0% found this document useful (0 votes)
96 views94 pages

CN LAB 1902629 Hritik Sharma

The document is a lab report submitted by Hritik Sharma to Ms. Astha Gupta detailing 14 networking experiments conducted. It includes experiments on different network cable types, network devices, IP addressing, network topologies using hubs and switches, packet tracer simulation, router configuration, subnetting, and troubleshooting tools. The experiments were conducted between February and May 2021.

Uploaded by

Xavier Kingdom
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
96 views94 pages

CN LAB 1902629 Hritik Sharma

The document is a lab report submitted by Hritik Sharma to Ms. Astha Gupta detailing 14 networking experiments conducted. It includes experiments on different network cable types, network devices, IP addressing, network topologies using hubs and switches, packet tracer simulation, router configuration, subnetting, and troubleshooting tools. The experiments were conducted between February and May 2021.

Uploaded by

Xavier Kingdom
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 94

DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

DEPARTMENT OF INFORMATION TECHNOLOGY

LAB FILE
Subject: COMPUTER NETWORK (BTIT-404-18)
(Branch- IT)

SUBMITTED BY: SUBMITTED TO:

Hritik Sharma Ms. Astha Gupta

1902629 Assistant Professor

Chandigarh Engineering College

Landran, Mohali-140307

S.No. NAME OF PRACTICAL PAG Date of Exp. Remarks


1
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

E NO
1 To study the different types of network 4 -12 08-02-2021
cables and network topologies
2 Implement and test the cross wired 13 -20 15-02-2021
cable and straight through cable using
clamping tool and network lab cable
tester
3 Study and familarization with various 21-28 22-02-2021
network devices
4 Familarization with packet tracer 29-30 01-03-2021
simulation tool
5 Study and implementation of IP 31-34 08-03-2021
addressing schemes
6 Creation of simple networking 35-38 15-03-2021
topologies using hub and switch
7 Simulation of web traffic in packet 39-40 05-04-2021
tracer
8 Study and implementation of various 41-44 12-04-2021
routers and configuration commands
9 Creation of network using routers 45-49 12-04-2021

10 Configuring network using the concept 50-53 19-04-2021


of subnetting
11 Implementation of basic network 54-67 03-05-2021
configuration commands like ping,
ipconfig, netstat, tracert, etc. for trouble
shooting network related problems
12 Configuration of network using static 68-73 10-05-2021
and default routes
13 To demonstrate the sharing of resources 74-90 17-05-2021
from FTP server to a desktop
14 To study and demonstrate the various 91-96 24-05-2021
features of TEAM VIEWER
a. two PC’s
b. two mobiles
two PC’s and mobiles

2
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

PRACTICAL NO.:- 1
3
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

OBJECTIVE:- To study the different types of network cables and network topologies.

THEORY:-

Network Cables:- Networking cables are networking hardware used to connect one network device to


other network devices or to connect two or more computers to share  printers, scanners etc. Different types
of network cables, such as coaxial cable, optical fiber cable, and twisted pair cables, are used depending on
the network's physical layer, topology, and size. 

1. Twisted Pair Cables:- Twisted pair cabling is a form of wiring in which pairs of wires are twisted
together for the purposes of canceling out electromagnetic interference (EMI) from other wire pairs
and from external sources. This type of cable is used for home and corporate Ethernet networks.
Twisted pair cabling is used in short patch cables and in the longer runs in structured cabling.

Reason for Twisting:-

All transmissions are prone to noise, interferences, and crosstalks. When the wires are twisted, some part
of the noise signals is in the direction of data signals while the other parts are in the opposite directions.

Applications of Twisted-Pair Cables:-

● In telephone lines

● In DSL lines

● In LANs

Types of Twisted–Pair Cables


4
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

There are two types of twisted pair cables −

● Unshielded Twisted Pair ( UTP ): These generally comprise of wires and insulators.

● Shielded Twisted Pair ( STP ): They have a braided wired mesh that encases each pair of insulated
wires.

ADVANTAGES:-

● It can be used to carry both analog and digital data.


● It is the least expensive media of transmission for short distances.
● Attenuation is very high.
● It offers very poor security and is relatively easy to tap.

2. Coaxial Cable:- Coaxial cables, commonly called coax, are copper cables with metal shielding
designed to provide immunity against noise and greater bandwidth. Coax can transmit signals over
larger distances at a higher speed as compared to twisted pair cables.

Categories of Coaxial Cables:-

5
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Coaxial cables are categorized into three types as per radio government (RG)
ratings −

● RG – 59: Has impedance of 75W and used in cable TV

● RG – 58: Has impedance of 50W and used in thin Ethernet

● RG – 11: Has impedance of 50W and used in thick Ethernet

Applications of Coaxial Cables:-

● In analog telephone networks: A single coaxial network can carry about 10,000 voice signals.

● In digital telephone networks: A coax has a data rate of 600 Mbps.

● In cable TV networks

● In traditional Ethernet LANs

● In MANs

ADVANTAGES:-

● sufficient frequency range to support multiple channel, which allows for much greater
throughput.
● lower error rates. because the inner conductor is in a Faraday shield, noise immunity is
improved, and coax has a lower error rates and therefore slightly better performance than twisted
pair.
DISADVANTAGES:-

● more expensive to install compare to twisted pair cable.


● the thicker the cable, the more difficult to work with.

3. Fiber-Optic Cable:- A fiber-optic cable, also known as an optical-fiber cable, is an assembly


similar to an electrical cable, but containing one or more optical fibers that are used to carry light.
The optical fiber elements are typically individually coated with plastic layers and contained in a
protective tube suitable for the environment where the cable will be deployed. 

6
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Characteristics of Optical Fibre Cables:-

The main characteristics of Optical Fibre cables are as follows −

● Fibre optic cabling can support too high bandwidths in the range from 100 Mbps to 2 gigabytes
because light has a much greater frequency than electricity.

● The several nodes that a fibre optic can provide does not rely upon its length but on the hub or hubs
that linked cables.

Advantages of Optical Fibres:-

The advantage of optical fibre is as follows −

Small Size and lightweight − The size (diameter) of the optical fibres is minimal (comparable
to the diameter of a human hair).

Easily available and low cost − The material used for producing the optical fibres is silica
glass. This material is readily applicable. Therefore, the optical fibres cost lower than the cables with
metallic conductors.

No electrical or electromagnetic interface − Since the transmission occurs in light rays,


the signal is not affected by electrical or electromagnetic interference.

Disadvantages of Optical Fibres:-

The disadvantage of optical fibre are as follows −

High Cost − The cable and the interfaces are associatively more expensive than those of other guided
media.

7
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Unidirectional light propagation − Since the optical transmission is inherently


unidirectional two-way communication requires either two fibres or two frequency bands on one fibre.

Installation and Maintenance − Fibre is different technology requiring skills; most engineers
do not occupy.

NETWORK TOPOLOGIES:- Geometric representation of how the computers are connected to each
other is known as topology. There are mainly five types of network topologies :

1. Mesh Topology: In mesh topology each device is connected to every other device on the network
through a dedicated point-to-point link. When we say dedicated it means that the link only carries
data for the two connected devices only. 

● Full Mesh:- All hosts have a point-to-point connection to every other host in the network. Thus for
every new host n(n-1)/2 connections are required. It provides the most reliable network structure
among all network topologies.

● Partially Mesh:- Not all hosts have point-to-point connection to every other host. Hosts connect to
each other in some arbitrarily fashion. This topology exists where we need to provide reliability to
some hosts out of all.

ADVANTAGES:-

● No data traffic issues as there is a dedicated link between two devices which means the link is only
available for those two devices.

8
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

● Mesh topology is reliable and robust as failure of one link doesn’t affect other links and the
communication between other devices on the network.

DISADVANTAGES:-

● Amount of wires required to connected each system is tedious and headache.


● Since each device needs to be connected with other devices, number of I/O ports required must be
huge.

2. Star Topology:- In star topology each device in the network is connected to a central device called
hub. Unlike Mesh topology, star topology doesn’t allow direct communication between devices, a
device must have to communicate through hub. If one device wants to send data to other device, it
has to first send the data to hub and then the hub transmit that data to the designated device.

● Layer-1 device such as hub or repeater

● Layer-2 device such as switch or bridge

● Layer-3 device such as router or gateway

ADVANTAGES:-

● Less expensive because each device only need one I/O port and needs to be connected with hub
with one link.
● Easier to install

9
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

DISADVANTAGES:-

● If hub goes down everything goes down, none of the devices can work without hub.
● Hub requires more resources and regular maintenance because it is the central system of star
topology.

3. Bus Topology:- In bus topology there is a main cable and all the devices are connected to this
main cable through drop lines. There is a device called tap that connects the drop line to the main
cable. Since all the data is transmitted over the main cable, there is a limit of drop lines and the
distance a main cable can have.

ADVANTAGES:-

● Easy installation, each cable needs to be connected with backbone cable.


● Less cables required than Mesh and star topology

DISADVANTAGES:-

● Difficultly in fault detection.


● Not scalable as there is a limit of how many nodes you can connect with backbone cable.
10
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

4. Ring Topology:- In ring topology each device is connected with the two devices on either side of
it. There are two dedicated point to point links a device has with the devices on the either side of it.
This structure forms a ring thus it is known as ring topology. If a device wants to send data to
another device then it sends the data in one direction, each device in ring topology has a repeater, if
the received data is intended for other device then repeater forwards this data until the intended
device receives it.

ADVANTAGES:-

● Easy to install.
● Managing is easier as to add or remove a device from the topology only two links are required to
be changed.

DISADVANTAGES:-

● A link failure can fail the entire network as the signal will not travel forward due to failure.
● Data traffic issues, since all the data is circulating in a ring.
11
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

5. Hybrid Topology:- A combination of two or more topology is known as hybrid topology. For
example: a combination of star and mesh topology is known as hybrid topology.

ADVANTAGES:-

● We can choose the topology based on the requirement for example, scalability is our concern then
we can use star topology instead of bus technology.
● Scalable as we can further connect other computer networks with the existing networks with
different topologies.

DISADVANTAGES:-

● Fault detection is difficult.


● Installation is difficult.

12
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

PRACTICAL NO.:- 2

OBJECTIVE:- Implement and test the cross-wired cable and straight through cable using clamping
tool and network lab cable network tester.

MATERIAL REQUIRED:-

1. Cat5e Ethernet cable – I recommend purchasing a box of Cat5e cable. You will save money by purchasing
your cable in bulk.
2. RJ-45 connectors
3. Crimper Tool – capable of crimping 8 wires (RJ-45) and 6 wire (RJ-11). Most tools have built in cutters
too.
4. Stripper Tool
5. Scissors – I prefer using a scissors
6. Cable Tester – For testing that your cable connections are good and there are not any open or crossed wires

Cat5E Ethernet cable and RJ-45 connectors cable testers

Scissors, a crimping tool, and a stripping tool

13
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Procedure:- To do these practical following steps should be done:

1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be very careful at this
point, as to not nick or cut into the wires, which are inside. Doing so could alter the characteristics of your
cable, or even worse render is useless. Check the wires, one more time for nicks or cuts. If there are any,
just whack the whole end off, and start over.

2. Spread the wires apart, but be sure to hold onto the base of the jacket with your other hand. You do not
want the wires to become untwisted down inside the jacket. Category 5 cable must only have 1/2 of an
inch of 'untwisted' wire at the end; otherwise it will be 'out of spec'. At this point, you obviously have
ALOT more than 1/2 of an inch of un-twisted wire.

3. You have 2 end jacks, which must be installed on your cable. If you are using a pre-made cable, with
one of the ends whacked off, you only have one end to install - the crossed over end. Below are two
diagrams, which show how you need to arrange the cables for each type of cable end. Decide at this point
which end you are making and examine the associated picture below.

Diagram shows you how to prepare Cross wired connection

14
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Diagram shows you how to prepare straight through wired connection

What you'll need:-

● Unshielded twisted pair (UTP) patch cable

● Modular connector (8P8C plug, aka RJ45)

● Crimping tool

● Cable tester (optional, but recommended)

15
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

There are four pairs of wires in an Ethernet cable, and an Ethernet connector (8P8C) has eight pin slots.
Each pin is identified by a number, starting from left to right, with the clip facing away from you.

The two standards for wiring Ethernet cables are T568A and T568B. T568B is the most common and is
what we'll be using for our straight Ethernet cable. The tables below show the proper orientation of the
colored wires to the pins.

T568A Standard

Pin 1 Pin 2 Pin 3 Pin 4 Pin 5 Pin 6 Pin 7 Pin 8


White/ Green White / Blue White/ Orange White / Brown
Green Orange Blue Brown

16
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

T568B Standard

Pin 1 Pin 2 Pin 3 Pin 4 Pin 5 Pin 6 Pin 7 Pin 8


White/ Orange White / Blue White/ Green White / Brown
Orange Green Blue Brown
Step 1: Strip the cable jacket about 1.5 inch down from the end.

Step 2: Spread the four pairs of twisted wire apart. For Cat 5e, you can use the pull string to strip the
jacket farther down if you need to, then cut the pull string. Cat 6 cables have a spine that will also need to
be cut.

Step 3: Untwist the wire pairs and neatly align them in the T568B orientation. Be sure not to untwist them
any farther down the cable than where the jacket begins; we want to leave as much of the cable twisted as
possible.

17
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Step 4: Cut the wires as straight as possible, about 0.5 inch above the end of the jacket.

Step 5: Carefully insert the wires all the way into the modular connector, making sure that each wire
passes through the appropriate guides inside the connector.

Step 6: Push the connector inside the crimping tool and squeeze the crimper all the way down.

Step 7: Repeat steps 1-6 for the other end of the cable.

18
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Step 8: To make sure you've successfully terminated each end of the cable, use a cable tester to test each
pin.

When you're all done, the connectors should look like this:

That's it. For crossover cables, simply make one end of the cable a T568A and the other end a T568B.
Now you can make Ethernet cables of any length, fix broken connectors, or make yourself a crossover
cable.

19
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

PRACTICAL NO.:- 3

OBJECTIVE:- Study and familiarization with various network devices.

THEORY:-

Network Devices:- Network devices, or networking hardware, are physical devices that are required
for communication and interaction between hardware on a computer network.

Types Of Network Devices:-

● Hub
● Switch
● Router
● Bridge
● Gateway
● Modem
● Repeater
● Access Point

HUB:-

Hubs connect multiple computer networking devices together. A hub also acts as a repeater in that it
amplifies signals that deteriorate after traveling long distances over connecting cables. A hub is the
simplest in the family of network connecting devices because it connects LAN components with identical
protocols.

A hub can be used with both digital and analog data, provided its settings have been configured to prepare
for the formatting of the incoming data. For example, if the incoming data is in digital format, the hub
must pass it on as packets; however, if the incoming data is analog, then the hub passes it on in signal
form.

20
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Hubs do not perform packet filtering or addressing functions; they just send data packets to all connected
devices. Hubs operate at the Physical layer of the Open Systems Interconnection (OSI) model. There are
two types of hubs: simple and multiple port.

Advantages of Hub :

● Connectivity –
The primary function of the hub is to permit clients to attach to a network in order that they will share
and have conversations. For this purpose, hubs use network protocol analyzer.
● Performance –
Hub is understood for having very less number of performance impacts on the network. This is often
because it operates using a broadcast model which rarely affects the network.
Disadvantages of Hub :

● Collision Domain –
The function of the collision domain and again transfer of packet does not affect actually it increases
more chances of collision in between domains. 
● Full-Duplex Mode –
Hubs cannot communicate fully duplex mode, it can only operate in half-duplex mode. Half-duplex
mode, in essence, means data are often transmitted just one occasion at a given time. Therefore, the
hub must constantly switch its modes.

SWITCH:-

21
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Switches generally have a more intelligent role than hubs. A switch is a multiport device that improves
network efficiency. The switch maintains limited routing information about nodes in the internal network,
and it allows connections to systems like hubs or routers. Strands of LANs are usually connected using
switches. Generally, switches can read the hardware addresses of incoming packets to transmit them to the
appropriate destination.

Using switches improves network efficiency over hubs or routers because of the virtual circuit capability.
Switches also improve network security because the virtual circuits are more difficult to examine with
network monitors. You can think of a switch as a device that has some of the best capabilities of routers
and hubs combined. A switch can work at either the Data Link layer or the Network layer of the OSI
model. A multilayer switch is one that can operate at both layers, which means that it can operate as both a
switch and a router. A multilayer switch is a high-performance device that supports the same routing
protocols as routers.

Switches can be subject to distributed denial of service (DDoS) attacks; flood guards are used to prevent
malicious traffic from bringing the switch to a halt. Switch port security is important so be sure to secure
switches: Disable all unused ports and use DHCP snooping, ARP inspection and MAC address filtering.

22
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Features of Switches:-

● A switch operates in the layer 2, i.e. data link layer of the OSI model.

● It is an intelligent network device that can be conceived as a multiport network bridge.

● It uses MAC addresses (addresses of medium access control sublayer) to send data packets to selected
destination ports.

● It uses packet switching technique to receive and forward data packets from the source to the
destination device.

Types of Switches:-

There are variety of switches that can be broadly categorised into 4 types −

ROUTER:-

Routers help transmit packets to their destinations by charting a path through the sea of interconnected
networking devices using different network topologies. Routers are intelligent devices, and they store
information about the networks they’re connected to. Most routers can be configured to operate as packet-
filtering firewalls and use access control lists (ACLs). Routers, in conjunction with a channel service
unit/data service unit (CSU/DSU), are also used to translate from LAN framing to WAN framing. This is
needed because LANs and WANs use different network protocols. Such routers are known as border
routers. They serve as the outside connection of a LAN to a WAN, and they operate at the border of your
network.

23
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Router are also used to divide internal networks into two or more subnetworks. Routers can also be
connected internally to other routers, creating zones that operate independently. Routers establish
communication by maintaining tables about destinations and local connections. A router contains
information about the systems connected to it and where to send requests if the destination isn’t known.
Routers usually communicate routing and other information using one of three standard protocols: Routing
Information Protocol (RIP), Border Gateway Protocol (BGP) or Open Shortest Path First (OSPF).

Routers are our first line of defense, and they must be configured to pass only traffic that is authorized by
network administrators. The routes themselves can be configured as static or dynamic. If they are static,
they can only be configured manually and stay that way until changed. If they are dynamic, they learn of
other routers around them and use information about those routers to build their routing tables.

Routers are general-purpose devices that interconnect two or more heterogeneous networks. They are
usually dedicated to special-purpose computers, with separate input and output network interfaces for each
connected network. Because routers and gateways are the backbone of large computer networks like the
internet, they have special features that give them the flexibility and the ability to cope with varying
network addressing schemes and frame sizes through segmentation of big packets into smaller sizes that fit
the new network components. Each router interface has its own Address Resolution Protocol (ARP)
module, its own LAN address (network card address) and its own Internet Protocol (IP) address. The
router, with the help of a routing table, has knowledge of routes a packet could take from its source to its
destination. The routing table, like in the bridge and switch, grows dynamically. Upon receipt of a packet,
the router removes the packet headers and trailers and analyzes the IP header by determining the source
and destination addresses and data type, and noting the arrival time. It also updates the router table with
new addresses not already in the table. The IP header and arrival time information is entered in the routing
table. Routers normally work at the Network layer of the OSI model.

24
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Types of Routers:-

A variety of routers are available depending upon their usages. The main
types of routers are −

Wireless Router − They provide WiFi connection WiFi devices like laptops,
smartphones etc. They can also provide standard Ethernet routing. For
indoor connections, the range is 150 feet while its 300 feet for outdoor
connections.

Broadband Routers − They are used to connect to the Internet through


telephone and to use voice over Internet Protocol (VoIP) technology
for providing high-speed Internet access. They are configured and
provided by the Internet Service Provider (ISP).

Core Routers − They can route data packets within a given network, but
cannot route the packets between the networks. They helps to link all
devices within a network thus forming the backbone of network. It is
used by ISP and communication interfaces.

25
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Edge Routers − They are low-capacity routers placed at the periphery of


the networks. They connect the internal network to the external
networks, and are suitable for transferring data packets across
networks. They use Border Gateway Protocol (BGP) for connectivity.
There are two types of edge routers, subscriber edge routers and label
edge routers.

Brouters − Brouters are specialised routers that can provide the


functionalities of bridges as well. Like a bridge, brouters help to
transfer data between networks. And like a router, they route the data
within the devices of a network.

BRIDGE:-

Bridges are used to connect two or more hosts or network segments together. The basic role of bridges in
network architecture is storing and forwarding frames between the different segments that the bridge
connects. They use hardware Media Access Control (MAC) addresses for transferring frames. By looking
at the MAC address of the devices connected to each segment, bridges can forward the data or block it
from crossing. Bridges can also be used to connect two physical LANs into a larger logical LAN.

Bridges work only at the Physical and Data Link layers of the OSI model. Bridges are used to divide larger
networks into smaller sections by sitting between two physical network segments and managing the flow
of data between the two.

Bridges are like hubs in many respects, including the fact that they connect LAN components with
identical protocols. However, bridges filter incoming data packets, known as frames, for addresses before
they are forwarded. As it filters the data packets, the bridge makes no modifications to the format or
content of the incoming data. The bridge filters and forwards frames on the network with the help of a
dynamic bridge table. The bridge table, which is initially empty, maintains the LAN addresses for each
computer in the LAN and the addresses of each bridge interface that connects the LAN to other LANs.
Bridges, like hubs, can be either simple or multiple port.

26
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Bridges have mostly fallen out of favor in recent years and have been replaced by switches, which offer
more functionality. In fact, switches are sometimes referred to as “multiport bridges” because of how they
operate.

Uses of Bridge

● Bridges connects two or more different LANs that has a similar protocol and provides
communication between the devices (nodes) in them.

● By joining multiple LANs, bridges help in multiplying the network capacity of a single LAN.

● Since they operate at data link layer, they transmit data as data frames. On receiving a data frame,
the bridge consults a database to decide whether to pass, transmit or discard the frame.

27
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

PRACTICAL NO.:- 4

OBJECTIVE:- Familiarization with packet tracer simulation tool.

THEORY:-

Introduction to CISCO packet tracer:-

Packet Tracer is a powerful network simulator that can be utilized in training for Network certifications by
allowing students to create networks with an almost unlimited number of devices and to experience
troubleshooting without having to buy real Cisco routers or switches. The tool is created by Cisco
Systems. The purpose of Packet Tracer is to offer students a tool to learn the principles of networking as
well as develop Cisco technology specific skills. However, it is not be used as a replacement for Routers or
Switches.

KEY FEATURES:-

Packet Tracer Workspaces:- Cisco Packet Tracer has two workspaces—logical and physical. The
logical workspace allows users to build logical network topologies by placing, connecting, and clustering
virtual network devices. The physical workspace provides a graphical physical dimension of the logical
network, giving a sense of scale and placement in how network devices such as routers, switches, and
hosts would look in a real environment. The physical view also provides geographic representations of
networks, including multiple cities, buildings, and wiring closets. The physical workspace provides a
graphical view of the logical network.

Packet Tracer Modes:- Cisco Packet Tracer provides two operating modes to visualize the behavior of
a network—real-time mode and simulation mode. In real-time mode the network behaves as real devices
do, with immediate real-time response for all network activities. The real-time mode gives students a
viable alternative to real equipment and allows them to gain configuration practice before working with
real equipment. In simulation mode the user can see and control time intervals, the inner workings of data
transfer, and the propagation of data across a network. This helps students understand the fundamental
concepts behind network operations. A solid understanding of network fundamentals can help accelerate
learning about related concept

28
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

ADVANTAGES:-

● It can be used anywhere, you don’t have to carry it. Once you install it in your laptop, it can be
carried even in USP.
● The noise level is minimum to none and the consumption of electricity is also less.
● The major advantage is “sum mode”. This is not available in real gear.

