0% found this document useful (0 votes)
25 views

CN Record

The document outlines 11 experiments related to studying networking commands, network cables, data link layer protocols like bit stuffing and character stuffing, configuring networks and devices, and observing routing protocols. It provides details on implementing each experiment including objectives, components, procedures, code samples, and outputs. The experiments cover fundamental networking concepts and hands-on practice with network configuration and protocols.

Uploaded by

sudhaaass
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

CN Record

The document outlines 11 experiments related to studying networking commands, network cables, data link layer protocols like bit stuffing and character stuffing, configuring networks and devices, and observing routing protocols. It provides details on implementing each experiment including objectives, components, procedures, code samples, and outputs. The experiments cover fundamental networking concepts and hands-on practice with network configuration and protocols.

Uploaded by

sudhaaass
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 35

POINTER:

EX DATE NAME OF THE EXPERIMENT PAG REMARK


P E NO S
NO
1 Study of Networking Commands (Ping, Tracert, 1
TELNET, nslookup, netstat, ARP) and Network
Configuration Files.
2 Study of different types of network cables and 2-3
practically implement the cross wired cable and
straight through cable using crimping tool.
3 Implementing Data link layer farming methods such as 4-8
bit stuffing and character stuffing.
4 Connect the computers in LAN network. 9
5 Study and practice basic network command and 10-13
network configuration commands using packet
tracer.

6 Performing initial Switch and Router configuration 14-19


using packet tracer.

7 Configure a network topology using packet tracer 20-26


software using two different net- works.

8 Configure a network topology using RIP protocol. 27-28

9 Configure a network topology using link state vector 29


routing protocol.
10 Observing static routing and dynamic routing using 30-31
packet tracer.
11 Static NAT configuration using cisco packet tracer. 32-33
EXPERIMENT-1

AIM: Study of Networking Commands (Ping, Tracert, TELNET, nslookup, netstat, ARP) and
Network Configuration Files

C:\>arp –a: ARP is short form of address resolution protocol, It will show the IP address of your
computer along with the IP address and MAC address of your router.
C:\>hostname: This is the simplest of all TCP/IP commands. It simply displays the name of your
computer.
C:\>ipconfig: The ipconfig command displays information about the host (the computer your
sitting at)computer TCP/IP configuration.
C:\>ipconfig /all: This command displays detailed configuration information about your TCP/IP
connection including Router, Gateway, DNS, DHCP, and type of Ethernet adapter in your
system.
C:\>Ipconfig /renew: Using this command will renew all your IP addresses that you are currently
(leasing) borrowing from the DHCP server. This command is a quick problem solver if you are
having connection issues, but does not work if you have been configured with a static IP address.
C:\>Ipconifg /release: This command allows you to drop the IP lease from the DHCP server.
C:\>ipconfig /flushdns: This command is only needed if you’re having trouble with your networks
DNS configuration. The best time to use this command is after network configuration frustration sets
in, and you really need the computer to reply with flushed.
C:\>nbtstat –a: This command helps solve problems with NetBIOS name resolution. (Nbt stands
for NetBIOS over TCP/IP)
C:\>netdiag: Netdiag is a network testing utility that performs a variety of network diagnostic tests,
allowing you to pinpoint problems in your network. Netdiag isn’t installed by default, but can be
installed from the Windows XP CD after saying no to the install. Navigate to the CD ROM drive
letter and open the support\tools folder on the XP
CD and click the setup.exe icon in the support\tools folder.
C:\>netstat: Netstat displays a variety of statistics about a computers active TCP/IP connections. This
tool is most useful when you’re having trouble with TCP/IP applications such as HTTP, and FTP.
C:\>nslookup: Nslookup is used for diagnosing DNS problems. If you can access a resource by
specifying an IP address but not it’s DNS you have a DNS problem.
C:\>pathping: Pathping is unique to Window’s, and is basically a combination of the Ping and
Tracert commands. Pathping traces the route to the destination address then launches a 25 second test
of each router along the way, gathering statistics on the rate of data loss along each hop.
C:\>ping: Ping is the most basic TCP/IP command, and it’s the same as placing a phone call to your
best friend. You pick up your telephone and dial a number, expecting your best friend to reply with
“Hello” on the other end. Computers make phone calls to each other over a network by using a Ping
command. The Ping commands main purpose is to place a phone call to another computer on the
network, and request an answer. Ping has 2 options it can use to place a phone call to another
computer on the network. It can use the computers name or IP address.
C:\>route: The route command displays the computers routing table. A typical computer, with a
single network interface, connected to a LAN, with a router is fairly simple and generally doesn’t
pose any network problems. But if you’re having trouble
accessing other computers on your network, you can use the route command to make sure the entries
in the routing table are correct.
C:\>tracert: The tracert command displays a list of all the routers that a packet has to go through to
get from the computer where tracert is run to any other computer on the
internet.

RESULT
Thus the above list of primitive has been studied.
EXPERIMENT-2

Aim: Study of different types of Network cables and practically implements the cross-wired cable and
straight through cable using clamping tool.

Apparatus (Components): RJ-45 connector, Climping Tool, Twisted pair Cable

Procedure: To do these practical following steps should be done:

1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be very careful at
this point, as to not nick or cut into the wires, which are inside. Doing so could alter the characteristics
of your cable, or even worse render is useless. Check the wires, one more time for nicks or cuts.
If there are any, just whack the whole end off, and start over.

2. Spread the wires apart, but be sure to hold onto the base of the jacket with your other hand. You do
not want the wires to become untwisted down inside the jacket. Category 5 cable must only have 1/2
of an inch of 'untwisted' wire at the end; otherwise it will be 'out of spec'. At this point, you obviously
have ALOT more than 1/2 of an inch of un-twisted wire.

3. You have 2 end jacks, which must be installed on your cable. If you are using a pre-made cable,
with one of the ends whacked off, you only have one end to install - the crossed over end. Below
are two diagrams, which show how you need to arrange the cables for each type of cable end. Decide
at this point which end you are making and examine the associated picture below.

 Diagram shows you how to prepare straight through wired connection

Green-White

Gree

n Orange-

White

Bl

ue Blue-

White

Oran

ge Brown-

White

Brown
 Diagram shows you how to prepare Cross wired connection

Green-White
Green
Orange-White
Blue
Blue-White
Orange
Brown-White
Brown

 Ethernet Cable Tips:

 A straight-thru cable has identical ends.


 A crossover cable has different ends.
 A straight-thru is used as a patch cord in Ethernet connections.
 A crossover is used to connect two Ethernet devices without a hub or for connecting
two hubs.
 A crossover has one end with the Orange set of wires switched with the Green set.
 Odd numbered pins are always striped; even numbered pins are always solid coloured.
 Looking at the RJ-45 with the clip facing away from you, Brown is always on the
right, and pin 1 is on the left.
 No more than 1/2" of the Ethernet cable should be untwisted otherwise it will be
susceptible to crosstalk.
 Do not deform, do not bend, do not stretch, do not staple, do not run parallel with
power cables, and do not run Ethernet cables near noise inducing components.
EXPERIMENT-3

AIM: Implementing Data link layer farming methods such as bit stuffing and character stuffing.

Bit Stuffing

SOURCE CODE:

#include<stdio.h>
#include<string.h>
int main()
{
int a[20],b[30],i,j,k,count,n;
printf("\n \n \t \t Dept of Artificial Intelligence And Machine Learning.**(SCET)**\n\t\n20CS5L01-
COMPUTER NETWORKS LAB\n \t\t--**Bit Stuffing**--\n");

printf("Enter frame size (Example: 8):");


scanf("%d",&n);
printf("Enter the frame in the form of 0 and 1 :");
for(i=0; i<n; i++)
scanf("%d",&a[i]);
i=0;
count=1;
j=0;
while(i<n)
{
if(a[i]==1)
{
b[j]=a[i];
for(k=i+1; a[k]==1 && k<n && count<5; k++)
{
j++;
b[j]=a[k];
count++;
if(count==5)
{
j++;
b[j]=0;
}
i=k;
}
}
else
{
b[j]=a[i];
}
i++;
j++;
}
printf("After Bit Stuffing :");
for(i=0; i<j; i++)
printf("%d",b[i]);
return 0;
}
OUTPUT:
Character Stuffing:

Source Code:
#include<stdio.h>
#include<string.h>
int main()
{
char a[30], fs[50] = " ", t[3], sd, ed, x[3], s[3], d[3], y[3];
int i, j, p = 0, q = 0;
printf("\n \n \t \t Dept of Artificial Intelligence And Machine Learning .**(SCET)**\n\t\n\t\t
20CS5L01-COMPUTER NETWORKS LAB\n \t\t--**Character Stuffing**--\n");
printf(" \t\tEnter characters to be stuffed:");
scanf("%s", a);
printf("\n \t\tEnter a character that represents starting delimiter:"
);
scanf(" %c", &sd);
printf("\n \t\tEnter a character that represents ending delimiter:");
scanf(" %c", &ed);
x[0] = s[0] = s[1] = sd;
x[1] = s[2] = '\0';
y[0] = d[0] = d[1] = ed;
d[2] = y[1] = '\0';
strcat(fs, x);
for(i = 0; i < strlen(a); i++)
{
t[0] = a[i];
t[1] = '\0';
if(t[0] == sd)
strcat(fs, s);
else if(t[0] == ed)
(fs, d);
Else
strcat(fs, t);
}
strcat(fs, y);
printf("\n\t\tAfter stuffing:%s", fs);
getch ();
}
OUTPUT:
EXPERIMENT-4

AIM: Connect the computers in LAN network

Procedure: On the host computer


On the host computer, follow these steps to share the Internet connection:
1. Log on to the host computer as Administrator or as Owner.
2. Click Start, and then click Control Panel.
3. Click Network and Internet Connections.
4. Click Network Connections.
5. Right-click the connection that you use to connect to the Internet. For example, if you
connect to the Internet by using a modem, right-click the connection that you want under Dial-up
/ other network available.
6. Click Properties.
7. Click the Advanced tab.
8. Under Internet Connection Sharing, select the Allow other network users to connect through this
computer's Internet connection check box.
9. If you are sharing a dial-up Internet connection, select the Establish a dial-up connection whenever a
computer on my network attempts to access the Internet check box if you
want to permit your computer to automatically connect to the Internet.
Click OK. You receive the following message:
When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP address
192.168.0. 1. Your computer may lose connectivity with other computers on your network. If these
other computers have static IP addresses, it is a good idea to set them to obtain their IP addresses
automatically. Are you sure you want to enable Internet Connection Sharing?
10.Click Yes.
The connection to the Internet is shared to other computers on the local area network (LAN).
The network adapter that is connected to the LAN is configured with a static IP address of
192.168.0. 1 and a subnet mask of 255.255.255.0
On the client computer
To connect to the Internet by using the shared connection, you must confirm the LAN adapter IP
configuration, and then configure the client computer. To confirm the LAN adapter IP configuration,
follow these steps:

1. Log on to the client computer as Administrator or as Owner.


2. Click Start, and then click Control Panel.

3. Click Network and Internet Connections.


4. Click Network Connections.
5. Right-click Local Area Connection and then click Properties.
6. Click the General tab, click Internet Protocol (TCP/IP) in the connection uses the following
items list, and then click Properties.

7. In the Internet Protocol (TCP/IP) Properties dialog box, click Obtain an IP address
automatically (if it is not already selected), and then click OK.

Note: You can also assign a unique static IP address in the range of 192.168.0.2 to
254. For example, you can assign the following static IP address, subnet mask, and default gateway:
8. IP Address 192.168.31.202
9. Subnet mask 255.255.255.0
10. Default gateway 192.168.31.1

11. In the Local Area Connection Properties dialog box, click OK.

12. Quit Control Panel.


EXPERIMENT-5

Aim: Study of basic network command and Network configuration commands.

Apparatus (Software): Command Prompt And Packet Tracer.

Procedure: To do this EXPERIMENT- follows these steps:

In this EXPERIMENT- students have to understand basic networking commands e.g ping,
tracert etc.

All commands related to Network configuration which includes how to switch to privilege
mode and normal mode and how to configure router interface and how to save this
configuration to flash memory or permanent memory.

This commands includes

 Configuring the Router commands


 General Commands to configure network
 Privileged Mode commands of a router
 Router Processes & Statistics
 IP Commands
 Other IP Commands e.g. show ip route etc.

ping:
ping(8) sends an ICMP ECHO_REQUEST packet to the specified host. If the host responds,
you get an ICMP packet back. Sound strange? Well, you can “ping” an IP address to see if a
machine is alive. If there is no response, you know something is wrong.
Traceroute:
Tracert is a command which can show you the path a packet of information
takes from your computer to one you specify. It will list all the routers it passes
through until it reaches its destination, or fails to and is discarded. In addition to
this, it will tell you how long each 'hop' from router to router takes.
nslookup:

Displays information from Domain Name System (DNS) name servers.


NOTE :If you write the command as above it shows as default your pc's server name
firstly.

pathping:

A better version of tracert that gives you statics about packet lost and latency.

Getting Help

In any command mode, you can get a list of available commands by entering a question

mark (?). Router>?

To obtain a list of commands that begin with a particular character sequence, type in
those haracters followed immediately by the question mark (?).

Router#co?

configure connect copy


To list keywords or arguments, enter a question mark in place of a keyword or argument.
Include a space before the question mark.

Router#configure ?

memory Configure from NV memory


network Configure from a TFTP network
host terminal Configure from the
terminal
You can also abbreviate commands and keywords by entering just enough characters to
make the command unique from other commands. For example, you can abbreviate the
show command to sh.

Configuration Files
Any time you make changes to the router configuration, you must save the changes to
memory because if you do not they will be lost if there is a system reload or power outage.
There are two types of configuration files: the running (current operating) configuration and
the startup configuration.
Use the following privileged mode commands to work with configuration files.

• configure terminal – modify the running configuration manually from the terminal.

• show running-config – display the running configuration.

• show startup-config – display the startup configuration.

• copy running-config startup-config – copy the running configuration to the


startup configuration.

• copy startup-config running-config – copy the startup configuration to the


running configuration.

• erase startup-config – erase the startup-configuration in NVRAM.

• copy tftp running-config – load a configuration file stored on a


Trivial File Transfer Protocol (TFTP) server into the running
configuration.

• copy running-config tftp – store the running configuration on a TFTP server.

IP Address Configuration

Take the following steps to configure the IP address of an


interface. Step 1: Enter privileged EXEC mode:

Router>enable password

Step 2: Enter the configure terminal command to enter global configuration mode.

Router#config terminal

Step 3: Enter the interface type slot/port (for Cisco 7000 series) or interface type port (for
Cisco 2500 series) to enter the interface configuration mode.

Example:
Router (config)#interface ethernet 0/1
Step 4: Enter the IP address and subnet mask of the interface using the ip address ipaddress
subnetmask command.

Example,
Router (config-if)#ip address 192.168.10.1 255.255.255.0

Step 5: Exit the configuration mode by pressing


Ctrl-Z Router(config-if)#[Ctrl-Z]
EXPERIMENT-6

AIM: Performing initial Switch and Router configuration using packet tracer.

Switch configuration:

Topology Diagram

Objectives
 Perform an initial configuration of a Cisco Catalyst 2960 switch.

Background / Preparation
In this activity, you will configure these settings on the customer Cisco Catalyst 2960 switch:
 Host name
 Console password
 vty password
 Privileged EXEC mode password
 Privileged EXEC mode secret
 IP address on VLAN1 interface
 Default gateway
Note: Not all commands are graded by Packet Tracer.

Step 1: Configure the switch host name.


a. From the Customer PC, use a console cable and terminal emulation software to connect to the console
of the customer Cisco Catalyst 2960 switch.
b. Set the host name on the switch to CustomerSwitch using these commands.

Switch>enable
Switch#configure terminal
Switch(config)#hostname CustomerSwitch

Step 2: Configure the privileged mode password and secret.


a. From global configuration mode, configure the password as cisco.

CustomerSwitch(config)#enable password cisco

b. From global configuration mode, configure the secret as cisco123.

CustomerSwitch(config)#enable secret cisco123

Step 3: Configure the console password.


a. From global configuration mode, switch to configuration mode to configure the console line.
CustomerSwitch(config)#line console 0

b. From line configuration mode, set the password to cisco and require the password to be
entered at login.

CustomerSwitch(config-line)#password
cisco CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit

Step 4: Configure the vty password.


a. From global configuration mode, switch to the configuration mode for the vty lines 0 through 15.

CustomerSwitch(config)#line vty 0 15

b. From line configuration mode, set the password to cisco and require the password to be
entered at login.

CustomerSwitch(config-line)#password
cisco CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit

Step 5: Configure an IP address on interface VLAN1.


From global configuration mode, switch to interface configuration mode for VLAN1, and
assign the IP address 192.168.1.5 with the subnet mask of 255.255.255.0.

CustomerSwitch(config)#interface vlan 1
CustomerSwitch(config-if)#ip address 192.168.1.5 255.255.255.0
CustomerSwitch(config-if)#no shutdown
CustomerSwitch(config-if)#exit

Step 6: Configure the default gateway.


a. From global configuration mode, assign the default gateway to 192.168.1.1.

CustomerSwitch(config)#ip default-gateway 192.168.1.1


b. Click the Check Results button at the bottom of this instruction window to check your work.

Step 7: Verify the configuration.


The Customer Switch should now be able to ping the ISP Server at
209.165.201.10. The first one or two pings may fail while ARP converges.

CustomerSwitch(confi
g)#end
CustomerSwitch#ping
209.165.201.10

Type escape sequence to abort.


Sending 5, 100-byte ICMP Echos to 209.165.201.10, timeout is 2 seconds:
..!!!
Success rate is 60 percent (3/5), round-trip min/avg/max =

181/189/197 ms CustomerSwitch#

Reflection
a. What is the significance of assigning the IP address to the VLAN1 interface instead
of any of the Fast Ethernet interfaces?

b. What command is necessary to enforce password authentication on the console and vty lines?

How many gigabit ports are available on the Cisco Catalys


ROUTER CASE:

Performing an Initial Router Configuration


Topology Diagram

Objectives
 Configure the router host name.
 Configure passwords.
 Configure banner messages.
 Verify the router configuration.

Background / Preparation
In this activity, you will use the Cisco IOS CLI to apply an initial
configuration to a router, including host name, passwords, a message-of-
the-day (MOTD) banner, and other basic settings.
Note: Some of the steps are not graded by Packet Tracer.

Step 1: Configure the router host name.


a. On Customer PC, use the terminal emulation software to connect to the
console of the customer Cisco 1841 ISR.
Set the host name on the router to CustomerRouter by using these commands.

Router>ena
ble
Router#conf
igure
terminal
Router(config)#hostname CustomerRouter

Step 2: Configure the privileged mode and secret passwords.


a. In global configuration mode, set the password to cisco.

CustomerRouter(config)#enable password cisco


Set an encrypted privileged password to cisco123 using the secret command.

CustomerRouter(config)#enable secret cisco123

Step 3: Configure the console password.


a. In global configuration mode, switch to line configuration mode to specify the
console line.

CustomerRouter(config)#line console 0

Set the password to cisco123, require that the password be entered at login, and then exit line
configuration mode.

CustomerRouter(config-
line)#password cisco123
CustomerRouter(config-
line)#login
CustomerRouter(config-line)#exit
CustomerRouter(config)#

Step 4: Configure the vty password to allow Telnet access to the router.
a. In global configuration mode, switch to line configuration mode to
specify the vty lines.

CustomerRouter(config)#line vty 0 4

Set the password to cisco123, require that the password be entered at login, exit line
configuration mode, and then
exit the configuration session.

CustomerRouter(config-
line)#password cisco123
CustomerRouter(config-
line)#login
CustomerRouter(config-line)#exit
CustomerRouter(config)#

Step 5: Configure password encryption, a MOTD banner, and turn off domain server lookup.
a. Currently, the line passwords and the enable password are shown in
clear text when you show the running configuration. Verify this
now by entering the show running-config command.

To avoid the security risk of someone looking over your shoulder and
reading the passwords, encrypt all clear text passwords.

