100% found this document useful (1 vote)
164 views

DCN Lab File

1. Explore the menu bar, main toolbar, common tools bar, and logical/physical workspace tabs to understand the main interface elements. 2. Study the different workspace tools like select, move, place note, delete, and inspect to manipulate network objects. 3. Learn how to toggle between the logical and physical workspaces to design networks at different levels of abstraction. 4. Get familiar with features like the activity wizard, drawing palette, custom devices, and network information to build customized network scenarios.

Uploaded by

nauni
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
164 views

DCN Lab File

1. Explore the menu bar, main toolbar, common tools bar, and logical/physical workspace tabs to understand the main interface elements. 2. Study the different workspace tools like select, move, place note, delete, and inspect to manipulate network objects. 3. Learn how to toggle between the logical and physical workspaces to design networks at different levels of abstraction. 4. Get familiar with features like the activity wizard, drawing palette, custom devices, and network information to build customized network scenarios.

Uploaded by

nauni
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

DR.

AKHILESH DAS GUPTA INSTITUTE OF TECHNOLOGY & MANAGEMENT


Department of Information Technology

DATA COMMUNICATION NETWORK


LAB
Paper Code: ETEC-358

Submitted to: Submitted by:


Mr. Jogendra Kumar Student’s Name
Assistant Professor Enrollment No,
IT Dept.
INDEX
S.No Name of Program Date Signature

1. To study different types of network cables and practically


implement the cross-wired cable and straight through cable using
clamping tool.
2. To Study of Network Devices in Detail.
3. To Study of network IP
4. To study the IDE of CISCO Packet Tracer.
5. To Study basic network command and Network configuration
commands.
6. To study and perform PC to PC communication.
7. To create Star topology using Hub and Switch.
8. To create Bus, Ring, Tree, Hybrid, Mesh topologies.
9. Perform an initial Switch configuration.
10. Perform an initial Router configuration.
11. To implement Client Server Network.
12. To implement connection between devices using router.
13. To perform remote desktop sharing within LAN connection.
Experiment-1
Aim: Study of different types of Network cables and practically implement the cross-wired cable and
straight through cable using clamping tool.
Apparatus (Components): RJ-45 connector, Crimping Tool, Twisted pair Cable
Procedure: To do this practical, following steps should be done:
1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be very careful at
this point, as to not nick or cut into the wires, which are inside. Doing so could alter the characteristics of
your cable, or even worse render is useless. Check the wires, one more time for nicks or cuts. If there are
any, just whack the whole end off, and start over.
2. Spread the wires apart, but be sure to hold onto the base of the jacket with your other hand. You do
not want the wires to become untwisted down inside the jacket. Category 5 cable must only have 1/2 of
an inch of 'untwisted' wire at the end; otherwise, it will be 'out of spec'. At this point, you obviously have
ALOT more than 1/2 of an inch of un-twisted wire.
3. You have 2 end jacks, which must be installed on your cable. If you are using a pre-made cable, with
one of the ends whacked off, you only have one end to install - the crossed over end. Below are two
diagrams, which show how you need to arrange the cables for each type of cable end. Decide at this point
which end you are making and examine the associated picture below.

Fig.1 Diagram showing how to prepare Cross wired connection


Fig.2 Diagram showing how to prepare straight through wired connection
Experiment - 2

Aim: Study of following Network Devices in Detail


• Repeater
• Hub
• Switch
• Bridge
• Router
• Gate Way

Apparatus (Software): No software or hardware needed.

Procedure: Following should be done to understand this practical.


1. Repeater: Functioning at Physical Layer are repeater which is an electronic device that receives a
signal and retransmits it at a higher level and/or higher power, or onto the other side of an obstruction,
so that the signal can cover longer distances. Repeater have two ports, so cannot be use to connect for
more than two devices

2. Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator
is a device for connecting multiple twisted pair or fiber optic Ethernet devices together and making them
act as a single network segment. Hubs work at the physical layer (layer 1) of the OSI model. The device
is a form of multiport repeater. Repeater hubs also participate in collision detection, forwarding a jam
signal to all ports if it detects a collision.

3. Switch:A network switch or switching hub is a computer networking device that connects network
segments. The term commonly refers to a network bridge that processes and routes data at the data link
layer (layer 2) of the OSI model. Switches that additionally process data at the network layer (layer 3
and above) are often referred to as Layer 3 switches or multilayer switches.

4. Bridge: A network bridge connects multiple network segments at the data link layer (Layer
2) of the OSI model. In Ethernet networks, the term bridge formally means a device that behaves
according to the IEEE 802.1D standard. A bridge and switch are very much alike; a switch being a bridge
with numerous ports. Switch or Layer 2 switch is often used interchangeably with bridge .Bridges can
analyze incoming data packets to determine if the bridge is able to send the given packet to another
segment of the network.
5. Router: A router is an electronic device that interconnects two or more computer networks, and
selectively interchanges packets of data between them. Each data packet contains address information
that a router can use to determine if the source and destination are on the same network, or if the data
packet must be transferred from one network to another. Where multiple routers are used in a large
collection of interconnected networks, the routers exchange information about target system addresses,
so that each router can build up a table showing the preferred paths between any two systems on the
interconnected networks.

6. Gate Way: In a communications network, a network node equipped for interfacing with another
network that uses different protocols.
• A gateway may contain devices such as protocol translators, impedance matching devices, rate
converters, fault isolators, or signal translators as necessary to provide system interoperability. It
also requires the establishment of mutually acceptable administrative procedures between both
networks.
• A protocol translation/mapping gateway interconnects networks with different network protocol
technologies by performing the required protocol conversions.
Experiment - 3
Aim: Study of network IP
• Classification of IP address
• Sub netting
• Super netting

Apparatus (Software): NA
Procedure: Following is required to be study under this practical.
• Classification of IP address

Fig1. Classification of IP addresses and their uses


Class Address Range Supports
Class A 1.0.0.1 to 126.255.255.254 Supports 16 million hosts on each of 127 networks.
Class B 128.1.0.1 to 191.255.255.254 Supports 65,000 hosts on each of 16,000 networks.
Class C 192.0.1.1 to 223.255.254.254 Supports 254 hosts on each of 2 million networks.
Class D 224.0.0.0 to 239.255.255.255 Reserved for multicast groups.
Class E 240.0.0.0 to 254.255.255.254 Reserved.

• Sub netting
When a bigger network is divided into smaller networks, in order to maintain security, then that is known
as Subnetting.
1. To divide a network into four (22) parts you need to choose two bits from host id part for each
subnet i.e, (00, 01, 10, 11).
2. To divide a network into eight (23) parts you need to choose three bits from host id part for
each subnet i.e, (000, 001, 010, 011, 100, 101, 110, 111) and so on.

• Super netting
Supernetting is the opposite of Subnetting. In subnetting, a single big network is divided into multiple
smaller subnetworks. In Supernetting, multiple networks are combined into a bigger network termed as a
Supernetwork or Supernet. Supernetting is used to reduce the size of the IP routing table to improve
network routing efficiency.
Experiment - 4
Aim: To study the IDE of Cisco Packet Tracer.
Theory:

1. Menu Bar This bar provides the File, Edit, Options, View, Tools,
Extensions, and Help menus. You will find basic commands such
as Open, Save, Save as Pkz, Print, and Settings and Preferences
in these menus. You will also be able to access the Activity
Wizard from the Extensions menu.
2. Main Tool Bar This bar provides shortcut icons to the File and Edit menu commands.
This bar also provides buttons for Copy, Paste, Undo, Redo, Zoom, the
Drawing Palette, and the Custom Devices Dialog. On the right, you will
also find the Network Information button, which you can use to enter a
description for the current network (or any text you wish to include).
3. Common Tools Bar This bar provides access to these commonly used workspace tools:
Select, Move Layout, Place Note, Delete, Inspect, Resize Shape, Add
Simple PDU, and Add Complex PDU. See "Workspace Basics" for
more information.
4. Logical/Physical You can toggle between the Physical Workspace and the Logical
Workspace Workspace with the tabs on this bar. In Logical Workspace, this bar also
allows you to go back to a previous level in a cluster, create a New
Cluster, Move Object, Set Tiled Background, and Viewport. In
Physical Workspace, this bar allows you to navigate through physical
locations, create a New City, create a New Building, create a New
Closet, MoveObject, apply a Grid to the background, Set Background,
and go to the Working Closet.
5. Workspace This area is where you will create your network, watch simulations, and
view many kinds of information and statistics.
6. Realtime/Simulation You can toggle between Realtime Mode and Simulation Mode with the
Bar tabs on this bar. This bar also provides buttons to Power Cycle Devices
and Fast Forward Time as well as the Play Control buttons and the
Event List toggle button in Simulation Mode. Also, it contains a clock
that displays the relative Time in Realtime Mode and Simulation Mode.
7. Network Component This box is where you choose devices and connections to put into the
Box workspace. It contains the Device-Type Selection Box and the Device-
Specific Selection Box. There's a searchable field that allows you to enter
a device name to look for that specific device quickly. Device name
shows when you mouse over the device icon in the Device-Specific Box.
8. Device-Type This box contains the type of devices and connections available in Packet
Selection Box Tracer. The Device-Specific Selection Box will change depending on
which type of device you choose.
9. Device-Specific This box is where you choose specifically which devices you want to put
Selection Box in your network and which connections to make. In this box, you'll find
devices that may have already been obsolete. You have an option to hide
legacy equipment in the Preferences window under Options.
10. User Created This window manages the packets you put in the network during
Packet Window* simulation scenarios. See the "Simulation Mode" section for more details.
Packet Tracer supports a wide range of network connections. Each cable type can only
be connected to certain interface types.

Cable Type Description

Console connections can be made between PCs and routers or switches. Certain
conditions must be met for the console session from the PC to work: the speed on
Console
both sides of the connection must be the same, the data bits must be 7 for both or 8
for both, the parity must be the same, the stop bits must be 1 or 2 (but they do not
have to be the same), and the flow control can be anything for either side.

This cable type is the standard Ethernet media for connecting between devices that
operate at different OSI layers (such as hub to router, switch to PC, and router to hub).
Copper
It can be connected to the following port types: 10 Mbps Copper (Ethernet), 100 Mbps
Straight-
Copper (Fast Ethernet), and 1000 Mbps Copper (Gigabit Ethernet).
through

This cable type is the Ethernet media for connecting between devices that operate at
the same OSI layer (such as hub to hub, PC to PC, PC to printer). It can be connected
Copper Cross-
to the following port types: 10 Mbps Copper (Ethernet), 100 Mbps Copper (Fast
over Ethernet), and 1000 Mbps Copper (Gigabit Ethernet).

Fiber media is used to make connections between fiber ports (100 Mbps or 1000
Mbps).
Fiber

Phone line connections can only be made between devices with modem ports. The
standard application for modem connections is an end device (such as a PC) dialing
Phone
into a network cloud.

Coaxial media is used to make connections between coaxial ports such as a cable
modem connected to a Packet Tracer Cloud.
Coaxial

Serial connections, often used for WAN links, must be connected between serial ports.
Note that you must enable clocking on the DCE side to bring up the line protocol. The
Serial DCE
DTE clocking is optional. You can tell which end of the connection is the DCE side
and DTE by the small “clock” icon next to the port. If you choose the Serial DCE connection
type and then connect two devices, the first device will be the DCE side and the second
device will be automatically set to the DTE side. The reverse is true if you choose the
Serial DTE connection type.

The 8-port asynchronous cable provides the high-density connector on one end
and eight RJ-45 plugs on the other.
Octal

A cable for connecting Things, components, microcontrollers (MCU-PT), and single


board computers (SBC-PT). The cable bundles the ground, power, and data wires.
IoE
Custom
Cable

USB cable used for connecting Things, components, microcontrollers (MCU-PT),


and single board computers (SBC-PT) as a data connection.
USB
Experiment-5

Aim: Study of basic network command and Network configuration commands.


Apparatus (Software): Command Prompt and Packet Tracer.
Procedure: To do this EXPERIMENT- follows these steps:
In this EXPERIMENT- students have to understand basic networking commands e.g ping, tracert
etc. and all commands related to Network configuration which includes how to switch to privilege
mode and normal mode and how to configure router interface and how to save this configuration
to flash memory or permanent memory.
These commands include:
Ping:

Configuring the Router commands


• General Commands to configure network
• Privileged Mode commands of a router
• Router Processes & Statistics
• IP Commands
• Other IP Commands e.g. show ip route etc.

Traceroute: Tracert is a command which can show you the path a packet of information takes from your
computer to one you specify. It will list all the routers it passes through until it reaches its destination, or
fails to and is discarded. In addition to this, it will tell you how long each 'hop' from router to router takes.
nslookup:
Displays information from Domain Name System (DNS) name servers.
NOTE: If you write the command as above it shows as default your pc's server name firstly.
pathping:
A better version of tracert that gives you statics about packet lost and latency.
Getting Help

In any command mode, you can get a list of available commands by entering a question mark

(?). Router>?
To obtain a list of commands that begin with a particular character sequence, type in those haracters
followed immediately by the question mark (?).

Router#co?
configure connect copy
To list keywords or arguments, enter a question mark in place of a keyword or argument. Include a
space before the question mark.

Router#configure ?
memory Configure from NV memory network Configure from a TFTP network host terminal Configure
from the terminal
You can also abbreviate commands and keywords by entering just enough characters to make the
command unique from other commands. For example, you can abbreviate the show command to sh.
Configuration Files

Any time you make changes to the router configuration, you must save the changes to memory because
if you do not they will be lost if there is a system reload or power outage. There are two types of
configuration files: the running (current operating) configuration and the startup configuration.
Use the following privileged mode commands to work with configuration files.
Experiment -6
Aim: To study the PC to PC communication.
Theory:
Communication between two or more computer systems is achieved by setting up a network. The computer
systems are linked so that they can ‘talk’ to each other, share computing power and/or storage facilities.
The link may be between computers in one building, or it could be between computers in different parts of
the world. The term network includes the individual computer systems, the connections and the hardware
that allows communication to happen.
A network may include a dedicated file server. This is normally one computer in the network that has a
much higher specification than the others, with a very large hard disk drive. All data common to the network
will be held on the dedicated server. It will also monitor and control the network and while it is performing
this very important task, it will not be available for use as an interactive work station.
Procedure:
1. Start the Packet Tracer.
2. Select “End Devices” and then click at “Generic” and click at workspace to see the PC.Repeat the
process to place as many PCs as we want.
3. Choose the “Hub” and select “Generic”. After selecting it, click on the main area.
4. Select “Connections” from Power Cycle Devices and click on the wire to form a connection.
5. Draw connections from Hub to Pcs.
6. Double click on a PC, a box will appear, Click on the “Desktop” tab.
7. Then select “IP configuration”.
8. Write the IP address of the network and click at Subnet Mask filed. Subnet Mask will appear
automatically.
9. Repeat Step 8 to set IPs for all the PCs.
10. Select “Add simple message”.
11. Drag and Drop the message to the source device and then to the Destination device.
12. Select the Simulation Mode at the bottom right corner.
13. Click at “Auto Capture/Play”.
14. Observe the path of the Message from Source to Hub, then to all devices. And then from Destination
to Hub then back to the Source.
15. Finally observe the marks. If the Pc is marked correct it means we have successfully established the
connection.

Findings and Discussion:


Since communication has very important role in society as well as organisation or enterprises it is necessary
that we should have an accurate and fast method for communication. Here we need computers to provide
fast and efficiency manner for communication.
Now we have mobile phones, e-mails, fax and other many methods for providing good way to
communicate each other which cannot develop and work without computers. Let us take the
working of of an organisation. The communication between each and every level, between two or more
organisations are carrying through computers. If there are no computers it should cause big wastage of
time may cause wastage of data and so many other things.
Likewise, computer-based communication is necessary at every field whether it is hospitals or industry or
government. Without computers there may be large wastage of time, money and resources which may
cause great damages. Hence computer is necessary in communication and without that it is impossible to
provide a best way that fulfills the present requirements.
Result:
Connection established successfully between Source and Destination.
Experiment -7

Aim: To study to create a Star topology using Hub and Switch and differentiate between Switch and Hub.
Theory:
Star topology is one of the most common network setups. In this configuration, every node connects to a
central network device, like a hub, switch, or computer. The central network device acts as a server and the
peripheral devices act as clients. All the data on the star topology passes through the central device before
reaching the intended destination. Hub acts as a junction to connect different nodes present in Star Network,
and at the same time it manages and controls whole of the network. Depending on which central device is
used, “hub” can act as repeater or signal booster. Central device can also communicate with other hubs of
different network.
Hubs vs Switches:
Hubs and Switches are two terms that are used interchangeably when referring to the network component
that connects all the nodes in network. Even if most devices in existence today are switches, most people
still call them hubs and get away with it. The difference between the two types of devices is the overall
speed that they can broadcast data across the network. Switches are able to transmit data a lot faster
compared to hubs.
Hubs are very simplistic devices that accept a single data packet then sends it out to all the computers that
are connected to it. This means that only one data packet can pass through the hub at a time and all the data
must wait for its turn. The overall bandwidth of the router is then shared by all the computers and that
degrades the speed. This method often leads to a collision of data where a computer tries to send a packet of
data to the hub while it is broadcasting. In order to detect and correct such collisions, most hubs employ
added hardware that could slow down the total speed even more; an additional effect that it has is the limit
on the number of elements you can have on your network.
Switches do not broadcast the data to all the computers in the network. Whenever a computer wishes to
connect to another computer, the internal circuitry of the switch creates a bridge between the two; very
comparable to old telephone operators who operate switchboards. This means that multiple paths can exist in
the switch at the same time, making it possible for computers to send data at full speed regardless of what
other network elements are doing. Collisions do not happen on switches; this lifts the speed and element
limits seen on hubs.
Procedure:
Using Switch:-
1. Start the Packet Tracer.
2. Select “End Devices” and then click at “Generic” and click at workspace to see the PC
3. Repeat the process to place as many PCs as we want.
4. Choose the “Switches” and select “Generic”. After selecting it, click on the main area.
5. Select “Connections” from Power Cycle Devices and click on the
6. Draw connections from Hub to Pcs.
7. Set the IP address of all the devices connected to the Hub.
8. Select “Add simple message”.
9. Drag and Drop the message to the source device and then to the Destination device.
Using Hub :-
1. Start the Packet Tracer.
2. Select “End Devices” and then click at “Generic” and click at workspace to see the PC.Repeat the
process to place as many PCs as we want.
3. Choose the “Switch” and select “Generic”. After selecting it, click on the main area.
4. Select “Connections” from Power Cycle Devices and click on the
5. Draw connections from Hub to Pcs.
6. Set the IP address of all the devices connected to the Hub.
7. Select “Add simple message”.
8. Drag and Drop the message to the source device and then to the Destination device.

Findings and Discussion: Advantages of star topology -


1. Centralized management of the network, through the use of the central computer, hub, or switch.
2. Easy to add another computer to the network.
3. If one computer on the network fails, the rest of the network continues to function.

Disadvantages of star topology -


1. May have a higher cost to implement, especially when using a switch or router as the central network
device.
2. The central network device determines the performance and number of nodes the network can
handle. If the central computer, hub, or switch fails, the entire network goes down and all computers
are disconnected from the network.

Fig.1 Star Topology using Switch


Fig.2 Star Topology using Hub

Result:
Studied creating a Star topology using Hub and Switch and differentiating between Switch and Hub.
Experiment -8

Aim: To create Bus, Ring, Tree, Hybrid, Mesh topologies.


Theory:
Topology is basically a map of a network. The physical topology of a network describes the layout of the
cables and workstations and the location of all network components. it refers to the interconnected structure
of a local area network (LAN). The method employed to connect the physical devices on the network with
the cables, and the type of cabling used, all constitute the physical topology. This contrasts with logical
topology, which describes a network's media signal performance and how it exchanges device data.
The various Physical topologies are:
Bus Topology
In a bus topology, all computers are attached to a single continuous cable that is terminated at both ends,
which is the simplest way to create a physical network. Originally, computers were attached to the cable
with wire taps. This did not prove practical, so drop cables were used to attach computers to the main cable.
In 10Base-2 Ethernet, no drop cables are used, but instead, a “T” is inserted in the main cable wherever a
station needs to connect.
Ring Topology
In the ring topology, each computer is connected directly to two other computers in the network. Data
moves down a one-way path from one computer to another. The good news about laying out cable in a ring
is that the cable design is simple. The bad news is that, as with bus topology, any break, such as adding or
removing a computer, disrupts the entire network.
Mesh Topology
In a mesh topology, a path exists from each station to every other station in the network, resulting in the
most physical connections per node of any topology. While not usually seen in LANs, a variation on this
type of topology—the hybrid mesh—is used on the Internet and other WANs in a limited fashion. Hybrid
mesh topology networks can have multiple connections between some locations, but this is done only for
redundancy. In addition, it’s called a hybrid because other types of topologies might be mixed in as well.
Tree Topology
In a tree topology, is a special type of structure in which many connected elements are arranged like the
branches of a tree. For example, tree topologies are frequently used to organize the computers in a corporate
network, or the information in a database.
In a tree topology, there can be only one connection between any two connected nodes. Because any two
nodes can have only one mutual connection, tree topologies form a natural parent and child hierarchy.
Hybrid Topology
In a hybrid topology, it uses a combination of any two or more topologies in such a way that the resulting
network does not exhibit one of the standard topologies (e.g., bus, star, ring, etc.). For example, a tree
network connected to a tree network is still a tree network, but two-star networks connected together exhibit
a hybrid network topology. A hybrid topology is always produced when two different basic network
topologies are connected.
Procedure:
For Bus topology:
1. Start the Packet Tracer.
2. Select “End Devices” and then click at “Generic” and click at workspace to see the PC. Repeat the
process to place as many PCs as we want.
3. Choose the “Hub” and select “Generic”. After selecting it, click on the main area. Repeat the process
to place as many Hubs we want.
4. Select “Connections” from Power Cycle Devices and click on the wire to form connections
5. Draw connections from Hub to Pcs by connecting all Hubs in a straight line and connecting devices
to them.
6. Set the IP address of all the devices connected to the Hub.
7. Select “Add simple message”.
8. Drag and Drop the message to the source device and then to the Destination device.

Fig.1 Bus Topology

For Ring topology:


1. Start the Packet Tracer.
2. Select “End Devices” and then click at “Generic” and click at workspace to see the PC. Repeat the
process to place as many PCs as we want.
3. Choose the “Hub” and select “Generic”. After selecting it, click on the main area. Repeat the process
to place as many Hubs we want.
4. Select “Connections” from Power Cycle Devices and click on the wires to form a connection
5. Draw connections from Hub to Pcs by connecting all the Hubs/Switches in form of a ring and then
connecting the devices to them
6. Set the IP address of all the devices connected to the Hub.
7. Select “Add simple message”.
8. Drag and Drop the message to the source device and then to the Destination device.
Fig.2 Ring Topology

For Mesh topology:


1. Start the Packet Tracer.
2. Select “End Devices” and then click at “Generic” and click at workspace to see the PC. Repeat the
process to place as many PCs as we want.
3. Choose the “Hub” and select “Generic”. After selecting it, click on the main area. Repeat the process
to place as many Hubs we want.
4. Select “Connections” from Power Cycle Devices and click on the wires to form a connection.
5. Draw connections from Hub to Pcs by interconnecting all the Hubs/Switches with each other and
then connecting the devices to them.
6. Set the IP address of all the devices connected to the Hub.
7. Select “Add simple message”.
8. Drag and Drop the message to the source device and then to the Destination device.

Fig.3 Mesh Topology


For Tree topology:
1. Start the Packet Tracer.
2. Select “End Devices” and then click at “Generic” and click at workspace to see the PC. Repeat the
process to place as many PCs as we want.
3. Choose the “Hub” and select “Generic”. After selecting it, click on the main area. Repeat the process
to place as many Hubs we want.
4. Select “Connections” from Power Cycle Devices and click on the wires to form a connection.
5. Draw connections from Hub to Pcs by connecting all Hubs/Switches in form of a hierarchical tree
with a root Hub/Switch at top and then further dividing in others and connecting Pcs to them.
6. Set the IP address of all the devices connected to the Hub.
7. Select “Add simple message”.
8. Drag and Drop the message to the source device and then to the Destination device.

Fig.4 Tree Topology

For Hybrid topology:


1. Start the Packet Tracer.
2. Select “End Devices” and then click at “Generic” and click at workspace to see the PC. Repeat the
process to place as many PCs as we want.
3. Choose the “Hub” and select “Generic”. After selecting it, click on the main area. Repeat the process
to place as many Hubs we want.
4. Select “Connections” from Power Cycle Devices and click on the
5. Draw connections from Hub to Pcs by combining Hubs/Switches in a star topology with bus
topology and connecting Pcs to them.
6. Set the IP address of all the devices connected to the Hub.
7. Select “Add simple message”.
8. Drag and Drop the message to the source device and then to the Destination device.
Fig.5 Hybrid Topology

Findings and Discussion:


The physical topology of a network directly affects its capabilities. The choice of one
topology over another will have an impact on the following:

● Type of equipment the network needs


● Capabilities of the equipment
● Growth of the network
● The way the network is managed

Before computers can either share resources or perform other communications tasks, they must
be connected. Most networks use cable to connect one computer to another. It is not as simple
as just plugging a computer into a cable connecting other computers. There are many different
types of cable, network cards, network operating systems, and other components, all of which
require different types of arrangements.
Result: Studied about the bus, ring, mesh, tree, hybrid topologies and making connections among them
successfully.
Experiment-9
Aim: Performing an Initial Switch Configuration
Topology Diagram:

Objectives:
 Perform an initial configuration of a Cisco Catalyst 2960 switch.

Background/Preparation:
In this activity, you will configure these settings on the customer Cisco Catalyst 2960 switch:
 Host name
 Console password
 vty password
 Privileged EXEC mode password
 Privileged EXEC mode secret
 IP address on VLAN1 interface
 Default gateway

Procedure:
Step-1: Configure the switch host name.
1- Fromthe Customer PC, use a console cable and terminal emulation software to connect to the
console of the customer Cisco Catalyst 2960 switch.
2- Set the host name on the switch to CustomerSwitch using these commands.
Switch>enable
Switch#configure terminal
Switch(config)#hostname CustomerSwitch
Step-2: Configure the privileged mode password and secret.
1- From global configuration mode, configure the password as cisco.

