Professional Documents
Culture Documents
3-10-2023
Practical -1
Types of Hub
Active Hub:- These are the hubs that have their own power supply and can clean,
boost, and relay the signal along with the network. It serves both as a repeater as well
as a wiring center. These are used to extend the maximum distance between nodes.
Passive Hub :- These are the hubs that collect wiring from nodes and power supply
from the active hub.These hubs relay signals onto the network without cleaning and
boosting them and can’t be used to extend the distance between nodes.
Intelligent Hub :- It works like active hubs and includes remote management
capabilities. They also provide flexible data rates to network devices. It also enables
an administrator to monitor the traffic passing through the hub and to configure each
port in the hub.
3. Bridge – A bridge operates at the data link layer. A bridge is a repeater, with add
on the functionalityof filtering content by reading the MAC addresses of source and
destination. It is also used for interconnecting two LANs working on the same
protocol. It has a single input and single output port, thus making it a 2 port device.
Types of Bridges
Transparent Bridges:- These are the bridge in which the stations are completely
unaware of the bridge’s existence i.e. whether or not a bridge is added or deleted from
the network, reconfiguration of the stations is unnecessary. These bridges make use
of two processes i.e. bridge forwarding and bridge learning.
4. Switch – A switch is a multiport bridge with a buffer and a design that can boost
its efficiency(a largenumber of ports imply less traffic) and performance. A switch is
a data link layer device. The switch canperform error checking before forwarding
data, which makes it very efficient as it does not forward packets that have errors and
forward good packets selectively to the correct port only. In other words, theswitch
divides the collision domain of hosts, but broadcast domain remains the same.
5. Routers – A router is a device like a switch that routes data packets based on their
IP addresses. The router is mainly a Network Layer device. Routers normally connect
LANs and WANs together and havea dynamically updating routing table based on
which they make decisions on routing the data packets. Router divide broadcast
domains of hosts connected through it.
7. Brouter – It is also known as the bridging router is a device that combines features
of both bridge androuter. It can work either at the data link layer or a network layer.
Working as a router, it is capable of routing packets across networks, and working as
the bridge, it is capable of filtering local area network traffic.
8. NIC – NIC or network interface card is a network adapter that is used to connect
the computer tothe network. It is installed in the computer to establish a LAN. It has
a unique id that is written on the chip, and it has a connector to connect the cable to it.
The cable acts as an interface between the computerand router or modem. NIC card is
a layer 2 device which means that it works on both physical and data link layer of the
network model.
Practical -2
Coaxial cable: -
This cable contains a conductor, insulator, braiding, and sheath. The sheath covers
the braiding, the braiding covers the insulation, and the insulation covers the
conductor.
Sheath
This is the outer layer of the coaxial cable. It protects the cable from physical damage.
Braided shield
This shield protects signals from external interference and noise. This shield is built
from the same metalthat is used to build the core.
Insulation
Insulation protects the core. It also keeps the core separate from the braided shield.
Since both the core and the braided shield use the same metal, without this layer, they
will touch each other and create a short-circuit in the wire.
Conductor
The conductor carries electromagnetic signals. Based on conductor a coaxial cable
can be categorizedinto two types; single-core coaxial cable and multi-core coaxial
cable.
A single-core coaxial cable uses a single central metal (usually copper) conductor,
while a multi-core coaxial cable uses multiple thin strands of metal wires. The
following image shows both types of cable.
The coaxial cables were not primarily developed for the computer network. These
cables were developedfor general purposes. They were in use even before computer
networks came into existence. They are still used even their use in computer networks
has been completely discontinued.
At the beginning of computer networking, when there were no dedicated media cables
available for computer networks, network administrators began using coaxial cables
to build computer networks.
Because of its low cost and long durability, coaxial cables were used in computer
networking for nearlytwo decades (the 80s and 90s). Coaxial cables are no longer used
to build any type of computer network.
• Coaxial cable uses RG rating to measure the materials used in shielding and
conducting cores.
• RG stands for the Radio Guide. Coaxial cable mainly uses radio frequencies in
transmission.
• Impedance is the resistance that controls the signals. It is expressed in the ohms.
• AWG stands for American Wire Gauge. It is used to measure the size of the
core. The larger theAWG size, the smaller the diameter of the core wire.
Twisted-pair cables: -
The twisted-pair cable was primarily developed for computer networks. This
cable is also knownas Ethernet cable. Almost all modern LAN computer networks
use this cable.
This cable consists of color-coded pairs of insulated copper wires. Every two wires
are twisted around each other to form pair. Usually, there are four pairs. Each pair has
one solid color and one stripped color wire. Solid colors are blue, brown, green, and
orange. In stripped color, the solid color is mixed with thewhite color. Based on how
pairs are stripped in the plastic sheath, there are two types of twisted-pair cable; UTP
and STP.
In the UTP (Unshielded twisted-pair) cable, all pairs are wrapped in a single plastic
sheath.
In the STP (Shielded twisted-pair) cable, each pair is wrapped with an additional
metal shield, then allpairs are wrapped in a single outer plastic sheath.
• Both cables use the same RJ-45 (registered jack) modular connectors.
• Both cables can accommodate a maximum of 1024 nodes in each segment.
• The STP provides more noise and EMI resistance than the UTP cable.
• The maximum segment length for both cables is 100 meters or 328 feet.
• To learn how twisted-pair cables are used in the LAN network, you can check the
following tutorial.
Twisted-pair cabling:
This tutorial explains how the twisted-pair cable works and how it is used to connect
different networking devices in a network.
The TIA/EIA specifies standards for the twisted-pair cable. The first standards were
released in 1991, known as TIA/EIA 568. Since then, these standards have been
continually revised to cover the latest technologies and developments of the
transmission media.
The TIA/EIA 568 divides the twisted-pair cable into several categories.
The following table lists the most common and popular categories of twisted-pair
cable:
Fiber optic cable is completely immune to EMI and RFI. This cable can transmit data over
a long distanceat the highest speed. It can transmit data up to 40 kilometers at the speed
of 100Gbps.
Fiber optic uses light to send data. It reflects light from one endpoint to another. Based
on how many beams of light are transmitted at a given time, there are two types of
fiber optical cable; SMF and MMF.
1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable.
Be very careful at this point, as to not nick or cut into the wires, which are inside.
Doing so could alter the characteristics of your cable, or even worse render is useless.
Check the wires, one more time for nicks or cuts. If thereare any, just whack the whole
end off, and start over.
2. Spread the wires apart, but be sure to hold onto the base of the jacket with your
other hand. You do not want the wires to become untwisted down inside the jacket.
Category 5 cable must only have 1/2 of an inch of 'untwisted' wire at the end;
otherwise it will be 'out of spec'. At this point, you obviously haveALOT more than
1/2 of an inch of un-twisted wire.
3. You have 2 end jacks, which must be installed on your cable. If you are using a
pre-made cable, withone of the ends whacked off, you only have one end to install -
the crossed over end. Below are two diagrams, which show how you need to arrange
the cables for each type of cable end. Decide at this pointwhich end you are making
and examine the associated picture below.
Practical -3
• Classification of IP address
• Sub netting
• Super netting
Apparatus (Software): NA
As show in figure we teach how the ip addresses are classified and when they are used.
• Sub netting
Why we Develop sub netting and How to calculate subnet mask and how to identify
subnet address.
• Super netting
Why we develop super netting and How to calculate super net mask and how
to identify super net address.
Practical – 4
Practical - 5
Output: -
1. Ping
Ping is used to testing a network host capacity to interact with another host. Just enter
the command Ping,followed by the target host’s name or IP address. The ping utilities
seem to be the most common networktool. This is performed by using the Internet
Control Message Protocol, which allows the echo packet to
be sent to the destination host and a listening mechanism. If the destination host reply
to the requesting host, that means the host is reachable. This utility usually gives a
basic image of where there may be a specific networking issue,
For Example: If an Internet connection is not in the office, for instance, the ping
utility is used to determine if the problem exists in the office or the Internet provider’s
network. The following shows an image of how ping tools to obtain the locally
connected router’s connectivity status.
There are various options a user can use with the Ping command.
Options Description
-t This ping command option will ping the target until you
stop it bypressing Ctrl-C.
-n count This option is used to set the number of ICMP Echo Requests
to send,from 1 to 4294967295. If -n is not specified, the ping
command will return 4 by default.
-l size This option is used to set the size, in bytes, of the echo-
request packet from 32 to 65,527. If the -l option is not
specified, the ping command will send a 32-byte echo
request.
-r count This command uses the ping command option to specify the
number of hops between the source computer and the target
computer. The maximum count value is 9; the Tracert command
can also be used if the user wants to view all the hops between
two devices.
-i TTL This ping command option sets the Time to Live (TTL)
value; themaximum value is 255.