CustomerRouter(config)#service password-encryption

Use the show running-config command again to verify that the passwords are encrypted.
To provide a warning when someone attempts to log in to the router, configure a MOTD
banner.

CustomerRouter(config)#banner motd $Authorized Access Only!$

Test the banner and passwords. Log out of the router by typing the exit command
twice. The banner displays before the prompt for a password. Enter the password to
log back into the router.
You may have noticed that when you enter a command incorrectly at the user or
privileged EXEC prompt, the router pauses while trying to locate an IP address for
the mistyped word you entered. For example, this output shows what happens when
the enable command is mistyped.

CustomerRouter>emable
Translating "emable"...domain server (255.255.255.255)

To prevent this from happening, use the following command to stop all
DNS lookups from the router CLI.

CustomerRouter(config)#no ip domain-lookup

Save the running configuration to the startup configuration.

CustomerRouter(
config)#end
CustomerRouter
#copy run start

Step 6: Verify the configuration.


a. Log out of your terminal session with the Cisco 1841 customer router.
b. Log in to the Cisco 1841 Customer Router. Enter the console password when prompted.
c. Navigate to privileged EXEC mode. Enter the privileged EXEC password when prompted.
d. Click the Check Results button at the bottom of this instruction window to check your work.

Reflection
Which Cisco IOS CLI commands did you use most?

How can you make the customer router passwords more secure?
EXPERIMENT-7

AIM: Configure a network topology using packet tracer software using two different net- works.

Procedure:

Step 1: First, open the cisco packet tracer desktop and select the devices given below:

S.NO Device Model Name Qty.

1. PC PC 8

2. Switch 2960-24TT 5

3. Router 2911 1
IP Addressing Table for PCs of LAN1 and LAN2:

LAN1:

S.No. Device IPv4 Address Subnet Mask Default gateway

1. PC0 13.12.11.1 255.255.255.0 13.12.11.5

2. PC1 13.12.11.2 255.255.255.0 13.12.11.5

3. PC2 13.12.11.3 255.255.255.0 13.12.11.5

4. PC3 13.12.11.4 255.255.255.0 13.12.11.5

LAN2:
S.No. Device IPv4 Address Subnet Mask Default gateway

1. PC4 192.168.1.1 255.255.255.0 192.168.1.5

2. PC5 192.168.1.2 255.255.255.0 192.168.1.5

3. PC6 192.168.1.3 255.255.255.0 192.168.1.5

4. PC7 192.168.1.4 255.255.255.0 192.168.1.5


 Then, create two network topologies (Star and Bus)as shown below the image.
 Use an Automatic connecting cable to connect the devices with others.
Representation of the topologies should look like the image given below:
Step 2: Configure the PCs (hosts) with IPv4 address, Subnet Mask, and Default gateway according to the IP addressing table
above.
 To assign an IP address in PC0, click on PC0.
 Then, go to desktop and IP configuration and there you will find IPv4 configuration.
 Fill IPv4 address, subnet mask, and default gateway to the particular input box.
 Repeat the same procedure with PCs of LAN2 to configure them.
Step 3. Assigning IP address using the ipconfig command.
 We can also assign an IP address with the help of a command.
 Go to the command terminal of the PC0.
 Then, type ipconfig <IPv4 address><subnet mask><default gateway>(if needed)
example: ipconfig 13.12.11.1 255.255.255.0 13.12.11.5
 Repeat the same procedure with other PCs of Both LANs to configure them thoroughly.
Step 4: Configure router with IP address and subnet mask.
IP Addressing Table Router:

Device Interface IPv4 Address Subnet Mask

FastEtherner0/0 13.12.11.5 255.255.255.0

router0 FastEtherner0/1 192.168.1.5 255.255.255.0


 To assign an IP address in router0, click on router0.
 Then, go to config and then Interfaces.
 Then, configure the IP address in FastEthernet and serial ports according to IP addressing Table.
 Fill IPv4 address and subnet mask.
Step 5: Verifying the network by pinging the IP address of any PC. We will use the ping command to do so.
 First, click on PC0 then Go to the command prompt
 Then type ping <IP address of targeted node>
 As we can see in the below image we are getting replies which means the connection is working properly.
Example : ping 192.168.1.2
 A simulation of the experiment is given below we are sending PDU from PC0 to PC4.
EXPERIMENT-8

AIM: Configure a network topology using RIP protocol.

