0% found this document useful (0 votes)
33 views

CN Assignment

Uploaded by

mohammadwasif785
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views

CN Assignment

Uploaded by

mohammadwasif785
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 37

EXPERIMENT 1:

Familiarization with networking components and devices: LAN


Adapters, Hubs, Switches, Routers etc.
HUB:

 A hub is a network hub used for connection of devices in a network.


 It connects several devices in a LAN. All the devices in the network
connection is connected through hub that acts as a central connection for
all the devices.
 There are many ports in it and if a packet arrives only at one port, it is
copied so that all the ports can see the packets. This helps if there is any
trouble in one port of the hub.
 The three types are active, passive and intelligent.
 Active hubs amplify the incoming electric signal whereas passive hubs do
not amplify the electric signal. Intelligent hubs are kind of active hubs.

LAV Adapter:

 A LAN adapter is an expansion board that is used to connect a computer


or computing device to a network.
 LAN adapter is the most common and generic alternate name for a
Network Interface Card(NIC).

1
 Similar products, such as a wireless USB LAN Adapter are referred to as
LAN adapters.

ROUTERS:

 Routers are networking devices operating at layer 3 or a network layer of


the OSI model.
 They are responsible for receiving, analysing, and forwarding data packets
among the connected computer networks.
 When a data packet arrives, the router inspects the destination address,
consults its routing tables to decide the optimal route and then transfers the
packet along this route.

Wireless Router:

2
SWITCHES:

 A switch is a data link layer networking device which connects devices in


a network and uses packet switching to send and receive data over the
network.
 Like a hub, a switch also has many ports, to which computers are plugged
in. However, when a data frame arrives at any port of a network switch, it
examines the destination address and sends the frame to the corresponding
device(s). Thus, it supports both unicast and multicast communications.

EXPERIMENT:2
3
Familiarization with transmission media and tools: Coaxial cable, UTP
cable, Crimping tool, Connectors etc.

Transmission media refer to the physical pathways through which data is transmitted from
one device to another within a network. These pathways can be wired or wireless. The choice
of medium depends on factors like distance, speed, and interference.

Coaxial Cable:

The copper wiring used in now is co-axial cable (coax) the same type of wiring used for cable
TV.

 It provides even more protection from interference than twisted pair.


 Instead of twisting the wires around one another to limit interference, a coaxial cable
consists of a single wire surrounded by a heavier metal shield.
 In coaxial cable it forms a flexible cylinder around the inner wire that provides a
barrier to electromagnetic radiation.

UTP Cables:

4
It stands for Unshielded Twisted Pair. It consists of two insulated copper wires of thickness
1mm each. And UTP refers to a type of networking cable commonly used for Ethernet
Connection. UTP cable consist of pair of insulated copper wires that are twisted together in a
specific pattern. These cables are widely used for local area network for telephone
connections and other data transmission applications. They are twisted to each other to reduce
the electrical inference from the similar pair.

Crimping Tool:

Crimping is joining two pieces of metal or other malleable material by deforming one or both
of them to hold the other. The bend or deformity is called the crimp. Crimping is most
Extensively used in metalworking. Crimping is commonly used to join bullets to their
cartridge cases, for Rapid but lasting electrical connectors, securing lids on metal food cans,
and myriad other applications.

A special connector is used to join the metal together. The well joint properties are strong as
the parent materials when the tool works and offers some results which is known as crimp.

5
Connectors:

Connectors plays rolling radius industries and technologies facilitating the secure and reliable
of cables, wires, components, and devices. There are numerous type of connectors each
design for specific purpose and applications.

Some of connectors are:

RJ45 connector: RJ45 connector have 8 pins and are used to connect computers, routers
switches, and the networking device to create local area network.

USB connector: Universal Serial Bus (USB) connectors are used to connect various
peripherals to computers and other devices.

HDMI connectors: High Definition Multimedia Interfaces (HDMI) connectors are used for
transmitting audio and video signal between devices like TV monitor projectors multimedia
sources such as computer and gaming consoles.

6
EXPERIMENT:3

Preparing straight and cross cables.

Straight-through Cable:

Straight-through and crossover cables are two types of Ethernet cables used to connect
different network devices, such as computers, routers, switches, and hubs. The distinction
between these cables lies in the wiring arrangement of their connectors.

This type of cable is used when we connect dissimilar devices [switch and router, router and
hub, switch and PC, etc]. The colors of the wires and their respective pin numbers are
mentioned below:

 Green [Pin 1] Green [Pin 1]


 White Green [Pin 2] White Green [Pin 2]
 White Orange [Pin 3] White Orange [Pin 3]
 Blue [Pin 4] Blue [Pin 4]
 White Blue [Pin 5] White Blue [Pin 5]
 Orange [Pin 6] Orange [Pin 6]
 White Brown [Pin 7] White Brown [Pin 7]
 Brown [Pin 8] Brown [Pin 8]

Cross Cables:

7
This type of cable is used when we connect similar devices [router and router, switch and
switch, PC and PC, etc] and with some exceptions [switch and hub, Router and PC]. The
colors of the wires and their respective pin numbers are mentioned below:

 White orange [Pin 1] White Green [Pin 1]


 Orange [Pin 2] Green [Pin 2]
 White Green [Pin 3] White Orange [Pin 3]
 Blue [Pin 4] White Brown [Pin 4]
 White Blue [Pin 5] LiBrown [Pin 5]
 Green [Pin 6] Orange [Pin 6]
 White Brown [Pin 7] Blue [Pin 7]
 Brown [Pin 8] White Blue [Pin 8]

EXPERIMENT: 4

8
Study of various LAN abilities and their creation using network devices cables and
computers.

Local Area Network (LAN) topologies refer to the ways in which network devices, cables,
and computers are interconnected to form a network within a limited geographical area, such
as a building or a campus. Different topologies offer various advantages and disadvantages in
terms of cost, scalability, reliability, and performance. Here are some common LAN
topologies and how they can be created using network devices, cables, and computers.

Geometric representation of how the computers are connected to each other is known as
topology. There are five types of topologies – Mesh, Star, Bus, Ring and Hybrid.

Bus Topology:

 It comprises of stations that are connected to a single communication line. This single
communication line is referred to as Bus.

Ring Topology:

 LAN that have each station attached to an adjacent station using point - to- point links
from physical ring.
 Each station attached and active to the ring regenerates the information frame, then
re-transmit the information frame on the ring. The ring itself is logically circular and
flow of information is unidirectional.

9
Star Topology:

 In star topology each device in the network is connected to a central device called
hub.
 Star topology doesn’t allow direct communication between devices, a device must
have to communicate through hub.
 If one device wants to send data to other device, it has to first send the data to hub and
then the hub transmit that data to the designated device.

Mesh Topology:

10
 In mesh topology each device is connected to every other device on the network
through a dedicated point-to-point link. When we say dedicated it means that the link
only carries data for the two connected devices only. Lets say we have n devices in
the network then each device must be connected with (n-1) devices of the network.

Tree topology:

Is a special type of structure where many connected elements are arranged like the branches
of a tree.

 In a tree topology, there can be only one connection between any two connected
nodes.
 Tree topologies create a natural parent and child hierarchy.

11
EXPERIMENT: 5

Configuration of TCP/IP Protocol in Windows and Linux.

Configuring TCP/IP protocols in both Windows and Linux involves setting up network
parameters to enable communication between devices on a network. TCP/IP (Transmission
Control Protocol/Internet Protocol) is the foundation of the modern internet and is used for
communication between computers and devices.

Here's a basic guide to configuring TCP/IP protocols in both Windows and Linux:

**Configuring TCP/IP in Windows:**

1. **Windows 10:**

 Open "Settings" and navigate to "Network & Internet."


 Click on "Ethernet" or "Wi-Fi," depending on your connection type.
 Click on the connected network and select "Change adapter options."
 Right-click on your network adapter and choose "Properties."
 Select "Internet Protocol Version 4 (TCP/IPv4)" and click on "Properties."
 Choose "Use the following IP address" and enter the IP address, subnet mask, default
gateway, and preferred DNS server.
 Click "OK" to save the settings.

2. **Windows 7:**

 Open the "Control Panel" and go to "Network and Sharing Center."


 Click on "Change adapter settings."
 Right-click on your network adapter and select "Properties."
 Select "Internet Protocol Version 4 (TCP/IPv4)" and click on "Properties."
 Choose "Use the following IP address" and enter the IP address, subnet mask, default
gateway, and preferred DNS server.
 Click "OK" to save the settings.

**Configuring TCP/IP in Linux:**

1.**Ubuntu (using NetworkManager):**

 Open "Settings" and navigate to "Network."

12
 Select your network connection and click on the gear icon to access settings.
 In the "IPv4" tab, choose "Manual" under "Method."
 Enter the IP address, subnet mask, default gateway, and DNS server(s).
 Click "Apply" to save the settings.

2. **Ubuntu (using /etc/network/interfaces):**

 Open a terminal and edit the `/etc/network/interfaces` file using a text editor.
 Configure the interface with the required parameters. Example:

```

auto eth0

iface eth0 inet static

address 192.168.1.2

netmask 255.255.255.0

gateway 192.168.1.1

 Save the file and restart the networking service using `sudo service networking
restart`.

3. **CentOS (using Network Manager):**

 Open the "Settings" menu and navigate to "Network."


 Select your network connection and click on the gear icon to access settings.
 Configure the IPv4 settings as described above for Ubuntu.

4. **CentOS (using /etc/sysconfig/network-scripts):**

 Edit the appropriate interface file in the `/etc/sysconfig/network-scripts/` directory


(e.g.,
 `ifcfg-eth0`).
 Configure the settings similar to the Ubuntu example above.
 Save the file and restart networking using `sudo systemctl restart network`.
 Remember that the specifics may vary slightly depending on the Linux distribution
you are using.

13
 Always back up your configuration files before making changes.

In both Windows and Linux, the basic configuration involves setting the IP address, subnet
mask, default gateway, and DNS servers. These settings enable devices to communicate
within the network and access the internet.

14
EXPERIMENT:6

Implementation of resource sharing (file, printer etc) ?

Implementing resource sharing, such as file and printer sharing, is a common practice in both
home and business networks. It allows multiple devices to access shared resources like files,
printers, and other peripherals. I'll provide a general guide on how to set up file and printer
sharing in Windows environments:

**Setting Up File Sharing:**

1. **Windows 10:**

 Open "Settings" and go to "Network & Internet."


 Click "Sharing options."
 Turn on "Network discovery" and "File and printer sharing."
 Under "All Networks," select "Turn on sharing so anyone with network access can
read and
 write files in the Public folders."
 Save changes.

2. **Windows 7:**

 Open the "Control Panel" and go to "Network and Sharing Center."


 Click on "Change advanced sharing settings."
 Enable "Turn on network discovery" and "Turn on file and printer sharing."
 Save changes.

**Sharing Folders:**

1. **Windows 10 and 7:**

 Right-click on the folder you want to share, then select "Properties."


 Go to the "Sharing" tab.
 Click "Advanced Sharing."
 Check "Share this folder" and give the share a name.

15
 Set permissions for the shared folder (Read, Write, etc.).
 Click "OK" to save.

**Setting Up Printer Sharing:**

1. **Windows 10 and 7:**

 Connect the printer to one of the computers on the network.


 Open "Control Panel" > "Devices and Printers."
 Right-click on the printer you want to share and select "Printer properties."
 Go to the "Sharing" tab.
 Check "Share this printer" and give it a share name.
 Click "OK" to save.

**Accessing Shared Resources:**

1. **Windows 10 and 7:**

 Open "File Explorer."


 In the address bar, type `\\computername` (replace "computername" with the name of
the computer sharing the resources).
 Press Enter to access shared folders on that computer.
 For printers, they should appear in the "Devices and Printers" section.

Remember to set appropriate permissions to control who can access shared resources. You
can also create user accounts on the sharing computer and grant access based on those
accounts. Additionally, for Linux, the process of sharing resources can be slightly different,
depending on the distribution you're using. File sharing can often be achieved using Samba,
which enables Linux systems to share files and printers with Windows systems. CUPS
(Common Unix Printing System) is commonly used for printer sharing. Keep in mind that
network security is essential when sharing resources. Always configure sharing permissions
carefully and consider using passwords and encryption to protect sensitive data.

16
EXPERIMENT: 7

Designing and implementing class A, B and C networks.

Class A, B, and C networks are part of the IPv4 addressing scheme, defining ranges of IP

addresses for different types of networks. Here's a brief overview and steps to design and

implement them:

• Class A Network:

 **Range:** 1.0.0.0 to 126.255.255.255


 **Subnet Mask:** 255.0.0.0
 **Usage:** Suitable for large organizations or companies with a vast number of
hosts.

**Steps:**

1.Plan: Determine the number of subnets and hosts required. Class A provides a large
number of hosts per network.

2.Assign IP Range: Allocate a range within the Class A range for your network.

3.Subnetting:Decide on subnet sizes based on your requirements. Subnetting allows you to


create smaller, more manageable networks.

4.Configure Devices: Assign IP addresses to devices within each subnet. Configure routers
and switches accordingly.

• Class B Network:

 **Range:** 128.0.0.0 to 191.255.255.255


 **Subnet Mask:** 255.255.0.0
 **Usage:** Suitable for medium-sized organizations with a moderate number of
hosts.

**Steps:**

1.Plan:Determine the number of subnets and hosts required. Class B offers a balance
17
between hosts and network size.

2.Assign IP Range: Allocate a range within the Class B range for your network.

3.Subnetting: Subnet the network based on your needs. Class B allows for a moderate
number of hosts per subnet.

4.Device Configuration: Assign IP addresses to devices and configure network devices


accordingly.

•Class C Network:

**Range:** 192.0.0.0 to 223.255.255.255

**Subnet Mask:** 255.255.255.0

**Usage:** Suitable for small networks or organizations with fewer hosts.

**Steps:**

1.Plan: Assess the number of subnets and hosts required. Class C provides fewer host
addresses but more networks.

2.Assign IP Range: Choose a range within the Class C range for your network.

3.Subnetting: Subnet the network according to your needs. Class C is often used for smaller,
departmental networks.

4.Device Configuration: Assign IP addresses to devices and configure network devices


accordingly.

General Tips:

 Documentation: Keep detailed records of your IP address assignments, subnets, and


network configurations.
 Router Configuration: Set up routing between subnets if your network spans
multiple subnets.
 Security: Implement security measures such as firewalls and access controls,
especially between different subnets.

18
EXPERIMENT: 8

Subnet Mass planning and its Implementation.

Sub Netting:- What is Subnetting?

The process of subnetting involves dividing a network up into smaller networks called
subnets or sub networks. Each of these subnets has its own specific address. To create these
additional networks we use a subnet mask. The subnet mask simply determines which portion
of the IP address belongs to the host. The subnet address is created by dividing the host
address into network address and host address.

To start, you'll need to choose the right subnet mask, which determines the size of each
subnet. The most common ones are /24, /25, /26, etc. The smaller the number after the "/", the
more hosts you can have in a subnet .For example, a /24 subnet has 256 addresses, but when
you subtract the network address and broadcast address, you're left with 254 usable IPs. If
you go with a /26, you'd have 64 addresses, with 62 usable.

When planning, consider the number of hosts needed in each subnet and future growth. Also,
think about the physical layout of your network – different departments, floors, or even
buildings might warrant separate subnets The network address specifies the type of
subnetwork in the network and the host address specifies the host of that subnet. Subnets are
under local administration. As such, the outside world sees an organization as a single
network and has no detailed knowledge of the organization's intema1 structure. Subnetting
provides the network administrator with several benefits, including extra flexibility, more
efficient use of network address and the capability to contain broadcast traffic. A
given .network address can be broken up into may subnetworks. For example, 172.16.1.0,
172.16.2.0, 172.16.3.0 and 172.16.4.0 are all subnets within network 171.16.0.0.

***************************************************************************

Implementing Subnet Planning

Without subnets, the organization operates as a single network. These flat topologies result in
short routing tables but, as the network grows, the use of bandwidth becomes inefficient. (All

19
systems on the network receive all the broadcasts on the network.) Network addressing can
be made more efficient by breaking the addresses into smaller segments, or subnets.
Subnetting provides additional structure to an addressing scheme without altering the
addresses. In the figure, the network address 172.16.0.0 is subdivided into four subnets:

172.16.1.0, 172.16.2.0, 172.16.3.0, and 172.16.4.0. If traffic were evenly distributed to each
end station, the use of subnetting would reduce the overall traffic seen by each end station by
75 percent.

Subnet Mask

A subnet mask is a 32-bit value written as four octets. In the subnet mask, each bit determines
how the corresponding bit in the IP address should be interpreted (network, subnet, or host).

The subnet mask bits are coded as follows:

 Binary 1 for the network bit


 Binary 1 for the subnet bits
 Binary 0 for the host bits

Although dotted decimal is the most common format, the subnet can be represented
inseveral ways:

 Dotted decimal—172.16.0.0 255.255.0.0


 Bit count—172.16.0.0/16
 Hexadecimal—172.16.0.0 0xFFFF0000

20
The IP netmask-format command can be used to specify the format of network masks for the
current session. Dotted decimal is the default.

Default Subnet Masks

Each address class has a default subnet mask. The default subnet masks only the network
portion of the address, the effect of which is no subnetting. With each bit of subnetting
beyond the default, you can create 2n – 2 subnets. These examples show the effect of adding
subnet bits.

21
EXPERIMENT: 9

To configure dynamic IP address for a computer connected to a LAN.


A basic process to configure a dynamic IP address for a computer connected to a LAN (Local
Area Network). We'll assume you're using a Windows operating system.

**Step 1: Open Network Settings**

 Press `Win + X` and select "Network Connections" or go to "Control Panel" >


"Network and Sharing Center" > "Change adapter settings."

**Step 2: Access Network Adapter Properties**

 Right-click on the network adapter connected to the LAN and select "Properties."

**Step 3: Select Internet Protocol Version 4 (TCP/IPv4)**

 In the list of items, find "Internet Protocol Version 4 (TCP/IPv4)" and select it. Click
on the "Properties" button.

**Step 4: Obtain an IP address automatically**

 In the properties window, select the option "Obtain an IP address automatically" and
"Obtain DNS server address automatically." Click "OK" to apply the changes.

**Step 5: Verify the Configuration**

 Go back to the "Network and Sharing Center" and click on "Change adapter settings"
again.
 Right-click on your network adapter and select "Status." Check the IPv4 address; it
should now be assigned dynamically.

**Step 6: Test the Connection**

 Open a command prompt (`Win + R`, type `cmd`, and press Enter) and type
`ipconfig` to view the IP configuration. Ensure that the IPv4 address is assigned
dynamically (DHCP).

22
EXPERIMENT: 10

Use of commands like ping, ipconfig for trouble shooting network related
problems .

Troubleshooting network-related problems using the `ping` and `ipconfig` commands. We'll
assume you're using a Windows system.

Scenario: Troubleshooting Connectivity Issues.

Problem Description: You are experiencing connectivity issues on a computer in your LAN.
The user reports that they cannot access the internet.

**Steps to Troubleshoot:**

Step 1: Check Network Configuration

 Open a command prompt (`Win + R`, type `cmd`, and press Enter).
 Type `ipconfig` and press Enter to check the computer's IP configuration.
 Verify that the IP address, subnet mask, gateway, and DNS servers are correctly
configured.

Step 2: Ping the Gateway

 Type `ping <gateway_IP>` and press Enter (replace `<gateway_IP>` with the actual
IP address of your router or gateway).
 If the pings are successful, it indicates that your computer can communicate with the
local network.

Step 3: Ping an External Server

 Type `ping 8.8.8.8` and press Enter (this is the IP address of Google's public DNS
server).
 If the pings are successful, it indicates that your computer can reach external servers.
If not,
 there might be an issue with the internet connection.

23
Step 4: DNS Resolution

 Type `ping google.com` and press Enter. This checks if DNS resolution is working.
 If the pings fail, there might be a DNS issue. Verify DNS server settings in the

network configuration.

Step 5: Check Firewall Settings

 Verify that there are no firewall rules blocking the connection. You can disable the

firewall temporarily for testing purposes.

Step 6: Check Physical Connections

 Ensure that cables are securely connected. If using Wi-Fi, check that you're connected

to the correct network.

Step 7: Review Network Adapter Status

 Type `ipconfig /all` to see detailed information about the network adapters, including

their status.

Step 8: Gather Information for Support

 Note down the IP configuration, ping results, and any error messages. This
information will be helpful if you need to seek further assistance.

24
EXPERIMENT: 11

Develop a program to compute the Hamming Distance between any two


code word

Hamming Distance

Hamming distance is a metric for comparing two binary data strings. While comparing two
binary strings of equal length, Hamming distance is the number of bit positions in which the
two bits are different.The Hamming distance between two strings, a and b is denoted as
d(a,b).It is used for error detection or error correction when data is transmitted over computer
networks. It is also using in coding theory for comparing equal length data words.

Calculation of Hamming Distance

In order to calculate the Hamming distance between two strings, and , we perform their XOR
operation, (a⊕ b), and then count the total number of 1s in the resultant string.

Example

Suppose there are two strings 1101 1001 and 1001 1101.

11011001 ⊕ 10011101 = 01000100. Since, this contains two 1s, the Hamming

distance, d(11011001, 10011101) = 2.

Minimum Hamming Distance

In a set of strings of equal lengths, the minimum Hamming distance is the smallest
Hamming distance between all possible pairs of strings in that set.

Example

Suppose there are four strings 010, 011, 101 and 111.

010 ⊕ 011 = 001, d(010, 011) = 1.

010 ⊕ 101 = 111, d(010, 101) = 3.

010 ⊕ 111 = 101, d(010, 111) = 2.

25
011 ⊕ 101 = 110, d(011, 101) = 2.

011 ⊕ 111 = 100, d(011, 111) = 1.

101 ⊕ 111 = 010, d(011, 111) = 1.

Hence, the Minimum Hamming Distance, dmin = 1.

Lets Understand the Process Of Hamming Distance With program.

Code:

Output:

26
27
EXPERIMENT: 12

Installation of FTP server and client


Setting Up FTP Server on Windows:

 Install FileZilla Server: Download and install [FileZilla Server](https://filezilla-


project.org/) on your Windows machine. Follow the installation wizard to complete
the setup.
 Configure FileZilla Server: Open FileZilla Server and configure server settings, create
users, and set their permissions.
 Open FTP Ports in Windows Firewall: Allow incoming connections on FTP ports
(default is 21) in the Windows Firewall.

Setting Up FTP Client on Windows:

1. Install WinSCP:

 Download and install [WinSCP](https://winscp.net/eng/download.php) on your


Windows machine.
2.Configure WinSCP:

 Open WinSCP and enter the FTP server details (hostname, username, password,
port).
Communicating with Linux Red Hat Virtual Machine:

 Install FTP Server on Linux: On your Red Hat Linux virtual machine, install an
FTP server. Configure FTP Server on Linux: Edit the vsftpd configuration file
(`/etc/vsftpd/vsftpd.conf`) to set up user access, security options, etc.
 Start and Enable FTP Service:Start and enable the vsftpd service.
 Open FTP Ports in Linux Firewall: Allow incoming connections on FTP ports in the
Linux firewall.
 Find Linux Machine IP: Use `ifconfig` or `ip addr` to find the IP address of your

Linux machine.

Connecting WinSCP to Linux:

 Open WinSCP: Open WinSCP on your Windows machine.

28
 Configure Connection: Enter the Linux machine's IP, username, password, and port in
WinSCP.
 Connect: Click "Login" to establish a connection to the Linux machine.

Now, you should be able to transfer files between your Windows machine and the Red Hat
Linux virtual machine using WinSCP. Make sure to adjust security settings, user permissions,
and firewall rules based on your specific requirements and network setup.

29
EXPERIMENT: 13

To configure proxy server.

Configuration Of Proxy Server:

1. Open Settings:

 Click on the Start menu and select "Settings"

2. Go to Network & Internet:

 In the Settings window, choose "Network & Internet."

3. Proxy Settings:

 On the left sidebar, select "Proxy."

4. Manual Proxy Setup:

30
 Under the "Manual proxy setup" section, toggle the switch to turn on the manual
proxy configuration.

5. Enter Proxy Details:

 Enter the IP address and port number of your proxy server in the corresponding fields.

31
6. Save Changes:

 Click "Save" to apply the changes.

Make sure to obtain the correct proxy server details from your network administrator or
service provider. If your proxy server requires authentication, you might need to enter your
username and password as well.

32
EXPERIMENT: 14

Familiarization with network simulation tools.


Network simulation tools are essential for understanding and testing the behavior of computer
networks in a controlled environment. There are several tools available, each with its own
strengths.

Some popular ones include:

GNS3 – Graphical Network System 3

Graphical Network System 3 (GNS 3) is Network Simulation/Emulation Tool & Software,


and it is a kind of Virtual Network in a Suitcase. GNS3 can simulate the complex network
and scenarios and supports the combination of virtual and real network devices. GNS3 is one
of the best network simulation tools to build, design, configure, and test your network
scenarios in a completely risk-free virtual environment. GNS3 network simulation tool
is available for Windows, Linux & Mac.

33
Cisco Packet Tracer

Cisco Packet Tracer is a dominant network simulation tool built by Cisco Systems. You can
make a simple or complex network inside the Packet tracer to create, plan, configure,
and test your network scenarios in a completely virtual ecosystem. This Network Simulation
tool allows users to create network topologies and imitate those in modern computer
networks. Packet Tracer is one of the most famous Networks Simulation software among
networking aspirants and beginners. It is used actively during the Cisco CCNA Certification
Training.

34
Putty

PUTTY is a completely free and open-source terminal emulator, serial console, and network
file transfer application. It supports several network protocols, including SCP, SSH, Telnet,
login, and raw socket connection.

Secure CRT

Secure CRT presents the capability to create an SSH connection with a dynamic port
forwarding configuration that can be used as a SOCKS proxy to reach all machines in a
remote network (behind the gateway). Using an SSH proxy, any application that is SOCKS 4

35
or 5 compatible (including other sessions established with secure CRT) will be able to have
their connections forwarded through this SSH SOCKS proxy and on to the desired
destination.

WIRESHARK

Wireshark is a free and open-source packet analyzer. Wireshark development project, started
by Gerald Combs in 1998, is today’s world’s foremost and widely-used network protocol
analyzer. It is used for network troubleshooting, interpretation, review, protocol development,
and education. Wireshark will also help you see what’s happening on your network at a
microscopic level.

Network Simulator-NS3

36
NS is a name for a series of discrete event network simulators, specifically ns-1, ns-2, and ns-
3. The Network Simulator -NS-3 is a discrete event simulator targeted at networking
research. Network Simulator -NS3 tool provides substantial support for simulation of TCP,
routing, and multicast protocols over wired and wireless (local and satellite) networks. It is
publicly available for research development, and use.

37

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy