CN Assignment
CN Assignment
LAV Adapter:
1
Similar products, such as a wireless USB LAN Adapter are referred to as
LAN adapters.
ROUTERS:
Wireless Router:
2
SWITCHES:
EXPERIMENT:2
3
Familiarization with transmission media and tools: Coaxial cable, UTP
cable, Crimping tool, Connectors etc.
Transmission media refer to the physical pathways through which data is transmitted from
one device to another within a network. These pathways can be wired or wireless. The choice
of medium depends on factors like distance, speed, and interference.
Coaxial Cable:
The copper wiring used in now is co-axial cable (coax) the same type of wiring used for cable
TV.
UTP Cables:
4
It stands for Unshielded Twisted Pair. It consists of two insulated copper wires of thickness
1mm each. And UTP refers to a type of networking cable commonly used for Ethernet
Connection. UTP cable consist of pair of insulated copper wires that are twisted together in a
specific pattern. These cables are widely used for local area network for telephone
connections and other data transmission applications. They are twisted to each other to reduce
the electrical inference from the similar pair.
Crimping Tool:
Crimping is joining two pieces of metal or other malleable material by deforming one or both
of them to hold the other. The bend or deformity is called the crimp. Crimping is most
Extensively used in metalworking. Crimping is commonly used to join bullets to their
cartridge cases, for Rapid but lasting electrical connectors, securing lids on metal food cans,
and myriad other applications.
A special connector is used to join the metal together. The well joint properties are strong as
the parent materials when the tool works and offers some results which is known as crimp.
5
Connectors:
Connectors plays rolling radius industries and technologies facilitating the secure and reliable
of cables, wires, components, and devices. There are numerous type of connectors each
design for specific purpose and applications.
RJ45 connector: RJ45 connector have 8 pins and are used to connect computers, routers
switches, and the networking device to create local area network.
USB connector: Universal Serial Bus (USB) connectors are used to connect various
peripherals to computers and other devices.
HDMI connectors: High Definition Multimedia Interfaces (HDMI) connectors are used for
transmitting audio and video signal between devices like TV monitor projectors multimedia
sources such as computer and gaming consoles.
6
EXPERIMENT:3
Straight-through Cable:
Straight-through and crossover cables are two types of Ethernet cables used to connect
different network devices, such as computers, routers, switches, and hubs. The distinction
between these cables lies in the wiring arrangement of their connectors.
This type of cable is used when we connect dissimilar devices [switch and router, router and
hub, switch and PC, etc]. The colors of the wires and their respective pin numbers are
mentioned below:
Cross Cables:
7
This type of cable is used when we connect similar devices [router and router, switch and
switch, PC and PC, etc] and with some exceptions [switch and hub, Router and PC]. The
colors of the wires and their respective pin numbers are mentioned below:
EXPERIMENT: 4
8
Study of various LAN abilities and their creation using network devices cables and
computers.
Local Area Network (LAN) topologies refer to the ways in which network devices, cables,
and computers are interconnected to form a network within a limited geographical area, such
as a building or a campus. Different topologies offer various advantages and disadvantages in
terms of cost, scalability, reliability, and performance. Here are some common LAN
topologies and how they can be created using network devices, cables, and computers.
Geometric representation of how the computers are connected to each other is known as
topology. There are five types of topologies – Mesh, Star, Bus, Ring and Hybrid.
Bus Topology:
It comprises of stations that are connected to a single communication line. This single
communication line is referred to as Bus.
Ring Topology:
LAN that have each station attached to an adjacent station using point - to- point links
from physical ring.
Each station attached and active to the ring regenerates the information frame, then
re-transmit the information frame on the ring. The ring itself is logically circular and
flow of information is unidirectional.
9
Star Topology:
In star topology each device in the network is connected to a central device called
hub.
Star topology doesn’t allow direct communication between devices, a device must
have to communicate through hub.
If one device wants to send data to other device, it has to first send the data to hub and
then the hub transmit that data to the designated device.
Mesh Topology:
10
In mesh topology each device is connected to every other device on the network
through a dedicated point-to-point link. When we say dedicated it means that the link
only carries data for the two connected devices only. Lets say we have n devices in
the network then each device must be connected with (n-1) devices of the network.
Tree topology:
Is a special type of structure where many connected elements are arranged like the branches
of a tree.
In a tree topology, there can be only one connection between any two connected
nodes.
Tree topologies create a natural parent and child hierarchy.
11
EXPERIMENT: 5
Configuring TCP/IP protocols in both Windows and Linux involves setting up network
parameters to enable communication between devices on a network. TCP/IP (Transmission
Control Protocol/Internet Protocol) is the foundation of the modern internet and is used for
communication between computers and devices.
Here's a basic guide to configuring TCP/IP protocols in both Windows and Linux:
1. **Windows 10:**
2. **Windows 7:**
12
Select your network connection and click on the gear icon to access settings.
In the "IPv4" tab, choose "Manual" under "Method."
Enter the IP address, subnet mask, default gateway, and DNS server(s).
Click "Apply" to save the settings.
Open a terminal and edit the `/etc/network/interfaces` file using a text editor.
Configure the interface with the required parameters. Example:
```
auto eth0
address 192.168.1.2
netmask 255.255.255.0
gateway 192.168.1.1
Save the file and restart the networking service using `sudo service networking
restart`.
13
Always back up your configuration files before making changes.
In both Windows and Linux, the basic configuration involves setting the IP address, subnet
mask, default gateway, and DNS servers. These settings enable devices to communicate
within the network and access the internet.
14
EXPERIMENT:6
Implementing resource sharing, such as file and printer sharing, is a common practice in both
home and business networks. It allows multiple devices to access shared resources like files,
printers, and other peripherals. I'll provide a general guide on how to set up file and printer
sharing in Windows environments:
1. **Windows 10:**
2. **Windows 7:**
**Sharing Folders:**
15
Set permissions for the shared folder (Read, Write, etc.).
Click "OK" to save.
Remember to set appropriate permissions to control who can access shared resources. You
can also create user accounts on the sharing computer and grant access based on those
accounts. Additionally, for Linux, the process of sharing resources can be slightly different,
depending on the distribution you're using. File sharing can often be achieved using Samba,
which enables Linux systems to share files and printers with Windows systems. CUPS
(Common Unix Printing System) is commonly used for printer sharing. Keep in mind that
network security is essential when sharing resources. Always configure sharing permissions
carefully and consider using passwords and encryption to protect sensitive data.
16
EXPERIMENT: 7
Class A, B, and C networks are part of the IPv4 addressing scheme, defining ranges of IP
addresses for different types of networks. Here's a brief overview and steps to design and
implement them:
• Class A Network:
**Steps:**
1.Plan: Determine the number of subnets and hosts required. Class A provides a large
number of hosts per network.
2.Assign IP Range: Allocate a range within the Class A range for your network.
4.Configure Devices: Assign IP addresses to devices within each subnet. Configure routers
and switches accordingly.
• Class B Network:
**Steps:**
1.Plan:Determine the number of subnets and hosts required. Class B offers a balance
17
between hosts and network size.
2.Assign IP Range: Allocate a range within the Class B range for your network.
3.Subnetting: Subnet the network based on your needs. Class B allows for a moderate
number of hosts per subnet.
•Class C Network:
**Steps:**
1.Plan: Assess the number of subnets and hosts required. Class C provides fewer host
addresses but more networks.
2.Assign IP Range: Choose a range within the Class C range for your network.
3.Subnetting: Subnet the network according to your needs. Class C is often used for smaller,
departmental networks.
General Tips:
18
EXPERIMENT: 8
The process of subnetting involves dividing a network up into smaller networks called
subnets or sub networks. Each of these subnets has its own specific address. To create these
additional networks we use a subnet mask. The subnet mask simply determines which portion
of the IP address belongs to the host. The subnet address is created by dividing the host
address into network address and host address.
To start, you'll need to choose the right subnet mask, which determines the size of each
subnet. The most common ones are /24, /25, /26, etc. The smaller the number after the "/", the
more hosts you can have in a subnet .For example, a /24 subnet has 256 addresses, but when
you subtract the network address and broadcast address, you're left with 254 usable IPs. If
you go with a /26, you'd have 64 addresses, with 62 usable.
