BSC Network Lab25
BSC Network Lab25
AIM OF EXPT: Study of different types of Network cables and Practically implement the
cross-wired cable and straight through cable using clamping tool.
1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be very
careful at this point, as to not nick or cut into the wires, which are inside. Doing so could alter
the characteristics of your cable, or even worse render is useless. Check the wires, one more time
for nicks or cuts. If there are any, just whack the whole end off, and start over.
2. Spread the wires apart, but be sure to hold onto the base of the jacket with your other hand.
You do not want the wires to become untwisted down inside the jacket. Category 5 cable must
only have 1/2 of an inch of 'untwisted' wire at the end; otherwise it will be 'out of spec'. At this
point, you obviously have ALOT more than 1/2 of an inch of un-twisted wire.
3. You have 2 end jacks, which must be installed on your cable. If you are using a pre-made
cable, with one of the ends whacked off, you only have one end to install - the crossed over end.
Below are two diagrams, which show how you need to arrange the cables for each type of cable
end. Decide at this point which end you are making and examine the associated picture below.
Networking Components:-
Computer networks components comprise both Hardware parts as well as
the software parts required for installing computer networks, both at organizations and at home. The
hardware components are the server, client, peer, transmission medium, and connecting devices. The
software components are operating system and protocols.
Hardware Components:-
1. Routers
2. Hub
3. Switch
4. Bridge
5. Repeater
6. Gateway
Software Components:-
Operating System − Network Operating Systems is typically installed in the
server and facilitate workstations in a network to share files, database,
applications, printers etc.
Protocol Suite − A protocol is a rule or guideline followed by each computer for
data communication. Protocol suite is a set of related protocols that are laid down
for computer networks. The two popular protocol suites are−
OSI Model ( Open System Interconnections)
TCP / IP Model.
LAN Adapter:-
A LAN adapter is an expansion board that is used to connect a computer or computing device to a
network.
LAN ADAPTER
Networking Devices
Router:-
Routers are networking devices operating at layer 3 or a network layer of the
OSI model. They are responsible for receiving, analyzing, and forwarding data packets
among the connected computer networks.
Working of Hubs:-When a h
Switch:-
A switch is a Networking device in a computer network that connects other
devices together. Multiple data cables are plugged into a switch to enable
communication between
different networked devices.
been sent.
Bridge:-
Bridge is termed as a network device which is helpful in filtering the data load of the traffic by dividing
it into segments or packets. They are used to lower the load of traffic on the LAN and other networks
Repeater:-
A repeater is a network device that retransmits a received signal with more power and to an extended
geographical or topological network boundary than what would be capable with the original signal repeater is
implemented in computer networks to expand the coverage area of the network, re propagate a weak or broken
signal and or service remote nodes
Gateway:-
The link between two computers to connect to internet or another
network is called gateway. The gateway works like a portal among two programs by
means of communications between protocol and
permit them to share data on same computers or
among different computers.
Experiment - 3
Aim:-Familiarization with Transmission media and Tools Coaxial cable, UTP Cable,
Crimping Tools, Connectors etc.
Transmission Medium:
A communication channel that is used to carry the data from one transmitter to the receiver through the
electromagnetic signals .The main function of this is to carry the data in the bits form through the Local Area
Network(LAN).In data communication, it works like a physical path between the sender & receiver .
Radio Transmission:
Its frequency is between 10Khz to 1Ghz. It is simple to install and has high attenuation. These
waves are used for multicast communication.
Types of propagation:
1. Troposphere
2. Ionosphere
Microwaves:
It is a line of sight transmission i.e. the sending and receiving antennas need to be properly aligned with each
other. The distance covered by the signal is directly proportional to the height of the antenna. Frequency
Range:1GHz – 300GHz. These are majorly used for mobile phone communication and television distribution.
Infrared:
Infrared waves are used for very short distance communication. They cannot penetrate through
obstacles. This prevents interference between systems. Frequency Range:300GHz – 400THz. It is used in TV
remotes, wireless mouse, keyboard, printer, etc.
Crimping tool:
A crimping tool is a device used to conjoin two pieces of metal by deforming one or both of them to hold each
other. The result of the tool's work is called a crimp. An example of crimping is affixing a connector to the end of a
cable. For instance, network cables and phone cables are created using a crimping tool (shown below) to join RJ-45
and RJ-11 connectors to both ends of phone or Cat 5 cable.
Connector:
A device that terminates a segment of cabling or provides a point of entry for networking devices such as
computers, hubs, and routers. Connectors can be distinguished according to their physical appearance and mating
properties, such as jacks and plugs (male connectors) or sockets and ports (female connectors).
Experiment - 4
AIM OF EXPERIMENT: Study of network IP
• Classification of IP address
• Sub netting
• Super netting
Apparatus (Software): NA
As show in figure we teach how the ip addresses are classified and when they are used.
• Sub netting
Why we Develop sub netting and How to calculate subnet mask and how to identify subnet address.
• Super netting
Why we develop super netting and How to calculate supernet mask and how to identify supernet
address.
Experiment-5
AIM OF EXPERIMENT: Create network of at least 6 computers in Local Area Network.
On the host computer, follow these steps to share the Internet connection:
1. Log on to the host computer as Administrator or as Owner.
2. Click Start, and then click Control Panel.
3. Click Network and Internet Connections.
4. Click Network Connections.
5. Right-click the connection that you use to connect to the Internet. For example, if you
connect to the Internet by using a modem, right-click the connection that you want under Dial-up
/ other network available.
6. Click Properties.
7. Click the Advanced tab.
8. Under Internet Connection Sharing, select the Allow other network users to
connect through this computer's Internet connection check box.
9. If you are sharing a dial-up Internet connection, select the Establish a dial-up connection
whenever a computer on my network attempts to access the Internet check box if you
want to permit your computer to automatically connect to the Internet.
When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP address
192.168.0. 1. Your computer may lose connectivity with other computers on your network. If
these other computers have static IP addresses, it is a good idea to set them to obtain their IP
addresses automatically. Are you sure you want to enable Internet Connection Sharing?
The network adapter that is connected to the LAN is configured with a static IP address of
192.168.0. 1 and a subnet mask of 255.255.255.0
To connect to the Internet by using the shared connection, you must confirm the LAN adapter IP
configuration, and then configure the client computer. To confirm the LAN adapter IP
configuration, follow these steps:
7. In the Internet Protocol (TCP/IP) Properties dialog box, click Obtain an IP address
automatically (if it is not already selected), and then click OK.
Note: You can also assign a unique static IP address in the range of 192.168.0.2 to
254. For example, you can assign the following static IP address, subnet mask, and default gateway:
8. IP Address 192.168.31.202
9. Subnet mask 255.255.255.0
10. Default gateway 192.168.31.1
11. In the Local Area Connection Properties dialog box, click OK.
All commands related to Network configuration which includes how to switch to privilege mode
and normal mode and how to configure router interface and how to save this configuration to
flash memory or permanent memory.
ping:
ping(8) sends an ICMP ECHO_REQUEST packet to the specified host. If the host responds, you get
an ICMP packet back. Sound strange? Well, you can “ping” an IP address to see if a machine is
alive. If there is no response, you know something is wrong.
Traceroute:
Tracert is a command which can show you the path a packet of information takes from your
computer to one you specify.
nslookup:
pathping:
A better version of tracert that gives you statics about packet lost and latency.
Experiment-7
Topology Diagram
Objectives
Configure the router host name.
Configure passwords.
Configure banner messages.
Verify the router configuration.
Background / Preparation
In this activity, you will use the Cisco IOS CLI to apply an initial configuration to a router, including host
name, passwords, a message-of-the-day (MOTD) banner, and other basic settings.
Note: Some of the steps are not graded by Packet Tracer.
Router>enable
Router#configure terminal
Router(config)#hostname CustomerRouter
CustomerRouter(config)#line console 0
Set the password to cisco123, require that the password be entered at login, and then exit line configuration mode.
CustomerRouter(config-line)#password cisco123
CustomerRouter(config-line)#login
CustomerRouter(config-line)#exit
CustomerRouter(config)#
Step 4: Configure the vty password to allow Telnet access to the router.
a. In global configuration mode, switch to line configuration mode to specify the vty
lines.
CustomerRouter(config)#line vty 0 4
Set the password to cisco123, require that the password be entered at login, exit line configuration mode, and then
exit the configuration session.
CustomerRouter(config-line)#password cisco123
CustomerRouter(config-line)#login
CustomerRouter(config-line)#exit
CustomerRouter(config)#
Step 5: Configure password encryption, a MOTD banner, and turn off domain server lookup.
a. Currently, the line passwords and the enable password are shown in clear text when you showthe
running configuration. Verify this now by entering the show running-config command.
To avoid the security risk of someone looking over your shoulder and reading the passwords, encrypt
all clear text passwords.
CustomerRouter(config)#service password-encryption
Use the show running-config command again to verify that the passwords are encrypted.
To provide a warning when someone attempts to log in to the router, configure a MOTD banner.
CustomerRouter>emable
Translating "emable"...domain server (255.255.255.255)
To prevent this from happening, use the following command to stop all DNS lookups from the
router CLI.
CustomerRouter(config)#no ip domain-lookup
CustomerRouter(config)#end
CustomerRouter#copy run start
Objectives
Configure routers using basic interface configuration commands.
Enable RIP.
Verify the RIP configuration.
Background / Preparation
A simple routed network has been set up to assist in reviewing RIP routing behavior. In this activity, you will
configure RIP across the network and set up end devices to communicate on the network.
EXPERIMENT-9
Aim:- Study of various LAN topologies and their creation using network
devices, cables and Computer.
Topology is derived from two Greek words topo and logy, where topo means 'place' and logy means 'study'. In
computer networks, a topology is used to explain how a network is physically connected and the logical flow
of information in the network. A topology mainly describes how devices are connected and interact with each
other using communication links.
In a computer network, there are mainly six types of physical topology, they
are:
1. Bus Topology
2. Ring Topology
3. Star Topology
4. Mesh Topology
5. Tree Topology
6. Hybrid Topology
1. Bus Topology:
Bus topology is the simplest kind of topology in which a common bus or channel is used for
communication in the network. The bus is connected to various taps and droplines. Taps are the connectors, while
droplines are the cables connecting the bus with the computer. In other words, there is only a single transmission
line for all nodes.
Bus Topology
2. Ring Topology :
Ring topology is a topology in which each computer is connected to exactly two other
computers to form the ring. The message passing is unidirectional and circular in nature. This network topology is
deterministic in nature, i.e., each computer is given access for transmission at a fixed time interval. All the nodes
are connected in a closed-loop. This topology mainly works on a token-based system and the token travels in a loop
in one specific direction.
Ring Topology
3. Star Topology :
Star topology is a computer network topology in which all the nodes are connected to a
centralized hub. The hub or switch acts as a middleware between the nodes. Any node requesting for service or
providing service, first contact the hub for communication. The central device(hub or switch) has point to point
communication link(the dedicated link between the devices which can not be accessed by some other computer)
with the devices.
Star Topology
4. Mesh Topology :
Mesh topology is a computer network topology in which nodes are interconnected with each other. In other words,
direct communication takes place between the nodes in the network.
EXPERIMENT-10
Aim:-Configuration of TELNET protocols on router for remote access.
Telnet protocol:
Telnet is an application protocol that allows a user to communicate with a remote device. A user on a client
machine can use a software (known as a Telnet client) to access a command-line interface of another, remote
machine that is running a Telnet server program.Telnet is often used by network administrators to access and
manage remote devices. A network administrator can access the device by telnetting to the IP address or hostname
of a remote device. The network administrator will then be presented with a virtual terminal that can interact with
the remote host. To use telnet, you must have a software (Telnet client) installed. On a remote device, a Telnet
server must be installed and running.
2. configure an IP address on the switch. Unlike the routers, typically switch does
not require to be configured with an IP address. However, we need to configure
an IP address on the switch’s VLAN 1 interface.
The following commands will configure 10.0.0.1/8 IP address on the VLAN 1 interface.
Switch1(config)#interface vlan 1
Switch1(config-if)#ip address 10.0.0.1 255.0.0.0
Switch1(config-if)#no shutdown
Switch1(config-if)#exit
3. Once you have configured the appropriate hostname and IP address on the switch,
execute the following commands to enable the Telnet protocol.
Switch1(config)#line vty 0 4
Switch1(config-line)#password 123456
Switch1(config-line)#login Switch1(config-
line)#exit
5. In the preceding commands, vty −means virtual terminal and 0 4 means ─total five
mm(0 to 4) users can access the switch remotely at a time. 123456 is the password that
the remote users need to know in order to connect to the switch.
The network administrator wants to use his computer (Host A) to access and manage the router (R1). The
administrator will start a Telnet client program on Host A and enter the IP address of the router R1 (telnet
10.0.0.1):
The administrator can now manage the remote device (R1) from his own computer.
Although Telnet is simple and easy to use, it is not widely used anymore, especially in production environments. This is
because Telnet sends all data in clear-text, including usernames and passwords! SSH is commonly used today
instead of Telnet. Telnet is only used if SSH is not available on the device, for example on some older Cisco
equipment.
5. Tree Topology:
Tree topology is a computer network topology in which all the nodes are directly or
indirectly connected to the main bus cable. Tree topology is a combination of Bus and Star topology. In a tree
topology, the whole network is divided into segments, which can be easily managed and maintained. There is a
main hub and all the other sub-hubs are connected to each other in this topology.
Tree Topology
6. Hybrid Topology:
A Hybrid topology is a computer topology which is a combination of two or more
topologies. In practical use, they are the most widely used.
In this topology, all topologies are interconnected according to the needs to form a hybrid. All the good features of
each topology can be used to make an efficient hybrid topology.
Hybrid Topology