0% found this document useful (0 votes)
107 views56 pages

LAB 1: Fjal The Quit: Duration: 2 Hours Learning Outcomes

This lab aims to build a simple peer-to-peer network and LAN using two PCs, a switch, and a printer. Students will connect two PCs directly using a crossover cable to form a peer-to-peer network. They will then expand this to a small LAN by connecting the PCs and a printer to a switch using straight-through cables. The goals are to understand basic small network topologies and gain experience installing and configuring network devices like printers.

Uploaded by

brianmonge
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
107 views56 pages

LAB 1: Fjal The Quit: Duration: 2 Hours Learning Outcomes

This lab aims to build a simple peer-to-peer network and LAN using two PCs, a switch, and a printer. Students will connect two PCs directly using a crossover cable to form a peer-to-peer network. They will then expand this to a small LAN by connecting the PCs and a printer to a switch using straight-through cables. The goals are to understand basic small network topologies and gain experience installing and configuring network devices like printers.

Uploaded by

brianmonge
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 56

FP303 Computer Network

LAB 1: fjal the quit


Duration : 2 Hours

Learning Outcomes
This Lab sheet encompasses activities 1A.

By the end of this laboratory session, you should be able to:


1. Prepare your own CAT 5 UTP Ethernet network cables; straight and cross-over cable and
be able to identify the equipment need to perform this task.
2. Test the cable for good connections (continuity) and correct pinouts (correct color of wire on
the right pin)

Hardware/ Software: UTP CAT 5 Cable,RJ-45 Connectors ,Modular Plug Crimp Tool,
Universal UTP Stripping Tool (Eclipse), Diagonal Cutters ("4 to 6"), LAN Cable Tester

Activity 1A
Activity Outcome: Prepare UTP cable

Build and terminate straight-through patch cables and crossover cables.

Procedure:

Step 1: Let's start with simple pin-out diagrams of the two types of UTP Ethernet cables
and watch how committees can make a can of worms out of them. Here are the
diagrams:

Step 2: Cut off the RJ45 connector from one end of the cable and prepare the end for the
new RJ45 connector. Stripping the cable at least 1 inch of the main cable
insulation and then carefully trim the eight internal wires using the factory
assembled end as a guide to the proper length. Just make sure that each wire is
equal length and that the connector cable lock pinches the main cable insulation.

Step 3: Strip one end of the cable with the stripper or a knife and diags. If you are using
the stripper, place the cable in the groove on the blade (left) side of the stripper
FP303 Computer Network

and align the end of the cable with the right side of the stripper. Turn the stripper
about one turn or so. If you turn it much more, you will probably nick the
wires. The idea is to score the outer jacket, but not go all the way through. Once
scored, you should be able to twist the end of the jacket loose and pull it off with
one hand while holding the rest of the cable with the other. If you are using a
knife and diags, carefully slit the cable for about an inch or so and neatly trim
around the circumference of the cable with the diags to remove the jacket.

Step 4: Inspect the wires for nicks. Cut off the end and start over if you see any. You
may have to adjust the blade with the screw at the front stripper.

Step 5: Spread and arrange the pairs roughly in the order of the desired cable end.

Step 6: Untwist the pairs and arrange the wires in the order of the desired cable
end. Flatten the end between your thumb and forefinger. Trim the ends of the
wires so they are even with one another. It is very important that the
unstripped (untwisted) end be slightly less than 1/2" long. If it is longer
than 1/2" it will be out-of-spec and susceptible to crosstalk. If it less than slightly
less than 1/2" it will not be properly clinched when RJ-45 plug is crimped
on.. Flatten again. There should be little or no space between the wires.

Step 7: Hold the RJ-45 plug with the clip facing down or away from you. Push the wire
firmly into the plug. Now, inspect the cable... before crimping and wasting
the plug! Looking through the bottom of the plug, the wire on the far left side
will have a white background. The wires should alternate light and dark from left
to right. The furthest right wire is brown. The wires should all end evenly at the
front of the plug. The jacket should end just about where you see it in the
diagram--right on the line.

Step 8: Hold the wire near the RJ-45 plug with the clip down and firmly push it into the
left side of the front of the crimper (it will only go in one way). Hold the wire in
place squeeze the crimper handles quite firmly. This is what will happen:

Figure 5.1

Step 9: (Crimp it once.) The crimper pushes two plungers down on the RJ-45 plug. One
forces what amounts to a cleverly designed plastic plug/wedge onto the cable
jacket and very firmly clinches it. The other seats the "pins," each with two teeth
FP303 Computer Network

at its end, through the insulation and into the conductors of their respective
wires.

Step 10: Test the crimp, if done properly an average person will not be able to pull the
plug off the cable with his or her bare hands. But, don't pull that hard on the
plug. It could stretch the cable and change its characteristics. Look at the side
of the plug and see if it looks like the diagram and give it a fairly firm tug to make
sure it is crimped well.

Step 11: Prepare the other end of the cable so it has the desired end and crimp.

Step 12: If both ends of the cable are within reach, hold them next to each other and with
RJ-45 clips facing away. Look through the bottom of the plugs. If the plugs are
wired correctly, and they are identical, it is a straight-thru cable. If they are wired
correctly and they are different, it is a crossover cable.

Step 13: If you have an operational network, test the cable. Copy some large files.

Step 14: If the cable doesn't work, inspect the ends again and make sure you have the
right cable and that it is plugged into the correct units for the type of cable. Try
power-cycling (cold booting) the involved computers.

Step 15: If you have many straight-thru cables and a crossover cable in your system, you
should consider labeling the crossover cable or using a different colored cable
for the crossover cable so you don't mix them up. You are not recommend
implementing the crossover function, as recommended elsewhere, with two
RJ-45 jacks, appropriately wired back to back, and two straight-thru
cables. This method costs noticeably more, introduces more than the
necessary number of components and connections, increases the complexity
and time of assembly, and decreases reliability.

Cabling Rules

 Try to avoid running cables parallel to power cables.


 Do not bend cables to less than four times the diameter of the cable.
 If you bundle a group of cables together with cable ties (zip ties), do not over-cinch
them. Its okay to snug them together firmly; but don't tighten them so much that you
deform the cables.

Questions

1. What are the differences between straight-thru cable and cross-over cable?
FP303 Computer Network

STRAIGHT-THRU CABLE CROSS-OVER CABLE

2. What is the disadvantage of STP cable compare to UTP cable?


………………………………………………………………………………………………
……………………………………………………………………………………………..

3. What is the importance of the EIA/TIA standards?


………………………………………………………………………………………………
……………………………………………………………………………………………..

4. What is the function of the twisting wires in a CAT-5 cables?


………………………………………………………………………………………………
………………………………………………………………………………………………

5. How do you know that your crossover cable is good?


………………………………………………………………………………………………
………………………………………………………………………………………………

Notes:
http://www.cablesplususa.com/rj45-utp-guide.php

LAB 2: Building a Simple Network


FP303 Computer Network

Duration : 2 Hours

Learning Outcomes
This Lab sheet encompasses activities 2A, 2B, 2C, 2D, 2E, 2F.

By the end of this laboratory session, you should be able to:


1. Build a simple peer-to-peer network.
2. Build a simple LAN using two hosts and a switch.
3. Install and configure a network printer in a simple LAN.
4. install and configure a network printer in simple LAN.

Hardware/ Software: UTP crossover cable, PC, switch and printer.

Activity 2A
Activity Outcome: Connecting 2 Computers as Peer to Peer connection

The laboratory are designing simple peer-to-peer network using crossover cable.

Procedure:

Step 1: Diagram the network

a. A network diagram is a map of the logical topology of the network. In the space
below, sketch a simple peer-to-peer network connecting two PCs. Label one PC
with IP address 192.168.1.1 and the other PC with IP address 192.168.1.2. Use
labels to indicate connecting media and any necessary network devices.

b. A simple network like the one you designed can use a hub or switch as a central
connecting device, or the PCs may be directly connected. Which kind of cable is
required for a direct Ethernet connection between the two PCs?
FP303 Computer Network

Step 2: Document the PCs

a. Check the computer name settings for each PC and make adjustments as
necessary. For each PC, select Start and Control Panel. Double-click the
System icon, and then click the Computer Name tab.

Write down the computer name that is displayed following Full computer name:

PC1 Name: ______________________________


PC2 Name: ______________________________

Figure 2.1

b. Check to see if the two PCs have the same name. If they do, change the name of
one PC by clicking the Change button, typing a new name in the Computer name
field, then clicking OK.
c. Click OK to close the System Properties window.
d. Why is it important that each PC on a network have a unique name?
________________________________________________________________
_______________________________________________________________
________________________________________________________________

Step 3: Connect the Ethernet cable


FP303 Computer Network

a. Use the Ethernet crossover cable provided by the instructor. Plug one end of the
cable into the Ethernet NIC of PC1.
b. Plug the other end of the cable into the Ethernet NIC of PC2. As you insert the
cable, you should hear a click which indicates that the cable connector is properly
inserted into the port.

Step 4: Verify physical connectivity

a. After the Ethernet crossover cable is connected to both PCs, take a close look at
each Ethernet port.
A light (usually green or amber) indicates that physical connectivity has been
established between the two NICs. Try unplugging the cable from one PC then
reconnecting it to verify that the light goes off then back on.
b. Go to the Control Panel, double click the Network Connections icon, and confirm
that the local
area connection is established. The following figure shows an active local area
connection. If physical connectivity problems exist, you will see a red X over the
Local Area Connection icon with the words Network cable unplugged.

Figure 2.2

c. If the Local Area Connection does not indicate that it is connected, troubleshoot
by repeating Steps 3 and 4. You may also want to ask your instructor to confirm
that you are using an Ethernet crossover cable.

Step 5: Configure IP settings


FP303 Computer Network

a. Configure the logical addresses for the two PCs so that they are able to
communicate using TCP/IP. On one of the PCs, go to the Control Panel, double
click the Network Connections icon, and then right click the connected Local Area
Connection icon. Choose Properties from the pull-down menu.
b. Using the scroll bar in the Local Area Connection Properties window, scroll down
to highlight Internet Protocol (TCP/IP). Click the Properties button.

Figure 2.3

c. Select the Use the following IP address radio button and enter the following
information:
FP303 Computer Network

IP Address 192.168.1.1
Subnet Mask 255.255.255.0

Figure 2.4

d. Click OK, which will close the Internet Protocol (TCP/IP) Properties window.
Click the Close button to exit the Local Area Connection Properties window.

e. Repeat steps 5a – 5d for the second PC using the following information:

IP Address 192.168.1.2
Subnet Mask 255.255.255.0

Step 6: Verify IP connectivity between the two PCs


FP303 Computer Network

NOTE: To test TCP/IP connectivity between the PCs, Windows Firewall must be disabled
temporarily on both PCs. Windows Firewall should be re-enabled after the tests have
been completed.
a. On PC1, on the Windows XP desktop, click Start. From the Start menu, select
Control Panel, and double-click Network Connections.
b. Right-click the Local Area Connection icon and select Properties. Click the
Advanced tab. Locate and click the Settings button.
c. Make a note of whether the firewall settings are ENABLED (ON) for the Ethernet
port or DISABLED (OFF) for the Ethernet port.
________________________________________________________________
________________________________________________________________

d. If the firewall settings are enabled, click the Off (not recommended) radio button
to disable the firewall. The setting will be re-enabled in a later step. Click OK in this
dialog box and the following to apply this setting.
e. Now that the two PCs are physically connected and configured correctly with IP
addresses, we need to make sure they communicate with each other. The ping
command is a simple way to accomplish this task. The ping command is included
with the Windows XP operating system.
f. On PC1, go to Start, then Run. Type cmd, and then click OK. A Windows
command prompt window will appear as shown in the figure below.
g. At the > prompt, type ping 192.168.1.2 and press Enter. A successful ping will
verify the IP connectivity. It should produce results similar to those shown in here.

