cn_merged_merged (1)
cn_merged_merged (1)
COMPUTER NETWORK
B. TECH CSE, 2nd YEAR, 4th SEM
ENROLLMENT NO: 2303031050688
PRACTICAL 7
AIM: Inter-networking with routers:
1: Experiment on same subnet
2: Perform Experiment across the subnet and observe functioning of Router via selecting
suitable pair of Source and destination.
Theory:
Internetworking:
Routing between two networks is called internetworking, here routers have knowledge about each oth-
er’s addresses. They can be statically configured on different network or they can learn by using internet-
working routing protocol. Internetworking refers to the process of connecting multiple distinct networks
to create a larger, unified network, allowing seamless communication between devices on different net-
works. It is the foundation of the internet and modern networking systems. Used with organization or
administration are called IGP (Internet Gateway Protocol), Exterior Gateway Protocol
Tunneling:
Tunnelling in computer networking is a method of encapsulating one type of network protocol within an-
other protocol to enable secure and efficient data transmission. This technique is commonly used to cre-
ate virtual connections between networks or devices over an existing physical or logical network.
Features:
Encapsulation
Transparency
Security
Compatibility
Packet fragmentation:
Packet fragmentation is the process of breaking down a large network packet into smaller fragments to
ensure that it can be transmitted over a network with a smaller Maximum Transmission Unit (MTU). The
MTU is the maximum size of a data packet that a specific network medium can handle without requiring
fragmentation.
How it works?
Encapsulation:
Header Adjustment:
o Fragment Offset:
o More Fragments (MF) Flag:
o Identification Field:
Transmission:
Reassembly:
30
FACULTY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORK
B. TECH CSE, 2nd YEAR, 4th SEM
ENROLLMENT NO: 2303031050688
Procedure:
Same Subnet
Step 1: Connect the circuit as follows
PCO PC1
Step 3: Message passing from PC0 to PC1.
31
FACULTY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORK
B. TECH CSE, 2nd YEAR, 4th SEM
ENROLLMENT NO: 2303031050688
Different subnets
Step 1: Connect the circuit as follows
Step 2: Give IP addresses and default gateway to PC0 and PC1 & PC2 and PC3
PC0 PC1
32
FACULTY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORK
B. TECH CSE, 2nd YEAR, 4th SEM
ENROLLMENT NO: 2303031050688
PC2 PC3
For Switch1:-
33
FACULTY OF ENGINEERING AND TECHNOLOGY
COMPUTER NETWORK
B. TECH CSE, 2nd YEAR, 4th SEM
ENROLLMENT NO: 2303031050688
34
FACULTY OF ENGINEERING & TECHNOLOGY
BACHELOR OF TECHNOLOGY
COMPUTER NETWORKING
4thSEMESTER
Laboratory Manual
It gives us immense pleasure to present the first edition of CN for the B.Tech. 2nd year
students for PARUL UNIVERSITY.
Head of Department:...........................................
INDEX
Date
Date of
Sr. of Marks
Experiment Title Page Perfor Sign
No. Assess out 0f 10
No. mance
ment
To From
5 Virtual LAN
6 Wireless LAN
Implementations :-
Conclusion :-
TOPOLOGIES:
1. RING
A ring topology is a type of network configuration where each device is connected
to exactly two other devices, forming a circular data path. In this topology, data travels in
one direction (unidirectional) or both directions (bidirectional) around the ring until it
reaches its destination.
RING TOPOLOGY
MESH TOPOLOGY
3. Connect Devices:
4. Assign IP Addresses: Assign unique IPs in the same subnet or configure routing if using
routers.
5. Test Connectivity: Test communication between devices using ping or simulation mode.
STAR TOPOLOGY
1. Add Devices: Central hub (switch/router) and end devices (e.g., PCs).
2. Connect Devices: Link each end device directly to the central hub.
3. Assign IPs: Set unique IP addresses for all devices.
4. Test Connectivity: Use ping to ensure communication between devices.
In a bus topology, all devices are connected to a single central cable. It’s simple and cost-
effective, but a failure in the central cable can bring down the entire network. It’s suitable for small
networks.
BUS TOPOLOGY
A tree topology is a hybrid network structure that combines characteristics of both star and
bus topologies. It consists of groups of star-configured networks connected to a central bus
backbone.
TREE TOPOLOGY
1. Add Devices: Place routers, switches, and end devices (PCs) in Cisco Packet Tracer.
2. Connect Devices:
3. Assign IP Addresses: Configure IPs for all devices within the network.
A hybrid topology combines two or more different topologies, like star, bus, or mesh, to
suit specific network needs. It offers flexibility and scalability but is more complex to design and
maintain. It's commonly used in large or complex networks.
HYBRID TOPOLOGY
1. Add Devices: Place various devices (routers, switches, PCs) in Cisco Packet Tracer.
2. Combine Topologies: Connect devices using different topologies (e.g., star, bus, mesh).
3. Assign IP Addresses: Set IP addresses for each device based on the network design.
2.1 Purpose: The main objective of the proposed experiment is to give exposure of wire-shark tool
to students so can learn to monitor transmission packets being sent in Wi-Fi and LAN
environments.
2.2 Objectives:
The objectives of the experiment are:
1. To understand and explore the basic and advanced features of Wireshark as a packet capture
and analysis tool.
2. To observe and analyze network traffic in real-time for Wi-Fi and LAN environments.
3. To study the encapsulation process in the OSI and TCP/IP models by examining different
protocol layers (e.g., Ethernet, IP, TCP/UDP, HTTP, etc.).
4. To monitor and interpret network activity generated by various commands such as ping,
traceroute, DNS lookups, and HTTP requests.
5. To identify and analyze patterns of communication and troubleshoot issues like packet loss,
latency, or incorrect configurations.
DESCRIPTION:
• In this lesson we will learn about how to create first web server on cisco packet tracer that can be
• So we are taking few PCs and one web server and one switch for connecting all devices. Make
sure all devices should be connected by straight through cable because for connecting different
devices, straight through cable is required. Assign IPs to each end device (server and PCs) of single
network with subnet mask It can different as per your choice.
• Then go in server>services>http in that enable http and https modes.In that go to index.html and
edit In that write the message you want… At the end click on save.and close it .
• Then we go PC1 and in that we select desktop and we write the IP address of server and click on
enter. You can see the message which you wrote in server message.
Use of switch
Enrollment No:2303031050489 Page No:25
A switch is used in a wired network to connect to other devices using Ethernet cables. The switch
allows
each connected device to talk to the others. Wireless-only networks do not use switches because
devices
such as wireless routers and adapters communicate directly with one another.
• Connect multiple hosts: Normally, a switch provides a large number of ports for cable
connections, allowing for star topology routing. It is usually used to connect multiple PCs to the
network.
• Forwards a message to a specific host: Like a bridge, a switch uses the same forwarding or
filtering logic on each port. When any host on the network or a switch sends a message to another
host on the same network or the
• Same switch, the switch receives and decodes the frames to read the physical (MAC) address
portion of the message.
• Manage traffic: A switch in networking can manage traffic either coming into or exiting the
network and can connect devices like computers and access points with ease.
• Keep electrical signal undistorted: When a switch forwards a frame, it regenerates an undistorted
square electrical signal.
• Increase LAN bandwidth: A switch divides a LAN into multiple collision domains with
independent broadband, thus greatly increasing the bandwidth of the LAN.
Use of hub
A hub has many ports in it. A computer which intends to be connected to the network is plugged in
to one of these ports. When a data frame arrives at a port, it is broadcast to every other port, without
considering whether it is destined for a particular destination or not.
When a Hub receives data from one of the connected devices, it passes data to all the other ports
without checking for the destination device except the port through which it receives the data.
Below figure, shows the working of a HUB.
Consider, Device A want to send data to device D. When device A sends data, the hub receives it
through one port and transfer the data to all the other connected devices instead of passing it to only
device D. This feature of hub leads to congestion and extends the collision domain. So, it is
considered as an inefficient device and needs more bandwidth for working.
Switch 2950-54:
The Cisco Catalyst 2950C 24 and Catalyst 2950T 24 Switches belong to the Cisco Catalyst 2950
series of high-performance, standalone, 10/100 autosensing Fast Ethernet and Gigabit Ethernet
switches. Both products bring intelligent services to the network edge to accommodate the needs of
growing workgroups and server connectivity. Embedded in the Cisco Catalyst 2950 Series is Cisco
Device Manager software, which allows users to configure and troubleshoot a Cisco Catalyst fixed-
configuration switch using a standard Web browser.
Router 4321:
The Cisco 4000 Series Integrated Services Routers (ISR) revolutionize WAN communications in
the enterprise branch. With new levels of built-in intelligent network capabilities and convergence,
the routers specifically address the growing need for application-aware networking in distributed
enterprise sites.
