Sunteți pe pagina 1din 80

COMPUTER

NETWORKS
LAB
SUBMITTED TO
SUBMITTED BY
MRS. SAPNA JUNEJA
GAUTAM

KSHITIJ
CSE/14/109
1

14002001026

KSHITIJ GAUTAM CSE/14/109

Table of Contents
Table of Contents................................................................................................2
EXPERIMENT 1 WRITE SPECIFICATIONS OF LATEST LAPTOPS AND DESKTOPS. 4
SPECIFICATIONS OF LATEST DESKTOPS...........................................................5
SPECIFICATIONS OF LATEST LAPTOPS..............................................................7
EXPERIMENT 2 FAMILIARIZATION WITH NETWORKING COMPONENTS AND
DEVICES: LAN ADAPTERS, HUBS, SWITCHES AND ROUTERS..............................9
LAN Adapter..................................................................................................10
Wireless USB LAN adapter.............................................................................10
Network Hub..................................................................................................11
Network switch..............................................................................................11
Router............................................................................................................12
How Routers Works........................................................................................12
Advantages of Router....................................................................................13
EXPERIMENT 3 FAMILIARIZATION WITH TRANSMISSION MEDIA AND TOOLS:
CO-AXIAL CABLE, UTP CABLE, CRIMPING TOOL AND CONNECTORS.................14
What is transmission media?.........................................................................15
Types of Transmission Media.........................................................................15
Guided Transmission Media...........................................................................16
Types of Twisted Pair......................................................................................16
Advantage of STP over UTP...........................................................................17
Coaxial Cable.................................................................................................19
Fiber-Optics Cable..........................................................................................19
Unguided Transmission Media.......................................................................20
Radiowaves Transmission.............................................................................21
Microwave Transmission................................................................................21
InfraRed.........................................................................................................22
Crimping tool.................................................................................................22
RJ-45 Connecter.............................................................................................23
KSHITIJ GAUTAM CSE/14/109

BNC Connecter..............................................................................................24
EXPERIMENT 4 PREPARE STRAIGHT AND CROSS CABLES..............................25
Straight-Through Wired Cables......................................................................26
Crossover Wired Cables.................................................................................27
EXPERIMENT 5 STUDY VARIOUS LAN TOPOLOGIES AND THEIR CREATION
USING NETWORK DEVICES, CABLES AND COMPUTERS....................................28
Bus topology..................................................................................................29
Star topology.................................................................................................30
Ring Topology................................................................................................31
Mesh Topology...............................................................................................32
Tree Topology.................................................................................................33
Hybrid Topology.............................................................................................34
EXPERIMENT 6 CONFIGURATION OF TCP/IP PROTOCOLS IN WINDOWS AND
LINUX................................................................................................................36
Configuration of TCP/IP protocols in Windows XP & Windows 7.....................37
EXPERIMENT 7 IMPLEMENTATION OF FILE AND PRINTER SHARING................44
EXPERIMENT 8 INTRODUCTION AND OVERVIEW OF PACKET TRACER AND ITS
IDE....................................................................................................................49
EXPERIMENT 9 TO CONNECT DIFFERENT DEVICES AS IN A STAR TYPE
NETWORK USING A SWITCH AND HUB..............................................................56
EXPERIMENT 10 TO ESTABLISH A NETWORK CONNECTION BETWEEN TWO OR
MORE ROUTERS AND CONFIGURE THEM..........................................................60
EXPERIMENT 11 TO ESTABLISH A NETWORK CONNECTION BETWEEN TWO OR
MORE ROUTERS AND END DEVICES AND CONFIGURE THEM USING RIP..........63

KSHITIJ GAUTAM CSE/14/109

EXPERIMENT 1
WRITE
SPECIFICATIONS OF
LATEST LAPTOPS
AND DESKTOPS

KSHITIJ GAUTAM CSE/14/109

SPECIFICATIONS OF
LATEST DESKTOPS
Desktop Minimum
Expect to use the computer for basic productivity, running multiple
applications such as e-mail, web browsing, word processing, music and video
players, and photo organization.
Category

Description

Processor

Intel Core i5 3.20GHz, with


4M cache

Memory

At least 4GB RAM

Hard drive

At least 320GB SATA hard


disk (7200 RPM)

CD/DVD
drive

Dual Layer DVD+/-RW


Drive

Ethernet

10/100/1000 Mbps
(Gigabit) Ethernet

Monitor

22" LCD display, with


Energy-Star rating

Video
card/VRAM

128 MB video RAM

Ports

At least 3 USB 2.0 ports

Operating
system

Windows 7 64-bit
Professional

KSHITIJ GAUTAM CSE/14/109

Warranty

3 year onsite next


business day warranty

Desktop Power User


In addition to the tasks above, expect to resource intensive programs for
audio/video editing, graphic design, running multiple operating systems,
storing large multimedia files and other processor or storage intensive
situations or applications.
Category

