Data Comm. Lab
Data Comm. Lab
1
end of the cable. Using the 568-B standard as an example below it is shown that Pin 1 on connector
A goes to Pin 3 on connector B. Pin 2 on connector A goes to Pin 6 on connector B etc. Crossover
cables are most commonly used to connect two hosts directly. Examples would be connecting a
computer directly to another computer, connecting a switch directly to another switch, or connecting
a router to a router. Note: While in the past when connecting two host devices directly a crossover
cable was required. Now days most devices have auto sensing technology that detects the cable
and device and crosses pairs when needed.
2
3
EXPERIMENT 2 13 January 2016
Tool used:-
Crimping tool
A crimping tool is a device used to conjoin two pieces of metal by deforming
one or both of them in a way that causes them to hold each other. The
4
result of the tool's work is called a crimp. A good example of crimping is the
process of affixing a connector to the end of a cable. For instance, network
cables and phone cables are created using a crimping tool (shown below) to
join the RJ-45 and RJ-11 connectors to the both ends of either phone
or CAT5 cable.
5
6
7
EXPERIMENT 3 20 January 2016
,Aim:- Introduction to connecting devices.
To understand what connecting devices are, it is important to know
about Backbone Networks. Backbone Network is a means of
connecting 2 LAN’s. It provides a transmission channel for packets
from being transmitted from one LAN to the other. The individual
LAN’s are connected to the Backbone Network by using some types
of devices such as Hubs, Repeaters, Switches, Bridges, Routers and
Gateways.
Hub:-
A hub works in the physical layer of the OSI model. It is basically a
non-intelligent device, and has no decision making capability. What
a Hub basically does is take the input data from one of the ports and
broadcast the information to all the other ports connected to the
network.
8
Fig 1: 4 port network
To demonstrate its working, consider a 4 port network as shown in
Fig 1. There are 4 computers connected to the 4 ports. Suppose, if
Computer A wants to send some data to Computer B using a Hub,
then, Computer A broadcasts the data on the network, and
Computer B, being connected to the network, has access to the
data. But, in this case all the other ports connected to the network
has access to the data that is being transmitted by Computer A. This
happens because, the Hub works in the Physical Layer and hence it
does not know about the MAC addresses of the ports connected to
the network. So, there is a lack of security in the Hub.
Fig 2: USB Hub
9
The picture shows a USB Hub, wherein the data is fed into the input
port and is broadcasted to all the other 4 ports. The Network Hubs
are outdated and are out of the market.
Repeater:-
A repeater is a device similar to the Hub, but has additional
features. It also works in the Physical layer. The repeaters are used
in places where amplification of input signal is necessary. But, the
kind of amplification done by the repeater is different from the
regular amplification by amplifiers. The regular amplifies everything
fed into it. That means, if the input signal has noise induced into it,
both the desired signal and noise signal are together amplified. But,
in the case of a repeater, it regenerates the input signal, and
amplifies only the desirable signal. Hence, the noise component of
the signal is eliminated.
Fig 3: Repeater
The repeaters are necessary since, during the transmission of the
signals over long distances, the signal has attenuation, delay
10
distortions and noise, which lead in loss of data. Hence, in order to
prevent this, the regenerative repeaters are used. Hence, the
repeater regenerates the faded signal. In addition, it has all the
features of a Hub. One common problem between the repeaters and
the Hubs are that only one transmission can take place on the
network at a particular time. If multiple devices transmit data
simultaneously, there will be data collision.
Switch:-
A switch is an intelligent device that works in the data link layer.
The term intelligent refers to the decision making capacity of the
Switch. Since it works in the Data link layer, it has knowledge of the
MAC addresses of the ports in the network.
Fig 4: Switch
Hence, in the Fig 1, if data has to be sent from Computer A to
Computer B, then, the data is transferred to the Computer B only,
and not to any other computers connected on the network. Hence, it
11
establishes a link between the sender and the receiver based on the
MAC addresses. This also means that when data is being sent from A
to B, Computer C can establish a link with Computer D and
communication can take place between them. So, simultaneous data
transfer is possible in a switch. Also, Hub divides bandwidth, but a
Switch does not.
It is also to be noted that a switch is a secure device, because it
sends information only to the desired destinations, and also certain
security features such as firewalls can be implemented in the
Switches.
Bridge:-
A bridge is also a device which works in the Data Link Layer, but is
more primitive when compared to a switch. Initial bridges were used
to connect only 2 LAN’s, but the most recent ones perform similar
operation as the switches. It also works on the principle of transfer
of information using the MAC addresses of the ports.
Fig 5: Bridge
It can be noted is that the normal ADSL modem can be connected via
bridging also. The only difference is that, when bridging is used,
12
each time the device has to be connected to the internet, it has to
dial to the internet and establish a connection. Also, a bridge alone
cannot be used to connect to the internet, because, the bridge
works in the Data Link Layer, and has no knowledge of the IP
Addresses, which are used in the Internet.
Router:-
Any computer can be connected to the internet via MODEM, which
performs the MOdulation and the DEModulation operations. But,
when there is more than one computer at home or in an
organization, and we have a single internet connection, we need a
Router. Router is a device which is used when multiple devices need
to connect to the Internet using the same IP.
Any Internet Service Provider (ISP) provides a single IP, and
especially for personal use, the IP address is assigned dynamically.
This is done because, suppose, an ISP has 1000 IP addresses, it does
not mean that it has 1000 customers. An ISP assumes that not all
devices will be connected to the internet at the same time. Hence,
when a user wants to access the internet, any IP address from the
pool of IP addresses from the ISP will be assigned to connect the
user to the internet.
13
Fig 6: Router
Hence, the router does the job of connecting multiple devices in a
LAN to the internet using the same IP address. Since the router
works in the Network Layer, it does forwarding on the basis of IP
addresses.
Brouter or Bridge:-
Brouter (Bridging Router) is a device which has two functions.
Brouter acts as a router for known protocols (known by the router
and those on the network) and hence works in the network layer.
For data packets with unknown protocols, it acts as a bridge by
connecting two different networks which is the function of a bridge -
and this works in the data-link layer.
Gateway:-
The Gateway devices work in the Transport layer and above, where
the different network technologies are implemented. A gateway is
necessary when there are different technologies implemented by the
different LAN’s which are to be connected together.
14
Fig 7: Gateway function
The Fig 7 shows the working of a gateway. Consider 2 networks, say
in New York, and a network in London. If data has to be sent from
one place to another, we need to ensure that the network
technologies that are being used by both the networks are the same.
If not, we need to use a Gateway.
15
EXPERIMENT 4 27January 2016
Step2:- Configure the IP addresses of the PC and the server.
16
17
Step4:- Type the IP address of the HTTP server.
18
Step5:- Configure the DNS settings of the server so that we can open
the webpage by directly entering the name.
Step6:- Open the web page by using the name of the web page.
19
Result :- The connection is successfully set up.
20
EXPERIMENT 5 03 February 2016
21
Step1:- Set up the connections b/w the host and the hub using star
topology.
Step2:- Configure the IP addresses of the hosts.
22
Step3:- Switch to Simulation panel and set the ARP and ICMP filters.
23
Step4:- Open the ARP tables of all the hosts.
24
Step5:- Send a simple PDU from PC0 to PC2 and PC0 will obtain the
MAC address of the PC2 using ARP.
Result:- The LAN was successfully established using star
topology
25
EXPERIMENT 6
Aim:- Configuring a router in a network topology.
Step1:- Set up the basic connection between the two PCs using
router.
Step2:- Open the command line interface of the router and enter
the following commands
26
Step3:- Set the IP configuration of both the PCs.
27
Step4:- Now in simulation mode send a simple PDU from PC 2 to PC
3.
28
Result:- The router was successfully configured.
16 March 2016
29
EXPERIMENT 7
Aim:- To implement concept of subnetting in ring
topology.
Step1:- Set up the ring basic ring topology as shown in figure.
Step2:- Configure all the four end devices by setting up their IP
addresses and subnet masks.
30
Step3:- Send a message from one end device to another.
31
Step4:- The message is successfully sent from one end device to
another.
32
33
EXPERIMENT 8
Aim:- To setup DHCP (Dynamic Host Control
Protocol) of a router.
Step1:- Set up the network as shown in the figure.
Step2:- Now configure the router as shown in the figure below.
34
35
Step3:- The IP addresses are allotted to the devices as shown in the
figure.
Step4:- The message is successfully sent from one host to another.
36
Result:- The DHCP of router was successfully established.
37
EXPERIMENT 9 30 March 2016
Aim:- To perform static routing in routers.
Step1:- Set up the network as shown in the figure below.
Step2:- Now configure the routers and hosts and assign the IP
addresses to hosts and routers statically as shown in figure.
38
Step3:- Configure Routers R0 and R1 in CLI so that they can send
messages between each other.
Step4:- Check the network status by sending an ICMP packet.
39
The message was successfully sent from one device to another.
Result:- Successfully performed static routing in routers.
EXPERIMENT 10
40
Aim:- To configure telnet in a network.
Step1:- Set up the network as given in the figure below.
Step2:- Now configure the routers, switches and end devices by
providing the IP addresses and Default Gateways and establish the
connection between the two routers . Assign the IP addresses as
shown in the figure below.
41
Step3:- Configure the Router Router1 in CLI as shown in the figure
below.
42
Step4:- Now send a ping request and telnet request from PC0’s
Command Line as shown in the figure below.
Result:- The telnet was successfully configured in a network.
43