Sample Lab Report
Sample Lab Report
Sample Lab Report
REPORT
lab report
0|Page
COMPUTER NETWORKS LAB
REPORT
Table of Contents
Lab Number 01
1|Page
COMPUTER NETWORKS LAB
REPORT
Summary Of Computer Networks
Computer networks encompass a broad range of topics covering the
interconnection of devices for communication and data exchange. Key
areas include network types such as LANs, MANs, and WANs, each with
its advantages and challenges in terms of coverage, speed, and security.
Security is a critical aspect, with LANs offering easier management but
vulnerability to insider threats, while WANs require robust encryption to
mitigate long-distance security risks. Tools like Cisco Packet Tracer enable
network configuration through both GUI and CLI interfaces, catering to
various skill levels and requirements. Understanding these concepts is
essential for designing, implementing, and securing modern network
infrastructures.
Computer networks are made up of various components that work together
to facilitate communication and data exchange. Here are the key
components:
Network Media:
2|Page
COMPUTER NETWORKS LAB
REPORT
o Cables (e.g., Ethernet cables): Physical wires used to transmit
data between devices.
o Wireless Signals (e.g., Wi-Fi): Radio waves used for wireless
communication between devices.
Protocols:
o TCP/IP (Transmission Control Protocol/Internet Protocol) : A set
of rules governing how data is transmitted and received over
the internet.
o HTTP (Hypertext Transfer Protocol): Protocol used for
transferring web pages and other resources on the World Wide
Web.
o SMTP (Simple Mail Transfer Protocol): Protocol used for
sending email messages over the internet.
o FTP (File Transfer Protocol): Protocol used for transferring files
between computers.
Network Interfaces:
o Network Interface Cards (NICs): Hardware components that
allow devices to connect to a network.
o Wireless Network Adapters: NICs that enable wireless
communication between devices and networks.
Network Services:
o DNS (Domain Name System): Service that translates domain
names into IP addresses.
o DHCP (Dynamic Host Configuration Protocol): Service that
assigns IP addresses dynamically to devices on a network.
o VPN (Virtual Private Network): Service that enables secure
communication over a public network by encrypting data traffic.
3|Page
COMPUTER NETWORKS LAB
REPORT
Network Topology:
o Physical Topology: The physical layout of devices and cables in
a network.
o Logical Topology: The way devices communicate in a network,
regardless of their physical locations.
4|Page
COMPUTER NETWORKS LAB
REPORT
Lab Number 02
Cisco Packet Tracer
Introduction:
Step 1: Visit the official website of Netacad using any web browser.
6|Page
COMPUTER NETWORKS LAB
REPORT
7|Page
COMPUTER NETWORKS LAB
REPORT
Step 4: Next screen will appear and will ask for email and password and
other simple details, fill them and click on Register.
8|Page
COMPUTER NETWORKS LAB
REPORT
Step 5: Now the login screen appears again so fill in the Email id.
Step 6: On the next screen enter the password and press the Login button.
9|Page
COMPUTER NETWORKS LAB
REPORT
Step 7:
Dashboard will
initialize, now click on Resources and choose Download Packet Tracer
Option.
10 | P a g e
COMPUTER NETWORKS LAB
REPORT
Step 8: On the next web page choose the operating system to download
the packet tracer. Downloading will start automatically.
11 | P a g e
COMPUTER NETWORKS LAB
REPORT
Step 9: Check for the executable file in your system and run it.
12 | P a g e
COMPUTER NETWORKS LAB
REPORT
Step 11: Choose the installing location which has sufficient space.
Step 12: Select the start menu folder and click the Next button.
13 | P a g e
COMPUTER NETWORKS LAB
REPORT
Step 13: Check the box for creating a desktop icon and click on the Next
button.
14 | P a g e
COMPUTER NETWORKS LAB
REPORT
Step 14: Now packet tracer is ready to install so click on the Install button.
Step 15: The installation process will start and will hardly take a minute.
