0% found this document useful (0 votes)
8 views45 pages

Sheetal CN

The document outlines a laboratory assignment for Computer Networks (AL-602) at Acropolis Institute of Technology and Research, focusing on networking concepts, protocols, and practical applications using simulation tools like Cisco Packet Tracer. It includes objectives, syllabus, laboratory instructions, and evaluation criteria for students, emphasizing hands-on experience with LAN setups and various network topologies. The course aims to provide foundational and advanced knowledge in networking, preparing students for real-world applications and problem-solving in the field.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views45 pages

Sheetal CN

The document outlines a laboratory assignment for Computer Networks (AL-602) at Acropolis Institute of Technology and Research, focusing on networking concepts, protocols, and practical applications using simulation tools like Cisco Packet Tracer. It includes objectives, syllabus, laboratory instructions, and evaluation criteria for students, emphasizing hands-on experience with LAN setups and various network topologies. The course aims to provide foundational and advanced knowledge in networking, preparing students for real-world applications and problem-solving in the field.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 45

2024-25

Acropolis Institute of
Technology and
Research, Indore
Department of CSE
Submitted To: Asst. Prof. Jaya Dubey
(Artificial Intelligence & Machine
Learning)

Computer Networks (AL 602)

Sheetal Patidar
0827AL221121
AL_T-2/3rd Year / 6th Sem

ACROPOLIS INSTITUTE OF TECHNOLOGY & RESEARCH,


INDORE

[LAB ASSIGNMENT COMPUTER NETWORKS (AL-602)]

The Objective of this laboratory work is to enlighten the student with knowledge base in Computer
Networks and its applications. Also demonstrate a working understanding of various networking
protocols, network configurations, and troubleshooting techniques using simulation tools like Cisco
Packet Tracer.
ACROPOLIS INSTITUTE OF TECHNOLOGY &
RESEARCH, INDORE

Department of CSE (Artificial Intelligence & Machine Learning)

CERTIFICATE

This is to certify that the experimental work entered in this journal as per

the B. TECH. III year syllabus prescribed by the RGPV was done by Ms.

Sheetal Patidar B.TECH III year VI semester in the Computer Networks

Laboratory of this institute during the academic year 2024-2025.

Signature of the Faculty


ABOUT THE LABORATORY

In this lab, students will be able to learn and practice Computer Network concepts.
Students can expand their skill set by getting hands-on experience with various
networking tools and techniques. In this lab, simulation tools like Cisco Packet Tracer
are used to provide exposure to real-world network design, configuration, and
troubleshooting. The concepts and practical sessions in this lab focus on network
models, protocols, IP addressing, routing, switching, and basic network security.

The outcome of this lab is to make students understand the foundational and
advanced aspects of networking by giving them practical knowledge of how networks
operate and how to manage and secure them efficiently

3
GENERAL INSTRUCTIONS FOR LABORATORY CLASSES

 DO’S

 Without Prior permission do not enter into the Laboratory.

 While entering into the LAB students should wear their ID cards.

 The Students should come with proper uniform.

 Students should sign in the LOGIN REGISTER before entering


into the laboratory.

 Students should come with observation and record note book to the
laboratory.

 Students should maintain silence inside the laboratory.

 After completing the laboratory exercise, make sure to shut down the
system properly.

 DONT’S

 Students bringing the bags inside the laboratory.

 Students using the computers in an improper way.

 Students scribbling on the desk and mishandling the chairs.

 Students using mobile phones inside the laboratory.

 Students making noise inside the laboratory.

4
SYLLABUS
Course: AL602 Computer Networks
Branch/Year/Sem: Artificial Intelligence & Machine Learning / III / VI

Module1: Computer Network: Definitions, goals, components, Architecture, Classifications & Types.
Layered Architecture: Protocol hierarchy, Design Issues, Interfaces and Services, Connection Oriented
& Connectionless Services, Service primitives, Design issues & its functionality. ISOOSI Reference Model:
Principle, Model, Descriptions of various layers and its comparison with TCP/IP. Principals of physical layer:
Media, Bandwidth, Data rate and Modulations

Module 2: Data Link Layer: Need, Services Provided, Framing, Flow Control, Error control. Data Link Layer
Protocol: Elementary & Sliding Window protocol: 1-bit, Go-Back-N, Selective Repeat, Hybrid ARQ. Protocol
verification: Finite State Machine Models & Petri net models. ARP/RARP/GARP

Module 3: MAC Sub layer: MAC Addressing, Binary Exponential Back-off (BEB) Algorithm, Distributed
Random Access Schemes/Contention Schemes: for Data Services (ALOHA and Slotted ALOHA), for Local-
Area Networks (CSMA, CSMA/CD, CSMA/CA), Collision Free Protocols: Basic Bit Map, BRAP, Binary Count
Down, MLMA Limited Contention Protocols: Adaptive Tree Walk, Performance Measuring Metrics. IEEE
Standards 802 series & their variant.

Module 4: Network Layer: Need, Services Provided , Design issues, Routing algorithms: Least Cost
Routing algorithm, Dijkstra's algorithm, Bellman-ford algorithm, Hierarchical Routing, Broadcast Routing,
Multicast Routing. IP Addresses, Header format, Packet forwarding, Fragmentation and reassembly, ICMP,
Comparative study of IPv4 & IPv6

Module 5: Transport Layer: Design Issues, UDP: Header Format, Per-Segment Checksum, Carrying
Unicast/Multicast Real-Time Traffic, TCP: Connection Management, Reliability of Data Transfers,
TCP Flow Control, TCP Congestion Control, TCP Header Format, TCP Timer Management. Application Layer:
WWW and HTTP, FTP, SSH, Email (SMTP, MIME, IMAP), DNS, Network Management (SNMP).

HARDWARE AND SOFTWARE REQUIREMENTS:

S. Name of Item Specification


No.
1 Computer System Hard Disk min 5 GB
RAM: 4 GB / 8 GB
Processor: Intel i3 or above

S. Name of Item Specification


No.
1 Operating system Window XP or 2000
Simulation software Cisco Packet Tracer 8.2.2

5
RATIONALE:

The aim of this subject is to explore the core concepts, structure, and communication rules of
computer networks, and to understand how these networks facilitate data exchange between devices
while connecting with various areas of computer science and engineering.

COURSE OBJECTIVES AND OUTCOMES

 Course Objectives
1. An understanding of the overriding principles of computer networking, including
protocol design, protocol layering, algorithm design, and performance evaluation.
2. An understanding of computer networking theory, including principles embodied in the
protocols designed for the application layer, transport layer, network layer, and link layer
of a networking stack.
3. An understanding of specific implemented protocols covering the application layer,
transport layer, network layer, and link layer of the Internet (TCP/IP) stack
4. An understanding of various security issues.

 Course Outcomes
1. Describe the essential principles of Network Layers. Characterize and appreciate
computer networks from the viewpoint of components and from the viewpoint of
services (Knowledge & design of networks)
2. Display good understanding of the flow of a protocol in general and a network
protocol in particular (Knowledge of protocols)
3. Model a problem or situation in terms of layering concept and map it to the TCI/IP
stack. (Modeling & Real-world mapping)
4. Select the most suitable Application Layer protocol (such as HTTP, FTP, SMTP, DNS,
Bit torrent) as per the requirements of the network application and work with
available tools to demonstrate the working of these protocols (Problem analysis &
implementation)
5. Design a Reliable Data Transfer Protocol and incrementally develop solutions for the
requirements of Transport Layer. Use IP addressing to create subnets for any specific
requirements (Problem identification & Implementation.

6
Index
Grade &
Date of Page Date of
S.No Name of the Experiment Sign of the
Exp. No. Submission
Faculty
1 8-10
Study of Different Type of LAN& Network
Equipment.

2 Study and Verification of standard Network topologies 11-14


i.e. Star, Bus, Ring etc.
3 15-16
LAN installations and Configurations.

4 Write the usability and perform the following 17-21


commands on your system and Write with
output all the networking commands in your lab file?
a) Ipconfig and all different variants of Ipconfig.
b) Netstat command and its variants
c) Nslookup and test at least 5 different domains
d) Tracert and test at least 5 different domains
e) Ping and test at least 5 different ip addresses
f) Getmac command
g) Hostname command
5 Describe IPv4 address structure and Class A, B, C, 22-23
and D address
6 Study and Installation of Cisco Packet Tracer and 24-26
establishing connection from PC to
Switch.
7 To study and compare the working of a Hub and a 27-29
Switch in a LAN setup in Cisco Packet
Tracer.
8 Establishment of LAN by bus and star topology using 30-31
switch in Cisco Packet Tracer.

9 Connection of two different networks using router 32-34


in Cisco Packet Tracer.
10 Study & Simulation of Application layer 35-37
protocols-DNS, HTTP, FTP and DHCP.
11 To simulate and understand the working of TCP 38-41
and UDP protocols by configuring DNS,
FTP, Web, and Email servers in Cisco Packet
Tracer
12 Study & Simulation of MAC Protocols like 42-44
Aloha, CSMA, CSMA/CD and CSMA/CA using
Standard Network Simulators.
Program Outcome (PO)

The engineering graduate of this institute will demonstrate:


a) Apply knowledge of mathematics, science, computing and engineering fundamentals to computer
science engineering problems.
b) Able to identify, formulate, and demonstrate with excellent programming, and problem solving skills.
c) Design solutions for engineering problems including design of experiment and processes to meet
desired needs within reasonable constraints of manufacturability, sustainability, ecological,
intellectual and health and safety considerations.
d) Propose and develop effective investigational solution of complex problems using research
methodology; including design of experiment, analysis and interpretation of data, and combination of
information to provide suitable conclusion. synthesis
e) Ability to create, select and use the modern techniques and various tools to solve engineering problems
and to evaluate solutions with an understanding of the limitations.
f) Ability to acquire knowledge of contemporary issues to assess societal, health and safety, legal and
cultural issues.
g) Ability to evaluate the impact of engineering solutions on individual as well as organization in a societal
and environmental context, and recognize sustainable development, and will be aware of emerging
technologies and current professional issues.
h) Capability to possess leadership and managerial skills, and understand and commit to professional ethics
and responsibilities.
i) Ability to demonstrate the team work and function effectively as an individual, with an ability to design,
develop, test and debug the project, and will be able to work with a multi-disciplinary team.
j) Ability to communicate effectively on engineering problems with the community, such as being able
to write effective reports and design documentation.
k) Flexibility to feel the recognition of the need for, and have the ability to engage in independent and life-
long learning by professional development and quality enhancement programs in context of
technological change.
l) A practice of engineering and management principles and apply these to one’s own work, as a member
and leader in a team, to manage projects and entrepreneurship.
Acropolis Institute of Technology and Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Group / Title: Study of Different Type of LAN and Network
Lab: AL-602 Computer
Equipment.
Networks
EVALUATION RECORD Type/ Lab Session:
Name Sheetal Patidar Enrollment No. 0827AL221121
Performing on First submission Second submission
Extra Regular

Grade and Remarks by the Tutor


1. Clarity about the objective of experiment
2. Clarity about the Outcome
3. Submitted the work in desired format
4. Shown capability to solve the problem
5. Contribution to the team work

Additional remarks

Grade: Cross the grade.


A B C D F

Tutor

1 Title: Study of Different Type of LAN & amp; Network Equipment.

2 Objective:
To understand the different types of Local Area Networks (LAN) and to study the functionality
and purpose of various networking equipment used in LAN setups.

3 Theory: A Local Area Network (LAN) is a group of computers and network devices connected
together, usually within the same building. It enables sharing of resources such as files, printers,
and internet access.
Types of LAN:

1. Wired LAN: Uses physical cables (Ethernet) to connect devices.

2. Wireless LAN (WLAN): Uses wireless signals (Wi-Fi) to connect devices.

3. Peer-to-Peer LAN: All computers have equal status and share resources without a

dedicated server.

4. Client-Server LAN: A centralized server provides resources and services to client

machines.

Common Network Equipment:

Equipment Description
Router Connects multiple networks together; routes data from
one network to another (e.g., LAN to Internet).
Switch Connects multiple devices within a LAN; manages data
traffic efficiently using MAC addresses.
Hub Basic device that connects devices in a LAN; sends data
to all connected devices (less secure and slower).
Modem Converts digital data to analog for transmission over
telephone lines and vice versa.
Network Interface Card (NIC) Hardware component that connects a computer to a
network.
Access Point (AP) Extends a wired LAN by adding Wi-Fi capability.
Cables (UTP/STP/Fiber Optic) Used in wired LANs to transmit data signals.
Firewall Monitors and controls incoming/outgoing network traffic
for security.

10
4 Apparatus / Equipment Required:
 Router
 Switch
 Hub
 Modem
 Cables (UTP/STP)
 NIC Cards
 Access Point (optional)
 Laptop/PC
 Network Simulation Tool (like Cisco Packet Tracer) (optional)

5 Procedure:
1. Identify and label the networking equipment physically or via simulation.
2. Note the ports and indicator lights on each device.
3. Observe the connections:
 Router to Modem
 Switch to multiple PCs
 Access Point for wireless connections
4. Study the use of UTP cables and RJ-45 connectors.
5. Understand how data is transferred between devices.
6. If using simulation software, create a basic LAN setup.

11
Acropolis Institute of Technology and Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Lab: AL-602 Computer Group / Title: Study and Verification of standard Network
Networks topologies i.e. Star, Bus, Ring etc.
EVALUATION RECORD Type/ Lab Session:
Name Sheetal Patidar Enrollment No. 0827AL221121
Performing on First submission Second submission
Extra Regular

Grade and Remarks by the Tutor


1. Clarity about the objective of experiment
2. Clarity about the Outcome
3. Submitted the work in desired format
4. Shown capability to solve the problem
5. Contribution to the team work

Additional remarks

Grade: Cross the grade.


A B C D F

Tutor

1 Title: Study and Verification of standard Network topologies i.e. Star, Bus, Ring etc.

2 Objective:
To study and verify the working of various standard network topologies such as Star, Bus, Ring,
Mesh, and Hybrid using physical components or simulation tools.

3 Theory:
A network topology refers to the layout or arrangement of various elements (links, nodes,
etc.) of a computer network. It defines how devices are interconnected and how data
flows within the network.

12
Types of Network Topologies:
1. Star Topology:
 All devices are connected to a central hub or switch.
 If the central hub fails, the entire network fails.
 Easy to install and manage.
2. Bus Topology:
 All devices are connected to a single central cable (the bus).
 Terminators are used at both ends.
 Inexpensive but less efficient with high traffic.
3. Ring Topology:
 Devices are connected in a circular fashion.
 Each device has exactly two neighbors.
 Data travels in one direction (or two in dual ring).
4. Mesh Topology:

13
 Every device is connected to every other device.
 Provides high redundancy and reliability.
 Complex and expensive.
5. Hybrid Topology:
 Combination of two or more topologies (e.g., Star-Bus).
 Flexible and scalable.

4 Apparatus / Equipment Required:


 Computers/Laptops
 Switches / Hubs
 Network cables (UTP with RJ-45 connectors)
 Terminators (for bus topology)
 Simulation software (e.g., Cisco Packet Tracer / NetSim)
 NIC Cards

5 Procedure:
1. Star Topology:
 Connect all computers to a central switch using UTP cables.
 Verify communication between devices using ping command or file sharing.
2. Bus Topology:
 Connect all devices to a single backbone cable.
 Attach terminators at both ends of the cable.
 Check connectivity using ping or data sharing.
3. Ring Topology:
 Connect devices in a closed loop (via simulation).
 Send data to verify it travels in a circular path.
4. Mesh Topology:
 (Preferably via simulation) connect every device to every other.
 Verify multiple paths of communication.
5. Hybrid Topology:
 Design a combination network (e.g., two star topologies connected by a bus).

14
 Observe communication behavior and analyze reliability.

6 Observations:
Connectivity
Setup
Topology Equipment Used Successful Remarks
Time
(Yes/No)
1 Switch, 4 PCs, UTP 10 Easy to set up, centralized
Star Yes
cables mins communication
1 Backbone cable Simulated using linear
12
Bus (represented), 6 PCs, Yes connections in Packet
mins
terminators Tracer
Used manual
4 PCs connected in a closed 15
Ring Yes configuration to simulate
loop mins
circular data flow
4 PCs, each connected to all 20 More complex, high
Mesh Yes
others mins redundancy observed
Combination of Star and
18 Demonstrated flexibility
Hybrid Bus topologies (2 stars Yes
mins and scalability
connected via bus)

15
Acropolis Institute of Technology and Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Lab: AL-602 Computer
Group / Title: LAN Installations and Configurations
Networks
EVALUATION RECORD Type/ Lab Session:
Name Sheetal Patidar Enrollment No. 0827AL221121
Performing on First submission Second submission
Extra Regular

Grade and Remarks by the Tutor


1. Clarity about the objective of experiment
2. Clarity about the Outcome
3. Submitted the work in desired format
4. Shown capability to solve the problem
5. Contribution to the team work

Additional remarks

Grade: Cross the grade.


A B C D F

Tutor

1 Title: LAN Installations and Configurations

2 Objective:
To learn and perform the installation and configuration of a Local Area Network (LAN) using
appropriate hardware and software components.

3 Theory:
A Local Area Network (LAN) is a network that connects computers and devices within a
limited geographical area such as a home, school, or office building. It allows users to
share files, resources, and internet connections.
LAN Installation involves setting up the hardware infrastructure and cabling to enable
communication between devices.
LAN Configuration includes assigning IP addresses, setting up file/printer sharing, and
ensuring devices can communicate over the network.

16
4 Apparatus / Equipment Required:
 Computers/Laptops with NICs
 Network Switch or Hub
 UTP Cables with RJ-45 connectors
 Crimping Tool (if creating cables)
 Router (optional, for internet sharing)
 Cisco Packet Tracer (for simulation)
 Operating System with Networking Support (Windows/Linux)

5 Procedure:
Hardware Installation:
1. Connect each computer to the switch using UTP cables.
2. Ensure NICs are properly installed and functional.
3. Power on the switch and all connected devices.

Software Configuration (Windows OS):


1. Go to Control Panel → Network and Sharing Center → Change adapter settings.
2. Right-click the Ethernet or Local Area Connection → Properties.
3. Select Internet Protocol Version 4 (TCP/IPv4) → Click Properties.
4. Assign IP address manually or use DHCP:
 Example:
 IP Address: 192.168.1.10
 Subnet Mask: 255.255.255.0
 Default Gateway: 192.168.1.1
5. Click OK and close all windows.

Testing the Network:


1. Use the ping command to test connectivity:
ping 192.168.1.11
2. Enable File and Printer Sharing from Control Panel.
3. Try accessing another PC using \\<IP Address> in Run dialog.
4. Share a folder and verify access from other systems.

17
Acropolis Institute of Technology and Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Lab: AL-602 Computer Group / Title: Execution and Study of Basic Networking
Networks Commands
EVALUATION RECORD Type/ Lab Session:
Name Sheetal Patidar Enrollment No. 0827AL221121
Performing on First submission Second submission
Extra Regular

Grade and Remarks by the Tutor


1. Clarity about the objective of experiment
2. Clarity about the Outcome
3. Submitted the work in desired format
4. Shown capability to solve the problem
5. Contribution to the team work

Additional remarks

Grade: Cross the grade.


A B C D F

Tutor

1 Title: Execution and Study of Basic Networking Commands

2 Objective:
To understand the usability and practical application of various networking commands in the
Windows command prompt environment and interpret their output.

3 Theory:
Networking commands allow users and administrators to troubleshoot, configure, and
monitor network settings and connections. These are essential in understanding the
status of a network and diagnosing issues.

Commands, Usability and Sample Output:


a) ipconfig – Internet Protocol Configuration
Usability: Displays current TCP/IP network configuration values and refreshes DHCP and
DNS settings.

18
Command and Variants:
1. ipconfig
Displays IP address, subnet mask, and default gateway.
Output Example:
2. ipconfig /all
Shows detailed configuration including MAC address, DHCP, DNS.
Output Example:

b) netstat – Network Statistics


Usability: Displays active TCP connections, listening ports, and statistics.
Common Variants:
1. netstat
Displays active connections.
2. netstat -a
Shows all active and listening ports.
3. netstat -n
Displays addresses and port numbers in numerical form.
4. netstat -o
Displays process IDs associated with connections.

Sample Output:

19
c) nslookup – Name Server Lookup
Usability: Queries DNS to obtain domain name or IP address mapping.
Tested Domains:
1. nslookup google.com
2. nslookup microsoft.com
3. nslookup gmail.com
4. nslookup openai.com
5. nslookup wikipedia.org
Sample Output:

20
d) tracert – Trace Route
Usability: Displays route and measures transit delays of packets across a network.
Tested Domains:
1. tracert google.com
2. tracert openai.com
3. tracert microsoft.com
4. tracert gmail.com
5. tracert github.com

Sample Output:

e) ping – Packet Internet Groper


Usability: Tests connectivity to another IP address or host.
Tested IP Addresses:
1. ping 8.8.8.8 (Google DNS)
2. ping 1.1.1.1 (Cloudflare)
3. ping 192.168.1.1 (Gateway)
4. ping 142.250.183.78 (Google)
5. ping 104.21.32.57 (example.com IP)
21
Sample Output:

f) getmac – Get MAC Address


Usability: Displays the MAC address of your network adapters.
Command:
getmac

Sample Output:

g) hostname – Display Computer Name


Usability: Shows the name of the current computer.
Command:
hostname
Sample Output:

22
Acropolis Institute of Technology and Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Lab: AL-602 Computer Describe IPv4 Address Structure and Class A,B,C
Group / Title:
Networks and D address.
EVALUATION RECORD Type/ Lab Session:
Name Sheetal Patidar Enrollment No. 0827AL221121
Performing on First submission Second submission
Extra Regular

Grade and Remarks by the Tutor


1. Clarity about the objective of experiment
2. Clarity about the Outcome
3. Submitted the work in desired format
4. Shown capability to solve the problem
5. Contribution to the team work

Additional remarks

Grade: Cross the grade.


A B C D F

Tutor

1 Title: Describe IPv4 Address Structure and Class A,B,C and D address.

2 Theory:
IPv4 addresses are 32-bit numerical addresses represented in dotted decimal notation.
Each address consists of four octets (8 bits each) separated by dots. Example:
192.168.1.1.

IPv4 addresses have two main components:

1. Network Portion - Identifies the network.


2. Host Portion - Identifies the specific device within the network.

IPv4 Address Classes:

IPv4 addresses are categorized into five classes: A, B, C, D, and E.

1. Class A:
 Range: 1.0.0.0 to 126.255.255.255
 Default Subnet Mask: 255.0.0.0
 Supports large networks with many hosts.

23
 First bit is always 0.
 Example: 10.0.0.1

2. Class B:
 Range: 128.0.0.0 to 191.255.255.255
 Default Subnet Mask: 255.255.0.0
 Suitable for medium-sized networks.
 First two bits are 10.
 Example: 172.16.0.1

3. Class C:
 Range: 192.0.0.0 to 223.255.255.255
 Default Subnet Mask: 255.255.255.0
 Used for small networks.
 First three bits are 110.
 Example: 192.168.1.1

4. Class D (Multicast Addresses):


 Range: 224.0.0.0 to 239.255.255.255
 Used for multicasting (sending data to multiple destinations).
 First four bits are 1110.
 Example: 224.0.0.1

5. Class E (Reserved for Experimental Use):


 Range: 240.0.0.0 to 255.255.255.255
 Reserved for research and future use.
 First four bits are 1111.
 Example: 250.1.1.1

24
Acropolis Institute of Technology and Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Lab: AL-602 Computer Group / Title: Study and installation of Cisco Packet Tracer and
Networks establish a basic network connection between a PC and a Switch.
EVALUATION RECORD Type/ Lab Session:
Name Sheetal Patidar Enrollment No. 0827AL221121
Performing on First submission Second submission
Extra Regular

Grade and Remarks by the Tutor


1. Clarity about the objective of experiment
2. Clarity about the Outcome
3. Submitted the work in desired format
4. Shown capability to solve the problem
5. Contribution to the team work

Additional remarks

Grade: Cross the grade.


A B C D F

Tutor

1 Title: Study and installation of Cisco Packet Tracer and establish a basic network connection
between a PC and a Switch.
2 Software Required:
 Cisco Packet Tracer (latest version)
 Operating System: Windows/Linux

3 Hardware Required:

 Computer with internet access

Part A: Study and Installation of Cisco Packet Tracer:

Step 1: Downloading Cisco Packet Tracer:

1. Visit the official Cisco Networking Academy website: https://www.netacad.com/


2. Register for a free account if not already registered.
3. Navigate to the ‘Resources’ section and download the latest version of Cisco Packet
Tracer for your operating system.

Step 2: Installing Cisco Packet Tracer:

25
1. Open the downloaded installer file.
2. Follow the installation wizard by clicking 'Next'.
3. Accept the license agreement and proceed with the default installation settings.
4. Click ‘Install’ and wait for the process to complete.
5. Once installed, launch Cisco Packet Tracer and log in using the NetAcad credentials.
6. Verify the successful installation by opening a new workspace.

Part B: Establishing Connection from PC to Switch:

Step 1: Setting up Devices in Cisco Packet Tracer:

1. Open Cisco Packet Tracer.


2. From the device toolbar, drag and drop the following devices onto the workspace:
 1 PC (from ‘End Devices’ category)
 1 Switch (from ‘Switches’ category)

Step 2: Connecting the Devices:

1. Click on the ‘Connections’ icon (lightning bolt symbol) from the toolbar.
2. Select Copper Straight-Through Cable.
3. Click on the PC, then select the FastEthernet0 port.
4. Click on the Switch, then select any FastEthernet port (e.g., FastEthernet0/1).
5. A solid green connection should appear, indicating a successful physical connection.

Step 3: Verifying the Connection:

1. Click on the PC, then go to the Desktop tab.


2. Open Command Prompt.
3. Type the command: ipconfig and press Enter.
4. Assign an IP address manually by navigating to IP Configuration and entering:
 IP Address: 192.168.1.10
 Subnet Mask: 255.255.255.0
5. Ping the Switch by opening the PC's Command Prompt and typing:
ping 192.168.1.1
(Assuming the switch has a default IP address assigned or is managed.)
6. If replies are received, the connection is successfully established.

26
4 Sample Output:

27
Acropolis Institute of Technology and Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Lab: AL-602 Computer Group / Title: To study and compare the working of a Hub and a
Networks Switch in a LAN setup in Cisco Packet Tracer.
EVALUATION RECORD Type/ Lab Session:
Name Sheetal Patidar Enrollment No. 0827AL221121
Performing on First submission Second submission
Extra Regular

Grade and Remarks by the Tutor


1. Clarity about the objective of experiment
2. Clarity about the Outcome
3. Submitted the work in desired format
4. Shown capability to solve the problem
5. Contribution to the team work

Additional remarks

Grade: Cross the grade.


A B C D F

Tutor

1 Title: To study and compare the working of a Hub and a Switch in a LAN setup in Cisco Packet
Tracer.
2 Theory:
 A Hub is a basic networking device that transmits data to all ports.
 A Switch is an intelligent device that transmits data only to the intended port,
using MAC addresses.

3 Apparatus / Software Required:

 Cisco Packet Tracer (installed)


 6 PCs
 1 Hub (PT-Hub)
 1 Switch (e.g., 2960)
 Copper Straight-Through Cables

4 Procedure:

Part A: Connecting 6 PCs with a Hub:

1. Open Cisco Packet Tracer.


2. Drag the following devices into the workspace:

28
 6 PCs (from End Devices)
 1 Hub (from Hubs)

3. Connect the PCs to the Hub using Copper Straight-Through cables.


 PC0 to Hub Port 1
 PC1 to Hub Port 2
 PC2 to Hub Port 3
 PC3 to Hub Port 4
 PC4 to Hub Port 5
 PC5 to Hub Port 6

4. Assign IP addresses to each PC:
 PC0: 192.168.1.1
 PC1: 192.168.1.2
 PC2: 192.168.1.3
 PC3: 192.168.1.4
 PC4: 192.168.1.5
 PC5: 192.168.1.6
 Subnet Mask: 255.255.255.0 (for all)

5. Go to Desktop > Command Prompt on PC0.

6. Use ping to test connectivity with other PCs.


 ping 192.168.1.2
 ping 192.168.1.3, etc.

7. Go to Simulation Mode and observe:


 Hub broadcasts packets to all connected devices.

