Professional Documents
Culture Documents
1
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Different types of networks are distinguished based on their size (in terms of
the number of machines), their data transfer speed, and their reach. There are usually
said to be two categories of networks.
Local Area Network (LAN) is limited to a specific area, usually an office, and
cannot extend beyond the boundaries of a single building. The first LANs were
limited to arrange (from a central point to the most distant computer) of 185 meters
(about 600feet) and no more than 30 computers. Today’s technology allows a larger
LAN, but practical administration limitations required to small, logical areas called
workgroups. A work group is a collection of individuals who share the same files and
databases over the LAN. Fig 0.2 gives an example of a local area network (LAN).
2
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Fig 0.2 Local Area Network.
0.4.2 Wide Area Network (WAN)
If you have ever connected to the Internet, you have used the largest WAN on
the planet. A WAN is any network that crosses metropolitan, regional, or national
boundaries. Most networking professionals define a WAN as any network that uses
routers and public network links. The Internet fits both definitions. Fig 0.2 gives an
example of a wide area network (WAN).
LAN WAN
Stands for Local Area Network Wide area network
Covers Local areas only (e.g., homes, Large geographic areas
offices, schools) (e.g., cities, states,
nations)
Definition LAN (Local Area Network) is WAN (Wide Area
a computer network covering Network) is a computer
a small geographic area, like network that covers a
a home, office, schools, or broad area or any
group of buildings. network whose
communications links
cross metropolitan,
regional, or national
boundaries over a long
distance.
Speed High speed (1000 Mbps) Less speed (150 Mbps)
Data transfer LANs have a high data transfer WANs have a lower data
rates rate. transfer rate compared to
LANs.
3
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Example The network in an office The Internet is a good
building can be a LAN example of a WAN
Technology Tend to use certain WANs tend to use
connectivity technologies, technologies like MPLS,
primarily Ethernet and Token ATM, Frame Relay and
Ring X.25 for connectivity over
longer distances
Connection One LAN can be connected to Computers connected to a
other LANs over any distance wide-area network are
via telephone lines and radio often connected through
waves. public networks, such as
the telephone system.
They can also be
connected through leased
lines or satellites.
Components Layer 2 devices like switches, Layers3 devices Routers,
bridges, Layer 1 devices like Switches and Technology
Hubs, Repeaters specific devices like ATM
or Frame-relay Switches.
Fault LANs tend to have fewer WANs tend to be of fewer
Tolerance problems associated with faults tolerance as they
them, as there are smaller in consist of large number of
number of systems to deal systems.
with.
Data Experiences fewer data Experiences more data
Transmission transmission errors transmission errors as
Error compared to LAN
Ownership Typically owned, controlled, WANs (like the Internet)
and managed by a single are not owned by any one
person or organization. organization but rather
exist under collective or
distributed ownership and
management over long
distances.
Set-up costs If there is a need to set-up a For WANs since networks
couple of extra devices on the in remote areas have to be
network, it is not very connected the set-up costs
expensive to do that. are higher. However
WANs using public
networks can be setup
very cheaply using just
software (VPN etc).
Geographical Have a small geographical Have a large geographical
Spread range and do not need any range generally spreading
leased telecommunication lines across boundaries and
need leased
telecommunication lines
4
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Maintenance Because it covers a relatively Maintaining WAN is
costs small geographical area, LAN difficult because of its
is easier to maintain at wider geographical
relatively low costs. coverage and higher
maintenance costs.
Bandwidth High bandwidth is available Low bandwidth is
for transmission. available for transmission.
Congestion Less congestion More congestion
Models are useful because they help us understand difficult concepts and
complicated systems. When it comes to networking, there are several models that are
5
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
used to explain the roles played by various technologies, and how they interact. Of
these, the most popular and commonly used is the Open Systems Interconnection
(OSI) Reference Model.
The idea behind the OSI Reference Model is to provide a framework for both
designing of networking systems and for explaining how they work. The existence of
the model makes it easier for networks to be analysed, designed, built and
rearranged, by allowing them to be considered as modular pieces that interact in
predictable ways, rather than enormous, complex monoliths. The seven layers of OSI
model are shown in Fig 0.5.
6
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Fig 0.5 Seven layer of OSI model.
• Create a protocol that can be designed and tested in stages, which in turn reduces
the complexity.
• Enhance functionality of the protocol without adversely affecting the other layers
• Provide multivendor compatibility.
• Allow for easier troubleshooting by locating the specific layer causing the problem.
OSI model divides the network into seven layers and explains the routing of the data
from source to destination. It is a theoretical model which explains the working of
the networks. Here are the details of OSI's seven layers:
7
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
The Application layer is a buffer between the user interface (what the user
uses to perform work) and the network application. This layer is responsible for
finding a partner such that they can communicate with each other on the network.
Once a partner is found, it is then responsible for ensuring that there is sufficient
network bandwidth to deliver the data. This layer may also be responsible for
synchronizing communication and providing high level error checking between the
two partners. This ensures that the application is either sending or receiving, and that
the data transmitted is the same data received. Typical applications include a
client/server application (Telnet), an e-mail application (SMTP), and an application
to transfer files using FTP or HTTP. Application layer model is given in Fig 0.8.
8
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Fig 0.9 Presentation layer model.
0.6.3 Session Layer (Layer 5)
The Session layer sets up and terminates communications between the two
partners. This layer decides on the method of communication: half-duplex or full-
duplex. Session layer model is given in Fig 0.10.
9
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Fig 0.11 Half duplex and full duplex mode of communication.
0.6.5 Transport Layer (Layer4)
This layer provides end-to-end delivery of data between two nodes. It divides
data into different packets before transmitting it. On receipt of these packets, the
data is reassembled and forwarded to the next layer. If the data is lost in transmission
or has errors, then this layer recovers the lost data and transmits the same. Transport
layer add port number and sequence number to assemble and distinguish between
multiple applications segments received at a device; this also allows data to be
multiplexed on the line. Multiplexing is the method of combining data from the
upper layers and sending them through the same data stream. This allows more than
one application to communicate with the communication partner at the same time.
When the data reaches the remote partner, the Transport layer then disassembles the
segment and passes the correct data to each of the receiving applications. An
example of the transport layer is given in Fig 0.12.
The main function of this layer is routing data has to its intended destination
on the network as long as there is a physical network connection. The device that
allows us to accomplish this spectacular feat is the router, sometimes referred to as a
Layer 3 device. While doing so, it has to manage problems like network congestion,
switching problems, etc. In order for the router to succeed in this endeavour, it must
be able to identify the source segment and the final destination segment.
This is done through network addresses, also called logical addresses. When a
router receives data, it examines the Layer 3 data to determine the destination
network address. It then looks up the address in a table that tells it which route to use
to get the data to its final destination. It places the data on the proper connection,
there by routing the packet from one segment to another. The data may need to
travel through many routers before reaching its destination host. Each router in the
path would perform the same lookup in its table.
TCP/IP requires that each interface on a TCP/IP network have its own unique
IP address. There are two addressing schemes for TCP/IP: IPv4 and IPv6.
10
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
0.6.8 IPv4
0.6.9 IPv6
The main function of this layer is to convert the data packets received from
the upper layer into frames and route the same to the physical layer. Error detection
and correction is done at this layer, thus making it a reliable layer in the model. It
establishes a logical link between the nodes and transmits frames sequentially. Data
link layer model is given in fig 0.14.
11
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
The Data Link layer is split into two sub layers, the Logical Link Control
(LLC) and the Media . Access Control (MAC). MAC sub layer is closer to the
Physical layer. The MAC sub layer defines a physical address, called a MAC
address or hardware address, which is unique to each individual network interface.
This allows a way to uniquely identify each network interface on a network, even if
the network interfaces are on the same computer. More importantly, though, the
MAC address can be used in any network that supports the chosen network interface.
Fig 0.15 show where the MAC address is printed on the devices.
The MAC address is a unique value associated with a network adapter. MAC
addresses are also known as hardware addresses or physical addresses. They
uniquely identify an adapter on a LAN. MAC addresses are 12-digit hexadecimal
numbers (48 bits in length). By convention, MAC addresses are usually written as the
following format: MM:MM:MM: SS:SS:SS or MM-MM-MM-SS-SS-SS. The first
half of a MAC address contains the ID number of the adapter manufacturer. These
Ids are regulated by an Internet standards body (see sidebar). The second half of a
12
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
MAC address represents the serial number assigned to the adapter by the
manufacturer.
MAC layer on the receiving computer will take the bits from the Physical
layer and put them in order into a frame. It will also do a CRC (Cyclic Redundancy
Check) to determine if there are any errors in the frame. It will check the destination
hardware address to determine if the data is meant for it, or if it should be dropped or
sent on to the next machine. If the data is meant for the current computer, it will pass
it to the LLC layer. The LLC layer is the buffer between the software protocols
and the hardware protocols. It is responsible for taking the data from the Network
layer and sending it to the MAC layer. This allows the software protocols to run on
any type of network architecture. MAC addresses function at the data link layer
(layer 2). They allow computers to uniquely identify themselves on a network at
this relatively low level. Fig 0.16 shows the MAC address.
0.6.12 Frames
At the Data Link layer, data coming from upper-layer protocols are divided
into logical chunks called frames. A frame is a unit of data transmission. The size
and format of these frames depend on the transmission technology. In other words,
Ethernet frames differ greatly from Token Ring frames and Frame Relay frames, and
the three are not compatible.
As the name suggests, this is the layer where the physical connection
between two computers takes place. The data is transmitted via this physical medium
to the destination's physical layer. It is responsible for sending data and receiving
data across a physical medium. This data is sent in bits, either a 0 or a 1. The data
may be transmitted as electrical signals (that is, positive and negative voltages),
audio tones, or light. This layer also defines the Data Terminal Equipment (DTE)
and the Data Circuit-Terminating Equipment (DCE). The DTE is often accessed
through a modem or a Channel Service Unit/Data Service Unit (CSU/DSU)
connected to a PC or a router. The carrier of the WAN signal provides the DCE
13
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
equipment. A typical device would be a packet switch, which is responsible for
clocking and switching. Fig 0.17 represents the physical layer model.
Since there may be more than one application using more than one
communication partner using more than one protocol, how does the data get to its
destination correctly. This is accomplished through a process called data
encapsulation. Fig 0.18 shows the process of data encapsulation done in
communication.
1. A user is working on an application and decides to save the data to are mote
server. The application calls the Application layer to start the process.
2.The Application layer takes the data and places some information, called a header,
at the beginning. The header tells the Application layer which user application sent
the data.
3. The Application layer then sends the data to the Presentation layer, where the data
conversion takes place. The Presentation layer places a header on all the
14
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
information received from the Application layer (including the Application layer
header). This header identifies which protocol in the Application layer to pass it
back.
4. The Presentation layer then sends the complete message to the Session layer. The
Session layer sets up the synchronized communication information to speak with
the communication partner and appends the information to another header.
5. The Session layer then sends the message to the Transport layer, where
information is placed into the header identifying the source and the destination
hosts and the method of connection (connectionless versus connection-oriented).
6. The Transport layer then passes the segment to the Network layer, where the
network address for the destination and the source are included in the header.
8. The Data Link layer then passes the frame to the Physical layer for transmitting on
the physical medium as individual bits.
9. Finally, the receiving computer receives the bits and reverses the process to get the
original data to the source application; in this case, a file server service.
Note that since the top three layers have similar functionality, we can typically
combine all of the data in those layers and simply refer to it as the Protocol Data
Unit (PDU). In this Instance, we can substitute the term PDU for the term message.
Fig 0.19 gives the complete description of all the links in the communication system.
15
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Although every device on a LAN is connected to every other device, they do
not necessarily communicate with each other. There are two basic types of LANs,
based on the communication patterns between the machines: client/server networks
and peer-to-peer networks.
Every computer has a distinct role: that of either a client or a server. A server
is designed to share its resources among the client computers on the network.
Typically, servers are located in secured areas, such as locked closets or data centres
(server rooms), because they hold an organization’s most valuable data and do not
have to be accessed by operators on a continuous basis. The rest of the computers on
the network function as clients. Fig 0.20 shows a typical client server model.
In the true sense, a server does exactly what the name implies: It provides
resources to the clients on the network (“serves” them, in other words). Servers are
typically powerful computers that run the software that controls and maintains.
Servers are often specialized for a single purpose. This is not to say that a single
server can’t do many jobs, but you’ll get better performance if you dedicate a server
to a single task. Here are some examples of servers that are dedicated to a single task:
File Server Holds and distributes files.
16
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
• Print Server Controls and manages one or more printers for the network.
• Proxy Server performs a function on behalf of other computers.
• Application Server Hosts a network application.
• Web Server Holds and delivers web pages and other web content using the
Hypertext
Transfer Protocol (HTTP).
• Mail Server Hosts and delivers e-mail. It’s the electronic equivalent of a post office.
• Fax Server Sends and receives faxes for the entire network without the need for
paper.
• Telephony Server Functions as a “smart” answering machine for the network. It can
also perform call centre and call-routing functions. Fig 0.21 shows the peer to peer
to communication process.
• Notice that each server type’s name consists of the type of service the server
provides (remote access, for example) followed by the word server, which, as you
remember, means to serve.
17
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
0.13 Dynamic Host Configuration Protocol (DHCP)
It should be apparent that this save loads of time when changing the IP
addresses on your network. Instead of running around to every workstation and
server and resetting the IP address to a new address, you simply reset the IP address
pool on the DHCP server.
18
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
The next time the client machines are rebooted, they are assigned new
addresses. Fig 0.24 represents the DHCP client server model. DHCP Information
can include IP address, Subnet mask, Default gateway, Domain name, and a DNS
Server.
The FTP package provides all the tools needed to look at files and directories,
change to other directories, and transfer text and binary files from one system to
another. FTP uses TCP to move the files.
19
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
0.16 Trivial File Transfer Protocol (TFTP)
SMTP allows for a simple e-mail service and is responsible for moving
messages from one e- mail server to another. Fig 0.26 represents the SMTP protocol.
POP provides a storage mechanism for incoming mail; the latest version of the
standard is known as POP3. When a client connects to a POP3 server, all the
messages addressed to that client are downloaded; there is no way to download
messages selectively.
Once the messages are downloaded, the user can delete or modify messages
without further interaction with the server. In some locations, POP3 is being
replaced by another standard, IMAP.
0.19 Telnet
20
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
21
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
HTTP is the mechanism that opens the related document when you select a
link, no matter where that document is located. HTTP works as a request-response
protocol between a client and server. A web browser may be the client, and an
application on a computer that hosts a web site may be the server.
Example: A client (browser) submits an HTTP request to the server; then the
server returns a response to the client. The response contains status information
about the request and may also the requested content. Fig 0.29 represents the
interface of human and data networks. Fig 0.30 represents the HTTP protocol.
Two commonly used methods for a request- response between a client and
server are: GET and POST. GET- Requests data from a specified resource. Its header
consists of many parameters.
22
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
TCP stands for Transmission Control Protocol, and UDP is the abbreviation
for User Datagram Protocol. Both pertain to data transmissions on the Internet, but
they work very differently.
For example, a request from a client (perhaps on behalf of you at your PC) to
a server on the Internet may request a file be served from that host's File Transfer
Protocol (FTP) server or process. In order to pass your request to the FTP process in
the remote server, the Transmission Control Protocol of in your computer identifies
the port number of 21 (which by convention is associated with an FTP request) in
the16-bit port number integer that is appended to your request. At the server, the
TCP layer will read the port number of 21and forward your request to the FTP
program at the server.
23
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
0.26 Activity 5: Commutation message types
0.26.1 Unicast
Unicast packets are sent from host to host. The communication is from
a single host to another single host. There is one device transmitting a message
destined for one receiver.
0.26.2 Broadcast
0.26.3 Multicast
24
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
If the connection is a local area connection, on the General tab, under This
connection uses the following items, click Internet Protocol (TCP/IP),and then click
Properties.
Click Use the following DNS server addresses, and in Preferred DNS server
and alternate DNS server, type the addresses of the primary and secondary
DNS servers.
Why we Develop sub netting and How to calculate sub net mask and how to
identify subnet address.
• Super netting
Why we develop super netting and How to calculate super net mask and how
to identify subnet address.
25
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
0.31 Procedure: On the host computer
On the host computer, follow these steps to share the Internet connection:
1. Log on to the host computer as Administrator or as Owner.
2. Click Start, and then click Control Panel.
3. Click Network and Internet Connections.
4. Click Network Connections.
5. Right-click the connection that you use to connect to the Internet. For example, if
you connect to the Internet by using a modem, right-click the connection that you
want under Dial-up / another network available.
6. Click Properties.
7. Click the Advanced tab.
8. Under Internet Connection Sharing, select the Allow other network users to
connect through this computer's Internet connection check box.
9. If you are sharing a dial-up Internet connection, select the Establish a dial-up
connection whenever a computer on my network attempts to access the
Internet checkbox if you want to permit your computer to automatically connect
to the Internet.
10. Click OK. You receive the following message:
When Internet Connection Sharing is enabled, your LAN adapter will be set to
use IP address 192.168.0.1 Your computer may lose connectivity with another
computer son your network. If these other computers have static IP addresses, it
is a good idea to set them too obtain their IP addresses automatically. Are you
sure you want to enable Internet Connection Sharing?
11. Click Yes.
The connection to the Internet is shared to other computers on the local area
network (LAN). The network adapter that is connected to the LAN is configured
with a static IP address of 192.168.0.1 and a subnet mask of 255.255.255.0
To connect to the Internet by using the shared connection, you must confirm
the LAN adapter IP configuration, and then configure the client computer. To
confirm the LAN adapter IP configuration, follow these steps:
26
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
8. IP Address 192.168.31.202
9. Subnet mask 255.255.255.0
10. Default gateway 192.168.31.1
11. In the Local Area Connection Properties dialog box, click OK.
12. Quit Control Panel.
0.35 HUB: An Ethernet hub, active hub, network hub, repeater hub, hub or
concentrator Is a device or connecting multiple twisted pair or fiber optic
Ethernet devices together and making them act as a single network segment.
Hubs work at the physical layer (layer1) of the OSI model. The device is a
form of multiport repeater. Repeater hubs also participate in collision
detection, forwarding a jam signal to all ports fit detects a collision
0.37 Bridge: A network bridge connects multiple network segments at the datalink
layer (Layer 2) of the OSI model. In Ethernet networks, the term bridge
formally means a device that behaves according totheIEEE802. 1D standard. A
bridge and switch are very much alike, a switch being a bridge with numerous
sports. Switched Layer2 switch is often used interchangeable with bridge.
Bridges can analyse in coming data packets to determine if the bridge is able to
send the given packet to another segment of the network.
27
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
computer networks, and selectively interchanges packets of data between them.
Each data packet contains address information that a router can use to
determine if the source and destination are on the same network, the data
packet must be transferred from one network to another. Where multiple
routers are used in a large collection of interconnected networks, the routers
exchange information about target system addresses, so that each router can
build up a table showing the preferred paths between any two systems on the
interconnected networks.
1. Transmission rate
2. Cost and ease of installation
3. Resistance to environmental conditions
4. Distances
28
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
3. Connected
4. Easy to install
5. Low weight
6. Cheap
29
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Advantages of coaxial cable
1. Transmission characteristics are better than twisted pair
2. Broadband transmission
3. Shared cable network
4. High b/w 400mbps
Optical fiber
(a)
(b)
Fig 0.35(a) and (b) Represents the single mode and multi-mode optical file.
30
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
3. Secure transmission
4. Broad band transmission
1) Radio waves
2) Micro waves
3) Infrared waves
Radio Waves
Radio waves are the electromagnetic waves that are transmitted in all the
directions of free space.
Radio waves are omni directional, i.e., the signals are propagated in all the
directions.
The range in frequencies of radio waves is from 3Khz to 1Khz.
In the case of radio waves, the sending and receiving antenna are not aligned,
i.e., the wave sent by the sending antenna can be received by any receiving
antenna.
An example of the radio wave is FM radio.
31
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Applications Of Radio waves
1. A Radio wave is useful for multicasting when there is one sender and many
receivers.
2. An FM radio, television, cordless phones are examples of a radio wave.
Advantages Of Radio transmission:
1. Radio transmission is mainly used for wide area networks and mobile cellular
phones.
2. Radio transmission provides a higher transmission rate.
3. Radio waves cover a large area, and they can penetrate the walls.
Microwaves
Microwaves are of two types:
Terrestrial microwave.
Satellite microwave communication.
32
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Frequency range: The frequency range of terrestrial microwave is from 4-6
GHz to 21-23 GHz.
Bandwidth: It supports the bandwidth from 1 to 10 Mbps.
Short distance: It is inexpensive for short distance.
Long distance: It is expensive as it requires a higher tower for a longer
distance.
Attenuation: Attenuation means loss of signal. It is affected by environmental
conditions and antenna size.
Advantages Of Microwave
Eavesdropping: An eavesdropping creates insecure communication. Any
malicious user can catch the signal in the air by using its own antenna.
Out of phase signal: A signal can be moved out of phase by using microwave
transmission.
Susceptible to weather condition: A microwave transmission is susceptible to
weather condition. This means that any environmental change such as rain,
wind can distort the signal.
Bandwidth limited: Allocation of bandwidth is limited in the case of
microwave transmission.
Satellite Microwave Communication
A satellite is a physical object that revolves around the earth at a known
height.
Satellite communication is more reliable nowadays as it offers more
flexibility than cable and fibre optic systems.
We can communicate with any point on the globe by using satellite
communication.
Advantages Of Satellite Microwave Communication:
The coverage area of a satellite microwave is more than the terrestrial
microwave.
The transmission cost of the satellite is independent of the distance from the
centre of the coverage area.
Satellite communication is used in mobile and wireless communication
applications.
It is easy to install.
It is used in a wide variety of applications such as weather forecasting,
radio/TV signal broadcasting, mobile communication, etc.
Disadvantages Of Satellite Microwave Communication:
Satellite designing and development requires more time and higher cost.
The Satellite needs to be monitored and controlled on regular periods so that
it remains in orbit.
33
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
The life of the satellite is about 12-15 years. Due to this reason, another
launch of the satellite has to be planned before it becomes non-functional.
Infrared
An infrared transmission is a wireless technology used for communication
over short ranges.
The frequency of the infrared in the range from 300 GHz to 400 THz.
It is used for short-range communication such as data transfer between two
cell phones, TV remote operation, data transfer between a computer and cell
phone resides in the same closed area.
Characteristics of Infrared
It supports high bandwidth, and hence the data rate will be very high.
Infrared waves cannot penetrate the walls. Therefore, the infrared
communication in one room cannot be interrupted by the nearby rooms.
An infrared communication provides better security with minimum
interference.
Infrared communication is unreliable outside the building because the sun
rays will interfere with the infrared waves.
Activity 9: Topology
34
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Both ends of the shared channel have line terminator. The data is sent in only one
direction and as soon as it reaches the extreme end, the terminator removes the data
from the line.
Star Topology
All hosts in Star topology are connected to a central device, known as hub device,
using a point-to-point connection. That is, there exists a point to point connection
between hosts and hub. The hub device can be any of the following:
Layer-1 device such as hub or repeater
Layer-2 device such as switch or bridge
In ring topology, each host machine connects to exactly two other machines,
creating a circular network structure. When one host tries to communicate or send
message to a host which is not adjacent to it, the data travels through all
intermediate hosts. To connect one more host in the existing structure, the
administrator may need only one more extra cable.
35
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Failure of any host results in failure of the whole ring. Thus, every connection in the
ring is a point of failure. There are methods which employ one more backup ring.
Mesh Topology
In this type of topology, a host is connected to one or multiple hosts. This
topology has hosts in point-to-point connection with every other host or may also
have hosts which are in point-to-point connection to few hosts only.
Hosts in Mesh topology also work as relay for other hosts which do not have direct
point-to-point links. Mesh technology comes into two types:
Full Mesh: All hosts have a point-to-point connection to every other host in
the network. Thus for every new host n(n-1)/2 connections are required. It
provides the most reliable network structure among all network topologies.
Partially Mesh: Not all hosts have point-to-point connection to every other
host. Hosts connect to each other in some arbitrarily fashion. This topology
exists where we need to provide reliability to some hosts out of all.
Tree Topology
Also known as Hierarchical Topology, this is the most common form of
network topology in use presently. This topology imitates as extended Star topology
and inherits properties of bus topology.
This topology divides the network in to multiple levels/layers of network.
Mainly in LANs, a network is bifurcated into three types of network devices. The
lowermost is access-layer where computers are attached. The middle layer is known
as distribution layer, which works as mediator between upper layer and lower layer.
The highest layer is known as core layer, and is central point of the network, i.e.
root of the tree from which all nodes fork.
36
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
All neighbouring hosts have point-to-point connection between them. Similar to the
Bus topology, if the root goes down, then the entire network suffers even. Though it
is not the single point of failure. Every connection serves as point of failure, failing
of which divides the network into unreachable segment.
