Computer Networking
Computer Networking
Experiment
Title
No :
1 Study of different types of Network cables and practically
implements the cross-wiredcable and straight through cable using
clamping tool.
3 Study of network IP
Classification of IP address
Sub netting
Super netting
1
EXPERIMENT-1
Aim: Study of different types of Network cables and practically implements the cross-
wired cable andstraight through cable using clamping tool.
1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be
very careful at this point, as to not nick or cut into the wires, which are inside. Doing
so could alter the characteristics of your cable, or even worse render is useless. Check
the wires, one more time for nicks or cuts. If thereare any, just whack the whole end
off, and start over.
2. Spread the wires apart, but be sure to hold onto the base of the jacket with your
other hand. You do not want the wires to become untwisted down inside the jacket.
Category 5 cable must only have 1/2 of an inch of 'untwisted' wire at the end; otherwise
it will be 'out of spec'. At this point, you obviously haveALOT more than 1/2 of an inch
of un-twisted wire.
3. You have 2 end jacks, which must be installed on your cable. If you are using a pre-
made cable, withone of the ends whacked off, you only have one end to install - the
crossed over end. Below are two diagrams, which show how you need to arrange the
cables for each type of cable end. Decide at this point which end you are making and
examine the associated picture below.
2
Diagram shows you how to prepare straight through wired connection:
3
EXPERIMENT-2
• Repeater
• Hub
• Switch
• Bridge
• Router
• Gate Way
2. Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or
concentrator is a device for connecting multiple twisted pair or fiber optic
Ethernet devices together and making them actas a single network segment.
Hubs work at the physical layer (layer 1) of the OSI model. The device is a form
of multiport repeater. Repeater hubs also participate in collision detection,
forwarding a jam signal to all ports if it detects a collision.
4. Bridge: A network bridge connects multiple network segments at the data link
layer (Layer 2) ofthe OSI model. In Ethernet networks, the term bridge formally
means a device that behaves according to the IEEE 802.1 D standards. A bridge
and switch are very much alike; a switch being a bridge with numerous ports.
Switch or Layer 2 switch is often used interchangeably withbridge. Bridges can
analyze incoming data packets to determine if the bridge is able to send the
given packet to another segment of the network.
4
5. Router: A router is an electronic device that interconnects two or more
computer networks, andselectively interchanges packets of data between them.
Each data packet contains address information that a router can use to
determine if the source and destination are on the same network, or if the data
packet must be transferred from one network to another. Where multiple
routers are used in a large collection of interconnected networks, the routers
exchange information about target system addresses, so that each router can
build up a table showing the preferred paths between any two systems on the
interconnected networks.
5
EXPERIMENT-3
Classification of IP address
Sub netting
Super netting
Apparatus (Software): NA
Classification of IP address
As show in figure we teach how the ip addresses are classified and when they are used.
Sub netting :
Why we Develop sub netting and How to calculate subnet mask and how
to identify subnetaddress.
6
Super netting :
Why we develop super netting and How to calculate super net mask
and how to identifysuper net address.
7
EXPERIMENT-4
Aim: Connect the computers in Local Area Network.
Procedure:
On the host computer, follow these steps to share the Internet connection:
5. Right-click the connection that you use to connect to the Internet. For example, if
you connect to theInternet by using a modem, right-click the connection that you want
under Dial-up / other network available.
6. Click Properties.
8. Under Internet Connection Sharing, select the Allow other network users to
connect through thiscomputer's Internet connection check box.
9. If you are sharing a dial-up Internet connection, select the Establish a dial-up
connection whenever a computer on my network attempts to access the Internet check
box if you want to permit your computerto automatically connect to the Internet.
When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP
address 192.168.0.1. Your computer may lose connectivity with other computers on
your network. If these othercomputers have static IP addresses, it is a good idea to set
them to obtain their IP addresses automatically. Are you sure you want to enable
Internet Connection Sharing?
The connection to the Internet is shared to other computers on the local area network
(LAN).
The network adapter that is connected to the LAN is configured with a static IP
address of 192.168.0.1and a subnet mask of 255.255.255.0
8
On the client computer
To connect to the Internet by using the shared connection, you must confirm the
LAN adapter IP configuration, and then configure the client computer. To confirm
the LAN adapter IP configuration,follow these steps:
6. Click the General tab, click Internet Protocol (TCP/IP) in the connection uses the
following items list,and then click Properties.
7. In the Internet Protocol (TCP/IP) Properties dialog box, click Obtain an IP address
automatically (if itis not already selected), and then click OK.
Note: You can also assign a unique static IP address in the range of 192.168.0.2 to
192.168.0.254. Forexample, you can assign the following static IP address, subnet
mask, and default gateway:
8. IP Address 192.168.31.202
11. In the Local Area Connection Properties dialog box, click OK.
9
EXPERIMENT-5
Aim: Study of basic network command and Network configuration commands.
Procedure:
In this EXPERIMENT- students have to understand basic networking commands e.g ping,
tracert etc.
ping:
ping(8) sends an ICMP ECHO_REQUEST packet to the specified host. If the host
responds, you get anICMP packet back. Sound strange? Well, you can “ping” an IP
address to see if a machine is alive. If there is no response, you know something is
wrong.
10
tracert:
tracert is a command which can show you the path a packet of information takes from
your computer to one you specify. It will list all the routers it passes through until it
reaches its destination, or fails to and is discarded. In addition to this, it will tell you
how long each 'hop' from router to router takes.
11
EXPERIMENT-6
Aim: Configure a Network topology using packet tracer software.
After configuring the given network a packet should be ping from any one machine to
another.
12
EXPERIMENT-7
Aim: Configure a Network topology using packet tracer software.
After configuring the given network a packet should be ping from any one machine to
another.
13
EXPERIMENT-8
• RIP
Procedure:
1. Develop a Topology shown in figure given below.
2. Configure all Routers
RIP Configuration
14
EXPERIMENT-9
• OSPF
Apparatus (Software): Packet Tracer Software
Procedure:
1. Develop a Topology shown in figure given below.
2. Configure all the workstations
3. Configure all switches
4. Configure all Routers
15