15 | P a g e
COMPUTER NETWORKS LAB
REPORT
Lab Number 03
19 | P a g e
COMPUTER NETWORKS LAB
REPORT
Study of Network Devices available on Cisco Packet Tracer
Network Devices: Network devices, also known as networking hardware,
are physical devices that allow hardware on a computer network to
communicate and interact with one another. For example Repeater, Hub,
Bridge, Switch, Routers, Gateway, Brouter, and NIC, etc.
1. Repeater – A repeater operates at the physical layer. Its job is to
regenerate the signal over the same network before the signal becomes
too weak or corrupted to extend the length to which the signal can be
transmitted over the same network. An important point to be noted about
repeaters is that they not only amplify the signal but also regenerate it.
When the signal becomes weak, they copy it bit by bit and regenerate it
at its star topology connectors connecting following the original strength.
It is a 2-port device.
20 | P a g e
COMPUTER NETWORKS LAB
REPORT
Types of Hub
● Active Hub:- These are the hubs that have their power supply and
can clean, boost, and relay the signal along with the network. It
serves both as a repeater as well as a wiring center. These are
used to extend the maximum distance between nodes.
● Passive Hub:- These are the hubs that collect wiring from nodes
and power supply from the active hub. These hubs relay signals
onto the network without cleaning and boosting them and can’t be
used to extend the distance between nodes.
● Intelligent Hub:- It works like an active hub and includes remote
management capabilities. They also provide flexible data rates to
network devices. It also enables an administrator to monitor the
traffic passing through the hub and to configure each port in the
hub.
21 | P a g e
COMPUTER NETWORKS LAB
REPORT
Types of Bridges
● Transparent Bridges:- These are the bridge in which the stations
are completely unaware of the bridge’s existence i.e. whether or
not a bridge is added or deleted from the network, reconfiguration
of the stations is unnecessary. These bridges make use of two
processes i.e. bridge forwarding and bridge learning.
● Source Routing Bridges:- In these bridges, routing operation is
performed by the source station and the frame specifies which
route to follow. The host can discover the frame by sending a
special frame called the discovery frame, which spreads through
the entire network using all possible paths to the destination.
Types of Switch
1. Unmanaged switches: These switches have a simple plug-and-
play design and do not offer advanced configuration options. They
are suitable for small networks or for use as an expansion to a
larger network.
22 | P a g e
COMPUTER NETWORKS LAB
REPORT
2. Managed switches: These switches offer advanced configuration
options such as VLANs, QoS, and link aggregation. They are
suitable for larger, more complex networks and allow for
centralized management.
3. Smart switches: These switches have features similar to managed
switches but are typically easier to set up and manage. They are
suitable for small- to medium-sized networks.
4. Layer 2 switches: These switches operate at the Data Link layer of
the OSI model and are responsible for forwarding data between
devices on the same network segment.
5. Layer 3 switches: These switches operate at the Network layer of
the OSI model and can route data between different network
segments. They are more advanced than Layer 2 switches and
are often used in larger, more complex networks.
6. PoE switches: These switches have Power over Ethernet
capabilities, which allows them to supply power to network devices
over the same cable that carries data.
7. Gigabit switches: These switches support Gigabit Ethernet
speeds, which are faster than traditional Ethernet speeds.
8. Rack-mounted switches: These switches are designed to be
mounted in a server rack and are suitable for use in data centers
or other large networks.
9. Desktop switches: These switches are designed for use on a
desktop or in a small office environment and are typically smaller
in size than rack-mounted switches.
10. Modular switches: These switches have modular design, which
allows for easy expansion or customization. They are suitable for
large networks and data centers.
23 | P a g e
COMPUTER NETWORKS LAB
REPORT
updating routing table based on which they make decisions on routing the
data packets. The router divides the broadcast domains of hosts connected
through it.
24 | P a g e
COMPUTER NETWORKS LAB
REPORT
6. Gateway – A gateway, as the name suggests, is a passage to
connect two networks that may work upon different networking models.
They work as messenger agents that take data from one system, interpret
it, and transfer it to another system. Gateways are also called protocol
converters and can operate at any network layer. Gateways are generally
more complex than switches or routers. A gateway is also called a protocol
converter.
25 | P a g e
COMPUTER NETWORKS LAB
REPORT
Lab Number 04
26 | P a g e
COMPUTER NETWORKS LAB
REPORT
27 | P a g e
COMPUTER NETWORKS LAB
REPORT
Colors: Standard cables has BROWN, BROWN WHITE, GREEN,
GREENWHITE, BLUE, BLUE WHITE, ORANGE, ORANGE WHITE.
STEP 3.1:There are two standards adopted for Cabling EIA/TIA 568A &
EIA/TIA 568B.When you use single standard (either EIA/TIA 568A or
EIA/TIA 568B) on both the end of cable then the resulting cable is
STRAIGHT CABLE
.
On the other hand if you use different cabling standard on the ends of cable
then the resulting cable is CROSS CABLE
I’ll use EIA/TIA 568B standard for creating cross and straight cable
The figure below very well define the EIA/TIA 568B standard…
28 | P a g e
COMPUTER NETWORKS LAB
REPORT
T-568B Straight-Through Ethernet Cable
Of the Eight wires in Cat 5 not all are used for data transfer when using
100Mbps Ethernet card.
Only 2 pairs of cable are used i.e. 2 wire for Transmitting signal and two wires
For Receiving signal.
29 | P a g e
COMPUTER NETWORKS LAB
REPORT
RJ-45 Crossover Ethernet Cable
Here are the Steps:
Steps 1 to 6 are same as for STRAIGHT through cables
7. Only difference is in color coding of other side of wire.
8. Wire that is on 1st number on A-side (one end) should be on 3rd number
on B-side (other side) & vice-versa.
9. Wire that is on 2st number on A-side (one end) should be on 6rd number
on B-side (other side) & vice versa.
10. Now Crimp the RJ45 connector.
11. Your CROSS wire is completed.
30 | P a g e
COMPUTER NETWORKS LAB
REPORT
Lab Number 05
Networking Commands
The below mentioned commands are some of the most useful commands required to
1. IPCONFIG
31 | P a g e
COMPUTER NETWORKS LAB
REPORT
The IPCONFIG network command provides a comprehensive view of information
regarding the IP address configuration of the device we are currently working on.
The IPConfig command also provides us with some variation in the primary command
2. NSLOOKUP
32 | P a g e
COMPUTER NETWORKS LAB
REPORT
The NSLOOKUP command is used to troubleshoot network connectivity issues in the
system. Using the nslookup command, we can access the information related to our
system’s DNS server, i.e., domain name and IP address.
3. HOSTNAME
The HOSTNAME command displays the hostname of the system. The hostname
command is much easier to use than going into the system settings to search for it.
33 | P a g e
COMPUTER NETWORKS LAB
REPORT
4. PING
The Ping command is one of the most widely used commands in the prompt tool, as it
allows the user to check the connectivity of our system to another host.
This command sends four experimental packets to the destination host to check
whether it receives them successfully, if so, then, we can communicate with the
destination host. But in case the packets have not been received, that means, no
communication can be established with the destination host.
34 | P a g e
COMPUTER NETWORKS LAB
REPORT
5. TRACERT
The TRACERT command is used to trace the route during the transmission of the data
packet over to the destination host and also provides us with the “hop” count during
transmission.
Using the number of hops and the hop IP address, we can troubleshoot network issues
and identify the point of the problem during the transmission of the data packet.
35 | P a g e
COMPUTER NETWORKS LAB
REPORT
6. NETSTAT
The Netstat command as the name suggests displays an overview of all the network
connections in the device. The table shows detail about the connection protocol,
address, and the current state of the network. Command to enter in Prompt - netstat
36 | P a g e
COMPUTER NETWORKS LAB
REPORT
7. ARP(Address Resolution Protocol)
The ARP command is used to access the mapping structure of IP addresses to the MAC
address. This provides us with a better understanding of the transmission of packets in
the network channel.
37 | P a g e
COMPUTER NETWORKS LAB
REPORT
Lab Number 06
Step 1. Open the packet tracer desktop and take a switch (PT-Switch) from
the devices.
Command:
switch> switch>en
switch#conf t
switch(config)#hostname sh sh(config)exit
Step 3: Set a message of the day (MOTD) banner for the users.
Command: sh(config)#banner
motd $
● Then, enter MOTD and end it with ‘$’ to exit.
38 | P a g e
COMPUTER NETWORKS LAB
REPORT
To configure the Line Control password and Enable secret follow the below
commands:
39 | P a g e
COMPUTER NETWORKS LAB
REPORT
● When you try to log in first, it will ask for the line control password.
● Then, to configure the terminal it will ask to enable a secret password.
40 | P a g e
COMPUTER NETWORKS LAB
REPORT
41 | P a g e
COMPUTER NETWORKS LAB
REPORT
Lab Number 07
Step 1. Open the packet tracer desktop and take a Router (2911) and PC0
from the devices.
● Connect the router0 with PC0 with the help of a console cable.
● Then, click on PC0 and go to the terminal, and type y.
● Finally, we can configure the router with the help of a PC.
router
>
router>e
n
router#conf
42 | P a g e
COMPUTER NETWORKS LAB
REPORT
t
router(config)#ho
stname r1
r1(config)exit
Step 3: Set a message of the day (MOTD) banner for the
users. r1(config)#banner motd $ then, enter MOTD and end it with
‘$’ to exit.
r1(config)#banner motd $
Enter TEXT message. End with the character '$'.
Unauthorised access is strictly prohibited $
43 | P a g e
COMPUTER NETWORKS LAB
REPORT
44 | P a g e
COMPUTER NETWORKS LAB
REPORT
45 | P a g e
COMPUTER NETWORKS LAB
REPORT
Lab Number 08
Design and Implementation of Local Area Network
First checked Connectivity between router and switch
Then took a RJ45 cable and connect its one edge to patch panel, which port
relevant to my telecommunication outlet.
Then the other edge of my RJ45 cable I connected to a port in switch which is
available at that time.
At that time I could saw in my PC the Local Area Connection icon had shown
as Local Area Connection is connected.
Then, to test my Network Interface Card (NIC), I used command prompt and
typed there, “ping 127.0.0.1” then I could saw this kind of details Then I went
to configure my Local Area Connection.
First I right clicked on the icon “My Network Places” and select “properties”
from that menu.
Then selected the icon “Local Area Network” and right clicked on it and select
“Properties” from that window. Then selected “Internet Protocol (TCP/IP)” and
went to the properties of it by clicked on properties button.
After that pressed “OK” button of that window and then again pressed “OK”
button in Local Area Connection properties window.
46 | P a g e
COMPUTER NETWORKS LAB
REPORT
Local Area Connection:” which, I had entered at the Internet Protocol (TCP/IP)
Properties window.
Step 1: First, open the Cisco packet tracer desktop and select the devices
given below:
47 | P a g e
COMPUTER NETWORKS LAB
REPORT
1. PC pc 6
2. Switch PT-Switch 3
3. Router PT-Router 3
48 | P a g e
COMPUTER NETWORKS LAB
REPORT
Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask
according to the IP addressing table given above.
● To assign an IP address in PC0, click on PC0.
● Then, go to desktop and then IP configuration and there you will IPv4
configuration.
● Fill IPv4 address and subnet mask.
49 | P a g e
COMPUTER NETWORKS LAB
REPORT
50 | P a g e
COMPUTER NETWORKS LAB
REPORT
Then, type ipconfig <IPv4 address><subnet mask><default
gateway>(if needed)
51 | P a g e
COMPUTER NETWORKS LAB
REPORT
IP Addressing Table Router
52 | P a g e
COMPUTER NETWORKS LAB
REPORT
53 | P a g e
COMPUTER NETWORKS LAB
REPORT
● Repeat the same procedure with other routers to configure them
thoroughly.
Step 4: After configuring all of the devices we need to assign the routes to the
routers.
To assign static routes to the particular router:
CLI command : ip route <network id> <subnet mask><next hop> Static Routes for
Router0 are given below:
Router(config)#ip route 192.168.2.0 255.255.255.0 11.0.0.2
55 | P a g e
COMPUTER NETWORKS LAB
REPORT
56 | P a g e
COMPUTER NETWORKS LAB
REPORT
Lab Number 09
Configuring VLANs
We will configure two VLANs in this network: VLAN-10 and VLAN-20. We will use
VLAN-10 for the network 10.0.0.0/8. We will use VLAN-20 for the network 20.0.0.0/8.
We will keep one PC from each switch in a VLAN.
Access the first switch's CLI prompt. Enter global configuration mode and use the vlan
command to create a new VLAN. This command needs a VLAN number as an
argument. It checks the specified VLAN number for an existing VLAN before creating a
new VLAN. If it finds an existing VLAN having the specified number, it does not create a
new VLAN. It enters VLAN configuration mode for the existing VLAN. If it does not find
an existing VLAN having the specified number, it creates a new VLAN and enters VLAN
configuration mode for the new VLAN.
VLAN configuration mode allows us to configure additional options such as name and
RSPAN. In a basic configuration, we do not need to configure these options. Use the
exit command to exit VLAN configuration mode.
57 | P a g e
COMPUTER NETWORKS LAB
REPORT
The following commands create VLAN-10.
Switch>enable
Switch#configure terminal
Switch(config)#vlan 10
Switch(config-vlan)#exit
Switch(config)#
Switch(config)#vlan 20
Switch(config-vlan)#exit Switch(config)#
Since all three switches have PCs in these VLANs, you need to run the above
commands on all switches.
58 | P a g e
COMPUTER NETWORKS LAB
REPORT
After creating VLANs, we need to assign them to the switch ports. The switchport mode
access vlan command assigns a VLAN to the switch port. It accepts a VLAN number as
an argument. It runs in the interface configuration mode of the port. It assigns the
specified VLAN number to the port. The device connected to the port becomes a
member of the specified port.
The following commands make the device connected to port-1 a member of VLAN-10.
Switch(config-if)#vlan 10
Switch(config-vlan)#exit
The following commands make the device connected to port-2 a member of VLAN-20.
Switch(config-if)#vlan 20
Switch(config-vlan)#exit
Switch(config)#
59 | P a g e
COMPUTER NETWORKS LAB
REPORT
A switch port can work in two modes: access and trunk. In access mode, it works with a
single VLAN. In trunk mode, it works with multiple VLANs.
Access mode is the default mode on all switch ports. If you connect an end device to a
switch port, you do not need to change the default mode. But if you connect a switch
port to another switch port, you need to change the default mode to trunk mode on both
ports.
Change default mode to trunk mode on ports you used to connect switches. Use the
switchport mode trunk command to change the default mode. Run this command in the
interface configuration mode of the port.
The following commands change the default mode to trunk mode on GigabitEtherent
0/1.
Switch(config-if)#exit
60 | P a g e
COMPUTER NETWORKS LAB
REPORT
The following commands change the default mode to trunk mode on GigabitEtherent
0/2.
Switch(config-if)#exit
Switch(config)#
61 | P a g e
COMPUTER NETWORKS LAB
REPORT
Lab Number 10
Routers automatically learn their connected networks. We only need to add routes for
the networks that are not available on the router’s interfaces. For example, network
10.0.0.0/8, 20.0.0.0/8 and 40.0.0.0/8 are directly connected to Router0. Thus, we don’t
need to configure routes for these networks. Network 30.0.0.0/8 and network 50.0.0.0/8
are not available on Router0. We have to create and add routes only for these
networks.
62 | P a g e
COMPUTER NETWORKS LAB
REPORT
The following table lists the connected networks of each router.
Let's create static routes on each router for networks that are not available on the router.
Router0 requirements
Create two routes for network 30.0.0.0/8 and configure the first route (via -
Router1) as the main route and the second route (via-Router2) as a backup
route.
Create two routes for the host 30.0.0.100/8 and configure the first route (via -
Router2) as the main route and the second route (via-Router1) as a backup
route.
Create two routes for network 50.0.0.0/8 and configure the first route (via -
Router2) as the main route and the second route (via-Router1) as a backup
route.
Verify the router adds only main routes to the routing table.
Router0 configuration
Access the CLI prompt of Router0 and run the following commands.
Router>enable
Router#configure terminal
63 | P a g e
COMPUTER NETWORKS LAB
REPORT
Router(config)#ip route 30.0.0.0 255.0.0.0 20.0.0.2 10 Router(config)#ip route 30.0.0.0
255.0.0.0 40.0.0.2 20
Router#
64 | P a g e
COMPUTER NETWORKS LAB
REPORT
Router1 requirements
Create two routes for network 10.0.0.0/8 and configure the first route (via -
Router0) as the main route and the second route (via-Router1) as a backup
route.
Create two routes for network 40.0.0.0/8 and configure the first route (via -
Router0) as the main route and the second route (via-Router2) as a backup
route.
Verify the router adds only main routes to the routing table.
Router1 configuration
Router>enable
Router#configure terminal
65 | P a g e
COMPUTER NETWORKS LAB
REPORT
Router(config)#ip route 40.0.0.0 255.0.0.0 20.0.0.1 10 Router(config)#ip route 40.0.0.0
255.0.0.0 50.0.0.1 20
Router(config)#exit
Router2 requirements
Create static routes for network 10.0.0.0/8 and network 30.0.0.0/8 and verify the router
adds both routes to the routing table.
Router2 configuration
Router>enable
Router#configure terminal
66 | P a g e
COMPUTER NETWORKS LAB
REPORT
Router(config)#ip route 10.0.0.0 255.0.0.0 40.0.0.1 Router(config)#ip route 30.0.0.0
255.0.0.0 50.0.0.2
Router(config)#exit
67 | P a g e
COMPUTER NETWORKS LAB
REPORT
Lab Number 11
1. PC PC 6
2. Switch PT-Switch 3
3. Router PT-router 3
IP Addressing Table:
68 | P a g e
COMPUTER NETWORKS LAB
REPORT
69 | P a g e
COMPUTER NETWORKS LAB
REPORT
Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask
according to the IP addressing table given above.
● To assign an IP address in PC0, click on PC0.
● Then, go to desktop and then IP configuration and there you will IPv4
configuration.
● Fill IPv4 address and subnet mask.
70 | P a g e
COMPUTER NETWORKS LAB
REPORT
72 | P a g e
COMPUTER NETWORKS LAB
REPORT
73 | P a g e
COMPUTER NETWORKS LAB
REPORT
● To assign an IP address in router0, click on router0.
● Then, go to config and then Interfaces.
● Make sure to turn on the ports.
● Then, configure the IP address in FastEthernet and serial ports
according to IP addressing Table.
● Fill IPv4 address and subnet mask.
74 | P a g e
COMPUTER NETWORKS LAB
REPORT
75 | P a g e
COMPUTER NETWORKS LAB
REPORT
● First, click on router0 then Go to CLI.
● Then type the commands and IP information given below.
Router(config-router)#network 192.168.10.0
Router(config-router)#network 192.168.20.0
Router(config-router)#network 10.0.0.0
Router(config-router)#network 192.168.30.0
Router(config-router)#network 11.0.0.0
76 | P a g e
COMPUTER NETWORKS LAB
REPORT
77 | P a g e