Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
LAB MANUAL
ON
DATA
COMMUNICATION NETWORK
Computer network : A collection of computing devices that are connected in various ways in
order to communicate and share resources Usually, the connections between computers in a network
are made using physical wires or cables.
However, some connections are wireless, using radio waves or infrared signals
The generic term node or host refers to any device on a network
Data transfer rate The speed with which data is moved from one place on a network to another
Data transfer rate is a key issue in computer networks
Computer networks have opened up an entire frontier in the world of computing called the
client/server model
File server A computer that stores and manages files for multiple users on a network
Web server A computer dedicated to responding to requests (from the browser client) for web pages
Local-area network (LAN): A network that connects a relatively small number of machines
Ring topology: A configuration that connects all nodes in a closed loop on which
messages travel in one direction
Star topology: A configuration that centers around one node to which all others are
connected and through which all messages are sent
Bus topology: All nodes are connected to a single communication line that carries
messages in both directions
15-10
Wide-area network (WAN): A network that connects two or more local-area networks over a
potentially large geographic distance .Often one particular node on a LAN is set up to serve as a
gateway to handle all communication going between that LAN and other networks .Communication
between networks is called internetworking .The Internet, as we know it today, is essentially the
ultimate wide-area network, spanning the entire globe
Well, nobody does. No single person or company owns the Internet or even controls it entirely. As a
wide-area network, it is made up of many smaller networks. These smaller networks are often owned
and managed by a person or organization. The Internet, then, is really defined by how connections
can be made between these networks.
The International
Organization for
Standardization (ISO)
established the Open
Systems Interconnection
(OSI) Reference Model
Sometimes referred to
as a protocol stack
TCP software breaks messages into packets, hands them off to the IP software for delivery,
and
then orders and reassembles the packets at their destination
IP stands for Internet Protocol
IP software deals with the routing of packets through the maze of interconnected networks to their
final destination
UDP stands for User Datagram Protocol
It is an alternative to TCP
The main difference is that TCP is highly reliable, at the cost of decreased performance,
while UDP is less reliable, but generally faster
DEVELOPMENT OF SKILLS
Objective of Computer Network is designated to perform computer system installation, preventive and
corrective maintenance, and computer network installation. Computer Network provide remote technical
support, perform administrative functions and supervisory functions. It is designed to prepare student
towards a world of computers and networking . student would be led through a series of experiment aimed
at providing necessary exposure to establishing connections, right through to troubleshooting of networking
problems. Upon completion of this lab, student would have gained the ability to perform following work
function
The objective of curriculum implementation is to develop the desired skills in the students so that they can
solve the field problems. These skills can be developed through classroom teaching, laboratory work,
drawing assignments and visits. There are two major skills i.e. intellectual skills and motor skills. The
intellectual skills related to thinking and motor skills related to physical actions of the learner. The
laboratory is the place where focus can be given on development of these skills. After undergoing through
the laboratory experiments it is expected that following skills should be developed in the students.
1
Intellectual Skills:
a Identification of various devices
b Use & working principle of these devices
c Application of various fields.
d Practical knowledge about the problems
2
3
4
5
6
7
8
9
10
11
12
13
14
Listen carefully to the lecture given by the teacher about importance of subject, curriculum
philosophy, graphical structure, skills to be developed, information about equipment, instruments,
procedure, method of continuous assessment, tentative plan of work in laboratory and total amount
of work to be done in a year.
Students shall undergo study visit of the laboratory for types of equipment, instruments, material to
be used, before performing the experiments.
Read the write up of each experiment to be performed, a day in advance.
Understand the purpose of experiment and its practical implications.
Students should not hesitate to ask any difficulty faced during conduct of practical/exercise.
The students shall study all the questions given in the laboratory manual and practice to write the
answers to those questions.
Students shall visit the recommended industries and should study the know how of the shop floor
practices and operations of machines.
Students shall develop maintenance skills as expected by the industries.
Students should develop the habit of group discussion related to the experiment to exchange their
knowledge.
Students shall attempt to develop related hands on skills and gain confidence.
Students shall focus on development of skills rather than theoretical or codified knowledge.
Students shall insist for the completion of recommended laboratory work, industrial visits, answers
to the given question etc.
Students shall develop the habit of evolving more ideas, innovations, skills etc. than included in the
scope of the manual.
Student shall refer technical magazines, proceedings of the seminars, refer websites related to the
scope of the subjects and update their knowledge and skills.
15 Student should develop the habit of not to depend totally on teachers but to develop self-learning
techniques.
16 Students should develop habit to submit the practical exercise continuously and progressively on the
scheduled dates and should get the assessment done.
17 Students should be well prepared while submitting the write up of the exercise. This will develop the
continuity of the studies and he will not be overloaded at the end of the term.
Date
perform
1
.
2
.
3
.
4
.
5
.
6
.
Introduction to NETSTAT
Computer Network.
commonds used in
of Date
submission
of Signature
7
.
8
.
9
.
EXPERIMENT NO-1
AIM: CRIMPING RJ-45 CONNECTORS
APPARATUS:
1-Cable
2-RJ_45 connectors
3-Utility knife
4-Crimping tool
5-Cable tester
6-Two pair of tweezer
THEORY: RJ-45 connectors are normally used in telephone and network cables. Occasionally they are
used for serial network connections. When the RJ-45 connectors first came into use, they were primarily
used for telephones. The great advances in technology created a need for another size connector and the RJ45 was adapted to fit. Today there are 2 different RJ-45 connector sizes available, one for Cat 5 cable and
second for Cat 6 cable. The user has to make sure they have the one suited to their job. The easiest way to
tell them apart is to compare them side by side. The Cat 6 connector is larger than the Cat 5 connector.
10
procedure
:
1. Cut your cable and strip about 1 of the outer jacket off the tip. Remove the cables cover.
11
2. Strip 1 to 2 inches (2.5 to 5.1 cm) of the outer skin at the end of the cable wire by making a shallow cut in
the skin with a utility knife. Run the knife around the cable, and the jacket should slide off easily. There will
be 4 pairs of twisted wires exposed, each of them a different color or color combination.
3. Fold each pair of wires backwards to expose the core of the cable. Cut off the core and discard.
Straighten the twisted wires using 2 pair of tweezers. Grasp a wire beneath a bend with 1 pair of tweezers,
and use the other pair to gently straighten the bend. The straighter your wires, the easier your job will be.
12
4.cut away the excess wires from then end using crimping tool.
5. Insert the wire tips with the insert as far into the connector as possible. The lip of the insert should be
pointed down in the diagram to the left. Squeeze the outer jacket into the connector as well until it reaches
the jacket clamp on the connector.
13
6. Insert the plug into crimper and push down the crimp tool.
Obsevation: You should end up with a finished connector with the gold contacts pushed in place and the
outer jacket of the cable secured to the connector by the jacket clamp Arrange the conductors in the order
shown:
White/Green
Green
White/Orange
Blue
White/Blue
Orange
White/Brown
Brown
White/Orange
14
Orange
White/Green
Blue
White/Blue
Green
White/Brown
Brown
Result:
Precaution: When inserting the untwisted wires into the RJ-45 connector, press the cord beneath the
untwisted wires between your thumb and forefinger to help keep the wires straight.
Conclusion
15
16
EXPERIMENT NO-2
AIM: Install a wireless network adapter
APPARATUS:
1-Desktop or Laptop PC
2-One D-Link AirPlus G+ Wireless Utility Adapter Networ Interface Card.
3-One PC installed with a Microsoft Operating System
4-One Screwdriver for PCI card installation
17
b) They integrate into existing networks through access points which provide a bridging
function
c) They let you stay connected as you roam from one coverage area to another
d) They have unique security considerations
e) They have specific interoperability requirements
f) They require different hardware
g) They offer performance that differs from wired LANs
TRANSMISSION FUNCTIONS:
Network interface adapters perform the following functions during data transmission:
a) Data transfer, buffering, and encapsulation
b) Media Access Control (MAC)
c) Parallel/ serial conversion
d) Signal encoding and amplification
Procedure:
Step:A How to determine if you have a wireless network adapter
1. Before using your computer, check to see if it already has a wireless network adapter.
2. To find out whether you already have a wireless network adapter
3. Click Start, and then click Control Panel.
4. Click Network and Internet Connections.
5. Under or pick a Control Panel icon, click Network Connections.
6. Microsoft Windows XP displays your network adapters. Wireless network adapters are
labeled Wireless Network Connection. If an adapter displays a red X, it is disconnected.
If the Network Connections window is blank, your computer doesn't yet have a wired or
wireless network adapter.
If you already have a wireless network adapter, you can set up your wireless network.
18
NOTE: If your portable computer has a built-in wireless network adapter, but it doesn't
appear to be enabled or working, check the back, front, and sides of the computer for a wireless
adapter switch. Many laptops include a switch so that you can turn the adapter off to reduce
battery consumption.
19
20
21
Conclusion:
EXPERIMENT NO -3
AIM: TO MAKE WIRELESS ADHOC NETWORK
APPARATUS:
1-Wireless lan adapter card,
2-PC(SP2).
THEORY: An ad hoc network is a temporary connection between computers and devices used
for a specific purpose, such as sharing documents during a meeting or playing multiple-player
computer games. You can also temporarily share an Internet connection with other people on
your ad hoc network, so those people dont have to set up their own Internet connections. Ad hoc
networks can only be wireless, so you must have a wireless network adapter installed in your
computer to set up or join an ad hoc network.
Procedure:
PART A- FOR WINDOW XP
1-install the wireless lan adapter card setup.
2-Click Start, and then click Control Panel.
22
Right-click
your
wireless
network
connection,
and
then
click
Properties.
6. In the Wireless Network Connection Properties dialog box, click the Wireless Networks
tab.
23
7.
On
the
Wireless
Networks
tab,
under
Preferred
networks,
click
Add.
8. In the Wireless network properties dialog box, on the Association tab, type the name of your
ad hoc wireless network in Network name (SSID) box (shown in step 10). For example, you
could name your wireless network shiva.
24
9. Clear the The key is provided for me automatically check box and select the This is a
computer-to-computer (ad hoc) network check box.
10. Create a 13-digit password and type it in both the Network key and Confirm network key
boxes. For the best security, include letters, numbers, and punctuation. Then click OK.
11. Click OK again to save your changes.
25
3.Tick Use the following IP address, and input the IP address and Subnet mask. Then
click OK.
26
2.Find shiva (which is set up on computer A) network in the scan window. Then double click it
and click connect Anyway?
27
Here until, all the basic settings for building an Ad Hoc network have been finished. If we open
the network scan window again, we can see the adhoc test network says Connected.
28
Obsevation: If the computer you want to add to your network does not
have built-in wireless network support, install a wireless network adapter.
Windows XP automatically detects the new adapter and notifies you that it found a wireless
network.
Result :
Precaution:
1.If you run into any problems, consult the documentation that came with your network adapter.
Don't be afraid to call the manufacturer's technical support department for help
2.The Wireless Network Connection window appears and displays your wireless network listed
with the SSID you chose. If you don't see your network, click Refresh Network List in the
upper left corner. Click your network, and then click Connect in the lower right corner.
3.Windows XP prompts you to enter a key. Type your encryption key in both the Network key
and Confirm network key boxes, and then click Connect.
29
Windows XP shows its progress as it connects to your network. After you're connected, you can
close the Wireless Network Connection window.
Conclusion:
30
EXPERIMENT NO-4
Aim:To make a Wireless Access Point connection
Apparatus:
1-Micronet SP918GL WLAN ACCESS POINT
2-PC
3-Access Point Adapter
Theory: Wireless Local Area Networks (WLANs) have become a popular choice in network
installations. Implementing a WLAN is simple because installation is generally limited to
installing building mounted antennas and placing the access points (AP).
Local Area Networks (LANs) will quickly become a mixture of wired and wireless systems
depending on the network needs .
procedure:
1. Open the network connection properties.
31
3.Now select the internet protocol(TCP/IP) and then click on the properties.
32
4. Now enter different IP address from Micronet SP918GL WLAN ACCESS POINT
.and click on subnet mask then click ok.
5. Open the internet explorer and input the ip addess of Micronet SP918GL WLAN ACCESS
POINT (http//10.0.0.1/) in the address bar.
33
34
35
9. Enter the SSID (name) and select the channel and click on next.
10. For Wep Encryption we use 10 bit hexadecimal code. otherwise select the disabled. now
click the next botton.
36
37
Result :
Precaution: Wep Encryption key should be 10-bit hexadecimal.
Conclusion: The Access Point have established.
38
EXPERIMENT NO-5
AIM:Introduction to PING commonds used in Computer Network.
Apparatus:
1-PC with internet connection
Theory: Ping is one of the most commonly used and known commands. Ping allows a user to
ping another network IP address. This can help determine if the network is able to communicate
with the network. Helps in determining TCP/IP Networks IP address as well as determine issues
with the network and assists in resolving them. See the ping definition for a full description.
Availability:
The ping.exe command is an external command that is available in the below Microsoft
operating systems.
Windows 2000,WindowsXP,WindowsVista and Windows 7.
PING Command:
Ping is a basic Internet program that lets you verify that a particular IP address exists and can
accept requests. The verb ping means the act of using the ping utility or command. Ping is used
diagnostically to ensure that a host computer you are trying to reach is actually operating.
Various options available in the ping command:
Option:
-t repetitively send packets.
-n number of echo to be sent
-l sending buffer size [Max: 65500 bytes]
-f Dont fragment; If this option is provided, then the packet should not be fragmented and
should be sent as it is.
-r count record route for count hops [3rd layer device]
-j loose source route [Optionally it can follow different route].
-k strict source route [MUST follow the route specified by us].
Note: For loopback address, you can ping it and get returns even when you are offline (not
connected to any network). If you don't get any valid replies, then there's a problem with the
computer's Network settings.
39
Example: In order to send a packet to a host [192.168.230.1] with size of 60000 bytes each. We
wish to send the packets repetitively.
ping -t -l 60000 192.168.230.1
In order to send a packet with a size of 1000 bytes and dont permit fragmenting.
ping -f -l 2000 192.168.230.1
In order to send a packet with a size of 1000 bytes and permit fragmenting.
ping -l 2000 192.168.230.1
In order to use loose route to a destination.
ping j 10.221.0.64 10.140.1.201
In order to use strict route to a destination.
ping k 10.221.0.64 10.140.1.201
This will generate destination host unreachable message because this is not the first device
that the ping will meet.
ping k 172.16.0.253 10.140.1.201
This will work fine because this is the first device that the ping will meet.
Result :
Conclusion:
40
EXPERIMENT NO-6
AIM:Introduction to NETSTAT commonds used in Computer Network.
Apparatus:
1-PC with Internet connection
Brief theory:
NETSTAT Command:
This command is used to get information about the open connections on your system
(ports, protocols being used, etc.), incoming and outgoing data and also the ports of remote
systems to which you are connected. Various options available in the netstat command.
Option:
-a Displays all connections and listening ports.
-e Displays Ethernet statistics. This may be combined with the -s option.
-n Displays addresses and port numbers in numerical form.
-p proto Shows connections for the protocol specified by proto; proto may be TCP or UDP. If
used with the -s option to display per-protocol statistics, proto may be TCP, UDP, or IP.
-r Displays the routing table.
-s Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the -p
option may be used to specify a subset of the default.
Note: always use -a so as to see UDP packets also.
Example:
To display all connections and listening ports
netstat a
To find out the statistics on your Ethernet card
netstat e
To get to know the routing table.
Result :
Conclusion:
41
EXPERIMENT NO-7
AIM:Introduction to PATHPING commonds used in Computer Network.
Apparatus:
1-PC with Internet connection
THEORY: Pathping is a MS-DOS utility available for Microsoft Windows 2000 and Windows
XP users. This utility enables a user to find network latency and network loss. pathping provides
users with the ability of locating spots that have network latency and network loss.
PATHPING Command:
This command is used as IP trace utility and so it is similar to the tracert command. It
has some extra features compared to tracert command.
PATHPING [-n] [-h max_hops] [-g host-list] [-p period] [-q num_queries] [-w timeout] [-t] [-R]
[-r] target_name
Option:
-n Don't resolve addresses to hostnames
-h max_hops Max number of hops to search
-g host-list Loose source route along host-list
-p period Wait between pings (milliseconds)
-q num_queries Number of queries per hop
-w timeout Wait timeout for each reply (milliseconds)
-T Test each hop with Layer-2 priority tags
-R Test if each hop is RSVP aware
Result :
Conclusion:
42
EXPERIMENT NO-8
AIM: Introduction to IPCONFIG command
APPARATUS:
1-Desktop or Laptop PC with Internet connection
2-Power supply
THEORY: Ipconfig is a DOS utility that can be used from MS-DOS and a MS-DOS shell to
display the network settings currently assigned and given by a network. This command can be
Availability:
The ipconfig.exe command is an external command and is available in the below
Microsoft operating systems.
IPCONFIG Command:
Option:
IPCONFIG /all Display full configuration information.
IPCONFIG /release [adapter] Release the IP address for the specified
adapter.
IPCONFIG /renew [adapter] Renew the IP address for the specified
adapter.
IPCONFIG /flushdns Purge the DNS Resolver cache. ##
IPCONFIG /registerdns Refresh all DHCP leases and re-register DNS names.
##
IPCONFIG /displaydns Display the contents of the DNS Resolver Cache. ##
IPCONFIG /showclassid adapter Display all the DHCP class IDs allowed for adapter.
##
IPCONFIG /setclassid adapter [classid] Modify the dhcp class id. ##
43
Result :
Conclusion:
44
EXPERIMENT NO-9
Aim: Install a wired network adapter card
Theory: A network adapter allows a computing device to interface with a local network.
Adapters are a required component to include when building a network.
Procedure:
To connect to a network, your computer needs a network adapter. Most computer manufacturers
include a network adapter with your computer. If you're not sure if you have a network adapter,
you can find out in a few quick steps.
How to determine if you have a network adapter
Many computers have a network adapter built-in that you can use to connect to a wired network.
If you want to install a wired network adapter and aren't sure whether your computer already has
one, look for a network port on the back of the computer.
To see what kind of network adapters may already be installed in your computer
1.
2.
3.
4.
Microsoft Windows XP displays your network adapters. If an adapter has a red X over it,
it is disconnected. If theNetwork Connections window is blank, your computer doesn't
have a network adapter.
If you already have a network adapter, you are ready to configure your network.
How to install a wired USB network adapter
Connecting a USB network adapter is as easy as plugging in headphones.
45
3.
4.
5.
6.
Connect the other end of the network cable to your networking equipment.
7.
If you had to shut down your computer to get to the USB port, you can now turn on your
computer. Windows detects and installs the new hardware, and then displays a notification
informing you that the hardware has been successfully installed.
3.
4.
5.
Connect the other end of the network cable to your networking equipment.
6.
Within a minute or so, Windows detects and installs the new hardware, and then displays
a notification informing you that the hardware has been successfully installed.
46
2.
If the network adapter came with a CD, you should insert it into your computer, and
install the software prior to connecting the hardware.
3.
Shut down your computer by clicking Start, clicking Turn Off Computer, and then
clicking Turn Off.
4.
After your computer shuts down, make note of where each cable is connected to the back
of your computer. It's handy to tape a small note on each cable with a number or letter, and
put a matching note next to the spot on your computer where the cable was plugged in.
Then unplug all cables from your computer.
5.
Lay your computer on a flat surface, like a desk or table. Remove the side panel from
your computer's case. Depending on the case, you may need to remove screws at the back
of your computer.
6.
With the side panel removed, you can see the inside of your computer. Identify an
available slot that fits your card. If necessary, remove the small metal panel protecting the
opening for the slot at the back of your computer, and save the screw.
7.
Touch an unpainted portion of your computer's case to discharge any static electricity.
Then carefully insert the network adapter into the open slot. Gently wiggle the card back
and forth until it rests firmly in the slot.
8.
Replace the screw that you removed in step 6, which will help hold the card in place.
9.
47
12. Reconnect all cables to your computer, start your computer, and log on to Windows.
Windows detects and installs the new hardware, and then displays a notification informing
you that the hardware has been successfully installed.
Result :
Precaution: If weneed to move your computer to reach the USB ports, we should shut down
Windows to avoid damaging your computer. If we can easily reach a USB port, we do not need
to shut down your computer.
Conclusion: