LAB MANUAL OF CN
LAB MANUAL OF CN
COMPUTER NETWORK
LAB MANUAL
SEMESTER : III
COURSE CODE : CA-C14L
1
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
SYLLABUS
1. Execute the following commands: arp, ipconfig, hostname, netdiag, netstat, nslookup,
pathping, ping route, tracert
2. Study of different types of network cables.
3. Practically implement the cross-wired cable and straight wired cable using crimping
tool.
4. Study of network IP address configuration: (Classification of address, static and dy-
namic address)
5. Study of network IP address configuration: (IPv4 and IPv6 , Subnet, Supernet)
6. Study of network devices: (Switch, Router, Bridge)
7. Configure and connect the computer in LAN.
8. Block the website using “Windows Defender Firewall” in windows 10.
9. Share the folder in a system, and access the files of that folder from other system using
IP address.
10. Share the printer in Network, and take print from other PC.
11. Configuration of Wi-Fi hotspot, and connect other devices (mobile / laptop).
12. Configuration of switches.
13. Configuration of I/O box fixing.
14. Making your own patch cord.
15. Configuration of VLAN using Packet Tracer/ GNS3
16. Configuration of VPN using Packet Tracer/ GNS3
2
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
INDEX
SL.NO EXPERIMENT
3
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
arp, ipconfig, hostname, netdiag, netstat, nslookup, pathping, ping route, tracert
C:\Users\BCALABSYS12>arp
A: arp:
-a Displays current ARP entries by interrogating the current protocol data. If inet_addr
is specified, the IP and Physical addresses for only the specified computer are displayed.
If more than one network interface uses ARP, entries for each ARP table are displayed.
-g Same as -a.
-v Displays current ARP entries in verbose mode. All invalid entries and entries on the
loop-back interface will be shown.
inet_addr Specifies an internet address.
-N if_addr Displays the ARP entries for the network interface specified by if_addr.
-d Deletes the host specified by inet_addr. inet_addr may be wildcarded with * to delete
all hosts.
-s Adds the host and associates the Internet address inet_addr with the Physical address
eth_addr. The Physical address is given as 6 hexadecimal bytes separated by hyphens.
The entry is permanent.
eth_addr Specifies a physical address.
if_addr If present, this specifies the Internet address of the interface whose address
translation table should be modified If not present, the first applicable interface will be
used.
Example:
> arp -s 157.55.85.212 00-aa-00-62-c6-09 .... Adds a static entry.
> arp -a Displays the arp table.
4
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
B: ipconfig:
Displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration
Protocol (DHCP) and Domain Name System (DNS) settings. Used without parameters, ipconfig dis-
plays Internet Protocol version 4 (IPv4) and IPv6 addresses, subnet mask, and default gateway for all
adapters.
C:\Users\BCALABSYS12>ipconfig
Windows IP Configuration
C: hostname:
Displays the name of the current host system. Only users with root user authority can set the host
name.
C:\Users\BCALABSYS12>hostname
BCA-CL1-PC10
5
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
D: netdiag
The Netdiag command-line diagnostic tool helps to isolate networking and connectivity prob-
lems by performing a series of tests to determine the state of your network client.
E: netstat: Displays the contents of various network-related data structures for active connec-
tions. This netstat function shows the state of all configured interfaces.
C:\Users\BCALABSYS12>netstat
Active Connections
6
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
F: nslookup:
The nslookup command queries internet domain name servers in two modes. Interactive mode allows
you to query name servers for information about various hosts and domains, or to print a list of the
hosts in a domain. In non-interactive mode, the names and requested information are printed for a
specified host or domain.
C:\Users\BCALABSYS12>nslookup
Address: 192.168.0.12
7
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
G: Pathping:
C:\Users\BCALABSYS12>pathping
Usage: pathping [-g host-list] [-h maximum_hops] [-i address] [-n] [-p period] [-q
num_queries] [-w timeout [-4] [-6] target_name
Options:
8
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
I: Tracert:
The tracert command is a Command Prompt command that's used to show several details about the path
that a packet takes from the computer or device you're on to whatever destination you specify.
C:\Users\BCALABSYS12>tracert
Options:
9
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Networking cables are a type of networking hardware used to connect a network device to one
or more other network devices, or to connect two or more devices to a single computer or
network device.
Network cables act as a medium through which information and data travel from one network
device to another. The type of cable used for a network depends on the network’s topology,
size, and procedure. The different types of network cables act as the supporting basis of the
network infrastructure.
A) Coaxial Cable
Coaxial cables have a single copper conductor at the center, while a plastic layer pro-
vides insulation between the centre conductor and braided metal shield.
The metal shield blocks outside interference from fluorescent lights, motors, and other
computers.
Coaxial cabling is highly resistant to signal obstruction, although it can be complex to
install.
It can handle greater cable lengths between network devices than twisted pair cables.
The two types of coaxial cables are thick coaxial and thin coaxial.
10
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Fiber optic cables possess a centre glass core surrounded by multiple layers of protec-
tive materials.
They avoid electrical obstruction by transmitting light instead of electronic signals,
making them perfect for environments with large amounts of electrical interference.
Fiber optic cables have become the standard for connecting networks across buildings
because of their resistance to moisture and lighting.
The twisted conductors are shielded by a copper braid covering or a foil shield to reduce
noise interference
loe-cos medium and support data rats up to several Mbps
Twisted pairs can also used for either analogy or digital transmission
The band width supported by the wire depends on the thickness of the wire and distance
to be revealed by a signal on it.
Shielded twisted pair cables can also help to expand the distance between the cables.
D) Unshielded Twisted Pair (UTP) Cable
11
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
This cable sensual less class talk and a higher quality of signal over long a distances
therefore these cables are popularly used for high speed computer communication
The wires are not shielded and can support your data that of several MBPS
Used in applications like analogue and digital technology that is LAN etc
Noise and electromagnetic interference are high
12
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
When someone says “ethernet” they are usually referring to standard ethernet patch cords. A
standard patch cord is the most common type of ethernet and used for connecting different
devices together. However, standard patch cords (also called straight-thru cords) can only con-
nect different devices. If you need to connect a computer to something different like a modem
or printer, they work fine. But if you need to connect two computers, two network switches, or
any other identical electronics, you will need a crossover cable instead.
To connect two computers, two network switches, or any other identical electronics,
you will need a crossover cable instead.
To understand the difference, we start by looking at the way ethernet cables are wired.
Each cable has eight smaller wires called conductors on the inside.
There are different ways to line up the conductors with the pins on RJ45 connectors,
but the industry standard is T-568A and T-568B.
Most cables manufactured today use the T-568B version, but some older cables with
the T-568A version are still around.
Figure 3.1
To implement Straight Through cable:
13
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Standard patch cords (also called straight-thru cords) are used to connect different de-
vices like PC to router or router to switch and so on.
A straight-thru cable will use the same wiring scheme on both sides of the cable to
send and receive data.
Figure 3.1
14
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Classification IP address:
TCP / IP defines 5 classes of IP addresses class A,B,C,D and each class has a range of valid
IP addresses the value of first opted determines the class IP address from the first three classes(
A B and C) can be used for hot host addresses. The other two classes are used for other pur-
poses class D formatting class and class E for experimental purposes.
For the IP addresses from Class A, the first 8 bits (the first decimal number) represent the
network part, while the remaining 24 hits represent the host part. For Class B, the first 16 bits
(the first two numbers) represent the network part, while the remaining 16 bits represent the
host part. For Class C. the first 24 bits represent the network part, while the remaining 8 bits
represent the host part
10.55.125.70: This is a Class A address, the first number (10) represents the network part
while the remainder of the address represents the host part (55.125.70). This means that, In
order for devices to be on the same network, the first number of their IP addresses has to be
the same for both devices. In this case, a device with the IP address of 10,37.9.2 is on the same
15
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
network as the device with the IP address listed above. The device with the IP address
11.55.46.0 is not on the same network, because the first number of its IP address is different.
1 Static IP Address:
The IP address which stays same over time and doesn’t changes with each reboot is called
static IP. As the IP is constant so it is less secure.
Static IP addresses (also known as fixed or dedicated IP addresses), on the other hand,
do not change.
Once a device has been assigned a static IP address, that number remains with the de-
vice as its internet identifier until the device is decommissioned or the network archi-
tecture is modified.
In most cases, devices that are given static IP addresses tend to be servers and other
important equipment that require permanent addresses for other devices to reference.
A static IP address is useful if we host a website from home, have a file server in our
network, use networked printers, forward ports to a specific device, run a print server,
or use a remote access program.
Because a static IP address never changes, other devices always know exactly how to
contact a device that uses one.
For example, if a static IP address is set up for a computer in a home network.
Once the computer has a specific address tied to it, a router can be set up to always
forward certain inbound requests directly to that computer, such as FTP requests if the
computer shares files over FTP.
2. Dynamic IP Address:
The IP address which changes over time and changes with each reboot or refresh is
called dynamic IP. It is more secured than static IP.
16
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
A dynamic IP address is a regular address like a static IP is, but it's not permanently
tied to a device. Instead, dynamic IP addresses are used for a specific amount of time
and then returned an address pool so that other devices can use them.
Most devices use dynamic IP addresses, which are assigned by the network when they
connect and change over time.
Most home networks are likely to have a dynamic IP address and the reason for this is
because is cost effective for Internet Service Providers (ISP's) to allocate dynamic IP
addresses to Instead of one IP address always being allocated to home network (Static
IP).
IP address is palled from a pool of addresses and then assigned to home network by
ISP.
After a few days, weeks or sometimes months that IP address is put back into the pool
and new IP address are assigned their customers.
DHCP (Dynamic Host Configuration Protocol) is a protocol that provides quick, auto-
matic, and central management for the distribution of IP addresses within a network.
It's also used to configure the subnet mask, default gateway, and DNS server infor-
mation on the device
17
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Computers do not understand the IP addresses in the standard numeric format as the computers
understand the numbers in binary form only. The binary number can be either 1 or 0. The IPv4
consists of four sets, and these sets represent the octet. The bits in each octet represent a num-
ber. Each bit in an octet can be either 1 or 0. If the bit the 1, then the number it represents will
count, and if the bit is 0, then the number it represents does not count.
What is IPV4?
An IPv4 address is a series of four eight-bit binary numbers separated by a decimal point. Although
you may use any numbering system to represent a unique 32-bit number, most commonly you see IP
addresses expressed in dot-decimal notation.
4 OCTET
192 168 2 33
128 64 32 16 8 4 2 1
0 1 0 0 0 0 1 0
128 64 32 16 8 4 2 1
0 1 0 1 1 1 1 0
Step 3: The next number is 29.
128 64 32 16 8 4 2 1
0 1 0 0 0 0 1 0
18
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
128 64 32 16 8 4 2 1
0 1 0 0 0 0 1 0
What is IPv6?
IPv4 produces 4 billion addresses, and the developers think that these addresses are enough,
but they were wrong. IPv6 is the next generation of IP addresses. The main difference between
IPv4 and IPv6 is the address size of IP addresses. The IPv4 is a 32-bit address, whereas IPv6
is a 128- bit hexadecimal address. IPv6 provides a large address space, and it contains a simple
header as compared to IPv4.
16 octet
IPV4 IPV6
Fields IPv4 is a numeric address that consists of 4 fields which are IPv6 is an alphanu-
separated by dot (.). meric address that
consists of 8 fields,
which are sepa-
rated by colon.
19
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Classes IPv4 has 5 different classes of IP address that includes Class IPv6 does not con-
A, Class B, Class C, Class D, and Class E. tain classes of IP
addresses.
Number of IP ad- IPv4 has a limited number of IP addresses. IPv6 has a large
dress number of IP ad-
dresses.
VLSM It supports VLSM (Virtual Length Subnet Mask). Here, It does not support
VLSM means that Ipv4 converts IP addresses into a subnet VLSM.
of different sizes.
20
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Router:
Routers are networking devices operating at layer 3 or a network layer of the OSI
model.
Routers are responsible for receiving, analysing, and forwarding data packets
among the connected computer networks.
When a data packet arrives, the router inspects the destination address, consults its
routing tables to decide the optimal route and then transfers the packet along this
route.
Hub:
A hub is a physical layer networking device which is used to connect multiple devices in a
network.
They are generally used to connect computers in a LAN.
A hub has many ports in it. A computer which intends to be connected to the network is
plugged in to one of these ports.
When a data frame arrives at a port, it is broadcast to every other port, without considering
whether it is destined for a particular destination or not.
21
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Switches:
A switch is a data link layer networking device which connects devices in a network and uses
packet switching to send and receive data over the network.
Like a hub, a switch also has many ports, to which computers are plugged in.
However, when a data frame arrives at any port of a network switch, it examines the destination
address and sends the frame to the corresponding device(s).
Thus, it supports both unicast and multicast communications.
22
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Hub Switch
They operate in the physical layer of the OSI model. They operate in the data link layer of
the OSI model.
It is a non-intelligent network device that sends message to It is an intelligent network device that
all ports. sends message to selected destination
ports.
Collisions may occurs during setup of transmission when Collisions do not occur since the com-
more than one computers place data simultaneously in the munication is full duplex.
corresponding ports.
They are passive devices, they don’t have any software as- They are active devices, equipped
sociated with it. with network software.
They generally have fewer ports of 4/12. The number of ports is higher – 24/48.
Bridge:
Bridges are used to connect two subnetworks that use interchangeable protocols. It combines
two LANs to form an extended LAN. The main difference between the bridge and repeater is
that the bridge has a penetrating efficiency.
Working of Bridges:
A bridge accepts all the packets and amplifies all of them to the other side.
23
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
The bridges are intelligent devices that allow the passing of only selective packets from
them.
A bridge only passes those packets addressed from a node in one network to another
node in the other network.
A bridge receives all the packets or frame from both LAN (segment) A and B.
A bridge builds a table of addresses from which it can identify that the packets are sent
from which LAN (or segment) to which LAN.
The bridge reads the send and discards all packets from LAN A sent to a computer on
LAN A and that packets from LAN A send to a computer on LAN B are retransmitted
to LAN B.
The packets from LAN B are considered in the same method.
24
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Step 2: Click the Start button on the taskbar and then click Settings.
25
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
26
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
27
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
28
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Windows 10 has proven to be very efficient for filtering and blocking harmful applications
from damaging computers. It’s also a great tool to rely on when using public networks.
Step 2: Select “Windows Defender Firewall” followed by “Advanced Settings” on the left-side
pane.
29
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Step 3: Right-click on “Outbound Rules” from the menu on the left and select “New Rule.”
Step 4: When a new window pops up, select the “Custom” option followed by “Next.”
Step 5: On the next window, select “All programs” and again select
“Next.”
30
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Step 6: Select the ” These IP addresses ” option under “Which remote IP addresses does this
rule apply to?”
31
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Step 7: Click on “Add” and enter the IP addresses you want to block. Then select “Next.”
Step 8: Make sure to choose the “Block the connection” option and click on “Next.”
32
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Step 9: Choose whether the rule applies to Domain, Private, or Public. You can also select all
three.
Step 10: Select “Next,” add a name or description for this rule, and select “Finish” to complete
the action.
33
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Step 7: Select the everyone object if you want to share the folder to everyone or add button
34
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Step 8: Tick the permission boxes to assign users the permission to either read or read and
Step 10: Now to test if the shared folder will be accessed over the network, you need to know
the IP address of your PC (the computer containing the shared folder). To find the IP address
of your computer, go to search and type the command “cmd” to launch the command prompt
application and then type “ipconfig” in the command line prompt dialog as shown below:
Step 11: On the same computer, Go to search and type in the command “run” to launch the run
app and then type in:\\IP address(eg:\\192.168.1.103) as shown the dialog below:
35
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Step 1: Before you can share a printer, it must first be set up, connected, and powered on.
Click Start > Settings > Devices, then open the Devices and Printers link. Right-click your
printer, then click Printer properties.
Step 2: Click Start > Settings > Devices, then open the Devices and Printers link. Right-click
your printer, then click Printer properties.
Step 3: Select the Sharing tab, then check the box to share your printer.
36
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Step 4: Users should consider that if you are sharing a printer with multiple devices running a
mixture of Windows client architectures – 32 or 64 bit-you should enable the “Render print
jobs on client computers” option. This will ensure other users can easily install the printer when
connecting over the network.
After setting up your shared printer, you can connect to it multiple ways. The first method is
from within Devices and Printer. Click the Add Printer button, then click the link, The printer
that I want isn’t listed. Choose the Select a shared printer by name radio box, browse to the
printer on your network, and click open.
You will be prompted to install the driver. Click Next to complete the installation of the printer.
37
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
That’s it! The printer will now show up in Devices and printers as a local device.
Another way you can connect to a shared network printer is from within File Explorer. Open
the Network folder, browse the shared printer’s computer, right-click it, then click Connect.
38
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Step 3: Grey RJ Connector connect one end to LAN 1 in modem ,another end to CPU
Step 14: Personalize wireless setting Network Host Name and Password.
39
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Switches are networking devices operating at layer 2 or a data link layer of the OSI model.
They connect devices in a network and use packet switching to send, receive or forward data
packets or data frames over the network.
The Cisco switches are the versatile, reliable, flexible and powerful. In this Lab Program, We
will perform the basic switch configuration using Cisco Packet Tracer.
Open Cisco Packet Tracer and choose guest login option in the bottom right corner. You will
get window of Cisco Packet Tracer. Then click on Network devices and select two (Switch 0
and Switch1) switches(2960-24TT) from the switch option.
Go to the CLI tab and then connect to the console of the switch. You will get initial command
prompt "Switch>"
Type "enable" and hit enter. You will get into priviliged EXEC mode("Switch#"). Now, get
into Global Configuration Mode:
Step 3: Set up a hostname for the particular switch to distinguish it in the network
40
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
By default, all physical ports of the switch belong to the native VLAN1. In order to do the
Layer 2 segmentation you need to create additional VLANs from the default VLAN1 and then
assign physical ports to these new Vlans. Let's create two new vlans (VLAN2 and VLAN3)
and assign two ports to each one.
Access-switch1(config)# vlan 3
Access-switch1(config-vlan)# name STUDENTS
Access-switch1(config-vlan)# exit
!Now assign physical ports to each VLAN. Ports 1-2 are assigned to VLAN2 and ports 3-
4 are assigned to VLAN3
Access-switch1(config)# interface range fa 0/1-2
Access-switch1(config-if-range)# switchport mode access
Access-switch1(config-if-range)# switchport access vlan 2
Access-switch1(config-if-range)# exit
Access-switch1(config)# interface range fa 0/3-4
Access-switch1(config-if-range)# switchport mode access
Access-switch1(config-if-range)# switchport access vlan 3
Access-switch1(config-if-range)# exit
Step 7: Save the configuration
Access-switch1(config)# exit
Access-switch1# wr
The above command to save the configuration can also be accomplished with copy run
start.
The above are the some steps that can be followed for basic set-up of a Cisco switch. Of course
there are more things to configure (such as SNMP servers, NTP, AAA, Layer3 Vlan routing
etc) but those depends on the requirements of each particular network.
Some useful "show" commands
41
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
After configuring the basic steps above, let's see some useful commands to monitor your con-
figuration or troubleshoot possible problems:
(Displays all vlan numbers, names , ports associated with each vlan etc)
(Displays current MAC address table and which MAC address is learned on each inter-
face)
42
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Required Components:
a. Punching tool
b. I/O Box
Procedure:
1. Choose I/O Box. It has a set code piece (Class A and Class B) on one side and four pins on
the other (A and B)
2. Collect Twisted pair cable remove outer layer using crimping tool or cable strippng tool
3. Next, you must separate the twisted pair wires and straighten them.
4. Insert the wires according to the color code B(One side four and another side four)
5. We must punch wires and remove superfluous wires using the punching tool.
43
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
crimping tool
I/O Box
44
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Step 1:
This procedure generally applies to Cat 5 RJ45 connectors. An alternate method is given for
connectors utilizing a “load bar”
Step 2:
Cut the cable to the length needed.If you plan to use snagless boots, this would be a good time
to slide them on. Be sure the boots willbw facing “out” towards the connector.
Step 3:
Strip back the cable jacket approximately 1 inch. Use the sutter provided with the crimping
tool or strip by hand. Be careful not tonick the individual wires. Un-twist each of the 4 pairs
and straighten each wire s much as possible between the fingers.
Step 4
Use the 568-B wiring scheme on both ends for a standard patch cable.
Step 5:
45
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Step 6:
With the connector pins facing up, carefully insert the wires into the connector.
Apply a moderate amount of force in order to properly seat the wires against the contacts in
the connector.
A. Note that the loadbar has slots on one side with a flanged edge on one end.
The sloted side should face the pins inside the connector.
The wires are inserted into the flanged end.
B. Hold the grouped (and sorted) wires together tightly, between the thumb, and forefinger.
Cut all of the wires at a sharp angle from the cable.
Use a sharp cutting tool so as not to "squash" the wire ends.
46
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
C.Hold the load bar so the staggered holes face toward the cable.
Insert the wires through the load bar, one at a time, carefully observing the orientation.
Slide the load bar as far down as possible.
D. Cut off the excess wire ends with a straight cut about 0.25" past the load bar.
With the connector pins facing up, slide the load bar assembly into the connector.
Insure that the wires are firmly seated to the end of the connector.
The brown pair wires should be on the right side.
Step 7:
Observe the tip of the connector to confirm that all the wires are fully inserted.
The end of each wire you should be in full view.
There should be enough of the cable jacket inside the connector to crimp against.
Note: Slide the load bar forward as necessary to provide the ideal placement.
47
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Step 8:
Place the connector into the crimp tool, and squeeze hard so that the handle reaches its full
swing.
Step 9:
Repeat the process on the other end using the desired wiring scheme.
Be sure to slide the snagless boots snugly over the connectors when finished.
Step 10:
Always use a cable tester to check for continuity, opens and shorts.
Cable Testers
Step 11:
Building patch cables takes practice so keep at it until you master your technique!
48
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Virtual LAN (VLAN) is a concept in which we can divide the devices logically on layer 2 (data
link layer). Generally , layer 3 devices divide broadcast domain but broadcast domain can be
divided by switches using the concept of VLAN.
A broadcast domain is a network segment in which if a device broadcast a packet then all the
devices in the same broadcast domain will receive it.To forward out the broadcast packets to
different VLAN(from one VLAN to another) or broadcast domain, inter VLAN routing is
needed.Through Vlan, different small sized sub-networks are created which are comparatively
easy to handle.
VLAN Ranges:
1. VLAN 1: It is the default VLAN of switches.By default, all switchports are in VLAN.
2. VLAN 2-1001: This is a normal VLAN range. We can create, edit and delete these VLAN.
49
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
1.Complexity
2. Limited Scalability
3. Limited mobility
STEP 1: Open the Cisco Packet Tracer and select two Switches (Switch0 and Switch1)
Firstly, We select two switches(2960-24TT) namely Switch 0 and Switch 1 and connect them
with the universal cable as shown in the figure below:
Click on the switch and go to CLI tab. On the first line, you will see "Switch>". Give command
"enable" to enable that switch and give another command "show vlan " , you will see all the
vlans created on that particular switch.
You will see one default vlan which is vlan 1 with all switchports assigned to it and few other
vlans which are active but without having any switchports assigsned to them.
STEP 3: Create two new VLANs (vlan 2 and vlan 3) in both of the switches
50
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
We enter into the global configuration mode by using command "configure terminal".
Now,first we will create a vlan 2 with name STUDENTS and vlan 3 with name FACULTIES
in both of the switches.
Step 4: Take four end devices and connect 2/2 of them to each switch
We select two PCs(PC0 and PC1) and two servers (Server0 and Server1) as the end devices
and connect them to switches using universal cable. And also group together PC0 and Server0
in vlan 2 and PC1 and Server1 in vlan 3.
Choose the interface FastEthernet0/2 for both the switches and made switchport to access vlan
2 (STUDENTS). Also select the interface fastethernet0/3 for both the switches and made
switchport to access vlan 3 (FACULTIES). Now we have separated two vlans (vlan 2 and vlan
3) from each other and each of them consists of one PC and one Server.
51
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Step 7: Assign IP addresses to each of the end devices in both the VLANs
We assign different IP addresses for all the devices in the VLANs and take the default subnet
mask for each of them.
52
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Step 8: Check the VLAN configuration by using "ping" command in command prompt of end
devices
If the configuration of the VLANs is correct , then we should be able to ping the IP address of
one device from the another device within the same VLAN . But we cannot
53
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
What is a VPN?
A VPN is a secure connection that can be made between a computer (such as a user's computer
at home or on the road) and a protected or private corporate network (such as Lehigh's campus
network), using an otherwise insecure public network (such as the Internet). Data that is passed
over the public network is encapsulated (wrapped up) and encrypted (translated into a secret
code) so that it can't be intercepted or tampered with. Passing data through a network without
letting the network actually see the data like this is a process known as tunneling. In effect, the
connection works just as if the computer were connected to the protected network by its own
private wire with a point-to-point direct connection. Thus the name VPN, which stands for vir-
tual private network.
1. VPN also ensures security by providing an encrypted tunnel between client and VPN
server.
2. VPN is used to bypass many blocked sites.
3. VPN facilitates Anonymous browsing by hiding your ip address.
4. Also, most appropriate Search engine optimization(SEO) is done by analyzing the data
from VPN providers which provide country-wise stats of browsing a particular product.
This method of SEO is used widely my many internet marketing managers to form new
strategies.
In this lab program, We will see how to configure a VPN using Cisco Packet Tracer and un-
derstand the working of a VPN in a computer network
54
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
STEP 1: Open the Cisco Packet Tracer and select four PCs , two Switches(2960-24TT)
and four Routers(2811 series)
Firstly, We take four PCs namely PC0, PC1, PC2 and PC3 as end devices. Two switches
namely Switch0 and Switch1 are also taken. And finally we take four Routers namely
Router0,Router1,Router2 and Router3. Place all this devices as shown in the figure below:
Choose universal cable and connect first two PCs (PC0 and PC1) to Switch0. Also connect
another two PCs (PC1 and PC2) to Switch1. Again take the same cable to connect Switches
with the routers and the routers among them selves also get connected.
55
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Step 3: Label all the devices with the respective ip addresses and also indicate the ip address
of particular network of devices
We choose ip addresses of 10.0.0.1 and 10.0.0.2 for PC0 and PC1 respectively which are in
network 10.0.0.0. The default gateway for this network is 10.0.0.3. Similarly, We choose ip
addresses of 20.0.0.1 and 20.0.0.2 for PC2 and PC3 respectively which are in another network
20.0.0.0. The default gateway for this network is 20.0.0.3. The ip address for Router0 is
60.0.0.1 and the end point of the cable starting from Router 0 has ip address of 60.0.0.2 and
this network of two routers is of 60.0.0.0.Similarly, The ip address for Router1 is 70.0.0.1 and
the end point of the cable starting from Router 1 has ip address of 70.0.0.2 and this network of
two routers is of 70.0.0.0. Again The ip address for Router2 is 80.0.0.1 and the end point of the
cable starting from Router2 has ip address of 80.0.0.2 and this network of two routers is of
80.0.0.0. And the ip address of Router3 is same as the default gateway 20.0.0.3. The labelling
is as below:
Click on the PCs and select IPConfiguration from the desktop tab and type the ip addresses
and default gateway for all four PCs as mentioned in their respective labels.
56
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Step 5: Configure all the routers with their own ip addresses for both FastEthernet0/0 and
FastEthernet0/1 cables and also configure Routing Information Protocol(RIP) for each of the
routers
Before processing further let's learn about RIP. Routing Information Protocol(RIP) is a dy-
namic routing protocol that uses hop count(number of routers occuring in between the source
and destination network) as a routing metric to find the best path between the source and the
destination network.
In this step we first give respective ip addresses to all the fastethernet interfaces of each router
starting from 10.0.0.3 for the Router0's fa0/0 t0 20.0.0.3 for the Router3's fa0/1. Each time it
is necessary to turn on port status while assigning ip addresses to each of the interfaces of
routers.
For RIP configuration of routers, we have to add both source and destination
address of that particular network of two devices. Consider the images below for the references:
(do similar tasks for all the routers)
57
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Step 6: Check if the configuration of all the routers is done correctly or not
If you see these green points in every cable connecting the two devices , then it indicates that
the configuration of all the routers is done correctly.
Step 7: Try sending messages from one device to another either one PC to another PC or PC
to one of the Router. And use the the "tracert" in command prompt of any of the PCs to display
the routes involved in transmission from one device to another.
See if the transmission of message results into successfull or fail. Also observe that by using
command "tracert" we get all the routes that should be followed to reach to the destination
address from the source device.
Step 8: Make a tunnel to demonstrate the use of VPN and label with an ip address to two end
of the tunnel.
Select a rectangle with no fill and take another rectangle with bluish color to place inside the
first rectangle.This is to visualize a tunnel.
58
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
The main use of VPN is to bypass one or more routers in a communication path so that the we
can directly reach to the destination address without making use of underlying routes. The
tunnel looks like below image:
Step 9: Configure the VPN by adding tunnel ip address and source as well as destination ad-
dresses
We choose Router0 and Router3 for establishing the communication so we will bypass Router1
and Router2. First configure the tunnel 0 for Router 0 and Then For the Router3 . The com-
mands used in configuration for the routers are shown in the figures below:-
59
Computer Network Lab
Acharya Institute of Graduate Studies Department of Computer Application
Step 10: Check the VPN configuration by routing from one end of the tunnel to another.
When we use the command "tracert 192.168.1.2" , it successfully bypasses all other routers in
the communication path and reaches to the destination directly. This proves that the VPN con-
figuration done by us is correctly working.
60
Computer Network Lab