Dhruv Jain - 2110990443
Dhruv Jain - 2110990443
Submitted By Submitted To
Dhruv Jain Dr. Gaganpreet Kaur
2110990443
G14 - A
Aim: -
Introduction of Cables, Network devices: Hub, Switches, Router etc.
Material Required-
Coaxial Cables, Twisted Pair Cables, Fibre Optics Cable, Switch, Hub, Router.
Theory:-
Cables -
1) Coaxial Cables:
A coaxial cable is an
electrical cable with a
copper conductor and
an insulator shielding
around it and a
braided metal mesh
that prevents signal
interference and cross
talk. Coaxial cable is
also known as coax.
The core copper conductor is used for the transmission of signals and the
insulator is used to provide
insulation to the copper
conductor and the insulator is
surrounded by a braided
metal conductor which helps
to prevent the interference of
electrical signals and prevent cross talk. This entire setup is again covered with
a protective plastic layer to provide extra safety to the cable.
One of the conductors is used to carry the signal and the other is used as a
ground reference only. The receiver uses the difference of signals between
these two conductors. The noise or crosstalk in the two parallel conductors is
high but this is greatly reduced in twisted pair cables due to the twisting
characteristic. In the first twist, one conductor is near to noise source and the
other is far from the source but in the next twist the reverse happens and the
resultant noise is very less and hence the balance in signal quality is
maintained and the receiver receives very less or no noise. The quality of
signal in twisted pair cables greatly depends upon the number of twists per unit
length of the cable.
Specifiaction of Coaxial Cables –
Network Devices-
1. Repeater:
A repeater operates at the physical layer. Its job is to regenerate the signal over
the same network before the signal becomes too weak or corrupted to
extend the length to which the signal can be transmitted over
the same network. An important point to be noted about
repeaters is that they do not amplify the signal. When the
signal becomes weak, they copy it bit by bit and
regenerate it at its star topology connectors connecting if
original strength. It is a 2-port device.
2. Hubs:
3. Switch:
Switch is a network device that connects other devices to Ethernet networks
through twisted pair cables. It uses packet switching technique to receive,
store and forward data packets on the network. The switch maintains a list of
network addresses of all the devices connected to it.
On receiving a packet, it checks the destination address and transmits the packet
to the correct port. Before
forwarding, the packets are
checked for collision and other
network errors. The data is
transmitted in full duplex mode.
Data transmission speed in
switches can be double that of
other network devices like hubs
used for networking. This is
because switch shares its
maximum speed with all the
devices connected to it. This
helps in maintaining network speed even during high traffic. In fact, higher data
speeds are achieved on networks through use of multiple switches.
4. Router:-
A router is a device like a switch that routes data packets based on their IP
addresses. The router is mainly a Network Layer device. Routers normally
connect LANs and WANs and have a dynamically updating routing table
based on which they make decisions on routing the data packets. The router
divides the broadcast domains of hosts
connected through it. There are several
types of routers, but most routers pass
data between LANs(Local Area
Networks) and WANs(Wide Area
Networks).
Aim: -
Installation and Introduction to Packet Tracer
Material Required:-
Good internet connection, login credentials to netacad.com.
Theory:-
Packet Tracer is a cross-platform visual simulation tool designed by Cisco
Systems that allows users to create network topologies and imitate modern
computer networks. The software allows users to simulate the configuration of
Cisco routers and switches using a simulated command line interface.
Packet Tracer makes use of a drag and drop user interface, allowing users to
add and remove simulated network. Packet Tracer can be run on Linux,
Microsoft Windows, and macOS.
Similar Android and iOS apps are also available.
Procedure:-
1. Login to netacad.com
2. Scroll down and select the card where packet tracer is written
3. Scroll down and then select your operating system and then click on
download.
4. After successful installation, the initial screen would be as shown in the
figure.
Experiment No. 3
Aim:-
Simulation of Network Devices (HUB, Switches, Router) and connect more
than two computers using Switch to Topologies like Star, Mesh, Ring, Bus,
and Hybrid.
Material Required:-
Cisco Packet Tracer Tool installed.
Theory:-
Hub: An Ethernet hub, active hub, network hub, repeater hub, multiport
repeater, or simply hub is a network hardware device for connecting multiple
Ethernet devices together and making them act as a single network segment.
