Sheetal CN
Sheetal CN
Acropolis Institute of
Technology and
Research, Indore
Department of CSE
Submitted To: Asst. Prof. Jaya Dubey
(Artificial Intelligence & Machine
Learning)
Sheetal Patidar
0827AL221121
AL_T-2/3rd Year / 6th Sem
The Objective of this laboratory work is to enlighten the student with knowledge base in Computer
Networks and its applications. Also demonstrate a working understanding of various networking
protocols, network configurations, and troubleshooting techniques using simulation tools like Cisco
Packet Tracer.
ACROPOLIS INSTITUTE OF TECHNOLOGY &
RESEARCH, INDORE
CERTIFICATE
This is to certify that the experimental work entered in this journal as per
the B. TECH. III year syllabus prescribed by the RGPV was done by Ms.
In this lab, students will be able to learn and practice Computer Network concepts.
Students can expand their skill set by getting hands-on experience with various
networking tools and techniques. In this lab, simulation tools like Cisco Packet Tracer
are used to provide exposure to real-world network design, configuration, and
troubleshooting. The concepts and practical sessions in this lab focus on network
models, protocols, IP addressing, routing, switching, and basic network security.
The outcome of this lab is to make students understand the foundational and
advanced aspects of networking by giving them practical knowledge of how networks
operate and how to manage and secure them efficiently
3
GENERAL INSTRUCTIONS FOR LABORATORY CLASSES
DO’S
While entering into the LAB students should wear their ID cards.
Students should come with observation and record note book to the
laboratory.
After completing the laboratory exercise, make sure to shut down the
system properly.
DONT’S
4
SYLLABUS
Course: AL602 Computer Networks
Branch/Year/Sem: Artificial Intelligence & Machine Learning / III / VI
Module1: Computer Network: Definitions, goals, components, Architecture, Classifications & Types.
Layered Architecture: Protocol hierarchy, Design Issues, Interfaces and Services, Connection Oriented
& Connectionless Services, Service primitives, Design issues & its functionality. ISOOSI Reference Model:
Principle, Model, Descriptions of various layers and its comparison with TCP/IP. Principals of physical layer:
Media, Bandwidth, Data rate and Modulations
Module 2: Data Link Layer: Need, Services Provided, Framing, Flow Control, Error control. Data Link Layer
Protocol: Elementary & Sliding Window protocol: 1-bit, Go-Back-N, Selective Repeat, Hybrid ARQ. Protocol
verification: Finite State Machine Models & Petri net models. ARP/RARP/GARP
Module 3: MAC Sub layer: MAC Addressing, Binary Exponential Back-off (BEB) Algorithm, Distributed
Random Access Schemes/Contention Schemes: for Data Services (ALOHA and Slotted ALOHA), for Local-
Area Networks (CSMA, CSMA/CD, CSMA/CA), Collision Free Protocols: Basic Bit Map, BRAP, Binary Count
Down, MLMA Limited Contention Protocols: Adaptive Tree Walk, Performance Measuring Metrics. IEEE
Standards 802 series & their variant.
Module 4: Network Layer: Need, Services Provided , Design issues, Routing algorithms: Least Cost
Routing algorithm, Dijkstra's algorithm, Bellman-ford algorithm, Hierarchical Routing, Broadcast Routing,
Multicast Routing. IP Addresses, Header format, Packet forwarding, Fragmentation and reassembly, ICMP,
Comparative study of IPv4 & IPv6
Module 5: Transport Layer: Design Issues, UDP: Header Format, Per-Segment Checksum, Carrying
Unicast/Multicast Real-Time Traffic, TCP: Connection Management, Reliability of Data Transfers,
TCP Flow Control, TCP Congestion Control, TCP Header Format, TCP Timer Management. Application Layer:
WWW and HTTP, FTP, SSH, Email (SMTP, MIME, IMAP), DNS, Network Management (SNMP).
5
RATIONALE:
The aim of this subject is to explore the core concepts, structure, and communication rules of
computer networks, and to understand how these networks facilitate data exchange between devices
while connecting with various areas of computer science and engineering.
