NC Da1
NC Da1
NC Da1
Course Course
Class Group Course Title Class Id Slot
Code Type
General Network and Embedded
CSE1004 VL2021220502954 L51+L52
(Semester) Communication Lab
TABLE OF CONTENTS
02 EXPLAIN DIFFERENT 08
NETWORKING DEVICES THAT
HELP PUT SYSTEM IN NETWORK
RJ 45
WI-FI
BLUETOOTH
INFRARED
03 EXPLAIN DIFFERENT OS 11
COMMANDS TO CHECK
NETWORK RELATED
INFORMATION
IFCONFIG
DIG
NETSTAT
PING
ROUTE
SS
TRACEROUTE
2
20BCE0793 MEGHA BHATTACHARYA LAB DA 01
QUESTION 01:
THEORY:
DEVICE DEF USED IN IEEE PROPERTIES ADV/DISADV COST BETTER
NAME / LAYER STANDARD DEVICE
IMAGE
NIC It is a Operate IEEE 802.11 NIC is used to ADV: Rs.700 ETHERNET
hardware on both wireless NC convert data Provides high onwards CABLE is
component physical with provide into a digital reliable connect. as in more
used to and data 4 modes – signal. Bulk data can be Flipkart efficient
connect a link layer managed, It offers both shared among than NIC. It
computer of the OSI mastered, ad wired (using users. provides
with another model. hoc, monitor cables) and Comm. Speed is better
computer on mode. wireless (using high. speed and
a network. Wi-Fi) data DISADV: lower
communication Inconvinient in latency
techniques. case of wired NIC. therefore
It is a Data is not secure. more
middleware Config. Should be reliable
between a proper for better connection
server and a communication.
data network.
SWITCH It is a Operate IEEE 802.3 A switch has ADV: Rs. 1500 ROUTER is
hardware on the many ports, to They increase the onwards more
device that network which available as in sophisticat
connects layer and computers are bandwidth of the Amazon ed device
multiple data link plugged in. system. and is inter
device on a layer of When a data Help to reduce changeably
computer the OSI frame arrives at workload on indv. used with a
network. reference any port it PC SWITCH.
model. examines the Can be directlt Routers
destination connected to have a
address, workstations. higher
performs DISADV: speed and
necessary They are more can
checks and expensive. connect to
sends the frame Broadcast of traffic multiple PC
to the can be difficult. and
corresponding They are networking
device. It vulnerable to devices.
supports security attacks.
unicast,
multicast &
broadcast
communications
. It uses MAC
address to send
data packets to
3
20BCE0793 MEGHA BHATTACHARYA LAB DA 01
destination
ports. It uses
packet
switching
technique to
receive and
forward data
packets.
Transmission
mode is full
duplex. It can
perform some
error checking .
HUB It is a Operates IEEE 802 It is used to ADV: Rs. 1450 SWITCH is
hardware on the connect They are less costly per more
device which physical segments of a than switches. piece in efficient
is used to layer. LAN. A hub Good performance Amazon than HUB.
connect stores various as it uses broadcast It is more
multiple ports, so when a model which efficient at
device in a packet arrives at doesn’t affect passing a
network. one port, it is network. data
copied to Extends network packet
various other coverage for good across the
ports. Hub communication. network.
works as a DISADV:
common Can’t work on full
connection duplex mode.
point for Can’t support
devices in a network which are
network. It like token ring.
works with It can’t provide
broadcasting dedicated
and shared bandwidth for
bandwidth. It every device.
has 1 broadcast
domain and 1
collision
domain. Packet
collision
happens inside
hub. It does not
support
spanning tree
protocol.
FIREWALL It is a Operates - A firewall ADV: ZyXEL SIMPLEWA
security on the uniquely Helps to monitor USGFLE LL is better
device that Network identifies the the traffic, if it finds X100 than an
can help layer and level of anything hazardous Network ordinary
protect the the congestion, it blocks them. Security FIREWALL
network by Transport which forbids Gives protection /UTM as it is free
filtering layer of the entry or against Malwares Firewall and open
4
20BCE0793 MEGHA BHATTACHARYA LAB DA 01
5
20BCE0793 MEGHA BHATTACHARYA LAB DA 01
6
20BCE0793 MEGHA BHATTACHARYA LAB DA 01
OBSERVATIONS:
Before performing the experiment I did not have much knowledge on the networking
devices. Now after performing the experiment I can summarize the following about the
network hardware components:
NIC or network interface card is a network adapter that is used to connect the
computer to the network. It is installed in the computer to establish a LAN. It has a
unique id that is written on the chip, and it has a connector to connect the cable to
it. The cable acts as an interface between the computer and router or modem.
Repeaters are simple devices that work at the physical layer of the OSI. They
regenerate signals like hubs.
Hubs are used to build a LAN by connecting different computers in a star/hierarchal
network topology, the most common type on LANs. It is a very simple device, once it
gets bits of data sent from computer A to B, it does not check the destination,
instead, it forwards that signal to all other computers within the network.
Switches are more advanced than hubs. Instead of broadcasting the frames
everywhere, a switch actually checks for the destination MAC address and forwards
it to the relevant port to reach that computer only. This way, switches reduce traffic
and divide the collision domain into segments, this is very sufficient for busy LANs
and it also protects frames from being sniffed by other computers sharing the same
segment.
Routers are used to connect different LANs or a LAN with a WAN. Routers control
both collision domains and broadcast domains. If the packet’s destination is on a
different network, a router is used to pass it the right way, so without routers, the
internet could not functions. Routers use NAT (Network Address Translation) in
conjunction with IP Masquerading to provide the internet to multiple nodes in the
LAN under a single IP address.