Configuring RIP

Topology Diagram

Objectives
 Configure routers using basic interface configuration commands.
 Enable RIP.
 Verify the RIP configuration.

Background / Preparation
A simple routed network has been set up to assist in reviewing RIP routing behavior. In this
activity, you will configure RIP across the network and set up end devices to communicate on the
network.

Step 1: Configure the SVC01 router and enable RIP.


a. From the CLI, configure interface Fast Ethernet 0/0 using the IP address 10.0.0.254 /8.
b. Configure interface serial 0/0/0 using the first usable IP address in network 192.168.1.0 /24 to
connect to the RTR01 router. Set the clock rate at 64000.
c. Configure interface serial 0/0/1 using the first usable IP address in network 192.168.2.0 /24 with a
clock rate of 64000.
d. Using the no shutdown command, enable the configured interfaces.
e. Configure RIP to advertise the networks for the configured interfaces.
f. Configure the end devices.
i. Server0 uses the first usable IP address in network 10.0.0.0 /8. Specify the appropriate default
gateway and subnet mask.
ii. Printer0 uses the second usable IP address in network 10.0.0.0 /8. Specify the appropriate
default gateway and subnet mask.

Step 2: Configure the RTR01 router and enable RIP.


a. Configure interface Fast Ethernet 0/0 using the first usable IP address in network 192.168.0.0 /24 to
connect to the RTR02 router.
b. Configure interface serial 0/0/0 using the second usable IP address in network 192.168.1.0 /24 to
connect to the SVC01 router.
c. Configure interface Fast Ethernet 0/1 using the IP address 172.16.254.254 /16.
d. Using the no shutdown command, enable the configured interfaces.
e. Configure RIP to advertise the networks for the configured interfaces.
f. Configure the end devices.
i. PC0 uses the first usable IP addresses in network 172.16.0.0 /16.
ii. PC1 uses the second usable IP address in network 172.16.0.0 /16.
iii. Specify the appropriate default gateway and subnet mask on each PC.

Step 3: Configure the RTR02 router and enable RIP.


a. Configure interface Fast Ethernet 0/0 using the second usable IP address in network 192.168.0.0
/24 to connect to the RTR01 router.
b. Configure interface serial 0/0/0 using the second usable IP address in network 192.168.2.0 /24 to
connect to the SVC01 router.
c. Configure interface Fast Ethernet 0/1 using the IP address 172.17.254.254 /16.
d. Using the no shutdown command, enable the configured interfaces.
e. Configure RIP to advertise the networks for the configured interfaces.
f. Configure the end devices.
i. PC2 uses the first usable IP addresses in network 172.17.0.0 /16.
ii. PC3 uses the second usable IP address in network 172.17.0.0 /16.
iii. Specify the appropriate default gateway and subnet mask on each PC.

Step 4: Verify the RIP configuration on each router.


a. At the command prompt for each router, issue the commands show ip protocols and show ip route to
verify RIP routing is fully converged. The show ip protocols command displays the networks the router is
advertising and the addresses of other RIP routing neighbors. The show ip route command output displays
all routes know to the local router including the RIP routes which are indicated by an “R”.
b. Every device should now be able to successfully ping any other device in this activity.
c. Click the Check Results button at the bottom of this instruction window to check your work.
EXPERIMENT-9

Aim: Configure Network using Link State Vector Routing protocol.


 OSPF

Apparatus (Software): Packet Tracer Software

Procedure:

1. Develop a Topology shown in figure given below.


2. Configure all the workstations
3. Configure all switches
4. Configure all Routers
5. Implement OSPF protocols in Router to configure Network.
EXPERIMENT -10

AIM:Observing static routing and dynamic routing using packet tracer.

Observing Static and Dynamic Routing

Objective
Observe the network behavior using static and default routing only and compare it to the behavior of
dynamic routing.

Background / Preparation
In this exercise, you will observe what the adaptability of dynamic routing compared to static and
default routing. The Ticket Sales Office network is currently configured using static and default
routing.

