Aim: Introduction to data Transmission in network.
Exercise:
# Convert string to binary
string_input = input("Enter a string: ")
binary_output = ' '.join(format(ord(char), '08b') for char in string_input)
print("Binary value:", binary_output)
# Convert binary to string
binary_input = input("Enter binary (separate each 8-bit by space): ")
string_output = ''.join(chr(int(b, 2)) for b in binary_input.split())
print("String:", string_output)
Conclusion: This experiment shows how characters are converted to binary and back, which is the basic principle of data transmission in networks.
Aim: Study of networking devices
Exercise:
Define topology & list names of different topologies.
List out different kinds of addresses at layers with example.
| Form of data | Layer at address | Name of address | Example |
|---|---|---|---|
| Bits | Physical | Not Available | Not Available |
| Frames | Data Link | MAC Address | 00:1A:2B:3C:4D:5E |
| Packets | Network | IP Address | 127.0.0.1 |
| Segments | Transport | Port Number | 80, 5500, 443 |
| Messages | Application | URL | www.google.com |
What does RJ45 stand for?
Define mapping of:
Difference between HUB and SWITCH?
| Feature | Hub | Switch |
|---|---|---|
| Device Type | Networking device | Networking device |
| Layer | Operates at Layer 1 (Physical Layer) | Operates at Layer 2 (Data Link Layer) |
| Function | Broadcasts data to all ports | Sends data only to specific destination port |
| Data Transfer | Half-duplex (data flows one way at a time) | Full-duplex (simultaneous send & receive) |
| Intelligence | No filtering or learning capability | Yes—Learns MAC addresses and makes decisions |
| Speed & Efficiency | Slower, more collisions | Faster, fewer or no collisions |
| Security | Low (data sent to all devices) | Higher (data sent only to the right device) |
| Example Use Case | Small, outdated networks | Modern LANs, offices, enterprises |
| Cost | Cheaper | More expensive |
Conclusion: This experiment helps understand basic networking devices, their functions, and addressing, which are essential for network communication.
Aim: To study various networking commands
Exercise:
Why we are using ping command?
ping command is used to test the connectivity between two network devices. It checks whether a device (like a computer or server) is reachable over the network and measures the round-trip time for messages sent.Explain arp command.
arp (Address Resolution Protocol) command is used to view and manage the ARP table on a device. It shows the mapping between IP addresses and MAC addresses, helping in resolving network layer addresses to link layer addresses.Conclusion: This experiment helps understand basic networking commands, their purpose, and how they assist in network troubleshooting and device communication.
Aim: Introduction/installation of CISCO packet tracer, understanding of point to point network with net map, create network topology with HUB/Switch and simulate it.
Transfer PDU and view scenario graphically.
1. Which protocol is used to test scenario while simulation?
Exercise: Create and Simulate a Network Topology Using a Hub
Objective: Create a network topology with more than two devices connected using a hub. Simulate the topology using any network simulation software (e.g., Cisco Packet Tracer). Take a screenshot of your network setup, print it, and paste the printed screenshot as required.
Steps:
Exercise: Create and Simulate a Network Topology Using a Switch
Objective: Create a network topology with more than two devices connected using a switch. Simulate the topology using any network simulation software (e.g., Cisco Packet Tracer). Take a screenshot of your network setup, print it, and paste the printed screenshot as required.
Steps:
Conclusion: In this practical, we created and simulated point-to-point, hub, and switch-based networks using Cisco Packet Tracer. IP addresses were assigned, and connectivity was successfully tested using the ping (ICMP) protocol.
Aim: Introduction to different types of wired transmission media
Exercise:
| Feature | LED (Light Emitting Diode) | Laser Diode |
|---|---|---|
| Wavelength | Broad range (850–1300 nm), may cause signal dispersion over long distances | Narrow range (1300–1550 nm), less signal loss, ideal for long distances |
| Power Output | Low, suitable for short-distance communication like LANs | High, suitable for long-distance communication like WANs or internet backbones |
| Bandwidth | Limited bandwidth, restricts data transmission speed | High bandwidth, supports high-speed data transmission |
| Cost & Size | Cheaper, easy to manufacture, larger in size | Expensive, compact, requires precise alignment |
| Applications & Efficiency | Used in short-distance, low-speed communication; moderate efficiency | Used in long-distance, high-speed networks; high efficiency and minimal loss |
List out different types of wired media used in computer lab with their specifications.
Twisted Pair Cable (UTP/STP): Consists of pairs of insulated copper wires twisted together to reduce interference. Used in LANs. Categories include Cat5e and Cat6. Maximum distance ~100m, speed up to 1 Gbps (Cat5e) and 10 Gbps (Cat6).
Coaxial Cable: Single copper conductor with insulating layer, metal shield, and outer insulation. Used in older networks and cable TV. Moderate bandwidth, distance up to 500m, resistant to interference.
Fiber Optic Cable: Uses glass or plastic fibers to transmit data as light pulses. Supports very high speeds (up to 100 Gbps), long distances (several kilometers), and is immune to electromagnetic interference. Used in backbone networks.
Shielded Twisted Pair (STP): Twisted pair cable with extra shielding to protect against electromagnetic interference. Slightly more expensive than UTP, used in industrial environments.
Ethernet Cable (Cat5e / Cat6 / Cat6a): Standard cable for LAN connections, supports high-speed data transmission. Cat5e: up to 1 Gbps, Cat6: up to 10 Gbps for short distances. Easy to install and widely used in labs.
Give difference between following:
(A) Twisted Pair Cable and Coaxial Cable
| Feature | Twisted Pair Cable | Coaxial Cable |
|---|---|---|
| Structure | Pairs of insulated copper wires twisted together | Central conductor with insulating layer and metallic shield |
| Interference | Reduces interference through twisting | Reduces interference using shielding |
| Cost | Generally cheaper | More expensive |
| Flexibility | More flexible and easier to install | Less flexible, especially thicker types |
| Application | Ethernet LANs, telephone lines | Cable TV, broadband, older LANs |
(B) Twisted Pair Cable and Fiber Optic Cable
| Feature | Twisted Pair Cable | Fiber Optic Cable |
|---|---|---|
| Medium | Copper wires | Glass or plastic strands |
| Signal | Electrical impulses | Light pulses |
| Interference | Susceptible to electromagnetic interference | Immune to EMI/RFI |
| Bandwidth | Limited bandwidth | Extremely high bandwidth |
| Application | Short-distance communication (LANs) | Long-distance communication, high-speed networks |
(C) Fiber Optic Cable and Coaxial Cable
| Feature | Fiber Optic Cable | Coaxial Cable |
|---|---|---|
| Medium | Glass or plastic strands | Copper conductor |
| Signal | Light pulses | Electrical signals |
| Bandwidth | Extremely high | Lower |
| Distance | Very long (km to hundreds of km) | Shorter (hundreds of meters to few km) |
| Security | More secure, difficult to tap | Less secure, easier to tap |
(D) Wired Communication and Wireless Communication
| Feature | Wired Communication | Wireless Communication |
|---|---|---|
| Medium | Physical cables (copper, fiber optic) | Air/space (electromagnetic waves) |
| Mobility | Limited mobility, requires physical connection | High mobility, no physical connection needed |
| Installation | Complex, requires cable routing | Simpler, no physical wiring needed |
| Reliability | More reliable, less prone to interference | Can be less reliable, affected by interference |
| Applications | LANs, telephone, cable TV, fiber internet | Wi-Fi, Bluetooth, cellular, satellite |
Conclusion: This experiment helps understand different types of wired transmission media, their characteristics, applications, and the key differences between various cables and communication methods, which are essential for designing and maintaining efficient networks.
Aim: Implementation of Dynamic Routing (Using RIP)
Exercise: Connect Two Networks Using Three Routers with RIP
Router1:
enable → configure terminalhostname Router1interface fastethernet 0/0 → ip address 10.1.1.100 255.0.0.0 → no shutdowninterface fastethernet 1/0 → ip address 20.1.1.100 255.0.0.0 → no shutdownrouter ripnetwork 10.0.0.0network 20.0.0.0Router2:
enable → configure terminalhostname Router2interface fastethernet 0/0 → ip address 20.1.1.200 255.0.0.0 → no shutdowninterface fastethernet 1/0 → ip address 30.1.1.100 255.0.0.0 → no shutdownrouter ripnetwork 20.0.0.0network 30.0.0.0Router3:
enable → configure terminalhostname Router3interface fastethernet 0/0 → ip address 30.1.1.200 255.0.0.0 → no shutdowninterface fastethernet 1/0 → ip address 40.1.1.100 255.0.0.0 → no shutdownrouter ripnetwork 30.0.0.0network 40.0.0.0Verification:
ping <destination IP> from PCs connected to the network to ensure connectivity.show ip route to confirm RIP routes are learned.Conclusion: In this practical, three routers were successfully configured to connect two different networks using RIP dynamic routing. IP addresses and RIP networks were correctly set, allowing communication between all networks. The routing tables updated automatically, demonstrating the functionality of the distance vector protocol.
Aim: Study of subnetting with an examples.
1. If your client needs three groups, how will you create the groups? Find the IP range, host range, network ID, and broadcast ID of each group. (IP: 200.1.2.0)
Ans.
| Group | Network ID | Host Range | Broadcast ID |
|---|---|---|---|
| 1 | 200.1.2.0 | 200.1.2.1 – 200.1.2.62 | 200.1.2.63 |
| 2 | 200.1.2.64 | 200.1.2.65 – 200.1.2.126 | 200.1.2.127 |
| 3 | 200.1.2.128 | 200.1.2.129 – 200.1.2.190 | 200.1.2.191 |
2. In a Class B network on the internet has a subnet mask 255.255.240.0. What is the max. number of hosts per subnet?
Ans.
3. Given IP Address 172.16.0.0/25, find the number of subnets and the number of hosts per subnet. Also, for the first subnet block, find the subnet address, first host ID, last host ID and broadcast address.
Ans.
First Subnet Block:
| Parameter | Address |
|---|---|
| Subnet Address | 172.16.0.0 |
| First Host ID | 172.16.0.1 |
| Last Host ID | 172.16.0.126 |
| Broadcast Address | 172.16.0.127 |
4. In the network 200.10.11.144/27, the fourth octet (in decimal) of the last IP address of the network which can be assigned to a host is:
5. In the IPv4 addressing format, the number of networks allowed under Class C addresses is:
6. Suppose computers A and B have IP addresses 10.105.1.113 and 10.105.1.91 respectively and they both use the same net mask N. Which of the values of N given below should not be used if A and B should belong to the same network?
7. If a Class B network on the Internet has a subnet mask of 255.255.248.0, what is the maximum number of hosts per subnet?
8. What is the broadcast address of the network 172.31.180.131/25 OR 172.31.180.128/25?
Ans.
Case 1: 172.31.180.131/25
Case 2: 172.31.180.128/25
9. What valid host range is the IP address 10.254.201.56/20 a part of?
Ans.
10. How many subnets and hosts per subnet can you get from the network 172.28.0.0/23?
Ans.
11. What is the last valid host on the subnetwork 172.19.156.0/23?
Ans.
12. What valid host range is the IP address 192.168.206.28 and subnet mask 255.255.255.248 a part of?
Ans.
Conclusion: In this practical, we studied subnetting by dividing larger networks into smaller subnets. We learned how to calculate network ID, broadcast ID, usable host range, number of subnets, and hosts per subnet for Class B and Class C networks. Subnetting helps efficiently utilize IP addresses, reduces broadcast traffic, and improves network management.
Aim: Understanding NAT (Network Address Translation) with example.
Exercise :
What do you mean by NAT?
Network Address Translation (NAT) is a technique used in computer networks to translate private IP addresses into public IP addresses so that devices within a private network can communicate with external networks like the Internet. NAT helps conserve public IP addresses and provides a layer of security by hiding internal IP addresses.
Types of NAT:
Example:
Conclusion:
Aim: Perform routing using OSPF in packet tracer
Exercise:
Which kind of protocol can be used by OSPF?
Differentiate OSPF with other protocols (RIP, IGRP, EIGRP, OSPF).
| Feature | RIP | IGRP | EIGRP | OSPF |
|---|---|---|---|---|
| Protocol Type | Distance Vector | Distance Vector | Advanced DV / Hybrid | Link-State |
| Metric | Hop Count | Bandwidth + Delay | Bandwidth + Delay + Reliability | Cost (based on bandwidth) |
| Convergence Speed | Slow | Moderate | Fast | Fast |
| Scalability | Small networks | Medium networks | Large networks | Large networks |
| Classful/Classless | Classful | Classful | Classless | Classless |
Conclusion: In this practical, we learned how OSPF works as a link-state routing protocol. OSPF provides faster convergence, better scalability, and efficient routing compared to distance vector protocols like RIP and IGRP, making it suitable for large networks.
Aim: Configuration of DHCP server in packet tracer
Exercise:
What is scope?
List types of IP address allocation methods with its brief
What is IP reservation?
Conclusion: The practical successfully demonstrated the configuration of DHCP and its function in a network.
Made By SOU Student for SOU Students