0% found this document useful (0 votes)
9 views

Cn Lab Manual

Uploaded by

ssnithish2004a
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Cn Lab Manual

Uploaded by

ssnithish2004a
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 43

Ex.

No:1 Study of CISCO Packet Tracer

Aim:
To study about the functionalities and futures available in cisco packet tracer to simulate
the computer networking concepts.
Introduction:
As computer network shave increased in number and size, moreover computer networks
are used almost everywhere because of various benefits of computer networks, like file sharing,
printer sharing, internet connection sharing, multi-player gaming, internet telephone services,
entertainment etc... thus it is important to understand the basic concepts of computer networks.
Packet Tracer:
Packet Tracer virtual networking simulation software developed by Cisco, to learn and
understand various concepts in computer networks. Networking devices appear in packet tracer as
they look in reality and a student can interact with various networking devices, by customizing the
configurations, by turning them on and off etc. Packet Tracer is teaching and learning software
and a tool, easy to work with, thus after working with virtual environment, a student gains lot of
confidence, when it comes to working in real-time environment. We can track the path of a
packet, when it moves from source to destination, and also learn and understand, how to
troubleshoot a network, when a packet doesn't reach the destination.
Packet Tracer can be used to learn concepts more clearly by creating different scenarios. Since
Networking is all about imagination and it's difficult to track movement of packets in a real-time
environment, thus various networking concepts can be explained by creating a virtual
environment, showing the moment of packets, exactly as it would happen in real-time. Packet
tracer can be used to understand the working of various networking devices, their use, what makes
them different and their appropriate use in a designing a network. Packet tracer is a user-friendly
tool, with various options, where a user can customize and design a network. Various tests can be
run, to understand various network failures and how to troubleshoot them in real-time.
Features of Packet Tracer:
Packet tracer creates a simulation environment where a student gets visualization experience. An
instructor can set up an activity wizard to assess the students by giving them different grades.
There is also a multi-user feature,
Where students at different physical locations can work together on the same project, assignment
or lab. Packet tracer has both Logical and physical workspace to create customized scenario based
labs and it has got both Real-time and simulation Modes to understand various networking
concepts, the same way as it would have happened in real-time.
Packet trace also has got user friendly GUI and CLI interfaces, which are easy to work with and
doesn't need any experience or expertise. Another most important feature of packet tracer is that it
can support multiple languages and it is platform independent. It is an open-source software which
can be downloaded free of cost from the internet.
Packet tracer also helps to understand the concept of logical troubleshooting and it can also be
used for case studies. There are integrated tutorials along with the software to understand use of
various features of packet tracer. It also supports group and individual labs, homework, exams.
games, problem solving etc.
Workspaces:
There are two types of work space
1.Logical Work-space
It allows users to build logical network topologies and various devices can be
dragged and dropped to logical workspace.
2. Physical work-space
It allows a user to create a network, the way as it would look in real world, and has
the capability of geographical representation, where different networking devices can be
shown as connected at different locations of the city.
Modes:
There are two types Modes
1. Real-time Mode
The devices in a network behave as real devices do and look similar to real devices.
2. Simulation Mode
In this mode, a student can see and control time intervals, to learn how to
troubleshoot network failures
Networking Devices:
There are various networking devices which can be used to create different networking lab
scenarios. E.g. Routers, Switches, Hubs, Wireless Devices, Connections, End Devices, WAN
Emulation, Custom Made Devices, Multi- user Connection, Personal Computer, Laptops, Servers,
Printers, IP Phones, VOIP Devices, Analog-Phones, TVs, Wireless-Tablets, PDAs, Wireless End
Devices, Wired End Devices etc.
Connections:
Various types of cables which can be used to connect various networking devices in a packet
tracer are Console cable, Copper straight-through cable, Copper Cross-over Cable, Fibre Cable,
Phone Cable, Coaxial Cable, Serial DTE, Serial DCE, and Octal Cable. While connecting various
cables to connect various networking devices, it is important to know which type of cable to use
and to which port the cable should be connected to a particular networking device. Most of the
times we deal with a pe, switch and a router, thus it's important to know what type of cable can be
used to connect these devices On a PC, we can add a module based on the requirement, enable
firewall rules, assign IPV4 and IPV6 address, default-gateway and subnet mask to an interface.
We can also create a dial-up connection and use the terminal software to access the CLI of a
router using console cable. We can run various diagnostics tests using Command Prompt, also we
can use Web Browser, Wireless connection, VPN, Traffic Generator, MIB Browser,
Communicator, Email, PPPoE Dialler, Text Editor. Cisco Ip
DEVICES CABLE
Pc to Pc Cross-Over Cable
Pc to Router Cross-Over Cable
Pc to Switch Straight Cable
Switch to Router Straight Cable
Routerto Router Serial Cable

We can also use the following services on a server HTTP, DHCP, TFTP, DNS, SYSLOG,
AAA, NTP, EMAIL, FTP, FIREWALL, IPV6 FIREWALL, and test these
services from the client machine. Packet tracer has a user friendly CLI mode, where a user can
type different commands to configure various network devices. It is important to know which
mode a student is using, what are the commands, which can be used in that mode and how to
navigate between different modes of a networking device.
Simple Scenario:
Let's take a simple scenario by connecting a PC to a Router using a cross-over cable. If it
is a brand new router then it needs to be connected using a console cable and configured using
terminal software
These are the basic modes of a router, which are recognized by the symbols shown in the
table below. A user needs to know which mode he is in, what are the various commands that he
can type in that mode and how to navigate between different modes of a router. If a user is not
sure of what are the commands to be typed in any mode, then he can type the "?" Symbol to get
help, or the list of commands to be typed in that mode.
MODE SYMBOL

User Mode Router>

Previlege Mode Router#

Global Configuration Mode Router(config)#

Interface Configuration Router(config-if)#


Mode

Line Configuration Mode Router(config-line)#

A user can access the CLI-Mode of a router either by using a terminal software, for first time
configuration, when a PC is connected to a Router, using a console cable or by using
telnet/ssh/putty etc, when it is connected using a cross- over cable. Following basic commands can
be typed on any router to assign an IP address on an Ethernet and serial interface.
Router Commands:Router>enable
Router configure terminal
Router(config)# interface FastEthernet0/0
Router(config)# ip address 192.168.1.0
255.255.255.0 Router(config)# no shutdown
Router(config)# interface serial0/1/0
Router(config)# ip address 172.115.1.0
255.255.0.0 Router(config)# no shutdownIII.
Benefits of using Packet Tracer:
Packet tracer provides network simulation and visualization. It can be used to enhance and
improve the practical knowledge of computer networking principles among students. Moreover,
students can design mini-projects with solutions with more innovation and creativity. As with
other tools, students are able to understand the use of different networking protocols but they are
not able to understand the application of these protocols in the real networks, thus packet tracer
can be used to design and configure a network, and understand the application of various
protocols. As students can't access different networking devices, because of the cost, also devices
may be damaged and further, movement of packets from source to destination can't be seen in a
real-time, thus by using packet tracer, students can access the virtual network devices any time
and no damage can be caused to devices, moreover the movement of packets can be shown by
simulations.
Packet Tracer can further be used, to understand the difference between different
networking devices like hubs, switches, routers etc and their appropriate use while connecting
various Computers to design a network. How to assign logical address to various networking
devices like computers, routers etc appropriately. While moving from source to destination, which
route is selected by a packet depending on various routing protocols? Type of cable to be used
while connecting different networking devices. Checking connectivity between different
networking devices by running various networking tests. Basic networking concepts like DNS,
DHCP, NAT, routing etc can be easily explained by using packet tracer and students can build,
configure and troubleshoot networks using packet tracer. It also makes teaching easier, students
can create their own scenario based labs and provides real simulated and visualization
environment
Teaching and Student Experience:
Teaching Experience:
Packet tracer provides multiple opportunities for instructors to create different networking
scenarios to explain different networking concepts. Since packet tracer is not a replacement of real
equipment but it helps a student to do lot of practice and gain lot of confidence so that it's easy to
work on a real network Packet tracer is user friendly and easy to use tool, which doesn't need any
expertise or training to use this tool. There are various basic concepts of networking like DNS,
DHCP, NAT,IP addressing, Firewalls et... which can be explained by network simulation and
visualization using packet tracer. Packet tracer can also be used to gain experience and confidence
which is very useful in designing real networks.
Students Experience:
Students, who spend more time, doing practice on a packet tracer, become more confident to work
with real equipment. Students are very much interested in learning various concepts of networking
using packet tracer. They are very much interested in creating their own scenarios and always
keep on asking what if questions. There is better understanding of connecting proper devices,
using appropriate cables and assigning proper IP address to various networking devices. There is
also clear understanding about the difference in working of various networking devices and their
appropriate use in connecting various hosts together. The multi-user functionality of a packet
tracer helps the students to collaborate and compete with each other to increase and enhance the
learning of different concepts.

Result:

Thus the features and functionalities of CISCO PACKET TRACER tool have been studied.
Ex.No:2 Study of various Network Devices and Network Cables

Aim:
To study about the various network devices and Network Cables used in the
Computer Networks
Network Devices:
 Router Access Point
 Modem Bridge
 Gateway Switch
 Firewall Hub
 Network Interface Card Repeater

Router: A router is a networking device that forwards data packets between


computer networks. It operates at the network layer of the OSI model and uses routing
tables to determine the best path for data transmission between networks.
Switch: A switch is a hardware device that connects multiple devices within a
local area network (LAN) and forwards data packets to their intended destination based on
MAC addresses. Switches operate at the data link layer of the OSI model and provide
high-speed connectivity between devices.
Hub: A hub is a basic networking device that connects multiple devices in a LAN
and broadcasts data packets to all connected devices. Unlike switches, hubs do not have
intelligence to selectively forward packets, leading to network congestion and reduced
performance.
Access Point (AP): An access point is a device that allows wireless devices to
connect to a wired network using Wi-Fi technology. It serves as a central point for
wireless communication and provides wireless LAN connectivity.
Modem: A modem (modulator-demodulator) is a device that modulates digital
data from a computer into analog signals for transmission over communication lines (such
as telephone lines or cable systems) and demodulates incoming analog signals back into
digital data.
Firewall: A firewall is a network security device that monitors and controls
incoming and outgoing network traffic based on predetermined security rules. It acts as a
barrier between a trusted internal network and untrusted external networks (e.g., the
internet) to prevent unauthorized access and protect against cyber threats.
Network Interface Card (NIC): A network interface card, commonly referred to
as a NIC or network adapter, is a hardware component that enables a computer to connect
to a network. It provides the physical interface between the computer and the network
medium (e.g., Ethernet cable) and typically has a unique MAC address assigned to it.
Repeater: A repeater is a network device that regenerates and retransmits signals
to extend the range of a network. It amplifies and reshapes incoming signals before
forwarding them to the next network segment, effectively increasing the distance over
which data can be transmitted.

Bridge: A bridge is a networking device that connects two or more network


segments and forwards data packets between them based on MAC addresses. It operates at
the data link layer of the OSI model and helps reduce network congestion by filtering
traffic between segments.
Gateway: A gateway is a device that serves as an entry and exit point for data
traffic between different networks, such as a local network and the internet. It performs
protocol conversion, data translation, and routing functions to enable communication
between disparate networks with different protocols and architectures.
Network Cables
 Twisted Pair Cable
 Coaxial Cable
 Fiber Optic Cable
 Ethernet Cables
 Power over Ethernet (PoE) Cables
 Structured Cabling
 Serial Cables

Twisted Pair Cable:


Unshielded Twisted Pair (UTP): Most commonly used for Ethernet networks. It
consists of pairs of insulated copper wires twisted together to reduce electromagnetic
interference.
Shielded Twisted Pair (STP): Similar to UTP but with an extra layer of shielding
to further reduce interference. Often used in environments with high electromagnetic
interference.
Coaxial Cable:
Consists of a copper conductor surrounded by insulation, a braided metal shield,
and an outer insulating layer. It's commonly used in cable television networks and for
high-speed internet access.
Provides high bandwidth and can transmit signals over long distances without
much loss.
Fiber Optic Cable:
Utilizes light to transmit data instead of electrical signals. It consists of a core
(made of glass or plastic), a cladding layer, and an outer protective layer.
Offers high bandwidth and is immune to electromagnetic interference. It's
commonly used in long-distance communications and high-speed networks.
Types include Single-mode fiber (SMF) for long-distance communication and
Multi-mode fiber (MMF) for shorter distances.
Ethernet Cables:
Commonly referred to by categories such as Cat5, Cat5e, Cat6, Cat6a, and Cat7,
each offering different performance levels in terms of bandwidth and interference
resistance.
Cat5 and Cat5e are suitable for most Ethernet applications, while Cat6 and above
are designed for higher bandwidth requirements such as Gigabit Ethernet.
Power over Ethernet (PoE) Cables:
Allows electrical power to be transmitted along with data over the same Ethernet
cable. It eliminates the need for separate power cables, simplifying installations.
Used in applications such as IP cameras, wireless access points, and VoIP phones.
Structured Cabling:
Refers to the standardized architecture and components used in building a
telecommunications infrastructure.
Typically includes horizontal cabling (connecting workstations to the main
distribution frame), vertical cabling (connecting equipment rooms), and
telecommunications rooms.
Serial Cables:
Used for serial communication between devices. Examples include RS-232, RS-
485, and USB cables.
RS-232 cables are commonly used for connecting peripherals such as modems and
printers to computers.

Result

Hence, the study about various network devices and Network Cables is completed
successfully and verified
Ex.No:3 Configuration of a LAN
Aim
To demonstrate how traffic is sent between nodes in a LAN.
Procedure
About LAN

A local area network (LAN) is a collection of devices connected


together in one physical location, such as a building, office, or home. A LAN
can be small or large, ranging from a home network with one user to an
enterprise network with thousands of users and devices in an office or school.

A LAN comprises cables, access points, switches, routers, and other


components that enable devices to connect to internal servers, web servers, and
other LAN's via wide area networks.

The advantages of a LAN are the same as those for any group of
devices networked together. The devices can use a single Internet connection,
share files with one another, print to shared printers, and be accessed and even
controlled by one another.

Steps to be followed for a LAN configuration

 Open the CISCO Packet tracer software

 Drag and drop 3 pcs using End Device Icons on the left corner

 Select 8 port switch from switch icon list in the left bottom corner

 Make the connections using Straight through Ethernet cables

 Give IP address of the PC1, PC2 and PC3 as 192.168.1.1, 192.168.1.2 and
192.168.1.3 respectively, ping between PCs and observe the transfer of data packets
in real and simulation mode.
Network Topology Diagram for LAN
Input Details for LAN

PC0 PC1 PC2


IP Address : 10.0.0.1 IP Address : IP Address :
10.0.0.2 10.0.0.3

LAN OUTPUT WINDOW: (PINGING FROM PC0-PC1)


Packet Tracer PC Command
Line 1.0 C:\>ping 10.0.0.2
Pinging 10.0.0.2 with 32 bytes of data:
Reply from 10.0.0.2: bytes=32 time=8ms
TTL=128 Reply from 10.0.0.2: bytes=32
time=4ms TTL=128 Reply from 10.0.0.2:
bytes=32 time=4ms TTL=128 Reply from
10.0.0.2: bytes=32 time=4ms TTL=128
Ping statistics for 10.0.0.2:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in
milli-seconds: Minimum = 4ms, Maximum = 8ms, Average = 5ms

LAN - MAC ADDRESS TABLE:

Result

Hence, the various configurations in LAN are analyzed and the experiment is performed
successfully.
Ex.No:4 Configuration of a WAN
Aim
To demonstrate how traffic is sent between nodes in a WAN.
Procedure
About WAN

In its simplest form, a wide-area network (WAN) is a collection of local-area


networks (LANs) or other networks that communicate with one another. A WAN
is essentially a network of networks, with the Internet the world's largest WAN.

Today, there are several types of WANs, built for a variety of use cases that
touch virtually every aspect of modern life.

WAN Examples

 In an enterprise, a WAN is created to connect branch offices with one another or


to connect remote employees working at home with the company's main office. In
a university or campus setting, students might rely on WANs to access library
databases or university research.

 A bank, including its branch offices and ATM machines, is another example of an
organization using a WAN. The branches may be in multiple U.S. states, or even
global locations, but they are all linked through various secure connections. Both
bank employees and customers are users.
Procedure:

Step 1: First, open the cisco packet tracer desktop and select the devices given below:
S.NO Device Model Name Qty.

1. PC PC 8

2. Switch 2960-24TT 5

3. Router 2911 1

IP Addressing Table for PCs of LAN1 and LAN2:


LAN1:
S.No. Device IPv4 Address Subnet Mask Default gateway

1. PC0 13.12.11.1 255.255.255.0 13.12.11.5

2. PC1 13.12.11.2 255.255.255.0 13.12.11.5

3. PC2 13.12.11.3 255.255.255.0 13.12.11.5

4. PC3 13.12.11.4 255.255.255.0 13.12.11.5

LAN2:
S.No. Device IPv4 Address Subnet Mask Default gateway

1. PC4 192.168.1.1 255.255.255.0 192.168.1.5

2. PC5 192.168.1.2 255.255.255.0 192.168.1.5

3. PC6 192.168.1.3 255.255.255.0 192.168.1.5

4. PC7 192.168.1.4 255.255.255.0 192.168.1.5

 Then, create two network topologies (Star and Bus)as shown below the image.
 Use an Automatic connecting cable to connect the devices with others.
Representation of the topologies should look like the image given below:

WAN

Step 2: Configure the PCs (hosts) with IPv4 address, Subnet Mask, and Default gateway
according to the IP addressing table above.
 To assign an IP address in PC0, click on PC0.
 Then, go to desktop and IP configuration and there you will find IPv4
configuration.
 Fill IPv4 address, subnet mask, and default gateway to the particular input box.
 Repeat the same procedure with PCs of LAN2 to configure them.

PC 0 Config

Step 3. Assigning IP address using the ipconfig command.


 We can also assign an IP address with the help of a command.
 Go to the command terminal of the PC0.
 Then, type ipconfig <IPv4 address><subnet mask><default
gateway>(if needed)
example: ipconfig 13.12.11.1 255.255.255.0 13.12.11.5

IP config using command

 Repeat the same procedure with other PCs of Both LANs to configure them
thoroughly.
Step 4: Configure router with IP address and subnet mask.
IP Addressing Table Router:
Device Interface IPv4 Address Subnet Mask

FastEtherner0/0 13.12.11.5 255.255.255.0

router0 FastEtherner0/1 192.168.1.5 255.255.255.0


 To assign an IP address in router0, click on router0.
 Then, go to config and then Interfaces.
 Then, configure the IP address in FastEthernet and serial ports according to IP
addressing Table.
 Fill IPv4 address and subnet mask.

Router Config

Step 5: Verifying the network by pinging the IP address of any PC. We will use the ping
command to do so.
 First, click on PC0 then Go to the command prompt
 Then type ping <IP address of targeted node>
 As we can see in the below image we are getting replies which means the
connection is working properly.
Example : ping 192.168.1.2

 A simulation of the experiment is given below as PDU sent from PC0 to PC4.
Result

Hence, the various configurations in WAN are analyzed and the experiment is
performed successfully.

Ex.No: 5 Make use of Sub-netting and Simulate


computer communication network for an
organization

Aim
To make use of Subnetting and simulate computer communication
network for an organization

Procedure
About Subnetting
A subnet, or subnetwork, is a part of a larger network. Subnets are a logical part of an
IP network into multiple, smaller network components. The Internet Protocol (IP) is the
method for transmitting data from one computer to another over the internet network. Each
computer, or host, on the internet, has at least one IP address as a unique identifier.

Steps to Configure and Verify Three Router Connections in Cisco Packet


Tracer:
Step 1: First, open the Cisco packet tracer desktop and select the devices given
below:
S.NO Device Model-Name Qty.

1. PC pc 6

2. Switch PT-Switch 3

3. Router PT-Router 3

IP Addressing Table for PCs


S.NO Device IPv4 Address Subnet Mask Default-Gateway

1. pc0 192.168.1.2 255.255.255.0 192.168.1.1

2. pc1 192.168.1.3 255.255.255.0 192.168.1.1

3. pc2 192.168.2.2 255.255.255.0 192.168.2.1

4. pc3 192.168.2.3 255.255.255.0 192.168.2.1

5. pc4 192.168.3.2 255.255.255.0 192.168.3.1

6. pc5 192.168.3.3 255.255.255.0 192.168.3.1

 Then, create a network topology as shown below the image.


 Use an Automatic connecting cable to connect the devices with others.
Subnetting

Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask according to
the IP addressing table given above.
 To assign an IP address in PC0, click on PC0.
 Then, go to desktop and then IP configuration and there you will IPv4
configuration.
 Fill IPv4 address and subnet mask.

PC 0 config

Assigning IP address using the ipconfig command.


 Or we can also assign an IP address with the help of a command.
 Go to the command terminal of the PC.
 Then, type ipconfig <IPv4 address><subnet mask><default gateway>(if
needed)
Example: ipconfig 192.168.1.2 255.255.255.0 192.168.1.1

 Repeat the same procedure with other PCs to configure them


thoroughly.
Step 3: Configure router with IP address and subnet mask.
IP Addressing Table Router
S.NO Device Interface IPv4 Address Subnet mask

FastEthernet0/0 192.168.1.1 255.255.255.0

1. router0 Serial2/0 11.0.0.1 255.0.0.0

Serial 2/0 11.0.0.2 255.0.0.0

2. router1 Serial 3/0 12.0.0.1 255.0.0.0

FastEthernet0/0 192.168.3.1 255.255.255.0

3. router 3 Serial2/0 12.0.0.2 255.0.0.0


 To assign an IP address in router0, click on router0.
 Then, go to config and then Interfaces.
 Then, configure the IP address in FastEthernet and serial ports
according to IP addressing Table.
 Fill IPv4 address and subnet mask.

Router config

 Repeat the same procedure with other routers to configure them


thoroughly.
Step 4: After configuring all of the devices, we need to assign the routes to the
routers.
To assign static routes to the particular router:
 First, click on router0 then Go to CLI.
 Then type the commands and IP information given below.
CLI command : ip route <network id> <subnet mask><next hop>
Static Routes for Router0 are given below:
Router(config)#ip route 192.168.2.0 255.255.255.0 11.0.0.2
Router(config)#ip route 11.0.0.0 255.0.0.0 11.0.0.2
Router(config)#ip route 192.168.3.0 255.255.255.0 11.0.0.2
Router(config)#ip route 12.0.0.0 255.0.0.0 11.0.0.2
Static Routes for Router1 are given below:
Router(config)#ip route 192.168.1.0 255.255.255.0 11.0.0.1
Router(config)#ip route 11.0.0.0 255.0.0.0 11.0.0.1
Router(config)#ip route 192.168.3.0 255.255.255.0 12.0.0.2
Router(config)#ip route 12.0.0.0 255.0.0.0 12.0.0.2
Static Routes for Router2 are given below:
Router(config)#ip route 192.168.1.0 255.255.255.0 12.0.0.1
Router(config)#ip route 11.0.0.0 255.0.0.0 12.0.0.1
Router(config)#ip route 12.0.0.0 255.0.0.0 12.0.0.1
Router(config)#ip route 192.168.2.0 255.255.255.0 12.0.0.1
Step 5: Verifying the network by pinging the IP address of any PC. We will use the ping
command to do so.
 First, click on PC0 then Go to the command prompt
 Then type ping <IP address of targeted node>
 As we can see in the below image we are getting replies which means the
connection is working very fine
Example : ping 192.168.2.2

 Check for the simulation of sending PDU from PC0 to PC3 and PC2 to PC4 as
given below

Result
The simulation of computer communication network using subnetting for an organization has
been executed in packet tracer successfully.
Ex.No: 6 Implement VLAN for a computer network

Aim

To implement VLAN configuration for a computer network using packet tracer.

Procedure

About VLAN

VLAN is the abbreviation for Virtual LAN, i.e., Virtual Local Area Network. This is a
custom network that can be created from one or more existing LANs. It enables a group of
devices from multiple networks (both wired and wireless) to be combined into a single
Logical network. The result is a VLAN that can be administered like a physical area
network. The network equipment like routers or switches must support the VLAN
configurations to create a VLAN.

Advantages of VLANs:

Security: VLANs come up with extra security because users of the same group can send
broadcast messages with an assurance that users from another group will not receive that
broadcast message.
Time and Cost Reduction: It can reduce the migration cost of stations because it is a lot
easier and quicker to migrate using the software.

Configuration of VLAN

Step 1: At first, we create a LAN, LAN-A with 6 hosts. To create a LAN, we need one
Layer 2 switch Switch0 and 6 end devices. Now we provide IP addresses to the hosts
starting from 192.168.10.1 (provide any valid IP addresses). To provide an IP address to a
host just select that host → Desktop → IP Configuration → IPv4 Addresses and provide an
IP address and then ENTER, the Subnet Mask will be provided by default.

Step 2: Let us create 2 VLANs where the name of the first VLAN is VLAN-STUDENT
and the second VLAN is VLAN-FACULTY. To configure VLANs we have to go to the
switch Switch0 and move to Config → SWITCHING → VLAN Database. Now let us take
the VLAN Number for STUDENT is 150 and for FACULTY is 250 and add these numbers
to VLAN Database.

Step 3: Next we have to select the hosts under VLAN-STUDENT. Here, hosts with IP
addresses from 192.168.10.1 to 192.168.10.3 used under VLAN-STUDENT . To do so we
have to select the switch Switch0 → Config → INTERFACE, here we choose
FastEthernet0/1 corresponding to the host 192.168.10.1 which we consider to be in VLAN-
STUDENT. Now we select the down arrow beside VLAN and select 150:STUDENT,
which is for student VLAN.
Similarly, we do this same process for FastEthernet0/2 and FastEthernet0/3.

Step 4: Now we have to configure the hosts under VLAN-FACULTY. Here, hosts with IP
addresses 192.168.10.4 to 192.168.10.6 used under VLAN-FACULTY. To do so, just
follow the process mentioned in Step 3, but instead of selecting the VLAN Number
150:STUDENT, select 250:FACULTY for FastEthernet0/4, FastEthernet0/5, and
FastEthernet0/6.
Step 5: Lastly, just change the switch port mode from Access to Trunk for FastEthernet0/7.

Now our VLAN configuration is ready, and we can check this by sending data packets from
one host to another under LAN-A. Let us ping from 192.168.10.1 to 192.168.10.3. To do
so, we have to select the host with IP 192.168.10.1 and then select Desktop → Command
Prompt. Now run the following command to ping 192.168.10.3.
ping 192.168.10.3
First time shows the Request timed out, then run the command again to ping, and output
will be generated.
We can also ping the hosts under VLAN-FACULTY by following the previous steps, but
you cannot ping from a host under VLAN-STUDENT to a host under VLAN-FACULTY or
vice versa. It’ll generate a request time out because your created Virtual LAN STUDENT
doesn’t contain any host with IP addresses from 192.168.10.3 to 192.168.10.6. Similarly,
VLAN-FACULTY also doesn’t contain IP addresses from 192.168.10.1 to 192.168.10.3.

Result
The configuration of VLAN implementation has been simulated successfully using
Packet Tracer.
Ex.No: 7 Configure DHCP server

Aim

To Configure DHCP service on a generic server and router using Packet Tracer.

Procedure

1. Build the network topology in packet tracer

2. Configure static IP address on the server (192.168.1.2/24).


3. Now configure DHCP service on the generic server.
To do this, click on the server, then click on Services tab. You will pick DHCP on
the menu. Then proceed to define the DHCP network parameters as follows:
Pool name: MY_LAN
Default Gateway: 192.168.1.1
DNS Server: 192.168.1.2
Start IP Address: 192.168.1.0
Subnet Mask: 255.255.255.0

Maximum Number of users: 256

Click on add then Save. The DHCP entry is included in the list.
Here are the configurations on the server:

Once configured everything, turn ON the DHCP service.

4. Finally, enable DHCP configuration on each PC. The three PCs should get
automatically configured.
As an example, here is the DHCP configuration on PC1:
Configuring DHCP server on a Router.

1. Build the network topology:

2. On the router, configure interface fa0/0 to act as the default gateway for our LAN.

Router>enable
Router#config terminal
Router(config)#int fa0/0
Router(config-if)#ip add 192.168.1.1 255.255.255.0
Router(config-if)#no shutdown
Router(config-if)#exit

3. Configure DHCP server on the Router. In the server we will define a DHCP pool of
IP addresses to be assigned to hosts, a Default gateway for the LAN and a DNS Server.
Router(config)#
Router(config)#ip dhcp pool MY_LAN
Router(dhcp-config)#network 192.168.1.0 255.255.255.0
Router(dhcp-config)#default-router 192.168.1.1
Router(dhcp-config)#dns-server 192.168.1.10

We can add ip dhcp excluded-address command to our configuration so as to


configure the router to exclude addresses 192.168.1.1 through 192.168.1.10 when
assigning addresses to clients. The ip dhcp excluded-address command may be
used to reserve addresses that are statically assigned to key hosts.
So add the above command under the global configuration mode.

Router(config)#ip dhcp excluded-address 192.168.1.1 192.168.1.10

4. Now go to every PC and on their IP configuration tabs, enable DHCP. Every PC


should be able to obtain an IP address, default gateway and DNS server, as defined in step
2.

For example, to enable DHCP on PC1:

Click PC1->Desktop->IP configuration. Then enable DHCP:

Same steps to be followed for the other PCs.

Result
The configuration of DHCP server has been simulated successfully using Packet
Tracer.
Ex.No: 8 DNS Configuration
Aim
To implement DNS configuration using packet tracer.
Procedure
A Domain Name System (DNS) server resolves host names into IP addresses.
Although we can access a network host using its IP address, DNS makes it easier by
allowing us using domain names which are easier to remember. For example, it’s
much easier to access google website by typing http://www.google.com as
compared to typing http://208.117.229.214. In either case, we’ll access google
website, but using domain name is obviously easier.

Now, before any host can use a DNS service, we must configure a DNS server first.
For example, when we type the URL http://www.google.com in the browser, the
host will query the DNS server for the IP address of http://www.google.com. The
DNS server will
resolve http://www.google.com into an IP address then answer back the host with the
IP address.

1. Build the network topology.

2. Configure static IP addresses on the PCs and the server.

Server

IP address: 192.168.1.2

Subnet mask: 255.255.255.0

Default gateway: 192.168.1.1

DNS Server: 192.168.1.2


PC0

IP add: 192.168.1.3 Subnet mask: 255.255.255.0

Default gateway: 192.168.1.1

DNS server: 192.168.1.2


PC1

IP address: 192.168.1.4 Subnet mask: 255.255.255.0

Default gateway: 192.168.1.1

DNS Server: 192.168.1.2

3. Configure DNS service on the generic server.

To do this, click on the server, then click on Services tab. Click on DNS server from the
menu. First turn ON the DNS service, then define names of the hosts and their
corresponding IP addresses.
For example, to specify the DNS entry for PC0: In the name and address fields, type:
Name: PC0 Address: 192.168.1.3
Click on add then save. Repeat this for the PC1 and the
server. Once all the steps done, our DNS entries will look
like this:
Finally,

4. Test domain name – IP resolution. Ping the hosts from one another using their
names instead of their IP addresses. If the DNS service is turned on and all IP
configurations are okay, then ping should work.

For example, ping PC1 from PC0. Ping should be successful.

Result
The configuration of DNS server was simulated successfully using Packet Tracer.
Ex.No: 9 Email Server configuration

Aim
To implement E-mail server configuration using packet tracer.
Procedure
An email server, such as Gmail stores and sends email messages to email clients
on request. We often send and receive emails on our mobile devices or computers.
Whenever we compose and send an email to another person, the message we send
first goes to a mail server. It’s the mail server which then sends the email when it is
requested from the email client(e.g Gmail App) of the recipient’s device.

1. Build the network topology:

2. Configure IP addresses on the PCs, DNS Server and the Mail Server.

Mail Server IP address: 192.168.1.2/24

PC0 IP address: 192.168.1.3/24

PC1 IP address: 192.168.1.4/24

DNS server IP address: 192.168.1.5/24

3. Now configure mail clients on the PCs and mail service on the generic server.
Mail Clients:

Click on PC0. Go to its Desktop tab, and click on E-mail. Configure the email
client by filling in the user, server and login information. Be sure to Save.

PC0:

Configure mail client on PC1 in a similar way we did for PC1.


PC1:

Next, we’ll configure the email server.

To do this, click on the server, then click Services tab, pick email server from the menu.

Provide the Domain name of the server then click on Set to set it. In this example
the name ‘mail.com’ is used.

Proceed and add users and provide their passwords. We have two email
clients(users) with usernames ‘client1‘ and ‘client2‘ with a common password
‘admin‘

After entering a username and password, click on Add(+) to add the user to the
server. We can optionally remove a user by clicking on Remove (-). We can
change a user’s password by clicking on change password.

Try to relate this process to what happens when you register an email account with a mail
service provider(mail server) like Gmail.

Now, notice that we set a domain name for the email server. For that reason, we should
have a DNS server that will resolve this domain name (plus other domain names if there
were) to an IP address.

So let’s configure a DNS server.

Click DNS server, click Services tab, then pick DNS. Turn the service ON. Set name-address
pairs and add them to the server. You can view the DNS entry below:
4. Lastly test the email service. Go to PC0 email client, compose an email and send
it to PC1 email address ([email protected]).

Try to see whether the email from PC0 is received on PC1. On the email client of PC1, click
on Receive.
If everything is well set up, the email from PC0 will be well received on PC1.

Result
The configuration of E-mail server was simulated successfully using Packet Tracer.
Ex.No: 10 FTP Configuration

Aim
To implement FTP configuration using packet tracer.
Procedure
The File Transfer Protocol (FTP) is a standard network protocol used for the
transfer of computer files between a client and server on a computer network.

FTP employs a client-server architecture whereby the client machine has an FTP
client installed and establishes a connection to an FTP server running on a remote
machine. After the connection has been established and the user is successfully
authenticated, the data transfer phase can begin.

FTP configuration in Packet Tracer:

1. Build the network topology.

2. Configure static IP addresses on the laptop and the server.

Laptop: IP address: 192.168.1.1 Subnet Mask: 255.255.255.0

Server: IP address: 192.168.1.2 Subnet Mask: 255.255.255.0

3. Now try using an FTP client built in the laptop to send files to an FTP server
configured in the Server.

From the Laptop’s command prompt, FTP the server using the server IP address by typing:

ftp 192.168.1.2

Provide the username(cisco) and password(cisco) [which are the defaults] for ftp login.
It is now in the FTP prompt .

PC0 has an FTP client which can be used to read, write, delete and rename files present in
the FTP server.

The FTP server can be used to read and write configuration files as well as IOS images.
Additionally, the FTP server also supports file operations such as
rename, delete and listing directory.

4. Create a file in the Laptop then upload it to the server using FTP.

To do this, open the Text Editor in the Laptop, create a file and give it your name of choice.

Type any text in the editor then save your file. e.g. myFile.txt.

5. Now upload the file from the Laptop to the server using FTP. (An FTP connection has to
be started first)

So to do an FTP upload, type:

put MyFile.txt

6. Once file upload is successful, go to the Server FTP directory to verify if the file sent
has been received . To do this, go to Server-> Services->FTP. Here look for MyFile.txt
sent from the laptop.
To check other FTP commands supported by the FTP client running on the
Laptop(or PC), we can use a question mark (?) on the Laptop’s command prompt as
shown below:

We can see the put command that is used to upload our file to the FTP server.
Other commands listed include:

get-used to get(download) a file from the server.

For example: get MyFile.txt

delete– to delete a file in the FTP directory with the

server For example: delete MyFile.txt

Rename– used to Rename a file

cd – used to change directory.


For example, we can open an HTTP directory in the server by typing: cd
/http. This will change the current directory from FTP directory to HTTP
directory

Once the http directory is open, we can upload a file to the

HTTP server. For example: put MyFile.txt

To see this working, let’s open an HTTP directory and upload(put) a file to it using FTP:

We can now check the HTTP directory in the server and verify that the file
uploaded from the Laptop(MyFile.txt) is well received:

Notice that we are uploading files to an HTTP Server directory using File
Transfer Protocol.(FTP).

Result
The configuration of FTP implementation has been simulated
successfully using Packet Tracer.

You might also like