Anda di halaman 1dari 26

Global Nature Care Sangathan’s Group of

Institutions
Department of Computer Science & Engineering

CS 604: Computer Network


Lab Plan

Week # Lab Content Deliverables Tool

Week 1 Study of different types of


network Topologies.
Week 2 Study of different types of
network cables and practical
implement the cross-wired
cable and straight through
cable using crimping tool.
Week 3 Building a peer to peer
network.
Week 4 Connect the computers in
LAN.
Week 5 Study and configuration of
Routers.
Week 6 Simulation of Static Routing
Protocol.
Week 7 Simulation of RIP Protocol.

Week 8 Study of Pure and Slotted


Aloha.
Lab 1: <Experiment/Topic >

Objectives
 Study of different types of network Topologies.

Network topology specifically refers to the physical layout of the network,


especially the locations of the computers and how the cable is run between
them.
Four most common topologies are:
 Bus
 Star
 Ring
 Mesh

Bus Topology:

Bus topologies
All the devices on a bus topology are connected by one single cable. When
one computer sends a signal up the wire, all the computers on the network
receive the information, but only one accepts the information. The rest
regrets the message. One computer can send a message at a time. A
computer must wait until the bus is free before it can transmit. When the
signal reaches the end of the wire, it bounces back and travels back up the
wire. When a signal echoes back and forth along an unterminated bus, it is
called ringing. To stop the signals from ringing, attach terminators at either
end of the segment. The terminators absorb the electrical energy and stop the
reflection.
Advantages and disadvantages of network topology:
 advantage of network topology
1. The bus is simple, reliable in small network, easy to use and
understand
2. Requires the least amount of cable to connect the computers
and less expensive
3. Easy to extend the bus
 Disadvantage of network topology
1. Heavy network traffic can slow a bus considerably
2. Each barrel connector weakens the electrical signal
3. Difficult to troubleshoot a bus
Star Topology:

Star Topology
All the cables run from the computers to a central location, where they are
all connected by a device called a hub. Each computer on a star network
communicates with a central hub that resends the message either to all the
computers or only to the destination computers. Hub can be active or
passive in the star network Active hub regenerates the electrical signal and
sends it to all the computers connected to it. Passive hub does not amplify or
regenerate signal and does not require electrical power to run. We can
expand a star network by placing another star hub.

Advantages:
 Easy to modify and add new computers to a star net
 Center of a star net is a good place to diagnose network faults
 Single computer failure do not necessarily bring down the whole net
 Several cable types can be used with the hub
Disadvantages:
 Central hub fails, the whole network fails to operate
 Many star networks require a device at the central point to
rebroadcast or switch network traffic.
 Costs more for cabling in star net than bus.
Ring Topology:

Ring Topology
Each computer is connected to the next computer, with the last one
connected to the first. Every computer is connected to the next computer
in the ring, and each retransmits what it receives from the previous
computer. The message flow around the ring in one direction. Some ring
networks do token passing. It passes around the ring until a computer wishes
to send information to another computer. The computer adds an electronic
address and data and sends it around the ring. Each computer in sequence
receives the token and the information and passes them to the next until
either the electronic address matches the address of the computer or the
token returns to the origin. The receiving computer returns a message to the
originator indicating that the message has been received. The sending
computer then creates another token and places it on the network, allowing
another station to capture the token and being transmitted.
Advantages:
 No computer can monopolize the network
 The fair sharing of the network allows the net to degrade gracefully
as more users are added.
Disadvantages:
 Failure of one compute can affect the total network
 Difficult to troubleshoot
 Adding or removing Computers disrupts the network
Mesh Topology:

Mesh Topology
The mesh topology connects all devices (nodes) to each other for
redundancy and fault tolerance. It is used in WANs to interconnect LANs
and for mission critical networks like those used by banks and financial
institutions. Implementing the mesh topology is expensive and difficult.
Advantages:
 Fault tolerance
 Guaranteed communication channel capacity
 Easy to troubleshoot
Disadvantages:
 Difficulty of installation and reconfiguration
 Cost of maintaining redundant link
Lab 1: <Experiment/Topic >

Objectives
 Study of different types of network cables and practical implement the
cross-wired cable and straight through cable using crimping tool.

Steps to make a straight through Ethernet cable:


1) Cut a piece of cable to the length you will need. Give a little extra to make
room for mistakes.
2) Strip a half inch to an inch of the outer jacket away from the cable. If you use
strippers make sure not to nick the wire pairs and expose the copper, this could
introduce crosstalk onto your wires. I prefer to use a scissor and my fingers to
tear away the jacket. Then I cut with the scissors to clean up the edge.

3) Now you need to untwist the wire pairs (not too much, only undo one or two
twists) so you can align them according to the EIA-TIA568B wire color
sequence. I use my fingers to straighten the wires by bending them back and
forth, straightening them as they warm up.

EIA-TIA 568B Standard


1 2 3 4 5 6 7 8

white/green green white/orange blue white/blue orange white/brown brown

4) Now holding an RJ-45 connector with the tab side facing down, push the 8
wires into the connector, sliding each wire into a groove. While holding the
connector tab side down the white/orange wire should be on the far left and
the brown wire should be on the far right. It is very important that the
wires push all the way up and into the connector so that when the pins are
pushed down during crimping they will make contact with the wires. The
sleave or jacket of the cable (light blue below) should also be pushed in as far
as it can go so it will be held in place once crimped. You may want to pull the
wires out and put them back in to make sure they are sliding in correctly, this
will also further straighten the wires.
Notice the tab make sure it is facing down push the wires and sleave into the
connector

5) Before crimping, examine the cable and connector from the side. Did the wires
slide all the way up in to the proper grooves? Are the colors in the proper order
when observed from tab side down? Did the jacket slide all the way into the
connector? If not, you may need pull the cable out of the connector, trim the
wires or the jacket accordingly, and reinsert.
6) If everything looks good, using your crimper tool insert the connector and
cable into the 8 wire slot and press down tightly. This will cause a piece of
plastic in the connector to press down on the jacket and hold the cable in the
connector preventing it from accidentally pulling out. Crimping also forces
copper pins in the connector to push down and make contact with the separate
wires.

You are now finished terminating one end of the cable. Repeat the process on

the other end of the cable and when you are done, insert the cable into a cable

tester and run a wire test to make sure that none of the wires are accidentally

crossed, by not being in the right order, or open by not touching the connector

7) Lastly, test your cable by using it on your network. Attach the cable to your
computer's NIC and the other end to your switch. Do you see green lights?
Open the Network Connections dialogue box in Windows, does it show a
properly enabled and active connection on the NIC. You can also look for the
status in your system tray network connections icon. If you have an internet
connection, can you browse the web? If not can you ping your gateway from a
command prompt?
Steps to make a Crossover Ethernet cable:
Same as straight through only sequence of cables are as follows-

At one end

1 2 3 4 5 6 7 8

white/green green white/orange blue white/blue orange white/brown brown

At second end

1 2 3 4 5 6 7 8

white/orange orange white/green blue white/blue green white/brown brown


Lab 3: <Experiment/Topic >

Objectives
 Building a Peer to Peer network.

Background/Preparation
This lab focuses on the ability to connect two PCs to create a simple peer-to-peer
Ethernet \ LAN between two workstations. The workstations will be directly connected
to each other without using a hub or switch. In addition to the Layer 1 physical and
Layer2 data link connections, the computers
must also be configured with the correct IP network settings, which is Layer 3, so that
they can communicate. A basic CAT 5/5e UTP crossover cable is all that is needed. A
crossover cable is the same type that would be used as backbone or vertical cabling to
connect switches together.
Connecting the PCs in this manner can be very useful for transferring files at high speed
and for troubleshooting interconnecting devices between PCs. If the two PCs can be
connected with a single cable and are able to communicate, then any networking
problems are not with the PCs themselves. Start this lab with the equipment turned off
and with cabling disconnected. Work in teams of two with one person per PC. The
following resources will be required:
-Two workstations with an Ethernet 10/100 NIC installed
-Several Ethernet cables, which are both straight through and crossover, to choose from
for connecting the two workstations

Step1 Identify the proper Ethernet cable and connect the two PCs

a. The connection between two PCs will be accomplished using a cat 5 or 5e


crossover cable. Locate a cable that is long enough to reach from one PC to
the other and attach one end to the NIC in each of the PCs be sure to examine
the cable ends carefully and select only a crossover cable.
b. What kind of cable is required to connect from NIC to NIC.?
c. What is the category rating of cable?

Step 2 Verify the physical connection

Plug in and turn on the computers to verify the computer connection insure that the
link lights on both NICs are lit. Are both link lights lit.?

Step 3 Access the IP settings window


Note: Be sure to write down the existing IP settings, so that they can be restored at
the end of the lab. These include IP address, subnet mask, default gateway, and
DNS servers. If the workstation is a DHCP client, it is not necessary to record this
information.
Windows 95 / 98 / Me/ users should do the following:
Click on Start > Settings > Control Panel and then click the Network icon.
Select the TCP/IP protocol icon that is associated with the NIC in this PC
and click on Properties.
Click on the IP Address tab and the Gateway tab.

Windows NT / 2000 users should do the following:


Click on Start > Settings > Control Panel and then open the
Network and Dialup connection folder
Click ad open the Local Area Connection icon.
Select the TCP/IP protocol icon that is associated with the NIC in this PC.
Click on Properties and click on Use the following IP address.

Windows XP users should do the following:


Click on Start > Settings > Control Panel and then click the Network Connection icon.
Select the Local Area Network Connection and click on Change settings of this
connection.
Select the TCP/IP protocol icon that is associated with the NIC in this PC.
Click on Properties and click on Use the following IP address.

See the example below:


Step 4 Configure TCP/IP settings for the two PCs
a. Set the IP address information for each PC according to the information in the table.
b. Note that the default gateway IP address is not required, since these computers are
directly connected. The default gateway is only required on local area networks that are
connected to a router.

Computer IP Address Subnet mask Default Gateway

PC – A 192.168.1.1 255.255.255.0 Not Required

PC – B 192.168.1.2 255.255.255.0 Not Required

Step 5 Access the Command or MS-DOS prompt


Use the Start menu to open the Command Prompt (MS DOS)
Windows.
Windows 95 / 98 / Me users should do the following:
Start > Programs > MS-DOS Prompt
Windows NT / 2000 users should do the following:
Start > Programs > Accessories > Command Prompt
Windows XP users should do the following:
Start > Programs > Accessories > Command Prompt

Step 6 Verify that the PCs can communicate


Test connectivity from one PC to the other by pinging the IP address of the opposite computer.
Use the following command at the command prompt.
C:>ping 192.168.1.1 (or 192.168.1.2)
b. Look for results similar to those shown below. If not, check the PC
connections and TCP/IP settings for both PCs. What was the ping result?
Step 7 Confirm the TCP/IP network settings

Windows 95 / 98 / Me users should do the following:


c. Type the winipcfg command from the MS-DOS Prompt. Record the results.
Windows NT / 2000 / XP users should do the following:
d. Type the ipconfig command from the Command Prompt. Record the results.

Step 8 Restore the PCs to their original IP settings, disconnect the


equipment, and store the cables
Lab 4: <Experiment/Topic >

Objectives
 Connect the computers in LAN.

On the host computer, follow these steps to share the internet connection.

Step1: Log on the client computer as administrator.


Step2: click start and then click on control panel.
Step3: Click network and internet connection.
Step4: Right click the connection that we have to connect to the internet.
Step5: Click properties and then click advance tab.
Step6: Under internet connection on the Advanced tab, select the Allow other network

users to connect through this computer's Internet connection check box.


Step7: If you want this connection to dial automatically when another computer on
your
home or small office network attempts to access external resources, select
the Establish a dial-up connection whenever a computer on my network attempts
to access the Internet check box.
Step8: Click the ok button. You receive the following message when internet
connection sharing a cable. An adapter will be set to use IP address 192.168.0.1
to your computer automatically. Are you sure you want to enable internet
connection sharing.
Step9: Click yes.

On the Client computer, to connect to internet by using the shared connection you must
confirm the LAN adapter IP configuration and then configure the client computer to
confirm LAN adapter IP.

Step1: log on the client computer as administrator or owner.


Step2: click start and then click on control panel.
Step3: Click network and internet connection.
Step4: click the general tab; click internet protocol TCP/IP in the connection user.
Step5: Click properties dialog or click obtain IP address automatically.
Step6: IP address 192.168.51.202
Step7: Subnet 255.255.255.0
Step8: default 192.168.31.1.
Step9: In the LAN properties dialog box click OK.
Step10: Quit control panel.
Lab 5: <Experiment/Topic >

Objectives
 Study and configuration of Routers.

1.) Bring the Router to Privileged EXEC mode


Router>enable
2.) Change to global configuration level giving the user access to change the
configuration of the router.
Router# configure terminal
3.) Switch to Configure the serial0/0 interface
Command : interface <interface type>
Router(config)# interface serial0/0
4.)Configure an IP address 10.1.1.2 and Subnet mask of 255.0.0.0
Command : ip address <ip address> <subnet mask>
Router(config-if)# IP address 10.1.1.2 255.0.0.0
5.)Activate serial0/0 interface.
Command : no shutdown
Router(config-if)# no shutdown
6.)Exit back to global configuration level.
Router(config-if)# exit
7.)Configure the serial0/1 interface
Command : interface <interface type>
Router(config)# interface serial0/1
8.)Configure IP address 20.1.1.1 with subnetmask of 255.0.0.0 on serial0/1
interface.
Command : ip address <ip address> <subnet mask>
Router(config-if)# ip address 20.1.1.1 255.0.0.0
9.)Activate serial0/1 interface
Command : no shutdown
Router(config-if)# no shutdown
10.)Exit back to global configuration level
Router(config-if)# exit

Lab 6: <Experiment/Topic >

Objectives
 Simulation of Static Routing.

Configuring router R0

R0>enable
R0# configure terminal
R0(config)# interface serial0/0
R0(config-if)# IP address 10.1.1.1 255.0.0.0
R0 (config-if)# no shutdown
R0 (config-if)# exit

Configuring static route on R0

R0(config)#ip route 20.0.0.0 255.0.0.0 10.1.1.2

R0(config)#ip route 30.0.0.0 255.0.0.0 10.1.1.2

Configuring router R1

R1>enable
R1# configure terminal
R1(config)# interface serial0/0
R1(config-if)# IP address 10.1.1.2 255.0.0.0
R1 (config-if)# no shutdown
R1 (config-if)# exit
R1 (config)# interface serial0/1
R1 (config-if)# ip address 20.1.1.1 255.0.0.0
R1 (config-if)# no shutdown
R1 (config-if)# exit

NOTE: Repeat for rest of Routers present in topology


Lab 7: <Experiment/Topic >

Objectives
 Simulation of RIP.

Configuring router R0

R0>enable
R0# configure terminal
R0(config)# interface serial0/0
R0(config-if)# IP address 10.1.1.1 255.0.0.0
R0 (config-if)# no shutdown
R0 (config-if)# exit

NOTE: Repeat configuration for rest of Routers present in topology

Configuring RIP on R0

R0(config)#router rip
R0(config-router)#version 2
R0(config-router)#network 10.0.0.0
R0(config-router)#network 20.0.0.0
R0(config-router)#network 30.0.0.0

NOTE: Repeat RIP configuration for rest of Routers present in topology


Lab 8: <Experiment/Topic >

Objectives
 Study of Pure and Slotted Aloha.

ALOHA: ALOHA is a system for coordinating and arbitrating access to a shared


communication Networks channel. It was developed in the 1970s by Norman Abramson
and his colleagues at the University of Hawaii. The original system used for ground
based radio broadcasting, but the system has been implemented in satellite
communication systems.
Aloha is a multiple access protocol at the datalink layer and proposes how multiple
terminals access the medium without interference or collision. In 1972 Roberts
developed a protocol that would increase the capacity of aloha two fold. The Slotted
Aloha protocol involves dividing the time interval into discrete slots and each slot
interval corresponds to the time period of one frame. This method requires
synchronization between the sending nodes to prevent collisions.

There are two different versions /types of ALOHA:


(i) Pure Aloha
(ii) Slottecl ALOHA

(i) Pure ALOHA

• In pure ALOHA, the stations transmit frames whenever they have data to send.

• When two or more stations transmit simultaneously, there is collision and the frames
are destroyed.

• In pure ALOHA, whenever any station transmits a frame, it expects the


acknowledgement from the receiver.

• If acknowledgement is not received within specified time, the station assumes that the
frame (or acknowledgement) has been destroyed.

• If the frame is destroyed because of collision the station waits for a random amount of
time and sends it again. This waiting time must be random otherwise same frames will
collide again and again.

• Therefore pure ALOHA dictates that when time-out period passes, each station must
wait for a random amount of time before resending its frame. This randomness will help
avoid more collisions.
• Figure shows an example of frame collisions in pure ALOHA.

• In fig there are four stations that .contended with one another for access to shared
channel. All these stations are transmitting frames. Some of these frames collide because
multiple frames are in contention for the shared channel. Only two frames, frame 1.1 and
frame 2.2 survive. All other frames are destroyed.

• Whenever two frames try to occupy the channel at the same time, there will be a
collision and both will be damaged. If first bit of a new frame overlaps with just the last
bit of a frame almost finished, both frames will be totally destroyed and both will have to
be retransmitted.

(ii) Slotted ALOHA

• Slotted ALOHA was invented to improve the efficiency of pure ALOHA as chances of
collision in pure ALOHA are very high.

• In slotted ALOHA, the time of the shared channel is divided into discrete intervals
called slots.

• The stations can send a frame only at the beginning of the slot and only one frame is
sent in each slot.
• In slotted ALOHA, if any station is not able to place the frame onto the channel at the
beginning of the slot i.e. it misses the time slot then the station has to wait until the
beginning of the next time slot.

• In slotted ALOHA, there is still a possibility of collision if two stations try to send at
the beginning of the same time slot as shown in fig.

• Slotted ALOHA still has an edge over pure ALOHA as chances of collision are reduced
to one-half.
Lab 9: <Experiment/Topic >

Objectives
 Study of IPV4 Datagram.

Internet Protocol version 4 (IPv4) is the fourth revision in the development of


the Internet Protocol (IP) and it is the first version of the protocol to be widely deployed.
IPv4 is a data-oriented protocol to be used on packet
switched internetwork (e.g., Ethernet). It is a best effort delivery protocol in that it does
not guarantee delivery, nor does it assure proper sequencing, or avoid duplicate delivery.
These aspects are addressed by an upper layer protocol (e.g.TCP, and partly by UDP).
IPv4 does, however, provide data integrity protection through the use of packet
checksums.

Header Contents
Version

Version of the IP protocol which determines how to interpret the header. Currently the
only permitted values are 4 (0100) or 6 (0110). The header format shown here is valid
for IPv4 only.

HL

Length of header as a number of 32-bit words

Type of service

This field is often ignored by current routers but is meant to allow traffic to be prioritized
(among other things).
Total Length

The length of the entire datagram including header and data: maximum permitted it
65,535 bytes or 64K.

Identification, Flags and Fragment Offset

These values allow datagram to be fragmented for transmission and reassembled at the
destination

Time to live

An integer which is decremented at each router "hop"; supposed to be interpreted as a


number of seconds but more often treated as a "hop count". If the value reaches zero the
datagram is discarded and an ICMP message is sent to the source host.

Protocol

Identifies the transport-layer protocol which will interpret the Data section. This will
typically be TCP or UDP but other values are possible. Protocols are identified by a
unique number as listed in an online database at www.iana.org.

Header checksum

This is used to verify the header, and is recomputed at each router hop. This field is left
out of IPv6 which relies on the transport layer for verification.

Addresses and Options

These are 32-bit IP addresses which identify the network and host address. Note that IP
does not have to specify addresses of any intermediate nodes; this can be left to the
router. Routing requirements can also be specified in the Options field, along with
options to do with security and debugging.
Lab 10: <Experiment/Topic >

Objectives
 Study of Session Layer Protocols (PAP, SCP, H.254).

Printer Access Protocol (PAP)

The PAP maintains communications between a workstation and a printer or print service.
The PAP functions include setting up and maintaining a connection, transferring the data,
and tearing down the connection on completion of the job. Like other protocols at the
session layer, PAP relies on NBP to find the addresses of named entities. PAP also
depends on ATP for sending data. The Printer Access Protocol (PAP) manages the virtual
connection to printers and other servers. PAP is used to convey connection status and
coordinate data transfer. PAP frames can contain the following parameters:

Connection ID
Reference code used to identify the PAP connection.

ATP responding socket


ATP socket number used for PAP status and data transfers.

Maximum buffer size


Maximum amount of data in bytes that the protocol can send in response to each [send
data request] (also known as the Flow Quantum).

Wait time
Length of time that a workstation waits for a connection.

Sequence number
Used in send data request frames to maintain data order.

EOF
End-of-file indicator. Used to indicate the end of a data transfer.

Result
Result code indicating the outcome of an [open connection rqst]:
0000 Connect OK.
FFFF Printer busy.

Status
Status message returned by status and open connection reply frames.
H.245: Control Protocol for Multimedia Communication

H.245 is line transmission of non-telephone signals. It includes receiving and


transmitting capabilities as well as mode preference from the receiving end, logical
channel signaling, and Control and Indication. Acknowledged signaling procedures are
specified to ensure reliable audiovisual and data communication. H.245 is capable of
conveying information needed for multimedia communication, such as encryption, flow
control, jitter management, preference requests, as well as the opening and closing of
logical channels used to carry media streams. It also defines
separate send and receives capabilities and the means to send these details to other
devices that support H.323. The H.245 control messages are carried over H.245 control
channels. The H.245 control channel is the logical channel 0 and is permanently open,
unlike the media channels. The messages carried include messages to exchange
capabilities of terminals and to open and close logical channels. After a connection has
been set up via the call signaling procedure, the H.245 call control protocol is used to
resolve the call media type and establish the media flow, before the call can be
established. It also manages the call after it has been established. The steps involved are:

•Master-slave determination process. This is used to determine the master of the call and
is useful for avoiding conflicts during call control operations.

•Capability exchange procedure. Each endpoint notifies the other what kind of
information it is capable of receiving and transmitting through the receive-and-transmit
capabilities.

•Logical channel procedures. Used for opening and closing logical channels, which are
multiplexed paths between the endpoints used for data transfer.

•Request mode command. Using this command, at any point during the conference, the
receiving

The following additional message sets are available:

 Master Slave Determination messages


 Terminal capability messages
 Logical channel signaling messages
 Multiplex Table signaling messages
 Request Multiplex Table signaling messages
 Request Mode messages
 Round Trip Delay messages
 Maintenance Loop messages
 Communication Mode Messages
 Conference Request and Response Messages
 TerminalID
 Commands and Indications
Session control protocol (SCP)

Session control protocol (SCP) is a method of creating multiple light-duty


connections from a single TCP (Transmission Control Protocol) connection. Several
such lightweight connections can be active simultaneously. SCP is a session layer
protocol in the OSI model. In the session layer session layer protocols provide
services for coordinating communication between local and remote applications,
establishing, managing and terminating connections.SCP runs on TCP, depending on
it to provide connections and reliable service. While SCP is a byte-oriented protocol it
also supports message boundary markers. TCP is a set of rules used along with the
Internet Protocol (IP) to send data in the form of message units between computers
over the Internet.

Services

SCP's main service is dialogue control. This service allows either end of the
connection to establish a virtual session over a single transport connection. SCP also
allows a sender to indicate message boundaries, and allows a receiver to reject an
incoming session.

Protocol Operation

Session ID allocation

Each session is allocated a session identifier. Session Identifiers below 1024 are
reserved. Session IDs allocated by clients are even; those allocated by servers, odd.

Session establishment

A session is established by setting the SYN bit in the first message sent on that
channel.

Graceful release

A session is ended by sending a message with the FIN bit set. Each end of a
connection may be closed independently.

Disgraceful release

A session may be terminated by sending a message with the RST bit set. All pending
data for that session should be discarded

Message boundaries

A message boundary is marked by sending a message with the PUSH bit set. The
boundary is set at the final octet in this message, including that octet.

Anda mungkin juga menyukai