NM - Networking Essentials Lab Manual
NM - Networking Essentials Lab Manual
Page | 1
Experiment No.: 1
Date:07.10.2024
1. Hub
Definition: A hub is a basic networking device that connects multiple
devices in a network, operating at the physical layer (Layer 1) of the
OSI model.
Functionality:
o Broadcasts data packets to all connected devices.
o Works as a multi-port repeater.
Limitations:
o Inefficient as it sends data to all devices regardless of the destination.
o Causes collisions in a network, especially in high-traffic scenarios.
Use Case: Rarely used in modern networks due to inefficiency; replaced
by switches.
2. Switch
Definition: A switch is a more advanced device that connects devices in a
network and operates at the data link layer (Layer 2), with some
switches also working at the network layer (Layer 3).
Functionality:
o Forwards data packets only to the intended recipient using MAC
addresses.
o Creates a virtual circuit for communication between devices.
Advantages:
o Reduces network congestion and collisions.
Page | 2
o Provides better performance in comparison to hubs.
Use Case: Widely used in LANs for efficient data management and
traffic control.
3. Router
Definition: A router connects multiple networks and operates at the
network layer (Layer 3).
Functionality:
o Directs data packets between networks using IP addresses.
o Determines the best path for data delivery using routing protocols
like RIP, OSPF, and BGP.
Enables communication between devices in different subnets or networks.
Advantages:
o Facilitates internet access by connecting local networks to the ISP.
o Provides advanced features like Network Address Translation (NAT),
DHCP, and firewall capabilities.
Use Case: Essential for internet connectivity and inter-
network communication.
4. Access Point (AP)
Definition: An access point is a device that allows wireless devices
to connect to a wired network using Wi-Fi.
Functionality:
o Acts as a bridge between wired Ethernet and wireless clients.
o Provides features like SSID broadcast, encryption, and
authentication.
Advantages:
o Extends the reach of a network without physical cables.
o Supports multiple devices simultaneously.
Use Case: Used in homes, offices, and public areas to provide Wi-Fi
connectivity.
5. Modem
Definition: A modem (Modulator-Demodulator) is a device that connects a
network to the internet by converting digital signals to analog and vice versa.
Functionality:
o Communicates with the ISP through telephone lines, coaxial cables,
or fiber optics.
Page | 3
o Modulates outgoing signals and demodulates incoming signals.
Types:
o DSL Modem, Cable Modem, and Fiber Optic Modem.
Use Case: Primary device for connecting home or office networks to the
internet.
6. Gateway
Definition: A gateway is a networking device that connects two
networks with different protocols.
Functionality:
Page | 4
Use Case: Used in long-distance communication networks to prevent signal
loss.
9. Bridge
Definition: A bridge connects two or more network segments and
operates at the data link layer (Layer 2).
Functionality:
o Filters traffic based on MAC addresses.
o Divides a large network into smaller, manageable segments.
Use Case: Suitable for reducing traffic in small networks.
Page | 5
IP Address: 192.168.1.20
Output:
Page | 6
Page | 7
Result:
Page | 8
Experiment No.: 2
Date:14.10.2024
Aim:
To assign IP addresses to devices and perform subnetting.
Tools Required:
Cisco Packet Tracer / Physical Devices.
Theory:
IP (Internet Protocol) Addressing is the method of assigning unique numerical
identifiers to devices on a network to enable communication. An IP address serves
two main purposes:
Identification: Identifies the host (device) on the network.
Page | 9
Subnetting
Subnetting is the process of dividing a large network into smaller, manageable
subnetworks (subnets). It optimizes the use of IP addresses and improves network
efficiency.
Purpose of Subnetting:
Efficient IP Address Utilization.
Network Performance Optimization.
Enhanced Security and Isolation.
Subnet Masks
A subnet mask is used to determine which portion of an IP address belongs to the
network and which portion belongs to the host.
Example:
IP Address: 192.168.1.1
Subnet Mask: 255.255.255.0
In binary:
IP Address: 11000000.10101000.00000001.00000001
Subnet Mask: 11111111.11111111.11111111.00000000
Here:
Network Portion: 192.168.1.
Host Portion: 1
Subnetting Steps
1. Identify Network Requirements:
o Number of subnets.
o Hosts per subnet.
2. Calculate Subnet Mask:
o Use the formula: 2n≥Number of Subnets2^n \geq \text{Number of
Subnets}2n≥Number of Subnets, where nnn is the number of bits
borrowed.
o Subnet mask updates based on borrowed bits.
3. Determine Subnet Ranges:
o Calculate network address, broadcast address, and usable IP range
for each subnet.
Example Subnetting for 192.168.1.0/24:
Borrow 2 bits → New Subnet Mask: /26 → 255.255.255.192.
Page | 10
Number of Subnets: 22=42^2 = 422=4.
Subnet Ranges:
o Subnet 1: 192.168.1.0 – 192.168.1.63 (Usable: 192.168.1.1 –
192.168.1.62).
o Subnet 2: 192.168.1.64 – 192.168.1.127 (Usable: 192.168.1.65 –
192.168.1.126).
Benefits of Subnetting
Efficient IP Allocation: Prevents wastage of IP addresses.
Enhanced Security: Isolates sensitive sections of the network.
o Router2:
Connect to Switch2 using a crossover cable.
Connect PC2 to Switch2 using a straight-through cable.
Step 3: Configure Router Interfaces
1. Click on Router1:
Page | 11
o Go to the CLI tab and configure the interface:
enable
configure terminal
interface GigabitEthernet0/0
ip address 192.168.1.1 255.255.255.192
no shutdown
exit
2. Click on Router2:
o Go to the CLI tab and configure the interface:
enable
configure terminal
interface GigabitEthernet0/0
ip address 192.168.1.65 255.255.255.192
no shutdown
exit
o Set:
IP Address: 192.168.1.66
Page | 12
o Expected output: Successful ping replies.
Simulation Output:
Page | 13
Page | 14
Page | 15
Result:
Thus the IP was configured for various networks devices like switches, routers
and the connectivity was verified from the end users.
Page | 16
Experiment No.: 3
Date:21.10.2024
Configuring VLANs
Aim:
To understand and configure VLANs on a switch.
Tools Required:
Cisco Packet Tracer / Physical Devices.
Theory:
A Virtual Local Area Network (VLAN) is a logical grouping of devices within a
physical network. VLANs allow devices to communicate as if they are on the same
network, even if they are physically separated. They enable the segmentation of a
network into smaller, isolated sections.
Purpose of VLANs
Traffic Segmentation: Separate traffic between different departments (e.g.,
HR, IT, Finance).
Enhanced Security: Prevent unauthorized access by isolating sensitive data.
Improved Network Performance: Reduce broadcast domains, limiting
unnecessary traffic.
Flexibility: Devices can be grouped logically instead of physically.
Simplified Administration: Easier to manage and reconfigure networks.
VLAN Types
1. Default VLAN:
o Every port on a switch belongs to the default VLAN (VLAN 1) initially.
2. Data VLAN:
o Used for carrying user-generated data.
3. Voice VLAN:
o Dedicated for voice traffic, ensuring low latency and priority.
4. Management VLAN:
o Used to manage network devices like switches and routers.
5. Native VLAN:
o A VLAN that carries untagged traffic on trunk ports.
Page | 17
VLAN Identification
VLAN Communication
Devices within the same VLAN can communicate directly.
Devices in different VLANs require a Layer 3 device (e.g., a router or a Layer
3 switch) for inter-VLAN routing.
Benefits of VLANs
1. Improved Security: Sensitive traffic (e.g., HR) is isolated.
Procedure:
Step 1: Open Packet Tracer
1. Launch Cisco Packet Tracer and create a new file.
Page | 18
Step 2: Place Devices
1. PC1:
o Go to the Desktop tab > IP Configuration.
o Set:
IP Address: 192.168.1.1
Subnet Mask: 255.255.255.0
2. PC2:
o Go to the Desktop tab > IP Configuration.
o Set:
IP Address: 192.168.1.2
configure terminal
# Create VLAN 10 for HR
vlan 10
Page | 19
name HR
exit
Step 7: Verify VLAN Configuration
Page | 20
2. On PC1, ping PC3 (192.168.2.1).
Page | 21
Page | 22
Page | 23
Ping within the same VLANs (Ping Successful)
Result:
Thus, the VLANs on a switch was configured and the data transmission has
been tested within the VLANs and with different VLANs.
Page | 24
Experiment No.: 4
Date:04.11.2024
DHCP Configuration
Aim:
To configure and verify a DHCP server.
Tools Required:
Cisco Packet Tracer / Physical Devices.