Tree Topology- Tree topology is a sort of structure in which each node is related
to the others in a hierarchy. In a topological hierarchy, there are at least three
distinct levels. Sometimes it is also called hierarchical topology as in this
topology, all elements are arranged like the branches of a tree. It is a lot like the
star and bus topologies. Tree topologies are commonly used to arrange data in
databases and workstations in corporate networks. In a tree topology, any two
linked nodes can only have one mutual connection, hence there can only be one
link between them.
Hybrid Topology-
Hybrid topology is an integration of two or more different topologies to form a
resultant topology which has many advantages (as well as disadvantages) of all
the constituent basic topologies rather than having characteristics of one specific
topology.
Procedure:-
Step 1 - We will select devices and switch according to the required
topology as shown in the figure below.
Step 2 - Now, give an IP address to the device by clicking on the devices and
selecting desktop from the top and then choosing IP configuration option.
Step 3 - Provide IP address to all the devices.
Step 4 - Now, we will run ping command to check whether the reply id coming
from the target device or not and if reply successfully comes then it means all
connections are properly connected.
Syntax for ping command - ping <ip address_target>
Experiment No. 4
Aim:-
Basic commands of Routers: hostname, password, Show Run, Show IP int
brief, Assigning IP addresses to interfaces
Material Required:-
Cisco packet tracer tool installed on your machine.
Theory:-
Routers guide and direct network data, using packets that contain various kinds
of data—such as files, communications, and simple transmissions like web
interactions.The data packets have several layers, or sections, one of which
carries identifying information such as sender, data type, size, and most
importantly, the destination IP (Internet protocol) address. The router reads
this layer, prioritizes the data, and chooses the best route to use for each
transmission.
Procedure:-
1. First make connections as shown in the figure.
2. Next give ip addresses and the gateway address to all the 3 pcs.
3. Different modes in router are:-
1) User Execution Mode
2) Configuration/privilege Mode
3) Global Conf Mode
4) Subconf Mode
• User Execution Mode - Enable router with the help of en command
• Configuration/privilege mode - Enter command as conf t to enable
configuration or privilege mode.
• Commands in router:-
Aim:-
To do peer to peer connectivity, assign the IP address and share the resources.
Material Required:-
2 PCs and cross over cable.
Theory:-
A peer-to-peer network is a simple network of computers. It first came into
existence in the late 1970s. Here each computer acts as a node for file sharing
within the formed network. Here each node acts as a server and thus there is no
central server in the network. This allows the sharing of a huge amount of data.
The tasks are equally divided amongst the nodes. Each node connected in the
network shares an equal workload. For the network to stop working, all the
nodes need to individually stop working. This is because each node works
independently.
Procedure-
1. Take 2 pc’s in cisco packet tracer.
2. Connect the pc’s with cross over cable.
Aim:-
Subnetting with Class A, B, C with different IP addresses.
Material Required:-
Cisco Packet Tracer Tool installed.
Theory:-
An IP subnet, often called a subnetwork, is a subdivision of an IP
network. Subnets are implemented by borrowing bits from the host end
of an IP address in order to divide the larger network into smaller
subnetworks. Classes A, B, and C of subnetworks are used the most
often by different networks.
Procedure:-
1. Select 6 PCs, 3 switches and 3 routers (PT-Router). Connect them
using the ‘Automatically choose connection type’ option in
Connections as the given figure.
2. Configure all the PCs with their IP address, subnet and default
gateway.
4. After configuring all devices, assign the routes toh the routers. For
this open the command line interface of each router and write ip
route <network id> <subnet mask> <next hop> The routes of all
the three routers are given below:
5. Verify the connection between any PC using ping.
Experiment No. 7
Aim:-
Subnetting of Class A, B and C using FLSM.
Material Required:-
Cisco Packet Tracer Tool installed.
Theory:-
Subnetting in FLSM (Fixed Length Subnet Mask) refers to the process of
dividing a larger network into smaller subnetworks or subnets, each with its
own unique network address and subnet mask. In FLSM, the subnet mask for
all subnets is fixed, meaning that each subnet has the same number of hosts.
For example, if a network has a subnet mask of 255.255.255.0, each subnet will
have up to 254 hosts.
To subnet a network in FLSM, you need to determine the number of subnets
required and the number of hosts needed for each subnet. This will help you
calculate the subnet mask and the network address for each subnet. For
example, if you have a network with the IP address 192.168.1.0 and you want
to create four subnets with 30 hosts each, you would need to use a subnet mask
of 255.255.255.224. This would give you four subnets with network addresses
of:
192.168.1.0/27
192.168.1.32/27
192.168.1.64/27
192.168.1.96/27
Each subnet would have up to 30 hosts, and the remaining addresses in each
subnet would be reserved for network and broadcast addresses.
Procedure:-
Step 1: First, open the cisco packet tracer desktop and select 3 PCs, 3
Switches, 3 Routers.
Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask
• To assign an IP address in PC2, click on PC2.
• Then, go to desktop and then IP configuration and there you
will IPv4 configuration.
• Add IPv4 address and subnet mask.
Step 4: After configuring all of the devices we need to assign the routes
to the routers.
To assign static routes to the particular router
• First, click on router0 then Go to CLI.
• Then type the commands and IP information given below.
Aim:-
Subnetting of Class A, B and C using VLSM.
Material Required:-
Cisco Packet Tracer Tool installed.
Theory:-
VLSM stands for Variable Length Subnet Mask where the subnet design uses
more than one mask in the same network which means more than one mask is
used for different subnets of a single class A, B, C or a network. It is used to
increase the usability of subnets as they can be of variable size. It is also defined
as the process of subnetting of a subnet.
In VLSM, subnets use block size based on requirement so subnetting is
required multiple times. Suppose there is an administrator that has four
departments to manage. These are sales and purchase department with 120
computers, development department with 50 computers, accounts
department with 26 computers and management department with 5
computers.
If the administrator has IP 192.168.1.0/24, department wise IPs can be
allocated by following these steps:
1. For each segment select the block size that is greater than or equal to
the actual requirement which is the sum of host addresses, broadcast
addresses and network addresses. Make a list of subnets possible:
Procedure-
1. The highest IP available has to be allocated to highest requirement so
the sales and purchase department gets 192.168.1.0/25 which has 126
valid addresses that can easily be available for 120 hosts. The subnet
mask used is 255.255.255.128
2. The next segment requires an IP to handle 50 hosts. The IP subnet with
network number 192.168.1.128/26 is the next highest which can be
assigned to 62 hosts thus fulfilling the requirement of development
department. The subnet mask used is 255.255.255.192
3. Similarly, the next IP subnet 192.168.1.192/27 can fulfill the
requirements of the accounts department as it has 30 valid hosts IP
which can be assigned to 26 computers. The mask used is
255.255.255.224
4. The last segment requires 5 valid hosts IP which can be fulfilled by
the subnet 192.168.1.224/29 which has the mask as 255.255.255.248
is chosen as per the requirement. The IP with the mask
255.255.255.240 could be chosen but it has 14 valid host IPs and the
requirement is less in comparison so the one that is comparable with
the requirement is chosen. Thus, there is less IP wastage in VLSM as
compared to FLSM.
Step 4: After configuring all of the devices we need to assign the routes
to the routers. To assign static routes to the particular router:
• First, click on router0 then Go to CLI.
• Then type the commands and IP information given
below. CLI command: ip route <network id> <subnet
mask><next hop>
Step 5: Verifying the network by pinging the IP address of any PC. we’ll use
the ping command to do so.
• First, click on PC0 then Go to the command prompt
• Type ping <IP address of targeted node>
• As we can see in the below image, we are getting replies which
means the connection is working very fine.
Experiment No. 9
Aim:-
To Perform Static Routing, Default Routing by using 2 and 3 routers.
Material Required:-
Cisco Packet Tracer Tool installed.
Theory:-
Static routing between two routers is preconfigured manually by the network
administrator. It is more effective in smaller networks. As the network size
increases, it is difficult to manage every router manually.
Default Routing is a method wherein a router is configured to ship all of the
packets to the equal hop tool, and it would not be counted whether or not it
belongs to a specific community or not. When the destination network id is
unknown to the router, the router will use a default route and will send all the
incoming traffic to that route, by default.
Procedure :-
(a)
(b)
PC0
192.168.1.2 255.255.255.0 192.168.1.1
PC1
192.168.1.3 255.255.255.0 192.168.1.1
PC2
192.168.2.2 255.255.255.0 192.168.2.1
PC3
192.168.2.3 255.255.255.0 192.168.2.1
(b) S.NO Device IPv4 Address Subnet mask Default gateway
1
pc0 192.168.1.2 255.255.255.0 192.168.1.1
2
pc1 192.168.2.2 255.255.255.0 192.168.2.1
3
pc2 192.168.3.2 255.255.255.0 192.168.3.1
(a) Router0
config
(b)
Router1 Configuration:
(a)
(a),(b)
(b)
Step 4: After configuring all the devices red indicator turns into green and
the network is live so we can send and receive packets.
(a)
(b)
(a)
(b)
(a)
(b)
(b)
Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask
according to the IP addressing table given above.
(a)
• Repeat the same procedure with other PCs to configure them thoroughly.
Step 6: Verifying the network by pinging the IP address of any PC. We will
use the ping command to do so.
Simulation:
We are sending PDU from PC0 to PC2.
Aim:-
To Perform Dynamic Routing using RIP (RIP-V1 and RIP-V2).
Material Required:-
Cisco Packet Tracer Tool installed.
Procedure:-
RIP v1
Step 1: Open Cisco Packet Tracer (log in if not already done so).
Step 2: From the Network Devices category, select routers, and from the
devices drag 4 2911 routers into the workspace (we can choose any
Routers, but we’re choosing 2911 for the number of ports available so that
modules aren’t required)
Step 3: Select the End Devices sub-category from End Devices, and drag 3
PCs into the workspace.
Step 6: Now for configuring routing, first click Router 0, navigate to the
CLI tab, enter no for entering initial configuration mode if prompted, and
then enter the following commands on the CLI prompt to configure RIP
version 1.
Step 8: Test the connection by using the ping utility in the command
prompt in a PC to reach another PC in other networks, the first packet
might possibly not reach as it takes time for config to apply. The output
might be similar to the image shown below.
Step 9: Simulation: the packet takes the route according to the RIP metric
of least hop count in the illustration below.
RIP v2
Step 1: Select the End Devices category and in the End Devices sub-
category, select and drag 3 PCs as shown in the illustration below in the
workspace.
Step 2: Select the Network Devices category and drag 2 2911 routes from
the Router sub-category into the workspace.
Step 3: Connect all devices using crossover with the cables as shown below.
Step 4: Assign IPs to PCs using the same method as described in the
previous section.
Step 5: Configure Router interface IPs according to the above topology
diagram using the same commands described in the previous section.
Step 6: Now for Routing using RIP v2, open the CLI in routers and enter
the following commands, for Router 0.
and similarly, configure RIPv2 on other routers using the same syntax with
their directly connected networks.
Aim:-
To Perform Dynamic Routing using EIGRP.
Material Required:-
Cisco Packet Tracer Tool installed.
Theory:-
Enhanced Interior Gateway Routing Protocol (EIGRP) is a dynamic
routing protocol that is used to find the best path between any two-layer
3 devices to deliver the packet. EIGRP uses the minimum bandwidth on
the path to a destination network and the total delay to compute routing
metrics.
Procedure:-
1. Select 4 PCs, 2 switches and 2 routers. Connect them according to the
given topology. Use ‘Automatically choose connection type’ to connect
the devices to each other.
2. Configure the PC’s and routers according to the IP Addressing given
below:
Aim:-
To Perform Dynamic Routing using OSPF with Single area concept and
Multiple Area Concept.
Material Required:-
Cisco Packet Tracer Tool installed.
Theory:-
OSPF stands for Open Shortest Path First a link-state protocol and as the
name itself justifies that it is used to find the best and the optimal
pathway between the starting point and the destination target router
using its own shortest path first algorithm. OSPF creates or constructs a
topological map of the network from the available router by gathering
link-state routing protocol.
Procedure :-
1. Select 3 end devices (PC or Laptop), 3 switches and 3 routers. Connect
them according to the given topology.
Use ‘Automatically choose connection type’ to connect the
devices to each other.
Configure the PC’s and routers with their respective IP addresses.
2. After configuring all the devices, write the following command on
each router’s CLI to implement OSPF.