CND Practical 1 To 12
CND Practical 1 To 12
CND Practical 1 To 12
Aim:- Analyze the type of network topology used in your lab and prepare technical
specification for it.
In our lab we use bus topology. Bus Topology or Bus Network is one of simplest Type of
Network Topology. Bus Topology consists of a single central cable. This cable is referred
to Backbone Cable in Bus Topology. All the Computer Network Nodes
like Server, Client and Network Device are attached to the Backbone Cable with the help of
drop links. The Backbone Cable is of chief importance in this topology. So, any form of
damage to it can stop the communication in whole Computer Network.
The simplest example of this topology is connection of landline telephone. Suppose you have
a two-story house and you want landline connection on every floor. Now answer one question.
Will you apply for two landline connections? The answer is simply no. Because if you apply
for two separate connections, it will become costly for you. In fact, you will only apply for a
single landline connection. After connection, you will run a main landline cable from the pole
to the ground floor and from the ground floor to the first floor.
Bus Topology Concepts and Features
Basic concepts are the foundations of everything. But if you talk about technology, basic
concepts are vitally important. So, in this section, I am going to explain the basic concepts of
this topology. These concepts will help you in understanding the working of this topology.
Backbone Cable
Obviously, as I mentioned earlier that Backbone Cable is the main component behind the
working of Bus Topology. This is a main cable that serves as the backbone of the Network.
The name Backbone is given to it due to similarity with human backbone. The Backbone
Cable serves the purpose of transmitting signals across a Network as human backbone is
responsible for the communication of neurotransmitters. This is usually a heavy duty cable for
supporting reliable communication. However, the Backbone Cable requires great deal of care
and you have to look after it to save it from damage. Any kind of damage to it can put
whole Computer Network at stake. Whenever, the there is some form of damage to the cable,
communication through it stops.
Terminator
You cannot leave the end points of a Bus Network open. This is because of the fact that it will
cause signal reflection. A signal reflecting from the end point may interrupt with the signal
coming from the opposite end. In order to deal such a situation, you need to put a Terminator at
each end of the Backbone Cable. The Terminator simply absorbs the signals and prevents the
back reflection. So the major motive behind the use of Terminator is to make
the Network error free and reliable.
Drop Link
Another important concept in Bus Topology is Drop Link. Drop Link is like a patch cable that
creates a path for signals to travel. A Network Node attaches to the Backbone Cable through
the Drop Link. One end of the Drop Link connects to the Backbone while other end attaches
to a connector. This connector is plugged into Network Interface Card (NIC) of any Network
Device.
Node
Any Client, Server or any other Network Device that is a part of Computer Network is
basically a Node. A Node can play multiple roles and the decision of the role depends upon
the activity and responsibility. Following are the common roles of a Node:
Advantages
Makes it easy to establish and manage a small sized Computer Network.
This topology is flexible enough to add/remove Nodes.
It is less expensive form of Network Topology that requires least amount of cabling
and Network Devices.
Result:- In this practical we learn how to Analyze the type of network topology used in
your lab and prepare technical specification for it.
Practical-2
Aim:- Connect computers in bus topology and transfer the data.
Bus topology
A bus topology connects computers along a single or more cable to connect linearly as figure
1. A network that uses a bus topology is referred to as a "bus network" which was the original
form of Ethernet networks. Ethernet 10Base2 (also known as thinnet) is used for bus topology.
Bus topology is the cheapest way of connecting computers to form a workgroup or
departmental LAN, but it has the disadvantage that a single loose connection or cable break
can bring down the entire LAN. Termination is important issue in bus networks. The electrical
signal from a transmitting computer is free to travel the entire length of the cable. Without the
termination, when the signal reaches the end of the wire, it bounces back and travels back up
the wire.
WORKING
Suppose we have computer A, B, C, D. Each of them is connected with Node. Let us say
that Node A wants to send to another Node D, and there are Nodes B and C in between these
two. Here Node A will be Sender and Node D will be the receiver. The data message
from A will contain D as destination address. Due to the Broadcast Communication,
the Nodes B, C and D will receive the data message. Now, when Nodes B and C receive the
data message, these will check the destination address. Clearly, the destination address will
not be same at both locations B and C. So, both of these will discard the data message. But on
the Node D, the situation will be entirely different. The Node D will not discard the data
message as the destination address and Node address are same. So, the Node D will keep the
data message because it is the intended receiver.
Result:- In this practical we learn how to Connect computers in bus topology and
transfer the data.
Practical-3
Aim:- Connect computers in star topology and test the performance.
Star Topology
A star topology links the computers by individual cables to a central unit, usually a hub .When
a computer or other networking component transmits a signal to the network, the signal travels
to the hub. Then, the hub forwards the signal simultaneously to all other components connected
to the hub. Ethernet 10BaseT is a network based on the star topology. Star topology is the most
popular way to connect computers in a workgroup or departmental network.
Working
Working of Star Topology is really simple and straight forward to understand. In this Type of
Network Topology, there is no direct communication between different Nodes. Instead there
is a central device in the Network. This central device is responsible for receiving message
from the sender and transmit it to the receiver. As I have mentioned earlier that the central
device can be Passive Hub, Active Hub or a Switch. In each of the scenario, working of the
central device is little different. So according to working mechanism, we can divide Star
Topology in further three different types:
However, in all these three cases the Star Topology Layout is the same. What makes different
is the working mechanism of each one. Don`t get worried. I am going to explain each one in
detail in the coming section.
Result:- In this practical we learn how to connect computers in star topology and test
the performance.
PRACTICAL-4
Aim:- Install\Configure\Test Peer to Peer LAN and sharing of resource.
Peer-to-peer (P2P) computing or networking is a distributed application architecture that
partitions tasks or workloads between peers. Peers are equally privileged, equipotent
participants in the application. They are said to form a peer-to-peer network of nodes.
Peers make a portion of their resources, such as processing power, disk storage or network
bandwidth, directly available to other network participants, without the need for central
coordination by servers or stable hosts. Peers are both suppliers and consumers of resources,
in contrast to the traditional client–server model in which the consumption and supply of
resources is divided.
Result:- In this practical we learn how to Install\Configure\Test Peer to Peer LAN and
sharing of resource.
PRACTICAL-5
Aim:- Configure point to point network.
A Point-to-Point Connection is a private data connection securely connecting two or more
locations for private data services. A point-to-point connection is a closed network data
transport service which does not traverse the public Internet and is inherently secure with no
data encryption needed. Point to Point connections are available in a range of a bandwidth
speeds including point to point T1, point to point Ethernet or point to point DS3. A point-to-
point connection provides unparalleled quality of service (QoS) as it is not a shared service (a
private line) and follows the same direct network path every time. Point to Point links are used
by businesses to provide reliable, secure point to point network data service for applications
including credit card processing, file sharing, data backup, point to point VOIP, and video
conferencing. A point-to-point network can also be configured to carry voice, video, Internet,
and data services together over the same point to point connection. Point to Point circuits are
also known as a Point to Point Link, Private Line, Leased Line, or Data Line.
1. Select an unused LAN network connection from the available network connections on
your PC.
From the Start menu, select Settings -> Network Connections -> Local Area Connection.
3. In the Internet Protocol (TCP/IP) Properties window, configure the network for a
crossover connection.
a. Select the “Use the following IP address” option.
Do not use 192.168.0.1, since that address is the factory default PDU metering unit
address.
A patch cable, patch cord or patch lead is an electrical or optical cable used to connect ("patch
in") one electronic or optical device to another for signal routing. Devices of different types
(e.g., a switch connected to a computer, or a switch to a router) are connected with patch cords.
A patch cable, patch cord or patch lead is an electrical or optical cable used to connect ("patch
in") one electronic or optical device to another for signal routing. Devices of different types
(e.g., a switch connected to a computer, or a switch to a router) are connected with patch cords.
Crossover Cable
A Crossover cable is a type of CAT 5 where one end isT568A configuration and the other end
as T568BConfiguration. In this type of cable connection, Pin 1 is crossed with Pin 3, and Pin
2 is crossed with Pin 6.
Crossover cable is used to connect two or more computing devices. The internal wiring of
crossover cables reverses the transmission and receive signals. It is widely used to connect two
devices of the same type: e.g., two computers or two switches to each other.
In regard to physical appearance, Crossover Ethernet cables are very much similar to regular
Ethernet cables. Still, they are different with regard to the order with which the wires are
arranged. This type of Ethernet cable is made to connect to network devices of the same kind
over Ethernet directly. Crossover cables are mostly used to connect two hosts directly.
Here is an application where you should use Crossover Cable:
1. It can use a computer to a computer with no switch or hub.
2. Network devise to the network device. For example, the route to the router.
3. Crossover cable enables one to establish a direct connection between two computing
devices using Ethernet ports.
4. It Connects two computers directly.
5. You can connect two hubs/switches by using the normal port in both switches and hubs.
Result:- In this practical we learn how to prepare patch code and cross connection
cables use to connect the device to the LAN.
PRACTICAL-7
Hubs
Hubs are the simpler and cheaper of the two devices. A hub’s job is to take information coming
from the network and pass it to all other computers. It pays no attention to what computers on
the network the information is intended for; it simply passes everything it sees to everyone.
Switch
network switch is networking hardware that connects devices on a computer network by using
packet switching to receive and forward data to the destination device. A network switch is a
multiport network bridge that uses MAC addresses to forward data at the data link layer of the
OSI model.Switches are more intelligent. They can learn which information is destined for
which computers and pass information only to those computers rather than every machine on
a network. They tend to be slightly more expensive than hubs. A hub is fine for most small
home networks consisting of five or less computers. If you have more than five computers, or
there are heavy internet users (online gaming or streaming video, for example), a switch will
reduce the network load and significantly improve network response.
Whichever you choose, just make sure you pick one that has enough ports for every computer
you plan to connect to it.
Be certain that the address pool has enough addresses for all of the workstations. Make certain
that there are enough addresses outside of the range for any hosts that need static addresses.
For example, a network address with a mask of 255.255.255.0 has a total of 254 hosts. If the
dynamic pool has 200 addresses available, that means the remaining 54 addresses are available
to give printers or servers static addresses.
Result:- In this practical we learn how to using a Hub/Switch Install a LAN network
consisting of 6 computer.
PRACTICAL-8
Aim:- Locate the error bit in the given data stream by applying the different error detection
methods.
Introdcution
In digital systems, the analog signals will change into digital sequence (in the form of bits).
This sequence of bits is called as “Data stream”. The change in position of single bit also leads
to catastrophic (major) error in data output. Almost in all electronic devices, we find errors
and we use error detection and correction techniques to get the exact or approximate output.
What is an Error
The data can be corrupted during transmission (from source to receiver). It may be affected by
external noise or some other physical imperfections. In this case, the input data is not same as
the received output data. This mismatched data is called “Error”. The data errors will cause
loss of important / secured data. Even one bit of change in data may affect the whole system’s
performance. Generally the data transfer in digital systems will be in the form of ‘Bit –
transfer’. In this case, the data error is likely to be changed in positions of 0 and 1.
Types of Errors
In a data sequence, if 1 is changed to zero or 0 is changed to 1, it is called “Bit error”.There
are generally 3 types of errors occur in data transmission from transmitter to receiver.
• Single bit errors
• Multiple bit errors
• Burst errors
Burst Errors
The change of set of bits in data sequence is called “Burst error”. The burst error is calculated
in from the first bit change to last bit change.
