0% found this document useful (0 votes)
4 views

LAB Manual Data and computer communication

The laboratory manual for the Data Communication and Computer Networks course at The University of Lahore outlines guidelines for lab procedures, safety precautions, and assessment rubrics for students. It includes a list of experiments related to networking, such as studying types of cables and connecting computers using various devices. The manual also details course learning outcomes and their mapping to program learning outcomes.

Uploaded by

trafiq088
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

LAB Manual Data and computer communication

The laboratory manual for the Data Communication and Computer Networks course at The University of Lahore outlines guidelines for lab procedures, safety precautions, and assessment rubrics for students. It includes a list of experiments related to networking, such as studying types of cables and connecting computers using various devices. The manual also details course learning outcomes and their mapping to program learning outcomes.

Uploaded by

trafiq088
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 182

Data communication and

computer networks
CS08222

Laboratory Manual

Department of Technology (Information


Engineering Technology)
The University Of Lahore
1- Km, Defence Road, Bhupatian Chowk, Off Raiwind
Road, Lahore
Guidelines for Laboratory Procedure

 Before starting a new lab, you must always read the laboratory manual for that

experiment and the instructor will discuss the experiment with you.

 Attachments must be made for laboratory experiment done in the class.

 Make sure that your observation for previous week experiment is evaluated by the

faculty member and your have transferred all the contents to your record before

entering to lab.

 At the beginning of the class, if the faculty or the instructor finds that a student is

not adequately prepared, they will be marked as absent and not be allowed to

perform the experiment.

 Please actively participate in class and don’t hesitate to ask questions.

 Please utilize teaching assistants fully. To encourage you to be prepared and to

read the lab manual before coming to the laboratory, unannounced questions may

be asked at any time during the lab.

 Maintain silence, order and discipline inside the lab. Don’t use cell phones inside

the laboratory.

 Report to the instructor if you find equipment that is out of order or you break

something..
Safety Precautions

This is a partial list of basic safety precautions to use when working on a computer:

 Remove your watch and jewelry and secure loose clothing.


 Turn off the power and unplug equipment before performing service.
 Take a note of all the exits in the room, and also take note of the location of fire
extinguishers in the room for the sake of fire safety.
 Try not to type continuously for extremely long periods.
 Look away from the screen once in a while to give your eyes a rest.
 Do not touch any exposed wires or sockets.
 Do not attempt to open any machines, and do not touch the backs of machines when
they are switched on.
 Do not spill water or any other liquid on the machine, in order to maintain electrical
safety.
 Turn off the machine you were using, when you are done using it.
 Do not access external devices without scanning them for computer viruses.
 Ensure that the temperature in the room stays cool, since there are a lot of machines
inside a lab, and these can overheat easily.
 Try not to touch any of the circuit boards and power sockets when something is
connected to them and switched on.
 Always maintain an extra copy of all your important data.
Safety Undertaking

I have read all of the above, and I agree to conform to its contents.

Name:

Registration No.:

Student Signature:

Date:

Lab Instructor:
VERSION HISTORY TABLE

Title Lab Manual (Data and computer communication)


Description The Lab manual is comprised of lab activities for the students to practice
Data and computer networks. The manual is designed for the software CISCO
packet tracer
Created By Syed M Hamedoon (Assistant Professor)
Date Created September, 2022
Version No 1.0
Modified Modified by Modifications Made Date Status
VersionNumber Modified
Laboratory Work Assessment Rubrics

Sr. Performance
No. Indicator Excellent (5) Good (4) Average (3) Fair (2) Poor (1)
1 Theoretical Student knows Student knows most Student knows few Student knows Student has poor
knowledge all the related of the related of the related very little about understanding of the
/Background concepts about concepts about the concepts about the the related related concepts
knowledge the theoretical theoretical theoretical concepts about the about the theoretical
background of background of the background of the theoretical background of the
the experiment experiment and experiment and background of the experiment and
and rephrase partially rephrase partially rephrase experiment and unable to rephrase
those concepts in those concepts in those concepts in poorly rephrase those concepts in
written and oral written and oral written and oral those concepts in written and oral
assessments assessments assessments written and oral assessments
assessments
2 Calculations All of the data Most of the data Some of the data Most of the data All of the data
analyzed is very analyzed is very analyzed is very analyzed is analyzed is
accurate, precise, accurate, precise, accurate, precise, inaccurate based inaccurate based on
logical and logical and logical and on illogical illogical calculations.
systematic in systematic in terms systematic in terms calculations
terms of of calculations of calculations
calculations
3 Analysis and Always analyzes Most of the time Sometime Analyzes and Analyzes and
Interpretation and interprets Analyzes and Analyzes and interprets data very interprets data
data correctly interprets data interprets data poorly, most of the incorrectly most of
and always correctly; most of accurately, some conclusions are the time; many
draws correct the conclusions are of the conclusions incorrect; Not able conclusions are
conclusions; correct; compares are correct; to compare the incorrect; most of the
always compares theory against sometime able to theory against time never attempts
theory against experimental results compare the theory experimental to compare theory
experimental and calculates against results and against experimental
results and related error most of experimental calculates related results.
calculates related the time. results and error
error. calculates related
error
4 Ability to Fully understand Has good Has average Has fair Has poor
Conduct the the lab understanding of the understanding of understanding of understanding of the
Experiment instruments lab instruments the lab instruments the lab instruments lab instruments
including its including its including its including its including its purpose
purpose and purpose but able to purpose and able purpose and able and unable to
quite able to conduct experiment to conduct to conduct conduct experiment
conduct the with some help experiment with experiment with
entire experiment from lab instructor help and taking help and taking
with negligible more than one more than three
help from lab attempt attempts
instructor

5 Level of Provide complete Provide complete Provide partially Provide very few Provide no answer to
understanding and logical and logical answers correct and logical and illogical the questions asked
of the learned answers based based upon accurate answers based answers to the by examiner.
skill upon accurate technical content to upon minimum questions asked by
technical content the questions asked technical content examiner.
to the questions by examiner with to the questions
asked by few errors asked by examiner
examiner
6 Data collection Students has Students has strong Students has Students has fair Students has poor
and strong grasp on grasp on data partial grasp on grasp on data grasp on data
repeatability data collection collection and can data collection and collection and can collection and can
and can perform perform the same can perform the perform the same perform the same
the same task task with partial same task with task with fair task with poor
with accuracy accuracy partial accuracy accuracy accuracy
7 Responsiveness 1. Responds 1. Generally 1. Generally 1. Not much . 1. Non Responsive
to well, quick and Responsive and Responsive and Responsive and and inaccurate all the
Questions/ very accurate all accurate most of the accurate few times. accurate most of times.
Accuracy the time. times. 2. Some eye the times. 2. No eye contact and
2. Effectively 2. Maintains eye contact, speaks 2. Uses eye contact unable to speak
uses eye contact, contact, speaks clearly and ineffectively and 3. Dresses
speaks clearly, clearly with suitable unclearly in fails to speak inappropriately
effectively and volume and pace. different portions. clearly and audibly
confidently using
suitable volume
and pace.
8 Material/ Procedure, Procedure, results Procedure, results, Procedure, results The content is very
Content results and and conclusions are conclusions and and conclusions poor/ meaningless
conclusions are very well written. Graphs/ have major and presented poorly
very well Data presentation is waveforms have mistakes. Data is without appropriate
written. not up to the mark. few mistakes and not presented using graphs or waveforms
Appropriate are not very well graphs/
graphs/waveform written waveforms.
s are used to
present the data.

9 Work All members are All members are All members Only two members Only one member
Sharing/Team equally equally contributing seems to be seems to be seems to be actively
work contributing in in completing the working actively actively working working on the given
completing the given task with on the task but on the given task task
project and team proportionate load workload is not
leader is sharing shared equally
exhibiting the
leadership skills.
10 Awareness of Student has Student has Student has little Student has little Student has no
Safety sufficient sufficient knowledge of the knowledge of the knowledge of the
Guidelines knowledge of knowledge of the laboratory safety laboratory safety laboratory safety
the laboratory laboratory safety SOPs and protocol SOPs and protocol SOPs and protocol
safety SOPs and SOPs and protocol and is Partially and is non- and is non-compliant
protocol and is and is Partially compliant to the compliant to the to the guidelines
fully compliant compliant to the guidelines guidelines
to the guidelines guidelines
Lab’s Course Learning Outcomes
Course Title : Data and computer communication
Course Code : CS08222
Instructor :____________________________________________________
Designation : _________________________________
E-mail : __________________________________
Students will be able to:

CLO 3: State key concepts of network architecture and components (P2, PLO4)
CLO4: Construct data and computer communication models through knowledge and understanding of physical
layer, data link layer and network layer. (P4, PLO5)

Mapping of Course Learning Outcomes (CLO) to Program Learning Outcomes (PLO) / Graduate Attributes

Course CLOs/ PLO PLO PLO


PLO 1 PLO2 PLO3 PLO4 PLO5 PLO6 PLO7 PLO8 PLO9
Code PLOs 10 11 12
X
CS08222 CLO 3

CS08222 CLO 4 X

PLO1: Engineering Knowledge PLO8: Ethics


PLO2: Problem Analysis PLO9: Individual and Team Work
PLO3: Design/Development of Solutions PLO10: Communication
PLO4: Investigation PLO11: Project Management
PLO5: Modern Tool Usage PLO12: Lifelong Learning
PLO6: The Engineer and Society
PLO7: Environment and Sustainability
List of experiments

LAB No. Experiment Name


1 To study types of cables in networking
2 To study different internetworking devices in a computer network
3 To study the basic function of modem
4 To study basic network topologies and IP addressing
5 Introduction of CISCO packet Tracer
6 To Connect computers using switch
7 To Connect computers using HUB
8 To connect computers using router
9 Static IP configuration using router and switch
10 Serial Port router configuration
11 To connect computers using DHCP
12 To connect computer with router using DHCP
13 To study the network commands
14 To connect computers with wireless medium
15 To implement Virtual Local Area Network
EVALUATION LOG

Obtained Marks
LAB No. Checked date Checked by
CLO 3 CLO 4
Experiment No. 1
Types of Cables in Networking
Objective:
To study of basic Types of Cables in Networking

Theory:
To connect two or more computers or networking devices in a network, network cables are used.
There are three types of network cables; coaxial, twisted-pair, and fiber-optic. The following
sections discuss the types of cables used in networks and other related topics.

 Unshielded Twisted Pair (UTP) Cable


 Shielded Twisted Pair (STP) Cable
 Coaxial Cable
 Fiber Optic Cable
 Cable Installation Guides
 Wireless LANs
 Unshielded Twisted Pair (UTP) Cable

Twisted pair cabling comes in two varieties: shielded and unshielded.

Category/ Maximum Bandwidth/ Ethernet Description


name supported support standard
of speed signals rate
the cable

Cat1 1Mbps 1MHz Not used for This Cable contains only two pairs
data (4 wires). This cable was used in
the telephone network for voice
transmission.

Cat 2 4Mbps 10MHz Token Ring This cable and all further cables
have a minimum of 8 wires (4
pairs). This cable was used in the
token-ring network.
Cat 3 10Mbps 16MHz 10BASE-T This is the first Ethernet cable that
Ethernet was used in LAN networks
Cat 4 20Mbps 20MHz Token Ring This cable was used in advanced
Token-ring networks.

Cat 5 100Mbps 100MHz 100BASE-T This cable was used in advanced


Ethernet (fast) LAN networks.

Cat 5e 1000Mbps 100MHz 1000BASE-T This cable/category is the


Ethernet minimum requirement for all
modern LAN networks.

Cat 6 10Gbps 250MHz 10GBASE-T This cable uses a plastic core to


Ethernet prevent cross-talk between twisted-
pair. It also uses a fire- resistant
plastic sheath.
Cat 6a 10Gbps 500MHz 10GBASE-T This cable reduces attenuation and
Ethernet cross-talk. This cable also
potentially removes the length
limit. This is the recommended
cable for all modern Ethernet LAN
networks.
Cat 7 10Gbps 600MHz Not drafted This cable sets a base for further
yet development. This cable uses
multiple twisted-pairs and shields
each pair by its own plastic sheath.
Table.1.1.Catagories of Cables
Unshielded twisted pair (UTP)
Unshielded twisted pair (UTP) is the most popular and is generally the best option for
schoolnetworks (See fig. 1).

Figure.1.1.Unshielded twisted pair


The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The
cable has four pairs of wires inside the jacket. Each pair is twisted with a different number of
twists per inch to help eliminate interference from adjacent pairs and other electrical devices.
The tighter the twisting, the higher the supported transmission rate and the greater the cost per
foot. The EIA/TIA (Electronic Industry Association/Telecommunication Industry Association)
has established standards of UTP and rated six categories of wire (additional categories are
emerging).

Categories of Unshielded Twisted Pair

Category Speed Use


1 1 Mbps Voice Only (Telephone Wire)
2 4 Mbps Local Talk & Telephone (Rarely used)
3 16 Mbps 10BaseT Ethernet
4 20 Mbps Token Ring (Rarely used)
100 Mbps (2 pair) 100BaseT Ethernet Gigabit Ethernet
5
1000 Mbps (4 pair) Gigabit Ethernet

5e 1,000 Mbps
6 10,000 Mbps Gigabit Ethernet

Table.1.2.Categories of Unshielded Twisted Pair

Unshielded Twisted Pair Connector


The standard connector for unshielded twisted pair cabling is an RJ-45 connector. This is a
plastic connector that looks like a large telephone-style connector (See fig. 2). A slot allows the
RJ-45 to be inserted only one way. RJ stands for Registered Jack, implying that the connector
follows a standard borrowed from the telephone industry. This standard designates which wire
goes with each pin inside the connector.

Figure.1.2.RJ-45 connector
Shielded Twisted Pair (STP) Cable
Although UTP cable is the least expensive cable, it may be susceptible to radio and
electrical frequency interference (it should not be too close to electric motors, fluorescent lights,
etc.). If you must place cable in environments with lots of potential interference, or if you must
place cable inextremely sensitive environments that may be susceptible to the electrical current
in the UTP, shielded twisted pair may be the solution. Shielded cables can also help to extend
the maximum distance of the cables.
Shielded twisted pair cable is available in three different configurations:

1. Each pair of wires is individually shielded with foil.


2. There is a foil or braid shield inside the jacket covering all wires (as a group).
3. There is a shield around each individual pair, as well as around the entire groupof wires
(referred to as double shield twisted pair).

Figure.1.3.Shielded twisted pair


Coaxial Cable
Coaxial cabling has a single copper conductor at its center. A plastic layer provides insulation
between the center conductor and a braided metal shield (See fig. 4). The metal shield helps to
block any outside interference from fluorescent lights, motors, and other computers.

Figure.1.4.Coaxial cable

Although coaxial cabling is difficult to install, it is highly resistant to signal interference. In


addition, it can support greater cable lengths between network devices than twisted pair cable.
The two types of coaxial cabling are thick coaxial and thin coaxial.
Thin coaxial cable is also referred to as thinner. 10Base2 refers to the specifications for thin
coaxial cable carrying Ethernet signals. The 2 refers to the approximate maximum segment
length being 200 meters. In actual fact the maximum segment length is 185
meters. Thin coaxial cable has been popular in school networks, especially linear bus
networks. Thick coaxial cable is also referred to as thicken. 10Base5 refers to the
specifications for thick coaxial cable carrying Ethernet signals. The 5 refers to the maximum
segment length being 500 meters. Thick coaxial cable has an extra protective plastic cover that
helps keep moisture away from the center conductor. This makes thick coaxial a great choice
when running longer lengths in a linear bus network. One disadvantage of thickcoaxial is that it
does not bend easily and is difficult to install.

Coaxial Cable Connectors


The most common type of connector used with coaxial cables is the Bayonne-Neill-Concelman
(BNC) connector (See fig. 5). Different types of adapters are available for BNC connectors,
including a T-connector, barrel connector, and terminator. Connectors on the cable are the
weakest points in any network. To help avoid problems with your network, always use the BNC
connectorsthat crimp, rather screw, onto the cable.

Figure.1.5.BNC connector

Fiber Optic Cable


Fiber optic cabling consists of a center glass core surrounded by several layers of protective
materials (See fig. 6). It transmits light rather than electronic signals eliminating the problem
of electrical interference. This makes it ideal for certain environments that contain a large
amount of electrical interference. It has also made it the standard for connecting networks
between buildings, due to its immunity to the effects of moisture and lighting.
Fiber optic cable has the ability to transmit signals over much longer distances than coaxial
and twisted pair. It also has the capability to carry information at vastly greater speeds. This
capacity broadens communication possibilities to include services such as video conferencing
and interactive services. The cost of fiber optic cabling is comparable to copper cabling;
however, it is more difficult to install and modify. 10BaseF refers to the specifications for fiber
optic cable carrying Ethernet signals.

Figure.1.6.Fiber optic cable

There are two common types of fiber cables -- single mode and multimode. Multimode cable
has a larger diameter; however, both cables provide high bandwidth at high speeds. Single
mode can provide more distance, but it is more expensive.
Table.1.3
LAB Review Questions

QUESTION 1
Define Rj-45 Connector?
Answer:

QUESTION 2
What do you mean by BNC connector?
Answer:

QUESTION 3
What is the purpose of metal shield in Coaxial cable?
Answer
QUESTION 4
What is the function of optical fiber?

LAB Evaluation

Student Name: Instructor Name Syed M Hamedoon


Registration No: Assessment CLO3, P2
Date: Total Marks

Note: Lab rubrics page is attached at the end of the lab


Experiment No. 2
To study different internetworking devices in a computer network

Objective:
To study different internetworking devices in a computer network

Theory:
REPEATER
A Repeater is a purely electrical device that extends maximum distance a LAN cable can span
by Amplifying signals passing through it. A Repeater connects two segments and broadcasts
packets between them. Since signal loss is a factor in the maximum length of a segment, a
Repeater is used to amplify the signal and extend the usable length. A common Ethernet rule is
that no more than four repeaters may be used to join segments together. This is a physical
limitation designed to keep collision detection working properly.

Figure.5.1.Repeaters

Features
 Repeaters operate at layer 1 (Physical layer) of the OSI model
 A Repeater connects two segments of a network cable.
 Sometimes it regenerates the signals to proper amplitudes and sends them to
the other segment.
 If the signal becomes weak, it can copy the signal bit by bit and regenerate it
at the original strength.
 It is a 2-port device.
BRIDGES
The networks bridge provides an inexpensive and easy way to connect network segments. A
bridge provides Amplification function of a repeater plus, ability to select filter packets
based on their addresses. When network grows in size, it is often necessary to partition it in
to smaller group of nodes to help isolate traffic and improve performance. One way to do
this is to use bridge, the operation of it is to keep one segment traffic to that side and other
side will cross the bridge. The bridge learns which packets should cross it as it is used.

Figure 5.2 Bridge

Router
A router is a device that connects two LANs together to form an inter-network. A router is
the basic building block of the Internet. Each router connects two or more networks together
by providing an interface for an Ethernet network and ring network to which it is connected.
It serves two primary functions: managing traffic between these networks by
forwarding data packets to their intended IP addresses, and allowing multiple devices to use
the same Internet connection.

Figure.5.3.Routers
The router examines each packet of information to detection weather the packet must be
translated form on one network to another network performing a function similar to a bridge.
Unlike a ridge, a router can connect network that use different technologies, addressing
methods, media type, frame format and speeds. A router is a special purpose device
designed to interconnect networks. Such that three networks can be connected using two
routers. Routers maintain routing tables in their memories to store information about the
physical connection on the network; the router examines each packet of data, checks the
routing table and then forwards the packet if necessary. Every other router in the path
(between any state destinations) performs a similar procedure. Note that a router does not
maintain any state information about the packets; it simply moves them along the network.
Routers are operated at layer 3(network) of OSI model.

Two types of routers


 Static routers – Static routers are configured manually and route data packets based
on the information in a router table.
 Dynamic routers – Dynamic routers use adaptive routing which is a process where a
router can forward data by a different route.

GATEWAYS
A gateway is a network node that forms a passage between two networks operating with
different transmission protocols. The most common type of gateways, the network gateway
operates at layer 3, i.e. network layer of the OSI (open systems interconnection) model.
However, depending upon the functionality, a gateway can operate at any of the seven layers
of OSI model. It acts as the entry – exit point for a network since all traffic that flows across
the networks should pass through the gateway. Only the internal traffic between the nodes of a
LAN does not pass through the gateway.
A gateway is node in a network that serves as an entrance to another network. In enterprises,
the gateway node often acts as a proxy server and a firewall. The gateway is also associated
with both a switch, which provides the actual path for the packet in and out of the gateway. It
is also known as a computer system located on earth that switches data signals and voice
signals between satellites and terrestrial networks. A gateway can operate at any layer of the
OSI or TCP/IP reference model. The hub of a gateway, also called a protocol converter, is
much more complex than that of a router or switch. Typically, a gateway must convert from
one protocol stack to another. E.g. a gateway may connect a TCP/IP network to an IPX. /SPX
network. A Circuit Level Gateway function provided by Application level gateway products
enables trusted users on private network to access Internet services with all security of a proxy
server. An Application Level Gateway provide much stricter form of security that packet
filters, but they are designed to regulateaccess only for a particular application.
Figure 5.4 Gateway between a LAN and internet
Features of Gateway

 Gateway is located at the boundary of a network and manages all data that inflows or
outflows from that network.
 It forms a passage between two different networks operating with different transmission
protocols.
 A gateway operates as a protocol converter, providing compatibility between the different
protocols used in the two different networks.
 The feature that differentiates a gateway from other network devices is that it can operate
at any layer of the OSI model.
 It also stores information about the routing paths of the communicating networks.
 When used in enterprise scenario, a gateway node may be supplemented as proxy server
or firewall.
 A gateway is generally implemented as a node with multiple NICs (network interface
cards) connected to different networks. However, it can also be configured using software.
 It uses packet switching technique to transmit data across the networks.
HUBS
A network hub is a node that broadcasts data to every computer or Ethernet-based device
connected to it. A hub is less sophisticated than a switch, the latter of which can isolate
data transmissions to specific devices.
A hub is a physical layer networking device which is used to connect multiple devices in a
network. They are generally used to connect computers in a LAN.
A hub has many ports in it. A computer which intends to be connected to the network is plugged
in to one of these ports. When a data frame arrives at a port, it is broadcast to every other port,
without considering whether it is destined for a particular destination or not.

Figure 5.5: HUB

Hubs are also called concentrators; expand one Ethernet connection into many.
For example, a four-port hub connects up to four machines via UTP cables. The
hub provides a star connection for the four ports. Many hubs contain a single BNC
connector as well to connect the hub to existing 10base2 network wiring, the hub
can also be connected via one of its ports. One pot is desired to operate in either
straight through or crossover mode, selected by a switch on the hub. Hubs that can
connect in this fashion are called stackable hubs. A hub is similar to a repeater,
expect it broadcasts data received by any port to all other ports on the hub. Most
hubs contain a small amount of intelligence as well. Examining received packets
and checking them for integrity. If a bad packet arrives or the hub determines that
a port is unreliable. It will shut down the line under the error condition is appears.
The hub also acts like a repeater. Because of its slight delay when processing a
packet, the numbers of hubs that may be connected in a series are limited.
Figure.5.6 Hubs
There are three types of HUB passive hub, active hub and intelligent hub.

The Passive hubs do not process data signals with only purpose to combine the signal from
several networks cables segments. All devices attached to the passive hub receive another
packets that pass through the hub. Hub does not clear up or amplify the signals, on the
contrary absorbs a small part of the signals that is why the distance between a hub and a
computer should not be more than half of the permissible distance between two computers.
Passive hubs have limited functionality so are inexpensive and easy to configure. It has four
ports with four BNC (British Naval Connectors) female connectors to configure networks
station or terminated with a 93 Ω BNC Terminator. The active hubs incorporate electronic
components that amplify and cleanup the signals, that flaw between devices on the network.
The process of cleaning up signal is called “signal regeneration”. The benefits of signals
regeneration are:
 A network is more robust i.e. less sensitive errors.
 Distance between devices can be increased.
Active hubs cost is considerable more than passive hub (active hub function impart as
multi-port repeaters). Intelligent hubs are enhanced active hubs the following functions add
intelligence to a hub. Intelligent Hubs are units have form of integrated management
capability.
Hub Management
A hub supports networks network management protocols that enable the hub to send
packets to central network console. Theses protocols enable network console to manage or
control hub.
Switching hubs
Switching hubs include circuitry that quickly routes signals between ports on the hub.
Insured of repeating a packet to all ports on the hub, it repeats a packet only to the port that
connects to the destination computer for the packet.
SWITCHES
A switch is a data link layer networking device which connects devices in a network and uses
packet switching to send and receive data over the network.
Like a hub, a switch also has many ports, to which computers are plugged in. However, when a
data frame arrives at any port of a network switch, it examines the destination address and
sends the frame to the corresponding device(s). Thus, it supports both unicast and multicast
communications.
Figure 5.7 Switch

It is similar to a bridge, with some important enhancement. First, as witch may have multiple
ports, thus directing packets to several different segments further partitioning and isolating
network traffic in as way similar to router. For example, if 8-port n way switch is there it can
route packetsfrom any input to any output.

Figure.5.8 Switches

Some or all of incoming packet is called store and forward, which stores the received packet
before examining it to for error before retransmitting. Bad packets are not forwarded. A
switch typically has auto-sensing 10/100 mbps ports and will just the speed of each port
accordingly; furthermore, a managed switch supports SNMP for further control over
network traffic. Switches operated at layer 2 (Data Link) of OSI model.
Differences between Hub and Switch
Hub Switch

They operate in the physical layer of the OSI They operate in the data link layer of the
model. OSI model.

It is a non-intelligent network device that sends It is an intelligent network device that sends
message to all ports. message to selected destination ports.

It primarily broadcasts messages. It is supports unicast, multicast and


broadcast.

Transmission mode is half duplex. Transmission mode is full duplex.

Collisions may occurs during setup of transmission Collisions do not occur since the
when more than one computers place data communication is full duplex.
simultaneously in the corresponding ports.

They are passive devices, they don’t have any They are active devices, equipped with
software associated with it. network software.

They generally have fewer ports of 4/12. The number of ports is higher – 24/48.
LAB Review Questions
Question 1
Define Switches

Solution

Question 2
Define Hubs and its purpose?
Solution
Question 3
Define Router and its purpose?

Solution

Question No 4
Define network element
Solution

LAB Evaluation

Student Name: Instructor Name Syed M Hamedoon


Registration No: Assessment CLO3, P2
Date: Total Marks

Note: Lab rubrics page is attached at the end of the lab


Experiment No. 3
To Study the basic function of Modem

A modem is a hardware networking device that helps to convert signals from one computer
network to another. It is used to connect the computer to the internet where it converts data
signal in to digital and analog forms. Modem establishes a dedicated link or connection to your
Internet Service Provider (ISP) to give access to the internet. It works as signal translator because
it translates one signal to another signal so the computers and telephone line can interact with
each other.
Modems are used to transmit digital information via analog systems. The word "modem" is
derived from the term "modulator-demodulator." The essential functions of a modem are to
modulate an analog carrier signal to carry digital information; and to demodulate a similar signal
so as to decodethe digital information from the analog carrier signal.

Figure.3.1.Modem

Figure.3.2 Block diagram of modem


How does modem work?
If we want to access the internet in our home or business, we should have a modem. The main reason we
have to use a modem is because there are two types of signals that are used when we connect our computer
to the internet. Our computer can only understand digital signals, while the phone lines which help to
connect the internet are works on analog signals. A computer cannot communicate directly with your ISP
phone lines, both the computer and the internet are works on different signal types that’s why we use a
modem, which is used as a signal translator between your computer and the internet.

A computer or a machine can only understand digital signals (1’s and 0’s), but the telephone lines can only
transmit data in analog form, so to convert the signals from digital to analog and analog to digital, we used
a device called modem which comes from the term modulator and demodulator. So a modem can modulate
the signals and also demodulate the signals.

Modulated Signals
Modulated signal means to convert computer’s digital data signals into analog data signals so the data can
travel on the internet. The essential function of a modem is to create an easily transmitted and decoded
signal that allows digital data to be sent from place to place without the loss of information. The most
familiar use of modems is to send information over a telephone channel

Demodulated Signals
Demodulated signal means to convert analog data signals from the internet into digital data signals so a
computer can understand it.

Data Compression
To reduce the amount of time it takes to send data and to cut down on the amount of error in the signal,
modems need to employ data compression. This was especially necessary in the early days of modem
technology, since data had to be sent via conventional phone lines. Not being designed for digital
information, phone lines placed heavy limitations on the size and speed of signals sent over them.Data
compression techniques reduce the size of the signal needed to send the required data.
Error Correction
When information is transmitted between modems, it can sometimes be damaged meaning that parts of the
data are altered or lost. To get around this, modems use error correction. Information is grouped into
batches, called frames. Each frame is tagged with a checksum, a small piece of data derived from the
information in the frame. A checksum can be thought of as a kind of fingerprint, unique to the data in a
particular frame. The modem that receives the information derives its own checksum from the frame it has
been sent, then compares its checksum data with the checksum sent by the transmitting modem. If the
checksums match, the information is undamaged. If they don't match, the data has been corrupted in
transmission; the receiving modem sends it back and waits for the transmitting modem to re-send that
frame.
Flow Control
Individual modems send information at different speeds. It's necessary for faster modems to slow down so
that slower modems can catch up, otherwise the slower modem will receive more data than it can process.
If this starts to happen, the slower modem transmits a character to the faster one. This character is a signal
for the fast modem to pause in sending information until the slow modem gets caught up. When the slow
modem is ready for more data, it sends a different character that signals to the fast modem that it can start
transmitting again. In this way, the two modems canmatch their speeds.
Modem Speed Classification
The speed of a modem is typically classified by the amount of data it can send in a specific length of time.
This is generally expressed in terms of bits per second (bps). An alternative way of classifying modem
speed is the change in the state of the signal per unit time -- the number of times a modem sends a new
signal in a given length of time. This is known as the symbol rate and is measured in units called baud (Bd).

Types of Modems

 Dial up Modem
 Internal Modem
 External Modem
 Cable Modem
 ADSL Modem
Dial up Modem
Dial-up modems are the old technology-based modems, used with the telephone lines to connect
with the internet by using the dial-up connections.
 Dial-up modems are the old technology-based modems, used with the telephone lines to connect
with the internet by using the dial-up connections.
 To use the dial-up modems, we had to dial the telephone number to connect with the internet.
 To establish a dial-up connection, we need an active phone line that is not in use and we dial up the
phone number (like we calling someone) to the receiver’s phone that’s attached to another
computer.
 When the connection is made, our computer can check emails, share files, etc.
 The speed of the dial-up modems can only reach up to 56kbps due to technical limitations.
DSL Modem
 DSL means Digital Subscriber Line also called DSL broadband.
 DSL modems are also used with the local telephone lines like dial-up, but they are totally different
from the dial-up connections.
 DSC uses separate frequencies for phones and the internet, so we can use both the phone and the
internet at the same time.
 It helps to connect a single computer or with the help of a DSL router, can connect multiple
computers through multiple Ethernet ports.

External Modems
 As the name suggests, these types of modems are used externally, connected outside the computer
using a cable.
 External modems are easy to use, but they are a little bit expensive.
 It provides a high-speed data transmission rate and helps to avoid interruption in network
connectivity.

Internal Modems

 Those types of modems are installed on the computer’s motherboard.

 Data transmission rates are slow.

 They are not portable, and cannot move or replace easily from one computer to another and they are
used for dedicated computers.
Broadband: Cable and ADSL Modems
Cable modems use the same radio frequency range as cable television. Cable modems have the advantage
of using the existing cable television infrastructure, allowing cable TV companies to provide Internet
services. Asymmetric Digital Subscriber Line (ADSL) modems use telephone lines to send and receive
data but make use of a different frequency band than modems using the voice band range of frequencies.
ADSL modems are much faster than conventional voice band modems. ADSL and cable modems are used
to provide broadband Internet, which allows more data to be transmitted and thus makes using the Internet
faster.

Figure.3.3 ADSL Modems


LAB Review Questions

QUESTION 1
Define Modem?

QUESTION 2
Purpose of Modem

QUESTION 3
Define ADSL Modems?
QUESTION 4
Difference b/w Internal and External Modems?

LAB Evaluation

Student Name: Instructor Name Syed M Hamedoon


Registration No: Assessment CLO3, P2
Date: Total Marks

Note: Lab rubrics page is attached at the end of the lab


Experiment No 4

To study network topologies and IP addressing

Topology is used to explain how a network is physically connected and the logical flow of
information in the network. A topology mainly describes how devices are connected and interact
with each other using communication links. The Internet continues to grow at a phenomenal
rate. This is reflected in the tremendous popularity of the World Wide Web (WWW), the
opportunities that businesses see in reaching customers from virtual storefronts, and the
emergence of new ways of doing business. It is clear that expanding business and public
awareness will continue to increase demand for access to resources on the Internet
Theory:
In computer networks, there are mainly two types of topologies, they are

Physical Topology
A physical topology describes the way in which the computers or nodes are connected with each
other in a computer network. It is the arrangement of various elements (link, nodes, etc.), including
the device location and code installation of a computer network. In other words, we can say that it
is the physical layout of nodes, workstations, and cables in the network.

Logical Topology
A logical topology describes the way, data flow from one computer to another. It is bound to a
network protocol and defines how data is moved throughout the network and which path it takes.
In other words, it is the way in which the devices communicate internally.

The six Physical topologies are as follows:


 Bus Topology
 Ring Topology
 Star Topology
 Tree Topology
 Hybrid Topology
Bus Topology
Bus topology uses a single cable which connects all the included nodes. The main cable acts as a
spine for the entire network. One of the computers in the network acts as the computer server.
When it has two endpoints, it is known as a linear bus topology.

Figure 4.1 Bus Topology


Advantages
Cost of the cable is very less as compared to other topology, so it is widely used to buildsmall
networks.
 Famous for LAN network because they are inexpensive and easy to install.
 It is widely used when a network installation is small, simple, or temporary.
 It is one of the passive topologies. So computers on the bus only listen for data being
sent,that are not responsible for moving the data from one computer to others.
Disadvantages
 In case if the common cable fails, then the entire system will crash down.
 When network traffic is heavy, it develops collisions in the network.
 Whenever network traffic is heavy, or nodes are too many, the performance time of
thenetwork significantly decreases.
 Cables are always of a limited length

Ring Topology
In a ring network, every device has exactly two neighboring devices for communication purpose. It
is called a ring topology as its formation is like a ring. In this topology, every computer is
connected to another computer. Here, the last node is combined with a first one. This topology uses
token to pass the information from one computer to another. In this topology, all the messages
travel through a ring in the same direction.

Figure 4.2 Ring Topology


Advantages
 Easy to install and reconfigure.
 Adding or deleting a device in-ring topology needs you to move only two connections.
 Failure of one computer can disturb the whole network.
 Offers equal access to all the computers of the networks
 Faster error checking and acknowledgment.
Disadvantages:
 Unidirectional traffic.
 Break in a single ring can risk the breaking of the entire network
 Modern days high-speed LANs made this topology less popular.
 In the ring, topology signals are circulating at all times, which develops unwanted power
consumption.
 Adding or removing the computers can disturb the network activity.

Star Topology
In the star topology, all the computers connect with the help of a hub. This cable is called a central
node, and all other nodes are connected using this central node. It is most popular on LAN
networks as they are inexpensive and easy to install.

Figure 4.3 Star Topology

Advantages:
 Easy to troubleshoot, set up, and modify.
 Only those nodes are affected, that has failed. Other nodes still work.
 Fast performance with few nodes and very low network traffic.
 In Star topology, addition, deletion, and moving of the devices are easy.

Disadvantages:
 If the hub or concentrator fails, attached nodes are disabled.
 Cost of installation of star topology is costly.
 Heavy network traffic can sometimes slow the bus considerably.
 Performance depends on the hub's capacity
 A damaged cable or lack of proper termination may bring the network down.

Tree Topology
Tree topologies have a root node, and all other nodes are connected which form a hierarchy. So it
is also known as hierarchical topology. This topology integrates various star topologies together
in a single bus, so it is known as a Star Bus topology. Tree topology is a very common network
which is similar to a bus and star topology.
Advantages
 Failure of one node never affects the rest of the network.
 Node expansion is fast and easy.
 Detection of error is an easy process
 It is easy to manage and maintain
Disadvantages
 It is heavily cabled topology
 If more nodes are added, then its maintenance is difficult
 If the hub or concentrator fails, attached nodes are also disabled.

Figure 4.4 Tree Topology


Mesh Topology
Mesh topology is a computer network topology in which nodes are interconnected with each
other. In other words, direct communication takes place between the nodes in the network.

Figure.4.5.Mesh Topology

Advantages:
 The network can be expanded without disrupting current users.
 Need extra capable compared with other LAN topologies.
 Complicated implementation.
 No traffic problem as nodes has dedicated links.
 It has multiple links, so if any single route is blocked, then other routes
should be used for data communication.

Disadvantages:
 Installation is complex because every node is connected to every node.
 Dedicated links help you to eliminate the traffic problem.
 A mesh topology is robust.
 Every system has its privacy and security
 It is expensive due to the use of more cables. No proper utilization of systems.


Hybrid Topology
Hybrid topology combines two or more topologies. You can see in the above architecture in
such a manner that the resulting network does not exhibit one of the standard topologies. For
example, as you can see in the above image that in an office in one department, Star and P2P
topology is used. A hybrid topology is always produced when two different basic network
topologies are connected.
IP Addressing
 IP Address is short for Internet Protocol Address.
 It is a unique address assigned to each computing device in an IP network.
 ISP assigns IP Address to all the devices present on its network.
 Computing devices use IP Address to identify and communicate with other devices in the IP
network.

Types of IP Address-
IP Addresses may be of the following two types-

1. Static IP Address
Static IP Address is an IP Address that once assigned to a network element always remains the
same.
 They are configured manually.
 Some ISPs do not provide static IP addresses.
 Static IP Addresses are more costly than dynamic IP Addresses

2. Dynamic IP Address-
Dynamic IP Address is a temporarily assigned IP Address to a network element.
 It can be assigned to a different device if it is not in use.
 DHCP or PPPoE assigns dynamic IP addresses.

IP Address Format
IP Address is a 32 bit binary address written as 4 numbers separated by dots.
 The 4 numbers are called as octets where each octet has 8 bits.
 The octets are divided into 2 components- Net ID and Host ID.
1. Network ID represents the IP Address of the network and is used to identify the network.
2. Host ID represents the IP Address of the host and is used to identify the host within the
network.

IP Address Example

Example of an IP Address is-


00000001.10100000.00001010.11110000
(Binary Representation)
OR
1.160.10.240
(Decimal Representation)

Class A
If the 32 bit binary address starts with a bit 0, then IP Address belongs to class A. In
class A IP Address,
 The first 8 bits are used for the Network ID.
 The remaining 24 bits are used for the Host ID.

Total Number Of IP Addresses-


Total number of IP Addresses available in class A
= Numbers possible due to remaining available 31 bits = 231
Total Number Of Networks-
Total number of networks available in class A
= Numbers possible due to remaining available 7 bits in the Net ID – 2
= 27 – 2 = 126

Total Number Of Hosts-


Total number of hosts that can be configured in class A
= Numbers possible due to available 24 bits in the Host ID – 2 = 224 – 2
Range Of 1st Octet- We have-
 Minimum value of 1st octet = 00000000 = 0
 Maximum value of 1st octet = 01111111 = 127

From here,
 Range of 1st octet = [0, 127]
 But 2 networks are reserved and unused.
 So, Range of 1st octet = [1, 126]
Use- Class A is used by organizations requiring very large size networks like NASA,
Pentagon etc.

Class B- If the 32 bit binary address starts with bits 10, then IP Address belongs to class B.
In class B IP Address,
 The first 16 bits are used for the Network ID.
 The remaining 16 bits are used for the Host ID.

Total Number Of IP Addresses-


Total number of IP Addresses available in class B
= Numbers possible due to remaining available 30 bits = 230
Total Number Of Networks-
Total number of networks available in class B
= Numbers possible due to remaining available 14 bits in the Net ID = 214
Total Number Of Hosts-
Total number of hosts that can be configured in class B
= Numbers possible due to available 16 bits in the Host ID – 2 = 216 – 2
Range Of 1st Octet- We have-
 Minimum value of 1st octet = 10000000 = 128
 Maximum value of 1st octet = 10111111 = 191

So, Range of 1st octet = [128, 191]


Use- Class B is used by organizations requiring medium size networks

Class C- If the 32 bit binary address starts with bits 110, then IP Address belongs to
class C. In class C IP Address,
 The first 24 bits are used for the Network ID.
 The remaining 8 bits are used for the Host ID.
Total Number of IP Addresses-
Total number of IP Addresses available in class C
= Numbers possible due to remaining available 29 bits= 229
Total Number of Networks-
Total number of networks available in class C
= Numbers possible due to remaining available 21 bits in the Net ID = 221
Total Number of Hosts-
Total number of hosts that can be configured in class C
= Numbers possible due to available 8 bits in the Host ID – 2 = 28 – 2
Range of 1st Octet-We have-
 Minimum value of 1st octet = 11000000 = 192
 Maximum value of 1st octet = 110111111 = 223

So, Range of 1st octet = [192, 223]


Use-
Class C is used by organizations requiring small to medium size networks.
 For example- engineering colleges, small universities, small offices etc.

Class D- If the 32 bit binary address starts with bits 1110, then IP Address belongs to
class D.
 Class D is not divided into Network ID and Host ID.

Total Number Of IP Addresses-


Total number of IP Addresses available in class D
= Numbers possible due to remaining available 28 bits = 228

Range Of 1st Octet We have-


 Minimum value of 1st octet = 11100000 = 224
 Maximum value of 1st octet = 11101111 = 239

So, Range of 1st octet = [224, 239]

Use-
 Class D is reserved for multicasting.
 In multicasting, there is no need to extract host address from the IP Address.
 This is because data is not destined for a particular host.

Class E- If the 32 bit binary address starts with bits 1111, then IP Address belongs to class E
Class E is not divided into Network ID and Host ID.

Total Number Of IP Addresses-


Total number of IP Addresses available in class E
= Numbers possible due to remaining available 28 bits = 228

Range Of 1st Octet-We have-


 Minimum value of 1st octet = 11110000 = 240
 Maximum value of 1st octet = 11111111 = 255

So, Range of 1st octet = [240, 255]


Use- Class E is reserved for future or experimental purposes

Classes of IP Address- All the classes of IP Address are summarized in the following
table-
CIDR Block
When a user asks for specific number of IP Addresses,
 CIDR dynamically assigns a block of IP Addresses based on certain rules.
 This block contains the required number of IP Addresses as demanded by the user.
 This block of IP Addresses is called as a CIDR block.

CIDR Notation
CIDR IP Addresses look like- a.b.c.d / n
They end with a slash followed by a number called as IP network prefix.
 IP network prefix tells the number of bits used for the identification of network.
 Remaining bits are used for the identification of hosts in the network.

Subnetting in Networking-
In networking,
 The process of dividing a single network into multiple sub networks is called as subnetting.
 The sub networks so created are called as subnets.

Example-Following diagram shows the subnetting of a big single network into 4 smaller subnets-
Advantages- The two main advantages of subnetting a network are-
 It improves the security.
 The maintenance and administration of subnets is easy.

Subnet ID-Each subnet has its unique network address known as its Subnet ID.
 The subnet ID is created by borrowing some bits from the Host ID part of the IP Address.
 The number of bits borrowed depends on the number of subnets created.

Example
192.168.5.85 /24 Address.
Let’s determine the network and host part of this address.

IP Address : 192.168.5.85
Subnet Mask : 255.255.255.0

For this example, firstly we will convert this decimal numbers to the binary equals.
As you can see below, the 1s in the Subnet Mask will show the number of bits that
network part has. And the 0s will show the host part bits.
So, here, the first 24 bits (First 3 octets) are network bits and the last 8 bits (Last
octet) are the host bits.

For this IP and Subnet Mask, to determine the Network Address of this IP address,
we will use “AND” operation between IP Address and Subnet Mask in binary mode.

IP Add: 11000000. 10101000.00000101.01010101


SubM : 11111111. 11111111. 11111111.00000000
AND : 11000000. 10101000.00000101.00000000

Example
Consider-
 We have a big single network having IP Address 200.1.2.0.
 We want to do subnetting and divide this network into 2 subnets.
Clearly, the given network belongs to class C.

For creating two subnets and to represent their subnet IDs, we require 1 bit.
So,
 We borrow one bit from the Host ID part.
 After borrowing one bit, Host ID part remains with only 7 bits.

 If borrowed bit = 0, then it represents the first subnet.


 If borrowed bit = 1, then it represents the second subnet.
IP Address of the two subnets are-
 200.1.2.00000000 = 200.1.2.0
 200.1.2.10000000 = 200.1.2.128
For 1st Subnet-

 IP Address of the subnet = 200.1.2.0


 Total number of IP Addresses = 27 = 128
 Total number of hosts that can be configured = 128 – 2 = 126
 Range of IP Addresses = [200.1.2.00000000, 200.1.2.01111111] = [200.1.2.0, 200.1.2.127]
 Direct Broadcast Address = 200.1.2.01111111 = 200.1.2.127
 Limited Broadcast Address = 255.255.255.255

For 2nd Subnet-

 IP Address of the subnet = 200.1.2.128


 Total number of IP Addresses = 27 = 128
 Total number of hosts that can be configured = 128 – 2 = 126
 Range of IP Addresses = [200.1.2.10000000, 200.1.2.11111111] = [200.1.2.128, 200.1.2.255]
 Direct Broadcast Address = 200.1.2.11111111 = 200.1.2.255
 Limited Broadcast Address = 255.255.255.255
LAB Review Questions
Question No. 1 (CLO3,P2)
Define Network Topology

Question No. 2 (CLO3,P2)


Identify the drawbacks of the mesh topology

Question No.3 (CLO3,P2)


What is IP version 4 address?
Question No. 4 (CLO3, P2)
Why we use subnetting?

Question No. 5 (CLO4,P4)


Consider we design a network which consist of 4 sub networks with given IP address 200.1.2.0
Find the following
 Find the number of subnets and mention subnet IDs
 Total number of IP Addresses
 Total number of hosts that can be configured
 Range of IP Addresses
 Broadcast Address

LAB Evaluation

Student Name: Instructor Name Syed M Hamedoon


Registration No: Assessment CLO3, P2 / CLO4, P4
Date: Total Marks

 Note: Lab rubrics page is attached at the end of the lab


Experiment No 5
Introduction to CISCO packet tracer
Introduction
It is a tool built by Cisco. This tool provides a network simulation to practice simple and
complex networks. The main purpose of Cisco Packet Tracer is to help students learn the
principles of networking with hands-on experience as well as develop Cisco technology specific
skills. Since the protocols are implemented in software only method, this tool cannot replace the
hardware Routers or Switches. Interestingly, this tool does not only include Cisco products but
also many more networking devices.
LAB Objectives
 Understand the CISCO packet tracer

Apparatus
 Computer System

Required Software

 CISCO Packet Tracer

Lab Outcomes
By the end of this experiment, student will have basic understanding of CISCO packet tracer
software
Theory
CISCO system Inc. is an American Multinational Technology Conglomerate. It’s headquarter is in
San Jose, California, United States. Its CEO is Chuck Robbins. It is powerful network simulation
program that allows students to experiment with network behavior
Step 1
Open CISCO packet Tracer
Packet Tracer Workspace
Cisco Packet Tracer has two workspaces; one physical and another logical. The logical
workspace allows users to build virtual networks by providing virtual switches, hubs, PCs,
Routers and connecting devices as cables, connecting wires. Users can make virtual network
topologies by placing, connecting the virtual network devices. The physical workspace shows
the graphical representation of the logical network.

Packet Tracer Modes


Cisco Packet Tracer provides users with two operation modes to get the essences of
the networks by visualizing the behavior networks. One is Real Time Mode and
another is Simulation Mode. In Real Time Mode the networking devices act as real
devices in which you can get to know, how they will work in the real world, whereas
in simulation mode you can actually see the inner workings of the network by
sending virtual data packets and can see the propagation, and transfer of that data
packets across the network.

Details:
The components of the Packet Tracer interface are as follows:
 Area 1: Menu bar 
This is a common menu found in all software applications; it is used to open, save,
print, change preferences, and so on.
 Area 2: Main Toolbar 
This bar provides shortcut icons to menu options that are commonly accessed, such
as open, save, zoom, undo, and redo, and on the right-hand side is an icon for entering
networkinformation for the current network.
 Area 3: Logical/ Physical workspace tabs 
These tabs allow you to toggle between the Logical and Physical work areas.
 Area 4: Workspace 
This is the area where topologies are created and simulations are displayed.
 Area 5: Common tools bar 
This toolbar provides controls for manipulating topologies, such as select, move
layout, place note, delete, inspect, resize the shape, and add simple/complex PDU.
 Area 6: Real-time/Simulation tabs 
These tabs are used to toggle between the real and simulation modes. Buttons are
also provided to control the time, and to capture the packets.
 Area 7: Network component box 
This component contains all of the network and end devices available with Packet
Tracer, and is further divided into two areas:
 Area 7a: Device-type selection box
 Area 7b: Device- specific selection box
When a device category is selected, this selection box displays the different
device modelswithin that category.
 Area 8: User-created packet box –
Users can create highly-customized packets to test their topology from this area,
and the results are displayed as a list.

Selection of End Devices


Selection of Nework devices

Selection of Wires

Example
Connect two computers and deliver message in between them

Step 1
Select End Devices PC0 and PC1

Step 2
Select automatic cable connection type
Step
Add IP address to the PC0 and PC1 by using IP configuration
No of computers IP Address Subnet Mask
PC0 192.168.2.1 255.255.255.0
PC1 192.168.2.2 255.255.255.0

Double click on the PC


Similarly, we assign IP address to the 2nd computer PC1
Add simple message from source computer PC0 to destination computer PC1

Run Simulation
LAB Review Questions

Question No 1
Why we use CISCO packet Tracer?

Question No 2
What is network device?

Question No. 3
What is the purpose of Real-time/Simulation tabs?

Question No. 4
Connect more than 2 computers with a wire in CISCO packet tracer and observe the transmission
of messages in between them.

LAB Evaluation
Student Name: Instructor Name Syed M Hamedoon
Registration No: Assessment CLO3, P2 / CLO4, P4
Date: Total Marks

 Note: Lab rubrics page is attached at the end of the lab


Experiment No 6
To connect computers using switch
Introduction
A switch is a data link layer networking device which connects devices in a network and uses
packet switching to send and receive data over the network. Like a hub, a switch also has many
ports, to which computers are plugged in. However, when a data frame arrives at any port of a
network switch, it examines the destination address and sends the frame to the corresponding
device(s). Thus, it supports both unicast and multicast communications. Packet Tracer is a
cross-platform visual simulation tool designed by Cisco Systems that allows users to create
network topologies and imitate modern computer networks. The software allows users to
simulate the configuration of Cisco routers and switches using a simulated command line
interface
LAB Objectives
 Understand CISCO packet tracer
 Understand the working of switch

Apparatus
 Computer System

Required Software

 CISCO Packet Tracer

Lab Outcomes
By the end of this experiment, student will have basic understanding of computer communication
itself and with switch

LAB Scenario 1
To connect two computers and perform communication in between
Step 1
Open CISCO packet tracer
Step 2
Sketch diagram
Figure 6.1 sketch of connected 2 computers
Step 3
Assign IP Address to each computer
Computer 1:
IP address: 192.168.10.1
Subnet mask:255.255.255.0

Figure 6.2 Assign IP address of computer 1

Computer 2 :
IP address: 192.168.10.2
Subnet mask:255.255.255.0
Figure 6.3 Assign IP address of computer 2

Step4:
Perform Simulation

Figure 6.4 simulation 1


Figure 6.5 simulation window 2

Step 5:
Check the status of transmission

Figure 6.6 simulation window 3

Step 5:
Check the status of transmission of two computers by using ping command. If you want to check
the status of computer 2 from computer wheather the transmission is successful or not. You must
need to ping the IP address of computer 2 in command terminal
At Computer 1:
Command window: ping 192.168.10.2
If you received acknowledge from computer 2. That means the computer 2 is ready for
communication with computer 1
Figure 6.7 Command Window

LAB Scenario 2
Two connect 3 computers with switch
Step 1
Open CISCO packet tracer
Step 2
Sketch diagram

Figure 6.8. Sketch diagram


Step 3 Assign IP addresses of computers
No of computers IP address Subnet mask

Computer 1 192.168.10.1 255.255.255.0

Computer 2 192.168.10.2 255.255.255.0

Computer 3 192.168.10.3 255.255.255.0


Figure 6.9 Assign IP address

Step 4
Perform simulation

Figure 6.10 Simulation Window 1


Figure 6.11 Simulation Window 2

Transmission Status

Figure 6.12 Simulation Window 3

Step 5:
Check the status of transmission of two computers by using ping command. If you want to check
the status of computer 2 from computer wheather the transmission is successful or not. You must
need to ping the IP address of computer 2 in command terminal
At Computer 1:
Command window: ping 192.168.10.2
If you received acknowledge from computer 2. That means the computer 2 is ready for
communication with computer 1.
Similarly you can check the ping command on computer 2 and computer 3
Figure 6.14 Command Window
LAB Review Questions
Question No. 1
Create a LAB scenario in CISCO packet tracer which includes 4 computers that are connected
together. The message transmission is performed from computer 1 to computer 2 and computer 2
to computer 3, computer 3 to computer 4.Perform all steps to justify your answer.
Question No. 2
Create a LAB scenario in CISCO packet tracer which includes 6 computers that are connected
with switch.
1) The message transmission is performed from computer 1 to computer 2,3,4,5,6.
2) The message transmission only perform from computer 1,3,5

Perform all steps to justify your answer.


Question No. 3
Create a LAB scenario in CISCO packet tracer which includes 4 computers that are connected
together. Assign different Class IP address to each computer. The computers are connected are
like this sequence PC1PC3, PC2PC4.
1) Is it possible perform communication of different class IP within the same network?
2) Note the error

Perform all steps to justify your answer.

LAB Evaluation

Student Name: Instructor Name Syed M Hamedoon


Registration No: Assessment CLO4, P4
Date: Total Marks

 Note: Lab rubrics page must be attached at the end of the lab
Experiment No 7
To connect computers using HUB
Introduction
A hub is a physical layer networking device which is used to connect multiple devices in a
network. They are generally used to connect computers in a LAN. A hub has many ports in it. A
computer which intends to be connected to the network is plugged in to one of these ports. When
a data frame arrives at a port, it is broadcast to every other port, without considering whether it is
destined for a particular destination or not.

LAB Objectives
 To understand the working of HUB in CISCO packet tracer

Apparatus
 Computer System

Required Software

 CISCO Packet Tracer

Lab Outcomes
By the end of this experiment, student will have basic understanding of hub in computer
communication
Theory
HUB is operate at physical layer of the OSI model. It has multiple ports. When a packet arrives at
one port it is copied to other ports so that all the segments of the LAN can see all packets. Since
computer and hub are different devices so we need Ethernet straight through cable. When a
computer send a packet to one port of the hub the same message is copied to all the other ports of
a hub.
Figure 7.1 HUB working

LAB Scenario 1
To connect multiple computers and perform communication in between using HUB
Step 1
Open CISCO packet tracer
Step 2
Sketch diagram

Figure 7.2 sketch of connected 2 computers


Step 3
Count the number of ports in the HUB

Figure 7.3 Hub physical configuration

Step 4
Select the straight through cable and select Fast Ethernet
Figure 7.4 selection of cable

Figure 7.5 selection of hub port


Step 5
Make a complete connection
Figure 7.6 complete network scenario

Step 6
Check the status of hub

Figure 7.7 Physical view of HUB


When hub turns ON the color of button is in green color.

Step 7
Assign IP Address to each computers
No of computers IP address Subnet mask

Computer 1 10.10.10.1 255.0.0.0

Computer 2 10.10.10.2 255.0.0.0

Computer 3 10.10.10.3 255.0.0.0

Computer 4 10.10.10.4 255.0.0.0


Computer 5 10.10.10.5 255.0.0.0
Computer 6 10.10.10.6 255.0.0.0

Step 8:
Check the status of IP of each computer type ipconfig in command window for selected computer

Figure 7.8 Desktop configuration of command window

Step 9
Perform simulation by selecting the message signal then click on the source computer and then
click on the destination computer.
Transmit the packet from source computer 1 to destination computer 6. You can see in this figure
the hub broadcast the message to all computers 1 to 6. But the computers 2 to 5 denied the
message only computer 6 accept the message and send the acknowledgment to the hub
Figure 7.9 Simulation window 1

Figure 7.10 Simulation Window 2


Transmission Window

Figure 7.11 Message transmission window


LAB Review Questions
Question No. 1 (CLO4, P4)
Create a network of 10 computers connected with a HUB. Observe the message delivery between
computers. Assume the message is transmitted from the computer 1 to computer 3 and computer 3
to computer 7.
Question No. 2 (CLO3, P2)
What is hub? Explain its working in your own words

Question No 3 (CLO3,P2)
Write down the difference between hub and switch

Question No 4 (CLO4,P4)
Create a network, to connect 8 computers with the hub and verify the message delivery between
them.
Question No 5 (CLO4,P4)
Perform the network scenario 1 from lab and observe the result
LAB Evaluation

Student Name: Instructor Name Syed M Hamedoon


Registration No: Assessment CLO3,P2 / CLO4, P4
Date: Total Marks

 Note: Lab rubrics page must be attached at the end of the lab
Experiment No 8
To connect computers using Router
Introduction
A router is a physical or virtual appliance that passes information between two or more packet-
switched computer networks. A router inspects a given data packet's destination Internet Protocol
address (IP address), calculates the best way for it to reach its destination and then forwards it
accordingly.
LAB Objectives
 To understand the working of router in CISCO packet tracer

Apparatus
 Computer System
 Router
 Cable

Required Software
 CISCO Packet Tracer

Lab Outcomes
By the end of this experiment, student will have basic understanding of router working in
computer communication
Theory
Routers are networking devices operating at layer 3 or a network layer of the OSI model. They are
responsible for receiving, analyzing, and forwarding data packets among the connected computer
networks. When a data packet arrives, the router inspects the destination address, consults its
routing tables to decide the optimal route and then transfers the packet along this route.

Figure 8.1 Router working


Features of Routers

 A router is a layer 3 or network layer device.


 It connects different networks together and sends data packets from one network to another.
 A router can be used both in LANs (Local Area Networks) and WANs (Wide Area
Networks).
 It transfers data in the form of IP packets. In order to transmit data, it uses IP address
mentioned in the destination field of the IP packet.
 Routers have a routing table in it that is refreshed periodically according to the changes in the
network. In order to transmit data packets, it consults the table and uses a routing protocol.
 In order to prepare or refresh the routing table, routers share information among each other.
 Routers provide protection against broadcast storms.
 Routers are more expensive than other networking devices like hubs, bridges and switches.
 Routers are manufactured by some popular companies like Cisco, D-Link, HP, 3Com, Juniper
and Nortel

Routing Table

The functioning of a router depends largely upon the routing table stored in it. The routing table
stores the available routes for all destinations. The router consults the routing table to determine
the optimal route through which the data packets can be sent.

A routing table typically contains the following entities

 IP addresses and subnet mask of the nodes in the network


 IP addresses of the routers in the network
 Interface information among the network devices and channels

Types of Routing Table


Routing tables are of two types
 Static Routing Table − Here, the routes are fed manually and are not refreshed
automatically. It is suitable for small networks containing 2-3 routers.
 Dynamic Routing Table − Here, the router communicates with other routers using routing
protocols to determine the available routes. It is suited for larger networks having large
number of routers.

Types of Routers

A variety of routers are available depending upon their usages. The main types of routers are
following

 Wireless Router − They provide WiFi connection WiFi devices like laptops, smartphones
etc. They can also provide standard Ethernet routing. For indoor connections, the range is
150 feet while its 300 feet for outdoor connections.
 Broadband Routers − They are used to connect to the Internet through telephone and to
use voice over Internet Protocol (VoIP) technology for providing high-speed Internet
access. They are configured and provided by the Internet Service Provider (ISP).
 Core Routers − They can route data packets within a given network, but cannot route the
packets between the networks. They helps to link all devices within a network thus forming
the backbone of network. It is used by ISP and communication interfaces.
 Edge Routers − They are low-capacity routers placed at the periphery of the networks.
They connect the internal network to the external networks, and are suitable for transferring
data packets across networks. They use Border Gateway Protocol (BGP) for connectivity.
There are two types of edge routers, subscriber edge routers and label edge routers.
 Brouters − Brouters are specialised routers that can provide the functionalities of bridges
as well. Like a bridge, brouters help to transfer data between networks. And like a router,
they route the data within the devices of a network.

LAB Observation
LAB Exercise No. 1
Network Scenario 1
To connect 3 computers with a router
Step 1
Sketch a network
Figure 8.2 Network Sketch
Step 2
Use a copper straight through cable for connection PC to router

Figure 8.3 Connection with router interface port

Figure 8.4 Connection of all computers with router


Step 3
Assign IP address to each PC by using IP configuration
No of computers IP address Subnet mask
PC0 192.168.1.1 255.255.255.0
PC1 192.168.2.1 255.255.255.0
PC2 192.168.3.1 255.255.255.0
Figure 8.5 Assign IP address to each computer

Step 4
Make router configuration. Click the router and then click the config, click each gigabitethernet
and assign IP address with subnet

Figure 8.6 Physical Interface view of router

Assign IP address in router


No of computers IP address Subnet mask
Gigiabitethernet 0 192.168.1.10 255.255.255.0
Gigiabitethernet 1 192.168.2.10 255.255.255.0
Gigiabitethernet 2 192.168.3.10 255.255.255.0
Figure 8.7 Activate router interface 1st port

Figure 8.8 Activate router interface 2nd port


Figure 8.9 Activate router interface 3rd port
Step 5
To perform simulation and verify the delivery of message between computer to router

Figure 8.10: Message Transmission Simulation Window


You can see the transmission is successful between the computer and the router
Figure 8.11 Network 1 Scenario Message delivery simulation
LAB Exercise No. 2
Network Scenario 2
Try to connect each computer to computer in above network lab scenario 1
Step 1
Add a default gateway and assign IP address to default gateway for each computer
No of computers Default Gateway Subnet mask
PC0 192.168.1.10 255.255.255.0
PC1 192.168.2.10 255.255.255.0
PC2 192.168.3.10 255.255.255.0

Figure 8.12 Assign IP address to PC0


Step 2
Click the router then click the RIP and add each IP address of computers

Figure 8.14 RIP table of router

Assign IP Address to the computers


No of computers IP address
PC0 192.168.1.10
PC1 192.168.2.10
PC2 192.168.3.10

Step 3
Simulation
Check the message from source PC0 to destination PC1 and PC1 to PC2 then check PC2 to PC1

Figure 8.15 Message delivery


Transmission status

Figure 8.16 Simulation Window


LAB Review Questions
Question No. 1 (CLO4, P4)
Perform LAB network scenario 1 and 2 and evaluated by the teacher
Question No. 2 CLO4, P4)
Create a network consist of 4 computers with a router using lab scenario 1 and observe the
transmission delivery between computers and router.
Question No. 3 (CLO4, P4)
Create a network consist of 4 computers with a router using lab scenario 2 and observe the
transmission delivery in between computers.
Question No. 4 CLO3, P2)
Define router and explain its working

LAB Evaluation

Student Name: Instructor Name Syed M Hamedoon


Registration No: Assessment CLO3,P2 / CLO4, P4
Date: Total Marks

 Note: Lab rubrics page must be attached at the end of the lab
Experiment No 9
Static IP configuration with routers and switches
Introduction
An IP address refers to a unique number allocated to devices connected over a network. It is used
by network devices to communicate with each other. There are four types of IP addresses: private,
public, dynamic, and static. A static IP address is a permanent non-changeable IP address.
LAB Objectives
 To understand the working of static IP configuration connected with router and
switches

Apparatus
 Computer System
 Router
 Switch
 Cable

Required Software
 CISCO Packet Tracer

Lab Outcomes
By the end of this experiment, student will have basic understanding of static IP configuration and
connection of computers with router and switches
Theory
A static IP address can be described as a non-changing network address. Just as a house number in
an XYZ format is constant, a static IP address is a permanent address that informs servers or
computers of the location of a specific device connected to the Internet. A static IP address is
beneficial for organizations with internet-related needs, including FTP servers, hosting a webcam,
videoconferencing applications, or email.
Most devices have a dynamic IP address that is regularly changed or updated. The internet service
provider assigns the dynamic IP addresses to the network's router and is changed almost every
time the device is disconnected and reconnected to the Internet. Unlike dynamic IP addresses,
static IP addresses do not change. They are fixed IP addresses assigned to the route. Unless the
network architecture is changed or the device is withdrawn, the device's IP address remains the
same. Most devices with static IP addresses are servers or essential business equipment that allow
easy communication.
A static IP address can be either IPv6 or IPv4. It is manually assigned to the device and cannot be
easily updated. A complete machine reset will be required to modify the static IP address. This
can be troublesome if the device requires multiple IP addresses at different locations, for example,
a mobile phone. Therefore, static IP addresses are mostly used for servers and must be avoided
when using regular computers.
Figure 9.1 Router interfacing

LAB Observation and Result


Network Scenario 1
Create a network which consist of router, switches and computer and connected as shown in
Figure 9.1.1

Figure 9.1.1 Network Scenario 1


Step 1: Selection of network components
Figure 9.2 Network components
Step 2
Select straight through cable to connect switch with computers

Figure 9.3 Computer interface selection


Step 3
Connect the wire from computer and connected to the port of switch
Figure 9.4 Selection of Switch Port
Step 4
Create two separate local area networks

Figure 9.5 create local area network (LAN)


Step 4
Assign IP address to each PC by using IP configuration for LAN 1
No of computers IP address Subnet mask
PC0 10.0.0.1 255.0.0.0
PC1 10.0.0.2 255.0.0.0
PC2 10.0.0.3 255.0.0.0
Figure 9.6 Assign IP address to PC0
Step 5
Assign IP address to each PC by using IP configuration for LAN 2
No of computers IP address Subnet mask
PC4 192.168.1.3 255.255.255.0
PC5 192.168.1.4 255.255.255.0
PC6 192.168.1.5 255.255.255.0

Figure 9.7 Assign IP address to PC3


Step 6
Verify the computers within the network by using ping command
Figure 9.8 Open command window for network verification
Step 7
Label the network

Figure 9.9 network labeling


Step 8
Select the router and connect with switch
Figure 9.10 Router Port selection

Step 9
To make the complete network design

Figure 9.11 Network Scenario 1


Step 10
Add the IP address for each router interface
Figure 9.12 Router configuration

Figure 9.13 Router configuration


Step 11
Verify the computers are on the network
Assume at the PC 1 to check the communication with PC3 by using ping command. You can
observe no response comes from the PC3 it means we missed some configuration
Figure 9.14 Open command window for network verification
So we solved this problem by assigning IP address to the default gateway of each PC

Figure 9.15 Add default gateway

Figure 9.16 Add default gateway


Now the problem is solved acknowledgement is received at PC 1 from PC3
Click on PC1 and open command window type the ping command of PC3
Figure 9.17 Network verification command window
Step 10
We need to add IP addresses of the two LAN in RIP table of the router
RIP table
GigabitEthernet 0/0 10.0.0.0
GigabitEthernet 0/1 192.168.0.0

Figure 9.18 add IP in RIP


Step 11
Simulation
Suppose we want to transmit the message from source computer PC0 to destination computer
PC3. Then run simulation. You can observe the packet is successfully transmit the message from
source computer PC0 to destination computer PC3
Figure 9.20 Network simulation 1

Figure 9.21 Network Simulation 2

LAB Network Scenario 2


Create a network as shown in figure 9.22

Figure 9.22 Network scenario 2


Step 2
Assign IP address to all the computers PC0, PC1, PC2 and PC3
Step 3
Assign IP address static router configuration as shown in figure
Figure 9.23 Static router configuration 1

Figure 9.23 Static router configuration 2

Step 4
Assign IP address of the network address of LAN 1 and LAN 2 in RIP table for both routers

Step 5
Simulation
Figure 9.24 Simulation Window 1

Figure 9.25 Simulation Window 2


LAB Review Questions
Question No. 1 (CLO4, P4)
Create network scenario 1 as mention in lab. Verify the results with your instructor
Question No. 2 (CLO4, P4)
Create a network scenario in which you need to create 2 LAN each LAN must consist of 6
computers which are connected with switch via single router. Verify the result by transmitting
messages in between the computers.
Question No. 3 (CLO4, P4)
Create a network scenario as shown below for static router configuration which includes 3 routers
and 3 switches connected with PCs.
Question No. 4 (CLO3, P2)

Describe the difference between router and switches

LAB Evaluation

Student Name: Instructor Name Syed M Hamedoon


Registration No: Assessment CLO3,P2 / CLO4, P4
Date: Total Marks

 Note: Lab rubrics page must be attached at the end of the lab
Experiment No 10
Serial Port Router configuration
Introduction
A serial port can be used for administrative terminal access or as a communication channel,
depending on the capabilities and configuration of the router. A router is a physical or virtual
appliance that passes information between two or more packet-switched computer networks. A
router inspects a given data packet's destination Internet Protocol address (IP address), calculates
the best way for it to reach its destination and then forwards it accordingly.
LAB Objectives
 To understand the working of router configuration using CISCO packet tracer

Apparatus
 Computer System
 Router
 Cable

Required Software
 CISCO Packet Tracer

Lab Outcomes
By the end of this experiment, student will have basic understanding of serial port of router
interfacing with computer
Network Scenario 1
Step 1
Create a network. Connect the computers with switch and router by using straight through cables.

Figure 10.1 Network Scenario 1


Step 2
We observe there are only two ports available for a single router as shown in figure. We need at
least 3 ports to connect with three routers. So this problem can be solved by click on physical and
then click WIC-2T
Figure 10.2 router port interfacing
Figure 10.3 Connect the serial port link between the routers

Figure 10.4 Serial port router configuration network


Step 3
Assign IP address to the router
Figure 10.5 Router Interfacing

Step 4
Assign IP address to each computer

Figure 10.6 Assign IP address to PC0


Figure 10.7 Assign IP address to PC1

PC No/ Router IP address Subnet Mask


LAN 1
PC0 192.168.1.2 255.255.255.0
PC1 192.168.1.3 255.255.255.0
Router 0 192.168.1.1 255.255.255.0
LAN 2
PC3 192.168.2.2 255.255.255.0
PC4 192.168.2.3 255.255.255.0
Router 1 192.168.2.1 255.255.255.0
LAN 3
PC5 192.168.3.2 255.255.255.0
PC6 192.168.3.3 255.255.255.0
Router 2 192.168.3.1 255.255.255.0

Step 5
Sketch a network
Figure 10.8 Network Scenario 1

Step 6
Assign IP address to each serial port
Router No. IP address (serial port)
Router 0 10.0.0.1
Router 1 10.0.0.2
11.0.0.1
Router 2 11.0.0.2

Figure 10.9 Router Serial Port Interfacing


Step 7
Add the IP address of the network and routers in RIP table during router configuration

Figure 10.10 Add assign IP address in RIP table for router 1

Figure 10.11 Add assign IP address in RIP table for router 2


Figure 10.12 Add assign IP address in RIP table for router 3

Step 8
Perform Simulation

Figure 10.13 Simulation Window 1

Figure 10.14 Simulation window 2


LAB Review Questions

Question No. 1(CLO4, P4)


Consider network scenario from lab and perform simulation using CISCO packet tracer software.
Question No. 2 (CLO4, P4)
Create a network which consists of 4 routers, 4 switches and each switch can accommodate 2
users. Perform serial configuration of the router using CISCO packet tracer

LAB Evaluation

Student Name: Instructor Name Syed M Hamedoon


Registration No: Assessment CLO4, P4
Date: Total Marks

 Note: Lab rubrics page must be attached at the end of the lab
Experiment No 11
To connect computers using Dynamic Host Configuration Protocol (DHCP)
Introduction
A switch is a data link layer networking device which connects devices in a network and uses
packet switching to send and receive data over the network. Like a hub, a switch also has many
ports, to which computers are plugged in. However, when a data frame arrives at any port of a
network switch, it examines the destination address and sends the frame to the corresponding
device(s). Thus, it supports both unicast and multicast communications. Packet Tracer is a
cross-platform visual simulation tool designed by Cisco Systems that allows users to create
network topologies and imitate modern computer networks. The software allows users to
simulate the configuration of Cisco routers and switches using a simulated command line
interface
LAB Objectives
 Understand CISCO packet tracer
 Understand the working of router

Apparatus
 Computer System
 Router
 Cable

Required Software

 CISCO Packet Tracer

Lab Outcomes
By the end of this experiment, student will have basic understanding of computer communication
itself and with switch
Theory
Network Scenario 1
Step 2
Assign IP to server 192.168.1.0

Step 3
Click on services of server and turn On the server and then add default gateway address and add
IP in DNS server
Step 4
Then click on PC and then go to IP configuration settings click on DHCP they get the addresses
automatically
Step 5
Run on simulation
LAB Network Scenario 2
Step 1:
Create a network

Step 2:
Select the straight through cable and connected all the devices
Step 3
Set the configuration of router and assign IP address

Step 4
Set the configuration of server
Step 5
Go to click on PCs and check to verify to assign the IP automatically or not using DHCP.

Step 6
Run simulation
Transmission is successful
LAB Review Questions
Question No.1 (CLO4, P4, PLO5)
Create a network 1 and 2 from lab and observe the result by using CISCO packet tracer
Question No. 2 (CLO4, P4, PLO5)
Create a network which consist of 1 server and 1 router, 1 switch which must be connected with 4
computers and verify the result using CISCO packet tracer

Question No. 3 (CLO3, P2, PLO4)


What is the role of DHCP?

Question No. 4
Identify the difference between static IP and dynamic IP

LAB Evaluation

Student Name: Instructor Name Syed M Hamedoon


Registration No: Assessment CLO3,P2 / CLO4, P4
Date: Total Marks

 Note: Lab rubrics page must be attached at the end of the lab
Experiment No 12
To connect computers with routers using DHCP
Introduction
DHCP (Dynamic Host Configuration Protocol) configuration is performed on routers to assign an
IP address, subnet mask, gateway address ad DNS server address to the host systems. With this
configuration, the dynamic IP address is assigned, which enables the administrator to easily
connect a new host in the configured network.
LAB Objectives
 To understand the working of DHCP in router

Apparatus
 Computer System
 Router
 Cable

Required Software

 CISCO Packet Tracer

Lab Outcomes
By the end of this experiment, student will have basic understanding of DHCP configuration of
router
LAB Task
Network Scenario 1
Step 1
A network topology is created in the Cisco Packet Tracer, which includes a router, a switch, and
three host systems connected to a network.

Figure 12.1 network scenario 1


Step 2
Command Line Interface of the router is accessed and high-lighted commands are executed to
successfully configure the DHCP. At first, the ‘IP DHCP pool pool_name’ command is
executed. After this, the network address is defined along with its subnet mask. And further, the
‘default-router IP-address’ command is used to define the default route address.

Figure 12.2 creation of DHCP pool

Step 3
In this step, a range of IP addresses is excluded from the addresses defined in the subnet mask of
the DHCP pool. Excluded IP addresses will be not assigned to any host system in the network.
Figure 12.3 command used to exclude IP range
Step 4
The interface of the router connected with the switch is assigned with the IP address defined as
the default router during the DHCP configuration. This route will be taken by the data packets to
reach their destination system. Also, the ‘no shutdown command is used to change the state of
the connected interface to up.

Figure 12.4 Assigning of IP address to router’s interface


Step 5
A successful connection is established between all the devices connected in a network. In
further steps, host systems in the network are assigned with dynamic IP and default gateway
address by the DHCP service configured on the router.

Figure 12.5 All the devices are successfully connected


Step 6
Desktop settings of a host system are accessed and the DHCP option is selected. DHCP request
forwarded by the system is acknowledged and IP address, associated subnet mask, and default
gateway address are assigned to it.

Figure 12.6 The dynamic IP address assigned to the Host System


Another host system deployed in the network is assigned with required logical addresses
through the DHCP server configured on Cisco Router. In addition, IP addresses defined in the
excluded range are not assigned to the computer systems.

Figure 12.7: logical address is assigned to the host system


Step 7
To check the connectivity between the host systems, the ‘ping’ command is used to exchange
data packets. All the data packets are successfully transferred, which ensures that a
communication channel is established.
Figure 12.8: connectivity testing

Network Scenario 2
Step 1:
Create a network topology

Step 2
Router configuration
This step is used to enable system by assigning IP addressing
Commands used for router configuration
Router>en
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int fa0/0
Router(config-if)#ip address 192.168.0.1 255.255.255.0
Router(config-if)#no shutdown
For saving router configuration give command

Step 3
Enable DHCP mode of the router

Step 4
Router configuration:
Now we configure the 2nd interface of the router Ethernet 0/1

Step 5
Now enable DHCP for the 2nd interface of router
You can see the 2nd interface of the router are link up which green color shows the link is
successfully up
Step 6
Assign IP address to the systems using DHCP
In last step we click on PC and assign IP address dynamically then click on PC and go to IP
configuration mode then click on DHCP. The automatically assign IP address to all the systems if
the DHCP is successfully enabled
Step 7
Add the network address in router RIP table
Run Simulation
LAB Review Questions
Question 1 (CLO4, P4)
Create a network scenario 1 from this lab and observe the result also attached the network diagram
with simulation
Question 2 (CLO4, P4)
Create a network scenario 2 from this lab and observe the result also attached the network diagram
with simulation
Question 3 (CLO3, P2)
What is role of DHCP in router and why we used this?

LAB Evaluation

Student Name: Instructor Name Syed M Hamedoon


Registration No: Assessment CLO3,P2 / CLO4, P4
Date: Total Marks

 Note: Lab rubrics page must be attached at the end of the lab
Experiment No 13
To study the network commands in communication networks
This lab explains the basic networking commands and their arguments, options, and parameters.
Learn the essential networking commands that are used to troubleshoot computer networks.
LAB Objectives
 To understand the networks commands

Apparatus
 Computer System
Lab Outcomes
By the end of this experiment, student will have basic understanding of computer communication
network commands
1. Tracert

This command is used to diagnose path-related problems. On an IP network, routers exchange IP


packets between the source and the destination. They take IP packets from the source host and
forward them in a sequence until they reach the destination host. The sequence of routers between
the source and destination is known as the path. A path consists of all routers in a sequence that IP
packets sent from the source host traverse to reach the destination host.

The tracert command prints the path. If all routers on the path are functional, this command prints
the full path. If a router is down on the path, this command prints the path up to the last
operational router.

The tracert command uses the following syntax.

tracert Destination Name or IP address

The following command traces the path to the host named www.google.co.in.
tracert www.google.co.in

The following image shows the output of this command.


2. Ping

The ping command is used to test connectivity between two hosts. It sends ICMP echo request
messages to the destination. The destination host replies with ICMP reply messages. If the ping
command gets a reply from the destination host, it displays the reply along with round-trip times.

The ping command uses the following syntax.

ping destination host IP or name

The following command tests connectivity between the host computer and Google's server.
ping google.com

The following image shows the output of this command.


If you specify the hostname as an argument, the ping command uses the configured DNS client
service to automatically translate the hostname into the IP address.

3. Ipconfig

This command displays all current TCP/IP network configuration values and refreshes Dynamic
Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. This command
is mainly used to view the IP addresses on the computers that are configured to obtain their IP
address automatically.

The following image shows the sample output of this command.

Ip config has a number of switches the most common are:

ipconfig /all – displays more information about the network setup on your systems including the
MAC address.
ipconfig /release – release the current IP address

ipconfig /renew – renew IP address

ipconfig /? -shows help

ipconfig/flushdns – flush the dns cache

4. Hostname Command

A very simple command that displays the host name of your machine. This is much quicker than
going to the control panel>system route.

5. Arp

To send IP packets, a computer needs two addresses. These addresses are the MAC address and
the IP address. A MAC address is the physical or hardware address of the NIC. An IP address is
the logical or software address of NIC. If a computer knows the IP address of the destination
computer but it does not know the MAC address of the destination computer, it uses the ARP
protocol to know the MAC address of the destination computer.

The ARP protocol broadcasts a given IP address over a local network. The corresponding host
responds to the broadcast with its MAC address. To avoid repetition, ARP stores the answer in a
table known as ARP table. ARP maintains a separate ARP table for each NIC.

To view the ARP table, you can use the following command.

arp
By default, this command displays the ARP table of the active NIC. If multiple NICs are installed
on the computer, you can use the -a option with this command. If the -a option is used, the ARP
command displays all ARP tables.

The following image shows the output of the arp command when used with the -a option.

To display the ARP cache entry for a specific IP address, specify the IP address with the -
N option. For example, the following command displays the ARP cache table for the interface that
is assigned the IP address 192.168.42.171.

Arp -a -N 192.168.42.171
The following image shows the output of the above command.

6. Netstat
This command displays active connections, ports on which the computer is listening, Ethernet
statistics, the IP routing table, and IP statistics.

The output of this command is organized in rows and columns. Each row represents a new
connection or an entry in the output. It contains four columns. These columns provide the
following information about the row.

Proto: - This column displays the name of the protocol (TCP or UDP).

Local Address: - This column displays the IP address of the local computer and the port number
being used. If the port is not yet established, the port number is shown as an asterisk (*).

Foreign Address: - This column displays the IP address and port number of the remote computer
to which the port is connected.

State: - This column displays the status of the connection.

The following image shows the sample output of this command.


7. getmac Command

Another very simple command that shows the MAC address of your network interfaces

8. NSLOOKUP
Used for: Troubleshooting network connection issues
Command to enter: nslookup
NSLookup is useful for diagnosing DNS name resolution problems. By typing nslookup into the
command prompt, you will be presented with the name and IP address of your device’s DNS
server. For you at home, this will more than likely be your router, but in enterprise environments,
this will probably be a dedicated DNS server. NSLookup can be used to find the IP address of a
device, find the domain name of an IP address and find mail servers for a domain.

9. SYSTEMINFO
Used for: Displaying system information
Command to enter: systeminfo
If you need to know anything about the device you are using, be it details of the processor used,
the version of Windows you are operating on, or what the boot device is configured as, you can
find it all through the Windows GUI. But why would you want to spend time doing that when you
can run this simple command to see it all in one place? This command will poll your device and
display the most important information in a clean, easy to read format.
LAB Review Questions

Question 1 (CLO3,P2)

Run all the network commands as mention in lab and observe their working

Question 2 (CLO3,P2)

Why we used networks commands? List some benefits

LAB Evaluation

Student Name: Instructor Name Syed M Hamedoon


Registration No: Assessment CLO3,P2
Date: Total Marks

 Note: Lab rubrics page must be attached at the end of the lab
Experiment No 14
Wireless network configuration
Introduction
A switch is a data link layer networking device which connects devices in a network and uses
packet switching to send and receive data over the network. Like a hub, a switch also has many
ports, to which computers are plugged in. However, when a data frame arrives at any port of a
network switch, it examines the destination address and sends the frame to the corresponding
device(s). Thus, it supports both unicast and multicast communications. Packet Tracer is a
cross-platform visual simulation tool designed by Cisco Systems that allows users to create
network topologies and imitate modern computer networks. The software allows users to
simulate the configuration of Cisco routers and switches using a simulated command line
interface
LAB Objectives
 Understand CISCO packet tracer
 Understand the working of router

Apparatus
 Computer System
 Router
 Cable

Required Software

 CISCO Packet Tracer

Lab Outcomes
By the end of this experiment, student will have basic understanding of computer communication
itself and with switch
Theory
Create a network scenario
Double click the wireless router

Click on GUI tab


Then click on save settings
Then click on wireless

Then type the network name in (SSID)


Then enabled wireless security
Then click save settings
Step
Make IP configuration of the PCs
No of computers IP Default gateway
PC2 192.168.0.2 192.168.0.1
PC1 192.168.0.3 192.168.0.1
PC0 192.168.0.4 192.168.0.1
Select the wireless port for PC. Click on PC

Go to the physical
Then delete the port interface
Then select the wireless interface in PC WMP300N
Then turn On the button
Then go to Desktop and select PC Wireless
Then you can see the window is open which shows that there is no connection of PC with wireless
router
Then click on tab connect
Then click on connect and enter the wireless key
Link Status
Same procedure is apply for the other PC’s

Final Network scenario

Run simulation
Go to promt command for each pc and ping the IP address of the connected PC
Network Scenario 2

Router configuration
Assign IP address 192.168.2.1
Assign IP address 192.168.2.7 to the PC0 by using IP configuration settings

Connect the PC1 to the wireless router so we need to add wireless interface in the PC
Then assign the IP address 192.168.2.8 to the PC1 by using IP configuration command

Then assign the IP address 192.168.2.9 to the Labptop by using IP configuration settings
Then go the access point configuration

Click the pc and select PC wireless settings


Add the wireless interface inside the LAPTOP
Then click on the tablet and assign IP address and set the wireless interface settings
Final Network Scenario
Simulation
LAB Review Questions
Question No. 1 (CLO4, P4)
Create network scenario 1 as mention in lab. Verify the results with your instructor and attached
the result.

LAB Evaluation

Student Name: Instructor Name Syed M Hamedoon


Registration No: Assessment CLO4, P4
Date: Total Marks

 Note: Lab rubrics page must be attached at the end of the lab
Experiment No 15
To implement virtual local area network (VLAN)
A virtual local area network (VLAN) is a virtualized connection that connects multiple devices
and network nodes from different LANs into one logical network. Virtual local area networks
have become crucial for organizations with complex networking systems. Organizations require
solutions that allow them to scale their networks, segment them to increase security measures, and
decrease network latency. While LAN is used to connect a group of devices such as computers
and printers to a server via cables, VLANs allow multiple LANs and associated devices to
communicate via wireless internet.
LAB Objectives
 To understand the virtual local area network by considering network scenario
Apparatus
 Computer System
Required Software
 CISCO packet tracer
Lab Outcomes
By the end of this experiment, student will have basic understanding of virtual local area network
of computer communication
Theory
VLAN is a custom network which is created from one or more local area networks. It enables a
group of devices available in multiple networks to be combined into one logical network. The
result becomes a virtual LAN that is administered like a physical LAN. The full form of VLAN is
defined as Virtual Local Area Network. While VLANs are a type of subnet, they have their own
unique capabilities and characteristics that differentiate them from subnets. However, the OSI
model plays a major role in both.

The below topology as shown in figure 15.1 depicts a network having all hosts inside the same
virtual LAN:
Figure 15.1 VLAN

How VLAN works

 VLANs in networking are identified by a number.


 A Valid range is 1-4094. On a VLAN switch, you assign ports with the proper VLAN
number.
 The switch then allows data which needs to be sent between various ports having the same
VLAN.
 Since almost all networks are larger than a single switch, there should be a way to send
traffic between two switches.
 One simple and easy way to do this is to assign a port on each network switch with a
VLAN and run a cable between them.
LAB Task

Network Scenario 1

Consider we have 2 departments (HR, service). In HR department only 1 computer is connected


and in service department 3 computers are connected as shown in figure 15.2

Figure 15.2 Network scenario 1

Step 1

Open CISCO packet tracer and create a network

Step 2
Connect the computers with the switch
Step 3
Label the network
Step 4
Switch configuration
Click on switch and open CLI mode
After typing exit we return in config mode of switch

After typing again exit we return in privelidge mode

Then go to the config mode of switch and create VLAN 20 for service department
You can observe inside the table no ports is assigned to the VLAN

Step 5
Port configuration inside switch. First we configure the port of PC0 with switch interface fa0/1 then we
assigned the vlan 10 to port
In the next step we need to assigned the ports to the interface of the switch with connected computers
From fa0/20-24

In the next step, we show the vlan by typing command show vlan in back to previlegede window
You can observe from the figure, the ports are assigned to the VLAN successfully
Step 6
Assign IP addresses to the computers
Open the command window of PC3 and type the command ipconfig then ping the IP of the PC2 computer
You can observe the response of PC2 comes at PC3
When we ping the IP of the VLAN 10 of HR department you can observe no response is coming

Step 7
Run the status of switch. Double click on switch then open CLI command then type sh run
Step 8
Run the simulation.
If we want to transmit the message from PC0 to PC1. We know PC0 and PC1 both are connected in
different VLAN and using virtual local area network configuration we are able to restrict the PC0 to send
data to the PC1 of the other network.
If we want to transmit the message from PC1 to PC3 within the same network the data should be send. You
can observe in the figure the transmission is successful between PC1 to PC3.
LAB Review Questions
Question No. 1 (CLO4, P4)
Create network scenario 1 as mention in lab. Verify the results with your instructor and attached
the result.
Question No. 2 (CLO4, P4)
Create a network scenario in which you 3 department exist (Technology, HR, Café) on the same
network. Using VLAN our goal is to secure the network and create sub networks independent. In
technology department we have 3 computers are connected to the switch. In HR department we
have 2 computers are connected to the switch. In café, we have 5 computers are connected to the
switch.
Question No.3 (CLO3, P2)
Identify the benefits of VLAN and why we used VLAN ?

LAB Evaluation

Student Name: Instructor Name Syed M Hamedoon


Registration No: Assessment CLO3,P2 / CLO4, P4
Date: Total Marks

 Note: Lab rubrics page must be attached at the end of the lab

You might also like