Nothing Special   »   [go: up one dir, main page]

NC Da1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 19

Winter Semester 2021-22

Course Course
Class Group Course Title Class Id Slot
Code Type
General Network and Embedded
CSE1004 VL2021220502954 L51+L52
(Semester) Communication Lab

Student Details: Student Name: MEGHA BHATTACHARYA


Roll/Reg No: 20BCE0793
Email: megha.bhattacharya2020@vitstudent.ac.in
Mobile: 6382933694
Faculty Details: Faculty Name: VENKATA PHANIKRISHNA B
School: SCOPE
Email: venkata.phanikrishna@vit.ac.in
Assessment No. 1
Assessment Title. Networking Hardware and OS
Commands
Date of Submission 25-Jan-2022
20BCE0793 MEGHA BHATTACHARYA LAB DA 01

TABLE OF CONTENTS

QUES QUESTION DESCRIPTION PAGE NO


NO
01 EXPLAIN ABOUT THE VARIOUS 03
PROPERTIES OF NETWORKING
COMPONENTS
 NIC
 SWITCH
 HUB
 FIREWALL
 REPEATER
 ROUTER
 GATEWAY
 BRIDGE

02 EXPLAIN DIFFERENT 08
NETWORKING DEVICES THAT
HELP PUT SYSTEM IN NETWORK
 RJ 45
 WI-FI
 BLUETOOTH
 INFRARED

03 EXPLAIN DIFFERENT OS 11
COMMANDS TO CHECK
NETWORK RELATED
INFORMATION
 IFCONFIG
 DIG
 NETSTAT
 PING
 ROUTE
 SS
 TRACEROUTE

2
20BCE0793 MEGHA BHATTACHARYA LAB DA 01

QUESTION 01:

THEORY:
DEVICE DEF USED IN IEEE PROPERTIES ADV/DISADV COST BETTER
NAME / LAYER STANDARD DEVICE
IMAGE
NIC It is a Operate IEEE 802.11 NIC is used to ADV: Rs.700 ETHERNET
hardware on both wireless NC convert data Provides high onwards CABLE is
component physical with provide into a digital reliable connect. as in more
used to and data 4 modes – signal. Bulk data can be Flipkart efficient
connect a link layer managed, It offers both shared among than NIC. It
computer of the OSI mastered, ad wired (using users. provides
with another model. hoc, monitor cables) and Comm. Speed is better
computer on mode. wireless (using high. speed and
a network. Wi-Fi) data DISADV: lower
communication Inconvinient in latency
techniques. case of wired NIC. therefore
It is a Data is not secure. more
middleware Config. Should be reliable
between a proper for better connection
server and a communication.
data network.
SWITCH It is a Operate IEEE 802.3 A switch has ADV: Rs. 1500 ROUTER is
hardware on the many ports, to They increase the onwards more
device that network which available as in sophisticat
connects layer and computers are bandwidth of the Amazon ed device
multiple data link plugged in. system. and is inter
device on a layer of When a data Help to reduce changeably
computer the OSI frame arrives at workload on indv. used with a
network. reference any port it PC SWITCH.
model. examines the Can be directlt Routers
destination connected to have a
address, workstations. higher
performs DISADV: speed and
necessary They are more can
checks and expensive. connect to
sends the frame Broadcast of traffic multiple PC
to the can be difficult. and
corresponding They are networking
device. It vulnerable to devices.
supports security attacks.
unicast,
multicast &
broadcast
communications
. It uses MAC
address to send
data packets to

3
20BCE0793 MEGHA BHATTACHARYA LAB DA 01

destination
ports. It uses
packet
switching
technique to
receive and
forward data
packets.
Transmission
mode is full
duplex. It can
perform some
error checking .
HUB It is a Operates IEEE 802 It is used to ADV: Rs. 1450 SWITCH is
hardware on the connect They are less costly per more
device which physical segments of a than switches. piece in efficient
is used to layer. LAN. A hub Good performance Amazon than HUB.
connect stores various as it uses broadcast It is more
multiple ports, so when a model which efficient at
device in a packet arrives at doesn’t affect passing a
network. one port, it is network. data
copied to Extends network packet
various other coverage for good across the
ports. Hub communication. network.
works as a DISADV:
common Can’t work on full
connection duplex mode.
point for Can’t support
devices in a network which are
network. It like token ring.
works with It can’t provide
broadcasting dedicated
and shared bandwidth for
bandwidth. It every device.
has 1 broadcast
domain and 1
collision
domain. Packet
collision
happens inside
hub. It does not
support
spanning tree
protocol.
FIREWALL It is a Operates - A firewall ADV: ZyXEL SIMPLEWA
security on the uniquely Helps to monitor USGFLE LL is better
device that Network identifies the the traffic, if it finds X100 than an
can help layer and level of anything hazardous Network ordinary
protect the the congestion, it blocks them. Security FIREWALL
network by Transport which forbids Gives protection /UTM as it is free
filtering layer of the entry or against Malwares Firewall and open

