Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
235 views68 pages

DCCN (Lab Manual)

This experiment demonstrates how to configure VLANs using Packet Tracer. VLANs logically separate devices into different broadcast domains even if they are connected to the same physical switch. The lab instructions guide the student to create VLANs, assign ports, and test connectivity between VLANs on a simulated network using Packet Tracer.

Uploaded by

Usman Mani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
235 views68 pages

DCCN (Lab Manual)

This experiment demonstrates how to configure VLANs using Packet Tracer. VLANs logically separate devices into different broadcast domains even if they are connected to the same physical switch. The lab instructions guide the student to create VLANs, assign ports, and test connectivity between VLANs on a simulated network using Packet Tracer.

Uploaded by

Usman Mani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 68

C&T Department Data Communication & Computer Networks

Lab Manual
For The Course
Data Communication and Computer Networks

For

Department of Computing & Technology

IQRA University Islamabad Campus (Chak Shahzad)

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

LIST OF EXPERIMENTS

S.NO. TITLE OF EXPERIMENT


01 Introduction to Packet Tracer
Analyze Router and switches administrative functions using packet
02
tracer
03 Implement VLAN configuration
04 Analyze Static routing configuration
05 Analyze Default routing configuration
06 Implement RIP configuration
07 Implement EIGRP configuration
08 Implement OSPF configuration
09 Analyze Telnet configuration
10 Analyze DHCP Configuration
11 Analyze DNS Configuration
12 Implement TV Transmission
13 Analyze Redistribution
14 Analyze VOIP using packet tracer
15 Implement Access list configuration (ACL)
16 Analyze HTTP server using packet tracer

Experiment No: 1 Date:


IQRA University Islamabad Campus (Chak Shahzad)
C&T Department Data Communication & Computer Networks

Introduction to Packet Tracer


Objective:
The objective of this lab is to create an understanding of the basic Packet Tracer commands and
familiarize the students with Packet Tracer environment.

What is packet tracer?


Packet Tracer is a powerful network simulator that can be utilized in training for CCNA and
CCNP certification exam by allowing students to create networks with an almost unlimited
number of devices and to experience troubleshooting without having to buy real Cisco routers or
switches. The tool is created by Cisco Systems. The purpose of Packet Tracer is to offer students
a tool to learn the principles of networking as well as develop Cisco technology specific skills.
However, it is not be used as a replacement for Routers or Switches.

Here how it looks like after we start it.

We are different modules and panels available in the packet tracer. Some important modules,
which are important to understand for the working in Packet Tracer, are mentioned in the
following diagram.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Now, in order to create a topology, we will have to select some of the devices and put them in
our main window i.e. the white portion of packet tracer. And here how it looks after we add the
devices.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

And after you successfully create the topology, you can check either the traffic is flowing or not
by selecting the packet from right panel and putting it on both PCs as follows.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Experiment No: 2 Date:

Analyze Router and switches administrative functions using packet tracer


Objective:
The objective of this lab is to create an understanding of the Router and Switches administrative
functions using Packet Tracer.

Introduction:
A new switch just purchased from Cisco contains no default configuration in it. You need to
configure the switch with setup mode using the setup mode or from scratch using the command
line interface (CLI) before connecting it in your network environment. As a Cisco certified
technician, it is very important to know the basic Cisco switch configuration commands to
improve the performances and the security of your internetwork.

Lab instructions:
This lab will test your ability to configure basic settings such as hostname, motd banner,
encrypted passwords, and terminal options on a Packet Tracer 7.1 simulated Cisco Catalyst
switch.

Network diagram:

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Experiment No: 3 Date:


Implement VLAN configuration using packet tracer
Objective:
The objective of this lab is to create an understanding of the VLAN (Virtual Lane Access
Network) using Packet Tracer.

Theory:
VLAN or Virtual Local Area Network is a phenomenon which is used to logically separate or
combine a network. It is used to configure one or more devices, so that they can communicate, as
if they were attached to the same wire, when in fact they are located on a number of different
LAN segments. Because VLANs are based on logical instead of physical connections, they are
extremely flexible.
What is VLAN?
VLAN is a concept of partitioning of a physical network, so that distinct broadcast domains are
created. This is usually achieved on switch or router devices. Simpler devices only support
partitioning on a port level, so sharing VLANs across devices requires running dedicated cabling
for each VLAN.
Grouping hosts with a common set of requirements regardless of their physical location by
VLAN can greatly simplify network design. A VLAN has the same attributes as a physical local
area network (LAN), but it allows for end stations to be grouped together more easily even if
they are not on the same network switch. Without VLANs, a switch considers all interfaces on
the switch to be in the same broadcast domain. To physically replicate the functions of a VLAN
would require a separate, parallel collection of network cables and equipment separate from the
primary network.

