0% found this document useful (0 votes)
6 views6 pages

CN6S

The document outlines an experiment on configuring a switch within a Local Area Network (LAN) using Cisco Packet Tracer. It explains the differences between networking devices such as switches and hubs, and provides detailed steps for setting up a switch, including configuring host names, passwords, and verifying connections. The experiment concludes with a successful ping test between devices to confirm network connectivity.

Uploaded by

Suryansh Malviya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views6 pages

CN6S

The document outlines an experiment on configuring a switch within a Local Area Network (LAN) using Cisco Packet Tracer. It explains the differences between networking devices such as switches and hubs, and provides detailed steps for setting up a switch, including configuring host names, passwords, and verifying connections. The experiment concludes with a successful ping test between devices to confirm network connectivity.

Uploaded by

Suryansh Malviya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

COMPUTER NETWORKING

EXPERIMENT -6
Configure and implementation of a Switch within
Network using Packet Tracer

Theory: Local Area Network


A group of devices connected to one another in a single physical location, such as a
building, office, or home, is known as a local area network (LAN). A LAN can be tiny or
big, with one user's home network or hundreds of users and devices in an office or school
as examples.
The fact that a LAN connects devices that are located in a single, constrained region is its
sole distinguishing feature, regardless of size. A wide area network area. A few WANs and
MANs link numerous LANs collectively. (WAN) or metropolitan area network (MAN), in
contrast, spans a wider geographic.

Networking Device- Switch:


Depending on the situation, connections can be established and terminated using switches,
which are network devices. Switches are controlled by the data link layer. There is packet
filtering accessible in this. It is a kind of efficient bridge and a full duplex transmission
mode. In essence, it functions as an improved connectivity bridge. It is a particular type of
gadget that establishes and terminates connections in accordance with the circumstances at
the time. It has various features, including frame gearbox, flooding, and filtration.

Networking Device- Hub:


Networking devices called hubs are used to relay signals to all ports (aside from one port
that must respond after receiving the signal). Physical layer is where the hub is operated,
There is no packet filtering accessible in this. There are two types: Hub active, hub inactive.
As it transmits signal to all ports aside from the port from which signal is received, it is also
referred to as a repeater. Additionally, hubs' communication and information processing
skills for the second and third layers are not very sophisticated.

SURYANSH MALVIYA EN22CS3011003 5 Q-CSE


COMPUTER NETWORKING

Implementation on Packet Tracer:


In this Experiment, We will configure these settings on the Cisco switch in packet Tracer: a.

Host name

b. Console password
c. Privileged EXEC mode password
d. Privileged EXEC mode
Step 1: Create network topology in Cisco Packet Tracer as shown in fig 1. To connect
different components access the cables section.

Step 2: To assign an ip address to the system click on PC. Click on the config tab then
select FastEthernetO. Set Static ip address as 10.10.10.1. Using the address table given
below, configure the IP addresses on all endpoints precisely and completely.

Step 3: Configure the switch host name.

a. Set the host name on the switch0 using these commands in CLI.

Switch>enable

SURYANSH MALVIYA EN22CS3011003 5 Q-CSE


COMPUTER NETWORKING

Enter configuration commands, one per line. End with CNTL/Z.


Switch#configure terminal
Switch(config)#hostname CSEswitch

Step 3: Configure the privileged mode password and secret.


a. From global configuration mode, configure the password as csedept.

CSEswitch#config terminal
CSEswitch(config)#enable password csedept

b. From global configuration mode, configure the secret as helloworld.


CSEswitch(config)#enable secret helloworld

SURYANSH MALVIYA EN22CS3011003 5 Q-CSE


COMPUTER NETWORKING

Step 4: Configure the console password.

a. From global configuration mode, switch to configuration mode to configure the


console line.
CSEswitch(config)#line console 0

b. From line configuration mode, set the password to cisco and require the password to
be entered at login.

CSEswitch(config-line)#password consolepass
CSEswitch(config-line)#login CSEswitch(config-line)#exit

SURYANSH MALVIYA EN22CS3011003 5 Q-CSE


COMPUTER NETWORKING

Step 5: Step 7: Verify the configuration.

a. Close the switch0 command line interface


b. Click on switch0 and open the command line interface. It will ask for password,
c. Enter console password entered in Fig 4. To enable device secret key entered will be
used set in Fig:2

SURYANSH MALVIYA EN22CS3011003 5 Q-CSE


COMPUTER NETWORKING

d. Click on PC0( 10.10.10.1), go to the Desktop tab and click on the prompt

Write command Ping10.10.10.2

As the PC1 is reachable from PCO, so we are getting the given output while running the
ping command.

SURYANSH MALVIYA EN22CS3011003 5 Q-CSE

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy