Data Com 1
Data Com 1
(DCS)
SESSION: 2016-2017
LAB MANUAL
EXPERIMENT-1
AIM: To study about different physical equipments used for networking.
At the end of the session you will be able to become familiar with different types
of equipment’s and cables used in the networked lab.
RG-58 is typically used for wiring laboratories and offices, or another small
group of computers. The maximum length of thin wire Ethernet segment is 185
meters, which is due to the nature of the CSMA/CD method of operation, the
cable attenuation, and the speed at which signals propagate inside the coax.
The length is limited to guarantee that collision is detected when machines that
are apart transmit at the same time. BNC connectors are used to terminate each
end of the cable. When many machines are connected to the same Ethernet
segment, a daisy chain approach is used. The BNC connectors allow the network
interface card to the next machine. The machine each end of the cable must use a
terminating resistor to eliminate collision-causing reflection in the cable.
Applications
1. Coaxial cable was widely used in analog telephone networks, and later
with digital telephone networks.
2. Cable TV networks use coaxial cables (RG-59) at the network boundaries.
However, coaxial cable has largely been replaced today with fiber-optic
cable due to its higher attenuation.
3. Traditional Ethernet LAN
– 10Base-2, or thin Ethernet, uses RG-58 coax cable with BNC
connectors.
– 10Base-5, or thick Ethernet, uses RG-11 coax cable with specialized
connectors.
1.2.3.4 Twisted pair cables
Twisted pair is probably the most widely used cabling system in Ethernet in
networks. Two copper wires twist around each other to form the twisted pair
cable. Depending on category several insulated wire strands can reside in the
cable.
Twisted pair is available in two basic types
a) Unshielded Twisted Pair (UTP)
b) Shielded Twisted Pair (STP)
First Connection
Sl. No. One Site Second Site Pin Configuration
01 Orange White Green White Transmit
02 Orange Orange Transmit
03 Green White Green White Receive
04 Green Green Receive
Second Connection:
Sl. No. One Site Second Site Pin Configuration
01 Blue Green White Transmit
02 Blue White Orange Transmit
03 Brown White e Green White Receive
04 Brown Green Receive
Shielded Twisted Pair It is 150Ω cable containing additional shielding that
protects signals against electromagnetic Interference (EMI) produced by electric
motors power lines etc. It is primarily used in Token Ring Network & where
UTP cable would provide insufficient protection against interface. Wires within
cables are encased in a metallic sheath that is conductive as copper in wires. This
sheath when properly grounded converts it ambient noise into current, like
antenna. This current is carried to wires within where it creates an equal and
opposite current flowing in twisted pair thus getting cancelled and no noise
signal is resulted.
Inside the Ethernet cable, there are 8 color coded wires, with all eight pins used
as conductors. These wires are twisted into 4 pairs and each pair has a common
color theme. RJ45 specifies the physical male and female connectors as well as
the pin assignments of the wires.
RJ45 uses 8P8C modular connector, which stands for 8 Position 8 Contact. It is a
keyed connector which means that the connector can be inserted only in a single
way. RJ45 is used almost exclusively to refer to Ethernet-type computer
connectors.
1.0 Learning Objective: At the end of the session you will be able to be
familiar with different types of internetworking devices and their functions.
1.1 REPEATER
Repeaters
A common Ethernet rule is that no more than four repeaters may be used to join
segments together. This is a physical limitation designed to keep collision
detection working properly. Repeaters operate at layer 1 (Physical layer) of the
OSI model.
1.2 BRIDGES
The networks bridge provides an inexpensive and easy way to connect network
segments. A bridge provides Amplification function of a repeater plus, ability to
select filter packets based on their addresses. When network grows in size, it is
often necessary to partition it in to smaller group of nodes to help isolate traffic
and improve performance. One way to do this is to use bridge, the operation of it
is to keep one segment traffic to that side and other side will cross the bridge.
The bridge learns which packets should cross it as it is used.
Bridged network
1.3 ROUTERS
A router is a device that connects two LANs together to form an inter-network.
A router is the basic building block of the Internet. Each router connects two or
more networks together by providing an interface for an Ethernet network and
ring network to which it is connected.
Routers
The router examines each packet of information to detection weather the packet
must be translated form on one network to another network performing a
function similar to a bridge. Unlike a ridge, a router can connect network that use
different technologies, addressing methods, media type, frame format and
speeds. A router is a special purpose device designed to interconnect networks.
Such that three networks can be connected using two routers. Routers maintain
routing tables in their memories to store information about the physical
connection on he network; the router examines each packet of data, checks the
routing table and then forwards the packet if necessary. Every other router in the
path (between any state destinations) performs a similar procedure. Note that a
router does not maintain any state information about the packets; it simply
moves them along the network. Routers are operated at layer 3(network) of OSI
model.
1.4 GATEWAYS
A gateway is node in a network that serves as an entrance to another network. In
enterprises, the gateway node often acts as a proxy server and a firewall. The
gateway is also associated with both a switch, which provides the actual path for
the packet in and out of the gateway. It is also known as a computer system
located on earth that switches data signals and voice signals between satellites
and terrestrial networks. A gateway can operate at any layer of the OSI or
TCP/IP reference model. The hub of a gateway, also called a protocol converter,
is much more complex than that of a router or switch. Typically a gateway must
convert from one protocol stack to another. E.g. a gateway may connect a
TCP/IP network to an IPX. /SPX network. A Circuit Level Gateway function
provided by Application level gateway products enables trusted users on private
network to access Internet services with all security of a proxy server. An
Application Level Gateway provide much stricter form of security that packet
filters, but they are designed to regulate access only for a particular application.
1.5 HUBS
Hubs are also called concentrators; expand one Ethernet connection into many.
For example, a four-port hub connects up to four machines via UTP cables. The
hub provides a star connection for the four ports. Many hubs contains a single
BNC connectors as well to connect the hub to existing 10base2 network wiring,
the hub can also be connected via one of its ports. One pot is desired to operate
in either straight through or crossover mode, selected by a switch on the hub.
Hubs that can connect in this fashion are called stackable hubs. A hub is similar
to a repeater, expect it broadcasts data received by any port to all other ports on
the hub. Most hubs contain a small amount of intelligence as well. Examining
received packets and checking them for integrity. If a bad packet arrives or the
hub determines that a port is unreliable. It will shut down the line under the error
condition is appears. The hub also acts like a repeater. Because of its slight delay
when processing a packet, the numbers of hubs that may be connected in a series
are limited.
There are three types of HUB passive hub, active hub and intelligent hub.
The Passive hubs do not process data signals with only purpose to combine the
signal from several networks cables segments. All devices attached to the
passive hub receive another packets that pass through the hub .Hub does not
clear up or amplify the signals, on the contrary absorbs a small part of the signals
that is why the distance between a hub and a computer should not be more than
half of the permissible distance between two computers. Passive hubs have
limited functionality so are inexpensive and easy to configure. It has four ports
with four BNC (British Naval Connectors) female connectors to configure
networks station or terminated with a 93 Ω BNC Terminator. The active hubs
incorporate electronic components that amplify and cleanup the signals, that flaw
between devices on the network. The process of cleaning up signal is called
“signal regeneration”. The benefits of signals regeneration are:
A network is more robust i.e. less sensitive errors.
Distance between devices can be increased.
Active hubs cost is considerable more than passive hub (active hub function
impart as multi port repeaters). Intelligent hubs are enhanced active hubs the
following functions add intelligence to a hub. Intelligent Hubs are units have
form of integrated management capability.
Hub Management A hub supports networks network management protocols
that enable the hub to send packets to central network console. Theses protocols
enable network console to manage or control hub.
Switching hubs
Switching hubs include circuitry that quickly routes signals between ports on the
hub. Insured of repeating a packet to all ports on the hub, it repeats a packet only
to the port that connects to the destination computer for the packet.
1.6 SWITCHES
It is similar to a bridge, with some important enhancement. First, as witch may
have multiple ports, thus directing packets to several different segments further
partitioning and isolating network traffic in as way similar to router. For
example, if 8-port n way switch is there it can route packets from any input to
any output.
Some or all of incoming packet is called store and forward, which stores the
received packet before examining it to for error before retransmitting. Bad
packets are not forwarded. A switch typically has auto-sensing 10/100 mbps
ports and will just the speed of each port accordingly; furthermore, a managed
switch supports SNMP for further control over network traffic. Switches
operated at layer 2 (Data Link) of OSI model.
EXPERIMENT-3
Step-2
Then when the Network and Sharing Center opens, click on Change adapter settings.
This will be the same on Windows 7 or 10.
Step-3
Step-4
In the Local Area Connection Properties window highlight Internet Protocol Version 4
(TCP/IPv4) then click the Properties button.
Now select the radio button Use the following IP address and enter in the correct IP,
Subnet mask, and Default gateway that corresponds with your network setup. Then
enter your Preferred and Alternate DNS server addresses. Here we’re on a home
network and using a simple Class C network configuration and Google DNS.
Step-5
Check Validate settings upon exit so Windows can find any problems with the
addresses you entered. When you’re finished click OK.
Step-6
Windows will run network diagnostics and verify the connection is good. Here we had
no problems with it, but if you did, you could run the network troubleshooting wizard.
Step-7
Now you can open the command prompt and do an ipconfig to see the network
adapter settings have been successfully changed.
EXPERIMENT-5
1.0 Learning Objective: At the end of the session you should be able to learn how to
connect your PC to a Local Area Network.
Learning Objective:
At the end of this session you should be able know how to create a network topology
using CISCO packet tracer software.
Move the cursor into topology area. You will notice it turns into a plus “+” sign.
Adding a Hub
Add the hub by moving the plus sign “+” below PC0 and PC1 and click once.
1 2 3 4 5
Repeat the steps above for PC1 connecting it to Port 1 on Hub0. (The actual hub port
you choose does not matter.)
Adding a Switch
Add the switch by moving the plus sign “+” below PC2 and PC3 and click once.
Connect PC2 to Hub0 by first choosing Connections.
Move the cursor over the link light to view the port number. Fa means FastEthernet,
100 Mbps Ethernet.
Before we can communicate between the hosts we need to configure IP Addresses and
Subnet Masks on the devices.
Click on Interface and then Fast Ethernet. Although we have not yet discussed IP
Addresses, add the IP Address to 172.16.1.10. Click once in the Subnet Mask field to
enter the default Subnet Mask. You can leave this at 255.255.0.0. We will discuss this
later.
Also, notice this is where you can change the Bandwidth (speed) and Duplex of the
Ethernet NIC (Network Interface Card). The default is Auto (auto negotiation), which
means the NIC will negotiate with the hub or switch. The bandwidth and/or duplex can
be manually set by removing the check from the Auto box and choosing the specific
option.
Bandwidth - Auto
If the host is connected to a hub or switch port which can do 100 Mbps, then the
Ethernet NIC on the host will choose 100 Mbps (Fast Ethernet). Otherwise, if the hub
or switch port can only do 10 Mbps, then the Ethernet NIC on the host will choose 10
Mbps (Ethernet).
Duplex - Auto
Hub: If the host is connected to a hub, then the Ethernet NIC on the host will choose
Half Duplex.
Switch: If the host is connected to a switch, and the switch port is configured as Full
Duplex (or Auto negotiation), then the Ethernet NIC on the host will choose Full
Duplex. If the switch port is configured as Half Duplex, then the Ethernet NIC on the
host will choose Half Duplex. (Full Duplex is a much more efficient option.)
To close this dialog box, click the “X” in the upper right.
Repeat these steps for the other hosts. Use the information below for IP Addresses and
Subnet Masks.
To verify the information that you entered, move the Select tool (arrow) over each host.
To delete a device or link, choose the Delete tool and click on the item you wish to
delete.
To connect like-devices, like a Hub and a Switch, we will use a Cross-over cable.
Click once the Cross-over Cable from the Connections options.
Click once on Switch0 and choose FastEthernet0/4 (actual port does not matter).
The link light for switch port FastEthernet0/4 will begin as amber and eventually
change to green as the Spanning Tree Protocol transitions the port to forwarding.
Step 7: Verifying Connectivity in Real-time Mode
At this point we will want to reset the network, whenever you want to reset the network
and begin the simulation again, perform the following tasks:
Note: Because Packet Tracer also simulates the Spanning Tree Protocol (later), at
times the switch may show amber lights on its interfaces. You will need to wait for the
lights to turn green on the switches before they will forward any Ethernet frames.
Step 8: Verifying Connectivity in Simulation Mode
2
Select the Add Simple PDU tool used to ping devices..
Continue clicking Capture/Forward button until the ICMP ping is completed. You
should see the ICMP messages move between the hosts, hub and switch. The PDU
Last Status should show as Successful. Click on Clear Event List if you do not want
to look at the events or click Preview Previous Events if you do. For this exercise it
does not matter.
Step 9: Saving the Topology
Perform the following steps to save the topology (uses .pkt file extension).
*****