Deep CN
Deep CN
Lab Manual
1
DYPIU
D Y Patil International University Akurdi, Pune
Vision of the University:
To Create a vibrant learning environment – fostering innovation and
creativity, experiential learning, which is inspired by research, and focuses
on regionally, nationally and globally relevant areas.
Mission
– To provide a diverse, vibrant and inspirational learning environment.
– To establish the university as a leading experiential learning and
research-oriented center.
– To Become a responsive university serving the needs of industry and
society.
– To embed internationalization, employability and value thinking.
Computer Networks
Course Objectives:
– To understand the fundamentals of networking topologies. OSI, TCP/IP Model
– To illustrate the working and function of Physical and data link layer
– To analyze different routing algorithms
– To understand UDP and TCP protocol.
– To demonstrate socket programming
Course Outcomes:
– On completion of the course, learner will be able to
– CO1: Summarize the fundamental concepts of computer network, topologies,
– CO2: Illustrate the working functions of physical and data link layer.
– CO3: To illustrate different routing algorithms.
– CO4: Implement client server application.
– CO5: Illustrate any one automation system using cisco packet tracer.
CERTIFICATE
This is to certify that Mr. Deep Salvi PRN No.20220802443 of B. tech CSE Class has completed
practical in the course of Computer Networks Second Year, within DYPIU Akurdi, Pune during the
academic year 2023 - 2024.
3
Experiment No. 1
Objec ve: Exploring Di erent Network Topologies with Cisco Packet Tracer.
Theory:
1) Ring Topology -
– Objec ve: Build a network with a ring topology.
– Topology: Connect mul ple PCs or switches in a circular con gura on, ensuring
that each node has exactly two neighbors.
– Con gura on: Con gure IP addresses for devices. Test connec vity by sending data
packets around the ring.
2) Star Topology -
– Objec ve: Build a network with a Star topology.
– Topology: Connect mul ple PCs or switches to a central switch or router.
– Con gura on: Assign IP addresses to devices. Test connec vity between devices
and the central switch/router.
4
ft
fi
fi
ti
ti
ti
ti
ti
fi
ff
ti
ti
ti
fi
ti
ti
3) Bus Topology Objec ve -
– Objec ve: Construct a network with a bus topology.
– Topology: Connect mul ple PCs or switches in a linear arrangement, all sharing a
common communica on channel.
– Con gura on: Assign IP addresses to devices. Test data transmission along the bus.
4) Mesh Topology
– Objec ve: Implement a network with a mesh topology.
– Topology: Create a fully connected mesh network where every node is connected
to every other node.
– Con gura on: Assign IP addresses to devices. Test connec vity between any two
nodes within the mesh.
–
5
fi
fi
ti
ti
ti
ti
ti
ti
ti
ti
5) Hybrid Topology -
6
fi
ti
ti
fi
ff
ti
6) Tree Topology
– Objective: Construct a network with tree topology.
– Topology: Build a hierarchical network structure resembling a tree, with a root
node and multiple branches.
– Configuration: Assign IP addresses to devices. Test data flows between nodes at
different levels of the tree.
–
Steps:
1. Take the required amount of switch and end devices to represent respec ve
topology.
2. Connect them using the respec ve type of connector required.
3. Assign IP to every end device.
4. Use CPT protocol data unit to check the connec on is properly established or not.
Conclusion:
7
ti
ti
ti
Experiment No. 2
Objec ve: The objec ve of this lab is to guide through the process of con guring
Email, Web, and DHCP servers using Cisco Packet Tracer.
Theory:
8
ft
fi
ti
ti
ti
ti
ti
fi
fi
ti
ti
fi
tti
ti
ti
ti
fi
2: Email Server Con gura on
Objec ve: Con gure an Email server to send and receive emails within the network.
Topology: Expand the exis ng network topology with a dedicated Email server.
Connect Email clients (PCs) to the network.
Con gura on: Set up Email accounts, domains, and mailboxes. Test Email func onality
by sending and receiving emails between clients.
Con gur on: Install and con gure a FTP server through command prompt by wri ng
command “ p <ip_add_ pserver>”. Then,Enter username and password. Test FTP
server func onality.
Output:
1. Email
9
fi
fi
fi
ti
ti
ti
ti
ti
ti
ti
ti
ft
fi
fi
fi
fi
ti
ft
ti
ti
ti
fi
fi
fi
ft
ti
tti
ft
2. FTP
10
3. DHCP
4. WEB
Conclusion:
11
Experiment No.3
Objec ve: The objec ve of this lab is to introduce you to the physical aspects of
networking using Cisco Packet Tracer, including devices, cables, and connec ons.
Theory:
1: Basic Device Con gura on
Objec ve: Familiarize students with di erent networking devices and their physical
characteris cs.
Topology: Create a simple network topology with devices such as routers, switches,
PCs, and servers.
Con gura on: Drag and drop various devices onto the workspace. Examine the
physical a ributes of each device, including ports, interfaces, LEDs, and chassis.
12
ft
fi
fi
fi
ti
ti
ti
ti
ti
ti
ti
tt
ti
fi
fi
ti
ti
ti
ff
ti
ti
ti
ff
ti
ff
ti
ti
ti
ti
fi
ti
ti
ti
ti
ti
4: Wall Mount and Patch Panel Con gura on
Objec ve: Learn about wall-mounted equipment and the use of patch panels for
e cient cable management.
Topology: Expand the exis ng network topology with wall-mounted devices and patch
panels. Include addi onal switches, servers, and PCs as needed.
Con gura on:
1) Wall Mount Installa on: Iden fy loca ons for wall-mounted equipment such as
switches and patch panels in the topology. Mount switches and patch panels securely
on the walls using Packet Tracer's wall mount feature. Ensure proper alignment and
spacing for easy access and cable management.
2) Patch Panel Connec on: Introduce patch panels into the network topology and
connect them to switches using Ethernet cables. Use appropriate patch panel ports for
incoming and outgoing connec ons. Organize and label cables neatly within the patch
panel.
3) Cable Management: Route Ethernet cables from devices to the patch panels
e ciently, maintaining proper cable lengths. U lize cable management accessories
such as cable es or Velcro straps to bundle and organize cables. Ensure cables are
neatly arranged and do not obstruct access to devices or patch panels.
4) Tes ng and Veri ca on: Verify connec vity between devices by tes ng network
connec ons through the patch panel. Conduct cable tes ng to ensure proper
termina on and connec vity. Troubleshoot any connec vity issues and make
necessary adjustments to cable connec ons.
Output :
13
ffi
ffi
fi
ti
ti
ti
ti
ti
ti
fi
ti
ti
ti
ti
ti
ti
ti
ti
fi
ti
ti
ti
ti
ti
ti
ti
ti
14
Steps:
1. Accessing the Physical View:
– Open Cisco Packet Tracer.By default, you'll be in the Logical View, which shows a
simpli ed layout of your network devices.
– Click the Physical View bu on located behind the Logical View bu on in the top
le corner of the workspace.
Conclusion:
15
ft
ti
fi
ti
ti
ti
ti
ti
tt
tt
ti
ff
ti
ti
tt
fl
fl
ti
Experiment No.4
Objec ve: The objec ve of this lab manual is to introduce you to dynamic and sta c
rou ng protocols using Cisco Packet Tracer.
Theory:
1: Sta c Rou ng
– Con gura on Objec ve: Con gure sta c routes to establish network
communica on between mul ple networks.
– Topology: Create a network topology with mul ple routers and subnets. Ensure
each network is connected to a router.
– Con gura on: Con gure sta c routes on routers. Test connec vity between
devices in di erent networks by sending packets or using ping commands.
16
ft
ti
fi
fi
ti
ti
tti
ti
ti
ti
ff
ti
fi
ti
ti
ti
ti
fi
ti
ti
ti
ti
ti
2: RIP (Rou ng Informa on Protocol)
– Con gura on Objec ve: Con gure RIP rou ng protocol to enable dynamic rou ng
between routers.
