0% found this document useful (0 votes)
10 views31 pages

BSC Network Lab25

The document outlines a series of experiments focused on networking concepts, including the study and practical implementation of network cables, devices, and commands. It covers topics such as IP address classification, subnetting, and router configuration, along with hands-on procedures for setting up a Local Area Network and using basic networking commands. Each experiment aims to enhance understanding of network components, transmission media, and configuration techniques essential for effective network management.

Uploaded by

Krish Krishna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views31 pages

BSC Network Lab25

The document outlines a series of experiments focused on networking concepts, including the study and practical implementation of network cables, devices, and commands. It covers topics such as IP address classification, subnetting, and router configuration, along with hands-on procedures for setting up a Local Area Network and using basic networking commands. Each experiment aims to enhance understanding of network components, transmission media, and configuration techniques essential for effective network management.

Uploaded by

Krish Krishna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 31

Experiment-1

AIM OF EXPT: Study of different types of Network cables and Practically implement the
cross-wired cable and straight through cable using clamping tool.

Apparatus (Components): RJ-45 connector, Climping Tool, Twisted pair Cable

Procedure: To do these practical following steps should be done:

1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be very
careful at this point, as to not nick or cut into the wires, which are inside. Doing so could alter
the characteristics of your cable, or even worse render is useless. Check the wires, one more time
for nicks or cuts. If there are any, just whack the whole end off, and start over.

2. Spread the wires apart, but be sure to hold onto the base of the jacket with your other hand.
You do not want the wires to become untwisted down inside the jacket. Category 5 cable must
only have 1/2 of an inch of 'untwisted' wire at the end; otherwise it will be 'out of spec'. At this
point, you obviously have ALOT more than 1/2 of an inch of un-twisted wire.

3. You have 2 end jacks, which must be installed on your cable. If you are using a pre-made
cable, with one of the ends whacked off, you only have one end to install - the crossed over end.
Below are two diagrams, which show how you need to arrange the cables for each type of cable
end. Decide at this point which end you are making and examine the associated picture below.

Diagram shows you how to prepare Cross wired connection


Diagram shows you how to prepare straight through wired connection
Experiment - 2
AIM OF EXPERIMENT: Study of following Network Devices in Detail
• Repeater
• Hub
• Switch
• Bridge
• Router
• Gate Way

Procedure: Following should be done to understand this practical.


 What is a Network?
A network consists of two or more computers that are linked in order to share resources (such as
printers and CDs), exchange files, or allow electronic communications. The computers on a network
may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.

Networking Components:-
Computer networks components comprise both Hardware parts as well as
the software parts required for installing computer networks, both at organizations and at home. The
hardware components are the server, client, peer, transmission medium, and connecting devices. The
software components are operating system and protocols.

Diagram: Components of Network.

Hardware Components:-
1. Routers
2. Hub
3. Switch
4. Bridge
5. Repeater
6. Gateway

 Software Components:-
 Operating System − Network Operating Systems is typically installed in the
server and facilitate workstations in a network to share files, database,
applications, printers etc.
 Protocol Suite − A protocol is a rule or guideline followed by each computer for
data communication. Protocol suite is a set of related protocols that are laid down
for computer networks. The two popular protocol suites are−
 OSI Model ( Open System Interconnections)
 TCP / IP Model.

 LAN Adapter:-
A LAN adapter is an expansion board that is used to connect a computer or computing device to a
network.

LAN ADAPTER

Networking Devices

 Router:-
Routers are networking devices operating at layer 3 or a network layer of the
OSI model. They are responsible for receiving, analyzing, and forwarding data packets
among the connected computer networks.

 How a router works:-.


 Hub:-
A Network Hub is one of the most commonly used networking devices can be easily found
on any small networks such as home or office

 Working of Hubs:-When a h






  Switch:-
A switch is a Networking device in a computer network that connects other
devices together. Multiple data cables are plugged into a switch to enable
communication between
different networked devices.
been sent.

Bridge:-
Bridge is termed as a network device which is helpful in filtering the data load of the traffic by dividing
it into segments or packets. They are used to lower the load of traffic on the LAN and other networks

 Repeater:-
A repeater is a network device that retransmits a received signal with more power and to an extended
geographical or topological network boundary than what would be capable with the original signal repeater is
implemented in computer networks to expand the coverage area of the network, re propagate a weak or broken
signal and or service remote nodes
 Gateway:-
The link between two computers to connect to internet or another
network is called gateway. The gateway works like a portal among two programs by
means of communications between protocol and
permit them to share data on same computers or
among different computers.

Experiment - 3
Aim:-Familiarization with Transmission media and Tools Coaxial cable, UTP Cable,
Crimping Tools, Connectors etc.

Transmission Medium:
A communication channel that is used to carry the data from one transmitter to the receiver through the
electromagnetic signals .The main function of this is to carry the data in the bits form through the Local Area
Network(LAN).In data communication, it works like a physical path between the sender & receiver .

Guided Transmission Media:


This kind of transmission media is also known as wired otherwise bounded media. In this type
,the signals can be transmitted directly & restricted in a thin path through physical links. The types of
Bounded /Guided transmission are discussed below.
Coaxial Cable:
Coaxial cable (or coax) carries signals of higher frequency ranges than those in twisted pair cable. It has a
central core conductor of solid or stranded wire (usually copper) enclosed in an insulating sheath, which is, in
turn, encased in an outer conductor of metal foil, braid, or a combination of the two

Fibre Optic Cable:


A fiber optic cable is a network cable that contains strands of glass fibers inside an insulated casing. They're
designed for long-distance, high-performance data networking, and telecommunications.
Unshielded Twisted Pair(UTP):
An unshielded twisted pair is widely used in telecommunication. It is most common type when compared with
shielded twisted pair cable which consists of two conductors usually copper, each with its own colour plastic
insulator.
Types of unguided Transmission media:

 Radio Transmission:

Its frequency is between 10Khz to 1Ghz. It is simple to install and has high attenuation. These
waves are used for multicast communication.

Types of propagation:
1. Troposphere
2. Ionosphere
Microwaves:
It is a line of sight transmission i.e. the sending and receiving antennas need to be properly aligned with each
other. The distance covered by the signal is directly proportional to the height of the antenna. Frequency
Range:1GHz – 300GHz. These are majorly used for mobile phone communication and television distribution.

Infrared:
Infrared waves are used for very short distance communication. They cannot penetrate through
obstacles. This prevents interference between systems. Frequency Range:300GHz – 400THz. It is used in TV
remotes, wireless mouse, keyboard, printer, etc.

Crimping tool:
A crimping tool is a device used to conjoin two pieces of metal by deforming one or both of them to hold each
other. The result of the tool's work is called a crimp. An example of crimping is affixing a connector to the end of a
cable. For instance, network cables and phone cables are created using a crimping tool (shown below) to join RJ-45
and RJ-11 connectors to both ends of phone or Cat 5 cable.

Connector:
A device that terminates a segment of cabling or provides a point of entry for networking devices such as
computers, hubs, and routers. Connectors can be distinguished according to their physical appearance and mating
properties, such as jacks and plugs (male connectors) or sockets and ports (female connectors).
Experiment - 4
AIM OF EXPERIMENT: Study of network IP

• Classification of IP address
• Sub netting
• Super netting

Apparatus (Software): NA

Procedure: Following is required to be study under this practical.


• Classification of IP address

As show in figure we teach how the ip addresses are classified and when they are used.

Class Address Range Supports


Class A 1.0.0.1 to 126.255.255.254 Supports 16 million hosts on each of 127 networks.
Class B 128.1.0.1 to 191.255.255.254 Supports 65,000 hosts on each of 16,000 networks.
Class C 192.0.1.1 to 223.255.254.254 Supports 254 hosts on each of 2 million networks.
Class D 224.0.0.0 to 239.255.255.255 Reserved for multicast groups.
Class E 240.0.0.0 to 254.255.255.254 Reserved.

• Sub netting
Why we Develop sub netting and How to calculate subnet mask and how to identify subnet address.

• Super netting
Why we develop super netting and How to calculate supernet mask and how to identify supernet
address.
Experiment-5
AIM OF EXPERIMENT: Create network of at least 6 computers in Local Area Network.

Procedure: On the host computer

On the host computer, follow these steps to share the Internet connection:
1. Log on to the host computer as Administrator or as Owner.
2. Click Start, and then click Control Panel.
3. Click Network and Internet Connections.
4. Click Network Connections.
5. Right-click the connection that you use to connect to the Internet. For example, if you
connect to the Internet by using a modem, right-click the connection that you want under Dial-up
/ other network available.
6. Click Properties.
7. Click the Advanced tab.

8. Under Internet Connection Sharing, select the Allow other network users to
connect through this computer's Internet connection check box.

9. If you are sharing a dial-up Internet connection, select the Establish a dial-up connection
whenever a computer on my network attempts to access the Internet check box if you
want to permit your computer to automatically connect to the Internet.

10. Click OK. You receive the following message:

When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP address
192.168.0. 1. Your computer may lose connectivity with other computers on your network. If
these other computers have static IP addresses, it is a good idea to set them to obtain their IP
addresses automatically. Are you sure you want to enable Internet Connection Sharing?

11. Click Yes.


The connection to the Internet is shared to other computers on the local area network (LAN).

The network adapter that is connected to the LAN is configured with a static IP address of
192.168.0. 1 and a subnet mask of 255.255.255.0

On the client computer

To connect to the Internet by using the shared connection, you must confirm the LAN adapter IP
configuration, and then configure the client computer. To confirm the LAN adapter IP
configuration, follow these steps:

1. Log on to the client computer as Administrator or as Owner.


2. Click Start, and then click Control Panel.
3. Click Network and Internet Connections.
4. Click Network Connections.
5. Right-click Local Area Connection and then click Properties.
6. Click the General tab, click Internet Protocol (TCP/IP) in the connection uses the
following items list, and then click Properties.

7. In the Internet Protocol (TCP/IP) Properties dialog box, click Obtain an IP address
automatically (if it is not already selected), and then click OK.

Note: You can also assign a unique static IP address in the range of 192.168.0.2 to
254. For example, you can assign the following static IP address, subnet mask, and default gateway:

8. IP Address 192.168.31.202
9. Subnet mask 255.255.255.0
10. Default gateway 192.168.31.1

11. In the Local Area Connection Properties dialog box, click OK.

12. Quit Control Panel.


Experiment-6
AIM OF EXPERIMENT: Study of basic network command and configuring netwok commands.

Apparatus (Software): Command Prompt And Packet Tracer.

Procedure: To do this EXPERIMENT- follows these steps:


In this EXPERIMENT- students have to understand basic networking commands e.g ping,
tracert etc.

All commands related to Network configuration which includes how to switch to privilege mode
and normal mode and how to configure router interface and how to save this configuration to
flash memory or permanent memory.

This commands includes

• Configuring the Router commands


• General Commands to configure network
• Privileged Mode commands of a router
• Router Processes & Statistics
• IP Commands
• Other IP Commands e.g. show ip route etc.

ping:
ping(8) sends an ICMP ECHO_REQUEST packet to the specified host. If the host responds, you get
an ICMP packet back. Sound strange? Well, you can “ping” an IP address to see if a machine is
alive. If there is no response, you know something is wrong.
Traceroute:

Tracert is a command which can show you the path a packet of information takes from your
computer to one you specify.
nslookup:

Displays information from Domain Name System (DNS) name servers.


NOTE :If you write the command as above it shows as default your pc's server name firstly.

pathping:

A better version of tracert that gives you statics about packet lost and latency.
Experiment-7

AIM:-Performing an Initial Router Configuration


Apparatus (Software): Command Prompt And Packet Tracer.

Topology Diagram

Objectives
 Configure the router host name.
 Configure passwords.
 Configure banner messages.
 Verify the router configuration.

Background / Preparation
In this activity, you will use the Cisco IOS CLI to apply an initial configuration to a router, including host
name, passwords, a message-of-the-day (MOTD) banner, and other basic settings.
Note: Some of the steps are not graded by Packet Tracer.

Step 1: Configure the router host name.


a. On Customer PC, use the terminal emulation software to connect to the console of the customer
Cisco 1841 ISR.
Set the host name on the router to CustomerRouter by using these commands.

Router>enable
Router#configure terminal
Router(config)#hostname CustomerRouter

Step 2: Configure the privileged mode and secret passwords.


a. In global configuration mode, set the password to cisco.
CustomerRouter(config)#enable password cisco

Set an encrypted privileged password to cisco123 using the secret command.

CustomerRouter(config)#enable secret cisco123

Step 3: Configure the console password.


a. In global configuration mode, switch to line configuration mode to specify the console line.

CustomerRouter(config)#line console 0

Set the password to cisco123, require that the password be entered at login, and then exit line configuration mode.

CustomerRouter(config-line)#password cisco123
CustomerRouter(config-line)#login
CustomerRouter(config-line)#exit
CustomerRouter(config)#

Step 4: Configure the vty password to allow Telnet access to the router.
a. In global configuration mode, switch to line configuration mode to specify the vty
lines.

