Laboratory Manual: Government Polytechnic Porbandar
Laboratory Manual: Government Polytechnic Porbandar
PORBANDAR
Affiliated to
Laboratory Manual
COMPUTER NETWORKS
(3340702)
Enrollment No:
Name:
Address:
Subject:
Branch:
Term:
GOVERNMENT POLYTECHNIC
PORBANDAR
Certificate
______________________ ___________________
GOVERNMENT POLYTECHNIC
PORBANDAR
M2: Foster close networking with the industry, alumni and the guardians.
M3: Promote professional ethics and human values, integrity, accountability and
transparency.
COMPUTER ENGINEERING
DEPARTMENT
Course Outcomes:
CO1: Comprehend various protocols and models in networks.
CO2: Identify the functions of each layer in OSI and TCP/IP model with
different operations of TCP, HTTP and DNS.
CO3: Establish simple and robust computer networks for different environment.
CO5: Solve network operational problems for real time application with new
tools and technology.
Hardware Requirements:
Ethernet Network Cable, RJ45 connectors
Crimping tool
UTP Cable Tester
Layer 2 Switch
Wireless Access point and Wireless Router
Computer system with latest configurations
Network Card
Network trainer kit
Software Requirements:
Network Simulator
Windows 2008 Server
File Server setup
Web Server setup
List of Practicals
Sr. Mapping Mapping with
Practical Title
No. with COs POs, PSOs
PO1, PO2, PO3,
1 Install & test Network Interface card. CO1
PO7
PO1, PO2, PO3,
2 Prepare and Test Straight UTP Cable. CO3
PO4, PO7
PO1, PO2, PO3,
3 Prepare and Test Cross UTP Cable. CO3
PO4, PO7
PO1, PO2, PO3,
4 Develop a small Network. CO1
PO7
PO1, PO2, PO3,
5 Install Windows 2008 Network operating System. CO4
PO4, PO7
PO1, PO2, PO3,
6 Install & Configure File Server. CO1
PO7
PO1, PO2, PO3,
7 Install & Configure Print Server CO1
PO7
PO1, PO2, PO3,
8 Install & Configure Mail Server CO5
PO4, PO7
PO1, PO2, PO3,
9 Install & Configure Proxy Server CO5
PO4, PO7
PO1, PO2, PO3,
10 Install & Configure Web Server CO5
PO4, PO7
PO1, PO2, PO3,
11 Install & Test Router, Repeater and Bridge. CO4
PO4, PO7
PO1, PO2, PO3,
12 Install a small wireless network using access points. CO4
PO4, PO7
PO1, PO2, PO3,
13 Set, Configure & Test Internet. CO5
PO4, PO7
Lab Evaluation Rubrics:
Lab Performance (LP) Rubrics
Criteria Excellent (4) Good (3) Substandard (2) Poor (1)
Lab * Student * Student needs * Student performs * Student cannot
Performance Performs some help from of the experiments complete
(LP) experiment as per faculty to with the help from experiment.
the instructions perform the faculty. * Student has not
given without experiments as * Student has no understanding of lab
any help from per the clear understanding objectives and
faculty. instruction of lab objectives concepts.
* Student * Student has and concepts. * Student cannot
demonstrates an sufficient * Student cannot explain concepts to
accurate understanding of explain concepts to fellow classmates.
understanding of lab objectives and fellow classmates.
the lab objectives concepts.
and concepts. * Student can
* Student can understand
explain concepts concepts by
to fellow himself but
classmates. cannot explain it
to fellow
classmates.
Practical - 1
Explanation: A NIC is also commonly referred to as a network adapter and is an expansion card
that enables a computer to connect to a network such as a home network and/or the Internet using
an Ethernet cable with a RJ-45 connector.
Step 3: Find an available Peripheral Component Interconnect (PCI) slot on the motherboard
and remove slot insert if one exists.
Step 4: Carefully remove the network card from its static-proof plastic envelope, and slide it
into the slot.
Step 5: Seat the card in the slot firmly with gentle pressure along the length of the card,
especially right about the slot itself.
Step 6: Snugly, screw the card to the computer frame, but do not over tighten.
Step 10: In Category View (vs. Classic View) click Performance and Maintenance.
Step 15: Beneath it should appear the name of your Ethernet card.
Step 16: Next, double click the name of your Ethernet adapter.
Step 17: If the text in the "Device Status" box says "This device is working properly.", then you
successfully installed the card and are finished.
Step 18: If the text in the "Device status" box doesn't say "This device is working properly”, click
the Troubleshoot Button and follow instructions. Double check you followed the directions above.
Install the most up to date device drivers.
Exercise
Q-1. Define Network Interface Card.
Q-2. What is a Functionality of Network Interface Card.
Q-3. Where we can check my NIC card is connect or nor in computer?
Q-4. Is it compulsory to install NIC driver in computer?
Q-5. What type of connections does a NIC control?
Practical - 2
THEORY:-
What is UTP Cable?
UTP stands for Unshielded Twisted Pair. It is the cabling system with one or more pairs of twisted
insulated copper wires contained in a single sheath. It is the most widely used cabling system in
telecommunications and data communications environment today.
A straight through network cable acts as an extension enabling a device with a network interface
card to be attached to a network.
2. UTP (Unshielded twisted pair) Cable: We use UTP cables to connect with each other
and in UTP cable there are 8 pieces of small colourful cable.
3. RJ- 45 Connector: RJ-45 Connector is a tool that we put on the end of the UTP cable to
plug the cable in the LAN port.
Explanation: An Ethernet connector (8P8C) has eight pin slots. Each pin is identified by a number,
starting from left to right, with the clip facing away from you.
The two standards for wiring Ethernet cables are T568A and T568B. T568B is the most
common and is what we'll be using for our straight Ethernet cable. The tables below show the proper
orientation of the coloured wires to the pins.
T568A Standard T568B Standard
Pin 1 White/Green Pin 1 White/Orange
Pin 2 Green Pin 2 Orange
Pin 3 White/Orange Pin 3 White/Green
Pin 4 Blue Pin 4 Blue
Pin 5 White/Blue Pin 5 White/Blue
Pin 6 Orange Pin 6 Green
Pin 7 White/Brown Pin 7 White/Brown
Pin 8 Brown Pin 8 Brown
Procedure:
Step 1: Strip the cable jacket about 1.5 inch down from the end.
Step 2: Spread the four pairs of twisted wire apart. For Cat 5e, you can use the pull string to strip
the jacket farther down if you need to, then cut the pull string. Cat 6 cables have a spine that will
also need to be cut.
Step 3: Untwist the wire pairs and neatly align them in the T568B orientation. Be sure not to untwist
them any farther down the cable than where the jacket begins; we want to leave as much of the cable
twisted as possible.
Step 4: Cut the wires as straight as possible, about 0.5 inch above the end of the jacket.
Step 5: Carefully insert the wires all the way into the modular connector, making sure that each wire
passes through the appropriate guides inside the connector.
Step 6: Push the connector inside the crimping tool and squeeze the crimper all the way
down.
Step 7: Repeat steps 1-6 for the other end of the cable.
Step 8: To make sure you've successfully terminated each end of the cable, use a cable tester to test
each pin. When you're all done, the connectors should look like this:
Exercise
Q-1. Define UTP.
Q-2. Which tools are required for making straight through cable?
Q-3. Explain the need of straight UTP cable.
Q-4. How many pins are there in RJ45 Connector?
Q-5. State the application of straight UTP cable.
Q-6. Identify and write the name of below given connectors.
Practical - 3
Description: A crossover cable can be used to connect two devices directly, without the need for a
router in the middle, apart from this it expands a network by connecting another network switch,
thereby giving you more ports.
Crossover cables are most commonly used to connect two hosts directly. Examples would be
connecting a computer directly to another computer, connecting a switch directly to another
switch, or connecting a router to a router.
It simply reverses some of the pins of straight UTP cable which results in crossover UTP cable, so
that the output on one computer is being sent to the input of another.
The tables below show the proper orientation of the coloured wires to the pins.
Procedure:
Step 1: Strip the cable jacket about 1.5 inch down from the end.
Step 2: Spread the four pairs of twisted wire apart. For Cat 5e, you can use the pull string to strip
the jacket farther down if you need to, then cut the pull string. Cat 6 cables have a spine that will
also need to be cut.
Step 3: Untwist the wire pairs and neatly align them in the T568A orientation. Be sure not to
untwist them any farther down the cable than where the jacket begins; we want to leave as much of
the cable twisted as possible.
Step 4: Cut the wires as straight as possible, about 0.5 inch above the end of the jacket.
Step 5: Carefully insert the wires all the way into the modular connector, making sure that each wire
passes through the appropriate guides inside the connector.
Step 6: Push the connector inside the crimping tool and squeeze the crimper all the way down.
Thus one end of crossover UTP cable is a T568A and the other end a T568B.
Exercise
Q-1. If below devices were connected with UTP Ethernet cables, which pairs of devices would require
a straight-through cable and which would require crossover cable?
A) PC and router
B) PC and switch
C) Hub and switch
D) Router and hub
E) Wireless access point (Ethernet port) and switch
Q-2. Which of the following is least susceptible to lightning
A) Unshielded Twisted pair
B) Shielded Twisted pair
C) Fiber-optic
D) Coaxial Cable
Practical - 4
Types of Network:-
LAN:-Network in small geographical Area (room, building or campus) is called Local Area
Network.
MAN:-Network in a city is called Metropolitan Area network.
WAN:-Network spread geographically (country or across globe) is called Wide Area
1. Hub
2. Switches
3. Router
4. Wireless Access Points (WAP)
5. Modems etc.
Step 1: Open the start menu, navigate to control panel, and select your network card:
Step 4: Scroll the bar until “Internet protocol (TCP/IP)” can be shown (This is located usually at the
bottom of the list:
Step 5: Internet Protocol (TCP/IP)” item to bring up this menu: Double click the “Properties”
Step 6:
Static IP- Good for a computer behind a router or firewall that uses Network Address Translation
(NAT), Port Translation (PAT) or in any circumstance where you need to forward ports.
In this example, the IP address of this computer is “10.10.10.5”, the subnet mask (automatically done
for you in XP after entering an IP) is set to 255.255.255.0 and the default gateway is set to 10.10.10.1
This means that the router or modem that is in use is sent via that IP within the network. Here a router
is in use, so all computers will have the same gateway IP, which can be set to whatever the routers
IP is (usually 192.168.1.1).
The IP ends in .5 as it is the fifth computer on the network. All the other parts of the IP remain the
same (10.10.10.X), however you could use the 192.168.1.X and just change the X in this range as
well.
Usually it is best to set the router or the computer sharing the internet as the .1 address as it makes it
easier to remember.
Dynamic IP - Good for single computer or in a LAN where each box does not need to have ports
forwarded to it (if it is not acting as a server)
To use dynamic IP’s just select “obtain an IP address automatically” and the other options will grey
out.
Step 7:
http:// 66.102.9.104, which is harder to remember, most ISPs tell you which two to use, there are
however many free ones out there, all you have to do is Google for DNS servers.
Alternatively, the ISP may ask you to tick “Obtain DNS Server address automatically” which means
upon connecting to the ISP it will tell you which DNS servers to use without you having to set it up.
After setting this page up, click the “OK” button to save the settings you have entered. To improve
your network performance, open this window once more:
Find the option for “link Speed” (will change depending on what network card you have).
Step 9: Set the option to “Full Duplex” for whatever speed your network card can handle, usually
10/100mbit so set it to 100mbps/Full Duplex. This will increase the speed of file transfers over your
network.
For sharing files across a network I recommend using an FTP Server, such as the free one from
www.guildftpd.com or using the windows shares.
For using shares first disable “use simple file sharing” to do this, open my computer, go to the “Tools”
option and select “Folder Options…”
Step 10: Navigate to the view tab and scroll the bar to the very bottom where you should see:
Step 11: Make sure the “Use simple file sharing (Recommended) option is unchecked (as it is here)
Now to view files on a different computer on your network, open the “Run” bar either by Start ->
Run, or holding the Windows key and then holding the R key (while keeping the Windows key held
down.
Step 12:
\\IP_ADDRESS\C$
\\10.10.10.2\C$
Step 13: You will then be prompted with a login box, where you can enter the details for the
administrator account on the other computer, and you will then have a normal window showing you
the C Drive of the other computer.
NB: if you name your computers (e.g. “kitchen”) you can use \\kitchen\C$ as an alternate way to gain
access to the computer.
Tips to check your network is working:
Firstly if the network is not functioning turn of the windows XP Firewall
Step 14: If it is disabled (which is good) make sure your other firewall (which you should have) is
allowing the network to function, if you are unsure, set it to allow all until you have tested other
reasons.
Now, once more open the run box (Windows) and type “cmd” (without the “”) and you should get
Step 15:
Into this command prompt type
ping IP_ADDRESS
Where IP_ADDRESS is the IP address of the computer or gateway you are trying to reach, and then
hit enter
This shows that from THIS computer can communicate with computer 10.10.10.1 (the gateway).
Thus it should all be working.
CHARACTERISTICS:-
1. Sharing Resources from one computer to another computer over a network.
2. Performance by measuring the speed of data transmission with number of users, connectivity
and the software used.
3. Reliability makes easy to use an alternative source for data communication in case of
hardware failure or connectivity issues.
4. Scalability increases the system performance by adding more processors.
5. Security is the main characteristics of computer network where you can take necessary steps
for protecting your data from unauthorized access.
Exercise
Q-1. Define computer network.
Q-2. Define LAN, MAN and WAN.
Q-3. Write down list of LAN devices.
Q-4. Write down Characteristics of Computer Network.
Q-5. Write down Application of Computer Network.
Practical - 5
Network OS :- NOS is the software that allows multiple computers to communicate, share files and
hardware devices with one another. A network operating system (NOS) is a computer operating
system that is designed primarily to support workstation, personal computer, and, in some instances,
older terminal that are connected on a local area network (LAN).
Some operating systems used for individual computers have built-in network functions, but operating
systems specifically designed for this task are more common. Network OS software includes Linux,
Mac OS X server, Novell and windows server. Some examples of other network operating systems
include Windows 2000, Microsoft Windows XP, Sun Solaris.
Component Requirement
Processor • Minimum: 1GHz (x86 processor) or 1.4GHz (x64 processor)
• Recommended: 2GHz or faster Note: An Intel Itanium 2 processor is required
for Windows Server 2008 for Itanium-based Systems
Memory • Minimum: 512MB RAM
• Recommended: 2GB RAM or greater
• Maximum (32-bit systems): 4GB (Standard) or 64GB (Enterprise and
Datacenter)
• Maximum (64-bit systems): 32GB (Standard) or 2TB (Enterprise, Datacenter
and Itanium-based Systems)
Available Disk • Minimum: 10GB
Space • Recommended: 40GB or greater Note: Computers with more than 16GB of
RAM will require more disk space for paging, hibernation, and dump files
Drive DVD-ROM drive
Display and • Super VGA (800 x 600) or higher-resolution monitor
Peripherals • Keyboard
• Microsoft Mouse or compatible pointing device
Procedure: Below is the procedure to install Windows Server 2008.
Step 1: Insert the appropriate Windows Server 2008 installation media into your DVD drive.
Step 2: Reboot the computer.
Step 3: When prompted for an installation language and other regional options, make your selection
and press Next.
Step 6: If you do not have the Product ID available right now, you can leave the box empty, and click
Next. You will need to provide the Product ID later, after the server installation is over. Press No.
Step 7: Select the correct version of Windows Server 2008 in the next screen.
Step 8: If you did provide the right Product ID, select the Full version of the right Windows version
you’re prompted, and click Next.
Step 9: Read and accept the license terms by clicking to select the checkbox and pressing Next.
Step 10: In the “Which type of installation do you want?” window, click the only available option -
Custom (Advanced).
Step 11: In the “Where do you want to install Windows?”, if you’re installing the server on a regular
IDE hard disk, click to select the first disk, usually Disk 0, and click Next.
Step 13: The installation process will reboot your computer, so, if in step #10 you inserted a floppy
disk (either real or virtual), make sure you remove, as the server will get hanged without the ability
to boot. After the server reboots you’ll be prompted with the new Windows Server 2008 type of login
screen. Press CTRL+ALT+DEL to log in.
Step 15: The default Administrator is blank, so just type Administrator and press Enter.
Step 17: In the password changing dialog box, leave the default password blank (duh, read step
#15…), and enter a new, complex, at-least-7-characters-long new password twice.
Exercise
Q-1. What is network operating system?
Q-2. List out different NOS.
Q-3. Functionality of NOS?
Practical - 6
A file server provides a central location on your network where you can store and share files with
users across your network. When users require an important file such as a project plan, they can
access the file on the file server instead of having to pass the file between their separate
computers. If your network users will need access to the same files and network accessible
applications, configure this computer as a file server. File servers are commonly found in
enterprise settings, such as company networks, but they are also used in schools, small
organizations, and even home networks.
Installation of a File Server on Windows Server 2008 by Using the Configure Your Server Wizard
1. Click Start, point to Administrative Tools, and then click Configure Your Server Wizard.
2. Click Next two times consecutively.
3. Click File server in the Server role box, and then click Next.
4. On the "File Server Disk Quotas" page, configure any quotas you need to control disk-space
usage on the server, and then click Next.
5. On the "File Server Indexing Service" page, click the indexing configuration that is appropriate
for your server, and then click Next.
6. Click Next.
7. Click Finish.
8. The Share a Folder Wizard starts. Click Next.
9. Click Browse, locate the folder that you want to share, and then click OK.
4. Click Share this folder, and then accept the default name or type a different name for the share.
5. Optionally, configure the number of users who can connect, configure permissions for this folder,
and then configure the caching options.
6. Click OK.
7. A little hand is displayed in the Windows Explorer window to indicate that the folder is being
shared.
Exercise
Q-1. What is File Server?
Q-2. Write down the features of File Server.
Q-3. Give the benefits of file server.
Practical - 7
Step 1: Launch the Server Manager, and approve the User Account Control prompt when offered.
Step 2: If a "Before You Begin" box is displayed, read and click through it. Likewise, review the
Introduction to Print Services page and click Next to get started.
Step 3: Launch Server Manager from the Start Menu, expand the local server's name, and then
expand the Roles item. If Print Services are already found, then stop. Otherwise right click on Roles
and select Add Roles from the context menu.
Step 4: Enable the checkbox on Print Services, then click Next. After clicking Next, an “Introduction
to Print Services" dialog is displayed. Review, then click Next on this as well.
Step 5: If only Print Server is required, then check the option of print server only.
LPD is an older UNIX-style printing that's not commonly used in Windows environments. If not sure,
leave unchecked.
The Internet Printing Protocol is likewise not commonly used. If not sure, leave unchecked.
Step 6: This final dialog confirms what's about to be performed, and though it warns that a system
reboot may be necessary. It didn't require one when we added print services to our server. But
removing the Print Services role did require a restart before any additional role related changes could
be made.
Exercise
Q-1. What is Print Server?
Q-2. Write down the features of Print Server.
Practical - 8
A mail server (also known as a mail transfer agent or MTA, a mail transport agent, a mail router or
an Internet mailer) is an application that receives incoming e-mail from local users (people within
the same domain) and remote senders and forwards outgoing e-mail for delivery. A computer
dedicated to running such applications is also called a mail server. Microsoft Exchange, Gmail,
Exim and send mail are among the more common mail server program.
Step 2: Your email client communicates with the SMTP server, giving it your email address, the
recipient's email address, the message body and any attachments
Step 3: The SMTP server processes the recipient's email address - especially its domain. If the domain
name is the same as the sender's, the message is routed directly over to the domain's POP3 or IMAP
server - no routing between servers is needed. If the domain is different, though, the SMTP server
will have to communicate with the other domain's server.
Step 4: In order To find the recipient's server, the sender's SMTP server has to communicate with the
DNS, or Domain Name Server. The DNS takes the recipient's email domain name and translates it
into an IP address. The sender's SMTP server cannot route an email properly with a domain name
alone; an IP address is a unique number that is assigned to every computer that is connected to the
Internet. By knowing this information, an outgoing mail server can perform its work more efficiently.
Step 5: Now that the SMTP server has the recipient's IP address, it can connect to its SMTP server.
This isn't usually done directly, though; instead, the message is routed along a series of unrelated
SMTP servers until it arrives at its destination.
Step 6: The recipient's SMTP server scans the incoming message. If it recognizes the domain and the
user name, it forwards the message along to the domain's POP3 or IMAP server. From there, it is
placed in a send mail queue until the recipient's email client allows it to be downloaded. At that point,
the message can be read by the recipient
Step 7: Launch the Server Manager console (type servermanager.mscin the search box and press
Enter), then select Features and click Add features.
Step 9: If you see a prompt like the one in the picture below, click the Add required services button.
Step 11: Ensure that IIS Metabase Compatibility and IIS 6 Management Console are selected and
click Next.
Exercise
Q-1. What is Mail Server?
Q-2: Write down the types of mail Server.
Practical - 9
Improve Performance: Proxy servers can dramatically improve performance for groups of
users. This is because it saves the results of all requests for a certain amount of time.
Consider the case where both user X and user Y access the World Wide Web through a
proxy server. First user X requests a certain Web page, which we'll call Page 1. Sometime
later, user Y requests the same page. Instead of forwarding the request to the Web server
where Page 1 resides, which can be a time-consuming operation, the proxy server simply
returns the Page 1 that it already fetched for user X. Since the proxy server is often on the
same network as the user, this is a much faster operation.
Filter Requests: Proxy servers can also be used to filter requests. For example, a company
might use a proxy server to prevent its employees from accessing a specific set of Web
sites.
Step 1: Open Control Panel > Network and Internet > Internet Options. Click the Tools menu in
Internet Explorer and select “Internet Options” to open it. Click the “Connections” tab at the top
of the Internet Options window. Click the “LAN Settings” button at the bottom of the window.
Step 2: The “Automatically detect settings” option is enabled by default. When this option is enabled,
Windows will attempt to automatically discover a proxy with the Web Proxy AutoDiscovery
Protocol, or WPAD . If no proxy is provided by your network, none will be used. Disable this option
to prevent Windows from using WPAD to automatically configure your proxy settings. The “Use
automatic configuration script” option allows you to enter the address of an automatic proxy
configuration script.
Step 3: The “Use a proxy server for your LAN” checkbox will allow you to manually enable and
configure a proxy. Check it and enter the network address and port of the proxy below.
Step 4: By default, Windows will automatically send all traffic through the proxy, including traffic
to addresses on your local network, or intranet. To always bypass the proxy server when connecting
to these local addresses, enable the “Bypass proxy server for local addresses” checkbox. Applications
will bypass the proxy and connect directly to resources on your local network, but not Internet
addresses.
Step 5: Click the “Advanced” button under Proxy Server if you want to set a different proxy server
for HTTP, Secure (HTTPS), FTP, and SOCKS protocols. By default, the “Use the same proxy
server for all protocols” box is checked.
Step 6: The Exceptions section allows you to provide a list of addresses Windows will bypass the
proxy for. By default, it only includes *.local . The asterisk here is known as a “wildcard” and
matches everything. This means that any address ending with “.local”, including server.local
and database.local, will be accessed directly.
If you like, you can enter additional addresses. Use a semicolon ( ; ) and a space to separate each
entry in the list. For example, if you also wanted to access gmail.com directly without going through
the proxy, you’d enter:
*.local; gmail.com
When you attempt to connect to gmail.com, Windows would then make a direct connection
to howtogeek.com without going through the proxy server. Click “OK” to save your changes.
Exercise
Practical - 10
A Web server is a program that uses HTTP (Hypertext Transfer Protocol) to serve the files that form
Web Pages to users, in response to their request, which are forwarded by their computers’ HTTP
clients. Dedicated computers and appliances may be referred to as Web server as well.
Web servers are computers that deliver (serves up) Web pages. Every Web server has an IP address
and possibly a domain name. For example, if you enter the URL
http://www.pcwebopedia.com/index.html in your browser, this sends a request to the Web server
whose domain name ispcwebopedia.com. The server then fetches the page named index.html and
sends it to your browser.
PROCEDURE:
Step 1: Click Start, point to Control Panel and click Add or Remove Programs.
Step 2: Click the Add/Remove Windows Components button in the Add or Remove Programs
Step 3: On the Windows Components window, click on the Application Server entry and click the
Details button.
Step 4: On the Application Server page, click on the Internet Information Services (IIS) entry and
click the Details button
Step 5: In the Internet Information Service (IIS) dialog box, put a check mark in the World Wide
Web Service check box and click OK.
Step 9: Click Finish on the Completing the Windows Components Wizard page.
Exercise
Q-1. What is Web Server?
Q-2. Write down the functionality of web Server.
Q-3. What is full form of IIS?
Practical - 11
Bridges:
A bridge is a device that connects two or more local area networks, or two or more segments of the
same network. For example, suppose that your network includes both 10BaseT Ethernet and Local
Talk connections. You can use a bridge to connect these two networks so that they can share
information with each other.
Bridges perform an additional, important function; they filter information so that network traffic
intended for one portion of the network does not congest the rest of the network. Bridges may consist
either of standalone hardware devices or of software running on a client or server.
When bridges were introduced in the 1980’s, they typically joined two homogeneous
networks (for example, two kinds of Ethernet networks). More recently it has become possible for
bridges to connect networks with different physical and data link level protocols. For example, you
can use a bridge to connect a Local Talk network to an Ethernet network, or an Ethernet network to
a Token Ring network.
Like switches, bridges learn the MAC addresses of all connected clients, servers, and peripherals,
and associate each address with a bridge port (network connection). When a bridge (or switch)
receives an incoming frame, it opens and reads its destination MAC address.
If the port that will receive the frame is different from the port connected to the sender, then the
bridge forwards the frame to the destination port. If the port that will receive the frame is the same as
the port connected to the sender, the bridge drops the frame. If the bridge cannot determine which
port is associated with a destination address, it passes the frame along to all ports.
Types of Bridges:
1. Simple Bridge
2. Multiport bridge
3. Transparent Bridge
1. Simple Bridge:
A simple bridge is the most primitive and least expensive types of bridge links two segments.it
contents a table that lists the physical addresses of all the stations connected with the bridge. In this
bridge, physical addresses must be entered manually that makes them primitive. Before a simple
Bridge can be used, an operator enters the addresses of every station.
2. Multiport bridge:
Multiport bridge can be used to connect more than two LANs. In this bridge tree tables are created,
each one holding the physical address of stations reachable trough the corresponding port.
3. Transparent bridge
Transport Bridge builds its table of physical station addresses on its own as it performs its bridge
functions. Table is automatically built by frame movements in the network When Transparent Bridge
is first installed, its table is empty. When it receives packet it looks at source & destination address.
Destination address is used for forwarding decision to the particular segments. Source address is used
for adding entries to the table for updating table. As it read source address it notes which side the
packet came from and the segment to which it belongs. It checks destination address to decide where
to send packet. If it is not inside table, it stands the packet to all of the station on both segments
excepting sender station. The first packet transmitted by each station, the bridge makes entries inside
the table with corresponding segment. So, at last table is completed with all station addresses and
segment. Next packet send by each station refers the table entry.
Transparent bridge has self-updating feature. Suppose two devices exchanging their place. Now its
entry, inside the table for segment is wrong, because both devices are now replacing their segment,
but this bridge updating its table automatically. Bridge is constantly checking source address of
received. So, it updates entry for devices according to the change.
Routers:
Like bridges, routers are devices whose primary purpose is to connect two or more networks and to
filter network signals so that only desired information travels between them. For example, routers are
often used to regulate the flow of information between school networks and the Internet.
However, routers can inspect a good deal more information than bridges, and they therefore can
regulate network traffic more precisely. They also have another important capability: they are
aware of many possible paths across the network and can choose the best one for each data packet to
travel
Based on complex, internal tables of network information that it compiles, a router then determines
whether or not it knows how to forward the data packet towards its destination. If the router has been
configured with sufficient information to know which of its ports is en route to the destination, it
transmits the packet.
Types of Routers:
1. Static Router
2. Dynamic Router
1) Static Router:
Routing table Information’s are entered manually .means the administrator enters the route for each
destination into the table. It cannot update automatically when there is a change (shutdown of router
or breaking of link or some fault in connection) in the internet. It is more secure. It is always use the
same route.
2) Dynamic router:
Routing table is created automatically. Table is updated using one of the dynamic routing protocols
whenever there is a change (Shutdown of router or breaking of a link or some fault in connection) In
the Internet.
Repeaters:
In telecommunications, a repeater is an electronic device that receives a signal and retransmits it.
Repeaters are used to extend transmissions so that the signal can cover longer distances or be received
on the other side of an obstruction.
There are several different types of repeaters; a telephone repeater is an amplifier in a telephone line,
an optical repeater is an optoelectronic circuit that amplifies the light beam in an optical fiber cable;
and a radio repeater is a radio receiver and transmitter that retransmit a radio signal.
Exercise
Q-1. Defines: Repeater, router, bridge.
Q-2. How does repeater extend the length of LAN?
Q-3. Explain types of router.
Q-4. Differentiate bridge v/s router.
Q-5. True or False.
1. Repeater works at network, data link and presentation layer.
2. Router works at network and data link layers.
3. Bridges works at physical layer.
Practical - 12
Now the following procedure will explain how to configure router/modem as a wireless access
Point.
PROCEDURE:
Step 1: Connect your computer to a second LAN port on your router using an Ethernet cable. Login
to the router web interface through the IP address listed on the label on the bottom of your router.
Step 2: Now , the following steps will guide you how to login into your router administration page -
---
Step b = If Wired connect your Ethernet cable to one of the four yellow ports on the back of your TP-
Link router.
Step 3: Open a web browser (i.e Safari, Google Chrome or Internet Explorer). At the top of the
window in the address bar, type in one of the following 192.168.1.1, 192.168.0.1.
Step 4: Type the username and password in the login page. The default username and password For
TP-Link devices is admin. Enter your own username and password instead of admin if you already
changed it.
All letters for both username and password will be lower case.
BY DEFAULT THE USERNAME AND PASSWORD WILL BE ADMIN.
Step 5: Go to Network>LAN on the side menu and change the LAN IP address of your TP-Link N
router to an IP address on the same segment of the main router. This IP address should be outside the
main router’s DHCP range.
Example: if your DHCP is 192.168.2.100 - 192.168.2.199 then you can set the IP to 192.168.2.11
Step 6: Go to Wireless>Wireless Settings and configure the SSID (Network name), which can be the
same or different from the main router’s. Select Save.
Step 7: Go to Wireless >Wireless Security and configure the wireless security. WPA/WPA2-Personal
is recommended as the most secure option. Once configured, click Save.
Step 8: Go to DHCP>DHCP Settings and select Disable the DHCP Server. Select Save.
Step 10: Use an Ethernet cable to connect the main router to your router through their LAN ports
(any LAN ports may be used). All other LAN ports on your router will now grant devices Internet
access. Alternatively, any Wi-Fi device can now access the Internet through your router by using the
SSID and Password set up in the above steps.
Exercise
Q-1. What is access point?
Q-2. Define the functionality of Access point.
Practical - 13
Not confining itself to any particular definition, the Internet can be defined as the wired or
wireless mode of communication through which one can receive, transmit information that can
be used for single or multiple operations.
The Internet is a broadcast medium for the every person. Anyone can use the Internet. As long as
you have a computer, cell phone, or other internet-enabled device, you simply find a free or paid
place to connect. Once you are connected (sometimes called 'logged on'), you can broadcast and
receive all kinds of signals.
Step 1: Attach NIC card to PCI slot of your motherboard & switch on the CPU.
2) Once in Control Panel, if you are in Category view find and double click on Network and Sharing
Center.
3) Now that you are in Network and Sharing Center, click on the "Change adapter settings" link on
the left.
4) In the Change adapter settings screen, find and right click on your Local Area Connection, Left
click on Properties.
5) In the Local Area Connection Properties window, highlight Internet Protocol Version 4
(TCP/IPv4), and click on the Properties button.
6) In the Internet Protocol Version4 (TCP/IPv4) Properties window, you will need to select "Use the
following IP address”. You will see the below windows screen.
After entering the IP address check the "subnet mask" has been filled in automatically.
8) Next fill in the Default Gateway; this is the address of the Router or Gateway Device you are using
to access the internet. This information can be found by checking your current (unchanged) config.
Enter in the corresponding settings per the section.
9) Once the settings have been entered in, click ok on the Internet Protocol Version 4 (TCP/IPv4)
Properties window, and then click on close on the Local Area Connections properties window.
At this point the Local Area Connection is said as connected. Now browse to a web site using a
Browser. If you are able to, your setup is complete. If you are not able to browse, call us here at ISP
support, so they can verify your settings are correct.
Exercise
Q-1. What is Internet?
Q-2. What are the Functionalities of Internet?
Q-3. What are LAN Cables?
Q-4. What is IP?
Q-5. What is NIC?