0% found this document useful (0 votes)
12 views

CN FILE(ST-1)

The document outlines a series of experiments focused on networking, including the study of network cable types, practical implementations of cross-wired and straight-through cables, and configurations using Cisco Packet Tracer. It details various networking devices such as modems, switches, and routers, as well as types of cables and their connections. Additionally, it covers procedures for connecting devices, configuring IP addresses, and creating VLANs in a simulated environment.

Uploaded by

mailing2chinka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

CN FILE(ST-1)

The document outlines a series of experiments focused on networking, including the study of network cable types, practical implementations of cross-wired and straight-through cables, and configurations using Cisco Packet Tracer. It details various networking devices such as modems, switches, and routers, as well as types of cables and their connections. Additionally, it covers procedures for connecting devices, configuring IP addresses, and creating VLANs in a simulated environment.

Uploaded by

mailing2chinka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 20

Experiment-1

Aim: Study of different types of Network cable connections and practically


implement the cross-wired cable and straight through cable using clamping
tool.

Materials Required:
 Cat5e/Cat6 Cable
 RJ45 Connectors
 Crimping Tool
 Cable Tester

Common Types of Networking Devices

Network devices work as a mediator between two devices for data transmission, and thus
play a very important role in the functioning of a computer network. Below are some
common network devices used in modern networks:

Modem
A Modem (Modulator-Demodulator) is a device that converts digital data from a
computer into analog signals for transmission over telephone lines and vice versa. It is
essential for internet access over DSL or cable networks.

Repeater
A Repeater is a network device used to regenerate and amplify weak signals in a
network. It extends the coverage area by ensuring data signals travel long distances
without loss.

Hub
A Hub is a basic networking device that connects multiple devices in a network and
broadcasts incoming data to all connected devices. It operates at the physical layer and
does not differentiate between devices, making it less efficient than a switch.
Bridge
A Bridge is a networking device that connects two or more network segments, allowing
data to pass between them efficiently. It works at the data link layer and helps manage
network traffic by filtering and forwarding data based on MAC addresses.

Switch
A Switch is an intelligent network device that connects multiple devices within a LAN.
It operates at the data link layer and forwards data based on MAC addresses, improving
network efficiency by reducing collisions.

Router
A Router is a critical networking device that connects multiple networks and directs data
packets based on IP addresses. It determines the best path for data transmission and enables
communication between different networks, including the internet.

Gateway
A Gateway is a networking device that serves as a bridge between different networks using
different communication protocols. It enables seamless data transfer between dissimilar
systems, such as connecting an internal enterprise network to the internet.
Network Interface Card (NIC)
A Network Interface Card (NIC) is a hardware component that enables a computer
to connect to a network. It provides a physical interface for wired (Ethernet) or
wireless (Wi-Fi) connections, facilitating communication between devices.

Access Point
A Wireless Access Point (WAP) is a device that allows wireless devices connect to
a wired network using Wi-Fi. It extends the range of a network and enables seamless
wireless communication in large areas.

Firewall
A Firewall is a network security device that monitors and controls incoming and
outgoing network traffic. It acts as a barrier between trusted and untrusted networks,
protecting systems from cyber threats and unauthorized access.

Types of Cables:
Cables are essential components in networking, used to transmit data between
devices. They vary based on speed, distance, and interference resistance. Common
types include twisted pair, coaxial, and fiber optic cables, each serving specific
networking needs

Twisted Pair Cable

 Consists of pairs of wires twisted together to reduce electromagnetic interference.

 Two types: Unshielded Twisted Pair (UTP) and Shielded Twisted Pair
(STP).

 Commonly used in Ethernet networks (Cat5, Cat6 cables).


Coaxial Cable

 Has a central conductor surrounded by an insulating layer and a shielding layer.

 Used in cable TV, broadband internet, and older network setups.


Fiber Optic Cable

 Transmits data using light signals, providing high-speed and long-


distance communication.

 Two types: Single-mode (long-distance, high bandwidth) and


Multi-mode (short-distance, lower cost).

 Used in backbone networks and high-speed internet connections.

Types of Cable Connections

1. Straight-Through Cable
o Used to connect different types of devices (e.g., PC to switch, switch to router).
o Both ends follow the same wiring standard (T568A-T568A or
T568B- T568B).

2. Crossover Cable
o Used to connect similar devices (e.g., PC to PC, switch to switch).
o One end follows T568A, and the other follows T568B.