2. NetStat
3. Ip Config
The command IP config will display basic details about the device’s IP address
configuration. Just type IP config in the Windows prompt and the IP, subnet mask
and default gateway that the current device will be presented. If you have to see full
information, then type on command prompt config-all and then you will see full
information. There are also choices to assist you in resolving DNS and DHCP issues.
4. Hostname
To communicate with each and other, the computer needs a unique address. A
hostname can be alphabetic or alphanumeric and contain specific symbols used
specifically to define a specific node or device in the network. For example, a
hostname should have a domain name (TLD) of the top-level and a distance between
one and 63 characters when used in a domain name system (DNS) or on the Internet.
5. Tracert
The tracert command is a Command Prompt command which is used to get the network
packet being
sent and received and the number of hops required for that packet to reach to target.
This command can also be referred to as a traceroute. It provides several details about
the path that a packet takes from the source to the specified destination.
The tracert command is available for the Command Prompt in all Windows operating
systems
The syntax for Tracert Command
There are various options the user can use with tracert command.
6. Nslookup
The Nslookup, which stands for name server lookup command, is a network utility
command used to obtain information about internet servers. It provides name server
information for the DNS (Domain Name System), i.e. the default DNS server’s name
and IP Address.
The syntax for Nslookup is as follows.
Nslookup
or
Nslookup [domain_name]
7. Route
In IP networks, routing tables are used to direct packets from one subnet to another.
The Route commandprovides the device’s routing tables. To get this result, just type
route print. The Route command returns the routing table, and the user can make
changes by Commands such as Route Add, Route Delete, and Route Change, which
allows modifying the routing table as a requirement.
8. ARP
ARP Stands for Address Resolution Protocol. Although network communications can
readily be thoughtof as an IP address, the packet delivery depends ultimately on the
media access control (MAC). This is where the protocol for address resolution comes
into effect. You can add the remote host IP address, which is an arp -a command, in
case you have issues to communicate with a given host. The ARP command provides
information like Address, Flags, Mask, IFace, Hardware Type, Hardware Address,
etc.
9. Path Ping
We discussed the Ping command and the Tracert command. There are similarities
between these commands. The pathping command which provides a combination of
path ping [-n] [-h] [-g <Hostlist>] [-p <Period>] [-q <NumQueries> [-w <timeout>] [-i <IPaddress>]
[-
4 <IPv4>] [-6 <IPv6>][<TargetName>]
Conclusion
This has seen various networking commands like Route, Arp, etc., along with their
syntax and examples. I hope these commands will help you while troubleshooting in
a quick time.
Practical – 6
Topology Diagram
Objectives
In this activity, you will configure these settings on the customer Cisco Catalyst 2960
switch:
• Host name
• Console password
• vty password
• Default gateway
a. From the Customer PC, use a console cable and terminal emulation
software to connect to the console of the customer Cisco Catalyst
2960 switch.
b. Set the host name on the switch to CustomerSwitch using these commands.
Switch(config)#hostname CustomerSwitch
CustomerSwitch(config)#line console 0
a. From global configuration mode, switch to the configuration mode for the vty
CustomerSwitch(config)#interface vlan 1
CustomerSwitch(config-if)#ip address 192.168.1.5 255.255.255.0
CustomerSwitch(config-if)#no shutdown
CustomerSwitch(config-if)#exit
b. Click the Check Results button at the bottom of this instruction window to
check your work.
Step 7: Verify the configuration.
The Customer Switch should now be able to ping the ISP Server at
209.165.201.10. The first one or two pings may fail while ARP converges.
CustomerSwitch(config)#end CustomerSwitch#ping 209.165.201.10
Practical-7
Topology Diagram
Objectives
• Configure passwords.
Background / Preparation
In this activity, you will use the Cisco IOS CLI to apply an initial
configuration to a router, including host name, passwords, a message-of-
the-day (MOTD) banner, and other basic settings.
Set the host name on the router to CustomerRouter by using these commands.
Router>enable Router#configure terminal
Router(config)#hostname CustomerRouter
Set the password to cisco123, require that the password be entered at login, and then exit
line configuration mode.
CustomerRouter(config-line)#password cisco123
CustomerRouter(config-line)#login CustomerRouter(config-line)#exit
CustomerRouter(config)#
Step 4: Configure the vty password to allow Telnet access to the router.
Set the password to cisco123, require that the password be entered at login, exit line
configuration mode, and then
exit the configuration session.
CustomerRouter(config-line)#password cisco123
CustomerRouter(config-line)#login CustomerRouter(config-line)#exit
CustomerRouter(config)#
Step 5: Configure password encryption, a MOTD banner, and turn off domain server
lookup.
a. Currently, the line passwords and the enable password are shown
in clear text when you show the running configuration. Verify this
now by entering the show running-config command.
To avoid the security risk of someone looking over your shoulder and
reading the passwords, encrypt all clear text passwords.
CustomerRouter(config)#service password-encryption
Use the show running-config command again to verify that the passwords are
encrypted.
To provide a warning when someone attempts to log in to the router, configure a MOTD
banner.
Test the banner and passwords. Log out of the router by typing the exit command
twice. The banner displays before the prompt for a password. Enter the password
to log back into the router.
You may have noticed that when you enter a command incorrectly at the user or
privileged EXEC prompt, the router pauses while trying to locate an IP address for
the mistyped word you entered. For example, this output shows what happens
when the enable command is mistyped.
CustomerRouter>emable
Translating "emable"...domain server (255.255.255.255)
To prevent this from happening, use the following command to stop all DNS
lookups from the router CLI.
CustomerRouter(config)#no ip domain-lookup
a. Log out of your terminal session with the Cisco 1841 customer router.
b. Log in to the Cisco 1841 Customer Router. Enter the console password when
prompted.
d. Click the Check Results button at the bottom of this instruction window to
check your work.
Practical-8
Topology Diagram
Objectives
Background / Preparation
In this Packet Tracer Skills Integration Challenge activity, you will configure
basic switch management, including general maintenance commands,
passwords, and port security. This activity provides you an opportunity to
review previously acquired skills.
Addressing Table
For this activity, direct access to the S1 Config and CLI tabs is disabled. You
must establish a console session through PC1.
b. From PC1, open a terminal window and use the default terminal
configuration. You should now have access to the CLI for S1.
c. Check results.
b. Configure port Fa0/1. Set the mode on Fast Ethernet 0/1 to access mode.
i. S1(config)#interface fastethernet 0/1
ii. S1(config-if)#switchport mode access
c. Configure IP connectivity on S1 using VLAN 1.
i. S1(config)#interface vlan 1
ii. S1(config-if)#ip address 172.17.99.11 255.255.255.0
iii. S1(config-if)#no shutdown
d. Configure the default gateway for S1 and then test connectivity. S1 should be able
to ping R1.
e. Check results.
a. Configure the clock to the current time. At the privileged EXEC prompt,
enter clock?
b. Use Help to discover the steps required to set the current time.
c. Use the show clock command to verify that the clock is now set
to the current time. Packet Tracer may not correctly simulate the
time you entered.
Packet Tracer does not grade this command, so the completion percentage does not
change.
a. Use the encrypted form of the privileged EXEC mode password and set the
password to class.
b. Configure the passwords for console and Telnet. Set both the
console and vty password to cisco and require users to log in.
d. Check results.
If you do not enter the banner text exactly as specified, Packet Tracer does
not grade your command correctly. These commands are case-sensitive. Also
make sure that you do not include any spaces before or after the text.
b. Check results.
Routers and switches share many of the same commands. Configure the
router with the same basic commands you used on S1.
• Set the console and vty password to cisco and require users to log in.
c. Check results.
a. PC1 and Server currently do not have access through S1 because the
duplex and speed are mismatched. Enter commands on S1 to solve this
problem.
b. Verify connectivity.
c. Both PC1 and Server should now be able to ping S1, R1, and each other.
d. Check results.
a. Use the following policy to establish port security on the port used by PC1:
Note: Only enabling port security is graded by Packet Tracer and counted
toward the completion percentage. However, all the port security tasks listed
above are required to complete this activity successfully.
b. Verify that port security is enabled for Fa0/18. Your output should
look like the following output. Notice that S1 has not yet learned
a MAC address for this interface. What command generated this
output?
S1#
c. Force S1 to learn the MAC address for PC1. Send a ping from PC1
to S1. Then verify that S1 added the MAC address for PC1 to the
running configuration.
!
interface FastEthernet0/18
<output omitted>
switchport port-security mac-address sticky 0060.3EE6.1659
<output omitted>
!
: Secure-shutdown
Violation Mode : Shutdown
Aging Time : 0 mins
Aging Type : Absolute
SecureStatic
Address Aging :
Disabled
Maximum MAC
Addresses 1
Total MAC Addresses 1
Configured
MAC
Addresses : 1
Sticky MAC
Addresses 0
Last Source Address:Vlan :
00D0.BAD6.5193:99
Security Violation Count 1
e. Viewing the Fa0/18 interface shows that line protocol is down (err-
disabled), which also indicates a security violation.
S1#show interface fa0/18
FastEthernet0/18 is down, line protocol is down (err-disabled)
<output omitted>
f. Reconnect PC1 and re-enable the port. To re-enable the port,
disconnect PC2 from Fa0/18 and reconnect PC1. Interface Fa0/18
must be manually reenabled with the no shutdown command before
returning to the active state.
g. Check results.
a. Disable all ports that are currently not used on S1. Packet Tracer
grades the status of the following ports: Fa0/2, Fa0/3, Fa0/4, Gig
1/1, and Gig 1/2.
b. Check results.
c. Check results.
Practical – 9
Objectives
In this activity, you will verify the configuration on the customer Cisco
Catalyst 2960 switch. The switch is already configured with all the basic
necessary information for connecting to the LAN at the customer site. The
switch is currently not connected to the network. You will connect the switch
to the customer workstation, the customer server, and customer router. You
will verify that the switch has been connected and configured successfully
by pinging the LAN interface of the customer router.
b. Using the proper cable, connect the Customer PC to the Customer Switch
on port FastEthernet0/2.
c. Using the proper cable, connect the Local Server to the Customer Switch
on port FastEthernet0/3.
Step 2: Verify the switch configuration.
a. From the Customer PC, use the terminal emulation software to connect to
the console of the customer Cisco Catalyst 2960 switch. Use the console
connection and terminal utility on the Customer PC to verify the
configurations. Use cisco as the console password
b. Enter privileged EXEC mode and use the show running-config command
to verify the following configurations. The password is cisco123.
e. Click the Check Results button at the bottom of this instruction window to
check your work.
Practical -10
1.Star Topology
Description: Star Topology A star may be a topology for a Local Area Network
(LAN) during which allnodes are individually connected to a central connection point,
sort of a hub or a switch. A star takesmorecable than e.g., a bus, but the benefit is that
if a cable fails, just one node is going to be brought down. Each device within the
network is connected to a central device called a hub. If one devicewantsto send
data to another device, it’s to first send the info to the hub then the hub transmits
that data tothe designated device. The number of links required to connect nodes in
the star topology is N where N is the number of nodes.
2. Ring topology
are mentioned as a hoop network. In this packet travels from one device to another
until they reach the desired destination. In this data travels in unidirectional forms
means in only one directionbut it can also do bidirectional by having 2 connections
between each Network Node, it is called Dual Ring Topology. It is used in LANs and
WANs depending on the card of network in the computer.
3. Mesh topology
Description: In Mesh topology the nodes are connected to each other completely via
dedicated link in which the information is travel from nodes to nodes and There are
N(N-1)/2 links in Mesh topology, if there are N nodes.
4. Tree topology
Description: Tree topology is a type of network topology in which the nodes are
organized in the designof a tree. Tree topology consists of the root node from which
the branching cable starts and the branchingcable connects the root node with all other
nodes in a hierarchical manner. Tree topology is less expensivethan mesh topology.
5. Bus Topology
A bus topology is a network in which nodes are directly linked with a common
half-duplex link. Ahost on a bus topology is called a station. In a bus network, every
station will accept all network packets,and these packets generated by each station
have equal information priority. A bus network includes a single network segment
and collision domain.
Steps to Configure and Setup Bus Topology in Cisco Packet Tracer:
Step 1: First, open the cisco packet tracer desktop and select the devices given below:
1. PC PC
2. Switch T-Switch
IP Addressing Table
Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask according to
the IP addressingtable given above.
• To assign an IP address in PC0, click on PC0.
• Then, go to desktop and then IP configuration and there you will IPv4
configuration.
• Fill IPv4 address and subnet mask.
• Repeat the same procedure with other PCs to configure them thoroughly.
Step 3: Verify the connection by pinging the IP address of any host in PC0.
Simulation Result:
A simulation of the experiment is given below we have sent two PDU packets one
targeted from PC0to PC2 and another targeted from PC3 to PC1.
6. Hybrid Topology
The arrangement of a network that comprises nodes and connecting lines via sender
and receiver is referred to as network topology. The combination of two or more
topologies in a computer network is called Hybrid Topology. These combined
topologies can be a combination of bus topology, mesh topology, ring topology, star
topology, and tree topology.
we will see steps to configure and set up Hybrid topology in cisco packet tracer.
Step 1: First, open the cisco packet tracer desktop and select the devices given below:
1. PC PC
2. Switch PT-Switch
IP Addressing Table:
• Then, create a network topology as shown below the image (Bus, ring, and
star topology).
• Use an Automatic connecting cable to connect the devices with others.
Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask according to
the IP addressingtable given above.
• Repeat the same procedure with other PCs to configure them thoroughly.
Step 3: Verify the connection by pinging the IP address of any host in PC0.
• Use the ping command to verify the connection.
• We will check, if we are getting any replies or not.
• As we can see here getting replies from a targeted node on both PCs.
Hence the connectionis verified.
Output:
Practical – 11
What is a VLAN?
A Virtual LAN (VLAN) is simply a logical LAN, just as its name suggests. VLANs
have similar characteristics with those of physical LANs, only that with VLANs, you
can logically group hosts even if they are physically located on separate LAN
segments.
We treat each VLAN as a separate subnet or broadcast domain. For this reason, to
move packets from one VLAN to another, we have to use a router or a layer 3 switch.
VLANs are configured on switches by placing some interfaces into one broadcast
domain and some interfaces into another. For this tutorial, we’ll configure 2 VLANs
on a switch. We’ll then proceed and configure a router to enable communication
between the two VLANs.
So then,
2. Create 2 VLANs on the switch: VLAN 10 and VLAN 20. You can give them custom
names.
Switch(config-vlan)#vlan 20
Switch(config-vlan)#name IT
3. Assign switch ports to the VLANs. Remember each VLAN is viewed as separate
broadcast domain.
And just before you configure, have in mind that switch ports could be either access or
trunk.
So in our case, we’ll configure switch interfaces fa 0/1 through fa 0/4 as access ports
to connect to ourPCs. Here, interfaces fa 0/1 and fa 0/2 are assigned to VLAN 10
while interfaces fa 0/3 and fa 0/4 are assigned to VLAN 20.
Switch Interface fa0/5 will be configured as trunk port, as it will be used to carry
traffic between the twoVLANs via the router.
Switch>enable
Switch#config
terminal
Switch(config)#int fa0/1
access Switch(config-if)#switchport
access vlan 10
Switch(config-if)#int fa0/3
Switch(config-if)#switchport mode
access Switch(config-if)#switchport
access vlan 20
Switch(config-if)#int fa0/4
Worth noting: We could have configured all the above interfaces as access ports
Switch(config-if)#switchport mode access Switch(config-if)#switchport access vlan 20
using interface
range command as shown below:
Switch(config-if-range)#switchport
Switch(config)#int fa 0/5
4 . Assign static IP addresses to the four PCs which are located in the separate VLANs.
PC1 and PC2 fallin VLAN 10 while PC3 and PC4 fall in VLAN 20.
And now it’s very clear that we treat a VLAN just like a physical LAN when
assigning IP addresses.At this point let’s try to test connectivity within VLANs
and between VLANs
To test communication between hosts in the same VLAN:
Now, in order to allow the hosts in the two VLANs to communicate, we need to do
something extra. Andyou can guess what. We’ll configure the router to permit inter-
VLAN communication. Let’s do that rightaway.
We’ll configure the router so that it will enable communication between the two vlans
via a single physical interface. How is this made possible? We’ll divide the single
physical interface on the router into logical interfaces (sub interfaces). Each sub-
interface will then serve as a default gateway for each of the VLANs. This scenario
is called router on a stick (R.O.A.S) and will allow the VLANs to communicate
through the single physical interface.
Wort noting: We can’t assign an IP address to the router’s physical interface that we
Router>enable
Router#config terminal
Router(config)#int fa0/0
Router(config-if)#no
shutdownRouter(config-
if)#int fa0/0.10
Router(config-subif)#encapsulation dot1q 10
255.255.255.0Router(config-subif)#
Router(config-subif)#int fa0/0.20
Router(config-subif)#encapsulation
dot1q 20
EN_NO –221243107007 Page | 58
Router(config-subif)#ip add 192.168.2.1 255.255.255.0
Computer Network 3150710
have subdivided into logical sub-interfaces. We’ll instead assign IP addresses to the
sub interfaces.So let’s do router configurations:
As you can notice from above, the routers physical interface fa0/0 was subdivided
into two sub-interfaces( fa0/0.10 and fa0/0.20) , which are then configured as trunk
interfaces and given IP addresses.
Finally,
Practical –12
Static routing is a routing protocol that helps to keep your network organized and to
optimize routing performance. It enables the router to assign a specific path to each
network segment and to keep track ofnetwork changes. This helps to improve network
stability and continuity. This adds security because a single administrator can only
authorize routing to particular networks.
Steps to Configure and Verify Two Router Connections in Cisco Packet Tracer : Step
1: First, open the cisco packet tracer desktop and select the devices given below:
1. PC PC 4
2. Switch PT-Switch 2
3. Router PT-Router 2
Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask according to
the IP addressingtable given above.
• To assign an IP address in PC0, click on PC0.
• Then, go to desktop and then IP configuration and there you will IPv4
configuration.
• Fill IPv4 address and subnet mask.
• Repeat the same procedure with other PCs to configure them thoroughly.
• Repeat the same procedure with other routers to configure them thoroughly.
Step 6: Verifying the network by pinging the IP address of any PC. We will use the
ping command to doso.
• First, click on PC1 then Go to the command prompt
• Then type ping <IP address of targeted node>
• As we can see in the below image we are getting replies which means
the connection isworking very fine
Simulation:
We are sending PDU from PC0 to PC2.
Practical – 13
Routing Information Protocol (RIP) is an active routing protocol that operates hop
count as a routing metric to find the most suitable route between the source and the
destination network. It is a distance- vector routing protocol that has an AD value of
120 and works on the Network layer of the OSI model.
Step 1: First, open the Cisco packet tracer desktop and select the devices given below:
1. PC PC 6
2. Switch PT-Switch 3
3. Router PT-router 3
IP Addressing Table:
Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask according to the IP
addressingtable given above.
• To assign an IP address in PC0, click on PC0.
• Then, go to desktop and then IP configuration and there you will IPv4
configuration.
• Fill IPv4 address and subnet mask.
• Repeat the same procedure with other PCs to configure them thoroughly.
• Repeat the same procedure with other routers to configure them thoroughly.
Router(config)#network 192.168.10.0
Router(config)#network 10.0.0.0
Router(config)#network 192.168.20.0
Router(config)#network 10.0.0.0
Router(config)#network 11.0.0.0
Router(config)#network 192.168.30.0
Router(config)#network 11.0.0.0
OSPF: - OSPF stands for Open Shortest Path First a link-state protocol and as the
name itself justifies that it is used to find the best and the optimal pathway between
the starting point and the destination target router using its own shortest path first
algorithm. It sends hello packets every 10 seconds. It varies under (LSRP) Link
State Routing Protocol. It automatically generates or decides the optimalpath and
it is used to send router packets with the auto path decision method. It is one of the
Interior gateway protocols that aim to move the packet within a large autonomous
system. OSPF works on port no. 89.
OSPF creates or constructs a topological map of the network from the available router
by gathering link- state routing protocol. OSPF also supports the Classless Inter-
Domain Routing addressing system. The topology of the network is represented as a
routing table to the Internet Layer for routing packets by theirdestination IP address.
Uses of OSPF:
• The idea behind the implementation of OSPF is to decrease or lower the
amount of routingtraffic and lower the tasks of core routers.
• OSPF supports both IPv4 and IPv6 and supports the classless CIDR
addressing system, andis widely used in large enterprise networks.
• OSPF protocol has unlimited hop counts, unlike RIP protocol which has
only 15 hops.
Advantages of OSPF:
• OSPF supports load balancing with equal costs routes.
• Countless hope counts.
• A true loop-free topology
• Classless protocol.
• Supports both IPv4 and IPv6 protocols.
• OSPF can be implemented in a single area or multi-area.
• Provides Load-Balancing with equal cost-routes for the same destination.
• OSPF supports both IPv4 as well as IPv6 protocols.
• It decreases or lowers the overall amount of network traffic.
• Provides the automatic generation and decision over the optimal path.
• It triggers updates for fast convergence.
• It runs on most routers.
Step 1: Initialize the interface and host with IP addresses and default gateway
respectively:
• Network topology consists of 3 Host, 3 Interfaces, and 3 switches
• HOST1: IP 192.168.1.2, Default gateway: 192.168.1.1
• HOST2: IP 192.168.2.2, Default gateway: 192.168.2.1
• HOST3: IP 192.168.3.2, Default gateway: 192.168.3.1
Now comes the main part now we have to configure the OSPF implementation:
Step 1: Configure the Router0 and create router OSPF 1 and then add network id
with wildcard mask.Router(config)#router ospf 1
Step2: Configure the Router1 and create router OSPF 1 and then add network id with
wildcard mask.
Router(config)#router ospf 1
Step 3: Configure the Router2 and create router OSPF 1 and then add network id with
wildcard mask.
Router(config)#router ospf 1
Border Gateway Protocol (BGP) is a routing protocol used to transfer data and
information between different host gateways, the Internet or autonomous systems. BGP
is a Path Vector Protocol (PVP) which maintains paths to different hosts, networks and
gateway routers and determines the routing decision based on that. It does not use
Interior Gateway Protocol (IGP) metrics for routing decisions, but only decides the
route based on path, network policies and rule sets.
Sometimes, BGP is described as a reachability protocol rather than a routing protocol.
Practical - 14
Objectives
Background / Preparation
In this activity, you will test end-to-end connectivity using ping and
traceroute. At the end of this activity, you will be able to distinguish the
difference between successful and unsuccessful ping and traceroute attempts.
Note: Before beginning this activity, make sure that the network is
converged. To converge the network quickly, switch between Simulation
mode and Realtime mode until all the link lights turn green.
Step 1: Test connectivity using ping from a host computer and a router.
Click N-Host, click the Desktop tab, and then click Command Prompt.
From the Command Prompt window, ping the Cisco server at
www.cisco.com.
PC>ping 192.168.4.10
Pinging 192.168.4.10 with 32 bytes of data:
Request timed out.
Request timed out.
Control-C ^ C PC>
Click the N-Branch router, and then click the CLI tab. Press Enter to get the
router prompt. From the router prompt, ping the Cisco server at
www.cisco.com.
N-Branch>ping www.cisco.com
Translating "www.cisco.com"...domain server (64.100.1.242) Type escape
sequence to abort.
Sending 5, 100-byte ICMP Echos to 64.100.1.185, timeout is 2 seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 210/211/213 ms N-
Branch>
As you can see, the ping output on a router is different from a PC host.
Notice that the N-Branch router resolved the domain name to the same IP
address that N-Host used to send its pings. Also notice that the first ping
fails, which is indicated by a period (.), and that the next four pings succeed,
as shown with an exclamation point (!).
From the CLI tab on N-Branch, ping E-Host at 192.168.4.10. Again, the
pings fail. To not wait for all the failures, press Ctrl+C.
N-Branch>ping 192.168.4.10
Step 2: Test connectivity using traceroute from a host computer and a router.
a. Click N-Host, click the Desktop tab, and then click Command
Prompt. From the Command Prompt window, trace the route to
the Cisco server at www.cisco.com.
PC>tracert www.cisco.com
1 92 ms 77 ms 86 ms 192.168.1.1
2 91 ms 164 ms 84 ms 64.100.1.101
The above output shows that you can successfully trace a route all the way to the
Cisco server at 64.100.1.185. Each hop in the path is a router responding three
times to trace messages from N-Host. The trace continues until the destination
for the trace (64.100.1.185) responds three times.
PC>tracert 192.168.4.10
1 103ms 45 ms 91 ms 192.168.1.1
Click the N-Branch router, and then click the CLI tab. Press Enter to
get the router prompt. From the router prompt, trace the route to the
Cisco server at www.cisco.com.
N-Branch>traceroute www.cisco.com
Translating
"www.cisco.com"...domain server
(64.100.1.242) Type escape
sequence to abort.
N-Branch>
N-Branch>traceroute 192.168.4.10
Type escape sequence to abort. Tracing the route to 192.168.4.10
Throughout this course, you will often use ping and traceroute to test
connectivity and troubleshoot problems. To practice these commands, ping
and trace from W-Host and S-Host to any other destination in the network.
You can also ping and trace from N-Branch to other locations.
Practical – 15
Objectives
• Enable RIP.
A simple routed network has been set up to assist in reviewing RIP routing
behavior. In this activity, you will configure RIP across the network and set
up end devices to communicate on the network.
a. From the CLI, configure interface Fast Ethernet 0/0 using the IP address
10.0.0.254 /8.
ii. PC1 uses the second usable IP address in network 172.16.0.0 /16.
iii. Specify the appropriate default gateway and subnet mask on each PC.
a. Configure interface Fast Ethernet 0/0 using the second usable IP address in
network 192.168.0.0
/24 to connect to the RTR01 router.
ii. PC3 uses the second usable IP address in network 172.17.0.0 /16.
iii. Specify the appropriate default gateway and subnet mask on each PC.
a. At the command prompt for each router, issue the commands show
ip protocols and show ip route to verify RIP routing is fully
converged. The show ip protocols command displays the networks
the router is advertising and the addresses of other RIP routing
neighbors. The show ip route command output displays all routes
know to the local router including the RIP routes which are indicated
by an “R”.
b. Every device should now be able to successfully ping any other device in this
activity.
c. Click the Check Results button at the bottom of this instruction window to
check your work.