Computer Network Lab Manual CSE-310
Computer Network Lab Manual CSE-310
Lab Manual
This course provides students with hands on training regarding the design, troubleshooting,
modeling and evaluation of computer networks. In this course, students are going to
experiment in a real test-bed networking environment, and learn about network design and
troubleshooting topics and tools such as: network addressing, Address Resolution Protocol
(ARP), basic troubleshooting tools (e.g. ping, ICMP), IP routing (e,g, RIP), route discovery
(e.g. traceroute), TCP and UDP, IP fragmentation and many others. Student will also be
introduced to the network modeling and simulation, and they will have the opportunity to
build some simple networking models using the tool and perform simulations that will help
them evaluate their design approaches and expected network performance.
[Link] Experiment
1 Study of different types of Network cables and Practically implement the
cross-wired cable and straight through cable using clamping tool.
11 To implement the DHCP onto the Network Topology using Cicso Packet Tracer
12 To implement the Network Address Resolution (NAT) using Cicso Packet Tracer.
Hardware and Software Requirement
Software Requirement
Command Prompt And Packet Tracer.
VIVA QUESTIONS
What is LAN and VLAN?
VLAN and LAN are two terms used frequently in the networking field. ... VLAN is an implementation of a
private subset of a LAN in which the computers interact with each other as if they are connected to the same
broadcast domain irrespective of their physical locations
A VLAN is a logical grouping of network users and resources connected to administratively defined ports on a
switch. VLAN divides the broadcast domain so, the frames that will be broadcasted onto the network are only
the ports logically grouped with in the same VLAN.
VLANs divide broadcast domains in a LAN environment so, by default only Hosts that are members of the same
VLAN can communicate. Whenever hosts in one VLAN need to communicate with hosts in another VLAN, the
traffic must be routed between them. This is known as Inter VLAN Routing.
Telnet can be used to test or troubleshoot remote web or mail servers, as well as for remote
access to MUDs (multi-user dungeon games) and trusted internal networks.
The user connects to the server by using the Telnet protocol, which means entering Telnet into a
command prompt by following this syntax: telnet hostname port. The user then executes commands on
the server by using specific Telnet commands into the Telnet prompt. To end a session and log off, the
user ends a Telnet command with Telnet.
Is Telnet secure?
Because it was developed before the mainstream adaptation of the internet, Telnet on its own
does not employ any form of encryption, making it outdated in terms of modern security. It has largely
been overlapped by Secure Shell (SSH) protocol, at least on the public internet, but for instances where
Telnet is still in use, there are a few methods for securing your communications.
EIGRP is also called hybrid protocol because its metric is not just plain HOP COUNT (max- 255, included in
pure distance vector protocol) rather includes the links bandwidth, delay, reliability and Load parameter into the
calculation. Thats why called Advanced or Hybrid protocol.
There are Six packets in EIGRP, 1-Hello , 2-Update, 3-Query, 4-Reply, 5-Acknoladgment, [Link] What are
different route types in EIGRP?
•Internal Route—Routes that are originated within the Autonomous System (AS).
•Summary Route—Routes that are summarized in the router (for example, internal paths that have been
summarized).
• External Route—Routes that are redistributed to EIGRP.
EXPERIMENT-1
1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be very
careful at this point, as to not nick or cut into the wires, which are inside. Doing so could
alter the characteristics of your cable, or even worse render is useless. Check the wires, one
more time for nicks or cuts. If there are any, just whack the whole end off, and start over.
2. Spread the wires apart, but be sure to hold onto the base of the jacket with your other
hand. You do not want the wires to become untwisted down inside the jacket. Category 5
cable must only have 1/2 of an inch of 'untwisted' wire at the end; otherwise it will be 'out
of spec'. At this point, you obviously have ALOT more than 1/2 of an inch of un-twisted
wire.
3. You have 2 end jacks, which must be installed on your cable. If you are using a pre-
made cable, with one of the ends whacked off, you only have one end to install - the
crossed over end. Below are two diagrams, which show how you need to arrange the cables
for each type of cable end. Decide at this point which end you are making and examine the
associated picture below.
Diagram shows you how to prepare Cross wired connection
Diagram shows you how to prepare straight through wired connection
EXPERIMENT-2
2. Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator
is a device for connecting multiple twisted pair or fiber optic Ethernet devices together and
making them act as a single network segment. Hubs work at the physical layer (layer 1) of
the OSI model. The device is a form of multiport repeater. Repeater hubs also participate in
collision detection, forwarding a jam signal to all ports if it detects a collision.
4. Bridge: A network bridge connects multiple network segments at the data link layer
(Layer 2) of the OSI model. In Ethernet networks, the term bridge formally means a device
that behaves according to the IEEE 802.1D standard. A bridge and switch are very much
alike; a switch being a bridge with numerous ports. Switch or Layer 2 switch is often used
interchangeably with [Link] can analyze incoming data packets to determine if the
bridge is able to send the given packet to another segment of the network.
6. Gate Way: In a communications network, a network node equipped for interfacing with
another network that uses different protocols.
A gateway may contain devices such as protocol translators, impedance matching
devices, rate converters, fault isolators, or signal translators as necessary to provide
system interoperability. It also requires the establishment of mutually acceptable
administrative procedures between both networks.
A protocol translation/mapping gateway interconnects networks with different
network protocol technologies by performing the required protocol conversions.
EXPERIMENT- 3
Aim: Study of network IP
Classification of IP address
Sub netting
Super netting
Apparatus (Software): NA
As show in figure we teach how the ip addresses are classified and when they are used.
Sub netting
Why we Develop sub netting and How to calculate subnet mask and how to identify subnet
address.
Super netting
Why we develop super netting and How to calculate supernet mask and how to identify
supernet address.
EXPERIMENT-4
On the host computer, follow these steps to share the Internet connection:
8. Under Internet Connection Sharing, select the Allow other network users to connect
through this computer's Internet connection check box.
9. If you are sharing a dial-up Internet connection, select the Establish a dial-up
connection whenever a computer on my network attempts to access the Internet check
box if you want to permit your computer to automatically connect to the Internet.
When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP
address [Link]. Your computer may lose connectivity with other computers on your
network. If these other computers have static IP addresses, it is a good idea to set them to
obtain their IP addresses automatically. Are you sure you want to enable Internet
Connection Sharing?
The network adapter that is connected to the LAN is configured with a static IP address of
[Link] and a subnet mask of [Link]
To connect to the Internet by using the shared connection, you must confirm the LAN
adapter IP configuration, and then configure the client computer. To confirm the LAN
adapter IP configuration, follow these steps:
Note: You can also assign a unique static IP address in the range of [Link] to
[Link]. For example, you can assign the following static IP address, subnet
mask, and default gateway:
8. IP Address [Link]
9. Subnet mask [Link]
10. Default gateway [Link]
11. In the Local Area Connection Properties dialog box, click OK.
In this EXPERIMENT- students have to understand basic networking commands e.g ping,
tracert etc.
All commands related to Network configuration which includes how to switch to privilege
mode and normal mode and how to configure router interface and how to save this
configuration to flash memory or permanent memory.
ping:
ping(8) sends an ICMP ECHO_REQUEST packet to the specified host. If the host responds,
you get an ICMP packet back. Sound strange? Well, you can “ping” an IP address to see if
a machine is alive. If there is no response, you know something is wrong.
Traceroute:
Tracert is a command which can show you the path a packet of information takes from
your computer to one you specify. It will list all the routers it passes through until it reaches
its destination, or fails to and is discarded. In addition to this, it will tell you how long each
'hop' from router to router takes.
nslookup:
pathping:
A better version of tracert that gives you statics about packet lost and latency.
Getting Help
In any command mode, you can get a list of available commands by entering a question mark
(?). Router>?
To obtain a list of commands that begin with a particular character sequence, type in
those haracters followed immediately by the question mark (?).
Router#co?
Router#configure ?
Configuration Files
Any time you make changes to the router configuration, you must save the changes to memory
because if you do not they will be lost if there is a system reload or power outage. There are two
types of configuration files: the running (current operating) configuration and the startup
configuration.
Use the following privileged mode commands to work with configuration files.
• configure terminal – modify the running configuration manually from the terminal.
IP Address Configuration
Router>enable password
Step 2: Enter the configure terminal command to enter global configuration mode.
Router#config terminal
Step 3: Enter the interface type slot/port (for Cisco 7000 series) or interface type port (for
Cisco 2500 series) to enter the interface configuration mode.
Example:
Router (config)#interface ethernet 0/1
Step 4: Enter the IP address and subnet mask of the interface using the ip address ipaddress
subnetmask command.
Example,
Router (config-if)#ip address [Link] [Link]
After configuring the given network a packet should be ping from any one machine
to another.
started! Router>
Router>Enable
Router#config t
Router(config)#hostname router0
router0(config-if)#no shutdown
router0(config-if)#exit
router0(config-if)#no shutdown
router0(config-if)#exit
router0(config)#exit
router0#show running-config
Building configuration...
version 12.4
no service password-encryption
hostname router0
ip ssh version 1
interface FastEthernet0/0
duplex auto
speed auto
interface FastEthernet0/1
no ip address
duplex auto
speed auto
interface Vlan1
no ip address
shutdown
ip classless
line con 0
line vty 0
4 login
end
router0#
router0#
Building configuration...
[OK]
router0#
EXPERIMENT-7
After configuring the given network a packet should be ping from any one machine
to another.
Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface FastEthernet0/0
Router(config-if)#ip address [Link] [Link]
Router(config-if)#no shutdown
Router#
Router>enable
Router#
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface Serial2/0
Router(config-if)#ip address [Link] [Link]
Router(config-if)#no shutdown
Router#
IP ROUTE Command.....
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#ip route [Link] [Link] [Link]
Router(config)#exit
Router#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B -
BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter
area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external
type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E -
EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o -
ODR P - periodic downloaded static route
Router>enable
Router#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D
- EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 -
OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 -
OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR P
- periodic downloaded static route
Aim: To understand the operation of TELNET by accessing the router in server room from a
PC in IT office.
Requirements
• Windows pc – 2 Nos
• CISCO Packet Tracer Software ( Student Version)
• 8 port switch – 1 No
• Router – 1 Nos
• Cat-5 LAN cable
Procedure
• Open the CISCO Packet tracer software
• Drag and drop 1 pc and 1 laptop using End Device Icons on the left corner.
• Select 8 port switches from switch icon list in the left bottom corner
• Select Routers and Give the IP address for serial ports of router
• Type CLI’s for the router
• Make and verify the connections from any pc to the server by providing correct password;
in command prompt of PC.
• Ping between PCs and observe the transfer of data packets in real and simulation mode.
Theory
Telnet, developed in 1969, is a protocol that provides a command line interface for
communication with a remote device or server, sometimes employed for remote management
but also for initial device setup like network hardware. Telnet stands for Teletype Network,
but it can also be used as a verb; 'to telnet' is to establish a connection using the Telnet
protocol.
Telnet is a simple, text-based network protocol that is used for accessing remote computers over TCP/IP
networks like the Internet.
ROUTER CLI:
Router#config
Configuring from terminal, memory, or network
[terminal]? Router(config)#line vty 0 4
Router(config-
line)#password sai123
Router(config-line)#login
local Router(config-
line)#exit
Router(config)#username sai privilege 4
password sai123 Router(config)#exit
OUTPUT:
PINGING FROM PC0 TO SERVER USING TELENET: C:\
>ping [Link]
Pinging [Link] with 32 bytes of data:
Reply from [Link]: bytes=32 time=1ms TTL=255
Reply from [Link]: bytes=32 time<1ms TTL=255
Reply from [Link]: bytes=32 time<1ms TTL=255
Reply from [Link]: bytes=32 time<1ms TTL=255
Ping statistics for [Link]:
C:\>telnet [Link]
Trying [Link] ...Open User Access
Verification Username: sai
Password: <type the password-sai123(invisible)>
Result:
Thus, verified the operation of TELNET and accessed the router from Pcs
Experiment: 9
Aim: To construct multiple router networks and understand the operation of EIGRP Protocol
Requirements
• Windows pc – 4 Nos
• CISCO Packet Tracer Software (Student Version)
• 8 port switch – 2 No
• Router – 3 Nos
• Cat-5 LAN cable
Procedure
• Open the CISCO Packet tracer software
• Drag and drop 4 pcs using End Device Icons on the left corner
• Select TWO 8 port switch from switch icon list in the left bottom corner
• Select TWO Routers and Give the IP address for serial ports of router and apply clock rate as per the input
table.
• Add WIC -IT Peripheral to all routers, type CLI’s for all routers
• Make the connections using Straight through Ethernet cables
• Ping between PCs and observe the transfer of data packets in real and simulation mode.
Theory
Enhanced Interior Gateway Routing Protocol (EIGRP Protocol) is an enhanced distance vector routing protocol
which Uses Diffused Update Algorithm (DUAL) to calculate the shortest path. It is also considered as a Hybrid
Routing Protocol because it has characteristics of both Distance Vector and Link State Routing Protocols.
EIGRP supports classless routing and VLSM, route summarization, incremental updates, load balancing and other
features.
Network Topology Diagram for EIGRP
Router 0 Router 1
fa 0/0 IP Address: [Link] fa 0/0 IP Address : [Link]
Serial 0/0/0 : [Link] @ 6400 clock rate Serial 0/0/0 : [Link]
ROUTER0 CLI:
Router(config)#router eigrp 10
Router(config-router)#network [Link] [Link]
Router(config-router)#network [Link] [Link] Router(config-router)#exit
ROUTER1 CLI:
Router(config)#router eigrp 10
Router(config-router)#network [Link] [Link]
%DUAL-5-NBRCHANGE: IP-EIGRP 10: Neighbor [Link] (Serial0/1/0) is up: new adjacency Router(config-
router)#network [Link] [Link]
Router(config-router)#exit
OUTPUT:
ROUTER0:
Router#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF,
IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external
type 2, E – EGP
ROUTER1:
D [Link]/24 [90/20514560] via [Link], [Link], Serial0/1/0
C [Link]/24 is directly connected, Serial0/1/0
C [Link]/24 is directly connected, FastEthernet0/0
Result:
Thus, understand the concept and operation of EIGRP and obtained the routing table and observe transfer data packets
in real and simulation time.
Experiment 10
Objectives
1. To learn how to configure a topology with Static Routing Protocol
2. Test and verify the configuration
Description
Static Routing:
A router can learn about remote networks in one of two ways:
1. Manually, from configured static routes
2. Automatically, from a dynamic routing protocol
Static routes are commonly used when routing from a network to a stub network. A stub
network is a network accessed by a single route.
The command for configuring a static route is ip route. The complete syntax for configuring a
static route is:
Procedure
To implement this practical following network topology is required to be configured using the commands
learned in previous practical. After configuring the given network a packet should be ping from any one
machine to another.
Router1 Configuration Command
Router1>en
Router1#config t
Router1(config)#interface f0/0
Router1(config-if)#ip address [Link] [Link]
Router1(config-if)#no shut
Router1(config-if)#interface s2/0
Router1(config-if)#ip address [Link] [Link]
Router1(config-if)#no shut
Router1(config-if)#interface s3/0
Router1(config-if)#clock rate 64000
Router1(config-if)#ip address [Link] [Link]
Router1(config-if)#no shut
Router1(config-if)#exit
Router1(config)#exit
Router1#copy run start
Router1#config t
Router1(config)#ip route [Link] [Link] [Link]
Router1(config)#ip route [Link] [Link] [Link]
Router1(config)#exit
Router1#copy run start
Verify Router1 configuration command:
Router#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B – BGPD - EIGRP, EX – EIGRP external,
O - OSPF, IA – OSPF inter area, N1 – OSPF NSSA external type1, N2 – OSPF NSSA external type2,
E1 – OSPF external type1, E2 – OSPF external type2, E – EGP, I - IS-IS, L1 -
IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area.
*-candidate default, U - per-user static route, o – ODR, P – periodic downloaded static route
Aim:-To implement the DHCP onto the Network Topology using Cisco Packet Tracer
Objectives
Configure the customer Cisco 1841 ISR as a DHCP server.
Background / Preparation
In this activity, you will continue to configure the Cisco 1841 ISR router for the customer network by configuring the
DHCP service. The customer has several workstations that need to be automatically configured with IP addresses on
the local subnet and appropriate DHCP options to allow access to the Internet.
The DHCP pool will use the [Link]/24 network but the first 49 addresses are excluded. The default gateway and
DNS server also need to be configured as [Link] and [Link].
For this activity, both the user and privileged EXEC passwords are cisco.
Note: Packet Tracer does not currently support the domain name and lease period options. These options are not
used in this activity.
b. Log in to the console of the Cisco 1841 ISR and enter global configuration mode.
c. Before creating a DHCP pool, configure the addresses that are excluded. The range is from [Link]
to192.168.1.49.
CustomerRouter(config)#ip dhcp excluded-address [Link] [Link]
d. Create a DHCP pool called pool1.
CustomerRouter(config)#ip dhcp pool pool1
e. Define the network address range for the DHCP pool.
CustomerRouter(dhcp-config)#dns-server [Link]
CustomerRouter(dhcp-config)#default-router [Link]
CustomerRouter(dhcp-config)#exit
CustomerRouter(config)#ip dhcp excluded-address [Link] [Link]
Reflection
a. What is the purpose of DHCP on the customer network?
b. What IP address is assigned to the workstation after its IP address is renewed?
c. What other DHCP options can be defined on the Cisco 1841 ISR router that are not configured in this activity?
Experiment 12
Aim:- To implement the Network Address Resolution(NAT) using Cicso Packet Tracer.
Objectives
Examine NAT processes as traffic traverses a NAT border router.
Background / Preparation
In this activity, you will use Packet Tracer Simulation mode to examine the contents of the IP header as traffic
crosses the NAT border router.
Step 2: Send an HTTP request from an inside host to an outside web server.
Click Customer PC. Click the Desktop tab and then Web Browser. In the URL field, type the web address for the ISP
server ([Link]). Make sure that you are in Simulation mode, and then click Go.
In the event list, notice that Customer PC queues a DNS request and sends out an ARP request. You can view the
contents of the ARP request by either clicking on the packet in the topology or clicking on the packet color under
Info in the Event List window.
In the PDU Information at Device: Customer PC window, which IP address is Customer PC attempting to find a
MAC address for? ______________________
In the Event List window, click Capture/Forward twice. Which device answers the ARP request from Customer PC?
Which MAC address is placed inside the ARP reply?
In the Event List window, click Capture/Forward twice. Customer PC accepts the ARP replay and then builds
another packet. What is the protocol for this new packet? If you click Outbound PDU Details for this packet, you
can see the details of the protocol. _________
In the Event List window, click Capture/Forward twice. Click the packet at the [Link] server.
Then click the Outbound PDU Details tab. Scroll down to the bottom to see the Application Layer data. What is the
IP address for the ISP server? ___
_____________________________________________________________
In the Event List window, click Capture/Forward twice. Customer PC now formulates another ARP request. Why?
________________________________________________________________
In the Event List window, click Capture/Forward 10 times until Customer PC formulates an HTTP request packet.
Customer PC finally has enough information to request a web page from the ISP server.
In the Event List window, click Capture/Forward three times. Click the packet at Customer Router to examine the
contents. Customer Router is a NAT border router. What is the inside local address and the inside global address for
Customer PC?________________________________________________________________
In the Event List window, click Capture/Forward seven times until the HTTP reply reaches Customer Router.
Examine the contents of the HTTP reply and notice that the inside local and global addresses have changed again as
the packet is forwarded on to Customer PC.
Step 3: Send an HTTP request from an outside host to an inside web server.
Customer Server provides web services to the public (outside addresses) through the domain name
[Link]. Follow a process similar to Step 2 to observe an HTTP request on ISP Workstation.
a. Click ISP Workstation. Click the Desktop tab, and then Web Browser. In the URL field, type the Customer Server
web address ([Link]). Make sure that you are in Simulation mode,
and then click Go.
b. You can either click Auto Capture/Play or Capture/Forward to step through each stage of the process. The same
ARP and DNS processes occur before the ISP Workstation can formulate an HTTP
request.
[Link] the HTTP request arrives at Customer Router, check the packet contents. What is the inside local address?
What is the inside global address?