0% found this document useful (0 votes)
9 views66 pages

Farhan Complete CN Practical File

The document outlines practical exercises for IT engineering students at Bhawan Mahavir Polytechnic, focusing on different types of network cables, network topologies, and local area networks (LANs). It covers twisted pair, fiber optic, and coaxial cables, along with their applications and advantages. Additionally, it discusses various network topologies such as bus, star, ring, mesh, and tree, and provides an overview of LANs, WANs, and MANs.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views66 pages

Farhan Complete CN Practical File

The document outlines practical exercises for IT engineering students at Bhawan Mahavir Polytechnic, focusing on different types of network cables, network topologies, and local area networks (LANs). It covers twisted pair, fiber optic, and coaxial cables, along with their applications and advantages. Additionally, it discusses various network topologies such as bus, star, ring, mesh, and tree, and provides an overview of LANs, WANs, and MANs.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 66

Computer Network(2030106303)

BHAGWAN MAHAVIR UNIVERSITY


BHAGWAN MAHAVIR POLYTECHNIC
IT ENGINEERING DEPARTMENT
PRACTICAL:- 1

AIM:- Study of different types of Network cables and practically implement


the cross- wired cable and straight through cable using crimping tool.

1. Twisted Pair Cables:-

Twisted pair cables are a type of wiring used in computer networking for transmitting data. They
consist of pairs of insulated copper wires twisted together to reduce electromagnetic interference.
There are two main types:
1. Unshielded Twisted Pair (UTP):
o No additional shielding around the wires.
o Most common type used in Ethernet networks.
o Cheaper and easier to install.
o Commonly used categories:
 Cat5e: Supports speeds up to 1 Gbps.
 Cat6: Supports speeds up to 10 Gbps over short distances.
2. Shielded Twisted Pair (STP):
o Each pair is wrapped in a shielding material (e.g., foil) to protect against interference.
o Better performance in noisy environments but more expensive.
Twisted pair cables are commonly used for local area networks (LANs) and telephone systems. The
twists in the wires help cancel out noise and reduce crosstalk between wires.

2. Fiber Optic Cables:-

Page | 1 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)

Fiber optic cables are high-speed networking cables used to transmit data using light signals. They are made
up of thin strands of glass or plastic fibers, which allow data to travel faster and over longer distances
compared to traditional copper cables.

Key features:

 Core: The center where light travels.

 Cladding: Surrounds the core and reflects the light back to prevent signal loss.

 Jacket: Outer protective layer.

There are two main types of fiber optic cables:

1. Single-mode fiber (SMF):

o Carries light signals over long distances (up to hundreds of kilometers).

o Used in long-distance communication (e.g., internet backbone, telecom).

2. Multi-mode fiber (MMF):

o Carries multiple light signals at once, but over shorter distances (up to 500 meters).

o Typically used in local area networks (LANs) and data centers.

Benefits:

 Higher bandwidth (can carry more data).

 Faster speeds.

 Less signal degradation over long distances.

 Immune to electromagnetic interference.

Page | 2 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
Fiber optics are ideal for high-speed internet, telephone systems, and large-scale data transmission
across long distances.

3. Coaxial Cables:-

Coaxial cables (or coax cables) are used in computer networks and other communication systems to
transmit data, video, and audio signals. They consist of a central conductor, insulation, a metal shield, and
an outer jacket.
Key components:
1. Inner conductor: Carries the signal.
2. Insulation: Surrounds the conductor to keep the signal contained.
3. Metal shield: Protects against interference.
4. Outer jacket: Protective cover for durability.
Coaxial cables are commonly used for:
 Cable internet and TV.
 Early computer networks (e.g., Ethernet).
Advantages:
 Good for transmitting data over moderate distances.
 Resistant to electromagnetic interference.
However, they have largely been replaced by twisted pair and fiber optic cables for most modern
networking.

PRACTICAL CONSIDERATION:-

1. Ethernet Cabling:-

Page | 3 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)

Ethernet cabling is used to connect devices in a local area network (LAN) for data transmission. The most
common type is twisted pair cable (e.g., Cat5e, Cat6), which supports different speeds and distances.

Key types:

1. Unshielded Twisted Pair (UTP): Most widely used, affordable.

2. Shielded Twisted Pair (STP): Offers better protection from interference.

3. Fiber Optic: For higher speeds and longer distances.

Ethernet cables typically support speeds from 1 Gbps to 10 Gbps, depending on the category.

2. Testing and Certification:-


Testing and certification in computer networking ensure that network devices, cables, and infrastructure
meet industry standards for performance, security, and reliability. They help verify that the network
functions properly and can handle expected loads.

Page | 4 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)

Key Aspects:
1. Network Testing:
o Performance Testing: Measures speed, bandwidth, and latency.
o Connectivity Testing: Verifies that devices can communicate over the network.
o Security Testing: Identifies vulnerabilities and ensures data protection.
o Cable Testing: Checks cable integrity, signal strength, and proper installation.
2. Certification:
o Network Devices: Routers, switches, and other hardware are tested for compliance with
standards (e.g., IEEE 802.3 for Ethernet).
o Cabling Standards: Cables are certified to meet specifications (e.g., Cat5e, Cat6, fiber optic).
o Professional Certifications: Individuals earn certifications like Cisco CCNA, CompTIA
Network+, or Juniper JNCIA to validate their networking skills and knowledge.
These processes ensure a network operates efficiently, securely, and meets required performance
standards.

Page | 5 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
Assessment:

Total Marks
Criteria Exceptional Satisfactory Developing Limited
Marks Obtained

Accurately 1-2 errors / 3-5 errors/ More than 5


Accuracy 3 done mistake mistake errors
(3) (2) (1) (1)
Fully under Partially Partially
Understand
stood and understood understood
Understanding but cannot
3 explain and can and cannot
& Explanation explain
perfectly explain explain
(2)
(3) (1) (1)
Watched other
Present but
Performed students
Performed not
Practical performing
Practical participate
Engagement 2 with other practical but
him/her self in
help not tried him/
(2) performance
(1) her self
(0.5)
(0.5)
Document is Missing
Documented Poor writing,
proper, but output.
properly, no missing
Documentation 1 presentation Improper
error output
is average documentation
(1) (0.25)
(0.5) (0.25)
Complete Complete Work
Submit after 2
within a within two submits after
Time 1 weeks
week weeks 3 weeks.
(0.5) (0.25)
(1) (0.25)

Total

Faculty Signature with Date

Page | 6 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
BHAGWAN MAHAVIR UNIVERSITY
BHAGWAN MAHAVIR POLYTECHNIC
IT ENGINEERING DEPARTMENT
PRACTICAL:- 2

 AIM:- Implement different Network Topologies.

Implementing different network topologies involves arranging network devices and connections in
various configurations to meet specific requirements. Here are several common network topologies alogn
with brief descriptions and consideration.

 Bus Topology:-
Bus topology is a network configuration where all devices are connected to a single central cable called
the bus. Data is transmitted across this cable, and all devices receive the signal, but only the intended
recipient processes it. Each end of the bus has terminators to prevent signal reflection.

Key Points:
 Simplicity: Easy to set up and cost-effective, requiring minimal cabling.
 Single point of failure: If the main cable fails, the entire network goes down.
 Performance: More devices lead to network slowdowns due to data collisions, and troubleshooting
can be difficult.

Advantages:
 Easy and inexpensive to install.
 Simple to add new devices.