Theory:
The Dynamic Host Configuration Protocol (DHCP) is a network management
protocol used to automatically assign IP addresses and other network configuration
parameters (like subnet masks, default gateways, and DNS servers) to devices on a
network. This eliminates the need for manual configuration, making network
administration more efficient.
Purpose of DHCP
1. DHCP Server:
2. DHCP Client:
o Any device (e.g., a PC, smartphone, IoT device) that requests network
configuration from a DHCP server.
3. IP Address Pool:
Page | 25
4. Lease Time:
1. DHCP Discovery:
2. DHCP Offer:
3. DHCP Request:
Rebinding: If a lease renewal fails, the client will attempt to rebind with
another DHCP server.
DHCP Parameters
4. DNS Server: IP of the server that resolves domain names into IP addresses.
Page | 26
DHCP Modes
1. Dynamic Allocation:
2. Automatic Allocation:
o Specific IPs are reserved for specific devices (based on MAC address).
Advantages of DHCP
Disadvantages of DHCP
Dependency on DHCP Server: If the server fails, new devices cannot obtain
IP addresses.
Dynamic Addresses: May cause issues for devices requiring static IPs.
Procedure:
Step 1:
Page | 27
Step 2: Configure DHCP on the Router
enable
configure terminal
255.255.255.0
default-router 192.168.2.1
dns-server 8.8.8.8
interface: exit
no shutdown
mode: exit
Page | 28
Page | 29
o Open Control Panel > Network and Sharing Center > Change
Adapter Settings.
ipconfig
ping 192.168.2.1
Page | 30
Simulation Output
Page | 31
Page | 32
Page | 33
Pinging the router from PC1
Page | 34
Pinging external site to check the internet connectivity
Result:
Thus, the DHCP server was configured and pinged with DHCP server and
external server for checking the connectivity.
Page | 35
Experiment No.: 5
Date:11.11.2024
Aim:
To assign IP addresses to devices and perform subnetting.
Tools Required:
Cisco Packet Tracer / Physical Devices.
Theory:
Routing is a critical component of networking, determining how data packets travel
from a source to a destination across interconnected devices and networks. To
achieve this, routers maintain a routing table, which stores information about
available paths. Routing can be implemented using Static Routing or Dynamic
Routing, each serving distinct needs and use cases.
Static Routing
Definition:
Static routing is a method where routes are manually configured and added to the
routing table by a network administrator. It is predefined and remains constant
unless explicitly modified.
Characteristics:
3. Fixed Paths: Traffic always follows the specified path, irrespective of network
conditions.
1. Predictability:
2. Simplicity:
Page | 36
3. No Overhead:
4. Enhanced Security:
1. High Maintenance:
2. No Adaptability:
3. Scalability Issues:
Small Networks: Ideal for networks with limited devices or a simple topology.
Specific Scenarios: For routes requiring strict control over traffic flow.
2. Command on Router 1:
Page | 37
Dynamic Routing
Definition:
Dynamic routing involves the use of protocols that automatically discover and
maintain routes in the network. Routers exchange routing information and adjust
their tables based on network changes.
Characteristics:
1. Automatic Learning:
2. Adaptability:
3. Routing Protocols:
o Uses protocols like RIP, OSPF, EIGRP, and BGP for route management.
1. Scalability:
2. Fault Tolerance:
3. Ease of Management:
1. Resource Usage:
2. Less Predictable:
Page | 38
3. Complex Configuration:
o Distance-vector protocol.
o Link-state protocol.
o Path-vector protocol.
2. Command on Router 1:
router rip
version 2
network 192.168.1.0
network 192.168.2.0
Page | 39
Comparison of Static and Dynamic Routing
Hybrid Approach
In many networks, both static and dynamic routing are used together. Static routes
can provide backup paths or specific configurations, while dynamic routing handles
complex and fluctuating environments.
Conclusion
Static Routing offers simplicity and control but is best suited for small or
stable networks.
Procedure:
Configure Router1
enable
configure terminal
Page | 40
2. Assign IP Address to Interfaces:
no shutdown
no shutdown
3. Static Routing:
end
write memory
Configure Router2
enable
configure terminal
2. Assign IP Address to
Interfaces:
Page | 41
Page | 42
ip address 192.168.2.1 255.255.255.0
no shutdown
no shutdown
3. Static Routing:
end
write memory
Example:
ping 192.168.2.2
1. Enable RIP on
Router1: enable
configure terminal
router rip
version 2
Page | 43
network 192.168.1.0
network 10.0.0.0
end
write memory
2. Enable RIP on
Router2: enable
configure terminal
router rip
version 2
network 192.168.2.0
network 10.0.0.0
end
write memory
show ip route
2. Ping End-to-End:
ping 192.168.2.2
ping 192.168.1.2
Page | 44
Simulation Output:
Configuration at Router 1
Configuration at Router 2
Page | 45
IP Routes at Router 1
IP Routes at Router 2
Page | 46
Result:
Thus, the static and dynamic routing was performed using packet tracer and
the connectivity was verified between the hosts.
Page | 47
Experiment No.: 6
Date:18.11.2024
LAN Configuration
Aim:
To configure the Local Area Network using packet tracer.
Tools Required:
Cisco Packet Tracer / Physical Devices.
Theory:
A Local Area Network (LAN) is a network of computers and other devices that are
connected within a limited geographic area, such as a home, office, or campus. LANs
are typically used to share resources like files, printers, and internet access among
connected devices.
1. Geographical Scope:
2. Speed:
o LANs offer high data transfer rates, often ranging from 10 Mbps to 10
Gbps, making them ideal for high-speed data sharing and resource
access.
3. Connection Medium:
o LANs can use wired connections (like Ethernet cables and fiber optics)
or wireless connections (Wi-Fi).
Page | 48
4. Resource Sharing:
o Devices within a LAN can share resources like files, printers, and
internet access.
5. Low Latency:
Types of LANs
o Ethernet is the most common technology used for wired LANs, where
devices are connected using Ethernet cables (Cat5e, Cat6, or fiber
cables).
o The most common topology is the Star Topology, where devices are
connected to a central network switch.
Components of a LAN
1. Devices:
Page | 49
o Routers: Routers are used to route data between different networks,
such as between a LAN and the internet. They operate at the Network
Layer (Layer 3) of the OSI model and assign IP addresses to devices
within the LAN.
2. Transmission Media:
o Wired Media: Typically, Ethernet cables (Cat5, Cat6, etc.) are used to
connect devices within the LAN. Fiber optics may also be used for
high- speed connections.
LAN Topologies
1. Bus Topology:
o In bus topology, all devices are connected to a single central cable (the
bus).
o It is less common now due to issues like data collisions and network
failures affecting all devices if the bus cable is damaged.
2. Star Topology:
o This is the most common LAN topology. In star topology, each device
is connected to a central device, such as a switch or hub.
Page | 50
3. Ring Topology:
o Data travels in one direction around the ring. While it is reliable, it can
be prone to network failure if one device or connection is broken.
4. Mesh Topology:
Advantages of LANs
1. Resource Sharing:
2. High-Speed Communication:
o Due to the high data transfer rates, LANs enable fast communication
between devices.
3. Centralized Management:
4. Security:
5. Low Cost:
Page | 51
Disadvantages of LANs
1. Limited Range:
2. Network Congestion:
3. Security Threats:
Applications of LANs
1. Office Networks:
2. Home Networks:
3. Educational Institutions:
4. Data Centers:
Page | 52
Page | 53
Procedure:
1. Create a Topology
IP Address: 192.168.1.10
o IP Address: 192.168.1.11
3. Verify Connectivity
1. Test the connection between the PCs using the ping command:
o Type:
ping 192.168.1.11
Page | 54
o If the connection is successful, you should see replies like:
Simulation Output:
Page | 55
Page | 56
Page | 57
Page | 58
Change the Default Gateway (in all the PC’s)
Result:
Thus, the LAN network was created and the data was pinged from one PC to
an another.
Page | 59
LIST OF VIVA QUESTIONS
2. Define the term "network topology" and list some common types.
7. What is the role of the Data Link layer in the OSI model?
10. How does the Application layer work in the OSI model?
Networking Devices
19. Define a network repeater and its role in extending network range.
Page | 60
23. Explain the structure of an IPv4 address.
Routing
40. What are routing metrics? How are they used in determining the best route?
43. What is the difference between an access port and a trunk port in VLANs?
Page | 61
47. What is a Layer 2 switch? How does it differ from a Layer 3 switch?
48. What is Spanning Tree Protocol (STP) and how does it prevent network loops?
49. What is the difference between static VLANs and dynamic VLANs?
Page | 62