CustomerSwitch(config)#enable password cisco


2- From global configuration mode, configure the secret password as cisco123.

CustomerSwitch(config)#enable secret cisco123

Step-3: Configure the console password.


1- From global configuration mode, switch to configuration mode to configure the console line.

CustomerSwitch(config)#line console 0
2- From the line configuration mode, set the password to cisco and require the password to be entered at
login.
CustomerSwitch(config-line)#password cisco
CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit

Step-4: Configure the vty password.


1- From global configuration mode, switch to configuration mode for the vty lines 0 through 15.

CustomerSwitch(config)#line vty 0 15
2- From the line configuration mode, set the password to cisco and require the password to be entered at
login.
CustomerSwitch(config-line)#password cisco
CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit

Step-5: Configure an IP address on interface VLAN1.


From global configuration mode, switch to interface configuration mode for VLAN1, and assign the IP
address 192.168.1.5 with the subnet mask of 255.255.255.0
CustomerSwitch(config)#interface vlan 1
CustomerSwitch(config)#ip address 192.168.1.5 255.255.255.0
CustomerSwitch(config)#no shutdown
CustomerSwitch(config-if)#exit

Step-6: Configure the default gateway.


1- From global configuration, assign the default gateway to 192.168.1.1.

CustomerSwitch(config)#ip default-gateway 192.168.1.1


2- Click the Check Results button at the bottom of this instruction window to check your work.

Step-7: Verify the configuration.


The customer switch should now be able to ping the ISP Server at 209.165.201.10. The first one or two
pings may fail while ARP converges.
CustomerSwitch(config)#end
CustomerSwitch#ping 209.165.201.10
Experiment-10
Aim: Performing an Initial Router Configuration
Topology Diagram:

Objectives:
 Configure the router host name.
 Configure passwords.
 Configure banner messages.
 Verify the router configuration.

Background/Preparation
In this activity, you will use the Cisco IOS CLI to apply an initial configuration to a
router, including host name, passwords, a message-of-the-day (MOTD) banner, and other
basic settings.

Procedure:
Step 1: Configure the router host name.
1-On Customer PC, use the terminal emulation software to connect to the console of the customer
Cisco 1841 ISR.
Set the host name on the router to CustomerRouter by using these commands.
Router>enable
Router#configure terminal
Router(config)#hostname CustomerRouter

Step 2: Configure the privileged mode and secret passwords.


1-In global configuration mode, set the password to cisco.
CustomerRouter(config)#enable password cisco
Set an encrypted privileged password to cisco123 using the secret command.
CustomerRouter(config)#enable secret cisco123

Step 3: Configure the console password.


1-In global configuration mode, switch to line configuration mode to specify the console line.
CustomerRouter(config)#line console 0
Set the password to cisco123, require that the password be entered at login, and then exit line configuration
mode.

CustomerRouter(config-line)#password cisco123
CustomerRouter(config-line)#login
CustomerRouter(config-line)#exit
CustomerRouter(config)#

Step 4: Configure the vty password to allow Telnet


access to the router.
1-In global configuration mode, switch to line configuration mode to specify the vty lines.
CustomerRouter(config)#line vty 0 4
Set the password to cisco123, require that the password be entered at login, exit line configuration mode,
and then exit the configuration session.

CustomerRouter(config-line)#password cisco123
CustomerRouter(config-line)#login
CustomerRouter(config-line)#exit
CustomerRouter(config)#

Step 5: Configure password encryption, a MOTD


banner, and turn off domain server lookup.
1- Currently, the line passwords and the enable password are shown in clear text when you
showthe running configuration. Verify this now by entering the show running-config
command.
To avoid the security risk of someone looking over your shoulder and reading the passwords,
encrypt all clear text passwords.
CustomerRouter(config)#service password-encryption
Use the show running-config command again to verify that the passwords are encrypted.
To provide a warning when someone attempts to log in to the router, configure a MOTD banner.
CustomerRouter(config)#banner motd $Authorized Access Only!$
Test the banner and passwords. Log out of the router by typing the exit command twice. The
banner displays before the prompt for a password. Enter the password to log back into the router.
You may have noticed that when you enter a command incorrectly at the user or privileged EXEC
prompt, the router pauses while trying to locate an IP address for the mistyped word you entered.
For example, this output shows what happens when the enable command is mistyped.

CustomerRouter>emable
Translating "emable"...domain server (255.255.255.255)
To prevent this from happening, use the following command to stop all DNS lookups from the
router CLI.
CustomerRouter(config)#no ip domain-lookup
Save the running configuration to the startup configuration.

CustomerRouter(config)#end
CustomerRouter#copy run start

Step 6: Verify the configuration.


a. Log out of your terminal session with the Cisco 1841 customer router.
b. Log in to the Cisco 1841 Customer Router. Enter the console password when prompted.
c. Navigate to privileged EXEC mode. Enter the privileged EXEC password when prompted.
d. Click the Check Results button at the bottom of this instruction window to check your work.
Experimant-11

Aim: To implement Client Server Network.


Theory:
A Computer networking model where one or more powerful computers (servers) provide
the different computer network services and all other user'of computer network (clients)
access those services to perform user's tasks is known as client/server computer networking
model. In such networks, there exists a central controller called server. A server is a
specialized computer that controls the network resources and provides services to other
computers in the network.All other computers in the network are called clients. A client
computer receives the requested services from a server.A server performs all the major
operations like security and network management.All the clients communicate with each
other via centralized server.
In a small network generally, there stays one server and one and more clients. Desktop PCs
or Laptop PCs can be used as client. The client generally request service from the server
and server serves that request as per requested. The server can be different types like web
server, mail server, DNS server, File transfer server or file server, or file server etc. types.

Procedure:
1. Start the Packet Tracer.
2. Select “End Devices” and then click at “Generic” and click at workspace to see the
PC.Repeat the process to place as many PCs as we want.
3. Choose the “Switch” and select “2950-24” as well as “Generic” from “End Devices”.
After selecting it, click on the main area.
4. Select “Connections” from Power Cycle Devices and click on the wire to form a connection.
5. Now go to Server -> Config -> FastEthernet0 ->Static. IP Address – 192.168.1.1
Subnet Mask – 255.255.255.0 Status – on
6. Now go to Services -> DHCP -> Service on’ Default Gateway – 192.168.1.1
Start IP – 192.168.1.101
Subnet Mask – 255.255.255.0 Maximum no. of users – 24 Then click on Save
7. now go to Config -> Global Settings Gateway – 192.168.1.1
8. now go to all the PCs ->Desktop -> IP config -> DHCP(.)

Result;
Impementation of Client Serve Network done.
Findings and Disscussion:
Advantages of Client Server Networks
1. Centralized back up is possible.
2. Use of dedicated server improves the performance of whole system.
3. Security is better in these networks as all the shared resources are centrally administered.
4. Use of dedicated servers also increases the speed of sharing resources.

Disadvantages of Client Server Networks


1. It requires specialized servers with large memory and secondary storage. This leads to
increase in the cost.
2. The cost of network operating system that manages the various clients is also high.

3. It requires dedicated network administrator.


Experiment-12
Aim: To implement connection between devices using router.
Software Required: CISCO Packet Tracer.
Procedure:
1- We need two PCB, a router and two crossover cable to connect them. We use cross over cable to connect
PC to a router because they both use the same pins for transmission and receiving of data.
2- Now, we will connect them by selecting fast ethernet interfaces on both ends.
Similarly, on the PC side, we will select fast ethernet interface.
3- Now, we have connected the devices. Further We will go to the router CLI mode and enter the following
commands-
a- Access interface one by one.
b- B- Assign IP addresses to interfaces.
c- Change the status of the interfaces i.e. from down to up.
d- Assign IP addresses to PC’s.
e- Assign default gateway. To PCs.

4- Now we have accessed both interfaces one by one and we have assigned IP address respectively.
5-It can be sent that lengths have changed the colour from red to green.
6- Green colour indicates that connection has been established and any data can be sent from source to
destination.
7- Select the message and put it on the source.
8- Now, our communication is enabled and we are able to communicate from PC0 to PC1 via router.
9- Once all the connection setup click on the simulation icon.

Result:

The connection is setup between the devices through router.


Experiment-13
Aim: To perform remote desktop sharing withing LAN connection.
Steps:
 Making the system available for remote desktop connection:

1- Go to My Computer settings.
2- Click Remote settings.
3- Select allow Remote Assistance connections to the computer.
4- Select allow connections only from computers running remote desktop with network level authentication.
5- Click apply and then OK.
 Remote desktop sharing:

1- Click start and select all programs.


2- Search and select accessories.
3- Select remote desktop Connections.
4- Enter Local ID : The system IP address we want to connect.
Eg- \\\ 10.12.11.35 and then select connect.
After Remote Desktop Connection has been established , the system of other IP address to which connection
has been made will be log out automatically.

You might also like