0% found this document useful (0 votes)
8 views62 pages

NM - Networking Essentials Lab Manual

The document outlines a series of experiments focused on networking concepts, including the exploration of various network devices, IP addressing and subnetting, and VLAN configuration. Each experiment includes aims, required tools, theoretical background, procedures, and expected results. The document serves as a practical guide for understanding and implementing fundamental networking principles using tools like Cisco Packet Tracer.

Uploaded by

Vijay Anand
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views62 pages

NM - Networking Essentials Lab Manual

The document outlines a series of experiments focused on networking concepts, including the exploration of various network devices, IP addressing and subnetting, and VLAN configuration. Each experiment includes aims, required tools, theoretical background, procedures, and expected results. The document serves as a practical guide for understanding and implementing fundamental networking principles using tools like Cisco Packet Tracer.

Uploaded by

Vijay Anand
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 62

Index

S. No Date Name of the Experiment Page no. Signature

1 07.10.24 Exploring various Network Devices 2

2 14.10.24 IP Addressing and Subnetting 9

3 21.10.24 Configuring VLANs 17

4 04.11.24 DHCP Configuration 26

5 11.11.24 Static and Dynamic Routing 36

6 18.11.24 LAN Configuration 47

Page | 1
Experiment No.: 1
Date:07.10.2024

Exploring various Network Devices


Aim:
To identify and configure basic networking devices like switches, routers,
and hubs.
Tools Required:
 Cisco Packet Tracer / Physical Devices (Switch, Router, PC).
 Ethernet cables.
Theory:
Networking devices are hardware components used to connect computers,
peripherals, and other devices in a network to enable communication, data sharing,
and internet access. Below is a detailed overview of common networking devices:

1. Hub
 Definition: A hub is a basic networking device that connects multiple
devices in a network, operating at the physical layer (Layer 1) of the
OSI model.

 Functionality:
o Broadcasts data packets to all connected devices.
o Works as a multi-port repeater.

 Limitations:
o Inefficient as it sends data to all devices regardless of the destination.
o Causes collisions in a network, especially in high-traffic scenarios.
 Use Case: Rarely used in modern networks due to inefficiency; replaced
by switches.
2. Switch
 Definition: A switch is a more advanced device that connects devices in a
network and operates at the data link layer (Layer 2), with some
switches also working at the network layer (Layer 3).

 Functionality:
o Forwards data packets only to the intended recipient using MAC
addresses.
o Creates a virtual circuit for communication between devices.
 Advantages:
o Reduces network congestion and collisions.

Page | 2
o Provides better performance in comparison to hubs.
 Use Case: Widely used in LANs for efficient data management and
traffic control.
3. Router
 Definition: A router connects multiple networks and operates at the
network layer (Layer 3).
 Functionality:
o Directs data packets between networks using IP addresses.
o Determines the best path for data delivery using routing protocols
like RIP, OSPF, and BGP.
Enables communication between devices in different subnets or networks.

 Advantages:
o Facilitates internet access by connecting local networks to the ISP.
o Provides advanced features like Network Address Translation (NAT),
DHCP, and firewall capabilities.
 Use Case: Essential for internet connectivity and inter-
network communication.
4. Access Point (AP)
 Definition: An access point is a device that allows wireless devices
to connect to a wired network using Wi-Fi.
 Functionality:
o Acts as a bridge between wired Ethernet and wireless clients.
o Provides features like SSID broadcast, encryption, and
authentication.
 Advantages:
o Extends the reach of a network without physical cables.
o Supports multiple devices simultaneously.
 Use Case: Used in homes, offices, and public areas to provide Wi-Fi
connectivity.
5. Modem
 Definition: A modem (Modulator-Demodulator) is a device that connects a
network to the internet by converting digital signals to analog and vice versa.
 Functionality:
o Communicates with the ISP through telephone lines, coaxial cables,
or fiber optics.

Page | 3
o Modulates outgoing signals and demodulates incoming signals.

 Types:
o DSL Modem, Cable Modem, and Fiber Optic Modem.
 Use Case: Primary device for connecting home or office networks to the
internet.
6. Gateway
 Definition: A gateway is a networking device that connects two
networks with different protocols.
 Functionality:

o Acts as an entry/exit point for data traveling between networks.


o Translates data from one protocol to another (e.g., IP to IPX).
 Advantages:
o Provides interoperability between different network architectures.

o Ensures secure and controlled access between networks.


 Use Case: Used in enterprise networks to link different systems or in IoT
setups to connect devices using various protocols.
7. Firewall
 Definition: A firewall is a security device that monitors and controls
network traffic based on predefined rules, operating at the network or
transport layers.
 Functionality:
o Protects the network from unauthorized access and cyber threats.
o Implements rules to filter packets based on IP addresses, ports, and
protocols.
 Types:
o Hardware Firewall, Software Firewall, and Cloud Firewall.
 Use Case: Integral to secure networking in corporate environments
and personal systems.
8. Repeater
 Definition: A repeater is a device that amplifies and retransmits signals to
extend the range of a network.
 Functionality:
o Operates at the physical layer (Layer 1).
o Regenerates weakened signals to maintain data integrity.