Daisy Chain
This topology connects all the hosts in a linear fashion. Similar to Ring topology, all
hosts are connected to two hosts only, except the end hosts. Means, if the end hosts
in daisy chain are connected then it represents Ring topology.
Hybrid Topology
A network structure whose design contains more than one topology is said to be
hybrid topology. Hybrid topology inherits merits and demerits of all the
incorporating topologies. The above picture represents an arbitrarily hybrid
topology. The combining topologies may contain attributes of Star, Ring, Bus, and
Daisy-chain topologies. Most WANs are connected by means of Dual-Ring
topology and networks connected to them are mostly Star topology networks.
Internet is the best example of largest Hybrid topology
37
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Viva Questions
Ans: Two or more computers are connected directly by an optical fiber or any other cable. A
node is a point where a connection established. It is a network component that is used to
send, receive and forward the electronic information. A device connected to a network
is also termed as Node. Let's consider that in a network there are 2 computers, 2
printers, and a server are connected, then we can say that there are five nodes on
the network.
38
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Ans: Backbone is the most important component that supports all other components.
Similarly, in networking, backbone network is the network that supports
various other parts of the network to which it belongs and has a high capacity
connectivity architecture. II) Types of Networks Used In Different
Transmission Media
39
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Session layer
Transport layer network layer
Data link layer
Physical layer
13.What layer in the TCP/IP stack is equivalent to the Transport layer of the
OSI model? (Geeks for Geeks)
Ans: Host-To-Host
16. To achieve reliable transport in TCP, ___________ is used to check the safe
and sound arrival of data. (TQ)
Ans: Acknowledgment.
19. State one protocol which is NOT used to resolve one form of address to
another one? (GATE 2016)
Ans: DHCP
20. State two of the examples stateful application layer protocols? (GATE 2016)
Ans: POP3, FTP
40
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
its network with an intended IP address. This message will be discarded by
every host except the one with the intended IP address. Now the receiver will
unicast a packet with MAC address (ARP reply).
27. The resources needed for communication between end systems are reserved
for the duration of the session between end systems in ________
Ans) In circuit switching, a physical path between the sender and receiver is
established. This path is maintained until the connection is needed.
27. The maximum window size for data transmission using the selective reject
protocol with n-bit frame sequence numbers is: (gate 2005)
Ans: 2^(n-1)
30. The which layer is responsible for moving frames from one hop (node) to the
next?
41
Lab 0 – Activity 1-9 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Ans: Data link layer
33.WiMAX provides?
Ans: VoIP services.
35.Devices that provide the connectivity to a WiMAX network are known as?
Ans: Subscriber stations
42
Lab 0 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
KLEF
Department of ECE, A.Y 2019-20, Semester - II
Data networks and Protocols Lab Internal Examination RUBRIC
Total Marks
30
43
Lab 1 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Basic Network Switch Setup: Software & Hardware
Aim /Objective:
a) Introduction to Packet Tracer, creation of a LAN and connectivity test in the
LAN, creation of VLAN and VLAN trucking.
b) Creating Small Business Network with Network Switches, End users configure
and verify the connectives.
c) *[Optional Lab]: Transfer Data between Two Laptops using Network switch.
Pre-Lab
Overview
Packet Tracer can also be run on Linux and Microsoft Windows and also mac
OS. Similar Android and iOS apps are also available. Packet Tracer allows users to
create simulated network topologies by dragging and dropping routers, switches and
various other types of network devices. A physical connection between devices is
represented by a 'cable' item. Packet Tracer supports an array of
simulated Application Layer protocols, as well as basic routing
with RIP, OSPF, EIGRP, BGP, to the extents required by the
current CCNA curriculum. As of version 5.3, Packet Tracer also supports the Border
Gateway Protocol. In addition to simulating certain aspects of computer networks,
Packet Tracer can also be used for collaboration. As of Packet Tracer 5.0, Packet
Tracer supports a multi-user system that enables multiple users to connect multiple
topologies together over a network. Packet Tracer also allows instructors to create
activities that students have to complete. Packet Tracer is often used in educational
settings as a learning aid. Cisco Systems claims that Packet Tracer is useful for
network experimentation.
44
Lab 1 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Role in Education
Packet Tracer allows students to design complex and large networks, which is
often not feasible with physical hardware, due to costs. Packet Tracer is commonly
used by CCNA Academy students, since it is available to them for free. However,
due to functional limitations, it is intended by CISCO to be used only as a learning
aid, not a replacement for Cisco routers and switches. The application itself only has
a small number of features found within the actual hardware running a current Cisco
IOS version. Thus, Packet Tracer is unsuitable for modelling production networks. It
has a limited command set, meaning it is not possible to practice all of the IOS
commands that might be required. Packet Tracer can be useful for
understanding abstract networking concepts, such as the Enhanced Interior Gateway
Routing Protocol by animating these elements in a visual formn Packet Tracer is also
useful in education by providing additional components, including an authoring
system, network protocol simulation and improving knowledge an assessment
system.
PTTP protocol to make Packet Tracer interact with real network devices:
Cisco registered a new **PTTP** URI scheme with IANA to extend Packet
Tracer 7.2.2 capabilities and make it interact with Cisco CSR virtual routers. Cisco
CSR routers are cloud based IOX-XE routers deployed on x86 virtual machines.
The below url tutorials demonstrate the basic functions, features, and aspects of
Packet Tracer.
• http://static-pt-assets.s3.amazonaws.com/tutorials72.htm#stub
Step 2
On opening Cisco Packet Tracer select “End Devices” from the bottom left
icons menu (Figure 2), on clicking “End Devices” you will notice the menu to its
right changes, displaying end devices like computers, phones and TV etc. From this
middle menu click and drag two Desktop computers (Figure 3) to the white
screen (work area) .
Step 3
After creating two computer objects on the screen click on their names if you
want to rename them. Renaming is not necessary at this stage but it is helpful if you
are creating a complex network.
47
Lab 1 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Now click on the switches icon from the bottom left menu and drag a switch
to the work area as shown in “figure 5“. Switch is required for end
devices(computers) to communicate through LAN(Local Area Network), The main
function of a network switch is to forward packets from source to its destination
accurately and efficiently.
Fig 1.4 CPT window showing names of the devices paced in the workspace.
48
Lab 1 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Now select the Flash Icon which is for connection from the bottom left menu
and then click on the automatically select connection type icon(Figure 6). While the
connection type being selected click on UpaaePC1 and then UpaaeSwitch1 (Figure
7)and repeat this step for UpaaePC2.
49
Lab 1 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Fig 1.7 CPT window showing different types of connections in the bottom menu.
Step 7
Enter 192.168.1.2 in the IP Address field and click on the subnet mask it will
automatically populate with 255.255.255.0, close this window and repeat step 6 and
step 7 for UpaaePC2 with this IP Address 192.168.1.3.
Fig 1.8 CPT window showing connections with switch and PC.
50
Lab 1 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Step 8
51
Lab 1 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
For validating if our computer can communicate through switch we use ping,
if pinging the other computer results in no packet loss then we are good and having a
working network. Now click on UpaaePC1 and select command prompt. As we know
that UpaaePC2 has the IP address of 192.168.1.3 so we will enter “ping 192.168.1.3”
at the command prompt and wait for the result. Ping Result
If you have followed each step correctly you will get result like this otherwise
repeat these steps until you have correct configuration.
52
Lab 1 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Laboratory (1a) chapter 2 - Network Switch Setup, Configure, and Verification
Create a Tropology as shown in
following figure
In this topology
1) Two 2960 Series switches are used.
2) Switch1 (Interface Gig1/1) is connected with Switch2 (Interface Gig1/1) via
cross cable.
3) Switch1 has two PCs connected on interfaces Eth0/1 and Eth0/2 via straight
through cable.
4) Same as switch1, Switch2 also has two PCs connected on its interfaces Eth0/1
and Eth0/2.
5) IP address is configured on all PCs PC0 (192.168.1.1/24), PC1
(192.168.1.2/24), PC2 (192.168.1.3/24), PC3 (192.168.1.4/24).
Fig 1.14 Task _1CLI menu item and press Enter Key
53
Lab 1 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Cisco switches run on proprietary OS known as Cisco IOS. IOS is a group of
commands used for monitoring, configuring and maintaining cisco devices. For
security and easy administration, IOS commands are divided in the set of different
command modes. Each command mode has its own set of commands. Which
commands are available to use, depend upon the mode we are in.?
Following table lists necessary commands to navigate between different IOS modes
with examples.
55
Lab 1 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
We can list all available commands, if we don't know the initials of our
command. For example to list all available commands at User exec mode, just type
? at command prompt and hit enter key.
Command syntax help can be used to get the list of keyword, commands, or
parameters that are available starting with the keywords that we had already entered.
Enter ? (Question mark) after hitting Space key and prompt will return with the list of
available command options. For example to know the parameters required by show
ip command type show ip ? and prompt will return with all associate parameters. If
prompt returns with <CR> only as an option, that means switch does not need any
additional parameters to complete the command. You can execute the command in
current condition.
Ans: Switch name can be set from global configuration mode. Use hostname [desired
hostname] command to set name on switch.
56
Lab 1 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Ans: Passwords are used to restrict physical access to switch. Cisco switch supports
console line for local login and VTYs for remote login. All supported lines need be
secure for User Exec mode. For example, if you have secured VTYs line leaving
console line unsecure, an intruder can take advantage of this situation in connecting
with device. Once you are connected with device, all remaining authentication are
same. No separate configuration is required for further modes.
Password can be set from their respective line mode. Enter in line mode from global
configuration mode.
VTY term stand for virtual terminal such as telnet or SSH. Switch may
support up to thousand VTYs lines. By default, first five (0 - 4) lines are enabled. If
we need more lines, we have to enable them manually. 2960 Series switch supports
16 lines. We can set a separate password for each line, for that we have to specify the
number of lines. In our example we set a common password for all lines.
Above method is good for small companies, where numbers of network
administrators are very few. In above method we have to share password between all
administrators. Switch supports both local and remote server authentication. Remote
server authentication is a complex process and not included in any entry level exams.
For this article I am also skipping remote server method. In local database
57
Lab 1 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
authentication method switch allows us to set a separate password for each user. Two
global configuration commands are used to set local user database.
Both commands do same job. Advantage of using secret option over password option
is that in secret option password is stored in MD5 encryption format while
in password option password is stored in plain text format.
Along with User Exec mode we can also secure Privilege Exec mode. Two
commands are available for it.
Ans: During the practice several times we have to reset switch to factory defaults.
Make sure you don't run following commands in production environment unless you
understand their effect clearly. Following commands will erase all configurations. In
production environment you should always takes backup before removing
configurations. In LAB environment we can skip backup process.
Switch>enable
Switch#delete flash:vlan.dat
Delete filename [vlan.dat]? [Press Enter Key]
58
Lab 1 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Delete flash:vlan.dat? [confirm] [ Reconfirm by pressing enter key]
Switch#erase startup-config
Switch#reload
Ans: Switch stores MAC addresses in MAC address table. Gradually it could be full.
Once it full, switch automatically starts removing old entries. You can also clear
these tables manually from privileged exec mode. To delete all entries use following
command.
59
Lab 1 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Switch keeps all running configuration in RAM. All data from RAM is erased when
we turned off the device. To save running configuration use following command
Ans: Switch automatically adjust duplex mode depending upon remote device. We
could change this mode with any of other supported mode. For example to force
switch to use full duplex mode use
60
Lab 1 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Switch(config)# #interface fastethernet 0/1
Switch(config-if)#duplex full
show version
show version command provides general information about device including its
model number, type of interfaces, its software version, configuration settings,
location of IOS and configuration files and available memories.
show mac-address-table
Switch stores MAC address of devices those are attached with its interfaces in CAM
table. We can use show mac-address-table command to list all learned devices.
Switch uses this table to make forward decision.
61
Lab 1 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
show flash
Switch stores IOS image file in flash memory. show flash command will list the
content of flash memory. This command is useful to get information about IOS file
and available memory space in flash.
show running-config
Configuration parameter values are created, stored, updated and deleted from running
configuration. Running configuration is stored in RAM. We can use show running-
config command to view the running configuration.
62
Lab 1 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
show startup-config
Any configuration stored in RAM is erased when devices is turned off. We can save
running configuration in NVRAM. If we have saved running configuration in
NVRAM, it would be automatically loaded back in RAM from NVRAM during the
next boot. As switch load this configuration back in RAM in startup of device, at
NVRAM it is known as startup-config.
63
Lab 1 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
show vlan
show vlan command will display the VLANs. For administrative purpose, switch
automatically create VLAN 1 and assign all its interfaces to it. You can create custom
VLANs from global configuration mode and then assign them to interfaces.
64
Lab 1 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
show interface
show interface command displays information about interfaces. Without argument it
would list all interfaces. To get information about specific interface we need to pass
its interface number as an argument. For example to view details about Fast Ethernet
0/1, use show interface fastethernet 0/1.
65
Lab 1 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
First line from output provides information about the status of interface.
FastEthernet0/1 is up, line protocol is up ( connected)
The first up indicates the status of the physical layer, and the second up indicates to
the status of the data link layer.
66
Lab 1 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
show ip interface brief is a extremely useful command to get quick overview of all
interfaces on switch. It lists their status including IP address and protocol.
1. First open the default Nautilus file browser and right click on a folder you
want to share.
67
Lab 1 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
3. In the pop-up dialog, check the checkbox says ‘share this folder’ and click the
‘Install service’ button when it prompts.
68
Lab 1 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
6. Optional) If you want remote machine to type ‘username’ and
‘password’ before accessing the shared folder, open terminal (Ctrl+Alt+T)
and run command.
7. To access the shared folder, you first need to get either IP address or
hostname
8. To get IP address go to settings>>Network>>IPv4.
9. Then select Manual>>give address.
69
Lab 1 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
For the hostname (computer name), simply open terminal and run command
‘hostname’.
10. For IP address, go to Settings -> Network (or Wi-Fi for wireless
connection), click on the gear button, and check in the pop-up window.
70
Lab 1 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
11. In Windows, open Run box in Start menu, type ‘IP-Address’ and hit enter.
Viva Questions
1. A technician can create a ______ PDUs in Packet Tracer to forward HTTP packets
to test a web server.(TQ)
Ans: Complex
3. What Is SVI?(TQ)
Ans: A switched virtual interface (SVI) is a vlan of switch ports represented by one
interface to a routing or bridging system. There is no physical interface for the
vlan and the SVI provides the layer 3 processing for packets from all switch
ports associated with the vlan.
71
Lab 1 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
7. Explain Different Switch Port Modes?
Ans : Trunk: forms an unconditional trunk.
Dynamic Desirable: Attempts to negotiate a trunk with the far end.
Dynamic Auto: Forms a trunk only if requested by the far end.
Access: It will never form a trunk.
72
Lab 1 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
KLEF
Department of ECE, A.Y 2019-20, Semester - II
Data networks and Protocols Lab Internal Examination RUBRIC
Total Marks
30
73
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Basic Network Performance on Switch integrated with Router:
a) Verifying Spanning Tree Protocol using Cisco Packet Tracer. Configuring and
Verify VLAN trunk links using IEEE802.1Q and resetting
b) Design an IP Addressing Scheme, Subnetting, and Configuring an Integrated
Router
c) *[Optional Lab]: Transfer Data Between Two Laptops using Wi-Fi
Aim /Objective:
Lab 2 Activity 1: Verifying Spanning Tree Protocol using Cisco Packet Tracer
Pre-requisite:
STP Configuration Lab-1
Open the Packet Tracer Scenario: STP Configuration Lab-1.pkt. Before proceeding,
save as STP Configuration Lab-1-working.pkt.
Spanning Tree Protocol Overview
The solution is STP. STP operation will result in one port in each loop being
blocked. STP monitors the environment as well, so that a blocked port can be re-
opened if a failure occurs in the working path. STP accomplishes these functions by
exchanging STP information in frames called Bridge Protocol Data Units (BPDUs).
A switch compares the values in BPDUs received with the values in BPDUs being
sent - lower values are preferred over higher values.
In order to fully understand BPDUs and how they work, it is first necessary to
understand certain aspects of the STP environment. First, every bridge has a Bridge
Identifier (BID) that consists of the bridge STP priority and the MAC address
assigned to the bridge itself. The default STP priority is 32768. (Cisco switches use
Per VLAN Spanning Tree (PVST), a variation of the original version of STP. With
PVST, an instance of STP is run for each configured VLAN. The VLAN number is
added to the default priority for each instance. For VLAN 1, then, the default priority
is 32769). Second, links are assigned a cost based on their speed. A 100 Mb link has
a STP cost of 19, a 1 Gb link has a STP cost of 4. Finally, each port has a port ID and
74
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
priority. These parameters are used by STP to ultimately determine which port to
block in the loop. Again, when using these parameters, lower values are considered
better than higher values. Below is an example of a BPDU sent out port Fa0/3 by a
switch with the default priority for VLAN 1 of 32769, a MAC address of
000B.1111.1111 and a cost to root of 19. The root switch has been determined to be
000A.1111.1111. The row descriptions are above the fields.
Direction of BPDU
STP goes through a three step process to establish the role of each bridge
(Root Bridge or non-root bridge) as well as the role and status of each operational
port on each switch. A port’s role can be either a root port, designated port or
alternate port. Root ports and designated ports have a forwarding status while an
alternate port has a blocking status.
The three STP steps are-
1.Determine the root bridge
2.Determine the root port on each non-root bridge
3.Determine the designated port for each segment.
75
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Topology Diagram
Addressing Table
Device
(Hostname) Interface IP Subnet Default
Addres Mask Gateway
s
S1 VLAN 1 172.17.1 255.255. N/A
0.1 255.0
S2 VLAN 1 172.17.1 255.255. N/A
0.2 255.0
S3 VLAN 1 172.17.1 255.255. N/A
0.3 255.0
76
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Learning Objectives
Upon completion of this lab, you will be able to:
Cable a network according to the topology diagram
Erase the start up configuration and reload the default configuration,
setting a switch to the default state
Perform basic configuration tasks on a switch
Observe and explain the default behavior of Spanning Tree Protocol (STP, 802.1D)
. Observe the response to a change in the spanning tree topology
Task 1: Perform Basic Switch Configurations
Step 1: Cable a network that is similar to the one in the topology diagram.
You can use any current switch in your lab as long as it has the required
interfaces shown in the topology diagram. The output shown in this lab is based on
Cisco 2960 switches. Other switch models may produce different output. Set up
console connections to all three switches.
77
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
1004 fddinet-default active
1005 trnet-default active
79
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Task 3: Configure Host PCs
Configure the Ethernet interfaces of PC1, PC2, PC3, and PC4 with the IP address,
subnet mask, and gateway indicated in the addressing table at the beginning of the
lab.
Task 4: Configure Spanning Tree
This bridge is the root Hello Time 2 sec Max Age 20 sec Forward Delay 15
sec Bridge ID Priority 32769 (priority 32768 sys-id-ext 1)
Address 0019.068d.6980
Hello Time 2 sec, Max Age 20 sec, Forward Delay 15 sec, Aging Time 300
Interface Role Sts Cost Prio.Nbr Type
---------------- ---- --- --------- -------- --------------------------------
Fa0/1 Desg FWD 19 128.3 P2p
Fa0/2 Desg FWD 19 128.4 P2p
Fa0/3 Desg FWD 19 128.5 P2p
S2#show spanning-tree
VLAN0001 Spanning tree enabled protocol ieee
Root ID Priority 32769
Address 0019.068d.6980 Cost 19
Port 1 (FastEthernet0/1)
Hello Time 2 sec Max Age 20 sec Forward
Delay 15 sec
S3#show spanning-tree
VLAN0001 Spanning tree enabled protocol ieee
Root ID Priority 32769
Address 0019.068d.6980
Cost 19
Port 1 (FastEthernet0/1)
Hello Time 2 sec Max Age 20 sec Forward
Delay 15 sec
Bridge ID Priority 32769 (priority 32768 sys-id-ext 1)
Address 001b.5303.1700
Hello Time 2 sec Max Age
20 sec Forward Delay 15
sec Aging Time 300
Interface Role Sts Cost Prio.Nbr Type
---------------- ---- --- --------- -------- ------------------------------
Fa0/1 Root FWD 19 128.1 P2p
Fa0/2 Altn BLK 19 128.2 P2p
The bridge identifier (bridge ID), stored in the spanning tree BPDU consists
of the bridge priority, the system ID extension, and the MAC address. The
combination or addition of the bridge priority and the system ID extension are
known as the bridge ID priority. The system ID extension is always the number
of the VLAN. For example, the system ID extension for VLAN 100 is 100. Using the
default bridge priority value of 32768, the bridge ID priority for VLAN 100 would
be 32868 (32768 + 100).
Step 1: Place the switches in spanning tree debug mode using the command debug
spanning- tree events
S1#debug spanning-tree events
Spanning Tree event debugging is on
S2#debug spanning-tree events
Spanning Tree event debugging is on
S3#debug spanning-tree events
Spanning Tree event debugging is on
Step 2: Intentionally shutdown port Fa0/1 on S1
S1(config)#interface fa0/1
S1(config-if)#shutdown
S3# 1w2d: STP: VLAN0001 heard root 32769-001b.0c68.2080 on Fa0/2 1w2d: STP:
VLAN0001 Fa0/2 -> listening
S3# 1w2d: STP: VLAN0001 Topology Change rcvd on Fa0/2
S31w2d: STP: VLAN0001 sent Topology Change Notice on Fa0/1
S3#1w2d: STP: VLAN0001 Fa0/2 -> learning
S3#1w2d: STP: VLAN0001 sent Topology Change Notice on Fa0/1 1w2d: STP:
VLAN0001 Fa0/2 -> forwarding
1.When the link from S2 that is connected to the root switch goes down, what is its
initial conclusion about the spanning tree root?
Ans:
2. Once S2 receives new information on Fa0/2, what new conclusion does it draw?
Ans:
3.Port Fa0/2 on S3 was previously in a blocking state before the link between S2 and
S1 went down. What states does it go through as a result of the topology change?
Ans:
82
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Step 4: Examine what has changed in the spanning tree topology using the show
spanning- tree command S2#show spanning-tree
VLAN0001
Spanning tree enabled
protocol ieee Root ID Priority 32769
Address 0019.068d.6980
Cost 38
Port 2 (FastEthernet0/2)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority 32769 (priority 32768 sys-id-ext 1)
Address 001b.0c68.2080
Hello Time 2 sec Max Age
20 sec Forward Delay 15
sec Aging Time 300
Interface Role Sts Cost Prio.Nbr Type
---------------- ---- --- --------- -------- --------------------------------
Fa0/2 Root FWD 19 128.2 P2p
Fa0/6 Desg FWD 19 128.6 P2p
Fa0/11 Desg FWD 19 128.11 P2p
Fa0/18 Desg FWD 19 128.18 P2p
S3#show spanning-tree
VLAN0001
Spanning tree enabled
protocol ieee Root ID Priority 32769
Address 0019.068d.6980 Cost 19
Port 1 (FastEthernet0/1)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority 32769 (priority 32768
sys-id-ext 1) Address 001b.5303.1700
Hello Time 2 sec Max Age 20 sec Forward
Delay 15 sec Aging Time 300
Interface Role Sts Cost Prio.Nbr Type
---------------- ---- --- --------- -------- -------------------------------- Fa0/1 Root
FWD 19 128.1 P2p
Fa0/2 Desg FWD 19 128.2 P2p
Answer the following questions based on the output.
1.What has changed about the way that S2 forwards traffic?
Ans:
83
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
2.What has changed about the way that S3 forwards traffic?
Ans:
Note: to be practiced inside the lab
Post lab activity:
Calculations:
Lab 2 Activity 2: Verify VLAN trunk links using IEEE802.1Q and resetting
Introduction
This document provides the basic information and a summary of the frame
fields for Inter-Switch Link (ISL) and IEEE 802.1Q encapsulation.
Prerequisites
Components Used
84
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
This document is not restricted to specific software and hardware versions.
Trunking capabilities are dependent on the hardware that is used. For more
information on the system requirements to implement trunking on Cisco Catalyst
series switches, refer to System Requirements to Implement Trunking.
Background Theory
Trunks are used to carry traffic that belongs to multiple VLANs between
devices over the same link. A device can determine which VLAN the traffic belongs
to by its VLAN identifier. The VLAN identifier is a tag that is encapsulated with the
data. ISL and 802.1Q are two types of encapsulation that are used to carry data from
multiple VLANs over trunk links.
802.1Q is the IEEE standard for tagging frames on a trunk and supports up to
4096 VLANs. In 802.1Q, the trunking device inserts a 4-byte tag into the original
frame and recomputes the frame check sequence (FCS) before the device sends the
frame over the trunk link. At the receiving end, the tag is removed and the frame is
forwarded to the assigned VLAN. 802.1Q does not tag frames on the native VLAN.
It tags all other frames that are transmitted and received on the trunk. When you
configure an 802.1Q trunk, you must make sure that you configure the same native
VLAN on both sides of the trunk. IEEE 802.1Q defines a single instance of spanning
tree that runs on the native VLAN for all the VLANs in the network. This is called
Mono Spanning Tree (MST). This lacks the flexibility and load balancing capability
of PVST that is available with ISL. However, PVST+ offers the capability to retain
multiple spanning tree topologies with 802.1Q trunking. For more information about
the 802.1Q encapsulation, For information on the configuration of ISL/802.1Q
encapsulation on Cisco switches, refer to VLAN Trunking Protocols Configuration
Examples and TechNotes.
ISL Frame
The ISL frame consists of three primary fields: the encapsulation frame
(original frame), which is encapsulated by the ISL header, and the FCS at the end.
This example shows the further expansion of the ISL header. The expansion includes
the field acronyms and the number of bits for each field:
85
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
No. of
bits 40 4 4 48 16 24 24
Frame US AAAA03(SN
field DA TYPE ER SA LEN AP) HSA
8 to 196,600
No. of bits (1 to
bits 15 1 16 16 24,575 bytes) 32
Frame VL ENCAP
field AN BPDU INDEX RES FRAME FCS
Field Descriptions
DA—Destination Address
The DA field of the ISL packet is a 40-bit destination address. This address is
a multicast address and is set at "0x01-00-0C-00-00" or "0x03-00-0c-00-00". The
first 40 bits of the DA field signal the receiver that the packet is in ISL format.
TYPE—Frame Type
The TYPE field consists of a 4-bit code. The TYPE field indicates the type of
frame that is encapsulated and can be used in the future to indicate alternative
encapsulations. This table provides definitions of different TYPE codes:
0000 Ethernet
0010 FDDI
0011 ATM
86
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
The USER field consists of a 4-bit code. The USER bits are used to extend
the meaning of the TYPE field. The default USER field value is "0000". For Ethernet
frames, the USER field bits "0" and "1" indicate the priority of the packet as it passes
through the switch. Whenever traffic can be handled in a manner that allows it to be
forwarded more quickly, the packets with this bit set should take advantage of the
quick path. It is not required that such paths be provided.
XX01 Priority 1
XX10 Priority 2
SA—Source Address
The SA field is the source address field of the ISL packet. The field should be
set to the "802.3" MAC address of the switch port that transmits the frame. It is a 48-
bit value. The receiving device may ignore the SA field of the frame.
LEN—Length
The LEN field stores the actual packet size of the original packet as a 16-bit
value. The LEN field represents the length of the packet in bytes, with the exclusion
of the DA, TYPE, USER, SA, LEN, and FCS fields. The total length of the excluded
fields is 18 bytes, so the LEN field represents the total length minus 18 bytes.
The HSA field is a 24-bit value. This field represents the upper 3 bytes (the
manufacturer ID portion) of the SA field. The field must contain the value "0x00-00-
0C".
87
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
The VLAN field is the VLAN ID of the packet. It is a 15-bit value that is
used to distinguish frames on different VLANs. This field is often referred to as the
"color" of the frame.
BPDU—Bridge Protocol Data Unit (BPDU) and Cisco Discovery Protocol (CDP)
Indicator
The bit in the BPDU field is set for all BPDU packets that are encapsulated
by the ISL frame. The BPDUs are used by the spanning tree algorithm in order to
determine information about the topology of the network. This bit is also set for CDP
and VLAN Trunk Protocol (VTP) frames that are encapsulated.
INDX—Index
The INDX field indicates the port index of the source of the packet as it exits
the switch. This field is used for diagnostic purposes only, and may be set to any
value by other devices. It is a 16-bit value and is ignored in received packets.
The RES field is a 16-bit value. This field is used when Token Ring or FDDI
packets are encapsulated with an ISL frame. In the case of Token Ring frames, the
Access Control (AC) and Frame Control (FC) fields are placed here. In the case of
FDDI, the FC field is placed in the Least Significant Byte (LSB) of this field. For
example, an FC of "0x12" has a RES field of "0x0012". For Ethernet packets, the
RES field should be set to all zeros.
The ENCAP FRAME field is the encapsulated data packet, which includes its
own cyclic redundancy check (CRC) value, completely unmodified. The internal
frame must have a CRC value that is valid after the ISL encapsulation fields are
removed. The length of this field can be from 1 to 24,575 bytes in order to
accommodate Ethernet, Token Ring, and FDDI frames. A receiving switch may strip
off the ISL encapsulation fields and use this ENCAP FRAME field as the frame is
received (associating the appropriate VLAN and other values with the received frame
as indicated for switching purposes).
The FCS field consists of 4 bytes. This sequence contains a 32-bit CRC
value, which is created by the sending MAC and is recalculated by the receiving
MAC in order to check for damaged frames. The FCS is generated over the DA, SA,
Length/Type, and Data fields. When an ISL header is attached, a new FCS is
calculated over the entire ISL packet and added to the end of the frame.
88
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Note: The addition of the new FCS does not alter the original FCS that is contained
within the encapsulated frame.
Frame Size
The ISL frame encapsulation is 30 bytes, and the minimum FDDI packet is
17 bytes. Therefore, the minimum ISL encapsulated packet for FDDI is 47 bytes. The
maximum Token Ring packet is 18,000 bytes. Therefore, the maximum ISL packet is
18,000 plus 30 bytes of ISL header, for a total of 18,030 bytes. If only Ethernet
packets are encapsulated, the range of ISL frame sizes is from 94 to 1548 bytes. The
biggest implication for systems that use ISL encapsulation is that the encapsulation is
a total of 30 bytes, and fragmentation is not required. Therefore, if the encapsulated
packet is 1518 bytes long, the ISL packet is 1548 bytes long for Ethernet.
Additionally, if packets other than Ethernet packets are encapsulated, the maximum
length can be greatly increased. You must consider this length change when you
evaluate whether a topology can support ISL packets size.Another system
implication is that ISL packets contain two FCSs. The first FCS is calculated for the
original data. The second FCS is calculated after the packet has been encapsulated in
ISL. If the original data does not contain a valid CRC, the invalid CRC is not
detected until the ISL header is stripped off and the end device checks the original
data FCS. This typically is not a problem for switching hardware, but can be difficult
for routers and network interface cards (NICs).
This example shows the further expansion of the Tag field. The expansion includes
the field acronyms and the number of bits for each field.
Frame
field TPID PRIORITY CFI VID
Field Descriptions This section provides detailed descriptions of the 802.1Q frame
fields.
Priority
Also known as user priority, this 3-bit field refers to the IEEE 802.1p priority.
The field indicates the frame priority level which can be used for the prioritization of
traffic. The field can represent 8 levels (0 through 7).
The Canonical Format Indicator is a 1-bit field. If the value of this field is 1,
the MAC address is in noncanonical format. If the value is 0, the MAC address is in
canonical format.
VID—VLAN Identifier
Frame Size
The 802.1Q tag is 4 bytes. Therefore, the resulting Ethernet frame can be as
large as 1522 bytes. The minimum size of the Ethernet frame with 802.1Q tagging is
68 bytes.
QinQ
The QinQ Support feature adds another layer of IEEE 802.1Q tag (called
"metro tag" or "PE-VLAN") to the 802.1Q tagged packets that enter the network.
The purpose is to expand the VLAN space by tagging the tagged packets, thus
producing a "double-tagged" frame. The expanded VLAN space allows the service
provider to provide certain services, such as Internet access on specific VLANs for
specific customers, yet still allows the service provider to provide other types of
services for their other customers on other VLANs.
90
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Frame Size
The default maximum transmission unit (MTU) of an interface is 1500
bytes. With an outer VLAN tag attached to an Ethernet frame, the packet size
increases by 4 bytes. Therefore, it is advisable that you appropriately increase the
MTU of each interface on the provider network. The recommended minimum MTU
is 1504 bytes.
TPID
The QinQ frame contains the modified tag protocol identifier (TPID) value of
VLAN Tags. By default, the VLAN tag uses the TPID field to identify the protocol
type of the tag. The value of this field, as defined in IEEE 802.1Q, is 0x8100.
The device determines whether a received frame carries a service provider
VLAN tag or a customer VLAN tag by checking the corresponding TPID value.
After receiving a frame, the device compares the compares the configured TPID
value with the value of the TPID field in the frame. If the two match, the frame
carries the corresponding VLAN tag. For example, if a frame carries VLAN tags
with the TPID values of 0x9100 and 0x8100, respectively, while the configured
TPID value of the service provider VLAN tag is 0x9100 and that of the VLAN tag
for a customer network is 0x8200, the device considers that the frame carries only
the service provider VLAN tag but not the customer VLAN tag.
In addition, the systems of different vendors might set the TPID of the outer
VLAN tag of QinQ frames to different values. For compatibility with these systems,
you can modify the TPID value so that the QinQ frames, when sent to the public
network, carry the TPID value identical to the value of a particular vendor to allow
interoperability with the devices of that vendor. The TPID in an Ethernet frame has
the same position with the protocol type field in a frame without a VLAN tag. In
order to avoid problems in packet forwarding and handling in the network, you
cannot set the TPID value to any of the values in this table:
91
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Procedure:
1) Cable the network as shown in the topology.
2) Assign the IP addresses as per topology diagram to the PC’s.
3) Create VLAN’s on the switches.
3a) Create the VLAN’s on S1
92
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
4c) Use show vlan brief command to check whether the ports are assigned to vlan
or not.
Issue the show ip interface brief command so that we can check whether ip
address is assigned to vlan or not.
4d) Use the Topology to assign VLANs to the appropriate ports on S2.
4e) Remove the IP address for VLAN 1 on S2.
4f) Configure an IP address for VLAN 99 on S2.
4g) Use the show vlan brief command to verify that the VLANs are assigned to the
correct interfaces.
5) Configure an 802.1Q trunk between the switches
You should also receive link status messages on S2 that vlan are changed state to up
5b) Issue the show interfaces trunk command to view trunked interfaces. Notice that
the mode on S1 is set to desirable, and the mode on S2 is set to auto
Output on switch 1:
93
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Output on switch 2:
94
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Calculations:
Introduction
Prerequisites
Cisco recommends that you have a basic understanding of binary and decimal
numbers. This document is not restricted to specific software and hardware versions.
The information in this document was created from the devices in a specific
lab environment. All of the devices used in this document started with a cleared
(default) configuration. If your network is live, make sure that you understand the potential
impact of any command.
Additional Information
If definitions are helpful to you, use these vocabulary terms in order to get you
started:
95
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
If you have already received your legitimate address(es) from the Internet Network
Information Center (InterNIC), you are ready to begin. If you do not plan to connect
to the Internet, Cisco strongly suggests that you use reserved addresses from RFC
1918
.
Understand IP Addresses
Each octet is converted to decimal and separated by a period (dot). For this
reason, an IP address is said to be expressed in dotted decimal format (for example,
172.16.81.100). The value in each octet ranges from 0 to 255 decimal, or 00000000
- 11111111 binary.
Here is how binary octets convert to decimal: The right most bit, or least
significant bit, of an octet holds a value of 20. The bit just to the left of that holds a
value of 21. This continues until the left- most bit, or most significant bit, which
holds a value of 27. So if all binary bits are a one, the decimal equivalent would be
255 as shown here:
1 1 1 11111
128 64 32 16 8 4 2 1 (128+64+32+16+8+4+2+1=255)
Here is a sample octet conversion when not all of the bits are set to 1.
0 1000001
0 64 0 0 0 0 0 1 (0+64+0+0+0+0+0+1=65)
And this sample shows an IP address represented in both binary and decimal.
96
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
These octets are broken down to provide an addressing scheme that can
accommodate large and small networks. There are five different classes of networks,
A to E. This document focuses on classes A to C, since classes D and E are reserved
and discussion of them is beyond the scope of this document.
Note: Also note that the terms "Class A, Class B" and so on are used in this document
in order to help facilitate the understanding of IP addressing and subnetting. These
terms are rarely used in the industry anymore because of the introduction of classless
interdomain routing (CIDR).
Given an IP address, its class can be determined from the three high-order bits (the
three left-most bits in the first octet). Figure 1 shows the significance in the three
high order bits and the range of addresses that fall into each class. For informational
purposes, Class D and Class E addresses are also shown.
In a Class A address, the first octet is the network portion, so the Class A
example in Figure 1 has a major network address of 1.0.0.0 - 127.255.255.255.
Octets 2, 3, and 4 (the next 24 bits) are for the network manager to divide into
subnets and hosts as he/she sees fit. Class A addresses are used for networks that
have more than 65,536 hosts (actually, up to 16777214 hosts!).
In a Class B address, the first two octets are the network portion, so the
Class B example in Figure 1 has a major network address of 128.0.0.0 -
97
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
191.255.255.255. Octets 3 and 4 (16 bits) are for local subnets and hosts. Class B
addresses are used for networks that have between 256 and 65534 hosts.
In a Class C address, the first three octets are the network portion. The Class
C example in Figure 1 has a major network address of 192.0.0.0 - 223.255.255.255.
Octet 4 (8 bits) is for local subnets and hosts - perfect for networks with less than
254 hosts.
In a Class A address, the first octet is the network portion, so the Class A
example in Figure 1 has a major network address of 1.0.0.0 - 127.255.255.255.
Octets 2, 3, and 4 (the next 24 bits) are for the network manager to divide into
subnets and hosts as he/she sees fit. Class A addresses are used for networks that
have more than 65,536 hosts (actually, up to 16777214 hosts!).
In a Class B address, the first two octets are the network portion, so the
Class B example in Figure 1 has a major network address of 128.0.0.0 -
191.255.255.255. Octets 3 and 4 (16 bits) are for local subnets and hosts. Class B
addresses are used for networks that have between 256 and 65534 hosts.
In a Class C address, the first three octets are the network portion. The Class
C example in Figure 1 has a major network address of 192.0.0.0 - 223.255.255.255.
Octet 4 (8 bits) is for local subnets and hosts - perfect for networks with less than
254 hosts.
98
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Network Masks
A network mask helps you know which portion of the address identifies the
network and which portion of the address identifies the node. Class A, B, and C
networks have default masks, also known as natural masks, as shown here:
Class A: 255.0.0.0
Class B: 255.255.0.0
Class C: 255.255.255.0
An IP address on a Class A network that has not been subnetted would have
an address/mask pair similar to: 8.20.15.1 255.0.0.0. In order to see how the mask
helps you identify the network and node parts of the address, convert the address and
mask to binary numbers.
8.20.15.1 = 00001000.00010100.00001111.00000001
255.0.0.0 = 11111111.00000000.00000000.00000000
Once you have the address and the mask represented in binary, then
identification of the network and host ID is easier. Any address bits which have
corresponding mask bits set to 1 represent the network ID. Any address bits that
have corresponding mask bits set to 0 represent the node ID.
8.20.15.1 = 00001000.00010100.00001111.00000001
255.0.0.0 = 11111111.00000000.00000000.00000000
Netid host id
netid = 00001000 = 8
hostid = 00010100.00001111.00000001 = 20.15.1
Understand Subnetting
Subnetting allows you to create multiple logical networks that exist within a
single Class A, B, or C network. If you do not subnet, you are only able to use one
network from your Class A, B, or C network, which is unrealistic.
Each data link on a network must have a unique network ID, with every node
on that link being a member of the same network. If you break a major network
(Class A, B, or C) into smaller sub networks, it allows you to create a network of
interconnecting sub networks. Each data link on this network would then have a
unique network/sub network ID. Any device, or gateway, that connects n
networks/sub networks has n distinct IP addresses, one for each network / sub
network that it interconnects. In order to subnet a network, extend the natural mask
with some of the bits from the host ID portion of the address in order to create a sub
network ID. For example, given a Class C network of which has a natural mask of
255.255.255.0, you can create subnets in this manner:
99
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
204.17.5.0-11001100.00010001.00000101.00000000
255.255.255.224 - 11111111.11111111.11111111.11100000
By extending the mask to be 255.255.255.224, you have taken three bits (indicated
by "sub") from the original host portion of the address and used them to make
subnets. With these three bits, it is possible to create eight subnets. With the
remaining five host ID bits, each subnet can have up to 32 host addresses, 30 of
which can actually be assigned to a device since host ids of all zeros or all ones are
not allowed (it is very important to remember this). So, with this in mind, these
subnets have been created.
Note: There are two ways to denote these masks. First, since you use three bits more
than the "natural" Class C mask, you can denote these addresses as having a 3-bit
subnet mask. Or, secondly, the mask of 255.255.255.224 can also be denoted as /27
as there are 27 bits that are set in the mask. This second method is used with CIDR.
With this method, one of these networks can be described with the notation
prefix/length. For example, 204.17.5.32/27 denotes the network 204.17.5.32
255.255.255.224. When appropriate, the prefix/length notation is used to denote the
mask throughout the rest of this document. The network subnetting scheme in this
section allows for eight subnets, and the network might appear as:
100
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Notice that each of the routers in Figure 2 is attached to four sub
networks, one sub network is common to both routers. Also, each router has an
IP address for each sub network to which it is attached. Each sub network could
potentially support up to 30 host addresses.
This brings up an interesting point. The more host bits you use for a subnet
mask, the more subnets you have available. However, the more subnets available,
the less host addresses available per subnet. For example, a Class C network of
204.17.5.0 and a mask of 255.255.255.224 (/27) allows you to have eight subnets,
each with 32 host addresses (30 of which could be assigned to devices). If you use a
mask of 255.255.255.240 (/28), the break down is:
204.17.5.0 - 11001100.00010001.00000101.00000000
255.255.255.240 - 11111111.11111111.11111111.11110000
Since you now have four bits to make subnets with, you only have four bits
left for host addresses. So in this case you can have up to 16 subnets, each of which
can have up to 16 host addresses (14 of which can be assigned to devices).
Take a look at how a Class B network might be subnetted. If you have network
172.16.0.0 ,then you know that its natural mask is 255.255.0.0 or 172.16.0.0/16.
Extending the mask to anything beyond 255.255.0.0 means you are subnetting. You
can quickly see that you have the ability to create a lot more subnets than with the
Class C network. If you use a mask of 255.255.248.0 (/21), how many subnets and
hosts per subnet does this allow for
172.16.0.0 - 10101100.00010000.00000000.00000000
255.255.248.0 - 11111111.11111111.11111000.00000000
You use five bits from the original host bits for subnets. This allows you to have 32
subnets (25). After using the five bits for subnetting, you are left with 11 bits for host
addresses. This allows each subnet so have 2048 host addresses (211), 2046 of which
could be assigned to devices.
Note: In the past, there were limitations to the use of a subnet 0 (all subnet bits are
set to zero) and all ones subnet (all subnet bits set to one). Some devices would not
allow the use of these subnets. Cisco Systems devices allow the use of these subnets
when the ip subnet zero command is configured.
101
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
In lab activity:
Exercise 1
Now that you have an understanding of subnetting, put this knowledge to use. In this
example, you are given two address / mask combinations, written with the
prefix/length notation, which have been assigned to two devices. Your task is to
determine if these devices are on the same subnet or different subnets. You can use
the address and mask of each device in order to determine to which subnet each
address belongs.
DeviceA: 172.16.17.30/20
DeviceB: 172.16.28.15/20
255.255.240.0 - 11111111.11111111.11110000.00000000
-----------------| sub|------------
Looking at the address bits that have a corresponding mask bit set to one, and
setting all the other address bits to zero (this is equivalent to performing a logical
"AND" between the mask and address), shows you to which subnet this address
belongs. In this case, DeviceA belongs to subnet 172.16.16.0.
255.255.240.0 - 11111111.11111111.11110000.00000000
-----------------| sub|------------
From these determinations, DeviceA and DeviceB have addresses that are part of the
same subnet.
Exercise 2
Given the Class C network of 204.15.5.0/24, subnet the network in order to create the
network in Figure 3 with the host requirements shown.
102
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Looking at the network shown in Figure 3, you can see that you are required
to create five subnets. The largest subnet must support 28 host addresses. Is this
possible with a Class C network? and if so, then how?
You can start by looking at the subnet requirement. In order to create the five
needed subnets you would need to use three bits from the Class C host bits. Two bits
would only allow you four subnets (22).Since you need three subnet bits, that leaves
you with five bits for the host portion of the address.
How many hosts does this support? 25 = 32 (30 usable). This meets the
requirement. Therefore you have determined that it is possible to create this network
with a Class C network. An example of how you might assign the sub networks is:
netA: 204.15.5.0/27 host address range 1 to 30
netB: 204.15.5.32/27 host address range 33 to 62
netC: 204.15.5.64/27 host address range 65 to 94
netD: 204.15.5.96/27 host address range 97 to 126
netE: 204.15.5.128/27 host address range 129 to 158
Configuration
Routers A and B are connected via serial interface.
Router A
hostname routera !
ip routing !
int e 0
ip address 172.16.50.1 255.255.255.0
!(subnet 50)
int e 1 ip address 172.16.55.1 255.255.255.0
!(subnet 55)
int s 0 ip address 172.16.60.1 255.255.255.0
!(subnet 60) int s 0
ip address 172.16.65.1 255.255.255.0 (subnet 65) !
S 0 connects to router B router rip
network 172.16.0.0
103
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Router B
hostname routerb!
ip routing!
int e 0
ip address 192.1.10.200 255.255.255.240 !(subnet 192)
int e 1
ip address 192.1.10.66 255.255.255.240!
(subnet 64)
int s 0
ip address 172.16.65.2 (same subnet as router A's s 0)
!Int s 0 connects to router A router rip
network 192.1.10.0
network 172.16.0.0
104
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Post lab activity:
Calculations:
Lab 2 Activity 4: *[Optional Lab]: Transfer Data Between Two Laptops using
Wi-Fi
Pre-Requisite:
COMPUTER 1:
STEP1:
105
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Step 2:
106
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
STEP4:
Now open Windows Defender Firewall
STEP5:
a.) Initially we can see that the Windows Defender Firewall has been connected, now
turn off the Windows Defender Firewall.
b.) Select the Turn Windows Defender Firewall on or off option.
107
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
STEP6:
Initially we can observe in this manner
108
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
STEP7:
Now go to previous tab and select the Change advanced sharing settings
STEP8:
Here we can find the three different network profiles which are –
1.Private (current profile)
2.Guest or Public
3.All Networks.
109
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Now make the changes as per the below pictures and save the changes made in the
network profiles.
1.Private (current profile)
2.Guest or Public
3.All Networks.
STEP9:
Now open desktop and create a folder which can be remembered.
Right click on the created folder and open the properties.
110
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
111
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
After opening the properties, we can find a popup window as shown above
Now open the sharing tab
112
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Now click on the share option and
a) now click the down arrow, Select the everyone option.
b) Click on the add option
c) After clicking the add option we can observe popup window as above now make
a modification in the permission level as Read to Read/Write for everyone in the
column of name.
d) Now click on the share option, then it will display the confirmation window,
make it complete by clicking on the done option.
Now save the files in the created folder, this data can be shared using the WIFI.
NOTE:
COMPUTER 2:
Follow the same process from STEP1 to STEP7
STEP8:
Open file manager
Now open the network drive in the Quick Access Panel.
113
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Now we can find the systems which were connected to the same network. (If not
refresh the window).
114
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
After finding the computer1 username click on it.
Click on the folder having the name of your computer. (This may be varied
accordingly)
115
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
In the desktop folder we find the folder saved in the computer1 as share (name of
the folder).
Now the open the folder here we can find the data which can be transfer.
NOTE:
After completion of data transfer turn on the Windows Defender Firewall.
Calculations:
116
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Viva questions:
1. What is STP?
Ans: STP stands for Systematic Transfer Plan. STP is an automated way of moving
(transferring) money from one mutual fund to another. This plan is chosen
when one wants to invest a lump sum amount but wants to avoid the
marketing-timing risk. The most common and sensical way of doing.
4.Which of the following RSTP port states have the same name as a similar port
state in traditional STP?
Ans: Forwarding & Learning RSTP uses port states of Forwarding, Learning, and
Discarding, with Forwarding and Learning States performing the same basic
functions as the STP port states with the same name.
117
Lab 2 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
KLEF
Department of ECE, A.Y 2019-20, Semester - II
Data networks and Protocols Lab Internal Examination RUBRIC
Total Marks
30
118
Lab 3 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Wireless Router Integrated to IoT Applications
Aim /Objective:
Pre-requisite: (a, b, c)
Home Automation Basics – Beginners Guide
Although not many people can see the need for having their smart fridge connected
to the Internet, most people will find the ability to remotely control lights, security
cameras and other home appliances very useful. If you are thinking about adding
smart devices to your home then this guide to smart homes and home automation will
give you a good basic understanding of how smart devices are connected and how
they are controlled.
