Data Comm Lab Manual v.5
Data Comm Lab Manual v.5
Laboratory Manual
College of Computer Studies
Conducted by:
Checked by:
Date:
________________________________________________________________________
Data Communiations & Networks 1
Table of Contents
________________________________________________________________________
Data Communiations & Networks 2
COMPUTER LABORATORY SAFETY PROCEDURES AND
GUIDELINES
Don’ts
1. Do not eat or drink in the laboratory
2. Avoid stepping on electrical wires or any other computer cables.
3. Do not open the system unit casing or monitor casing, particularly
when the power is turned on. Some internal components hold
electric voltages of up to 30000 volts, which can be fatal.
4. Do not insert metal objects such as clips, pins and needles into the
computer casings. They may cause fire.
5. Do not remove anything from the computer laboratory without
permission.
6. Do not touch, connect or disconnect any plug or cable without your
lecturer/laboratory technician’s permission.
7. Do not misbehave in the computer laboratory.
________________________________________________________________________
Data Communiations & Networks 3
General Safety Guidelines to be followed at all times
1. All users of the laboratory are to follow the directions of
Academic/Laboratory technician staff member.
2. Food or drinks are not permitted at any time in the laboratory.
3. Students should not attempt to repair, open, tamper or interfere
with any of the computer, printing,cabling, air conditioning or other
equipment in the laboratory.
4. Students should be aware of office ergonomic guidelines for
correct posture when using computer equipment.
5. Please treat fellow users of the laboratory, and all equipment
within the laboratory, with the appropriate level of care and
respect.
________________________________________________________________________
Data Communiations & Networks 4
Experiment #1
Title: Introduction to Networking Equipment
Objective
________________________________________________________________________
Data Communiations & Networks 5
TASK 2: Check off all true statements regarding the benefits of OSI Model
________________________________________________________________________
Data Communiations & Networks 6
TASK 4: Write each statement to its corresponding Layer
________________________________________________________________________
Data Communiations & Networks 7
Rubrics for Laboratory
Unsatisfactory Amateur Exceptional
Criteria Score
1 2 3
One of the
Two or more
previous All required
conditions and
conditions and laboratory
Procedure instructions is
instruction is not instructions are done
not met
met and present.
satisfactorily
satisfactorily.
Results are
present, though
Results are Results and data are
too disorganized
Required Result present, but clearly recorded and
or poorly
unclear. organized.
recorded to
make sense
The data and
Analysis is
observations are
somewhat
Analysis is poor, analyzed accurately,
lacking in
not enough data trends are noted and
Analysis insight not
inaccurate explained, enough
enough data was
analysis data was taken to
gathered or
establish
established.
conclusively.
The conclusion One of the The conclusion
does not much conditions is not follows data without
Conclusion
laboratory result met wild guesses or leaps
presented. satisfactorily of logic.
Other:
Total Score
Comments:
________________________________________________________________________
Data Communiations & Networks 8
Experiment #2
Networking Basics Commands
Objective
• Gather information, including connection, host name, Layer 2 MAC address and
Layer 3 TCP/IP network address information.
• Compare network information to other PCs on the network.
• Learn to use the TCP/IP Packet Internet Groper (ping) command from a workstation.
• Learn to use the Trace Route (tracert) command from a workstation.
• Observe name resolution occurrences using WINS and/or DNS servers.
Background
This lab assumes the use of any version of Windows. This is a non-destructive lab and can
be done on any machine without concern about changing the system configuration. Ideally,
this lab is performed in a Computer Lab or other LAN environment that connects to the
Internet.
This lab can be done from a single remote connection via a Dial up modem or DSL-type
connection.
In the following Lab Manual the lab runs only on Windows NT/2000/XP systems. Extra
Steps should be done on Windows 95/98/ME systems.
________________________________________________________________________
Data Communiations & Networks 9
Fig 2.1 ipconfig on Command Prompt
This first screen shows the IP address, subnet mask, and default gateway. The IP address
and the default gateway should be in the same network or subnet, otherwise this host would
not be able to communicate outside the network. In the figure the subnet mask tells us that
the first three octets must be the same to be in the same network.
Note: If this computer is on a LAN, the default gateway might not be seen if it is running
behind a Proxy Server. Record the following information for this computer.
Step 4. Compare the TCP/IP configuration of this computer to others on the LAN
If this computer is on a LAN, compare the information of several machines.
Are there any similarities?____________________________________________________
What is similar about the IP addresses?_________________________________________
What is similar about the default gateways? ______________________________________
The IP addresses should share the same network portion. All machines in the LAN should
share the same default gateway.
Record a couple of the IP Addresses:___________________________________________
________________________________________________________________________
Data Communiations & Networks 10
Fig 2.2 ipconfig/all on Command Prompt
The host name, including the computer name and NetBIOS name should be displayed.
Also, the DHCP server address, if used, and the date the IP lease starts and ends should be
displayed. Look over the information. Entries for the DNS, used in name resolution servers,
may also be present.
The previous figure reveals that the router is performing both DHCP and DNS services for
this network. This would likely be a small office or home office (SOHO) or small branch
office implementation.
Notice the Physical Address (MAC) and the NIC model (Description).
In the LAN, what similarities about the Physical (MAC) Addresses are seen?
_________________________________________________________________________
While not a requirement, most LAN administrators try to standardize components like NICs.
Therefore, it would not be surprising to find all machines share the first three Hex pairs in
the adapter address. These three pairs identify the manufacturer of the adapter.
________________________________________________________________________
Data Communiations & Networks 11
Task 2: Using “ping” and “tracert “
Objective
Background
This lab assumes the use of any version of Windows. This is a non-destructive lab and can
be done on any machine without concern of changing the system configuration. Ideally, this
lab is performed in a LAN environment that connects to the Internet. It can be done from a
single remote connection via a modem or DSL-type connection. The student will need the IP
addresses that were recorded in the previous part of the lab.
In the window, type ping, a space, and the IP address of a computer recorded in the
previous lab.
The following figure shows the successful results of ping to this IP address.
________________________________________________________________________
Data Communiations & Networks 12
ping uses the ICMP echo reply feature to test physical connectivity. Since ping reports on
four attempts, it gives an indication of the reliability of the connection. Look over the results
and verify that the ping was successful. Is the ping successful?
Try to ping the hostname of the computer that was recorded in the previous lab. The figure
shows the successful result of the ping the hostname.
Look over the results. Notice that the first line of output shows the host name, m450
in the example, followed by the IP address. This means the computer was able to resolve
the host name to an IP address. Without name resolution, the ping would have failed
because TCP/IP only understands valid IP addresses, not names.
________________________________________________________________________
Data Communiations & Networks 13
If the ping was successful, it means that connectivity and discovery of IP addresses can be
done with only a hostname. In fact, this is how many early networks communicated. If
successful, then ping a hostname also shows that there is probably a WINS server working
on the network.
Note: It would not be uncommon for a Windows 2000 or XP networks to not support this
feature. It is an old technology and often unnecessary. If the last ping worked, try to ping
the hostname of any another computer on the local network. The following figure shows the
possible results.
Note: The name had to be typed in quotes because the command language did not like the
space in the name.
Fig 2.7 ping failure for Microsoft because some Microsoft routers are configured to
ignore ping
Notice that the DNS server was able to resolve the name to an IP address, but there is no
response. Some Microsoft routers are configured to ignore ping requests. This is a
frequently implemented security measure.
ping some other domain names and record the results. For example, ping www.msn.de
________________________________________________________________________
Data Communiations & Networks 15
Fig 2.8 tracert website on Command Prompt
tracert is TCP/IP abbreviation for trace route. The preceding figure shows the successful
result when running tracert from Bavaria in Germany. The first output line shows the FQDN
followed by the IP address. Therefore, a DNS server was able to resolve the name to an IP
address. Then there are listings of all routers the tracert requests had to pass through to get
to the destination. tracert uses the same echo requests and replies as the ping command,
but in a slightly different way. Observe that tracert actually contacted each router three
times. Compare the results to determine the consistency of the route. Notice in the above
example, that there were relatively long delays after router 11 and 13, possibly due to
congestion. The main thing is that there seems to be relatively consistent connectivity.
Each router represents a point where one network connects to another network and the
packet was forwarded through.
Try tracert on other domain names or IP addresses and record the results. An example is
tracert www.hec.gov.pk
________________________________________________________________________
Data Communiations & Networks 16
Fig 2.9 tracert a nearby Router
________________________________________________________________________
Data Communiations & Networks 17
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.
Other:
Total Score
Comments:
________________________________________________________________________
Data Communiations & Networks 18
Experiment #3
Title: Computer Network Cabling
Objective
Coaxial Cable has two wires of copper. The core wire lies in the center and it is made of
solid conductor. The core is enclosed in an insulating sheath. The second wire is wrapped
around over the sheath and that too in turn encased by insulator sheath. This all is covered
by plastic cover.
Twisted Pair Cable is made of two plastic insulated copper wires twisted together to form a
single medium. Out of these two wires, only one carries the actual signal and another is
used for ground reference. The twists between wires are helpful in reducing noise (electro-
magnetic interference) and crosstalk.
Fiber Optic works on the properties of light. When light ray hits at critical angle, it tends to
refract at 90 degree. This property has been used in fiber optic. The core of fiber optic cable
is made of high quality glass or plastic
________________________________________________________________________
Data Communiations & Networks 19
Twisted Pair (UTP/STP) Categories
1. Unshielded or Shielded
2. Twisted pair of insulated conductor
3. Covered by insulating sheath
________________________________________________________________________
Data Communiations & Networks 20
Task 1. Define each characteristic of copper
1. Malleability
_________________________________________________________________________
_________________________________________________________________________
2. Ductility
_________________________________________________________________________
_________________________________________________________________________
3.Strong
_________________________________________________________________________
_________________________________________________________________________
4.Durable
_________________________________________________________________________
_________________________________________________________________________
5. Corrosion Resistant
_________________________________________________________________________
_________________________________________________________________________
________________________________________________________________________
Data Communiations & Networks 21
Fig 3.6 Crimping tool
________________________________________________________________________
Data Communiations & Networks 22
Step 3. Arrange wires
Straight through Cable Connection - use to connect network device to other different
network device (Example: PC to Switch, Router to Switch)
________________________________________________________________________
Data Communiations & Networks 23
2. TIA/EIA 568B: OW-O, GW-Bl, BlW-G, BrW-Br
Crossover Cable Connection - use to connect network device to other same network
device (Example: PC to PC, Switch to Switch)
Step 5. Attach connector – Maintain wire order from left to right, with RJ45 tab facing down
Step 6. Check if the cable is attached to the RJ45 correctly – check if wire extends to the
end of the RJ45, check if the sheath is inserted well inside the RJ45 lock.
Step 8. Test network cable – Use the network tester if the cable is working properly
according to its cable connection.
________________________________________________________________________
Data Communiations & Networks 26
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.
Other:
Total Score
Comments:
________________________________________________________________________
Data Communiations & Networks 27
Experiment #4
Title: Network Connection and Building a Peer to Peer Network
Objective:
• Demonstrate basic PC network
• Learn how to configure TCP/IP
• Demonstrate connection to the internet
• Building a simple peer to peer network
• Be familiar with the different cable types
• Investigate PC network using ping, tracert and ARP table
In this lab, you will build a simple Peer-to-Peer network between two PCs. You will also
configure an address so that each station can communicate using TCP/IP. Finally, you will
use a TCP/IP program called ping to test your network.
Step 1. Wire your pod - You will first need to wire your hosts according to the map above.
1. Locate your assigned pod and its corresponding computers. Turn the PCs on. If you have
trouble, ask a lab aid for assistance
2. In order to connect the PCs to each other, you will need one crossover patch cable.
Connect the crossover patch cable from Host A to Host B. .
Step 2. Assign an IP address manually - Now that you have built the physical layer of your
Ethernet LAN, you will configure TCP/IP on each computer. Each PC will need an IP
address in order to communicate using TCP/IP.
1. Examine your computers IP (Layer 3) and MAC (Layer 2) addresses. Use the command
ipconfig/all in the MS-DOS prompt.
________________________________________________________________________
Data Communiations & Networks 28
2. This time you need to configure your computer with an IP address manually. In the
previous elaboration, the IP address was assigned dynamically from a DHCP server.
Configure your host with the appropriate IP address and subnet mask.
Step 3 Test the connectivity - To test your newly configured network, you will use the ping
utility.
1. To connect the PCs to the switch, you will need three straight-through patch cables. To
connect your Ethernet switch to the Internet hub/switch, you will need one crossover cable.
2. Use the straight-through cables to connect the three PCs to the first three ports on the
Ethernet switch, and use the crossover cable to connect port 4 on the Ethernet switch to the
Internet hub. A green light should appear above the first four switch ports. It means the ports
are up and functioning. Make sure that the Internet hub/switch is connected to the Internet.
1. On the desktop right click on the Network Neighborhood or My Network Places icon and
choose Properties.
2. Right click on Local Area Connection and choose Properties. That will bring up a window
similar to the one shown in figure 4.1.
________________________________________________________________________
Data Communiations & Networks 30
3. Select the appropriate TCP/IP entry and click on the Properties button, or double click
directly on the TCP/IP entry.
4. To enable DHCP, select Obtain an IP adress automatically, and click OK. This will make
the host to get an IP address dynamically from a DHCP server, and the host will be able to
access the Internet. When you returns to the Local Area Connection Properties window,
click OK again.
Step 3. Check your TCP/IP configuration. At this point, you have built the physical layer of
your Ethernet LAN, connected it to the Internet, and set your computer to obtain an IP
address automatically.
1. To check your new IP address, use ipconfig. To access the command line, click the Start
Menu, select Run, and then type cmd in the run box. Click OK.
2. Once you have the command box, also called the MS-DOS prompt, you can run the
ipconfig by typing ipconfig and press enter.
________________________________________________________________________
Data Communiations & Networks 31
Fig 4.5 MS-DOS Prompt
3. You can also use the /all option with the ipconfig command, so you can get expanded
information on your systems IP configuration. In the MS-DOS prompt, type ipconfig /all .
Step 4. Test the connectivity - You can test your automatic configuration by using the ping
program. Ping is used to send a very small “test” packet to a TCP/IP device to determine if a
working connection between hosts exists. Ping uses a protocol called Internet Control
Message Protocol (ICMP). Ping works by sending an ICMP echo request to a destination IP
address. Under normal circumstances, a host that receives the echo request will send back
an “echo reply” immediately
1. From each host MS-DOS prompt, type: ping 194.47.13.65 , where the IP address after
the ping command is the IP address to the default gateway. This will test the connectivity
between the PC and the default gateway.
2. From Host A, ping Host B’s IP address and Host C’s IP address. Also try pinging from
Host B and Host C to Host A. 3. As a final test, try pinging a website on the Internet. Type
________________________________________________________________________
Data Communiations & Networks 32
ping www.cisco.com . This will test the connectivity between the PC and a website on the
Internet.
Was the ping successful? ___________ The 127.0.0.0 network is reserved for loopback
testing. If the ping is successful, then TCP/IP is properly installed and functioning on the
computer.
Step 6 Display the ARP table - ARP is used as a tool for confirming that a computer is
successfully resolving network Layer 3 addresses to Media Access Control (MAC) Layer
2 addresses. The TCP/IP network protocol relies on IP addresses like 192.168.14.211 to
identify individual devices and to assist in navigating data packets between networks. While
the IP address is essential to move data from one LAN to another, it cannot deliver the data
in the destination LAN by itself. Local network protocols, like Ethernet or Token Ring, use
the MAC, or Layer 2, address to identify local devices and deliver all data. ARP maintains a
table in the computer of IP and MAC address combinations. In other words, it keeps track of
which MAC address is associated with an IP address. If ARP does not know the MAC
address of a local device, it issues a broadcast using the IP address. This broadcast
searches for the MAC address that corresponds to the IP address. If the IP address is active
on the LAN, it will send a reply from which ARP will extract the MAC address. ARP will then
add the address combination to the local ARP table of the requesting computer. MAC
addresses and therefore ARP are only used within the LAN.
1. In the MS-DOS prompt, type arp –a and press Enter. Are there any entries in the ARP
table? _________________________________________________________________
Do not be surprised if there are no entries. Any addresses that are unused will be removed
after a couple of minutes.
2. Try pinging a couple of local addresses and a website. Then re-run the arp command.
3. Try the command arp -? to see the help feature and look over the options. If you want to
see the help feature options for ping and tracert, type ping -? or tracert -? .
Step 7. Troubleshoot the path of a packet - The ping program is incredibly useful for
testing IP connectivity between hosts. In some cases, you may need to troubleshoot the
path IP packets take to reach a particular destination. IP packets travel through routers to
reach other networks. If a certain destination.
network is far away, IP packets may have to be routed through dozens of routers to reach
their destination. Each time an IP packet passes through a router is called a “hop.”
________________________________________________________________________
Data Communiations & Networks 33
1. You can use a trace utility to identify the addresses of the routers along the path IP
packets take to a destination. Trace programs are typically called traceroute, but in Windows
the trace program is called tracert. In the MS-DOS prompt type tracert www.cisco.com
2. The tracert output will take a couple of minutes to generate. What is happening while you
wait? Where do the IP addresses that appear in the output comes from?
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
Peer-to-Peer Network Objective In this lab, you will build a simple Peer-to-Peer network
between two PCs.
________________________________________________________________________
Data Communiations & Networks 34
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.
Other:
Total Score
Comments:
________________________________________________________________________
Data Communiations & Networks 35
Experiment #5
Title: Workstation ARP
Objective
• Introduce Address Resolution Protocol (ARP) and the arp –a workstation command.
• Explore the arp command help feature using the -? option.
Equipment Required
This lab assumes the use of any version of Windows. This is a non-destructive lab
and can be performed with a home machine without concern of changing the system
configuration. Ideally, this lab will be done in a classroom or other LAN connected to the
Internet. It can be done from a single remote connection via a modem or DSL-type
connection.
MAC addresses and therefore ARP are only used within the LAN. When a computer
prepares a packet for transmission, it checks the destination IP address to see if it is part of
the local network. It does this by checking to see if the network portion of the IP address is
the same as the local network. If it is, the ARP process is consulted to get the MAC address
of the destination device using the IP address. The MAC address is then applied to the data
packet and used for delivery. If the destination IP address is not local, the computer will
need the MAC address of the default gateway. The default gateway is the router interface
that the local network is connected to in order to provide connectivity with other networks.
The gateway MAC address is used because the packet will be delivered there and the
router will then forward it to the network it is intended for. If the computer does not receive
________________________________________________________________________
Data Communiations & Networks 36
any packets from an IP address after a few minutes, it will drop the MAC/IP entry from the
ARP table assuming the device has logged off. Later attempts to access that IP address will
cause ARP to do another broadcast and update the table.
If the connection to the Internet is dial-up, connect to the ISP to ensure that the
computer has an IP address. In a TCP/IP LAN with a Dynamic Host Configuration Protocol
(DHCP) server, it should not be necessary to do this step.
Windows NT / 2000 / XP users: Use the Start menu to open the Command Prompt
window. This window is similar to the MS-DOS window on older Windows versions:
Start > Programs > Accessories > Command Prompt or Start > Programs > Command
Prompt
Windows 95 / 98 / ME users: Use the Start menu to open the MS-DOS Prompt window:
Start > Programs > Accessories > MS-DOS Prompt or Start > Programs > MS-DOS
Prompt
1. In the window type arp -a and press Enter. Do not be surprised if there are no entries.
The message displayed will probably be, ‘No ARP Entries Found’. Windows computers
remove any addresses that are unused after a couple minutes.
2. Try pinging a couple local addresses and a website URL. Then re-run the command. The
figure below shows a possible result of the arp -a command. The MAC address for the
website will be listed because it is not local, but that will cause the default gateway to be
listed. In the example below 10.36.13.1 is the default gateway while the 10.36.13.92 and
10.36.13.101 are other network computers. Notice that for each IP address there is a
physical address, or MAC, and type, indicating how the address was learned.
________________________________________________________________________
Data Communiations & Networks 37
Step 4 Ping several URLs
1. Ping the following URLs and note the IP address of each. Also select one additional URL
to ping and record it below:
www.cisco.com: _____________________________
www.msn.de: _______________________________
2. Now run the arp –a command again and record the MAC addresses for each of the
above next to their IP addresses. Can it be done? ___________________________
4. What MAC address was used in delivering each of the pings to the URLs? ____________
_______________________ Why? ____________________________________________
________________________________________________________________________
Data Communiations & Networks 38
Step 6 Use help with tracert and ping - Try tracert -? and then ping -? to see the options
available for the commands used previously.
In looking at the help for ping, notice the –t option, which will send continuous pings,
not just four. More importantly, notice the two commands to stop it:
1) Control-Break
2) . Control-C
These two-key commands are common for stopping runaway activities. Try pinging a
neighboring computer with the -t option and then try the Control-Break and Control-C
features. An example in the above network would be ping 10.36.13.101 -t and then press
Enter. Be sure to use the Control-C command to stop the pings.
Result
Based on observations made today, what could be deduced about the following results?
Computer 1
IP Address: 192.168.12.113
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.12.1
Pings and tracert to 207.46.28.116 were both successful.
What will be the ARP table entry associated with this address and why?
________________________________________________________________________
Data Communiations & Networks 39
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.
Other:
Total Score
Comments:
________________________________________________________________________
Data Communiations & Networks 40
Experiment #6
Title: Basic IP Addressing
Objective:
• Name the five different classes of IP addresses
• Describe the characteristics and use of the different IP address classes
• Identify the class of an IP address based on the network number
• Determine which part, or octet, of an IP address is the network ID and which is the
host ID
• Identify valid and invalid IP host addresses based on the rules of IP addressing
• Define the range of addresses and default subnet mask for each class
Introduction:
This lab exercise helps develop an understanding of IP addresses and how TCP/IP
networks operate. It is primarily a written lab exercise. However, it could be worthwhile to
review some real network IP addresses using the command line utilities ipconfig for
windows. IP addresses are used to uniquely identify the individual TCP/IP networks and
hosts, such s computers and printers, on those networks in order for devices to
communicate. Workstations and servers on a TCP/IP network are called hosts and each has
a unique IP address. This address is referred to as its host address. TCP/IP is the most
widely used protocol in the world. The internet or World Wide Web only uses IP addressing.
In order for a host to access the internet, it must have an IP address.
There are five different classes of IP addresses, and depending on the class, the
network and host part of the address will use a different number of bits. In this lab,different
classes of IP addresses will be working with and to help become familiar with the
characteristics of each. The understanding of IP addresses is critical to the understanding of
________________________________________________________________________
Data Communiations & Networks 41
TCP/IP and internetworks in general. The understanding of IP address is critical to the
understanding of TCP/IP and internetworks in general.
Address classes
There are five classes of IP addresses, A through E. Only the first three classes are
used commercially. A class A network address is discussed in the table to get started. The
first column is the class of IP address. The second column is the first octet, which must fall
within the range shown for a given class addresses. The class A address must start with a
number between 1 and 126. The first bit of a class A address is always zero, meaning the
high order bit (HOB) of the 128 bit cannot be used. 127 is reserved for loopback testing. The
first octet alone defines the network ID for a class A network address.
126 16,777,214
A 1 - 126 0 N.H.H.H 255.0.0.0
(27- 2) (224 - 2)
16,382 65,534
B 128 – 191 10 N.N.H.H 255.255.0.0
(214 - 2) (218 - 2)
2,097,150 254
C 192 – 223 110 N.N.N.H 255.255.255.0
(221 - 2) (28 -2)
D 224 – 239 111 Reserved for multicasting
E 240 - 254 11110 Experimental: used for research
Note: Class A address 127 cannot be used and is reserved for loopback and diagnostic
functions.
________________________________________________________________________
Data Communiations & Networks 42
Step 2. Determine basic IP addressing
Use the IP address chart and your knowledge of IP address classes to answer the following
questions:
1. What is the decimal and binary range of the first octet of all possible Class B IP
addresses?
4. What is the maximum number of usable hosts with a Class C network address?
_______________
7.How many octets are there in an IP address? _____________ How many bits per octet?
________
The host portion will be all zeros for the network ID. Enter just the octets that make up
the host. The host portion will be all ones for a broadcast. The network portion of the
address will be all ones for the subnet mask. Fill in the following table:
Address Network Host Network Default
Host IP Address
Class Address Address Broadcast Subnet mask
216.14.55.137
123.1.1.15
150.127.221.244
194.125.35.199
175.12.239.244
________________________________________________________________________
Data Communiations & Networks 43
Step 4. Given an IP address of 142.226.0.15 and a subnet mask of 255.255.255.0,
answer the following questions.
_________________________________________________________________________
_________________________________________________________________________
Step 5. Determine which IP host addresses are valid for commercial networks.
For the following IP host addresses, determine which are valid for commercial networks and
indicate why or why not. Valid means it could be assigned to any of the following:
• Workstations
• Servers
• Printer
• Router Interface
• Any other compatible device
________________________________________________________________________
Data Communiations & Networks 44
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.
Other:
Total Score
Comments:
________________________________________________________________________
Data Communiations & Networks 45
Experiment #7
Title: Network Topology
Objective
• To become familiar with Local Area Network Topologies
• To become familiar with Network Devices
• To become familiar with cables and computers
• To apply IP addressing to different network devices
LAN Topology is the way how the PCs are connected with each other is called physical or
network topology.
Bus Topology – It comprises of stations that are connected to a single communication line.
If the destination field does not match the station address, the station discards the
information frame back onto the bus. If it matches the station address, it accepts the
information frame and processes the frame.
Ring Topology – LAN that has each station attached to an adjacent station using point to
point links from physical ring. Each station attached and active to the ring generates the
information frame, then the retransmit information frame on the ring. The ring itself is
logically circular and flow of information.
________________________________________________________________________
Data Communiations & Networks 46
Star Topology – It comprises a number of stations directly to the central station
communications on the connecting links.
Tree Topology – The corollary to the topology is tree topology. It extends the branches of
the bus topology allowing more stations to access the bus.
Using a packet tracer, create a network architecture using the topology discussed,
you can use different network devices like routers, switch, hubs, computers and network
media to connect devices.
Step 1. Identify the proper Ethernet cable and connect the network devices.
The connection between the network devices can be accomplished using a straight through
and crossover patch cable.
Plug in and turn on the computers. To verify the computer connections, ensure that the link
lights on the network devices are lit.
________________________________________________________________________
Data Communiations & Networks 47
Step 3. Access the IP setting windows
1. Click on Start> Settings> Control Panel and then click the network connection icon
2. Select the Local Area Network Connection and click on Change setting of this
connection.
3. Select TCP/IP protocol icon that is associated with the NIC on this PC.
________________________________________________________________________
Data Communiations & Networks 48
You can use this space for your Information table:
________________________________________________________________________
Data Communiations & Networks 49
Step 2. Access the command or MS-DOS prompt
1. Test connectivity from one PC to the other through the switch by pinging the IP address of
the opposite computer. Use the following command at the command prompt.
2. Look for results similar to those shown below. If not, check the PC connections and
TCP/IP settings for both PCs. What was he ping result?______________________
Step 4. Confirm the TCP/IP network settings – Type the ipconfig command from the
command prompt record the result.
Step 5. Restore the PCs to their original IP settings, disconnect the equipments and
store the cables
________________________________________________________________________
Data Communiations & Networks 50
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.
Other:
Total Score
Comments:
________________________________________________________________________
Data Communiations & Networks 51
Experiment #8
Title: Class A IP Address Subnetting
Objective:
• Learn how to subnet
• Subnet a class A IP address
Scenario:
Your company has one Class A address; 24.0.0.0. The company has been experiencing
recent growth and expects to have 100 locations, each with 70000 personnel within the next
3 months.
Number of Subnets:
Subnet Mask: _
From 24
0 24 0 0 0
To 24
From 24
1 24
To 24
From 24
2 24
To 24
From 24
3 24
To 24
________________________________________________________________________
Data Communiations & Networks 52
From 24
4 24
To 24
From 24
5 24
To 24
From 24
6 24
To 24
From 24
24
To 24
From 24
24
To 24
From 24
24
To 24
Skip to end….
From 24
24
To 24
From 24
24
To 24
We do not use the first subnet (according to Microsoft – even though it is used in the
real world) and we do not use the subnet id with the subnet mask in it either. You cannot
have a subnet id equal to your subnet mask. Therefore we must cross out the first subnet id
and the last subnet id.
28 – 2
= 256 –2
=254 hosts per subnet
________________________________________________________________________
Data Communiations & Networks 53
Use the formula to determine the number of hosts supported on each subnet of the
network in this exercise.
________________________________________________________________________
Data Communiations & Networks 54
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.
Other:
Total Score
Comments:
________________________________________________________________________
Data Communiations & Networks 55
Experiment #9
Title: Class B IP Address Subnetting
Objective:
• Learn how to subnet
• Subnet a class B IP address
Scenario:
Your company has one Class B address; 150.210.0.0 The company has been experiencing
recent growth and expects to have 7 more locations (they currently have one location),
within the next 3 months.
Number of Subnets:
Subnet Mask:
________________________________________________________________________
Data Communiations & Networks 56
From 150 210
3 150 210
To 150 210
We do not use the first subnet (according to Microsoft – even though it is used in the
real world) and we do not use the subnet id with the subnet mask in it either. You cannot
________________________________________________________________________
Data Communiations & Networks 57
have a subnet id equal to your subnet mask. Therefore, we must cross out the first subnet id
and the last subnet id.
________________________________________________________________________
Data Communiations & Networks 58
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.
Other:
Total Score
Comments:
________________________________________________________________________
Data Communiations & Networks 59
Experiment #10
Title: Class C IP Address Subnetting
Objective:
• Learn how to subnet
• Subnet a class B IP address
Scenario:
Your company has one Class C address; 200.156.109.0. Recently the company has been
experiencing extremely heavy network traffic. As the network administrator, you decide to
subnet the LAN into two physical networks. There will 55 hosts on each network.
Number of Subnets:
________________________________________________________________________
Data Communiations & Networks 60
We do not use the first subnet (according to Microsoft – even though it is used in the
real world) and we do not use the subnet id with the subnet mask in it either. You cannot
have a subnet id equal to your subnet mask. Therefore we must cross out the first subnet id
and the last subnet id.
28 – 2
= 256 –2
=254 hosts per subnet
Use the formula to determine the number of hosts supported on each subnet of the network
in this exercise.
________________________________________________________________________
Data Communiations & Networks 61
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.
Other:
Total Score
Comments:
________________________________________________________________________
Data Communiations & Networks 62
Experiment #11
Title: Using Classless Inter-Domain Routing
Objective:
• Learn how to use C
• Subnet a class C IP address
Given an IP address and network mask, you are able to determine information about the IP
address such as Network address, broadcast address, Total number of host bits, Number of
hosts.
Given:
Host IP Address: 172.25.114.250
Network Mask: 255.254.0.0 (/15)
Solution:
2. Determine the broadcast address by setting 1bits in the host portion of the
address.
Network address:
__________.___________.__________.__________
Broadcast Address:
__________.__________.___________.__________
________________________________________________________________________
Data Communiations & Networks 63
3. Determine the total number of hosts.
The last 17 Bits are the host part of our address, therefore:
It is possible to have 217=131.072 unique IP Addresses in network 172.24.0.0/15
However, 172.25.255.255 is the broadcast address and 172.24.0.0 the network address
1. IP address 192.168.0.5
Subnet mask 255.255.255.0
CIDR:______________
Network address:____________
Broadcast addresses:____________
Total number of hosts:____________
2. IP address 192.168.0.5
Subnet mask 255.255.0.0
CIDR:_____________
Network address:____________
Broadcast addresses:___________
Total number of hosts:____________
3. IP address 10.2.17.10
Subnet mask 255.0.0.0
CIDR:____________
Network address:____________
Broadcast addresses:___________
Total number of hosts:____________
4. IP address 10.2.17.10
Subnet mask:____________
CIDR: /11
Network address:____________
Broadcast addresses:___________
Total number of hosts:___________
________________________________________________________________________
Data Communiations & Networks 64
Use This space for computation:
________________________________________________________________________
Data Communiations & Networks 65
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.
Other:
Total Score
Comments:
________________________________________________________________________
Data Communiations & Networks 66
Experiment #12
Title: Variable Length Subnet Mask
Objective:
• To be familiar with VLSM
• To create an addressing scheme using variable length subnet mask
Scenario: You were assigned to use the class C address 192.168.15.0 and must support the
network shown in the diagram below.you are not permitted to use IP unnumbered or NAT on
this network. Create an addressing scheme that meets the requirements shown in the
diagram, conserving the maximum number of addresses for future growth.
From
A
To
From
B
To
From
C
To
From
D
To
From
E
To
________________________________________________________________________
Data Communiations & Networks 67
Task 2. Simulate the scenario using Packet Tracer
Task 3. Label each of the needed network addresses in the diagram below.
________________________________________________________________________
Data Communiations & Networks 68
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.
Other:
Total Score
Comments:
________________________________________________________________________
Data Communiations & Networks 69
Experiment #13
Title: Virtual LAN Configuration
Objective:
• Cable a network according to the topology diagram
• Erase the startup configuration and reload a switch to the default state
• Perform basic configuration tasks on a switch
• Create VLANs
• Assign switch ports to a VLAN
• Add, move, and change ports
• Verify VLAN configuration
• Enable Trunking on inter-switch connections
• Verify trunk configuration
• Save the VLAN configuration
Topology Digram:
Addressing Table:
________________________________________________________________________
Data Communiations & Networks 70
Task 1: Prepare the Network
Step 1: Cable a network that is similar to the one in the topology diagram.
You can use any current switch, in your lab as long as it has the required interfaces shown
in the topology.
Note: If you use 2900 or 2950 switches, the outputs may appear different. Also, certain
commands may be different or unavailable.
Step 2: Clear any existing configurations on the switches, and initialize all ports in the
shutdown state.
If necessary, refer to Lab 2.5.1, Appendix 1, for the procedure to clear switch configurations.
It is a good practice to disable any unused ports on the switches by putting them in
shutdown mode. Disable all ports on the switches:
Switch#config term
Switch(config)#interface range fa0/1-24
Switch(config-if-range)#shutdown
Switch(config-if-range)#interface range gi0/1-2
Switch(config-if-range)#shutdown
________________________________________________________________________
Data Communiations & Networks 71
Step 1: Configure the PCs.
You can complete this lab using only two PCs by simply changing the IP addresses for the
two PCs specific to a test you want to conduct. For example, if you want to test connectivity
between PC1 and PC2, then configure the IP addresses for those PCs by referring to the
addressing table at the beginning of the lab. Alternatively, you can configure all six PCs with
the IP addresses and default gateways.
Use the vlan vlan-id command in global configuration mode to add a VLAN to switch S1.
There are four VLANS configured for this lab: VLAN 10 (faculty/staff); VLAN 20 (students);
VLAN 30 (guest); and VLAN 99 (management). After you create the VLAN, you will be in
VLAN configuration mode, where you can assign a name to the VLAN with the name vlan
name command.
S1(config)#vlan 10
S1(config-vlan)#name faculty/staff
S1(config-vlan)#vlan 20
S1(config-vlan)#name students
S1(config-vlan)#vlan 30
S1(config-vlan)#name guest
S1(config-vlan)#vlan 99
S1(config-vlan)#name management
S1(config-vlan)#end
S1#
Use the show vlan brief command to verify that the VLANs have been created.
________________________________________________________________________
Data Communiations & Networks 72
Create and name VLANs 10, 20, 30, and 99 on S2 and S3 using the commands from Step
1. Verify the correct configuration with the show vlan brief command.
What ports are currently assigned to the four VLANs you have created?
___________________
Refer to the port assignment table on page 1. Ports are assigned to VLANs in interface
configuration mode, using the switchport access vlan vlan-id command. You can assign
each port individually or you can use the interface range command to simplify this task, as
shown here. The commands are shown for S3 only, but you should configure both S2 and
S3 similarly. Save your configuration when done.
Use the show vlan id vlan-number command on S2 to see which ports are assigned to
VLAN 10.
Note: The show vlan name vlan-name displays the same output.
You can also view VLAN assignment information using the show interfaces interface
switchport command.
________________________________________________________________________
Data Communiations & Networks 73
From the interface configuration mode, use the ip address command to assign the
management IP address to the switches.
S1(config)#interface vlan 99
S1(config-if)#ip address 172.17.99.11 255.255.255.0
S1(config-if)#no shutdown
S2(config)#interface vlan 99
S2(config-if)#ip address 172.17.99.12 255.255.255.0
S2(config-if)#no shutdown
S3(config)#interface vlan 99
S3(config-if)#ip address 172.17.99.13 255.255.255.0
S3(config-if)#no shutdown
Assigning a management address allows IP communication between the switches, and also
allows any host connected to a port assigned to VLAN 99 to connect to the switches.
Because VLAN 99 is configured as the management VLAN, any ports assigned to this
VLAN are considered management ports and should be secured to control which devices
can connect to these ports.
Step 7: Configure Trunking and the native VLAN for the Trunking ports on all
switches.
Trunks are connections between the switches that allow the switches to exchange
information for all
VLANS. By default, a trunk port belongs to all VLANs, as opposed to an access port, which
can only belong to a single VLAN. If the switch supports both ISL and 802.1Q VLAN
encapsulation, the trunks must specify which method is being used. Because the 2960
switch only supports 802.1Q trunking, it is not specified in this lab.
A native VLAN is assigned to an 802.1Q trunk port. In the topology, the native VLAN is
VLAN 99. An 802.1Q trunk port supports traffic coming from many VLANs (tagged traffic) as
well as traffic that does not come from a VLAN (untagged traffic). The 802.1Q trunk port
places untagged traffic on the native VLAN. Untagged traffic is generated by a computer
attached to a switch port that is configured with the native VLAN. One of the IEEE 802.1Q
specifications for Native VLANs is to maintain backward compatibility with untagged traffic
common to legacy LAN scenarios. For the purposes of this lab, a native VLAN serves as a
common identifier on opposing ends of a trunk link. It is a best practice to use a VLAN other
than VLAN 1 as the native VLAN.
Use the interface range command in global configuration mode to simplify configuring
Trunking.
________________________________________________________________________
Data Communiations & Networks 74
S1(config-if-range)#switchport mode trunk
S1(config-if-range)#switchport trunk native vlan 99
S1(config-if-range)#no shutdown
S1(config-if-range)#end
Verify that the trunks have been configured with the show interface trunk command.
S1#ping 172.17.99.12
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.17.99.12, timeout is 2
seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/9 ms
S1#ping 172.17.99.13
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.17.99.13, timeout is 2
seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 1/1/1 ms
Step 9: Ping several hosts from PC2.
________________________________________________________________________
Data Communiations & Networks 75
Ping from host PC2 to host PC1 (172.17.10.21). Is the ping attempt successful?
_______________
Ping from host PC2 to the switch VLAN 99 IP address 172.17.99.12. Is the ping attempt
successful? ________
Because these hosts are on different subnets and in different VLANs, they cannot
communicate without a Layer 3 device to route between the separate subnetworks.
Ping from host PC2 to host PC5. Is the ping attempt successful? _________
Because PC2 is in the same VLAN and the same subnet as PC5, the ping is successful
The port connected to PC2 (S2 Fa0/18) is assigned to VLAN 20, and the port connected to
PC1 (S2 Fa0/11) is assigned to VLAN 10. Reassign the S2 Fa0/11 port to VLAN 20. You do
not need to first remove a port from a VLAN to change its VLAN membership. After you
reassign a port to a new VLAN, that port is automatically removed from its previous VLAN.
S2#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
S2(config)#interface fastethernet 0/11
S2(config-if)#switchport access vlan 20
S2(config-if)#end
Ping from host PC2 to host PC1. Is the ping attempt successful? _________
Even though the ports used by PC1 and PC2 are in the same VLAN, they are still in different
subnetworks, so they cannot communicate directly.
Change the IP address on PC1 to 172.17.20.22. The subnet mask and default gateway can
remain the same. Once again, ping from host PC2 to host PC1, using the newly assigned IP
address.
On each switch, capture the running configuration to a text file and save it for future
reference.
Task 6: Clean Up
________________________________________________________________________
Data Communiations & Networks 76
Erase the configurations and reload the switches. Disconnect and store the cabling. For PC
hosts that are normally connected to other networks (such as the school LAN or to the
Internet), reconnect the appropriate cabling and restore the TCP/IP settings.
________________________________________________________________________
Data Communiations & Networks 77
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.
Other:
Total Score
Comments:
________________________________________________________________________
Data Communiations & Networks 78
Experiment #14
Title: Basic Router Configuration and Static Route
Objective:
• Focus on the ability to configure a small network with static routes and rip as the
routing protocol
• To troubleshoot the network, preventing routing updates through an interface to
regulate advertised routes and observing the results.
• Configuring static routes to allow data transfer between routers without the use of
dynamic routing protocols.
________________________________________________________________________
Data Communiations & Networks 79
Task 1. Configuring routers and workstations
Step 1. To make sure the routers are empty, clear the existing configuration.
Router#erase startup-config
Erasing the nvram filesystem will remove all files! Continue?
[confirm]
[OK]
Erase of nvram: complete
Router#reload
Step 2. Setup a network similar to the one in the diagram and start a HyperTerminal
session. Configure the hostnames, console, virtual terminal and enable passwords.
Step 5. Configure the workstations with the proper IP address, subnet mask and default
gateway.
The configuration for the host connected to the GAD Router is:
IP Address 172.16.0.2
IP subnet mask 255.255.0.0
Default gateway 172.16.0.1
The configuration for the host connected to the BHM Router is:
IP Address 172.18.0.2
IP subnet mask 255.255.0.0
Default gateway 172.18.0.1
________________________________________________________________________
Data Communiations & Networks 80
Step 6. Check connectivity between the workstations using ping. From the workstation
attached to the GAD router, ping the workstation attached to the BHM router.
C:\>ping 172.18.0.2
Step 7. Check the interfaces status on both routers with the command show ip interface
brief. Are all necessary interfaces up?___________________________________________
Step 8. Using the command show ip route, view the IP routing table for GAD.
GAD>show ip route
Use the command show ip route, view the IP routing table for BHM.
BHM>show ip route
Based on the output from the show ip route command on the GAD and BHM routers, can a
host on network 172.16.0.0 connect to a host on network 172.18.0.0? _________________
If a route is not in the routing table of the router to which the host is connected, the host
cannot reach the destination host.
________________________________________________________________________
Data Communiations & Networks 81
Task 2. Adding static routes
Step 1. To change this situation so that the hosts can ping each other, you have to add
static routes or run a routing protocol. In global configuration mode, add a static route on the
GAD router to network 172.18.0.0, and on the BHM router to network 172.16.0.0.
Step 2. Use the command show ip route, view the IP routing table for GAD.
GAD>show ip route
Step 3. Check connectivity between workstations using ping. The pings should be
successful.
Step 1. Remove the static routes from the routers with the no command:
Step 2. Check the routing table to make sure the static routes was removed. When the static
routes are removed, you should not be able to ping between the hosts.
Step 3. Now, configure RIP as the routing protocol to dynamically exchange routing
information. Start with the GAD router.
GAD(config)#router rip
GAD(config-router)#network 172.16.0.0
GAD(config-router)#network 172.17.0.0
GAD(config-router)#exit
GAD(config)#exit
________________________________________________________________________
Data Communiations & Networks 82
Why do you have to add both network 172.16.0.0 and 172.17.0.0 to the rip network
statement?________________________________________________________________
_________________________________________________________________________
BHM(config)#router rip
BHM(config-router)#network 172.17.0.0
BHM(config-router)#network 172.18.0.0
BHM(config-router)#exit
BHM(config)#exit
Step 5. Verify the connection by pinging from one host to the other. Was the ping
successful?
_________________________________________________________________________
Step 6. From the enable or privileged EXEC mode, examine the routing table entries using
the show ip route command on each router.
Step 1. To make sure that routing updates are being sent, type the command debug ip rip in
the privileged EXEC mode prompt. Wait for at least 45 seconds.
Other debug commands that function with RIP are the following:
Step 2. Look at the RIP routing tables for each router. Enter show ip route rip.
Step 1. To check the routing table for a specific route, from BHM privileged EXEC mode
prompt enter show ip route 172.16.0.0.
Wait five seconds and enter show ip route 172.16.0.0 a second time.
Wait five seconds and enter show ip route 172.16.0.0 a third time.
Step 2. Check the ip rip database on the BHM router. Type show ip rip database from the
privileged EXEC mode prompt.
________________________________________________________________________
Data Communiations & Networks 84
Task 6. Prevent routing updates
Step 1. To stop routing updates from GAD to BHM, enter global configuration mode and
then enter router configuration mode by entering the command router rip. Enter the
command passiveinterface serial 0/0. This will prevent the GAD router from advertising its
routes to the BHM router.
GAD(config)#router rip
GAD(config-router)#passive-interface serial0/0
Step 2. To confirm this, use the debug ip rip events command on the GAD router.
Verify from the output that the router is not sending updates out the interface to the
BHM router. Disable the debug output with the no debug all command.
Step 3. Also from the BHM router, issue the show ip route to verify that the route to
the GAD LAN has been removed.
Attempt to ping from the computers in GAD to the computers in BHM. What is the
response?___________________________________________________________
Step 4. Confirm that the BHM router is still sending update to GAD. To do this, use
the debug ip rip events command on the BHM router. Verify from the output that the
router is sending updates out the interface to the GAD router.
Step 1. Since BHM is not getting routing updates, it does not have a route to the outside
world. It needs to be provided with a default route. A default route (gateway) is the route that
data is sent out if the routing table does not have a specific route to use.
________________________________________________________________________
Data Communiations & Networks 85
Verify the default route is in the BHM routing table by issuing the show ip route command.
There should be an output similar to the following:
Be sure to be able to ping from the computers in GAD to the computers in BHM. If not,
check routing tables and interfaces.
Step 1. Examine the debug command Start to examine the debug command on the GAD or
BHM router.
2. At the privileged EXEC mode type debug ip rip ? How many options are available for this
command?________________________________________________________________
_________________________________________________________________________
3. Use the debug ip rip command on each router to examine the routing table entries. What
are the three operations that can take place listed in the rip debug statements?
_________________________________________________________________________
_________________________________________________________________________
RIPv2 messages include the subnet mask in a field in the routing updates. This allows
subnets and their masks to be included in the routing updates, and discontiguous networks
can be used without any problems. The RIP protocol summarizes networks at major network
boundaries, but the automatic summarization in RIPv2 can be turned off with the command
no auto-summary.
________________________________________________________________________
Data Communiations & Networks 86
Task 9. Configure RIP v.2
Step 1. Enable version 2 of the RIP routing protocol on the GAD router only.
GAD(config)#router rip
GAD(config-router)#version 2
GAD(config-router)#exit
Step 2. Start the debugging on the GAD router again. Does a problem occur now when we
have RIP v.2 on the GAD router?
_________________________________________________________________________
Step 3. Instead of waiting for the routers to time out, type clear ip route * to clear the routing
table. Then type show ip route. What has happened to the routing table?
_________________________________________________________________________
_________________________________________________________________________
Will it be updated to include RIP routes if the debug output says the update is ignored?
_________________________________________________________________________
Step 4. Start the debug RIP function on the BHM router. Does a problem occur now when
RIP v.2 is on the GAD router? _________________________________________________
Step 5. Clear the routing table on the BHM router, then take a look at the routing table to
see if anything has changed.
Step 6. Enable version 2 of the RIP routing protocol on the BHM router. Use the debug
function to examine the packet traffic on the GAD router. Use the command debug ip packet
.
How many source addresses are used when a RIP update is sent?____________________
Step 7. Start the RIP database debugging by typing debug ip rip database (not on 2500
series routers) then clear the routing table. Are the old routes in the table deleted?
_________________________________________________________________________
________________________________________________________________________
Data Communiations & Networks 87
Are new routes added back into the table? _______________________________________
What does the last entry in the output debug output say? ___________________________
__________________________________________________________________________
Step 8. Now, use the debug function to see routing updates. Type debug ip rip events on the
BHM router. What interfaces are the routing updates sent on?
_________________________________________________________________________
_________________________________________________________________________
How many routes are in the routing updates that are being sent?______________________
Once the previous steps are completed, erase the start-up configuration, logoff by typing
exit, and turn the router off. Then remove and store the cables.
________________________________________________________________________
Data Communiations & Networks 88
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.
Other:
Total Score
Comments:
________________________________________________________________________
Data Communiations & Networks 89
Experiment #15
Title: Configuring RIP on CISCO Router
Objective:
• To observe how the dynamic routing protocols RIP work.
• To observe the different types of packets used by the RIP.
This lab starts with the network topology below. Routing tales were configured
manually, here you run the routing protocol RIP to perform the same task. You will
configure RIP on the Cisco routers. Figure 13.1 and Table 13.1 describe the network
configuration for this part of the lab. RIP is one of the oldest dynamic routing protocols on
the Internet that is still in use. This lab uses the latest revision of RIP, RIPv2 (RIP version 2).
Each RIP-enabled router periodically sends the content of its routing table to all its
neighboring routers in an update message. For each routing table entry, the router sends
the destination (host IP address or network IP address and associated prefix) and the
distance to the destination measured in hops. When a router receives an update message
from a neighboring router, it updates its own routing table.
________________________________________________________________________
Data Communiations & Networks 90
PC Ethernet Interface etho0 Ether Interface eth1
PC1 10.0.1.10/24 Disabled
PC2 10.0.2.10/24 Disabled
PC3 10.0.3.10/24 Disabled
PC4 10.0.4.10/24 Disabled
In this exercise, you will configure all the routers to run RIP. After the configuration,
all the routers should be able to ping all the other routers. Following is a brief overview of the
basic commands used to configure RIP on a Cisco router. Make sure you type in the
command in the correct command mode (note the prompt).
Enables or disables a debugging mode where the router displays a message for each
received RIP packet.
Associates or disables the network IP addresses Netaddr with RIP. RIP sends updates only
on interfaces on which the network address has been associated with RIP.
Sets or disables the interface Iface in RIP passive mode. On an interface in passive
mode, the router processes incoming RIP packets but does not transmit RIP packages.
Increases the metric (hop count) of incoming RIP packages that arrive or outgoing RIP
packets that are sent on interface Iface by value.
________________________________________________________________________
Data Communiations & Networks 91
update: The time interval between transmissions of RIP update messages (default: 30
seconds).
invalid: The time interval after which a route, which has not been updated, is declared
invalid (default: 180 seconds).
hold-down: Determines how long after a route has been updated as unavailable. A router
will wait before accepting a new route with a lower metric. This introduces a delay for
processing incoming RIP packets with routing updates after a link failure (default: 180
seconds).
flush: The amount of time that must pass before a route that has not been updated is
removed from the routing tables (default: 240 seconds).
Sets the router not to perform triggered updates, when the next transmission of routing
updates is due in time. If time is set to the same value as the update timer, then triggered
update are disabled. In RIP, a triggered update means that a router sends a RIP packet with
a routing update, whenever one of its routing table entries changes.
1. Connect the PCs and the Cisco Routers as shown in Figure 4.1. The PCs and routers are
connected with Ethernet hubs.
2. Start Routers by clicking the right button and select Start; then, open a terminal by
clicking the right button and select Console.
3. On Router1, Router2, and Router3, configure the IP addresses as shown in Table 4.1,
and enable the routing protocol RIP. The commands to set up Router 1 are as follows:
________________________________________________________________________
Data Communiations & Networks 92
4. After you have configured the routers, check the routing table at each router with the
show IP route command. Each router should have four entries in the routing table: two
entries for directly connected networks and two other entries for remote networks that were
added by RIP.
5. From each router, issue a ping command to the IP address of interfaces FastEthernet0/0
and FastEthernet0/1 on all remote routers. Once you can successfully contact the IP
addresses of all routers, proceed to the next exercise.
________________________________________________________________________
Data Communiations & Networks 93
Rubrics for Laboratory
Criteria Unsatisfactory Amateur Exceptional Score
1 2 3
Procedure Two or more One of the All required laboratory
conditions and previous instructions are done
instructions is conditions and and present.
not met instruction is
satisfactorily not met
satisfactorily.
Required Results are Results are Results and data are
Result present, though present, but clearly recorded and
too unclear. organized.
disorganized or
poorly recorded
to make sense
Analysis Analysis is Analysis is The data and
poor, not somewhat observations are
enough data lacking in analyzed accurately,
inaccurate insight not trends are noted and
analysis enough data explained, enough
was gathered data was taken to
or established. establish conclusively.
Conclusion The conclusion One of the The conclusion
does not much conditions is follows data without
laboratory result not met wild guesses or leaps
presented. satisfactorily of logic.
Other:
Total Score
Comments:
________________________________________________________________________
Data Communiations & Networks 94