CN Lab Manual
CN Lab Manual
LABMANUAL
COMPUTER NETWORK
(IT-503)
SEMESTER – V
INDEX
S.N
Experiment Statement
o
Batch -
Batch - I
II
7 STUDY OF WAN
1
1 STUDY OF FDDI
Practical No.1
SKILLS DEVELOPED: students shall be able to know how different computers are
connected.
A local area network (LAN) is one example of a network that exhibits both a physical
topology and a logical topology. Any given node in the LAN has one or more links to one
or more nodes in the network and the mapping of these links and nodes in a graph results
in a geometric shape that may be used to describe the physical topology of the network.
Likewise, the mapping of the data flow between the nodes in the network determines the
logical topology of the network. The physical and logical topologies may or may not be
identical in any particular network.
1. Physical topologies
2. Signal topologies
3. Logical topologies
1. Physical topologies
The mapping of the nodes of a network and the physical connections between them – i.e.,
the layout of wiring, cables, the locations of nodes, and the interconnections between the
nodes and the cabling or wiring system
Permanent (dedicated)
Point-to-point topology is a point-to-point communications channel that appears,
to the user, to be permanently associated with the two endpoints. Children's "tin-
can telephone" is one example.
Switched:
Using circuit-switching or packet-switching technologies, a point-to-point circuit
can be set up dynamically, and dropped when no longer needed. This is the basic
mode of conventional telephony.
b) Bus topology: In local area networks where bus topology is used, each machine is
connected to a single cable. Each computer or server is connected to the single bus cable
through some kind of connector. A terminator is required at each end of the bus cable to
prevent the signal from bouncing back and forth on the bus cable. A signal from the
source travels in both directions to all machines connected on the bus cable until it finds
the MAC address or IP address on the network that is the intended recipient. If the
machine address does not match the intended address for the data, the machine ignores
the data. Alternatively, if the data does match the machine address, the data is accepted.
Since the bus topology consists of only one wire, it is rather inexpensive to implement
when compared to other topologies. However, the low cost of implementing the
technology is offset by the high cost of managing the network. Additionally, since only
one cable is utilized, it can be the single point of failure. If the network cable breaks, the
entire network will be down.
c) Star topology: In local area networks with a star topology, each network host is
connected to a central hub. In contrast to the bus topology, the star topology connects
each node to the hub with a point-to-point connection. All traffic that traverses the
network passes through the central hub. The hub acts as a signal booster or repeater.
e) Ring topology: In local area networks where the ring topology is used, each computer
is connected to the network in a closed loop or ring. Each machine or computer has a
unique address that is used for identification purposes. The signal passes through each
machine or computer connected to the ring in one direction. Ring topologies typically
utilize a token passing scheme, used to control access to the network. By utilizing this
scheme, only one machine can transmit on the network at a time. The machines or
computers connected to the ring act as signal boosters or repeaters which strengthen the
signals that traverse the network. The primary disadvantage of ring topology is the failure
of one machine will cause the entire network to fail.
Fully connected mesh topology: The physical fully connected mesh topology is
generally too costly and complex for practical networks, although the topology is used
when there are only a small number of nodes to be interconnected.
Partially connected mesh topology: The type of network topology in which some of the
nodes of the network are connected to more than one other node in the network with a
point-to-point link – this makes it possible to take advantage of some of the redundancy
that is provided by a physical fully connected mesh topology without the expense and
complexity required for a connection between every node in the network.
2) Signal topology
The mapping of the actual connections between the nodes of a network, as evidenced by
the path that the signals take when propagating between the nodes. The term 'signal
topology' is often used synonymously with the term 'logical topology'. By definition, the
term 'logical topology' refers to the apparent path that the data takes between nodes in a
network while the term 'signal topology' generally refers to the actual path that the signals
(e.g., optical, electrical, electromagnetic, etc.) take when propagating between nodes.
The logical topology, in contrast to the "physical", is the way that the signals act on the
network media, or the way that the data passes through the network from one device to
the next without regard to the physical interconnection of the devices. A network's logical
topology is not necessarily the same as its physical topology. For example, twisted pair
Ethernet is a logical bus topology in a physical star topology layout. While IBM's Token
Ring is a logical ring topology, it is physically set up in a star topology.
THEORY:
RJ45: RJ45 is a registered jack. As a registered jack, telephone RJ45 specifies the
physical male and female connectors as well as the pin assignments of the wires in a
telephone cable. The original RJ45 uses a special keyed 8P2C modular connector, with
Pins 5 and 4 wired for tip and ring of a single telephone line and Pins 7 and 8 connected
to a programming resistor. It is meant to be used with a high speed modem, and is
obsolete today.
RJ-11: More commonly known as a phone jack or phone connector, the RJ-11 is short
for Registered Jack-11 and is a four or six wire connection primarily used for
telephones and computer modem connectors across the world.
RJ9 or RJ10: The 4P4C connector, an Acronym for 4 Position, 4 Conductor .it is
popularly, but incorrectly, called RJ22, RJ10, or RJ9. It is also commonly referred to as a
"Handset Connector" because of the most popular usage for the connector. It is the de
facto industry standard for wired telephone handsets. It is used to provide connection
from the base of the telephone to the handset.
Practical No.3
THEORY:
• Gateway: device sitting at a network node for interfacing with another network
that uses different protocols. Works on OSI layers 4 to 7.
• Router: a specialized network device that determines the next network point to
which to forward a data packet toward its destination. Unlike a gateway, it cannot
interface different protocols. Works on OSI layer 3.
• Bridge: a device that connects multiple network segments along the data link
layer. Works on OSI layer 2.
• Switch: a device that allocates traffic from one network segment to certain lines
(intended destination(s)) which connect the segment to another network segment.
So unlike a hub a switch splits the network traffic and sends it to different
destinations rather than to all systems on the network. Works on OSI layer 2.
• Hub: connects multiple Ethernet segments together making them act as a single
segment. When using a hub, every attached all the objects, compared to switches,
which provide a dedicated connection between individual nodes. Works on OSI
layer 1.
• Repeater: device to amplify or regenerate digital signals received while setting
them from one part of a network into another. Works on OSI layer 1.
Hardware or software components that typically sit on the connection point of different
networks, e.g. between an internal network and an external network:
• Proxy: computer network service which allows clients to make indirect network
connections to other network services
• Firewall: a piece of hardware or software put on the network to prevent some
communications forbidden by the network policy
• Network Address Translator: network service provide as hardware or software
that converts internal to external network addresses and vice versa
Practical No.4
THEORY: These guidelines when planning the configuration of the interfaces to the
private network between nodes in a cluster that can be used as a control network
between nodes:
Follow these guidelines when planning the configuration of the node interfaces in a
cluster to one or more public networks:
Practical No.5
ipconfig Usage
From the command prompt, type 'ipconfig' to run the utility with default options. The
output of the default command contains the IP address, network mask and gateway for
all physical and virtual network adapters.
'ipconfig' supports several command line options as described below. The command
"ipconfig /?" displays the set of available options.
ipconfig /all
This option displays the same IP addressing information for each adapter as the default
option. Additionally, it displays DNS and WINS settings for each adapter.
ipconfig /release
This option terminates any active TCP/IP connections on all network adapters and
releases those IP addresses for use by other applications. 'ipconfig /release" can be used
with specific Windows connection names. In this case, the command will affect only
the specified connections and not all. The command accepts either full connection
names or wildcard names. Examples:
ipconfig /renew
This option re-establishes TCP/IP connections on all network adapters. As with the
release option, ipconfig /renew takes an optional connection name specifier.
Both /renew and /release options only work on clients configured for dynamic (DHCP)
addressing.
These options manage DHCP class identifiers. DHCP classes can be defined by
administrators on a DHCP server to apply different network settings to different types
of clients. This is an advanced feature of DHCP typically used in business networks,
not home networks.
These options access a local DNS cache that Windows maintains. The /displaydns
option prints the contents of the cache, and the /flushdns option erases the contents.
This DNS cache contains a list of remote server names and the IP addresses (if any)
they correspond to. Entries in this cache come from DNS lookups that happen when
attempting to visit Web sites, named FTP servers, and other remote hosts. Windows
uses this cache to improve the performance of Internet Explorer and other Web-based
applications.
In home networking, these DNS options are sometimes useful for advanced
troubleshooting. If the information in your DNS cache becomes corrupted or outdated,
you could face difficulty accessing certain sites on the Internet. Consider these two
scenarios:
• The IP address of a Web site, email server or other server changes (rare
occurence). The name and address of this site normally stay in your cache for 24
hours after your last visit. You may need to clear your cache to access the server
sooner.
• A Web site or other server was offline when you last visited it (hopefully a rare
occurence) but since has come back online. The cache will normally keep a record
that the server is offline for 5 minutes afer your last visit. You may need to clear
your cache to access the server sooner.
ipconfig /registerdns
Similar to the above options, this option updates DNS settings on the Windows
computer. Instead of merely accessing the local DNS cache, however, this option
initiates communication with both the DNS server (and the DHCP server) to re-register
with them.
Like the /release and /renew options, /registerdns optionally takes the name(s) of
specific adapters to update. If no name parameter is specified, /registerdns updates all
adapters.
Syntax
IPCONFIG /registerdns Refresh all DHCP leases and re-register DNS names.
Ping Command
Ping is a computer network administration utility used to test the reachability of a host on
an Internet Protocol (IP) network and to measure the round-trip time for messages sent
from the originating host to a destination computer.
Pinging is a command, which tells you if the connection between your computer and a
particular domain is working correctly.
In windows, select Start > Programs > Accessories > Command Prompt. This will give
you a window like the one below.
Enter the word ping, followed by a space, then the domain name
If the result shows a series of replies, the connection is working. The time shows you how
fast the connection is .If you see a timed out error instead of a reply, there is a breakdown
some where between your computer and the domain. In this case the next step is to
perform a trace route.
THEORY: A wide area network (WAN) is a computer network that covers a broad
area (i.e., any network whose communications links cross metropolitan, regional, or
national boundaries [1]). This is in contrast with personal area networks (PANs), local area
networks (LANs), campus area networks (CANs), or metropolitan area
networks (MANs), which are usually limited to a room, building, campus or specific
metropolitan area (e.g., a city) respectively.
WANs are used to connect LANs and other types of networks together, so that users and
computers in one location can communicate with users and computers in other locations.
Many WANs are built for one particular organization and are private.
WANs are either point-to-point, involving a direct connection between two sites, or
operate across packet-switched networks, in which data is transmitted in packets over
shared circuits. Point-to-point WAN service may involve either analog dial-up lines, in
which a modem is used to connect the computer to the telephone line, or dedicated leased
digital telephone lines, also known as "private lines." Analog lines, which may be either
part of a public-switched telephone network or leased lines, are suitable for batch data
transmissions, such as nonurgent order entry and point-of-sale transactions. Dedicated
digital phone lines permit uninterrupted, secure data transmission at fixed costs.
Depending on the service, WANs can be used for almost any data sharing purpose for
which LANs can be used. Slower transmission speeds, however, may make some
applications less practical for WANs. The most basic uses of WANs are for electronic
mail and file transfer, but WANs can also permit users at remote sites to access and enter
data on a central site's database, such as instantaneously updating accounting records.
New types of network-based software that facilitate productivity and production tracking,
such as groupware and workflow automation software, can also be used over WANs.
Using groupware, workers at dispersed locations can more easily collaborate on projects.
WANs also give remote offices access to a central office's other data communications
services, including the Internet.
SKILLS DEVELOPED: students shall be able to know how stop and wait protocol
works.
In a real life implementation there are problems to be addressed in Stop and Wait
Protocol:
1) The transmitter adds a redundancy check number to the end of each frame. The
receiver uses the redundancy check number to check for possible damage. If the receiver
2) The ACK sent by the receiver is damaged or lost. In this case, the sender doesn't
receive the ACK, times out, and sends the frame again. Now the receiver has two copies
of the same frame, and doesn't know if the second one is a duplicate frame or the next
frame of the sequence carrying identical data.
3) The transmission medium has such a long latency that the sender's timeout runs out
before the frame reaches the receiver. In this case the sender resends the same packet.
Eventually the receiver gets two copies of the same frame, and sends an ACK for each
one. The sender, waiting for a single ACK, receives two ACKs, which may cause
problems if it assumes that the second ACK is for the next frame in the sequence.
To avoid these problems, the most common solution is to define a 1-bit sequence
number in the header of the frame. This sequence number alternates (from 0 to 1) in
subsequent frames. When the receiver sends an ACK, it includes the sequence number of
the next packet it expects. This way, the receiver can detect duplicated frames by
checking if the frame sequence numbers alternate. If two subsequent frames have the
same sequence number, they are duplicates, and the second frame is discarded. Similarly,
if two subsequent ACKs reference the same sequence number, they are acknowledging
the same frame.
Stop-and-wait ARQ is inefficient compared to other ARQs, because the time between
packets, if the ACK and the data are received successfully, is twice the transit time. The
throughput on the channel is a fraction of what it could be. To solve this problem, one
can send more than one packet at a time with a larger sequence number and use one ACK
for a set. This is what is done in Go-Back-N ARQ and the Selective Repeat ARQ.
Where: