Computer Networks Lab Manual
Computer Networks Lab Manual
Computer Networks
LAB MANUAL
Proposed by :
1
List of Experiments
1. To learn and implement handling and configuration of networking hardware like RJ-45
connector, CAT-6 cable, crimping tool, etc.(CO-1)
2. Implement and Configure to connect two or more computers using CAT-6 Cable and RJ-
45 Connector, also implement topology (Bus, Ring, star, bus) using switches and run ping
command.(CO-1)
3. Implement and Configure mode of router, password in router and configure serial
interface (IP).(CO-2)
4. Implement and configure to connect more than two computers using one router and
switch and run ping command.(CO-2)
5. Implement and configure to connect two router using default routing.(CO-2)
6. Implement and configure to connect three routers using default routing.(CO-3)
7. Implement and configure to connect two routers using static routing. (CO-3)
8. Implement and configure to connect three routers using dynamic routing (RIP).(C0-4)
9. Implement and configure to connect two routers using dynamic routing (OSPF). (CO-4)
10. Implement and configure Standard Access Control List in router.(CO-4)
2
Program #1
RJ-45 connector:-
RJ45 is a type of connector commonly used for Ethernet networking. It looks similar to a
telephone jack, but is slightly wider. Since Ethernet cables have an RJ45 connector on each end,
Ethernet cables are sometimes also called RJ45 cables.
The "RJ" in RJ45 stands for "registered jack," since it is a standardized networking interface. The
"45" simply refers to the number of the interface standard. Each RJ45 connector has eight pins,
which means an RJ45 cable contains eight separate wires. If you look closely at the end of an
Ethernet cable, you can actually see the eight wires, which are each a different color. Four of
them are solid colors, while the other four are striped.
CAT-6 cable:-
A Cat 6 cable is used mainly for computer networks reaching a Gb, 1000 Mbps or one Gbps of
data transfer speed (DTR) or higher. Characteristics are as follows:
Consists of four pairs of copper wires, which are all utilized for data transfer
Provides bandwidth of 250 MHz, speed up to 10 Gbps and may be stretched to 100 meters in
length
Provides more enhanced crosstalk and attenuation protection than its previous twisted pair
cable versions.
3
Crimping tool:-
A crimping tool is a device used to conjoin two pieces of metal by deforming one or both of them
in a way that causes them to hold each other. The result of the tool's work is called a crimp. A
good example of crimping is the process of affixing a connector to the end of a cable. For
instance, network cables and phone cables are created using a crimping tool (shown below) to
join the RJ-45 and RJ-11 connectors to both ends of either phone or 6 cable.
1. Strip the cable back 1 inch (25 mm) from the end.
6. Stick the connector into the crimping part of the tool and squeeze twice.
7. Remove the cable from the tool and check that all of the pins are down.
5
Program #2
Objective: Implement and Configure to connect two or more computers using CAT-6
Cable and RJ-45 Connector, also implement topology (Bus, Ring, star, bus) using switches
and run ping command.
You have to make sure that both computers have IP addresses that are on the same subnet. For
example, if you give one computer an IP address of 192.168.0.1, then you should give the
second computer an IP of 192.168.0.2.
6
Step 2 – Crossover Cable or State Cable
The second thing you need to verify is that you actually have a proper crossover cable. Basically,
there are a few different types of crossover cables, but it’s best to get the standard crossover
cable where the green and orange pairs are swapped and the brown and blue pairs stay in the
same position.
The only pins that need to be crossed are 1,3 and 2,6. So just check your cable on both
Make sure the accounts are administrator accounts also! It’s best to create a new account rather
than rename a current account.
7
Step 4 – Disable Firewalls
Finally, you should disable the firewall on both computers to ensure that none of the file
sharing ports are being blocked. You can do this by going to Control Panel and then Windows
Firewall. Click on Off.
That’s about it! If you follow all these steps, each computer should be able to access the other
properly. You can check the connection by opening a command prompt (click on Start and type
in cmd) and trying to ping the other computer. Just type the word ping followed by the IP
address of the other computer.
8
Program #3
Objective: Implement and Configure mode of router, password and IP in router serial
interface.
Mode of Router-
Router> Enable mode –(router enable)
Router# Privilege mode –(Show command running)
Router(config)# Configure mode –(Config router name, password
and ip)
Router(config-if)# Add IP
9
Press RETURN to get started!
Router>enable
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname gkp
gkp(config)#enable password bit
gkp(config)#enable secret ccna
gkp(config)#int Fa 0/0
gkp(config-if)#ip add 10.0.0.1 255.0.0.0
gkp(config-if)#no shut
gkp(config-if)#exit
gkp(config)#exit
gkp#show running-config
gkp>enable
Password:
Password:
gkp#
10
Program #4
Objective: Implement and configure to connect more than two computers using one
router and switch and run ping command.
Router>enable
Router#conf t
Router(config)#hostname gkp
gkp(config)#enable password bit
gkp(config)#enable secret ccna
gkp(config)#int Fa 0/0
gkp(config-if)#ip add 10.0.0.1 255.0.0.0
gkp(config-if)#no shut
gkp(config-if)#exit
gkp(config)#int Fa 0/1
gkp(config-if)#ip add 20.0.0.1 255.0.0.0
gkp(config-if)#no shut
11
Program #5
Objective: Implement and configure to connect two router using default routing.
Router-1:
Router>enable
Router#config
Router(config)#hostname gkp1
gkp1(config)#int fa 0/0
gkp1(config-if)#ip add 10.0.0.1 255.0.0.0
gkp1(config-if)#no shut
gkp1(config-if)#exit
gkp1(config)#int fa 0/1
gkp1(config-if)#ip add 20.0.0.1 255.0.0.0
gkp1(config-if)#no shut
gkp1(config-if)#exit
gkp1(config)#
12
gkp1#
gkp1#wr
Router-2:
Router>enable
Router#config
Router(config)#hostname gkp2
gkp2(config)#int fa 0/0
gkp2(config-if)#ip add 10.0.0.2 255.0.0.0
gkp2(config-if)#no shut
gkp2(config-if)#exit
gkp2(config)#int fa 0/1
gkp2(config-if)#ip add 30.0.0.1 255.0.0.0
gkp2(config-if)#no shut
gkp2(config-if)#
gkp2(config-if)#exit
gkp2(config)#
gkp2(config)#ip route 0.0.0.0 0.0.0.0 10.0.0.1
gkp2(config)#^Z
gkp2#
gkp2#wr
13
Program #6
Objective: Implement and configure to connect three routers using default routing.
Router-1:
Router>enable
Router#config
.
Router(config)#hostname gkp1
gkp1(config)#int fa 0/0
gkp1(config-if)#ip add 10.0.0.1 255.0.0.0
gkp1(config-if)#no shut
gkp1(config-if)#
gkp1(config-if)#exit
gkp1(config)#int fa 0/1
gkp1(config-if)#ip add 30.0.0.1 255.0.0.0
gkp1(config-if)#no shut
gkp1(config-if)#
14
gkp1(config-if)#exit
gkp1(config)#
Router-2:
Router>enable
Router#config
Router(config)#hostname gkp2
gkp2(config)#int fa 0/0
gkp2(config-if)#ip add 10.0.0.2 255.0.0.0
gkp2(config-if)#no shut
gkp2(config-if)#
gkp2(config-if)#exit
gkp2(config)#int fa 0/1
gkp2(config-if)#ip add 20.0.0.1 255.0.0.0
gkp2(config-if)#no shut
gkp2(config-if)#
gkp2(config-if)#exit
gkp2(config)#
Router-3:
Router>enable
Router#config
Router(config)#hostname gkp3
gkp3(config)#
gkp3(config)#int fa 0/0
gkp3(config-if)#ip add 20.0.0.2 255.0.0.0
gkp3(config-if)#no shut
15
gkp3(config-if)#
gkp3(config-if)#exit
gkp3(config)#int fa 0/1
gkp3(config-if)#ip add 40.0.0.1 255.0.0.0
gkp3(config-if)#no shut
gkp3(config-if)#
gkp3(config-if)#exit
gkp3(config)#
gkp3(config)#ip route 0.0.0.0 0.0.0.0 20.0.0.1
gkp3(config)#^Z
gkp3#
wr
16
Program # 7
Objective: Implement and configure to connect two routers using static routing.
Router-1:
Router>enable
Router#config
Router(config)#hostname gkp1
gkp1(config)#int fa 0/0
gkp1(config-if)#ip add 10.0.0.1 255.0.0.0
gkp1(config-if)#no shut
gkp1(config-if)#
gkp1(config-if)#exit
gkp1(config)#int fa 0/1
gkp1(config-if)#ip add 192.168.1.1 255.255.255.0
gkp1(config-if)#no shut
gkp1(config-if)#
gkp1(config-if)#exit
gkp1(config)#
17
Router-2:
Router>enable
Router#config
Router(config)#hostname gkp2
gkp2(config)#int fa 0/0
gkp2(config-if)#ip add 10.0.0.2 255.0.0.0
gkp2(config-if)#no shut
gkp2(config-if)#
gkp2(config-if)#exit
gkp2(config)#int fa 0/1
gkp2(config-if)#ip add 192.168.2.1 255.255.255.0
gkp2(config-if)#no shut
gkp2(config-if)#
gkp2(config-if)#exit
gkp2(config)#ip route 192.168.1.0 255.255.255.0 10.0.0.1
gkp2(config)#^Z
gkp2#
wr
18
Program # 8
Objective: Implement and configure to connect three routers using dynamic routing (RIP).
Router-1:
Router>enable
Router#config
Router(config)#hostname gkp1
gkp1(config)#int fa 0/0
gkp1(config-if)#ip add 10.0.0.1 255.0.0.0
gkp1(config-if)#no shut
gkp1(config-if)#
gkp1(config-if)#exit
gkp1(config)#int fa 0/1
gkp1(config-if)#ip add 192.168.1.1 255.255.255.0
gkp1(config-if)#no shut
gkp1(config-if)#
gkp1(config-if)#exit
gkp1(config)#
19
gkp1(config)#route rip
gkp1(config-router)#network 10.0.0.0
gkp1(config-router)#network 192.168.1.0
gkp1(config-router)#^Z
gkp1#
wr
Router-2:
Router>enable
Router#config
Router(config)#int fa 0/0
Router(config-if)#ip add 10.0.0.2 255.0.0.0
Router(config-if)#no shut
Router(config-if)#exit
Router(config)#int fa 0/1
Router(config-if)#ip add 20.0.0.1 255.0.0.0
Router(config-if)#no shut
Router(config-if)#
Router(config-if)#exit
Router(config)#hostname gkp2
gkp2(config)#
gkp2(config)#route rip
gkp2(config-router)#network 10.0.0.0
gkp2(config-router)#network 20.0.0.0
gkp2(config-router)#^Z
gkp2#
wr
gkp2#
Router-3:
Router>enable
Router#config
Router(config)#hostname gkp3
gkp3(config)#int fa 0/0
gkp3(config-if)#ip add 20.0.0.2 255.0.0.0
gkp3(config-if)#no shut
gkp3(config-if)#
gkp3(config-if)#exit
gkp3(config)#int fa 0/1
20
gkp3(config-if)#ip add 192.168.2.1 255.255.255.0
gkp3(config-if)#no shut
gkp3(config-if)#
gkp3(config-if)#exit
gkp3(config)#
gkp3(config)#route rip
gkp3(config-router)#network 20.0.0.0
gkp3(config-router)#network 192.168.2.0
gkp3(config-router)#^Z
gkp3#
wr
21
Program # 9
Objective: Implement and configure to connect two routers using dynamic routing (OSPF).
Router-1:
Router>enable
Router#config
Router(config)#hostname gkp1
gkp1(config)#int fa 0/0
gkp1(config-if)#ip add 10.0.0.1 255.0.0.0
gkp1(config-if)#no shut
gkp1(config-if)#
gkp1(config-if)#exit
gkp1(config)#int fa 0/1
gkp1(config-if)#ip add 192.168.1.1 255.255.255.0
gkp1(config-if)#no shut
gkp1(config-if)#
gkp1(config-if)#exit
gkp1(config)#
gkp1(config)#route ospf 1
gkp1(config-router)#network 10.0.0.0 0.255.255.255 area 0
22
gkp1(config-router)#network 192.168.1.0 0.0.0.255 area 0
gkp1(config-router)#^Z
gkp1#
wr
Router-2:
Router>enable
Router#config
Router(config)#hostname gkp2
gkp2(config)#int fa 0/0
gkp2(config-if)#ip add 10.0.0.2 255.0.0.0
gkp2(config-if)#no shut
gkp2(config-if)#
gkp2(config-if)#exit
gkp2(config)#int fa 0/1
gkp2(config-if)#ip add 192.168.2.1 255.255.255.0
gkp2(config-if)#no shut
gkp2(config-if)#
gkp2(config-if)#exit
gkp2(config)#
gkp2(config)#route ospf 1
gkp2(config-router)#network 10.0.0.0 0.255.255.255 area 0
gkp2(config-router)#network 192.168.2.0 0.0.0.255 area 0
gkp2(config-router)#^Z
gkp2#
23
Program # 10
Objective: Implement and configure Standard Access Control List in router.
Router-1:
Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname gkp1
gkp1(config)#
gkp1(config)#interface FastEthernet0/0
gkp1(config-if)#ip address 10.0.0.1 255.0.0.0
gkp1(config-if)#ip address 10.0.0.1 255.0.0.0
gkp1(config-if)#no shutdown
gkp1(config-if)#
gkp1(config-if)#exit
gkp1(config)#interface FastEthernet0/1
gkp1(config-if)#ip address 192.168.1.1 255.255.255.0
gkp1(config-if)#ip address 192.168.1.1 255.255.255.0
gkp1(config-if)#no shutdown
gkp1(config-if)#
24
gkp1(config-if)#exit
gkp1(config)#router rip
gkp1(config-router)#network 10.0.0.0
gkp1(config-router)#network 192.168.1.0
gkp1(config-router)#exit
gkp1(config)#access-list 1 deny 192.168.2.3 0.0.0.0
gkp1(config)#access-list 1 permit any
gkp1(config)#int fa 0/0
gkp1(config-if)#ip access-group 1 in
gkp1(config-if)# ^Z
gkp2#
wr
Router-2:
Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname gkp2
gkp2(config)#
gkp2(config)#interface FastEthernet0/0
gkp2(config-if)#ip address 10.0.0.2 255.0.0.0
gkp2(config-if)#ip address 10.0.0.2 255.0.0.0
gkp2(config-if)#no shutdown
gkp2(config-if)#
gkp2(config-if)#exit
gkp2(config)#interface FastEthernet0/1
gkp2(config-if)#ip address 192.168.2.1 255.255.255.0
gkp2(config-if)#ip address 192.168.2.1 255.255.255.0
gkp2(config-if)#no shutdown
gkp2(config-if)#
gkp2(config-if)#exit
gkp2(config)#router rip
gkp2(config-router)#network 10.0.0.0
gkp2(config-router)#network 192.168.2.0
gkp2(config-router)# ^Z
gkp2#
25
Computer Networks Lab Viva Questions with Answers
1. Define a network.
Ans- A network is a collection of networks joined together by physical media linkages.
Recursively, a network is any physical link connecting two or more nodes or any two or more
networks connected by one or more nodes.
3. Describe a Node.
Ans- A network can be made up of two or more computers that are physically linked together,
such as by coaxial cable or optical fibre. Such physical media is known as a link, and the
computer that connects to it is referred to as a node.
8. What are the names of the variables that impact the performance of the network?
Ans- Hardware, software, users, and various transmission mediums are all factors.
26
Ans- The amount of time it takes a link to recover from a failure, how often failures occur, and
how robust the network is are all indicators of how reliable a system is.
Security:
Security concerns include guarding data from viruses and illegal access.
Performance:
A network's performance can be evaluated in a number of ways, including through metrics like
reaction time and transmit time.
10. Talk about the elements that affect the network's dependability.
Ans- There are mainly two elements that affect the network's dependability:
Frequency of failures;
Network recovery time after a failure.
11. What are the factors that affect the security of the network?
Ans- There are several factors that affect network security, including viruses, unauthorized
access, and many more.
Semantics:
The format and structure of the data, or the manner in which they are presented, make up a
protocol's syntax.
Timing:
27
How quickly can data be sent?
14 Discuss the key design issues of a computer network.
Ans- There are various key design issues of a computer network, including:
28
Ans- Multicasting is a method by which the message is sent to some subset of other nodes.
Unicasting is a method by which the message is sent from a source to a single destination node.
Finally, broadcasting is a method by which the message is sent to all the nodes in the network.
Physical layer
Datalink layer
Network layer
Transport layer
Session layer
Presentation layer
Application layer
29
28. Which is the network-supported layer?
Ans-Network-supported layers are,
Network layer
Physical layer
Datalink layer
Application layer
Presentation layer
Session layer
30. Which layer in the OSI stack connects the user-supported and network-supported layers?
Ans-The user-supported layer and the network-supported layer are connected via the transport
layer.
Representation of bits
physical characteristics of interfaces and media
data rate
bits synchronization
a line configuration
transmission mode
physical topology
physical addressing
flow control
framing
error control
30
access control
Connection control
error control
segmentation and reassembly
service point addressing
flow control
Synchronization
Dialogue management
39. What different kinds of links can be employed to construct a computer network?
Ans-leased lines
31
Cables
last mile links
wireless links
Single bit error: In this error, only one bit in the data unit is altered.
Burst error: two or more data bits will be altered in this error.
41. What is computer network error detection, and what are its methods?
Ans-During transmission, there may be the possibility of corruption of data. For reliable
communication, errors must be deducted and corrected. The concept of redundancy is used by
error detection in a computer network, which means adding extra bits to detect errors at the
destination. There are some common error detection methods which are as follows
32
Ans-It is one of the most powerful redundancy-checking methods. The cyclic redundancy check
is based on binary division.
A. Asynchronous protocol
B. Synchronous protocol
Character-oriented protocol
Bit oriented protocol
49. What is the difference between error correction and error detection?
Ans-Error detection is easy and simple than error correction, and it is examined for error
detection when any error occurs. Additionally, only the corrupted bits are verified during error
correction. The number of mistakes and the size of the messages is key components in key
correction.
33