Computer Netwrok Lab Experiments
Computer Netwrok Lab Experiments
LAB MANUAL
3rd Year (V Semester)
Computer Science and Engineering Branch
1) Study of different types of Network cables and Practically implement the cross-wired
cable and straight through cable using clamping tool.
5) To construct a Inter - VLAN and make the PC’s communicate among a VLAN
7) To construct simple LAN and understand the concept and operation of Address
Resolution Protocol (ARP)
10)To construct multiple router networks and understand the operation of EIGRP
Protocol
11)To understand the operation of TELNET by accessing the router in server room
from a PC in IT office.
12) To understand the operation of SSH by accessing the routers remotely by PCs
1|P age
Experiment: 1
Configuration of LAN
Aim:
To analyse the performance of various configurations and protocols in LAN
Requirements
• Windows pc – 3Nos
• CISCO Packet Tracer Software ( Student Version)
• 8 port switch – 1 No
• Cat-5 LAN cable
Procedure
A LAN comprises cables, access points, switches, routers, and other components that
enable devices to connect to internal servers, web servers, and other LANs via wide area
networks.
The advantages of a LAN are the same as those for any group of devices networked
together. The devices can use a single Internet connection, share files with one another, print to
shared printers, and be accessed and even controlled by one another.
2|P age
Network Topology Diagram for LAN
C:\>ping 10.0.0.2
Pinging 10.0.0.2 with 32 bytes of data:
3|P age
VIVA QUESTIONS
A local-area network (LAN) is a computer network that spans a relatively small area. Most often,
a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected
to other LANs over any distance via telephone lines and radio waves.
In LAN computers can exchange data and messages in the easy and fast way. It also saves time
and makes our work fast. Every user can share messages and data with any other user on LAN. The user
can log in from any computer on the network and access the same data placed on the server.
Early LAN (Local Area Network) networks were formed using coaxial cable, coax is an electric
cable and it is used to carry radio signals. LAN (Local Area Network) setup is developed by connecting
two or more than two computers with each other using a physical connection in order to share files and
data overtime.
Disadvantages of LANs:
The use of email within the network can lead to problems of time wasting as people send
messages that do not relate to work. If the dedicated file server fails, work stored on shared hard disk
drives will not be accessible and it will not be possible to use network printers either.
4|P age
Experiment:2
Configuration of VLAN
Aim:
To construct a VLAN and make the PC’s communicate among a VLAN
Requirements
• Windows pc – 6 Nos
• CISCO Packet Tracer Software ( Student Version)
• 8 port switch – 1 No
• Cat-5 LAN cable
Procedure
Theory
VLANs define broadcast domains in a Layer 2 network. A broadcast domain is the set
of all devices that will receive broadcast frames originating from any device within the set.
Broadcast domains are typically bounded by routers because routers do not forward broadcast
frames. Layer 2 switches create broadcast domains based on the configuration of the switch.
Switches are multiport bridges that allow you to create multiple broadcast domains. Each
broadcast domain is like a distinct virtual bridge within a switch.
5|P age
Network Topology Diagram for VLAN
6|P age
CONFIGURATION OF THE SWITCHPORT FOR VLAN:
Switch>en
Switch#config
Configuring from terminal, memory, or network [terminal]?
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#vlan 10
Switch(config-vlan)#ex
Switch(config)#vlan 20
Switch(config-vlan)#ex
Switch(config)#interface range fastEthernet 0/1-3
Switch(config-if-range)#switchport access vlan 10
Switch(config-if-range)#ex
Switch(config)#interface range fastEthernet 0/4-6
Switch(config-if-range)#switchport access vlan 20
Switch(config-if-range)#ex
Switch(config)#ex
Switch#
%SYS-5-CONFIG_I: Configured from console by console
7|P age
C:\>PING 20.0.0.1
Result
Hence, created VLAN structure and observed the communications of PCs within a
VLAN
8|P age
VIVA QUESTIONS
What is LAN and VLAN?
VLAN and LAN are two terms used frequently in the networking field. ... VLAN is an
implementation of a private subset of a LAN in which the computers interact with each other as if they
are connected to the same broadcast domain irrespective of their physical locations
VLANs divide broadcast domains in a LAN environment so, by default only Hosts that are
members of the same VLAN can communicate. Whenever hosts in one VLAN need to communicate with
hosts in another VLAN, the traffic must be routed between them. This is known as Inter VLAN Routing.
Switch(config)#vlan 10
Switch(config-vlan)#ex
9|P age
Experiment: 3
Configuration of Inter VLAN
Aim:
To construct a Inter - VLAN and make the PC’s communicate among a VLAN
Requirements
• Windows pc – 4 Nos
• CISCO Packet Tracer Software ( Student Version)
• 8 port switch – 1 No
• Cat-5 LAN cable
Procedure
The use of VLANs means that users would not be able to communicate across
departments, i.e. a user in FINANCE, would not be able to send a message to a user in SALES
since they are on different broadcast domains.
10 | P a g e
Network Topology Diagram for Inter VLAN
PC0 PC1
IP Address : 10.0.0.1 IP Address : 10.0.0.2
Subnet Mask : 255.255.255.0 Subnet Mask : 255.255.255.0
Gate way : 10.0.0.50 Gate way : 10.0.0.50
PC0 PC1
IP Address : 20.0.0.1 IP Address : 20.0.0.2
Subnet Mask : 255.255.255.0 Subnet Mask : 255.255.255.0
Gate way : 20.0.0.50 Gate way : 20.0.0.50
11 | P a g e
ROUTER CONFIGURATION:
Router>en
Router#config ter
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface fastEthernet 0/0
Router(config-if)#no shut
Router(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface fastEthernet 0/0.10
Router(config-subif)#
%LINK-5-CHANGED: Interface FastEthernet0/0.10, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0.10, changed state to
up
Router(config-subif)#encapsulation dot1Q 10
Router(config-subif)#ip address 10.0.0.50 255.0.0.0
Router(config-subif)#no shut
Router(config-subif)#no shutdown
Router(config-subif)#exit
Router(config)#interface fastEthernet 0/0.20
Router(config-subif)#
%LINK-5-CHANGED: Interface FastEthernet0/0.20, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0.20, changed state to
up
Router(config-subif)#encapsulation dot1Q 20
Router(config-subif)#ip address 20.0.0.50 255.0.0.0
Router(config-subif)#no shut
Router(config-subif)#no shutdown
Router(config-subif)#exit
Router(config)#exit
Router#
%SYS-5-CONFIG_I: Configured from console by console
12 | P a g e
Router#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B – BGP D - EIGRP, EX -
EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF
NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E – EGP i - IS-IS,
L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user
static route, o – ODR P - periodic downloaded static route
Result
Hence, We constructed Inter VLAN and made the communications of PCs between
different VLANs.
13 | P a g e
VIVA QUESTIONS
What is Inter VLAN Routing ? Explained with Examples
Inter-VLAN routing using a router on a stick utilizes an external router to pass traffic
between VLANs.
1 Traffic from PC1 on VLAN10 is routed through router R1 to reach PC3 on VLAN 20.
2. PC1 and PC3 are on different VLANs and have IP addresses on different subnets.
Sample of VLAN
14 | P a g e
Experiment: 4
Configuration of Wireless LAN
Aim:
To construct a Wireless LAN and make the PC’s communicate wirelessly
Requirements
• Windows pc – 2 Nos
• CISCO Packet Tracer Software ( Student Version)
• 8 port switch – 1 No
• Cat-5 LAN cable
Procedure
Theory
A Wireless Local Area Network (WLAN) implements a flexible data communication
system frequently augmenting rather than replacing a wired LAN within a building or campus.
WLANs use radio frequency to transmit and receive data over the air, minimizing the need for
wired connections.
15 | P a g e
Network Topology Diagram for Wireless LAN
Result:
Thus, constructed a WLAN and made the Laptops communicate wirelessly
16 | P a g e
VIVA QUESTIONS
What is a Wireless Network?
A wireless local-area network (WLAN) uses radio waves to connect devices, such as laptops, to the
Internet and to your business network and applications.
A wireless local area network (WLAN) is a wireless distribution method for two or more
devices that use high-frequency radio waves and often include an access point to the Internet. A
WLAN allows users to move around the coverage area, often a home or small office, while
maintaining a network connection.
While wireless LANs refer to any local area network (LAN) that a mobile user can connect to
through a wireless (radio) connection; Wi-Fi (short for "wireless fidelity") is a term for certain types
of WLANs that use specifications in the 802.11 wireless protocol family.
Small businesses can experience many benefits from a WLAN. A few examples:
• You can access network resources from any location within the wireless network's coverage area.
• Wireless access to the Internet and to company resources help your staff be more productive and
collaborative.
• You don't have to string cables, as you do with wired networks. Installation can be quick and cost-
effective.
• You can easily expand WLANs where and as needed, because no wires are involved.
• By eliminating or reducing wiring expenses, WLANs can cost less to operate than wired networks.
WLANs are frequently offered in public places such as cafes, hotels, and airport lounges. In
addition, many businesses have wireless networks throughout their office buildings or campuses for
employee and guest use.
17 | P a g e
Experiment: 5
Configuration of Address Resolution protocol
Aim:
To construct simple LAN and understand the concept and operation of Address
Resolution Protocol (ARP)
Requirements
• Windows pc – 5 Nos
• CISCO Packet Tracer Software ( Student Version)
• 8 port switch – 1 No
• Cat-5 LAN cable
Procedure
• Open the CISCO Packet tracer software
• Drag and drop 5 pcs using End Device Icons on the left corner
• Select 8 port switch from switch icon list in the left bottom corner
• Make the connections using Straight through Ethernet cables
• Give IP address of the PC1, PC2, PC3 and PC4 as per the input table respectively,
observe the source and destination MAC address of all packets.
• Get cache from switch.
Theory
ARP (Address Resolution Protocol) is a network protocol used to find out the hardware
(MAC) address of a device from an IP address. It is used when a device wants to communicate
with some other device on a local network (for example on an Ethernet network that requires
physical addresses to be known before sending packets). The sending device uses ARP to
translate IP addresses to MAC addresses. The device sends an ARP request message containing
the IP address of the receiving device. All devices on a local network segment see the message,
but only the device that has that IP address responds with the ARP reply message containing its
MAC address. The sending device now has enough information to send the packet to the
receiving device.
18 | P a g e
Network Topology Diagram for ARP
19 | P a g e
OUTPUT:
ARP CATCH TABLE OF PC1 (IP: 10.0.0.2):
C:\>arp -a
Result:
Thus, constructed a simple LAN and understand the concept and operation of ARP and
got the ARP Cache of given layout.
20 | P a g e
VIVA QUESTIONS
What is ARP?
Address Resolution Protocol (ARP) is a network protocol, which maps a network layer
protocol address to a data link layer hardware address. For example, ARP is used to resolve IP address
to the corresponding Ethernet address.
ARP (Address Resolution Protocol) is a network protocol used to find out the hardware (MAC)
address of a device from an IP address.
Address Resolution Protocol (ARP) is a procedure for mapping a dynamic Internet Protocol
address (IP address) to a permanent physical machine address in a local area network (LAN). ARP can
also be used for IP over other LAN technologies, such as token ring, fiber distributed data interface
(FDDI) and IP over ATM.
This is where ARP comes into the picture, its functionality is to translate IP address to physical
address. The acronym ARP stands for Address Resolution Protocol which is one of the most important
protocols of the Network layer in the OSI model.
A host in an Ethernet network can communicate with another host, only if it knows the Ethernet
address (MAC address) of that host. The higher level protocols like IP use a different kind of addressing
scheme (like IP address) from the lower level hardware addressing scheme like MAC address. ARP is
used to get the Ethernet address of a host from its IP address. ARP is extensively used by all the hosts in
an Ethernet network.
ARP maintains the mapping between IP address and MAC address in a table in memory called
ARP cache. The entries in this table are dynamically added and removed.
ARP is a general protocol, which can be used in any type of broadcast network. The fields in the
ARP packet specifies the type of the MAC address and the type of the protocol address. ARP is used with
most IEEE 802.x LAN media. In particular, it is also used with FDDI, Token Ring, and Fast Ethernet, in
precisely the same way as it is with Ethernet.
21 | P a g e
Experiment: 6
Configuration of Routing Information protocol
Aim:
To understand the concept and operation of Routing Information Protocol (RIP)
Requirements
• Windows pc – 2 Nos
• CISCO Packet Tracer Software ( Student Version)
• 8 port switch – 2 No
• Router – 2 Nos
• Cat-5 LAN cable
Procedure
• Open the CISCO Packet tracer software
• Drag and drop 5 pcs using End Device Icons on the left corner
• Select 8 port switch from switch icon list in the left bottom corner
• Select Routers and Give the IP address for serial ports of router and apply clock rate as
per the table.
• Make the connections using Straight through Ethernet cables
• Ping between PCs and observe the transfer of data packets in real and simulation mode.
Theory
RIP (Routing Information Protocol) is one of the oldest distance vector routing
protocols. It is usually used on small networks because it is very simple to configure and
maintain, but lacks some advanced features of routing protocols like OSPF or EIGRP. Two
versions of the protocol exists: version 1 and version 2. Both versions use hop count as a metric
and have the administrative distance of 120. RIP version 2 is capable of advertising subnet
masks and uses multicast to send routing updates, while version 1 doesn’t advertise subnet
masks and uses broadcast for updates. Version 2 is backwards compatible with version 1.
RIPv2 sends the entire routing table every 30 seconds, which can consume a lot of
bandwidth. RIPv2 uses multicast address of 224.0.0.9 to send routing updates, supports
authentication and triggered updates (updates that are sent when a change in the network
occurs).
22 | P a g e
Network Topology Diagram for RIP
OUTPUT:
RIP (PINGING FROM PC0 TO PC1):
C:\>ping 192.168.2.2
Pinging 192.168.2.2 with 32 bytes of data:
Reply from 192.168.2.2: bytes=32 time=11ms TTL=126
Reply from 192.168.2.2: bytes=32 time=12ms TTL=126
Reply from 192.168.2.2: bytes=32 time=13ms TTL=126
23 | P a g e
Reply from 192.168.2.2: bytes=32 time=11ms TTL=126
Ping statistics for 192.168.2.2:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 11ms, Maximum = 13ms, Average = 11ms
Result:
Thus, understand the concept and operation of RIP and pinged from PC in are networks
to PC to another network.
24 | P a g e
VIVA QUESTIONS
What is RIP routing?
RIP stand for Routing information Protocol. It is protocol which communicates to one
router to another router. It update after 30sec send his routing table to another router. It is
distance vector protocol which protocol work on metric hop count after that is transferred the
packet from source to destination. It has to follow shortage distance basis transfer the data.
#Router rip
#network 10.0.0.0
#show ip route
#show ip protocols
25 | P a g e
Experiment: 7
Configuration of Open shortest Path First (OSPF) Algorithm
Aim:
To construct multiple router networks and understand the operation of OSPF Protocol
Requirements
• Windows pc – 3 Nos
• CISCO Packet Tracer Software ( Student Version)
• 8 port switch – 3 No
• Router – 3 Nos
• Cat-5 LAN cable
Procedure
• Open the CISCO Packet tracer software
• Drag and drop 5 pcs using End Device Icons on the left corner
• Select 8 port switch from switch icon list in the left bottom corner
• Select Routers and Give the IP address for serial ports of router and apply clock rate
• Add HWIC -2T Peripheral to all routers, type CLI’s for all routers
• Make the connections using Straight through Ethernet cables
• Ping between PCs and observe the transfer of data packets in real and simulation mode.
Theory
The OSPF routing protocol has largely replaced the older Routing Information Protocol
(RIP) in corporate networks. Using OSPF, a router that learns of a change to a routing table
(when it is reconfigured by network staff, for example) or detects a change in the network
immediately multicasts the information to all other OSPF hosts in the network so they will all
have the same routing table information. Unlike RIP, which requires routers to send the entire
routing table to neighbors every 30 seconds, OSPF sends only the part that has changed and
only when a change has taken place. When routes change -- sometimes due to equipment
failure -- the time it takes OSPF routers to find a new path between endpoints with no loops
(which is called "open") and that minimizes the length of the path is called the convergence
time.
26 | P a g e
Network Topology Diagram for OSPF
ROUTER0 CLI:
Router#en
Router#config
Configuring from terminal, memory, or network [terminal]?
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#router ospf 1
Router(config-router)#network 192.168.1.0 0.0.0.255 area 1
Router(config-router)#network 10.0.0.0 0.255.255.255 area 1
Router(config-router)#exit
00:19:21: %OSPF-5-ADJCHG: Process 1, Nbr 192.168.2.1 on Serial0/0/0 from LOADING to
FULL, Loading Done
27 | P a g e
ROUTER1 CLI:
Router(config)#router ospf 2
Router(config-router)#network 192.168.2.0 0.0.0.255 area 0
Router(config-router)#network 10.0.0.0 0.255.255.255 area 1
00:19:07: %OSPF-5-ADJCHG: Process 2, Nbr 192.168.1.1 on Serial0/0/0 from LOADING to
FULL, Loading Done
Router(config-router)#network 11.0.0.0 0.255.255.255 area 2
Router(config-router)#exit
00:25:52: %OSPF-5-ADJCHG: Process 2, Nbr 192.168.3.1 on Serial0/0/1 from LOADING to
FULL, Loading Done
ROUTER2 CLI:
Router>en
Router#config
Configuring from terminal, memory, or network [terminal]?
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#router ospf 1
Router(config-router)#network 192.168.3.0 0.0.0.255 area 2
Router(config-router)#network 11.0.0.0 0.255.255.255 area 2
00:25:19: %OSPF-5-ADJCHG: Process 1, Nbr 192.168.2.1 on Serial0/0/0 from
LOADING to FULL, Loading Done
Router(config)#exit
OUTPUT:
ROUTER0:
Router>en
Router#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
28 | P a g e
ROUTER1:
C 10.0.0.0/8 is directly connected, Serial0/0/0
C 11.0.0.0/8 is directly connected, Serial0/0/1
O 192.168.1.0/24 [110/65] via 10.0.0.1, 00:04:50, Serial0/0/0
C 192.168.2.0/24 is directly connected, FastEthernet0/0
O 192.168.3.0/24 [110/65] via 11.0.0.2, 00:04:45, Serial0/0/1
ROUTER2:
O IA 10.0.0.0/8 [110/128] via 11.0.0.1, 00:06:55, Serial0/0/0
C 11.0.0.0/8 is directly connected, Serial0/0/0
O IA 192.168.1.0/24 [110/129] via 11.0.0.1, 00:06:45, Serial0/0/0
O IA 192.168.2.0/24 [110/65] via 11.0.0.1, 00:06:55, Serial0/0/0
C 192.168.3.0/24 is directly connected, FastEthernet0/0
Result:
Thus, understand the concept and operation of OSPF and obtained the routing table and
observe transfer data packets in real and simulation time.
29 | P a g e
VIVA QUESTIONS
What is the algorithm used by OSPF?
OSPF uses SPF (Shortest Path First) algorithm for calculating the best path and preparing OSPF database.
Different OSPF network types with their examples are given below:
1) Broadcast Multi-Access – indicates a topology where broadcast occurs.
Examples include Ethernet, Token Ring, and ATM.
2) Point-to-Point – indicates a topology where two routers are directly connected.
An example would be a point-to-point T1.
3) Point-to-Multipoint – indicates a topology where one interface can connect to multiple destinations.
Each connection between a source and destination is treated as a point-to-point link.
An example would be Point-to-Multipoint Frame Relay.
4) Non-broadcast Multi-access Network (NBMA) – indicates a topology where one interface can connect
to multiple destinations; however, broadcasts cannot be sent across a NBMA network.
30 | P a g e
Experiment: 8
Configuration of Enhanced Internal Gateway Routing Protocol
Aim:
To construct multiple router networks and understand the operation of EIGRP Protocol
Requirements
• Windows pc – 4 Nos
• CISCO Packet Tracer Software ( Student Version)
• 8 port switch – 2 No
• Router – 3 Nos
• Cat-5 LAN cable
Procedure
• Open the CISCO Packet tracer software
• Drag and drop 4 pcs using End Device Icons on the left corner
• Select TWO 8 port switch from switch icon list in the left bottom corner
• Select TWO Routers and Give the IP address for serial ports of router and apply clock
rate as per the input table.
• Add WIC -IT Peripheral to all routers, type CLI’s for all routers
• Make the connections using Straight through Ethernet cables
• Ping between PCs and observe the transfer of data packets in real and simulation mode.
Theory
31 | P a g e
Network Topology Diagram for EIGRP
Router 0 Router 1
fa 0/0 IP Address: 192.168.10.1 fa 0/0 IP Address : 192.168.30.1
Serial 0/0/0 : 192.168.20.1 @ 6400 clock rate Serial 0/0/0 : 192.168.20.2
ROUTER0 CLI:
Router(config)#router eigrp 10
Router(config-router)#network 192.168.10.0 255.255.255.0
Router(config-router)#network 192.168.20.0 255.255.255.0
Router(config-router)#exit
ROUTER1 CLI:
Router(config)#router eigrp 10
Router(config-router)#network 192.168.20.0 255.255.255.0
%DUAL-5-NBRCHANGE: IP-EIGRP 10: Neighbor 192.168.20.1 (Serial0/1/0) is up: new adjacency
Router(config-router)#network 192.168.30.0 255.255.255.0
Router(config-router)#exit
32 | P a g e
OUTPUT:
ROUTER0:
Router#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
ROUTER1:
Result:
Thus, understand the concept and operation of EIGRP and obtained the routing table
and observe transfer data packets in real and simulation time.
33 | P a g e
VIVA QUESTIONS
Why EIGRP is called hybrid protocol?
EIGRP is also called hybrid protocol because its metric is not just plain HOP COUNT (max-
255, included in pure distance vector protocol) rather includes the links bandwidth, delay, reliability
and Load parameter into the calculation. Thats why called Advanced or Hybrid protocol.
There are Six packets in EIGRP, 1-Hello , 2-Update, 3-Query, 4-Reply, 5-Acknoladgment, 6.Request
• Internal Route—Routes that are originated within the Autonomous System (AS).
• Summary Route—Routes that are summarized in the router (for example, internal paths that
have been summarized).
34 | P a g e
Experiment: 9
Configuration Telnet
Aim:
To understand the operation of TELNET by accessing the router in server room from a
PC in IT office.
Requirements
• Windows pc – 2 Nos
• CISCO Packet Tracer Software ( Student Version)
• 8 port switch – 1 No
• Router – 1 Nos
• Cat-5 LAN cable
Procedure
• Open the CISCO Packet tracer software
• Drag and drop 1 pc and 1 laptop using End Device Icons on the left corner.
• Select 8 port switch from switch icon list in the left bottom corner
• Select Routers and Give the IP address for serial ports of router
• Type CLI’s for the router
• Make and verify the connections from any pc to the server by providing correct
password; in command prompt of PC.
• Ping between PCs and observe the transfer of data packets in real and simulation mode.
Theory
Telnet, developed in 1969, is a protocol that provides a command line interface for
communication with a remote device or server, sometimes employed for remote management
but also for initial device setup like network hardware. Telnet stands for Teletype Network, but
it can also be used as a verb; 'to telnet' is to establish a connection using the Telnet protocol.
Telnet is a simple, text-based network protocol that is used for accessing remote computers
over TCP/IP networks like the Internet.
35 | P a g e
Network Topology Diagram for TELNET
ROUTER CLI:
Router#config
Configuring from terminal, memory, or network [terminal]?
Router(config)#line vty 0 4
Router(config-line)#password sai123
Router(config-line)#login local
Router(config-line)#exit
Router(config)#username sai privilege 4 password sai123
Router(config)#exit
36 | P a g e
OUTPUT:
PINGING FROM PC0 TO SERVER USING TELENET:
C:\>ping 192.168.0.1
Pinging 192.168.0.1 with 32 bytes of data:
Reply from 192.168.0.1: bytes=32 time=1ms TTL=255
Reply from 192.168.0.1: bytes=32 time<1ms TTL=255
Reply from 192.168.0.1: bytes=32 time<1ms TTL=255
Reply from 192.168.0.1: bytes=32 time<1ms TTL=255
Ping statistics for 192.168.0.1:
C:\>telnet 192.168.0.1
Trying 192.168.0.1 ...Open
User Access Verification
Username: sai
Password: <type the password---sai123(invisible)>
Result:
Thus, verified the operation of TELNET and accessed the router from Pcs.
37 | P a g e
VIVA QUESTIONS
What are common uses for Telnet?
Telnet can be used to test or troubleshoot remote web or mail servers, as well as for
remote access to MUDs (multi-user dungeon games) and trusted internal networks.
The user connects to the server by using the Telnet protocol, which means entering Telnet
into a command prompt by following this syntax: telnet hostname port. The user then executes
commands on the server by using specific Telnet commands into the Telnet prompt. To end a
session and log off, the user ends a Telnet command with Telnet.
Is Telnet secure?
Because it was developed before the mainstream adaptation of the internet, Telnet on its
own does not employ any form of encryption, making it outdated in terms of modern security. It
has largely been overlapped by Secure Shell (SSH) protocol, at least on the public internet, but for
instances where Telnet is still in use, there are a few methods for securing your communications.
38 | P a g e
Experiment: 10
Requirements
• Windows pc – 2 Nos
• CISCO Packet Tracer Software ( Student Version)
• 8 port switch – 1 No
• Router – 1 Nos
• Cat-5 LAN cable
Procedure
• Open the CISCO Packet tracer software
• Drag and drop 1 pc and 1 laptop using End Device Icons on the left corner.
• Select 8 port switch from switch icon list in the left bottom corner
• Select Routers and Give the IP address for serial ports of router
• Type CLI’s for the router
• Make and verify the SSH operation by pinging in the command prompt of PC
• Ping between PCs and observe the transfer of data packets in real and simulation mode.
Theory
SSH stands for Secure Shell is a network protocol, used to access remote machine in
order to execute command-line network services and other commands over a Network. SSH is
Known for its high security, cryptographic behavior and it is most widely used by Network
Admins to control remote web servers primarily.
Both SSH and Telnet are network Protocol. Both the services are used in order to
connect and communicate to another machine over Network. SSH uses Port 22 and Telnet uses
port 23 by default. Telnet send data in plain text and non-encrypted format everyone can
understand whereas SSH sends data in encrypted format. Not to mention SSH is more secure
than Telnet and hence SSH is preferred over Telnet.
39 | P a g e
Network Topology Diagram for SSH
ROUTER CLI:
Router#config
Configuring from terminal, memory, or network [terminal]?
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#line vty 0 4
Router(config-line)#password sai123
Router(config-line)#login local
Router(config-line)#exit
Router(config)#username saimukhesh privilege 4 password sai123
Router(config)#hostname r1
r1(config)#ip domain-name cisco
r1(config)#line vty 0 4
r1(config-line)#transport input ssh
r1(config-line)#exit
r1(config)#crypto key generate rsa
The name for the keys will be: r1.cisco
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.
How many bits in the modulus [512]: 1024
% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]
0r1(config)#
*Mar 1 0:3:53.842: %SSH-5-ENABLED: SSH 1.99 has been enabled
r1(config)#
40 | P a g e
OUTPUT:
PINGING FROM PC1 TO SERVER USING SSH:
Packet Tracer PC Command Line 1.0
C:\>ping 192.168.1.1
Open
Password: <sai123>
r1#
(now router can be accessed from pc1)
Result:
Thus, verified the operation of SSH and accessed the router from a remote Pcs.
41 | P a g e
VIVA QUESTIONS
What is SSH?
Secure Shell protocol is abbreviated as SSH. It is a secure and most commonly using
protocol to access remote servers. This protocol uses encryption while transferring data between
two hosts.
42 | P a g e
43 | P a g e
44 | P a g e