CustomerRouter(config)#line vty 0 4

Set the password to cisco123, require that the password be entered at login, exit line configuration mode, and then
exit the configuration session.

CustomerRouter(config-line)#password cisco123
CustomerRouter(config-line)#login
CustomerRouter(config-line)#exit
CustomerRouter(config)#

Step 5: Configure password encryption, a MOTD banner, and turn off domain server lookup.
a. Currently, the line passwords and the enable password are shown in clear text when you showthe
running configuration. Verify this now by entering the show running-config command.

To avoid the security risk of someone looking over your shoulder and reading the passwords, encrypt
all clear text passwords.

CustomerRouter(config)#service password-encryption

Use the show running-config command again to verify that the passwords are encrypted.
To provide a warning when someone attempts to log in to the router, configure a MOTD banner.

CustomerRouter(config)#banner motd $Authorized Access Only!$


Test the banner and passwords. Log out of the router by typing the exit command twice. The banner displays before
the prompt for a password. Enter the password to log back into the router.
You may have noticed that when you enter a command incorrectly at the user or privileged EXEC prompt, the router
pauses while trying to locate an IP address for the mistyped word you entered. For example, this output shows what
happens when the enable command is mistyped.

CustomerRouter>emable
Translating "emable"...domain server (255.255.255.255)

To prevent this from happening, use the following command to stop all DNS lookups from the
router CLI.

CustomerRouter(config)#no ip domain-lookup

Save the running configuration to the startup configuration.

CustomerRouter(config)#end
CustomerRouter#copy run start

Step 6: Verify the configuration.


a. Log out of your terminal session with the Cisco 1841 customer router.
b. Log in to the Cisco 1841 Customer Router. Enter the console password when prompted.
c. Navigate to privileged EXEC mode. Enter the privileged EXEC password when prompted.
d. Click the Check Results button at the bottom of this instruction window to check your work.
EXPERIMENT-8
AIM:- Configuring of RIP

Objectives
 Configure routers using basic interface configuration commands.
 Enable RIP.
 Verify the RIP configuration.

Background / Preparation
A simple routed network has been set up to assist in reviewing RIP routing behavior. In this activity, you will
configure RIP across the network and set up end devices to communicate on the network.

Step 1: Configure the SVC01 router and enable RIP.

Step 2: Configure the RTR01 router and enable RIP.

Step 3: Configure the RTR02 router and enable RIP.


Step 4: Verify the RIP configuration on each router.

Scenario 1: Protecting the Network from Hackers


Because the company is concerned about security, you recommend a firewall to protect the network from
hackers on the Internet. It is very important that access to the network from the Internet is restricted.
Firewall_1 has been preconfigured with the appropriate rules to provide the security required. You will install it
on the network and confirm that it is functioning as expected.
:

EXPERIMENT-9
Aim:- Study of various LAN topologies and their creation using network
devices, cables and Computer.
Topology is derived from two Greek words topo and logy, where topo means 'place' and logy means 'study'. In
computer networks, a topology is used to explain how a network is physically connected and the logical flow
of information in the network. A topology mainly describes how devices are connected and interact with each
other using communication links.
In a computer network, there are mainly six types of physical topology, they
are:
1. Bus Topology

2. Ring Topology
3. Star Topology
4. Mesh Topology
5. Tree Topology
6. Hybrid Topology
1. Bus Topology:
Bus topology is the simplest kind of topology in which a common bus or channel is used for
communication in the network. The bus is connected to various taps and droplines. Taps are the connectors, while
droplines are the cables connecting the bus with the computer. In other words, there is only a single transmission
line for all nodes.

Bus Topology
2. Ring Topology :
Ring topology is a topology in which each computer is connected to exactly two other
computers to form the ring. The message passing is unidirectional and circular in nature. This network topology is
deterministic in nature, i.e., each computer is given access for transmission at a fixed time interval. All the nodes
are connected in a closed-loop. This topology mainly works on a token-based system and the token travels in a loop
in one specific direction.

Ring Topology
3. Star Topology :
Star topology is a computer network topology in which all the nodes are connected to a
centralized hub. The hub or switch acts as a middleware between the nodes. Any node requesting for service or
providing service, first contact the hub for communication. The central device(hub or switch) has point to point
communication link(the dedicated link between the devices which can not be accessed by some other computer)
with the devices.

Star Topology
4. Mesh Topology :
Mesh topology is a computer network topology in which nodes are interconnected with each other. In other words,
direct communication takes place between the nodes in the network.

EXPERIMENT-10
Aim:-Configuration of TELNET protocols on router for remote access.

Telnet protocol:
Telnet is an application protocol that allows a user to communicate with a remote device. A user on a client
machine can use a software (known as a Telnet client) to access a command-line interface of another, remote
machine that is running a Telnet server program.Telnet is often used by network administrators to access and
manage remote devices. A network administrator can access the device by telnetting to the IP address or hostname
of a remote device. The network administrator will then be presented with a virtual terminal that can interact with
the remote host. To use telnet, you must have a software (Telnet client) installed. On a remote device, a Telnet
server must be installed and running.

Steps to Configure Telnet on Cisco Router


1. First of all, execute the following command to change the current hostname as Switch1.
Switch(config)#hostname Switch1

2. configure an IP address on the switch. Unlike the routers, typically switch does
not require to be configured with an IP address. However, we need to configure
an IP address on the switch’s VLAN 1 interface.
The following commands will configure 10.0.0.1/8 IP address on the VLAN 1 interface.
Switch1(config)#interface vlan 1
Switch1(config-if)#ip address 10.0.0.1 255.0.0.0
Switch1(config-if)#no shutdown
Switch1(config-if)#exit

3. Once you have configured the appropriate hostname and IP address on the switch,
execute the following commands to enable the Telnet protocol.
Switch1(config)#line vty 0 4
Switch1(config-line)#password 123456
Switch1(config-line)#login Switch1(config-
line)#exit

4. The following figure shows the Telnet configuration on Switch1

5. In the preceding commands, vty −means virtual terminal and 0 4 means ─total five
mm(0 to 4) users can access the switch remotely at a time. 123456 is the password that
the remote users need to know in order to connect to the switch.

6. Once you have done your configuration on switch1, move on to PC0.


Configure 10.0.0.1/8 IP address on PC0.
7. After configuring the appropriate IP address on the PC, open the Command
Prompt window of the PC, type telnet 10.0.0.100 and press Enter.
8. At the Password: prompt, type your telnet password (123456) and verify that you
are able to connect to switch’s console remotely.
Consider the following example:

The network administrator wants to use his computer (Host A) to access and manage the router (R1). The
administrator will start a Telnet client program on Host A and enter the IP address of the router R1 (telnet
10.0.0.1):

The administrator can now manage the remote device (R1) from his own computer.
Although Telnet is simple and easy to use, it is not widely used anymore, especially in production environments. This is
because Telnet sends all data in clear-text, including usernames and passwords! SSH is commonly used today
instead of Telnet. Telnet is only used if SSH is not available on the device, for example on some older Cisco
equipment.
5. Tree Topology:
Tree topology is a computer network topology in which all the nodes are directly or
indirectly connected to the main bus cable. Tree topology is a combination of Bus and Star topology. In a tree
topology, the whole network is divided into segments, which can be easily managed and maintained. There is a
main hub and all the other sub-hubs are connected to each other in this topology.

Tree Topology

Following are the advantages of Tree topology:


1. Large distance network coverage.
2. Fault finding is easy by checking each hierarchy.
3. Least or no data loss.
4. A Large number of nodes can be connected directly or indirectly.
5. Other hierarchical networks are not affected if one of them fails.
Following are the disadvantages of
Tree topology:
1. Cabling and hardware cost is high.
2. Complex to implement.
3. Hub cabling is also required.
4. A large network using tree topology is hard to manage.
5. It requires very high maintenance.
6. If the main bus fails, the network will fail.

6. Hybrid Topology:
A Hybrid topology is a computer topology which is a combination of two or more
topologies. In practical use, they are the most widely used.
In this topology, all topologies are interconnected according to the needs to form a hybrid. All the good features of
each topology can be used to make an efficient hybrid topology.

Hybrid Topology

Following are the advantages of


Hybrid topology:
1. It can handle a large volume of nodes.
2. It provides flexibility to modify the network according to our needs.
3. Very Reliable(if one node fails it will not affect the whole network).

Following are the disadvantages of Hybrid topology:


1. Complex design.
2. Expensive to implement.
3. Multi-Station Access Unit(MSAL) required.
4. Hence, after learning the various computer network topologies, we can conclude that
some points need to be considered when selecting a physical topology:
5. Ease of Installation.
6. Fault Tolerance.
7. Implementation Cost.
8. Cabling Required.
9. Maintenance Required.
10. Reliable Nature.
11. Ease of Reconfiguration and upgradation.

You might also like