371CCS-3 Lab Manual
371CCS-3 Lab Manual
Lab Manual
1|Page
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
Topics to be Covered
LIST OF EXPERIMENTS NO OF CONTACT
WEEKS HOURS
1 Introduction to Computer Networks Week 1 2 Hours
Network Cables and Connectors.
2 OSI Layers, Network Interface Card and MAC Address. Week 2 2 Hours
Find MAC Address of PC machine.
3 IP Addressing Week 3 2 Hours
Classes of IP Address, Subnetting, Super netting
4 Introduction to Network Devices. Week 4 2 Hours
Peer to Peer connections on packet tracer.
5 Designing and configuring different network topologies Week 5 2 Hours
6 Switching: PC connections using switches Week 6 2 Hours
7 Creating VLANs, Access Interfaces for VLANs and Trunks Week 7 2 Hours
for the network.
8 Routing: Router Basic IOS Week 8 2 Hours
9 Static Routing Week 9 2 Hours
2|Page
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
UTP (Unshielded Twisted Pair) UTP is by far the most used networking cable. It typically consists
of 4 pairs of 2 wires (8 separate wires total), all within one casing. Each pair of two individual
wires are twisted around each other to cancel out EMI (electromagnetic interference). The standard
connector in computer networking is an RJ45. There are some other types of twisted pair cabling
such as STP (Shielded Twisted Pair) and FTP (Foil Twisted Pair), but these other cable types are
seldom used and are not part of the CCNA Blueprint. There are four colors associated with the
eight wires within the cable. The colors of the wires determine where they will be terminated in the
RJ45 connector. The color code is Blue, Orange, Green, and Brown. For each color, there are two
types: "Color + White" & "White + Color". In other words, there are two blue wires – One is
mostly blue with white stripes, the other is mostly white with blue stripes. These are referred to as
White/Blue & Blue/White. There are three types of cables you must be familiar with for the CCNA
Blueprint: Straight Cable, Crossover Cable, and Rollover Cable. These cable types are determined
by where the various colored wires are terminated (installed) within the RJ45 connector.
• Straight Cable:
In a straight cable (also called a straight through) cable, the wires are terminated on the
same RJ45 pins at both sides of the cable:
Although not all wires are in use, they should be terminated identically to what is show in the
graphic.
Key Topic: A straight cable is used to connect devices that operate at different layers of the OSI
Model. For example, a straight cable is used to connect a switch (L2) to a router (L3).
2. Crossover Cable:
In a crossover cable, four wires are reversed or crossed. Pins 1,2,3,6 on the left are terminated on
3,6,1,2 on the right respectively:
3|Page
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
Note: A crossover cable is used to connect two devices that operate on the same layers of the OSI
Model. For example, a crossover cable is used to connect a router to another router.
Note: A rolled cable is used to connect to the console port on a Cisco network device (switch /
router / etc…).
Cable Categories
Although additional categories exist, here are the main categories for the CCNA Blueprint:
• Straight Cable: Used to connect devices on different layers of the OSI Model.
• Crossover Cable: Used to connect devices on the same layer of the OSI Model.
• Rolled Cable: Used to connect directly to the console port of Cisco equipment.
• UTP Cable maximum distance: 100 Meters
• Cat 5 bandwidth: 100Mbps
• Cat 5e/6 bandwidth: Up to 1000Mbps
Note: Many modern switches support a technology called MDI-X. When enabled, you will not
need to use a crossover cable for switch-to-switch connections. The "crossover" is done through
software. However, this technology should not be considered unless you are specifically told the
switch supports it. For example, if our practice question asks you what type of cable should be
used for a switch-to-switch connection, the answer is crossover.
Fiber optic:
Fiber Optic cable uses light to send signals from one device to another. This is different than
copper cabling that uses electric signals. Thus, fiber optic cables are not affected by EMI and can
often achieve much greater distances without signal loss.
Network Connectors
RJ45:The RJ45 connector works with twisted pair cabling and is the most common type of
connector in modern networks. In addition, the RJ45 connector is used on Cisco console cables.
5|Page
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
You don't necessarily have to memorize the names of each Fiber Connector. However, you should
be able to identify all of these as belonging to the Fiber family.
DB60
The image is of a typical WAN cable with DB60 connectors. The 60 in DB60 indicates the
connector has 60 pins. These connectors are typically used with Serial WAN connections.
6|Page
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
7|Page
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
8|Page
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
9|Page
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
An Ethernet connection uses a standard interface known as an RJ45 connector. 'RJ' stands for
'registered jack.'
This cable plugs into the Ethernet connection of a computer. Small LED lights built into the
connection will show that a connection is active and whether data is being transferred.
10 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
3. Press Enter
A command window displays.
11 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
Lab 3: IP Addressing
All Class C addresses, for example, have the leftmost three bits set to '110', but each of the
remaining 29 bits may be set to either '0' or '1' independently (as represented by an x in these
bit positions):
110xxxxx xxxxxxxx xxxxxxxx xxxxxxxx
Converting the above to dotted decimal notation, it follows that all Class C addresses fall in
the range from 192.0.0.0 through 223.255.255.255.
12 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
IP Loopback Address
127.0.0.1 is the loopback address in IP. Loopback is a test mechanism of network adapters.
Messages sent to 127.0.0.1 do not get delivered to the network. Instead, the adapter intercepts
all loopback messages and returns them to the sending application. IP applications often use
this feature to test the behavior of their network interface.
As with broadcast, IP officially reserves the entire range from 127.0.0.0 through
127.255.255.255 for loopback purposes. Nodes should not use this range on the Internet, and
it should not be considered part of the normal Class A range.
Zero Addresses
As with the loopback range, the address range from 0.0.0.0 through 0.255.255.255 should not
be considered part of the normal Class A range.
Private Addresses
The IP standard defines specific address ranges within Class A, Class B, and Class C reserved
for use by private networks (intranets). The table below lists these reserved ranges of the IP
address space.
3.2 Subnetting
Subnetting is the strategy used to partition a single physical network into more than one smaller
logical sub-networks (subnets). An IP address includes a network segment and a host segment.
Subnets are designed by accepting bits from the IP address's host part and using these bits to assign a
number of smaller sub-networks inside the original network. Subnetting allows an organization to add
13 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
sub-networks without the need to acquire a new network number via the Internet service provider
(ISP). Subnetting helps to reduce the network traffic and conceals network complexity. Subnetting is
essential when a single network number has to be allocated over numerous segments of a local area
network (LAN).
Subnets were initially designed for solving the shortage of IP addresses over the Internet.
14 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
Aim: Identify the purpose, features, and functions of the following network components
1. Hubs
2. Switches
3. Routers
HUBS
A hub is the least expensive, least intelligent, and least complicated of the three. Its job is very
simple: anything that comes in one port is sent out to the others.
If a message comes in destined for computer “A”, that message is sent out to all the other ports,
regardless of which computer “A” is.
15 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
When computer “A” responds, its response also goes out to every other port on the hub.
Every computer connected to the hub “sees” everything every other computer on the hub does. It’s up
to the computers themselves to decide if a message is for them and whether or not it should be paid
attention to. The hub itself is blissfully ignorant of the data being transmitted.
For many years, hubs were quick and easy ways to connect computers in small networks. In recent
years, hubs aren’t as common, and switches have come into greater use.
16 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
SWITCHES
A switch does what a hub does, but more efficiently. By paying attention to the traffic that comes
across it, it can learn which computers are connected to which port.
Initially, a switch knows nothing, and simply sends on incoming messages to all ports.
Just by accepting that first message, however, the switch has learned something: it knows on which
connection the sender of the message is located. Thus, when machine “A” responds to the message,
the switch only needs to send that message out to the one connection.
17 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
By processing the response, the switch now knows on which connection machine “A” is located. That
means subsequent messages destined for machine “A” need only be sent to that one port.
Switches learn the location of the devices they are connected to almost instantaneously. The result is,
most network traffic only goes where it needs to, rather than to every port. On busy networks, this
can make the network significantly faster.
ROUTERS
A router is the smartest and most complicated of the three. Routers come in all shapes and sizes, from
small, four-port broadband routers to large industrial-strength devices that drive the internet itself.
One way to think of a router is as a computer that can be programmed to understand, manipulate, and
act on the data it handles.
Routers are network devices that literally route data around the network. A router operates as a switch
for basic routing: it learns the location of the computers sending traffic and routes information only to
the necessary connections.
18 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
19 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
Goals:
1. Connect PC machine and laptop as given in the network topology.
2. Configure all the IP addresses as specified in the topology picture.
3. Check connectivity between PC’s using ping command.
Configurations:
PC 1:
Now configure laptop with specified IP Address given in above network topology
20 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
Results: Check your results and ensure that you restored full connectivity between all PC’s.
21 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
1. Bus Topology:
Bus Topology is the simplest of network topologies. In this type of topology, all the nodes
(computers as well as servers) are connected to the single cable (called bus), by the help of
interface connectors. This central cable is the backbone of the network and is known as Bus
(thus the name). Every workstation communicates with the other device through this Bus.
2. Star topology
Star Topology All devices are connected to a central switch, which makes it easy to add new
nodes without rebooting all currently connected devices. This topology makes efficient use of
cable and is easy to administer. On the other hand, the health of the switch is vital. This
topology requires monitoring and maintenance. However, it is a commonly encountered
topology.
22 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
Mesh topology:
Each node is connected to every other mode with a direct link. This topology creates a very reliable
network but requires a large amount of cable and is difficult to administer. Wi-Fi networks make this
topology more feasible.
Ring Topology:
Ring topology refers to a specific kind of network setup in which devices are connected in a ring and
pass information to or from each other according to their adjacent proximity in the ring structure.
This type of topology is highly efficient and handles heavier loads better than bus topology.
23 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
24 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
Task 2: Create a LAN using 2 switches and 4 PC’s and create two networks
25 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
Goals:
1. Connect all PC and laptops as specified in the topology picture.
2. Configure PC machines.
3. Check connectivity between PC machines.
26 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
Configurations:
PC 1:
Now configure remaining PC machines and laptops with specified IP Address given in above
network topology.
Results: Check your results and ensure that you restored full connectivity between all PC’s.
27 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
Lab 7: Configure the VLAN’s and the trunks for the network as shown in the
diagram.
i. Create a four VLAN’s
VLAN-10 as lab-1
VLAN-20 as lab-2
VLAN-30 as Lab-3
VLAN-99 as Administrator (mgt&native)
ii. Create the access interfaces for the VLANS are given as
Lab-1 fa0/6-10
Lab-2 fa11/17
Lab-3 fa18/23
Administrator as fa0/24
iii. Create the trunks for the Fa0/1-2
Solution:
First Configure the IP address for the given network along with the subnet mask and default gateway.
Then carry out the configuration for the switches as shown below.
Switch 0
Switch>enable
28 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#vlan 99
Switch(config-vlan)#name mgt&native
Switch(config-vlan)#exit
Switch(config)#
Switch(config)#vlan 10
Switch(config-vlan)#name lab-1
Switch(config-vlan)#exit
Switch(config)#vlan 20
Switch(config-vlan)#name lab-2
Switch(config-vlan)#exit
Switch(config)#vlan 30
Switch(config-vlan)#name lab-3
Switch(config-vlan)#exit
Switch(config)#
Switch#copy running-config startup-config
Destination filename [startup-config]?
Building configuration...
[OK]
Switch#
Switch#show vlan brief
Switch: 1
witch>
Switch>enable
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#vlan 99
Switch(config-vlan)#name mgt&native
Switch(config-vlan)#exit
Switch(config)#vlan 10
Switch(config-vlan)#name lab-1
Switch(config-vlan)#exit
Switch(config)#vlan 20
Switch(config-vlan)#name lab-2
Switch(config-vlan)#exit
Switch(config)#vlan 30
Switch(config-vlan)#name lab-3
Switch(config-vlan)#exit
Switch(config)#
Switch(config)#
29 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
Switch#
Switch 2:
witch>
Switch>enable
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#vlan 99
Switch(config-vlan)#name mgt&native
Switch(config-vlan)#exit
Switch(config)#vlan 10
Switch(config-vlan)#name lab-1
Switch(config-vlan)#exit
Switch(config)#vlan 20
Switch(config-vlan)#name lab-2
Switch(config-vlan)#exit
Switch(config)#vlan 30
Switch(config-vlan)#name lab-3
Switch(config-vlan)#exit
Switch(config)#
Switch(config)#
Switch#
Switch(config-if-range)#switchport mode ?
access Set trunking mode to ACCESS unconditionally
dynamic Set trunking mode to dynamically negotiate access or trunk mode
trunk Set trunking mode to TRUNK unconditionally
Switch#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#int range fa0/11-17
Switch(config-if-range)#switchport mode access
30 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
Switch(config-if-range)#int fa0/24
Switch(config-if)#switchport mode access
Switch(config-if)#switchport access vlan 99
Switch(config-if)#end
Configuration of Trunks
Switch#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#int range fa0/1-2
Switch(config-if-range)#switchport mode trunk
Switch(config-if-range)#switchport trunk native vlan 99
Switch(config-if-range)#end
Switch#
Switch 1:
Switch#enable
Switch#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#int fa0/1
Switch(config-if)#switchport mode trunk
Switch(config-if)#switchport trunk native vlan 99
Switch(config-if)#end
Switch#
Switch#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#int range fa0/6-10
Switch(config-if-range)#switchport mode access
Switch(config-if-range)#switchport access vlan 10
Switch(config-if-range)#int range fa0/11-17
Switch(config-if-range)#switchport mode access
Switch(config-if-range)#switchport access vlan 20
Switch(config-if-range)#int range fa0/18-23
Switch(config-if-range)#switchport mode access
Switch(config-if-range)#switchport access vlan 30
Switch(config-if-range)#end
Switch#
Switch#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#int fa0/24
Switch(config-if)#switchport mode access
Switch(config-if)#switchport access vlan 99
31 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
Switch(config-if)#
Switch(config-if)#end
Switch#
Switch#show vlan brief
Switch 2:
Switch#enable
Switch#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#int fa0/1
Switch(config-if)#switchport mode trunk
Switch(config-if)#switchport trunk native vlan 99
Switch(config-if)#end
Switch#
Switch#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#int range fa0/6-10
Switch(config-if-range)#switchport mode access
Switch(config-if-range)#switchport access vlan 10
Switch(config-if-range)#int range fa0/11-17
Switch(config-if-range)#switchport mode access
Switch(config-if-range)#switchport access vlan 20
Switch(config-if-range)#int range fa0/18-23
Switch(config-if-range)#switchport mode access
Switch(config-if-range)#switchport access vlan 30
Switch(config-if-range)#end
Switch#
Switch#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#int fa0/24
Switch(config-if)#switchport mode access
Switch(config-if)#switchport access vlan 99
Switch(config-if)#
Switch(config-if)#end
Switch#
32 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
Goals:
1. Configure router with IP Address specified in the topology picture.
2. Configure PC machines.
3. Check connectivity between two PC.
Configurations:
Router (ABHA):
Router#config t
Router(config)#hostname ABHA
ABHA(config)#interface fastEthernet 0/0
ABHA(config-if)#ip address 192.168.1.1 255.255.255.0
ABHA(config-if)#no shutdown
ABHA(config-if)#exit
ABHA(config)#exit
ABHA#
PC Configuration:
33 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
Results:
Show IP interface brief:
Activity:
Router Configuration
34 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
Goals:
1. Configure all the IP addresses on both routers as specified in the topology picture.
2. Configure PC machines.
3. Configure routing protocol RIP.
4. Check connectivity between two PC.
35 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
Static Routing
Objective
Understanding Static Routing: Static Routes are administratively defined routes that specify the
address or interface of the next hop in the path that packets must take while moving between a source
& destination.
Procedure
1. Configuring & Assigning the IP addresses on the routers R1 & R2.
2. Check the routing table on both the routers.
3. Administratively define the Static Routes on both routers so that hosts on the both routers can
communicate with each other.
4. Check the routing table on both the routers after defining the Static Routes on both sides.
5. Verifying the connection of both hosts.
Configuration
Step 1(A): Assigning the IP addresses on the Router R1.
R1(config)#interface serial 0
R1(config-if)#ip address 15.0.0.1 255.0.0.0
R1(config-if)#no shutdown
R1(config-if)#clock rate 64000 (Clock Rate will set only DCE Interface)
R1(config)#interface ethernet 0
R1(config-if)#ip address 10.0.0.20 255.0.0.0
R1(config-if)#no shutdown
36 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
Step 3(A): Administratively define the Static Route on the Router R1.
R1(config)#ip route 20.0.0.0 255.0.0.0 15.0.0.2
(Desired destination networks)
Step 3(B): Administratively define the Static Route on the Router R2.
R2(config)#ip route 10.0.0.0 255.0.0.0 15.0.0.1
(Desired destination networks)
37 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
38 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
Procedure
1. Configuring & Assigning the IP addresses on the routers R1 & R2.
2. Check the routing table on both the routers.
3. Enable the RIP protocol on both routers so that hosts on the both routers can communicate with
each other.
4. Verifying the Routing protocols on the Router.
5. Check the routing table on both the routers after enabling the RIP on both sides.
6. Verifying the connection of both hosts.
Configuration
Step 1(A): Assigning the IP addresses on the Ethernet & Serial Interfaces of Router R1 as shown in
figure.
Step 1(B): Assigning the IP addresses on the Ethernet & Serial Interfaces of Router R2 as shown in
figure.
39 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
40 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
Step 5(A): Check the Routing table of the Router R1 after enabling RIP.
R1#sh ip route
R 20.0.0.0/8 [120/1] via 15.0.0.2, 00:00:19, Serial0
C 10.0.0.0/8 is directly connected, Ethernet0
C 15.0.0.0/8 is directly connected, Serial0
Step 5(B): Check the Routing table of the Router R2 after enabling RIP.
R2#sh ip route
C 20.0.0.0/8 is directly connected, Ethernet0
R 10.0.0.0/8 [120/1] via 15.0.0.1, 00:00:22, Serial0
C 15.0.0.0/8 is directly connected, Serial0
41 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
Procedure
1. Configuring & Assigning the IP addresses on the routers R1 & R2.
2. Check the routing table on both the routers.
3. Enable the EIGRP protocol on both routers so that hosts on the both routers can communicate with
each other.
4. Verifying the Routing protocols on the Router.
5. Check the routing table on both the routers after enabling the EIGRP on both sides.
6. Verifying the connection of both hosts.
Configuration
Step 1(A): Assigning the IP addresses on the Ethernet & Serial Interfaces of Router R1 as shown in
figure.
Step 1(B): Assigning the IP addresses on the Ethernet & Serial Interfaces of Router R2 as shown in
figure.
42 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
Step 5(A): Check the Routing table of the Router R1 after enabling EIGRP.
R1#sh ip route
D 20.0.0.0/8 [90/2195456] via 15.0.0.2, 00:04:42, Serial0
C 10.0.0.0/8 is directly connected, Ethernet0
C 15.0.0.0/8 is directly connected, Serial0
Step 5(B): Check the Routing table of the Router R2 after enabling EIGRP.
R2#sh ip route
C 20.0.0.0/8 is directly connected, Ethernet0
D 10.0.0.0/8 [90/2195456] via 15.0.0.1, 00:01:12, Serial0
C 15.0.0.0/8 is directly connected, Serial0
43 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
OSPF Configuration
Objective
Understanding the routing updates process using the Open Shortest Path First (OSPF) in a single area.
Procedure
1. Configuring & Assigning the IP addresses on the routers R1 & R2.
2. Check the routing table on both the routers.
3. Enable the OSPF protocol on both routers so that hosts on the both routers can communicate with
each other.
4. Verifying the Routing protocols on the Router.
5. Check the routing table on both the routers after enabling the OSPF on both sides.
6. Verifying the OSPF neighbors on the routers.
7. Verifying the OSPF interfaces on the routers.
8. Verifying the OSPF database on the routers.
9. Verifying the connection of both hosts.
Configuration
Step 1(A): Assigning the IP addresses on the Ethernet & Serial Interfaces of Router R1 as shown in
figure.
Step 1(B): Assigning the IP addresses on the Ethernet & Serial Interfaces of Router R2 as shown in
figure.
44 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
Step 5(A): Check the Routing table of the Router R1 after enabling OSPF.
R1#sh ip route
Step 5(B): Check the Routing table of the Router R2 after enabling OSPF.
R2#sh ip route
45 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
Goals:
1. Configure all the IP address on the router as specified in the topology.
2. Configure DHCP Server configurations on the router.
3. Configure DNS server configurations.
4. Configure PC 1 and PC 2.
5. Check if you can open your browser.
Configurations:
DHCP-SERVER Configurations
Router>en
Router#config t
Router(config)#hostname DHCP-SERVER
DHCP-SERVER(config)#int fa 0/1
DHCP-SERVER(config-if)#ip add 192.168.1.1 255.255.255.0
DHCP-SERVER(config-if)#no shut
46 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
DHCP-SERVER(config-if)#
DHCP-SERVER(config-if)#
DHCP-SERVER(config-if)#exit
DHCP-SERVER(config)#ip dhcp pool deploy
DHCP-SERVER(dhcp-config)#network 192.168.1.0 255.255.255.0
DHCP-SERVER(dhcp-config)#default-router 192.168.1.1
DHCP-SERVER(dhcp-config)#dns-server 192.168.1.2
DHCP-SERVER(dhcp-config)#ip dhcp excluded-address 192.168.1.1 192.168.1.9
DHCP-SERVER(config)#
47 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
PC Configuration:
Results: Check your results and ensure that you are able to connect to the DNS Server.
48 | P a g e
King Khalid University– College of Computer Science- Department of Computer Science - Lab Manual 371CCS-3
49 | P a g e