3. Rollover Cable (Console Cable)


o Used to connect a computer to a network device’s console port
for configuration.
Types of Cable Connections

1. RJ45 Connector – Used for Ethernet cables in networking. It has an eight-pin configuration
and is commonly found in wired networking setups, including home and office environments. RJ45
connectors provide a secure connection for transmitting data and are widely used in LANs, ensuring
reliable and high-speed internet connectivity.

2. BNC Connector – Used with coaxial cables in CCTV and radio applications. It features a quick-
connect bayonet-style mechanism, allowing for easy and secure connections. BNC connectors are
commonly used in video surveillance systems, radio- frequency transmissions, and test equipment,
providing a stable signal transmission with minimal loss and interference.

3. SC, ST, and LC Connectors – Used in Fiber optic cables for network communication. SC
(Subscriber Connector) is known for its push-pull mechanism, while ST (Straight Tip) features a
bayonet lock. LC (Lucent Connector) is compact and widely used in high-density networking
applications. These connectors ensure efficient light signal transmission with minimal signal loss.

Procedure: To do these practical following steps should be done:


1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable.
Be very careful at this point, as to not nick or cut into the wires, which are inside.
Doing so could alter the characteristics of your cable, or even worse render is useless.
Check the wires, one more time for nicks or cuts. If there are any, just whack the
whole end off, and start over.
2. Spread the wires apart but be sure to hold onto the base of the jacket with your
other hand. You do not want the wires to become untwisted down inside the jacket.
Category 5 cable must only have 1/2 of an inch of 'untwisted' wire at the end;
otherwise it will be 'out of spec'. At this point, you obviously have ALOT more than
1/2 of an inch of un- twisted wire.

3. You have 2 end jacks, which must be installed on your cable. If you are using a
pre- made cable, with one of the ends whacked off, you only have one end to install
- the crossed over end. Below are two diagrams, which show how you need to arrange
the cables for each type of cable end. Decide at this point which end you are making
and examine the associated picture below.

Straight-Through Wired Cables

Straight-Through refers to cables that have the pin assignments on each end of the cable.
In other words, Pin 1 connector A goes to Pin 1 on connector B, Pin 2 to Pin 2, etc.

Straight-Through wired cables are most commonly used to connect a host to a client.
When we talk about cat5e patch cables, the Straight-Through wired cat5e patch cable
is used to connect computers, printers, and other network client devices to the router
switch or hub (the host device in this instance).

Connector A Connector B

Pin 1 Pin 1
Pin 2 Pin 2
Pin 3 Pin 3
Pin 4 Pin 4
Pin 5 Pin 5
Pin 6 Pin 6
Pin 7 Pin 7
Pin 8 Pin 8

Crossover Wired Cables

Crossover wired cables (commonly called crossover cables) are very much like Straight-
Through cables with the exception that TX and RX lines are . Using the 568-B
standard as an example below, you will see that Pin 1 on connector A goes to Pin 3
on connector B. Pin 2 on connector A goes to Pin 6 on connector B, etc. Crossover
cables are most commonly used to connect two hosts directly. Examples
would be connecting a computer directly to another computer, connecting a switch
directly to another switch etc.

Connector A Connector B
 Pin 1 Pin 1
 Pin 2 Pin 2
 Pin 3 Pin 3
 Pin 4 Pin 4
 Pin 5 Pin 5
 Pin 6 Pin 6
 Pin 7 Pin 7
 Pin 8 Pin 8

Rollover Wired Cables

Rollover wired cables, most commonly called rollover cables, have opposite Pin
assignments on each end of the cable or, in other words, it is "rolled over." Pin 1 of
connector A would be connected to Pin 8 of connector B. Pin 2 of connector A would be
connected to Pin 7 of connector B and so on. Rollover cables, sometimes referred to as
Yost cables are most commonly used to connect to a device's console port to make
programming changes to the device. Unlike crossover and straight-wired cables, rollover
cables are not intended to carry data but instead create an interface with the device.

Connector A Connector B
 Pin 1 Pin 1
 Pin 2 Pin 2
 Pin 3 Pin 3
 Pin 4 Pin 4
 Pin 5 Pin 5
 Pin 6 Pin 6
 Pin 7 Pin 7
 Pin 8 Pin 8
Experiment-2

AIM: Connecting Devices Via Network Wire on Cisco Packet Tracer

Material Required:
• Laptop/Desktop
• CISCO Packet Tracer program

Setting Up:
Follow the below steps to initiate the setup for the connection:
Step 1: Download Cisco Packet Tracer.
Step 2: Run and install the setup (You can be requested to log in to your Cisco Networking Academy
Account or you can also log in as a guest).
Step 3: After the installation procedure has completed this display (below) will appear when you run
the Cisco Packet Tracer-Start the application.

