0% found this document useful (0 votes)
23 views

Data Comm Lab Manual v.5

This document is a laboratory manual for a data communications and networks course. It contains 15 experiments on topics such as introduction to computer networking devices, networking commands, network cabling, IP addressing, routing, and router configuration. The manual provides instructions for conducting the experiments and rubrics for evaluating the results. It also contains safety procedures and guidelines for working in the computer laboratory.

Uploaded by

Morty Smith
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

Data Comm Lab Manual v.5

This document is a laboratory manual for a data communications and networks course. It contains 15 experiments on topics such as introduction to computer networking devices, networking commands, network cabling, IP addressing, routing, and router configuration. The manual provides instructions for conducting the experiments and rubrics for evaluating the results. It also contains safety procedures and guidelines for working in the computer laboratory.

Uploaded by

Morty Smith
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 94

Data Communication & Networks

Laboratory Manual
College of Computer Studies

Last Name:________________ First Name:_____________

Student No:__________ Section: _________ Group: ______

Conducted by:
Checked by:
Date:

________________________________________________________________________
Data Communiations & Networks 1
Table of Contents

Computer Laboratory Safety Procedures and Guidelines


Laboratory Experiment #1 Introduction to Computer Network Devices
Laboratory Experiment #2 Computer Networking Basic Commands
Laboratory Experiment #3 Network Cabling
Laboratory Experiment #4 Network Connection and Building a Peer to Peer Network
Laboratory Experiment #5 Workstation ARP
Laboratory Experiment #6 Basic IP Addressing
Laboratory Experiment #7 Network Topology
Laboratory Experiment #8 Class A IP Address Subnetting
Laboratory Experiment #9 Class B IP Address Subnetting
Laboratory Experiment #10 Class C IP Address Subnetting
Laboratory Experiment #11 Classless Inter-Domain Routing
Laboratory Experiment #12 Variable Length Subnet Mask
Laboratory Experiment #13 VLAN and Trunk Protocol Configuration
Laboratory Experiment #14 Basic Router Configuration and Static Route
Laboratory Experiment #15 Configuring RIP on CISCO Router

________________________________________________________________________
Data Communiations & Networks 2
COMPUTER LABORATORY SAFETY PROCEDURES AND
GUIDELINES

Computer Laboratory DO’s and DON’T


Do’s
1. Know the location of the fire extinguisher and the first aid box and
how to use them in case of an emergency
2. Read and understand how to carry out an activity thoroughly
before coming to the laboratory
3. Report fires or accidents to your lecturer/laboratory technician
immediately
4. Report any broken plugs or exposed electrical wires to your
lecturer/laboratory technician immediately

Don’ts
1. Do not eat or drink in the laboratory
2. Avoid stepping on electrical wires or any other computer cables.
3. Do not open the system unit casing or monitor casing, particularly
when the power is turned on. Some internal components hold
electric voltages of up to 30000 volts, which can be fatal.
4. Do not insert metal objects such as clips, pins and needles into the
computer casings. They may cause fire.
5. Do not remove anything from the computer laboratory without
permission.
6. Do not touch, connect or disconnect any plug or cable without your
lecturer/laboratory technician’s permission.
7. Do not misbehave in the computer laboratory.

Computer Lab Safety Rules for Protecting Equipment


1. Do not bring any food or drinks near the machine.
2. Turn off the machine once you are done using it.
3. Do not plug in external devices without scanning them for
computer viruses
4. Ensure that the temperature in the room stays cool, since there
are a lot of machines in a laboratory as these can overheat easily.
This is one of many ways of ensuring computer safety.
5. Try not to touch any of the circuit boards and power sockets when
a device is connected to them and switched on.
6. Always maintain an extra copy of all your important data files.

________________________________________________________________________
Data Communiations & Networks 3
General Safety Guidelines to be followed at all times
1. All users of the laboratory are to follow the directions of
Academic/Laboratory technician staff member.
2. Food or drinks are not permitted at any time in the laboratory.
3. Students should not attempt to repair, open, tamper or interfere
with any of the computer, printing,cabling, air conditioning or other
equipment in the laboratory.
4. Students should be aware of office ergonomic guidelines for
correct posture when using computer equipment.
5. Please treat fellow users of the laboratory, and all equipment
within the laboratory, with the appropriate level of care and
respect.

In case of an emergency or incident in the laboratory


1. Keep calm.
2. Tell someone about it: the nearest staff member, a fellow student,
student assistants, others in the area.
3. Leave the building if the type of emergency warrants it, or if
directed by faculty/security/laboratory wardens. Do so by the
nearest safe exit. Do not use lifts in case of fire. Follow the
directions of the laboratory marshals, faculty, and/or security.
4. Do not re-enter evacuated buildings until the “all clear” is given by
an authorized person
5. Some emergency situations such as criminal activity may not
require you to leave the building. In all emergency situations keep
calm and think about the appropriate response.

________________________________________________________________________
Data Communiations & Networks 4
Experiment #1
Title: Introduction to Networking Equipment

Objective

• To become familiar with Network Terminologies


• To become familiar with Network Devices
• To become familiar with OSI Model

TASK 1: Identify the Network Devices

Fig 1.1 Basic Networking Devices

________________________________________________________________________
Data Communiations & Networks 5
TASK 2: Check off all true statements regarding the benefits of OSI Model

TASK 3: Complete the Encapsulation Flow Chart

________________________________________________________________________
Data Communiations & Networks 6
TASK 4: Write each statement to its corresponding Layer

________________________________________________________________________
Data Communiations & Networks 7
Rubrics for Laboratory
Unsatisfactory Amateur Exceptional
Criteria Score
1 2 3
One of the
Two or more
previous All required
conditions and
conditions and laboratory
Procedure instructions is
instruction is not instructions are done
not met
met and present.
satisfactorily
satisfactorily.
Results are
present, though
Results are Results and data are
too disorganized
Required Result present, but clearly recorded and
or poorly
unclear. organized.
recorded to
make sense
The data and
Analysis is
observations are
somewhat
Analysis is poor, analyzed accurately,
lacking in
not enough data trends are noted and
Analysis insight not
inaccurate explained, enough
enough data was
analysis data was taken to
gathered or
establish
established.
conclusively.
The conclusion One of the The conclusion
does not much conditions is not follows data without
Conclusion
laboratory result met wild guesses or leaps
presented. satisfactorily of logic.
Other:
Total Score

Rating = (total_score/12) * 100

Lab performed on (date): ___________ Signature: ______________

Checked by: ________________________ Date: ______________

Marks Awarded: ____________

Comments:

________________________________________________________________________
Data Communiations & Networks 8
Experiment #2
Networking Basics Commands

PC Network TCP/IP Configuration

Objective

• Gather information, including connection, host name, Layer 2 MAC address and
Layer 3 TCP/IP network address information.
• Compare network information to other PCs on the network.
• Learn to use the TCP/IP Packet Internet Groper (ping) command from a workstation.
• Learn to use the Trace Route (tracert) command from a workstation.
• Observe name resolution occurrences using WINS and/or DNS servers.

Background

This lab assumes the use of any version of Windows. This is a non-destructive lab and can
be done on any machine without concern about changing the system configuration. Ideally,
this lab is performed in a Computer Lab or other LAN environment that connects to the
Internet.
This lab can be done from a single remote connection via a Dial up modem or DSL-type
connection.
In the following Lab Manual the lab runs only on Windows NT/2000/XP systems. Extra
Steps should be done on Windows 95/98/ME systems.

Task 1: Using different commands to identify computer network information

Step 1. Connect into the Internet


Establish and verify connectivity to the Internet. This ensures the computer has an IP
address.

Step 2. Gather TCP/IP configuration information


Use the Start menu to open the Command Prompt, an MS-DOS-like window. Press Start >

Programs > Accessories > Command Prompt


OR
Start > Programs > Command Prompt.
OR
Press Start>Run Then type cmd.
The following figure shows the Command screen. Type ipconfig and press the Enter key.
The spelling of ipconfig is critical while case is not. It is short for IP Configuration.

________________________________________________________________________
Data Communiations & Networks 9
Fig 2.1 ipconfig on Command Prompt

This first screen shows the IP address, subnet mask, and default gateway. The IP address
and the default gateway should be in the same network or subnet, otherwise this host would
not be able to communicate outside the network. In the figure the subnet mask tells us that
the first three octets must be the same to be in the same network.

Note: If this computer is on a LAN, the default gateway might not be seen if it is running
behind a Proxy Server. Record the following information for this computer.

Step 3. Record the following TCP/IP information for this computer


IP address:___________________________________________________________
Subnet Mask: _________________________________________________________
Default Gateway: _______________________________________________________

Step 4. Compare the TCP/IP configuration of this computer to others on the LAN
If this computer is on a LAN, compare the information of several machines.
Are there any similarities?____________________________________________________
What is similar about the IP addresses?_________________________________________
What is similar about the default gateways? ______________________________________

The IP addresses should share the same network portion. All machines in the LAN should
share the same default gateway.
Record a couple of the IP Addresses:___________________________________________

Step 5 Check additional TCP/IP configuration information


To see detailed information, type ipconfig /all and press Enter. The figure shows the
detailed IP configuration screen.

________________________________________________________________________
Data Communiations & Networks 10
Fig 2.2 ipconfig/all on Command Prompt

The host name, including the computer name and NetBIOS name should be displayed.
Also, the DHCP server address, if used, and the date the IP lease starts and ends should be
displayed. Look over the information. Entries for the DNS, used in name resolution servers,
may also be present.
The previous figure reveals that the router is performing both DHCP and DNS services for
this network. This would likely be a small office or home office (SOHO) or small branch
office implementation.
Notice the Physical Address (MAC) and the NIC model (Description).

In the LAN, what similarities about the Physical (MAC) Addresses are seen?
_________________________________________________________________________

While not a requirement, most LAN administrators try to standardize components like NICs.
Therefore, it would not be surprising to find all machines share the first three Hex pairs in
the adapter address. These three pairs identify the manufacturer of the adapter.

Write down the IP addresses of any servers listed:


_________________________________________________________________________

Write down the computer Host Name:


_________________________________________________________________________

Write down the Host Names of a couple other computers:


_________________________________________________________________________

Step 6 Close the screen


Close the screen when finished examining network settings. Repeat the previous steps as
necessary. Make sure that it is possible to return to and interpret this screen.

________________________________________________________________________
Data Communiations & Networks 11
Task 2: Using “ping” and “tracert “

Objective

• Learn to use the TCP/IP Packet Internet Groper (ping) command.


• Learn to use the Trace Route (tracert) command.
• Observe name resolution occurrences using WINS and/or DNS servers.

Background

This lab assumes the use of any version of Windows. This is a non-destructive lab and can
be done on any machine without concern of changing the system configuration. Ideally, this
lab is performed in a LAN environment that connects to the Internet. It can be done from a
single remote connection via a modem or DSL-type connection. The student will need the IP
addresses that were recorded in the previous part of the lab.

Step 1. Establish and verify connectivity to the Internet

This ensures the computer has an IP address.

Step 2. Access the command prompt

As accessed in previous part of the lab.

Step 3. ping the IP address of another computer

In the window, type ping, a space, and the IP address of a computer recorded in the
previous lab.

The following figure shows the successful results of ping to this IP address.

Fig 2.3 ping by ip adress on Command Prompt

________________________________________________________________________
Data Communiations & Networks 12
ping uses the ICMP echo reply feature to test physical connectivity. Since ping reports on
four attempts, it gives an indication of the reliability of the connection. Look over the results
and verify that the ping was successful. Is the ping successful?

Step 4. ping the IP address of the default gateway


Try to ping the IP address of the default gateway if one was listed in the last exercise. If the
ping is successful, it means there is physical connectivity to the router on the local network
and probably the rest of the world.

Step 5. ping the IP address of a DHCP or DNS servers


Try to ping the IP address of any DHCP and/or DNS servers listed in the last exercise.
________________________________________________________________________
Was the ping successful? ____________________

Step 6. ping the Loopback IP address of this computer


Type the following command: ping 127.0.0.1
The 127.0.0.0 network is reserved for loopback testing. If the ping is successful, then
TCP/IP isproperly installed and functioning on this computer.

Was the ping successful? ____________________

Step 7. ping the hostname of another computer

Try to ping the hostname of the computer that was recorded in the previous lab. The figure
shows the successful result of the ping the hostname.

Fig 2.4 ping by host name on Command Prompt

Look over the results. Notice that the first line of output shows the host name, m450
in the example, followed by the IP address. This means the computer was able to resolve
the host name to an IP address. Without name resolution, the ping would have failed
because TCP/IP only understands valid IP addresses, not names.

________________________________________________________________________
Data Communiations & Networks 13
If the ping was successful, it means that connectivity and discovery of IP addresses can be
done with only a hostname. In fact, this is how many early networks communicated. If
successful, then ping a hostname also shows that there is probably a WINS server working
on the network.

Note: It would not be uncommon for a Windows 2000 or XP networks to not support this
feature. It is an old technology and often unnecessary. If the last ping worked, try to ping
the hostname of any another computer on the local network. The following figure shows the
possible results.

Note: The name had to be typed in quotes because the command language did not like the
space in the name.

Fig 2.5 ping by host name with spacing on Command Prompt

Step 8. ping the Cisco web site

Type the following command: ping www.cisco.com

Fig 2.6 ping by web address on Command Prompt


________________________________________________________________________
Data Communiations & Networks 14
The first output line shows the Fully Qualified Domain Name (FQDN) followed by the IP
address. A Domain Name Service (DNS) server somewhere in the network was able to
resolve the name to an IP address. DNS servers resolve domain names, not hostnames, to
IP addresses. Without this name resolution, the ping would have failed because TCP/IP
only understands valid IP addresses. It would not be possible to use the web browser
without this name resolution. With DNS, connectivity to computers on the Internet can be
verified using a familiar web address, or domain name, without having to know the actual IP
address. If the nearest DNS server does not know the IP address, the server asks a DNS
server higher in the Internet structure.

Step 9. ping the Microsoft web site

a. Type the following command: ping www.microsoft.com

Fig 2.7 ping failure for Microsoft because some Microsoft routers are configured to
ignore ping

Notice that the DNS server was able to resolve the name to an IP address, but there is no
response. Some Microsoft routers are configured to ignore ping requests. This is a
frequently implemented security measure.

ping some other domain names and record the results. For example, ping www.msn.de

Step 10. Trace the route to the Cisco web site

Type tracert www.cisco.com and press Enter.

________________________________________________________________________
Data Communiations & Networks 15
Fig 2.8 tracert website on Command Prompt

tracert is TCP/IP abbreviation for trace route. The preceding figure shows the successful
result when running tracert from Bavaria in Germany. The first output line shows the FQDN
followed by the IP address. Therefore, a DNS server was able to resolve the name to an IP
address. Then there are listings of all routers the tracert requests had to pass through to get
to the destination. tracert uses the same echo requests and replies as the ping command,
but in a slightly different way. Observe that tracert actually contacted each router three
times. Compare the results to determine the consistency of the route. Notice in the above
example, that there were relatively long delays after router 11 and 13, possibly due to
congestion. The main thing is that there seems to be relatively consistent connectivity.
Each router represents a point where one network connects to another network and the
packet was forwarded through.

Step 11. Trace other IP addresses or domain names

Try tracert on other domain names or IP addresses and record the results. An example is
tracert www.hec.gov.pk

Step 12. Trace a local host name or IP address


Try using the tracert command with a local host name or IP address. It should not take long because
the trace does not pass through any routers.

________________________________________________________________________
Data Communiations & Networks 16
Fig 2.9 tracert a nearby Router

________________________________________________________________________
Data Communiations & Networks 17
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.

Other:
Total Score

Rating = (total_score/12) * 100

Lab performed on (date): ___________ Signature: ______________

Checked by: ________________________ Date: ______________

Marks Awarded: ____________

Comments:

________________________________________________________________________
Data Communiations & Networks 18
Experiment #3
Title: Computer Network Cabling

Objective

• List common cable types used in computer networking


• Describe how UTP cables are made
• Explain how UTP cables are used in Ethernet networks
• Demonstrate the ability to make a working patch cable
• Name the two wiring standards used for wired Ethernet networks and their uses

Common Network cable types (Guided Media)

Coaxial Cable has two wires of copper. The core wire lies in the center and it is made of
solid conductor. The core is enclosed in an insulating sheath. The second wire is wrapped
around over the sheath and that too in turn encased by insulator sheath. This all is covered
by plastic cover.

Fig 3.1 Coaxial Cable

Twisted Pair Cable is made of two plastic insulated copper wires twisted together to form a
single medium. Out of these two wires, only one carries the actual signal and another is
used for ground reference. The twists between wires are helpful in reducing noise (electro-
magnetic interference) and crosstalk.

Fig 3.2 Twisted Pair Cable

Fiber Optic works on the properties of light. When light ray hits at critical angle, it tends to
refract at 90 degree. This property has been used in fiber optic. The core of fiber optic cable
is made of high quality glass or plastic

Fig 3.3 Fiber Optic Cable

________________________________________________________________________
Data Communiations & Networks 19
Twisted Pair (UTP/STP) Categories

Twisted Pair Characteristics

1. Unshielded or Shielded
2. Twisted pair of insulated conductor
3. Covered by insulating sheath

Fig 3.4 UTP/STP Cable

________________________________________________________________________
Data Communiations & Networks 20
Task 1. Define each characteristic of copper

1. Malleability
_________________________________________________________________________
_________________________________________________________________________
2. Ductility
_________________________________________________________________________
_________________________________________________________________________
3.Strong
_________________________________________________________________________
_________________________________________________________________________
4.Durable
_________________________________________________________________________
_________________________________________________________________________
5. Corrosion Resistant
_________________________________________________________________________
_________________________________________________________________________

Task 2. Identify Network cabling tools and equipments

Fig 3.4 RJ45

Fig 3.5 CAT5e UTP Cable

________________________________________________________________________
Data Communiations & Networks 21
Fig 3.6 Crimping tool

Fig 3.7 Network Tester

Task 3. Creating a Straight, Crossover and Rollover connection

Step 1. Strip Cable end – avoid cutting into conductor insulation.

Fig 3.8 Twisted Pair Cable

Step 2. Untwist wire ends – sort wires by insulation colors

Fig 3.9 Four pairs of twisted pair Cable

________________________________________________________________________
Data Communiations & Networks 22
Step 3. Arrange wires

Fig 3.10 TIA/EIA 568B

Straight through Cable Connection - use to connect network device to other different
network device (Example: PC to Switch, Router to Switch)

1. TIA/EIA 568A: GW-G, OW-Bl, BlW-O, BrW-Br

Fig 3.11 T-568A

________________________________________________________________________
Data Communiations & Networks 23
2. TIA/EIA 568B: OW-O, GW-Bl, BlW-G, BrW-Br

Fig 3.12 T-568B

Crossover Cable Connection - use to connect network device to other same network
device (Example: PC to PC, Switch to Switch)

Fig 3.13 EIA/TIA 568B+568A Crossover

Rollover Cable Connection

Fig 3.14 Rollover


________________________________________________________________________
Data Communiations & Networks 24
Step 4. Trim wires to size - Trim all wires evenly, leave about ½ inch of twisted wires
exposed

Fig 3.15 Twisted pair cable trim size

Step 5. Attach connector – Maintain wire order from left to right, with RJ45 tab facing down

Fig 3.16 Top view of RJ45 and Twisted cable connection

Step 6. Check if the cable is attached to the RJ45 correctly – check if wire extends to the
end of the RJ45, check if the sheath is inserted well inside the RJ45 lock.

Fig 3.17 Side view of RJ45 and Twisted cable connection


________________________________________________________________________
Data Communiations & Networks 25
Step 7. Crimp – Squeeze firmly to crimp connector onto cable end

Fig 3.18 Crimping RJ45 to wire

Step 8. Test network cable – Use the network tester if the cable is working properly
according to its cable connection.

Fig 3.19 Network tester

________________________________________________________________________
Data Communiations & Networks 26
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.

Other:
Total Score

Rating = (total_score/12) * 100

Lab performed on (date): ___________ Signature: ______________

Checked by: ________________________ Date: ______________

Marks Awarded: ____________

Comments:

________________________________________________________________________
Data Communiations & Networks 27
Experiment #4
Title: Network Connection and Building a Peer to Peer Network

Objective:
• Demonstrate basic PC network
• Learn how to configure TCP/IP
• Demonstrate connection to the internet
• Building a simple peer to peer network
• Be familiar with the different cable types
• Investigate PC network using ping, tracert and ARP table

Task 1. Peer-to-Peer Network

In this lab, you will build a simple Peer-to-Peer network between two PCs. You will also
configure an address so that each station can communicate using TCP/IP. Finally, you will
use a TCP/IP program called ping to test your network.

Fig 4.1 Topology for Task 1

Step 1. Wire your pod - You will first need to wire your hosts according to the map above.

1. Locate your assigned pod and its corresponding computers. Turn the PCs on. If you have
trouble, ask a lab aid for assistance

2. In order to connect the PCs to each other, you will need one crossover patch cable.
Connect the crossover patch cable from Host A to Host B. .

Step 2. Assign an IP address manually - Now that you have built the physical layer of your
Ethernet LAN, you will configure TCP/IP on each computer. Each PC will need an IP
address in order to communicate using TCP/IP.

1. Examine your computers IP (Layer 3) and MAC (Layer 2) addresses. Use the command
ipconfig/all in the MS-DOS prompt.

________________________________________________________________________
Data Communiations & Networks 28
2. This time you need to configure your computer with an IP address manually. In the
previous elaboration, the IP address was assigned dynamically from a DHCP server.
Configure your host with the appropriate IP address and subnet mask.