Page | 4
 Use Case: Used in long-distance communication networks to prevent signal
loss.
9. Bridge
 Definition: A bridge connects two or more network segments and
operates at the data link layer (Layer 2).
 Functionality:
o Filters traffic based on MAC addresses.
o Divides a large network into smaller, manageable segments.
 Use Case: Suitable for reducing traffic in small networks.

10. Network Interface Card (NIC)


 Definition: A NIC is a hardware component embedded in or connected to a
device to enable network communication.
 Functionality:
o Provides a physical interface for wired or wireless connectivity.
o Has a unique MAC address for identification.
 Use Case: Present in all networked devices, including computers and
servers.
Procedure:
1. Setup Devices:

o Place a switch and two PCs on the workspace (physical or virtual).


o Connect PC1 and PC2 to the switch using Ethernet cables.
2. Basic Configuration on Switch:
o Access the switch using the console port via a terminal emulator (e.g.,
PuTTY or Packet Tracer CLI).
o Enter privileged EXEC mode:
enable
o Configure the hostname:
configure terminal
hostname Switch1
3. IP Configuration on PCs:

o On PC1, set an IP address:


IP Address: 192.168.1.10
Subnet Mask: 255.255.255.0
o On PC2, set an IP address:

Page | 5
IP Address: 192.168.1.20

Subnet Mask: 255.255.255.0


4. Test Connectivity:
o Use ping to check connectivity between PC1 and PC2:
ping 192.168.1.20

Output:

Page | 6
Page | 7
Result:

Thus the devices communicated successfully with the configured IPs.

Page | 8
Experiment No.: 2
Date:14.10.2024

IP Addressing and Subnetting

Aim:
To assign IP addresses to devices and perform subnetting.

Tools Required:
 Cisco Packet Tracer / Physical Devices.
Theory:
IP (Internet Protocol) Addressing is the method of assigning unique numerical
identifiers to devices on a network to enable communication. An IP address serves
two main purposes:
 Identification: Identifies the host (device) on the network.

 Location Addressing: Specifies the location of the device in the


network. IP addresses are divided into two main types:
 IPv4: 32-bit address written in dotted decimal format (e.g., 192.168.1.1).

 IPv6: 128-bit address written in hexadecimal format (e.g.,


2001:0db8:85a3:0000:0000:8a2e:0370:7334).
IPv4 Addressing
An IPv4 address consists of four octets (8 bits each), separated by dots. Each octet
can have a value from 0 to 255.
Structure of IPv4 Address:

 Network Portion: Identifies the network.


 Host Portion: Identifies the device within the network.

Classes of IPv4 Addresses:

Class Range Default Subnet Mask Purpose

A 0.0.0.0 – 127.255.255.255 255.0.0.0 Large networks

B 128.0.0.0 – 191.255.255.255 255.255.0.0 Medium-sized networks

C 192.0.0.0 – 223.255.255.255 255.255.255.0 Small networks

D 224.0.0.0 – 239.255.255.255 N/A Multicast

E 240.0.0.0 – 255.255.255.255 N/A Reserved

Page | 9
Subnetting
Subnetting is the process of dividing a large network into smaller, manageable
subnetworks (subnets). It optimizes the use of IP addresses and improves network
efficiency.

Purpose of Subnetting:
 Efficient IP Address Utilization.
 Network Performance Optimization.
 Enhanced Security and Isolation.

Subnet Masks
A subnet mask is used to determine which portion of an IP address belongs to the
network and which portion belongs to the host.
Example:
 IP Address: 192.168.1.1
 Subnet Mask: 255.255.255.0
In binary:

 IP Address: 11000000.10101000.00000001.00000001
 Subnet Mask: 11111111.11111111.11111111.00000000
Here:
 Network Portion: 192.168.1.

 Host Portion: 1
Subnetting Steps
1. Identify Network Requirements:
o Number of subnets.
o Hosts per subnet.
2. Calculate Subnet Mask:
o Use the formula: 2n≥Number of Subnets2^n \geq \text{Number of
Subnets}2n≥Number of Subnets, where nnn is the number of bits
borrowed.
o Subnet mask updates based on borrowed bits.
3. Determine Subnet Ranges:
o Calculate network address, broadcast address, and usable IP range
for each subnet.
Example Subnetting for 192.168.1.0/24:
 Borrow 2 bits → New Subnet Mask: /26 → 255.255.255.192.

Page | 10
 Number of Subnets: 22=42^2 = 422=4.

 Subnet Ranges:
o Subnet 1: 192.168.1.0 – 192.168.1.63 (Usable: 192.168.1.1 –
192.168.1.62).
o Subnet 2: 192.168.1.64 – 192.168.1.127 (Usable: 192.168.1.65 –
192.168.1.126).
Benefits of Subnetting
 Efficient IP Allocation: Prevents wastage of IP addresses.
 Enhanced Security: Isolates sensitive sections of the network.

 Improved Performance: Reduces network congestion by segmenting traffic.


 Simplified Management: Makes troubleshooting and maintenance easier.
Tools for IP Addressing and Subnetting

 Subnet Calculator: Simplifies calculations for network administrators.


 Cisco Packet Tracer: A simulator for designing and testing networks.
By mastering IP addressing and subnetting, network administrators can design
efficient, scalable, and secure networks.
Procedure:
Step 1: Open Packet Tracer

1. Launch Cisco Packet Tracer and create a new file.


2. Drag and drop:

o Two Routers: Router1 and Router2.


o Two PCs: PC1 and PC2.
o Two Switches: One for each subnet.

Step 2: Connect Devices


1. Use cables to connect devices:
o Router1:
 Connect to Switch1 using a crossover cable.
 Connect PC1 to Switch1 using a straight-through cable.

o Router2:
 Connect to Switch2 using a crossover cable.
 Connect PC2 to Switch2 using a straight-through cable.
Step 3: Configure Router Interfaces
1. Click on Router1:

Page | 11
o Go to the CLI tab and configure the interface:
enable

configure terminal
interface GigabitEthernet0/0
ip address 192.168.1.1 255.255.255.192
no shutdown
exit

2. Click on Router2:
o Go to the CLI tab and configure the interface:
enable

configure terminal
interface GigabitEthernet0/0
ip address 192.168.1.65 255.255.255.192
no shutdown
exit

Step 4: Assign IP Addresses to PCs


1. Click on PC1:

o Go to the Desktop tab > IP Configuration.


o Set:
 IP Address: 192.168.1.2
 Subnet Mask: 255.255.255.192
 Default Gateway: 192.168.1.1
2. Click on PC2:
o Go to the Desktop tab > IP Configuration.

o Set:
 IP Address: 192.168.1.66

 Subnet Mask: 255.255.255.192


 Default Gateway: 192.168.1.65

Step 5: Test Connectivity


1. Open the Command Prompt on PC1:
o Ping 192.168.1.1 (Router1's IP).

Page | 12
o Expected output: Successful ping replies.

2. Open the Command Prompt on PC2:


o Ping 192.168.1.65 (Router2's IP).
o Expected output: Successful ping replies.
Step 6: Verify Communication
 Devices within Subnet 1 (PC1 and Router1) and Subnet 2 (PC2 and
Router2) should communicate properly. Cross-subnet communication is not
configured in this setup.

Simulation Output:

Page | 13
Page | 14
Page | 15
Result:
Thus the IP was configured for various networks devices like switches, routers
and the connectivity was verified from the end users.

Page | 16
Experiment No.: 3
Date:21.10.2024

Configuring VLANs
Aim:
To understand and configure VLANs on a switch.

Tools Required:
 Cisco Packet Tracer / Physical Devices.
Theory:
A Virtual Local Area Network (VLAN) is a logical grouping of devices within a
physical network. VLANs allow devices to communicate as if they are on the same
network, even if they are physically separated. They enable the segmentation of a
network into smaller, isolated sections.

Purpose of VLANs
 Traffic Segmentation: Separate traffic between different departments (e.g.,
HR, IT, Finance).
 Enhanced Security: Prevent unauthorized access by isolating sensitive data.
 Improved Network Performance: Reduce broadcast domains, limiting
unnecessary traffic.
 Flexibility: Devices can be grouped logically instead of physically.
 Simplified Administration: Easier to manage and reconfigure networks.

VLAN Types
1. Default VLAN:
o Every port on a switch belongs to the default VLAN (VLAN 1) initially.
2. Data VLAN:
o Used for carrying user-generated data.
3. Voice VLAN:
o Dedicated for voice traffic, ensuring low latency and priority.

4. Management VLAN:
o Used to manage network devices like switches and routers.
5. Native VLAN:
o A VLAN that carries untagged traffic on trunk ports.

Page | 17
VLAN Identification

VLANs are identified using VLAN IDs (ranging from 1 to 4094):


 VLANs 1–1005: Normal range (default configurations).
 VLANs 1006–4094: Extended range (requires VTP transparent mode).
VLAN Configuration Modes
 Access Mode:

o A port in access mode can belong to only one VLAN.


o Used for connecting end devices (e.g., PCs, printers).
 Trunk Mode:
o A port in trunk mode can carry traffic from multiple VLANs.
o Commonly used for inter-switch links.

VLAN Communication
 Devices within the same VLAN can communicate directly.
 Devices in different VLANs require a Layer 3 device (e.g., a router or a Layer
3 switch) for inter-VLAN routing.
Benefits of VLANs
1. Improved Security: Sensitive traffic (e.g., HR) is isolated.

2. Reduced Broadcast Domains: Minimizes unnecessary traffic.


3. Optimized Performance: Enhances bandwidth usage.
4. Simplified Network Management: Logical grouping of devices makes it easier
to administer.
Practical Applications
 Separating departments in an organization (e.g., HR, Finance, IT).
 Isolating guest networks from internal networks.
 Creating separate VLANs for voice and data traffic.
By using VLANs, network administrators can ensure better performance, security,
and manageability in modern networks. Proper VLAN configuration lays the
foundation for efficient and scalable network infrastructure.

Procedure:
Step 1: Open Packet Tracer
1. Launch Cisco Packet Tracer and create a new file.

Page | 18
Step 2: Place Devices

1. Drag and drop:


o 1 Switch (e.g., 2960 Switch).
o 3 PCs (PC1, PC2, and PC3).
Step 3: Connect Devices
1. Use a straight-through cable to connect:
o PC1 to FastEthernet 0/1 on the switch.
o PC2 to FastEthernet 0/2 on the switch.
o PC3 to FastEthernet 0/3 on the switch.
Step 4: Assign IP Addresses to PCs

1. PC1:
o Go to the Desktop tab > IP Configuration.
o Set:
 IP Address: 192.168.1.1
 Subnet Mask: 255.255.255.0

2. PC2:
o Go to the Desktop tab > IP Configuration.
o Set:
 IP Address: 192.168.1.2

 Subnet Mask: 255.255.255.0


3. PC3:
o Go to the Desktop tab > IP Configuration.
o Set:
 IP Address: 192.168.2.1
 Subnet Mask: 255.255.255.0
Step 5: Configure VLANs on the Switch
1. Click on the switch and go to the CLI tab.

2. Enter the following


commands: enable

configure terminal
# Create VLAN 10 for HR
vlan 10

Page | 19
name HR

# Create VLAN 20 for IT


vlan 20
name IT
exit

Step 6: Assign Ports to VLANs

1. Assign FastEthernet 0/1 and 0/2 to VLAN 10:


interface FastEthernet 0/1
switchport mode access
switchport access vlan 10
exit

interface FastEthernet 0/2


switchport mode access
switchport access vlan 10
exit
2. Assign FastEthernet 0/3 to VLAN 20:
interface FastEthernet 0/3
switchport mode access
switchport access vlan 20

exit
Step 7: Verify VLAN Configuration

1. Use the command show vlan brief to verify:


show vlan brief
Output should display:
o VLAN 10 with ports Fa0/1, Fa0/2.

o VLAN 20 with port Fa0/3.


Step 8: Test Connectivity

1. Open the Command Prompt on PC1:


o Ping PC2 (192.168.1.2).
o Expected: Ping successful (same VLAN).

Page | 20
2. On PC1, ping PC3 (192.168.2.1).

o Expected: Ping fails (different VLANs).


Simulation Output:

Page | 21
Page | 22
Page | 23
Ping within the same VLANs (Ping Successful)

Ping with different VLANs (Ping fails)

Result:
Thus, the VLANs on a switch was configured and the data transmission has
been tested within the VLANs and with different VLANs.

Page | 24
Experiment No.: 4
Date:04.11.2024

DHCP Configuration

Aim:
To configure and verify a DHCP server.

Tools Required:
 Cisco Packet Tracer / Physical Devices.
Theory:
The Dynamic Host Configuration Protocol (DHCP) is a network management
protocol used to automatically assign IP addresses and other network configuration
parameters (like subnet masks, default gateways, and DNS servers) to devices on a
network. This eliminates the need for manual configuration, making network
administration more efficient.

Purpose of DHCP

 Automatic IP Address Assignment: Reduces manual errors and saves time.

 Efficient Address Management: Dynamically reuses IP addresses, ensuring


optimal usage.

 Simplified Network Configuration: No need to manually configure every


device in the network.

Key Components of DHCP

1. DHCP Server:

o The device (e.g., a router, dedicated server, or Layer 3 switch)


responsible for assigning IP addresses.

2. DHCP Client:

o Any device (e.g., a PC, smartphone, IoT device) that requests network
configuration from a DHCP server.

3. IP Address Pool:

o The range of IP addresses the server can assign to clients.

Page | 25
4. Lease Time:

o The duration for which an IP address is assigned to a client.

How DHCP Works

1. DHCP Discovery:

o The client broadcasts a DHCP Discover message to locate available


DHCP servers.

2. DHCP Offer:

o The DHCP server responds with a DHCP Offer, including an available


IP address and other configuration details.

3. DHCP Request:

o The client requests the offered IP address by sending a DHCP Request


message.

4. DHCP Acknowledgment (ACK):

o The server confirms the assignment with a DHCP Acknowledge


message, finalizing the configuration.

DHCP Lease Process

 Lease Duration: The time for which an IP is assigned to a client. Clients


must renew the lease before it expires.

 Rebinding: If a lease renewal fails, the client will attempt to rebind with
another DHCP server.

DHCP Parameters

DHCP assigns the following parameters:

1. IP Address: Unique address for communication.

2. Subnet Mask: Defines the network portion of the IP address.

3. Default Gateway: IP of the router for external communication.

4. DNS Server: IP of the server that resolves domain names into IP addresses.

Page | 26
DHCP Modes

1. Dynamic Allocation:

o IPs are assigned dynamically and reused after lease expiration.

2. Automatic Allocation:

o IPs are assigned permanently to devices.

3. Static Allocation (DHCP Reservation):

o Specific IPs are reserved for specific devices (based on MAC address).

Advantages of DHCP

 Time-Saving: Automatically configures devices.

 Error-Free: Reduces manual configuration errors.

 Efficient IP Management: Prevents IP address conflicts.

 Scalability: Ideal for large networks with many devices.

Disadvantages of DHCP

 Dependency on DHCP Server: If the server fails, new devices cannot obtain
IP addresses.

 Dynamic Addresses: May cause issues for devices requiring static IPs.

Practical Applications of DHCP

 Home networks (e.g., routers assigning IPs to PCs and smartphones).

 Enterprise networks to manage large numbers of devices.

 IoT deployments for automated device configuration.

By automating the process of IP address assignment, DHCP simplifies network


configuration, making it an essential tool for modern networking.

Procedure:

Step 1:

Step 1: Open Packet Tracer


1. Launch Cisco Packet Tracer and create a new file.

Page | 27
Step 2: Configure DHCP on the Router

1. Access the router's Command Line Interface (CLI):

enable

configure terminal

2. Create a DHCP pool named STUDENTS:

ip dhcp pool STUDENTS

3. Define the network range for the DHCP

pool: network 192.168.2.0

255.255.255.0

4. Specify the default gateway (router IP address) for the network:

default-router 192.168.2.1

5. Set the DNS server for the clients:

dns-server 8.8.8.8

Step 3: Configure the Router Interface

1. Exit DHCP configuration mode to configure the router

interface: exit

2. Assign an IP address to the router's GigabitEthernet interface (this will serve


as the default gateway):

interface GigabitEthernet 0/0

ip address 192.168.2.1 255.255.255.0

no shutdown

3. Exit interface configuration

mode: exit

Step 4: Connect the PC to the Network

1. Connect the PC to the router using a switch or directly via a cable.

2. On the PC, set the IP settings to DHCP:

Page | 28
Page | 29
o Open Control Panel > Network and Sharing Center > Change
Adapter Settings.

o Right-click on the network adapter and select Properties.

o Select Internet Protocol Version 4 (TCP/IPv4) and click Properties.

o Choose Obtain an IP address automatically and Obtain DNS server


address automatically.

3. Save the settings.

Step 5: Verify DHCP Functionality

1. On the PC, open a command prompt and type:

ipconfig

o Confirm the PC has dynamically received an IP address in the


192.168.2.0/24 range.

o Verify the Default Gateway and the DNS Server.

2. Test network connectivity:

o Ping the router:

ping 192.168.2.1

o Ping an external site to verify internet connectivity (if connected):

Page | 30
Simulation Output

Page | 31
Page | 32
Page | 33
Pinging the router from PC1

Page | 34
Pinging external site to check the internet connectivity

Result:

Thus, the DHCP server was configured and pinged with DHCP server and
external server for checking the connectivity.

Page | 35
Experiment No.: 5
Date:11.11.2024

Static and Dynamic Routing

Aim:
To assign IP addresses to devices and perform subnetting.

Tools Required:
 Cisco Packet Tracer / Physical Devices.
Theory:
Routing is a critical component of networking, determining how data packets travel
from a source to a destination across interconnected devices and networks. To
achieve this, routers maintain a routing table, which stores information about
available paths. Routing can be implemented using Static Routing or Dynamic
Routing, each serving distinct needs and use cases.

Static Routing

Definition:

Static routing is a method where routes are manually configured and added to the
routing table by a network administrator. It is predefined and remains constant
unless explicitly modified.

Characteristics:

1. Manual Configuration: Routes must be manually entered for each


destination network.

2. No Learning Mechanism: The router does not dynamically learn new


routes or adjust to network changes.

3. Fixed Paths: Traffic always follows the specified path, irrespective of network
conditions.

Advantages of Static Routing:

1. Predictability:

o Routes are fixed, ensuring consistent traffic flow and behavior.

2. Simplicity:

o Straightforward configuration for small networks.

Page | 36
3. No Overhead:

o Does not consume CPU, memory, or bandwidth for dynamic route


calculations.

4. Enhanced Security:

o No automatic route learning minimizes vulnerability to routing attacks


like route poisoning.

Disadvantages of Static Routing:

1. High Maintenance:

o Configuration changes must be performed manually, which is tedious


in large networks.

2. No Adaptability:

o Cannot adjust automatically to network failures or topology changes.

3. Scalability Issues:

o Becomes impractical as the network grows or when managing


multiple paths.

Use Cases for Static Routing:

 Small Networks: Ideal for networks with limited devices or a simple topology.

 Backup Routes: Used as fail-safe routes in dynamic routing environments.

 Specific Scenarios: For routes requiring strict control over traffic flow.

Static Routing Configuration Example:

1. Network: Assume two networks, 192.168.1.0/24 and 192.168.2.0/24,


connected through two routers.

2. Command on Router 1:

ip route 192.168.2.0 255.255.255.0 192.168.1.2

o This route specifies that packets destined for 192.168.2.0/24 should


be forwarded to the next-hop address, 192.168.1.2.

