You are on page 1of 39

ENGINEERING COLLEGE TUWA

(Approved by AICTE, New Delhi & Affiliated to GTU, Gujarat)

Computer Network
5th SEM (COMPUTER)
LAB MANUAL
SUBJECT CODE: - 3150710

NAME:
SUBJECT:
BRANCH: COMPUTER ENGINEERING
ENROLLMENT NO:
CERTIFICATE

This is to certify that Mr. /Ms. ____________________________________ Enrollment No.

______________________ of Computer Engineering Program has satisfactory completed

his/her term work in the course of Computer Network For Computer Engineering having

subject code 3150710 for academic year 2020-21.

Date:

Faculty Head of Department


Signature Signature & Stamp
CONTENTS
Sr. Date Title Sign
1 Study of different types of network
cables.
2 Practically implement the cross-wired
cable and straight through cable using
clamping tool.
3 Study of Network Devices in Detail.
4 Study of network IP.
5 Connect the computers in Local Area
Network.
6 Study of subnet planning and its
implementation.
7 Study of basic network command and
Network configuration commands.

8 Configure a Network topology using


packet tracer software.
9 Configure a Network using Distance
Vector Routing protocol.
10 Configure Network using Link State
Vector Routing protocol.
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

PRACTICAL-1

AIM: Study of different types of network cables.

Fiber optic cable, twisted pair cable, and coaxial cable are the three main types of
network cables used in communication systems. Each of them is different and suitable for
various applications

Fiber Optics Cable, is a high-speed data transmission medium, it contains tiny glass or
plastic threads that carry light beams. Because fiber optic cables transmit data via light
waves, they can transfer information at the speed of light. Not surprisingly, fiber optic
cables provide the fastest data transfer rates of any data transmission medium.

The optical fiber elements are typically individually coated with plastic layers and
contained in a protective tube suitable for the environment where the cable will be
deployed. All optical fibers use a core of hair-like transparent silicon covered with less
refractive indexed cladding to avoid light leakage to the surroundings. Due to the extreme
sensitivity of the optical fiber, it is normally covered with a lightweight and high-strength
protective material such as Kevlar.

What makes up a fiber-optic cable?

Fiber optic cables are made up of anywhere from two to several thousand strands of pure
glass, thinner than a human hair. These long glass threads are bundled into an optical fiber
cable with several distinct parts:

190553107005 Page 4
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

The core is the main part of the cable; it houses the glass fibers and is the pathway light
signals travel along.

The cladding is made of a different type of optical glass than the glass fibers, and it
reflects light pulses back inside the core. This material allows the single mode signals to
travel long distances without losing strength or quality.

A protective plastic coating wraps around the glass cladding.

Strengthening fibers (made of the same material used to create Kevlar vests) and a final
polyethylene layer protect the optical fibers from moisture or physical damage.

Multimode vs. single-mode fibers

There are two types of fiber-optic cables: single-mode fiber and multi-mode optical fiber.
Both rely on a light source to convert electrical information into pulses.

Single-mode fiber uses lasers to create the light pulses that travel long distances along a
narrow core measuring nine microns in diameter.

While multi-mode optical fiber uses LEDs as its light source and has a core with an
average diameter of fifty microns to accommodate larger glass fibers. The amount of light
signals passing through a multi-mode core is greater than in single-mode, allowing more
information to be transmitted at one time. Multi-mode fiber optics are best suited to
shorter distances and connect networks within one building. As a result the multi-mode
fiber is more commonly used than single-mode fiber options.

190553107005 Page 5
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

Twisted pair cables are widely used in the transferring information, especially over long
distances. The twist in the cable cancels out any magnetic interference that may develop
in the wiring. There are two common types of twisted pair cabling, STP and UTP. The S
represents Shielded, the U represents Unshielded, and the TP represents the twisted pair
for both.

Shielded vs. Unshielded twisted pair cables

The unshielded in UTP refers to the lack of metallic shielding around the copper wires.
By its very nature, the twisted-pair design helps minimize electronic interference by
providing balanced signal transmission, making a physical shield unnecessary.

The Unshielded twisted pair is the most commonly used in telephone cables, computer
networks, and even in video applications such as security cameras. UTP cables are
generally used in short lengths such as inside a building, or within a server room.

Unshielded Twisted Pairs cable is susceptible to radio and electrical frequency


interference. Though more expensive, Shielded Twisted Pair (STP) cables are a better
option. Shielded Twisted pair cables can also be useful in extending maximum distance of
cables. Shielded cable is available in three configurations:

 – Every pair of wire is separately shielded with foil


 – All wires having a braid shield inside the wire jacket
 – Each individual pair having a shield, besides having another around the whole
group of wires

In a shielded twisted pair (STP), the wires are enclosed in a shield that functions as a
grounding mechanism. This is done so it can provide a greater protection from
electromagnetic interference and radio Infrequency interference, allowing it to carry data at
a faster rate of speed.

Therefore, STP cable is often used in high end applications that require high bandwidth
and outdoor environments. UTP cable is often used in home, office and large scale
businesses

190553107005 Page 6
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

Coaxial Cable

Coaxial cable, or coax cable, is another type of copper cable which has an inner conductor surrounded by
foam insulation, symmetrically wrapped by a woven braided metal shield, then covered by in a plastic
jacket (as shown in the following image). This unique design allows coaxial cable runs to installed next
to metal objects such as gutters without the power losses that occur in other types of transmission lines.
The coaxial cable acts as a high-frequency transmission cable made up of a single solid copper core and
compared to twisted pair cable. It has 80 times or more transmission capability. This kind of cable is
mainly adopted in feedlines connecting radio transmitters and receivers with their antennas, computer
network connections, and distributing cable television signals.

190553107005 Page 7
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

PRACTICAL-2
AIM: practically implement the cross-wired cable and straight through cable using
clamping tool.

Apparatus (Components): RJ-45 connector, Clamping Tool, Twisted pair Cable

Procedure: To do these practical following steps should be done:

1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be
very careful at this point, as to not nick or cut into the wires, which are inside. Doing
so could alter the characteristics of your cable, or even worse render is useless. Check
the wires, one more time for nicks or cuts. If there are any, just whack the whole end
off, and start over.

2. Spread the wires apart, but be sure to hold onto the base of the jacket with your other
hand. You do not want the wires to become untwisted down inside the jacket.
Category 5 cable must only have 1/2 of an inch of 'untwisted' wire at the end;
otherwise it will be 'out of spec'. At this point, you obviously have ALOT more than
1/2 of an inch of un-twisted wire.

3. You have 2 end jacks, which must be installed on your cable. If you are using a pre-
made cable, with one of the ends whacked off, you only have one end to install - the
crossed over end. Below are two diagrams, which show how you need to arrange the
cables for each type of cable end. Decide at this point which end you are making and
examine the associated picture below.

190553107005 Page 8
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

Diagram shows you how to prepare Cross wired connection:

Diagram shows you how to prepare straight through wired connection:

190553107005 Page 9
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

PRACTICAL-3
AIM: Study of following Network Devices in Detail

• Repeater
• Hub
• Switch
• Bridge
• Router
• Gate Way

Apparatus (Software): No software or hardware needed.

Procedure: Following should be done to understand this practical.

1. Repeater: Functioning at Physical Layer .A repeater is an electronic device that


receives a signal and retransmits it at a higher level and/or higher power, or onto the other
side of an obstruction, so that the signal can cover longer distances. Repeater have two
ports, so cannot be use to connect for more than two devices

2. Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator is a
device for connecting multiple twisted pair or fiber optic Ethernet devices together and
making them act as a single network segment. Hubs work at the physical layer (layer 1) of
the OSI model. The device is a form of multiport repeater. Repeater hubs also participate
in collision detection, forwarding a jam signal to all ports if it detects a collision

3. Switch: A network switch or switching hub is a computer networking device that


connects network segments. The term commonly refers to a network bridge that processes
and routes data at the data link layer (layer 2) of the OSI model. Switches that additionally
process data at the network layer (layer 3 and above) are often referred to as Layer 3
switches or multilayer switches.

4. Bridge: A network bridge connects multiple network segments at the data link layer
(Layer 2) of the OSI model. In Ethernet networks, the term bridge formally means a
device that behaves according to the IEEE 802.1 D standards. A bridge and switch are
very much alike; a switch being a bridge with numerous ports. Switch or Layer 2 switch is
often used interchangeably with bridge. Bridges can analyze incoming data packets to
determine if the bridge is able to send the given packet to another segment of the network.

190553107005 Page 10
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

5. Router: A router is an electronic device that interconnects two or more computer


networks, and selectively interchanges packets of data between them. Each data packet
contains address information that a router can use to determine if the source and
destination are on the same network, or if the data packet must be transferred from one
network to another. Where multiple routers are used in a large collection of
interconnected networks, the routers exchange information about target system addresses,
so that each router can build up a table showing the preferred paths between any two
systems on the interconnected networks.

6. Gate Way: In a communications network, a network node equipped for interfacing


with another network that uses different protocols. •A gateway may contain devices such
as protocol translators, impedance matching devices, rate converters, fault isolators, or
signal translators as necessary to provide system interoperability. It also requires the
establishment of mutually acceptable administrative procedures between both networks.
• A protocol translation/mapping gateway interconnects networks with different network
protocol technologies by performing the required protocol conversions.

190553107005 Page 11
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

PRACTICAL-4
AIM: Study of network IP.

IP Address Classes:
IP addressing support five different address classes: A,B,C,D and E. only classes A,B and C
are available for commercial use.

Class A addresses

1. Class A address are designed for large organizations with a large number of hosts or
routers.
2. In this the first octet of the address identifies the network and the next three octets are
used to identify the host.
3. The first bit of first octet is always 0 and the remaining 7 bits are used to identify the
network address.
4. The next three octets i.e. 24 bits are used to identify the host.
5. The class support addresses from 0.0.0.0 to 0.255.255.255
6. The first block of network address start with 1.0.0.0 and the last block of network
address start with 127.0.0.0.
7. As there are 7 bits in network address, 27=128 blocks of network address are possible.
Out of these two network blocks are reserved. Hence total 126 address blocks are used.
8. Each network blocks can have 225--- 2 hosts I.E. 16,777,214 host address. Two
addresses are less as one address is reserved for the broadcast address and one address
is reserved for the network.
9. A block in class A is too large for almost any organization. This means most of the
addresses in class A are wasted and are not used.

Class B address

1. The class B addresses are designed for medium sized organizations with tens of
thousands of attached hosts or routers.
2. In this, the first two octets of the address identify the network and the next two octets
identify the host within the network.
3. The first two bits (high order bits) of first octet are always 1,0.thus the remaining 14 bits
identify the network.
4. The third and fourth octet I.e. 6bits are used to identify the host.
5. The first network block of this class covers the addresses from 128. 0.0.0 to
128.0.255.255(net ID 128.0).the last network block of this class covers addresses from
191.255.255. 255(net ID 191.255)
190553107005 Page 12
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

6. The maximum number of network blocks in class B is 214 =16384.


7. Each network block in class B can have 216--- 2=65,534 hosts.
8. A block in class B also very large and most of the address in class B is also wasted.

Class C address

1. The class C addresses is designed for small organizations with a small number of
attached hosts or routers.
2. In class C, the first three octets of address are used for network and the last octet is used
to identify the host.
3. The first three bits of first octet are always set to 1,1,0
4. The remaining 24-3=21 bits are used for network identification and only 8 bits are used
for host.
5. In class C, 221 =2, 097,152 network blocks are possible.
6. Thus, each block in class C address can have 28-2=254 hosts.
7. The first block of network covers the addresses from 192.0.0.0 to 192.0.0.255.thr last
block of network covers the addresses from 223.255.255.0 to 223.255.255.255
8. The class C addresses are too less for many organizations as it supports only 253 hosts
in a network.

Class D address

1. Class D addresses are used for multicast groups (multicasting)


2. The concepts of division of octets into network ID and host ID does not apply to class
D.
3. The first four bits of first octet in class F are always set to 1,1,1,0.
4. The address range is 224.0.0.0 to 239.255. 255.255

Class E address

1. The class E address is reserved for future use and is PRACTICAL.


2. The concept of network is and host id does not apply on class E also.
3. The first four bits of first octet are always set to 1,1,1,1.
4. The address range for class E is 240.0.0.0 to 255.255.255.255.

190553107005 Page 13
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

Apparatus (Software): NA

Procedure: Following is required to be study under this practical.


 Classification of IP address
As show in figure we teach how the ip addresses are classified and when they are used.

Class Address Range Supports


Class A 1.0.0.1 to 126.255.255.254 254Supports 16 million hosts
on each of 127 networks

Class B 128.1.0.1 to 191.255.255.254 Supports 65,000 hosts on each


of 16,000 networks.
Class c 192.0.1.1 to 223.255.254.254 254 hosts on each of 2 million
networks.
Class D 224.0.0.0 to 239.255.255.255 255Reserved for multicast
groups. Class
Class E 240.0.0.0 to 254.255.255.254 Reserved

•Sub netting
why we Develop sub netting and How to calculate subnet mask and how to identify
subnet address.
•Super netting
why we develop super netting and How to calculate super net mask and how to identify
super net address.

190553107005 Page 14
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

PRACTICAL-5

AIM: Connect the computers in Local Area Network.

Procedure: On the host computer

On the host computer, follow these steps to share the Internet connection:

1. Log on to the host computer as Administrator or as Owner.


2. Click Start, and then click Control Panel.
3. Click Network and Internet Connections.
4. Click Network Connections.
5. Right-click the connection that you use to connect to the Internet. For example, if you
connect to the Internet by using a modem, right-click the connection that you want under
Dial-up / other network available.
6. Click Properties.
7. Click the Advanced tab.

8. Under Internet Connection Sharing, select the Allow other network users to connect
through this computer's Internet connection check box.

9. If you are sharing a dial-up Internet connection, select the Establish a dial-up
connection whenever a computer on my network attempts to access the Internet
check box if you want to permit your computer to automatically connect to the Internet.

10. Click OK. You receive the following message:

When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP
address 192.168.0.1. Your computer may lose connectivity with other computers on your
network. If these other computers have static IP addresses, it is a good idea to set them to
obtain their IP addresses automatically. Are you sure you want to enable Internet
Connection Sharing?

11. Click Yes. The connection to the Internet is shared to other computers on the local
area network (LAN).

The network adapter that is connected to the LAN is configured with a static IP address
of 192.168.0.1 and a subnet mask of 255.255.255.0
On the client computer
190553107005 Page 15
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

To connect to the Internet by using the shared connection, you must confirm the LAN
adapter IP configuration, and then configure the client computer. To confirm the LAN
adapter IP configuration, follow these steps:

1. Log on to the client computer as Administrator or as Owner.


2. Click Start, and then click Control Panel.

3. Click Network and Internet Connections.


4. Click Network Connections.
5. Right-click Local Area Connection and then click Properties.
6. Click the General tab, click Internet Protocol (TCP/IP) in the connection uses the
following items list, and then clicks Properties.
7. In the Internet Protocol (TCP/IP) Properties dialog box, click Obtain an IP address
automatically (if it is not already selected), and then click OK.

Note: You can also assign a unique static IP address in the range of 192.168.0.2 to
192.168.0.254. For example, you can assign the following static IP address, subnet mask,
and default gateway:

8. IP Address 192.168.31.202 9. Subnet mask 255.255.255.0

10. Default gateway 192.168.31.1

11. In the Local Area Connection Properties dialog box, click OK.

12. Quit Control Panel.

190553107005 Page 16
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

PRACTICAL-6

AIM: Study of subnet planning and its implementation.

Subnet Mask

A subnet mask is a 32-bit value written as four octets. In the subnet mask, each bit
determines how the corresponding bit in the IP address should be interpreted (network,
subnet, or host). The subnet mask bits are coded as follows:

Binary 1 for the network bits

Binary 1 for the subnet bits


Binary 0 for the host bits
Although dotted decimal is the most common format, the
subnet can be represented in several ways:
Dotted decimal—172.16.0.0 255.255.0.0
Bit count—172.16.0.0/16
Hexadecimal—172.16.0.0 0xFFFF0000
The ip net mask-format command can be used to specify the format of network masks
for the current session. Dotted decimal is the default.

Implement Subnet Planning

Subnetting decisions should always be based on growth estimates rather than current
needs. To plan a subnet, follow these steps:
190553107005 Page 17
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

1. Determine the number of subnets and hosts for each subnet required.
2. The address class you are assigned and the number of subnets required determines
the number of subnetting bits used. For example, with a Class C address and a need
for 20 subnets, you will have a 29-bit mask (255.255.255.248). This allows for the

Class C default 24-bit mask and 5 bits required for 20 subnets. (The formula 2n – 2
yields only 14 subnets for 4 bits, so 5 bits must be used.)

3. The remaining bits in the last octet are used for the host field. In this case, each
subnet has 23 – 2, or 6 hosts.

4. The final host addresses are a combination of the network/subnet plus each host
value. The hosts on the 192.168.5.32 subnet would be addressed as 192.168.5.33,
192.168.5.34, 192.168.5.35, and so forth

Implementing Subnet Planning Summary

 Breaking up networks into smaller segments (or subnets)


improves network efficiency and conserves IP addresses.
 A 32-bit subnet mask determines the boundary between the
subnet host portions of the IP address using 1s and 0s.
 A subnet defines a broadcast domain in a routed network.
 Cisco IOS Software supports directed, local network,
and subnet broadcasts.
 Subnet planning should be based on future growth predictions
rather than current needs. Continue on to the Configuring IP
Addresses Article

190553107005 Page 18
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

PRACTICAL-7

AIM: Study of basic network command and Network configuration

commands. Apparatus (Software): Command Prompt And Packet Tracer.

Procedure: To do this EXPERIMENT- follows these steps:

In this EXPERIMENT- students have to understand basic networking commands e.g


ping, tracert etc.

All commands related to Network configuration which includes how to switch to


privilege mode and normal mode and how to configure router interface and how to save
this configuration to flash memory or permanent memory.

This commands includes


• Configuring the Router commands
• General Commands to configure network
• Privileged Mode commands of a router
• Router Processes & Statistics
• IP Commands
• Other IP Commands e.g. show ip route etc.

Ping: ping (8) sends an ICMP ECHO_REQUEST packet to the specified host. If the host
responds, you get an ICMP packet back. Sound strange? Well, you can “ping” an IP
address to see if a machine is alive. If there is no response, you know something is wrong.

190553107005 Page 19
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

Trace route: Tracer is a command which can show you the path a packet of information
takes from your computer to one you specify. It will list all the routers it passes through
until it reaches its destination, or fails to and is discarded. In addition to this, it will tell
you how long each 'hop' from router to router takes.

Ns lookup: Displays information from Domain Name System (DNS) name servers.
NOTE: If you write the command as above it shows as default your pc's server name
firstly.

190553107005 Page 20
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

Path ping: A better version of tracert that gives you statics about packet lost and latency.

Getting Help:

In any command mode, you can get a list of available commands by entering a question
mark (?).

Router>?

To obtain a list of commands that begin with a particular character sequence, type in
those characters followed immediately by the question mark (?).

Router#co?

configure connect copy To list keywords or arguments, enter a question mark in place of a
keyword or argument. Include a space before the question mark.

Router#configure ?

Memory Configure from NV memory.


Network Configure from a TFTP network host
Terminal Configure from the terminal
You can also abbreviate commands and keywords by entering just enough characters to
make the command unique from other commands. For example, you can abbreviate the
show command to sh

Configuration Files

Any time you make changes to the router configuration, you must save the changes to
memory because if you do not they will be lost if there is a system reload or power
outage. There are two types of configuration files: the running (current operating)
configuration and the start-up configuration.
Use the following privileged mode commands to work with configuration files.
• configure terminal – modify the running configuration manually from the terminal.
• show running-config – display the running configuration.
• show startup-config – display the startup configuration.
• copy running-config startup-config – copy the running configuration to the startup
configuration.
• copy startup-config running-config – copy the startup configuration to the running

190553107005 Page 21
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

configuration.
• erase startup-config – erase the startup-configuration in NVRAM.
• copy tftp running-config – load a configuration file stored on a Trivial File Transfer
Protocol (TFTP) server into the running configuration.
• copy running-config tftp – store the running configuration on a TFTP server.

IP Address Configuration

Take the following steps to configure the IP address of an interface

. Step 1: Enter privileged EXEC mode:

Router>enable password

Step 2: Enter the configure terminal command to enter global configuration mode.

Router#config terminal

Step 3: Enter the interface type slot/port (for Cisco 7000 series) or interface type port (for
Cisco 2500 series) to enter the interface configuration mode.

Example: Router (config)#interface Ethernet 0/1

Step 4: Enter the IP address and subnet mask of the interface using the ip address
ipaddress subnet mask command.

Example, Router (config-if)#ip address 192.168.10.1 255.255.255.0

Step 5: Exit the configuration mode by pressing Ctrl-Z Router(config-if)#[Ctrl-Z]

190553107005 Page 22
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

PRACTICAL-8

AIM: Configure a Network topology using packet tracer software.

Apparatus (Software): Packet tracer Software Procedure: To implement this practical


following network topology is required to be configured using the commands learned in
previous practical. After configuring the given network a packet should be ping from any
one machine to another.

Router0 Configuration Command :.........

Continue with configuration dialog? [yes/no]: no

Press RETURN to get started!

Router>

Router>Enable

Router#config t

Enter configuration commands, one per line. End with CNTL/Z.


Router(config)#hostname router0

router0(config)#interface fastethernet 0/0

190553107005 Page 23
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

router0(config-if)#ip address 192.168.1.1 255.255.255.0

router0(config-if)#description router0 fastethernet 0/0

router0(config-if)#no shutdown

%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up

router0(config-if)#exit

router0(config)#interface fastethernet 0/1

router0(config-if)#description router0 fastethernet 0/1

router0(config-if)#no shutdown

%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up

router0(config-if)#exit

router0(config)#exit

%SYS-5-CONFIG_I: Configured from console by console

router0#show running-config

Building configuration...

Current configuration : 437 bytes

version 12.4

no service password-encryption

hostname router0 !

190553107005 Page 24
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
!
!
!
!
ip ssh version 1
!
!
interface FastEthernet0/0 description

router0 fastethernet 0/0

ip address 192.168.1.1 255.255.255.0

duplex auto

speed auto

!
interface FastEthernet0/1 description

router0 fastethernet 0/1 no ip address

duplex auto

speed auto

!
interface Vlan1

no ip address

shutdown
!
ip classless

!
!
!
!
!

190553107005 Page 25
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
line con 0
line vty 0 4
login
!
!
End
router0#
router0#
router0#copy running-config startup-config
Destination filename [startup-config]?
Building configuration...
[OK]
router0#

190553107005 Page 26
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

PRACTICAL-9

AIM: Configure a Network using Distance Vector Routing protocol.

•RIP

Apparatus (Software): packet tracer software Procedure:


1. Develop a Topology shown in figure given below.
2. Configure all Routers.
3. Implement RIP protocols in Router to configure Network.

Router0configuration.....

Continue with configuration dialog? [Yes/no]: no

Press RETURN to get started!

Router>

Router>en

Router#config t
190553107005 Page 27
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

Enter configuration commands, one per line. End with CNTL/Z.

Router(config)#host name router0

router0(config)#intlo0

%LINK‐5‐CHANGED: Interface Loop back0, changed state to up

%LINEPROTO‐5‐UPDOWN: Line protocol on Interface Loopback0,changed state to up


router0(config‐if)#ip address10.1.1.1255.255.255.0

router0(config‐if)#intf0/0

router0(config‐if)#ip address10.1.12.1255.255.255.0

router0(config‐if)#no shut

%LINK‐5‐CHANGED:InterfaceFastEthernet0/0, changed state to up

router0(config‐if)#intf0/1

router0(config‐if)#ipaddress10.1.14.1255.255.255.0

router0(config‐if)#noshut

%LINK‐5‐CHANGED:InterfaceFastEthernet0/1, changed state to up

router0(config‐if)#end

%SYS‐5‐CONFIG_I:Configured from console by console

router0#wr

Building configuration...

[OK]

router0#

190553107005 Page 28
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
router0#

%LINEPROTO‐5‐UPDOWN:Line protocol on Interface FastEthernet0/0, changed state to


up

%LINEPROTO‐5‐UPDOWN:LineprotocolonInterfaceFastEthernet0/1, changed
State to up

router0 con0 is now available

Press RETURN to get started.

router0>

router0>en

router0#configt

Enter configuration commands, one per line. End with CNTL/Z.

router0(config)#routerrip

router0(config‐router)#net10.0.0.0

router0(config‐router)#

router0(config‐router)#end

%SYS‐5‐CONFIG_I: Configured from console by console

router0#show ip route

Codes: C ‐ connected, S ‐ static, I ‐ IGRP, R ‐ RIP,M ‐ mobile ,B ‐ BGP


D ‐ EIGRP, EX ‐ EIGRPexternal, O ‐ OSPF, IA ‐ OSPF inter area
N1 ‐ OSPFNSSAexternaltype1, N2 ‐ OSPFNSSAexternaltype2
E1 ‐ OSPFexternaltype1, E2 ‐ OSPFexternaltype2, E ‐ EGP
i ‐ IS‐IS,L1 ‐ IS‐ISlevel‐1,L2 ‐ IS‐ISlevel‐2,ia ‐ IS‐IS inter area
* ‐ candidate default, U ‐ per‐user static route, o ‐ ODR
P ‐ periodic downloaded static route

190553107005 Page 29
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
Gateway of last resort is not set

10.0.0.0/24issubnetted,3subnets

C10.1.1.0isdirectlyconnected, Loopback0
C10.1.12.0isdirectlyconnected,FastEthernet0/0
C10.1.14.0isdirectlyconnected,FastEthernet0/1router0

#router0
#router0

#Router1Configuration.....

Continue with configuration dialog?[yes/no]:no

Press RETURN to getstarted !

Router>enable

Router#configt

Enter configuration commands, one per line. End with CNTL/Z.

Router(config)#intlo0

%LINK‐5‐CHANGED:InterfaceLoopback0,changed statetoup

%LINEPROTO‐5‐UPDOWN:LineprotocolonInterfaceLoopback0,changed state to up

Router(config‐if)#ipaddress10.1.2.1255.255.255.0

Router(config‐if)#noshut

Router(config‐if)#intf0/1

Router(config‐if)#ipaddress10.1.23.1255.255.255.0

Router(config‐if)#noshut

190553107005 Page 30
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

%LINK‐5‐CHANGED:InterfaceFastEthernet0/1,changed state to up

Router(config‐if)#intf0/0

Router(config‐if)#ipaddress10.1.12.2255.255.255.0

Router(config‐if)#noshut

%LINK‐5‐CHANGED:InterfaceFastEthernet0/0,changed state to up

%LINEPROTO‐5‐UPDOWN:LineprotocolonInterfaceFastEthernet0/0,changed state to
up

Router(config‐if)#end

%SYS‐5‐CONFIG_I:Configured from console by console

Router#wr

Building configuration...

[OK]

Router#
Router#
Router#
%LINEPROTO‐5‐UPDOWN:LineprotocolonInterfaceFastEthernet0/1,changed
State to up

Router con0 is now available

Press RETURN to get started.

Router>
Router>en
Router#con t

190553107005 Page 31
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

%Ambiguouscommand:"cont"
Router#cot
%Ambiguouscommand:"cot"
Router#conft
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#routerrip
Router(config‐router)#net10.0.0.0
Router(config‐ router)#
Router(config‐ router)#
Router(config‐ router)#end

%SYS‐ 5‐ CONFIG_I:Configured from console by console


Router#

Router2Configuration.....

Continue with configuration dialog?[yes/no]:no

Press RETURN to get started!

Router>en

Router#configt

Enter configuration commands, one per line. End with CNTL/Z.

Router(config)#intlo0

%LINK-5-CHANGED: Interface Loop back0, changed state to up


%LINEPROTO-5-UPDOWN: Line protocol on Interface Loop back0, changed state to up
Router(config-if)#ip address10.1.3.1255.255.255.0
Router(config-if)#ip no shut
Router(config-if)#int f0/0
Router(config-if)#ip address10.1.23.2.255.255.255.0
Router(config-if)#ip no shut,
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state

190553107005 Page 32
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

to up
Router(config-if)# intf0/1
Router(config-if)# ipaddress10.1.34.1255.255.255.0
Router(config‐ if)#noshut

%LINK-5-CHANGED: Interface FastEthernet0/1,changed state to up


Router(config-if)#End
%SYS-5-CONFIG_I: Configured from console by console

Router#wr
Building configuration...
[OK]
Router#
Router#
Router#
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state
to up

Router con0 is now available


Press RETURN to get started.
Router>
Router>
Router>en
Router#show ip route

Codes:C – connected s - static,I - IGRP,R - RIP,M - mobile,B - BGPD - EIGRP,EX -


EIGRPexternal,O - OSPF,IA - OSPFinterareaN1 – OSPFNSSA external type1,N2 –
OSPFNSSA external type2E1 - OSPFexternaltype1,E2 -OSPFexternaltype2,E - EGPi -
IS‐ IS,L1 – IS-ISlevel-1,L2 – IS-ISlevel-2,ia –IS-IS inter area* - candidate default, U –
per-user static route,o -ODR
P –periodic downloaded static route

Gate way of last resort is not set

10.0.0.0/24issubnetted,3subnets
C 10.1.3.0isdirectlyconnected, Loopback0
C10.1.23.0isdirectlyconnected,FastEthernet0/0
C10.1.34.0isdirectlyconnected,FastEthernet0/1
Router#configt
190553107005 Page 33
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

Enter configuration commands, one per line. End with CNTL/Z.


Router(config)#router rip
Router(config‐ router)#net10.0.0.0
Router(config‐ router)#end
%SYS‐ 5‐ CONFIG_I:Configured from console by console
Router#
Router#
Router#Show ip route
Codes:C - connected,S - static,I - IGRP,R - RIP,M - mobile,B - BGPD - EIGRP,EX -
EIGRPexternal,O - OSPF,IA - OSPFinterareaN1 – OSPFNSSA external type1,N2 –
OSPFNSSAexternal type2E1 - OSPFexternaltype1,E2 - OSPFexternaltype2,E - EGPi –
IS-IS,L1 – IS-ISlevel-1,L2 – IS-ISlevel-2,ia – IS-IS inter area* - candidate default,U –
per- user static route,o - ODR
P –periodic downloaded static route

Gate way of last resort is not set

10.0.0.0/24issubnetted,7subnets
R10.1.1.0[120/2]via10.1.23.1,00:00:19,FastEthernet0/0
R10.1.2.0[120/1]via10.1.23.1,00:00:19,FastEthernet0/0
C10.1.3.0isdirectlyconnected, Loopback0
R10.1.12.0[120/1]via10.1.23.1,00:00:19,FastEthernet0/0
R10.1.14.0[120/2]via10.1.23.1,00:00:19,FastEthernet0/0C10.1.23.0isdirectlyconnected,Fa
stEthernet0/0
C10.1.34.0isdirectlyconnected,FastEthernet0/1

Router#
Router#
Router#

Router3Configuration.......

Continue with configuration dialog?[yes/no]:no


Press RETURN to get started!

Router>
Router>en
Router#config t
190553107005 Page 34
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

Enter configuration commands, one per line. End with CNTL/Z.


Router(config)#intlo0

%LINK-5-CHANGED: Interface Loopback0, changed state to up


%LINEPROTO-5-UPDOWN: Line protocol on Interface Loopback0, changed state to up
Router(config-if)#intf0/0
Router(config-if)#ipaddress10.1.34.2255.255.255.0
Router(config-if)#noshut

%LINK-5-CHANGED:InterfaceFastEthernet0/0,changed state to up
%LINEPROTO‐ 5‐ UPDOWN:LineprotocolonInterfaceFastEthernet0/0, changd state to
up
Router(config-if)#
Router(config-if)#intf0/1
Router(config-if)#ipaddress10.1.14.2255.255.255.0
Router(config-if)#noshut

%LINK-5-CHANGED:Interface FastEthernet0/1,changed state to up


%LINEPROTO-5-UPDOWN:Line protocol on Interface FastEthernet0/1,changed state to
up
Router(config‐ if)#end
%SYS-5-CONFIG_I:Configured from console by console

Router#wr

Building configuration...

[OK]
Router#
Router#
Router#

Show ip route

Codes:C - connected,S - static,I - IGRP,R - RIP,M - mobile,B - BGPD - EIGRP,EX -


EIGRPexternal,O - OSPF,IA - OSPFinterareaN1 -OSPFNSSAexternaltype1,N2 -
OSPFNSSAexternaltype2E1 - OSPFexternaltype1,E2 - OSPFexternaltype2,E - EGPi -
190553107005 Page 35
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

IS‐ IS,L1 – IS-ISlevel-1,L2 – IS-ISlevel-2,ia – IS-IS inter area* - candidate default,U –


per-user static route 0 - ODR
P – Periodic downloaded static route

Gateway of last resort is not set

10.0.0.0/24issubnetted,2subnets
C10.1.14.0isdirectlyconnected,FastEthernet0/1
C10.1.34.0isdirectlyconnected,FastEthernet0/0
Router#conft
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#router rip
Router(config-router)#net10.0.0.0
Router(config-router)#
Router(config-router)#end

%SYS-5-CONFIG_I:Configured from console by console


Router#show ip route
Codes:C - connected,S - static,I - IGRP,R - RIP,M - mobile,B - BGPD - EIGRP,EX -
EIGRPexternal,O - OSPF,IA - OSPFinterareaN1 - OSPFNSSAexternaltype1,N2 -
OSPFNSSAexternaltype2E1 -OSPFexternaltype1,E2 - OSPFexternaltype2,E - EGPi -
IS‐ IS,L1 – IS-ISlevel-1,L2 – IS-ISlevel-2,ia – IS-IS inter area* - candidate default,U –
per-user static route,o ‐ ODR

P –periodic downloaded static route

Gate way of last resort is not set.

/24issubnetted,7subnets R10.1.1.0[120/1]via10.1.14.1,00:00:09,FastEthernet0/1
R10.1.2.0[120/2]via10.1.34.1,00:00:14,FastEthernet0/0[120/2]via10.1.14.1,00:00:09,
FastEthernet0/1
R10.1.3.0[120/1]via10.1.34.1,00:00:14,FastEthernet0/0
R10.1.12.0[120/1]via10.1.14.1,00:00:09,FastEthernet0/1
C10.1.14.0isdirectlyconnected,FastEthernet0/1
R10.1.23.0[120/1]via10.1.34.1,00:00:14,FastEthernet0/0
C10.1.34.0isdirectlyconnected,FastEthernet0/0

Router#
190553107005 Page 36
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

PRACTICAL-10

AIM: Configure Network using Link State Vector Routing protocol.

•OSPF

Apparatus (Software):

1. Packet Tracer Software Procedure:


2. . Develop a Topology shown in figure given below. Configure all the workstations
3. Configure all switches
4. Configure all Routers
5. Implement OSPF protocols in Router to configure Network.

Router 1: Do the basic configuration of your routers, Switches and computer. Set the ip
address for each interfaces the same as screenshot. The diagram is classes ip addresses and
sub-net too many networks. So its means you must familiar with ip sub-net and VLSM.

R1>enable
R1# configure terminal
Enter configuration commands, One per line. End with CNTL/Z.
R1 ( Config)#interface serial 1/3.
R1(Config-if)#ip address 20.10.10.1 255.255.255.252
R1(Config-if)#no shutdown
R1(Config-if)#exit

190553107005 Page 37
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
R1(Config)#
R1(Config)#interfaces serial 1/1
R1(Config-if)#ip address 10.10.10.1 255.255.255.252
R1(Config-if)#clock rate 64000
R1(Config-if)#no shut down
R1(Config-if)#exite
R1(Config)#
R1(Config)#interface serial 1/0
R1(Config-if)#ip address 10.10.10.5 255.255.255.252
R1(Config-if)#clock rate 64000
R1(Config-if)#no shut down

Router 2:Do the following configuration for router 2.

R2(config)#interface serial 1/0


R2(Config-if)#ip address 10.10.10.6 255.255.255.252
R2(Config-if)#no shut down
R2(Config-if)#exite
R2(Config)#interface fast Ethernet 0/0
R2(Config-if)#ip address 192.168.10.1 255.255.255.0
R2(Config-if)#no shut down

Router 3:Now try to set ip address for router 3 interfaces also.

Router#enable
Router#configure terminal
Enter configuration command, One per line. End with CNTL/Z.
Router(config)#hostname R3
R3(Config)#interfaces serial 1/0
R3(Config-if)#ip address 10.10.10.2 255.255.255.252
R3(Config-if)#no shut down
R3(Config-if)#exite
R3(Config)#interface fast Ethernet 0/0
R3(Config-if)#ip address 192.168.1.1 255.255.255.0
R3(Config-if)#no shut down

In the router R1 configure OSFP Routing with router ospf command.

190553107005 Page 38
ENGINEERING COLLAGE, TUWA Computer Network (3150710)

1>enable
R1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.

R1(Config)#router ospf 1
R1(Config-router)#network 20.10.10.0 0.0.0.3 area 0
R1(Config-router)#network 10.10.10.0 0.0.0.3 area 0
R1(Config-router)#network 10.10.10.0 0.0.0.3 area 0
R1(Config-router)#

The router OSPF command is enable OSPF routing on the router, And the 1 before OSFP is
the process ID of the OSFP protocol. You can set Different process id from “1-65535” for
each router.

The network command with network ID “network 20.10.10.0” is the network identifier, And
the “0.0.0.3” is the wild card mask of 20.10.10.0 network.Wild card mask determine which
interfaces to advertise, Because OSPF advertise interfaces, Not networks.

Now got to router R3 and configure with the following commands.

R3>enable
R3#configure terminal
Enter configuration command, One per line. End with CNTL/Z.
R3(Config)#router ospf 1
R3(Config-router)#network 192.168.1.0 0.0.0.255 area 0
R3(Config-router)#network 10.10.10.0 0.0.0.3 area 0

R2>enable
R2#configure terminal
Enter configuration commands, One per line. End withj CNTL/Z.
R2(Config)#router ospf 1
R2(Config-router)#network 192.168.10.0 0.0.0.3 area 0
R2(Config-router)#network 10.10.10.4 0.0.0.3 area 0

190553107005 Page 39

You might also like