Description

Processor

Intel Core i7 2.80GHz with


8M cache

Memory

6GB RAM

Hard drive

At least 1TB SATA hard disk


(7200 RPM)

CD/DVD
drive

Dual Layer DVD+/-RW Drive

Ethernet

10/100/1000 Mbps (Gigabit)


Ethernet

Monitor

At least 23" LCD display,


with Energy-Star rating

Video
card/VRAM

512MB video RAM

Ports

At least 4 USB 2.0 ports


(USB 3.0 preferred, where
available)

Operating
system

Windows 7 64-bit
Professional

Warranty

3 year onsite next business

KSHITIJ GAUTAM CSE/14/109

day warranty

SPECIFICATIONS OF
LATEST LAPTOPS
Laptop Minimum
Expect to use the computer for basic productivity, running multiple
applications such as e-mail, web browsing, word processing, music and video
players, and photo organization.
Category

Description

Processor

Intel Core i5 3.20GHz,


with 4M cache

Memory

At least 4GB RAM

Hard drive

At least 320GB SATA


hard disk (7200 RPM)

CD/DVD drive

Dual Layer DVD+/-RW


Drive

Ethernet

10/100/1000 Mbps
(Gigabit) Ethernet

Wireless

802.11 a/g/n (WPA2


Enterprise-compatible)

Video
card/VRAM

128 MB video RAM

Ports

At least 3 USB 2.0 ports

Battery

6-cell battery

KSHITIJ GAUTAM CSE/14/109

Integrated
fingerprint
reader

Wherever available (not


required for students)

Operating
system

Windows 7 64-bit
Professional

Laptop Power User


In addition to the tasks above, expect to resource intensive programs for
audio/video editing, graphic design, running multiple operating systems,
storing large multimedia files and playing games.
Category

Description

Processor

Intel Core i7 2.66 GHz


4M cache or faster

Memory

At least 4GB RAM

Hard drive

At least 500GB SATA


hard disk (7200 RPM)

CD/DVD drive

Dual Layer DVD+/-RW


Drive

Ethernet

10/100/1000 Mbps
(Gigabit) Ethernet

Wireless

802.11 a/g/n (WPA2


Enterprise-compatible)

Video
card/VRAM

256 MB video RAM

Ports

At least 3 USB 2.0 ports


(USB 3.0 preferred, if
available)

Battery

9-cell battery

KSHITIJ GAUTAM CSE/14/109

Integrated
fingerprint
reader

Wherever available (not


required for students)

Operating
system

Windows 7 64-bit
Professional

Warranty

3 year onsite next


business day warranty

KSHITIJ GAUTAM CSE/14/109

10

EXPERIMENT 2
FAMILIARIZATION
WITH NETWORKING
COMPONENTS AND
DEVICES: LAN
ADAPTERS, HUBS,
SWITCHES AND
ROUTERS
KSHITIJ GAUTAM CSE/14/109

11

LAN Adapter
An expansion board that is used to connect a computer or computing device to
a network. LAN
adapter is the most common and generic alternate name for a Network
Interface Card (NIC). However, many similar products, such as a Wireless USB
LAN Adapter is also called a LAN adapter.

Wireless USB LAN adapter


A high-speed wireless network card that is used to access a network through a
USB port on a computer or laptop. Most wireless USB LAN adapters look like
small USB flash drives and usually are based on the 802.11g standard which
provides a data rate up to 54-Mbps in a wireless LAN environment. Some
wireless USB LAN adapters may also support the 802.11b standard. A wireless
USB LAN adapter basically enables you to share files, folders, printers, other
network resources and Internet access.

KSHITIJ GAUTAM CSE/14/109

12

Network Hub
Definition: In computer networking, a hub is a small, simple, inexpensive
device that joins multiple computers together. Many network hubs available
today support the Ethernet standard. Other types including USB hubs also
exist, but Ethernet is the type traditionally used in home networking.
Technically speaking, two different types of hubs exist:
passive active
Passive hubs do not amplify the electrical signal of incoming packets before
broadcasting them out to the network. Active hubs, on the other hand, do
perform this amplification, as does a different type of dedicated network
device called a repeater. Some people use the terms concentrator when
referring to a passive hub and multiport repeater when referring to an active
hub.

Network switch
A network switch (sometimes known as a switching hub) is a computer
networking device that is used to connect devices together on a computer
KSHITIJ GAUTAM CSE/14/109

13

network. A switch is considered more advanced than a hub because a switch


will only send a message to the device that needs or requests it, rather than
broadcasting the same message out of each of its ports.[1]
A switch is a multi-port network bridge that processes and forwards data at the
data link layer (layer 2) of the OSI model. Some switches have additional
features, including the ability to route packets. These switches are commonly
known as layer-3 or multilayer switches.

Router
Router: Routers are devices (computers) containing software that help in
determining the best path out of the available paths, for a particular
transmission. They consist of a combination of hardware and software. The
hardware includes the physical interfaces to the various networks in the
internet work. The two main pieces of software in a router are the operating
system and the routing protocol.
Routers use logical and physical addressing to connect two or more logically
separate networks. They accomplish this connection by organizing the large
network into logical network segments or sub-networks. Each of these sub
networks is given a logical address. This allows the networks to be separate
but still access each other and exchange data when necessary. Data is
grouped into packets, or blocks of data. Each packet, in addition to having a
physical device address, has a logical network address.
Routers are frequently used to interconnect identical networks as well as
to interconnect networks with different types of hardware.

KSHITIJ GAUTAM CSE/14/109

14

How Routers Works


Routers are interconnectivity devices that are used to transfer the datum
packets along networks by visualizing the networks path. Routers visualizing
the networks path to many networks such as Electronic networks, Transport
networks and phone networks. Two ways are exist for routers operation using
either control plane or forwarding plane. In control plane the router sends the
precise data packets to their specific location. On the other hand in forwarding
plane router does not remember the sending or receiving information about
the packets.

Advantages of Router
Routers route the data in an organized way. Routers generate a reliable
connection between hosts. Routers is used for alternatively incase the main is
fail to transfer data.

KSHITIJ GAUTAM CSE/14/109

15

KSHITIJ GAUTAM CSE/14/109

16

EXPERIMENT 3
FAMILIARIZATION
WITH
TRANSMISSION
MEDIA AND TOOLS:
CO-AXIAL CABLE,
UTP CABLE,
CRIMPING TOOL
AND CONNECTORS
KSHITIJ GAUTAM CSE/14/109

17

KSHITIJ GAUTAM CSE/14/109

18

What is transmission
media?
Transmission media is a pathway that carries the information from sender to
receiver. We use different types of cables or waves to transmit data. Data
is transmitted normally through electrical or electromagnetic signals.
An electrical signal is in the form of current. An electromagnetic signal is series
of electromagnetic energy pulses at various frequencies. These signals can be
transmitted through copper wires, optical fibers, atmosphere, water and
vacuum Different Medias have different properties like bandwidth, delay, cost
and ease of installation and maintenance. Transmission media is also called
Communication channel.

Types of Transmission
Media
1. Wired or Guided Media or Bound Transmission Media
2. Wireless or Unguided Media or Unbound Transmission Media
Wired or Guided Media or Bound Transmission Media: Bound transmission
media are the cables that are tangible or have physical existence and are
limited by the physical geography. Popular bound transmission media in use
are twisted pair cable, co-axial cable and fiber optical cable. Each of them has
its own characteristics like transmission speed, effect of noise, physical
appearance, cost etc.
Wireless or Unguided Media or Unbound Transmission Media: Unbound
transmission media are the ways of transmitting data without using any
cables. These media are not bounded by physical geography. This type of
transmission is called Wireless communication. Nowadays wireless
communication is becoming popular. Wireless LANs are being installed in office
and college campuses. This transmission uses Microwave, Radio wave, Infra
red are some of popular unbound transmission media.

KSHITIJ GAUTAM CSE/14/109

19

Guided Transmission
Media
Types of Twisted Pair
The two types of twisted pairs are:
1. Unshielded twisted pair (UTP) ,2. Shielded twisted pair (STP)
1. Unshielded Twisted Pair (UTP)
It consists of colour-coded copper wires, but does not include any foil or
braiding as insulator to protect against interference.
Wire pairs within each cable have varied amounts of twists per foot to produce
cancellation. There are different categories of UTP.
The following table shows the UTP categories, the no. of pairs in each, and the
grade of cable each uses and how they are implemented.

KSHITIJ GAUTAM CSE/14/109

20

2. Shielded Twisted Pair (STP)


STP is made up of pairs of copper wires that are twisted together.
The pairs are covered in a foil or braided mesh, as well as outer PVC jacket.
This foil or mesh prevents the penetration of electromagnetic noise and
eliminate cross talk.
This shielding must be grounded to prevent the foil or braided mesh from
becoming a magnet for electricity.

KSHITIJ GAUTAM CSE/14/109

21

Advantage of STP over


UTP
STP is less susceptible to noise as compared to UTP and therefore reduces the
cross talk and interference.
Disadvantages of STP
1. It must be properly grounded.
2. It is more expensive than UTP.
3. It is difficult to terminate.
Advantages of Twisted pair cable
1. It can be used to carry both analog and digital data.
2. It is relatively easy to implement and terminate.
3. It is the least expensive media of transmission for short distances.
4. If portion of a twisted pair cable is damaged it does not effect the entire
network.
Disadvantages of Twisted pair cable
1. It offers poor noise immunity as a result signal distortion is more?
2. Attenuation is very high.
3. It supports lower bandwidth as compared to other Medias. It supports 10
mbps upto a distance of 100 meters on a 10BASE-T.
KSHITIJ GAUTAM CSE/14/109

22

4. It offers very poor security and is relatively easy to tap.


5. Being thin in size, they are likely to break easily.

Coaxial Cable
Coaxial cable has two wires of copper. The core wire lies in center and is made
of solid conductor. Core is enclosed in an insulating sheath. Over the sheath
the second wire is wrapped around and that too in turn encased by insulator
sheath. This all is covered by plastic cover.

Because of its structure coax cables are capable of carrying high frequency
signals than that of twisted pair cables. The wrapped structure provides it a
good shield against noise and cross talk. Coaxial cables provide high
bandwidth rates of up to 450 mbps.
There are three categories of Coax cables namely, RG-59 (Cable TV), RG-58
(Thin Ethernet)
and RG-11 (Thick Ethernet. RG stands for Radio Government.
Cables are connected using BNC connector and BNC-T. BNC terminator is used
to terminate the wire at the far ends.

Fiber-Optics Cable
KSHITIJ GAUTAM CSE/14/109

23

A cable with central glass tube covered with protective shield which
transmit data using photons is fiber optics cable. These cables transmit data
via concentrated bursts of laser beams which are carried through bundles of
hair thin glass fibers.
They have advantages over electronic cables in transmission speed and
volume. This technology has revolutionized telecommunication applications
which used electronic cables. Fiber optics cables as free from electro-magnetic
interference as well as wire tapping. fiber optics cable considered a broad band
communication channel

Unguided Transmission
Media
Unguided transmission media extend beyond the limiting confines of cabling.
They provide an excellent Communication Networks alternative for WANS. The
lack of physical restrictions provides larger bandwidth as well as wide area
capabilities. Unbound media typically operate at very high frequencies. The
three types of unbound transmission media are:
KSHITIJ GAUTAM CSE/14/109

24

Radio wave.

Micro wave.

KSHITIJ GAUTAM CSE/14/109

Infrared.

25

Radio-waves Transmission
Although Radio waves are prevalent and well understood, we are just
beginning to realize their enormous potential as a networking medium. Radio
waves can operate on a single or multiple frequency bands.

Radiowaves are omni directional i.e. they travel in all the directions from the
source. Because of this property, transmitter and receiver need not to be
aligned. Radiowaves can penetrate buildings easily, so they are widely use
for communication both indoors outdoors.
At high frequencies, radiowaves tends to travel in straight line and
bounce off the obstacles. They are also absorbed by rain. Radiowaves me
widely used for AM and FM radio, television, cordless telephone, cellular
phones, paging and wireless LAN.

Microwave Transmission
KSHITIJ GAUTAM CSE/14/109

26

Microwaves have been used in data communications for a long t ime.


They have a higher frequency than radio waves and therefore can handle
larger amounts of data.

Microwave transmission is line of sight transmission. The transmit station must


be in visible contact with the receive station. This sets a limit on the distance
between stations depending on the local geography. Typically the line of sight
due to the Earth's curvature is only 50 km to the horizon! Repeater stations
must be placed so the data signal can hop, skip and jump across the country.
microwave circuits considered a broad band communication channel.
Microwaves operate at high operating frequencies of 3 to 10 GHz. This allows
them to carry large quantities of data due to their large bandwidth.
List the Advantages of microwaves.
a. They require no right of way acquisition between towers.
b. They can carry high quantities of information due to their high operating
frequencies. c. Low cost land purchase: each tower occupies only a small area.
d. High frequency/short wavelength signals require small antennae.
Disadvantages of Microwaves
a. Attenuation by solid objects: birds, rain, snow and fog. b. Reflected from flat
surfaces like water and metal.
c. Diffracted (split) around solid objects.
d. Refracted by atmosphere, thus causing beam to be projected away from
receiver.

Infra-Red
Infrared offers a great unbound photonic solution. Like fiber-optic
cabling, infrared communications use light, so they are not bound by the
limitations of electricity.

Crimping tool
KSHITIJ GAUTAM CSE/14/109

27

A crimping tool is a tool designed to crimp or connect a connector to the end


of a cable. For example, network cables and phone cables are created using a
crimping tool to connect the RJ-45 and RJ-11 connectors to the end of the
cable. In the example below picture, this crimper is capable of crimping a RJ-11
(6-Pin) and RJ-45 (8-Pin) connectors and also includes a wire cutter near the
handles that can be used to cut phone or CAT5 cable.

KSHITIJ GAUTAM CSE/14/109

28

RJ-45 Connecter
The RJ-45 connector is a form of telephone connector. It sees its most
frequent use as a local- area network connector, and is frequently referred
to simply as an Ethernet connector.

KSHITIJ GAUTAM CSE/14/109

29

BNC Connecter
This connector is commonly used on a Token Ring network. BNC is also short
for Bayonet Nut Connector or British Naval/Navy Connector although more
appropriately known as the Bayonet Neill Concelman. In the picture to the
right, is an example of a BNC connector on the end of a coaxial cable.
BNC

BNC-T

KSHITIJ GAUTAM CSE/14/109

30

EXPERIMENT 4
PREPARE STRAIGHT
AND CROSS
CABLES

KSHITIJ GAUTAM CSE/14/109

31

Straight-Through Wired
Cables
Straight-Through refers to cables that have the pin assignments on each end
of the cable. In other words Pin 1 connector A goes to Pin 1 on connector B,
Pin 2 to Pin 2 ect. Straight-Through
wired cables are most commonly used to connect a host to client. When we
talk about cat5e
patch cables, the Straight-Through wired cat5e patch cable is used to connect
computers, printers and other network client devices to the router switch or
hub (the host device in this instance).

KSHITIJ GAUTAM CSE/14/109

32

Crossover
Wired Cables
An Ethernet crossover cable is a type of Ethernet cable used to connect
computing devices together directly. Normal straight through or patch cables
were used to connect from a host network interface controller (a computer or
similar device) to a network switch, hub or router. A cable with connections
that "cross over" was used to connect two devices of the same type: two
hosts or two switches to each other.

KSHITIJ GAUTAM CSE/14/109

33

KSHITIJ GAUTAM CSE/14/109

34

EXPERIMENT 5
STUDY VARIOUS
LAN TOPOLOGIES
AND THEIR
CREATION USING
NETWORK
DEVICES, CABLES
AND COMPUTERS.

KSHITIJ GAUTAM CSE/14/109

35

Types of Topology:-

Bus topology
Bus Topology is the simplest of network topologies. In this type of topology, all
the nodes (computers as well as servers) are connected to the single cable
(called bus), by the help of interface connectors. This central cable is the
backbone of the network and is known as Bus (thus the name). Every
workstation communicates with the other device through this Bus.

Advantages (benefits) of Bus Topology


1) It is easy to set-up and extend bus network.
2) Cable length required for this topology is the least compared to other
networks.
3) Bus topology costs very less.
4) Linear Bus network is mostly used in small networks. Good for LAN.
KSHITIJ GAUTAM CSE/14/109

36

Disadvantages (Drawbacks) of Bus Topology


1) There is a limit on central cable length and number of nodes that can be
connected.
2) Dependency on central cable in this topology has its disadvantages. If the
main cable (i.e. bus
) encounters some problem, whole network breaks down.
3) Proper termination is required to dump signals. Use of terminators is must.
4) It is difficult to detect and troubleshoot fault at individual station.
5) Maintenance costs can get higher with time.
6) Efficiency of Bus network reduces, as the number of devices connected to
it increases.
7) It is not suitable for networks with heavy traffic.
8) Security is very low because all the computers receive the sent signal from
the source.

Star topology
In Star topology, all the components of network are connected to the central
device called hub which may be a hub, a router or a switch. Unlike Bus
topology (discussed earlier), where nodes were connected to central cable,
here all the workstations are connected to central device with a point-to-point
connection. So it can be said that every computer is indirectly connected to
every other node by the help of hub.

Star Topology Diagram


Advantages of Star Topology
1) As compared to Bus topology it gives far much better performance, signals
dont necessarily
get transmitted to all the workstations.

KSHITIJ GAUTAM CSE/14/109

37

2) Easy to connect new nodes or devices. In star topology new nodes can be
added easily without affecting rest of the network. Similarly components can
also be removed easily.
3) Centralized management. It helps in monitoring the network.
4) Failure of one node or link doesnt affect the rest of network. At the same
time its easy to detect the failure and troubleshoot it.

KSHITIJ GAUTAM CSE/14/109

38

Disadvantages of Star Topology


1) Too much dependency on central device has its own drawbacks. If it fails
whole network goes down.
2) The use of hub, a router or a switch as central device increases the overall
cost of the network.
3) Performance and as well number of nodes which can be added in such
topology is depended on
capacity of central device.

Ring Topology
In Ring Topology, all the nodes are connected to each-other in such a way
that they make a closed loop. Each workstation is connected to two other
components on either side, and it communicates with these two adjacent
neighbors. Data travels around the network, in one
direction. Sending and receiving of data takes place by the help of TOKEN.

Advantages of Ring Topology

1) This type of network topology is very organized. Each node gets to send
the data when it receives an empty token. This helps to reduces chances of
collision. Also in ring topology all the traffic flows in only one direction at very
high speed.
2) Even when the load on the network increases, its performance is better
than that of Bus
topology.
KSHITIJ GAUTAM CSE/14/109

39

3) There is no need for network server to control the connectivity between


workstations.
4) Additional components do not affect the performance of network.
5) Each computer has equal access to resources.

KSHITIJ GAUTAM CSE/14/109

40

Disadvantages of Ring Topology


1) Each packet of data must pass through all the computers between source
and destination. This makes it slower than Star topology.
2) If one workstation or port goes down, the entire network gets affected.
3) Network is highly dependent on the wire which connects different
components.
4) MAUs and network cards are expensive as compared to Ethernet cards
and hubs.

Mesh Topology
In a mesh network topology, each of the network node, computer and other
devices, are interconnected with one another. Every node not only sends its
own signals but also relays data from other nodes. In fact a true mesh
topology is the one where every node is connected to every other node in the
network. This type of topology is very expensive as there are many redundant
connections, thus it is not mostly used in computer networks. It is commonly
used in wireless
networks. Flooding or routing technique is used in mesh topology.

Mesh Topology Diagram


Advantages of Mesh topology
1) Data can be transmitted from different devices simultaneously. This
topology can withstand high traffic.
2) Even if one of the components fails there is always an alternative present.
So data transfer
KSHITIJ GAUTAM CSE/14/109

41

doesnt get affected.


3) Expansion and modification in topology can be done without disrupting
other nodes.

KSHITIJ GAUTAM CSE/14/109

42

Disadvantages of Mesh topology

1) There are high chances of redundancy in many of the network connections.


2) Overall cost of this network is way too high as compared to other network
topologies.
3) Set-up and maintenance of this topology is very difficult. Even
administration of the network is tough.

Tree Topology
Tree Topology integrates the characteristics of Star and Bus Topology. Earlier
we saw how in Physical Star network Topology, computers (nodes) are
connected by each other through central hub. And we also saw in Bus
Topology, work station devices are connected by the common cable called
Bus. After understanding these two network configurations, we can
understand tree topology better. In Tree Topology, the numbers of Star
networks are connected using Bus. This main cable seems like a main stem of
a tree, and other star networks as the branches. It is also called Expanded
Star Topology. Ethernet protocol is commonly used in this type of topology. The
diagram below will make it clear.

Tree Topology
Advantages of Tree Topology

KSHITIJ GAUTAM CSE/14/109

43

1. It is an extension of Star and bus Topologies, so in networks where these


topologies can't be implemented individually for reasons related to scalabilit y,
tree topology is the best alternative.
2. Expansion of Network is possible and easy.
3. Here, we divide the whole network into segments (star networks), which
can be easily managed and maintained.
Disadvantages of Tree Topology
1. Because of its basic structure, tree topology, relies heavily on the main bus
cable, if it breaks whole network is crippled.
2. As more and more nodes and segments are added, the maintenance
becomes difficult.
3. Scalability of the network depends on the type of cable used.

Hybrid Topology
Before starting about Hybrid topology, we saw that a network topology is a
connection of various links and nodes, communicating with each other for
transfer of data. We also saw various advantages and disadvantages of Star,
Bus, Ring, Mesh and Tree topologies.
Now lets discuss what Hybrid Network topology is and why it finds its
application in Wide Area Networks. Hybrid, as the name suggests, is mixture
of two different things. Similarly in this type of topology we integrate two or
more different topologies to form a resultant topology which has good points
(as well as weaknesses) of all the constituent basic topologies rather than
having characteristics of one specific topology. This combination of topologies
is done according to the requirements of the organization.
For example, if there exists a ring topology in one office department while a
bus topology in another department, connecting these two will result in Hybrid
topology. Remember connecting two similar topologies cannot be termed as
Hybrid topology. Star-Ring and Star-Bus networks are most common examples
of hybrid network.
Let's see the benefits and drawbacks of this networking architecture

KSHITIJ GAUTAM CSE/14/109

44

Hybrid Network Topology Image


Advantages of Hybrid Network Topology

1) Reliable: Unlike other networks, fault detection and troubleshooting is easy


in this type of topology. The part in which fault is detected can be isolated
from the rest of network and required corrective measures can be taken,
WITHOUT affecting the functioning of rest of the network.
2) Scalable: Its easy to increase the size of network by adding new
components, without disturbing existing architecture.
3) Flexible: Hybrid Network can be designed according to the requirements of
the organization and by optimizing the available resources. Special care can
be given to nodes where traffic is high as well as where chances of fault are
high.
4) Effective: Hybrid topology is the combination of two or more topologies, so
we can design it in such a way that strengths of constituent topologies are
maximized while there weaknesses are neutralized. For example we saw Ring
Topology has good data reliability (achieved by use of tokens) and Star
topology has high tolerance capability (as each node is not directly connected
to other but through central device), so these two can be used effectively in
hybrid star-ring topology.
Disadvantages of Hybrid Topology

1) Complexity of Design: One of the biggest drawback of hybrid topology is its


design. Its not easy to design this type of architecture and its a tough job for
designers. Configuration and installation process needs to be very efficient.
2) Costly Hub: The hubs used to connect two distinct networks, are very
expensive. These hubs are different from usual hubs as they need to be
intelligent enough to work with different architectures and should be function
even if a part of network is down.
KSHITIJ GAUTAM CSE/14/109

45

3) Costly Infrastructure: As hybrid architectures are usually larger in scale,


they require a lot
of cables, cooling systems, sophisticate network devices, etc.

