CN 1-2
CN 1-2
CERTIFICATE
Mr./Ms............................................................................................................................
of
academicyear ................................
CN|4B18-AI|PIET
COMPUTER SCIENCE AND ENGINEERING
FACULITY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORKS(303105304)
ENROLLMENT NO: - 2203031241073
TABLE OF CONTENT
Page No
Sr. Date of Date of Marks (out
Experiment Title Sign
No Start Completion of 10)
To From
Experiments on Simulation
Tools: (CISCO PACKET
TRACER):
1 To understand environment of
CISCO PACKET TRACER to
design simple network and
perform experiments.
Experiments of Packet
capture tool: Wireshark
To understand the features of
wireshark as a packet capture tool
2 and understand encapsulation of
information. Also study effect of
few network commands
To study behaviour of
generic devices used for
networking: (CISCO
PACKET TRACER)
Design a simple network with
multiple nodes and connect via
generic devices available in
library. Perform simulation and
trace communication behaviour of
3 specified network devices.
1: Use only HUB to design a
small network having 4 to 6 hosts
2: Use only a Switch to design a
small network with 4 to 6 hosts.
3: Use both the device (HUB
and SWITCH) for a network and
find out functioning difference
between switch and hub.
CN|4B18-AI|PIET
COMPUTER SCIENCE AND ENGINEERING
FACULITY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORKS(303105304)
ENROLLMENT NO: - 2203031241073
Wireless LAN: Configuration of
6
Wireless LAN using CISCO Packet
Tracer.
CN|4B18-AI|PIET
COMPUTER SCIENCE AND ENGINEERING
FACULITY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORKS(303105304)
ENROLLMENT NO: - 2203031241073
PRACTICAL-1
Cisco Packet Tracer need to be installed for beginners from the google website.
Step:1
Search the Cisco Packet tracer in Google.
Step:2
Click on download
CN|4B18-AI|PIET
COMPUTER SCIENCE AND ENGINEERING
FACULITY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORKS(303105304)
ENROLLMENT NO: - 2203031241073
Step:3
After downloading we have to perform setup
Step:4
Install the cisco packet in during set up process complete.
CN|4B18-AI|PIET
COMPUTER SCIENCE AND ENGINEERING
FACULITY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORKS(303105304)
ENROLLMENT NO: - 2203031241073
CN|4B18-AI|PIET
COMPUTER SCIENCE AND ENGINEERING
FACULITY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORKS(303105304)
ENROLLMENT NO: - 2203031241073
Ring topology has been widely used in various applications. Some common examples
include industrial control systems, where devices are interconnected ina ring to monitor
and control processes. It has also been used in telecommunications networks, where it
provides a reliable and efficient way to transmit data.
CN|4B18-AI|PIET
COMPUTER SCIENCE AND ENGINEERING
FACULITY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORKS(303105304)
ENROLLMENT NO: - 2203031241073
Disadvantages :
• Central device dependency .
• It is very expensive. It requires additional equipment.
• The system is immobile.
• Cables are wires used in this network got damaged very easily.
• The data transfer rate is very low in wireless star topology systems.
Applications:
Nowadays, many institutes use star topology as they need to connect several nodesto be
connected in a lab. Banking is one of the sectors where this topology is used through which the
users can stay connected. The home networks are also designed in the star topology.
CN|4B18-AI|PIET
COMPUTER SCIENCE AND ENGINEERING
FACULITY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORKS(303105304)
ENROLLMENT NO: - 2203031241073
Practical: 02
AIM: Experiments of Packet capture tool – WiresharkWireshark
Wireshark is an open-source packet analyser, which is used for education, analysis, software
development, communication protocol development, and network troubleshooting.
It is used to track the packets so that each one is filtered to meet our specific needs. It is
commonly called as a sniffer, network protocol analyser, and network analyser. It is also
used by network security engineers to examine security problems.
Wireshark is a free to use application which is used to apprehend the data back and forth. It is
often called as a free packet sniffer computer application. It puts the network card into an
unselective mode, i.e., to accept all the packets which it receives.
