0% found this document useful (0 votes)
16 views

Networking Lab Manual

The document is a Networking Lab Manual detailing various experiments related to network cables, basic networking commands, NIC configuration in Windows and Linux, and IP addressing and subnetting. It includes practical procedures for creating network cables, using commands like Ping, NetStat, and Tracert, as well as configuring network interfaces and understanding IP address structures. Each experiment aims to enhance understanding of networking concepts and practical skills in a lab setting.

Uploaded by

baurishanti34
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Networking Lab Manual

The document is a Networking Lab Manual detailing various experiments related to network cables, basic networking commands, NIC configuration in Windows and Linux, and IP addressing and subnetting. It includes practical procedures for creating network cables, using commands like Ping, NetStat, and Tracert, as well as configuring network interfaces and understanding IP address structures. Each experiment aims to enhance understanding of networking concepts and practical skills in a lab setting.

Uploaded by

baurishanti34
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Networking Lab Manual

EXPERIMENT 1

Aim: Study of different types of Network cables and practically implements the
cross-wiredcable and straight through cable using clamping tool.
Apparatus (Components): RJ-45 connector, Climping Tool, Twisted pair Cable
Procedure: To do these practical following steps should be done:

1. Start by stripping off about 2 inches of the plastic jacket off the end of the
cable. Be very careful at this point, as to not nick or cut into the wires, which are
inside. Doing so could alter the characteristics of your cable, or even worse render is
useless. Check the wires, one more time for nicks or cuts. If there are any, just whack
the whole end off, and start over.

2. Spread the wires apart, but be sure to hold onto the base of the jacket with your other
hand. You do not want the wires to become untwisted down inside the jacket. Category
5/6 cable must only have 1/2 of an inch of 'untwisted' wire at the end; otherwise it will
be 'out of spec'. At this point, you obviously have ALOT more than 1/2 of an inch of un-
twisted wire.

You have 2 end jacks, which must be installed on your cable. If you are using a pre-made cable,
with one of the ends whacked off, you only have one end to install - the crossed over end. Below
are two diagrams, which show how you need to arrange the cables for each type of cable end.
Decide at this point which end you are making and examine the associated picture below
EXPERIMENT 2

Basic Networking commands


Aim: Study of basic network commands and their uses.

1. Ping
Ping is used to testing a network host capacity to interact with another host. Just enter the
command Ping, followed by the target host’s name or IP address. The ping utilities seem
to be the most common network tool. This is performed by using the Internet Control
Message Protocol, which allows the echo packet to be sent to the destination host and a
listening mechanism. If the destination host reply to the requesting host that means the
host is reachable. This utility usually gives a basic image of where there may be a specific
networking issue,

Eg.- ping 192.168.43.1

2. NetStat
Netstat is a Common TCP – IP networking command-line method present in most Windows,
Linux, UNIX, and other operating systems. About the protocol, the netstat provides the
statistics and information in the use of the current TCP-IP Connection network.
Options for NetStat Command are as follows-

-a: This will display all connection and ports


-b: Shows the executable involved in each connection or hearing port
-e: This protocol will combine with the -sand display the ethernet statistics
-n: This will display the address and the port number in the form of numerical
-o: It will display the ID of each connection for the ownership process.
-r: It will display the routing table
-v: When used in combination with -b, the link or hearing port sequence for every executable
is shown.
3 Tracert in Networking Commands
The tracert command is a Command Prompt command which is used to get network packet
being sent and received and the number of hops required for that packet to reach to target.
This command can also be referred to as a traceroute. It provides several details about the
path that a packet takes from the source to the specified destination.
The tracert command is available for the Command Prompt in all Windows operating
systems.
The syntax for Tracert Command.
Eg.

tracert [-d] [-h MaxHops] [-w TimeOut] target

4. Nslookup
The Nslookup which stands for name server lookup command is a network utility command
used to obtain information about internet servers. It provides name server information for the
DNS (Domain Name System) i.e. the name and IP Address of the default DNS server.
The syntax for Nslookup is as follows

Nslookup
or
Nslookup [domain_name]

5. Route

In IP networks, routing tables are used to direct packets from one subnet to another. The
Route command provides the device’s routing tables. To get this result, just type route print.
The Route command returns the routing table, as well as the user, can make changes by
Commands such as Route Add, Route Delete, and Route Change which allows modifying the
routing table as a requirement.

6 Ip Config
The command IPconfig will display basic details about the device’s IP address configuration.
Just type IPconfig in the Windows prompt and the IP, subnet mask and default gateway that
the current device will be presented. If you have to see full information then type on
command prompt config-all and then you will see full information. There are also choices to
assist you to resolve DNS and DHCP issues.

7. ARP
ARP stands for Address Resolution Protocol. Although network communications can readily
be thought of it as IP address, the delivery of a packet depends ultimately on the media access
control (MAC). This is where the protocol for address resolution comes into effect. You can
add the remote host IP address which is arp -a command in case you have issues to
communicate with a given host. The ARP command provides information like Address,
Flags, Mask, IFace, Hardware Type, Hardware Address, etc.
EXPERIMENT 3
NIC Configuration in Windows & Linux

Aim: Connect the computers in Local Area Network.

NIC Configuration Windows

1. Open the Control Panel.


2. Set View by to Category.
3. Click Network and Internet.
4. Click Network and Sharing Center.
5. On the left pane, click Change adapter settings.
6. Right-click the local area network connection that is connected to the radio hardware
and select Properties.
o If an unused network connection is available, the local area connection
appears as Unidentified network.
o If you plan to reuse your network connection, select the local area connection
that you plan to use for the radio hardware.
o If you have only one network connection, check if you can connect wirelessly
to the existing local area network. If you can, you can use the network connection for the
radio hardware.
o You can use a pluggable USB to Gigabit Ethernet LAN adapter instead of a
NIC. The instructions are the same.
7. On the Networking tab of the Properties dialog box, clear all options
except Internet Protocol Version 4 (TCP/IPv4). Other services, particularly antiviral
software, can cause intermittent connection problems with the radio hardware.
8. Double-click Internet Protocol Version 4 (TCP/IPv4).
9. Set up the required IP details
Command line IP Configuration: ifconfig in Redahat Linux

ifconfig interface [aftype] options | address ...


or

Netconfig command

where:interface: eth0, eth1, eth2 represent the computer ethernet interfaces


Options:
Option Description
up Activate the interface. Implied if IP addresses are specified.
down Shut down interface
Enable ARP protocol on this interface. Allow ARP to detect the addresses of
arp
computer hosts attached to the network.
-arp Disable ARP protocol on this interface
Enable promiscuous mode. Receive all packets on the network not just those
promisc
destined for this interface.
-
Disable promiscuous mode.
promisc
Network Configuration Files in Linux System
The primary network configuration files are as follows:
/etc/hosts
The main purpose of this file is to resolve host names that cannot be resolved any
other way. It can also be used to resolve host names on small networks with
no DNS server. Regardless of the type of network the computer is on, this file should
contain a line specifying the IP address of the loopback device (127.0.0.1)
as localhost.localdomain.
/etc/resolv.conf
This file specifies the IP addresses of DNS servers and the search domain. Unless
configured to do otherwise, the network initialization scripts populate this file.
/etc/sysconfig/network
This file specifies routing and host information for all network interfaces. It is used to
contain directives which are to have global effect and not to be interface specific..
/etc/sysconfig/network-scripts/ifcfg-interface-name
For each network interface, there is a corresponding interface configuration script.
Each of these files provide information specific to a particular network interface.
EXPERIMENT 4
IP Addressing and subnetting

Aim: Study of network IP address.

Network address – It identifies a network on internet. Using this, we can find range of
addresses in the network and total possible number of hosts in the network.
Mask – It is a 32-bit binary number that gives the network address in the address block when
AND operation is bitwise applied on the mask and any IP address of the block.
The default mask in different classes are :
Class A – 255.0.0.0
Class B – 255.255.0.0
Class C – 255.255.255.0
Example : Given IP address 132.6.17.85 and default class B mask, find the beginning address
(network address).
Solution : The default mask is 255.255.0.0, which means that the only the first 2 bytes are
preserved and the other 2 bytes are set to 0. Therefore, the network address is 132.6.0.0.

You might also like