CN LabManual
CN LabManual
Vision :
To be a center of excellence in the field of Computer Science and Engineering along with
imparting proficient and adaptable technological resources for the well being of mankind.
Mission:
Course Outcomes:
Install and Configure Wired and Wireless NIC and transfer files between
systems in Wired LAN and Wireless LAN. Consider both adhoc and
infrastructure mode of operation.
Work with the commands Ping, Tracert, Ipconfig, pathping, telnet, ftp,
2 getmac, ARP, Hostname, Nbtstat, netdiag, and Nslookup
T1: Shivendra S.Panwar, Shiwen Mao, Jeong-dong Ryoo, and Yihan Li, “TCP/IP Essentials A
Lab- Based Approach”, Cambridge University Press, 2004
T2: Cisco Networking Academy, “CCNA1 and CCNA2 Companion Guide”, Cisco Networking
Academy Program, 3rd edition, 2003
T3: Elloitte Rusty Harold, “Java Network Programming”, 3rd edition, O’REILLY, 2011
.
T4: Ns Manual, Available at: https://www.isi.edu/nsnam/ns/ns-documentation.html, 2011
Computer Networks Lab (20A05501P)
Experiment 1:
A) Study different types of Network cables (Copper and Fiber) and prepare cables (Straight and
Cross) to connect Two or more systems. Use crimping tool to connect jacks. Use LAN tester to
connect the cables.
B) Install and configure Network Devices: HUB, Switch and Routers. Consider both manageable
and non-manageable switches. Do the logical configuration of the system. Set the bandwidth of
different ports.
C) Install and Configure Wired and Wireless NIC and transfer files between systems in Wired
LAN and Wireless LAN. Consider both adhoc and infrastructure mode of operation.
1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be very careful at this
point, as to not nick or cut into the wires, which are inside. Doing so could alter the characteristics of
your cable, or even worse render is useless. Check the wires, one more time for nicks or cuts. If there are
any, just whack the whole end off, and start over.
2. Spread the wires apart, but be sure to hold onto the base of the jacket with your other hand. You do not
want the wires to become untwisted down inside the jacket. Category 5 cable must only have 1/2 of an
inch of 'untwisted' wire at the end; otherwise it will be 'out of spec'. At this point, you obviously have
ALOT more than 1/2 of an inch of un-twisted wire.
3. You have 2 end jacks, which must be installed on your cable. If you are using a pre-made cable, with one
of the ends whacked off, you only have one end to install - the crossed over end Below are two diagrams,
which show how you need to arrange the cables for each type of cable end. Decide at this point which
end you are making and examine the associated picture below.
Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator is a device for
connecting multiple twisted pair or fiber optic Ethernet devices together and making them act as a single
network segment. Hubs work at the physical layer (layer 1) of the OSI model. The device is a form of
multiport repeater. Repeater hubs also participate in collision detection, forwarding a jam signal to all
ports if it detects a collision.
Switch: Anetwork switch or switching hub is a computer networking device that connects network
segments. The term commonly refers to a network bridge that processes and routes data at the data link
layer (layer 2) of the OSI model. Switches that additionally process data at the network layer (layer 3 and
above) are often referred to as Layer 3 switches or multilayer switches.
Router: A router is an electronic device that interconnects two or more computer networks, and
selectively interchanges packets of data between them. Each data packet contains address information that
a router can use to determine if the source and destination are on the same network, or if the data packet
must be transferred from one network to another. Where multiple routers are used in a large collection of
interconnected networks, the routers exchange information about target system addresses, so that each
router can build up a table showing the preferred paths between any two systems on the interconnected
networks.
Repeater: Functioning at Physical Layer. A repeater is an electronic device that receives a signal and
retransmits it at a higher level and/or higher power, or onto the other side of an obstruction, so that the
signal can cover longer distances. Repeater have two ports ,so cannot be use to connect for more than two
devices.
Bridge: A network bridge connects multiple network segments at the data link layer (Layer 2) of the
OSI model. In Ethernet networks, the term bridge formally means a device that behaves according to the
IEEE 802.1D standard. A bridge and switch are very much alike; a switch being a bridge with numerous
ports. Switch or Layer 2 switch is often used interchangeably with bridge .Bridges can analyze incoming
data packets to determine if the bridge is able to send the given packet to another segment of the network.
Gate Way: In a communications network, a network node equipped for interfacing with another network
that uses different protocols.
• A gateway may contain devices such as protocol translators, impedance matching devices, rate
converters, fault isolators, or signal translators as necessary to provide system interoperability. It also
requires the establishment of mutually acceptable administrative procedures between both networks.
• A protocol translation/mapping gateway interconnects networks with different network
protocol technologies by performing the required protocol conversions.
C) Install and Configure Wired and Wireless NIC and transfer files between systems in
Wired LAN and Wireless LAN. Consider both adhoc and infrastructure mode of
operation .
Required Resources:
1 PC (Windows with two NICs, wired and wireless, and a wireless connection)
Instructions
Part 1: Identify and Work with PC NICs.
In Part 1, you will identify the NIC types in the PC that you are using. You will explore different
ways to extract information about these NICs and how to activate and deactivate them.
Step 1: Use the Network and Sharing Center.
1. Navigate to the Control Panel. Click View network status and tasks under Network and
Internet heading in the Category View.
2. In the left pane, click the Change adapter settings link.
3. In the Network Connections window, the results provide a list of NICs available on this PC. Look
for your Wi-Fi adapters.
Note: Virtual Private Network (VPN) adapters and other types of network connections may also
be displayed in this window.
1. Locate the wireless network connection. If it is disabled, right-click and select Enable to activate
your wireless NIC.
2. If the wireless network connection is not currently connected, right-click and
select Connect/Disconnect to connect to an SSID that you are authorized to connect to.
3. Right-click a wireless network connection, and then click Status.
4. The wireless network connection Status window displays where you can view information about
your wireless connection.
5. Click Details to display the Network Connection Details window.
6. Open a Windows Command Prompt and type ipconfig /all.
7. Close the command window and the Network Connection Details window. This should return you
back to the Wi-Fi Status window. Click Wireless Properties.
8. In the Wireless Network Properties window, click the Security tab.
9. The type of security the connected wireless router has implemented displays. Click the Show
characters check box to display the actual Network security key, instead of the hidden characters,
and then click OK.
10. Close the Wireless Network Properties and the Wi-Fi Status windows. Select and right-click
the Wi-Fi option > Connect/Disconnect. A pop-up window should appear at the bottom right
corner of your desktop that displays your current connection, along with a list of SSIDs that are in
range of the wireless NIC of your PC. If a scrollbar appears on the right side of this window, you
can use it to display additional SSIDs.
11. To join one of the other wireless network SSIDs listed, click the SSID that you want to join, and
then click Connect.
12. If you have selected a secure SSID, you are prompted to enter the Security key for the SSID.
Type the security key for that SSID and click OK. You can click the Hide characters check box
to prevent people from seeing what you type in the Security key field.
Step 3: Work with your wired NIC.
1. On the Network Connections window, select and right-click Ethernet option to display the drop-
down list. If the NIC is disabled, enable it, and then click the Status option.
Department of CSE, Ravindra College of Engineering for Women 5
Computer Networks Lab (20A05501P)
Note: You must have an Ethernet cable attaching your PC NIC to a switch or similar device to
see the status. Many wireless routers have a small 4-port Ethernet switch built-in. You can
connect to one of the ports using a straight-through Ethernet patch cable.
2. In the Status window, the results display information about your wired connection to the LAN.
3. Click Details… to view the address information for your LAN connection.
4. Open a command window prompt and type ipconfig /all. Find your Ethernet adapter information
and compare this with the information displayed in the Network Connection Details window.
C:\Users\ITE> ipconfig /all
Experiment 2 : Work with the commands Ping, Tracert, Ipconfig, pathping, telnet, ftp,
getmac, ARP, Hostname, Nbtstat, netdiag, and Nslookup
Ping Command :
Verifies IP-level connectivity to another TCP/IP computer by sending Internet Control Message Protocol
(ICMP) Echo Request messages. The receipt of corresponding Echo Reply messages are displayed, along
with round-trip times. Ping is the primary TCP/IP command used to troubleshoot connectivity,
reachability, and name resolution.
Tracert Command :
Determines the path taken to a destination by sending Internet Control Message Protocol (ICMP) Echo
Request messages to the destination with incrementally increasing Time to Live (TTL) field values. The
path displayed is the list of near-side router interfaces of the routers in the path between a source host and
a destination. The near-side interface is the interface of the router that is closest to the sending host in the
path. Used without parameters, tracert displays help.
This diagnostic tool determines the path taken to a destination by sending ICMP Echo Request messages
with varying Time to Live (TTL) values to the destination. Each router along the path is required to
decrement the TTL in an IP packet by at least 1 before forwarding it.
Effectively, the TTL is a maximum link counter. When the TTL on a packet reaches 0, the router is
expected to return an ICMP Time Exceeded message to the source computer. Tracert determines the path
by sending the first Echo Request message with a TTL of 1 and incrementing the TTL by 1 on each
subsequent transmission until the target responds or the maximum number of hops is reached. The
maximum number of hops is 30 by default and can be specified using the -h parameter.
The path is determined by examining the ICMP Time Exceeded messages returned by intermediate
routers and the Echo Reply message returned by the destination. However, some routers do not return
Time Exceeded messages for packets with expired TTL values and are invisible to the tracert command.
In this case, a row of asterisks (*) is displayed for that hop.
Examples:
To trace the path to the host named www.google.co.in use following command
Ipconfig Command :
Displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration
Protocol (DHCP) and Domain Name System (DNS) settings. This command is most useful on computers
that are configured to obtain an IP address automatically. This enables users to determine which TCP/IP
configuration values have been configured by DHCP, Automatic Private IP Addressing (APIPA), or an
alternate configuration.
If the Adapter name contains any spaces, use quotation marks around the adapter name (that is, "Adapter
Name").
For adapter names, ipconfig supports the use of the asterisk (*) wildcard character to specify either
adapters with names that begin with a specified string or adapters with names that contain a specified
string.
ARP Command :
Displays and modifies entries in the Address Resolution Protocol (ARP) cache, which contains one or
more tables that are used to store IP addresses and their resolved Ethernet or Token Ring physical
addresses. There is a separate table for each Ethernet or Token Ring network adapter installed on your
computer.
Examples:
To display the ARP cache tables for all interfaces use following command
Netstat Command :
Displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP
routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6,
ICMPv6, TCP over IPv6, and UDP over IPv6 protocols).
Nbtstat Command :
NetBIOS name tables for both the local computer and remote computers, and the NetBIOS name cache.
Nbtstat allows a refresh of the NetBIOS name cache and the names registered with Windows Internet
Name Service (WINS).
Nslookup Command :
Nslookup (Name Server lookup) is a UNIX shell command to query Internet domain name servers
Pathping Command :
The PathPing command is a command-line network utility supplied in Windows 2000 and beyond that
combines the functionality of ping with that of tracert. It is used to locate spots that have network
latency and network loss.The command provides details of the path between two hosts and ping-like
statistics for each node in the path based on samples taken over a time period, depending on how many
nodes are between the start and end host.
The advantages of PathPing over ping and traceroute are that each node is pinged as
the result of a single command, and that the behavior of nodes is studied over an extended time period,
rather than the default ping sample of four messages or default traceroute single route trace. The
disadvantage is that it takes a total of 25 seconds per hop to show the ping statistics
Telnet Command :
The Telnet protocol creates a communication path through a virtual terminal connection. The data
distributes in-band with Telnet control information over the transmission control protocol (TCP). Unlike
other TCP/IP protocols, Telnet provides a log-in screen and allows logging in as the remote device’s
actual user when establishing a connection on port 23. This type of access grants direct control with all
the same privileges as the owner of the credentials. Telnet comes with a command accessible from the
command line in Windows. The telnet command also exists for macOS and Linux operating systems.
Ftp Command :
FTP is the simplest file transfer protocol to exchange files to and from a remote computer or network.
Similar to Windows, Linux and UNIX operating systems also have built-in command-line prompts that
can be used as FTP clients to make an FTP connection. Here’s a list of commonly used FTP Linux and
UNIX platforms commands.
Getmac Command :
Returns the media access control (MAC) address and list of network protocols associated with each
address for all network cards in each computer, either locally or across a network. This command is
particularly useful either when you want to enter the MAC address into a network analyzer, or when you
need to know what protocols are currently in use on each network adapter on a computer.
Hostname Command :
hostname command in Linux is used to obtain the DNS(Domain Name System) name and set the
system’s hostname or NIS(Network Information System) domain name. A hostname is a name which
is given to a computer and it attached to the network. Its main purpose is to uniquely identify over a
network.
Netdiag Command:
The Netdiag command-line diagnostic tool helps to isolate networking and connectivity problems by
performing a series of tests to determine the state of your network client. These tests and the key network
status information that they expose give network administrators and support personnel a more direct
means of identifying and isolating network problems.
Experiment 3 : Find all the IP addresses on your network. Unicast, Multicast, and Broadcast on
your network.
1. Unicast addresses
Unicast addresses represent a single LAN interface. A unicast frame will be sent to a specific
device, not to a group of devices on the LAN:
The unicast address will have the value of the MAC address of the destination device.
Unicast IP addresses – an address of a single interface. The IP addresses of this type are used
for one-to-one communication. Unicast IP addresses are used to direct packets to a specific host.
Here is an example:
In the picture above you can see that the host wants to communicate with the server. It uses the (unicast)
IP address of the server (192.168.0.150) to do so
2. Multicast addresses
Multicast addresses represent a group of devices in a LAN. A frame sent to a multicast address
will be forwarded to a group of devices on the LAN:
Multicast frames have a value of 1 in the least-significant bit of the first octet of the destination
address. This helps a network switch to distinguish between unicast and multicast addresses.
Multicast IP addresses – used for one-to-many communication. Multicast messages are sent to IP multicast
group addresses. Routers forward copies of the packet out to every interface that has hosts subscribed to that
group address. Only the hosts that need to receive the message will process the packets. All other hosts on the
LAN will discard them. Here is an example:
R1 has sent a multicast packet destined for 224.0.0.9. This is an RIPv2 packet, and only routers on the
network should read it. R2 will receive the packet and read it. All other hosts on the LAN will discard the
packet.
3. Broadcast addresses
Broadcast addresses represent all device on the LAN. Frames sent to a broadcast address will be
delivered to all devices on the LAN:
broadcast IP addresses – used to send data to all possible destinations in the broadcast domain (the one-to-
everybody communication). The broadcast address for a network has all host bits on. For example, for the
network 192.168.30.0 255.255.255.0 the broadcast address would be 192.168.30.255*. Also, the IP address of
all 1’s (255.255.255.255) can be used for local broadcast. Here’s an example:
R1 wants to communicate with all hosts on the network and has sent a broadcast packet to the
broadcast IP address of 192.168.30.255. All hosts in the same broadcast domain will receive and
process the packet.
Experiment - 4 : Use Packet tracer software to build network topology and configure using
Distance vector routing protocol.
Procedure :
RIP Configuration
Configure PC0: Configure IP Address for PC0 and same repeat for all the PC’s.
Configure PC1:
Select the RIP and add all the network address as shown below and apply same for Router1 and
Router 2.
Department of CSE, Ravindra College of Engineering for Women 21
Computer Networks Lab (20A05501P)
Router 1:
Router 2 :
SIMULATION: Sending data from PC1 to PC4 via Router 0 to Router 1, Router 1 to Router 2.
Experiment 5 : Use Packet tracer software to build network topology and configure using Link
State routing protocol.
Procedure :
Configure PC1:
Configure PC2:
Configure PC3:
Configuring IP Addresses for Router0: Configure all the IP Address for 4 ports as given
below
Note: Configure IP Addreses for remaining routers router1, router2 and router3 also.
Configure Shortest Path by assigning Network Addresses for router0, router1, router2 and
router3 as shown below:
Simulation: Sending data from PC0 to PC2 via Router0 and Router2 which takes open shortest
path.
Program:
RMI (Remote Method Invocation) is an API used to access objects running on another
JVM(Server-side). It is mainly used for the creation of distributed systems and is provided in Java
Rome. Stub and Skeleton are the two objects used for handling communication between client and
server. The following figure shows an overview of RMI.
Stub Object: The stub object on the client machine builds an information block and
sends this information to the server.
Skeleton Object: The skeleton object passes the request from the stub object to the
remote object. RMI contains a rmiregistry that holds all the server objects. The server
binds all the objects to the registry and then the client fetches the object from the
respective registry after which the client invokes the methods using the fetched objects.
import java.rmi.*;
import java.rmi.*;
import java.rmi.*;
import java.rmi.*;
// implementation class
Impl obj = new Impl();
"\n1.Addition\n2.Subtraction\n3.multiplication\n4.division\n5.Exit");
System.out.println("Enter the option:");
int opt = sc.nextInt();
if (opt == 5) {
break;
}
System.out.println("Enter the the first number:");
int a = sc.nextInt();
System.out.println("Enter the second number:");
int b = sc.nextInt();
int n;
switch (opt) {
case 1:
// lookup method to find reference of remote
// object
AddInterface obj=
(AddInterface)Naming.lookup("rmi://localhost:6000/s
onoo");
n = obj.add(a, b);
System.out.println("Addition= " + n);
break;
case 2:
SubInterface obj1=
Department of CSE, Ravindra College of Engineering for Women 38
Computer Networks Lab (20A05501P)
(SubInterface)Naming.lookup("rmi://localhost:6000/sonoo");
n = obj1.sub(a, b);
System.out.println("Subtraction= " + n);
break;
case 3:
MulInterface obj2=
(MulInterface)Naming.lookup("rmi://localhost:6000/sonoo");
n = obj2.mul(a, b);
System.out.println("Multiplication = " + n);
break;
case 4:
DivInterface obj3=
(DivInterface)Naming.lookup("rmi://localhost:6000/sonoo");
n = obj3.div(a, b);
System.out.println("Division = " + n);
break;
}
}
}
}
javac *.java
rmic Impl
OUTPUT:
Experiment 7 : Implement a Chatting application using JAVA TCP and UDP sockets..
Program:
Concept:
2. Both can be run in the same machine or different machines. If both are running in the machine, the
address to be given at the client side is local host address.
3. If both are running in different machines, then in the client side we need to specify the ip address
of machine in which server application is running.
Program:
import java.net.*;
import java.io.*;
public class chatserver { public static void main(String args[]) throws Exception
Socket sk=ss.accept();
String s;
while ( true )
s=cin.readLine();
System.out.print("Server : ");
s=stdin.readLine();
cout.println(s);
ss.close();
sk.close();
cin.close();
cout.close();
stdin.close();
import java.net.*;
import java.io.*;
s=stdin.readLine();
sout.println(s);
s=sin.readLine();
System.out.print("Server : "+s+"\n");
if ( s.equalsIgnoreCase("BYE") )
break;
sk.close();
sin.close();
sout.close();
stdin.close();
import java.net.DatagramPacket;
import java.net.DatagramSocket;
import java.net.InetAddress;
import java.util.Scanner;
InetAddress ip = InetAddress.getLocalHost();
while (true)
Department of CSE, Ravindra College of Engineering for Women 47
Computer Networks Lab (20A05501P)
buf = inp.getBytes();
// the data.
DatagramPacket DpSend =
// the data.
ds.send(DpSend);
if (inp.equals("bye"))
break;
import java.io.IOException;
import java.net.DatagramPacket;
import java.net.DatagramSocket;
import java.net.InetAddress;
import java.net.SocketException;
while (true)
ds.receive(DpReceive);
System.out.println("Client:-" + data(receive));
if (data(receive).toString().equals("bye"))
break;
if (a == null)
return null;
int i = 0;
Department of CSE, Ravindra College of Engineering for Women 50
Computer Networks Lab (20A05501P)
while (a[i] != 0)
ret.append((char) a[i]);
i++;
return ret;
OUTPUT:
Experiment 8 : Hello command is used to know whether the machine at the other end is
working or not. Echo command is used to measure the round trip time to the neighbor.
Implement Hello and Echo commands using JAVA.
import java.io.*;
import java.net.*;
import java.util.*;
public class hello
{
public static void main(String[] args)
{
try
{
BufferedReader br = new BufferedReader(new InputStreamReader(System.in));
String ipaddr;
System.out.print("Enter the IP address : ");
ipaddr = br.readLine();
boolean reachable = (java.lang.Runtime.getRuntime().exec("ping -n 1
"+ipaddr).waitFor()==0);
if(reachable)
{
System.out.println("IP is reachable:: "+ipaddr);
try
{
Process p = Runtime.getRuntime().exec("Tracert "+ipaddr);
Scanner scan = new Scanner(p.getInputStream());
while(scan.hasNextLine())
{
System.out.println(scan.nextLine());
}
}
catch(Exception ex)
{
System.out.println("Error "+ex);
}
}
else
{
System.out.println("IP is not reachable: "+ipaddr);
}
}
catch(Exception e)
{
e.printStackTrace();
}
Department of CSE, Ravindra College of Engineering for Women 53
Computer Networks Lab (20A05501P)
}
}
OUTPUT:
import java.util.Scanner;
class Echo
{
public static void main (String[] args)
{
String inData;
Scanner scan = new Scanner( System.in );
OUTPUT:
Packet Sniffer :
Packet sniffer is a basic tool for observing network packet exchanges in a computer. As the name suggests,
a packet sniffer captures (“sniffs”) packets being sent/received from/by your computer; it will also
typically store and/or display the contents of the various protocol fields in these captured packets. A
packet sniffer itself is passive. It observes messages being sent and received by applications and protocols
running on your computer, but never sends packets itself.
Capturing Packets
After downloading and installing Wireshark, you can launch it and click the name of an interface under
Interface List to start capturing packets on that interface. For example, if you want to capture traffic on
the wireless network, click your wireless interface.
Test Run
Do the following steps:
1. Start up the Wireshark program (select an interface and press start to capture packets).
2. Start up your favorite browser (ceweasel in Kali Linux).
3. In your browser, go to Wayne State homepage by typing www.wayne.edu.
4. After your browser has displayed the http://www.wayne.edu page, stop Wireshark packet capture by
selecting stop in the Wireshark capture window. This will cause the Wireshark capture window to
disappear and the main Wireshark window to display all packets captured since you began packet Capture
5. Color Coding: You’ll probably see packets highlighted in green, blue, and black. Wireshark uses colors
to help you identify the types of traffic at a glance. By default, green is TCP traffic, dark blue is DNS
traffic, light blue is UDP traffic, and black identifies TCP packets with problems — for example, they
could have been delivered out-of-order.
6. You now have live packet data that contains all protocol messages exchanged between your computer
and other network entities! However, as you will notice the HTTP messages are not clearly shown
because there are many other packets included in the packet capture.
7. To further filter packets in Wireshark, we need to use a more precise filter. By setting the
http.host==www.wayne.edu, we are restricting the view to packets that have as an http host the
www.wayne.edu website.
Output:
Experiment 10 : Install Network Simulator 2/3. Create a wired network using dumbbell topology.
Attach agents, generate both FTP and CBR traffic, and transmit the traffic. Vary the data rates
and evaluate the performance using metric throughput, delay, jitter and packet loss.
Explanation:
This network consists of 4 nodes (n0, n1, n2, n3) as shown in above figure. The duplex links between n0 and n2,
and n1 and n2 have 2 Mbps of bandwidth and 10 ms of delay. The duplex link between n2 and n3 has 1.7 Mbps
of bandwidth and 20 ms of delay. Each node uses a DropTail queue, of which the maximum size is 10. A "tcp"
agent is attached to n0, and a connection is established to a tcp "sink" agent attached to n3. As default, the
maximum size of a packet that a "tcp" agent can generate is 1KByte. A tcp "sink" agent generates and sends
ACK packets to the sender (tcp agent) and frees the received packets. A "udp" agent that is attached to n1 is
connected to a "null" agent attached to n3. A "null" agent just frees the packets received. A "ftp" and a "cbr"
traffic generator are attached to "tcp" and "udp" agents respectively, and the "cbr" is configured to generate 1
KByte packets at the rate of 1 Mbps. The "cbr" is set to start at 0.1 sec and stop at 4.5 sec, and "ftp" is set to
start at 1.0 sec and stop at 4.0 sec.
Experiment 11 : Create a static wireless network. Attach agents, generate both FTP and CBR
traffic, and transmit the traffic. Vary the data rates and evaluate the performance using metric
throughput, delay, jitter and packet loss.
Experiment 12: Create a mobile wireless network. Attach agents, generate both FTP and CBR
traffic, and transmit the traffic. Vary the data rates and evaluate the performance using metric
throughput, delay, jitter and packet loss.
Additional Program 1: Cisco Switch and Router Configuration basic commands in Packet
Tracer.
Packet Tracer is a network simulation tool that allows us to create network topologies by
building virtual networking devices. Packet Tracer is highly encouraged for network
enthusiasts as it allows them to have keen in-depth knowledge of networking. Let us see how
to easily create a simple home network using Packet Tracer.
Step-1:
Open Packet Tracer and pick Home Router from Wireless Devices and place it on the
workspace.
Step-2:
Place Smartphone, PC, Laptop from End Devices on Workspace.
Notice that Smartphone automatically connects to the home router after placing it on the
workspace
Step-3:
Connect the pc to the home router by using Copper Cross-Over wire available from
Connections by configuring pc to FastEthernet0 and Home Router to GigabitEthernet 1.
Step-4:
To connect Laptop to Home Router we need to update a pin in the laptop’s configuration, to do
this click on the laptop and turn of the laptop and find the pin WPC300N and place it in the
laptop.
Note : To update the pin with WPC300N, the laptop must be turned off.