0% found this document useful (0 votes)
14 views40 pages

Ankush DCN

Uploaded by

jbpm5qwsyy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views40 pages

Ankush DCN

Uploaded by

jbpm5qwsyy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

DR.

AKHILESH DAS GUPTA INSTITUTE OF


TECHNOLOGY & MANAGEMENT

Department of Electronic and Communication Engineering

DATA COMMUNICATION NETWORK


LAB
Paper Code: ETEC-358

Submitted By :- Ankush Aggarwal


Roll No :- 50415602820 Submitted to :- Mrs Anshika Negi
Branch :- ECE T5 (6th Semester)
INDEX

S. Name of Date Signature


no Program Group B

To study different types of network cables and practically


1. implement the cross-wired cable and straight through 4 May 2023
cable using clamping tool.

2. To Study of Network Devices in Detail. 4 May 2023

3. To Study of network IP 4 May 2023

4. To study the IDE of CISCO Packet Tracer. 4 May 2023

5. To Study basic network command and Network 11 May 2023


configuration commands.

6. To study and perform PC to PC communication. 11 May 2023

7. To create Star topology using Hub and Switch. 11 May 2023

8. To create Bus, Ring, Tree, Hybrid, Mesh topologies. 11 May 2023

9. Perform an initial Switch configuration. 25 May 2023

10 Perform an initial Router configuration. 25 May 2023


.

11 To implement Client Server Network. 1 June 2023


.

12 To implement connection between devices using router. 1 June 2023


.

13 To perform remote desktop sharing within LAN connection. 8 June 2023


.

14
.
Experiment-1

Aim: Study of different types of Network cables and practically implement the cross-wired
cable and straight through cable using clamping tool.
Apparatus (Components): RJ-45 connector, Crimping Tool, Twisted pair Cable
Procedure: To do this practical, following steps should be done:
Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be very
careful at this point, as to not nick or cut into the wires, which are inside. Doing so could alter
the characteristics of your cable, or even worse render is useless. Check the wires, one more
time for nicks or cuts. If there are any, just whack the whole end off, and start over.

Spread the wires apart, but be sure to hold onto the base of the jacket with your other hand.
You do not want the wires to become untwisted down inside the jacket. Category 5 cable
must only have 1/2 of an inch of 'untwisted' wire at the end; otherwise, it will be 'out of spec'.
At this point, you obviously have ALOT more than 1/2 of an inch of un-twisted wire.

You have 2 end jacks, which must be installed on your cable. If you are using a pre-made
cable, with one of the ends whacked off, you only have one end to install - the crossed over
end. Below are two diagrams, which show how you need to arrange the cables for each type
of cable end. Decide at this point which end you are making and examine the associated
picture below.

Fig.1 Diagram showing how to prepare Cross wired connection


Fig.2 Diagram showing how to prepare straight through wired connection
Experiment - 2

Aim: Study of following Network Devices in Detail


• Repeater
• Hub
• Switch
• Bridge
• Router
• Gate Way

Apparatus (Software): No software or hardware needed.

Procedure: Following should be done to understand this practical.


Repeater: Functioning at Physical Layer are repeater which is an electronic device that
receives a signal and retransmits it at a higher level and/or higher power, or onto the other
side of an obstruction, so that the signal can cover longer distances. Repeater have two
ports, so cannot be use to connect for more than two devices

Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator
is a device for connecting multiple twisted pair or fiber optic Ethernet devices together
and making them act as a single network segment. Hubs work at the physical layer
(layer 1) of the OSI model. The device is a form of multiport repeater. Repeater hubs
also participate in collision detection, forwarding a jam signal to all ports if it detects a
collision.

Switch: A network switch or switching hub is a computer networking device that connects
network segments. The term commonly refers to a network bridge that processes and routes
data at the data link layer (layer 2) of the OSI model. Switches that additionally process data
at the network layer (layer 3 and above) are often referred to as Layer 3 switches or
multilayer switches.

Bridge: A network bridge connects multiple network segments at the data link layer (Layer
2) of the OSI model. In Ethernet networks, the term bridge formally means a device
that behaves according to the IEEE 802.1D standard. A bridge and switch are very
much alike; a switch being a bridge with numerous ports. Switch or Layer 2 switch is
often used interchangeably with bridge .Bridges can analyze incoming data packets
to determine if the bridge is able to send the given packet to another segment of the network.
Router: A router is an electronic device that interconnects two or more computer networks,
and selectively interchanges packets of data between them. Each data packet contains
address information that a router can use to determine if the source and destination are on
the same network, or if the data packet must be transferred from one network to another.
Where multiple routers are used in a large collection of interconnected networks, the routers
exchange information about target system addresses, so that each router can build up a
table showing the preferred paths between any two systems on the interconnected networks.
Gate Way: In a communications network, a network node equipped for interfacing with
another network that uses different protocols.

• A gateway may contain devices such as protocol translators, impedance


matching devices, rate converters, fault isolators, or signal translators as necessary
to provide system interoperability. It also requires the establishment of mutually
acceptable administrative procedures between both networks.

• A protocol translation/mapping gateway interconnects networks with different network


protocol technologies by performing the required protocol conversions.
Experiment – 3

Aim:- Study of network IP


• Classification of IP address
• Sub netting
• Super netting

Apparatus (Software): NA
Procedure: Following is required to be study under this practical.

CLASSIFICATION OF IP ADDRESS

Fig1. Classification of IP addresses and their uses


Class Address Range Supports
Class A 1.0.0.1 to 126.255.255.254 Supports 16 million hosts on each of 127 networks.
Class B 128.1.0.1 to 191.255.255.254 Supports 65,000 hosts on each of 16,000 networks.
Class C 192.0.1.1 to 223.255.254.254 Supports 254 hosts on each of 2 million networks.
Class D 224.0.0.0 to 239.255.255.255 Reserved for multicast groups.
Class E 240.0.0.0 to 254.255.255.254 Reserved.

SUB NETTING
When a bigger network is divided into smaller networks, in order to maintain
s security, then that is known as Subnetting.

 To divide a network into four (22) parts you need to choose two bits from host id part
for each subnet i.e, (00, 01, 10, 11).

 To divide a network into eight (23) parts you need to choose three bits from host id
part for each subnet i.e, (000, 001, 010, 011, 100, 101, 110, 111) and so on.

SUPER NETTING
Supernetting is the opposite of Subnetting. In subnetting, a single big network is
Divided into multiple smaller subnetworks. In Supernetting, multiple networks
are combined into a bigger network termed as a Supernetwork or
Supernet. Supernetting is used to reduce the size of the IP routing table to
improve network routing efficiency.
Experiment – 4
Aim:- To study the IDE of Cisco Packet Tracer.
Theory:-

This bar provides the File, Edit, Options, View, Tools,


1. Menu Bar Extensions, and Help menus. You will find basic
commands such as Open, Save, Save as Pkz, Print, and
Settings and Preferences in these menus. You will also
be able to access the Activity Wizard from the Extensions
menu.

This bar provides shortcut icons to the File and Edit


menu commands. This bar also provides buttons for Copy,
2. Main Tool Bar Paste, Undo, Redo, Zoom, the Drawing Palette, and the
Custom Devices Dialog. On the right, you will also find
the Network Information button, which you can use to enter
a description for the current network (or any text you wish
to include).

This bar provides access to these commonly used


3. Common Tools Bar workspace tools: Select, Move Layout, Place Note, Delete,
Inspect, Resize Shape, Add Simple PDU, and Add Complex
PDU. See "Workspace Basics" for more information.

You can toggle between the Physical Workspace and the


Logical Workspace with the tabs on this bar. In
Logical/Physical Logical Workspace, this bar also allows you to go back to
4. Workspace a previous level in a cluster, create a New Cluster, Move
Object, Set Tiled Background, and Viewport. In
Physical Workspace, this bar allows you to navigate
through physical locations, create a New City, create a
New Building, create a New Closet, MoveObject, apply a Grid
to the background, Set Background, and go to the Working
Closet.

5. Workspace This area is where you will create your network, watch
simulations, and view many kinds of information and statistics.

You can toggle between Realtime Mode and Simulation Mode


with the tabs on this bar. This bar also provides buttons to
6. Realtime/Simulation Power Cycle Devices and Fast Forward Time as well as the
Bar Play Control buttons and the Event List toggle button in
Simulation Mode. Also, it contains a clock that displays the
relative Time in Realtime Mode and Simulation Mode.
This box is where you choose devices and connections to put
7. Network into the workspace. It contains the Device-Type Selection Box
Component Box and the Device- Specific Selection Box. There's a searchable
field that allows you to enter a device name to look for that
specific devicequickly. Device name shows when you mouse
over the device icon in the Device-Specific Box.

8. Device-Type This box contains the type of devices and connections available
Selection Box in Packet Tracer. The Device-Specific Selection Box will
change depending on which type of device you choose.

This box is where you choose specifically which devices you


9. Device-Specific want to put in your network and which connections to make. In
Selection Box this box, you'll find devices that may have already been
obsolete. You have an option to hide legacy equipment in the
Preferences window under Options.

10. User Created This window manages the packets you put in the network during
Packet simulation scenarios. See the "Simulation Mode" section for
Window* more details.

Packet Tracer supports a wide range of network connections. Each cable


type can only be connected to certain interface types.

Cable Type Description

Console connections can be made between PCs and routers or switches. Certain
conditions must be met for the console session from the PC to work: the speed on
Console
both sides of the connection must be the same, the data bits must be 7 for both or 8
for both, the parity must be the same, the stop bits must be 1 or 2 (but they do not
have to be the same), and the flow control can be anything for either side.

This cable type is the standard Ethernet media for connecting between devices that
operate at different OSI layers (such as hub to router, switch to PC, and router to hub).
Copper
It can be connected to the following port types: 10 Mbps Copper (Ethernet), 100 Mbps
Straight-
Copper (Fast Ethernet), and 1000 Mbps Copper (Gigabit Ethernet).
through

This cable type is the Ethernet media for connecting between devices that operate at
the same OSI layer (such as hub to hub, PC to PC, PC to printer). It can be connected
Copper Cross-
to the following port types: 10 Mbps Copper (Ethernet), 100 Mbps Copper (Fast
over Ethernet), and 1000 Mbps Copper (Gigabit Ethernet).
Fiber Fiber media is used to make connections between fiber ports (100 Mbps or 1000
Mbps).

Phone Phone line connections can only be made between devices with modem ports. The
standard application for modem connections is an end device (such as a PC) dialing
into a network cloud.

Coaxial Coaxial media is used to make connections between coaxial ports such as a cable
modem connected to a Packet Tracer Cloud.

Serial DCE Serial connections, often used for WAN links, must be connected between serial ports.
Note that you must enable clocking on the DCE side to bring up the line protocol. The
and DTE DTE clocking is optional. You can tell which end of the connection is the DCE side
by the small “clock” icon next to the port. If you choose the Serial DCE connection
type and then connect two devices, the first device will be the DCE side and the second
device will be automatically set to the DTE side. The reverse is true if you choose the
Serial DTE connection type.

Octal The 8-port asynchronous cable provides the high-density connector on one end
and eight RJ-45 plugs on the other.

IoE A cable for connecting Things, components, microcontrollers (MCU-PT), and single
Custom board computers (SBC-PT). The cable bundles the ground, power, and data wires.
Cable

USB USB cable used for connecting Things, components, microcontrollers (MCU-PT),
and single board computers (SBC-PT) as a data connection.
Experiment-5

Aim: Study of basic network command and Network configuration commands.


Apparatus (Software): Command Prompt and Packet Tracer.
Procedure: To do this EXPERIMENT- follows these steps:
In this EXPERIMENT- students have to understand basic networking commands e.g
ping, tracert etc. and all commands related to Network configuration which includes how
to switch to privilege mode and normal mode and how to configure router interface and
how to save this configuration to flash memory or permanent memory.
These commands include:
Ping:

Configuring the Router commands


General Commands to configure network
Privileged Mode commands of a router
Router Processes & Statistics
IP Commands
Other IP Commands e.g. show ip route etc.

Traceroute: Tracert is a command which can show you the path a packet of information
takes from your computer to one you specify. It will list all the routers it passes through
until it reaches its destination, or fails to and is discarded. In addition to this, it will tell you
how long each 'hop' from router to router takes.
nslookup:
Displays information from Domain Name System (DNS) name servers.
NOTE: If you write the command as above it shows as default your pc's server name firstly.

pathping:
A better version of tracert that gives you statics about packet lost and latency.
Getting Help

In any command mode, you can get a list of available commands by entering a

question mark (?). Router>?


To obtain a list of commands that begin with a particular character sequence, type in those
haracters
followed immediately by the question mark (?).

Router#co?
configure connect copy
To list keywords or arguments, enter a question mark in place of a keyword or argument.
Include a space before the question mark.

Router#configure ?
memory Configure from NV memory network Configure from a TFTP network host terminal
Configure from the terminal

You can also abbreviate commands and keywords by entering just enough characters to
make the command unique from other commands. For example, you can abbreviate the
show command to sh.

Configuration Files

Any time you make changes to the router configuration, you must save the changes
to memory because if you do not they will be lost if there is a system reload or power
outage. There are two types of configuration files: the running (current operating)
configuration and the startup configuration.
Use the following privileged mode commands to work with configuration files.
Experiment -6
Aim: To study the PC to PC communication.
Theory:
Communication between two or more computer systems is achieved by setting up a
network. The computer systems are linked so that they can ‗talk‘ to each other, share
computing power and/or storage facilities.
The link may be between computers in one building, or it could be between computers in
different parts of the world. The term network includes the individual computer systems, the
connections and the hardware that allows communication to happen.
A network may include a dedicated file server. This is normally one computer in the network
that has a much higher specification than the others, with a very large hard disk drive. All
data common to the network will be held on the dedicated server. It will also monitor and
control the network and while it is performing this very important task, it will not be available
for use as an interactive work station.

Procedure:
Start the Packet Tracer.

Select ―End Devices‖ and then click at ―Generic‖ and click at workspace to see the
PC.Repeat the process to place as many PCs as we want.

Choose the ―Hub‖ and select ―Generic‖. After selecting it, click on the main area.

Select ―Connections‖ from Power Cycle Devices and click on the wire to form a
connection.

Draw connections from Hub to Pcs.

Double click on a PC, a box will appear, Click on the ―Desktop‖ tab.

Then select ―IP configuration‖.

Write the IP address of the network and click at Subnet Mask filed. Subnet Mask will
appear automatically.

Repeat Step 8 to set IPs for all the PCs.

Select ―Add simple message‖.

Drag and Drop the message to the source device and then to the Destination device.

Select the Simulation Mode at the bottom right corner.

Click at ―Auto Capture/Play‖.

Observe the path of the Message from Source to Hub, then to all devices. And then from
Destination to Hub then back to the Source.

Finally observe the marks. If the Pc is marked correct it means we have successfully
established the connection.
Findings and Discussion:
Since communication has very important role in society as well as organisation or enterprises it
is necessary that we should have an accurate and fast method for communication. Here we
need computers to provide fast and efficiency manner for communication.

Now we have mobile phones, e-mails, fax and other many methods for providing good way to
communicate each other which cannot develop and work without computers. Let us take
the working of of an organisation. The communication between each and every level, between
two or more organisations are carrying through computers. If there are no computers it should
cause big wastage of time may cause wastage of data and so many other things.

Likewise, computer-based communication is necessary at every field whether it is hospitals or


industry or government. Without computers there may be large wastage of time, money and
resources which may cause great damages. Hence computer is necessary in communication
and without that it is impossible to provide a best way that fulfills the present requirements.

Result:
Connection established successfully between Source and Destination.
Experiment -7

Aim: To study to create a Star topology using Hub and Switch and differentiate between
Switch and Hub.
Theory:
Star topology is one of the most common network setups. In this configuration, every node
connects to a central network device, like a hub, switch, or computer. The central network
device acts as a server and the peripheral devices act as clients. All the data on the star
topology passes through the central device before reaching the intended destination. Hub
acts as a junction to connect different nodes present in Star Network, and at the same time it
manages and controls whole of the network. Depending on which central device is used,
―hub‖ can act as repeater or signal booster. Central device can also communicate with other
hubs of different network.

Hubs vs Switches:
Hubs and Switches are two terms that are used interchangeably when referring to the
network component that connects all the nodes in network. Even if most devices in
existence today are switches, most people still call them hubs and get away with it. The
difference between the two types of devices is the overall speed that they can broadcast
data across the network. Switches are able to transmit data a lot faster compared to hubs.
Hubs are very simplistic devices that accept a single data packet then sends it out to all the
computers that are connected to it. This means that only one data packet can pass through
the hub at a time and all the data must wait for its turn. The overall bandwidth of the router is
then shared by all the computers and that degrades the speed. This method often leads to a
collision of data where a computer tries to send a packet of data to the hub while it is
broadcasting. In order to detect and correct such collisions, most hubs employ added
hardware that could slow down the total speed even more; an additional effect that it has is
the limit on the number of elements you can have on your network.
Switches do not broadcast the data to all the computers in the network. Whenever a computer
wishes to connect to another computer, the internal circuitry of the switch creates a bridge
between the two; very comparable to old telephone operators who operate switchboards. This
means that multiple paths can exist in the switch at the same time, making it possible for
computers to send data at full speed regardless of what other network elements are doing.
Collisions do not happen on switches; this lifts the speed and element limits seen on hubs.

Procedure:
Using Switch:-

Start the Packet Tracer.

Select ―End Devices‖ and then click at ―Generic‖ and click at workspace to see the PC
Repeat the process to place as many PCs as we want.

Choose the ―Switches‖ and select ―Generic‖. After selecting it, click on the main area.

Select ―Connections‖ from Power Cycle Devices and click on the


Draw connections from Hub to Pcs.

Set the IP address of all the devices connected to the Hub.

Select ―Add simple message‖.

