DCN - For Merge
DCN - For Merge
SESSION: 2023-24
Data Communication and Networking Lab
(ECC 359)
III Year, V Sem
Packet Tracer is a protocol simulator developed by Dennis Frezzo and his team at Cisco Systems. Packet
Tracer (PT) is a powerful and dynamic tool that displays the various protocols used in networking, in
either Real Time or Simulation mode. This includes layer 2 protocols such as Ethernet and PPP, layer 3
protocols such as IP, ICMP, and ARP, and layer 4 protocols such as TCP and UDP. Routing protocols can
also be traced.
Purpose:
The purpose of this lab is to become familiar with the Packet Tracer interface. Learn how to use existing
Requisite knowledge:
This lab assumes some understanding of the Ethernet protocol. At this point we have not discussed other
protocols, but will use Packet Tracer in later labs to discuss those as well. Version: This lab is based on
1
Department of Electronics and Communication Engineering Delhi Technical
Campus, Greater Nida
Step 2: Choosing Devices and Connections
We will begin building our network topology by selecting devices and the media in which to connect them.
Several types of devices and network connections can be used. For this lab we will keep it simple by using
Single click on each group of devices and connections to display the various choices. Step 3: Building
2. Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or
concentrator is a device for connecting multiple twisted pair or fiber optic Ethernet
devices together and making them act as a single network segment. Hubs work at the
physical layer (layer 1) of the OSI model. The device is a form of multiport repeater.
Repeater hubs also participate in collision detection, forwarding a jam signal to all
ports if it detects a collision.
4. Bridge: A network bridge connects multiple network segments at the data link layer
(Layer 2) of the OSI model. In Ethernet networks, the term bridge formally means a
device that behaves according to the IEEE 802.1D standard. A bridge and switch are
very much alike; a switch being a bridge with numerous ports. Switch or Layer 2
switch is often used interchangeably with bridge .Bridges can analyze incoming data
packets
to determine if the bridge is able to send the given packet to another segment of the
network.
Experiment No 3
•
Configuring the Router commands
•
General Commands to configure network
•
Privileged Mode commands of a router
•
Router Processes & Statistics
•
IP Commands
•
Other IP Commands e.g. show ip route etc.
ping
:
ping(8) sends an ICMP ECHO_REQUEST packet to the specified host. If the host
responds, you get an ICMP packet back. Sound strange? Well, you can “ping” an IP
address to see if a machine is alive. If there is no response, you know something is
wrong
Traceroute:
Tracert is a command which can show you the path a packet of information takes from
your computer to one you specify. It will list all the routers it passes through until it
reaches its destination, or fails to and is discarded. In addition to this, it will tell you how
long each 'hop' from router to router takes.
nslookup:
Displays information from Domain Name System (DNS) name servers.
NOTE :If you write the command as above it shows as default your pc's server name firstly.
pathping:
A better version of tracert that gives you statics about packet lost and latency.
Getting Help
In any command mode, you can get a list of available commands by entering a question mark
(?). Router>?
To obtain a list of commands that begin with a particular character sequence, type in those
haracters followed immediately by the question mark (?).
Router#co?
configure connect copy
To list keywords or arguments, enter a question mark in place of a keyword or argument.
Include a space before the question mark.
Router#configure ?
memory Configure from NV memory network Configure from a TFTP network host
terminal Configure from the terminal
You can also abbreviate commands and keywords by entering just enough
characters to make the command unique from other commands. For
example, you can abbreviate the show command to sh.
Configuration Files
Any time you make changes to the router configuration, you must save the
changes to memory because if you do not they will be lost if there is a system
reload or power outage. There are two types of configuration files: the running
(current operating) configuration and the startup configuration. Use the
following privileged mode commands to work with configuration files.
Experiment no 4
• The bus topology is easy to understand, install, and use for small network.
• Cable required is least compared to other network topology.
• Cost effective.
• Easy to joining two cable together.
Disadvantages:
Star Topology: A star topology is a topology for a Local Area Network (LAN) in which all
nodes are individually connected to a central connection point, like a hub or a switch. A star
takes more cable than e.g. a bus, but the benefit is that if a cable fails, only one node will be
brought down.
Advantages:
Disadvantages:
Step 10: Write the IP address of your network and click at the Subnet mask filed. Subnet mask
will appear automatically.
Step 11: Repeat step 10 to set the IPs for all the PCs.
Step 12: now add a router and repeat the above step for connecting second LAN. Step 13:
Step 14: Drag and Drop the message to the source device and then to the destination device.
Step 15: Select the simulation mode at the bottom right corner. Step 16:
Step 17: Observe the path of the message from source to switch. Then to all devices and then
move to the destination.
Step 18: Finally observe the marks. If the source PC is marked correct it means you have
successfully established connection.
AIM:(C) To Configure a Ring Topology network using CISCO packet tracer software.
Packet tracer: Packet Tracer is a cross-platform visual simulation tool designed by Cisco
Systems that allows users to create network topologies and imitate modern computer
networks. The software allows users to simulate the configuration of Cisco routers and
switches using a simulated command line interface. Packet Tracer makes use of a drag and
drop user interface, allowing users to add and remove simulated network devices as they see
fit.
Ring Topology :
A ring topology is a network configuration in which device connections create a circular data
path. Each networked device is connected to two others, like points on a circle. Together,
devices in a ring topology are referred to as a ring network.
Advantages:
Disadvantages:
topology:
Step 6: Select connections from power cycle devices and click on automatically choose
connection type.
Step 8: Double click on a PC, a box will appear, click on the Desktop tab. Step 9:
Step 10: Write the IP address of your network and click at the Subnet mask filed. Subnet mask
will appear automatically.
Step 11: Repeat step 10 to set the IPs for all the PCs. Step 12:
Step 13: Drag and Drop the message to the source device and then to the destination device.
Step 14: Select the simulation mode at the bottom right corner. Step 15:
Step 16: Observe the path of the message from source to switch. Then to all devices And then
move to the destination.
Step 17: Finally observe the marks. If the source PC is marked correct it means you have
successfully established connection.
AIM: (d) To Configure a Mesh Topology network using CISCO packet tracer software.
Packet tracer: Packet Tracer is a cross-platform visual simulation tool designed by Cisco
Systems that allows users to create network topologies and imitate modern computer
networks. The software allows users to simulate the configuration of Cisco routers and
switches using a simulated command line interface. Packet Tracer makes use of a drag and
drop user interface, allowing users to add and remove simulated network devices as they see
fit.
Mesh Topology:
A mesh topology is a network topology in which all the network nodes are individually
connected to most of the other nodes. There is not a concept of a central switch, hub or
computer which acts as a central point of communication to pass on the messages.
A fully connected mesh topology has all the nodes connected to every other node. If you
know the graph theory, then it is like a fully connected graph where all the nodes are
connected to every other node. On the other hand, a partially connected mesh topology
does not have all the nodes connected to each other.
Advantages:
Step 6: select connections from power cycle devices and click on automatically choose
connection type.
Step 8: Double click on a PC, a box will appear, click on the Desktop tab. Step 9:
Step 10: Write the IP address of your network and click at the Subnet mask filed. Subnet mask
will appear automatically.
Step 11: Repeat step 10 to set the IPs for all the PCs. Step 12:
Step 13: Drag and Drop the message to the source device and then to the destination device.
Step 14: Select the simulation mode at the bottom right corner. Step 15:
Step 16: Observe the path of the message from source to switch. Then to all devices and then
move to the destination.
Step 17: Finally observe the marks. If the source PC is marked correct it means you have
successfully established connection.
Experiment no 5
AIM: To understand the operation of TELNET by accessing the router in server
room from a PC.
THEORY:
Telnet:
• Telnet is an application layer protocol that allows a network administrator to access and
manage remote devices.
• A user on a client machine can use a software (also known as a Telnet client) to access a
command-line interface of another, remote machine that is running a Telnet server program.
• A network administrator can access the device by telnetting to the IP address or hostname
of a remote device. The network administrator will then be presented with a virtual terminal
that can interact with the remote host. Steps
1.
For PC choose fast Ethernet and for Router choose Gigabit ethernet 0/0/0
[Type here]
4. In the pc
[Type here]
https://www.youtube.com/watch?v=lpBblkiUUuU
Experiment no 6
Static routing
Static routing is a form of routing that occurs when a router uses a manually-configured routing entry,
rather than information from dynamic routing traffic.
Steps
1. Develop the network using two routers (1841) from networking devices, two switches (2950-
24) from networking devices and 4 PCs from end devices
[Type here]
Next step is configuration
In all the four PC IP addresses are set. Two in one network and two is another (Desktop-IP configuration)
Similarly setting for router
(config-fastethernet 0/0 for the networks connected pcs)
[Type here]
Set Ip address. Subnet mask will appear automatically. Click on “on” on the top.
[Type here]
Click on add
For the router in network 2, set the following from
Click on add
Now check messgage passing from pc no 3 to pc no 0. It is successful
https://youtu.be/lmnptnqn-WI?si=KZ-CoPefi5Sluxhd
[Type here]
Experiment no 7
Subnetting
The practice of dividing a network into two or more networks is called subnetting. Creating a
subnet by dividing the host identifier. Computers that belong to the same subnet are addressed with
an identical group of its most-significant bits of their IP addresses.
Steps
Develop a network using a router (2811), two switches (2960-24TT) and four PCs
Then configure the IP addresses in each pc
Here subnet mask will be divided in to two parts so instead of 255 we have to take 128
In one side
[Type here]
Then configuration for the router for both fastethernet 0/0 and fastethernet 0/1
And
[Type here]
Experiment no 8
Experiment no 9
To implement the DHCP onto the Network Topology using Cisco Packet Tracer.
DHCP
Dynamic Host Configuration Protocol (DHCP) is a network protocol used to automate the process
of configuring devices on IP networks. it's the standard mechanism to dynamically assign IP
addresses within a network. Steps
Develop a network using a server (Server-PT), a switch ( Switch-PT) and few no of PCs.
Here three PCs are taken
[Type here]
Set the configuration in server
First from desktop – ip configuration, set the following
[Type here]
Click on DHCP, The Ip address will appear automatically. https://youtu.be/Oj3nFRphDgw?
si=DuXw1mgr5LhKUBPU