How VLAN's work

When a LAN bridge receives data from a workstation, it tags the data with a VLAN identifier
indicating the VLAN from which the data came. This is called explicit tagging. It is also possible
to determine to which VLAN the data received belongs using implicit tagging. In implicit
tagging the data is not tagged, but the VLAN from which the data came is determined based on
other information like the port on which the data arrived. Tagging can be based on the port from
which it came, the source Media Access Control (MAC) field, the source network address, or
some other field or combination of fields. VLAN's are classified based on the method used. To
be able to do the tagging of data using any of the methods, the bridge would have to keep an
updated database containing a mapping between VLAN's and whichever field is used for
tagging. For example, if tagging is by port, the database should indicate which ports belong to
which VLAN. This database is called a filtering database. Bridges would have to be able to
maintain this database and also to make sure that all the bridges on the LAN have the same
information in each of their databases. The bridge determines where the data is to go next based
on normal LAN operations. Once the bridge determines where the data is to go, it now needs to
determine whether the VLAN identifier should be added to the data and sent. If the data is to go
to a device that knows about VLAN implementation (VLAN-aware), the VLAN identifier is

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

added to the data. If it is to go to a device that has no knowledge of VLAN implementation


(VLAN-unaware), the bridge sends the data without the VLAN identifier.

Physical topology independence

VLANs provide independence from the physical topology of the network by allowing physically
diverse workgroups to be logically connected within a single broadcast domain. If the physical
infrastructure is already in place, it now becomes a simple matter to add ports in new locations to
existing VLANs if a department expands or relocates. These assignments can take place in
advance of the move, and it is then a simple matter to move devices with their existing
configurations from one location to another. The old ports can then be "decommissioned" for
future use, or reused by the department for new users on the VLAN.

Performance

In networks where traffic consists of a high percentage of broadcasts and multicasts, VLAN's
can reduce the need to send such traffic to unnecessary destinations. For example, in a
broadcast domain consisting of 10 users, if the broadcast traffic is intended only for 5 of the
users, then placing those 5 users on a separate VLAN can reduce traffic. Compared to
switches, routers require more processing of incoming traffic. As the volume of traffic
passing through the routers increases, so does the latency in the routers, which results in
reduced performance. The use of VLAN's reduces the number of routers needed, since
VLAN's create broadcast domains using switches instead of routers. Switched networks by
nature will increase performance over shared media devices in use today, primarily by
reducing the size of collision domains. Grouping users into logical networks will also increase
performance by limiting broadcast traffic to users performing similar functions or within
individual workgroups. Additionally, less traffic will need to be routed, and the latency added
by routers will be reduced

Formation of Virtual Workgroups


Nowadays, it is common to find cross-functional product development teams with members
from different departments such as marketing, sales, accounting, and research. These
workgroups are usually formed for a short period of time. During this period, communication
between members of the workgroup will be high. To contain broadcasts and multicasts within
the workgroup, a VLAN can be set up for them. With VLAN's it is easier to place members of
a workgroup together. Without VLAN's, the only way this would be possible is to physically
move all the members of the workgroup closer together.
Despite this saving, VLAN's add a layer of administrative complexity, since it now becomes
necessary to manage virtual workgroups.

Reduced Cost
VLAN's can be used to create broadcast domains which eliminate the need for expensive
routers.

Experiment No: 4 Date:


Analyze Static routing Configuration using packet tracer
IQRA University Islamabad Campus (Chak Shahzad)
C&T Department Data Communication & Computer Networks

Objective:
The objective of this lab is to create an understanding of the Static Routing using Packet Tracer.

Procedure:
How to configure a simple static routing in packet tracer using a simple topology with two
routers

Steps:
Step 1: First Create a topology like this

you will get a red light first this is configured topology

Step 2: Configure ip address to routers go to global configuration mode in R1 and R2 configure


connected interfaces
In Router 1
Interface Fastethernet0/0 in global configuration mode
R1(config)#interface fastethernet 0/0
R1(config-if)#ip address 10.0.0.1 255.0.0.0
R1(config-if)#no shutdown

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

R1(config-if)#exit
Interface Serial 2/0
R1(config)#interface serial 2/0
R1(config-if)#ip address 20.0.0.1 255.0.0.0
R1(config-if)#clock rate 64000
R1(config-if)#encapsulation ppp
R1(config-if)#no shutdown
R1(config-if)#exit
In Router 2
Interface Fastethernet 0/0
R2(config)#interface fastethernet 0/0
R2(config-if)#ip address 30.0.0.1 255.0.0.0
R2(config-if)#no shutdown
R2(config-if)#exit
Interface Serial 2/0
R2(config)#interface serial 2/0
R2(config-if)#ip address 20.0.0.2 255.0.0.0
R2(config-if)#encapsulation ppp
R2(config-if)#no shutdown
R2(config-if)#exit
Step 3 : Assign ip address for both Pc's with appropriate ip and subnet mask and default gateway
How ?
Step 4: Now configure both router with static route
By default, Routers Know only directed connected networks here Router 1 know only 10.0.0.0
and 20.0.0.0 it doesn't know the 30.0.0.0 like this R2 doesn't know about 10.0.0.0.So We are
going to add Static route to this both router

R1(config)#ip route Destination Network| Destination N/W SubnetMask |Next Hop Address

In Router R1,Just give this command,In this case Destination is 30.0.0.0 and its subnet mask is
255.0.0.0 next hop address is 20.0.0.2

R1(config)#ip route 30.0.0.0 255.0.0.0 20.0.0.2


In Router R2

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

R2(config)#ip route 10.0.0.0 255.0.0.0 20.0.0.1


That’s it!!..Now both routers know all networks, check by ping ip address of host

Step 5: Double click PC move to desktop then command prompt give the command ping
30.0.0.10 in PC 0 you will get reply from 30.0.0.10 like this

From PC1

Experiment No: 5 Date:


Analyze Default Routing Configuration using packet tracer

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Objective:
The objective of this lab is to create an understanding of the Dynamic Routing using Packet
Tracer.

Procedure:
How to configure a simple static routing in packet tracer using a simple topology with two
routers

Steps:
Step 1: First Create a topology like this

you will get a red light first this is configured topology

Step 2: Configure ip address to routers go to global configuration mode in R1 and R2 configure


connected interfaces
In Router 1
Interface Fastethernet0/0 in global configuration mode
R1(config)#interface fastethernet 0/0

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

R1(config-if)#ip address 10.0.0.1 255.0.0.0


R1(config-if)#no shutdown
R1(config-if)#exit
Interface Serial 2/0
R1(config)#interface serial 2/0
R1(config-if)#ip address 20.0.0.1 255.0.0.0
R1(config-if)#clock rate 64000
R1(config-if)#encapsulation ppp
R1(config-if)#no shutdown
R1(config-if)#exit
In Router 2
Interface Fastethernet 0/0
R2(config)#interface fastethernet 0/0
R2(config-if)#ip address 30.0.0.1 255.0.0.0
R2(config-if)#no shutdown
R2(config-if)#exit
Interface Serial 2/0
R2(config)#interface serial 2/0
R2(config-if)#ip address 20.0.0.2 255.0.0.0
R2(config-if)#encapsulation ppp
R2(config-if)#no shutdown
R2(config-if)#exit
Step 3 : Assign ip address for both Pc's with appropriate ip and subnet mask and default gateway
How ?
Step 4: Now configure both router with static route
By default, Routers Know only directed connected networks here Router 1 know only 10.0.0.0
and 20.0.0.0 it doesn't know the 30.0.0.0 like this R2 doesn't know about 10.0.0.0.So We are
going to add Static route to this both router

R1(config)#ip route Destination Network| Destination N/W SubnetMask |Next Hop Address

R1(config)#ip route 0.0.0.0 0.0.0.0 20.0.0.2

In Router R2

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

R2(config)#ip route 0.0.0.0 0.0.0.0 20.0.0.1

Experiment No: 6 Date:


Implement RIP Configuration using packet tracer

Objective:

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

The objective of this lab is to create an understanding of the RIP Configuration using Packet
Tracer.

Theory: Let’s apply RIP protocol on the following topology.

Now, we will follow the steps as mentioned in detail in the following article. I.e.
i. We will assign IP addresses to all the fast Ethernet and serial interfaces respectively.
ii We will change the state of the interfaces from down to UP.
Then, after we are done with the basic step. We will apply RIP protocol commands on both
routers.

Configuration of Router 0 i.e. configuring both serial and fast Ethernet interfaces.

Configurations of R1

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Assigning IP address to PC0

Assigning IP address to PC1

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

R1
In order to apply protocol RIP, we will write the following set of commands.
Router(config)# router rip
Router(config-router)# network 192.168.1.0
Router(config-router)# network 192.168.2.0
Router(config-router)# network 192.168.3.0
Router(config-router)#exit

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

R2:
In order to apply protocol RIP, we will write the following set of commands on R2 as well.
Router(config)# router rip
Router(config-router)# network 192.168.1.0
Router(config-router)# network 192.168.2.0
Router(config-router)# network 192.168.3.0
Router(config-router)#exit

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Experiment No: 7 Date:


Implement EIGRP Configuration using packet tracer
Objective:
The objective of this lab is to create an understanding of the EIGRP Configuration using Packet
Tracer.

Theory:
Now, we are going to apply EIGRP on the following topology.

Now, after successfully applying IP addresses like in this topology, we will apply following commands.
Router(config)#router eigrp 10
Router(config-router)#network 192.168.1.0
Router(config-router)#network 192.168.2.0
Router(config-router)#exit

Apply the above set of commands on both routers like this.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

And eigrp protocol has been applied on this topology. Notice the following command.
routereigrp 10
This number ‘10' is the process ID

Experiment No: 8 Date:


Implement OSPF Configuration using packet tracer
IQRA University Islamabad Campus (Chak Shahzad)
C&T Department Data Communication & Computer Networks

Objective:
The objective of this lab is to create an understanding of the OSPF (open shortest path first)
protocol using Packet Tracer.

Theory:
We are going to apply OSPF(open shortest path first) protocol on packet tracer. Let us take the
following simple topology.

Now, let us apply the ospf on it. Assign IP addresses and change the state of interfaces.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Similarly for the other router.

Assigning the IP addresses to PCs as follows.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Now, as we can see, interfaces are up but the communication is not enabled because we have not
applied the protocol yet.

Lets do it.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

On router 1.

After applying protocol successfully, the traffic is flowing. Couple of things worth discussing
i. you will have to provide area id and process id on ospf protocol.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

ii. You will have to provide wildcard mask on ospf.

Experiment No: 9 Date:


IQRA University Islamabad Campus (Chak Shahzad)
C&T Department Data Communication & Computer Networks

Analyze Telnet Configuration using packet tracer


Objective:
The objective of this lab is to create an understanding of the Telnet Configuration using Packet
Tracer.

Theory:
A terminal emulation program for TCP/IP networks such as the Internet. The Telnet program
runs on your computer and connects your PC to a server on the network. You can then enter
commands through the Telnet program and they will be executed as if you were entering them
directly on the server console. This enables you to control the server and communicate with other
servers on the network. To start a Telnet session, you must log in to a server by entering a valid
username and password. Telnet is a common way to remotely control Web servers. Telnet means
to establish a connection with the Telnet protocol, either with command line client or with a
programmatic interface.
SSH
Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote
shell services or command execution and other secure network services between two networked
computers that connects, via a secure channel over an insecure network, a server and a client
(running SSH server and SSH client programs, respectively). It was designed as a replacement
for Telnet and other insecure remote shell protocols such as the Berkeley rsh and rexec protocols,
which send information, notably passwords, in plaintext, rendering them susceptible to
interception and disclosure using packet analysis. The encryption used by SSH is intended to
provide confidentiality and integrity of data over an unsecured network, such as the Internet.

a network protocol that ensures a high-level encryption, allowing for the data transmitted over
insecure networks, such as the Internet, to be kept intact and integrate. SSH and SSH Telnet, in
particular, work for establishing a secure communication between two network-connected
computers as an alternative to remote shells, such as TELNET, that send sensitive information in
an insecure environment.

In contrast to other remote access protocols, such as FTP, SSH Telnet ensures higher level of
connection security between distant machines but at the same time represents a potential threat to
the server stability. Thus, SSH access is considered a special privilege by hosting providers and
is often assigned to users only per request.
Let us apply Telnet on packet tracer.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Take the topology as in the above diagram. Set IPs on the PCs. As, by default, all PCs are in vlan
1. We will create a virtual interface on switch with vlan 1 as follows.

Now, we can ping to switch by our hosts because hosts are in vlan 1 and switch also has a vlan 1
interface.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Now, try to telnet the switch from our PC, it refuses because we have not applied authentication
on the switch yet.

So, lets apply line authentication on the switch. The system supports 20 virtual tty (vty) lines for
Telnet, Secure Shell Server (SSH) and FTP services. Each Telnet, SSH, or FTP session requires
one vty line. You can add security to your system by configuring the software to validate login
requests.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Now, we can easily telnet. But it does not let us go in the switch enabled mode because we have
not set the password on the switch yet.

Lets apply password on the switch enabled mode.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Now, we can go inside Switch configuration mode from our pc.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Experiment No: 10 Date:


Analyze DHCP Configuration using packet tracer
Objective:
The objective of this lab is to create an understanding of the DHCP Configuration using Packet
Tracer.

Theory:
Let’s apply DHCP on packet tracer.
First, let us make a topology with one router on which we will apply DHCP and several client
PCs. More like this one,

Now, we will apply DHCP on the router.


The commands in sequence are as follows.

Experiment No: 11 Date:


IQRA University Islamabad Campus (Chak Shahzad)
C&T Department Data Communication & Computer Networks

Analyze DNS Configuration using packet tracer


Objective:
The objective of this lab is to create an understanding of the DNS Configuration using Packet
Tracer.

Theory:Here in this tutorial, we are going to set a dns (domain name system) server and a dhcp
server. And then from our PC we will use dns service.

Server 0 in the above topology is our dhcp server and Server 1 is our dns server.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Set up IP on server 0.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Set up DHCP on server 0.

Set up IP on server 1.

Now, go to PC and select DHCP.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Go to Web Browser and enter Server 0 ip address. You can access the website of the server.

Now, let us set DNS on server 1.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Now, again go to PC and in the web browser enter the name that you set in DNS.

Voila, we have done it. Now, in this tutorial, router is additional and we can use it if required, Set

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

the IP of the interface. Though i do not recommend to use this GUI panel for this.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Experiment No: 12 Date:


Implement TV Transmission using packet tracer
Objective:
The objective of this lab is to create an understanding of the TV(Television)Transmission
protocol using Packet Tracer.

Experiment No: 13 Date:


IQRA University Islamabad Campus (Chak Shahzad)
C&T Department Data Communication & Computer Networks

Analyze Redistribution using packet tracer


Objective:
The objective of this lab is to create an understanding of the Redistribution using Packet Tracer

Procedure:
Step 1: Initial Configurations
In the RIP and OSPF redistribution using packet tracer scenario we have two domains
called RIP Domain and OSPF Domain. Configure R1, R2 for RIP V2 and R3, R4, R5 for
OSPF1. (To implement redistribution on Router 2, we should configure it for RIP and OSPF)

Router 1 RIPV2

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

R1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#router rip
R1(config-router)#version 2
R1(config-router)#network 10.0.0.0
R1(config-router)#network 60.0.0.0
R1(config-router)#no auto-summary
R1(config-router)#exit
R1(config)#
R1#
%SYS-5-CONFIG_I: Configured from console by console
I decided to implement both RIP and OSPF in Router 2, since we will carry out redistribution
on R2.

Router 2 RIPV2
R2#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R2(config)#router rip
R2(config-router)#version 2
R2(config-router)#network 20.0.0.0
R2(config-router)#network 60.0.0.0
R2(config-router)#network 70.0.0.0
R2(config-router)#no auto-summary
R2(config-router)#exit
R2(config)#
R2#
%SYS-5-CONFIG_I: Configured from console by console
Router 2 OSPF1
R2#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R2(config)#router ospf 1
R2(config-router)#network 20.0.0.0 0.255.255.255 area 0
R2(config-router)#network 60.0.0.0 0.255.255.255 area 0
R2(config-router)#network 70.0.0.0 0.255.255.255 area 0
R2(config-router)#exit
R2(config)#
R2#
%SYS-5-CONFIG_I: Configured from console by console

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Router 3 OSPF1

R3#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R3(config)#router ospf 1
R3(config-router)#network 30.0.0.0 0.255.255.255 area 0
R3(config-router)#network 70.0.0.0 0.255.255.255 area 0
R3(config-router)#network 80.0.0.0 0.255.255.255 area 0
R3(config-router)#exit
R3(config)#
R2#
%SYS-5-CONFIG_I: Configured from console by console

Router 4 OSPF1

R4#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R4(config)#router ospf 1
R4(config-router)#network 40.0.0.0 0.255.255.255 area 0
R4(config-router)#network 80.0.0.0 0.255.255.255 area 0
R4(config-router)#network 90.0.0.0 0.255.255.255 area 0
R4(config-router)#exit
R4(config)#
R4#
%SYS-5-CONFIG_I: Configured from console by console

Router 5 OSPF1

R5#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R5(config)#router ospf 1
R5(config-router)#network 50.0.0.0 0.255.255.255 area 0
R5(config-router)#network 90.0.0.0 0.255.255.255 area 0
R5(config-router)#exit
R5(config)#
R5#
%SYS-5-CONFIG_I: Configured from console by console
Basic configurations are completed. Now let’s verify the routing tables of each router.

Step 2: Routing Table verification

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Once initial configurations are done, confirm the routing tables of all routers using #show
iproutecommand.

Router 1

Router 1 knows only RIP routes.

R1#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route

Gateway of last resort is not set

C 10.0.0.0/8 is directly connected, FastEthernet0/0


R 20.0.0.0/8 [120/1] via 60.0.0.2, 00:00:23, Serial0/2/0
R 30.0.0.0/8 [120/5] via 60.0.0.2, 00:00:23, Serial0/2/0
R 40.0.0.0/8 [120/5] via 60.0.0.2, 00:00:23, Serial0/2/0
R 50.0.0.0/8 [120/5] via 60.0.0.2, 00:00:23, Serial0/2/0
C 60.0.0.0/8 is directly connected, Serial0/2/0
R 70.0.0.0/8 [120/1] via 60.0.0.2, 00:00:23, Serial0/2/0
R 80.0.0.0/8 [120/5] via 60.0.0.2, 00:00:23, Serial0/2/0
R 90.0.0.0/8 [120/5] via 60.0.0.2, 00:00:23, Serial0/2/0

Router 2

Router 2 has knowledge about all networks since it is configured with RIP and OSPF. We may
notice the routes leaned by RIP (marked as ‘R‘) and OSPF (marked as ‘O‘) in the routing table
of Router 2.

