CN1,2,3(modified)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Experiment - 1

Aim: Study of different types of Network cables and Practically implement the cross-wired
cable and straight through cable using a crimping tool.

Apparatus (Components): RJ-45 connector, Crimping Tool, Twisted pair Cable.

Procedure:

To conduct this practical, follow the steps below:

1. Start by carefully removing approximately 2 inches of the plastic jacket from the cable's end.
Ensure the internal wires remain undamaged. It's crucial to avoid experimenting with the
cable, as it may compromise its functionality. Inspect the wires for nicks or cuts. If any are
found, trim the entire end and begin anew.

2. While holding the base of the jacket with one hand, gently spread the wires apart using your
other hand. Be cautious not to allow the wires to untwist inside the jacket. Note that
Category 5 cable should have no more than 1/2 inch of 'untwisted' wire at the end to remain
within specifications.

3. Install two end jacks on your cable. If using a pre-made cable with one end already
removed, only install the crossed-over end.

Refer to the accompanying diagrams illustrating how to arrange cables for different cable ends.
Determine your desired goal and consult the provided images accordingly.
Experiment - 2

Aim: Study of the following Network devices in details


• Repeater
• Hub
• Switch
• Bridge
• Router
• Gateway
Apparatus (Software): No software or hardware needed.

Procedure: Details of the above-mentioned devices are given below:

1. Repeater:

• Functioning at Physical Layer, a repeater is an electronic device that


receives a signal and retransmits it at a higher level and/or higher
power, or onto the other side of an obstruction, extending the signal's
coverage over longer distances.

• Repeater devices typically have two ports, limiting their use for
connecting more than two devices.

2. Hub:

• An Ethernet hub, also known as an active hub, network hub, or


concentrator, connects multiple twisted pair or fiber optic Ethernet
devices to form a single network segment.

• Operating at the physical layer (layer 1) of the OSI model, hubs are a
type of multiport repeater. They assist with collision detection, sending
a jam signal to all ports if a collision is detected.

3. Switch:

• A network switch, or switching hub, is a computer networking device


used to connect network segments.

• Switches process and route data at the data link layer (layer 2) of the
OSI model. Layer 3 switches, also known as multilayer switches,
process data at the network layer (layer 3 and higher).
4. Bridge:

• A network bridge connects multiple network segments in the OSI


model's data link layer (Layer 2).

• In Ethernet networks, a bridge follows the IEEE 802.1D standard. A


switch is essentially a bridge with multiple ports.

• Bridges can analyze incoming data packets to determine if they can be


routed to another segment of the network.

5. Router:

• A router interconnects two or more computer networks and selectively


exchanges packets of data between them.

• Routers use address information in data packets to determine if the


source and destination are on the same network or if the packet must
be transferred between networks.

• In large networks, routers exchange information about target system


addresses to build up a table showing preferred paths between
systems.

6. Gateway:

• In a communications network, a gateway is a network node equipped


for interfacing with another network that uses different protocols.

• Gateways may contain devices such as protocol translators,


impedance matching devices, or signal translators to provide system
interoperability.

• Protocol translation/mapping gateways interconnect networks with


different protocol technologies by performing required protocol
conversions.
Experiment - 3
Aim: Study of basic network command and Network configuration commands.

Apparatus (Software): Command Prompt And Packet Tracer.

Procedure: Steps to perform the experiment are outlined below:


1. Understanding Basic Networking Commands:
• Learn fundamental networking commands such as ping and tracert.
2. Network Configuration Commands:
• Explore commands for switching between privilege and normal mode,
configuring router interfaces, and saving configurations to flash or permanent
memory.
• This includes:
• Configuring the Router commands
• General Commands to configure the network
• Privileged Mode commands of a router
• Router Processes & Statistics
• IP Commands
• Other IP Commands (e.g., show ip route, etc.)
Ping:
• Ping(8) transmits an ICMP ECHO_REQUEST packet to the specified host. If the host
responds, you will receive an ICMP packet back.
• To determine if a machine is alive, you can "ping" its IP address. If there is no
response, you will know something is wrong.
Traceroute:

• Tracert is a command that reveals the path a packet of information takes from your computer to a
specified destination.

• It lists all routers the packet passes through until reaching its destination or being discarded if it fails
to do so.

• Tracert also provides information on the duration of each 'hop' between routers.

nslookup:
• nslookup displays data from Domain Name System (DNS) name servers.
• Note: Typing the command above will display your PC's server name first.
pathping:
• pathping is a superior version of tracert that offers statistics on packet loss and
latency.
Getting Help:
• In any command mode, enter a question mark (?) to retrieve a list of available
commands.
• Example: Router>?
• To obtain a list of commands starting with a specific character sequence, type it
followed by the question mark (?).
• Example: Router#co? (for commands like Configure, Connect, Copy)
• To list keywords or arguments, append a space before the question mark.
• Example: Router#configure? memory (Options: Configure from the NV
memory, Configure via a TFTP network host, Configure from the terminal)
• Commands and keywords can be abbreviated by entering a few characters to
distinguish them from others. For instance, you can abbreviate the show command
to sh.
Configuration Files:
• When modifying the router configuration, remember to save changes to memory to
prevent loss during system reloads or power outages. Configuration files are
categorized into two types: running and startup.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy