CNMIni
CNMIni
1. Pratik Puri 59
2. Harsh Tayade 67
3. Tejas Uphade 71
4. Hemant Yadav 74
Computer Networks
SE Computer Science & Design Semester: II
Title: Basic Network Configuration and Services using Cisco Packet Tracer.
Objectives:
1. Design the Network Topology
2. Implement VLSM Table Addressing
3. Assign IP Addresses to Devices
4. Configure HTTP Service
5. Configure DNS Service
6. Configure DHCP Service
7. Configure Cisco Access Point
8. Configure SSH and Telnet on Devices
9. Test End-to-End Connectivity
Outcomes:
1. Efficient Network Addressing: By implementing VLSM table addressing, the network
will have optimized IP address allocation, resulting in efficient utilization of IP address
space.
2. Seamless Web-Based Management: Configuring the HTTP service on routers and
switches will enable administrators to manage and monitor network devices through
intuitive web-based interfaces.
3. Streamlined Name Resolution: By configuring the DNS service, devices in the network
will be able to resolve domain names to IP addresses, simplifying the process of
accessing network resources.
4. Automated IP Address Allocation: The DHCP service configuration will automate the
assignment of IP addresses to devices within the network, reducing the administrative
burden and potential for address conflicts.
5. Enhanced Wireless Connectivity: Configuring the Cisco Access Point will provide
wireless connectivity within a specific coverage area, enabling devices to connect
wirelessly and access network resources seamlessly.
6. Secure Remote Access: By configuring SSH and Telnet on devices, administrators will
have secure remote access options for managing and configuring network devices,
ensuring the confidentiality of sensitive information.
7. Verified Connectivity: Testing the end-to-end connectivity will verify the successful
communication between devices in the network, ensuring that all configured services
and connections are functioning as intended.
Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003
Computer Networks
SE Computer Science & Design Semester: II
Theory:
VLSM Table:
A VLSM table is a table that is used to store information about the different subnets that are
created by using Variable Length Subnet Masking (VLSM). VLSM is a subnetting technique
that allows network administrators to create subnets of different sizes. This can be useful in
situations where there are a variety of different requirements for the number of hosts that need
to be accommodated on each subnet.
A VLSM table typically contains the following information:
• The network address of each subnet
• The subnet mask for each subnet
• The number of hosts that can be accommodated on each subnet
VLSM tables can be used to help network administrators to plan and implement VLSM
configurations. They can also be used to troubleshoot problems that may occur with VLSM
configurations.
HTTP Protocol:
HTTP stands for Hypertext Transfer Protocol. It is a protocol that is used to transfer hypertext
documents, such as web pages, between a client and a server.
HTTP Server:
An HTTP server is a computer program that delivers web pages to users. When a user enters
a web address into their browser, the browser sends a request to the HTTP server for the
requested web page. The HTTP server then sends the web page back to the browser, which
displays it to the user.
DNS Protocol:
DNS stands for Domain Name System. It is a protocol that is used to translate domain names,
such as www.google.com, into IP addresses.
DNS Server:
A DNS server is a computer program that translates domain names into IP addresses. When a
user enters a domain name into their browser, the browser sends a request to the DNS server
for the IP address of the domain name. The DNS server then sends the IP address back to the
browser, which then connects to the website at that IP address.
DHCP Protocol:
DHCP stands for Dynamic Host Configuration Protocol. It is a protocol that is used to
automatically assign IP addresses to devices on a network.
Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003
Computer Networks
SE Computer Science & Design Semester: II
DHCP Server:
A DHCP server is a computer program that automatically assigns IP addresses to devices on a
network. When a device boots up on a network, it sends a request to the DHCP server for an IP
address. The DHCP server then assigns an IP address to the device and sends it back to the
device. The DHCP server also assigns other information to the device, such as the subnet mask,
the default gateway, and the DNS server addresses.
Helper Addresses:
A helper address is a special router configuration used to forward broadcast network traffic
from a client machine on one subnet to a server in another subnet.
When a client machine boots up on a network, it sends a broadcast DHCP request to the entire
subnet. The DHCP server that receives the request will respond with an IP address and other
configuration information. However, if the DHCP server is located on a different subnet, the
router will not be able to deliver the request directly. In this case, the router can be configured
with a helper address. The helper address is the IP address of a DHCP server that is located on
the same subnet as the client machine. When the router receives a broadcast DHCP request, it
will forward the request to the helper address. The helper address will then forward the request
to the DHCP server, which will respond with an IP address and other configuration information.
Helper addresses can also be used to forward other UDP traffic, such as BOOTP, DNS, TFTP,
TACACS, TIME, and NetBIOS name and datagram services.
Routing:
Routing is the process of determining the best path for a packet to travel from its source to its
destination. Routers are devices that perform routing. They use routing tables to store
information about the networks that they are connected to and the paths between those
networks.
When a router receives a packet, it looks up the destination address in its routing table. If the
destination address is in the routing table, the router will forward the packet to the next hop in
the path to the destination. If the destination address is not in the routing table, the router will
send a message back to the source indicating that it cannot deliver the packet.
Routing is a critical part of any network. Without routing, packets would not be able to find
their way to their destinations.
There are two main types of routing: static routing and dynamic routing.
• Static routing is when the administrator manually configures the routing table. This is
a simple and easy to understand, but it is not very flexible. If the network topology
changes, the administrator must manually update the routing table.
Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003
Computer Networks
SE Computer Science & Design Semester: II
• Dynamic routing is when the routers automatically exchange routing information with
each other. This is more complex than static routing, but it is more flexible and can
adapt to changes in the network topology.
Cisco Access Point:
A Cisco access point (AP) is a wireless device that connects wireless devices to a wired
network. It is a key component of a wireless network, and it is responsible for providing
wireless access to users and devices.
Cisco access points are available in a variety of models, each with its own set of features and
capabilities. Some of the features that are commonly found in Cisco access points include:
• Wireless security: Cisco access points support a variety of wireless security protocols,
including WPA2-Personal and WPA2-Enterprise.
• Wireless performance: Cisco access points are designed to provide high-performance
wireless connectivity. They support a variety of wireless standards, including
802.11a/b/g/n/ac.
• Wireless management: Cisco access points can be managed using a variety of methods,
including a web-based interface, a command-line interface, and a mobile app.
Cisco access points are a popular choice for businesses and organizations that need to provide
wireless access to their users and devices. They are reliable, secure, and easy to manage.
Secure Shell (SSH):
SSH, or Secure Shell, is a network protocol that provides a secure way to access a remote
computer. SSH uses encryption to protect your data from being intercepted by unauthorized
users.
SSH is a popular choice for system administrators and other users who need to access remote
computers. It is also used by businesses and organizations to provide secure access to their
employees and customers.
Here are some of the most common uses of SSH:
• Remote administration: SSH can be used to remotely administer a computer. This
means that you can log in to a computer from another computer and make changes to
its settings or files.
• File transfer: SSH can be used to transfer files between computers. This is a secure way
to transfer files, as they are encrypted during the transfer.
• Tunneling: SSH can be used to create a secure tunnel between two computers. This can
be used to access resources on a remote computer, such as a file share or a database.
Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003
Computer Networks
SE Computer Science & Design Semester: II
• Port forwarding: SSH can be used to forward ports from one computer to another. This
can be used to access services on a remote computer, such as a web server or a game
server.
SSH is a versatile tool that can be used for a variety of tasks. If you need to access a remote
computer, then SSH is the best way to do it.
Telnet:
Telnet is a network protocol that provides a text-based interface to a remote computer. It is a
very old protocol, and it is not considered to be very secure. Telnet sends all data in cleartext,
which means that anyone who can eavesdrop on the network can see what you are typing.
Telnet is still sometimes used for simple tasks, such as checking the status of a remote server.
However, it is generally not recommended for use in any situation where security is important.
Implementation:
1. Design the topology for the project:
• Create a network topology that includes routers, switches, and devices.
• Identify the connections between the devices and their respective interfaces.
Computer Networks
SE Computer Science & Design Semester: II
Computer Networks
SE Computer Science & Design Semester: II
Do this for all the ports also configure IP if not done already
Computer Networks
SE Computer Science & Design Semester: II
Computer Networks
SE Computer Science & Design Semester: II
• Test the HTTP service by accessing it from a web browser by typing in it’s
IP address (192.168.1.3)
Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003
Computer Networks
SE Computer Science & Design Semester: II
Computer Networks
SE Computer Science & Design Semester: II
Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003
Computer Networks
SE Computer Science & Design Semester: II
Computer Networks
SE Computer Science & Design Semester: II
Computer Networks
SE Computer Science & Design Semester: II
Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003
Computer Networks
SE Computer Science & Design Semester: II
• Set the appropriate SSID (Service Set Identifier) and security settings (e.g.,
WPA2, passphrase) if required.
• Configure the access point to use the correct VLAN or network segment.
• Test wireless connectivity by connecting to the access point from a wireless
device. If everything is successful, this is how the devices connected will
look like.
• And due to this being in the same subnet where we have used DHCP IP
addressing. Switching the IP config to DHCP should assign these devices
with addresses.
Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003
Computer Networks
SE Computer Science & Design Semester: II
Computer Networks
SE Computer Science & Design Semester: II
• On the PC side, you can use the ssh command to connect to the router. The
SSH command takes two arguments: the username and the destination. The
username is the name of the user account that you created on the router, and
the destination is the IP address of the router.
Command - ssh -l <username> <destination ip>
• Once you are connected to the router, you can use the show interface and
show SSH commands to display information about the interfaces and the
SSH configuration.
Commands – show ssh, show interface.
Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003
Computer Networks
SE Computer Science & Design Semester: II
Computer Networks
SE Computer Science & Design Semester: II
Department of Computer Engineering
K. K. Wagh Institute of Engineering Education and Research
Hirabai Haridas Vidyanagari, Amrut Dham, Panchavati, Nashik-422003
Computer Networks
SE Computer Science & Design Semester: II
Final Layout:
IP configuration Table:
DNS (for all devices) : 192.168.1.2
Device Interface IP Address Subnet Mask Default
Gateway
Router0 Gig0/0 192.168.0.1 255.255.255.252 -
Gig0/1 192.168.1.1 255.255.255.224 -
Gig0/2 192.168.2.1 255.255.255.192 -
Router3 Gig0/0 192.168.0.2 255.255.255.252 -
Gig0/1 192.168.4.1 255.255.255.192 -
PC(Pratik, - 192.168.2.2 – 255.255.255.192 192.168.2.1
Harsh, Tejas, 192.168.2.5
Hemant)
DNS Server 192.168.1.2
Fa0 255.255.255.224
HTTP Server 192.168.1.2 192.168.1.1
Computer Networks
SE Computer Science & Design Semester: II
Conclusion:
In conclusion, this project focused on designing and implementing a network infrastructure
using VLSM (Variable Length Subnet Masking) techniques. By effectively dividing the IP
address space, we were able to optimize address allocation and efficiently utilize available
resources. Through the configuration of routers, switches, and services like HTTP, DNS,
DHCP, and SSH, we established a secure and functional network environment. This project
provided hands-on experience in subnetting, network addressing, and device configuration,
enabling a better understanding of network design principles and practical implementation.
Overall, it contributed to enhancing network management skills and ensuring smooth and
reliable connectivity within the network infrastructure.