Monitoring
The ability to view status of systems i.e
What is the temperature?
Is the door locked?
Is The Light on or off
Control
The ability to change the state of a systems i.e
Turn up the heating.
Lock the Door
Turning the light on or off
119
Lab 3 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Automation
The ability to change the state of a system automatically in response to an event. i.e.
Turn on the heating if the outside temperature falls below a certain temperature.
Turn the lights off when no one is a home.
Currently most smart home systems are at the control level.
All homes should be able to be controlled locally from within the home. This doesn’t
mean that they should have manual switches, but that they should be controllable
across a local network. They should also IMO be controllable and fully
functional without an Internet connection. In other words if you loose the Internet
connection you should still be able to turn your lights on and off. Unfortunately not
all systems will operate without an Internet connection. This article is worth reading.
As a General rule of thumb Zwave and Zigbee networks and devices will operate
without an Internet connection. Wi-Fi devices will generally require an Internet
connection. If the device is controllable directly using a smart phone then it requires
an Internet connection. This reddit discussion is worth reading.
120
Lab 3 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Therefore Wi-Fi wasn’t considered a suitable protocol for use in these
devices, hence the development and use of Zigbee (Philips
Hue) and Zwave wireless standards, and other proprietary protocols in home
automation products.
Devices using ZigBee and Zwave form their own network independent of the
existing home Wi-Fi network ,but can be connected to the existing Wi-fi Network
using a suitable hub or gateway. Thread is a newer standard sponsored by Google
and uses IP networking ( zwave and Zigbee don’t) but uses 6lowpan and not Wi-Fi.
See ZWave Basics and Zigbee Basics
End Devices
There are several different types of end device:
Devices that work using a remote control like a TV and cannot be connected to a
home network.
Devices that use Wi-FI and TCP or UDP over IP as the networking protocol.
These connect directly to the existing home Wi-Fi network and are usually controlled
via an App on a smart phone. They can also be controlled via a hub like Amazon
Alexa. Generally require an Internet connection to operate.
121
Lab 3 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Devices that that use Zwave or Zigbee will require a hub to connect to the home
network and the Internet. Generally operate without an Internet connection.
If your end device supports Wi-Fi then it can connect directly to you existing
home Wi-Fi network, if it uses Zigbee,Thread or Zwave or other protocols then it
will require a hub of some sorts (diagram above).
However hubs can perform other task besides interconnecting products using
different protocols. They can also provide Gateway functions e.g. converting your
sensor data to MQTT. Smart hubs will generally provide a User Interface that
allows you to manage the individual devices, and to set up automation rules. This can
be via an App on a smart phone or tablet or web browser. TCP/IP Hubs can be
located on the Home network or on the Internet. Amazon Alexa is an example of
an Internet based hub that is becoming very popular.
Because of the popularity of smart phones, most smart home devices and
systems can be controlled using an App on a smart phone or tablet. However devices
from different manufactures will have a different App, and going back and forth
between Apps is not very convenient. Below is a screen shot from my Tablet
showing the Apps to control several Wi-Fi smart devices from different
manufacturers.
Not only is it very inconvenient to keep switching between Apps, the Apps can’t talk
to each other, and you also need to install them on all devices that you use to control
122
Lab 3 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
these devices. However most of these devices can also be controlled by a hub like the
Samsung Smart things, Amazon Alexa or an home automation system like home
assistant. Generally when you have several smart devices, especially when they are
from different vendors then using some form of Hub/automation system to combine
them is the best option. See hubs,Gateways and Home automation Systems. Voice
control using devices like Amazon Alexa are becoming more popular, and are much
easier to use.. Almost all devices being introduced today are being designed to work
with Alexa and Google Home.
IoT Applications
1. To control this smart object and sensors we use Home Gateway , since it provide
programming environment for controlling smart object connected to it and provide
controlling mechanisms by registering smart device to Home Gateway
respectively .
2. Select the Network Devices>>Wireless devices>>take the Home Gateway in to
the work space.
3. Now we Design room with a window, ceiling fan and light.
4. Select the window, ceiling fan and light from Home devices.
5. To connect those devices to Home Gateway we need wireless connection.
6. Click on the device>> go to advance mode>>I/O cong>>Network adapter>>PT-
IOE-NM-1W.
7. Now we can see that devices wirelessly connected.
123
Lab 3 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
1. Next access the home gateway, we should use IOE monitor app in smart device.
2. Give the LAN IP address to the IOE IP address, then you can login.
124
Lab 3 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
3. After that you can see the devices connected and having the options turn ON and
OFF.
Sample calculations:
Steps to design a Topology to Control the IOT Garage Door and Home Door
1. Take a switch and connect it to server, Garage Door and Home Door with a
Ethernet cable.
3. Now turn server in to registration server to do that go to the services >> IoT>>
then click ON to the Register server.
Then next go then Server Desktop>>IoT monitor>>Login.
125
Lab 3 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
5. Click on connect.
Output :
126
Lab 3 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
127
Lab 3 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
128
Lab 3 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Sample calculations:
129
Lab 3 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Step-2: Now click on server>>Desktop>>give IP address.
Step-3: devices>>configuration>>Fast Ethernet >>give the IP address.
Step-4: Now turn server in to registration server to do that go to the services >>
IoT>> then click ON to the Register server.
Step-5:Then next go tthen Server Desktop>>IoT monitor>>Login.
Step-6:Again click on the devices >>configuration>>select remote server
option>>give server address, username, password.
Click on connect.
130
Lab 3 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
131
Lab 3 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Sample calculations:
Viva questions
132
Lab 3 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
2. Which layer of IoT architecture serves as the platform that it is responsible for
connecting the smart objects in the IoT environment to transmit the data generated by
the devices?
Ans: Network layer
4. What protocols can be modelled for application layer in packet tracer 7.0?
Ans: FTP, SMTP, POP3, HTTP, TFTP, Telnet, SSH, DNS, DHCP, NTP, SNMP
etc….
5. List the basic components required for implementation of smart home using cisco
packet tracer?
Ans: Router ,modem, home gateway, lamp, fan and different types of sensors….
6.What are the two operating modes available in cisco packet tracer?
Ans:Real-time mode and simulation mode
7.What are the servers available in cisco packet tracer?
Ans: DHCP, DNS, HTTP Servers
9.What protocols can be modelled for transport layer in packet tracer 7.0?
Ans:TCP and UDP, TCP Nagle Algorithm & IP Fragmentation, RTP
10. List out the basic components used in simulation of garbage door and home door
.Ans: Server, pc, switch, garbage door ,home door, local door control
133
Lab 4 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
KLEF
Department of ECE, A.Y 2019-20, Semester - II
Data networks and Protocols Lab Internal Examination RUBRIC
Total Marks
30
134
Lab 4 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Verification of Reference and Standard Protocols using Packet Tracer
a) Design a Topology consists of three routers, switches, hosts configure the basic
single area OSPFv2 and then verifying connectivity between host to host, trace route,
ping the information
b) To study ARP and RARP protocols using Simulation Tools
c) *[Optional Lab]: To explore Inter‐Autonomous System Routing. To explore the
routers, autonomous systems and BGP peers in the lab. Observing IBGP and EBGP
on different routers.
Topology:
Addressing Table
135
Lab 4 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
S0/0/1 (DCE) 192.168.23.1 255.255.255.252 N/A
Objectives
Part 1: Build the Network and Configure Basic Device Settings
Part 2: Configure and Verify OSPF Routing
Part 3: Change Router ID Assignments
Part 4: Configure OSPF Passive Interfaces
Part 5: Change OSPF Metrics
Background / Scenario
Open Shortest Path First (OSPF) is a link-state routing protocol for IP networks.
OSPFv2 is defined for IPv4 networks, and OSPFv3 is defined for IPv6 networks. OSPF
detects changes in the topology, such as link failures, and converges on a new loop-free
routing structure very quickly. It computes each route using Dijkstra’s algorithm, a
shortest path first algorithm.
In this lab, you will configure the network topology with OSPFv2 routing,
change the router ID assignments, configure passive interfaces, adjust OSPF metrics,
and
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated
Services Routers (ISRs) with Cisco IOS Release 15.2(4)M3 (universalk9 image). Other
routers and Cisco IOS versions can be used.
Depending on the model and Cisco IOS version, the commands available and
output produced might vary from what is shown in the labs. Refer to the Router
Interface Summary Table at the end of this lab for the correct interface identifiers.
Note: Make sure that the routers have been erased and have no start up
configurations. If you are unsure, contact your instructor.
136
Lab 4 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Required Resources
3 Routers (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or
comparable)
3 PCs (Windows 7, Vista, or XP with terminal emulation program, such as
TeraTerm)
Console cables to configure the Cisco IOS devices via the console ports
Ethernet and serial cables as shown in the topology
In Part 1, you set up the network topology and configure basic settings on the PC hosts
and routers.
The routers should be able to ping one another, and each PC should be able to
ping its default gateway. The PCs are unable to ping other PCs until OSPF routing is
configured. Verify and troubleshoot if necessary.
In Part 2, you will configure OSPFv2 routing on all routers in the network and
then verify that routing tables are updated correctly. After OSPF has been verified, you
will configure OSPF authentication on the links for added security.
137
Lab 4 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Step 1: Configure OSPF onR1.
a. Use the router ospf command in global configuration mode to enable OSPF onR1.
R1(config)# router ospf 1
Note: The OSPF process id is kept locally and has no meaning to other routers on
the network.
b. Configure the network statements for the networks on R1. Use an area ID
of0.
b. Issue the show ip route command to verify that all networks display in the routing
table on all routers.
What command would you use to only see the OSPF routes in the routing table?
139
Lab 4 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
R1# show ip protocols
*** IP Routing is NSF aware ***
a. For a more detailed list of every OSPF-enabled interface, issue the show ipospf
interfacecommand.
0 64 no no Base
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
oob-resync timeout 40
Hello due in 00:00:01
Supports Link-local Signaling (LLS)
Cisco NSF helper support enabled
141
Lab 4 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
IETF NSF helper support enabled
Index 3/3, flood queue length 0 Next 0x0(0)/0x0(0)
Last flood scan length is 1, maximum is 1
Last flood scan time is 0 msec, maximum is 0 msec Neighbor Count is 1, Adjacent
neighbor count is 1
Adjacent with neighbor 192.168.23.2 Suppress hello for 0 neighbor(s)
Serial0/0/0 is up, line protocol is up
Internet Address 192.168.12.1/30, Area 0, Attached via Network Statement
Process ID 1, Router ID 192.168.13.1, Network Type POINT_TO_POINT, Cost:64
Topology-MTID Cost Disabled Shutdown TopologyName
Supports Link-local Signaling (LLS) Cisco NSF helper support enabled IETF NSF
helper support enabled Index 2/2, flood queue length 0
Next0x0(0)/0x0(0)
0 1 no no Base
142
Lab 4 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
oob-resync timeout 40 Hello due in 00:00:01
Supports Link-local Signaling (LLS) Cisco NSF helper support enabled IETF NSF
helper support enabled Index 1/1, flood queue length 0 Next0x0(0)/0x0(0)
143
Lab 4 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
c. Save the running configuration to the startup configuration on all threerouters.
d. You must reload the routers in order to reset the router ID to the loopback address.
Issue thereload command on all three routers. Press Enter to confirm the reload.
e. After the router completes the reload process, issue the show ip protocols command
to view the new router ID.
R1#show ip protocols
*** IP Routing is NSF aware ***
Routing Protocol is "ospf 1"
Outgoing update filter list for all interfaces is not set Incoming update filter list for all
interfaces is not set Router ID 1.1.1.1
Number of areas in this router is 1. 1 normal 0 stub 0 nssa Maximum path: 4 Routing for
Networks:
145
Lab 4 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Distance: (default is 110)
e. Issue the show ipospf neighbor command on R1 to verify that new router ID for R2
and R3 islisted.
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit5 oob-resync
timeout40
Next0x0(0)/0x0(0)
148
Lab 4 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
*Apr 3 00:03:00.979: %OSPF-5-ADJCHG: Process 1, Nbr 33.33.33.33 on
Serial0/0/1fromFULL to DOWN, Neighbor Down: Interface down ordetached
b. Re-issue the show ipospf neighbor command on R1. After the dead
timer expires, R2 will no longerbe listed as an OSPFneighbor.
R1# show ipospf neighbor
Neighbor ID Pri State Dead Address Interface
Time
3.33.33.33 0 FULL/ 00:00:34 192.168.13.2 Serial0/0/1
-
c. Issue the show ipospf interface S0/0/0 command on R2 to view the OSPF status of
interfaceS0/0/0.
0 64 no no Base
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
oob-resync timeout 40
No Hellos (Passive interface) Supports Link-local Signaling (LLS) Cisco NSF helper
support enabled IETF NSF helper support enabled Index 2/2, flood queue length 0
Next0x0(0)/0x0(0)
149
Lab 4 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
e. On R2, issue the no passive-interface command so the router will send and receive
OSPF routing updates. After entering this command, you will see an informational
message that a neighboradjacency has been established with R1.
R2(config)# router ospf 1
R2(config-router)#no passive-interface s0/0/0
R2(config-router)#
*Apr 3 00:18:03.463: %OSPF-5-ADJCHG: Process 1, Nbr 11.11.11.11 on
Serial0/0/0fromLOADING to FULL, LoadingDone
f. Re-issue the show ip route and show ipospf neighbor commands on R1 and R3,
and look for aroute to the 192.168.2.0/24network.
What interface is R3 using to route to the 192.168.2.0/24 network?
What is the accumulated cost metric for the 192.168.2.0/24 network on R3? Does R2
show up as an OSPF neighbor on R1?
150
Lab 4 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
100Mb/s or higher have a cost of 1. This results in Fast Ethernet, Gigabit Ethernet, and
10G Ethernet interfaces all having the same cost. Therefore, the reference-bandwidth
must be changed to a higher value to accommodate networks with links faster that
100Mb/s.
a. Issue the show interface command on R1 to view the default bandwidth setting for the
G0/0interface.
R1# show interface g0/0
GigabitEthernet0/0 is up, line protocol is up
Hardware is CN Gigabit Ethernet, address is c471.fe45.7520 (bia c471.fe45.7520)
MTU 1500 bytes, BW 1000000 Kbit/sec, DLY 100 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive set (10 sec)
Full Duplex, 100Mbps, media type is RJ45
output flow-control is unsupported, input flow-control is unsupported
ARP type: ARPA, ARP Timeout 04:00:00
Last input never, output 00:17:31, output hang never
Last clearing of "show interface" counters never
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops:0
Queueing strategy: fifo
Output queue: 0/40 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
0 packets input, 0 bytes, 0 no buffer
Received 0 broadcasts (0 IP multicasts)
0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
0 watchdog, 0 multicast, 0 pause input
279 packets output, 89865 bytes, 0 underruns
0 output errors, 0 collisions, 1 interface resets
0 unknown protocol drops
0 babbles, 0 late collision, 0deferred
1 lost carrier, 0 no carrier, 0 pauseoutput
0 output buffer failures, 0 output buffers swapped out
Note: The bandwidth setting on G0/0 may differ from what is shown above if
the PC host interface can only support Fast Ethernet speed. If the PC host
interface is not capable of supporting gigabit speed, then the bandwidth will
most likely be displayed as 100000 Kbit/sec.
b. Issue the show ip route ospfcommand on R1 to determine the route to the
192.168.3.0/24network.
R1# show ip route ospf
151
Lab 4 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external
type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, *
- candidate default, U - per-user static route o - ODR, P - periodic downloaded static
route, H - NHRP, l –LISP + - replicated route, % - next hop override Gateway of last
resort is not set
O 192.168.2.0/24 [110/65] via 192.168.12.2, 00:01:08, Serial0/0/0 O
192.168.3.0/24 [110/65] via 192.168.13.2, 00:00:57,Serial0/0/1
192.168.23.0/30 is subnetted, 1 subnets
O 192.168.23.0 [110/128] via 192.168.13.2, 00:00:57,Serial0/0/1
[110/128] via 192.168.12.2, 00:01:08,Serial0/0/0
Note: The accumulated cost to the 192.168.3.0/24 network from R1 is 65.
c. Issue the show ipospf interface command on R3 to determine the routing cost
forG0/0.
0 1 no no Base
Last flood scan time is 0 msec, maximum is 0 msec Neighbor Count is 0, Adjacent
neighbor count is 0 Suppress hello for 0 neighbor(s)
d.Issue the show ipospf interface s0/0/1 command on R1 to view the routing cost
forS0/0/1.
152
Lab 4 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
R1# show ipospf interface s0/0/1
Serial0/0/1 is up, line protocol is up
Internet Address 192.168.13.1/30, Area 0, Attached via NetworkStatement Process ID 1,
Router ID 1.1.1.1, Network Type POINT_TO_POINT, Cost: 64
0 64 no no Base
The sum of the costs of these two interfaces is the accumulated cost for the route to
the 192.168.3.0/24 network on R3 (1 + 64 = 65), as can be seen in the output from
the show ip route command.
e. Issue the auto-cost reference-bandwidth 10000 command on R1 to change the
default reference bandwidth setting. With this setting, 10Gb/s interfaces will have a
cost of 1, 1 Gb/s interfaces will havea cost of 10, and 100Mb/s interfaces will have a
cost of100.
R1(config)# router ospf 1
R1(config-router)#auto-cost reference-bandwidth 10000
% OSPF: Reference bandwidth is changed.
Please ensure reference bandwidth is consistent across all routers.
f. Issue the auto-cost reference-bandwidth 10000 command on routers R2 andR3.
g. Re-issue the show ipospf interface command to view the new cost of G0/0 on R3,
and S0/0/1 onR1.
0 10 no no Base
Note: If the device connected to the G0/0 interface does not support Gigabit Ethernet
speed, the cost will be different than the output display. For example, the cost will be
100 for Fast Ethernet speed (100Mb/s).
R1# show ipospf interface s0/0/1
Serial0/0/1 is up, line protocol is up
Internet Address 192.168.13.1/30, Area 0, Attached via Network Statement Process ID 1,
Router ID 1.1.1.1, Network Type POINT_TO_POINT, Cost: 6476
Topology-MTID Cost Disabled Shutdown Topology Name
0 6476 no no Base
Transmit Delay is 1 sec, StatePOINT_TO_POINT
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
oob-resync timeout 40
Hello due in 00:00:05
Supports Link-local Signaling (LLS)
Cisco NSF helper support enabled
IETF NSF helper support enabled
Index 3/3, flood queue length 0 Next 0x0(0)/0x0(0)
Last flood scan length is 1, maximum is 1
Last flood scan time is 0 msec, maximum is 0 msec Neighbor Count is 1, Adjacent
neighbor count is 1
Adjacent with neighbor 192.168.23.2 Suppress hello for 0neighbor(s)
h. Re-issue the show ip route ospfcommand to view the new accumulated cost for
the192.168.3.0/24 route (10 + 6476 =6486).
154
Lab 4 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Note: If the device connected to the G0/0 interface does not support Gigabit Ethernet
speed, the total cost will be different than the output display. For example, the
accumulated cost will be 6576 if G0/0is operating at Fast Ethernet speed(100Mb/s).
R1# show ip route ospf
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B – BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external
type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l -LISP
+ - replicated route, % - next hop override
Note: Changing the default reference-bandwidth on the routers from 100 to 10,000 in
effect changed the accumulated costs of all routes by a factor of 100, but the cost of
each interface link and route is now more accurately reflected.
i. To reset the reference-bandwidth back to its default value, issue the auto-cost
reference-bandwidth 100 command on all three routers.
R1(config)# router ospf 1
R1(config-router)#auto-cost reference-bandwidth 100
% OSPF: Reference bandwidth is changed.
Please ensure reference bandwidth is consistent across all routers.
Why would you want to change the OSPF default reference-bandwidth?
Step 2: Change the bandwidth for aninterface.
On most serial links, the bandwidth metric will default to 1544 Kbits (that of a T1). If
this is not the actual speed of the serial link, the bandwidth setting will need to be
changed to match the actual speed to allow the route cost to be calculated correctly in
OSPF. Use the bandwidth command to adjust the bandwidth setting on an interface
Note: A common misconception is to assume that the bandwidth command will change
the physical bandwidth, or speed, of the link. The command modifies the bandwidth
155
Lab 4 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
metric used by OSPF to calculate routing costs, and does not modify the actual
bandwidth (speed) of the link.
A. Issue the show interface s0/0/0 command on R1 to view the current bandwidth
setting on S0/0/0.Even though the clock rate, link speed on this interface was set to
128Kb/s, the bandwidth is still showing 1544Kb/s.
R1# show interface s0/0/0
Serial0/0/0 is up, line protocol isup Hardware is WIC MBRD Serial Internet address
is192.168.12.1/30
MTU 1500 bytes, BW 1544 Kbit/sec, DLY 20000 usec, reliability 255/255, txload
1/255, rxload 1/255
Encapsulation HDLC, loopback not set Keepalive set (10 sec)
<Output omitted>
c. Issue the show ip route ospfcommand on R1 to view the accumulated cost for the
route to network 192.168.23.0/24 using S0/0/0. Note that there are two equal-cost
(128) routes to the192.168.23.0/24 network, one via S0/0/0 and one viaS0/0/1.
R1# show ip route ospf
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B – BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external
type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l -LISP
+ - replicated route, % - next hop override Gateway of last resort is not set
O 192.168.2.0/24 [110/65] via 192.168.12.2, 00:00:26,Serial0/0/0 O
192.168.3.0/24 [110/65] via 192.168.13.2, 00:00:26,Serial0/0/1
192.168.23.0/30 is subnetted, 1 subnets
O 192.168.23.0 [110/128] via 192.168.13.2, 00:00:26,Serial0/0/1
[110/128] via 192.168.12.2, 00:00:26,Serial0/0/0
d. Issue the bandwidth 128 command to set the bandwidth on S0/0/0 to128Kb/s.
R1(config)# interfaces0/0/0
R1(config-if)#bandwidth128
e. Re-issue the show ip route ospfcommand. The routing table no longer displays the
route to the 192.168.23.0/24 network over the S0/0/0 interface. This is because the
best route, the one withthe lowest cost, is now viaS0/0/1.
R1# show ip route ospf
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B – BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external
type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level
ia - IS-IS inter area, * - candidate default, U - per-user static route
156
Lab 4 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
+ - replicated route, % - next hop override Gateway of last resort is not set
O 192.168.2.0/24 [110/129] via 192.168.12.2, 00:01:47, Serial0/0/0 O
192.168.3.0/24 [110/65] via 192.168.13.2, 00:04:51,Serial0/0/1
192.168.23.0/30 is subnetted, 1 subnets
O 192.168.23.0 [110/128] via 192.168.13.2, 00:04:51,Serial0/0/1
f. Issue the show ipospf interface brief command. The cost for S0/0/0 has changed
from 64 to 781which is an accurate cost representation of the linkspeed.
R1# show ipospf interface brief
g. Change the bandwidth for interface S0/0/1 to the same setting as S0/0/0 onR1.
h. Re-issue the show ip route ospfcommand to view the accumulated cost of both
routes to the 192.168.23.0/24 network. Note that there are again two equal-cost (845)
routes to the192.168.23.0/24 network, one via S0/0/0 and one viaS0/0/1.
R1# show ip route ospf
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B – BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external
type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l -LISP
+ - replicated route, % - next hop override Gateway of last resort is not set
O 192.168.2.0/24 [110/782] via 192.168.12.2, 00:00:09, Serial0/0/0 O
192.168.3.0/24 [110/782] via 192.168.13.2, 00:00:09,Serial0/0/1
192.168.23.0/30 is subnetted, 1 subnets
O 192.168.23.0 [110/845] via 192.168.13.2, 00:00:09,Serial0/0/1
[110/845] via 192.168.12.2, 00:00:09,Serial0/0/0
Explain how the costs to the 192.168.3.0/24 and 192.168.23.0/30 networks from R1
were calculated.
i. Issue the show ip route ospfcommand on R3. The accumulated cost of the
192.168.1.0/24 is still showing as 65. Unlike the clock rate command, the
bandwidth command needs to be applied oneach side of a seriallink.
R3# show ip route ospf
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
157
Lab 4 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA
external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 -
OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l -LISP
+ - replicated route, % - next hop override Gateway of last resort is not set
O 192.168.1.0/24 [110/65] via 192.168.13.1, 00:30:58, Serial0/0/0
O 192.168.2.0/24 [110/65] via 192.168.23.1, 00:30:58,Serial0/0/1
192.168.12.0/30 is subnetted, 1 subnets
O 192.168.12.0 [110/128] via 192.168.23.1, 00:30:58,Serial0/0/1
[110/128] via 192.168.13.1, 00:30:58,Serial0/0/0
158
Lab 4 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
R1(config)# interface s0/0/1
R1(config-if)#ipospf cost 1565
c. Re-issue the show ip route ospfcommand on R1 to display the effect this change has
made on the routing table. All OSPF routes for R1 are now being routed throughR2.
159
Lab 4 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Topology
160
Lab 4 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Note: To find out how the router is configured, look at the interfaces to identify
the type of router and how many interfaces the router has. There is no way to effectively
list all the combinations of configurations for each router class. This table includes
identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may
contain one. An example of this might be an ISDN BRI interface. The string in
parenthesis is the legal abbreviation that can be used in Cisco IOS commands to
represent the interface.
Addressing Table
Switch
Device Interface MAC Address
Interface
Gg0/0 0001.6458.2501 G0/1
Router0
S0/0/0 N/A N/A
G0/0 00E0.F7B1.8901 G0/1
Router1
S0/0/0 N/A N/A
10.10.10.2 Wireless 0060.2F84.4AB6 F0/2
10.10.10.3 Wireless 0060.4706.572B F0/2
172.16.31.2 F0 000C.85CC.1DA7 F0/1
172.16.31.3 F0 0060.7036.2849 F0/2
172.16.31.4 G0 0002.1640.8D75 F0/3
Objectives
Background
This activity is optimized for viewing PDUs. The devices are already configured. You
will gather PDU information in simulation mode and answer a series of questions about
the data you collect.
161
Lab 4 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Packet Tracer - Examine the ARP Table
h. Click Capture/Forward until the PDU returns to 172.16.31.2. How many copies of
the PDU did the switch make during the ARP reply? 1
Step 1: Generate additional traffic to populate the switch MAC address table.
162
Lab 4 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
a.From 172.16.31.2, enter the ping 172.16.31.4 command.
b.Click 10.10.10.2 and open the Command Prompt.
c.Enter the ping 10.10.10.3 command. How many replies were sent and
received?None
Step 2: Examine the MAC address table on the switches.
a. Click Switch1and then the CLI tab. Enter the show mac-address-table
command. Do the entries correspond to those in the table above?Yes
b. Click Switch0, then the CLI tab. Enter the show mac-address-table command.
Do the entries correspond to those in the table above?Yes
c. Why are two MAC addresses associated with one port?They are plugged into the
same port just on a different router
163
Lab 4 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Then after we will be seeing there is only clock for Router2 we have to set the clock
limit 64,000.
After that we have to save it.
Repeat the same step for Router3 also.
While setting the clock rate we have to fill the gateway Address is the IP address of
the Router.
Then on the port status.
Now we configured all the IP addresses and set the clock frequencies
For confermation we will be placing the message on PC1 and Router3 it is successful
But from PC1 to PC0 it will be failed
So,now we have to configure those connections
For that we have to type commands on Router>CLI>
Then save it and close
We have to repeate the same process to Router1
Then go config and hit save then the process is done
Now you can pass the message from one to another PC and one to another Router
It is shown in the below figure
164
Lab 4 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
165
Lab 4 – Activity 1-6 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
166
Lab 4 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
KLEF
Department of ECE, A.Y 2019-20, Semester - II
Data networks and Protocols Lab Internal Examination RUBRIC
Wrong Correct
Improper
Procedure Partially Correct (4-7) Procedure
Experimentatio Procedure (3)
2 10 M (0) (8-10)
n Execution
Total Marks
30
167
Lab 5 – Activity 1-2 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Lab 5 Activity 1 : Testing Network Latency with Ping and Trace route.
Topology :
Fig 5.1 Topology for testing the latency with ping and trace route.
Objectives:
Background/ Scenario :
The purpose of this lab is to measure and evaluate network latency over time, and during
different periods of the day to capture a representative sample of typical network activity.
This will be accomplished by analyzing the return delay form a distant computer with
ping command. Return delay times, measured in milliseconds, will be summarized by
computing the average latency (mean) and the range (maximum and minimum) of the
delay times.
Required Resources
1 PC (Windows 7 or 8 with Internet access)
168
Lab 5 – Activity 1-2 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Part 1: Ping to Document Network Latency
In Part 1, you will examine network latency of several websites in different parts of the
globe. This process can be used in an enterprise production network to create a
performance baseline.
Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS]
169
Lab 5 – Activity 1-2 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
[-r count] [-s count] [[-j host-list] | [-k host-list]]
[-w timeout] [-R] [-S srcaddr] [-4] [-6] target_name
Options:
-t Ping the specified host until stopped.
To see statistics and continue - type Control-Break;
To stop - type Control-C.
-a Resolve addresses to hostnames.
-n count Number of echo requests to send.
-l size Send buffer size.
-f Set Don't Fragment flag in packet (IPv4-only).
-i TTL Time To Live.
-v TOS Type Of Service (IPv4-only. This setting has been deprecated
<output omitted>
b. Using the pingcommand with the countoption, you can send 25echo requests to
the destination as illustrated below. Furthermore, it will create a text file with filename
of arin.txt in the current directory. This text file will contain the results of the echo
requests.
C:\Users\User1>ping –n 25 www.arin.net> arin.txt
Note: The terminal remains blank until the command has finished, because the output
has been redirected to a text file, arin.txt, in this example. The >symbol is used to
redirect the screen output to the file and overwrite the file if it already exists. If
appending more results to the file is desired, replace > with >> in the command.
c. Repeat the ping command for the other websites.
C:\Users\User1>ping –n 25 www.afrinic.net> afrinic.txt
C:\Users\User1>ping –n 25 www.apnic.net> apnic.txt
C:\Users\User1>ping –n 25 www.lacnic.net> lacnic.txt
Directory of C:\Users\User1
171
Lab 5 – Activity 1-2 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
____________________________________________________________________
________________
Step 1: Use the tracert command and record the output to text files.
Copy the following commands to create the traceroute files:
C:\Users\User1>tracertwww.arin.net> traceroute_arin.txt
C:\Users\User1>tracertwww.lacnic.net> traceroute_lacnic.txt
C:\Users\User1>tracertwww.afrinic.net> traceroute_afrinic.txt
C:\Users\User1>tracertwww.apnic.net> traceroute_apnic.txt
Note: If the websites are resolved to IPv6 addresses, the option -4 can be used to resolve
to IPv4 addresses if desired. The command becomes tracert -4 www.arin.net>
traceroute_arin.txt.
Trace complete.
In this example, it took less than 1 ms to receive a reply from the default gateway
(192.168.1.1). In hop count6, the round trip to 68.1.1.7 took an average of 71ms.For the
round trip to the final destination at www.arin.net took an average of 72 ms.
Between lines 5 and 6, there is more network delay as indicated by the round trip time
increase from an average of 11 ms to 71 ms
b. Perform the same analysis with the rest of the tracert results.
What can you conclude regarding the relationship between the roundtrip time and
geographical location?
_______________________________________________________________________
_______________________________________________________________________
Part 3: Traceroute
Although traceroute has different implementations depending on the platform, all
versions allow the user to adjust its behavior. In Windows this can be done providing
options and switches in the tracert command line.
a. Reverse name resolution (resolving an IP address to a domain name) can add a delay
to tracert results and yield inaccurate results. To ensure tracert won’t attempt to reverse
resolve hop IP addresses, add the –d option to the tracert command line:
C:\Users\User1>tracert –d www.arin.net > traceroute_d_arin.txt
C:\Users\User1>tracert –d www.lacnic.net > traceroute_d_lacnic.txt
C:\Users\User1>tracert –d www.afrinic.net > traceroute_d_afrinic.txt
C:\Users\User1>tracert –d www.apnic.net > traceroute_d_apnic.txt
b. Use the more command to access the content of these files:
C:\Users\User1>more traceroute_d_arin.txt
Trace complete.
What is different about the tracert output when the –d option was added?
_______________________________________________________________________
_____________
_______________________________________________________________________
_____________
Note:Windows tracert will present a list of available options and their descriptions
when issued without any options.
Note:Cisco IOS implementation of traceroutealso allows for fine tuning but it doesnot
rely on command line options. Cisco IOS extended traceroute presents a number of
simple questions to allow the administrator to provide values for the desired
parameters.
Reflection
1. The tracert and ping results can provide important network latency information.
What do you need to do if you want an accurate baseline picture regarding network
latency for your network?
_______________________________________________________________________
________________
2. How can you use the baseline information?
____________________________________
Pre-requisite
SCTP provides the means for each SCTP endpoint to provide its peer with a list
of transport addresses, such as address and UDP port combinations. This list is provided
during association startup and shows the transport addresses through which the endpoint
can be reached and from which messages originate. The SCTP association includes
transfer over all the possible source and destination combinations that might be
generated from the two endpoint lists (also known as multihoming).
Benefits of SCTP
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
Example: Enter your password if prompted.
Router> enable
Step 2 configure terminal Enters global configuration mode.
175
Lab 5 – Activity 1-2 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Command or Action Purpose
Example:
Router(config)# ip sctp
authenticate sack
Step 4 ip sctp asconf {authenticat (Optional) Configures SCTP to send
e check | auto } ASCONF chunks automatically in
Example: response to an IP address change on a
router, or to check that the endpoint
supports authentication before sending
Router(config)# ip sctp
the ASCONF chunk.
asconf auto
In lap activity :
176
Lab 5 – Activity 1-2 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
The following results are almost correct for both the sending and receiving. In
addition, these results are based on that the streams are the same weight like associations
or connections as well as the streams aren't able to make the CPU arrives to 100% of
utilization. The results as the following:
a) The arriving rate of SCTP is higher. So that the chunks of SCTP must be removed
where simultaneous processing of 2 streams initiate. Otherwise it causes serious
problem, and that is considered as fundamental shortcoming for the feature of
stream.
b) The structure of transmission control block (TCB) must be changed along with finer
granularity locking for relieving the problem which is caused by the resulting lock
contention. It limits severely the stream throughput. That problem of the
implementation is at the function of Sending of LK-SCTP which opens the socket at
time.
Message is also received by the IP-layer and locks the socket at the beginning of
the function. According to given streams shortcomings are created in the side of protocol
specification and in the side of implementation. Parameter Total CPI path length 2ndL
MPI CPU utilization Throughput Mb/sec TCP Send with 4 connection 10.68 8675
0.0769 79.2 1705 SCTP Send 4 association with 2 stream 10.2 23504 0.0876 198 1776
TCP Receive with 4 connection 8.92 7890 0.1204 69 1794 SCTP 4 association with 2
stream 12.4 15604 0.01024 129 1780
c) SCTP is less efficient in the single connection case though the SCTP as TCP are able
to execute and achieve almost the same throughput.
d) According to pervious point the structure of TCP and the handling for SCTP have
some deficiencies which were explained on the experiments as well.
f) The CPU utilization of SCTP with two streams is also about 52% and lowers than for
the 4 associations or 4 connections.
SCTP tunneling: Flow aggregation and burst transmission to save energy for
multiple TCP flows over a WLAN
177
Lab 5 – Activity 1-2 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Post lab :
Calculation :
178
Lab 5 – Activity 1-2 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Network Delay:
Packet Loss :
Throughput:
Viva questions
180
Lab 5 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
KLEF
Department of ECE, A.Y 2019-20, Semester - II
Data networks and Protocols Lab Internal Examination RUBRIC
Wrong Correct
Improper
Procedure Partially Correct (4-7) Procedure
Experimentatio Procedure (3)
2 10 M (0) (8-10)
n Execution
Total Marks
30
181
Lab 6 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
a) Configuring HTTP, Email (SMPT, POP3), FTP, DNS, DHCP, NTP, SSDP.
b) Configure Internet Storage Name Service & iSCSI Basics using wireshark.
c) *[Optional Lab]: Create an IPsec VPN tunnel using Network Simulator Software
Lab 6 Activity 1: Configuring HTTP, Email (SMPT, POP3), FTP, DNS, DHCP, NTP,
SSDP.
Procedure:
Take a switch from network devices
Take 3 PCs and one sever from end devices.
Connect them in work space
Open server and configure ip gateway and dns address
Go to services >http
Create a new file with .html and save it
182
Lab 6 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Now, go to DHCP service and on the DHCP and configure IP and GATEWAY.
Next go to DNS and keep the ”type” A Record and fill the name and Address and
click ADD
Then after change the type from A Record to CNAME then fill the name and address
and click ADD
183
Lab 6 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Then go to all PC’s IP configuration and on the DHCP to autofill the IP and Gateway
Address
Then go to the first PC and go to command prompt type ftp and IP Address you
configured for the server
Then fill your username and password, that you kept in the FTP server
At last type dir
184
Lab 6 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Addressing Table
Device Interface IP address Subnet Mask Default Gateway
R1 G0/1 192.168.1.1 255.255.255.0 N/A
R1 S0/0/0 192.168.2.1 255.255.255.0 N/A
R2 S0/0/0 192.168.1.1 255.255.255.0 N/A
S1 VLAN1 192.168.1.2 255.255.255.0 N/A
PC-A NIC 192.168.1.3 255.255.255.0 192.168.1.1
Objectives
Background / Scenario
Simple Network Management Protocol (SNMP) is a network management
protocol and an IETF standard which can be used to both monitor and control clients on
the network. SNMP can be used to get and set variables related to the status and
configuration of network hosts like routers and switches, as well as network client
computers. The SNMP manager can poll SNMP agents for data, or data can be
automatically sent to the SNMP manager by configuring traps on the SNMP agents. In
this lab, you will download, install, and configure SNMP management software on PC-
A. You will also configure a Cisco router and Cisco switch as SNMP agents. After
185
Lab 6 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
capturing SNMP notification messages from the SNMP agent, you will convert the
MIB/Object ID codes to learn the details of the messages using the Cisco SNMP Object
Navigator.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services
Routers (ISRs) with Cisco IOS Release 15.4(3) (universalk9 image). The switches used
are Cisco Catalyst 2960s with Cisco IOS Release 15.0(2) (lanbasek9 image). Other
routers, switches and Cisco IOS versions can be used. Depending on the model and
Cisco IOS version, the commands available and output produced might vary from what
is shown in the labs. Refer to the Router Interface Summary Table at the end of the lab
for the correct interface identifiers.
Note: Make sure that the routers and switches have been erased and have no startup
configurations. If you are unsure, contact your instructor.
Note: The snmp -server commands in this lab will cause the Cisco 2960 switch to
issue a warning message when saving the configuration file to NVRAM. To avoid this
warning message verify that the switch is using the lanbase-routing template. The
IOS template is controlled by the Switch Database Manager (SDM). When changing
the preferred template, the new template will be used after reboot even if the
configuration is not saved.
Required Resources
• 2 Routers (Cisco 1941 with Cisco IOS, Release 15.4(3) universal image or
comparable)
• 1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
• 1 PC (Windows with terminal emulation program, such as Tera Term, SNMP
manager, such as SNMP MIB Browser by Manage Engine, and Wireshark)
• Console cables to configure the Cisco IOS devices via the console ports
• Ethernet and serial cables as shown in the topology
• SNMP Management Software (SNMP MIB Browser by Manage Engine)
In Part 1, you will set up the network topology and configure the devices with basic
settings.
a. Download and install the SNMP MIB Browser by ManageEngine from the
following URL: https://www.manageengine.com/products/mibbrowser-free-
tool/download.html. You will be asked to provide an email address to download
the software.
1) If you receive an error message regarding the failure to load MIBs. Navigate to the
MibBrowser Free Tool folder:
32bit: C:\Program Files (x86)\ManageEngine\MibBrowser Free Tool
64bit: C:\Program Files\ManageEngine\MibBrowser Free Tool
2) Right-click the mibs folder, Properties, and select the Security tab. Click Edit.
Select Users. Check the Modify under Allow column. Click OK to change the
permission.
3) Repeat the previous step with the conf folder.
4) Launch the ManageEngine MibBrowser program again.
187
Lab 6 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
189
Lab 6 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Step 1: Configure a SNMPv3 agent on R1.
On R1, enter the following commands from the global configuration mode to configure
the router as an SNMP agent. In lines 1 – 3 below, a standard ACL named PERMIT-
ADMIN permits only the hosts of the network 192.168.1.0 /24 to access the SNMP
agent running on R1. Line 4 configures an SNMP view, SNMP-RO, and it includes the
iso tree from the MIB. In line 5, an SNMP group is configured with the name ADMIN,
is set to SNMPv3 with authentication and encryption required, and only allows access
limit to hosts permitted in the PERMIT-ADMIN ACL. Line 5 defines a user named
USER1 with the group ADMIN. Authentication is set to use SHA with the password
cisco12345 and encryption is set for AES 128 with cisco54321 as the configured
password
R1(config)# ip access-list standard PERMIT-ADMIN
R1(config-std-nacl)# permit 192.168.1.0 0.0.0.255
R1(config-std-nacl)# exit
R1(config)#
d. Click Start after you have verified the settings. The TrapList field displays
162:ciscolab.
e. To generate SNMP messages, configure and enable SVI on S1. Use the IP address
192.168.1.2 /24 for VLAN 1 and disable and enable the interface.
f. Enter the show snmp command to verify the SNMP messages were sent.
d.Enter the SNMPv3 settings that were configured on R1. Click OK to continue.
191
Lab 6 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
e. Click Edit > Find Node. Enter ipAddrTable in the Find What field and click Close.
Verify ipAddrTable is selected in the left panel and
.iso.org.dod.internet.mgmt.mib-2.ip.ipAddrTable is listed in the ObjectID field.
f. Click Operation > GET to get all the objects under the select MIB object,
ipAddrTable in this instance.
192
Lab 6 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
i. Click Edit for the Users Table. Click New and enter user information in Step 1. Click OK.
j. Click OK to accept the user information. Click OK again to exit the Wireshark Preferences
window.
193
Lab 6 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Reflection
1. What are some of the potential benefits of monitoring a network with SNMP?
2. Why is it preferable to solely use read-only access when working with SNMPv2?
194
Lab 6 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Serial
Router Ethernet Interface Serial
Model Ethernet Interface #1 Interface #2 #1 Interface #2
Serial 0/0/0 Serial 0/0/1
1800 Fast Ethernet 0/0 Fast Ethernet 0/1 (S0/0/0) (S0/0/1)
Gigabit Ethernet Serial 0/0/0 Serial 0/0/1
1900 Gigabit Ethernet 0/0 0/1 (S0/0/0) (S0/0/1)
Serial 0/1/0 Serial 0/1/1
2801 Fast Ethernet 0/0 Fast Ethernet 0/1 (S0/1/0) (S0/1/1)
Serial 0/0/0 Serial 0/0/1
2811 Fast Ethernet 0/0 Fast Ethernet 0/1 (S0/0/0) (S0/0/1)
Gigabit Ethernet Serial 0/0/0 Serial 0/0/1
2900 Gigabit Ethernet 0/0 0/1 (S0/0/0) (S0/0/1)
Note: To find out how the router is configured, look at the interfaces to identify the
type of router and how many interfaces the router has. There is no way to effectively
list all the combinations of configurations for each router class. This table includes
identifiers for the possible combinations of Ethernet and serial interfaces in the
device. The table does not include any other type of interface, even though a specific
router may contain one. An example of this might be an ISDN BRI interface. The
string in parenthesis is the legal abbreviation that can be used in Cisco IOS
commands to represent the interface.
Lab 6 Activity 3: *[Optional Lab]: Create an IPsec VPN tunnel using Network
Simulator Software
Pre-requisite:
Configuring a Site-to-Site IPsec VPN Tunnel
195
Lab 6 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
To configure a Site-to-Site VPN connection between two Barracuda NextGen X-
Series Firewalls, in which one unit (Location 1) has a dynamic Internet connection and
the peer unit (Location 2) has a static public IP address, create an IPsec tunnel on both
units. In this setup, Location 1 acts as the active peer. You will need to add an access
rule to allow VPN traffic. Because the WAN IP address of Location 1 is
chosen dynamically via DHCP, the remote gateway on Location 2 must use 0.0.0.0/0 so
that any incoming IP address is accepted. Using 0.0.0.0/0 as the remote gateway is
supported only for site-to-site tunnels in Aggressive mode. This setup does not require
third-party DNS services such as DynDNS.
Step 1. Enable VPN Listener on the Dynamic IP Address of the Active Peer
On the X-Series Firewall at Location 1, enable Use Dynamic IPs in the GLOBAL
SERVER SETTINGS of the VPN > Settings page for the VPN service to listen on all
IP addresses.
196
Lab 6 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Configure the X-Series Firewall at Location 1 with the dynamic WAN IP as the active
peer.
197
Lab 6 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
7.Specify the authentication settings:
o Authentication – Select Shared Passphrase.
o Passphrase – Enter the shared secret.
9. Click Add.
Configure the X-Series Firewall at Location 2, with the static WAN IP as the passive
peer. Use 0.0.0.0/0 as the IP address for the remote gateway to allow the Location 1
unit to use dynamic WAN IP addresses.
198
Lab 6 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Create PASS access rules on both Location 1 and Location 2 X-Series Firewalls to allow
traffic in and out of the VPN tunnel.
199
Lab 6 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
o Source – Select the VPN-Local-Networks network object.
Destination – Select the VPN-Remote-Networks network object.
1.At the top of the Add Access Rule window, click Add.
2.Use drag and drop to place the access rule above any other access rule matching this
traffic.
3. Click Save.
200
Lab 6 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Use ping to verify that network traffic is passing the VPN tunnel. Open the console of
your operating system and ping a host within the remote network. If no host is available,
you can ping the management IP address of the remote X-Series Firewall. Go to
the NETWORK > IP Configuration page and ensure that Services to Allow: Ping is
enabled for the management IP address of the remote firewall.
If network traffic is not passing the VPN tunnel, go to the BASIC > Recent
Connections page and ensure that network traffic is not blocked by any other access
rule.
In lab activity:
1. Starting configurations for R1, ISP, and R3. Paste to global config mode :
hostname R1
interface g0/1
ip address 192.168.1.1 255.255.255.0
no shut
interface g0/0
ip address 209.165.100.1 255.255.255.0
no shut
exit
ip route 0.0.0.0 0.0.0.0 209.165.100.2
hostname ISP
interface g0/1
201
Lab 6 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
ip address 209.165.200.2 255.255.255.0
no shut
interface g0/0
ip address 209.165.100.2 255.255.255.0
no shut
exit
hostname R3
interface g0/1
ip address 192.168.3.1 255.255.255.0
no shut
interface g0/0
ip address 209.165.200.1 255.255.255.0
no shut
exit
ip route 0.0.0.0 0.0.0.0 209.165.200.2
3. Configure IPsec on the routers at each end of the tunnel (R1 and R3)!R1
crypto isakmp policy 10
encryption aes 256
authentication pre-share
group 5!
crypto isakmp key secretkey address 209.165.200.1!
crypto ipsec transform-set R1-R3 esp-aes 256 esp-sha-hmac!
crypto map IPSEC-MAP 10 ipsec-isakmp
set peer 209.165.200.1
set pfs group5
set security-association lifetime seconds 86400
set transform-set R1-R3
match address 100!
interface GigabitEthernet0/0
crypto map IPSEC-MAP!
access-list 100 permit ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255!R3
crypto isakmp policy 10
encryption aes 256
authentication pre-share
group 5!
crypto isakmp key secretkey address 209.165.100.1!
crypto ipsec transform-set R3-R1 esp-aes 256 esp-sha-hmac!
crypto map IPSEC-MAP 10 ipsec-isakmp
set peer 209.165.100.1
202
Lab 6 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
set pfs group5
set security-association lifetime seconds 86400
set transform-set R3-R1
match address 100!
interface GigabitEthernet0/0
crypto map IPSEC-MAP!
access-list 100 permit ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255
203
Lab 6 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
KLEF
Department of ECE, A.Y 2019-20, Semester - II
Data networks and Protocols Lab Internal Examination RUBRIC
Wrong Correct
Improper
Procedure Partially Correct (4-7) Procedure
Experimentatio Procedure (3)
2 10 M (0) (8-10)
n Execution
Total Marks
30
204
Lab 7 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Hop Count :
Hop count is the number of routers occurring in between the source and destination
network. The path with the lowest hop count is considered as the best route to reach a
network and therefore placed in the routing table. RIP prevents routing loops by limiting
the number of hopes allowed in a path from source and destination. The maximum hop
count allowed for RIP is 15 and hop count of 16 is considered as network unreachable.
Features of RIP :
There are three vesions of routing information protocol – RIP Version1, RIP
Version2 and RIPng.
205
Lab 7 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Multicast at FF02::9
Broadcast at Multicast at (RIPng can only run on
255.255.255.255 224.0.0.9 IPv6 networks)
Supports
Doesn’t support authentication of
authentication of RIPv2 update
update messages messages –
Classless
Classful routing protocol,
protocol supports classful Classless updates are sent
Consider the below given topology which has 3-routers R1, R2, R3. R1 has IP
address 172.16.10.6/30 on s0/0/1, 192.168.20.1/24 on fa0/0. R2 has IP address
172.16.10.2/30 on s0/0/0, 192.168.10.1/24 on fa0/0. R3 has IP address 172.16.10.5/30
on s0/1, 172.16.10.1/30 on s0/0, 10.10.10.1/24 on fa0/0.
206
Lab 7 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Topology:
Addressing Table:
207
Lab 7 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Step 2: Add the logging synchronous command to the console and virtual terminal
lines
This command is very helpful in both lab and production environments and uses
the following syntax:
Router(config-line)#logging synchronous
Step 7: Test the PC configuration by pinging the default gateway from the PC
Enter router ? at the global configuration prompt to a see a list of available routing
protocols on your router. To enable RIP, enter the command router rip in global
configuration mode.
Router(config)#router rip
208
Lab 7 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Step 1: Use the show ip route command to verify that each router has all of the
networks in the topology entered in the routing table
Routes learned through RIP are coded with an R in the routing table.
Step 2: Use the show ip protocols command to view information about the routing
processes
The show ip protocols command can be used to view information about the
routing processes that are occurring on the router. This output can be used to verify most
RIP parameters to confirm that:
RIP routing is configured
The correct interfaces send and receive RIP updates
The router advertises the correct networks
RIP neighbors are sending updates
Step 3: Use the debug ip rip command to view the RIP messages being sent and
received
Rip updates are sent every 30 seconds so you may have to wait for debug information to
be displayed.
For example:
209
Lab 7 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
R1#debug ip rip
R1#RIP: received v1 update from 192.168.2.2 on Serial0/0/0
192.168.3.0 in 1 hops
192.168.4.0 in 1 hops
192.168.5.0 in 2 hops
RIP: sending v1 update to 255.255.255.255 via FastEthernet0/0 (192.168.1.1)
RIP: build update entries
network 192.168.2.0 metric 1
network 192.168.3.0 metric 2
network 192.168.4.0 metric 2
network 192.168.5.0 metric 3
RIP: sending v1 update to 255.255.255.255 via Serial0/0/0 (192.168.2.1)
RIP: build update entries
network 192.168.1.0 metric 1
The debug output shows that R1 receives an update from R2. Notice how this
update includes all the networks that R1 does not already have in its routing table.
Because the FastEthernet0/0 interface belongs to the 192.168.1.0 network configured
under RIP, R1 builds an update to send out that interface. The update includes all
networks known to R1 except the network of the interface. Finally, R1 builds an update
to send to R2. Because of split horizon, R1 only includes the 192.168.1.0 network in
the update.
Step 4: Discontinue the debug output with the undebug all command
R1#undebug all
All possible debugging has been turned off
210
Lab 7 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Step 7: Configure your router to stop sending updates out the FastEthernet0/0
interface
Sending updates out this interface wastes the bandwidth and processing
resources of all devices on the LAN. In addition, advertising updates on a broadcast
network is a security risk. RIP updates can be intercepted with packet sniffing software.
Routing updates can be modified and sent back to the router, corrupting the router table
with false metrics that misdirects traffic.
The passive-interface fastethernet 0/0 command in routing configuration mode
is used to disable sending RIPv1 updates out that interface.
Router(config-router)#passive-interface fastethernet 0/0
Step 8: Verify that updates are not sent to interface FastEthernet0/0 anymore
You can use show ip protocols to ensure FastEthernet0/0 is passive. You can also use
debug ip rip to ensure that router is not sending any RIP updates to FastEthernet0/0.
Note: Sometimes it is necessary to clear the dynamic routing table. Try the command
Router # clear ip route * on both R1 and R2 (you can also do it on the R3). This
command will cause the routers to immediately flush routes in the routing table and
request updates from each other.
Task: Clean Up
Term Description
211
Lab 7 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
For this tutorial I assume that you are familiar with these basic terms. If you want
to learn these terms in detail please go through the first part of this article which explains
them in details with examples.
This tutorial is the second part of our article “Learn NAT (Network Address
Translation) Step by Step in Easy Language with Examples”. You can read other
parts of this article here. To explain Static NAT Configuration, I will use packet tracer
network simulator software. You can use any network simulator software or can use real
Cisco devices to follow this guide.
Topology:
Initial IP Configuration
Device / Interface IP Address Connected With
212
Lab 7 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
If you are following this tutorial on my practice topology, skip this IP configuration
section as that topology is already configured with this initial IP configuration
213
Lab 7 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
To configure IP address in Router1 click Router1 and select CLI and press Enter key.
Two interfaces of Router1 are used in topology; FastEthernet0/0 and Serial 0/0/0.
By default interfaces on router are remain administratively down during the start up. We
need to configure IP address and other parameters on interfaces before we could actually
use them for routing. Interface mode is used to assign the IP address and other
parameters. Interface mode can be accessed from global configuration mode. Following
commands are used to access the global configuration mode.
Router>enable
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#
214
Lab 7 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
In real life environment this parameter controls the data flow between serial links and
need to be set at service provider’s end. In lab environment we need not to worry about
this value. We can use any valid rate here.
215
Lab 7 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Router(config-if)#bandwidth 64
Initial IP configuration in R2
Router>enable
Router#configure terminal
Router(config)#ostname R2
R2(config)#interface FastEthernet0/0
R2(config-if)#ip address 192.168.1.1 255.255.255.0
R2(config-if)#no shutdown
R2(config-if)#exit
R2(config)#interface Serial0/0/0
R2(config-if)#ip address 100.0.0.2 255.0.0.0
R2(config-if)#no shutdown
R2(config-if)#exit
R2(config)#
That’s all initial IP configuration we need. Now this topology is ready for the practice of
static nat.
4.Since static NAT use manual translation, we have to map each inside local IP address
(which needs a translation) with inside global IP address. Following command is used
to map the inside local IP address with inside global IP address.
5.Router(config)#ip nat inside source static [inside local ip address] [inside global IP
address]
216
Lab 7 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
6. For example in our lab Laptop1 is configured with IP address 10.0.0.10. To map it
with 50.0.0.10 IP address we will use following command
Let’s implement all these commands together and configure the static NAT.
For testing purpose I configured only one static translation. You may use following
commands to configure the translation for remaining address.
Laptop0 10.0.0.10
Server 192.168.1.10
To test this setup click Laptop0 and Desktop and click Command Prompt.
First command verifies that we are testing from correct NAT device.
Second command checks whether we are able to access the remote device or not. A
ping reply confirms that we are able to connect with remote device on this IP
address.
Third command checks whether we are able to access the remote device on its actual
IP address or not. A ping error confirms that we are not able to connect with remote
device on this IP address.
Let’s do one more testing. Click Laptop0 and click Desktop and click Web
Browser and access 200.0.0.10.
219
Lab 7 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Above figure confirms that host 10.0.0.10 is able to access the 200.0.0.10.
Now run ping 200.0.0.10 command from Laptop1.
Why we are not able to connect with the remote device from this host?
Because we configured NAT only for one host (Laptop0) which IP address is 10.0.0.10.
So only the host 10.0.0.10 will be able to access the remote device.
220
Lab 7 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
To confirm it
again, let’s try to
access web service
from this host.
If you followed this tutorial step by step, you should get the same output of testing.
Although it’s very rare but some time you may get different output. To figure out what
went wrong you can use my practice topology with all above configuration. Download
my practice topology
We can also verify this translation on router with show ip nat translation command.
221
Lab 7 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
The actual IP address is not listed here because router is receiving packets after the
translation. From R1’s point of view remote device’s IP address is 200.0.0.10 while from
R2’s point of view end device’s IP address is 50.0.0.10.
This way if NAT is enabled we would not be able to trace the actual end device.
Calculation
222
Lab 7 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
223
Lab 7 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
224
Lab 7 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
225
Lab 7 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
226
Lab 7 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
227
Lab 7 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Step-8: Give the message to any pc’s and check the output
3.What Is Netstat?
Ans: You can examine your current routing tables by running the command netstat, as
follows: %%%% netstat.
228
Lab 7 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
6.What is ALG?
Ans: ALG is AN Application Layer entree (ALG). NAT performs translation service on
any Transmission management Protocol/User Datagram Protocol (TCP/UDP) traffic
that doesn’t carry supply and/or destination informatics addresses within
the application information stream.
7.When creating a pool of global addresses, which keyword can be used instead of
the netmask command?
Ans: prefix-length
8.What is the maximum number of configurable NAT IP pools ?
Ans: The firewall supports a maximum of 256 translated IP addresses per NAT rule
229
Lab 7 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
KLEF
Department of ECE, A.Y 2019-20, Semester - II
Data networks and Protocols Lab Internal Examination RUBRIC
Wrong Correct
Improper
Procedure Partially Correct (4-7) Procedure
Experimentatio Procedure (3)
2 10 M (0) (8-10)
n Execution
Total Marks
30
230
Lab 8 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
231
Lab 8 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
2. Now go to web browser Option in desktop menu of laptop) and type 192.168.0.1 and
click on Go.
You will now see a drop down menu as shown below. Enter a username and
password.
4. Then change the internet connection type to static IP and enter the below
configuration. Then save the settings and click on Continue.
232
Lab 8 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
233
Lab 8 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
8. Now click on a Laptop. Turn it off. Remove the exixting module and place the
wireless router module as ashown in the figure. Then turn on the laptop and close it.
Do this for all the other laptops.
234
Lab 8 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
9. Now open Conf tab of a laptop and enter the below details.
235
Lab 8 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Repeat this step for all the laptops and you will observe the laptops are connected to the
wireless router.
Lab 2 Activity 2: Basic wireless Settings SSID - LWR3000 Configure Wireless Linksys
Routers in packet tracer.
Introduction
236
Lab 8 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Prerequisites
Requirements
The time must be properly configured on all routers. Refer to Configuring NTP for
more information.
A working EIGRP configuration is recommended.
Components Used
The information in this document is based on Cisco IOS® Software Release 11.2
and later. The information in this document was created from the devices in a specific
lab environment. All of the devices used in this document started with a cleared (default)
configuration. If your network is live, make sure that you understand the potential
impact of any command.
FortWorth#
Configure Houston
This section shows the commands necessary to configure EIGRP message authentication
on the Houston router. For more detailed explanation of the commands shown here,
see Create a Keychain on Dallas and Configure Authentication on Dallas.
Houston#configure terminal
Houston(config)#key chain MYCHAIN
Houston(config-keychain)#key 1
Houston(config-keychain-key)#key-string securetraffic
Houston(config-keychain-key)#end
Houston#
Houston#configure terminal
Houston(config)#interface serial 0/0.1
Houston(config-subif)#ip authentication mode eigrp 10 md5
Houston(config-subif)#ip authentication key-chain eigrp 10 MYCHAIN
Houston(config-subif)#end
Houston#
Verify
Use this section to confirm that your configuration works properly.
Note: Refer to Important Information on Debug Commands before you
use debug commands.
Messages When Only Dallas is Configured
Once EIGRP message authentication is configured on the Dallas router, that router
begins to reject messages from the Fort Worth and Houston routers because they do not
yet have authentication configured. This can be verified by issuing a debug eigrp
packets command on the Dallas router:
Dallas#debug eigrp packets
17:43:43: EIGRP: ignored packet from 192.169.1.2 (invalid authentication)
17:43:45: EIGRP: ignored packet from 192.169.1.6 (invalid authentication)
!--- Packets from Fort Worth and Houston are ignored because they are !--- not yet
configured for authentication.
Topology Diagram
Learning Objectives
Upon completion of this lab, you will be able to:
Cable a network according to the Topology Diagram.
Erase the startup configuration and reload a router to the default state.
Perform basic configuration tasks on a router.
Configure and activate interfaces.
Configure EIGRP routing on all routers.
Verify EIGRP routing using show commands.
Disable automatic summarization.
Configure manual summarization.
Document the EIGRP configuration.
241
Lab 8 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Addresses Table:
Scenario
In this lab activity, you will learn how to configure the routing protocol EIGRP
using the network shown in the Topology Diagram. A loopback address will be used
on the R2 router to simulate a connection to an ISP, where all traffic that is not destined
for the local network will be sent. Some segments of the network have been subnetted
using VLSM. EIGRP is a classless routing protocol that can be used to provide subnet
mask information in the routing updates. This will allow VLSM subnet information to
be propagated throughout the network.
Task 3: Configure and Activate Serial and Ethernet Addresses. Step 1: Configure the
interfaces on the R1, R2, and R3 routers.
Configure the interfaces on the R1, R2, and R3 routers with the IP addresses from the table
under the Topology Diagram.
Step 2: Verify IP addressing and interfaces.
Use the show ip interface brief command to verify that the IP addressing is correct and that
the interfaces are active.
When you have finished, be sure to save the running configuration to the NVRAM of
the router.
Step 3: Configure Ethernet interfaces of PC1, PC2, and PC3.
Configure the Ethernet interfaces of PC1, PC2, and PC3 with the IP addresses and default
gateways from the table under the Topology Diagram.
243
Lab 8 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Note: Think of a wildcard mask as the inverse of a subnet mask. The inverse of the subnet
mask 255.255.255.252 is 0.0.0.3. To calculate the inverse of the subnet mask, subtract the
subnet mask from 255.255.255.255: 255.255.255.255 255.255.255.252 Subtract the
subnet mask
0 . 0 . 0. 3 Wildcard mask
R1(config-router)# network 192.168.10.4 0.0.0.3
When you are finished with the EIGRP configuration for R1, return to privileged EXEC
mode and save the current configuration to NVRAM.
Step 3: Configure the R2 router to advertise the 192.168.10.8/30 network attached to the
Serial0/0/1 interface.
Use the wildcard‐mask option with the network command to advertise only the subnet and
not the entire 192.168.10.0 classful network.
244
Lab 8 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Step 4: Configure EIGRP on the R3 router using the router eigrp and network
commands. Use an autonomous system number of 1.
Use the classful network address for the network attached to the FastEthernet0/0
interface. Include the wildcard masks for the subnets attached to the Serial0/0/0 and Serial
0/0/1 interfaces. When you are finished, return to privileged EXEC mode.
R3(config)#router eigrp 1
R3(config-router)#network 192.168.1.0
R3(config-router)#network 192.168.10.4 0.0.0.3
R3(config-router)#
Notice that when the networks for the serial links from R3 to R1 and R3 to R2 are
added to the EIGRP configuration, DUAL sends a notification message to the
console stating that a neighbor relationship with another EIGRP router has been
established.
Task 6: Verify EIGRP Operation. Step 1: View neighbors.
On the R1 router, use the show ip eigrp neighbors command to view the neighbor
table and verify that EIGRP has established an adjacency with the R2 and R3 routers.
You should be able to see the IP address of each adjacent router and the interface that R1
uses to reach that EIGRP neighbor.
R1#show ip eigrp neighbors
Step 2: View routing protocol information.
On the R1 router, use the show ip protocols command to view information about
the routing protocol operation. Notice that the information that was configured in Task 5,
such as protocol, autonomous system number, and networks, is shown in the output.
The IP addresses of the adjacent neighbors are also shown.
R1#show ip protocols
Notice that the output specifies the autonomous system number used by EIGRP.
Remember, the autonomous system number must be the same on all routers for EIGRP
245
Lab 8 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Task7: Examine EIGRP Routes in the Routing Tables. Step1: View the routing table on
the R1 router.
EIGRP routes are denoted in the routing table with a D, which stands for DUAL (Diffusing
Update Algorithm), which is the routing algorithm used by EIGRP.
R1#show ip route
Notice that the 172.16.0.0/16 parent network is variably subnetted with three child routes
using either a /24 or /30 mask. Also notice that EIGRP has automatically included a
summary route to Null0 for the 172.16.0.0/16 network. The 172.16.0.0/16 route does not
actually represent a path to reach the parent network, 172.16.0.0/16. If a packet destined for
172.16.0.0/16 does not match one of the level 2 child routes, it is sent to the Null0 interface.
The 192.168.10.0/24 Network is also variably subnetted and includes a Null0 route.
246
Lab 8 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
R1 router:
R1(config)#interface serial0/0/0 R1(config-if)#bandwidth 64
R2 router:
R2(config)#interface serial0/0/0 R2(config-if)#bandwidth 64 R2(config)#interface
serial0/0/1 R2(config-if)#bandwidth 1024
R3 router:
R3(config)#interface serial0/0/1 R3(config-if)#bandwidth 1024
Note: The bandwidth command only modifies the bandwidth metric used by routing
protocols, not the physical bandwidth of the link.
Step 3: Verify the bandwidth modifications.
Use the show ip interface command to verify that the bandwidth value of each link has been
changed.
Note: Use the interface configuration command no bandwidth to return the bandwidth to its
default value.
Step 2: Answer the following questions: What is the best path to PC1?
A successor is a neighboring router that is currently being used for packet forwarding. A
successor is the least‐cost route to the destination network. The IP address of a successor
is shown in a routing table entry right after the word “via”.
What is the IP address and name of the successor router in this route?
247
Lab 8 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Feasible distance (FD) is the lowest calculated metric to reach that destination. FD is the
metric listed in the routing table entry as the second number inside the brackets.
What is the feasible distance to the network that PC1 is on?
Task 10: Determine if R1 is a Feasible Successor for the Route from R2 to the 192.168.1.0
Network.
A feasible successor is a neighbor who has a viable backup path to the same network as
the successor. In order to be a feasible successor, R1 must satisfy the feasibility
condition. The feasibility condition (FC) is met when a neighbor’s reported distance (RD)
to a network is less than the local router’s feasible distance to the same destination network.
Step 1: Examine the routing table on R1.
Use the show ip eigrp topology command to view the EIGRP topology table on R2.
248
Lab 8 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
What is the reported distance for 192.168.1.0 from the feasible successor?
Task 12: Disable EIGRP Automatic Summarization. Step 1: Examine the routing table of
the R3 router.
249
Lab 8 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Notice that R3 is not receiving individual routes for the 172.16.1.0/24, 172.16.2.0/24,
and 172.16.3.0/24 subnets. Instead, the routing table only has a summary route to the
classful network address of 172.16.0.0/16 through the R1 router. This will cause packets
that are destined for the 172.16.2.0/24 network to be sent through the R1 router instead of
being sent straight to the R2 router.
Why is the R1 router (192.168.10.5) the only successor for the route to the 172.16.0.0/16
network?
Notice that the reported distance from R2 is higher than the feasible distance from R1.
Step 2: Disable automatic summarization on all three routers with the no auto‐summary
command.
R1(config)#router eigrp 1
R1(config-router)#no
auto-summary
R2(config)#router eigrp 1
R2(config-router)#no
auto-summary
R3(config)#router eigrp 1
R3(config-router)#no
auto-summary
250
Lab 8 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Add two loopback addresses, 192.168.2.1/24 and 192.168.3.1/24, to the R3 router. These
virtual interfaces will be used to represent networks to be manually summarized along
with the 192.168.1.0/24 LAN.
R3(config)#interface loopback1
R3(config-if)#ip address 192.168.2.1 255.255.255.0
R3(config-if)#interface loopback2
R3(config-if)#ip address 192.168.3.1 255.255.255.0
Step 2: Add the 192.168.2.0 and 192.168.3.0 networks to the EIGRP configuration on
R3.
R3(config)#router eigrp 1
R3(config-router)#network 192.168.2.0
R3(config-router)#network 192.168.3.0
Step 3: Verify new routes.
View the routing table on the R1 router to verify that the new routes are being sent out in
the EIGRP updates sent by R3.
Step 4: Apply manual summarization to outbound interfaces.
The routes to the 192.168.1.0/24, 192.168.2.0/24, and 192.168.3.0/24 networks can be
summarized in the single network 192.168.0.0/22. Use the ip summary‐address eigrp
as‐number network‐address subnet‐mask command to configure manual summarization
on each of the outbound interfaces connected to EIGRP neighbors.
R3(config)#interface serial0/0/0
R3(config-if)#ip summary-address eigrp 1 192.168.0.0
255.255.252.0 R3(config-if)#interface serial0/0/1
R3(config-if)#ip summary-address eigrp 1 192.168.0.0
255.255.252.0 R3(config-if)#
Step 5: Verify the summary route.
View the routing table on the R1 router to verify that the summary route is being sent out in
the EIGRP updates sent by R3.
At the end of this activity your completion rate should be 100%. If the completion rate is
not 100%, use the Check Results button and troubleshoot as necessary.
251
Lab 8 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Sample calculation
252
Lab 8 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Insert ethernet cable between LAN port1 (on the back panel of the wireless router) and
any available ethernet port on the NIC (network interface card) on the laptop which your
going to use to configure the wi-fi system.
This port is usually coloured with a yellow colour to separate it from the other outgoing
Ethernet ports.
On the D-Link 524 and D-Link 624 routers, the colour of the WAN port is black.
253
Lab 8 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
If one is using a D-Link DSL 2640T router, then it has formed a DSL modem. Rather
than connecting your device to another modem with an ethernet cable, one should
connect his phone cable from your phone jack to the DSL port at the backside of the D-
Link 2640T.
Now, wait for a few seconds to get your Power and WAN’s status to light up
STEP2:
CONNECT THE COMPUTER TO THE NETWORK.
A. Wired Connection:
Join the ethernet cord to the ethernet port on your computer device and one of that
ethernet ports on the D-Link wi-fi router. The user can utilize any of the Ethernet ports
on the wi-fi router and the WAN port, which should be then connected to your modem.
B. Wireless Connection:
First, click on the network icon shown on the displayed System Tray. Now, click on the
name of the network linked with the router which will be mentioned on the packaged
configuration card with the router. Enter the password or network key (the password)
penned on the configuration card Finally, hit on the “connect” tab to meet the networks
254
Lab 8 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
STEP3:
RUN THE SETUP WIZARD.
The Configuration of The Router.
Enter the IP address of the router into the address bar. For the D-Link 524 and 624
models, the IP address is 192.168.0.1 and it is 192.168.1.1 for the other models such as
2604T.
Set my internet connection is: Static IP (if your ISP provided you Static IP like
below)
Ip address: 114.21.228.3
Subnet mask: 255.255.255.252
255
Lab 8 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
256
Lab 8 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
OR
Set my internet connection is: PPPoE (if your ISP provided you username and
password like below)
Username: 121@smith
Password: smith121
Click on “save settings”
S
e
t
w
i
r
e
l
e
s
s
n
e
258
Lab 8 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
259
Lab 8 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Now unplug Ethernet cable from your laptop and router and connect the Ethernet
cable to your internet modemodem and your router’s internet / WAN port.
Now connect your laptop with your wi-fi name( My Wifi Router) and your
password (123456789) and use your internet.
260
Lab 8 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
261
Lab 8 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
KLEF
Department of ECE, A.Y 2019-20, Semester - II
Data networks and Protocols Lab Internal Examination RUBRIC
Wrong Correct
Improper
Procedure Partially Correct (4-7) Procedure
Experimentatio Procedure (3)
2 10 M (0) (8-10)
n Execution
Total Marks
30
262
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Steps
1. Open cisco packet tracer and design the circuit as shown below
A- Interface FastEthernet1/0
B- Ip helper-address 192.168.1.10
C- Exit
264
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Go to Ipconfigurationin Desktop in PC0 ,PC1, PC2, PC3, PC4, PC5 and change from
static to DHCP
10. When u open IP configuration again u have to get a msg saying DHCP successful
265
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Pre-requisite:
Dial-Up vs. DSL vs. Cable vs. Satellite Internet – Globalcom
The Battle of Internet Connections: Dial-Up vs. DSL vs. Cable vs. Satellite
As demand for faster, better, more efficient internet connection increases, so does the
number of connection options developed to meet these needs. Below is a summary of
uses and advantages of four very popular connectivity choices so far:
Dial-up
This is the grand pappy of internet connections and just as slow… like, S-L-O-W,
capable only of 56kbps or lower. However, for the most basic uses such as sending mails
with small- to medium-sized files attached, dial-up should do.
Dial-up will also allow you to view most websites, generally content-heavy ones. But
sites loaded with graphics, animations and other tricks will take a while to load. For real-
time viewing and videos, dial-ups can’t perform as well. The connection will also hog
the phone line so making or receiving phone calls when internet access is on can only be
done using a separate line.
DSL
DSL stands for Digital Subscriber Line. It is a type of broadband connection and
considerably much faster than dial-up. The two most common types are ADSL
(asymmetrical) and SDSL (symmetrical).
A DSL connection will not tie up a phone line. It’s always available so there is no need
to dial an ISP. DSL speeds can go from several hundred kbps to around 8 Mbps. This
much speed allows high volume data use, loads websites quickly and is quite efficient to
use with live chats, viewing videos in real time and playing online games.
Cable
Cable internet connection is faster than a dial-up but sometimes slower than DSL.
Internet connection is obtained using a cable modem. This connection will be shared on
lines used for cable TV. To transmit data, space reserved for TV channels are used, some
to handle upstream transmissions and others for downstream transmissions.
Satellite
Internet over Satellite or IoS uses (what else?) a satellite to handle data transmissions.
Unlike cable or DSL where speed fluctuations occur, satellite internet allows for
smoother, uninterrupted connections, regardless of the user’s location. It also allows
even large files to download or upload much faster. Speeds vary, however, depending on
the user’s chosen plan.
Satellite internet is the internet connection of choice for remote locations where
conventional forms of connectivity aren’t available.
266
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Internet connections are of different types depending upon the cost, speed, availability,
etc. which type of internet connection is most beneficial for you? It depends upon many
factors. Internet connections are categorized according to their uses like at home, offices,
organization, etc. So, after going through this article you will definitely recognize which
internet connection will be best for you?
Different Types of Internet Connections
Let us discuss the top 10 general types of internet connections:
1. Dial-up
267
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
In a DSL internet connection, both voice and internet data can flow over the same
telephone line at the same time. It has a DSL modem which filters the voice and data.
DSL represents a high-speed connection, much fast than the ancient dial-up connection,
but it is not as fast as a cable connection. So due to DSL modem, you can go on the
internet and talk on the phone at the same time (Modem convert analog signal to digital
signal). Speed of DSL varies; depending upon the place where you live, but on an
average, download speed varies from 5Mbps to 100 Mbps.
3. VDSL (Very high bit-rate Digital Subscriber Line): it is the fastest form of the
DSL. It is fast because, in its line, copper wire is used. Due to copper, it is only
installed for limited distances. On an average VDSL is 3 times faster than the ADSL.
4. Cable Internet Connection
269
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Broadband Cable is typically provided by the same provider that provides cable
television to its customers. Here we use cable modem/wifi router combo. Because of the
connection of your neighbours and you are on the same cable line so during the peak
hours you have experienced slow speed. The reason behind is that your neighbours are
also using at the same time.
5. Fiber
A fiber internet connection provides the fastest internet speed today. It can provide
download and upload speed of up to 1000 Mbps. It uses light to transfer the data through
the optical fiber cable. In other forms of internet, connection data is transferred in
electrical form, so signal get weaker and weaker at large distances because singles in the
copper cable can be affected by electromagnetic interference.
270
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
But in the fiber optic cable, signal transfers in the glass in the form of light, it can travel
to long distances without any losses. Fiber is more expensive than the DSL and cable.
Reference : http://udel.edu/~weiher/pdf/tuning.pdf
Lab 9 Activity: In lab practice: https://www.youtube.com/watch?v=F54c_9mWqo0
271
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
272
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
273
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
274
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
275
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
276
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
277
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
278
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Calculation
279
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Lab 9 Activity 3: *[Optional Lab]: Hands on Practice Net Gear N150 Wireless-N
ADSL2+ Modem Router DGN1000
Pre-requisite :
Configuring NETGEAR N150 wireless ADSL2+ Modem Router DGN1000 for bsnl
broadband
Follow the below steps carefully for configuring NETGEAR N150 wireless ADSL2+
Modem Router DGN1000 for bsnl broadband.
280
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
1. Open Your Browser ( Internet Explorer, Mozilla Firefox, Google Chrome, Epic,
Opera, Safari ), then type in the address bar 192.168.0.1 and press enter, it will take
you to the netgear page.
2. Enter the credential of the Username and Password as in the instructions manual of
the netgear, you will get along with your box it will be named as package of contents.
3. Click on the left side panel, Basic Settings. under it enter the following as follow :
Go to security options and select WPA2-PSK (Wi-Fi Protected Access 2 with Pre-
Shared Key)
To configure your DSL modem router for Internet connection with Smart Wizard:
Connect the DSL port of the NETGEAR modem router to the phone line, via the DSL
Microfilter, as shown in the diagram. Use an Ethernet cable to connect the computer to
any of the four LAN ports as shown in the diagram. Connect the NETGEAR DSL
modem router to its power supply unit (PSU) (Not shown in the diagram) and wait about
a minute for it to boot up.
282
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Open a web browser and type the router's IP address which would be
either http://192.168.0.1 or http://192.168.1.1 in the address bar and press Enter.
o You are prompted to log into the router.
o The default username is admin and the default password is password.
o The username and password are case-sensitive.
If the default username and password is not working, you might have changed the
password. Please try other passwords that you might have changed to. Otherwise, a
factory reset is needed to restore the router to factory defaults. To perform a factory
reset, see Restoring a NETGEAR home router to the factory default settings.
283
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Click Setup Wizard on the top left corner, Select Yes for the Setup Wizard to detect the
type of Internet connection and click Next.
The Setup Wizard will report which connection type it has discovered, and then display
the appropriate configuration page. Please follow the steps under the connection type
detected by your router:
Note: If the Setup Wizard finds no connection, please check the physical
connection of your devices, and make sure that your ISP has already activated your DSL
account.
284
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Enter the PPPoE login user name and password. These fields are case-sensitive. This
information should have been provided to you by your ISP. Wizard Detected PPPoA
Login Account Setup:
Enter your login user name and password. These fields are case-sensitive. This
information should have been provided to you by your ISP.
285
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Enter your assigned IP Address and Subnet Mask. This information should have been
provided to you by your ISP. Enter the IP address of your ISP's Primary DNS Server. If
a Secondary DNS Server address is available, enter it also. Click Apply to save the
settings. Click Test to test your Internet connection.
286
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
If required, enter the Account Name and Domain Name from your ISP. 2. Select Use
Static IP Address or Use IP Over ATM (IPoA-RFC1483 Routed) according to the
information from your ISP. If you Select IPoA, the router will be able to detect the
gateway IP address but you still need to provide the router IP address. 3. Enter your
assigned IP Address, Subnet Mask, and the IP Address of your ISP's gateway router.
This information should have been provided to you by your ISP. 4. Enter the IP
address of your ISP's Primary DNS Server. If a Secondary DNS Server address is
available, enter it also.
287
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Verify that you have a valid IP address (not blank or 0.0.0.0) on the Internet or
ADSL Port.
configure ADSL settings on my NETGEAR DSL Modem Router using the router web
interface If you have a older router with a Smart Wizard user interface, see How to
manually configure the ADSL settings on a NETGEAR DSL Gateway with Smart
Wizard
How to manually configure the ADSL settings on a NETGEAR DSL Modem
Router with NETGEAR genie:
STEP 1: Please follow the "Install Your Modem Router" section in the Installation
Guide at the link below to setup the physical connections. You can move to the next step
after completing page 5.
After connecting the devices together, check the lights on the front panel of the router.
Make sure the Ethernet port LED is lit for the connected computer.
STEP 2: If this is the first time configuration, open a web browser to get redirected to
the NETGEAR genie Wizard. If you are not redirected, please access the router by using
the default IP http://192.168.0.1 (or) www.routerlogin.net (or) www.routerlogin.com
Username: admin
Password: password
288
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
For manual configuration, select No, I want to configure the internet connection
myself and click Next.
STEP 3:
Under the Basic Tab, click on Internet.
Select Yes for the "Does your internet connection requires a login?"
For PPPoE type of DSL service, click the drop-down arrow under the Internet
Service Provider select PPPoE.
Type the Username and Password given by your ISP.
Click Apply.
289
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
For the Connection Mode setting: by selecting Dial on Demand option, connection
automatically starts when there is outbound traffic to the internet and it automatically
terminates if the connection is idle based on the value in the Idle Timeout setting.
By selecting Always On option, the connection automatically starts when the
computer boots up but the connection does not time out. The router will keep trying
to bring up the connection if it is disconnected for some reason.
By selecting Manually Connect option, you must go to the Router Status screen and
click the Connect button in order to connect to the Internet. The manual connection
does not time out and you have to click the Disconnect button on the Router Status
screen to disconnect it.
STEP 4: Under the Advanced Tab, click Setup and in the drop down list
select ADSL settings.
Based on the type of connection you have, select the Multiplexing method
as VC – BASED or LLC – BASED. By Default the VPI and VCI value is set to 8
and 35 respectively. Check with your internet service provider for your VPI and VCI
value and enter it in their respective boxes.
By Default the VPI and VCI value is set to 8 and 35 respectively. Check with your
internet service provider for your VPI and VCI value and enter it in their respective
boxes.
Click Apply.
290
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Multiplexing
Country ISP VPI VCI
Method
Bigpond
8 35 LLC
Australia
Exetel 8 35 VC
iiNET 8 35 LLC
Australia Internode
8 35 VC
Australia
Optus 8 35 VC
Telstra 8 35 VC
TPG Internet 8 35 LLC
Belgium BASE 8 35 LLC
Bell Sympatico 0 35 LLC
Canada MTS 8 35 VC
Teksavvy 0 35 LLC
FREE 8 36 VC
Orange 8 35 VC
France
OVH 8 35 VC
SFR 8 35 LLC
Italy Telecom Italia 8 35 LLC
Spain Orange 8 32 LLC
Sweden Telia Sonera 8 35 LLC
Switzerland Sunrise 8 35 LLC
ADSL24 0 38 VC
BETHERE 0 101 LLC
United O2 0 101 LLC
Kingdom Plusnet 0 38 VC
SKY 0 38 VC
Talk Talk 0 38 VC
AT&T 0 35 LLC
AT&T 8 35 LLC
CenturyLink 0 32 LLC
United States
Frontiernet 0 35 LLC
NetZero 7 20 LLC
Verizon 0 35 LLC
291
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
STEP 5:
To check the Internet IP address, Click ADVANCED and look under Internet Port.
292
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Sample calculation
Ans: 2
20. What does default time lease new IP address to client?
Ans: 8 days
21. What is command used to renew IP address?
Ans: ipconfig /renew
295
Lab 9– Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
296
Lab 9 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
KLEF
Department of ECE, A.Y 2019-20, Semester - II
Data networks and Protocols Lab Internal Examination RUBRIC
Wrong Correct
Improper
Procedure Partially Correct (4-7) Procedure
Experimentatio Procedure (3)
2 10 M (0) (8-10)
n Execution
Total Marks
30
297
Lab 10 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Steps
1. Open cisco packet tracer and design the circuit as shown below
298
Lab 10 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Now click on SBC-PT. Click on Programming and enter the following code.
If there is no wind or when you move the cursor over the motion sensor, the fan is turned
ON. When there is wind or when cursor is not moved, the fan is turned OFF. The
following figure shows ON state of the fan.
299
Lab 10 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Open the cisco packet tracer and design the following ckt by using the components and
configure the ip address respectively as per the diagram
300
Lab 10 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Topology:
1. We have 3 Vlans
Vlan1 is inside zone
VLAN2 is Outside zone
Vlan3 is DMZ
301
Lab 10 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
2. Your company has one location connected to an ISP . Router1 represents a CPE
device managed by the ISP
3. Router2 represents an intermediate internet router
4. Router3 represents an ISP that connects an administrator from a network
management company who has been hired remotely to manage your network
5. The ASA is an edge CPE security that connects an internal cooperative network that
connects DMZ to ISP
6. while providing net and DHCP services to the inside hosts the ASA will be
configured for the management by an administrator on the internal administrator and
by the remote administrator
7. PC-C can ping any router interface but PC-C is unable to ping PC-B or the DMZ
server
302
Lab 10 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
8. We use the command show version to determine the various aspects of ASA device
We use the command show file system to display the ASA file system
303
Lab 10 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
9. There are 2 prefixes supported we can use both to display the flash memory , it
returns the same result
10. Now we will configure the host name and domain name and configure the enable
mode password and set the date and time by typing the commands in below picture
304
Lab 10 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
11. Then we configure the inside and outside interfaces . VLAN1 is in inside zone with
security lvl100 and VLAN2 with security lvl 0 by following the commands in pic
305
Lab 10 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
13. PC-B should be able to ping to th ASA but should be unable to ping to the outside
network
306
Lab 10 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
307
Lab 10 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
6. This is the family of specifications for wireless local area networks (WLANs)
developed by a working group of the Institute of Electrical and Electronics
Engineers (IEEE).
Ans: 802.11
308
Lab 10 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
KLEF
Department of ECE, A.Y 2019-20, Semester - II
Data networks and Protocols Lab Internal Examination RUBRIC
Wrong Correct
Improper
Procedure Partially Correct (4-7) Procedure
Experimentatio Procedure (3)
2 10 M (0) (8-10)
n Execution
Total Marks
30
309
Lab 11 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
1. *[Optional Lab]: Configure and verify the IoT, IoE, IPv6, OSPFv3, DNS, Optical
Fiber, 3G 4G Cell Tower, Wi-Fi, Ethernet.
Pre-Requisite:
Packet Tracer – Install and Configure IoT Devices
Topology
Background / Scenario
In this activity, you will connect the computing and IoT devices to the home network.
All the IoT devices have been configured to work with rocker switches connected to
single-board computer (SBC). The IoT devices need to be connected to the Home
Gateway and registered with the registration server (www.register.pka). You already
have an account with the registration server:
ServerAddress .................... www.register.pka
UserName: .......................... admin
Password: ........................... admin
310
Lab 11 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
After the IoT devices are connected to the home network and registered with the
registration server, you will be able to control the IoT devices at home, or away from
home, via the registration server.
Part 1: Setting up the Home Network
Step 1: Set up the wired network
a. Connect any available FastEthernet port on Home Switch to any
available Ethernet port onHome Gateway using a copper straight-
throughcable.
b. Connect FastEthernet0 port on PC to any available FastEthernet port on
Home Switch using a copper straight-throughcable.
c. Click PC. Click Desktop. Click IPConfiguration. Select DHCP for the
IPConfiguration.
b. Click DHCP under Internet Settings. The Home Gateway will receive the settings
from theISP.
c. Within Home Gateway, clickWireless.
d. Change the SSID to MyHomeGateway. Change the Authentication to
WPA2-PSK. Enter CiscoIoTas the PSK PassPhrase.
e. Click Laptop. Click Desktop. Click PCWireless.
f. Click Connect tab. Select MyHomeGatewaynetwork. If wireless network name is
not displayed,click
Refresh.
g. Click Connect. Enter CiscoIoTas Pre-shared Key. ClickConnect.
b. Click Coffee Pot. Click Config. Click FastEthernet0. Select DHCP for the
IPConfiguration.
c. Click Lamp. Click Config. Click Wireless0. Enter MyHomeGatewayas
the SSID. ClickWPA2-PSK. Enter CiscoIoTas the PSK Pass Phrase.
Select DHCP for the IPConfiguration.
d. Repeat step c for CeilingFan.
a. Click Alt + Lamp a few times. How many settings does the Lamp have, and what are
the settings?
ClickAlt
+LampSwitchafewtimes.HowmanysettingsdoestheLampSwitchhave,andwhatarethe
settings?
d.Turn on Lamp by clicking Dim. What happened to Lamp in thetopology? What did
you click to turn on the Coffee Pot from theLaptop?
e. You can also control the devices while you are away from home by accessing
the registration server. Click SmartPhone. Click Desktop. Click Web
Browser. Enter www.register.pka. Enter admin asthe Username and
Password. Click SignIn.
In Lab Activity:Configure and verify the IoT, IoE, IPv6, OSPFv3, DNS, Optical
Fiber, 3G 4G Cell Tower, Wi-Fi, Ethernet
313
Lab 11 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
314
Lab 11 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
315
Lab 11 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Sample calculation
316
Lab 11 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
317
Lab 11 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
KLEF
Department of ECE, A.Y 2019-20, Semester - II
Data networks and Protocols Lab Internal Examination RUBRIC
Wrong Correct
Improper
Procedure Partially Correct (4-7) Procedure
Experimentatio Procedure (3)
2 10 M (0) (8-10)
n Execution
Total Marks
30
318
Lab 12 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
319
Lab 12 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
320
Lab 12 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
321
Lab 12 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
322
Lab 12 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
323
Lab 12 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
324
Lab 12 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
325
Lab 12 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
326
Lab 12 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
327
Lab 12 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
328
Lab 12 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
329
Lab 12 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
330
Lab 12 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
KLEF
Department of ECE, A.Y 2019-20, Semester - II
Data networks and Protocols Lab Internal Examination RUBRIC
Wrong Correct
Improper
Procedure Partially Correct (4-7) Procedure
Experimentatio Procedure (3)
2 10 M (0) (8-10)
n Execution
Total Marks
30
331
Lab 13 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
*[Optional Lab]: Design Task: Assume Fresh Network Engineer for new and smart
learning of the Network Structure Networker to maintain Railway Station with all
network device, create a Tropology for Railway Office is divided into different
Departments named as Billing Department, Reservation Department & Accounts
Departments configure and verify all the sub departments must securely communication
successfully.
Design Task:
Cisco Connected Transportation System
The Rail Safety Improvement Act of 2008 (RSIA08) requires implementation of Positive
Train Control (PTC) on railroads, which carry passengers or have high-volume freight
traffic with toxic or poisonous-by-inhalation hazardous materials. PTC is a
communications and signaling system that has been identified by the National
Transportation Safety Board (NTSB) as a technology capable of preventing accidents
caused by train operator or dispatcher error.
Connected Transportation System (CTS) PTC introduces continuous location based and
speed tracking, with more sophisticated onboard wireless technology for enforcing
movement authority from a centralized control center, wherever the vehicle may be.
PTC will be inherently more reliable, and offer greater real-time functionality than
conventional systems, and would prevent accidents such as the 2008 Chatsworth
collision where a more advanced control system would have stopped the train
automatically and lives saved. PTC solution is expected to reduce the number of
accidents due to excessive speed, conflicting train movements, and engineer failure to
obey wayside signals.
Additional examples of potential business benefits include:
• Line capacity enhancement
• Improved service reliability
• Faster over-the-road running times
• More efficient use of cars and locomotives (made possible by real-time location
information)
• Reduction in locomotive failures (due to availability of real-time diagnostics)
• Larger "windows" for track maintenance (made possible by real-time location
information)
• Fuel savings
332
Lab 13 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
PTC promises a new level of safety and efficiency for US railroads. To enable railroads
within the United States to increase rail safety and meet requirements of Federal
mandate, Cisco's Connected Transportation System enables comprehensive end-to-end
network architecture for Positive Train Control. Cisco's Validated Design (CVD)
provides blue print reference architecture enabling rail system operators to minimize
potential design and implementation risk, and reduced time for deployment.
Release Notes
Release 1.0 of the PTC system provides an end-to-end design to support Positive Train
Control deployments. Incorporating back office, transport, wayside, and onboard
features, the PTC system offers a scalable and resilient ready-to-deploy application for
supporting rail safety functions with coverage that includes:
• Back Office and Wayside equipment integration with Unified MPLS Transport
models developed in Unified MPLS for Mobile Transport (UMMT) and Fixed
Mobile Convergence (FMC) system designs.
• Horizontal and vertical roaming capability validation of locomotive, wayside and
base station radios.
• Splitting traffic across multiple radio interface types.
• Wayside messaging server vertical roaming.
333
Lab 13 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Requirements
The following Positive Train Control requirement mandates and cost benefits are
defined.
Positive Train Control (PTC) is one of many new safety measures mandated by
the United States Federal government when President George W. Bush signed the Rail
Safety Improvement Act in October of 2008. PTC is an end-to-end rail safety system that
is designed to prevent the following incidents:
• Train-to-Train collisions
• Over-speed derailments
• Train incursions into established work zone limits
• Train passage through a rail switch left if the wrong position
The system is designed such that PTC will augment the safety measures already
taken by the engineer in control of the train, but if warnings to slow down or stop the
train are ignored or cannot be performed by the engineer, PTC will automatically apply
the brakes to achieve the desired speed or state of the train. All Class I railroads are
required to install PTC on tracks that provide passenger transportation or transport
poison- or toxic-by-inhalation hazardous materials, by December 31, 2015. Class I
railroads include those railroads having annual revenue of $250 million or more.
As of 2012, approximately 60,000 of the 162,000 miles of railroad tracks in the
United States are Class I railroads requiring PTC deployment. Approximately 8,400
miles of intercity passenger and commuter railroad tracks in the U.S. also require PTC
deployment.
In 2012, the FRA submitted a Report to Congress,1 in which it was stated that the
U.S. railroad industry had already invested over $1.5 billion into PTC implementation. It
is forecast that railroads will need to additionally invest more than $5 billion their own
funds. The primary benefit of Positive Train Control, and the driver behind the Federal
334
Lab 13 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
mandate to implement it, is rail safety. Beyond rail safety, the investment in PTC may
pay for itself over the long-term through several potential business benefits.
Rail Safety
While PTC will not prevent all rail accidents, it is designed to prevent the
majority of human-caused accidents. PTC has been discussed for several years, but it
was a major train collision between a Metrolink commuter train and a Union Pacific
freight train in September 2008 that prompted the quick passage of the Rail Safety
Improvement Act in October of 2008. That collision caused the deaths of 25 people and
injury to 135. Damages totaled over $7 million.
An NTSB investigation concluded that the cause of the collision was the failure
of the Metrolink commuter train engineer to notice a red signal and to stop the train
accordingly.2 Further, the NTSB report stated that a contributing factor to the accident
"[...] was the lack of a positive train control system that would have stopped the
Metrolink train short of the red signal and thus prevented the collision." The PTC system
would have allowed the engineer up to 15 seconds to respond appropriately to the red
signal, and stop the train, before the brakes would have been automatically applied by
the system.
Business Benefits
The Federal Railroad Association (FRA) funded an analysis of the costs and
benefits of deploying a Positive Train Control system.3 The annual benefits upon
completion are estimated to be $2.2 billion to $3.8 billion. This is expected to be seen in
the following potential business benefits.
System Overview
An end-to-end PTC solution is comprised of four main architectural components
that include the back office, onboard, wayside, and bi-directional communication
transport. Figure 1 shows the high-level architecture of an end-to-end PTC solution.
335
Lab 13 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Back Office
The back office houses the Back Office Server (BOS), which stores, processes,
and acts on information it receives from the locomotive onboard computer, wayside
messaging server, and maintenance personnel. Its database maintains information on
trains, tracks, work zones, and speed restrictions. Based on this data, the BOS will issue
movement authorities and notifications to the locomotives.
While it is assumed that the BOS will be housed in a Data Center environment,
the PTC solution does not have specialized requirement for the Data Center design.
Generalized Cisco design best practices and methodologies are covered in the SDU
Virtualized Multiservice Data Center system. The VMDC solution provides design and
implementation guidance for Enterprises deploying private cloud services and Service
Providers building virtual private and public cloud services. The Cisco VMDC reference
architecture integrates various Cisco and third-party products that are part of the cloud
computing ecosystem.
Onboard
The onboard computer located on the locomotive will receive the motion
authorities from the BOS and notify the engineer of changes in the speed limit or other
safety concerns. The engineer will use this information, along with information from
wayside devices regarding trackside signaling, and take appropriate action. If the
engineer does not slow or stop the train within 15 seconds, the onboard computer will
automatically apply the brakes. In the event that the onboard system loses connectivity
and cannot get this mission-critical information, the train must be stopped prior to
entering the next block.
Wayside
The wayside system encompasses the signaling equipment on and around the
track. This may include lamps, switches, gates and track circuits, among other things.
These devices can connect to a wayside-messaging server through the use of a Wayside
Interface Unit (WIU). This allows the messaging server to send information about the
trackside equipment to the BOS for processing, and to broadcast the information over a
radio interface so that locomotives can receive the information directly and act on it
accordingly.
Communication
Communication between the back office, locomotive, and wayside devices relies
on a redundant and resilient bi-directional communications network. The PTC solution
offers up to four different interface types that can be used for communication, including
Ethernet, Wi-Fi, 220 MHz PTC Radio, and 3G/4G Cellular.
The wayside equipment may communicate with the BOS over any one of the
four interface types. The onboard equipment will use either the 220 MHz radio or 3G/4G
cellular interface, providing mobility. In the case of the locomotive, it must be capable of
roaming horizontally from base station to base station. In either case, the device must
also be able to roam vertically between communications technologies. For example, 3G
cellular may be used as a backup to 220 MHz radio, or a train may switch to Wi-Fi while
at the train station or in the yard.
The industry has standardized on 220 MHz radio frequency due to its long range
(20 - 30 miles). This distance decreases the number of base stations deployed along the
tracks. Because rails are frequently shared across multiple railroad companies,
337
Lab 13 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
The transport network, consisting of the access, aggregation, and core networks,
will also provide a resilient communications path between the field devices and the
BOS. This will include ruggedized Ethernet switching at the edge, and a multipath
backhaul with sub-second re-convergence.
Transport Network
The transport network aspects of the Communications layer in the PTC 1.0
system make use of the Unified MPLS Transport designs developed first by the Unified
MPLS for Mobile Transport (UMMT) and continued in the Fixed Mobile Convergence
(FMC) system efforts. The Cisco FMC System provides reliable, scalable, and high-
density packet processing that addresses the transport and service edge aspects of a wide
variety of fixed and mobile legacy services, while reducing the operator's total cost of
operations (TCO). It handles the complexities of multiple access technologies, including
seamless handover and mobility between access networks to meet demands for
convergence and product consolidation. The FMC design addresses key functional
aspects critical to deploying a robust and highly-available transport network design for
the PTC system deployment, including:
System Architecture
Cisco Positive Train Control system architecture consists of the following solution
components.
338
Lab 13 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
To enable railroads within the United States to increase rail safety and meet the
requirements of the Federal mandate, Cisco has partnered with Lilee Systems to provide
a state-of-the art Positive Train Control solution. Combining the expertise of Lilee
Systems and their software-defined PTC radio components with the network and
transport expertise of Cisco, railroads of any size or scope can count on a solid and
scalable solution.
The PTC radio components supplied by Lilee Systems include the base station,
wayside, yard and locomotive radios, as well as the mobility controller. The mobility
controller provides central management of all the PTC components and also manages
mobility. Base station, yard and wayside radios communicate securely via an IPsec
tunnel to the mobility controller. Figure 2 shows a logical PTC radio network layout.
Figure 2 PTC Relies on Redundant and Resilient Backhaul Network with Cellular
Backup
The software-defined radios (SDR) provide a high level of flexibility within the
PTC network as they can be configured through software to have one or more virtual
interfaces. These interfaces can be of the following types:
• 220 MHz TDM (time division multiplex) radio
• 2.4 GHz / 5 GHz Wi-Fi a/b/g/n
339
Lab 13 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
• 3G cellular UMTS
• Ethernet
340
Lab 13 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
On-board Radio
A train management computer (TMC) is the on-board computer (Figure 4) that
will communicate with the back office server. It will use the on-board locomotive radio
as its gateway to reach the data center hosting the BOS. The locomotive radio will
typically connect to a base station radio over a 220 MHz radio frequency. The base
station will then securely tunnel traffic that it receives from the locomotive radio, back to
the mobility controller. In the event that communications to a base station is not
available over the radio interface, the locomotive radio may be configured to use the 3G
cellular interface as a backup.
When a train enters a train station or train yard, where Wi-Fi communications is
available, the locomotive radio can connect to an available Wi-Fi access point, known as
a Yard Radio. Connecting to an available Wi-Fi network offloads some traffic from the
220 MHz radio and offers a high-bandwidth connection for management scenarios
including train schedule downloads, onboard software maintenance (configurations,
upgrades, etc.), or even mission-critical PTC communications if the railroad prefers to
use Wi-Fi for this purpose when available.
Base station radios (Figure 5) can be placed up to 20 to 30 miles apart from each
other along the track. Each one will operate at a unique frequency within the 218-222
MHz range. Through its Ethernet interface, the radio will communicate across the
backhaul network securely with the mobility controller hosted in a remote operating
341
Lab 13 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
center (ROC). In the event that the base station loses its wired connection to the backhaul
network, it can be configured to use a 3G cellular connection as a backup. The base station also
has a Wi-Fi interface that can be configured as an access point or a Wi-fi client. This offers a
high-speed Wi-Fi connection to maintenance personnel in the immediate area of the base station.
Wayside Radio
The wayside radio (Figure 6) is used in wayside (trackside) stations to provide PTC
network connectivity to wayside signaling equipment. If fixed wire-line access to the
backhaul network is available, the wayside radio may connect to the BOS in the same
manner as a base station radio, and use its 3G cellular interface as a backup. If direct
connection to the backhaul network is not possible, then the wayside radio may connect
to the closest base station over 220 MHz PTC radio for communications. The wayside
radio will also broadcast wayside signaling messages so that locomotive radios can
receive and act on them directly.
342
Lab 13 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Mobility Controller
343
Lab 13 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
With support for up to 200 base stations per mobility controller, the system offers
seamless roaming so the onboard hosts using the radio for network access, appear to be
stationary. Horizontal roaming between base stations is less than 50 ms.
Traffic classifiers allow the device to classify traffic based on the following:
• Source network, subnet, or host IP address
• Destination network, subnet, or host IP address
• IP protocol (ie. any, ICMP, protocol numbers 1-255)
• TCP and UDP source and destination port (ie. 1-65535)
344
Lab 13 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Route tables allow the device to have multiple routing tables. A traffic classifier may
reference any available route table, and a route table may be used by multiple traffic
classifiers. Each routing table can be configured with the following attributes:
• Default gateway (next hot)
• Default interface
• Network or subnet gateway (next hop)
• Network or subnet interface
Policy routes tie together the traffic classifier and route table. Each policy route has a
priority, which is used to assign a preference to the policy route. The lower the priority,
the higher the preference. If a route table cannot route a packet for any reason, the
decision falls to the next-preferred policy route (Figure 9).
Network Management
The Mobility Controller supports SNMPv1 and SNMPv2. All SNMP
communities are read-only by default, but can be configured as read-write. The SNMP
service can be bound to a specific IP address and port on the Mobility Controller.
Another critical consideration providing transport of the remote PTC radio traffic
to the back office server and transport mission-critical movement authorities from the
back office server to the locomotives. While some railroads may already have a
backhaul transport network to some degree, it is assumed that one does not exist.
345
Lab 13 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
The Cisco Unified MPLS Transport design utilized in the Cisco FMC system,
and the UMMT system before it, will accommodate the backhaul needs of PTC
deployments of any size or scale. While the design breaks down the network into access,
pre-aggregation, aggregation, and core segments, some segments can be combined
depending on the size and scope of the network.
The network design example in Figure 10 represents a smaller network where the
core, aggregation, and pre-aggregation networks are combined into a single network
domain. The access network is where the base station and wayside radios would access
the network via Ethernet.
Figure 10 Unified MPLS Transport Spans Access, Aggregation and Core Network
to Connect PTC to Data Center
Figure 10 assumes a flat LDP (Label Distribution Protocol) LSP (Label Switched Path)
across the core and aggregation networks. Together, these two networks form one IGP
and LDP domain. The MPLS mobile access network is based on MPLS access rings
346
Lab 13 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
with ASR 901 access routers, and integrated with labeled BGP LSPs. This network can
scale up to thousands of access routers and hundreds of pre-aggregation network nodes.
In cases where a larger backhaul transport is needed, the core and aggregation networks
can be separated into independent IGP/LDP domains. Inter-domain MPLS connectivity
would continue to be based on hierarchical labeled BGP LSPs. A network design such as
this would allow for tens of thousands of access nodes and thousands of pre-aggregation
nodes.
Several architecture models utilizing Unified MPLS Transport have been tested,
validated and documented as part of the FMC and UMMT Cisco Validated Designs.
Further, many production deployments of UMMT and FMC mean it is a mature and
tested design that railroads can feel comfortable deploying. Table 2 shows the
components validated as part of the latest Unified MPLS Transport design: FMC 1.0.
Software Release
Role Platform
At the base station and wayside stations, ruggedized switches that can withstand
large ambient temperature ranges (-40C to 75C), and support flexible configurations, are
used. The Cisco Industrial Ethernet 2000 and 3000 series switches are layer 2 and layer
3-capable, respectively. They both offer easy deployment, security, and resiliency in a
din-rail form factor.
347
Lab 13 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Functional Components
To design a robust, highly available, and manageable system, there are several
functional aspects which need to be considered. Among those aspects are:
• Quality of Service: How to ensure that all classes of traffic traversing the network
receive the proper treatment according to the criticality of the traffic, so that high priority
traffic is given preference over lower priority traffic.
• Redundancy and High Availability: Enable the network design to achieve the
necessary Service Level Agreement (SLA) parameters in terms of uptime, packet loss,
end-to-end delay, etc., in both normal operation as well as any failure scenario which
may be encountered.
Design best practices and methodologies for each of these areas are detailed in the Cisco
UMMT and FMC design guide documents. Links to these documents are contained in
the "Transport Network" section.
In lab activity
Assume The Cisco Connected Rail System The CRS, as shown in Figure 2, offers an
end-to-end system designed to enable the deployment of high-speed mobile networking
for rail applications. Passengers and rail personnel can connect their wireless devices to
onboard WiFi access points to obtain access to the corporate, retail or commercial
networks, as well as the Internet. A high-speed wired and wireless onboard network can
also be used for other business objectives, including safety and security. CRS 1.5
combines Cisco's expertise in wireless mobility, video surveillance, IP collaboration,
transport network, and data center networking into a complete solution for rail
applications.
348
Lab 13 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Figure CTS Network Design with Cellular Backup and configure by using network
simulation.
349
Lab 13 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Sample calculation
350
Lab 13 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Viva questions :
351
Lab 13 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
KLEF
Department of ECE, A.Y 2019-20, Semester - II
Data networks and Protocols Lab Internal Examination RUBRIC
Wrong Correct
Improper
Procedure Partially Correct (4-7) Procedure
Experimentatio Procedure (3)
2 10 M (0) (8-10)
n Execution
Total Marks
30
352
Lab 13 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
353
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
*[Optional Lab]: Experimental Evaluation of SIP for VoIP and Configure VoIP
Phone with network Router in Packet Tracer
Pre-requisite:
354
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
SIP – Overview
Given below are a few points to note about SIP −
SIP is a signalling protocol used to create, modify, and terminate a multimedia
session over the Internet Protocol. A session is nothing but a simple call between
two endpoints. An endpoint can be a smartphone, a laptop, or any device that can
receive and send multimedia content over the Internet.
SIP is an application layer protocol defined by IETF (Internet Engineering Task
Force) standard. It is defined in RFC 3261.
SIP embodies client-server architecture and the use of URL and URI
from HTTP and a text encoding scheme and a header style from SMTP.
SIP takes the help of SDP (Session Description Protocol) which describes a
session and RTP (Real Time Transport Protocol) used for delivering voice and
video over IP network.
SIP can be used for two-party (unicast) or multiparty (multicast) sessions.
Other SIP applications include file transfer, instant messaging, video
conferencing, online games, and steaming multimedia distribution.
Where Does SIP Fit In?
Basically SIP is an application layer protocol. It is a simple network signalling
protocol for creating and terminating sessions with one or more participants. The
SIP protocol is designed to be independent of the underlying transport protocol, so
SIP applications can run on TCP, UDP, or other lower-layer networking protocols.
The following illustration depicts where SIP fits in in the general scheme of things −
Typically, the SIP protocol is used for internet telephony and multimedia
distribution between two or more endpoints. For example, one person can initiate a
telephone call to another person using SIP, or someone may create a conference call
with many participants.
355
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
The SIP protocol was designed to be very simple, with a limited set of
commands. It is also text-based, so anyone can read a SIP message passed between
the endpoints in a SIP session.
User Agent
Proxy Server
Registrar Server
Redirect Server
Location Server
User Agent
It is the endpoint and one of the most important network elements of a SIP network.
An endpoint can initiate, modify, or terminate a session. User agents are the most
intelligent device or network element of a SIP network. It could be a softphone, a
mobile, or a laptop.
User agents are logically divided into two parts −
User Agent Client (UAC) − The entity that sends a request and receives a
response.
User Agent Server (UAS) − The entity that receives a request and sends a
response.
SIP is based on client-server architecture where the caller’s phone acts as a client
which initiates a call and the callee’s phone acts as a server which responds the call.
Proxy Server
It is the network element that takes a request from a user agent and forwards it to
another user.
Basically the role of a proxy server is much like a router.
It has some intelligence to understand a SIP request and send it ahead with the help
of URI.
A proxy server sits in between two user agents.
There can be a maximum of 70 proxy servers in between a source and a
destination.
There are two types of proxy servers −
Stateless Proxy Server − It simply forwards the message received. This type of
server does not store any information of a call or a transaction.
356
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Stateful Proxy Server − This type of proxy server keeps track of every request
and response received and can use it in future if required. It can retransmit the
request, if there is no response from the other side in time.
Registrar Server
The registrar server accepts registration requests from user agents. It helps users to
authenticate themselves within the network. It stores the URI and the location of
users in a database to help other SIP servers within the same domain.
Take a look at the following example that shows the process of a SIP Registration.
Here the caller wants to register with the TMC domain. So it sends a
REGISTER request to the TMC’s Registrar server and the server returns a 200 OK
response as it authorized the client.
Redirect Server
The redirect server receives requests and looks up the intended recipient of
the request in the location database created by the registrar.
The redirect server uses the database for getting location information and
responds with 3xx (Redirect response) to the user. We will discuss response codes
later in this tutorial.
Location Server
The location server provides information about a caller's possible locations to
the redirect and proxy servers.
Only a proxy server or a redirect server can contact a location server.
The following figure depicts the roles played by each of the network elements in
establishing a session.
357
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
The lowest layer of SIP is its syntax and encoding. Its encoding is specified
using an augmented Backus-Naur Form grammar (BNF).
At the second level is the transport layer. It defines how a Client sends requests
and receives responses and how a Server receives requests and sends responses
over the network. All SIP elements contain a transport layer.
358
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
359
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
The topology shown in the diagram is known as a SIP trapezoid. The process takes
place as follows −
When a caller initiates a call, an INVITE message is sent to the proxy server.
Upon receiving the INVITE, the proxy server attempts to resolve the address of
the callee with the help of the DNS server.
After getting the next route, caller’s proxy server (Proxy 1, also known as
outbound proxy server) forwards the INVITE request to the callee’s proxy server
which acts as an inbound proxy server (Proxy 2) for the callee.
The inbound proxy server contacts the location server to get information
about the callee’s address where the user registered.
After getting information from the location server, it forwards the call to its
destination.
Once the user agents get to know their address, they can bypass the call, i.e.,
conversations pass directly.
SIP - Messaging
SIP messages are of two types − requests and responses.
360
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
The opening line of a request contains a method that defines the request, and
a Request-URI that defines where the request is to be sent.
Similarly, the opening line of a response contains a response code.
Request Methods
SIP requests are the codes used to establish a communication. To complement
them, there are SIP responses that generally indicate whether a request succeeded
or failed.
These SIP requests which are known as METHODS make SIP message workable.
METHODS can be regarded as SIP requests, since they request a specific
action to be taken by another user agent or server.
METHODS are distinguished into two types −
o Core Methods
o Extension Methods
Core Methods
There are six core methods as discussed below.
INVITE
INVITE is used to initiate a session with a user agent. In other words, an INVITE
method is used to establish a media session between the user agents.
INVITE can contain the media information of the caller in the message body.
A session is considered established if an INVITE has received a success
response(2xx) or an ACK has been sent.
INVITE Example
The following code shows how INVITE is used.
INVITE sips:Bob@TMC.com SIP/2.0
Via: SIP/2.0/TLS client.ANC.com:5061;branch = z9hG4bK74bf9
Max-Forwards: 70
From: Alice<sips:Alice@TTP.com>;tag = 1234567
To: Bob<sips:Bob@TMC.com>
Call-ID: 12345601@192.168.2.1
CSeq: 1 INVITE
Contact: <sips:Alice@client.ANC.com>
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY
Supported: replaces
Content-Type: application/sdp
Content-Length: ...
v=0
o = Alice 2890844526 2890844526 IN IP4 client.ANC.com
s = Session SDP
c = IN IP4 client.ANC.com
t = 3034423619 0
m = audio 49170 RTP/AVP 0
a = rtpmap:0 PCMU/8000
BYE
BYE is the method used to terminate an established session. This is a SIP request
that can be sent by either the caller or the callee to end a session.
It cannot be sent by a proxy server.
BYE request normally routes end to end, bypassing the proxy server.
BYE cannot be sent to a pending an INVITE or an unestablished session.
REGISTER
REGISTER request performs the registration of a user agent. This request is sent by
a user agent to a registrar server.
The REGISTER request may be forwarded or proxied until it reaches an
authoritative registrar of the specified domain.
It carries the AOR (Address of Record) in the To header of the user that is
being registered.
REGISTER request contains the time period (3600sec).
362
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
One user agent can send a REGISTER request on behalf of another user
agent. This is known as third-party registration. Here, the From tag contains
the URI of the party submitting the registration on behalf of the party identified
in the To header.
CANCEL
CANCEL is used to terminate a session which is not established. User agents use
this request to cancel a pending call attempt initiated earlier.
It can be sent either by a user agent or a proxy server.
CANCEL is a hop by hop request, i.e., it goes through the elements between
the user agent and receives the response generated by the next stateful element.
ACK
ACK is used to acknowledge the final responses to an INVITE method. An ACK
always goes in the direction of INVITE.ACK may contain SDP body (media
characteristics), if it is not available in INVITE.
ACK may not be used to modify the media description that has already been sent
in the initial INVITE.
363
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
A stateful proxy receiving an ACK must determine whether or not the ACK
should be forwarded downstream to another proxy or user agent.
For 2xx responses, ACK is end to end, but for all other final responses, it
works on hop by hop basis when stateful proxies are involved.
OPTIONS
OPTIONS method is used to query a user agent or a proxy server about its
capabilities and discover its current availability. The response to a request lists the
capabilities of the user agent or server. A proxy never generates an OPTIONS
request.
Extension Methods
Subscribe
SUBSCRIBE is used by user agents to establish a subscription for the purpose of
getting notification about a particular event.
It contains an Expires header field that indicates the duration of a
subscription.
After the time period passes, the subscription will automatically terminate.
Subscription establishes a dialog between the user agents.
You can re-subscription again by sending another SUBSCRIBE within the
dialog before the expiration time.
A 200 OK will be received for a subscription from User.
Users can unsubscribe by sending another SUBSCRIBE method with Expires
value 0(zero).
364
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
NOTIFY
NOTIFY is used by user agents to get the occurrence of a particular event. Usually a
NOTIFY will trigger within a dialog when a subscription exists between the
subscriber and the notifier.
Every NOTIFY will get 200 OK response if it is received by notifier.
NOTIFY contain an Event header field indicating the event and
a subscriptionstate header field indicating the current state of the subscription.
A NOTIFY is always sent at the start and termination of a subscription.
PUBLISH
PUBLISH is used by a user agent to send event state information to a server
365
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
REFER
REFER is used by a user agent to refer another user agent to access a URI for the
dialog.
REFER must contain a Refer-To header. This is a mandatory header for
REFER.
REFER can be sent inside or outside a dialog.
A 202 Accepted will trigger a REFER request which indicates that other user
agent has accepted the reference.
INFO
INFO is used by a user agent to send call signalling information to another user
agent with which it has established a media session.
This is an end-to-end request.
A proxy will always forward an INFO request.
UPDATE
UPDATE is used to modify the state of a session if a session is not established. User
could change the codec with UPDATE.
366
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
PRACK
PRACK is used to acknowledge the receipt of a reliable transfer of provisional
response (1XX).
Generally PRACK is generated by a client when it receive a provisional
response containing an RSeq reliable sequence number and
a supported:100rel header.
PRACK contains (RSeq + CSeq) value in the rack header.
The PRACK method applies to all provisional responses except the 100
Trying response, which is never reliably transported.
A PRACK may contain a message body; it may be used for offer/answer
exchange.
MESSAGE
It is used to send an instant message using SIP. An IM usually consists of short
messages exchanged in real time by
participants engaged in text
conversation.
367
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
If the bind command is not enabled, the IP layer still provides the best local
address.
Step 8. Enable the SIP gateway to register E.164 numbers on behalf of analog
telephone voice ports (FXS), IP phone virtual voice ports (EFXS), and SCCP
phones with an external SIP proxy or SIP registrar.
368
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
If you use this command, you can specify session target sip-server for each dial
peer instead of repeatedly entering the SIP server interface address for each dial
peer.
SIP
Dial-Peer Example
SIP is selected as the call control protocol from inside a dial peer. SIP is
requested by the session protocol sipv2 dial-peer subcommand.
369
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
In this example, both dial peers include the session protocol sipv2 subcommand,
and SIP is used when the destination pattern matches either dial peer. The session
target distinguishes one session from the other.
In dial-peer 999, the IP address of the server is provided as the session target.
The address can be the address of a UA, proxy server, or redirect server.
In dial-peer 200, the session target is the sip-server parameter. When the sip-
server
parameter is the target, the IP address of the actual server is taken from the sip-
server subcommand in the SIP UA configuration. This means that from global
configuration mode, the network administrator has entered the sip-ua command
and the sip-server dns:server subcommand. The address represents the location
of a proxy server or redirect server. In this example, the name of the SIP server
is "sip2.cisco.com." The dial peer must know how to deal with DTMF signals.
The following example uses the dtmf-relay sip-notify command used for sending
telephone-event notifications via SIP NOTIFY messages from a SIP gateway.
The topology and complete configuration for this scenario are presented in
Figure 5-31 and in Example 5-15.
370
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Command Description
show sip service Displays the status of the SIP VoIP service
show sip-ua
Displays active SIP UA connections
connections
show sip-ua
Displays SIP traffic statistics
statistics
371
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
The show commands listed in Table 5-2 are valuable when examining the
status of SIP components and troubleshooting SIP environments.
Use the show sip-ua status command to display the status for the SIP user
agent, including whether call redirection is enabled or disabled. Example 5-17
provides sample output from the show sip-ua status command.
Use the show sip-ua timers command to display the current settings for the
SIP user-agent timers. Example 5-18 provides sample output from the show
sip-ua timers command.
Example 5-18 show sip-ua timers Command
372
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Use the show sip-ua register status command to display the status of E.164
numbers that a SIP gateway has registered with an external primary SIP
registrar. Example 5-19 provides sample output from the show sip-ua register
status command.
Example 5-20 shows the output of the show sip-ua calls command, which
provides detailed information about current SIP calls.
Example 5-20 show sip-ua calls Command
373
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
The following debug commands are valuable when examining the status of
SIP components and troubleshooting SIP environments:
■ debug asnl events: Use this command to verify that the SIP subscription
server is up. The output displays a pending message if, for example, the client is
unsuccessful in communicating with the server.
■ debug voip ccapi inout: This command shows every interaction with the call
control API on both the telephone interface and on the VoIP side. By monitoring
the output, you can follow the progress of a call from the inbound interface or
VoIP peer to the outbound side of the call. This debug command is very active.
Therefore, you must use it sparingly in a live network.
■ debug ccsip all: This command enables all ccsip-type debugging. This debug
command is very active. Therefore, you should use it sparingly in a live
network.
■ debug ccsip calls: This command displays all SIP call details as they are
updated in the SIP call control block. You can use this debug command to
monitor call records for suspicious clearing causes.
374
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
■ debug ccsip errors: This command traces all errors encountered by the SIP
subsystem.
■ debug ccsip events: This command traces events, such as call setups,
connections, and disconnections. An events version of a debug command is
often the best place to start because detailed debugs provide a great deal of
useful information.
■ debug ccsip info: This command enables tracing of general SIP Service
Provider Interface (SPI) information, including verification that call redirection
is disabled.
■ debug ccsip media: This command enables tracing of SIP media streams.
■ debug ccsip messages: This command shows the headers of SIP messages
that are exchanged between a client and a server.
■ debug ccsip states: This command displays the SIP states and state changes
for sessions within the SIP subsystem.
■ debug ccsip transport: This command enables tracing of the SIP transport
handler and the TCP or UDP process.
Examples 5-21, 5-22, and 5-23 show what a successful SIP session between two
end- points looks like in the output of the debug ccsip messages command.
Example 5-21 shows a SIP INVITE message being sent from one phone to
another.
Example 5-21 INVITE Message
375
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Example 5-22 shows the other endpoint returning an OK. Notice the Contact
information added to the output.
Example 5-22 OK Message
Example 5-23 shows the other endpoint ending the session with a BYE
message.
Example 5-23 BYE Message
Summary
The main topics covered in this topic are the following:
■ When configuring codecs, you can specify one codec or set up codec negotiation.
■ You might want to adjust some of the H.323 timers to meet network
requirements.
■ You can use several commands to configure fax features on H.323 gateways.
■ MGCP call flow consists of an exchange of messages between a call agent and a
gateway.
■ The mgcp command can be used to configure residential and trunk gateways on a
Cisco router.
■ A SIP call flow consists of signaling and transmission of bearer and media
packets.
377
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
■ A SIP address consists of an optional user ID, a host description, and optional
parameters to qualify the address more precisely.
■ SIP call setup models include direct, proxy server, and redirection.
■ You can use several commands on Cisco IOS to configure SIP on Cisco IOS
routers.
■ You can use several commands on Cisco IOS to verify and troubleshoot a SIP
integration.
Reference : https://wiki.zenitel.com/wiki/SIP_trunk_node_-_configuration
In lab activity:
By referring above activities Students must design and complete the Experimental
Evaluation of SIP for VoIP and Configure VoIP Phone with network Router in
Packet Tracer
(a) Basic configuration of SIP
(b) Configuring SIP Support for VoIP Dial Peers
(c) Changing the Configuration of the SIP User Agent
(d) Configuring SIP Call Transfer
378
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
Sample calculations
Viva questions
Mark allocations
379
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
380
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
381
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
382
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
383
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
384
Lab 14 – Activity 1-3 DNP- 18EC3109
Laboratory Minimum Learning Material (MLM) – 2019-20
385