









Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
record doc of the cn lab in the computer science
Typology: Exercises
1 / 16
This page cannot be seen from the preview
Don't miss anything!
EXP NO: 1(A) (^) Study of different types of network cables and practically implement cross wired cable and straight Date : through cable using clamping tool.
AIM : To study different types of network cables.
APPARATUS: Wires and cables, clamping tool, wire stripper (or) knife.
DESCRIPTION:
Networking cables are networking hardware used to connect one network device to other network devices or to connect two or more computers to share printers; scanners etc ...Electrical connections using twisted pair or coaxial cable are used within a building.
DIFFERENT TYPES OF CABLES:
UNSHIELDED TWISTED PAIR:
UTP is the most commonly used type of networking cable. UTP cables are often called "Ethernet cables" after Ethernet, the most common data networking standard that utilizes UTP cables, although not the most reliable. In contrast to FTP and STP cabling, UTP cable is not surrounded by any shielding. It is the primary wire type for telephone usage and is very common for computer networking, especially in patch cables or temporary network connections due to the high flexibility of the cables.
This cable has a conductive braided or foil casing for each pair and theoretically offers very good protection from interference and crosstalk. It was commonly used for token ring networks. Shielded Twisted Pair is rarely used due to the fact that the potential performance increase over UTP is not worth the much greater cost of STP. STP, which is limited to 100-meter lengths (the same as UTP), is used in token ring networks and for IBM mainframe and minicomputer environments. There is no standard for it.
Coaxial cable is an electrical cable consisting of a round conducting wire, surrounded by an insulating spacer, surrounded by a cylindrical conducting sheath, and usually surrounded by a final insulating layer. Most common use of coax (the short form of coaxial cable) today is in standard cable TV. If you have the chance to examine a cable, you will find that it has a fairly simple design. A copper conductor lies in the center of the cable, which is surrounded by insulation. A braided or mesh outer covering surrounds the insulation. This is also a conductor.
An optical fiber cable consists of a center glass core surrounded by several layers of protective material. Optical fiber deployment is more expensive than copper but offers higher bandwidth and can cover longer distances. There are two major types of optical fiber cables: shorter-range multi-mode fiber and long-range single-mode fiber.
A patch cable is an electrical or optical cable used to connect one electronic or optical device to another or to building
infrastructure for signal routing. Devices of different types (e.g. a switch connected to a computer, or a switch connected
A registered jack (RJ) is a standardized physical network interface for connecting telecommunications or data equipment. The physical connectors that registered jacks use are mainly of the modular connector and 50-pin miniature ribbon connector types. The most common twisted-pair connector is an 8-position, 8-contact (8P8C) modular plug and jack commonly referred to as an RJ45 connector.
EXP NO: 1(B) (^) Study of network devices and network IP in detail. Date :
AIM : To study different types of network devices.
Network devices are components used to connect computers or other electronic devices together so that they can share files or resources like printers or fax machines. Devices used to setup a Local Area Network (LAN) are the most common
A repeater operates at the physical layer. Its job is to regenerate the signal over the same network before the signal
becomes too weak or corrupted so as to extend the length to which the signal can be transmitted over the same network.
An important point to be noted about repeaters is that they do not amplify the signal. When the signal becomes weak, they
copy the signal bit by bit and regenerate it at the original strength. It is a 2 port device.
A hub is basically a multiport repeater. A hub connects multiple wires coming from different branches, for example, the connector in star topology which connects different stations. Hubs cannot filter data, so data packets are sent to all connected devices. In other words, collision domain of all hosts connected through Hub remains one. Also, they do not have intelligence to find out best path for data packets which leads to inefficiencies and wastage.
TYPES OF HUB:
■ Active Hub: These are the hubs which have their own power supply and can clean, boost and relay the signal along the network. It serves both as a repeater as well as wiring center. These are used to extend maximum distance between nodes. ■ Passive Hub: These are the hubs which collect wiring from nodes and power supply from active hub. These hubs relay signals onto the network without cleaning and boosting them and can’t be used to extend distance between nodes. BRIDGE :
A bridge operates at data link layer. A bridge is a repeater; with add on functionality of filtering content by reading the MAC addresses of source and destination. It is also used for interconnecting two LANs working on the same protocol. It has a single input and single output port, thus making it a 2 port device.
TYPES OF BRIDGES:
■ Transparent Bridges: These are the bridge in which the stations are completely unaware of the bridge’s existence i.e. whether or not a bridge is added or deleted from the network, reconfiguration of the stations is unnecessary. These bridges make use of two processes i.e. bridge forwarding and bridge learning. Source Routing Bridge: In these bridges, routing operation is performed by source station and the frame specifies
A switch is a multi port bridge with a buffer and a design that can boost its efficiency (large number of ports implies less traffic) and performance. Switch is data link layer device. Switch can perform error checking before forwarding data that makes it very efficient as it does not forward packets that have errors and forward good packets selectively to correct port only. In other words, switch divides collision domain of hosts, but broadcast domainremains same.
ROUTERS :
A router is a device like a switch that routes data packets based on their IP addresses. Router is mainly a Network Layer device. Routers normally connect LANs and WANs together and have a dynamically updating routing table based on which they make decisions on routing the data packets. Router divide broadcast domains of hosts connected through it.
A gateway, as the name suggests, is a passage to connect two networks together that may work upon different networking
models. They basically works as the messenger agents that take data from one system, interpret it, and transfer it to
another system. Gateways are also called protocol converters and can operate at any network layer. Gateways are
generally more complex than switch or router.
MODEMS: A modem is a hardware device that allows a computer to send and receive dataover a telephone line or a cable
or satellite connection. In the case of transmission over an analog telephone line, which was once the most popular way to
access the internet, the modem converts data between analog and digital formats in real time for two-way network
Date : CONNECT COMPUTERS IN LAN
AIM: To STUDY OF NETWORK IP AND PRACTICALLY CONNECT COMPUTERS IN LAN.
APPARATUS: Computer.
PROCEDURE:
CLASSIFICATION OF IP ADDRESS:
The below table says about how the ip addresses are classified and when they are used.
Class Address Range Supports Class A 1.0.0.1 to 126.255.255.254 Supports 16 million hosts on each of 127 networks. 128.1.0.1 to Class B 191.255.255.254 Supports 65,000 hosts on each of 16,000 networks. 192.0.1.1 to Class C 223.255.254.254 Supports 254 hosts on each of 2 million networks. 224.0.0.0 to Class D 239.255.255.255 Reserved for multicast groups. 240.0.0.0 to Class E 254.255.255.254 Reserved.
A sub network or subnet is a logical subdivision of a network. The practice of dividing a network into two or more networks is called sub netting. Computers that belong to a subnet are addressed with a common, identical, most- significant bit-group in their IP address. This results in the logical division of an IP address into two fields, a network or routing prefix and the "rest" field or host identifier. The rest field is an identifier for a specific host or network interface.
SUPERNETTING: Super netting, also called Classless Inter-Domain Routing (CIDR),is away to aggregate multiple Internet addresses of the same class. The original Internet Protocol (IP) defines IP addresses in four major classes of address structure, Classes A through D. Each class allocates one portion of the 32-bit Internet address format to a network address and the remaining portion to the specific host machines within the network. Super netting was created as a way to solve the problem of routing tables growing beyond the ability of current software and people to manage and to provide a solution to the exhaustion of Class B network address space.
On the host computer, follow these steps to share the Internet connection:
a modem, right-click the connection that you want under Dial-up / other network available.
Click the Advanced tab.
Internet connection check box.
my network attempts to access the Internet check box if you wantto permit your computer to automatically connect to
the Internet.
10.Click OK.
Date : NETWORK CONFIGURATION COMMANDS
AIM: To STUDY OF BASIC NETWORK COMMAND AND NETWORK CONFIGURATION COMMANDS.
DESCRIPTION:
IPCONFIG: The ip configuration command displays information about the host.
IPCONFIG/all: This command displays detailed configuration information about your TCP/IP connection including Router, Gateway, DNS, DHCP and type of Ethernet adapter in your system.
PING: Ping is the most basic TCP/IP command, and it’s the same as placing a phone call to your best friend. You pick up your telephone and dial a number, expecting your best friend to reply “hello”. The ping commands main purpose is to place a phone call to another computer on the network, and request an answer. Ping has 2 options it can use to place a phone call to another computer on network. It can use the computers name or IP address.
ROUTE: The route command displays the computers routing table. A typical computer, with a single network interface, connected to a LAN, with a router is fairly simple and generally doesn’t pose any network problems.
TRACERT : The tracert command displays a list of all the routes that a packet has to go through to get from the computer where traceart Is run to any other computer on the internet.
PATHPING: Pathping is unique to windows and is basically a combination of the ping and traceart commands. Pathping traces the routes to the destination address then launches a 25 second test of each router along the way.
Nslookup: nslookup command also uses to find out DNS related query.
IPCONFIG/release: This command helps solve problems with IP lease from the DHCP server.
Nbtstat-a: This command helps solve problems with NETBIOS name resolution.
(Nbt-NETBIOS over TCP/IP)
DIG: Dig ( domain information groper ) query DNS related information like A Record , CNAME , MX Record etc. This command mainly use to troubleshoot DNS related query.
HOST: host command to find name to IP or IP to name in IPv4 or IPv6 and also query DNS records.
ARP: ARP (Address Resolution Protocol) is useful to view / add the contents of the kernel’s ARP tables.
IP ADDRESS CONFIGURATION:
Take the following steps to configure the IP address of an interface.\
Step 1: Enter privileged EXEC mode:
Router> enable password
Step 2: Enter the configure terminal command to enter global configuration mode. Router# config
terminal
Step 3: Enter the interface type slot/port (for Cisco 7000 series) or interface type port (for Cisco 2500
series) to enter the interface configuration mode.
Example:
Router (config)# interface ethernet 0/
Step 4: Enter the IP address and subnet mask of the interface using the ip address ip address subnet mask command.
Example,
Router (config-if) # ip address 192.168.10.1 255.255.255.0 Step 5: Exit the
configuration mode by pressing Ctrl-Z Router(config-if) # [Ctrl-Z]
Advantages
Disadvantages :
MESH TOPOLOGY: In a mesh network topology, each of the network node, computer and other devices, are interconnected with one another. Every node not only sends its own signals but also relays data from other nodes.
ADVANTAGES
Set-up and maintenance of this topology is very difficult. Even administration of the network is tough.
It is called ring topology because it forms a ring as each computer is connected to another computer, with the last one connected to the first. Exactly two neighbors for each device.
ADVANTAGES
Failure of one computer disturbs the whole network
Star Topology