Implementation:
Follow the below steps to implement the connection:
Step 1: From the bottom toolbar, click on ‘End Devices’ and select ‘PC’ and then click on the screen (for
two PC’s do this step twice).

Bottom toolbar->End devices->PC


This is how it will appear on the screen
Step 2: Now to connect the PC’s, we require a wire; we use cross-over wire to connect similar devices.
Select Connections from the bottom toolbar, and select cross-over wire (that is the fourth wire).

Step 3: After selecting the wire click on the computer on the screen(here PC0) and select FastEthernet0.
Then, drag the wire to the other pc (here PC1) and do the same.

Step 4: Now, we will assign the IP address to both the PCs (PC0 & PC1).

After clicking on IP configuration this is what will appear


Now in IPv4 Address, write 192.168.1.1, Subnet mask will be 255.255.255.0

Similarly, assign 192.168.1.2 to PC1


We have successfully connected two computers.
Now to check this, we will transfer data from one computer to another and check whether the transfer
is successful or not. To do so follow the below steps:
Step 1: From the Secondary Toolbar at the top, select ‘Add sample PDU’ that is the second last icon.

Step 2: Now click on PC0 and then PC1.

Now if in Realtime box- PDU list window it shows successful, that means all the connections are correct
and the data transfer is successful

You have successfully connected two computers, using the virtual program Cisco Packet Tracer .
Experiment-3

AIM: Configuration of an IP Address on a Router Interface: Packet Tracer

Materials Required:
 Cisco Packet Tracer software.
 Virtual PCs, Switch, and Copper Straight-Through Cables (within Packet Tracer)

Understanding Router CLI Modes:


Before we dive into the specifics of The Privileged Exec Mode on a Router, it’s important to understand
that router CLI operates in different modes. Each mode serves a distinct purpose, and users have varying
levels of access and control in each mode. The primary CLI modes on a Cisco router are:
1. User Exec Mode (>): When you first connect to a router’s CLI, you enter user exec mode. It is
indicated by the > prompt. In this mode, users have limited access and can execute basic commands
like ping, show, and enable.
2. Privileged Exec Mode (#) – Enable Mode: Privileged exec mode, often referred to as enable mode,
is the next level of access in the CLI. It is indicated by the # prompt. In this mode, users have
elevated privileges and can execute a broader range of commands, including those that can modify
router configurations.
3. Global Configuration Mode ((config)#): This mode allows users to make changes to the router’s
global configuration settings. It is indicated by the (config)# prompt. In this mode, users can
configure various parameters, such as setting IP addresses, defining access control lists (ACLs), and
configuring routing protocols.
4. Interface Configuration Mode ((config-if)#): Users enter this mode to configure specific router
interfaces (e.g., Ethernet, serial). It is indicated by the (config-if)# prompt. In this mode, users can
configure settings like IP addresses, encapsulation, and interface-specific parameters.
5. Subinterface Configuration Mode ((config-subif)#) – Optional: In some cases, when dealing with
subinterfaces (e.g., for VLANs or virtual routing and forwarding – VRF), users can access a
subinterface configuration mode. It is indicated by the (config-subif)# prompt.

Now, let’s focus on the “privileged exec” mode, its purpose, and why it is a crucial component of
router administration.
Topology Diagram

Background / Preparation:
In this activity, you will configure these settings on the customer Cisco Catalyst 2960 switch:

 Host name
 Console password
 vty password
 Privileged EXEC mode password
 Privileged EXEC mode secret
 IP address on VLAN1 interface
 Default gateway

Note: Not all commands are graded by Packet Tracer.

Step 1: Configure the switch host name.

a. From the Customer PC, use a console cable and terminal emulation software to connect to the
console of the customer Cisco Catalyst 2960 switch.
b. Set the host name on the switch to CustomerSwitch using these commands.

Switch>enable Switch#configure terminal


Switch(config)#hostname CustomerSwitch

Step 2: Configure the privileged mode password and secret.

a. From global configuration mode, configure the password as cisco.