4
20BCE0793 MEGHA BHATTACHARYA LAB DA 01

traffic and the OSI leave of like Trojan. at Rs. sourced.


blocking model. compromised Prevents hackers 28,000 Also it does
unauthorized services, and for manipulating the same
access. defends them our system and work as the
from different enhances privacy. FIREWALL.
forms of IP DISADV:
spoofing and It is expensive.
networking It has ability to
assaults. A restrict the
firewall includes computers
a space for the performance and
protection of slow down RAM.
events related
to security. A
firewall is a
suitable
interface for
many
operations not
relevant to
security. A
firewall will act
as an IPsec
framework.

REPEATER It is a Operates IEEE 802.3 When an ADV: TP LINK MESH


networking on the electrical signal A repeater is simple Repeate ROUTERS
device that physical is transmitted to connect. r at Rs. are
amplify or layer of via a channel, it It is cost-effective. 1399 at sometimes
regenerate the OSI gets attenuated. Do not seriously Amazon used as an
an incoming model. This poses a affect network alternative
performance.
signal before limitation upon to WIFI
Can extend a
retransmit-- the length of network's total extenders
ing it. the LAN. This distance. as they are
problem is Has the ability to more
solved by boost or strengthen efficient
installing the digital to and
retransmit
repeaters at seamless.
DISADV:
certain They all
Repeater are
intervals. broadcast
unable to reduce
Repeaters the same
network traffic.
amplifies the network
It cannot connect
attenuated name,
difference network
signal and then which
architectures.
retransmits it. enables Wi-
Digital repeaters Repeaters do not Fi devices
can even separate the device to roam
reconstruct in the collision between
signals distorted domain. mesh
by transmission It does not access
loss. Repeaters segment the points.

5
20BCE0793 MEGHA BHATTACHARYA LAB DA 01

are popularly network.


incorporated to
connect
between two
LANs thus
forming a large
single LAN.
ROUTER It is a Operates IEEE 802.11 A router is used ADV: Dlink 8- There are
networking on the in LAN (Local Multiple users can Port no possible
device used Network Area Network) be connected to Unmana alternative
to manage layer of and WAN (Wide the internet so that ged to ROUTER.
and forward the OSI Area Network) overall productivity Gigabit However,
data packets model. environments. It can be increased. Switch BLUETOOT
to computer shares It can be used as a at Rs. H and LAN
network. information intermediate 1899. It cables can
with other between 2 is be used for
routers in networks so that more ex connecting
networking. the environment is pensive  phones etc.
It uses the secure. than
routing protocol DISADV: other
to transfer the Connection can network
data across a become slow. ing
network. It is expensive than devices
other devices. like
All routers are not switches
reliable and and
compatible for all hubs.
devices.
GATEWAY It is a device Operates - Gateway ADV: Dlink DI- -
or node that on the interprets Expand the 704
forms a Network network as network by Internet
passage layer of endpoints from connecting Gatewa
between two the OSI one packets to computers with y at
networks model. another. different systems rs.12000
with But It can connect together.
different theoretic- two dis similar Possess improved
transmition -ally it network. security since they
Protocol. could be It does not allow user
used on support authentication.
any layer. dynamic DISADV:
routing. Difficult to be
It is deployed as implemented.
the virtual or It is costly.
physical server Cause time delay as
or the specific information must
appliance. be translated.

BRIDGE It is a Operates IEEE 802.1D A bridge ADV: Vtech A LAN or a


hardware in the transfers the Reduces collision, Network WAN is
device used data link data in the form network traffic with s sometimes
minor
to create a layer of of frames. It Bridges used as an
segmentation.

6
20BCE0793 MEGHA BHATTACHARYA LAB DA 01

connection the OSI sends data Connects at Rs. alternative


between two model. based on the similar network 4750 to a
types with different
separate MAC address of per BRIDGE.
cabling.
computer the device. Can reduce piece
networks or It can connect network traffic on a
to divide one only 2 diff LAN segment by
network into segments. It has subdividing network
two. only one port to communications
connect the
device. It does DISADV:
not use tables It does not filter
to forward the broadcasts.
data. More expensive
compared to
repeaters.
It is slower
compare to
repeaters due to
the filtering
process.

OBSERVATIONS:
Before performing the experiment I did not have much knowledge on the networking
devices. Now after performing the experiment I can summarize the following about the
network hardware components:
 NIC or network interface card is a network adapter that is used to connect the
computer to the network. It is installed in the computer to establish a LAN.  It has a
unique id that is written on the chip, and it has a connector to connect the cable to
it. The cable acts as an interface between the computer and router or modem.
 Repeaters are simple devices that work at the physical layer of the OSI. They
regenerate signals like hubs.
 Hubs are used to build a LAN by connecting different computers in a star/hierarchal
network topology, the most common type on LANs. It is a very simple device, once it
gets bits of data sent from computer A to B, it does not check the destination,
instead, it forwards that signal to all other computers within the network.
 Switches are more advanced than hubs. Instead of broadcasting the frames
everywhere, a switch actually checks for the destination MAC address and forwards
it to the relevant port to reach that computer only. This way, switches reduce traffic
and divide the collision domain into segments, this is very sufficient for busy LANs
and it also protects frames from being sniffed by other computers sharing the same
segment.
 Routers are used to connect different LANs or a LAN with a WAN. Routers control
both collision domains and broadcast domains. If the packet’s destination is on a
different network, a router is used to pass it the right way, so without routers, the
internet could not functions. Routers use NAT (Network Address Translation) in
conjunction with IP Masquerading to provide the internet to multiple nodes in the
LAN under a single IP address.

7
20BCE0793 MEGHA BHATTACHARYA LAB DA 01

 Gateways are very intelligent devices or else can be a computer running the
appropriate software to connect and translate data between networks with different
protocols or architecture, so their work is much more complex than a normal router.

QUESTION 02:

THEORY:
DEVICE DEF USED IN PROPERTIES DATA ADV / DISADV COST ANY
NAME LAYER TRANSF BETTER
ER RATE DEVICE
BLUETOOTH Bluetooth Bluetooth Bluetooth is a 600 ADV: Rs. 200 Bluetooth
is a short- covers all of wireless Megabit It is very cheap as in 4.0 can
range the layers of personal area s Per It can be used Amazon only
wireless the primary network Second for voice or data transfer
technology reference technology. transfer. data up to
standard model for It is open It has low power 25 Mbps,
that is used network standard for consumption. whereas
for communicati short range DISADV: the latest
exchanging ons, from transmission of It has low version of
data the physical data and voice bandwidth as WiFi can
between layer up to files. compared to wi- transfer
fixed and the It supports fi. data at up
mobile application point to point It can lose to 250
devices layer. and multipoint connection in Mbps. So
over short applications. certain WIFI is
distances. It uses conditions. more used
Frequency It allows only than
Hopping Spread short range Bluetooth.
Spectrum communication.
(FHSS) that It is not very
changes signal secure.
1600 times per
second.
WIFI Wi-Fi is the All Wireless The wireless 675 ADV: WIFI Ethernet
wireless LANs network has 3 Megabit It is not costly. plans is typically
technology operate on essential s Per The setup is not start at faster than
used to the Physical elements - radio Second very difficult RS. 500 a Wi-Fi
connect and Data signals, antenna using and can be from connection,
devices to Link layers, , and router. WIFI easily made. diff and it
the layers 1 and The radio waves 802.11g DISADV: service offers other
internet. It 2 are keys that It is sufficient provider advantage.
is the radio make Wi-Fi for home but A Ethernet
signal sent networking for large cable
from a possible. The infrastructure it connection
wireless computers and is insufficient. is more
router to a cell phones are The security is secure and
nearby ready with Wi-Fi not very strong. stable than
device, cards. The Wi-Fi Wi-Fi.

8
20BCE0793 MEGHA BHATTACHARYA LAB DA 01

which cards will read


translates the signals and
the signal create an
into data. internet
connection
between the
user and the
network. The
speed of the
device using Wi-
Fi connection
increases as the
computer gets
closer to the
main source.
WIRED The eight- The RJ 45 Devices in a Ranges ADV: RS. 2-3 WIFI is
CONNECTIO pin RJ45 operates on wired network betwee The cost is very per better than
N connector the Physical are usually n 100- less. piece as RJ 45
is a cable of Layer connected 1000 Does not in because it
twisted physically to a Megabit require switch Amazon is easier to
wire pairs. server, modem, s Per or hub. trouble
It is a router, or each Second Maintainence is shoot in
standardise other with dependi simple. WIFI than
d interface Ethernet ng on Data transfer cables.
which often cables. Each bandwid quality is very
connects a end of an th good.
computer Ethernet cable DISADV:
to a local has a connector It doesn’t offer a
area called an RJ45 good real time
network connector. service.
(LAN). Ethernet cables If there is any
feature small problem with
plastic plugs on cable then it is
each end that difficult to
are inserted troubleshoot.
into the RJ45
jacks of
Ethernet
devices.
INFRARED Infrared It operates The infrared The ADV: Infrared WIFI or RJ
(IR) is a on the data used to transfer range is The battery is 45 is better
wireless link layer of data files from betwee utilized in cheap. than
mobile the OSI one network to n 16 infrared But it is Infrared as
technology model. another has a Mbps, gadgets keep costlier the
used for frequency dependi going for long than RJ distance
device between 300 ng on term because of 45. from which
communica GHz and 400 the lower power data can be
tion over THz. It has a device utilization. shared is
short wavelength The sensor more in
ranges. between 1 mm doesn’t need WIFI and
to 750 nm. any contact the security

9
20BCE0793 MEGHA BHATTACHARYA LAB DA 01

It has a network with the item to is higher


range of 10 to be detected. with RJ 45.
30 meters. The DISADV: So RJ 45
modulation Lower and WIFI is
used for the information better than
transfer is Pulse rate Infrared.
Position transmission
Modulation contrast with
known as PPM. wired
It is a secure transmission .
mode of data Can transfer
transfer. data if distance
between 2
devise is very
less.

OBSERVATIONS:
After this experiment, I conclude that there is no one device which is the best method to
connect a computer to network. Depending upon the need and the situation we need to
choose a device which best suits our purpose.
For eg:

 If I need to send a few images or small files from one phone to another, or from
phone to laptop (or any two devices in same room) in such a situation I would use
Bluetooth. As Bluetooth is in-built in every devices nowadays. So it is a very cheap,
fast and viable solution when the files are small.
 In case I need to do some high priority work which requires continuous high speed,
non-interrupted net connection, in such cases I would use Ethernet cable (RJ 45). It
is also a very cheap and viable option. Also, it will provide uninterrupted connection.
 Suppose many members of my family need to send or receive files over a network at
the same time, in such cases, we can use a wi-fi connection. Using a Wifi connection
everybody can connect over a network and do their respective jobs. It is costly than
Bluetooth and RJ-45 but many people can use it at the same time. Also the speed
and security is much better than Bluetooth.
 Infrared can be used to connect two devices whose distance is in the range of few
millimetres. It is not much used and also the transfer speed is very less.

QUESTION 03:

SETUP OF THE ENVIRONMENT:

10
20BCE0793 MEGHA BHATTACHARYA LAB DA 01

01.

COMMAND IFCONFIG
NAME:

DESCRIPTION  The ifconfig stands for "interface configuration."


OF THE
 The ifconfig command displays and manipulate route and
COMMAND:
network interfaces.
 This command is used to configure network interfaces, or
to display their current configuration.
 It displays eth0, lo and wlan0 which are the names of the
active network interfaces on the system.
 Here, eth0 is the first Ethernet interface, lo is
the loopback interface, wlan0 is the name of the
first wireless network interface on the system.
SYNTAX OF The main command of ifconfig can be written as:
THE ifconfig
COMMAND:
There are various sub commands of ifconfig which can be
written as:
ifconfig –a
ifconfig –s
ifconfig –v

11
20BCE0793 MEGHA BHATTACHARYA LAB DA 01

OUTPUT: IFCONFIG

IFCONFIG -A

IFCONFIG –S

IFCONFIG -V

12
20BCE0793 MEGHA BHATTACHARYA LAB DA 01

02.

COMMAND PING
NAME:

DESCRIPTION  The ping command (named after the sound of an active


OF THE sonar system) sends echo requests to the host specified
COMMAND:
on the command line, and lists the responses received.
 ping - sends an ICMP ECHO_REQUEST packet to the
specified host. If the host responds, an ICMP packet is
received.
 One can “ping” an IP address to see if a machine is alive.
 It provides a very quick way to see if a machine is up and
connected to the network.
SYNTAX OF The command can be written as:
THE
COMMAND: ping www.google.com
ping www.vit.ac.in

OUTPUT:

…. Contd…

13
20BCE0793 MEGHA BHATTACHARYA LAB DA 01

03.

COMMAND NETSTAT
NAME:

DESCRIPTIO  It works with the LINUX Network Subsystem, it will tell us


N OF THE what the status of ports are ie. open, closed, waiting
COMMAND:
connections.
 It is used to display the TCP/IP network protocol statistics
and information.

SYNTAX OF The main command can be written as:


THE netstat
COMMAND:
The sub commands can be written as:
netstat –a : Show both listening and non-listening sockets. With
the –interfaces option, show interfaces that are not up
netstat –s : To list the statistics for all ports.
netstat –i : To get the list of network interfaces.
netstat –r : To get the kernel routing information.
netstat –at : To list all tcp ports.
netstat –au : To list all udp ports.
netstat –l : To list only the listening ports.
OUTPUT:

14
20BCE0793 MEGHA BHATTACHARYA LAB DA 01

04.

COMMAND DIG
NAME:

DESCRIPTION  The dig command stands for Domain Information Groper.


OF THE
 It is used for retrieving information about DNS name
COMMAND:
servers.
 It is basically used by network administrators.
 It is used for verifying and troubleshooting DNS problems
and to perform DNS lookups.
 Dig command replaces older tools such as nslookup and
the host.
SYNTAX OF The command can be written as:
THE dig –v
COMMAND:
dig www.google.com : This command causes dig to look up the
record for the domain name “www.google.com”.

15
20BCE0793 MEGHA BHATTACHARYA LAB DA 01

OUTPUT: DIG -V

DIG WWW.GOOGLE.COM

05.

COMMAND TRACEROUTE
NAME:

DESCRIPTION  The traceroute command in Linux prints the route that a


OF THE packet takes to reach the host.
COMMAND:
 This command is useful when you want to know about the
route and about all the hops that a packet takes. 

SYNTAX OF The command can be written as:


THE traceroute www.google.com
COMMAND:

OUTPUT:
traceroute www.google.com

16
20BCE0793 MEGHA BHATTACHARYA LAB DA 01

06.

COMMAND ROUTE
NAME:

DESCRIPTION  The route command in Linux is used when you want to


OF THE work with the IP/kernel routing table.
COMMAND:
 It is mainly used to set up static routes to specific hosts or
networks via an interface.
 It is used for showing or update the IP/kernel routing
table.
SYNTAX OF THE The command can be written as:
COMMAND: route –n : To display routing table in full numeric form.
route : It displays the routing table entries.
route –Cn : To list kernel’s routing cache information.
OUTPUT:
route –n, route, route -Cn

07.

17
20BCE0793 MEGHA BHATTACHARYA LAB DA 01

COMMAND SS
NAME:

DESCRIPTION  The ss (socket statistics) tool is a CLI command used to


OF THE show network statistics.
COMMAND:
 The ss command is a simpler and faster version of the
now obsolete netstat command.
 Together with the ip command, ss is essential for
gathering network information and troubleshooting
network issues.
SYNTAX OF The command can be written as:
THE ss –n
COMMAND:
ss –r
ss –u
ss –a
OUTPUT: ss –a

ss –n, ss –r, ss –u

PTO 
OBSERVATIONS:

18
20BCE0793 MEGHA BHATTACHARYA LAB DA 01

Before performing this experiment I was not aware about the network commands in LINUX.
Through this experiment, I learnt the various network commands, their use and the syntax. I
have also studied the various subcommands and their purpose. Also I executed these
commands in JSLinux online portal and observed the outputs.
To summarize:

COMMAND PURPOSE
ifconfig Display and manipulate route and network interfaces
ping To check connectivity between two nodes
netstat Display connection information
ss Replacement of netstat
dig Displays DNS related information
route Shows and manipulates IP routing table
traceroute Helps in network troubleshooting utility.

___________________________________________________________________________

THE END
THANK YOU
_____________________________________________

DONE BY:

Student Details:
Student Name: MEGHA BHATTACHARYA
Roll/Reg No: 20BCE0793
Email: megha.bhattacharya2020@vitstudent.ac.in
Mobile: 6382933694

19

You might also like