Beruflich Dokumente
Kultur Dokumente
Scope of the Experiment Connecting devices using basic tools and interfaces and configuring them
to establish communication between the devices.
In telecommunication point to point connection is widely used, example
telephone is a virtual circuit oriented point to point link between two
people.
Design / Methodology In point to point connection dedicated link will be created between any two
hosts and entire capacity of link is reserved for transmission between two
hosts.
If two devices to be connected are like devices, then they are connected
using a cross cable. If two devices to be connected are unlike devices, then
they are connected using a straight cable.
1. Place two generic PC’s in the workspace from the end devices
section located at the bottom left corner.
1
2. Connect the two PC’s using copper cross over cable which is
available in connections section at the bottom left corner with
fastEthernet port. To connect unlike devices use copper straight
through cable.
2
5. Click on the simple PDU on the right hand side of the workspace,
and then click on the source PC and move the PDU from source to
destination by clicking on the destination PC.
6. Click on the simulation mode on the right hand side to begin the
simulation and then click on the auto capture in the simulation panel
to start the communication.
Conclusion We conclude that like devices on a network can communicate using cross
over cable whereas unlike devices can communicate using straight through
cable.
3
Data Communication (IS0413)
Semester: V Experiment No: 2
Scope of the Experiment Networking Hub is widely used networking connectivity device. It has
many advantages over other connectivity devices. Some Application of
Networking Hub are given below:
Design / Methodology In star topology every node connects to a central network device, like
a hub, switch, or computer. The central network device acts as a server and
the peripheral devices act as clients.
4
Procedure (Steps) Steps to design star network using a hub is as follows:
1. Place five generic PC’s in the workspace from the end devices
section located at the bottom left corner.
2. Place a generic hub available at the network devices section at the
bottom left corner in between the PC’s to form a star topology as
shown.
5
5. To check the connection between any two PC click on a PC open
desktop program command prompts and issue ping command. Say
PC0 and PC2 issue command ping 192.168.1.3(IP of PC2).
6. Add a simple PDU (protocol data unit) and drag it over source PC to
destination PC.
7. Click on the simulation mode on the right hand side to begin the
simulation and then click on the auto capture in the simulation panel
to start the data transfer.
Conclusion Hub acts as a multiport repeater for data flow as it repeats a signal that
comes in one port out to all other ports, it can be used to connect segments
of a LAN.
6
Data Communication (IS0413)
Semester: V Experiment No: 3
Scope of the Experiment Switches are most commonly used as the network connection point for hosts
at the edge of a network. Here are some uses,
Design / Methodology In star topology every node connects to a central network device, like
a hub, switch, or computer. The central network device acts as a server and
the peripheral devices act as clients.
7
Procedure (Steps) Steps to design star network using a switch is as follows:
1. Place four generic PC’s in the workspace from the end devices
section located at the bottom left corner.
2. Place a generic switch available at the network devices section at the
bottom left corner in between the PC’s to form a star topology as
shown.
8
5. To check the connection between any two PC click on a PC, open
desktop program command prompts and issue ping command. Say
PC0 and PC2 issue command ping 192.168.1.3(IP of PC2).
6. Add a simple PDU (protocol data unit) and drag it over source PC to
destination PC.
7. Click on the simulation mode on the right hand side to begin the
simulation and then click on the auto capture in the simulation panel
to start the data transfer.
Conclusion Switch is a multiport bridge with a buffer that transfers data by receiving
data from any source connected to it and then dispatches that information to
the appropriate destination only.
9
Data Communication (IS0413)
Semester: V Experiment No: 4
Scope of the Experiment The address resolution protocol (ARP) is a protocol used by the Internet
Protocol to map IP network addresses to the hardware addresses used by a
data link protocol.
Design / Methodology The term address resolution refers to the process of finding an address of a
computer in a network. The address is "resolved" using a protocol in which
a piece of information is sent by a client process executing on the local
computer to a server process executing on a remote computer. The
information received by the server allows the server to uniquely identify the
network system for which the address was required and therefore to provide
the required address. The address resolution procedure is completed when
the client receives a response from the server containing the required
address.
An Ethernet network uses two hardware addresses which identify the source
and destination of each frame sent by the Ethernet. The destination address
may also identify a broadcast packet (to be sent to all connected computers).
The hardware address is also known as the Medium Access Control (MAC)
address, in reference to the standards which define Ethernet. Each
computer network interface card is allocated a globally unique 6 byte link
address when the factory manufactures the card (stored in a PROM). This is
the normal link source address used by an interface.
A computer sends all packets which it creates with its own hardware source
link address, and receives all packets which match the same hardware
address in the destination field or one (or more) pre-selected
broadcast/multicast addresses.
10
Procedure (Steps) 1. Place three generic PC’s in the workspace from the end devices
section located at the bottom left corner.
11
5. To know the ARP entries click on PC0, go to desktop program
command prompts and execute the command arp –a. Initially there
will be no entries.
12
8. Click on Capture/Forward to broadcast the PDU from switch to
all hosts except the source. The PDU will be accepted only by the
destination host all other hosts rejects the PDU.
10. Click on PC0 and execute the command arp –a in the desktop
program command prompt to get the ARP entries.
Conclusion Address Resolution Protocol determines the physical address of a host from
its IP address. It is used by TCP/IP protocol to establish communication
between hosts.
13
Data Communication (IS0413)
Semester: V Experiment No: 5
Scope of the Experiment A VLAN (Virtual local area network) is a logical subnetwork that groups a
collection of devices from different physical LANs.
Large business computer networks set up VLANs to re-partition a network
for improved traffic management. VLAN’s are used in,
Design / Methodology VLAN is a local area network which is configured by software not by
physical, wiring using VTP (VLAN Trunk Protocol). A VLAN is a
subnetwork which can group together collections of devices on separate
physical local area networks (LANs).
VLANs make it easy for network administrators to partition a single
switched network to match the functional and security requirements of their
systems without having to run new cables or make major changes in their
current network infrastructure.
14
Procedure (Steps) Steps to create a VLAN are:
1. Place four generic PC’s in the workspace from the end devices
section located at the bottom left corner.
2. Place a generic switch available at the network devices section at the
bottom left corner in between the PC’s to form a star topology as
shown.
15
5. To check the connection between any two PC click on a PC open
desktop program command prompts and issue ping command. Say
PC0 and PC2 issue command ping 192.168.1.3(IP of PC2).
6. Now for creating VLAN double click on switch upon which we get a
menu and select CLI (command line interface).Type the following
commands to achieve the necessary abstraction.
Switch>enable
Switch#config t
Switch(config)#vlan 10
Switch(config-vlan)#exit
Switch(config)#vlan 20
Switch(config-vlan)#exit
Switch(config)#interface fastEthernet 0/1
Switch(config-if)#switch port access vlan 10
Switch(config)#interface fastEthernet 0/2
Switch(config-if)#switch port access vlan 10
Switch(config)#interface fastEthernet 0/3
Switch(config-if)#switch port access vlan 20
Switch(config)#interface fastEthernet 0/4
Switch(config-if)#switch port access vlan 20
16
7. Now go to command prompt and check the communication between
devices to verify whether our objective has been achieved or not.
17
9. Simulation of communication between the devices PC0 and PC3
Here,
Here, these 2 devices fail to communicate. So, virtual network has been
created between the devices which are connected to same switch.
Conclusion We can thus conclude that a Virtual Local Area Network (VLAN) allows
you to logically segment a Local Area Network (LAN) into different
broadcast domains. In scenarios where sensitive data may be broadcast on a
network, VLANs can be created to enhance security by designating a
broadcast to a specific VLAN.
18
Data Communication (IS0413)
Semester: V Experiment No: 6
Aim of the Experiment Analyzing and capturing a network packet using Wireshark
Scope of the Experiment Wireshark is a free open source network protocol analyzer. It's designed for
network administrators used for network troubleshooting, analysis, software
and communications protocol development, and education.
Design / Methodology Wireshark allows to select an interface (through a wireless card or a wired
card) and then logs all the packets, or all the traffic, that flows through that
interface.
It has GUI interface that allows to analyze this traffic, so that it allows to filter
these packets based on the protocol used in them, such as HTTP or TCP.
It also allows to look for certain things, such as cookies or POST or GET
requests, and it also allows to search through these packets.
Procedure (Steps)
After launching the wireshark double-click the name of a network
interface under Capture to start capturing packets on that interface.
As soon as you click the interface’s name, you’ll see the packets start to
appear in real time. Wireshark captures each packet sent to or from the
system.
19
Click the red “Stop” button near the top left corner of the window when
you want to stop capturing traffic.
We can see the columns. First of all is the No. column for packet
numbering. In the Time column, we will see the time that this packet
was captured. The time increases as we go down, and it shows when
these packets were captured. We can also see the Source column, which
indicates which device the packet was sent from. The Destination
column shows the receiving device IP. The Protocol column shows the
name of the protocol used by the packet. In the Length column we can
see the length, which is the size. We can also see more information
about the packet in the Info column.
20
Wireshark intercepts traffic and converts that binary traffic into human-
readable format. This makes it easy to identify what traffic is crossing
your network, how much of it, how frequently, how much latency there
is between certain hops, and so forth.
Given the large volume of traffic that crosses a typical business network,
Wireshark's tools to help you filter that traffic are what make it
especially useful. Capture filters will collect only the types of traffic
you're interested in, and display filters will help you zoom in on the
traffic you want to inspect. The network protocol analyzer provides
search tools, including regular expressions and colored highlighting, to
make it easy to find what you're looking for.
21
Sometimes the best way to find anomalous traffic is to capture
everything and establish a baseline.
Right-clicking a UDP packet and selecting Follow > UDP Stream gives
the full UDP conversation between the client and the server. We can
also click other protocols in the Follow menu to see the full
conversations for other protocols, if applicable.
Conclusion In conclusion, Wireshark is a very effective tool for gathering information about
clients by analyzing the packets. Professionals use it to debug network
protocol implementations, examine security problems and inspect network
protocol internals.
22
Data Communication (IS0413)
Semester: V Experiment No:
Aim of the Experiment To identify what devices are running on the systems, to discover hosts and
services on a computer network by sending packets and analysing the
responses using Network Mapper (Nmap).
Scope of the Experiment Network administrators, IT managers and security professionals face a
never-ending battle, constantly checking on what exactly is running on their
networks and the vulnerabilities that lurk within. Nmap can be used to
monitor single hosts as well as vast networks that encompass hundreds of
thousands of devices and multitudes of subnets and does security auditing.
Nmap can be used to enumerate the open ports on target hosts, determining
hosts on a network, determining the operating system.
Design / Methodology Network mapping of Nmap uses the IP addresses to identify the devices on
a network (also called host discovery), including servers, routers and
switches, and how they're physically connected. With this we can gather
information about any client that is within our network or outside our
network by just knowing their IP.
OS detection of Nmap can detect the operating systems running on network
devices providing the vendor name, the underlying operating system, the
version of the software.
Nmap commands can be used to find clients on the network and to discover
the open ports on these clients.
23
A list of profiles will get displayed, out of them, based on the user
needs, intense scan is selected.
24
After the scan gets finished, it shows the message “Nmap done” at
the bottom of the Nmap output tab. Main Nmap output tab will
contain all the results listed but we can use the other tabs to get a
better look at specific data.
Ports/Hosts - This tab will show the results of the port scan,
consisting of the port number, protocol, state and services for those
ports.
Topology - Shows the traceroute for the scan we performed and also
we can see how many hops data goes through to reach the target.
25