CustomerSwitch(config)#enable password cisco

b. From global configuration mode, configure the secret as cisco123.

CustomerSwitch(config)#enable secret cisco123

Step 3: Configure the console password.


a. From global configuration mode, switch to configuration mode to configure the console line.
CustomerSwitch(config)#line console 0
b. From line configuration mode, set the password to cisco and require the password to be entered at
login.

CustomerSwitch(config-line)#password cisco
CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit

Step 4: Configure the vty password.


a. From global configuration mode, switch to the configuration mode for the vty lines 0 through 15.

CustomerSwitch(config)#line vty 0 15

b. From line configuration mode, set the password to cisco and require the password to be entered at
login.

CustomerSwitch(config-line)#password cisco
CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit

Step 5: Configure an IP address on interface VLAN1.

From global configuration mode, switch to interface configuration mode for VLAN1, and assign the IP address
192.168.1.5 with the subnet mask of 255.255.255.0.

CustomerSwitch(config)#interface vlan 1
CustomerSwitch(config- if)#ip address 192.168.1.5 255.255.255.0
CustomerSwitch(config- if)#no shutdown
CustomerSwitch(config-if)#exit

Step 6: Configure the default gateway.


a. From global configuration mode, assign the default gateway to 192.168.1.1.

CustomerSwitch(config)#ip default-gateway 192.168.1.1


Experiment - 4
AIM:
VLAN Creation using Cisco Packet Tracer.

Materials Required:
 Cisco Packet Tracer software.
 Switch and multiple PCs (simulated in Packet Tracer).

THEORY:

A Virtual Local Area Network (VLAN) is a logical grouping of devices in a network, enabling segmentation
to improve performance, security, and manageability. VLANs create multiple broadcast domains within a
single switch, ensuring traffic is contained within each VLAN unless routed externally.
Benefits of VLANs:

 Reduces broadcast traffic.


 Enhances security by isolating sensitive data.
 Improves network performance by limiting unnecessary traffic.
 Simplifies network management and segmentation.

PROCEDURE:

1. Setup the Network Topology:


 Open Cisco Packet Tracer.
 Drag and drop:
o One Switch.
o Three PCs.
 Connect each PC to the switch using Straight-Through Cables.

2. Configure End Devices:


 Click on each PC → Go to the Desktop tab → Click on IP Configuration.
 Assign IP addresses as follows:
o PC0: IP: 192.168.10.1 | Subnet Mask: 255.255.255.0
o PC1: IP: 192.168.10.2 | Subnet Mask: 255.255.255.0
o PC2: IP: 192.168.20.1 | Subnet Mask: 255.255.255.0

3. Access Switch CLI:

 Click on the switch → Go to the CLI (Command Line Interface).


 Enter the following commands to enter configuration mode:
Switch> enable
Switch# configure terminal

4. Create VLANs:
 Create VLAN 10 and VLAN 20:
Switch(config)# vlan 10
Switch(config-vlan)# name Sales
Switch(config-vlan)# exit

Switch(config)# vlan 20
Switch(config-vlan)# name IT
Switch(config-vlan)# exit

5. Assign Ports to VLANs:


 Assign the ports connected to PC0 and PC1 to VLAN 10, and PC2 to VLAN 20:

Switch(config)# interface fastEthernet 0/1


Switch(config-if)# switchport mode access
Switch(config-if)# switchport access vlan 10
Switch(config-if)# exit

Switch(config)# interface fastEthernet 0/2


Switch(config-if)# switchport mode access
Switch(config-if)# switchport access vlan 10
Switch(config-if)# exit

Switch(config)# interface fastEthernet 0/3


Switch(config-if)# switchport mode access
Switch(config-if)# switchport access vlan 20
Switch(config-if)# exit

6. Verify VLAN Configuration:


 Check VLAN assignments with:
Switch# show vlan brief

 The output should show VLAN 10 with ports Fa0/1, Fa0/2 and VLAN 20 with port Fa0/3.

7. Test Connectivity:
 Open the Command Prompt on each PC.
 PC0 should be able to ping PC1 (since they’re in the same VLAN).
ping 192.168.10.2
 PC0 should not be able to ping PC2 (since they’re in different VLANs).

OBSERVATION:
 PCs in the same VLAN communicated successfully.
 PCs in different VLANs could not communicate without additional configuration like inter-VLAN
routing.

RESULT:
VLANs were successfully created and configured, ensuring proper network segmentation.

You might also like