0% found this document useful (0 votes)
50 views

Computer Networking

BCA 5th sem - Computer Networking lab report

Uploaded by

Prijan Khad
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views

Computer Networking

BCA 5th sem - Computer Networking lab report

Uploaded by

Prijan Khad
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Index

Experiment
Title
No :
1 Study of different types of Network cables and practically
implements the cross-wiredcable and straight through cable using
clamping tool.

2 Study of following Network Devices in Detail.


• Repeater
• Hub
• Switch
• Bridge
• Router
• Gate Way

3 Study of network IP
 Classification of IP address
 Sub netting
 Super netting


4 Connect the computers in Local Area Network.

5 Study of basic network command and Network configuration


commands.

6 Configure a Network topology using packet tracer software.

7 Configure a Network topology using packet tracer software.

8 Configure a Network using Distance Vector Routing protocol.


• RIP

9 Configure Network using Link State Vector Routing protocol.


• OSPF

1
EXPERIMENT-1

Aim: Study of different types of Network cables and practically implements the cross-
wired cable andstraight through cable using clamping tool.

Apparatus (Components): RJ-45 connector, Climping Tool, Twisted pair cable

Procedure: To do these practical following steps should be done:

1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be
very careful at this point, as to not nick or cut into the wires, which are inside. Doing
so could alter the characteristics of your cable, or even worse render is useless. Check
the wires, one more time for nicks or cuts. If thereare any, just whack the whole end
off, and start over.

2. Spread the wires apart, but be sure to hold onto the base of the jacket with your
other hand. You do not want the wires to become untwisted down inside the jacket.
Category 5 cable must only have 1/2 of an inch of 'untwisted' wire at the end; otherwise
it will be 'out of spec'. At this point, you obviously haveALOT more than 1/2 of an inch
of un-twisted wire.

3. You have 2 end jacks, which must be installed on your cable. If you are using a pre-
made cable, withone of the ends whacked off, you only have one end to install - the
crossed over end. Below are two diagrams, which show how you need to arrange the
cables for each type of cable end. Decide at this point which end you are making and
examine the associated picture below.

Diagram shows you how to prepare Cross wired connection:

2
Diagram shows you how to prepare straight through wired connection:

3
EXPERIMENT-2

Aim: Study of following Network Devices in Detail.

• Repeater

• Hub

• Switch

• Bridge

• Router

• Gate Way

Apparatus (Software): No software or hardware

needed. Procedure: Following should be done to

understand this practical.

1. Repeater: Functioning at Physical Layer. A repeater is an electronic device that


receives a signaland retransmits it at a higher level and/or higher power, or onto
the other side of an obstruction, so that the signal can cover longer distances.
Repeater has two ports, so cannot be used to connect for more than two devices.

2. Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or
concentrator is a device for connecting multiple twisted pair or fiber optic
Ethernet devices together and making them actas a single network segment.
Hubs work at the physical layer (layer 1) of the OSI model. The device is a form
of multiport repeater. Repeater hubs also participate in collision detection,
forwarding a jam signal to all ports if it detects a collision.

3. Switch: A network switch or switching hub is a computer networking device


that connects network segments. The term commonly refers to a network bridge
that processes and routes dataat the data link layer (layer 2) of the OSI model.
Switches that additionally process data at the network layer (layer 3 and above)
are often referred to as Layer 3 switches or multilayer switches.

4. Bridge: A network bridge connects multiple network segments at the data link
layer (Layer 2) ofthe OSI model. In Ethernet networks, the term bridge formally
means a device that behaves according to the IEEE 802.1 D standards. A bridge
and switch are very much alike; a switch being a bridge with numerous ports.
Switch or Layer 2 switch is often used interchangeably withbridge. Bridges can
analyze incoming data packets to determine if the bridge is able to send the
given packet to another segment of the network.

4
5. Router: A router is an electronic device that interconnects two or more
computer networks, andselectively interchanges packets of data between them.
Each data packet contains address information that a router can use to
determine if the source and destination are on the same network, or if the data
packet must be transferred from one network to another. Where multiple
routers are used in a large collection of interconnected networks, the routers
exchange information about target system addresses, so that each router can
build up a table showing the preferred paths between any two systems on the
interconnected networks.

6. Gate Way: In a communications network, a network node equipped for


interfacing with anothernetwork that uses different protocols.
 A gateway may contain devices such as protocol translators,
impedance matching devices, rate converters, fault isolators, or
signal translators as necessary to providesystem interoperability. It
also requires the establishment of mutually acceptable
administrative procedures between both networks.
 A protocol translation/mapping gateway interconnects networks with
different networkprotocol technologies by performing the required
protocol conversions.

5
EXPERIMENT-3

Aim: Study of network IP

 Classification of IP address
 Sub netting
 Super netting

Apparatus (Software): NA

Procedure: Following is required to be study under this practical.

 Classification of IP address

As show in figure we teach how the ip addresses are classified and when they are used.

Class Address Range Supports


Class A 1.0.0.1 to 126.255.255.254 Supports 16 million hosts on each of
127 networks.
Class B 128.1.0.1 to Supports 65,000 hosts on each of
191.255.255.254 16,000 networks
Class C 192.0.1.1 to Supports 254 hosts on each of 2
223.255.254.254 million networks.
Class D 224.0.0.0 to Reserved for multicast groups.
239.255.255.255
Class E 240.0.0.0 to Reserved.
254.255.255.254

 Sub netting :
Why we Develop sub netting and How to calculate subnet mask and how
to identify subnetaddress.

6
 Super netting :
Why we develop super netting and How to calculate super net mask
and how to identifysuper net address.

7
EXPERIMENT-4
Aim: Connect the computers in Local Area Network.

Procedure:

On the host computer

On the host computer, follow these steps to share the Internet connection:

1. Log on to the host computer as Administrator or as Owner.

2. Click Start, and then click Control Panel.

3. Click Network and Internet Connections.

4. Click Network Connections.

5. Right-click the connection that you use to connect to the Internet. For example, if
you connect to theInternet by using a modem, right-click the connection that you want
under Dial-up / other network available.

6. Click Properties.

7. Click the Advanced tab.

8. Under Internet Connection Sharing, select the Allow other network users to
connect through thiscomputer's Internet connection check box.

9. If you are sharing a dial-up Internet connection, select the Establish a dial-up
connection whenever a computer on my network attempts to access the Internet check
box if you want to permit your computerto automatically connect to the Internet.

10. Click OK. You receive the following message:

When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP
address 192.168.0.1. Your computer may lose connectivity with other computers on
your network. If these othercomputers have static IP addresses, it is a good idea to set
them to obtain their IP addresses automatically. Are you sure you want to enable
Internet Connection Sharing?

11. Click Yes.

The connection to the Internet is shared to other computers on the local area network
(LAN).

The network adapter that is connected to the LAN is configured with a static IP
address of 192.168.0.1and a subnet mask of 255.255.255.0

8
On the client computer

To connect to the Internet by using the shared connection, you must confirm the
LAN adapter IP configuration, and then configure the client computer. To confirm
the LAN adapter IP configuration,follow these steps:

1. Log on to the client computer as Administrator or as Owner.

2. Click Start, and then click Control Panel.

3. Click Network and Internet Connections.

4. Click Network Connections.

5. Right-click Local Area Connection and then click Properties.

6. Click the General tab, click Internet Protocol (TCP/IP) in the connection uses the
following items list,and then click Properties.

7. In the Internet Protocol (TCP/IP) Properties dialog box, click Obtain an IP address
automatically (if itis not already selected), and then click OK.

Note: You can also assign a unique static IP address in the range of 192.168.0.2 to
192.168.0.254. Forexample, you can assign the following static IP address, subnet
mask, and default gateway:

8. IP Address 192.168.31.202

9. Subnet mask 255.255.255.0

10. Default gateway 192.168.31.1

11. In the Local Area Connection Properties dialog box, click OK.

12. Quit Control Panel.

9
EXPERIMENT-5
Aim: Study of basic network command and Network configuration commands.

Apparatus (Software): Command Prompt And Packet Tracer.

Procedure:

To do this EXPERIMENT- follows these steps:

In this EXPERIMENT- students have to understand basic networking commands e.g ping,
tracert etc.

All commands related to Network configuration which includes how to switch to


privilege mode and normal mode and how to configure router interface and how to
save this configuration to flash memoryor permanent memory.

This commands includes

• Configuring the Router commands


• General Commands to configure network
• Privileged Mode commands of a router
• Router Processes & Statistics
• IP Commands
• Other IP Commands e.g. show ip route etc.

ping:
ping(8) sends an ICMP ECHO_REQUEST packet to the specified host. If the host
responds, you get anICMP packet back. Sound strange? Well, you can “ping” an IP
address to see if a machine is alive. If there is no response, you know something is
wrong.

10
tracert:
tracert is a command which can show you the path a packet of information takes from
your computer to one you specify. It will list all the routers it passes through until it
reaches its destination, or fails to and is discarded. In addition to this, it will tell you
how long each 'hop' from router to router takes.

11
EXPERIMENT-6
Aim: Configure a Network topology using packet tracer software.

Apparatus (Software): Packet tracer Software

Procedure: To implement this practical following network topology is required to be


configured usingthe commands learned in previous practical.

After configuring the given network a packet should be ping from any one machine to
another.

12
EXPERIMENT-7
Aim: Configure a Network topology using packet tracer software.

Apparatus (Software): Packet tracer Software

Procedure: To implement this practical following network topology is required to be


configured usingthe commands learned in previous practical.

After configuring the given network a packet should be ping from any one machine to
another.

13
EXPERIMENT-8

Aim: Configure a Network using Distance Vector Routing protocol.

• RIP

Apparatus (Software): packet tracer software

Procedure:
1. Develop a Topology shown in figure given below.
2. Configure all Routers

3. Implement RIP protocols in Router to configure Network.

RIP Configuration

14
EXPERIMENT-9

Aim: Configure Network using Link State Vector Routing protocol.

• OSPF
Apparatus (Software): Packet Tracer Software

Procedure:
1. Develop a Topology shown in figure given below.
2. Configure all the workstations
3. Configure all switches
4. Configure all Routers

5. Implement OSPF protocols in Router to configure Network.

15

You might also like