0% found this document useful (0 votes)
23 views13 pages

CN 1-2

The document describes experiments performed on network simulation tools like Cisco Packet Tracer. It details implementing different network topologies like bus and ring using the tool and analyzing their working. Characteristics and applications of each topology are also provided.

Uploaded by

pattepuramkamal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views13 pages

CN 1-2

The document describes experiments performed on network simulation tools like Cisco Packet Tracer. It details implementing different network topologies like bus and ring using the tool and analyzing their working. Characteristics and applications of each topology are also provided.

Uploaded by

pattepuramkamal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

COMPUTER SCIENCE AND ENGINEERING

FACULITY OF ENGINEERING AND TECHNOLOGY


COMPUTER NETWORKS(303105304)
ENROLLMENT NO: - 2203031241073

CERTIFICATE

This is to certify that

Mr./Ms............................................................................................................................

.......... with enrolment no. ................................................................ has


successfully

completed his/her laboratory experiments in the DATA COMMUNICATION

ANDNETWORKING (3105301) from the department

of

....................................................................................................... during the

academicyear ................................

Date of Submission: ......................... Staff In charge: ...........................

Head Of Department: ...........................................

CN|4B18-AI|PIET
COMPUTER SCIENCE AND ENGINEERING
FACULITY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORKS(303105304)
ENROLLMENT NO: - 2203031241073

TABLE OF CONTENT
Page No
Sr. Date of Date of Marks (out
Experiment Title Sign
No Start Completion of 10)
To From
Experiments on Simulation
Tools: (CISCO PACKET
TRACER):
1 To understand environment of
CISCO PACKET TRACER to
design simple network and
perform experiments.
Experiments of Packet
capture tool: Wireshark
To understand the features of
wireshark as a packet capture tool
2 and understand encapsulation of
information. Also study effect of
few network commands

To study behaviour of
generic devices used for
networking: (CISCO
PACKET TRACER)
Design a simple network with
multiple nodes and connect via
generic devices available in
library. Perform simulation and
trace communication behaviour of
3 specified network devices.
1: Use only HUB to design a
small network having 4 to 6 hosts
2: Use only a Switch to design a
small network with 4 to 6 hosts.
3: Use both the device (HUB
and SWITCH) for a network and
find out functioning difference
between switch and hub.

Data Link Layer (Error


Correction): Write a program to
implement error detection and
4 correction using HAMMING code
concept. Make a test rum to input
data stream and verify error
correction feature.
Virtual LAN: Simulate Virtual
5 LAN configuration using CISCO
Packet Tracer Simulation.
2

CN|4B18-AI|PIET
COMPUTER SCIENCE AND ENGINEERING
FACULITY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORKS(303105304)
ENROLLMENT NO: - 2203031241073
Wireless LAN: Configuration of
6
Wireless LAN using CISCO Packet
Tracer.

Internetworking with routers:


Design a three or four simple
networks (with 3 to 4 hosts) and
connect via Router. Perform
simulation and trace how
routing is done in packet
transmission.
1: Experiment on same subnet
7 2: Perform Experiment across
the subnet and observe
functioning of Router via
selecting suitable pair of Source
and destination.
Implementation of
SUBNETTING: Design multiple
subnet with suitable number of
hosts. Make a plan to assign
static IP addressing across all
8 subnet to explain
implementation of
SUBNETTING.
Routing at Network Layer:
Simulate Static and Dynamic
9 Routing Protocol Configuration
using CISCO Packet Tracer.
Experiment on Transport
Layer: Implement echo client
10 server using TCP/UDP sockets.

CN|4B18-AI|PIET
COMPUTER SCIENCE AND ENGINEERING
FACULITY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORKS(303105304)
ENROLLMENT NO: - 2203031241073
PRACTICAL-1

AIM: Experiments on Simulation Tools (CISCO PACKET TRACER):

Cisco Packet Tracer need to be installed for beginners from the google website.
Step:1
Search the Cisco Packet tracer in Google.

Step:2
Click on download

CN|4B18-AI|PIET
COMPUTER SCIENCE AND ENGINEERING
FACULITY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORKS(303105304)
ENROLLMENT NO: - 2203031241073

Step:3
After downloading we have to perform setup

Step:4
Install the cisco packet in during set up process complete.