Hub-pt:
Meraki server:
The Meraki cloud solution is a centralized management service that allows users to manage all of
their Meraki network devices via a single simple and secure platform. Users are able to deploy,
monitor and configure their Meraki devices via the Meraki dashboard web interface or via APIs.
Ip phone:
IP telephony refers to any phone system that uses an internet connection to send and receive voice
data. Unlike a regular telephone that uses landlines to transmit analog signals, IP phones connect to
the internet via a router and modem.
Voip device:
A VoIP phone or IP phone uses voice over IP technologies for placing and transmitting telephone
calls over an IP network, such as the Internet, instead of the traditional public switched telephone
network (PSTN).
This is a standard Ethernet cable that is used to connect two devices that operate in different layers
of the OSI model (such as hub to router and switch to PC). It can be used with Ethernet, Fast
Ethernet and Gigabit Ethernet port types.
Phone :-
The mobile phone network enables wireless communication using mobile devices, such as mobile
phones, smart phones or tablets. Mobile phone networks provide the necessary infrastructure and
are operated by mobile phone providers.
Coaxial wire:
Smart device:
A smart device is an electronic device, generally connected to other devices or networks via
different wireless protocols such as Bluetooth, Zigbee, NFC, Wi-Fi, LiFi, 5G, etc., that can operate
to some extent interactively and autonomously.
Mcu-pt board:
Components are physical objects that connect to microcontroller (MCU-PT) or single boarded
computers (SBC-PT). They typically does not have a network interface and rely on the MCU-PT or
SBC-PT for network access. These are simple devices that only communicate through their analog
or digital slots.
Objectives
1. To study the role of the Data Link Layer in error detection and data framing.
2. To explore various error detection techniques such as parity check, checksum, and cyclic
redundancy check (CRC).
3. To understand how errors occur during data transmission and how they are identified.
5. To gain hands-on experience with tools or programming that demonstrates error detection
mechanisms.
Tools/Software
1. Wireshark: For capturing and analyzing network frames and their error-checking
mechanisms.
2. Programming Environment:
4. Hardware Setup: Switches, routers, and network cables (optional for physical
demonstration).
Program to implement error detection and correction using HAMMING code concept.
#include<stdio.h>
void main() {
int data[10];
int dataatrec[10],c,c1,c2,c3,i;
scanf("%d",&data[0]);
scanf("%d",&data[4]);
data[6]=data[0]^data[2]^data[4];
data[5]=data[0]^data[1]^data[4];
data[3]=data[0]^data[1]^data[2];
for(i=0;i<7;i++)
printf("%d",data[i]);
for(i=0;i<7;i++)
scanf("%d",&dataatrec[i]);
c1=dataatrec[6]^dataatrec[4]^dataatrec[2]^dataatrec[0];
c2=dataatrec[5]^dataatrec[4]^dataatrec[1]^dataatrec[0];
c3=dataatrec[3]^dataatrec[2]^dataatrec[1]^dataatrec[0];
c=c3*4+c2*2+c1 ;
if(c==0) {
else {
for(i=0;i<7;i++)
printf("%d",data[i]);
for(i=0;i<7;i++)
printf("%d",dataatrec[i]);
if(dataatrec[7-c]==0)
dataatrec[7-c]=1;
else
dataatrec[7-c]=0;
for (i=0;i<7;i++) {
printf("%d",dataatrec[i]);
OUTPUT:
DESCRIPTION:
• Connect pcs to switches with copper straight through and connect switches to one another with
copper cross over.
STEP 2:
• Configure VLAN on all switches. • Go to switch0 CLI, enter ENA command to enable switch.
• Write the foll. commands conf t>vlan 10> name yellow>exit as shown below.
To see the vlan the command used is >show vlan brief. The output of the command is below,
• ACCESS MODE is configued for all the pcs who are connect to the switch
Practical 6
AIM
To understand the concept of Wireless LAN (WLAN) and configure a network that connects
devices wirelessly using an access point, secured with an SSID and WEP key.
• Establish a wired connection between a router, switch, and PC to send messages via wired
communication.
• Assign IP addresses to the PC and the router.
• Configure the router’s Fast Ethernet port connected to the switch with an appropriate IP
address and turn on the port status.
Tablet
Smartphone
Laptop
Printer
• In the Physical Device View, replace the existing module with WMP300N to enable
wireless connectivity.
• Assign an IP address and set the default gateway.
CONCLUSION: WLAN enables seamless communication within a local network using wireless
technology. The Access Point facilitates connections for multiple devices, secured with an SSID
and WEP key. The successful setup and connectivity confirm the effective implementation of a
Wireless LAN (WLAN).