0% found this document useful (0 votes)
8 views

scribdpdf5

The document is a practical lab file for a Computer Networks course, detailing various experiments related to network cables, devices, and topologies. It includes objectives, apparatus, and descriptions for each experiment, covering topics such as coaxial, twisted-pair, and fiber optic cables, as well as network topologies like star, bus, and mesh. The file is intended for B.Tech students in their 5th semester at CGC College of Engineering.

Uploaded by

vineetsoni9999
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

scribdpdf5

The document is a practical lab file for a Computer Networks course, detailing various experiments related to network cables, devices, and topologies. It includes objectives, apparatus, and descriptions for each experiment, covering topics such as coaxial, twisted-pair, and fiber optic cables, as well as network topologies like star, bus, and mesh. The file is intended for B.Tech students in their 5th semester at CGC College of Engineering.

Uploaded by

vineetsoni9999
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 59

CEC/CSE CN LABFILE

DepartmentofComputerScience&Engineering

PracticalFile

SUBJECT:COMPUTER NETWORKS LAB

[BTCS507-18]

B.Tech

5thSemester[Batch2022-

CGC College of
EngineeringLandran,Mo
hali-140307

SubmittedTo: SubmittedBy:
Mr.UpinderPal HarshJindal
Rollno:1914282
0|Page
2236914
CEC/CSE CN LABFILE

Group–5‘B’

1|Page
2236914
CEC/CSE CN LABFILE

Index

S.No. PracticalName Pg.No.

1 TostudythedifferenttypesofNetworkcablesandnetworktopo 3
logies.

2 Practically implement and test the cross-wired cableand 11


straightthroughcable usingclamping toolandnetworklabcable
tester.

3 Studyandfamiliarizationwithvariousnetworkdevices. 21

4 FamiliarizationwithPacketTracerSimulationtool/anyotherrel 25
atedtool.

5 StudyandImplementationofIPAddressingSchemes. 29

6 CreationofSimple Networking topologies using hubsandswitches. 32

7 SimulationofwebtrafficinPacketTracer. 36

8 Study and implementation of various 38


routerconfigurationcommands.

9 CreationofNetworksusingrouters. 40

10 Configuringnetworks usingthe conceptofsubnetting. 45

11 Practical implementation of basic network commandand 51


Networkconfiguration commands like ping, ipconfig, netstat,
tracert etc. fortroubleshooting networkrelated problems.

12 Configurationofnetworks using staticand defaultroutes. 53

0|Page
2236914
CEC/CSE CN LABFILE

EXPERIMENT-1

OBJECTIVE:
TostudythedifferenttypesofNetworkcablesandnetworktopologies.

NETWORKCABLETYPESANDSPECIFICATIONS:
Toconnecttwoormorecomputersornetworkingdevicesinanetwork,networkcablesareused.Thereareth
reetypes ofnetworkcables; coaxial, twisted-pair,and fiber-optic.

Coaxialcable
Thiscablecontainsaconductor,insulator,braiding,andsheath.Thesheathcoversthebraiding,thebrai
ding covers theinsulation, and theinsulation covers theconductor.

Thefollowing imageshows thesecomponents.

Sheath
Thisistheouterlayerofthecoaxialcable. Itprotectsthecable fromphysicaldamage.

Braidedshield
Thisshieldprotectssignalsfromexternalinterferenceandnoise.Thisshieldisbuiltfromthesamemetal
that is used to build thecore.

Insulation
Insulation protectsthe core.It also keeps the core separate from the braided shield. Since boththe
core and the braided shield use the same metal, without this layer, they will touch each
otherandcreate ashort-circuit in thewire.

Conductor
Theconductorcarrieselectromagneticsignals.Basedontheconductoracoaxialcablecanbe
1|Page
2236914
CEC/CSE CN LABFILE

categorizedintotwotypes;single-corecoaxialcableandmulti-corecoaxialcable. Asingle-core
coaxial cable uses a single central metal (usually copper) conductor, while a multi-core
coaxialcableusesmultiple thinstrandsof metalwires.Thefollowingimageshowsbothtypes ofcable.

Coaxialcablesincomputernetworks
The coaxial cables were not primarily developed for the computer network. These cables
weredeveloped for general purposes. They were in use even before computer networks came
intoexistence. They are still used even though their use in computer networks has been
completelydiscontinued.

At the beginning of computer networking, when there were no dedicated media cables
availablefor computer networks, network administrators began using coaxial cables to build
computernetworks.

Because of its low cost and long durability, coaxial cables were used in computer networking
fornearly two decades (the 80s and 90s). Coaxial cables are no longer used to build any type
ofcomputernetwork.

Specificationsofcoaxialcables
Coaxial cables have been in use for the last four decades. During these years, based on
severalfactors such as the thickness of the sheath, the metal of the conductor, and the material
used ininsulation, hundreds of specifications have been created to specify the characteristics of
coaxialcables.

● CoaxialcableusesRGratingtomeasurethematerialsusedinshieldingandconductingcores.
● RGstandsfortheRadioGuide.Coaxialcablemainlyusesradiofrequenciesintransmission.
● Impedanceis theresistancethat controlsthesignals.It isexpressed inthe ohms.
● AWGstandsforAmericanWireGauge.Itisusedtomeasurethesizeofthecore.Thelarger
theAWGsize, thesmallerthediameterof thecorewire.

Twisted-paircables
The twisted-pair cable was primarily developed for computer networks. This cable is also
knownasEthernetcable.Almostall modern LAN computernetworks usethis cable.

This cable consists of color-coded pairs of insulated copper wires. Every two wires are
twistedaround each other to form pair. Usually, there are four pairs. Each pair has one solid color
andone strippedcolor wire. Solid colors are blue, brown, green, and orange. In striped color,
thesolidcolor is mixed withthe whitecolor.

2|Page
2236914
CEC/CSE CN LABFILE

Basedonhowpairsarestrippedintheplasticsheath,therearetwotypesoftwisted-paircable;UTPand STP.
Inthe UTP(Unshieldedtwisted-pair) cable, allpairsarewrappedinasingleplasticsheath.
IntheSTP(Shieldedtwisted-pair)cable,eachpairiswrappedwithanadditionalmetalshield,thenall pairs
arewrapped in a singleouterplasticsheath.

SimilaritiesanddifferencesbetweenSTPandUTPcables
● BothSTPandUTPcan transmitdataat10Mbps, 100Mbps, 1Gbps,and 10Gbps.
● SincetheSTPcablecontainsmorematerials,itismoreexpensivethantheUTPcable.
● BothcablesusethesameRJ-45(registeredjack) modularconnectors.
● TheSTPprovides more noise andEMIresistance thantheUTPcable.
● Themaximum segmentlength for bothcables is100 meters or328 feet.
● Bothcablescanaccommodateamaximum of1024nodes ineachsegment.

Thefollowing imageshows bothtypes of twisted-pair cables.

Fiberopticcable
This cable consists of a core, cladding, buffer, and jacket. The core is made from thin strands
ofglass or plastic that can carry data over a long distance. The core is wrapped in the cladding;
thecladdingis wrapped in thebuffer, and thebufferis wrapped in thejacket.

● Corecarries thedatasignalsin theform oflight.


● Claddingreflectslightbacktothecore.
● Bufferprotectsthelightfromleaking.
● Thejacketprotectsthecablefromphysicaldamage.

Fiber optic cable is completely immune to EMI and RFI. This cable can transmit data over a
longdistanceatthehighest speed.Itcantransmit data upto 40kilometersatthespeedof100Gbps.

Fiber optic uses light to send data. It reflects light from one endpoint to another. Based on
howmany beams of light are transmitted at a given time, there are two types of fiber optical
cable;SMFand MMF.

3|Page
2236914
CEC/CSE CN LABFILE

SMF(Single-modefiber)opticalcable
This cable carries only a single beam of light. This is more reliable and supports much
higherbandwidth and longer distances than the MMF cable. This cable uses a laser as the light
sourceandtransmits 1300 or 1550 nano-meterwavelengths of light.

MMF(multi-modefiber)opticalcable
This cable carries multiple beams of light. Because of multiple beams, this cable carries
muchmoredatathantheSMFcable.Thiscableisusedforshorterdistances.ThiscableusesanLEDasthe
light sourceand transmits850 or 1300 nano-meter wavelengths oflight.

NETWORKTOPOLOGIES:
A Network Topology is the arrangement with which computer systems or network devices
areconnected to each other. Topologies may define both physical and logical aspects of the
network.Bothlogical andphysical topologiescouldbethe sameordifferentinthe samenetwork.

NetworkDevices

Switch
Aswitchisadeviceinacomputernetworkthatconnectsotherdevicestogether.Multipledatacablesareplug
gedintoaswitchtoenablecommunication betweendifferentnetworkeddevices.

Router
A wireless router connects directly to a modem by a cable. This allows it to receive
informationfrom — and transmit information to — the internet. The router then creates and
communicateswith your home Wi-Fi network using built-in antennas. As a result, all of the
devices on yourhomenetworkhaveinternet access.

4|Page
2236914
CEC/CSE CN LABFILE

Differencebetweenaswitchandarouter?
The most basic explanation is that a switch is designed to connect computers within a
network,whilearouter is designedto connect multiplenetworkstogether.

Hub
Hub is commonly used to connect segments of a LAN (Local Area Network). A hub
containsmultiple ports. When a packet arrives at one port, it is copied to the other ports so that
allsegmentsoftheLANcanseeallpackets.Hubacts as
acommonconnectionpointfordevicesinanetwork.

TopologiesPo

int-to-Point
Point-to-point networks contain exactly two hosts such as computers, switches or routers,
serversconnected back to back using a single piece of cable. Often, the receiving end of one host
isconnectedto the sending end ofthe otherand vice-versa.

If the hosts are connected point-to-point logically, then they may have multiple
intermediatedevices. But theend hosts are unaware of the underlying network and see each other
as if theyareconnected directly.

BusTopology
In the case of Bus topology, all devices share a single communication line or cable. Bus
topologymay have problems while multiple hosts sending data at the same time. Therefore, Bus
topologyeither uses CSMA/CD technology or recognizes one host as Bus Master to solve the
issue. It isone of the simple forms of networking where a failure of a device does not affect the
otherdevices.Butfailureofthesharedcommunicationlinecanmakeallotherdevicesstopfunctioning.

5|Page
2236914
CEC/CSE CN LABFILE

Both ends of the shared channel have a line terminator. The data is sent in only one direction
andassoon as itreaches theextremeend, theterminatorremoves thedatafromthe line.

StarTopology
All hosts in Star topology are connected to a central device, known as hub device, using a point-
to-point connection. That is, thereexists a point to point connection between hosts and hub.
Thehubdevicecan beany ofthe following:
● Layer-1devicesuchashuborrepeater
● Layer-2devicesuchas switchorbridge
● Layer-3devicesuchasrouterorgateway

As in Bus topology, the hub acts as a single point of failure. If the hub fails, connectivity of
allhosts to all other hosts fails. Every communication between hosts takes place through only
thehub. Star topology is not expensive as to connect one more host, only one cable is required
andconfigurationis simple.

RingTopology
In ring topology, each host machine connects to exactly two other machines, creating a
circularnetwork structure. When one host tries to communicate or send a message to a host
which is notadjacent to it, the data travels through all intermediate hosts. To connect one more
host in theexistingstructure, the administrator may need onlyonemoreextracable.

6|Page
2236914
CEC/CSE CN LABFILE

Failure of any host results in failure of the whole ring. Thus, every connection in the ring is
apointof failure.Therearemethods which employonemorebackup ring.

MeshTopology
In this type of topology, a host is connected to one or multiple hosts. This topology has hosts
inpoint-to-point connection with every other host or may also have hosts which are in point-to-
point connection to a fewhostsonly.

Hosts in Mesh topology also work as relay for other hosts which do not have direct point-to-
pointlinks. Mesh technology comes into two types:
● Full Mesh: All hosts have a point-to-point connection to every other host in the
network.Thus for every new host n(n-1)/2 connections are required. It provides the most
reliablenetworkstructureamongall networktopologies.
● Partially Mesh: Not all hosts have point-to-point connection to every other host.
Hostsconnect to each other in some arbitrary fashion. This topology exists where we need
toprovidereliability to some hosts out of all.

TreeTopology
Also known as Hierarchical Topology, this is the most common form of network topology in
usepresently.ThistopologyimitatestheextendedStartopologyandinheritspropertiesof bustopology.

This topology divides the network into multiple levels/layers of the network. Mainly in LANs,
anetwork isbifurcatedintothree typesof networkdevices.The lowermostisanaccess-
layerwherecomputersareattached.Themiddlelayerisknownasthedistributionlayer, whichworks

7|Page
2236914
CEC/CSE CN LABFILE

as a mediator between upper layer and lower layer. The highest layer is known as the core
layer,andis thecentral point ofthe network,i.e. root ofthetreefromwhich allnodes fork.

Allneighbouringhostshaveapoint-to-pointconnectionbetweenthem.Similartothe Bustopology, if
the root goes down, then the entire network suffers even. Though it is not the singlepoint of
failure. Every connection serves as a point of failure, failing of which divides thenetworkinto an
unreachable segment.

8|Page
2236914
CEC/CSE CN LABFILE

EXPERIMENTNO.2

OBJECTIVE:
Practicallyimplementandtestthecross-wiredcableandstraightthroughcableusingclampingtooland
networklab cable tester

APPARATUS(COMPONENTS):
RJ-45connector,ClampingTool,TwistedpairCable

DESCRIPTION:

Whatistransmissionmedia?

Transmission media is a pathway that carries the information from sender to receiver. We
usedifferenttypesofcablesorwavestotransmitdata.Dataistransmittednormallythroughelectricalor
electromagneticsignals.

Anelectricalsignalisintheformofcurrent.Anelectromagneticsignalisseriesofelectromagnetic energy
pulses at various frequencies. These signals can be transmitted throughcopper wires, optical
fibers , atmosphere, water and vacuum Different Medias have differentproperties like bandwidth,
delay, cost and ease of installation and maintenance. Transmissionmediais also called
Communicationchannel.

TypesofTransmissionMedia

1. WiredorGuidedMedia orBoundTransmissionMedia

2. WirelessorUnguidedMediaorUnboundTransmissionMedia

WiredorGuided MediaorBoundTransmissionMedia:Boundtransmission mediathecablesthat


are tangible or have physical existence and are limited by the physical geography. Popularbound
transmission media in use are twisted pair cable, co-axial cable and fiber optical
cable.Eachofthemhasitsowncharacteristicsliketransmissionspeed,effectofnoise,physicalappearanc
e,cost etc.

Wireless or Unguided Media or Unbound Transmission Media:Unbound transmission


mediaare the ways of transmitting data without using any cables. These media are not bounded
byphysical geography. This type of transmission is called Wireless communication.
Nowadayswireless communication is becoming popular. Wireless LANs are being installed in
office andcollege campuses. This transmission uses Microwave, Radio wave, Infrared are some
of popularunboundtransmission media.

9|Page
2236914
CEC/CSE CN LABFILE

Fig2.1.Type ofMedia

GuidedTransmissionMedia

TypesofTwistedPair

Thetwotypesoftwistedpairsare:

1. Unshieldedtwistedpair(UTP)
2. Shieldedtwistedpair(STP)

1.UnshieldedTwistedPair(UTP)

Itconsistsofcolour-codedcopperwires,butdoesnot includeany foilorbraiding asinsulator


toprotectagainst interference.

Wirepairswithineachcablehavevariedamountsoftwistsperfoottoproducecancellation.Therear
edifferentcategories of UTP.

ThefollowingtableshowstheUTPcategories,theno.ofpairsineach,andthegradeofcableeachusesand
how theyareimplemented.

Table2.1CategorytableofUTP

10 | P a g e
2236914
CEC/CSE CN LABFILE

2..ShieldedTwistedPair(STP)

STPismadeup ofpairs ofcopperwiresthat aretwistedtogether.

Thepairsarecoveredinafoilor braidedmesh,aswellasouter PVCjacket.

Thisfoilormeshpreventsthepenetrationofelectromagneticnoiseandeliminatecrosstalk.

Thisshieldingmustbe groundedtopreventthe foil orbraidedmeshfrom


becomingamagnetforelectricity.

Fig2.2 UTPand STP

Advantage ofSTPoverUTP

STPislesssusceptibletonoiseascomparedtoUTPandthereforereducesthecrosstalkandinterference.

DisadvantagesofSTP

11 | P a g e
2236914
CEC/CSE CN LABFILE

1. Itmustbeproperlygrounded.

2. ItismoreexpensivethanUTP.

3. Itisdifficulttoterminate.

AdvantagesofTwistedpaircable

1. Itcan beused tocarry bothanalog and digitaldata.

2. Itistheleastexpensive mediaoftransmissionforshortdistances.

DisadvantagesofTwistedpaircable

1. Itofferspoornoiseimmunity asaresult signaldistortion ismore?

2. Attenuationisveryhigh.

3. Itsupportslowerbandwidthascomparedtoother Medias.
Itsupports10mbpsuptoadistanceof 100 meters on a10BASE-T.

4. Itoffersverypoorsecurity andisrelativelyeasyto tap.

5. Beingthininsize,they arelikelytobreak easily.

CoaxialCable
Coaxialcablehastwowiresofcopper.Thecorewireliesincenterandismadeofsolidconductor.
Coreisenclosedinaninsulatingsheath.Overthesheaththesecondwireiswrapped

aroundandthattoointurnencasedbyinsulatorsheath.Thisalliscoveredbyplasticcover .

Fig2.3Coaxial Cable

Because of its structure coax cables are capable of carrying high frequency signals than that
oftwisted pair cables. The wrapped structure provides it a good shield against noise and cross
talk.Coaxialcables provide high bandwidth rates ofupto 450 mbps.

12 | P a g e
2236914
CEC/CSE CN LABFILE

There are three categories of Coax cables namely, RG-59 (Cable TV), RG-58 (Thin
Ethernet)andRG-11 (Thick Ethernet. RG standsfor Radio Government .

CablesareconnectedusingBNCconnectorandBNC-T.BNCterminatorisusedtoterminate thewireat
thefar ends.

Fiber-OpticsCable

A cablewith centralglass tube coveredwithprotective shieldwhich transmit datausingphotons is


fiber optics cable. These cables transmit data via concentrated bursts of laser beamswhichare
carried through bundles ofhair thinglass fibers.

TheyhaveadvantagesoverelectroniccablestechnologyhasrevolutionizedtelecommunicationFiber
opticscablesasfreefromelectro-magnetictransmissionspeedandvolume.Thisapplications
whichusedelectronic.cables.interference as wellaswiretapping

Fig2.4FibreOpticCables

UnguidedTransmissionMedia:-

Unguided transmission media extend beyond the limiting confines of cabling. They
provideanexcellent Communication Networks alternative for WANS. The lack of physical
restrictionsprovides larger bandwidth as well as wide area capabilities. Unbound media typically
operate atveryhighfrequencies.Thethreetypes of unboundtransmission mediaare:

Radio

wave.Micro

wave.Infrar

ed.

13 | P a g e
2236914
CEC/CSE CN LABFILE

Radiowaves Transmission: Although Radio waves are prevalent and wellunderstood, we are
justbeginning to realize their enormous potential as a networking medium. Radio waves can
operateonasingle ormultiple frequency bands

Fig2.5RadioWaves

Radio waves are omni directional i.e. they travel in all the directions from the source. Because
ofthisproperty,transmitterandreceiverneednottobealigned.Radiowavescanpenetratebuildings
easily, sotheyarewidely useforcommunicationboth indoors outdoors.

At high frequencies, radio waves tends to travel in straight line and bounce off the
obstacles.They are also absorbed by rain. Radio waves is widely used for AM and FM radio,
television,cordlesstelephone,cellular phones, pagingandwireless LAN.

MicrowaveTransmission

Microwaveshavebeen usedin datacommunications for along


time.Theyhaveahigherfrequencythan radiowaves and thereforecan handle larger
amountsof data.

Microwave transmission is line of sight transmission. The transmit station must be in


visiblecontact with the receive station. This sets a limit on the distance between stations
depending onthe local geography. Typically the line of sight due to the Earth's curvature is only
50 km to thehorizon!Repeaterstations must beplaced so thedatasignal can hop, skipand jump
14 | P a g e
2236914
CEC/CSE CN LABFILE

across the

15 | P a g e
2236914
CEC/CSE CN LABFILE

country.microwavecircuitsareconsideredabroadbandcommunicationchannel.Microwaves
operate at high operating frequencies of 3 to 10 GHz. This allows them to carrylargequantities of
data due to their largebandwidth

List theAdvantages ofmicrowaves.

a. Theyrequirenorightof wayacquisitionbetweentowers.

b. Theycancarryhighquantitiesofinformationduetotheirhighoperatingfrequencies.

c. Lowcostlandpurchase:eachtower occupiesonlyasmallarea.

d. Highfrequency/shortwavelengthsignalsrequiresmallantennae.

DisadvantagesofMicrowaves

a. Attenuationbysolidobjects:birds,rain,snowandfog.

b. Reflectedfromflat surfaceslikewater andmetal.

c. Diffracted(split)aroundsolidobjects.

d. Refractedbyatmosphere,thuscausingbeamtobeprojectedawayfromreceiver.

InfraRed.

Infraredoffersagreatunboundphotonicsolution.Likefiber-
opticcabling,infraredcommunicationsuselight,so theyarenotbound bythelimitations
ofelectricity.

Crimpingtool

A crimping tool is a tool designed to crimp or connect a connector to the end of a cable.
Forexample, network cables and phone cables are created using a crimping tool to connect the
RJ-45and RJ-11 connectors to the end of the cable. In the example below picture, this crimper
iscapable of crimping a RJ-11 (6-Pin) and RJ-45 (8-Pin) connectors and also includes a wire
cutternearthe handlesthat canbe used tocut phone orCAT5 cable.

16 | P a g e
2236914
CEC/CSE CN LABFILE

Fig2.6CrimpingTool

RJ-45Connecter

TheRJ-45connectorisaformoftelephoneconnector.Itseesitsmostfrequentuseasalocal-
areanetworkconnector,andisfrequentlyreferredto simplyasanEthernet connector.

Fig2.7RJ45Connector
BNCConnecter

This connector is commonly used on a Token Ring network. BNC is also short for
BayonetNutConnectororBritishNaval/NavyConnectoralthoughmoreappropriatelyknownasthe
BayonetNeillConcelman.Inthepicturetotheright,isanexampleofaBNCconnectorontheend
ofacoaxial cable.

17 | P a g e
2236914
CEC/CSE CN LABFILE

Fig2.8 BNCConnector

Procedure:Todothesepractical followingstepsshouldbedone:
1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be
verycareful at this point,as to not nick or cut into the wires, which are inside. Doing so could
alterthe characteristics of your cable, or even worse render it useless. Check the wires, one more
timefornicksorcuts.Ifthereareany,just whack thewholeend off, and startover.
2. Spread the wires apart, but be sure to hold onto the base of the jacket with your other
hand.You do not want the wires to become untwisted down inside the jacket. Category 5 cable
mustonly have 1/2 of an inch of 'untwisted' wire at the end; otherwise it will be 'out of spec'. At
thispoint, you obviously haveALOTmorethan 1/2 ofan inch ofun-twisted wire.
3. You have 2 end jacks, which must be installed on your cable. If you are using a
premadecable, with one of the ends whacked off, you only have one end to install - the crossed
over end.Below are two diagrams, which show how you need to arrange the cables for each type
of cableend. Decide at this point which end you are making and examine the associated picture
below. ¬Diagramshows you howto preparestraightthrough wired connection

EthernetCableTips:
∙ Astraight-thrucablehasidenticalends.
∙ Acrossover cablehas differentends.
∙ Astraight-thru is used asapatch cord inEthernetconnections.

18 | P a g e
2236914
CEC/CSE CN LABFILE

∙ A crossover is used to connect two Ethernet devices without a hub or for connecting two hubs.
∙Acrossoverhas oneendwith theOrangeset of wires switched with theGreen set.
∙ Oddnumberedpins arealwaysstriped; evennumberedpinsarealways solidcoloured.
∙ LookingattheRJ-45withtheclipfacingawayfromyou,Brownisalwaysontheright,andpin1 ison the
left.
∙ Nomorethan1/2"oftheEthernetcableshould beuntwistedotherwiseitwillbesusceptibletocrosstalk.
∙ Donotdeform,donotbend,donotstretch,donotstaple,donotrunparallelwithpowercables,and do
not run Ethernet cables near noiseinducing components.
Result: Cable Crimping, Standard Cabling and Cross Cabling, IO connector crimping and
testingthecrimped cable using acable tester aredonesuccessfully

OUTCOME:
Student will be able to understand the hardware components such as crimping tool and role
ofRJ-45 connector in networking. They will also know the different transmission medium such
asco-axial cable, optical cable and twisted pair cable and how these cables are used with
differentspeedsin different networks.

OUTPUT:
Studied transmission media and Tools: Co-axial cable, UTP Cable, Crimping Tool,
Connectorsetc.

RESULT:Understood the different transmission medium such as co-axial cable, optical


cableandtwisted pair cable.

APPLICATION:Usageoftransmissiontoolswithdifferentspeedsindifferentnetworks.

19 | P a g e
2236914
CEC/CSE CN LABFILE

EXPERIMENTNO.3

OBJECTIVE:
Studyandfamiliarizationwithvariousnetworkdevices.

APPARATUS:
Hubs,Switches,Routers.

DESCRIPTION:

LANAdapter:-

An expansion board that is used to connect a computer or computing device to a network.LAN


adapter is the most common and generic alternate name for a Network Interface Card(NIC).
However, many similar products, such as a Wireless USB LAN Adapter is also called
aLANadapter.

Fig3.1 LANAdapter

WirelessUSBLANadapter:-
A high-speed wireless network card that is used to access a network through a USB port on
acomputer or laptop. Most wireless USB LAN adapters look like small USB flash drives
andusually arebased on the802.11g standard which provides a data rate up to 54-Mbps in
awireless LAN environment. Some wireless USB LAN adapters may also support the
802.11bstandard.

Fig3.2WirelessUSBLANAdapter

20 | P a g e
2236914
CEC/CSE CN LABFILE

NetworkHub:-

Definition:Incomputernetworking,ahubisasmall,simple,inexpensivedevicethatjoinsmultiple
computers together. Many network hubs available today support the Ethernetstandard. Other
types including USB hubs also exist, but Ethernet is the type traditionally
usedinhomenetworking.

Technicallyspeaking,twodifferenttypesofhubsexist:

passive
active

Passive hubs do not amplify the electrical signal of incoming packets before
broadcastingthemouttothenetwork.Activehubs,ontheotherhand,doperformthisamplification,asdo
esa different type of dedicated network device called a repeater. Some people use the
termsconcentratorwhenreferringtoapassivehubandmultiportrepeaterwhenreferringtoanactiveh
ub.

Fig3.3HUB

Networkswitch:-

A network switch (sometimes known as a switching hub) is a computer networking device


thatis used toconnect devices together on acomputer network.A switch is considered
moreadvanced than a hub because a switch will only send a message to the device that needs
orrequestsit, ratherthan broadcasting the same messageoutof each of its ports. [1]

A switch is a multi-port network bridge that processes and forwards data at the data link
layer(layer 2) of theOSImodel.Some switches have additional features, including the ability
toroutepackets.Theseswitches arecommonly known as layer-3 ormultilayerswitches.

21 | P a g e
2236914
CEC/CSE CN LABFILE

Router:-

Router:Routersaredevices(computers)containingsoftwarethathelpindeterminingthebestpath outof
the available paths, for a particular transmission. They consist of a combinationof hardware and
software. The hardware includes the physical interfaces to the various networksin theinternet
work. The two main pieces of software in a router are theoperating system andtherouting
protocol.

Routers use logical and physical addressing to connect two or more logically separate
networks.They accomplish this connection by organizing the large network into logical network
segmentsor sub-networks. Each of these sub networks is given a logical address. This allows the
networksto be separate but still access each other and exchange data when necessary. Data is
grouped intopackets, or blocks of data. Each packet, in addition to having a physical device
address, has alogicalnetwork address.

Routersarefrequentlyusedtointerconnectidenticalnetworksaswellastointerconnectnetworkswith
different types of hardware.

HowRoutersWorks

Routers are interconnectivity devices that are used to transfer the datum packets along
networksbyvisualizing the networks path. Routers visualizing the networks path to many
networks suchas Electronic networks, Transport networks and phone networks. Two ways are
exist for routersoperation using either control plane or forwarding plane. In control plane the
router sends theprecise data packets to their specific location. On the other hand in forwarding
plane router doesnotremember thesending or receiving information about thepackets.
AdvantagesofRouters
Routersroute the data in an organized way. Routers generate a reliable connection
betweenhosts.Routers is usedforalternatively incasethe main is fail totransfer data.

22 | P a g e
2236914
CEC/CSE CN LABFILE

OUTPUT:
StudiedNetworkingComponentsanddevices

OUTCOME:
Studentwillbeabletounderstandallthenetworkcomponentsanddevicesusedinthenetworkin
g.

RESULT:
Understoodvarioustechnologicaldevicesanditsworking

APPLICATION:
● Lanconnectioncanbeimplemented withthehelpofthesetechnologies.
● SelectionofnetworkdevicesandimplementationsinLAN connection.

23 | P a g e
2236914
CEC/CSE CN LABFILE

EXPERIMENTNO.4

OBJECTIVE:
FamiliarizationwithPacketTracerSimulationtool/anyotherrelatedtool.

APPARATUS:
Computer,cross-platformvisualsimulationtool

DESCRIPTION:
Packet Tracer is a cross-platformvisual simulationtool designed by Cisco Systemsthat
allowsusers to create network topologiesand imitate modern computer networks. The software
allowsusersto simulate the configuration of Cisco routers and switches using a simulated
commandline interface. Packet Tracer makes use of a drag and dropuser interface, allowing users
to addand remove simulated network devices as they see fit. The software is mainly focused
towardsCertified Cisco Network Associate Academy students as an educational tool for helping
themlearn fundamental CCNA concepts. Previously students enrolled in a CCNA Academy
programcouldfreely downloadand usethe tool freeofchargefor educational use.

24 | P a g e
2236914
CEC/CSE CN LABFILE

Fig4.1PacketTracker

We will just create a computer lab with the help of the cisco packet tracer and the ‘n’ no
ofcomputers are connected with the help of switches and according to the no of computer
requiredtheno ofswitches arebeing used

In the given example we are using the 26 computers to make the local area network in the
lab.Hereweareusing two switches becauseaswitchcan have24 ports to beconnected.

Thelab looks likethis after theconnection ofthecomputersto the switch

25 | P a g e
2236914
CEC/CSE CN LABFILE

Fig 4.2

Now we are having the work of assigning the I p address to all the computers connected to
theswitch . we can assign the I p address by just clicking on the pc and the manual will come
justclickon theIp configuration then assign the Ipaddress to the pc.
We will assign the ip address in the static form. after assigning the I p address to the computer
itwillautomatically generate thesubnet maskof thecomputeritself .

Thescreenlookslikethis whileassigningtheIpaddress

Fig 4.3

26 | P a g e
2236914
CEC/CSE CN LABFILE

OUTPUT:
StudiedNetworkingComponentsanddevices

OUTCOME:
StudentswillbeabletofamiliarizewiththePacketTracerSimulation tool/anyotherrelatedtool.

RESULT:UnderstoodPacketTracerSimulationanditsworking

APPLICATION:
● Lanconnectioncanbeimplemented withthehelpofthesetechnologies.
● Selectionofnetworkdevices
● Wirelessconnection

27 | P a g e
2236914
CEC/CSE CN LABFILE

EXPERIMENTNO.5

OBJECTIVE:
StudyandImplementationofIPAddressingSchemes

APPARATUS:
Computers,ClassAddressingKnowledge.

DESCRIPTION:

IPAddressClasses:-

● IPaddressingsupportsC,fiveDandE.OnlydifferentclassesA,BandaddressCareavailablefor
commercialuse.

ClassAaddresses

ClassAaddresses aredesignedforlargeorganizationswith a largenumberofhostsorrouters.


1. In this the first octet of the address identifies the network and the next three octets are
usedto identifythehost.
2. The first bit of the first octet is always 0 and the remaining 7 bits are used to identify
thenetworkaddress.
3. Thenext threeoctetsi.e. 24 bits areusedto identify the host.
4. Theclass supports addresses from 0.0.0.0 to 0.255.255.255.
5. Thefirstblockofnetworkaddressesstartswith1.0.0.0andthelastblockofnetworkaddresss
tarts with 127.0.0.0.
6. Asthereare7bitsinthenetworkaddress, 27=128blocksofnetworkaddress
arepossible.Outofthesetwo network blocks arereserved. Hencetotal126 address blocks
areused.
7. Each network block can have 224--- 2 hosts i.e. 16,777,214 host addresses. Two
addressesarelessasoneaddress isreservedforthebroadcast addressandoneaddress
isreservedforthenetwork.
8. AblockinclassAistoolargeforalmostany organization.This means most of
theaddresses in classAare wasted and arenot used.

ClassBaddress

1. TheclassBaddressesaredesignedformediumsizedorganizationswithtens
ofthousandsofattached hosts orrouters.
2. Inthis,the firsttwooctets oftheaddress identifythenetworkandthe
nexttwooctetsidentifythehost within thenetwork.
3. Thefirsttwobits(highorderbits)ofthefirst octetarealways1,0.Thusthe
remaining14bitsidentify thenetwork.
4. Thethird andfourth octeti.e.6 bits areused to identifythehosts.
5. The first network block of this class covers the addresses from 128.0.0.0 to
128.0.255.255(netid
28 | P a g e
2236914
CEC/CSE CN LABFILE

6. Themaximum numberofnetworkblocksinclassB is2 14=16384.


7. Eachnetworkblockin class Bcan have216---2 =65,534hosts.
8. Ablockinclass Bisalsovery largeand most oftheaddress in class B isalso wasted.

ClassCaddress
1. TheclassCaddressesisdesignedforsmallorganizations withasmallnumberofattachedhostsor
routers.
2. In class C, the first three octets of address are used for network and the last octet is used
toidentify thehost.
3. Thefirst threebits offirstoctet are always set to1, 1,0.
4. Theremaining 24– 3 =21 bitsareused fornetwork identificationand only 8bits
areusedforhost.
5. InclassC, 221=2,097,152 networkblocksarepossible.
6. Thus,eachblockinclassCaddresscan have28– 2=254 hosts.
7. Thefirstblock ofnetworkcovers addresses from192.0.0.0 to192.0.0.255.
8. TheclassCaddresses aretoolessformanyorganizations asitsupportsonly254hostsinanetwork.

Followingarethe classesof IP:-

CLASS
ES Range

1.0.0.0to
Class A 127.255.255.255
128.0.0.0 to
ClassB 191.255.255.255
192.0.0.0 to
ClassC 223.255.255.255

224.0.0.0 to
ClassD 239.255.255.255

ClassE 240.0.0.0 to 255.255.255.255

ClassDaddress

1. ClassDaddresses areused formulticastgroups(multicasting)

2. Theconcept of divisionof octets intonetwork idand host iddoes not applyto class D.

3. Thefirst fourbitsof thefirst octetin class D arealways setto 1,1,1,0.

4.Theaddress rangeis 224.0.0.0 to 239.255.255.255

29 | P a g e
2236914
CEC/CSE CN LABFILE

ClassEaddress

1. TheClassE addressisreservedfor futureuseandisexperimental.

2. Theconcept ofnetworkid andhost iddoes not applyon classE also.

3. Thefirst fourbits offirstoctet arealways setto 1,1,1,1.

4. Theaddressrangeforclass Eis240.0.0.0 to255.255.255.255.

Fig5.1 ClassRanges

OUTCOME:
Studentwillbeableto understandhow todesignanetworkwithvarious classranges.
ClassA,BandCIPaddressescanbeusedto implement thenetworkwhereas
classDisusedformulticastingwith broadcasting while classE is reserved fortheresearchers.

APPLICATION:
Suppose you want to design a networkfor anorganization then youmust be aware of IPaddresses
range. Most important question is what is the size of the organization? If it is verymuch big in
size then class A IP addresses are used; if it is medium in size then class B IPaddresses can be
used on the other hand if it is small in size then class C IP addresses can beused.

RESULT:
DesignedandimplementedClassA,B,andCNetworks

OUTPUT:
ExploredtheknowledgeofcomputernetworksbydesigningdifferentclassnetworkswithdifferentIPr
anges.

30 | P a g e
2236914
CEC/CSE CN LABFILE

EXPERIMENTNO.6

OBJECTIVE:
CreationofSimple Networkingtopologies usinghubs andswitches

APPARATUS:
Computer,hub,switch

PRINCIPLE:
1. Repeater:Functioning at Physical Layer.A repeater is an electronic device that
receivesa signal and retransmits it at a higher level and/or higher power, or onto the other
side ofan obstruction, so that the signal can cover longer distances. Repeater have two
ports ,socannotbe useto connectformorethan two devices.

2. Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator is
adevice for connecting multiple twisted pair or fiber optic Ethernet devices together
andmakingthemactasasinglenetworksegment.Hubsworkatthephysicallayer(layer1)oftheO
SImodel.Thedeviceisaformofmultiportrepeater.Repeaterhubsalsoparticipate in collision
detection, forwarding a jam signal to all ports if it detects acollision.

3. Switch:A network switch or switching hub is a computer networking device


thatconnects network segments.The term commonly refers to a network bridge that
processesandroutesdataatthedatalinklayer(layer2)oftheOSImodel.Switchesthatadditionall
y process data at the network layer (layer 3 and above) are often referred to asLayer3
switches or multilayer switches.

4. Bridge: A network bridge connects multiple network segments at the data link
layer(Layer 2) of the OSI model. In Ethernet networks, the term bridge formally means
adevice that behaves according to the IEEE 802.1D standard. A bridge and switch are
verymuch alike; a switch being a bridge with numerous ports. Switch or Layer 2 switch
isoften used interchangeably with bridge.Bridges can analyze incoming data packets
todetermine if the bridge is able to send the given packet to anothersegment of
thenetwork.
5. Router: A router is an electronic device that interconnects two or more
computernetworks, and lectively interchanges packets of data between them. Each data
packetcontainsaddressinformationthataroutercanusetodetermineifthesourceanddestination
are on the same network, or if the data packet must be transferred from
onenetworktoanother.Wheremultipleroutersareusedinalargecollectionofinterconnected
networks, the routers exchange information about target system addresses,so that each
router can build up a table showing the preferred paths between any twosystemson the
interconnected networks.
6. Gate Way: In a communications network, a network node equipped for
interfacingwith another network that uses different protocols. • A gateway may contain
devices suchas protocol translators, impedance matching devices, rate converters, fault
isolators, orsignal translators as necessary to provide system interoperability. It also
requires
31 | P a g e
2236914
CEC/CSE CN LABFILE

Step1:ConnecttheswitchtotheLAN.a.Usingthepropercable,connecttheFastEthernet0/0 on
Customer Router to the FastEthernet0/1 on CustomerSwitch.
b.Usingthepropercable,connecttheCustomerPCtotheCustomerSwitchonportFastEthernet0/
2. c. Using the proper cable, connect the Local Server to the CustomerSwitchon port
FastEthernet0/3.

Step2:Verifytheswitchconfiguration.a.FromtheCustomerPC,usetheterminalemulationsoft
waretoconnect totheconsoleofthecustomer CiscoCatalyst 2960switch.
b.UsetheconsoleconnectionandterminalutilityontheCustomerPCtoverifytheconfigurations
.
Useciscoastheconsolepassword.c.EnterprivilegedEXECmodeandusetheshowrunning-
configcommandto verify thefollowingconfigurations.
Thepassword is cisco123.
a.VLAN1IPaddress =192.168.1.5
b.Subnetmask =255.255.255.0
c. Passwordrequiredforconsoleaccess
d. Passwordrequiredforvtyaccess
e. PasswordenabledforprivilegedEXECmodef.SecretenabledforprivilegedEXECmode
f. VerifyIPconnectivitybetweentheCiscoCatalyst2960switchandtheCisco1841routerby
initiating a ping to 192.168.1.1 from theswitch CLI.
g. ClicktheCheckResultsbuttonatthebottomofthis instructionwindowtocheck yourwork.

32 | P a g e
2236914
CEC/CSE CN LABFILE

33 | P a g e
2236914
CEC/CSE CN LABFILE

Fig6.1Creationofnetwork

OUTCOME:
Studentwillbeabletounderstandhowanownprivatenetworkcanbeimplementedandhow
itworks.

RESULT:
StudiedvariousLANtopologiesandtheircreationusingnetworkdevices,cablesandcomputers

OUTPUT:
Understandinghow anown privatenetwork canbeimplementedand howit works.

APPLICATION:

● Creationofprivate network
● Developingvariousnetworksusingvarioustopologies.

34 | P a g e
2236914
CEC/CSE CN LABFILE

EXPERIMENTNO.7

OBJECTIVE:
SimulationofwebtrafficinPacketTracer

APPARATUS:
Computers,PacketTracer

DESCRIPTION:
Part 1: Examine HTTP Web Traffic In Part 1 of this activity, you will use Packet
Tracer(PT)SimulationmodetogeneratewebtrafficandexamineHTTP.SwitchfromRealtime
to Simulation mode. In the lower right corner of the Packet Tracerinterfaceare tabs to
toggle between Realtime and Simulation mode. PT always starts in
Realtimemode,inwhichnetworkingprotocolsoperatewithrealistictimings.However,apowe
rfulfeatureofPacketTracerallowstheuserto“stoptime”byswitchingtoSimulation mode. In
Simulation mode, packets are displayed as animated envelopes,timeis event
driven,andthe user canstep throughnetworkingevents.
a. ClicktheSimulation modeiconto switchfrom Realtimemodeto Simulationmode.
b. SelectHTTPfromtheEventListFilters.
1) HTTPmayalreadybetheonlyvisibleevent.ClickEditFilterstodisplaytheavailable visible
events. Toggle the Show All/None checkbox and notice how the checkboxes switch
from unchecked to checked or checked to unchecked, depending on thecurrentstate.
2) Click the Show All/None checkbox until all boxes are cleared and then select
HTTP.Click anywhere outside of the Edit Filters box to hide it. The Visible Events
should nowonly display HTTP. Generate web (HTTP) traffic. Currently the Simulation
Panel isempty.TherearesixcolumnslistedacrossthetopoftheEventListwithintheSimulation
Panel. As traffic is generated and stepped through, events appear in the list.The Info
column is used to inspect the contents of a particular event. Note: The WebServer and
Web Client are displayed in the left pane. The panels can be adjusted in sizeby hovering
next to the scroll bar and dragging left or right when the double-headedarrow appears.
a. ClickWebClientinthefarleftpane.
b. ClicktheDesktop tabandclicktheWeb Browsericontoopenit.
c. In the URL field, enter www.osi.local and click Go. Because time in
Simulationmode is event-driven, you must use the Capture/Forward button to display
networkevents.
d. Click Capture/Forward four times. There should be four events in the Event
List.Lookat theWeb Client web browser page.Did anything change?

35 | P a g e
2236914
CEC/CSE CN LABFILE

Fig7.1webtrafficinPacketTracer

OUTCOME:
Studentwillbeabletounderstandtraffic/collision controlintracer.

RESULT:
StudiedvariousSimulation ofwebtrafficinPacketTracer

OUTPUT:
UnderstandinghowanownprivatenetworkcanbeimplementedinwebtrafficinPacketTracer

APPLICATION:
Trafficcontrolinnetworking

36 | P a g e
2236914
CEC/CSE CN LABFILE

EXPERIMENTNO.8

OBJECTIVE:
Studyandimplementationofvariousrouterconfigurationcommands

DESCRIPTION:
Step1: Configuretherouterhost name.
a. On Customer PC, use the terminal emulation software to connect to the console of
thecustomerCisco 1841 ISR. Set the hostname on the router to Customer Router by
usingthesecommands.
Router>enable
Router #configure
terminalRouter(config)#hos
tnameCustomerRouter
Step2:Configuretheprivilegedmodeandsecretpasswords.
a. Inglobalconfigurationmode,setthepasswordtocisco.
b. CustomerRouter(config)#enablepasswordcisco
c. Set an encrypted privileged password to cisco123 using the secret command.
CustomerRouter(config)#enablesecret cisco123
Step3: Configurethe consolepassword.
a. Inglobalconfigurationmode,switchtolineconfigurationmodetospecifytheconsoleline.
CustomerRouter(config)#lineconsole0
Setthepasswordtocisco123,requirethatthepasswordbeenteredatlogin,andthenexit
lineconfiguration mode.
Customer Router(config-line) #password
cisco123Customer
Router(config-line)
#loginCustomerRouter(config-
line)#exit
CustomerRouter(config)#
Step4:Configure thevtypasswordtoallowTelnetaccesstotherouter.In globalconfiguration
mode, switch to line configuration mode to specify the vty lines.
CustomerRouter(config)#linevty 04
Set the password to cisco123, require that the password be entered at login, exit
lineconfigurationmode,andthen exit theconfiguration session.
CustomerRouter(config-
line)#passwordcisco123CustomerRouter(config-
line)#login
CustomerRouter(config-
line)#exitCustomerRouter(config)
#
Step 5: Configure password encryption, a MOTD banner, and turn off domain
serverlookup.
Currently, the line passwords and the enable password are shown in clear text when
youshow the running configuration. Verify this now by entering the show running-
configcommand. To avoid the security risk of someone looking over your shoulder and
37 | P a g e
2236914
CEC/CSE CN LABFILE

readingthepasswords, encrypt all clear text passwords.


CustomerRouter(config)#servicepassword-encryption
Usethe showrunning-config commandagain toverify thatthe passwordsareencrypted.

38 | P a g e
2236914
CEC/CSE CN LABFILE

To provide a warning when someone attempts to log in to the router, configure a


MOTDbanner.
Customer Router(config)# $Authorized Access Only!$ Test the banner and
passwords.Log out of the router by typing the exit command twice. The banner
displays beforetheprompt forapassword.Enterthe password tolog back into therouter.
YoumayhavenoticedthatwhenyouenteracommandincorrectlyattheuserorprivilegedEXEC
prompt,therouterpauseswhiletryingtolocateanIPaddressfor the
mistyped word you entered. For example, this output shows what happenswhenthe
enable command is mistyped.
CustomerRouter>enableTranslating"enable"...domain server(255.255.255.255)
To prevent this from happening, use the following command to stop all DNS
lookupsfromtherouter CLI.
CustomerRouter(config)#noipdomain-lookup
Save the runningconfigurationtothe
startupconfiguration.CustomerRouter(config)#end
CustomerRouter#copyrunstartS
tep6:Verifytheconfiguration.
a. LogoutofyourterminalsessionwiththeCisco1841 customerrouter.
b. LogintotheCisco1841CustomerRouter.Entertheconsolepasswordwhenprompted.
c. NavigatetoprivilegedEXECmode.EntertheprivilegedEXECpasswordwhenprompted.
d. ClicktheCheckResultsbuttonatthebottomofthisinstructionwindowtocheckyourwork.

OUTCOME:
Studentwillbeableto understandrouterconfigurationcommands

RESULT:
Studiedimplementedofvariousrouterconfiguration commands

OUTPUT:
ConfiguredRouterwith usernameandpassword.

APPLICATION:
● Routerconfiguration
● Routerauthorization

39 | P a g e
2236914
CEC/CSE CN LABFILE

EXPERIMENTNO.9

OBJECTIVE:
CreationofNetworksusingrouters

DESCRIPTION:
Atanyrate,youcansetupatightlymanaged,securehomenetwork.Allyou havetodoisfollow
thesefivesteps.

1. Connectyourrouter
The router is the gateway between the Internet and your home network. It is also
themeansbywhichall thedevicesonyournetworkcommunicatewithoneanother. Ifyou
haven’t already purchased one, our guide to buying the best wireless routercangive you
the lowdown on how to choose the right router for your home's particularneeds. You can
go with either an 802.11n router, or one of the newer 802.11ac models.Foradiscussion
ofwhether802.11acwill bethe right choiceforyou,see:

You will also want to ensure that any device that will connect to the router also has
anappropriate network adapter. These devices are your network "clients."
Newlaptopswillhave802.11nadapters
(somewillsupport802.11ac,even).Forolderlaptopsordesktopsyouca
npurchasecompatible adapters.Onceyou've got the rightrouter,you have to set it up, and
the first step is to physicallyconnectyourrouter toa modem providedby your ISPwith an
Ethernet cable.
● First,unplugorturnoffthecableorDSLmodem.
● Power up your wireless router and connect the network cable that most likely comes with
itintotheport onthe routerthat is labelled"Internet"or "WAN."
● Connecttheotherend tothe cableor DSLmodemandpower up themodem.
● Don'tattemptto connectany devicessuchas laptopsor tabletsuntil
youhaveagoodstrongsignalindicating aWANconnectionon both therouter andmodem.

2. Accessthe router'sinterface andlockitdown


The next step involves getting into the router's interface (some companies call this
themanagementconsole).Thisisdonebyconnectingalaptoptotherouterandthenaccessing the
interface via a browser. How do you go about this? Routers ship with
adefaultIPaddress,administratoraccountandpassword.Forexample,mostCisco/Linksysrout
ershavethedefaultIPaddressof192.168.1.1,andthedefaultadministrator account is "admin,"
and the password is also "admin." What you want to dois change your laptop's IP settings
to match those of the router's to connect to it forconfiguration. This allows the laptop to
communicate with the router, so you can accessyourrouter's software for setup viathe
laptop.

Connect an Ethernet cable to one of the LAN ports on the router and the other end to
theEthernet port of your laptop. On a Windows 7 machine that's connected to the router
byEthernet, for example, you would go into the Control Panel and click to open
"NetworkandInternet" and then "Networkand Sharing Centre."
40 | P a g e
2236914
CEC/CSE CN LABFILE

● Fromtheleft-handwindow,click"Changeadaptersettings."
● Rightclickon"LocalAreaConnection"
(nottheWirelessNetworkConnection)andselect"Properties."
● Highlight“InternetProtocolVersion4(TCP/IPv4)”andonceagain,click"Properties."
● Setthefirstradiobuttonto"UsethefollowingIPaddress:"andentertheinformationasshown
intheimageabove.
● Once you've applied the changes, open up a browser and go the web address of (in
ourexample) theCisco/Linksysinterfacebytyping
http://192.168.1.1andusingtheaccountname "admin" and password "admin." Then you are
all set to configure security and othersettings.
MostroutercompaniesusethesamedefaultIPaddress,adminaccount,andpasswordson all
their routers. Your router's documentation will tell you the specific IP address
andaccountlogin information.

3. ConfiguresecurityandIPaddressing
After you've accessed the router, the next order of business is getting the security,
SSIDand IP addressing settings right. Getting security right is a must, unless you want
aneighbour stealing your bandwidth and possibly your data. IP addressing is
importantbecausetheseaddresses areusedfordevices onyour
networktocommunicatewit
h the router. You make all of these changes within the router's management
interface.These settings are typically under the "Basic" settings of the interface. They
may also beunder "Security" or "Wireless Settings." Router interfaces vary, so if you
can't find thesettings to configure within the router’s interface pages when following the
below steps,checkwith the routermanufacturer. Okay, onwith thesteps:

● Change the default administrator password. Some networking equipment forces you to do
soonce you've accessed the web-based interface, but many consumer routers don't. The
settingsfor the admin password are usually under the "System" tab or page of the interface.
You canjustenterinanewpasswordinthenewpasswordfield.Changetherouter'sdefault
SSID.TheSSID is the broadcasted name of your wireless network.That's the name that shows
up as thenetwork's name when you scan for available networks. Use a unique name that
yourneighboursaren't using fortheirrouters to avoidconfusion.
● Assign security. Newer routers may be set by default to automatically configure security
byusing WPS (Wi-Fi Protected Setup). Since the goal here is to have full control of
yournetwork, switch from "WPS" to "Manual." Once in manual mode, go into the
router'swireless security page. There is no excuse, except in very limited circumstances
whendealing with legacy technology, to not use WPA/WPA2. WPA security requires
clientsconnectingtoitto usea key orpassphrase, which you create within the
router'sinterfaceonthesamepageyousetupsecurity.Some routersallowyouto
enterastringof64hexadecimaldigits whichprovidesstrongsecurity,butmosthaveyou create an
8 to63 letter passphrase. If you are creating a passphrase (or password) be sure to create a
strongpassword that would be hard to guess. For further advice on generating stronger
passwords,checkout ourarticle onmaking sureyourpasswords areup to scratch.
● SetupIPaddressing.For mostnetworks,theroutercanbekeptatitsdefaultDHCPsetting.This
means the router will dole out IP addresses to clients that connect to the network,leaving
you without any IP addressing management to do. For extra security, it's not a
41 | P a g e
2236914
CEC/CSE CN LABFILE

hackersknowwhatthedefaultIPaddressesofthemost commonroutersare(eventhoughit'sreally
tough for them to get to, due to the fact that your IP addresses on your network areprivate).
For instance, I would change my Cisco/Linksys router's network from
192.168.1.1tosomething like192.168.1.3.
● Disconnectthelaptopandreboot it.Whenthelaptopcomesbackfromreboot youshouldseethe
SSID name of your wireless network and be able to connect to it with the passphrase
youcreated. Congratulations – you're connected wirelessly. But you're not done with your
setupyet!
Advancedsteps:DHCPreservation
For those who anticipate connecting servers, NAS devices or any device that you
mayaccess from outside your network, best practice is to configure DHCP Reservation.
Thatmay be a scary sounding term for newbies, but all it means is that you are telling
therouter that a specific device always uses a specific IP address, which is set aside
or"reserved"forit.
For example, my router IP is 192.168.1.1. I can give my email server an IP address
of192.168.1.2. I can give a third device, say my NAS server for instance, an IP address
of192.168.1.3, and so on. You don't want to change the first three sets of numbers
though,for most basic home networks. IP addressing has specific rules about formatting,
so youwantto retain the first threesets ofnumbers, called "octets."
You’ll also want to put in the device's MAC address that you are reserving. The
MACaddressisusuallyprintedonastickeraffixedtoadevice.Again,reservingtheIPaddresses
means those addresses willneverbedistributed to clients via DHCP andare "held" for the
devices you specify. ReservingIP addresses is good practicefordevices you want to access
remotely, because otherwise when the IP addressleasesexpireand youwon't beable to
performremoteaccess.
Don't forget to assign the reserved IPs as static addresses on the devices for which
youmadereservations.Therearevariouswaystodothis–onWindowsserversandmachines you
can assign an IP address though the Network settings Control Panel.
Otherdevices,suchasNASes,haveareasintheirmanagementconsolewhereyoucanassignan IP
address. It really depends on what device you want to set a static address for,
socheckwith thevendorifyouaren't sure.
If you are using the router as an access point, bridge or to extend the signal of an
existingrouter on a network, you will want to turn off DHCP completely. Having two
routersperforming DHCP on the same network can result in a myriad of connection
issues.However,formost homenetworks,havingtheroutersettouseDHCPwillsuffice.

4. Setupsharingandcontrol
Now that you have a network set up, you can set up a way for everyone to access data
onthe network. With Windows 7 clients, this is achieved by creating a HomeGroup, a
user-friendly way to create a workgroup. A HomeGroup is a group of computers on a
homenetwork that can share files and printers.Using a HomeGroup makes sharing easier.
Youcan share pictures, music, videos, documents, andprinters with other people in
yourHomeGroup. Other people can't change the files that you share unless you
givethempermission. You can help protect your HomeGroup with a password, which you
canchange at any time. Computers must be running Windows 7 or Windows 8 (more
aboutthelatterInamoment)toparticipateinaHomeGroup.HomeGroupisavailableinall

42 | P a g e
2236914
CEC/CSE CN LABFILE

editionsofWindows7.InWindows7StarterandWindows
7HomeBasic,youcanjoinaHomeGroup,but you can't create one.

● When a Windows 7 laptop first connects to the network, the user will be prompted to set
thecurrentnetworklocation.Ensurethatthelocationissetto"Homenetwork"(youcancheckitin
Network and Sharing Centre) because HomeGroup only works on networks set to
theHomelocation.
● Open up "HomeGroup" in the Control Panel, and then click "Create a HomeGroup."
ForeveryWindows7client thatyouwanttogiveaccesstotheHomeGroup,openHomeGroupinthe
Control Panel of those machines and then click "Join now" (those machines have to
bephysicallyor wirelessly connected to the network).
● Duringtheprocess ofsetting uporjoininga HomeGroup,you
canchoosethelibraries,printers,orfiles andfolders youwant to share(seethenext step
fordetails).
● ForWindows8,youcreateaHomeGroupbymovingthemousetothe toprightcornerofscreen,
then click Settings, then Change PC Settings. Click on HomeGroup, then you canclick
on Create. As above, you can then select the libraries and devices you want to
sharewiththeHomeGroup.
● If you have a network with an older version of Windows running, then you are going
tocreateastandardWorkgroup.ClickStart,rightclickMyComputer,andthenclickProperties.In
System Properties, click the Computer Name tab. Click "Change," select "Workgroup,"and
enter a workgroup name. Click OK to apply the change. Do the same thing for
allcomputersthat you wantsharingdata on thenetwork.

5. Setupuseraccounts
In most business networks, users access the network by logging in with their user
accountandpassword.Corporate
ITnetworkssetupuseraccountstokeeptabsonwhoisaccessingthenetworkandwhenthey
areaccessingit.Useraccountsprovideawa
ytoestablishuseraccesscontrol.Perhapsthere'ssomedata
onthenetworksome users should have
access to and some shouldn't. Maybe some users should only beableto readcertain
files,while others should be ableto changefiles.
You can establish this same kind of access in your home network, should you
wish,especiallyonceyou
haveaHomeGrouporWorkgroupdefined.It'snotsomethingmosth
omenetworkuserswillreallyneed
todo,butwe’llcoveritbriefly,asitisquiteeasy to set up
useraccounts inWindows:

● InWindows 7'sControlPanel,select
theUserAccountsicon.Useraccountswillletyouconfigure youraccountand its settings.
● Toaddandconfigureother users, fromUserAccounts,clickon "Manage UserAccounts,"and
thenclick on the "Advanced" tab.
● Under"AdvancedUser Management"click"Advanced"toopenupLocalUsersandGroups.
● Right clickoneither"Users" or"Groups"toaddeither toyournetwork.

43 | P a g e
2236914
CEC/CSE CN LABFILE

clickoneach Librarytoselect thespecificusersyouwant tosharewith. Right click


onaprinterto pull up the"Sharing" tab to set up shared access.

OUTCOME:
Studentwill beable tocreate networksusing routers

RESULT:
Studiedimplementedusageofroutersin networking

OUTPUT:
ConfiguredRouterwithusernameandpassword.

APPLICATION:
● CiscoInterface
● SSID
● DHCPconfiguration

44 | P a g e
2236914
CEC/CSE CN LABFILE

EXPERIMENTNO.10

OBJECTIVE:
Configuringnetworksusingtheconceptof subnetting

APPARATUS:
System,Router

DESCRIPTION:
Subnetworking becomes an important feature as your organization's networking
needsgrow. Subnetworking lets you divide up your pool of Internet Protocol version 4
(IPv4)addresses so you can split those addresses across several physical networks within
yourorganization.
For administrative or technical reasons, many organizations choose to divide one
networkinto several subnets. Subnetworking enables several local networks to appear as a
singleInternetnetworktooff-
sitehosts.Itdividestheaddressesforasinglenetworktoaccommodate the fact that the network
consists of several physical networks. You shouldconsiderusing subnets in the following
instances:
● When you want to hide the local network topology from the outside world.
Usingsubnetsrequires only asingle route toexternal gateways.
● WhenyouwanttheabilitytoadministerIPaddresseslocally.Forexample,acompanymay
have an engineering subnet, a product marketing subnet, and a sales subnet,
eachadministered by a different administrator who has control of IP addresses in a
givenrange.
● When network bandwidth is limited due to cabling constraints. Setting up subnets,
eachseparated by a gateway host, limits local subnet packets to those that are either
destinedfor or sent from a local host. In this way, the overall network traffic seen by
each hostonthe subnet is reduced.
Settingupasubnetrequiresyouto:
● determinetheappropriate IPaddressesforyoursubnets
● configuresubnethostswiththecorrect IPaddressesandnetworkmasks
● configuregatewayhostsbetweensubnets
Subnets allow you more flexibility when assigning network addresses. For details
onnetworkaddressassignmentand network classes,see“Networkaddress”.
Networkmasks
A network mask, or ``netmask'', is used to divide an IP address into a network address
anda host address. When you set up a network, the network mask must be common to
allnetwork interfaces on that network. The default network masks are 255.0.0.0 for class
A,255.255.0.0forclass B,and 255.255.255.0for classC networks,asillustrated here:

45 | P a g e
2236914
CEC/CSE CN LABFILE

Subnets are created by extending the network ID portion of an address by taking some
bitsfrom the host portion to create a subnet portion. The remaining bits can be used for
hostaddresseswithin the subnet. The number of subnets that can be created from an m-
bitslong subnet address is 2^m. The number of host addresses per subnet that are
availablefrom an n-bits long host address is (2^n)-2. Unlike the subnet portion of the
networkaddress, the host portion cannot consist of all 0's or 1's. See RFC 1812 and RFC
1878 formoreinformation.
“Subnetting a class B network”' illustrates the effect on a class B address of extending
anetworkmask from 255.255.0.0 to 255.255.255.0:

SubnettingaclassBnetwork
This scheme creates 256 (2^8) possible subnet addresses (0 through255)with254 (2^8-2)
host addresses (1 through 254) per subnet. In this way, you can create subnets for classA
and B networks by converting the second and third octets, respectively, from
hostaddresses to subnet addresses. Notice how the netmask changes accorThe class A
network16 can now have up to 256 subnets (16.0 through 16.255). The class network
172.16 canalso have up to 256 subnets (172.16.0 through 172.16.255). While the
netmaskmasks the network portion of the address, the broadcast address exposes the
networkaddress and hides the host portion. For example, the broadcast address for the
subnet172.16.246, with a netmask of 255.255.255.0, is 172.16.246.255.For more
information onsetting netmask and broadcast addresses using the Network
Configuration
46 | P a g e
2236914
CEC/CSE CN LABFILE

B network, youcould assign each physical network in that network a subnet numberwithin
that network. The sixteen bits for the host ID could be allocated as eight for
subnetandeight for host, or nine for subnet and seven for host, and so on. Your decision
wouldbetransparent to everyoneoutsidethat organization.
AcommonexampleofsubnetworkingistoapplyaclassCtypesubnetmask(255.255.255.0) to a
class B network. Applying this mask to a class B network providesyou with 256 possible
subnets,each one of which can accommodate 254 possible hosts(the host addresses 0 and
255 are not acceptable). If you know that none of your subnetswill ever have more than
126 hosts but you need more than 256 but less than 513 subnets,you could decide to use
nine bits for the subnet number, and seven bits for the hostaddresses.Theappropriatemask
for this would be255.255.255.128.
Given this scheme and a network address of, for example, 131.60, the addresses of the
firstand last hosts on the first subnet (131.60.0.0) would be 131.60.0.1 and 131.60.0.126.
Thebroadcastaddress on thissubnet would be 131.60.0.127.
Partitioning a class C address is a similar process as you must take a portion of the
fourthoctetasthesubnetaddress.Forexample,youmightpartitionthefirstthree(highorder)bitsof
thefourth octettorepresentthesubnet,with the lastfive bitsrepresenting thehost:

This scheme allows for up to 8 subnets of 30 hosts each, for a total of 240 hosts.
Thenetmask for the hosts on these subnets is 255.255.255.224. The number 224 is a
decimalrepresentation of the binary octet 11100000, which masks the subnet portion of the
IPaddress.
PossiblesubnetsfortheclassCnetwork221.138.62.0,withassociatedbroadcast
addresses,are:
Subnet Hosts Broadcastaddress
221.138.62.0 .1-.30 221.138.62.31
221.138.62.32 .33-.62 221.138.62.63
221.138.62.64 .65-.94 221.138.62.95
221.138.62.96 .97-.126 221.138.62.127
221.138.62.128 .129-.158 221.138.62.159
221.138.62.160 .161-.190 221.138.62.191
221.138.62.192 .193-.222 221.138.62.223
221.138.62.224 .225-.254 221.138.62.255
Afteryou determinethe new addresses foryour hosts, youmust use the
NetworkConfigurationManagertoconfigurethem.Inaddition,youmustconfigurero
utersbetweenyoursubnets:thesearehostswithmultiplenetworkinginterfacesandspecializedro
uting hardwarethat can servemorethan onenetwork.
47 | P a g e
2236914
CEC/CSE CN LABFILE

SubnettingandClasslessInterdomainRouting
The number of class A and B addresses that are available for allocation to new
networkshas been steadily diminishing over time and is now virtually exhausted. In the
late 1980snearly all of the new networks assigned were class B, and in 1990 it became
apparent thatclass B networks would run out by
1994ifthetrendcontinued.ClassCaddresses(with a maximum of 254 hosts) were hardly
being used because they were too small to
beusefulformostorganizations,whileclassBnetworksweretoolargetobedenselypopulatedby
any but thelargest organizations.
The network number allocation policies of the InterNIC were changed in 1990, to avert
theclass B address exhaustion. If you apply for a network number, you are likely to
beassigned a set of than a single class B address. Which of these you receive will depend
onthenumber ofhosts thatwill exist on yournetwork(s).
Where an organization has a range of class C network numbers, the range provided
isassigned as a bit-wise contiguous range of network numbers, and the number of
networksin therange is a power of 2. All IP addresses in the range have a common prefix,
andevery address with that prefix is within the range. For example, an organization
requiringabout 1000 IP addresses would be assigned four class C network numbers. A
range
ofaddressessatisfyingtheseruleswouldbe195.34.136through195.34.139,inwhichcasethe
range would consist of all the IP addresses with the 22-bit prefix 195.34.136. This
isrepresented by the notation 195.34.136/22 (with the trailing zeros removed).

``SubnettingwithCIDR'' illustrates this scheme.


SubnettingwithCIDR
However,theproblemwiththissituationisthateachnetworkhastoberoutedseparatelyas
standard IP routing only understands class A, B and C network addresses. The result
ofusing a range of class C addresses is a routing table explosion problem: a class B
networkof3000hostsrequiresoneroutingtableentry,whereasthesamenetworkifitwasaddresse
d as arangeofclass C networks wouldrequire16 entries.
Toovercometheroutingtableexplosionproblem,aschemeknownasClasslessInterdomain
Routing (CIDR or ``supernetting'') is used to implement address assignment.CIDR does
not route according to the class of the network number, but instead
routesaccordingtothehighorderbitsof theIPaddress(the``IPprefix'').The processofcombining
multiple networks into a single entry is called supernetting because routing
isbasedonnetworkmasksthatareshorterthanthenaturalnetwork maskofanIPaddress.
The details of CIDR may be found in RFC 1518 and RFC 1519. As the main purpose
ofCIDR is to reduce the size of the routing tables for the Internet, these documents will
notusually be of interest to you unless you are a service provider or you maintain
Internetroutingtables on yoursystem.
Variablelengthsubnetting
There are two types of subnetting: static length and variable length. Static subnetting,

48 | P a g e
2236914
CEC/CSE CN LABFILE

described in “Subnetting and Classless Interdomain Routing”. Native IP and RIP version
1routing only support static subnetting. Variable length subnetting allows the subnets
thatmake up the network to use different subnet masks. A small subnet with only a few
hostsneeds a subnet mask that accommodates only these hosts. A subnet with many hosts
mayneed a different subnet mask to accommodate the hosts. Variable length subnetting
allowsyou to divide the network so that it is possible to define adequate hosts for each
subnet bychanging the subnet
maskforeachnetwork.RIPversion2supportsvariablelengthsubnetting as well as static
subnetting. RIP version 1 only supports standard class lengths.For example,a companywith
the address 195.34.136.0 needs to splitthe address
rangeintofiveseparatenetworks,asshownin“Variablelengthsubnetting”.Thereneedtobe254
hosts on 3 of the subnets and 126 hosts on 2 of the subnets. This cannot be achievedusing
static subnetting as it can only divide the network into four subnets with 254 hostseach or
eight subnets with 126 hosts each. To divide the address into five subnets, youshould use
multiple netmasks. The first four subnets use the mask 255.255.255.0 and have254 hosts
each. The first subnet can then be divided into two subnets with 126 hosts eachand a
subnet mask of 255.255.255.128. There would be three subnets with 254 hosts eachandtwo

subnets with 126 hosts each.

Creatingsubnetentries
Once you have defined a top-level address entry, you can add subnets to it, or you
canfurther dividea subnetinto other subnets (known as variable length subnetting).
See“Variablelength subnetting” formoredetails.
Toaddasubnet:
1. Selectthetop-leveladdressorsubnet.
2. SelectEdit Add Subnets.
3. Chooseasubnetmask length(in bits)from thoselisted intheLengthcolumn.
4. SelectsubnetrangesfromthoselistedintheSubnetcolumn.
TheSubnetcolumndisplaysthemasklengthofthesubnetandalsodisplaysthenumberof hosts
and hostranges.
Foraparticularsubnetmasklength,youcanselectallthesubnetrangesinthelistbyclicking
on SelectAll.
5. ClickonYestoautomaticallyassignhoststosubnets.
You can also add hosts after you have assigned all the
subnets.See“Creating host entries”.

OUTCOMES:
Studentswillbeabletounderstandhowtodivideabignetworkintosmallernetworks.Whenanetworkisde
signedthenanetworkhasmultipledevicesandsomeofthesedevicesneedanIP
49 | P a g e
2236914
CEC/CSE CN LABFILE

addressforexampleRouter,thenwhatIPshouldbe
assignedtorouteristotallydependentonthesubnetwork.Withthis student willbe able
todivideanetworkinto smallernetworks.

APPLICATION:
ItcanbeusedinCIDRtechniques.

OUTPUT:
Explored the knowledge of computer networks by designing different
classnetworkswith differentIPranges.

RESULT:
Subnetplanninganditsimplementation

50 | P a g e
2236914
CEC/CSE CN LABFILE

EXPERIMENTNO.11

OBJECTIVE:
PracticalimplementationofbasicnetworkcommandandNetworkconfigurationcommands like
ping, ipconfig, netstat, tracert etc. for troubleshooting network relatedproblems.

DESCRIPTION:
All commands related to Network configuration which includes how to switch to
privilegemodeandnormalmodeandhowtoconfigurerouterinterfaceandhowtosave
thisconfigurationto flash memory or permanent memory.
Thiscommands includes
• ConfiguringtheRoutercommands
• GeneralCommandstoconfigurenetwork
• PrivilegedModecommands ofarouter
• RouterProcesses&Statistics
• IPCommands
• Other IPCommandse.g.showiprouteetc.
ping: ping(8) sends an ICMP ECHO_REQUEST packet to the specified host. If the
hostresponds, you get an ICMP packet back. Sounds strange? Well, you can “ping” an
IPaddress to see if a machine is alive. If there is no response, you know something is
wrong.Ipconfig: Displays all current TCP/IP network configuration values and refreshes
DynamicHost Configuration Protocol (DHCP) and Domain Name System (DNS) settings.
Usedwithoutparameters,ipconfigdisplaysInternetProtocolversion4(IPv4)andIPv6addresses,
subnet mask, and defaultgatewayforall adapters.
Netstat: The netstat command generates displays that show network status and
protocolstatistics . You can display the status of TCP and UDP endpoints in table format,
routingtableinformation, and interfaceinformation.
netstat displays various types of network data depending on the command line
optionselected. These displays are the most useful for system administration. The syntax
for thisformis:
netstat[-m][-n][-s][-i|-r][-faddress_family]
The most frequently used options for determining network status are: s, r, and i. See
thenetstat(1M)man pagefor adescription of theoptions.

Traceroute: Tracert is a command which can show you the path a packet of
informationtakes from and is discarded. In addition to this, it will tell you how long each
'hop' fromrouterto routertakes.
nslookup:Displays information from Domain Name System (DNS) name servers.
NOTEIfyou write the command as above it shows as default your pc's server name
firstly.pathping: A better version of tracert that gives you statistics about packet loss and
latency.In this activity, you will use the Cisco IOS CLI to apply an initial configuration to
a router,including host name, passwords, a message-of-the-day (MOTD) banner, and other
basicsettings

51 | P a g e
2236914
CEC/CSE CN LABFILE

OUTCOME:
Studentwillbeabletounderstandhowtoconfigurecommandslikeping,ipconfig,netstat,tracert

APPLICATION:Itcanbeusedinconfigurationofusercommands.

OUTPUT:
Explored various commands and also how to switch to privilege mode and normal
modeand how to configure router interface and how to save this configuration to flash
memoryorpermanent memory.

RESULT:Troubleshootingnetworkrelatedproblem

52 | P a g e
2236914
CEC/CSE CN LABFILE

EXPERIMENTNO.12

OBJECTIVE:
Configurationofnetworksusingstaticanddefaultroutes

APPARATUS:
Routers,system

DESCRIPTION:

Step1:TestconnectivitybetweenthePCsandthedefaultgateway.
To determine if there is connectivity from each PC to its configured gateway, first use a
simpleping test.
a. ClickBOpcand go toDesktop >Command Prompt.
b. From the command prompt, type the ipconfig command. Note the IP address for
BOpcand the default gateway address. The default gateway address is the IP address for
theFastEthernet interfaceon Branch
c. Ping 192.168.1.1, the default gateway address for the BranchOffice LAN, from
thecommandprompt onBOpc.This ping should besuccessful.
d. ClickPNpcand go toDesktop >Command Prompt
e. From the command prompt, type the ipconfig command. Note the IP address for
PNpcand the default gateway address. The default gateway address is the IP address for
theFastEthernet interfaceon Partne
f. Ping192.168.3.1,thedefaultgatewayaddressfor thePartnerNetLAN,
fromthecommandprompt onThiping should besuccessful
g. Repeat steps a, b, and c for MOpc and its respective default gateway, the Fast
Ethernetinterfaceon MainOffice.Eachof thesepingtests shouldbesuccessful.

Step2:Pingbetweenrouterstotestconnectivity.
Use a console cable and terminal emulation software on BOpc to connect
toBranchOffice.
a. TestconnectivitywithMainOfficebypinging10.10.10.1,theIPaddressofthedirectlyconnec
tedserial 3/0 interface.This ping shouldsucceed.
53 | P a g e
2236914
CEC/CSE CN LABFILE

b. TestconnectivitywithMainOfficebypinging10.10.10.5,theIPaddressoftheserial2/0interf
ace.This ping should fail.
c. IssuetheshowiproutecommandfromtheterminalwindowofBOpc.Notethat
onlydirectlyconnectedroutesareshownintheBranchOffice routingtable.Thepingto
10.10.10.5failedbecausetheBranchOfficerouterhasnoroutingtableentryfor10.10.10.5.
d. RepeatstepsathroughdontheothertwoPCs.Thepingstodirectlyconnectednetworkswill
succeed.However,pingsto remote networks willfail.
e. WhatstepsmustbetakentoreachallthenetworksfromanyPCintheactivity?

Step3:Viewingtheroutingtables.
YoucanviewroutingtablesinPacketTracerusing theInspecttool.TheInspecttoolisinthe
Common Tools bar to the right of the topology. The Inspect tool is the icon thatappears
as amagnifyingglass.
a. IntheCommonToolsbar,clickontheInspecttool.
b. ClicktheMainOfficerouterand choosetheRoutingTable.
c. ClicktheBranchOfficerouterand choosetheRoutingTable.
d. ClickthePartnerNetrouterandchoosetheRoutingTable.
e. Movetherouting tablewindows aroundso thatyou canseeallthreeatonce.
f. Whatnetworksdoeachoftherouters alreadyknowabout?
g. Does each router know how to route to all networks in the topology? After
comparingthe routing tables, close the window for each routing table by clicking the x in
the upperrightcorner of eachwindow.

Step4:ConfiguredefaultroutesontheBranchOfficeand PartnerNetrouters.
To configure static routes for each router, first determine which routes need to be
addedfor each device. For the BranchOffice and the PartnerNet routers, a single default
routeallows these devices to route traffic for all networks not directly connected. To
configurea default route, you must identify the IP address of the next hop router, which
in this caseisthe MainOfficerouter.
a. FromtheCommontoolbar,clicktheSelecttool.
b. MovethecursorovertheredseriallinkbetweentheBranchOfficerouterandtheMainOfficero
uter.Notice that theinterfaceof thenext hopis S3/0.
c. MovethecursorovertheMainOfficerouterandnotethattheIPaddressforSerial3/0is
10.10.10.1.
d. MovethecursorovertheredseriallinkbetweenthePartnerNetrouterandtheMainOfficerout
er. Notice that theinterfaceofthenext hop is S2/0.
e. MovethecursorovertheMainOfficerouterandnotethattheIPaddressforSerial2/0is
10.10.10.5.
f. ConfigurethestaticroutesonboththeBranchOfficeandPartnerNetroutersusingtheCLI.Clic
k the BranchOffice router, and click theCLItab.
g. AttheBranchOffice>prompt,typeenabletoenterprivilegedEXEC mode.
h. AttheBranchOffice#prompt,typeconfigureterminal.
i. Thesyntaxforadefaultrouteisiproute0.0.0.00.0.0.0next_hop_ip_address.Typeip route
0.0.0.0 0.0.0.0 10.10.10.1.
j. TypeendtogetbacktotheBranchOffice#prompt.

54 | P a g e
2236914
CEC/CSE CN LABFILE

k. Typecopy runstartstosavetheconfigurationchange.
l. RepeatstepsfthroughkonthePartnerNetrouter,using10.10.10.5asthenext hopIPaddress.

Step5:Configurestatic routesattheMainOffice.
The configuration of static routes at the Main Office is a bit more complex because
theMainOffice router is responsible for routing traffic to and from the Branch Office
andPartnerNetLANsegments.TheMainOfficerouterknowsonlyaboutroutestothe10.10.10.0
/30,10.10.10.4/30,and192.168.2.0/24networksbecausetheyare directlyconnected. Static
routes to the 192.168.1.0/24 and 192.168.3.0/24 networks need to beadded so that the
MainOffice router can route traffic between the networks behind theBranchOfficeand
PartnerNet routers.
a. ClicktheMainOfficerouter, andthenclicktheCLItab.
b. AttheMainOffice>prompt,typeenabletoenterprivilegedEXECmode.
c. AttheMainOffice#prompt,typeconfigureterminal.
d. The syntax for a static route is ip route network subnet_masknext_hop_ip_address:
iproute192.168.1.0255.255.255.010.10.10.2iproute192.168.3.0255.255.255.010.10.10.6
e. TypeendtoreturntotheMainOffice#prompt.
f. Typecopy runstartstosavetheconfigurationchange.
g. Repeat steps through e from Step 3. View the routing tables and notice the
differencein the routing tables. The routing table for each router should have an “S” for
each staticroute.

Step6:Testconnectivity.
Nowthateachrouterinthetopologyhasstaticroutesconfigured,allhostsshouldhaveconnectivityto all
otherhosts. Useping to verify connectivity.
a. ClickBOpcandclickthe Desktoptab.
b. Choosethe Commandprompt option.
c. Typeping192.168.3.2.Thepingshouldbesuccessful,verifyingthatthestaticroutesareconfi
gured properly.
d. Type ping 192.168.2.2. Notice that the result is successful even though you did
notspecifically add the 192.168.2.0 network as a static route into any of the routers.
Becausea default route was used on the BranchOffice and PartnerNet routers, a route for
the192.168.2.0 network was not needed. The default route sends all traffic destined off
thenetworktotheMainOfficerouter. The 192.168.2.0 network is directlyconnected to
the MainOffice router; therefore, no additional routes needed to be added totherouting
table
e. Click the Check Results button at the bottom of this instruction window to check
yourwork

OUTCOME:
Studentwillbeabletoconfigureofnetworks usingstaticand defaultroutes

APPLICATION:
● Itcanbeusedinconfigurationofrouters.
● connectivitybetweenthePCsandthedefaultgateway

55 | P a g e
2236914
CEC/CSE CN LABFILE

OUTPUT:
Exploredvariousconfigureofnetworks usingstaticanddefaultroutes

RESULT:
Testedconnectivitybetweennetwork

56 | P a g e
2236914

You might also like