Lab Manual
Lab Manual
Lab Manual
1
(a) INTRODUCTION TO DCN
(b ) INTRODUCTION TO PACKET TRACER
2 Network Topologies
9 Static Routing
refers to the exchange of data between a source and a receiver. Data communication is said to
be local if communicating devices are in the same building or a similarly restricted geographical
area.
The meanings of source and receiver are very simple. The device that transmits the data is
known as source and the device that receives the transmitted data is known as receiver. Data
communication aims at the transfer of data and maintenance of the data during the process but
not the actual generation of the information at the source and receiver.
NETWORK
A network consists of two or more computers that are linked in order to share
resources (such as printers and CDs), exchange files, or allow electronic
communications. The computers on a network may be linked through cables,
telephone lines, radio waves, satellites, or infrared light beams.
Packet Tracer creates .pkt & .pka Extension when saving files.
Packet Tracer Include Routers, Switches, Hub, Servers, End Devices, Firewalls, And
Multi user environment support, so one can easily perform a large activity with its
group members or partners on two computers. After completing of an activity both can
merge a single Lab in one activity.
(c) Difference between intermediary and end
devices
Intermediary devices:
A device that connects directly to end user devices or provides end user routing to
other networks. For instance, A router is an example of intermediary devices
Intermediary devices connect the individual hosts to the network and can connect
multiple individual networks to form an internet-work.
End Devices
The network devices that people are most familiar with are called end devices.
These devices form the interface between the human network and the underlying
communication network. Some examples of end devices are:
Serial DCE Cable (Used in WAN links where clock rate is required)
Serial DTE Cable (used in WAN link where clock rate is not required)
Lab
(a)Understanding ip address
An Internet Protocol address (IP address) is a numerical label assigned to each
device (e.g., computer, printer) participating in a computer network that uses
the Internet Protocol for communication.An IP address serves two principal functions:
host or network interface identification and location addressing. Its role has been
characterized as follows: "A name indicates what we seek. An address indicates where
it is. A route indicates how to get there.
An IP address consists of four numbers, each of which contains one to three digits, with
a single dot (.) separating each number or set of digits. Each of the four numbers can
range from 0 to 255. Here's an example of what an IP address might look like:
78.125.0.209. This innocuous-looking group of four numbers is the key that
empowers you and me to send and retrieve data over our Internet connections,
ensuring that our messages, as well as our requests for data and the data we've
requested, will reach their correct Internet destinations. Without this numeric protocol,
sending and receiving data over the World Wide Web would be impossible .
Classes
Class B Network
In a Class B Network, binary addresses start with 10, therefore the decimal number can
be anywhere from 128 to 191. The number 127 is reserved for loopback and is used for
internal testing on the local machine. The first 16 bits (the first two octets) identify the
network and the remaining 16 bits indicate the host within the network. An example of a
Class B IP address is 168.212.226.204 where "168.212" identifies the network and
"226.204" identifies the host on that network.
Class C Network
Binary addresses start with 110, therefore the decimal number can be anywhere from
192 to 223. The first 24 bits (the first three octets) identify the network and the
remaining 8 bits indicate the host within the network. An example of a Class C IP
address is 200.168.212.226 where "200.168.212" identifies the network and "226"
identifies the host on that network.
Task-2
Connect these Devices with Copper Cross over cable
Task-3
After establishing the connectivity between all the devices check that all devices must be Showing
GREEN signal
LAB
(a) Establishing connectivity between client and server
Task –1
Configure Server-Pt with the following
IP address: 192.168.1.254
Subnet Mask: 255.255.255.0
Click on the Server-PT icon Then Select from the Upper menu “Desktop” After selecting the
desktop select “IP CONFIGURATION”. Place the above Address with respect to their names.
Task-2
Click on the PC-PT icon, then selects From the upper Menu “Desktop” After selecting desktop,
select IP CONFIGURATION. Place the following address
IP Address: 192.168.1.1
Subnet Mask: 255.255.255.0
Task- 3
Go to the PC-PT icon, then selects From the upper Menu “Desktop” After selecting desktop,
click on the “WEB BROWSER” place the following IP in the “URL”
192.168.1.254
When you hit enter a message will arrive “Welcome to Packet Tracer”
Task- 4
Finals Again, click on the PC-PT icon, then selects From the upper Menu “Desktop” After
selecting desktop, click on “Command Prompt” to check the connectivity between the client &
server put the following command in Command Prompt
PC>ping 192.168.1.254
(b)
Task –1
Drag two routers in the white area of the packet tracer.
Task –2
NOTE: First power OFF your router then place a WIC-2T , then power ON the router.
Click each router and go the Physical Interface as shown in the (figure 2) Click WIC-2T button,
which is placed in the left side of the Interface. When you click on WIC-2T button, after
clicking the button drag the following figure in the above-mentioned panel.
WIC-2T is used when we need to connect two WAN interfaces with each other
Task –3
When the WIC-2T is placed properly in the router the next step is to plug the Serial Cable in
each router.
Note: Serial Cable must be DCE from one End and DTE from another end otherwise
router will not work.
Task –4
Click on Router 1 Select CLI(command Line interface) Tab & enter the following commands.
Task –6
Finally ping another router. In the end your ping should be 100%
Router#ping 10.0.0.2
Task –1
Drag A Router & a switch with respect to the Topology diagram
Task –2
Click on the Router 1 and select CLI Tab
Task –3
Configure the Fast Ethernet Interface from the router so that it would show Green signal &
acknowledge each other
Task –4
Router#ping 11.0.0.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 11.0.0.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 10/14/30 ms
LAB
UNDERSTANDING DHCP
Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to
automatically assign an IP address to a computer from a defined range of numbers (i.e., a
scope) configured for a given network. DHCP assigns an IP address when a system is started.
Benefits of DHCP
In Windows Server 2003, the DHCP Server service provides the following benefits:
Reduced network administration. DHCP includes the following features to reduce network
administration:
o The ability to assign a full range of additional TCP/IP configuration values by means of
DHCP options.
o The efficient handling of IP address changes for clients that must be updated frequently,
such as those for portable computers that move to different locations on a wireless
network.
o The forwarding of initial DHCP messages by using a DHCP relay agent, thus eliminating
the need to have a DHCP server on every subnet.
Why use DHCP
Every device on a TCP/IP-based network must have a unique unicast IP address to access the network and
its resources. Without DHCP, IP addresses must be configured manually for new computers or computers
that are moved from one subnet to another, and manually reclaimed for computers that are removed
from the network.
DHCP enables this entire process to be automated and managed centrally. The DHCP server maintains a
pool of IP addresses and leases an address to any DHCP-enabled client when it starts up on the network.
Because the IP addresses are dynamic (leased) rather than static (permanently assigned), addresses no
longer in use are automatically returned to the pool for reallocation.
b) Design a topology for DHCP server Through which PC would be able to Get IP’S
Dynamically .
Task-1
Configure the interface of a router with a correct IP address
Router>en
Router#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#intfastEthernet 0/0
Router(config-if)#ip address 192.168.1.1 255.255.255.0
Router(config-if)#no shutdown
Router(config-if)#exit
Task-4
When electing the IP address to the PC . The pc would be able to get the IP assigned
Automatically
Task –5 (Troubleshooting)
If a pc has assigned the IP statically then it would not be able to get acknowledgement from other
PC’S
LAB
BASIC CONCEPTS ABOUT SUBNETTING
What is subnetting?
When we subnet a network, we basically split it into smaller networks. For
example, when a set of IP addresses is given to a company, the company
might want to "break" (the correct term is "partition") that one network into
smaller ones, one for each department. This way, the technical department
and management department can each have a small network of their own. By
subnetting the network, we can partition it to as many smaller network as we
need. This also helps reduce traffic and hides the complexity of the network.
By default, all type of classes (A, B and C) have a subnet mask; we call it the
default subnet mask. You need to have one because:
1) All computers need the subnet mask field filled when configuring IP
3) You should at least enter the default subnet mask for the class you're using
In the previous pages I spoke about IP classes, network IDs and host IDs.
The subnet mask is what determines the network ID and host ID portion of an
IP address.
The table below shows clearly the subnet mask that applies for each network
class.
When dealing with subnet masks in the real world, we are free in most cases
to use any type of subnet mask in order to meet our needs. If, for example, we
require one network which can contain up to 254 computers, then a class C
network with its default subnet mask will do fine. If we need more, then we
might consider a class B network with its default subnet mask.
Note that the default subnet masks have been set by the IEEE committee, the
same guys that set and approve the different standards and protocols.
We will have a closer look at this later on and see how we can achieve a class
C network with more than 254 hosts.
1)192.168.1.0/30
2) 200.100.100.0/29
3)200.200.200.0/27
Lab
STATIC ROUTE
a) Configuring Static Route
Task-1
Router1>enable
Router1#configure Terminal
Router1(Config-if)# no shutdown
Router2>enable
Router2#configure Terminal
Router2(Config-if)# no shutdown
Router2(Config-if)#end
Router2>enable
Router2#configure Terminal
Router2(Config-if)# no shutdown
Router3>enable
Router3#configure terminal
Router3(Config)#interface se0/0/1
Router3(Config-if)#no shutdown
Router3(Config-if)#end
Router3>enable
Router3#configure terminal
Router3(Config)#interface fa0/0
Router3(Config-if)#no shutdown
Router3(Config-if)#end
Configuring Static Route
Router1>enable
(Where 172.16.1.0= Destination Address 255.255.255.0= Subnet mask, 10.0.0.2= Next Hop
Address)
Router2>enable
Router2#configure Terminal
Router3>Enable
Router3#configure terminal
Port Security
To configure Port security on interface fa0/1 such that no more than 1 PC connect to that
interface
Method
Test PC> IP address 10.0.0.1 Mask 255.0.0.0
Laptop 3>IP address 10.0.0.2 Mask 255.0.0.0
Laptop 4>IP address 10.0.0.3 Mask 255.0.0.0
Laptop 5>IP address 10.0.0.4 Mask 255.0.0.0
Switch Configuration
Enter interface configuration mode for FastEthernet 0/11 and enable port security.
Before any other port security commands can be configured on the interface, port security must
be enabled.
SW1(config-if)#interface fa0/1
SW1(config-if)#switchportmode access
SW1(config-if)#switchport port-security
* Notice that you do not have to exit back to global configuration mode before entering interface
configuration mode for fa0/1.
To configure the port to learn only one MAC address, set the maximum to 1:
7. How To configure the port to add the MAC address to the running configuration.
The MAC address learned on the port can be added to (“stuck” to) the running configuration for
that port.
1. A routing protocol specifies how routers communicate with each other, disseminating
information that enables them to select routesbetween any two nodes on a computer
network. Routing algorithms determine the specific choice of route. Each router has a
priori knowledge only of networks attached to it directly.
RIP is a relatively old but still commonly used interior gateway protocol
created for use in small, homogeneous networks. It is a classical distance-
vector routing protocol. RIP is documented in RFC 1058.
RIP uses broadcast User Datagram Protocol (UDP) data packets to
exchange routing information. Cisco IOS software sends routing
information updates every 30 seconds, which is termed advertising. If a
router does not receive an update from another router for 180 seconds or
more, it marks the routes served by the nonupdating router as being
unusable. If there is still no update after 240 seconds, the router removes
all routing table entries for the nonupdating router.
The metric that RIP uses to rate the value of different routes is hop
count. The hop count is the number of routers that can be traversed in a
route. A directly connected network has a metric of zero; an unreachable
network has a metric of 16. This small range of metrics makes RIP an
unsuitable routing protocol for large networks.
A router that is running RIP can receive a default network via an update
from another router that is running RIP, or the router can source (generate)
the default network itself with RIP. In both cases, the default network is
advertised through RIP to other RIP neighbors.
Cisco IOS software will source the default network with RIP if one of the
following conditions is met:
• The ip default-network command is configured.
• The default-information originate command is configured.
• The default route is learned via another routing protocol or static route
and then redistributed into RIP.
RIP sends updates to the interfaces in the specified networks. If the
network of an interface network is not specified, it will not be advertised in
any RIP update.
.
.
b)
Configuring RIP protocol
Router>enable
Router#configure t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname pooh
pooh(config)#interface se0/0/0
pooh(config-if)#ip address 192.168.1.1 255.255.255.0
pooh(config-if)#clock rate 64000
pooh(config-if)#no shutdown
Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname Piglet
Piglet(config)#interface se0/0/0
Piglet (config-if)#ip address 192.168.1.2 255.255.255.0
Piglet (config-if)#no shutdown
Piglet (config-if)#exit
Piglet (config)#interface se0/0/1
Piglet (config-if)#ip address 172.16.1.1 255.255.255.0
Piglet (config-if)#clock rate 64000
Piglet (config-if)#no shutdown
Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#Hostname Newman
Router(config)#interface se0/0/0
Newman(config-if)#ip address 172.16.1.2 255.255.255.0
Newman(config-if)#no shutdown
Task-2
Configuring Rip v1
pooh(config)#router rip
pooh(config-router)#network 192.168.1.0
pooh(config-router)#exit
pooh(config)#end
Piglet(config)#router rip
Piglet(config-router)#network 192.168.1.0
Piglet(Config-router)#network 172.16.0.0
Piglet(config-router)#exit
Piglet(config)#end
Newman>enable
Newman#configure terminal
Newman(config)#router rip
Newman(config-router)#network 172.16.0.0
Newman(config-router)#exit
Finally verify the Connectivity from End to End
Ping From Newman to pooh
Newman# ping 192.168.1.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 49/59/63 ms