Professional Documents
Culture Documents
Computer Network
5th SEM (COMPUTER)
LAB MANUAL
SUBJECT CODE: - 3150710
NAME:
SUBJECT:
BRANCH: COMPUTER ENGINEERING
ENROLLMENT NO:
CERTIFICATE
his/her term work in the course of Computer Network For Computer Engineering having
Date:
PRACTICAL-1
Fiber optic cable, twisted pair cable, and coaxial cable are the three main types of
network cables used in communication systems. Each of them is different and suitable for
various applications
Fiber Optics Cable, is a high-speed data transmission medium, it contains tiny glass or
plastic threads that carry light beams. Because fiber optic cables transmit data via light
waves, they can transfer information at the speed of light. Not surprisingly, fiber optic
cables provide the fastest data transfer rates of any data transmission medium.
The optical fiber elements are typically individually coated with plastic layers and
contained in a protective tube suitable for the environment where the cable will be
deployed. All optical fibers use a core of hair-like transparent silicon covered with less
refractive indexed cladding to avoid light leakage to the surroundings. Due to the extreme
sensitivity of the optical fiber, it is normally covered with a lightweight and high-strength
protective material such as Kevlar.
Fiber optic cables are made up of anywhere from two to several thousand strands of pure
glass, thinner than a human hair. These long glass threads are bundled into an optical fiber
cable with several distinct parts:
190553107005 Page 4
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
The core is the main part of the cable; it houses the glass fibers and is the pathway light
signals travel along.
The cladding is made of a different type of optical glass than the glass fibers, and it
reflects light pulses back inside the core. This material allows the single mode signals to
travel long distances without losing strength or quality.
Strengthening fibers (made of the same material used to create Kevlar vests) and a final
polyethylene layer protect the optical fibers from moisture or physical damage.
There are two types of fiber-optic cables: single-mode fiber and multi-mode optical fiber.
Both rely on a light source to convert electrical information into pulses.
Single-mode fiber uses lasers to create the light pulses that travel long distances along a
narrow core measuring nine microns in diameter.
While multi-mode optical fiber uses LEDs as its light source and has a core with an
average diameter of fifty microns to accommodate larger glass fibers. The amount of light
signals passing through a multi-mode core is greater than in single-mode, allowing more
information to be transmitted at one time. Multi-mode fiber optics are best suited to
shorter distances and connect networks within one building. As a result the multi-mode
fiber is more commonly used than single-mode fiber options.
190553107005 Page 5
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
Twisted pair cables are widely used in the transferring information, especially over long
distances. The twist in the cable cancels out any magnetic interference that may develop
in the wiring. There are two common types of twisted pair cabling, STP and UTP. The S
represents Shielded, the U represents Unshielded, and the TP represents the twisted pair
for both.
The unshielded in UTP refers to the lack of metallic shielding around the copper wires.
By its very nature, the twisted-pair design helps minimize electronic interference by
providing balanced signal transmission, making a physical shield unnecessary.
The Unshielded twisted pair is the most commonly used in telephone cables, computer
networks, and even in video applications such as security cameras. UTP cables are
generally used in short lengths such as inside a building, or within a server room.
In a shielded twisted pair (STP), the wires are enclosed in a shield that functions as a
grounding mechanism. This is done so it can provide a greater protection from
electromagnetic interference and radio Infrequency interference, allowing it to carry data at
a faster rate of speed.
Therefore, STP cable is often used in high end applications that require high bandwidth
and outdoor environments. UTP cable is often used in home, office and large scale
businesses
190553107005 Page 6
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
Coaxial Cable
Coaxial cable, or coax cable, is another type of copper cable which has an inner conductor surrounded by
foam insulation, symmetrically wrapped by a woven braided metal shield, then covered by in a plastic
jacket (as shown in the following image). This unique design allows coaxial cable runs to installed next
to metal objects such as gutters without the power losses that occur in other types of transmission lines.
