You are on page 1of 75

Dr.

Jivraj Mehta Institute of Technology


Mogar, Anand

CERTIFICATE

This is to certify that MR.DEVANSHU.R.THAKKAR


Semester 5TH Enrollment Number 180820107055
Computer Engineering Department has satisfact
completed his/her Lab Work in CN for the term endin
2020-21 in the Subject of COMPUTER NETWORKS.

Date: _____________

Page | 1
Signature of Teacher Head of the Departm
INDEX
Pag Date of Date of
Sr
Name of Experiment e Experimen Submissio Sign
No.
No. t n
1 Study of Network devices in 5 9-7-20 16-7-
detail. 20
2 Study of different types of 13 16-7-20 23-7-
network cables and practically 20
implements the cross-wired
cable and straight through
cable using clamping tool.

3 Study of Router commands. 20 23-7-20 30-7-


20
4 Study about Introduction to 25 30-7-20 20-8-
Packet Tracer. 20
5 To Configure a Network 33 20-8-20 27-8-
topology using packet tracer 20
software
6 Study about to connect two 39 27-8-20 17-9-
networks using Router. 20
7 Study about classless and 51 17-9-20 1-10-
class full routing protocol. 20
8 Configure network using ARP 56 1-10-20 15-10-
protocol 20
9 Configure network using 60 15-10- 22-10-
DHCP protocol. 20 20

Page | 2
10 Configure a Network using 65 22-10- 29-10-
Distance Vector Routing
20 20
protocol

Page | 3
Dr. Jivraj Mehta Institute of Technology, Mogar

Computer Science &Engineering Department

SUBJECT: COMPUTER NETWORK


SUBJECT CODE: 3150710
CLASS: 5th Semester, Computer Science &Engineering Department

Practical List

Sr.
Title
No
Study of Network devices in detail.
1

Study of different types of network cables and practically implements the cross-wired cable and
2 straight through cable using clamping tool.

Study of Router commands.


3

Study about Introduction to Packet Tracer.


4
To Configure a Network topology using packet tracer software.
5
Study about to connect two networks using Router.
6
Study about classless and class full routing protocol.
7
Configure network using ARP protocol.
8
Configure network using DHCP protocol.
9
Configure a Network using Distance Vector Routing protocol.
10

Page | 4
PRACTICAL: - 1
Aim: Study of Network devices in detail.
Introduction:-

So far this book has examined topologies; media access methods, networking standards,
and cable types and connectors. To complete our examination of networking on a physical
level, this chapter looks at the network devices used to create networks.

Types of Network Devices:-

1) Hubs 2) Switches 3) Bridges 4) Routers


5) Gateways 6) CSU/DSU 7) Wireless Access Point 8) Modems
6) Firewalls 10) Transceivers

1. HUBS

Hubs are simple network devices, and their simplicity is reflected in their low cost.
Small hubs with four or five ports (often referred to as workgroup hubs) cost less than, with
the requisite cables, they provide everything needed to create a small network. Hubs with
more ports are available for networks that require greater capacity. An example of the type of
hub you might see on a corporate network.

Computers connect to a hub via a length of twisted-pair cabling. In addition to ports for
connecting computers, even an inexpensive hub generally has a port designated as an uplink
port that enables the hub to be connected to another hub to create larger networks. The
“Working with Hubs and Switches” section later in this chapter presents a detailed discussion
of this feature.

Page | 5
2. Switches

On the surface, a switch looks much like a hub. Despite their similar appearance,
switches are far more efficient than hubs and are far more desirable for today’s network
environments. An example of a 32-port Ethernet switch. If you refer to you’ll notice few
differences in the appearance of the high-density hub and this switch.

As with a hub, computers connect to a switch via a length of twisted-pair cable. Multiple
switches are often interconnected to create larger networks. Despite their similarity in
appearance and their identical physical connections to computers, switches offer significant
operational advantages over hubs.

Features of Switches
 A switch operates in the layer 2, i.e. data link layer of the OSI model.
 It is an intelligent network device that can be conceived as a multiport network
bridge.
 It uses MAC addresses (addresses of medium access control sublayer) to send data
packets to selected destination ports.
 It uses packet switching technique to receive and forward data packets from the
source to the destination device.
 It is supports unicast (one-to-one), multicast (one-to-many) and broadcast (one-to-all)
communications.
 Transmission mode is full duplex, i.e. communication in the channel occurs in both
the directions at the same time. Due to this, collisions do not occur.
 Switches are active devices, equipped with network software and network
management capabilities.
 Switches can perform some error checking before forwarding data to the destined
port.
 The number of ports is higher – 24/48.

3. Bridges

Bridges are networking devices that connect networks. Sometimes it is necessary to


divide networks into subnets to reduce the amount of traffic on each larger subnet or for
security reasons. Once divided, the bridge connects the two subnets and manages the traffic
flow between them. Today, network switches have largely replaced bridges.

Page | 6
A bridge functions by blocking or forwarding data, based on the destination MAC address
written into each frame of data. If the bridge believes the destination address is on a network
other than that from which the data was received, it can forward the data to the other
networks to which it is connected. If the address is not on the other side of the bridge, the
data is blocked from passing. Bridges “learn” the MAC addresses of devices on connected
networks by “listening” to network traffic and recording the network from which the traffic
originates.

Types of Bridges:-

1) Transparent bridge
2) Translational bridge
3) Source-route bridge

4. Routers

In a common configuration, routers are used to create larger networks by joining two
network segments. Such as a SOHO router used to connect a user to the Internet. A router can
be a dedicated hardware device or a computer system with more than one network interface
and the appropriate routing software. All modern network operating systems include the
functionality to act as a router.

A router derives its name from the fact that it can route data it receives from one network
onto another. When a router receives a packet of data, it reads the header of the packet to
determine the destination address. Once it has determined the address, it looks in its routing
table to determine whether it knows how to reach the destination and, if it does, it forwards
the packet to the next hop on the route. The next hop might be the final destination, or it
might be another router.

Page | 7
5. Gateway
The term gateway is applied to any device, system, or software application that can
perform the function of translating data from one format to another. The key feature of a
gateway is that it converts the format of the data, not the data itself

You can use gateway functionality in many ways. For example, a router that can route data
from an IPX network to an IP network is, technically, a gateway. The same can be said of a
translational bridge that, as described earlier in this chapter, converts from an Ethernet
network to a Token Ring network and back again.

Page | 8
6. CSU/DSU

A Channel Service Unit/Data Service Unit (CSU/DSU) acts as a translator between


the LAN data format and the WAN data format. Such a conversion is necessary because the
technologies used on WAN links are different from those used on LANs. Some consider a
CSU/DSU as a type of digital modem; but unlike a normal modem, which changes the signal
from digital to analog, a CSU/DSU changes the signal from one digital format to another.

A CSU/DSU has physical connections for the LAN equipment, normally via a serial
interface, and another connection for a WAN. Traditionally, the CSU/DSU has been in a
separate box from other networking equipment; however, the increasing use of WAN links
means that some router manufacturers are now including the CSU/DSU functionality in
routers or are providing the expansion capability to do so.

7. Wireless Access Point

Wireless access points (APs) are a transmitter and receiver (transceiver) device used
to create a wireless LAN (WLAN). APs are typically a separate network device with a built-
in antenna, transmitter, and adapter. APs use the wireless infrastructure network mode to
provide a connection point between WLANs and a wired Ethernet LAN. APs also typically
have several ports allowing a way to expand the network to support additional clients.

Depending on the size of the network, one or more APs might be required. Additional APs
are used to allow access to more wireless clients and to expand the range of the wireless
network. Each AP is limited by a transmissions range—the distance a client can be from a AP

Page | 9
and still get a useable signal. The actual distance depends on the wireless standard being used
and the obstructions and environmental conditions between the client and the AP.

8. Modems

Modem is a contraction of the terms modulator and demodulator. Modems perform a


simple function: They translate digital signals from a computer into analog signals that can
travel across conventional phone lines. The modem modulates the signal at the sending end
and demodulates at the receiving end. Modems provide a relatively slow method of
communication. In fact, the fastest modem available on the market today has a maximum
speed of 56Kbps.

