You are on page 1of 25

Experiment Number: 08 Date: 08/05/2022

Statement:

Study of TCP & UDP Performance DNS, FTP, WEB & Email
multi server configuration using Cisco packet tracer.

Theory: Ideal settings for TCP (transmission control protocol) and UDP (user
datagram protocol) performance vary depending on network settings and requirements.
TCP and UDP were designed to do the same thing in two different ways, the former
being designed for stability (never lose a packet), and the latter for speed. With TCP,
your application will effectively stop all transfers in order to recover the lost segment,
whereas UDP expects the application to either ignore the loss, or just queue up the lost
segment while all the other segments continue. In a Multi-server, all the server
methods/protocols (DNS, EMAIL, FTP, SMTP etc.) are run together. Basically, it’s a one
server replacement for all the different servers that we were using in the previous
experiments.

Items used: Switch-PT switch, Server-PT server (configured as a multi server), PC-PT PC’s
and Laptop-PT Laptops.

Procedure:

• At first, the network is made by installing the required media (Laptop-PT


Laptop, PC-PT PCs, Switch-PT switch and Server-PT server).
• The Multiserver (Server-PT) is configured to host Email, FTP and HTTP service.
The DNS is configured accordingly.

• All the PC’s and Laptops are added to the Email and FTP configuration with unique
Id and passwords.

• To check TCP and UDP performance, we use nslookup (for DNS config), login
to ftp and download a file (for FTP config), open the website (for HTTP config)
and send and receive an email (for Email config) in the simulation mode. Also,
in the
multiserver command prompt…we ping the address 192.168.11.1 to check TCP
and UDP performance.

• Finally, the PDU in realtime mode is matched with the packet transfer history
in simulation mode for network verification.
Network Figure:

WEB configuration: DNS configuration:


EMAIL configuration: FTP configuration:

Email receiving:
TCP and UDP simulations:

Real time packet transfer:

Conclusion: A multiserver (DNS, DHCP, FTP, WEB and EMAIL) was created
successfully and was used to study to TCP and UDP performance of the network.

Student’s signature Teacher’s signature


Experiment Number: 09 Date: 16/05/2022

Statement: VLAN Configuration in Cisco Packet Tracer

Theory: VLANs (Virtual LANs) are logical grouping of devices in the same
broadcast domain. VLANs are usually configured on switches by placing some
interfaces into one broadcast domain and some interfaces into another. Each VLAN acts
as a subgroup of the switch ports in an Ethernet LAN. VLANs can spread across
multiple switches, with each VLAN being treated as its own subnet or broadcast
domain. This means that frames broadcasted onto the network will be switched only
between the ports within the same VLAN. A VLAN acts like a physical LAN, but it
allows hosts to be grouped together in the same broadcast domain even if they are not
connected to the same switch.

Network Figure:

There is a main Switch (Switch0) to which 6 PCs are connected. PC0 to PC8
has IP addresses starting from 192.168.0.1 and ending to 192.168.0.6. PC0,
PC1 and PC2 are associated with First_VLAN; PC3, PC4 and PC5 are
associated with Second_VLAN.
Switch Configuration:

Pinging PCs in same VLAN (PC0 to PC2)


Pinging PCs in different VLAN (PC2 to PC6)

Conclusion: The VLAN configuration is successful and PCs in same VLAN can
communicate with each other but with PCs in different VLAN. All the lab work is
done on Cisco Packet Tracer.

Student’s signature Teacher’s signature


Experiment Number: 10 Date:

16/05/2022Statement: TELNET Configuration in Cisco Packet Tracer

Theory: Telnet is an application protocol used on the Internet or local area


network to provide a bidirectional interactive text-oriented communication
facilityusing a virtual terminal connection. User data is interspersed in-band
with Telnet control information in an 8-bit byte-oriented data connection over
the Transmission Control Protocol (TCP). Telnet was developed in 1969
beginning with RFC 15, extended in RFC 855, and standardized as Internet
Engineering Task Force (IETF) Internet Standard STD 8, one of the first Internet
standards. The name stands for "teletype network". Historically, Telnet
providedaccess to a command-line interface on a remote host. However,
because of serious security concerns when using Telnet over an open network
such as the Internet, its use for this purpose has waned significantly in favour of
SSH. The term telnet is also used to refer to the software that implements the
client part ofthe protocol. Telnet client applications are available for virtually all
computer platforms. Telnet is also used as a verb. To telnet means to establish
a connection using the Telnet protocol, either with a command line client or with
agraphical interface. For example, a common directive might be: "To change
your password, telnet into the server, log in and run the passwd command." In
most cases, a user would be telnetting into a Unix-like server system or a
network device (such as a router).

Procedure:
• At first, the network is made by installing the required media (Laptop-
PTLaptop, PC-PT PCs, 2950-24 switch).
• IP addresses are assigned to all the devices connected to the 2950-24
switch including the admin laptop (However, assigning ip address to rest
of the devices is not necessary)
• The CLI interface of the 2950-24 switch is configured to set up the
TELNET network with a login password(“cn@assgn10”) and also to
access the Privilege mode of the switch in the administrator laptop we
assign a password(“admin@1234”).
• Finally, the TELNET network config was verified from the admin laptop
cmd prompt.
Network Figure:

Switch Configuration:
TELNET network login from LaptopAdmin

TELNET command to shutdown FastEthernet 0/3 port (PC1) PC1 connection to switch turned off (FastEthernet0/3)

Realtime Packet Transfers

Conclusion: Th The TELNET configuration in Cisco Packet Tracer is successfully implemented.

Student’s signature Teacher’s signature


Experiment Number: 11 Date: 27/05/2022

Statement: Configuration of VPN using Cisco Packet

Theory: A virtual private network (VPN) extends a private network across a


public network and enables users to send and receive data across shared or
public networks as if their computing devices were directly connected to the
private network. The benefits of a VPN include increases in functionality,
security, and management of the private network. It provides access to
resources that are inaccessible on the public network and is typically used for
remote workers. Encryption is common, although not an inherent part of a VPN
connection.
A VPN is created by establishing a virtual point-to-point connection
through the use of dedicated circuits or with tunnelling protocols over existing
networks. A VPN available from the public Internet can provide some of the
benefits of a wide area network (WAN). From a user perspective, the resources
available within the private network can be accessed remotely.

Network Figure:

Three routers (Router1, Router0 and Router2) are connected in a bus topology.
PC0 is connected with Router1 and PC1 is connected with Router2. There are four
physical networks – 192.168.0.0/24 between Router1 and PC0, 10.20.30.0/8
between Router0 and Router1, 20.30.40.0/8 between Router0 and Router2 and
192.168.1.0/24 between Router2 and PC1. There is also a VPN between Router1
and Router2, that is 50.60.70.0/16.
Router0 Configuration:
In Router0, only Gig0/0 and Gig0/1 are configured. No routing is done in Router0.

Router1 Configuration:
In Router1, at first Gig0/0 and Gig0/1 are assigned an IP each. Then tunnel 1 is
created with IP 50.60.70.1. The tunnel source is Gig0/1 and destination
20.30.40.1. Finally, a route is configured for the tunnel to communicate with the
local network.
Router2 Configuration:

In Router2, at first Gig0/0 and Gig0/1 are assigned an IP each. Then tunnel 2 is
created with IP 50.60.70.2. The tunnel source is Gig0/0 and destination
10.20.30.1. Finally, a route is configured for the tunnel to communicate with the
local network.
Checking VPN Connection:
Pinging PC1 from PC0:
Tracing Route Between PC0 and PC1:

It is seen that, from PC0 to PC1 the first hop is 192.168.0.1, that is Gig0/0 of Router1.
The second hop is 50.60.70.2, that is the IP address of tunnel 2 and the third hop is
192.168.1.2, that is PC1. So, the tunnel network is used for communication hence, the
VPN is configured properly.

Conclusion: The VPN is configured successfully and it is functional. All the lab work is
done on Cisco Packet Tracer.

Student’s signature Teacher’s signature


Experiment Number: 12 Date: 27/05/2022

Statement: Configuration of VoIP using Cisco Packet Tracer

Theory: Voice over Internet Protocol (VoIP), also called IP telephony, is a


method and group of technologies for the delivery of voice communications and
multimedia sessions over Internet Protocol (IP) networks, such as the Internet.
The terms Internet telephony, broadband telephony, and broadband phone
service specifically refer to the provisioning of communications services (voice,
fax, SMS, voice-messaging) over the Internet, rather than via the public
switched telephone network (PSTN), also known as plain old telephone service
(POTS).
Network Figure:
Router Configuration:

In the router, at first an IP is assigned for Fa0/0. Then a DHCP pool VOICE is created to
assign IP addresses to the IP Phones. Then the telephony-service is configured with
maximum 10 IP Phones. Lastly, all the IP Phones are assigned with a dial number.
Switch Configuration:

In the switch, Fast-Ethernet ports 0/1 to 0/5 are given access to vlan 1 for voice.
Checking VoIP Configuration by Placing Calls:
Calling IP Phone0 to IP Phone2:

Calling IP Phone1 to IP Phone0:

Conclusion: All the phones are able to call other phones, hence VoIP is successfully
configured. All the lab work is done on Cisco Packet Tracer.

Student’s signature Teacher’s signature


Experiment Number: 13 Date: 30/05/2022

Statement: How to configure DSL Modem in Cisco packet tracer

Theory: A digital subscriber line (DSL) modem is a device used to connect


a computer or router to a telephone line which provides the digital subscriber
line (DSL) service for connection to the Internet, which is often called DSL broadband.
The modem connects to a single computer or router, through an Ethernet port, USB
port, or is installed in a computer PCI slot. The more common DSL router is a
standalone device that combines the function of a DSL modem and a router, and can
connect multiple computers through multiple Ethernet ports or an integral wireless
access point. Also called a residential gateway, a DSL router usually manages the
connection and sharing of the DSL service in a home or small office network. Different
DSL routers and modems support different DSL technology variants: VDSL, SDSL,
and ADSL. A DSL router consists of a box with an RJ11 jack to connect to a standard
subscriber telephone line. It has several RJ45 jacks for Ethernet cables to connect it
to computers or printers, creating a local network. It usually also has a USB jack
which can be used to connect to computers via a USB cable, to allow connection to
computers without an Ethernet port. A wireless DSL router also has antennas to allow
it to act as a wireless access point, so computers can connect to it forming a wireless
network. Power is usually supplied by a cord from a wall wart transformer.

Network Figure: the network is made by installing the required media and
proper connections are made (PC-PT PCs, Laptop-PT Laptops, Cloud-PT
cloud, Hub-PT Hub, DSL Modem, Switch-PT switch).
Cloud 0 DSL config Cloud0 Eth6 config

Pings:
PC0 to PC3
PC1 to Laptop0

Realtime Messages

Conclusion: The DSL Modem was successfully configured and tested in Cisco Packet
Tracer.

Student’s signature Teacher’s signature


Experiment Number: 14 Date: 30/05/2022

Statement: How to configure ACL in Cisco packet tracer

Theory: A network access control list (ACL) is an optional layer of security for
your VPC that acts as a firewall for controlling traffic in and out of one or more
subnets. You might set up network ACLs with rules similar to your security groups in
order to add an additional layer of security to your VPC. There are two basic kinds
of ACLs:
Filesystem ACLs: These work as filters, managing access to directories or
files. A filesystem ACL gives the operating system instructions as to the users
that are allowed to access the system, as well as the privileges they are
entitled to once they are inside.
Networking ACLs: Networking ACLs manage access to a network. To do
this, they provide instructions to switches and routers as to the kinds of traffic
that areallowed to interface with the network. They also dictate what each
user or devicecan do once they are inside.
When ACLs were first conceived, they worked like firewalls, blocking access to
unwanted entities. While many firewalls have network access control functions, some
organizations still use ACLs with technologies such as virtual private networks
(VPNs). In this way, an administrator can dictate which kinds of traffic get encrypted
and then sent through the secure tunnel of the VPN.

Network Figur
Router0 Config(ACL config) Router1 Config

Pings:
PC0 pings (before and after ACL setup) PC1 pings (before and after ACL setup)
Laptop0 pings (before and after ACL setup)

Realtime Messages (After ACL config, Laptop0 is always denied connection)

Conclusion: The ASL Configuration was successfully applied and tested in Cisco PacketTracer.

Student’s signature Teacher’s signature

You might also like