0% found this document useful (0 votes)
12 views25 pages

CN File P1

The document is a laboratory manual for Computer Networks at Raiy Gandhi Prondyogilki Vishwavidyalaya, detailing various experiments related to network cables, topologies, and protocols. It includes practical exercises such as cable crimping, studying network topologies, and implementing the sliding window protocol. Each experiment outlines the aim, theory, procedure, and expected results, providing a comprehensive guide for students in the Department of Information Technology.

Uploaded by

Ritesh Kushwaha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views25 pages

CN File P1

The document is a laboratory manual for Computer Networks at Raiy Gandhi Prondyogilki Vishwavidyalaya, detailing various experiments related to network cables, topologies, and protocols. It includes practical exercises such as cable crimping, studying network topologies, and implementing the sliding window protocol. Each experiment outlines the aim, theory, procedure, and expected results, providing a comprehensive guide for students in the Department of Information Technology.

Uploaded by

Ritesh Kushwaha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Raiy Gandhi Prondyogilki Vishwavidyalaya

RGPV, BHOPAL

Department of Information Technology

VISHWAVIOY
RGPY AMOPAL

Laboratory Manual

COMPUTER NETWORKS
NO LIST OF EXPERIMENTS P.NO

Study of different types of Network cables and


IVPractically implement thc cross-wired cable and 2

straight through cable using clamping tool.


2 6
Study of various network topologies
3. 11
Study of sliding window protocol
Configure Host IP, Subnet Mask and Default 13
Gateway in a System in LAN (TCP/IP Configuration).
|4
5 Study of IEEE 802.3, 802.4, 802.5
16
Interpreting Ping and Traceroute Output
7 Performing an Initial Switch Configuration 21

erforming an Initial Router Configuration 24

Transfer files between systems in LAN using FTP


27
Configuration, installPrint server in a LAN and share
the printer in a network.
Cenfiguring and Troubleshooting a Switched Network 29)

Paye I
Experiment No: 1
Experiment: Dothe following Cabling works ina network a) Cable Crimping b) Standard Cabling
and c)Cross Cabling d) 10 connector crimping e) Testing the erimped cable using acable tester.
Aim:
To do the following
a) Cable Crimping
b) Standard Cabling
c) Cross Cabling
d)10 conncctor crimping
e) Testing the crimped cable using a cable tester

Apparatus/Tools/Equipments/Components:
RJ-45 connector,
1O Connector,
Crimping Tool,
Twisted pair Cable,
Cable Tester.

Principle:
Standard Cabling:
1. 10BaseT and 100BaseT are most common mode of LAN. You can use UTP category-5 cable for
both modes.
2. A straight cable is used to connect a computer to a hub

RJ45 RJ45
Pin # Wire Diagram Pin # Wire Diagram
(END Color End #1 (END Color End #2
1) 2)
1- White/Orange ON 1 Whte/Green
2 Orange 2 Green
3 MateGreen White/Orange
4 Blue White/Brown

White BIlue 5 Brown


Green 6 Orange
7 WhtefBrown 7 Biue

Brown 8 White/Blue

Page 2
Cross Cabling:
Across cable is used to connect 2computers directly (with ONLY the UTP cable). It is also used then youconnect 2hubs
with a normal port on both hubs

Diagram shows you bow to prepare straight through wired connection


RJ45 RJ45
Pin # Wire Diagram Pin # Wire Diagram
(END Coior End #1 (END Color End #2
1) 2)
1 hiteOrange 1 hite/Green
Orange 2 Green
WhterGreen Wite/Orange
Blue 4 White/BrONn
5 White/Blue 5 Brown
Green 6 Orange
7 Whte/Brown Blue

B Brown 8 whte/Blue

Procedure:
Cable Crimping steps:

1. Remove the outmost vinyl shield for 12mm at one end of the cable (we call this side A-side).
2. Arrange the metal wires in parallel
3. Insert the metal wires into RJ45 connector on keeping the metal wire arrangement.

4.Set the RJ45connector (with the cable) on the pliers, and squeeze it tightly.
Page 3
5. Make the other side of the cable (we callthis side B-side) in the same way.

6. After youmade it, you don't need to take care of the direction df the cable.
PC PC CROS3OV eR PC
ST RAIGHT-THRu HU
1 R TX+1 1 TX
2 R
31 3 TX 3 HK+
4

5
6 ROK

IOconnector crimping: Run the full length of Ethernet cable in place,


from endpoint to endpoint, making sure to leave excess.
Atone end, cut the wire to length leaving enough length to work, but not too much excess.Strip off
about 2 inches of the Ethernet cable sheath.

Align each of the colored wires according to the layout of the jack. Use
the punch down toolto insert each wire into the jack.
Repeat the above steps for the second RJ45 jack.

1Rs Interaetnr

Testing the crimped cable using a cable testet:


Step 1: Skin off the cable jacket 3.0 cm long cable stripper up to cableStep 2:
Untwist each pair and straighten each wire 190 0 1.5cm long. Step 3:Cut all
the wires

Step 4:Insert the wires into the RJ45 connector right white orange left brovwn the pins facing up

Page 4
Step 5 : Place the conncctor into a crimping tool, and squeeze hard so that the handle reaches its fullswing,.
Step 6: Use acable tester totest for proper continuity

Result:
Cable Crimping, Standard Cabling and Cross Cabling, IO connector crimping and testing the crimpedcable using a
cable tester are done successfully.

Screenshot of practical output should be attached

Page 5
EXPERIMENT No -2
Experinment: STUDY OF VARIOUS NETWORK TOPOLIGIES

AIM: students shallbe able to know how different computers can be connected in different ways.
THEORY: Network topology is the layout pattern of interconnections of the various elements (links,
nodes, ctc.) of a computer network. Network topologies may be physical or logical. Physical topology
means the physical design of a network including the devices, location and cable installation. Logical
topology refers to how data is actually transferred in a network as opposed to its physical design.
A local area network (LAN) is one example of a network that exhibits both a physical topology and a
logical topology. Any given node in the LAN has one or more links to one or more nodes in the
network and the mapping of these links and nodes in a graph results in a geometric shape that may be
used to describe the physical topology of the network. Likewise, the mapping of the data flow
between the nodes in the network determines the logical topology of the network. The physical and
logical topologies may or may not be identical in any particular network.

Classification of network topologies

There are also three basic categories of network topologies:


1. Physical topologies
2. Signal topologies
3. Logical topologies

1. Physical topologies

The mapping of the nodes of anetwork and the physical connections between them -i.e., the layout
of wiring,cables, the locations of nodes, and the interconnections between the nodes and the cabling
or wiring system
Classification of physicaltopologies
The study of network topology recognizes seven basic topologies:
a) Single Node Topology or Point to Point topology
b) Bus topology
c) Star topology
d) Ring topology
e) Tree topology

f) Mesh topology
g) Hybrid topology
a) Single Node Topology or Point to Point topology: The simplest topology is a permanent
link between two endpoints. Switched point-to-point topologies are the basic model of conventional
telephony.
Permanent (dedicated)
Point-to-point topology is a point-to-point communications channel that appears, to the user,
to be permanently associated with the two endpoints. Children's "tincan telephone" is one
Page 6
example.

Switched:
Using circuit-switchingor packet-switching technologies, a point-to-point circuit can be set
up dynamically, and dropped when no longer needed. This is the basic mode of conventional
telephony.

b) Bus topology: In local area networks where bus topology is used, each machine is connected
to a single cable. Each computer or server is connected to the single bus cable through some kind of
connector. A terminator is required at cach end of the bus cable to prevent the signal from bouncing
back and forth on the bus cable. A signal from the source travels in both directions to all machines
connected on the bus cable until it finds the MACaddress or IP address on the network that is the
intended recipient. If the machine address does not match the intended address for the data, the
machine ignores the data. Alternatively, if the data does match the machine address, the data is
accepted. Since the bus topology consists of only one wire, it is rather inexpensive to implement when
compared to other topologies. However, the low cost of implementing the technology is offset by the
high cost of managing the network. Additionally, since only one cable is utilized, it can be the single
point of failure. If the network cable breaks, the entire network will be down.

Advantages of a Bus Topology


Easy to connect a computer or peripheral to a linear bus.
Requires less cable length than a star topology.

Disadvantagesof a Bus Topology


Entire network shuts down if there is abreak in the main cable.
Terminators are required at both ends of the backbone cable.
Difficult to identify the problem if the entire network shuts down.
Not meant to be used as a stand-alone solution in alarge building.

c) Star topology: In local area networks with a star topology, each network host is connected to
acentral hub. In contrast to the bus topology, the star topology connects each node to the hub with a
point-to-point connection. AIl traffic that traverses the network passes through the central hub. The
hub acts as a signal booster or repeater.

Page 7
Advantages of a Star Topology
Easy to installand wire.
Nodisruptions to the network when connecting or removing devices.
Easy to detect faults and to remove parts.

Disadvantages of a Star Topology

Requires more cable length than a linear topology.


If the hub, switch, or concentrator fails, nodes attached are disabled.
More expensive than linear bus topologies because of the cost of the hubs, etc.

d)Tree or Expanded Star: A tree topology combines characteristics of linear bus and star
topologies. It consists of groupsof star-configured workstations connected toa linear bus
backbone cable. Tree topologies allow for the expansion of an existing network, and enable
schools to configure a network to meet their needs.

Advantages of a Tree Topology


" Point-to-point wiring for individual segments.
" Supported by several hardware and software venders.
Disadvantages of a Tree Topology
" Overalllength of each segment is limited by the type of cabling used.
"If the backbone line breaks, the entire segment goes down.
" More difficult to configure and wire than other topologies.

e) Ring topology: In local area networks where the ring topology is used, cach computer is
Page &
connected to the network in a closed loop or ring. Each machine or computer has a unique address
that is used for identification purposes. The signal passes through each machine or computer
connected to the ring in one direction. Ring topologies typically utilize a token passing scheme,
used to control access to the network. By utilizing this scheme, only one machine can transmit on
the network at a time. The machines or computers connected to the ring act as signal boosters or
repeaters which strengthen the signals that traverse the network. The primary disadvantage of ring
topology is the failure of one machine will cause the entire network to fail.

Ring

f) Mesh topology: The value of fully meshed networks is proportional to the exponent of the
number of subscribers, assuming that communicating groups of any two endpoints, up to and
including all the endpoints, is approximated by Reed's Law.

Fully connected mesh topology: The physical fully connected mesh topology is generally toocostly
and complex for practicalnetworks, although the topology is used when there are only asmall
number of nodes to be interconnected.
The number of connections in a full mesh = n(n - 1)/2
Partially connected mesh topology: The type of network topology in which some of the nodes of the
network are connected to more than one other node in the network with a point-to-point link this
makes it possible to take advantage of some of the redundancy that is provided by a physical fully
connected mesh topology without the expense and complexity required for a connection between
every node in the network.

g) Hybrids topology: Hybrid networks use a combination of any two or more topologies in such a
way that the resulting network does not exhibit one of the standard topologies (e.g., bus, star, ring,
etc.). For example, a tree network connected to a tree network is still a tree network, but two star
networks connected together exhibit a hybrid network topology. A hybrid topology is always
producedwhen two different basic network topologies are connected. Two comimon examples for
Hybrid network are: star ring network and star bus network

2) Signal topology
Page 9
The mapping of the actual connections between the nodes ofa network, as evidenced by the path that
the signals take when propagating between the nodes. The term 'signal topology' is often used
synonymously with the term 'logical topology. By definition, the term logical topology' refers to the
apparent path that the data takes between nodes in a network while the term 'signal topology'
generally refers to the actual path that the signals (e.g., optical, electrical, electromagnetic, etc.) take
when propagating between nodes.
3) Logicaltopology
The logical topology, in contrast to the "physical", is the way that the signals act on the network media, or the way
that the data passes through the network from one device to the next without regard to the physical interconnection
of the devices. A network's logical topology is not necessarily the same as its physical topology. For example,
twisted pair Ethernet is a logical bus topology in a physical star topology layout. While IBM's Token Ring is a
logical ring topology, it is physically set up in a star topology.

Result: Screenshot of practical output should be attached

Page 10
EXPERIMENT No. -3
Experiment: STUDY OF SLIDING WINDOW PROTOCOL.

AIM: Students shallbe able to learn reliability and sequential delivery of data frames.
THEORY: The sliding window is a technique for sending multiple frames at a time. It controls the data packcts
between the two devices where reliable and gradual delivery of data frames is needed. It is also used in TCP
(Transmission Control Protocol).
Working Principle
In these protocols, the sender has a buffer called the sending window and the receiver has buffer called the
receiving window.
Types of Sliding WindowProtocol
Sliding window protocol has two types:
1, Go-Back-N ARQ

2. Selective Repeat ARQ


Go-Back-N ARQ
Go-Back-N ARQ protocol is also known as Go-Back-N Automatic Repeat Request. It is a data link layer protocol
that uses a sliding window method. In this, if any frame is corrupted or lost, all subsequent frames have to be sent
again.
The size of the sender window is N in this protocol. For example, Go-Back-8, the size of the sender window, will
be &. The receiver window size is always 1.
If the receiver receives a corrupted frame, it cancels it. The receiver does not accept a corrupted frame. When the
timer expires, the sender sends the correct frame again. The design of the Go-Back-N ARQ protocol is shown
below.
Selective Repeat ARQ
Selective Repeat ARQ is also known as the Selective Repeat Automatic Repeat Request. It is a data link layer
protocol that uses a sliding window method. The Go-back-N ARQ protocol works well if it has fewer errors. But if
there is alot of error in the frame, lots of bandwidth loss in sending the frames again. So, we use the Selective
First S Naxt to Rr Next to
receive
soutstanding
send

Sender Receiver

Network Get data Deliver Network


Data frame ACK frame data

Data Link segNo ackNo. Data ink

Reoehve Send Re eve Send


Physical Frame e Frame
Physical

Event: Request from Event: Notification from


notwok layer Physical Layêr

SRDforev
Repeat forever Page I|
Algorithrn for Sondor Time-out Algorthm for Receiver
gite
Event:

Evont: Notificatlon from


Physical Layor
Repeat ARQprotocol. In this protocol, the size of the sender window is always equal to the size of the receiver
window. The size of the sliding window is always greater than 1.
lf the receiver receives a corrupt frame, it does not directly discard it. It sends a negative acknowledgment to the
sender. The sender sends that frame again as soon as on the receiving negative acknowledgment. There is no
waiting for any time-out to send that frame. The design of the Selective Repeat ARQ protocol is shown below.
R, Next to
sFirst S Next to receive
outstanding Send

Sonder Receiver
Deliver Network
Network Get data
Data frame ACK frame data

Data Link ackNo. Data Link


seqNo
or
nakNo.
Receive Send Receive Send
Physical Physical
Frame Frame Frame Frame

Event: Request from Event: Notification from


network layer Physical Layer

FRepeat för Rapeatiorever


Time-out
Aigorithm for Sender Algorithm for Receiver
site Event: site

Event: Notification from


Physical Layer

The Sliding Window mainly provides the upper limnit on the number of frames that can be transmitted before the
requirement of an acknowledgment.
1 The frames get acknowledged by the receiver at any point even when the window is not completely
full on the receiver side.
2 Also, the Frames may be transmitted by the source side even when at the time the window is not
yet full on the sender side.
3 There is the specific size of the window, where the frames are numbered modulo- n, which simply
means frames are numbered from 0 to n-1. For e.g. if n= 10, the frames are numbered 0, 1,2,3,4,5,6, 7,8,9,
0, 1,2,3,4,5,6, 7, 8,9,0, 1, ...
4. Whenever the receiver sends an acknowledgment (ACK)it also includes the number of the next
frame that it expects to receive. For example, in the order to acknowledge the group of frames that ends in
frame 6,the receiver needs to send the ACK that contains the number 7. When the sender sees an ACK
with the number 7,then the sender comes to know that all the frames up to number 6 have been
successfully received.

Result: Screenshot of practical output should be attached

Page 12
EXPERIMENT No,-4
Experiment:Configure Host IP, Subnet Mask and Default Gateway in a System in LAN (TCP/P
Configuration).

Aim:To Configure IP Address in asystem in LAN (TCP/TP Configuration) and Configure DNS to establish
interconnection between systems
Principle: Following is required to be study under this practical.
" Classification of IP address

Class A 1.0.0.1 to 126.255.255.254 Supports 16 million hosts on each of 127 networks.


Class B 128.1.0.l to 191.255.255.254 Supports 65,000 hosts on each of 16,000 networks.
Class C 192.0.1.1 to 223.255.254.254 Supports 254 hosts on each of 2million networks.
Class D 224.0.0.0 to 239.255.255.255 Reserved for multicast groups.
Class E 240.0.0.0 to 254.255.255.254 Reserved.

" Sub netting


Why we Develop sub netting and How to calculate subnet mask and how to identify subnet
address.

"Super netting
Why we develop super netting and How to calculate supernet mask and how to identify
supernet address.

Procedure:
(a)Steps to configure IP address, Subnet mask and Default Gateway:
1.Click on the Start button and select Control Panel then Networ7 and Internet Connections.
2. Click Network and Internet Connections.
3. Right click on the Local Area Connection icon and select Properties.
4. Select Internet Protocol (TCP/IP).
5. Click on the Properties button.
6. Uncheck that Obtain an IP address automatically and Obtain DNS server address automatically and put
IP,Subnet mask & Default Gateways.
7. Click on the Advanced button and select the DNS tab in the Advanced TCP/LP Settings window.
8. Ensure that Register this connection's addresses in DNS is not selected.
9. Click OK, OK, then Close to close all boxes.

Result :
Configuration of IP Address in a system in LAN (TCP/IP Configuration) and Configuration to establishinterconnection
between systems have been done successfully, Screenshot of practical output should be attached

Page 13
EXPERIMENT No -5
Experiment: Study of IEEE802.3, 802.4 ,802.5.
AIM: Students shall be able to know the concept of IEEE standards 802 are used for controlling the Local Arca
Network and Metropolitan Arca Network.
THEORY:

1. IEEE 802.3:The IEEE 802.3 standard determines the CSMA/CD access control protocol. The best
known scheme for controlling a local area network on a bus structure is carrier sense multiple action with
collision detection(CSMA/CD).
2. IEEE802.4: IEEE 802.4 describes a token bus LAN standards.In token passing methods, stations
connected on a bus are arranged in a logical ring. In this method only the station having token(token
holder)is being permitted to transmit frames.
3. IEEE802.5:IEEE 802.5 describes the token ring standards. In a token ring a special bit pattern,
called the token, circulates around the ring whenever all stations are idle.The sequence of token is
determined by the physical locations of the stations on the ring.
Classic Ethernet is the original form of Ethernet that provides data rates between 3 to 10 Mbps. The varieties are
commonly referred as 10BASE-X. Here, 10 is the maximum throughput, i.e. 10 Mbps, BASE denoted use of
baseband transmission, and X is the type of medium used. Most varieties of classic Ethernet have become obsolete
in present communication scenario.

A switched Ethernet uses switches to connect to the stations in the LAN. It replaces the repeaters used in classic
Ethernet and allows full bandwidth utilization.

A Token Bus IEEE 802.4) is a popular standard for token passing LANs. In a token bus LAN, the plhysical media
is a bus or a tree, and a logical ring is created using coaxial cable. The
token is passed from one user to another in a sequence (clockwise or anticlockwise). Each station knows the address
of the station to its left" and "right" as per the sequence in the logical ring. A station can only transmit data when it
has the token.

TOKEN

Station.1 $tation $tatian 5

Station 2

The above diagram shows alogical ring formed in a bus-based token-passing LAN. The logical ring is shown with
Page 14
the arrows,
t A token ring is an outdated form of network technology, and today Ethernet is the most prevalent type of wired
LANconnection. But that doesn't make the old technology any less interesting. Older methods, now confined tothe
realms of history, can also help us understand modern networks and why technology has developed as it has.
However, a tokcn ring is not really aring nctwork, also referred to as a ring topology, even if the name suggests this.
In fact, the only ring created is a logical onc, not a physical one.

Token Ring

Result: Screenshot of practical output should be attached

Page 15
Experiment No.-6

Experiment: Interpreting Ping and TracerouteOutput


AIM

Distinguish the difference between successful and unsuccessful ping attempts.


Distinguish the difference between successful and unsuccessful traceroute attempts.

Topology Diagram
192.168.1.0/24

2960-24TT
PC-PT 1841
N-Host
N-Switch
N-Branch
192168.1.10 Server-PT 192.168.4.0/24
Fww.public.com
192168.20/24
296024TT PC-P7
E-Spitch E-Host
PC-PT
296024TT
W-Svitch 192.168.4.10
W-Host
192.168.2.10
1841
E-Branch
1841 ASP Netiork
W-Branch

192.168.3.0/24

Server-PT
2960-24TT 1841 www.cisco.com
PC-PT
S-Switch S-Branch
S-Host
192.168.3.10 Server-PT
www.domain.com

Background / Preparation
In this activity, you willtest end-to-end connectivity using ping and traceroute. At the end of
this activty, you will be able to distinguish the difference between successful and
unsuccessful ping and traceroute attempts.
Note: Before beginning this activity, make sure that the network is converged. To
converge the network quickly, switch between Simulation mode and Realtime mode
until all the link lights turn green.

Step 1: Test connectivity using ping from a host computer and a router.
Click N-Host, click the Desktop tab, and then click Command Prompt. From the Command
Prompt window, ping the Cisco server at www.cisco.com.
Page l6
Packet Tracer PC Command
Line 1.0 PC>ping
www.cisco.com

Pinging 64.100.1.185 with 32 bytes of


data: Request timed out.

Reply from 64.100.1.185: bytes=32 time-185ms


TTL=123 Reply from 64.100.1.185: bytes=32
time-28Ims TTL=123Reply from 64.100.1.185:
bytes-32 time-287ms TTL=123

Ping statistics for 64.100.1.185:


Packets: Sent = 4, Received = 3, Lost = 1 (25%
loss), Approximate round trip times in milli-seconds:
Minimum =185ms, Maximum =287ms, Average
=25lms PC>

From the output, you can see that N-Host was able to obtain an IP address for the Cisco server.
The IP address was obtained using (DNS). Also notice that the first ping failed. This failure is
most likely due to lack of ARP convergence between the source and destination. If you repeat
the ping, you will notice that all pings succeed.
From the Command Prompt window on N-Host, ping E-Host åt 192.168.4.10. The pings fail. If
you do not want to wait for all four unsuccessful ping attempts, press Ctrl+C to abort the
command, as shown below.
PC>ping 192.168.4.10

Pinging 192.168.4.10 with 32 bytes of data:


Request timed
out.
Request timed
out.

Ping statistics for 192.168.4.10:


Packets: Sent =3, Received = 0, Lost = 3 (100% loss),
Control-C

PC

Click the N-Branch router, and then click the CLItab. Press Enter to get the router prompt. From
Page 17
the router prompt, ping the Cisco server at www.cisco.com.
N-Branch>ping www.cisco.com
Translating "www.cisco.com"...domain server
(64.100.1.242) Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 64.100.1.185, timeout is 2 seconds:
.!!!
Success rate is 80 percent (4/5), round-trip min/avg/max =
210/211/213 ms N-Branch>

As you can see, the ping output on a router is different from a PChost. Notice that the N-Branch
router resolved the domain name to the same IP address that N-Host used to send its pings. Also
notice that the first ping fails, which is indicated by a period (), and that the next four pings
succeed, as shown with an exclamation point (!).
From the CLItab on N-Branch, ping E-Host at 192.168.4.10. Again, the pings fail. To not wait
for all the failures, press CtrHC.
N-Branch>ping 192.168.4.10

Type escape sequence to abort.


Sending 5, 100-byte ICMP Echos to 192.168.4.10, timeout is 2 seconds:
Success rate is 0 percent

(0/4) N-Branch>

Step 2: Test connectivity using traceroute from a host computer and a router.
a Click N-Host, click the Desktop tab, and then click Command Prompt. From the
Command Prompt window, trace the route to the Cisco server at www.cisco.com.
PC>tracert www.cisco.com

Tracing route to 64.100.1.185 over a maximum of 30 hops:


1 92 ms 77 ms 86 ms 192.168.1.1
291 ms 164 ms 84 ms 64.100.1.10
3135 ms 168 ms 151 64.100.1.6
ms
4185 ms 261 ms 161 64.100.1.3
1Ns 4
5 257 ms 280 ms 224 64.100.1.6
ms 2
6310 ms 375 ms 298 64.100.1.1
ms 85

Trace complete.
PC>

Page 18
The above output shows that youcan successfully trace a routeall the way to the Cisco server at
64.100.1.185. Each hop in the path is a router responding three times to trace messages from N
Host. The trace continues until the destination for the trace (64.100.1.185) responds three times.
From the Command Prompt window on N-Host, trace a route to E-Host at 192.168.4.10. The
trace fails, but notice that the tracert command traces up to 30 hops. If you do not want to wait
for all 30attempts to time out, press Ctrl+C.

PC>tracert 192.168.4.10

Tracing route to 192.168.4.10over a maximum of 30 hops:


1 103ms 45 ms 91 ms 192.168.1.1
256 ms 110ms 125 64.100.1.10
ms 1
3174 ms 195 ms 134 64.100.1.6
ms
4 246 ms 183 ms 179 64.100.1.34
ms
5 217 ms 285 ms 226 64.100.1.62
ms
6 246 ms 276 ms 245 64.100.1.154
ms
7* Request timed out.
Request timed out.
Request timed
out. 10
Control-C

PC

The tracert command can be helpful in finding the potential source of a problem.
The last device to respond was 64.100.1.154, so you would start troubleshooting by
determining which device is configured with the IP address 64.100.1.154. The source
of the problem might not be that device, but the trace has given you a starting point,
whereas a ping simply tells you that the destination is either reachable or unreachable.
Click the N-Branch router, and then click the CLItab. Press Enter to get the router prompt. From
the router prompt, trace the route to the Cisc0 server at www.cisco.com.

N-Branch>traceroute www.cisco.com
Translating "www.cisco.com"...domain server

(64.100.1.242) Type escape sequence to abort.


Tracing the route to 64.100.1.185

1 60msec 32 msec 59 msec


64.100.1.101
2 64.100.1.6 98 msec 65 msec 65 msec
3 64.100.1.34 138 msec 147 nsec 147
msec
4 64.100.1.62 189 msec 148 msec 145
msec
5 219 msec 229 msec 293
Page 19
64.100.1.185 mscc
N-Branch>

As you can see, traceroute output on a router is very similar to the output on a
PC host. The only difference is that on a PC host, the IP address is listed after
the three millisecond outputs.
From the CLItab on N-Branch, trace the route to E-Host at 192.168.4.10. The trace fails at the
same IP address as it failed when tracing from N-Host. Again, you can use Ctrl+C to abort the
command.

N-Branch>traceroute 192.168.4.10
Type escape sequence to
abort. Tracing the route to
192.168.4.10

1 64.100.1.101 41 msec 19 msec 32 msec


2 64.100.1.6 33 msec 92 msec 117 msec
3 64.100.1.3498 msec 102 msec 102 msec
4 64.100.1.62 166 msec 172msec 156 msec
5 64.100.1.154 157 msec 223 msec
240 msec 6 * *

N-Branch>

Step 3: Practice the ping and trace route commands.


Throughout this course, you will often use ping and traceroute to test connectivity and
troubleshoot problems. To practice these commands, ping and trace from W-Host and S
Host to any other destination in the network. You can also ping and trace from N-Branch
to other locations.

Result:Screenshot of practical output should be attached

Page 20
Experiment No.-7

Experiment: Performing an Initial Switch Configuration


AIM

Perform an initial configuration of a Cisco Catalyst 2960 switch.

Topology Diagram

PC-PT
PC-PT KP Workstation
Customer

1841 2960-224N
2960-24TT 1841 ISP Switci
ISP Router
Lustomer Switch Custorner Router

Server-PT Server-PT
Local Server ISP Server

Background / Preparation
In this activity, you willconfigure these settings on the customer Cisco Catalyst 2960 switch:
Host name

Console password
Vty pasSword

Privileged EXEC mode password


Privileged EXECmode secret
IP address on VLANIinterface
Default gateway
Note: Not all commands are graded by Packet Tracer.

Step 1: Configure the switch host name.


a From the Customer PC, use a console cable and terminal emulation software to
connect to the console of the customer Cisco Catalyst 2960switch.
b. Set the host name on the switch to CustomerSwitch using these commands.

Page 21
Switch>enable
Switch#configure
terminal
Switch(config)#hostname CustomerSwitch

Step 2: Configure the privileged mode password and secret.


a From global configuration mode,configure the password as cisco.

CustomerSwitch(config) #enable password cisco


b. From global configuration mode, configure the secret as cisco123.
CustomerSwitch(config #enable secret cisco123
Step 3: Configure the console password.
a.
From global configuration mode, switch to configuration mode to configure the console line.
CustomerSwitch(config)#line console 0

b. From line configuration mode, set the password to cisco and require the
password to be entered at login.

CustomerSwitch(config
line)#password cisco
CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit

Step 4: Configure the vty password.


a. From global configuration mode, switch to the configuration mode for the vty lines 0 through
15.

CustomerSwitch(config)#line vty 0 15

b. From line configuration mode, set the password to cisco and require the
password to be entered at login.

CustomerSwitch(config
line)#password cisco
CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit

Step 5: Configure an IP address on interface VLANI.


From global configuration mode, switch to interface configuration mode for VLANI, and
assign the IP address 192.168.1.5 with the subnet mask of 255.255.255.0.

CustomerSwitch(config)#interface vlan 1
Page 22
CustomerSwitch(config-i)#ip address 192.168.1.5 255.255.255.0
CustomerSwitch(config-if #noshutdown
CustomerSwitch(config-if)#exit

Step 6: Configure the default gateway.


a.
From globalconfiguration mode, assign the default gateway to 192.168.1.1.
CustomerSwitch(config)#ip default-gateway 192.168.1.1
b Click the Check Results button at the bottom of this instruction window tocheck your work.
Step 7: Verify the configuration.
The Customer Switch should now be able to ping the ISP Server at 209.165.201.10. The first
one or two pings may fail while ARP converges.
CustomerSwitch(config)#end
CustomerSwitch#ping
209.165.201.10

Type escape sequence to abort.


Sending 5, 100-byte ICMP Echos to 209.165.201.10, timeout is 2 seconds:
..!!!
Success rate is 60 percent (3/5), round-trip min/avg/max - 181/189/197
ms CustomerSwitch#

Reflection
What the significance of assigning the IP address to the VLANIinterface instead
of any of the Fast Ethernet interfaces?

b What command is necessary to enforce password authentication on the console and vty lines?

C. How many gigabit ports are available on the Cisco Catalyst 2960 switch that you used in the
activity?

Result: Screenshot of practical output should be attached

Page 23
Experiment No.-8
Experiment: Performing an Initial Router Configuration
AIM

Configure the router host name.


Configure passwords.
Configure banner messages.
Verify the router configuration.

Topology Diagram

1841%| "PC-PT
PC-P 1841 ISP Router
Customer Zustomer Router ySP Workstation

2960-24TT 2960-22T
Customer Switch ISP Switch

Server-PT Server-PT
Customer Server ISP Server

Background/ Preparation
In this activity, you will use the Cisco IOS CLI to apply an initial configuration to a
router, including host name, passwords, a message-of-the-day (MOTD) banner, and
other basic settings.
Note: Some of the steps are not graded by Packet Tracer.

Step 1: Configure the router host name.


a. On Customer PC, use the terminal emulation software to connect to the console of
the customer Cisco 1841 ISR.
Set the host name on the router to CustomerRouter by using these commands.
Routerenable
Router#configure
terminal
Router(config) #hostname CustomerRouter

Page 24

You might also like