CNmohit
CNmohit
2 Practically implement and test the cross-wired cable and straight through
cable using clamping tool and network lab cable tester.
3 7 to 9
Study and familiarization with various network devices.
4 10 to 12
Familiarization with Packet Tracer Simulation tool/any other
related tool.
5 13 to 15
Study and Implementation of IP Addressing Schemes
6 16to 17
related problems.
12 27 to 28
Network cables are essential for the setup and functioning of any network. They enable the connection
and communication between computers, servers, and other network device. Types of Network
Cables:
Twisted pair cable
Coaxial Cable
Fiber Optic Cable
1. Twisted Pair Cables
Twisted pair cables are the most common type of cabling used in local area networks (LANs) and other
telecommunications setups. They consist of pairs of insulated copper wires twisted together to reduce
electromagnetic interference.
2. Coaxial Cable
Coaxial cable, or coax, is made of a single solid copper core. A plastic layer provides insulation between
the center conductor and a metal shield. This cable is traditionally used for television and other broadband
networks due to its ability to carry high-frequency signals over long distances without significant loss.
1
3. Fiber Optic Cable
Fiber optic cables use glass fibers to transmit data as pulses of light. They offer high bandwidth, can
support data transmission over long distances, and are immune to electrical interference.
Fiber optic cables are ideal for backbone connections between networked buildings or within data centers.
• Single-mode Fiber
Uses a single ray of light (mode) to carry transmission over long distances.
• Multi-mode Fiber
Uses multiple rays of light simultaneously, which gives high bandwidth at high speeds over medium
distances.
Network Topologies
A Network Topology is the arrangement with which computer systems or network devices are connected to
each other. Topologies may define both physical and logical aspect of the network. Both logical and physical
topologies could be same or different in a same network.
Types of Network Topology
1. Point to Point Topology
2. Bus Topology
3. Star Topology
4. Ring Topology
5. Mesh Topology
6. Tree Topology
1. Point-to-Point
Point-to-point networks contains exactly two hosts such as computer, switches or routers, servers
connected back to back using a single piece of cable. Often, the receiving end of one host is connected to
sending end of the other and vice-versa.
2
2. Bus Topology
In case of Bus topology, all devices share single communication line or cable.Bus topology may have
problem while multiple hosts sending data at the same time. Therefore, Bus topology either uses
CSMA/CD technology or recognizes one host as Bus Master to solve the issue. It is one of the simple
forms of networking where a failure of a device does not affect the other devices. But failure of the
shared communication line can make all other devices stop functioning.
3. Star Topology
All hosts in Star topology are connected to a central device, known as hub device, using a point-to-point
connection. That is, there exists a point to point connection between hosts and hub. The hub device can be
any of the following:
• Layer-1 device such as hub or repeater
• Layer-2 device such as switch or bridge
• Layer-3 device such as router or gateway
4. Ring Topology
In ring topology, each host machine connects to exactly two other machines, creating a circular network
structure. When one host tries to communicate or send message to a host which is not adjacent to it, the
data travels through all intermediate hosts. To connect one more host in the existing structure, the
administrator may need only one more extra cable.
3
5. Mesh Topology
In this type of topology, a host is connected to one or multiple hosts.This topology has hosts in point-to-
point connection with every other host or may also have hosts which are in point- to-point connection to
few hosts only.
• Full Mesh: All hosts have a point-to-point connection to every other host in the network.
Thus for every new host n(n-1)/2 connections are required. It provides the most reliable
network structure among all network topologies.
• Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts
connect to each other in some arbitrarily fashion. This topology exists where we need to
provide reliability to some hosts out of all.
6. Tree Topology
Also known as Hierarchical Topology, this is the most common form of network topology in use
presently This topology imitates as extended Star topology and inherits properties of bus topology
This topology divides the network in to multiple levels/layers of network. Mainly in LANs, a network
is bifurcated into three types of network devices. The lowermost is access-layer where computers are
attached. The middle layer is known as distribution layer, which works as mediator between upper
layer and lower layer. The highest layer is known as core layer, and is central point of the network, i.e.
root of the tree from which all nodes fork.
4
TASK 2 : Practically implement and test the cross-wired cable and straight through
cable using clamping tool and network lab cable tester.
Materials Needed: RJ45 connectors , Clamping tool (crimping tool) , Cable stripper , Network lab cable
tester , Wire cutters (optional) , Ethernet cable (Cat5e or Cat6).
Steps :
1. Strip the Cable: Remove 1-2 inches of the outer jacket from both ends.
2. Untwist Wires: Separate and straighten the wire pairs.
3. Arrange Wires:
• Straight-Through: Use T568A or T568B on both ends.
• Crossover: Use T568A on one end, T568B on the other.
Wiring Standard for Crossover Cable : To create a crossover cable, you must use different wiring standards on
each end of the cable.
End 1: T568A Standard End 2: T568B Standard
5
Uses of Crossover Cable:
• Computer to Computer: Directly connect two computers for file sharing or networking.
• Switch to Switch: Link two network switches together directly.
• Router to Router: Connect two routers for network segmentation or redundancy.
• Hub to Hub: Join two hubs to expand a network without using a switch.
• Connecting Older Network Devices: Some older devices that don’t support auto MDI/MDIX require a
crossover cable to connect similar devices.
Wiring Standards for Straight through cable: You can choose either T568A or T568B, but the same standard
must be used on both ends.
Pin 1: White/Orange
Pin 2: Orange
Pin 3: White/Green
Pin 4: Blue
Pin 5: White/Blue
Pin 6: Green
Pin 7: White/Brown
Pin 8: Brown
1. Router
• Function: A router is responsible for forwarding data packets
between different networks. It determines the best path for data to
travel from the source to the destination. Routers can connect
multiple networks, such as a home network to the internet.
• Example: In a typical home setup, a router connects to the internet
service provider’s network via a modem and routes data between the
internet and the home’s devices, such as computers, smartphones,
and smart TVs.
2. Switch
• Function: A switch operates at the data link layer (Layer 2) of the OSI model and connects multiple
devices within the same local area network (LAN). Unlike a hub, which broadcasts data to all devices,
a switch intelligently forwards data to the specific
device that needs it, using MAC addresses to make this
decision.
• Example: In an office environment, a switch connects all the computers, printers, and servers in the
network, allowing them to communicate with each other efficiently.
3. Hub
• Function: A hub is a basic networking device that connects multiple
Ethernet devices in a network. It broadcasts incoming data packets to all
connected devices, regardless of the destination. This makes hubs less
efficient than switches, as they can cause network collisions.
• Example: Hubs were commonly used in older or simpler network setups to connect a few computers
within a small LAN.
4. Modem
• Function: A modem (short for modulator-demodulator) converts digital
signals from a computer into analog signals that can travel over telephone
or cable lines and vice versa. This conversion allows for communication
over long distances, typically for internet access.
• Example: A DSL or cable modem connects a home or office network to
the internet via the ISP's infrastructure.
7
5. Access Point (AP)
• Function: An access point is a device that allows wireless devices to
connect to a wired network using Wi-Fi. It acts as a bridge between
wireless devices and the wired LAN, extending the network’s coverage
area.
• Example: In a large office, multiple access points are placed throughout
the building to provide Wi-Fi coverage in all areas, ensuring that wireless
devices can connect seamlessly to the network.
6. Firewall
• Function: A firewall is a network security device that monitors and
controls incoming and outgoing network traffic based on predetermined
security rules. It acts as a barrier between a trusted internal network and
untrusted external networks, such as the internet, to prevent
unauthorized access and threats.
• Example: Enterprises use firewalls to protect their internal networks
from external cyber threats by filtering out potentially harmful data and blocking unauthorized access
attempts.
8
9. Bridge
• Function: A bridge is a network device that connects and filters traffic
between two different segments of a local area network (LAN).
Operating at the data link layer, it divides a large network into smaller
segments to reduce traffic congestion and improve performance.
Bridges filter traffic by examining the MAC addresses to determine
whether to forward or block data.
• Example: In a large building with multiple floors, bridges can be used
to connect the networks on each floor, allowing them to communicate while managing the traffic
between them.
10. Repeater
• Function: A repeater is a device that regenerates and amplifies
signals in a network to extend the distance over which data can be
transmitted without degradation. Repeaters are often used in long-
distance data transmission to ensure that signals remain strong and
clear.
• Example: In a large office or warehouse where a single wireless
signal cannot cover the entire area, repeaters can be used to extend the Wi-Fi signal to reach all
corners of the space.
9
Task 4 : Familiarization with Packet Tracer Simulation tool/any other related tool.
Packet Tracer : Packet Tracer is a powerful network simulation tool developed by Cisco, widely used for
learning and practicing networking concepts, especially for those studying for Cisco certifications like CCNA
(Cisco Certified Network Associate).
◦ Easy to Learn: The interface is intuitive, making it accessible even for beginners with little to no
prior networking experience.
◦ Drag-and-Drop Functionality: Users can easily add devices and create network topologies
using drag-and-drop. Cost-Effective:
◦ Free Access: Cisco offers Packet Tracer for free to students and educators through the Cisco
Networking Academy, making it an affordable option for learning networking.
2. Supports a Wide Range of Cisco Devices:
◦ Device Simulation: Packet Tracer includes a variety of Cisco devices (routers, switches, PCs, etc.),
allowing users to simulate complex network scenarios.
◦ IoT Simulation: It supports the simulation of IoT (Internet of Things) devices, which is useful for
understanding modern network setups.
3. Educational Focus:
◦ Built-in Tutorials: It includes various tutorials and labs that align with Cisco’s certification programs,
such as CCNA.
◦ Learning Environment: Designed to help students learn and practice networking concepts in
a controlled environment. Real-Time and Simulation Modes:
◦ Real-Time Mode: Shows the immediate state of the network, similar to a real network.
◦ Simulation Mode: Allows users to visualize and analyze packet flow, which is helpful for
understanding network protocols and troubleshooting issues. Cross-Platform Compatibility:
◦ Runs on Multiple Operating Systems: Packet Tracer is available on Windows, macOS, and
Linux, making it accessible to a wide range of users.
◦ Vendor Lock-In: While Packet Tracer is excellent for learning Cisco-specific networking, it
doesn't support devices from other vendors, limiting its usefulness for those needing to learn about
multi-vendor environments.
10
Simulation Limitations:
◦ Not a Full Emulator: Packet Tracer is a simulator, not an emulator. It approximates the behavior
of Cisco devices but doesn’t run actual IOS images, which means it may not replicate every
command or feature exactly as it would be on real hardware.
◦ Simplified Environment: Some advanced networking features and protocols are either not
supported or are simplified, making it less suitable for in-depth or highlevel network design and
testing.
2. Performance Constraints:
◦ Resource Intensive: Although not as demanding as some other network simulators, Packet Tracer
can still be resource-intensive, especially with large and complex topologies.
3. Less Suitable for Advanced Users:
◦ Not Ideal for Professional Use: While it is excellent for educational purposes, professionals may
find Packet Tracer lacking when it comes to advanced network design, testing, and troubleshooting
in a production environment.
4. No Support for Non-Cisco Certifications:
◦ Focused on Cisco Curriculum: The tool is primarily designed to align with Cisco's certification
paths, so it might not be as useful for those pursuing non-Cisco certifications like CompTIA
Network+ or vendor-neutral networking knowledge.
Installation
1. Adding Devices: Drag and drop devices like routers, switches, and PCs from the left panel onto the
workspace .
2. Connecting Devices: Use cables (straight-through, crossover, etc.) to connect the devices. The correct
cable type is often automatically selected, but you can manually choose the type if necessary.
11
3. Configuring Devices: Click on a device to access its configuration menu. You can configure IP addresses,
subnet masks, and routing protocols.
4. Testing Connectivity: Use the ping command from a PC’s command prompt to test connectivity between
devices.
4. Advanced Features
• Protocol Simulation: Packet Tracer supports many network protocols, including RIP, OSPF, EIGRP, and
STP, allowing you to simulate complex network scenarios.