KSHITIJ GAUTAM CSE/14/109

46

EXPERIMENT 6
CONFIGURATION
OF TCP/IP
PROTOCOLS IN
WINDOWS AND
LINUX

KSHITIJ GAUTAM CSE/14/109

47

Configuration of TCP/IP
protocols in Windows XP
& Windows 7
For Windows XP
Step 1
Click Start->Control Panel->select and double click Network and internet
connections>select and double click Network Connections.
Step 2
Double-click the Local Area Connection icon; highlight Internet Protocol
(TCP/IP) tab in the
Local Area Connection Properties window that appears:

Step 3
Double click it or click Properties. The TCP/IP Properties window will display.
Step 4
Now you have two ways to configure the TCP/IP protocol below:
KSHITIJ GAUTAM CSE/14/109
48

1.
Assigned by DHCP Sever
Select Obtain an IP address automatically and Obtain DNS Server address
automatically, as shown in the figure below. These may be selected by
default. Then click OK to save setting.

2.
Assigned manually
1) Select Use the following IP address, as shown in the following figure.
If the routers LAN IP address is 192.168.1.1, please type in IP address
192.168.1.x x is from
2 to 253, subnet mask 255.255.255.0, and default gateway 192.168.1.1.
2) Select Use the following DNS server addresses, as shown in the following
figure. And then type the DNS server IP address, which should be provided by
your ISP. Finally remember to click OK to save settings.
Note: In most cases, type your local area DNS server IP addresses into it.
The Preferred DNS server is same to default gateway. For Secondary DNS
server, you could leave it blank or type in 8.8.8.8.

KSHITIJ GAUTAM CSE/14/109

49

Step 5
Click OK to save and apply your settings.
For Windows Vista & Windows 7
Step 1
Click on windows key+ R key on the keyboard at the same time.
Step 2
Type ncpa.cpl in the box, then press OK.

KSHITIJ GAUTAM CSE/14/109

50

Step 3
Select the local area connection, right click it and select Properties.

Step 4
Select Internet Protocol Version 4(TCP/IPv4), double click it or click Properties.

KSHITIJ GAUTAM CSE/14/109

51

Step 5
There are two ways to configure the TCP/IP Properties, Assigned by DHCP
server
automatically or manually.
1. Assigned by DHCP server
Select Obtain an IP address automatically and Obtain DNS server address
automatically. If necessary, then click OK to save the settings.

KSHITIJ GAUTAM CSE/14/109

52

2. Assigned manually
1) Select Use the following IP address, type IP address, subnet mask and
default gateway IP
address into it.
If the routers LAN IP address is 192.168.1.1, please type in IP address
192.168.1.x x is from
2 to 253, subnet mask 255.255.255.0, and default gateway 192.168.1.1.
2) Select Use the following DNS server addresses, as shown in the following
figure. And then type the DNS server IP address, which should be provided by
your ISP. If necessary, then click OK to save the settings.
Note: In most cases, type your local area DNS server IP addresses into it.
The Preferred DNS server is same to default gateway. For Secondary DNS
server, you could
leave it blank or type in 8.8.8.8.

KSHITIJ GAUTAM CSE/14/109

53

Step 6
Click OK to save and apply your settings
Configuration of TCP/IP protocols in Linux:This article covers the main TCP/IP network configuration files used by Linux to
configure various network services of the system such as IP Address, Default
Gateway, Name servers - DNS, hostname and much more. Any Linux
Administrator must be well aware where these services are configured and to
use them. The good news is that most of the information provided on this
article apply's to Red hat Fedora, Enterprise Linux, Ubunto and other similar
Linux distributions.
On most Linux systems, you can access the TCP/IP connection details within 'X
Windows' from Applications > Others > Network Connections. The same may
also be reached through Application > System Settings > Network >
Configure. This opens up a window, which offers configuration of IP
parameters for wired, wireless, mobile broadband, VPN and DSL connections:

KSHITIJ GAUTAM CSE/14/109

54

The Basic Commands for Networking


The basic commands used in Linux are common to every distro:
ifconfig - Configures and displays the IP parameters of a network interface
route - Used to set static routes and view the routing table
hostname - Necessary for viewing and setting the hostname of the system
netstat - Flexible command for viewing information about network
statistics, current connections, listening ports
arp - Shows and manages the arp table
ip - Multi-purpose command for viewing and setting TCP/IP parameters and
routes.
tc - Traffic control command, used for classifying, prioritizing, sharing, and
limiting both inbound and outbound traffic.

KSHITIJ GAUTAM CSE/14/109

55

EXPERIMENT 7
IMPLEMENTATION
OF FILE AND
PRINTER SHARING

KSHITIJ GAUTAM CSE/14/109

56

Instructions for Installing File and Printer Sharing in Windows XP


From the desktop on your PC, go to the Start Menu and right click on My
Network Places and select
Properties:

(If you do not have this screen, go to the Control Panel and selected
Network Connection.) You should have a screen similar to the following:

KSHITIJ GAUTAM CSE/14/109

57

Select Local Area Connection and right click and select Properties.

In the next diagram File and Printer Sharing for Microsoft Networks has already
been installed, on your screen it should not be listed, if it is, it is already
installed. Now hit the Install button.

KSHITIJ GAUTAM CSE/14/109

58

Now select Service form the list of component types and hit OK.

On the next screen select File and Printer Sharing for Microsoft Networks
and hit OK.
KSHITIJ GAUTAM CSE/14/109

59

File and Printer Sharing for Microsoft Networks should now be added to the
list. Hit Close to exit.

Reboot your computer.

KSHITIJ GAUTAM CSE/14/109

60

EXPERIMENT 8
INTRODUCTION
AND OVERVIEW
OF PACKET
TRACER AND ITS
IDE

KSHITIJ GAUTAM CSE/14/109

61

An Overview of the packet tracer IDE:

Menu Bar:

KSHITIJ GAUTAM CSE/14/109

62

The Main Toolbar:

Network Information:

The Common Toolbar:

KSHITIJ GAUTAM CSE/14/109

63

The Device-Type Selection Box:

Device-Specific Selection Box:

User-Created PDU List Window:

Scenario Box:

Logical Workspace:

KSHITIJ GAUTAM CSE/14/109

64

Switching between Logical/Physical Workspace:

Clock:

Physical Workspace:

KSHITIJ GAUTAM CSE/14/109

65

The Power Cycle Device Button:

Switching between Simulation/Realtimemode:

Simulation Mode:

KSHITIJ GAUTAM CSE/14/109

66

KSHITIJ GAUTAM CSE/14/109

67

EXPERIMENT 9
TO CONNECT
DIFFERENT
DEVICES AS IN A
STAR TYPE
NETWORK USING
A SWITCH AND
HUB
KSHITIJ GAUTAM CSE/14/109

68

Step 1:Place a few end devices in the Logical Workspace.

Step 2:Now place a switch in between these devices.

Step 3:Connect these end devices with the Switch using Copper StraightThrough Fast-Ethernet cables.

KSHITIJ GAUTAM CSE/14/109

69

Step 4: Assign IP addresses to all the end devices. (Class C IPs assigned
here)

Step 5: Send a simple ICMP packet using Add Simple PDU button from PC
8 to PC 4.

KSHITIJ GAUTAM CSE/14/109

70

Step 6: While under the Runtime mode we get a message as shown


below if the packet was sent successfully.

Step 7: While under the Simulation mode we can see the packet transfer
with our own controlled time.

KSHITIJ GAUTAM CSE/14/109

71

EXPERIMENT 10
TO ESTABLISH A
NETWORK
CONNECTION
BETWEEN TWO OR
MORE ROUTERS
AND CONFIGURE
THEM
KSHITIJ GAUTAM CSE/14/109

72

Step 1: Place 3 routers in the Logical Workspace and connect them with
Copper Cross-Over cables as shown.

Step 2:Open the IOS Command Line Interface and configure each port of
every router.
The following steps are taken to configure both ports of the router:

Router>en : used to enable the router port

Router#conf t : used to configure the terminal

Router(config)#int f0/1 : used for an interface

Router(config-if)#ip add (ip add)_(subnet mask) : to assign IP


address and subnet mask

Router(config-if)#no shut : states that port wont close

Router(config-if)#^Z : used to end the configuration

Router#wr : used to build the configuration

The commands depicted above are used as follows:

KSHITIJ GAUTAM CSE/14/109

73

Now, the Routers are configured completely and ping is 100% successful.

KSHITIJ GAUTAM CSE/14/109

74

EXPERIMENT 11
TO ESTABLISH A
NETWORK
CONNECTION
BETWEEN TWO OR
MORE ROUTERS
AND END DEVICES
AND CONFIGURE
THEM USING RIP
KSHITIJ GAUTAM CSE/14/109

75

Routing Information Protocol (RIP):


The RIP is an intradomain routing protocol used inside an autonomous
system. It is very simple protocol based on distance vector routing. RIP
implements distance vector directly with some considerations.
Step 1: Place the 2 Routers, 2 Switches and 2 End-Devices as shown
below.

Step 2:Connect the Routers & Switches to End-Devices as shown below


using Straight-through and cross-over cables.

KSHITIJ GAUTAM CSE/14/109

76

Step 3: Now, configure both Routers using IOS CLI for assigning them the
IP Addresses. The connections will become and the Ports will blink Green
as shown below.

Open cmd of any of the end device and ping the other end device.
The Ping would be 80% successful because the routers are not configured
with RIP command.
Step 4: Use the RIP(Routing Information Protocol) and configure the 2
routers by the following commands:

Router#conf t : used to configure the terminal

Router(config)#router rip: used for Routing Interface Protocol

Router(config-router)#ver 2 : used to select RIP version 2

Router(config-router)#network 20.1.1.0: specifying the network


range to apply the protocol to

Router(config-router)#^Z : used to end the configuration

Router#wr : used to build the configuration

KSHITIJ GAUTAM CSE/14/109

77

The commands depicted above are used as follows:

Step 5: Finally, Open cmd of any of the end device and ping the other end
device.
This time ping would be 100% successful.

KSHITIJ GAUTAM CSE/14/109

78

KSHITIJ GAUTAM CSE/14/109

79

***

KSHITIJ GAUTAM CSE/14/109

80

S-ar putea să vă placă și