The coaxial cable acts as a high-frequency transmission cable made up of a single solid copper core and
compared to twisted pair cable. It has 80 times or more transmission capability. This kind of cable is
mainly adopted in feedlines connecting radio transmitters and receivers with their antennas, computer
network connections, and distributing cable television signals.
190553107005 Page 7
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
PRACTICAL-2
AIM: practically implement the cross-wired cable and straight through cable using
clamping tool.
1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be
very careful at this point, as to not nick or cut into the wires, which are inside. Doing
so could alter the characteristics of your cable, or even worse render is useless. Check
the wires, one more time for nicks or cuts. If there are any, just whack the whole end
off, and start over.
2. Spread the wires apart, but be sure to hold onto the base of the jacket with your other
hand. You do not want the wires to become untwisted down inside the jacket.
Category 5 cable must only have 1/2 of an inch of 'untwisted' wire at the end;
otherwise it will be 'out of spec'. At this point, you obviously have ALOT more than
1/2 of an inch of un-twisted wire.
3. You have 2 end jacks, which must be installed on your cable. If you are using a pre-
made cable, with one of the ends whacked off, you only have one end to install - the
crossed over end. Below are two diagrams, which show how you need to arrange the
cables for each type of cable end. Decide at this point which end you are making and
examine the associated picture below.
190553107005 Page 8
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
190553107005 Page 9
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
PRACTICAL-3
AIM: Study of following Network Devices in Detail
• Repeater
• Hub
• Switch
• Bridge
• Router
• Gate Way
2. Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator is a
device for connecting multiple twisted pair or fiber optic Ethernet devices together and
making them act as a single network segment. Hubs work at the physical layer (layer 1) of
the OSI model. The device is a form of multiport repeater. Repeater hubs also participate
in collision detection, forwarding a jam signal to all ports if it detects a collision
4. Bridge: A network bridge connects multiple network segments at the data link layer
(Layer 2) of the OSI model. In Ethernet networks, the term bridge formally means a
device that behaves according to the IEEE 802.1 D standards. A bridge and switch are
very much alike; a switch being a bridge with numerous ports. Switch or Layer 2 switch is
often used interchangeably with bridge. Bridges can analyze incoming data packets to
determine if the bridge is able to send the given packet to another segment of the network.
190553107005 Page 10
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
190553107005 Page 11
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
PRACTICAL-4
AIM: Study of network IP.
IP Address Classes:
IP addressing support five different address classes: A,B,C,D and E. only classes A,B and C
are available for commercial use.
Class A addresses
1. Class A address are designed for large organizations with a large number of hosts or
routers.
2. In this the first octet of the address identifies the network and the next three octets are
used to identify the host.
3. The first bit of first octet is always 0 and the remaining 7 bits are used to identify the
network address.
4. The next three octets i.e. 24 bits are used to identify the host.
5. The class support addresses from 0.0.0.0 to 0.255.255.255
6. The first block of network address start with 1.0.0.0 and the last block of network
address start with 127.0.0.0.
7. As there are 7 bits in network address, 27=128 blocks of network address are possible.
Out of these two network blocks are reserved. Hence total 126 address blocks are used.
8. Each network blocks can have 225--- 2 hosts I.E. 16,777,214 host address. Two
addresses are less as one address is reserved for the broadcast address and one address
is reserved for the network.
9. A block in class A is too large for almost any organization. This means most of the
addresses in class A are wasted and are not used.
Class B address
1. The class B addresses are designed for medium sized organizations with tens of
thousands of attached hosts or routers.
2. In this, the first two octets of the address identify the network and the next two octets
identify the host within the network.
3. The first two bits (high order bits) of first octet are always 1,0.thus the remaining 14 bits
identify the network.
