0% found this document useful (0 votes)
7 views

Lab Manual

The document is a laboratory manual for the Computer Engineering Department at Ahmedabad Institute of Technology, covering various experiments related to computer networks. It includes practical exercises on Cisco Packet Tracer, network cables, and network devices, with objectives, theory, and evaluation sections for each experiment. The manual is intended for students to gain hands-on experience and understanding of networking concepts and tools.

Uploaded by

manthanjadav746
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Lab Manual

The document is a laboratory manual for the Computer Engineering Department at Ahmedabad Institute of Technology, covering various experiments related to computer networks. It includes practical exercises on Cisco Packet Tracer, network cables, and network devices, with objectives, theory, and evaluation sections for each experiment. The manual is intended for students to gain hands-on experience and understanding of networking concepts and tools.

Uploaded by

manthanjadav746
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 43

Ahmedabad Institute of Technology

COMPUTER ENGINEERING DEPARTMENT


COMPUTER NETWORK
(3150710)
2022-2023

Laboratory Manual

NAME

ENROLLMENT NUMBER

BATCH

YEAR
Ahmedabad Institute of Technology
Computer Engineering Department

CERTIFICATE
This is to certify that Mr. / Ms._________________________________ Of
Enrolment No ___________________________has Satisfactorily
completed the course in ____________________________________as by
the Gujarat Technological University for ____ Year (B.E.) semester___ of
Computer Engineering in the Academic year ______.

Date of Submission:-

Faculty Name : Dr.Dushyantsinh Rathod


Signature (Head Of Department)

INDEX

210020107076 CN(3150710) 2
Sr. EXPERIMENT PAGE DATE SIGN
No NO

1 Installation And Study of CPT(Cisco Packet Tracer)

2 Study Of Different Type Of Network Cable

3 Study Of Various Network Devices In Details

4 Designing Of Various Network Topologies With CPT

5 (a)Implementing Various Routing Algorithm Using CPT

(b) DHCP Manual Configuration

6 VLAN Creation Using CPT

7 Creation Of Lan Cable With Various Tool

8 Study Of Basic Network Commands In CPT

210020107076 CN(3150710) 3
EXPERIMENT 1 DATE:

TITLE: Installation And Study of CPT(Cisco Packet Tracer)

OBJECTIVES: On completion of this experiment student

familiarize with Concept of Packet Tracer Simulator.

THEORY
Packet Tracer:
Packet Tracer is a protocol simulator developed by Dennis Frezzo and his team at Cisco
Systems. Packet Tracer (PT) is a powerful and dynamic tool that displays the various protocols
used in networking, in either Real Time or Simulation mode. This includes layer 2 protocols
such as Ethernet and PPP, layer 3 protocols such as IP, ICMP, and ARP, and layer 4 protocols
such as TCP and UDP. Routing protocols can also be traced.

The layout of Packet Tracer is divided into several components similar to a photo editor.
Match the numbering in the following screenshot with the explanations given after it:

● Area 1: Menu bar – This is a common menu found in all software applications; it is used to open,
save, print, change preferences, and so on.

210020107076 CN(3150710) 4
● Area 2: Main toolbar – This bar provides shortcut icons to menu options that are commonly
accessed, such as open, save, zoom, undo, and redo, and on the right-hand side is an icon for
entering network information for the current network.

● Area 3: Logical/Physical workspace tabs – These tabs allow you to toggle between the Logical and
Physical work areas.

● Area 4: Workspace – This is the area where topologies are created and simulations are displayed.

● Area 5: Common tools bar – This toolbar provides controls for manipulating topologies, such as
select, move layout, place note, delete, inspect, resize shape, and add simple/complex PDU.

● Area 6: Realtime/Simulation tabs – These tabs are used to toggle between the real and simulation
modes. Buttons are also provided to control the time, and to capture the packets.

● Area 7: Network component box – This component contains all of the network and end devices
available with Packet Tracer, and is further divided into two areas:

● Area 7a: Device-type selection box – This area contains device categories

● Area 7b: Device-specific selection box – When a device category is selected, this selection
box displays the different device models within that category

● Area 8: User-created packet box – Users can create highly-customized packets to test their topology
from this area, and the results are displayed as a list.

Make sure you are familiar with these names, because moving forward we will be referring to them
frequently.

WORKSPACES AND MODES

Packet Tracer has two workspaces (Logical and Physical) and two modes (Realtime and Simulation). Upon
startup, you are in the Logical Workspace in Realtime Mode. You can build your network and see it run in
real time in this configuration. You can switch to Simulation Mode to run controlled networking scenarios.
You can also switch to the Physical Workspace to arrange the physical aspects (such as the location) of your
devices. Note that you view a simulation while you are in the Physical Workspace. You should return to the
Logical Workspace after you are done in the Physical Workspace.

IMPLEMENTING PEER TO PEER CONNECTION

STEP 1: First, add two computers, by going to the [End device] menu and dragging the PC icon until it looks
like this:

STEP 2: Then, connect the two PC using a cross-over cable or you can directly use an automatic cable so
that it will look like this:

210020107076 CN(3150710) 5
STEP 3: Then after the two PC are physically connected, the next step is to provide IP addresses to
the two PCs. In this way, “click PC0 – Desktop – IP Configuration” and adjust the ip address for
example:

○ Ip address : 192.168.2.1
○ subnet mask : 255.255.255.0

STEP 4: Do the same on another PC (PC1) with a different host ip address but on the same network for
example (192.168.1.3) and subnet mask 255.255.255.0

210020107076 CN(3150710) 6
STEP 5: So if indeed the two computers are connected and can communicate with each other then PC1 will
send a response back with the message “reply from 192.168.1.3 …” which is a sign of success. However, if
the process does not occur (timed out) on your display, pay attention to the IP addresses of the two
computers (PC0 and PC1) must be in one segment, namely 192.168.1…..you can change the host number as
long as the two hosts are different then the range of numbers that can be used is 1-255.

STEP 6: To do a ping test we can use the Command Prompt on virtual computers (PC0 and PC1), by
clicking on one of the computers (PC0) then go to “Command Prompt” and type:

EXERCISES:
i)Implement Peer to Peer network connection using CPT

ii)Implement network connection more than two nodes using hubs and Switch in CPT

iii) What are benefits of CISCO PACKET TRACER

iv) What is difference between peer to peer and client server

v)Write difference between CPT and GNS3

vi) What is the difference between Hub and Switch

EVALUATION:

Involvement(4) Understanding/ Timely Completion(3) Total(10)


Problem Solving(3)

Signature with date

_________________

210020107076 CN(3150710) 7
EXPERIMENT 2 DATE:

TITLE: Study Of Different Type Of Network Cable

OBJECTIVES: After completing study of this practical the students


will be familiarized with Concept of Wired Media.

THEORY
There are two types of transmission media
• Guided – copper wires, fiber optic cable
• Unguided – Wireless (Radio Frequency / Microwave)
Information is transmitted over:
• Copper wire by varying the voltage or current time
• Fiber optic cable by pulsing light on / off in a fiber optic cable over time
• Radio waves or Microwaves by varying the frequency or amplitude over time
Guided transmission basics
• To transmit a single bit down a copper wire, we must send some electrical signal having two
discrete states to represent 0 and 1
• Examples: Voltage +5v = 1 0V = 0 Frequency 980 Hz =1 1180 Hz = 0

210020107076 CN(3150710) 8
Guided transmission media
• Guided transmission is where the signal (information or data) is sent through some sort of cable,
usually copper or optical fiber.
• There are many different types of cabling:
▪ Twisted Pair:
▪ Coaxial Cable (Coax)
▪ Fiber Optic Cable

Twisted Pair:
• This consists of two or more insulated wires twisted together in a shape similar to a helix.
• Use metallic conductor , The cables are twisted around each other to reduce the amount of
external interference
• It consists of two conductors (copper), each with its colored plastic insulation.
• This cable can be used at speeds of several Mb/s for a few kilometers.
• Used for telephone lines and lab networks.

Advantages of UTP

• Cost is less, Easy to use, Easy to install, Flexible


• UTP Used in Ethernet and Token ring
• STP has a metal foil or cover.
• Crosstalk (effect of one channel on the other channel) is less in STP.
• STP has the same consideration as UTP
210020107076 CN(3150710) 9
• Shield must connect with the ground.
• Disadvantage of STP : cost is high

Coaxial Cable (coax)

• This consists of a copper cable inside a layer of insulating material.


• The insulating material is then inside a braided outer conductor.
• A layer of plastic is on the outermost layer.
• This type of cable was commonly used in the telephone system but has since been replaced by
fiber optics on longer routes
• This cable has also been used for Cable TV.

Categories of coaxial cables

RG-Radio Government., Each cable define by RG ratting.


RG-8 &RG-9 also used in Thin Ethernet.
RG number denotes a unique set of physical Specification, including the wire gauge
of the inner conductor.

Connector of coaxial cables

The most common connector is barrel connector.


The most popular type is BNC (Bayonet Network connector)
Two other types are T-connectors and terminators.

210020107076 CN(3150710) 10
T-connectors and terminators are used in bus topology.

Advantages:-
• Easy to Install.
• Inexpensive installation.
• It is better for Higher Distance at Higher speed than twisted pair.
• Excellent noise immunity.

