Lab CN
Lab CN
Lab CN
DEPARTMENT OF
INFORMATION TECHNOLOGY
PRACTICAL FILE OF COMPUTER NETWORKS
2. Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator
is a device for connecting multiple twisted pair or fiber optic Ethernet devices together and
making them act as a single network segment. Hubs work at the physical layer (layer 1) of the
OSI model. The device is a form of multiport repeater. Repeater hubs also participate in
collision detection, forwarding a jam signal to all ports if it detects a collision.
4. Bridge: A network bridge connects multiple network segments at the data link layer
(Layer 2) of the OSI model. In Ethernet networks, the term bridge formally means a device
that behaves according to the IEEE 802.1D standard. A bridge and switch are very much
alike; a switch being a bridge with numerous ports. Switch or Layer 2 switch is often used
interchangeably with bridge. Bridges can analyze incoming data packets to determine if the
bridge is able to send the given packet to another segment of the network.
6. Gate Way: In a communications network, a network node equipped for interfacing with
another network that uses different protocols.
A gateway may contain devices such as protocol translators, impedance matching
devices, rate converters, fault isolators, or signal translators as necessary to provide
system interoperability. It also requires the establishment of mutually acceptable
administrative procedures between both networks.
A protocol translation/mapping gateway interconnects networks with different
network protocol technologies by performing the required protocol conversions.
EXPERIMENT- 2
Classification of IP address
Sub netting
Super netting
Apparatus (Software): NA
As show in figure we teach how the ip addresses are classified and when they are used.
Sub netting
Why we Develop sub netting and How to calculate subnet mask and how to identify subnet
address.
Super netting
Why we develop super netting and How to calculate supernet mask and how to identify
supernet address.
EXPERIMENT-3
Aim: Connect the computers in Local Area Network.
EXPERIMENT- 4
Aim: Study of basic network command and Network configuration commands.
ping:
ping sends an ICMP ECHO_REQUEST packet to the specified host. If the host responds,
you get an ICMP packet back. Sound strange? Well, you can “ping” an IP address to see if a
machine is alive. If there is no response, you know something is wrong.
Traceroute:
Traceroute is a command which can show you the path a packet of information takes from
your computer to one you specify. It will list all the routers it passes through until it reaches
its destination, or fails to and is discarded. In addition to this, it will tell you how long each
'hop'from router to router takes.
nslookup:
pathping:
A better version of traceroute that gives you statics about packet lost and latency.
Getting Help
In any command mode, you can get a list of available commands by entering a question mark
(?).Router>?
To obtain a list of commands that begin with a particular character sequence, type in
thoseharacters followed immediately by the question mark (?).
Router#co?
Router#configure ?
You can also abbreviate commands and keywords by entering just enough characters to make
the command unique from other commands. For example, you can abbreviate the show
command to sh.
Configuration Files
Any time you make changes to the router configuration, you must save the changes to
memory because if you do not they will be lost if there is a system reload or power outage.
There are two types of configuration files: the running (current operating) configuration and
the startup configuration.
Use the following privileged mode commands to work with configuration files.
• configure terminal – modify the running configuration manually from the terminal.
IP Address Configuration
Router>enable password
Step 2: Enter the configure terminal command to enter global configuration mode.
Router#config terminal
Step 3: Enter the interface type slot/port (for Cisco 7000 series) or interface type port (for Cisco
2500 series) to enter the interface configuration mode.
Example:
Step 4: Enter the IP address and subnet mask of the interface using the ip address ipaddress
subnetmask command.
Example,
Switch#
Switch#enable
Switch#confi
Configuring from terminal, memory, or network [terminal]?
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#host name xyz
^
% Invalid input detected at '^' marker.
Switch(config)#hostname xyz
xyz(config)#enable password abc
xyz(config)#interface vlan1
xyz(config-if)#ip address 192.168.1.1 255.255.255.0
xyz(config-if)#no shutdown
xyz(config-if)#
%LINK-5-CHANGED: Interface Vlan1, changed state to up
EXPERIMENT-6
Aim: Router Configuration Using Packet Tracer
After configuring the given network a packet should be ping from any one machine to
another.
Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface FastEthernet0/0
Router(config-if)#ip address 192.168.0.254 255.255.255.0
Router(config-if)#no shutdown
Router#
Router>enable
Router#
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface Serial2/0
Router(config-if)#ip address 192.168.1.2 255.255.255.0
Router(config-if)#no shutdown
Router#
EXPERIMENT-7
Aim: Configuring Static and Default Routes
Apparatus (Software): Packet tracer Software
After configuring the given network a packet should be ping from any one machine to
another.
Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface FastEthernet0/0
Router(config-if)#ip address 192.168.0.254 255.255.255.0
Router(config-if)#no shutdown
Router#
Router>enable
Router#
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface Serial2/0
Router(config-if)#ip address 192.168.1.2 255.255.255.0
Router(config-if)#no shutdown
Router#
IP ROUTE Command.....
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#ip route 192.168.2.0 255.255.255.0 192.168.2.2
Router(config)#exit
Router#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
Router>enable
Router#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
RIP
Procedure:
1. Develop a Topology shown in figure given below.
3. Configure all Routers
4. Implement RIP protocols in Router to configure Network.
Router0 configuration.....
Router>
Router>en
Router#config t
router0(config)#int lo0
router0(config-if)#int f0/0
Building configuration...
[OK]
router0#
router0#
router0>
router0>en
router0#config t
router0(config-router)#net 10.0.0.0
router0(config-router)#
router0(config-router)#end
router0#
Router1 Configuration.....
Router>enable
Router#config t
Router(config-if)#no shut
Router(config-if)#int f0/1
Building configuration...
[OK]
Router#
Router#
Router#
Router>
Router>en
Router#con t
Router(config-router)#net 10.0.0.0
Router(config-router)#
Router(config-router)#
Router(config-router)#end
Router2 Configuration.....
Router>en
Router#config t
Router(config-if)#no shut
Router(config-if)#int f0/0
Router#wr
Building configuration...
[OK]
Router#
Router#
Router#
Router>
Router>
Router>en
Router#show ip route
Router(config-router)#net 10.0.0.0
Router(config-router)#end
Router#
Router#show ip route
Router#
Router#
Router3 Configuration.......
Router>
Router>en
Router#config t
Router(config-if)#int f0/1
Router(config-if)#ip address 10.1.14.2 255.255.255.0
Router(config-if)#no shut
Building configuration...
[OK]
Router#
Router#
Router#show ip route
Router(config-router)#net 10.0.0.0
Router(config-router)#
Router(config-router)#end
Topology Diagram
Objectives
Background / Preparation
You have been asked to go back to a business customer and install a new Linksys wireless router for
the customer office. The company has some new personnel who will be using wireless computers to
save money on adding additional wired connections to the building. The business is concerned about
the security of the network because they have financial and highly classified data being transmitted
over the network. Your job is to configure the security on the router to protect the data.
In this activity, you will configure WEP security on both a Linksys wireless router and a workstation.
b. Click the Wireless menu option and change the Network Name (SSID) from
Default to CustomerWireless. Leave the other settings with their default
options.
c. Click the Save Settings button at the bottom of the Basic Wireless Settings window.
d. Click the Wireless Security submenu under the Wireless menu to display the current
wireless security parameters.
f. In the Key1 text box, type 1a2b3c4d5e. This will be the new WEP pre-shared key to
access the wireless network.
g. Click the Save Settings button at the bottom of the Wireless Security window.
c. Click the Wireless button to display the current wireless configuration settings on the
workstation.
e. Change the Security Mode to WEP. Enter 1a2b3c4d5e in the Key text box, and then
close the window.
After you configure the correct WEP key and SSID on the customer wireless workstation, notice that
there is a wireless connection between the workstation and the wireless router.
b. Click the Desktop tab to view the applications that are available.
c. Click on the Command Prompt application to bring up the command prompt.
d. Type ipconfig /all and press Enter to view the current network configuration settings.
e. Type ping 192.168.2.1 to verify connectivity to the LAN interface of the customer wireless
router.
h. In the address bar of the web browser window, type http://192.168.1.10. Press Enter.
The Intranet web page that is running on the customer server appears. You have just
verified that the customer wireless workstation has connectivity to the rest of the
customer network.
i. Click the Check Results button at the bottom of this instruction window to check your work.
Reflection
b. What is the significance of the key that you used to secure WEP?