Lab Manual 2017
Lab Manual 2017
Step1: Cut the cable to the length needed and use stripper to remove the external jacket of the UTP cable. With
the jacket stripped, you’ll find four twisted pairs of wires. Each pair is represented by a solid color and a striped
color each of brown, green, orange and blue. Separate these pairs so they are unbundled. Untwist and separate
all the wires.
Step 2: Arrange the wires
Now separate the pairs, so that you have eight individual wires. Arrange the eight wires into the exact sequence
represented in the wiring standard shown above.
Step 3: Cut the arranged cables. Bring all of the wires together as closely as possible. Hold the grouped (and
sorted) wires together tightly between the thumb, and the forefinger. Cut all of the wires at a perfect 90 degree
angle from the cable, around 2 cm from the end of the cable jacket.
Step 4: Crimping or terminating the wires using RJ-45 connector.
With the connector pins facing up, carefully insert the wires into the connector. Use the crimping tool and apply a
moderate amount of force in order to properly seat the wires against the contacts in the connector.
N.B: Follow the demonstration carefully!
a) Cross-over Ethernet cable:
One end of the Ethernet cable must be terminated using T-568A and the other end must be T-568B. In this lab,
you will use T-568B to create the straight-through cable. One end of the cable must be arranged in the following
color combinations (T-568A) and the other end must be arranged as in (a). Then follow the crimping steps
described above.
1. White/green striped
1
Data Communication and Computer Networks, Lab manual , Prepared by Teklay G.
2. Solid green
3. White/orange striped
4. Solid blue
5. White/blue striped
6. Solid orange
7. White/brown striped
8. Brown
c) Testing a cable. Use a cable tester to observe if all the pins are terminated in a proper sequence.
Introduction to Cisco IOS
Like any other piece of computer hardware, Cisco switches need some kind of operating system software. Cisco
calls this OS the Internetwork Operating System (IOS). Cisco IOS also defines an interface for humans called the
Command Line Interface (CLI) which is also called user interface to the IOS program. The Cisco IOS CLI allows the
user to use a terminal emulation program, which accepts text entered by the user. When the user presses Enter,
the terminal emulator sends that text to the switch. The switch processes the text as if it is a command, does what
the command says. The switch CLI can be accessed through three popular methods—the console, Telnet, and
Secure Shell (SSH). Two of these methods (Telnet and SSH) use the IP network in which the switch resides to reach
the switch. The console is a physical port built specifically to allow access to the CLI.
After a PC is physically connected to the console port, a terminal emulator software package must be installed and
configured on the PC. There are many terminal emulator software one of them is called Teraterm. The terminal
emulator software treats all data as text. It accepts the text typed by the user and sends it over the console
connection to the switch. Similarly, any bits coming into the PC over the console connection are displayed as text
for the user to read. The emulator must be configured to use the PC’s serial port to match the settings on the
switch’s console port settings.
Storing Switch Configuration Files
When you configure a switch, it needs to use the configuration. It also needs to be able to retain the configuration
in case the switch loses power. Cisco switches contain random-access memory (RAM) to store data while Cisco
IOS is using it, but RAM loses its contents when the switch loses power. To store information that must be
retained when the switch loses power, Cisco switches use several types of more permanent memory.
The following list details the four main types of memory found in Cisco switches, as well as the most common use
of each type:
RAM: Sometimes called DRAM, for dynamic random-access memory, RAM is used by the switch just as it
is used by any other computer: for working storage. The running (active) configuration file is stored here.
ROM: Read-only memory (ROM) stores a bootstrap (or boothelper) program that is loaded when the
switch first powers on. This bootstrap program then finds the full Cisco IOS image and manages the
process of loading Cisco IOS into RAM, at which point Cisco IOS takes over operation of the switch.
Flash memory: flash memory stores fully functional Cisco IOS images and is the default location where the
switch gets its Cisco IOS at boot time. Flash memory also can be used to store any other files, including
backup copies of configuration files.
NVRAM: Nonvolatile RAM (NVRAM) stores the initial or startup configuration file that is used when the
switch is first powered on and when the switch is reloaded.
Switches use multiple configuration files —one file for the initial configuration used when powering on, and
another configuration file for the active, currently used running configuration as stored in RAM. The first type of
configuration is called startup config and the other one is running config. Startup-config is stored in NVRAM
whereas running-config is stored in RAM.
2
Data Communication and Computer Networks, Lab manual , Prepared by Teklay G.
Before we start how to configure a Cisco device using a CLI, let us first discuss a software called Packet Tracer
which we will be working on as there are no switches to work with. Packet Tracer is a protocol simulator
developed by Cisco Systems. Packet Tracer is a simulator software that simulates router, switch and other
networking devices. It is a powerful and dynamic tool that displays the various protocols used in networking, in
either Real Time or Simulation mode. This includes layer 2 protocols such as Ethernet and PPP, layer 3 protocols
such as IP, ICMP, and ARP, and layer 4 protocols such as TCP and UDP. Routing protocols can also be configured.
3
Data Communication and Computer Networks, Lab manual , Prepared by Teklay G.
Main Tool Bar: This bar provides shortcut icons to the File and Edit menu commands. This bar also provides
buttons for Copy, Paste, Undo, Redo, Zoom, and others.
Common Tools Bar: This bar provides access to these commonly used workspace tools: Select, Move Layout, Place
Note, Delete, etc.
Workspace/topology area: This area is where you will create your network, watch simulations, and view many
kinds of information and statistics.
Device-Type Selection Box: This box contains the type of devices and connections available in Packet Tracer. The
Device-Specific Selection Box will change depending on which type of device you choose.
Device-Specific Selection Box: This box is where you choose specifically which devices you want to put in your
network and which connections to make.
4
Data Communication and Computer Networks, Lab manual , Prepared by Teklay G.
Move the cursor into topology area. You will notice it turns into a plus “+” sign. Single click in the topology area
and it the device is placed in the workplace area..
Then repeat step 2 to add three more hosts.
5
Data Communication and Computer Networks, Lab manual , Prepared by Teklay G.
After clicking on the straight-through cable do the following steps to connect PC0 to Hub0, as shown in the
following figure.
Click once on PC0
Choose FastEthernet (by clicking)
Drag the cursor to Hub0
Click once on Hub0 and choose Port 0
By now PC0 and Hub0 are connected and notice the green link lights on both the PC0 Ethernet NIC and the Hub0
Port 0 showing that the link is active.
Then now connect PC2 and PC3 to switch0. Follow a similar procedure as connecting PC0 and PC1 to Hub0.
First click on the connections, choose the straight-through cable and do the following to connect PC2 to switch0.
Click once on PC2
Choose FastEthernet
Drag the cursor to Switch0
Click once on Switch0 and choose FastEthernet0/1
Notice the green link lights on PC2 Ethernet NIC and amber light Switch0 FastEthernet0/1 port.
6
Data Communication and Computer Networks, Lab manual , Prepared by Teklay G.
Before we can communicate between the hosts we need to configure IP Addresses and Subnet Masks on the
devices.
7
Data Communication and Computer Networks, Lab manual , Prepared by Teklay G.
Repeat these steps for the other hosts. Use the information below for IP Addresses and Subnet Masks.
Verify the information: To verify the information that you entered, move the Select tool (arrow) over each host.
Move the connections cursor to Hub0 and click ones and select port 5 (it does not matter which port to use in this
case). Then move the Connections cursor to Switch0 and then Click once on Switch0 and choose FastEthernet0/4.
By now, we have finished building our topology.
8
Data Communication and Computer Networks, Lab manual , Prepared by Teklay G.
PC>ping 172.16.1.13
Pinging 172.16.1.13 with 32 bytes of data:
Reply from 172.16.1.13: bytes=32 time=2ms TTL=128
Reply from 172.16.1.13: bytes=32 time=0ms TTL=128
Reply from 172.16.1.13: bytes=32 time=3ms TTL=128
Reply from 172.16.1.13: bytes=32 time=0ms TTL=128
Ping statistics for 172.16.1.13:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 3ms, Average = 1ms
9
Data Communication and Computer Networks, Lab manual , Prepared by Teklay G.
10
Data Communication and Computer Networks, Lab manual , Prepared by Teklay G.
Objective: The main objective of this lab is to introduce you to basic configuration of a Cisco switch which includes
traversing different modes of the IOS
configuring basic settings like hostname, passwords, and others
Use the following network topology for this lab.
Switch>enable
Switch#configure terminal
Switch(config)#hostname testswitch0
testswitch0(config)#
testswitch0(config)#enable password 123
Now logout from the command line interface. Enter exit command twice.
testswitch0(config)#exit
testswitch0#exit
Now login again and the system will ask for enable password which is 123 in this case.
testswitch0>enable
11
Data Communication and Computer Networks, Lab manual , Prepared by Teklay G.
Password:
testswitch0#
Next, configure the enable secret password on top of the enable password.
testswitch0#conf t
testswitch0(config)#enable secret cisco
And logout again and login.
testswitch0(config)#exit
testswitch0#exit
After we enter the enable command, it will ask for password. Now only cisco will work which is the enable secret
which has higher priority over enable password.
The ping request has replies which means the two pcs can reach to each other.
pc:\>ping 10.10.10.20
12
Data Communication and Computer Networks, Lab manual , Prepared by Teklay G.
testswitch0#conf t
testswitch0(config)#interface fa 0/1
testswitch0(config-if)#shutdown
testswitch0(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to administratively down
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to
down
Now the first interface of switch0 is shut down and pc0 and pc1 can no longer be able to communicate until we
enable it.
You can also verify the status of the interface using the sh ip int br command. From the output of the command,
we can see that that interface is down by the administrator.
testswitch0#sh ip int br
Interface IP-Address OK? Method Status Protocol
FastEthernet0/1 unassigned YES manual administratively down down
FastEthernet0/2 unassigned YES manual up up
FastEthernet0/3 unassigned YES manual down down
FastEthernet0/4 unassigned YES manual down down
FastEthernet0/5 unassigned YES manual down down
13
Data Communication and Computer Networks, Lab manual , Prepared by Teklay G.
14
Data Communication and Computer Networks, Lab manual , Prepared by Teklay G.
Router>
Router>en
Router#conf t
Router(config)#hostname Router1
Router1(config)#int fa 1/0
Router1(config-if)#ip add 172.16.2.2 255.255.255.0
Router1(config-if)#no shut
Router1(config-if)#
Router1(config-if)#int fa 0/0
Router1(config-if)#ip add 172.16.3.1 255.255.255.0
Router1(config-if)#no shut
Router1(config-if)#exit
Router1(config)#exit
Router1#exit
Verify the interface configurations
On Router0
Router0#show ip interface brief
Interface IP-Address OK? Method Status Protocol
FastEthernet0/0 172.16.1.1 YES manual up up
FastEthernet1/0 172.16.2.1 YES manual up up
Serial2/0 unassigned YES unset administratively down down
Serial3/0 unassigned YES unset administratively down down
FastEthernet4/0 unassigned YES unset administratively down down
FastEthernet5/0 unassigned YES unset administratively down down
Route0r#
From the output of Router0, it can easily be seen that both interfaces are working and assigned correct IP
addresses. Similarly, you can verify the this information using other verification commands like sh run.
On Router1
Router1#sh ip int br
Interface IP-Address OK? Method Status Protocol
FastEthernet0/0 172.16.3.1 YES manual up up
FastEthernet1/0 172.16.2.2 YES manual up up
Serial2/0 unassigned YES unset administratively down down
Serial3/0 unassigned YES unset administratively down down
FastEthernet4/0 unassigned YES unset administratively down down
FastEthernet5/0 unassigned YES unset administratively down down
Router1#
Use ping to verify the connectivity between devices. Since, we haven’t yet configured any routing service on the
routers, connectivity is not complete.
Use Router0#copy running-config startup-config
and
Router1#copy running-config startup-config
commands on each router to save your configuration.
15
Data Communication and Computer Networks, Lab manual , Prepared by Teklay G.
R2(config-if)#no shutdown
R2(config-if)#exit
R2(config)#int fa 0/0
R2(config-if)#ip add 192.168.3.1 255.255.255.0
R2(config-if)#no shutdown
Then assign IP address of 192.168.1.10 and subnet mask of 255.255.255.0 with default gateway of 192.168.1.1 for
PC1. Assign IP address of 192.168.3.10 and subnet mask of 255.255.255.0 with default gateway of 192.168.3.1 for
PC2.
Verify your configuration.
To verify use show commands on the routers. Use ping for testing connectivity.
For example:
R1#sh ip int br
Interface IP-Address OK? Method Status Protocol
FastEthernet0/0 192.168.1.1 YES manual up up
FastEthernet1/0 192.168.2.1 YES manual up up
For example, use ping 192.168.1.1, to check connectivity to fa0/0 interface of R1.
At this point PC1 and PC2 can not communicate. Try ping 192.168.3.10 being from PC1. There is no reply!
Before we configure routing protocol, let us verify the content of the routing table of the routers. Use show ip
route command.
R2#sh ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
----some text left----------
Gateway of last resort is not set
C 192.168.2.0/24 is directly connected, FastEthernet1/0
C 192.168.3.0/24 is directly connected, FastEthernet0/0
R2#
Since we haven’t configured a routing protocol only the directly connected networks reside in routing table of R2.
From this R2 only knows networks 192.168.2.0 and 192.168.3.0. network 192.168.1.0 is not known by R2. On R1
only 192.1681.0 and 192.168.2.0 are also displayed. When we configure static routing, we tell the routes or
networks that the routers do not know. That is we add network 192.168.3.0 for R1 and network 192.168.1.0 for
router R2. To configure static routing use ip route [destination_network] [mask] [next-hop_address or
exitinterface] command. The next-hop address is the IP address of the next router.
Configuration of static routing on R1:
R1(config)#ip route 192.168.3.0 255.255.255.0 192.168.2.2
Configuration of static routing on R2:
R2(config)#ip route 192.168.1.0 255.255.255.0 192.168.2.1
Now we have added the networks that each router does not know. Now verify the routing table of the routers
and ping the PCs each other.
R1(config)#exit
R1#sh ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
===some text left=====
18