Disadvantage:-
• High Cost
• Harder to work

Fiber Optic Cable:


Components of Fiber Optics:-

o Light Source
o Transmission Medium
o Light Detector
This consists of a central glass core, surrounded by a glass cladding of lower refractive index, so
that the light stays in the core (using Total Internal Reflection)
• outside is covered with plastic jacket
• Many fibers may be bundled together surrounded by another plastic cover

210020107076 CN(3150710) 11
Refraction:- When Light travels from one medium to another medium changes occurs in its speed
and direction, this change is called refraction.
I - Angle of Incidence.
R- Angle of Refraction.
● Critical Angle:- At some points, the changes in the incident angle results in the refracted
angle of 90 degrees, with the refracted beam lying along the Horizontal. The incident angle at
this point is known as Critical Angle.
● Reflection:- When the angle of incidence becomes greater than the critical angle, a new
phenomenon is Occurs is called reflection.
● Light traveling of fiber optic cable
● The source of light is usually a Light Emitting Diode (LED) or a LASER. The light source is
placed at one end of the optical fiber.
● The detector, which is placed at the other end of the fiber, is usually a Photo Diode and it
generates an electrical pulse when light falls on it.
● Hence by attaching a light source on one end of an optical fiber and a detector at the other
end, we have a unidirectional data transmission system (Simplex)
● The light source would accepts an electrical signal, converts and transmits it as light pulses
● The detector at the far end reconverts the light pulses into an electrical signal to be then
interpreted as 1 or a 0.
Propagations Mode:

210020107076 CN(3150710) 12
● Fiber optic cables and network interface cards to connect a computer to the fiber are an order
of magnitude more expensive than their corresponding copper cable equivalents
● Cost is high
● Installation and maintenance is difficult.
● Higher Bandwidth.

Unguided transmission media


Information is usually transmitted by either radio or microwave transmission. Unguided media
transport electromagnetic waves without using a physical conductor. Signals are broadcast through
air (or in a few cases, water).

1. Radio Transmission:
● Radio waves are easy to generate and can travel long distances and penetrate
buildings.
● Radio waves are omni-directional which basically means that they can transmit both
ways.
● The transmitter and receiver do not have to be in direct line of sight

2. Microwave Transmission:
● Different types of Propagation
● Surface Propagation (Ground Propagation)
● Sky Propagation.(Tropospheric Propagation, Ionospheric Propagation, Space
Propagation)
● Line-of-sight Propagation.

210020107076 CN(3150710) 13
● Unlike radio waves, microwaves typically do not pass through solid objects.
● Some Waves can be refracted due to atmospheric conditions and may take longer to arrive
than direct waves. These delayed waves can arrive out of phase with the direct wave, causing
destructive interference and corrupting the received signal This effect is called multipath
fading.
● Because of increased demand for more spectrum (range of frequencies used to transmit),
transmitters are using higher and higher frequencies.
● Microwave communication is widely used for long distance telephone communication and
cell phones.
● Microwave signals propagates in one direction at a time which means two different
frequencies are necessary for two way communication.

3. Infrared:
● Infrared signals can be used for short-range communication in a closed area using line-of-
sight propagation.
● Transceivers must be within line of sight of each other or via reflection.
● Does not penetrate walls like microwave.
● No frequency allocation or licensing.

EXERCISES:

i)Compare different types of light source which we can use in optical fiber.

ii)List out different types of wired media used in computer labs with their specification.

iii) Give difference between following:

a. Twisted pair Cable and Coaxial Cable.

b. Twisted Pair Cable and Fiber Optics Cable.

c. Fiber Optic Cable and Coaxial Cable.

d. Wire Communication and Wireless Communication.

EVALUATION:

210020107076 CN(3150710) 14
Involvement(4) Understanding/ Timely Completion(3) Total(10)
Problem Solving(3)

Signature with date

________________

EXPERIMENT 3 DATE:

TITLE: Study Of Various Network Devices In Details

OBJECTIVES: On completion of this experiment student will able to…

know more about switching devices and its uses

THEORY:

210020107076 CN(3150710) 15
NAME FUNCTION

Modem: Modem is a device that enables a computer to


send or receive data over telephone or cable
lines. The data stored on the computer is digital
whereas a telephone line or cable wire can
transmit only analog data.
The main function of the modem is to
convert digital signal into analog and
vice versa. Modem is a combination of
two devices − modulator and
demodulator. The modulator converts

210020107076 CN(3150710) 16
digital data into analog data when the
data is being sent by the computer.
The demodulator converts analog data
signals into digital data when it is
being received by the computer.

RJ45 is the acronym for Registered Jack 45.


RJ45 RJ45 connector is an 8-pin jack used by devices
Connector to physically connect to Ethernet based local
area networks (LANs). Ethernet is a technology
that defines protocols for establishing a LAN.
The cable used for Ethernet LANs are twisted
pair ones and have RJ45 connector pins at both
ends. These pins go into the corresponding
socket on devices and connect the device to the
network.

Ethernet card, also known as network interface


Ethernet card (NIC), is a hardware component used by
Card(NIC) computers to connect to Ethernet LAN and
communicate with other devices on the LAN.
The earliest Ethernet cards were external to the
system and needed to be installed manually. In
modern computer systems, it is an internal
hardware component. The NIC has RJ45 socket
where network cable is physically plugged in.
Ethernet card speeds may vary depending upon
the protocols it supports. Old Ethernet cards had
maximum speed of 10 Mbps. However, modern
cards support fast Ethernets up to a speed of 100
Mbps. Some cards even have capacity of 1 Gbps.

210020107076 CN(3150710) 17
Repeater A repeater operates at the physical layer. Its
job is to regenerate the signal over the same
network before the signal becomes too weak
or corrupted so as to extend the length to
which the signal can be transmitted over the
same network. An important point to be
noted about repeaters is that they do not
amplify the signal. When the signal becomes
weak, they copy the signal bit by bit and
regenerate it at the original strength. It is a 2
port device.

Hubs: The hub or network hub connects computers


and devices and sends messages and data from
any one device to all the others. If the desktop
computer wants to send data to the lapop and
it sends a message to the laptop through the
hub, the message will get sent by the hub to all
the computers and devices on the network.
They need to do work to figure out that the
message is not for them. The message also
uses up bandwidth (room) on the network
wires or wireless radio waves and limits how
much communication can go on. Hubs are not
used often these days.

Bridges are used to divide larger networks into


Bridges: smaller sections. They do this by sitting
between two physical network segments and
managing the flow of data between the two.
By looking at the MAC address of the devices
connected to each segment, bridges can elect
to forward the data (if they believe that the
destination address is on another interface), or
block it from crossing (if they can verify that it
is on the interface from which it came).

210020107076 CN(3150710) 18
Switch is a network device that connects other
Switch devices to Ethernet networks through twisted
pair cables. It uses packet switching technique to
receive, store and forward data packets on the
network. The switch maintains a list of network
addresses of all the devices connected to it.
On receiving a packet, it checks the destination
address and transmits the packet to the correct
port. Before forwarding, the packets are checked
for collision and other network errors. The data
is transmitted in full duplex mode

A router is a network layer hardware device that


Router transmits data from one LAN to another if both
networks support the same set of protocols. So a
router is typically connected to at least two
LANs and the internet service provider (ISP). It
receives its data in the form of packets, which
are data frames with their destination address
added. Router also strengthens the signals before
transmitting them. That is why it is also called
repeater.

Gateway is a network device used to connect


Gateway two or more dissimilar networks. In networking
parlance, networks that use different protocols
are dissimilar networks. A gateway usually is a
computer with multiple NICs connected to
different networks. A gateway can also be
configured completely using software. As
networks connect to a different network through
gateways, these gateways are usually hosts or
end points of the network.
Gateway uses packet switching technique to
transmit data from one network to another. In
this way it is similar to a router, the only
difference being router can transmit data only
over networks that use same protocols.

210020107076 CN(3150710) 19
Wi-Fi is the acronym for wireless fidelity. Wi-Fi
Wi-Fi technology is used to achieve wireless
Card connection to any network. Wi-Fi card is a card
used to connect any device to the local network
wirelessly. The physical area of the network
which provides internet access through Wi-Fi is
called Wi-Fi hotspot. Hotspots can be set up at
home, office or any public space. Hotspots
themselves are connected to the network through
wires.
A Wi-Fi card is used to add capabilities like
teleconferencing, downloading digital camera
images, video chat, etc. to old devices. Modern
devices come with their in-built wireless
network adapter.

EXERCISES:

i) What are the different types of HUBS

ii)Explain different types of switches.

iii)What is the difference between HUBS , SWITCH and ROUTERS

EVALUATION:

Involvement(4) Understanding/ Timely Completion(3) Total(10)


Problem Solving(3)

Signature with date

________________

210020107076 CN(3150710) 20
EXPERIMENT 4 DATE:

TITLE: Designing Of Various Network Topologies With CPT

OBJECTIVES: On completion of this experiment students will be able to…

know more different types of topologies

THEORY:

1) BUS Topology

Bus topology is a network type in which every computer and network device is connected to single
cable. When it has exactly two endpoints, then it is called Linear Bus topology.

Features of Bus Topology


● Uses a single backbone cable.
● All the Nodes connect directly to this backbone.

210020107076 CN(3150710) 21
● Cable required is least compared to other network topology.
● Used in small networks.
● It is easy to understand.

Advantage:-
● Easy to Construct
● Cost is Low

Disadvantage:-
● Traffic is High
● If Link is Break Then no one can communicate with others.
● Difficult to add new add Devices.
● If Link is Break Then no one can communicate with others.

2) STAR TOPOLOGY

In this type of topology all the computers are connected to a single hub through a cable. This hub is
the central node and all others nodes are connected to the central node.

Features of Star Topology


● Every node has its own dedicated connection to the hub.
● Hub acts as a repeater for data flow.
● Can be used with twisted pair, Optical Fibre or coaxial cable.

Advantages of Star Topology


● Fast performance with few nodes and low network traffic.
● Hub can be upgraded easily.
● Easy to troubleshoot.

210020107076 CN(3150710) 22
● Easy to setup and modify.
● Only that node is affected which has failed, rest of the nodes can work smoothly.

Disadvantages of Star Topology


● Cost of installation is high.
● Expensive to use.
● If the hub fails then the whole network is stopped because all the nodes depend on the hub.
● Performance is based on the hub that is it depends on its capacity

3) RING TOPOLOGY

It is called ring topology because it forms a ring as each computer is connected to another computer,
with the last one connected to the first. Exactly two neighbours for each device.

Features of Ring Topology


● A number of repeaters are used for Ring topology with large number of nodes, because if
someone wants to send some data to the last node in the ring topology with 100 nodes, then
the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data
loss repeaters are used in the network.
● The transmission is unidirectional, but it can be made bidirectional by having 2 connections
between each Network Node, it is called Dual Ring Topology.
● In Dual Ring Topology, two ring networks are formed, and data flow is in opposite direction
in them. Also, if one ring fails, the second ring can act as a backup, to keep the network up.
● Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to pass
through each node of the network, till the destination node.

Advantages of Ring Topology

210020107076 CN(3150710) 23
● Transmitting network is not affected by high traffic or by adding more nodes, as only the
nodes having tokens can transmit data.
● Cheap to install and expand

Disadvantages of Ring Topology


● Troubleshooting is difficult in ring topology.
● Adding or deleting the computers disturbs the network activity.
● Failure of one computer disturbs the whole network

4) MESH TOPOLOGY

It is a point-to-point connection to other nodes or devices. All the network nodes are connected to
each other. Mesh has n(n-1)/2 physical channels to link n devices.All the node has multiple paths to
reach at Particular any one location.

Advantage:-

● Reachability is high.
● Provide much Protection.
● Used at a nuclear power plant

Disadvantage:-

● Cost is high.
● Very Complex to Build.
● Maintenance is also high.

210020107076 CN(3150710) 24
5) HYBRID TOPOLOGY

It is two different types of topologies which is a mixture of two or more topologies. For example if in
an office in one department ring topology is used and in another star topology is used, connecting
these topologies will result in Hybrid Topology (ring topology and star topology).

Features of Hybrid Topology


● It is a combination of two or topologies
● Inherits the advantages and disadvantages of the topologies included

Advantages of Hybrid Topology


● Reliable as Error detecting and troubleshooting is easy.
● Effective.
● Scalable as size can be increased easily.
● Flexible.

Disadvantages of Hybrid Topology


● Complex in design.
● Costly.

EXERCISES:

i) Implement bus , star ,ring ,mesh and hybrid topology in CPT

ii)What is topology explain its type

iii)What are the advantage of ring topology over the star topology

iv) Write the difference between ring topology and mesh topology

EVALUATION:

Involvement(4) Understanding/ Timely Completion(3) Total(10)


Problem Solving(3)

210020107076 CN(3150710) 25
Signature with date

________________

EXPERIMENT 5 DATE:

TITLE: (a)Implementing Various Routing Algorithm Using CPT

(b) DHCP Manual Configuration

OBJECTIVES: On completion of this experiment students will be able to…

know more different types of static and dynamic routing and how to
configure DHCP using CPT

THEORY:

Distance Vector Routing using RIP


Distance vector routing algorithms operate by having each router maintain a table (i.e, a vector)
giving the best known distance to each destination and which line to use to get there. These tables are
updated by exchanging information with the neighbors. The distance vector routing algorithm is
sometimes called by other names, most commonly the distributed Bellman-Ford routing algorithm
and the Ford-Fulkerson algorithm, after the researchers who developed it (Bellman, 1957; and Ford
and Fulkerson, 1962). It was the original ARPANET routing algorithm and was also used on the
Internet under the name RIP. In distance vector routing, each router maintains a routing table indexed
by, and containing one entry for, each router in the subnet. This entry contains two parts: the
preferred outgoing line to use for that destination and an estimate of the time or distance to that

210020107076 CN(3150710) 26
destination. The metric used might be number of hops, time delay in milliseconds, total number of
packets queued along the path, or something similar.

Router configuration:
Router-1 Configuration
Router>
Router>enable
Router#configure terminal
Router(config)#hostname Router1
Router1(config)#interface fastethernet 0/0
Router1(config-if)#ip address 10.1.1.100 255.0.0.0
Router1(config-if)#no shutdown
Router1(config-if)#exit
Router1(config)#interface fastethernet 1/0
Router1(config-if)#ip address 20.1.1.100 255.0.0.0
Router1(config-if)#no shutdown
Router1(config-if)#exit
Router1(config)#router rip
Router1(config-router)#network 10.0.0.0
Router1(config-router)#network 20.0.0.0
Router-2 Configuration
Router>
Router>enable
Router#configure terminal
Router(config)#hostname Router2
Router2(config)#interface fastethernet 0/0
Router2(config-if)#ip address 20.1.1.200 255.0.0.0
Router2(config-if)#no shutdown
Router2(config-if)#exit
Router2(config)#interface fastethernet 1/0
Router2(config-if)#ip address 30.1.1.100 255.0.0.0
Router2(config-if)#no shutdown
Router2(config-if)#exit
Router2(config)#router rip
Router2(config-router)#network 20.0.0.0

210020107076 CN(3150710) 27
Router2(config-router)#network 30.0.0.0
Router-3 Configuration
Router>
Router>enable
Router#configure terminal
Router(config)#hostname Router3
Router3(config)#interface fastethernet 0/0
Router3(config-if)#ip address 30.1.1.200 255.0.0.0
Router3(config-if)#no shutdown
Router3(config-if)#exit
Router3(config)#interface fastethernet 1/0
Router3(config-if)#ip address 40.1.1.100 255.0.0.0
Router3(config-if)#no shutdown
Router3(config-if)#exit
Router3(config)#router rip
Router3(config-router)#network 30.0.0.0
Router3(config-router)#network 40.0.0.0

Link State Routing


1. Develop a Topology shown in figure given below.
2. Configure all the workstations
3. Configure all switches
4. Configure all Routers
5. Implement OSPF protocols in Router to configure Network.

Implementation of DHCP in network


The Dynamic Host Configuration Protocol (DHCP) is a network protocol that is used to configure
network devices. DHCP allows a computer to join an IP-based network without having a pre-
configured IP address. DHCP is a protocol that assigns unique IP addresses to devices, then releases

210020107076 CN(3150710) 28
and renews these addresses as devices leave and re-join the network. Internet Service Providers
(ISPs) usually use DHCP to allow customers to join the Internet with minimum effort. The DHCP
server maintains a database of available IP addresses and configuration information. When it receives
a request from a client, the DHCP server determines the network to which the DHCP client is
connected, and then allocates an IP address. DHCP servers typically grant IP addresses to clients
only for a limited interval. Let's apply DHCP on a packet tracer.
First, let us make a topology with one router on which we will apply DHCP and several client PCs.
More like this one,

Now, we will apply DHCP on the router. The commands in sequence are as follows.

In the following command “ip dhcp pool cisco”, we are creating a pool for DHCP called cisco. cisco
is the name here and we can name it whatever we want. Similarly, in the command “default-router “
we are telling the DHCP about the default route to follow.

Notice, after we exit from DHCP mode, we are excluding some IP addresses by applying this
command “ip dhcp excluded-addresses x-x”, where x is the starting and ending IP address
respectively. We are basically reserving some IPs for our use. It can be used to attach printers, or
assign it to some specific users for security purposes. You can also give

dns address in dhcp by using the following command. dns- server 192.168.1.15.

Now, open the PC.

210020107076 CN(3150710) 29
Click on IP Configuration

Select from Static to DHCP

And after DHCP request is completed you will see the following screen.

Now, after applying some IPs in sequence, DHCP will skip the IPs that we have excluded from our
DHCP pool.

That is all, we have applied DHCP on the packet tracer.

EXERCISE:

210020107076 CN(3150710) 30
1) Connect different networks using two routers and configure them using RIP protocols. (Write the
steps for each Routing Configuration.)
2) Connect different networks using three routers and configure them using RIP protocols. (Write the
steps for each Routing Configuration.)

EVALUATION:

Involvement(4) Understanding/ Timely Completion(3) Total(10)


Problem Solving(3)

Signature with date

________________

EXPERIMENT 6 DATE:

TITLE: (a)VLAN Creation Using CPT

OBJECTIVES: After completing study of this practical the students will be familiarized
with...

➢ Concept of VLAN

THEORY:

VLAN:
● VLAN refers to Virtual Local Area Network

● VLAN extends its functionalities beyond a single LAN through VLAN a network is divided
into different logical segments which are known as broadcast domains.

● In technical terms, a VLAN is a broadcast domain created by switches.

210020107076 CN(3150710) 31
● All devices, by default, are in VLAN 1.

● For devices in different VLANs to communicate, you must use a router or Layer 3 switch.

● The standard range consists of VLANs 1 to 1024.

● The extended range consists of VLANs 1025 to 4096.

Create Simple VLAN

We are creating a simple VLAN. We will take Four PC & one switch. We will create two VLAN
name “VLAN8” and “VLAN9”.Then we put ports 1 & 2 into VLAN 8 and ports 3 & 4 into
VLAN9.Then we will check how the communication is done between different nodes.

Step 1: configuration of VLAN in Switch

Switch>enable

Switch#configure terminal

Enter configuration commands, one per line. End with CNTL/Z.

Switch(config)#hostname Vlan_Switch

Vlan_Switch(config)#vlan 8

VLAN 8 added: Name:VLAN0008

Vlan_Switch(config)#vlan 8 name ajay

Vlan_Switch(config)#vlan 9 name jashvant

VLAN 9 added: Name:jashvant

Vlan_Switch(config)#interface fastethernet0/1

Vlan_Switch(config-if)#switchport mode access

Vlan_Switch(config-if)#switchport access vlan 8

Vlan_Switch(config-if)#exit

Vlan_Switch(config)#interface fastethernet0/2

210020107076 CN(3150710) 32
Vlan_Switch(config-if)#switchport mode access

Vlan_Switch(config-if)#switchport access vlan 8

Vlan_Switch(config-if)#exit

Vlan_Switch(config)#interface fastethernet0/3

Vlan_Switch(config-if)#switchport mode access

Vlan_Switch(config-if)#switchport access vlan 9

Vlan_Switch(config-if)#exit

Vlan_Switch(config)#interface fastethernet0/4

Vlan_Switch(config-if)#switchport mode access

Vlan_Switch(config-if)#switchport access vlan 9

Vlan_Switch(config-if)#exit

Step 2: configuration of PC.

PC1

IP Address....................... : 10.1.1.1

Subnet Mask...................... : 255.0.0.0

Default Gateway...................: 10.1.1.4

PC2

IP Address....................... : 10.1.1.1

Subnet Mask...................... : 255.0.0.0

Default Gateway...................: 10.1.1.4

IP Address....................... : 10.1.1.2

Subnet Mask...................... : 255.0.0.0

Default Gateway.................. : 10.1.1.4

PC3

IP Address....................... : 10.1.1.3

Subnet Mask...................... : 255.0.0.0

Default Gateway.................. : 10.1.1.4

PC4

210020107076 CN(3150710) 33
IP Address....................... : 10.1.1.4

Subnet Mask...................... : 255.0.0.0

Default Gateway.................. : 10.1.1.4

Step 3: Check connectivity.

PC1:>ping 10.1.1.2

Pinging 10.1.1.2 with 32 bytes of data:

Reply from 10.1.1.2: bytes=32 time=60ms TTL=241

Reply from 10.1.1.2: bytes=32 time=60ms TTL=241

Reply from 10.1.1.2: bytes=32 time=60ms TTL=241

Reply from 10.1.1.2: bytes=32 time=60ms TTL=241

Reply from 10.1.1.2: bytes=32 time=60ms TTL=241

Ping statistics for 10.1.1.2: Packets: Sent = 5, Received = 5, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 50ms, Maximum = 60ms, Average = 55ms

PC1:>ping 10.1.1.3

Pinging 10.1.1.3 with 32 bytes of data:

Request timed out.

Request timed out.

Request timed out.

Request timed out.

Request timed out.

Ping statistics for 10.1.1.3:

Packets: Sent = 5, Received = 0, Lost = 5 (100% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

PC1:>ping 10.1.1.4

Pinging 10.1.1.4 with 32 bytes of data:

Request timed out.

210020107076 CN(3150710) 34
Request timed out.

Request timed out.

Request timed out.

Request timed out.

Ping statistics for 10.1.1.4:

Packets: Sent = 5, Received = 0, Lost = 5 (100% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

Here we get pinging from PC1 to PC2 only.

So Here Switch is decided into two logical segment.

Step 4: Verify Configuration.

Vlan_Switch#

Vlan_Switch#show vlan

EXERCISES:

i) Create the Two VLAN from one LAN and write the configuration steps.

ii)Give different types of VLAN.

iii)List out advantages of VLAN.

210020107076 CN(3150710) 35
EVALUATION:

Involvement(4) Understanding/ Timely Completion(3) Total(10)


Problem Solving(3)

Signature with date

________________

EXPERIMENT 7 DATE:

TITLE: Creation Of LAN Cable With Various Tool

OBJECTIVES: After completing study of this practical the students will be able to
Practically implement the cross- wired cable and straight through cable
using crimping tool.

THEORY:

Apparatus (Components): RJ-45 connector, Crimping Tool, Twisted pair Cable

Procedure: To do these practical following steps should be done:


1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be very

210020107076 CN(3150710) 36
careful at this point, as to not nick or cut into the wires, which are inside. Doing so could
alter the characteristics of your cable, or even worse render is useless. Check the wires, one
more time for nicks or cuts. If there are any, just whack the whole end off, and start over.

2. Spread the wires apart, but be sure to hold onto the base of the jacket with your other hand. You do
not want the wires to become untwisted down inside the jacket. Category 5 cable must only have 1/2
of an inch of 'untwisted#39; wire at the end; otherwise it will be 'out of spec v#39;. At
this point, you obviously have A LOT more than 1/2 of an inch of un-twisted wire.

3. You have 2 end jacks, which must be installed on your cable. If you are using a pre- made cable,
with one of the ends whacked off, you only have one end to install - the crossed over end. Below are
two diagrams, which show how you need to arrange the cables for each type of cable end. Decide at
this point which end you are making and examine the associated picture below.

Diagram shows you how to prepare Cross wired connection

210020107076 CN(3150710) 37
Diagram shows you how to prepare straight through wired connection

4. Align the untwisted wires in the order necessary for your needs. For this scenario, you'll be
making a straight-through cable, which has both ends of the cable with the same alignment of
wires, so it's easy enough to do. Since this is your first cable, we'll consult the cheat sheet to
know what order we're aligning in!

5. Cut the extra wire. Once you've untwisted the wires, you'll have a superfluous amount of copper
wiring left; we don't need this much, but it's good to have it in the previous step to help in aligning
the colors properly. Use the wire-cutting scissors to cut these off.

6. Push the remaining wires into the RJ45 head. Be careful not to bend the wires while pushing them
in or you run the risk of creating a bad cable. You also don't want too little or too much wire left in
the head; there's no definite length necessary, but it's pretty obvious to tell if there's too much cable

210020107076 CN(3150710) 38
or not enough. A short length of the jacket should be up the RJ45 head; use this knowledge as a
reference.

7. Push the head into the open space of the crimping tool and squeeze it closed, hard. If you don't
crimp the cable all the way, the head may come off.

EVALUATION:
Involvement(4) Understanding/Problem Timely Total(10)
Solving(3) Completion(3)

Signature with date

________________

EXPERIMENT 8 DATE:

TITLE: Study Of Basic Network Commands In CPT

OBJECTIVES: After completing study of this practical the students will be familiarized
with...

➢ Identify tools used to discover a computer network configuration


with

210020107076 CN(3150710) 39
various operating systems.

➢ Gather information including connection, host name, Layer 2


MAC address

and Layer 3 TCP/IP network address information.

➢ Compare network information to other PCs on the network.

THEORY:

1) Ping
ping: ping(8) sends an ICMP ECHO_REQUEST packet to the specified host. If the host
responds, you get an ICMP packet back. Sound strange? Well, you can “ping” an IP address
to see if a machine is alive. If there is no response, you know something is wrong.

2) ipconfig
shows the IP address, subnet mask, and default gateway. The IP address and the default
gateway should be in the same network or subnet, otherwise this host would not be able to
communicate outside the network. In the figure the subnet mask tells us tha the first three
octets must be the same to be in the same network.

210020107076 CN(3150710) 40
3) ipconfig /all
The host name, including the computer name and NetBIOS name should be displayed. Also,
the DHCP server address, if used, and the date the IP lease starts and ends should be
displayed. Look over the information. Entries for the DNS, used in name resolution servers,
may also be present. The previous figure reveals that the router is performing DHCP services
for this network. This would likely be a small office or home office (SOHO) or small branch
office implementation.

4) Traceroute:
Tracert is a command which can show you the path a packet of information takes from your
computer to one you specify. It will list all the routers it passes through until it reaches its
destination, or fails to and is discarded. In addition to this, it will tell you how long each hop
from router to router takes.

5) nslookup
Displays information from Domain Name System (DNS) name servers.

NOTE :If you write the command as above it shows as default your pc server name firstly.

6) pathping

210020107076 CN(3150710) 41
A better version of tracert that gives you statics about packet lost and latency.

7) Getting help
In any command mode, you can get a list of available commands by entering a question mark
(?).

Router>?- To obtain a list of commands that begin with a particular character sequence, type
in those characters followed immediately by the question mark (?).

Router#co?-configure connect copy, To list keywords or arguments, enter a question mark in


place of a keyword or argument. Include a space before the question mark.

Router#configure ?- memory Configure from NV memory network , Configure from a


TFTP network host terminal Configure from the terminal .You can also abbreviate commands
and keywords by entering just enough characters to make the command unique from other
commands. For example, you can abbreviate the show command to sh.

Configuration Files

Any time you make changes to the router configuration, you must save the changes to
memory because if you do not they will be lost if there is a system reload or power outage.
There are two types of configuration files: the running (current operating) configuration and
the startup configuration.

Use the following privileged mode commands to work with configuration files.

• configure terminal – modify the running configuration manually from the terminal.

• show running-config – display the running configuration.

• show startup-config – display the startup configuration.

• copy running-config startup-config – copy the running configuration to the startup


configuration.

• copy startup-config running-config – copy the startup configuration to the running


configuration.

210020107076 CN(3150710) 42
• erase startup-config – erase the startup-configuration in NVRAM. • copy tftp running-
config – load a configuration file stored on a Trivial File Transfer Protocol (TFTP) server into
the running configuration.

• copy running-config tftp – store the running configuration on a TFTP server.

EXERCISES:

i)Implement all the given command in CMD and CPT

EVALUATION:

Involvement(4) Understanding/ Timely Completion(3) Total(10)


Problem Solving(3)

Signature with date

_________________

210020107076 CN(3150710) 43

You might also like