DISADVANTAGES:-

● It may cause the loops by affecting the STP.


● It doesn’t support the ether channel regarding the access layer switches.
● With regard to the Frame relay it is low in command.

Installation of CISCO packet tracer:

STEP 1 Once we have downloading the Packet Tracer exe file, Click on the exe file downloaded. Once
below Window will appears, click “Next”

STEP 2 On next screen, select “I accept the agreement” and click on “Next”.

STEP 3 Setup will show the folder in which the program’s shortcuts will be created. If You want to
change the folder, you can change it. Click on “Next”.

STEP 4 Then the program will ask whether to create a Desktop icon and create a Quick Launch icon.
Make your choice and click on “Next”.

STEP 5 The summary of the settings we selected is displayed. Click on “Install”.

STEP 6 The installation starts.

STEP 7 Packet Tracer is installed and ready to be used.

29
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

PRACTICAL NO.:- 5

OBJECTIVE:- Study and implementation of IP addressing schemes.

THEORY:-

Step1 Make a network i.e take two switches and connect the end devices with both the switches and then
connect switches with the router (as shown in fig. no. 5.1)

Fig. No. 5.1

Step2 Give IP address and then give the gateways to all the end devices.

30
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Fig. No 5.2 & 5.3

Step3 Configure the IP addresses and gateway given

31
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Fig No. 5.4

Step4 After configuring our network is ready for transmission.

Step5 Sending message from PC1 to PC3

Message is successfully sent (as shown in fig no. 5.5)

32
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Fig No. 5.5

33
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

PRACTICAL NO.:- 6

Objective:- Creation of simple networking topologies using hub and switch.

Theory:-

Step1 Make a network i.e take switch and hub and then connect the end devices with both.

Fig No. 6.1

Step2 Give IP address to all the end devices.

34
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Fig No. 6.2 & 6.3

Step3 Configure the IP addresses. After configuring our network is ready for transmission.

Step4 Sending message from PC0 to PC1 through Switch.

35
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Fig No. 6.4

Step5 Sending message from PC2 to PC3 through Hub.

Fig No. 6.5

36
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Differences in performance of hubs and switches:-

A switch is effectively a higher-performance alternative to a hub. People tend to benefit from a switch
over a hub if their home network has four or more computers, or if they want to use their home
network for applications that generate significant amounts of network traffic, like multiplayer games
or heavy music file sharing. Technically speaking, hubs operate using a broadcast model and switches
operate using a virtual circuit model. When four computers are connected to a hub, for example, and
two of those computers communicate with each other, hubs simply pass through all network traffic to
each of the four computers. Switches, on the other hand, are capable of determining the destination of
each individual traffic element (such as an Ethernet frame) and selectively forwarding data to the one
computer that actually needs it. By generating less network traffic in delivering messages, a switch
performs better than a hub on busy networks.

37
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

PRACTICAL NO.:- 7

Objective:- Simulation of web traffic in packet tracer.

Theory:-

Step1 Make a network i.e take switch then connect the end devices and server with it.

Fig No.7.1

Step2 Give IP address to all the end devices.

38
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Fig No. 7.2

Step3 Configure the IP addresses. After configuring our network is ready for transmission.

Step4 Sending message from PC0 to PC3.

Fig No. 7.3

39
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

PRACTICAL NO.:- 8

Objective:- Study and implementation of various router configuration commands.

Theory:-

Topology Diagram

Addressing Table

Device Interface IP Address Subnet Mask Def. Gateway


Fa0/0 192.168.1.1 255.255.255.0 N/A
R1 S0/0/0 192.168.2.1 255.255.255.0 N/A
Fa0/0 192.168.3.1 255.255.255.0 N/A
R2 S0/0/0 192.168.2.2 255.255.255.0 N/A
PC1 N/A 192.168.1.10 255.255.255.0 192.168.1.1
PC2 N/A 192.168.3.10 255.255.255.0 192.168.3.1

Task 1 : Perform Basic Configuration of Router R1.

Step 1: Establish a HyperTerminal session to router R1.

Step 2: Enter privileged EXEC mode.


Router>enable Router#

Step 3: Enter global configuration mode.


Router#configure terminal

40
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Enter configuration commands, oneperline.


End with CNTL/Z.
Router(config)#

Step 4: Configure the router name as R1.


Enter the command hostname R1at the prompt.
Router(config)#hostname R1
R1(config)#

Step 5: Disable DNS lookup.


Disable DNS lookup with the no ip domain-lookupcommand.
R1(config)#no ip domain-lookup
R1(config)#

Step 6: Configure the EXEC mode password.


Configure the EXEC mode password using the enable secret passwordcommand.
Use classfor the password.
R1(config)#enable secret class
R1(config)#

Step 7: Configure a message-of-the-day banner.


Configure a message-of-the-day banner using the banner motdcommand.
R1(config)#banner motd&
EnterTEXTmessage.
End with the character'&'.
R1(config)#

Step 8: Configure the console password on the router.


Use ciscoas the password. When you are finished, exit from line configuration mode.
R1(config)#line console 0 R1(config-line)#password cisco R1(config-line)#login
R1(config-line)#exit R1(config)#

41
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Step 9: Configure the password for the virtual terminal lines.


Use ciscoas the password. When you are finished, exit from line configuration mode.
R1(config)#line vty 0 4 R1(config-line)#password cisco R1(config-line)#login R1(config-
line)#exit R1(config)#

Step 10: Configure the FastEthernet0/0 interface.


Configure the FastEthernet0/0 interface with the IP address 192.168.1.1/24.
R1(config)#interface fastethernet 0/0
R1(config-if)#ip address 192.168.1.1 255.255.255.0
R1(config-if)#no shutdown

Step 11: Configure the Serial0/0/0 interface.


Configure the Serial0/0/0 interface with the IP address 192.168.2.1/24. Set the clock rate
to 64000.
R1(config-if)#interface serial 0/0/0
R1(config-if)#ip address 192.168.2.1 255.255.255.0
R1(config-if)#clock rate 64000 R1(config-if)#no shutdown R1(config-if)#

Step 12: Return to privileged EXEC mode.


Use the endcommand to return to privileged EXEC mode.
R1(config-if)#end R1#

Step 13: Save the R1 configuration.


Save the R1 configuration using the copy running-config startup-configcommand.
R1#copy running-config startup-config
Building configuration... [OK]
R1#

Task 2: Perform Basic Configuration of Router R2.

Step 1: For R2, repeat Steps 1 through 9 from Task 1.

42
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Step 2: Configure the Serial 0/0/0 interface.


Configure the Serial 0/0/0 interface with the IP address 192.168.2.2/24.
R2(config)#interface serial 0/0/0
R2(config-if)#ip address 192.168.2.2 255.255.255.0
R2(config-if)#no shutdown

Step 3: Configure the FastEthernet0/0 interface.


Configure the FastEthernet0/0 interface with the IP address 192.168.3.1/24.
R2(config-if)#interface fastethernet 0/0
R2(config-if)#ip address 192.168.3.1 255.255.255.0
R2(config-if)#no shutdown
R2(config-if)#

Step 4: Return to privileged EXEC mode.


Use the endcommand to return to privileged EXEC mode.
R2(config-if)#end R2#

Step 5: Save the R2 configuration.


Save the R2 configuration using the copy running-config startup-config command.
R2#copy running-config startup-config
Building configuration... [OK]
R2#

43
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

PRACTICAL NO.:- 9

Objective:- Creation of Networks using routers.

Theory:-

We already have the Packet Tracer download and have it installed in our computer. Open the program and
select the router from the lower left-hand corner, and drag it into the center of the sandbox screen as seen
below.

Fig. No. 9.1

We will be setting up a very basic network that allows two computers to communicate, so the next step is
to select end devices from the bottom left-hand corner and drag it to the sandbox screen. Do this twice to
make two computers appear below the router. Now select connections from the same bottom left-hand
corner. When you connect like-devices (Such as a router and computer)  you use a crossover cable, so you
should select copper cross-over cable from the second menu to the immediate right. Click on Router0,
and connect the cable via FastEthernet0/0 as seen below:

44
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Fig No. 9.2

Now click the PC0 and select Fast Ethernet. You will notice that although a link is established, it is not
functional. You can tell by the red dots that are present on both ends of the connection. Once the router is
configured correctly, the red dots will turn green to indicate the devices are able to communicate.
Do the same operation to PC1, only this time connect the cable to FastEthernet0/1 since FastEthernet0/0 is
already taken by PC0. Your network should be similar to the one below at this point:

Fig No. 9.3

CONFIGURING THE ROUTER IN PACKET TRACER:-

A router that is turned off doesn’t work very well! Click on your router to bring up the configuration menu
and verify that it is turned on.When on, there will be a small green light below the switch as seen in the
diagram.

45
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Fig No. 9.4

Next we have to open the Ethernet ports to allow communication. Although they are physically connected,
they are in a state that is known as being in administrative shut down. Now click on the CLI tab to
access the configuration menu. If you’ve used the Cisco IOS before, you will notice it looks and acts the
same way.
1. Press RETURN to start the session.

2. Type enable to get to privileged mode (this gives you more options in configuring the router)

3. Type config terminal (or config t for short) to access the configuration menu.

4. Type interface fastethernet0/0 to access Ethernet0/0

5. Type ip address 192.168.10.1  255.255.255.0 to assign an IP address and subnet mask to the


interface.

6. Type no shutdown to open the interface up for business.

That’s it! We now see a message similar to the following:

%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up


%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up

46
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Now we have to do the same thing for fastethernet0/1. If you don’t, there still won’t be a connection to
PC1! Make sure to enter the IP address carefully as seen below:
1. Press Ctrl + Z to go back to the previous mode.
2. Type interface fastethernet0/1
3. Type ip address 192.168.20.1  255.255.255.0
4. Type no shutdown
At this point our router is configured properly. If you test out a ping, you will notice that the computers
still don’t communicate, however!

CONFIGURING THE GATEWAY IN PACKET TRACER:-

Our last step is to configure the gateway on each desktop computer. The gateway is the address we
assigned to the Ethernet port that the desktop is connected to. It will allow the computer to interface with
another network, so our ping won’t work without it!
Click on PC0 to bring up the configuration menu. Under global settings you will find a field for the
gateway. Enter the corresponding IP address of the router’s interface, which is 192.168.10.1. Then click
the FastEthernet tab on the left column to set the actual computer’s IP address to be on the network.
Use 192.168.10.2 for the IP address, and 255.255.255.0 for the subnet mask.

Fig No. 9.5

Do the same thing for PC1, only use 192.168.20.1 for the gateway address, 192.168.20.2 for the IP
address, and 255.255.255.0 for the subnet mask. We can confirm that your network works by sending out a
packet of information from PC0 to PC1, and vice versa. Click the packet icon on the right menu as seen
below:
47
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Fig No. 9.6

Click on PC0 and then click PC1. On the lower right of the screen you will see a message box that says
“Successful.” If it doesn’t, we may have had a syntax error when putting in an IP address or router
configuration command.

48
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

PRACTICAL NO.:- 10

Objective:- Configuring networks using the concept of sub netting.


Theory:-

When we Subnet a network, we basically split it into smaller networks. For example, when a set of IP
Addresses is given to a company, e.g 254 they might want to "break" (the correct term is "partition") that
one network into smaller ones, one for each department. This way, their Technical department and
Management department can each have a small network of their own. By sub netting the network we can
partition it to as many smaller networks as we need and this also helps reduce traffic and hides the
complexity of the network.

By default, all type of Classes (A, B and C) have a subnet mask, we call it the "Default Subnet mask". You
need to have one because:

1) All computers need the subnet mask field filled when configuring IP

2) You need to set some logical boundaries in your network

3) You should at least enter the default subnet mask for the Class you're using

Default Subnet Masks of Each Class

The table below shows clearly the subnetmask that applies for each network Class.

49
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

When dealing with subnet masks in the real world, we are free in most cases to use any type of subnet
mask in order to meet our needs. If for example we require one network which can contain up to 254
computers, then a Class C network with its default subnet mask will do fine, but if we need more, then we
might consider a Class B network with its default subnet mask.

Note that the default subnet masks have been set by the IEEE committee, the same guys that set and
approve the different standards and protocols.

Understanding The Concept

Partitioning one network into smaller ones by using different subnet masks.

The picture below shows our example network (192.168.0.0). All computers here have been configured
with the default Class C subnet mask (255.255.255.0):

50
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Because of the subnet mask we used, all these computers are part of the one network marked in blue. This
also means that any one of these hosts (computers, router and server) can communicate with each other.

If we now wanted to partition this network into smaller segments, then we would need to change the
subnet mask appropriately so we can get the desired result. Let's say we needed to change the subnet mask
from 255.255.255.0 to 255.255.255.224 on each configured host.

The picture below shows us how the computers will see the network once the subnet mask has changed:

51
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

52
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

PRACTICAL NO.:- 11

Objective:- Implementation of basic network command and Network configuration commands like
ping, ipconfig, netstat , tracert etc. for trouble shooting network related problems.
Theory:-

The various network related commands used in MS-DOS, Windows, Linux ,Unix and other operating
system are explained below.

● Arp
● Finger
● Hostname
● Ipconfig
● Pathping
● Ping
● Nbtstat
● Net
● Netstat
● Nslookup
● Router
● Tracert and tracerouter
● Whois
● winipcfg

Arp:- ARP stands for Address Resolution Protocol.This protocol is used by network nodes to match IP
addresses to MAC addresses.  The original specification was RFC 826.  That has since been updated by
RFC 5227, and RFC 5494.

The protocol functionally divided into two parts:

● One part determines a physical address when sending a packet


● Other part answers requests from other machines

53
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

So ARP provides method for hosts send message to destination address on physical network.  Ethernet
hosts must convert a 32-bit IP address into a 48-bit Ethernet address.  The host checks its ARP cache to see
if address mapping from IP to physical address is known:

● If mapping is known, physical address is placed in frame and sent


● If mapping is not known, broadcast message is sent and awaits a reply
● Target machine, recognizing IP address matches its own, returns answer
ARP is transparent to bridging - bridging will send ARP broadcasts.  Routers do not propagate Ethernet
broadcasts – a router is Network Level device

Syntax (Inet means Internet address)

arp [-a [InetAddr] [-N IfaceAddr]] [-g [InetAddr] [-N IfaceAddr]] [-d InetAddr [IfaceAddr]] [-s InetAddr


EtherAddr [IfaceAddr]]

Finger:- The finger command may also be used to look up users on a remote system. The format is to
specify the user as User@Host. If you omit the user name, the finger commandprovides the standard
format listing on the remote system.

Syntax:- { finger | f }[[ -b][ -h] [ -l][ -p]]|[ -i][ -q][ -s][ -w]] [ -f]


[ -m][ User| User @Host| @Host]

Ite Description

54
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

m
-b- Gives a brief, long-form listing.
-f- Suppresses printing of header line on output (the first line that defines the fields that are being
displayed).
-h- Suppresses printing of .project files on long and brief long formats.
-i- Gives a quick listing with idle times.
-l- Gives a long-form listing.
- Assumes that the User parameter specifies a user ID (used for discretionary access control), not a
m- user login name.
-p- Suppresses printing of .plan files on long-form and brief long-form formats.
-q- Gives a quick listing.
-s- Gives a short format list.

55
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Hostname:-The hostname command is used to show or set a computer's host name and domain name. It is


one of the most basic of the network administrative utilities.

A host name is a name that is assigned to a host (i.e., a computer connected to the network) that uniquely
identifies it on a network and thus allows it to be addressed without using its full IP address. Domain
names are user-friendly substitutes for numeric IP addresses.

The basic syntax for the hostname command is

hostname [options] [new_host_name]

Ipconfig:-Configure IP (Internet Protocol configuration). In Windows, ipconfig is a console application


designed to run from the Windows command prompt. This utility allows you to get the IP address
information of a Windows computer. It also allows some control over active TCP/IP connections.
ipconfig replaced the older winipcfg utility.

Syntax

IPCONFIG /all Display full configuration information.

IPCONFIG /release [adapter] Release the IP address for the specified adapter.

IPCONFIG /renew [adapter] Renew the IP address for the specified adapter.

IPCONFIG /flushdns Purge the DNS Resolver cache.

56
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

IPCONFIG /registerdns Refresh all DHCP leases and re-register DNS names.

IPCONFIG /displaydns Display the contents of the DNS Resolver Cache.

IPCONFIG /show class id adapter Display all the DHCP class IDs allowed for adapter.

IPCONFIG /setclassid adapter [classid] Modify the dhcp class id.

Pathping:- Pathping sends multiple echo Request messages to each router between a source and
destination over a period of time and then computes results based on the packets returned from each router.
Because pathping displays the degree of packet loss at any given router or link, you can determine which
routers or subnets might be having network problems.
57
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

pathping performs the equivalent of the tracert command by identifying which routers are on the path. It
then sends pings periodically to all of the routers over a specified time period and computes statistics based
on the number returned from each. Used without parameters, pathping displays help.

Syntax:-
pathping [/n] [/h] [/g <Hostlist>] [/p <Period>] [/q <NumQueries> [/w <timeout>] [/i <IPaddress>] [/4
<IPv4>] [/6 <IPv6>][<TargetName>]

Parameter Description

/n Prevents pathping from attempting to resolve the IP


addresses of intermediate routers to their names. This might
expedite the display of pathping results.

/h Specifies the maximum number of hops in the path to search


<MaximumHops> for the target (destination). The default is 30 hops.

/g <Hostlist> Specifies that the echo Request messages use the Loose
Source Route option in the IP header with the set of
intermediate destinations specified in Hostlist. With loose
source routing, successive intermediate destinations can be
separated by one or multiple routers. The maximum number
of addresses or names in the host list is 9. The Hostlist is a
series of IP addresses (in dotted decimal notation) separated
by spaces.

/p <Period> Specifies the number of milliseconds to wait between


consecutive pings. The default is 250 milliseconds (1/4
second).

/q <NumQueries> Specifies the number of echo Request messages sent to each


router in the path. The default is 100 queries.

/w <timeout> Specifies the number of milliseconds to wait for each reply.

58
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

The default is 3000 milliseconds (3 seconds).

/i <IPaddress> Specifies the source address.

/4 <IPv4> Specifies that pathping uses IPv4 only.

/6 <IPv6> Specifies that pathping uses IPv6 only.

<TargetName> Specifies the destination, which is identified either by IP


address or host name.

/? Displays help at the command prompt.

59
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Ping:- The ping command verifies IP-level connectivity to another TCP/IP computer by sending Internet
Control Message Protocol (ICMP) echo Request messages. The receipt of corresponding echo Reply
messages are displayed, along with round-trip times. ping is the primary TCP/IP command used to
troubleshoot connectivity, reachability, and name resolution. Used without parameters, ping displays
help.

Syntax:-

ping [/t] [/a] [/n <Count>] [/l <Size>] [/f] [/I <TTL>] [/v <TOS>] [/r <Count>] [/s <Count>] [{/j
<Hostlist> | /k <Hostlist>}] [/w <timeout>] [/R] [/S <Srcaddr>] [/4] [/6] <TargetName>

60
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Nbtstat:-The Nbtstat command is a great command to use when you need to display the NetBIOS over
TCP/IP protocol statistics. The Nbtstat command can also be used to display NetBIOS name tables for
both local and remote computers. The Nbtstat command can also be used to display the NetBIOS name
cache, which will show you all of the NetBIOS names that have recently been associated with a specific
IP address. When you use the -R and -RR attributes along with the Nbtstat command you can refresh or
purge the NetBIOS name cache (-R) and the names registered with WINS, Windows Internet Name
Service, (-RR). The NetBIOS name cache helps to reduce network traffic by eliminate the need for
broadcasting or long WINS queries

61
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Syntax:

nbstat[-aRemoteName][-AIPAddress][-c][-n][-r][-R][-RR][-s][-S][Interval]

Net:-The net user command is used to add, delete, and otherwise manage the users on a


computer. Net view is used to show a list of computers and network devices on the network.
The net helpmsg is used to display more information about the numerical network messages you might
receive when using net commands.

62
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Netstat:-The netstat command is a Command Prompt command used to display very detailed information


about how your computer is communicating with other computers or network devices.

Specifically, the netstat command can show details about individual network connections, overall and
protocol-specific networking statistics, and much more, all of which could help troubleshoot certain kinds
of networking issues.

Syntax:-netstat [-a] [-e] [-n] [-o] [-p <Protocol>] [-r] [-s] [<Interval>]

Parameters:-

Paramete
r Description

-a Displays all active TCP connections and the TCP and UDP ports on which
the computer is listening.

-e Displays Ethernet statistics, such as the number of bytes and packets sent and
received. This parameter can be combined with -s.

-n Displays active TCP connections, however, addresses and port numbers are

63
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

expressed numerically and no attempt is made to determine names.

-o Displays active TCP connections and includes the process ID (PID) for each
connection. You can find the application based on the PID on the Processes
tab in Windows Task Manager. This parameter can be combined with -a, -n,
and -p.

-p Shows connections for the protocol specified by Protocol. In this case,


the Protocol can be tcp, udp, tcpv6, or udpv6. If this parameter is used with -
s to display statistics by protocol, Protocol can be tcp, udp, icmp, ip, tcpv6,
udpv6, icmpv6, or ipv6.

-s Displays statistics by protocol. By default, statistics are shown for the TCP,
UDP, ICMP, and IP protocols. If the IPv6 protocol is installed, statistics are
shown for the TCP over IPv6, UDP over IPv6, ICMPv6, and IPv6 protocols.
The -p parameter can be used to specify a set of protocols.

-r Displays the contents of the IP routing table. This is equivalent to the route
print command.

Redisplays the selected information every Interval seconds. Press CTRL+C


to stop the redisplay. If this parameter is omitted, netstat prints the selected
information only once.

/? Displays help at the command prompt.

64
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Nslookup:-nslookup is a network administration command-line tool available for many computer


operating systems. It is used for querying the Domain Name System (DNS) to obtain domain name or IP
address mapping information. The main use of nslookup is for troubleshooting DNS related problems

65
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

PRACTICAL NO.:- 12

Objective:- Configuration of networks using static and default routes.


Theory:-

Topology Diagram

This topology represents a small WAN. Each device in this network has been configured
with IP addresses; however, no routing has been configured. The company management
wants to use static routes to connect the multiple networks.

Step 1: Test connectivity between the PCs and the default gateway.

To determine if there is connectivity from each PC to its configured gateway, first use a simple ping
test.

a. Click BOpc and go to Desktop > CommandPrompt.

b. From the command prompt, type the ipconfig command. Note the IP address for
BOpc and thedefault gateway address. The default gateway address is the IP address
for the Fast Ethernet interface on BranchOffice.

c. Ping 192.168.1.1, the default gateway address for the BranchOffice LAN, from the
commandprompt on BOpc. This ping should besuccessful.

d. Click PNpc and go to Desktop > CommandPrompt.

e. From the command prompt, type the ipconfig command. Note the IP address for
66
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

PNpc and thedefault gateway address. The default gateway address is the IP address
for the Fast Ethernet interface on PartnerNet.

f. Ping 192.168.3.1, the default gateway address for the PartnerNet LAN, from the
command prompton PNpc. This ping should besuccessful.

g. Repeat steps a, b, and c for MOpc and its respective default gateway, the Fast
Ethernet interfaceon MainOffice. Each of these ping tests should besuccessful.

Step 2: Ping between routers to test connectivity.

Use a console cable and terminal emulation software on BOpc to connect to BranchOffice.

67
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

a. Test connectivity with MainOffice by pinging 10.10.10.1, the IP address of the


directlyconnected serial 3/0 interface. This ping should succeed.

b. Test connectivity with MainOffice by pinging 10.10.10.5, the IP address of the


serial 2/0interface. This ping shouldfail.

c. Issue the show ip route command from the terminal window of BOpc.
Note that only directly connected routes are shown in the BranchOffice
routing table. The ping to 10.10.10.5 failed because the BranchOffice router
has no routing table entry for10.10.10.5.

d. Repeat steps a through d on the other two PCs. The pings to directly
connected networkswill succeed. However, pings to remote networks
willfail.

e. What steps must be taken to reach all the networks from any PC in theactivity?

Step 3: Viewing the routing tables.

You can view routing tables in Packet Tracer using the Inspect tool. The Inspect tool is
in the Common Tools bar to the right of the topology. The Inspect tool is the icon that
appears as a magnifying glass.

a. In the Common Tools bar, click on the Inspecttool.

b. Click the MainOffice router and choose RoutingTable.

c. Click the BranchOffice router and choose RoutingTable.

d. Click the PartnerNet router and choose RoutingTable.

e. Move the routing table windows around so that you can see all three atonce.

f. What networks do each of the routers already knowabout?

g. Does each router know how to route to all networks in the topology? After
comparing therouting tables, close the window for each routing table by
clicking the x in the upper right corner of each window.

68
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Step 4: Configure default routes on the BranchOffice and PartnerNet routers.

To configure static routes for each router, first determine which routes need to be added for
each device. For the BranchOffice and the PartnerNet routers, a single default route allows
these devices to route traffic for all networks not directly connected. To configure a default
route, you must identify the IP address of the next hop router, which in this case is the
MainOffice router.

a. From the Common toolbar, click the Selecttool.

b. Move the cursor over the red serial link between the BranchOffice router
and theMainOffice router. Notice that the interface of the next hop isS3/0.

c. Move the cursor over the MainOffice router and note that the IP
address for Serial 3/0is 10.10.10.1.

d. Move the cursor over the red serial link between the PartnerNet router and the
MainOffice router. Notice that the interface of the next hop isS2/0.

e. Move the cursor over the MainOffice router and note that the IP
address for Serial 2/0is 10.10.10.5.

f. Configure the static routes on both the BranchOffice and PartnerNet routers
using the CLI.Click the BranchOffice router, and click the CLItab.

g. At the BranchOffice>prompt, type enable to enter privileged EXECmode.

h. At the BranchOffice# prompt, type configureterminal.

i. The syntax for a default route is ip route 0.0.0.0 0.0.0.0


next_hop_ip_address. Type iproute 0.0.0.0 0.0.0.010.10.10.1.

j. Type end to get back to the BranchOffice#prompt.

k. Type copy run start to save the configurationchange.

l. Repeat steps f through k on the PartnerNet router, using 10.10.10.5 as the next hop
IPaddress.

Step 5: Configure static routes at Main Office.

The configuration of static routes at the Main Office is a bit more complex because the

69
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

MainOffice router is responsible for routing traffic to and from the Branch Office and
PartnerNet LAN segments.

The MainOffice router knows only about routes to the 10.10.10.0/30, 10.10.10.4/30, and
192.168.2.0/24 networks because they are directly connected. Static routes to the
192.168.1.0/24 and 192.168.3.0/24 networks need to be added so that the MainOffice
router can route traffic between the networks behind the BranchOffice and PartnerNet
routers.

a. Click the MainOffice router, and then click the CLItab.

b. At the MainOffice> prompt, type enable to enter privileged EXECmode.

c. At the MainOffice# prompt, type configureterminal.

d. The syntax for a static route is ip route network subnet_masknext_hop_ip_address:

ip route 192.168.1.0 255.255.255.010.10.10.2


ip route 192.168.3.0 255.255.255.010.10.10.6

e. Type end to return to the MainOffice#prompt.

f. Type copy run start to save the configurationchange.

g. Repeat steps a through e from Step 3. View the routing tables and notice the difference in
therouting
tables. The routing table for each router should have an “S” for each static route.

Step 6: Test connectivity.

Now that each router in the topology has static routes configured, all hosts should have
connectivity to all other hosts. Use ping to verify connectivity.

a. Click BOpcand click the Desktoptab.

b. Choose the Command promptoption.

c. Type ping 192.168.3.2. The ping should be successful, verifying that the static
routes areconfigured properly.

70
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

d. Type ping 192.168.2.2. Notice that the result is successful even though you did not
specifically addthe 192.168.2.0 network as a static route into any of the routers.
Because a default route was used on the BranchOffice and PartnerNet routers, a
route for the 192.168.2.0 network was not needed. The default route sends all
traffic destined off network to the MainOffice router. The 192.168.2.0 network is
directly connected to the MainOffice router; therefore, no additional routes needed
to be added to the routingtable

e. Click the Check Results button at the bottom of this instruction window to check yourwork.

71
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

PRACTICAL NO.:- 13

Objective:- To demonstrate the sharing of resources from FTP Server to a desktop.


Theory:-

The File Transfer Protocol (FTP) is a set of rules that computers on a network use to communicate with
one another.  The tool allows users to transfer files over networks such as the internet. This article
explains how to;

● Create FTP user accounts

● Use different methods, including command line, web browser or an FTP client to connect servers or
computers and transfer files.

● Copy files between servers and local machines.

● Copy files between two servers

To transfer files using FTP, you require to an FTP server, a user account, and an FTP client or
application.  Generally, most FTP servers require a username and a password in order to make a
connection. However, some servers may allow users to connect as anonymous users with no username
or password.

The common methods of making an FTP connection are;

1. Username and password Login: This is a restrictive method where only users with an account can access
the server. This is common when there is a need for users to upload or download files to and from the server.

2. Username only: Some sites only require a username to access. However, this will only allow
downloads and not uploads

3. Anonymous FTP access: This does not require the user to enter a username or password and is the
easiest. The access is usually for sites where users can only download files such as forms, software, and
others.

Creating FTP User Accounts

72
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

1.Log in to the domain cPanel

2.Navigate to Files and click FTP accounts

3.Type in the username and password for your new account in the Log In and Password boxes. If you
have several domains in your cPanel account, ensure that you select the correct one where you want the
FTP account

4.Type in a directory if you want different one from the default

5.Specify the disk space if you want something different from the default 2000MB. You can either type
in the disk space, or select unlimited at the Quota section at the bottom.

73
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

3.Click Create FTP Account

Once the process is complete, you will see a screen that shows the login names, path, and quota. To see
the details for each FTP account, click Configure FTP client. This will show you the FTP username,
server, and port.

74
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Different Methods of Using FTP to Transfer FIles

The three common methods are

● Web browser: Does not require a client and works directly from the browser, most used for
downloading files from the server.

● Command line FTP: All major operating systems have FTP client’s functionality available as a
command line.

● A GUI FTP client:  These are usually easy-to-use third party application that allows users to connect
and transfer files over FTP.

75
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Connecting to an FTP Server on a Web Browser

The web browser method works the same way as a website. However, instead of typing the HTTP at the
address bar, you replace it with FTP.

With the browser access, you do not need a client. You simply type the FTP server at the address bar in
this format: ftp://yourserver_name.com or ftp.yourserver_name.com

Connect to an FTP server with a username and password on a web browser

1.Open the browser (in our case we will use Firefox)

2.Type the FTP address of the server you wish to access. The syntax for FTP addresses is
ftp://ftp.domain_name.com or ftp://domain_name.com

3.Dismiss the error dialogs the server returns if necessary.

4.Type the FTP username and password in the Log On As dialog prompt

5.Click OK or Log In to access the server (depending on the type of browser)

You can also access the server by typing in your FTP username in the browser’s address bar. This will
give you a password required box where you will type your password and proceed

76
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Add FTP Credentials in the Browser Address Bar

Instead of waiting for the logon dialog box, you can enter the username and password in the address bar.
This will open the FTP server without prompting for a password.

1.Open the web browser

2.In the address bar, type ftp://username:password@FTP.yourdomain_name.com

This allows you to open the FTP server and download files.

Command Line FTP

To use the command line FTP, open the DOS Prompt in Windows or Terminal in Linux and Mac.

In windows 7, click start and type command at the search programs and files. Click the Command
Prompt. Alternatively, click start, programs and then the Accessories where you will find
the Command Prompt.

77
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

1.Type the command ftp ftp.yourdomain_name.com at the

ftpftp.yourdomain_name.com> at the C:> prompt.

2.Enter your username and password.

78
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Alternatively, type FTP and press Enter at the command prompt in Windows. From here, use
the open command to connect to the server.

1. ftp> openftp.ftpserver_name.com

Once you login, it takes you to the default directory. You can move to the one where you want to copy
files to, and open it using the command.

1. ftp>cd directory_name

To upload files to the active folder of the remote machine or server, use the command in the format

1. ftp> put filename+extension

For example  ftp> put readme.txt will upload the file readme.txt from your local folder to the remote
server.

ftp> mput *.xlsx , uploads all excel files.

You can also use send instead of put.

79
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Similarly uses get to download single files and mget for multiple

1. ftp> get readme.txt


1. ftp>mget *.pdf

Using an FTP Client to Transfer Files over FTP Connections

Moving files is much easier when using an FTP client and you may consider one if you require regular
access to the FTP servers. Using these allows you to easily upload, download or transfer files much
easier than a command line or web browser. For the purpose of this article, we will look at two FTP
clients for Windows

Winscp FTP Client for Windows

1.Download and install the WinSCP client here

2.Open the application

3.Type your FTP server name in the format ftp.server_name.com

4.Type your Host name in the format user1@server_name.com

5.Select port 21

6.Click Login

7.Click Save if you do not want the server to keep on asking you to log in every time.

80
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

You may choose Anonymous login if the server allows it.

81
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

A screen with two panes opens up after log successful logon. By default, the left-hand pane is the local
drive while the right is the root directory of the remote FTP location.

To upload files

1.Select the files on the left-hand pane. You can select one or more files or folders using the control and
shift buttons.

82
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

2.Click the Upload drop-down button to choose whether you just want to upload normally, in the
background or and whether to transfer the files and then delete from the source location.

To download files from the server,

1.Select folder or files on the right-hand pane

2.Click download (use the drop-down arrow to select the option)

Alternatively, transfer and then right-click, it gives the same options as clicking on the drop-down
button.

83
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Use FTP Rush to Transfer Files Between Two Servers

The FTP Rush works almost the same way as the WinSCP. However, it has the option of transferring
files between two remote servers.

1.Download the FTP Rushhere

2.Install the application on your Windows computer

3.Open the application.

By default FTP Rush displays a local directory on the left pane and the remote on the right pane.
However, you can switch these the way you want them as well as connect to two remote servers. If you
want two remote servers, click on the computer /server on the icons bar under the name Local.

84
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

4.To connect to remote machine, click on the (2) Remote bar.

5.At the top of the page, enter the Host name, port, FTP Username and Password, and the Path. Click
the quick connect button just before the Host, or press Enter key to connect. Alternatively, click on the
drop-down button between the connect button and Host to open Quick Connect dialog box. Enter the
details FTP details and click OK to connect.

85
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Alternatively, click the connect/disconnect icon and enter the details.

To copy files between different computers or server, go to the correct pane select the files you want to
upload to download and then click the Transfer button (Green arrow). Right-clicking on the highlighted
files will also give you the Transfer and other options such as Delete, Make directory, Advanced
Transfer, etc.

86
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

● To upload files, select the files from your Local pane and click the transfer arrow.

● To download files from the server to local, select the files in the Remote pane and click transfer
arrow.

To transfer files between two remote servers,

1.Go to the Local drive pane and click the icon to switch to remote.

2.Enter the FTP username and password for the second website and click OK.

87
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

3.Once you establish a connection to each server, select and transfer the files you want to copy to the
other server.

Conclusion:-

FTP is a file transmission protocol that allows users to transfer files between servers or computers. To
perform a transfer, upload or download, a user requires a network connection, an FTP server, and an
account.

To access the FTP server, a user can use the inbuilt tools such as the command line which is available in
all major operating systems, a web browser, or a free or premium third-party FTP client or application.
Each of these has its benefits and limitations as well as different level of ease-of-use.

The command line can be a challenge for users who are not conversant while a browser access may have
its limits. The FTP clients are much easier to use suitable for users who are not comfortable with the
command lines.

88
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

PRACTICAL NO.:- 14

Objective:- To study and demonstrate various features of TEAM VIEWER Application on


a. Two PCs
b. Two Mobiles
c. Two PC’s and Mobiles

Theory:-

• Webserver:-

For controlling a remote machine, in this assignment we will have a look at how to use Team
Viewer. Team Viewer is a powerful program that will let you take remote control of a PC over the
internet. Team Viewer is a clever and very powerful program that will let you take remote control
of a PC over the internet. This makes it ideal for retrieving forgotten files, and it’s also a great way
of helping friends and family with their computer problems without leaving the comfort of your
desk.
If you’re a home user you can download and install the software for free. For business use, see
the licensing options. As you read on we’ll discover how to rescue that forgotten file and also how
to take remote control of your desktop PC. Here’s how to do it.

• Step-by-step: Get files from your PC remotely

Grab the software

Fig No. 14.1 Grab the software

89
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Team Viewer is like a telephone conversation made between two PCs, so both machines will need
to have the software installed. We’re going to assume you’ve a main desktop PC and a laptop that
you take out and about with you. To get started, download Team Viewer on your desktop PC from
www.teamviewer.com.

Get configured

Fig No. 14.2 Get configured

Now click ’Run’ at the bottom of the screen and, when prompted, accept the license agreement.
You’ll need to check the two tick boxes here as well. Finally, when prompted, choose ’Personal/
non-commercial use’ and click ’Next’. The next screen is called ’Setup unattended access’. All
you need do is click ’Next’ to proceed.

Make an account

90
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Fig No. 14.3 Make an account

On the next screen, you’ll need to give your computer a password. Once you’ve chosen one, click
’Next’. On the following screen you’ll be asked to provide your email address and a Team Viewer
password; make a note of this password, because you’ll need it later. Click ’Next’ when you’re
done.

Activate your team

Fig No. 14.4 Activate your team

You will now see a screen that looks like the one above. Don’t worry about the passwords at this

91
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

point - we’ll use those later. Your final job is to access your email inbox and find a message from
Team Viewer. You’ll need to open it and click on the long link, which will activate your Team
Viewer registration.

Set up your laptop

Fig No. 14.5 Set up your laptop

Next, it’s time to fire up your laptop and install Team Viewer there, too. When you’re done,
you’ll need to follow the same steps as before until you reach the screen above. This time, select’
already have a Team Viewer account’ and enter the email address you registered with, along with
your Team Viewer password.
Take control

92
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Fig No. 14.6 Take control

Let’s be adventurous and give full control of your desktop to your laptop. Looking at your main
PC, note down the number next to ’Your ID’. Now, working on your laptop, enter this number into
the ’Partner ID’ box. Click ’Connect to partner’ and enter your Team Viewer password. You’ll see
your desktop PC’s Windows desktop appear.

Access your PC remotely

Fig No. 14.7 Access your PC remotely

Working on your laptop, you should now be able to move icons around on your other PC. You
can open programs, close programs and make system configuration changes too. In this mode,
Team Viewer is also ideal for troubleshooting PCs remotely. Set it up as before and you’ll be able
to help your friends without leaving your own home.

Retrieve that file

93
1902629
DEPARTMENT OF INFORMATION TECHNOLOGY, CEC Landran

Fig No. 14.8 Retrieve that file

If you’ve forgotten to transfer a file from your desktop, close the windows that control your other
PC, then look under ’Control remote computer’ in the Team Viewer display. Select ’File transfer
>Connect >Log on’. Navigate to your file and se-
lectit.Click’Retrieve’anditwillbetransferredtoyourlaptop’sMyDocuments folder.

Conclusion:-

In this assignment, we studied to install and setup Team Viewer for controlling remote machine.

94
1902629

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy