0% found this document useful (0 votes)
31 views40 pages

cn_merged_merged (1)

The document outlines a practical laboratory manual for B.Tech Computer Science and Engineering students, focusing on networking experiments using routers and simulation tools like Cisco Packet Tracer and Wireshark. It covers various networking concepts such as internetworking, tunneling, packet fragmentation, and different network topologies, along with step-by-step procedures for experiments on same and different subnets. The manual aims to provide students with hands-on experience in understanding and implementing networking principles and troubleshooting techniques.

Uploaded by

aggu660
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views40 pages

cn_merged_merged (1)

The document outlines a practical laboratory manual for B.Tech Computer Science and Engineering students, focusing on networking experiments using routers and simulation tools like Cisco Packet Tracer and Wireshark. It covers various networking concepts such as internetworking, tunneling, packet fragmentation, and different network topologies, along with step-by-step procedures for experiments on same and different subnets. The manual aims to provide students with hands-on experience in understanding and implementing networking principles and troubleshooting techniques.

Uploaded by

aggu660
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

FACULTY OF ENGINEERING AND TECHNOLOGY

COMPUTER NETWORK
B. TECH CSE, 2nd YEAR, 4th SEM
ENROLLMENT NO: 2303031050688

PRACTICAL 7
AIM: Inter-networking with routers:
1: Experiment on same subnet
2: Perform Experiment across the subnet and observe functioning of Router via selecting
suitable pair of Source and destination.

Theory:
Internetworking:
Routing between two networks is called internetworking, here routers have knowledge about each oth-
er’s addresses. They can be statically configured on different network or they can learn by using internet-
working routing protocol. Internetworking refers to the process of connecting multiple distinct networks
to create a larger, unified network, allowing seamless communication between devices on different net-
works. It is the foundation of the internet and modern networking systems. Used with organization or
administration are called IGP (Internet Gateway Protocol), Exterior Gateway Protocol

Tunneling:
Tunnelling in computer networking is a method of encapsulating one type of network protocol within an-
other protocol to enable secure and efficient data transmission. This technique is commonly used to cre-
ate virtual connections between networks or devices over an existing physical or logical network.
Features:
 Encapsulation
 Transparency
 Security
 Compatibility

Packet fragmentation:
Packet fragmentation is the process of breaking down a large network packet into smaller fragments to
ensure that it can be transmitted over a network with a smaller Maximum Transmission Unit (MTU). The
MTU is the maximum size of a data packet that a specific network medium can handle without requiring
fragmentation.
How it works?
 Encapsulation:
 Header Adjustment:

o Fragment Offset:
o More Fragments (MF) Flag:
o Identification Field:

 Transmission:
 Reassembly:

30
FACULTY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORK
B. TECH CSE, 2nd YEAR, 4th SEM
ENROLLMENT NO: 2303031050688

Procedure:
 Same Subnet
Step 1: Connect the circuit as follows

Step 2: Give IP addresses to PC0 and PC1

PCO PC1
Step 3: Message passing from PC0 to PC1.

Step 4: Successfully message pass.

31
FACULTY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORK
B. TECH CSE, 2nd YEAR, 4th SEM
ENROLLMENT NO: 2303031050688

 Different subnets
Step 1: Connect the circuit as follows

Step 2: Give IP addresses and default gateway to PC0 and PC1 & PC2 and PC3

PC0 PC1

32
FACULTY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORK
B. TECH CSE, 2nd YEAR, 4th SEM
ENROLLMENT NO: 2303031050688
PC2 PC3

Step 3:Configure Router.


For Switch0:-

For Switch1:-

Step 4: Message Passing.


 First message pass from PC0 to PC3

 Second message pass from PC1 to PC2

33
FACULTY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORK
B. TECH CSE, 2nd YEAR, 4th SEM
ENROLLMENT NO: 2303031050688

Step 5: Connected Successfully

34
FACULTY OF ENGINEERING & TECHNOLOGY
BACHELOR OF TECHNOLOGY

COMPUTER NETWORKING
4thSEMESTER

COMPUTER SCIENCE & ENGINEERING DEPARTMENT

Laboratory Manual

COMPUTER SCIENCE AND ENGINEERING DEPARTMENT


PREFACE

It gives us immense pleasure to present the first edition of CN for the B.Tech. 2nd year
students for PARUL UNIVERSITY.

The Fundamental of Programming theory and laboratory courses at PARUL


UNIVERSITY, WAGHODIA, VADODARA are designed in such a way that students develop
the basic understanding of the subject in the theory classes and then try their hands on the computer
learnt during the theoretical sessions.
This book is emphatically not focused on “the syntax of CN ”. Understanding the
fundamental ideals, principals, and techniques is the essence of a good programmer. Only well-
designed code has a chance of becoming part of a correct, reliable, and maintainable system. Also,
“the fundamentals” are what last: they will still be essential after today’s language and tools have
evolved or been replaced.
We acknowledge the authors and publishers of all the books which we have consulted while
developing this Practical book. Hopefully this CN will serve the purpose for which it has been
developed.
CERTIFICATE

This is to certify that

Mr. RAHUL KUMAR PRAJAPATI with enrolment no. 2303031050489


has successfully completed his laboratory experiments in the
computer networking from the department of CSE-4 during the
academic year 2024-2025

Date of Submission:......................... StaffIn charge:...........................

Head of Department:...........................................
INDEX

Class: 4th Sem Subject: - Computer Network Laboratory


A.Y. 2024-2025 Subject Code: 303105256

Date
Date of
Sr. of Marks
Experiment Title Page Perfor Sign
No. Assess out 0f 10
No. mance
ment

To From

Experiments on Simulation Tools: (CISCO


1
PACKET TRACER).

2 Experiments of Packet capture tool: Wireshark.

To study behavior of generic devices used for


3
networking: (CISCO PACKET TRACER).

4 Data Link Layer (Error Correction).

5 Virtual LAN

6 Wireless LAN

Inter networking with routers: 1: Experiment


on same subnet 2: Perform Experiment across
7 the subnet and observe functioning of Router
via selecting suitable pair of Source and
destination.
8 Implementation of SUBNETTING.

9 Routing at Network Layer.

10 Experiment on Transport Layer.

Enrollment No:2303031050489 Page No:5


PRACTICAL-0

AIM :- To fulfill prerequires of computer network


Objectives :-
A) Course Outcomes
B) To understand ,download & install cisco packet
tracker
C) To understand ,download & install Wireshark
Apparatus :- Computer/Laptop , Internet , Cisco Packet
Tracker ,Wireshark
Theory :-
A) Computer networks courses typically cover a
range of topics, including network design, protocols,
and security. Some course outcomes for computer
networks include:
Understanding network basics: Students learn the
basics of computer networks media.
B) Cisco Packet Tracer is a powerful network
allows users to create, design, and experiment with
physical hardware. This tool is widely used for
cybersecurity skills in a virtual lab environment. With
Cisco routers and switches using a simulated
resource for students, professionals, and network.
C) Wireshark is a free and open-source network
connections, allowing users to analyze for network
software and communications protocol development,
and educational purposes. Originally named Ethereal, it
was renamed to Wireshark in 2006 due to trademark
issues. It's considered the de facto standard across many
industries and educational institutions.

Implementations :-

A) Steps to download cisco packet tracer :

• Go to browser and search “cisco packet tracer” and


go to the website https://www.computernetworkingnotes.com/ccna-study-guide/download-packet-
tracer-for-windows-and-linux.html
Download will be started automatically

• Click on first link packet tracer version 8.8.2 (Latest


Version)

• Download will be start automatically


B) Steps to download wireshark :
• Go to browser and search “Wireshark” and go to the
website https://www.wireshark.org/download.html

• Click on the first link “Windows x64Installer”


• Now the download will be start automatically by
tapping on that first link of installer
• n

Conclusion :-

A) Cisco packet tracer : Cisco Packet Tracer is an excellent


tool for learning, prototyping, and troubleshooting small
to medium-scale networks. While it has limitations for
professional-grade or highly advanced network
configurations, it is ideal for academic and basic
professional use. It serves as a cost-effective platform to
build a solid foundation in networking principles,
especially for Cisco-centric environments.
B) Wireshark : Wireshark is a powerful, open-source
network protocol analyzer that excels in capturing and
analyzing network traffic, making it an essential tool for
troubleshooting, security analysis, and learning about
network protocols. It is widely regarded for its depth,
flexibility, and reliability, though it requires technical
expertise to use effectively
Result :

After using cisco packet tracer you will be able to know


about n/w communication ,n/w design and networking
concepts. Through the wireshark you get the able to
familiarize with captures ,protocols and configurations on
n/w traffic.
Practical 1
Aim: Experiments on Simulation Tools (Cisco Packet Tracer):

TOPOLOGIES:

1. RING
A ring topology is a type of network configuration where each device is connected
to exactly two other devices, forming a circular data path. In this topology, data travels in
one direction (unidirectional) or both directions (bidirectional) around the ring until it
reaches its destination.

RING TOPOLOGY

Steps to Create a Ring Topology

1. Open Cisco Packet Tracer.


2. Add Devices: Drag and drop PCs, switches, or routers into the workspace.
3. Connect Devices: Link devices in a circular pattern using the "Connection" tool.
4. Assign IP Addresses: Configure unique IPs for all devices in the same subnet.
5. Test Connectivity: Use the ping command to ensure devices communicate.

Enrollment No:2303031050489 Page No:16


2. MESH
A mesh topology is a network configuration where every device is connected to
every other device, ensuring multiple paths for data transmission. This setup enhances
redundancy and fault tolerance, making it highly reliable for critical systems.

MESH TOPOLOGY

Steps to Create a Mesh Topology

1. Open Cisco Packet Tracer.

2. Add Devices: Place multiple PCs, switches, or routers in the workspace.

3. Connect Devices:

• For full mesh, connect every device directly to all others.


• For partial mesh, connect only some devices.

4. Assign IP Addresses: Assign unique IPs in the same subnet or configure routing if using
routers.

5. Test Connectivity: Test communication between devices using ping or simulation mode.

Enrollment No:2303031050489 Page No:17


3. STAR
In a star topology, all devices are connected to a central hub or switch. It offers
easy management and scalability, as adding new devices is simple. However, if the central
hub fails, the whole network is disrupted. This topology is commonly used in home and
office networks.

STAR TOPOLOGY

Steps to Create in Cisco Packet Tracer

1. Add Devices: Central hub (switch/router) and end devices (e.g., PCs).
2. Connect Devices: Link each end device directly to the central hub.
3. Assign IPs: Set unique IP addresses for all devices.
4. Test Connectivity: Use ping to ensure communication between devices.

Enrollment No:2303031050489 Page No:18


4. BUS

In a bus topology, all devices are connected to a single central cable. It’s simple and cost-
effective, but a failure in the central cable can bring down the entire network. It’s suitable for small
networks.

BUS TOPOLOGY

Steps to Create Bus Topology

1. Add Devices: Place devices (PCs, switches) in Cisco Packet Tracer.

2. Connect Devices: Use a single central cable to link all devices.

3. Assign IP Addresses: Configure unique IPs for each device.

4. Test Connectivity: Use the ping command to check communication.

Enrollment No:2303031050489 Page No:19


5. TREE

A tree topology is a hybrid network structure that combines characteristics of both star and
bus topologies. It consists of groups of star-configured networks connected to a central bus
backbone.

TREE TOPOLOGY

Steps to Create Tree Topology

1. Add Devices: Place routers, switches, and end devices (PCs) in Cisco Packet Tracer.

2. Connect Devices:

• Connect devices in star configurations (branches) to central switches/routers.


• Link these switches/routers to a central backbone (bus).

3. Assign IP Addresses: Configure IPs for all devices within the network.

4. Test Connectivity: Use ping to check communication between devices.

Enrollment No:2303031050489 Page No:20


6. HYBRID

A hybrid topology combines two or more different topologies, like star, bus, or mesh, to
suit specific network needs. It offers flexibility and scalability but is more complex to design and
maintain. It's commonly used in large or complex networks.

HYBRID TOPOLOGY

Steps to Create Hybrid Topology

1. Add Devices: Place various devices (routers, switches, PCs) in Cisco Packet Tracer.

2. Combine Topologies: Connect devices using different topologies (e.g., star, bus, mesh).

3. Assign IP Addresses: Set IP addresses for each device based on the network design.

4. Test Connectivity: Use ping or simulation mode to ensure communication between


devices.

Enrollment No:2303031050489 Page No:21


Practical 2
AIM: To understand the features of wireshark as a packet capture tool and understand
encapsulation of information. Also study effect of few network commands

2.1 Purpose: The main objective of the proposed experiment is to give exposure of wire-shark tool
to students so can learn to monitor transmission packets being sent in Wi-Fi and LAN
environments.

2.2 Objectives:
The objectives of the experiment are:

1. To understand and explore the basic and advanced features of Wireshark as a packet capture
and analysis tool.

2. To observe and analyze network traffic in real-time for Wi-Fi and LAN environments.

3. To study the encapsulation process in the OSI and TCP/IP models by examining different
protocol layers (e.g., Ethernet, IP, TCP/UDP, HTTP, etc.).

4. To monitor and interpret network activity generated by various commands such as ping,
traceroute, DNS lookups, and HTTP requests.

5. To identify and analyze patterns of communication and troubleshoot issues like packet loss,
latency, or incorrect configurations.

6. To provide hands-on experience with packet filtering, protocol analysis, and


troubleshooting techniques using Wireshark.

2.3 TOOLS/SOFTWARE: Wireshark

Enrollment No:2303031050489 Page No:22


Enrollment No:2303031050489 Page No:23
Practical 3
AIM: To study behavior of generic devices used for networking: (Cisco packet tracer)

DESCRIPTION:

Web server in Cisco packet tracer.

• In this lesson we will learn about how to create first web server on cisco packet tracer that can be

apply on real time web server.

• So we are taking few PCs and one web server and one switch for connecting all devices. Make
sure all devices should be connected by straight through cable because for connecting different
devices, straight through cable is required. Assign IPs to each end device (server and PCs) of single
network with subnet mask It can different as per your choice.

• Then go in server>services>http in that enable http and https modes.In that go to index.html and
edit In that write the message you want… At the end click on save.and close it .

• Then we go PC1 and in that we select desktop and we write the IP address of server and click on
enter. You can see the message which you wrote in server message.

Enrollment No:2303031050489 Page No:24


If you want to see that your connection is proper or not then you want to click on your pc then
desktop>command prompt and in that you need to write ping 190.0.0.1(IT_address). And give
enter.

Use of switch
Enrollment No:2303031050489 Page No:25
A switch is used in a wired network to connect to other devices using Ethernet cables. The switch
allows
each connected device to talk to the others. Wireless-only networks do not use switches because
devices

such as wireless routers and adapters communicate directly with one another.

• Connect multiple hosts: Normally, a switch provides a large number of ports for cable
connections, allowing for star topology routing. It is usually used to connect multiple PCs to the
network.

• Forwards a message to a specific host: Like a bridge, a switch uses the same forwarding or
filtering logic on each port. When any host on the network or a switch sends a message to another
host on the same network or the

• Same switch, the switch receives and decodes the frames to read the physical (MAC) address
portion of the message.

• Manage traffic: A switch in networking can manage traffic either coming into or exiting the
network and can connect devices like computers and access points with ease.

• Keep electrical signal undistorted: When a switch forwards a frame, it regenerates an undistorted
square electrical signal.

• Increase LAN bandwidth: A switch divides a LAN into multiple collision domains with
independent broadband, thus greatly increasing the bandwidth of the LAN.

Use of hub

Enrollment No:2303031050489 Page No:26


A hub is a physical layer networking device which is used to connect multiple devices in a network.
They are generally used to connect computers in a LAN.

A hub has many ports in it. A computer which intends to be connected to the network is plugged in
to one of these ports. When a data frame arrives at a port, it is broadcast to every other port, without
considering whether it is destined for a particular destination or not.

When a Hub receives data from one of the connected devices, it passes data to all the other ports
without checking for the destination device except the port through which it receives the data.
Below figure, shows the working of a HUB.

Consider, Device A want to send data to device D. When device A sends data, the hub receives it
through one port and transfer the data to all the other connected devices instead of passing it to only
device D. This feature of hub leads to congestion and extends the collision domain. So, it is
considered as an inefficient device and needs more bandwidth for working.

Enrollment No:2303031050489 Page No:27


Difference Between Hub and Switch.

Summary of devices we use:

Switch 2950-54:
The Cisco Catalyst 2950C 24 and Catalyst 2950T 24 Switches belong to the Cisco Catalyst 2950
series of high-performance, standalone, 10/100 autosensing Fast Ethernet and Gigabit Ethernet
switches. Both products bring intelligent services to the network edge to accommodate the needs of
growing workgroups and server connectivity. Embedded in the Cisco Catalyst 2950 Series is Cisco
Device Manager software, which allows users to configure and troubleshoot a Cisco Catalyst fixed-
configuration switch using a standard Web browser.

Router 4321:
The Cisco 4000 Series Integrated Services Routers (ISR) revolutionize WAN communications in
the enterprise branch. With new levels of built-in intelligent network capabilities and convergence,
the routers specifically address the growing need for application-aware networking in distributed
enterprise sites.

Hub-pt:

Enrollment No:2303031050489 Page No:28


Hub is a very simple network device that is used in LANs. It is basically a multiport repeater. Hubs
do not decide anything and forwards any traffic to all of the ports. So, they are not smart devices.
They have multiple ports that connects different network equipments in the same network. But this
devices the network bandwidth.
Server:
Servers are an entirely different breed when compared to other end devices. They have various
functionalities and also have space for two network interfaces. The modules available for servers
are the same as PC modules, except that the servers do not have the PC-HOST-NM-1AM module.

Meraki server:
The Meraki cloud solution is a centralized management service that allows users to manage all of
their Meraki network devices via a single simple and secure platform. Users are able to deploy,
monitor and configure their Meraki devices via the Meraki dashboard web interface or via APIs.

Ip phone:
IP telephony refers to any phone system that uses an internet connection to send and receive voice
data. Unlike a regular telephone that uses landlines to transmit analog signals, IP phones connect to
the internet via a router and modem.

Voip device:
A VoIP phone or IP phone uses voice over IP technologies for placing and transmitting telephone
calls over an IP network, such as the Internet, instead of the traditional public switched telephone
network (PSTN).

Copper straight through wire:

This is a standard Ethernet cable that is used to connect two devices that operate in different layers
of the OSI model (such as hub to router and switch to PC). It can be used with Ethernet, Fast
Ethernet and Gigabit Ethernet port types.

Copper cross over wire:


This Ethernet cable connects devices operating in the same OSI layer (such as hub to hub, PC to
PC, PC to router, and PC to printer). This cable can also be used with Ethernet, Fast Ethernet and
Gigabit Ethernet port .

Phone :-
The mobile phone network enables wireless communication using mobile devices, such as mobile
phones, smart phones or tablets. Mobile phone networks provide the necessary infrastructure and
are operated by mobile phone providers.

Automatically choose connection wire:


Connections can be made automatically by choosing the connection type shown below. Router
links will be red or not active until you correctly configure the interfaces.

Coaxial wire:

Enrollment No:2303031050489 Page No:29


The coaxial cable used to connect the Cisco uBR7200 series universal broadband routers at the
headend should be very high-quality cable because imperfections that do not visibly affect video
transmissions can significantly affect digital data transmissions. In particular, poor insulation,
improperly installed additional outlets, the condition and length of the cable’s center conductor, and
the quality of the cable can negatively affect the connectivity and performance of the cable access
router for digital data transmission
Sniffer:
I have assignment that i need to create full "Network", using all device like switch, hub, server
..etc.The problem that i force that i need to use "Sniffer" its first time to me using that device. I
need help how can i configure or connect the Sniffer with my network, Because i search on internet
i don't find anythings about configure or connect sniffer on packet tracer.

Smart device:
A smart device is an electronic device, generally connected to other devices or networks via
different wireless protocols such as Bluetooth, Zigbee, NFC, Wi-Fi, LiFi, 5G, etc., that can operate
to some extent interactively and autonomously.

Mcu-pt board:

Components are physical objects that connect to microcontroller (MCU-PT) or single boarded
computers (SBC-PT). They typically does not have a network interface and rely on the MCU-PT or
SBC-PT for network access. These are simple devices that only communicate through their analog
or digital slots.

Enrollment No:2303031050489 Page No:30


Practical 4
AIM : Data link layer (error detection).

Objectives
1. To study the role of the Data Link Layer in error detection and data framing.

2. To explore various error detection techniques such as parity check, checksum, and cyclic
redundancy check (CRC).

3. To understand how errors occur during data transmission and how they are identified.

4. To implement and analyze error detection techniques in a simulated environment.

5. To gain hands-on experience with tools or programming that demonstrates error detection
mechanisms.

Tools/Software
1. Wireshark: For capturing and analyzing network frames and their error-checking
mechanisms.

2. Programming Environment:

o Languages like Python, C, or Java for simulating error detection algorithms.


o Libraries or frameworks for networking simulations, such as Scapy or NS-3.
3. Network Simulator (Optional): For visualizing how errors are detected in real-time, e.g.,
Cisco Packet Tracer.

4. Hardware Setup: Switches, routers, and network cables (optional for physical
demonstration).

Program to implement error detection and correction using HAMMING code concept.

#include<stdio.h>

void main() {

int data[10];

int dataatrec[10],c,c1,c2,c3,i;

printf("Enter 4 bits of data one by one\n");

scanf("%d",&data[0]);

Enrollment No:2303031050489 Page No:31


scanf("%d",&data[1]);
scanf("%d",&data[2]);

scanf("%d",&data[4]);

//Calculation of even parity

data[6]=data[0]^data[2]^data[4];

data[5]=data[0]^data[1]^data[4];

data[3]=data[0]^data[1]^data[2];

printf("\nEncoded data is\n");

for(i=0;i<7;i++)

printf("%d",data[i]);

printf("\n\nEnter received data bits one by one\n");

for(i=0;i<7;i++)

scanf("%d",&dataatrec[i]);

c1=dataatrec[6]^dataatrec[4]^dataatrec[2]^dataatrec[0];

c2=dataatrec[5]^dataatrec[4]^dataatrec[1]^dataatrec[0];

c3=dataatrec[3]^dataatrec[2]^dataatrec[1]^dataatrec[0];

c=c3*4+c2*2+c1 ;

if(c==0) {

printf("\nNo error while transmission of data\n");

else {

printf("\nError on position %d",c);

printf("\nData sent : ");

for(i=0;i<7;i++)

printf("%d",data[i]);

Enrollment No:2303031050489 Page No:32


printf("\nData received : ");

for(i=0;i<7;i++)

printf("%d",dataatrec[i]);

printf("\nCorrect message is\n");

//if errorneous bit is 0 we complement it else vice versa

if(dataatrec[7-c]==0)

dataatrec[7-c]=1;

else

dataatrec[7-c]=0;

for (i=0;i<7;i++) {

printf("%d",dataatrec[i]);

OUTPUT:

Enrollment No:2303031050489 Page No:33


Practical 5
AIM: Virtual LAN: Simulate Virtual LAN configuration using CISCO Packet Tracer Simulation.

DESCRIPTION:

STEP 1: Make a network


• Connect the pcs and switches shown in the below figure.Give IP address.

• Connect pcs to switches with copper straight through and connect switches to one another with
copper cross over.

STEP 2:
• Configure VLAN on all switches. • Go to switch0 CLI, enter ENA command to enable switch.

• Write the foll. commands conf t>vlan 10> name yellow>exit as shown below.

• Do the same for second Vlan 20 and name it orange.

• Repeat the process for switch1.

To see the vlan the command used is >show vlan brief. The output of the command is below,

Enrollment No:2303031050489 Page No:34


STEP 3: Configure TRUNK MODE.
• To enable trunk mode the first go to switch CLI

• The command ena>conf t>interface fa0/7>switchport mode trunk.

• This is to be done for every switches ports.

• The below figure shows the command.

Enrollment No:2303031050489 Page No:35


STEP 4: Configure ACCESS MODE.

• ACCESS MODE is configued for all the pcs who are connect to the switch

• To configure access mode for pc command ena>conf t>interface fa0/1>switchport mode


access>switchport access vlan10>exit.
• This is to be done with each pc connected to switch.

Communication in same and different vlans with two switches.

Enrollment No:2303031050489 Page No:36


Faculty of Engineering & Technology
303105256 - Computer Network Laboratory

Practical 6

TITLE:To Study and Configure a Wireless LAN (WLAN).

AIM
To understand the concept of Wireless LAN (WLAN) and configure a network that connects
devices wirelessly using an access point, secured with an SSID and WEP key.

STEP 1: Creating a Wired Topology

• Establish a wired connection between a router, switch, and PC to send messages via wired
communication.
• Assign IP addresses to the PC and the router.
• Configure the router’s Fast Ethernet port connected to the switch with an appropriate IP
address and turn on the port status.

STEP 2: Configuring the Wireless Access Point

• An Access Point is needed to connect other devices wirelessly.


• Assign an SSID and a WEP key to the Access Point to secure the network.

Enrollment No:2303031050489 Page No:40


Faculty of Engineering & Technology
303105256 - Computer Network Laboratory

STEP 3: Connecting a PC to WLAN

• Add a wireless network adapter (WMP300N) to the PC by:


o Going to the Physical Device View
o Turning off the PC
o Replacing the existing module with WMP300N
• Assign an IP address to the PC and set the default gateway as the router’s IP address.
• Go to PC Wireless Settings → Click on Connect → Select the SSID → Enter the WEP key
→ Connect.

STEP 4: Connecting Other Wireless Devices

Tablet

• Go to IP Configuration and assign an IP address.


• Set the default gateway as the router’s IP address.
• Configure Wireless Settings, enter the SSID and WEP key, then close the settings.

Smartphone

• Go to IP Configuration, assign an IP address, and set the default gateway.


• In Wireless Settings, enter the SSID and WEP key, then close the settings.

Laptop

• Follow the same steps as the PC:


o Install WMP300N for wireless connectivity.
o Assign an IP address and default gateway.
o Connect to the SSID using the WEP key.

Printer

Enrollment No:2303031050489 Page No:41


Faculty of Engineering & Technology
303105256 - Computer Network Laboratory

• In the Physical Device View, replace the existing module with WMP300N to enable
wireless connectivity.
• Assign an IP address and set the default gateway.

STEP 5: Testing the Connection

• Ping test between devices to ensure connectivity.


• Verify that devices within the same network can communicate wirelessly.
• Ensure that SSID and WEP key authentication are working correctly.

OUTPUT AND OBSERVATIONS:

1. Wired communication between router, switch, and PC is successfully established.


2. Devices connect wirelessly to the Access Point using SSID and WEP key authentication.
3. PCs, smartphones, tablets, laptops, and printers communicate effectively within the WLAN.

CONCLUSION: WLAN enables seamless communication within a local network using wireless
technology. The Access Point facilitates connections for multiple devices, secured with an SSID
and WEP key. The successful setup and connectivity confirm the effective implementation of a
Wireless LAN (WLAN).

Enrollment No:2303031050489 Page No:42

You might also like