Drag and Drop the message to the source device and then to the Destination device.

Using Hub :-

Start the Packet Tracer.

Select ―End Devices‖ and then click at ―Generic‖ and click at workspace to see the
PC.Repeat the process to place as many PCs as we want.

Choose the ―Switch‖ and select ―Generic‖. After selecting it, click on the main area.

Select ―Connections‖ from Power Cycle Devices and click on the

Draw connections from Hub to Pcs.

Set the IP address of all the devices connected to the Hub.

Select ―Add simple message‖.

Drag and Drop the message to the source device and then to the Destination device.

Findings and Discussion:

 Advantages of star topology -


Centralized management of the network, through the use of the central computer, hub, or
switch.
Easy to add another computer to the network.
If one computer on the network fails, the rest of the network continues to function.

 Disadvantages of star topology -


May have a higher cost to implement, especially when using a switch or router as the
central network device.
The central network device determines the performance and number of nodes the network
can handle. If the central computer, hub, or switch fails, the entire network goes down and
all computers are disconnected from the network.
Fig.1 Star Topology using Switch

Fig.2 Star Topology using Hub


Result:
Studied creating a Star topology using Hub and Switch and differentiating between Switch
and Hub.
Experiment -8
Aim: To create Bus, Ring, Tree, Hybrid, Mesh topologies.
Theory:
Topology is basically a map of a network. The physical topology of a network describes the
layout of the cables and workstations and the location of all network components. it refers to
the interconnected structure of a local area network (LAN). The method employed to connect
the physical devices on the network with the cables, and the type of cabling used, all
constitute the physical topology. This contrasts with logical topology, which describes a
network's media signal performance and how it exchanges device data.
The various Physical topologies are:
1. Bus Topology
In a bus topology, all computers are attached to a single continuous cable that is terminated at
both ends, which is the simplest way to create a physical network. Originally, computers were
attached to the cable with wire taps. This did not prove practical, so drop cables were used to
attach computers to the main cable. In 10Base-2 Ethernet, no drop cables are used, but
instead, a ―T‖ is inserted in the main cable wherever a station needs to connect.
2. Ring Topology
In the ring topology, each computer is connected directly to two other computers in the
network. Data moves down a one-way path from one computer to another. The good news
about laying out cable in a ring is that the cable design is simple. The bad news is that, as
with bus topology, any break, such as adding or removing a computer, disrupts the entire
network.
3. Mesh Topology
In a mesh topology, a path exists from each station to every other station in the network,
resulting in the most physical connections per node of any topology. While not usually seen
in LANs, a variation on this type of topology—the hybrid mesh—is used on the Internet and
other WANs in a limited fashion. Hybrid mesh topology networks can have multiple
connections between some locations, but this is done only for redundancy. In addition, it‘s
called a hybrid because other types of topologies might be mixed in as well.
4. Tree Topology
In a tree topology, is a special type of structure in which many connected elements are arranged
like the branches of a tree. For example, tree topologies are frequently used to organize the
computers in a corporate network, or the information in a database.
In a tree topology, there can be only one connection between any two connected nodes.
Because any two nodes can have only one mutual connection, tree topologies form a natural
parent and child hierarchy.
5. Hybrid Topology
In a hybrid topology, it uses a combination of any two or more topologies in such a way that
the resulting network does not exhibit one of the standard topologies (e.g., bus, star, ring,
etc.). For example, a tree network connected to a tree network is still a tree network, but two-
star networks connected together exhibit a hybrid network topology. A hybrid topology is
always produced when two different basic network topologies are connected.
Procedure:
For Bus topology:
 Start the Packet Tracer.
 Select ―End Devices‖ and then click at ―Generic‖ and click at workspace to see the PC.
Repeat the process to place as many PCs as we want.
 Choose the ―Hub‖ and select ―Generic‖. After selecting it, click on the main area. Repeat
the process to place as many Hubs we want.
 Select ―Connections‖ from Power Cycle Devices and click on the wire to form connections
 Draw connections from Hub to Pcs by connecting all Hubs in a straight line and
connecting devices to them.
 Set the IP address of all the devices connected to the Hub.
 Select ―Add simple message‖.
 Drag and Drop the message to the source device and then to the Destination device.

Fig.1 Bus Topology

For Ring topology:


 Start the Packet Tracer.
 Select ―End Devices‖ and then click at ―Generic‖ and click at workspace to see the PC.
Repeat the process to place as many PCs as we want.
 Choose the ―Hub‖ and select ―Generic‖. After selecting it, click on the main area. Repeat
the process to place as many Hubs we want.
 Select ―Connections‖ from Power Cycle Devices and click on the wires to form a connection
 Draw connections from Hub to Pcs by connecting all the Hubs/Switches in form of a ring
and then connecting the devices to them
 Set the IP address of all the devices connected to the Hub.
 Select ―Add simple message‖.
 Drag and Drop the message to the source device and then to the Destination device.
Fig.2 Ring Topology

For Mesh topology:

 Start the Packet Tracer.


 Select ―End Devices‖ and then click at ―Generic‖ and click at workspace to see the PC.
Repeat the process to place as many PCs as we want.
 Choose the ―Hub‖ and select ―Generic‖. After selecting it, click on the main area. Repeat
the process to place as many Hubs we want.
 Select ―Connections‖ from Power Cycle Devices and click on the wires to form a
connection.
 Draw connections from Hub to Pcs by interconnecting all the Hubs/Switches with each
other and then connecting the devices to them.
 Set the IP address of all the devices connected to the Hub.
 Select ―Add simple message‖.
 Drag and Drop the message to the source device and then to the Destination device.

Fig.3 Mesh Topology


For Tree topology:

 Start the Packet Tracer.


 Select ―End Devices‖ and then click at ―Generic‖ and click at workspace to see the PC.
Repeat the process to place as many PCs as we want.
 Choose the ―Hub‖ and select ―Generic‖. After selecting it, click on the main area. Repeat
the process to place as many Hubs we want.
 Select ―Connections‖ from Power Cycle Devices and click on the wires to form a
connection.
 Draw connections from Hub to Pcs by connecting all Hubs/Switches in form of a
hierarchical tree with a root Hub/Switch at top and then further dividing in others and
connecting Pcs to them.
 Set the IP address of all the devices connected to the Hub.
 Select ―Add simple message‖.
 Drag and Drop the message to the source device and then to the Destination device.

Fig.4 Tree Topology

For Hybrid topology:

 Start the Packet Tracer.


 Select ―End Devices‖ and then click at ―Generic‖ and click at workspace to see the PC.
Repeat the process to place as many PCs as we want.
 Choose the ―Hub‖ and select ―Generic‖. After selecting it, click on the main area. Repeat
the process to place as many Hubs we want.
 Select ―Connections‖ from Power Cycle Devices and click on the
 Draw connections from Hub to Pcs by combining Hubs/Switches in a star topology with
bus topology and connecting Pcs to them.
 Set the IP address of all the devices connected to the Hub.
 Select ―Add simple message‖.
 Drag and Drop the message to the source device and then to the Destination device.
Fig.5 Hybrid Topology

Findings and Discussion:


The physical topology of a network directly affects its capabilities. The choice of
one topology over another will have an impact on the following:

● Type of equipment the network needs


● Capabilities of the equipment
● Growth of the network
● The way the network is managed

Before computers can either share resources or perform other communications


tasks, they must be connected. Most networks use cable to connect one
computer to another. It is not as simple as just plugging a computer into a cable
connecting other computers. There are many different types of cable, network
cards, network operating systems, and other components, all of which require
different types of arrangements.

Result: Studied about the bus, ring, mesh, tree, hybrid topologies and making connections
among them successfully.
ExperiMent-9
Aim: Performing an Initial Switch Configuration
Topology Diagram:

Objectives:
 Perform an initial configuration of a Cisco Catalyst 2960 switch.

Background/Preparation:
In this activity, you will configure these settings on the customer Cisco Catalyst 2960 switch:
 Host name
 Console password
 vty password
 Privileged EXEC mode password
 Privileged EXEC mode secret
 IP address on VLAN1 interface
 Default gateway

Procedure:
Step-1: Configure the switch host name.
 Fromthe Customer PC, use a console cable and terminal emulation software to
connect to the console of the customer Cisco Catalyst 2960 switch.
 Set the host name on the switch to CustomerSwitch using these
commands. Switch>enable
 Switch#configure terminal
 Switch(config)#hostname CustomerSwitch

Step-2: Configure the privileged mode password and secret.


 From global configuration mode, configure the password as cisco.
 CustomerSwitch(config)#enable password cisco
 From global configuration mode, configure the secret password as cisco123.
 CustomerSwitch(config)#enable secret cisco123

Step-3: Configure the console password.


 From global configuration mode, switch to configuration mode to configure the
console line. CustomerSwitch(config)#line console 0
 From the line configuration mode, set the password to cisco and require the password
to be entered at login.
 CustomerSwitch(config-
line)#password cisco
CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit

Step-4: Configure the vty password.


 From global configuration mode, switch to configuration mode for the vty lines 0
through 15. CustomerSwitch(config)#line vty 0 15
 From the line configuration mode, set the password to cisco and require the password
to be entered at login.
 CustomerSwitch(config-
line)#password cisco
CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit

Step-5: Configure an IP address on interface VLAN1.


From global configuration mode, switch to interface configuration mode for VLAN1, and
assign the IP address 192.168.1.5 with the subnet mask of 255.255.255.0
 CustomerSwitch(config)#interface vlan 1
 CustomerSwitch(config)#ip address 192.168.1.5 255.255.255.0
 CustomerSwitch(config)#no shutdown
 CustomerSwitch(config-if)#exit
Step-6: Configure the default gateway.

 From global configuration, assign the default gateway to 192.168.1.1.


 CustomerSwitch(config)#ip default-gateway 192.168.1.1
 Click the Check Results button at the bottom of this instruction window to check your work.

Step-7: Verify the configuration.


The customer switch should now be able to ping the ISP Server at 209.165.201.10. The first
one or two pings may fail while ARP converges.
 CustomerSwitch(config)#end
CustomerSwitch#ping
209.165.201.10
Experiment-10
Aim: Performing an Initial Router Configuration
Topology Diagram:

Objectives:
 Configure the router host name.
 Configure passwords.
 Configure banner messages.
 Verify the router configuration.

Background/Preparation
In this activity, you will use the Cisco IOS CLI to apply an initial configuration to a
router, including host name, passwords, a message-of-the-day (MOTD) banner,
and other basic settings.

Procedure:

Step 1: Configure the router host name.


 1-On Customer PC, use the terminal emulation software to connect to the console
of the customer Cisco 1841 ISR.
 Set the host name on the router to CustomerRouter by using these commands.
Router>enable
 Router#configure terminal Router(config)#hostname CustomerRouter

Step 2: Configure the privileged mode and secret passwords.


 1-In global configuration mode, set the password to cisco.
 CustomerRouter(config)#enable password cisco
 Set an encrypted privileged password to cisco123 using the secret
command.
 CustomerRouter(config)#enable secret cisco123

Step 3: Configure the console password.


 1-In global configuration mode, switch to line configuration mode to
specify the console line.
 CustomerRouter(config)#line console 0
 Set the password to cisco123, require that the password be entered at
login, and then exit line configuration mode.

 CustomerRouter(config-line)#password cisco123 CustomerRouter(config-


line)#login CustomerRouter(config-line)#exit CustomerRouter(config)#

Step 4: Configure the vty password to allow Telnet access to the router.
 1-In global configuration mode, switch to line configuration mode to
specify the vty lines.
 CustomerRouter(config)#line vty 0 4
 Set the password to cisco123, require that the password be entered at
login, exit line configuration mode, and then exit the configuration session.

 CustomerRouter(config-line)#password cisco123 CustomerRouter(config-


line)#login CustomerRouter(config-line)#exit CustomerRouter(config)#

Step 5: Configure password encryption, a MOTD banner, and turn off domain
server lookup.
 Currently, the line passwords and the enable password are shown in clear
text when you showthe running configuration. Verify this now by entering
the show running-config command.
 To avoid the security risk of someone looking over your shoulder and
reading the passwords, encrypt all clear text passwords.
 CustomerRouter(config)#service password-encryption
 Use the show running-config command again to verify that the passwords
are encrypted.
 To provide a warning when someone attempts to log in to the router,
configure a MOTD banner.
 CustomerRouter(config)#banner motd $Authorized Access Only!$
 Test the banner and passwords. Log out of the router by typing the exit
command twice. The banner displays before the prompt for a password.
Enter the password to log back into the router.
 You may have noticed that when you enter a command incorrectly at the
user or privileged EXEC prompt, the router pauses while trying to locate
an IP address for the mistyped word you entered.

For example, this output shows what happens when the enable command is
mistyped.

CustomerRouter>emable
Translating "emable"...domain server (255.255.255.255)
To prevent this from happening, use the following command to stop all DNS
lookups from the router CLI.
CustomerRouter(config)#no ip domain-lookup
Save the running configuration to the startup configuration.

CustomerRouter(config)#end CustomerRouter#copy run start

Step 6: Verify the configuration.


 Log out of your terminal session with the Cisco 1841 customer router.
 Log in to the Cisco 1841 Customer Router. Enter the console password
when prompted.
 Navigate to privileged EXEC mode. Enter the privileged EXEC password
when prompted.
 Click the Check Results button at the bottom of this instruction window to
check your work.
ExperimEnt-11
Aim: To implement Client Server Network.
Theory:
A Computer networking model where one or more powerful computers (servers)
provide the different computer network services and all other user'of computer
network (clients) access those services to perform user's tasks is known as
client/server computer networking model. In such networks, there exists a central
controller called server. A server is a specialized computer that controls the
network resources and provides services to other computers in the network.All
other computers in the network are called clients. A client computer receives the
requested services from a server.A server performs all the major operations like
security and network management.All the clients communicate with each other via
centralized server.
In a small network generally, there stays one server and one and more clients.
Desktop PCs or Laptop PCs can be used as client. The client generally request
service from the server and server serves that request as per requested. The
server can be different types like web server, mail server, DNS server, File
transfer server or file server, or file server etc. types.
Procedure:
Start the Packet Tracer.

Select ―End Devices‖ and then click at ―Generic‖ and click at workspace to
see the PC.Repeat the process to place as many PCs as we want.

Choose the ―Switch‖ and select ―2950-24‖ as well as ―Generic‖ from ―End
Devices‖. After selecting it, click on the main area.

Select ―Connections‖ from Power Cycle Devices and click on the wire to
form a connection.

Now go to Server -> Config -> FastEthernet0 ->Static. IP Address –


192.168.1.1 Subnet Mask – 255.255.255.0 Status – on

Now go to Services -> DHCP -> Service on‘ Default Gateway –


192.168.1.1 Start IP – 192.168.1.101

Subnet Mask – 255.255.255.0 Maximum no. of users – 24 Then click on


Save

now go to Config -> Global Settings Gateway – 192.168.1.1

now go to all the PCs ->Desktop -> IP config -> DHCP(.)

Result;
Impementation of Client Serve Network done.
Findings and Disscussion:
Advantages of Client Server Networks
 Centralized back up is possible.
 Use of dedicated server improves the performance of whole system.
 Security is better in these networks as all the shared resources are centrally administered.
 Use of dedicated servers also increases the speed of sharing resources.

Disadvantages of Client Server Networks


 It requires specialized servers with large memory and secondary storage. This leads to
increase in the cost.
 The cost of network operating system that manages the various clients is also high.
 It requires dedicated network administrator.
Experiment-12
Aim: To implement connection between devices
using router.

Software Required: CISCO Packet Tracer.


Procedure:
 We need two PCB, a router and two crossover cable to connect them. We use cross over
cable to connect PC to a router because they both use the same pins for transmission and
receiving of data.
 Now, we will connect them by selecting fast ethernet interfaces on
both ends. Similarly, on the PC side, we will select fast ethernet
interface.
 Now, we have connected the devices. Further We will go to the router CLI mode and enter
the following commands-
a) Access interface one by one.
b) B- Assign IP addresses to interfaces.
c) Change the status of the interfaces i.e. from down to up.
d) Assign IP addresses to PC‘s.
e) Assign default gateway. To PCs.

 Now we have accessed both interfaces one by one and we have assigned IP
address respectively. 5-It can be sent that lengths have changed the colour from red
to green.
 Green colour indicates that connection has been established and any data can be sent
from source to destination.
 Select the message and put it on the source.
 Now, our communication is enabled and we are able to communicate from PC0 to
PC1 via router. 9- Once all the connection setup click on the simulation icon.

Result:
The connection is setup between the devices through router.
@ Cisco Packet Tracer Student

Logical Ne w CIuster

PC-W
PCO

Realtime
" Scenario 0

D elete

‖ Tag gle PDU List W in da w

P C0 — a x
Physical Config Desktop Custom Interface

IP Configuration
O DHCP Satic
IP Address 191168.1.1
Eiubnet I task 2S S , 2S S , 2SS , 0
Default Gateway 192 1s8 1.2
DNg gerver

IPv6 Configuration
Q DHCP Q Auto Config O• Static
IPv6 Address
Link Local Address FE8o: : 2og : zCFF : FECS : E38B
IPV6 Gateway

IPV6 DNS Server


Experiment-13
Aim: To perform remote desktop sharing withing LAN
connection.

Steps:
 Making the system available for remote desktop connection:

 Go to My Computer
settings.

 2- Click Remote
settings.
 Select allow Remote Assistance connections to the computer.
 Select allow connections only from computers running remote desktop with network level
authentication. 5- Click apply and then OK.

 Remote desktop sharing:

 Click start and select all


programs. 2- Search and
select accessories.
 Select remote desktop Connections.
 Enter Local ID : The system IP address we want
to connect.

Eg- \\\ 10.12.11.35 and then select connect.


After Remote Desktop Connection has been established , the system of other IP address to which
connection has been made will be log out automatically.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy