Computer Networks Lab Guide
Computer Networks Lab Guide
Laboratory Manuals
Subject: Computer Networks Subject Code: 3150710
Batch: 2023-2024 Semester: 5th
Faculty: Prof. S.H.Chavda
Branch: CE/IT
List of Experiments
Sr. No. Title Plan Date Actual Date
8 Configure DNS
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
We will begin building our network topology by selecting devices and the media in which to
connect them.
Several types of devices and network connections can be used. For this lab we will keep it
simple by using End Devices, Switches, Hubs, and Connections.
Single click on each group of devices and connections to display the various choices.
Step 3: Building the Topology – Adding Hosts Single click on the End Devices.
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
Move the cursor into topology area. You will notice it turns into a plus “+” sign. Single click
in the topology area and it copies the device.
Step 4: Building the Topology – Connecting the Hosts to Hubs and Switches.
Adding a Hub Select a hub, by clicking once on Hubs and once on a Generic hub.
GMIT
Bhavnagar
CN(3150710) L211
Laboratory Manuals 2901
1606
2
GMIT
Bhav
nagar
CN(3150710) L211
Laboratory Manuals 2901
1606
2
GMIT
Bhav
nagar
CN(3150710) L21129011606
Laboratory Manuals
2
Adding a Switch Select a switch, by clicking once on Switches and once on a 2950-24
switch.
Add the switch by moving the plus sign “+” below PC2 and PC3 and click once.
GMIT
Bhavnagar
CN(3150710) L21129011606
Laboratory Manuals
2
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
Before we can communicate between the hosts we need to configure IP Addresses and
Subnet Masks on the devices.
Click once on PC0.
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
Choose the Config tab . It is here that you can change the name of PC0. It is also here where
you would enter a Gateway IP Address, also known as the default gateway. We will discuss
this later, but this would be the IP address of the local router. If you want, you can enter the
IP Address 172.16.1.1, although it will not be used in this lab.
Click on FastEthernet. Although we have not yet discussed IP Addresses, add the IP
Address to 172.16.1.10. Click once in the Subnet Mask field to enter the default Subnet
Mask. You can leave this at 255.255.0.0. We will discuss this later.
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
Also, notice this is where you can change the Bandwidth (speed) and Duplex of the Ethernet
NIC (Network Interface Card). The default is Auto (autonegotiation), which means the NIC
will negotiate with the hub or switch. The bandwidth and/or duplex can be manually set by
removing the check from the Auto box and choosing the specific option.
Bandwidth - Auto
If the host is connected to a hub or switch port which can do 100 Mbps, then the Ethernet
NIC on the host will choose 100 Mbps (Fast Ethernet). Otherwise, if the hub or switch port
can only do 10 Mbps, then the Ethernet NIC on the host will choose 10 Mbps (Ethernet).
Duplex - Auto
Hub: If the host is connected to a hub, then the Ethernet NIC on the host will choose Half
Duplex.
Switch: If the host is connected to a switch, and the switch port is configured as Full Duplex
(or Autonegotiation), then the Ethernet NIC on the host will choose Full Duplex. If the switch
port is configured as Half Duplex, then the Ethernet NIC on the host will choose Half
Duplex. (Full Duplex is a much more efficient option.)
The information is automatically saved when entered.
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
Repeat these steps for the other hosts. Use the information below for IP Addresses and
Subnet Masks.
Host IP Address Subnet Mask
PC0 172.16.1.10 255.255.0.0
PC1 172.16.1.11 255.255.0.0
PC2 172.16.1.12 255.255.0.0
PC3 172.16.1.13 255.255.0.0
GMIT
Bhavnagar
CN(3150710) L211
Laboratory Manuals 2901
1606
2
GMIT
Bhav
nagar
CN(3150710) L211
Laboratory Manuals 2901
1606
2
GMIT
Bhav
nagar
CN(3150710) Laboratory Manuals L21129011606
2
Click once on Switch0 and choose FastEthernet0/4 (actual port does not matter).
The link light for switch port FastEthernet0/4 will begin as amber and eventually change to
green as the Spanning Tree Protocol transitions the port to forwarding.
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
Network Simulation
In this part, we are going to use the simulator to simulate traffic between hosts. For this
scenario, delete the switch and host PC3, then connect host PC2 to the hub.
Task 1 Observe the flow of data from PC0 to PC1 by creating network traffic.
a. Switch to Simulation Mode by selecting the tab that is partially hidden behind the
Real Time tab in the bottom right-hand corner. The tab has the icon of a stopwatch on
it.
NOTE: When Simulation Mode is chosen, a Simulation Panel will appear on the right side of
the screen. This panel can be moved by moving the cursor at the top of the panel until it
changes and then double-clicking on it. The panel can be restored to the original location by
double-clicking on the Title bar. If the panel is closed, click on the Event List button.
b. Click on Edit Filters, and then select All/None to deselect every filter. Then choose
ARP and ICMP and click in the workspace to close the Edit Filters window.
c. Select a Simple PDU by clicking the closed envelope in the Common Tools Bar on the
right.
Move to PC0 and click to establish the source. Move to PC1 and click to establish the
destination. Notice that two envelopes are now positioned beside PC0. This is referred to as a
data traffic scenario. One envelope is an ICMP packet, while the other is an ARP packet. The
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
Event List in the Simulation Panel will identify exactly which envelope represents ICMP and
which represents an ARP.
A scenario may be deleted by clicking on the Delete button in the Scenario panel.
Multiple scenarios can be created by clicking on the New button in the Scenario panel. The
scenarios can then be toggled between without deleting.
d. Select Auto Capture / Play from the Simulation Panel Play Controls.
Below the Auto Capture / Play button is a horizontal bar, with a vertical button that controls
the speed of the simulation. Dragging the button to the right will speed up the simulation,
while dragging is to the left will slow down the simulation.
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
Notice that the ARP envelope is no longer present. This has reset the simulation but has not
cleared any configuration changes or MAC / ARP table entries.
Notice that the ICMP envelope moved forward one device and stopped. The Capture /
Forward button will allow you to move the simulation one step at a time.
g. Choose the Power Cycle Devices button on the bottom left, above the device icons.
h. Choose yes
Notice that both the ICMP and ARP envelopes are now present. The Power Cycle Devices
will clear any configuration changes not saved and clear the MAC / ARP tables.
a. Choose the Auto Capture / Play button and allow the simulation to run completely.
b. Click on PC-0 and select the Desktop tab.
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
c. Select the Command Prompt and type the command arp -a.
d. Notice that the MAC address for PC2 is in the ARP table (to view the MAC address
of PC2, click on PC2 and select the Config tab).
e. To examine the ARP tables for PC1 and PC2in another way, click on the Inspect
Tool.
Then click on PC1 and the ARP table will appear in a new window.
Note that PC2 does not have an entry in the ARP table yet. Close the ARP Table
window. f. Click on PC2 to view the ARP table. Then close the ARP Table
window.
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
c. Move the cursor to the Logical Workspace and click on the desired location.
NOTE: If multiple instances of the same device are needed press and hold the Ctrl button,
click on the desired device, and then release the Ctrl button. A copy of the device will be
created and can now be move to the desired location.
d. Click on the router to bring up the Configuration Window. This window has three
modes.
The Physical mode is used to add modules to a device, such as a WAN Interface Card (WIC).
The Config mode is used for basic configuration. Commands are entered in a simple GUI
format, with actual equivalent IOS commands shown in the lower part of the window. The
CLI mode allows for advanced configuration of the device. This mode requires the user to
enter the actual IOS commands just as they would on a live device.
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
e. In the Physical mode, click on the router power switch to turn the device off.
f. Select the WIC-2T module and drag it to Slot 0 on the router. Then drag a WIC Cover
to Slot1.
NOTE: The Smart Connection can be used to automatically select the appropriate cable type.
However, the user will have no choice as to which interface the connection is assigned to; it
will take the first available appropriate interface.
i. Click on the hub and choose Port 3. Then click on the router and choose interface
FastEthernet 0/0.
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
a. Click on the Config mode tab of Router0 to begin configuring the device.
b. After the device has finished booting, change the display name of the router to
CISCO_1. Changing the display name does not affect the configuration.
NOTE: If the device hangs up in the booting process, save the activity. Then close the
application and reopen the file.
c. Click in the Hostname field and type CISCO_1, then press the TAB key. Note the
equivalent IOS command is entered in the lower portion of the window.
d. Click on interface FastEthernet 0/0 and assign the IP address 192.168.1.1, then press
the TAB key. Enter the subnet mask 255.255.255.0.
Task 5 Create a copy of the existing router complete with WIC modules already in place
a. Make sure that the existing router is selected (it will be grayed out).
b. In the Main Tool Bar click on the Copy tool.
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
c. Click on the Paste tool and the copied device will appear in the work area.
f. Click on the CISCO_1 router and connect to the Serial 0/0/0 interface.
g. Click on the new router (copy CISCO_1) and connect to the Serial 0/0/0 interface.
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
b. Select a Simple PDU and click on PC-A as the source, then click on Cisco_2 as the
destination. The ping should be successful.
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
1. Bus Topology
In Ring Topology, all the nodes are connected to each-other in such a way that they make a
closed loop. Each workstation is connected to two other components on either side, and it
communicates with these two adjacent
neighbours. Data travels around the
network, in one direction. Sending and
receiving of data takes place by the help of
TOKEN.
Token Passing (in brief) : Token contains a
piece of information which along with data
is sent by the source computer. This token
then passes to next node, which checks if
the signal is intended to it. If yes, it receives
it and passes the empty to into the network,
otherwise passes token along with the data
to next node. This process continues until
the signal reaches its intended destination.
The nodes with token are the ones only
allowed to send data. Other nodes have to wait for an empty token to reach them. This network
is usually found in offices, schools and small buildings.
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
Advantages:
This type of network topology is very organized. Each node gets to send the data
when it receives an empty token. This helps to reduces chances of collision. Also in
ring topology all the traffic flows in only one direction at very high speed.
Even when the load on the network increases, its performance is better than that of
Bus topology.
There is no need for network server to control the connectivity between workstations.
Additional components do not affect the performance of network.
Each computer has equal access to resources.
Disadvantages:
Each packet of data must pass through all the computers between source and
destination. This makes it slower than Star topology.
If one workstation or port goes down, the entire network gets affected.
Network is highly dependent on the wire which connects different components.
MAU’s and network cards are expensive as compared to Ethernet cards and hubs.
1. Star Topology
Advantages
As compared to Bus topology it gives far much better performance, signals don’t
necessarily get transmitted to all the workstations. A sent signal reaches the intended
destination after passing through no more than 3-4 devices and 2-3 links. Performance
of the network is dependent on the capacity of central hub.
Easy to connect new nodes or devices. In star topology new nodes can be added easily
without affecting rest of the network. Similarly components can also be removed
easily.
Centralized management. It helps in monitoring the network.
Failure of one node or link doesn’t affect the rest of network. At the same time it’s
easy to detect the failure and troubleshoot it.
Disadvantages
Too much dependency on central device has its own drawbacks. If it fails whole
network goes down.
The use of hub, a router or a switch as central device increases the overall cost of the
network.
Performance and as well number of nodes which can be added in such topology is
depended on capacity of central device.
