0% found this document useful (0 votes)
228 views60 pages

Data Comm. Networking Lab Manual (Ece Final)

Uploaded by

lovekumar152007
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
228 views60 pages

Data Comm. Networking Lab Manual (Ece Final)

Uploaded by

lovekumar152007
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 60

GANGA INSTITUTE OF TECHNOLOGY AND

MANAGEMENT, KABLANA

DEPARTMENT OF ELECTRONICS & COMMUNICATION


ENGINEERING

LAB FILE
COURSE NAME: DATA COMMUNICATION NETWORKING LAB

COURSE CODE: LC-ECE-405 G

SUBMITTED BY SUBMITTED TO

NAME- PRIYANSHU YADAV SATISH KUMAR


ROLL NO-20BTECE003 A.P (ECE)
SEMSETER- 7th GITAM, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT


VISION
GITAM aims to be an outstanding Institute in India through academic excellence in the field of
Technology and Management to fulfill the need of the Industry and serve the society.

MISSION
 To provide healthy environment to our students as well as faculty members.
 To achieve excellence in technical education.
 To promote holistic development of students through interaction with alumni, academia,
Industry and expert lectures.
 To attract nurture and retain the best faculty and technical manpower.
 To contribute to the society by inculcating professional ethics in the students.
 To promote research and development Initiatives.

DEPARTMENT OF ELECTRONICS & COMMUNICATION


ENGINEERING
VISION
The Department of Electronics and Communication Engineering endeavors to develop high
quality, technically competent and socially responsible engineers.

MISSION
 To have adequate mechanisms by improving the understanding and implementation of
theoretical concepts in practical scenario.
 To develop technical manpower by organizing workshops, expert lectures and industrial
visits on regular basis.
 To impart quality teaching-learning experience with state of the art laboratories.
 To prepare the students to meet the global needs of Industry and Society by inculcating
professional ethics.

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 1


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

DEPARTMENT OF ELECTRONICS & COMMUNICATION


ENGINEERING
PROGRAM OUTCOMES/PROGRAM SPECIFIC OUTCOMES
Engineering Graduates will be able to:
PO-1 Engineering Knowledge: Apply the knowledge of mathematics, science, engineering
fundamentals, and an engineering specialization to the solution of complex engineering
problems.
PO-2 Problem Analysis: Identify, formulate, review research literature, and analyze complex
engineering problems reaching substantiated conclusions using first principles of mathematics,
natural sciences, and engineering sciences.

PO-3 Design/Development of Solutions: Design solutions for complex engineering problems


and design system components or processes that meet the specified needs with appropriate
consideration for the public health and safety, and the cultural, societal, and environmental
considerations.

PO-4 Conduct Investigations of Complex Problems: Use research-based knowledge and


research methods including design of experiments, analysis and interpretation of data, and
synthesis of the information to provide valid conclusions.

PO-5 Modern Tool Usage: Create, select, and apply appropriate techniques, resources, and
modern engineering and IT tools including prediction and modeling to complex engineering
activities with an understanding of the limitation.

PO-6 The Engineer and Society: Apply reasoning informed by the contextual knowledge to
assess societal, health, safety, legal and cultural issues and the consequent responsibilities
relevant to the professional engineering practice.

PO-7 Environment and Sustainability: Understand the impact of the professional engineering
solutions in societal and environmental contexts, and demonstrate the knowledge of, and need for
sustainable development.

PO-8 Ethics: Apply ethical principles and commit to professional ethics and responsibilities and
norms of the engineering practice.

PO-9 Individual and Teamwork: Function effectively as an individual, and as a member or


leader in diverse teams, and in multidisciplinary settings.

PO-10 Communication: Communicate effectively on complex engineering activities with the


engineering community and with society at large, such as, being able to comprehend and write
effective reports and design documentation, make effective presentations, and give and receive
clear instructions.

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 2


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

PO-11 Project Management and Finance: Demonstrate knowledge and understanding of the
engineering and management principles and apply the set to one’s own work, as a member and
leader in a team, to manage projects and in multi-disciplinary environments.

PO-12 Life-long Learning: Recognize the need for, and have the preparation and ability to
engage in independent and life-long learning in the broadest context of technological change
.
PROGRAM SPECIFIC OUTCOMES

PSO1: Analyze, design and implement hardware and software skills to solve problems in
electronics and communication engineering in various areas such as analog & digital electronics,
signal processing, communication, VLSI, embedded systems and its allied branches by applying
basic sciences and engineering fundamentals.

PSO2: Adapt rapid changes in the field of electronics and communication engineering and also
employs their skills for the multidisciplinary work environment, to be a successful
professional/entrepreneur and worthy citizen

PROGRAM EDUCATIONAL OBJECTIVES


PEO1: Devise and deliver efficient solutions to challenging problems in the field of Electronics
& Communications Engineering and allied disciplines using engineering fundamentals.
PEO2: Employ and cement their existence in reputed industrial organizations/ companies by
training them with soft skills, domain knowledge and managerial skills.
PEO3: Assess and motivate young engineers to become good human being and responsible
engineer for the welfare of society.
PEO4: Develop their attitude to adapt new ideas, innovations and technologies through lifelong
learning practices.

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 3


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

COURSE NAME: DATA COMMUNICATION NETWORKING LAB


COURSE CODE: LC-ECE-405 G
LIST OF EXPERIMENTS
Sr. Date of Date of Signature
Description
No. Execution Submission

1 To Study of different types of transmission media.

2 Study of different types of Network cables and Practically


implement the cross-wired cable and straight through cable
using clamping tool.
3 Study of Network Devices in Detail.

4 To Analyze ASK, FSK and PSK Modulation &


Demodulation.
5 To study 16 QAM Modulation with 4 bit encoding and
decoding.
6 To configure Hub / Switch.

7 Connect the computers in Local Area Network.

8 Understand the subnet mask.

9 Understand the need of a routing mechanism in a router.

10 Learn how to configure a router with the static routing.

Experiments beyond the syllabus

11 Configure a Network using Distance Vector Routing


protocol.
12 Configure Network using Link State Vector Routing protocol.

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 4


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

COURSE OUTCOMES

RBT
COs Data Communication Networking Lab (LC-ECE-405 G)
Level
LC-ECE-405 G.1 Define fundamental concepts of different types of transmission media. L1
LC-ECE-405 G 2 Understand various digital modulation techniques. L2
LC-ECE-405 G.3 Demonstrate LAN using different topologies like bus, ring, star & tree. L3

LC-ECE-405 G.4 Analyze the operation for configuration of modem and hub. L4

Articulation Matrix CO-PO MAPPING

CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 1 3

CO2 1 3 3 3 2 2 2 1

CO3 3 1 3 3 3 3 2 2 3 2 2 3

CO4 3 3 3 3

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 5


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

EXPERIMENT NO-1
AIM: To study different types of transmission media.
1. PC to PC Communication using Serial Port
2. Wireless Communication
3. Fiber Optics Communication

EQUIPMENTS NEEDED:

1. ST5001 Trainer Kit

2. ST5001 Software

3. Patch Cords (2mm)

4. 2 Serial Port Cables

5. Mains Power Cord

PC to PC Communication using Serial Port

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 6


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

Figure

PROCEDURE:

1. Connect patch cords as shown in figure

2. Connect mains power cord to the trainer and switch on the trainer.

3. Connect the serial port cables between one PC to Port1 & another PC to Port2.

4. To open the window as shown in figure 7, follow the steps.

Run ST5001 software on both PCs >> Click “Serial Port Interface” image/press

“Ctrl + S”/click “Options” on menu bar.

5. The software will open with default settings. Select the desired port settings.

6. After the port settings are done, open the port by clicking “Open Port” button.

7. To send data to other node enter the text in the window titled as “Enter Data to Transmit”.
Click on “Send” button to transmit.

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 7


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

8. Transmitted data will be displayed in the “Received Data” window and the ASCII codes of
each byte received is displayed in “Received Data in ASCII” window.

9. A small window at the sender side is given for transmission of ASCII code. Enter an ASCII
code in the window and then click “Send” button.

10. “Clear” buttons have been given to clear all windows.

11. Before changing the port settings close the port by clicking “Close Port” button and after
changing the parameters click “Open Port” button to reopen the port.

12. For hardware safety of the CPU, it is very important to connect serial port cables only after
making all the connections on board and after switching ON the trainer.

13. To see transmitted data connect CRO probe between test points TP8/TP27 and ground,
similarly to see received data connect it between TP7/TP26 and ground.

Wireless Communication

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 8


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

PROCEDURE:

1 .connect the patch chords as shown in figure.

2. The software will open with default settings. Set the same parameters on both the PCs. Baud
rate can be varied from 300bps to 2400bps. Select the desired baud rate. Select the desired port
settings.

3. After the port settings are done, open the port by clicking “Open Port” button.

4. To send data to other node enter the text in the window titled as “Enter Data to Transmit”.
Click on “Send” button to transmit.

5. Transmitted data will be displayed in the “Received Data” window and the ASCII codes of
each byte received is displayed in “Received Data in ASCII” window.

6. A small window at sender side is given for transmission of ASCII code. Enter an ASCII code
in the window and then click “Send” button.

7. “Clear” buttons are given to clear all windows.

8. Before changing the port settings close the port by clicking “Close Port” button and after
changing the parameters click “Open Port” button to reopen the port. For the hardware safety of
the CPU, it is very important to connect serial port cables only after making all the connections
on board and after switching on the trainer.

9. To see transmitted data connect CRO probe between test points TP18 and ground, similarly to
see received data connect it between TP19 and ground.

Fiber Optic Communication

THEORY:

The Fiber Optic Data Communications Link, End-to-End

We consider the simple fiber optic data link given below. This is the basic building block for a
fiber optic based network. A model of this simple link is shown in figure

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 9


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

Fiber optic data link

The illustration indicates the Source-User pair, Transmitter and Receiver. It also clearly shows
the fiber optic cable constituting the Transmission Medium as well as the connectors that provide
the interface of the Transmitter to the Transmission Medium and the Transmission Medium to the
Receiver. All of these are components of the simple fiber optic data link.

Transmitter:

The Transmitter component of figure 9 serves two functions. First, it must be a source of the light
coupled into the fiber optic cable. Secondly, it must modulate this light so as to represent the
binary data that it is receiving from the Source. The Source provides the data to the Transmitter
as some digital electrical signal. The Transmitter can then be thought of as Electro-Optical (EO)
transducer. Within the context of a fiber optic data link the modulating signal, the Information,
assumes only the values of '0' and '1.' The demodulation function in the Receiver will just be
looking for the presence or absence of energy during a bit time interval.

Two methods for modulating LEDs or LDs

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 10


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

Receiver:

The Receiver component of Figure 10 serves two functions. First, it must sense or detect the light
coupled out of the fiber optic cable then convert the light into an electrical signal. Secondly, it
must demodulate this light to determine the identity of the binary data that it represents. In total,
it must detect light and then measure the relevant information bearing light wave parameters in
the premises fiber optic data link context intensity in order to retrieve the Source's binary data.
The very heart of the Receiver is the means for sensing the light output of the fiber optic cable.
Light is detected and then converted to an electrical signal. The demodulation decision process is
carried out on the resulting electrical signal. The light detection is carried out by a photodiode.
This senses light and converts it into an

electrical current.

Example of Receiver block diagram

SMA Connector:

The Connector is a mechanical device mounted on the end of a fiber optic cable, light source,
Receiver or housing. It allows it to be mated to a similar device. The Transmitter provides the
information bearing light to the fiber optic cable through a connector. The Receiver gets the
information bearing light from the fiber optic cable through a connector. The connector must
direct light and collect light. It must also be easily attached and detached from equipment. This is
a key point. The connector is disconnect able.

SMA - The connector features a threaded cap and housing. The photograph of the SMA
connector used is provided in figure

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 11


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

SMA connector for glass optic cable

1. Half Duplex :

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 12


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

2. Full Duplex :

PROCEDURE:

1. Connect patch cords as shown in figure for Half duplex and for full duplex connections. To
open the window as shown in figure 14, follow the steps. Run ST5001 software on both PCs >>
Click “Fiber Optics Communication”image/press “Ctrl + S”/click “Options” on menu bar.

2. The software will open with default settings. Set the same parameters on both the PCs. Baud
rate can be varied from 2400bps to 115200bps. Select the desired baud rate. Select the desired
port settings.

3. After the port settings are done, open the port by clicking “Open Port” button.

6. To send data to other node enter the text in the window titled as “Enter Data to Transmit”.
Click on “Send” button to transmit.

4. Transmitted data will be displayed in the “Received Data” window and the ASCII codes of
each byte received is displayed in “Received Data in ASCII” window.

5. A small window at sender side is given for transmission of ASCII code. Enter an ASCII code
in the window and then click “Send” button.

6. “Clear” buttons are given to clear all windows.

RESULT: Different types of transmission media (PC to PC communication using serial port,
wireless communication and fiber optics communication has been successfully done.

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 13


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

PRECAUTIONS:

1. Make sure all the connections should be proper.


2. Before changing the port settings close the port by clicking “Close Port” button.
3. After changing the parameters click “Open Port” button to reopen the port.
4. Do not make connections while trainer kit is ON.

VIVA-VOCE

Q1. What is parallel Interface?


A1. It is the device through which 8 or more bits can be transmitted at a time.

Q2. What are different types of parallel Interfaces?


A2. These are Centronics, IEEE 488 etc.

Q3. What is full form of GPIB?


A3. General purpose Interface Bus.

Q4. What is the advantage of parallel Transmission over serial transmission?


A4. Data are transmitted faster than with serial interface.

Q5.How many pins are there in Centronics


A5. 36 pins

Q6.Give one application of Centronics?


A6.It is used in printers.

Q7.What is the disadvantage of parallel transmission?


A7.Higher transmission cost for transmission lines, especially when there are long distances
between the transmitter and receiver.

Q8.What does the term STB stand for?


A8.STROBE

Q9.What does the term AF stand for?


A9.Auto feed

Q10.What is the function for PRIME


A10. It is an active low signal outputted by the computer to clear the printer memory, including
the printer programming and the printer buffer.

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 14


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

EXPERIMENT NO-2
AIM: Study of different types of Network cables and practically implements the
cross-wired cable and straight through cable using clamping tool.

APPARATUS (COMPONENTS): RJ-45 connector, Climping Tool, Twisted pair


Cable.

PROCEDURE: To do these practical following steps should be done:

1) Start by stripping off about 2 inches of the plastic jacket off the end of
the cable. Be very careful at this point, as to not nick or cut into the wires,
which are inside. Doing so could alter the characteristics of your cable, or even
worse render is useless. Check the wires, one more time for nicks or cuts. If
there are any, just whack the whole end off, and start over.

2) Spread the wires apart, but be sure to hold onto the base of the jacket
with your other hand. You do not want the wires to become untwisted down
inside the jacket. Category 5 cable must only have 1/2 of an inch of 'untwisted'
wire at the end; otherwise it will be 'out of spec'. At this point, you obviously
have ALOT more than 1/2 of an inch of un-twisted wire.

3) You have 2 end jacks, which must be installed on your cable. If you are
using a pre-made cable, with one of the ends whacked off, you only have one
end to install - the crossed over end. Below are two diagrams, which show
how you need to arrange the cables for each type of cable end. Decide at this
point which end you are making and examine the associated picture below.

Diagram shows you how to prepare Cross wired connection

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 15


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

Diagram shows you how to prepare straight through wired connection

VIVA-VOCE

Q1.What are the four basic types of guided media?

A1. Open wire, twisted pair, Coaxial cable and optical fiber.

Q2.Give three advantage of optical fiber?

A2.Higher bandwidth, less attenuation, and immunity to electromagnetic interface

Q3.What are the disadvantages of optical fiber?

A3. Installation / maintenance, Unidirectional, and cost

Q4.What are the application of twisted pair cable?

A4.They are used in telephone lines, DSL line, and Local area network.

Q5.What is the applications of fiber optical cable?

A5.The fiber optical cable is used in cable TV, local area network Wide band network

Q6.What are the different types of propagation modes in optical fiber?

A6. The different types of propagation modes are multimode step and graded Index, single mode.

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 16


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

Q7.What is the frequency range of microwave?

A7.The frequency range of microwave is 1 and 300 GHz

Q8. What is max data capacity for optical fiber cable?

A8.1000 mbps

Q9.Define ground wave propagation?

A9. The propagation which follow the curvature of the earth. They carry frequencies up to 2Mhz.
AM is an example of Ground waves

Q10.Give two examples of unguided media?

A10.the two examples of unguided media are Wireless and Radio waves.

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 17


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

EXPERIMENT NO-3
AIM: Study of following Network Devices in Detail
a) Repeater
b) Hub
c) Switch
d) Bridge
e) Router
f) Gate Way

APPARATUS (SOFTWARE): No software or hardware needed.

PROCEDURE: Following should be done to understand this practical.

1. Repeater: Functioning at Physical Layer.A repeater is an electronic device that


receives a signal and retransmits it at a higher level and/or higher power, or onto the
other side of an obstruction, so that the signal can cover longer distances. Repeater
have two ports ,so cannot be use to connect for more than two devices

2. Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or
concentrator is a device for connecting multiple twisted pair or fiber optic Ethernet
devices together and making them act as a single network segment. Hubs work at
the physical layer (layer 1) of the OSI model. The device is a form of multiport
repeater. Repeater hubs also participate in collision detection, forwarding a jam
signal to all ports if it detects a collision.

3. Switch: A network switch or switching hub is a computer networking device


that connects network segments. The term commonly refers to a network bridge that
processes and routes data at the data link layer (layer 2) of the OSI model. Switches
that additionally process data at the network layer (layer 3 and above) are often
referred to as Layer 3 switches or multilayer switches.

4. Bridge: A network bridge connects multiple network segments at the data link
layer (Layer 2) of the OSI model. In Ethernet networks, the term bridge formally
means a device that behaves according to the IEEE 802.1 D standards. A bridge and
switch are very much alike; a switch being a bridge with numerous ports. Switch or
Layer 2 switch is often used interchangeably with bridge. Bridges can analyze
incoming data packets to determine if the bridge is able to send the given packet to
another segment of the network.

5. Router: A router is an electronic device that interconnects two or more


computer networks, and selectively interchanges packets of data between them.
Each data packet contains address information that a router can use to determine if
the source and destination are on the same network, or if the data packet must be

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 18


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

transferred from one network to another. Where multiple routers are used in a large
collection of interconnected networks, the routers exchange information about target
system addresses, so that each router can build up a table showing the preferred
paths between any two systems on the interconnected networks.
6. Gate Way: In a communications network, a network node equipped for interfacing
with another network that uses different protocols.
a. A gateway may contain devices such as protocol translators, impedance
matching devices, rate converters, fault isolators, or signal translators as
necessary to provide system interoperability. It also requires the
establishment of mutually acceptable administrative procedures between
both networks.
b. A protocol translation/mapping gateway interconnects networks with
different network protocol technologies by performing the required
protocol conversions.

VIVA-VOCE

Q1. Define Hub?


A1. Common connection point for devices in a network. Hubs are commonly used to connect
segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied
to the other ports so that all segments of the LAN can see all packets.

Q2. Define Switch?


A2. In networks, a device that filters and forwards packets between LAN segments. Switches
operate at the data link layer (layer 2) and sometimes the network layer (layer 3) of the OSI
Reference Model and therefore support any packet protocol.

Q3.Define Router?
A3. A device that forwards data packets along networks. A router is connected to at least two
networks, commonly two LANs or WANs or a LAN and its ISP.s network. Routers are located at
gateways, the places where two or more networks connect.

Q4. How many pairs of stations can simultaneously communicate on Ethernet LAN?
A4. One

Q5.A modem that is attached to the telephone system by jamming the phone's handset into two
flexible receptacles in the coupler?
A5. Acoustic coupler

Q6. On which layer does the hub work?


A6. Hubs work at the physical layer (layer 1) of the OSI model.

Q7. As we know parallel transmission is faster than serial transmission. Name the device which
converts parallel to serial transmission.
A7. Multiplexer.

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 19


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

EXPERIMENT NO-4
AIM: a) To study the process of ASK modulation& demodulation

b) To study the process of FSK modulation& demodulation

c) To study the process of PSK modulation& demodulation

THEORY:

Modulation also allows different data streams to be transmitted over the same channel. This
process is called as ‘Multiplexing’ & result in a considerable saving in bandwidth no of channels
to be used. Also it increases the channel efficiency. The variation of particular parameter
variation of the carrier wave give rise to various modulation techniques. Some of the basic
modulation techniques are described as under. ASK:-

In this modulation involves the variation of the amplitude of the carrier waves in accordance
with the data stream. The simplest method of modulating a carrier with a data stream is to change
the amplitude of the carrier wave every time the data changes. This modulation technique is
known as amplitude shift keying. The simplest way of achieving amplitude shift keying is ‘ON’
the carrier whenever the data bit is ‘HIGH’ & switching ‘OFF’ when the data bit is low i.e. the
transmitter outputs the carrier for HIGH & totally suppresses the carrier for low. This technique
is known as ON-OFF keying Fig. illustrates the amplitude shift keying for the given data stream.
Thus,

DATA = HIGH CARRIER TRANSMITTED

DATA = LOW CARRIER SUPPRESSED

PROCEDURE FOR ASK:


1. Connect the sine wave 500KHz from the carrier generator TP1 to the carrier input
of the modulator TP7.
2. And also connect data clock D1 i.e., modulation signal TP3 to the modulation
input TP8.
3. Switch ON the power supply.
4. Observe the output at TP9.
5. By varying the gain pot P3 observe the ASK output at TP10.
6. Adjusting the carrier offset and modulation offset we can observe the ASK
output.
7. By changing the carrier signal 1MHz and different data clocks D2,D3,D4
observe the output.

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 20


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

b) Binary FSK is a form of constant-amplitude angle modulation and the modulating signal is a
binary pulse stream that varies between two discreate voltage levels but not continuous changing
analog signal. In FSK, the carrier amplitude(Vc) remains constant with modulation and the
carrier radian frequency(wc) shifts by an amount equal to +w/2. The frequency shift is
proportional to the amplitude and polarity of the input binary signal. For example, a binary 1
could be +1 volt and a binary zero could be -1 volt producing frequency shifts of +delta(w)/2 and
–delta(w)/2 respectively. The rate at which the carrier frequency shifts is equal to the rate of
change of the binary input signal vm(t). thus the output carrier frequency deviates(shifts) between
wc+delta(w)/2 and wc-delta(w)/2 at the rate equal to fm.

PROCEDURE FOR FSK:

1. Switch ON the power supply.

2. Set the data selection switch (‘DATA SELECTION’) to the desired code(say 11001100).

3. Set the switch (DATA ON-OFF) ON position. Observe the 8 bit Word pattern at TP12.

4. Observe the data clock at TP1 and also observe the NRZ(L) at TP2,RZ at TP3,NRZ(M) at
TP4, BIPHASE(MARK) at TP5,BIPHASE(MANCHESTER) at TP6.

5.Connect the patch cord as shown in diagram 1.Observe the corresponding FSK output at(when
data is logic ‘1’, the frequency is high and data is logic ‘0’ the frequency is low)TP8.

6. Repeat the step 5 for other inputs.(like NRZ(M),RZ,BIPHASE) observe the corresponding
FSK outputs.

7. Now change the data selection and repeat the above steps 3 to 6 and observe the corresponding
FSK outputs.

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 21


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

c) The PSK is a form of angle modulated, constant amplitude digital modulation. Digital
communications because important with the expansion of the use of computers and data
processing, and have continued to develop into a major industry providing the interconnection of
computer peripherals and transmission of data between distant sites. Phase shift keying is a
relatively new system, in which the carrier may be phase shifted by +90 degree for a mark, and
by-90 degrees for a space. PSK has a number of similarities to FSK in may aspects, as in FSK,
frequency of the carrier is shifted according to the modulating square wave.

IC CD 4051 is an analog multiplexer to which carrier is applied with and without 180 degree
phase shift to the two multiplex inputs of the IC. Modulating data input is applied to its control
input. Depending upon the level of the control signal, carrier signal applied with or without phase
shift is steered to the output. the 180 degree phase shift to the carrier signal created by an
operational amplifier using 741C.

PROCEDURE FOR PSK:

1. Now switch ON the trainer and see that the supply LED glows.

2. Observe the carrier output at TP1.

3. Observe the data outputs(D1,D2,D3,D4).

4. Now the connect the carrier output TP1 to the carrier input of PSK modulator TP2 using patch
chord(as shown in dig 1).

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 22


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

5. Connect the d1 to data input of PSK modulator TP3(As shown.in dig 1).

6. Observe the phase shifted PSK output waveform on CRO on channel 1 and corresponding data
output on channel 2.

7. Repeat the steps 4,5,6 for data outputs D2,D3,D4 and observe the PSK outputs.

8. connect the PSK modulation output TP6 to the PSK input of demodulation TP4(as shown in
dig 2).

9. connect the carrier output TP1 to the carrier input of PSK demodulation TP5.(As shown in dig
2).

10. Now, observe the PSK demodulated output at TP7 on CRO at channel 1 and corresponding
data output on channel 2.

11. the demodulated output istrue replica of data output.

12. Repeat the steps 8 to 10 for other data outputs D2,D3,D4.

RESULT: We have generated wave form using ASK, FSK and PSK.

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 23


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

VIVA-VOCE

Q1: .In digital communication, why PCM (Pulse Code Modulation) is preferred than PAM (Pulse
Amplitude Modulation).
A1. (i) PCM is free from noise in interfering signals. It is also coded electrical signal.
(ii) It permits use of repeater for long distance transmission.

Q2: Define Pulse Amplitude Modulation?


A2.Amplitude of the pulse varies in accordance with the modulating signal.

Q3: What is the bandwidth required for QPSK?


A3: Bandwidth required will be same as required for ASK & PSK transmission.

Q4: Define trellis encoding?


A4: Method to increase transmission rates beyond 56kbps

Q5: State advantages of trellis encoding?


A5: Transmission rates beyond 56kbps are achieved.

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 24


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

EXPERIMENT NO-5
AIM: To study 16 QAM Modulation with 4 bit encoding and decoding.

THEORY: 16-QAM-In M-QAM, and this one is for M = 16, we vary not just the phase of the
symbol but also the amplitude. In PSK, all symbols sat on a circle so they all had the same
amplitude. Here the points closer to the axes have lesser amplitudes and hence energy than some
others. We can compute the X and Y axis values of each of these points and depending on the
total power we want, we can set the value of a. For typical Constellation, set a = 1. If we call the
symbols integers then they range from 0 to 15. We show a sequence of random integers up 15 in
signal s1 below that we will use these to create a 16QAM signal.
SYMBOL BIT PATTERN PHASE MAGNITUDE

S1 0000 -135º 0.311 V

S2 0001 -165º 0.850 V

S3 0010 -45º 0.311 V

S4 0011 -15º 0.850 V

S5 0100 -105º 0.850 V

S6 0101 -135° 1.161V

S7 0110 -75° 0.850 V

S8 0111 -45º 1.161V

S9 1000 +135° 0.311 V

S10 1001 +165° 0.850 V

S11 1010 +45° 0.311 V

S12 1011 +15° 0.850 V

S13 1100 +105° 0.850 V

S14 1101 +135° 1.161V

S15 1110 +75° 0.850 V

S16 1111 +45° 1.161V

We can now multiply these signals with the cosine and the sine wave carriers. Then
add (or subtract) the two and you have the modulated carrier shown .

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 25


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

16-QAM Modulated Waveform

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 26


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

PROCEDURE: Hardware Mode Steps

8. Use curser V1 and V2 for Analysis.

VIVA-VOCE

Q1.What does QAM stand for ?

A1.Quadrature –Amplitude Modulation.

Q2.In how many groups the data is divided in 8 QAM?

A2. Data is divided into three groups.

Q3.What is the bit rate of individual group in 8 QAM ?

A3. The bit rate is divided into one –third of the incoming data rate.

Q4.What level of converter is used in I and Q channel?

A4.2to 4 level converter is used in I and Q channel.

Q5.What is the difference between 8 QAM and 16 QAM?

A5.In 16 QAM m-array M=16 and in 8QAM M= 8.

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 27


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

Q6.In how many groups the data is divided 16 QAM.

A6. Data is divided into four groups.

Q7. What is the bit rate of individual group in 16 QAM?

A7. The bit rate of a 16 –QAM is divided into one-fourth of the incoming data rate.

Q8. Define Band with efficiency

A8.transmission Bit rate/ minimum band width.

Q9.How many 2 to 4 level converter is used in 16 QAM

A9.Two 2 to 4 level converter is used in 16 –QAM.

Q10. Different parts of communication System?

A10. a) The information b) Medium c) The carrier.

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 28


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

EXPERIMENT NO-6
AIM: To Configure Hub / Switch.

THEORY: Hubs, switches, and routers are all devices which let you connect one or more
computers to other computers, networked devices, or to other networks. Each has two or more
connectors called ports into which you plug in the cables to make the connection. Varying
degrees of magic happen inside the device, and therein lies the difference. I often see the terms
misused so let's clarify what each one really means. A hub is typically the least expensive, least
intelligent, and least complicated of the three. Its job is very simple: anything that comes in one
port is sent out to the others. That's it. Every computer connected to the hub "sees" everything
that every other computer on the hub sees. The hub itself is blissfully ignorant of the data being
transmitted. For years, simple hubs have been quick and easy ways to connect computers in small
networks.

A switch does essentially what a hub does but more efficiently. By paying attention to the traffic
that comes across it, it can "learn" where particular addresses are. For example, if it sees traffic
from machine A coming in on port 2, it now knows that machine A is connected to that port and
that traffic to machine A needs to only be sent to that port and not any of the others. The net
result of using a switch over a hub is that most of the network traffic only goes where it needs to
rather than to every port. On busy networks this can make the network significantly faster.

48 Port Switch

Although hubs and switches both glue the PCs in a network together, a switch is more expensive
and a network built with switches is generally considered faster than one built with hubs. When a
hub receives a packet (chunk) of data (a frame in Ethernet lingo) at one of its ports from a PC on
the network, it transmits (repeats) the packet to all of its ports and, thus, to all of the other PCs on

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 29


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

the network. If two or more PCs on the network try to send packets at the same time a collision
is said to occur. When that happens all of the PCs have to go though a routine to resolve the
conflict. The process is prescribed in the Ethernet Carrier Sense Multiple Access with Collision
Detection (CSMA/CD) protocol. Each Ethernet Adapter has both a receiver and a transmitter. If
the adapters didn't have to listen with their receivers for collisions they would be able to send
data at the same time they are receiving it (full duplex). Because they have to operate at half
duplex (data flows one way at a time) and a hub retransmits data from one PC to all of the PCs,
the maximum bandwidth is 100 MHz and that bandwidth is shared by all of the PC's connected to
the hub. The result is when a person using a computer on a hub downloads a large file or group of
files from another computer the network becomes congested. In a 10 MHz 10Base-T network the
affect is to slow the network to nearly a crawl. The affect on a small, 100 Mbps (million bits per
second), 5-port network is not as significant.

Two computers can be connected directly together in an


Ethernet with a crossover cable. A crossover cable doesn't
have a collision problem. The crossover cable doesn't have
delays caused by collisions, data can be sent in both
directions simultaneously, the maximum available
bandwidth is 200 Mbps, 100 Mbps each way, and there are
no other PC's with which the bandwidth must be shared.

When the switch receives a packet, it reads the destination address from the header information in
the packet, establishes a temporary connection between the source and destination ports, sends
the packet on its way, and then terminates the connection.

Picture a switch as making multiple temporary crossover cable connections between pairs of
computers (the cables are actually straight-thru cables; the crossover function is done inside the
switch). High-speed electronics in the switch automatically connect the end of one cable (source
port) from a sending computer to the end of another cable (destination port) going to the
receiving computer on a per packet basis. Multiple connections like this can occur
simultaneously. It's as simple as that. And like a crossover cable between two PCs, PC's on an
Ethernet switch do not share the transmission media, do not experience collisions or have to
listen for them, can operate in a full-duplex mode, have bandwidth as high as 200 Mbps, 100
Mbps each way, and do not share this bandwidth with other PCs on the switch. In short, a switch
is "more better."

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 30


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

VIVA-VOCE

Q1. Define Hub?


A1. Common connection point for devices in a network. Hubs are commonly used to connect
segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied
to the other ports so that all segments of the LAN can see all packets.

Q2. Define Switch?


A2. In networks, a device that filters and forwards packets between LAN segments. Switches
operate at the data link layer (layer 2) and sometimes the network layer (layer 3) of the OSI
Reference Model and therefore support any packet protocol.

Q3.Define Router?
A3. A device that forwards data packets along networks. A router is connected to at least two
networks, commonly two LANs or WANs or a LAN and its ISP.s network. Routers are located at
gateways, the places where two or more networks connect.

Q4. How many pairs of stations can simultaneously communicate on Ethernet LAN?
A4. One

Q5.A modem that is attached to the telephone system by jamming the phone's handset into two
flexible receptacles in the coupler?
A5. Acoustic coupler

Q6. On which layer does the hub work?


A6. Hubs work at the physical layer (layer 1) of the OSI model.

Q7. As we know parallel transmission is faster than serial transmission. Name the device which
converts parallel to serial transmission.
A7. Multiplexer.

Q8. Give one example of circuit switching?


A8.ISDN

Q9. Give an example of packet switching?


A9.X.25

Q10. What are the different types of network?


A10. LAN.GAN, WAN, MAN

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 31


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

EXPERIMENT NO-7
AIM: Connect the computers in Local Area Network.

THEORY: A local area network (LAN) is a collection of devices connected together in one
physical location, such as a building, office, or home. A LAN can be small or large, ranging
from a home network with one user to an enterprise network with thousands of users and
devices in an office or school.
Regardless of size, a LAN's single defining characteristic is that it connects devices that are
in a single, limited area. In contrast, a wide area network (WAN) or metropolitan area
network (MAN) covers larger geographic areas. Some WANs and MANs connect many
LANs together.

PROCEDURE: On the host computer


On the host computer, follow these steps to share the Internet connection:
1. Log on to the host computer as Administrator or as Owner.
2. Click Start, and then click Control Panel.
3. Click Network and Internet Connections.
4. Click Network Connections. Right-click the connection that you use to
connect to the Internet. For example, if you connect to the Internet by using a
modem, right-click the connection that you want under Dial-up / other network
available.
5. Click Properties.
6. Click the Advanced tab.
DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 32
GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

7. Under Internet Connection Sharing, select the Allow other network users to
connect through this computer's Internet connection check box.
8. If you are sharing a dial-up Internet connection, select the Establish a dial-up
connection whenever a computer on my network attempts to access the Internet
check box if you want to permit your computer to automatically connect to the
Internet.
9. Click OK. You receive the following message:
When Internet Connection Sharing is enabled, your LAN adapter will be set to use
IP address 192.168.0.1. Your computer may lose connectivity with other computers
on your network. If these other computers have static IP addresses, it is a good idea
to set them to obtain their IP addresses automatically. Are you sure you want to
enable Internet Connection Sharing?
10. Click Yes.
The connection to the Internet is shared to other computers on the local area network
(LAN).
The network adapter that is connected to the LAN is configured with a static IP
address of 192.168.0.1 and a subnet mask of 255.255.255.0.

On the client computer


To connect to the Internet by using the shared connection, you must confirm the
LAN adapter IP configuration, and then configure the client computer. To confirm
the LAN adapter IP configuration, follow these steps:

1. Log on to the client computer as Administrator or as Owner.


2. Click Start, and then click Control Panel.
3. Click Network and Internet Connections.
4. Click Network Connections.
5. Right-click Local Area Connection and then click Properties.
6. Click the General tab, click Internet Protocol (TCP/IP) in the connection uses
the following items list, and then click Properties.
7. In the Internet Protocol (TCP/IP) Properties dialog box, click Obtain an IP
address automatically (if it is not already selected), and then click OK.

Note: You can also assign a unique static IP address in the range of 192.168.0.2 to
192.168.0.254. For example, you can assign the following static IP address, subnet
mask, and default gateway:

8. IP Address 192.168.31.202
9. Subnet mask 255.255.255.0
Default gateway 192.168.31.1
In the Local Area Connection Properties dialog box, click OK.
Quit Control Panel.

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 33


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

VIVA-VOCE

Q1. Define topology?


A1.Physical composition of the network is defined as topology

Q2. What is poll?


A2. Primary message inquiring if secondary has any traffic to send

Q3. What does the term “selection process” signify in bus topology?
A3. Primary message inquiring if secondary is ready to receive traffic

Q4.What are the advantage of bus topology?


A4. Easy to connect, requires less cable

Q5.What are the disadvantages of bus topology?


A5. Entire network shuts down if there is a break in the main cable

Q6.In which topology terminators are required?


A6.Bus Topology.

Q7. What is the central device in star topology?


A7.Hub/switch.

Q8. What are the different types of network?


A8.LAN.GAN, WAN, MAN

Q9.What does the term GAN stand for?


A9.Global area network

Q10.Define the term CAN?


A10.Campus area network

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 34


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

EXPERIMENT- 8
AIM: Understand the subnet mask.

THEORY:
A subnet mask is a 32 bits address used to distinguish between a network address and a host
address in IP address. A subnet mask identifies which part of an IP address is the network address
and the host address. They are not shown inside the data packets traversing the Internet. They
carry the destination IP address, which a router will match with a subnet.

Represe
nt network 0 represent hosts

Two types of subnet masks are:


The default Subnet Mask is the number of bits which is reserved by the address class. Using this
default mask will accommodate a single network subnet in the relative class. A Custom Subnet
Mask can be defined by an administrator to accommodate many Network Methods of Subnet
Masking. We can subnet the masking process in two ways: Straight or Short-cut.
1) Straight
You should use the binary notation method for both the address and the mask and then apply the
AND operation to get the block address.
2) Short-Cut Method
In case the byte in the mask is 255, you need to copy the byte in the destination address. When
the byte in the mask is 0, then you need to replace the byte in the address with 0.
When the byte in the mask is neither 255 nor 0, then you should write the mask and the address
in binary and use the AND operation.
In case if the extracted network address matches the local network ID, and the destination is
located on the local Network. However, if they do not match, the message must be routed outside
the local Network.

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 35


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

Class Default subnet mask No. of networks No. of host per network
A 255.0.0.0 256 16,777,214
B 255.255.0.0 65,536 65,534
C 255.255.255.0 16,77,216 126

RESULT: We have studied the subnet mask.

VIVA-VOCE
Q1. What is the format of IP address?
Answer: 32 bit

Q2. Version 6 of IP address has how many bits.


Answer:128 bits

Q3. IANA stands for __________


Answer: Internet Assigned Numbers Authority

Q4. RIR stands for ________


c) Answer: Regional Internet Registries

Q5. Geo location software is used by host.


a) True
b) False
Answer: a

Q6. How many version /s of IP’s are there?


Answer: 2 versions

Q7. VLSM stands for ________


Answer: Variable Length Subnet Masking

Q8. Many desktops and operating systems include which protocol?


Answer: IPv6 protocol

Q9. The design of the Internet protocol suites adhere to the ________ principle.
Answer: End to End principle

Q10. ___________ adjusts the segment size to be smaller than MTU.


Answer: Transmission Control Protocol

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 36


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

EXPERIMENT-9
AIM: Understand the need of a routing mechanism in a router

THEORY:
Network routing is the process of selecting a path across one or more networks. The principles of
routing can apply to any type of network, from telephone networks to public transportation. In
packet-switching networks, such as the Internet, routing selects the paths for Internet Protocol
(IP) packets to travel from their origin to their destination. This Internet routing decisions are
made by specialized pieces of network hardware called routers.

Routers refer to internal routing tables to make decisions about how to route packets along
network paths. A routing table records the paths that packets should take to reach every
destination that the router is responsible for. Think of train timetables, which train passengers
consult to decide which train to catch. Routing tables are like that, but for network paths rather
than trains.

Routers work in the following way: when a router receives a packet, it reads the headers* of the
packet to see its intended destination, like the way a train conductor may check a passenger's
tickets to determine which train they should go on. It then determines where to route the packet
based on information in its routing tables.

Routers do this millions of times a second with millions of packets. As a packet travels to its
destination, it may be routed several times by different routers.

Routing tables can either be static or dynamic. Static routing tables do not change. A network
administrator manually sets up static routing tables. This essentially sets in stone the routes data
packets take across the network, unless the administrator manually updates the tables.

Dynamic routing tables update automatically. Dynamic routers use various routing protocols (see
below) to determine the shortest and fastest paths. They also make this determination based on
how long it takes packets to reach their destination — similar to the way Google Maps, Waze,
and other GPS services determine the best driving routes based on past driving performance and
current driving conditions.

Dynamic routing requires more computing power, which is why smaller networks may rely on
static routing. But for medium-sized and large networks, dynamic routing is much more efficient.

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 37


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

In networking, a protocol is a standardized way of formatting data so that any connected


computer can understand the data. A routing protocol is a protocol used for identifying or
announcing network paths.

The following protocols help data packets find their way across the Internet:

IP: The Internet Protocol (IP) specifies the origin and destination for each data packet. Routers
inspect each packet's IP header to identify where to send them.

BGP: The Border Gateway Protocol (BGP) routing protocol is used to announce which networks
control which IP addresses, and which networks connect to each other. (The large networks that
make these BGP announcements are called autonomous systems.) BGP is a dynamic routing
protocol.

The below protocols route packets within an AS:

OSPF: The Open Shortest Path First (OSPF) protocol is commonly used by network routers to
dynamically identify the fastest and shortest available routes for sending packets to their
destination.

RIP: The Routing Information Protocol (RIP) uses "hop count" to find the shortest path from one
network to another, where "hop count" means number of routers a packet must pass through on
the way. (When a packet goes from one network to another, this is known as a "hop.")

The routing mechanism invokes the appropriate error processor depending on the error code
provided by the node abnormal condition program. Groups of one or more error codes are
defined in the DFHSNEP macro. Each group is associated with an index (in the range X'01'
through X'FF') and an error processor.

RESULT: We have studied the need of a routing mechanism in a router.

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 38


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

VIVA-VOCE

Q1.What is the maximum length of a stacking cable for switch stacks?


Answer: 3 meters

Q2._________ in a stack is responsible for forwarding tables and the central ACL.
Answer: Master switch

Q3.For global unicast addresses, _______ part of the address is allotted by the RIR, or
Regional Internet Registry
Answer: First 23 bits

Q4.________ type in a switch stack downloads it configuration, forwarding table,and


ACLs.
Answer: Subordinate switch

Q5.__________ command is used to find the joined multicast groups for an IPv6
interface.
Answer: Router# show ipv6 interface gi 0/1

Q6.How does traffic flow on the Stack Wise 3750 platform?


Answer: Counter rotation paths at 16 Gb/s each

Q7._______ protocol will support IPv6 for RIP.


Answer: RIPng

Q8.The default number of routes that RIPv2 will load balance is a total of _______
Answer: 4

Q9.When should QoS shaping be implemented?


Answer: When the service provider is policing traffic

Q10._________ is the supported maximum number of 3750 switches that can stacked.
Answer: 9 switches

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 39


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

EXPERIMENT NO-10
AIM: Learn how to configure a router with the static routing

THEORY:

Routers forward packets using either route information from route table entries that you manually
configure or the route information that is calculated using dynamic routing algorithms.

Static routes, which define explicit paths between two routers, cannot be automatically updated;
you must manually reconfigure static routes when network changes occur. Static routes use less
bandwidth than dynamic routes. No CPU cycles are used to calculate and analyze routing
updates.

You can supplement dynamic routes with static routes where appropriate. You can redistribute
static routes into dynamic routing algorithms but you cannot redistribute routing information
calculated by dynamic routing algorithms into the static routing table.

You should use static routes in environments where network traffic is predictable and where the
network design is simple. You should not use static routes in large, constantly changing networks
because static routes cannot react to network changes. Most networks use dynamic routes to
communicate between routers but may have one or two static routes configured for special cases.
Static routes are also useful for specifying a gateway of last resort (a default router to which all
unroutable packets are sent).

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 40


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

PROCEDURE:

We can configure a static route on the router.

SUMMARY STEPS
1. Configure terminal
2. ip route {ip-prefix | ip-addr ip-mask} {[next-hop | nh-prefix] | [interface next-hop | nh-prefix]}
[tag tag-value [pref]]
3. (Optional) show ip static-route
4. (Optional) copy running-config startup-config

DETAILED STEPS
Command Purpose

Step 1 configure terminal Enters configuration mode.


Example:
switch# configure terminal
switch(config)#

Step 2 ip route {ip-prefix | ip-addr ip- Configures a static route and the interface for this
mask} {[next-hop | nh-prefix] | static route. You can optionally configure the next-
[interface next-hop | nh- hop address. The preference value sets the
prefix]} [tag tag-value [pref] administrative distance. The range is from 1 to 255.
Example: The default is 1.
switch(config)# ip route
192.0.2.0/8 ethernet 1/2
192.0.2.4

Step 3 show ip static-route (Optional) Displays information about static routes.


Example:
switch(config)# show ip static-
route

Step 4 copy running-config startup- (Optional) Saves this configuration change.


config
Example:
switch(config)# copy running-
config startup-config

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 41


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

This example shows how to configure a static route:


switch# configure terminal
switch(config)# ip route 192.0.2.0/8 192.0.2.10
switch(config)# copy running-config startup-config

Use the no ip static-route command to remove the static route.

RESULT: We have learnt to configure a router with the static routing.

VIVA-VOCE

Q1._______ method helps combat queue starvation for QoS queuing.


Answer: Policing

Q2.CCNA stands for _________.


Answer: Cisco Certified Network Associate

Q3.Which protocol helps synchronize time for routers and switches?


Answer: NTP/li>

Q4.Which command will wipe out all current NAT translations in the NAT table?
Answer: Router#clear ip nat translation *

Q5.Which protocol and port does NTP use for time synchronization?
Answer: UDP/123

Q6.CCNA is associated with _________.


Answer: Cisco

Q7.__________ port and protocol does TACACS+ use.


Answer: TCP/49

Q8._________ protocol will encrypt the entire packet from the switch or router to the
AAA server?
Answer: TACACS+
Q9.What is the default encryption method for passwords, when you configure a line
password?
Answer: Clear text

Q10.RADIUS authentication use ________ protocol and port


Answer: UDP/1645

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 42


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

EXPERIMENT NO- 11

AIM: Configure a Network using Distance Vector Routing protocol.

1. RIP

APPARATUS (SOFTWARE): packet tracer software

PROCEDURE:
Develop a Topology shown in figure given below.
1. Configure all Routers
2. Implement RIP protocols in Router to configure Network.

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 43


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

Router0 configuration.....

Continue with configuration dialog? [yes/no]: no

Press RETURN to get

started! Router>
Router>en
Router#config
t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname router0

router0(config)#int lo0

%LINK‐5‐CHANGED: Interface Loopback0, changed state to up


%LINEPROTO‐5‐UPDOWN: Line protocol on Interface Loopback0, changed state
to up router0(config‐if)#ip address 10.1.1.1 255.255.255.0

router0(config‐if)#int f0/0

router0(config‐if)#ip address 10.1.12.1


255.255.255.0 router0(config‐if)#no shut

%LINK‐5‐CHANGED: Interface FastEthernet0/0,


changed state to up router0(config‐if)#int f0/1

router0(config‐if)#ip address 10.1.14.1


255.255.255.0 router0(config‐if)#no shut

%LINK‐5‐CHANGED: Interface FastEthernet0/1,


changed state to up router0(config‐if)#end

%SYS‐5‐CONFIG_I: Configured from


console by console router0#wr

Building
configuration... [OK]

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 44


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

router0#
router0#

%LINEPROTO‐5‐UPDOWN: Line protocol on Interface FastEthernet0/0, changed state


to up

%LINEPROTO‐5‐UPDOWN: Line protocol on Interface FastEthernet0/1,

changed state to up router0 con0 is now available

Press RETURN to get started.

router0>
router0>en
router0#confi
gt

Enter configuration commands, one per line. End with


CNTL/Z. router0(config)#router rip

router0(config‐router)#net 10.0.0.0
router0(config‐router)# router0(config‐
router)#end

%SYS‐5‐CONFIG_I: Configured from


console by console router0#show ip route

Codes: C ‐ connected, S ‐ static, I ‐ IGRP, R ‐ RIP, M ‐


mobile, B ‐ BGP D ‐ EIGRP, EX ‐ EIGRP external,
O ‐ OSPF, IA ‐ OSPF inter area

N1 ‐ OSPF NSSA external type 1, N2 ‐ OSPF NSSA


external type 2 E1 ‐ OSPF external type 1, E2 ‐
OSPF external type 2, E ‐ EGP
i ‐ IS‐IS, L1 ‐ IS‐IS level‐1, L2 ‐ IS‐IS level‐2, ia ‐ IS‐IS inter area
* ‐ candidate default, U ‐ per‐user static route,
o ‐ ODR P ‐ periodic downloaded static route

Gateway of last resort is not set

10.0.0.0/24 is subnetted, 3 subnets

C 10.1.1.0 is directly connected, Loopback0

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 45


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

C 10.1.12.0 is directly connected,


FastEthernet0/0 C 10.1.14.0 is directly
connected, FastEthernet0/1 router0#

router0#

Router1 Configuration.....

Continue with configuration dialog? [yes/no]: no

Press RETURN to get started!

Router>enabe
Router#confit

Enter configuration commands, one per line. End with


CNTL/Z. Router(config)#int lo0

%LINK‐5‐CHANGED: Interface Loopback0, changed state to up

%LINEPROTO‐5‐UPDOWN: Line protocol on Interface Loopback0, changed state


to up Router(config‐if)#ip address 10.1.2.1 255.255.255.0

Router(config‐if)#no
shut Router(config‐
if)#int f0/1

Router(config‐if)#ip address 10.1.23.1


255.255.255.0 Router(config‐if)#no shut

%LINK‐5‐CHANGED: Interface FastEthernet0/1,


changed state to up Router(config‐if)#int f0/0

Router(config‐if)#ip address 10.1.12.2


255.255.255.0 Router(config‐if)#no shut

%LINK‐5‐CHANGED: Interface FastEthernet0/0, changed state to up

%LINEPROTO‐5‐UPDOWN: Line protocol on Interface FastEthernet0/0, changed state


to up Router(config‐if)#end

%SYS‐5‐CONFIG_I: Configured from


console by console Router#wr
Building configuration...
DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 46
GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

[OK]

Router
#
Router
#
Router
#

%LINEPROTO‐5‐UPDOWN: Line protocol on Interface FastEthernet0/1,

changed state to up Router con0 is now available

Press RETURN to get started.

Router>
Router>en
Router#con t

% Ambiguous command:
"con t" Router#co t

% Ambiguous command:
"co t" Router#conf t

Enter configuration commands, one per line. End with


CNTL/Z. Router(config)#router rip

Router(config‐router)#net
10.0.0.0 Router(config‐router)#
Router(config‐router)#
Router(config‐router)#end

%SYS‐5‐CONFIG_I: Configured from


console by console Router#

Router2 Configuration....

Continue with configuration dialog? [yes/no]: no

Press RETURN to get

started! Router>en

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 47


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

Router#config t

Enter configuration commands, one per line. End with


CNTL/Z. Router (config)#int lo0

%LINK‐5‐CHANGED: Interface Loopback0, changed state to up

%LINEPROTO‐5‐UPDOWN: Line protocol on Interface Loopback0, changed state


to up Router (config‐if)#ip address 10.1.3.1 255.255.255.0

Router (config‐if)#no
shut Router(config‐
if)#int f0/0

Router (config‐if)#ip address 10.1.23.2


255.255.255.0 Router(config‐if)#no shut

%LINK‐5‐CHANGED: Interface FastEthernet0/0, changed state to up

%LINEPROTO‐5‐UPDOWN: Line protocol on Interface FastEthernet0/0, changed state


to up Router (config‐if)#int f0/1

Router (config‐if)#ip address 10.1.34.1


255.255.255.0 Router(config‐if)#no shut

%LINK‐5‐CHANGED: Interface FastEthernet0/1,


changed state to up Router (config‐if)#End
%SYS‐5‐CONFIG_I: Configured from console by console

Router#wr

Building configuration...

[OK]

Router
#
Router
#
Router
#
%LINEPROTO‐5‐UPDOWN: Line protocol on Interface FastEthernet0/1, changed state
to up
DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 48
GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

Router con0 is now available


Press RETURN to get started.

Router>
Router>
Router>en

Router#show ip route

Codes: C ‐ connected, S ‐ static, I ‐ IGRP, R ‐ RIP, M ‐


mobile, B ‐ BGP D ‐ EIGRP, EX ‐ EIGRP external,
O ‐ OSPF, IA ‐ OSPF inter area

N1 ‐ OSPF NSSA external type 1, N2 ‐ OSPF NSSA


external type 2 E1 ‐ OSPF external type 1, E2 ‐
OSPF external type 2, E ‐ EGP

i ‐ IS‐IS, L1 ‐ IS‐IS level‐1, L2 ‐ IS‐IS level‐2, ia ‐ IS‐IS inter area

* ‐ candidate default, U ‐ per‐user static route,


o ‐ ODR P ‐ periodic downloaded static route

Gateway of last resort is not set

10.0.0.0/24 is sub netted, 3

subnets
C 10.1.3.0 is directly connected, Loopback0
C 10.1.23.0 is directly connected,
FastEthernet0/0 C 10.1.34.0 is directly
connected, FastEthernet0/1 Router#config t

Enter configuration commands, one per line. End with


CNTL/Z. Router (config)#router rip

Router (config‐router)#net 10.0.0.0


Router(config‐router)#end

%SYS‐5‐CONFIG_I: Configured from


console by console Router#

Router#
Router#show ip
route

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 49


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

Codes: C ‐ connected, S ‐ static, I ‐ IGRP, R ‐ RIP, M ‐


mobile, B ‐ BGP D ‐ EIGRP, EX ‐ EIGRP external,
O ‐ OSPF, IA ‐ OSPF inter area

N1 ‐ OSPF NSSA external type 1, N2 ‐ OSPF NSSA


external type 2 E1 ‐ OSPF external type 1, E2 ‐
OSPF external type 2, E ‐ EGP

i ‐ IS‐IS, L1 ‐ IS‐IS level‐1, L2 ‐ IS‐IS level‐2, ia ‐ IS‐IS inter area

* ‐ candidate default, U ‐ per‐user static route,


o ‐ ODR P ‐ periodic downloaded static route

Gateway of last resort is not set

10.0.0.0/24 is subnetted, 7

subnets
R 10.1.1.0 [120/2] via 10.1.23.1, 00:00:19, FastEthernet0/0
R 10.1.2.0 [120/1] via 10.1.23.1, 00:00:19, FastEthernet0/0

C 10.1.3.0 is directly connected, Loopback0

R 10.1.12.0 [120/1] via 10.1.23.1, 00:00:19, FastEthernet0/0

R 10.1.14.0 [120/2] via 10.1.23.1, 00:00:19, FastEthernet0/0

C 10.1.23.0 is directly connected, FastEthernet0/0

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 50


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

C 10.1.34.0 is directly connected,


FastEthernet0/1 Router#

Router#
Router#

Router3 Configuration.......

Continue with configuration dialog? [yes/no]: no

Press RETURN to get

started! Router>
Router>en
Router#confit

Enter configuration commands, one per line. End with


CNTL/Z. Router(config)#int lo0

%LINK‐5‐CHANGED: Interface Loopback0, changed state to up

%LINEPROTO‐5‐UPDOWN: Line protocol on Interface Loopback0, changed state


to up Router(config‐if)#int f0/0

Router(config‐if)#ip address 10.1.34.2


255.255.255.0 Router(config‐if)#no shut

%LINK‐5‐CHANGED: Interface FastEthernet0/0, changed state to up

%LINEPROTO‐5‐UPDOWN: Line protocol on Interface FastEthernet0/0, changed


state to up Router(config‐if)#

Router(config‐if)#int f0/1

Router(config‐if)#ip address 10.1.14.2


255.255.255.0 Router(config‐if)#no shut

%LINK‐5‐CHANGED: Interface FastEthernet0/1, changed state to up

%LINEPROTO‐5‐UPDOWN: Line protocol on Interface FastEthernet0/1, changed state


to up Router(config‐if)#end

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 51


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

%SYS‐5‐CONFIG_I: Configured from


console by console Router#wr

Building configuration...

[OK]

Router#
Router#

Router#show ip route

Codes: C ‐ connected, S ‐ static, I ‐ IGRP, R ‐ RIP, M ‐


mobile, B ‐ BGP D ‐ EIGRP, EX ‐ EIGRP external,
O ‐ OSPF, IA ‐ OSPF inter area

N1 ‐ OSPF NSSA external type 1, N2 ‐ OSPF NSSA


external type 2 E1 ‐ OSPF external type 1, E2 ‐
OSPF external type 2, E ‐ EGP
i ‐ IS‐IS, L1 ‐ IS‐IS level‐1, L2 ‐ IS‐IS level‐2, ia ‐ IS‐IS inter area
* ‐ candidate default, U ‐ per‐user static route,
o ‐ ODR P ‐ periodic downloaded static route

Gateway of last resort is not set

10.0.0.0/24 is subnetted, 2 subnets

C 10.1.14.0 is directly connected,


FastEthernet0/1 C 10.1.34.0 is directly
connected, FastEthernet0/0 Router#conf t

Enter configuration commands, one per line. End with


CNTL/Z. Router(config)#router rip

Router(config‐router)#net 10.0.0.0
Router(config‐router)#

Router(config‐router)#end

%SYS‐5‐CONFIG_I: Configured from


console by console Router#show ip route

Codes: C ‐ connected, S ‐ static, I ‐ IGRP, R ‐ RIP, M ‐


mobile, B ‐ BGP D ‐ EIGRP, EX ‐ EIGRP external,
O ‐ OSPF, IA ‐ OSPF inter area
DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 52
GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

N1 ‐ OSPF NSSA external type 1, N2 ‐ OSPF NSSA


external type 2 E1 ‐ OSPF external type 1, E2 ‐
OSPF external type 2, E ‐ EGP
i ‐ IS‐IS, L1 ‐ IS‐IS level‐1, L2 ‐ IS‐IS level‐2, ia ‐ IS‐IS inter area
* ‐ candidate default, U ‐ per‐user static route,
o ‐ ODR P ‐ periodic downloaded static route

Gateway of last resort is not set

10.0.0.0/24 is subnetted, 7

subnets
R 10.1.1.0 [120/1] via 10.1.14.1, 00:00:09, FastEthernet0/1
R 10.1.2.0 [120/2] via 10.1.34.1, 00:00:14, FastEthernet0/0

[120/2] via 10.1.14.1, 00:00:09, FastEthernet0/1

R 10.1.3.0 [120/1] via 10.1.34.1, 00:00:14, FastEthernet0/0

R 10.1.12.0 [120/1] via 10.1.14.1, 00:00:09, FastEthernet0/1

C 10.1.14.0 is directly connected, FastEthernet0/1

R 10.1.23.0 [120/1] via 10.1.34.1, 00:00:14, FastEthernet0/0

C 10.1.34.0 is directly connected,


FastEthernet0/0 Router#

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 53


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

VIVA-VOCE

Q1. A _________ is a device that forwards data that is not explicitly destined to it.
Ans : Router

Q2. There exist ________ forms of routing protocols.

Ans : 2

Q3. Routing protocols can be divided in ________ categories.

Ans : 2

Q4. RIPng stands for __________.

Ans : Routing Information Protocol Next Generation

Q5. An __________ distributes routing information between two different autonomous systems
or organization.

Ans : Exterior Routing Protocol


.
Q6. ________ is an upgraded implementation of ICMP to accommodate IPv6 requirements.

Ans: ICMPv6

Q7. Which type of Ethernet framing is used for TCP/IP and DEC net?
Ans: Ethernet 802.2

Q8. Which NetWare protocol works on layer 3–network layer—of the OSI model?

Ans : IPX

Q9. Which NetWare protocol provides link-state routing?

Ans : NLSP

Q10. A Distance Vector router running distance vector protocol advertises its connected routes
and learns new routes from its neighbors.

Ans : Yes

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERINGPAGE 54


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

EXPERIMENT NO-12

AIM: Configure Network using Link State Vector Routing protocol.


1. OSPF

APPARATUS (SOFTWARE): Packet Tracer Software

PROCEDURE:

1. Develop a Topology shown in figure given below.


2. Configure all the workstations
3. Configure all switches
4. Configure all Routers
5. Implement OSPF protocols in Router to configure Network

VIVA-VOCE

Q1. Which of the following is not the requirement of routing function?


A. Correctness
B. Robustness

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING PAGE 55


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

C. Delay time
D. Stability

Q2. The ……… protocol allows the administrator to assign a cost, called the metric, to
each route.
A. OSPF
B. RIP
C. BGP
D. BBGP
Q3.If there is only one routing sequence for each source destination pair, the scheme is
known as …..
A. static routing
B. fixed alternative routing
C. standard routing
D. dynamic routing
Q4.The Open Shortest Path First(OSPF) protocol is an intra domain routing protocol
based on …….. routing.
A. distance vector
B. link state
C. path vector
D. non distance vector
Q5.An/A ……….routing scheme is designed to enable switches to react to changing
traffic patterns on the network.
A. static routing
B. fixed alternative routing
C. standard routing
D. dynamic routing
Q6.The Routing Information Protocol(RIP) is an intra domain routing based on
……..routing.
A. distance vector
B. link state
C. path vector
D. distance code
Q7.The term …….. refers to which node or nodes in the network are responsible for the
routing decision.
A. decision place
B. routing place
C. node place
D. switching place
Q8.In ……. routing the least cost route between any two nodes is the minimum
distance.
A. path vector
B. distance vector
C. link state
D. switching

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING PAGE 56


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

Q9.For centralized routing the decision is made by some designated node called ……
A. designated center

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING PAGE 56


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

B. control center
C. network center
D. network control center
Q10. For purposes of routing, the Internet is divided into …….
A. wide area networks
B. autonomous networks
C. local area networks
D. autonomous system
Q11. In ………. a route is selected for each destination pair of nodes in the network.
A. flooding
B. variable routing
C. fixed routing
D. random routing
Q12. To create a neighborhood relationship, a router running BGP sends an ……….
message.
A. open
B. update
C. keep alive
D. close
Q13. The technique which requires no network information required is ….
A. flooding
B. variable routing
C. fixed routing
D. random routing
Q14. An area is ….
A. part of an AS
B. composed of at least two AS
C. another term for an AS
D. composed more than two AS
Q15. Which of the following produces high traffic network?
A. Variable routing
B. Flooding
C. Fixed routing
D. Random routing
Q16. In ……….. routing, we assume that there is one node (or more) in each
autonomous system that acts on behave of the entire autonomous system.
A. distant vector
B. path vector
C. link state
D. multipoint

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING PAGE 57


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA
DATA COMMUNICATION NETWORKING LAB (LC-ECE-405-G)

Q17. When a direct delivery is made, both the deliverer and receiver have the same ….
A. routing table
B. host id
C. IP address
D. Net id
Q18. In OSPF, a ……… link is a network with several routers attached to it.
A. point-to-point
B. transient
C. stub
D. multipoint
Q19. In ……. routing, the mask and the destination address are both 0.0.0.0 in routing
table.
A. next-hop
B. host-specific
C. network-specific
D. default
Q20. In ………. the router forwards the receive packet through only one of its
interfaces.
A. unicasting
B. multicasting
C. broadcasting
D. point to point

ANSWERS:
1) C. Delay time
2) A. OSPF
3) B. fixed alternative routing
4) B. link state
5) C. standard routing
6) A. distance vector
7) A. decision place
8) B. distance vector
9) D. network control center
10) D. autonomous system
11) C. fixed routing
12) B. update
13) A. flooding
14) A. part of an AS
15) B. Flooding
16) B. path vector
17) D. Net id
18) B. transient
19) D. default
20) B. multicasting

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING PAGE 58


GANGA INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KABLANA

You might also like