Practical File - en - Kriti - Khatri
Practical File - en - Kriti - Khatri
Lab File
1. Mandator LR 1 Basic 1
Networking
y (10 Commands
Experime )
nt
2. Mandatory 2 Understanding 1
Experiment
Topologies
3. Mandatory 3 Configuring 1
Experiment Switch
4. Mandatory 4 Configuring 1
Experiment VLAN
5. Mandatory 5 Configuring 1
Experiment Router
6. Mandator 6 Configuring 1
y a Trunk
Experime Connection
nt
7. Mandator 7 Enabling 1
y Inter- VLAN
Experime Communication
nt
8. Mandatory 8 Configuring 1
Experiment Web Servers
9. Mandator 9 Static 1
y Routing
Experime With Ip
nt Route
Command
10. Mandator 10 Configuring 1
y Ipv6
Experime Addresses
nt
11. Performanc PR 10
e (10)
12. Viva Viva 5
(5)
EXPERIMENT 1
Basic Networking Commands
1. ipconfi
g
1. hostname
Description: - The hostname command is used to show or set a computer's
hostname
and domain name.
2. ping
Description: - A ping is a signal sent to a host that requests a response.
Option: -
-t: - ping the specified host until stopped.
-a: - resolve address to hostname.
3. tracert
Description: - The tracert command is a Command Prompt command
that'sused to show several details about the path that a packet takes from
the computer or device you're on to whatever destination you specify
4. pathping
Description: - The PathPing command is a command-line network utility that
combines the functionality of ping with that of tracert. It is used to locate spots
thathave network latency and network loss.
Output: -
5. arp
Description: - ARP Command is a TCP/IP utility and Microsoft Windows
command for viewing and modifying the local Address Resolution
Protocol (ARP) cache, which contains recently resolved MAC addresses
ofInternet Protocol (IP) hosts on the network.
Options: -
-a: - Displays current ARP entries by interrogating the current protocol data.
-g: - Same as –a.
Output: -
6. netstat
Description: - In computing, netstat (network statistics) is a command-
linenetwork utility that displays network connections for Transmission
Control Protocol (both incoming and outgoing), routing tables, and a
number of network interface and network protocol statistics.
Output: -
7. finger
Description: - finger is a program you can use to find information about
computer users.
Output: -
EXPERIMENT 2
Understanding Topologies
1. Point-to-point
2. Star Topology
3. Mesh Topology
4. Ring Topology
THEORY: The properties of a switch can be configured using CLI, short for Command
Line Interface. There are several modes in the CLI and each mode is used to modify
certain specific attributes of the switch. The modes of execution and their uses are
listedin the table as under.
S. Mode Command Use
No. Prompt
1 User Execution Mode > Allows access to only a limited number of basic
monitoring commands
2 Privileged # To enter this mode, from user-exec mode, type
Execution Mode enable. Allows us to change the
current configuration of the switch.
3 Global (config)# To enter this mode, configure terminal or conf
Configuration t
Mode must be typed. Used to access
configuration options on the device.
4 Line (config-line)# To configure console, SSH, Telnet or AUX
Configuration access. They help us manage the lines of
Mode the switch. To
enter this mode type line console 0.
5 Interface Configuration (config-if)# Used to configure a switchport or router
Mode interface.
COMMANDS:
1. enable
Description: - To enter privileged EXEC mode, enter the enable command.
Privileged EXEC from user EXEC mode, enter the enable command.
2. conf t
Description: - After you enter the conf t (configure terminal command),
thesystem prompt changes from switch# to switch(config)#, indicating that
the switch is in configuration mode.
3. ip domain-lookup command
Description: - ip domain-lookup command is used to enable the
Domain Name Server (DNS) lookup feature.
4. interface
Description: - Used for switch interface configuration.
5. shutdown
Description: - Used to shut down the switch.
CLI Output: -
6. secret class
Description: - Used to enable a secret password for a specific privilege level.
7. line con 0
Description: - This console port is mainly used for local system access using a
console
terminal.
8. password
Description: - Configure Basic Password Settings Log in to the switch console.
9. show running-config
Description: - Used to display the current running configuration.
CLI Output: -
11. host
Description: - Used to configure the hostname for the switch
12. ip address
Description: - Used to set the switch ip address and subnet mask.
AIM: To create a network topology for a university having 5 departments; CSE, ECE,
ME, CE, EEE, each having 5 computers. There should be no communication between
the departments. The cost should me minimum for the network infrastructure.
THEORY: A Virtual LAN (or VLAN) is a domain that is partitioned and isolated in a
computer network at the data link layer. Although physically, the terminals are
connectedto the same switch, logically they are separated and no communication is
possible between them unless provisions are made.
Commands:
1. enable
Description: - To enter privileged EXEC mode, enter the enable command.
Privileged EXEC from user EXEC mode, enter the enable command.
2. conf t
Description: - After you enter the conf t (configure terminal command),
thesystem prompt changes from switch# to switch(config)#, indicating that
the switch is in configuration mode.
3. vlan
Description: - To enable switch VLAN configuration.
4. name
Description: - To name VLAN on a switch.
5. interface
Description: - Used for switch interface configuration.
6. switchport mode
Description: - Used to set the interface type in interface configuration mode.
CLI OUTPUT: -
TOPOLOGY:
AIM: To create a network topology with two VLANs, such that the VLAN users are
ondifferent switches connected to each other through a trunk link.
THEORY: When the same VLAN users are connected to different switches, in order to
ensure that same VLAN users can communicate with each other, we need to create a
link between the switches dedicated to each VLAN. Refer to the diagram on the left.
Toensure PC-A and PC-D can communicate, we must create a link for VLAN1 between
the switches. Another link must be created for VLAN2 which is dedicated for traffic
betweenPC-B and PC-C. Such a configuration is viable at a small scale, but infeasible
in larger topologies.
Frame tagging offers a solution to this problem. An extra field is added to the frame of
everyPDU that is sent across the switch which will help the switch identify which VLAN to
direct the PDU to. The most commonly used encapsulation is IEEE 802.1Q (dot1Q). The
receiving switch must ensure that this field is removed before furthering the message to
the destination address. This eliminates the need of multiple links between the switches,
and only a single trunk link remains, as shown in the diagram on the right.
CLI COMMANDS:
TOPOLOGY:
AIM: To create a network topology with three VLAN’s, a switch and a router which use
encapsulation to communicate among them.
THEORY: When VLAN’s on a network need to communicate with each other, a trunk connection is
needed. In this experiment we’ll be using the router to act as a trunk connection to make sure all
theVLAN traffic is sent between the switch. We will use the 802.1Q encapsulation protocol.
The Encapsulation Dot1Q command allows us to use a router interface as a trunk port to a switch. This
isalso known as “Router on a stick” because the switch uses the router to route between VLANs.
COMMAND: Router(config-subif)# encapsulation dot1Q <vlan> <native>
CLI COMMANDS: -
TOPOLOGY:
-
HTTP
DHCPv6
tip Wetc *Tracer 0pen n g dDDrs
TFTP
DNS
NTP
EMAIL
InT
VM Man agem enC
Radius EAP
THEORY: Static routing is a form of routing that occurs when a router uses a manually-configured routing
entry, rather than information from dynamic routing traffic. Unlike dynamic routing, static routes are fixed and
do not change if the network is changed or reconfigured. Static routing and dynamic routing are not mutually
exclusive. Both dynamic routing and static routing are usually used on a router to maximise routing efficiency
and to provide backups in the event that dynamic routing information fails to be exchanged.
CLI COMMANDS: -
TOPOLOGY:
RESULT: The Network with statistically configured IP routes was successfully configured.
EXPERIMENT – 10
Configuring IPv6 Addresses
THEORY: An IPv6 address is made of 128 bits divided into eight 16-bits blocks.
Each block is then converted into 4-digit Hexadecimal numbers separated by
colonsymbols. Even after converting into Hexadecimal format, IPv6 address
remains long. IPv6 provides some rules to shorten the address. The rules are as
follows:
CLI COMMANDS: -
TOPOLOGY:
2. Your router has the following IP address on Ethernet0: 172.16.2.1/23. Which of the following can
bevalid host IDs on the LAN interface attached to the router?
1. 172.16.1.100
2. 172.16.1.198
3. 172.16.2.255
4. 172.16.3.0
B. 2 and 4
C. 1, 2 and 4
D. 2, 3 and 4