Sunteți pe pagina 1din 18

LAB MANUAL

ON

COMPUTer network

UNIVERSAL COLLEGE OF ENGINEERING & TECHNOLOGY


Prepared By :-

SEMESTER:V

BRANCH: C.E.

Ms.Asha Patel Ms.Hiral Darji

Practical List
Sr. No 1 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. Aim
Study of Computer network and OSI model. Study of Transmission media use in computer network. Study of network devices.

SEMESTER:V

BRANCH: C.E.

Practical-1 AIM: - Study of Computer network and OSI model.


What can a Network do For You? Introduction A computer network can be two computers connected:

A computer network can also consist of, and is usually made for, more than two computers:

Characteristics of a Computer Network:

SEMESTER:V

BRANCH: C.E.

The primary purpose of a computer network is to share resources:


You can play a CD music from one computer while sitting on another computer You may have a computer with a CD writer or a backup system but the other computer doesnt have it; In this case, you can burn CDs or make backups on a computer that has one of these but using data from a computer that doesnt have a CD writer or a backup system You may have a computer that doesnt have a DVD player. In this case, you can place a movie DVD on the computer that has a DVD player, and then view the movie on a computer that lacks a DVD player You can connect a printer (or a scanner, or a fax machine) to one computer and let other computers of the network print (or scan, or fax) to that printer (or scanner, or fax machine) You can place a CD with pictures on one computer and let other computers access those pictures You can create files and store them in one computer, then access those files from the other computer(s) connected to it

Peer-to-Peer Networking

Based on their layout (not the physical but the imagined layout, also referred to as topology), there are two types of networks. A network is referred to as peer-to-peer if most computers are similar and run workstatio operating systems:

SEMESTER:V

BRANCH: C.E.

It typically has a mix of Microsoft Windows 9X, Me, Windows XP Home Edition, or Windows XP Professional (you can also connect a Novell SUSE Linux as part of a Microsoft Windows-based network; the current release of the operating system is really easily to install and made part of the network). In a peer-to-peer network, each computer holds its files and resources. Other computers can access these resources but a computer that has a particular resource must be turned on for other computers to access the resource it has. For example, if a printer is connected to computer A and computer B wants to printer to that printer, computer A must be turned On. Client/Server Networking

A computer network is referred to as client/server if (at least) one of the computers is used to "serve" other computers referred to as "clients". Besides the computers, other types of devices can be part of the network:

SEMESTER:V

BRANCH: C.E.

In a client/server environment, each computer still holds (or can still hold) its (or some) resources and files. Other computers can also access the resources stored in a computer, as in a peer-to-peer scenario. One of the particularities of a client/server network is that the files and resources are centralized. This means that a computer, the server, can hold them and other computers can access them. Since the server is always On, the client machines can access the files and resources without caring whether a certain computer is On.

Another big advantage of a client/server network is that security is created, managed, and can highly get enforced To access the network, a person, called a user must provide some credentials, including a username and a password. If the credentials are not valid, the user can be prevented from accessing the network. The client/server type of network also provides many other advantages such as centralized backup, Intranet capability, Internet monitoring, etc.

LAN Basics, MANs, WANs


LAN
High speed, data network over small region Few thousand meters Network technologies: Ethernet

SEMESTER:V

BRANCH: C.E.

Ethernet

FDDI Token ring Data link layer Packets routed based on physical address (MAC)

MAN
A Metropolitan Area Network (MAN) is a network that is utilized across multiple

buildings Commonly used in school campuses or large companies with multiple buildings Is larger than a LAN, but smaller than a WAN Is also used to mean the interconnection of several LANs by bridging them together. This sort of network is also referred to as a campus network

WAN
A Wide Area Network is a network spanning a large geographical area of around several

hundred miles to across the globe May be privately owned or leased Also called enterprise networks if they are privately owned by a large company It can be leased through one or several carriers (ISPs-Internet Service Providers) such as AT&T, Sprint, Cable and Wireless
Can be connected through cable, fiber or satellite

Is typically slower and less reliable than a LAN Services include internet, frame relay, ATM (Asynchronous Transfer Mode) Example of WAN application

SEMESTER:V

BRANCH: C.E.

SEMESTER:V

BRANCH: C.E.

The Open Systems Interconnection (OSI) model is a theoretical framework for understanding and explaining networking protocols Originally an effort by the ISO (International Standards Organization) to standardize network protocols TCP/IP became the dominant set of standards but the OSI model is widely used to help understand protocols The OSI model defines 7 layers of functional communications protocols.

SEMESTER:V

BRANCH: C.E.

Practical-2 AIM:- Study of Transmission media use in computer network.


Transmission media is divided into two category. 1) Guided media 2) Unguided media

Guided media:-

Twisted-pair cable

Consists of two insulated copper wires arranged in a regular spiral pattern to minimize the electromagnetic interference between adjacent pairs Often used at customer facilities and also over distances to carry voice as well as data communications Low frequency transmission medium

SEMESTER:V

BRANCH: C.E.

Shielded twisted-pair cable

We can be immune from lightning in a desert if we are sur-rounded by a metallic cover (inside a car, for example). The reason is that electromagnetic energy (lightning) canpenetrate insulators, but not metals. Lightning on a metallicshell creates a current on the outside surface, which can bedangerous; the inside is protected. Note that this phenomenon is opposite from what happens with electricity. The electrical current passes through a metal, but it is stopped by an insulator. Electromagnetic energy passes through an insulator, but is stopped by a metal. The same idea is used in shielded twisted-paircable.The shield is a metal that protects the cable from outside noise, electromagnetic interference.

Coaxial cable

Used for cable television, LANs, telephony Has an inner conductor surrounded by a braided mesh Both conductors share a common center axial, hence the term co-axial

Fiber Optic Cable


Relatively new transmission medium used by telephone companies in place of longdistance trunk lines Also used by private companies in implementing local data communications networks Require a light source with injection laser diode (ILD) or light-emitting diodes (LED)

SEMESTER:V

BRANCH: C.E.

Unguided Transmission media * terrestrial microwave * satellite microwave * broadcast radio * infrared * Wireless Examples *Terrestrial Microwave

o o o o o o

used for long-distance telephone service uses radio frequency spectrum, from 2 to 40 Ghz parabolic dish transmitter, mounted high used by common carriers as well as private networks requires unobstructed line of sight between source and receiver curvature of the earth requires stations (repeaters) ~30 miles apart

Satellite Microwave Applications Television distribution Long-distance telephone transmission Private business networks Microwave Transmission Disadvantages line of sight requirement expensive towers and repeaters subject to interference such as passing airplanes and rain

SEMESTER:V

BRANCH: C.E.

Satellite Microwave Transmission

a microwave relay station in space can relay signals over long distances geostationary satellites o remain above the equator at a height of 22,300 miles (geosynchronous orbit) o travel around the earth in exactly the time the earth takes to rotate Satellite Transmission Process

Satellite Transmission Applications television distribution o a network provides programming from a central location o direct broadcast satellite (DBS) long-distance telephone transmission o high-usage international trunks private business networks Fiber vs Satellite

SEMESTER:V

BRANCH: C.E.

Radio

radio is omnidirectional and microwave is directional Radio is a general term often used to encompass frequencies in the range 3 kHz to 300 GHz. Mobile telephony occupies several frequency bands just under 1 GHz.

Infrared Uses transmitters/receivers (transceivers) that modulate noncoherent infrared light. Transceivers must be within line of sight of each other (directly or via reflection ). Unlike microwaves, infrared does not penetrate walls.

SEMESTER:V

BRANCH: C.E.

Practical-3 AIM:- Study of network devices. REPEATER, HUB, BRIDGE AND SWITCH
Repeater

A repeater receives a signal, regenerates it, and passes it on. It can regenerate and retime network signals at the bit level to allow them to travel a longer distance on the media. It operates at Physical Layer of OSI The Four Repeater Rule for 10-Mbps Ethernet should be used as a standard when extending LAN segments. This rule states that no more than four repeaters can be used between hosts on a LAN. This rule is used to limit latency added to frame travel by each repeater. Hub

Hubs are used to connect multiple nodes to a single physical device, which connects to the network. Hubs are actually multiport repeaters. Using a hub changes the network topology from a linear bus, to a star.

SEMESTER:V

BRANCH: C.E.

With hubs, data arriving over the cables to a hub port is electrically repeated on all the other ports connected to the same network segment, except for the port on which the data was sent.

Bridge

Bridges are used to logically separate network segments within the same network. They operate at the OSI data link layer (Layer 2) and are independent of higher-layer protocols. The function of the bridge is to make intelligent decisions about whether or not to pass signals on to the next segment of a network. When a bridge receives a frame on the network, the destination MAC address is looked up in the bridge table to determine whether to filter, flood, or copy the frame onto another segment Broadcast Packets are forwarded

Switch

SEMESTER:V

BRANCH: C.E.

Switches are Multiport Bridges. Switches provide a unique network segment on each port, thereby separating collision domains. Today, network designers are replacing hubs in their wiring closets with switches to increase their network performance and bandwidth while protecting their existing wiring investments. Like bridges, switches learn certain information about the data packets that are received from various computers on the network. Switches use this information to build forwarding tables to determine the destination of data being sent by one computer to another computer on the network.

Hosts have direct connection to switch Full Duplex: No collisions Switching: A-to-A and B-to-B simultaneously, no collisions Switches can be cascaded to expand the network.

SEMESTER:V

BRANCH: C.E.

SEMESTER:V

BRANCH: C.E.

S-ar putea să vă placă și