36 - Extracted - CN LAB FILE
36 - Extracted - CN LAB FILE
OBJECTIVE:
Simulation of web traffic in Packet Tracer
APPARATUS:
Computers, Packet Tracer
DESCRIPTION:
Part 1: Examine HTTP Web Traffic In Part 1 of this activity, you will use Packet Tracer
(PT) Simulation mode to generate web traffic and examine HTTP. Switch from
Realtime to Simulation mode. In the lower right corner of the Packet Tracer interface
are tabs to toggle between Realtime and Simulation mode. PT always starts in Realtime
mode, in which networking protocols operate with realistic timings. However, a
powerful feature of Packet Tracer allows the user to “stop time” by switching to
Simulation mode. In Simulation mode, packets are displayed as animated envelopes,
time is event driven, and the user can step through networking events.
a. Click the Simulation mode icon to switch from Realtime mode to Simulation mode.
b. Select HTTP from the Event List Filters.
1) HTTP may already be the only visible event. Click Edit Filters to display the
available visible events. Toggle the Show All/None checkbox and notice how the check
boxes switch from unchecked to checked or checked to unchecked, depending on the
current state.
2) Click the Show All/None checkbox until all boxes are cleared and then select HTTP.
Click anywhere outside of the Edit Filters box to hide it. The Visible Events should now
only display HTTP. Generate web (HTTP) traffic. Currently the Simulation Panel is
empty. There are six columns listed across the top of the Event List within the
Simulation Panel. As traffic is generated and stepped through, events appear in the list.
The Info column is used to inspect the contents of a particular event. Note: The Web
Server and Web Client are displayed in the left pane. The panels can be adjusted in size
by hovering next to the scroll bar and dragging left or right when the double-headed
arrow appears.
a. Click Web Client in the far left pane.
b. Click the Desktop tab and click the Web Browser icon to open it.
c. In the URL field, enter www.osi.local and click Go. Because time in Simulation
mode is event-driven, you must use the Capture/Forward button to display network
events.
d. Click Capture/Forward four times. There should be four events in the Event List.
Look at the Web Client web browser page. Did anything change?
Page 34
Fig 7.1 web traffic in Packet Tracer
OUTCOME:
Student will be able to understand traffic / collision control in tracer.
RESULT:
Studied various Simulation of web traffic in Packet Tracer
OUTPUT:
Understanding how an own private network can be implemented in web traffic in Packet Tracer
APPLICATION:
Traffic control in networking
Page 35
EXPERIMENT NO. 8
OBJECTIVE:
Study and implementation of various router configuration commands
DESCRIPTION:
Step 1: Configure the router host name.
a. On Customer PC, use the terminal emulation software to connect to the console of the
customer Cisco 1841 ISR. Set the hostname on the router to Customer Router by using
these commands.
Router>enable
Router #configure terminal
Router(config)#hostname Customer Router
Step 2: Configure the privileged mode and secret passwords.
a. In global configuration mode, set the password to cisco.
b. Customer Router(config)#enable password cisco
c. Set an encrypted privileged password to cisco123 using the secret command. Customer
Router(config)#enable secret cisco123
Step 3: Configure the console password.
a. In global configuration mode, switch to line configuration mode to specify the console
line. Customer Router(config)#line console 0
Set the password to cisco123, require that the password be entered at login, and
then exit line configuration mode.
Customer Router(config-line) #password cisco123
Customer Router(config-line) #login
CustomerRouter(config-line) #exit
Customer Router(config)#
Step 4: Configure the vty password to allow Telnet access to the router. In global
configuration mode, switch to line configuration mode to specify the vty lines. Customer
Router(config)#line vty 0 4
Set the password to cisco123, require that the password be entered at login, exit line
configuration mode, and then exit the configuration session.
Customer Router(config-line)#password cisco123
Customer Router(config-line)#login
Customer Router(config-line)#exit
Customer Router(config)#
Step 5: Configure password encryption, a MOTD banner, and turn off domain server
lookup.
Currently, the line passwords and the enable password are shown in clear text when you
show the running configuration. Verify this now by entering the show running-config
command. To avoid the security risk of someone looking over your shoulder and reading
the passwords, encrypt all clear text passwords.
Customer Router(config)#service password-encryption
Use the show running-config command again to verify that the passwords are encrypted.
Page 36
To provide a warning when someone attempts to log in to the router, configure a MOTD
banner.
Customer Router(config)# $Authorized Access Only!$ Test the banner and passwords.
Log out of the router by typing the exit command twice. The banner displays before
the prompt for a password. Enter the password to log back into the router.
You may have noticed that when you enter a command incorrectly at the user or
privileged EXEC prompt, the router pauses while trying to locate an IP address
for the mistyped word you entered. For example, this output shows what happens
when the enable command is mistyped.
Customer Router>enable Translating "enable"...domain server (255.255.255.255)
To prevent this from happening, use the following command to stop all DNS lookups
from the router CLI.
CustomerRouter(config)#no ip domain-lookup
Save the running configuration to the startup configuration.
CustomerRouter(config)#end
CustomerRouter#copy run start
Step 6: Verify the configuration.
a. Log out of your terminal session with the Cisco 1841 customer router.
b. Log in to the Cisco 1841 Customer Router. Enter the console password when
prompted.
c. Navigate to privileged EXEC mode. Enter the privileged EXEC password when
prompted.
d. Click the Check Results button at the bottom of this instruction window to check your
work.
OUTCOME:
Student will be able to understand router configuration commands
RESULT:
Studied implemented of various router configuration commands
OUTPUT:
Configured Router with username and password.
APPLICATION:
● Router configuration
● Router authorization
Page 37
EXPERIMENT NO. 9
OBJECTIVE:
Creation of Networks using routers
DESCRIPTION:
At any rate, you can set up a tightly managed, secure home network. All you have to do
is follow these five steps.
You will also want to ensure that any device that will connect to the router also has an
appropriate network adapter. These devices are your network "clients." New
laptops will have 802.11n adapters (some will support 802.11ac, even). For
older laptops or desktops you can purchase compatible adapters. Once
you've got the right router, you have to set it up, and the first step is to physically
connect your router to a modem provided by your ISP with an Ethernet cable.
● First, unplug or turn off the cable or DSL modem.
● Power up your wireless router and connect the network cable that most likely comes with it
into the port on the router that is labelled "Internet" or "WAN."
● Connect the other end to the cable or DSL modem and power up the modem.
● Don't attempt to connect any devices such as laptops or tablets until you have a good strong
signal indicating a WAN connection on both the router and modem.
Connect an Ethernet cable to one of the LAN ports on the router and the other end to the
Ethernet port of your laptop. On a Windows 7 machine that's connected to the router by
Ethernet, for example, you would go into the Control Panel and click to open "Network
and Internet" and then "Network and Sharing Centre."
Page 38
● From the left-hand window, click "Change adapter settings."
● Right click on "Local Area Connection" (not the Wireless Network Connection) and select
"Properties."
● Highlight “Internet Protocol Version 4 (TCP/IP v4)” and once again, click "Properties."
● Set the first radio button to "Use the following IP address:" and enter the information as
shown in the image above.
● Once you've applied the changes, open up a browser and go the web address of (in our
example) the Cisco/Linksys interface by typing http://192.168.1.1 and using the account
name "admin" and password "admin." Then you are all set to configure security and other
settings.
Most router companies use the same default IP address, admin account, and passwords
on all their routers. Your router's documentation will tell you the specific IP address and
account login information.
● Change the default administrator password. Some networking equipment forces you to do so
once you've accessed the web-based interface, but many consumer routers don't. The settings
for the admin password are usually under the "System" tab or page of the interface. You can
just enter in a new password in the new password field.Change the router's default SSID. The
SSID is the broadcasted name of your wireless network.That's the name that shows up as the
network's name when you scan for available networks. Use a unique name that your
neighbours aren't using for their routers to avoid confusion.
● Assign security. Newer routers may be set by default to automatically configure security by
using WPS (Wi-Fi Protected Setup). Since the goal here is to have full control of your
network, switch from "WPS" to "Manual." Once in manual mode, go into the router's
wireless security page. There is no excuse, except in very limited circumstances when
dealing with legacy technology, to not use WPA/WPA2. WPA security requires clients
connecting to it to use a key or passphrase, which you create within the router's
interface on the same page you set up security. Some routers allow you to enter a string of 64
hexadecimal digits which provides strong security, but most have you create an 8 to
63 letter passphrase. If you are creating a passphrase (or password) be sure to create a strong
password that would be hard to guess. For further advice on generating stronger passwords,
check out our article on making sure your passwords are up to scratch.