Disadvantages:
 Not scalable for large networks.
 Vulnerable to cable failure.
Bus topology was widely used in early Ethernet networks but has mostly been replaced by star topology
in modern systems.

Page | 7 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)

 Star Topology:-
Star topology is a network layout where all devices (nodes) are connected to a central hub or switch. The
hub acts as the central point for data transmission.

Key Features:
 Central Hub: All communication passes through the hub.
 Fault Isolation: If one connection fails, the rest of the network remains unaffected.
 Easy to Manage: Adding or removing devices is simple.

Advantages:
 Easy to set up and troubleshoot.
 Reliable, since one device failure doesn't impact the whole network.

Disadvantages:
 If the central hub fails, the entire network goes down.
Commonly used in local area networks (LANs).

Page | 8 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
 Ring Topology:-
Ring topology is a network configuration where each device (node) is connected to two other devices,
forming a circular pathway for data. Data travels in one direction (unidirectional) or both directions
(bidirectional) around the ring.

Key Features:
 Data Transmission: Each node receives and passes on data until it reaches the intended recipient.
 Failure Impact: If one node fails, it can disrupt the entire network unless a dual ring is used.
 Performance: Generally suitable for small to medium-sized networks; performance can decrease as
more nodes are added.
Advantages:
 Simple to install and manage.
 Data packets travel at high speeds.

Disadvantages:
 Vulnerable to single point failures.
 Difficult to troubleshoot and add new devices.

Page | 9 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
 Mesh Topology:-
Mesh topology is a network configuration where each device (node) is interconnected with multiple other
devices. This setup allows for multiple paths for data to travel, enhancing reliability and fault tolerance.

Key Features:
1. Full Mesh: Every device is connected to every other device, providing maximum redundancy.
2. Partial Mesh: Some devices are connected to all others, while others are only connected to a few.

Advantages:
 Redundancy: If one connection fails, data can take alternative paths.
 High Reliability: Reduced chances of network failure.

Disadvantages:
 Complexity: Difficult to set up and manage, especially in full mesh.
 Cost: Requires more cabling and hardware.

Mesh topology is commonly used in networks that require high availability, such as in
telecommunications and critical infrastructure systems.

 Tree Topology:-
Tree topology is a hierarchical network structure that combines characteristics of star and bus topologies.
It consists of a central "root" node connected to multiple "child" nodes, which can further connect to other
nodes, forming a branching structure.

Key Features:

Page | 10 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
 Hierarchy: Nodes are arranged in a parent-child relationship.
 Scalability: Easily expandable by adding more nodes to branches.
 Centralized Management: Easier to manage and troubleshoot from the root node.

Advantages:
 Supports large networks.
 Simplifies network organization.
 Fault isolation is easier; a problem in one branch doesn't affect others.

Disadvantages:
 If the root node fails, the entire network can go down.
 More complex cabling and configuration than simpler topologies.

Page | 11 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
Assessment:

Total Marks
Criteria Exceptional Satisfactory Developing Limited
Marks Obtained

Accurately 1-2 errors / 3-5 errors/ More than 5


Accuracy 3 done mistake mistake errors
(3) (2) (1) (1)
Fully under Partially Partially
Understand
stood and understood understood
Understanding but cannot
3 explain and can and cannot
& Explanation explain
perfectly explain explain
(2)
(3) (1) (1)
Watched other
Present but
Performed students
Performed not
Practical performing
Practical participate
Engagement 2 with other practical but
him/her self in
help not tried him/
(2) performance
(1) her self
(0.5)
(0.5)
Document is Missing
Documented Poor writing,
proper, but output.
properly, no missing
Documentation 1 presentation Improper
error output
is average documentation
(1) (0.25)
(0.5) (0.25)
Complete Complete Work
Submit after 2
within a within two submits after
Time 1 weeks
week weeks 3 weeks.
(0.5) (0.25)
(1) (0.25)

Total

Faculty Signature with Date

Page | 12 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
BHAGWAN MAHAVIR UNIVERSITY
BHAGWAN MAHAVIR POLYTECHNIC
IT ENGINEERING DEPARTMENT
PRACTICAL:- 3

 AIM: - Connect the computers in the Local Area Network.

1. LAN (Locan Area Network):-


A Local Area Network (LAN) is a network that connects computers and devices within a limited area,
such as a home, office, school, or building. Key features of a LAN include:

1. Scope: Covers a small geographical area.


2. Speed: Typically offers high-speed data transfer, often in gigabits per second (Gbps).
3. Components:
o Devices: Computers, printers, and other devices.
o Network Hardware: Routers, switches, cables, or wireless access points.
4. Communication: Allows devices to share resources like files, printers, and internet connections.
5. Technology: Commonly uses Ethernet or Wi-Fi standards for connectivity.
6. Administration: Usually managed by a single organization or
individual. 7.
LANs are cost-effective and efficient for connecting devices in a localized area.

Page | 13 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)

2. WAN (Wide Area Network):-

A Wide Area Network (WAN) is a network that connects devices and LANs over large
geographical areas, such as cities, countries, or even globally. Key points about WANs include:

1.Scope: Covers extensive geographical areas.


2.Connectivity: Uses public networks (e.g., the internet), leased lines, or satellite links.
3.Speed: Typically slower than LANs, though modern WANs can achieve high speeds.
4.Components:
o Routers and modems for connectivity.
o Telecommunication infrastructure like fiber optics or satellites.
5. Purpose: Enables communication and resource sharing across distant locations.
6. Examples: The internet, corporate intercity networks, and bank ATM
networks. 7.
WANs are essential for global communication and connecting distributed systems.

3. MAN (Metropolitan Area Network):-

A Metropolitan Area Network (MAN) is a network that spans a city or a large campus, bridging the gap
between Local Area Networks (LANs) and Wide Area Networks (WANs). Key points about MANs
include:

1. Scope: Covers a city or metropolitan area (10–50 km).


2.
Page | 14 Patil Yash [En_no.: 232701070117]
Computer Network(2030106303)
3. Purpose: Connects multiple LANs within a region for resource sharing and efficient communication.
4. Technology :Often uses high-speed fiber optic cables or wireless links.
5. Examples: City-wide Wi-Fi networks, cable TV networks, or interconnected university campuses.
6. Ownership: Typically managed by a single entity like a city government or a large organization.

MANs are ideal for linking networks within a specific urban area, offering faster speeds than WANs and
broader coverage than LANs.

4. PAN (Personal Area Network):-


A Personal Area Network (PAN) is a network designed for personal use, connecting devices
within a very short range. Key points about PANs include:

1. Scope: Covers a small area, typically within a range of 10 meters.


2. Purpose: Connects personal devices like smartphones, laptops, tablets, and wearables.
3. Technology: Often uses Bluetooth, USB, Infrared, or Wi-Fi.
4. Examples: Pairing a smartphone with a smartwatch, connecting a wireless keyboard to a laptop.
5. Ownership: Managed and controlled by an individual.

PANs are convenient for short-range communication and personal device connectivity.

Page | 15 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)

5. .CAN(Campus Area Network):

A Campus Area Network (CAN) is a network designed to interconnect multiple local area networks (LANs)
within a limited geographical area, such as a university or corporate campus. Key points about CANs
include:

1. Scope: Covers a medium-sized area, typically a campus or group of buildings within a limited radius.
2. Purpose: Facilitates resource sharing, communication, and collaboration among departments or
buildings within the campus.
3. Technology: Utilizes Ethernet, fiber optics, Wi-Fi, and sometimes wireless bridging.
4. Examples: Connecting computer labs, administrative offices, and library systems in a university; linking
different departments in a corporate campus.
5. Ownership: Managed and controlled by the organization owning the campus.

CANs are efficient for localized networking needs, ensuring high-speed connectivity and centralized
management.

Page | 16 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
Assessment:

Total Marks
Criteria Exceptional Satisfactory Developing Limited
Marks Obtained

Accurately 1-2 errors / 3-5 errors/ More than 5


Accuracy 3 done mistake mistake errors
(3) (2) (1) (1)
Fully under Partially Partially
Understand
stood and understood understood
Understanding but cannot
3 explain and can and cannot
& Explanation explain
perfectly explain explain
(2)
(3) (1) (1)
Watched other
Present but
Performed students
Performed not
Practical performing
Practical participate
Engagement 2 with other practical but
him/her self in
help not tried him/
(2) performance
(1) her self
(0.5)
(0.5)
Document is Missing
Documented Poor writing,
proper, but output.
properly, no missing
Documentation 1 presentation Improper
error output
is average documentation
(1) (0.25)
(0.5) (0.25)
Complete Complete Work
Submit after 2
within a within two submits after
Time 1 weeks
week weeks 3 weeks.
(0.5) (0.25)
(1) (0.25)

Total

Faculty Signature with Date

Page | 17 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)

BHAGWAN MAHAVIR UNIVERSITY


BHAGWAN MAHAVIR POLYTECHNIC
IT ENGINEERING DEPARTMENT
PRACTICAL:- 4

 AIM: - Connect the computers in the Local Area Network.

Steps to Set Up a Local Area Network (LAN):

1. Plan the Network:


o Determine the number of devices to connect.
o Identify the layout of the area (e.g., office, school, or home) to optimize placement of hardware.
2. Procure Required Hardware:
o Router: For managing the network and enabling internet access (if required).
o Switch: To connect multiple devices within the LAN.
o Network Cables: Such as Ethernet cables for wired connections.
o Wireless Access Points (optional): For enabling Wi-Fi within the LAN.
3. Install and Configure Hardware:
o Place the router centrally for even wireless coverage.
o Connect the router to switches using Ethernet cables.
o Link each computer or device to the switch/router using Ethernet cables or Wi-Fi.
4. Assign IP Addresses:
o Use Dynamic Host Configuration Protocol (DHCP) for automatic IP assignment.
o Alternatively, assign static IP addresses for better control in small networks.
5. Configure Network Sharing:
o Enable file and printer sharing on all devices.
o Set up permissions for shared folders and resources to control access.
6. Test the Network:
o Verify that all devices can communicate with each other.
o Ensure internet connectivity (if required).

Key Characteristics Fulfilled:

1. Scope:
o The LAN covers the intended area (e.g., office or campus).
2. Speed:
o
High-speed connections ensure efficient file transfers and resource sharing.
3. Connectivity:

Page | 18 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)

o
Ethernet provides reliable wired connections, while Wi-Fi adds flexibility.
4. Hardware:
o Includes necessary devices like routers, switches, and access points.
5. Management:
o Centralized management is achieved through a single router or server.

Applications of the LAN Setup:

 Resource Sharing: Printers, scanners, and storage devices can be accessed by all connected devices.
 Data Centralization: Files can be stored on a central server for easy access and backup.
 Collaboration: Devices can communicate seamlessly, fostering collaboration within the network.

This setup achieves the aim of creating an efficient Local Area Network, enabling resource sharing,
communication, and centralized management within a limited geographical area.

Page | 19 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
Assessment:

Total Marks
Criteria Exceptional Satisfactory Developing Limited
Marks Obtained

Accurately 1-2 errors / 3-5 errors/ More than 5


Accuracy 3 done mistake mistake errors
(3) (2) (1) (1)
Fully under Partially Partially
Understand
stood and understood understood
Understanding but cannot
3 explain and can and cannot
& Explanation explain
perfectly explain explain
(2)
(3) (1) (1)
Watched other
Present but
Performed students
Performed not
Practical performing
Practical participate
Engagement 2 with other practical but
him/her self in
help not tried him/
(2) performance
(1) her self
(0.5)
(0.5)
Document is Missing
Documented Poor writing,
proper, but output.
properly, no missing
Documentation 1 presentation Improper
error output
is average documentation
(1) (0.25)
(0.5) (0.25)
Complete Complete Work
Submit after 2
within a within two submits after
Time 1 weeks
week weeks 3 weeks.
(0.5) (0.25)
(1) (0.25)

Total

Faculty Signature with Date

Page | 20 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
BHAGWAN MAHAVIR UNIVERSITY
BHAGWAN MAHAVIR POLYTECHNIC
IT ENGINEERING DEPARTMENT
PRACTICAL:- 5

 AIM :- Transfer Files between systems in LAN using FTP.


File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one host to another
over a TCP-based network, such as a Local Area Network (LAN). Here are the basic steps to transfer files
between systems in a LAN using FTP:

Prerequisites:
1. Ensure FTP Server is Running:
- One of the systems in your LAN needs to act as the FTP server. You can use software like FileZilla
Server, vsftpd (for Linux), or other FTP server software.

2. Enable FTP Client:


- The system from which you want to transfer files should have an FTP client installed. Most operating
systems come with a built-in command-line FTP client, or you can use a third-party FTP client software.

Steps to Transfer Files:


Setting up the FTP Server:

1. Install and Configure FTP Server:

- Install an FTP server software on the system that will act as the server. Follow the installation instructions
provided by the chosen FTP server software.

2. Configure FTP Server:

- Configure the FTP server settings, including user accounts, permissions, and directories that will be
accessible.

3. Start the FTP Server:

- Start the FTP server software. The server will listen for incoming FTP connections on a specific port
(usually port 21).

Using Command-Line FTP (Windows):

Page | 21 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
1. Open Command Prompt:

- On the system from which you want to transfer files, open the Command Prompt
2. Connect to the FTP Server:

- Type the following command to connect to the FTP server:

Replace `<server_ip_address>` with the IP address of the FTP server.

1. Enter Credentials:
- Enter the FTP server username and password when prompted.

2. Navigate to the Desired Directory:


- Use the `cd` command to navigate to the directory on the FTP server where you want to upload or
download files.

3. Upload or Download Files:


- Use the `put` command to upload a file from your local system to the FTP server:

Use the `get` command to download a file from the FTP server to your local system:

4. Close FTP Session:


- Type `bye` to close the FTP session.

Using FTP Client Software (FileZilla - Windows):

1. Download and Install FTP Client:

Page | 22 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
- Download and install an FTP client such as FileZilla on the system from which you want to transfer
files.
2. Open FileZilla:
- Launch FileZilla and enter the IP address, FTP username, password, and port of the FTP server.

3. Connect to the FTP Server:


- Click the "Quickconnect" button to connect to the FTP server.

1. Transfer Files:

- Use the FileZilla interface to navigate between the local and remote directories. Drag and drop files between
two panes to upload or download files.

2. Disconnect from the FTP Server:


- Click the "Disconnect" button when you're done transferring files.

Remember to consider security best practices, such as using strong passwords and, if possible, enabling
encryption (FTP over TLS/SSL) for secure file transfers. Additionally, configure firewalls to allow FTP
traffic if necessary.

Page | 23 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
Assessment:

Total Marks
Criteria Exceptional Satisfactory Developing Limited
Marks Obtained

Accurately 1-2 errors / 3-5 errors/ More than 5


Accuracy 3 done mistake mistake errors
(3) (2) (1) (1)
Fully under Partially Partially
Understand
stood and understood understood
Understanding but cannot
3 explain and can and cannot
& Explanation explain
perfectly explain explain
(2)
(3) (1) (1)
Watched other
Present but
Performed students
Performed not
Practical performing
Practical participate
Engagement 2 with other practical but
him/her self in
help not tried him/
(2) performance
(1) her self
(0.5)
(0.5)
Document is Missing
Documented Poor writing,
proper, but output.
properly, no missing
Documentation 1 presentation Improper
error output
is average documentation
(1) (0.25)
(0.5) (0.25)
Complete Complete Work
Submit after 2
within a within two submits after
Time 1 weeks
week weeks 3 weeks.
(0.5) (0.25)
(1) (0.25)

Total

Faculty Signature with Date

Page | 24 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
BHAGWAN MAHAVIR UNIVERSITY
BHAGWAN MAHAVIR POLYTECHNIC
IT ENGINEERING DEPARTMENT
PRACTICAL:- 6

 AIM :- To study OSI model.


The OSI Model (Open Systems Interconnection) is a conceptual framework that standardizes the
functions of a network into seven distinct layers. It ensures interoperability between different systems and
simplifies network communication. Each layer has specific tasks, working together to enable data transfer
from one device to another.

1. Physical Layer (Layer 1):


o Handles the transmission of raw bits (0s and 1s) over a physical medium such as cables,
fiber optics, or radio signals.
o Defines hardware specifications, including connectors, voltages, and signaling.

2. Data Link Layer (Layer 2):


o Organizes raw bits into frames and ensures error detection and correction for
reliable
o

o transmission between directly connected devices.


Page | 25 Patil Yash [En_no.: 232701070117]
Computer Network(2030106303)
o Includes sublayers:
 MAC (Media Access Control): Manages access to the physical medium.
 LLC (Logical Link Control): Ensures communication reliability.
3. Layer (Layer 3):
o Responsible for routing data between devices in different networks.
o Uses logical addressing (e.g., IP addresses) to ensure data reaches the correct destination.
o Manages packet forwarding, fragmentation, and congestion control.

4. Transport Layer (Layer 4):


o Ensures reliable, end-to-end communication between devices.
o Splits data into segments for transport, manages error recovery, and handles flow control.
o Protocols include TCP (reliable) and UDP (unreliable but faster).

5. Session Layer (Layer 5):


o Manages and maintains sessions (connections) between applications.
o Synchronizes data exchange and handles session recovery in case of interruptions.

6. Presentation Layer (Layer 6):


o Translates data into a format that the application layer can understand.
o Handles data encryption, compression, and conversion (e.g., from ASCII to binary).

7. Application Layer (Layer 7):


o The topmost layer, providing network services directly to end-user applications.
o Handles protocols for email, web browsing, file transfers, etc. (e.g., HTTP, FTP, DNS).

Importance of the OSI Model:


 Standardization: Provides a universal framework for different network devices and protocols
to communicate.
 Troubleshooting: Simplifies debugging by isolating issues to specific layers.
 Interoperability: Ensures compatibility between various hardware and software from
different vendors.

While the OSI model is a theoretical guideline, real-world networking often follows the more
practical
TCP/IP model, which maps to OSI concepts.

Page | 26 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
Assessment:

Total Marks
Criteria Exceptional Satisfactory Developing Limited
Marks Obtained

Accurately 1-2 errors / 3-5 errors/ More than 5


Accuracy 3 done mistake mistake errors
(3) (2) (1) (1)
Fully under Partially Partially
Understand
stood and understood understood
Understanding but cannot
3 explain and can and cannot
& Explanation explain
perfectly explain explain
(2)
(3) (1) (1)
Watched other
Present but
Performed students
Performed not
Practical performing
Practical participate
Engagement 2 with other practical but
him/her self in
help not tried him/
(2) performance
(1) her self
(0.5)
(0.5)
Document is Missing
Documented Poor writing,
proper, but output.
properly, no missing
Documentation 1 presentation Improper
error output
is average documentation
(1) (0.25)
(0.5) (0.25)
Complete Complete Work
Submit after 2
within a within two submits after
Time 1 weeks
week weeks 3 weeks.
(0.5) (0.25)
(1) (0.25)

Total

Faculty Signature with Date

Page | 27 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)

BHAGWAN MAHAVIR UNIVERSITY


BHAGWAN MAHAVIR POLYTECHNIC
IT ENGINEERING DEPARTMENT
PRACTICAL:- 7

 AIM :- To study different types of networking Devices.

 ROUTER:
 FUNCTION:
 Connects multiple networks (e.g., home network to the internet).
 Routes data packets between devices and networks using IP addresses.
 Provides Network Address Translation (NAT) for multiple devices on a single IP.
 USE CASE:
 Home Use: Allows multiple devices (smartphones, computers, smart TVs) to access the
internet simultaneously.
 Enterprise Use: Connects various departments or branches to a central network and the
internet, enabling communication and resource sharing.
 KEY FEATURES:
 Wireless capability (Wi-Fi routers) for mobile device connectivity.
 Firewall functionality for security.
 Quality of Service (QoS) settings to prioritize bandwidth for critical applications.

 SWITCH:

 FUNCTION:
• Connects devices within the same Local Area Network (LAN).
• Operates at the Data Link Layer (Layer 2) of the OSI model.
• Forwards data only to the specific device that needs it, improving network efficiency.
• Uses MAC addresses to identify devices and manage traffic.

Page | 28 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
 USE CASE:
 Local Area Networks (LANs): Commonly used in offices, schools, and homes to
connect computers, printers, and servers, allowing them to communicate and share
resources.Supports a scalable network by adding more devices without significant
performance loss.

 KEY FEATURES:
 Can have multiple ports (e.g., 8, 16, 24, or 48) for connecting multiple devices.
 Managed switches allow for configuration, monitoring, and advanced features like
VLANs (Virtual Local Area Networks).

 HUB
 FUNCTION:
 A basic networking device that connects multiple Ethernet devices.
 Broadcasts incoming data packets to all ports, regardless of the intended recipient.
 Operates at the Physical Layer (Layer 1) of the OSI model.
 USE CASE:
 Legacy Networks: Historically used in small networks to connect devices, such as
in homes or small offices.
 Less common today due to inefficiencies compared to switches, which direct
traffic more intelligently.
 KEY FEATURES:
 Simple and inexpensive; often used for basic connectivity needs.
 Limited bandwidth management and no ability to filter traffic, leading to potential
network congestion.

Page | 29 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)

 BRIDGE:
 FUNCTION:
• Connects two or more network segments, allowing them to function as a single network.
• Filters traffic by examining data packets and forwarding them only to the relevant segment.
• Reduces collisions by separating traffic, which enhances overall network performance.
 USE CASE:
• Network Segmentation: Commonly used to divide large networks into smaller, more
manageable segments, improving performance and reducing congestion.
• Connecting Different Media Types: Can link different types of networks, such as Ethernet and
Wi-Fi.
 KEY FEATURES:
• Operates at the Data Link Layer (Layer 2) of the OSI model.
• Maintains a MAC address table to make intelligent
forwarding decisions.
• Can improve security by isolating network traffic.

Page | 30 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)

 GETWAY:
 FUNCTION:
• Serves as a "gate" between two networks, allowing communication between them.
• Translates data between different protocols and formats, enabling interoperability.
• Can perform routing, forwarding, and protocol conversion as needed.
 USE CASE:
• Connecting a Home Network to the Internet: Allows devices in a home network to access the
internet, typically functioning as a router and modem combined.
• Linking Different Network Architectures: Facilitates communication between different
network types, such as a local area network (LAN) and a wide area network (WAN).
 KEY FEATURES:
• Can operate at multiple layers of the OSI model, depending on its functionality (e.g., Layer 3 for
routing, Layer 7 for application layer translation).
• Often includes security features, such as firewalls and VPN capabilities.
• Supports various network protocols, enabling flexibility in network design.

Page | 31 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
 REPEATER:

 FUNCTION:
• Amplifies and retransmits signals to extend the range of a network.
• Receives incoming data signals, strengthens them, and sends them out again to cover larger areas.
• Helps to overcome distance limitations of network cables or wireless signals.
 USE CASE:
• Extending Wi-Fi Coverage: Commonly used in homes or offices to boost Wi-Fi signals in areas
where coverage is weak or nonexistent.
• Boosting Ethernet Signals: Employed in larger networks to extend the reach of wired
connections, ensuring reliable data transmission over long distances.
 KEY FEATURES:
• Simple installation with minimal configuration required.
• Works with various network standards (e.g., Ethernet, Wi-Fi).
• Can be used in both wired and wireless networks.

Page | 32 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
Assessment:

Total Marks
Criteria Exceptional Satisfactory Developing Limited
Marks Obtained

Accurately 1-2 errors / 3-5 errors/ More than 5


Accuracy 3 done mistake mistake errors
(3) (2) (1) (1)
Fully under Partially Partially
Understand
stood and understood understood
Understanding but cannot
3 explain and can and cannot
& Explanation explain
perfectly explain explain
(2)
(3) (1) (1)
Watched other
Present but
Performed students
Performed not
Practical performing
Practical participate
Engagement 2 with other practical but
him/her self in
help not tried him/
(2) performance
(1) her self
(0.5)
(0.5)
Document is Missing
Documented Poor writing,
proper, but output.
properly, no missing
Documentation 1 presentation Improper
error output
is average documentation
(1) (0.25)
(0.5) (0.25)
Complete Complete Work
Submit after 2
within a within two submits after
Time 1 weeks
week weeks 3 weeks.
(0.5) (0.25)
(1) (0.25)

Total

Faculty Signature with Date

Page | 33 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
BHAGWAN MAHAVIR UNIVERSITY
BHAGWAN MAHAVIR POLYTECHNIC
IT ENGINEERING DEPARTMENT
PRACTICAL:- 8

 AIM: - Install Windows 2003 / Windows 2008 network operating system.


In this section, you should be able to :

 Describe the different editions of Server 2008


 Describe the requirements for a full installation
 Get a free evaluation copy of Windows Server 2008 (if you don‟t already have one) and
how to install it.
 Perform Full Installation of Server 2008

Hardware Requirements
Table 1.1 lists the basic system requirements for Windows Server 2008 editions.

Standard Enterprise Datacenter


Processor (min) 1 GHz (x86) 1 GHz (x86) 1 GHz (x86)
1.4 GHz (x64) 1.4 GHz (x64) 1.4 GHz (x64)
Processor (recommended) 2 GHz or faster 2 GHz or faster 2 GHz or faster

Memory (min) 512 MB 512 MB 512 MB

Memory (recommended) 2 GB or more 2 GB or more 2 GB or more

Memory (max) 4 GB (32 bit) 64 GB (32 bit) 64 GB (32 bit)


32 GB (64 bit) 2 TB (64 bit) 2 TB (64 bit)
Disk space (min) 10 GB 10 GB 10 GB

Disk space (recommended) 40 GB 40 GB 40 GB

Page | 34 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
TABLE 1.1 Hardware requirements for Windows Server 2008 editions.

Hardware resources would need to be increased for any systems using Hyper-V technology and running
virtual machines. For example, if you‟re running three virtual servers within a Windows Server 2008
Enterprise edition, you would need additional processing power, more memory, and more disk space.

How to Obtain a Copy of Windows Server 2008?

It‟s common for Microsoft to provide free evaluation copies of Server operating systems for use. Currently,
you can download Windows Server 2008 30-day and 60-day evaluation editions free of charges at :

http://www.micosoft.com/windowsserver2008/en/us/trial-software.aspx

Beware, though. These files are quite large. If you‟re using a slower dial-up link, you might want to see
whether Microsoft is currently offering an evaluation DVD via regular mail. There‟s a nominal cost involved
with this option, but it‟s better than trying to download more than 2GB at 56KB.

The download is an .iso image of the actual DVD. Search with your favorite search engine for Download Windows
Server 2008, and you‟ll find the link.

Once you download the .iso image, you can burn it to a DVD. If you don‟t have the software needed to burn
it to DVD, you can use one of many freeware utilities (such as ImgBurn) to burn the .iso image to your DVD.

Installing Windows Server 2008


1. Insert the Windows Server 2008 DVD into your DVD drive. Boot your PC using
Windows Server 2008 DVD.

2. Language and Keyboard Options.

This allows you to specify your language and your keyboard layout. By default, text input
language and method is : US Keyboard layout (Figure 0001).

Page | 35 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)

2.1. Click Next to continue.


1. Windows Server 2008 Setup

You are presented with options to Install, brief information about Server 2008 or
repair (Figure 0002).

Page | 36 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)

3.1 Click Install now to start setup Windows Server 2008 on this computer.

3. Product Key and Activation

4.1 Enter your "Product Key" for activation now or you can enter it later (Figure 0003).

4.2. Click Next to continue.

4.3. If you leave the product key box blank, the warning window will appear (Figure 0004); just
click No to continue.

5. Windows Server Version

5.1 Select Windows Server 2008 Enterprise (Full Installation), (as shown in the
Page | 37 Patil Yash [En_no.: 232701070117]
Computer Network(2030106303)
Figure 0005).

5.2 Tick the box of I have selected the edition of Windows that I purchased.

5.3 Click Next.


6. Windows Server 2008 License Agreement

6.1 Read the terms of the license agreement.

If you accept (which, of course, you have to do to continue installation), tick the
box of I accept the license terms (Figure 0006).

Page | 38 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)

6.2 Click NEXT to continue.

7. Installation Options.
You are presented with options to Upgrade or Custom (advanced). Click Custom (advanced),

(Figure 0007).

Page | 39 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)

8. Partition Options

1.1. Click Drive options (advanced), (Figure 0008).

8.2 Click New, (Figure 0009).

Page | 40 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)

8.3 Change the size to 40,000 MB, (Figure 0010).

8.4 Click Apply.

8.5 Select Disk 0 Partition 1 (Figure 0011).

Page | 41 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)

8.6 Click Next The partition will be formatted with NTFS as part of the installation. At this point, take a
breack. The installation will continue on its own.

9. First Time Login


When you first time login, the windows warning will appear ask you to change the user passward
before logging on for the first time(Figure 0013).

Page | 42 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)

9.1 Click OK.

10. Change Administrator Password.

10.1 Enter a new password in the two test boxes (Figure 0014). Enter Pr@ctice in this exercise.
It meets complexity requirements and doesn‟t require you to remember multiple passwords. Don‟t
use this password on a production server.

10.2 Hit Enter button after the passwords are entered.

Page | 43 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)

10.3 Once the password has been changed, the screen indicates success (Figure 0015). Click OK.

Congratulation! You have finish install the Windows Server 2008.

Page | 44 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
Assessment:

Total Marks
Criteria Exceptional Satisfactory Developing Limited
Marks Obtained

Accurately 1-2 errors / 3-5 errors/ More than 5


Accuracy 3 done mistake mistake errors
(3) (2) (1) (1)
Fully under Partially Partially
Understand
stood and understood understood
Understanding but cannot
3 explain and can and cannot
& Explanation explain
perfectly explain explain
(2)
(3) (1) (1)
Watched other
Present but
Performed students
Performed not
Practical performing
Practical participate
Engagement 2 with other practical but
him/her self in
help not tried him/
(2) performance
(1) her self
(0.5)
(0.5)
Document is Missing
Documented Poor writing,
proper, but output.
properly, no missing
Documentation 1 presentation Improper
error output
is average documentation
(1) (0.25)
(0.5) (0.25)
Complete Complete Work
Submit after 2
within a within two submits after
Time 1 weeks
week weeks 3 weeks.
(0.5) (0.25)
(1) (0.25)

Total

Faculty Signature with Date

Page | 45 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)

BHAGWAN MAHAVIR UNIVERSITY


BHAGWAN MAHAVIR POLYTECHNIC
IT ENGINEERING DEPARTMENT
PRACTICAL:- 9

 AIM :- To study IPv4 and IPv6 Addressing.


IP Addressing is a fundamental concept in networking, where devices are assigned unique identifiers
for communication over a network. IPv4 and IPv6 are two versions of Internet Protocol (IP) used in
networking.

1. IPv4 Addressing :-

1. Format: IPv4 addresses use a 32-bit binary number, divided into four octets separated by dots
(e.g., 192.168.1.1).
2. Address Space: Supports approximately 4.3 billion unique addresses, which is insufficient for
modern demands.
3. Classes: IPv4 addresses are categorized into five classes (A, B, C, D, and E) based on the
range of addresses.
4. Subnetting: IPv4 supports subnetting to divide a large network into smaller segments.
5. Common Issues: Limited address space led to the development of Network Address Translation
(NAT) and private addressing to conserve addresses.

 Types of IPv4 Addressing

1. Unicast Addressing
o Purpose: One-to-one communication between devices. Data is sent from one source
to a specific destination.
o Example: A computer with an IP 192.168.1.10 communicates directly with a server.
o Usage: Common for most network communications.

2. Broadcast Addressing
o Purpose: One-to-all communication where data is sent to all devices in a network
segment.
o Example: 192.168.1.255 is a broadcast address for the subnet 192.168.1.0/24.
o Usage: Used in ARP requests and network announcements.

3. Multicast Addressing
o Purpose: One-to-many communication where data is sent to multiple devices interested
in receiving the information.
o Range: 224.0.0.0 to 239.255.255.255.

Page | 46 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)

o Usage: Video streaming, online gaming, or real-time data sharing.

4. Private Addressing
o Purpose: Used within local networks and not routable on the public internet. Requires
NAT for internet access.
o Ranges:
A: 10.0.0.0 – 10.255.255.255
 Class B: 172.16.0.0 – 172.31.255.255
 Class C: 192.168.0.0 – 192.168.255.255.
o Usage: Home and business networks.

5. Public Addressing
o Purpose: Routable on the internet and globally unique.
o Range: Any address outside private address ranges.
o Usage: Assigned to devices needing direct internet communication.

6. Loopback Addressing
o Purpose: Tests communication within the same device (local host).
o Range: 127.0.0.0 – 127.255.255.255.
o Usage: Commonly used address is 127.0.0.1 for self-diagnostics.

7. APIPA (Automatic Private IP Addressing)


o Purpose: Automatically assigned when DHCP is unavailable.
o Range: 169.254.0.0 – 169.254.255.255.
o Usage: Limited to local communication in a network.

8. Reserved Addresses
o Purpose: Reserved for specific purposes like routing or testing.
o Examples:
 0.0.0.0: Indicates the default route or unspecified address.
 255.255.255.255: Limited broadcast address.

Understanding these types is crucial for network design, device configuration, and efficient
troubleshooting in computer networking.
2. IPv6 Addressing :-

1. Format: IPv6 uses a 128-bit binary number, represented in hexadecimal and separated by
colons (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334).

2. Address Space: Provides a vast number of unique addresses (approximately


21282^{128}2128), solving the address exhaustion problem.

Page | 47 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
3. Simplification: IPv6 eliminates the need for NAT and provides better support for multicast,
which is efficient for broadcasting data to multiple recipients.

4. Features:
 Stateless Address Autoconfiguration (SLAAC): Devices can self-configure IP
addresses without a DHCP server.
 Built-in security with mandatory IPsec support
 Types of IPv6 Addressing in Computer Networking :-

IPv6 addressing is categorized based on how data is delivered and its intended recipients. The
main types include:

1. Unicast Address :-
 Purpose: One-to-one communication between devices. A single IPv6 address identifies a
specific interface.
 Types of Unicast Addresses:
o Global Unicast: Globally unique and routable on the internet, similar to IPv4
public addresses.
 Example: 2001:0db8::/32.
o Link-Local: Automatically configured for communication within the same link
(network segment) and starts with FE80::/10.
 Example: FE80::1.
o Unique Local (ULA): Used for private addressing within organizations, similar to
IPv4 private addresses. Begins with FC00::/7.
 Example: FD00::1.

2. Multicast Address :-
 Purpose: One-to-many communication where data is sent to all devices in a specific group.
 Range: Starts with FF00::/8.
 Usage: Routing protocols, video streaming, and other group communication tasks.
 Example: FF02::1 (All nodes on the local link).

3. Anycast Address :-
 Purpose: One-to-nearest communication where data is sent to the closest device in a group.
 Usage: Often used for load balancing and DNS services.
 Example: IPv6 does not have a specific format for anycast; any unicast address can be

Page | 48 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
Assessment:

Total Marks
Criteria Exceptional Satisfactory Developing Limited
Marks Obtained

Accurately 1-2 errors / 3-5 errors/ More than 5


Accuracy 3 done mistake mistake errors
(3) (2) (1) (1)
Fully under Partially Partially
Understand
stood and understood understood
Understanding but cannot
3 explain and can and cannot
& Explanation explain
perfectly explain explain
(2)
(3) (1) (1)
Watched other
Present but
Performed students
Performed not
Practical performing
Practical participate
Engagement 2 with other practical but
him/her self in
help not tried him/
(2) performance
(1) her self
(0.5)
(0.5)
Document is Missing
Documented Poor writing,
proper, but output.
properly, no missing
Documentation 1 presentation Improper
error output
is average documentation
(1) (0.25)
(0.5) (0.25)
Complete Complete Work
Submit after 2
within a within two submits after
Time 1 weeks
week weeks 3 weeks.
(0.5) (0.25)
(1) (0.25)

Total

Faculty Signature with Date

Page | 49 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)

BHAGWAN MAHAVIR UNIVERSITY


BHAGWAN MAHAVIR POLYTECHNIC
IT ENGINEERING DEPARTMENT
PRACTICAL:- 10

 AIM:- Install Wire shark tool and Inspect packets.


Certainly, Wireshark is a powerful network protocol analyzer that allows you to capture and analyze the
data traveling back and forth on your network. Here are general steps to install Wireshark and inspect
packets:

Installing Wireshark:

1. Download Wireshark:

- Visit the official Wireshark website: [Wireshark


Downloads](https://www.wireshark.org/download.html).

- Choose the appropriate version for your operating system (Windows, macOS, or Linux).

2. Install Wireshark:

- Follow the installation instructions provided on the Wireshark website for your specific operating

system.

Capturing and Inspecting Packets:

For Windows:

1. Launch Wireshark:

- Open Wireshark after the installation.

2. Select Network Interface:

- Choose the network interface you want to capture packets from. Click on the interface and then

click the "Start" button.

3. Capture Packets:

- Wireshark will start capturing packets on the selected interface. You'll see a live list of captured

packets.

Page | 50 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)

4. Inspect Packets:

- You can inspect individual packets by clicking on them in the list. The details of the packet will be

displayed in the lower panel.

macOS:

1. Launch Wireshark:

- Open Wireshark from the Applications folder.

2. Select Network Interface:

- Choose the network interface you want to capture packets from.

3. Capture Packets:

- Click the "Start" button to begin capturing packets on the selected interface.

4. Inspect Packets:

- Click on any packet in the list to view detailed information in the lower panel.
For Linux:
1. Launch Wireshark:

- Open Wireshark from the terminal using the command `wireshark`.

2. Select Network Interface:

- Choose the network interface you want to capture packets from.

3. Capture Packets:

- Click the "Start" button to start capturing packets on the selected interface.

4. Inspect Packets:

- Click on a packet in the list to view details in the lower panel.

Page | 51 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)

Tips for Packet Inspection:


- Filtering Packets:

- Use display filters to focus on specific types of packets (e.g., `tcp`, `udp`, `ip.addr==x.x.x.x` for a
specific IP address).

- Packet Details:

- Explore the various tabs in the packet details pane to view information such as protocol layers,
headers, and payload.

- Follow TCP Stream:

- Right-click on a TCP packet and select "Follow" > "TCP Stream" to view the entire conversation
between two hosts.

- Save Captures:

- Save captures for later analysis or share with others.

Remember to use Wireshark responsibly and ensure you have the necessary permissions to
capture packets on the network. Analyzing packet captures can provide valuable insights into
network behavior and troubleshooting network issues.

Page | 52 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
Assessment:

Total Marks
Criteria Exceptional Satisfactory Developing Limited
Marks Obtained

Accurately 1-2 errors / 3-5 errors/ More than 5


Accuracy 3 done mistake mistake errors
(3) (2) (1) (1)
Fully under Partially Partially
Understand
stood and understood understood
Understanding but cannot
3 explain and can and cannot
& Explanation explain
perfectly explain explain
(2)
(3) (1) (1)
Watched other
Present but
Performed students
Performed not
Practical performing
Practical participate
Engagement 2 with other practical but
him/her self in
help not tried him/
(2) performance
(1) her self
(0.5)
(0.5)
Document is Missing
Documented Poor writing,
proper, but output.
properly, no missing
Documentation 1 presentation Improper
error output
is average documentation
(1) (0.25)
(0.5) (0.25)
Complete Complete Work
Submit after 2
within a within two submits after
Time 1 weeks
week weeks 3 weeks.
(0.5) (0.25)
(1) (0.25)

Total

Faculty Signature with Date

Page | 53 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
BHAGWAN MAHAVIR UNIVERSITY
BHAGWAN MAHAVIR POLYTECHNIC
IT ENGINEERING DEPARTMENT
PRACTICAL:- 11

 AIM:- Determine whether the following IPv4 addresses are valid or invalid.
If a valid IPv4 address then finds class, Network and Host ID of an IPv4
address. If invalid IPv4 address then write a reason for the same.
a) 1.4.5.5 b) 75.45.301.14
c) 101.59.045.78 d) 192.226.12.11
e) 130.45.151.154 f) 11100010.23.14.67
g) 211.34.7.8.20 h) 240.230.220.89

Student work:

A) 1.4.5.5:- is valid
Class: - A (Because the first octet of this IP comes between 1.0.0.0 to 127.0.0.0) Network ID: -
1 Host ID: - 4.5.5

B) 75.45.301.14 is invalid
Because the third segment in the given address “301” exceeds the valid range of 0 -255.The
address 75.45.301.14 is invalid as per the rules of IPv4 addressing.

C) 101.59.045.78 is invalid
Looking at “045” in the third segment it’s important to note that leading zeros are not permitted
in an IPv4 address segment unless the segment consists of only zero. In this case “045” has a
leading zero which is not allowed for a non-zero number.

D) 192.226.12.11 is valid
Class: - C (because the first octet of this IP comes between 192.0.0.0 to 223.255.255.0)
Network ID: - 192.226.12 Host ID: - 11

E) 130.45.151.154 is valid
Class: - B (because the first octet of this IP comes between 128.0.0.0 to 191.255.0.0)
Network ID: - 130.45 Host ID: - 151.154

F) 11100010.23.15.67 is invalid
Because the first octet of the given IP address does not belong to any class of the IPv4 address.

Page | 54 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
G) 211.34.7.8.20 is invalid
Because the given IP address has 5 octet and IPv4 address contain 4 octets in it.

H) 240.230.220.89 is valid
Class: - E (because the first octet of this IP comes between: 240.0.0.0 to 255.255.255.255)
Class E addresses aren’t divided into network and host IDs like other classes (A, B, C). Instead they
were reserved for future use or experimental purposes and aren’t commonly utilized in regular
network.

Page | 55 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
Assessment:

Total Marks
Criteria Exceptional Satisfactory Developing Limited
Marks Obtained

Accurately 1-2 errors / 3-5 errors/ More than 5


Accuracy 3 done mistake mistake errors
(3) (2) (1) (1)
Fully under Partially Partially
Understand
stood and understood understood
Understanding but cannot
3 explain and can and cannot
& Explanation explain
perfectly explain explain
(2)
(3) (1) (1)
Watched other
Present but
Performed students
Performed not
Practical performing
Practical participate
Engagement 2 with other practical but
him/her self in
help not tried him/
(2) performance
(1) her self
(0.5)
(0.5)
Document is Missing
Documented Poor writing,
proper, but output.
properly, no missing
Documentation 1 presentation Improper
error output
is average documentation
(1) (0.25)
(0.5) (0.25)
Complete Complete Work
Submit after 2
within a within two submits after
Time 1 weeks
week weeks 3 weeks.
(0.5) (0.25)
(1) (0.25)

Total

Faculty Signature with Date

Page | 56 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
BHAGWAN MAHAVIR UNIVERSITY
BHAGWAN MAHAVIR POLYTECHNIC
IT ENGINEERING DEPARTMENT
PRACTICAL:- 12

AIM:- Study of firewalls in providing network security.


Introduction:-
A firewall is a system—either hardware, software, or a combination of both—designed to monitor
and control incoming and outgoing network traffic. It uses predefined security rules to permit or
block data packets, thereby protecting a network from unauthorized access, malware, and other
cyber threats.

 How Firewalls Work:-


Firewalls control network traffic by analyzing data packets and ensuring they adhere to security
policies. This process includes:

1. Packet Header Analysis


o Examines source/destination IP addresses, port numbers, and protocols.
o Determines whether to allow or block packets.

2. Stateful Inspection
o Tracks active connections to understand the context of packet flows.
o Ensures packets are part of legitimate, established connections.

3. Application-Level Filtering
o Inspects data at the application layer for anomalies or malicious content.
o Used in more advanced firewalls, like proxy firewalls and NGFWs.

4. Deep Packet Inspection (DPI)


o Goes beyond headers to examine payloads.
o Detects malware, intrusions, and non-compliant traffic patterns.

 Key functions of firewalls:-


1. Traffic Monitoring and Filtering
o Inspects data packets and blocks those that do not meet the security criteria.

Page | 57 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
2. Access Control
o Enforces policies to allow or deny traffic based on predefined rules.

3. Threat Detection and Prevention


o Identifies malicious activities like hacking attempts, viruses, and worms.
o Prevents unauthorized access and data breaches.

4. Virtual Private Network (VPN) Support


o Facilitates secure remote access by encrypting data transmission.

5. Logging and Monitoring


o Records network activity to analyze traffic patterns and detect anomalies.

 Types of Firewalls:-
1. Packet-Filtering Firewalls
o Examines individual data packets.
o Operates at the network layer (Layer 3 of the OSI model).
o Filters packets based on source/destination IP addresses, ports, and protocols.
o Lightweight but less secure against sophisticated attacks.

2. Stateful Inspection Firewalls


o Monitors active connections and decides based on the state of traffic.
o Tracks the state of connections and inspects packet headers and the connection state.
o Provides more robust security than packet filtering.

3. Proxy Firewalls
o Operates at the application layer (Layer 7 of the OSI model).
o Acts as an intermediary between end-users and the web.
o Inspects application-level data for more comprehensive protection.

4. Next-Generation Firewalls (NGFWs)


o Combines traditional firewall capabilities with advanced features like intrusion prevention,

Page | 58 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
deep packet inspection, and threat intelligence.
o operates across multiple OSI layers to detect and prevent complex attacks.

5. Web Application Firewalls (WAFs)


o Focuses on monitoring and protecting web applications.
o Guards against application-specific attacks, such as SQL injection, cross-site scripting
(XSS), and session hijacking.

 Challenges and Best Practices:-

 Challenges
1. Sophisticated Threats:
o Firewalls may struggle against zero-day exploits or advanced persistent threats (APTs).

2. Encrypted Traffic:
o High volumes of SSL/TLS traffic make it challenging to inspect effectively.

3. Configuration Errors:
o Misconfigured rules can lead to vulnerabilities.

4. Scalability Issues:
o Legacy firewalls may not handle modern traffic loads efficiently.

Best Practices
1. Regular Updates:
o Update firewall software and rules to address emerging threats.

2. Comprehensive Rule Sets:


o Define clear, well-documented policies to control traffic.

3. Logging and Monitoring:


o Continuously analyze logs for anomalies and potential breaches.

4. Integration with Other Tools:


o Combine firewalls with intrusion prevention systems (IPS), endpoint security, and threat
intelligence platforms.

Page | 59 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
5. Periodic Testing:
o Conduct penetration tests and audits to evaluate firewall effectiveness.
 Importance of Firewalls in Cybersecurity:-

 Prevents Unauthorized Access:


Protects critical assets by blocking unwanted traffic.

 Safeguards Sensitive Data:


Ensures compliance with data protection regulations.

 Enhances Network Visibility:


Provides insights into network traffic patterns.

 Supports Incident Response:


Logs and reports assist in post-incident analysis.

Firewalls remain indispensable in a multi-layered defense strategy. However, their effectiveness hinges on
correct configuration, regular updates, and integration with broader security systems. For modern threats,
firewalls must evolve to address the dynamic landscape of cyber risks.

Page | 60 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
Assessment:

Total Marks
Criteria Exceptional Satisfactory Developing Limited
Marks Obtained

Accurately 1-2 errors / 3-5 errors/ More than 5


Accuracy 3 done mistake mistake errors
(3) (2) (1) (1)
Fully under Partially Partially
Understand
stood and understood understood
Understanding but cannot
3 explain and can and cannot
& Explanation explain
perfectly explain explain
(2)
(3) (1) (1)
Watched other
Present but
Performed students
Performed not
Practical performing
Practical participate
Engagement 2 with other practical but
him/her self in
help not tried him/
(2) performance
(1) her self
(0.5)
(0.5)
Document is Missing
Documented Poor writing,
proper, but output.
properly, no missing
Documentation 1 presentation Improper
error output
is average documentation
(1) (0.25)
(0.5) (0.25)
Complete Complete Work
Submit after 2
within a within two submits after
Time 1 weeks
week weeks 3 weeks.
(0.5) (0.25)
(1) (0.25)

Total

Faculty Signature with Date

Page | 61 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
BHAGWAN MAHAVIR UNIVERSITY
BHAGWAN MAHAVIR POLYTECHNIC
IT ENGINEERING DEPARTMENT
PRACTICAL:- 13

 AIM:- Study of basic Network command and Network configuration


commands (ipconfig, ping, tracert, netstat, pathping , route).

Understanding basic network commands and configuration commands is fundamental for


network administrators and IT professionals. Here's a study of some commonly used
network commands in Windows:

1. `ipconfig` - IP Configuration:
- Purpose: Displays the IP configuration for all network interfaces on a system.
- Usage:

2. `ping` - Packet Internet Groper:


- Purpose: Tests the reachability of a host on an Internet Protocol (IP) network.
- Usage:

3. `tracert` - Trace Route


- Purpose: Traces the route that packets take to reach a destination, showing the IP address of each hop
along the way.
- Usage:

Page | 62 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)

4. netstat - Network Statistics:


- Purpose: Displays active network connections, listening ports, and other network-related
information.

- Usage:

5. `pathping`:
- Purpose: Combines the functionality of `ping` and `tracert`, providing information about network
latency and packet loss.
- Usage:

6. `route`:
- Purpose: Displays or modifies the IP routing table.
- Usage:

Additional Tips:
- Use `ipconfig /release` and `ipconfig /renew` to release and renew IP addresses, respectively.

Page | 63 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
- To flush and reset the DNS resolver cache, use `ipconfig /flushdns`.
- For advanced network configuration, consider using the `netsh` command.

Example Scenarios:
1. Checking IP Configuration:

2. Testing Connectivity:

3. Tracing Route:

4. Displaying Network Statistics:

5. Pathping for Latency Analysis:

6. Viewing Routing Table:

Page | 64 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)

Page | 65 Patil Yash [En_no.: 232701070117]


Computer Network(2030106303)
Assessment:

Total Marks
Criteria Exceptional Satisfactory Developing Limited
Marks Obtained

Accurately 1-2 errors / 3-5 errors/ More than 5


Accuracy 3 done mistake mistake errors
(3) (2) (1) (1)
Fully under Partially Partially
Understand
stood and understood understood
Understanding but cannot
3 explain and can and cannot
& Explanation explain
perfectly explain explain
(2)
(3) (1) (1)
Watched other
Present but
Performed students
Performed not
Practical performing
Practical participate
Engagement 2 with other practical but
him/her self in
help not tried him/
(2) performance
(1) her self
(0.5)
(0.5)
Document is Missing
Documented Poor writing,
proper, but output.
properly, no missing
Documentation 1 presentation Improper
error output
is average documentation
(1) (0.25)
(0.5) (0.25)
Complete Complete Work
Submit after 2
within a within two submits after
Time 1 weeks
week weeks 3 weeks.
(0.5) (0.25)
(1) (0.25)

Total

Faculty Signature with Date

Page | 66 Patil Yash [En_no.: 232701070117]

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy