Lab 1 To 4
Lab 1 To 4
IPv4 uses 32 binary bits to create a single unique address on the network. An IPv4 address
is expressed by four numbers separated by dots. Each number is the decimal (base-10)
representation for an eight-digit binary (base-2) number, also called an octet. For example:
216.27.61.137
A MAC address, or Media Access Control address, is a 48 bit address associated with a
network adapter. While IP addresses are associated with software, MAC addresses are
linked to the hardware of network adapters. The MAC address is a unique value associated
with a network adapter. MAC addresses are also known as hardware addresses or physical
addresses. They uniquely identify an adapter on a LAN.
2. Type ipconfig and press Enter key. The spelling of the ipconfig is critical, but the case
is not.
3. The screen shows the IP address, subnet mask and the default gateway. The IP address
and the default gateway should be in the same network or subnet; otherwise this host
wouldn’t be able to communicate outside the network.
1.___________________________________________________________
2.____________________________________________________________
3.____________________________________________________________
Check additional TCP/IP configuration information.
1. To see more information, type ipconfig/all and press Enter key. The figure shows the
detailed IP configuration of the computer on the screen.
• The host name (computer name), the Physical address of your machine, IP
address, subnet Mask, Default Gateway and DNS Servers.
3. In the LAN, compare your result with a few nearby computers. What similarities do
you see in the physical (MAC) address?
________________________________________________________________
a. _______________________________________
b. _______________________________________
c. ________________________________________
d. ________________________________________
b) Verification of network connectivity using Ping and trace route
Open the Command prompt (MS-DOS). Ping the IP address/domain name of another
computer.
Ping uses the Internet Control Message Protocol (ICMP) echo-request and echo-reply feature
to test physical connectivity. If there will some Dropped or lost packets then a ping/trace
route will usually show as asterisks (*).
Ping the following addresses and verify that result was successful.
1. www.pucit.edu.pk
2. www.aiou.edu.pk
3. www.pu.edu.pk
4. www.microsoft.com
5. www.mit.edu.
Understanding OUTPUT:
Interesting result from ping is round-trip time calculation. Measured in milliseconds, round-
trip time indicates the delay between the sending of a ping request packet and the receipt of the
corresponding response packet. The network delay or latency indicated by ping offers a good
indicator of the responsiveness of network services on that remote host.
By default, ping waits Approximately 4,000 milliseconds (4 seconds) for each response to be
returned before displaying the "Request Timed Out" message.
In computer networks, hop refers to the number of routers that a packet (a portion of data)
passes through from its source to its destination. The hop count represents the total number of
routing devices Time-to-live (TTL) fields. The TTL value specifies approximately how many
router (i.e. hops) the packet has gone through.
Adding to other answers that TTL value at max can be 255 because of its size of 1 byte ( 8 bits
-> max. value = 255 ). On the internet, it usually takes very less Round Trips ( RT ) to finish a
request. And within each trip, with each hop TTL decreases. Most of the requests get finished
without even reaching TTL value zero
You sent a request to some non-existent server/URL. At first its TTL was 255. It keeps on
hopping from 1 router to other, until TTL becomes zero, which is when a packet is dropped.
Error messages:
➢ Destination Host Unreachable
This message indicates one of two problems: either the local system has no route to the desired
destination, or a remote router reports that it has no route to the destination. When you ping to
an IP address in a different network, ping packets reach default gateway. My default gateway
sends the packet to remote gateway. So ping packet finally reaches the remote network.
However, if the remote gateway failed to find the remote host, it will send an echo Destination
host unreachable.
The error message "Destination Host Unreachable” tells that the ping request from our
computer cannot find the route to the destination IP address (destination host). It means, the
Packet send from your computer reached the destination network successfully but the remote
gateway failed to find the destination host. So the remote gateway sends an Echo message
Destination host unreachable. One major possibility for this error; there is no route listed in the
remote gateway, for the packet send from your computer, to the destination host. If there is no
route available, it is impossible to find the destination host and your computer will receive an
error message "Destination host unreachable" from remote gateway. So one of the reason for
this can be faulty routing table. If the destination host is down at the time the packet send, it
may result destination host unreachable error message.
By default, ping/trace route waits Approximately 4,000 milliseconds (4 seconds) for each
response to be returned before displaying the "Request Timed Out" message. This error
message indicates that your host did not receive the ping message back from the destination
device within the designated time period. This is an indicator that the destination device is not
connected to the network, is powered off, or is not configured correctly.
Step-5: Ping the computer’s loopback IP address.
ping 127.0.0.1
The address 127.0.0.1 is reserved for loopback testing. If the ping is successful, then TCP/IP
is properly installed and functioning on this computer.
Step-6: Using trace route command
Steps to tracing
The result shows the complete route to the site and the number of hops in path. Traces out the
route and permits you to access a particular server. The tracert command gives you a long list
of all servers you pass through on your way to your final destination. (Maximum up to 30hops-
if your route is longer than that, you are expected to give up waiting for the connection).
Tracert uses the same echo requests and replies as the ping command but in a slightly different
way. Observe that tracert actually contacted each router three times. Compare the results to
determine the consistency of the route. Each router represents a point where one network
connects to another network and the packet was forwarded through.
➢ Trace a local host name or IP address in your local area network (LAN).
Lab 2
Before starting this lab you are required to follow the below procedures:
2. To get familiar with the Packet Tracer environment, watch this video named "Interface
Overview" from the Help Tutorials.
In this Lab, we will design a simple network topology by selecting some devices and suitable
media. In this lab we will keep it simple by using End Devices, Switches, Hubs, and
Connections.
Two workspaces are supported; logical and physical. In the logical workspace, we can build
logical network topologies by placing, connecting, and clustering virtual network devices. The
physical workspace provides a sense of scale and placement in how network devices such as
routers, switches, and hosts would look in a real environment
It supports two operating modes—real-time mode and simulation mode. In real-time mode, all
network activities take place with immediate real-time response. The simulation mode allows
a user to control time intervals, and the propagation of data across a network.
You can download the latest version of Packet Tracer for free from www.netacad.com/about-
networking-academy/packet-tracer.
Menu bar: This is a commonly found menu. It is used to open, close, print, save, change
preferences, and so on.
Main toolbar: This bar contains shortcut icons to menu options that are frequently accessed.
For example, open, save, zoom, undo, and redo.
Physical/Logical workspace tabs: These tabs allow you to choose between the Logical and
Physical work areas.
Common tools bar: With help of this toolbar, we can manipulate topologies. For example,
select, move layout, place note, delete, resize shape, add simple/complex Protocol data unit
(PDU).
Single click on each group of devices and connections to display the various choices
Step 3: Adding Hosts using device selection option
Adding a Switch: Select a switch, by clicking once on Switches and once on a 2950-24
switch.
➢ Connect PC2 to Switch0 by first choosing Connections.
➢ Click once on the Copper Straight-through cable.
➢ Perform the following steps to connect PC2 to Switch0:
5. Notice the green link lights on PC2 Ethernet NIC and amber light Switch0 FastEthernet0/1
port. The switch port is temporarily not forwarding frames, while it goes through the stages
for the Spanning Tree Protocol (STP) process.
6. After a about 30 seconds the amber light will change to green indicating that the port has
entered the forwarding stage. Frames can now be forwarded out the switch port.
➢ Repeat the steps above for PC3 connecting it to Port3 on switch0 on port
FastEthernet0/2.
➢ Move the cursor over the link light to view the port. Fa means FastEthernet, 100
Mbps Ethernet.
Step 5: Configuring IP Addresses and Subnet Masks on the Hosts Before we can
communicate between the hosts we need to configure IP Addresses and Subnet Masks on the
devices.
➢ To connect like-devices, like a Hub and a Switch, we will use a Cross-over cable.
Click once the Cross-over Cable from the Connections options.
➢ Move the Connections cursor over Hub0 and click once.
➢ Select Port2
➢ Click once on Switch0 and choose FastEthernet0/3 (actual port does not
matter).
➢ The link light for switch port FastEthernet0/3 will begin as amber and
eventually change to green
Adding routers
➢ Move the cursor to the Logical Workspace and click on the desired location.
NOTE: If multiple instances of the same device are needed press and hold the Ctrl button,
click on the desired device, and then release the Ctrl button. A copy of the device will be
created and can now be move to the desired location.
➢ Click on the router to bring up the Configuration Window. This window has
three modes: Physical, Config, and CLI (Physical is the default mode).
The Physical mode is used to add modules to a device, such as a WAN Interface Card (WIC).
The Config mode is used for basic configuration. Commands are entered in a simple GUI
format, with actual equivalent IOS commands shown in the lower part of the window. The CLI
mode allows for advanced configuration of the device. This mode requires the user to enter the
actual IOS commands just as they would on a live device.
➢ In the Physical mode, click on the router power switch to turn the device off.
➢ Select the WIC-2T module and drag it to Slot 0 on the router. Then drag a
WIC Cover to Slot1.
➢ Click on the hub and choose Port 3. Then click on the router and choose interface
FastEthernet 0/0.
Students and teacher communicate through Adobe Connect. Students perform the task using
the following simulator:
[https://www.netacad.com/courses/packet-tracer]
https://vulms.vu.edu.pk/Courses/CS610/Downloads/Creating%20simple%20topolgy%20in%20Packe
t%20tracer.mp4
Lab 3
Access your network and identify the components of your network, for example;
Servers, Routers, End Devices, etc.
Step2: Complete the cabling.
Access the cables section and connect completely and correctly the cables between the
networks in order to ensure connectivity between the devices in the network using the
connections table given.
• Click on the device and open the Command Line Interface (CLI) and then type in the right
commands to configure the right addresses for the router using the addressing table.
• Use a console cable from an end device and connect it to the device you wish to configure and
access the terminal platform on the end device and it will take you to the device's Command
Line Interface and then type in the commands in other to configure the right addresses.
Step5: Configure the default gateway.
After configuring the IP addresses, you will need to configure the default gateway also. The
reason for this is so the end devices would know what network they are operating on. You can
find the default gateway either in the addressing table (if given) or in the network topology.
Step 6: Test connectivity
After configuring the addresses, you will have to test connectivity by opening a command
prompt window on the end devices and try pinging the address which the network operates on.
If it gives you a reply, it means your network was configured correctly.
Students and teacher communicate through Adobe Connect. Students perform the task using
the following simulator:
[https://www.netacad.com/courses/packet-tracer]
Lab 4
To study about different physical equipment used for networking Cables
To transmit the data, medium must exist usually in the form of cables or wireless media.
Here are some most commonly used cable types.
Thick coaxial cables or thick wire is known as the Ethernet standard RG-11. This cable
is mostly used as backbone cable, distributing Ethernet signal throughout a building, an
office complex or other large installation. It is used in 10base5 Ethernet standard. The
length may be up to 500 meters with a max of five segments connected by repeaters. This
gives a total distance of 2500 meters. This is called a network diameter. RG-11 cable is
typically orange; with black rings around the cable every 2.5-meter to allow taps into the
cable.
RG-58 is typically used for wiring laboratories and offices, or another small group of
computers. The maximum length of thin wire Ethernet segment is 185 meters, which is
due to the nature of the CSMA/CD method of operation, the cable attenuation, and the
speed at which signals propagate inside the coax.
The length is limited to guarantee that collision is detected when machines that are apart
transmit at the same time. BNC connectors are used to terminate each end of the cable. When
many machines are connected to the same Ethernet segment, a daisy chain approach is used.
The BNC connectors allow the network interface card to the next machine. The machine each
end of the cable must use a terminating resistor to eliminate collision-causing reflection in the
cable.
Coaxial Cable Connectors
Coaxial connectors are needed to connect coaxial cable to devices. The most common
type of connector used today is the Bayone-Neil-Concelman, in short, BNC connector.
The three popular types of connectors are: the BNC connector, the BNC T connector,
and the BNC terminator. The BNC connector is used to connect the end of the cable to a
device, such as a TV set. The BNC T connector is used in Ethernet networks to branch
out to a connection to a computer or other device.
The BNC terminator is used at the end of the cable to prevent the reflection of the signal.
Applications
1. Coaxial cable was widely used in analog telephone networks, and later
with digital telephone networks.
2. Cable TV networks use coaxial cables (RG-59) at the network
boundaries. However, coaxial cable has largely been replaced today with
fiber-optic cable due to its higher attenuation.
3. Traditional Ethernet LAN
• 10Base-2, or thin Ethernet, uses RG-58 coax cable with BNC connectors.
• 10Base-5, or thick Ethernet, uses RG-11 coax cable with specialized connectors.
Mostly the UTP is used. A twisted pair segment can’t exceed 100 meters. This limitation is the
only drawback to twisted pair. Twisted pair is used for 10/100 based Ethernet networks. UTP
cables are wired as straight through or crossover cables. Straight through cables typically
connect the computer’s networks interface can’t to be a port on the hub. Crossover cables are
used for NIC to communication and for hub-to-hub connections when no crossover port is
available.
Applications
2. The local loop –the line connecting the subscriber to the central telephone office-
commonly consists of UTP cables.
3. DSL lines are also UTP cables.
4. LANs such as, 10Base-T and 100Base-T use UTP cables.
Fiber Optic
Fiber Optic relies on pulsed as light to carry information. Two types of plastic or glass with
different physical properties are used (the inner core and the outer cladding) to allow a beam
of light to reflect off the boundary between the core and cladding. Some fiber optic cables
allow many different paths other allow one single mode. They are called multimode and single
mode fibers. A popular multimode fiber has core/cladding dimensions of 62.5/125 nanometers.
Step 8: Now give this command "ping 20.0.0.10" and press enter. You will get, connectivity
between 10.0.0.10 and 20.0.0.10 is ok. Now PC1 communicates with PC2
Mechanism to Conduct Lab:
Students and teacher communicate through Adobe Connect. Students perform the task using the
following simulator:
[https://www.netacad.com/courses/packet-tracer]