CN Lab 02
CN Lab 02
Table of Contents
OBJECTIVES OF THE LAB .............................................................................................................................. 2
CISCO Packet Tracer ..................................................................................................................................... 3
Transmission Media ..................................................................................................................................... 3
WIRELESS ................................................................................................................................................. 4
WIRED ...................................................................................................................................................... 4
COAXIAL CABLE .................................................................................................................................... 4
TWISTED PAIR CABLE ........................................................................................................................... 5
FIBER OPTICS ........................................................................................................................................ 6
STRAIGHT-THROUGH CABLE ........................................................................................................................ 6
CROSS-OVER CABLE ..................................................................................................................................... 9
TESTING CABLES......................................................................................................................................... 10
CABLE TESTER .................................................................................................................................... 11
Cisco packet tracer : Connecting Two PCs ................................................................................................. 11
Verify the connection using ping ........................................................................................................... 13
PING ....................................................................................................................................................... 14
NETWORKING DEVICES .............................................................................................................................. 15
HUB ........................................................................................................................................................ 15
Simulation of Hub with end devices .................................................................................................. 15
SWITCH .................................................................................................................................................. 16
Simulation of Switch with end devices .............................................................................................. 17
ROUTER .................................................................................................................................................. 17
Allow Access to Use Remote Desktop Connection (RDP): Windows 10 ................................................ 19
Remote Desktop Connection Client ....................................................................................................... 22
Access remotely using Open SSH Server:............................................................................................... 25
Server-side OS (window 10) ............................................................................................................... 25
Client OS (window /Linux etc.)........................................................................................................... 30
1
Computer Networks Lab 2 Page 2 of 30
----------------------------------------------------------------------------------------------------
In this lab, we will cover the following:
2
Computer Networks Lab 2 Page 3 of 30
Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows users
to create network topologies and imitate modern computer networks. The software allows users to
simulate the configuration of Cisco routers and switches using a simulated command line interface.
Packet Tracer makes use of a drag and drop user interface, allowing users to add and remove
simulated network devices as they see fit.
TRANSMISSION MEDIA
Transmission Media
The transmission media is nothing but the physical media over which communication takes place
in computer networks. The transmission of data over transmission media may be unguided
(wireless) or guided (wired).
3
Computer Networks Lab 2 Page 4 of 30
WIRELESS
When an antenna is attached to electrical circuit of a computer or wireless device, it converts the
digital data into wireless signals and spread all over within its frequency range. The receptor on
the other end receives these signals and converts them back to digital data.
WIRED
In wired communication a physical link is established between two devices. The link may be of
different types. Alternatively referred to as a cord, connector or plug, a cable is one or more
wires covered in a plastic covering that connects a computer to a power source or other device.
Networking cables are used to connect one network device to other network devices or to connect
two or more computers to share printer, scanner etc. Different types of network cables like Coaxial
cable, Optical fiber cable, Twisted Pair cables are used depending on the network's topology,
protocol and size. The devices can be separated by a few meters (e.g. via Ethernet) or nearly
unlimited distances (e.g. via the interconnections of the Internet).
COAXIAL CABLE
Coaxial lines confine the electromagnetic wave to area inside the cable, between the center
conductor and the shield. The transmission of energy in the line occurs totally through the dielectric
inside the cable between the conductors. Coaxial lines can therefore be bent and twisted (subject
4
Computer Networks Lab 2 Page 5 of 30
to limits) without negative effects, and they can be strapped to conductive supports without
inducing unwanted currents in them and though.
The most common use for coaxial cables is for television and other signals with bandwidth of
multiple megahertz. Although in most homes coaxial cables have been installed for transmission
of TV signals, new technologies (such as the ITU-T G.hn standard) open the possibility of using
home coaxial cable for high-speed home networking applications (Ethernet over coax).
5
Computer Networks Lab 2 Page 6 of 30
FIBER OPTICS
Fiber Optic works on the properties of light. When light ray hits at critical angle it tends to
refracts at 90 degree. This property has been used in fiber optic. The core of fiber optic cable is
made of high quality glass or plastic. From one end of it light is emitted, it travels through it and
at the other end light detector detects light stream and converts it to electric data.
Fiber Optic provides the highest mode of speed. It comes in two modes, one is single mode fiber
and second is multimode fiber. Single mode fiber can carry a single ray of light whereas
multimode is capable of carrying multiple beams of light.
Fiber Optic also comes in unidirectional and bidirectional capabilities. To connect and access
fiber optic special type of connectors are used. These can be Subscriber Channel (SC), Straight
Tip (ST), or MT-RJ.
STRAIGHT-THROUGH CABLE
A straight-through network cable is just what the name suggests, a cable that passes data straight
through from one end to another end. These cables are used for a variety of connections, for
instance, connecting a computer to a hub or switch, connecting a computer to a cable/ISDN/DSL
modem, and linking switches and hubs together. One such cable connection is shown in Figure
2.1.
6
Computer Networks Lab 2 Page 7 of 30
About Cabling
The two most common UTP (Unshielded Twisted-Pair) network standards are the 10 Mbps
(10BASE-T Ethernet) and the 100 Mbps (100BASE-TX Fast Ethernet). In order for a cable to
properly support 100 Mbps transfers, Category 5 (or CAT 5) twisted pair cable must be used.
This type of low loss extended frequency cable will support 10 Base-T, 100 Base-T and the
newer 100VG-AnyLAN applications. Other types of cabling include Category 3 that supports
data rates up to 16 Mbps, and Category 1 that only supports data rates up to 1Mbps.
Tools Required
The tools required to do this lab are:
7
Computer Networks Lab 2 Page 8 of 30
Procedure
Well, the wire has two sides. Let’s call one side … Side A and the other side … Side B. Do the
following steps with Side A of the wire.
1. Remove the plastic cover from the cable up to two inches. You will see 4 twisted pairs
(total 8 wires). In each twisted pair, one wire will be colored and the other will be white.
For example, one will be Green and the other will be White having Green marks. The
latter is called Green-White. Similarly there will be Brown wire twisted with Brown-
White, Blue wire twisted with Blue-White, Orange twisted with Orange-White. This can
be seen in Figure 2.3.
2. Untwist the wires and make them smooth (don’t remove the plastic covers from the metal
wires).
3. Arrange the wires in the order: Orange-White, Orange, Green-White, Blue, Blue-White,
Green, Brown-White, and Brown. The order is important since there is a wiring standard
defined by the Telecommunications Industry Association (TIA) [http://www.tiaonline.org].
4. It's called the EIA/TIA-568 Commercial Building Telecommunications Wiring Standard,
and you can find more information on it here:
http://www.digitaldelivery.com/Standards.htm#s5
8
Computer Networks Lab 2 Page 9 of 30
5. Cut the wires in straight fashion and insert in the RJ-45 Jack.
6. Using the Crimping tool, punch it properly. Perform Step 1-5 for Side B.
CROSS-OVER CABLE
A cross-over network cable is used to connect two computers directly. It is also used when you
connect two hubs/Switches with a normal port on both hubs/Switches. (In other words, the cross
cable is used relatively in a rare case.). It is used to connect similar devices.
Procedure
Side A
9
Computer Networks Lab 2 Page 10 of 30
TESTING CABLES
Once both cables are ready, test it to make sure it works by means of a cable tester. Insert the two
ends of the cable into the jacks on the tester and watch the lights. If they all light up, wire has a
good connection and ready to use.
10
Computer Networks Lab 2 Page 11 of 30
CABLE TESTER
A cable tester is a device that is used to test the strength and connectivity of a particular type of
cable or other wired assemblies. There are a number of different types of cable testers, each able
to test a specific type of cable or wire (some may be able to test different types of cables or
wires). The cable tester can test whether a cable or wire is set up properly, connected to the
appropriate source points, and if the communication strength between the source and destination
is strong enough to serve its intended purpose. The picture is an example of a cable tester from
TRENDnet.
We will look into how we can connect two computers/laptops using a virtual program
called CISCO Packet Tracer.
Prerequisites:
• Laptop/Desktop
• CISCO Packet Tracer program
Run the Cisco Packet Tracer and Start the application.
Implementation:
Follow the below steps to implement the connection:
Step 1: From the bottom toolbar, click on ‘End Devices’ and select ‘PC’ and then click on the
screen (for two PC’s do this step twice).
11
Computer Networks Lab 2 Page 12 of 30
Step 3: After selecting the wire click on the computer on the screen(here PC0) and select
FastEthernet0. Then, drag the wire to the other pc (here PC1) and do the same.
Step 4: Now, we will assign the IP address to both the PCs (PC0 & PC1). An IP
address (Internet Protocol) is nothing but the numerical designation of the devices connected to
the network, that use the Internet protocol as a communication medium. Click on PC0. A dialog
box will appear on the screen, select Desktop and then select IP configuration :
12
Computer Networks Lab 2 Page 13 of 30
After clicking on IP configuration this is what will appear. Now in IPv4 Address, write
192.168.1.1, Subnet mask will be 255.255.255.0. Similarly, assign 192.168.1.2 to PC1
13
Computer Networks Lab 2 Page 14 of 30
Understanding OUTPUT:
Interesting result from ping is round-trip time calculation. Measured in milliseconds, round-trip time
indicates the delay between the sending of a ping request packet and the receipt of the corresponding
response packet. The network delay or latency indicated by ping offers a good indicator of the
responsiveness of network services on that remote host.
By default, ping waits Approximately 4,000 milliseconds (4 seconds) for each response to be returned
before displaying the "Request Timed Out" message.
PING
The ping command is one of the most well-known tools available. Simply put, ping sends an "are you
there?" message to a remote host. If the host is, in fact, there, ping returns a "yup, I'm here" message. It
does this using a protocol known as ICMP, or Internet Control Message Protocol. ICMP was designed to
be an error reporting protocol and has a wide variety of uses that we won't go into here.
Task: Using Packet Tracer connect two PCs as shown above and perform the following:
1. First Configure the PCs as shown above and verify the connection using ping command.
Verify each configuration using ping command and briefly describe the response.
14
Computer Networks Lab 2 Page 15 of 30
NETWORKING DEVICES
HUB
When referring to a network, a hub is the most basic networking device that connects multiple
computers or other network devices together. Unlike a network switch or router, a network hub
has no routing tables or intelligence on where to send information and broadcasts all network data
across each connection. Most hubs can detect basic network errors such as collisions, but having
all information broadcast to multiple ports can be a security risk and cause bottlenecks. In the past
network hubs were popular because they were much cheaper than a switch and router, but today
most switches do not cost much more than a hub and are a much better solution for any network.
15
Computer Networks Lab 2 Page 16 of 30
SWITCH
On a network, a switch is a hardware device that filters and forwards packets through the network,
but often not capable of much more. The first network device that was added to the Internet was a
switch called the IMP, which helped send the first message on October 29, 1969. A network switch
is more advanced than a hub but not as advanced as a router. The picture shows an example of a
NETGEAR 5 port switch.
16
Computer Networks Lab 2 Page 17 of 30
ROUTER
A hardware device designed to take incoming packets, analyze the packets, moving the packets to
another network, converting the packets to another network interface, dropping the packets,
directing packets to the appropriate locations, and performing any other number of other actions.
The picture shows the Linksys BEFSR11 router and is what most home routers resemble.
17
Computer Networks Lab 2 Page 18 of 30
18
Computer Networks Lab 2 Page 19 of 30
Before Remote Desktop can be used, permission has to be granted to the specific accounts that you would
like to Allow to connect to your computer remotely. This is typically done on your Office Computer.
Option 1
1. Click the Start menu from your desktop, and then click Control Panel.
19
Computer Networks Lab 2 Page 20 of 30
4. Click Select Users, located in the Remote Desktop section of the Remote tab.
20
Computer Networks Lab 2 Page 21 of 30
6. Type your myLSU ID and information for anyone else you would like to add. (This will allow Remote
Desktop access to the computer which it is set.)
7. Click OK when finished.
Option 2:
Go to setting and allow remote desktop connection:
21
Computer Networks Lab 2 Page 22 of 30
Using the Remote Desktop client is straightforward and you do not need to specifically configure Remote
Desktop on the local computer. The steps below will work for all versions of Windows starting from
Windows 7.
Step 1: Launch the Desktop Connection Unit
On your local Windows computer, locate the Remote Desktop Connection application. You can find it in a
couple of different ways:
1. For Windows 7, click on Start -> All Programs, go to the ‘Accessories’ folder and click on Remote
Desktop Connection. For Windows 10, Click on Start and locate the ‘Windows Accessories’ folder
where you can also find the Remote Desktop Connection app.
2. Click on Start and type in Remote Desktop Connection in the search bar. You will receive search
results as soon as you start typing. Click on the application when it shows up on the list.
22
Computer Networks Lab 2 Page 23 of 30
3. Press Windows + R keys on your keyboard to get the “Run” box. Type in mstsc and hit Enter in
the ‘Open:’ field to run the Remote Desktop client.
There are many ways to locate the name, public or private IP address of a computer where you want to
configure Remote Desktop service. Here are the quickest and easiest methods:
1. Search for CMD from the start menu or press Windows + R on your keyboard, type in CMD and
hit Enter to run the command prompt.
2. Type ipconfig in the command prompt and hit Enter.
3. Your will see your computer’s private IP address under the IPv4 Address line.
23
Computer Networks Lab 2 Page 24 of 30
After you hit connect, the loading bar will appear. When it finishes initiating and configuring the remote
session you will get a pop-up window that will look similar to this:
24
Computer Networks Lab 2 Page 25 of 30
1. Enter the password for the selected username. You can use another account, if needed, and provide
a different username and password.
2. Click OK when ready and you will get the security certificate warning.
3. Click Yes to continue.
25
Computer Networks Lab 2 Page 26 of 30
Add inbound rule for port 22 in firewall on Server Window. Follow the step , which are given below
26
Computer Networks Lab 2 Page 27 of 30
27
Computer Networks Lab 2 Page 28 of 30
28
Computer Networks Lab 2 Page 29 of 30
29
Computer Networks Lab 2 Page 30 of 30
Enter the password. You will get access to the PC through console:
Now you can access any send, receive ,add and delete any file or folder etc.
30