Page | 37
Dynamic Routing

Definition:

Dynamic routing involves the use of protocols that automatically discover and
maintain routes in the network. Routers exchange routing information and adjust
their tables based on network changes.

Characteristics:

1. Automatic Learning:

o Routers dynamically learn new routes and remove unavailable ones.

2. Adaptability:

o Adjusts automatically to changes like link failures or new paths.

3. Routing Protocols:

o Uses protocols like RIP, OSPF, EIGRP, and BGP for route management.

Advantages of Dynamic Routing:

1. Scalability:

o Handles large and complex networks efficiently.

2. Fault Tolerance:

o Automatically reroutes traffic in case of link or device failures.

3. Ease of Management:

o Reduces the administrative burden of manual route updates.

Disadvantages of Dynamic Routing:

1. Resource Usage:

o Requires more CPU, memory, and bandwidth for routing calculations


and updates.

2. Less Predictable:

o Routes can change dynamically, making traffic flow less predictable.

Page | 38
3. Complex Configuration:

o Initial setup and troubleshooting can be challenging.

Common Dynamic Routing Protocols:

1. RIP (Routing Information Protocol):

o Distance-vector protocol.

o Suitable for small networks.

o Uses hop count as the metric (max 15 hops).

2. OSPF (Open Shortest Path First):

o Link-state protocol.

o Suitable for large networks.

o Uses cost as the metric based on bandwidth.

3. EIGRP (Enhanced Interior Gateway Routing Protocol):

o Hybrid protocol (Cisco proprietary).

o Combines features of distance-vector and link-state protocols.

4. BGP (Border Gateway Protocol):

o Path-vector protocol.

o Used for inter-domain routing on the internet.

Dynamic Routing Configuration Example (RIP):

1. Network: Assume two networks, 192.168.1.0/24 and 192.168.2.0/24,


connected through two routers.

2. Command on Router 1:

router rip

version 2

network 192.168.1.0

network 192.168.2.0

Page | 39
Comparison of Static and Dynamic Routing

Aspect Static Routing Dynamic Routing

Configuration Manual Automatic

Scalability Limited High

Adaptability Does not adapt to changes Automatically adjusts

Resource Usage Low High


Fault Automatically finds alternate
None
Tolerance paths
High (administrator-
Control Lower (protocol-controlled)
controlled)
Best Use Case Small or stable networks Large or dynamic networks

Hybrid Approach

In many networks, both static and dynamic routing are used together. Static routes
can provide backup paths or specific configurations, while dynamic routing handles
complex and fluctuating environments.

Conclusion

 Static Routing offers simplicity and control but is best suited for small or
stable networks.

 Dynamic Routing provides scalability and adaptability, making it essential


for larger or frequently changing networks.
Understanding the strengths and limitations of both methods is critical for
designing efficient and reliable networks.

Procedure:

Configure Router1

1. Access Router1 via CLI:

o Use console access or SSH.

enable

configure terminal

Page | 40
2. Assign IP Address to Interfaces:

o Assign IP addresses to Router1's interfaces connected to the LAN and


the link to Router2.

interface GigabitEthernet 0/0

ip address 192.168.1.1 255.255.255.0

no shutdown

interface vlan1 0/0/0

ip address 10.0.0.1 255.255.255.252

no shutdown

3. Static Routing:

o Configure a static route to reach the 192.168.2.0/24 network via


Router2.

ip route 192.168.2.0 255.255.255.0 10.0.0.2

4. Exit Configuration Mode:

end

write memory

Configure Router2

1. Access Router2 via CLI:

o Use console access or SSH.

enable

configure terminal

2. Assign IP Address to
Interfaces:

o Assign IP addresses to Router2's interfaces connected to the LAN and


the link to Router1.

interface GigabitEthernet 0/0

Page | 41
Page | 42
ip address 192.168.2.1 255.255.255.0

no shutdown

interface Serial 0/0/0

ip address 10.0.0.2 255.255.255.252

no shutdown

3. Static Routing:

o Configure a static route to reach the 192.168.1.0/24 network via


Router1.

ip route 192.168.1.0 255.255.255.0 10.0.0.1

4. Exit Configuration Mode:

end

write memory

3. Test Static Routing

 Use ping from a host in 192.168.1.0/24 to a host in 192.168.2.0/24 to


verify connectivity.

 Example:

ping 192.168.2.2

4. Configure Dynamic Routing (RIP)

1. Enable RIP on

Router1: enable

configure terminal

router rip

version 2

Page | 43
network 192.168.1.0

network 10.0.0.0

end

write memory

2. Enable RIP on

Router2: enable

configure terminal

router rip

version 2

network 192.168.2.0

network 10.0.0.0

end

write memory

5. Test Dynamic Routing

1. Check the RIP Routing Table:

o On both routers, verify that the routes are learned dynamically.

show ip route

2. Ping End-to-End:

o Use ping to test connectivity between the two LANs.

ping 192.168.2.2

ping 192.168.1.2

Page | 44
Simulation Output:

Configuration at Router 1

Configuration at Router 2

Page | 45
IP Routes at Router 1

IP Routes at Router 2

Page | 46
Result:

Thus, the static and dynamic routing was performed using packet tracer and
the connectivity was verified between the hosts.

Page | 47
Experiment No.: 6
Date:18.11.2024

LAN Configuration

Aim:
To configure the Local Area Network using packet tracer.

Tools Required:
 Cisco Packet Tracer / Physical Devices.
Theory:
A Local Area Network (LAN) is a network of computers and other devices that are
connected within a limited geographic area, such as a home, office, or campus. LANs
are typically used to share resources like files, printers, and internet access among
connected devices.

The primary characteristic of a LAN is that it operates in a relatively small area


compared to other types of networks like Wide Area Networks (WANs) or
Metropolitan Area Networks (MANs).

Key Features of a LAN

1. Geographical Scope:

o LANs are confined to a limited geographical area, typically ranging


from a single building to several buildings in close proximity, such as
within a campus or office complex.

2. Speed:

o LANs offer high data transfer rates, often ranging from 10 Mbps to 10
Gbps, making them ideal for high-speed data sharing and resource
access.

3. Connection Medium:

o LANs can use wired connections (like Ethernet cables and fiber optics)
or wireless connections (Wi-Fi).

o Wired LANs use Ethernet as the most common standard.

o Wireless LANs (WLANs) use radio waves to transmit data, typically


based on IEEE 802.11 standards (Wi-Fi).

Page | 48
4. Resource Sharing:

o Devices within a LAN can share resources like files, printers, and
internet access.

o Networked devices can communicate with each other, and centralized


devices (like a server) can manage the resources.

5. Low Latency:

o Due to their limited geographic area and high-speed connections,


LANs offer low latency, making them ideal for real-time
communication like video conferencing and VoIP calls.

Types of LANs

1. Wired LAN (Ethernet LAN):

o Ethernet is the most common technology used for wired LANs, where
devices are connected using Ethernet cables (Cat5e, Cat6, or fiber
cables).

o The most common topology is the Star Topology, where devices are
connected to a central network switch.

2. Wireless LAN (WLAN):

o WLANs use Wi-Fi technology to connect devices wirelessly.

o Devices like laptops, smartphones, and tablets are commonly


connected to a WLAN through a wireless access point (WAP).

Components of a LAN

1. Devices:

o Computers (Desktops, Laptops): Typically the endpoints of the network


where users interact.

o Servers: Machines that provide resources, data, and services to the


clients (like file storage, web services, or printing).

o Switches: Devices that connect multiple computers within a LAN.


They operate at the Data Link Layer (Layer 2) of the OSI model and
use MAC addresses to forward data between devices.

Page | 49
o Routers: Routers are used to route data between different networks,
such as between a LAN and the internet. They operate at the Network
Layer (Layer 3) of the OSI model and assign IP addresses to devices
within the LAN.

o Access Points: In a WLAN, an access point (AP) connects wireless


devices to the wired LAN.

2. Transmission Media:

o Wired Media: Typically, Ethernet cables (Cat5, Cat6, etc.) are used to
connect devices within the LAN. Fiber optics may also be used for
high- speed connections.

o Wireless Media: In WLANs, radio waves are used for wireless


communication between devices and access points.

3. Network Interface Cards (NICs):

o Each device connected to the network requires a NIC, which is


responsible for the data transmission and reception in the LAN. For
wireless devices, the NIC is embedded within the device (e.g., laptop,
smartphone).

LAN Topologies

1. Bus Topology:

o In bus topology, all devices are connected to a single central cable (the
bus).

o It is less common now due to issues like data collisions and network
failures affecting all devices if the bus cable is damaged.

2. Star Topology:

o This is the most common LAN topology. In star topology, each device
is connected to a central device, such as a switch or hub.

o This topology allows for easy management and troubleshooting, as


the failure of one device does not affect others.

Page | 50
3. Ring Topology:

o In ring topology, each device is connected to two other devices,


forming a closed loop.

o Data travels in one direction around the ring. While it is reliable, it can
be prone to network failure if one device or connection is broken.

4. Mesh Topology:

o In mesh topology, each device is connected to every other device in


the network.

o It provides high redundancy but is more expensive and complex to


maintain.

Advantages of LANs

1. Resource Sharing:

o LANs enable the sharing of resources such as printers, files, and


internet connections among devices, making them cost-effective.

2. High-Speed Communication:

o Due to the high data transfer rates, LANs enable fast communication
between devices.

3. Centralized Management:

o With a server or a dedicated computer acting as a central resource,


LANs allow for centralized data management and network
administration.

4. Security:

o LANs can be secured with firewalls, encryption, and access controls,


providing a more secure environment compared to other larger
networks.

5. Low Cost:

o The cost of setting up and maintaining a LAN is relatively low


compared to WANs and other large-scale networks.

Page | 51
Disadvantages of LANs

1. Limited Range:

o LANs are designed to cover small geographical areas, so they cannot


be extended over large distances without using additional
infrastructure like routers and WAN connections.

2. Network Congestion:

o As more devices are connected to a LAN, there can be increased


congestion and slower speeds, especially in wired LANs with limited
bandwidth.

3. Security Threats:

o While LANs can be secured, they are still vulnerable to internal


security threats like unauthorized access, data breaches, or viruses.

Applications of LANs

1. Office Networks:

o LANs are used in office environments to connect computers, printers,


and other devices, allowing employees to access shared resources and
collaborate.

2. Home Networks:

o In home settings, LANs are used to connect multiple devices like


computers, smartphones, smart TVs, and gaming consoles.

3. Educational Institutions:

o Schools and universities use LANs to connect computers in


classrooms and libraries, facilitating internet access and file sharing.

4. Data Centers:

o Data centers use high-speed LANs to connect servers, storage


systems, and other equipment to ensure quick data access and
backup.

Page | 52
Page | 53
Procedure:

1. Create a Topology

1. Open Cisco Packet Tracer.

2. Drag and drop the following devices into the workspace:

o 1 Switch (e.g., 2960 switch).

o 2 or more PCs (e.g., PC0, PC1).

3. Connect the devices using Copper Straight-Through cables:

o Click on the cable icon, select Copper Straight-Through, and connect:

 PC0 → Switch Port FastEthernet 0/1

 PC1 → Switch Port FastEthernet 0/2

2. Assign IP Addresses to PCs

1. Click on a PC (e.g., PC0):

o Go to the Desktop tab.

o Open the IP Configuration tool.

o Set the following:

 IP Address: 192.168.1.10

 Subnet Mask: 255.255.255.0

 Leave the Default Gateway empty.

2. Repeat for PC1:

o IP Address: 192.168.1.11

o Subnet Mask: 255.255.255.0

3. Verify Connectivity

1. Test the connection between the PCs using the ping command:

o Go to PC0, open the Command Prompt from the Desktop tab.

o Type:

ping 192.168.1.11

Page | 54
o If the connection is successful, you should see replies like:

Reply from 192.168.1.11: bytes=32 time<1ms TTL=128

Simulation Output:

Page | 55
Page | 56
Page | 57
Page | 58
Change the Default Gateway (in all the PC’s)

Ping the PC’s from one network to the another

Result:

Thus, the LAN network was created and the data was pinged from one PC to
an another.

Page | 59
LIST OF VIVA QUESTIONS

General Networking Concepts

1. What is a computer network?

2. Define the term "network topology" and list some common types.

3. What are the differences between LAN, WAN, and MAN?

4. What is the OSI model? Explain each layer briefly.

5. What is a protocol in networking? Can you give an example?

6. What is the purpose of the Physical layer in the OSI model?

7. What is the role of the Data Link layer in the OSI model?

8. What is the main function of the Network layer?

9. What is the purpose of the Transport layer in the OSI model?

10. How does the Application layer work in the OSI model?

Networking Devices

11. What is a router and what is its function in a network?

12. How is a switch different from a hub?

13. What is the role of a modem in networking?

14. What is a firewall? How does it protect a network?

15. Define a gateway and explain its role in networking.

16. What is a wireless access point (WAP)?

17. What is a bridge in networking, and when is it used?

18. What is the function of a network interface card (NIC)?

19. Define a network repeater and its role in extending network range.

20. What is the difference between a managed and unmanaged switch?

IP Addressing and Subnetting

21. What is an IP address and why is it important?

22. What is the difference between IPv4 and IPv6?

Page | 60
23. Explain the structure of an IPv4 address.

24. What is subnetting and why is it used in networking?

25. What is a subnet mask? How is it used?

26. How would you calculate the number of hosts in a subnet?

27. What is CIDR (Classless Inter-Domain Routing)?

28. Explain the concept of private IP addresses and give examples.

29. What is the difference between a public IP and a private IP address?

30. How does DHCP work? What is its role in IP addressing?

Routing

31. What is static routing? How is it configured?

32. What is dynamic routing? Name some dynamic routing protocols.

33. What is RIP (Routing Information Protocol)?

34. What is OSPF (Open Shortest Path First)?

35. What is the difference between a router and a switch?

36. What is the role of the routing table in a router?

37. What is a default route in a routing table?

38. What is NAT (Network Address Translation) and why is it used?

39. Explain the process of packet forwarding in a router.

40. What are routing metrics? How are they used in determining the best route?

Switching and VLANs

41. What is a VLAN (Virtual Local Area Network)?

42. How does VLAN tagging work in networking?

43. What is the difference between an access port and a trunk port in VLANs?

44. What is a broadcast domain, and how is it related to VLANs?

45. What are the benefits of using VLANs in a network?

46. Explain the concept of trunking in networking.

Page | 61
47. What is a Layer 2 switch? How does it differ from a Layer 3 switch?

48. What is Spanning Tree Protocol (STP) and how does it prevent network loops?

49. What is the difference between static VLANs and dynamic VLANs?

50. How would you configure a VLAN on a Cisco switch?

Page | 62

You might also like