DCN Lab File
DCN Lab File
2. Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator
is a device for connecting multiple twisted pair or fiber optic Ethernet devices together and making them
act as a single network segment. Hubs work at the physical layer (layer 1) of the OSI model. The device
is a form of multiport repeater. Repeater hubs also participate in collision detection, forwarding a jam
signal to all ports if it detects a collision.
3. Switch:A network switch or switching hub is a computer networking device that connects network
segments. The term commonly refers to a network bridge that processes and routes data at the data link
layer (layer 2) of the OSI model. Switches that additionally process data at the network layer (layer 3
and above) are often referred to as Layer 3 switches or multilayer switches.
4. Bridge: A network bridge connects multiple network segments at the data link layer (Layer
2) of the OSI model. In Ethernet networks, the term bridge formally means a device that behaves
according to the IEEE 802.1D standard. A bridge and switch are very much alike; a switch being a bridge
with numerous ports. Switch or Layer 2 switch is often used interchangeably with bridge .Bridges can
analyze incoming data packets to determine if the bridge is able to send the given packet to another
segment of the network.
5. Router: A router is an electronic device that interconnects two or more computer networks, and
selectively interchanges packets of data between them. Each data packet contains address information
that a router can use to determine if the source and destination are on the same network, or if the data
packet must be transferred from one network to another. Where multiple routers are used in a large
collection of interconnected networks, the routers exchange information about target system addresses,
so that each router can build up a table showing the preferred paths between any two systems on the
interconnected networks.
6. Gate Way: In a communications network, a network node equipped for interfacing with another
network that uses different protocols.
• A gateway may contain devices such as protocol translators, impedance matching devices, rate
converters, fault isolators, or signal translators as necessary to provide system interoperability. It
also requires the establishment of mutually acceptable administrative procedures between both
networks.
• A protocol translation/mapping gateway interconnects networks with different network protocol
technologies by performing the required protocol conversions.
Experiment - 3
Aim: Study of network IP
• Classification of IP address
• Sub netting
• Super netting
Apparatus (Software): NA
Procedure: Following is required to be study under this practical.
• Classification of IP address
• Sub netting
When a bigger network is divided into smaller networks, in order to maintain security, then that is known
as Subnetting.
1. To divide a network into four (22) parts you need to choose two bits from host id part for each
subnet i.e, (00, 01, 10, 11).
2. To divide a network into eight (23) parts you need to choose three bits from host id part for
each subnet i.e, (000, 001, 010, 011, 100, 101, 110, 111) and so on.
• Super netting
Supernetting is the opposite of Subnetting. In subnetting, a single big network is divided into multiple
smaller subnetworks. In Supernetting, multiple networks are combined into a bigger network termed as a
Supernetwork or Supernet. Supernetting is used to reduce the size of the IP routing table to improve
network routing efficiency.
Experiment - 4
Aim: To study the IDE of Cisco Packet Tracer.
Theory:
1. Menu Bar This bar provides the File, Edit, Options, View, Tools,
Extensions, and Help menus. You will find basic commands such
as Open, Save, Save as Pkz, Print, and Settings and Preferences
in these menus. You will also be able to access the Activity
Wizard from the Extensions menu.
2. Main Tool Bar This bar provides shortcut icons to the File and Edit menu commands.
This bar also provides buttons for Copy, Paste, Undo, Redo, Zoom, the
Drawing Palette, and the Custom Devices Dialog. On the right, you will
also find the Network Information button, which you can use to enter a
description for the current network (or any text you wish to include).
3. Common Tools Bar This bar provides access to these commonly used workspace tools:
Select, Move Layout, Place Note, Delete, Inspect, Resize Shape, Add
Simple PDU, and Add Complex PDU. See "Workspace Basics" for
more information.
4. Logical/Physical You can toggle between the Physical Workspace and the Logical
Workspace Workspace with the tabs on this bar. In Logical Workspace, this bar also
allows you to go back to a previous level in a cluster, create a New
Cluster, Move Object, Set Tiled Background, and Viewport. In
Physical Workspace, this bar allows you to navigate through physical
locations, create a New City, create a New Building, create a New
Closet, MoveObject, apply a Grid to the background, Set Background,
and go to the Working Closet.
5. Workspace This area is where you will create your network, watch simulations, and
view many kinds of information and statistics.
6. Realtime/Simulation You can toggle between Realtime Mode and Simulation Mode with the
Bar tabs on this bar. This bar also provides buttons to Power Cycle Devices
and Fast Forward Time as well as the Play Control buttons and the
Event List toggle button in Simulation Mode. Also, it contains a clock
that displays the relative Time in Realtime Mode and Simulation Mode.
7. Network Component This box is where you choose devices and connections to put into the
Box workspace. It contains the Device-Type Selection Box and the Device-
Specific Selection Box. There's a searchable field that allows you to enter
a device name to look for that specific device quickly. Device name
shows when you mouse over the device icon in the Device-Specific Box.
8. Device-Type This box contains the type of devices and connections available in Packet
Selection Box Tracer. The Device-Specific Selection Box will change depending on
which type of device you choose.
9. Device-Specific This box is where you choose specifically which devices you want to put
Selection Box in your network and which connections to make. In this box, you'll find
devices that may have already been obsolete. You have an option to hide
legacy equipment in the Preferences window under Options.
10. User Created This window manages the packets you put in the network during
Packet Window* simulation scenarios. See the "Simulation Mode" section for more details.
Packet Tracer supports a wide range of network connections. Each cable type can only
be connected to certain interface types.
Console connections can be made between PCs and routers or switches. Certain
conditions must be met for the console session from the PC to work: the speed on
Console
both sides of the connection must be the same, the data bits must be 7 for both or 8
for both, the parity must be the same, the stop bits must be 1 or 2 (but they do not
have to be the same), and the flow control can be anything for either side.
This cable type is the standard Ethernet media for connecting between devices that
operate at different OSI layers (such as hub to router, switch to PC, and router to hub).
Copper
It can be connected to the following port types: 10 Mbps Copper (Ethernet), 100 Mbps
Straight-
Copper (Fast Ethernet), and 1000 Mbps Copper (Gigabit Ethernet).
through
This cable type is the Ethernet media for connecting between devices that operate at
the same OSI layer (such as hub to hub, PC to PC, PC to printer). It can be connected
Copper Cross-
to the following port types: 10 Mbps Copper (Ethernet), 100 Mbps Copper (Fast
over Ethernet), and 1000 Mbps Copper (Gigabit Ethernet).
Fiber media is used to make connections between fiber ports (100 Mbps or 1000
Mbps).
Fiber
Phone line connections can only be made between devices with modem ports. The
standard application for modem connections is an end device (such as a PC) dialing
Phone
into a network cloud.
Coaxial media is used to make connections between coaxial ports such as a cable
modem connected to a Packet Tracer Cloud.
Coaxial
Serial connections, often used for WAN links, must be connected between serial ports.
Note that you must enable clocking on the DCE side to bring up the line protocol. The
Serial DCE
DTE clocking is optional. You can tell which end of the connection is the DCE side
and DTE by the small “clock” icon next to the port. If you choose the Serial DCE connection
type and then connect two devices, the first device will be the DCE side and the second
device will be automatically set to the DTE side. The reverse is true if you choose the
Serial DTE connection type.
The 8-port asynchronous cable provides the high-density connector on one end
and eight RJ-45 plugs on the other.
Octal
Traceroute: Tracert is a command which can show you the path a packet of information takes from your
computer to one you specify. It will list all the routers it passes through until it reaches its destination, or
fails to and is discarded. In addition to this, it will tell you how long each 'hop' from router to router takes.
nslookup:
Displays information from Domain Name System (DNS) name servers.
NOTE: If you write the command as above it shows as default your pc's server name firstly.
pathping:
A better version of tracert that gives you statics about packet lost and latency.
Getting Help
In any command mode, you can get a list of available commands by entering a question mark
(?). Router>?
To obtain a list of commands that begin with a particular character sequence, type in those haracters
followed immediately by the question mark (?).
Router#co?
configure connect copy
To list keywords or arguments, enter a question mark in place of a keyword or argument. Include a
space before the question mark.
Router#configure ?
memory Configure from NV memory network Configure from a TFTP network host terminal Configure
from the terminal
You can also abbreviate commands and keywords by entering just enough characters to make the
command unique from other commands. For example, you can abbreviate the show command to sh.
Configuration Files
Any time you make changes to the router configuration, you must save the changes to memory because
if you do not they will be lost if there is a system reload or power outage. There are two types of
configuration files: the running (current operating) configuration and the startup configuration.
Use the following privileged mode commands to work with configuration files.
Experiment -6
Aim: To study the PC to PC communication.
Theory:
Communication between two or more computer systems is achieved by setting up a network. The computer
systems are linked so that they can ‘talk’ to each other, share computing power and/or storage facilities.
The link may be between computers in one building, or it could be between computers in different parts of
the world. The term network includes the individual computer systems, the connections and the hardware
that allows communication to happen.
A network may include a dedicated file server. This is normally one computer in the network that has a
much higher specification than the others, with a very large hard disk drive. All data common to the network
will be held on the dedicated server. It will also monitor and control the network and while it is performing
this very important task, it will not be available for use as an interactive work station.
Procedure:
1. Start the Packet Tracer.
2. Select “End Devices” and then click at “Generic” and click at workspace to see the PC.Repeat the
process to place as many PCs as we want.
3. Choose the “Hub” and select “Generic”. After selecting it, click on the main area.
4. Select “Connections” from Power Cycle Devices and click on the wire to form a connection.
5. Draw connections from Hub to Pcs.
6. Double click on a PC, a box will appear, Click on the “Desktop” tab.
7. Then select “IP configuration”.
8. Write the IP address of the network and click at Subnet Mask filed. Subnet Mask will appear
automatically.
9. Repeat Step 8 to set IPs for all the PCs.
10. Select “Add simple message”.
11. Drag and Drop the message to the source device and then to the Destination device.
12. Select the Simulation Mode at the bottom right corner.
13. Click at “Auto Capture/Play”.
14. Observe the path of the Message from Source to Hub, then to all devices. And then from Destination
to Hub then back to the Source.
15. Finally observe the marks. If the Pc is marked correct it means we have successfully established the
connection.
Aim: To study to create a Star topology using Hub and Switch and differentiate between Switch and Hub.
Theory:
Star topology is one of the most common network setups. In this configuration, every node connects to a
central network device, like a hub, switch, or computer. The central network device acts as a server and the
peripheral devices act as clients. All the data on the star topology passes through the central device before
reaching the intended destination. Hub acts as a junction to connect different nodes present in Star Network,
and at the same time it manages and controls whole of the network. Depending on which central device is
used, “hub” can act as repeater or signal booster. Central device can also communicate with other hubs of
different network.
Hubs vs Switches:
Hubs and Switches are two terms that are used interchangeably when referring to the network component
that connects all the nodes in network. Even if most devices in existence today are switches, most people
still call them hubs and get away with it. The difference between the two types of devices is the overall
speed that they can broadcast data across the network. Switches are able to transmit data a lot faster
compared to hubs.
Hubs are very simplistic devices that accept a single data packet then sends it out to all the computers that
are connected to it. This means that only one data packet can pass through the hub at a time and all the data
must wait for its turn. The overall bandwidth of the router is then shared by all the computers and that
degrades the speed. This method often leads to a collision of data where a computer tries to send a packet of
data to the hub while it is broadcasting. In order to detect and correct such collisions, most hubs employ
added hardware that could slow down the total speed even more; an additional effect that it has is the limit
on the number of elements you can have on your network.
Switches do not broadcast the data to all the computers in the network. Whenever a computer wishes to
connect to another computer, the internal circuitry of the switch creates a bridge between the two; very
comparable to old telephone operators who operate switchboards. This means that multiple paths can exist in
the switch at the same time, making it possible for computers to send data at full speed regardless of what
other network elements are doing. Collisions do not happen on switches; this lifts the speed and element
limits seen on hubs.
Procedure:
Using Switch:-
1. Start the Packet Tracer.
2. Select “End Devices” and then click at “Generic” and click at workspace to see the PC
3. Repeat the process to place as many PCs as we want.
4. Choose the “Switches” and select “Generic”. After selecting it, click on the main area.
5. Select “Connections” from Power Cycle Devices and click on the
6. Draw connections from Hub to Pcs.
7. Set the IP address of all the devices connected to the Hub.
8. Select “Add simple message”.
9. Drag and Drop the message to the source device and then to the Destination device.
Using Hub :-
1. Start the Packet Tracer.
2. Select “End Devices” and then click at “Generic” and click at workspace to see the PC.Repeat the
process to place as many PCs as we want.
3. Choose the “Switch” and select “Generic”. After selecting it, click on the main area.
4. Select “Connections” from Power Cycle Devices and click on the
5. Draw connections from Hub to Pcs.
6. Set the IP address of all the devices connected to the Hub.
7. Select “Add simple message”.
8. Drag and Drop the message to the source device and then to the Destination device.
Result:
Studied creating a Star topology using Hub and Switch and differentiating between Switch and Hub.
Experiment -8
Before computers can either share resources or perform other communications tasks, they must
be connected. Most networks use cable to connect one computer to another. It is not as simple
as just plugging a computer into a cable connecting other computers. There are many different
types of cable, network cards, network operating systems, and other components, all of which
require different types of arrangements.
Result: Studied about the bus, ring, mesh, tree, hybrid topologies and making connections among them
successfully.
Experiment-9
Aim: Performing an Initial Switch Configuration
Topology Diagram:
Objectives:
Perform an initial configuration of a Cisco Catalyst 2960 switch.
Background/Preparation:
In this activity, you will configure these settings on the customer Cisco Catalyst 2960 switch:
Host name
Console password
vty password
Privileged EXEC mode password
Privileged EXEC mode secret
IP address on VLAN1 interface
Default gateway
Procedure:
Step-1: Configure the switch host name.
1- Fromthe Customer PC, use a console cable and terminal emulation software to connect to the
console of the customer Cisco Catalyst 2960 switch.
2- Set the host name on the switch to CustomerSwitch using these commands.
Switch>enable
Switch#configure terminal
Switch(config)#hostname CustomerSwitch
Step-2: Configure the privileged mode password and secret.
1- From global configuration mode, configure the password as cisco.
CustomerSwitch(config)#line console 0
2- From the line configuration mode, set the password to cisco and require the password to be entered at
login.
CustomerSwitch(config-line)#password cisco
CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit
CustomerSwitch(config)#line vty 0 15
2- From the line configuration mode, set the password to cisco and require the password to be entered at
login.
CustomerSwitch(config-line)#password cisco
CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit
Objectives:
Configure the router host name.
Configure passwords.
Configure banner messages.
Verify the router configuration.
Background/Preparation
In this activity, you will use the Cisco IOS CLI to apply an initial configuration to a
router, including host name, passwords, a message-of-the-day (MOTD) banner, and other
basic settings.
Procedure:
Step 1: Configure the router host name.
1-On Customer PC, use the terminal emulation software to connect to the console of the customer
Cisco 1841 ISR.
Set the host name on the router to CustomerRouter by using these commands.
Router>enable
Router#configure terminal
Router(config)#hostname CustomerRouter
CustomerRouter(config-line)#password cisco123
CustomerRouter(config-line)#login
CustomerRouter(config-line)#exit
CustomerRouter(config)#
CustomerRouter(config-line)#password cisco123
CustomerRouter(config-line)#login
CustomerRouter(config-line)#exit
CustomerRouter(config)#
CustomerRouter>emable
Translating "emable"...domain server (255.255.255.255)
To prevent this from happening, use the following command to stop all DNS lookups from the
router CLI.
CustomerRouter(config)#no ip domain-lookup
Save the running configuration to the startup configuration.
CustomerRouter(config)#end
CustomerRouter#copy run start
Procedure:
1. Start the Packet Tracer.
2. Select “End Devices” and then click at “Generic” and click at workspace to see the
PC.Repeat the process to place as many PCs as we want.
3. Choose the “Switch” and select “2950-24” as well as “Generic” from “End Devices”.
After selecting it, click on the main area.
4. Select “Connections” from Power Cycle Devices and click on the wire to form a connection.
5. Now go to Server -> Config -> FastEthernet0 ->Static. IP Address – 192.168.1.1
Subnet Mask – 255.255.255.0 Status – on
6. Now go to Services -> DHCP -> Service on’ Default Gateway – 192.168.1.1
Start IP – 192.168.1.101
Subnet Mask – 255.255.255.0 Maximum no. of users – 24 Then click on Save
7. now go to Config -> Global Settings Gateway – 192.168.1.1
8. now go to all the PCs ->Desktop -> IP config -> DHCP(.)
Result;
Impementation of Client Serve Network done.
Findings and Disscussion:
Advantages of Client Server Networks
1. Centralized back up is possible.
2. Use of dedicated server improves the performance of whole system.
3. Security is better in these networks as all the shared resources are centrally administered.
4. Use of dedicated servers also increases the speed of sharing resources.
4- Now we have accessed both interfaces one by one and we have assigned IP address respectively.
5-It can be sent that lengths have changed the colour from red to green.
6- Green colour indicates that connection has been established and any data can be sent from source to
destination.
7- Select the message and put it on the source.
8- Now, our communication is enabled and we are able to communicate from PC0 to PC1 via router.
9- Once all the connection setup click on the simulation icon.
Result:
1- Go to My Computer settings.
2- Click Remote settings.
3- Select allow Remote Assistance connections to the computer.
4- Select allow connections only from computers running remote desktop with network level authentication.
5- Click apply and then OK.
Remote desktop sharing: