C Net 12

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 23

Bangamata Sheikh Fojilatunnesa Mujib Science & Technology University

Department of Computer Science and Engineering


Lab Report
Course name: Computer Networking
Course Code: CSE 3121

Submitted by: Submitted to:


Md Saifullah Azad Md. Sydur Rahman
Lecturer
ID: 21111112 Session: 2020-21
Dept. of Computer Science & Engineering
Dept. of Computer Science & Engineering
Bangamata Sheikh Fojilatunnesa Mujib
Bangamata Sheikh Fojilatunnesa Mujib
Science & Technology University, Jamalpur
Science & Technology University, Jamalpur

Date of Submission: 26-05-2024


Experiment No. 01
Experiment Title: Configuration of Hub, Switch & Router

Hub Configuration
Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator is a
device for connecting multiple twisted pair or fiber optic Ethernet devices together and
making them act as a single network segment. Hubs work at the physical layer (layer 1) of
the OSI model. The device is a form of multiport repeater. Repeater hubs also participate in
collision detection, forwarding a jam signal to all ports if it detects a collision.

Step 1: Open the Cisco Packet Tracer.


Step 2: On opening Cisco packet tracer, click on End devices from bottom left icon
menus, Add four PCs and a hub into the screen of the simulator.

Step 3: Connect all PCs and hub with copper straight cable by selecting it through the
cables menu from the bottom left menus in the simulator. Green signal in the wire
shows they’re ready to communicate.
Step 4: Now, we’ve to give unique IP address to each PC. Click on each PC, go to
Desktop section and then click on IP configuration to give IP address.

IP Address Subnet Mask

192.168.1.1 255.255.255.0

192.168.1.2 255.255.255.0

192.168.1.3 255.255.255.0

192.168.1.4 255.255.255.0

Step 5: Click on a PC, go to Desktop and then click on Command prompt.


Step 6: After that test the ping command in command prompt to check the connectivity
between these PCs.
For eg : ping 192.168.1.3
Step 7: If ping command works successfully, then it means all these PCs are able to
communicate and share data between them and we’ve build our network of four PCs
and a Hub successfully.

Conclusion:

We can use as many PC and hubs as we want to build network. We’ve to keep in mind to
give unique IP addresses to all the PCs and check the connectivity in the network by
pinging all the PCs from one another which helps us to consider our network successful.

Switch Configuration

Switch: A network switch is a computer networking device that connects network segments.
The term commonly refers to a network bridge that processes and routes data at the data link
layer (layer 2) of the OSI model. Switches that additionally process data at the network layer
(layer 3 and above) are often referred to as Layer 3 switches or multilayer switches.

Objectives
• Perform an initial configuration of a Cisco Catalyst 2960 switch.

Background / Preparation
In this activity, you will configure these settings on the customer Cisco Catalyst 2960 switch:
• Host name
• Console password
• vty password
• Privileged EXEC mode password
• Privileged EXEC mode secret
• IP address on VLAN1 interface
• Default gateway Note: Not all commands are graded by Packet Tracer.

Step 1: Configure the switch host name.


a. From the Customer PC, use a console cable and terminal emulation software to
connect to the console of the customer Cisco Catalyst 2960 switch.
b. Set the host name on the switch to CustomerSwitch using these commands.

Switch>enable
Switch#configure terminal
Switch(config)#hostname CustomerSwitch

Step 2: Configure the privileged mode password and secret.


a. From global configuration mode, configure the password as cisco.

CustomerSwitch(config)#enable password cisco


b. From global configuration mode, configure the secret as cisco123.

CustomerSwitch(config)#enable secret cisco123

Step 3: Configure the console password.


a. From global configuration mode, switch to configuration mode to configure the
console line.
CustomerSwitch(config)#line console 0

b. From line configuration mode, set the password to cisco and require the password to
be entered at login.

CustomerSwitch(config-line)#password cisco
CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit

Step 4: Configure the vty password.


a. From global configuration mode, switch to the configuration mode for the vty lines 0
through 15.

CustomerSwitch(config)#line vty 0 15

b. From line configuration mode, set the password to cisco and require the password to
be entered at login.

CustomerSwitch(config-line)#password cisco
CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit

Step 5: Configure an IP address on interface VLAN1.


From global configuration mode, switch to interface configuration mode for VLAN1, and
assign the IP address 192.168.1.5 with the subnet mask of 255.255.255.0.
CustomerSwitch(config)#interface vlan 1
CustomerSwitch(config-if)#ip address 192.168.1.5 255.255.255.0
CustomerSwitch(config-if)#no shutdown
CustomerSwitch(config-if)#exit

Step 6: Configure the default gateway.


a. From global configuration mode, assign the default gateway to 192.168.1.1.

CustomerSwitch(config)#ip default-gateway 192.168.1.1


b. Click the Check Results button at the bottom of this instruction window to check
your work.
Step 7: Verify the configuration.
The Customer Switch should now be able to ping the ISP Server at 209.165.201.10. The first
one or two pings may fail while ARP converges.

CustomerSwitch(config)#end
CustomerSwitch#ping 209.165.201.10

Type escape sequence to abort.


Sending 5, 100-byte ICMP Echos to 209.165.201.10, timeout is 2 seconds:
..!!!
Success rate is 60 percent (3/5), round-trip min/avg/max = 181/189/197 ms

CustomerSwitch#
Router Configuration

Router: A router is an electronic device that interconnects two or more computer networks,
and selectively interchanges packets of data between them. Each data packet contains address
information that a router can use to determine if the source and destination are on the same
network, or if the data packet must be transferred from one network to another. Where
multiple routers are used in a large collection of interconnected networks, the routers
exchange information about target system addresses, so that each router can build up a table
showing the preferred paths between any two systems on the interconnected networks.

Objectives
• Configure the router host name.
• Configure passwords.
• Configure banner messages.
• Verify the router configuration.

Background / Preparation
In this activity, you will use the Cisco IOS CLI to apply an initial configuration to a router,
including host name, passwords, a message-of-the-day (MOTD) banner, and other basic
settings.
Note: Some of the steps are not graded by Packet Tracer.

Step 1: Configure the router host name.


a. On Customer PC, use the terminal emulation software to connect to the console of the customer Cisco
1841 ISR.
the host name on the router to CustomerRouter by using these commands.

Router>enable
Router#configure terminal
Router(config)#hostname CustomerRouter
Step 2: Configure the privileged mode and secret passwords.
a. In global configuration mode, set the password to cisco.

CustomerRouter(config)#enable password cisco

Set an encrypted privileged password to cisco123 using the secret command.

CustomerRouter(config)#enable secret cisco123

Step 3: Configure the console password.


a. In global configuration mode, switch to line configuration mode to specify the console line.

CustomerRouter(config)#line console 0

Set the password to cisco123, require that the password be entered at login, and then exit line
configuration mode.

CustomerRouter(config-line)#password cisco123
CustomerRouter(config-line)#login
CustomerRouter(config-line)#exit
CustomerRouter(config)#

Step 4: Configure the vty password to allow Telnet access to the router.
a. In global configuration mode, switch to line configuration mode to specify the vty lines.

CustomerRouter(config)#line vty 0 4

Set the password to cisco123, require that the password be entered at login, exit line configuration
mode, and then exit the configuration session.

CustomerRouter(config-line)#password cisco123
CustomerRouter(config-line)#login
CustomerRouter(config-line)#exit
CustomerRouter(config)#

Step 5: Configure password encryption, a MOTD banner, and turn off domain server lookup.
a. Currently, the line passwords and the enable password are shown in clear text when you show
the running configuration. Verify this now by entering the show running-config command.

To avoid the security risk of someone looking over your shoulder and reading the
passwords, encrypt all clear text passwords.

CustomerRouter(config)#service password-encryption
Use the show running-config command again to verify that the passwords are
encrypted. To provide a warning when someone attempts to log in to the router, configure a
MOTD banner.

CustomerRouter(config)#banner motd $Authorized Access Only!$

Test the banner and passwords. Log out of the router by typing the exit command twice. The banner
displays before the prompt for a password. Enter the password to log back into the router.
You may have noticed that when you enter a command incorrectly at the user or privileged EXEC
prompt, the router pauses while trying to locate an IP address for the mistyped word you entered. For
example, this output shows what happens when the enable command is mistyped.

CustomerRouter>emable
Translating "emable"...domain server (255.255.255.255)

To prevent this from happening, use the following command to stop all DNS lookups
from the router CLI.
CustomerRouter(config)#no ip domain-lookup

Save the running configuration to the startup configuration.

CustomerRouter(config)#end
CustomerRouter#copy run start

Step 6: Verify the configuration.


a. Log out of your terminal session with the Cisco 1841 customer router.
b. Log in to the Cisco 1841 Customer Router. Enter the console password when prompted.
c. Navigate to privileged EXEC mode. Enter the privileged EXEC password when prompted.
d. Click the Check Results button at the bottom of this instruction window to check your
work.

Experiment No. 02
Experiment Title: Implement the different types of topology by using cisco
package tracker.
Objectives:
1.To study how to implement different types of topology by using cisco package tracker.
2.To study how to configure of all this topology.
3.To study how to operate all this topology.
4.To study how to transfer all this topology.
5.To study how to assign IP and subnet mask in pc.

Background Study:Network topology is the interconnected pattern of network


elements. A network topology may be physical, mapping hardware configuration, or
logical, mapping the path that the data must take in order to travel around
the network.
Different Types of topology
2.1.Bus topology
2.2.Star topology
2.3.Ring topology
2.4. Tree topology
2.5.Mesh topology
2.6.Hybrid topology
Now, I briefly discuss about all topology steps by steps.

Steps to Configure and Setup Topology in Cisco Packet Tracer :

Step 1: First, open the cisco packet tracer desktop and select the devices like
pc,switches,hub,router etc.
Step2:Then, create a network topology

Step 3: Configure the PCs (hosts) with IPv4 address and Subnet Mask according to the IP
addressing table given above.

 To assign an IP address in all pc.


 Then, go to desktop and then IP configuration and there you will IPv4
configuration.
 Fill IPv4 address and subnet mask.

2.1 Bus Topology:Bus topology is a type of network topology in which all devices are
connected to a single cable called a bus.
Operations of bus topology :In a bus topology, data transmitted by one device is
received by all others connected to the same network. This means that when a device
sends information, all other devices on the network receive it simultaneously.

Assigning IP address and Subnet mask like pc0

Network Diagramof bus topology


a network topology as shown below image:

Fig2.1.1:bus topology

Simulation Result:
A simulation of the experiment is given below we have sent two PDU packets one
targeted from PC0 to PC2 .

Fig2.1.3:result simulation
Realtime result

2.1 Star Topology:A star topology, sometimes known as a star network, is a network
topology in which each device is connected to a central hub.

Operation of star topology:The systems in a star topology do not connect to each other,
but instead pass messages to the central core that, in turn, passes the message to either
all other systems( when we used hub) or the specific destination system(when we used
switch) depending on the network design.
Network Diagram of star topology with hub
Fig2.2.1:configuration of star topology(hub)
Assigning IP address and Subnet mask like pc0

Fig2.2.2:assigning ip address

Simulation result: The message transferred all devices from pc0 becausing of using hub.

Fig2.2.3:simulation result
Realtime

Assigning IP address and Subnet mask like pc0


Network Diagram of start topology with router

Fig2.2.4:network diagram with switch


Simulation result: Pc1 sent message and pc5 only received message.

Fig2.2.5:simulation result
Realtime result
2.3.Ring topology A ring topology is a network configuration where device connections
create a closed circular data path. Each networked device is connected to two others,
like points that form a circle.
Operations of ring topology :In a ring network, the token travels from one node to the
next until it reaches its destination. Most ring topologies allow packets to travel only in
one direction, called a unidirectional ring network. Others permit data to move in either
direction, which is called bidirectional.
Assigning IP address and Subnet mask like pc0

Network Diagram of ring topology


Fig2.3.1:Network Diagram of ring topology
Simulation result: successfully message pass from pc4 to pc6 for one time only.

Fig2.3.2: simulation result of ring topology

Realtime result
2.4. Tree topology: In networking, tree topology is a structure where devices are
connected hierarchically. It resembles a tree with a root node and various branches. The
root node is connected to multiple levels of child nodes, forming a hierarchy.

Operations of three topology :In this setup, the root node serves as the central hub,
often connected to a main network or server. Each child node can further branch out to
more child nodes, creating multiple levels. This branching allows data to flow from one
node to another in a controlled path.
Assigning IP address and Subnet mask like pc0

Network Diagram of tree topology


Fig2.4.1: Network Diagram of tree topology

Simulation result:
Fig2.4.1: simulation of tree topology

Realtime result
2.5.Mesh topology: A mesh topology is a network setup where each computer and
network device is interconnected with one another. This topology setup allows most
transmissions to be distributed even if one of the connections goes down.
Assigning IP address and Subnet mask like pc0

Network Diagram of mesh topology


Simulation result:

Realtime result

2.6.Hybrid topology:
Hybrid topology is a network structure that combines two or more different types of
topologies, such as star, ring, bus, or mesh.

Operation of Hybrid topology:

 Hybrid topology in computer networks is a combination of more than one


topology.
 This hybrid topology makes use of standards such as Wi-Fi and Ethernet for
performing its different operations.
 The functioning of hybrid topology depends upon various types of hybrid routers
used such as switches and hubs as they can easily connect the devices that are
connected over wired or wireless networks.
 The hybrid topology has different network branches and each branch as its own
unique design.

Assigning IP address and Subnet mask like pc0

Network Diagram of mesh topology

Simulation result:
Realtime result

You might also like