CN Lab_file
CN Lab_file
COMPUTER
NETWORKS
LABFILE
1|Page
Bharat Bhatt 2K21CSUN01059 CSE – 5B
Index
Sno. Topic Signature
1. Lab-1 Different types of wires& the
steps for making straight through cable
and crossover cable
2|Page
Bharat Bhatt 2K21CSUN01059 CSE – 5B
LAB : 1
Q1 - What are the different types of cables in computer networks. Write the working advantages
and disadvantages of each And differentiate them.
COAXIAL CABLES
ARCHITECTURE
It has a solid copper conductor at its centre located coaxially within a cylindrical outer conductor.
A plastic layer provides insulation between the centre conductor and the outer braided
metal shield.
Outer conductor acts as a shield against noise and crosstalk.
Whole cable protected by a plastic cover and outer conductor is enclosed in an insulated sheath.
Distance between the outer conductor and inner conductor plus the type of material used
for insulating the inner conductor determine the cable properties or impedance.
WORKING
Coaxial cable works by carrying data in the centre conductor, while the surrounding layers of
shielding stop any signal loss (also called attenuation loss) and help reduce EMI.
The first layer, called the dielectric, provides distance between the core conductor and the
outer layers, as well as some insulation.
The next layers, collectively referred to as the shield, keep electrical impulses and
radio transmissions out.
ADVANTAGES
Inexpensive
Easy to wire and install
Easy to expand
Good resistance to EMI
Up to 10Mbps capacity
3|Page
Bharat Bhatt 2K21CSUN01059 CSE – 5B
Durable
Can be installed next to metal objects without losing power
DISADVANTAGES
A single cable failure can take down an entire network
ARCHITECTURE
Fiber optic technology relies on the fact that it is possible to send a light beam along a thin fibre
suitably constructed.
A fiber optic cable consists of a glass or silica core. The core of the optical fibre is surrounded by
a similar material, i.e. glass or silica, called the cladding, that has a refractive index that is slightly
lower than that of the core.
It is found that even when the cladding has a slightly higher refractive index, the light passing
down the core undergoes total internal reflection, and it is thereby contained within the core of
the optical fiber.
The Outside the cladding there is placed a plastic jacket. This is used to provide protection to the
optical fiber itself.
In addition to this, optical fibers are usually grouped together in bundles and these are protected
by an overall outer sheath. This not only provides further protection but also serves to keep the
optical fibers together
WORKING
Light travels down a fiber optic cable by bouncing off the walls of the cable repeatedly.
Each light particle (photon) bounces down the pipe with continued internal mirror-like reflection.
The light beam travels down the core of the cable. The core is the middle of the cable and the
glass structure.
The cladding is another layer of glass wrapped around the core. Cladding is there to keep the
light signals inside the core.
ADVANTAGES
4|Page
Bharat Bhatt 2K21CSUN01059 CSE – 5B
Greater bandwidth
Low power loss
Thinner and lighter than metal wires
Security
Cheaper
DISADVANTAGES
Difficult to splice
Expensive to install
Highly susceptible
Cant be curved
ARCHITECTURE
A twisted pair cable comprises of two separate insulated copper wires, which are twisted together and run
in parallel. The copper wires are typically 1mm in diameter. One of the wires is used to transmit data and
the other is the ground reference.
WORKING
Compared to a single conductor or an untwisted balanced pair, a twisted pair reduces electromagnetic
radiation from the pair and crosstalk between neighboring pairs and improves rejection of external
electromagnetic interference. It was invented by Alexander Graham Bell
5|Page
Bharat Bhatt 2K21CSUN01059 CSE – 5B
ADVANTAGES
Twisted pair cable is very flexible so it is really easy to work with. It is also less expensive than coaxial
cabling. The reason why twisted pair became so popular and widely implemented is because networking
protocols and standards were designed to support twisted pair wiring.
DISADVANTAGES
There are some disadvantages like the casing, the sheath around the twisted pair networking cabling
which is relatively thin. It doesn’t have second insulator like coaxial cabling has. It is also a bit
more susceptible to electromagnetic interference.
COMPARISON
Transmission of signals takes Transmission of signals takes Signal transmission takes place
place in the electrical form place in the electrical form in an optical forms over a glass
over the metallic conducting over the inner conductor of the fibre
wires cable
In this medium the noise Coaxial having higher noise Optical fibre has highest noise
immunity is low immunity than twisted pair immunity as the light rays are
cable unaffected by the electrical
noise
Can be affected due to external Less affected due to external Not affected by the external
magnetic field magnetic field magnetic field
6|Page
Bharat Bhatt 2K21CSUN01059 CSE – 5B
Ans2 - There are several ways to connect two computers, allowing them to share files, resources, or
establish communication. Here are some common methods:
3. Bluetooth:
If both computers have Bluetooth capabilities, you can use Bluetooth to establish a connection between
them.
Enable Bluetooth on both computers and set them to discoverable mode.
Pair the two computers by searching for nearby Bluetooth devices and selecting the other computer from
the list.
After pairing, you can use Bluetooth to share files and perform other tasks between the two computers.
4. USB Transfer:
If you only need to transfer files between the two computers, you can use a USB transfer cable or a USB
drive.
Connect the USB transfer cable to the USB ports of both computers and follow the on-screen instructions
to establish a connection.
Alternatively, you can copy the files to a USB drive on one computer and then connect the USB drive to
the other computer to transfer the files.
5. Cloud Storage:
Upload the files you want to share to a cloud storage service (e.g., Dropbox, Google Drive, OneDrive).
Access the same cloud storage account from both computers to download or share the files.
Remember that the method you choose may depend on the type of files you want to transfer, the distance
between the computers, and the available hardware and software on the computers. Choose the method
that best suits your needs and the resources you have at hand.
Ans3 - To connect two computers, you can use an Ethernet cable, Wi-Fi (ad hoc network), Bluetooth,
USB transfer, or cloud storage. Here are the step-by-step instructions for each method:
7|Page
Bharat Bhatt 2K21CSUN01059 CSE – 5B
On Windows: Go to Control Panel > Network and Sharing Center > Set up a new connection or network
> Set up a wireless ad hoc (computer-to-computer) network.
On macOS: Go to System Preferences > Network > Wi-Fi > Create Network.
Step 3: Give the ad hoc network a name and security passphrase (if required).
Step 4: On the other computer, search for available Wi-Fi networks, find the ad hoc network you created,
and connect to it using the passphrase.
Step 5: Once connected, you can share files and resources between the two computers.
Step 1: Ensure both computers have Bluetooth capabilities and are set to discoverable mode.
Step 2: On one computer, search for nearby Bluetooth devices and select the other computer from the list.
Step 3: Pair the two computers by entering a PIN or following the on-screen instructions.
Step 4: After pairing, you can use Bluetooth to share files and perform other tasks between the two
computers.
Step 1: Connect a USB transfer cable between the USB ports of both computers.
Step 2: Follow the on-screen instructions to establish a connection between the two computers.
Step 3: Alternatively, copy the files to a USB drive on one computer.
Step 4: Connect the USB drive to the other computer to transfer the files.
Step 1: Upload the files you want to share to a cloud storage service (e.g., Dropbox, Google Drive,
OneDrive) from Computer A.
Step 2: Access the same cloud storage account from Computer B.
Step 3: Download or share the files from the cloud storage account on Computer B.
8|Page
Bharat Bhatt 2K21CSUN01059 CSE – 5B
LAB : 2
T568A standard
Pin 1 White/green
Pin 2 Green
Pin 3 White/orange
Pin 4 Blue
Pin 5 White/blue
Pin 6 Orange
Pin 7 White/brown
Pin 8 brown
T568B standard
Pin 1 White/orange
Pin 2 Orange
Pin 3 White/green
Pin 4 Blue
Pin 5 White/blue
Pin 6 Green
Pin 7 White/brown
Pin 8 brown
STEPS
1. Strip the cable jacket about 1.5 inch down from both the ends.
9|Page
Bharat Bhatt 2K21CSUN01059 CSE – 5B
T568B standard
Pin 1 White/orange
Pin 2 Orange
Pin 3 White/green
Pin 4 Blue
Pin 5 White/blue
Pin 6 Green
Pin 7 White/brown
Pin 8 Brown
STEPS
1. Strip the cable jacket about 1.5 inches (3.81 cm) down from both ends of the UTP patch cable,
using a cable stripper or a sharp utility knife. Be careful not to cut the inner wires.
