Experiment-1 Aim: Study of Different Types of Networking Devices and Cable Connections. Practically Create The
Experiment-1 Aim: Study of Different Types of Networking Devices and Cable Connections. Practically Create The
Aim: Study of different types of Networking Devices and cable connections. Practically create the
cross-wired cable, straight through cable and roll over cable connection using crimping tool.
Materials Required:
● Cat5e/Cat6 Cable
● RJ45 Connectors
● Crimping Tool
● Cable Tester
Network devices work as a mediator between two devices for data transmission, and thus play a very
important role in the functioning of a computer network. Below are some common network devices
used in modern networks:
Modem
A Modem (Modulator-Demodulator) is a device that converts digital data from a computer into
analog signals for transmission over telephone lines and vice versa. It is essential for internet access
over DSL or cable networks.
Repeater
A Repeater is a network device used to regenerate and amplify weak signals in a network. It extends
the coverage area by ensuring data signals travel long distances without loss.
Hub
A Hub is a basic networking device that connects multiple devices in a network and broadcasts
incoming data to all connected devices. It operates at the physical layer and does not differentiate
between devices, making it less efficient than a switch.
Bridge
A Bridge is a networking device that connects two or more network segments, allowing data to pass
between them efficiently. It works at the data link layer and helps manage network traffic by filtering
and forwarding data based on MAC addresses.
Switch
A Switch is an intelligent network device that connects multiple devices within a LAN. It operates at
the data link layer and forwards data based on MAC addresses, improving network efficiency by
reducing collisions.
Router
A Router is a critical networking device that connects multiple networks and directs data packets
based on IP addresses. It determines the best path for data transmission and enables communication
between different networks, including the internet.
Gateway
A Gateway is a networking device that serves as a bridge between different networks using different
communication protocols. It enables seamless data transfer between dissimilar systems, such as
connecting an internal enterprise network to the internet.
Network Interface Card (NIC)
A Network Interface Card (NIC) is a hardware component that enables a computer to connect to a
network. It provides a physical interface for wired (Ethernet) or wireless (Wi-Fi) connections,
facilitating communication between devices.
Access Point
A Wireless Access Point (WAP) is a device that allows wireless devices connect to a wired network
using Wi-Fi. It extends the range of a network and enables seamless wireless communication in large
areas.
Firewall
A Firewall is a network security device that monitors and controls incoming and outgoing network
traffic. It acts as a barrier between trusted and untrusted networks, protecting systems from cyber
threats and unauthorized access.
Types of Cables:
Cables are essential components in networking, used to transmit data between devices. They vary
based on speed, distance, and interference resistance. Common types include twisted pair, coaxial,
and fiber optic cables, each serving specific networking needs
● Two types: Unshielded Twisted Pair (UTP) and Shielded Twisted Pair (STP).
● Transmits data using light signals, providing high-speed and long- distance
communication.
1. RJ45 Connector – Used for Ethernet cables in networking. It has an eight-pin configuration and is
commonly found in wired networking setups, including home and office environments. RJ45 connectors
provide a secure connection for transmitting data and are widely used in LANs, ensuring reliable and high-
speed internet connectivity.
2. BNC
Connector – Used with coaxial cables in CCTV and radio applications. It features a quick- connect
bayonet-style mechanism, allowing for easy and secure connections. BNC connectors are commonly used
in video surveillance systems, radio- frequency transmissions, and test equipment, providing a stable
signal transmission with minimal loss and interference.
3. SC, ST, and LC Connectors – Used in Fiber optic cables for network communication. SC (Subscriber
Connector) is known for its push-pull mechanism, while ST (Straight Tip) features a bayonet lock. LC
(Lucent Connector) is compact and widely used in high-density networking applications. These
connectors ensure efficient light signal transmission with minimal signal loss.
Procedure: To do these practical following steps should be done:
1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be very careful at
this point, as to not nick or cut into the wires, which are inside. Doing so could alter the characteristics of
your cable, or even worse render is useless. Check the wires, one more time for nicks or cuts. If there are
any, just whack the whole end off, and start over. Spread the wires apart but be sure to hold onto the base
of the jacket with your other hand. You do not want the wires to become untwisted down inside the jacket.
Category 5 cable must only have 1/2 of an inch of 'untwisted' wire at the end; otherwise it will be 'out of
spec'. At this point, you obviously have ALOT more than 1/2 of an inch of un- twisted wire.
2. You have 2 end jacks, which must be installed on your cable. If you are using a pre- made cable, with
one of the ends whacked off, you only have one end to install - the crossed over end. Below are two
diagrams, which show how you need to arrange the cables for each type of cable end. Decide at this point
which end you are making and examine the associated picture below.
Straight-Through refers to cables that have the pin assignments on each end of the cable. In other words,
Pin 1 connector A goes to Pin 1 on connector B, Pin 2 to Pin 2, etc.
Straight-Through wired cables are most commonly used to connect a host to a client. When we talk about
cat5e patch cables, the Straight-Through wired cat5e patch cable is used to connect computers, printers,
and other network client devices to the router switch or hub (the host device in this instance).
Connector A Connector B
Pin 1 Pin 1
Pin 2 Pin 2
Pin 3 Pin 3
Pin 4 Pin 4
Pin 5 Pin 5
Pin 6 Pin 6
Pin 7 Pin 7
Pin 8 Pin 8
Used to connect similar devices (e.g., PC to PC, switch to switch). One end follows T568A, and the other
follows T568B. Crossover wired cables (commonly called crossover cables) are very much like Straight-
Through cables with the exception that TX and RX lines are. Using the 568-B standard as an example
below, you will see that Pin 1 on connector A goes to Pin 3 on connector B. Pin 2 on connector A goes to
Pin 6 on connector B, etc. Crossover cables are most commonly used to connect two hosts directly.
Examples would be connecting a computer directly to another computer, connecting a switch directly to
another switch etc.
Connector A Connector B
∙ Pin 1 Pin 1
Pin 2 Pin 2
∙
∙ Pin 3 Pin 3
Pin 4 Pin 4
∙
∙ Pin 5 Pin 5
∙ Pin 6 Pin 6
Pin 7 Pin 7
∙
Pin 8 Pin 8
∙
Rollover Wired Cables
Used to connect a computer to a network device’s console port for configuration. Rollover wired cables,
most commonly called rollover cables, have opposite Pin assignments on each end of the cable or, in other
words, it is "rolled over." Pin 1 of connector A would be connected to Pin 8 of connector B. Pin 2 of
connector A would be connected to Pin 7 of connector B and so on. Rollover cables, sometimes referred
to as Yost cables are most commonly used to connect to a device's console port to make programming
changes to the device. Unlike crossover and straight-wired cables, rollover cables are not intended to carry
data but instead create an interface with the device.
Connector A Connector B
∙ Pin 1 Pin 1
∙ Pin 2 Pin 2
Pin 3 Pin 3
∙
∙ Pin 4 Pin 4
Pin 5 Pin 5
∙
Pin 6 Pin 6
∙
∙ Pin 7 Pin 7
∙ Pin 8 Pin 8
Experiment-2
AIM: Connecting End to End Devices using networking devices in Cisco Packet Tracer.
Material Required:
• Laptop/Desktop
• CISCO Packet Tracer program
Setting Up:
Follow the below steps to initiate the setup for the connection:
Step 1: Download Cisco Packet Tracer.
Step 2: Run and install the setup (You can be requested to log in to your Cisco Networking Academy
Account or you can also log in as a guest).
Step 3: After the installation procedure has completed this display (below) will appear when you run
the Cisco Packet Tracer-Start the application.
Implementation:
Follow the below steps to implement the connection:
Step 1: From the bottom toolbar, click on ‘End Devices’ and select ‘PC’ and then click on the screen
(for two PC’s do this step twice).
Step 3: After selecting the wire click on the computer on the screen(here PC0) and select
FastEthernet0. Then, drag the wire to the other pc (here PC1) and do the same.
Step 4: Now, we will assign the IP address to both the PCs (PC0 &
PC1). After clicking on IP configuration this is what will appear
Now in IPv4 Address, write 192.168.1.1, Subnet mask will be 255.255.255.0
Now if in Realtime box- PDU list window it shows successful, that means all the connections are
correct and the data transfer is successful
You have successfully connected two computers, using the virtual program Cisco Packet Tracer.
Experiment-3
AIM: Performing basic end device and switch configuration using CISCO Packet Tracer.
Materials Required:
● Cisco Packet Tracer software.
● Virtual PCs, Switch, and Copper Straight-Through Cables (within Packet Tracer)
Now, let’s focus on the “privileged exec” mode, its purpose, and why it is a crucial component
of router administration.
Topology Diagram:
Background / Preparation:
In this activity, you will configure these settings on the customer Cisco Catalyst 2960 switch:
● Host name
● Console password
● vty password
● Privileged EXEC mode password
● Privileged EXEC mode secret
● IP address on VLAN1 interface
● Default gateway
a. From the Customer PC, use a console cable and terminal emulation software to connect to
the console of the customer Cisco Catalyst 2960 switch.
b. Set the host name on the switch to CustomerSwitch using these commands.
CustomerSwitch(config)#line console 0
a. From line configuration mode, set the password to cisco and require the password to be entered
at login.
CustomerSwitch(config-line)#password
cisco CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit
CustomerSwitch(config)#line vty 0 15
b. From line configuration mode, set the password to cisco and require the password to be
entered at login.
CustomerSwitch(config-line)#password
cisco CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit
From global configuration mode, switch to interface configuration mode for VLAN1, and assign the IP
address 192.168.1.5 with the subnet mask of 255.255.255.0.
CustomerSwitch(config)#interface vlan 1
CustomerSwitch(config- if)#ip address 192.168.1.5 255.255.255.0
CustomerSwitch(config- if)#no shutdown
CustomerSwitch(config-if)#exit
Materials Required:
● Cisco Packet Tracer software.
● Switch and multiple PCs (simulated in Packet Tracer).
Theory: A Virtual Local Area Network (VLAN) is a logical grouping of devices in a network, enabling
segmentation to improve performance, security, and manageability. VLANs create multiple broadcast
domains within a single switch, ensuring traffic is contained within each VLAN unless routed externally.
Benefits of VLANs:
NETWORK DIAGRAM:
PROCEDURE:
3. Create VLANs:
● Create VLAN 10 and VLAN 20:
Switch(config)# vlan 10
Switch(config-vlan)# name Sales
Switch(config-vlan)# exit
Switch(config)# vlan 20
Switch(config-vlan)# name IT
Switch(config-vlan)# exit
4. Assign Ports to VLANs:
● Assign the ports connected to PC0 and PC1 to VLAN 10, and PC2 to VLAN 20:
Switch(config)# interface fastEthernet 0/1
Switch(config-if)# switchport mode access
Switch(config-if)# switchport access vlan 10
Switch(config-if)# exit
● The output should show VLAN 10 with ports Fa0/1, Fa0/2 and VLAN 20 with port Fa0/3.
6. Test Connectivity:
● Open the Command Prompt on each PC.
● PC0 should be able to ping PC1 (since they’re in the same VLAN).
ping 192.168.10.2
● PC0 should not be able to ping PC2 (since they’re in different VLANs).
OBSERVATION:
RESULT:
VLANs were successfully created and configured, ensuring proper network segmentation.
Experiment - 5
AIM: To implement the Router Configuration using Cisco Packet Tracker.
Material Used:
Router (ISR4331): 1
Switch (2960 series): 2
PCs: 6 (PC0 to PC5)
Copper Straight-through cables: 7
THEORY:
Routers are networking devices that operate at Layer 3 (Network Layer) of the
OSI model and are responsible for determining the best path for forwarding data
packets across different networks. In a LAN environment, switches are used to
connect devices within the same network. However, when communication is
needed between different LANs or IP subnets, a router is essential.
A router is used to connect different networks and route data between them. In
Cisco Packet Tracer, routers operate using CLI (Command Line Interface)
modes similar to switches. The key configuration happens in the following
modes:
1. User EXEC Mode (>): Limited access mode, used to view basic settings.
2. Privileged EXEC Mode (#): Grants full access to monitor and
troubleshoot.
3. Global Configuration Mode ((config)#): Used to configure global
parameters like IP settings.
4. Interface Configuration Mode ((config-if)#): Used to assign IP
addresses to specific router ports.
This experiment provides foundational knowledge of:
Router interface configuration
IP addressing and subnetting
Use of static routing
End-device IP setup
Testing network connectivity using the ping command
Understanding how to configure routers is essential for building more complex
network topologies and is a critical skill for anyone entering the field of
computer networks and communication.
TOPOLOGY DIAGRAM:
Refer to the Cisco Packet Tracer topology where two LANs are connected to a
router.
IP ADDRESSING TABLE:
STEPS TO CONFIGURE:
Step 1: Set IP Address on PCs
Go to each PC → Desktop → IP Configuration and assign IP Address, Subnet
Mask, and Gateway as per the table above.
Step 2: Configure Router Interfaces
Click on the router → CLI tab, and enter the following:
Router> enable
Router# configure terminal
Router(config)# interface gigabitethernet 0/0/0
Router(config-if)# ip address 192.168.1.1 255.255.255.0
Router(config-if)# no shutdown
Router(config-if)# exit
Router(config)# interface gigabitethernet 0/0/1
Router(config-if)# ip address 192.168.2.1 255.255.255.0
Router(config-if)# no shutdown
Router(config-if)# exit
Router(config)# exit
Router# write memory
Step 3: Test Connectivity
From PC0, open the command prompt and type:
ping 192.168.2.2
Repeat this for other PCs to test cross-network connectivity.
OBSERVATION TABLE:
Source PC Destination PC Destination IP Result
RESULT:
Two LANs were successfully interconnected using a router with static IP
routing.
OUTPUT:
Experiment - 6
Aim: To implement Telnet using Cisco Packet Tracker.
Material Required:
Router: 1
Switch: 1
PC: 2
Copper Straight-through Cable: 3
THEORY:
Telnet is a network protocol that allows users to remotely manage devices over
a TCP/IP network using a command-line interface. It operates on port 23 and
follows a client-server model, where a Telnet client connects to a Telnet server
(usually a router or switch).
While Telnet allows network administrators to configure and manage network
devices remotely, it transmits data, including passwords, in plain text, making it
insecure for real-world networks. However, it is useful in lab environments to
understand remote access.
TOPOLOGY DIAGRAM:
Network consists of:
1 Router (ISR4331)
1 Switch (2960-24TT)
2 PCs
Devices are connected as follows:
Router ↔ Switch
Switch ↔ PC0
Switch ↔ PC1
Refer to the image for visual confirmation.
IP ADDRESSING TABLE:
STEPS TO CONFIGURE:
Step 1: Assign IP to PCs
On PC0 and PC1:
Go to Desktop → IP Configuration
Set:
o IP Address: 192.168.0.2 (PC0), 192.168.0.3 (PC1)
o Subnet Mask: 255.255.255.0
o Default Gateway: 192.168.0.1
Step 2: Configure Router0
Open CLI on Router0:
Router> enable
Router# configure terminal
Router(config)# interface g0/0
Router(config-if)# ip address 192.168.0.1 255.255.255.0
Router(config-if)# no shutdown
Router(config-if)# exit
Step 3: Set up Telnet Access
Router(config)# line vty 0 4
Router(config-line)# password cisco
Router(config-line)# login
Router(config-line)# exit
Step 4: Set a Username and Enable Secret
Router(config)# username admin password admin
Router(config)# enable secret class
RESULT:
Telnet was successfully configured and tested between PC and Router using
Cisco Packet Tracer.
OUTPUT:
Experiment - 7
AIM: To implement Static Routing using Cisco Packet Tracer.
Material Required:
Cisco Packet Tracer software
2 Routers (e.g., ISR4331)
6 PCs
Ethernet cables
THEORY:
Routing is simply a process of choosing route for delivering data to its destination. All hosts
who can generate a routing table can do a routing. Routing process is needed when we are
going to deliver packets of data to a network that isn’t directly connected with the sender.
Static Routing is a method of routing that involves manually entering routes into a router’s
routing table. This technique is used in smaller networks where the number of routers and paths
is limited. It provides better security and control but is not scalable for large networks due to
the manual configuration effort required.
In static routing, the administrator defines the path data should take. Unlike dynamic routing,
there is no automatic path update when a link fails.
NETWORK TOPOLOGY:
Refer to the image:
IP ADDRESSING TABLE:
Device Interface IP Address Subnet Mask Default Gateway
PROCEDURE:
1. Assign IP Addresses:
Router interfaces:
o Router to Switch1: 192.168.0.1
2. Configure PCs:
o Gateway: 192.168.0.1
o Gateway: 192.168.1.1
Router> enable
Router# configure terminal
Router(config)# interface gig0/0/0
Router(config-if)# no shutdown
Router(config-if)# no shutdown
(In case of multiple routers, static routes would be manually added using the ip
route command.)
5. Verify Connectivity:
Use the ping command from PC0 to PC3 and vice versa.
ping 192.168.1.2
OUTPUT:
All PCs should be able to successfully ping each other across different LANs through the
router.
Experiment – 8
AIM: To Implement Default Routing using Cisco Packet Tracer
MATERIAL REQUIRED:
Default Routing: Default routing is a type of routing in which a router is configured to forward
packets to a specified "default" next hop or destination when no specific route exists for the
packet's destination in the routing table. This is often used when routing information for all
possible destinations is unavailable, but a default route can direct packets to a central router or
gateway. Default routing simplifies network configuration by reducing the need to define
individual routes for each destination, making it particularly useful in smaller or less complex
networks.
In default routing, the router typically uses the IP address of the next-hop router as the
destination for all packets that do not match any other specific route. It is commonly used in
edge routers that connect a local network to an external network, such as the Internet. The
default route is typically represented by the destination network 0.0.0.0 with a subnet mask of
0.0.0.0, indicating that it applies to any destination not explicitly listed in the routing table.
NETWORK TOPOLOGY:
Refer to the image given below:
IP ADDRESSING TABLE:
PROCEDURE:
Add:
Router(config)# exit
Router(config)# exit
From PC0 (192.168.1.2), open the command prompt and ping PC3 (192.168.2.2).
Successful ping replies confirm that the default routing setup is working
correctly between both networks.
Experiment - 9
AIM: To configure a DHCP Server using Cisco Packet Tracer.
MATERIAL REQUIRED:
4 PC
1 Router
1 Switch
Ethernet Cables
THEORY:
DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to
automatically assign IP addresses, subnet masks, default gateways, and DNS servers to devices
in a network.
Without DHCP, each device must be configured manually. DHCP automates this process,
simplifies network management, and avoids IP conflicts.
The DHCP server maintains a pool of IP addresses and assigns them to devices when requested.
It reduces administrative tasks and supports scalability in large networks.
NETWORK TOPOLOGY:
Refer to the Cisco Packet Tracer topology where are connected to a router ,4 PC (PC0, PC1,
PC2, PC3) with dynamic IP assigned via 1 Server as a DHCP Server. Both devices
connected through a switch.
IP ADDRESSING TABLE:
Switch - NA NA
PROCEDURE:
2. Under FastEthernet0:
o IP Address: 10.0.0.5
o IP Address: 10.0.0.4
Under PC2:
o IP Address: 10.0.0.3
o IP Address: 10.0.0.2
3. Choose DHCP
o The PC will automatically request and obtain an IP address from the DHCP
server.
OUTPUT:
PC0, PC1, PC2, PC3 should now display:
MATERIAL REQUIRED:
1 PC (PC0)
1 DNS Server
Ethernet Cables
THEORY:
DNS (Domain Name System) is responsible for resolving domain names (like
www.google.com) into IP addresses (like 142.250.64.78). In a local network, configuring a
DNS server allows you to assign and resolve custom domain names to internal IP addresses.
By configuring a DNS server in Cisco Packet Tracer, we simulate how a client (PC) sends a
domain query to the DNS server, which replies with the associated IP address. This process is
essential for understanding name resolution in real and virtual networks.
NETWORK TOPOLOGY:
A simple network consisting of:
IP ADDRESSING TABLE:
Switch0 - NA NA
PROCEDURE:
IP Address: 192.168.1.1
Name: My Website
Address: 192.168.1.1
Click Add
2. Go to Desktop → IP Configuration
o IP Address: 192.168.1.2
OUTPUT:
The PC was able to successfully resolve the domain http://My Website using the configured
DNS server and communicate with it.
Experiment - 11
AIM: Introduction to Wireshark
THEORY:
Wireshark is a network protocol analyser created by Gerald Combs in 1998. It is used for:
1. Network troubleshooting,
Wireshark captures network information from the Application Layer to the Link Layer.
This is the Wireshark landing page.
2. 'All Interfaces shown' drop-down menu allows you to select between Wired, Wireless
and External interfaces. In our case, we have all three showing. A wired interface would
be the built-in Thunderbolt ports I have. 'awdl0' is for my Bluetooth chip and
'Loopback: lo0' is for my local server.
3. To capture more than one interface, simply hold the 'command' key (for Mac) and then
select. Once selected, press Capture.
After you click capture, the following display shows up confirming your selection and offers a
few more configurations.
Promiscious Mode enabled means if a packet is not meant for your system, Wireshark will
still keep a record of it. Sometimes, packets bounce of various hosts asking for a final
destination -- at this point, Wireshark keeps the packet or discards based on this option.
When you begin capturing network packets, the following window will show up.
Column Headers
1. No – Each packet is assigned a number.
2. You can change this to various other time formats by going to "View > Time
Display Format > ...".
1. Protocol means "a set of rules governing the format of data sent over the Internet
or other network."
1. This Info view is just meant to be a quick view of what the packet is about. For
more details, go down to the In-depth panel and the bytes panel for more details
on the packet flags, source and destination ports, HTTP form data, and more!
Here's a view of the in-depth and the bytes panel:
Flow Graph
Sometimes it's difficult to grasp a picture of how the packets are flying. Wireshark offers a
Flow Graph (under Statistics tab) where you're able to see how the communication works
between a server and client.
1. To try some of the filters below, paste them into the 'Filter Bar' at the top of the
Wireshark Capture page.
2. Click 'Expressions' to view all possible filter options. It's a laaarrrggee list. o_o
3. As regular users of Wireshark, there may be some commands that you use often. Save
your own custom filters for quick access by clicking the '+' button. Give it a label and
it will show up beside the '+' button so next time, you can easily apply the filter in one
click.
4. Another easy way to apply filters is by right-clicking on a packet > "Apply as filter >
..." and selecting from one of the many option
Experiment - 12
AIM: To implement Dynamic Routing (RIP) using Cisco Packet Tracer.
MATERIAL REQUIRED:
Cisco Packet Tracer software
6 PCs
Ethernet cables
THEORY:
Dynamic routing protocols enable routers to automatically discover and learn about networks
and dynamically update their routing tables as the network topology changes. This eliminates
the need for manual route configuration, making the network more scalable and resilient to link
failures.
RIP (Routing Information Protocol) is a distance-vector routing protocol. Routers using RIP
broadcast their routing tables to directly connected neighbours at regular intervals.
Neighbouring routers then update their own routing tables based on the information received.
RIP uses hop count as its metric to determine the best path to a destination network.
NETWORK TOPOLOGY:
Refer to the image (similar to the Static Routing experiment, but with an additional network
segment for the link between the routers):
IP ADDRESSING TABLE:
PROCEDURE:
1. Assign IP Addresses:
Configure IP addresses and subnet masks on the router interfaces and PCs according
to the IP Addressing Table.
Ensure the PCs have the correct Default Gateway set to the IP address of their
connected router's LAN interface.
Router> enable
Router(config-router)# end
Router> enable
Router# configure terminal
Router(config-router)# version 2
Router(config-router)# no auto-summary
Router(config-router)# end
Use the ping command from PC0 to PC3 (and vice versa) to test connectivity across
the routers.
ping 192.168.1.2
OUTPUT:
All PCs should be able to successfully ping each other across different LANs through the
router.
Experiment – 13
AIM: To implement VLSM (Variable Length Subnet Masking) in Cisco Packet Tracer.
MATERIAL REQUIRED:
2 Routers (e.g., ISR4331)
6 PCs
Ethernet cables
THEORY:
VLSM (Variable Length Subnet Masking) allows subnetting a network into subnets of different
sizes, optimizing the usage of IP addresses. Unlike fixed-length subnetting where all subnets
are of equal size, VLSM allows assigning different subnet masks based on the number of hosts
required in each subnet. This makes the network design more efficient and conserves IP
addresses, which is very important for larger and more complex networks.
VLSM is widely used in real-world networks to better utilize IP address space, especially when
dealing with hierarchical designs.
NETWORK TOPOLOGY:
Two LANs are connected via two routers.Each LAN has PCs connected to switches.
IP ADDRESSING TABLE:
PROCEDURE:
1. Assign IP Addresses:
Assign IP addresses to PCs, Routers, and Switches according to the IP Addressing
Table. Make sure PCs have the correct Default Gateway set.
Router(config-if)# no shutdown
Router(config-if)# no shutdown
Router(config)# exit
Router#
Router(config-if)# no shutdown
Router(config)# exit
Router#
Router(config)# exit
Router#
On Router1: Router# configure terminal
Router(config)# exit
Router#
VERIFY CONNECTIVITY:
Use show ip route on routers to verify routing entries.
Use the ping command from PC0 to PC3, and vice versa, to ensure connectivity
across routers. ping 192.168.1.66
OUTPUT:
All PCs should be able to successfully ping each other across different LANs through the
routers using different subnet sizes created with VLSM.