A CN_File
A CN_File
LAB FILE
Department Of Computer Science & Engineering
B .Tech (CSE) 2022-26 – 6TH Sem
1
2
Table of Content
Sr. No. Name of Practical Date Signature
3
4
PRACTICAL - 1
Aim : To Analyze different types of Network cables and practically implement
the cross-wired cable and straight through cable using clamping (crimping) tool.
Apparatus Required :
RJ45 Ethernet Cables, RJ45 Connectors, Crimping Tool, Cable Tester, Wire Stripper,
Cisco Packet Tracer Software.
Theory:
Network cables are essential for wired communication between devices in a network.
They come in different types based on speed, distance, and use case. (fig1.1)
● Types: UTP (Unshielded Twisted Pair) & STP (Shielded Twisted Pair)
● Usage: Ethernet networking (LANs)
● Connector : Registered Jack 45
● Categories: Cat3, Cat5, Cat5e, Cat6, Cat6a, Cat7, Cat8
● Speed & Distance:
○ Cat5e: Up to 1 Gbps, 100 meters
○ Cat6: Up to 10 Gbps, 55 meters
○ Cat7: Up to 10 Gbps, 100 meters
● Advantages: Cost-effective, widely used, easy to install
5
● Disadvantages: Prone to interference (UTP), limited distance
2. Coaxial Cable
Twisted 1-10 Gbps 100m Low (UTP), Medium Low LANs, office
Pair (STP) networks
6
Wiring Standards for Ethernet Cables:
Ethernet cables can be classified into 2 main types based on the wiring standard used
on both ends:
1. Straight-Through Cable: Both ends follow the same wiring standard (either
568A568A or 568B568B). Used for connecting different devices, such as a PC to a
Switch or a Router to a Switch.
2. Crossover Cable: One end follows TIA/EIA568A, and the other follows
TIA/EIA568B. Used to connect similar devices, such as PC-to-PC or Switch-to-Switch
connections.
Working :
1. Straight-Through Cable Model:
A. Devices Used: One PC, one switch, one router. (fig1.2)
B. Connections: PC to Switch (straight-through cable), Switch to
Router (straight-through cable).
C. Testing:
I. Assign IP addresses to the devices.
– (Router: IP-192.168.1.1)
– (PC: Default Gateway-192.168.1.1, Subnet-
255.255.255.0, IP-192.168.1.10)
II. Use the “ping 192.168.1.1” command on PC’s command prompt
to test communication.
2. Crossover Cable Model:
A. Devices Used: Two PCs. (fig1.3)
B. Connections: PC0 to PC1 (crossover cable).
C. Testing:
I. Assign IP addresses to both PCs
– (PC0: IP-192.168.1.1 Subnet-255.255.255.0)
– (PC1: IP-192.168.1.2 Subnet-255.255.255.0)
II. Test direct communication using the “ping 192.168.1.2”
command on PC0 Command Prompt
Result
:
7
>>fig1.2
>>fig1.3
Conclusion : Analysed different types of Network cables and practically
implemented the cross-wired cable and straight through cable using clamping tool
successfully.
8
PRACTICAL - 2
Aim : To Analyse Network Devices in Detail.
Apparatus Required :
Hardware: Routers, switch, Wireless access point, Computers, Modem, Hub, Network cables
,etc.
Software: Cisco Packet Tracer (for simulation)
Theory:
Network devices play a crucial role in establishing communication between computers and
other hardware within a network. (fig2.1)
1. Hub
Function:
● Acts as a basic network device that broadcasts data to all connected devices.
● Operates at Layer 1 (Physical Layer) of the OSI model.
9
Types:
Advantages:
Disadvantages:
2. Switch
Function:
Types:
Advantages:
Disadvantages:
3. Router
Function:
Types:
10
1. Wired Router – Uses Ethernet cables for connectivity.
2. Wireless Router – Provides Wi-Fi connectivity.
3. Core Router – Used in large enterprise networks for backbone connectivity.
4. Edge Router – Connects an internal network to the external internet.
Advantages:
Disadvantages:
4. Modem (Modulator-Demodulator)
Function:
● Converts digital signals (from a computer) into analog signals (for telephone
lines) and vice versa.
● Used to connect a local network to an ISP (Internet Service Provider).
Types:
Advantages:
Disadvantages:
Types:
11
3. Mesh AP – Forms a mesh network for wider coverage.
Advantages:
Disadvantages:
6. Gateway
Function:
Examples:
Advantages:
Disadvantages:
7. Firewall
Function:
Types:
Advantages:
12
-- Protects against unauthorized access.
-- Helps prevent malware and cyberattacks.
Disadvantages:
Switch Layer 2 (or Forwards data to the correct Uses MAC LAN networks
3) device addresses
Modem Layer 1/2 Converts digital to analog Connects to ISP Internet access
Working :
We will create a network model using various network devices studied above (fig2.2).
1. The subnet of all the devices will be same i.e. 255.255.255.0
2. The IP addresses of the 2 routers will be 192.168.1.1 and 192.168.2.1 respectively.
3. The default gateway for the devices will be the same as IP address of the router
network they are connected to.
4. We will use a switch to connect the routers to the modem because there is only one
port available in the modem
5. For all the connections between devices we will use copper straight-through
connection cables.
6. For the laptop we will have to switch It off and attach the wireless adapter and switch
it on for connecting to a wireless network.
7. To test the connection status on any device, we will use the “ping . ._._“ command
in the command prompt. The blank space will be the IP address of the respective
router.
8. To simplify the connections, we can also use a switch between the hub and the 3
servers (not used here)
13
Result :
fig2.2
Conclusion : Analysed Network Devices in Detail successfully.
14
PRACTICAL - 3
Aim : To Connect the computers in Local Area Network, Metropolitan Area Network
and Wide Area Network.
Apparatus Required :
Theory:
A network is a system that connects multiple devices to share data, resources, and
communication. Based on geographical coverage, networks are classified into different Area
Networks: (fig3.1)
fig3.1
1. LAN
A Local Area Network (LAN) is a small network covering a limited area like a home, office,
school, or small business.
Uses of LAN:
-- Office networks
-- Schools, colleges
15
-- Cyber cafés
-- Home networks
2. MAN
A Metropolitan Area Network (MAN) covers a larger geographical area than LAN, such as a
city or campus.
Uses of MAN:
3. WAN
A Wide Area Network (WAN) connects multiple MANs and LANs over a large geographical
area, such as a country or the entire world.
Uses of WAN:
Devices Switch, Router, Access Routers, Fiber Optic Satellites, Leased Lines
Used Point Cables
Working :
1. Connecting Computers in a LAN
16
● Connect all computers to a network switch using Ethernet cables.
● Connect the switch to a router (if internet access is needed).
● Assign IP addresses manually (static IP) or enable DHCP (Dynamic Host
Configuration Protocol) on the router.
● Enable File & Printer Sharing on all computers.
● Test the connection by pinging other computers using the Command Prompt
(ping 192.168.1.x). (Refer fig3.2)
Fig3.2
17
fig 3.3
● Connect different MANs and LANs using ISP-provided leased lines, broadband,
or fiber connections.
● Use routers to route data between different locations.
● Implement MPLS (Multiprotocol Label Switching) for efficient data transmission.
● Set up VPNs (Virtual Private Networks) for secure remote connections.
● Monitor network performance using Network Management Tools. (Refer fig3.4)
Fig 3.4
Result :
● LAN is used for small networks like homes and offices.
18
● MAN is used for city-wide networks like government offices or campuses.
● WAN is used for global communication, connecting multiple LANs and MANs over
large distances.
19
20
PRACTICAL - 4
Aim : To Study the basic network commands and Network configuration commands.
Apparatus Required :
● A computer
● Internet or LAN connection
● Access to Terminal/Command Prompt
● (Optional) Router, Switch, Ethernet cables (if you want to test in a physical
LAN environment).
Theory:
Network commands are tools used to monitor, troubleshoot, and configure network
settings. They help in checking the status of a network, diagnosing problems, and
configuring devices for communication.
21
hostname Displays the name of the computer. hostname
ipconfig /renew Renews the IP address from DHCP server. ipconfig /renew
netsh Configures and manages network settings (IP, netsh interface ip set
firewall, etc.). address
ifdown / ifup Brings network interfaces down or up. ifdown eth0, ifup eth0
(Linux)
nmcli (Linux) Command-line tool for NetworkManager for nmcli device status
managing network connections.
Working :
( Few Comman Network Commands )
22
Approximate round trip times in milli-seconds:
Minimum = 6ms, Maximum = 17ms, Average = 10ms
C:\Users\MOHD FAIZAN>ipconfig
Windows IP Configuration
Windows IP Configuration
No operation can be performed on Local Area Connection* 1 while it has its media disconnected.
No operation can be performed on Local Area Connection* 2 while it has its media disconnected.
23
No operation can be performed on Bluetooth Network Connection 3 while it has its media
disconnected.
C:\Windows\System32>tracert www.microsoft.com
1 5 ms 4 ms 2 ms 192.168.1.1
2 * 7 ms 4 ms 100.63.0.1
3 7 ms * * 43.247.43.17
4 * 12 ms 8 ms 163.53.87.97
5 * * * Request timed out.
6 6 ms 4 ms 4 ms a23-211-226-110.deploy.static.akamaitechno logies.com
[23.211.226.110]
24
Trace complete.
C:\Windows\System32>route print
===========================================================================
Interface List
16...aa e2 91 28 41 b4.....Microsoft Wi-Fi Direct Virtual Adapter
19...aa e2 91 28 51 a4 ......Microsoft Wi-Fi Direct Virtual Adapter #2
5...a8 e2 91 28 61 94.....MediaTek Wi-Fi 6E MT7902 Wireless LAN Card
23...a8 e2 91 28 61 95.....Bluetooth Device (Personal Area Network) #3
1.....................Software Loopback Interface 1
===========================================================================
25
===========================================================================
Persistent Routes:
None
…..& more…..
Result :
● Basic network commands help to check connectivity and troubleshoot
network issues.
● These commands makes us easier to manage both small and large networks.
26
PRACTICAL - 5
Aim : To Configure a Network topology using packet tracer software.
Apparatus Required :
Theory:
Network Topology refers to the physical or logical layout of how computers, cables,
routers, switches, and other devices are connected together in a network.
1. Bus Topology
● A single cable acts as a backbone for the entire network.
● Devices tap into the cable to communicate.
● Advantages: Easy to install, low cost.
● Disadvantages: Cable failure leads to network failure; slow with heavy traffic.
2. Star Topology
● All devices are connected to a central hub or switch.
● Communication passes through the hub.
● Advantages: Easy to add new devices, centralized control.
● Disadvantages: Hub failure can bring down the network.
3. Ring Topology
● Devices are connected in a closed loop.
● Data travels in one direction (or two in dual-ring setups).
● Advantages: Good performance in heavy load.
● Disadvantages: Failure of a single device can break the loop.
4. Mesh Topology
● Every device connects directly to every other device.
27
● Offers multiple paths for data transmission.
● Advantages: Very reliable and robust.
● Disadvantages: Expensive and complex to set up.
5. Tree Topology
● Consists of groups of Star topologies connected to a main bus.
● Hierarchical structure (root node connected to branch nodes).
● Advantages: Scalable and easy to manage.
● Disadvantages: If the backbone cable breaks, sections may fail.
6. Hybrid Topology
● Combines two or more topologies (like Star + Mesh).
● Used in large networks for flexibility and performance.
● Advantages: Customized according to requirements.
● Disadvantages: Expensive and complex design.
Working :
# Basic Steps to Configure a Network Topology:
2. Select Devices
From the bottom menu, drag and drop devices:
3. Connect Devices
Choose the correct cable type:
Straight-through cable for different devices
. Cross-over cable for similar devices .
4. Assign IP Addresses
Click on each PC → go to Desktop → IP Configuration.
Assign an IP address and Subnet mask manually.
28
6. Test the Network
Use the ping command from one PC to another PC:
Open Command Prompt inside Packet Tracer (on PC).
Type: ping 192.168.1.11
If you get replies, the network is successfully configured!
Configuring Topologies :
A) Bus Topology :
B) Star Topology :
29
C) Ring Topology :
D) Mesh Topology :
30
E) Tree Topology :
F) Hybrid Topology :
31
Result :
● Packet Tracer is a virtual lab for practicing real-world network setups.
● Learned how devices are connected and how data flows in a network.
● Configured various Topologies and their features.
32
PRACTICAL - 6
Aim : To Configure a Network using Distance Vector Routing protocol.
Apparatus Required :
Theory:
Distance Vector Routing is a routing method where routers share information about
the entire network with their neighbors.
Each router tells its neighbors how far (in number of hops) the destination is.
RIP (Routing Information Protocol) is Most common basic Distance Vector Protocol.
Working :
2. Assign IP Addresses
Configure IP addresses on each router's interfaces.
Example on Router1:
enable
configure terminal
interface gig0/0
33
ip address 192.168.1.1 255.255.255.0
no shutdown
exit
interface gig0/1
ip address 10.0.0.1 255.255.255.252
no shutdown
exit
(Similar configuration on Router2)
4. Verify Configuration
Use these commands:
show ip route → To see the routing table.
show ip protocols → To confirm RIP is running.
Result :
34
#fig 6.1 RIP Distance Routing Algorithm Usage
35
Conclusion : We have Configured a Network using Distance Vector Routing
protocol Successfully.
36
PRACTICAL - 7
Aim : To Configure a Network using Link State Vector Routing protocol.
Apparatus Required :
Theory:
In Link State routing algorithm, routers build a complete map of the network and calculate
the best path themselves (using algorithms like Dijkstra's algorithm). Also call a OSPF (Open
Shortest Path First).
Working :
Sample layout:
PC1 ---- Router1 ---- Router2-----PC2
2. Assign IP Addresses
Example Addressing:
PC1: 192.168. 1.10/24
Router1 G0/0: 192.168. 1.1/24
Router1 G0/1: 10.0. 0.1/30
Router2 G0/0: 10.0. 0.2/30
Router2 G0/1: 192.168. 2.1/24
PC2: 192.168. 2.10/24
37
3. Configure IP on Routers
Router1 Configuration:
enable
configure terminal
interface gig0/0
ip address 192.168.1.1 255.255.255.0
no shutdown
exit
interface gig0/1
ip address 10.0.0.1 255.255.255.252
no shutdown
Exit
Router2 Configuration:
enable
configure terminal
interface gig0/0
ip address 10.0.0.2 255.255.255.252
no shutdown
exit
interface gig0/1
ip address 192.168.2.1 255.255.255.0
no shutdown
exit
5. Configure PCs
38
Set static IPs on PCs.
Set the Default Gateway of each PC to its router's IP address.
Result :
39
#Fig 7.2 : Simulation of Packet Deliver from PC1 to PC0
40
PRACTICAL - 8
Aim : To Perform File Transfer in Client & Server Using TCP/IP.
Apparatus Required :
OR
Theory:
TCP (Transmission Control Protocol) / IP (Internet protocol) ensures reliable
delivery of data from client to server. It is a set of communication rules (protocols)
that computers follow to talk to each other over a network, like the Internet.
● 👉 Server waits for a connection.
● 👉 Client connects to server and sends/receives files reliably over TCP.
In this experiment, we simulate how files are transferred over a TCP/IP network
"Client requests a file → Server sends it reliably using TCP connection."
Concept Meaning
41
Socket Programming endpoint for TCP communication
Working :
Steps:
1. Set up FTP Server on one PC:
i. Install FileZilla FTP Server.
ii. Create a user and share a folder.
2. Client PC:
a. Open Command Prompt.
b. Connect to server using:ftp [server IP
address] Example:
ftp 192.168.1.100
3. Login with username and password.
4. Use FTP commands:
ls → list files
get filename → download a file
put filename → upload a file
(This uses TCP Port 21 by default.)
2. Place Devices
Drag 2 PCs and 1 Switch onto the workspace.
3. Connect Devices
Use Copper Straight-Through cables to connect:
PC1 → Switch → PC2
4. Assign IP Addresses
Example:
PC1 → IP: 192.168.1.1, Subnet Mask: 255.255.255.0
PC2 → IP: 192.168.1.2, Subnet Mask: 255.255.255.0
(Set IP by clicking PC → Desktop → IP Configuration.)
42
5. Enable FTP Server
On PC1:
Go to Desktop → Services → FTP.
Turn FTP Service ON.
Add a user account and file to share.
7. Transfer Files
Use FTP commands:
ls → See files
get filename → Download file
put filename → Upload file
Result :
43
#Fig 8.2 : Saving a File “hello.txt” in PC1
44
#Fig 8.5 : Logging & Downloading a File “hello.txt” in PC1
45
#Fig 8.6 : Checking Directory in PC0
46