2. Gently spread apart and arrange the four twisted pairs of wires: white/orange, orange,
white/green, green, blue, white/blue, brown, white/brown.
3. Carefully untwist the wire pairs and neatly align the wires on one end of the cable according
to the T568B color code.
4. Trim the wires to an even length, leaving about 0.5 inches (1.27 cm) of exposed wire beyond the
cable jacket. Ensure that the wires are straight and evenly cut.
5. Insert the trimmed wires into the modular connector, pushing them all the way in until they
reach the end and the color-coded wires are aligned with the correct pins based on the T568B
standard.
6. Check the wires to make sure they are fully inserted and properly seated in the connector.
10 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B
11 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B
7. Place the connector into the crimping tool, ensuring that the connector's prongs are facing
down into the tool and the cable is properly aligned.
8. Squeeze the crimping tool handles firmly to crimp the connector onto the cable. Apply
enough pressure to ensure a secure connection, but avoid excessive force.
9. Release the crimping tool handles and carefully remove the newly crimped cable.
10. Repeat steps 3 to 9 for the other end of the cable, ensuring that the T568B color code is
followed consistently.
11. After both ends are crimped, visually inspect the connectors to confirm that all wires are
securely attached and that none of the wires are crossed or out of place.
LAB : 3
Q1. Write down the definition of these commands and paste the screenshot of these in commands in
command prompt
1. Ping :
Ping is a network utility used to test the reachability of a host (computer or server) on an Internet
Protocol (IP) network. It also measures the round-trip time for data packets to travel from the source to
the destination and back.
ScreenShot :
Ping Website
12 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B
2. PathPing :
PathPing is a Windows command-line tool that combines features of ping and traceroute. It
provides information about network latency and packet loss along the entire route between the
source and the destination.
ScreenShot :
13 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B
3. Nslookup :
Nslookup (Name Server Lookup) is a command-line tool that queries DNS (Domain Name System)
servers to retrieve information about domain names, IP addresses, and other DNS records.
ScreenShot :
4. Ipconfig :
Ipconfig (IP Configuration) is a command-line tool that displays the current IP configuration for all
network interfaces on a Windows computer.
Command : ipconfig
ScreenShot :
14 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B
5. Ipconfig /all :
This command extends the basic ipconfig command to display detailed information about all network
interfaces, including IP addresses, subnet masks, MAC addresses, and more.
ScreenShot :
15 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B
6. Hostname :
Hostname is a command that displays the name of the computer or device on a network.
16 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B
Command : hostname
ScreenShot :
7. Getmac :
Getmac is a command-line tool that displays the MAC (Media Access Control) addresses of all network
interfaces on a Windows computer.
Command : getmac
ScreenShot :
8. Tracert :
Tracert (Traceroute) is a command-line tool used to trace the route that packets take from the source to
the destination, showing each hop along the way and measuring the time it takes to reach each hop.
ScreenShot :
17 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B
9. Netstat :
Netstat (Network Statistics) is a command-line tool that provides information about active network
connections, routing tables, interface statistics, masquerade connections, and more.
Command : netstat
ScreenShot :
10. Arp :
Arp (Address Resolution Protocol) is a command-line tool used to display and manipulate the ARP cache,
which maps IP addresses to MAC addresses on a local network.
Command : arp
ScreenShot :
18 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B
19 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B
LAB : 4
MESH :
STAR :
20 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B
RING :
21 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B
BUS :
TREE :
22 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B
HYBIRD :
23 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B
LAB : 5
Switch Configuration
24 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B
25 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B
26 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B
27 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B
28 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B
LAB -06
VLAN
29 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B
30 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B
LAB -07
Connect 2 different networks using Router
31 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B
32 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B
33 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B
LAB -08
34 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B
35 | P a g e
Bharat Bhatt 2K21CSUN01059 CSE – 5B
36 | P a g e