• IoT Devices: You can also simulate Internet of Things (IoT) devices and create smart home networks.
• Multiuser Collaboration: Packet Tracer allows multiple users to collaborate on the same network
topology, useful for group projects.
12
Task 5: Study and implementation of IP Addressing Scheme (IPV6)
IPV6 Address: - An Internet Protocol Version 6 address is a numerical label that is used to identify a
network interface of a computer or other network node participating in an IPv6 network. An IP address
serves the purpose of uniquely identifying an individual network interface of a host, locating it on the
network, and thus permitting the routing of IP packets between hosts IPv6 is an Internet Protocol (IP) for
packet-switched internetworking that specifies the format of packets (also called datagram) and the
addressing scheme across multiple IP networks. In comparing the two protocols IPv6 expands upon the
addressing and routing capabilities of IPv4 in a number of ways including:
• In IPv6 the IP address size is increased from 32 bits to 128 bits.
• IPv6 supports a greater number of addressable nodes.
• IPv6 provides more levels of addressing hierarchy.
• IPv6 offers simpler auto-configuration of addresses.
• Ipv6 also supports simplified header format.
Working modes of router: - There are 5 mail modes of router: User Execution Mode, Privilege Mode,
ROM Monitor Mode, Sub interface Configuration Mode, Interface Configuration Mode, Global
Configuration Mode. Link local:
1. A link local address is an ipv6 unicast address that can be automatically/ manually configured on any
interface using the prefix “FE80:”
2. These addresses mostly used for addressing on a single link for purposes such as automatic address
configuration and neighbor discovery.
3. All ipv6 enabled interfaces have a link local unicast address.
• No shutdown: This command enables an interface and brings it up. It is mostly used for new interfaces or
troubleshooting purposes.
• Show IP route: It is used to show the list of the networks that router can reach, their metric.
• Show IP interface: It is used to list all the interface brief of all IP’s connected.
Steps:
• Step1: Scenario Created
13
Figure: 7.1
• Step2: To configure IPV6 address on PC0.
Figure: 7.2
• Step5: To configure ipv6 routing in the network. Go to cmd interface of router0 and type following
commands:
Enable Configure terminal
14
Figure: 7.3
Ipv6 unicast-routing
Interface fastethernet 0/0
Ipv6 enable
Ipv6 address FE80::202:4AFF:FE9D:5630 LINK-LOCAL
Ipv6 address 2000:1:1:1:1:1:1:1111/112
No shutdown
Press “CTRL” to exit from current working mode of router
Configure terminal
Ipv6 unicast-routing
Interface fastethernet 0/1
Ipv6 enable
Ipv6 address FE80::202:4AFF:FE9D:5630 LINK-LOCAL
Ipv6 address 4000:1:1:1:1:1:1:1112/112
No shutdown
Press “CTRL” to exit from current working mode of router
15
Figure: 7.4
18
Figure: 7.5
Figure: 7.6
• Step5: After completely executing these commands the IPV6 address scheme plan will be enabled and
all connections will be established.
16
Figure: 7.7
17
EXPERIMENT 7: SIMULATION OF WEB TRAFFIC
Steps:
18
EXPERIMENT 8: Study and implementation of various router
configurationcommands
Steps:
19
EXPERIMENT 9: CREATION OF NETWORKS USING ROUTERS
Steps:
20
21
EXPERIMENT 11: Practical implementation of basic network commands andnetwork configuration commands like
ping, ipconfig, netsat, traceart etc. for troubleshooting network related programs
Tracert
This command is used to diagnose path-related problems. On an IP network, routers exchange IP packets
between the source and the destination. They take IP packets from the source host and forward them in a
sequence until they reach the destination host. The sequence of routers between the source and destination
is known as the path. A path consists of all routers in a sequence that IP packets sent from the source host
traverse to reach the destination host.
The tracert command prints the path. If all routers on the path are functional, this command prints the full
path. If a router is down on the path, this command prints the path up to the last operational router
tracert www.google.co.in
The following image shows the output of the
s command. Pa
The following table lists some important options of the tracert command
21
Option Description
-d Do not resolve the IP addresses of intermediate routers to their names.
-h Specifies the maximum number of hops (routers) to search on the path. The default is 30 hops.
-w Specifies the amount of time in milliseconds to wait for a reply message from the router. If not received
default time-out is 4000 (4 seconds).
Ping
The ping command is used to test connectivity between two hosts. It sends ICMP echo request messages
to the destination. The destination host replies with ICMP replies messages. If the ping command gets a
reply from the destination host, it displays the reply along with round-trip times.
ping google.com
Arp
To send IP packets, a computer needs two addresses. These addresses are the MAC address and the IP
address. A MAC address is the physical or hardware address of the NIC. An IP address is the logical or
software address of NIC. If a computer knows the IP address of the destination computer but it does not
know the MAC address of the destination computer, it uses the ARP protocol to know the MAC address of
the destination computer.
22
The ARP protocol broadcasts a given IP address over a local network. The corresponding host responds to
the broadcast with its MAC address. To avoid repetition, ARP stores the answer in a table known as ARP
table. ARP maintains a separate ARP table for each NIC.
To view the ARP table, you can use the following command.
arp
By default, this command displays the ARP table of the active NIC. If multiple NICs are installed on the
computer, you can use the -a option with this command. If the -a option is used, the ARP command displays
all ARP tables.
The following image shows the output of the arp command when used with the -a option.
To display the ARP cache entry for a specific IP address, specify the IP address with the -N option. For
example, the following command displays the ARP cache table for the interface that is assigned the IP
address 192.168.42.171.
Arp -a -N 192.168.42.171
The following image shows the output of the above command.
23
Netstat
This command displays active connections, ports on which the computer is listening, Ethernet statistics,
the IP routing table, and IP statistics.
The output of this command is organized in rows and columns. Each row represents a new connection or
an entry in the output. It contains four columns. These columns provide the following information about
the row.
Proto: - This column displays the name of the protocol (TCP or UDP).
Local Address: - This column displays the IP address of the local computer and the port number being
used. If the port is not yet established, the port number is shown as an asterisk (*).
Foreign Address: - This column displays the IP address and port number of the remote computer to which
the port is connected.
24
Option Description
-a Displays all active TCP connections and the TCP and UDP ports on which the
computer is listening.
-e Displays Ethernet statistics, such as the number of bytes and packets sent and
received.
-n Displays active TCP connections, however, addresses and port numbers are
expressed numerically and no attempt is made to determine names.
-o Displays active TCP connections and includes the process ID (PID) for each
connection.
-p Shows connections for the protocol specified by Protocol. In this case, the Protocol
can be
-s Displays statistics by protocol. By default, statistics are shown for the TCP, UDP,
ICMP, and IP protocols.
The following table lists some common options of the netstat command.
Ipconfig
This command displays all current TCP/IP network configuration values and refreshes Dynamic Host
Configuration Protocol (DHCP) and Domain Name System (DNS) settings. This command is mainly used to
view the IP addresses on the computers that are configured to obtain their IP address automatically.
25
Used without Displays the IP address, subnet mask, and default gateway for all adapters.
parameters
/renew [Adapter] Renews DHCP configuration for all adapters (if an adapter is not specified) or for
a specific
/release [Adapter] Sends a DHCPRELEASE message to the DHCP server to release the current DHCP
configurall adapters (if an adapter is not specified) or for a specific adapter if the
Adapter parameter i
/flushdns Flushes and resets the contents of the DNS client resolver cache.
The following table lists some important options of the ipconfig command.
26
.
.
EXPERIMENT 12: IMPLEMENTING STATIC AND DEFAULT ROUTES USING
ROUTER CONFIGURATION
Steps:
27
• Now to enable messaging from Router0 to Router2 set a static route
from Router0 to Router2
• Click on Router0 and open config then in settings > static fill the fields
of IP address, subnet maskand Next hop as 10.10.2.0, 255.255.255.0,
10.10.1.1 respectively.
• Now again try sending now it will be successful
• Do similar for Router2 so it can also send messages to Router0
28