Practical 1
Practical 1
Practical: 1
Aim: Study of different network devices in detail.
Network Devices: A network device is a physical device that is used to connect other
physical devices on a network. In some cases, their role is to simply forward packets of
information to a destination. In other cases, it might be to serve as a translator or to block
suspicious network traffic. For example Repeater, Hub, Bridge, Switch, Routers,
Gateway, Brouter, NIC, Modems, WAPs, Firewalls, IDPS etc.
1. Repeater:
A repeater operates at the physical layer. Its job is to amplifies (i.e., regenerates) the
signal over the same network before the signal becomes too weak or corrupted to extend
the length to which the signal can be transmitted over the same network. When the signal
becomes weak, they copy it bit by bit and regenerate it at its star topology connectors
connecting following the original strength. It is a 2-port device.
Repeaters are used to increase the network’s reach, restore damaged or weak signals, and
provide access to nodes that are otherwise inaccessible. They operate by magnifying the
received signal to a higher frequency domain, making it more scalable, accessible, and
suitable for transmission.
Fig.1 Repeater
Features of Repeaters:
Repeater can regenerate the signal without modifying it.
Repeaters can be used in analog signals and digital signals.
Repeaters can extend the range of networks.
Dynamic networking is supported by repeater.
Use of Repeaters reduces error and loss of data.
Power is required for working of repeaters.
Using repeater can add complexity in the network.
2. Hub:
A hub is a basically multi-port repeater. A hub connects multiple wires coming from
different branches, for example, the connector in star topology which connects different
stations. Hubs cannot filter data, so data packets are sent to all connected devices. In
other words, the collision domain of all hosts connected through Hub remains one. Also,
they do not have the intelligence to find out the best path for data packets which leads to
inefficiencies and wastage.
SNPITRC/IT/2024-25/SEM-5/3150710 Page |1
230493116005 Computer Network
A hub must connect to a router or switch in order to communicate outside its LAN. Hub
devices can also connect to each other to expand the overall network.
A hub can be active, passive or intelligent. Active hubs act as repeaters to boost or repair
the signal of an incoming message before they broadcast it to the rest of the ports. Passive
hubs do not boost message signals, simply providing connectivity for devices on its ports.
Intelligent hubs have management and monitoring capabilities to identify potential issues
with connected devices. A hub operates at Layer 1 of the OSI model -- the physical layer.
Fg.2 Hub
Features of Hubs:
Hubs are the hardware device that operates in the physical layer of the OSI
model.
It supports half-duplex transmission
It works with shared bandwidth and broadcasting.
The hub can provide a high data transmission rate to different devices.
It can detect collisions in the network and send the jamming signal to each port.
Hub does not support Virtual LAN(VLAN) and spanning tree protocol.
It is unable to filter the data and hence transmit or broadcast it to each port.
It cannot find the best route/ shortest path to send any data, which makes it an
inefficient device.
Types of Hub:
Active Hub: - These are the hubs that have their power supply and can clean, boost, and
relay the signal along with the network. It serves both as a repeater as well as a wiring
center. These are used to extend the maximum distance between nodes.
SNPITRC/IT/2024-25/SEM-5/3150710 Page |2
230493116005 Computer Network
Passive Hub: - These are the hubs that collect wiring from nodes and power supply from
the active hub. These hubs relay signals onto the network without cleaning and boosting
them and can’t be used to extend the distance between nodes.
Intelligent Hub: - It works like an active hub and includes remote management
capabilities. They also provide flexible data rates to network devices. It also enables an
administrator to monitor the traffic passing through the hub and to configure each port in
the hub.
3. Bridge :
A bridge operates at the data link layer. A bridge is a repeater, with add on the
functionality of filtering content by reading the MAC addresses of the source and
destination. It is also used for interconnecting two LANs working on the same protocol. It
has a single input and single output port, thus making it a 2 port device.
SNPITRC/IT/2024-25/SEM-5/3150710 Page |3
230493116005 Computer Network
A bridge aggregates the partitioned network segments and controls traffic that moves
between them. A transparent bridge interconnects LANs that use the same protocol suite,
while a translation bridge joins LANs that use different protocols.
Bridge devices have switching capabilities, with which they forward incoming data
frames by examining media access control (MAC) addresses. With each frame it receives,
a bridge builds a lookup table of MAC addresses and port locations. The bridge
references this table to determine whether to forward a frame along or discard it, which
happens when a MAC address is not within the bridge's domain.
Bridges are no longer commonly used within enterprise network designs and are typically
replaced by switches.
Fg.3 Bridge
Advantages of Bridge:
Bridges reduce network traffic with minor segmentation.
Bridges can also help to reduce network traffic on a segment by splitting up
network communications.
Bridge expands the number of connected workstations and network segments.
It reduces collisions.
Disadvantages of Bridge:
It is slower than repeaters due to the filtering process.
A bridge is more expensive than repeaters or hubs.
Bridges are not scalable to an extremely large network.
Types of Bridges:
Transparent Bridges: - These are the bridge in which the stations are completely
unaware of the bridge’s existence i.e. whether or not a bridge is added or deleted from the
network, reconfiguration of the stations is unnecessary. These bridges make use of two
processes i.e. bridge forwarding and bridge learning.
SNPITRC/IT/2024-25/SEM-5/3150710 Page |4
230493116005 Computer Network
Source Routing Bridges: - In these bridges, routing operation is performed by the source
station and the frame specifies which route to follow. The host can discover the frame by
sending a special frame called the discovery frame, which spreads through the entire
network using all possible paths to the destination.
4. Switch :
A switch is a multiport network device with a buffer and design that can improve
its efficiency (having a large number of ports means less traffic) and performance. A
switch is a networking device that operates at the data link layer. A switch has numerous
ports into which computers can be plugged. When a data frame arrives at any network
switch port, it evaluates the destination address(destination MAC address ), performs the
necessary checks, and sends the frame to the associated device. The switch performs error
checking before forwarding the data, making it very efficient because it does not forward
packets with errors and only forwards good packets to the correct port.
SNPITRC/IT/2024-25/SEM-5/3150710 Page |5
230493116005 Computer Network
Fg.4 Switch
Types of Switch:
Unmanaged switches: These switches have a simple plug-and-play design and do not
offer advanced configuration options. They are suitable for small networks or for use as
an expansion to a larger network.
SNPITRC/IT/2024-25/SEM-5/3150710 Page |6
230493116005 Computer Network
Smart switches: These switches have features similar to managed switches but are
typically easier to set up and manage. They are suitable for small- to medium-sized
networks.
SNPITRC/IT/2024-25/SEM-5/3150710 Page |7
230493116005 Computer Network
Layer 2 switches: These switches operate at the Data Link layer of the OSI model and
are responsible for forwarding data between devices on the same network segment.
Layer 3 switches: These switches operate at the Network layer of the OSI model and can
route data between different network segments. They are more advanced than Layer 2
switches and are often used in larger, more complex networks.
PoE switches: These switches have Power over Ethernet capabilities, which allows them
to supply power to network devices over the same cable that carries data.
Gigabit switches: These switches support Gigabit Ethernet speeds, which are faster than
traditional Ethernet speeds.
SNPITRC/IT/2024-25/SEM-5/3150710 Page |8
230493116005 Computer Network
Desktop switches: These switches are designed for use on a desktop or in a small office
environment and are typically smaller in size than rack-mounted switches.
Modular switches: These switches have modular design, which allows for easy
expansion or customization. They are suitable for large networks and data centers.
SNPITRC/IT/2024-25/SEM-5/3150710 Page |9
230493116005 Computer Network
Features of switches:
Switches function in the OSI model’s layer 2 or data connection layer.
It is a smart network appliance that resembles a multiport network bridge.
The media access control (MAC) sublayer addresses are used to transport data
packets to certain target ports.
To accept and transmit data packets from the source device to the target device, it
employs packet switching technology.
It allows one-to-one (unicast), one-to-many (multicast), and one-to-all (broadcast)
communications.
Full duplex transmission means that communication in the channel happens in
both directions at once. As a result, collisions do not happen.
Switches are operational hardware that has network management and software
capabilities.
Switches have the ability to carry out some error checking before sending data to
the target port.
There are a total of 24/48 ports, which is more than usual.
5. Router:
A router is a device like a switch that routes data packets based on their IP addresses. The
router is mainly a Network Layer device. Routers normally connect LANs and WANs
and have a dynamically updating routing table based on which they make decisions on
routing the data packets. The router divides the broadcast domains of hosts connected
through it.
Fg.5 Router
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 10
230493116005 Computer Network
Advantages of Router:
It offers advanced routing, flow control, and traffic isolation.
They are configurable, allowing the network administrator to create policies based
on routing decisions.
It can select the best path across the internetwork using dynamic routing
algorithms.
It can reduce network traffic by establishing collision domains as well as
broadcast domains.
Disadvantages of Router:
A router is more expensive than a bridge or a repeater.
They are protocol-dependent devices that must comprehend the protocol they are
transmitting.
The router is slower than bridges or repeaters because it must analyze data
transmission from the physical to the network layer.
Features of Router:
A router works on the 3rd layer (Network Layer) of the OSI model, and it is able
to communicate with its adjacent devices with the help of IP addresses and subnet.
A router provides high-speed internet connectivity with the different types of ports
like gigabit, fast-Ethernet, and STM link port.
It allows the users to configure the port as per their requirements in the network.
Routers' main components are central processing unit (CPU), flash memory,
RAM, Non-Volatile RAM, console, network, and interface card.
Routers are capable of routing the traffic in a large networking system by
considering the sub-network as an intact network.
Routers filter out the unwanted interference, as well as carry out the data
encapsulation and decapsulation process.
Routers provide the redundancy as it always works in master and slave mode.
It allows the users to connect several LAN and WAN.
Furthermore, a router creates various paths to forward the data.
Types of Routers:
Wireless Router:
These routers can generate a wireless signal in your home or office, allowing computers
to connect to routers within a specific range and access the internet. When
connected indoors, the wireless router's range is approximately 150 feet, when
connected outdoors, the range is up to 300 feet.
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 11
230493116005 Computer Network
Brouter:
A brouter is a hybrid of a bridge and a router. It acts as a bridge, allowing data to be
transferred between networks, and it can also route data within a network to individual
systems, much like a router. As a result, it combines the functions of a bridge and a router
by routing some incoming data to the appropriate systems while transferring the rest to
another network.
Core Router :
A core router is a kind of router that can route data within a network but cannot route data
between networks. It is a computer communication system device that serves as the
backbone of networks by connecting all network devices. It is used by internet service
providers and offers a variety of fast and powerful data communication interfaces.
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 12
230493116005 Computer Network
Edge Router :
An edge router is a low-capacity device that sits at the network's edge. It enables an
internal network to communicate with external networks. For internet-based connectivity
with distant networks, it uses an external BGP (Border Gateway Protocol).
Broadband Router :
Broadband routers are primarily used to provide computers with high-speed internet
access. It is required when connecting to the internet via phone and using Voice over IP
technology (VoIP). All broadband routers have three or four Ethernet ports for connecting
laptop and desktop computers.
6. Gateway:
A gateway, as the name suggests, is a passage to connect two networks that may work
upon different networking models. They work as messenger agents that take data from
one system, interpret it, and transfer it to another system. Gateways are also called
protocol converters and can operate at any network layer. Gateways are generally more
complex than switches or routers.
A network gateway typically consists of physical components, such as network interface
cards and inputs and outputs, as well as software for translating network protocols and
providing gateway functions. These functions can be defined, deployed, and controlled
through software, and may also be built into other devices, such as routers.
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 13
230493116005 Computer Network
Fig.6 Gateway
Gateways can be deployed on various layers of the Open Systems Interconnection (OSI)
model, but are typically used on the network layer. They can be used in various security
processes, including as a firewall or proxy server to scan and filter data, and can be used
in either a unidirectional or bidirectional manner, allowing data to flow in only one
direction or in both directions.
Advantages of Gateway:
A gateway increases network flexibility by allowing multiple computers to be
connected to a single gateway. The gateway may be capable of interpreting data
from computers.
We can link two different kinds of networks.
A gateway can effectively handle traffic problems.
Disadvantages of Gateway:
Gateways can never filter out the data.
Protocol conversion is done, so the transmission rate is slower.
Types of Gateways:
Gateways can be classified into two types based on the direction of flow.
Unidirectional Gateways :
These gateways allow alerts to go in only one direction. Changes that are made in the
source ObjectServer are replicated in the destination ObjectServer or application, while
changes made in the destination ObjectServer or application are not duplicated in the
source ObjectServer. Unidirectional gateways can be thought of as archiving tools.
Bidirectional Gateways :
These gateways enable alerts to be sent from the source ObjectServer to the target
ObjectServer or application, as well as feedback to the source. Changes to the contents of
a source ObjectServer are replicated in a destination ObjectServer or application in
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 14
230493116005 Computer Network
Network Gateway :
This is the most common gateway type, serving as an interface between two disparate
networks that use different protocols. When the term gateway is used without specifying
the type, it refers to a network gateway.
Cloud Storage Gateway :
This type of gateway translates storage requests into API calls to various cloud storage
services. It enables organizations to integrate private cloud storage into applications
without migrating to a public cloud.
IoT Gateway :
This type collects sensor data from IoT devices, translates sensor protocols, and processes
sensor data before sending it.
Internet-To-Orbit Gateway (I2O) :
It connects Internet devices to satellites and spacecraft in orbit around the Earth.
Project HERMES and the Global Educational Network for Satellite Operations are two
prominent I2O gateways (GENSO).
7. NIC:
A network interface card (NIC), also known as an Ethernet card, LAN card, or network
adaptor, is a piece of hardware that enables computers to communicate with other devices
on a network. It provides a dedicated connection to the network and contains the
necessary circuits to translate digital data into signals used to transfer data, such as
Ethernet or Wi-Fi.
The NIC represents the computer on the network and is identified by its unique MAC
address. When a user browses the internet, the NIC acts as a go-between for the computer
and the network, converting digital requests to electrical signals and transmitting them to
the network.
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 15
230493116005 Computer Network
Fig.7 NIC
Advantages of NIC:
As compared to the wireless network card, NIC provides a secure, faster, and
more reliable connection.
NIC allows us to share bulk data among many users.
It helps us to connect peripheral devices using many ports of NIC.
Communication speed is high.
Network Interface cards are not expensive.
NICs are easy to troubleshoot.
Disadvantages of NIC:
NIC is inconvenient as compared to the wireless card.
For wired NIC, a hard-wired connection is required.
NIC needs a proper configuration to work efficiently.
NIC cards are not secure, so the data inside NIC is not safe.
8. Modems:
A modem is a network device that modulates and demodulates analog carrier
signals (known as sine waves) to encode and decode digital data for processing. Because
modems perform both of these tasks simultaneously, the term modem is a combination
of "modulate" and "demodulate".
A modem is a crucial piece of computer hardware that converts digital data into a format
suitable for transmission over analog mediums, such as phone lines or radio waves. This
process involves modulating one or more carrier wave signals to encode the digital
information, which is then transmitted over the medium.
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 16
230493116005 Computer Network
The receiver, on the other hand, demodulates the received signal to recreate the original
digital information. The ultimate goal of a modem is to produce a signal that can be
transmitted efficiently and decoded reliably, regardless of the analog medium being used.
In fact, modems can be used with a wide range of analog transmission methods, including
light-emitting diodes, radio, and much more.
Fig.8 Modem
The receiver, on the other hand, demodulates the received signal to recreate the original
digital information. The ultimate goal of a modem is to produce a signal that can be
transmitted efficiently and decoded reliably, regardless of the analog medium being used.
In fact, modems can be used with a wide range of analog transmission methods, including
light-emitting diodes, radio, and much more.
Advantages of Modem:
Some modems have sophisticated voice mail features, making them useful as
digital information systems or intelligent answering machines.
Through a software patch, they can be upgraded to almost any global standard.
Some modems support dual simultaneous voice and data (DSVD), which means
they can transport both analog voices and computer data.
Disadvantages of Modem:
There is no traffic maintenance.
The modem is unaware of its destination path.
Types of Modem:
Optical Modem :
Instead of other metallic media, optical cables are used in optical modems. It converts
digital data signals into light pulses transmitted via the optical fiber it employs.
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 17
230493116005 Computer Network
Digital Modem :
Digital data are converted into digital signals by a digital modem. The digital data is
modulated on the digital carrier signals before being transmitted over the digital
transmission lines.
Acoustic Modem :
A specific modem called an "acoustic modem" can connect a phone handset to a gadget
that traveling salespeople use to connect hotel phones. It has a microphone and speaker.
Smart Modem :
The smart modem has capabilities for auto-dialing, auto-redialing, and auto-answering. It
has a microprocessor onboard that performs auto-dial and auto-answering tasks using
the Hayes AT command set.
9. WAPs:
A wireless access point (WAP) is a crucial networking device that enables wireless-
capable devices to connect to a wired network.
Unlike traditional wired connections, WAPs are simple and easy to install, making it a
convenient option for connecting all computers and devices in your network. There are
several reasons to use a WAP to set up a wireless network. For instance, it allows you to
create a wireless network within your existing wired network, accommodating wireless
devices and enhancing your overall network capability.
Fig.9 WAPS
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 18
230493116005 Computer Network
Additionally, WAPs or mesh extenders can be used to extend the signal range and
strength of your wireless network, effectively eliminating “dead spots” and providing
complete wireless coverage, which is particularly beneficial in larger office spaces or
buildings. Furthermore, WAPs can be configured using a single device, making it a
seamless and efficient process.
10. Firewalls:
A firewall is a network security device, either hardware or software-based, which
monitors all incoming and outgoing traffic and based on a defined set of security rules
accepts, rejects, or drops that specific traffic.
Accept: allow the traffic
Reject: block the traffic but reply with an “unreachable error”
Drop: block the traffic with no reply
A firewall is a type of network security device that filters incoming and outgoing network
traffic with security policies that have previously been set up inside an organization. A
firewall is essentially the wall that separates a private internal network from the open
Internet at its very basic level.
Fig.10 Firewalls
Types of Firewall:
Depending on their structure and functionality, there are different types of firewalls. The
following is a list of some common types of firewalls:
Proxy Firewall
Packet-filtering firewalls
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 19
230493116005 Computer Network
Practical: 2
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 20
230493116005 Computer Network
Aim: Study of different types of network cables and practically implement the cross-
wired cable and straight through cable using clamping tool.
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 21
230493116005 Computer Network
1. Ethernet Cable
An ethernet cable allows the user to connect their devices such as computers, mobile
phones, routers, etc, to a Local Area Network (LAN) that will allow a user to have
internet access, and able to communicate with each other through a wired connection.
It also carries broadband signals between devices connected through it. In this article,
we are going to discuss different types of ethernet cable used in local area networks
for reliable internet connection.
Advantages:
The cost of installing an Ethernet connection is affordable.
Provides high-speed data transmission for data in the network.
It maintains data quality and also provides a secure channel for data transmission.
Disadvantages:
Ethernet networks are more suited for short-distance connections.
Troubleshooting faults in the ethernet connection is difficult.
Increased cases of network traffic in the network channel.
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 22
230493116005 Computer Network
1.1.1 Hardline coaxial cable: Hardline coaxial cable’s center conductor is made of
copper, silver and has a larger diameter when compared to other coaxial cables.
Hardline coaxial cable, also known as rigid coaxial cable or waveguide cable, is a
type of coaxial cable that is designed for high-power, high-frequency applications.
It is used in situations where low signal loss and efficient signal transmission are
essential, such as in telecommunications, broadcasting, and microwave
communication systems.
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 23
230493116005 Computer Network
1.1.2 Flexible coaxial cable: The flexible coaxial cables are very flexible and the inner
conductor is surrounded by a flexible polymer.
1.1.3 Semi-rigid coaxial cable: Semi-rigid coaxial cable uses a solid copper outer
sheath with a dielectric of Polytetrafluoroethylene. Semi-rigid coaxial cables are
an essential component in various industries, offering high-performance
connectivity solutions. These cables are designed to provide reliable transmission
of radio frequency (RF) signals with minimal signal loss and interference.
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 24
230493116005 Computer Network
1.1.7 Rigid coaxial cable: Rigid coaxial cable is made up of two copper tubes
supported at cable ends and fixed intervals across the length of the cable using
PTFE supports or disk insulators. The rigid coaxial cable cannot be bent. It is
mainly used in TV and FM broadcasting systems.
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 25
230493116005 Computer Network
has insulation. These two conductors are twisted together, thus giving the name twisted
pair cables.
One of the conductors is used to carry the signal and the other is used as a ground
reference only. The receiver uses the difference of signals between these two conductors.
The noise or crosstalk in the two parallel conductors is high but this is greatly reduced in
twisted pair cables due to the twisting characteristic. In the first twist, one conductor is
near to noise source and the other is far from the source but in the next twist the reverse
happens and the resultant noise is very less and hence the balance in signal quality is
maintained and the receiver receives very less or no noise. The quality of signal in twisted
pair cables greatly depends upon the number of twists per unit length of the cable.
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 26
230493116005 Computer Network
Disadvantages:
These cables are very expensive.
They require a lot of maintenance which increases the cost more.
These can be installed underground only.
The length of the segment is similar to UTP for these cables.
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 27
230493116005 Computer Network
Advantages:
These cables are cost-effective and easy to install owing to their compact size.
They are generally used for short-distance transmission of both voice and data.
It is less costly as compared to other types of cables.
Disadvantages:
The connection established using UTP is not secure.
They are efficient only for a distance up to 100 meters and have to be installed in
pieces of up to 100 meters.
These cables have limited bandwidth.
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 28
230493116005 Computer Network
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 29
230493116005 Computer Network
In single-mode fiber, only one type of ray of light can propagate through the fiber. This
type of fiber has a small core diameter (5um) and high cladding diameter (70um) and the
difference between the refractive index of core and cladding is very small. There is no
dispersion i.e. no degradation of the signal during traveling through the fiber. The light is
passed through it through a laser diode.
2. HDMI Cable
HDMI means High-Definition Multimedia Interface, a standard for simultaneously
transmitting digital video and audio from a source, such as a computer or TV cable box,
to a computer monitor, TV or projector. Originally developed by a consortium of
electronics manufacturers, it has been widely adopted with almost all televisions and
computer monitors supporting the interface.
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 30
230493116005 Computer Network
4. USB Cable
A USB cable, short for Universal Serial Bus, is a common type of cable used to connect
electronic components to computers or other digital devices. It enables data transfer and
power supply between devices, making it an essential tool in today's interconnected world.
USB Type-B: The USB Type-B, also known as a printer cable, was introduced to
the market shortly after Type-A. USB Type-B cables feature square-shaped
connectors with beveled corners, and provide a secure connection for printers,
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 31
230493116005 Computer Network
scanners, audio interfaces, and external hard drives. While USB Type-B cables
were common in the early 2000s, they are now rarely used due to the rise of USB
Type-C.
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 32
230493116005 Computer Network
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 33
230493116005 Computer Network
Fig.6.1 DVi-A
DVi-D:
DVi-D stands for Digital Visual Interface- Digital. It is very common and used by
majority of people. It transmits video signals which are digital and not analogue
signals. We cannot connect DVi-A and DVi-D with each other because DVi-A
reads analogue signals and DVi-D reads digital signals. So, because of the
difference in its formats we cannot use these both together.
Fig.6.2 DVi-D
DVi-i:
DVi-i can transmit both video signals whether it is analogue or digital. As it
supports both the signals, one can connect this with DVi-A or DVi-D also.
Fig.6.3 DVi-i
7. PS/2 Cable
A PS/2 port is a mini DIN connector that connects the mouse or keyboard to the computer
system. Besides accepts 6-pin plug. IBM introduced it in 1987. Moreover, its full form
is Personal System/2. Nowadays, computers use the USB port for the keyboard and
mouse.
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 34
230493116005 Computer Network
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 35
230493116005 Computer Network
Disadvantages:
Special device drivers are required sometimes to recognize and use the drive.
However, a SATA hard drive can behave as a PATA drive. This eliminates the
need for a specific driver to be installed.
SATA cable supports only one hard drive to connect at a time, whereas PATA
cable allows up to two PATA drives per cable.
SATA is costlier as compared to PATA.
10.Console Cable
Console cables — also known as Cisco cables, rollover cables and management cables —
are designed for a specific purpose. They connect Cisco networking devices to terminals
or PCs for configuration. Typically, the Cisco end will connect via RJ45, and the terminal
end will conclude in a serial connection.
What matters most about console cables is the specific nature of the connection. This is
not an Ethernet or networking connection. It is a terminal connection, and its purpose is to
enable the connected computer to configure the networking device. This is true for older
Cisco equipment and brand-new devices. Configuration is performed through the serial
connection.
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 36
230493116005 Computer Network
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 37
230493116005 Computer Network
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 38
230493116005 Computer Network
Practical: 3
Aim: Study of basic network command and Network configuration commands.
1. PING
Ping command is used to get to know if the particular site can be reached by the ping
command. The ping command checks this by sending the packets of data to the
destination address and if the data returns to us in the given time frame then it means that
the particular website can be reached .We can do this by writing the ping and we write the
IP address of the site we want to search.
Here's how the ping command works:
The ping command sends an ICMP Echo Request message to a target host.
The ping command waits for a response, which is an ICMP echo reply message.
The ping command prints a line of output for each response it receives.
The ping command calculates round-trip times and packet loss statistics.
The ping command displays a summary when it's done, which could be when it
times out or receives a SIGINT signal.
The ping command also has several options, including:
-t [target_name]: Ping the specified host until stopped
-a [target_name]: Resolve addresses to hostname
-n [count][target_name]: Number of echo requests to send
-l [size] [target_name]: Sends the buffer size
-f [target_name]: Stops IPv4 fragmentation
-i [TTL] [target_name]: Changes the TTL value
-v [TOS] [target_name]: Type Of Service (IPv4-only. This setting has been
deprecated and has no effect on the type of service field in the IP Header).
-r [count] [target_name]: Shows the number of hops and gets a record (IPv4
only)
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 39
230493116005 Computer Network
2. IPCONFIG
The IPCONFIG network command provides a comprehensive view of information
regarding the IP address configuration of the device we are currently working on.
Here are some things you can do with the ipconfig command:
Display network configuration: When used without parameters, ipconfig displays
IP addresses, subnet masks, default gateways, and more for all adapters. You can
also use it to see the date and time your computer got its IP address, the network
adapter's physical address, and the router your network is connected to.
Refresh DHCP and DNS settings: You can use ipconfig to refresh Dynamic Host
Configuration Protocol (DHCP) and Domain Name System (DNS) settings.
Renew or release DHCP leases: You can use ipconfig to renew or release DHCP
leases.
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 40
230493116005 Computer Network
Flush DNS caches: You can use ipconfig to flush DNS caches.
The IPConfig command also provides us with some variation in the primary command
that targets specific system settings or data, which are:
IPConfig/all - Provides primary output with additional information about network
adapters.
IPConfig/renew - Used to renew the system’s IP address.
IPConfig/release - Removes the system’s current IP address.
/release6 - Release the IPv6 address for the specified adapter.
/renew6 - Renew the IPv6 address for the specified adapter.
/flushdns - Purges the DNS Resolver cache.
/registerdns - Refreshes all DHCP leases and re-registers DNS names
/displaydns - Display the contents of the DNS Resolver Cache.
IPConfig Command:
3. TRACERT
The TRACERT command is used to trace the route during the transmission of the data
packet over to the destination host and also provides us with the “hop” count during
transmission.
Using the number of hops and the hop IP address, we can troubleshoot network issues and
identify the point of the problem during the transmission of the data packet.
It also shows the time taken for the journey.
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 41
230493116005 Computer Network
Traccert Command:
ARP Command:
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 42
230493116005 Computer Network
5. NETSTAT
The Netstat command as the name suggests displays an overview of all the network
connections in the device. The table shows detail about the connection protocol, address,
and the current state of the network.
NetStat Command:
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 43
230493116005 Computer Network
6. Route:
The Route command is a versatile utility that allows you to view and manipulate the IP
routing table on your computer.
The IP routing table is like a roadmap for your computer. It lists all the known routes to
different networks and hosts on the internet. When your system needs to send data to a
specific destination, it consults this table to determine the best path.
The route command lets you interact with this routing table—adding, modifying, or
deleting routes as needed.
Route Command:
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 44
230493116005 Computer Network
7. HOSTNAME
The HOSTNAME command displays the hostname of the system. The hostname
command is much easier to use than going into the system settings to search for it.
Syntax: HostName
8. SYSTEMINFO
The SystemInfo command displays detailed information about a computer's configuration
and status, including the operating system, hardware, and software environment:
Operating System: Configuration, security information, and product ID
Hardware: RAM, disk space, and network cards
Software Environment: System components and domain information
System Uptime: Including the system boot time
Syntax: SystemInfo
SystemInfo Command:
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 45
230493116005 Computer Network
9. NSLOOKUP
The NSLOOKUP command is used to troubleshoot network connectivity issues in the
system. Using the nslookup command, we can access the information related to our
system’s DNS server, i.e., domain name and IP address.
The name “nslookup” stands for “name server lookup.” Essentially, it’s a command-line
utility that interacts with DNS servers to retrieve information about domain names.
Syntax: nslookup [domain_name]
NsLookUp Command:
SNPITRC/IT/2024-25/SEM-5/3150710 P a g e | 46