2. Mesh Topology
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
In a mesh network topology, each of the network node, computer and other devices, are
interconnected with one another. Every node not only sends its own signals but also relays
data from other nodes. In fact a true mesh topology is the one where every node is connected
to every other node in the network. This type of topology is very expensive as there are many
redundant connections, thus it is not mostly used in computer networks. It is commonly used
in wireless networks. Flooding or routing technique is used in mesh topology.
Advantages
Data can be transmitted from different devices simultaneously. This topology can
withstand high traffic.
Even if one of the components fails there is always an alternative present. So data
transfer doesn’t get affected.
Expansion and modification in topology can be done without disrupting other nodes.
Disadvantages
There are high chances of redundancy in many of the network connections.
Overall cost of this network is way too high as compared to other network topologies.
Set-up and maintenance of this topology is very difficult. Even administration of the
network is tough.
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
1. Hub: - A hub is basically a multiport repeater. A hub connects multiple wires coming from
different branches, for example, the connector in star topology which connects different
stations. Hubs cannot filter data, so data packets are sent to all connected devices. In other
words, collision domain of all hosts
connected through Hub remains
one. Also, they do not have
intelligence to find out best path
for data packets which leads to
inefficiencies and wastage.
2. Switch: - A switch is a multi port
bridge with a buffer and a design
that can boost its efficiency (large
number of ports imply less
traffic) and performance. Switch
is data link layer device. Switch
can perform error checking before
forwarding data, that makes it
very efficient as it does not
forward packets that have errors
and forward good packets
selectively to correct port only. In
other words, switch divides collision domain of hosts, but broadcast domain remains same.
3. Bridge: - A bridge operates at data link layer. A bridge is a repeater, with add on
functionality of filtering content by reading the MAC addresses of source and destination.
It is also used for interconnecting two LANs working on the same protocol. It has a single
input and single output port, thus making it a 2 port device.
4. Router: - A router is a device like a switch that routes data packets based on their IP
addresses. Router is mainly a Network Layer device. Routers normally connect LANs and
WANs together and have a
dynamically updating routing table
based on which they make decisions on
routing the data packets. Router divide
broadcast domains of hosts connected
through it.
computers. In order to transfer files between computers, you had to use a portable
storage medium such as a floppy disk; however, in modern-day computers,
connecting to a network is essential. For example, you need to connect to use e-mail,
access information on the Internet, and share documents within a corporate network.
A computer uses a network interface card (NIC) to become part of a network. The
NIC contains the electronic circuitry required to communicate using a wired
connection (e.g., Ethernet) or a wireless connection (e.g., Wi-Fi). A network interface
card is also known as a network interface controller, network adapter, or Local Area
Network (LAN) adapter. Early NICs typically consisted of an expansion card
connected to a computer's motherboard.
2. Repeater: A repeater operates at the physical layer. Its job is to regenerate the signal
over the same network before the signal becomes too weak or corrupted so as to
extend the length to which the signal can be transmitted over the same network. An
important point to be noted about repeaters is that they do no amplify the signal.
When the signal becomes weak, they copy the signal bit by bit and regenerate it at the
original strength. It is a 2 port device.
3. Gateway: A computer that controls the traffic of your LAN or your ISP receives is a
Gateway. A server serves as a Gateway, the gateway also works as a firewall and a
proxy server. A Gateway is a device such as a mini or microcomputer capable of
operating on a standalone basis but which also provides connection for
communication with the other computers and access to shared resources. Normally a
gateway is associated with a router. A router is a device that lets you know the next
network data should be sent to next. A router can be connected to more than one
network at a time. A gateway is associated with a router because a router which uses
headers and forwarding tables to figure out where packets or data is sent provides the
path through which information is sent in and out a gateway.
Cable is the medium through which information usually moves from one network device to
another. There are several types of cable which are commonly used with LANs. In some
cases, a network will utilize only one type of cable, other networks will use a variety of cable
types. The type of cable chosen for a network is related to the network's topology, protocol,
and size. Understanding the characteristics of different types of cable and how they relate to
other aspects of a network is necessary for the development of a successful network.
The following sections discuss the types of cables used in networks and other related topics.
1. Unshielded Twisted Pair (UTP) Cable: - Twisted pair cabling comes in two varieties:
shielded and unshielded. Unshielded twisted pair (UTP) is the most popular and is generally
the best option for school networks (See fig. 1).
The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The
cable has four pairs of wires inside the jacket. Each pair is twisted with a different number of
twists per inch to help eliminate interference from adjacent pairs and other electrical devices.
The tighter the twisting, the higher the supported transmission rate and the greater the cost
per foot. The EIA/TIA (Electronic Industry Association/Telecommunication Industry
Association) has established standards of UTP and rated six categories of wire (additional
categories are emerging).
2. Unshielded Twisted Pair Connector: - The standard connector for unshielded twisted
pair cabling is an RJ-45 connector. This is a plastic connector that looks like a large
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
telephone-style connector (See fig. 2). A slot allows the RJ-45 to be inserted only one way.
RJ stands for Registered Jack, implying that the connector follows a standard borrowed from
the telephone industry. This standard designates which wire goes with each pin inside the
connector.
Fig.2.RJ-45 connector
1. Shielded Twisted Pair (STP) Cable: - Although UTP cable is the least expensive
cable, it may be susceptible to radio and electrical frequency interference (it should not
be too close to electric motors, fluorescent lights, etc.). If you must place cable in
environments with lots of potential interference, or if you must place cable in extremely
sensitive environments that may be susceptible to the electrical current in the UTP,
shielded twisted pair may be the solution. Shielded cables can also help to extend the
maximum distance of the cables.
3.Coaxial Cable
Coaxial cabling has a single copper conductor at its center. A plastic layer provides insulation
between the center conductor and a braided metal shield (See fig. 3). The metal shield helps
to block any outside interference from fluorescent lights, motors, and other computers.
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
Thick coaxial cable is also referred to as thick net. 10Base5 refers to the specifications for
thick coaxial cable carrying Ethernet signals. The 5 refers to the maximum segment length
being 500 meters. Thick coaxial cable has an extra protective plastic cover that helps keep
moisture away from the centre conductor. This makes thick coaxial a great choice when
running longer lengths in a linear bus network. One disadvantage of thick coaxial is that it
does not bend easily and is difficult to install.
4.Coaxial Cable Connectors :- The most common type of connector used with coaxial
cables is the Bayone-Neill-Concelman (BNC) connector (See fig. 4). Different types of
adapters are available for BNC connectors, including a T-connector, barrel connector, and
terminator. Connectors on the cable are the weakest points in any network. To help avoid
problems with your network, always use the BNC connectors that crimp, rather screw, onto
the cable.
5.Fibre Optic Cable: - Fibre optic cabling consists of a centre glass core surrounded by
several layers of protective materials (See fig. 5). It transmits light rather than electronic
signals eliminating the problem of electrical interference. This makes it ideal for certain
environments that contain a large amount of electrical interference. It has also made it the
standard for connecting networks between buildings, due to its immunity to the effects of
moisture and lighting. Fibre optic cable has the ability to transmit signals over much longer
distances than coaxial and twisted pair. It also has the capability to carry information at vastly
greater speeds. This capacity broadens communication possibilities to include services such
as video conferencing and interactive services. The cost of fiber optic cabling is comparable
to copper cabling; however, it is more difficult to install and modify. 10BaseF refers to the
specifications for fibre optic cable carrying Ethernet signals.
The centre core of fibre cables is made from glass or plastic fibre (see fig 5). A plastic
coating then cushions the fibre centre, and Kevlar fibre help to strengthen the cables and
prevent breakage. The outer insulating jacket made of teflon or PVC.
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
There are two common types of fibre cables -- single mode and multimode. Multimode cable
has a larger diameter; however, both cables provide high bandwidth at high speeds. Single
mode can provide more distance, but it is more expensive.
It is sometimes useful to know the network commands to analyze or configure your TCP/IP
networks
Here is the list of commands that can be used in the command prompt:
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
This command is also useful to generate network load by specifying the size of the packet
with the -l option and the packet size in bytes.
Tracert: - Displays all intermediate IP addresses through which a packet passes through,
between the local machine and the specified IP address.
This command is useful if the ping command does return any data, to determine at what level
the connection failed.
ipconfig /all [/release [adapter]] [/renew [adapter]] /flushdns /displaydns /registerdns [-a] [-a] [-a]
This command, when executed with no options, displays the current IP address, the subnet
mask and default gateway (network interfaces of the local machine)
/all: Displays all network configuration, including DNS, WINS, DHCP servers, etc ...
/renew [adapter]: Renews DHCP configuration for all adapters (if adapter is not specified)
or a specific adapter indicated by the [adapter] parameter.
/release [adapter]: Sends a DHCPRELEASE message to the DHCP server to release the
current DHCP configuration and cancel the IP address configuration for all adapters (if
adapter is not specified) or a specific adapter indicated by the [adapter] parameter. This
parameter disables TCP/IP for network cards configured to automatically obtain an IP
address.
/flushdns: Empty and reset the DNS client resolver cache. This option is useful to exclude
negative entries and all other entries added dynamically to the cache.
/displaydns: Displays the DNS client resolver cache, which includes entries preloaded
from the local host file and any recently obtained records for name queries resolved by the
host computer. The DNS Client service uses this information to quickly resolve frequently
queried names, before querying the configured DNS servers.
/registerdns: Refreshes all DHCP leases and re-registers DNS names.
NetStat: - Displays the status of the TCP/IP stack on the local machine
-a Displays all connections and listening ports (server-side connections are normally
inhibited).
-e Displays Ethernet statistics. Can be combined with the -s option.
-n Displays addresses and port numbers in numerical form.
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
-p proto Shows connections for the protocol specified by proto, proto may be TCP or
UDP. Used with the -s option to display per-protocol statistics, proto may be TCP, UDP
or IP.
-r Displays the contents of the routing table.
-s Displays statistics by protocol. By default, statistics on TCP, UDP and IP are displayed,
the -p option can be used to specify a subset.
interval: Re-display the selected statistics, pausing after a specific "interval" (in seconds)
between each display. Press Ctrl + C to stop displaying statistics.
-abnov Displays processes using the internet connection (local IP address, port, remote IP
adress and the PID of the process that uses the connection as well as its name).
-f Clears the routing tables of all gateway entries. Used in conjunction with one of the
below "commands", the tables are cleared before executing the command.
-p Makes the entry into the table, residual (after reboot).
Specify one of four commands:
DELETE: Deletes a route.
PRINT: Displays a route.
ADD: Adds a route.
CHANGE: Modifies an existing route.
destination: Specifies the host.
MASK: If the MASK keyword is present, the next parameter is interpreted as the network
mask parameter.
netmask: Provided, it specifies the value of the subnet mask to be associated with this
route entry. Unspecified, it takes the default value of 255.255.255.255.
Gateway: Specifies the gateway.
METRIC: Specifies the cost metric for the destination
Arp: - Resolving IP addresses to MAC addresses. Displays and modifies the translation
tables of IP addresses to physical addresses used by the ARP address resolution protocol.
-a Displays active ARP entries by interrogating the current data protocol. If adr_inet is
specified, only the physical and IP addresses of the specified computer are displayed. If
more than one network interface uses ARP, entries for each ARP table are displayed.
-g is the same as -a
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
Nbtstat: - Update cache of the LMHOSTS file. Displays protocol statistics and current
TCP/IP connections using NBT (NetBIOS over TCP/IP).
NBTSTAT [-a Remote Name] [-A IP address] [-c] [-n] [-r] [-R] [-s] [S] [interval]
-a (adapter status) display the table (names) of the remote machine (known name).
-A (adapter status) display the table (names) of the remote machine (IP address).
-c (cache) display the remote name cache including the IP addresses.
-n (names) Lists local NetBIOS names.
-r (resolved) Lists names resolved by broadcast and via WINS.
-R (Reload) Clear and reload the table cache with the remote names.
-S (Sessions) Lists the sessions table with the destination IP addresses.
-s (sessions) Lists the sessions table with the destination IP addresses converted to host names
via the hosts file.
Example : nbtstat -A @IP
This command returns the NetBIOS name, system name, users connected ... to the remote
machine.
Telnet: -
telnet <IP or host>
The telnet command to access to a remote host in Terminal mode (passive screen) . It also
allows you to check if any TCP service is running on a remote server by specifying the IP
address after the TCP port number. Thus we can test whether the SMTP Service is running on
a Microsoft Exchange server, using the IP address of the SMTP connector, and then 25 as the
port number. The most common ports are:
ftp (21),
telnet (23),
smtp (25),
www (80),
kerberos (88),
pop3 (110),
nntp (119)
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
Ftp :-
Client to upload files
ftp -s:<file>
-s This option allows you to run FTP in batch mode: Specifies a text file containing FTP
commands.
DNS is a globally distributed, scalable, hierarchical, and dynamic database that provides a
mapping between hostnames, IP addresses (both IPv4 and IPv6), text records, mail exchange
information (MX records), name server information (NS records), and security key
information defined in Resource Records (RRs). The information defined in RRs is grouped
into zones and maintained locally on a DNS server so it can be retrieved
globally through the distributed DNS architecture. DNS can use either the User Datagram
Protocol (UDP) or Transmission Control Protocol (TCP) and historically uses a destination
port of 53. When the DNS protocol uses UDP as the transport, it has the ability to deal with
UDP retransmission and sequencing.
DNS is composed of a hierarchical domain name space that contains a tree-like data structure
of linked domain names (nodes). Domain name space uses Resource Records (RRs) that may
or may not exist to store information about the domain. The tree-like data structure for the
domain name space starts at the root zone ".", which is the top most level of the DNS
hierarchy. Although it is not typically displayed in user applications, the DNS root is
represented as a trailing dot in a fully qualified domain name (FQDN). For example, the
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
right-most dot in "www.cisco.com." represents the root zone. From the root zone, the DNS
hierarchy is then split into sub-domain (branches) zones.
Each domain name is composed of one or more labels. Labels are separated with "." and may
contain a maximum of 63 characters. A FQDN may contain a maximum of 255 characters,
including the ".". Labels are constructed from right to left, where the label at the far right is
the top level domain (TLD) for the domain name.
Resolver: A DNS client that sends DNS messages to obtain information about the requested
domain name space.
Recursion: The action taken when a DNS server is asked to query on behalf of a DNS
resolver.
Authoritative Server: A DNS server that responds to query messages with information stored
in RRs for a domain name space stored on the server.
Recursive Resolver: A DNS server that recursively queries for the information asked in the
DNS query.
FQDN: A Fully Qualified Domain Name is the absolute name of a device within the
distributed DNS database.
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
RR: A Resource Record is a format used in DNS messages that is composed of the following
fields: NAME, TYPE, CLASS, TTL, RDLENGTH, and RDATA.
Zone: A database that contains information about the domain name space stored on an
authoritative server.
If the DNS server is only configured as an authoritative server and it receives a DNS
query message asking about information which the server is authoritative, it will
cause the server to inspect locally stored RR information and return the value of the
record in the 'Answer Section' of a DNS response message. If the requested
information for the DNS query message does not exist, the DNS server will respond
with a NXDOMAIN (Non-Existent Domain) DNS response message or a DNS
Referral Response message.
If the DNS server is authoritative, not configured as a recursive resolver, and it
receives a DNS query message asking about information which the server is not
authoritative, it will cause the server to issue a DNS response message containing
RRs in the 'Authority Section' and the address mapping for the FQDN from that
section may be present in the 'Additional Section'. This informs the DNS resolver
where to send queries in order to obtain authoritative information for the question in
the DNS query. This is also known as a DNS Referral Response message.
If the DNS server is not authoritative but is configured as a recursive resolver and it
receives a DNS query asking about information, it will cause the server to recursively
query (iterative queries) the DNS architecture for the authoritative DNS server of the
information included in the DNS request. Once the recursive DNS resolver has
obtained this information, it will provide that information to the original DNS
resolver using a DNS response message and the RR will be non-authoritative (since
the recursive DNS resolver is not authoritative for the requested information). The
recursive DNS resolver may also have knowledge about the requested information
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
stored in DNS cache. If the requested information is present in the DNS cache, then
the recursive DNS resolver will respond with that RR information.
The following steps provide information on how to disable recursion for the DNS Server
service using the Windows User Interface (UI).
DnsCmd: This is the name of the tool used from the CLI to perform administrative
tasks for the DNS Server service.
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
/Config: Specifies that the argument for the DnsCmd command applies to the
configuration of the DNS Server service.
/NoRecursion: Specifies that an argument of 1 or 0 will follow to disable or enable
recursion for the DNS Server service.
{1|0} This is the name of the tool used from the CLI to perform administrative tasks
for the DNS Server service.
Using either of the previous configuration examples for the DNS Server service will disable
recursion for all resolvers sending recursive DNS queries to the server. If recursion is
disabled, operators will not be able to use DNS forwarders on that server. Microsoft provides
additional information operators can use to harden the configuration of the DNS Server
service. More information is available in the Securing the DNS Server service or Security
Information for DNS documentation.
Microsoft Windows also provides a feature called DNS Server Secure Cache Against
Pollution that ignores the RRs in DNS response messages received from a non-authoritative
server. Note that this feature is enabled by default on Windows 2000 Service Pack 3 (SP3)
and Windows Server 2003, and that using this feature will also produce more queries sent
from the DNS server.
Install and Configure DNS Server in Linux: - BIND is the most common program used for
maintaining a name server on Linux.
Install Bind: -
Install the bind9 package using the appropriate package management utilities for your Linux
distributions.
On Debian/Ubuntu flavors, do the following:
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
Open Shortest Path First (OSPF) is a link-state routing protocol and. It computes the shortest
path tree for each route using a method based on Dijkstra algorithm, a shortest path first
algorithm. This interior gateway protocol (IGP) is most popular in large enterprise networks.
OSPF is used to determine the best route for delivering the packets within an IP networks. It
gathers link state information from available routers and constructs a topology map of the
network. The topology determines the routing table presented to the Internet Layer which
makes routing decisions based solely on the destination IP address found in IP packets. It
exhibits faster routing compared to RIP. OSPF detects changes in the topology, such as link
failures and converges on a new loop-free routing structure within seconds. Each OSPF router
stores the local network connection state with Link State Advertisement (LSA) and advertises
to the entire AS. LSA is a packet that contains all relevant information regarding a router's
links and the state of those links. Each router receives the LSA generated by all routers within
GMIT
Bhavnagar
CN(3150710) Laboratory Manuals L21129011606
2
the AS. The LSA collection then forms Link State Database (LSDB). Each LSA is the
description of the surrounding network topology of a router. Hence, the LSDB reflects the AS
network topology. Based on the link-state database, each router or system calculates a shortest-
path spanning tree, with itself as the root, using the SPF algorithm. OSPF has five different
packet types. Each packet has a specific purpose in OSPF route.
1. Hello packet.
2. Database description.
3. Link state request packet.
4. Link state update.
5. Link state acknowledgment packet.
Procedure:
GMIT
Bhavnagar