Compare that to the speed of a 10Mbps network connection, and you’ll find that the modem
is approximately 180 times slower. That makes modems okay for browsing web pages or
occasionally downloading small files but wholly unsuitable for downloading large files. As a
result, many people prefer to use other remote access methods, including ISDN (which is
discussed later in this chapter, in the section “ISDN Terminal Adapters”) and cable/DSL
access.

Modems are available as internal devices that plug into expansion slots in a system; external
devices that plug into serial or USB ports; PCMCIA cards designed for use in laptops; and
specialized devices designed for use in systems such as handheld computers. In addition,
many laptops now come with integrated modems. For large-scale modem implementations,
such as at an ISP, rack-mounted modems are also available.

Page | 10
9. Firewalls

A firewall is a networking device, either hardware or software based, that controls


access to your organization’s network. This controlled access is designed to protect data and
resources from an outside threat. To do this, firewalls are typically placed at entry/exit points
of a network—for example, placing a firewall between an internal network and the Internet.
Once there, it can control access in and out of that point.

Although firewalls typically protect internal networks from public networks, they are also
used to control access between specific network segments within a network—for example,
placing a firewall between the Accounts and the Sales departments.

As mentioned, firewalls can be implemented through software or through a dedicated


hardware device. Organizations implement software firewalls through network operating
systems (NOS) such as Linux/UNIX, Windows servers, and Mac OS servers. The firewall is
configured on the server to allow or permit certain types of network traffic. In small offices
and for regular home use, a firewall is commonly installed on the local system and configured
to control traffic. Many third-party firewalls are available.

10. Transceivers

The term transceiver does describe a separate network device, but it can also be
technology built and embedded in devices such as network cards and modems. In a network
environment, a transceiver gets its name from being both a transmitter and a receiver of
signals—thus the name transceivers. Technically, on a LAN, the transceiver is responsible for
placing signals onto the network media and also detecting incoming signals traveling through
the same wire. Given the description of the function of a transceiver, it makes sense that that
technology would be found with network cards.

Although transceivers are found in network cards, they can be external devices as well. As far
as networking is concerned, transceivers can ship as a module or chip type. Chip transceivers
Page | 11
are small and are inserted into a system board or wired directly on a circuit board. Module
transceivers are external to the network and are installed and function similarly to other
computer peripherals, or they can function as standalone devices.

CONCLUSIONS: -

In this practical, we have study about different types of network devices in detail.

Page | 12
PRACTICAL: - 2
Aim: Study of different types of network cables and practically implements the cross-wired
cable and straight through cable using clamping tool.
Theory:

Different types of network cables

1. Thick Coaxial Cables (thick net) (RG-11)


Thick coaxial cables or thick wire is known as the Ethernet standard RG-11. This cable is
mostly used as backbone cable, distributing Ethernet signal throughout a building, an office
complex or other large installation. It is used in 10base5 Ethernet standard. RG-11 is thicker
and more study than RG-58 coax.

The length may be up to 500 meters with a max of five segments connected by repeaters.
This gives a total distance of 2500 meters. This is called a network diameter. RG-11 cable is
typically orange; with black rings around the cable every 2.5-meter to allow taps into the
cable.
2. Thin coaxial cables (thin net) (RG-58)
RG-58 is typically used for wiring laboratories and offices, or another small group of
computers. The maximum length of thin wire Ethernet segment is 185 meters, which is due to
the nature of the CSMA/CD method of operation, the cable attenuation, and the speed at
which signals propagate inside the coax. The length is limited to guarantee that collision is
detected when machines that are apart transmit at the same time. BNC connectors are used to
terminate each end of the cable.

When many machines are connected to the same Ethernet segment, a daisy chain approach is
used. The BNC connectors allow the network interface card to the next machine. The
machine each end of the cable must use a terminating resistor to eliminate collision-causing
reflection in the cable.
3. Twisted pair cables
Twisted pair is probably the most widely used cabling system in Ethernet in networks. Two
copper wires twist around each other to form the twisted pair cable. Depending on category
several insulated wire strands can reside in the cable.

Page | 13
 Twisted pair is available in two basic types 1. Unshielded Twisted Pair (UTP)
2. Shielded Twisted Pair (STP)

Unshielded Twisted Pair


Mostly the UTP is used. A twisted pair segment can’t exceed 100 meters. This limitation is
the only drawback to twisted pair. Twisted pair is used for 10/100 based Ethernet networks.

UTP cables are wired as straight through or crossover cables. Straight through cables
typically connect the computer’s networks interface can’t to be a port on the hub. Crossover
cables are used for NIC to communication and for hub-to-hub connections when no crossover
port is available.

[figure]

UTP categories

Categor Description
y
1 Used for voice for data.
Page | 14
2 Contains four twisted pair and a data transmission up to 4 Mbps. Used for
some token ring network.
3 Contains four twisted pair and a data transmission up to 10 Mbps. Used for
some token ring network.
4 Contains four twisted pair and a data transmission up to 16 Mbps. Used for
some token ring network.
5 Contains four twisted pair and a data transmission up to 100 Mbps. Used for
some token ring network.

Category-5 cables can be purchased or crimped as either straight through or crossed. A


category-5 cable has 8 thin Colors coded wires inside that run from one end of the cable to
the other. Ethernet networks for communication use only wires 1, 2, 3 and to be connected in
both jacks.
Shielded Twisted Pair
It is 150Ω cable containing additional shielding that protects signals against electromagnetic
Interference (EMI) produced by electric motors power lines etc. It is primarily used in Token
Ring Network & where UTP cable would provide insufficient protection against interface.

Wires within cables are encased in a metallic sheath that is conductive as copper in wires.
This sheath when properly grounded converts it ambient noise into current, like antenna. This
current is carried to wires within where it creates an equal and opposite current flowing in
twisted pair thus getting cancelled and no noise signal is resulted.

4. Fiber Optic
Fiber Optic relies on pulsed as light to carry information. Two types
of plastic or glass with different physical properties are used (the
inner core and the outer cladding) to allow a beam of light to reflect
off the boundary between the core and cladding. Some fiber optic
cables allow many different paths other allow one single mode. They

Page | 15
are called multimode and single mode fibers. A popular multimode
fiber has core/cladding dimensions of 62.5/125 nanometers.

Page | 16
Practically implementation of cross-wired cable and straight through cable
using clamping tool
(1) CROSS WIRED CABLE (RJ-45)

RJ-45 conductor data cable contains 4 pairs of wires each consists of a solid colored
wire and a strip of the same color. There are two wiring standards for RJ-45 wiring: T-568A
and T-568B. Although there are 4 pairs of wires, 10BaseT/100BaseT Ethernet uses only 2
pairs: Orange and Green. The other two colors (blue and brown) may be used for a second
Ethernet line or for phone connections. The two wiring standards are used to create a cross-
over cable (T-568A on one end, and T-568B on the other end), or a straight-through cable (T-
568B or T-568A on both ends).

To create a straight-through cable, you'll have to use either T-568A or T-568B on both ends
of the cable. The diagram depicted on the left and right shows clip of the RJ-45 connector
down. To create a cross-over cable, you'll wire T-568A on one end and T-568B on the other
end of the cable. The straight-through cables are used when connecting Data Terminating
Equipment (DTE) to Data Communications Equipment (DCE), such as computers and routers
to modems (gateways) or hubs (Ethernet Switches). The cross-over cables are used when
connecting DTE to DTE, or DCE to DCE equipment; such as computer to computer,
computer to router; or gateway to hub connections. The DTE equipment terminates the
signal, while DCE equipment does not.

More on straight-through and cross-over connections


The RJ45 data cables we use to connect computers to a Ethernet switch is straight-through
cables. As noted above, the RJ45 cable uses only 2-pairs of wires: Orange (pins 1 & 2) and
Green (pins 3 & 6). Pins 4, 5 (Blue) and 7, 8 (Brown) are NOT used. Straight-through cable,
as its name suggests, connects pin 1 to pin 1, pin 2 to pin 2, pin 3 to pin 3, and pin 6 to pin 6.
Cross-over cables are used to connect TX+ to RX+, and TX- to RX-, which connects pin 1 to
pin 3, pin 2 to pin 6, pin 3 to pin 1 and pin 6 to pin 2. The unused pins are generally
connected straight-through in both straight-through and cross-over cables.

Page | 17
To network two computers without a hub, a cross-over cable is used. Cross-over cable is also
used to connect a router to a computer, or Ethernet switch (hub) to another Ethernet switch
without an uplink. Most Ethernet switches today provide an uplink port, which prevents a use
of cross-over cable to daisy chain another Ethernet switch. Straight-through cables are used to
connect a computer to an Ethernet switch, or a router to an Ethernet switch.

Pin Number Designations


There are pin number designations for each color in T-568B and T-568A.
T-568B T-568A
Pin Color Pin name Color Pin name
1 Orange Stripe Tx+ Green Stripe Rx+
2 Orange Tx- Green Rx-
3 Green Stripe Rx+ Orange Stripe Tx+
4 Blue Not Used Blue Not Used
5 Blue Stripe Not Used Blue Stripe Not Used
6 Green Rx- Orange
7 Brown Stripe Not Used Brown Stripe Not Used
8 Brown Not Used Brown Not Used

RJ45 Color-Coded Scheme


RJ45 cables have 8 color-coded wires, and the plugs have 8 pins and conductors. Eight wires
are used as 4 pairs, each representing positive and negative polarity. The most commonly
used wiring standard for 100baseT is T-586B standard described above. Prior to EIA 568A
and 568B standards, the color-coded scheme was used to wire RJ45 cables. The table below
depicts pin and color schemes used in traditional and standardized setup.

(2) TWISTED PAIR CABLE


Twisted pair is the ordinary copper wire that connects home and many business computers to
the telephone company. To reduce crosstalk or electromagnetic induction between pairs of
wires, two insulated copper wires are twisted around each other. Each connection on twisted
pair requires both wires. Since some telephone sets or desktop locations require multiple
connections, twisted pair is sometimes installed in two or more pairs, all within a single
cable. For some business locations, twisted pair is enclosed in a shield that functions as a
ground. This is known as shielded twisted pair. Ordinary wire to the home is unshielded
twisted pair.

Twisted pair is now frequently installed with two pairs to the home, with the extra pair
making it possible for you to add another line when you need it.

Twisted pair comes with each pair uniquely color coded when it is packaged in multiple
pairs. Different uses such as analog, digital and Ethernet require different pair multiples.

Although twisted pair is often associated with home use, a higher grade of twisted pair is
often used for horizontal wiring in LAN installations because it is less expensive than coaxial
cable.

The wire you buy at a local hardware store for extensions from your phone or computer
modem to a wall jack is not twisted pair. It is a side-by-side wire known as silver satin. The
Page | 18
wall jack can have as many five kinds of hole arrangements or pin outs, depending on the
kinds of wire the installation expects will be plugged in (for example, digital, analog, or
LAN) .

CONCLUSIONS: -

In this practical, we have study about different types of network cables and practically
implemented the cross-wired cable and straight through cable using clamping tool.

Page | 19
PRACTICAL: - 3
Aim: Study of Router commands.

Theory: List of Router commands.

Cisco Internetworking Revision Sheet

A router is a layer 3 device used to forward packet from one network to another. It forwards
the packet through one of its port on the basis of destination IP address and the entry in the
routing table. By using routing table, it finds an optimised path between the source and
destination network.

Here, we will talk about Cisco router basic commands like assigning IP address to an
interface, bringing up an interface, applying enable and secret password.

Administrative Configuration:

Giving hostname to router –


It is used to set a name to a device stating an identity to a device. This is important as these
hostname are used in WAN for authentication purpose.
We can set the hostname as:

router(config)#hostname djmitrouter
djmitrouter(config)#

Applying banner – These are specifically used to give a small security notice to the user
who wants to access the router. We can customize it According to our need as like asking for
credentials needed for the login.

Types of banner are:

1. banner motd –
2. djmitrouter(config)#banner motd #
3. Enter Text message. End with character '#'
$ No unauthorised access allowed. Enter your credentials!! #

Here motd means message of the day and # means delimiter i.e message should end
with the symbol provided. This message will be shown while entering into the
router’s user execution mode

4. Exec banner – It will be displayed on the screen when the user will login through the
VTY lines.
5. Login banner – This banner will be displayed after the banner motd but before the
login.

Page | 20
These banners are used to make login interactive.

Setting password –
There are five passwords used to secure a cisco device:

1. enable password – The enable password is used for securing privilege mode. This
password will be shown in clear text by command “show running-configuration”.
These are replaced by secret password nowadays.

router(config)#enable password Djmit

2. Enable secret password – This is also used for securing privilege mode but the d the
difference is that it will be displayed as cipher in “show running-configuration”. This
password will override the enable password if both passwords are set.

router(config)#enable secret Djmit

3. line console password – When a user will take access through console port then this
password will be asked.
4. router(config)#line console 0
5. router(config-line)#password Djmit
router(config-line)#login

6. line VTY password – When a user want to access a router through VTY lines (telnet
or ssh) then this password will be asked.
Following configuration is shown for telnet password.
7. router(config)#line VTY 0 4
8. router(config-line)#password Djmit
router(config-line)#exit

9. auxiliary password – This password will secure the aux port.


10. router(config)#line aux 0
11. router(config-line)#password djmit
router(config-line)#login

Assigning IP address to a router’s interface –


As we know router is a layer 3 device therefore every port of a router should have an IP
address to work. By default, a router’s port has no IP address and its line protocol is also
down.

router(config)#interface fa0/0
router(config-if)#ip address 192.168.1.1 255.255.255.0
router(config-if)#no shut

Here first we have to specify the router’s interface on which we want to give an IP address.
Then we will enter interface mode where we will give an IP address as shown followed by its
subnet mask (255.255.255.0).Then, we have made the router port administratively up by no
shut command.

Copying and erasing configuration –


We can manually copy the running-configuration (configuration in RAM) to startup-
configuration (configuration in NVRAM). Therefore, when the next time router will boot up,

Page | 21
it will load the configuration that we have copied (as by default the configuration of NVRAM
is loaded).

router#copy running-config startup-config

To erase the configuration of NVRAM, use the command

router#erase startup-config

Basic Router Operations

To get to User Mode Press ENTER and a password if required.


To get to Privileged Mode Router>enable
To get back to User Mode Router# disable
To Exit the Router Router>exit or logoff
Break Key <shift>+< ctrl >+6 ‘x’
To move to the beginning of the command Ctrl+A
line
To move to the end of the command line Ctrl+E
To move forward one character Ctrl+F [or right arrow key]
To move back one character Ctrl+B [or left arrow key]
To repeat the previous command Ctrl+P [or up arrow key]
To repeat the most recent (last) command Ctrl+N [or down arrow key]
To move back one word Esc+B
To move forward one word Esc+F
To erase a word Ctrl+W
To erase a line Ctrl+U
To redisplay a line Ctrl+R
Ends configuration mode and returns to Router# Ctrl+Z
privileged mode
To auto complete a command <tab>
To show the command buffer Router>show history
To set the command buffer size Router>terminal history size
To disable advanced editing features Router>terminal no editing
To re-enable advanced editing features Router>terminal editing

Viewing Router Information

View IOS version Router# show version


View current configuration file (RAM) Router# show running-config
View saved configuration file (NVRAM) Router# show startup- Config
View IOS version, size of IOS, and free space in FLASH Router# show flash
View CPU utilization Router# show processes cpu
View info about programs in RAM Router# show processes
Display interfaces on router and their status Router# show interface
Display the ip interfaces on router and their status Router# show ip interface
Display which protocols are configured on the router Router# show protocol
Display ip protocol info Router# show ip protocol

Page | 22
Managing Configuration Files

Run the initial configuration dialog Router# setup


Reboot the router and reload the startup Config. Router# reload
from NVRAM
Enter global configuration mode Router# config terminal
Copy configuration file in RAM to NVRAM Router# copy running- config
startup-config
Copy configuration file in NVRAM to RAM Router# copy startup- config
running-config
Erase the configuration file in NVRAM [run Router# erase startup- config
initial Config. dialog]
Copy startup Config. file from TFTP to NVRAM Router# copy tftp startup- config
Copy startup Config. file from NVRAM to TFTP Router# copy startup- config tftp
Copy startup Config. file from TFTP to RAM Router# copy tftp running- config
Copy running Config. file from RAM to TFTP Router# copy running- config tftp
Backup IOS to file server Router# copy flash tftp
Upgrade the IOS from the file server Router# copy tftp flash
Tell router which IOS file in Flash to boot from Router(config)# boot system flash
(ios_filename)

Tell router which IOS to request from the TFTP Router(config)# boot system tftp
server (fallback) (ios_filename) tftp_ip_address
Tell router to boot from IOS in ROM Router(config)# boot rom

Password

Set the enable secret password Router(config)# enable secret Rimmer


[to enter privileged mode]
Set the enable password Router(config)# enable Rimmer
Set the password for Telnet Router(config)# line vty 0 4 ;0 4 specifies num of
telnet sessions
Router(config-line)# login
Router(config-line)# password Holly
Set the console port password Router(config)# line con 0
Router(config-line)# login
Router(config-line)# password Holly
Set the auxiliary password Router(config)# line aux 0
Router(config-line)# login
Router(config-line)# password Holly
Passwords can be encrypted Routerconfig)# service password-encryption
To de-encrypt the passwords Routerconfig)# no service password-encryption

Router Identification

Message of the day Router(config)# banner motd # You are in… #

Give the router a hostname Router(config)# hostname RouterC

Page | 23
PPP

Global Commands

Create a username and password for RouterA(config )#username OtherRouter


logging in password Lister
Enable PPP on the interface RouterA(config )#int s0
RouterA(config-if)#encapsulation ppp
Interface Commands

Enable authentication (chap or pap) RouterA(config-if)#ppp authentication chap


Specify chap hostname(default to RouterA(config-if)#ppp chap hostname
router name MyRouter
Specify chap password (default to RouterA(config-if)#ppp chap password Rimmer
enable password)
Specify pap username RouterA(config-if)#ppp pap sent-username Holly
Show Commands

View encapsulation, open LCP’s and more RouterA(config )#show interface serial 0
Debug Commands

View the authentication process RouterA(config )#debug ppp authentication

CONCLUSIONS: -

In this practical, we have study about basic Router commands.

Page | 24
PRACTICAL: - 4
Aim: Study about Introduction to Packet Tracer.

What is Packet Tracer?


Packet Tracer is a protocol simulator developed by Dennis Frezzo and his team at Cisco
Systems. Packet Tracer (PT) is a powerful and dynamic tool that displays the various
protocols used in networking, in either Real Time or Simulation mode. This includes layer 2
protocols such as Ethernet and PPP, layer 3 protocols such as IP, ICMP, and ARP, and layer
4 protocols such as TCP and UDP. Routing protocols can also be traced.

Lab Objectives
1. Cisco Packet Tracer 5.1 Overview
2. Creating Devices
3. Adding Modules
4. Making Connections
5. Creating Networks

Page | 25
Lab Content
1. Cisco Packet Tracer 5.1 Overview

Page | 26
1. Menu Bar This bar provides the File, Edit, Options, View, Tools,
Extensions and Help menus. You will find basic commands such
as Open, Save, Print, and Preferences in these menus. You will
also be able to access the Activity Wizard from the Extensions
menu.
2. Main Tool Bar This bar provides shortcut icons to the File and Edit menu
Commands. This bar also provides buttons for Zoom, the drawing
Palette, and the Device Template Manager. On the right, you
will also find the Network Information button, which you can
use to enter a description for the current network (or any text you
wish to include).
3. Common Tools Bar This bar provides access to these commonly used workspace tools:
Select, Move Layout, Place Note, Delete, Inspect, Add Simple,
PDU, and Add Complex PDU.
See "Workspace Basics" for more information.
4. Logical/Physical You can toggle between the Physical Workspace and the Logical
Workspace and Workspace with the tabs on this bar. In Logical Workspace, this
Navigation Bar bar also allows you to navigate through levels of a cluster, create a
New Cluster, Move Object, Set Tiled Background, and
Viewport. In Physical Workspace, this bar allows you to navigate
through physical locations, create a New City, create a New
Building, create a New Closet, Move Object, apply Grid to the
background, Set Background, and go to the Working Closet.
5. Workspace This area is where you will create your network, watch
simulations, and view many kinds of information and statistics.
6. Real time/ You can toggle between Real time Mode and Simulation Mode
Simulation Bar with the tabs on this bar. This bar also provides buttons to Power
Cycle Devices as well as the Play Control buttons and the Event
List toggle button in Simulation Mode. Also, it contains a clock
that displays the relative Time in Real time Mode and Simulation
Mode.
7. Network This box is where you choose devices and connections to put into
Component Box the workspace. It contains the Device-Type Selection Box and the
Device-Specific Selection Box.
8. Device-Type This box contains the type of devices and connections available in
Selection Box Packet Tracer 5.1. The Device-Specific Selection Box will change
depending on which type of device you choose.
9. Device-Specific This box is where you choose specifically which devices you want
Selection Box to put in your network and which connections to make.
10. User Created This window manages the packets you put in the network during
Packet Window* simulation scenarios. See the "Simulation Mode" section for more
details.

Page | 27
2. Creating Devices
a. Choose a device type from the Device-
Type Selection box
b. Click on the desired device model from
the Device-Specific Selection box
c. Click on a location in the workspace to
put your device in that location
d. If you want to cancel your selection,
press the Cancel icon for that device
e. Alternatively, you can click and drag a
device from the Device-Specific
Selection box onto the workspace
f. You can also click and drag a device
directly from the Device-Type Selection
box and a default device model will be
chosen for you

–––––––––––––––––

Page | 28
3. Adding Modules

 Click on a device to bring up its configuration window.


 By default, you will be in the Physical Device View subpanel of the device.
 You can browse (by clicking) through the list of modules and read their description in
the information box at the bottom.
 When you have found the module you want to add, simply drag it from the list into a
compatible bay on the device picture.
 You can remove a module by dragging it from the device back into the list.
4. Making Connections

 To make a connection between two devices, first click the Connections icon from the
Device-Type Selection box to bring up the list of available connections.
 Then click the appropriate cable type.
 The mouse pointer will change into a "connection" cursor.
 Click on the first device and choose an appropriate interface to which to connect.
 Then click on the second device and do the same.
 A connection cable will appear between the two devices, along with link lights
showing the link status on each end (for interfaces that have link lights).

Page | 29
5. Creating Networks
 Start creating a network by first selecting the End Devices. Add a Generic PC and a
Generic Server to the workspace.
 Under Connections, select the Copper Straight-through cable (solid black line) and
connect the devices with it. The red lights on the link indicate that the connection is
not working. Now, use the Delete tool to remove the Copper Straight-through cable,
and use a Copper Cross-over cable (dashed line) instead. The lights should turn green
at this point, and if the mouse pointer is held over either the PC or the Server, the link
status will be shown as “Up.” The network should look similar to the picture above.
 Click on the PC. While paying attention to the link lights, turn the power on, off, and
on again. Follow the same steps for the server. The link lights turn red when the
device is off. This means that the link is down or is not working. The link lights turn
green when the device is turned back on.
 Try all three ways to learn about the devices. First, mouse over the devices to see
basic configuration information about them. Second, click on each device with the
Select tool to show the device configuration window, which provides several ways to

Page | 30
configure the device. Third, use the Inspect tool to view tables the network device will
build as it learns about the network around it. In this example, only the ARP tables
will appear. Since the devices have not been configured yet, the ARP tables are
empty. Always remember to close windows after viewing them or they will clutter the
workspace.

 Open the PC configuration window and change the settings using the Config tab.
Change the display name to Client and set the DNS server to 192.168.0.105. Under
Interface, click Fast Ethernet and set the IP address as 192.168.0.110. Packet Tracer
automatically calculates other parameters. Make sure that the Port Status box is
checked. For future reference, note that other Ethernet interface settings, such as
bandwidth, duplex, MAC address, and subnet mask can be modified using this
window.
 Go to the Desktop Tab and click on IP Configuration. Notice that the IP address,
subnet mask and DNS server can be changed here as well.
 Open the Server configuration window and go to the Config tab. Change the display
name to Web Server. Click Fast Ethernet and set the IP address as 192.168.0.105.
Make sure that the Port Status is also on. Click DNS and set the domain name as
www.firstlab.com. Set the IP address as 192.168.0.105 and click Add. Finally, check
to make sure that the service for DNS is on.
 Reposition the network devices by dragging them to a new location. Add a network
description by using the “i” button on the upper right corner. Then add some text
labels within the Logical Workspace by using the Place Note tool.
 Load a background grid using the Set Tiled Background button.
 Save your work using the File > Save As option and create a meaningful filename.
Page | 31
CONCLUSIONS: -

In this practical, we have study about Introduction to Packet Tracer & each menu in packet
tracer in detail. This is basic information about packet tracer which requires whenever we
work with packet tracer.

Page | 32
PRACTICAL: - 5
Aim: To Configure a Network topology using packet tracer software.
Apparatus (Software): Packet tracer Software.

Theory:

Network topology is the geometric representation of relationship of all the links connecting
the devices or nodes. In this practical we have discuss how to design bus and star topology
network and provide interfacing and simulation between end points using packet tracer
software.

Cisco Packet Tracer (CPT) is multi-tasking network simulation software to perform and analyze
various network activities such as implementation of different topologies, select optimum path based
on various routing algorithms, analyze various network configuration and troubleshooting commands.
In order to start communication between end user devices and to design a network, we need to select
appropriate networking devices like routers, switches, hubs and make physical Connection by
connection cables to serial and fast Ethernet ports from the component list of packet tracer.
Networking devices are costly so it is better to perform first on packet tracer to understand the concept
and behavior of networking.

DESIGNING OF TOPOLOGY

1. Bus Topology
In local area network, it is a single network cable runs in the building or campus and all
nodes are connected along with this communication line with two endpoints called the bus or
backbone. In other words, it is a multipoint data communication circuit that is easily control
data flow between the computers because this configuration allows all stations to receive

Page | 33
every transmission over the network. For bus topology we build network using three generic
pc which are serially connected with three switches using copper straight through cable and
switches are interconnected using copper cross over cable.

2. Star Topology
In star topology, all the cables run from the computers to a central location where they are all
connected by a device called a hub. It is a concentrated network, where the end points are
directly reachable from a central location when network is expanded. Ethernet 10 base T is a
popular network based on the star topology. For star topology we build network using five
generic pc which are centrally connected to single switch 2950-24 using copper straight
through cable.

Page | 34
CONFIGURATION OF COMPONENT
1. Bus topology: To configure the IP address of an interface, we configure all PC one by one
click on pc, open DESKTOP window, fill IP Address, Fill subnet mask and default gateway.
After that, simulate the network using simulation.
2. Star topology: To configure the IP address of an interface, we configure all PC one by one
click on pc, open DESKTOP window, fill IP Address, Fill subnet mask and default gateway.
After that, simulate the network using simulation.

Fig -1: Design of bus topology

Page | 35
Fig -2: Design of star topology

SIMULATION OF NETWORK TOPOLOGY


1. Simulation modal of bus topology

Page | 36
Fig -3: Simulation of bus topology
2. Simulation modal of star topology

Fig -4: Simulation of star topology

Page | 37
CONCLUSIONS: -

In this practical, we have implemented both topologies using Cisco Packet Tracer. We have
used simple network with switch configuration and send packet data from one device to
another.

Page | 38
PRACTICAL:- 6
Aim: Study about to connect two networks using Router.

Theory: To connect two networks using Router, we have to follow some step like mention
Below

Step 1 Take 4 Pc’s each side that will be connected by 2 switches 2950-24.

Step 2 Connect all of them with copper straight through cable.

Page | 39
Step 3 Assigning IP.
10.0.01 To 10.255.255.254
172.16.0.1 To 172.31.255.254
192.168.0. To 192.168.255.254
1

If 2 computers want to communicate in a network they must have same type of


address.

Assign IP To pc’s in 1st network


Double click on Pc.

Page | 40
Go to desktop tab and click ip configuration.

Insert IP of 1st PC subnet will automatically generate and leave the gateway right now.

Page | 41
IP of 2nd PC.

Page | 42
IP of 3rd PC.

IP of 4th PC.

Page | 43
Remember you have inserted IP’s in all computer of same class 192.168.0.__, “You need to
limit yourself to one class of private addresses, however, if you want to computers to talk
with each other”.
Assign IP’s to the PC’s in the 2nd network
Like;
192.168.10.2
192.168.10.3
192.168.10.4
192.168.10.5

Step 4 Connecting Network with one Router.

 Connect one Generic Router.


 Connect it with switch 0 from fast Ethernet 0/0,
 Connect it with switch 1 from fast Ethernet 1/0;
With copper straight through cable.

Step 5 Configuring Router.

Router connected with the network one from Fast Ethernet 0/0.
1. Double click on Router.
2. Go to config. Tab.
3. Click Fast Ethernet 0/0.

Page | 44
Insert IP of the class as the network 1 have. So you have to inserts the IP 192.168.0.1;
subnet will automatically generate; make sure port status on.

Router is configured with network1

Insert Gateway of all PC’s in network one, the IP of Router through which they are connected
192.168.0.1

Page | 45
Router connected with the network 2 from Fast Ethernet 1/0.
1. Double click on Router.
2. Go to config. Tab.
3. Click Fast Ethernet 1/0.

Insert IP of the class as the network 2 have. So you have to inserts the IP 192.168.10.1;
subnet will automatically generate; make sure port status on.

Page | 46
Router is configured with network 2

Insert Gateway of all PC’s in network two, the IP of Router through which they are
connected 192.168.0.1

Page | 47
& 1st network is
192.168.0.1
192.168.0.2
192.168.0.3
192.168.0.4
 So add the Router IP address 192.168.0.0 and Click Add.
 Add the Router IP address 192.168.10.0 for the 2nd network.
 Add Router information Protocol
 Double click on router click config tab
 Click rip.

Step 6 Pinging.

Go to command prompt of any PC.

Page | 48
Ping any IP of the network.

Now what you see is;

Page | 49
CONCLUSIONS: -

In this practical, we have study about to connect two networks using router.

Page | 50
PRACTICAL: - 7
Aim: Study about classless and class full routing protocol.

Theory:

1. Classful Protocol

Classful routing protocols do not send subnet mask information with their routing updates. A
router running a classful routing protocol will react in one of two ways when receiving a
route:

 If the router has a directly connected interface belonging to the same major network,
it will apply the same subnet mask as that interface.
 If the router does not have any interfaces belonging to the same major network, it will
apply the classful subnet mask to the route.

Belonging to same “major network” simply indicates that they belong to the same “classful”
network. For example:

 10.3.1.0 and 10.5.5.0 belong to the same major network (10.0.0.0)


 10.1.4.5 and 11.1.4.4 do not belong to the same major network
 192.168.1.1 and 192.168.1.254 belong to the same major network (192.168.1.0)
 192.168.1.5 and 192.167.2.5 do not belong to the same major network.

Take the following example (assume the routing protocol is classful):

If Router B sends a routing update to Router A, it will not include the subnet mask for the
10.2.0.0 network. Thus, Router A must make a decision.
If Router A has a directly connected interface that belongs to the same major network
(10.0.0.0), it will use the subnet mask of that interface for the route.
For example, if Router A has an interface on the 10.4.0.0/16 network, it will apply a subnet
mask of /16 to the 10.2.0.0 network.
If Router A does not have a directly connected interfacing belonging to the same major
network, it will apply the classful subnet mask of /8. This can obviously cause routing
difficulties.
When using classful routing protocols, the subnet mask must remain consistent throughout
your entire network.

Page | 51
2. Classless Protocol
Classless routing protocols do send the subnet mask with their updates. Thus, Variable
Length Subnet Masks (VLSMs) are allowed when using classless routing protocols.
Examples of classful routing protocols include RIPv1 and IGRP.
Examples of classless routing protocols include RIPv2, EIGRP, OSPF, and IS-IS.
The IP Classless Command:-
The preceding section described how classful and classless protocols differ when sending
routing updates. Additionally, the router itself can operate either “classfully” or “classlessly”
when actually routing data.
When a “classful” router has an interface connected to a major network, it believes it knows
all routes connected to that major network.
For example, a router may have an interface attached to the 10.1.5.0/24 network. It may also
have routes from a routing protocol, also for the 10.x.x.x network.
However, if the classful router receives a packet destined for a 10.x.x.x subnet that is not in
the routing table, it will drop that packet, even if there is a default route. Again, a classful
router believes it knows all possible destinations in a major network.
To configure your router in “classful” mode:
Router(config)# no ip classless
To configure your router in “classless” mode (this is default in IOS 12.0 and greater):
Router (config) # ip classless

Limitations of Classful Routing Example

The following section will illustrate the limitations of classful routing, using RIPv1 as an
example. Consider the following diagram:

Page | 52
This particular scenario will work when using RIPv1, despite the fact that we’ve subnetted
the major 10.0.0.0 network. Notice that the subnets are contiguous (that is, they belong to the
same major network), and use the same subnet mask.
When Router A sends a RIPv1 update to Router B via Serial0, it will not include the subnet
mask for the 10.1.0.0 network. However, because the 10.3.0.0 network is in the same major
network as the 10.1.0.0 network, it will not summarize the address. The route entry in the
update will simply
state “10.1.0.0”.

Router B will accept this routing update, and realize that the interface receiving the update
(Serial0) belongs to the same major network as the route entry of 10.1.0.0. It will then apply
the subnet mask of its Serial0 interface to this route entry.
Router C will similarly send an entry for the 10.2.0.0 network to Router B.
Router B’s routing table will thus look like:

RouterB# show ip route


Gateway of last resort is not set
10.0.0.0/16 is subnetted, 4 subnets
C 10.3.0.0 is directly connected, Serial0
C 10.4.0.0 is directly connected, Serial1
R 10.1.0.0 [120/1] via 10.3.5.1, 00:00:00, Serial0
R 10.2.0.0 [120/1] via 10.4.5.1, 00:00:00, Serial1
Limitations of Classful Routing Example
Consider the following, slightly altered, example:

Page | 53
We’ll assume that RIPv1 is configured correctly on all routers. Notice that our networks are
no longer contiguous. Both Router A and Router C contain subnets of the 10.0.0.0 major
network (10.1.0.0 and 10.2.0.0 respectively).
Separating these networks now are two Class C subnets (192.168.123.0 and 192.168.111.0).
Why is this problem? Again, When Router A sends a RIPv1 update to Router B via Serial; it
will not include the subnet mask for the 10.1.0.0 network. Instead, Router A will consider
itself a border router, as the 10.1.0.0 and 192.168.123.0 networks do not belong to the same
major network. Router A will summarize the 10.1.0.0/16 network to its classful boundary of
10.0.0.0/8.
Router B will accept this routing update, and realize that it does not have a directly connected
interface in the 10.x.x.x scheme. Thus, it has no subnet mask to apply to this route. Because
of this, Router B will install the summarized 10.0.0.0 route into its routing table.
Router C, similarly, will consider itself a border router between networks 10.2.0.0 and
192.168.111.0. Thus, Router C will also send a summarized 10.0.0.0 route to Router B.
Limitations of Classful Routing Example

Router B’s routing table will then look like:


RouterB# show ip route
Gateway of last resort is not set

Page | 54
C 192.168.123.0 is directly connected, Serial0
C 192.168.111.0 is directly connected, Serial1
R 10.0.0.0 [120/1] via 192.168.123.1, 00:00:00, Serial0
[120/1] via 192.168.111.2, 00:00:00, Serial1

That’s right, Router B now has two equal metric routes to get to the summarized 10.0.0.0
network, one through Router A and the other through Router C. Router B will now load
balance all traffic to any 10.x.x.x network between routers A and C. Suffice to say, this is not
a good thing.
It gets better. Router B then tries to send routing updates to Router A and Router C, including
the summary route of 10.0.0.0/8. Router A’s routing table looks like:
RouterA# show ip route
Gateway of last resort is not set
C 192.168.123.0 is directly connected, Serial0
10.0.0.0/16 is subnetted, 1 subnet
C 10.1.0.0 is directly connected, Ethernet0

Router A will receive the summarized 10.0.0.0/8 route from Router B, and will reject it. This
is because it already has the summary network of 10.0.0.0 in its routing table, and it’s directly
connected. Router C will respond exactly the same, and the 10.1.0.0/16 and 10.2.0.0/16
networks will never be able to communicate.

CONCLUSIONS: -

In this practical, we have study about to classless and class full routing protocol

Page | 55
PRACTICAL: - 8
Aim: Configure network using ARP protocol.

Introduction:-
This chapter describes how to configure Address Resolution Protocol (ARP) to statically
configure the IP to Media Access Control (MAC) translations necessary for the CSS to send
data to network nodes. You can configure static ARP mapping for any of the CSS Ethernet
interface ports.

Theory:-

This chapter contains the following major sections:

1) ARP Configuration Quick Start

2) Configuring ARP Mapping

3) Configuring ARP Timeout

4) Configuring ARP Wait

5) Updating ARP Parameters

6) Clearing ARP Parameters

7) Showing ARP Information

Page | 56
1) ARP Configuration Quick Start:-

It provides a quick overview of the steps required to configure a static ARP map. Each step
includes the CLI command required to complete the task. For a complete description of each
feature and all the options associated with the CLI command.

2) Configuring ARP Mapping:-

To define a static ARP mapping, use the arp command. The syntax for this global
configuration mode command is arp ip or host mac address interface.
The variables and options are as follows:

 Ip or host:- The IP address of the system for static mapping. Enter an IP address in
dotted-decimal notation (for example, 192.168.11.1) or in mnemonic host-name
format.

 Mac_address:- The MAC address of the system mapped to the IP address. Enter the
MAC address in hyphenated-hexadecimal notation.

 Interface:- The CSS Ethernet interface port that you want to configure. For a CSS
11501, enter the interface name in interface port format. For a CSS 11503 or CSS
11506, the interface format is slot/port

 VLAN :- The number of the VLAN configured in a trunked interface on which the
ARP address is configured. Enter an integer from 1 to 4094 as the VLAN number.

Page | 57
3) Configuring ARP Timeout:-

To set the time, in seconds, to hold an ARP resolution result, use the arp timeout command.
When you change the timeout value, this value affects only new ARP entries. All previous
ARP entries retain the old timeout value. To remove all entries with the old timeout value,
enter the clear arp cache command.

4) Configuring ARP Wait:-

To set the time, in seconds, to wait for an ARP resolution, use the arp wait command.
The wait time is the number of seconds the CSS waits for an ARP resolution in response to
an ARP request to the network. Enter an integer from 5 to 30 seconds. The default is 5.
Page | 58
5) Updating ARP Parameters:-

To update the file containing hosts reachable through ARP, use the update arp command.
This command is available only in Super User mode.

For example:
# update arp file

6) Clearing ARP Parameters:-

The CSS enables you to clear ARP parameters for the ARP file or ARP cache. To clear the
file that contains known hosts reachable through ARP, use the clear arp File command. This
command is available only in Super User mode.

Use the clear arp cache command to delete dynamic entries from the ARP cache. To specify
an address for the single ARP entry you want to remove from the ARP cache, use the clear
arp cache ip or host command. Enter the address in either dotted-decimal IP notation (for
example, 192.168.11.1) or mnemonic host-name.
7) Showing ARP Information:-

Use the show arp command to display ARP information. To show static ARP mapping when
you use the show arp command, the IP route must exist in the routing table.
The syntax for this global configuration mode command is:
The syntax and options for the command are as follows:

 Show arp - Displays the complete ARP resolution table with IP addresses, MAC
addresses, and resolution type, excluding entries from the CSS Ethernet management
port.

 Config - Displays ARP global configuration parameters. The screen displays the
response timeout and the flush timeout, in seconds.

 File:- Displays the hosts that are reachable using ARP. The screen displays the IP
addresses of the host systems.

 Management-port:- Displays the ARP entries from the CSS Ethernet management
port. The ARP resolution table displayed through the show arp command displays
these entries.

CONCLUSIONS: -

In this practical, we have study about to configure network using ARP protocol.

Page | 59
PRACTICAL: - 9
Aim: Configure network using DHCP protocol.

Introduction:-
This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP).
For a complete description of the DHCP commands listed in this chapter, refer to the “DHCP
Commands” chapter of the Cisco IOS IP Command Reference, Volume 1 of 3: Addressing
and Services publication. To locate documentation of other commands that appear in this
chapter, use the command reference master index, or search online.

Theory:-

DHCP supports three mechanisms for IP address allocation:

 Automatic allocation:- DHCP assigns a permanent IP address to a client.

 Dynamic allocation:- DHCP assigns an IP address to a client for a limited period of


time (or until the client explicitly relinquishes the address).

 Manual allocation:- The network administrator assigns an IP address to a client and


DHCP is used simply to convey the assigned address to the client.
DHCP Server Overview
The Cisco IOS DHCP Server feature is a full DHCP Server implementation that assigns and
manages IP addresses from specified address pools within the router to DHCP clients. If the
Cisco IOS DHCP Server cannot satisfy a DHCP request from its own database, it can forward
the request to one or more secondary DHCP Servers defined by the network administrator.

Page | 60
DHCP Client Overview

The Cisco IOS DHCP client now enables you to obtain an IP address from a DHCP Server
dynamically using the DHCP protocol as specified in RFC 2131. In Cisco IOS Release 12.2,
only Ethernet interfaces are supported; work is in progress to support all interface types. The
Cisco IOS DHCP client offers following benefits:

 Reduces time to configure and deploy


 Reduces the number of configuration errors
 Enables customers to centrally control the IP address assigned to a Cisco IOS router.

DHCP Relay Agent Overview


A DHCP relay agent is any host that forwards DHCP packets between clients and servers.
Relay agents are used to forward requests and replies between clients and servers when they
are not on the same physical subnet. Relay agent forwarding is distinct from the normal
forwarding of an IP router, where IP data grams are switched between networks somewhat
transparently. Relay agents receive DHCP messages and then generate a new DHCP message
to send out on another interface.

Page | 61
DHCP Configuration Task List

The DHCP Server database is organized as a tree. The root of the tree is the address pool for
natural networks, branches are sub network address pools, and leaves are manual bindings to
clients. Sub networks inherit network parameters and clients inherit sub network parameters.
Therefore, common parameters, for example the domain name, should be configured at the
highest level of the tree.

Configuring Manual Bindings

An address binding is a mapping between the IP address and MAC address of a client. The IP
address of a client can be assigned manually by an administrator or assigned automatically
from a pool by a DHCP server.

Manual bindings are IP addresses that have been manually mapped to the MAC addresses of
hosts that are found in the DHCP database. Manual bindings are stored in NVRAM on the
DHCP server. Manual bindings are just special address pools. There is no limit on the
number of manual bindings,

Page | 62
but you can only
configure one manual binding per host pool.

Configuring the Number of Ping Packets


By default, the DHCP Server pings a pool address twice before assigning a particular address
to are questing client. If the ping is unanswered, the DHCP Server assumes (with a high
probability) that the address is not in use and assigns the address to the requesting client. To
change the number of ping packets the DHCP Server should send to the pool address before
assigning the address.

Page | 63
CONCLUSIONS: -

In this practical, we have study about to configure network using DHCP protocol.

Page | 64
PRACTICAL: - 10

Aim: Configure a Network using Distance Vector Routing protocol.

 RIP
Apparatus (Software): packet tracer software

Procedure:
1. Develop a Topology shown in figure given below.
3.Configure all Routers
4.Implement RIP protocols in Router to configure Network.

Page | 65
Router0 configuration.....

Continue with configuration dialog? [yes/no]: no

Press RETURN to get started!

Router>

Router>en
Router#config t

Enter configuration commands, one per line. End with CNTL/Z.

Router(config)#hostname router0

router0(config)#int lo0

%LINK‐5‐CHANGED: Interface Loopback0, changed state to up

%LINEPROTO‐5‐UPDOWN: Line protocol on Interface Loopback0, changed state to up router0(config‐


if)#ip address 10.1.1.1 255.255.255.0

router0(config‐if)#int f0/0

router0(config‐if)#ip address 10.1.12.1 255.255.255.0


router0(config‐if)#no shut

%LINK‐5‐CHANGED: Interface FastEthernet0/0, changed state to up


router0(config‐if)#int f0/1

router0(config‐if)#ip address 10.1.14.1 255.255.255.0


router0(config‐if)#no shut

%LINK‐5‐CHANGED: Interface FastEthernet0/1, changed state to up


router0(config‐if)#end

%SYS‐5‐CONFIG_I: Configured from console by console


router0#wr

Building configuration...
[OK]

router0#
router0#

%LINEPROTO‐5‐UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up

Page | 66
%LINEPROTO‐5‐UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to up

router0 con0 is now available

Press RETURN to get started.

router0>
router0>en
router0#config t

Enter configuration commands, one per line. End with CNTL/Z.


router0(config)#router rip

router0(config‐router)#net 10.0.0.0
router0(config‐router)#
router0(config‐router)#end

%SYS‐5‐CONFIG_I: Configured from console by console


router0#show ip route

Codes: C ‐ connected, S ‐ static, I ‐ IGRP, R ‐ RIP, M ‐ mobile, B ‐ BGP


D ‐ EIGRP, EX ‐ EIGRP external, O ‐ OSPF, IA ‐ OSPF inter area

N1 ‐ OSPF NSSA external type 1, N2 ‐ OSPF NSSA external type 2


E1 ‐ OSPF external type 1, E2 ‐ OSPF external type 2, E ‐ EGP

i ‐ IS‐IS, L1 ‐ IS‐IS level‐1, L2 ‐ IS‐IS level‐2, ia ‐ IS‐IS inter area

* ‐ candidate default, U ‐ per‐user static route, o ‐ ODR


P ‐ periodic downloaded static route

Gateway of last resort is not set

10.0.0.0/24 is subnetted, 3 subnets

C 10.1.1.0 is directly connected, Loopback0

C 10.1.12.0 is directly connected, FastEthernet0/0


C 10.1.14.0 is directly connected, FastEthernet0/1
router0#

router0#

Page | 67
Router1 Configuration.....

Continue with configuration dialog? [yes/no]: no

Press RETURN to get started!

Router>enable
Router#config t

Enter configuration commands, one per line. End with CNTL/Z.


Router(config)#int lo0

%LINK‐5‐CHANGED: Interface Loopback0, changed state to up

%LINEPROTO‐5‐UPDOWN: Line protocol on Interface Loopback0, changed state to up Router(config‐


if)#ip address 10.1.2.1 255.255.255.0

Router(config‐if)#no shut
Router(config‐if)#int f0/1

Router(config‐if)#ip address 10.1.23.1 255.255.255.0


Router(config‐if)#no shut

%LINK‐5‐CHANGED: Interface FastEthernet0/1, changed state to up


Router(config‐if)#int f0/0

Router(config‐if)#ip address 10.1.12.2 255.255.255.0


Router(config‐if)#no shut

%LINK‐5‐CHANGED: Interface FastEthernet0/0, changed state to up

%LINEPROTO‐5‐UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up


Router(config‐if)#end

%SYS‐5‐CONFIG_I: Configured from console by console


Router#wr

Building configuration...
[OK]

Router#
Router#
Router#

Page | 68
%LINEPROTO‐5‐UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to up

Router con0 is now available

Press RETURN to get started.

Router>
Router>en
Router#con t

% Ambiguous command: "con t"


Router#co t

% Ambiguous command: "co t"


Router#conf t

Enter configuration commands, one per line. End with CNTL/Z.


Router(config)#router rip

Router(config‐router)#net 10.0.0.0
Router(config‐router)# Router(config‐
router)# Router(config‐router)#end

%SYS‐5‐CONFIG_I: Configured from console by console


Router#

Router2 Configuration.....

Continue with configuration dialog? [yes/no]: no

Press RETURN to get started!

Router>en

Router#config t

Enter configuration commands, one per line. End with CNTL/Z.


Router(config)#int lo0

%LINK‐5‐CHANGED: Interface Loopback0, changed state to up

%LINEPROTO‐5‐UPDOWN: Line protocol on Interface Loopback0, changed state to up Router(config‐


if)#ip address 10.1.3.1 255.255.255.0

Page | 69
Router(config‐if)#no shut
Router(config‐if)#int f0/0

Router(config‐if)#ip address 10.1.23.2 255.255.255.0


Router(config‐if)#no shut

%LINK‐5‐CHANGED: Interface FastEthernet0/0, changed state to up

%LINEPROTO‐5‐UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up


Router(config‐if)#int f0/1

Router(config‐if)#ip address 10.1.34.1 255.255.255.0


Router(config‐if)#no shut

%LINK‐5‐CHANGED: Interface FastEthernet0/1, changed state to up


Router(config‐if)#End

%SYS‐5‐CONFIG_I: Configured from console by console

Router#wr

Building configuration...
[OK]

Router#
Router#
Router#

%LINEPROTO‐5‐UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to up

Router con0 is now available

Press RETURN to get started.

Router>
Router>
Router>en

Router#show ip route

Codes: C ‐ connected, S ‐ static, I ‐ IGRP, R ‐ RIP, M ‐ mobile, B ‐ BGP


D ‐ EIGRP, EX ‐ EIGRP external, O ‐ OSPF, IA ‐ OSPF inter area

N1 ‐ OSPF NSSA external type 1, N2 ‐ OSPF NSSA external type 2


E1 ‐ OSPF external type 1, E2 ‐ OSPF external type 2, E ‐ EGP

Page | 70
i ‐ IS‐IS, L1 ‐ IS‐IS level‐1, L2 ‐ IS‐IS level‐2, ia ‐ IS‐IS inter area

* ‐ candidate default, U ‐ per‐user static route, o ‐ ODR


P ‐ periodic downloaded static route

Gateway of last resort is not set

10.0.0.0/24 is subnetted, 3 subnets

C 10.1.3.0 is directly connected, Loopback0

C 10.1.23.0 is directly connected, FastEthernet0/0


C 10.1.34.0 is directly connected, FastEthernet0/1
Router#config t

Enter configuration commands, one per line. End with CNTL/Z.


Router(config)#router rip

Router(config‐router)#net 10.0.0.0 Router(config‐


router)#end

%SYS‐5‐CONFIG_I: Configured from console by console


Router#

* ‐ candidate default, U ‐ per‐user static route, o ‐ ODR


P ‐ periodic downloaded static route

Gateway of last resort is not set

10.0.0.0/24 is subnetted, 7 subnets

R 10.1.1.0 [120/2] via 10.1.23.1, 00:00:19, FastEthernet0/0

R 10.1.2.0 [120/1] via 10.1.23.1, 00:00:19, FastEthernet0/0

C 10.1.3.0 is directly connected, Loopback0

R 10.1.12.0 [120/1] via 10.1.23.1, 00:00:19, FastEthernet0/0

R 10.1.14.0 [120/2] via 10.1.23.1, 00:00:19, FastEthernet0/0

C 10.1.23.0 is directly connected, FastEthernet0/0

C 10.1.34.0 is directly connected,


FastEthernet0/1 Router#

Router#
Router#

Page | 71
Router3 Configuration.......

Continue with configuration dialog? [yes/no]: no

Press RETURN to get started!

Router>

Router>en
Router#config t

Enter configuration commands, one per line. End with CNTL/Z.


Router(config)#int lo0

%LINK‐5‐CHANGED: Interface Loopback0, changed state to up

%LINEPROTO‐5‐UPDOWN: Line protocol on Interface Loopback0, changed state to up Router(config‐


if)#int f0/0

Router(config‐if)#ip address 10.1.34.2 255.255.255.0


Router(config‐if)#no shut

%LINK‐5‐CHANGED: Interface FastEthernet0/0, changed state to up

Page | 72
%LINEPROTO‐5‐UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up
Router(config‐if)#

Router(config‐if)#int f0/1

Router(config‐if)#ip address 10.1.14.2 255.255.255.0


Router(config‐if)#no shut

%LINK‐5‐CHANGED: Interface FastEthernet0/1, changed state to up

%LINEPROTO‐5‐UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to up


Router(config‐if)#end

%SYS‐5‐CONFIG_I: Configured from console by console


Router#wr

Building configuration...
[OK]

Router#
Router#

Router#show ip route

Codes: C ‐ connected, S ‐ static, I ‐ IGRP, R ‐ RIP, M ‐ mobile, B ‐ BGP


D ‐ EIGRP, EX ‐ EIGRP external, O ‐ OSPF, IA ‐ OSPF inter area

N1 ‐ OSPF NSSA external type 1, N2 ‐ OSPF NSSA external type 2


E1 ‐ OSPF external type 1, E2 ‐ OSPF external type 2, E ‐ EGP

i ‐ IS‐IS, L1 ‐ IS‐IS level‐1, L2 ‐ IS‐IS level‐2, ia ‐ IS‐IS inter area

* ‐ candidate default, U ‐ per‐user static route, o ‐ ODR


P ‐ periodic downloaded static route

Gateway of last resort is not set

10.0.0.0/24 is subnetted, 2 subnets

C 10.1.14.0 is directly connected, FastEthernet0/1


C 10.1.34.0 is directly connected, FastEthernet0/0
Router#conf t

Enter configuration commands, one per line. End with CNTL/Z.


Router(config)#router rip

Router(config‐router)#net 10.0.0.0 Router(config‐


router)#
Page | 73
Router(config‐router)#end

%SYS‐5‐CONFIG_I: Configured from console by console


Router#show ip route

Codes: C ‐ connected, S ‐ static, I ‐ IGRP, R ‐ RIP, M ‐ mobile, B ‐ BGP


D ‐ EIGRP, EX ‐ EIGRP external, O ‐ OSPF, IA ‐ OSPF inter area

N1 ‐ OSPF NSSA external type 1, N2 ‐ OSPF NSSA external type 2


E1 ‐ OSPF external type 1, E2 ‐ OSPF external type 2, E ‐ EGP

i ‐ IS‐IS, L1 ‐ IS‐IS level‐1, L2 ‐ IS‐IS level‐2, ia ‐ IS‐IS inter area

* ‐ candidate default, U ‐ per‐user static route, o ‐ ODR


P ‐ periodic downloaded static route

Gateway of last resort is not set

10.0.0.0/24 is subnetted, 7 subnets

R 10.1.1.0 [120/1] via 10.1.14.1, 00:00:09, FastEthernet0/1

R 10.1.2.0 [120/2] via 10.1.34.1, 00:00:14, FastEthernet0/0

[120/2] via 10.1.14.1, 00:00:09, FastEthernet0/1

R 10.1.3.0 [120/1] via 10.1.34.1, 00:00:14, FastEthernet0/0

R 10.1.12.0 [120/1] via 10.1.14.1, 00:00:09, FastEthernet0/1

C 10.1.14.0 is directly connected, FastEthernet0/1

R 10.1.23.0 [120/1] via 10.1.34.1, 00:00:14, FastEthernet0/0

C 10.1.34.0 is directly connected,


FastEthernet0/0 Router#

CONCLUSION:
Configuration of a Network using Distance Vector Routing protocol and RIP Using
CISCO Packet Tracer Software

Page | 74
Page | 75

You might also like