Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Sample Lab Report

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 78

COMPUTER NETWORKS LAB

REPORT

stude DR. MUHAMMAD


ANWAR
course instructor
Computer Networks
course title
UNIVERSITY OF EDUCATION
Department of Information Sciences

lab report

0|Page
COMPUTER NETWORKS LAB
REPORT
Table of Contents

Sr.no Topic Page.no


01 Summary Of Computer Networks 02
02 Cisco Packet Tracer 04
03 Network Devices available on Cisco Packet Tracer 20
04 Ethernet Cabling 26
05 Basic Commands 31

06 Performing Basic Switch Configuration 38


07 Basic Switch Configuration 40
08 Design and Implementation of Local Area Network 46
09 Configuring VLANs 58
10 Configuring Static Routing 63

11 Configuring Dynamic Routing; RIP and IGRP 69

Lab Number 01

1|Page
COMPUTER NETWORKS LAB
REPORT
Summary Of Computer Networks
Computer networks encompass a broad range of topics covering the
interconnection of devices for communication and data exchange. Key
areas include network types such as LANs, MANs, and WANs, each with
its advantages and challenges in terms of coverage, speed, and security.
Security is a critical aspect, with LANs offering easier management but
vulnerability to insider threats, while WANs require robust encryption to
mitigate long-distance security risks. Tools like Cisco Packet Tracer enable
network configuration through both GUI and CLI interfaces, catering to
various skill levels and requirements. Understanding these concepts is
essential for designing, implementing, and securing modern network
infrastructures.
Computer networks are made up of various components that work together
to facilitate communication and data exchange. Here are the key
components:

Components of Computer Networks


 Devices:
o Computers: Devices that send, receive, and process data.
o Servers: Computers that provide services or resources to other
devices on the network.
o Routers: Devices that direct data packets between different
networks.
o Switches: Devices that connect multiple devices within a single
network and manage data traffic between them.
o Firewalls: Security devices that control and monitor incoming
and outgoing network traffic based on predetermined security
rules.
o Modems: Devices that modulate and demodulate digital data to
transmit it over communication lines.

 Network Media:

2|Page
COMPUTER NETWORKS LAB
REPORT
o Cables (e.g., Ethernet cables): Physical wires used to transmit
data between devices.
o Wireless Signals (e.g., Wi-Fi): Radio waves used for wireless
communication between devices.

 Protocols:
o TCP/IP (Transmission Control Protocol/Internet Protocol) : A set
of rules governing how data is transmitted and received over
the internet.
o HTTP (Hypertext Transfer Protocol): Protocol used for
transferring web pages and other resources on the World Wide
Web.
o SMTP (Simple Mail Transfer Protocol): Protocol used for
sending email messages over the internet.
o FTP (File Transfer Protocol): Protocol used for transferring files
between computers.

 Network Interfaces:
o Network Interface Cards (NICs): Hardware components that
allow devices to connect to a network.
o Wireless Network Adapters: NICs that enable wireless
communication between devices and networks.

 Network Services:
o DNS (Domain Name System): Service that translates domain
names into IP addresses.
o DHCP (Dynamic Host Configuration Protocol): Service that
assigns IP addresses dynamically to devices on a network.
o VPN (Virtual Private Network): Service that enables secure
communication over a public network by encrypting data traffic.

3|Page
COMPUTER NETWORKS LAB
REPORT
 Network Topology:
o Physical Topology: The physical layout of devices and cables in
a network.
o Logical Topology: The way devices communicate in a network,
regardless of their physical locations.

Understanding these components is essential for designing, implementing,


and managing computer networks effectively. Each component plays a
crucial role in ensuring the smooth operation and security of the network.

4|Page
COMPUTER NETWORKS LAB
REPORT

Lab Number 02
Cisco Packet Tracer
Introduction:

Cisco Packet Tracer is a powerful network simulation tool


developed by Cisco Systems. It is widely used in educational
settings, networking labs, and certification training programs to
design, configure, and troubleshoot computer networks. Packet
Tracer provides a virtual environment where users can create and
experiment with different network topologies, devices, and
protocols without the need for physical hardware.
One of the key features of Packet Tracer is its user-friendly
interface, which allows users to drag and drop network devices
such as routers, switches, PCs, and servers onto a virtual canvas.
Users can then connect these devices using various types of
network media, such as Ethernet cables or wireless connections,
to simulate real-world network configurations.
Packet Tracer also supports the configuration of network devices
using both graphical user interface (GUI) and command-line
interface (CLI) methods, providing flexibility for users with different
skill levels and preferences. This allows users to practice
configuring network devices using commands similar to those
used in actual networking environments.
Moreover, Packet Tracer includes a wide range of pre-built labs
and activities covering topics such as network protocols, routing,
switching, security, and more. These labs help users reinforce
5|Page
COMPUTER NETWORKS LAB
REPORT
their understanding of networking concepts through hands-on
practice and experimentation.
Overall, Cisco Packet Tracer is an invaluable tool for learning,
teaching, and practicing networking concepts in a safe and
interactive virtual environment. It empowers users to gain
practical experience and skills necessary for designing,
implementing, and maintaining computer networks effectively.
Installation
How to Install Cisco Packet Tracer on Windows?
Packet Tracer is computer software that is designed with the purpose of
making network simulations to understand the networking and cyber
security concepts in an easy way. It is built by Cisco Corporation and is
available for free for different operating systems like macOS, Windows,
Linux, etc. It is easy to easy with a simple interface.

Installing Packet Tracer on Windows


Follow the below steps to install Packet Tracer on Windows:

Step 1: Visit the official website of Netacad using any web browser.

6|Page
COMPUTER NETWORKS LAB
REPORT

Step 2: Press the login button and select log In option.

7|Page
COMPUTER NETWORKS LAB
REPORT

Step 3: Next screen will appear, click on the sign-up option.

Step 4: Next screen will appear and will ask for email and password and
other simple details, fill them and click on Register.

8|Page
COMPUTER NETWORKS LAB
REPORT
Step 5: Now the login screen appears again so fill in the Email id.

Step 6: On the next screen enter the password and press the Login button.

9|Page
COMPUTER NETWORKS LAB
REPORT

Step 7:

Dashboard will
initialize, now click on Resources and choose Download Packet Tracer
Option.

10 | P a g e
COMPUTER NETWORKS LAB
REPORT

Step 8: On the next web page choose the operating system to download
the packet tracer. Downloading will start automatically.

11 | P a g e
COMPUTER NETWORKS LAB
REPORT
Step 9: Check for the executable file in your system and run it.

Step 10: Next screen is of License Agreement so Click on I accept the


license.

12 | P a g e
COMPUTER NETWORKS LAB
REPORT
Step 11: Choose the installing location which has sufficient space.

Step 12: Select the start menu folder and click the Next button.

13 | P a g e
COMPUTER NETWORKS LAB
REPORT

Step 13: Check the box for creating a desktop icon and click on the Next
button.

14 | P a g e
COMPUTER NETWORKS LAB
REPORT

Step 14: Now packet tracer is ready to install so click on the Install button.

Step 15: The installation process will start and will hardly take a minute.

15 | P a g e
COMPUTER NETWORKS LAB
REPORT

Step 16: Click on the Finish button to complete the installation.

Step 17: An icon is created on the desktop so run it.


16 | P a g e
COMPUTER NETWORKS LAB
REPORT

Step 18: Interface is initialized and the software is ready to use.

Congratulations you have successfully installed packet tracer on your


Windows System.
Possible errors while installing packet tracer
When installing Cisco Packet Tracer, there are several potential errors that
users may encounter, depending on the specific circumstances and the
environment in which the installation is taking place. Here's a list of
possible errors:
Unsupported Operating System:
Attempting to install Cisco Packet Tracer on an unsupported operating
system can lead to errors. Ensure that you're using a compatible OS
version.
Insufficient Permissions:
17 | P a g e
COMPUTER NETWORKS LAB
REPORT
Users may encounter errors if they don't have sufficient permissions to
install software on their system. Ensure that you have administrative
privileges if required.

Corrupted Installation File:


If the installation file is corrupted or incomplete, errors may occur during
installation. Re-download the installation file from a reliable source to
ensure its integrity.
Conflicting Software:
Other software installed on the system may conflict with Cisco Packet
Tracer, leading to installation errors. Check for any conflicting software and
temporarily disable or uninstall it before installing Packet Tracer.
Missing Dependencies:
Cisco Packet Tracer may require certain dependencies to be installed on
the system. Failure to meet these requirements can result in installation
errors. Ensure that all necessary dependencies are installed.
Network Issues:
If the installation involves downloading components from the internet,
network issues such as slow or unstable connections can lead to errors.
Ensure a stable internet connection during installation.
Anti-virus Interference:
Antivirus software may sometimes interfere with the installation process,
flagging Packet Tracer as a potential threat. Temporarily disable the
antivirus software during installation, or whitelist Packet Tracer to prevent
interference.
Outdated Installer:
Using an outdated version of the Cisco Packet Tracer installer may lead to
compatibility issues and errors. Always use the latest version of the installer
available from the official Cisco website.
18 | P a g e
COMPUTER NETWORKS LAB
REPORT
System Resource Constraints:
Insufficient system resources such as disk space, RAM, or CPU power can
lead to errors during installation. Ensure that your system meets the
minimum requirements specified by Cisco Packet Tracer.
User Error:
Sometimes errors occur due to user mistakes such as selecting incorrect
installation options or interrupting the installation process. Double-check
the installation steps and follow them accurately.
If encountering errors during installation, reviewing error messages,
checking system logs, and searching for specific error codes or
descriptions online can often provide insights into resolving the issue.
Additionally, seeking support from Cisco's official documentation or
community forums may also be helpful.

Lab Number 03

19 | P a g e
COMPUTER NETWORKS LAB
REPORT
Study of Network Devices available on Cisco Packet Tracer
Network Devices: Network devices, also known as networking hardware,
are physical devices that allow hardware on a computer network to
communicate and interact with one another. For example Repeater, Hub,
Bridge, Switch, Routers, Gateway, Brouter, and NIC, etc.
1. Repeater – A repeater operates at the physical layer. Its job is to
regenerate the signal over the same network before the signal becomes
too weak or corrupted to extend the length to which the signal can be
transmitted over the same network. An important point to be noted about
repeaters is that they not only amplify the signal but also regenerate it.
When the signal becomes weak, they copy it bit by bit and regenerate it
at its star topology connectors connecting following the original strength.
It is a 2-port device.

2. Hub – A hub is a basically multi-port repeater. A hub connects multiple


wires coming from different branches, for example, the connector in star
topology which connects different stations. Hubs cannot filter data, so
data packets are sent to all connected devices. In other words, the
collision domain of all hosts connected through Hub remains one. Also,
they do not have the intelligence to find out the best path for data
packets which leads to inefficiencies and wastage.

20 | P a g e
COMPUTER NETWORKS LAB
REPORT

Types of Hub
● Active Hub:- These are the hubs that have their power supply and
can clean, boost, and relay the signal along with the network. It
serves both as a repeater as well as a wiring center. These are
used to extend the maximum distance between nodes.
● Passive Hub:- These are the hubs that collect wiring from nodes
and power supply from the active hub. These hubs relay signals
onto the network without cleaning and boosting them and can’t be
used to extend the distance between nodes.
● Intelligent Hub:- It works like an active hub and includes remote
management capabilities. They also provide flexible data rates to
network devices. It also enables an administrator to monitor the
traffic passing through the hub and to configure each port in the
hub.

3. Bridge – A bridge operates at the data link layer. A bridge is a repeater,


with add on the functionality of filtering content by reading the MAC
addresses of the source and destination. It is also used for
interconnecting two LANs working on the same protocol. It has a single
input and single output port, thus making it a 2 port device.

21 | P a g e
COMPUTER NETWORKS LAB
REPORT
Types of Bridges
● Transparent Bridges:- These are the bridge in which the stations
are completely unaware of the bridge’s existence i.e. whether or
not a bridge is added or deleted from the network, reconfiguration
of the stations is unnecessary. These bridges make use of two
processes i.e. bridge forwarding and bridge learning.
● Source Routing Bridges:- In these bridges, routing operation is
performed by the source station and the frame specifies which
route to follow. The host can discover the frame by sending a
special frame called the discovery frame, which spreads through
the entire network using all possible paths to the destination.

4. Switch – A switch is a multiport bridge with a buffer and a design that


can boost its efficiency (a large number of ports imply less traffic) and
performance. A switch is a data link layer device. The switch can perform
error checking before forwarding data, which makes it very efficient as it
does not forward packets that have errors and forward good packets
selectively to the correct port only. In other words, the switch divides the
collision domain of hosts, but the broadcast domain remains the same.

Types of Switch
1. Unmanaged switches: These switches have a simple plug-and-
play design and do not offer advanced configuration options. They
are suitable for small networks or for use as an expansion to a
larger network.

22 | P a g e
COMPUTER NETWORKS LAB
REPORT
2. Managed switches: These switches offer advanced configuration
options such as VLANs, QoS, and link aggregation. They are
suitable for larger, more complex networks and allow for
centralized management.
3. Smart switches: These switches have features similar to managed
switches but are typically easier to set up and manage. They are
suitable for small- to medium-sized networks.
4. Layer 2 switches: These switches operate at the Data Link layer of
the OSI model and are responsible for forwarding data between
devices on the same network segment.
5. Layer 3 switches: These switches operate at the Network layer of
the OSI model and can route data between different network
segments. They are more advanced than Layer 2 switches and
are often used in larger, more complex networks.
6. PoE switches: These switches have Power over Ethernet
capabilities, which allows them to supply power to network devices
over the same cable that carries data.
7. Gigabit switches: These switches support Gigabit Ethernet
speeds, which are faster than traditional Ethernet speeds.
8. Rack-mounted switches: These switches are designed to be
mounted in a server rack and are suitable for use in data centers
or other large networks.
9. Desktop switches: These switches are designed for use on a
desktop or in a small office environment and are typically smaller
in size than rack-mounted switches.
10. Modular switches: These switches have modular design, which
allows for easy expansion or customization. They are suitable for
large networks and data centers.

5. Routers – A router is a device like a switch that routes data packets


based on their IP addresses. The router is mainly a Network Layer device.
Routers normally connect LANs and WANs and have a dynamically

23 | P a g e
COMPUTER NETWORKS LAB
REPORT

updating routing table based on which they make decisions on routing the
data packets. The router divides the broadcast domains of hosts connected
through it.

24 | P a g e
COMPUTER NETWORKS LAB
REPORT
6. Gateway – A gateway, as the name suggests, is a passage to
connect two networks that may work upon different networking models.
They work as messenger agents that take data from one system, interpret
it, and transfer it to another system. Gateways are also called protocol
converters and can operate at any network layer. Gateways are generally
more complex than switches or routers. A gateway is also called a protocol
converter.

7. Brouter – It is also known as the bridging router is a device that


combines features of both bridge and router. It can work either at the data
link layer or a network layer. Working as a router, it is capable of routing
packets across networks and working as the bridge, it is capable of filtering
local area network traffic.
8. NIC – NIC or network interface card is a network adapter that is used
to connect the computer to the network. It is installed in the computer to
establish a LAN. It has a unique id that is written on the chip, and it has a
connector to connect the cable to it. The cable acts as an interface
between the computer and the router or modem. NIC card is a layer 2
device which means that it works on both the physical and data link layers
of the network model.

25 | P a g e
COMPUTER NETWORKS LAB
REPORT

Lab Number 04

Understanding Ethernet Cabling. Prepare Cross Cable and


Straight Cable

Preparing straight and cross cables

Straight-Through Wired Cables Straight


Through refers to cables that have the pin assignments on each end of the
cable. In other words
Pin 1 connector A goes to Pin 1 on connector B, Pin 2 to Pin 2 ect.
Straight-Through wired
cables are most commonly used to connect a host to client. When we talk
about cat5e patch
cables, the Straight-Through wired cat5e patch cable is used to connect
computers, printers and
other network client devices to the router switch or hub (the host device in
this instance).
Crossover Wired Cables
An Ethernet crossover cable is a type of Ethernet cable used to connect
computing devices
together directly. Normal straight through or patch cables were used to
connect from a host
network interface controller (a computer or similar device) to a network
switch, hub or router. A
cable with connections that "cross over" was used to connect two devices of
the same type: two hosts or two switches to each other.

26 | P a g e
COMPUTER NETWORKS LAB
REPORT

Choose the right cable…

1.To Connect PC to PC à Cross Cable


.
2.To Connect PC to HUB/SWITCH/ROUTER à Straight Cable
.

3.To Connect HUB/SWITCH/ROUTER to HUB/SWITCH/ROUTER à Straight


Cable

Understanding CAT 5 Cables…

Wires: CAT 5 Cable has 4 pairs of copper wire inside it.

27 | P a g e
COMPUTER NETWORKS LAB
REPORT
Colors: Standard cables has BROWN, BROWN WHITE, GREEN,
GREENWHITE, BLUE, BLUE WHITE, ORANGE, ORANGE WHITE.

STEP 3: Making Straight Cable…

Nomenclature: let us first give a number scheme for cabling which we


will follow throughout this tuto. BROWN (8), BROWN WHITE (7),GREEN
(6),
GREEN WHITE (3), BLUE (4), BLUE WHITE (5),ORANGE (2), ORANGE
WHITE (1)

Requirements: Two RJ45 Connectors, Crimping tool & CAT 5 cable of


desired length(less than 250 meters).

STEP 3.1:There are two standards adopted for Cabling EIA/TIA 568A &
EIA/TIA 568B.When you use single standard (either EIA/TIA 568A or
EIA/TIA 568B) on both the end of cable then the resulting cable is
STRAIGHT CABLE
.
On the other hand if you use different cabling standard on the ends of cable
then the resulting cable is CROSS CABLE

I’ll use EIA/TIA 568B standard for creating cross and straight cable

The figure below very well define the EIA/TIA 568B standard…

28 | P a g e
COMPUTER NETWORKS LAB
REPORT
T-568B Straight-Through Ethernet Cable

1. Remove the covering of CAT 5 cable.


2. Straighten the eight wires of the cable.
3. Using Crimping tool’s cutter cut the end of wires so that they are of same
length
4. Arrange the wire in order 1, 2, 3, 4, 5, 6, 7 & 8 respectively as I have
mention or as shown in the diagram.
5. Insert the arranged cable in the RJ45 connector with clip pointing down
exactly as shown in the figure.
6. In crimping tool insert the head of RJ45 connector and crimp (press) it
hardly.
7. Follow same step with same color order for the other end of cable too.
8. The wire you made by following these steps is a STRAIGHT cable.

Making CROSS Cable…

Of the Eight wires in Cat 5 not all are used for data transfer when using
100Mbps Ethernet card.
Only 2 pairs of cable are used i.e. 2 wire for Transmitting signal and two wires
For Receiving signal.

29 | P a g e
COMPUTER NETWORKS LAB
REPORT
RJ-45 Crossover Ethernet Cable
Here are the Steps:
Steps 1 to 6 are same as for STRAIGHT through cables
7. Only difference is in color coding of other side of wire.
8. Wire that is on 1st number on A-side (one end) should be on 3rd number
on B-side (other side) & vice-versa.
9. Wire that is on 2st number on A-side (one end) should be on 6rd number
on B-side (other side) & vice versa.
10. Now Crimp the RJ45 connector.
11. Your CROSS wire is completed.

30 | P a g e
COMPUTER NETWORKS LAB
REPORT
Lab Number 05

Understanding Basic Commands

Networking Commands

The below mentioned commands are some of the most useful commands required to

troubleshoot network problems and configure network settings.

1. IPCONFIG

31 | P a g e
COMPUTER NETWORKS LAB
REPORT
The IPCONFIG network command provides a comprehensive view of information
regarding the IP address configuration of the device we are currently working on.

The IPConfig command also provides us with some variation in the primary command

that targets specific system settings or data, which are:

● IPConfig/all - Provides primary output with additional information about


network adapters.
● IPConfig/renew - Used to renew the system’s IP address.

● IPConfig/release - Removes the system’s current IP address.

Command to enter in Prompt - ipconfig

2. NSLOOKUP

32 | P a g e
COMPUTER NETWORKS LAB
REPORT
The NSLOOKUP command is used to troubleshoot network connectivity issues in the
system. Using the nslookup command, we can access the information related to our
system’s DNS server, i.e., domain name and IP address.

Command to enter in Prompt - nslookup

3. HOSTNAME

The HOSTNAME command displays the hostname of the system. The hostname
command is much easier to use than going into the system settings to search for it.

Command to enter in Prompt - hostname

33 | P a g e
COMPUTER NETWORKS LAB
REPORT
4. PING

The Ping command is one of the most widely used commands in the prompt tool, as it
allows the user to check the connectivity of our system to another host.

This command sends four experimental packets to the destination host to check
whether it receives them successfully, if so, then, we can communicate with the
destination host. But in case the packets have not been received, that means, no
communication can be established with the destination host.

Command to enter in Prompt - ping www.destination_host_name.com

34 | P a g e
COMPUTER NETWORKS LAB
REPORT
5. TRACERT

The TRACERT command is used to trace the route during the transmission of the data
packet over to the destination host and also provides us with the “hop” count during
transmission.

Using the number of hops and the hop IP address, we can troubleshoot network issues
and identify the point of the problem during the transmission of the data packet.

Command to enter in Prompt- tracert IP-address OR tracert


www.destination_host_name.com

35 | P a g e
COMPUTER NETWORKS LAB
REPORT
6. NETSTAT

The Netstat command as the name suggests displays an overview of all the network
connections in the device. The table shows detail about the connection protocol,
address, and the current state of the network. Command to enter in Prompt - netstat

36 | P a g e
COMPUTER NETWORKS LAB
REPORT
7. ARP(Address Resolution Protocol)

The ARP command is used to access the mapping structure of IP addresses to the MAC
address. This provides us with a better understanding of the transmission of packets in
the network channel.

Command to enter in Prompt – arp

37 | P a g e
COMPUTER NETWORKS LAB
REPORT
Lab Number 06

Performing Basic Switch Configuration

Steps to Configure the Switch:

Step 1. Open the packet tracer desktop and take a switch (PT-Switch) from
the devices.

Step 2: Configure the Host name of the swicth0.

● Click on switch0 and go to Command Line Interface.


● Then change the hostname to “sh”

Command:

switch> switch>en
switch#conf t
switch(config)#hostname sh sh(config)exit

Step 3: Set a message of the day (MOTD) banner for the users.

Command: sh(config)#banner
motd $
● Then, enter MOTD and end it with ‘$’ to exit.

38 | P a g e
COMPUTER NETWORKS LAB
REPORT

Step 4: Set up line control password and enable secret password.

To configure the Line Control password and Enable secret follow the below
commands:

sh#conf t sh(config)# sh(config)#line con


0 sh(config-line)#password GFG123
sh(config-line)#login sh(config-line)#exit

sh(config)#enable secret GFG@123 sh(config)#exit

39 | P a g e
COMPUTER NETWORKS LAB
REPORT

Step 5: Verify the password

● When you try to log in first, it will ask for the line control password.
● Then, to configure the terminal it will ask to enable a secret password.

40 | P a g e
COMPUTER NETWORKS LAB
REPORT

To save the configuration use the below command:

Command: sh#copy run startup-


config

41 | P a g e
COMPUTER NETWORKS LAB
REPORT
Lab Number 07

Performing Basic Switch Configuration

Steps to Configure the Router:

Step 1. Open the packet tracer desktop and take a Router (2911) and PC0
from the devices.

● Connect the router0 with PC0 with the help of a console cable.
● Then, click on PC0 and go to the terminal, and type y.
● Finally, we can configure the router with the help of a PC.

Step 2: Configure the Host name of the router0.


● Click on PC0 and go to the terminal.
● Then change the hostname to “r1”

router
>
router>e
n
router#conf
42 | P a g e
COMPUTER NETWORKS LAB
REPORT
t
router(config)#ho
stname r1
r1(config)exit
Step 3: Set a message of the day (MOTD) banner for the
users. r1(config)#banner motd $ then, enter MOTD and end it with
‘$’ to exit.
r1(config)#banner motd $
Enter TEXT message. End with the character '$'.
Unauthorised access is strictly prohibited $

Step 4: setting up line control password and enable secret password To


configure the Line Control password and Enable secret follow the below
commands:
r1#conf t r1(config)# r1(config)#line con 0
r1(config-line)#password GFG123
r1(config-line)#login r1(config-line)#exit

r1(config-line)#enable password cisco r1(config)#enable secret


GFG@123 r1(config)#service password-encryption sh(config)#exit

43 | P a g e
COMPUTER NETWORKS LAB
REPORT

Step 5: Verifying password


● When you try to log in first, it will ask for the line control password.
● Then, to configure the terminal it will ask to enable a secret password.

44 | P a g e
COMPUTER NETWORKS LAB
REPORT

To save the configuration use the below command: r1#copy


run startup-config

45 | P a g e
COMPUTER NETWORKS LAB
REPORT
Lab Number 08
Design and Implementation of Local Area Network
First checked Connectivity between router and switch

Then I checked my Telecommunication outlet number.

Then took a RJ45 cable and connect its one edge to patch panel, which port
relevant to my telecommunication outlet.

Then the other edge of my RJ45 cable I connected to a port in switch which is
available at that time.

At that time I could saw in my PC the Local Area Connection icon had shown
as Local Area Connection is connected.

Then, to test my Network Interface Card (NIC), I used command prompt and
typed there, “ping 127.0.0.1” then I could saw this kind of details Then I went
to configure my Local Area Connection.
First I right clicked on the icon “My Network Places” and select “properties”
from that menu.

Then selected the icon “Local Area Network” and right clicked on it and select
“Properties” from that window. Then selected “Internet Protocol (TCP/IP)” and
went to the properties of it by clicked on properties button.

Then Entered IP address as 172.16.0.7 and subnet mask is automatically


filled as 255.255.0.0 and Default Gateway, Preferred DNS server and
Alternate DNS server cadges keep in blank.

After that pressed “OK” button of that window and then again pressed “OK”
button in Local Area Connection properties window.

Then to troubleshoot the network connection, again went to command prompt


and typed as “ipconfig /all” then I could saw data under “Ethernet Adapter

46 | P a g e
COMPUTER NETWORKS LAB
REPORT
Local Area Connection:” which, I had entered at the Internet Protocol (TCP/IP)
Properties window.

Then, to make sure our network connection is ok. I entered a IP address of my


friend in command prompt as, “ping 172.16.0.6” Then I could saw like this,

Its mean our Network is properly working

Implementing an IP Addressing Scheme

Steps to Configure and Verify Three Router Connections in Cisco


Packet Tracer:

Step 1: First, open the Cisco packet tracer desktop and select the devices
given below:

47 | P a g e
COMPUTER NETWORKS LAB
REPORT

S.NO Device Model-Nam Qty


e
.

1. PC pc 6

2. Switch PT-Switch 3

3. Router PT-Router 3

IP Addressing Table for PCs

S.NO Device IPv4 Subnet Mask Default-Gatew


Address ay

1. pc0 192.168.1.2 255.255.255.0 192.168.1.1

2. pc1 192.168.1.3 255.255.255.0 192.168.1.1

3. pc2 192.168.2.2 255.255.255.0 192.168.2.1

4. pc3 192.168.2.3 255.255.255.0 192.168.2.1

48 | P a g e
COMPUTER NETWORKS LAB
REPORT

5. pc4 192.168.3.2 255.255.255.0 192.168.3.1

6. pc5 192.168.3.3 255.255.255.0 192.168.3.1

● Then, create a network topology as shown below the image.


● Use an Automatic connecting cable to connect the devices with
others.

Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask
according to the IP addressing table given above.
● To assign an IP address in PC0, click on PC0.
● Then, go to desktop and then IP configuration and there you will IPv4
configuration.
● Fill IPv4 address and subnet mask.

49 | P a g e
COMPUTER NETWORKS LAB
REPORT

Assigning IP address using the ipconfig command.

● Or we can also assign an IP address with the help of a command.


● Go to the command terminal of the PC.

50 | P a g e
COMPUTER NETWORKS LAB
REPORT
Then, type ipconfig <IPv4 address><subnet mask><default
gateway>(if needed)

Example: ipconfig 192.168.1.2 255.255.255.0 192.168.1.1

Repeat the same procedure with other PCs to configure them


thoroughly.

Step 3: Configure router with IP address and subnet mask.

51 | P a g e
COMPUTER NETWORKS LAB
REPORT
IP Addressing Table Router

S.N Device Interface IPv4 Address Subnet mask


O

1. router0 FastEthernet0/ 192.168.1.1 255.255.255.0


0

Serial2/0 11.0.0.1 255.0.0.0

2. router1 Serial 2/0 11.0.0.2 255.0.0.0

Serial 3/0 12.0.0.1 255.0.0.0

3. router 3 FastEthernet0/ 192.168.3.1 255.255.255.0


0

Serial2/0 12.0.0.2 255.0.0.0

To assign an IP address in router0, click on router0.


● Then, go to config and then Interfaces.
● Then, configure the IP address in FastEthernet and serial ports
according to IP addressing Table.
● Fill IPv4 address and subnet mask.

52 | P a g e
COMPUTER NETWORKS LAB
REPORT

53 | P a g e
COMPUTER NETWORKS LAB
REPORT
● Repeat the same procedure with other routers to configure them
thoroughly.

Step 4: After configuring all of the devices we need to assign the routes to the
routers.
To assign static routes to the particular router:

● First, click on router0 then Go to CLI.


● Then type the commands and IP information given below.

CLI command : ip route <network id> <subnet mask><next hop> Static Routes for
Router0 are given below:
Router(config)#ip route 192.168.2.0 255.255.255.0 11.0.0.2

Router(config)#ip route 11.0.0.0 255.0.0.0 11.0.0.2

Router(config)#ip route 192.168.3.0 255.255.255.0 11.0.0.2

Router(config)#ip route 12.0.0.0 255.0.0.0 11.0.0.2 Static Routes for


Router1 are given below:
Router(config)#ip route 192.168.1.0 255.255.255.0 11.0.0.1

Router(config)#ip route 11.0.0.0 255.0.0.0 11.0.0.1

Router(config)#ip route 192.168.3.0 255.255.255.0 12.0.0.2

Router(config)#ip route 12.0.0.0 255.0.0.0 12.0.0.2 Static Routes for


Router2 are given below:
Router(config)#ip route 192.168.1.0 255.255.255.0 12.0.0.1 Router(config)#ip route
11.0.0.0 255.0.0.0 12.0.0.1

Router(config)#ip route 12.0.0.0 255.0.0.0 12.0.0.1

Router(config)#ip route 192.168.2.0 255.255.255.0 12.0.0.1 Step 5: Verifying the


network by pinging the IP address of any PC. We will use the ping command
to do so.
54 | P a g e
COMPUTER NETWORKS LAB
REPORT
● First, click on PC0 then Go to the command prompt
● Then type ping <IP address of targeted node>
● As we can see in the below image we are getting replies which
means the connection is working very fine

Example : ping 192.168.2.2

55 | P a g e
COMPUTER NETWORKS LAB
REPORT

56 | P a g e
COMPUTER NETWORKS LAB
REPORT
Lab Number 09

Configuring VLANs
We will configure two VLANs in this network: VLAN-10 and VLAN-20. We will use
VLAN-10 for the network 10.0.0.0/8. We will use VLAN-20 for the network 20.0.0.0/8.
We will keep one PC from each switch in a VLAN.

Access the first switch's CLI prompt. Enter global configuration mode and use the vlan
command to create a new VLAN. This command needs a VLAN number as an
argument. It checks the specified VLAN number for an existing VLAN before creating a
new VLAN. If it finds an existing VLAN having the specified number, it does not create a
new VLAN. It enters VLAN configuration mode for the existing VLAN. If it does not find
an existing VLAN having the specified number, it creates a new VLAN and enters VLAN
configuration mode for the new VLAN.
VLAN configuration mode allows us to configure additional options such as name and
RSPAN. In a basic configuration, we do not need to configure these options. Use the
exit command to exit VLAN configuration mode.

57 | P a g e
COMPUTER NETWORKS LAB
REPORT
The following commands create VLAN-10.

Switch>enable

Switch#configure terminal

Switch(config)#vlan 10

Switch(config-vlan)#exit

Switch(config)#

The following commands create VLAN-20.

Switch(config)#vlan 20

Switch(config-vlan)#exit Switch(config)#

Since all three switches have PCs in these VLANs, you need to run the above
commands on all switches.

58 | P a g e
COMPUTER NETWORKS LAB
REPORT
After creating VLANs, we need to assign them to the switch ports. The switchport mode
access vlan command assigns a VLAN to the switch port. It accepts a VLAN number as
an argument. It runs in the interface configuration mode of the port. It assigns the
specified VLAN number to the port. The device connected to the port becomes a
member of the specified port.
The following commands make the device connected to port-1 a member of VLAN-10.

Switch(config)#interface fastethernet 0/1

Switch(config-if)#vlan 10

Switch(config-vlan)#exit

The following commands make the device connected to port-2 a member of VLAN-20.

Switch(config)#interface fastethernet 0/2

Switch(config-if)#vlan 20

Switch(config-vlan)#exit

Switch(config)#

You need to run the above commands on all switches.

59 | P a g e
COMPUTER NETWORKS LAB
REPORT

A switch port can work in two modes: access and trunk. In access mode, it works with a
single VLAN. In trunk mode, it works with multiple VLANs.
Access mode is the default mode on all switch ports. If you connect an end device to a
switch port, you do not need to change the default mode. But if you connect a switch
port to another switch port, you need to change the default mode to trunk mode on both
ports.

Change default mode to trunk mode on ports you used to connect switches. Use the
switchport mode trunk command to change the default mode. Run this command in the
interface configuration mode of the port.
The following commands change the default mode to trunk mode on GigabitEtherent
0/1.

Switch(config)#interface gigabitEthernet 0/1 Switch(config-if)#switchport mode trunk

Switch(config-if)#exit

60 | P a g e
COMPUTER NETWORKS LAB
REPORT

The following commands change the default mode to trunk mode on GigabitEtherent
0/2.

Switch(config)#interface gigabitEthernet 0/2

Switch(config-if)#switchport mode trunk

Switch(config-if)#exit

Switch(config)#

Run the above commands on all switches.

61 | P a g e
COMPUTER NETWORKS LAB
REPORT

Lab Number 10

Configuring Static Routing

Routers automatically learn their connected networks. We only need to add routes for
the networks that are not available on the router’s interfaces. For example, network
10.0.0.0/8, 20.0.0.0/8 and 40.0.0.0/8 are directly connected to Router0. Thus, we don’t
need to configure routes for these networks. Network 30.0.0.0/8 and network 50.0.0.0/8
are not available on Router0. We have to create and add routes only for these
networks.

62 | P a g e
COMPUTER NETWORKS LAB
REPORT
The following table lists the connected networks of each router.

Router Available networks on local Networks available on other routers’


interfaces interfaces

Router0 10.0.0.0/8, 20.0.0.0/8, 40.0.0.0/8 30.0.0.0/8, 50.0.0.0/8

Router1 20.0.0.0/8, 30.0.0.0/8, 50.0.0.0/8 10.0.0.0/8, 40.0.0.0/8

Router2 40.0.0.0/8, 50.0.0.0/8 10.0.0.0/8, 20.0.0.0/8, 30.0.0.0/8

Let's create static routes on each router for networks that are not available on the router.

Router0 requirements

Create two routes for network 30.0.0.0/8 and configure the first route (via -
Router1) as the main route and the second route (via-Router2) as a backup
route.

Create two routes for the host 30.0.0.100/8 and configure the first route (via -
Router2) as the main route and the second route (via-Router1) as a backup
route.

Create two routes for network 50.0.0.0/8 and configure the first route (via -
Router2) as the main route and the second route (via-Router1) as a backup
route.

Verify the router adds only main routes to the routing table.

Router0 configuration
Access the CLI prompt of Router0 and run the following commands.

Router>enable

Router#configure terminal

Enter configuration commands, one per line. End with CNTL/Z.

63 | P a g e
COMPUTER NETWORKS LAB
REPORT
Router(config)#ip route 30.0.0.0 255.0.0.0 20.0.0.2 10 Router(config)#ip route 30.0.0.0
255.0.0.0 40.0.0.2 20

Router(config)#ip route 30.0.0.100 255.255.255.255 40.0.0.2 10

Router(config)#ip route 30.0.0.100 255.255.255.255 20.0.0.2 20

Router(config)#ip route 50.0.0.0 255.0.0.0 40.0.0.2 10 Router(config)#ip route 50.0.0.0


255.0.0.0 20.0.0.2 20
Router(config)#exit

Router#show ip route static

30.0.0.0/8 is variably subnetted, 2 subnets, 2 masks

S 30.0.0.0/8 [10/0] via 20.0.0.2

S 30.0.0.100/32 [10/0] via 40.0.0.2

S 50.0.0.0/8 [10/0] via 40.0.0.2

Router#

64 | P a g e
COMPUTER NETWORKS LAB
REPORT

Router1 requirements

Create two routes for network 10.0.0.0/8 and configure the first route (via -
Router0) as the main route and the second route (via-Router1) as a backup
route.

Create two routes for network 40.0.0.0/8 and configure the first route (via -
Router0) as the main route and the second route (via-Router2) as a backup
route.

Verify the router adds only main routes to the routing table.

Router1 configuration

Router>enable

Router#configure terminal

Enter configuration commands, one per line. End with CNTL/Z.

Router(config)#ip route 10.0.0.0 255.0.0.0 20.0.0.1 10 Router(config)#ip route 10.0.0.0


255.0.0.0 50.0.0.1 20

65 | P a g e
COMPUTER NETWORKS LAB
REPORT
Router(config)#ip route 40.0.0.0 255.0.0.0 20.0.0.1 10 Router(config)#ip route 40.0.0.0
255.0.0.0 50.0.0.1 20
Router(config)#exit

Router#show ip route static

S 10.0.0.0/8 [10/0] via 20.0.0.1 S 40.0.0.0/8


[10/0] via 20.0.0.1
Router#

Router2 requirements
Create static routes for network 10.0.0.0/8 and network 30.0.0.0/8 and verify the router
adds both routes to the routing table.
Router2 configuration
Router>enable

Router#configure terminal

Enter configuration commands, one per line. End with CNTL/Z.

66 | P a g e
COMPUTER NETWORKS LAB
REPORT
Router(config)#ip route 10.0.0.0 255.0.0.0 40.0.0.1 Router(config)#ip route 30.0.0.0
255.0.0.0 50.0.0.2
Router(config)#exit

Router#show ip route static

S 10.0.0.0/8 [1/0] via 40.0.0.1

S 30.0.0.0/8 [1/0] via 50.0.0.2


Router#

67 | P a g e
COMPUTER NETWORKS LAB
REPORT
Lab Number 11

Configuring Dynamic Routing; RIP and IGRP


Step 1: First, open the Cisco packet tracer desktop and select the devices
given below:

S.NO Device Model Name Qty


.

1. PC PC 6

2. Switch PT-Switch 3

3. Router PT-router 3

IP Addressing Table:

S.NO Device IPv4 Subnet mask Default


Address Gateway

68 | P a g e
COMPUTER NETWORKS LAB
REPORT

1. PC0 192.168.10.2 255.255.255.0 192.168.10.1

2. PC1 192.168.10.3 255.255.255.0 192.168.10.1

3. PC2 192.168.20.2 255.255.255.0 192.168.20.1

4. PC3 192.168.20.3 255.255.255.0 192.168.20.1

5. PC4 192.168.30.2 255.255.255.0 192.168.30.1

6. PC5 192.168.30.3 255.255.255.0 192.168.30.1

● Then, create a network topology as shown below the image.


● Use an Automatic connecting cable to connect the devices with
others.

69 | P a g e
COMPUTER NETWORKS LAB
REPORT

Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask
according to the IP addressing table given above.
● To assign an IP address in PC0, click on PC0.
● Then, go to desktop and then IP configuration and there you will IPv4
configuration.
● Fill IPv4 address and subnet mask.

70 | P a g e
COMPUTER NETWORKS LAB
REPORT

● Assigning an IP address using the ipconfig command, or we can also


assign an IP address with the help of a command.
● Go to the command terminal of the PC.
● Then, type iPConfig <IPv4 address><subnet mask><default
gateway>(if needed)

Example: iPConfig 192.168.10.2 255.255.255.0 192.168.10.1


71 | P a g e
COMPUTER NETWORKS LAB
REPORT

● Repeat the same procedure with other PCs to configure them


thoroughly.

Step 3: Configure router with IP address and Subnet mask.

IP Addressing Table Router:

72 | P a g e
COMPUTER NETWORKS LAB
REPORT

S.N Device Interface IPv4 Address Subnet mask


O

1. router0 FastEthernet0/ 192.168.10.1 255.255.255.0


0

Serial2/0 10.0.0.1 255.0.0.0

2. router1 FastEthernet0/ 192.168.20.1 255.255.255.0


0

Serial2/0 10.0.0.2 255.0.0.0

Serial3/0 11.0.0.1 255.0.0.0

3. router2 FastEthernet0/ 0 192.168.30.1 255.255.255.0

Serial2/0 11.0.0.2 255.0.0.0

73 | P a g e
COMPUTER NETWORKS LAB
REPORT
● To assign an IP address in router0, click on router0.
● Then, go to config and then Interfaces.
● Make sure to turn on the ports.
● Then, configure the IP address in FastEthernet and serial ports
according to IP addressing Table.
● Fill IPv4 address and subnet mask.

74 | P a g e
COMPUTER NETWORKS LAB
REPORT

● Repeat the same procedure with other routers to configure them


thoroughly.
Step 4: After configuring all of the devices we need to assign the routes to the
routers.
To assign RIP routes to the particular router:

75 | P a g e
COMPUTER NETWORKS LAB
REPORT
● First, click on router0 then Go to CLI.
● Then type the commands and IP information given below.

CLI command : router rip

CLI command : network <network id> RIP


Routes for Router0 are given below:
Router(config)#router rip

Router(config-router)#network 192.168.10.0

Router(config-router)#network 10.0.0.0 RIP Routes


for Router1 are given below:
Router(config)#router rip

Router(config-router)#network 192.168.20.0

Router(config-router)#network 10.0.0.0

Router(config-router)#network 11.0.0.0 RIP Routes


for Router2 are given below:
Router(config)#router rip

Router(config-router)#network 192.168.30.0

Router(config-router)#network 11.0.0.0

Step 5: Verifying the network by pinging the IP address of any PC.


● We will use the ping command to do so.
● First, click on PC0 then Go to the command prompt.
● Then type ping <IP address of targeted node>.
● As we can see in the below image we are getting replies which
means the connection is working properly.

Example : ping 192.168.20.2

76 | P a g e
COMPUTER NETWORKS LAB
REPORT

77 | P a g e

You might also like