Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
34 views

Networking Finalreport Without Table of Content

This document provides an overview of basic network equipment including hubs, switches, routers, bridges, and repeaters. It describes the purpose and function of each device. Hubs broadcast data to all connected devices while switches can isolate transmission to specific devices. Routers connect different networks and manage traffic and IP addresses. Bridges connect separate networks, and repeaters amplify and extend signal range. The document also discusses network cables including straight cables used to connect dissimilar devices and crossover cables used to connect similar devices. Basic networking commands for Windows like ping, ipconfig, and tracert are also outlined. Finally, the document reviews IP addressing and how subnet masks are used to extract the network ID and host from an IP address.

Uploaded by

arbeen.tmz
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views

Networking Finalreport Without Table of Content

This document provides an overview of basic network equipment including hubs, switches, routers, bridges, and repeaters. It describes the purpose and function of each device. Hubs broadcast data to all connected devices while switches can isolate transmission to specific devices. Routers connect different networks and manage traffic and IP addresses. Bridges connect separate networks, and repeaters amplify and extend signal range. The document also discusses network cables including straight cables used to connect dissimilar devices and crossover cables used to connect similar devices. Basic networking commands for Windows like ping, ipconfig, and tracert are also outlined. Finally, the document reviews IP addressing and how subnet masks are used to extract the network ID and host from an IP address.

Uploaded by

arbeen.tmz
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 46

Lab 1

Basic Network Equipment

Objectives

 To understand Basic Network Equipment

Theory

1. Hub: A network hub is a node that broadcasts data to every computer or Ethernet-based
device connected to it. A hub is less sophisticated than a switch, the latter of which can
isolate data transmission to specific devices. Network hubs are best suited for small, simple
local area network (LAN) environments. Hubs cannot provide routing capabilities or other
advanced network service.

Fig: Hub

2. Switch: A network switch connects devices (such as computers, printers, wireless access
points) in a network to each other, and allows them to “talk” by exchanging data packets.
Switches can be hardware devices that manage physical networks, as well as software-based
virtual devices.

Fig: Switch

3. Router: A router is a device that connects two or, more packet-switched networks or
subnetworks. It serves two primary functions: managing traffic between these networks by

1
forwarding data packets to their intended IP Addresses and allowing multiple devices to use
the same internet connection.

Fig: Router

4. Bridge: A network bridge is a computer networking device that creates a single, aggregate
network from multiple communication networks or network segments. This function is called
network bridging. Bridging connects two separate networks as if they were a single network.

Fig: Bridge

5. Repeater: A repeater is a network device that retransmits a received single with more power
and to an extended geographical or topological network boundary than what would be
capable or topological network boundary than what would be capable with the original
signal. Repeaters amplify the received/input signal to a higher frequency domain so that it is
reusable, scalable, and available.

Fig: Repeater

Conclusion: Hence, we understood about the different networking devices.

2
Lab 2

Network Cables

Objective
 To construct straight and crossover cable

Theory
1. Standard (Straight Cabling):
A straight cable is used to connect dissimilar devices such as a computer to a hub, TVs to a
router, and so on. Straight cabling has the same pinout at both ends. This types of twisted-pair
cable are used in LAN to connect a computer or a network hub such as a router. It follows either
the T568A (outdated) or T568B standards. The most common types of cabling are used today.

Fig: Straight cabling

2. Crossover Cabling:
A cross cable is used to connect two similar devices, only by using the cable itself. The
connection between PC–to–PC, Router ––Router, Hub–to–Hub, etc. can be done using crossover
cabling. Crossover cabling has different pins out at both ends, specifically T8566A at one end
and T856B at the other end. It is widely used to connect two devices of the same type: e.g., two
computers or two switches to each other.

3
Fig: Crossover cabling

Procedure:
For the implementation of the straight and cross-cabling standards in networking. The UTP cable
must be crimped using the procedure described below:
1. Remove the outmost vinyl shield for 12mm at one end of the cable (Say A side)
2. Cut the inner transparent plastic thread.
3. Arrange the wires according to the desired standard.
4. Insert the metal wires into the RJ45 connector keeping the arrangement of wire the same.
5. Also make the other side of the cable (Say B side)
6. The crimping is complete.

Testing the crimped cable using the cable tester:


1. Connect one end of the crimped cable to the master port and another node to the remake
port of the cable tester

4
2. Press the start button and ensure that all the lights blink synchronously in both the master
and slave.
3. If any light does not blink or multiple lights blink at once, there is an error in the cable.
4. Re-crimp the cable and test again.

Conclusion:
Hence, both straight and crossover cables were constructed and tested successfully.

5
Lab 3
Basic Networking Commands (Dos Commands)

Objective
 To understand networking commands in DOS
Theory:
Networking Commands in DOS

1. Ping
The ping command is one of the most often used networking utilities for detecting devices on a
network and for troubleshooting network problems. When you ping a device you send that
devices a short message, which it then sends back (the echo).
The general format is ping hostname or ping IP address.
Example: Ping www.google.com or Ping: 192.168.10.10

2. Ipconfig:
Another indispensable and frequently used utility is used for finding network information about
your local machine-like IP addresses. DNS addresses etc.
Basic Use: Finding Your IP Address and Default Gateway
Ipconfig has several switches the most common are:

6
Ipconfig/all- display more information about the network setup on your systems including the
MAC address.

ipconfig/release --release the current IP address

ipconfig/renew – renew IP address


ipconfig/? – shows help

ipconfig/flushdns - flush the DNS caches

3. Hostname:
A very simple command that displays the hostname of your machine. This is much quicker than
going to the control panel >system route.

7
4. getmac:
Another very simple command that shows the MAC address of your network interfaces.

5. arp -a
This is used for showing the address resolution cache. This command must be used with a
command line switch arp –a is the most common.

8
6. NSlookup:
Used for checking DNS record entries.

7. Nbtstat:
Diagnostic tool for troubleshooting NetBIOS problems.

9
8. Netstat:
Used for displaying information about TCP and UPD connections and ports.

9. Tracert:
The tracert command is a command Prompt command that is used to get the network packet
being sent and received and the number of hops for that packet to reach to target.
Example: target www.google.com

10. Route:
In IP networks, routing tables are used to direct packets from one subnet to another. The Route
command provides the device’s routing tables. To get this result, just type route print. The Route

10
command results in the routing table, and the user can make changes by Commands such as
Route Add, Route Delete, and Route Change, which allows modifying the routing table as a
requirement.

11. Path Ping:


The pathing command provides a combination of the best aspects of Tracert and Ping.

Conclusion: Hence, all networking commands were executed successfully in command prompts.

11
Lap: 4

IPv4 Addressing and Subnetting

Objective
 To understand theoretical knowledge of IPV4 Addressing and subnetting

Theory:
1. IPV4 Address:
An IP address is an address used to uniquely identify a device on an IP network. The IPV4
address is made up of 32 binary bits which can be divisible into a network portion and host
portion with the help of a subnet mask. The 32 binary bits are broken into four octets (1 octet 8
bits). Each octet is converted to decimal and separated by a period(dot). For this reason, an IP
address is said to be expressed in dotted decimal format (for example 172.16.81.100). The value
in each octet ranges from 0 to 255 decimal, or 0000000011111111 binaries.

2. Subnetting:
Subnetting is the practice of dividing a network into two or smaller networks. Subnets often
work as a subnet mask, which acts as a sort of filter for internet traffic. The 32-bit IP address
contains information about the host and its network. It is very necessary to distinguish both. For
this, routers use a Subnet Mask, which is as long as the size of the network address in the IP
address. The Subnet Mask is also 32 bits long. If the IP address in binary is ANDed with its
Subnet Mark, the result yields the Network address. For example, say the IP address is
192.168.1.152 and the Subnet Mask is 255.255.255.0 then

12
This way the Subnet Mask helps extract the Network ID and the Host from an IP Address. It can
be identified now that 192.168.1.0 is the Network number and 192.168.1.152 is the host on that
network.

Conclusion:
Hence, we understood IP Addressing and Subnetting.

13
Lap 5
Overview of Packet Tracer and its features

Objective
 To understand the network simulator tools.
 To understand LAN networking, creation of VLAN, and IP addressing in the VLAN and
VLAN Trunk.

Theory
Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows
users to create network topologies and imitate modern computer networks. The software allows
users to simulate the configuration of Cisco routers and switches using a simulated command
line interface. Packet Tracer makes use of a drag-and-drop user interface, allowing users to add
and remove simulated network devices as they see fit. The software is mainly focused on Cisco
Networking Academy students as an educational tool for helping them learn fundamental CCNA
concepts. Previously students enrolled in a CCNA Academy program could freely download and
use the tool free of charge for educational use.

Packet Tracer allows users to create simulated network topologies by dragging and dropping
routers, switches, and various other types of network devices. A physical connection between
devices is represented by a 'cable' item. Packet Tracer supports an array of simulated Application
Layer protocols, as well as basic routing with RIP, OSPF, EIGRP, and BGP, to the extent
required by the current CCNA curriculum. As of version 5.3, Packet Tracer also supports the
Border Gateway Protocol.

14
Fig: Interface of Cisco packet Tracer

Feature of Cisco packet Tracer

1. Network Simulation
2. Device Emulation
3. Multiuser Collaboration
4. Packet Capture and Analysis
5.Built-in Protocols and Applications
6. Interactive Learning Activities

Conclusion:
The aims of this lab is to familiar with Cisco Packet Tracer.

15
Lab:6
Implementation of LAN

Objective: To know the implementation of the Local Area Network

Theory:
A local area network (LAN) is a collection of devices connected to one physical location, such as
a building, office, or home. A LAN can be smaller or larger, ranging from a home network with
thousands of users to an enterprise network with thousands of users and devices in an office or
school. A LAN comprises cables, access points switches, routers, and other components that
enable devices to connect to internal servers, web servers, and other LANS via wide area
networks.

Implementation:
In the packet tracer, computers are connected to a switch and the switch is connected to a router
through wires. IP Address is assigned to the router and the computers. The computer must use
the IP Address of the router as its default gateway. After assigning IP addresses and gateways the
computer should be able to communicate with the router and also with each other. Each
computer must be assigned a unique IP Address.

16
Fig: LAN
Switch and client as required
 Configure gateway and local IP for –client
 Configure the switch under the LAN database give the LAN no and LAN name check the
port no of the router on which the switch is connected and change that to trunk. Make
sure all clients are configured to LAN checking their port.

Conclusion:
Hence, LAN configurations are implemented using a Cisco packet tracer.

17
Lab:7
Implementation of VLAN

Objective:
 To Know the implementation of a Virtual Local Area Network.

Theory:
Virtual Local Area Network (VLAN) is a logical network created within a larger physical
network. It allows devices from different physical LANs to be grouped into a single logical
network, enabling better management, security, and performance by isolating traffic and
controlling communication within the VLAN.

Implementation
To VLAN configuration, computers, and routers are assigned with the IP Address but a pair of
computers belong to another network and they have a different gateway. To implement VLAN in
packet Tracer, VLAN Database is enabled in the router. Switch assigns a VLAN number that the
pair of computers is used to define. The router will be able to provide services to that computer
using its VLAN number.

Fig: VLAN

18
Router-Switch and client as required:
 Configure gateway and local IP for –client
 Configure the switch under the VLAN database give the VLAN no and VLAN name
check the port no of the router on which the switch is connected and change that to trunk.
Make sure all clients are configured to VLAN checking their port.

Conclusion:
Hence, VLAN configurations are implemented using a Cisco packet tracer.

19
Lab 8
Implementation of DHCP

Objective:
 To know about the implementation of the Dynamic Host Configuration Protocol

Theory:
DHCP is a network protocol used on an IP network where a DHCP server automatically assigns
an IP address and other information to each host on the network so they can communicate
efficiently with other endpoints. In addition to the IP address, DHCP also assigns the subnet
mask, default gateway address, domain name server (DNS) address, and other pertinent
configuration parameters.

Implementation:
Step 1: Set a router with one server and set a desktop as required.
Step 2: Enable the ports of the router and set an IP address for both server and router.
Step 3: Go to services on the server and the services assign the IP address of the router in the
server and set the start IP address.
Step 4: Enable the DHCP in the IP configuration section of the desktop.

Fig: Router Configuration (DHCP)

20
Fig: Server Configuration (DHCP)

Fig: IP Assignment Dynamically (DHCP)

 DHCP server IP assignment

Conclusion:
Hence, DHCP Configuration is implemented using a packet tracer.

21
Lap 9
Implementation of DNS
Objective:
 To understand the function and importance of DNS service in a network environment.
 Configuration of a DNS server to manage domain name resolution

DNS server
The purpose of a DNS server is to translate what a user types into their browser into something a
computer can understand and use to locate a website. In other words, its purpose is to convert a
domain name such as www.example.com into an IP address such as 71.232.101.120.

Thanks to DNS servers, people don’t have to memorize complex IP addresses like
216.58.217.206, which is Google’s IP address. They just have to memorize
www.google.com.This translation process — formally known as DNS resolution — requires
multiple hardware components. The most important is known as the primary DNS server.

 Configuring a DNS server

• Create a network with end devices, switch, and DNS server.

Fig: ip configuration
• Configure the IP addresses to all devices and add the DNS server’s IP to the ‘DNS
server’ section of the IP configuration menu.

22
• Open the DNS server, go to services, and turn on DNS. add a website address and add.

23
 Open the web browser on any end device and type in a website address and the website
should appear.

Conclusion:

The aims of the lab are to become familiar with DNS Server.

24
Lab:10
Implementation of FTP
Objective
 Enable an FTP server to facilitate file transfers

Overviews
The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of
computer files from a server to a client on a computer network. FTP is built on a client–server
model architecture using separate control and data connections between the client and the server.
FTP users may authenticate themselves with a clear-text sign-in protocol, normally in the form
of a username and password, but can connect anonymously if the server is configured to allow it.
For secure transmission that protects the username and password, and encrypts the content, FTP
is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).

Implementation of FTP server

To implement the FTP server, we follow the steps below

 Create a network with a server, a switch, and end devices.

 Assign IP to all devices and server

25
 Open the server and enable FTP service. Create a username and password assign the r/w
privileges and click add.

26
 Open the end device go to the command prompt and type ftp [server ip] Use the
previously created username and password and log in.

We can now perform file operations on the FTP server using commands like delete, rename,
etc

Conclusion:
The aims of the lab are to become familiar with FTP server.

27
Lab:11
Implementation of HTTP
Objective
 To know about the HTTP
 To know about the web server, and perform the HTTP operation

Overview
The implementation of HTTP, or Hypertext Transfer Protocol, involves the creation of software
systems that enable communication between clients, such as web browsers, and servers, such as
web servers. HTTP operates on a request-response model, where clients send requests to servers,
and servers respond with the requested resources or information. The implementation process
typically includes developing HTTP servers capable of handling incoming requests, parsing
request headers, processing data, and generating appropriate responses. Additionally, HTTP
clients are designed to send requests, interpret responses, and handle various status codes.
Implementation efforts focus on adhering to HTTP specifications, optimizing performance,
ensuring reliability, and incorporating security measures to create robust and efficient systems
for web communication.

HTTP Working
Http responds to the client's request in either of the following two ways:

 Sending the file to the client associated with the requested URL.
 Generating response by invoking a script and communicating with the database.

Configuring an HTTP
To configure a web server, we follow the steps below:

28
 Create a network with a switch, a server, and end devices.

 Configure IPs of switch server and end devices.

 Open server. Go to the services tab. Click https and turn http and https on.

 Edit the index.html file and save

29
 Open up the browser and type in the IP of the webserver and the website will
open up.

Conclusion:
The aims of the lab are to become familiar with HTTP.

30
Lab:12
Implementation of Email Server

Objective:
 Email server working
 Sending the mail from one computer to another computer

Theory
An email server implementation involves configuring software systems to manage the sending,
receiving, and storage of email messages. This process includes setting up mail transfer agents
(MTAs) to route messages between servers, configuring mail delivery agents (MDAs) for storing
messages in user mailboxes, and establishing domain name system (DNS) records for proper
mail routing. Security measures such as encryption protocols and authentication mechanisms are
implemented to protect email communications, while additional features like spam filtering and
antivirus scanning enhance reliability and security. Support for email protocols like SMTP,
IMAP, and POP3 enables clients to access their emails securely, contributing to the overall goal
of providing reliable and efficient email communication services.

Configuring an Email Server


To configure a web server, we follow the steps below:

 Create a network with a Switch, a Router, a Server, and End Devices

31
 Configure IPs of Switch, Router, Server, and End devices.

 Open server. Go to the services tab. Click Email turn SMTP and POP3 service on
and Fill in Create a Domain name as well as user setup.

 Open server. Go to the services tab. Click Email and configure the mail.

32
Click on Ram's desktop, navigate to the Desktop tab, open the Email application, and compose
the email.

 Click on Sanjib PC, navigate to the Desktop tab, open the Email application, and receive
the email.

33
Conclusion:

The aims of the lab are to become familiar with Emil Server.

34
Lab :13

Implementation of Static Routing

Objective

 To know about the static routing


 To know how to give IP routes to a router

Theory:

Static Routing: static routing is a form of routing that occurs when a router user a manually-
configured routing entry. Static routing does not use any routing algorithm or mechanism to
update the routing tables. This method is more suitable for a small network, where one can easily
memorize all the route information.

Implementation:

Step 1: Construct a network between the computer and the router.

Step 2- Configuration of static routing on Router 0

35
Step 3: Configuration of static routing on Router 1

Result:

Communicate between two computers by PING Command.

36
Conclusion

Hence in this way, Static routing was implemented by Using a Cisco packet tracer.

37
Lab:14

Implementation of Dynamic Routing(RIP)

Objective:

 To know about Dynamic Routing


 To know RIP dynamic protocol.

Dynamic Routing:

Dynamic Routing is a networking technique that provides optimal data routing. In dynamic
routing, the routing protocol operation on the router is responsible for the creation, maintenance,
and updating of the dynamic routing table.

Routing Information Protocol: The routing protocol (RIP) is one of the oldest distance-vector
routing protocols which employs the hop count as a routing metric. RIP prevents routing loops
by implementing a limit on the number of hoops allowed in a path from source to destination.
The largest number of hops allowed for RIP is 1.5, which limits the size of the network that RIP
can support.

Implementation:

Step 1: Construct the network for dynamic routing with IP configuration of all devices

38
Step 2: Configuration of dynamic routing on Router 0 using RIP.

Step 2: Configuration of dynamic routing on Router 1 using RIP.

39
Result:

The ping command was used to check for connectivity between devices.

Conclusion:

Hence, In this way, dynamic routing was simulated by using Routing Information Protocol
(RIP), in the Cisco packet tracer.

40
Lab:15

Implementation of Firewall

Objective:

 To understand the router firewall Access Control Lists (ACLs)

Theory

Packet filtering at the network level can be achieved by applying the Access Control Lists
(ACLs)1 at the router called router firewall. ACLs at the router filter the inbound traffic while it
permits or denies packets based on source IP/network and destination IP/network, IP, TCP, and
UDP protocol information. Generally, we use the ACLs to provide a basic level of security for
accessing our network. Access lists can allow one host to access a part of the network and
prevent another host from accessing the same area.

A standard ACL can be used for several purposes. In this lab, we will see how it can be used in
controlling unwanted network traffic. With standard ACL, we can define certain conditions for
the network traffic passing through the router. By default, the router does not filter any traffic
unless we manually put an ACL.

Firewall Implementation:
To configure Firewall three PCs and a server is connected to a hub as shown in the figure below:

 Step 1: IP configuration of all devices and turn on HTTP and HTTPS

41
Step 2: Click on the firewall on the desktop turn it on and specify the rules.

Result:
Here the ICMP is blocked but IP is allowed

42
Conclusion:
The aims of the lab are to become familiar with firewall protection.

43
Lab:16

Overview of Wireshark (Capture of IP, UDP, TCP)

Objective

 To know about the Wire Shark


 To know Wire Shark Interface

Theory
Wireshark is a widely used network protocol analyzer that allows you to capture and
interactively browse the traffic running on a computer network. It is an open-source tool that
provides detailed information about network protocols, packet contents, and data being
transferred over a network. Here's an overview of Wireshark's capabilities regarding the capture
of IP, UDP, and TCP traffic:

1. IP (Internet Protocol):

 Wireshark can capture and analyze IP packets, which are the fundamental units of data
transmission in computer networks.
 It can display various details about IP packets, including the source and destination IP
addresses, packet size, time to live (TTL), IP version, and more.
 Wireshark allows you to filter captured packets based on IP addresses, protocols, and
other criteria, making it easier to analyze specific traffic flows.

2. UDP (User Datagram Protocol):

44
 Wireshark is capable of capturing and dissecting UDP packets, which are a
connectionless communication protocol used for data transmission in network
applications.
 It can provide information about UDP packet headers, including the source and
destination port numbers, packet length, and checksum.
 Wireshark can analyze UDP-based protocols such as DNS (Domain Name System),
DHCP (Dynamic Host Configuration Protocol), VoIP (Voice over Internet Protocol), and
more.

3.TCP (Transmission Control Protocol):

 Wireshark excels at capturing and analyzing TCP packets, which are widely used for
reliable data transmission in computer networks.
 It can display detailed information about TCP connections, including sequence numbers,
acknowledgment numbers, window size, TCP flags (e.g., SYN, ACK, FIN), and more.
 Wireshark can help diagnose various TCP-related issues such as retransmissions, out-of-
order packets, congestion control mechanisms, and TCP window scaling.
 Wireshark allows you to analyze TCP-based protocols such as HTTP (Hypertext Transfer
Protocol), FTP (File Transfer Protocol), SSH (Secure Shell), TLS/SSL (Transport Layer
Security/Secure Sockets Layer), and other.

Capturing Packets in Wireshark.


Step1: Open Wireshark application.
Step2: Choose the interface of a Wi-Fi with live signal.
Step3: click on a Wi-Fi to see the packets flow.
Step4: Observe a flow of a packets and details of a packet in it.

45
Fig: Wireshark Interface

Fig: Flow of Packet in Wireshark

Conclusion:
The aims of the lab is to become with Basic operation of Wireshark

46

You might also like