CN|4B18-AI|PIET
COMPUTER SCIENCE AND ENGINEERING
FACULITY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORKS(303105304)
ENROLLMENT NO: - 2203031241073

Performing the Bus Topology network implementation in Cisco Packet tracer


Bus Topology: Bus topology is a type of network topology in which all devicesare
connected to a single cable called a "bus." This cable serves as a shared communication
medium, allowing all devices on the network to receive the same signal simultaneously.
In a bus topology, all devices on the network are connected to a single cable, with each device
using a connector to tap into the cable. When a device sends a signal, it isbroadcast to all other
devices on the network, and each device receives the signal and decides whether to act on it
based on its own unique address.
Advantages:
• Cheaper than other Alternative Topologies
• No Additional Power Source Required
• Easy to Establish Bus Topology & Easily Scalable
• Linear Structure
• Extendable Network & Easy to Attach Multiple Nodes
Disadvantages:
• Limited Connection Cable
• Data Transmission is Not Secure
• Vulnerable to Physical Damage
• High Possibility of Data Collision & Extremely Simple Topology
Applications:
Bus topology is commonly used in small to medium-sized local area networks (LANs),
where it can be used to connect devices such as computers, printers, andother peripherals.
It can also be used in industrial control systems and other specialized applications.

CN|4B18-AI|PIET
COMPUTER SCIENCE AND ENGINEERING
FACULITY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORKS(303105304)
ENROLLMENT NO: - 2203031241073

Performing the Ring Topology network implementation in Cisco Packet tracer


Ring Topology: Ring topology is a type of network configuration where devices are
connected in a circular manner, forming a closed loop. In this setup, each devices connected
to exactly two other devices, creating a continuous pathway for data transmission. This
means that data travels in only one direction around the ring, passing through each device
until it reaches its destination. n a ring topology, data is transmitted from one device to the
next in a sequential manner.
Advantages:
• Fast Execution & Better Administration
• Straightforward adaptability
• Fidelity of network
• The one-directional flow of data
• Unique Connectivity & Good Troubleshooting feature
Disadvantages:
• Quite Expensive & Slow Activity Rate
• Unprotected use
• Need for Hardiness
• Poor device Attachment
• Cable Breakdowns & Bandwidth Deficiencies
Applications:

Ring topology has been widely used in various applications. Some common examples
include industrial control systems, where devices are interconnected ina ring to monitor
and control processes. It has also been used in telecommunications networks, where it
provides a reliable and efficient way to transmit data.

CN|4B18-AI|PIET
COMPUTER SCIENCE AND ENGINEERING
FACULITY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORKS(303105304)
ENROLLMENT NO: - 2203031241073

Performing the Star Topology network implementation in Cisco Packet tracer


Star Topology: The star topology is a standard and popular network setup. it is also
known as a star network in terms. This topology is a network topology in whicheach piece of
the network each attached to a central node. This central node is calleda switch or a hub. In
this network configuration, every node connects to a central network device like a switch,
hub, or computer.
Advantages :
• User friendly
• Centralized network & Very reliable
• Highly efficient & Easily manageable
• Safe to use
• Multiple stars can be created to extend the network's reach

Disadvantages :
• Central device dependency .
• It is very expensive. It requires additional equipment.
• The system is immobile.
• Cables are wires used in this network got damaged very easily.
• The data transfer rate is very low in wireless star topology systems.

Applications:
Nowadays, many institutes use star topology as they need to connect several nodesto be
connected in a lab. Banking is one of the sectors where this topology is used through which the
users can stay connected. The home networks are also designed in the star topology.

CN|4B18-AI|PIET
COMPUTER SCIENCE AND ENGINEERING
FACULITY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORKS(303105304)
ENROLLMENT NO: - 2203031241073

Practical: 02
AIM: Experiments of Packet capture tool – WiresharkWireshark
Wireshark is an open-source packet analyser, which is used for education, analysis, software
development, communication protocol development, and network troubleshooting.

It is used to track the packets so that each one is filtered to meet our specific needs. It is
commonly called as a sniffer, network protocol analyser, and network analyser. It is also
used by network security engineers to examine security problems.

Wireshark is a free to use application which is used to apprehend the data back and forth. It is
often called as a free packet sniffer computer application. It puts the network card into an
unselective mode, i.e., to accept all the packets which it receives.
Uses of Wireshark:
Wireshark can be used in the following ways:

1. It is used by network security engineers to examine security problems.


2. It allows the users to watch all the traffic being passed over the network.
3. It is used by network engineers to troubleshoot network issues.
4. It also helps to troubleshoot latency issues and malicious activities on yournetwork.
5. It can also analyse dropped packets.
6. It helps us to know how all the devices like laptop, mobile phones, desktop,switch,
routers, etc., communicate in a local network or the rest of the world.

