Journal
Journal
This is to certify that Mr. Devesh Tiwari of B.Tech. Third Year, SEM- V,
Program: Computer Engineering - AI bearing URN No. 2021-B-
09082003A have successfully completed prescribed laboratory
Experiments as a partial requirement to complete the course: Computer
Networking of 03 Credits.
Date: 01/12/2023
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
INDEX
Expt. Date of Date of
No. Title of Expt. Performance Evaluation
Remark/Grade
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Computer Networks Lab
Experiment No. 1
Study of various Network Devices
AIM: To understand various Network Devices (Repeater, Hub, Switch, Bridge, Router,
Gateway).
Pre-requisites: - General Knowledge of Computer Networks Terms and components.
Theory:
Functions of network devices
Facilitate data transmission and communication between devices.
Enable efficient and secure network connectivity.
Enhance network performance and optimize traffic flow.
Provide network security by enforcing access control and threat prevention.
Simplify network management and configuration.
Extend network coverage and overcome signal limitations.
Repeaters:
Repeaters are network devices operating at the physical layer of the OSI model
that amplify or regenerate an incoming signal before retransmitting it.
They are incorporated in networks to expand its coverage area. They are also known as
signal boosters.
Signals that carry information within a network can travel a fixed distance before
attenuation endangers the integrity of the data.
A repeater receives a signal and, before it becomes too weak or corrupted, regenerates the
original bit pattern.
The repeater then sends the refreshed signal.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
A repeater can extend the physical length of a LAN.
The location of a repeater on a link is vital. A repeater must be placed so that a signal
reaches it before any noise changes the meaning of any of its bits.
If the corrupted bit travels much farther, however, accumulated noise can change its
meaning completely.
At that point, the original voltage is not recoverable, and the error needs to be
corrected.
A repeater placed on the line before the legibility of the signal becomes lost can still
read the signal well enough to determine the intended voltages and replicate them in
their original form.
Types of Repeaters:
According to the types of signals that they regenerate, repeaters can be classified into two
categories −
Analog Repeaters − They can only amplify the analog signal.
Digital Repeaters − They can reconstruct a distorted signal.
According to the types of networks that they connect, repeaters can be categorized into
two types −
Wired Repeaters − They are used in wired LANs.
Wireless Repeaters − They are used in wireless LANs and cellular networks.
According to the domain of LANs they connect, repeaters can be divided into two
categories − School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Local Repeaters − They connect LAN segments separated by small distance.
Remote Repeaters − They connect LANs that are far from each other.
Advantages of Repeaters:
1. Repeaters are simple to install and can easily extend the length or the coverage area of
networks.
2. They are cost effective.
3. Repeaters don’t require any processing overhead. The only time they need to be
investigated is in case of degradation of performance.
4. They can connect signals using different types of cables.
Disadvantages of Repeaters:
Repeaters cannot connect dissimilar networks.
They cannot differentiate between actual signal and noise.
They cannot reduce network traffic or congestion.
Most networks have limitations upon the number of repeaters that can be deployed.
Hub:
A hub is a physical layer networking device which is used to connect multiple devices in
a network. They are generally used to connect computers in a LAN.
A hub has many ports in it. A computer which intends to be connected to the network is
plugged in to one of these ports.
When a data frame arrives at a port, it is broadcast to every other port,
without considering whether it is destined for a particular destination or not.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Types of Hubs:
Passive Hubs:
A passive hub is just a connector. It connects the wires coming from different
branches. In a star-topology Ethernet LAN, a passive hub is just a point where
the signals coming from different stations collide; the hub is the collision point.
This type of a hub is part of the media; its location in the Internet model is
below the physical layer.
Active Hubs:
An active hub is actually a multipart repeater. It is normally used to create
connections between stations in a physical star topology.
However, hubs can also be used to create multiple levels of hierarchy, as shown
in Figure. The hierarchical use of hubs removes the length limitation of 10Base-
T (100 m).
Intelligent Hubs:
Intelligent hubs are active hubs that provide additional network management
facilities. They can perform a variety of functions of more intelligent
network devices like network management, switching, providing flexible data
rates etc
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Bridges:
A bridge operates in the physical layer as well as in the data link layer. It can regenerate
the signal that it receives and as a data link layer device, it can check the physical
addresses of source and destination contained in the frame.
The major difference between the bridge and the repeater is that the bridge and the
repeater is that the bridge has a filtering capability.
That means it can check the destination address of a frame and decide if the frame
should be forwarded or dropped.
If the frame is forwarded, then the bridge should specify the port over which it should be
forwarded.
Types of Bridges:
Transparent Bridges: - These are the bridges in which the stations are completely
unaware of the bridge’s existence i.e. whether or not a bridge is added or deleted from
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
the network, reconfiguration of the stations are unnecessary. These bridges make use
of two processes i.e., bridge forwarding and bridge learning.
Source Routing Bridges: - In these bridges, routing operation is performed by source
station and the frame specifies which route to follow. The host can discover frames by
sending a special frame called discovery frame, which spreads through the entire
network using all possible paths to destination.
Router:
Routers are networking devices operating at layer 3 or a network layer of the OSI
model.
They are responsible for receiving, analysing, and forwarding data packets among the
connected computer networks.
When a data packet arrives, the router inspects the destination address, consults its
routing tables to decide the optimal route and then transfers the packet along this
route.
A router is a three-layer device that routes packets based on their logical addresses
(host-to-host addressing).
A router normally connects LANs and WANs in the Internet and has a routing table
that is used for making decisions about the route.
The routing tables are normally dynamic and are updated using routing protocols.
Data is grouped into packets, or blocks of data.
Each packet has a physical device address as well as logical network address. The
network address allows routers to calculate the optimal path to a workstation or
computer.
The functioning of a router depends largely upon the routing table stored in it. The
routing table stores the available routes for all destinations.
