Computer Networking Lab Manual 2023-24
Computer Networking Lab Manual 2023-24
1. Prepare hardware and software specification for basic computer system and networking
The following are the three methods of connecting a computer to the Internet using software and
hardware peripherals.
❖ Establishing an internet connection via Wireless Broadband
❖ Linking a computer to the internet through an Ethernet Cable
❖ Connecting a Computer to the internet via a Dial-Up Connection
Hardware requirements:
Modem (Modulator and Demodulator)
0 Modem is a device which converts computer data to a signal that can be transmitted over the
network.
Repeater
0 A repeater operates at the physical layer.
0 It is a 2 port device. One for input and one for output.
0 Its job is to regenerate the signal before the signal becomes too weak.
0 Repeater is not amplifier, repeater copy the signal bit by bit and regenerate it at the original strength.
0 Repeater is a low cost device.
Hub
0 Hub operates at physical layer.
0 A hub is basically a multiport repeater.
0 Hub connects multiple host/stations.
0 Hub cannot filter data, so data packets are sent to all the other connected devices of the hub.
0 Hub is not secure because of its working mechanism.
0 Hub also creates more network traffic.
Bridge
0 A bridge operates at data link layer.
0 It is a 2 port device. One for input and one for output.
0 Bridge is more intelligent that hub.
0 A bridge is a repeater, with add on functionality of filtering content by reading MAC (Media Access
Control) address of source and destination.
0 Every bridge has a bridge table.
0 It is used to connect two LANs that uses same protocols.
Switch
0 A switch operates at data link layer.
0 Switch is a multiport bridge. Switch has buffer to temporaiily store incoming packets.
0 Switch performs error checking before forwarding the data that makes it very efficient.
0 As like bridge switch does filter and forwarding.
Every switch maintains a Forwarding Information Base (FIB) table in consultation with which data
--
0
--
packets are forwarded.
Router
0 A router operates at network layer.
0 Router is a multiport device.
0 Router routes the packet based on IP (Internet Protocol) address.
0 Routers normally connect LANs and WANs together.
0 Router is an intelligence device with decision making capability which is used to forward packets
based on calculated sh01test path.
0 Every router has a Routing table and it's connect is dynamically updated.
0
Routers are costlier than switch.
Gateways
0 A gateway operates at network layer.
0 Gateways are used to connect networks that uses different network models.
0 Gateways are also called protocol converter.
0 Gateways are more complex than switch and routers.
0 Ethernet connection (LAN) or Wireless adapter(Wi-Fi Router)
Access gateway
Software requirements:
0 The operating system should support
0 TCP (Transfer Control Protocol) / IP (Internet Protocol)
0 SMTP (Simple Mail Transfer Protocol)
0 FTP (File Transfer Protocol)
0 HTTP (Hyper Text Transfer Protocol)
0 HTTPS (Hyper Text Transfer Protocol Secured)
0 Browsers and other Internet clients access to the web applications such as Outlook, Gmail,
WhatsApp, Facebook, Twitter and etc.
2. Study of different types of Network cables and practically implement the cross wired cable and
straight through cable using clamping tool.
1. Ethernet Cable (Cat5e, Cat6, Cat6a, Cat7, and Cat8): These cables are widely used for wired
networking. They come in different categories, with higher numbers indicating better performance.
Cat5e is suitable for most home and small office networks, while Cat6 and above offer higher
bandwidth and faster data transmission.
2. Coaxial Cable: Coaxial cables are often used for cable television and older Ethernet installations.
They have a copper core surrounded by insulation, a metallic shield, and an outer insulating layer.
3. Fiber Optic Cable (Single-mode and Multi-mode): Fiber optic cables use light to transmit data and
offer high bandwidth and fast data transfer rates. Single-mode fibers are used for long-distance,
high-speed connections, while multi-mode fibers are suitable for shorter distances.
4. Twisted Pair Cable (Unshielded Twisted Pair - UTP and Shielded Twisted Pair - STP): Twisted
pair cables are commonly used in Ethernet networks. UTP cables have twisted pairs of copper wires
and are widely used in home and office networks. STP cables have an additional metal shield for
added protection against interference.
5. USB Cables: Universal Serial Bus (USB) cables are used to connect various devices, including
computers, p1inters, and peripherals. USB is commonly used for both data transfer and device
charging.
6. HDMI Cable: High-Definition Multimedia Interface (HDMI) cables are used to transmit audio and
video signals, often between devices like computers, TVs, and projectors.
7. Power over Ethernet (PoE) Cable: These cables can carry both data and electrical power, making
them useful for devices like IP cameras and VoIP phones.
8. Se1ial Cables (RS-232): Se1ial cables are used for connecting devices like older modems, printers,
and industrial equipment.
9. Console Cables: These are used to configure and manage networking equipment such as routers
and switches, typically via a serial or USB connection.
10. Patch Cables: These short Ethernet cables are used to connect devices within a network, often
within the same rack or patch panel.
11. Crossover Cables: Crossover cables were used to connect similar devices directly, but with modern
networking equipment, they are less commonly required as many devices have auto-sensing ports.
Understanding the different types of network cables and their applications is crucial for designing,
setting up, and maintaining network infrastructure. The choice of cable depends on factors like network
requirements, distance, and the specific devices being connected.
Implement the cross wired cable and straight through cable using clamping tool
Materials needed: RJ-45 connector, twisted pair cable, and a crimping tool.
"To perform these practical tasks, follow the steps outlined below:
1. Begin by carefully removing approximately 2 inches of the plastic jacket from the cable's end.
Exercise caution to avoid nicking or cutting into the internal wires, as this can adversely affect the
cable's performance or render it unusable. Examine the wires for any nicks or cuts, and if present, trim
off the affected portion and start anew.
2. Gently separate the wires while maintaining a firm grip on the jacket's base with your other hand.
It's important to prevent the wires from untwisting deep within the jacket. For Category 5 cables, only
the last half-inch of wire should remain untwisted at the end to ensure compliance with specifications.
At this stage, you may have significantly more than the recommended half-inch of untwisted wire.
3. You will need to install two end jacks on your cable. If you are working with a pre-made cable with
one end already prepared, you will only need to install the remaining end, which is the cross-over end.
Below, you will find two diagrams illustrating the cable arrangement for each type of cable end.
Determine which end you are constructing and refer to the corresponding diagram for guidance."
Green-White TX+1
Orange-White RX+3 C:
= =
::""'."'.'."""��:::::::::;;;;::;;;;;;;;;;;;:==="""'."""'.'."""��;;;;;;:;;::;;;;;;;::== :) 3TX+
�lue 4 4
Blue-White 5
Brown 8 8
PC CROSSOVER HUB
Green-White TX+ I
Green TX-2
Orange-White RX+3
Blue 4
Blue-White s
Orange RX-6
Brown-White 7 7
Brown a 8
,�nl�
Go to Network and Internet> Network and Sharin g Center.
)<."
- □ X
-,=�nlwri lg�
1' Eil • C:,n-:,olPrc v '-' Mlll'<hCo,trd'•ncl p
�miffldS«!dy
t"' INet\\00:andSharinqCenterl
VleWnetl'lfflstat\15,ndtlsb lonntettoinetwcfl 'hMnetworl:COffl'l'Aersil'lddMces
,, 1..
,.,. ,,,,.,,,.,, .,,..i., ... lhlilc l,to·, ll9t,..l"l!jlc�:<o.n:l)·p c
'.>o,eto:kuccoJoe,ct'r'Jt•�::, • �-1.itnd
'la l��::,�.::�1,1��·�.l.J
hch"•r>dP.ta:11(\1,'irdc"'"i') r:ill
•· • Ap�;i,r,11nce .Jnd Pe�oraliution Hir:M,r,,ndSound
t\.. lntPmPI OJltWffi
0-oc,c hcm�roo.p o·d,hi:,i,g �lic:•M Clvo.1. L..:111yu� .t11U R�iu11
lkerAmullS
1EJ �'JINI� Mwgtbf0fl'lef«l6-0IIS 08etebfows.'19Mlotynlcoobts
� .l.d,al••9_,go
Ch,n_..,,p.Jt-nc:thcxh
Ch,n!)tdac1.1i....._0<,.,M1:••fo1mot,; ,........,
�ln(e.ind
j � ::�ut,r
a
(wl;l_,...,.,.....i�
Euc/Accm
..
,i NfiW<>rk andS�aringC ,nter
1' � > Control Panel > Network and lnte·net > NetworkConnections v (J Search NetworkConnections p
Organize • Disable this networt device Diagnose this connection Rename this connection » " • III 8
t!9 BridgeConnectiom
Create Shortcut
t!9 Properties
WTiedm- - - - - - - - - - - -
lPv4 Corncdi¥ity: lntc:mc:t Connection-specific ON
IPv6 Connecti..ity: No netw«k.access DesCl1)tion OJalcorrrn ..ctheros AA8151 PCI-EGgabil
Phy!icalAdctess SO.B-49-1 0-50-3:
Media State.:
□HCP Enab'ed Yes
OU'atton: IPY4.Adaeu 100 .3110
1Pv4 SWna Nask. 255.155.252.0
lease Cb:ained Su,day, J¥1.Ja,r 27. 201'9 10:23:49 PM
le;i:se E.pi-es t.bid�. JM1.J.af)l 2a. 201112:234aAM
IPvd Defaul G.ate¥W.ay 10.0.0.1
1Pv4 DHCP Sen1er 10.0.0.1
Activity
1Pv4 ONS Server 10.0.0.1
1Pv4 WINS Servo-
------------
Sent- Rea:i'ml
-
NetlllOS over Tepp En. Yes
Clo<,
Organize• Disable this nttwork device Diagnose this connection Rename this connection » [;I:• III 8
Status
Diagnose
$ Bridge Connmions
Create Shortcut
Then double click Internet Protocol Version 4 (TCP/1Pv4) and Select Use the Following IP
address: and type in the IP address, Subnet mask and Default gateway. Click OK to apply the settings.
Connect U!ing You can g@t !P S@ttngs assigned automaocaly ifyou- �twcxk 5l4)p0f"ts
� OualcommPthernsAR8151 PCI-EGg&bl:�Cot1ro lnsC4W>ility. 01h�, you n� to Mk you-nr:twork.rlninistr�trr
fur the �QJri,te IP sdtiigs,
CorflQ,..r"e.
0 ctltain � IP address autanaticaly
This comedia1 uses the loloMng ilr.ms:
@Use the folowi,g IP adaess:
irl 'J'Oert f<r t,lcro,dt NetWO<t<,
� 9Rle cVld Pm:er Sharin9 for Microsclt Net\lllOfks IP adci-c-:.s: I ,,, . 168 . 0 . 10 I
� .QoS P�et Seheduler Stbletmask: I "' . ,,, , 255, 0 I
U .1.. Microsclt Network A:lapter �lexor Pra:ocol 11g2. 168 0 ,�1
lrl I
�� [I] Cana,
Note: Iryouneed to set a static DNSsen1er,select Use lhe following DNS sen·er addrtSs: and inpul the address of DNSserver. By default,the computer obtains lhe address aulomalicaUy.