– Topology: Expand the exis ng network topology with addi onal routers. Remove
sta c routes if con gured in sta c rou ng.
– Con gura on: Enable RIP rou ng protocol on routers. Con gure RIP and network.
Test dynamic rou ng by introducing new networks and verifying automa c route
propaga on.
Output:
17
ti
fi
fi
ti
ti
ti
ti
ti
fi
ti
ti
ti
fi
ti
ti
ti
ti
ti
fi
ti
ti
18
Conclusion:
19
Experiment No.5
Theory:
Wireshark
– Wireshark is a packet sni er and analysis tool. It captures network tra c from
ethernet, Bluetooth, wireless (IEEE.802.11), token ring, and frame relay
connec ons, among others, and stores that data for o ine analysis.
– Note: A “packet” is a single message from any network protocol (e.g., TCP, DNS,
etc.).
– LAN tra c is in broadcast mode, meaning a single computer with Wireshark can
see tra c between two other computers. To see tra c to an external site, you
need to capture the packets on the local computer.
– Wireshark allows you to lter the log before the capture starts or during analysis,
so you can narrow down and zero in on what you’re looking for in the network
trace. For example, you can set a lter to see TCP tra c between two IP addresses,
or you can set it only to show you the packets sent from one computer. The lters
in Wireshark are one of the primary reasons it has become the standard tool for
packet analysis.
Download: h p://www.wireshark.org/download.html
Socket Programming
– Sockets and the socket API are used to send messages across a network. They
provide a form of inter-process communica on (IPC). The network can be a logical,
local network to the computer, or one that’s physically connected to an external
network, with its own connec ons to other networks.
– A network socket is an endpoint of an inter-process communica on ow across a
computer network. Sockets may communicate within a process, between
processes on the same machine, or between processes on di erent con nents.
Today, most communica on between computers is based on the internet protocol;
therefore most network sockets are internet sockets. To create a connec on
between machines, Python programs import the socket module, create a socket
object, and call the object’s methods to establish connec ons and send and receive
data. Sockets are the endpoints of a bidirec onal communica ons channel.
20
ft
ti
ffi
ti
ffi
tt
ti
fi
ff
ti
fi
ti
ti
ffi
ffi
ffl
ti
ff
ti
ti
fl
ffi
ti
ti
fi
There are two basic types of communica on
• Streams (TCP): Computers establish a connec on with each other and read/write
data in a con nuous stream of bytes---like a le. This is the most common.
• Datagrams (UDP): Computers send discrete packets (or messages) to each other.
Each packet contains a collec on of bytes, but each packet is separate and self-
contained.
Client - Server Concept
• Each endpoint is a running program
• Servers wait for incoming connec ons and provide a service (e.g., web, mail, etc.)
• Clients make connec ons to servers
Server Code:
21
ti
ti
ti
ti
ti
fi
ti
Client Code:
Network/Packets Analysis
– Wireshark shows you three di erent panes for inspec ng packet data. The Packet
List, the top pane, lists all the packets in the capture. When you click on a packet,
the other two panes change to show you the details about the selected packet. You
can also tell if the packet is part of a conversa on. Here are details about each
column in the top pane:
– No.: This is the number order of the packet captured. The bracket indicates that
this packet is part of a conversa on.
– Time: This column shows how long a er you started the capture this par cular
packet was captured. You can change this value in the Se ngs menu to display a
di erent op on.
22
ff
ti
ff
ti
ft
ti
ti
tti
ti
➢ Source: This is the address of the system that sent the packet.
➢ Des na on: This is the address of the packet des na on.
➢ Protocol: This is the type of packet. For example: TCP, DNS, DHCPv6, or ARP
➢ Length: This column shows you the packet’s length, measured in bytes.
➢ Info: This column shows you more informa on about the packet contents, which
will vary depending on the type of packet.
Output:
Client Side
Server Side
Wireshark
24
fl
ft
ft
fi
fi
ti
fi
fi
Conclusion:
25