R2#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area


* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route

Gateway of last resort is not set

R 10.0.0.0/8 [120/1] via 60.0.0.1, 00:00:23, Serial0/0/0


C 20.0.0.0/8 is directly connected, FastEthernet0/0
O 30.0.0.0/8 [110/65] via 70.0.0.2, 00:00:52, Serial0/2/0
O 40.0.0.0/8 [110/129] via 70.0.0.2, 00:00:52, Serial0/2/0
O 50.0.0.0/8 [110/193] via 70.0.0.2, 00:00:52, Serial0/2/0
C 60.0.0.0/8 is directly connected, Serial0/0/0
C 70.0.0.0/8 is directly connected, Serial0/2/0
O 80.0.0.0/8 [110/128] via 70.0.0.2, 00:00:52, Serial0/2/0
O 90.0.0.0/8 [110/192] via 70.0.0.2, 00:00:52, Serial0/2/0

Router 3

Router 3, 4 and 5 know EIGRP routes only. It doesn’t know anything about RIP Routes.

R3#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route

Gateway of last resort is not set

O E2 10.0.0.0/8 [110/5000] via 70.0.0.1, 00:01:33, Serial0/0/0


O 20.0.0.0/8 [110/65] via 70.0.0.1, 00:01:33, Serial0/0/0
C 30.0.0.0/8 is directly connected, FastEthernet0/0
O 40.0.0.0/8 [110/65] via 80.0.0.2, 00:01:33, Serial0/2/0
O 50.0.0.0/8 [110/129] via 80.0.0.2, 00:01:23, Serial0/2/0
O 60.0.0.0/8 [110/128] via 70.0.0.1, 00:01:33, Serial0/0/0
C 70.0.0.0/8 is directly connected, Serial0/0/0

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

C 80.0.0.0/8 is directly connected, Serial0/2/0


O 90.0.0.0/8 [110/128] via 80.0.0.2, 00:01:33, Serial0/2/0

Router 4

R4#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route

Gateway of last resort is not set

O E2 10.0.0.0/8 [110/5000] via 80.0.0.1, 00:01:54, Serial0/0/0


O 20.0.0.0/8 [110/129] via 80.0.0.1, 00:01:54, Serial0/0/0
O 30.0.0.0/8 [110/65] via 80.0.0.1, 00:01:54, Serial0/0/0
C 40.0.0.0/8 is directly connected, FastEthernet0/0
O 50.0.0.0/8 [110/65] via 90.0.0.2, 00:01:54, Serial0/2/0
O 60.0.0.0/8 [110/192] via 80.0.0.1, 00:01:54, Serial0/0/0
O 70.0.0.0/8 [110/128] via 80.0.0.1, 00:01:54, Serial0/0/0
C 80.0.0.0/8 is directly connected, Serial0/0/0
C 90.0.0.0/8 is directly connected, Serial0/2/0

Router 5

R5#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route

Gateway of last resort is not set

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

O E2 10.0.0.0/8 [110/5000] via 90.0.0.1, 00:02:13, Serial0/2/0


O 20.0.0.0/8 [110/193] via 90.0.0.1, 00:02:13, Serial0/2/0
O 30.0.0.0/8 [110/129] via 90.0.0.1, 00:02:13, Serial0/2/0
O 40.0.0.0/8 [110/65] via 90.0.0.1, 00:02:13, Serial0/2/0
C 50.0.0.0/8 is directly connected, FastEthernet0/0
O 60.0.0.0/8 [110/256] via 90.0.0.1, 00:02:13, Serial0/2/0
O 70.0.0.0/8 [110/192] via 90.0.0.1, 00:02:13, Serial0/2/0
O 80.0.0.0/8 [110/128] via 90.0.0.1, 00:02:13, Serial0/2/0
C 90.0.0.0/8 is directly connected, Serial0/2/0
***

Step 3: Redistribution between RIP and OSPF Protocols


Figure shows the configuration status of all routers in our example topology. Now let’s start RIP
OSPF redistribution example in R2.

Redistribute OSPF to RIP

Redistribute OSPF RIP command is #redistribute ospf metric


IQRA University Islamabad Campus (Chak Shahzad)
C&T Department Data Communication & Computer Networks

R2(config)#router rip
R2(config-router)#redistribute ospf 1 metric 5
R2(config-router)#exit
R2(config)#
R2#
Here we entered 5 as the metric (Hop count) for RIP

Redistribute RIP V2 to OSPF

Well, how redistribution RIP into OSPF is carried out? To inject RIP routes to OSPF routing
table we use redistribute RIP to OSPF command #redistribute rip metric subnets command.

R2(config)#router ospf 1
R2(config-router)#redistribute rip ?
metric Metric for redistributed routes
metric-type OSPF/IS-IS exterior metric type for redistributed routes
subnets Consider subnets for redistribution into OSPF
tag Set tag for routes redistributed into OSPF

R2(config-router)#redistribute rip metric ?


OSPF default metric
R2(config-router)#redistribute rip metric 5000 ?
metric-type OSPF/IS-IS exterior metric type for redistributed routes
subnets Consider subnets for redistribution into OSPF
tag Set tag for routes redistributed into OSPF

R2(config-router)#redistribute rip metric 5000 subnets


R2(config-router)#exit
Redistribution RIP to OSPF will updates the OSPF routing database from RIP database.
The subnets keyword after the redistribution metric lets you to compatible with VLSM.
The route marked as O E2 10.0.0.0 [110/5000] via 90.0.0.1 where O E2 means OSPF route
learned via RIP.

Experiment No: 14 Date:


Analyze VOIP Configuration using packet tracer
Objective:
IQRA University Islamabad Campus (Chak Shahzad)
C&T Department Data Communication & Computer Networks

The objective of this lab is to create an understanding of the VOIP (Voice over Internet Protocol)
using Packet Tracer.

Theory:
Voice over IP (VoIP, or voice over Internet Protocol) commonly refers to the communication
protocols, technologies, methodologies, and transmission techniques involved in the delivery of
voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the
Internet. Other terms commonly associated with VoIP are IP telephony,Internet telephony, voice
over broadband (VoBB), broadband telephony, IP communications, and broadband phone.
Internet telephony refers to communications services —voice, fax, SMS, and/or voice-messaging
applications— that are transported via the Internet, rather than the public switched telephone
network (PSTN). The steps involved in originating a VoIP telephone call are signaling and
media channel setup, digitization of the analog voice signal, encoding, packetization, and
transmission as Internet Protocol (IP) packets over a packet-switched network. On the receiving
side, similar steps (usually in the reverse order) such as reception of the IP packets, decoding of
the packets and digital-to-analog conversion reproduce the original voice stream. Even though IP
telephony and VoIP are used interchangeably, IP telephony refers to all use of IP protocols for
voice communication by digital telephony systems, while VoIP is one technology used by IP
telephony to transport phone calls
Let us apply it on packet tracer.

This IP Phone is displayed below. And when we try to go to any other mode its give us error and
ask us to switch it on first.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

For that, go to Physical mode and put the power adapter (in the bottom right corner) into the
phone as shown in figure.

Now, we have inserted the antenna into IP phone. Repeat it for other phones as well.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Now, we see that interface of IP phone is UP.

Now, go to router and assign IP address.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

We will have to set DHCP server on router to assign IP addresses to IP phones.

We will have to give an additional command for voip.


Router(dhcp-config)#option 150 ip 192.168.1.1

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Now, let us apply commands to the router for voip. You might have noticed we took 2811 series
router because it facilitates the following commands.

Continued.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Now, we will go to the switch and make the interfaces support voip as follows.

After that, we will have to assign phone number to our IP phone by applying following
commands.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Continued…

Now, we can see that in GUI mode of Phone, we have a phone number available.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

This means that we can call from one phone to the other. Lets do that.

And when we pick up the reciever, it says that we are connected :) .

Commands on Router for VOIP

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Router(config)#ipdhcp pool voice

Router(dhcp-config)#option 150 ip 192.168.1.1


Router(dhcp-config)#exit

Router(config)#telephony-service

Router(config-telephony)#max-dn 5

Router(config-telephony)#max-ephones 5

Router(config-telephony)#ip source-address 192.168.1.1 port 2000

Router(config-telephony)#auto assign 1 to 9
Router(config-telephony)#exit

Router(config)#ephone-dn 1
%LINK-3-UPDOWN: Interface ephone_dsp DN 1.1, changed state to up

Router(config-ephone-dn)#number 12345
Router(config-ephone-dn)#exit
%IPPHONE-6-REGISTER: ephone-1 IP:192.168.1.2 Socket:2 DeviceType:Phone has
registered.
Router(config)#ephone-dn 2

%LINK-3-UPDOWN: Interface ephone_dsp DN 2.1, changed state to up

Router(config-ephone-dn)#number 123
Router(config-ephone-dn)#exit
Router(config)#ephone-dn 3
%LINK-3-UPDOWN: Interface ephone_dsp DN 3.1, changed state to up

Router(config-ephone-dn)#number 11111
Router(config-ephone-dn)#exit
Commands on Switch for VOIP
Switch(config)#interface range fastEthernet 0/1 - fastEthernet 0/10
Switch(config-if-range)#switchport mode access

Switch(config-if-range)#switchport voice vlan 1

Experiment No: 15 Date:


Implement Access Control List (ACL) using packet tracer
IQRA University Islamabad Campus (Chak Shahzad)
C&T Department Data Communication & Computer Networks

Objective:
The objective of this lab is to create an understanding of the ACL(Access Control List) using
Packet Tracer

Procedure:
Let us apply ACL (Access Control List) on the topology. First, let us assign IP addresses and
change the state of the interfaces.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Here, the status is change as shown in the following diagram.

Then, we will have to assign IP addresses to the PCs.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

And the PC attach to the other interface. Please note the difference between default gateways.
We assign fast Ethernet interface address to default gateway.

Thus, after applying IP addresses. We see that Packet transfer is successful.

Let us apply ACL and permit and deny Hosts IP’s as we want. We are going to deny and permit
certain hosts as follows.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Let us apply ACL and permit and deny Hosts IP’s as we want.

Then, we will have to tell the interface that which ACL to follow. ACL is uniquely identified
with the number, in this case 1.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Now, you see that the denied will not be able to send the data while those who we permit can
send packet.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Similarly, in the bottom right corner you can see status.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Experiment No: 16 Date:


Analyze HTTP Server using packet tracer
Objective:
The objective of this lab is to create an understanding of the HTTP Server using Packet Tracer.

Theory:
In this lab, we use switches, DHCP server, DNS server, HTTP server and PC. Here I will tell you
about some basic concept of these components in detail.
1. Switch: – A network switch is a computer networking device that connects devices
together on the same network. In other words, we also say that the switch is a networking
device which connects a large number of systems on the same network. A switch is a
medium through which we send and receive the data packet from one system to another
in a same network. If you want to connect systems from the different networks in that
case switch is useless in that situation we use a router to connect systems from different
networks.

2. DHCP server: – The DHCP (dynamic host configuration protocol) is a standardized


network protocol which is used in internet protocol (IP) networks. DHCP is used to
assign IP automatically to the system with the help of a machine called DHCP server. A
DHCP server enables computers to request IP addresses and networking parameters
automatically. In the absence of a DHCP server, each computer on the network needs to
statically (manually) assigned to an IP address.

3. DNS server: – DNS (domain name server) is a server which is used to assign names to
an IP address. It allows you to connect to any website or network by simple names
instead of their IP address. It is really very hard to memorization of IP addresses of any
website and network so here DNS help us by converting the number into a name. Now
we just type only name instead of IP of any website and network to search it on the
internet.

4. HTTP server: – HTTP (Hypertext Transfer Protocol) is a medium which is used to make
communication in between client and server. The primary function of an HTTP server is
to store, process and deliver web pages to clients. Pages delivered are most frequently
HTML documents, which may include images, style sheet and scripts in addition to text
content.

Now we configure servers in Cisco packet tracer by using a lab in it.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Step 1: – First of all we go to the DHCP server and click on it to open it. Then a screen will be
open in it, we will click on the desktop option and then click on IP configuration to provide IP
address statically to the DHCP server and also give the IP address of the DNS server in the
column of DNS server. The figure is shown below

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Step 2: – After that now choose the service option in it to make that server as a DHCP server and
it is able to provide an IP address automatically to the other systems. In it, we fill all entries on
this server and choose ON option in it as given below to turn on DHCP server.

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Now your DHCP server is configured successfully. The work on DHCP server will be done
completely. Now this machine is able to provide IP addresses to other systems which are
connected to that network.
Step 3: – Now we configure DNS server by clicking on it. After clicking on the DNS server we
click on the desktop option and then click on IP configuration option to provide IP address to the
DNS server. In IP configuration option we change it from static to DHCP. Now it has taken IP
address automatically from the DHCP server. The figure is given below

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Step 4: – Now before making this machine a DNS server, we go to HTTP server and provide IP
address to it by using DHCP server similarly as DNS server and then after that click on services
option to make this machine as an HTTP server. In services, we choose HTTP from the left
sidebar and now there create a page or edit a page which you want to see in your web browser.

Learn how to configure static routing on 4 routers. Read this.

Step 5: – After that, we again, click on DNS server and then select DNS option from the right
sidebar in it and click on it to configure this machine as a DNS server. In it, we give the name
and IP address of the HTTP server and then click on add option in it to provide a name to IP
address of the HTTP server which helps us to open that web page by name instead of IP address
of the HTTP server and generally name will be easy to memorize by us. After that, we
choose ON option to start DNS server. The figure is shown below

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

Now all servers are configured by us and Now we move on PCs to provide IP address to them by
using a DHCP server. All set now.
After that, we will go to any PC on that network and then go to the web browser and we type the
name of our page google.com in it which is given in the DNS server by us to open it in our
system browser. The figure is shown below

IQRA University Islamabad Campus (Chak Shahzad)


C&T Department Data Communication & Computer Networks

And now outcome will appear in the form of our page which is made by us in HTTP server. It
indicates that all servers are working properly because the messages go to DNS server where it
directs it to the HTTP server and the webpage google.com loads from HTTP server to our
computer screen.

IQRA University Islamabad Campus (Chak Shahzad)

You might also like