0% found this document useful (0 votes)
1 views

Computer Network Manual11

Uploaded by

lavanyagowda0201
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

Computer Network Manual11

Uploaded by

lavanyagowda0201
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 77

COMPUTER NETWORK

INDEX
PART-A
SL
NO DATE NAME OF THE PROGRAM PAGE SIGNATURE
NO

3/9/2024 Execute the following commands: arp, ipconfig, hostname, 4-9


1. netdiag,netstat,nslookup, pathping, ping route, tracert

10/9/2024 Study of different types of network cables. 10-17


2.

3. 17/9/2024 Study of network IP address configuration: (Classification of 18-21


address, static and dynamic address)

4. 24/9/2024 Study of network IP address configuration: (IPv4 and IPv6 , 22-27


Subnet, Supernet)

5. 30/9/2024 Study the Network Devices (Switch, Router, Bridge) 28-33

1
COMPUTER NETWORK

PART-B
SL
NO DATE NAME OF THE PROGRAM PAGE NO SIGNATURE

4/10/2024 Configure and connect the computer in LAN 34-41


1.

15/10/2024 Share the folder in a system, and access the files of that folder 42-43
2. from other system using IP address .

3. 21/10/2024 Share the printer in Network, and take print from other PC 44-47

4. 4/11/2024 Configuration of Wi-Fi hotspot, and connect other devices 48-51


(mobile /laptop)

5. 14/11/2024 Configuration of VLAN using Packet Tracer/ GNS3 52-67

6. 20/11/2024 Configuration of VPN using Packet Tracer/ GNS3 68-77

2
COMPUTER NETWORK

3
COMPUTER NETWORK

4
COMPUTER NETWORK

PROGRAM 1:
Execute the following commands
Arp, ipconfig, hostname, netdiag, netstat, nslookup, pathping, pingroute, tracert.
Sol: The Windows operating system provides its user with a powerful tool, i.e.,
Command Prompt, which allows us to access and configure system settings and
data. In this article on ‘Networking Commands’. These network commands prove
helpful when there is a need to configure or troubleshoot the network settings of
our system.
What Are Networking Commands?
Every system is connected to numerous different networks and systems through
internal or external network channels. These network settings often run into issues
and affect the system’s working. Such network problems can be resolved using
‘networking commands.
1. ARP(Address Resolution Protocol):
The ARP command is used to access the mapping structure of IP addresses to the
MAC address. This provides us with a better understanding of the transmission of
packets in the network channel.
Command to enter in Prompt - arp

2. IPCONFIG:

The IPCONFIG network command provides a comprehensive view of information


regarding the IP address configuration of the device we are currently working on.
The IPConfig command also provides us with some variation in the primary
command that targets specific system settings or data, which are:
• IPConfig/all - Provides primary output with additional information about network
adapters.
• IPConfig/renew - Used to renew the system’s IP address.
• IPConfig/release - Removes the system’s current IP address.
Command to enter in Prompt – ipconfig.

5
COMPUTER NETWORK

6
COMPUTER NETWORK

3. NSLOOKUP
The NSLOOKUP command is used to troubleshoot network connectivity issues
in the system. Using the nslookup command, we can access the information related
to our system’s DNS server, i.e., domain name and IP address.
Command to enter in Prompt – nslookup

4. PING:

The Ping command is one of the most widely used commands in the prompt tool,
as it allows the user to check the connectivity of our system to another host.
This command sends four experimental packets to the destination host to
check whether it receives them successfully, if so, then, we can communicate
with the destination host. But in case the packets have not been received, that
means, no communication can be established with the destination host.
Command to enter in Prompt - ping

5. HOSTNAME:
The HOSTNAME command displays the hostname of the system. The hostname
command is much easier to use than going into the system settings to search for it.
Command to enter in Prompt – hostname

7
COMPUTER NETWORK

8
COMPUTER NETWORK

TRACERT:
6. TRACERT:
The TRACERT command is used to trace the route during the transmission of the
data packet over to the destination host and also provides us with the “hop” count
during transmission.
Using the number of hops and the hop IP address, we can troubleshoot network
issues and identify the point of the problem during the transmission of the data
packet.
Command to enter in Prompt- tracert IP-address OR tracert

7. NETSTAT:
The Netstat command as the name suggests displays an overview of all the
network connections in the device. The table shows detail about the connection
protocol, address, and the current state of the network. Command to enter in
Prompt – netstat

8. PATHPING:
"Pathping" is similar to "tracert," except it's more informative and takes a lot
longer to execute. After sending out packets from you to a given destination, it
analyzes the route taken and computes packet loss on a per-hop basis.
Sample usage and output:

9
COMPUTER NETWORK

10
COMPUTER NETWORK

PROGRAM- 2: STUDY OF DIFFERENT TYPES OF CABLES

Transmission Medium:
A communication channel that is used to carry the data from one transmitter to the receiver
through the electromagnetic signals. The main function of this is to carry the data in the bits
form through the Local Area Network(LAN). In data communication, it works like a physical
path between the sender & receiver. For instance, in a copper cable network the bits in the
form of electrical signals whereas in a fiber network ,the bits are available in the form of light
pulses. The quality as well as characteristics of data transmission, can be determined from the
characteristics of medium &signal. The properties of different transmission media are delay,
bandwidth, maintenance, cost and easy installation.

Bounded/Guided Transmission Media:


This kind of transmission media is also known as wired otherwise bounded media. In this type,
the signals can be transmitted directly & restricted in a thin path through physical links. The
types of Bounded /Guided transmission are discussed below.

Coaxial Cable:
Coaxial cable (or coax) carries signals of higher frequency ranges than those in twisted pair
cable. It has a central core conductor of solid or stranded wire (usually copper) enclosed in an
insulating sheath, which is, in turn, encased in an outer conductor of metal foil, braid, or a
combination of the two. The outer conductor is also enclosed in an insulating sheath, and the
whole cable is protected by a plastic cover.

Applications:
1. Coaxial cable was widely used for both analog and digital data transmissions.
2. It has higher bandwidth.
3. Inexpensive when compared to fiber optical cables.
4. It uses for longer distances at higher data rates.
5. Excellent noise immunity.
6. Used in LAN and Television distribution.
Disadvantage :
1. Single cable failure can fail the entire network.
2. Difficult to install and expensive when compared with twisted pairs.
3. If the shield is imperfect, it can lead to grounded loop.

11
COMPUTER NETWORK

12
COMPUTER NETWORK

Fibre Optic Cable:


A fiber optic cable is a network cable that contains strands of glass fibers inside an insulated
casing.
They're designed for long-distance, high-performance data networking, and
telecommunications. Compared to wired cables, fiber optic cables provide higher bandwidth
and transmit data over longer distances. Fiber optic cables support much of the world's internet,
cable television, and telephone systems.

Advantages of Fiber Optic Cables:


1. The loss of signal in optical fiber is less than that in copper wire.
2.Opticalfibers usually have a longer life cycle for over 100 years.
Disadvantage:
1.It is expensive.
2.Difficult to install

Twisted pair cable:


A twisted pair cable is a type of cable made by putting two separate insulated wires together
in a twisted pattern and running them parallel to each other. This type of cable is widely used
in different kinds of data and voice infrastructures.
Twisted pair is of two types:
1.Shielded Twisted Pair(STP)
2.Unshielded Twisted Pair(UTP)
Shielded Twisted Pair:
Shielded Twisted Pair (STP) cables additionally have an overall conducting metallic shields
covering four twisted pair wires. There may be another conducting metallic shields covering
individual twisted pairs also. These metallic shields blocks out electromagnetic interference to
prevent unwanted noise from the communication circuit.
Advantage of Shielded Twisted Pair:
1. The cost of the shielded twisted pair cable is not very high and not very low.
2. An installation of STP is easy.
3. It has higher capacity as compared to unshielded twisted pair cable.
4. It has a higher attenuation.
5. It is shielded that provides the higher data

13
COMPUTER NETWORK

14
COMPUTER NETWORK

Transmission rate.

Disadvantages:
1. It is more expensive as compared to UTP and coaxial cable.
2. It has a higher attenuation rate.

An unshielded twisted pair is widely used in telecommunication. It is most common type when
compared with shielded twisted pair cable which consists of two conductors usually copper,
each with its own colour plastic insulator

Advantages Of Unshielded Twisted Pair:


1. It is cheap.
2. Installation of the unshielded twisted pair is easy.
3. It can be used for high-speed LAN.
Disadvantage:
1. This cable can only be used for shorter distances because of attenuation.

Unguided medium transport electromagnetic waves without using a physical conductor. This
type of communication is often referred to as wireless communication. Signals are normally
broadcast through free space and thus are available to anyone who has a device capable of
receiving them Types of unguided Transmission media: ➢ Radio Transmission:

Its frequency is between 10Khz to 1Ghz. It is simple to install and has high attenuation. These
waves are used for multicast communication.

Types of propagation:
1. Troposphere
2. Ionosphere

15
COMPUTER NETWORK

16
COMPUTER NETWORK

Microwaves:
It is a line of sight transmission i.e. the sending and receiving antennas need to be properly
aligned with each other. The distance covered by the signal is directly proportional to the
height of the antenna. Frequency Range:1GHz – 300GHz. These are majorly used for mobile
phone communication and television distribution.

Infrared:
Infrared waves are used for very short distance communication. They cannot penetrate through
obstacles. This prevents interference between systems. Frequency Range:300GHz – 400THz.
It is used in TV remotes, wireless mouse, keyboard, printer, etc.

17
COMPUTER NETWORK

The main differences between Static and Dynamic IP addresses are as follows:
Features Static IP address Dynamic IP address

Definition It is a permanent numeric It is a temporary IP address


address that is manually allocated to a system when it
issued to a network device. connects to a network.

Provider It is provided by Internet It is provided by DHCP (Dynamic


Service Provider (ISP). Host Configuration Protocol).
Changes It doesn't change with time. It may be changed at any time.

Device Devices may be traced


Devices may be difficult to trace.
tracking easily.

Cost It is expensive to utilize and It is less expensive to utilize and


maintain. maintain.

Security It is less secure than the It offers high security.


dynamic IP address.

Designation It is complex to assign and It is much easy to assign and


reassign. reassign.

Stability It is highly stable. It is less stable.

Usage These are appropriate for Dynamic IP addresses are


dedicated services like appropriate for a large network
FTP, mail, and VPN that needs an internet connection
servers. for all devices.

18
COMPUTER NETWORK

PROGRAM – 3: STUDY THE NETWORK IP ADDRESS CONFIGURATION ( CLASSIFICATION OF ADDRESS,


STATIC AND DYNAMIC ADDRESS)

The IP address stands for Internet Protocol address is also called IP number or internet address.
It helps us to specify the technical format of the addressing and packets scheme.
An IP address is a numerical label assigned to the devices connected to a computer network
that uses the IP for communication. IP address act as an identifier for a specific machine on a
particular network. It also helps us to develop a virtual connection between a source and a
destination.

Types of IP address
There are mainly four types of IP addresses:

• Public
• Private
• Static
• Dynamic.
Public IP Addresses
A public IP address is an address where one primary address is associated with the whole
network. In this type of IP address, each of the connected devices has the same IP address.
This type of public IP address is provided by Internet Service Provider (ISP).

Private IP Addresses
A private IP address is a unique IP number assigned to every device that connects to internet
network, which includes devices like computers, tablets, smartphones etc.,

Static IP addresses
A static IP address is an IP address that cannot be changed. These are fixed that are manually
assigned to a system device. On the network configuration page, the network administrator
manually inputs the IP address for every system. Moreover, the static address is not changed
until it is directly updated by the network administrator or the Internet Service Provider.
Furthermore, this address does not change with each network connection. In other words, the
device always connects to the internet through the same IP address.

Dynamic IP addresses
The dynamic IP address is typically configured on devices via the DHCP protocol and
regularly updates. The dynamic IP address constantly changes whenever the user links to a
network. The Dynamic Host Configuration

19
COMPUTER NETWORK

Image for Configuring Static IP Address

Image for Configuring Dynamic IP Address

20
COMPUTER NETWORK

Protocol(DHCP) server employs a method for tracking and retrieving IP address information
associated with active network components. The mechanism utilized for translation in dynamic
address is known as Domain Name Server (DNS).
The DHCP and DNS are two protocols that are widely used while accessing the internet. When
a user connects to the network, DHCP assigns a temporary dynamic IP address.

21
COMPUTER NETWORK

Features IPv4 IPv6

Address length IPv4 is a 32-bit address. IPv6 is a 128-bit address.

Fields IPv4 is a numeric address


that consists of 4 fields IPv6 is an alphanumeric address that
which are separated by consists of 8 fields, which are
dot (.). separated by colon.

Classes IPv4 has 5 different IPv6 does not contain classes of IP


classes of IP address that addresses.
includes Class A, Class B,
Class C, Class D, and
Class E.

Number of IP address IPv4 has a limited number IPv6 has a large number of IP
of IP addresses. addresses.

Address configuration It supports manual and It supports manual, DHCP,


DHCP configuration. autoconfiguration, and renumbering.

Address space It generates 4 billion It generates 340 undecillion unique


unique addresses addresses.

End-to-end In IPv4, end-to-end


In the case of IPv6, end-to-end
connection connection integrity is
connection integrity is achievable.
integrity unachievable.

Security features In IPv4, security depends In IPv6, IPSEC is developed for


on the application. This IP security purposes.
address is not developed
in keeping the security
feature in mind.

Address representation In IPv4, the IP address is In IPv6, the representation of the IP


represented in decimal. address in hexadecimal.

22
COMPUTER NETWORK

PROGRAM-4: STUDY THE NETWORK IP ADDRESS CONFIGURATION ( CLASSIFICATION


IPV4 AND IPV6, SUBNET, SUPERNET)

The Internet Protocol version 4 (IPv4) is a protocol for use on packet-switched Link Layer
networks (e.g. Ethernet). IPv4 provides an addressing capability of approximately 4.3 billion
addresses. The Internet Protocol version 6 (IPv6) is more advanced and has better features
compared to IPv4.

23
COMPUTER NETWORK

Fragmentation Fragmentation is done by Fragmentation is done by the senders


the senders and the only.
forwarding routers.

Packet flow It does not provide any It uses flow label field in the header
identification mechanism for packet for the packet flow identification.
flow identification.

Checksum field The checksum field is The checksum field is not available in
available in IPv4. IPv6.

Transmission scheme IPv4 is broadcasting. On the other hand, IPv6 is


multicasting, which provides
efficient network operations.
It does not provide
Encryption encryption and It provides encryption and
Authentication authentication. authentication.

Number of It consists of 4 octets. It consists of 8 fields, and each field


octets contains 2 octets. Therefore, the total
number of octets in IPv6 is 16.

24
COMPUTER NETWORK

Subnetting is a technique of partitioning an individual physical network into several small-


sized logical sub-networks. These subnetworks are known as subnets. An IP address is made
up of the combination of the network segment and a host segment. A subnet is constructed by
accepting the bits from the IP address host portion which are then used to assign a number of
small-sized sub-networks in the original network.

The Subnetting basically convert the host bits into the network bits. As mentioned above the
subnetting strategy was initially devised for slowing down the depletion of the IP addresses.

The subnetting permits the administrator to partition a single class A, class B, class C network
into smaller parts. VLSM (Variable Length Subnet Mask) is a technique which partitions IP
address space into subnets of different sizes and prevent memory wastage. Furthermore, when
the number of hosts is same in subnets, that is known as FLSM (Fixed Length Subnet Mask).

25
COMPUTER NETWORK

26
COMPUTER NETWORK

Supernetting is inverse process of subnetting, in which several networks are merged into a
single network. While performing supernetting, the mask bits are moved toward the left of the
default mask. The supernetting is also known as router summarization and aggregation. It
results in the creation of more host addresses at the expense of network addresses, where
basically the network bits are converted into host bits.

The supernetting is performed by internet service provider rather than the normal users, to
achieve the most efficient IP address allocation. CIDR (Classless Inter-Domain Routing) is
scheme used to route the network traffic across the internet. CIDR is a supernetting technique
where the several subnets are combined together for the network routing. In simpler words,
CIDR allows the IP addresses to be organized in the subnetworks independent of the value of
the addresses.

27
COMPUTER NETWORK

28
COMPUTER NETWORK

Program- 5: STUDY OF NETWORK DEVICES ( SWITCH, ROUTER BRIDGE)

Aim: Study of following Network Devices in Detail

• Switch
• Bridge
• Router

Apparatus (Software): No software or hardware needed.

Procedure: Following should be done to understand this practical.

1.Switch: The term commonly refers to a network bridge that processes and routes data at the
data link layer (layer 2) of the OSI model. Switches that additionally process data at the
network layer (layer 3 and above) are often referred to as Layer 3 switches or multilayer
switches.
A switch is a Networking device in a computer network that connects other devices together.
Multiple data cables are plugged into a switch to enable communication between different
networked devices. Switches manage the flow of data across a network by transmitting a
received network packet only to the one or more devices for which the packet is intended

Working of Switch:-Whenever a host sends a frame to any other host, then the source host is
stored with the port in the address table of the MAC address switch. A switch always stores
the address of the source in the table. Unless a host does send some data, its MAC address and
port number will not be stored in the table of the switch. When you initialize the switch, the
switch does not contain any information about any host and its address. In such a situation,
when a host frame sends, its MAC address is stored in the table but due to no destination
information, the switch sends the frame to all the hosts. When you initialize the switch, the
switch does not contain any information about any host and its address. As soon as the second
host sends some data, its address also gets stored in the table. Whenever a host sends the
frames, the switch stores it if its address is not already present in the table. Thus a switch
creates its table. When all the hosts' addresses and port numbers come in the switch, the switch
delivers the frame to all hosts only, delivering the same host to the host for which the data has
been sent.

29
COMPUTER NETWORK

30
COMPUTER NETWORK

Bridge: A network bridge connects multiple network segments at the data link layer (Layer 2)
of the OSI model. In Ethernet networks, the term bridge formally means a device that behaves
according to the IEEE 802.1D standard. A bridge and switch are very much alike; a switch being
a bridge with numerous ports. Switch or Layer 2 switch is often used interchangeably with
bridge. Bridges can analyze incoming data packets to determine if the bridge is able to send
the given packet to another segment of the network.

Bridge:-
Bridge is termed as a network device which is helpful in filtering the data load of the traffic
by dividing it into segments or packets. They are used to lower the load of traffic on the LAN
and other networks. Bridges are passive devices, because there is no interaction between
bridged and the paths of bridging. Bridges operate on the second layer of the OSI model that
is the data link layer.

Working of Bridge:-

When various network segments are established at the data link layer of the OSI model, we
refer to it as bridge. However when the packets of data are transferred along a network , without
locating the network addresses this process is termed as bridging. The process of bridging is
helpful in locating the addresses of unknown addresses to which it is viable to send data. In
bridging the data packets contain a header or a packet header which holds the address to the
intended device. Bridge can remember and recall the address of the devices for further
transmission. There are two kinds of bridging modes, the transparent bridging and the source
routing bridging. When the process of bridging occurs, it makes a bridging table along side
where it stores the MAC addresses of the various terminals. This table helps the bridges to
send the data packet to the exact location next time. However when a specific address does not
meet the contents of the bridging table, the data packet is forwarded further ahead to every
attached terminal in LAN except from the computer it is connected to. This type of bridging
is called transparent bridging. When the source computer presents pathway information within

The packet, this type of bridging is known as source route bridging. It is most commonly used
in used on Token Ring networks.

31
COMPUTER NETWORK

32
COMPUTER NETWORK

Router:-
Routers are networking devices operating at layer 3 or a network layer of the OSI model. They are responsible for
receiving, analyzing, and forwarding data packets among the connected computer networks. When a data packet arrives,
the router inspects the destination address, consults its routing tables to decide the optimal route and then transfers the
packet along this route.

How a router works:-


A router examines a packet header's destination IP address and compares it against a routing
table to determine the packet's best next hop. Routing tables list directions for forwarding data
to particular network destinations, sometimes in the context of other variables, like cost. They
amount to an algorithmic set of rules that calculate the best way to transmit traffic toward any
given IP address. A routing table often specifies a default route, which the router uses
whenever it fails to find a better forwarding option for a given packet. For example, the typical
home office router directs all outbound traffic along a single default route to its internet service
provider (ISP) Routing tables can be static -- i.e., manually configured -- or dynamic. Dynamic
routers automatically updated their routing tables based on network activity, exchanging
information with other devices via routing protocols.

33
COMPUTER NETWORK

34
COMPUTER NETWORK

PROGRAM-1: CONFIGURING LAN


Go to settings in PC
Click on start button--→
settings

Select network and internet

Select Ethernet on left side of the window


Select change adapter options on the right side of the screen
Double click on Ethernet

35
COMPUTER NETWORK

36
COMPUTER NETWORK

CLICK ON PROPERTIES

Highlight ipv4 protocol and click on properties


Select the manual settings

Click on OK then close the window. Go


to run

37
COMPUTER NETWORK

38
COMPUTER NETWORK

Click on cmd

In the terminal Type ipconfig

39
COMPUTER NETWORK

40
COMPUTER NETWORK

Observe the changes in the ip address


Use ping ip address to check the connectivity

41
COMPUTER NETWORK

42
COMPUTER NETWORK

Program 2: Folder sharing


Right click on the created folder
Select properties→

click on advanced sharing

click on ok, Click on Apply then ok, Go to run select the ip of the destination, Folder shared.

43
COMPUTER NETWORK

44
COMPUTER NETWORK

Program 3: Printer sharing


Install the driver of the printer in the PC
Open printer and scanning from pc

Manage-→printer properties

Print and scanners-→Share


Printer properties

45
COMPUTER NETWORK

46
COMPUTER NETWORK

47
COMPUTER NETWORK

48
COMPUTER NETWORK

PROGRAM-4: CONFIGURING WIFI AND CONNECT OTHER DEVICES


Connect the wifi access point to the PC through Ethernet port and supply the power
Go to the browser and type: the URL/IP address present on the back of the access point.
Example: http://tplinkwifi.net/ OR default IP address present at the back of the ip address.

Type the username: admin


Password: admin

Go to the wireless-→ SSID (access point name)→ EWSBM, password-→EWSBM@123 Check the wifi connection in the
mobile and PC then connect through the credentials

49
COMPUTER NETWORK

50
COMPUTER NETWORK

EWSBM is listed

File sharing
Go to run

51
COMPUTER NETWORK

52
COMPUTER NETWORK

PROGRAM 5: CONFIGURE VLAN USING PACKET TRACER/GNS3


Cisco Packet Tracer Home Screen
Step 1: insert 6 Pcs, 2 switches, 1 router as shown in the diagram.
Select end devices to get the PC icon on screen

Take 2 switches (by click on switch icon


Take 1 router

Connect all the devices


Select cable

53
COMPUTER NETWORK

54
COMPUTER NETWORK

Fast Ethernet 0 to fast ethernet0/1

Fast Ethernet 0 to fast ethernet0/2


Fast Ethernet 0 to fast ethernet0/3

55
COMPUTER NETWORK

56
COMPUTER NETWORK

Fast Ethernet 0 to fast ethernet0/1


Fast Ethernet 0 to fast ethernet0/2
Fast Ethernet 0 to fast ethernet0/3

Connect switch to router


Connect switch to router gigabit Ethernet 0/1 to gigabit Ethernet 0/0

gigabit Ethernet 0/1 from switch side


Ethernet 0/1 to gigabit Ethernet 0/1 towards routerside

57
COMPUTER NETWORK

58
COMPUTER NETWORK

Topology is ready
Start configure the devices
Rightclick on the PC and select configure Class A range I will give
Gateway can be
192.168.1.254

Then select fast Ethernet IP address is 192.168.1.1


Subnet mask by default appear

Repeat the same steps to all the PC from 1 to 6

59
COMPUTER NETWORK

60
COMPUTER NETWORK

Class B range will give to another network


Gateway can be
172.16.1.254
IP address is 172.16.1.1, 172.16.1.2, 172.16.1.3

Configure the router


Config--→ top-right corner select on

61
COMPUTER NETWORK

62
COMPUTER NETWORK

If the topology is correct all small icons turned into green color
connect router to switch interface as ip address 192.168.1.254
https://www.bing.com/videos/search?q=Connecting+two+lan+through+Cisco+
packet+Tracer+-
+YouTube&view=detail&mid=760A2743EB61D2CCEFEC760A2743EB61D2
CCEFEC&FORM=VIRE

Connect router to one more switch as

Select Ethernet gigabyte0/1 and type the ip address as shown below

63
COMPUTER NETWORK

64
COMPUTER NETWORK

Click on the top of pc1


Select desktop--→ command prompt--→run
C:\>ping 192.168.1.2

65
COMPUTER NETWORK

66
COMPUTER NETWORK

Lan connection is working from one network to another network

OUTPUT:

67
COMPUTER NETWORK

68
COMPUTER NETWORK

PROGRAM 6: CONFIGURE VPN USING PACKET TRACER/GNS3


Components needed is 1 router (2911)
1 switch
3 servers 1PC

Connect all the devices and rename the server name as


File server
Web server Mail server Connectivity
On the server

Click on desktop-→ip configuration


1st server

2nd server

69
COMPUTER NETWORK

70
COMPUTER NETWORK

3rd server

Take a PC and connect to router

Set the IP to the pc as 10.10.10.10


And router as 10.10.10.11

71
COMPUTER NETWORK

72
COMPUTER NETWORK

Assign ip to the router Follow the steps Click on the router Select →cli→
Give ip address and subnet mask address
Type as: ip

address 172.16.1.1 255.255.255.0


Then type no shutdown

Configure PC to router

73
COMPUTER NETWORK

74
COMPUTER NETWORK

All the links are active state green color

Check the working condition from each server to gateway as

75
COMPUTER NETWORK

76
COMPUTER NETWORK

Check all the server connectivity to gate way

Ping from pc to router


OUTPUT

77

You might also like