Ankush DCN
Ankush DCN
14
.
Experiment-1
Aim: Study of different types of Network cables and practically implement the cross-wired
cable and straight through cable using clamping tool.
Apparatus (Components): RJ-45 connector, Crimping Tool, Twisted pair Cable
Procedure: To do this practical, following steps should be done:
Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be very
careful at this point, as to not nick or cut into the wires, which are inside. Doing so could alter
the characteristics of your cable, or even worse render is useless. Check the wires, one more
time for nicks or cuts. If there are any, just whack the whole end off, and start over.
Spread the wires apart, but be sure to hold onto the base of the jacket with your other hand.
You do not want the wires to become untwisted down inside the jacket. Category 5 cable
must only have 1/2 of an inch of 'untwisted' wire at the end; otherwise, it will be 'out of spec'.
At this point, you obviously have ALOT more than 1/2 of an inch of un-twisted wire.
You have 2 end jacks, which must be installed on your cable. If you are using a pre-made
cable, with one of the ends whacked off, you only have one end to install - the crossed over
end. Below are two diagrams, which show how you need to arrange the cables for each type
of cable end. Decide at this point which end you are making and examine the associated
picture below.
Hub: An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator
is a device for connecting multiple twisted pair or fiber optic Ethernet devices together
and making them act as a single network segment. Hubs work at the physical layer
(layer 1) of the OSI model. The device is a form of multiport repeater. Repeater hubs
also participate in collision detection, forwarding a jam signal to all ports if it detects a
collision.
Switch: A network switch or switching hub is a computer networking device that connects
network segments. The term commonly refers to a network bridge that processes and routes
data at the data link layer (layer 2) of the OSI model. Switches that additionally process data
at the network layer (layer 3 and above) are often referred to as Layer 3 switches or
multilayer switches.
Bridge: A network bridge connects multiple network segments at the data link layer (Layer
2) of the OSI model. In Ethernet networks, the term bridge formally means a device
that behaves according to the IEEE 802.1D standard. A bridge and switch are very
much alike; a switch being a bridge with numerous ports. Switch or Layer 2 switch is
often used interchangeably with bridge .Bridges can analyze incoming data packets
to determine if the bridge is able to send the given packet to another segment of the network.
Router: A router is an electronic device that interconnects two or more computer networks,
and selectively interchanges packets of data between them. Each data packet contains
address information that a router can use to determine if the source and destination are on
the same network, or if the data packet must be transferred from one network to another.
Where multiple routers are used in a large collection of interconnected networks, the routers
exchange information about target system addresses, so that each router can build up a
table showing the preferred paths between any two systems on the interconnected networks.
Gate Way: In a communications network, a network node equipped for interfacing with
another network that uses different protocols.
Apparatus (Software): NA
Procedure: Following is required to be study under this practical.
CLASSIFICATION OF IP ADDRESS
SUB NETTING
When a bigger network is divided into smaller networks, in order to maintain
s security, then that is known as Subnetting.
To divide a network into four (22) parts you need to choose two bits from host id part
for each subnet i.e, (00, 01, 10, 11).
To divide a network into eight (23) parts you need to choose three bits from host id
part for each subnet i.e, (000, 001, 010, 011, 100, 101, 110, 111) and so on.
SUPER NETTING
Supernetting is the opposite of Subnetting. In subnetting, a single big network is
Divided into multiple smaller subnetworks. In Supernetting, multiple networks
are combined into a bigger network termed as a Supernetwork or
Supernet. Supernetting is used to reduce the size of the IP routing table to
improve network routing efficiency.
Experiment – 4
Aim:- To study the IDE of Cisco Packet Tracer.
Theory:-
5. Workspace This area is where you will create your network, watch
simulations, and view many kinds of information and statistics.
8. Device-Type This box contains the type of devices and connections available
Selection Box in Packet Tracer. The Device-Specific Selection Box will
change depending on which type of device you choose.
10. User Created This window manages the packets you put in the network during
Packet simulation scenarios. See the "Simulation Mode" section for
Window* more details.
Console connections can be made between PCs and routers or switches. Certain
conditions must be met for the console session from the PC to work: the speed on
Console
both sides of the connection must be the same, the data bits must be 7 for both or 8
for both, the parity must be the same, the stop bits must be 1 or 2 (but they do not
have to be the same), and the flow control can be anything for either side.
This cable type is the standard Ethernet media for connecting between devices that
operate at different OSI layers (such as hub to router, switch to PC, and router to hub).
