Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Lab Manual

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 66

LAB MANUAL

Course Code: CSI-405


Course Title: Computer Network

Course Instructor: Dr. Iftikhar Naseer


Lab Instructor: Dr. Iftikhar Naseer
Department of Computer Sciences
Superior College Mian Chan
Course Description
This course covers the networking fundamental and modern architectural description
concerning to the network architecture, computer network devices and network
communication protocols. Different network architecture like OSI and TCP structures are
described. Different communication protocols like TCP/IP, UDP, HDLC, PPP etc. are mentioned
with their working and data formats with control information. Analog and digital transmission,
methods of multiple access techniques are the parts of this course.

Course Objectives
To introduce the students to the concept of computer communication, Analog and digital
communication, Network layers, Network models like OSI and TCP/IP and protocol standards.
Emphasis is given on the modern computer network concepts, creating and managing the
compute network and understanding the computer architecture and data communication in
different ways.

Learning Outcomes of Course


After completion of this course, students will be able to

 Understand the components and specifications of network devices


 Understand the working and usage of the network device like NIC, Hub, Switches, and
Router etc.
 Familiar with Transmission media and tools: Co-axial cable, UTP cable, Crimping tool
Connectors etc.
 Create and manage LAN (Local Area Network)
 Manage the different LAN topologies.
 Configure TCP/IP protocols in windows environment
 Troubleshoot with different commands and procedures
 Install and use the packet trace like CISCO packet tracer
 Have the knowledge about data communication techniques
 Have the knowledge about the data transmission in different formats
 Student will have knowledge about cybercrimes and security threats

Books and Supporting Meterial


1. Introduction to computer network /4, A.S Tanerithurn
2. Computer Network and Internet 8/E. 2008
3. Data and Computer Communication by Willian Stalling
Tools and Lab Equipment
1. Scrimping Tool
2. UTP cable, connectors
3. Computers
4. Switches, Router, Hub
5. Windows OS
6. Packet Tracer CISCO

Lab Practical # Lab Contents

1 1.1 Familiarization to different Network devices

2 2.1 Making straight through cross over cable

3 3.1 Cabling and Computer Naming

4 4.1 IP Addressing

5 5.1 Sharing and Permission

6 6.1 Network Troubleshooting (use of different commands)

7 7.1 Cisco IOS introduction and Installation

8 8.1 Creating Star Topology in Packet Tracer

9 9.1 Bus Topology In Packet Tracer

10 10.1 Ring Topology in Packet Tracer

11 11.1 Mesh Topology in Packet Tracer

12 12.1 Router Configuration

13 13.1 Multiple Router Configuration

14 14.1 Creating Wireless Network in Packet Tracer

15 15.1 DHCP Server Configuration


Lab.1

Familiarization to different Network devices


Objectives: To be familiar with network devices and their working before creating actual
network.

1. Computer:- A computer is a machine or device that performs processes, calculations and


operations based on instructions provided by a software or hardware program. It is designed to
execute applications and provides a variety of solutions by combining integrated hardware and
software components.

2. Network Interface Card:

A network interface card (NIC) is a hardware component, typically a circuit board or chip,
installed on a computer so it can connect to a network. Modern NICs provide functionality
to computers, such as support for interrupt interfaces, data transmission, network traffic
engineering and partitioning.
3. Network Switch

A network switch is a hardware component responsible for relaying data from networks to the
destination endpoint through packet switching, MAC address identification, and a multiport
bridge system.

4. Router

A router is a device that connects two or more packet-switched networks or


subnetworks. It serves two primary functions: managing traffic between these
networks by forwarding to their intended , and allowing multiple devices to use
the same Internet connection.
5. Scrimping Tool

A crimping tool is a handy device that allows you to create secure connections between
wires and connectors. It works by deforming the connector onto the wire, ensuring a strong
bond. With a crimping tool, you can easily join electrical wires, network cables, coaxial
cables, and more.

6. Unshielded Twisted Pair(UTP) Cable

An unshielded twisted pair is widely used in telecommunication. It is most common type when
compared with shielded twisted pair cable which consists of two conductors usually copper, each
with its own colour plastic insulator.

7. Shielded Twisted Pair (STP) Cable


A shielded twisted pair is a type of twisted pair cable that contains an extra wrapping foil or
copper braid jacket to protect the cable from defects like cuts, losing bandwidth, noise, and
signal to the interference. It is a cable that is usually used underground, and therefore it is
costly than UTP. It supports the higher data transmission rates across the long distance.

Categories:

Category 1: It is used for telephone lines that have low-speed data.

Category 2: It can support up to 4Mbps.

Category 3: It can support up to 16Mbps.

Category 4: It can support up to 20Mbps.

Category 5: It can support up to 200Mbps

8. Cable Connectors
A device that eliminates a section of cabling or implements a state of access for network
devices including PCs, hubs, and switches etc. Connectors can be famous for their physical
presentation and mating features, including jacks and attachment (male connectors) or
attachments and ports (female connectors).
Lab 2.

Making straight through and cross over cable


Objectives: Creation of network different cable (Straight Through and Cross Over)

Requirements: Crimping tools, UTP Cable, RJ-45 connector, Cable tester.

Making Straight UTP Cable:

Steps

1- Peel the end of the UTP cable , approximately 2 cm.

2- Open the cable strands , align and follow the arrangement as standard cable image shown below .

3- Once the order is according to the standard , cut and flatten the ends of the cable,

4- Put the cable is straight and aligned into the RJ - 45 connector , and make sure all cables are in
correct position as follows:

Orange White on no 1

Orange on no 2

Green White on no 3

Blue on no 4

Blue White on no 5

Green on no 6

White Brown on no 7

Brown on no 8
5- Make crimping using crimp tools , press crimping tool and make sure all the pins ( brass ) on the
RJ - 45 connector has " bite " of each cable . usually when done will sound "click ". Once finished at
the end of this one , do it again at the other end cable.

6- The final step is to check the cable that you created earlier using the LAN tester , enter each end
of the cable ( RJ- 45 ) to each LAN port available on the tester , turn and make sure all of the LEDs
light up according to the order of the wires we created

Creating Cross UTP Cable:-


Creating a cross cable has almost the same steps with straight cable , the difference lies only in the
colour sequence from both ends of the cable . Unlike the straight cable that has the same colour
sequence at both ends of the cable , the cross cable has a different colour sequences at both ends of
the cable.

The first ends is same with straight cable :

Orange White on no. 1

Orange on no. 2

Green White on no. 3

Blue on no. 4

Blue White on no. 5

Green on no. 6 .

White chocolate on no. 7


Brown on no. 8

For the second end of the cable, the colour composition is different from the first . The colour
arrangement is as follows
Lab. 3

Cabling and Computer Naming


Objectives: Creating Computer Network and to make computers be identified with unique
names.

To create computer network, operating system must be installed. It should be in proper


working. Missing OS files or courpt windows can errornous in the computer network.

Plugging the cable:

It is quit technical way to plug the cable into the NIC card. It can be comfortable in the
future if the cables are also name or numbered. Cable and Switches must be in the safe
condition.

Steps

Following step are required to plug the network cable

1. Plug one end of an Ethernet cable into the Ethernet port on your computer.

2. Plug the opposite end of the Ethernet cable into one of the Ethernet ports on your router.

Naming the Computers

For the unique identification of every computer over network, it is necessary to assign different
name to every computer. It is the best for user to recognize each computer for sharing data or
information.

Steps:

1. Right click on “ This PC “ icon on Desktop and select Properties


2. Click on Rename this PC tab

3. Enter name in the textbox

4. Click Next button

System will require to restart

5. Restart the windows


Name will be changed

Lab. 4

IP Addressing
Objectives: To create network with static IP Addresses

IP (Internet Protocol) addresses work like digital street addresses that let devices find each
other online. Every internet device has a unique IP address. All of these addresses can be
converted into text formats via the Domain Name System (DNS) format. This forms the basis of
the World Wide Web.

Commonly two types of IP addresses are used for computer network

 Static IP Adress
 Dynamic IP Address

Static IP Addresses

The word “static” means unchanging, and this is a good description of how a static IP address
works. The static IP meaning refers to an IP address that is assigned to a device and remains
constant.

Static IP address types are typically found in devices like web servers. This form of IP address is
usually utilized by businesses that need to communicate globally and want a fixed identity.

Dynamic IP Address

Dynamic IP addresses constantly change. The IP address is not connected to an individual user
or company.

Steps to assign IP Address

1. Right click on “ Network “ icon on Desktop and select Properties


2. Click “ change adopter setting “

3. Right click on “ Ethernet Connection “ and select properties

4. Double Click on “ Internet Protocol Version 4(TCP/IPv4)


5. Check the “ Use the following IP Address” radio button and enter IP address and subnet
mask

6. Click “ Ok” and again click “ OK”


IP Address has been assign to the computer
Lab. 5

Sharing and Permission


Objectives: To share the data, information or other resources like printer, scanner etc. on the
network. The main objective of establishing network is to share information and resources.

Following steps can be taken to share information and resources

1. Select the folder or other resource you want to share. In this practice we want to share
a folder. Right click on the folder and select “ Give access to” then click “ Specific
people” option

2. Select a specific user or “ Every One “ if you want to share this folder to every user on
the network.

3. Click “ Add “ botton to add the user


User will be added in the list

4. To give specific permission click on the right down arrow and set permission
Like “ Read” or “ Read/ Write” than click “ Share” button.
5. Select “ Yes turn on network share” option

6. Click “ Done “ button


The folder has been shared to every user on the network.
Lab 6.

Network Troubleshooting (use of different commands)


Troubleshooting Connectivity

Ping Command

Ping command is available on virtually any operating system with network connectivity, that
acts as a test to see if a networked device is reachable.
The ping command sends a request over the network to a specific device. A successful ping
results in a response from the computer that was pinged back to the originating computer.

Steps
1. Open Command Prompt in windows
2. Type ping with IP Address on System Name
Example

192.168.43.28 is a private IP address and directly related to your Wi-Fi network. It is the chain
of numbers you use to access the router admin page.
TTL is part of the network packet protocol. It defines the Time To Live(TTL) for the data packet
before it is dropped to prevent congestion. In multicast it is used to restrict the data packet to
defined network. TTL can be set to any value up to 255.
“bytes=32”: This part of the response indicates that the size of the data packet sent in
the ping request was 32 bytes.
Time=16ms A good ping speed typically ranges between 10-20ms for professional gamers.
This ping result shows that the connected device getting response from Wi-Fi
network(192.168.43.28). Size of data packet sent in the ping command is 32bytes. Ping
command speed is 16 ms and TTL(Time To Live) =64

So our computer is connected to the Wi-Fi network.

Ping command also can be used with other parameters like

Ping command syntax for Windows

-t Pings the specified host until stopped. To stop - type Control-C

-S Source address to use

-c Routing compartment identifier

-p Ping a Hyper-V Network Virtualization provider address

-4 Force using IPv4

ipconfig command
Ipconfig is used to view and configure the network settings on a Windows computer. It's often
used to troubleshoot network issues, like connectivity problems or incorrect IP addresses.

Steps

1. Open Command Prompt


2. Type the command “ ipconfig “
Lab. No. 7

Cisco IOS introduction and Installation


Objective:- Installation and Introduction of simulation tools packet tracer/ GNS3.

GNS3 ( Graphical Network Simulator -3) : It is a network software emulator first released in
2008. It allows the combination of virtual and real devices , used to simulate complex networks.
It uses Dynamips ( dynamip s is an emulator computer program that was written to emulate
Cisco routers.) emulation software to simulate Cisco IOS.

Installation of Packet Tracer:

Step 1 : First serach “ cisco packet tracer download ” in browser


Step 2 : Now click on the website https://www.netacad.com/courses/packet-tracer
After clicking on the link

Step 3 : Now slide down and then we find page as shown in below and the we click on learn more option

Learn more option


After clicking on learn more option.

Step 4 : To download cisco packet tracer we need to enroll as a student in the free course. For this we
click on sign up option.

Step 5: Enter country , Year of Birth and Month of Birth


Step 7: Enter First name, Last Name, Email and Password and click Create account

Step 8: Go to your email account and click Activate account


Then click “ Click here to proceed “

You will receive your account is updated


Step 9 : Now login with you email and password

Step 10: Now enter state and your experience in IT and click Create account

Step 11: Now go to the Resource menu and click download Packet Tracer and select OS
Downloading will be started

Installation of Packet Tracer


Lab No. 8

Creating Star Topology in Packet Tracer

Objectives: the use of packet trace and its operation. Creating network and data transmission
in Star Topology as a practical approach.

Steps
Step1: Select router and drop to the working window

Step 2: Add Number of computers as you required


Step 3: Add connection from switch to computers (Click the connection line, click on the
switch, select FastEthernet0/1.

Than drag the line to computer and click on it, select FastEthernet0.
Step 4: Double click on the computer, Select Desktop manure and select IP configuration

Assign IP Addresses and Subnet Mask to computer

Step 5: Add Packet to sender and receiving computer and click Simulation
Step 6: Click play Simulation. The transmission will be started
Lab No. 9

Bus Topology in Packet Tracer

Objectives: Creating and maintaining of Bus Topology in practical environment

Steps:
Step 1: Add Switches and computer as you required( One Switch for one computer)

Step 2: Make Connection

Click on connection icon and select the select the doted line for switch to switch connection,
select FastEthernet0/1 than click on second switch and select FastEthernet0. Repeat this
process for all switches.
Click solid line for switch to computer connection, click on first computer and select
FastEthernet0.

Drag the line to switch 1 and click then select FastEthernet0. Repeat this process for all
computers
Step 3: Assign IP Address and Subnet Mask to all computers

Assign IP Addresses and Subnet Mask to computer


Step 4: Add Packet to sender and receiving computer and click Simulation

Step 5: Start the simulation to show the transaction


Lab 10

Ring Topology

Objectives: working with Ring Topology in packet trace

Steps:
Step 1: Add the number of computers and same number of switches

Step 2: Make connection as above mentioned process( First switch to switch and computer to
computer with dotted and soled lines)
Step 3: Assign IP Address and Subnet Mask to all computers

Assign IP Addresses and Subnet Mask to computer


Step 5: Add packet ( Click on Icon ) then click on sender and receiver computer

Step 6: Start simulation (Transection will be started)

Lab 11
Lab 11

Mesh Topology

Objectives: Creating and maintain the mesh topology in packet tracer

Steps:
Step 1: Add number of switches and computers as required

Step 2: Make connection as above mentioned process( First switch to switch and computer to
computer with dotted and soled lines)
Step 3: Assign IP Address and Subnet Mask to all computers

Assign IP Addresses and Subnet Mask to computer


Step 4: Add packet ( Click on Icon ) then click on sender and receiver computer

Step 6: Start simulation (Transection will be started)


Lab 12

Connecting two or more networks with router

Objectives: use of multiple routers and their configuration

Steps:
Step 1: Create two networks (Network1 and Network2)

Add two computers and one switch to network1 and two computers and one switch in
network2 and connect these networks with one router

Step 2: Assign IP Address to computers in each network


Step 3: A) Configure router with IP address and subnet mask for first network
(GigabitEthernet0/0/0) with IP Address 192.168.1.10 subnet mask 255.255.255.0

B) Configure router with IP address and subnet mask for second network
(GigabitEthernet0/0/1) with IP Address 192.168.2.10 subnet mask 255.255.255.0

Step 4: A) Now assign the default gateway to computers in network1 (192.168.1.10 is the
router IP address of network1)
A) Now assign the default gateway to computers in network2 (192.168.2.10 is the router IP
address of network2)
Step 5: Assign packet to transmit on the network (click sender and receiver computers on
different networks)

Step 6: Start simulation


Lab 13

Router to Router Configuration


Objectives: To connect the multiple routers in the network and check the transmission

Steps
Step 1: Add two computers with two different routers and make connections.

Router 819HGW
Step2: Assign IP Addresses to each computer with their Default Gateway

Step 3: Assign IP Address to each Router(GigEthernet0) with RIP configuration.

GigEthernet0 configuration

Click GigEthernet0

Add IP Address 192.168.1.2 and subnet mask 255.255.255.0

Check Port Status On

RIP Configuration

Click RIP Add RIP Routing 192.168.1.2

Click Add button


Step 4: Configure Each Router for Serial0

Click Router than click Serial0

Check Port Status on

Add IP Address 10.10.10.10 and subnet mask 255.0.0.0

RIP Configuration

Copy the IP Address 10.10.10.10 , click RIP button and then add 10.10.10.10
Step 5: Start the simulation

Lab 14

Creating Wireless Network


Objectives: To be familiar with the wireless network establishment and it transection

Steps
Step 1: Add a wireless router and number of computer as required
Step 2: Change Adopter to wireless adopter (Double click on commuter, click physical ,turn off
the light and change network adopter to wireless adopter.

Select physical to assign IP Address dynamically


Select the DHCP

Repeat the operation for all computers

Step 3: Router configuration

i. Double click the router, click physical, select Wireless, check WEP radio button and
Enter WEP Key 0123456789

ii. Click GUI (these configuration are bydefault)


iii. Select Wireless option, Enter connection name “ BSCS” and click save button
iv. Double click computer and click PC Wireless

v. Click connect button


vi. Click on connect tab and click on Refresh button
As you can see in image that Wireless device is accessing BSCS on CH 6 and signal
strength is 100%. In left side you can see that WEP security is configured in network.
Click on connect button to connect BSCS

It will ask for WAP key insert 0123456789 and click connect

It will connect you with wireless router.

As you can see in image below that system is connected. And PCI card is active.
Lab 15

Configuring DHCP Server

Objectives: Configuration of DGCP Server to assign the dynamic IP Addresses to the clients

Steps
Step 1: Add computers (as required), one switch and a Server

Connect the device with cable

Step 2: Configure the Server

i. Double click on server, Select Desktop option


Enter IPv4 Address 192.168.0.1 and subnet mask 255.255.255.0
ii. Now click on services option and select DHCP
Enter default Gateway 192.168.0.1 (IP address of DHCP server)
Enter Start IP Address 192.168.0.10
Enter Subnet mask 255.255.255.0

Step 3: Click on computer to see the assigned IP address by DHCP

i. Click Desktop then IP Configuration


The assigned IP Addresses are shown

You might also like