Uses of Wireshark:
Wireshark can be used in the following ways:
Features of Wireshark:
• It is multi-platform software, i.e., it can run on Linux, Windows, OS X,FreeBSD, NetBSD, etc.
• It is a standard three-pane packet browser.
• It performs deep inspection of the hundreds of protocols the Ethernet, loopback, etc., we can read live
data.
• It has sort and filter options which makes ease to the user to view the data.
• It is also useful in VoIP analysis.
• It can also capture raw USB traffic.
• Various settings, like timers and filters, can be used to filter the output.
• It can only capture packet on the PCAP (an application programming interfaceused to capture
the network) supported networks.
• Wireshark supports a variety of well-documented capture file formats such asthe PcapNg and
9
CN|4B18-AI|PIET
COMPUTER SCIENCE AND ENGINEERING
FACULITY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORKS(303105304)
ENROLLMENT NO: - 2203031241073
Libpcap. These formats are used for storing the captured data.
• It is the no.1 piece of software for its purpose. It has countless applicationsranging from the
tracing down, unauthorized traffic, firewall settings, etc.
Since it is used with IP(Internet Protocol), many times it is also referred toas TCP/IP. In
order to start a communication, the TCP first establishes a connection using the three-way-
handshake. TCP’s efficiency over other protocols lies in its error detecting and correction
attribute. Not only this, it organizes packets and segments larger data into a number of packets
without disrupting the integrity of the data.
10
CN|4B18-AI|PIET
COMPUTER SCIENCE AND ENGINEERING
FACULITY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORKS(303105304)
ENROLLMENT NO: - 2203031241073
2.
3. DNS( Domain Name System):
The Domain Name System (DNS) turns domain names into IP addresses, whichbrowsers use
to load internet pages. Every device connected to the internet has its own IP address, which
is used by other devices to locate the device. DNS servers make it possible for people to input
normal words into their browsers, such as Fortinet.com, without having to keep track of the
IP address for every website.
A DNS server is a computer with a database containing the public IP addresses associated
with the names of the websites an IP address brings a user to. DNS actslike a phonebook
for the internet. Whenever people type domain names, like Fortinet.com or Yahoo.com,
into the address bar of web browsers, the DNS finds the right IP address. The site’s IP
address is what directs the device to go to the correct place to access the site’s data.Once
the DNS server finds the correct IP address, browsers take the address and use it to send
data to content delivery network (CDN) edge servers or origin servers. Once this is done,
the information on the website can be accessed by the user. The DNS server starts the
process by finding the corresponding IP address for a website’s uniform resource locator
(URL).
4. Quic:
QUIC is a transport protocol that's an alternative to TCP. QUIC sits on top of UDP and uses
TLS for securing its payload. It was initially designed for HTTP use case but later evolved to
accommodate a variety of use cases. HTTPon top of QUIC is often called HTTP.
11
CN|4B18-AI|PIET
COMPUTER SCIENCE AND ENGINEERING
FACULITY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORKS(303105304)
ENROLLMENT NO: - 2203031241073
QUIC is being standardized by the IETF. As on January 2021, all documents are Internet-
Drafts (I-Ds) and none of them are standards yet. Many open source implementations of
QUIC are available in various programming languages. QUIC is actively used on the
Internet by about 5% of web servers.
5. TLSv1.2:
Transport Layer Security (TLS) 1.2 is the successor to Secure SocketsLayer (SSL) used by
endpoint devices and applications to authenticate and encryptdata securely when transferred
over a network. TLS protocol is a widely accepted standard used by devices such as
computers, phones, IoTs, meters, and sensors.
12
CN|4B18-AI|PIET
COMPUTER SCIENCE AND ENGINEERING
FACULITY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORKS(303105304)
ENROLLMENT NO: - 2203031241073
6. TLSv1.3:
The TLS Version 1.3 protocol is a major revision to the TLS protocol that is intended to
provide better security and improve handshake performance. Touse TLSv1. 3, there are
certain configuration requirements: Cipher specifications: The cipher specifications that are
valid for TLSv1.
13
CN|4B18-AI|PIET