Features of Wireshark:
• It is multi-platform software, i.e., it can run on Linux, Windows, OS X,FreeBSD, NetBSD, etc.
• It is a standard three-pane packet browser.
• It performs deep inspection of the hundreds of protocols the Ethernet, loopback, etc., we can read live
data.
• It has sort and filter options which makes ease to the user to view the data.
• It is also useful in VoIP analysis.
• It can also capture raw USB traffic.
• Various settings, like timers and filters, can be used to filter the output.
• It can only capture packet on the PCAP (an application programming interfaceused to capture
the network) supported networks.
• Wireshark supports a variety of well-documented capture file formats such asthe PcapNg and
9

CN|4B18-AI|PIET
COMPUTER SCIENCE AND ENGINEERING
FACULITY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORKS(303105304)
ENROLLMENT NO: - 2203031241073
Libpcap. These formats are used for storing the captured data.
• It is the no.1 piece of software for its purpose. It has countless applicationsranging from the
tracing down, unauthorized traffic, firewall settings, etc.

Installation of Wireshark Software:


Below are the steps to install the Wireshark software on the computer:
• Open the web browser.
• Search for 'Download Wireshark.'
• Select the Windows installer according to your system configuration, either 32-bt or 64-bit. Save the
program and close the browser.
• Now, open the software, and follow the install instruction by accepting the license.

1. TCP (Transmission Control Protocol):


TCP or Transmission Control Protocol is one of the most important protocols or standards
for enabling communication possible amongst devices present over a particular network. It
has algorithms that solve complex errors arising in packet communications, i.e. corrupted
packets, invalid packets, duplicates, etc.

Since it is used with IP(Internet Protocol), many times it is also referred toas TCP/IP. In
order to start a communication, the TCP first establishes a connection using the three-way-
handshake. TCP’s efficiency over other protocols lies in its error detecting and correction
attribute. Not only this, it organizes packets and segments larger data into a number of packets
without disrupting the integrity of the data.

10

CN|4B18-AI|PIET
COMPUTER SCIENCE AND ENGINEERING
FACULITY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORKS(303105304)
ENROLLMENT NO: - 2203031241073
2.
3. DNS( Domain Name System):
The Domain Name System (DNS) turns domain names into IP addresses, whichbrowsers use
to load internet pages. Every device connected to the internet has its own IP address, which
is used by other devices to locate the device. DNS servers make it possible for people to input
normal words into their browsers, such as Fortinet.com, without having to keep track of the
IP address for every website.

A DNS server is a computer with a database containing the public IP addresses associated
with the names of the websites an IP address brings a user to. DNS actslike a phonebook
for the internet. Whenever people type domain names, like Fortinet.com or Yahoo.com,
into the address bar of web browsers, the DNS finds the right IP address. The site’s IP
address is what directs the device to go to the correct place to access the site’s data.Once
the DNS server finds the correct IP address, browsers take the address and use it to send
data to content delivery network (CDN) edge servers or origin servers. Once this is done,
the information on the website can be accessed by the user. The DNS server starts the
process by finding the corresponding IP address for a website’s uniform resource locator
(URL).

4. Quic:
QUIC is a transport protocol that's an alternative to TCP. QUIC sits on top of UDP and uses
TLS for securing its payload. It was initially designed for HTTP use case but later evolved to
accommodate a variety of use cases. HTTPon top of QUIC is often called HTTP.

11

CN|4B18-AI|PIET
COMPUTER SCIENCE AND ENGINEERING
FACULITY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORKS(303105304)
ENROLLMENT NO: - 2203031241073

QUIC improves on TCP in a number of aspects: faster connection establishment, reduced


head-of-line blocking, better congestion control, improved privacy and flow integrity.
While measurements show that QUICoutperforms TCP, there are some scenarios where
TCP does better.

QUIC is being standardized by the IETF. As on January 2021, all documents are Internet-
Drafts (I-Ds) and none of them are standards yet. Many open source implementations of
QUIC are available in various programming languages. QUIC is actively used on the
Internet by about 5% of web servers.

5. TLSv1.2:
Transport Layer Security (TLS) 1.2 is the successor to Secure SocketsLayer (SSL) used by
endpoint devices and applications to authenticate and encryptdata securely when transferred
over a network. TLS protocol is a widely accepted standard used by devices such as
computers, phones, IoTs, meters, and sensors.

12

CN|4B18-AI|PIET
COMPUTER SCIENCE AND ENGINEERING
FACULITY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORKS(303105304)
ENROLLMENT NO: - 2203031241073

6. TLSv1.3:
The TLS Version 1.3 protocol is a major revision to the TLS protocol that is intended to
provide better security and improve handshake performance. Touse TLSv1. 3, there are
certain configuration requirements: Cipher specifications: The cipher specifications that are
valid for TLSv1.

13

CN|4B18-AI|PIET

You might also like