Experiment 8 to 13 (1)
Experiment 8 to 13 (1)
MATERIAL REQUIRED:
Default Routing: Default routing is a type of routing in which a router is configured to forward
packets to a specified "default" next hop or destination when no specific route exists for the
packet's destination in the routing table. This is often used when routing information for all
possible destinations is unavailable, but a default route can direct packets to a central router or
gateway. Default routing simplifies network configuration by reducing the need to define
individual routes for each destination, making it particularly useful in smaller or less complex
networks.
In default routing, the router typically uses the IP address of the next-hop router as the
destination for all packets that do not match any other specific route. It is commonly used in
edge routers that connect a local network to an external network, such as the Internet. The
default route is typically represented by the destination network 0.0.0.0 with a subnet mask of
0.0.0.0, indicating that it applies to any destination not explicitly listed in the routing table.
NETWORK TOPOLOGY:
Refer to the image given below:
IP ADDRESSING TABLE:
PROCEDURE:
Add:
o 2 Routers (Router0, Router1)
o 2 Switches (Switch0, Switch1)
o 6 PCs (PC0–PC5)
Step 2: Connecting the Devices
Router(config)# exit
Router(config)# exit
From PC0 (192.168.1.2), open the command prompt and ping PC3 (192.168.2.2).
Successful ping replies confirm that the default routing setup is working
correctly between both networks.
Experiment - 9
AIM: To configure a DHCP Server using Cisco Packet Tracer.
MATERIAL REQUIRED:
4 PC
1 Router
1 Switch
Ethernet Cables
THEORY:
DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to
automatically assign IP addresses, subnet masks, default gateways, and DNS servers to devices
in a network.
Without DHCP, each device must be configured manually. DHCP automates this process,
simplifies network management, and avoids IP conflicts.
The DHCP server maintains a pool of IP addresses and assigns them to devices when requested.
It reduces administrative tasks and supports scalability in large networks.
NETWORK TOPOLOGY:
Refer to the Cisco Packet Tracer topology where are connected to a router ,4 PC (PC0, PC1,
PC2, PC3) with dynamic IP assigned via 1 Server as a DHCP Server. Both devices
connected through a switch.
IP ADDRESSING TABLE:
Switch - NA NA
PROCEDURE:
2. Under FastEthernet0:
o IP Address: 10.0.0.5
Under PC1:
o IP Address: 10.0.0.4
o IP Address: 10.0.0.3
Under PC3:
o IP Address: 10.0.0.2
3. Choose DHCP
o The PC will automatically request and obtain an IP address from the DHCP
server.
OUTPUT:
PC0, PC1, PC2, PC3 should now display:
MATERIAL REQUIRED:
1 PC (PC0)
1 DNS Server
THEORY:
DNS (Domain Name System) is responsible for resolving domain names (like
www.google.com) into IP addresses (like 142.250.64.78). In a local network, configuring a
DNS server allows you to assign and resolve custom domain names to internal IP addresses.
By configuring a DNS server in Cisco Packet Tracer, we simulate how a client (PC) sends a
domain query to the DNS server, which replies with the associated IP address. This process is
essential for understanding name resolution in real and virtual networks.
NETWORK TOPOLOGY:
A simple network consisting of:
IP ADDRESSING TABLE:
Switch0 - NA NA
PROCEDURE:
Name: My Website
Address: 192.168.1.1
Click Add
2. Go to Desktop → IP Configuration
o IP Address: 192.168.1.2
OUTPUT:
The PC was able to successfully resolve the domain http://My Website using the configured
DNS server and communicate with it.
Experiment - 11
AIM: Introduction to Wireshark
THEORY:
Wireshark is a network protocol analyser created by Gerald Combs in 1998. It is used for:
1. Network troubleshooting,
Wireshark captures network information from the Application Layer to the Link Layer.
2. 'All Interfaces shown' drop-down menu allows you to select between Wired, Wireless
and External interfaces. In our case, we have all three showing. A wired interface would
be the built-in Thunderbolt ports I have. 'awdl0' is for my Bluetooth chip and
'Loopback: lo0' is for my local server.
3. To capture more than one interface, simply hold the 'command' key (for Mac) and then
select. Once selected, press Capture.
After you click capture, the following display shows up confirming your selection and offers a
few more configurations.
Promiscious Mode enabled means if a packet is not meant for your system, Wireshark will
still keep a record of it. Sometimes, packets bounce of various hosts asking for a final
destination -- at this point, Wireshark keeps the packet or discards based on this option.
When you begin capturing network packets, the following window will show up.
Here's a look at what the buttons on the toolbar do.
Column Headers
1. No – Each packet is assigned a number.
1. Protocol means "a set of rules governing the format of data sent over the Internet
or other network."
1. This Info view is just meant to be a quick view of what the packet is about. For
more details, go down to the In-depth panel and the bytes panel for more details
on the packet flags, source and destination ports, HTTP form data, and more!
1. To try some of the filters below, paste them into the 'Filter Bar' at the top of the
Wireshark Capture page.
2. Click 'Expressions' to view all possible filter options. It's a laaarrrggee list. o_o
3. As regular users of Wireshark, there may be some commands that you use often. Save
your own custom filters for quick access by clicking the '+' button. Give it a label and
it will show up beside the '+' button so next time, you can easily apply the filter in one
click.
4. Another easy way to apply filters is by right-clicking on a packet > "Apply as filter >
..." and selecting from one of the many options.
Experiment - 12
AIM: To implement Dynamic Routing (RIP) using Cisco Packet Tracer.
MATERIAL REQUIRED:
Cisco Packet Tracer software
Ethernet cables
THEORY:
Dynamic routing protocols enable routers to automatically discover and learn about networks
and dynamically update their routing tables as the network topology changes. This eliminates
the need for manual route configuration, making the network more scalable and resilient to link
failures.
RIP (Routing Information Protocol) is a distance-vector routing protocol. Routers using RIP
broadcast their routing tables to directly connected neighbours at regular intervals.
Neighbouring routers then update their own routing tables based on the information received.
RIP uses hop count as its metric to determine the best path to a destination network.
NETWORK TOPOLOGY:
Refer to the image (similar to the Static Routing experiment, but with an additional network
segment for the link between the routers):
IP ADDRESSING TABLE:
Device Interface IP Address Subnet Mask Default Gateway
PROCEDURE:
1. Assign IP Addresses:
Configure IP addresses and subnet masks on the router interfaces and PCs according
to the IP Addressing Table.
Ensure the PCs have the correct Default Gateway set to the IP address of their
connected router's LAN interface.
Router> enable
Router(config-router)# no auto-summary
Router(config-router)# end
Router(config-router)# version 2
Router(config-router)# end
4. Verify Connectivity:
Allow some time for the RIP updates to propagate and the routing tables to converge.
You can observe the routing tables using the show ip route command on both routers.
You should see entries for the remote networks learned via RIP.
Use the ping command from PC0 to PC3 (and vice versa) to test connectivity across
the routers.
ping 192.168.1.2
OUTPUT:
All PCs should be able to successfully ping each other across different LANs through the
router.
Experiment – 13
AIM: To implement VLSM (Variable Length Subnet Masking) in Cisco Packet Tracer.
MATERIAL REQUIRED:
2 Routers (e.g., ISR4331)
6 PCs
Ethernet cables
THEORY:
VLSM (Variable Length Subnet Masking) allows subnetting a network into subnets of different
sizes, optimizing the usage of IP addresses. Unlike fixed-length subnetting where all subnets
are of equal size, VLSM allows assigning different subnet masks based on the number of hosts
required in each subnet. This makes the network design more efficient and conserves IP
addresses, which is very important for larger and more complex networks.
VLSM is widely used in real-world networks to better utilize IP address space, especially when
dealing with hierarchical designs.
NETWORK TOPOLOGY:
Two LANs are connected via two routers.Each LAN has PCs connected to switches.
IP ADDRESSING TABLE:
PROCEDURE:
1. Assign IP Addresses:
Assign IP addresses to PCs, Routers, and Switches according to the IP Addressing
Table. Make sure PCs have the correct Default Gateway set.
Router(config-if)# no shutdown
Router(config)# exit
Router#
Router(config)# exit
Router#
Router(config)# exit
Router#
On Router1: Router# configure terminal
Router(config)# exit
Router#
VERIFY CONNECTIVITY:
Use show ip route on routers to verify routing entries.
Use the ping command from PC0 to PC3, and vice versa, to ensure connectivity
across routers. ping 192.168.1.66
OUTPUT:
All PCs should be able to successfully ping each other across different LANs through the
routers using different subnet sizes created with VLSM.