Course Objectives
1. An understanding of the overriding principles of computer networking, including
protocol design, protocol layering, algorithm design, and performance evaluation.
2. An understanding of computer networking theory, including principles embodied in the
protocols designed for the application layer, transport layer, network layer, and link layer
of a networking stack.
3. An understanding of specific implemented protocols covering the application layer,
transport layer, network layer, and link layer of the Internet (TCP/IP) stack
4. An understanding of various security issues.
Course Outcomes
1. Describe the essential principles of Network Layers. Characterize and appreciate
computer networks from the viewpoint of components and from the viewpoint of
services (Knowledge & design of networks)
2. Display good understanding of the flow of a protocol in general and a network
protocol in particular (Knowledge of protocols)
3. Model a problem or situation in terms of layering concept and map it to the TCI/IP
stack. (Modeling & Real-world mapping)
4. Select the most suitable Application Layer protocol (such as HTTP, FTP, SMTP, DNS,
Bit torrent) as per the requirements of the network application and work with
available tools to demonstrate the working of these protocols (Problem analysis &
implementation)
5. Design a Reliable Data Transfer Protocol and incrementally develop solutions for the
requirements of Transport Layer. Use IP addressing to create subnets for any specific
requirements (Problem identification & Implementation.
6
Index
Grade &
Date of Page Date of
S.No Name of the Experiment Sign of the
Exp. No. Submission
Faculty
1 8-10
Study of Different Type of LAN& Network
Equipment.
Additional remarks
Tutor
2 Objective:
To understand the different types of Local Area Networks (LAN) and to study the functionality
and purpose of various networking equipment used in LAN setups.
3 Theory: A Local Area Network (LAN) is a group of computers and network devices connected
together, usually within the same building. It enables sharing of resources such as files, printers,
and internet access.
Types of LAN:
3. Peer-to-Peer LAN: All computers have equal status and share resources without a
dedicated server.
machines.
Equipment Description
Router Connects multiple networks together; routes data from
one network to another (e.g., LAN to Internet).
Switch Connects multiple devices within a LAN; manages data
traffic efficiently using MAC addresses.
Hub Basic device that connects devices in a LAN; sends data
to all connected devices (less secure and slower).
Modem Converts digital data to analog for transmission over
telephone lines and vice versa.
Network Interface Card (NIC) Hardware component that connects a computer to a
network.
Access Point (AP) Extends a wired LAN by adding Wi-Fi capability.
Cables (UTP/STP/Fiber Optic) Used in wired LANs to transmit data signals.
Firewall Monitors and controls incoming/outgoing network traffic
for security.
10
4 Apparatus / Equipment Required:
Router
Switch
Hub
Modem
Cables (UTP/STP)
NIC Cards
Access Point (optional)
Laptop/PC
Network Simulation Tool (like Cisco Packet Tracer) (optional)
5 Procedure:
1. Identify and label the networking equipment physically or via simulation.
2. Note the ports and indicator lights on each device.
3. Observe the connections:
Router to Modem
Switch to multiple PCs
Access Point for wireless connections
4. Study the use of UTP cables and RJ-45 connectors.
5. Understand how data is transferred between devices.
6. If using simulation software, create a basic LAN setup.
11
Acropolis Institute of Technology and Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Lab: AL-602 Computer Group / Title: Study and Verification of standard Network
Networks topologies i.e. Star, Bus, Ring etc.
EVALUATION RECORD Type/ Lab Session:
Name Sheetal Patidar Enrollment No. 0827AL221121
Performing on First submission Second submission
Extra Regular
Additional remarks
Tutor
1 Title: Study and Verification of standard Network topologies i.e. Star, Bus, Ring etc.
2 Objective:
To study and verify the working of various standard network topologies such as Star, Bus, Ring,
Mesh, and Hybrid using physical components or simulation tools.
3 Theory:
A network topology refers to the layout or arrangement of various elements (links, nodes,
etc.) of a computer network. It defines how devices are interconnected and how data
flows within the network.
12
Types of Network Topologies:
1. Star Topology:
All devices are connected to a central hub or switch.
If the central hub fails, the entire network fails.
Easy to install and manage.
2. Bus Topology:
All devices are connected to a single central cable (the bus).
Terminators are used at both ends.
Inexpensive but less efficient with high traffic.
3. Ring Topology:
Devices are connected in a circular fashion.
Each device has exactly two neighbors.
Data travels in one direction (or two in dual ring).
4. Mesh Topology:
13
Every device is connected to every other device.
Provides high redundancy and reliability.
Complex and expensive.
5. Hybrid Topology:
Combination of two or more topologies (e.g., Star-Bus).
Flexible and scalable.
5 Procedure:
1. Star Topology:
Connect all computers to a central switch using UTP cables.
Verify communication between devices using ping command or file sharing.
2. Bus Topology:
Connect all devices to a single backbone cable.
Attach terminators at both ends of the cable.
Check connectivity using ping or data sharing.
3. Ring Topology:
Connect devices in a closed loop (via simulation).
Send data to verify it travels in a circular path.
4. Mesh Topology:
(Preferably via simulation) connect every device to every other.
Verify multiple paths of communication.
5. Hybrid Topology:
Design a combination network (e.g., two star topologies connected by a bus).
14
Observe communication behavior and analyze reliability.
6 Observations:
Connectivity
Setup
Topology Equipment Used Successful Remarks
Time
(Yes/No)
1 Switch, 4 PCs, UTP 10 Easy to set up, centralized
Star Yes
cables mins communication
1 Backbone cable Simulated using linear
12
Bus (represented), 6 PCs, Yes connections in Packet
mins
terminators Tracer
Used manual
4 PCs connected in a closed 15
Ring Yes configuration to simulate
loop mins
circular data flow
4 PCs, each connected to all 20 More complex, high
Mesh Yes
others mins redundancy observed
Combination of Star and
18 Demonstrated flexibility
Hybrid Bus topologies (2 stars Yes
mins and scalability
connected via bus)
15
Acropolis Institute of Technology and Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Lab: AL-602 Computer
Group / Title: LAN Installations and Configurations
Networks
EVALUATION RECORD Type/ Lab Session:
Name Sheetal Patidar Enrollment No. 0827AL221121
Performing on First submission Second submission
Extra Regular
Additional remarks
Tutor
2 Objective:
To learn and perform the installation and configuration of a Local Area Network (LAN) using
appropriate hardware and software components.
3 Theory:
A Local Area Network (LAN) is a network that connects computers and devices within a
limited geographical area such as a home, school, or office building. It allows users to
share files, resources, and internet connections.
LAN Installation involves setting up the hardware infrastructure and cabling to enable
communication between devices.
LAN Configuration includes assigning IP addresses, setting up file/printer sharing, and
ensuring devices can communicate over the network.
16
4 Apparatus / Equipment Required:
Computers/Laptops with NICs
Network Switch or Hub
UTP Cables with RJ-45 connectors
Crimping Tool (if creating cables)
Router (optional, for internet sharing)
Cisco Packet Tracer (for simulation)
Operating System with Networking Support (Windows/Linux)
5 Procedure:
Hardware Installation:
1. Connect each computer to the switch using UTP cables.
2. Ensure NICs are properly installed and functional.
3. Power on the switch and all connected devices.
17
Acropolis Institute of Technology and Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Lab: AL-602 Computer Group / Title: Execution and Study of Basic Networking
Networks Commands
EVALUATION RECORD Type/ Lab Session:
Name Sheetal Patidar Enrollment No. 0827AL221121
Performing on First submission Second submission
Extra Regular
Additional remarks
Tutor
2 Objective:
To understand the usability and practical application of various networking commands in the
Windows command prompt environment and interpret their output.
3 Theory:
Networking commands allow users and administrators to troubleshoot, configure, and
monitor network settings and connections. These are essential in understanding the
status of a network and diagnosing issues.
18
Command and Variants:
1. ipconfig
Displays IP address, subnet mask, and default gateway.
Output Example:
2. ipconfig /all
Shows detailed configuration including MAC address, DHCP, DNS.
Output Example:
Sample Output:
19
c) nslookup – Name Server Lookup
Usability: Queries DNS to obtain domain name or IP address mapping.