Here we identify the error form fourth bit to 6th bit. The numbers between 4th and 6th bits are
also considered as error. These set of bits are called “Burst error”. These burst bits changes
from transmitter to receiver, which may cause a major error in data sequence. This type of
errors occurs in serial communication and they are difficult to solve.
Even Parity
If the data has even number of 1’s,the parity bit is 0. Ex: data is 10000001->parity bit 0
Odd number of 1’s, the parity bit is 1. Ex: data is 10010001 -> parity bit 1
Odd Parity
If the data has odd number of 1’s,the parity bit is 0. Ex: data is 10011101 -> parity bit 0
Even number of 1’s, the parity bit is 1. Ex: data is 10010101 -> parity bit 1
Result:- In this practical we learn how to locate the error bit in the given data stream
by applying the different error detection methods.
PRACTICAL-9
Aim :- Install and test router, repeater & Bridge.
Testing
When using a repeater the repeater usually will have the same SSID as your WiFi AP.
However, it will always have a different BSSID (think of it as of the MAC address of a
network interface).
So, in order to tell to which device you're connected, you have to find a way to display
the BSSID you're (currently) connected to. While I was able to find a command for
windows which will show you all the known BSSIDs of a SSID:
Bridge process
Download the Integration Bridge from Agile Manager and install it on a computer that
can access both Agile Manager and ALM.
If you are installing on a Windows operating system, install the bridge as a Windows
administrator user. You can run the bridge as a non-administrator user with the relevant
permissions.
Testing
The actual response of a bridge to loads is usually better than what the theory dictates .
Factors that contribute to the load capacity difference include unintended composite
action, load distribution effects, participation of parapets, railings, curbs, and utilities,
material property differences, unintended continuity, participation of secondary
members, effects of skew, portion of load carried by deck, and unintended arching
action due to frozen bearings.
Load testing is recommended by AASHTO as an “effective means of evaluating the
structural response of a bridge.”
The purpose of conducting load testing on existing bridges is to evaluate their structural
response without causing damages.
Therefore, load testing is usually conducted in a nondestructive manner and is
sometimes referred to as nondestructive load testing. The goal of this type of testing is
to compare field response of the bridge under test loads with its theoretical response .
RESULT:- In this practical we learn how to install and test router, repeater &
Bridge.
Practical-10
Aim:- Assign IP address to the PC connected to the internet.
What is an IP address?
An Internet Protocol (IP) address is a unique sequence of values separated by periods. Modern
IP addresses adhere to version 4 (IPv4) or version 6 (IPv6).
Example of an IPv4 address: 12.301.405.2
Example of an IPv6 address: 2001:0db8:5078:31c3:0000:0000:31fd:fe04
IP addresses are used to identify devices on a network. Private IP addresses are only visible to
devices connected to the same network, while public IP addresses are visible to any device on
the Internet.
Internet Service Providers (ISPs) assign public IP addresses to most routers. When a device
connects to a router, the device receives a private IP address.
Dynamic IP addresses
Every device connected to your home network is assigned a unique IP address. In most cases,
this is a dynamic IP address.
Dynamic IP addresses are temporary. When a new device joins a network, it is assigned a
dynamic IP address by a Dynamic Host Configuration Protocol (DHCP) server. The IP address
might change as additional devices join the network.
Dynamic IP addresses are useful for networks where IP addresses are limited and devices are
frequently added or removed.
Static IP addresses
A static IP address does not change. Static IP addresses are useful for hosting websites, sharing
large files, and remotely accessing devices or networks. Many businesses link their domain
name or server accounts to a static IP address.
Most users do not need to set a static IP address. However, advanced users and businesses
might benefit from a static IP address.
A static IP address is useful for hosting servers or websites and for sharing large files. For
more information about static and dynamic IP addresses.
To set a static IP address in Windows 7, 8, and 10:
1. Click Start Menu > Control Panel > Network and Sharing Center or Network and Internet
> Network and Sharing Center.
2. Click Change adapter settings.
3. Right-click on Wi-Fi or Local Area Connection.
4. Click Properties.
5. Select Internet Protocol Version 4 (TCP/IPv4).
6. Click Properties.
7. Select Use the following IP address.
8. Enter the IP address, Subnet mask, Default gateway, and DNS server.
9. Click OK.
Your computer displays a static IP address.
Then, grit your teeth and call your ISP. This is usually a pointless exercise, but every now and
again you can get useful information. Maybe it's not just you but your whole neighborhood
that's having problems because a back-hoe took out a cable. And, once in a blue moon, they'll
have a helpful suggestion. No, really! I've seen it happen!
If worst comes to the worst, they'll finally agree to send someone out to look at your setup.
Who knows, instead of one of your cables being disconnected, maybe one of their cables is
busted. Physical problems are often the root to network problems.
That was the good news. The bad news is I've never known an ISP technician to show up on
time. Be ready for a long, long wait. Eventually, if the problem is on their end -- and the key
word is eventually -- they'll get it fixed.
Let's say though that your internet is up and running, but it's being a little flaky. Here's what
you do.
First, let's see if you're getting the bandwidth you're paying for. The best site to check on your
current real speed is Speed test. This site is run by Ookla., a network performance company.
It gives you your download speed, upload speed, and ping to the closest test.
1. Click Configure Internet (if not configured at all), Add (for another internet
connection), or Edit.
Configuration tab
Note - When you change the connection type, the appliance may disconnect from the internet.
Connection name - Enter a name for the connection or leave the default "InternetN"
label (where N indicates an incrementing number).
Interface name
WAN or DMZ is for most types of Internet connections.
LAN. You can also use unassigned LAN ports with no VLANs for internet connections.
When you delete the internet connection, the port reverts to an unassigned LAN.
Link aggregation (Bond) - Create a link between two or more interfaces. This
improves performance and redundancy by increasing the network throughput and
bandwidth.
ADSL/VDSL. If you select the ADSL/VDSL interface, you must select one of these for
the connection type: PPPoE, IPoE - static IP, or IPoE - dynamic IP.
You can create a maximum of 32 internet connections. This includes alias IP connections.
Note - If you remove or disable a LAN, any assigned alias IPs are also removed.
Unassigned LAN ports use case - If your company is in a region where internet connections
supplied by ISPs are unreliable and experience multiple disconnections, you can connect your
appliances to multiple internet connections from different ISPs.
Aim:- Use FTP protocol to transfer file from one system to another system.
How to Use FTP to Transfer Files Between Servers and Local Machines
The File Transfer Protocol (FTP) is a set of rules that computers on a network use to
communicate with one another. The tool allows users to transfer files over networks such as
the internet. This article explains how to;
1. Username and password Login: This is a restrictive method where only users with an account
can access the server. This is common when there is a need for users to upload or download
files to and from the server.
2. Username only: Some sites only require a username to access. However, this will only allow
downloads and not uploads
3. Anonymous FTP access: This does not require the user to enter a username or password and is
the easiest. The access is usually for sites where users can only download files such as forms,
software, and others.
3. Type in the username and password for your new account in the Log In and Password boxes.
If you have several domains in your cPanel account, ensure that you select the correct one
where you want the FTP account
4. Type in a directory if you want different one from the default
5. Specify the disk space if you want something different from the default 2000MB. You can
either type in the disk space, or select unlimited at the Quota section at the bottom.
6. Click Create FTP Account.
Different Methods of Using FTP to Transfer FIles
The three common methods are
Web browser: Does not require a client and works directly from the browser, most used for
downloading files from the server.
Command line FTP: All major operating systems have FTP client’s functionality available
as a command line.
A GUI FTP client: These are usually easy-to-use third party application that allows users to
connect and transfer files over FTP.
Result:- In this practical we learn how to use FTP protocol to transfer file from one
system to another system.