Figure 2.5

h. Repeat Steps 6a-6c on the second PC. The second PC will ping 192.168.1.1.
i. Close the Windows command prompt window on both PCs.

Step 7: Verify connectivity using My Network Places


FP303 Computer Network

a. A PC can share its resources with other PCs on the network. PCs with shared
resources should be visible through My Network Places. On PC1, go to Start,
click My Network Places, and then click View workgroup computers in the left
panel.

Figure 2.6

b. Do you see an icon for the other PC in your peer-to-peer network?


________________________________________________________________
c. What is the name of the other PC?
________________________________________________________________
d. Is it the same name you recorded in Step 2?
________________________________________________________________
________________________________________________________________
e. Perform Step 7a on the second PC.
f. Close any open windows.

Step 8: (Optional – Use only if the Firewall was originally ENABLED) Re-enable the
firewall
FP303 Computer Network

a. If you disabled the Windows Firewall in Step 6, click Start, select Control Panel,
and open the Network Connections control panel.
b. Right-click the Ethernet network connection icon and select Properties. Click the
Advanced tab. Locate and click Settings.
c. If the firewall settings are disabled (and they were enabled before this lab began),
click the On radio button to enable the firewall. Click OK in this dialog box and the
following one to apply this setting.

Activity 2B
Activity Outcome: Connecting More Than 2 Computers as Peer To Peer Connection
Using A Switch.

Procedure:

If you want to connect more than two computers, you need a "straight-through"
Ethernet cable. When constructing a network, you need to use straight through Ethernet
cables. You should follow your operating system's directions for proper configuration
instructions. You can share files and a printer, and if you have, Internet Connection
Sharing set up, your Internet connection as well.

Activity 2C
Activity Outcome: Connecting More Than 2 or More Computers as Peer To Peer
Connection Using Two Switches

Procedure:

If you want to connect more than two computers, you need a "straight-through" Ethernet
cable. When constructing a network, you need to use straight through Ethernet cables.
However to connect two Switches you need to use a "crossover cable" (or "twisted
pair"). Nevertheless, if your Switches have a MDI or MDI-X then you can use either a
"straight-through" or "crossover cable" (or "twisted pair"). You should follow your
operating system's directions for proper configuration instructions. You can share files
and a printer, and if you have, Internet Connection Sharing set up, your Internet
connection as well.

Activity 2D
Activity Outcome: Working With One Workgroup
FP303 Computer Network

Procedure:

You will need to go to the System Properties Dialog Box. There are two ways to do this.
The first way is to go to the Control Panel and click on the System icon. The other way
is to press the Windows Key and Pause/Break Key together. There click on the
Computer Name and change all workgroup names to WORKGROUP.
Now go to the network properties, look, and see what has happen. What do you see?
………………………………………………………………………………………………………
……………………………………………………………………………………………………..

Activity 2E
Activity Outcome: Working With More Than One Workgroup

Procedure:

You will need to go to the System Properties Dialog Box and change the name of the
Workgroups. Two groups use the name WORKGROUP 1. Two groups use the name
WORKGROUP 2. Two groups use the name WORKGROUP 3. Two groups use the
name WORKGROUP 4.

Activity 2F

 Activity Outcome: Setup printer in Local Area Network

Procedure:

Step 1: First, connect the printer to your network by connecting one end of a Cat 5 cable .

Step 2: Next you’ll need to get the IP address of your printer. The IP address is what will tell
your computer where to find your printer on the network. All network printers allow you
to print a configuration sheet which will list basic information about the printer along
with the current network configuration.

For most printers, this involves pressing the Menu button on the printer, going to the
Information option and choosing Print Configuration. You will be looking for the
TCP/IP section:
FP303 Computer Network

Figure 2.7

The IP Address is what you’ll need for the next steps.

Step 3: The last step is to add the printer to your computer. Click on Start, then Printers and
Faxes.

If you don’t see this in your Start Menu, you can go to Start, Control Panel and then click on
Printers and Faxes there. Click Add Printer from the task pane on the left.

Step 4: The Add Printer wizard will begin, so click Next to get started. On the next screen you’ll
be asked whether your printer is a local printer or a network printer. These options are
confusing because a network printer is actually referring either a printer connected to
another computer or a printer on a print server. Our printer is a stand-alone printer and
so you must select Local printer attached to this computer and make sure that you
uncheck the box for automatically detecting the printer.

Figure 2.8

Step 5: Click Next and you’ll be asked to select the printer port. Since our printer is a network
printer with a IP address, we need to select the Create a new port option and choose
Standard TCP/IP Port.
FP303 Computer Network

Figure 2.9

Step 6: Click next and you’ll get another wizard to add a TCP/IP printer port. On the main
wizard screen click next. In the first text box, Printer Name or IP Address, enter the IP
address from the printer configuration sheet you printer earlier.

Figure 2.10

Step 7: Click next and depending on the printer you have, you may get one more dialog before
the end of the wizard. If the network card for the printer cannot be identified, the wizard
will ask you to choose the card type. You can leave the default of “Generic Network
Card” and click next.
FP303 Computer Network

Figure 2.11

Step 8: Click next and click Finish. You will then continue on with the Add Printer wizard and
you’ll need to either choose the printer from the list of manufacturers or click Have Disk
and insert your printer driver cd in the computer.

Figure 2.12

Step 9: Click next and enter a name for your printer and click the Yes radio button if you would
like the printer to be your default printer.
FP303 Computer Network

Figure 2.13

Step 10: Click Next and you’ll be asked whether you want to share the printer or not. Click No
because anyone else who wants to connect will be able to do so following the same
steps.

Figure 2.14

Click next and click Yes to print a test page and make sure that the computer and printer can
communicate.
FP303 Computer Network

Figure 2.15

Questions :

1. Why is it important that each PC on a network have a unique name?


………………………………………………………………………………………

2. State the items that we need to configure to have a successful connection.

………………………………………………………………………………………

3. List the item that can be shared in a network.

…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………

4. In a peer-to-peer network how can you keep, one user from accessing shared files
intended for another user.

…………………………………………………………………………………………………
…………………………………………………………………………………………………

5. How can you tell if a drive is shared simply by looking at its icon?

…………………………………………………………………………………………………
…………………………………………………………………………………………………

LAB 3: Network Protocols


Duration : 2 Hours
FP303 Computer Network

Learning Outcomes
This Lab sheet encompasses activities 3A.

By the end of this laboratory session, you should be able to:


1. Analyze an identify the network protocols deployed in the network of an organization.

Hardware/ Software: Network Protocol Analyzer Software (Ethereal / Wireshark)

Activity 3A
Activity Outcome: Analyze an identify the network protocols

Procedure:

Step 1: Run the Wireshark program. Click the icon as shown below:

Step 2: Capture live network data. Click Capture > Interface.

Figure 3.1

When you select "Interfaces..." from the Capture menu, Wireshark pops up the "Capture
Interfaces dialog box as shown below. Click the Start button for Integrated Fast
Ethernet.

Figure 3.2

Capture for a few minutes and stop by pressing the accelerator keys: Ctrl+E or clicking
the icon.
FP303 Computer Network

Step 3: View the captured packets.


Once you have captured some packets, or you have opened a previously saved capture
file, you can view the packets that are displayed in the packet list pane by simply
clicking on a packet in the packet list pane, which will bring up the selected packet in the
tree view and byte view panes.
You can then expand any part of the tree view by clicking on the plus sign (the symbol
itself may vary) to the left of that part of the payload, and you can select individual fields
by clicking on them in the tree view pane. An example with a TCP packet selected is
shown below. It also has the Acknowledgment number in the TCP header selected,
which shows up in the byte view as the selected bytes.

Figure 3.3
Step 4: Filtering packets.
To select packets based on protocol type, simply type the protocol in which you are
interested in the Filter: field in the filter toolbar of the Wireshark window and press enter
to initiate the filter. The following figure shows an example of what happens when you
type tcp in the filter field.
FP303 Computer Network

Figure 3.4

Note!
All protocol and field names are entered in lowercase. Also, don't forget to press enter
after entering the filter expression.

Questions:

1. Analyze and identify the protocols and its function in the list.

………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………

LAB 4: Network System


Communication
Duration : 2 Hours
FP303 Computer Network

Learning Outcomes
This Lab sheet encompasses activities 4A.

By the end of this laboratory session, you should be able to:


1. Explain the concept of layered protocols.
2. Describe the functionality of each layer in the communication process.
3. Describe how each layer interface with the layers above it and below it.
4. Describe how each layer interface with the layers adjacent to it on other systems.

Hardware/ Software: Packet Tracer Software

Activity 4A
Activity Outcome: Observe traffic between a client and a web server

Procedure:

Observe traffic between a client and a web server


Double click on the icon shown below

Enter Simulation mode by clicking the Simulation tab in the lower right-hand corner.
The Simulation tab is located behind the Realtime tab and has a stopwatch symbol.

View traffic by creating a Complex PDU in Simulation mode.


FP303 Computer Network

Figure 4.1

From the Simulation Panel, select Edit Filters and check only the boxes for TCP and
HTTP.

Figure 4.2

Add a Complex PDU by clicking the open envelope located above the Simulation mode
icon.
FP303 Computer Network

Click the External Client to specify it as the source.

Figure 4.3

Specify the Complex PDU settings by changing the following within the Create
Complex PDU window: Under PDU Settings > Select Application should be set to
HTTP. Click the ciscolearn.web.com server to specify it as the destination device.
For the Source Port type 1000. Under Simulation Settings select Periodic Interval and
type 120 seconds. Create the PDU by clicking the box Create PDU in the Create
Complex PDU window.

Figure 4.4

Double click the Simulation Panel to unlock it from the PT window. This allows you to move
the Simulation Panel to view the entire network topology.
Observe the traffic flow by clicking the Auto Capture / Play button in the Simulation
Panel. Speed up the animation by using the play control slider.
FP303 Computer Network

Figure 4.5

*When the Buffer Full window appears, close the window with the x.

Figure 4.6

Step 2: View the header information of the packets that traveled across the network.
FP303 Computer Network

Examine the headers of the packets sent between the clients and server. In the
Simulation Panel, click any one of the lines in the Event List. This displays an
envelope in the work area that represents that line.
Click the envelope in the work area window to view the packet and header
information.

Figure 4.7

The OSI Model window displays within which layer of the OSI model the packet is being
processed.

*Notice that depending on the device that received the packet, the higher or lower the
layer included. A switch will only display the packet to Layer 2. Whereas, the PC or
Server will display the packet up to Layer 4.

In the OSI Model window, read the description of the


packet.

Click the Inbound PDU Details, or Outbound PDU Details,to


view the actual packet sent.

*Note the MAC address within the frame, the IP address


information within the packet, and the source and
destination port number within the segment.
Click through other event lines to read those descriptions as well.
Questions:
FP303 Computer Network

1. Write the functions of each OSI layer.


………………………………………………………………………………………………………
………………………………………………………………………………………………………

2. Name network devices and media associated with lower layers.


………………………………………………………………………………………………………
………………………………………………………………………………………………………

3. State the type of encapsulated data for Layer 1, Layer 2, Layer 3 and Layer 4.
………………………………………………………………………………………………………
………………………………………………………………………………………………………

4. List THREE examples of application on Layer 7.


………………………………………………………………………………………………………
………………………………………………………………………………………………………

5. Identify the port number for HTTP.


………………………………………………………………………………………………………
………………………………………………………………………………………………………

6. Match the following Layers with appropriate answer.

LAB 5: IP Addressing Of a Network


FP303 Computer Network

orkstation.
3. Assign IP address manually by modifying client workstation’s TCP/IP properties.
4. Use the ping command, a browser and nslookup to identify the relationship
between domain names and IP addresses

Hardware/ Software: Windows XP Professional, the Scientific Calculator.

Activity 5A
………………

1. What is the purpose of the subnet mask?

…………………………………………………………………………………………
Activity 5C
Activity Outcome: use the ping command, a browser and nslookup to identify the
relationship between domain names and IP addresses

Procedure:

Step 1: Go to the command prompt and type:


Ping www.microsoft.com and press Enter. What are the results?
……………………………………………………………………………………………
………………………………………………………………………………………
Step 2: While you have used Ping in this way before , it has several switches that you
have not yet tried .To see what they are ,type: Ping - ? and press Enter .
A screen appear the complete syntax of the Ping command.

Step 3: Let try some of the switches to see how they work. Type:
Ping –t 127.0.0.1 and press enter .the –t switch causes the Ping command to
continue pinging until you stop it. Type Ctrl-C.

Step 4: While the –t switch allows you to ping indefinitely, the normal default for the
number of the pings is four. But this can be changed with the –n switch .Type:
Ping –n 7 127.0.0.1 and press Enter. What are the results?
……………………………………………………………………………………………
……………………………………………………………………………………………

Step 5: The default setting for the length of the packets transmitted is 32 bytes .But this
also can be changed by using the –l (for length) switch. Example Ping –l 1000
127.0.0.1 and press Enter. As you can see, the packet length of the packet is
now ……………………..
FP303 Computer Network

Step 6: Ping can also be used to resolve IP address to host names. The –a switch is
used for this purpose. Example Ping –a 17.254.0.50 and press Enter

Questions:

1. What is the function of the ping command?

……………………………………………………………………………………….

2. After pinging a computer you received a reply like below.

Request timed out


Request timed out
Request timed out

This reply most likely means that

……………………………………………………………………………………..
FP303 Computer Network

LAB 6: Preparing Using The DNS And


DHCP Service In Windows
Duration : 2 Hours

Learning Outcomes
This Lab sheet encompasses activities 6A, 6B & 6C.

By the end of this laboratory session, you should be able to:


3. Configure a DHCP server within a range of IP addresses.
4. Verify the configuration of DHCP
5. Implement DNS in a LAN

Hardware/ Software Simple network connection, Windows 2000 Professional, UTP Category 5
Straight/Cross Cable

Activity 6A
Activity Outcome: Installing DNS

Procedure:

You can install a DNS server from the Control Panel or when promoting a member
server to a domain controller (DC). During the promotion, if a DNS server is not
found, you will have the option of installing it.

To install a DNS server from the Control Panel, follow these steps:

1. From the Start menu, select Settings | Control Panel | Add/Remove Programs.
FP303 Computer Network

2. Click the Add/Remove Windows Components button to open the Windows


Components Wizard window (see Figure A).
3. Select Networking Services and click the Details button.
4. Click the Domain Name System (DNS) check box (see Figure B).
Click OK and then click Next. The DNS component you selected will be installed.

Figure A: The Add/Remove Windows Components Wizard


FP303 Computer Network

Figure B: The Networking Services option with DNS selected


Activity 6B
Activity Outcome: Configuration DNS

Procedure:

After installing DNS, you can find the DNS console from Start | Programs |
Administrative Tools | DNS. Windows 2003 provides a wizard to help configure
your DNS.

When configuring your DNS server, you must be familiar with the following
concepts:
a) Forward lookup zone
b) Reverse lookup zone
c) Zone types

A forward lookup zone is simply a way to resolve host names to IP addresses.


A reverse lookup zone allows a DNS server to discover the DNS name of the
host. Basically, it is the exact opposite of a forward lookup zone. A reverse lookup
zone is not required, but it is easy to configure and will allow for your Windows
2000 Server to have full DNS functionality.

When selecting a DNS zone type, you have the following options: Active Directory
(AD) Integrated, Standard Primary, and Standard Secondary. AD Integrated stores
the database information in AD and allows for secure updates to the database file.
FP303 Computer Network

This option will appear only if AD is configured. If it is configured and you select
this option, AD will store and replicate your zone files.

A Standard Primary zone stores the database in a text file. This text file can be
shared with other DNS servers that store their information in a text file. Finally, a
Standard Secondary zone simply creates a copy of the existing database from
another DNS server. This is primarily used for load balancing.

To configure the DNS, follow the steps below:

1. Go to the Start menu.


2. Click Run.
3. Write down ‘DCPROMO’.
4. Follow wizard instruction.
5. Write down domain name as ‘ICT’ in dialog box.
6. For password dialog box, leave it as blank.
7. Follow wizard instruction until finish.

Activity 6C
Activity Outcome: Configuration DHCP

Procedure:

1. Open to "Manage Your Server" wizard, select the DHCP server option for the list
of server roles and press NEXT. You will be asked to enter the name and
description of your scope.
FP303 Computer Network

SCOPE: is a collection of IP addresses for computers on a subnet that use


DHCP.

2. Enter the appropriate details and click NEXT.

(It will ask you to define the range of addresses that the scope will distribute across
the network and the subnet mask for the IP address.)

3. Add any exclusion to the range of IP addresses you specified in the previous
window.
FP303 Computer Network

4. Set the lease duration for how long a client can use an IP address assigned to it
from this scope. It is recommended to add longer leases for a fixed network (in the
office for example) and shorter leases for remote connections or laptop computers.

5. Make a choice to configure the DHCP options for the scope now or later.

6. Click NEXT, the router, or gateway, IP address may be entered in next. The client
computers will then know which router to use
FP303 Computer Network

7. Setting the DNS and domain name. The DNS server IP address will be distributed
by the DHCP server and given to the client.

8. Activate the scope - just press NEXT when you see the window below. The DHCP
server will not work unless you do this.
FP303 Computer Network

The address pool displays a list of IP ranges assigned for distribution and IP
address exclusions. You are able to add exclusion by right clicking the address
pool text on the left hand side of the mmc window and selecting "new exclusion
range".
FP303 Computer Network

DHCP servers permit you to reserve an IP address for a client. This means that
the specific network client will have the same IP for as long as you wanted it to.

To do this you will have to know the physical address (MAC) of each network
card. Enter the reservation name, desired IP address, MAC address and
description - choose whether you want to support DHCP or BOOTP and press
add. The new reservation will be added to the list.
FP303 Computer Network

If you right click scope options and press "configure options" you will be taken
to a window in which you can configure more servers and their parameters.
These settings will be distributed by the DHCP server along with the IP address.
Server options act as a default for all the scopes in the DHCP server. However,
scope options take preference over server options.
FP303 Computer Network

Questions:

1. What is the function of the following DNS components?

a. Domain Namespace
………………………………………………………………………………………………
………………………………………………………………………………………………
……………………………………………………………………………………………..

b. DNS Zones
………………………………………………………………………………………………
………………………………………………………………………………………………
……………………………………………………………………………………………..

c. Name Servers
………………………………………………………………………………………………
………………………………………………………………………………………………
……………………………………………………………………………………………..

2. What is a difference between a forward lookup query and a reverse lookup query?
………………………………………………………………………………………………
………………………………………………………………………………………………
……………………………………………………………………………………………..

3. What is the purpose of Active Directory?


………………………………………………………………………………………………
………………………………………………………………………………………………
…………………………………………………………………………………………….
FP303 Computer Network

LAB 7: Create User, Roaming User


Profile And Disk Quota
Duration : 2 Hours

Learning Outcomes
This Lab sheet encompasses activities 7A, 7B & 7C.

By the end of this laboratory session, you should be able to:


1. Create a user account
2. Set a user right and group policy
3. Apply disk quota for a user
Hardware/ Software Computer Trainer, Windows 2003 Server Operating System

Activity 7A
Activity Outcome: Create a domain user account

Procedure:

1. Run Active Directory Users and Computers from Start Menu | Programs |
Administrative Tools | Active Directory Users and Computers.

2. In the Active Directory Users and Computers console, click the Action | New |
User menu.
FP303 Computer Network

3. In the New Object - User dialog box, specify First name, Last name, Initials, and
User logon name, and click the Next button. There is no need to specify Full
name, as the Full Name field is automatically filled on the basis of the first name,
last name, and initials that are provided by the user.
FP303 Computer Network

4. In the next dialog box, specify a password in the Password and Confirm
password fields. Specify other settings by selecting the appropriate check boxes,
and click the Next button.
FP303 Computer Network

5. Click the Finish button.

Activity 7B
Activity Outcome: Create a Shared Folder to Store Roaming User Profiles

Procedure:

Before you configure a user account to use a roaming user profile, you must
create a shared folder on a Windows 2003 Server computer in the domain to
store the roaming user profiles. This shared folder is often located on a domain
controller, but it can also be located on any Windows 2003 Server computer in
the domain.

How to Configure a User Account to Use a Roaming User Profile in a


Windows-Based Domain
To configure user accounts in the domain Windows Server 2003-based
computer, you must be logged on as either an administrator or as a user that is a
member of the Administrators local group or the Account Operators local group in
the domain.

To configure a user account to use a roaming user profile:


FP303 Computer Network

1. Click Start, point to Programs, point to Administrative Tools (Common),


and then click Active Directory Users and Computers for Windows Server
2003.
2. Double-click the user account to which you want to assign a roaming profile,
and then click Profile.
3. Type the complete path to the shared folder that contains the user's profile in
the User Profile Path box, and then click OK.

Use the following format for the user profile path:


\\server_name\shared_folder_name\user_profile_folder_name

For example, if you want to store the user's roaming profile in a folder that has
the same name as the user account in a shared folder that is named "Profiles"
on a server that is named "Server1," type the following path:
\\Server1\Profiles\%username%

* NOTE: Windows NT automatically replaces the %username% variable with


the user account name when it creates and accesses the user profile. When
you use this variable, you can type the same path for all users.

4. Click OK, and then quit Active Directory Users and Computers.

Activity 7B
Activity Outcome: Apply disk quota limit

Procedure:

1. Run Windows Explorer from Start Menu | Programs | Accessories | Windows


Explorer.

2. In Windows Explorer, right-click the (D:) drive (example) in the Folders section,
and click Properties.
FP303 Computer Network

3. In the <drivename> Properties dialog box, click the Quota tab. On the Quota tab
page, select the Enable quota management check box, and specify the disk space
limit and warning level. Click the Apply button, and click the OK button.
FP303 Computer Network

LAB 8: Preparing Using The DNS And


DHCP Service In Windows
Duration : 2 Hours

Learning Outcomes
This Lab sheet encompasses activities 8A, 8B & 8C

By the end of this laboratory session, you should be able to:


1. Observe the packets travel through the internet by using ping and traceroute
2. Trace the internet connectivity by using ping, traceroute and visual traceroute
Hardware/ Software Computer Trainer, Windows XP Operating System

Activity 8A
Activity Outcome: Using Ping To Test Reach Ability

Procedure:

[root@morgan]# ping -n 192.168.98.254


PING 192.168.98.254 (192.168.98.254) from 192.168.98.82 : 56(84)
bytes of data.
64 bytes from 192.168.98.254: icmp_seq=0 ttl=255 time=231 usec
64 bytes from 192.168.98.254: icmp_seq=1 ttl=255 time=179 usec
64 bytes from 192.168.98.254: icmp_seq=2 ttl=255 time=215 usec
<ctrl-C>

--- 192.168.98.254 ping statistics ---


3 packets transmitted, 3 packets received, 0% packet loss
round-trip min/avg/max/mdev = 0.179/0.208/0.231/0.024 ms

Activity 8B
Activity Outcome: Using Ping To Specify Number OfPackets To Send

Procedure:
[root@morgan]# ping -c 10 -n 192.168.100.17
PING 192.168.100.17 (192.168.100.17) from 192.168.98.82 : 56(84)
bytes of data.
64 bytes from 192.168.100.17: icmp_seq=0 ttl=251 time=39.568 msec
64 bytes from 192.168.100.17: icmp_seq=1 ttl=251 time=38.529 msec
64 bytes from 192.168.100.17: icmp_seq=2 ttl=251 time=38.214 msec
64 bytes from 192.168.100.17: icmp_seq=3 ttl=251 time=38.173 msec
64 bytes from 192.168.100.17: icmp_seq=4 ttl=251 time=38.652 msec
FP303 Computer Network

64 bytes from 192.168.100.17: icmp_seq=5 ttl=251 time=38.278 msec


64 bytes from 192.168.100.17: icmp_seq=6 ttl=251 time=38.472 msec
64 bytes from 192.168.100.17: icmp_seq=7 ttl=251 time=38.481 msec
64 bytes from 192.168.100.17: icmp_seq=8 ttl=251 time=38.248 msec
64 bytes from 192.168.100.17: icmp_seq=9 ttl=251 time=38.188 msec

--- 192.168.100.17 ping statistics ---


10 packets transmitted, 10 packets received, 0% packet loss
round-trip min/avg/max/mdev = 38.173/38.480/39.568/0.423 ms

Activity 8C
Activity Outcome: Trace The Internet Connectivity By Using Traceroute

Procedure:
A practical application is depicted in the figure below. The numbered output lines
give the TTL value, the name and IP address of the host or the router and the
round-trip time for the three datagrams that are sent. The next figure shows that
the path obtained exists.

Traceroute to wi3x46.informatik.uni-wuerzburg.de (132.187.106.46), 64 hops max, 40 byte packets


1 19.10.10.254 (19.10.10.254) 0.248ms 0.254ms 0.254ms
2 19.8.240.1 (19.8.240.1) 0.562ms 0.599ms 0.598ms
3 19.8.1.1 (19.8.1.1) 0.96ms 0.98ms 1ms
4 wi34x46.informatik.uni-wuerzburg.de (132.187.106.46) 1.2ms 1.3ms 1.3ms

Switch wi3k0

Linux
Switch Firewall Switch

19.8.1.1
Hestia132.187.106.46 Zeus

19.10.10.254
19.8.240.1

Ull 19.10.10.10
FP303 Computer Network

LAB 9: Setup A Wireless Connection


Duration : 2 Hours

Learning Outcomes
This Lab sheet encompasses activities 8A.

By the end of this laboratory session, you should be able to:


1. Configure basic functionality on an access point using the GUI interface;
2. Configure the wireless Access Point portion of a multifunction device to allow access to a
wireless clients;
3. Configure a wireless client to connect to the configured Access Point to verify the
connectivity;
4. Configure the wireless Access Point portion of a multi-function device using security best
practice.
Hardware/ Software Computer trainer, Switch, Wireless Access Point

Activity 9A
Activity Outcome: Setup a wireless connection

Procedure:

USB Linksys
Wireless B
1. The lecturer will setup thePoint
Access DSL Router
network as below and demonstrate the configuring
procedure. Make sure that you ask questions if you are not sure.
FP303 Computer Network
FP303 Computer Network

LAB 10: Troubleshoot A Network


Problem
Duration : 2 Hours

Learning Outcomes
This Lab sheet encompasses activities 10A, 10B & 10C.

By the end of this laboratory session, you should be able to:


1. Perform troubleshooting using ipconfig command to examine IP configuration information
on a host;
2. Perform troubleshooting using ping command to examine end-to-end connectivity between
host;
3. Perform Troubleshoot using Tracert to verify end-to-end connectivity;
4. Perform troubleshooting using Netstat to examine the open connection on a host;
5. Perform troubleshooting using Nslookup to determine DNS server performance.
Hardware/ Software Packet Tracer Software, Packet Tracer Activity Lab10a.pka, Lab10b.pka,
Lab10c.pka

Activity 10A
Activity Outcome: Using The Ipconfig Command To Identify A Incorrect Configuration On A Pc

Procedure:

Scenario:

A small business owner cannot connect to the Internet with one of the four PCs in the
office. All of the PCs are configured with static IP addressing. Use the ipconfig /all
command to identify which PC is incorrectly configured.

Step 1: Verify configurations

a. Access the Command Prompt on each PC and type the command ipconfig /all.
b. Examine the IP address, subnet mask, and default gateway configuration for each
PC.

*Be sure to record this IP configuration for each PC to help identify any PCs that are
incorrectly configured.
FP303 Computer Network

Step 2: Correct any misconfigurations

a. Select the PC that is incorrectly configured and access the Config tab.
b. Click the Desktop tab > IP Configuration tab to correct the misconfiguration.
c. Click the Check Results button at the bottom of this instruction window to check
your work.

Activity 10B
Activity Outcome: Using The Ping Command To Identify An Incorrect Configuration On A PC.

Procedure:

Scenario:

A small business owner learns that the user of PC2 is unable to access a website. All
PCs are configured with static IP addressing. Use the ping command to identify the
issue.

Step 1: Verify connectivity

a. Access the Desktop tab > Web Browser of each PC and type the URL
ciscolearn.more.com. Identify any PCs that are not connecting to the web server.

Which PCs are unable to connect to the web server?

*Note: All of the devices require time to complete the boot process. Please allow
up to one minute before receiving a web response.

Step 2: Ping the web server from PC2

a. On PC2, access the Command Prompt from the Desktop tab.


b. Type ping ciscolearn.more.com.

Did the ping return a reply? What is the IP address displayed in the reply, if any?

Step 3: Ping the web server from PC1

a. On PC1, access the Command Prompt from the Desktop tab.


b. Type ping ciscolearn.more.com.

Did the ping return a reply? What is the IP address returned, if any?
FP303 Computer Network

Step 4: Ping the IP address of the web server from PC2

a. On PC2, access the Command Prompt from the Desktop tab.


b. Attempt to reach the IP address of the web server with the command ping
192.15.2.10.

Did the ping return a reply? If so, then PC2 is able to reach the web server via IP
address, but not domain name. This could indicate a problem with the DNS
server configuration on PC2.

Step 5: Compare the DNS server information on PC2 with other PCs on the local
network.

a. Access the Command Prompt of PC1.


b. Using the command ipconfig /all, examine the DNS server configuration on
PC1.
c. Access the Command Prompt of PC2.
d. Using the command ipconfig /all, examine the DNS server configuration on
PC2.

Do the two configurations match?

Step 6: Make any necessary configuration changes on PC2

a. Using the Config tab of PC2, make any necessary configuration changes.
b. Using the Web Browser within the Desktop tab, connect to
ciscolearn.more.com to verify that the configuration changes resolved the
problem.
c. Click the Check Results button at the bottom of this instruction window to
check your work.

Activity 10C
Activity Outcome: : Identify And Correct Any Misconfiguration Of A Wireless Device

Procedure:

Scenario:

A small business owner learns that a wireless user is unable to access the network. All
of the PCs are configured with static IP addressing. Identify and resolve the issue.
FP303 Computer Network

Step 1: Verify connectivity

a. Access the Desktop > Web Browser of each wireless PC and type
ciscolearn.more.com into the URL. Identify any PCs that are not connecting to
the web server.

Which wireless PCs are unable to connect to the web server?

*Note: All of the devices require time to complete the boot process. Please allow
up to one minute before receiving a web response.

Step 2: Examine the IP configuration of the PCs

a. On the PC that is unable to connect, access the Command Prompt from the
Desktop tab.
b. Type the ipconfig /all command.

What IP addressing information is available?

Step 3: Examine the Wireless Settings on the Wireless Client

a. Access the Config tab of any PC that is unable to connect.


b. Click the Desktop tab > Wireless tab to examine the wireless settings.
c. Record the SSID, Security Configuration, and IP address Configuration.

Step 4: Examine the Wireless Settings on the Linksys Device

a. Access the Linksys GUI.

On the Basic Setup page, examine the DHCP Server Setting configuration. Is
DHCP enabled?

b. Click the Wireless tab.

Examine the setup information under the Wireless tab. What is the SSID? Does it
match the SSID configured on the client?

c. Click the Wireless Security submenu.

Examine the security settings. Is WEP enabled? Does the key match the key
configured on the client?
FP303 Computer Network

Step 5: Make any necessary configuration changes on the Wireless Clients

a. Using the Config tab, make any necessary configuration changes to the
wireless PC.
b. Using the Web Browser within the Desktop tab connect to
ciscolearn.more.com to verify that the configuration changes resolved the
problem.
c. Click the Check Results button at the bottom of this instruction window to
check your work.

Questions:

1. Write the function of the following commands.

Ipconfig
.....................................................................................................................................
.....................................................................................................................................
........
Ping
.....................................................................................................................................
.....................................................................................................................................
........

2. What is the difference between ipconfig and ipconfg /all?


............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................

3. What is the meaning of „Request timed out‟?


............................................................................................................................................
............................................................................................................................................

4. What is the meaning of “Destination host unreachable‟?


FP303 Computer Network

………………………………………………………………………………………………………
………………………………………………………………………………………………………

You might also like