Institutions
Department of Computer Science & Engineering
Objectives
Study of different types of network Topologies.
Bus Topology:
Bus topologies
All the devices on a bus topology are connected by one single cable. When
one computer sends a signal up the wire, all the computers on the network
receive the information, but only one accepts the information. The rest
regrets the message. One computer can send a message at a time. A
computer must wait until the bus is free before it can transmit. When the
signal reaches the end of the wire, it bounces back and travels back up the
wire. When a signal echoes back and forth along an unterminated bus, it is
called ringing. To stop the signals from ringing, attach terminators at either
end of the segment. The terminators absorb the electrical energy and stop the
reflection.
Advantages and disadvantages of network topology:
advantage of network topology
1. The bus is simple, reliable in small network, easy to use and
understand
2. Requires the least amount of cable to connect the computers
and less expensive
3. Easy to extend the bus
Disadvantage of network topology
1. Heavy network traffic can slow a bus considerably
2. Each barrel connector weakens the electrical signal
3. Difficult to troubleshoot a bus
Star Topology:
Star Topology
All the cables run from the computers to a central location, where they are
all connected by a device called a hub. Each computer on a star network
communicates with a central hub that resends the message either to all the
computers or only to the destination computers. Hub can be active or
passive in the star network Active hub regenerates the electrical signal and
sends it to all the computers connected to it. Passive hub does not amplify or
regenerate signal and does not require electrical power to run. We can
expand a star network by placing another star hub.
Advantages:
Easy to modify and add new computers to a star net
Center of a star net is a good place to diagnose network faults
Single computer failure do not necessarily bring down the whole net
Several cable types can be used with the hub
Disadvantages:
Central hub fails, the whole network fails to operate
Many star networks require a device at the central point to
rebroadcast or switch network traffic.
Costs more for cabling in star net than bus.
Ring Topology:
Ring Topology
Each computer is connected to the next computer, with the last one
connected to the first. Every computer is connected to the next computer
in the ring, and each retransmits what it receives from the previous
computer. The message flow around the ring in one direction. Some ring
networks do token passing. It passes around the ring until a computer wishes
to send information to another computer. The computer adds an electronic
address and data and sends it around the ring. Each computer in sequence
receives the token and the information and passes them to the next until
either the electronic address matches the address of the computer or the
token returns to the origin. The receiving computer returns a message to the
originator indicating that the message has been received. The sending
computer then creates another token and places it on the network, allowing
another station to capture the token and being transmitted.
Advantages:
No computer can monopolize the network
The fair sharing of the network allows the net to degrade gracefully
as more users are added.
Disadvantages:
Failure of one compute can affect the total network
Difficult to troubleshoot
Adding or removing Computers disrupts the network
Mesh Topology:
Mesh Topology
The mesh topology connects all devices (nodes) to each other for
redundancy and fault tolerance. It is used in WANs to interconnect LANs
and for mission critical networks like those used by banks and financial
institutions. Implementing the mesh topology is expensive and difficult.
Advantages:
Fault tolerance
Guaranteed communication channel capacity
Easy to troubleshoot
Disadvantages:
Difficulty of installation and reconfiguration
Cost of maintaining redundant link
Lab 1: <Experiment/Topic >
Objectives
Study of different types of network cables and practical implement the
cross-wired cable and straight through cable using crimping tool.
3) Now you need to untwist the wire pairs (not too much, only undo one or two
twists) so you can align them according to the EIA-TIA568B wire color
sequence. I use my fingers to straighten the wires by bending them back and
forth, straightening them as they warm up.
4) Now holding an RJ-45 connector with the tab side facing down, push the 8
wires into the connector, sliding each wire into a groove. While holding the
connector tab side down the white/orange wire should be on the far left and
the brown wire should be on the far right. It is very important that the
wires push all the way up and into the connector so that when the pins are
pushed down during crimping they will make contact with the wires. The
sleave or jacket of the cable (light blue below) should also be pushed in as far
as it can go so it will be held in place once crimped. You may want to pull the
wires out and put them back in to make sure they are sliding in correctly, this
will also further straighten the wires.
Notice the tab make sure it is facing down push the wires and sleave into the
connector
5) Before crimping, examine the cable and connector from the side. Did the wires
slide all the way up in to the proper grooves? Are the colors in the proper order
when observed from tab side down? Did the jacket slide all the way into the
connector? If not, you may need pull the cable out of the connector, trim the
wires or the jacket accordingly, and reinsert.
6) If everything looks good, using your crimper tool insert the connector and
cable into the 8 wire slot and press down tightly. This will cause a piece of
plastic in the connector to press down on the jacket and hold the cable in the
connector preventing it from accidentally pulling out. Crimping also forces
copper pins in the connector to push down and make contact with the separate
wires.
You are now finished terminating one end of the cable. Repeat the process on
the other end of the cable and when you are done, insert the cable into a cable
tester and run a wire test to make sure that none of the wires are accidentally
crossed, by not being in the right order, or open by not touching the connector
7) Lastly, test your cable by using it on your network. Attach the cable to your
computer's NIC and the other end to your switch. Do you see green lights?
Open the Network Connections dialogue box in Windows, does it show a
properly enabled and active connection on the NIC. You can also look for the
status in your system tray network connections icon. If you have an internet
connection, can you browse the web? If not can you ping your gateway from a
command prompt?
Steps to make a Crossover Ethernet cable:
Same as straight through only sequence of cables are as follows-
At one end
1 2 3 4 5 6 7 8
At second end
1 2 3 4 5 6 7 8
Objectives
Building a Peer to Peer network.
Background/Preparation
This lab focuses on the ability to connect two PCs to create a simple peer-to-peer
Ethernet \ LAN between two workstations. The workstations will be directly connected
to each other without using a hub or switch. In addition to the Layer 1 physical and
Layer2 data link connections, the computers
must also be configured with the correct IP network settings, which is Layer 3, so that
they can communicate. A basic CAT 5/5e UTP crossover cable is all that is needed. A
crossover cable is the same type that would be used as backbone or vertical cabling to
connect switches together.
Connecting the PCs in this manner can be very useful for transferring files at high speed
and for troubleshooting interconnecting devices between PCs. If the two PCs can be
connected with a single cable and are able to communicate, then any networking
problems are not with the PCs themselves. Start this lab with the equipment turned off
and with cabling disconnected. Work in teams of two with one person per PC. The
following resources will be required:
-Two workstations with an Ethernet 10/100 NIC installed
-Several Ethernet cables, which are both straight through and crossover, to choose from
for connecting the two workstations
Step1 Identify the proper Ethernet cable and connect the two PCs
Plug in and turn on the computers to verify the computer connection insure that the
link lights on both NICs are lit. Are both link lights lit.?
Objectives
Connect the computers in LAN.
On the host computer, follow these steps to share the internet connection.
On the Client computer, to connect to internet by using the shared connection you must
confirm the LAN adapter IP configuration and then configure the client computer to
confirm LAN adapter IP.
Objectives
Study and configuration of Routers.
Objectives
Simulation of Static Routing.
Configuring router R0
R0>enable
R0# configure terminal
R0(config)# interface serial0/0
R0(config-if)# IP address 10.1.1.1 255.0.0.0
R0 (config-if)# no shutdown
R0 (config-if)# exit
Configuring router R1
R1>enable
R1# configure terminal
R1(config)# interface serial0/0
R1(config-if)# IP address 10.1.1.2 255.0.0.0
R1 (config-if)# no shutdown
R1 (config-if)# exit
R1 (config)# interface serial0/1
R1 (config-if)# ip address 20.1.1.1 255.0.0.0
R1 (config-if)# no shutdown
R1 (config-if)# exit
Objectives
Simulation of RIP.
Configuring router R0
R0>enable
R0# configure terminal
R0(config)# interface serial0/0
R0(config-if)# IP address 10.1.1.1 255.0.0.0
R0 (config-if)# no shutdown
R0 (config-if)# exit
Configuring RIP on R0
R0(config)#router rip
R0(config-router)#version 2
R0(config-router)#network 10.0.0.0
R0(config-router)#network 20.0.0.0
R0(config-router)#network 30.0.0.0
Objectives
Study of Pure and Slotted Aloha.
• In pure ALOHA, the stations transmit frames whenever they have data to send.
• When two or more stations transmit simultaneously, there is collision and the frames
are destroyed.
• If acknowledgement is not received within specified time, the station assumes that the
frame (or acknowledgement) has been destroyed.
• If the frame is destroyed because of collision the station waits for a random amount of
time and sends it again. This waiting time must be random otherwise same frames will
collide again and again.
• Therefore pure ALOHA dictates that when time-out period passes, each station must
wait for a random amount of time before resending its frame. This randomness will help
avoid more collisions.
• Figure shows an example of frame collisions in pure ALOHA.
• In fig there are four stations that .contended with one another for access to shared
channel. All these stations are transmitting frames. Some of these frames collide because
multiple frames are in contention for the shared channel. Only two frames, frame 1.1 and
frame 2.2 survive. All other frames are destroyed.
• Whenever two frames try to occupy the channel at the same time, there will be a
collision and both will be damaged. If first bit of a new frame overlaps with just the last
bit of a frame almost finished, both frames will be totally destroyed and both will have to
be retransmitted.
• Slotted ALOHA was invented to improve the efficiency of pure ALOHA as chances of
collision in pure ALOHA are very high.
• In slotted ALOHA, the time of the shared channel is divided into discrete intervals
called slots.
• The stations can send a frame only at the beginning of the slot and only one frame is
sent in each slot.
• In slotted ALOHA, if any station is not able to place the frame onto the channel at the
beginning of the slot i.e. it misses the time slot then the station has to wait until the
beginning of the next time slot.
• In slotted ALOHA, there is still a possibility of collision if two stations try to send at
the beginning of the same time slot as shown in fig.
• Slotted ALOHA still has an edge over pure ALOHA as chances of collision are reduced
to one-half.
Lab 9: <Experiment/Topic >
Objectives
Study of IPV4 Datagram.
Header Contents
Version
Version of the IP protocol which determines how to interpret the header. Currently the
only permitted values are 4 (0100) or 6 (0110). The header format shown here is valid
for IPv4 only.
HL
Type of service
This field is often ignored by current routers but is meant to allow traffic to be prioritized
(among other things).
Total Length
The length of the entire datagram including header and data: maximum permitted it
65,535 bytes or 64K.
These values allow datagram to be fragmented for transmission and reassembled at the
destination
Time to live
Protocol
Identifies the transport-layer protocol which will interpret the Data section. This will
typically be TCP or UDP but other values are possible. Protocols are identified by a
unique number as listed in an online database at www.iana.org.
Header checksum
This is used to verify the header, and is recomputed at each router hop. This field is left
out of IPv6 which relies on the transport layer for verification.
These are 32-bit IP addresses which identify the network and host address. Note that IP
does not have to specify addresses of any intermediate nodes; this can be left to the
router. Routing requirements can also be specified in the Options field, along with
options to do with security and debugging.
Lab 10: <Experiment/Topic >
Objectives
Study of Session Layer Protocols (PAP, SCP, H.254).
The PAP maintains communications between a workstation and a printer or print service.
The PAP functions include setting up and maintaining a connection, transferring the data,
and tearing down the connection on completion of the job. Like other protocols at the
session layer, PAP relies on NBP to find the addresses of named entities. PAP also
depends on ATP for sending data. The Printer Access Protocol (PAP) manages the virtual
connection to printers and other servers. PAP is used to convey connection status and
coordinate data transfer. PAP frames can contain the following parameters:
Connection ID
Reference code used to identify the PAP connection.
Wait time
Length of time that a workstation waits for a connection.
Sequence number
Used in send data request frames to maintain data order.
EOF
End-of-file indicator. Used to indicate the end of a data transfer.
Result
Result code indicating the outcome of an [open connection rqst]:
0000 Connect OK.
FFFF Printer busy.
Status
Status message returned by status and open connection reply frames.
H.245: Control Protocol for Multimedia Communication
•Master-slave determination process. This is used to determine the master of the call and
is useful for avoiding conflicts during call control operations.
•Capability exchange procedure. Each endpoint notifies the other what kind of
information it is capable of receiving and transmitting through the receive-and-transmit
capabilities.
•Logical channel procedures. Used for opening and closing logical channels, which are
multiplexed paths between the endpoints used for data transfer.
•Request mode command. Using this command, at any point during the conference, the
receiving
Services
SCP's main service is dialogue control. This service allows either end of the
connection to establish a virtual session over a single transport connection. SCP also
allows a sender to indicate message boundaries, and allows a receiver to reject an
incoming session.
Protocol Operation
Session ID allocation
Each session is allocated a session identifier. Session Identifiers below 1024 are
reserved. Session IDs allocated by clients are even; those allocated by servers, odd.
Session establishment
A session is established by setting the SYN bit in the first message sent on that
channel.
Graceful release
A session is ended by sending a message with the FIN bit set. Each end of a
connection may be closed independently.
Disgraceful release
A session may be terminated by sending a message with the RST bit set. All pending
data for that session should be discarded
Message boundaries
A message boundary is marked by sending a message with the PUSH bit set. The
boundary is set at the final octet in this message, including that octet.