0% found this document useful (0 votes)
23 views

Lab 1 To 4

Lab 1 to 4

Uploaded by

asifa Adil
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

Lab 1 To 4

Lab 1 to 4

Uploaded by

asifa Adil
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 41

Lab 1

a)- Introduction and gathering addresses (IP/MAC) information

In this lab we will learn about

1. Introduction to IP/Mac address


2. Gather information, including the connection, host name, MAC(Layer2) address, and
TCP/IP Network(Layer 3)
3. Learn to use the TCP/IP packet Internet groper (ping) command.
4. Learn to ping Loopback address
5. Learnt to use the trace route (tracert) command.

Introduction to IP and Mac addressing

Every machine on a network has a unique identifier. An IP address provides an identity to a


networked device. Similar to a home or business address supplying that specific physical
location with an identifiable address; devices on a network are differentiated from one another
through IP addresses.

IPv4 uses 32 binary bits to create a single unique address on the network. An IPv4 address
is expressed by four numbers separated by dots. Each number is the decimal (base-10)
representation for an eight-digit binary (base-2) number, also called an octet. For example:
216.27.61.137

A MAC address, or Media Access Control address, is a 48 bit address associated with a
network adapter. While IP addresses are associated with software, MAC addresses are
linked to the hardware of network adapters. The MAC address is a unique value associated
with a network adapter. MAC addresses are also known as hardware addresses or physical
addresses. They uniquely identify an adapter on a LAN.

Gather TCP/IP configuration information.

1. Use the Start menu to open the command prompt


(Start>Programs>Accessories>Command Prompt or Start>Programs>Command
Prompt).

2. Type ipconfig and press Enter key. The spelling of the ipconfig is critical, but the case
is not.
3. The screen shows the IP address, subnet mask and the default gateway. The IP address
and the default gateway should be in the same network or subnet; otherwise this host
wouldn’t be able to communicate outside the network.

• Write down the TCP/IP information for your computer.


a. IP address: _______________________________________________

b. Subnet mask: _____________________________________________

c. Default gateway: ___________________________________________

• Compare your computer’s TCP/IP configuration to that of others on the LAN. If


this computer is on a LAN, compare the information of several machines (Hosts).
a. Are there any similarities? ____________________________________________

b. What is similar about the IP addresses? __________________________________

c. What is similar about the default gateway? _______________________________

d. Record a couple of the IP addresses (of your nearby hosts)

1.___________________________________________________________

2.____________________________________________________________

3.____________________________________________________________
Check additional TCP/IP configuration information.

1. To see more information, type ipconfig/all and press Enter key. The figure shows the
detailed IP configuration of the computer on the screen.

2. You should see the following information:

• The host name (computer name), the Physical address of your machine, IP
address, subnet Mask, Default Gateway and DNS Servers.
3. In the LAN, compare your result with a few nearby computers. What similarities do
you see in the physical (MAC) address?
________________________________________________________________

d. Write down the computer’s host name: _______________________________

e. Write down the host names of a couple of other computer:

a. _______________________________________

b. _______________________________________

c. ________________________________________

d. ________________________________________
b) Verification of network connectivity using Ping and trace route

Using PING and TRACERT from a Workstation

Open the Command prompt (MS-DOS). Ping the IP address/domain name of another
computer.

In the window, type ping, a space, and the IP address/domain name.

Steps to pinging vu website

1-your computer should be connected to Internet

2-GO to Dos Prompt

3-On Dos Prompt write ping www.vu.edu.pk

4-you will see the Pinging statistics

Ping uses the Internet Control Message Protocol (ICMP) echo-request and echo-reply feature
to test physical connectivity. If there will some Dropped or lost packets then a ping/trace
route will usually show as asterisks (*).

Ping the following addresses and verify that result was successful.

1. www.pucit.edu.pk

2. www.aiou.edu.pk

3. www.pu.edu.pk

4. www.microsoft.com

5. www.mit.edu.
Understanding OUTPUT:

Interesting result from ping is round-trip time calculation. Measured in milliseconds, round-
trip time indicates the delay between the sending of a ping request packet and the receipt of the
corresponding response packet. The network delay or latency indicated by ping offers a good
indicator of the responsiveness of network services on that remote host.

By default, ping waits Approximately 4,000 milliseconds (4 seconds) for each response to be
returned before displaying the "Request Timed Out" message.

In computer networks, hop refers to the number of routers that a packet (a portion of data)
passes through from its source to its destination. The hop count represents the total number of
routing devices Time-to-live (TTL) fields. The TTL value specifies approximately how many
router (i.e. hops) the packet has gone through.

Adding to other answers that TTL value at max can be 255 because of its size of 1 byte ( 8 bits
-> max. value = 255 ). On the internet, it usually takes very less Round Trips ( RT ) to finish a
request. And within each trip, with each hop TTL decreases. Most of the requests get finished
without even reaching TTL value zero

You sent a request to some non-existent server/URL. At first its TTL was 255. It keeps on
hopping from 1 router to other, until TTL becomes zero, which is when a packet is dropped.

Why we do not need a bigger TTL value.


Because if you set TTL of a packet to 10000, it keeps on hopping from one device to another
(eventually TTL reaches zero and packet gets dropped) if the server/URL is not found. But
think if there are lots of packets circulating, without a destination, slowing the whole network.

Error messages:
➢ Destination Host Unreachable
This message indicates one of two problems: either the local system has no route to the desired
destination, or a remote router reports that it has no route to the destination. When you ping to
an IP address in a different network, ping packets reach default gateway. My default gateway
sends the packet to remote gateway. So ping packet finally reaches the remote network.
However, if the remote gateway failed to find the remote host, it will send an echo Destination
host unreachable.

The error message "Destination Host Unreachable” tells that the ping request from our
computer cannot find the route to the destination IP address (destination host). It means, the
Packet send from your computer reached the destination network successfully but the remote
gateway failed to find the destination host. So the remote gateway sends an Echo message
Destination host unreachable. One major possibility for this error; there is no route listed in the
remote gateway, for the packet send from your computer, to the destination host. If there is no
route available, it is impossible to find the destination host and your computer will receive an
error message "Destination host unreachable" from remote gateway. So one of the reason for
this can be faulty routing table. If the destination host is down at the time the packet send, it
may result destination host unreachable error message.

➢ Request Timed Out

By default, ping/trace route waits Approximately 4,000 milliseconds (4 seconds) for each
response to be returned before displaying the "Request Timed Out" message. This error
message indicates that your host did not receive the ping message back from the destination
device within the designated time period. This is an indicator that the destination device is not
connected to the network, is powered off, or is not configured correctly.
Step-5: Ping the computer’s loopback IP address.

Type the following command:

ping 127.0.0.1

The address 127.0.0.1 is reserved for loopback testing. If the ping is successful, then TCP/IP
is properly installed and functioning on this computer.
Step-6: Using trace route command

Steps to tracing

1-your computer should be connected to Internet

2-GO to Dos Prompt

3-On Dos Prompt write tracert www.mit.edu

4-you will see the trace route statistics

The result shows the complete route to the site and the number of hops in path. Traces out the
route and permits you to access a particular server. The tracert command gives you a long list
of all servers you pass through on your way to your final destination. (Maximum up to 30hops-
if your route is longer than that, you are expected to give up waiting for the connection).

Tracert uses the same echo requests and replies as the ping command but in a slightly different
way. Observe that tracert actually contacted each router three times. Compare the results to
determine the consistency of the route. Each router represents a point where one network
connects to another network and the packet was forwarded through.

➢ Trace a local host name or IP address in your local area network (LAN).

Mechanism to Conduct Lab:


Students and teacher communicate through Adobe Connect.

Lab 2

Before starting this lab you are required to follow the below procedures:

1. Download Packet Tracer Simulation Tool on your PC.

2. To get familiar with the Packet Tracer environment, watch this video named "Interface
Overview" from the Help Tutorials.

In this Lab, we will design a simple network topology by selecting some devices and suitable
media. In this lab we will keep it simple by using End Devices, Switches, Hubs, and
Connections.

Packet Tracer Workspaces

Two workspaces are supported; logical and physical. In the logical workspace, we can build
logical network topologies by placing, connecting, and clustering virtual network devices. The
physical workspace provides a sense of scale and placement in how network devices such as
routers, switches, and hosts would look in a real environment

Packet Tracer Modes

It supports two operating modes—real-time mode and simulation mode. In real-time mode, all
network activities take place with immediate real-time response. The simulation mode allows
a user to control time intervals, and the propagation of data across a network.

Installation of Packet Tracer

You can download the latest version of Packet Tracer for free from www.netacad.com/about-
networking-academy/packet-tracer.
Menu bar: This is a commonly found menu. It is used to open, close, print, save, change
preferences, and so on.
Main toolbar: This bar contains shortcut icons to menu options that are frequently accessed.
For example, open, save, zoom, undo, and redo.
Physical/Logical workspace tabs: These tabs allow you to choose between the Logical and
Physical work areas.

Common tools bar: With help of this toolbar, we can manipulate topologies. For example,
select, move layout, place note, delete, resize shape, add simple/complex Protocol data unit
(PDU).

Workspace: Here, we create topologies and display simulations.


Step 1: Start Packet Tracer and enter in logical work space
Step 2: Choosing Devices and Connections

Single click on each group of devices and connections to display the various choices
Step 3: Adding Hosts using device selection option

➢ Single click on the End Devices icon.

➢ Single click and drag the Generic host.


➢ Add three more hosts.
Step 4: Connect the Hosts to Hub and Switch
Adding a Hub: Select a hub, by clicking once on Hubs and once on a Generic hub.
➢ Connect PC0 to Hub0 by a suitable Connection.
➢ Click once on the Copper Straight-through cable.

Perform the following steps to connect PC0 to Hub0:


1. Click once on PC0
2. Choose Fast Ethernet
3. Drag the cursor to Hub0
4. Click once on Hub0 and choose Port0
5. Notice the green link lights on both the PC0 Ethernet NIC and the Hub0 Port0 showing
that the link is active
➢ Repeat the steps above for PC1 connecting it to Port1 on Hub0.

Adding a Switch: Select a switch, by clicking once on Switches and once on a 2950-24
switch.
➢ Connect PC2 to Switch0 by first choosing Connections.
➢ Click once on the Copper Straight-through cable.
➢ Perform the following steps to connect PC2 to Switch0:

1. Click once on PC2

2. Choose Fast Ethernet

3. Drag the cursor to Switch0

4. Click once on Switch0 and choose FastEthernet0/1

5. Notice the green link lights on PC2 Ethernet NIC and amber light Switch0 FastEthernet0/1
port. The switch port is temporarily not forwarding frames, while it goes through the stages
for the Spanning Tree Protocol (STP) process.

6. After a about 30 seconds the amber light will change to green indicating that the port has
entered the forwarding stage. Frames can now be forwarded out the switch port.

➢ Repeat the steps above for PC3 connecting it to Port3 on switch0 on port
FastEthernet0/2.

➢ Move the cursor over the link light to view the port. Fa means FastEthernet, 100
Mbps Ethernet.
Step 5: Configuring IP Addresses and Subnet Masks on the Hosts Before we can
communicate between the hosts we need to configure IP Addresses and Subnet Masks on the
devices.

➢ Click once on PC0.


➢ Choose the Config tab. It is here that you can change the name of PC0. It is also here
where you would enter a Gateway IP Address, also known as the default gateway. If
you want, you can enter the IP Address 192.168.1.1.
➢ Click on FastEthernet. Add the IP Address to 192.168.1.10. Click once in the Subnet
Mask field to enter the default Subnet Mask. You can leave this at 255.255.255.0.
Connecting Hub0 to Switch0

➢ To connect like-devices, like a Hub and a Switch, we will use a Cross-over cable.
Click once the Cross-over Cable from the Connections options.
➢ Move the Connections cursor over Hub0 and click once.

➢ Select Port2

➢ Move the Connections cursor to Switch0.

➢ Click once on Switch0 and choose FastEthernet0/3 (actual port does not
matter).
➢ The link light for switch port FastEthernet0/3 will begin as amber and
eventually change to green

Adding routers

➢ In the Network Component Box, click on the router

➢ Select an 1841 router.

➢ Move the cursor to the Logical Workspace and click on the desired location.
NOTE: If multiple instances of the same device are needed press and hold the Ctrl button,
click on the desired device, and then release the Ctrl button. A copy of the device will be
created and can now be move to the desired location.

➢ Click on the router to bring up the Configuration Window. This window has
three modes: Physical, Config, and CLI (Physical is the default mode).

The Physical mode is used to add modules to a device, such as a WAN Interface Card (WIC).
The Config mode is used for basic configuration. Commands are entered in a simple GUI
format, with actual equivalent IOS commands shown in the lower part of the window. The CLI
mode allows for advanced configuration of the device. This mode requires the user to enter the
actual IOS commands just as they would on a live device.

➢ In the Physical mode, click on the router power switch to turn the device off.
➢ Select the WIC-2T module and drag it to Slot 0 on the router. Then drag a
WIC Cover to Slot1.

➢ Power the device back on.


➢ Click on the Network Component Box and select Connections. Then select a
Copper Straight-through connection to connect the router to the hub.

➢ Click on the hub and choose Port 3. Then click on the router and choose interface
FastEthernet 0/0.

Mechanism to Conduct Lab:

Students and teacher communicate through Adobe Connect. Students perform the task using
the following simulator:

[https://www.netacad.com/courses/packet-tracer]

Packet Tracer Basics-1


https://vulms.vu.edu.pk/Courses/CS610/Downloads/Packet%20Tracer%20Basics-1.mp4

Creating simple topology in Packet tracer

https://vulms.vu.edu.pk/Courses/CS610/Downloads/Creating%20simple%20topolgy%20in%20Packe
t%20tracer.mp4

Lab 3

Task: How to configure a network on Packet Tracer.


Software: Packet tracer Software

Configure a Network on Cisco Packet Tracer


Step1: Open Network Topology.

Access your network and identify the components of your network, for example;
Servers, Routers, End Devices, etc.
Step2: Complete the cabling.
Access the cables section and connect completely and correctly the cables between the
networks in order to ensure connectivity between the devices in the network using the
connections table given.

Step 3: Configure the IP addresses on the end devices.


Configure the IP addresses on the end devices. Using the address table still, correctly and
completely configure the IP addresses on all end devices. This can be done by accessing the
desktop platform on each device and locating the IP configuration section. The reason for doing
this is to enable the devices be on the right network.
Step 4: Configure the IP addresses on your routers and switches.
After configuring the right IP addresses on the end devices, you will have to do the same on
the routers and switches also, using the address table. But this time in a different way because
there's no desktop platform on the routers and switches. You will have to access the
configuration panel on both devices and this can be done in two ways:

• Click on the device and open the Command Line Interface (CLI) and then type in the right
commands to configure the right addresses for the router using the addressing table.

• Use a console cable from an end device and connect it to the device you wish to configure and
access the terminal platform on the end device and it will take you to the device's Command
Line Interface and then type in the commands in other to configure the right addresses.
Step5: Configure the default gateway.
After configuring the IP addresses, you will need to configure the default gateway also. The
reason for this is so the end devices would know what network they are operating on. You can
find the default gateway either in the addressing table (if given) or in the network topology.
Step 6: Test connectivity

After configuring the addresses, you will have to test connectivity by opening a command
prompt window on the end devices and try pinging the address which the network operates on.
If it gives you a reply, it means your network was configured correctly.

Mechanism to Conduct Lab:

Students and teacher communicate through Adobe Connect. Students perform the task using
the following simulator:

[https://www.netacad.com/courses/packet-tracer]

Lab 4
To study about different physical equipment used for networking Cables
To transmit the data, medium must exist usually in the form of cables or wireless media.
Here are some most commonly used cable types.

Thick Coaxial Cables (thick net) (RG-11)

Thick coaxial cables or thick wire is known as the Ethernet standard RG-11. This cable
is mostly used as backbone cable, distributing Ethernet signal throughout a building, an
office complex or other large installation. It is used in 10base5 Ethernet standard. The
length may be up to 500 meters with a max of five segments connected by repeaters. This
gives a total distance of 2500 meters. This is called a network diameter. RG-11 cable is
typically orange; with black rings around the cable every 2.5-meter to allow taps into the
cable.

Thin coaxial cables (thin net) (RG-58)

RG-58 is typically used for wiring laboratories and offices, or another small group of
computers. The maximum length of thin wire Ethernet segment is 185 meters, which is
due to the nature of the CSMA/CD method of operation, the cable attenuation, and the
speed at which signals propagate inside the coax.

Fig 1: Thin coaxial cables (thin net) (RG-58)

The length is limited to guarantee that collision is detected when machines that are apart
transmit at the same time. BNC connectors are used to terminate each end of the cable. When
many machines are connected to the same Ethernet segment, a daisy chain approach is used.
The BNC connectors allow the network interface card to the next machine. The machine each
end of the cable must use a terminating resistor to eliminate collision-causing reflection in the
cable.
Coaxial Cable Connectors

Coaxial connectors are needed to connect coaxial cable to devices. The most common
type of connector used today is the Bayone-Neil-Concelman, in short, BNC connector.

Fig 2: Coaxial Cable Connector

The three popular types of connectors are: the BNC connector, the BNC T connector,
and the BNC terminator. The BNC connector is used to connect the end of the cable to a
device, such as a TV set. The BNC T connector is used in Ethernet networks to branch
out to a connection to a computer or other device.

The BNC terminator is used at the end of the cable to prevent the reflection of the signal.

Applications

1. Coaxial cable was widely used in analog telephone networks, and later
with digital telephone networks.
2. Cable TV networks use coaxial cables (RG-59) at the network
boundaries. However, coaxial cable has largely been replaced today with
fiber-optic cable due to its higher attenuation.
3. Traditional Ethernet LAN
• 10Base-2, or thin Ethernet, uses RG-58 coax cable with BNC connectors.
• 10Base-5, or thick Ethernet, uses RG-11 coax cable with specialized connectors.

Twisted pair cables


Twisted pair is probably the most widely used cabling system in Ethernet in networks. Two
copper wires twist around each other to form the twisted pair cable. Depending on category
several insulated wire strands can reside in the cable.

Twisted pair is available in two basic types

a) Unshielded Twisted Pair (UTP)


b) Shielded Twisted Pair (STP)

Twisted pair cables

Unshielded Twisted Pair

Mostly the UTP is used. A twisted pair segment can’t exceed 100 meters. This limitation is the
only drawback to twisted pair. Twisted pair is used for 10/100 based Ethernet networks. UTP
cables are wired as straight through or crossover cables. Straight through cables typically
connect the computer’s networks interface can’t to be a port on the hub. Crossover cables are
used for NIC to communication and for hub-to-hub connections when no crossover port is
available.

Characteristics of twisted pair cable

1. Requires amplifiers every 5-6 km for


analog signals
2. Requires repeaters every 2-3 km for
digital signals
3. Attenuation is a strong function of
frequency
4. Susceptible to interference and noise
Fig 3: RJ45 Cables

Applications

1. Used in telephone lines to provide voice


and data channels.

2. The local loop –the line connecting the subscriber to the central telephone office-
commonly consists of UTP cables.
3. DSL lines are also UTP cables.
4. LANs such as, 10Base-T and 100Base-T use UTP cables.

Fiber Optic

Fiber Optic relies on pulsed as light to carry information. Two types of plastic or glass with
different physical properties are used (the inner core and the outer cladding) to allow a beam
of light to reflect off the boundary between the core and cladding. Some fiber optic cables
allow many different paths other allow one single mode. They are called multimode and single
mode fibers. A popular multimode fiber has core/cladding dimensions of 62.5/125 nanometers.

Fig 4: Fiber Optic cable connector


Task: How to Configure Ip address to PC and Routers in Packet Tracer

Software: Packet Tracer

Configure Ip address to PC and Routers

Step 1: Create a simple topology like this,

Step 2: Click on PC 1->Config, assign Gateway in this case, 10.0.0.1


Step 3:
Click on

Fastethernet and assign ip address and subnet mask,


In this case ip 10.0.0.10 and subnet mask 255.0.0.0,Now close PC 1 window. Do like this for PC2
with appropriate ip and subnet mask.
Step 4: Now Click on Router R1,then click on
CLI(Command Line Interface).
You will see like this, "Continue with configuration dialog? [yes/no]:".Give "no" and Press enter.
Now you will go to user mode.
Step 5: Now give "enable" and press enter. Now you get into the Privileged Mode, now type
"configure terminal" and press enter to get into global configuration mode.
Step 6: Now configure router interface with ip address and subnet mask then give no shutdown
to make this interface and line protocol up(i.e. Carefully configure ip address with proper
interfaces in this case f0/0 and f1/0,f is short form of fast ethernet.

Router(config)#interface fastEthernet 0/0


Router(config-if)#ip address 10.0.0.1 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#exit
Interface Line protocol on FastEthernet0/0, changed state to up
Router(config)#interface fastethernet 1/0
Router(config-if)#ip address 20.0.0.1 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#exit
Interface Line protocol on FastEthernet1/0, changed state to up
Step 7: Now
lights on all ports
become green from red.
Now click on PC1->Desktop->Command Prompt.

Step 8: Now give this command "ping 20.0.0.10" and press enter. You will get, connectivity
between 10.0.0.10 and 20.0.0.10 is ok. Now PC1 communicates with PC2
Mechanism to Conduct Lab:

Students and teacher communicate through Adobe Connect. Students perform the task using the
following simulator:

[https://www.netacad.com/courses/packet-tracer]

You might also like