The router consults the routing table to determine the optimal route through which the
data packets can be sent
A routing table typically contains the following entities −
IP addresses and subnet mask of the nodes in the network
IP addresses of the routers in the network
Interface information among the network devices and channels
Routing tables are of two types −
Static Routing Table − Here, the routes are fed manually and are not
refreshed automatically. It is suitable for small networks containing 2-3
routers.
Dynamic Routing Table − Here, the router communicates with other routers
using routing protocols to determine the available routes. It is suited for larger
networks having large numbers of routers.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Types of Routers:
A variety of routers are available depending upon their usages. The main types of routers are as
follows: -
Wireless Router − They provide WiFi connection WiFi devices like laptops,
smartphones etc. They can also provide standard Ethernet routing. For indoor
connections, the range is 150 feet while it's 300 feet for outdoor connections.
Broadband Routers − They are used to connect to the Internet through telephone and to
use voice over Internet Protocol (VoIP) technology for providing high-speed Internet
access. They are configured and provided by the Internet Service Provider (ISP).
Core Routers − They can route data packets within a given network but cannot route the
packets between the networks. They help to link all devices within a network thus
forming the backbone of the network. It is used by ISP and communication interfaces.
Edge Routers − They are low-capacity routers placed at the periphery of the networks.
They connect the internal network to the external networks and are suitable for
transferring data packets across networks. They use the Border Gateway Protocol (BGP)
for connectivity. There are two types of edge routers, subscriber edge routers and label
edge routers.
Brouters − Brouters are specialised routers that can provide the functionalities of
bridges as well. Like a bridge, brouters help to transfer data between networks. And
like a router, they route the data within the devices of a network.
Routing Table
A router reads its routing table to decide the best available route the packet can take to reach its
destination quickly and accurately. The routing table may be of these two types −
Static − In a static routing table the routes are fed manually. So it is suitable only
for very small networks that have maximum two to three routers.
Dynamic − In a dynamic routing table, the router communicates with other routers
through protocols to determine which routes are free. This is suited for larger
networks where manual feeding may not be feasible due to large number of routers.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Gateway:
A gateway is a network node that forms a passage between two networks operating with
different transmission protocols. The most common type of gateways, the network
gateway operates at layer 3, i.e. network layer of the OSI (open systems interconnection)
model.
However, depending upon the functionality, a gateway can operate at any of the seven
layers of OSI model.
It acts as the entry – exit point for a network since allTtraffic that flows across the networks
should pass through the gateway.
Only the internal traffic between the nodes of a LAN does not pass through the gateway.
Gateway is located at the boundary of a network and manages all data that inflows or
outflows from that network.
It forms a passage between two different networks operating with different transmission
protocols.
A gateway operates as a protocol converter, providing compatibility between the different
protocols used in the two different networks.
The feature that differentiates a gateway from other network devices is that it can operate
at any layer of the OSI model.
It also stores information about the routing paths of the communicating networks.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
When used in enterprise scenarios, a gateway node may be supplemented as a proxy server
or firewall.
A gateway is generally implemented as a node with multiple NICs (network interface cards)
connected to different networks. However, it can also be configured using software.
It uses a packet switching technique to transmit data across the networks.
Types of Gateways:
On basis of direction of data flow, gateways are broadly divided into two categories −
Unidirectional Gateways − They allow data to flow in only one direction. Changes made
in the source node are replicated in the destination node, but not vice versa. They can be
used as archiving tools.
Bidirectional Gateways − They allow data to flow in both directions. They can be used
as synchronization tools.
On basis of functionalities, there can be a variety of gateways, the prominent among them are as
follows −
Network Gateway − This is the most common type of gateway that provides an interface
between two dissimilar networks operating with different protocols. Whenever the term
gateway is mentioned without specifying the type, it indicates a network gateway.
Cloud Storage Gateway − It is a network node or server that translates storage requests
with different cloud storage service API calls, such as SOAP (Simple Object Access
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Protocol) or REST (REpresentational State Transfer).It facilitates integration of private
cloud storage into applications without necessitating transfer of the applications into any
public cloud, thus simplifying data communication.
Internet-To-Orbit Gateway (I2O) − It connects devices on the Internet to satellites and
spacecraft orbiting the earth. Two prominent I2O gateways are Project HERMES and
Global Educational Network for Satellite Operations (GENSO).
IoT Gateway − IoT gateways assimilates sensor data from IoT (Internet of Things) devices
in the field and translates between sensor protocols before sending it to the cloud network.
They connect IoT devices, cloud networks and user applications.
VoiP Trunk Gateway − It facilitates data transmission between plain old telephone
service (POTS) devices like landline phones and fax machines, with VoIP (voice over
Internet Protocol) network.
Switch:
A switch is a data link layer networking device which connects devices in a network and
uses packet switching to send and receive data over the network.
Like a hub, a switch also has many ports, to which computers are plugged in.
However, when a data frame arrives at any port of a network switch, it examines the
destination address and sends the frame to the corresponding device(s).
Thus, it supports both unicast and multicast communications.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
We can have a two-layer switch or a three-layer switch.
A three-layer switch is used at the network layer; it is a kind of router.
The two-layer switch performs at the physical and data link layers.
A two-layer switch is a bridge, a bridge with many ports and a design that allows better
(faster) performance.
A bridge with a few ports can connect a few LANs together. A bridge with many ports may
be able to allocate a unique port to each station, with each station on its own independent
entity.
This means no competing traffic (no collision, as we saw in Ethernet).
A two-layer switch, as a bridge does, makes a filtering decision based on the MAC
Address of the frame it received.
However, a two-layer switch can be more sophisticated. It can have a buffer to hold the
frames for processing.
It can have a switching factor that forwards the frames faster. Some new two-layer
switches, called cut-through switches, have been designed to forward the frame as soon
as they check the MAC addresses in the header of the frame.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Types of Switches:
There are variety of switches that can be broadly categorised into 4 types:-
Unmanaged Switch − These are inexpensive switches commonly used in home networks
and small businesses. They can be set up by simply plugging in to the network, after which
they instantly start operating. When more devices need to be added, more switches are
simply added by this plug and play method. They are referred to as u managed since they
do not require to be configured or monitored.
Managed Switch:-
These are costly switches that are used in organisations with large and complex networks, since
they can be customized to augment the functionalities of a standard switch. The augmented
features may be QoS (Quality of Service) like higher security levels, better precision control and
complete network management. Despite their cost, they are preferred in growing organizations due
to their scalability and flexibility. Simple Network Management Protocol (SNMP) is used for
configuring managed switches.
LAN Switch :-
Local Area Network (LAN) switches connect devices in the internal LAN of an organization. They
are also referred to as Ethernet switches or data switches. These switches are particularly helpful
in reducing network congestion or bottlenecks. They allocate bandwidth in a manner so that there
is no overlapping of data packets in a network.
PoE Switch:-
Power over Ethernet (PoE) switches are used in PoE Gigabit Ethernets. PoE technology combines
data and power transmission over the same cable so that devices connected to it can receive both
electricity as well as data over the same line. PoE switches offer greater flexibility and simplifies
the cabling connections.
Modems:
A modem (modulator-demodulator) converts digital signals into analog signals of different
frequencies and transmits them to a modem at the receiving location. The receiving modem
performs the reverse transformation and provides a digital output to a device connected to
a modem, usually a computer. The digital data is usually transferred to or from the modem
over a serial line through an industry-standard interface, RS-232.
There are three main types of modems:
A DSL modem uses telephone cables and is considered the slowest connection.
A cable modem transmits information over TV lines and is faster than DSL.
A wireless modem transfers information between the local network and an internet
service provider; it is the fastest transmitter.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
RJ45 Connector
RJ45 is the acronym for Registered Jack 45. RJ45 connector is an 8-pin jack used by devices to
physically connect to Ethernet based local area networks (LANs). Ethernet is a technology that
defines protocols for establishing a LAN. The cable used for Ethernet LANs are twisted pair ones
and have RJ45 connector pins at both ends. These pins go into the corresponding socket on
devices and connect the device to the network.
Ethernet Card
Ethernet card, also known as network interface card (NIC), is a hardware component used by
computers to connect to Ethernet LAN and communicate with other devices on the LAN. The
earliest Ethernet cards were external to the system and needed to be installed manually. In
modern computer systems, it is an internal hardware component. The NIC has RJ45 socket where
network cable is physically plugged in.
Ethernet card speeds may vary depending upon the protocols it supports. Old Ethernet cards had
maximum speed of 10 Mbps. However, modern cards support fast Ethernets up to a speed of 100
Mbps. Some cards even have capacity of 1 Gbps.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Wi-Fi Card
Wi-Fi is the acronym for wireless fidelity. Wi-Fi technology is used to achieve wireless
connection to any network. Wi-Fi card is a card used to connect any device to the local network
wirelessly. The physical area of the network which provides internet access through Wi-Fi is
called Wi-Fi hotspot. Hotspots can be set up at home, office or any public space. Hotspots
themselves are connected to the network through wires.
A Wi-Fi card is used to add capabilities like teleconferencing, downloading digital camera
images, video chat, etc. to old devices. Modern devices come with their in-built wireless network
adapter.
Firewalls:
A firewall restricts the internet traffic of a private network, controlling what goes in and out. They
analyze and restrict data packets based on programmed parameters, either whitelists or
blacklists. Whitelists only allow information that falls within a certain set of parameters,
while blacklists deny all information that falls inside the parameters.
Firewalls are essential for private networks, especially those operating with sensitive
information. They are also used within internal networks to block access between subgroups,
such as a sales department being denied access to files pertaining to IT or HR.
Several types of firewalls exist, and which one is right for you depends on your operation.
Some of the most common firewall types include:
Packet filtering: Acts as a network layer checkpoint, analyzing data packets by IP address,
packet type, port number or network protocols.
Stateful inspection: Analyzes data at network and transport layers, inspecting source IP,
destination IP, source port and destination port.
Next-generation: Analyzes actual packet content and all TCP handshake checks, checking
for malware, and detects advanced threats (see the section on IDS and IPS below)
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Any type of firewall is helpful, but packet filtering is the most basic. A stateful inspection takes
defenses to the next level. Next-generation firewall methods are the most thorough and secure,
often used in highly regulated industries like finance and healthcare.
Conclusion: successfully studied and understood various Network Devices such as Repeater,
Hub, Switch, Bridge, Router, Gateway and learnt the functions of all the devices
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Computer Networks Lab
Experiment No. 2
Study of various Network Simulation Tools
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Network Simulation
Network Simulator
Software that is used to predict the performance of a computer network is known as a network
simulator. These are used when communication networks have turned into too difficult for
fixed analytical techniques to offer a precise understanding of system performance. In a
simulator, the computer network can be molded with the help of links, devices and
applications and the performance of a network can be reported. These are available by using
new networks and technologies which are used today like IoT, 5G, WLANs, ad hoc networks of
mobile, WSNs, LTE, ad hoc networks of vehicles, etc.
Network Emulation
This is one kind of method used to test the act of real applications over a virtual network. This
is dissimilar compare with network simulation wherever only mathematical form of traffic,
channels, protocols and network models are applied. The main function of this is to assess
performance, estimate the impact of change, and otherwise optimize decision-making
in technology.
It is used mainly in web-based simulation to build by using the event package otherwise
process the package. This is used to design quantitative numeric models & estimate them with
respect to the data from the experiment.
OPNET
It is used in research & development to provide whole flexibility to study regarding
communication networks, protocols, and applications. When it includes both programming
environment and GUI, then it provides a platform for the user to form the network when they
require it.
QualNet
It is used for engineers, scholars to build virtual models for all kinds of data, voice & video
networks. In fact, it is a testing, planning and also a training tool used for signifying the
network situation with accuracy.
Advantages of Network Simulation
The advantages of network simulators include the following.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
The main advantage of a simulator is to provide practical feedback to the users while
designing real-world systems.
They allow the designers of the system to study trouble at numerous abstraction
levels.
These are used in an effective way which means to teach otherwise demonstrate the
concepts to students.
1). What are the best network simulators?
They are GNS3, Packet Tracer, Virtual Internet Routing Lab (VIRL) and Boson Network
Simulator
2). What is ns2 Simulator?
It is an open-source tool used for simulation using Linux.
3). What is the main difference between simulation & emulator?
A simulator demonstrates the network’s behavior & its components, whereas an emulator is
used to copy the network’s behavior to replace it functionally.
Thus, this is all about an overview of network simulation, working and its advantages. The
tools of network simulation are up to date technology. The simulator aids the user to expand
the networks through real-time. So it is helpful in testing the new networking protocols within
the access protocols. The tools of network simulator are OPNET, NS2, GloMosim, J-sim, NetSim,
QualNet, OMNET++, Ns3, REAL, etc. Here is a question for you, what is the function of network
simulation?
Network simulation tools allow students to easily learn the core concepts of computer
networking and TCP/IP in general. Even professionals could benefit from these tools by
simulating network environments and get an idea of how a network will work before actual
implementation.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Moreover, system administrators could use them as testing grounds for new network
topologies and system testing. The simulation environment allows specialists to try out ideas
with no harm to existing networks.
If this is the kind of functionality you are looking for, then in this article you will find 18
suggestions of network simulation tools below.
Some of them are great for people studying for network certification exams (such as Cisco
CCNA, CCNP etc) but you will find also other options for general networking simulations and
research.
Cisco’s Packet Tracer is perhaps the most famous of all network simulation tools, especially
for practicing on Cisco CCNA certification.
It is functional, easy to use, and is accessible for educational institutions or for people who
enrolled in Cisco’s Net Academy (free of charge).
The highlight of the Packet Tracer is its drag-and-drop user interface. To start testing network
topologies, you simply choose a network device from the bottom panel and drop it into the
building area. Packet Tracer offers several categories of devices, such as routers, switches,
computers, servers, and more.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
The drag-and-drop UI is complemented by a command line interface. Although you can do
much of the setup in the visual editor, the command line provides you with full access to all
features of the Packet Tracer, including TCP/IP settings of network devices, routing protocols
supports, Layer 2 features etc.
With that said, Cisco Packet Tracer has some limitations. Among other things, it’s proprietary
and only simulates Cisco devices. Also, it does not support all the features available on actual
devices.
Still, Cisco Packet Tracer is fairly intuitive and is a great tool for students and experienced
network specialists alike. It lets you easily build super-complex network topologies to test out
ideas or to allow you to better understand networking concepts.
2. GNS3
GNS3 is quite a bit different from Cisco Packet Tracer. Although GNS3 is perhaps more difficult
to set up, it offers more flexibility than the Packet Tracer. It’s all in all more advanced and
allows you to do more (if you have the knowledge).
The most important advantage of GNS3 over the Packet Tracer is that GNS3 is open-source and
supports more device options as emulated devices.
If needed, you could dive into its source code to extend its base functionality. Most people
probably won’t benefit from the open-source license of GNS3, but it’s still nice to have.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Another nice thing about GNS3 is that it runs real Cisco IOS images in an emulated virtual
environment (more close to the real device), whereas the Packet Tracer merely simulates IOS
and does not support all the features available in real devices.
Among other things, this allows GNS3 to integrate with real, physical network devices.
Aside from IOS, GNS3 supports other vendors as well, such as Arista or Mikrotik.
What’s also great about GNS3 is that it’s completely free, though the customer support is
limited.
3. Cisco VIRL
Many people think that Cisco Packet Tracer is good only for testing high-level ideas. Well, if
you want something more advanced, Cisco VIRL may be the right choice.
VIRL is notorious for its resource management and complexity issues, but it’s way more
functional than Packet Tracer. It features the latest versions of Cisco IOS as well.
What’s also nice about VIRL is that it can create automated bootstrap configurations with one
click thanks to AutoNetkit.
After AutoNetkit is done, it presents graphical representations of network topology and allows
you to customize routing protocols, IP addresses, and more.
One thing to note with VIRL is that the more RAM your machine has, the better. VIRL hogs
computer resources like there’s no tomorrow, so a powerful machine is a must.
4. EVE-NG
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
EVE-NG is available in free and paid editions with vastly different features. Although the free
version comes with all the basics of this tool, it lacks some things such as Docker container
support, NAT clouds, or Wireshark integrations.
What’s also particularly notable about EVE-NG is that it is clientless. Basically, this means that
you only need to deploy the server through a virtual machine, and that you don’t need to install
separate tools to visualize and connect network devices. Network setup is done via HTML5,
which is fairly convenient.
Like GNS3, EVE-NG also allows you to modify network topologies while they are running,
which makes it a little more time-efficient.
5. Boson NetSim
NetSim is an excellent solution for preparing for CCNA, ENCOR, and ENARSI exams. Each
subscription of NetSim covers 1 exam in its respective category as well, so you don’t need to
dedicate money to it separately.
The core of NetSim is the Network Designer – a tool that allows you to create intuitive
topologies with ease. Among the things that the Network Designer lets you do is aligning
elements, annotating topologies, and easily identifying active or inactive connections.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
NetSim allows you to share your own labs, lab packs, and network topologies with others as
well. Likewise, you may view labs and topologies of other NetSim users, which may give you
an edge in education.
6. Mininet
Mininet is yet another open-source network simulation solution. This thing works best with
Linux machines since you may install it natively without any VMs. However, you could use
Mininet on Mac and Windows as well if you have something like Virtual Box or VMWare.
As an open-source network simulator, Mininet provides excellent flexibility for setup, though
it also requires more technical knowledge.
It’s not as functional as GNS3 or VIRL, but it’s certainly a good pick for testing ideas or learning.
Mininet is based on OpenFlow as well, so it’s particularly good for building OpenFlow
solutions.
Common Open Research Emulator, or CORE, has been originally developed by a Network
Technology research group at Boeing Research and Technology. Now, the U.S. Naval Research
Laboratory is supporting the further development of CORE.
IMUNES is based on the Linux and FreeBSD kernel. The kernel has been divided into smaller
virtual nodes that can be connected with each other to form complex network topologies.
This tool may simulate or emulate IP networks at gigabit speeds in real time, with hundreds
and thousands of nodes running on a single physical machine. INUMES is scalable as well,
allowing you to perform large-scale experiments.
Completely open-source and free, IMUNES is remarkably customizable too. And what’s also
notable is that IMUNES is currently used for general-purpose network testing at Ericsson
Nikola Tesla and learning at the University of Zagreb.
9. Cloonix
Cloonix comprises a server subset of virtual machines and a client subset of virtual machines
providing distant server’s control.
Primarily, Cloonix is aimed at “the coherent usage” of open-source software solutions such as
openswitch, qemu-kvm, and dpdk.
Cloonix emulates 3 cable types too – socket, vhost-ovs, and dpdk-ovs. Aside from that, this
network emulation tool provides easy access to the virtual machines managed by it.
When it comes to the easiness of use, Cloonix is intended for more advanced users (though if
you are interested in networking, you should be “advanced” anyway). It’s open-source and free
as well, allowing for great customizability.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
The Paessler Multi Server Simulator is specifically designed for large-scale network testing.
Among the protocols this thing supports are HTTP, FTP, SMTP, and DNS – all the essential and
basic stuff you would want for testing.
What’s also notable about the Multi Server Simulator is that it allows you to simulate recurrent
downtimes for each device – intervals can be set by the user. And thanks to the detailed logs
for each simulated server, keeping an eye on the network is very easy.
Cisco Modeling Labs Personal allows you to prepare for Cisco Expert, Professional, or
Associate certifications via its accurately simulated network environments.
Modeling Labs Personal uses real Cisco IOS images for simulation, allowing you to model real
Cisco switches and routers. Aside from that, Cisco Modeling Labs Personal allows you to create
what-if scenarios and models of real-world networks, connect virtual and physical
environments, and work with up to 20 simulated nodes.
If 20 doesn’t seem quite enough for your needs, then you could get Modeling Labs Personal
Plus with up to 40 concurrent nodes.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Cisco CCIE Lab Builder is recommended by Cisco for those who have passed the CCIE Routing
and Switching Written Exam, as well as for those who are preparing for expert written labs
and exams.
The virtual lab environment in Cisco CCIE Lab Builder provides access to features that are
tested during the CCIE Routing and Switching Version 5 Lab Exam.
The CCIE Lab Builder lets you configure topologies with up to 20 nodes, while the drag-and-
drop builder with minimal reload times ensures an environment for efficient learning.
14. Kathara
Kathara perhaps isn’t very well-known, but it’s currently being used by students at Roma Tre
University. Aside from that, Kathara has been used to write a number of research papers that
demonstrated the capabilities of Kathara itself, among other things.
15. VNX
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
VR Network Lab has been developed for the TeraStream project at Deutsche Telekom for
testing the company’s network provisioning system. It has been made available for students
and network specialists via GitHub for free use as well.
This network simulation tool supports devices from multiple vendors – most notably, Arista,
Cisco, Juniper, and Nokia. VR Network Lab is also intended to be run with KVM enabled for
hardware-assisted virtualization, though it may work without it as well.
17. OPNET
The OPNET network simulator is an open-source piece of software with pre-built models of
protocols and devices, allowing you to create a wide range of network topologies. Aside from
that, it incorporates a large number of project scenarios.
The user interface of OPNET is quite nice and simple. It’s functional too – once you create or
import a network topology for simulation, you may create traffic, select statistics for tracking,
and view results. After that, you may make changes to the topology to hopefully come up with
a more efficient solution.
One thing to note with OPNET is that you can’t create new protocols or modify existing ones.
Still, what comes out of the box should be more than enough for most use cases.
The QualNet Network Simulator is wonderfully scalable, supporting thousands of nodes for
building and testing network topologies.
Thanks to its efficiency, the Network Simulator is well-optimized and isn’t exorbitantly hungry
for resources like some other network simulation tools out there.
Network Simulator tools allow you to design network topologies, analyze data flow within the
network, trace packets, and set up what-if scenarios to see how the network holds up to tests
and challenges quickly and intuitively.
The QualNet Network Simulator is also compatible with Windows and Linux running on 64-
bit multiprocessor architectures and can be connected to real networks or third-party
visualizations to help you enhance your network model.
CONCLUSION: Studied various simulation tools thoroughly and successfully learnt about
simulation tools.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Computer Networks Lab
Experiment No. 3
Installation and configuration of Packet Tracer
AIM: To Study Installation and configuration of Packet Tracer-Cisco’s Network Simulation
Tool
Pre-requisites: - General Knowledge of Computer Networks Terms and Network Simulation
Tools.
Theory:
Cisco Packet Tracer
Packet Tracer is computer software that is designed with the purpose of making
network simulations to understand the networking and cyber security concepts in an
easy way. It is built by Cisco Corporation and is available for free for different
operating systems like macOS, Windows, Linux, etc. It is easy to easy with a simple
interface.
Installing Packet Tracer on Windows
Follow the below steps to install Packet Tracer on Windows:
Step 1: Visit the official website of Netacad using any web browser.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Step 3: Next screen will appear, click on the sign-up option.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Step 4: Next screen will appear and will ask for email and password and other simple
details, fill them and click on Register.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Step 5: Now the login screen appears again so fill in the Email id.
Step 6: On the next screen enter the password and press the Login button.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Step 7: Dashboard will initialize, now click on Resources and choose Download
Packet Tracer Option.
Step 8: On the next web page choose the operating system to download the packet
tracer. Downloading will start automatically.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Step 9: Check for the executable file in your system and run it.
Step 10: Next screen is of License Agreement so Click on I accept the license.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Step 11: Choose the installing location which has sufficient space.
Step 12: Select the start menu folder and click the Next button.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Step 13: Check the box for creating a desktop icon and click on the Next button.
Step 14: Now packet tracer is ready to install so click on the Install button.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Step 15: The installation process will start and will hardly take a minute.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Step 17: An icon is created on the desktop so run it.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Computer Networks Lab
Experiment No. 4
configuration of network topology
Theory:
A network is simply a connection between resources. A network topology is a
method used for how these connected resources are arranged. Check out the
image below that shows the different types of Network Topologies
Open the application and log in to the service with the same credentials that were used to sign up
for the Cisco course. There are icons located at the bottom of the screen for network devices, end
devices, and other options to map our network. Click Network Devices, Routers, and the 4321
Note: The arrow at the top of the screen points to the button to delete resources from the
Add in another 4321 Router so that there will be two total, click the switches icon, select the 3650
24PS switch to add to our workspace.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Click the Connections (lightning bolt) icon, select Copper Straight-Through, click Router0 in
the workspace, and select GigabitEthernet0/0/0. Connect this to the switch by clicking
the switch icon and selecting GigabitEthernet1/0/1. Repeat the process but this time to connect
the switch with GigabitEthernet1/0/2 to Router1 with GigabitEthernet0/0/0 using the same
Copper Straight-Through connection.
Note: If you would like to see the port labels like I have below, click Cisco Packet Tracer for a list
of options, click Preferences, and add a check next to Always Show Port Labels in Logical
Workspace. Click the Font tab for options on changing the size of the icons and CLI texts.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Let’s check out Router0 and see if we can add a NIM-2T module to the device. A NIM-2T is a 2
port multi-protocol Synchronous Serial NIM that would be connected to our router.
Click Router0, select NIM-2T located under modules, and drag it until it is in the empty area of
our physical router.
if we have an error! ,We need to turn the power off on the router before we can add the NIM-2T
module to it. Click OK and then click the physical power button that I have boxed below.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
The green light for the power button should turn off. Drag our NIM-2T module to the device
again and click the power button to turn the router back on.
Exit this screen to get back to the workspace. We can see that there are red arrows pointing down
indicating that the connection is down. Double click the switch icon and we can see that the
physical view of our switch device is missing the power supply. Grab and drag the AC-POWER-
SUPPLY module to the empty space for our switch device.
If we click the CLI or Config tabs, we will see information showing that the switch is booting up.
Click the CLI tab, type “no” to bypass the option of entering configuration dialog,
press RETURN (or ENTER), and then we will see that we are now in the user mode on the
router. User mode will let us view outputs on the router, but we won’t be able to make changes to
it.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Run the show version command to see version type, uptime, and other information about the
device.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Press ESCAPE to leave that setting. Run theenable command so that we can gain full
administrative priveleges of the device (similar to root privileges in Linux after running the sudo
su command). The “#” sign will appear and if we type “?” in the CLI, we will see a list of
commands that we are now allowed to use.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Press the ESCAPE button and enter each command below to configure our router.
configure terminal
#This sets up congiguration for our host name. My hostname will be Router1.
hostname Router1
interface gigabitEthernet ?
no shut
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Our workspace is showing that the arrows are green and pointing up.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Run the command below to give the router an IP address of 10.1.1.2 and subnet mask of
255.255.255.0.
Run end in the CLI to be brought back to our previous “enable mode”. Next, run the code below
to save the configuration.
When prompted about the destination file name, push RETURN. I tried to type “yes” initially and
it gave me an error.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Exit the CLI for Router1 and complete the same steps to configure Router0. We will give Router0
a subnet of 10.1.1.1 and a subnet mask of 255.255.255.0. We can see now that all arrows are
green and pointing up!
Run the end command to go back to privilege mode and let’s try to test our connection! Run ping
10.1.1.1 to test our router. That came back successful! We can also run show ip interface brief to
check the configuration of our router and ip address.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
All good so far! Now, lets try to test the connection from Router0 to Router1 by running ping
10.1.1.2 in the CLI. My first test came back with an 80% success rate but there was a 100%
success rate after I tried the ping again.
Also tested the connection from Router1 to Router0 and the ping was 100% successfull on the
first attempt.
First, let’s give our switch an easier name for us to use when referring to it in the CLI. I named
mine “Switch1” by clicking the text of the icon and replacing the name. Click the CLI tab and
type in the commands below.
enable
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
#Gives me global configuration mode
configure terminal
hostname Switch1
end
We configured the hostname for the switch, now lets just check to to make sure that our routers
can still communicate across the network.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Step 4: Simulation
Cisco Packet Tracer offers a Simulation tool that gives us more information about how our
devices communicate with each other in a network topology. This can be very useful when trying
to detect possibile vulnerabilities and communication issues within a network. Let’s see how it
works!
Click Simulation, click Show All/None, and click Edit Filters. Select only ICMP for the IPv4 tab
and select only NTP for the Misc tab. Now, we can send a ping from Router0 to Router1 to get a
visual of how our resources will communicate within our network topology.
We can also get Protocol Data Unit information for the device!
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Principle:
To implement this practical following network topology is required to be
configured using the commands learned in previous practical.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
After configuring the given network a packet should be ping from any one
machine to another.
Conclusion:
We have successfully created and simulated a network topology using the Cisco Packet Tracer
application.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Computer Networks Lab
Experiment No.5
Configuring a Switch in Packet Tracer
AIM: To Configure and Verify a Switch in Packet Tracer.
Objective: In this lab we will explore the step-by-step process of enabling and configuring a
switch in Packet Tracer, a versatile network simulation tool commonly used for learning and
practicing networking concepts.
Objective:
In this lab we will connect different local area networks router on Cisco Packet Tracer.
Objective:
In this lab we will connect different local area networks router on Cisco Packet Tracer.
Enabling and Configuring a Switch in Packet Tracer:
Step 1: Launch Packet Tracer
Begin by launching Cisco Packet Tracer on your computer. Ensure you have a Packet Tracer
project open or create a new one if you’re starting from scratch.
To enable and configure a switch, you need to access the Devices panel in Packet Tracer:
1. On the left side of the Packet Tracer window, you’ll find the “Devices” tab. Click on it to
expand the Devices panel.
2. Within the Devices panel, locate the “Switches” category. This category contains various
switch models that you can add to your network topology.
Packet Tracer offers several switch models, each with different capabilities and features. Select a
switch model that suits your network design requirements, and then click and drag it onto your
workspace to add it to your network topology.
Once you’ve added a switch to your workspace, you can connect devices to it. Devices can
include computers, servers, other switches, and printers. To connect devices:
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
1. Access the “End Devices” category in the Devices panel to select the devices you want to
connect to the switch.
2. Click and drag the selected devices onto your workspace.
3. Use Ethernet cables (straight or crossover) from the “Connections” panel to connect the
devices to the switch’s available ports. Click on the cable type and drag it from a device’s
network interface to a switch port.
Configuring a switch in Packet Tracer involves setting up certain parameters and features. Here
are some common configurations you can perform on a switch:
Assign a Name:
You can assign a name to the switch for easier identification. Access the switch’s command-line
interface (CLI) by double-clicking on the switch icon, and then use the following commands:
Switch> enable
ccna(config)# end
This sequence of commands enters global configuration mode, sets the hostname to “ccna” exits
configuration mode, and saves the configuration.
Create VLANs:
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
If your switch supports VLANs, you can create and configure them to segment your network. To
create VLANs, access the switch’s CLI and use commands like:
ccna> enable
ccna(config)# vlan 10
ccna(config-vlan)# exit
ccna(config)# vlan 20
ccna(config-vlan)# end
In this example, we’ve created two VLANs, named “Sales” and “Marketing.” Be sure to assign
VLANs to specific switch ports to segment traffic.
Port security allows you to control which devices can connect to switch ports. It’s a security
feature that prevents unauthorized access. To configure port security, use commands like:
ccna> enable
ccna(config-if)# end
In this example, we’ve enabled port security on GigabitEthernet0/1, limited the maximum
number of allowed MAC addresses to 2, set the violation mode to restrict, and allowed only
MAC addresses that have been learned dynamically (sticky).
Trunk ports are used to carry traffic for multiple VLANs between switches. If your network
requires trunking, configure the switch ports as trunk ports:
ccna> enable
ccna(config-if)# end
Spanning Tree Protocol (STP) helps prevent loops in Ethernet networks. It’s typically enabled by
default, but you can verify its status and configure parameters if needed:
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
ccna> enable
ccna(config)# end
In this example, we’ve checked the STP status and set a lower priority for VLAN 10.
After configuring the switch, it’s essential to verify that your configuration is correct. Use
various commands and tools to check the switch’s status, such as:
show interfaces status: Displays the status of all interfaces on the switch, including their
operational status and VLAN assignment.
show vlan: Lists the configured VLANs and their associated ports.
show port-security: Verifies the port security configuration, including the number of
secure MAC addresses and the current violation mode.
show spanning-tree: Shows the Spanning Tree Protocol (STP) status and topology
information.
Conduct traffic tests between devices connected to the switch to ensure that they can
communicate as expected.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Conclusion:
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Computer Networks Lab
Experiment No. 6
Perform initial router configurations
AIM: To Configure and Verify the Initial Router Configuration.
OBJECTIVE: In this lab we will connect different local area networks router on cisco packet
tracer.
Objective:
In this lab we will connect different local area networks router on Cisco Packet Tracer.
Objective:
In this lab we will connect different local area networks router on Cisco Packet Tracer.
BACKGROUND:
In this activity, you will perform basic router configuration tasks. You will secure access to the
CLI and console port using encrypted and plain-text passwords. You will also configure
messages for users who are logging into the router. These banners warn unauthorized users that
access is prohibited. Finally, you will verify and save your running configuration.
THEORY:
Routing is the method of selecting a network packet path over the Internet or between or through
multiple networks. Routing is conducted on many kinds of networks, including circuit-switched
networks, such as public switched telephone networks (PSTN), and computer networks, such as
the Internet.
OBJECTIVES:
Configure the router host name.
Configure passwords.
Configure banner messages.
Verify the router configuration
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Connect the router0 with PC0 with the help of a console cable.
Then, click on PC0 and go to the terminal, and type y.
Finally, we can configure the router with the help of a PC.
router>
router>en
router#conf t
router(config)#hostname r1
r1(config)exit
Step 3: Set a message of the day (MOTD) banner for the users.
r1(config)#banner motd $
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
r1(config)#banner motd $
To configure the Line Control password and Enable secret follow the below commands:
r1#conf t
r1(config)#
r1(config)#line con 0
r1(config-line)#password GFG123
r1(config-line)#login
r1(config-line)#exit
r1(config)#service password-encryption
sh(config)#exit
When you try to log in first, it will ask for the line control password.
