LAB 1: Fjal The Quit: Duration: 2 Hours Learning Outcomes
LAB 1: Fjal The Quit: Duration: 2 Hours Learning Outcomes
Learning Outcomes
This Lab sheet encompasses activities 1A.
Hardware/ Software: UTP CAT 5 Cable,RJ-45 Connectors ,Modular Plug Crimp Tool,
Universal UTP Stripping Tool (Eclipse), Diagonal Cutters ("4 to 6"), LAN Cable Tester
Activity 1A
Activity Outcome: Prepare UTP cable
Procedure:
Step 1: Let's start with simple pin-out diagrams of the two types of UTP Ethernet cables
and watch how committees can make a can of worms out of them. Here are the
diagrams:
Step 2: Cut off the RJ45 connector from one end of the cable and prepare the end for the
new RJ45 connector. Stripping the cable at least 1 inch of the main cable
insulation and then carefully trim the eight internal wires using the factory
assembled end as a guide to the proper length. Just make sure that each wire is
equal length and that the connector cable lock pinches the main cable insulation.
Step 3: Strip one end of the cable with the stripper or a knife and diags. If you are using
the stripper, place the cable in the groove on the blade (left) side of the stripper
FP303 Computer Network
and align the end of the cable with the right side of the stripper. Turn the stripper
about one turn or so. If you turn it much more, you will probably nick the
wires. The idea is to score the outer jacket, but not go all the way through. Once
scored, you should be able to twist the end of the jacket loose and pull it off with
one hand while holding the rest of the cable with the other. If you are using a
knife and diags, carefully slit the cable for about an inch or so and neatly trim
around the circumference of the cable with the diags to remove the jacket.
Step 4: Inspect the wires for nicks. Cut off the end and start over if you see any. You
may have to adjust the blade with the screw at the front stripper.
Step 5: Spread and arrange the pairs roughly in the order of the desired cable end.
Step 6: Untwist the pairs and arrange the wires in the order of the desired cable
end. Flatten the end between your thumb and forefinger. Trim the ends of the
wires so they are even with one another. It is very important that the
unstripped (untwisted) end be slightly less than 1/2" long. If it is longer
than 1/2" it will be out-of-spec and susceptible to crosstalk. If it less than slightly
less than 1/2" it will not be properly clinched when RJ-45 plug is crimped
on.. Flatten again. There should be little or no space between the wires.
Step 7: Hold the RJ-45 plug with the clip facing down or away from you. Push the wire
firmly into the plug. Now, inspect the cable... before crimping and wasting
the plug! Looking through the bottom of the plug, the wire on the far left side
will have a white background. The wires should alternate light and dark from left
to right. The furthest right wire is brown. The wires should all end evenly at the
front of the plug. The jacket should end just about where you see it in the
diagram--right on the line.
Step 8: Hold the wire near the RJ-45 plug with the clip down and firmly push it into the
left side of the front of the crimper (it will only go in one way). Hold the wire in
place squeeze the crimper handles quite firmly. This is what will happen:
Figure 5.1
Step 9: (Crimp it once.) The crimper pushes two plungers down on the RJ-45 plug. One
forces what amounts to a cleverly designed plastic plug/wedge onto the cable
jacket and very firmly clinches it. The other seats the "pins," each with two teeth
FP303 Computer Network
at its end, through the insulation and into the conductors of their respective
wires.
Step 10: Test the crimp, if done properly an average person will not be able to pull the
plug off the cable with his or her bare hands. But, don't pull that hard on the
plug. It could stretch the cable and change its characteristics. Look at the side
of the plug and see if it looks like the diagram and give it a fairly firm tug to make
sure it is crimped well.
Step 11: Prepare the other end of the cable so it has the desired end and crimp.
Step 12: If both ends of the cable are within reach, hold them next to each other and with
RJ-45 clips facing away. Look through the bottom of the plugs. If the plugs are
wired correctly, and they are identical, it is a straight-thru cable. If they are wired
correctly and they are different, it is a crossover cable.
Step 13: If you have an operational network, test the cable. Copy some large files.
Step 14: If the cable doesn't work, inspect the ends again and make sure you have the
right cable and that it is plugged into the correct units for the type of cable. Try
power-cycling (cold booting) the involved computers.
Step 15: If you have many straight-thru cables and a crossover cable in your system, you
should consider labeling the crossover cable or using a different colored cable
for the crossover cable so you don't mix them up. You are not recommend
implementing the crossover function, as recommended elsewhere, with two
RJ-45 jacks, appropriately wired back to back, and two straight-thru
cables. This method costs noticeably more, introduces more than the
necessary number of components and connections, increases the complexity
and time of assembly, and decreases reliability.
Cabling Rules
Questions
1. What are the differences between straight-thru cable and cross-over cable?
FP303 Computer Network
Notes:
http://www.cablesplususa.com/rj45-utp-guide.php
Duration : 2 Hours
Learning Outcomes
This Lab sheet encompasses activities 2A, 2B, 2C, 2D, 2E, 2F.
Activity 2A
Activity Outcome: Connecting 2 Computers as Peer to Peer connection
The laboratory are designing simple peer-to-peer network using crossover cable.
Procedure:
a. A network diagram is a map of the logical topology of the network. In the space
below, sketch a simple peer-to-peer network connecting two PCs. Label one PC
with IP address 192.168.1.1 and the other PC with IP address 192.168.1.2. Use
labels to indicate connecting media and any necessary network devices.
b. A simple network like the one you designed can use a hub or switch as a central
connecting device, or the PCs may be directly connected. Which kind of cable is
required for a direct Ethernet connection between the two PCs?
FP303 Computer Network
a. Check the computer name settings for each PC and make adjustments as
necessary. For each PC, select Start and Control Panel. Double-click the
System icon, and then click the Computer Name tab.
Write down the computer name that is displayed following Full computer name:
Figure 2.1
b. Check to see if the two PCs have the same name. If they do, change the name of
one PC by clicking the Change button, typing a new name in the Computer name
field, then clicking OK.
c. Click OK to close the System Properties window.
d. Why is it important that each PC on a network have a unique name?
________________________________________________________________
_______________________________________________________________
________________________________________________________________
a. Use the Ethernet crossover cable provided by the instructor. Plug one end of the
cable into the Ethernet NIC of PC1.
b. Plug the other end of the cable into the Ethernet NIC of PC2. As you insert the
cable, you should hear a click which indicates that the cable connector is properly
inserted into the port.
a. After the Ethernet crossover cable is connected to both PCs, take a close look at
each Ethernet port.
A light (usually green or amber) indicates that physical connectivity has been
established between the two NICs. Try unplugging the cable from one PC then
reconnecting it to verify that the light goes off then back on.
b. Go to the Control Panel, double click the Network Connections icon, and confirm
that the local
area connection is established. The following figure shows an active local area
connection. If physical connectivity problems exist, you will see a red X over the
Local Area Connection icon with the words Network cable unplugged.
Figure 2.2
c. If the Local Area Connection does not indicate that it is connected, troubleshoot
by repeating Steps 3 and 4. You may also want to ask your instructor to confirm
that you are using an Ethernet crossover cable.
a. Configure the logical addresses for the two PCs so that they are able to
communicate using TCP/IP. On one of the PCs, go to the Control Panel, double
click the Network Connections icon, and then right click the connected Local Area
Connection icon. Choose Properties from the pull-down menu.
b. Using the scroll bar in the Local Area Connection Properties window, scroll down
to highlight Internet Protocol (TCP/IP). Click the Properties button.
Figure 2.3
c. Select the Use the following IP address radio button and enter the following
information:
FP303 Computer Network
IP Address 192.168.1.1
Subnet Mask 255.255.255.0
Figure 2.4
d. Click OK, which will close the Internet Protocol (TCP/IP) Properties window.
Click the Close button to exit the Local Area Connection Properties window.
IP Address 192.168.1.2
Subnet Mask 255.255.255.0
NOTE: To test TCP/IP connectivity between the PCs, Windows Firewall must be disabled
temporarily on both PCs. Windows Firewall should be re-enabled after the tests have
been completed.
a. On PC1, on the Windows XP desktop, click Start. From the Start menu, select
Control Panel, and double-click Network Connections.
b. Right-click the Local Area Connection icon and select Properties. Click the
Advanced tab. Locate and click the Settings button.
c. Make a note of whether the firewall settings are ENABLED (ON) for the Ethernet
port or DISABLED (OFF) for the Ethernet port.
________________________________________________________________
________________________________________________________________
d. If the firewall settings are enabled, click the Off (not recommended) radio button
to disable the firewall. The setting will be re-enabled in a later step. Click OK in this
dialog box and the following to apply this setting.
e. Now that the two PCs are physically connected and configured correctly with IP
addresses, we need to make sure they communicate with each other. The ping
command is a simple way to accomplish this task. The ping command is included
with the Windows XP operating system.
f. On PC1, go to Start, then Run. Type cmd, and then click OK. A Windows
command prompt window will appear as shown in the figure below.
g. At the > prompt, type ping 192.168.1.2 and press Enter. A successful ping will
verify the IP connectivity. It should produce results similar to those shown in here.
Figure 2.5
h. Repeat Steps 6a-6c on the second PC. The second PC will ping 192.168.1.1.
i. Close the Windows command prompt window on both PCs.
a. A PC can share its resources with other PCs on the network. PCs with shared
resources should be visible through My Network Places. On PC1, go to Start,
click My Network Places, and then click View workgroup computers in the left
panel.
Figure 2.6
Step 8: (Optional – Use only if the Firewall was originally ENABLED) Re-enable the
firewall
FP303 Computer Network
a. If you disabled the Windows Firewall in Step 6, click Start, select Control Panel,
and open the Network Connections control panel.
b. Right-click the Ethernet network connection icon and select Properties. Click the
Advanced tab. Locate and click Settings.
c. If the firewall settings are disabled (and they were enabled before this lab began),
click the On radio button to enable the firewall. Click OK in this dialog box and the
following one to apply this setting.
Activity 2B
Activity Outcome: Connecting More Than 2 Computers as Peer To Peer Connection
Using A Switch.
Procedure:
If you want to connect more than two computers, you need a "straight-through"
Ethernet cable. When constructing a network, you need to use straight through Ethernet
cables. You should follow your operating system's directions for proper configuration
instructions. You can share files and a printer, and if you have, Internet Connection
Sharing set up, your Internet connection as well.
Activity 2C
Activity Outcome: Connecting More Than 2 or More Computers as Peer To Peer
Connection Using Two Switches
Procedure:
If you want to connect more than two computers, you need a "straight-through" Ethernet
cable. When constructing a network, you need to use straight through Ethernet cables.
However to connect two Switches you need to use a "crossover cable" (or "twisted
pair"). Nevertheless, if your Switches have a MDI or MDI-X then you can use either a
"straight-through" or "crossover cable" (or "twisted pair"). You should follow your
operating system's directions for proper configuration instructions. You can share files
and a printer, and if you have, Internet Connection Sharing set up, your Internet
connection as well.
Activity 2D
Activity Outcome: Working With One Workgroup
FP303 Computer Network
Procedure:
You will need to go to the System Properties Dialog Box. There are two ways to do this.
The first way is to go to the Control Panel and click on the System icon. The other way
is to press the Windows Key and Pause/Break Key together. There click on the
Computer Name and change all workgroup names to WORKGROUP.
Now go to the network properties, look, and see what has happen. What do you see?
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
Activity 2E
Activity Outcome: Working With More Than One Workgroup
Procedure:
You will need to go to the System Properties Dialog Box and change the name of the
Workgroups. Two groups use the name WORKGROUP 1. Two groups use the name
WORKGROUP 2. Two groups use the name WORKGROUP 3. Two groups use the
name WORKGROUP 4.
Activity 2F
Procedure:
Step 1: First, connect the printer to your network by connecting one end of a Cat 5 cable .
Step 2: Next you’ll need to get the IP address of your printer. The IP address is what will tell
your computer where to find your printer on the network. All network printers allow you
to print a configuration sheet which will list basic information about the printer along
with the current network configuration.
For most printers, this involves pressing the Menu button on the printer, going to the
Information option and choosing Print Configuration. You will be looking for the
TCP/IP section:
FP303 Computer Network
Figure 2.7
Step 3: The last step is to add the printer to your computer. Click on Start, then Printers and
Faxes.
If you don’t see this in your Start Menu, you can go to Start, Control Panel and then click on
Printers and Faxes there. Click Add Printer from the task pane on the left.
Step 4: The Add Printer wizard will begin, so click Next to get started. On the next screen you’ll
be asked whether your printer is a local printer or a network printer. These options are
confusing because a network printer is actually referring either a printer connected to
another computer or a printer on a print server. Our printer is a stand-alone printer and
so you must select Local printer attached to this computer and make sure that you
uncheck the box for automatically detecting the printer.
Figure 2.8
Step 5: Click Next and you’ll be asked to select the printer port. Since our printer is a network
printer with a IP address, we need to select the Create a new port option and choose
Standard TCP/IP Port.
FP303 Computer Network
Figure 2.9
Step 6: Click next and you’ll get another wizard to add a TCP/IP printer port. On the main
wizard screen click next. In the first text box, Printer Name or IP Address, enter the IP
address from the printer configuration sheet you printer earlier.
Figure 2.10
Step 7: Click next and depending on the printer you have, you may get one more dialog before
the end of the wizard. If the network card for the printer cannot be identified, the wizard
will ask you to choose the card type. You can leave the default of “Generic Network
Card” and click next.
FP303 Computer Network
Figure 2.11
Step 8: Click next and click Finish. You will then continue on with the Add Printer wizard and
you’ll need to either choose the printer from the list of manufacturers or click Have Disk
and insert your printer driver cd in the computer.
Figure 2.12
Step 9: Click next and enter a name for your printer and click the Yes radio button if you would
like the printer to be your default printer.
FP303 Computer Network
Figure 2.13
Step 10: Click Next and you’ll be asked whether you want to share the printer or not. Click No
because anyone else who wants to connect will be able to do so following the same
steps.
Figure 2.14
Click next and click Yes to print a test page and make sure that the computer and printer can
communicate.
FP303 Computer Network
Figure 2.15
Questions :
………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
4. In a peer-to-peer network how can you keep, one user from accessing shared files
intended for another user.
…………………………………………………………………………………………………
…………………………………………………………………………………………………
5. How can you tell if a drive is shared simply by looking at its icon?
…………………………………………………………………………………………………
…………………………………………………………………………………………………
Learning Outcomes
This Lab sheet encompasses activities 3A.
Activity 3A
Activity Outcome: Analyze an identify the network protocols
Procedure:
Step 1: Run the Wireshark program. Click the icon as shown below:
Figure 3.1
When you select "Interfaces..." from the Capture menu, Wireshark pops up the "Capture
Interfaces dialog box as shown below. Click the Start button for Integrated Fast
Ethernet.
Figure 3.2
Capture for a few minutes and stop by pressing the accelerator keys: Ctrl+E or clicking
the icon.
FP303 Computer Network
Figure 3.3
Step 4: Filtering packets.
To select packets based on protocol type, simply type the protocol in which you are
interested in the Filter: field in the filter toolbar of the Wireshark window and press enter
to initiate the filter. The following figure shows an example of what happens when you
type tcp in the filter field.
FP303 Computer Network
Figure 3.4
Note!
All protocol and field names are entered in lowercase. Also, don't forget to press enter
after entering the filter expression.
Questions:
1. Analyze and identify the protocols and its function in the list.
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
Learning Outcomes
This Lab sheet encompasses activities 4A.
Activity 4A
Activity Outcome: Observe traffic between a client and a web server
Procedure:
Enter Simulation mode by clicking the Simulation tab in the lower right-hand corner.
The Simulation tab is located behind the Realtime tab and has a stopwatch symbol.
Figure 4.1
From the Simulation Panel, select Edit Filters and check only the boxes for TCP and
HTTP.
Figure 4.2
Add a Complex PDU by clicking the open envelope located above the Simulation mode
icon.
FP303 Computer Network
Figure 4.3
Specify the Complex PDU settings by changing the following within the Create
Complex PDU window: Under PDU Settings > Select Application should be set to
HTTP. Click the ciscolearn.web.com server to specify it as the destination device.
For the Source Port type 1000. Under Simulation Settings select Periodic Interval and
type 120 seconds. Create the PDU by clicking the box Create PDU in the Create
Complex PDU window.
Figure 4.4
Double click the Simulation Panel to unlock it from the PT window. This allows you to move
the Simulation Panel to view the entire network topology.
Observe the traffic flow by clicking the Auto Capture / Play button in the Simulation
Panel. Speed up the animation by using the play control slider.
FP303 Computer Network
Figure 4.5
*When the Buffer Full window appears, close the window with the x.
Figure 4.6
Step 2: View the header information of the packets that traveled across the network.
FP303 Computer Network
Examine the headers of the packets sent between the clients and server. In the
Simulation Panel, click any one of the lines in the Event List. This displays an
envelope in the work area that represents that line.
Click the envelope in the work area window to view the packet and header
information.
Figure 4.7
The OSI Model window displays within which layer of the OSI model the packet is being
processed.
*Notice that depending on the device that received the packet, the higher or lower the
layer included. A switch will only display the packet to Layer 2. Whereas, the PC or
Server will display the packet up to Layer 4.
3. State the type of encapsulated data for Layer 1, Layer 2, Layer 3 and Layer 4.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
orkstation.
3. Assign IP address manually by modifying client workstation’s TCP/IP properties.
4. Use the ping command, a browser and nslookup to identify the relationship
between domain names and IP addresses
Activity 5A
………………
…………………………………………………………………………………………
Activity 5C
Activity Outcome: use the ping command, a browser and nslookup to identify the
relationship between domain names and IP addresses
Procedure:
Step 3: Let try some of the switches to see how they work. Type:
Ping –t 127.0.0.1 and press enter .the –t switch causes the Ping command to
continue pinging until you stop it. Type Ctrl-C.
Step 4: While the –t switch allows you to ping indefinitely, the normal default for the
number of the pings is four. But this can be changed with the –n switch .Type:
Ping –n 7 127.0.0.1 and press Enter. What are the results?
……………………………………………………………………………………………
……………………………………………………………………………………………
Step 5: The default setting for the length of the packets transmitted is 32 bytes .But this
also can be changed by using the –l (for length) switch. Example Ping –l 1000
127.0.0.1 and press Enter. As you can see, the packet length of the packet is
now ……………………..
FP303 Computer Network
Step 6: Ping can also be used to resolve IP address to host names. The –a switch is
used for this purpose. Example Ping –a 17.254.0.50 and press Enter
Questions:
……………………………………………………………………………………….
……………………………………………………………………………………..
FP303 Computer Network
Learning Outcomes
This Lab sheet encompasses activities 6A, 6B & 6C.
Hardware/ Software Simple network connection, Windows 2000 Professional, UTP Category 5
Straight/Cross Cable
Activity 6A
Activity Outcome: Installing DNS
Procedure:
You can install a DNS server from the Control Panel or when promoting a member
server to a domain controller (DC). During the promotion, if a DNS server is not
found, you will have the option of installing it.
To install a DNS server from the Control Panel, follow these steps:
1. From the Start menu, select Settings | Control Panel | Add/Remove Programs.
FP303 Computer Network
Procedure:
After installing DNS, you can find the DNS console from Start | Programs |
Administrative Tools | DNS. Windows 2003 provides a wizard to help configure
your DNS.
When configuring your DNS server, you must be familiar with the following
concepts:
a) Forward lookup zone
b) Reverse lookup zone
c) Zone types
When selecting a DNS zone type, you have the following options: Active Directory
(AD) Integrated, Standard Primary, and Standard Secondary. AD Integrated stores
the database information in AD and allows for secure updates to the database file.
FP303 Computer Network
This option will appear only if AD is configured. If it is configured and you select
this option, AD will store and replicate your zone files.
A Standard Primary zone stores the database in a text file. This text file can be
shared with other DNS servers that store their information in a text file. Finally, a
Standard Secondary zone simply creates a copy of the existing database from
another DNS server. This is primarily used for load balancing.
Activity 6C
Activity Outcome: Configuration DHCP
Procedure:
1. Open to "Manage Your Server" wizard, select the DHCP server option for the list
of server roles and press NEXT. You will be asked to enter the name and
description of your scope.
FP303 Computer Network
(It will ask you to define the range of addresses that the scope will distribute across
the network and the subnet mask for the IP address.)
3. Add any exclusion to the range of IP addresses you specified in the previous
window.
FP303 Computer Network
4. Set the lease duration for how long a client can use an IP address assigned to it
from this scope. It is recommended to add longer leases for a fixed network (in the
office for example) and shorter leases for remote connections or laptop computers.
5. Make a choice to configure the DHCP options for the scope now or later.
6. Click NEXT, the router, or gateway, IP address may be entered in next. The client
computers will then know which router to use
FP303 Computer Network
7. Setting the DNS and domain name. The DNS server IP address will be distributed
by the DHCP server and given to the client.
8. Activate the scope - just press NEXT when you see the window below. The DHCP
server will not work unless you do this.
FP303 Computer Network
The address pool displays a list of IP ranges assigned for distribution and IP
address exclusions. You are able to add exclusion by right clicking the address
pool text on the left hand side of the mmc window and selecting "new exclusion
range".
FP303 Computer Network
DHCP servers permit you to reserve an IP address for a client. This means that
the specific network client will have the same IP for as long as you wanted it to.
To do this you will have to know the physical address (MAC) of each network
card. Enter the reservation name, desired IP address, MAC address and
description - choose whether you want to support DHCP or BOOTP and press
add. The new reservation will be added to the list.
FP303 Computer Network
If you right click scope options and press "configure options" you will be taken
to a window in which you can configure more servers and their parameters.
These settings will be distributed by the DHCP server along with the IP address.
Server options act as a default for all the scopes in the DHCP server. However,
scope options take preference over server options.
FP303 Computer Network
Questions:
a. Domain Namespace
………………………………………………………………………………………………
………………………………………………………………………………………………
……………………………………………………………………………………………..
b. DNS Zones
………………………………………………………………………………………………
………………………………………………………………………………………………
……………………………………………………………………………………………..
c. Name Servers
………………………………………………………………………………………………
………………………………………………………………………………………………
……………………………………………………………………………………………..
2. What is a difference between a forward lookup query and a reverse lookup query?
………………………………………………………………………………………………
………………………………………………………………………………………………
……………………………………………………………………………………………..
Learning Outcomes
This Lab sheet encompasses activities 7A, 7B & 7C.
Activity 7A
Activity Outcome: Create a domain user account
Procedure:
1. Run Active Directory Users and Computers from Start Menu | Programs |
Administrative Tools | Active Directory Users and Computers.
2. In the Active Directory Users and Computers console, click the Action | New |
User menu.
FP303 Computer Network
3. In the New Object - User dialog box, specify First name, Last name, Initials, and
User logon name, and click the Next button. There is no need to specify Full
name, as the Full Name field is automatically filled on the basis of the first name,
last name, and initials that are provided by the user.
FP303 Computer Network
4. In the next dialog box, specify a password in the Password and Confirm
password fields. Specify other settings by selecting the appropriate check boxes,
and click the Next button.
FP303 Computer Network
Activity 7B
Activity Outcome: Create a Shared Folder to Store Roaming User Profiles
Procedure:
Before you configure a user account to use a roaming user profile, you must
create a shared folder on a Windows 2003 Server computer in the domain to
store the roaming user profiles. This shared folder is often located on a domain
controller, but it can also be located on any Windows 2003 Server computer in
the domain.
For example, if you want to store the user's roaming profile in a folder that has
the same name as the user account in a shared folder that is named "Profiles"
on a server that is named "Server1," type the following path:
\\Server1\Profiles\%username%
4. Click OK, and then quit Active Directory Users and Computers.
Activity 7B
Activity Outcome: Apply disk quota limit
Procedure:
2. In Windows Explorer, right-click the (D:) drive (example) in the Folders section,
and click Properties.
FP303 Computer Network
3. In the <drivename> Properties dialog box, click the Quota tab. On the Quota tab
page, select the Enable quota management check box, and specify the disk space
limit and warning level. Click the Apply button, and click the OK button.
FP303 Computer Network
Learning Outcomes
This Lab sheet encompasses activities 8A, 8B & 8C
Activity 8A
Activity Outcome: Using Ping To Test Reach Ability
Procedure:
Activity 8B
Activity Outcome: Using Ping To Specify Number OfPackets To Send
Procedure:
[root@morgan]# ping -c 10 -n 192.168.100.17
PING 192.168.100.17 (192.168.100.17) from 192.168.98.82 : 56(84)
bytes of data.
64 bytes from 192.168.100.17: icmp_seq=0 ttl=251 time=39.568 msec
64 bytes from 192.168.100.17: icmp_seq=1 ttl=251 time=38.529 msec
64 bytes from 192.168.100.17: icmp_seq=2 ttl=251 time=38.214 msec
64 bytes from 192.168.100.17: icmp_seq=3 ttl=251 time=38.173 msec
64 bytes from 192.168.100.17: icmp_seq=4 ttl=251 time=38.652 msec
FP303 Computer Network
Activity 8C
Activity Outcome: Trace The Internet Connectivity By Using Traceroute
Procedure:
A practical application is depicted in the figure below. The numbered output lines
give the TTL value, the name and IP address of the host or the router and the
round-trip time for the three datagrams that are sent. The next figure shows that
the path obtained exists.
Switch wi3k0
Linux
Switch Firewall Switch
19.8.1.1
Hestia132.187.106.46 Zeus
19.10.10.254
19.8.240.1
Ull 19.10.10.10
FP303 Computer Network
Learning Outcomes
This Lab sheet encompasses activities 8A.
Activity 9A
Activity Outcome: Setup a wireless connection
Procedure:
USB Linksys
Wireless B
1. The lecturer will setup thePoint
Access DSL Router
network as below and demonstrate the configuring
procedure. Make sure that you ask questions if you are not sure.
FP303 Computer Network
FP303 Computer Network
Learning Outcomes
This Lab sheet encompasses activities 10A, 10B & 10C.
Activity 10A
Activity Outcome: Using The Ipconfig Command To Identify A Incorrect Configuration On A Pc
Procedure:
Scenario:
A small business owner cannot connect to the Internet with one of the four PCs in the
office. All of the PCs are configured with static IP addressing. Use the ipconfig /all
command to identify which PC is incorrectly configured.
a. Access the Command Prompt on each PC and type the command ipconfig /all.
b. Examine the IP address, subnet mask, and default gateway configuration for each
PC.
*Be sure to record this IP configuration for each PC to help identify any PCs that are
incorrectly configured.
FP303 Computer Network
a. Select the PC that is incorrectly configured and access the Config tab.
b. Click the Desktop tab > IP Configuration tab to correct the misconfiguration.
c. Click the Check Results button at the bottom of this instruction window to check
your work.
Activity 10B
Activity Outcome: Using The Ping Command To Identify An Incorrect Configuration On A PC.
Procedure:
Scenario:
A small business owner learns that the user of PC2 is unable to access a website. All
PCs are configured with static IP addressing. Use the ping command to identify the
issue.
a. Access the Desktop tab > Web Browser of each PC and type the URL
ciscolearn.more.com. Identify any PCs that are not connecting to the web server.
*Note: All of the devices require time to complete the boot process. Please allow
up to one minute before receiving a web response.
Did the ping return a reply? What is the IP address displayed in the reply, if any?
Did the ping return a reply? What is the IP address returned, if any?
FP303 Computer Network
Did the ping return a reply? If so, then PC2 is able to reach the web server via IP
address, but not domain name. This could indicate a problem with the DNS
server configuration on PC2.
Step 5: Compare the DNS server information on PC2 with other PCs on the local
network.
a. Using the Config tab of PC2, make any necessary configuration changes.
b. Using the Web Browser within the Desktop tab, connect to
ciscolearn.more.com to verify that the configuration changes resolved the
problem.
c. Click the Check Results button at the bottom of this instruction window to
check your work.
Activity 10C
Activity Outcome: : Identify And Correct Any Misconfiguration Of A Wireless Device
Procedure:
Scenario:
A small business owner learns that a wireless user is unable to access the network. All
of the PCs are configured with static IP addressing. Identify and resolve the issue.
FP303 Computer Network
a. Access the Desktop > Web Browser of each wireless PC and type
ciscolearn.more.com into the URL. Identify any PCs that are not connecting to
the web server.
*Note: All of the devices require time to complete the boot process. Please allow
up to one minute before receiving a web response.
a. On the PC that is unable to connect, access the Command Prompt from the
Desktop tab.
b. Type the ipconfig /all command.
On the Basic Setup page, examine the DHCP Server Setting configuration. Is
DHCP enabled?
Examine the setup information under the Wireless tab. What is the SSID? Does it
match the SSID configured on the client?
Examine the security settings. Is WEP enabled? Does the key match the key
configured on the client?
FP303 Computer Network
a. Using the Config tab, make any necessary configuration changes to the
wireless PC.
b. Using the Web Browser within the Desktop tab connect to
ciscolearn.more.com to verify that the configuration changes resolved the
problem.
c. Click the Check Results button at the bottom of this instruction window to
check your work.
Questions:
Ipconfig
.....................................................................................................................................
.....................................................................................................................................
........
Ping
.....................................................................................................................................
.....................................................................................................................................
........
………………………………………………………………………………………………………
………………………………………………………………………………………………………