Required file: Observing Static and Dynamic Routing.pka

Step 1: Test Connectivity Using Static and Default Routing.


Open a Command Prompt on PC0.
Trace (tracert) a connection to the Edge1 FastEthernet 0/0 address. This should be
successful.

Step 2: Bring down Frame Relay Network and Observe Routing.


On the BR2 router, shutdown the link to the Frame Relay network.
Perform a trace from PC0 again to the Edge1 FastEthernet 0/0 address. What
happens this time?

Step 3: Configure Dynamic Routing and Observe Routing

a. Configure EIGRP (AS 10) on the BR2 and ISP2 routers. Be sure to include all directly
connected networks and turn off auto-summary.
b. Do a third trace from PC0 to the Edge1 FastEthernet 0/0 interface. (It should be successful again.)
c. Did the path change? If so, how?

Reflection

What are the advantages of using dynamic routing? Static and default routing?

The static routes in this lab were set with an administrative distance of 130. What
would have happened if they were set at 30? At 230?
EXPERIMENT-11

AIM: Static NAT configuration using cisco packet tracer.

Examining Network Address Translation (NAT)


Topology Diagram

Objectives
 Examine NAT processes as traffic traverses a NAT border router.

Background / Preparation
In this activity, you will use Packet Tracer Simulation mode to examine the contents of the IP
header as traffic crosses the NAT border router.

Step 1: Prepare the network for Simulation mode.


Verify that the network is ready to send and receive traffic. All the link lights should be green.
If some link lights are still amber, you can switch between Simulation and Realtime mode
several times to force the lights to turn green faster. Switch to Simulation mode before going to
the next step.

Step 2: Send an HTTP request from an inside host to an outside web server.
Click Customer PC. Click the Desktop tab and then Web Browser. In the URL field,
type the web address for the ISP server (www.ispserver.com). Make sure that you are
in Simulation mode, and then click Go.
In the event list, notice that Customer PC queues a DNS request and sends out an ARP request.
You can view the contents of the ARP request by either clicking on the packet in the topology
or clicking on the packet color under Info in the Event List window.
In the PDU Information at Device: Customer PC window, which IP address is Customer PC
attempting to find a MAC address for?
In the Event List window, click Capture/Forward twice. Which device answers the ARP request
from Customer PC? Which MAC address is placed inside the ARP reply?

In the Event List window, click Capture/Forward twice. Customer PC accepts the ARP replay
and then builds another packet. What is the protocol for this new packet? If you click Outbound
PDU Details for this packet, you can see the details of the protocol.
In the Event List window, click Capture/Forward twice. Click the packet at the
www.customerserver.com server. Then click the Outbound PDU Details tab. Scroll down to the
bottom to see the Application Layer data. What is the IP address for the ISP server?

In the Event List window, click Capture/Forward twice. Customer PC now formulates another ARP
request. Why?

In the Event List window, click Capture/Forward 10 times until Customer PC formulates an
HTTP request packet. Customer PC finally has enough information to request a web page from
the ISP server.
In the Event List window, click Capture/Forward three times. Click the packet at Customer
Router to examine the contents. Customer Router is a NAT border router. What is the inside local
address and the inside global address for Customer PC?

In the Event List window, click Capture/Forward seven times until the HTTP reply reaches
Customer Router. Examine the contents of the HTTP reply and notice that the inside local and
global addresses have changed again as the packet is forwarded on to Customer PC.

Step 3: Send an HTTP request from an outside host to an inside web server.
Customer Server provides web services to the public (outside addresses) through the domain
name www.customerserver.com. Follow a process similar to Step 2 to observe an HTTP
request on ISP Workstation.
a. Click ISP Workstation. Click the Desktop tab, and then Web Browser. In the URL field, type the
Customer Server web address (www.customerserver.com). Make sure that you are in Simulation mode,
and then click Go.
b. You can either click Auto Capture/Play or Capture/Forward to step through each stage of the
process. The same ARP and DNS processes occur before the ISP Workstation can formulate an HTTP
request.
c. When the HTTP request arrives at Customer Router, check the packet contents. What is the inside
local address? What is the inside global address?

You might also like