Faculty of Engineering Department of Computer Science and Engineering (Cyber Security)
Faculty of Engineering Department of Computer Science and Engineering (Cyber Security)
Faculty of Engineering
Department of Computer Science and Engineering (Cyber Security)
Prepared by Verified by
AP/CY HOD/CY
LIST OF EXPERIMENTS
Network Devices
1. Repeater:
• Functioning at Physical Layer. Repeater is an electronic device that receives a signal and
retransmits it at a higher level and/or higher power, or onto the other side of an obstruction,
so that the signal can cover longer distances. Repeater have two ports ,so cannot be use to
connect for more than two devices
2. Hub:
• An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator
is a device for connecting multiple twisted pair or fiber optic Ethernet devices together and
making them act as a single network segment. Hubs work at the physical layer (layer 1) of
the OSI model. The device is a form of multiport repeater. Repeater hubs also participate in
collision detection, forwarding a jam signal to all ports if it detects a collision.
3. Switch:
• Anetwork switch or switching hub is a computer networking device that connects
network segments.The term commonly refers to a network bridge that processes and routes
data at the data link layer (layer 2) of the OSI model. Switches that additionally process
data at the network layer (layer 3 and above) are often referred to as Layer 3 switches or
multilayer switches.
4. Bridge:
• A network bridge connects multiple network segments at the data link layer (Layer 2)
of the OSI model. In Ethernet networks, the term bridge formally means a device that
behaves according to the IEEE 802.1D standard. A bridge and switch are very much alike;
a switch being a bridge with numerous ports. Switch or Layer 2 switch is often used
interchangeably with bridge. Bridges can analyze incoming data packets to determine if
the bridge is able to send the given packet to another segment of the network.
5. Router:
• A router is an electronic device that interconnects two or more computer networks, and
selectively interchanges packets of data between them. Each data packet contains address
information that a router can use to determine if the source and destination are on the same
network, or if the data packet must be transferred from one network to another. Where
multiple routers are used in a large collection of interconnected networks, the routers
exchange information about target system addresses, so that each router can build up a
table showing the preferred paths between any two systems on the interconnected
networks.
6. Gate Way:
• In a communications network, a network node equipped for interfacing with
another network that uses different protocols.
• A gateway may contain devices such as protocol translators, impedance matching devices,
rate converters, fault isolators, or signal translators as necessary to provide system
interoperability. It also requires the establishment of mutually acceptable administrative
procedures between both networks.
• A protocol translation/mapping gateway interconnects networks with different network
protocol technologies by performing the required protocol conversions.
VIVA QUESTIONS:
1. What tools or commands would you use to capture and analyze network traffic?
2. What is the difference between TCP and UDP?
3. Define MAC address and IP address.
4. What is the OSI model? Describe the seven layers and their functions.
5. Explain the difference between a hub, switch, and router.
Result:
The above Network Devices are studied successfully.
Ex.No. 2 Study of different types of Network cables and practically implement the cross-wired
cable and straight through cable using clamping tool
Date:
Aim:
To Study of different types of Network cables and practically implement the cross-wired cable and
straight through cable using clamping tool.
Apparatus (Components):
RJ-45 connector, Climping Tool, Twisted pair Cable
Procedure:
Steps:
1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be very
careful at this point, as to not nick or cut into the wires, which are inside. Doing so could alter the
characteristics of your cable, or even worse render is useless. Check the wires, one more time for
nicks or cuts. If there are any, just whack the whole end off, and start over.
2. Spread the wires apart, but be sure to hold onto the base of the jacket with your other hand.
You do not want the wires to become untwisted down inside the jacket. Category 5 cable must
only have 1/2 of an inch of 'untwisted' wire at the end; otherwise it will be 'out of spec'. At this
point, you obviously have ALOT more than 1/2 of an inch of un-twisted wire.
3. You have 2 end jacks, which must be installed on your cable. If you are using a pre-made cable,
with one of the ends whacked off, you only have one end to install - the crossed over end. Below
are two diagrams, which show how you need to arrange the cables for each type of cable end.
Decide at this point which end you are making and examine the associated picture below.
VIVA QUESTIONS:
1. What is the difference between twisted pair, coaxial, and fiber optic cables?
2. What are the different connector types used with network cables?
3. Describe the characteristics and categories of twisted pair cables.
4. What factors should be considered when selecting a network cable type for a specific application?
5. Define Twisted pair Cable.
Result:
Thus, the above details used to study about the different types of Network cables and Practically
implement the cross-wired cable and straight through cable using clamping tool.
Ex.No. 3 Study of basic network command and Network configuration commands.
Date:
Procedure:
To do this EXPERIMENT- follows these steps:
In this EXPERIMENT- students have to understand basic networking commands e.g ping, tracert
etc.
All commands related to Network configuration which includes how to switch to privilege mode
and normal mode and how to configure router interface and how to save this configuration to flash
memory or permanent memory.
ping:
ping (8) sends an ICMP ECHO_REQUEST packet to the specified host. If the host
responds, you get an ICMP packet back. Sound strange? Well, you can “ping” an IP address to see
if a machine is alive. If there is no response, you know something is wrong.
Traceroute:
Tracert is a command which can show you the path a packet of information takes from your
computer to one you specify. It will list all the routers it passes through until it reaches its
destination, or fails to and is discarded. In addition to this, it will tell you how long each 'hop' from
router to router takes.
nslookup:
NOTE :If you write the command as above it shows as default your pc's server name firstly.
pathping:
A better version of tracert that gives you statics about packet lost and latency.
Getting Help
In any command mode, you can get a list of available commands by entering a question mark
(?). Router>?
To obtain a list of commands that begin with a particular character sequence, type in those
haracters followed immediately by the question mark (?).
Router#co?
configure connect copy
To list keywords or arguments, enter a question mark in place of a keyword or argument.
Include a space before the question mark.
Router#configure ?
memory Configure from NV memory network Configure from a TFTP network host terminal
Configure from the terminal
You can also abbreviate commands and keywords by entering just enough characters to make
the command unique from other commands. For example, you can abbreviate the show
command to sh.
Configuration Files
Any time you make changes to the router configuration, you must save the changes to memory
because if you do not they will be lost if there is a system reload or power outage. There are two
types of configuration files: the running (current operating) configuration and the startup
configuration.
Use the following privileged mode commands to work with configuration files
VIVA QUESTIONS:
1. What is the purpose of the route command, and how is it used to configure routing tables?
2. What are DHCP client and server configuration commands?
3. Explain the purpose of the netsh command in Windows networking.
4. What is the ipconfig (or ifconfig) command used for?
5. Describe the traceroute (or tracert) command and its utility.
Result:
Thus, detail study about basic network command and Network configuration commands.
EX.4 Implement different LAN topologies using Network Simulator.
Date:
Aim:
To implement different LAN topologies using Network Simulator.
Fig 3: Establish the links between the network devices and generic switches
Fig 4: Enter the IP address to each network devices
Bus Topology
Result:
Thus, to Configure network devices, such as hubs and switches within a network topology using Packet
Tracer software successfully.
9. Ex.No. 5 Implement the concept of VLAN using Network Simulator.
Date:
Aim:
To Implement the concept of VLAN using Network Simulator.
.
Procedure:
1. Launch Packet tracer.
2. Create network topology.
3. Connect devices.
4. Configure VLANs.
5. Assign ports.
6. Configure trunking.
7. Verify configurations.
In Figure the R1 GigabitEthernet 0/0/1 interface is connected to the S1 FastEthernet 0/5 port. The
S1 FastEthernet 0/1 port is connected to the S2 FastEthernet 0/1 port. These are trunk links that are
required to forward traffic within and between VLANs.
G0/0/1.10 10 192.168.10.1/24
G0/0/1.20 20 192.168.20.1/24
G0/0/1.30 99 192.168.99.1/24
VIVA QUESTIONS:
1. What is a VLAN (Virtual Local Area Network), and what are its benefits in a network environment?
2. How does VLAN trunking allow for the implementation of VLANs across multiple switches?
Result:
Thus the Configure network topology to implement VLANs with trunking using
PacketTracer software was successfully implemented and verified.
Ex.No. 6 Implement Static Routing
Date:
Aim:
To Configure network topology and implement static routing using Packet Tracer
Software.
Procedure:
1.Network topology.
2.Configure IP Address.
3.Enable Routing.
4.Verify Connectivity.
5.Monitor and Troubleshoot.
6.Document Configuration
Use the "ip route" command followed by the destination network address, subnet
mask, and next-hop router's IP address to configure static routes.
4. Verify Connectivity:
Use Packet Tracer's simulation mode to test network connectivity.
Ping from one device to another to verify that the static routes are correctly
configured.
Ensure that the ICMP (Internet Control Message Protocol) traffic is allowed through
any firewalls or security features on the devices.
5. Monitor and Troubleshoot:
Monitor the network for any issues or errors.
If any connectivity or routing problems arise, use Packet Tracer's logging and
debugging features to troubleshoot.
Check the routing tables on each router to ensure that the correct static routes are
present.
6. Document the Configuration:
Document the network topology, including the IP addresses assigned to each device
and the configured static routes.
Take screenshots or export the configuration files from Packet Tracer for reference
purposes.
EXPRIMENT SETUP : Design network topology
In this lab, each network has two routes to reach. We will configure one route as the main route
andanother route as the backup route. If the link bandwidth of all routes is the same, we use the
route that has the least number of routers as the main route. If the link bandwidth and the number
of routersare the same, we can use any route as the main route and another route as the backup
route.
If we specify two routes for the same destination, the router automatically selects the best route
for the destination and adds the route to the routing table. If you manually want to select a route
that therouter should add to the routing table, you have to set the AD value of the route lower
than other routes. For example, if you use the following commands to create two static routes
for network 30.0.0/8, the route will place the first route to the routing table.
Router1 configuration
Router>enable
Router#configure
terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#ip route 10.0.0.0 255.0.0.0 20.0.0.1 10
Router(config)#ip route 10.0.0.0 255.0.0.0 50.0.0.1 20
Router(config)#ip route 40.0.0.0 255.0.0.0 20.0.0.1 10
Router(config)#ip route 40.0.0.0 255.0.0.0 50.0.0.1 20
Router(config)#exit
Router#show ip route static
S 10.0.0.0/8 [10/0] via
20.0.0.1S 40.0.0.0/8 [10/0]
via 20.0.0.1
Router#
Router2 configuration
Router>enable
Router#configure
terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#ip route 10.0.0.0 255.0.0.0 40.0.0.1
Router(config)#ip route 30.0.0.0 255.0.0.0 50.0.0.2
Router(config)#exit
Router#show ip route static
S 10.0.0.0/8 [1/0] via
40.0.0.1S 30.0.0.0/8 [1/0]
via 50.0.0.2
Router#
VIVA QUESTIONS:
1. What is static routing, and how does it differ from dynamic routing?
2. What are floating static routes, and when are they used?
3. How does a router handle packets when using static routes?
4. What are the advantages and disadvantages of static routing?
5. What is the purpose of a default route, and how is it configured statically?
Result:
Thus, configure network topology and implement static routing using Packet Tracer was
successfully implemented and verified.
Ex.No. 7 Implement Dynamic Routing Protocol
Date:
AIM:
To Configure network topology and implement dynamic routing protocol such
as RIP, OSPF etc. using Packet Tracer.
PROCEDURE:
1.launch packet tracer.
2.Design network topology.
3.Configure IP Address.
4.Implement Dyanamic Routing protocol.
5.Verify Routing Protocol functionality.
6.Test Network Resilience and Adaptability.
7.Document and analyze.
8.Troubleshooting.
9.Finalize the Experiment.
Router0 Configuration :
Router>en
Router#conf t
Router(config)#hostname
Router0
Router0(config)#int s0/3/0
Router0(config-if)#ip add 192.168.3.1 255.255.255.252
Router0(config-if)#no shut
Router0(config-if)#desc connection to
Router1Router0(config-if)#int f0/0
Router0(config-if)#ip add 192.168.0.1
255.255.255.0Router0(config-if)#no shut
Router0(config-if)#desc connection
to LANRouter0(config-if)#exit
Router0(config)#router RIP
Router0(config-router)#netw 192.168.0.0
Router0(config-router)#netw
192.168.3.0Router0(config-
router)#no auto Router0(config-
router)#exit Router0(config)#exit
Router0#copy run start
Router1 Configuration:
Router>en
Router#conf t
Router(config)#hostname
Router1 Router1(config)#int
s0/3/0 Router1(config-
if)#clock rate 64000
Router1(config-if)#ip add 192.168.3.2
255.255.255.252Router1(config-if)#no shut
Router1(config-if)#desc connection to
Router0Router1(config-if)#int s0/2/0
Router1(config-if)#clock rate 64000
Router1(config-if)#ip add 192.168.4.1
255.255.255.252Router1(config-if)#no shut
Router1(config-if)#desc connection to
Router2Router1(config-if)#int f0/0
Router1(config-if)#ip add 192.168.1.1
255.255.255.0Router1(config-if)#no shut
Router1(config-if)#desc connection
to LANRouter1(config-if)#exit
Router1(config)#router RIP
Router1(config-router)#netw 192.168.1.0
Router1(config-router)#netw 192.168.3.0
Router1(config-router)#netw
192.168.4.0Router1(config-
router)#no auto Router1(config-
router)#exit Router1(config)#exit
Router1#copy run start
Router2 Configuration :
Router>en Router#conf t
Router(config)#hostname
Router0Router2(config)#int
s0/3/0
Router2(config-if)#ip add 192.168.4.2
255.255.255.252Router2(config-if)#no shut
Router2(config-if)#desc connection to
Router1Router2(config-if)#int f0/0
Router2(config-if)#ip add 192.168.2.1
255.255.255.0Router2(config-if)#no shut
Router2(config-if)#desc connection
to LANRouter2(config-if)#exit
Router2(config)#router RIP
Router2(config-router)#netw 192.168.4.0
Router2(config-router)#netw 192.168.2.0
Router2(config-router)#no auto
Router2(config-router)#exit
Router2(config)#exit Router2#copy run start
VIVA QUESTIONS:
1. What is dynamic routing, and how does it differ from static routing?
2. Can you explain the concept of routing protocols in dynamic routing?
3. What are the advantages of using dynamic routing protocols in a network?
4. Name some popular dynamic routing protocols and briefly describe how they work.
5. What is the purpose of a routing table in dynamic routing?
6. How does a router determine the best path in dynamic routing?
Result:
Thus, the network topology and implement dynamic routing protocol such as RIP,
OSPF etc. using Packet Tracer was configured successfully.
Ex.No. 8 Packet capture and header analysis by wire-shark
Date:
AIM:
To capture Packet and header analysis by wire-shark.
PROCEDURE:
Install Wireshark:
Ensure Wireshark is installed on your computer. If not, download and install it from the official
website.
Network Setup:
Connect your computer to the network where you want to capture traffic. This could be a local area
network (LAN) or a virtual network if you're using virtual machines.
Launch Wireshark:
Open Wireshark on your computer.
Select Network Interface:
Choose the network interface that corresponds to the network you want to capture traffic from. This
could be your Ethernet adapter or Wi-Fi interface.
Start Capture:
Click on the interface name and then click the "Start" button to begin capturing packets.
Generate Traffic:
Perform various activities on your network, such as browsing websites, sending emails, or accessing
network resources. This will generate network traffic that Wireshark will capture.
Stop Capture:
After capturing enough packets, click the "Stop" button in Wireshark to stop the packet capture.
Analyze Packets:
Explore the captured packets in Wireshark. You can analyze packet headers to identify various
protocols used in the captured traffic.
Look at the source and destination IP addresses to understand the communication between devices.
Analyze the protocol headers (e.g., TCP, UDP, ICMP) to understand the type of traffic and its
characteristics.
Pay attention to any anomalies or suspicious traffic patterns.
Filtering and Sorting:
Use Wireshark's filtering and sorting capabilities to focus on specific types of traffic or protocols.
Experiment with different display filters to isolate traffic of interest.
Capture File Analysis:
Save the captured packets to a capture file for further analysis if needed.
Open the capture file and analyze it using Wireshark or other tools.
VIVA QUESTIONS:
1. What is Wireshark, and what is its primary purpose in network analysis?
2. Describe the process of capturing network packets using Wireshark.
3. Why is it important to capture network packets for analysis?
4. How does Wireshark determine which packets to capture?
5. Explain the significance of packet headers in network communication.
Result:
Thus, the Packet and header was captured by wire-shark.