● Set up IP addressing. For most networks, the router can be kept at its default DHCP setting.
This means the router will dole out IP addresses to clients that connect to the network,
leaving you without any IP addressing management to do. For extra security, it's not a bad
idea to change the router's default IP, making it more resistant to snooping. Remember,
Page 39
hackers know what the default IP addresses of the most common routers are (even though it's
really tough for them to get to, due to the fact that your IP addresses on your network are
private). For instance, I would change my Cisco/Linksys router's network from 192.168.1.1
to something like 192.168.1.3.
● Disconnect the laptop and reboot it. When the laptop comes back from reboot you should see
the SSID name of your wireless network and be able to connect to it with the passphrase you
created. Congratulations – you're connected wirelessly. But you're not done with your setup
yet!
Advanced steps: DHCP reservation
For those who anticipate connecting servers, NAS devices or any device that you may
access from outside your network, best practice is to configure DHCP Reservation. That
may be a scary sounding term for newbies, but all it means is that you are telling the
router that a specific device always uses a specific IP address, which is set aside or
"reserved" for it.
For example, my router IP is 192.168.1.1. I can give my email server an IP address of
192.168.1.2. I can give a third device, say my NAS server for instance, an IP address of
192.168.1.3, and so on. You don't want to change the first three sets of numbers though,
for most basic home networks. IP addressing has specific rules about formatting, so you
want to retain the first three sets of numbers, called "octets."
You’ll also want to put in the device's MAC address that you are reserving. The MAC
address is usually printed on a sticker affixed to a device. Again, reserving the IP
addresses means those addresses will never be distributed to clients via DHCP and
are "held" for the devices you specify. Reserving IP addresses is good practice for
devices you want to access remotely, because otherwise when the IP address leases
expire and you won't be able to perform remote access.
Don't forget to assign the reserved IPs as static addresses on the devices for which you
made reservations. There are various ways to do this – on Windows servers and
machines you can assign an IP address though the Network settings Control Panel. Other
devices, such as NASes, have areas in their management console where you can assign
an IP address. It really depends on what device you want to set a static address for, so
check with the vendor if you aren't sure.
If you are using the router as an access point, bridge or to extend the signal of an existing
router on a network, you will want to turn off DHCP completely. Having two routers
performing DHCP on the same network can result in a myriad of connection issues.
However, for most home networks , having the router set to use DHCP will suffice.
Page 40
editions of Windows 7. In Windows 7 Starter and Windows 7 Home Basic, you can join a
HomeGroup, but you can't create one.
● When a Windows 7 laptop first connects to the network, the user will be prompted to set the
current network location. Ensure that the location is set to "Home network" (you can check it
in Network and Sharing Centre) because HomeGroup only works on networks set to the
Home location.
● Open up "HomeGroup" in the Control Panel, and then click "Create a HomeGroup." For
every Windows 7 client that you want to give access to the HomeGroup, open HomeGroup in
the Control Panel of those machines and then click "Join now" (those machines have to be
physically or wirelessly connected to the network).
● During the process of setting up or joining a HomeGroup, you can choose the libraries,
printers, or files and folders you want to share (see the next step for details).
● For Windows 8, you create a HomeGroup by moving the mouse to the top right corner of
screen, then click Settings, then Change PC Settings. Click on HomeGroup, then you can
click on Create. As above, you can then select the libraries and devices you want to share
with the HomeGroup.
● If you have a network with an older version of Windows running, then you are going to
create a standard Workgroup. Click Start, right click My Computer, and then click Properties.
In System Properties, click the Computer Name tab. Click "Change," select "Workgroup,"
and enter a workgroup name. Click OK to apply the change. Do the same thing for all
computers that you want sharing data on the network.
● In Windows 7's Control Panel, select the User Accounts icon. User accounts will let you
configure your account and its settings.
● To add and configure other users, from User Accounts, click on "Manage User Accounts,"
and then click on the "Advanced" tab.
● Under "Advanced User Management" click "Advanced" to open up Local Users and Groups.
● Right click on either "Users" or "Groups" to add either to your network.
● If you have a number of people accessing your network and you want to control access to the
data on it, you may also want to set up permissions for files and folders. Create a user
account for every family member and then right click on the folder, click "Properties"
and then the "Sharing" tab. You can add the family members that you want to give
access to any particular folder, and exclude the ones you don't. You can also right
Page 41
click on each Library to select the specific users you want to share with. Right click on
a printer to pull up the "Sharing" tab to set up shared access.
OUTCOME:
Student will be able to create networks using routers
RESULT:
Studied implemented usage of routers in networking
OUTPUT:
Configured Router with username and password.
APPLICATION:
● Cisco Interface
● SSID
● DHCP configuration
Page 42
EXPERIMENT NO. 10
OBJECTIVE:
Configuring networks using the concept of subnetting
APPARATUS:
System, Router
DESCRIPTION:
Subnetworking becomes an important feature as your organization's networking needs
grow. Subnetworking lets you divide up your pool of Internet Protocol version 4 (IPv4)
addresses so you can split those addresses across several physical networks within your
organization.
For administrative or technical reasons, many organizations choose to divide one network
into several subnets. Subnetworking enables several local networks to appear as a single
Internet network to off-site hosts. It divides the addresses for a single network to
accommodate the fact that the network consists of several physical networks. You should
consider using subnets in the following instances:
● When you want to hide the local network topology from the outside world. Using
subnets requires only a single route to external gateways.
● When you want the ability to administer IP addresses locally. For example, a company
may have an engineering subnet, a product marketing subnet, and a sales subnet, each
administered by a different administrator who has control of IP addresses in a given
range.
● When network bandwidth is limited due to cabling constraints. Setting up subnets, each
separated by a gateway host, limits local subnet packets to those that are either destined
for or sent from a local host. In this way, the overall network traffic seen by each host
on the subnet is reduced.
Setting up a subnet requires you to:
● determine the appropriate IP addresses for your subnets
● configure subnet hosts with the correct IP addresses and network masks
● configure gateway hosts between subnets
Subnets allow you more flexibility when assigning network addresses. For details on
network address assignment and network classes, see “Network address”.
Network masks
A network mask, or ``netmask'', is used to divide an IP address into a network address and
a host address. When you set up a network, the network mask must be common to all
network interfaces on that network. The default network masks are 255.0.0.0 for class A,
255.255.0.0 for class B, and 255.255.255.0 for class C networks, as illustrated here:
Page 43
Subnets are created by extending the network ID portion of an address by taking some bits
from the host portion to create a subnet portion. The remaining bits can be used for host
addresses within the subnet. The number of subnets that can be created from an m-bits
long subnet address is 2^m. The number of host addresses per subnet that are available
from an n-bits long host address is (2^n)-2. Unlike the subnet portion of the network
address, the host portion cannot consist of all 0's or 1's. See RFC 1812 and RFC 1878 for
more information.
“Subnetting a class B network”' illustrates the effect on a class B address of extending a
network mask from 255.255.0.0 to 255.255.255.0:
Page 44
B network, you could assign each physical network in that network a subnet number
within that network. The sixteen bits for the host ID could be allocated as eight for subnet
and eight for host, or nine for subnet and seven for host, and so on. Your decision would
be transparent to everyone outside that organization.
A common example of subnetworking is to apply a class C type subnet mask
(255.255.255.0) to a class B network. Applying this mask to a class B network provides
you with 256 possible subnets, each one of which can accommodate 254 possible hosts
(the host addresses 0 and 255 are not acceptable). If you know that none of your subnets
will ever have more than 126 hosts but you need more than 256 but less than 513 subnets,
you could decide to use nine bits for the subnet number, and seven bits for the host
addresses. The appropriate mask for this would be 255.255.255.128.
Given this scheme and a network address of, for example, 131.60, the addresses of the first
and last hosts on the first subnet (131.60.0.0) would be 131.60.0.1 and 131.60.0.126. The
broadcast address on this subnet would be 131.60.0.127.
Partitioning a class C address is a similar process as you must take a portion of the fourth
octet as the subnet address. For example, you might partition the first three (high order)
bits of the fourth octet to represent the subnet, with the last five bits representing the host:
This scheme allows for up to 8 subnets of 30 hosts each, for a total of 240 hosts. The
netmask for the hosts on these subnets is 255.255.255.224. The number 224 is a decimal
representation of the binary octet 11100000, which masks the subnet portion of the IP
address.
