0% found this document useful (0 votes)
8 views

322 CN practical

The document is a practical book for the Computer Networks course for B.Tech 4th semester students at Parul University, detailing various experiments designed to enhance understanding of computer networking concepts. It includes objectives, methodologies, and conclusions for each experiment, covering topics such as simulation tools, packet analysis with Wireshark, and error detection using Hamming code. The book aims to provide a comprehensive resource for students to learn through experimentation and practical application of theoretical knowledge.

Uploaded by

Sourav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

322 CN practical

The document is a practical book for the Computer Networks course for B.Tech 4th semester students at Parul University, detailing various experiments designed to enhance understanding of computer networking concepts. It includes objectives, methodologies, and conclusions for each experiment, covering topics such as simulation tools, packet analysis with Wireshark, and error detection using Hamming code. The book aims to provide a comprehensive resource for students to learn through experimentation and practical application of theoretical knowledge.

Uploaded by

Sourav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

1|Page
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

COMPUTER NETWORKS PRACTICAL BOOK


COMPUTER SCIENCE &ENGINEERING DEPARTMENT
PREFACE
It gives us immense pleasure to present the first edition of the COMPUTER NETWORKS
Practical Book for the B.Tech . 4rd semester students for PARUL UNIVERSITY.

The CN theory and laboratory courses at PARUL UNIVERSITY, WAGHODIA,


VADODARA are designed in such a way that students develop the basic understanding of the
subject in the theory classes and then try their hands on the experiments to realize the various
implementations of problems learnt during the theoretical sessions. The main objective of the
CN laboratory course is: Learning CN through Experimentations. All the experiments are
designed to illustrate various problems in different areas of CN and also to expose the
students to various uses.

The objective of this CN Practical Book is to provide a comprehensive source for all the
experiments included in the CN laboratory course. It explains all the aspects related to every
experiment such as: basic underlying concept and how to analyze a problem. It also gives
sufficient information on how to interpret and discuss the obtained results.

We acknowledge the authors and publishers of all the books which we have consulted while
developing this Practical book. Hopefully this CN Practical Book will serve the purpose for
which it has been developed.

2|Page
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

CERTIFICATE

This is to certify that

Mr./Ms......................................................................................................................................

with enrolment no. ................................................................ has successfully completed

his/her laboratory experiments in the COMPUTER NETWORKS (303105256) from the

department of COMPUTER SCIENCE & ENGINEERING during the academic year

2024-2025.

Date of Submission:......................... Staff In charge:...........................

Head Of Department:...........................................

3|Page
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

Sr. Experiment Title Page Page Date Date of Marks


No No : No: of Submissio Sign (out of
FROM TO Start n 10)
1. Experiments on Simulation
Tools:(CISCO PACKET
TRACER):
To understand environment of
CISCO PACKET TRACER to
designsimple network and perform
experiments.
2. Experiments of Packet
capturetool: Wireshark
To understand the features of
wireshark as a packet capture tooland
understand encapsulation of
information. Also study effect of few
network commands
To study behaviour of
3. genericdevices used for
networking: (CISCO
PACKET TRACER)
Design a simple network with
multiple nodes and connect
via generic devices available
in library. Perform simulation
and trace communication
behaviour ofspecified network
devices.
1: Use only HUB to design a
smallnetwork having 4 to 6
hosts
2: Use only a Switch to design a small
network with 4 to 6 hosts.3: Use both
the device (HUB andSWITCH) for a
network and find out functioning
difference between switch and hub.
4. Data Link Layer (Error
Correction): Write a program
to implement error detection
and correction using
HAMMING code concept.
Make a test rum to input
data stream and verify
errorcorrection feature.
5. Virtual LAN: Simulate Virtual
LAN configuration using
CISCO
Packet Tracer Simulation.
6. Wireless LAN: Configuration of Wireless
LAN using CISCO Packet Tracer

4|Page
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

7. Internetworking with
routers: Design a three or
four simple networks (with 3
to 4 hosts) and connect via
Router. Perform simulation
and trace how routingis done
in packet transmission.
1: Experiment on same
subnet 2: Perform Experiment
across the subnet and
observe functioning ofRouter
via
selecting suitable pair of Source and
destination.
8. Implementation of
SUBNETTING: Design
multiple subnet with suitable
number of
hosts. Make a plan to assign
staticIP addressing across all
subnet to explain
implementation of
SUBNETTING.
9. Routing at Network Layer:
Simulate Static and Dynamic
Routing Protocol Configuration using
CISCO Packet Tracer.
10. Experiment on Transport
Layer:Implement echo client
server using TCP/UDP sockets

5|Page
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

EXPERIMENT NO: 1
AIM: Experiments on Simulation Tools: (CISCO PACKET TRACER): To understand
environment of CISCO PACKET TRACER to design simple network and perform
experiments.

1.1 Purpose:
The main objective of the proposed experiment is to give exposure of numerous simulation
devices to students such that student can actually design various network topologies in real-

time.Logical Flow of Practical

6|Page
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

1.Using switches and end devices

2 .Using router and end devices

CONCLUSION : Hence we have successfully completed the practical .

7|Page
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

EXPERIMENT NO: 2
Aim : To understand the features of wireshark as a packet capture tool and
understand encapsulation of information. Also study effect of few network
commands
Theory :
Wireshark is a network packet analyzer. A network packet analyzer presents captured packet
data in as much detail as possible. You could think of a network packet analyzer as a
measuring device for examining what’s happening inside a network cable, just like an
electrician uses a voltmeter for examining what’s happening inside an electric cable (but at a
higher level, of course).
In the past, such tools were either very expensive, proprietary, or both. However, with the
advent of Wireshark, that has changed. Wireshark is available for free, is open source, and is
one of the best packet analyzers available today.
Advantages of Wireshark:
1. Comprehensive Protocol Support: Wireshark supports hundreds of protocols, making it
useful for a wide variety of network troubleshooting tasks. It can analyze and capture both
wired and wireless network traffic, providing in-depth insights.
2. Detailed Packet Inspection: It allows users to examine packets in great detail, including
headers and payloads, helping to identify and troubleshoot network issues at a granular level.
3. Free and Open Source: Wireshark is free to use, and its open-source nature means that it is
continuously updated by the community, with many plugins and add-ons available.
Disadvantages of Wireshark:
1. Complexity for Beginners: While powerful, Wireshark can be overwhelming for beginners,
as interpreting network traffic and applying proper filters requires a deep understanding of
networking protocols.
2. Performance Issues with Large Traffic Volumes: When capturing large amounts of network
traffic, Wireshark can consume significant system resources, leading to performance issues
on machines with limited processing power.
3. Security Risks: Wireshark captures network traffic, which can include sensitive
information. If not used securely, it could expose passwords or other confidential data.

8|Page
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

9|Page
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

10 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

11 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

Conclusion: Wireshark is a powerful tool for capturing and analyzing network packets,
helping to understand data encapsulation across various protocol layers. Using network
commands alongside Wireshark provides insights into how different commands impact
network traffic and packet flow.

12 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

EXPERIMENT NO: 3

AIM : To study behaviour of generic devices used for networking: (CISCO


PACKET TRACER)

Introduction:
This practical explores the behavior and configuration of generic networking
devices like routers and switches using CISCO Packet Tracer, a versatile
network simulation tool. It provides hands-on experience in designing, testing, and
troubleshooting networks, laying a strong foundation in networking concepts and
protocols.

A simple network with multiple nodes and connect via generic devices available in
library.
In computer networks, many different network devices are used. These devices used
in computer networks has different characteristics. Each of them provides a specific
role.
Basically, these network equipment’s are:
• Hubs
• Bridges
• Layer Two Switches
• Multilayer Switches
• Routers
• Modems
• Repeater
• Firewall

Hub :is a very simple network device that is used in LANs. It is basically a multiport
repeater. Hubs do not decide anything and forwards any traffic to all of the ports. So, they are
not smart devices. They have multiple ports that connects different network equipment’s in
the same network.

Bridge - A bridge is a network device that connects two or more LANs (local area
networks) to form a larger LAN. Network bridging refers to the process of
aggregating networks.

13 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

Layer Two Switches - A Layer 2 switch is a network device that interconnects


networks at layer 2, specifically at the MAC sublayer. It functions as a bridge,
building tables for the transfer of frames between networks

Multi Layer Switches - multilayer switch (MLS) is a network device that


operates at multiple layers of the OSI (Open Systems Interconnection)model,
typically Layers 2, 3, and 4.

Router - A router is a device that sends and receives data on computer


networks, connecting multiple devices to the internet or an intranet

14 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

Modems - The name modem means modulator demodulator. A modem connects our
computer to a standard phone line or to our cable, which allows us to send data or
receive data.

Repeater - A repeater in a computer network is a device that amplifies and


retransmits signals to increase a network's range, restore weak signals, or connect
networks.

A) Use only HUB to design a small network

Program datagrams can also be transferred successful from all the hosts to all the hosts.

15 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

B)Use only a Switch to design a small network

All the packet datagrams are transferring successfully.

CONCLUSION: Here we have studied the, behavior of generic devices used for
networking of CISCO PACKET TRACER done successfully.

16 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

EXPERIMENT NO: 4
AIM: Data Link Layer (Error Correction): Write a program to implement
error detection and correction using HAMMING code concept. Make a test
rum to input data stream and verify error correction feature.

Introduction:

The Hamming Code method is a network technique designed by R.W. Hamming, for
damage and error detection during data transmission between multiple network
channels. The Hamming Code method is one of the most effective ways to detect single-
data bit errors in the original data at the receiver end.

Theory:

Hamming code can be applied to data units of any length.


•It is used to detect & correct single bit errors.
•Hamming Code Structure

All bit positions that are power of 2 are marked as Parity bits (1,2,4,8,16…..)
Remaining bits are for data

7 Bits
D7 D6 D5 P4 D3 P2 P1

Determine the value of Parity Bits

Rules:- The value of parity bit is determined by the sequence of bits that is alternatively
checks and skips.
1101
Sende Receive
r r
D7 D6 D5 P4 D3 P2 P1

For P1:- Check 1 bit, skip 1 bit, check 1 bit, skip 1 bit (1,3,5,7)
For P2:- Check 2 bits, skip 2 bits, check 2 bits, skip 2 bits (2,3,6,7)
For P4:- Check 4 bits, skip 4 bits, check 4 bits, skip 4 bits (4,5,6,7)

17 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

P1 D3 D5 D7 P2 D3 D6 D7 P4 D5 D6 D7
P1 1 0 1 P2 1 1 1 P4 0 1 1
P1=0(Even Parity) P2=1(Odd Parity) P4=0(Even Parity)

This message is send to receiver.


D7 D6 D5 P4 D3 P2 P1

• Detecting Error
Consider Hamming
Code D7 D6 D5 P4
D3 P2 P1
At receiving end bits are (1,3,5,7) , (2,3,6,7) and (4,5,6,7) are checked for
every parity. if P1 = 0, P2 = 0, P4 = 0 then No Error
If any one parity bit is 1 then there is an error.
•Correcting Error
An error is located by forming a 3 bit no. out of 3 parity checks

Finding P1:- we check parity of (P1,


D3, D5, D7) If it is odd no. of 1’s then
error exists. P1= 1
If it is even no. of 1’s then no error.
P1 =0 Similarly find out for P2 and
P4.
After that we have found the error word, convert into
decimal value. Then we invert the incorrect bit to obtain the
correct word.
Example

•A 7bit Hamming Code is received as 1011011. Assume even parity and state whether the
received code is correct or wrong. If wrong locate the bit in error.
D7 D6 D5 P4 D3 P2 P1

1)Detecting Errors:-
Step 1:- Analyzing Parity bits
P1-> 1,3,5,7
Odd Parity So error exists We put P1 = 1

18 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

Program :

19 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

OUTPUT :

Conclusion: Here we have studied that, program to correct or detect error using hamming
code done successfully.

20 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

EXPERIMENT NO: 5
AIM : Virtual LAN: Simulate Virtual LAN configuration using CISCO
Packet Tracer Simulation.
Introduction:

This practical focuses on simulating Virtual LAN (VLAN) configuration using


CISCO Packet Tracer. We will learn how to segment a network into smaller logical
networks to enhance performance, improve security, and manage traffic efficiently
within an organization.

VLAN - A virtual local area network (VLAN) is a virtualized connection that connects
multiple devices and network nodes from different LANs into one logical network.
A virtual LAN (VLAN) is a logical overlay network that groups together a subset of
devices that share a physical LAN, isolating the traffic for each group. A LAN is a group
of computers or other devices in the same place -- e.g., the same building or campus -- that
share the same physical network.

What are 4 benefits of VLAN?


VLANs provide a number of advantages including ease of administration, confinement of
broadcast domains, reduced network traffic, and enforcement of security policies.

In Switch Press CLI(Command Line


Interface) And type below
commands:
Switch>enable
21 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

Switch#config terminal
Switch(Config)#Vlan 10
Switch(Config—Vlan)#name HR
Switch(Config—Vlan)#Vlan 20
Switch(Config—Vlan)#name IT

Switch(Config—Vlan)#int fa0/1
Switch(Config—Vlan)#switchport
mode access Switch(Config—
Vlan)#switchport access vlan 10

Switch(Config—Vlan)#int fa0/2
Switch(Config—Vlan)#switchport
mode access Switch(Config—
Vlan)#switchport access vlan 10
Switch(Config—Vlan)#int fa0/3
Switch(Config—Vlan)#switchport
mode access Switch(Config—
Vlan)#switchport access vlan 20

Switch(Config—Vlan)#int fa0/4
Switch(Config—Vlan)#switchport
mode access Switch(Config—
Vlan)#switchport access vlan 20

Switch(Config—Vlan)#int fa0/5
Switch(Config—Vlan)#switchport
mode trunk Router Configuration”
Continue with the configuration
dialog: Yes Router>en
Router>Conf t
Enter the configuration commands end with CNTL/Z
Router(Config)# int fa0/0
Router(Config-if)#no
shutdown Some
Router(Config-if)# int
fa0/0.10
Router(Config-subif)#
encapsulation dot1q 10
Router(Config-subif)# ip add 192.168.1.1 255.255.255.0
Router(Config-subif)# int fa0/0.20
Router(Config-subif)# encapsulation
dot1q 20int

CONCLUSION: Here we have studied the, Simulation of the Virtual LAN configuration
using

22 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

EXPERIMENT NO: 6

AIM : Wireless LAN-Configuration of Wireless LAN using CISCO Packet


Tracer Wireless LAN Definition - A wireless local-area network (WLAN) is
a group of collocated computers or other devices that form a network
based on radio transmissions (rather than wired connections).

Introduction:

In this practical, we will configure a Wireless Local Area Network (WLAN) using CISCO
Packet Tracer. WLANs enable devices to connect and communicate wirelessly via radio
transmissions, providing flexibility and mobility within the network.

ADVANTAGES –

• Mobility: WLAN allows users to move around a specific area while staying
connected to the internet.
• Flexibility: WLANs allow nodes to communicate within radio coverage without
restrictions.
• Cost: WLANs are generally less expensive to install and maintain than wired LANs.
• Ease of use: WLANs are easy to use and require little new information to learn.
• Robustness: WLANs can handle disasters better than wired networks, which
often break down.

DISADVANTAGES –
• Interference: Wireless networks are vulnerable to interference from external
factors like dust storms, fog, radiation, and radio signals.
• Security: WLANs are less secure than wired networks.
• Bandwidth: WLANs have lower bandwidth than wired networks due to radio
transmission limitations.
• Speed: WLANs are slower than wired networks due to lower bandwidth and
higher error rates.
• Reliability: Wireless connections can be less reliable than wired connections
due to signal degradation from distance, interference, and obstacles

23 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

A) Static

B) Dynamic

CONCLUSION: Here we have studied the, Wireless LAN-Configuration of Wireless


LAN using CISCO PACKET TRACER done successfully

24 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

PRACTICAL- 7

AIM: Inter networking with routers:


1: Experiment on same subnet
2: Perform Experiment across the subnet and observe functioning of
Router via selecting suitable pair of Source and destination.

Serial Transmission:
In Serial Transmission, data-bit flows from one computer to another computer in
bi-direction. In this transmission, one bit flows at one clock pulse. In Serial
Transmission, 8 bits are transferred at a time having a start and stop bit.

Serial Transmission

Parallel Transmission:
In Parallel Transmission, many bits are flow together simultaneously from one
computer to another computer. Parallel Transmission is faster than serial transmission
to transmit the bits. Parallel transmission is used for short distance.

Parallel Transmission

25 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

7.1:

7.2:

CONCLUSION: Here we have studied the, Experiment on same subnet 2: Perform


Experiment across the subnet and observe functioning of Router via selecting
suitable pair of Source and destination using CISCO PACKET TRACER done
successfully.

26 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

PRACTICAL- 8

AIM : Implementation of SUBNETTING: Design multiple subnets with


suitable number of hosts. Make a plan to assign staticIP addressing
across all subnet to explain implementation of SUBNETTING.

Introduction To Subnetting:

When a bigger network is divided into smaller networks, to maintain security, then that is
known as Subnetting. So, maintenance is easier for smaller networks. For example, if we
consider a class A address, the possible number of hosts is 224 for each network, it is
obvious that it is difficult to maintain such a huge number of hosts, but it would be quite
easier to maintain if we divide the network into small parts.

Uses of Subnetting:

I. Subnetting helps in organizing the network in an efficient way which helps in


expanding the technology for large firms and companies.
II. Subnetting is used for specific staffing structures to reduce traffic and
maintain order and efficiency.
III. Subnetting divides domains of the broadcast so that traffic is routed efficiently,
which helps in improving network performance.
IV. Subnetting is used in increasing network security.

The network can be divided into two parts: To divide a network into two parts, you need to
choose one bit for each Subnet from the host ID part.

27 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

In the above diagram, there are two Subnets.


Note: It is a class C IP so, there are 24 bits in the network id part and 8 bits in the host id part.

How Does Subnetting Work?


• The working of subnets starts in such a way that firstly it divides the
subnets into smaller subnets. For communicating between subnets,
routers are used.
• Each subnet allows its linked devices to communicate with each
other. Subnetting for a network should be done in such a way that it
does not affect the network bits.
In class C the first 3 octets are network bits so it remains as it is.
• For Subnet-1: The first bit which is chosen from the host id part is zero
and the range will be from (193.1.2.00000000 till you get all 1’s in the
host ID part i.e, 193.1.2.01111111) except for the first bit which is
chosen zero for subnet id part.

Thus, the range of subnet 1 is: 193.1.2.0 to 193.1.2.127


Subnet id of Subnet-1 is : 193.1.2.0
The direct Broadcast id of Subnet-1 is:
193.1.2.127 The total number of hosts
possible is: 126 (Out of 128, 2 id's are used
for Subnet id & Direct Broadcast id) The
subnet mask of Subnet- 1 is:
255.255.255.128

• For Subnet-2: The first bit chosen from the host id part is one and the range
will be from (193.1.2.100000000 till you get all 1’s in the host ID part
i.e,193.1.2.11111111).

Thus, the range of subnet-2 is: 193.1.2.128 to 193.1.2.255


Subnet id of Subnet-2 is : 193.1.2.128
The direct Broadcast id of Subnet-2 is:
193.1.2.255 The total number of hosts
possible is: 126 (Out of 128, 2 id's are used
for Subnet id & Direct Broadcast id) The
subnet mask of Subnet- 2 is:
255.255.255.128
28 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

Introduction to Subnetting:
Subnetting is a combination of two words i.e. Sub and Netting. Here Sub word means
Substitute and netting word means Network. The Substitute Network created for a function to
happen is known as Subnetting.

The IPv4 Addressing has five different classes. They are:


o Class A Network
o Class B Network
o Class C Network
o Class D Network
o Class E Network
The total number of Internet Protocol Addresses (IP Address) gives the total number of
Subnets that can be formed by using a network.
o Class A has 24 Host ID Bits
o Class B has 16 Host ID Bits
o Class C has 8 Host ID Bits

The number of usable IP Addresses that can be created is


The total number of IP Addresses creatable = 2 The total number of Host ID
Bits
- 2. Class A Network can have 224 - 2
Class B Network can have
216 - 2 Class C Network
can have 28 - 2
Class D and Class E do not contribute for IP Address
creation. Class D is used for multicasting purpose
Class E is used for Address Range
Calculator They are saved for future

29 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

purposes.
EXAMPLE:

Conclusion: Here we studied to Design multiple subnets with suitable number of hosts
successfully.

30 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

PRACTICAL- 9

AIM: Routing at Network Layer: Simulate Static and Dynamic Routing


Protocol
Configuration using CISCO Packet Tracer.
INTRODUCTION:

Routing is the process of selecting and defining paths for IP-packet traffic within or between
networks as well as the process of managing network traffic overall..

Routing is a concept of layer 3 (network layer). Routing is the process of discovering the best
path for one network to another. The best path is selected based on metric and administrative
distance.

Features of Network Layer


It decides the route to be taken by the packets to travel from the source to the destination
among the multiple routes available in a network (also called routing). The source and
destination addresses are added to the data packets inside the network layer.

Layer 3
According to the OSI layer concept, routing, or best path selection, takes place on Layer
3 and is based on the logical address.

Static routing uses preconfigured routes to send traffic to its destination, while dynamic
routing uses algorithms to determine the best path.

31 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

Routing can be classified into three categories: Static Routing. Default Routing. Dynamic
Routing.

In packet-switching networks, such as the Internet, routing selects the paths for Internet
Protocol (IP) packets to travel from their origin to their destination. These Internet routing
decisions are made by specialized pieces of network hardware called routers.

• A router is a networking device that can be either physical or virtual. It receives,


analyzes data packets among computer networks and devices.
• It works in the network layer, the 3rd layer of the OSI model.
• In the OSI model, data packet switching is done through a router based on the address
on layer 3.
• A router is connected to multiple data lines from different IP networks.
• When a data packet reaches one of the lines, it reads the information about the
network address in the packet header to determine the destination address.
• It uses the information in its routing table and directs that packet to next.
• Router comes with firmware that is automatically installed within that helps it
perform various functions.
• It connects devices within a network by forwarding the data packets among them.
• For this, the router assigns a local IP address to every device on the network. It
ensures that data packets are reaching the accurate destination without getting lost.

Uses of Routers

• Multiple network connection: It connects multiple networks and forwards data


packets that are destined for direct or remotely attached networks.
• Managing congestion: It manages traffic between networks by forwarding data
packets to the destination address. It also allows multiple addresses to use the same
internet connection.
• Providing connectivity: Large routers interconnect several Internet Service Providers
(ISPs). Small routers provide connectivity for homes and office networks.
• Connecting subnets: Routers are used for connecting multiple logical groups of
computer devices called subnets with the different network prefixes.
• Port forwarding: They are also used for port forwarding among private ISPs.
• Traffic classification: A router with the help of QoS, takes the decision on which data
packet should be first processed.

32 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

Types of Routers

The following are different types of routers that are used by individuals as well as
enterprises:
1. Edge router
• Also known as a gateway router, it is a specialised router that acts as an intermediary
between different networks. It resides at the edge of a network.
• Edge ensures connectivity of its network with wide area network (WAN), internet or
external networks.
• For connectivity with remote networks, Edge uses the network protocol .
• Edge routers have ethernet ports as inputs to connect with the internet and have
multiple outputs for connecting additional routers.

2. Wireless router
It is a device that acts as a router as well as a wireless access point.
Such routers provide access to private computer networks or the internet.
Based on the model, it can function in either a wired local area network, wireless-only LAN
or a mix of the wired and wireless network.
These routers have one or two USB ports that can be connected to a device and used as a
shared resource on the network.

3. Virtual router
It is a software-based framework with the same function as physical routers.
These routers run on commodity servers and are packaged either alone or with other network
functions.
However, they increase the reliability of a network through virtual redundancy protocol.

4. Distribution router
It is a router in the local area network of a single organization.
Also known as an interior router, it receives data from Edge router via a wired connection
and it sends this to the end user.
This is usually done through Wi-Fi.

Advantages of Using Routers


• Determines the most efficient path between source and destination using dynamic
routing algorithms such as OSPF, BGP, RIP, etc.
• Reduces network traffic by creating the collision domains and broadcast domains.
• Provides connection among different network architecture.
• Connects multiple users to a single network connection.

Disadvantages of Using Routers


• Hardware-based routers are vulnerable to cyber attackers since they contain software
called firmware
• Since routers analyze data transmission from physical to network layer, they are
slower than repeaters and bridges.
• There is less bandwidth for user data since dynamic router communications.
• Routers also face compatibility issues with 5GHz frequency.

33 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

CONCLUSION:
Here we have done to simulate Static and Dynamic Routing Protocol Configuration using
CISCO Packet Tracer successfully.

34 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

PRACTICAL- 10

Transport Layer
o The transport layer is a 4th layer from the top.
o The main role of the transport layer is to provide the communication services directly
to the application processes running on different hosts.
o The transport layer provides a logical communication between application processes
running on different hosts. application processes use the logical communication
provided by the transport layer to send the messages to each other.
o The transport layer protocols are implemented in the end systems but not in the
network routers.
o A computer network provides more than one protocol to the network applications. For
example, TCP and UDP are two transport layer protocols that provide a different set
of services to the network layer.

What is E-mail?

35 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

E-mail is defined as the transmission of messages on the Internet. It is one of the most
commonly used features over communications networks that may contain text, files, images,
or other attachments. Generally, it is information that is stored on a computer sent through a
network to a specified individual or group of individuals.

FTP
o FTP stands for File transfer protocol.
o FTP is a standard internet protocol provided by TCP/IP used for transmitting the files
from one host to another.
o It is mainly used for transferring the web page files from their creator to the computer
that acts as a server for other computers on the internet.

DNS

An application layer protocol defines how the application processes running on different
systems, pass the messages to each other.

o DNS stands for Domain Name System.


o DNS is a directory service that provides a mapping between the name of a host on the
network and its numerical address.
o DNS is required for the functioning of the internet.
o Each node in a tree has a domain name, and a full domain name is a sequence of
symbols specified by dots.
o DNS is a service that translates the domain name into IP addresses. This allows the
users of networks to utilize user-friendly names when looking for other hosts instead of
remembering the IP addresses.
o For example, suppose the FTP site at EduSoft had an IP address of 132.147.165.50,
most people would reach this site by specifying ftp.EduSoft.com. Therefore, the domain
name is more reliable than IP address.

HTTPS
HTTPS is an abbreviation of Hypertext Transfer Protocol Secure. It is a secure extension
or version of HTTP. This protocol is mainly used for providing security to the data sent
between a website and the web browser. It is widely used on the internet and used for secure
communications. This protocol uses the 443 port number for communicating the data.

36 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

37 | P a g e
COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING & TECHNOLOGY

CN (303105256) B. Tech.4TH SEM

ENROLLMENT NO: 2303051050322

Conclusion: Here we have done Routing using Transport Layer with Application Layer.

38 | P a g e

You might also like