SIET, Jhalwa Prayagraj
Department of Computer Science & Engg.
Computer Network Lab (BCS-653)
INDEX
Sn.No. Name of Practical Date Sign
1 SIMULATING PING AND TRACEROUTE 19/3/25
2 CONFIGURATION OF ROUTERS HUBS 19/3/25
AND SWITCHES
3 SOCKET PROGRAMMING AND CLIENT 2/4/25
SERVER MODEL
4 STOP AND WAIT PROTOCOL AND 2/4/25
SLIDING WINDOW PROTOCOL
5 SIMULATING ARP /RARP PROTOCOLS 9/4/25
6 IMPLEMENT RPC (REMOTE PROCEDURE 16/4/25
CALL
7 CONFIGURATION OF NETWORKING 23/4/25
HARDWARE LIKE RJ45 CONNECTOR,
CAT6 CABLES, CRIMPING TOOL, ETC.
8 APPLICATION OF TCP AND UDP SOCKET 30/4/25
DNS SNMP FILE TRANSFER
SIET, Jhalwa Prayagraj
Department of Computer Science & Engg.
EXPETRIMENT NO- 1
OBJECT: SIMULATING PING AND TRACEROUTE
Program:
Step:-
1. Select two PC.
2.Connect with the Copper cross over cables.
3.Enter the IP address in both PC1 &PC2
4.Add Simple PDU (Message from PC1 to PC2)
5.Simulation for sending msg from PC1 to PC2
Name: Himanshu singh
Year:3rd Year
Uni. Roll No. 2201620100085
Section:CS-2
Branch: CSE
SIET, Jhalwa Prayagraj
Department of Computer Science & Engg.
EXPETRIMENT NO- 2
OBJECT: CONFIGURATION OF ROUTERS HUBS AND
SWITCHES
Program:
Steps:
1. Select two PC,One Switch(2960-24TT) &One
Router ( ISR4331).
2.Connect with the automatic connection type wire
cables.
3.Enter the IP address in both PC1 &PC2
4.PC1-IP-192.168.1.1, PC2-IP-192.168.1.2
5.Configuration commands
6.Add Simple PDU (Message from PC1 to PC2)
7.Simulation for sending msg from PC1 to PC2
Name: himanshu singh
Year:3rd Year
Uni. Roll No. 2201620100085
Section:CS-2
Branch: CSE
SIET, Jhalwa Prayagraj
Department of Computer Science & Engg.
EXPETRIMENT NO- 3
OBJECT: SOCKET PROGRAMMING AND CLIENT
SERVER MODEL 3
Theory: The Client-Server Model in socket programming is a
fundamental concept in network communication. It allows two
processes—one acting as a client and the other as a server to
exchange data over a network.
Understanding the Client-Server Model
The client initiates a request for information or services.
The server listens for incoming requests, processes them, and
sends back responses.
Communication happens via sockets, which serve as end points
for sending and receiving data.
Types of Client-Server Architectures
1. Two-Tier Architecture: The client directly interacts with the
server.
2. Three-Tier Architecture: A middleware sits between the client
and server, handling security checks and load.
Socket Programming Basics
TCP (Transmission Control Protocol): Reliable, connection-
oriented communication.
UDP (User Datagram Protocol): Faster, connectionless
communication.
Concurrent Servers: Handle multiple client requests
simultaneously using processes or threads.
Name: Himanshu singh
Year:3rd Year
Uni. Roll No. 2201620100085
Section:CS-2
Branch: CSE
SIET, Jhalwa Prayagraj
Department of Computer Science & Engg.
EXPETRIMENT NO- 4
OBJECT: STOP AND WAIT PROTOCOL AND SLIDING WINDOW
PROTOCOL
THEORY:
Stop-and-Wait Protocol:
A simple flow control mechanism in data communication.
The sender transmits a single frame and waits for an
acknowledgment before sending the next frame.
Ensures error-free transmission but can be slow due to waiting
time.
Sliding Window Protocol:
A more efficient method that allows multiple frames to be sent
before requiring an acknowledgment.
Uses a window size to control the number of frames in transit.
Includes Go-Back-N and Selective Repeat variations for handling
errors.
Name: Himanshu Singh
Year:3rd Year
Uni. Roll No. 2201620100085
Section:CS-2
Branch: CSE
SIET, Jhalwa Prayagraj
Department of Computer Science & Engg.
EXPETRIMENT NO- 5
OBJECT:SIMULATING ARP /RARP PROTOCOLS
Program:
Steps:
1. Select two PC, two laptop two Switches(2960-
24TT) &One Router ( ISR4331).
2.Connect with the automatic connection type wire
cables.
3.Enter the IP address in both PC& Laptop.
4.Configuration commands
6.ARP & RARP Command
7.Simulation
Name: Himanshu Singh
Year:3rd Year
Uni. Roll No. 2201620100085
Section:CS-2
Branch : CSE
SIET, Jhalwa Prayagraj
Department of Computer Science & Engg.
EXPETRIMENT NO- 6
OBJECT: IMPLEMENT RPC (REMOTE
PROCEDURE CALL
Theory:
Remote Procedure Call (RPC) :
RPC is a powerful communication mechanism that allows a
program to execute procedures on a remote system as if they were
local. It is widely used in distributed systems.
Steps to Implement RPC :
1. Client Stub: The client calls a local stub function, which
prepares the request.
2. Message Transmission: The request is sent over the network to
the remote server.
3. Server Stub : The server receives the request and forwards it to
the actual procedure.
4. Procedure Execution : The remote procedure runs and generates
a response.
5. Response Transmission : The result is sent back to the client.
6. Client Receives Response : The client stub processes the
response and returns it to the application.
Name: Himanshu Singh
Year:3rd Year
Uni. Roll No. 2201620100085
Section:CS-2
Branch: CSE
SIET, Jhalwa Prayagraj
Department of Computer Science & Engg.
EXPETRIMENT NO- 7
OBJECT: CONFIGURATION OF NETWORKING
HARDWARE LIKE RJ45 CONNECTOR, CAT6 CABLES,
CRIMPING TOOL, ETC.
Theory:
RJ 45 Connector:
A registered jack (RJ) is a standardized physical network
interface for connecting telecommunications or data equipment.
The physical connectors that registered jacks use are mainly of
the modular connector and 50-pin miniature ribbon connector types.
The most common twisted-pair connector is an 8-position, 8-
contact (8P8C) modular plug and jack commonly referred to as
an RJ45 connector,
RJ45 Parts
Even though RJ45 is used for all kinds of usage, its construction is
quite simple as it has a limited number of parts. In any given Rj45
connector, you will find the following parts:
● Copper pins that are used to attach with the copper lines
● Clip for attaching the RJ45 connector to the RJ45 port and release
● Crimp for holding the cable inside the RJ45 connector
RJ45 Cabling
As mentioned earlier, RJ45 is an 8P8C connector which is
highly modular since it supports different cabling configuration.
While you can make all kinds of possible combinations, the two
highly popular ones include the CAT5 and CAT6 cables. These are
also known as the T-568A and T-568B standards which use the
same connectors but with different cabling as shown:
T-568A:
1. White/Green (Receive +)
2. Green (Receive -)
3. White/Orange (Transmit +)
4. Blue
5. White/Blue
6. Orange (Transmit -)
7. White/Brown 8. Brown
T-568B:
1. White/Orange (Transmit +)
2. Orange (Transmit -)
3. White/Green (Receive +)
4. Blue
5. White/Blue
6. Green (Receive -)
7. White/Brown
8. Brown
CAT-6 Cable:
Category 6 is an Ethernet cable standard defined by the Electronic
Industries Association and Telecommunications Industry
Association. Cat 6 is the sixth generation of twisted pair Ethernet
cabling that is used in home and business networks. Cat 6 cabling is
backward compatible with the Cat 5 and Cat 5e standards that
preceded it.
: CAT-6 RJ45
CAT 6 Cable Working:
Category 6 cables support Gigabit Ethernet data rates of 1 gigabit
per second. These cables can
accommodate 10 Gigabit Ethernet connections over a limited
distance—commonly about 180 feet for a single cable. Cat 6 cable
contains four pairs of copper wire and uses all the pairs for
signalling to obtain its high level of performance. Other basic facts
about Cat 6 cables include are the ends of a Cat 6 cable use the same
RJ-45 standard connector as previous generations of Ethernet
cables. The cable is identified as Cat 6 by printed text along the
insulation sheath. An enhanced version of Cat 6, called Cat 6a,
supports up to 10 Gbps speeds at greater distances.
Crimping Tool:
Crimp tools are a varied collection of devices used to join materials
or components by pressing them together and creating a seal or
crimp. One of the most common uses of crimping tools is the
attachment of connectors to the end of electrical cables. Many
crimping tools are multi-functional, with compression available
alongside bending, cutting, stripping and similar actions. They are
designed to work with particular cable, wire or pipe sizes - or
gauges – and some models work with several.
Crimping Tool
Crimp Tool Categories
There are various types of crimp tool available, each with distinct
advantages and disadvantages. For smaller crimping requirements,
where precision is key, a manually-operated crimp tool will most
likely be sufficient. However, when more power is required,
hydraulic and electrical models are also available.
Crimp Connectors
Connectors are made from materials malleable enough for
compression within crimping tools. They are available in multiple
shapes for different uses. Common ones include:
● Ring Connectors – for secure attachments to terminals
● Quick Disconnect Connectors - typically barrel or blade-shaped
● Butt Connectors – for wire splicing
● Spade Connectors – for slide connections into terminals
Name: Himanshu singh
Year:3rd Year
Uni. Roll No. 2201620100085
Section:CS-2
Branch: CSE
SIET, Jhalwa Prayagraj
Department of Computer Science & Engg.
EXPETRIMENT NO- 8
OBJECT: APPLICATION OF TCP AND UDP SOCKET DNS SNMP
FILE TRANSFER
THEORY: TCP & UDP Socket Applications
TCP (Transmission Control Protocol) Applications:
Web Browsing (HTTP/HTTPS) – Ensures reliable communication
between client and server.
Email Services (SMTP, POP3, IMAP) – Delivers messages
with error correction.
File Transfer (FTP, SFTP) – Supports secure, connection-
oriented data transmission.
UDP (User Datagram Protocol) Applications:
DNS Queries – Resolves domain names quickly using
connectionless requests.
Streaming Services (VoIP, IPTV, Online Gaming) – Fast
transmission without error checking.
Broadcasting (DHCP, SNMP) – Efficiently sends messages to
multiple clients.
DNS (Domain Name System) Applications
Domain Name Resolution – Converts user-friendly domain names
(e.g., example.com) into IP addresses for communication.
Load Balancing – Distributes traffic among multiple servers.
Caching & Optimization – Speeds up lookups using cached
responses.
Security Features (DNSSEC) – Prevents spoofing by
authenticating DNS responses.
SNMP (Simple Network Management Protocol)
Applications
Network Monitoring– Collects data from devices like routers,
switches, and servers.
Performance Tracking – Monitors bandwidth usage and device
health.
Fault Detection & Alerts– Sends notifications in case of failures.
Remote Configuration – Adjusts network settings via SNMP
commands.
File Transfer Applications
FTP (File Transfer Protocol) – Transfers files between hosts
securely.
SFTP (Secure File Transfer Protocol) – Encrypts file transfers
over SSH.
HTTP/HTTPS File Downloads – Enables secure web-based file
retrieval.
Peer-to-Peer Sharing– Uses UDP/TCP for decentralized file
exchange.
Each protocol plays a crucial role in efficient
communication and network management.
Name: Himanshu Singh
Year:3rd Year
Uni. Roll No. 2201620100085
Section:CS-2
Branch: CSE