Possible subnets for the class C network 221.138.62.0, with associated broadcast
addresses, are:
Subnet Hosts Broadcast address
221.138.62.0 .1-.30 221.138.62.31
221.138.62.32 .33-.62 221.138.62.63
221.138.62.64 .65-.94 221.138.62.95
221.138.62.96 .97-.126 221.138.62.127
221.138.62.128 .129-.158 221.138.62.159
221.138.62.160 .161-.190 221.138.62.191
221.138.62.192 .193-.222 221.138.62.223
221.138.62.224 .225-.254 221.138.62.255
After you determine the new addresses for your hosts, you must use the
Network Configuration Manager to configure them. In addition, you must
configure routers between your subnets: these are hosts with multiple networking
interfaces and specialized routing hardware that can serve more than one network.
Page 45
Subnetting and Classless Interdomain Routing
The number of class A and B addresses that are available for allocation to new networks
has been steadily diminishing over time and is now virtually exhausted. In the late 1980s
nearly all of the new networks assigned were class B, and in 1990 it became apparent that
class B networks would run out by 1994 if the trend continued. Class C addresses
(with a maximum of 254 hosts) were hardly being used because they were too small to be
useful for most organizations, while class B networks were too large to be densely
populated by any but the largest organizations.
The network number allocation policies of the InterNIC were changed in 1990, to avert the
class B address exhaustion. If you apply for a network number, you are likely to be
assigned a set of than a single class B address. Which of these you receive will depend on
the number of hosts that will exist on your network(s).
Where an organization has a range of class C network numbers, the range provided is
assigned as a bit-wise contiguous range of network numbers, and the number of networks
in the range is a power of 2. All IP addresses in the range have a common prefix, and
every address with that prefix is within the range. For example, an organization requiring
about 1000 IP addresses would be assigned four class C network numbers. A range of
addresses satisfying these rules would be 195.34.136 through 195.34.139, in which case
the range would consist of all the IP addresses with the 22-bit prefix 195.34.136. This is
represented by the notation 195.34.136/22 (with the trailing zeros removed). ``Subnetting
with CIDR'' illustrates this scheme.
Page 46
described in “Subnetting and Classless Interdomain Routing”. Native IP and RIP version 1
routing only support static subnetting. Variable length subnetting allows the subnets that
make up the network to use different subnet masks. A small subnet with only a few hosts
needs a subnet mask that accommodates only these hosts. A subnet with many hosts may
need a different subnet mask to accommodate the hosts. Variable length subnetting allows
you to divide the network so that it is possible to define adequate hosts for each subnet by
changing the subnet mask for each network. RIP version 2 supports variable length
subnetting as well as static subnetting. RIP version 1 only supports standard class lengths.
For example, a company with the address 195.34.136.0 needs to split the address range
into five separate networks, as shown in “Variable length subnetting”. There need to be
254 hosts on 3 of the subnets and 126 hosts on 2 of the subnets. This cannot be achieved
using static subnetting as it can only divide the network into four subnets with 254 hosts
each or eight subnets with 126 hosts each. To divide the address into five subnets, you
should use multiple netmasks. The first four subnets use the mask 255.255.255.0 and have
254 hosts each. The first subnet can then be divided into two subnets with 126 hosts each
and a subnet mask of 255.255.255.128. There would be three subnets with 254 hosts each
and two subnets with 126 hosts each.
OUTCOMES:
Students will be able to understand how to divide a big network into smaller networks. When a
network is designed then a network has multiple devices and some of these devices need an IP
Page 47
address for example Router, then what IP should be assigned to router is totally dependent on the
sub network. With this student will be able to divide a network into smaller networks.
APPLICATION:
It can be used in CIDR techniques.
OUTPUT:
Explored the knowledge of computer networks by designing different class
networks with different IP ranges.
RESULT:
Subnet planning and its implementation
Page 48
EXPERIMENT NO. 11
OBJECTIVE:
Practical implementation of basic network command and Network configuration
commands like ping, ipconfig, netstat, tracert etc. for troubleshooting network related
problems.
DESCRIPTION:
All commands related to Network configuration which includes how to switch to privilege
mode and normal mode and how to configure router interface and how to save this
configuration to flash memory or permanent memory.
This commands includes
• Configuring the Router commands
• General Commands to configure network
• Privileged Mode commands of a router
• Router Processes & Statistics
• IP Commands
• Other IP Commands e.g. show ip route etc.
ping: ping(8) sends an ICMP ECHO_REQUEST packet to the specified host. If the host
responds, you get an ICMP packet back. Sounds strange? Well, you can “ping” an IP
address to see if a machine is alive. If there is no response, you know something is wrong.
Ipconfig: Displays all current TCP/IP network configuration values and refreshes Dynamic
Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. Used
without parameters, ipconfig displays Internet Protocol version 4 (IPv4) and IPv6
addresses, subnet mask, and default gateway for all adapters.
Netstat: The netstat command generates displays that show network status and protocol
statistics . You can display the status of TCP and UDP endpoints in table format, routing
table information, and interface information.
netstat displays various types of network data depending on the command line option
selected. These displays are the most useful for system administration. The syntax for this
form is:
netstat [-m] [-n] [-s] [-i | -r] [-f address_family]
The most frequently used options for determining network status are: s, r, and i. See the
netstat(1M) man page for a description of the options.
Traceroute: Tracert is a command which can show you the path a packet of information
takes from and is discarded. In addition to this, it will tell you how long each 'hop' from
router to router takes.
nslookup: Displays information from Domain Name System (DNS) name servers. NOTE
If you write the command as above it shows as default your pc's server name firstly.
pathping: A better version of tracert that gives you statistics about packet loss and latency.
In this activity, you will use the Cisco IOS CLI to apply an initial configuration to a router,
including host name, passwords, a message-of-the-day (MOTD) banner, and other basic
settings
Page 49
OUTCOME:
Student will be able to understand how to configure commands like ping, ipconfig, netstat,
tracert
OUTPUT:
Explored various commands and also how to switch to privilege mode and normal mode
and how to configure router interface and how to save this configuration to flash memory
or permanent memory.
Page 50
EXPERIMENT NO. 12
OBJECTIVE:
Configuration of networks using static and default routes
APPARATUS:
Routers, system
DESCRIPTION:
Step 1: Test connectivity between the PCs and the default gateway.
To determine if there is connectivity from each PC to its configured gateway, first use a simple
ping test.
a. Click BOpc and go to Desktop > Command Prompt.
b. From the command prompt, type the ipconfig command. Note the IP address for BOpc
and the default gateway address. The default gateway address is the IP address for the
Fast Ethernet interface on Branch
c. Ping 192.168.1.1, the default gateway address for the BranchOffice LAN, from the
command prompt on BOpc. This ping should be successful.
d. Click PNpc and go to Desktop > Command Prompt
e. From the command prompt, type the ipconfig command. Note the IP address for PNpc
and the default gateway address. The default gateway address is the IP address for the
Fast Ethernet interface on Partne
f. Ping 192.168.3.1, the default gateway address for the PartnerNet LAN, from the
command prompt on Thiping should be successful
g. Repeat steps a, b, and c for MOpc and its respective default gateway, the Fast Ethernet
interface on MainOffice. Each of these ping tests should be successful.
Page 51
b. Test connectivity with MainOffice by pinging 10.10.10.5, the IP address of the serial
2/0 interface. This ping should fail.
c. Issue the show ip route command from the terminal window of BOpc. Note that only
directly connected routes are shown in the BranchOffice routing table. The ping to
10.10.10.5 failed because the BranchOffice router has no routing table entry for
10.10.10.5.
d. Repeat steps a through d on the other two PCs. The pings to directly connected
networks will succeed. However, pings to remote networks will fail.
e. What steps must be taken to reach all the networks from any PC in the activity?
Page 52
k. Type copy run starts to save the configuration change.
l. Repeat steps f through k on the PartnerNet router, using 10.10.10.5 as the next hop IP
address.
OUTCOME:
Student will be able to configure of networks using static and default routes
APPLICATION:
● It can be used in configuration of routers.
● connectivity between the PCs and the default gateway
Page 53
OUTPUT:
Explored various configure of networks using static and default routes
RESULT:
Tested connectivity between network
Page 54