0% found this document useful (0 votes)
4 views10 pages

Networking Lab Manual All Experiments

The document outlines a Networking Lab Manual for B.Tech students, detailing various experiments aimed at understanding computer hardware, networking devices, LAN setup, CCTV systems, network topologies, and data communication techniques such as byte, bit, and character stuffing, as well as cyclic redundancy check (CRC). Each experiment includes an aim, necessary apparatus, a step-by-step procedure, and results indicating successful completion. The manual serves as a comprehensive guide for practical learning in networking and computer systems.

Uploaded by

kingenjoy122000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views10 pages

Networking Lab Manual All Experiments

The document outlines a Networking Lab Manual for B.Tech students, detailing various experiments aimed at understanding computer hardware, networking devices, LAN setup, CCTV systems, network topologies, and data communication techniques such as byte, bit, and character stuffing, as well as cyclic redundancy check (CRC). Each experiment includes an aim, necessary apparatus, a step-by-step procedure, and results indicating successful completion. The manual serves as a comprehensive guide for practical learning in networking and computer systems.

Uploaded by

kingenjoy122000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Networking Lab Manual - B.

Tech
Experiment - 1: Study of Internal Parts of the System

Aim:
To study and identify internal hardware components of a computer system.

Apparatus (Software):
Computer system, Screwdriver set, Anti-static wrist strap.

Procedure:
1. Power off the system and unplug it.
2. Open the computer case using a screwdriver.
3. Identify components such as motherboard, RAM, CPU, hard drive, SMPS, etc.
4. Note down the specifications of each component.
5. Close the case and power on the system.

Result:
Successfully identified and studied the internal components of a computer system.
Experiment - 2: Study of Networking Devices in Detail

Aim:
Study of following Network Devices in Detail: Repeater, Hub, Switch, Bridge, Router,
Gateway.

Apparatus (Software):
No software or hardware needed.

Procedure:
6. Repeater: Functions at the Physical Layer. It receives a signal and retransmits it at a
higher power to extend its range.
7. Hub: Works at the Physical Layer (Layer 1). Connects multiple Ethernet devices and acts
as a single network segment.
8. Switch: Works at Data Link Layer (Layer 2), routes data between segments. Multilayer
switches can also operate at Layer 3.
9. Bridge: Connects network segments at Layer 2. Operates using IEEE 802.1D standard.
10. Router: Interconnects different networks. Routes packets based on IP addresses and
builds routing tables.
11. Gateway: Connects networks using different protocols. Performs protocol conversions
and other interoperability tasks.

Result:
Understood the function and roles of various networking devices.
Experiment - 3: Connect Computer in LAN

Aim:
To connect multiple computers in a Local Area Network (LAN).

Apparatus (Software):
Two or more computers, Ethernet cables, Switch/Hub, Network Interface Cards (NIC).

Procedure:
12. Connect each computer to the switch/hub using Ethernet cables.
13. Ensure each computer has a Network Interface Card installed.
14. Configure IP addresses on each computer within the same subnet.
15. Test connectivity using the 'ping' command from one computer to another.

Result:
Successfully established a LAN connection between computers.
Experiment - 4: CCTV Surveillance

Aim:
To study and understand the setup of a CCTV surveillance system.

Apparatus (Software):
CCTV camera, DVR/NVR, Monitor, Cables, Power supply.

Procedure:
16. Mount the CCTV camera at a desired location.
17. Connect the camera to DVR/NVR using coaxial/Ethernet cable.
18. Connect DVR/NVR to a power source and a display monitor.
19. Configure recording settings and camera view using DVR/NVR interface.

Result:
Understood the working and configuration of a CCTV surveillance system.
Experiment - 5: Configure Network Topologies

Aim:
To configure different types of network topologies (Star, Ring, Bus, Mesh).

Apparatus (Software):
Networking cables, Switches, Routers, Computers.

Procedure:
20. Star: Connect all devices to a central switch using Ethernet cables.
21. Ring: Connect devices in a closed loop where each device is connected to two others.
22. Bus: Connect all devices to a single central cable with terminators on both ends.
23. Mesh: Connect each device to every other device directly (full mesh) or to some devices
(partial mesh).

Result:
Configured and studied different types of network topologies.
Experiment - 6: Study of Byte Stuffing in Frame

Aim:
To understand the concept and implementation of byte stuffing in data frames.

Apparatus (Software):
No hardware required; theoretical demonstration or simulation software.

Procedure:
24. Identify special characters used for framing (e.g., FLAG, ESC).
25. Insert ESC character before any FLAG character found in the data.
26. Transmit the stuffed frame.
27. At the receiver, detect ESC characters and remove the stuffing accordingly.

Result:
Successfully demonstrated byte stuffing in data frames.
Experiment - 7: Study of Bit Stuffing in Frames

Aim:
To understand the process of bit stuffing in network communication.

Apparatus (Software):
No hardware required; theoretical demonstration or simulation software.

Procedure:
28. Define a bit pattern as a frame delimiter (e.g., 01111110).
29. Insert a '0' after every five consecutive '1's in the data.
30. At the receiver, remove the stuffed '0' after detecting five '1's.
31. Ensure data integrity and correct frame identification.

Result:
Successfully demonstrated the concept of bit stuffing.
Experiment - 8: Study of Character Stuffing in Frames

Aim:
To understand the concept of character stuffing in communication protocols.

Apparatus (Software):
No hardware required; theoretical demonstration or simulation software.

Procedure:
32. Identify control characters (e.g., DLE, STX, ETX) used to denote frame boundaries.
33. Insert DLE before any occurrence of these control characters in the data.
34. Transmit the stuffed character stream.
35. At the receiver, detect and remove DLE characters to retrieve original data.

Result:
Successfully demonstrated character stuffing in frame transmission.
Experiment - 9: Study of Cyclic Redundancy Check (CRC) in Data

Aim:
To study and implement CRC for error detection in data communication.

Apparatus (Software):
No hardware required; software implementation.

Procedure:
36. Choose a generator polynomial for CRC calculation.
37. Append zero bits equal to the length of the generator - 1 to the message.
38. Divide the message by the generator using modulo-2 division.
39. Append the remainder to the original message to form the transmitted frame.
40. At the receiver, divide the received message by the same generator and check for
remainder.

Result:
Successfully demonstrated CRC as an error-detection technique.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy