Data Comm. Networking Lab Manual (Ece Final)
Data Comm. Networking Lab Manual (Ece Final)
MANAGEMENT, KABLANA
LAB FILE
COURSE NAME: DATA COMMUNICATION NETWORKING LAB
SUBMITTED BY SUBMITTED TO
MISSION
To provide healthy environment to our students as well as faculty members.
To achieve excellence in technical education.
To promote holistic development of students through interaction with alumni, academia,
Industry and expert lectures.
To attract nurture and retain the best faculty and technical manpower.
To contribute to the society by inculcating professional ethics in the students.
To promote research and development Initiatives.
MISSION
To have adequate mechanisms by improving the understanding and implementation of
theoretical concepts in practical scenario.
To develop technical manpower by organizing workshops, expert lectures and industrial
visits on regular basis.
To impart quality teaching-learning experience with state of the art laboratories.
To prepare the students to meet the global needs of Industry and Society by inculcating
professional ethics.
PO-5 Modern Tool Usage: Create, select, and apply appropriate techniques, resources, and
modern engineering and IT tools including prediction and modeling to complex engineering
activities with an understanding of the limitation.
PO-6 The Engineer and Society: Apply reasoning informed by the contextual knowledge to
assess societal, health, safety, legal and cultural issues and the consequent responsibilities
relevant to the professional engineering practice.
PO-7 Environment and Sustainability: Understand the impact of the professional engineering
solutions in societal and environmental contexts, and demonstrate the knowledge of, and need for
sustainable development.
PO-8 Ethics: Apply ethical principles and commit to professional ethics and responsibilities and
norms of the engineering practice.
PO-11 Project Management and Finance: Demonstrate knowledge and understanding of the
engineering and management principles and apply the set to one’s own work, as a member and
leader in a team, to manage projects and in multi-disciplinary environments.
PO-12 Life-long Learning: Recognize the need for, and have the preparation and ability to
engage in independent and life-long learning in the broadest context of technological change
.
PROGRAM SPECIFIC OUTCOMES
PSO1: Analyze, design and implement hardware and software skills to solve problems in
electronics and communication engineering in various areas such as analog & digital electronics,
signal processing, communication, VLSI, embedded systems and its allied branches by applying
basic sciences and engineering fundamentals.
PSO2: Adapt rapid changes in the field of electronics and communication engineering and also
employs their skills for the multidisciplinary work environment, to be a successful
professional/entrepreneur and worthy citizen
COURSE OUTCOMES
RBT
COs Data Communication Networking Lab (LC-ECE-405 G)
Level
LC-ECE-405 G.1 Define fundamental concepts of different types of transmission media. L1
LC-ECE-405 G 2 Understand various digital modulation techniques. L2
LC-ECE-405 G.3 Demonstrate LAN using different topologies like bus, ring, star & tree. L3
LC-ECE-405 G.4 Analyze the operation for configuration of modem and hub. L4
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 1 3
CO2 1 3 3 3 2 2 2 1
CO3 3 1 3 3 3 3 2 2 3 2 2 3
CO4 3 3 3 3
EXPERIMENT NO-1
AIM: To study different types of transmission media.
1. PC to PC Communication using Serial Port
2. Wireless Communication
3. Fiber Optics Communication
EQUIPMENTS NEEDED:
2. ST5001 Software
Figure
PROCEDURE:
2. Connect mains power cord to the trainer and switch on the trainer.
3. Connect the serial port cables between one PC to Port1 & another PC to Port2.
Run ST5001 software on both PCs >> Click “Serial Port Interface” image/press
5. The software will open with default settings. Select the desired port settings.
6. After the port settings are done, open the port by clicking “Open Port” button.
7. To send data to other node enter the text in the window titled as “Enter Data to Transmit”.
Click on “Send” button to transmit.
8. Transmitted data will be displayed in the “Received Data” window and the ASCII codes of
each byte received is displayed in “Received Data in ASCII” window.
9. A small window at the sender side is given for transmission of ASCII code. Enter an ASCII
code in the window and then click “Send” button.
11. Before changing the port settings close the port by clicking “Close Port” button and after
changing the parameters click “Open Port” button to reopen the port.
12. For hardware safety of the CPU, it is very important to connect serial port cables only after
making all the connections on board and after switching ON the trainer.
13. To see transmitted data connect CRO probe between test points TP8/TP27 and ground,
similarly to see received data connect it between TP7/TP26 and ground.
Wireless Communication
PROCEDURE:
2. The software will open with default settings. Set the same parameters on both the PCs. Baud
rate can be varied from 300bps to 2400bps. Select the desired baud rate. Select the desired port
settings.
3. After the port settings are done, open the port by clicking “Open Port” button.
4. To send data to other node enter the text in the window titled as “Enter Data to Transmit”.
Click on “Send” button to transmit.
5. Transmitted data will be displayed in the “Received Data” window and the ASCII codes of
each byte received is displayed in “Received Data in ASCII” window.
6. A small window at sender side is given for transmission of ASCII code. Enter an ASCII code
in the window and then click “Send” button.
8. Before changing the port settings close the port by clicking “Close Port” button and after
changing the parameters click “Open Port” button to reopen the port. For the hardware safety of
the CPU, it is very important to connect serial port cables only after making all the connections
on board and after switching on the trainer.
9. To see transmitted data connect CRO probe between test points TP18 and ground, similarly to
see received data connect it between TP19 and ground.
THEORY:
We consider the simple fiber optic data link given below. This is the basic building block for a
fiber optic based network. A model of this simple link is shown in figure
The illustration indicates the Source-User pair, Transmitter and Receiver. It also clearly shows
the fiber optic cable constituting the Transmission Medium as well as the connectors that provide
the interface of the Transmitter to the Transmission Medium and the Transmission Medium to the
Receiver. All of these are components of the simple fiber optic data link.
Transmitter:
The Transmitter component of figure 9 serves two functions. First, it must be a source of the light
coupled into the fiber optic cable. Secondly, it must modulate this light so as to represent the
binary data that it is receiving from the Source. The Source provides the data to the Transmitter
as some digital electrical signal. The Transmitter can then be thought of as Electro-Optical (EO)
transducer. Within the context of a fiber optic data link the modulating signal, the Information,
assumes only the values of '0' and '1.' The demodulation function in the Receiver will just be
looking for the presence or absence of energy during a bit time interval.
Receiver:
The Receiver component of Figure 10 serves two functions. First, it must sense or detect the light
coupled out of the fiber optic cable then convert the light into an electrical signal. Secondly, it
must demodulate this light to determine the identity of the binary data that it represents. In total,
it must detect light and then measure the relevant information bearing light wave parameters in
the premises fiber optic data link context intensity in order to retrieve the Source's binary data.
The very heart of the Receiver is the means for sensing the light output of the fiber optic cable.
Light is detected and then converted to an electrical signal. The demodulation decision process is
carried out on the resulting electrical signal. The light detection is carried out by a photodiode.
This senses light and converts it into an
electrical current.
SMA Connector:
The Connector is a mechanical device mounted on the end of a fiber optic cable, light source,
Receiver or housing. It allows it to be mated to a similar device. The Transmitter provides the
information bearing light to the fiber optic cable through a connector. The Receiver gets the
information bearing light from the fiber optic cable through a connector. The connector must
direct light and collect light. It must also be easily attached and detached from equipment. This is
a key point. The connector is disconnect able.
SMA - The connector features a threaded cap and housing. The photograph of the SMA
connector used is provided in figure
1. Half Duplex :
2. Full Duplex :
PROCEDURE:
1. Connect patch cords as shown in figure for Half duplex and for full duplex connections. To
open the window as shown in figure 14, follow the steps. Run ST5001 software on both PCs >>
Click “Fiber Optics Communication”image/press “Ctrl + S”/click “Options” on menu bar.
2. The software will open with default settings. Set the same parameters on both the PCs. Baud
rate can be varied from 2400bps to 115200bps. Select the desired baud rate. Select the desired
port settings.
3. After the port settings are done, open the port by clicking “Open Port” button.
6. To send data to other node enter the text in the window titled as “Enter Data to Transmit”.
Click on “Send” button to transmit.
4. Transmitted data will be displayed in the “Received Data” window and the ASCII codes of
each byte received is displayed in “Received Data in ASCII” window.
5. A small window at sender side is given for transmission of ASCII code. Enter an ASCII code
in the window and then click “Send” button.
RESULT: Different types of transmission media (PC to PC communication using serial port,
wireless communication and fiber optics communication has been successfully done.
PRECAUTIONS:
VIVA-VOCE
EXPERIMENT NO-2
AIM: Study of different types of Network cables and practically implements the
cross-wired cable and straight through cable using clamping tool.
1) Start by stripping off about 2 inches of the plastic jacket off the end of
the cable. Be very careful at this point, as to not nick or cut into the wires,
which are inside. Doing so could alter the characteristics of your cable, or even
worse render is useless. Check the wires, one more time for nicks or cuts. If
there are any, just whack the whole end off, and start over.
2) Spread the wires apart, but be sure to hold onto the base of the jacket
with your other hand. You do not want the wires to become untwisted down
inside the jacket. Category 5 cable must only have 1/2 of an inch of 'untwisted'
wire at the end; otherwise it will be 'out of spec'. At this point, you obviously
have ALOT more than 1/2 of an inch of un-twisted wire.
3) You have 2 end jacks, which must be installed on your cable. If you are
using a pre-made cable, with one of the ends whacked off, you only have one
end to install - the crossed over end. Below are two diagrams, which show
how you need to arrange the cables for each type of cable end. Decide at this
point which end you are making and examine the associated picture below.
VIVA-VOCE
A1. Open wire, twisted pair, Coaxial cable and optical fiber.
A4.They are used in telephone lines, DSL line, and Local area network.
A5.The fiber optical cable is used in cable TV, local area network Wide band network
A6. The different types of propagation modes are multimode step and graded Index, single mode.
A8.1000 mbps
A9. The propagation which follow the curvature of the earth. They carry frequencies up to 2Mhz.
AM is an example of Ground waves
A10.the two examples of unguided media are Wireless and Radio waves.
EXPERIMENT NO-3
AIM: Study of following Network Devices in Detail
a) Repeater
b) Hub
c) Switch
d) Bridge
e) Router
f) Gate Way
2. Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or
concentrator is a device for connecting multiple twisted pair or fiber optic Ethernet
devices together and making them act as a single network segment. Hubs work at
the physical layer (layer 1) of the OSI model. The device is a form of multiport
repeater. Repeater hubs also participate in collision detection, forwarding a jam
signal to all ports if it detects a collision.
4. Bridge: A network bridge connects multiple network segments at the data link
layer (Layer 2) of the OSI model. In Ethernet networks, the term bridge formally
means a device that behaves according to the IEEE 802.1 D standards. A bridge and
switch are very much alike; a switch being a bridge with numerous ports. Switch or
Layer 2 switch is often used interchangeably with bridge. Bridges can analyze
incoming data packets to determine if the bridge is able to send the given packet to
another segment of the network.
transferred from one network to another. Where multiple routers are used in a large
collection of interconnected networks, the routers exchange information about target
system addresses, so that each router can build up a table showing the preferred
paths between any two systems on the interconnected networks.
6. Gate Way: In a communications network, a network node equipped for interfacing
with another network that uses different protocols.
a. A gateway may contain devices such as protocol translators, impedance
matching devices, rate converters, fault isolators, or signal translators as
necessary to provide system interoperability. It also requires the
establishment of mutually acceptable administrative procedures between
both networks.
b. A protocol translation/mapping gateway interconnects networks with
different network protocol technologies by performing the required
protocol conversions.
VIVA-VOCE
Q3.Define Router?
A3. A device that forwards data packets along networks. A router is connected to at least two
networks, commonly two LANs or WANs or a LAN and its ISP.s network. Routers are located at
gateways, the places where two or more networks connect.
Q4. How many pairs of stations can simultaneously communicate on Ethernet LAN?
A4. One
Q5.A modem that is attached to the telephone system by jamming the phone's handset into two
flexible receptacles in the coupler?
A5. Acoustic coupler
Q7. As we know parallel transmission is faster than serial transmission. Name the device which
converts parallel to serial transmission.
A7. Multiplexer.
EXPERIMENT NO-4
AIM: a) To study the process of ASK modulation& demodulation
THEORY:
Modulation also allows different data streams to be transmitted over the same channel. This
process is called as ‘Multiplexing’ & result in a considerable saving in bandwidth no of channels
to be used. Also it increases the channel efficiency. The variation of particular parameter
variation of the carrier wave give rise to various modulation techniques. Some of the basic
modulation techniques are described as under. ASK:-
In this modulation involves the variation of the amplitude of the carrier waves in accordance
with the data stream. The simplest method of modulating a carrier with a data stream is to change
the amplitude of the carrier wave every time the data changes. This modulation technique is
known as amplitude shift keying. The simplest way of achieving amplitude shift keying is ‘ON’
the carrier whenever the data bit is ‘HIGH’ & switching ‘OFF’ when the data bit is low i.e. the
transmitter outputs the carrier for HIGH & totally suppresses the carrier for low. This technique
is known as ON-OFF keying Fig. illustrates the amplitude shift keying for the given data stream.
Thus,
b) Binary FSK is a form of constant-amplitude angle modulation and the modulating signal is a
binary pulse stream that varies between two discreate voltage levels but not continuous changing
analog signal. In FSK, the carrier amplitude(Vc) remains constant with modulation and the
carrier radian frequency(wc) shifts by an amount equal to +w/2. The frequency shift is
proportional to the amplitude and polarity of the input binary signal. For example, a binary 1
could be +1 volt and a binary zero could be -1 volt producing frequency shifts of +delta(w)/2 and
–delta(w)/2 respectively. The rate at which the carrier frequency shifts is equal to the rate of
change of the binary input signal vm(t). thus the output carrier frequency deviates(shifts) between
wc+delta(w)/2 and wc-delta(w)/2 at the rate equal to fm.
2. Set the data selection switch (‘DATA SELECTION’) to the desired code(say 11001100).
3. Set the switch (DATA ON-OFF) ON position. Observe the 8 bit Word pattern at TP12.
4. Observe the data clock at TP1 and also observe the NRZ(L) at TP2,RZ at TP3,NRZ(M) at
TP4, BIPHASE(MARK) at TP5,BIPHASE(MANCHESTER) at TP6.
5.Connect the patch cord as shown in diagram 1.Observe the corresponding FSK output at(when
data is logic ‘1’, the frequency is high and data is logic ‘0’ the frequency is low)TP8.
6. Repeat the step 5 for other inputs.(like NRZ(M),RZ,BIPHASE) observe the corresponding
FSK outputs.
7. Now change the data selection and repeat the above steps 3 to 6 and observe the corresponding
FSK outputs.
c) The PSK is a form of angle modulated, constant amplitude digital modulation. Digital
communications because important with the expansion of the use of computers and data
processing, and have continued to develop into a major industry providing the interconnection of
computer peripherals and transmission of data between distant sites. Phase shift keying is a
relatively new system, in which the carrier may be phase shifted by +90 degree for a mark, and
by-90 degrees for a space. PSK has a number of similarities to FSK in may aspects, as in FSK,
frequency of the carrier is shifted according to the modulating square wave.
IC CD 4051 is an analog multiplexer to which carrier is applied with and without 180 degree
phase shift to the two multiplex inputs of the IC. Modulating data input is applied to its control
input. Depending upon the level of the control signal, carrier signal applied with or without phase
shift is steered to the output. the 180 degree phase shift to the carrier signal created by an
operational amplifier using 741C.
1. Now switch ON the trainer and see that the supply LED glows.
4. Now the connect the carrier output TP1 to the carrier input of PSK modulator TP2 using patch
chord(as shown in dig 1).
5. Connect the d1 to data input of PSK modulator TP3(As shown.in dig 1).
6. Observe the phase shifted PSK output waveform on CRO on channel 1 and corresponding data
output on channel 2.
7. Repeat the steps 4,5,6 for data outputs D2,D3,D4 and observe the PSK outputs.
8. connect the PSK modulation output TP6 to the PSK input of demodulation TP4(as shown in
dig 2).
9. connect the carrier output TP1 to the carrier input of PSK demodulation TP5.(As shown in dig
2).
10. Now, observe the PSK demodulated output at TP7 on CRO at channel 1 and corresponding
data output on channel 2.
RESULT: We have generated wave form using ASK, FSK and PSK.
VIVA-VOCE
Q1: .In digital communication, why PCM (Pulse Code Modulation) is preferred than PAM (Pulse
Amplitude Modulation).
A1. (i) PCM is free from noise in interfering signals. It is also coded electrical signal.
(ii) It permits use of repeater for long distance transmission.
EXPERIMENT NO-5
AIM: To study 16 QAM Modulation with 4 bit encoding and decoding.
THEORY: 16-QAM-In M-QAM, and this one is for M = 16, we vary not just the phase of the
symbol but also the amplitude. In PSK, all symbols sat on a circle so they all had the same
amplitude. Here the points closer to the axes have lesser amplitudes and hence energy than some
others. We can compute the X and Y axis values of each of these points and depending on the
total power we want, we can set the value of a. For typical Constellation, set a = 1. If we call the
symbols integers then they range from 0 to 15. We show a sequence of random integers up 15 in
signal s1 below that we will use these to create a 16QAM signal.
SYMBOL BIT PATTERN PHASE MAGNITUDE
We can now multiply these signals with the cosine and the sine wave carriers. Then
add (or subtract) the two and you have the modulated carrier shown .
VIVA-VOCE
A3. The bit rate is divided into one –third of the incoming data rate.
A7. The bit rate of a 16 –QAM is divided into one-fourth of the incoming data rate.
EXPERIMENT NO-6
AIM: To Configure Hub / Switch.
THEORY: Hubs, switches, and routers are all devices which let you connect one or more
computers to other computers, networked devices, or to other networks. Each has two or more
connectors called ports into which you plug in the cables to make the connection. Varying
degrees of magic happen inside the device, and therein lies the difference. I often see the terms
misused so let's clarify what each one really means. A hub is typically the least expensive, least
intelligent, and least complicated of the three. Its job is very simple: anything that comes in one
port is sent out to the others. That's it. Every computer connected to the hub "sees" everything
that every other computer on the hub sees. The hub itself is blissfully ignorant of the data being
transmitted. For years, simple hubs have been quick and easy ways to connect computers in small
networks.
A switch does essentially what a hub does but more efficiently. By paying attention to the traffic
that comes across it, it can "learn" where particular addresses are. For example, if it sees traffic
from machine A coming in on port 2, it now knows that machine A is connected to that port and
that traffic to machine A needs to only be sent to that port and not any of the others. The net
result of using a switch over a hub is that most of the network traffic only goes where it needs to
rather than to every port. On busy networks this can make the network significantly faster.
48 Port Switch
Although hubs and switches both glue the PCs in a network together, a switch is more expensive
and a network built with switches is generally considered faster than one built with hubs. When a
hub receives a packet (chunk) of data (a frame in Ethernet lingo) at one of its ports from a PC on
the network, it transmits (repeats) the packet to all of its ports and, thus, to all of the other PCs on
the network. If two or more PCs on the network try to send packets at the same time a collision
is said to occur. When that happens all of the PCs have to go though a routine to resolve the
conflict. The process is prescribed in the Ethernet Carrier Sense Multiple Access with Collision
Detection (CSMA/CD) protocol. Each Ethernet Adapter has both a receiver and a transmitter. If
the adapters didn't have to listen with their receivers for collisions they would be able to send
data at the same time they are receiving it (full duplex). Because they have to operate at half
duplex (data flows one way at a time) and a hub retransmits data from one PC to all of the PCs,
the maximum bandwidth is 100 MHz and that bandwidth is shared by all of the PC's connected to
the hub. The result is when a person using a computer on a hub downloads a large file or group of
files from another computer the network becomes congested. In a 10 MHz 10Base-T network the
affect is to slow the network to nearly a crawl. The affect on a small, 100 Mbps (million bits per
second), 5-port network is not as significant.
When the switch receives a packet, it reads the destination address from the header information in
the packet, establishes a temporary connection between the source and destination ports, sends
the packet on its way, and then terminates the connection.
Picture a switch as making multiple temporary crossover cable connections between pairs of
computers (the cables are actually straight-thru cables; the crossover function is done inside the
switch). High-speed electronics in the switch automatically connect the end of one cable (source
port) from a sending computer to the end of another cable (destination port) going to the
receiving computer on a per packet basis. Multiple connections like this can occur
simultaneously. It's as simple as that. And like a crossover cable between two PCs, PC's on an
Ethernet switch do not share the transmission media, do not experience collisions or have to
listen for them, can operate in a full-duplex mode, have bandwidth as high as 200 Mbps, 100
Mbps each way, and do not share this bandwidth with other PCs on the switch. In short, a switch
is "more better."
VIVA-VOCE
Q3.Define Router?
A3. A device that forwards data packets along networks. A router is connected to at least two
networks, commonly two LANs or WANs or a LAN and its ISP.s network. Routers are located at
gateways, the places where two or more networks connect.
Q4. How many pairs of stations can simultaneously communicate on Ethernet LAN?
A4. One
Q5.A modem that is attached to the telephone system by jamming the phone's handset into two
flexible receptacles in the coupler?
A5. Acoustic coupler
Q7. As we know parallel transmission is faster than serial transmission. Name the device which
converts parallel to serial transmission.
A7. Multiplexer.
EXPERIMENT NO-7
AIM: Connect the computers in Local Area Network.
THEORY: A local area network (LAN) is a collection of devices connected together in one
physical location, such as a building, office, or home. A LAN can be small or large, ranging
from a home network with one user to an enterprise network with thousands of users and
devices in an office or school.
Regardless of size, a LAN's single defining characteristic is that it connects devices that are
in a single, limited area. In contrast, a wide area network (WAN) or metropolitan area
network (MAN) covers larger geographic areas. Some WANs and MANs connect many
LANs together.
7. Under Internet Connection Sharing, select the Allow other network users to
connect through this computer's Internet connection check box.
8. If you are sharing a dial-up Internet connection, select the Establish a dial-up
connection whenever a computer on my network attempts to access the Internet
check box if you want to permit your computer to automatically connect to the
Internet.
9. Click OK. You receive the following message:
When Internet Connection Sharing is enabled, your LAN adapter will be set to use
IP address 192.168.0.1. Your computer may lose connectivity with other computers
on your network. If these other computers have static IP addresses, it is a good idea
to set them to obtain their IP addresses automatically. Are you sure you want to
enable Internet Connection Sharing?
10. Click Yes.
The connection to the Internet is shared to other computers on the local area network
(LAN).
The network adapter that is connected to the LAN is configured with a static IP
address of 192.168.0.1 and a subnet mask of 255.255.255.0.
Note: You can also assign a unique static IP address in the range of 192.168.0.2 to
192.168.0.254. For example, you can assign the following static IP address, subnet
mask, and default gateway:
8. IP Address 192.168.31.202
9. Subnet mask 255.255.255.0
Default gateway 192.168.31.1
In the Local Area Connection Properties dialog box, click OK.
Quit Control Panel.
VIVA-VOCE
Q3. What does the term “selection process” signify in bus topology?
A3. Primary message inquiring if secondary is ready to receive traffic
EXPERIMENT- 8
AIM: Understand the subnet mask.
THEORY:
A subnet mask is a 32 bits address used to distinguish between a network address and a host
address in IP address. A subnet mask identifies which part of an IP address is the network address
and the host address. They are not shown inside the data packets traversing the Internet. They
carry the destination IP address, which a router will match with a subnet.
Represe
nt network 0 represent hosts
Class Default subnet mask No. of networks No. of host per network
A 255.0.0.0 256 16,777,214
B 255.255.0.0 65,536 65,534
C 255.255.255.0 16,77,216 126
VIVA-VOCE
Q1. What is the format of IP address?
Answer: 32 bit
Q9. The design of the Internet protocol suites adhere to the ________ principle.
Answer: End to End principle
EXPERIMENT-9
AIM: Understand the need of a routing mechanism in a router
THEORY:
Network routing is the process of selecting a path across one or more networks. The principles of
routing can apply to any type of network, from telephone networks to public transportation. In
packet-switching networks, such as the Internet, routing selects the paths for Internet Protocol
(IP) packets to travel from their origin to their destination. This Internet routing decisions are
made by specialized pieces of network hardware called routers.
Routers refer to internal routing tables to make decisions about how to route packets along
network paths. A routing table records the paths that packets should take to reach every
destination that the router is responsible for. Think of train timetables, which train passengers
consult to decide which train to catch. Routing tables are like that, but for network paths rather
than trains.
Routers work in the following way: when a router receives a packet, it reads the headers* of the
packet to see its intended destination, like the way a train conductor may check a passenger's
tickets to determine which train they should go on. It then determines where to route the packet
based on information in its routing tables.
Routers do this millions of times a second with millions of packets. As a packet travels to its
destination, it may be routed several times by different routers.
Routing tables can either be static or dynamic. Static routing tables do not change. A network
administrator manually sets up static routing tables. This essentially sets in stone the routes data
packets take across the network, unless the administrator manually updates the tables.
Dynamic routing tables update automatically. Dynamic routers use various routing protocols (see
below) to determine the shortest and fastest paths. They also make this determination based on
how long it takes packets to reach their destination — similar to the way Google Maps, Waze,
and other GPS services determine the best driving routes based on past driving performance and
current driving conditions.
Dynamic routing requires more computing power, which is why smaller networks may rely on
static routing. But for medium-sized and large networks, dynamic routing is much more efficient.
The following protocols help data packets find their way across the Internet:
IP: The Internet Protocol (IP) specifies the origin and destination for each data packet. Routers
inspect each packet's IP header to identify where to send them.
BGP: The Border Gateway Protocol (BGP) routing protocol is used to announce which networks
control which IP addresses, and which networks connect to each other. (The large networks that
make these BGP announcements are called autonomous systems.) BGP is a dynamic routing
protocol.
OSPF: The Open Shortest Path First (OSPF) protocol is commonly used by network routers to
dynamically identify the fastest and shortest available routes for sending packets to their
destination.
RIP: The Routing Information Protocol (RIP) uses "hop count" to find the shortest path from one
network to another, where "hop count" means number of routers a packet must pass through on
the way. (When a packet goes from one network to another, this is known as a "hop.")
The routing mechanism invokes the appropriate error processor depending on the error code
provided by the node abnormal condition program. Groups of one or more error codes are
defined in the DFHSNEP macro. Each group is associated with an index (in the range X'01'
through X'FF') and an error processor.
VIVA-VOCE
Q2._________ in a stack is responsible for forwarding tables and the central ACL.
Answer: Master switch
Q3.For global unicast addresses, _______ part of the address is allotted by the RIR, or
Regional Internet Registry
Answer: First 23 bits
Q5.__________ command is used to find the joined multicast groups for an IPv6
interface.
Answer: Router# show ipv6 interface gi 0/1
Q8.The default number of routes that RIPv2 will load balance is a total of _______
Answer: 4
Q10._________ is the supported maximum number of 3750 switches that can stacked.
Answer: 9 switches
EXPERIMENT NO-10
AIM: Learn how to configure a router with the static routing
THEORY:
Routers forward packets using either route information from route table entries that you manually
configure or the route information that is calculated using dynamic routing algorithms.
Static routes, which define explicit paths between two routers, cannot be automatically updated;
you must manually reconfigure static routes when network changes occur. Static routes use less
bandwidth than dynamic routes. No CPU cycles are used to calculate and analyze routing
updates.
You can supplement dynamic routes with static routes where appropriate. You can redistribute
static routes into dynamic routing algorithms but you cannot redistribute routing information
calculated by dynamic routing algorithms into the static routing table.
You should use static routes in environments where network traffic is predictable and where the
network design is simple. You should not use static routes in large, constantly changing networks
because static routes cannot react to network changes. Most networks use dynamic routes to
communicate between routers but may have one or two static routes configured for special cases.
Static routes are also useful for specifying a gateway of last resort (a default router to which all
unroutable packets are sent).
PROCEDURE:
SUMMARY STEPS
1. Configure terminal
2. ip route {ip-prefix | ip-addr ip-mask} {[next-hop | nh-prefix] | [interface next-hop | nh-prefix]}
[tag tag-value [pref]]
3. (Optional) show ip static-route
4. (Optional) copy running-config startup-config
DETAILED STEPS
Command Purpose
Step 2 ip route {ip-prefix | ip-addr ip- Configures a static route and the interface for this
mask} {[next-hop | nh-prefix] | static route. You can optionally configure the next-
[interface next-hop | nh- hop address. The preference value sets the
prefix]} [tag tag-value [pref] administrative distance. The range is from 1 to 255.
Example: The default is 1.
switch(config)# ip route
192.0.2.0/8 ethernet 1/2
192.0.2.4
VIVA-VOCE
Q4.Which command will wipe out all current NAT translations in the NAT table?
Answer: Router#clear ip nat translation *
Q5.Which protocol and port does NTP use for time synchronization?
Answer: UDP/123
Q8._________ protocol will encrypt the entire packet from the switch or router to the
AAA server?
Answer: TACACS+
Q9.What is the default encryption method for passwords, when you configure a line
password?
Answer: Clear text
EXPERIMENT NO- 11
1. RIP
PROCEDURE:
Develop a Topology shown in figure given below.
1. Configure all Routers
2. Implement RIP protocols in Router to configure Network.
Router0 configuration.....
started! Router>
Router>en
Router#config
t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname router0
router0(config)#int lo0
router0(config‐if)#int f0/0
Building
configuration... [OK]
router0#
router0#
router0>
router0>en
router0#confi
gt
router0(config‐router)#net 10.0.0.0
router0(config‐router)# router0(config‐
router)#end
router0#
Router1 Configuration.....
Router>enabe
Router#confit
Router(config‐if)#no
shut Router(config‐
if)#int f0/1
[OK]
Router
#
Router
#
Router
#
Router>
Router>en
Router#con t
% Ambiguous command:
"con t" Router#co t
% Ambiguous command:
"co t" Router#conf t
Router(config‐router)#net
10.0.0.0 Router(config‐router)#
Router(config‐router)#
Router(config‐router)#end
Router2 Configuration....
started! Router>en
Router#config t
Router (config‐if)#no
shut Router(config‐
if)#int f0/0
Router#wr
Building configuration...
[OK]
Router
#
Router
#
Router
#
%LINEPROTO‐5‐UPDOWN: Line protocol on Interface FastEthernet0/1, changed state
to up
DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 48
GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)
Router>
Router>
Router>en
Router#show ip route
subnets
C 10.1.3.0 is directly connected, Loopback0
C 10.1.23.0 is directly connected,
FastEthernet0/0 C 10.1.34.0 is directly
connected, FastEthernet0/1 Router#config t
Router#
Router#show ip
route
10.0.0.0/24 is subnetted, 7
subnets
R 10.1.1.0 [120/2] via 10.1.23.1, 00:00:19, FastEthernet0/0
R 10.1.2.0 [120/1] via 10.1.23.1, 00:00:19, FastEthernet0/0
Router#
Router#
Router3 Configuration.......
started! Router>
Router>en
Router#confit
Router(config‐if)#int f0/1
Building configuration...
[OK]
Router#
Router#
Router#show ip route
Router(config‐router)#net 10.0.0.0
Router(config‐router)#
Router(config‐router)#end
10.0.0.0/24 is subnetted, 7
subnets
R 10.1.1.0 [120/1] via 10.1.14.1, 00:00:09, FastEthernet0/1
R 10.1.2.0 [120/2] via 10.1.34.1, 00:00:14, FastEthernet0/0
VIVA-VOCE
Q1. A _________ is a device that forwards data that is not explicitly destined to it.
Ans : Router
Ans : 2
Ans : 2
Q5. An __________ distributes routing information between two different autonomous systems
or organization.
Ans: ICMPv6
Q7. Which type of Ethernet framing is used for TCP/IP and DEC net?
Ans: Ethernet 802.2
Q8. Which NetWare protocol works on layer 3–network layer—of the OSI model?
Ans : IPX
Ans : NLSP
Q10. A Distance Vector router running distance vector protocol advertises its connected routes
and learns new routes from its neighbors.
Ans : Yes
EXPERIMENT NO-12
PROCEDURE:
VIVA-VOCE
C. Delay time
D. Stability
Q2. The ……… protocol allows the administrator to assign a cost, called the metric, to
each route.
A. OSPF
B. RIP
C. BGP
D. BBGP
Q3.If there is only one routing sequence for each source destination pair, the scheme is
known as …..
A. static routing
B. fixed alternative routing
C. standard routing
D. dynamic routing
Q4.The Open Shortest Path First(OSPF) protocol is an intra domain routing protocol
based on …….. routing.
A. distance vector
B. link state
C. path vector
D. non distance vector
Q5.An/A ……….routing scheme is designed to enable switches to react to changing
traffic patterns on the network.
A. static routing
B. fixed alternative routing
C. standard routing
D. dynamic routing
Q6.The Routing Information Protocol(RIP) is an intra domain routing based on
……..routing.
A. distance vector
B. link state
C. path vector
D. distance code
Q7.The term …….. refers to which node or nodes in the network are responsible for the
routing decision.
A. decision place
B. routing place
C. node place
D. switching place
Q8.In ……. routing the least cost route between any two nodes is the minimum
distance.
A. path vector
B. distance vector
C. link state
D. switching
Q9.For centralized routing the decision is made by some designated node called ……
A. designated center
B. control center
C. network center
D. network control center
Q10. For purposes of routing, the Internet is divided into …….
A. wide area networks
B. autonomous networks
C. local area networks
D. autonomous system
Q11. In ………. a route is selected for each destination pair of nodes in the network.
A. flooding
B. variable routing
C. fixed routing
D. random routing
Q12. To create a neighborhood relationship, a router running BGP sends an ……….
message.
A. open
B. update
C. keep alive
D. close
Q13. The technique which requires no network information required is ….
A. flooding
B. variable routing
C. fixed routing
D. random routing
Q14. An area is ….
A. part of an AS
B. composed of at least two AS
C. another term for an AS
D. composed more than two AS
Q15. Which of the following produces high traffic network?
A. Variable routing
B. Flooding
C. Fixed routing
D. Random routing
Q16. In ……….. routing, we assume that there is one node (or more) in each
autonomous system that acts on behave of the entire autonomous system.
A. distant vector
B. path vector
C. link state
D. multipoint
Q17. When a direct delivery is made, both the deliverer and receiver have the same ….
A. routing table
B. host id
C. IP address
D. Net id
Q18. In OSPF, a ……… link is a network with several routers attached to it.
A. point-to-point
B. transient
C. stub
D. multipoint
Q19. In ……. routing, the mask and the destination address are both 0.0.0.0 in routing
table.
A. next-hop
B. host-specific
C. network-specific
D. default
Q20. In ………. the router forwards the receive packet through only one of its
interfaces.
A. unicasting
B. multicasting
C. broadcasting
D. point to point
ANSWERS:
1) C. Delay time
2) A. OSPF
3) B. fixed alternative routing
4) B. link state
5) C. standard routing
6) A. distance vector
7) A. decision place
8) B. distance vector
9) D. network control center
10) D. autonomous system
11) C. fixed routing
12) B. update
13) A. flooding
14) A. part of an AS
15) B. Flooding
16) B. path vector
17) D. Net id
18) B. transient
19) D. default
20) B. multicasting