0% found this document useful (0 votes)
4 views

cisco1

The document outlines a lab task for a Computer Networks course at Abbottabad University, detailing the network setup, including a star topology with interconnected devices like switches and computers. It explains the process of configuring IP addresses and subnet masks, differentiates between types of network cables, and describes methods to verify connections in Packet Tracer. Additionally, it emphasizes the importance of assigning specific ports for network stability, performance, and security.

Uploaded by

Zurghuna Gul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

cisco1

The document outlines a lab task for a Computer Networks course at Abbottabad University, detailing the network setup, including a star topology with interconnected devices like switches and computers. It explains the process of configuring IP addresses and subnet masks, differentiates between types of network cables, and describes methods to verify connections in Packet Tracer. Additionally, it emphasizes the importance of assigning specific ports for network stability, performance, and security.

Uploaded by

Zurghuna Gul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Abbottabad University of Science & Technology

Department Of Computer Science

Name: Zurghuna Gul

Roll No: 13646

Semester: BSSE 5TH A

Subject: Computer Network

Lab Task No: 2

Session: Spring 2025

Submitted To: Sir Hamza


LAB TASKS :
Attach Screen Shots while performing each task.

Task 1:

1. Describe the topology of the network setup in this lab. What devices are included,
and how are they interconnected?

Topology of network setup

1. Network Topology Type: Star Topology

 The network follows a star topology, where all devices (computers, laptops, etc.) are
connected to a central switch.
 The switch acts as the main communication hub, forwarding data between devices.

2. Devices Included in the Network:

 Switch: Central networking device that connects all other devices.


 Computers (PCs/Laptops): End-user devices connected to the switch via Ethernet
cables.
 .

3. How Devices Are Interconnected:

 Each device is connected to the switch using an Ethernet cable (e.g., Cat5e, Cat6).
 The switch manages data transmission and ensures communication between devices
without collisions

Task 2:
2. Explain the process of configuring IP addresses and subnet masks on the hosts.
What steps are involved, and why is it necessary to configure these parameters?

CONFIGURING IP ADRESSES

Steps to Configure IP Addresses and Subnet Masks on a Host

Why is it Necessary?

Configuring IP addresses and subnet masks is essential for communication within a network. It
allows devices to identify each other and ensures proper data transfer between hosts.

Step 1: Open Network Settings

Windows

1. Open Control Panel → Click on Network and Sharing Center


2. Click on Change adapter settings (on the left panel)

Step 2: Select Network Adapter

1. Right-click on your active network connection (e.g., Ethernet or Wi-Fi)


2. Click Properties

Step 3: Configure TCP/IP Settings

1. Scroll down to Internet Protocol Version 4 (TCP/IPv4)


2. Select it and click Properties
Step 4: Assign IP Address and Subnet Mask

1. Select Use the following IP address:


2. Enter the IP Address (e.g., 192.168.1.10)
3. Enter the Subnet Mask (e.g., 255.255.255.0)
4. Click OK

Step 5: Verify the Configuration

1. Open Command Prompt (cmd)


2. Type: ipconfig /all
3. Check the assigned IP Address, Subnet Mask, and Default Gateway

Task 3:

3. Differentiate between the types of cables used in this lab for connecting devices.
What are the characteristics of each cable type, and when would you use one over
the other?

Differentiating Between Types of Cables Used in the Lab

In your lab setup, different types of network cables are used to connect devices. Below is a
comparison of the most common cables, their characteristics, and when to use them.

Types of Network Cables Used in the Lab


Cable Type Characteristics Usage Scenario
Ethernet Includes Cat5e, Cat6, and Cat7 cables; Used to connect computers,
(Twisted Pair - uses twisted pairs to reduce interference switches, and routers in a wired
UTP/STP) LAN
Straight-Through Wires are arranged in the same order on Used to connect different
Cable both ends (T568A or T568B) devices, such as a PC to a
switch or router
Crossover Cable Wires are swapped at one end (T568A Used to connect similar
on one side, T568B on the other) devices, such as PC-to-PC or
switch-to-switch
Fiber Optic Uses light signals instead of electrical Used for high-speed backbone
Cable signals; offers high-speed and long- connections in large networks
distance communication or data centers
Coaxial Cable Has a central conductor with a metallic Used in older networking
shield; provides resistance to interference technologies and broadband
connections

2. When to Use Each Cable

1. Straight-Through Cable

 Connecting a PC to a switch/router.
 Connecting a printer to a network switch.

2. Crossover Cable

 Connecting two computers directly without a switch.


 Connecting two switches or two routers directly.

3. Fiber Optic Cable

 When high speed and long-distance connectivity is needed.


 Used in enterprise networks, ISPs, and backbone connections.

4. Coaxial Cable

 Used in cable internet and older Ethernet (10Base2, 10Base5) networks.

Task 4:

How can you verify the status of a connection between two devices in Packet Tracer?
Describe the indicators used to determine an active link.

Verifying Connection Status in Packet Tracer

To check if two devices are connected and communicating in Cisco Packet Tracer, use the
following methods:

1. Check Link Lights on Devices:

 Green Light (Solid/Flashing): Active connection.


 Amber/Orange Light: Connection issue.
 Red Light/No Light: No connection.

2. Use the ‘ping’ Command:

 Open Command Prompt on a PC or router.


 Type: ping <destination IP>
 If successful, devices are communicating.

3. Run ‘show interfaces’ on Switch/Router:

 Open CLI and enter: show interfaces


 UP/UP: Connection is working.
 DOWN/DOWN: No connection.

4. Use Simulation Mode:


 Click Simulation Mode (bottom right corner).
 Send a ping or packet.
 If packets move between devices, the connection is active.

Indicators of an Active Link:

Green Link Light = Connection established.


Successful Ping = Communication working.
Packet Moves in Simulation Mode = Network is properly configured.

Task 5:

Why is it important to assign specific ports when connecting devices like hubs and
switches? What considerations should be taken into account when assigning ports?

Importance of Assigning Specific Ports When Connecting Devices

Assigning specific ports when connecting devices like hubs and switches is crucial for network
stability, performance, and troubleshooting.

1. Importance of Assigning Specific Ports

 Prevents Loop Issues:

 Incorrect port assignments can cause switching loops, leading to network congestion
(unless Spanning Tree Protocol (STP) is enabled).

 Optimizes Traffic Flow:

 Specific ports ensure efficient data routing and reduce unnecessary traffic.

 Improves Network Security:


 Assigning ports correctly prevents unauthorized access and segmentation issues in
VLANs.

 Simplifies Troubleshooting:

 Knowing which port connects to which device makes network diagnostics easier.

 Enhances Performance:

 Assigning ports based on priority and bandwidth requirements improves QoS (Quality of
Service) for critical applications.

2. Considerations When Assigning Ports

 Device Type & Connection:

 Uplink ports: Used to connect switch-to-switch or switch-to-router connections.


 Access ports: Assigned to end-user devices like PCs and printers.
 Trunk ports: Used for VLAN communication between switches.

 Port Speed & Duplex Mode:

 Ensure ports match device speed (10/100/1000 Mbps) and duplex settings (full/half-
duplex).

 VLAN Assignments:

 Assign specific ports to VLANs to segment and secure traffic.

 Port Security & MAC Address Filtering:

 Restrict access by allowing only specific MAC addresses on a port.

You might also like