Output:

Part B: Connecting 6 PCs with a Switch:

1. Repeat steps 1 and 2, but replace the Hub with a Switch (2960).

2. Connect the PCs to the Switch:


 PC0 to Switch Port Fa0/1

29
 PC1 to Fa0/2, ..., PC5 to Fa0/6

3. Assign the same IP addresses as used in Part A.

4. Ping other PCs from PC0.

5. Switch to Simulation Mode and observe:


 Switch learns MAC addresses and sends data only to the destination port.

Output:

Observation Table:
PC0 Ping PC0 Ping PC0 Ping PC0 Ping PC0 Ping Transmission
Device
PC1 PC2 PC3 PC4 PC5 Behavior
Hub Success Success Success Success Success Broadcast to all
Unicast to
Switch Success Success Success Success Success
destination

30
Acropolis Institute of Technology and Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Lab: AL-602 Computer Group / Title: Establishment of LAN by bus and star topology in Cisco
Networks Packet Tracer.
EVALUATION RECORD Type/ Lab Session:
Name Sheetal Patidar Enrollment No. 0827AL221121
Performing on First submission Second submission
Extra Regular

Grade and Remarks by the Tutor


1. Clarity about the objective of experiment
2. Clarity about the Outcome
3. Submitted the work in desired format
4. Shown capability to solve the problem
5. Contribution to the team work

Additional remarks

Grade: Cross the grade.


A B C D F

Tutor

1 Title: Establishment of LAN by bus and star topology in Cisco Packet Tracer.
2 Theory:
Step 1: Setting up Devices
1. Open Cisco Packet Tracer.
2. Drag and drop the following devices onto the workspace:
 PCs (from the ‘End Devices’ category)
 Switches (from the ‘Switches’ category)

Step 2: Connecting the Devices


1. Click on the ‘Connections’ icon (lightning bolt symbol) from the toolbar.
2. Select Copper Straight-Through Cable.
3. Connect each PC to a Switch by selecting FastEthernet0 on the PC and an available
port on the Switch.
4. Connect the 3 Switches together using Copper Cross-Over Cable, connecting one
switch's GigabitEthernet port to another switch’s GigabitEthernet port.

Step 3: Assigning IP Addresses


1. Click on each PC and go to the Desktop tab.
2. Open IP Configuration and manually assign the following IP addresses:
 PC1: 192.168.1.2
 PC2: 192.168.1.3

31
 PC3: 192.168.1.4
 PC4: 192.168.1.5
 PC5: 192.168.1.6
 PC6: 192.168.1.7
 Subnet Mask: 255.255.255.0 (same for all PCs)

Step 4: Testing Connectivity


1. Open the Command Prompt on any PC.
2. Use the ping command to test connectivity with other PCs, e.g.,
ping 192.168.1.3
3. If the reply is received, the network setup is successful.

3 Output:

32
Acropolis Institute of Technology and Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Group / Title: Connecting Two Different Networks Using a
Lab: AL-602 Computer
Networks Router in Cisco Packet Tracer

EVALUATION RECORD Type/ Lab Session:


Name Sheetal Patidar Enrollment No. 0827AL221121
Performing on First submission Second submission
Extra Regular

Grade and Remarks by the Tutor


1. Clarity about the objective of experiment
2. Clarity about the Outcome
3. Submitted the work in desired format
4. Shown capability to solve the problem
5. Contribution to the team work

Additional remarks

Grade: Cross the grade.


A B C D F

Tutor

1 Title: Connecting Two Different Networks Using a Router in Cisco Packet Tracer.

2 Objective:
To understand and implement the process of connecting two separate networks using a router
in Cisco Packet Tracer, enabling communication between devices in different subnets.

3 Theory:
In networking, routers are used to connect multiple networks and direct data packets between
them. Each network has its own IP addressing scheme (subnet), and routers facilitate
communication between these distinct networks by routing packets based on their destination IP
addresses.

4 Equipment Required:
 Cisco Packet Tracer software
 1 Router (e.g., 1841)
 2 Switches (e.g., 2960)
 4 PCs (2 for each network)
 Copper Straight-Through Cables

33
5 Procedure:
Step 1: Setting Up Devices
1. Open Cisco Packet Tracer.
2. Drag and drop the following devices onto the workspace:
 Router
 Switches
 PCs

Step 2: Connecting the Devices


1. Use Copper Straight-Through Cables to connect:
 PC0 and PC1 to Switch0
 PC2 and PC3 to Switch1
 Switch0 to Router's FastEthernet0/0
 Switch1 to Router's FastEthernet0/1

Step 3: Assigning IP Addresses


 Network 1 (Connected to FastEthernet0/0):
 PC0: IP Address: 192.168.1.2, Subnet Mask: 255.255.255.0, Default Gateway:
192.168.1.1
 PC1: IP Address: 192.168.1.3, Subnet Mask: 255.255.255.0, Default Gateway:
192.168.1.1

 Network 2 (Connected to FastEthernet0/1):


 PC2: IP Address: 192.168.2.2, Subnet Mask: 255.255.255.0, Default Gateway:
192.168.2.1
 PC3: IP Address: 192.168.2.3, Subnet Mask: 255.255.255.0, Default Gateway:
192.168.2.1

Step 4: Configuring the Router


1. Click on the Router and go to the CLI tab.
2. Enter the following commands:

Step 5: Testing Connectivity


1. From PC0, open the Command Prompt and ping PC2

34
2. From PC3, open the Command Prompt and ping PC1:

6 Output:

35
Acropolis Institute of Technology and Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Group / Title: Study & Simulation of Application Layer
Lab: AL-602 Computer
Networks Protocols – DNS, HTTP, FTP and DHCP

EVALUATION RECORD Type/ Lab Session:


Name Sheetal Patidar Enrollment No. 0827AL221121
Performing on First submission Second submission
Extra Regular

Grade and Remarks by the Tutor


1. Clarity about the objective of experiment
2. Clarity about the Outcome
3. Submitted the work in desired format
4. Shown capability to solve the problem
5. Contribution to the team work

Additional remarks

Grade: Cross the grade.


