You are on page 1of 50

1802153 Computer Networking

COMPUTER NETWORKING
PRACTICAL FILE

Bachelor of Technology
In
Computer Science & Engineering
Of IKG Punjab Technical University, Jalandhar

SUBMITTED TO: SUBMITTED BY :


Ms Malvika Kaushik Priya Matia
CSE 5Y1
(1802153)

Chandigarh Engineering College


Landran , Mohali - 140307
1|Page
1802153 Computer Networking

INDEX

Sr.No Name of Experiment Page No Signature


1 To study different types of network cables 3-10
and network topologies
2 Practically implement and test the cross- 11-14
wired cable and straight through cable
using clamping tool and network lab cable
tester

3 Study and familiarization with various 15-17


network devices.

4 Familiarization with Packet Tracer 18-19


Simulation tool/any other related tool.
5 Study and Implementation of IP Addressing 20-24
Schemes

6 Creation of Simple Networking topologies 25-27


using hubs and switches
7 Simulation of web traffic in Packet Tracer 28-29

8 Study and implementation of various router 30-32


configuration commands
9 Creation of Networks using routers 33-36
10 Networks using the concept of subnetting 37-42
11 Practical implementation of basic network 43-44
command and Network configuration
commands like ping, ipconfig, netstat,
tracert etc. for troubleshooting network
related problem

12 Configuration of networks using static and 45-48


default routes

2|Page
1802153 Computer Networking

EXPERIMENT NO. 1

❖ OBJECTIVE:
To study the different types of Network cables and network topologies

❖ APPARATUS:
Desktop, Laptop.

❖ DESCRIPTION:
Types of Topology:-
1. Bus Topology
2. Ring Topology
3. Star Topology
4. Mesh Topology
5. Tree Topology
6. Hybrid Topology

1. Bus Topology
Bus Topology is the simplest of network topologies. In this type of topology, all the
nodes are connected to the single cable (called bus), by the help of interface
connectors. This central cable is the backboneof the network and is known as Bus (thus
the name). Every workstation communicates with the other device through this Bus.

2. Ring Topology
In Ring Topology, all the nodes are connected to each-other in such a way that they
3|Page
1802153 Computer Networking

make a closed loop Each workstation is connected to two other components on


either side, and it communicates with these two adjacent neighbors. Data travels
around the network, in one direction. Sending and receiving of data takes place by
the help of TOKEN.

3. Star topology

In Star topology, all the components of network are connected to the central device
called “hub” which may be a hub, nodes were connected to central cable, here all the
workstations are connected to central device with a point-to-point connection. So it can
be said that every computer is indirectly connected to every other node”. by the help of
“hub

4|Page
1802153 Computer Networking

4. Mesh Topology
In a mesh network topology, each of the network node, computer and other
devices, are interconnected with one another. Every node not only sends
its own signals but also relays data from other nodes. In fact a true mesh
topology is the one where every node is connected to every other node in
the network. This type of topology is very expensive as there are many
redundant connections, thus it is not mostly used in computer networks. It
is commonly used in wireless networks. Flooding or routing technique is
used in mesh topology.

5. Tree Topology
Tree Topology integrates the characteristics of Star and Bus Topology. Earlier we saw
how in Physical Star network Topology, computers (nodes) are connected by each other

5|Page
1802153 Computer Networking

through central hub. And we also saw in Bus Topology, work station devices are
connected by the common cable called Bus. After understanding these two network
configurations, we can understand tree topology better. In Tree Topology, the numbers
of Star networks are connected using Bus. This main cable seems like a main stem of a
tree, and other star networks as the branches. It is also called Expanded Star
Topology. Ethernet protocol is commonly used in this type of topology. The diagram
below will make it clear.

6. Hybrid Topology
Before starting about Hybrid topology, we saw that a network topology is a
connection of various links and nodes, communicating with each other for transfer
of data. We also saw various advantages and disadvantages of Star, Bus, Ring,
Mesh and Tree topologies.Now lets discuss what Hybrid Network topology is and
why it finds its application in Wide Area Networks..For example, if there exists a
ring topology in one office department while a bus topology in another
department, connecting these two will result in Hybrid topology. Remember
connecting two similar topologies cannot be termed as Hybrid topology. Star-Ring
and Star-Bus networks are most common examples of hybrid network.
Let's see the benefits and drawbacks of this networking architecture

6|Page
1802153 Computer Networking

Simulation:

❖ Network Cable Types and Specifications


To connect two or more computers or networking devices in a network, network
cables are used. There are three types of network cables; coaxial, twisted-pair, and
fiber-optic.

▪ Coaxial cable
This cable contains a conductor, insulator, braiding, and sheath. The sheath covers
the braiding, braiding covers the insulation, and the insulation covers the conductor.

The following image shows these components.

7|Page
1802153 Computer Networking

Fig 1.9 Coaxial Cable


✓ Sheath
This is the outer layer of the coaxial cable. It protects the cable from physical damage.

✓ Braided shield
This shield protects signals from external interference and noise. This shield is built from
the same metal that is used to build the core.

✓ Insulation
Insulation protects the core. It also keeps the core separate from the braided-shield.
Since both the core and the braided-shield use the same metal, without this layer, they
will touch each other and create a short-circuit in the wire.

✓ Conductor
The conductor carries electromagnetic signals. Based on conductor a coaxial cable can
be categorized into two types; single-core coaxial cable and multi-core coaxial cable.

A single-core coaxial cable uses a single central metal (usually copper) conductor,
while a multi-core coaxial cable uses multiple thin strands of metal wires. The following
image shows both types of cable.

Coaxial cables in computer networks


The coaxial cables were not primarily developed for the computer network. These
cables were developed for general purposes. They were in use even before computer
networks came into existence. They are still used even their use in computer networks
has been completely discontinued.

At the beginning of computer networking, when there were no dedicated media cables
available for computer networks, network administrators began using coaxial cables to
build computer networks.

Because of low-cost and long durability, coaxial cables were used in computer
networking for nearly two decades (80s and 90s). Coaxial cables are no longer used to
build any type of computer network.

Specifications of coaxial cables


Coaxial cables have been in use for the last four decades. During these years, based on
several factors such as the thickness of the sheath, the metal of the conductor, and the
material used in insulation, hundreds of specifications have been created to specify the
characteristics of coaxial cables.

8|Page
1802153 Computer Networking

• Coaxial cable uses RG rating to measure the materials used in shielding and
conducting cores.
• RG stands for the Radio Guide. Coaxial cable mainly uses radio frequencies in
transmission.
• Impedance is the resistance that controls the signals. It is expressed in the ohms.
• AWG stands for American Wire Gauge. It is used to measure the size of the core.
The larger the AWG size, the smaller the diameter of the core wire.

▪ Twisted-pair cables
The twisted-pair cable was primarily developed for computer networks. This cable is
also known as Ethernet cable. Almost all modern LAN computer networks use this
cable.

This cable consists of color-coded pairs of insulated copper wires. Every two wires are
twisted around each other to form pair. Usually, there are four pairs. Each pair has one
solid color and one stripped color wire. Solid colors are blue, brown, green and orange.
In stripped color, the solid color is mixed with the white color.

Based on how pairs are stripped in the plastic sheath, there are two types of twisted-pair
cable; UTP and STP.

In the UTP (Unshielded twisted-pair) cable, all pairs are wrapped in a single plastic
sheath.

In the STP (Shielded twisted-pair) cable, each pair is wrapped with an additional
metal shield, then all pairs are wrapped in a single outer plastic sheath.

The following image shows both types of twisted-pair cable.

▪ Fiber optic cable


This cable consists of core, cladding, buffer, and jacket. The core is made from the thin
strands of glass or plastic that can carry data over the long distance. The core is
9|Page
1802153 Computer Networking

wrapped in the cladding; the cladding is wrapped in the buffer, and the buffer is wrapped
in the jacket.

• Core carries the data signals in the form of the light.


• Cladding reflects light back to the core.
• Buffer protects the light from leaking.
• The jacket protects the cable from physical damage.

Fiber optic cable is completely immune to EMI and RFI. This cable can transmit data
over a long distance at the highest speed. It can transmit data up to 40 kilometers at the
speed of 100Gbps.

Fiber optic uses light to send data. It reflects light from one endpoint to another. Based
on how many beams of light are transmitted at a given time, there are two types of fiber
optical cable; SMF and MMF.

10 | P a g e
1802153 Computer Networking

EXPERIMENT NO. 2

❖ OBJECTIVE:

Practically implement and test the cross-wired cable and straight through cable using
clamping tool and network lab cable tester

❖ APPARATUS : RJ-45 connector, Climping Tool, Twisted pair Cable


❖ DESCRIPTION:

➢ What is transmission media?


Transmission media is a pathway that carries the information from sender to receiver.
We use different types of cables or waves to transmit data. Data is transmitted normally
through electrical or electromagnetic signals.

➢ Types of Transmission Media

1. Wired or Guided Media or Bound Transmission Media

2. Wireless or Unguided Media or Unbound Transmission Media

Crimping tool
A crimping tool is a tool designed to crimp or connect a connector to the end of a
cable. For example, network cables and phone cables are created using a crimping tool
to connect the RJ-45 and RJ-11 connectors to the end of the cable. In the example
below picture, this crimper is capable of crimping a RJ-11 (6-Pin) and RJ-45 (8-Pin)
connectors and also includes a wire cutter near the handles that can be used to cut
phone or CAT5 cable.
RJ-45 Connecter
11 | P a g e
1802153 Computer Networking

The RJ-45 connector is a form of telephone connector. It sees its most frequent use as a
local-area network connector , and is frequently referred to simply as an Ethernet
connector.

PROCEDURE: To do these practical following steps should be done:

1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable.
Be very careful at this point, as to not nick or cut into the wires, which are inside.
Doing so could alter the characteristics of your cable, or even worse render is
useless. Check the wires, one more time for nicks or cuts. If there are any, just
whack the whole end off, and start over.

2. Spread the wires apart, but be sure to hold onto the base of the jacket with your
other hand. You do not want the wires to become untwisted down inside the jacket.
Category 5 cable must only have 1/2 of an inch of 'untwisted' wire at the end;
otherwise it will be 'out of spec'. At this point, you obviously have ALOT more than
1/2 of an inch of un-twisted wire.

3. You have 2 end jacks, which must be installed on your cable. If you are using a
pre-made cable, with one of the ends whacked off, you only have one end to install
- the crossed over end. Below are two diagrams, which show how you need to
arrange the cables for each type of cable end. Decide at this point which end you
are making and examine the associated picture below.

Diagram shows you how to prepare Cross wired connection

12 | P a g e
Diagram shows you how to prepare straight through wired connection

Result: Cable Crimping, Standard Cabling and Cross Cabling, IO connector crimping and testing
the crimped cable using a cable tester are done successfully.

13
) To practise the colour code for different cables.

Simulation:

14
EXPERIMENT NO. 3

❖ OBJECTIVE:
Study and familiarization with various network devices.

❖ APPARATUS:
Hubs, Switches, Routers.

❖ DESCRIPTION:
LAN Adapter:-
An expansion board that is used to connect a computer or computing device to a
network. LAN adapter is the most common and generic alternate name for a Network
Interface Card (NIC). However, many similar products, such as a Wireless USB LAN
Adapter is also called a LAN adapter.
Wireless USB LAN adapter:-
A high-speed wireless network card that is used to access a network through a USB
port on a computer or laptop. Most wireless USB LAN adapters look like small USB
flash drives and usually are based on the 802.11g standard which provides a data rate
up to 54-Mbps in a wireless LAN environment. Some wireless USB LAN adapters may
also support the 802.11b standard.

Network Hub:-

Definition: In computer networking, a hub is a small, simple, inexpensive device that


joinsmultiple computers together. Many network hubs available today support the
Ethernet standard. Other types including USB hubs also exist, but Ethernet is the type
traditionally used in home networking.

Technically speaking, two different types of hubs exist:

Passive hubs do not amplify the electrical signal of incoming packets before
broadcasting themout to the network. Active hubs, on the other hand, do perform this
amplification, as does a different type of dedicated network device called a repeater.
Some people use the terms concentrator when referring to a passive hub and multiport
repeater when referring to anactive hub.

Network switch:-

A network switch (sometimes known as a switching hub) is a computer networking


device that is used to connect devices together on a computer network. A switch is
considered more advanced than a hub because a switch will only send a message to
the device that needs or requests it, rather than broadcasting the same message out of
each of its ports.[1]

15
A switch is a multi-port network bridge that processes and forwards data at the data
link layer (layer 2) of the OSI model. Some switches have additional features, including
the ability to route packets. These switches are commonly known as layer-3 or
multilayer switches.

Router:-

Router: Routers are devices (computers) containing software that help in determining
the bestpath out of the available paths, for a particular transmission. They consist of a
combination of hardware and software. The hardware includes the physical interfaces to
the various networks in the internet work. The two main pieces of software in a router
are the operating system and the routing protocol.

Routers use logical and physical addressing to connect two or more logically separate
networks. They accomplish this connection by organizing the large network into logical
network segments or sub-networks. Each of these sub networks is given a logical
address. This allows the networks to be separate but still access each other and
exchange data when necessary. Data is grouped into packets, or blocks of data. Each
packet, in addition to having a physical device address, has a logical network address.

Routers are frequently used to interconnect identical networks as well as to interconnect


networks with different types of hardware.

How Routers Works

Routers are interconnectivity devices that are used to transfer the datum packets along
networks by visualizing the networks path. Routers visualizing the networks path to
many networks such as Electronic networks, Transport networks and phone networks.
Two ways are exist for routers operation using either control plane or forwarding plane.
In control plane the router sends the precise data packets to their specific location. On
the other hand in forwarding plane router does not remember the sending or receiving
information about the packets.

Advantages of Routers

Routers route the data in an organized way. Routers generate a reliable connection
between hosts. Routers is used for alternatively incase the main is fail to transfer data.

16
17
EXPERIMENT NO. 4

❖ OBJECTIVE:
Familiarization with Packet Tracer Simulation tool/any other related tool.

❖ APPARATUS:
Computer, cross-platform visual simulation tool

❖ DESCRIPTION:
Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows
users to create network topologies and imitate modern computer networks. The software allows
users to simulate the configuration of Cisco routers and switches using a simulated command line
interface. Packet Tracer makes use of a drag and drop user interface, allowing users to add and
remove simulated network devices as they see fit.

We will just create a computer lab with the help of the cisco packet tracer
and the ‘n’ no of computers are connected with the help of switches and
according to the no of computer required the no of switches are being used

In the given example we are using the 26 computers to make the local area
network in the lab. Here we are using two switches because a switch can
have 24 ports to be connected .

The lab looks like this after the connection of the computers to the switch

18
Now we are having the work of assigning the I p address to all the
computers connected to the switch . we can assign the I p address by just
clicking on the pc and the manual will come just click on the I p
configuration then assign the I p address to the pc .
We will assign the ip address in the static form. after assigning the I p
address to the computer it will automatically generate the subnet mask of
the computer itself .

The screen looks like this while assigning the Ip address

19
EXPERIMENT NO. 5

❖ OBJECTIVE:
Study and Implementation of IP Addressing Schemes

❖ APPARATUS:
Computers, Class Addressing Knowledge.

❖ DESCRIPTION:

IP Address Classes:-
• IP addressing supports C,fiveDandE . OnlydifferentclassesA,B and address C areavaila
ble for commercial use.

Class A addresses
1. Class A addresses are designed for large organizations with a large number of hosts or
routers.
2. In this the first octet of the address identifies the network and the next three octets are used
to identify the host.
3. The first bit of first octet is always 0 and the remaining 7 bits are used to identify the network
address.
4. The next three octets i.e. 24 bits are used to identify the host.
5. The class support addresses from 0.0.0.0 to 0.255.255.255.
6. The first block of network address starts with 1.0.0.0 and the last block of networks address
starts with 127.0.0.0.
7. As there are 7 bits in network address, 27 = 128 blocks of network address are possible.
Out of these two network blocks are reserved. Hence total 126 address blocks are used.
24
8. Each network blocks can have 2 --- 2 hosts i.e. 16,777,214 host address. Two addresses
are less as one address is reserved for the broadcast address and one address is reserved
for the network.
9. A block in class A is too large for almost any organization. This means most of the
addresses in class A are wasted and are not used.

Class B address
1. The class B addresses are designed for medium sized organizations with the tens of
thousands of attached hosts or routers.
2. In this, the first two octets of the address identify the network and the next two octets
identify the host within the network.
3. The first two bits (high order bits) of first octet are always 1, 0. Thus the remaining 14 bits
identify the network.
4. The third and fourth octet i.e. 6 bits are used to identify the hosts.
5. The first network block of this class covers the addresses from 128.0.0.0 to 128.0.255.255
(net id 128.0). The last network block of this class covers addresses from 191.255.255.255.
6. The maximum number of network blocks in class B is 214 = 16384.

20 | P a g e
7. Each network block in class B can have 216--- 2 = 65,534 hosts.
8. A block in class B is also very large and most of the address in class B is also wasted.

Class C address
1. The class C addresses is designed for small organizations with a small number of attached
hosts or routers.
2. In class C, the first three octets of address are used for network and the last octet is used to
identify the host.
3. The first three bits of first octet are always set to 1, 1,0.
4. The remaining 24 – 3 = 21 bits are used for network identification and only 8 bits are used
for host.
5. In class C, 221 = 2,097,152 network blocks are possible.
6. Thus, each block in class C address can have 28– 2 = 254 hosts.
7. The first block of network covers addresses from 192.0.0.0 to 192.0.0.255.
8. The class C addresses are too less for many organizations as it supports only 254 hosts in
a network.

Following are the classes of IP:-

CLASSES Range

Class A 1.0.0.0to 127.255.255.255


128.0.0.0 to
Class B 191.255.255.255
192.0.0.0 to
Class C 223.255.255.255
224.0.0.0 to
Class D 239.255.255.255

Class E 240.0.0.0 to 255.255.255.255

Class D address
1. Class D addresses are used for multicast groups (multicasting)

2. The concept of division of octets into network id and host id does not apply to class D.

3. The first four bits of first octet in class D are always set to 1,1,1,0.

4. The address range is 224.0.0.0 to 239.255.255.255

Class E address

21 | P a g e
1. The Class E address is reserved for future use and is experimental.

2. The concept of network id and host id does not apply on class E also.

3. The first four bits of first octet are always set to 1,1,1,1.

4. The address range for class E is 240.0.0.0 to 255.255.255.255.

Fig 5.1 Class Ranges

Ipv4 addressing:
Pre test:

22 | P a g e
Simulation:

IPV4 Subnetting

23 | P a g e
24 | P a g e
EXPERIMENT NO. 6

❖ OBJECTIVE:
Creation of Simple Networking topologies using hubs and switches

❖ APPARATUS:
Computer, hub ,switch

Principle:
1. Repeater: A repeater is an electronic device that receives a signal and retransmits it at a
higher level and/or higher power, or onto the other side of an obstruction, so that the signal
can cover longer distances.
2. Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator is a
device for connecting multiple twisted pair or fiber optic Ethernet devices together and making
them act as a single network segment. Hubs work at the physical layer (layer 1) of the OSI
model.
3. Switch: A network switch or switching hub is a computer networking device that connects
network segments.
4. Bridge: A network bridge connects multiple network segments at the data link layer (Layer
2 of the OSI model. In Ethernet networks, the term bridge formally means a device that
behaves according to the IEEE 802.1D standard. A bridge and switch are very much alike; a
switch being a bridge with numerous ports. Switch or Layer 2 switch is often used
interchangeably with bridge.Bridges can analyze incoming data packets to determine if the
bridge is able to send the given packet to another segment of the network.
5. Router: A router is an electronic device that interconnects two or more computer networks,
and lectively interchanges packets of data between them. Each data packet contains address
information that a router can use to determine if the source and destination are on the same
network, or if the data packet must be transferred from one network to another.
6. Gate Way: In a communications network, a network node equipped for interfacing with
another network that uses different protocols.