When planning, consider the number of hosts needed in each subnet and future growth. Also,
think about the physical layout of your network – different departments, floors, or even
buildings might warrant separate subnets The network address specifies the type of
subnetwork in the network and the host address specifies the host of that subnet. Subnets are
under local administration. As such, the outside world sees an organization as a single
network and has no detailed knowledge of the organization's intema1 structure. Subnetting
provides the network administrator with several benefits, including extra flexibility, more
efficient use of network address and the capability to contain broadcast traffic. A
given .network address can be broken up into may subnetworks. For example, 172.16.1.0,
172.16.2.0, 172.16.3.0 and 172.16.4.0 are all subnets within network 171.16.0.0.
***************************************************************************
Without subnets, the organization operates as a single network. These flat topologies result in
short routing tables but, as the network grows, the use of bandwidth becomes inefficient. (All
19
systems on the network receive all the broadcasts on the network.) Network addressing can
be made more efficient by breaking the addresses into smaller segments, or subnets.
Subnetting provides additional structure to an addressing scheme without altering the
addresses. In the figure, the network address 172.16.0.0 is subdivided into four subnets:
172.16.1.0, 172.16.2.0, 172.16.3.0, and 172.16.4.0. If traffic were evenly distributed to each
end station, the use of subnetting would reduce the overall traffic seen by each end station by
75 percent.
Subnet Mask
A subnet mask is a 32-bit value written as four octets. In the subnet mask, each bit determines
how the corresponding bit in the IP address should be interpreted (network, subnet, or host).
Although dotted decimal is the most common format, the subnet can be represented
inseveral ways:
20
The IP netmask-format command can be used to specify the format of network masks for the
current session. Dotted decimal is the default.
Each address class has a default subnet mask. The default subnet masks only the network
portion of the address, the effect of which is no subnetting. With each bit of subnetting
beyond the default, you can create 2n – 2 subnets. These examples show the effect of adding
subnet bits.
21
EXPERIMENT: 9
Right-click on the network adapter connected to the LAN and select "Properties."
In the list of items, find "Internet Protocol Version 4 (TCP/IPv4)" and select it. Click
on the "Properties" button.
In the properties window, select the option "Obtain an IP address automatically" and
"Obtain DNS server address automatically." Click "OK" to apply the changes.
Go back to the "Network and Sharing Center" and click on "Change adapter settings"
again.
Right-click on your network adapter and select "Status." Check the IPv4 address; it
should now be assigned dynamically.
Open a command prompt (`Win + R`, type `cmd`, and press Enter) and type
`ipconfig` to view the IP configuration. Ensure that the IPv4 address is assigned
dynamically (DHCP).
22
EXPERIMENT: 10
Use of commands like ping, ipconfig for trouble shooting network related
problems .
Troubleshooting network-related problems using the `ping` and `ipconfig` commands. We'll
assume you're using a Windows system.
Problem Description: You are experiencing connectivity issues on a computer in your LAN.
The user reports that they cannot access the internet.
**Steps to Troubleshoot:**
Open a command prompt (`Win + R`, type `cmd`, and press Enter).
Type `ipconfig` and press Enter to check the computer's IP configuration.
Verify that the IP address, subnet mask, gateway, and DNS servers are correctly
configured.
Type `ping <gateway_IP>` and press Enter (replace `<gateway_IP>` with the actual
IP address of your router or gateway).
If the pings are successful, it indicates that your computer can communicate with the
local network.
Type `ping 8.8.8.8` and press Enter (this is the IP address of Google's public DNS
server).
If the pings are successful, it indicates that your computer can reach external servers.
If not,
there might be an issue with the internet connection.
23
Step 4: DNS Resolution
Type `ping google.com` and press Enter. This checks if DNS resolution is working.
If the pings fail, there might be a DNS issue. Verify DNS server settings in the
network configuration.
Verify that there are no firewall rules blocking the connection. You can disable the
Ensure that cables are securely connected. If using Wi-Fi, check that you're connected
Type `ipconfig /all` to see detailed information about the network adapters, including
their status.
Note down the IP configuration, ping results, and any error messages. This
information will be helpful if you need to seek further assistance.
24
EXPERIMENT: 11
Hamming Distance
Hamming distance is a metric for comparing two binary data strings. While comparing two
binary strings of equal length, Hamming distance is the number of bit positions in which the
two bits are different.The Hamming distance between two strings, a and b is denoted as
d(a,b).It is used for error detection or error correction when data is transmitted over computer
networks. It is also using in coding theory for comparing equal length data words.
In order to calculate the Hamming distance between two strings, and , we perform their XOR
operation, (a⊕ b), and then count the total number of 1s in the resultant string.
Example
Suppose there are two strings 1101 1001 and 1001 1101.
11011001 ⊕ 10011101 = 01000100. Since, this contains two 1s, the Hamming
In a set of strings of equal lengths, the minimum Hamming distance is the smallest
Hamming distance between all possible pairs of strings in that set.
Example
Suppose there are four strings 010, 011, 101 and 111.
25
011 ⊕ 101 = 110, d(011, 101) = 2.
Code:
Output:
26
27
EXPERIMENT: 12
1. Install WinSCP:
Open WinSCP and enter the FTP server details (hostname, username, password,
port).
Communicating with Linux Red Hat Virtual Machine:
Install FTP Server on Linux: On your Red Hat Linux virtual machine, install an
FTP server. Configure FTP Server on Linux: Edit the vsftpd configuration file
(`/etc/vsftpd/vsftpd.conf`) to set up user access, security options, etc.
Start and Enable FTP Service:Start and enable the vsftpd service.
Open FTP Ports in Linux Firewall: Allow incoming connections on FTP ports in the
Linux firewall.
Find Linux Machine IP: Use `ifconfig` or `ip addr` to find the IP address of your
Linux machine.
28
Configure Connection: Enter the Linux machine's IP, username, password, and port in
WinSCP.
Connect: Click "Login" to establish a connection to the Linux machine.
Now, you should be able to transfer files between your Windows machine and the Red Hat
Linux virtual machine using WinSCP. Make sure to adjust security settings, user permissions,
and firewall rules based on your specific requirements and network setup.
29
EXPERIMENT: 13
1. Open Settings:
3. Proxy Settings:
30
Under the "Manual proxy setup" section, toggle the switch to turn on the manual
proxy configuration.
Enter the IP address and port number of your proxy server in the corresponding fields.
31
6. Save Changes:
Make sure to obtain the correct proxy server details from your network administrator or
service provider. If your proxy server requires authentication, you might need to enter your
username and password as well.
32
EXPERIMENT: 14
33
Cisco Packet Tracer
Cisco Packet Tracer is a dominant network simulation tool built by Cisco Systems. You can
make a simple or complex network inside the Packet tracer to create, plan, configure,
and test your network scenarios in a completely virtual ecosystem. This Network Simulation
tool allows users to create network topologies and imitate those in modern computer
networks. Packet Tracer is one of the most famous Networks Simulation software among
networking aspirants and beginners. It is used actively during the Cisco CCNA Certification
Training.
34
Putty
PUTTY is a completely free and open-source terminal emulator, serial console, and network
file transfer application. It supports several network protocols, including SCP, SSH, Telnet,
login, and raw socket connection.
Secure CRT
Secure CRT presents the capability to create an SSH connection with a dynamic port
forwarding configuration that can be used as a SOCKS proxy to reach all machines in a
remote network (behind the gateway). Using an SSH proxy, any application that is SOCKS 4
35
or 5 compatible (including other sessions established with secure CRT) will be able to have
their connections forwarded through this SSH SOCKS proxy and on to the desired
destination.
WIRESHARK
Wireshark is a free and open-source packet analyzer. Wireshark development project, started
by Gerald Combs in 1998, is today’s world’s foremost and widely-used network protocol
analyzer. It is used for network troubleshooting, interpretation, review, protocol development,
and education. Wireshark will also help you see what’s happening on your network at a
microscopic level.
Network Simulator-NS3
36
NS is a name for a series of discrete event network simulators, specifically ns-1, ns-2, and ns-
3. The Network Simulator -NS-3 is a discrete event simulator targeted at networking
research. Network Simulator -NS3 tool provides substantial support for simulation of TCP,
routing, and multicast protocols over wired and wireless (local and satellite) networks. It is
publicly available for research development, and use.
37