Lab Report 22bce11538
Lab Report 22bce11538
COMPUTER NETWORKS
CSE3006
Submitted by
BACHELOR OF TECHNOLOGY
in
CSE (Artificial Intelligence and Machine Learning)
Submited to
March 2024
Registration No.: 22BCE11538
Table of Contents
Sl. No. Name of the experiment Date Page No
01 1.1.6-logical-and-physical-mode-exploration 13.03.2024
02 2.1.1_packet_tracer_create_a_simple_network 13.03.2024
03 1.1.6packet-tracer-connect-devicesusing- 13.03.2024
wireless-technologies
04 1.1.4-cabling-devices-in-a-rack 13.03.2024
PROCEDURE:
In this step, you will navigate to the Branch Office wiring closet in Seward. You will also
connect a PC to a switch using an Ethernet cable.
● In the Intercity, click Seward. While in Seward, click the Branch Office and then click
the Branch Office Wiring Closet.
● Connect PC_1 FastEthernet0 to an empty FastEthernet port on ALS2.
PCs and laptops can also be connected to networking devices using a console cable or a USB
cable. This connection provides management access. Management access is used to view and
change device configurations.
● While in Physical mode, connect RS232 port on PC_1 to the Console port on
the Edge_Router.
Newer models of networking devices can be accessed for management configuration through
a USB port. This is necessary because newer laptops and PCs typically do not include an
RS232 port for console cable connections.
In this step, you will install and power up a new router in the Rack. You will also connect to
this device via the USB console with a USB cable.
In Packet Tracer, an inventory of devices can be stored on the Shelf. These devices are
powered off and can be previously configured and deployed to replace or add to the
production devices on the Rack.
You have connected Laptop_1 to Backup_Router via a USB console cable. With the USB
console connected, you will access the command line interface (CLI) of Backup_Router via
terminal software and configure a hostname.
Every computer, including network devices, such as routers and switches, requires an
operating system to function. The operating system allows the device hardware to function
and provides an inteface for users to interact.
The Cisco Internetwork Operating System (IOS) is an operating system used in Cisco
networking devices. It allows creation of configurations that customize the operation of
network devices in different network environments. The CLI is accessible via the device
console port using terminal software or remotely via Secure Shell (SSH). Network
administrators use a computer to access the device console in order to create or modify the
device configuation.
Network administrators typically assign names to networking devices. The host name is used
to identify a device when accessing its operating system for configuration. To do this, you
will use your console connection to the Backup_Router . After the hostname has been
configured, the hostname appears as part of the IOS command prompt.
● On Laptop_1 , access the Desktop tab and click Terminal. The Terminal Configuration is
already set with the necessary port configuration, and should be used with its default settings.
Click OK to initiate the terminal connection.
● You are now at the command line for Backup_Router and should see the following output
from the router.
● [output omitted]
● cisco ISR4331/K9 (1RU) processor with 1795999K/6147K bytes of memory.
● Processor board ID FLM232010G0
● 3 Gigabit Ethernet interfaces
● 2 Serial interfaces
● 32768K bytes of non-volatile configuration memory.
● 4194304K bytes of physical memory.
● 3207167K bytes of flash memory at bootflash:.
● 0K bytes of WebUI ODM Files at webui:.
Answer no to the question and then press ENTER to reach the Router> command prompt.
● Enter the following commands (in bold) to name the router Edge_Router_Backup. Note that
the hostname must match this value exactly.
● Router> enable
● Router# configure terminal
● Router(config)# hostname Edge_Router_Backup
Edge_Router_Backup(config)# end
DESCRIPTION:
1. Physical Mode:
● Overview: It allows users to construct network topologies by dragging and
dropping devices onto the workspace.
● Device Placement: Devices can be placed on the workspace and connected
using various cables (Ethernet, serial, console, etc.).
● Properties: Users can configure properties of devices such as IP addresses,
hostnames, interface settings, and physical characteristics (e.g., color, size).
● Labelling and Annotations: It has the ability to add labels, annotations, and
descriptions to devices and connections for documentation purposes.
● Physical Layout: Organizing devices and cables in a logical and visually
appealing layout to improve understanding and troubleshooting.
2. Logical Mode:
● Overview: It focuses on configuring the behavior and settings of devices
within the network.
● Device Configuration: Users can access and configure the settings of
individual devices, such as routers, switches, PCs, and servers.
● Protocols and Services: Consist of various protocols and services that can be
configured on devices, including IP addressing, routing protocols, VLANs,
DHCP, NAT, ACLs, and more.
● Simulation and Testing: It has ability to simulate network behavior and test
configurations in a controlled environment before implementing them in a real
network.
● Packet Tracer Features: It has additional features available in the logical mode,
such as built-in command-line interfaces (CLI), simulation modes, packet
capture, and network analysis tools.
● Troubleshooting and Debugging: Logical mode is used for troubleshooting
network issues, analyzing packet flows, and debugging configuration errors.
CIRCUIT DIAGRAM:
OBSERVATION:
RESULT:
CONCLUSION:
In conclusion, the exploration of both the physical and logical modes within Cisco Packet Tracer has
provided invaluable insights into network design, configuration, and simulation. Through hands-on
experience, I have gained a deeper understanding of the intricacies involved in constructing network
topologies, configuring devices, and implementing network protocols and services.
In physical mode, I observed the ease of arranging devices and establishing connections using
intuitive drag-and-drop functionality. This mode allowed me to visualize the physical layout of the
network and understand the importance of organizing devices and cables for optimal performance and
troubleshooting.
Transitioning to logical mode, I explored the rich set of configuration options available for devices,
including protocols such as IP addressing, routing, VLANs, DHCP, and ACLs. The ability to simulate
network behavior and test configurations in a controlled environment proved to be invaluable for
validating designs and troubleshooting issues before deployment.
Overall, the exploration of Cisco Packet Tracer's physical and logical modes has deepened my
understanding of network fundamentals and provided practical experience in designing and
configuring networks. I am confident that the insights gained from this exploration will serve as a
solid foundation for further studies and real-world networking scenarios.
PROCEDURE:
DESCRIPTION:
The procedure guides users through the process of creating a simple network using Cisco
Packet Tracer. In Part 1, users add network devices such as a PC, laptop, and cable modem to
the Logical Workspace. They then customize the display names of these devices for clarity.
Afterwards, physical cabling is established between the devices using appropriate cables.
In Part 2, users configure the end devices to ensure connectivity. They set up the PC for
wired network connectivity and the laptop for wireless access. Verification of connectivity to
the server "cisco.srv" is performed for both devices.
CIRCUIT DIAGRAM:
OBSERVATION:
RESULT:
CONCLUSION:
The guided activity for creating a simple network in Cisco Packet Tracer provides users with valuable
hands-on experience in network configuration and troubleshooting. By following the step-by-step
instructions, users gain familiarity with network devices, cables, and configuration tasks, enhancing
their understanding of basic networking principles.
Through the exploration of both wired and wireless connectivity options, users learn to configure end
devices for seamless network access. The verification of connectivity to a server reinforces the
importance of testing and validation in network deployment.
Overall, the exercise serves as a foundational learning experience for network enthusiasts, students,
and professionals alike, equipping them with essential skills for designing, configuring, and
maintaining networks using Cisco Packet Tracer.
PROCEDURE:
DESCRIPTION:
The provided procedure outlines the steps to configure various wireless and Bluetooth
connections within Cisco Packet Tracer. It is divided into three parts: connecting a laptop to a
WLAN, connecting devices via Bluetooth technology, and tethering a laptop to a smartphone
for cellular network access.
In Part 1, users install a wireless module onto a laptop and connect it to an office WLAN.
Part 2 involves connecting a Bluetooth speaker to a tablet, and Part 3 guides users through
tethering a laptop to a smartphone via Bluetooth for cellular network access.
CIRCUIT DIAGRAM:
OBSERVATION:
Additionally, users learn about the importance of configuring settings such as port status, pre-
shared keys, and cellular tethering options to establish and maintain wireless and Bluetooth
connections effectively.
RESULT:
Following the procedure in Cisco Packet Tracer, users successfully configure various wireless and
Bluetooth connections as outlined. They establish connectivity between devices such as laptops,
tablets, smartphones, and Bluetooth speakers, enabling seamless communication and data exchange
within the simulated network environment.
By verifying IP configurations and testing connectivity to specified URLs, users confirm the
functionality and effectiveness of the configured connections. This hands-on experience enhances
their understanding of wireless and Bluetooth technologies and prepares them for real-world
networking scenarios.
CONCLUSION:
The guided activity for configuring wireless and Bluetooth connections in Cisco Packet Tracer
provides users with practical experience in network configuration and troubleshooting. By following
the step-by-step instructions, users gain proficiency in installing wireless modules, connecting devices
to WLANs, discovering and pairing Bluetooth devices, and tethering laptops to smartphones for
cellular network access.
Through the simulation environment of Packet Tracer, users observe real-time changes in network
configurations and validate connectivity to ensure successful implementation. This experiential
learning approach equips users with essential skills for configuring and maintaining wireless and
Bluetooth connections in both professional and educational settings. Overall, the activity serves as a
valuable learning experience for network enthusiasts, students, and professionals seeking to enhance
their networking skills using Cisco Packet Tracer.
PROCEDURE:
G1/0/13 Jack13
G1/0/14 Jack14
G10/15 Jack15
G1/0/16 Jack16
Blank Line, No additional information
d. If desired, you could also color code the cables in the rack. Right-click the desired cable,
select Color Cable. Select or create the desired color, and click OK.
e. If you do not like the cables dangling, you can organize them. Right-click any white space in
the rack and select Manage All Cables on Rack. Now all your cables are organized on the
rack.
f. Click Back level (Alt-Left) to return to the Office.
Punchdown1 Punchdown13
Punchdown2 Punchdown14
Punchdown3 Punchdown15
Punchdown4 Punchdown16
Blank Line, No additional information
g. Connect the PC Office-Admin and Printer0 to any available jacks in the wall mount
using Copper Straight-Through cables. After a minute or two, both devices will receive IP
addressing information from the DHCP service running on the Office-Server inside
the Equipment Closet.
h. Verify connectivity by navigating to the web site http://office.srv. Click Office-
Admin > Desktop > Web Browser. Enter office.srv in the URL field. This may take up to a
minute. You can click Go to refresh the web page request.
G1/0/21 Jack21
G1/0/22 Jack22
G1/0/23 Jack23
G1/0/24 Jack24
Blank Line, No additional information
b. In the Office, add another Wall Mount next to the window and connect the wall mount to the
patch panel using the following connections.
Note: For accurate grading, make sure the name of the wall mount is Wall Mount1.
Punchdown1 Punchdown21
Punchdown2 Punchdown22
Punchdown3 Punchdown23
Punchdown4 Punchdown24
Blank Line, No additional information
DESCRIPTION:
The provided instructions guide users through the process of setting up network infrastructure
components within Cisco Packet Tracer. It is divided into three parts: installing a patch panel
in the wiring closet, attaching a wall mount in the office, and connecting additional wall
mounts and cables.
In Part 1, users install a patch panel in the rack of the wiring closet and connect it to the
Office-SW1 switch using copper straight-through cables. The procedure emphasizes the
importance of accurate naming and organization for the patch panel and cables.
Part 2 involves installing a wall mount in the office and connecting devices such as the
Office-Admin PC and Printer0 to available jacks on the wall mount. Users verify connectivity
and organize cables within the physical mode of Packet Tracer to simulate real-world cable
management.
In Part 3, users expand the network by connecting more cables to the patch panel and adding
another wall mount in the office. They connect the Office-User PC to the new wall mount
and verify its connectivity to the network.
CIRCUIT DIAGRAM:
OBSERVATION:
The procedure provides users with hands-on experience in configuring network infrastructure
components such as patch panels and wall mounts within Cisco Packet Tracer. Users learn
how to install and connect devices in a structured cabling environment, ensuring proper
organization and connectivity throughout the network.
Through simulation and visualization within Packet Tracer, users observe the physical layout
of the network and gain insights into cable management practices. They learn to establish
connections between network devices and verify network functionality using simulated IP
addressing and connectivity tests.
The procedure also highlights the importance of accurate naming conventions and attention to
detail when setting up network infrastructure components. Users develop skills in cable
management and organization, which are essential for maintaining efficient and reliable
network operations.
RESULT:
Following the provided instructions, users successfully install and configure network
infrastructure components within Cisco Packet Tracer. They set up patch panels, wall
mounts, and connect devices to establish a functional network environment.
By verifying connectivity and organizing cables, users ensure that the network operates
smoothly and efficiently. Through simulated testing and validation, users confirm the
functionality of the network and gain confidence in their ability to deploy network
infrastructure components effectively.
CONCLUSION:
The guided activity for setting up network infrastructure components in Cisco Packet Tracer
provides users with practical experience in configuring structured cabling systems. By
following the step-by-step instructions, users gain proficiency in installing patch panels, wall
mounts, and connecting devices within a simulated network environment.
Through simulation and visualization, users observe the physical layout of the network and
learn essential cable management practices. They develop skills in network configuration,
organization, and validation, which are valuable for real-world networking scenarios.
Overall, the activity serves as a valuable learning experience for network enthusiasts,
students, and professionals seeking to enhance their understanding of network infrastructure
deployment using Cisco Packet Tracer.
PROCEDURE:
e. You will notice that the information for the inbound PDU is unchanged.
Question:
In the PDU information window, click the tab for the outbound PDU. How does the addressing
differ, and why? Record the addressing in your table.
f. Return to Realtime mode.
What device and interface has the destination MAC address that is shown?
e. Click Capture / Forward (the right arrow followed by a vertical bar) to move the PDU to
the next device. Gather the same information from Step 1d. Repeat this process until the PDU
reaches its destination. Record the PDU information you gathered from pinging 172.16.31.5
to 10.10.10.2 into a spreadsheet using a format like the sample table shown below. Enter
details for both the inbound and outbound PDUs at the Router.
f. Repeat the process for the echo-reply message that originates from host 10.10.10.2.
Complete the table for each step.
DESCRIPTION:
If you are interested in a career in network administration or network security, it is important to
understand normal network communication processes. In this Packet Tracer activity, you will
inspect Ethernet frames and IP packets at different points in the network as they travel from
source to destination. You will focus on the way that the MAC and IP addresses change
depending on the destination (local or remote) and the place where the PDUs are captured.
Packet Tracer has a simulation mode which will enable you to investigate details about how PDUs
travel on networks. It enables you to check the Layer 2 MAC addressing and Layer 3 IPv4
addressing of the PDUs at different locations in the network as the PDUs flow from source to
destination.
This activity is optimized for viewing PDUs as they travel on local and remote networks. You will
gather PDU information in PT simulation mode and answer a series of questions about the data
you collect. No device configuration is required.
CIRCUIT DIAGRAM:
OBSERVATION:
During the activity, users observe and record MAC and IP address information at different
stages of PDU transmission. They compare the addressing details between the source and
destination devices to understand how addressing changes based on the network
communication type (local or remote).
In Part 1, users observe that the MAC and IP addresses remain unchanged within the local
network. This demonstrates that devices on the same network communicate directly without
the need for a gateway.
In Part 2, users observe how the MAC address of the gateway device (router) is used when
communicating with a remote network. They also observe how the MAC addresses change as
the PDU travels through the router, demonstrating the role of the router in forwarding traffic
between networks.
RESULT:
Following the activity, users gain a deeper understanding of MAC and IP addresses' roles in
network communication. They learn how devices on the same network communicate directly
using MAC addresses and how a gateway device is necessary for communication between
devices on different networks.
By observing and recording MAC and IP address information at different stages of PDU
transmission, users develop a clearer understanding of how addressing works in both local
and remote network communication scenarios.
CONCLUSION:
The activity provides valuable insights into MAC and IP addresses' roles in network
communication processes. By simulating local and remote network communication scenarios,
users gain practical experience in observing and analyzing address information at different
stages of PDU transmission.
Overall, the activity enhances users' understanding of network addressing and prepares them
for real-world network administration and security tasks.
PROCEDURE:
DESCRIPTION:
A small business owner cannot connect to the internet with one of the four PCs in the office. All
the PCs are configured with static IP addressing using 192.168.1.0 /24 network. The PCs should
be able to access www.cisco.pka webserver. Use the ipconfig /all command to identify which
PC is incorrectly configured.
CIRCUIT DIAGRAM:
OBSERVATION:
3. *Default Gateway*:
- The default gateway for each PC should typically be set to the IP address of the router or
gateway device within the local network (e.g., 192.168.1.1).
4. *Identifying Misconfigurations*:
- By examining the IP configuration output (ipconfig /all) from each PC, any discrepancies
such as incorrect IP addresses, subnet masks, or default gateways can be identified.
RESULT:
The results of running ipconfig /all on each PC in the network reveal consistent and correctly
configured settings for IP addresses (192.168.1.x), subnet masks (255.255.255.0), and default
gateways (192.168.1.1). No obvious misconfigurations are apparent based on this
information. To address the small business owner's internet connectivity issue with a specific
PC, further troubleshooting is recommended. This includes verifying physical connections,
checking router configuration (192.168.1.1), examining DNS settings, and ensuring no
firewall restrictions. Revisiting and confirming network settings within Packet Tracer and
testing connectivity to www.cisco.pka from the affected PC will help resolve the connectivity
problem effectively.
CONCLUSION:
- Based on the observations from running ipconfig /all on each PC, identify the PC that has
incorrect network settings (e.g., an IP address outside the 192.168.1.0/24 range, mismatched
subnet mask, or incorrect default gateway).
2. *Correcting Misconfigurations*:
- Once the incorrectly configured PC is identified, use the Packet Tracer simulation
environment to access the desktop settings of that PC.
- Navigate to the Desktop tab > IP Configuration tab to manually correct the misconfigured
settings, ensuring that the IP address, subnet mask, and default gateway match the expected
values for the network (192.168.1.0/24).
3. *Testing Connectivity*:
- After correcting the misconfiguration, verify the PC's internet connectivity by attempting
to access the specified webserver (www.cisco.pka).
- Ensure that the corrected PC can successfully communicate with other devices on the
local network and access external resources via the configured gateway.
PROCEDURE:
Did the ping return a reply? What is the IP address displayed in the reply, if any?
Did the ping return a reply? What is the IP address returned, if any?
Part 4: Ping the IP address of the web server from PCs with connectivity
issues.
a. On the PC, access the Command Prompt from the Desktop tab.
b. Attempt to reach the IP address of the web server with the ping command.
Did the ping return a reply? If so, then the PC can reach the web server via IP address, but
not domain name. This could indicate a problem with the DNS server configuration on the PC.
DESCRIPTION:
This activity simulates a scenario where some users in a small business are unable to access a
website. All PCs in the network are configured with static IP addressing. The goal is to use the ping
command to identify and resolve the issue.
In Part 1, users check connectivity by attempting to access the website www.cisco.pka from each
PC's web browser. They identify PCs that are unable to connect to the web server.
In Part 2, users ping the web server www.cisco.pka from PCs with connectivity issues to see if they
can reach the server using its domain name. They note whether the ping returns a reply and the IP
address displayed in the reply, if any.
In Part 3, users ping the web server from correctly configured PCs to establish a baseline. They note
whether the ping returns a reply and the IP address returned, if any.
In Part 4, users ping the IP address of the web server from PCs with connectivity issues. If the ping
returns a reply, it indicates that the PC can reach the web server via IP address but not domain name,
potentially indicating a DNS server configuration problem.
In Part 5, users compare the DNS server information on the PCs without any issues to those with
connectivity issues. They use the ipconfig /all command to examine the DNS server configuration and
check if the configurations match.
In Part 6, users make any necessary configuration changes on the PCs with issues, such as updating
the DNS server settings. They then verify the changes by attempting to access the website again.
CIRCUIT DIAGRAM:
OBSERVATION:
Through the activity, users observe how the ping command can be used to diagnose network
connectivity issues. They learn to differentiate between issues related to domain name
resolution (DNS) and basic network connectivity.
By comparing the DNS server configurations between PCs with and without issues, users can
identify misconfigurations and make necessary corrections to resolve connectivity problems.
RESULT:
The activity helps users develop troubleshooting skills for identifying and resolving network
connectivity issues. They learn the importance of proper DNS server configuration and how
to use the ping command to test network connectivity.
CONCLUSION:
Overall, the activity provides practical experience in using the ping command and diagnosing
common network connectivity problems. It reinforces the importance of proper network
configuration and troubleshooting techniques in maintaining a functional network.