25 | P a g e
Step 1: Connect the switch to the LAN. a. Using the proper cable, connect the FastEthernet0/0
on Customer Router to the FastEthernet0/1 on Customer Switch. b. Using the proper cable,
connect the Customer PC to the Customer Switch on port FastEthernet0/2. c. Using the proper
cable, connect the Local Server to the Customer Switch on port FastEthernet0/3.

Step 2: Verify the switch configuration. a. From the Customer PC, use the terminal emulation
software to connect to the console of the customer Cisco Catalyst 2960 switch. b. Use the
console connection and terminal utility on the Customer PC to verify the configurations.
Use cisco as the console password. c. Enter privileged EXEC mode and use the show
running-config command to verify the following configurations.
The password is cisco123.
a. VLAN1 IP address = 192.168.1.5
b. Subnet mask = 255.255.255.0
c. Password required for console access
d. Password required for vty access
e. Password enabled for privileged EXEC mode f. Secret enabled for privileged EXEC mode
f. Verify IP connectivity between the Cisco Catalyst 2960 switch and the Cisco 1841 router by
initiating a ping to 192.168.1.1 from the switch CLI.
g. Click the Check Results button at the bottom of this instruction window to check your work.

26 | P a g e
Fig 6.1 Creation of network

27 | P a g e
EXPERIMENT NO. 7

OBJECTIVE:

Simulation of web traffic in Packet Tracer

APPARATUS:
Computers, Packet Tracer

DESCRIPTION:

Part 1: Examine HTTP Web Traffic In Part 1 of this activity, you will use Packet Tracer (PT)
Simulation mode to generate web traffic and examine HTTP. Switch from Realtime to
Simulation mode. In the lower right corner of the Packet Tracer interface are tabs to toggle
between Realtime and Simulation mode. PT always starts in Realtime mode, in which
networking protocols operate with realistic timings. However, a powerful feature of Packet
Tracer allows the user to “stop time” by switching to Simulation mode. In Simulation mode,
packets are displayed as animated envelopes, time is event driven, and the user can step
through networking events.

a. Click the Simulation mode icon to switch from Realtime mode to Simulation mode.

b. Select HTTP from the Event List Filters.

1) HTTP may already be the only visible event. Click Edit Filters to display the available
visible events. Toggle the Show All/None check box and notice how the check boxes switch
from unchecked to checked or checked to unchecked, depending on the current state.

2) Click the Show All/None check box until all boxes are cleared and then select HTTP. Click
anywhere outside of the Edit Filters box to hide it. The Visible Events should now only display
HTTP. Generate web (HTTP) traffic. Currently the Simulation Panel is empty. There are six
columns listed across the top of the Event List within the Simulation Panel. As traffic is
generated and stepped through, events appear in the list. The Info column is used to inspect
the contents of a particular event. Note: The Web Server and Web Client are displayed in the
left pane. The panels can be adjusted in size by hovering next to the scroll bar and dragging
left or right when the double-headed arrow appears.

28 | P a g e
a. Click Web Client in the far left pane.

b. Click the Desktop tab and click the Web Browser icon to open it.

c. In the URL field, enter www.osi.local and click Go. Because time in Simulation mode is
event-driven, you must use the Capture/Forward button to display network events.

d. Click Capture/Forward four times. There should be four events in the Event List. Look at
the Web Client web browser page. Did anything change?

Fig 7.1 web traffic in Packet Tracer

29 | P a g e
EXPERIMENT NO. 8

❖ OBJECTIVE: Study and implementation of various router configuration commands


❖ DESCRIPTION:

Step 1: Configure the router host name.

a) On Customer PC, use the terminal emulation software to connect to the console of
the customer Cisco 1841 ISR. Set the host name on the router to Customer
Router by using these commands.

Router>enable

Router #configure terminal

Router(config)#hostname Customer Router

Step 2: Configure the privileged mode and secret passwords.

a) In global configuration mode, set the password to cisco.


b) Customer Router(config)#enable password cisco
c) Set an encrypted privileged password to cisco123 using the secret command.
Customer Router(config)#enable secret cisco123

Step 3: Configure the console password.

a) In global configuration mode, switch to line configuration mode to specify the console
line. Customer Router(config)#line console 0 ,Set the password to cisco123, require
that the password be entered at login, and then exit line configuration mode.
b) Customer Router(config-line) #password cisco123
c) Customer Router(config-line) #login
d) CustomerRouter(config-line) #exit
e) Customer Router(config)#

30 | P a g e
Step 4:

a) Configure the vty password to allow Telnet access to the router. In global
configuration mode,switch to line configuration mode to specify the vty lines.
Customer Router(config)#line vty 0 4
b) Set the password to cisco123, require that the password be entered at login, exit
line configuration mode, and then exit the configuration session.
c) Customer Router(config-line)#password cisco123
d) Customer Router(config-line)#login
e) Customer Router(config-line)#exit
f) Customer Router(config)#

Step 5:

a) Configure password encryption, a MOTD banner, and turn off domain server lookup.
b) Currently, the line passwords and the enable password are shown in clear text when
you show the running configuration. Verify this now by entering the show running-
config command. To avoid the security risk of someone looking over your shoulder
and reading the passwords, encrypt all clear text passwords.
c) Customer Router(config)#service password-encryption
d) Use the show running-config command again to verify that the passwords are
encrypted.
e) To provide a warning when someone attempts to log in to the router, configure a
MOTD banner.
f) Customer Router(config)# $Authorized Access Only!$ Test the banner and passwords.
Log out of the router by typing the exit command twice. The banner displays
before the prompt for a password. Enter the password to log back into the router.
g) You may have noticed that when you enter a command incorrectly at the user or
privileged EXEC prompt, the router pauses while trying to locate an IP address
for the mistyped word you entered. For example, this output shows what happens
when the enable command is mistyped.
h) Customer Router>enable Translating "enable"...domain server (255.255.255.255)

31 | P a g e
i) To prevent this from happening, use the following command to stop all DNS lookups
from the router CLI.
j) CustomerRouter(config)#no ip domain-lookup
k) Save the running configuration to the startup configuration.
l) CustomerRouter(config)#end
m) CustomerRouter#copy run start

Step 6: Verify the configuration.

a. Log out of your terminal session with the Cisco 1841 customer router.

b. Log in to the Cisco 1841 Customer Router. Enter the console password when prompted.

c. Navigate to privileged EXEC mode. Enter the privileged EXEC password when prompted.

d. Click the Check Results button at the bottom of this instruction window to check your work.

32 | P a g e
EXPERIMENT NO. 9

❖ OBJECTIVE: : Creation of Networks using routers


❖ APPARATUS:
❖ DESCRIPTION:
At any rate, you can set up a tightly managed, secure home network. All you have to do is
follow these five steps.

1. Connect your router


The router is the gateway between the Internet and your home network. It is also the means by
which all the devices on your network communicate with one another. If you haven’t
already purchased one, our guide to buying the best wireless router can give you the
lowdown on how to choose the right router for your home's particular needs. You can go
with either an 802.11n router, or one of the newer 802.11ac models. For a discussion of
whether 802.11ac will be the right choice for you, see:

You will also want to ensure that any device that will connect to the router also has an
appropriate network adapter. These devices are your network "clients." New laptops will
have 802.11n adapters (some will support 802.11ac, even). For older laptops or
desktops you can purchase compatible adapters. Once you've got the right router,
you have to set it up, and the first step is to physically connect your router to a modem
provided by your ISP with an Ethernet cable.

• First, unplug or turn off the cable or DSL modem.


• Power up your wireless router and connect the network cable that most likely comes
with it into the port on the router that is labelled "Internet" or "WAN."
• Connect the other end to the cable or DSL modem and power up the modem.
• Don't attempt to connect any devices such as laptops or tablets until you have a good
strong signal indicating a WAN connection on both the router and modem.
2. Access the router's interface and lock it down
The next step involves getting into the router's interface (some companies call this the
management console). This is done by connecting a laptop to the router and then
accessing the interface via a browser. How do you go about this? Routers ship with a default
IP address, administrator account and password. For example, most Cisco/Linksys routers
have the default IP address of 192.168.1.1, and the default administrator account is
"admin," and the password is also "admin." What you want to do is change your laptop's
IP settings to match those of the router's to connect to it for configuration. This allows the
laptop to communicate with the router, so you can access your router's software for setup
via the laptop.

Connect an Ethernet cable to one of the LAN ports on the router and the other end to the
Ethernet port of your laptop. On a Windows 7 machine that's connected to the router by
Ethernet, for example, you would go into the Control Panel and click to open "Network and
Internet" and then "Network and Sharing Centre."

33 | P a g e
• From the left-hand window, click "Change adapter settings."
• Right click on "Local Area Connection" (not the Wireless Network Connection) and
select "Properties."
• Highlight “Internet Protocol Version 4 (TCP/IP v4)” and once again, click "Properties."
• Set the first radio button to "Use the following IP address:" and enter the information as
shown in the image above.
• Once you've applied the changes, open up a browser and go the web address of (in our
example) the Cisco/Linksys interface by typing http://192.168.1.1 and using the account
name "admin" and password "admin." Then you are all set to configure security and other
settings.
Most router companies use the same default IP address, admin account, and passwords on all
their routers. Your router's documentation will tell you the specific IP address and account
login information.

3. Configure security and IP addressing


After you've accessed the router, the next order of business is getting the security, SSID and
IP addressing settings right. Getting security right is a must, unless you want a neighbour
stealing your bandwidth and possibly your data. IP addressing is important because these
addresses are used for devices on your network to communicate with the router. You make
all of these changes within the router's management interface. These settings are typically
under the "Basic" settings of the interface. They may also be under "Security" or "Wireless
Settings." Router interfaces vary, so if you can't find the settings to configure within the router’s
interface pages when following the below steps, check with the router manufacturer.
Okay, on with the steps:

• Change the default administrator password. Some networking equipment forces you to do
so once you've accessed the web-based interface, but many consumer routers don't. The
settings for the admin password are usually under the "System" tab or page of the interface.

• Assign security. Newer routers may be set by default to automatically configure security by
using WPS (Wi-Fi Protected Setup). Since the goal here is to have full control of your
network, switch from "WPS" to "Manual." Once in manual mode, go into the router's
wireless security page. There is no excuse, except in very limited circumstances when
dealing with legacy technology, to not use WPA/WPA2. WPA security requires clients
connecting to it to use a key or passphrase, which you create within the router's interface
on the same page you set up security.

• Set up IP addressing. For most networks, the router can be kept at its default DHCP setting.
This means the router will dole out IP addresses to clients that connect to the network,
leaving you without any IP addressing management to do. For extra security, it's not a bad
idea to change the router's default IP, making it more resistant to snooping. Remember,
hackers know what the default IP addresses of the most common routers are (even though
it's really tough for them to get to, due to the fact that your IP addresses on your network
are private). For instance, I would change my Cisco/Linksys router's network from
192.168.1.1 to something like 192.168.1.3.

34 | P a g e
• Disconnect the laptop and reboot it. When the laptop comes back from reboot you should
see the SSID name of your wireless network and be able to connect to it with the
passphrase you created. Congratulations – you're connected wirelessly. But you're not done
with your setup yet!
Advanced steps: DHCP reservation
For those who anticipate connecting servers, NAS device or any device that you may access
fromoutside your network, best practice is to configure DHCP Reservation. That may be a
scary sounding term for newbies, but all it means is that you are telling the router that a
specific device always uses a specific IP address, which is set aside or "reserved" for it.

For example, my router IP is 192.168.1.1. I can give my email server an IP address of


192.168.1.2. I cangive a third device, say my NAS server for instance, an IP address of
192.168.1.3, and so on. You don't want to change the first three sets of numbers though, for
most basic home networks. IP addressing has specific rules about formatting, so you want to
retain the first three sets of numbers, called "octets."

You’ll also want to put in the device's MAC address that you are reserving. The MAC address
is usually printed on a sticker affixed to a device. Again, reserving the IP addresses means
those addresses will never be distributed to clients via DHCP and are "held" for the devices
you specify. Reserving IP addresses is good practice for devices you want to access
remotely, because otherwise when the IP address leases expire you won't be able to perform
remote access.

4. Set up sharing and control


Now that you have a network set up, you can set up a way for everyone to access data on the
network. With Windows 7 clients, this is achieved by creating a HomeGroup, a user-friendly
way to create a workgroup.

• When a Windows 7 laptop first connects to the network, the user will be prompted to set the
current network location. Ensure that the location is set to "Home network" (you can check it in
Network and Sharing Centre) because HomeGroup only works on networks set to the Home
location.
• Open up "HomeGroup" in the Control Panel, and then click "Create a HomeGroup." For every
Windows 7 client that you want to give access to the HomeGroup, open HomeGroup in the
Control Panel of those machines and then click "Join now" (those machines have to physically
or wirelessly connected to the network).
• During the process of setting up or joining a HomeGroup, you can choose the libraries,
printers , or files and folders you want to share (see the next step for details).
• For Windows 8, you create a HomeGroup by moving the mouse to the top right corner of
screen, then click Settings, then Change PC Settings. Click on HomeGroup, then you
can click on Create. As above, you can then select the libraries and devices you want to share
with the HomeGroup.
• If you have a network with an older version of Windows running, then you are going to create
a standard Workgroup. Click Start, right click My Computer, and then click Properties. In
5. Set up user accounts

35 | P a g e
In most business networks, users access the network by logging in with their user account and
password. Corporate IT networks set up user accounts to keep tabs on who is accessing the
network and when they are accessing it. User accounts provide a way to establish user access
control. Perhaps there's some data on the network some users should have access to and
some shouldn't. Maybe some users should only be able to read certain files, while others
should be able to change files.

You can establish this same kind of access in your home network, should you wish, especially
once you have a HomeGroup or Workgroup defined. It's not something most home network
users will really need to do, but we’ll cover it briefly, as it is quite easy to set up user accounts
in Windows:

• In Windows 7's Control Panel, select the User Accounts icon. User accounts will let you
configure your account and its settings.
• To add and configure other users, from User Accounts, click on "Manage User Accounts,"
and then click on the "Advanced" tab.
• Under "Advanced User Management" click "Advanced" to open up Local Users and Groups.
• Right click on either "Users" or "Groups" to add either to your network.

36 | P a g e
EXPERIMENT NO. 10

❖ OBJECTIVE: Configuring networks using the concept of subnetting


❖ APPARATUS: System, Router
❖ DESCRIPTION:
Subnetworking becomes an important feature as your organization's networking needs grow.
Subnetworking lets you divide up your pool of Internet Protocol version 4 (IPv4) addresses
so you can split those addresses across several physical networks within your organization.

or administrative or technical reasons, many organizations choose to divide one network into
several subnets. Subnetworking enables several local networks to appear as a single Internet
network to off-site hosts. It divides the addresses for a single network to accommodate the fact
that the network consists of several physical networks. You should consider using subnets
in the following instances:

• When you want to hide the local network topology from the outside world. Using
subnets requires only a single route to external gateways.
• When you want the ability to administer IP addresses locally. For example, a company
may have an engineering subnet, a product marketing subnet, and a sales subnet, each
administered by a different administrator who has control of IP addresses in a given
range.
• When network bandwidth is limited due to cabling constraints. Setting up subnets, each
separated by a gateway host, limits local subnet packets to those that are either destined
for or sent from a local host. In this way, the overall network traffic seen by each host
on the subnet is reduced.

Setting up a subnet requires you to:

• determine the appropriate IP addresses for your subnets


• configure subnet hosts with the correct IP addresses and network masks
• configure gateway hosts between subnets

Subnets allow you more flexibility when assigning network addresses. For details on network
address assignment and network classes, see ``Network address''.

Network masks

A network mask, or ``netmask'', is used to divide an IP address into a network address and a
host address. When you set up a network, the network mask must be common to all network
interfaces on that network. The default network masks are 255.0.0.0 for class A, 255.255.0.0
for class B, and 255.255.255.0 for class C networks, as illustrated here:

37 | P a g e
Subnets are created by extending the network ID portion of an address by taking some bits
from the host portion to create a subnet portion. The remaining bits can be used for host
addresses within the subnet. The number of subnets that can be created from an m-bits
long subnet address is 2^m. The number of host addresses per subnet that are available from
an n-bits long host address is (2^n)-2. Unlike the subnet portion of the network address, the
host portion cannot consist of all 0's or 1's. See RFC 1812 and RFC 1878 for more information.

Subnetting a class B network' illustrates the effect on a class B address of extending a


network mask from 255.255.0.0 to 255.255.255.0:

Subnetting a class B network

This scheme creates 256 (2^8) possible subnet addresses (0 through 255) with 254
(2^8-2) host addresses (1 through 254) per subnet. In this way, you can create subnets for
class A and B networks by converting the second and third octets, respectively, from host
addresses to subnet addresses. Notice how the netmask changes accorThe class A network
16 can now have up to 256 subnets (16.0 through 16.255). The class network 172.16 can also
have up to 256 subnets (172.16.0 through 172.16.255). While the netmask masks the network
portion of the address, the broadcast address exposes the network address and hides the host
portion. For example, the broadcast address for the subnet 172.16.246, with a netmask of
255.255.255.0, is 172.16.246.255.For more information on setting netmask and broadcast

38 | P a g e
addresses using the Network Configuration Manager, see ``Basic TCP/IP configuration
parameters''For example, if an organization has a class B network, you could assign each
physical network in that network a subnet number within that network. The sixteen bits for
the host ID could be allocated as eight for subnet and eight for host, or nine for subnet and
seven for host, and so on. Your decision would be transparent to everyone outside that
organization.

A common example of subnetworking is to apply a class C type subnet mask (255.255.255.0)


to a class B network. Applying this mask to a class B network provides you with 256 possible
subnets, each one of which can accommodate 254 possible hosts (the host addresses 0 and
255 are not acceptable). If you know that none of your subnets will ever have more than 126
hosts but you need more than 256 but less than 513 subnets, you could decide to use nine
bits for the subnet number, and seven bits for the host addresses. The appropriate mask for this
would be 255.255.255.128.

Given this scheme and a network address of, for example, 131.60, the addresses of the first
and last hosts on the first subnet (131.60.0.0) would be 131.60.0.1 and 131.60.0.126. The
broadcast address on this subnet would be 131.60.0.127.

Partitioning a class C address is a similar process as you must take a portion of the fourth
octet as the subnet address. For example, you might partition the first three (high order) bits
of the fourth octet to represent the subnet, with the last five bits representing the host:

This scheme allows for up to 8 subnets of 30 hosts each, for a total of 240 hosts. The netmask
for the hosts on these subnets is 255.255.255.224. The number 224 is a decimal representation
of the binary octet 11100000, which masks the subnet portion of the IP address.

Possible subnets for the class C network 221.138.62.0, with associated broadcast addresses,
are:

Subnet Hosts Broadcast address


221.138.62.0 .1-.30 221.138.62.31
221.138.62.32 .33-.62 221.138.62.63
221.138.62.64 .65-.94 221.138.62.95
221.138.62.96 .97-.126 221.138.62.127
221.138.62.128 .129-.158 221.138.62.159

39 | P a g e
221.138.62.160 .161-.190 221.138.62.191
221.138.62.192 .193-.222 221.138.62.223
221.138.62.224 .225-.254 221.138.62.255

After you determine the new addresses for your hosts, you must use the Network
Configuration Manager to configure them. In addition, you must configure routers between
your subnets: these are hosts with multiple networking interfaces and specialized routing
hardware that can serve more than one network.

Subnetting and Classless Interdomain Routing

The number of class A and B addresses that are available for allocation to new networks
has been steadily diminishing over time and is now virtually exhausted. In the late 1980s
nearly all of the new networks assigned were class B, and in 1990 it became apparent that
class B networks would run out by 1994 if the trend continued. Class C addresses
(with a maximum of 254 hosts) were hardly being used because they were too small to be
useful for most organizations, while class B networks were too large to be densely populated
by any but the largest organizations.

The network number allocation policies of the InterNIC were changed in 1990, to avert the
class B address exhaustion. If you apply for a network number, you are likely to be assigned
a set of than a single class B address. Which of these you receive will depend on the number
of hosts that will exist on your network(s).

Where an organization has a range of class C network numbers, the range provided is
assigned as a bit-wise contiguous range of network numbers, and the number of networks in
the range is a power of 2. All IP addresses in the range have a common prefix, and every
address with that prefix is within the range. For example, an organization requiring about
1000 IP addresses would be assigned four class C network numbers. A range of addresses
satisfying these rules would be 195.34.136 through 195.34.139, in which case the range would
consist of all the IP addresses with the 22-bit prefix 195.34.136. This is represented by the
notation 195.34.136/22 (with the trailing zeros removed). ``Subnetting with CIDR'' illustrates
this scheme.

Subnetting with CIDR

However, the problem with this situation is that each network has to be routed separately as
standard IP routing only understands class A, B and C network addresses. The result of using a
range of class C addresses is a routing table explosion problem: a class B network of 3000

40 | P a g e
hosts requires one routing table entry, whereas the same network if it was addressed as a
range of class C networks would require 16 entries.

To overcome the routing table explosion problem, a scheme known as Classless Interdomain
Routing (CIDR or ``supernetting'') is used to implement address assignment. CIDR does not
route according to the class of the network number, but instead routes according to the high
order bits of the IP address (the ``IP prefix''). The process of combining multiple networks
into a single entry is called supernetting because routing is based on network masks that are
shorter than the natural network mask of an IP address.

The details of CIDR may be found in RFC 1518 and RFC 1519. As the main purpose of
CIDR is to reduce the size of the routing tables for the Internet, these documents will not
usually be of interest to you unless you are a service provider or you maintain Internet routing
tables on your system.

Variable length subnetting

There are two types of subnetting: static length and variable length. Static subnetting, in
which all the subnets in the subnetted network use the same subnet mask, has already been
described in ``Subnetting and Classless Interdomain Routing''. Native IP and RIP version 1
routing only support static subnetting. Variable length subnetting allows the subnets that make
up the network to use different subnet masks. A small subnet with only a few hosts needs a
subnet mask that accommodates only these hosts. A subnet with many hosts may need a
different subnet mask to accommodate the hosts. Variable length subnetting allows you to
divide the network so that it is possible to define adequate hosts for each subnet by changing
the subnet mask for each network. RIP version 2 supports variable length subnetting as well as
static subnetting. RIP version 1 only supports standard class lengths.

For example, a company with the address 195.34.136.0 needs to split the address range into
five separate networks, as shown in ``Variable length subnetting''. There need to be 254 hosts
on 3 of the subnets and 126 hosts on 2 of the subnets. This cannot be achieved using static
subnetting as it can only divide the network into four subnets with 254 hosts each or eight
subnets with 126 hosts each. To divide the address into five subnets, you should use multiple
netmasks. The first four subnets use the mask 255.255.255.0 and have 254 hosts each. The
first subnet can then be divided into two subnets with 126 hosts each and a subnet mask of
255.255.255.128. There would be three subnets with 254 hosts each and two subnets with
126 hosts each.

41 | P a g e
Creating subnet entries

Once you have defined a top-level address entry, you can add subnets to it, or you can further
divide a subnet into other subnets (known as variable length subnetting). See ``Variable length
subnetting'' for more details.

To add a subnet:

1. Select the top-level address or subnet.


2. Select Edit Add Subnets.
3. Choose a subnet mask length (in bits) from those listed in the Length column.
4. Select subnet ranges from those listed in the Subnet column.

The Subnet column displays the mask length of the subnet and also displays the
number of hosts and host ranges.

For a particular subnet mask length, you can select all the subnet ranges in the list by
clicking on Select All.

5. Click on Yes to automatically assign hosts to subnets.

You can also add hosts after you have assigned all the subnets.
See ``Creating host entries''.

6. Click on OK.

42 | P a g e
EXPERIMENT NO. 11

❖ OBJECTIVE: Practical implementation of basic network command and Network


configuration commands like ping, ipconfig, netstat, tracert etc. for
troubleshooting network related problem
❖ APPARATUS:
❖ DESCRIPTION:

All commands related to Network configuration which includes how to switch to privilege mode
and normal mode and how to configure router interface and how to save this configuration to
flash memory or permanent memory.

This commands includes

✓ Configuring the Router commands


✓ General Commands to configure network
✓ Privileged Mode commands of a router
✓ Router Processes & Statistics
✓ IP Commands
✓ Other IP Commands e.g. show ip route etc.
1. ping: ping(8) sends an ICMP ECHO_REQUEST packet to the specified host. If the host
responds, you get an ICMP packet back. Sound strange? Well, you can “ping” an IP
address to see if a machine is alive. If there is no response, you know something is
wrong.
2. Ipconfig: Displays all current TCP/IP network configuration values and refreshes
Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS)
settings. Used without parameters, ipconfig displays Internet Protocol version 4 (IPv4)
and IPv6 addresses, subnet mask, and default gateway for all adapters.
3. Netstat: The netstat command generates displays that show network status and
protocol statistics . You can display the status of TCP and UDP endpoints in table format,
routing table information, and interface information. Netstat displays various types of
network data depending on the command line option selected. These displays are the
most useful for system administration. The syntax for this form is:

43 | P a g e
netstat [-m] [-n] [-s] [-i | -r] [-f address_family]

4. The most frequently used options for determining network status are: s, r, and i. See
the netstat(1M) man page for a description of the options.

5. Traceroute: Tracert is a command which can show you the path a packet of information
takes from and is discarded. In addition to this, it will tell you how long each 'hop' from
router to router takes.
6. nslookup: Displays information from Domain Name System (DNS) name servers. NOTE
:If you write the command as above it shows as default your pc's server name firstly.
7. pathping: A better version of tracert that gives you statics about packet lost and latency.
8. In this activity, you will use the Cisco IOS CLI to apply an initial configuration to a router,
including host name, passwords, a message-of-the-day (MOTD) banner, and other basic
settings

44 | P a g e
EXPERIMENT NO. 12

❖ OBJECTIVE: Configuration of networks using static and default routes


❖ APPARATUS: Routers, system
❖ DESCRIPTION:

Step 1: Test connectivity between the PCs and the default gateway.

To determine if there is connectivity from each PC to its configured gateway, first use a simple ping
test.

a) Click BOpc and go to Desktop > Command Prompt.


b) From the command prompt, type the ip config command. Note the IP address for BOpc and
the default gateway address. The default gateway address is the IP address for the Fast
Ethernet interface on Branch
c) Ping 192.168.1.1, the default gateway address for the Branch Office LAN, from the command
prompt on BOpc. This ping should be successful.
d) Click PNpc and go to Desktop > Command Prompt
e) From the command prompt, type the ipconfig command. Note the IP address for PNpc and the
default gateway address. The default gateway address is the IP address for the Fast Ethernet
interface on Partner.
f) Ping 192.168.3.1, the default gateway address for the PartnerNet LAN, from the command
prompt on thiping should be successful
g) Repeat steps a, b, and c for MOpc and its respective default gateway, the Fast Ethernet
interface on Main Office. Each of these ping tests should be successful.

45 | P a g e
Step 2: Ping between routers to test connectivity.

a) Use a console cable and terminal emulation software on BOpc to connect to BranchOffice.
b) Test connectivity with MainOffice by pinging 10.10.10.1, the IP address of the directly
connected serial 3/0 interface. This ping should succeed.
c) Test connectivity with MainOffice by pinging 10.10.10.5, the IP address of the serial 2/0
interface. This ping should fail.
d) Issue the show ip route command from the terminal window of BOpc. Note that only directly
connected routes are shown in the BranchOffice routing table. The ping to 10.10.10.5 failed
because the BranchOffice router has no routing table entry for 10.10.10.5.
e) Repeat steps a through d on the other two PCs. The pings to directly connected networks will
succeed. However, pings to remote networks will fail.
f) What steps must be taken to reach all the networks from any PC in the activity?

Step 3: Viewing the routing tables.

You can view routing tables in Packet Tracer using the Inspect tool. The Inspect tool is in the
Common Tools bar to the right of the topology. The Inspect tool is the icon that appears as a
magnifying glass.

a) In the Common Tools bar, click on the Inspect tool.


b) Click the Main Office router and choose Routing Table.
c) Click the BranchOffice router and choose Routing Table.
d) Click the PartnerNet router and choose Routing Table.
e) Move the routing table windows around so that you can see all three at once.
f) What networks do each of the routers already know about?
g) Does each router know how to route to all networks in the topology? After comparing the
routing tables, close the window for each routing table by clicking the x in the upper right
corner of each window.

Step 4: Configure default routes on the BranchOffice and PartnerNet routers.

To configure static routes for each router, first determine which routes need to be added for each
device. For the BranchOffice and the PartnerNet routers, a single default route allows these devices

46 | P a g e
to route traffic for all networks not directly connected. To configure a default route, you must identify
the IP address of the next hop router, which in this case is the MainOffice router.

a) From the Common toolbar, click the Select tool.


b) Move the cursor over the red serial link between the BranchOffice router and the MainOffice
router. Notice that the interface of the next hop is S3/0.
c) Move the cursor over the MainOffice router and note that the IP address for Serial 3/0 is
10.10.10.1.
d) Move the cursor over the red serial link between the PartnerNet router and the MainOffice
router. Notice that the interface of the next hop is S2/0.
e) Move the cursor over the MainOffice router and note that the IP address for Serial 2/0 is
10.10.10.5.
f) Configure the static routes on both the BranchOffice and PartnerNet routers using the CLI.
Click the BranchOffice router, and click the CLI tab.
g) At the BranchOffice> prompt, type enable to enter privileged EXEC mode.
h) At the BranchOffice# prompt, type configure terminal.
i) The syntax for a default route is ip route 0.0.0.0 0.0.0.0 next_hop_ip_address.
Type ip route 0.0.0.0 0.0.0.0 10.10.10.1.
j) Type end to get back to the BranchOffice# prompt.
k) Type copy run start to save the configuration change.
l) Repeat steps f through k on the PartnerNet router, using 10.10.10.5 as the next hop IP
address.

Step 5: Configure static routes at Main Office.

a) The configuration of static routes at the Main Office is a bit more complex because the
MainOffice router is responsible for routing traffic to and from the Branch Office and
PartnerNet LAN segments. The MainOffice router knows only about routes to the
10.10.10.0/30, 10.10.10.4/30, and 192.168.2.0/24 networks because they are directly
connected. Static routes to the 192.168.1.0/24 and 192.168.3.0/24 networks need to be added
so that the MainOffice router can route traffic between the networks behind the BranchOffice
and PartnerNet routers. a. Click the MainOffice router, and then click the CLI tab.
b) At the MainOffice> prompt, type enable to enter privileged EXEC mode.

47 | P a g e
c) At the MainOffice# prompt, type configure terminal.
d) The syntax for a static route is ip route network subnet_mask next_hop_ip_address: ip route
192.168.1.0 255.255.255.0 10.10.10.2 ip route 192.168.3.0 255.255.255.0 10.10.10.6
e) Type end to return to the MainOffice# prompt.
f) Type copy run start to save the configuration change.
g) Repeat steps a through e from Step 3. View the routing tables and notice the difference in the
routing tables. The routing table for each router should have an “S” for each static route.

Step 6: Test connectivity.

a) Now that each router in the topology has static routes configured, all hosts should have
connectivity to all other hosts. Use ping to verify connectivity.
b) Click BOpc and click the Desktop tab.
c) Choose the Command prompt option.
d) Type ping 192.168.3.2. The ping should be successful, verifying that the static routes are
configured properly.
e) Type ping 192.168.2.2. Notice that the result is successful even though you did not specifically
add the 192.168.2.0 network as a static route into any of the routers. Because a default route
was used on the BranchOffice and PartnerNet routers, a route for the 192.168.2.0 network
was not needed. The default route sends all traffic destined off network to the MainOffice
router. The 192.168.2.0 network is directly connected to the MainOffice router;
therefore, no additional routes needed to be added to the routing table
f) Click the Check Results button at the bottom of this instruction window to check your work

48 | P a g e
49 | P a g e
50

You might also like