El
-M-
System and Security User Accounts
' Revitw yow co�tr's51:itus GI
Cu11l1ul Pond .. $Ch,og<0<«>""'fyp<
s.vt btc:kup coprs of you, fin wih FM
listo,y Appearana, and
s.c..,.
,..i R<,t,.. -7) Personalization
ti... Fetwork andInternet!
CJ Choo<•whtchapp,;unaccusyour
rle�plen
'11)11 View ntlWM: rutus and tasks Clock and Reg10n
Changtdftt,bmt,0tnumbuforrn,ts
(D See11youhcwa32-b11or64-t>r1 Hardware and Sound
'
veniCl'I ofWindcws Yiewdtvictundprintm � Ease of Access
Acld1devict � lttWindowsJU995�
Adjustcornmont,ustdmobitysttllngs Optimiztviswtdispl,y
P ontrol�·SNn,nwtts
Programs
lk11nsull1p,og1lffl
In the next dialogue box, open Network and Sharing Center. Alternatively, you can also type "Control
Panel\Network and Internet\Network and Sharing Center" in the search box ofContrnl Panel and hit
Enter key. This will redirect you from Control Panel to Network and Sharing Center. On the left-hand
side of 'Network and Sharing Center' window, click on "Change advanced sharing settings".
: :=��
� v
Con1rol hnr!Home View your basic netwcrk informa(ion and >et up conrections
\
'f n•.,d
..., !.tndt11l(-•'"
(ffll'ttl:Nlni: •wi-Fi :91spr,1ghoud)
Chmgeyo111nmvakngsdtng1
�. St:tcp1 rN1conntdionorRe-twort
'9P>_MllllfW\t
I'm��
OP6.tnd�.,i:..
£mo1Aa:P:I
"''""""""''""'' • Set �pt h0itdbmd, di,l-11p,orV'N comecti<M-; <>r �up• routeron<enspoift,
Here, you'll find three networks - Public, Private and All Network. Public Network is for places like
airports and coffee shops, Private network is for an organization or your home network and All Network
comprises ofboth. To make sure, the setup is flawless, we'll recommend you choose "All Networks".
., 1" •ti « N!twortc and Sh1rin9 Ce.•. • Advanced sharing s!ttings .., b �archCo... ,P
Next, expand All Networks by clicking on the drop-down icon. Here, we need to enable Public Sharing so
that the PCs can access files from each other over the LAN cable. To avoid more configuration, just Turn
off password protected sharing.
By doing so, you enable the other computer to access shared data without providing any credentials. This
is not a good security practice by since you are shating your data with people you trust, you can make this
one-time exception. Once you are done with file sha1ing, make sure you turn on password protected
sharing.
Once done, click Save Changes. Just as I said in the beginning, repeat the same steps for the other PC.
wt\tl'!Publocloldtf.,...,,.,,sOfl.peopitOflthenttwor\.lOIC���CM
..:nuri1n .. 11M Publio:�
�@f..,..onlMV>9<0any,,:,M-"nffM>nl accHson ,ud and_rte,....,IMP�foldtn
'""'"''
Qt..... olfPwkldd«1Nrin9(,..oplo:'°9tado n 10lhlocomputff<_,ttAK<.,..IMH
Filt�<�
W-""6c,ws ....., 1ZS.bd�to holpp,ottctfile dwin<Ju,nn-.Sornc <Mn<D6on't
wppo,t12t-MMC�•Mm<ntuoe4 or 56-bot eM�
@lt'M121·bctnel)'IM__ .,._p,«ectf.tc,t,,,... ,_,_c-�
QE...W.file ohanng 101dr,,c,..ttr.t .,...40- .,. 56-bt �
P-dp,ote<ttd$11,W,ng
When .,.._d
ondtlw,Publicfolde,,''7'"'
protected� i.on, �peopl.whoh.w• .,_-«<ounit MMi �-thn
C�O'UftKCffl!Nfftlf.,._pn,ctf'S_hfftott.C�B•
ochtfpeopkKCISfr,)'OU-!Wnolfp,-,:ip,ot:«tdl,"-'g.
QTUII\011p,NIWOl1'p,otectN....,>l\9
�@TUll\oflpKfWOtdptott<tNwrwlf
1$s-c...,..I '-"
Step 3: Setup Static IP
Now that you have enabled network sharing on both PCs, it's time to bring both the computers on to the
same network. We will do this by setting a static IP address of the same class. Just like the previous step,
you need to do this on both PCs. The following are the steps.
1. To set up a Static IP, open Control Panel, browse to Network and Internet and click on Network
Sharing Center. Alternatively, you can also 1ight-cljck on the Start Menu and select Network
Connections.
� ,t t, c...p.,., Ntt.....i.iem11
,-----C-e11-te""r,
"""'�1M!w0il y,.Mt,ort:ompa111"1doxo
, �illd llltnnrt � lntemrt Options
Hlidw1tlf><ISMI � Chang<yo,� Mw�•-IOl·OIS 0..!""""!MICIY""'°'""
J SeridOfl!l'.:ffittfk
PIOllfm :'1 Infrared
U..Ac<Mll
p.,..,a1.,
Appttrlfl(,,rid
Clo<h,di""
ustoUmss
2. On the next window, you will see the active connections which should be Ethernet, since both PCs are
connected with a physical LAN cable. Click on the Ethernet link. A new dialog box will open, here click
on the Properties button.
.,, O St1,ch(o p
COllllof Pffle!Homc
View your basic network information and set up connections
v--)'OUfKtwc�
''""'"'''"'""'""''
' (thernd SW..n X
NonttaorkfC:Cttl
....,
NDnt'-11:kcns
00:07:Sl
-
LO"-'
-�
1 -
....
w,..td
lnttrntt()pclOM
WindowsDtftndtrr•...,.a•
srtts:
!$._...j
296.N
$.... -
I ""'
-
3. In the next pop-up, select "Internet Protocol Version 4 (TCP/1Pv4)". Now, click on Prope1ties. This
will open another dialogue box.
Netwcri<ing Sharing
Comect 11•ing:
fl Realtek PCleGBE FamlyCortrol.,.
cDe,;:�·· st f>rop,,tJM\I
T@n:mssionCartrol Prolocol/lrtemet Protocol. The default
wide...,. netwodc prohlcolth.!t provides eommunic.!tion
acros, div= interoomeded nelw00<$.
OK Cancel
4. Here, you need to configure the two PCs with different IP settings.
On computer 1, select the option "Use the following IP address." and, put the following values
■ IP Address: 192.168.1.1
■ Subnet mask: 225.225.225.0
■ Default gateway: 192.168.1.2
Of course, it's not necessaty you use these IP addresses. You can use any Class A or B IP address. In case
you are not sure what this all means, better stick with this example.
On the second computer, do similar steps, but flip the IP address and Default gateway values
■ IP address: 192.168.1.2
■ Subnet mask: 225.225.225.0
Default gateway: 192.168.1.1
General
Computer 1 OK
What we are doing is keeping the subnet mask the same and changing the IP address.
Next, open your Window's File Explorer and click on Network tab at the left side of the window.
If you have set up everything right, both the PCs should appear in this Network window on both
computers. Now, you can just click on the other PC's icon and browse the file. But wait, you still need to
configure one last setting.
• 0 X
v(ompulet(l)
folders(7)
Jt�l�CHS
-
"°"'°"''
== ---
v Cevices and d�ves (4) WlOP-IIMEGiGH
...
0(�0P-IIUIGII
Acer�:)
> (rt1tfftCkudFiles
f
O'IORWOri-.tJ):)
lllGst..�<6HI '1"-!PC
) CIThnPC
ll""Vol•mei:.:)
��
IO.'G81rttof199G8 100GS1rtt:dl64GE
"-
............ .. ,_
�-mi(O'....c.alll{11o.t-
·--
'!;lMoc--"�w.,,io.
'i!)-Oltott,__,.__
�-Olli«,......0.-
&mwc:,,......,......,.,.
3. In the File Sharing window, choose everyone from the drop-down menu. Click on the Add button next
to it and finally hit the Share button. Once you have shared it, the next window will show you the network
location of the folder.
- n x - o x
� �
Choose people to shue with Your folder is shared.
,... C,nuf
That's it. Just go back to the other PC from where you want to access the file, open the Networks panel
and click on the other computer's name. Here, you will see the folder you just shared. From there, just
open the folder and transfer the files and folders as you normally do. i.e, by copy and paste. Similarly, you
can repeat the same steps from the other computer.
- 0 X
•
'
_.I
v Computer (2)
410nd>ri¥e
_...,_ "'_'_° '·_"_ """_'__
.__... '"
J, �mc,.Qctm
�TMSPC ,...,
�o 800JIO:)
Firstly connect our system to internet and run the following commands in command prompt.
HostName
0 The HostName command is used to display the host name of the computer or device in a network.
When you run the HostName command in a command prompt or terminal, it will return the name
assigned to the device on the local network. The host name is a unique identifier used to distinguish
devices in a network and is used in various networking protocols and configurations.
Systemlnfo
0 The Systemlnfo command is used to retrieve detailed info1mation about the hardware and software
configuration of a Windows-based computer. When you run the Systemlnfo command in a
command prompt, it will display a comprehensive report containing information. It will display the
operating system version, system manufacturer, processor details, memory size, network adapter
details, and more. This command is helpful for system administrators and users to gather system
related information and diagnose issues.
tracert
0 This command is used to diagnose path-related problems. On an IP network, routers exchange IP
packets between the source and the destination. They take IP packets from the source host and
forward them in a sequence until they reach the destination host. The sequence of routers between
the source and destination is known as the path. A path consists of all routers in a sequence that IP
packets sent from the source host traverse to reach the destination host.
0 The tracert command prints the path. If all routers on the path are functional, this command prints
the full path. If a router is down on the path, this command p1ints the path up to the last operational
router.
0 The tracert command uses the following syntax.
0 tracert Destination Name or IP address
0 example: tracert www.google.co.in
Ping
0 The ping command is used to test connectivity between two hosts. It sends ICMP echo request
messages to the destination. The destination host replies with ICMP reply messages. If the ping
command gets a reply from the destination host, it displays the reply along with round-trip times.
0 The ping command uses the following syntax.
0 ping destination host IP or name
0 example :ping www.google.com
ipconfig
0 As the command name suggests, it gives information about the IP address. It not only gives the IP
address of the computer it is executed on but also much more information as DNS addresses are
stored in the cache.
0 This command displays all currentTCP/IP network configuration values and refreshes Dynamic
Host Configuration Protocol(DHCP) andDomain Name System(DNS) settings.This command is
mainly used to view the IP addresses on the computers that are configured to obtain their IP address
automaticalIy.
0 To view the output of ipconfig, you can use the following command.
0 Example: ipconfig
Arp
0 To send IP packets, a computer needs two addresses.These addresses are the MAC address and the
IP address. A MAC address is the physical or hardware address of the NIC. An IP address is the
logical or software address of NIC. If a computer knows the IP address of the destination computer
but it does not know the MAC address of the destination computer, it uses the ARP protocol to
know the MAC address of the destination computer.
0 The ARP protocol broadcasts a given IP address over a local network. The corresponding host
responds to the broadcast with its MAC address.To avoid repetition, ARP stores the answer in a
table known as ARP table. ARP maintains a separate ARP table for each NIC.
0 To view the ARP table, you can use the following command.
0 Example: arp -a
NsLookup
0 The NsLookup command is a command-line utility. It is used in networking to query the Domain
Name System (DNS). Then it obtains information about domain names, IP addresses, and other
DNS-related data. When you run the NsLookup command followed by a domain name or IP
address, it will display the corresponding DNS records associated with that domain or IP. This
command is commonly used to troubleshootDNS-related issues, checkDNS resolution, and gather
information about domain configurations.
0 Example: nslookup www.google.co.in
Netstat
0 This command displays active connections, ports on which the computer is listening, Ethernet
statistics, the IP routing table, and IP statistics.
0 The output of this command is organized in rows and columns. Each row represents a new
connection or an entry in the output. It contains four columns.These columns provide the following
information about the row.
0 Proto: -This column displays the name of the protocol(TCP or UDP).
0 Local Address: -This column displays the IP address of the local computer and the port number
being used. If the port is not yet established, the port number is shown as an asterisk(*).
° Foreign Address: -This column displays the IP address and port number of the remote computer
to which the port is connected.
0 State: -This column displays the status of the connection.
CWl!I c.. - -
Step 2: Next screen will appear, click on the sign-up option. Next screen will appear and will ask for
email and password and other simple details, fill them and click on Register.
Create Account
Login
Email
lEmail•
Password•
Next
fLast name•
Country or region •
Unlock account?
Please select *
Forgot email address?
• indicates required field
Help
By clicking Register, I confirm that I have read arid agree
to the Cisco Onhne Prrvacy Statement and the Cisco
Web Site Terms and Conditions
Step 3: Now the login screen appears again so fill in the Email id. On the next screen enter the password
and press the Login button.
.-us
'W'EN Password
Log in
Emel!
Log 1n
Next
Forgot password?
Unlock account?
Unk>ck account?
Step 3: Dashboard will initialize, now click on Resources and choose Download Packet Tracer Option.
o1l1,i l1, Natw.Jrt1"Q Cateef'S •
My Ne-!Acad • qeSOU'ces • COUfses • MOfe •
CISCO�
fM�ACaoem,
NelAcad com Planned Maintenance 8 Apf1
21rOtN-t_�_o1
CCNA C,..,_unly 0,,0,.00l>S
A&S Eng.-...mg COll<g,
Step 4: On the next web page choose the operating system to download the packet tracer. Downloading
will start automatically.
Previous Versions
Stuoents snouio � rne same vers,on or Ctsc:o Pacl<et Tracer useo ,n 1netr classroom 1a0 Please contac.1 yOU" W'IS1rucl0f 10 oe:eonine ine aPl)fopna:e \lel'SIOf'I o, Osco Packet Trace<
Osco Packet Tr,cer 7 2 2 Ml conooue K> be JVaNbte torcomPc'fbldy�Ith CC"'4A6 and k>T Ct>Ur$e ilCtr.llies on,,,
To successtuly 1nsta11 and run CtSCo Packet Trac et 7 2 2 1t'le' IOIOV,,ng S) $l� req1.11rements mus, be met
Step 5: Check for the executable file in your system and follow the installation steps and install the
software.
Step 7: once the installation is finished you can find an icon is created on the desktop so run it.
•���•r&��r����□rnm��
::; Q. Cl ::;; g / • • # s:;I liil
0Rultlm•
Part-B
I(Encf Devices)
-....,:11 �.II
PC-PT PC-PT
PCO AC1
Step 2: Now to connect the PC's, we require a wire; we use cross-over wire to connect similar devices.
0
Select Connections from the bottom toolbar, and select cross-over wire (that is the fourth wire).
Tine: 00:38 16
I
[Connect10ns)
<
A Cross-Over Wire is largely used to connect the computing gadgets, additionally, cross wire cables are
used to connect devices of equal type.
Step 3: After selecting the wire click on the computer on the screen (here PC0) and select FastEthernet0.
Then, drag the wire to the other pc (here PCl) and do the same.
--
0
RS232
USBO
USBI
F�tElhemetO
.:.-JJ
PC-PT
PC1
__,.,
PC-PT
PCO
--------
-- RS232
useo
USB1
FaslElhemetO
Step 4: Now, we will assign the IP address to both the PCs (PC0 & PCl).
An IP address (Internet Protocol) is nothing but the numerical designation of the devices connected to the
network that use the Internet protocol as a communication medium.
Click on PC0. A dialog box will appear on the screen, select Desktop and then select IP configuration:
� PCO D X
LWJ
llilMlp
.......
�
>
0Top
IP Conf1gurat1on
Interface (?"astEthernetO
■
IP Configuration
Q DHCP @ Static
1Pv4 Address
Subnet Mask
Pv6 Configuration
0 Automotic @ Static
1Pv6 Address
Default Gateway
OHS Server
8021X
IP Configuration
Interface [FastEthernetO
IP Configuration
Q DHCP @ Static
IPv4Address I192.168.1.1
PC-PT
,_,_, __ _
PCO
PC1
Now i f in Real-time box- PDU list window it shows successful, that means all the connections are con-ect
and the data transfer is successful
2. Implement connecting three nodes considering one node as a central node using network
simulator.
Follow the below steps to implement the connection:
Step 1: First, open the cisco packet tracer desktop and select the devices given below:
1. PC PC 2 (end nodes)
• Then, create a network topology as shown below image. Use an Automatic connecting cable to
connect the devices with others.
// C:J S..w•i.>l "I tn:_l:.::...::I �:• l,LC)l:<>1 r:, .;· l��J 1�·::1¢ Mo(.,�:.
►
)
Ill 1111
f'------ ���..,�"�,
-,. --�-
- - ----',
- I Miilifi&M <
•
Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask according to the IP addressing
table given below.
IP Addressing Table
Step 3: Now we will transfer PDU from pc0 to pc2 computer and check whether the transfer is successful
or not in real-time PDU list window and analyze the working of network in simulation mode.
I. PC PC 4
2. Switch PT-Switch 4
Fa0/1
-- --S•htl .h-PT
.....---Fa0/1
Fa1/1 Fa0,1 Fa1/1
-------.-
FaOl1
$Wit PT
chO ch1 1
Fa2/1 Fa1/1
Fa1/1
FaO
. .
FaO FaO
PC-PT
. PC-PT
.
PC-PT
PC-PT
Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask according to the IP addressing
table given below.
IP Addressing Table
We can also assign IP address using the ipconfig command at with the help of a command prompt.
• Go to the command terminal of the PC.
• Then, type ipconfig <IPv4 address><subnet mask><default gateway>(if needed)
• Repeat the same procedure with other PCs to configure them thoroughly.
Step 3: Verify the connection by pinging the IP address of any host in PC0.
• Use the ping command to verify the connection.
• As we can see we are getting replies from a targeted node on both PCs.
• Hence the connection is verified.
Physical Config Programming Attrbute.s.
Command Prompt
II
•
Step4: Now we will transfer PDU from one computer to another and check whether the transfer is
successful or not in real-time PDU list window and analyze the working of network in simulation mode.
l. PC PC 6
2. Hub Hub-PT
• Then, create a network topology as shown below image:
• Use an Automatic connecting cable to connect the devices with others.
:2J!•�··1� ___
EKMMMMM ■- MM:\:.
�
// _,;? .$'.,,?
..,
//
·-
-·
D -· ,, '"• \::::. '":... -:- ':. ;"' -::• """:" � :.,
Step 3: Provide the IP address to each device and transfer message from one device to another and check
the Table for Validation.
IP Addressing Table
Now to check whether the connections are coITect or not. Try to ping any device and the image below is
doing the same.
To do ping one terminal of one device and run the following command:
Command: "ping ip_address_of _any_device"
Example: ping 192.168.1.4
Note: If the connections are coITect then you will receive the response.
Im
Phys1C8l
cy
mandProfll}I
-
Step4: Now we will transfer PDU from one computer to another and check whether the transfer is
successful or not in real-time PDU list window and analyze the working of network in simulation mode.
1. PC PC 4
2. Switch PT-Switch 4
19216801
PC-PT 19216802
PC1
Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask according to the IP addressing
table given below.
IP Addressing Table
Step 3: Verify the connection by pinging the IP address of any host in PC0.
• Use the ping command to verify the connection.
Step 4: A simulation of the experiment is given below we have sent two PDU packets one targeted from
PC0 to PC2 and another targeted from PCl to PC3.
aO 92.168.0.3
0/1
Fa1i1
�,ct,.�
''-
/ SwFa211
,
,/
Fa1l1 ;
',;( Fa2/1 '-
r�
Fo0/1 FaO
�- -
s�a211 .. -�
Fa1?s!��� �T
Pfc� SwitchO ', ,/' Swteh2 PC3
; 192.168.0 4
'-, Fa1 Fa2/�
192_168_0_1
192.16802
Stepl: we need these devices to set up the network topology as shown in the table below:
S.No Device Model Name(as given in cisco packet tracer) quantity
1. Router WRT300N
2. Laptop Laptop 3
- ......_
• P 19216102
192.IU0I
--
p--
1921fl901
--- _
25.52552550
......
P IWHll03
P 19'2 letO.f
1,:Z 11510 I
192.115101
Step 2: Configuring laptops to make them wireless. First, click on the laptopO and turn off its power to
change the ports basically we are going to replace the wired port with the wireless port which
is WPC300N.
0 X
MOOI.US
Wl'C300N
PTIN'TOPNIIIMI
PTIN'TOP NU. !Cl;
PT 1N'TOP-NU-1trf
Pl.v.PIOP-- IC.CC
Pf.tAPTOP.MI 1Ffl
PI-UPTOP ,....,FGL
PT-tN'IOP,._. IW turn off
P'f.uPJ0PIH 1WA
PlvPlt:#'Nii-1\VN;
PTIN'f(IP-3(;;()
--
PT,
--
Pl-UCA0PHOHE
°'""""'"
-----'--•--,
Tho Wl'C300N---14c,,,-
�IIIWllt-<OfNOClftto ......... � fhlll'OCUI:
,..,
I 0 0 X
..!!::- C:0.0 °"""IP 1'1(9- -
MCXlUl.lS "'-"'0.-Vllw
Wf'Cl00N IA00UIES
Zocmlo �s... z....,.o,,
m>C300N
PT.u.PTOP -•Cl PT.lAPTOl'-IN-IAM
PT.u.PTOP-ICff PT WTOP'.M ICE
Pl lN'IOP,... ICCA;
Place WPC300N PT IN'fOP 111,1. ICl'E to remove this
Pl lN'IOP_,... 1Frf PTUl'IOP.ffl'.ICCit
port we will drag
PI
PT"-'PJ(IP-1'(;( PT,lH'IOP� lff[
PTLAPTOPIAI 1W
PTIN'TOPHM 1W,\
PT IN'fOP NI,\.l�G[ and put it in
Pl.wTOP.ffM.IW
PT-tN'fOP NII. IWAC
PTVPtOP INlGIO PTtN'TOP Al.1\Y A modules section
PT.u.PTOPNl,\.IW.#C
-
PTMICROl'ttONE Pf 1,1,PTOP,llOG-40
PT H£ADPHONI;
PT� �
..
°"""""'"
,,.,__
• 11'o�M'CJOCll-----2<Gtt:
.,.... tulltlab'�IO---flllt#or'tl: Tl'ellOCklil
__ _,,,,,,__..,.,_L..,._ ..... AW-
---1or...-1o
��\'IPC30(N-�ont24Qlq ...
...-,..,...,..T>.-
...._.....,,.._.._.... .....,.,c...,_,., ..... ,,a.i,,_
_
Step 3: Configure the Router with an IP address and generate a Security key.
-- --
MiiiiMifh&i
_,,,,
.,..,... ALMlrnaM: �IIOl'I OHCP .,
(f-:� o,,,_,..,..
P_,) MTU ""
Hil:iil555
.......... "'
-p p....... ..
,
,_ .....
2S5ffl2S50
,_
·-
OHCP- OHCP
( 00.ublad IJHCP
............
ij-nan
Sllnf>Acb'KS 1921&8 I
St.c:ONS3
\\\NS
"W.-IMU RouterO
Pt'9QI Cri0...2!.,�
-·.... - -
.....
---
NelwoltNamt(SSIO)
..., ,.,.
-C,,0,,0 ,.,.
1 2'12GHr.
SSI>- o-
Ell§IHMa:I
..
Seo.r,tyMode WEI'
-..,.
o
..
,...
.,..,,,,..,.
-4064·&1$ (10 Hex digits)
P•ssph'r.1e
--..
WPAPefwoal
Wf'A2-
WPA2Ellle. ,se
Ker1 0123456789
Ke(.)
nm,
Step 4: Now we will configure the laptops using the IP addressing table given below:
Configure Laptop0: To configure the laptop first set the IP configuration as static then add the IPv4
address and default gateway.
�,� LaptopO □ X
IP Conf1qurat1on El
Interface Wireless0
IP ConligtJ'at100
Q DHCP 0 Stat,c
DNSSeiver 0. 0.0.0
1Pv6 ConfiglJ'ation
Q Al.Comabc 0 Static
1Pv6 Address
-- ---
Link Local Address FE80::203:E4FF:FE14:A45C
Default Gateway
DNSSeiver
Note: Repeat the same process with Laptop1, laptop2 and configure both devices by adding IP
configuration.
Step 5: Connect the laptop to the router by entering the security key in the laptop.
�P--'
hys_i _ca_l _C_or_ li
--'g
'-----•D•es•kt-�_P_og
, ::_r_a_rrm .::.._ _An_ri_bul_e_s _ ] �P--'
_ng t
hys_,_ca_ l_C_o_n _fig •D•e•s•k-�P_
::..... r--=--- ng -A-ttn_b_ul_ e_s
ogra _m _ m_i--=---
--· ---
Below Is 111st ol ffllllable MJ9tsS �To seard1 tor m<lffWkeless networks, dick
thtlWrnabuttOA.To'ftfWmcninbmabllbo!A.1nelWO!k,SlllectlhlwirllnsllffllllOlt Thbwtr91111nrtworti;hlsWEP�llllbltd.liCllllllktto .. -twort..Slllc11NI
nlffll.ToconnedlDlhll:1111-!t,tldtlheConnedbuttOllbelN'.
IIICl)'plbt.Enllflhe,...-ICIP1SsphnseorWEPkly ..'Napp,opr\atelleldbelow.Thtn1
v PleattMIIC1IIWl�MCVri(yNIIIOcllll
HomeNelWrok 100 wir.ln• ,..._ lnftastrudure m'IWEP txls"'fwhtesa�
lkl't-1llnie MiledBIGIN
bcllebllll Aldo --64-bit v ToUMIWEPtneryplioft.teliecl64·biltrl21·�
St<:uritJ 'NEP
MAC AddrtU 0008 8E31 9506 :■:h:fr:@:n:-=========J1:��nlfmdN
�Mlrilgll'MS�itShouldbe 101
Pfflln12345678� 64-blt IIICryplloft or 21 dlnciers b 1:za-1111
11
YalidlleXadecimalCfllrtclefSlft0A0 .,_
l'l'Jfflbers-Vlhr�"t".
• Repeat the same process with Laptopl and laptop2 so that they can connect with the router.
• After all of this, all of the hosts will connect with the router
T
Defaut gateway:
19216801
LaptopO Laptop1
IP: 192.168.0.4
IP 192 168 0 3
Defautt gateway:
DefalAI: galeway-
192.168.01 .
192.168.0.1
Step 6: Then we'll verify the wireless connection sending a PDU from one device to another.
--tooo--•-t---
Design a Network topology as shown below
f<Mt-- ,_.._�............,..,.
► ,_
-
MIBHEE
Configure the network devices
Step-1: (Configuring RouterO):
1. Select a 2911 Router from Network Devices and drag and drop to the workspace.
2. Select Router0 and Go to Config.
3. Configure the GigabitEthernet0/0 by assigning IP address as 192.168.0.1 and subnet mask as
255.255.255.0 and turn on the port status
Cl
PhyMC.lll � CU
GLOBAL �herae!OAI
Settinos.
��
I"�. . . ,
f'ortstalJs
Alooritl-m Settin(ls
• 1l.ll.lUMtlpS 1WMDpS UMt>pS�Allt�
JI
SWITCHING
"'"''""
[lffil'"
VLAN uatabase
9.Jbm!:Uuk 25$255.25S.0
�ol,;LW""'"'l0/0 .
GigabitEth�rnatO/J
Tx!rnglnt
,:;:igabitEtNirnatO/::
4. Configure the GigabitEthernet0/1 by assigning IP address as 10.0.0.1 and subnet mask as 255.0.0.0
and turn on the port status.
" Cl
?tysical � CU
f--
Giaablflterntt0/1 -
S:•tti rg�
A!ryuithm o;;,.tti noo
J'OrtStalJs 1,i1[2'1
:Sandwi':ttl • 1000 Wbp.s 100 Mbfs 1C Mbps � Auto
ROUTING 0
State ):>upex • Hal Duplex ulDYplex��
RIP J,IA(Addreu OOOI .C900.AC02
SWJTCHING I FC�r..,,tm
VLAN Oatab�se Fv4J.ddres.s. ,010 I
INTERFACE 1
Subne1M1Sk 2550.0.)
Uigabitt:ther netu/U I_
. I
GigabitC'thernet0/1
TxRn9Liri:
Ci9'1bitEthcrnct0/2
2. Select PC0 and go to FastEthernet0 in config and assign IP address and subnet mask for the PC0 as
192.168.0.2, 255.255.255.0 and assign default gateway as 192.168.0.1
3. Select PCl and go to FastEthernet0 in config and assign IP address and subnet mask for the PCl as
192.168.0.3, 255.255.255.0 and assign default gateway as 192. 168.0.1
Algoritl-n, Setting�
TNTFAFACF
FzstE':hemet)
Gatewa1/UIISP,,t
[,?] o,
• 1t(I- 10Mbp•�Avl•
Hallr,p>o;• �.. •-�Aul•
PCO<INO<H•!lo•
Qo+,CP
�' StallC
PrOC>nrlfU(aliOn
QAUO<MtJC
�' Stat,c
Oott
OHCP..-6
UsttSdup
TfTP
CNS Usernsne � � P,s.swo,d C__ �
Dw.w. 0Rf>"'1 □ n..w.. 0Af>n,._ □,..._.
,.,.,
SYSLOG
NTP
1�00 RW[fl\.
VM M1nogcmcnt
R.■d uc �p
5. Connect GigabitEthernet0/1 port of RouterO to the Fa stEthernerO of serverO using Copper Straight
Through cable.
Router Configuration Table:
2911
192.168.1.1 255.255.255.0 10.0.0.1 255.0.0 0
RouterO
PC Configuration Table:
Check the connections from PCO to PCl using ping command in command prompt. On PCO, create a
text file named "filel.txt" using the text editor in the desktop menu. Save the file by pressing Ctrl+S.
PCO - □
Hi,.elromeal
\' Filelme I
EfllEM'the new File Nane
-.e1.txt
i
�Cancel
d •
.e • C, � ~
-< ;v 4 � .� �•
-<' c, 3 ;v C ··� ..~ <> ,c•
To upload "file 1.txt" to the server, follow these steps in the command prompt:
a. Type "ftp" followed by the server's IP address, which is " 10.0.0.2," to establish a connection with the
server.
PCO
b. Enter your username and password. Note that the password you type will not be visible on the
screen. Make sure to enter the correct password and proceed.
PCO -"
Physical C0'1'9 Desktop Pro9r1l!WTlflo -6.ttrbJtes
II
ConwiarxPr�
c. To upload the file "filel.txt" from PC0 to the FfP server, use the "put filel.txt" command. Verify the
file transfer by using the "dir" command to check the server's directory.
l"iyaiool ConfiJ
eo,,..,-afldPro,vt
Dc:>ktc» ln9Conmill11
II
.... -"
To download the same file ("filel.txt") from the FTP server to PC2, use the "get filel.txt" command.
CcmmafldProrrpt II
After downloading the file, verify the file transfer by using the "dir" command in the FTP server.
Before doing so, exit from the FTP server using the "quit" command.
..�,q .t
o V � • e •X
> � > c,.f ' 0"'I' ,i tHt
4 t,•e� L •• i! '
Step 1: First, open the cisco packet tracer desktop and select the devices given below:
1. PC PC( or laptop) 9
IP Addressing Table:
• Then, create a network topology as shown below the image (Bus, ring, and star topology).
• Use an Automatic connecting cable to connect the devices with others.
Step 2: Configure the PCs (hosts) with 1Pv4 address and Subnet Mask according to the IP addressing
table given below.
Step 3: Verify the connection by sending a PDU from one host to another. A simulation of the
experiment is given below we have sent two PDU packets one targeted from PC0 to PC4 and another
targeted from PC3 to PC8.