7
20BCE0793 MEGHA BHATTACHARYA LAB DA 01
Gateways are very intelligent devices or else can be a computer running the
appropriate software to connect and translate data between networks with different
protocols or architecture, so their work is much more complex than a normal router.
QUESTION 02:
THEORY:
DEVICE DEF USED IN PROPERTIES DATA ADV / DISADV COST ANY
NAME LAYER TRANSF BETTER
ER RATE DEVICE
BLUETOOTH Bluetooth Bluetooth Bluetooth is a 600 ADV: Rs. 200 Bluetooth
is a short- covers all of wireless Megabit It is very cheap as in 4.0 can
range the layers of personal area s Per It can be used Amazon only
wireless the primary network Second for voice or data transfer
technology reference technology. transfer. data up to
standard model for It is open It has low power 25 Mbps,
that is used network standard for consumption. whereas
for communicati short range DISADV: the latest
exchanging ons, from transmission of It has low version of
data the physical data and voice bandwidth as WiFi can
between layer up to files. compared to wi- transfer
fixed and the It supports fi. data at up
mobile application point to point It can lose to 250
devices layer. and multipoint connection in Mbps. So
over short applications. certain WIFI is
distances. It uses conditions. more used
Frequency It allows only than
Hopping Spread short range Bluetooth.
Spectrum communication.
(FHSS) that It is not very
changes signal secure.
1600 times per
second.
WIFI Wi-Fi is the All Wireless The wireless 675 ADV: WIFI Ethernet
wireless LANs network has 3 Megabit It is not costly. plans is typically
technology operate on essential s Per The setup is not start at faster than
used to the Physical elements - radio Second very difficult RS. 500 a Wi-Fi
connect and Data signals, antenna using and can be from connection,
devices to Link layers, , and router. WIFI easily made. diff and it
the layers 1 and The radio waves 802.11g DISADV: service offers other
internet. It 2 are keys that It is sufficient provider advantage.
is the radio make Wi-Fi for home but A Ethernet
signal sent networking for large cable
from a possible. The infrastructure it connection
wireless computers and is insufficient. is more
router to a cell phones are The security is secure and
nearby ready with Wi-Fi not very strong. stable than
device, cards. The Wi-Fi Wi-Fi.
8
20BCE0793 MEGHA BHATTACHARYA LAB DA 01
9
20BCE0793 MEGHA BHATTACHARYA LAB DA 01
OBSERVATIONS:
After this experiment, I conclude that there is no one device which is the best method to
connect a computer to network. Depending upon the need and the situation we need to
choose a device which best suits our purpose.
For eg:
If I need to send a few images or small files from one phone to another, or from
phone to laptop (or any two devices in same room) in such a situation I would use
Bluetooth. As Bluetooth is in-built in every devices nowadays. So it is a very cheap,
fast and viable solution when the files are small.
In case I need to do some high priority work which requires continuous high speed,
non-interrupted net connection, in such cases I would use Ethernet cable (RJ 45). It
is also a very cheap and viable option. Also, it will provide uninterrupted connection.
Suppose many members of my family need to send or receive files over a network at
the same time, in such cases, we can use a wi-fi connection. Using a Wifi connection
everybody can connect over a network and do their respective jobs. It is costly than
Bluetooth and RJ-45 but many people can use it at the same time. Also the speed
and security is much better than Bluetooth.
Infrared can be used to connect two devices whose distance is in the range of few
millimetres. It is not much used and also the transfer speed is very less.
QUESTION 03:
10
20BCE0793 MEGHA BHATTACHARYA LAB DA 01
01.
COMMAND IFCONFIG
NAME:
11
20BCE0793 MEGHA BHATTACHARYA LAB DA 01
OUTPUT: IFCONFIG
IFCONFIG -A
IFCONFIG –S
IFCONFIG -V
12
20BCE0793 MEGHA BHATTACHARYA LAB DA 01
02.
COMMAND PING
NAME:
OUTPUT:
…. Contd…
13
20BCE0793 MEGHA BHATTACHARYA LAB DA 01
03.
COMMAND NETSTAT
NAME:
14
20BCE0793 MEGHA BHATTACHARYA LAB DA 01
04.
COMMAND DIG
NAME:
15
20BCE0793 MEGHA BHATTACHARYA LAB DA 01
OUTPUT: DIG -V
DIG WWW.GOOGLE.COM
05.
COMMAND TRACEROUTE
NAME:
OUTPUT:
traceroute www.google.com
16
20BCE0793 MEGHA BHATTACHARYA LAB DA 01
06.
COMMAND ROUTE
NAME:
07.
17
20BCE0793 MEGHA BHATTACHARYA LAB DA 01
COMMAND SS
NAME:
ss –n, ss –r, ss –u
PTO
OBSERVATIONS:
18
20BCE0793 MEGHA BHATTACHARYA LAB DA 01
Before performing this experiment I was not aware about the network commands in LINUX.
Through this experiment, I learnt the various network commands, their use and the syntax. I
have also studied the various subcommands and their purpose. Also I executed these
commands in JSLinux online portal and observed the outputs.
To summarize:
COMMAND PURPOSE
ifconfig Display and manipulate route and network interfaces
ping To check connectivity between two nodes
netstat Display connection information
ss Replacement of netstat
dig Displays DNS related information
route Shows and manipulates IP routing table
traceroute Helps in network troubleshooting utility.
___________________________________________________________________________
THE END
THANK YOU
_____________________________________________
DONE BY:
Student Details:
Student Name: MEGHA BHATTACHARYA
Roll/Reg No: 20BCE0793
Email: megha.bhattacharya2020@vitstudent.ac.in
Mobile: 6382933694
19