Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
8 views51 pages

Experiment-1 Aim: Study of Different Types of Networking Devices and Cable Connections. Practically Create The

The document outlines a series of experiments focused on networking devices and cable connections, detailing the creation of various cable types (cross-wired, straight-through, and rollover) using specific materials and tools. It also describes the functionality of common networking devices such as modems, switches, and routers, as well as the types of cables and connectors used in networking. Additionally, it includes practical steps for configuring devices using Cisco Packet Tracer, including connecting end devices, performing basic configurations, and creating VLANs.

Uploaded by

adiittyasingh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views51 pages

Experiment-1 Aim: Study of Different Types of Networking Devices and Cable Connections. Practically Create The

The document outlines a series of experiments focused on networking devices and cable connections, detailing the creation of various cable types (cross-wired, straight-through, and rollover) using specific materials and tools. It also describes the functionality of common networking devices such as modems, switches, and routers, as well as the types of cables and connectors used in networking. Additionally, it includes practical steps for configuring devices using Cisco Packet Tracer, including connecting end devices, performing basic configurations, and creating VLANs.

Uploaded by

adiittyasingh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 51

Experiment-1

Aim: Study of different types of Networking Devices and cable connections. Practically create the
cross-wired cable, straight through cable and roll over cable connection using crimping tool.

Materials Required:
● Cat5e/Cat6 Cable
● RJ45 Connectors
● Crimping Tool
● Cable Tester

Common Types of Networking Devices

Network devices work as a mediator between two devices for data transmission, and thus play a very
important role in the functioning of a computer network. Below are some common network devices
used in modern networks:

Modem
A Modem (Modulator-Demodulator) is a device that converts digital data from a computer into
analog signals for transmission over telephone lines and vice versa. It is essential for internet access
over DSL or cable networks.

Repeater
A Repeater is a network device used to regenerate and amplify weak signals in a network. It extends
the coverage area by ensuring data signals travel long distances without loss.

Hub
A Hub is a basic networking device that connects multiple devices in a network and broadcasts
incoming data to all connected devices. It operates at the physical layer and does not differentiate
between devices, making it less efficient than a switch.
Bridge
A Bridge is a networking device that connects two or more network segments, allowing data to pass
between them efficiently. It works at the data link layer and helps manage network traffic by filtering
and forwarding data based on MAC addresses.

Switch
A Switch is an intelligent network device that connects multiple devices within a LAN. It operates at
the data link layer and forwards data based on MAC addresses, improving network efficiency by
reducing collisions.

Router
A Router is a critical networking device that connects multiple networks and directs data packets
based on IP addresses. It determines the best path for data transmission and enables communication
between different networks, including the internet.

Gateway
A Gateway is a networking device that serves as a bridge between different networks using different
communication protocols. It enables seamless data transfer between dissimilar systems, such as
connecting an internal enterprise network to the internet.
Network Interface Card (NIC)
A Network Interface Card (NIC) is a hardware component that enables a computer to connect to a
network. It provides a physical interface for wired (Ethernet) or wireless (Wi-Fi) connections,
facilitating communication between devices.

Access Point
A Wireless Access Point (WAP) is a device that allows wireless devices connect to a wired network
using Wi-Fi. It extends the range of a network and enables seamless wireless communication in large
areas.

Firewall
A Firewall is a network security device that monitors and controls incoming and outgoing network
traffic. It acts as a barrier between trusted and untrusted networks, protecting systems from cyber
threats and unauthorized access.

Types of Cables:
Cables are essential components in networking, used to transmit data between devices. They vary
based on speed, distance, and interference resistance. Common types include twisted pair, coaxial,
and fiber optic cables, each serving specific networking needs

Twisted Pair Cable

● Consists of pairs of wires twisted together to reduce electromagnetic interference.

● Two types: Unshielded Twisted Pair (UTP) and Shielded Twisted Pair (STP).

● Commonly used in Ethernet networks (Cat5, Cat6 cables).


Coaxial Cable

● Has a central conductor surrounded by an insulating layer and a shielding layer.

● Used in cable TV, broadband internet, and older network setups.

Fiber Optic Cable

● Transmits data using light signals, providing high-speed and long- distance
communication.

● Two types: Single-mode (long-distance, high bandwidth) and Multi-mode (short-


distance, lower cost).

● Used in backbone networks and high-speed internet connections.


Types of Cable Connectors:

1. RJ45 Connector – Used for Ethernet cables in networking. It has an eight-pin configuration and is
commonly found in wired networking setups, including home and office environments. RJ45 connectors
provide a secure connection for transmitting data and are widely used in LANs, ensuring reliable and high-
speed internet connectivity.

2. BNC
Connector – Used with coaxial cables in CCTV and radio applications. It features a quick- connect
bayonet-style mechanism, allowing for easy and secure connections. BNC connectors are commonly used
in video surveillance systems, radio- frequency transmissions, and test equipment, providing a stable
signal transmission with minimal loss and interference.

3. SC, ST, and LC Connectors – Used in Fiber optic cables for network communication. SC (Subscriber
Connector) is known for its push-pull mechanism, while ST (Straight Tip) features a bayonet lock. LC
(Lucent Connector) is compact and widely used in high-density networking applications. These
connectors ensure efficient light signal transmission with minimal signal loss.
Procedure: To do these practical following steps should be done:

1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be very careful at
this point, as to not nick or cut into the wires, which are inside. Doing so could alter the characteristics of
your cable, or even worse render is useless. Check the wires, one more time for nicks or cuts. If there are
any, just whack the whole end off, and start over. Spread the wires apart but be sure to hold onto the base
of the jacket with your other hand. You do not want the wires to become untwisted down inside the jacket.
Category 5 cable must only have 1/2 of an inch of 'untwisted' wire at the end; otherwise it will be 'out of
spec'. At this point, you obviously have ALOT more than 1/2 of an inch of un- twisted wire.

2. You have 2 end jacks, which must be installed on your cable. If you are using a pre- made cable, with
one of the ends whacked off, you only have one end to install - the crossed over end. Below are two
diagrams, which show how you need to arrange the cables for each type of cable end. Decide at this point
which end you are making and examine the associated picture below.

Straight-Through Wired Cables:


Used to connect different types of devices (e.g., PC to switch, switch to router).
Both ends follow the same wiring standard (T568A-T568A or T568B- T568B).

Straight-Through refers to cables that have the pin assignments on each end of the cable. In other words,
Pin 1 connector A goes to Pin 1 on connector B, Pin 2 to Pin 2, etc.

Straight-Through wired cables are most commonly used to connect a host to a client. When we talk about
cat5e patch cables, the Straight-Through wired cat5e patch cable is used to connect computers, printers,
and other network client devices to the router switch or hub (the host device in this instance).
Connector A Connector B
Pin 1 Pin 1
Pin 2 Pin 2
Pin 3 Pin 3
Pin 4 Pin 4
Pin 5 Pin 5
Pin 6 Pin 6
Pin 7 Pin 7
Pin 8 Pin 8

Crossover Wired Cables

Used to connect similar devices (e.g., PC to PC, switch to switch). One end follows T568A, and the other
follows T568B. Crossover wired cables (commonly called crossover cables) are very much like Straight-
Through cables with the exception that TX and RX lines are. Using the 568-B standard as an example
below, you will see that Pin 1 on connector A goes to Pin 3 on connector B. Pin 2 on connector A goes to
Pin 6 on connector B, etc. Crossover cables are most commonly used to connect two hosts directly.
Examples would be connecting a computer directly to another computer, connecting a switch directly to
another switch etc.

Connector A Connector B
∙ Pin 1 Pin 1
Pin 2 Pin 2

∙ Pin 3 Pin 3
Pin 4 Pin 4

∙ Pin 5 Pin 5

∙ Pin 6 Pin 6
Pin 7 Pin 7

Pin 8 Pin 8

Rollover Wired Cables

Used to connect a computer to a network device’s console port for configuration. Rollover wired cables,
most commonly called rollover cables, have opposite Pin assignments on each end of the cable or, in other
words, it is "rolled over." Pin 1 of connector A would be connected to Pin 8 of connector B. Pin 2 of
connector A would be connected to Pin 7 of connector B and so on. Rollover cables, sometimes referred
to as Yost cables are most commonly used to connect to a device's console port to make programming
changes to the device. Unlike crossover and straight-wired cables, rollover cables are not intended to carry
data but instead create an interface with the device.

Connector A Connector B

∙ Pin 1 Pin 1
∙ Pin 2 Pin 2
Pin 3 Pin 3

∙ Pin 4 Pin 4
Pin 5 Pin 5

Pin 6 Pin 6

∙ Pin 7 Pin 7

∙ Pin 8 Pin 8
Experiment-2

AIM: Connecting End to End Devices using networking devices in Cisco Packet Tracer.

Material Required:
• Laptop/Desktop
• CISCO Packet Tracer program

Setting Up:
Follow the below steps to initiate the setup for the connection:
Step 1: Download Cisco Packet Tracer.
Step 2: Run and install the setup (You can be requested to log in to your Cisco Networking Academy
Account or you can also log in as a guest).
Step 3: After the installation procedure has completed this display (below) will appear when you run
the Cisco Packet Tracer-Start the application.

Implementation:
Follow the below steps to implement the connection:
Step 1: From the bottom toolbar, click on ‘End Devices’ and select ‘PC’ and then click on the screen
(for two PC’s do this step twice).

Bottom toolbar->End devices->PC


This is how it will appear on the screen
Step 2: Now to connect the PC’s, we require a wire; we use cross-over wire to connect similar devices.
Select Connections from the bottom toolbar, and select cross-over wire (that is the fourth wire).

Step 3: After selecting the wire click on the computer on the screen(here PC0) and select
FastEthernet0. Then, drag the wire to the other pc (here PC1) and do the same.

Step 4: Now, we will assign the IP address to both the PCs (PC0 &
PC1). After clicking on IP configuration this is what will appear
Now in IPv4 Address, write 192.168.1.1, Subnet mask will be 255.255.255.0

Similarly, assign 192.168.1.2 to PC1


We have successfully connected two computers.
Now to check this, we will transfer data from one computer to another and check whether the
transfer is successful or not. To do so follow the below steps:
Step 1: From the Secondary Toolbar at the top, select ‘Add sample PDU’ that is the second last icon.

Step 2: Now click on PC0 and then PC1.

Now if in Realtime box- PDU list window it shows successful, that means all the connections are
correct and the data transfer is successful
You have successfully connected two computers, using the virtual program Cisco Packet Tracer.
Experiment-3

AIM: Performing basic end device and switch configuration using CISCO Packet Tracer.

Materials Required:
● Cisco Packet Tracer software.
● Virtual PCs, Switch, and Copper Straight-Through Cables (within Packet Tracer)

Understanding Router CLI Modes:


Before we dive into the specifics of The Privileged Exec Mode on a Router, it’s important to
understand that router CLI operates in different modes. Each mode serves a distinct purpose, and
users have varying levels of access and control in each mode. The primary CLI modes on a Cisco
router are:
1. User Exec Mode (>): When you first connect to a router’s CLI, you enter user exec mode. It
is indicated by the > prompt. In this mode, users have limited access and can execute basic
commands like ping, show, and enable.
2. Privileged Exec Mode (#) – Enable Mode: Privileged exec mode, often referred to as enable
mode, is the next level of access in the CLI. It is indicated by the # prompt. In this mode, users
have elevated privileges and can execute a broader range of commands, including those that
can modify router configurations.
3. Global Configuration Mode ((config)#): This mode allows users to make changes to the
router’s global configuration settings. It is indicated by the (config)# prompt. In this mode,
users can configure various parameters, such as setting IP addresses, defining access control
lists (ACLs), and configuring routing protocols.
4. Interface Configuration Mode ((config-if)#): Users enter this mode to configure specific
router interfaces (e.g., Ethernet, serial). It is indicated by the (config-if)# prompt. In this mode,
users can configure settings like IP addresses, encapsulation, and interface-specific
parameters.
5. Sub interface Configuration Mode ((config-subif)#) – Optional: In some cases, when
dealing with sub interfaces (e.g., for VLANs or virtual routing and forwarding – VRF), users
can access a sub interface configuration mode. It is indicated by the (config-subif)# prompt.

Now, let’s focus on the “privileged exec” mode, its purpose, and why it is a crucial component
of router administration.

Topology Diagram:

Background / Preparation:
In this activity, you will configure these settings on the customer Cisco Catalyst 2960 switch:

● Host name
● Console password
● vty password
● Privileged EXEC mode password
● Privileged EXEC mode secret
● IP address on VLAN1 interface
● Default gateway

Note: Not all commands are graded by Packet Tracer.

Step 1: Configure the switch host name.

a. From the Customer PC, use a console cable and terminal emulation software to connect to
the console of the customer Cisco Catalyst 2960 switch.
b. Set the host name on the switch to CustomerSwitch using these commands.

Switch>enable Switch#configure terminal


Switch(config)#hostname CustomerSwitch

Step 2: Configure the privileged mode password and secret.

a. From global configuration mode, configure the password as cisco.

CustomerSwitch(config)#enable password cisco

b. From global configuration mode, configure the secret as cisco123.

CustomerSwitch(config)#enable secret cisco123

Step 3: Configure the console password.

From global configuration mode, switch to configuration mode to configure the


console line.

CustomerSwitch(config)#line console 0
a. From line configuration mode, set the password to cisco and require the password to be entered
at login.

CustomerSwitch(config-line)#password
cisco CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit

Step 4: Configure the vty password.


a. From global configuration mode, switch to the configuration mode for the vty lines 0 through
15.

CustomerSwitch(config)#line vty 0 15

b. From line configuration mode, set the password to cisco and require the password to be
entered at login.

CustomerSwitch(config-line)#password
cisco CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit

Step 5: Configure an IP address on interface VLAN1.

From global configuration mode, switch to interface configuration mode for VLAN1, and assign the IP
address 192.168.1.5 with the subnet mask of 255.255.255.0.

CustomerSwitch(config)#interface vlan 1
CustomerSwitch(config- if)#ip address 192.168.1.5 255.255.255.0
CustomerSwitch(config- if)#no shutdown
CustomerSwitch(config-if)#exit

Step 6: Configure the default gateway.


a. From global configuration mode, assign the default gateway to 192.168.1.1.

CustomerSwitch(config)#ip default-gateway 192.168.1.1


Experiment – 4

AIM: VLAN Creation using Cisco Packet Tracer.

Materials Required:
● Cisco Packet Tracer software.
● Switch and multiple PCs (simulated in Packet Tracer).

Theory: A Virtual Local Area Network (VLAN) is a logical grouping of devices in a network, enabling
segmentation to improve performance, security, and manageability. VLANs create multiple broadcast
domains within a single switch, ensuring traffic is contained within each VLAN unless routed externally.

Benefits of VLANs:

● Reduces broadcast traffic.


● Enhances security by isolating sensitive data.
● Improves network performance by limiting unnecessary traffic.
● Simplifies network management and segmentation.

NETWORK DIAGRAM:

PROCEDURE:

1. Setup the Network Topology:


● Open Cisco Packet Tracer.
● Drag and drop:
o One Switch.
o Three PCs.

● Connect each PC to the switch using Straight-Through Cables.

● Configure End Devices:


Click on each PC → Go to the Desktop tab → Click on IP Configuration.
● Assign IP addresses as follows:
o PC0: IP: 10.0.0.1 | Subnet Mask: 255.0.0.0
o PC1: IP: 10.0.0.2 | Subnet Mask: 255.0.0.0
o PC2: IP: 10.0.0.3 | Subnet Mask: 255.0.0.0
o PC3: IP: 10.0.0.4 | Subnet Mask: 255.0.0.0

2. Access Switch CLI:

● Click on the switch → Go to the CLI (Command Line Interface).


● Enter the following commands to enter configuration mode:
Switch> enable
Switch# configure terminal

3. Create VLANs:
● Create VLAN 10 and VLAN 20:
Switch(config)# vlan 10
Switch(config-vlan)# name Sales
Switch(config-vlan)# exit

Switch(config)# vlan 20
Switch(config-vlan)# name IT
Switch(config-vlan)# exit
4. Assign Ports to VLANs:
● Assign the ports connected to PC0 and PC1 to VLAN 10, and PC2 to VLAN 20:
Switch(config)# interface fastEthernet 0/1
Switch(config-if)# switchport mode access
Switch(config-if)# switchport access vlan 10
Switch(config-if)# exit

Switch(config)# interface fastEthernet 0/2


Switch(config-if)# switchport mode access
Switch(config-if)# switchport access vlan 10
Switch(config-if)# exit

Switch(config)# interface fastEthernet 0/3


Switch(config-if)# switchport mode access
Switch(config-if)# switchport access vlan 20
Switch(config-if)# exit
5. Verify VLAN Configuration:
● Check VLAN assignments with:
Switch# show vlan brief

● The output should show VLAN 10 with ports Fa0/1, Fa0/2 and VLAN 20 with port Fa0/3.

6. Test Connectivity:
● Open the Command Prompt on each PC.
● PC0 should be able to ping PC1 (since they’re in the same VLAN).
ping 192.168.10.2
● PC0 should not be able to ping PC2 (since they’re in different VLANs).

OBSERVATION:

● PCs in the same VLAN communicated successfully.


● PCs in different VLANs could not communicate without additional configuration like inter-
VLAN routing.

RESULT:
VLANs were successfully created and configured, ensuring proper network segmentation.
Experiment - 5
AIM: To implement the Router Configuration using Cisco Packet Tracker.
Material Used:
 Router (ISR4331): 1
 Switch (2960 series): 2
 PCs: 6 (PC0 to PC5)
 Copper Straight-through cables: 7
THEORY:
Routers are networking devices that operate at Layer 3 (Network Layer) of the
OSI model and are responsible for determining the best path for forwarding data
packets across different networks. In a LAN environment, switches are used to
connect devices within the same network. However, when communication is
needed between different LANs or IP subnets, a router is essential.
A router is used to connect different networks and route data between them. In
Cisco Packet Tracer, routers operate using CLI (Command Line Interface)
modes similar to switches. The key configuration happens in the following
modes:
1. User EXEC Mode (>): Limited access mode, used to view basic settings.
2. Privileged EXEC Mode (#): Grants full access to monitor and
troubleshoot.
3. Global Configuration Mode ((config)#): Used to configure global
parameters like IP settings.
4. Interface Configuration Mode ((config-if)#): Used to assign IP
addresses to specific router ports.
This experiment provides foundational knowledge of:
 Router interface configuration
 IP addressing and subnetting
 Use of static routing
 End-device IP setup
 Testing network connectivity using the ping command
Understanding how to configure routers is essential for building more complex
network topologies and is a critical skill for anyone entering the field of
computer networks and communication.
TOPOLOGY DIAGRAM:
Refer to the Cisco Packet Tracer topology where two LANs are connected to a
router.

IP ADDRESSING TABLE:

Device IP Address Subnet Mask Default Gateway

Router G0/0/0 10.0.0.1 255.0.0.0 -

Router G0/0/1 192.168.0.2 255.255.255.0 -

PC0 10.0.0.2 255.0.0.0 10.0.0.1

PC1 10.0.0.3 255.0.0.0 10.0.0.1

PC2 10.0.0.4 255.0.0.0 10.0.0.1

PC3 192.168.0.5 255.255.255.0 192.168.0.1


Device IP Address Subnet Mask Default Gateway

PC4 192.168.0.3 255.255.255.0 192.168.0.1

PC5 192.168.0.4 255.255.255.0 192.168.0.1

STEPS TO CONFIGURE:
Step 1: Set IP Address on PCs
Go to each PC → Desktop → IP Configuration and assign IP Address, Subnet
Mask, and Gateway as per the table above.
Step 2: Configure Router Interfaces
Click on the router → CLI tab, and enter the following:
Router> enable
Router# configure terminal
Router(config)# interface gigabitethernet 0/0/0
Router(config-if)# ip address 192.168.1.1 255.255.255.0
Router(config-if)# no shutdown
Router(config-if)# exit
Router(config)# interface gigabitethernet 0/0/1
Router(config-if)# ip address 192.168.2.1 255.255.255.0
Router(config-if)# no shutdown
Router(config-if)# exit
Router(config)# exit
Router# write memory
Step 3: Test Connectivity
From PC0, open the command prompt and type:
ping 192.168.2.2
Repeat this for other PCs to test cross-network connectivity.
OBSERVATION TABLE:
Source PC Destination PC Destination IP Result

PC0 PC3 192.168.0.5 Success

PC1 PC4 192.168.0.3 Success

PC2 PC5 192.168.0.4 Success

RESULT:
Two LANs were successfully interconnected using a router with static IP
routing.

OUTPUT:
Experiment - 6
Aim: To implement Telnet using Cisco Packet Tracker.
Material Required:
 Router: 1
 Switch: 1
 PC: 2
 Copper Straight-through Cable: 3
THEORY:
Telnet is a network protocol that allows users to remotely manage devices over
a TCP/IP network using a command-line interface. It operates on port 23 and
follows a client-server model, where a Telnet client connects to a Telnet server
(usually a router or switch).
While Telnet allows network administrators to configure and manage network
devices remotely, it transmits data, including passwords, in plain text, making it
insecure for real-world networks. However, it is useful in lab environments to
understand remote access.
TOPOLOGY DIAGRAM:
Network consists of:
 1 Router (ISR4331)
 1 Switch (2960-24TT)
 2 PCs
Devices are connected as follows:
 Router ↔ Switch
 Switch ↔ PC0
 Switch ↔ PC1
Refer to the image for visual confirmation.
IP ADDRESSING TABLE:

Device Interface IP Address Subnet Mask

Router0 GigabitEthernet0/0 192.168.0.1 255.255.255.0

PC0 FastEthernet 192.168.0.2 255.255.255.0

PC1 FastEthernet 192.168.0.3 255.255.255.0

STEPS TO CONFIGURE:
Step 1: Assign IP to PCs
On PC0 and PC1:
 Go to Desktop → IP Configuration
 Set:
o IP Address: 192.168.0.2 (PC0), 192.168.0.3 (PC1)
o Subnet Mask: 255.255.255.0
o Default Gateway: 192.168.0.1
Step 2: Configure Router0
Open CLI on Router0:
Router> enable
Router# configure terminal
Router(config)# interface g0/0
Router(config-if)# ip address 192.168.0.1 255.255.255.0
Router(config-if)# no shutdown
Router(config-if)# exit
Step 3: Set up Telnet Access
Router(config)# line vty 0 4
Router(config-line)# password cisco
Router(config-line)# login
Router(config-line)# exit
Step 4: Set a Username and Enable Secret
Router(config)# username admin password admin
Router(config)# enable secret class

TESTING TELNET CONNECTION:


1. Go to PC0 or PC1 → Desktop → Command Prompt
2. Type:
telnet 192.168.0.1
3. Enter the password cisco when prompted. You will get access to the
router.
OBSERVATION TABLE:

Command Issued Output

telnet 192.168.0.1 Password Prompt → Router CLI Access

Commands on Router Router responds remotely via Telnet

RESULT:
Telnet was successfully configured and tested between PC and Router using
Cisco Packet Tracer.

OUTPUT:
Experiment - 7
AIM: To implement Static Routing using Cisco Packet Tracer.

Material Required:
 Cisco Packet Tracer software
 2 Routers (e.g., ISR4331)

 2 Switches (e.g., 2960-24TT)

 6 PCs

 Ethernet cables

THEORY:
Routing is simply a process of choosing route for delivering data to its destination. All hosts
who can generate a routing table can do a routing. Routing process is needed when we are
going to deliver packets of data to a network that isn’t directly connected with the sender.

Static Routing is a method of routing that involves manually entering routes into a router’s
routing table. This technique is used in smaller networks where the number of routers and paths
is limited. It provides better security and control but is not scalable for large networks due to
the manual configuration effort required.

In static routing, the administrator defines the path data should take. Unlike dynamic routing,
there is no automatic path update when a link fails.

NETWORK TOPOLOGY:
Refer to the image:

IP ADDRESSING TABLE:
Device Interface IP Address Subnet Mask Default Gateway

Router G0/0/0 (to Switch1) 192.168.0.1 255.255.255.0 -

Router G0/0/1 (to Switch2) 192.168.1.1 255.255.255.0 -

PC0 FastEthernet0 192.168.0.2 255.255.255.0 192.168.0.1

PC1 FastEthernet0 192.168.0.3 255.255.255.0 192.168.0.1

PC2 FastEthernet0 192.168.0.4 255.255.255.0 192.168.0.1

PC3 FastEthernet0 192.168.1.2 255.255.255.0 192.168.1.1

PC4 FastEthernet0 192.168.1.3 255.255.255.0 192.168.1.1

PC5 FastEthernet0 192.168.1.4 255.255.255.0 192.168.1.1

PROCEDURE:

1. Assign IP Addresses:

 Left LAN: 192.168.1.0/24

 Right LAN: 192.168.2.0/24

 Router interfaces:
o Router to Switch1: 192.168.0.1

o Router to Switch2: 192.168.1.1

2. Configure PCs:

 PC0, PC1, PC2:

o IPs: 192.168.0.2, .3, .4

o Gateway: 192.168.0.1

 PC3, PC4, PC5:


o IPs: 192.168.1.2, .3, .4

o Gateway: 192.168.1.1

3. Configure Router (Router2):

 Assign IP addresses to interfaces:

Router> enable
Router# configure terminal
Router(config)# interface gig0/0/0

Router(config-if)# ip address 192.168.0.1 255.255.255.0

Router(config-if)# no shutdown

Router(config)# interface gig0/0/1

Router(config-if)# ip address 192.168.1.1 255.255.255.0

Router(config-if)# no shutdown

4. Add Static Routes (if additional routers are in topology):

 (In case of multiple routers, static routes would be manually added using the ip
route command.)

 For single router setup, static routes are not required.

5. Verify Connectivity:

 Use the ping command from PC0 to PC3 and vice versa.

ping 192.168.1.2

OUTPUT:
All PCs should be able to successfully ping each other across different LANs through the
router.
Experiment – 8
AIM: To Implement Default Routing using Cisco Packet Tracer

MATERIAL REQUIRED:

 Cisco Packet Tracer Software


 2 Routers
 2 Switches
 6 PCs (PC0 to PC5)
 Straight-through cables for PC-Switch connections
 Cross-over cable (or Serial connection) for Router-Router connection
THEORY:

Default Routing: Default routing is a type of routing in which a router is configured to forward
packets to a specified "default" next hop or destination when no specific route exists for the
packet's destination in the routing table. This is often used when routing information for all
possible destinations is unavailable, but a default route can direct packets to a central router or
gateway. Default routing simplifies network configuration by reducing the need to define
individual routes for each destination, making it particularly useful in smaller or less complex
networks.
In default routing, the router typically uses the IP address of the next-hop router as the
destination for all packets that do not match any other specific route. It is commonly used in
edge routers that connect a local network to an external network, such as the Internet. The
default route is typically represented by the destination network 0.0.0.0 with a subnet mask of
0.0.0.0, indicating that it applies to any destination not explicitly listed in the routing table.

NETWORK TOPOLOGY:
Refer to the image given below:
IP ADDRESSING TABLE:

Device Interface IP Address Subnet Mask Default Gateway

Router0 FastEthernet0/1 192.168.1.1 255.255.255.0 -

Router0 GigabitEthernet0/0 10.0.0.1 255.255.255.252 -

Router1 FastEthernet0/1 192.168.2.1 255.255.255.0 -

Router1 GigabitEthernet0/0 10.0.0.2 255.255.255.252 -

PC0 FastEthernet0 192.168.1.2 255.255.255.0 192.168.1.1

PC1 FastEthernet0 192.168.1.3 255.255.255.0 192.168.1.1

PC2 FastEthernet0 192.168.1.4 255.255.255.0 192.168.1.1

PC3 FastEthernet0 192.168.2.2 255.255.255.0 192.168.2.1

PC4 FastEthernet0 192.168.2.3 255.255.255.0 192.168.2.1

PC5 FastEthernet0 192.168.2.4 255.255.255.0 192.168.2.1

PROCEDURE:

Step 1: Add Devices to the Workspace

 Open Cisco Packet Tracer.

 Add:

o 2 Routers (Router0, Router1)


o 2 Switches (Switch0, Switch1)
o 6 PCs (PC0–PC5)

Step 2: Connecting the Devices

1. Connect Router0 and Router1:


o Use a Copper Cross-Over Cable.
o Connect Router0's GigabitEthernet0/0 to Router1's GigabitEthernet0/0.
2. Connect Router0 to Switch0:
o Use a Copper Straight-Through Cable.
o Connect Router0’s FastEthernet0/1 interface to Switch0's
FastEthernet0/1 port.
3. Connect Router1 to Switch1:
o Use a Copper Straight-Through Cable.
o Connect Router1’s FastEthernet0/1 interface to Switch1's
FastEthernet0/1 port.

4. Connect PCs to Switches:


o Use Copper Straight-Through Cables.
o Connect:
 PC0, PC1, and PC2 to Switch0 (FastEthernet ports).

 PC3, PC4, and PC5 to Switch1 (FastEthernet ports).

Step 3: Assigning IP Addresses to Devices

1. Assign IP Address to Router0:


o FastEthernet0/1: 192.168.1.1 255.255.255.0
o GigabitEthernet0/0: 10.0.0.1 255.255.255.252
2. Assign IP Address to Router1:
o FastEthernet0/1: 192.168.2.1 255.255.255.0
o GigabitEthernet0/0: 10.0.0.2 255.255.255.252
3. Assign IP Addresses to PCs:

 Network 1 (PCs on Switch0):

o PC0: IP: 192.168.1.2 255.255.255.0, Gateway: 192.168.1.1


o PC1: IP: 192.168.1.3 255.255.255.0, Gateway: 192.168.1.1

o PC2: IP: 192.168.1.4 255.255.255.0, Gateway: 192.168.1.1

 Network 2 (PCs on Switch1):


o PC3: IP: 192.168.2.2 255.255.255.0, Gateway: 192.168.2.1

o PC4: IP: 192.168.2.3 255.255.255.0, Gateway: 192.168.2.1


o PC5: IP: 192.168.2.4 255.255.255.0, Gateway: 192.168.2.1

Step 4: Configuring Routing on Routers

1. Configure Routing on Router0:


o Access Router0’s CLI.
o Enter Global Configuration Mode:
Router> enable

Router# configure terminal

Set the default route pointing to Router1:

Router(config)# ip route 0.0.0.0 0.0.0.0 10.0.0.2

Exit configuration mode:

Router(config)# exit

2. Configure Routing on Router1:


o Access Router1’s CLI.
o Enter Global Configuration Mode:
Router> enable

Router# configure terminal

Set the default route pointing to Router0:

Router(config)# ip route 0.0.0.0 0.0.0.0 10.0.0.1

Exit configuration mode:

Router(config)# exit

OUTPUT: Test Connectivity Between PCs:

 From PC0 (192.168.1.2), open the command prompt and ping PC3 (192.168.2.2).

 Successful ping replies confirm that the default routing setup is working
correctly between both networks.
Experiment - 9
AIM: To configure a DHCP Server using Cisco Packet Tracer.

MATERIAL REQUIRED:
 4 PC

 1 Router

 1 Switch

 Ethernet Cables

THEORY:
DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to
automatically assign IP addresses, subnet masks, default gateways, and DNS servers to devices
in a network.

Without DHCP, each device must be configured manually. DHCP automates this process,
simplifies network management, and avoids IP conflicts.

The DHCP server maintains a pool of IP addresses and assigns them to devices when requested.
It reduces administrative tasks and supports scalability in large networks.

NETWORK TOPOLOGY:
Refer to the Cisco Packet Tracer topology where are connected to a router ,4 PC (PC0, PC1,
PC2, PC3) with dynamic IP assigned via 1 Server as a DHCP Server. Both devices
connected through a switch.

IP ADDRESSING TABLE:

Device Interface IP Address Subnet Mask

DHCP Server FastEthernet0 10.0.0.5 255.0.0.0


Device Interface IP Address Subnet Mask

PC0 FastEthernet DHCP 255.0.0.0

PC1 FastEthernet DHCP 255.0.0.0

PC2 FastEthernet DHCP 255.0.0.0

PC3 FastEthernet DHCP 255.0.0.0

Switch - NA NA

PROCEDURE:

Step 1: Configure the DHCP Server


1. Click on the Server → Go to the Config tab

2. Under FastEthernet0:
o IP Address: 10.0.0.5

o Subnet Mask: 255.0.0.0


Under PC1:

o IP Address: 10.0.0.4

o Subnet Mask: 255.0.0.0

Under PC2:

o IP Address: 10.0.0.3

o Subnet Mask: 255.0.0.0


Under PC3:

o IP Address: 10.0.0.2

o Subnet Mask: 255.0.0.0

3. Go to the Services tab → Select DHCP

o Turn DHCP Service ON

o Fill in the fields: Pool Name: LAN

 Default Gateway: 10.0.0.1

 DNS Server: 0.0.0.0

Step 2: Configure PC0, PC1, PC2, PC3


1. Click on PC0, PC1, PC2, PC3 respectively.
2. Go to Desktop tab → Select IP Configuration

3. Choose DHCP

o The PC will automatically request and obtain an IP address from the DHCP
server.

OUTPUT:
 PC0, PC1, PC2, PC3 should now display:

o IP Address: 10.0.0.5, 10.0.0.4, 10.0.0.3, 10.0.0.2 etc.

o Subnet Mask: 255.0.0.0

o Default Gateway: 10.0.0.1

o DNS Server: 0.0.0.0

You can confirm this using Command Prompt → ipconfig


Experiment – 10
AIM: To Configure DNS Server Using Cisco Packet Tracker.

MATERIAL REQUIRED:
 1 PC (PC0)

 1 DNS Server

 1 Switch (2960 series)

 Ethernet Cables

THEORY:
DNS (Domain Name System) is responsible for resolving domain names (like
www.google.com) into IP addresses (like 142.250.64.78). In a local network, configuring a
DNS server allows you to assign and resolve custom domain names to internal IP addresses.

By configuring a DNS server in Cisco Packet Tracer, we simulate how a client (PC) sends a
domain query to the DNS server, which replies with the associated IP address. This process is
essential for understanding name resolution in real and virtual networks.

NETWORK TOPOLOGY:
A simple network consisting of:

 1 PC (PC0) with IP 192.168.1.2

 1 Server acting as a DNS server with IP 192.168.1.1

 Both connected to a switch

IP ADDRESSING TABLE:

Device Interface IP Address Subnet Mask

Server0 FastEthernet0 192.168.1.1 255.255.255.0

PC0 FastEthernet0 192.168.1.2 255.255.255.0

Switch0 - NA NA
PROCEDURE:

Step 1: Configure the Server


1. Click on the Server.

2. Go to the Config tab: Interface Settings → FastEthernet0

 IP Address: 192.168.1.1

 Subnet Mask: 255.255.255.0

3. Go to the Services tab → DNS

o Turn DNS Service ON


o Under DNS Records, add:

 Name: My Website

 Address: 192.168.1.1

 Click Add

Step 2: Configure the PC (PC0)


1. Click on PC0

2. Go to Desktop → IP Configuration

o IP Address: 192.168.1.2

o Subnet Mask: 255.255.255.0

o Default Gateway: 192.168.1.1

o DNS Server: 192.168.1.1

Step 3: Test DNS Configuration


1. Go to Desktop → WEB BROWSER on PC0
2. Type the following command: http://My Website

OUTPUT:
The PC was able to successfully resolve the domain http://My Website using the configured
DNS server and communicate with it.
Experiment - 11
AIM: Introduction to Wireshark

THEORY:
Wireshark is a network protocol analyser created by Gerald Combs in 1998. It is used for:

1. Network troubleshooting,

2. Analyse and examine security problems,

3. Software and communications protocol development,

4. Education and hacking.

Wireshark captures network information from the Application Layer to the Link Layer.
This is the Wireshark landing page.

Starting from the top:

1. The 'Capture' button begins the network capture.

2. 'All Interfaces shown' drop-down menu allows you to select between Wired, Wireless
and External interfaces. In our case, we have all three showing. A wired interface would
be the built-in Thunderbolt ports I have. 'awdl0' is for my Bluetooth chip and
'Loopback: lo0' is for my local server.

3. To capture more than one interface, simply hold the 'command' key (for Mac) and then
select. Once selected, press Capture.
After you click capture, the following display shows up confirming your selection and offers a
few more configurations.

Promiscious Mode enabled means if a packet is not meant for your system, Wireshark will
still keep a record of it. Sometimes, packets bounce of various hosts asking for a final
destination -- at this point, Wireshark keeps the packet or discards based on this option.

When you begin capturing network packets, the following window will show up.

Here's a look at what the buttons on the toolbar do.


Right below the toolbar, there are seven columns:

Column Headers
1. No – Each packet is assigned a number.

1. Straight forward, it's just a counter.

2. Time – The timestamp of the packet.

1. a.k.a how much time passed since you began capturing.

2. You can change this to various other time formats by going to "View > Time
Display Format > ...".

3. Source – Source address of the packet, could be an IP or MAC address.

1. As humans, we find it easier when the IP or MAC address is an actual name,


such as 'www.google.com' or 'www.yahoo.ca'. You can enable Wireshark's
option to convert these addresses by going to "View > Name Resolution >
Resolve Network Addresses".
4. Destination – Destination address of the packet, could be an IP or MAC address.

5. Protocol – Protocol name used in the packet.

1. Protocol means "a set of rules governing the format of data sent over the Internet
or other network."

6. Length – Total length of the packet.

7. Info – Provides additional details about the packet.

1. This Info view is just meant to be a quick view of what the packet is about. For
more details, go down to the In-depth panel and the bytes panel for more details
on the packet flags, source and destination ports, HTTP form data, and more!
Here's a view of the in-depth and the bytes panel:

Flow Graph
Sometimes it's difficult to grasp a picture of how the packets are flying. Wireshark offers a
Flow Graph (under Statistics tab) where you're able to see how the communication works
between a server and client.

Colour Coding Packets


Each of the packets in the main view are colour-coded so we can easily understand what they
mean. This can be changed by going to View > Colouring Rules. You can also add your own
colouring rules in case if you wanted all packets with incoming IP address matching x.x.x.x
to be blue.

Filtering Packets in Wireshark


A lot of network traffic is caught by Wireshark and most will be useless for us right now.
With the help of filtering, we can get to the good stuff quickly.

1. To try some of the filters below, paste them into the 'Filter Bar' at the top of the
Wireshark Capture page.
2. Click 'Expressions' to view all possible filter options. It's a laaarrrggee list. o_o
3. As regular users of Wireshark, there may be some commands that you use often. Save
your own custom filters for quick access by clicking the '+' button. Give it a label and
it will show up beside the '+' button so next time, you can easily apply the filter in one
click.
4. Another easy way to apply filters is by right-clicking on a packet > "Apply as filter >
..." and selecting from one of the many option
Experiment - 12
AIM: To implement Dynamic Routing (RIP) using Cisco Packet Tracer.

MATERIAL REQUIRED:
 Cisco Packet Tracer software

 2 Routers (e.g., ISR4331)

 2 Switches (e.g., 2960-24TT)

 6 PCs

 Ethernet cables

THEORY:
Dynamic routing protocols enable routers to automatically discover and learn about networks
and dynamically update their routing tables as the network topology changes. This eliminates
the need for manual route configuration, making the network more scalable and resilient to link
failures.

RIP (Routing Information Protocol) is a distance-vector routing protocol. Routers using RIP
broadcast their routing tables to directly connected neighbours at regular intervals.
Neighbouring routers then update their own routing tables based on the information received.
RIP uses hop count as its metric to determine the best path to a destination network.

NETWORK TOPOLOGY:
Refer to the image (similar to the Static Routing experiment, but with an additional network
segment for the link between the routers):
IP ADDRESSING TABLE:

Device Interface IP Address Subnet Mask Default Gateway

Router G0/0/0 (to Switch1) 192.168.0.1 255.255.255.0 -

Router G0/0/1 (to Switch2) 192.168.1.1 255.255.255.0 -

PC0 FastEthernet0 192.168.0.2 255.255.255.0 192.168.0.1

PC1 FastEthernet0 192.168.0.3 255.255.255.0 192.168.0.1

PC2 FastEthernet0 192.168.0.4 255.255.255.0 192.168.0.1

PC3 FastEthernet0 192.168.1.2 255.255.255.0 192.168.1.1

PC4 FastEthernet0 192.168.1.3 255.255.255.0 192.168.1.1

PC5 FastEthernet0 192.168.1.4 255.255.255.0 192.168.1.1

PROCEDURE:

1. Assign IP Addresses:
 Configure IP addresses and subnet masks on the router interfaces and PCs according
to the IP Addressing Table.

 Ensure the PCs have the correct Default Gateway set to the IP address of their
connected router's LAN interface.

2. Configure RIP on Router0:

Router> enable

Router# configure terminal

Router(config)# router rip


Router(config-router)# version 2

Router(config-router)# network 192.168.0.0

Router(config-router)# network 10.0.0.0


Router(config-router)# no auto-summary

Router(config-router)# end

Router# write memory


3. Configure RIP on Router1:

Router> enable
Router# configure terminal

Router(config)# router rip

Router(config-router)# version 2

Router(config-router)# network 192.168.1.0

Router(config-router)# network 10.0.0.0

Router(config-router)# no auto-summary

Router(config-router)# end

Router# write memory


4. Verify Connectivity:
 Allow some time for the RIP updates to propagate and the routing tables to converge.
You can observe the routing tables using the show ip route command on both routers.
You should see entries for the remote networks learned via RIP.

 Use the ping command from PC0 to PC3 (and vice versa) to test connectivity across
the routers.

ping 192.168.1.2

OUTPUT:
All PCs should be able to successfully ping each other across different LANs through the
router.
Experiment – 13
AIM: To implement VLSM (Variable Length Subnet Masking) in Cisco Packet Tracer.

MATERIAL REQUIRED:
 2 Routers (e.g., ISR4331)

 2 Switches (e.g., 2960-24TT)

 6 PCs

 Ethernet cables

THEORY:
VLSM (Variable Length Subnet Masking) allows subnetting a network into subnets of different
sizes, optimizing the usage of IP addresses. Unlike fixed-length subnetting where all subnets
are of equal size, VLSM allows assigning different subnet masks based on the number of hosts
required in each subnet. This makes the network design more efficient and conserves IP
addresses, which is very important for larger and more complex networks.

VLSM is widely used in real-world networks to better utilize IP address space, especially when
dealing with hierarchical designs.

NETWORK TOPOLOGY:
 Two LANs are connected via two routers.Each LAN has PCs connected to switches.

IP ADDRESSING TABLE:

Device Interface IP Address Subnet Mask Default Gateway

Router0 G0/0 (to Switch0) 192.168.1.1 255.255.255.224 -

Router0 G0/1 (to Router1) 192.168.1.33 255.255.255.252 -

Router1 G0/0 (to Switch1) 192.168.1.65 255.255.255.224 -

Router1 G0/1 (to Router0) 192.168.1.34 255.255.255.252 -


Device Interface IP Address Subnet Mask Default Gateway

PC0 FastEthernet0 192.168.1.2 255.255.255.224 192.168.1.1

PC1 FastEthernet0 192.168.1.3 255.255.255.224 192.168.1.1

PC2 FastEthernet0 192.168.1.4 255.255.255.224 192.168.1.1

PC3 FastEthernet0 192.168.1.66 255.255.255.224 192.168.1.65

PC4 FastEthernet0 192.168.1.67 255.255.255.224 192.168.1.65

PC5 FastEthernet0 192.168.1.68 255.255.255.224 192.168.1.65

PROCEDURE:

1. Assign IP Addresses:
 Assign IP addresses to PCs, Routers, and Switches according to the IP Addressing
Table. Make sure PCs have the correct Default Gateway set.

2. Configure Interfaces on Router0: Router> enable

Router# configure terminal

Router(config)# interface g0/0


Router(config-if)# ip address 192.168.1.1 255.255.255.224

Router(config-if)# no shutdown

Router(config)# interface g0/1

Router(config-if)# ip address 192.168.1.33 255.255.255.252

Router(config-if)# no shutdown

Router(config)# exit

Router#

3. Configure Interfaces on Router1: Router> enable

Router# configure terminal

Router(config)# interface g0/0

Router(config-if)# ip address 192.168.1.65 255.255.255.224

Router(config-if)# no shutdown

Router(config)# interface g0/1


Router(config-if)# ip address 192.168.1.34 255.255.255.252
Router(config-if)# no shutdown

Router(config)# exit

Router#

4. Configure Static Routes:


 On Router0: Router# configure terminal

Router(config)# ip route 192.168.1.64 255.255.255.224 192.168.1.34

Router(config)# exit

Router#
 On Router1: Router# configure terminal

Router(config)# ip route 192.168.1.0 255.255.255.224 192.168.1.33

Router(config)# exit

Router#

VERIFY CONNECTIVITY:
 Use show ip route on routers to verify routing entries.

 Use the ping command from PC0 to PC3, and vice versa, to ensure connectivity
across routers. ping 192.168.1.66

OUTPUT:
All PCs should be able to successfully ping each other across different LANs through the
routers using different subnet sizes created with VLSM.

You might also like