Tested Domains:
1. nslookup google.com
2. nslookup microsoft.com
3. nslookup gmail.com
4. nslookup openai.com
5. nslookup wikipedia.org
Sample Output:
20
d) tracert – Trace Route
Usability: Displays route and measures transit delays of packets across a network.
Tested Domains:
1. tracert google.com
2. tracert openai.com
3. tracert microsoft.com
4. tracert gmail.com
5. tracert github.com
Sample Output:
Sample Output:
22
Acropolis Institute of Technology and Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Lab: AL-602 Computer Describe IPv4 Address Structure and Class A,B,C
Group / Title:
Networks and D address.
EVALUATION RECORD Type/ Lab Session:
Name Sheetal Patidar Enrollment No. 0827AL221121
Performing on First submission Second submission
Extra Regular
Additional remarks
Tutor
1 Title: Describe IPv4 Address Structure and Class A,B,C and D address.
2 Theory:
IPv4 addresses are 32-bit numerical addresses represented in dotted decimal notation.
Each address consists of four octets (8 bits each) separated by dots. Example:
192.168.1.1.
1. Class A:
Range: 1.0.0.0 to 126.255.255.255
Default Subnet Mask: 255.0.0.0
Supports large networks with many hosts.
23
First bit is always 0.
Example: 10.0.0.1
2. Class B:
Range: 128.0.0.0 to 191.255.255.255
Default Subnet Mask: 255.255.0.0
Suitable for medium-sized networks.
First two bits are 10.
Example: 172.16.0.1
3. Class C:
Range: 192.0.0.0 to 223.255.255.255
Default Subnet Mask: 255.255.255.0
Used for small networks.
First three bits are 110.
Example: 192.168.1.1
24
Acropolis Institute of Technology and Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Lab: AL-602 Computer Group / Title: Study and installation of Cisco Packet Tracer and
Networks establish a basic network connection between a PC and a Switch.
EVALUATION RECORD Type/ Lab Session:
Name Sheetal Patidar Enrollment No. 0827AL221121
Performing on First submission Second submission
Extra Regular
Additional remarks
Tutor
1 Title: Study and installation of Cisco Packet Tracer and establish a basic network connection
between a PC and a Switch.
2 Software Required:
Cisco Packet Tracer (latest version)
Operating System: Windows/Linux
3 Hardware Required:
25
1. Open the downloaded installer file.
2. Follow the installation wizard by clicking 'Next'.
3. Accept the license agreement and proceed with the default installation settings.
4. Click ‘Install’ and wait for the process to complete.
5. Once installed, launch Cisco Packet Tracer and log in using the NetAcad credentials.
6. Verify the successful installation by opening a new workspace.
1. Click on the ‘Connections’ icon (lightning bolt symbol) from the toolbar.
2. Select Copper Straight-Through Cable.
3. Click on the PC, then select the FastEthernet0 port.
4. Click on the Switch, then select any FastEthernet port (e.g., FastEthernet0/1).
5. A solid green connection should appear, indicating a successful physical connection.
26
4 Sample Output:
27
Acropolis Institute of Technology and Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Lab: AL-602 Computer Group / Title: To study and compare the working of a Hub and a
Networks Switch in a LAN setup in Cisco Packet Tracer.
EVALUATION RECORD Type/ Lab Session:
Name Sheetal Patidar Enrollment No. 0827AL221121
Performing on First submission Second submission
Extra Regular
Additional remarks
Tutor
1 Title: To study and compare the working of a Hub and a Switch in a LAN setup in Cisco Packet
Tracer.
2 Theory:
A Hub is a basic networking device that transmits data to all ports.
A Switch is an intelligent device that transmits data only to the intended port,
using MAC addresses.
4 Procedure:
28
6 PCs (from End Devices)
1 Hub (from Hubs)
Output:
1. Repeat steps 1 and 2, but replace the Hub with a Switch (2960).
29
PC1 to Fa0/2, ..., PC5 to Fa0/6
Output:
Observation Table:
PC0 Ping PC0 Ping PC0 Ping PC0 Ping PC0 Ping Transmission
Device
PC1 PC2 PC3 PC4 PC5 Behavior
Hub Success Success Success Success Success Broadcast to all
Unicast to
Switch Success Success Success Success Success
destination
30
Acropolis Institute of Technology and Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Lab: AL-602 Computer Group / Title: Establishment of LAN by bus and star topology in Cisco
Networks Packet Tracer.
EVALUATION RECORD Type/ Lab Session:
Name Sheetal Patidar Enrollment No. 0827AL221121
Performing on First submission Second submission
Extra Regular
Additional remarks
Tutor
1 Title: Establishment of LAN by bus and star topology in Cisco Packet Tracer.
2 Theory:
Step 1: Setting up Devices
1. Open Cisco Packet Tracer.
2. Drag and drop the following devices onto the workspace:
PCs (from the ‘End Devices’ category)
Switches (from the ‘Switches’ category)
31
PC3: 192.168.1.4
PC4: 192.168.1.5
PC5: 192.168.1.6
PC6: 192.168.1.7
Subnet Mask: 255.255.255.0 (same for all PCs)
3 Output:
32
Acropolis Institute of Technology and Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Group / Title: Connecting Two Different Networks Using a
Lab: AL-602 Computer
Networks Router in Cisco Packet Tracer
Additional remarks
Tutor
1 Title: Connecting Two Different Networks Using a Router in Cisco Packet Tracer.
2 Objective:
To understand and implement the process of connecting two separate networks using a router
in Cisco Packet Tracer, enabling communication between devices in different subnets.
3 Theory:
In networking, routers are used to connect multiple networks and direct data packets between
them. Each network has its own IP addressing scheme (subnet), and routers facilitate
communication between these distinct networks by routing packets based on their destination IP
addresses.
4 Equipment Required:
Cisco Packet Tracer software
1 Router (e.g., 1841)
2 Switches (e.g., 2960)
4 PCs (2 for each network)
Copper Straight-Through Cables
33
5 Procedure:
Step 1: Setting Up Devices
1. Open Cisco Packet Tracer.
2. Drag and drop the following devices onto the workspace:
Router
Switches
PCs
34
2. From PC3, open the Command Prompt and ping PC1:
6 Output:
35
Acropolis Institute of Technology and Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Group / Title: Study & Simulation of Application Layer
Lab: AL-602 Computer
Networks Protocols – DNS, HTTP, FTP and DHCP
Additional remarks
Tutor
1 Title: C Study & Simulation of Application Layer Protocols – DNS, HTTP, FTP and DHCP
2 Theory:
Application layer protocols are the topmost protocols in the OSI and TCP/IP models. They
enable user-level services such as browsing, file transfers, domain resolution, and remote
terminal access.
Protocol Descriptions:
36
Functionality: HTTP is a request-response protocol where the client (browser)
sends requests to a server, and the server sends back web content.
Port Used: 80 (default)
Limitation: Data is transferred in plain text (not secure).
37
3 Summary Table:
Full Port
Protocol Main Function Secure
Form No.
Domain
Resolves domain names
DNS Name 53 No
to IPs
System
HyperTex
HTTP t Transfer 80 Web content transfer No
Protocol
File
Uploading/downloading
FTP Transfer 21 No
files
Protocol
Dynamic
Host
Automatically assign IP
DHCP Configur 67 No
address
ation
Protocol
38
Acropolis Institute of Technology and Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Group / Title: To simulate and understand the working of TCP
Lab: AL-602 Computer and UDP protocols by configuring DNS, FTP, Web, and Email
Networks servers in Cisco Packet Tracer.
Additional remarks
Tutor
1 Title: To simulate and understand the working of TCP and UDP protocols by configuring
DNS, FTP, Web, and Email servers in Cisco Packet Tracer.
1 Theory:
TCP (Transmission Control Protocol): A connection-oriented protocol ensuring
reliable data transmission between devices.
UDP (User Datagram Protocol): A connectionless protocol that allows faster
data transmission without guaranteeing delivery.
DNS (Domain Name System): Translates domain names into IP addresses.
FTP (File Transfer Protocol): Facilitates the transfer of files between client and
server.
Web Server (HTTP/HTTPS): Hosts websites and serves web pages to clients.
Email Server (SMTP/POP3): Manages the sending and receiving of emails.
By configuring these servers, students can observe the behavior of TCP and UDP protocols in a
networked environment.
3 Equipment Required:
Cisco Packet Tracer software
1 DNS Server
39
1 FTP Server
1 Web Server
1 Email Server
2 Client PCs
1 Switch
Copper Straight-Through Cables
4 Procedure:
40
Add user accounts:
Username: user1
Password: password
Step 3: Configuring Client PCs
1. Assign IP Addresses:
For PC0:
IP Address: 192.168.1.2
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.1.1
For PC1:
IP Address: 192.168.1.3
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.1.1
2. Configure DNS Settings:
On both PCs, set the DNS Server to 192.168.1.1.
Step 4: Testing Connectivity
1. Ping Test:
From PC0, open the Command Prompt.
Execute: ping 192.168.1.1
A successful reply indicates proper connectivity.
2. DNS Resolution Test:
From PC0, in the Command Prompt, type: ping www.example.com
If the DNS is configured correctly, it should resolve to 192.168.1.1.
3. FTP Access Test:
From PC0, open the Command Prompt.
Type: ftp 192.168.1.1
Enter the credentials (user1 / password) to access the FTP server.
4. Web Access Test:
From PC0, open the Web Browser.
Navigate to http://www.example.com.
The default web page from the server should display.
5. Email Test:
From PC0, open the Email Client.
Configure the account with:
Incoming Mail Server (POP3): 192.168.1.1
Outgoing Mail Server (SMTP): 192.168.1.1
Username: user1
Password: password
Send a test email to user1@192.168.1.1 and check for reception.
41
5 Observation Table:
Source
Test Destination Expected Result
Device
Ping to Server PC0 192.168.1.1 Successful ping replies
DNS Resolution PC0 www.example.com Resolves to 192.168.1.1
Successful login with provided
FTP Access PC0 192.168.1.1
credentials
Web Access PC0 http://www.example.com Default web page displays
Email Email sent and received
PC0 user1@192.168.1.1
Send/Receive successfully
6 Output:
42
Acropolis Institute of Technology and Research, Indore
Department of CSE (Artificial Intelligence & Machine Learning)
Group / Title: Study & Simulation of MAC Protocols –
Lab: AL-602 Computer
Networks ALOHA, CSMA, CSMA/CD, CSMA/CA
Additional remarks
Tutor
1 Title: Study & Simulation of MAC Protocols – ALOHA, CSMA, CSMA/CD, CSMA/CA
2 Objective:
To study and understand the working principles of multiple MAC layer protocols:
Pure ALOHA
CSMA (Carrier Sense Multiple Access)
CSMA/CD (Collision Detection)
CSMA/CA (Collision Avoidance)
and simulate scenarios in Cisco Packet Tracer demonstrating collision management and
medium access.
3 Theory:
Collision Medium
Protocol Principle
Handling Sensing
Transmit Wait and retry
ALOHA No
immediately after collision
Sense before Avoids if busy,
CSMA Yes
transmit retries if collision
43
Collision Medium
Protocol Principle
Handling Sensing
Sense + Detect Detects and backs
CSMA/CD Yes
+ Retry off
Avoids by waiting Yes (with
CSMA/CA Sense + Avoid
random time backoff)
4 Equipment Required:
Cisco Packet Tracer
1 or more Hubs
1 or more Switches
Multiple PCs
Routers (if required for extended simulation)
Copper Straight-Through and Cross-over Cables
5 Procedure:
44
3. Simulating CSMA/CD Protocol
Concept: Listen → Transmit → Detect Collision → Retransmit after a delay.
Setup Steps:
1. Use Hub again (shared medium = collision domain).
2. Place 3 PCs and connect them to the hub.
3. Assign same subnet IPs.
4. Open simulation mode.
5. Send packets simultaneously from PC0 and PC2 to PC1.
6. Observe:
If a collision occurs, packet is retried.
Delays can be configured to simulate backoff.
Cisco Packet Tracer does not explicitly simulate CSMA/CD logic, but using hubs helps us infer
collision scenarios.
6 Observation Table:
45