Networking Lab Manual All Experiments
Networking Lab Manual All Experiments
Tech
Experiment - 1: Study of Internal Parts of the System
Aim:
To study and identify internal hardware components of a computer system.
Apparatus (Software):
Computer system, Screwdriver set, Anti-static wrist strap.
Procedure:
1. Power off the system and unplug it.
2. Open the computer case using a screwdriver.
3. Identify components such as motherboard, RAM, CPU, hard drive, SMPS, etc.
4. Note down the specifications of each component.
5. Close the case and power on the system.
Result:
Successfully identified and studied the internal components of a computer system.
Experiment - 2: Study of Networking Devices in Detail
Aim:
Study of following Network Devices in Detail: Repeater, Hub, Switch, Bridge, Router,
Gateway.
Apparatus (Software):
No software or hardware needed.
Procedure:
6. Repeater: Functions at the Physical Layer. It receives a signal and retransmits it at a
higher power to extend its range.
7. Hub: Works at the Physical Layer (Layer 1). Connects multiple Ethernet devices and acts
as a single network segment.
8. Switch: Works at Data Link Layer (Layer 2), routes data between segments. Multilayer
switches can also operate at Layer 3.
9. Bridge: Connects network segments at Layer 2. Operates using IEEE 802.1D standard.
10. Router: Interconnects different networks. Routes packets based on IP addresses and
builds routing tables.
11. Gateway: Connects networks using different protocols. Performs protocol conversions
and other interoperability tasks.
Result:
Understood the function and roles of various networking devices.
Experiment - 3: Connect Computer in LAN
Aim:
To connect multiple computers in a Local Area Network (LAN).
Apparatus (Software):
Two or more computers, Ethernet cables, Switch/Hub, Network Interface Cards (NIC).
Procedure:
12. Connect each computer to the switch/hub using Ethernet cables.
13. Ensure each computer has a Network Interface Card installed.
14. Configure IP addresses on each computer within the same subnet.
15. Test connectivity using the 'ping' command from one computer to another.
Result:
Successfully established a LAN connection between computers.
Experiment - 4: CCTV Surveillance
Aim:
To study and understand the setup of a CCTV surveillance system.
Apparatus (Software):
CCTV camera, DVR/NVR, Monitor, Cables, Power supply.
Procedure:
16. Mount the CCTV camera at a desired location.
17. Connect the camera to DVR/NVR using coaxial/Ethernet cable.
18. Connect DVR/NVR to a power source and a display monitor.
19. Configure recording settings and camera view using DVR/NVR interface.
Result:
Understood the working and configuration of a CCTV surveillance system.
Experiment - 5: Configure Network Topologies
Aim:
To configure different types of network topologies (Star, Ring, Bus, Mesh).
Apparatus (Software):
Networking cables, Switches, Routers, Computers.
Procedure:
20. Star: Connect all devices to a central switch using Ethernet cables.
21. Ring: Connect devices in a closed loop where each device is connected to two others.
22. Bus: Connect all devices to a single central cable with terminators on both ends.
23. Mesh: Connect each device to every other device directly (full mesh) or to some devices
(partial mesh).
Result:
Configured and studied different types of network topologies.
Experiment - 6: Study of Byte Stuffing in Frame
Aim:
To understand the concept and implementation of byte stuffing in data frames.
Apparatus (Software):
No hardware required; theoretical demonstration or simulation software.
Procedure:
24. Identify special characters used for framing (e.g., FLAG, ESC).
25. Insert ESC character before any FLAG character found in the data.
26. Transmit the stuffed frame.
27. At the receiver, detect ESC characters and remove the stuffing accordingly.
Result:
Successfully demonstrated byte stuffing in data frames.
Experiment - 7: Study of Bit Stuffing in Frames
Aim:
To understand the process of bit stuffing in network communication.
Apparatus (Software):
No hardware required; theoretical demonstration or simulation software.
Procedure:
28. Define a bit pattern as a frame delimiter (e.g., 01111110).
29. Insert a '0' after every five consecutive '1's in the data.
30. At the receiver, remove the stuffed '0' after detecting five '1's.
31. Ensure data integrity and correct frame identification.
Result:
Successfully demonstrated the concept of bit stuffing.
Experiment - 8: Study of Character Stuffing in Frames
Aim:
To understand the concept of character stuffing in communication protocols.
Apparatus (Software):
No hardware required; theoretical demonstration or simulation software.
Procedure:
32. Identify control characters (e.g., DLE, STX, ETX) used to denote frame boundaries.
33. Insert DLE before any occurrence of these control characters in the data.
34. Transmit the stuffed character stream.
35. At the receiver, detect and remove DLE characters to retrieve original data.
Result:
Successfully demonstrated character stuffing in frame transmission.
Experiment - 9: Study of Cyclic Redundancy Check (CRC) in Data
Aim:
To study and implement CRC for error detection in data communication.
Apparatus (Software):
No hardware required; software implementation.
Procedure:
36. Choose a generator polynomial for CRC calculation.
37. Append zero bits equal to the length of the generator - 1 to the message.
38. Divide the message by the generator using modulo-2 division.
39. Append the remainder to the original message to form the transmitted frame.
40. At the receiver, divide the received message by the same generator and check for
remainder.
Result:
Successfully demonstrated CRC as an error-detection technique.