Data Communication

Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

Laboratory Manual

For
DATA COMMUNICATION AND NETWORK

By

MUSTAPHA YUSUF ABUBAKAR

2013-14

Department of Computer & Information Sciences

Universiti Teknologi PETRONAS


Malaysia
www.utp.edu.my
&
Computer Science Department, School of Technology

Kano State Polytechnic, Kano

Nigeria

1  |  P a g e  

Mustapha  Yusuf  Abubakar  (CIS  Dept.  UTP)  


Table of Contents

EXPERIMENT-1

Study of Network Devices in Detail...............................................................................................4

EXPERIMENT-2

Study of basic network command and Network configuration commands.......................................9

EXPERIMENT-3

Study of network IP
· Classification of IP address
· Sub netting
Super netting......................................................................................................................................10

EXPERIMENT-4

Fundamental Study of Packet Tracer………………………………………………………..……..19

EXPERIMENT-5

Configure a Network topology using packet tracer software. .........................................................32

EXPERIMENT-6
Configure a Network using Distance Vector Routing protocol.
• RIP

• IGRP(Case Study)…………….......................................................................................... 33

EXPERIMENT-7

Configure Network using Link State Vector Routing protocol.

• OSPF ................................................................................................................................. 37

EXPERIMENT-8

Remote Desktop web Connection ……………………………………………………………….40

EXPERIMENT-9

2  |  P a g e  

Mustapha  Yusuf  Abubakar  (CIS  Dept.  UTP)  


Basic Switch Operations………………………………………………………………………….45
• LAN Cable Handling and Testing
• Switch Configuration via Console Connection
• Switch Basic Operation
• Switch Configuration via TELNET

EXPERIMENT-10

Basic Router Operations………………………………………………………………………….66


• Basic Router Configuration
• Static Router Configuration

3  |  P a g e  

Mustapha  Yusuf  Abubakar  (CIS  Dept.  UTP)  


EXPERIMENT- 1

Aim: Study of following Network Devices in Detail


Ø Repeater
Ø Hub
Ø Switch
Ø Bridge
Ø Router
Ø Gate Way

Apparatus (Software): No software or hardware needed.

Procedure: Following should be done to understand this practical.

1. Repeater: Functioning at Physical Layer. A repeater is an electronic device that receives a


signal and retransmits it at a higher level and/or higher power, or onto the other side of an
obstruction, so that the signal can cover longer distances. Repeaters can be a two and more
Ethernet ports

2. Hub: In computer networking, a hub is a small, simple, inexpensive device for connecting
multiple twisted pair or fiber optic Ethernet devices together and making them act as a
single network segment. Ethernet hubs operate as Layer 2 devices in the OSI model, the
same as network switches. Although offering comparable functionality, nearly all
mainstream home network equipment today utilizes network switch technology instead of
hubs due to the performance benefits of switches. A hub can be useful for temporarily
replacing a broken network switch or when performance is not a critical factor on the
network.

4  |  P a g e  

Mustapha  Yusuf  Abubakar  (CIS  Dept.  UTP)  


Working with Ethernet hubs

To network a group of computers using an Ethernet hub, first connect an Ethernet cable into
the unit, then connect the other end of the cable to each computer's network interface card
(NIC). All Ethernet hubs accept the RJ-45 connectors of standard Ethernet cables.

3. Switch: A switch is a telecommunication device that receives a message from any device
connected to it and then transmits the message only to the device for which the message was
meant. This makes the switch a more intelligent device than a hub (which receives a
message and then transmits it to all the other devices on its network). Switches may operate
at one or more layers of the OSI model, including data link and network. A device that
operates simultaneously at more than one of these layers is known as a multilayer switch.

5  |  P a g e  

Mustapha  Yusuf  Abubakar  (CIS  Dept.  UTP)  


4. Bridge: An Ethernet network bridge is a device which connects two different local area
networks together. Both networks must connect using the same Ethernet protocol. Bridges
can also be used to add remote computers to a LAN. Many bridges can connect multiple
computers or other compatible devices with or without wires.

Types

• There are two common types of Ethernet bridges. One is the Wi-Fi bridge, which is used
to connect a computer to a network without wires and without a network adapter.
Another type is the power line Ethernet Bridge, which uses a building's electrical system
to connect remote computers.

Function

• Bridges use the Data Layer (Layer 2) of the Open Systems Interconnection (OSI)
Reference Model to find computers on a network. They find devices using Media
Access Control (MAC) addresses, which are hardware addresses. However, they can't
find Internet protocol (IP) addresses as network routers can. Network routers operate at
Level 3 of the OSI model, or the Network Layer.

Wireless bridges are typically less expensive and easier to install than routers. However, if
the computer you're trying to connect isn't too far away from the network router, an access
point or bridge and access point combination may be better. The wireless bridge and power
Line Bridge both obviate the necessity of stringing Ethernet cable through walls or an attic.
They both simplify network installation significantly.
6  |  P a g e  

Mustapha  Yusuf  Abubakar  (CIS  Dept.  UTP)  


5. Router: A router is an electronic device that interconnects two or more computer
networks, and selectively interchanges packets of data between them. Each data packet
contains address information that a router can use to determine if the source and destination
are on the same network, or if the data packet must be transferred from one network to
another. Where multiple routers are used in a large collection of interconnected networks,
the routers exchange information about paths between any two systems on the
interconnected networks. A network router is a more sophisticated network device
compared to either a network switch or a network hub. Like hubs and switches, routers are
typically small, box-like pieces of equipment that multiple computers can connect to. Each
features a number of ports on the front or back of the unit that provide the connection points
for these computers, a connection for electric power, and a number of LED lights to display
device status. While routers, hubs and switches all share similar physical appearance,
routers differ substantially in their inner workings.

6. Gate Way: A network gateway is an internetworking system capable of joining together


two networks that use different base protocols. A network gateway can be implemented
completely in software, completely in hardware, or as a combination of both. Depending on
the types of protocols they support, network gateways can operate at any level of the OSI
model.
• A gateway may contain devices such as protocol translators, impedance matching
devices, rate converters, fault isolators, or signal translators as necessary to provide

7  |  P a g e  

Mustapha  Yusuf  Abubakar  (CIS  Dept.  UTP)  


system interoperability. It also requires the establishment of mutually acceptable
administrative procedures between both networks
• A protocol translation/mapping gateway interconnects networks with different networks
protocol technologies by performing the required protocol conversions.

Questions:

1. Define the differences between Switch and Hub.


2. Which of the below answers contain devices such as protocol translators and rate convertors:
§ Gateway
§ Router
§ Bridge
3. Write 2 common types of bridges.
4. Which one of them uses data layer-2?
§ All of them
§ Only bridge
§ Only switch
§ Only Hub
5. Give a real life example with hubs. Where and how they use?

8  |  P a g e  

Mustapha  Yusuf  Abubakar  (CIS  Dept.  UTP)  


EXPERIMENT- 2

Aim: Study of basic network command and Network configuration commands.


Apparatus (Software): Command Prompt and Packet Tracer.
Procedure: To do this EXPERIMENT- follows these steps:

In this EXPERIMENT- students have to understand basic networking commands e.g ping, tracert
etc.

All commands related to Network configuration which includes how to switch to privilege mode
and normal mode and how to configure router interface and how to save this configuration to flash
memory or permanent memory.

This commands includes

Ø Configuring the Router commands


Ø General Commands to configure network
Ø Privileged Mode commands of a router
Ø Router Processes & Statistics
Ø IP Commands
Ø Other IP Commands e.g. show ip route etc.

v PING Command
v TRACERT Command
v PATHPING Command
v Enhanced Ping
v NETSTAT Command
v NetStat Live
v AT Command
v NET Command
v ROUTE Command
v ARP Command
v IPCONFIG Command
v NETSH Command
Questions:

1. How will check ip address on 98?


2. What is the Ping command and how is it used?
3. Why should I ping?
4. Full form of ping.
5. Which command is one of the most basic troubleshooting tools for computer network?

9  |  P a g e  

Mustapha  Yusuf  Abubakar  (CIS  Dept.  UTP)  


EXPERIMENT- 3

Aim: Study of network IP


• Classification of IP address
• Sub netting
• Super netting
Apparatus (Software): NA

Procedure: Following is required to be study under this practical.

• Classification of IP address
As show in figure we teach how the ip addresses are classified and when they are used.

• Classification of IP address

"Class A" IP addresses are for very large networks. The left most bit of the left most
octet of a "Class A" network is reserved as "0". The first octet of a "Class A" IP address
is used to identify the Network and the three remaining octets are used to identify the
host in that particular network (Network.Host.Host.Host).
The 32 bits of a "Class A" IP address can be represented as
0xxxxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx.
The minimum possible value for the leftmost octet in binaries is 00000000 (decimal
equivalent is 0) and the maximum possible value for the leftmost octet is 01111111
(decimal equivalent is 127). Therefore for a "Class A" IP address, leftmost octet must
have a value between 0-127 (0.X.X.X to 127.X.X.X).
The network 127.0.0.0 is known as loopback network. The IP address 127.0.0.1 is used
by the host computer to send a message back to itself. It is commonly used for
troubleshooting and network testing.
Computers not connected directly to the Internet need not have globally-unique IP
addresses. They need an IP addresses unique to that network only. 10.0.0.0 network
belongs to "Class A" is reserved for private use and can be used inside any organization.

"Class B" IP addresses are used for medium-sized networks. Two left most bits of the
left most octet of a "Class B" network is reserved as "10". The first two octets of a
"Class B" IP address is used toidentify the Network and the remaining two octets are
used to identify the host in that particular network (Network.Network.Host.Host).

10  |  P a g e  

Mustapha  Yusuf  Abubakar  (CIS  Dept.  UTP)  


The 32 bits of a "Class B" IP address can be represented as
10xxxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx.
The minimum possible value for the leftmost octet in binaries is 10000000 (decimal
equivalent is 128) and the maximum possible value for the leftmost octet is 10111111
(decimal equivalent is 191). Therefore for a "Class B" IP address, leftmost octet must
have a value between 128-191 (128.X.X.X to 191.X.X.X).
Network 169.254.0.0 is known as APIPA (Automatic Private IP Addresses). APIPA
range of IP addresses are used when a client is configured to automatically obtain an IP
address from the DHCP server was unable to contact the DHCP server for dynamic IP
address.
Networks starting from 172.16.0.0 to 172.31.0.0 are reserved for private use.

"Class C" IP addresses are commonly used for small to mid-size businesses. Three left
most bits of the left most octet of a "Class C" network is reserved as "110". The first
three octets of a "Class C" IP address is used to identify the Network and the remaining
one octet is used to identify the host in that particular network
(Network.Network.Networkt.Host).
The 32 bits of a "Class C" IP address can be represented as
110xxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx.
The minimum possible value for the leftmost octet in binaries is 11000000 (decimal
equivalent is 192) and the maximum possible value for the leftmost octet is 11011111
(decimal equivalent is 223). Therefore for a "Class C" IP address, leftmost octet must
have a value between 192-223 (192.X.X.X to 223.X.X.X).
Networks starting from 192.168.0.0 to 192.168.255.0 are reserved for private use.

“Class D” IP addresses are known as multicast IP addresses. Multicasting is a technique


developed to send packets from one device to many other devices, without any
unnecessary packet duplication. In multicasting, one packet is sent from a source and is
replicated as needed in the network to reach as many end-users as necessary. You cannot
assign these IP addresses to your devices.
Four left most bits of the left most octet of a "Class D" network is reserved as "1110".
The other 28 bits are used to identify the group of computers the multicast message is
intended for.
The minimum possible value for the left most octet in binaries is 11100000 (decimal
equivalent is 224) and the maximum possible value for the leftmost octet is 11101111
(decimal equivalent is 239). Therefore for a "Class D" IP address, leftmost octet must
have a value between 223-239 (223.X.X.X to 239.X.X.X).

“Class E” is used for experimental purposes only and you cannot assign these IP
addresses to your devices.
Four left most bits of the left most octet of a "Class E" network is reserved as "1111".
The minimum possible value for the left most octet in binaries is 11110000 (decimal
equivalent is 240) and the maximum possible value for the leftmost octet is 11111111
(decimal equivalent is 255). Therefore for a "Class E" IP address, leftmost octet must
have a value between 240-255 (240.X.X.X to 255.X.X.X).

11  |  P a g e  

Mustapha  Yusuf  Abubakar  (CIS  Dept.  UTP)  


• Subnetting: A subnetwork, or subnet, is a logically visible subdivision of an IP
network. All computers that belong to a subnet are addressed with a common, identical,
most-significant bit-group in their IP address. This results in the logical division of an IP
address into two fields, a network or routing prefix and the rest field or host identifier.
The rest field is an identifier for a specific host or network interface.

• Super netting: Supernetting, also called Classless Inter-Domain Routing (CIDR), is a


way to aggregate multiple Internet addresses of the same class. Supernetting was created
as a way to solve the problem of routing tables growing beyond the ability of current
software and people to manage and to provide a solution to the exhaustion of Class B
network address space. Supernetting allows one routing table entry to represent an
aggregation of networks much like one area code represents an aggregation of telephone
numbers in an area.

• Sub netting
Why we Develop sub netting and How to calculate subnet mask and how to identify subnet address.

• Super netting
Why we develop super netting and How to calculate supernet mask and how to identify supernet
address.

How to Calculate Subnets


Subnets and Hosts
Borrow 2 bits
S S H H H H H H
# of subnets = 22 = 4
Subnet mask = 2 bits = 128 + 64 = 192
Range of hosts = 26 = 64

Range Useable Range


Network ID 0 – 63
64 – 127 65 - 126
128 – 191 129 – 190
Broadcast 192 – 255
Address

12  |  P a g e  

Mustapha  Yusuf  Abubakar  (CIS  Dept.  UTP)  


Borrow 3 bits
S S S H H H H H
# of subnets = 23 = 8
Subnet mask = 3 bits = 128 + 64 + 32 = 224
Range of hosts = 25 = 32

Range Useable Range


Network ID 0 – 31
32 – 63 33 - 62
64 – 95 65 - 94
96 – 127 97 -126
128 – 159 129 -158
160 – 191 161 -190
192 – 223 193 -222
Broadcast 224 – 255
Address
Decimal/Binary Subnet Ranges
Borrow 2 bits
S S H H H H H H
# of subnets = 22 = 4 = 00000100
Subnet mask = 2 bits = 128 + 64 = 192 = 11000000
Range of hosts = 26 = 64 = 01000000
[Range ……………………………] [Useable Range …………………...]
Network ID 0 – 63 00 000000 – 00 111111
64 – 127 01 000000 – 01 111111 65 - 126 01 000001 – 01 111110
128 – 191 10 000000 – 10 111111 129 – 190 10 000001 – 10 111110
Broadcast 192 – 255 11 000000 – 11 111111
Address

Borrow 3 bits

13  |  P a g e  

Mustapha  Yusuf  Abubakar  (CIS  Dept.  UTP)  


S S S H H H H H
# of subnets = 23 = 8
Subnet mask = 3 bits = 128 + 64 + 32 = 224 = 11100000
Range of hosts = 25 = 32 = 00100000

[Range ……………………………] [Useable Range


…………………...]
Network ID 0 – 31 000 00000 – 000 11111
32 – 63 001 00000 – 001 11111 33 – 62 001 00001 – 001 11110
64 – 95 010 00000 – 010 11111 65 – 94 010 00001 – 010 11110
96 – 127 011 00000 – 011 11111 97 – 126 011 00001 – 011 11110
128 – 159 100 00000 – 100 11111 129 – 158 100 00001 – 100 11110
160 – 191 101 00000 – 101 11111 161 – 190 101 00001 – 101 11110
192 – 223 110 00000 – 110 11111 193 – 222 110 00001 – 110 11110
Broadcast 224 – 255 111 00000 – 111 11111
Address

Binary Subnet Ranges

Borrow 2 bits
S S H H H H H H
# of subnets = 22 = 4 = 00000100
Subnet mask = 2 bits = 128 + 64 = 192 = 11000000
Range of hosts = 26 = 64 = 01000000

[Net] [Useable] [Broadcast] [Network] [Useable Range …….] [Broadcast]


[ID] [Range] [ID]
0 63 00 000000 00 111111
64 65 – 126 127 01 000000 01 000001 – 01 111110 01 111111
128 129 – 190 191 10 000000 10 000001 – 10 111110 10 111111
192 255 11 000000 11 111111

14  |  P a g e  

Mustapha  Yusuf  Abubakar  (CIS  Dept.  UTP)  


Borrow 3 bits
S S S H H H H H
# of subnets = 23 = 8
Subnet mask = 3 bits = 128 + 64 + 32 = 224 = 11100000
Range of hosts = 25 = 32 = 00100000

[Net] [Useable] [Broadcast] [Network] [Useable Range …….] [Broadcast]


[ID] [Range] [ID]
0 31 000 00000 000 11111
32 33 – 62 63 001 00000 001 00001 – 001 11110 001 11111
64 65 – 94 95 010 00000 010 00001 – 010 11110 010 11111
96 97 – 126 127 011 00000 011 00001 – 011 11110 011 11111
128 129 – 158 159 100 00000 100 00001 – 100 11110 100 11111
160 161 – 190 191 101 00000 101 00001 – 101 11110 101 11111
192 193 – 222 223 110 00000 110 00001 – 110 11110 110 11111
224 255 111 00000 111 11111

15  |  P a g e  

Mustapha  Yusuf  Abubakar  (CIS  Dept.  UTP)  

You might also like