Networking_lab_manual[1][1]
Networking_lab_manual[1][1]
23258
ADP-CS (MB)
COMPUTER NETWORKING
COURSE CODE:CSC-211
SUBMITTED TO : MAM OMAL SEHER
Practical no 1
How to Configure DHCP DNS and Web Server in Cisco packet tracer?
Explanation: In this step, you design the network topology by adding devices like routers, switches,
and PCs in a simulation tool such as Cisco Packet Tracer. The video demonstrates using straight-
through cables for PC-to-switch connections and crossover cables for switch-to-switch connections.
Ensure all devices a
re
correctly connected.
Explanation: This walks through configuring router interfaces using commands like interface g0/0
to assign IP addresses and activate interfaces with no shutdown. Verify that the assigned IP addresses
belong to the correct subnets for communication with other devices.
Explanation: This explains manually configuring IP addresses for PCs or enabling DHCP
for automatic assignment. On each device, navigate to the desktop, choose "IP
Configuration," and enter the IP, subnet mask, and gateway as per the network plan.
Explanation: This step involves creating VLANs for network segmentation. Use commands like
vlan 10 to create a VLAN and switchport access vlan 10 to assign a port to it. Trunk links between
switches are configured using the switchport mode trunk command.
Explanation: The step demonstrates enabling DHCP on the router to assign IPs dynamically. Define
the DHCP pool using commands like ip dhcp pool and specify the network, default gateway, and
DNS server. Test this by connecting a device and verifying it receives an IP automatically.
• Explanation: You configure a DNS server to resolve domain names. The step shows setting
up forward lookup zones and adding A records for devices. Verify functionality by
performing a DNS query using nslookup on a PC.
Explanation: The step outlines configuring NAT to enable devices in a private network to access the
internet. Use commands like ip nat inside, ip nat outside, and ip nat pool to define NAT rules and
translate internal addresses.
Explanation: Test the setup using tools like ping and tracert to ensure all devices communicate. The
step stresses the importance of successful pings between devices and to external networks.
Explanation: This step involves using Wireshark or a similar tool to capture and analyze packets.
Filter traffic based on protocols or IP addresses to troubleshoot connectivity or verify configurations.
Explanation: The demonstrates setting static routes on the router to enable communication between
different subnets. Use the ip route command followed by the destination network, subnet mask, and
the next-hop IP address. Ensure each route aligns with the topology.
• Explanation: For VLAN communication, the video explains setting up inter-VLAN routing.
Assign an IP address to each subinterface on the router (e.g., interface g0/0.10), enable the
encapsulation (encapsulation dot1q 10), and assign an IP within the VLAN’s subnet.
Explanation: This step ensures DHCP successfully assigns IP addresses and DNS resolves domain
names correctly. Use the ipconfig command on a PC to check the assigned IP and gateway, and
nslookup to test domain-to-IP resolution.
Explanation: The step highlights basic security configurations, such as setting passwords on
switches and routers. Use commands like enable secret for privileged mode and line vty to secure
remote access via SSH.
Explanation: Test the NAT configuration by accessing an external IP or domain from a device. The
step emphasizes verifying translation by using the show ip nat translations command on the router.
• Explanation: Finally, the step showcases capturing packets using a tool like Wireshark.
Filter traffic based on protocols (e.g., ICMP for pings) to validate routing, NAT, or DNS
setups and identify any anomalies in the network.
Explanation: The final step involves comprehensive testing of the network. The step demonstrates
verifying all configurations (IP addressing, VLANs, routing, NAT, DHCP, and DNS). Use
commands like ping, tracert, and nslookup across devices. If any issues arise, troubleshoot using
tools like Wireshark or check individual configurations (show running-config) to ensure correctness
Practical no 2
What is the use of Telenet protocol and how to configure Telenet in the network?
Use of Telnet Protocol
Telnet is a network protocol that allows a user to connect to remote computers or devices over a
network, typically the internet or a local area network (LAN). It enables text-based communication
with remote systems, allowing users to control them remotely.
1. Remote Access to Servers: Telnet allows users to access and manage remote servers or
network devices. It's often used for administrative tasks, like system configuration and
troubleshooting.
2. Testing Network Services: Telnet can be used to test connectivity to remote services like
HTTP, SMTP, and FTP by manually connecting to the port associated with these services.
This helps in diagnosing and troubleshooting service-related issues.
3. Legacy Systems: While newer protocols (like SSH) are more secure, Telnet is still used for
legacy systems and devices that require it for remote access.
4. Troubleshooting: Telnet helps network administrators diagnose problems by enabling direct
interaction with remote systems to check for service availability or check specific ports.
However, Telnet has a major drawback—lack of encryption. Data, including usernames and
passwords, is transmitted in plaintext, making it insecure. As a result, SSH (Secure Shell) is often
preferred for secure remote access over Telnet.
Telnet Configuration.
Practical no 3
Q3. What is RIP protocol? Why do we use this in a network? Make a network
and write the configuration of the routing information protocol (RIP).
Introduction
Routing Information Protocol (RIP) is a distance-vector routing protocol that is used to determine the
best path for data packets in a network. It uses hop count as the metric to identify the shortest path.
Key Details:
RIP works on UDP port 520.
Maximum hop count is 15.
Periodically updates routing tables every 30 seconds.
Network Topology
• Drag and drop two routers, two switches, and four PCs.
Practical No.04
What do you know about the “OSPF” Protocol? What is the purpose of this
protocol? How to Configure OSPF using 3 Routers and 3PCs?
OSPF (Open Shortest Path First) is a widely used Interior Gateway Protocol (IGP) that helps routers
dynamically determine the best path for data packets within an Autonomous System (AS). OSPF is a
link-state protocol, meaning that it maintains a map of the network topology and uses it to make
routing decisions. It was developed as a more scalable and efficient alternative to the older RIP
(Routing Information Protocol), particularly for large networks.
Purpose of OSPF
The primary purpose of OSPF is to provide efficient routing in a network and make routing decisions
based on the shortest path calculated using Dijkstra’s algorithm. Some key purposes and features of
OSPF include:
• Routing Path Calculation: OSPF calculates the best path for routing packets within an AS
based on link costs (usually tied to bandwidth).
• Scalability: OSPF supports large networks and multiple routers. It can scale well for
networks with hundreds or thousands of routers.
• Hierarchical Design: OSPF supports areas, allowing networks to be subdivided for better
performance and organization.
• Fast Convergence: OSPF quickly adapts to network changes, such as when a router or link
fails.
• Load Balancing: OSPF supports load balancing across equal-cost paths, distributing traffic
efficiently.
Then drag the port there. And again turn the switch ON.
Firstly, Connect PCs to Routers with the help of a wire, Then Routers with each others.
Then, assign IP addresses to all the PCs and Routers.
Router IP Configration
Now, do the Configration of Router0.
Then,
.
And so on to the Router3.
Now, check the commands by sending messages.
If messages send Successfully then Its means OSPF configration done correctly.