All Ethernet hubs accept the RJ-45 connectors of standard Ethernet cables.
3. Switch: A switch is a telecommunication device that receives a message from any device
connected to it and then transmits the message only to the device for which the message was
meant. This makes the switch a more intelligent device than a hub (which receives a
message and then transmits it to all the other devices on its network). Switches may operate
at one or more layers of the OSI model, including data link and network. A device that
operates simultaneously at more than one of these layers is known as a multilayer switch.
5 | P a g e
Types
• There are two common types of Ethernet bridges. One is the Wi-Fi bridge, which is used
to connect a computer to a network without wires and without a network adapter.
Another type is the power line Ethernet Bridge, which uses a building's electrical system
to connect remote computers.
Function
• Bridges use the Data Layer (Layer 2) of the Open Systems Interconnection (OSI)
Reference Model to find computers on a network. They find devices using Media
Access Control (MAC) addresses, which are hardware addresses. However, they can't
find Internet protocol (IP) addresses as network routers can. Network routers operate at
Level 3 of the OSI model, or the Network Layer.
Wireless bridges are typically less expensive and easier to install than routers. However, if
the computer you're trying to connect isn't too far away from the network router, an access
point or bridge and access point combination may be better. The wireless bridge and power
Line Bridge both obviate the necessity of stringing Ethernet cable through walls or an attic.
They both simplify network installation significantly.
6
|
P a g e
7 | P a g e
Questions:
8 | P a g e
In this EXPERIMENT- students have to understand basic networking commands e.g ping, tracert
etc.
All commands related to Network configuration which includes how to switch to privilege mode
and normal mode and how to configure router interface and how to save this configuration to flash
memory or permanent memory.
v PING Command
v TRACERT Command
v PATHPING Command
v Enhanced Ping
v NETSTAT Command
v NetStat Live
v AT Command
v NET Command
v ROUTE Command
v ARP Command
v IPCONFIG Command
v NETSH Command
Questions:
9 | P a g e
• Classification of IP address
As show in figure we teach how the ip addresses are classified and when they are used.
• Classification of IP address
"Class A" IP addresses are for very large networks. The left most bit of the left most
octet of a "Class A" network is reserved as "0". The first octet of a "Class A" IP address
is used to identify the Network and the three remaining octets are used to identify the
host in that particular network (Network.Host.Host.Host).
The 32 bits of a "Class A" IP address can be represented as
0xxxxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx.
The minimum possible value for the leftmost octet in binaries is 00000000 (decimal
equivalent is 0) and the maximum possible value for the leftmost octet is 01111111
(decimal equivalent is 127). Therefore for a "Class A" IP address, leftmost octet must
have a value between 0-127 (0.X.X.X to 127.X.X.X).
The network 127.0.0.0 is known as loopback network. The IP address 127.0.0.1 is used
by the host computer to send a message back to itself. It is commonly used for
troubleshooting and network testing.
Computers not connected directly to the Internet need not have globally-unique IP
addresses. They need an IP addresses unique to that network only. 10.0.0.0 network
belongs to "Class A" is reserved for private use and can be used inside any organization.
"Class B" IP addresses are used for medium-sized networks. Two left most bits of the
left most octet of a "Class B" network is reserved as "10". The first two octets of a
"Class B" IP address is used toidentify the Network and the remaining two octets are
used to identify the host in that particular network (Network.Network.Host.Host).
10 | P a g e
"Class C" IP addresses are commonly used for small to mid-size businesses. Three left
most bits of the left most octet of a "Class C" network is reserved as "110". The first
three octets of a "Class C" IP address is used to identify the Network and the remaining
one octet is used to identify the host in that particular network
(Network.Network.Networkt.Host).
The 32 bits of a "Class C" IP address can be represented as
110xxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx.
The minimum possible value for the leftmost octet in binaries is 11000000 (decimal
equivalent is 192) and the maximum possible value for the leftmost octet is 11011111
(decimal equivalent is 223). Therefore for a "Class C" IP address, leftmost octet must
have a value between 192-223 (192.X.X.X to 223.X.X.X).
Networks starting from 192.168.0.0 to 192.168.255.0 are reserved for private use.
“Class E” is used for experimental purposes only and you cannot assign these IP
addresses to your devices.
Four left most bits of the left most octet of a "Class E" network is reserved as "1111".
The minimum possible value for the left most octet in binaries is 11110000 (decimal
equivalent is 240) and the maximum possible value for the leftmost octet is 11111111
(decimal equivalent is 255). Therefore for a "Class E" IP address, leftmost octet must
have a value between 240-255 (240.X.X.X to 255.X.X.X).
11 | P a g e
• Sub netting
Why we Develop sub netting and How to calculate subnet mask and how to identify subnet address.
• Super netting
Why we develop super netting and How to calculate supernet mask and how to identify supernet
address.
12 | P a g e
Borrow 3 bits
13 | P a g e
Borrow 2 bits
S S H H H H H H
# of subnets = 22 = 4 = 00000100
Subnet mask = 2 bits = 128 + 64 = 192 = 11000000
Range of hosts = 26 = 64 = 01000000
14 | P a g e
15 | P a g e