Computer IP Address Subnet mask


Host A 192.168.1.2 255.255.255.0
Host B 192.168.1.3 255.255.255.0

Table 4.1 IP addresses for PCs of Task 1

Step 3 Test the connectivity - To test your newly configured network, you will use the ping
utility.

1. From Host A, ping the other station in your network, Host B.


2. From Host B, ping Host A.

Which cable do you use to connect a PC to a PC? _________________________________


Which cable do you use to connect a switch to a switch? ____________________________
Which cable do you use to connect a PC to a switch? ______________________________
When you are finished, please replace the cables, change the TCP/IP settings to DHCP and
shut down your PCs.

Task 2. PC Configuration and Connecting to the Internet

The following steps are included in this exercise:


• Identify tools used to discover a computer network configuration
• Gather information of Layer 2 MAC address and Layer 3 TCP/IP network information
• Learn to use the TCP/IP Packet Internet Groper (ping) command
• Learn to use the Tracerouter (tracert) command
• Observe name resolution occurrences using DNS servers
• Introduce Dynamic Host Configuration Protocol (DHCP)
• Introduce Address Resolution Protocol (ARP)

Fig 4.2 Topology for Task 2


________________________________________________________________________
Data Communiations & Networks 29
Step 1. Wire your pod - You will first need to wire your pod, according to the map above
and connect your Ethernet switch to the Internet hub.

1. To connect the PCs to the switch, you will need three straight-through patch cables. To
connect your Ethernet switch to the Internet hub/switch, you will need one crossover cable.

2. Use the straight-through cables to connect the three PCs to the first three ports on the
Ethernet switch, and use the crossover cable to connect port 4 on the Ethernet switch to the
Internet hub. A green light should appear above the first four switch ports. It means the ports
are up and functioning. Make sure that the Internet hub/switch is connected to the Internet.

Step 2. Assign IP address dynamically

1. On the desktop right click on the Network Neighborhood or My Network Places icon and
choose Properties.

2. Right click on Local Area Connection and choose Properties. That will bring up a window
similar to the one shown in figure 4.1.

Fig 4.3 Local Area Connection Properties

________________________________________________________________________
Data Communiations & Networks 30
3. Select the appropriate TCP/IP entry and click on the Properties button, or double click
directly on the TCP/IP entry.

Fig 4.4 TCP/IP Properties

4. To enable DHCP, select Obtain an IP adress automatically, and click OK. This will make
the host to get an IP address dynamically from a DHCP server, and the host will be able to
access the Internet. When you returns to the Local Area Connection Properties window,
click OK again.

Step 3. Check your TCP/IP configuration. At this point, you have built the physical layer of
your Ethernet LAN, connected it to the Internet, and set your computer to obtain an IP
address automatically.

1. To check your new IP address, use ipconfig. To access the command line, click the Start
Menu, select Run, and then type cmd in the run box. Click OK.

2. Once you have the command box, also called the MS-DOS prompt, you can run the
ipconfig by typing ipconfig and press enter.

________________________________________________________________________
Data Communiations & Networks 31
Fig 4.5 MS-DOS Prompt

What is your hosts IP address according to the output?


_____________________________________________________________________

What is the default gateway?


_____________________________________________________________________

3. You can also use the /all option with the ipconfig command, so you can get expanded
information on your systems IP configuration. In the MS-DOS prompt, type ipconfig /all .

What is the DHCP servers IP address?


_____________________________________________________________________

What is your hosts MAC adress (physical adress)?


_____________________________________________________________________

What is the DNS servers IP address?


_____________________________________________________________________

Step 4. Test the connectivity - You can test your automatic configuration by using the ping
program. Ping is used to send a very small “test” packet to a TCP/IP device to determine if a
working connection between hosts exists. Ping uses a protocol called Internet Control
Message Protocol (ICMP). Ping works by sending an ICMP echo request to a destination IP
address. Under normal circumstances, a host that receives the echo request will send back
an “echo reply” immediately

1. From each host MS-DOS prompt, type: ping 194.47.13.65 , where the IP address after
the ping command is the IP address to the default gateway. This will test the connectivity
between the PC and the default gateway.

2. From Host A, ping Host B’s IP address and Host C’s IP address. Also try pinging from
Host B and Host C to Host A. 3. As a final test, try pinging a website on the Internet. Type

________________________________________________________________________
Data Communiations & Networks 32
ping www.cisco.com . This will test the connectivity between the PC and a website on the
Internet.

Step 5. Ping the Loopback IP address

1. Type ping 127.0.0.1 in the MS-DOS prompt.

Was the ping successful? ___________ The 127.0.0.0 network is reserved for loopback
testing. If the ping is successful, then TCP/IP is properly installed and functioning on the
computer.

Step 6 Display the ARP table - ARP is used as a tool for confirming that a computer is
successfully resolving network Layer 3 addresses to Media Access Control (MAC) Layer
2 addresses. The TCP/IP network protocol relies on IP addresses like 192.168.14.211 to
identify individual devices and to assist in navigating data packets between networks. While
the IP address is essential to move data from one LAN to another, it cannot deliver the data
in the destination LAN by itself. Local network protocols, like Ethernet or Token Ring, use
the MAC, or Layer 2, address to identify local devices and deliver all data. ARP maintains a
table in the computer of IP and MAC address combinations. In other words, it keeps track of
which MAC address is associated with an IP address. If ARP does not know the MAC
address of a local device, it issues a broadcast using the IP address. This broadcast
searches for the MAC address that corresponds to the IP address. If the IP address is active
on the LAN, it will send a reply from which ARP will extract the MAC address. ARP will then
add the address combination to the local ARP table of the requesting computer. MAC
addresses and therefore ARP are only used within the LAN.

1. In the MS-DOS prompt, type arp –a and press Enter. Are there any entries in the ARP
table? _________________________________________________________________

Do not be surprised if there are no entries. Any addresses that are unused will be removed
after a couple of minutes.

2. Try pinging a couple of local addresses and a website. Then re-run the arp command.

Which addresses are listed?


_______________________________________________________________________
_______________________________________________________________________
Why is the default gateway listed?
_______________________________________________________________________
_______________________________________________________________________

3. Try the command arp -? to see the help feature and look over the options. If you want to
see the help feature options for ping and tracert, type ping -? or tracert -? .

Step 7. Troubleshoot the path of a packet - The ping program is incredibly useful for
testing IP connectivity between hosts. In some cases, you may need to troubleshoot the
path IP packets take to reach a particular destination. IP packets travel through routers to
reach other networks. If a certain destination.

network is far away, IP packets may have to be routed through dozens of routers to reach
their destination. Each time an IP packet passes through a router is called a “hop.”

________________________________________________________________________
Data Communiations & Networks 33
1. You can use a trace utility to identify the addresses of the routers along the path IP
packets take to a destination. Trace programs are typically called traceroute, but in Windows
the trace program is called tracert. In the MS-DOS prompt type tracert www.cisco.com

2. The tracert output will take a couple of minutes to generate. What is happening while you
wait? Where do the IP addresses that appear in the output comes from?
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________

Peer-to-Peer Network Objective In this lab, you will build a simple Peer-to-Peer network
between two PCs.

________________________________________________________________________
Data Communiations & Networks 34
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.

Other:
Total Score

Rating = (total_score/12) * 100

Lab performed on (date): ___________ Signature: ______________

Checked by: ________________________ Date: ______________

Marks Awarded: ____________

Comments:

________________________________________________________________________
Data Communiations & Networks 35
Experiment #5
Title: Workstation ARP

Objective
• Introduce Address Resolution Protocol (ARP) and the arp –a workstation command.
• Explore the arp command help feature using the -? option.

Equipment Required
This lab assumes the use of any version of Windows. This is a non-destructive lab
and can be performed with a home machine without concern of changing the system
configuration. Ideally, this lab will be done in a classroom or other LAN connected to the
Internet. It can be done from a single remote connection via a modem or DSL-type
connection.

ARP is used as a tool for confirming that a computer is successfully resolving


network Layer 3 addresses to Media Access Control (MAC) Layer 2 addresses. The TCP/IP
network protocol relies on IP addresses like 192.168.14.211 to identify individual devices
and to assist in navigating data packets between networks. While the IP address is essential
to move data from one LAN to another, it cannot deliver the data in the destination LAN by
itself. Local network protocols, like Ethernet or Token Ring, use the MAC, or Layer 2,
address to identify local devices and deliver all data. A computer MAC address has been
seen in prior labs.

This is an example of a MAC address: 00-02-A5-9A-63-5C

A MAC address is a 48-bit address displayed in Hexadecimal (HEX) format as six


sets of two HEX characters separated by dashes. In this format each hex symbol represents
4 bits. With some devices, the 12 hex characters may be displayed as three sets of four
characters separated by periods or colons (0002.A59A.635C).

ARP maintains a table in the computer of IP and MAC address combinations. In


other words, it keeps track of which MAC address is associated with an IP address. If ARP
does not know the MAC address of a local device, it issues a broadcast using the IP
address. This broadcast searches for the MAC address that corresponds to the IP address.
If the IP address is active on the LAN, it will send a reply from which ARP will extract the
MAC address. ARP will then add the address combination to the local ARP table of the
requesting computer.

MAC addresses and therefore ARP are only used within the LAN. When a computer
prepares a packet for transmission, it checks the destination IP address to see if it is part of
the local network. It does this by checking to see if the network portion of the IP address is
the same as the local network. If it is, the ARP process is consulted to get the MAC address
of the destination device using the IP address. The MAC address is then applied to the data
packet and used for delivery. If the destination IP address is not local, the computer will
need the MAC address of the default gateway. The default gateway is the router interface
that the local network is connected to in order to provide connectivity with other networks.
The gateway MAC address is used because the packet will be delivered there and the
router will then forward it to the network it is intended for. If the computer does not receive

________________________________________________________________________
Data Communiations & Networks 36
any packets from an IP address after a few minutes, it will drop the MAC/IP entry from the
ARP table assuming the device has logged off. Later attempts to access that IP address will
cause ARP to do another broadcast and update the table.

Step 1. Establish a network connection

If the connection to the Internet is dial-up, connect to the ISP to ensure that the
computer has an IP address. In a TCP/IP LAN with a Dynamic Host Configuration Protocol
(DHCP) server, it should not be necessary to do this step.

Step 2. Access a command prompt

Windows NT / 2000 / XP users: Use the Start menu to open the Command Prompt
window. This window is similar to the MS-DOS window on older Windows versions:

Start > Programs > Accessories > Command Prompt or Start > Programs > Command
Prompt

Windows 95 / 98 / ME users: Use the Start menu to open the MS-DOS Prompt window:

Start > Programs > Accessories > MS-DOS Prompt or Start > Programs > MS-DOS
Prompt

Step 3. Display the ARP table

1. In the window type arp -a and press Enter. Do not be surprised if there are no entries.
The message displayed will probably be, ‘No ARP Entries Found’. Windows computers
remove any addresses that are unused after a couple minutes.

2. Try pinging a couple local addresses and a website URL. Then re-run the command. The
figure below shows a possible result of the arp -a command. The MAC address for the
website will be listed because it is not local, but that will cause the default gateway to be
listed. In the example below 10.36.13.1 is the default gateway while the 10.36.13.92 and
10.36.13.101 are other network computers. Notice that for each IP address there is a
physical address, or MAC, and type, indicating how the address was learned.

3. From the figure below, it might be logically concluded

Fig 5.1 Using arp –a command

________________________________________________________________________
Data Communiations & Networks 37
Step 4 Ping several URLs

1. Ping the following URLs and note the IP address of each. Also select one additional URL
to ping and record it below:

www.cisco.com: _____________________________
www.msn.de: _______________________________

2. Now run the arp –a command again and record the MAC addresses for each of the
above next to their IP addresses. Can it be done? ___________________________

3. Why or why not? ________________________________________________________


________________________________________________________________________

4. What MAC address was used in delivering each of the pings to the URLs? ____________
_______________________ Why? ____________________________________________

Step 5. Use the ARP help feature


Try the command arp -? to see the help feature and look over the options.

Fig 5.2 -? Command in MS DOS

________________________________________________________________________
Data Communiations & Networks 38
Step 6 Use help with tracert and ping - Try tracert -? and then ping -? to see the options
available for the commands used previously.

Fig 5.3 Using -? Command

In looking at the help for ping, notice the –t option, which will send continuous pings,
not just four. More importantly, notice the two commands to stop it:

1) Control-Break
2) . Control-C
These two-key commands are common for stopping runaway activities. Try pinging a
neighboring computer with the -t option and then try the Control-Break and Control-C
features. An example in the above network would be ping 10.36.13.101 -t and then press
Enter. Be sure to use the Control-C command to stop the pings.

Result
Based on observations made today, what could be deduced about the following results?

Computer 1
IP Address: 192.168.12.113
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.12.1
Pings and tracert to 207.46.28.116 were both successful.

What will be the ARP table entry associated with this address and why?

________________________________________________________________________
Data Communiations & Networks 39
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.

Other:
Total Score

Rating = (total_score/12) * 100

Lab performed on (date): ___________ Signature: ______________

Checked by: ________________________ Date: ______________

Marks Awarded: ____________

Comments:

________________________________________________________________________
Data Communiations & Networks 40
Experiment #6
Title: Basic IP Addressing

Objective:
• Name the five different classes of IP addresses
• Describe the characteristics and use of the different IP address classes
• Identify the class of an IP address based on the network number
• Determine which part, or octet, of an IP address is the network ID and which is the
host ID
• Identify valid and invalid IP host addresses based on the rules of IP addressing
• Define the range of addresses and default subnet mask for each class

Introduction:

This lab exercise helps develop an understanding of IP addresses and how TCP/IP
networks operate. It is primarily a written lab exercise. However, it could be worthwhile to
review some real network IP addresses using the command line utilities ipconfig for
windows. IP addresses are used to uniquely identify the individual TCP/IP networks and
hosts, such s computers and printers, on those networks in order for devices to
communicate. Workstations and servers on a TCP/IP network are called hosts and each has
a unique IP address. This address is referred to as its host address. TCP/IP is the most
widely used protocol in the world. The internet or World Wide Web only uses IP addressing.
In order for a host to access the internet, it must have an IP address.

In its basic form, the IP address has two parts:


• A network address
• A host address

The network portion of the IP address is assigned to a company or organization by the


internet Network Information Center (interNIC). Routers use the IP address to move data
packets between networks. IP addresses are 32 bits long, according to the current version
IPv4 and are divided into 4 octets of 8 bits each. They operate at he network layer (Layer 3)
of the Open System Interconnection (OSI) model,which is the Internet layer of the TCP/IP
model. IP addresses are assigned in he following ways:

• Statically – manually, by a network administrator


• Dynamically – automatically, by a dynamic host configuration protocol server

The IP address of a workstation, or host is a logical address, meaning it can e


changed.the media access control (MAC) address of the workstation is a 48-bit physical
address.this address is burned into the network interface card (NIC) and cannot change
unless the NIC is replaced. The combination of the logical IP address and the physical MAC
address helps route packets to their proper destination.

There are five different classes of IP addresses, and depending on the class, the
network and host part of the address will use a different number of bits. In this lab,different
classes of IP addresses will be working with and to help become familiar with the
characteristics of each. The understanding of IP addresses is critical to the understanding of

________________________________________________________________________
Data Communiations & Networks 41
TCP/IP and internetworks in general. The understanding of IP address is critical to the
understanding of TCP/IP and internetworks in general.

Step 1. Review IP address classes and their characterstics

Address classes
There are five classes of IP addresses, A through E. Only the first three classes are
used commercially. A class A network address is discussed in the table to get started. The
first column is the class of IP address. The second column is the first octet, which must fall
within the range shown for a given class addresses. The class A address must start with a
number between 1 and 126. The first bit of a class A address is always zero, meaning the
high order bit (HOB) of the 128 bit cannot be used. 127 is reserved for loopback testing. The
first octet alone defines the network ID for a class A network address.

Default subnet mask


The default subnet mask uses all binary ones, decimal 255, to mask the first 8 bits of
the class A address. The default subnet mask helps routers and hosts determine if the
destination host is on this network or another one. Because there is only 126 Class A
networks, the remaining 24 bits, or 3 octets, can be used for hosts. Each class A network
can have 224, or over 16 million hosts. It is common to subdivide the network into smaller
groupings called subnets by using a custom subnet mask, which is discussed in the next
lab.

Network and Host address


The network or host portion of the address cannot be all ones or all zeros. As an
example, the class A address of 118.0.0.5 is a valid IP address. The network portion, or first
8 bits, which are equal to 118, is not all zeros and the host portion, or last 24 bits, is not all
zeros or all ones. If the host portion were all zeros, it would be the network address itself. If
the host portion were all ones, it would be a broadcast for the network address. The value of
any octet can never be greater than decimal 255 or binary 11111111.

1st Octet Network/Host Host per


1st Octet
High ID Default Number of network
Class Decimal
Order (N=Network, Subnet mask Networks (usable
Range
Bits H=Host) addresses)

126 16,777,214
A 1 - 126 0 N.H.H.H 255.0.0.0
(27- 2) (224 - 2)
16,382 65,534
B 128 – 191 10 N.N.H.H 255.255.0.0
(214 - 2) (218 - 2)
2,097,150 254
C 192 – 223 110 N.N.N.H 255.255.255.0
(221 - 2) (28 -2)
D 224 – 239 111 Reserved for multicasting
E 240 - 254 11110 Experimental: used for research

Note: Class A address 127 cannot be used and is reserved for loopback and diagnostic
functions.

________________________________________________________________________
Data Communiations & Networks 42
Step 2. Determine basic IP addressing
Use the IP address chart and your knowledge of IP address classes to answer the following
questions:

1. What is the decimal and binary range of the first octet of all possible Class B IP
addresses?

Decimal: From: ______________ To: _________________

Binary: From: ______________ To: _________________

2. Which octet(s) represent the network portion of a class C IP address?


____________________

3. Which octet(s) represents the host portion of a class A IP address?


_____________________

4. What is the maximum number of usable hosts with a Class C network address?
_______________

5. How many Class B networks are there? ____________________

6.How many hosts can each Class B network have? ___________________

7.How many octets are there in an IP address? _____________ How many bits per octet?
________

Step 3. Determine the host and network portions of the IP address

With he following IP host addresses, indicate the following:


• Class of each address
• Network address or ID
• Host portion
• Broadcast address for his network
• Default subnet mask

The host portion will be all zeros for the network ID. Enter just the octets that make up
the host. The host portion will be all ones for a broadcast. The network portion of the
address will be all ones for the subnet mask. Fill in the following table:
Address Network Host Network Default
Host IP Address
Class Address Address Broadcast Subnet mask

216.14.55.137
123.1.1.15
150.127.221.244
194.125.35.199
175.12.239.244

________________________________________________________________________
Data Communiations & Networks 43
Step 4. Given an IP address of 142.226.0.15 and a subnet mask of 255.255.255.0,
answer the following questions.

1. What is the binary equivalent of the second octet? ________________________

2. What is the class of the address? _________________________

3. What is the network address of this IP address? ________________________’

4. Is this a valid IP host address (Y/N)? ________________________

Why or Why not?


_________________________________________________________________________

_________________________________________________________________________

_________________________________________________________________________

Step 5. Determine which IP host addresses are valid for commercial networks.
For the following IP host addresses, determine which are valid for commercial networks and
indicate why or why not. Valid means it could be assigned to any of the following:
• Workstations
• Servers
• Printer
• Router Interface
• Any other compatible device

Fill in the following table:

IP Host Address Valid Address? (Yes/No) Why or Why not?


150.100.255.255
175.100.255.18
195.234.253.0
100.0.0.23
188.258.221.176
127.34.25.189
224.156.217.73

________________________________________________________________________
Data Communiations & Networks 44
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.

Other:
Total Score

Rating = (total_score/12) * 100

Lab performed on (date): ___________ Signature: ______________

Checked by: ________________________ Date: ______________

Marks Awarded: ____________

Comments:

________________________________________________________________________
Data Communiations & Networks 45
Experiment #7
Title: Network Topology

Objective
• To become familiar with Local Area Network Topologies
• To become familiar with Network Devices
• To become familiar with cables and computers
• To apply IP addressing to different network devices

LAN Topology is the way how the PCs are connected with each other is called physical or
network topology.

Bus Topology – It comprises of stations that are connected to a single communication line.
If the destination field does not match the station address, the station discards the
information frame back onto the bus. If it matches the station address, it accepts the
information frame and processes the frame.

Ring Topology – LAN that has each station attached to an adjacent station using point to
point links from physical ring. Each station attached and active to the ring generates the
information frame, then the retransmit information frame on the ring. The ring itself is
logically circular and flow of information.

________________________________________________________________________
Data Communiations & Networks 46
Star Topology – It comprises a number of stations directly to the central station
communications on the connecting links.

Tree Topology – The corollary to the topology is tree topology. It extends the branches of
the bus topology allowing more stations to access the bus.

Task 1. Apply topology in Packet Tracer

Using a packet tracer, create a network architecture using the topology discussed,
you can use different network devices like routers, switch, hubs, computers and network
media to connect devices.

Step 1. Identify the proper Ethernet cable and connect the network devices.

The connection between the network devices can be accomplished using a straight through
and crossover patch cable.

Step 2. Verify the physical connection

Plug in and turn on the computers. To verify the computer connections, ensure that the link
lights on the network devices are lit.

________________________________________________________________________
Data Communiations & Networks 47
Step 3. Access the IP setting windows

1. Click on Start> Settings> Control Panel and then click the network connection icon

2. Select the Local Area Network Connection and click on Change setting of this
connection.

3. Select TCP/IP protocol icon that is associated with the NIC on this PC.

4. Click on Properties and click on Use the following IP address

See the example below:

Task 2. Configure TCP/IP settings for the PCs

Step 1. Create an Information table of IP addresses to be used on the network


architecture you created.

See example below:

Computer Name IP Address Subnet mask


PC – A 192.168.1.1 255.255.255.0
PC – B 192.168.1.2 255.255.255.0
PC - C 192.168.1.3 255.255.255.0

________________________________________________________________________
Data Communiations & Networks 48
You can use this space for your Information table:

________________________________________________________________________
Data Communiations & Networks 49
Step 2. Access the command or MS-DOS prompt

Use the start menu to open the command prompt window.

Start> Pograms> Accessories> Command Prompt

Step 3. Verify that the PCs can communicate

1. Test connectivity from one PC to the other through the switch by pinging the IP address of
the opposite computer. Use the following command at the command prompt.

Example: C:>ping 192.168.1.1 (and other IP adresseses)

2. Look for results similar to those shown below. If not, check the PC connections and
TCP/IP settings for both PCs. What was he ping result?______________________

Step 4. Confirm the TCP/IP network settings – Type the ipconfig command from the
command prompt record the result.

Step 5. Restore the PCs to their original IP settings, disconnect the equipments and
store the cables

________________________________________________________________________
Data Communiations & Networks 50
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.

Other:
Total Score

Rating = (total_score/12) * 100

Lab performed on (date): ___________ Signature: ______________

Checked by: ________________________ Date: ______________

Marks Awarded: ____________

Comments:

________________________________________________________________________
Data Communiations & Networks 51
Experiment #8
Title: Class A IP Address Subnetting

Objective:
• Learn how to subnet
• Subnet a class A IP address

Scenario:
Your company has one Class A address; 24.0.0.0. The company has been experiencing
recent growth and expects to have 100 locations, each with 70000 personnel within the next
3 months.

• How many subnets are required for this configuration?


• What is the subnet mask for all hosts on all subnets?
• What are the subnet id’s for all subnets?
• What are the valid addresses for each subnet?
• How many hosts can each subnet host at maximum?

Step 1 – Determining the # of subnets, and the subnet mask


A unique network id is required to each physical network. If you must take WAN links into
consideration on your network, you also require a unique id for the WAN connection.
Calculate the number of subnets required for this scenario, and from the chart, determine
the subnetmask.

Number of Subnets:

Subnet Mask: _

Step 2 – Calculating the subnet id’s for each subnet


To calculate the subnet id’s for each subnet, use the initial network address and add the
Increment value to the first host octet, until you reach the subnet mask. Fill in the left side of
the following chart.
# Network Address Usable Addresses Network Broadcast

From 24
0 24 0 0 0
To 24

From 24
1 24
To 24

From 24
2 24
To 24

From 24
3 24
To 24

________________________________________________________________________
Data Communiations & Networks 52
From 24
4 24
To 24

From 24
5 24
To 24

From 24
6 24
To 24

From 24
24
To 24

From 24
24
To 24

From 24
24
To 24

Skip to end….
From 24
24
To 24

From 24
24
To 24

We do not use the first subnet (according to Microsoft – even though it is used in the
real world) and we do not use the subnet id with the subnet mask in it either. You cannot
have a subnet id equal to your subnet mask. Therefore we must cross out the first subnet id
and the last subnet id.

Step 3 – Calculating valid IP addresses for each subnet


Addresses for each subnet are calculated by beginning with an address that is one after the
subnet id, to one before the next subnet id. Fill in the right hand side of the chart above.

Step 4 – Determine the number of hosts each subnet can support


Use the formula 2n – 2 where n= the number of host bits remaining. Remember to include
host bits from all octets. If 8 bits were used subnetting a Class B address, there would be 8
host bits remaining. Therefore, using the formula above:

28 – 2
= 256 –2
=254 hosts per subnet

________________________________________________________________________
Data Communiations & Networks 53
Use the formula to determine the number of hosts supported on each subnet of the
network in this exercise.

# host bits used:

# host bits remaining:

# hosts per subnet:

Use the calculator in scientific mode to complete the calculation.

(Start >Programs >Accessories >Calculator. View pulldown menu, select Scientific.)

________________________________________________________________________
Data Communiations & Networks 54
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.

Other:
Total Score

Rating = (total_score/12) * 100

Lab performed on (date): ___________ Signature: ______________

Checked by: ________________________ Date: ______________

Marks Awarded: ____________

Comments:

________________________________________________________________________
Data Communiations & Networks 55
Experiment #9
Title: Class B IP Address Subnetting

Objective:
• Learn how to subnet
• Subnet a class B IP address

Scenario:
Your company has one Class B address; 150.210.0.0 The company has been experiencing
recent growth and expects to have 7 more locations (they currently have one location),
within the next 3 months.

• How many subnets are required for this configuration?


• What is the subnet mask for all hosts on all subnets?
• What are the subnet IDs for all subnets?
• What are the valid addresses for each subnet?
• How many hosts can each subnet host at maximum?

Step 1 – Determining the # of subnets, and the subnet mask


A unique network ID is required for each physical network. If you must take WAN
links into consideration on your network, you also require a unique id for the WAN
connection. Calculate the number of subnets required for this scenario, and from the chart,
determine the subnet mask.

Number of Subnets:

Subnet Mask:

Step 2 – Calculating the subnet id’s for each subnet


To calculate the subnet ID’s for each subnet, use the initial network address and add the
Increment value to the first host octet, until you reach the subnet mask. Fill on the left side of the
following chart.

# Network Adress Usable Addresses Broadcast Address

From 150 210


0 150 210 0 0
To 150 210

From 150 210


1 150 210
To 150 210

From 150 210


2 150 210
To 150 210

________________________________________________________________________
Data Communiations & Networks 56
From 150 210
3 150 210
To 150 210

From 150 210


4 150 210
To 150 210

From 150 210


5 150 210
To 150 210

From 150 210


6 150 210
To 150 210

From 150 210


7 150 210
To 150 210

From 150 210


8 150 210
To 150 210

From 150 210


9 150 210
To 150 210

From 150 210


10 150 210
To 150 210

From 150 210


11 150 210
To 150 210

From 150 210


12 150 210
To 150 210

From 150 210


13 150 210
To 150 210

From 150 210


14 150 210
To 150 210

From 150 210


15 150 210
To 150 210

We do not use the first subnet (according to Microsoft – even though it is used in the
real world) and we do not use the subnet id with the subnet mask in it either. You cannot

________________________________________________________________________
Data Communiations & Networks 57
have a subnet id equal to your subnet mask. Therefore, we must cross out the first subnet id
and the last subnet id.

Step 3 – Calculating valid IP addresses for each subnet


Addresses for each subnet are calculated by beginning with an address that is one after the
subnet id, to one before the next subnet id. Fill in the right hand side of the chart above.

Step 4 – Determine the number of hosts each subnet can support


Use the formula 2n – 2 where n= the number of host bits remaining. Remember to include
host bits from all octets. If 8 bits were used subnetting a Class B address, there would be 8
host bits remaining. Therefore, using the formula above:
28 – 2
= 256 –2
=254 hosts per subnet
Use the formula to determine the number of hosts supported on each subnet of the network
in this exercise.

# host bits used:

# host bits remaining:

# hosts per subnet:

Use the calculator in scientific mode to complete the calculation.


(Start >Programs >Accessories >Calculator. View pulldown menu, select Scientific.)

________________________________________________________________________
Data Communiations & Networks 58
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.

Other:
Total Score

Rating = (total_score/12) * 100

Lab performed on (date): ___________ Signature: ______________

Checked by: ________________________ Date: ______________

Marks Awarded: ____________

Comments:

________________________________________________________________________
Data Communiations & Networks 59
Experiment #10
Title: Class C IP Address Subnetting

Objective:
• Learn how to subnet
• Subnet a class B IP address

Scenario:
Your company has one Class C address; 200.156.109.0. Recently the company has been
experiencing extremely heavy network traffic. As the network administrator, you decide to
subnet the LAN into two physical networks. There will 55 hosts on each network.

• How many subnets are required for this configuration?


• What is the subnet mask for all hosts on all subnets?
• What are the subnet ID’s for all subnets?
• What are the valid addresses for each subnet?
• How many hosts can each subnet host at maximum?

Step 1 – Determining the # of subnets and the subnet mask


A unique network id is required for each physical network. If you must take WAN links into
consideration on your network, you also require a unique id for the WAN connection.
Calculate the number of subnets required for this scenario, and from the chart, determine
the subnet mask.

Number of Subnets:

Subnet Mask: 255.255.255.

Step 2 – Calculating the subnet id’s for each subnet


To calculate the subnet id’s for each subnet, use the initial network address and add the Increment
value to the first host octet, until you reach the subnet mask. Fill in the left side of the following chart.

# Network Address Useable Addresses Network Broadcast

From 200 156 109


0 200 156 109 0
To 200 156 109

From 200 156 109


1 200 156 109
To 200 156 109

From 200 156 109


2 200 156 109
To 200 156 109

From 200 156 109


3 200 156 109
To 200 156 109

________________________________________________________________________
Data Communiations & Networks 60
We do not use the first subnet (according to Microsoft – even though it is used in the
real world) and we do not use the subnet id with the subnet mask in it either. You cannot
have a subnet id equal to your subnet mask. Therefore we must cross out the first subnet id
and the last subnet id.

Step 3 – Calculating valid IP addresses for each subnet


Addresses for each subnet are calculated by beginning with an address that is, one after the
subnet id, to one before the next subnet id. Fill in the right hand side of the chart above.

Step 4 – Determine the number of hosts each subnet can support


Use the formula 2n – 2 where n= the number of host bits remaining. Remember to include
host bits from all octets. If 8 bits were used subnetting a Class B address, there would be 8
host bits remaining. Therefore, using the formula above:

28 – 2
= 256 –2
=254 hosts per subnet
Use the formula to determine the number of hosts supported on each subnet of the network
in this exercise.

# host bits used:

# host bits remaining:

# hosts per subnet:

Use the calculator in scientific mode to complete the calculation.


(Start >Programs >Accessories >Calculator. View pulldown menu, select Scientific.)

________________________________________________________________________
Data Communiations & Networks 61
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.

Other:
Total Score

Rating = (total_score/12) * 100

Lab performed on (date): ___________ Signature: ______________

Checked by: ________________________ Date: ______________

Marks Awarded: ____________

Comments:

________________________________________________________________________
Data Communiations & Networks 62
Experiment #11
Title: Using Classless Inter-Domain Routing
Objective:
• Learn how to use C
• Subnet a class C IP address

Given an IP address and network mask, you are able to determine information about the IP
address such as Network address, broadcast address, Total number of host bits, Number of
hosts.

Given:
Host IP Address: 172.25.114.250
Network Mask: 255.254.0.0 (/15)

IP address: 172 25 114 250


Bit Translation of IP Address: _________.___________.___________.__________
Subnet mask: _____________________
Bit Translation of Subnet mask: _________. __________. __________. _________

1. Use binary “and” to determine the network address:

Solution:

2. Determine the broadcast address by setting 1bits in the host portion of the
address.

Network address:
__________.___________.__________.__________

Bit Translation of Network Address:


__________. __________.__________. __________

Broadcast Address:
__________.__________.___________.__________

Bit Translation of Broadcast Address:


__________.__________.___________.__________

________________________________________________________________________
Data Communiations & Networks 63
3. Determine the total number of hosts.

The last 17 Bits are the host part of our address, therefore:
It is possible to have 217=131.072 unique IP Addresses in network 172.24.0.0/15
However, 172.25.255.255 is the broadcast address and 172.24.0.0 the network address

Number of Usable Host: ___________


CIDR-Suffix - The suffix indicates the number of 1-bits in the netmask. 192.168.2.101/23
corresponds to the IP address 192.168.2.101 and subnet mask 255.255.254.0. The CIDR-
Suffix /23 is calculated as follows:

Decimal: 255. 255. 254. 0

Binary: 11111111. 11111111. 11111110. 00000000

8 Bit + 8 Bit + 7 Bit + 0 Bit = /23

Answer the Following:

1. IP address 192.168.0.5
Subnet mask 255.255.255.0
CIDR:______________
Network address:____________
Broadcast addresses:____________
Total number of hosts:____________

2. IP address 192.168.0.5
Subnet mask 255.255.0.0
CIDR:_____________
Network address:____________
Broadcast addresses:___________
Total number of hosts:____________

3. IP address 10.2.17.10
Subnet mask 255.0.0.0
CIDR:____________
Network address:____________
Broadcast addresses:___________
Total number of hosts:____________

4. IP address 10.2.17.10
Subnet mask:____________
CIDR: /11
Network address:____________
Broadcast addresses:___________
Total number of hosts:___________

________________________________________________________________________
Data Communiations & Networks 64
Use This space for computation:

________________________________________________________________________
Data Communiations & Networks 65
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.

Other:
Total Score

Rating = (total_score/12) * 100

Lab performed on (date): ___________ Signature: ______________

Checked by: ________________________ Date: ______________

Marks Awarded: ____________

Comments:

________________________________________________________________________
Data Communiations & Networks 66
Experiment #12
Title: Variable Length Subnet Mask

Objective:
• To be familiar with VLSM
• To create an addressing scheme using variable length subnet mask

Scenario: You were assigned to use the class C address 192.168.15.0 and must support the
network shown in the diagram below.you are not permitted to use IP unnumbered or NAT on
this network. Create an addressing scheme that meets the requirements shown in the
diagram, conserving the maximum number of addresses for future growth.

Task 1. Create an IP Information table of the given scenario.

Name Network Address Usable Addresses CIDR Network Broadcast

From
A
To

From
B
To

From
C
To

From
D
To

From
E
To

________________________________________________________________________
Data Communiations & Networks 67
Task 2. Simulate the scenario using Packet Tracer

Task 3. Label each of the needed network addresses in the diagram below.

________________________________________________________________________
Data Communiations & Networks 68
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.

Other:
Total Score

Rating = (total_score/12) * 100

Lab performed on (date): ___________ Signature: ______________

Checked by: ________________________ Date: ______________

Marks Awarded: ____________

Comments:

________________________________________________________________________
Data Communiations & Networks 69
Experiment #13
Title: Virtual LAN Configuration

Objective:
• Cable a network according to the topology diagram
• Erase the startup configuration and reload a switch to the default state
• Perform basic configuration tasks on a switch
• Create VLANs
• Assign switch ports to a VLAN
• Add, move, and change ports
• Verify VLAN configuration
• Enable Trunking on inter-switch connections
• Verify trunk configuration
• Save the VLAN configuration

Topology Digram:

Addressing Table:

Initial Port Assignments (Switches 2 and 3)

________________________________________________________________________
Data Communiations & Networks 70
Task 1: Prepare the Network

Step 1: Cable a network that is similar to the one in the topology diagram.
You can use any current switch, in your lab as long as it has the required interfaces shown
in the topology.

Note: If you use 2900 or 2950 switches, the outputs may appear different. Also, certain
commands may be different or unavailable.

Step 2: Clear any existing configurations on the switches, and initialize all ports in the
shutdown state.

If necessary, refer to Lab 2.5.1, Appendix 1, for the procedure to clear switch configurations.

It is a good practice to disable any unused ports on the switches by putting them in
shutdown mode. Disable all ports on the switches:

Switch#config term
Switch(config)#interface range fa0/1-24
Switch(config-if-range)#shutdown
Switch(config-if-range)#interface range gi0/1-2
Switch(config-if-range)#shutdown

Task 2: Perform Basic Switch Configurations

Step 1: Configure the switches according to the following guidelines.


• Configure the switch hostname.
• Disable DNS lookup.
• Configure an EXEC mode password of class.
• Configure a password of cisco for console connections.
• Configure a password of cisco for vty connections.

Step 2: Re-enable the user ports on S2 and S3.

S2(config)#interface range fa0/6, fa0/11, fa0/18


S2(config-if-range)#switchport mode access
S2(config-if-range)#no shutdown

S3(config)#interface range fa0/6, fa0/11, fa0/18


S3(config-if-range)#switchport mode access
S3(config-if-range)#no shutdown

Task 3: Configure and Activate Ethernet Interfaces

________________________________________________________________________
Data Communiations & Networks 71
Step 1: Configure the PCs.

You can complete this lab using only two PCs by simply changing the IP addresses for the
two PCs specific to a test you want to conduct. For example, if you want to test connectivity
between PC1 and PC2, then configure the IP addresses for those PCs by referring to the
addressing table at the beginning of the lab. Alternatively, you can configure all six PCs with
the IP addresses and default gateways.

Task 4: Configure VLANs on the Switch

Step 1: Create VLANs on switch S1.

Use the vlan vlan-id command in global configuration mode to add a VLAN to switch S1.
There are four VLANS configured for this lab: VLAN 10 (faculty/staff); VLAN 20 (students);
VLAN 30 (guest); and VLAN 99 (management). After you create the VLAN, you will be in
VLAN configuration mode, where you can assign a name to the VLAN with the name vlan
name command.

S1(config)#vlan 10
S1(config-vlan)#name faculty/staff
S1(config-vlan)#vlan 20
S1(config-vlan)#name students
S1(config-vlan)#vlan 30
S1(config-vlan)#name guest
S1(config-vlan)#vlan 99
S1(config-vlan)#name management
S1(config-vlan)#end
S1#

Step 2: Verify that the VLANs have been created on S1.

Use the show vlan brief command to verify that the VLANs have been created.

S1#show vlan brief

Step 3: Configure and name VLANs on switches S2 and S3.

________________________________________________________________________
Data Communiations & Networks 72
Create and name VLANs 10, 20, 30, and 99 on S2 and S3 using the commands from Step
1. Verify the correct configuration with the show vlan brief command.

What ports are currently assigned to the four VLANs you have created?
___________________

Step 4: Assign switch ports to VLANs on S2 and S3.

Refer to the port assignment table on page 1. Ports are assigned to VLANs in interface
configuration mode, using the switchport access vlan vlan-id command. You can assign
each port individually or you can use the interface range command to simplify this task, as
shown here. The commands are shown for S3 only, but you should configure both S2 and
S3 similarly. Save your configuration when done.

S3(config)#interface range fa0/6-10


S3(config-if-range)#switchport access vlan 30
S3(config-if-range)#interface range fa0/11-17
S3(config-if-range)#switchport access vlan 10
S3(config-if-range)#interface range fa0/18-24
S3(config-if-range)#switchport access vlan 20
S3(config-if-range)#end
S3#copy running-config startup-config
Destination filename [startup-config]? [enter]
Building configuration...
[OK]

Step 5: Determine which ports have been added.

Use the show vlan id vlan-number command on S2 to see which ports are assigned to
VLAN 10.

Which ports are assigned to VLAN


10?______________________________________________

Note: The show vlan name vlan-name displays the same output.

You can also view VLAN assignment information using the show interfaces interface
switchport command.

Step 6: Assign the management VLAN.


A management VLAN is any VLAN that you configure to access the management
capabilities of a switch. VLAN 1 serves as the management VLAN if you did not specifically
define another VLAN. You assign the management VLAN an IP address and subnet mask.
A switch can be managed via HTTP, Telnet, SSH, or SNMP. Because the out-of-the-box
configuration of a Cisco switch has VLAN 1 as the default VLAN, VLAN 1 is a bad choice as
the management VLAN. You do not want an arbitrary user who is connecting to a switch to
default to the management VLAN. Recall that you configured the management VLAN as
VLAN 99 earlier in this lab.

________________________________________________________________________
Data Communiations & Networks 73
From the interface configuration mode, use the ip address command to assign the
management IP address to the switches.

S1(config)#interface vlan 99
S1(config-if)#ip address 172.17.99.11 255.255.255.0
S1(config-if)#no shutdown

S2(config)#interface vlan 99
S2(config-if)#ip address 172.17.99.12 255.255.255.0
S2(config-if)#no shutdown

S3(config)#interface vlan 99
S3(config-if)#ip address 172.17.99.13 255.255.255.0
S3(config-if)#no shutdown

Assigning a management address allows IP communication between the switches, and also
allows any host connected to a port assigned to VLAN 99 to connect to the switches.
Because VLAN 99 is configured as the management VLAN, any ports assigned to this
VLAN are considered management ports and should be secured to control which devices
can connect to these ports.

Step 7: Configure Trunking and the native VLAN for the Trunking ports on all
switches.

Trunks are connections between the switches that allow the switches to exchange
information for all
VLANS. By default, a trunk port belongs to all VLANs, as opposed to an access port, which
can only belong to a single VLAN. If the switch supports both ISL and 802.1Q VLAN
encapsulation, the trunks must specify which method is being used. Because the 2960
switch only supports 802.1Q trunking, it is not specified in this lab.

A native VLAN is assigned to an 802.1Q trunk port. In the topology, the native VLAN is
VLAN 99. An 802.1Q trunk port supports traffic coming from many VLANs (tagged traffic) as
well as traffic that does not come from a VLAN (untagged traffic). The 802.1Q trunk port
places untagged traffic on the native VLAN. Untagged traffic is generated by a computer
attached to a switch port that is configured with the native VLAN. One of the IEEE 802.1Q
specifications for Native VLANs is to maintain backward compatibility with untagged traffic
common to legacy LAN scenarios. For the purposes of this lab, a native VLAN serves as a
common identifier on opposing ends of a trunk link. It is a best practice to use a VLAN other
than VLAN 1 as the native VLAN.

Use the interface range command in global configuration mode to simplify configuring
Trunking.

________________________________________________________________________
Data Communiations & Networks 74
S1(config-if-range)#switchport mode trunk
S1(config-if-range)#switchport trunk native vlan 99
S1(config-if-range)#no shutdown
S1(config-if-range)#end

S2(config)# interface range fa0/1-5


S2(config-if-range)#switchport mode trunk
S2(config-if-range)#switchport trunk native vlan 99
S2(config-if-range)#no shutdown
S2(config-if-range)#end

S3(config)# interface range fa0/1-5


S3(config-if-range)#switchport mode trunk
S3(config-if-range)#switchport trunk native vlan 99
S3(config-if-range)#no shutdown
S3(config-if-range)#end

Verify that the trunks have been configured with the show interface trunk command.

S1#show interface trunk


Port Mode Encapsulation Status Native vlan
Fa0/1 on 802.1q trunking 99
Fa0/2 on 802.1q trunking 99

Port Vlans allowed on trunk


Fa0/1 1-4094
Fa0/2 1-4094

Port Vlans allowed and active in management domain


Fa0/1 1,10,20,30,99
Fa0/2 1,10,20,30,99

Step 8: Verify that the switches can communicate.

From S1, ping the management address on both S2 and S3.

S1#ping 172.17.99.12
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.17.99.12, timeout is 2
seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/9 ms

S1#ping 172.17.99.13
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.17.99.13, timeout is 2
seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 1/1/1 ms
Step 9: Ping several hosts from PC2.

________________________________________________________________________
Data Communiations & Networks 75
Ping from host PC2 to host PC1 (172.17.10.21). Is the ping attempt successful?
_______________

Ping from host PC2 to the switch VLAN 99 IP address 172.17.99.12. Is the ping attempt
successful? ________

Because these hosts are on different subnets and in different VLANs, they cannot
communicate without a Layer 3 device to route between the separate subnetworks.

Ping from host PC2 to host PC5. Is the ping attempt successful? _________

Because PC2 is in the same VLAN and the same subnet as PC5, the ping is successful

Step 10: Move PC1 into the same VLAN as PC2.

The port connected to PC2 (S2 Fa0/18) is assigned to VLAN 20, and the port connected to
PC1 (S2 Fa0/11) is assigned to VLAN 10. Reassign the S2 Fa0/11 port to VLAN 20. You do
not need to first remove a port from a VLAN to change its VLAN membership. After you
reassign a port to a new VLAN, that port is automatically removed from its previous VLAN.

S2#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
S2(config)#interface fastethernet 0/11
S2(config-if)#switchport access vlan 20
S2(config-if)#end

Ping from host PC2 to host PC1. Is the ping attempt successful? _________

Even though the ports used by PC1 and PC2 are in the same VLAN, they are still in different
subnetworks, so they cannot communicate directly.

Step 11: Change the IP address and network on PC1.

Change the IP address on PC1 to 172.17.20.22. The subnet mask and default gateway can
remain the same. Once again, ping from host PC2 to host PC1, using the newly assigned IP
address.

Is the ping attempt successful? _________

Why was this attempt successful?

Task 5: Document the Switch Configurations

On each switch, capture the running configuration to a text file and save it for future
reference.

Task 6: Clean Up

________________________________________________________________________
Data Communiations & Networks 76
Erase the configurations and reload the switches. Disconnect and store the cabling. For PC
hosts that are normally connected to other networks (such as the school LAN or to the
Internet), reconnect the appropriate cabling and restore the TCP/IP settings.

________________________________________________________________________
Data Communiations & Networks 77
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.

Other:
Total Score

Rating = (total_score/12) * 100

Lab performed on (date): ___________ Signature: ______________

Checked by: ________________________ Date: ______________

Marks Awarded: ____________

Comments:

________________________________________________________________________
Data Communiations & Networks 78
Experiment #14
Title: Basic Router Configuration and Static Route

Objective:
• Focus on the ability to configure a small network with static routes and rip as the
routing protocol
• To troubleshoot the network, preventing routing updates through an interface to
regulate advertised routes and observing the results.
• Configuring static routes to allow data transfer between routers without the use of
dynamic routing protocols.

The following steps are included in this exercise:


• Configure router interfaces
• Configure static routes
• Configure the RIP dynamic routing protocol
• Observe routing activity using the debug IP rip command.
• Examine routes using the show IP route command.
• Prevent routing updates through an interface
• Use the Passive-interface command and add a default route.
• Add default routes (gateways)
• Gather information about routing updates and routing protocols.

________________________________________________________________________
Data Communiations & Networks 79
Task 1. Configuring routers and workstations

Step 1. To make sure the routers are empty, clear the existing configuration.

Router#erase startup-config
Erasing the nvram filesystem will remove all files! Continue?
[confirm]
[OK]
Erase of nvram: complete
Router#reload

Step 2. Setup a network similar to the one in the diagram and start a HyperTerminal
session. Configure the hostnames, console, virtual terminal and enable passwords.

Step 3. Then configure the FastEthernet interfaces.

GAD(config)#interface fastethernet 0/0


GAD(config-if)#ip address 172.16.0.1 255.255.0.0
GAD(config-if)#no shutdown

BHM(config)#interface fastethernet 0/0


BHM(config-if)#ip address 172.18.0.1 255.255.0.0
BHM(config-if)#no shutdown

Step 4. Configure the serial interfaces.

GAD(config)#interface serial 0/0/0


GAD(config-if)#ip address 172.17.0.1 255.255.0.0
GAD(config-if)#clock rate 64000
GAD(config-if)#no shutdown

BHM(config)#interface serial 0/0/0


BHM(config-if)#ip address 172.17.0.2 255.255.0.0
BHM(config-if)#no shutdown

Save the configurations.

Step 5. Configure the workstations with the proper IP address, subnet mask and default
gateway.

The configuration for the host connected to the GAD Router is:
IP Address 172.16.0.2
IP subnet mask 255.255.0.0
Default gateway 172.16.0.1

The configuration for the host connected to the BHM Router is:
IP Address 172.18.0.2
IP subnet mask 255.255.0.0
Default gateway 172.18.0.1

________________________________________________________________________
Data Communiations & Networks 80
Step 6. Check connectivity between the workstations using ping. From the workstation
attached to the GAD router, ping the workstation attached to the BHM router.

C:\>ping 172.18.0.2

Pinging 192.168.16.2 with 32 bytes of data:


Request timed out.
Request timed out.
Request timed out.
Request timed out.
Ping statistics for 192.168.16.2:
Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms

Was the ping successful?_____________________________________________________

Why did the ping fail?________________________________________________________


_________________________________________________________________________

Step 7. Check the interfaces status on both routers with the command show ip interface
brief. Are all necessary interfaces up?___________________________________________

Step 8. Using the command show ip route, view the IP routing table for GAD.

GAD>show ip route

Gateway of last resort is not set


C 172.16.0.0/16 is directly connected, FastEthernet0
C 172.17.0.0/16 is directly connected, Serial0

Use the command show ip route, view the IP routing table for BHM.

BHM>show ip route

Gateway of last resort is not set


C 172.17.0.0/16 is directly connected, Serial0
C 172.18.0.0/16 is directly connected, FastEthernet0

Are all of the routes needed in the routing tables? _________________________________

Based on the output from the show ip route command on the GAD and BHM routers, can a
host on network 172.16.0.0 connect to a host on network 172.18.0.0? _________________

If a route is not in the routing table of the router to which the host is connected, the host
cannot reach the destination host.

________________________________________________________________________
Data Communiations & Networks 81
Task 2. Adding static routes

Step 1. To change this situation so that the hosts can ping each other, you have to add
static routes or run a routing protocol. In global configuration mode, add a static route on the
GAD router to network 172.18.0.0, and on the BHM router to network 172.16.0.0.

GAD(config)#ip route 172.18.0.0 255.255.0.0 172.17.0.2

BHM(config)#ip route 172.16.0.0 255.255.0.0 172.17.0.1

Why is a static route needed on both routers?


_________________________________________________________________________

Step 2. Use the command show ip route, view the IP routing table for GAD.

GAD>show ip route

Gateway of last resort is not set


C 172.16.0.0/16 is directly connected, FastEthernet0
C 172.17.0.0/16 is directly connected, Serial0
S 172.18.0.0/16 [1/0] via 172.17.0.2

View the IP routing table for BHM in the same way.

Are all of the routes needed in the routing tables? __________________________________

Can a host on network 172.16.0.0 see a host on network 172.18.0.0? ___________________

Step 3. Check connectivity between workstations using ping. The pings should be
successful.

Task 3 Configuring RIP

Step 1. Remove the static routes from the routers with the no command:

GAD(config)#no ip route 172.18.0.0 255.255.0.0 172.17.0.2

BHM(config)#no ip route 172.16.0.0 255.255.0.0 172.17.0.1

Step 2. Check the routing table to make sure the static routes was removed. When the static
routes are removed, you should not be able to ping between the hosts.

Step 3. Now, configure RIP as the routing protocol to dynamically exchange routing
information. Start with the GAD router.

GAD(config)#router rip
GAD(config-router)#network 172.16.0.0
GAD(config-router)#network 172.17.0.0
GAD(config-router)#exit
GAD(config)#exit

________________________________________________________________________
Data Communiations & Networks 82
Why do you have to add both network 172.16.0.0 and 172.17.0.0 to the rip network
statement?________________________________________________________________
_________________________________________________________________________

Save the configuration.

Step 4. Configure RIP on the BHM router.

BHM(config)#router rip
BHM(config-router)#network 172.17.0.0
BHM(config-router)#network 172.18.0.0
BHM(config-router)#exit
BHM(config)#exit

Save the configuration.

Step 5. Verify the connection by pinging from one host to the other. Was the ping
successful?
_________________________________________________________________________

Step 6. From the enable or privileged EXEC mode, examine the routing table entries using
the show ip route command on each router.

What are the entries in the GAD routing table?


_________________________________________________________________________
_________________________________________________________________________

What are the entries in the BHM routing table?


_________________________________________________________________________
_________________________________________________________________________

Step 7. Enter show ip protocol command on each router.

In the configuration, is “Routing protocol is RIP” displayed? ________________________.

Task 4. Troubleshooting RIP

Step 1. To make sure that routing updates are being sent, type the command debug ip rip in
the privileged EXEC mode prompt. Wait for at least 45 seconds.

Was there any output from the debug command? ________________________________

What did the output show ? ________________________________________________

Other debug commands that function with RIP are the following:

debug ip rip events


debug ip rip trigger
debug ip rip database
________________________________________________________________________
Data Communiations & Networks 83
To turn off specific debug commands type the no option, for example no debug ip rip events.
To turn off all debug commands type undebug all.

Step 2. Look at the RIP routing tables for each router. Enter show ip route rip.

List the routes listed in the routing table? _________________________________________


__________________________________________________________________________

What is the administrative distance? _____________________________________________

Task 5. Examine the routing table and routing updates

Step 1. To check the routing table for a specific route, from BHM privileged EXEC mode
prompt enter show ip route 172.16.0.0.

When was the last update? ________________________________________________

When did BHM receive the last RIP update? ___________________________________

Wait five seconds and enter show ip route 172.16.0.0 a second time.

What has changed from first time? ___________________________________________

Wait five seconds and enter show ip route 172.16.0.0 a third time.

What has changed from second time? ________________________________________

What is the default update time for RIP? __________________________________________

Step 2. Check the ip rip database on the BHM router. Type show ip rip database from the
privileged EXEC mode prompt.

When was the last update? ________________________________________________

Wait five second and enter show ip rip database.

What has changed from the first time? ________________________________________

Wait five seconds and enter show ip rip database.

What has changed from the second time? ________________________________________

________________________________________________________________________
Data Communiations & Networks 84
Task 6. Prevent routing updates

Step 1. To stop routing updates from GAD to BHM, enter global configuration mode and
then enter router configuration mode by entering the command router rip. Enter the
command passiveinterface serial 0/0. This will prevent the GAD router from advertising its
routes to the BHM router.

GAD(config)#router rip
GAD(config-router)#passive-interface serial0/0

Step 2. To confirm this, use the debug ip rip events command on the GAD router.
Verify from the output that the router is not sending updates out the interface to the
BHM router. Disable the debug output with the no debug all command.

Step 3. Also from the BHM router, issue the show ip route to verify that the route to
the GAD LAN has been removed.

Attempt to ping from the computers in GAD to the computers in BHM. What is the
response?___________________________________________________________

Step 4. Confirm that the BHM router is still sending update to GAD. To do this, use
the debug ip rip events command on the BHM router. Verify from the output that the
router is sending updates out the interface to the GAD router.

How many routes are being sent? ________________________________________

Disable the debug output with the no debug all command.

Usually the passive-interface command is used on the FastEthernet interfaces


where end devices are connected. There is no need to send routing updates if no
routers are connected in the other end.

Task 7. Add default routes

Step 1. Since BHM is not getting routing updates, it does not have a route to the outside
world. It needs to be provided with a default route. A default route (gateway) is the route that
data is sent out if the routing table does not have a specific route to use.

From the global configuration mode of BHM, enter:

BHM(config)#ip route 0.0.0.0 0.0.0.0 172.17.0.1

________________________________________________________________________
Data Communiations & Networks 85
Verify the default route is in the BHM routing table by issuing the show ip route command.
There should be an output similar to the following:

BHM#show ip route Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile,


B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, * - candidate default
U - per-user static route, o - ODR

Gateway of last resort is 172.17.0.1 to network 0.0.0.0


C 172.17.0.0/16 is directly connected, Serial0
C 172.18.0.0/16 is directly connected, Ethernet0
S* 0.0.0.0/0 [1/0] via 172.17.0.1
BHM#

What is the Gateway of last resort listed? ______________________________________

What does the gateway of last resort mean?______________________________________

Be sure to be able to ping from the computers in GAD to the computers in BHM. If not,
check routing tables and interfaces.

Task 8. RIP Version 2 and Debugging

Step 1. Examine the debug command Start to examine the debug command on the GAD or
BHM router.

1. At the privileged EXEC mode, type debug ip?

Which routing protocols can use debug commands?________________________________


_________________________________________________________________________

2. At the privileged EXEC mode type debug ip rip ? How many options are available for this
command?________________________________________________________________
_________________________________________________________________________

3. Use the debug ip rip command on each router to examine the routing table entries. What
are the three operations that can take place listed in the rip debug statements?
_________________________________________________________________________
_________________________________________________________________________

Turn off debugging by typing either no debug ip rip or undebug all.

RIPv2 messages include the subnet mask in a field in the routing updates. This allows
subnets and their masks to be included in the routing updates, and discontiguous networks
can be used without any problems. The RIP protocol summarizes networks at major network
boundaries, but the automatic summarization in RIPv2 can be turned off with the command
no auto-summary.

________________________________________________________________________
Data Communiations & Networks 86
Task 9. Configure RIP v.2

Step 1. Enable version 2 of the RIP routing protocol on the GAD router only.

GAD(config)#router rip
GAD(config-router)#version 2
GAD(config-router)#exit

Step 2. Start the debugging on the GAD router again. Does a problem occur now when we
have RIP v.2 on the GAD router?
_________________________________________________________________________

What is the problem? ________________________________________________________


_________________________________________________________________________

Step 3. Instead of waiting for the routers to time out, type clear ip route * to clear the routing
table. Then type show ip route. What has happened to the routing table?
_________________________________________________________________________
_________________________________________________________________________

Will it be updated to include RIP routes if the debug output says the update is ignored?
_________________________________________________________________________

Turn of the debugging.

Step 4. Start the debug RIP function on the BHM router. Does a problem occur now when
RIP v.2 is on the GAD router? _________________________________________________

What is the problem? ________________________________________________________


_________________________________________________________________________
_________________________________________________________________________

Step 5. Clear the routing table on the BHM router, then take a look at the routing table to
see if anything has changed.

Step 6. Enable version 2 of the RIP routing protocol on the BHM router. Use the debug
function to examine the packet traffic on the GAD router. Use the command debug ip packet
.

How many source addresses are used when a RIP update is sent?____________________

Why is multiple source addresses used?_________________________________________


_________________________________________________________________________

What is the source address, and why is this address used?


_________________________________________________________________________
_________________________________________________________________________

Step 7. Start the RIP database debugging by typing debug ip rip database (not on 2500
series routers) then clear the routing table. Are the old routes in the table deleted?
_________________________________________________________________________
________________________________________________________________________
Data Communiations & Networks 87
Are new routes added back into the table? _______________________________________

What does the last entry in the output debug output say? ___________________________
__________________________________________________________________________

Turn off the debugging.

Step 8. Now, use the debug function to see routing updates. Type debug ip rip events on the
BHM router. What interfaces are the routing updates sent on?
_________________________________________________________________________
_________________________________________________________________________

How many routes are in the routing updates that are being sent?______________________

Once the previous steps are completed, erase the start-up configuration, logoff by typing
exit, and turn the router off. Then remove and store the cables.

________________________________________________________________________
Data Communiations & Networks 88
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.

Other:
Total Score

Rating = (total_score/12) * 100

Lab performed on (date): ___________ Signature: ______________

Checked by: ________________________ Date: ______________

Marks Awarded: ____________

Comments:

________________________________________________________________________
Data Communiations & Networks 89
Experiment #15
Title: Configuring RIP on CISCO Router

Objective:
• To observe how the dynamic routing protocols RIP work.
• To observe the different types of packets used by the RIP.

This lab involves 4 routers, 4 PCs and 4 hubs.

This lab starts with the network topology below. Routing tales were configured
manually, here you run the routing protocol RIP to perform the same task. You will
configure RIP on the Cisco routers. Figure 13.1 and Table 13.1 describe the network
configuration for this part of the lab. RIP is one of the oldest dynamic routing protocols on
the Internet that is still in use. This lab uses the latest revision of RIP, RIPv2 (RIP version 2).

RIP is an intradomain routing protocol that uses a distance vector approach to


determine the paths between routers. RIP minimizes the number of hops on each path,
where each point-to-point link or LAN constitutes a hop.

Each RIP-enabled router periodically sends the content of its routing table to all its
neighboring routers in an update message. For each routing table entry, the router sends
the destination (host IP address or network IP address and associated prefix) and the
distance to the destination measured in hops. When a router receives an update message
from a neighboring router, it updates its own routing table.

Fig 13.1 Network Topology

________________________________________________________________________
Data Communiations & Networks 90
PC Ethernet Interface etho0 Ether Interface eth1
PC1 10.0.1.10/24 Disabled
PC2 10.0.2.10/24 Disabled
PC3 10.0.3.10/24 Disabled
PC4 10.0.4.10/24 Disabled

Ethernet Interface Ethernet Interface


Cisco Routers
FastEthernet 0/0 FastEthernet 0/1
Router 1 10.0.1.1/24 10.0.2.1/24
Router 2 10.0.3.2/24 10.0.2.2/24
Router 3 10.0.3.3/24 10.0.4.3/24

Table 13.1 IP addresses of the CISCO Routers and PCs

In this exercise, you will configure all the routers to run RIP. After the configuration,
all the routers should be able to ping all the other routers. Following is a brief overview of the
basic commands used to configure RIP on a Cisco router. Make sure you type in the
command in the correct command mode (note the prompt).

IOS MODE: GLOBAL CONFIGURATION

Enables or disables RIP on the local router.

IOS MODE: PRIVILEGED EXEC

Enables or disables a debugging mode where the router displays a message for each
received RIP packet.

IOS MODE: ROUTER CONFIGURATION

Associates or disables the network IP addresses Netaddr with RIP. RIP sends updates only
on interfaces on which the network address has been associated with RIP.

Sets or disables the interface Iface in RIP passive mode. On an interface in passive
mode, the router processes incoming RIP packets but does not transmit RIP packages.

Increases the metric (hop count) of incoming RIP packages that arrive or outgoing RIP
packets that are sent on interface Iface by value.

________________________________________________________________________
Data Communiations & Networks 91
update: The time interval between transmissions of RIP update messages (default: 30
seconds).
invalid: The time interval after which a route, which has not been updated, is declared
invalid (default: 180 seconds).
hold-down: Determines how long after a route has been updated as unavailable. A router
will wait before accepting a new route with a lower metric. This introduces a delay for
processing incoming RIP packets with routing updates after a link failure (default: 180
seconds).
flush: The amount of time that must pass before a route that has not been updated is
removed from the routing tables (default: 240 seconds).

Sets the router not to perform triggered updates, when the next transmission of routing
updates is due in time. If time is set to the same value as the update timer, then triggered
update are disabled. In RIP, a triggered update means that a router sends a RIP packet with
a routing update, whenever one of its routing table entries changes.

1. Connect the PCs and the Cisco Routers as shown in Figure 4.1. The PCs and routers are
connected with Ethernet hubs.

2. Start Routers by clicking the right button and select Start; then, open a terminal by
clicking the right button and select Console.

3. On Router1, Router2, and Router3, configure the IP addresses as shown in Table 4.1,
and enable the routing protocol RIP. The commands to set up Router 1 are as follows:

________________________________________________________________________
Data Communiations & Networks 92
4. After you have configured the routers, check the routing table at each router with the
show IP route command. Each router should have four entries in the routing table: two
entries for directly connected networks and two other entries for remote networks that were
added by RIP.

5. From each router, issue a ping command to the IP address of interfaces FastEthernet0/0
and FastEthernet0/1 on all remote routers. Once you can successfully contact the IP
addresses of all routers, proceed to the next exercise.

________________________________________________________________________
Data Communiations & Networks 93
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.

Other:
Total Score

Rating = (total_score/12) * 100

Lab performed on (date): ___________ Signature: ______________

Checked by: ________________________ Date: ______________

Marks Awarded: ____________

Comments:

________________________________________________________________________
Data Communiations & Networks 94

You might also like