CSE4102 Lab Manual
CSE4102 Lab Manual
LABORATORY MANUAL
Course No. : CSE4102
Course Title: Computer Networks Lab
PREFFERED TOOL(S)
Packet Tracer
TEXT/REFERENCE BOOK(S)
“Data Communications and Networking”, by ‘Behrouz A. Forouzan’, Published by
Mc‐Graw Hill, 4th edition.
“CCNA Study Guide” written by “Todd Lammle”, Publisher: BPB Publications.
Page | 1
Session 1: Building a Local Area Network
Objectives
1. To learn basics of Local Area Network (LAN)
2. Understand different types of LAN devices
3. To learn procedure to make Unshielded Twisted-Pair (UTP) cable
Description
What is a LAN?
A LAN is a high-speed data network that covers a relatively small geographic area. It typically
connects workstations, personal computers, printers, servers, and other devices. LANs offer
computer users many advantages, including shared access to devices and applications, file
exchange between connected users, and communication between users via electronic mail and
other applications.
LAN protocols function at the lowest two layers of the OSI reference model i.e. between the
physical layer and the data link layer. Figure 1 illustrates how several popular LAN protocols
map to the OSI reference model.
Page | 2
LAN Devices:
1. NIC (Network Interface Card): Also called Network Adapter. It connects a host to a
network medium. It provides the physical interface between computer and cabling. It
prepares data, sends data, and controls the flow of data. It can also receive and translate data
into bytes for the CPU to understand. Contain unique MAC Address to control data
communication.
3. Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator is a
device for connecting multiple twisted pair or fiber optic Ethernet devices together and
making them act as a single network segment. Hubs work at the physical layer (layer 1) of the
OSI model. The device is a form of multi port repeater. Repeater hubs also participate in
collision detection, forwarding a jam signal to all ports if it detects a collision.
4. Switch: A network switch or switching hub is a computer networking device that connects
network segments. The term commonly refers to a network bridge that processes and routes
data at the Data link layer (layer 2) of the OSI model. Switches that additionally process data
at the network layer (layer 3 and above) are often referred to as Layer 3 switches or
multilayer switches.
5. Bridge: A network bridge connects multiple network segments at the data link layer (Layer
2) of the OSI model. In Ethernet networks, the term bridge formally means a device that
behaves according to the IEEE802.1 standard. A bridge and switch are very much alike; a
switch being a bridge with numerous ports. Bridges can analyze incoming data packets to
determine if the bridge is able to send the given packet to another segment of the network.
6. Router: A router is an electronic device that interconnects two or more computer networks,
and selectively interchanges packets of data between them. Each data packet contains
address information that a router can use to determine if the source and destination are on
the same network, or if the data packet must be transferred from one network to another.
Where multiple routers are used in a large collection of interconnected networks, the routers
exchange information about target system addresses, so that each router can build up a table
showing the preferred paths between any two systems on the interconnected networks.
7. Gate Way: A gateway is a hardware device that acts as a "gate" between two networks. A
gate way may contain devices such as protocol translators, impedance matching devices, rate
converters, fault isolators, or signal translators as necessary to provide system
interoperability.
UTP Cable Construction:
Page | 3
1. Cross Over Cable: Diagram shows how to prepare Cross Over Connection.
2. Straight Through Cable: Diagram shows how to prepare Straight Through Connection.
Description
IP Addressing v4: The identifier used in network layer to identify each device connected to the
Internet is called the Internet address or IP address.
4. Default Subnet mask it is used to identify the network part from the host part. Put binary one
for the parts that represent network part and zero for the part that represent host part.
a) Class A: 255.0.0.0
b) Class B: 255.255.0.0
c) Class C: 255.255.255.0
d) We can’t have mix of 1s and 0s in subnet mask. Only consecutive 1s is followed by
consecutive 0s.
Objectives
Page | 6
1. Study of Classless IP Addressing
2. To learn the concept of Sub netting and Super netting
Description
Why Class less Addressing?
To overcome address depletion and give more organizations access to the Internet, classless
addressing was designed and implemented. In this scheme, there are no classes, but the addresses
are still granted in blocks.
Supernetting
In Supernetting, an organisation can combine several class C blocks to create a large range of
addresses. The following topics will be discussed:
1. Why we Develop Supernetting?
2. How to calculate Supernet mask?
3. How to identify Supernet address?
Objectives
Page | 7
1. Introduction to Packet Tracer Interface
2. To learn how to use different components and build a simple network
Description
Packet Tracer is a protocol simulator developed by Dennis Frezzo and his team at Cisco
Systems. Packet Tracer (PT) is a powerful and dynamic tool that displays the various protocols
used in networking, in either Real Time or Simulation mode.
Step 4: Building the Topology – Connecting the Hosts to Hubs and Switches
Adding a Hub or Switch: Select a hub or a switch by clicking once on Hubs/Switches and
once on a Generic hub/Switch.
Page | 8
Connect Host to Hub/Switch by first choosing Connections.
Click once on the Copper Straight-through cable.
Exercises
1. Design a topology using 4 PC and a Switch with following IP address:
2. Observe the flow of data from host to host by creating network traffic.
Page | 9
Objectives
1. Understanding basic networking commands
2. Configuring the Router configuration commands
Description
Cisco uses IOS which stands for Internetwork operating system. IOS is command line interface
for configuring switch and router. Following are steps for connecting to router.
Procedure
To implement this practical following network topology is required to be configured using the
commands learned in previous practical. After configuring the given network a packet should be
ping from any one machine to another.
Topology
Page | 12
Router(config)#hostname router0
router0(config)#interface fastethernet 0/0
router0(config-if)#exit
router0(config)#exit
router0#show running-config
Exercise
1. Configure PC0 and PC1 with following IP address and Subnet Mask.
3. Do the same procedure for Router1, PC2 and PC3 with following IP. Check the
connection from PC2 to PC3 using ping command.
Page | 13
Session 7: Implementation of Static Routing using PT
Objectives
1. To learn how to configure a topology with Static Routing Protocol
2. Test and verify the configuration
Description
Static Routing:
A router can learn about remote networks in one of two ways:
1. Manually, from configured static routes
2. Automatically, from a dynamic routing protocol
Static routes are commonly used when routing from a network to a stub network. A stub
network is a network accessed by a single route.
Page | 14
Procedure
To implement this practical following network topology is required to be configured using the
commands learned in previous practical. After configuring the given network a packet should
be ping from any one machine to another.
Topology
Exercises
1. Configure Router2 and Router3 with their respective IP address and also apply static
command.
2. Verify your configuration by using the command – Router# show ip route
3. Add a PC with each of the router and configure them with their respective IP.
4. Test the connectivity from any one PC to other by using ping command.
Page | 16
Session 8: Implementation of RIP using Packet Tracer
Objectives
1. To learn how to configure a topology with RIP
2. Test and verify the configuration
Description
The Routing Information Protocol (RIP) is a distance-vector routing protocol, which
employs the hop count as a routing metric. RIP prevents routing loops by implementing a limit
on the number of hops allowed in a path from the source to a destination. The maximum
number of hops allowed for RIP is 15. Originally each RIP router transmitted full updates every
30 seconds.
RIP versions:
RIP version 1
The original specification of RIP uses Classful routing. The periodic routing updates do
not carry subnet information, lacking support for variable length subnet masks (VLSM).
In other words, all subnets in a network class must have the same size.
RIP version 2
Due to the deficiencies of the original RIP specification, RIP version 2 (RIPv2) was
developed. It included the ability to carry subnet information, thus supporting Classless
Inter-Domain Routing (CIDR).
Page | 17
After configuring rip, we can discover routing table by show ip route command:
Exercises
Page | 18
Session 9: Implementation of OSPF using Packet Tracer
Objectives
1. To learn how to configure a topology with OSPF
2. Test and verify the configuration
Description
The wildcard mask can be configured as the inverse of a subnet mask. Key points:
0 (Decimal – octet format) Wildcard mask indicates that corresponding octet in network
address must be matched exactly.
255 (Decimal – octet format) Wildcard mask indicates that we don’t care about
corresponding octet in network address.
Page | 19
For example
The area area-id refers to the OSPF area. An OSPF area is a group of routers that share link-
state information.
Exercises
Page | 20
Session 10: Implementation of EIGRP using Packet Tracer
Objectives
1. To learn how to configure a topology with EIGRP
2. Test and verify the configuration
Description
Procedure
To implement this practical following network topology is required to be configured using the
EIGRP commands. After configuring the given network a packet should be ping from any one
machine to another.
Topology
Page | 21
Configure EIGRP on the R1 Router:
The router will begin to send EIGRP update messages out each interface belonging to the
172.16.0.0 network. EIGRP updates will be sent out of the FastEthernet0/0 and Serial0/0/0
interfaces because they are both on subnets of the 172.16.0.0 network.
Step 3: Configure the router to advertise the 192.168.10.4/30 network attached to the
Serial0/0/1 interface.
Use the wildcard-mask option with the network command to advertise only the subnet and not
the entire 192.168.10.0 classful network.
R1(config-router)# network 192.168.10.4 0.0.0.3
When you are finished with the EIGRP configuration for R1, return to privileged EXEC mode
and save the current configuration to NVRAM.
Exercises:
1. Configure EIGRP on the R2 and R3 Routers.
2. Verify EIGRP operation with the show ip eigrp neighbors and show ip protocols
commands.
3. Examine EIGRP Routes in the Routing Tables using show ip route command.
Page | 22
Session 11: Implementation of VLAN using Packet Tracer
Objectives
1. To perform basic configuration tasks on a switch
2. Create VLAN and assign switch ports to a VLAN
3. Test and verify the configuration
Description
Virtual LAN:
A Virtual Local Area Network (VLAN) is a logical grouping of network users and resources
connected to administratively defined ports on a switch. By creating VLANs, you are able to
create smaller broadcast domains within a switch by assigning different ports in the switch to
different subnetworks.
Procedure
To implement this practical following network topology is required to be configured using the
VLAN commands. After configuring the given network a packet should be ping from any one
machine to another.
Topology
Page | 23
Task 1: Prepare the Network
Step 1: Cable a network that is similar to the one in the topology diagram.
You can use any current switch in your lab as long as it has the required interfaces shown in the
topology.
Step 2: Clear any existing configurations on the switches, and initialize all ports in the
shutdown state.
Switch#config term
Switch(config)#interface range fa0/1-24
Switch(config-if-range)#shutdown
Switch(config-if-range)#interface range gi0/1-2
Switch(config-if-range)#shutdown
Exercise
1. Create and name VLANs 10, 20, 30, and 99 on S2 and S3 using the commands from
Task 4 and Step 1. Verify the correct configuration with the show vlan brief command.
2. What ports are currently assigned to the four VLANs you have created?
Page | 26
MID TERM EXAMINATION
There will be a 40-minutes written mid-term examination. Different types of questions will be
included such as MCQ, mathematics, writing code fragments etc.
Page | 27