0% found this document useful (0 votes)
20 views36 pages

CN Lab_file

The document is a lab file for a B.Tech CSE student detailing various computer networking labs. It includes topics such as types of cables, connecting computers, and specific lab exercises on cable making and network configurations. Each section outlines materials, steps, advantages, and disadvantages of different networking methods and technologies.

Uploaded by

Dheeraj Reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views36 pages

CN Lab_file

The document is a lab file for a B.Tech CSE student detailing various computer networking labs. It includes topics such as types of cables, connecting computers, and specific lab exercises on cable making and network configurations. Each section outlines materials, steps, advantages, and disadvantages of different networking methods and technologies.

Uploaded by

Dheeraj Reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 36

Bharat Bhatt 2K21CSUN01059 CSE – 5B

COMPUTER
NETWORKS

LABFILE

B.Tech CSE 2021-25

Submitted By: Bharat Bhatt


Roll No: 2K21CSUN01059
Class: B.Tech CSE “5B”
Submitted to: Mr.Manoj kumar

1|Page
Bharat Bhatt 2K21CSUN01059 CSE – 5B

Index
Sno. Topic Signature
1. Lab-1 Different types of wires& the
steps for making straight through cable
and crossover cable

2. Lab-2 Steps to connect pcs in LAN


3. Lab-3 Network Commands
4. Lab-4 Topologies using switch
5. Lab-5 Switch Configuration
6. Lab- 6 VLAN
7. Lab-7 Connecting 2 network using
router

8. Lab -8 Connecting 3 different


network using empty router

2|Page
Bharat Bhatt 2K21CSUN01059 CSE – 5B

LAB : 1

Q1 - What are the different types of cables in computer networks. Write the working advantages
and disadvantages of each And differentiate them.

Ans1 - Different types of network cables are :-


1. Coaxial cables
2. Optical fiber cables
3. Twisted pair cables

COAXIAL CABLES

ARCHITECTURE

 It has a solid copper conductor at its centre located coaxially within a cylindrical outer conductor.
 A plastic layer provides insulation between the centre conductor and the outer braided
metal shield.
 Outer conductor acts as a shield against noise and crosstalk.
 Whole cable protected by a plastic cover and outer conductor is enclosed in an insulated sheath.
 Distance between the outer conductor and inner conductor plus the type of material used
for insulating the inner conductor determine the cable properties or impedance.
WORKING
 Coaxial cable works by carrying data in the centre conductor, while the surrounding layers of
shielding stop any signal loss (also called attenuation loss) and help reduce EMI.
 The first layer, called the dielectric, provides distance between the core conductor and the
outer layers, as well as some insulation.
 The next layers, collectively referred to as the shield, keep electrical impulses and
radio transmissions out.
ADVANTAGES
 Inexpensive
 Easy to wire and install
 Easy to expand
 Good resistance to EMI
 Up to 10Mbps capacity

3|Page
Bharat Bhatt 2K21CSUN01059 CSE – 5B

 Durable
 Can be installed next to metal objects without losing power
DISADVANTAGES
A single cable failure can take down an entire network

OPTICAL FIBER CABLES

ARCHITECTURE

 Fiber optic technology relies on the fact that it is possible to send a light beam along a thin fibre
suitably constructed.
 A fiber optic cable consists of a glass or silica core. The core of the optical fibre is surrounded by
a similar material, i.e. glass or silica, called the cladding, that has a refractive index that is slightly
lower than that of the core.
 It is found that even when the cladding has a slightly higher refractive index, the light passing
down the core undergoes total internal reflection, and it is thereby contained within the core of
the optical fiber.
 The Outside the cladding there is placed a plastic jacket. This is used to provide protection to the
optical fiber itself.
 In addition to this, optical fibers are usually grouped together in bundles and these are protected
by an overall outer sheath. This not only provides further protection but also serves to keep the
optical fibers together

WORKING
 Light travels down a fiber optic cable by bouncing off the walls of the cable repeatedly.
 Each light particle (photon) bounces down the pipe with continued internal mirror-like reflection.
 The light beam travels down the core of the cable. The core is the middle of the cable and the
glass structure.
 The cladding is another layer of glass wrapped around the core. Cladding is there to keep the
light signals inside the core.

ADVANTAGES

4|Page
Bharat Bhatt 2K21CSUN01059 CSE – 5B

 Greater bandwidth
 Low power loss
 Thinner and lighter than metal wires
 Security
 Cheaper

DISADVANTAGES

 Difficult to splice
 Expensive to install
 Highly susceptible
 Cant be curved

TWISTED PAIR CABLES

ARCHITECTURE

A twisted pair cable comprises of two separate insulated copper wires, which are twisted together and run
in parallel. The copper wires are typically 1mm in diameter. One of the wires is used to transmit data and
the other is the ground reference.

WORKING

Compared to a single conductor or an untwisted balanced pair, a twisted pair reduces electromagnetic
radiation from the pair and crosstalk between neighboring pairs and improves rejection of external
electromagnetic interference. It was invented by Alexander Graham Bell

5|Page
Bharat Bhatt 2K21CSUN01059 CSE – 5B

ADVANTAGES

Twisted pair cable is very flexible so it is really easy to work with. It is also less expensive than coaxial
cabling. The reason why twisted pair became so popular and widely implemented is because networking
protocols and standards were designed to support twisted pair wiring.

DISADVANTAGES

There are some disadvantages like the casing, the sheath around the twisted pair networking cabling
which is relatively thin. It doesn’t have second insulator like coaxial cabling has. It is also a bit
more susceptible to electromagnetic interference.

COMPARISON

TWISTED PAIR CABLE CO-AXIAL CABLE OPTICAL FIBRE

Transmission of signals takes Transmission of signals takes Signal transmission takes place
place in the electrical form place in the electrical form in an optical forms over a glass
over the metallic conducting over the inner conductor of the fibre
wires cable

In this medium the noise Coaxial having higher noise Optical fibre has highest noise
immunity is low immunity than twisted pair immunity as the light rays are
cable unaffected by the electrical
noise

Can be affected due to external Less affected due to external Not affected by the external
magnetic field magnetic field magnetic field

Cheapest medium Moderate expensive Expensive

Low bandwidth Moderately high bandwidth Very high bandwidth

Attenuation is very high Attenuation is low Attenuation is very low

Installation is easy Installation is fairly easy Installation is difficult

6|Page
Bharat Bhatt 2K21CSUN01059 CSE – 5B

Q2 - How to connect two computers.

Ans2 - There are several ways to connect two computers, allowing them to share files, resources, or
establish communication. Here are some common methods:

1. Ethernet Cable (Direct Connection):


This method involves connecting the two computers directly using an Ethernet cable (usually a Cat5e or
Cat6 cable).
Ensure that both computers have Ethernet ports.
Connect one end of the Ethernet cable to the Ethernet port of the first computer and the other end to the
Ethernet port of the second computer.
Assign static IP addresses to both computers within the same subnet (e.g., 192.168.0.1 for Computer A
and 192.168.0.2 for Computer B).
Once connected, you can transfer files or set up a network connection between the two computers.

2. Wi-Fi (Ad hoc Network):


If both computers have Wi-Fi capabilities, you can set up an ad hoc network to connect them wirelessly.
On one of the computers, create an ad hoc network and give it a name and security passphrase.
On the other computer, search for available Wi-Fi networks, find the ad hoc network you created, and
connect to it using the passphrase.
Once connected, you can share files and resources between the two computers.

3. Bluetooth:
If both computers have Bluetooth capabilities, you can use Bluetooth to establish a connection between
them.
Enable Bluetooth on both computers and set them to discoverable mode.
Pair the two computers by searching for nearby Bluetooth devices and selecting the other computer from
the list.
After pairing, you can use Bluetooth to share files and perform other tasks between the two computers.

4. USB Transfer:
If you only need to transfer files between the two computers, you can use a USB transfer cable or a USB
drive.
Connect the USB transfer cable to the USB ports of both computers and follow the on-screen instructions
to establish a connection.
Alternatively, you can copy the files to a USB drive on one computer and then connect the USB drive to
the other computer to transfer the files.

5. Cloud Storage:
Upload the files you want to share to a cloud storage service (e.g., Dropbox, Google Drive, OneDrive).
Access the same cloud storage account from both computers to download or share the files.
Remember that the method you choose may depend on the type of files you want to transfer, the distance
between the computers, and the available hardware and software on the computers. Choose the method
that best suits your needs and the resources you have at hand.

Q3 - Write down the steps of connecting two computers.

Ans3 - To connect two computers, you can use an Ethernet cable, Wi-Fi (ad hoc network), Bluetooth,
USB transfer, or cloud storage. Here are the step-by-step instructions for each method:

1. Connecting with an Ethernet Cable (Direct Connection):

7|Page
Bharat Bhatt 2K21CSUN01059 CSE – 5B

Step 1: Make sure both computers have Ethernet ports.


Step 2: Obtain an Ethernet cable (Cat5e or Cat6).
Step 3: Connect one end of the Ethernet cable to the Ethernet port of Computer A.
Step 4: Connect the other end of the Ethernet cable to the Ethernet port of Computer B.
Step 5: Assign static IP addresses to both computers within the same subnet (e.g., 192.168.0.1 for
Computer A and 192.168.0.2 for Computer B).
Step 6: On Windows: Go to Control Panel > Network and Sharing Center > Change adapter settings.
Right-click on the Ethernet adapter > Properties > Internet Protocol Version 4 (TCP/IPv4) > Properties.
Choose "Use the following IP address" and enter the static IP and subnet mask.
Step 7: On macOS: Go to System Preferences > Network > Ethernet > Advanced > TCP/IP. Choose
"Manually" and enter the static IP and subnet mask.
Step 8: Once both computers have their static IP addresses configured, you can transfer files or set up a
network connection between them.

2. Connecting via Wi-Fi (Ad hoc Network):

Step 1: Ensure both computers have Wi-Fi capabilities.


Step 2: On one of the computers, create an ad hoc network:

On Windows: Go to Control Panel > Network and Sharing Center > Set up a new connection or network
> Set up a wireless ad hoc (computer-to-computer) network.
On macOS: Go to System Preferences > Network > Wi-Fi > Create Network.
Step 3: Give the ad hoc network a name and security passphrase (if required).
Step 4: On the other computer, search for available Wi-Fi networks, find the ad hoc network you created,
and connect to it using the passphrase.
Step 5: Once connected, you can share files and resources between the two computers.

3. Connecting via Bluetooth:

Step 1: Ensure both computers have Bluetooth capabilities and are set to discoverable mode.
Step 2: On one computer, search for nearby Bluetooth devices and select the other computer from the list.
Step 3: Pair the two computers by entering a PIN or following the on-screen instructions.
Step 4: After pairing, you can use Bluetooth to share files and perform other tasks between the two
computers.

4. Connecting with USB Transfer:

Step 1: Connect a USB transfer cable between the USB ports of both computers.
Step 2: Follow the on-screen instructions to establish a connection between the two computers.
Step 3: Alternatively, copy the files to a USB drive on one computer.
Step 4: Connect the USB drive to the other computer to transfer the files.

5. Connecting via Cloud Storage:

Step 1: Upload the files you want to share to a cloud storage service (e.g., Dropbox, Google Drive,
OneDrive) from Computer A.
Step 2: Access the same cloud storage account from Computer B.
Step 3: Download or share the files from the cloud storage account on Computer B.

8|Page
Bharat Bhatt 2K21CSUN01059 CSE – 5B

LAB : 2

Q1 - Write down the steps to make Crossover cable.

Ans1 - MATERIALS REQUIRED


o Unshielded twisted pair (UTP) patch cable
o Modular connector (8P8C plug)
o Crimping tool

T568A standard
Pin 1 White/green

Pin 2 Green

Pin 3 White/orange

Pin 4 Blue

Pin 5 White/blue

Pin 6 Orange

Pin 7 White/brown

Pin 8 brown

T568B standard
Pin 1 White/orange

Pin 2 Orange

Pin 3 White/green

Pin 4 Blue

Pin 5 White/blue

Pin 6 Green

Pin 7 White/brown

Pin 8 brown

STEPS
1. Strip the cable jacket about 1.5 inch down from both the ends.

9|Page
Bharat Bhatt 2K21CSUN01059 CSE – 5B

2. Spread the four twisted pairs wide apart .


3. Untwist the wire pairs and neatly align one end in T568A orientation and other end in
T568B orientation.
4. Cut the wires as straight as possible, about 0.5 inch above the end of the jacket.
5. Carefully insert the wires all the way into the modular connector, making sure that each wire
passes through the appropriate guides inside the connector.
6. Push the connector inside the crimping tool and squeeze the crimper all the way down.

Q2 - Write down the steps to make straight through cable.


Ans2 - MATERIALS REQUIRED

o Unshielded twisted pair (UTP) patch cable


o Modular connector (8P8C plug)
o Crimping tool

T568B standard
Pin 1 White/orange

Pin 2 Orange

Pin 3 White/green

Pin 4 Blue

Pin 5 White/blue

Pin 6 Green

Pin 7 White/brown

Pin 8 Brown

STEPS
1. Strip the cable jacket about 1.5 inches (3.81 cm) down from both ends of the UTP patch cable,
using a cable stripper or a sharp utility knife. Be careful not to cut the inner wires.
2. Gently spread apart and arrange the four twisted pairs of wires: white/orange, orange,
white/green, green, blue, white/blue, brown, white/brown.
3. Carefully untwist the wire pairs and neatly align the wires on one end of the cable according
to the T568B color code.
4. Trim the wires to an even length, leaving about 0.5 inches (1.27 cm) of exposed wire beyond the
cable jacket. Ensure that the wires are straight and evenly cut.
5. Insert the trimmed wires into the modular connector, pushing them all the way in until they
reach the end and the color-coded wires are aligned with the correct pins based on the T568B
standard.
6. Check the wires to make sure they are fully inserted and properly seated in the connector.

10 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B

11 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B

7. Place the connector into the crimping tool, ensuring that the connector's prongs are facing
down into the tool and the cable is properly aligned.
8. Squeeze the crimping tool handles firmly to crimp the connector onto the cable. Apply
enough pressure to ensure a secure connection, but avoid excessive force.
9. Release the crimping tool handles and carefully remove the newly crimped cable.
10. Repeat steps 3 to 9 for the other end of the cable, ensuring that the T568B color code is
followed consistently.
11. After both ends are crimped, visually inspect the connectors to confirm that all wires are
securely attached and that none of the wires are crossed or out of place.

LAB : 3

Q1. Write down the definition of these commands and paste the screenshot of these in commands in
command prompt

1. Ping :

Ping is a network utility used to test the reachability of a host (computer or server) on an Internet
Protocol (IP) network. It also measures the round-trip time for data packets to travel from the source to
the destination and back.

Command : ping [hostname or IP address]

ScreenShot :

Ping Website

12 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B

2. PathPing :

PathPing is a Windows command-line tool that combines features of ping and traceroute. It
provides information about network latency and packet loss along the entire route between the
source and the destination.

Command : pathping [hostname or IP address]

ScreenShot :

13 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B

3. Nslookup :

Nslookup (Name Server Lookup) is a command-line tool that queries DNS (Domain Name System)
servers to retrieve information about domain names, IP addresses, and other DNS records.

Command : nslookup [domain name or IP address]

ScreenShot :

4. Ipconfig :

Ipconfig (IP Configuration) is a command-line tool that displays the current IP configuration for all
network interfaces on a Windows computer.

Command : ipconfig

ScreenShot :

14 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B

5. Ipconfig /all :

This command extends the basic ipconfig command to display detailed information about all network
interfaces, including IP addresses, subnet masks, MAC addresses, and more.

Command : ipconfig /all

ScreenShot :

15 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B

6. Hostname :

Hostname is a command that displays the name of the computer or device on a network.

16 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B

Command : hostname

ScreenShot :

7. Getmac :

Getmac is a command-line tool that displays the MAC (Media Access Control) addresses of all network
interfaces on a Windows computer.

Command : getmac

ScreenShot :

8. Tracert :

Tracert (Traceroute) is a command-line tool used to trace the route that packets take from the source to
the destination, showing each hop along the way and measuring the time it takes to reach each hop.

Command : tracert [hostname or IP address]

ScreenShot :

17 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B

9. Netstat :

Netstat (Network Statistics) is a command-line tool that provides information about active network
connections, routing tables, interface statistics, masquerade connections, and more.

Command : netstat

ScreenShot :

10. Arp :

Arp (Address Resolution Protocol) is a command-line tool used to display and manipulate the ARP cache,
which maps IP addresses to MAC addresses on a local network.

Command : arp

ScreenShot :

18 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B

19 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B

LAB : 4

Design Different Types Of Topologies in CISCO Packet Tracer

MESH :

STAR :

20 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B

RING :

21 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B

BUS :

TREE :

22 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B

HYBIRD :

23 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B

LAB : 5

Switch Configuration

24 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B

25 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B

26 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B

27 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B

28 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B

LAB -06
VLAN

29 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B

30 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B

LAB -07
Connect 2 different networks using Router

31 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B

32 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B

33 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B

LAB -08

Connect 3 different network using empty router

34 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B

35 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B

36 | P a g e

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy