You are on page 1of 94

CERTIFICATE

This Is To Certify that Mr. /Miss Harsh F Gurnani


EnrollmentNo. 211240116074 Of Program B.E Semester :5
Branch INFORMATION TECHNOLOGY Has Satisfactorily
Completed
His/her Term Work In Course Of COMPUTER NETWORKS (3150710) For
the Term Ending In 2023 _____________

3-10-2023

FACULTY SIGN DATE OF HEAD OF


SUBMISSION DEPARTMENT
Computer Networks 3150710

Practical -1

AIM:- Study of different network devices in detail.


1. Repeater – A repeater operates at the physical layer. Its job is to regenerate the
signal over the same network before the signal becomes too weak or corrupted so as
to extend the length to which the signal can be transmitted over the same network.
An important point to be noted about repeaters is that theydo not amplify the signal.
When the signal becomes weak, they copy the signal bit by bit and regenerateit at the
original strength. It is a 2 port device.

2. Hub – A hub is basically a multiport repeater. A hub connects multiple wires


coming from different branches, for example, the connector in star topology which
connects different stations. Hubs cannot filter data, so data packets are sent to all
connected devices. In other words, the collision domain of all hosts connected
through Hub remains one. Also, they do not have the intelligence to find out the best
path for data packets which leads to inefficiencies and wastage.

Types of Hub
Active Hub:- These are the hubs that have their own power supply and can clean,
boost, and relay the signal along with the network. It serves both as a repeater as well
as a wiring center. These are used to extend the maximum distance between nodes.

Passive Hub :- These are the hubs that collect wiring from nodes and power supply
from the active hub.These hubs relay signals onto the network without cleaning and
boosting them and can’t be used to extend the distance between nodes.

Intelligent Hub :- It works like active hubs and includes remote management
capabilities. They also provide flexible data rates to network devices. It also enables
an administrator to monitor the traffic passing through the hub and to configure each
port in the hub.

EN_NO –221243107007 Page | 1


Computer Networks 3150710

3. Bridge – A bridge operates at the data link layer. A bridge is a repeater, with add
on the functionalityof filtering content by reading the MAC addresses of source and
destination. It is also used for interconnecting two LANs working on the same
protocol. It has a single input and single output port, thus making it a 2 port device.

Types of Bridges

Transparent Bridges:- These are the bridge in which the stations are completely
unaware of the bridge’s existence i.e. whether or not a bridge is added or deleted from
the network, reconfiguration of the stations is unnecessary. These bridges make use
of two processes i.e. bridge forwarding and bridge learning.

Source Routing Bridges:- In these bridges, routing operation is performed by the


source station and theframe specifies which route to follow. The host can discover the
frame by sending a special frame calledthe discovery frame, which spreads through
the entire network using all possible paths to the destination.

4. Switch – A switch is a multiport bridge with a buffer and a design that can boost
its efficiency(a largenumber of ports imply less traffic) and performance. A switch is
a data link layer device. The switch canperform error checking before forwarding
data, which makes it very efficient as it does not forward packets that have errors and
forward good packets selectively to the correct port only. In other words, theswitch
divides the collision domain of hosts, but broadcast domain remains the same.

5. Routers – A router is a device like a switch that routes data packets based on their
IP addresses. The router is mainly a Network Layer device. Routers normally connect
LANs and WANs together and havea dynamically updating routing table based on
which they make decisions on routing the data packets. Router divide broadcast
domains of hosts connected through it.

EN_NO –221243107007 Page | 2


Computer Networks 3150710

6. Gateway – A gateway, as the name suggests, is a passage to connect two networks


together that may work upon different networking models. They basically work as
the messenger agents that take data from one system, interpret it, and transfer it to
another system. Gateways are also called protocol converters and can operate at any
network layer. Gateways are generally more complex than switches or routers.
Gateway is also called a protocol converter

7. Brouter – It is also known as the bridging router is a device that combines features
of both bridge androuter. It can work either at the data link layer or a network layer.
Working as a router, it is capable of routing packets across networks, and working as
the bridge, it is capable of filtering local area network traffic.

8. NIC – NIC or network interface card is a network adapter that is used to connect
the computer tothe network. It is installed in the computer to establish a LAN. It has
a unique id that is written on the chip, and it has a connector to connect the cable to it.
The cable acts as an interface between the computerand router or modem. NIC card is
a layer 2 device which means that it works on both physical and data link layer of the
network model.

EN_NO –221243107007 Page | 3


Computer Networks 3150710

Practical -2

AIM: - Study of different types of network cables and


practically implement the cross-wired cable and straight
through cable using clamping tool.
To connect two or more computers or networking devices in a network, network
cables are used. Thereare three types of network cables; coaxial, twisted-pair, and
fiber-optic.

Coaxial cable: -
This cable contains a conductor, insulator, braiding, and sheath. The sheath covers
the braiding, the braiding covers the insulation, and the insulation covers the
conductor.

The following image shows these components.

Sheath
This is the outer layer of the coaxial cable. It protects the cable from physical damage.
Braided shield
This shield protects signals from external interference and noise. This shield is built
from the same metalthat is used to build the core.

EN_NO –221243107007 Page | 4


Computer Networks 3150710

Insulation
Insulation protects the core. It also keeps the core separate from the braided shield.
Since both the core and the braided shield use the same metal, without this layer, they
will touch each other and create a short-circuit in the wire.

Conductor
The conductor carries electromagnetic signals. Based on conductor a coaxial cable
can be categorizedinto two types; single-core coaxial cable and multi-core coaxial
cable.

A single-core coaxial cable uses a single central metal (usually copper) conductor,
while a multi-core coaxial cable uses multiple thin strands of metal wires. The
following image shows both types of cable.

The coaxial cables were not primarily developed for the computer network. These
cables were developedfor general purposes. They were in use even before computer
networks came into existence. They are still used even their use in computer networks
has been completely discontinued.
At the beginning of computer networking, when there were no dedicated media cables
available for computer networks, network administrators began using coaxial cables
to build computer networks.
Because of its low cost and long durability, coaxial cables were used in computer
networking for nearlytwo decades (the 80s and 90s). Coaxial cables are no longer used
to build any type of computer network.

EN_NO –221243107007 Page | 5


Computer Networks 3150710

Specifications of coaxial cables:


Coaxial cables have been in use for the last four decades. During these years, based
on several factors such as the thickness of the sheath, the metal of the conductor, and
the material used in insulation, hundreds of specifications have been created to
specify the characteristics of coaxial cables.

• Coaxial cable uses RG rating to measure the materials used in shielding and
conducting cores.
• RG stands for the Radio Guide. Coaxial cable mainly uses radio frequencies in
transmission.
• Impedance is the resistance that controls the signals. It is expressed in the ohms.
• AWG stands for American Wire Gauge. It is used to measure the size of the
core. The larger theAWG size, the smaller the diameter of the core wire.

Twisted-pair cables: -
The twisted-pair cable was primarily developed for computer networks. This
cable is also knownas Ethernet cable. Almost all modern LAN computer networks
use this cable.
This cable consists of color-coded pairs of insulated copper wires. Every two wires
are twisted around each other to form pair. Usually, there are four pairs. Each pair has
one solid color and one stripped color wire. Solid colors are blue, brown, green, and
orange. In stripped color, the solid color is mixed with thewhite color. Based on how
pairs are stripped in the plastic sheath, there are two types of twisted-pair cable; UTP
and STP.
In the UTP (Unshielded twisted-pair) cable, all pairs are wrapped in a single plastic
sheath.
In the STP (Shielded twisted-pair) cable, each pair is wrapped with an additional
metal shield, then allpairs are wrapped in a single outer plastic sheath.

Similarities and differences between STP and UTP cables


• Both STP and UTP can transmit data at 10Mbps, 100Mbps, 1Gbps, and 10Gbps.
• Since the STP cable contains more materials, it is more expensive than the UTP
cable.

EN_NO –221243107007 Page | 6


Computer Networks 3150710

• Both cables use the same RJ-45 (registered jack) modular connectors.
• Both cables can accommodate a maximum of 1024 nodes in each segment.
• The STP provides more noise and EMI resistance than the UTP cable.
• The maximum segment length for both cables is 100 meters or 328 feet.

The following image shows both types of twisted-pair cables.

• To learn how twisted-pair cables are used in the LAN network, you can check the
following tutorial.

Twisted-pair cabling:

This tutorial explains how the twisted-pair cable works and how it is used to connect
different networking devices in a network.
The TIA/EIA specifies standards for the twisted-pair cable. The first standards were
released in 1991, known as TIA/EIA 568. Since then, these standards have been
continually revised to cover the latest technologies and developments of the
transmission media.
The TIA/EIA 568 divides the twisted-pair cable into several categories.

EN_NO –221243107007 Page | 7


Computer Networks 3150710

The following table lists the most common and popular categories of twisted-pair
cable:

Fiber optic cable:


This cable consists of a core, cladding, buffer, and jacket. The core is made from thin
strands of glass orplastic that can carry data over a long distance. The core is wrapped in
the cladding; the cladding is wrapped in the buffer, and the buffer is wrapped in the
jacket.
• Core carries the data signals in the form of light.
• Cladding reflects light back to the core.
• Buffer protects the light from leaking.
• The jacket protects the cable from physical damage.

Fiber optic cable is completely immune to EMI and RFI. This cable can transmit data over
a long distanceat the highest speed. It can transmit data up to 40 kilometers at the speed
of 100Gbps.
Fiber optic uses light to send data. It reflects light from one endpoint to another. Based
on how many beams of light are transmitted at a given time, there are two types of
fiber optical cable; SMF and MMF.

EN_NO –221243107007 Page | 8


Computer Networks 3150710

SMF (Single-mode fiber) optical cable


This cable carries only a single beam of light. This is more reliable and supports much
higher bandwidthand longer distances than the MMF cable. This cable uses a laser as
the light source and transmits 1300 or 1550 nano-meter wavelengths of light.

MMF (multi-mode fiber) optical cable


This cable carries multiple beams of light. Because of multiple beams, this cable
carries much more datathan the SMF cable. This cable is used for shorter distances.
This cable uses an LED as the light source and transmits 850 or 1300 nano-meter
wavelengths of light.

Apparatus (Components): RJ-45 connector, Climping Tool, Twisted pair Cable


Procedure: To do these practical following steps should be done:

1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable.
Be very careful at this point, as to not nick or cut into the wires, which are inside.
Doing so could alter the characteristics of your cable, or even worse render is useless.
Check the wires, one more time for nicks or cuts. If thereare any, just whack the whole
end off, and start over.

EN_NO –221243107007 Page | 9


Computer Networks 3150710

2. Spread the wires apart, but be sure to hold onto the base of the jacket with your
other hand. You do not want the wires to become untwisted down inside the jacket.
Category 5 cable must only have 1/2 of an inch of 'untwisted' wire at the end;
otherwise it will be 'out of spec'. At this point, you obviously haveALOT more than
1/2 of an inch of un-twisted wire.

3. You have 2 end jacks, which must be installed on your cable. If you are using a
pre-made cable, withone of the ends whacked off, you only have one end to install -
the crossed over end. Below are two diagrams, which show how you need to arrange
the cables for each type of cable end. Decide at this pointwhich end you are making
and examine the associated picture below.

Diagram shows you how to prepare Cross wired connection

EN_NO –221243107007 Page | 10


Computer Networks 3150710

Diagram shows you how to prepare Straight wired connection

EN_NO –221243107007 Page | 11


Computer Networks 3150710

Practical -3

AIM:- Study of network IP

• Classification of IP address
• Sub netting
• Super netting
Apparatus (Software): NA

Procedure: Following is required to be study under this practical.


• Classification of IP address

As show in figure we teach how the ip addresses are classified and when they are used.

Class Address Range Supports


Class A 1.0.0.1 to 126.255.255.254 Supports 16 million hosts on each of 127 networks.
Class B 128.1.0.1 to 191.255.255.254 Supports 65,000 hosts on each of 16,000 networks.
Class C 192.0.1.1 to 223.255.254.254 Supports 254 hosts on each of 2 million networks.

Class D 224.0.0.0 to 239.255.255.255 Reserved for multicast groups.

Class E 240.0.0.0 to 254.255.255.254 Reserved.

• Sub netting
Why we Develop sub netting and How to calculate subnet mask and how to identify
subnet address.

• Super netting
Why we develop super netting and How to calculate super net mask and how
to identify super net address.

EN_NO –221243107007 Page | 12


Computer Networks 3150710

Practical – 4

AIM: - Connect the computers in Local Area Network


Procedure:
On the host computer: -
follow these steps to share the Internet connection:
1. Log on to the host computer as Administrator or as Owner.
2. Click Start, and then click Control Panel.
3. Click Network and Internet Connections.
4. Click Network Connections.
5. Right-click the connection that you use to connect to the Internet. For example, if
you connect to theInternet by using a modem, right-click the connection that you want
under Dial-up / Another network available.
6. Click Properties.
7. Click the Advanced tab.
8. Under Internet Connection Sharing, select the Allow other network users to
connect through thiscomputer's Internet connection check box.
9. If you are sharing a dial-up Internet connection, select the Establish a dial-up
connection whenever a computer on my network attempts to access the Internet check
box if you want to permit your computer to automatically connect to the Internet.
10. Click OK. You receive the following message: When Internet Connection Sharing is
enabled, your LANadapter will be set to use IP address 192.168.0.1. Your computer may
lose connectivity with other computerson your network. If these other computers have
static IP addresses, it is a good idea to set them to obtain their IP addresses automatically.
Are you sure you want to enable Internet Connection Sharing?
11. Click Yes. The connection to the Internet is shared to other computers on the local
area network (LAN).The network adapter that is connected to the LAN is configured
with a static IP address of 192.168.0.1 anda subnet mask of 255.255.255.0

EN_NO –221243107007 Page | 13


Computer Networks 3150710

On the client computer: -


To connect to the Internet by using the shared connection, you must confirm the LAN
adapter IPconfiguration, and then configure the client computer. To confirm the LAN
adapter IP configuration, followthese steps:
1. Log on to the client computer as Administrator or as Owner.
2. Click Start, and then click Control Panel.
3. Click Network and Internet Connections.
4. Click Network Connections.
5. Right-click Local Area Connection and then click Properties.
6. Click the General tab, click Internet Protocol (TCP/IP) in the connection uses the
following items list,and then click Properties.
7. In the Internet Protocol (TCP/IP) Properties dialog box, click Obtain an IP address
automatically (if it isnot already selected), and then click OK.
8. IP Address 192.168.31.202
9. Subnet mask 255.255.255.0
10. Default gateway 192.168.31.1
11. In the Local Area Connection Properties dialog box, click OK.
12. Quit Control Panel.

EN_NO –221243107007 Page | 14


Computer Networks 3150710

Practical - 5

AIM: - Study of basic network command and Network configuration


commands.

Output: -

The operating system consists of various built-in, command-line networking utilities


that are used for network troubleshooting. We will see various networking commands
which are most essentials for everynetwork administrator.

1. Ping

Ping is used to testing a network host capacity to interact with another host. Just enter
the command Ping,followed by the target host’s name or IP address. The ping utilities
seem to be the most common networktool. This is performed by using the Internet
Control Message Protocol, which allows the echo packet to
be sent to the destination host and a listening mechanism. If the destination host reply
to the requesting host, that means the host is reachable. This utility usually gives a
basic image of where there may be a specific networking issue,

For Example: If an Internet connection is not in the office, for instance, the ping
utility is used to determine if the problem exists in the office or the Internet provider’s
network. The following shows an image of how ping tools to obtain the locally
connected router’s connectivity status.

EN_NO –221243107007 Page | 15


Computer Networks 3150710

There are various options a user can use with the Ping command.

Options Description

target This is the destination IP address or a hostname user want to


ping.

-a This option resolves the hostname of an IP address target.

-t This ping command option will ping the target until you
stop it bypressing Ctrl-C.

-n count This option is used to set the number of ICMP Echo Requests
to send,from 1 to 4294967295. If -n is not specified, the ping
command will return 4 by default.

-l size This option is used to set the size, in bytes, of the echo-
request packet from 32 to 65,527. If the -l option is not
specified, the ping command will send a 32-byte echo
request.

-s count This option is used to report the time in the Internet


Timestamp formatthat each echo request is received and an
echo reply is sent. The maximum count value is 4, i.e. only
the first four hops can be time stamped.

EN_NO –221243107007 Page | 16


Computer Networks 3150710

-r count This command uses the ping command option to specify the
number of hops between the source computer and the target
computer. The maximum count value is 9; the Tracert command
can also be used if the user wants to view all the hops between
two devices.

-i TTL This ping command option sets the Time to Live (TTL)
value; themaximum value is 255.

-f Use this ping command option to prevent ICMP Echo Requests


from being fragmented by routers between the source and the
target. The -f option is often used to troubleshoot Path Maximum
Transmission Unit (PMTU) issues.

-w timeout A timeout value must be specified while executing this ping


command. It adjusts the amount of time in milliseconds. If the -
w option is not specified, then the default timeout value of 4000
is set, which is 4 seconds.

-p To ping a Hyper-V Network Virtualization provider address.

-S srcaddr This option is used to specify the source address.

EN_NO –221243107007 Page | 17


Computer Network 3150710

2. NetStat

Netstat is a Common TCP – IP networking command-line method present in most


Windows, Linux, UNIX, and other operating systems. The netstat provides the
statistics and information in the use of the current TCP-IP Connection network about
the protocol.
There are various options a user can use with the Netstat command.

Options are as follows-


• -a: This will display all connection and ports
• -b: Shows the executable involved in each connection or hearing port
• -e: This protocol will combine with the -sand display the ethernet statistics
• -n: This will display the address and the port number in the form of numerical
• -o: It will display the ID of each connection for the ownership process.
• -r: It will display the routing table
• -v: When used in combination with -b, the link or hearing port sequence for
every executable isshown.

Steps to Determine Your Computer’s Name


Open a terminal window and type the command given below.
hostname
It will provide the name of your computer. The first part of the result is the name
of a computer and thesecond part is the name of the domain.

To get only the computer name, run the following command:


hostname -s
The output will be localhost.
Similarly, if a user wants to find out which domain system is running, then use the
hostname -d
following command.
The IP address for the hostname can also be retrieved by using the following
command.”
hostname -i
User can find out all the aliases for the computer by using the command given
below.
hostname -a

EN_NO –221243107007 Page | 18


Computer Network 3150710

3. Ip Config

The command IP config will display basic details about the device’s IP address
configuration. Just type IP config in the Windows prompt and the IP, subnet mask
and default gateway that the current device will be presented. If you have to see full
information, then type on command prompt config-all and then you will see full
information. There are also choices to assist you in resolving DNS and DHCP issues.

4. Hostname

To communicate with each and other, the computer needs a unique address. A
hostname can be alphabetic or alphanumeric and contain specific symbols used
specifically to define a specific node or device in the network. For example, a
hostname should have a domain name (TLD) of the top-level and a distance between
one and 63 characters when used in a domain name system (DNS) or on the Internet.

5. Tracert

The tracert command is a Command Prompt command which is used to get the network
packet being

sent and received and the number of hops required for that packet to reach to target.
This command can also be referred to as a traceroute. It provides several details about
the path that a packet takes from the source to the specified destination.
The tracert command is available for the Command Prompt in all Windows operating
systems
The syntax for Tracert Command

tracert [-d] [-h MaxHops] [-w TimeOut] target

There are various options the user can use with tracert command.

Options for tracert Command are as follows-


• target: This is the destination, either an IP address or hostname.
• –d: This option prevents Tracert from resolving IP addresses to hostnames to get
faster results.
• -h MaxHops: This Tracert option specifies the maximum number of hops in
the search for the target. If the MaxHops option is not specified the target has
not been found by 30 hops, then thetracert command will stop looking.

EN_NO –221243107007 Page | 19


Computer Network 3150710

• -w timeout: A timeout value must be specified while executing this ping


command. It adjusts theamount of time in milliseconds.

6. Nslookup

The Nslookup, which stands for name server lookup command, is a network utility
command used to obtain information about internet servers. It provides name server
information for the DNS (Domain Name System), i.e. the default DNS server’s name
and IP Address.
The syntax for Nslookup is as follows.

Nslookup

or

Nslookup [domain_name]

7. Route

In IP networks, routing tables are used to direct packets from one subnet to another.
The Route commandprovides the device’s routing tables. To get this result, just type
route print. The Route command returns the routing table, and the user can make
changes by Commands such as Route Add, Route Delete, and Route Change, which
allows modifying the routing table as a requirement.

8. ARP

ARP Stands for Address Resolution Protocol. Although network communications can
readily be thoughtof as an IP address, the packet delivery depends ultimately on the
media access control (MAC). This is where the protocol for address resolution comes
into effect. You can add the remote host IP address, which is an arp -a command, in
case you have issues to communicate with a given host. The ARP command provides
information like Address, Flags, Mask, IFace, Hardware Type, Hardware Address,
etc.
9. Path Ping

We discussed the Ping command and the Tracert command. There are similarities
between these commands. The pathping command which provides a combination of

EN_NO –221243107007 Page | 20


Computer Network 3150710

the best aspects of Tracert and Ping.


This command takes 300 seconds to gather statistics and then returns reports on
latency and packet loss statistics at intermediate hops between the source and the target
in more detail than those reports providedby Ping or Tracert commands.
The syntax for path ping is as follows:

path ping [-n] [-h] [-g <Hostlist>] [-p <Period>] [-q <NumQueries> [-w <timeout>] [-i <IPaddress>]
[-
4 <IPv4>] [-6 <IPv6>][<TargetName>]

• N: Prevents path ping functioning from attempting to resolve routers’ IP addresses


to their names.
• -h MaxHops: This tracert option specifies the maximum number of hops in
the search for the target. If the MaxHops option is not specified the target has
not been found by 30 hops then the tracert command will stop looking.
• -w timeout: A timeout value must be specified while executing this ping
command. It adjusts theamount of time in milliseconds.

• -ip <IPaddress>: Indicates the source address.


• target: This is the destination IP address or a hostname user want to ping.

Conclusion

This has seen various networking commands like Route, Arp, etc., along with their
syntax and examples. I hope these commands will help you while troubleshooting in
a quick time.

EN_NO –221243107007 Page | 21


Computer Network 3150710

Practical – 6

Aim:- Performing an Initial Switch Configuration

Topology Diagram

Objectives

• Perform an initial configuration of a Cisco Catalyst 2960 switch.


Background / Preparation

In this activity, you will configure these settings on the customer Cisco Catalyst 2960
switch:

• Host name

• Console password

• vty password

• Privileged EXEC mode password

• Privileged EXEC mode secret

• IP address on VLAN1 interface

• Default gateway

Note: Not all commands are graded by Packet Tracer.

EN_NO –221243107007 Page | 22


Computer Network 3150710

Step 1: Configure the switch host name.

a. From the Customer PC, use a console cable and terminal emulation
software to connect to the console of the customer Cisco Catalyst
2960 switch.

b. Set the host name on the switch to CustomerSwitch using these commands.

Switch>enable Switch#configure terminal

Switch(config)#hostname CustomerSwitch

Step 2: Configure the privileged mode password and secret.

a. From global configuration mode, configure the password as cisco.


CustomerSwitch(config)#enable password cisco

b. From global configuration mode, configure the secret as cisco123.


CustomerSwitch(config)#enable secret cisco123

Step 3: Configure the console password.

a. From global configuration mode, switch to configuration mode to configure


the console line.

CustomerSwitch(config)#line console 0

b. From line configuration mode, set the password to cisco and


require the password to be entered at login.

CustomerSwitch(config-line)#password cisco CustomerSwitch(config-


line)#login CustomerSwitch(config-line)#exit
Step 4: Configure the vty password.

a. From global configuration mode, switch to the configuration mode for the vty

EN_NO –221243107007 Page | 23


Computer Network 3150710

b. lines 0 through 15.


CustomerSwitch(config)#line vty 0 15

c. From line configuration mode, set the password to cisco and


require the password to be entered at login.

CustomerSwitch(config-line)#password cisco CustomerSwitch(config-


line)#login CustomerSwitch(config-line)#exit

Step 5: Configure an IP address on interface VLAN1.

From global configuration mode, switch to interface configuration mode for


VLAN1, and assign the IP address 192.168.1.5 with the subnet mask of
255.255.255.0.

CustomerSwitch(config)#interface vlan 1
CustomerSwitch(config-if)#ip address 192.168.1.5 255.255.255.0
CustomerSwitch(config-if)#no shutdown
CustomerSwitch(config-if)#exit

Step 6: Configure the default gateway.

a. From global configuration mode, assign the default gateway to 192.168.1.1.


CustomerSwitch(config)#ip default-gateway 192.168.1.1

b. Click the Check Results button at the bottom of this instruction window to
check your work.
Step 7: Verify the configuration.

The Customer Switch should now be able to ping the ISP Server at
209.165.201.10. The first one or two pings may fail while ARP converges.
CustomerSwitch(config)#end CustomerSwitch#ping 209.165.201.10

EN_NO –221243107007 Page | 24


Computer Network 3150710

Type escape sequence to abort.


Sending 5, 100-byte ICMP Echos to 209.165.201.10, timeout is 2 seconds:
..!!!
Success rate is 60 percent (3/5), round-trip min/avg/max
= 181/189/197 ms CustomerSwitch#

EN_NO –221243107007 Page | 25


Computer Network 3150710

Practical-7

AIM:- Performing an Initial Router Configuration.

Topology Diagram

Objectives

• Configure the router host name.

• Configure passwords.

• Configure banner messages.

• Verify the router configuration.

Background / Preparation

In this activity, you will use the Cisco IOS CLI to apply an initial
configuration to a router, including host name, passwords, a message-of-
the-day (MOTD) banner, and other basic settings.

Note: Some of the steps are not graded by Packet Tracer.

EN_NO –221243107007 Page | 26


Computer Network 3150710

Step 1: Configure the router host name.

a. On Customer PC, use the terminal emulation software to connect to


the console of the customer Cisco 1841 ISR.

Set the host name on the router to CustomerRouter by using these commands.
Router>enable Router#configure terminal
Router(config)#hostname CustomerRouter

Step 2: Configure the privileged mode and secret passwords.

a. In global configuration mode, set the password to cisco.

CustomerRouter(config)#enable password cisco

Set an encrypted privileged password to cisco123 using the secret command.

CustomerRouter(config)#enable secret cisco123

Step 3: Configure the console password.

a. In global configuration mode, switch to line configuration mode to specify the


console line.
CustomerRouter(config)#line console 0

Set the password to cisco123, require that the password be entered at login, and then exit
line configuration mode.
CustomerRouter(config-line)#password cisco123
CustomerRouter(config-line)#login CustomerRouter(config-line)#exit
CustomerRouter(config)#

Step 4: Configure the vty password to allow Telnet access to the router.

a. In global configuration mode, switch to line configuration mode to


specify the vtylines.
CustomerRouter(config)#line vty 0 4

EN_NO –221243107007 Page | 27


Computer Network 3150710

Set the password to cisco123, require that the password be entered at login, exit line
configuration mode, and then
exit the configuration session.
CustomerRouter(config-line)#password cisco123
CustomerRouter(config-line)#login CustomerRouter(config-line)#exit
CustomerRouter(config)#

Step 5: Configure password encryption, a MOTD banner, and turn off domain server
lookup.

a. Currently, the line passwords and the enable password are shown
in clear text when you show the running configuration. Verify this
now by entering the show running-config command.

To avoid the security risk of someone looking over your shoulder and
reading the passwords, encrypt all clear text passwords.

CustomerRouter(config)#service password-encryption

Use the show running-config command again to verify that the passwords are
encrypted.

To provide a warning when someone attempts to log in to the router, configure a MOTD
banner.

CustomerRouter(config)#banner motd $Authorized Access Only!$

Test the banner and passwords. Log out of the router by typing the exit command
twice. The banner displays before the prompt for a password. Enter the password
to log back into the router.

You may have noticed that when you enter a command incorrectly at the user or
privileged EXEC prompt, the router pauses while trying to locate an IP address for

EN_NO –221243107007 Page | 28


Computer Network 3150710

the mistyped word you entered. For example, this output shows what happens
when the enable command is mistyped.
CustomerRouter>emable
Translating "emable"...domain server (255.255.255.255)

To prevent this from happening, use the following command to stop all DNS
lookups from the router CLI.
CustomerRouter(config)#no ip domain-lookup

Save the running configuration to the startup configuration.

CustomerRouter(config)#end CustomerRouter#copy run start

Step 6: Verify the configuration.

a. Log out of your terminal session with the Cisco 1841 customer router.

b. Log in to the Cisco 1841 Customer Router. Enter the console password when
prompted.

c. Navigate to privileged EXEC mode. Enter the privileged EXEC password


when prompted.

d. Click the Check Results button at the bottom of this instruction window to
check your work.

EN_NO –221243107007 Page | 29


Computer Network 3150710

Practical-8

Aim :- Configuring and Troubleshooting a Switched Network

Topology Diagram

Objectives

• Establish console connection to the switch.

• Configure the host name and VLAN1.

• Use the help feature to configure the clock.

• Configure passwords and console/Telnet access.

• Configure login banners.

• Configure the router.

• Solve duplex and speed mismatch problems.

• Configure port security.

• Secure unused ports.

• Manage the switch configuration file.

EN_NO –221243107007 Page | 30


Computer Network 3150710

Background / Preparation

In this Packet Tracer Skills Integration Challenge activity, you will configure
basic switch management, including general maintenance commands,
passwords, and port security. This activity provides you an opportunity to
review previously acquired skills.

Addressing Table

Device Interfac IP Address Subnet Mask


e
R1 Fa0/0 172.17.99.1 255.255.255.
0
S1 Fa0/1 172.17.99.11 255.255.255.
0
PC1 NIC 172.17.99.21 255.255.255.
0
PC2 NIC 172.17.99.22 255.255.255.
0
Server NIC 172.17.99.31 255.255.255.
0

Step 1: Establish a console connection to a switch.

For this activity, direct access to the S1 Config and CLI tabs is disabled. You
must establish a console session through PC1.

a. Connect a console cable from PC1 to S1.

b. From PC1, open a terminal window and use the default terminal
configuration. You should now have access to the CLI for S1.

c. Check results.

Your completion percentage should be 8%. If not, click Check Results to


see which required components are not yet completed.

EN_NO –221243107007 Page | 31


Computer Network 3150710

Step 2: Configure the host name and VLAN 1.

a. Configure the switch host name as S1.

b. Configure port Fa0/1. Set the mode on Fast Ethernet 0/1 to access mode.
i. S1(config)#interface fastethernet 0/1
ii. S1(config-if)#switchport mode access
c. Configure IP connectivity on S1 using VLAN 1.
i. S1(config)#interface vlan 1
ii. S1(config-if)#ip address 172.17.99.11 255.255.255.0
iii. S1(config-if)#no shutdown
d. Configure the default gateway for S1 and then test connectivity. S1 should be able
to ping R1.

e. Check results.

Your completion percentage should be 31%. If not, click Check Results to


see which required components are not yet completed. Also, make sure that
interface VLAN 1 is active.

Step 3: Configure the current time using Help.

a. Configure the clock to the current time. At the privileged EXEC prompt,
enter clock?

b. Use Help to discover the steps required to set the current time.

c. Use the show clock command to verify that the clock is now set
to the current time. Packet Tracer may not correctly simulate the
time you entered.

Packet Tracer does not grade this command, so the completion percentage does not
change.

Step 4: Configure passwords.

a. Use the encrypted form of the privileged EXEC mode password and set the
password to class.

EN_NO –221243107007 Page | 32


Computer Network 3150710

b. Configure the passwords for console and Telnet. Set both the
console and vty password to cisco and require users to log in.

c. View the current configuration on S1. Notice that the line


passwords are shown in clear text. Enter the command to encrypt
these passwords.

d. Check results.

Your completion percentage should be 42%. If not, click Check Results to


see which required components are not yet completed.

Step 5: Configure the login banner.

If you do not enter the banner text exactly as specified, Packet Tracer does
not grade your command correctly. These commands are case-sensitive. Also
make sure that you do not include any spaces before or after the text.

a. Configure the message-of-the-day banner on S1 to display as


Authorized Access Only. (Do not include the period.)

b. Check results.

Your completion percentage should be 46%. If not, click Check Results to


see which required components are not yet completed.
Step 6: Configure the router.

Routers and switches share many of the same commands. Configure the
router with the same basic commands you used on S1.

a. Access the CLI for R1 by clicking the device.

b. Do the following on R1:

• Configure the hostname of the router as R1.

• Configure the encrypted form of the privileged EXEC mode


password and set the password to class.

• Set the console and vty password to cisco and require users to log in.

• Encrypt the console and vty passwords.

EN_NO –221243107007 Page | 33


Computer Network 3150710

• Configure the message-of-the-day as Authorized Access Only. (Do not


include the period.)

c. Check results.

Your completion percentage should be 65%. If not, click Check Results to


see which required components are not yet completed.

Step 7: Solve a mismatch between duplex and speed.

a. PC1 and Server currently do not have access through S1 because the
duplex and speed are mismatched. Enter commands on S1 to solve this
problem.

b. Verify connectivity.

c. Both PC1 and Server should now be able to ping S1, R1, and each other.

d. Check results.

Your completion percentage should be 73%. If not, click Check Results to


see which required components are not yet completed.

Step 8: Configure port security.

a. Use the following policy to establish port security on the port used by PC1:

• Enable port security

• Allow only one MAC address

• Configure the first learned MAC address to "stick" to the configuration

Note: Only enabling port security is graded by Packet Tracer and counted
toward the completion percentage. However, all the port security tasks listed
above are required to complete this activity successfully.

b. Verify that port security is enabled for Fa0/18. Your output should
look like the following output. Notice that S1 has not yet learned
a MAC address for this interface. What command generated this
output?

EN_NO –221243107007 Page | 34


Computer Network 3150710

S1#

Port Security : Enabled


Port Status : Secure-up Violation Mode : Shutdown
Aging Time : 0 mins
Aging Type : Absolute
SecureStatic Address Aging : Disabled
Maximum MAC Addresses 1
Total MAC Addresses 0
Configured MAC Addresses 0
Sticky MAC Addresses 0
Last Source Address:Vlan : 0000.0000.0000:0
Security Violation Count :0

c. Force S1 to learn the MAC address for PC1. Send a ping from PC1
to S1. Then verify that S1 added the MAC address for PC1 to the
running configuration.

!
interface FastEthernet0/18
<output omitted>
switchport port-security mac-address sticky 0060.3EE6.1659
<output omitted>
!

d. Test port security. Remove the FastEthernet connection between S1


and PC1. Connect PC2 to Fa0/18. Wait for the link lights to turn
green. If necessary, send a ping from PC2 to S1 to cause the port to
shut down. Port security should show the following results: (the Last
Source Address may be different)

EN_NO –221243107007 Page | 35


Computer Network 3150710

Port Security : Enabled


Port Status

: Secure-shutdown
Violation Mode : Shutdown
Aging Time : 0 mins
Aging Type : Absolute
SecureStatic
Address Aging :
Disabled
Maximum MAC
Addresses 1
Total MAC Addresses 1

Configured
MAC
Addresses : 1
Sticky MAC
Addresses 0
Last Source Address:Vlan :
00D0.BAD6.5193:99
Security Violation Count 1

e. Viewing the Fa0/18 interface shows that line protocol is down (err-
disabled), which also indicates a security violation.
S1#show interface fa0/18
FastEthernet0/18 is down, line protocol is down (err-disabled)
<output omitted>
f. Reconnect PC1 and re-enable the port. To re-enable the port,
disconnect PC2 from Fa0/18 and reconnect PC1. Interface Fa0/18
must be manually reenabled with the no shutdown command before
returning to the active state.

EN_NO –221243107007 Page | 36


Computer Network 3150710

g. Check results.

Your completion percentage should be 77%. If not, click Check Results to


see which required components are not yet completed.

Step 9: Secure unused ports.

a. Disable all ports that are currently not used on S1. Packet Tracer
grades the status of the following ports: Fa0/2, Fa0/3, Fa0/4, Gig
1/1, and Gig 1/2.

b. Check results.

Your completion percentage should be 96%. If not, click Check Results to


see which required components are not yet completed.

Step 10: Manage the switch configuration file.

a. Save the current configuration for S1 and R1 to NVRAM.

b. Back up the startup configuration file on S1 and R1 by uploading


them to Server. Verify that Server has the R1-confg and S1-confg
files.

c. Check results.

Your completion percentage should be 100%. If not, click Check Results to


see which required components are not yet completed

EN_NO –221243107007 Page | 37


Computer Network 3150710

Practical – 9

Aim :- Connecting a switch

Objectives

• Connect a switch to the network.

• Verify the configuration on the switch.


Background / Preparation

In this activity, you will verify the configuration on the customer Cisco
Catalyst 2960 switch. The switch is already configured with all the basic
necessary information for connecting to the LAN at the customer site. The
switch is currently not connected to the network. You will connect the switch
to the customer workstation, the customer server, and customer router. You
will verify that the switch has been connected and configured successfully
by pinging the LAN interface of the customer router.

Step 1: Connect the switch to the LAN.

a. Using the proper cable, connect the FastEthernet0/0 on Customer


Router to the FastEthernet0/1 on Customer Switch.

b. Using the proper cable, connect the Customer PC to the Customer Switch
on port FastEthernet0/2.

c. Using the proper cable, connect the Local Server to the Customer Switch

EN_NO –221243107007 Page | 38


Computer Network 3150710

on port FastEthernet0/3.
Step 2: Verify the switch configuration.

a. From the Customer PC, use the terminal emulation software to connect to
the console of the customer Cisco Catalyst 2960 switch. Use the console
connection and terminal utility on the Customer PC to verify the
configurations. Use cisco as the console password

b. Enter privileged EXEC mode and use the show running-config command
to verify the following configurations. The password is cisco123.

a. VLAN1 IP address = 192.168.1.5

b. Subnet mask = 255.255.255.0

c. Password required for console access

d. Password required for vty access

e. Password enabled for privileged EXEC mode

f. Secret enabled for privileged EXEC mode

d. Verify IP connectivity between the Cisco Catalyst 2960 switch and


the Cisco 1841 router by initiating a ping to 192.168.1.1 from the
switch CLI.

e. Click the Check Results button at the bottom of this instruction window to
check your work.

EN_NO –221243107007 Page | 39


Computer Network 3150710

Practical -10

AIM:- Implement different LAN topologies using Network Simulator.

Network topology is the geometric representation of relationship of all the links


connecting the devices or nodes. Network topology represent in two ways one is
physical topology that define the way in whicha network is physically laid out and
other one is logical topology that defines how data actually flow through the network.
In this paper we have discuss how to design bus, star and mesh topology network and
provide interfacing and simulation between end points using packet tracer software.

Cisco Packet Tracer (CPT) is multi-tasking network simulation software to perform


and analyze variousnetwork activities such as implementation of different topologies,
select optimum path based on various routing algorithms, create DNS and DHCP
server, sub netting, analyze various network configuration and troubleshooting
commands.

EN_NO –221243107007 Page | 40


Computer Network 3150710

1.Star Topology

Description: Star Topology A star may be a topology for a Local Area Network
(LAN) during which allnodes are individually connected to a central connection point,
sort of a hub or a switch. A star takesmorecable than e.g., a bus, but the benefit is that
if a cable fails, just one node is going to be brought down. Each device within the
network is connected to a central device called a hub. If one devicewantsto send
data to another device, it’s to first send the info to the hub then the hub transmits
that data tothe designated device. The number of links required to connect nodes in
the star topology is N where N is the number of nodes.

2. Ring topology

Description: may be a network configuration where device connections create a


circular data path. In thiseach device is connected to with its exactly two neighbouring
devices, like points on a circle which formslike a ring structure. A number of repeaters
are used for Ring topology with a large number of nodes to send data and to prevent
data loss repeaters are used in this network. Together, devices during a ring topology

EN_NO –221243107007 Page | 41


Computer Network 3150710

are mentioned as a hoop network. In this packet travels from one device to another
until they reach the desired destination. In this data travels in unidirectional forms
means in only one directionbut it can also do bidirectional by having 2 connections
between each Network Node, it is called Dual Ring Topology. It is used in LANs and
WANs depending on the card of network in the computer.

3. Mesh topology

Description: In Mesh topology the nodes are connected to each other completely via
dedicated link in which the information is travel from nodes to nodes and There are
N(N-1)/2 links in Mesh topology, if there are N nodes.

EN_NO –221243107007 Page | 42


Computer Network 3150710

4. Tree topology

Description: Tree topology is a type of network topology in which the nodes are
organized in the designof a tree. Tree topology consists of the root node from which
the branching cable starts and the branchingcable connects the root node with all other
nodes in a hierarchical manner. Tree topology is less expensivethan mesh topology.

5. Bus Topology
A bus topology is a network in which nodes are directly linked with a common
half-duplex link. Ahost on a bus topology is called a station. In a bus network, every
station will accept all network packets,and these packets generated by each station
have equal information priority. A bus network includes a single network segment
and collision domain.
Steps to Configure and Setup Bus Topology in Cisco Packet Tracer:

Step 1: First, open the cisco packet tracer desktop and select the devices given below:

EN_NO –221243107007 Page | 43


Computer Network 3150710

S.NO Device Model-Name

1. PC PC

2. Switch T-Switch

IP Addressing Table

S.NO Device IPv4 Address Subnet Mask

1 pc0 192.168.0.1 255.255.255.0

2 pc1 192.168.0.2 255.255.255.0

3 pc2 192.168.0.3 255.255.255.0

4 pc3 192.168.0.4 255.255.255.0

• Then, create a network topology as shown below image:


• Use an Automatic connecting cable to connect the devices with others.

EN_NO –221243107007 Page | 44


Computer Network 3150710

Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask according to
the IP addressingtable given above.
• To assign an IP address in PC0, click on PC0.

• Then, go to desktop and then IP configuration and there you will IPv4
configuration.
• Fill IPv4 address and subnet mask.

• Assigning an IP address using the ipconfig command, or we can also


assign an IP addresswith the help of a command.
• Go to the command terminal of the PC.
• Then, type ipconfig <IPv4 address><subnet mask><default gateway>(if
needed)

EN_NO –221243107007 Page | 45


Computer Network 3150710

Example: ipconfig 192.168.0.1 255.255.255.0

• Repeat the same procedure with other PCs to configure them thoroughly.
Step 3: Verify the connection by pinging the IP address of any host in PC0.

• Use the ping command to verify the connection.


• As we can see we are getting replies from a targeted node on both PCs.
• Hence the connection is verified.

EN_NO –221243107007 Page | 46


Computer Network 3150710

Simulation Result:

A simulation of the experiment is given below we have sent two PDU packets one
targeted from PC0to PC2 and another targeted from PC3 to PC1.

EN_NO –221243107007 Page | 47


Computer Network 3150710

6. Hybrid Topology

The arrangement of a network that comprises nodes and connecting lines via sender
and receiver is referred to as network topology. The combination of two or more
topologies in a computer network is called Hybrid Topology. These combined
topologies can be a combination of bus topology, mesh topology, ring topology, star
topology, and tree topology.

we will see steps to configure and set up Hybrid topology in cisco packet tracer.

Step 1: First, open the cisco packet tracer desktop and select the devices given below:

S.NO Device Model Name

1. PC PC

2. Switch PT-Switch

EN_NO –221243107007 Page | 48


Computer Network 3150710

IP Addressing Table:

S.NO Device IPv4 Address Subnet Mask

1. pc0 192.168.0.1 255.255.255.0

2. pc1 192.168.0.2 255.255.255.0

3. pc2 192.168.0.3 255.255.255.0

4. pc3 192.168.0.4 255.255.255.0

5. pc4 192.168.0.5 255.255.255.0

6. pc5 192.168.0.6 255.255.255.0

7. pc6 192.168.0.7 255.255.255.0

8. pc7 192.168.0.8 255.255.255.0

9. pc8 192.168.0.9 255.255.255.0

• Then, create a network topology as shown below the image (Bus, ring, and
star topology).
• Use an Automatic connecting cable to connect the devices with others.

EN_NO –221243107007 Page | 49


Computer Network 3150710

Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask according to
the IP addressingtable given above.

• To assign an IP address in PC0, click on PC0.


• Then, go to desktop and IP configuration and there you will find IPv4
configuration.
• Add IPv4 address and subnet mask.

Assigning IP address using the ipconfig command.


• We can also assign an IP address with the help of a command.
• Go to the command terminal of the PC.
• Now type ipconfig <IPv4 address><subnet mask><default gateway>(if
needed)

EN_NO –221243107007 Page | 50


Computer Network 3150710

exmaple: ipconfig 192.168.0.1 255.255.255.0

• Repeat the same procedure with other PCs to configure them thoroughly.

Step 3: Verify the connection by pinging the IP address of any host in PC0.
• Use the ping command to verify the connection.
• We will check, if we are getting any replies or not.
• As we can see here getting replies from a targeted node on both PCs.
Hence the connectionis verified.

EN_NO –221243107007 Page | 51


Computer Network 3150710

• A simulation of the experiment is given below we have sent two PDU


packets one targetedfrom PC0 to PC4 and another targeted from PC3 to
PC8.

EN_NO –221243107007 Page | 52


Computer Network 3150710

Output:

EN_NO –221243107007 Page | 53


Computer Network 3150710

Practical – 11

AIM:- Implement the concept of VLAN using Network Simulator.

What is a VLAN?
A Virtual LAN (VLAN) is simply a logical LAN, just as its name suggests. VLANs
have similar characteristics with those of physical LANs, only that with VLANs, you
can logically group hosts even if they are physically located on separate LAN
segments.

We treat each VLAN as a separate subnet or broadcast domain. For this reason, to
move packets from one VLAN to another, we have to use a router or a layer 3 switch.

VLANs are configured on switches by placing some interfaces into one broadcast
domain and some interfaces into another. For this tutorial, we’ll configure 2 VLANs
on a switch. We’ll then proceed and configure a router to enable communication
between the two VLANs.
So then,

1. In Cisco Packet Tracer, create the network topology as shown below:

EN_NO –221243107007 Page | 54


Computer Network 3150710

2. Create 2 VLANs on the switch: VLAN 10 and VLAN 20. You can give them custom
names.

Switch# config terminal Switch(config)#vlan 10

Switch(config-vlan)# name SALES

Switch(config-vlan)#vlan 20

Switch(config-vlan)#name IT

3. Assign switch ports to the VLANs. Remember each VLAN is viewed as separate
broadcast domain.

And just before you configure, have in mind that switch ports could be either access or
trunk.

• An access port is assigned to a single VLAN . These ports are configured


for switch ports thatconnect to devices with a normal network card, for
example a PC in a network.
• A trunk port on the other hand is a port that can be connected to another
switch or router. Thisport can carry traffic of multiple VLANs.

So in our case, we’ll configure switch interfaces fa 0/1 through fa 0/4 as access ports
to connect to ourPCs. Here, interfaces fa 0/1 and fa 0/2 are assigned to VLAN 10
while interfaces fa 0/3 and fa 0/4 are assigned to VLAN 20.
Switch Interface fa0/5 will be configured as trunk port, as it will be used to carry
traffic between the twoVLANs via the router.

EN_NO –221243107007 Page | 55


Computer Network 3150710

Switch>enable

Switch#config

terminal

Switch(config)#int fa0/1

Switch(config-if)#switchport mode access

Switch(config-if)#switchport access vlan 10

Switch(config-if)#int fa0/2 mode


Switch(config-if)#switchport

access Switch(config-if)#switchport

access vlan 10

Switch(config-if)#int fa0/3

Switch(config-if)#switchport mode

access Switch(config-if)#switchport

access vlan 20

Switch(config-if)#int fa0/4
Worth noting: We could have configured all the above interfaces as access ports
Switch(config-if)#switchport mode access Switch(config-if)#switchport access vlan 20
using interface
range command as shown below:

Switch(config-if)#int range fa0/1-4

Switch(config-if-range)#switchport

Inmode accesscommands, we have specified an interface range and then proceeded


the above
to configure all theports specified as access ports.

EN_NO –221243107007 Page | 56


Computer Network 3150710

Interface fa0/5 is configured as trunk and will be used to for inter-VLAN


communication.

Switch(config)#int fa 0/5

Switch(config-if)#switchport mode trunk

The next thing is to:

4 . Assign static IP addresses to the four PCs which are located in the separate VLANs.
PC1 and PC2 fallin VLAN 10 while PC3 and PC4 fall in VLAN 20.

PC1 IP address 192.168.1.10 Subnet mask 255.255.255.0 Default


gateway 192.168.1.1

PC2: IP address 192.168.1.20 Subnet mask 255.255.255.0 Default


gateway 192.168.1.1

PC3: IP address 192.168.2.10 Subnet mask 255.255.255.0 Default


gateway 192.168.2.1

PC4: IP address 192.168.2.20 Subnet mask 255.255.255.0 Default


gateway 192.168.2.1

And now it’s very clear that we treat a VLAN just like a physical LAN when
assigning IP addresses.At this point let’s try to test connectivity within VLANs
and between VLANs
To test communication between hosts in the same VLAN:

Ping PC2 from PC1 both in VLAN 10. Ping test


should be successful.To test connectivity between
hosts in different VLANs:
Ping PC3 in VLAN 20 from PC1 in VLAN 10. Ping here will definitely fail. Why?
Because inter-VLANrouting is not yet enabled. Hope you can see how we’ve used
VLANs to place the hosts into two logicalnetworks which can be viewed as separate
broadcast domains.

EN_NO –221243107007 Page | 57


Computer Network 3150710

Now, in order to allow the hosts in the two VLANs to communicate, we need to do
something extra. Andyou can guess what. We’ll configure the router to permit inter-
VLAN communication. Let’s do that rightaway.

5. Configure inter-VLAN routing on the router

We’ll configure the router so that it will enable communication between the two vlans
via a single physical interface. How is this made possible? We’ll divide the single
physical interface on the router into logical interfaces (sub interfaces). Each sub-
interface will then serve as a default gateway for each of the VLANs. This scenario
is called router on a stick (R.O.A.S) and will allow the VLANs to communicate
through the single physical interface.

Wort noting: We can’t assign an IP address to the router’s physical interface that we

Router>enable

Router#config terminal

Router(config)#int fa0/0

Router(config-if)#no

shutdownRouter(config-

if)#int fa0/0.10

Router(config-subif)#encapsulation dot1q 10

Router(config-subif)#ip add 192.168.1.1

255.255.255.0Router(config-subif)#

Router(config-subif)#int fa0/0.20

Router(config-subif)#encapsulation

dot1q 20
EN_NO –221243107007 Page | 58
Router(config-subif)#ip add 192.168.2.1 255.255.255.0
Computer Network 3150710

have subdivided into logical sub-interfaces. We’ll instead assign IP addresses to the
sub interfaces.So let’s do router configurations:
As you can notice from above, the routers physical interface fa0/0 was subdivided
into two sub-interfaces( fa0/0.10 and fa0/0.20) , which are then configured as trunk
interfaces and given IP addresses.
Finally,

6. Test inter-VLAN connectivity.


Here we’ll test connectivity between computers in different VLANs . Don’t forget that
its the router thatenables inter-VLAN routing.
Ping PC3 in VLAN 20 from PC1 in VLAN 10. If everything is well configured, then
ping should workperfectly.

EN_NO –221243107007 Page | 59


Computer Network 3150710

Practical –12

AIM:- Implement the concept of static routing.

Static routing is a routing protocol that helps to keep your network organized and to
optimize routing performance. It enables the router to assign a specific path to each
network segment and to keep track ofnetwork changes. This helps to improve network
stability and continuity. This adds security because a single administrator can only
authorize routing to particular networks.
Steps to Configure and Verify Two Router Connections in Cisco Packet Tracer : Step
1: First, open the cisco packet tracer desktop and select the devices given below:

S.NO Device Model Name Qty.

1. PC PC 4

2. Switch PT-Switch 2

3. Router PT-Router 2

IP Addressing Table For PCs:

S.NO Device IPv4 Address Subnet Mask Default Gateway

1. pc0 192.168.1.2 255.255.255.0 192.168.1.1

2. pc1 192.168.1.3 255.255.255.0 192.168.1.1

3. pc2 192.168.2.2 255.255.255.0 192.168.2.1

4. pc3 192.168.2.3 255.255.255.0 192.168.2.1

• Then, create a network topology as shown below the image.


• Use an Automatic connecting cable to connect the devices with others.

EN_NO –221243107007 Page | 60


Computer Network 3150710

Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask according to
the IP addressingtable given above.
• To assign an IP address in PC0, click on PC0.
• Then, go to desktop and then IP configuration and there you will IPv4
configuration.
• Fill IPv4 address and subnet mask.

EN_NO –221243107007 Page | 61


Computer Network 3150710

Step 3: Assigning IP address using the ipconfig command.


• We can also assign an IP address with the help of a command.
• Go to the command terminal of the PC.
• Then, type ipconfig <IPv4 address><subnet mask><default gateway>(if
needed)

Example: ipconfig 192.168.1.3 255.255.255.0 192.168.1.1

• Repeat the same procedure with other PCs to configure them thoroughly.

EN_NO –221243107007 Page | 62


Computer Network 3150710

Step 4: Configure router with IP address and subnet mask.

S.NO Device Interface IPv4 Addressing Subnet Mask

FastEthernet0/0 192.168.1.1 255.255.255.0

1. router0 Serial2/0 11.0.0.1 255.255.255.0

FastEthernet0/0 192.168.2.1 255.255.255.0

2. router1 Serial2/0 11.0.0.2 255.255.255.0

• To assign an IP address in router0, click on router0.


• Then, go to config and then Interfaces.
• Then, configure the IP address in FastEthernet and serial ports according
to IP addressingTable.
• Fill IPv4 address and subnet mask.

• Repeat the same procedure with other routers to configure them thoroughly.

EN_NO –221243107007 Page | 63


Computer Network 3150710

Step 5: After configuring all of the devices we need to assign the


routes to the routers.To assign static routes to the particular router:

First, click on router0 then Go to CLI.


Then type the commands and IP information given below.CLI command :
ip route <network id> <subnet mask><next hop>
Static Routes for Router0 are given below:

Router(config)#ip route 192.168.2.0 255.255.255.0 11.0.0.2Static Routes for Router1


are given below:
Router(config)#ip route 192.168.1.0 255.255.255.0 11.0.0.1

Step 6: Verifying the network by pinging the IP address of any PC. We will use the
ping command to doso.
• First, click on PC1 then Go to the command prompt
• Then type ping <IP address of targeted node>
• As we can see in the below image we are getting replies which means
the connection isworking very fine

7. Example : ping 192.168.2.2

EN_NO –221243107007 Page | 64


Computer Network 3150710

Simulation:
We are sending PDU from PC0 to PC2.

EN_NO –221243107007 Page | 65


Computer Network 3150710

Practical – 13

AIM:- Implement the concept of dynamic routing (RIP, OSPF, BGP).

Routing Information Protocol (RIP) is an active routing protocol that operates hop
count as a routing metric to find the most suitable route between the source and the
destination network. It is a distance- vector routing protocol that has an AD value of
120 and works on the Network layer of the OSI model.

Steps to Configure and Verify Three Router Connections in Cisco Packet


Tracer using RIP Routing:

Step 1: First, open the Cisco packet tracer desktop and select the devices given below:

S.NO Device Model Name Qty.

1. PC PC 6

2. Switch PT-Switch 3

3. Router PT-router 3

IP Addressing Table:

S.NO Device IPv4 Address Subnet mask Default Gateway

1. PC0 192.168.10.2 255.255.255.0 192.168.10.1

2. PC1 192.168.10.3 255.255.255.0 192.168.10.1

3. PC2 192.168.20.2 255.255.255.0 192.168.20.1

4. PC3 192.168.20.3 255.255.255.0 192.168.20.1

5. PC4 192.168.30.2 255.255.255.0 192.168.30.1

6. PC5 192.168.30.3 255.255.255.0 192.168.30.1

EN_NO –221243107007 Page | 66


Computer Network 3150710

• Then, create a network topology as shown below the image.


• Use an Automatic connecting cable to connect the devices with others.

Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask according to the IP
addressingtable given above.
• To assign an IP address in PC0, click on PC0.
• Then, go to desktop and then IP configuration and there you will IPv4
configuration.
• Fill IPv4 address and subnet mask.

EN_NO –221243107007 Page | 67


Computer Network 3150710

EN_NO –221243107007 Page | 68


Computer Network 3150710

• Assigning an IP address using the ipconfig command, or we can also


assign an IP addresswith the help of a command.
• Go to the command terminal of the PC.
• Then, type iPConfig <IPv4 address><subnet mask><default
gateway>(if needed) Example: iPConfig 192.168.10.2 255.255.255.0
192.168.10.1

• Repeat the same procedure with other PCs to configure them thoroughly.

EN_NO –221243107007 Page | 69


Computer Network 3150710

Step 3: Configure router with IP address and Subnet mask.

IP Addressing Table Router:

S.NO Device Interface IPv4 Address Subnet mask

FastEthernet0/0 192.168.10.1 255.255.255.0

1. router0 Serial2/0 10.0.0.1 255.0.0.0

FastEthernet0/0 192.168.20.1 255.255.255.0

Serial2/0 10.0.0.2 255.0.0.0

2. router1 Serial3/0 11.0.0.1 255.0.0.0

FastEthernet0/0 192.168.30.1 255.255.255.0

3. router2 Serial2/0 11.0.0.2 255.0.0.0

• To assign an IP address in router0, click on router0.


• Then, go to config and then Interfaces.
• Make sure to turn on the ports.
• Then, configure the IP address in FastEthernet and serial ports according
to IP addressingTable.
• Fill IPv4 address and subnet mask.

EN_NO –221243107007 Page | 70


Computer Network 3150710

• Repeat the same procedure with other routers to configure them thoroughly.

EN_NO –221243107007 Page | 71


Computer Network 3150710

Step 4: After configuring all of the devices we need to assign the


routes to the routers.To assign RIP routes to the particular router:
First, click on router0 then Go to CLI.
Then type the commands and IP information given below.CLI command : network
<network id>
RIP Routes for Router0 are given below:

Router(config)#network 192.168.10.0

Router(config)#network 10.0.0.0

RIP Routes for Router1 are given below:

Router(config)#network 192.168.20.0

Router(config)#network 10.0.0.0

Router(config)#network 11.0.0.0

RIP Routes for Router2 are given below:

Router(config)#network 192.168.30.0

Router(config)#network 11.0.0.0

Step 5: Verifying the network by pinging the IP address of any PC.


• We will use the ping command to do so.
• First, click on PC0 then Go to the command prompt.
• Then type ping <IP address of targeted node>.
• As we can see in the below image we are getting replies which means
the connection isworking properly.

EN_NO –221243107007 Page | 72


Computer Network 3150710

Example : ping 192.168.20.2

• A simulation of the experiment is given below we are sending PDU


from PC0 to PC2 andPC3 to PC5:

EN_NO –221243107007 Page | 73


Computer Network 3150710

OSPF: - OSPF stands for Open Shortest Path First a link-state protocol and as the
name itself justifies that it is used to find the best and the optimal pathway between
the starting point and the destination target router using its own shortest path first
algorithm. It sends hello packets every 10 seconds. It varies under (LSRP) Link
State Routing Protocol. It automatically generates or decides the optimalpath and
it is used to send router packets with the auto path decision method. It is one of the
Interior gateway protocols that aim to move the packet within a large autonomous
system. OSPF works on port no. 89.

OSPF creates or constructs a topological map of the network from the available router
by gathering link- state routing protocol. OSPF also supports the Classless Inter-
Domain Routing addressing system. The topology of the network is represented as a
routing table to the Internet Layer for routing packets by theirdestination IP address.

EN_NO –221243107007 Page | 74


Computer Network 3150710

Uses of OSPF:
• The idea behind the implementation of OSPF is to decrease or lower the
amount of routingtraffic and lower the tasks of core routers.
• OSPF supports both IPv4 and IPv6 and supports the classless CIDR
addressing system, andis widely used in large enterprise networks.
• OSPF protocol has unlimited hop counts, unlike RIP protocol which has
only 15 hops.

Why is OSPF Better for Network Management?


OSPF is very reliable because of the strict division of level of routing as it has
complete information on network topology and it also supports interface-based
plaintext and md5 authentication.

Advantages of OSPF:
• OSPF supports load balancing with equal costs routes.
• Countless hope counts.
• A true loop-free topology
• Classless protocol.
• Supports both IPv4 and IPv6 protocols.
• OSPF can be implemented in a single area or multi-area.
• Provides Load-Balancing with equal cost-routes for the same destination.
• OSPF supports both IPv4 as well as IPv6 protocols.
• It decreases or lowers the overall amount of network traffic.
• Provides the automatic generation and decision over the optimal path.
• It triggers updates for fast convergence.
• It runs on most routers.

Commands to Configuring OSPF:


(config)# router ospf<process ID>

(config-router)# network<network ID><wildcard mask>area<area ID>

EN_NO –221243107007 Page | 75


Computer Network 3150710

Implement the OSPF Single Area Network:

Step 1: Initialize the interface and host with IP addresses and default gateway
respectively:
• Network topology consists of 3 Host, 3 Interfaces, and 3 switches
• HOST1: IP 192.168.1.2, Default gateway: 192.168.1.1
• HOST2: IP 192.168.2.2, Default gateway: 192.168.2.1
• HOST3: IP 192.168.3.2, Default gateway: 192.168.3.1

• As we can see we have configured interface 1 (Router0) with Host 1


which is PC0 and theSerial port.

EN_NO –221243107007 Page | 76


Computer Network 3150710

EN_NO –221243107007 Page | 77


Computer Network 3150710

Step 2: Configuring the Interface 2 which is router1.

EN_NO –221243107007 Page | 78


Computer Network 3150710

Step 3: Configuring the Interface 3 which is router2.

EN_NO –221243107007 Page | 79


Computer Network 3150710

Now comes the main part now we have to configure the OSPF implementation:

Step 1: Configure the Router0 and create router OSPF 1 and then add network id
with wildcard mask.Router(config)#router ospf 1

Router(config-router)#network 192.168.1.0 0.255.255.255 area 0

Router(config-router)#network 10.0.0.0 0.0.0.255 area 0

EN_NO –221243107007 Page | 80


Computer Network 3150710

Step2: Configure the Router1 and create router OSPF 1 and then add network id with
wildcard mask.

Router(config)#router ospf 1

Router(config-router)#network 10.0.0.0 0.0.0.255 area 0

Router(config-router)#network 20.0.0.0 0.0.0.255 area 0

Router(config-router)#network 192.168.2.0 0.255.255.255 area 0

EN_NO –221243107007 Page | 81


Computer Network 3150710

Step 3: Configure the Router2 and create router OSPF 1 and then add network id with
wildcard mask.
Router(config)#router ospf 1

Router(config-router)#network 192.168.3.0 0.255.255.255 area 0

Router(config-router)#network 255.0.0.0 0.0.0.255 area 0

EN_NO –221243107007 Page | 82


Computer Network 3150710

Border Gateway Protocol (BGP) is a routing protocol used to transfer data and
information between different host gateways, the Internet or autonomous systems. BGP
is a Path Vector Protocol (PVP) which maintains paths to different hosts, networks and
gateway routers and determines the routing decision based on that. It does not use
Interior Gateway Protocol (IGP) metrics for routing decisions, but only decides the
route based on path, network policies and rule sets.
Sometimes, BGP is described as a reachability protocol rather than a routing protocol.

BGP roles include:

• Because it is a PVP, BGP communicates the entire autonomous system/network


path topology toother networks
• Maintains its routing table with topologies of all externally connected networks
• Supports classless interdomain routing (CIDR), which allocates Internet
Protocol (IP) addresses toconnected Internet devices

When used to facilitate communication between different autonomous systems, BGP is


referred to as External BGP (EBGP). When used at host networks/autonomous systems,
BGP is referred to as Internal BGP (IBGP).

EN_NO –221243107007 Page | 83


Computer Network 3150710

BGP Configuration In Cisco Packet Tracer

Only external BGP is supported at this moment. A pity!

EN_NO –221243107007 Page | 84


Computer Network 3150710

Practical - 14

Aim :- Interpreting ping and trace route

Objectives

• Distinguish the difference between successful and unsuccessful ping attempts.

• Distinguish the difference between successful and unsuccessful traceroute


attempts.

Background / Preparation

In this activity, you will test end-to-end connectivity using ping and
traceroute. At the end of this activity, you will be able to distinguish the
difference between successful and unsuccessful ping and traceroute attempts.

Note: Before beginning this activity, make sure that the network is
converged. To converge the network quickly, switch between Simulation
mode and Realtime mode until all the link lights turn green.

EN_NO –221243107007 Page | 85


Computer Network 3150710

Step 1: Test connectivity using ping from a host computer and a router.

Click N-Host, click the Desktop tab, and then click Command Prompt.
From the Command Prompt window, ping the Cisco server at
www.cisco.com.

Packet Tracer PC Command Line 1.0 PC>ping www.cisco.com

Pinging 64.100.1.185 with 32 bytes of data: Request timed out.

Reply from 64.100.1.185: bytes=32 time=185ms TTL=123 Reply from 64.100.1.185:


bytes=32 time=281ms TTL=123 Reply from 64.100.1.185: bytes=32 time=287ms
TTL=123

Ping statistics for 64.100.1.185:


Packets: Sent = 4, Received = 3, Lost = 1 (25% loss), Approximate round-trip times in
milli-seconds:
Minimum = 185ms, Maximum = 287ms, Average = 251ms PC>
From the output, you can see that N-Host was able to obtain an IP address for
the Cisco server. The IP address was obtained using (DNS). Also notice that
the first ping failed. This failure is most likely due to lack of ARP
convergence between the source and destination. If you repeat the ping, you
will notice that all pings succeed.

From the Command Prompt window on N-Host, ping E-Host at 192.168.4.10.


The pings fail. If you do not want to wait for all four unsuccessful ping
attempts, press Ctrl+C to abort the command, as shown below.

PC>ping 192.168.4.10
Pinging 192.168.4.10 with 32 bytes of data:
Request timed out.
Request timed out.

Ping statistics for 192.168.4.10:


Packets: Sent = 3, Received = 0, Lost = 3 (100% loss),

EN_NO –221243107007 Page | 86


Computer Network 3150710

Control-C ^ C PC>
Click the N-Branch router, and then click the CLI tab. Press Enter to get the
router prompt. From the router prompt, ping the Cisco server at
www.cisco.com.

N-Branch>ping www.cisco.com
Translating "www.cisco.com"...domain server (64.100.1.242) Type escape
sequence to abort.
Sending 5, 100-byte ICMP Echos to 64.100.1.185, timeout is 2 seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 210/211/213 ms N-
Branch>
As you can see, the ping output on a router is different from a PC host.
Notice that the N-Branch router resolved the domain name to the same IP
address that N-Host used to send its pings. Also notice that the first ping
fails, which is indicated by a period (.), and that the next four pings succeed,
as shown with an exclamation point (!).

From the CLI tab on N-Branch, ping E-Host at 192.168.4.10. Again, the
pings fail. To not wait for all the failures, press Ctrl+C.

N-Branch>ping 192.168.4.10

Type escape sequence to abort.


Sending 5, 100-byte ICMP Echos to 192.168.4.10, timeout is 2 seconds:
...
Success rate is 0 percent (0/4) N-Branch>

Step 2: Test connectivity using traceroute from a host computer and a router.

a. Click N-Host, click the Desktop tab, and then click Command
Prompt. From the Command Prompt window, trace the route to
the Cisco server at www.cisco.com.
PC>tracert www.cisco.com

EN_NO –221243107007 Page | 87


Computer Network 3150710

Tracing route to 64.100.1.185 over a maximum of 30 hops:

1 92 ms 77 ms 86 ms 192.168.1.1

2 91 ms 164 ms 84 ms 64.100.1.101

3 135 ms 168 ms 151 ms 64.100.1.6

4 185 ms 261 ms 161 ms 64.100.1.34

5 257 ms 280 ms 224 ms 64.100.1.62

6 310 ms 375 ms 298 ms 64.100.1.185

Trace complete. PC>

The above output shows that you can successfully trace a route all the way to the
Cisco server at 64.100.1.185. Each hop in the path is a router responding three
times to trace messages from N-Host. The trace continues until the destination
for the trace (64.100.1.185) responds three times.

From the Command Prompt window on N-Host, trace a route to E-Host at


192.168.4.10. The trace fails, but notice that the tracert command traces up to
30 hops. If you do not want to wait for all 30 attempts to time out, press
Ctrl+C.

PC>tracert 192.168.4.10

Tracing route to 192.168.4.10 over a maximum of 30 hops:

1 103ms 45 ms 91 ms 192.168.1.1

2 56 ms 110 ms 125ms 64.100.1.101

3 174ms 195 ms 134ms 64.100.1.6

EN_NO –221243107007 Page | 88


Computer Network 3150710

4 246ms 183 ms 179ms 64.100.1.34

5 217 ms 285 ms 226 ms 64.100.1.62

6 246 ms 276 ms 245 ms 64.100.1.154


7 * * * Request timed out.
8 * * * Request timed out.
9 * * * Request timed out. 10
Control^C
PC>

The tracert command can be helpful in finding the potential source


of a problem. The last device to respond was 64.100.1.154, so you
would start troubleshooting by determining which device is
configured with the IP address 64.100.1.154. The source of the
problem might not be that device, but the trace has given you a starting
point, whereas a ping simply tells you that the destination is either
reachable or unreachable.

Click the N-Branch router, and then click the CLI tab. Press Enter to
get the router prompt. From the router prompt, trace the route to the
Cisco server at www.cisco.com.

N-Branch>traceroute www.cisco.com
Translating
"www.cisco.com"...domain server
(64.100.1.242) Type escape
sequence to abort.

Tracing the route to 64.100.1.185

1 64.100.1.101 60 msec 32 msec 59 msec

2 64.100.1.6 98 msec 65 msec 65 msec

EN_NO –221243107007 Page | 89


Computer Network 3150710

3 64.100.1.34 138 msec 147 msec 147 msec

4 64.100.1.62 189 msec 148 msec 145 msec

5 64.100.1.185 219 msec 229 msec 293 msec

N-Branch>

As you can see, traceroute output on a router is very similar to the


output on a PC host. The only difference is that on a PC host, the IP
address is listed after the three millisecond outputs.

From the CLI tab on N-Branch, trace the route to E-Host at


192.168.4.10. The trace fails at the same IP address as it failed when
tracing from N-Host. Again, you can use Ctrl+C to abort the
command.

N-Branch>traceroute 192.168.4.10
Type escape sequence to abort. Tracing the route to 192.168.4.10

1 64.100.1.101 41 msec 19 msec 32 msec


2 64.100.1.6 33 msec 92 msec 117 msec
3 64.100.1.34 98 msec 102 msec 102 msec
4 64.100.1.62 166 msec 172 msec 156 msec
5 64.100.1.154 157 msec 223 msec 240 msec
6 * * *
7 * * *
8 * * *9
N-Branch>
Step 3: Practice the ping and trace route commands.

Throughout this course, you will often use ping and traceroute to test
connectivity and troubleshoot problems. To practice these commands, ping
and trace from W-Host and S-Host to any other destination in the network.
You can also ping and trace from N-Branch to other locations.

EN_NO –221243107007 Page | 90


Computer Network 3150710

Practical – 15

Aim: - Configuring RIP topology diagram

Objectives

• Configure routers using basic interface configuration commands.

• Enable RIP.

• Verify the RIP configuration


Background / Preparation

A simple routed network has been set up to assist in reviewing RIP routing
behavior. In this activity, you will configure RIP across the network and set
up end devices to communicate on the network.

Step 1: Configure the SVC01 router and enable RIP.

a. From the CLI, configure interface Fast Ethernet 0/0 using the IP address
10.0.0.254 /8.

b. Configure interface serial 0/0/0 using the first usable IP


address in network 192.168.1.0 /24 to connect to the RTR01

EN_NO –221243107007 Page | 91


Computer Network 3150710

router. Set the clock rate at 64000.

c. Configure interface serial 0/0/1 using the first usable IP address


in network 192.168.2.0 /24 with a clock rate of 64000.

d. Using the no shutdown command, enable the configured interfaces.

e. Configure RIP to advertise the networks for the configured interfaces.

f. Configure the end devices.

i. Server0 uses the first usable IP address in network 10.0.0.0 /8.


Specify the appropriate default gateway and subnet mask.

ii. Printer0 uses the second usable IP address in network


10.0.0.0 /8. Specify the appropriate default gateway and
subnet mask.

Step 2: Configure the RTR01 router and enable RIP.

a. Configure interface Fast Ethernet 0/0 using the first usable IP


address in network 192.168.0.0 /24 to connect to the RTR02
router.

b. Configure interface serial 0/0/0 using the second usable IP


address in network 192.168.1.0 /24 to connect to the SVC01
router.

c. Configure interface Fast Ethernet 0/1 using the IP address 172.16.254.254


/16.

d. Using the no shutdown command, enable the configured interfaces.

e. Configure RIP to advertise the networks for the configured interfaces.

f. Configure the end devices.

i. PC0 uses the first usable IP addresses in network 172.16.0.0 /16.

ii. PC1 uses the second usable IP address in network 172.16.0.0 /16.

iii. Specify the appropriate default gateway and subnet mask on each PC.

EN_NO –221243107007 Page | 92


Computer Network 3150710

Step 3: Configure the RTR02 router and enable RIP.

a. Configure interface Fast Ethernet 0/0 using the second usable IP address in
network 192.168.0.0
/24 to connect to the RTR01 router.

b. Configure interface serial 0/0/0 using the second usable IP


address in network 192.168.2.0 /24 to connect to the SVC01
router.

c. Configure interface Fast Ethernet 0/1 using the IP address 172.17.254.254


/16.

d. Using the no shutdown command, enable the configured interfaces.

e. Configure RIP to advertise the networks for the configured interfaces.

f. Configure the end devices.

i. PC2 uses the first usable IP addresses in network 172.17.0.0 /16.

ii. PC3 uses the second usable IP address in network 172.17.0.0 /16.

iii. Specify the appropriate default gateway and subnet mask on each PC.

Step 4: Verify the RIP configuration on each router.

a. At the command prompt for each router, issue the commands show
ip protocols and show ip route to verify RIP routing is fully
converged. The show ip protocols command displays the networks
the router is advertising and the addresses of other RIP routing
neighbors. The show ip route command output displays all routes
know to the local router including the RIP routes which are indicated
by an “R”.

b. Every device should now be able to successfully ping any other device in this
activity.
c. Click the Check Results button at the bottom of this instruction window to
check your work.

EN_NO –221243107007 Page | 93

You might also like