Then, to configure the terminal it will ask to enable a secret password.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
To save the configuration use the below command:
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
CONCLUSION: successfully verified and configured initial router configuration using cisco
packet tracer.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Computer Networks Lab
Experiment No.7
Implement IP addressing schemes.
AIM: To Implement and Verify IP addressing schemes.
Objective:
Part 1: Design a Network Subnetting Scheme
Part 2: Configure the Devices
Part 3: Test and Troubleshoot the Network
Background:
In this lab, starting from a single network address and network mask, you will subnet the
network into multiple subnets. The subnet scheme should be based on the number of host
computers required in each subnet, as well as other network considerations, like future network
host expansion.
After you have created a subnetting scheme and completed the network diagram by filling in the
host and interface IP addresses, you will configure the host PCs and router interfaces, including
loopback interfaces.
The loopback interfaces are created to simulate additional LANs attached to router R1.
After the network devices and host PCs have been configured, you will use the ping command to
test for network connectivity.
Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers
(ISRs) with Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco
Catalyst 2960s with Cisco IOS Release 15.0(2) (lanbasek9 image). Other routers, switches and
Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the commands
available and output produced might vary from what is shown in the labs. Refer to the Router
Interface Summary Table at this end of the lab for the correct interface identifiers.
Note: Make sure that the routers and switches have been erased and have no startup
configurations. If you are unsure, contact your instructor.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Required Resources:
1 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or
comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or
comparable)
2 PCs (Windows 7 or 8 with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
Ethernet cables as shown in the topology.
Note: The Gigabit Ethernet interfaces on Cisco 1941 routers are autosensing. An Ethernet
straight-through cable may be used between the router and PC-B. If using another Cisco router
model, it may be necessary to use an Ethernet crossover cable.
Step 1: Create a subnetting scheme that meets the required number of subnets and required
number of host addresses.
In this scenario, you are a network administrator for a small subdivision within a larger
company. You must create multiple subnets out of the 192.168.0.0/24 network address space to
meet the following requirements:
The first subnet is the employee network. You need a minimum of 25 host IP
addresses.
The second subnet is the administration network. You need a minimum of 10 IP
addresses.
The third and fourth subnets are reserved as virtual networks on virtual router
interfaces, loopback 0 and loopback 1. These virtual router interfaces simulate LANs
attached to R1.
You also need two additional unused subnets for future network expansion.
Step 2: Complete the diagram showing where the host IP addresses will be applied.
On the following lines provided, fill in the IP addresses and subnets masks in slash prefix
notation. On the router, use the first usable address in each subnet for each of the interfaces,
Gigabit Ethernet 0/0, Gigabit Ethernet 0/1, loopback 0, and loopback 1. Fill in an IP address for
both PC-A and PC-B. Also enter this information into the Addressing Table.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
The addresses of the router Gigabit Ethernet 0/0, Gigabit Ethernet 0/1, loopback 0 and loopback
1 interfaces would be: 192.168.0.1/27, 192.168.0.33/27, 192.168.0.65/27, 192.168.0.97/27. If the
Gigabit 0/0 interface is the first subnet then PC-B’s IP address would be a number between
192.168.0.2 and 192.168.0.30. If the Gigabit 0/1 interface is the second subnet, then PC-A’s IP
address would be a number between 192.168.0.34 and 192.168.0.62.
In Part 2, set up the network topology and configure basic settings on the PCs and router, such as
the router Gigabit Ethernet interface IP addresses, and the PC’s IP addresses, subnet masks, and
default gateways. Refer to the Addressing Table for device names and address information.
Note: Appendix A provides configuration details for the steps in Part 2. You should attempt to
complete Part 2 prior to reviewing Appendix A.
Step 1: Configure the router.
a. Enter into privileged EXEC mode and then global config mode.
b. Assign the R1 as the hostname for the router.
c. Configure both the G0/0 and G0/1 interfaces with IP addresses and subnet masks, and then
enable them.
d. Loopback interfaces are created to simulate additional LANs on R1 router. Configure the
loopback interfaces with IP addresses and subnet masks. After they are created, loopback
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
interfaces are enabled, by default. (To create the loopback addresses, enter the command
interface loopback 0 at the global config mode)
Note: You can create additional loopbacks for testing with different addressing schemes, if
desired.
e. Save the running configuration to the startup configuration file.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
Computer Networks Lab
Experiment No.8
Observing static and dynamic routing.
EXPERIMENT SETUP:
1. Connect the computers and routers according to the topology designed for the experiment
using either physical hardware or a network simulation tool.
2. Assign IP addresses to the interfaces of the routers and computers based on the chosen
network topology.
3. Configure static routing on one set of routers and dynamic routing on another set. Use a
common routing protocol such as RIP (Routing Information Protocol) or OSPF (Open
Shortest Path First) for dynamic routing.
4. Ensure that all devices are powered on and connected correctly.
PROCEDURE:
1. Static Routing:
a. Manually configure static routes on the routers, specifying the next-hop addresses.
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
b. Verify the routing table on each router to confirm that the static routes are correctly
configured.
c. Test connectivity between computers in different subnets and observe the packet
forwarding based on the static routes.
2. Dynamic Routing:
a. Configure dynamic routing protocols (e.g., RIP or OSPF) on the routers.
b. Observe the routers exchanging routing information and updating their routing tables
dynamically.
c. Verify the routing table on each router to confirm that the dynamic routes are learned
and updated.
d. Test connectivity between computers in different subnets and observe the packet
forwarding based on dynamically learned routes.
3. Comparison:
a. Compare and contrast the advantages and disadvantages of static and dynamic routing.
b. Discuss the scalability, ease of configuration, and adaptability of each routing method.
CONCLUSION:
Summarize the key findings of the experiment, emphasizing the practical aspects of static
and dynamic routing. Discuss the scenarios where one approach might be more suitable than
the other based on the observations
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105
School of Engineering
Ajeenkya D Y Patil University, Pune
Pune, Maharashtra 412105