0% found this document useful (0 votes)
11 views37 pages

Practical File - en - Kriti - Khatri

Uploaded by

Preeti Gupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views37 pages

Practical File - en - Kriti - Khatri

Uploaded by

Preeti Gupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

EXPLORING THE NETWORKS

Lab File

AMITY SCHOOL OF ENGINEERING AND TECHNOLOGY


AMITY UNIVERSITY, UTTAR PRADESH

Submitted To: Submitted By:


DR . NEHA TYAGI KRITI KHATRI
A2345922111
BTECH CSE
5CSE2E-Y
S. Category Code Pro Name of Date of Date of Max. Marks Signatur
No of g. Program Allotme Submissi Mark Obtaine e of
Assignme No. nt on s d Faculty
nt

1. Mandator LR 1 Basic 1
Networking
y (10 Commands
Experime )
nt
2. Mandatory 2 Understanding 1
Experiment
Topologies
3. Mandatory 3 Configuring 1
Experiment Switch
4. Mandatory 4 Configuring 1
Experiment VLAN
5. Mandatory 5 Configuring 1
Experiment Router
6. Mandator 6 Configuring 1
y a Trunk
Experime Connection
nt
7. Mandator 7 Enabling 1
y Inter- VLAN
Experime Communication
nt
8. Mandatory 8 Configuring 1
Experiment Web Servers
9. Mandator 9 Static 1
y Routing
Experime With Ip
nt Route
Command
10. Mandator 10 Configuring 1
y Ipv6
Experime Addresses
nt
11. Performanc PR 10
e (10)
12. Viva Viva 5
(5)
EXPERIMENT 1
Basic Networking Commands
1. ipconfi
g

Description: - ipconfig (internet protocol configuration) is a console


applicationof some operating systems that displays all current TCP/IP network
configuration values and refresh Dynamic Host Configuration Protocol (DHCP)
and Domain Name System (DNS) settings.
Output: -

1. hostname
Description: - The hostname command is used to show or set a computer's
hostname
and domain name.

2. ping
Description: - A ping is a signal sent to a host that requests a response.
Option: -
-t: - ping the specified host until stopped.
-a: - resolve address to hostname.

3. tracert
Description: - The tracert command is a Command Prompt command
that'sused to show several details about the path that a packet takes from
the computer or device you're on to whatever destination you specify

4. pathping
Description: - The PathPing command is a command-line network utility that
combines the functionality of ping with that of tracert. It is used to locate spots
thathave network latency and network loss.

Output: -
5. arp
Description: - ARP Command is a TCP/IP utility and Microsoft Windows
command for viewing and modifying the local Address Resolution
Protocol (ARP) cache, which contains recently resolved MAC addresses
ofInternet Protocol (IP) hosts on the network.
Options: -
-a: - Displays current ARP entries by interrogating the current protocol data.
-g: - Same as –a.

Output: -
6. netstat
Description: - In computing, netstat (network statistics) is a command-
linenetwork utility that displays network connections for Transmission
Control Protocol (both incoming and outgoing), routing tables, and a
number of network interface and network protocol statistics.
Output: -

7. finger
Description: - finger is a program you can use to find information about
computer users.
Output: -
EXPERIMENT 2
Understanding Topologies

AIM: To establish the various network topologies (Point-to-Point Topology, Star


Topology, and Ring Topology) using Hubs and Switches.

TOOL USED: Cisco Packet Tracer

THEORY: Multiple computers can be connected in a network in several arrangements.


These are called Network Topologies. These connections are made possible with the
help of network devices called Hubs and Switches. The difference between a Hub and
Switch is that a Hub is an unintelligent device, and it does not know where the
intendedrecipient is located, therefore broadcasting any message it receives to all the
connected terminals. However, switch, being an intelligent device, only sends the
message to the intended recipient.

1. Point-to-point
2. Star Topology
3. Mesh Topology

4. Ring Topology

Result: The topologies were made and their results analysed.


EXPERIMENT 3
Configuring Switch

AIM: To configure a switch appropriately with required properties.

TOOL USED: Cisco Packet Tracer

THEORY: The properties of a switch can be configured using CLI, short for Command
Line Interface. There are several modes in the CLI and each mode is used to modify
certain specific attributes of the switch. The modes of execution and their uses are
listedin the table as under.
S. Mode Command Use
No. Prompt
1 User Execution Mode > Allows access to only a limited number of basic
monitoring commands
2 Privileged # To enter this mode, from user-exec mode, type
Execution Mode enable. Allows us to change the
current configuration of the switch.
3 Global (config)# To enter this mode, configure terminal or conf
Configuration t
Mode must be typed. Used to access
configuration options on the device.
4 Line (config-line)# To configure console, SSH, Telnet or AUX
Configuration access. They help us manage the lines of
Mode the switch. To
enter this mode type line console 0.
5 Interface Configuration (config-if)# Used to configure a switchport or router
Mode interface.

COMMANDS:
1. enable
Description: - To enter privileged EXEC mode, enter the enable command.
Privileged EXEC from user EXEC mode, enter the enable command.

2. conf t
Description: - After you enter the conf t (configure terminal command),
thesystem prompt changes from switch# to switch(config)#, indicating that
the switch is in configuration mode.
3. ip domain-lookup command
Description: - ip domain-lookup command is used to enable the
Domain Name Server (DNS) lookup feature.

4. interface
Description: - Used for switch interface configuration.

5. shutdown
Description: - Used to shut down the switch.

CLI Output: -

6. secret class
Description: - Used to enable a secret password for a specific privilege level.

7. line con 0
Description: - This console port is mainly used for local system access using a
console
terminal.

8. password
Description: - Configure Basic Password Settings Log in to the switch console.
9. show running-config
Description: - Used to display the current running configuration.

CLI Output: -

11. host
Description: - Used to configure the hostname for the switch

12. ip address
Description: - Used to set the switch ip address and subnet mask.

13. copy run-start


Description: - This command lets you save your running configuration
tothe router's startup configuration (NVRAM) so it will survive a reload.
CLI Output: -
10. line vty 0 15
Description: - It is a range command, we are giving range of vty(virtual
terminal line) from 0 to 15

11. banner motd# #


Description: - To configure a banner and message of the day (MOTD).
CLI OUTPUT: -

RESULT: The switch was successfully configured.


EXPERIMENT 4
Configuring VLAN

AIM: To create a network topology for a university having 5 departments; CSE, ECE,
ME, CE, EEE, each having 5 computers. There should be no communication between
the departments. The cost should me minimum for the network infrastructure.

TOOL USED: Cisco Packet Tracer 7.3.1

THEORY: A Virtual LAN (or VLAN) is a domain that is partitioned and isolated in a
computer network at the data link layer. Although physically, the terminals are
connectedto the same switch, logically they are separated and no communication is
possible between them unless provisions are made.

Commands:
1. enable
Description: - To enter privileged EXEC mode, enter the enable command.
Privileged EXEC from user EXEC mode, enter the enable command.

2. conf t
Description: - After you enter the conf t (configure terminal command),
thesystem prompt changes from switch# to switch(config)#, indicating that
the switch is in configuration mode.

3. vlan
Description: - To enable switch VLAN configuration.

4. name
Description: - To name VLAN on a switch.

5. interface
Description: - Used for switch interface configuration.
6. switchport mode
Description: - Used to set the interface type in interface configuration mode.

7. switchport access vlan


Description: - Used to set the VLAN when the interface is in access mode.

CLI OUTPUT: -
TOPOLOGY:

RESULT: The network satisfying requirements was made.


EXPERIMENT 5
Configuring Router

AIM: To configure a Router.

TOOL USED: Cisco Packet Tracer 7.3.1

THEORY: A router is a networking device that forwards data packets between


computer networks. Routers perform the traffic directing functions on the
Internet.Data sent through the internet, such as a web page or email, is in the
form of data packets. A packet is typically forwarded from one router to another
router through the networks that constitute an internetwork (e.g. the Internet)
until it reaches its destination node.
A router is connected to two or more data lines from different IP networks. When
adata packet comes in on one of the lines, the router reads the network address
information in the packet header to determine the ultimate destination. Then,
using information in its routing table or routing policy, it directs the packet to the
next network on its journey.
The most familiar type of IP routers are home and small office routers that
simplyforward IP packets between the home computers and the Internet. More
sophisticated routers, such as enterprise routers, connect large business or ISP
networks up to the powerful core routers that forward data at high speed along
the optical fiber lines of the Internet backbone.
Commands:
Router> enable
Router# conf t
Router(config)# host Router1
Router1(config)# interface g0/0/0
Router1(config-if)# ip address 192.168.1.100 255.255.255.0
Router1(config-if)# no shut
Router1(config-if)# interface g0/0/1
Router1(config-if)# ip address 192.168.2.100 255.255.255.0
Router1(config-if)# no shut

Router1(config-if)# interface loopback 0


Router1(config-if)# ip address 100.0.0.1 255.255.255.0
Router1(config-if)# interface loopback 1
Router1(config-if)# ip address 200.0.0.1 255.255.255.0
Router1(config-if)# end

Router1# show ip interface brief


Router1# copy run star
TOPOLOGY:

RESULT: The Router was successfully configured.


EXPERIMENT 6
Configuring a Trunk
Connection

AIM: To create a network topology with two VLANs, such that the VLAN users are
ondifferent switches connected to each other through a trunk link.

TOOL USED: Cisco Packet Tracer 7.3.1

THEORY: When the same VLAN users are connected to different switches, in order to
ensure that same VLAN users can communicate with each other, we need to create a
link between the switches dedicated to each VLAN. Refer to the diagram on the left.
Toensure PC-A and PC-D can communicate, we must create a link for VLAN1 between
the switches. Another link must be created for VLAN2 which is dedicated for traffic
betweenPC-B and PC-C. Such a configuration is viable at a small scale, but infeasible
in larger topologies.
Frame tagging offers a solution to this problem. An extra field is added to the frame of
everyPDU that is sent across the switch which will help the switch identify which VLAN to
direct the PDU to. The most commonly used encapsulation is IEEE 802.1Q (dot1Q). The
receiving switch must ensure that this field is removed before furthering the message to
the destination address. This eliminates the need of multiple links between the switches,
and only a single trunk link remains, as shown in the diagram on the right.
CLI COMMANDS:
TOPOLOGY:

RESULT: A Network with a Trunk Connection was successfully configured.


EXPERIMENT – 7
Enabling Inter-Vlan Communication

AIM: To create a network topology with three VLAN’s, a switch and a router which use
encapsulation to communicate among them.

TOOL USED: Cisco Packet Tracer 7.3.1

THEORY: When VLAN’s on a network need to communicate with each other, a trunk connection is
needed. In this experiment we’ll be using the router to act as a trunk connection to make sure all
theVLAN traffic is sent between the switch. We will use the 802.1Q encapsulation protocol.
The Encapsulation Dot1Q command allows us to use a router interface as a trunk port to a switch. This
isalso known as “Router on a stick” because the switch uses the router to route between VLANs.
COMMAND: Router(config-subif)# encapsulation dot1Q <vlan> <native>

CLI COMMANDS: -
TOPOLOGY:

RESULT: Inter-VLAN communication is successfully configured.


EXPERIMENT – 8
Configuring Web Servers

AIM: To configure a web server.

TOOL USED: Cisco Packet Tracer 7.3.1

THEORY: A web server is server software, or hardware dedicated to running this


software, that can satisfy client requests on the World Wide Web. A web server can, in
general, contain one or more websites. A web server processes incoming network
requests over HTTP and several other related protocols.
The primary function of a web server is to store, process and deliver web pages to
clients.The communication between client and server takes place using the Hypertext
Transfer Protocol (HTTP). Pages delivered are most frequently HTML documents,
which may include images, style sheets and scripts in addition to the text content.Web
browsers cantypically be configured with a built-in menu. Depending on the browser,
the menu may be named Settings, Options, or Preferences.The menu has different
types of settings. For example, users can change their home page and default search
engine. They also can change default web page colors and fonts. Various network
connectivity and privacysettings are also usually available.
CLI COMMANDS: -

-
HTTP

DHCPv6
tip Wetc *Tracer 0pen n g dDDrs
TFTP
DNS

NTP
EMAIL

InT
VM Man agem enC
Radius EAP

g dDDIS tD IIC*- Op]DOWnit/CS


TOPOLOGY:

RESULT: The Web Server was configured Successfully


EXPERIMENT – 9
STATIC ROUTING WITH IPROUTE
COMMAND

AIM: To configure routers with static routing using IP route command.

TOOL USED: Cisco Packet Tracer 7.3.1

THEORY: Static routing is a form of routing that occurs when a router uses a manually-configured routing
entry, rather than information from dynamic routing traffic. Unlike dynamic routing, static routes are fixed and
do not change if the network is changed or reconfigured. Static routing and dynamic routing are not mutually
exclusive. Both dynamic routing and static routing are usually used on a router to maximise routing efficiency
and to provide backups in the event that dynamic routing information fails to be exchanged.

CLI COMMANDS: -
TOPOLOGY:
RESULT: The Network with statistically configured IP routes was successfully configured.
EXPERIMENT – 10
Configuring IPv6 Addresses

AIM: To create a network consisting of switches and routers, to


implementand configure IPv6 Addresses.

TOOL USED: Cisco Packet Tracer 7.3.1

THEORY: An IPv6 address is made of 128 bits divided into eight 16-bits blocks.
Each block is then converted into 4-digit Hexadecimal numbers separated by
colonsymbols. Even after converting into Hexadecimal format, IPv6 address
remains long. IPv6 provides some rules to shorten the address. The rules are as
follows:

Rule.1: Discard leading Zero(es):

Rule.2: If two of more blocks contain consecutive zeroes, omit them


alland replace with double colon sign ::
COMMANDS: Router(config)# interface <name>
Router(config-if)# ipv6 address <ipv6 address>

CLI COMMANDS: -
TOPOLOGY:

RESULT: IPv6 configuration is successful.


Find the last address for Router B - 191.168.10.223
Find the Wild Card Mask for Router A - 0.0.0.123,0.0.0.63
Find the total no. of Usable Ip address for Router C - 14
Find the broadcast address for Router A - 192.168.10.127 , 192.168.10.191
Find the total no. of network for Router C- 8

2. Your router has the following IP address on Ethernet0: 172.16.2.1/23. Which of the following can
bevalid host IDs on the LAN interface attached to the router?
1. 172.16.1.100
2. 172.16.1.198
3. 172.16.2.255
4. 172.16.3.0

Answer: 3 and 4 Both


3
Which two statements describe the IP address 10.16.3.65/23?
The subnet address is 10.16.3.0 255.255.254.0.
The lowest host address in the subnet is 10.16.2.1 255.255.254.0.
The last valid host address in the subnet is 10.16.2.254 255.255.254.0.
The broadcast address of the subnet is 10.16.3.255 255.255.254.0.
A. 1 and 3

B. 2 and 4

C. 1, 2 and 4
D. 2, 3 and 4

Answer: 2 and 4 both (option B)


Q4. 191.11.44.32 we have 1000 host find the first address & last address.
Answer:
Mask= 32-10=22
Subnet= 255.255.252.0
Wildcard mask- 0.0.3.255
1024/256=4
Total ip= 2^32-22=1024
Total usable ip=1022
0-3,4-7
FA= 191.11.44.0
FUA=191.11.44.1
LA=191.11.47.255
LUA=191.11.47.254

You might also like