Lab Manual DCN
Lab Manual DCN
Table of Contents
Lab # Topics Covered
Ping and Traceroute Commands
Lab # 01
Ping and Traceroute Commands for customized information
Basic Network Commands on windows (ipconfig etc)
Lab # 02
Basic Network Commands on Linux (ifconfig etc)
LAN Cable Construction (Cat-6, Cross vs Straight Cable)
Lab # 03
LAN Cable Testing (Cross vs Straight Cable)
Building a Physical LAN using switch
Lab # 04
Resource (File/Printer) sharing in LAN
Introduction & Installation of Wireshark Network Monitor
Lab # 05
GUI understanding, Packet Capturing and Analyzing
Analysing Frame Header on Wireshark (Layer-2)
Lab # 06
CISCO Packet Tracer, Introduction and Installation
Lab # 07
Building LAN on Packet Tracer and message passing
Configuration and Installation of Physical Switch and GUI Understanding
Lab # 08
VLAN Configuration
Configuration and Installation of Physical Router and GUI Understanding
Lab # 09
Analysing Datagram Header on Wireshark (Layer-3)
Design Problem Using Router
Lab # 10
PC Network TCP/IP Configuration.
Basic OSPF Configuration
Lab # 11
Basic EIGRP Configuration
Analysing Segment Header on Wireshark (Layer-4)
Lab # 12 Well Known Port identification through packet capturing in wireshark
Analyzing Layer 5 for Encrypted and Unencrypted Traffic
Lab # 13
LAB # 01
Lab Title:
Ping and Traceroute Commands for generic and customized information
Lab Objective:
Objective of this lab is to make students understand the use of ping and traceroute
commands of network for generic and customized information.
Activity Outcomes:
The student will understand the advantages of ping and traceroute commands.
Introduction:
Ping uses the Internet Control Message Protocol(ICMP) echo-request and echo-reply
feature to test physical connectivity. Because ping reports on four attempts (by default in
windows), it gives an indication the reliability of the connection. Look over the result and
verify that the ping was successful. Was the ping successful? If not, report to the instructor.
Activity-1(Solved):
Network Ping Command (Windows)
1. Command Prompt:
It takes input command from user in a text-based user interface. > sign is used as a
separator and before that you have path of working directory. E.g:
4. ping -t [specific address] // for continuous ping until stopped with ctrl^c
// for 5 pings, ping -n 5 google.com
Command:
C:\Users\user>ping -t google.com
//-n 5 for 5 pings
5. ping -l [Pkt Size in Bytes] [specific address] // for change pkt size from default 32 to
200 upto 65500
Command:
C:\Users\> ping -l 200 google.com
6. ping -i [TTL in number] [specific address] //-i 2 for setting TTL=2, 8.8.8.8 public DNS
server
Command:
C:\Users\> ping -i 2 8.8.8.8
Explanation:
The address 127.0.0.1 is reserved for loopback testing. If the ping is successful, then
TCP/IP is properly installed and functioning on this computer. Packets sent to this
address never reach the network but are looped through the network interface card
only. This can be used for diagnostic purposes to verify that the internal path through
the TCP/IP protocols is working.
Network Trace Route Command
1. tracert [specific address or IP]
Command:
C:\Users\> tracert 8.8.8.8
2. tracert -h [max_hops] [specific address or IP] //Max. number of hops to search for target.
Command:
C:\Users\> tracert -h 4 8.8.8.8
Lab Title:
Basic Network Commands on windows and Linux
Lab Objective:
Objective of this lab is to make students understand the use of network important
commands for generic and customized information about the network configuration.
Activity Outcomes:
The student will understand the advantages of network commands and configuration.
Introduction:
The network infrastructure is a very complex structure of cables, routers, access points,
data packets, and a many other small components that together make the entire network
work seamlessly. Any issue in any of these smaller components may lead to an overall
collapse of the network infrastructure. This may lead to disruption of WiFi, cellular and
wired (ethernet) infrastructure. This is the reason why it's very important to have an
access to how the network is performing and know troubleshooting techniques,
namely networking commands, which are used at the command prompt to get network
information.
Networking commands are used at the command prompt to get network information like
the IP address of the system (remember that an IP address is the address of your device in
a network), MAC address, network route traversed by a packet, and the IP address of the
server in which a website or URL is hosted.
The IP address and the default gateway should be in the same network or subnet;
otherwise this host wouldn’t be able to communicate outside the network
Activity-1:
5. NSLOOKUP Command
The NSLOOKUP command is used to troubleshoot network connectivity issues in the system.
Using the nslookup command, we can access the information related to our system’s DNS
server, i.e., domain name and IP address.
LINUX COMMANDS
Lab Title:
LAN Cable Construction (Cat-6, Cross vs Straight Cable)
Lab Objective:
Aim: Study of different types of Network cables and practically implement the cross-wired cable and
straight through cable using clamping tool.
Activity Outcomes:
Students will learn about different type of cables and LAN cable construction
Introduction:
Category 6 cable:
Category 6 cable is a standardized twisted pair cable for Ethernet and other network physical layers
that is backward compatible with the Category 5/5e and Category 3 cable standards. Cat 6 must
meet more stringent specifications for crosstalk and system noise than Cat 5 and Cat 5e. Category 6
cables support Gigabit Ethernet data rates of 1 gigabit per second. These cables can accommodate
10 Gigabit Ethernet connections over a limited distance—commonly about 180 feet for a single
cable. Cat 6 cable contains four pairs of copper wire and uses all the pairs for signaling to obtain
its high level of performance. It is compatible with fast Ethernet 10BASE-T, 100BASE-TX and
Gigabit networks, and is backward compatible with previous iterations, such as Cat5/5E and Cat3.
In most cases, Cat6 cable is used for connecting a computer to another device like a hub, router or
switch in order to allow the sharing of files across a network or for accessing the Internet. It can also
be used for connecting computers to other devices together such as printers or scanners, or for
incoming and outgoing LAN connections on patch panels.
Crossover Cable:
An Ethernet crossover cable is a network cable used to connect two Ethernet network devices
directly, such as two computers without a switch or router in between. They are used to send and
receive data by enabling complex data transfers between computers, routers, and networks.
Ethernet crossover cables are similar to straight-through cable except that they have pairs of wires
that crisscross. Their internal wiring reverses the incoming and outgoing signals. It uses a design
that allows the data output pins on one end of the cable to be connected directly to the data input
pins on the other end of the cable.
Crossover cables look much like a regular Ethernet cable, but they are unique. Unlike
an Ethernet cable, crossover cables have specific wiring designed with a reversed path for signal
transmission. Opting for Ethernet wiring in temporary networking situations stops the system from
working properly. Crossover cables work best for direct networking. If you are conjoining a network
switch and a peripheral, you shouldn't use crossover cables. An Ethernet cable is the best for this
scenario because of its versed wiring methods. A crossover cable uses an entirely different wiring
process, where signals are obtained but sent reversely to both endpoints.
Straight Through Cable
A straight-through cable is an ethernet cable that connects the wires within it one to one on both
sides. This means that wire one will connect to pin spot one in both connectors, wire two will
connect to pin spot two in both connectors, and so on.
Key Difference between Straight Through Cables and Crossover Cables
• Crossover cable, Pin 1 is crossed with Pin 3, and Pin 2 is crossed with Pin 6, while in Straight-
through cable Pin connection is one-to-one.
• Straight-through cables are mainly used for connecting non-similar devices, while crossover
cables are mostly used for connecting similar devices.
• Straight-through cable connects a computer with a DSL modem, while Crossover cable
connects Router to Router and Computer
Lab Title:
Building a Physical LAN using switch & GUI Understanding
Lab Objective:
Configure a switch with a name and an IP Address.
Configure password to ensure that access to the CLI is secure.
Configure VLAN.
Save the active configuration.
View the switch browser interface.
Activity Outcomes:
Students will learn about different type of switch configuration and Installation.
Introduction:
A switch is used in a wired network to connect to other devices using Ethernet cables. The switch
allows each connected device to talk to the others. Wireless-only networks do not use switches
because devices such as wireless routers and adapters communicate directly with one another.
Although you can use the ports on the back of a router or modem to connect a few Ethernet devices
together, switches offer a number of advantages:
• Switches allow you to connect dozens of devices.
• Switches keep traffic between two devices from getting in the way of your other devices on
the same network.
• Switches allow you to control who has access to various parts of the network.
• Switches allow you to monitor usage.
• Switches allow communication (within your network) that's even faster than the Internet.
• High-end switches can be tailored to your network needs with pluggable modules.
Configuration Requirements
Cables Connectivity
Topology Diagram
Background / Preparation
In this activity, you will configure these settings on the customer Cisco Catalyst 2960 switch:
• Host name
• Console password
• vty password
• Privileged EXEC mode password
• Privileged EXEC mode secret
• IP address on VLAN1 interface
• Default gateway
Note: Not all commands are graded by Packet Tracer.
Reflection
a. What is the significance of assigning the IP address to the VLAN1 interface instead of any
of the FastEthernet interfaces?
b. What command is necessary to enforce password authentication on the console and vty
lines?
c. How many gigabit ports are available on the Cisco Catalyst 2960 switch that you used in
the activity
LAB # 05 & 6
Lab Title:
Introduction & Installation of Wireshark Network Monitor & Analysing Frame Header on
Wireshark (Layer-2)
Lab Objective:
The basic purpose of this lab is to introduce you to Wireshark, a popular protocol analyzer. By the
end of this lab you will be familiar to its environment and will know how to capture and interactively
browse the traffic running on a computer network using it.
Activity Outcomes:
The student will understand the packet capturing method and packet encapsulation of headers at
different layer’s.
Introduction:
A protocol analyzer is a tool that can be used to inspect what exactly is happening on a network with
respect to traffic flow. For example, if your TCP/IP sessions are "hanging", a protocol analyzer can
show which system sent the last packet, and which system failed to respond. If you are experiencing
slow screen updates, a protocol analyzer can display delta time stamps and show which system is
waiting for packets, and which system is slow to respond.
A protocol analyzer can show runaway traffic (broadcast or multicast storms) and its origin, system
errors and retries, and whether a station is sending, trying to send, or only seeming to communicate.
You will get information that is otherwise unavailable, which results in more efficient
troubleshooting and better LAN health.=
1. Introduction to Wireshark
Wireshark is a free and open-source packet analyzer, used for network troubleshooting, analysis,
software and communications protocol development, and education.
The basic tool for observing the messages exchanged between executing protocol entities is called a
packet sniffer. As the name suggests, a packet sniffer captures (“sniffs”) messages being
sent/received from/by your computer; it will also typically store and/or display the contents of the
various protocol fields in these captured messages. A packet sniffer itself is passive. It observes
messages being sent and received by applications and protocols running on your computer, but
never sends packets itself. Similarly, received packets are never explicitly addressed to the packet
sniffer. Instead, a packet sniffer receives a copy of packets that are sent/ received from/by
application and protocols executing on your machine.
Getting Wireshark
a) www.wireshark.org/download.html
Note: First download and Install with default options
Lab Assignment
1.Take a print of this page
2.Perform the following lab and answer the questions:
LAB # 07
Lab Title:
Cisco Packet Tracer, Building LAN on Packet Tracer and message passing
Lab Objective:
The basic purpose of this lab is to introduce you to Packet Tracer, Get acquainted with
Packet Tracer & Make some simple Packet Tracer scenarios
Activity Outcomes:
Students will have gained the basic understanding of Packet Tracer to see “protocols in
action”. After this lab, students will have developed basic understanding of digging deep
into the network protocols.
Introduction:
Packet Tracer is a protocol simulator developed by Dennis Frezzo and his team at Cisco
Systems. Packet Tracer (PT) is a powerful and dynamic tool that displays the various
protocols used in networking, in either Real Time or Simulation mode. The purpose of this
lab is to become familiar with the Packet Tracer interface. Learn how to use existing
topologies and build your own.
This activity will provide an opportunity to explore the standard lab setup using Packet
Tracer simulator. Packet Tracer has two file formats it can create: .pkt files (network
simulation model files) and .pka files (activity files for practice). When you create your own
networks in Packet Tracer, or modify existing files from your instructor or your peers, you
will often use the .pkt file format. When you launched this activity from the curriculum,
these instructions appeared. They are the result of the .pka, Packet Tracer activity file
format.
Move the cursor into topology area. You will notice it turns into a plus “+” sign.
Step 4: Building the Topology – Connecting the Hosts to Hubs and Switches
Adding a Hub
Select a hub, by clicking once on Hubs and once on a Generic hub.
Add the hub by moving the plus sign “+” below PC0 and PC1 and click once.
1 2 3 4 5
Repeat the steps above for PC1 connecting it to Port 1 on Hub0. (The actual hub port you
choose does not matter.)
Adding a Switch
Repeat the steps above for PC3 connecting it to Port 3 on Switch0 on port FastEtherent0/2.
(The actual switch port you choose does not matter.)
Move the cursor over the link light to view the port number. Fa means FastEthernet, 100
Mbps Ethernet.
Click on Interface and then FastEthernet. Although we have not yet discussed IP Addresses, add the IP
Address to 172.16.1.10. Click once in the Subnet Mask field to enter the default Subnet Mask. You can leave
this at 255.255.0.0.
Bandwidth - Auto
If the host is connected to a hub or switch port which can do 100 Mbps, then the Ethernet
NIC on the host will choose 100 Mbps (Fast Ethernet). Otherwise, if the hub or switch port
can only do 10 Mbps, then the Ethernet NIC on the host will choose 10 Mbps (Ethernet).
Duplex - Auto
Hub: If the host is connected to a hub, then the Ethernet NIC on the host will choose Half
Duplex.
Switch: If the host is connected to a switch, and the switch port is configured as Full Duplex
(or Autonegotiation), then the Ethernet NIC on the host will choose Full Duplex. If the
switch port is configured as Half Duplex, then the Ethernet NIC on the host will choose Half
Duplex. (Full Duplex is a much more efficient option.)
The information is automatically saved when entered.
To close this dialog box, click the “X” in the upper right.
Click once on Switch0 and choose FastEthernet0/4 (actual port does not matter).
The link light for switch port FastEthernet0/4 will begin as amber and eventually change to
green as the Spanning Tree Protocol transitions the port to forwarding.
Return the IP address of PC3 to 172.16.1.13. Change the IP address of PC2 to 172.17.1.12.
Perform a ping from PC0 to PC2. What is the ping result?
_______________________________________________________
At this point we will want to reset the network, whenever you want to reset the network
and begin the simulation again, perform the following tasks:
Note: Because Packet Tracer also simulates the Spanning Tree Protocol, at times the switch
may show amber lights on its interfaces. You will need to wait for the lights to turn green
on the switches before they will forward any Ethernet frames.
2
Select the Add Simple PDU tool used to ping devices..
Lab Title:
Configuration and Installation of Physical Switch and GUI Understanding
Lab Objective:
Clear the configuration of a standalone switch to prepare it for a new lab.
Activity Outcomes:
Students will learn about Installation of Physical Switch
Introduction:
When working with a switch that has been previously configured, any new commands
entered will be mergedwith the existing configuration, causing unpredictable results. In
this lab you prepare a Catalyst 2960 or 3560switch for use with a lab. This is accomplished
by erasing the startup configuration from NVRAM and deletingthe VLAN database.
Note:
This lab uses the Cisco WS-C2960-24TT-L switch with the Cisco IOS image c2960-
lanbasek9-mz.122-46.SE.bin and the Catalyst 3560-24PS switch with the Cisco IOS image
c3560-advipservicesk9-mz.122-46.SE.bin. Other switches (such as a 2950 or a 3550), and
Cisco IOS Software versions can be used if theyhave comparable capabilities and features.
Depending on the switch model and Cisco IOS Software version,the commands available
and output produced might vary from what is shown in this lab
SWITCH
Step 1: Connect to the switch console port and enter privileged EXEC mode.
From a computer running a terminal emulation program, connect to the console port of the
switch that youwant to clear using a console cable. You should see a console prompt that
includes the switch’s hostname,followed by a
> or #
. The default switch hostname is “Switch.”
Switch>
or
Switch#
If the prompt ends with a
>
, you are not in privileged EXEC mode. To enter privileged EXEC mode, type
enable
. This might require a password. If you are in a configuration mode, type
exit
or
end
.If not enabled:
Switch>
enable
Switch#
If in global configuration mode:
Switch(config)#
exit
CS-577 Computer Networks Page-45
Switch#
Step 2: Delete the VLAN database file.
In privileged EXEC mode, type
delete flash:vlan.dat
and press Enter. If you are asked to confirm, pressEnter until you are back to the original
prompt.
Switch#
delete flash:vlan.dat
Delete flash:vlan.dat? [confirm]Switch#
Step 3: Erase the startup config from NVRAM.
After deleting the vlan.dat file, you can erase the startup configuration on the switch by
typing
erase startup-config
. You again have to press Enter to confirm.
Switch#
erase startup-config
Erasing the nvramfilesystemwill remove
all configuration files! Continue?[confirm][OK]Erase of nvram: completeSwitch#
Step 4: Reload the device, but do not save the system configuration if prompted. After
clearing the switch configuration, reload the switch by typing reload and pressing Enter. If
you are askedwhether to save the current configuration, answer no
. Press Enter to confirm. The switch starts reloading.Your output might look different
depending on the switch model that you are using. This step might take a fewminutes,
because the switch needs time to reload.
Switch# reload
Systemconfiguration has been modified. Save? [yes/no]: no
--- SystemConfiguration Dialog ---Would you like to enter the initial configuration dialog?
[yes/no]: no
Would you like to terminate autoinstall? [yes]: Enter
Lab Title:
Configuration and Installation of Physical Router and GUI Understanding
Lab Objective:
1. Understanding basic networking commands
2. Configuring the Router configuration commands
Activity Outcomes:
Students will learn about Installation of Physical Router
Introduction:
Cisco uses IOS which stands for Internetwork operating system. IOS is command line
interface for configuring switch and router. Following are steps for connecting to router.