4. The third and fourth octet I.e. 6bits are used to identify the host.
5. The first network block of this class covers the addresses from 128. 0.0.0 to
128.0.255.255(net ID 128.0).the last network block of this class covers addresses from
191.255.255. 255(net ID 191.255)
190553107005 Page 12
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
Class C address
1. The class C addresses is designed for small organizations with a small number of
attached hosts or routers.
2. In class C, the first three octets of address are used for network and the last octet is used
to identify the host.
3. The first three bits of first octet are always set to 1,1,0
4. The remaining 24-3=21 bits are used for network identification and only 8 bits are used
for host.
5. In class C, 221 =2, 097,152 network blocks are possible.
6. Thus, each block in class C address can have 28-2=254 hosts.
7. The first block of network covers the addresses from 192.0.0.0 to 192.0.0.255.thr last
block of network covers the addresses from 223.255.255.0 to 223.255.255.255
8. The class C addresses are too less for many organizations as it supports only 253 hosts
in a network.
Class D address
Class E address
190553107005 Page 13
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
Apparatus (Software): NA
•Sub netting
why we Develop sub netting and How to calculate subnet mask and how to identify
subnet address.
•Super netting
why we develop super netting and How to calculate super net mask and how to identify
super net address.
190553107005 Page 14
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
PRACTICAL-5
On the host computer, follow these steps to share the Internet connection:
8. Under Internet Connection Sharing, select the Allow other network users to connect
through this computer's Internet connection check box.
9. If you are sharing a dial-up Internet connection, select the Establish a dial-up
connection whenever a computer on my network attempts to access the Internet
check box if you want to permit your computer to automatically connect to the Internet.
When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP
address 192.168.0.1. Your computer may lose connectivity with other computers on your
network. If these other computers have static IP addresses, it is a good idea to set them to
obtain their IP addresses automatically. Are you sure you want to enable Internet
Connection Sharing?
11. Click Yes. The connection to the Internet is shared to other computers on the local
area network (LAN).
The network adapter that is connected to the LAN is configured with a static IP address
of 192.168.0.1 and a subnet mask of 255.255.255.0
On the client computer
190553107005 Page 15
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
To connect to the Internet by using the shared connection, you must confirm the LAN
adapter IP configuration, and then configure the client computer. To confirm the LAN
adapter IP configuration, follow these steps:
Note: You can also assign a unique static IP address in the range of 192.168.0.2 to
192.168.0.254. For example, you can assign the following static IP address, subnet mask,
and default gateway:
11. In the Local Area Connection Properties dialog box, click OK.
190553107005 Page 16
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
PRACTICAL-6
Subnet Mask
A subnet mask is a 32-bit value written as four octets. In the subnet mask, each bit
determines how the corresponding bit in the IP address should be interpreted (network,
subnet, or host). The subnet mask bits are coded as follows:
Subnetting decisions should always be based on growth estimates rather than current
needs. To plan a subnet, follow these steps:
190553107005 Page 17
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
1. Determine the number of subnets and hosts for each subnet required.
2. The address class you are assigned and the number of subnets required determines
the number of subnetting bits used. For example, with a Class C address and a need
for 20 subnets, you will have a 29-bit mask (255.255.255.248). This allows for the
Class C default 24-bit mask and 5 bits required for 20 subnets. (The formula 2n – 2
yields only 14 subnets for 4 bits, so 5 bits must be used.)
3. The remaining bits in the last octet are used for the host field. In this case, each
subnet has 23 – 2, or 6 hosts.
4. The final host addresses are a combination of the network/subnet plus each host
value. The hosts on the 192.168.5.32 subnet would be addressed as 192.168.5.33,
192.168.5.34, 192.168.5.35, and so forth
190553107005 Page 18
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
PRACTICAL-7
Ping: ping (8) sends an ICMP ECHO_REQUEST packet to the specified host. If the host
responds, you get an ICMP packet back. Sound strange? Well, you can “ping” an IP
address to see if a machine is alive. If there is no response, you know something is wrong.
190553107005 Page 19
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
Trace route: Tracer is a command which can show you the path a packet of information
takes from your computer to one you specify. It will list all the routers it passes through
until it reaches its destination, or fails to and is discarded. In addition to this, it will tell
you how long each 'hop' from router to router takes.
Ns lookup: Displays information from Domain Name System (DNS) name servers.
NOTE: If you write the command as above it shows as default your pc's server name
firstly.
190553107005 Page 20
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
Path ping: A better version of tracert that gives you statics about packet lost and latency.
Getting Help:
In any command mode, you can get a list of available commands by entering a question
mark (?).
Router>?
To obtain a list of commands that begin with a particular character sequence, type in
those characters followed immediately by the question mark (?).
Router#co?
configure connect copy To list keywords or arguments, enter a question mark in place of a
keyword or argument. Include a space before the question mark.
Router#configure ?
Configuration Files
Any time you make changes to the router configuration, you must save the changes to
memory because if you do not they will be lost if there is a system reload or power
outage. There are two types of configuration files: the running (current operating)
configuration and the start-up configuration.
Use the following privileged mode commands to work with configuration files.
• configure terminal – modify the running configuration manually from the terminal.
• show running-config – display the running configuration.
• show startup-config – display the startup configuration.
• copy running-config startup-config – copy the running configuration to the startup
configuration.
• copy startup-config running-config – copy the startup configuration to the running
190553107005 Page 21
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
configuration.
• erase startup-config – erase the startup-configuration in NVRAM.
• copy tftp running-config – load a configuration file stored on a Trivial File Transfer
Protocol (TFTP) server into the running configuration.
• copy running-config tftp – store the running configuration on a TFTP server.
IP Address Configuration
Router>enable password
Step 2: Enter the configure terminal command to enter global configuration mode.
Router#config terminal
Step 3: Enter the interface type slot/port (for Cisco 7000 series) or interface type port (for
Cisco 2500 series) to enter the interface configuration mode.
Step 4: Enter the IP address and subnet mask of the interface using the ip address
ipaddress subnet mask command.
190553107005 Page 22
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
PRACTICAL-8
Router>
Router>Enable
Router#config t
190553107005 Page 23
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
router0(config-if)#no shutdown
router0(config-if)#exit
router0(config-if)#no shutdown
router0(config-if)#exit
router0(config)#exit
router0#show running-config
Building configuration...
version 12.4
no service password-encryption
hostname router0 !
190553107005 Page 24
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
!
!
!
!
ip ssh version 1
!
!
interface FastEthernet0/0 description
duplex auto
speed auto
!
interface FastEthernet0/1 description
duplex auto
speed auto
!
interface Vlan1
no ip address
shutdown
!
ip classless
!
!
!
!
!
190553107005 Page 25
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
line con 0
line vty 0 4
login
!
!
End
router0#
router0#
router0#copy running-config startup-config
Destination filename [startup-config]?
Building configuration...
[OK]
router0#
190553107005 Page 26
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
PRACTICAL-9
•RIP
Router0configuration.....
Router>
Router>en
Router#config t
190553107005 Page 27
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
router0(config)#intlo0
router0(config‐if)#intf0/0
router0(config‐if)#ip address10.1.12.1255.255.255.0
router0(config‐if)#no shut
router0(config‐if)#intf0/1
router0(config‐if)#ipaddress10.1.14.1255.255.255.0
router0(config‐if)#noshut
router0(config‐if)#end
router0#wr
Building configuration...
[OK]
router0#
190553107005 Page 28
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
router0#
%LINEPROTO‐5‐UPDOWN:LineprotocolonInterfaceFastEthernet0/1, changed
State to up
router0>
router0>en
router0#configt
router0(config)#routerrip
router0(config‐router)#net10.0.0.0
router0(config‐router)#
router0(config‐router)#end
router0#show ip route
190553107005 Page 29
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
Gateway of last resort is not set
10.0.0.0/24issubnetted,3subnets
C10.1.1.0isdirectlyconnected, Loopback0
C10.1.12.0isdirectlyconnected,FastEthernet0/0
C10.1.14.0isdirectlyconnected,FastEthernet0/1router0
#router0
#router0
#Router1Configuration.....
Router>enable
Router#configt
Router(config)#intlo0
%LINK‐5‐CHANGED:InterfaceLoopback0,changed statetoup
%LINEPROTO‐5‐UPDOWN:LineprotocolonInterfaceLoopback0,changed state to up
Router(config‐if)#ipaddress10.1.2.1255.255.255.0
Router(config‐if)#noshut
Router(config‐if)#intf0/1
Router(config‐if)#ipaddress10.1.23.1255.255.255.0
Router(config‐if)#noshut
190553107005 Page 30
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
%LINK‐5‐CHANGED:InterfaceFastEthernet0/1,changed state to up
Router(config‐if)#intf0/0
Router(config‐if)#ipaddress10.1.12.2255.255.255.0
Router(config‐if)#noshut
%LINK‐5‐CHANGED:InterfaceFastEthernet0/0,changed state to up
%LINEPROTO‐5‐UPDOWN:LineprotocolonInterfaceFastEthernet0/0,changed state to
up
Router(config‐if)#end
Router#wr
Building configuration...
[OK]
Router#
Router#
Router#
%LINEPROTO‐5‐UPDOWN:LineprotocolonInterfaceFastEthernet0/1,changed
State to up
Router>
Router>en
Router#con t
190553107005 Page 31
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
%Ambiguouscommand:"cont"
Router#cot
%Ambiguouscommand:"cot"
Router#conft
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#routerrip
Router(config‐router)#net10.0.0.0
Router(config‐ router)#
Router(config‐ router)#
Router(config‐ router)#end
Router2Configuration.....
Router>en
Router#configt
Router(config)#intlo0
190553107005 Page 32
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
to up
Router(config-if)# intf0/1
Router(config-if)# ipaddress10.1.34.1255.255.255.0
Router(config‐ if)#noshut
Router#wr
Building configuration...
[OK]
Router#
Router#
Router#
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state
to up
10.0.0.0/24issubnetted,3subnets
C 10.1.3.0isdirectlyconnected, Loopback0
C10.1.23.0isdirectlyconnected,FastEthernet0/0
C10.1.34.0isdirectlyconnected,FastEthernet0/1
Router#configt
190553107005 Page 33
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
10.0.0.0/24issubnetted,7subnets
R10.1.1.0[120/2]via10.1.23.1,00:00:19,FastEthernet0/0
R10.1.2.0[120/1]via10.1.23.1,00:00:19,FastEthernet0/0
C10.1.3.0isdirectlyconnected, Loopback0
R10.1.12.0[120/1]via10.1.23.1,00:00:19,FastEthernet0/0
R10.1.14.0[120/2]via10.1.23.1,00:00:19,FastEthernet0/0C10.1.23.0isdirectlyconnected,Fa
stEthernet0/0
C10.1.34.0isdirectlyconnected,FastEthernet0/1
Router#
Router#
Router#
Router3Configuration.......
Router>
Router>en
Router#config t
190553107005 Page 34
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
%LINK-5-CHANGED:InterfaceFastEthernet0/0,changed state to up
%LINEPROTO‐ 5‐ UPDOWN:LineprotocolonInterfaceFastEthernet0/0, changd state to
up
Router(config-if)#
Router(config-if)#intf0/1
Router(config-if)#ipaddress10.1.14.2255.255.255.0
Router(config-if)#noshut
Router#wr
Building configuration...
[OK]
Router#
Router#
Router#
Show ip route
10.0.0.0/24issubnetted,2subnets
C10.1.14.0isdirectlyconnected,FastEthernet0/1
C10.1.34.0isdirectlyconnected,FastEthernet0/0
Router#conft
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#router rip
Router(config-router)#net10.0.0.0
Router(config-router)#
Router(config-router)#end
/24issubnetted,7subnets R10.1.1.0[120/1]via10.1.14.1,00:00:09,FastEthernet0/1
R10.1.2.0[120/2]via10.1.34.1,00:00:14,FastEthernet0/0[120/2]via10.1.14.1,00:00:09,
FastEthernet0/1
R10.1.3.0[120/1]via10.1.34.1,00:00:14,FastEthernet0/0
R10.1.12.0[120/1]via10.1.14.1,00:00:09,FastEthernet0/1
C10.1.14.0isdirectlyconnected,FastEthernet0/1
R10.1.23.0[120/1]via10.1.34.1,00:00:14,FastEthernet0/0
C10.1.34.0isdirectlyconnected,FastEthernet0/0
Router#
190553107005 Page 36
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
PRACTICAL-10
•OSPF
Apparatus (Software):
Router 1: Do the basic configuration of your routers, Switches and computer. Set the ip
address for each interfaces the same as screenshot. The diagram is classes ip addresses and
sub-net too many networks. So its means you must familiar with ip sub-net and VLSM.
R1>enable
R1# configure terminal
Enter configuration commands, One per line. End with CNTL/Z.
R1 ( Config)#interface serial 1/3.
R1(Config-if)#ip address 20.10.10.1 255.255.255.252
R1(Config-if)#no shutdown
R1(Config-if)#exit
190553107005 Page 37
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
R1(Config)#
R1(Config)#interfaces serial 1/1
R1(Config-if)#ip address 10.10.10.1 255.255.255.252
R1(Config-if)#clock rate 64000
R1(Config-if)#no shut down
R1(Config-if)#exite
R1(Config)#
R1(Config)#interface serial 1/0
R1(Config-if)#ip address 10.10.10.5 255.255.255.252
R1(Config-if)#clock rate 64000
R1(Config-if)#no shut down
Router#enable
Router#configure terminal
Enter configuration command, One per line. End with CNTL/Z.
Router(config)#hostname R3
R3(Config)#interfaces serial 1/0
R3(Config-if)#ip address 10.10.10.2 255.255.255.252
R3(Config-if)#no shut down
R3(Config-if)#exite
R3(Config)#interface fast Ethernet 0/0
R3(Config-if)#ip address 192.168.1.1 255.255.255.0
R3(Config-if)#no shut down
190553107005 Page 38
ENGINEERING COLLAGE, TUWA Computer Network (3150710)
1>enable
R1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R1(Config)#router ospf 1
R1(Config-router)#network 20.10.10.0 0.0.0.3 area 0
R1(Config-router)#network 10.10.10.0 0.0.0.3 area 0
R1(Config-router)#network 10.10.10.0 0.0.0.3 area 0
R1(Config-router)#
The router OSPF command is enable OSPF routing on the router, And the 1 before OSFP is
the process ID of the OSFP protocol. You can set Different process id from “1-65535” for
each router.
The network command with network ID “network 20.10.10.0” is the network identifier, And
the “0.0.0.3” is the wild card mask of 20.10.10.0 network.Wild card mask determine which
interfaces to advertise, Because OSPF advertise interfaces, Not networks.
R3>enable
R3#configure terminal
Enter configuration command, One per line. End with CNTL/Z.
R3(Config)#router ospf 1
R3(Config-router)#network 192.168.1.0 0.0.0.255 area 0
R3(Config-router)#network 10.10.10.0 0.0.0.3 area 0
R2>enable
R2#configure terminal
Enter configuration commands, One per line. End withj CNTL/Z.
R2(Config)#router ospf 1
R2(Config-router)#network 192.168.10.0 0.0.0.3 area 0
R2(Config-router)#network 10.10.10.4 0.0.0.3 area 0
190553107005 Page 39