A B C D F

Tutor

1 Title: C Study & Simulation of Application Layer Protocols – DNS, HTTP, FTP and DHCP

2 Theory:

Application layer protocols are the topmost protocols in the OSI and TCP/IP models. They
enable user-level services such as browsing, file transfers, domain resolution, and remote
terminal access.

Protocol Descriptions:

1. DNS (Domain Name System)


 Purpose: Converts human-readable domain names (like www.google.com) into
IP addresses.
 Functionality: When a user enters a domain name in a browser, DNS resolves it
to the corresponding IP address, allowing communication between client and
server.
 Example: www.google.com → 142.250.77.100

2. HTTP (HyperText Transfer Protocol)


 Purpose: Used for transferring web pages and web content.

36
 Functionality: HTTP is a request-response protocol where the client (browser)
sends requests to a server, and the server sends back web content.
 Port Used: 80 (default)
 Limitation: Data is transferred in plain text (not secure).

3. HTTPS (HTTP Secure)


 Purpose: Secure version of HTTP with encryption.
 Functionality: Uses SSL/TLS to encrypt the data between client and server,
ensuring confidentiality and data integrity.
 Port Used: 443
 Use Case: Banking websites, login forms, payment gateways.

4. FTP (File Transfer Protocol)


 Purpose: Used to upload or download files between client and server.
 Functionality: Allows authenticated access to files and supports commands like
get, put, and list.
 Port Used: 21
 Modes: Active and Passive
 Use Case: Website file uploads, data backup.

5. DHCP (Dynamic Host Configuration Protocol)

 Purpose: Automatically assigns IP addresses and other network configuration


parameters to devices on a network.
 Functionality: Enables devices to obtain IP addresses, subnet masks, default
gateways, and DNS server information dynamically without manual configuration.
 Port Used: 67 (server), 68 (client)
 Limitation: Not secure by default; susceptible to spoofing and unauthorized
DHCP servers.
 Note: Essential for dynamic IP allocation in most modern networks.

37
3 Summary Table:

Full Port
Protocol Main Function Secure
Form No.

Domain
Resolves domain names
DNS Name 53 No
to IPs
System

HyperTex
HTTP t Transfer 80 Web content transfer No
Protocol

HTTP Secure web content


HTTPS 443 Yes
Secure transfer

File
Uploading/downloading
FTP Transfer 21 No
files
Protocol

Dynamic
Host
Automatically assign IP
DHCP Configur 67 No
address
ation
Protocol

38
Acropolis Institute of Technology and Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Group / Title: To simulate and understand the working of TCP
Lab: AL-602 Computer and UDP protocols by configuring DNS, FTP, Web, and Email
Networks servers in Cisco Packet Tracer.

EVALUATION RECORD Type/ Lab Session:


Name Sheetal Patidar Enrollment No. 0827AL221121
Performing on First submission Second submission
Extra Regular

Grade and Remarks by the Tutor


1. Clarity about the objective of experiment
2. Clarity about the Outcome
3. Submitted the work in desired format
4. Shown capability to solve the problem
5. Contribution to the team work

Additional remarks

Grade: Cross the grade.


A B C D F

Tutor

1 Title: To simulate and understand the working of TCP and UDP protocols by configuring
DNS, FTP, Web, and Email servers in Cisco Packet Tracer.

1 Theory:
 TCP (Transmission Control Protocol): A connection-oriented protocol ensuring
reliable data transmission between devices.
 UDP (User Datagram Protocol): A connectionless protocol that allows faster
data transmission without guaranteeing delivery.
 DNS (Domain Name System): Translates domain names into IP addresses.
 FTP (File Transfer Protocol): Facilitates the transfer of files between client and
server.
 Web Server (HTTP/HTTPS): Hosts websites and serves web pages to clients.
 Email Server (SMTP/POP3): Manages the sending and receiving of emails.

By configuring these servers, students can observe the behavior of TCP and UDP protocols in a
networked environment.

3 Equipment Required:
 Cisco Packet Tracer software
 1 DNS Server

39
 1 FTP Server
 1 Web Server
 1 Email Server
 2 Client PCs
 1 Switch
 Copper Straight-Through Cables

4 Procedure:

Step 1: Setting Up Devices


1. Launch Cisco Packet Tracer.
2. Add Devices:
 Drag and drop the following devices onto the workspace:
 1 Server (to be configured as DNS, FTP, Web, and Email Server)
 2 PCs (Clients)
 1 Switch
3. Connect Devices:
 Use Copper Straight-Through Cables to connect:
 Server to Switch
 PC0 to Switch
 PC1 to Switch
Step 2: Configuring the Server
1. Assign IP Address:
 Click on the Server → Go to the Desktop tab → Open IP Configuration.
 Set the following:
 IP Address: 192.168.1.1
 Subnet Mask: 255.255.255.0
2. Enable Services:
 Go to the Services tab on the Server.
 DNS Configuration:
 Navigate to DNS.
 Turn On the service.
 Add a new record:
 Name: www.example.com
 Address: 192.168.1.1
 FTP Configuration:
 Navigate to FTP.
 Turn On the service.
 Add user credentials:
 Username: user1
 Password: password
 HTTP Configuration:
 Navigate to HTTP.
 Ensure the service is On.
 You can customize the web page content if desired.
 Email Configuration:
 Navigate to EMAIL.
 Turn On both SMTP and POP3 services.

40
 Add user accounts:
 Username: user1
 Password: password
Step 3: Configuring Client PCs
1. Assign IP Addresses:
 For PC0:
 IP Address: 192.168.1.2
 Subnet Mask: 255.255.255.0
 Default Gateway: 192.168.1.1
 For PC1:
 IP Address: 192.168.1.3
 Subnet Mask: 255.255.255.0
 Default Gateway: 192.168.1.1
2. Configure DNS Settings:
 On both PCs, set the DNS Server to 192.168.1.1.
Step 4: Testing Connectivity
1. Ping Test:
 From PC0, open the Command Prompt.
 Execute: ping 192.168.1.1
 A successful reply indicates proper connectivity.
2. DNS Resolution Test:
 From PC0, in the Command Prompt, type: ping www.example.com
 If the DNS is configured correctly, it should resolve to 192.168.1.1.
3. FTP Access Test:
 From PC0, open the Command Prompt.
 Type: ftp 192.168.1.1
 Enter the credentials (user1 / password) to access the FTP server.
4. Web Access Test:
 From PC0, open the Web Browser.
 Navigate to http://www.example.com.
 The default web page from the server should display.
5. Email Test:
 From PC0, open the Email Client.
 Configure the account with:
 Incoming Mail Server (POP3): 192.168.1.1
 Outgoing Mail Server (SMTP): 192.168.1.1
 Username: user1
 Password: password
 Send a test email to user1@192.168.1.1 and check for reception.

41
5 Observation Table:

Source
Test Destination Expected Result
Device
Ping to Server PC0 192.168.1.1 Successful ping replies
DNS Resolution PC0 www.example.com Resolves to 192.168.1.1
Successful login with provided
FTP Access PC0 192.168.1.1
credentials
Web Access PC0 http://www.example.com Default web page displays
Email Email sent and received
PC0 user1@192.168.1.1
Send/Receive successfully

6 Output:

42
Acropolis Institute of Technology and Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Group / Title: Study & Simulation of MAC Protocols –
Lab: AL-602 Computer
Networks ALOHA, CSMA, CSMA/CD, CSMA/CA

EVALUATION RECORD Type/ Lab Session:


Name Sheetal Patidar Enrollment No. 0827AL221121
Performing on First submission Second submission
Extra Regular

Grade and Remarks by the Tutor


1. Clarity about the objective of experiment
2. Clarity about the Outcome
3. Submitted the work in desired format
4. Shown capability to solve the problem
5. Contribution to the team work

Additional remarks

Grade: Cross the grade.


A B C D F

Tutor

1 Title: Study & Simulation of MAC Protocols – ALOHA, CSMA, CSMA/CD, CSMA/CA

2 Objective:

To study and understand the working principles of multiple MAC layer protocols:
 Pure ALOHA
 CSMA (Carrier Sense Multiple Access)
 CSMA/CD (Collision Detection)
 CSMA/CA (Collision Avoidance)
and simulate scenarios in Cisco Packet Tracer demonstrating collision management and
medium access.

3 Theory:

Collision Medium
 Protocol Principle
Handling Sensing
Transmit Wait and retry
ALOHA No
immediately after collision
Sense before Avoids if busy,
CSMA Yes
transmit retries if collision

43
Collision Medium
 Protocol Principle
Handling Sensing
Sense + Detect Detects and backs
CSMA/CD Yes
+ Retry off
Avoids by waiting Yes (with
CSMA/CA Sense + Avoid
random time backoff)

4 Equipment Required:
 Cisco Packet Tracer
 1 or more Hubs
 1 or more Switches
 Multiple PCs
 Routers (if required for extended simulation)
 Copper Straight-Through and Cross-over Cables

5 Procedure:

1. Simulating ALOHA Protocol


Concept: Nodes transmit without sensing the medium, causing frequent collisions.
Setup Steps:
1. Open Cisco Packet Tracer.
2. Place:
o 1 Hub (simulate shared medium)
o 3 PCs (end devices)
3. Connect all PCs to the Hub using Straight-through cables.
4. Assign all PCs IPs in the same network (e.g. 192.168.1.x).
5. Open the Simulation Mode.
6. Send PDU (packet) from PC0 to PC1 and from PC2 to PC1 at the same time.
7. Observe collisions in simulation.
Observation:
 Multiple PCs transmitting at the same time → collision occurs.
 No sensing or retry logic → packets are lost.

2. Simulating CSMA Protocol


Concept: Listen before sending. No collision detection.
Setup Steps:
1. Use the same setup as ALOHA.
2. Replace the Hub with a Switch (which reduces collision domain).
3. Send packets from PC0 and PC2 to PC1 with a small delay between transmissions.
4. In simulation mode, observe whether the second transmission waits for the medium to
clear.
Observation:
 If the medium is busy, the second packet waits (simulating CSMA behavior).
 Packets do not collide easily due to carrier sensing.

44
3. Simulating CSMA/CD Protocol
Concept: Listen → Transmit → Detect Collision → Retransmit after a delay.
Setup Steps:
1. Use Hub again (shared medium = collision domain).
2. Place 3 PCs and connect them to the hub.
3. Assign same subnet IPs.
4. Open simulation mode.
5. Send packets simultaneously from PC0 and PC2 to PC1.
6. Observe:
 If a collision occurs, packet is retried.
 Delays can be configured to simulate backoff.
Cisco Packet Tracer does not explicitly simulate CSMA/CD logic, but using hubs helps us infer
collision scenarios.

4. Simulating CSMA/CA Protocol


Concept: Wireless medium → avoid collision by waiting a random backoff time before
transmitting.
Setup Steps:
1. Use Wireless Router.
2. Place:
 1 Wireless Router
 3 Laptops or PCs with Wireless NICs
3. Connect all wireless PCs to the router via WiFi.
4. Assign dynamic IPs via DHCP or configure static IPs.
5. Open simulation mode.
6. Send packets from multiple wireless devices to a single destination at similar times.
7. Observe:
 Delays before transmissions (backoff/waiting).
 No collision occurs (simulated CSMA/CA behavior).

6 Observation Table:

Topology Medium Collision Collision


Protocol
Used Type Observed Handling
Wired
ALOHA Hub Yes None
(Shared)
Wait and
CSMA Switch Wired Rare
Retry
Wired Detect +
CSMA/CD Hub Yes
(Shared) Retry
Wait
CSMA/CA Wireless Wireless Avoided Before
Send

45

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy