Dcom Lab Manual Updated
Dcom Lab Manual Updated
Data Communication
TABLE OF CONTENT
4 The Cisco IOS CLI- Architecture & Network Simulation Tool 33-41
THEORY
COMPUTER NETWORKING
Computer networking is the engineering discipline concerned with communication
between computer systems or devices. Networking, routers, routing protocols, and
networking over the public Internet have their specifications.
A computer network can also consist of, and is usually made for, more than
two computers:
CABLING
Cable is the medium through which information usually moves from one network
device to another. There are several types of cable, which are commonly used with
LANs. In some cases, a network will utilize only one type of cable, other networks
will use a variety of cable types. The type of cable chosen for a network is related to
the network's topology, protocol, and size. Understanding the characteristics of
different types of cable and how they relate to other aspects of a network is necessary
for the development of a successful network.
The following sections discuss the types of cables used in networks and other related
topics.
Unshielded Twisted Pair (UTP) Cable
Shielded Twisted Pair (STP) Cable
Coaxial Cable
Fiber Optic Cable
Installing Cable - Some Guidelines
One difference between the different categories of UTP is the tightness of the twisting
of the copper pairs. The tighter the twisting, the higher the supported transmission rate
and the greater the cost per foot. Buy the best cable you can afford; most schools
purchase Category 3, Category 5 or Category 5e. Category 5e cable is highly
recommended.
If you are designing a 10 Mbps Ethernet network and are considering the cost savings
of buying Category 3 wire instead of Category 5, remember that the Category 5 cable
will provide more "room to grow" as transmission technologies increase. Both
category 3 and category 5 UTP have a maximum segment length of 100 meters.
10BaseT refer to the specifications for unshielded twisted pair cable (category 3, 4, or
5) carrying Ethernet signals.
COAXIAL CABLE
Coaxial cabling has a single copper conductor at its center. A plastic layer provides
insulation between the center conductor and a braided metal shield (See Fig. 1.3). The
metal shield helps to block any outside interference from fluorescent lights, motors,
and other computers.
TOPOLOGY
There are two types of topology: physical and logical. The physical topology of a
network refers to the configuration of cables, computers, and other peripherals.
Logical topology is the method used to pass the information between workstations.
LINEAR BUS
STAR
A star topology is designed with each node (file server, workstations, and peripherals)
connected directly to a central network hub or concentrator (See Fig. 1.7).
Data on a star network passes through the hub or concentrator before continuing to its
destination. The hub or concentrator manages and controls all functions of the
network. It also acts as a repeater for the data flow. This configuration is common
with twisted pair cable; however, it can also be used with coaxial cable or fiber optic
cable.
The protocols used with star configurations are usually Ethernet or Local Talk. Token
Ring uses a similar topology, called the star-wired ring.
STAR-WIRED RING
A star-wired ring topology may appear (externally) to be the same as a star topology.
Internally, the MAU (multi-station access unit) of a star-wired ring contains wiring
that allows information to pass from one device to another in a circle or ring (See Fig.
1.8). The Token Ring protocol uses a star-wired ring topology.
TREE
Money. A linear bus network may be the least expensive way to install a
network; you do not have to purchase concentrators.
Length of cable needed. The linear bus network uses shorter lengths of cable.
Future growth. With a star topology, expanding a network is easily done by
adding another concentrator.
Cable type. The most common cable in schools is unshielded twisted pair,
which is most often used with star topologies.
THEORY
HUB
A network hub is a device for connecting multiple twisted pair or fiber optic Ethernet
devices together and thus making them act as a single network segment. Hubs work at
the physical layer (layer 1) of the OSI model. The device is thus a form of multiport
repeater. Repeater hubs also participate in collision detection, forwarding a jam signal
to all ports if it detects a collision.
Hubs also often come with a BNC and/or AUI connector to allow connection to
legacy 10BASE2 or 10BASE5 network segments. The availability of low-priced
network switches has largely rendered hubs obsolete but they are still seen in older
installations and more specialized applications.
A network hub is a fairly unsophisticated broadcast device. Hubs do not manage any
of the traffic that comes through them, and any packet entering any port is broadcast
out on all other ports. Since every packet is being sent out through all other ports,
packet collisions result—which greatly impedes the smooth flow of traffic.
Technically speaking, three different types of hubs exist:
1. Passive (A hub which does not need an external power source, because it does
not regenerate the signal and therefore falls as part of the cable, with respect to
maximum cable lengths)
2. Active (A hub which regenerates the signal and therefore needs an external
power supply)
3. Intelligent (A hub which provides error detection (e.g. excessive collisions)
and also does what an active hub does)
SWITCH
Switches are often confused with bridges because they also operate at the data link
layer of the OSI model. Similar to a hub, switches provide a central connection
between two or more computers on a network, but with some intelligence. They
provide traffic control for packets; rather than forwarding data to all the connected
ports, a switch forwards data only to the port on which the destination system is
connected. They use a database of MAC (Media Access Control) addresses to
determine where computers are located and very efficiently send packets only where
they need to go. The database is created dynamically as computers communicate on
the network. The switch simply watches the incoming packets and memorizes the
MAC address and port a packet arrives on. If a packet arrives with a destination
computer that the switch does not have an address for in its MAC address table, it will
flood the packet out all connected ports. A switch creates separate collision domains
for each physical connection. A switch will only create separate broadcast domains if
separate VLANs (Virtual Local Area Networks) are assigned to different ports on the
switch. Otherwise, a broadcast received on one port will be flooded out all ports
except the one it came in on.
MODEM
Modem (from modulator-demodulator) is a device that turns the digital 1s and 0s of a
personal computer into sounds that can be transmitted over the telephone lines of
Plain Old Telephone Systems (POTS), and once received on the other side, converts
those 1s and 0s back into a form used by a USB, Ethernet, serial, or network
connection. Modems are generally classified by the amount of data they can send in a
given time, normally measured in bits per second, or "bps".
LAB TASKS
HOME ASSIGNMENT.
Q1: How many computer laboratories are in the SIR SYED University? Name them.
Q2: Briefly describe any four (4)-network types.
Q3: Describe the five (6) categories of UTP cable.
Q4: Briefly describe:
1) PCI Card
2) ISA Card
3) SCSI Port
4) AUI Port
THEORY
There are several classifications of cable used for twisted-pair
networks. Skip right over them and state that we use and recommend
Category 5 or 5e (or CAT 5) cable for all new installations. Likewise, there
are several fire code classifications for the outer insulation of CAT 5
cable. We use CMR cable, or "riser cable," for most of the wiring we
do. You should also be aware of CMP or plenum cable (a plenum is used to
distribute air in a building). You may be required by local, state or national
codes to use the more expensive plenum-jacketed cable if it runs through
suspended ceilings, ducts, or other areas, if they are used to circulate air or
act as an air passage from one room to another. If in doubt, use
plenum. CMR cable is generally acceptable for all applications not requiring
plenum cable.
Fig 2.1 A UTP Cable
CAT 5 wire is available in reel-in-box packaging. This is very handy for pulling the
wire without putting twists in it. Without this kind of package or a cable reel stand,
pulling wire is a two-person job. Before the advent of the reel-in-box, we used to put
a reel of wire on a broom handle to pull it. One person would hold the broom handle
and the other would pull and measure the cable. You will produce a tangled mess, if
you pull the wire off the end of the reel.
Stranded wire patch cables are often specified for cable segments running from a wall
jack to a PC and for patch panels. They are more flexible than solid core
wire. However, the rational for using it is that the constant flexing of patch cables
may wear-out solid core cable--break it. We don't think this is a real concern in the
average small network. For example, we are having one solid core cable going to our
workbench. It has probably flexed and average person's lifetime of flexes from the
many times we have connected customer computers to our network. Also, stranded
cable is susceptible to degradation from moisture infiltration, may use an alternate
color code, and should not be used for cables longer than 3 Meters (about 10 feet).
Most of the wiring we do simply connects computers directly to other computers or
hubs. Solid core cable is quite suitable for this purpose and for many home and small
business networks. We find it also quite acceptable for use as patch cables. You
15
might consider stranded wire patch cables if you have a notebook computer you are
constantly moving around.
CAT 5 cable has four twisted pairs of wire for a total of eight individually insulated
wires. Each pair is color coded with one wire having a solid color (blue, orange,
green, or brown) twisted around a second wire with a white background and a stripe
of the same color. The solid colors may have a white stripe in some cables. Cable
colors are commonly described using the background color followed by the color of
the stripe; e.g., white-orange is a cable with a white background and an orange stripe.
CONNECTORS
16
Universal UTP Stripping Tool (Eclipse): It makes a much neater cut. We
recommend that you purchase one if you will be making many cables.
Diagonal Cutters ("4 to 6"): It is easier to use diagonal cutters ("diags" or "dikes") to
cut the cable off at the reel and to fine tune the cable ends during assembly. Also, if
you don't have a stripper, you can strip the cable by using a small knife (X-acto,
utility, etc.) to carefully slice the outer jacket longitudinally and use the diags to cut it
off around the circumference.
BASIC THEORY
The 10BASE-T and 100BASE-TX Ethernets consist of two transmission lines. Each
transmission line is a pair of twisted wires. One pair receives data signals and the
other pair transmits data signals. A balanced line driver or transmitter is at one end of
one of these lines and a line receiver is at the other end. A (much) simplified
schematic for one of these lines and its transmitter and receiver follow:
Pulses of energy travel down the transmission line at about the speed of light (186,000
miles/second). The principal components of one of these pulses of energy is the
voltage potential between wires and current flowing near the surface of the
wires. This energy can also be considered as residing in the magnetic field which
surrounds the wires and the electric field between the wires. In other words, an
electromagnetic wave which is guided by, and travels down the wires.
17
The main concern is the transient magnetic fields which surrounds the wires and the
magnetic fields generated externally by the other transmission lines in the cable, other
network cables, electric motors, fluorescent lights, telephone and electric lines,
lightning, etc. This is known as noise. Magnetic fields induce their own pulses in a
transmission line which may literally bury the Ethernet pulses, the conveyor of the
information being sent down the line.
The twisted-pair Ethernet employs two principle means for combating noise. The first
is the use of balanced transmitters and receivers. A signal pulse actually consists of
two simultaneous pulses relative to ground: a negative pulse on one line and a positive
pulse on the other. The receiver detects the total difference between these two
pulses. Since a pulse of noise (shown in red in the diagram) usually produces pulses
of the same polarity on both lines one pulse is essentially canceled by out the other at
the receiver. Also, the magnetic field surrounding one wire from a signal pulse is a
mirror of the one on the other wire. At a very short distance from the two wires the
magnetic fields are opposite and have a tendency to cancel the effect of each other
out. This reduces the line's impact on the other pair of wires and the rest of the world.
The second and the primary means of reducing cross-talk--the term cross-talk came
from the ability to (over) hear conversations on other lines on your phone--between
the pairs in the cable, is the double helix configuration produced by twisting the wires
together. This configuration produces symmetrical (identical) noise signals in each
wire. Ideally, their difference, as detected at the receiver, is zero. In actuality it is
much reduced.
Again, the wires with colored backgrounds may have white stripes and may be
donated that way in diagrams found elsewhere. For example, the green wire may be
labeled Green-White. The background color is always specified first.
Now, all you need to remember, to properly configure the cables, are the diagrams for
the two cable ends and the following rules:
A straight-thru cable has identical ends.
A crossover cable has different ends.
It makes no functional difference which standard you use for a straight-thru
cable. You can start a crossover cable with either standard as long as the other end is
the other standard.
18
It makes no functional difference which end is which. Despite what you may have
read elsewhere, a 568A patch cable will work in a network with 568B wiring and
568B patch cable will work in a 568A network. The electrons couldn't care less.
6. Hold the RJ-45 plug with the clip facing down or away from you. Push the
wire firmly into the plug. Now, inspect before crimping and wasting the
plug! Looking through the bottom of the plug, the wire on the far left side will
have a white background. The wires should alternate light and dark from left to
right. The furthest right wire is brown. The wires should all end evenly at the front
19
of the plug. The jacket should end just about where you see it in the diagram--right
on the line.
CABLING RULES
1. Try to avoid running cables parallel to power cables.
2. Do not bend cables to less than four times the diameter of the cable.
3. If you bundle a group of cables together with cable ties (zip ties), do not over-
cinch them. It’s okay to snug them together firmly; but don't tighten them so much
that you deform the cables.
20
4. Keep cables away from devices which can introduce noise into them. Here's a
short list: copy machines, electric heaters, speakers, printers, TV sets, fluorescent
lights, copiers, welding machines, microwave ovens, telephones, fans, elevators
motors, electric ovens, dryers, washing machines, and shop equipment.
5. Avoid stretching UTP cables (the force should not exceed 25 LBS).
6. Do not run UTP cable outside of a building. It presents a very dangerous lightning
hazard!
7. Do not use a stapler to secure UTP cables. Use telephone wire hangers which are
available at most hardware stores.
HOME ASSIGNMENTS
21
LAB # 3
DIAGNOSTIC UTILITIES
OBJECTIVE
To show some of the diagnostic Utilities for Computer networks.
THEORY
Following table gives the descriptions of different diagnostic Utilities
Diagnostics Utility Functions
Tracert Verifies the route used from the local host to a remote host.
OBJECTIVE
Verify connections to a remote computer or computers
THEORY
The ping command verifies connections to remote computer or computers, by sending
ICMP echo packets to the computer and listening for echo reply packets. Ping waits
for up to 1 second for each packet sent and prints the number of packets transmitted
and received. Each received packet is validated against the transmitted message. By
default, four echo packets containing 64 bytes of data (a periodic uppercase sequence
of alphabetic characters) are transmitted.
You can use the ping utility to test both the computer name and the IP address of the
computer. If the IP address is verified but the computer name is not, you may have a
name resolution problem. In this case, be sure that the computer name you are
querying is in either the local HOSTS file or in the DNS database.
The Ping stands for Packet Internet Groper.
PARAMETERS
-t
Sends ECHO packets containing the amount of data specified by length. The default
is 64 bytes; the maximum is 8192.
-f
Sends a Do not Fragment flag in the packet. The packet will not be fragmented by
gateways on the route.
-i ttl
EXAMPLE 3.1
Y:\>ping sirsyed
Output as follows:
Pinging sirsyed [192.168.1.1] with 32 bytes of data:
Reply from 192.168.1.1: bytes=32 time<10ms TTL=255
Reply from 192.168.1.1: bytes=32 time<10ms TTL=255
Reply from 192.168.1.1: bytes=32 time<10ms TTL=255
Reply from 192.168.1.1: bytes=32 time<10ms TTL=255
EXAMPLE 3.2
Output as follows:
Y:\>ping aurangzeb
Pinging aurangzeb [192.168.1.5] with 32 bytes of data:
Reply from 192.168.1.5: bytes=32 time<10ms TTL=128
Reply from 192.168.1.5: bytes=32 time<10ms TTL=128
Reply from 192.168.1.5: bytes=32 time<10ms TTL=128
Reply from 192.168.1.5: bytes=32 time<10ms TTL=128
EXERCISE 3.3
On command prompt, type
Y:\>ping 192.168.2.145
Record the output:
EXERCISE 3.4
On command prompt, type
Y:\>ping 192.168.1.3
IPCONFIG
THEORY
This diagnostic command displays all current TCP/IP network configuration values.
This command is of particular use on systems running DHCP, allowing users to
determine which TCP/IP configuration values have been configured by DHCP.
ipconfig [/all | /renew [adapter] | /release [adapter]]
PARAMETERS
all
Produces a full display. Without this switch, ipconfig displays only the IP address,
subnet mask, and default gateway values for each network card.
renew [adapter]
release [adapter]
Releases the current DHCP configuration. This option disables TCP/IP on the local
system and is available only on DHCP clients. To specify an adapter name, type the
adapter name that appears when you use ipconfig without parameters.
With no parameters, the ipconfig utility presents all of the current TCP/IP
configuration values to the user, including IP address and subnet mask. This utility is
especially useful on systems running DHCP, allowing users to determine which
values have been configured by DHCP.
EXAMPLE 3.5
Y:\> ipconfig
Output as follows:
Windows NT IP Configuration
Ethernet adapter Elnk31:
IP Address. ............... : 192.168.2.13
Subnet Mask .............. : 253.253.0.0
Default Gateway ........ : 192.168.1.8
EXAMPLE 3.6
Y:\> ipconfig /?
Output as follows:
Windows NT IP Configuration
Usage: ipconfig [/? | /all | /release [adapter] | /renew [adapter]]
/? Display this help message.
/all Display full configuration information.
/release Release the IP address for the specified adapter.
/renew Renew the IP address for the specified adapter.
The default is to display only the IP address, subnet mask and default gateway for
each adapter bound to TCP/IP.
For Release and Renew, if no adapter name is specified, then the IP address leases for
all adapters bound to TCP/IP will be released or renewed.
EXERCISE 3.7
On command prompt, type
Y:\> ipconfig /all
Record the output
EXERCISE 3.8
In this procedure, you use the Ipconfig utility to view an IP configuration and the
PING utility to test your workstation and connections to another TCP/IP host.
PROCEDURE:
Use the Ipconfig utility to verify that your TCP/IP configuration has initialized.
At a command prompt, type:
Y:\>Ipconfig
If the configuration is correctly initialized the IP address, subnet mask, and default
gateway (if configured values display).
Ping the loopback address to verify that TCP/IP is installed and loaded correctly.
At a command prompt, type:
Y:\>ping 127.0.0.1
Ping the IP address of your computer to verify that you added it correctly. Type:
Y:\>ping 172.168.3.1
Ping the IP address of your second computer to verify that you can communicate
with a host on the local network. Type:
Y:\>ping 172.168.3.2
NSLOOKUP
This diagnostic tool displays information from Domain Name System (DNS) name
servers. Before using this tool, you should be familiar with how DNS works.
Nslookup is available only if the TCP/IP protocol has been installed.
MODES
Nslookup has two modes: interactive and non-interactive.
If you only need to look up a single piece of data, use non-interactive mode. For the
first argument, type the name or IP address of the computer to be looked up. For the
second argument, type the name or IP address of a DNS name server. If you omit the
second argument, the default DNS name server will be used.
If you need to look up more than one piece of data, you can use interactive mode.
Type a hyphen (-) for the first argument and the name or IP address of a DNS name
server for the second argument. Or, omit both arguments (the default DNS name
server will be used).
Nslookup Commands
Nslookup: finger
Connects with the finger server on the current computer. The current computer is
defined when a previous lookup for a computer was successful and returned address
information (see the set querytype=A command).
Nslookup: ls
Lists information for a DNS domain. The default output contains computer names and
their IP addresses. (When output is directed to a file, hash marks are printed for every
50 records received from the server.)
NSLOOKUP Syntax
Nslookup [-option …] [computer-to-find | - [server]]
Object:
At a command prompt, modify the properties so that it has a screen buffer size of
50
Use the Layout property page to do this
Nslookup hostx
Where hostx is a host in your domain. NSLOOPKP will return the IP address of the
computer hostx because the information is stored in the DNS database.
Exercise 3.9
On command prompt, type
Y:\username>hostname
Record the output
Netstat
Displays protocol statistics and the current state of TCP/IP connections
Exercise 3.10
On command prompt, type
Y:\username>netstat
Record the output
NBTSTAT
Check the state of current NetBIOS over TCP/IP connections, updates the LMHOSTS cache,
or determines your registered name & scope ID
Exercise 3.11
On command prompt, type
Y:\username>nbtstat
Exercise 3.12
On command prompt, type
Y:\username>nbtstat -n
Record the output
Exercise 3.13
On command prompt, type
Y:\username>nbtstat -s
Y:\username>nbtstat –r
Tracert
Verifies the route used from the local host to a remote host.
Exercise 4s)
On command prompt, type
Y:\username>tracert –h 56
-h option maximum number of hops for a search to a target.
Record the output
Exercise 3.15
On command prompt, type
Y:\username>tracert –h 133
Record the output
Address Resolution Protocol (ARP)
Ping the local Linux based host. Use the arp to check the MAC Address
What is the output?
Exercise 3.16
Ping the non-existent local host. Check ARP cache to see the MAC Address.
Exercise 3.17
Ping a remote host. Check ARP cache. What MAC Address has been entered into the cache
DESCRIPTION
Ifconfig is used to configure the kernel-resident network interfaces. It is used at boot time to
set up interfaces as necessary. After that, it is usually only needed when debugging or when
system tuning is needed. If no arguments are given, ifconfig displays the status of the
currently active interfaces. If a single interface argument is given, it displays the status of
the given interface only; if a single -a argument is given, it displays the status of all interfaces,
even those that are down. Otherwise, it configures an interface
down. Otherwise, it configures an interface.
OPTIONS
interface
The name of the interface. This is usually a driver name followed by a unit number, for
example eth0 for the first Ethernet interface up. This flag causes the interface to be activated.
It is implicitly specified if an address is assigned to the interface down This flag causes the
driver for this interface to be shut down.
Print only the login names and the number of users logged on. Overrides all other options.
LAB TASK:
Q1: Prepare presentation on any three (3) diagnostic utilities of TCP/IP and also
Q2: How can we assign IP to our system statically using Command Prompt?
To show some basic commands to interact with the Cisco IOS CLI Software.
SIMULATION
Simulation is the imitation of some real thing, state of affairs, or process. The act of
simulating something generally entails representing certain key characteristics or
behaviours of a selected physical or abstract system.
Key issues in simulation include acquisition of valid source information about the
relevent selection of key characteristics and behaviours, the use of simplifying
approximations and assumptions within the simulation, and fidelity and validity of the
simulation outcomes.
KEY FEATURES
In the Simulation and Visualization Mode, we can see and control time intervals, the
inner workings of data transfer, and the propagation of data across a network. This
helps students understand the fundamental concepts behind network operations. A
solid understanding of network fundamentals can help accelerate learning about
related concepts.
The physical view of devices such as routers, switches, and hosts presents graphical
representations of modular equipment and expansion cards. The physical view also
provides geographic representations, including multiple cities, buildings, and wiring
closets.
COMPATIBLE PLATFORMS
Packet Tracer 5.0 is compatible with the following platforms: Windows (Widows XP,
Windows 2000); Vista (Vista Basic, Vista Premium); and Linux (Ubuntu, Fedora).
Interface:
Main tool bar contains different option e.g. new file, open, save, print, copy, paste, do
undo, zoom in, zoom out etc.
A network topology can be built by selecting devices and the media. Several type of
devices and network connections can be used. For example: switches, routers, end
systems, wireless connections etc.
PDUs: Simple PDUs (Protocol Data Units). E.g. ICMP, ARP, TCP etc.
Network Simulation
All the network setup is performed on real time mode. Simulation mode is used to
simulate the network to check its behavior in graphical way
Network Scenarios
Multiple scenarios can be created and deleted by clicking on the New and Delete
button in the scenario panel. The scenarios can be toggled between without deleting.
LAB TASK:
Q1: Download latest version of Boson Netsim 4.0 Beta final with its crack.
Q2: Write the description of the following tabs of Packet Tracer 6.0.1
1. Menu Bar
2. Common Toolbar
3. Device-Type Selection Box
4. Device-Specific Selection Box
5. Logical Toolbar
6. Physical Toolbar
7. Power Cycle device
8. Simulation Mode
THEORY
This section presents the two user levels and various modes of the Cisco IOS software.
EXERCISE
STEP 1:
When you open a console session in a switch, you are automatically in user EXEC
command mode. The EXEC commands available at the user level are a subset of
those available at the privileged level. In general, the user EXEC commands allow
you to connect to remote devices, change terminal settings on a temporary basis,
perform basic tests, and list system information.
You will notice that the switch displays a switch> prompt. The right arrow (>) in the
prompt indicates that the switch is at the user EXEC level. The user EXEC level does
not contain any commands that might control (for example, reload or configure) the
operation of the switch. To list the commands available at
The operation of the router. To list the commands available at the user EXEC level,
type? at the switch> prompt.
STEP 2:
ENABLE?
Critical commands (for example, configuration and management) require that the user be
logged into privileged EXEC level. To change to the privileged EXEC level, type enable at
the switch> prompt. The switch prompt changes to switch#. The privileged EXEC mode
prompt consists of the host name of the device followed by the pound sign (#). Then use the
help system to display the commands available in privileged EXEC mode.
Privileged EXEC level can be password protected to allow only authorized users the ability to
configure or manage the switch.
You can then specify either the terminal, nonvolatile memory (NVRAM), or a file stored on a
network server as the source of configuration commands. Configuring from the terminal is the
system default. You can specify the source of the commands when first entering the
command, by entering configure terminal, configure memory, or configure network. For now,
press Return to select the default, terminal configuration.
To exit interface configuration mode and return to global configuration mode, enter the exit
command.
Command syntax help can be used to obtain a list of command, keyword, or argument options
that are available based on the syntax you have already entered. To use command syntax help,
enter ? In the place of a keyword or argument.
STEP 1 ENABLE
Context-sensitive command syntax help can be used to obtain a list of commands, keywords,
or argument options that are available, based on the syntax you have already entered. To use
command syntax help to see a list of arguments that can be used with the configure command,
enter configure, with ? in the place of a keyword or argument. Include a space before the
question mark.
STEP 2: CONFIGURE
Context-sensitive command syntax help can be used to obtain a list of commands, keywords,
or argument options that are available, based on the syntax you have already entered. To use
command syntax help to see a list of arguments that can be used with the configure command,
enter configure, with ? in the place of a keyword or argument. Include a space before the
question mark.
You have already learned about the Ctrl-U hot key. The following table offers a
comprehensive list of the hot keys and some other keyboard editing functions.
Table 8.1
Use the Ctrl-R hot key to redisplay the current line in the IOS software. Then use the Ctrl-
A hot key to move the cursor to the beginning of the current line. Then use the up arrow key
on the keyboard to move backwards through the commands in the command buffer—that is,
the commands that have been used since entering privileged EXEC mode. Note that a few of
the commands you entered in privileged EXEC mode don't appear in the buffer. These are the
commands you deleted from the command line with the Ctrl-U hot key; the deletion also
removes those commands from the command buffer. You can use the down arrow key to
The default switch name is "Switch." Giving each switch a unique name aids in
network management by allowing you to uniquely identify each switch within the
network. The name of the switch is considered to be the host name and is displayed in
the system prompt. Let's change the host name from "Switch" to "Switch1." Notice
that the name in the system prompt changes immediately after the hostname command
is entered.
Task Command
Set the Error! Hyperlink reference not valid. so that error messages will have accurate
Error! Hyperlink reference not valid.. The switch will use this information to timestamp
error messages. Use the following information for the time and date: 11:56:50 11
March 1995. Then use the show clock command to view the new clock setting.
Task Command
The message-of-the-day banner is displayed at login and is useful for sending startup
messages to all connected terminals. By default, no message is displayed at logon.
Enter the banner motd command in global configuration mode. When using the
banner motd command, enter a few blank spaces and then type a delimiting character.
The information typed until the next delimiting character is recognized as the message
of the day. In this simulation, use the pound key (#) as the delimiting character.
Now display the running configuration, to see the interface description you just
configured. To display the running configuration, use the show running-config
command in privileged EXEC mode.
Notice the commands that you have configured so far in this Basic Configuration Lab:
hostname, service timestamps, banner motd, and interface description.
Task Command
You can use the password command, in line configuration mode, to configure a
password to restrict access to a switch. Console passwords can be established on
individual lines. Remember that passwords are case-sensitive. Passwords can be
configured for console terminals or for incoming Telnet sessions. Configure the
password cisco for console line 0. Then exit the EXEC completely and log back into
the switch. You will be prompted for the console password you just configured before
you can enter user EXEC mode.
Task Command
To further restrict access to the switch, configure the password cisco for Error!
Hyperlink reference not valid. zero through four
Task Command
Task Command
Table 5.6
Step 8: configure terminal, logging buffered
To copy logging messages, such as errors, to an internal buffer, use the logging
buffered command. The buffer is circular, so those newer messages overwrite older
ones after the buffer is filled. Having a log of these messages can be useful when
troubleshooting network problems. Now let's generate some logging messages.
Task Command
To view information about a particular interface, you can use the show interface
command, which provides the following important information:
Task Command
Table 5.8
To display the startup configuration that is stored in NVRAM, use the show startup-
config command in privileged EXEC mode.
Task Command
Table 5.9
Save the current running configuration by using the copy running-config startup-
config command to overwrite the startup configuration stored in Error! Hyperlink
reference not valid.. A Cisco IOS switch stores configurations in two locations—RAM
and NVRAM. Stored in Error! Hyperlink reference not valid., the Error! Hyperlink
reference not valid. is used by the switch during operation. Any configuration changes
to the switch are made to the running configuration and take effect immediately after
the command is entered. The Error! Hyperlink reference not valid. is saved in NVRAM
and is loaded as the running configuration when the switch boots up. If a switch loses
power or is reloaded, changes to the running configuration are lost unless they have
been saved to the startup configuration. Tip: When editing a configuration, save often.
Task Command
Table 5.10
Step 12: show version
Finally, you will use one more command that can be used to collect information about
the configuration and status of a switch. This information can be very helpful in
troubleshooting switch problems. The show version command provides much
information, including the following:
Switch Type and Processor type - Model number and processor type
Table 5.11
From privileged EXEC mode, display the software version information with the show
version command.
Task Command
Lab Task:
Q1: Perform all the basic switch configurations those are mention in manual
& submit the hard copy.
Q2: Write description of any three commands of ‘User Mode”.
Q3: Write description of any three commands of ‘Privileged Mode”.
Q4: Run these commands:
(i) #show version
(ii) #show interfaces
(iii) #show startup-config
(iv) #show running-config
(v) #show interfaces
(vi) #show clock & find out IOS version, IOS file name, interfaces, RAM and
NVRAM.
LAB # 6
MAC ADDRESS & ADDRESS RESOLUTION PROTOCOL
(ARP)
OBJECTIVE
Switches learn MAC address by using ARP protocol.
THEORY
MAC ADDRESS
A MAC (media access control) address is a unique numeric code that is permanently
assigned to each unit of most types of networking hardware, such as network interface
cards (NICs), by the manufacturer at the factory.
An NIC, also referred to as a network adapter, is a circuit board that is plugged into a slot
on a motherboard (the main circuit board on a computer) to enable a computer to
physically connect to a network cable and thereby communicate over a network (i.e., to
one or more other computers). Some computers use network interface adapter circuitry
that is built directly into the motherboard instead of a separate card.
Although MAC addresses are generally described as being permanent, it is possible for
users to change them.
ARP
Address Resolution Protocol, a network layer protocol used to find the MAC address
when an IP address is known, such as an Ethernet address. A host wishing to obtain a
physical address of a other machine it broadcasts an ARP request onto the TCP/IP
network. The host on the network that has the IP address in the request it replies with its
physical/hardware address.
There is also Reverse ARP (RARP) which can be used by a host to discover IP address
when MAC address is known. In this case, the host broadcasts its physical address and a
RARP server replies with the host's IP address.
NETWORK SETUP:
It shows that how to setup a network among 1 switch and their devices
EXERCISE 6.1
After giving IP address to all computers, we can ping all the IP addresses with each other
First we click on desktop button
After this we click on Command Prompt and write the IP Address of the
destination with Ping command
Then we click on CLI mode and write the command for MAC addresses
#show mac-address-table
After this we click on Auto Capture/Play button and due to this we can see ARP
and many other packets flowing
When we will click on green ARP button the layer wise description will be shown.
Options:
-a [hostname], --display [hostname]
Shows the entries of the specified hosts. If the hostname parameter is not used, all entries
will be displayed.
-d hostname, --delete hostname
Remove any entry for the specified host. This can be used if the indicated host is brought
down.
-v, --verbose
Tell the user what is going on by being verbose.
-n, --umeric
shows numerical addresses instead of trying to determine symbolic host, port or user
names.
-H type, --hw-type type
When setting or reading the ARP cache, this optional parameter tells arp which class of
entries it should check for.
Procedure:
When IP determines that the IP address is for the local network, the source host checks
its own ARP cache for the HW address of destination host.
If its find no mapping, ARP builds a request with the question “Who is this IP address,
and what is your hardware address?” The ARP request is sent as a broadcast so that all
local hosts can receive and process it.
Each host on the local network receives the broadcast and checks for a match to its
own IP address. If a host does not find a match, it ignores the request.
The destination host determines that the IP address in the request matches its own IP
address and sends an ARP reply directly to the source host with its HP address. If then
updates its ARP cache with the IP address/HW address mapping to the source host.
ARP Operation –
Example 6.1
The operation of ARP is straightforward. Let's say an IP-based station (station "A")
with IP address 192.0.2.1 wishes to send data over the Ethernet channel to another IP-
based station (station "B") with IP address 192.0.2.2. Station "A" sends a packet to the
broadcast address containing an ARP request. The ARP request basically says "Will
the station on this Ethernet channel that has the IP address of 192.0.2.2 please tell me
what the address of its Ethernet interface is?"
Since the ARP request is sent in a broadcast frame, every Ethernet interface on the
network reads it in and hands the ARP request to the networking software running on
the station. Only station "B" with IP address 192.0.2.2 will respond, by sending a
packet containing the Ethernet address of station "B" back to the requesting station.
Now station "A" has an Ethernet address to which it can send data destined for station
"B," and the high-level protocol communication can precede.
Exercise 6.2
Ping the local NT based host. Use ARP to check the MAC Address.
What is the output?
Exercise 6.3
Ping the local Linux based host. Use the ARP to check the MAC Address
What is the output?
Exercise 6.4
Ping the nonexistent local host. Check ARP cache to see the MAC Address.
Exercise 6.5
Ping a remote host. Check ARP cache. What MAC Address has been entered into the
cache?
Exercise 6.6
Use ARP utility on Linux. Logging into liaquat .Read the manual page of ARP. For
reading the manual page type man ARP
Exercise 6.7
Compare ARP utility in Linux versus ARP utility in Windows NT .What capabilities are
available in each.
Exercise 6.8
To add a route entry
In this procedure, you will add a static routing table entry for the router
Type the following command where x is the IP address
Route add 1341.107.2.0 mask 255.255.0 131.107.x.1
View the entries in the route table, and verify that the route is listed before you continue
Ping the instructor computer (131.107.2.200)
Exercise 6.9)
To restore the default gateway address
In this procedure, you will restore the address for the default gateway. This will allow
packets to be sent to the default gateway when no route entry for the destination networks.
Access the Microsoft TCP/IP Properties dialog box
In the Default Gateway box, type your default gateway address
Click OK
Click OK
Exercise 6.10
To test communication. In this procedure, you will test the configured default gateway
address to verify that internetwork operations are successfully.
Switch to the command prompt and use the route print command to view the routing table.
Is the default gateway address listed under Gateway Address?
Ping hosts on each network to verify that communications can be established.
HOME ASSIGNMENT
Q1: What is the in-addr.arpa domain?
Q2: Perform all the above-mentioned steps and submit the hard copy.
Q3: Find out your system MAC address by using TCP/IP utility.
Q4: Analyze ARP packets and define different terms in its header.
2. Hardware/Software required
3. Diagram
4. Methodology
5. Observation
7. Conclusion
THEORY
The Domain Name System (DNS) provides translation between symbolic names and IP addresses.
The heart of Intranets and the Internet is the Domain Name System (DNS), the way in which
computers can contact each other and do things such as exchange electronic mail, or display Web
pages. The Internet Protocol (IP) uses Internet address information and the DNS to deliver mail and
other information from computer to Background Structure of DNS Names. Each name consists of a
sequence of alphanumeric components separated by periods.
Examples:
www.eg.bucknell.edu
www.netbook.cs.purdue.edu
charcoal.eng.bucknell.edu
aurangzeb.ssuet.edu.pk
Names are hierarchical, with most-significant component on the right
Left-most component is, generally, a computer name
IMPLEMENTING DNS
IP assigns 32-bit addresses to hosts (interfaces)
Binary addresses easy for computers to manage
All applications use IP addresses through the TCP/IP protocol software
EXERCISE 9.1
Object:
To configure the DNS Server service search order
Log on as Administrator
At a command prompt, type ipconfig and then press ENTER
Record the IP address for your computer
Switch to the Microsoft TCP/IP Properties dialog box, and then click the DNS tab
In the Domain box, type Domain1 (on your domain name)
Under DNS Service Search Order, click Add
In the DNS Server box, type in the IP address for your dns server, and then click Add
Click OK
The Network dialog box appears
Click OK to close the Network dialog box
EXERCISE 9.2
Object:
EXERCISE 9.3
Object:
To use NSLOOKUP in command mode
At a command prompt, modify the properties so that it has a screen buffer size of 50
Use the Layout property page to do this
If the command prompt is not full-screen, press ALT+ENTER
Type the following command
Nslookup host x
where host x is a host in your domain
NSLOOPKP will return the IP address of the computer hostx because the information is stored in
the DNS database.
Exit the command prompt
EXERCISE 9.4
Object:
With the help of nslookup find the CNAME for sirsyed.ssuet.edu.pk
Type at the command prompt
C:\nslookup –query=cname
Then type sirsyed.ssuet.edu.pk
Write the Output
EXERCISE 9.5
Object:
Use nslookup to see the MX records for ssuet.edu.pk
Type at the command prompt
C:\nslookup –query=mx
Then type ssuet.edu.pk
Record the output
EXERCISE 9.7
Object:
EXERCISE 9.8
Object:
EXERCISE 9.9
Object:
Use nslookup find what is the hostname of the machine with the IP address 192.168.1.13?
Type at the command prompt
C:\nslookup 192.168.1.13
Record the output
EXERCISE 9.10
Object:
Use nslookup find what is the hostname of the machine with the IP address 192.168.2.1?
Type at the command prompt
C:\nslookup 192.168.2.1
Record the output
EXERCISE 9.11
Object:
Use nslookup find what is the hostname of the machine with the IP address 205.227.44.44 ?
Type at the command prompt
C:\nslookup 205.227.44.44
Record the output
Object:
What is the IP address of the machine www.redhat.com?
Record the output
EXERCISE 9.13
Object:
Using a web browser connect to the machine www.ssuet.edu.pk. Then connect to the machine
ssuet.edu.pk. Why does it connect to the same machine?
EXERCISE 9.14
Object:
Using a web browser connect to the machine www. Then connect to the machine
www.ssuet.edu.pk. Why does it connect to the same machine?
EXERCISE 9.15
Object:
Which computers are the authoritative name servers for the domain yahoo.com?
Record the output
EXERCISE 9.16
Object:
Which computers are the authoritative name servers for the domain oracle.com?
Record the output
EXERCISE 9.17
Object:
Which computers are the authoritative name servers for the domain microsoft.com?
Record the output
EXERCISE 9.18
Object:
What information can you find out from the DNS about the host www.sun.com?
Record the output
THEORY
Computer networks can be of any form like a LAN, WAN etc. If you are connected to a local LAN
or an internet connection, the IP addresses form the basis of communication over computer
networks. An IP address is the identity of a host or a computer device while connected to any
network.
In most of the cases when you connect your computer to a LAN or internet, you’ll notice that the IP
address and other information like subnet mask etc. are assigned to your computer automatically. As
the name suggests, DHCP is used to control the network configuration of a host through a remote
server. DHCP functionality comes installed as a default feature in most of the contemporary
operating systems. DHCP is an excellent alternative to the time-consuming manual configuration of
network settings on a host or a network device.
DHCP works on a client-server model. Being a protocol, it has its own set of messages that are
exchanged between client and server.
1. DHCPDISCOVER
It is a DHCP message that marks the beginning of a DHCP interaction between client and server.
This message is sent by a client (host or device connected to a network) that is connected to a local
subnet. It’s a broadcast message that uses 255.255.255.255 as destination IP address while the
source IP address is 0.0.0.0
2. DHCPOFFER
3. DHCPREQUEST
This DHCP message is sent in response to DHCPOFFER indicating that the client has accepted the
network configuration sent in DHCPOFFER message from the server.
4. DHCPACK
This message is sent by the DHCP server in response to DHCPREQUEST received from the client.
This message marks the end of the process that started with DHCPDISCOVER. The DHCPACK
message is nothing but an acknowledgement by the DHCP server that authorizes the DHCP client to
start using the network configuration it received from the DHCP server earlier.
With all the necessary information on how DHCP works, one should also know that the IP address
assigned by DHCP server to DHCP client is on a lease. After the lease expires the DHCP server is
free to assign the same IP address to any other host or device requesting for the same. For example,
keeping lease time 8-10 hours is helpful in case of PC’s that are shut down at the end of the day.
So, lease has to be renewed from time to time. The DHCP client tries to renew the lease after half of
the lease time has expired. This is done by the exchange of DHCPREQUEST and DHCPACK
messages. While doing all this, the client enters the renewing stage.
OBJECTIVE
THEORY
Telnet is a TCP/IP protocol, triggered by user command that allows you to access a remote
computer. While obtaining files from a remote computer via FTP is common, Telnet actually
goes one step further and allows you to log on as a regular user of the computer, with access to
all data and programs that may be installed on that computer. Telnet is usually used for technical
support purposes.
Telnet uses software, installed on your computer, to create a connection with the remote host.
The Telnet client (software), at your command, will send a request to the Telnet server (remote
host). The server will reply asking for a user name and password. If accepted, the Telnet client
will establish a connection to the host, thus making your computer a virtual terminal and
allowing you complete access to the host's computer.
Telnet requires the use of a user name and password, which means you need to have previously
set up an account on the remote computer. In some cases, however, computers with Telnet will
allow guests to log on with restricted access.
Type these commands for configuration
The line Vty 0-15 command selects the whole 0-15 VTY line range.
Switch(config)#line vty 0 15
Switch(config-line)#password cisco
Switch(config-line)#login
Switch(config-line)#enable secret $suet
Switch(config)#interface vlan 1
Switch(config-if)#ip address 10.0.0.1 255.0.0.0
Switch(config-if)#no shutdown
Switch(config-if)#exit
C:\>telnet 10.0.0.1
THEORY
Secure Shell (SSH) is set of programs which employ public/private key technology for authenticating and
encrypting sessions between user accounts on distributed hosts on the Internet.
SSH works by the exchange and verification of information, using public and private keys, to identify
hosts and users. It then provides encryption of subsequent communication, also by the use of
public/private key cryptography.
As a system administrator, you generate a public and private key pair for the system itself. By use of this
information contained within the system itself, the possibility of someone spoofing the system's identity
by faking IP addresses or mugging up DNS records that associate IP addresses and domain names is
removed. You would have to break into the system and steal its private key in order to successfully
pretend to be that system. This is a big improvement in security.
SSH uses encryption keys to encrypt the data exchanged in an SSH session.
ccn(config-line)#line vty 0 15
ccn(config-line)#login local
ccn(config-line)#transport input ssh
OR
ccn(config)# line vty 0 15
ccn(config-line)# login local
ccn(config-line)# transport input ssh telnet
Password:
ccn>
Verification of SSH
LAB # 10
VIRTUAL LAN
OBJECTIVE
Construct Virtual Lan (VLAN)
THEORY
NETWORK SETUP:
It shows that how to setup a network among 2 switches and their devices
EXERCISE 11.1
Enable the switch to take commands from User. Show vlan command displays the whole
information about vlan through which user could be able to assign ports to its new LAN.
HOME ASSIGNMENTS
Q1: Perform all the basic switch configurations those are mentioned in manual
& Submit the hard copy.
LAB # 11
PORT SECURITY
OBJECTIVE
To secure campus network from unhealthy systems by implementing port security on switches.
THEORY
PORT SECURITY
Port security can be used with dynamically learned and static MAC addresses to restrict a port's
ingress traffic by limiting the MAC addresses that are allowed to send traffic into the port. When
you assign secure MAC addresses to a secure port, the port does not forward ingress traffic that
has source addresses outside the group of defined addresses. If you limit the number of secure
MAC addresses to one and assign a single secure MAC address, the device attached to that port
has the full bandwidth of the port.
When the maximum number of secure MAC addresses is reached on a secure port and
the source MAC address of the ingress traffic is different from any of the identified
secure MAC addresses, port security applies the configured violation mode.
If traffic with a secure MAC address that is configured or learned on one secure port
attempts to access another secure port in the same VLAN, applies the configured
violation mode.
NETWORK SETUP
EXERCISE 12.1
--More--
EXERCISE 12.2
Protect—Drops packets with unknown source addresses until you remove a sufficient
number of secure MAC addresses to drop below the maximum value.
Restrict—Drops packets with unknown source addresses until you remove a sufficient
number of secure MAC addresses to drop below the maximum value and causes the
SecurityViolation counter to increment.
Shutdown—Puts the interface into the error-disabled state immediately and sends an
SNMP trap notification
EXERCISE 12.3
<OUTPUT OMITTED>
HOME ASSIGNMENTS
LAB # 12
SPANNING TREE PROTOCOL
OBJECTIVE
To understand that how to avoid looping by using STP protocol.
THEORY
NETWORK SETUP
It shows that how to setup a network among 2 switches and their devices. Which transform a
bridge in which devices were entertain through there priority level and their MAC-address.
Bridge ID = Priority + MAC address.
EXERCISE 13.1
Global configuration commands apply to features that affect the system as a whole. Use
the configure privileged EXEC command to enter global configuration mode. When you enter
this command, the system EXEC prompts you for the source of the configuration commands:
Configuring from terminal, memory, or network [terminal]?
STEP 3: #SHUTDOWN
Shut down command is used to create substitute path in routers or switches because if there are
two paths for accessing the same devices system will get confused for data transmission through
the whole procedure (data sending and receiving) that which is the best path to transmit the data
and if those devices are slower then the whole transmission will slow down. Through Shut down
command one path will remain closed until the other get slow transmission level or traffic on it.
To exit interface configuration mode and return to global configuration mode, enter the exit
command.
Spanning tree protocol has its priority levels up to 4096 levels. Through this command they are
set to different switches
After returning to global configuration mode, #show spanning-tree command helps the user to see
the whole information about the spanning tree in the device.
For example
VLAN0001
Spanning tree enabled protocol ieee
Root ID Priority 4097
Address 0009.7C0E.B42D
This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
HOME ASSIGNMENTS
Q1: Perform all the basic switch configurations those are mentioned in manual & submit the hard
copy.
LAB # 13
WIRESHARK
OBJECTIVE
How to sniff ARP, DHCP and DNS packets.
THEORY
Network traffic analyzer Ethereal is a network traffic analyzer, or "sniffer", for Unix
and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire.
Ethereal decodes numerous protocols.
Step 1: Interfaces
Shows a dialog box with all currently known interfaces and displaying the current
network traffic amount. Capture sessions can be started from here. Beware: keeping
this box open results in high system load!
Step 2: Options
Initiate a live packet capture (see Capture Options dialog below). If no filename is
specified, a temporary file will be created to hold the capture. The location of the file
can be chosen by setting your TMPDIR environment variable before starting Ethereal.
Otherwise, the default TMPDIR location is system-dependent, but is likely either
/var/tmp or /tmp.
Step 3: Start
Start a live packet capture with the previously seleted options. This won't open the
options dialog box, and can be convenient for repeatingly capturing with the same
options.
Step 4: Stop
Stop a running live capture.
The lowest pane contains a hex and ASCII dump of the actual packet data. Selecting a
field in the packet details highlights the corresponding bytes in this section.
The right mouse button can be used to pop up a menu of operations.
HOME ASSIGNMENT
Q1: Perform all the above-mentioned steps and sniff the ARP and DHCP and DNS
packets.
LAB # 14
Open Ended Lab-II
1. OBJECTIVE: Apply networking commands and configuration settings on a network,
which consist of four departments. Each department has multiple nodes and network
addresses assigned dynamically and fully secured. Each network switch has remote access,
and capable of multi-link support. In addition, network has support of DNS and web servers.
2. Hardware/Software required
3. Diagram
4. Methodology
5. Observation
7. Conclusion