Copper
It can be connected to the following port types: 10 Mbps Copper (Ethernet), 100 Mbps
Straight-
Copper (Fast Ethernet), and 1000 Mbps Copper (Gigabit Ethernet).
through
This cable type is the Ethernet media for connecting between devices that operate at
the same OSI layer (such as hub to hub, PC to PC, PC to printer). It can be connected
Copper Cross-
to the following port types: 10 Mbps Copper (Ethernet), 100 Mbps Copper (Fast
over Ethernet), and 1000 Mbps Copper (Gigabit Ethernet).
Fiber Fiber media is used to make connections between fiber ports (100 Mbps or 1000
Mbps).
Phone Phone line connections can only be made between devices with modem ports. The
standard application for modem connections is an end device (such as a PC) dialing
into a network cloud.
Coaxial Coaxial media is used to make connections between coaxial ports such as a cable
modem connected to a Packet Tracer Cloud.
Serial DCE Serial connections, often used for WAN links, must be connected between serial ports.
Note that you must enable clocking on the DCE side to bring up the line protocol. The
and DTE DTE clocking is optional. You can tell which end of the connection is the DCE side
by the small “clock” icon next to the port. If you choose the Serial DCE connection
type and then connect two devices, the first device will be the DCE side and the second
device will be automatically set to the DTE side. The reverse is true if you choose the
Serial DTE connection type.
Octal The 8-port asynchronous cable provides the high-density connector on one end
and eight RJ-45 plugs on the other.
IoE A cable for connecting Things, components, microcontrollers (MCU-PT), and single
Custom board computers (SBC-PT). The cable bundles the ground, power, and data wires.
Cable
USB USB cable used for connecting Things, components, microcontrollers (MCU-PT),
and single board computers (SBC-PT) as a data connection.
Experiment-5
Traceroute: Tracert is a command which can show you the path a packet of information
takes from your computer to one you specify. It will list all the routers it passes through
until it reaches its destination, or fails to and is discarded. In addition to this, it will tell you
how long each 'hop' from router to router takes.
nslookup:
Displays information from Domain Name System (DNS) name servers.
NOTE: If you write the command as above it shows as default your pc's server name firstly.
pathping:
A better version of tracert that gives you statics about packet lost and latency.
Getting Help
In any command mode, you can get a list of available commands by entering a
Router#co?
configure connect copy
To list keywords or arguments, enter a question mark in place of a keyword or argument.
Include a space before the question mark.
Router#configure ?
memory Configure from NV memory network Configure from a TFTP network host terminal
Configure from the terminal
You can also abbreviate commands and keywords by entering just enough characters to
make the command unique from other commands. For example, you can abbreviate the
show command to sh.
Configuration Files
Any time you make changes to the router configuration, you must save the changes
to memory because if you do not they will be lost if there is a system reload or power
outage. There are two types of configuration files: the running (current operating)
configuration and the startup configuration.
Use the following privileged mode commands to work with configuration files.
Experiment -6
Aim: To study the PC to PC communication.
Theory:
Communication between two or more computer systems is achieved by setting up a
network. The computer systems are linked so that they can ‗talk‘ to each other, share
computing power and/or storage facilities.
The link may be between computers in one building, or it could be between computers in
different parts of the world. The term network includes the individual computer systems, the
connections and the hardware that allows communication to happen.
A network may include a dedicated file server. This is normally one computer in the network
that has a much higher specification than the others, with a very large hard disk drive. All
data common to the network will be held on the dedicated server. It will also monitor and
control the network and while it is performing this very important task, it will not be available
for use as an interactive work station.
Procedure:
Start the Packet Tracer.
Select ―End Devices‖ and then click at ―Generic‖ and click at workspace to see the
PC.Repeat the process to place as many PCs as we want.
Choose the ―Hub‖ and select ―Generic‖. After selecting it, click on the main area.
Select ―Connections‖ from Power Cycle Devices and click on the wire to form a
connection.
Double click on a PC, a box will appear, Click on the ―Desktop‖ tab.
Write the IP address of the network and click at Subnet Mask filed. Subnet Mask will
appear automatically.
Drag and Drop the message to the source device and then to the Destination device.
Observe the path of the Message from Source to Hub, then to all devices. And then from
Destination to Hub then back to the Source.
Finally observe the marks. If the Pc is marked correct it means we have successfully
established the connection.
Findings and Discussion:
Since communication has very important role in society as well as organisation or enterprises it
is necessary that we should have an accurate and fast method for communication. Here we
need computers to provide fast and efficiency manner for communication.
Now we have mobile phones, e-mails, fax and other many methods for providing good way to
communicate each other which cannot develop and work without computers. Let us take
the working of of an organisation. The communication between each and every level, between
two or more organisations are carrying through computers. If there are no computers it should
cause big wastage of time may cause wastage of data and so many other things.
Result:
Connection established successfully between Source and Destination.
Experiment -7
Aim: To study to create a Star topology using Hub and Switch and differentiate between
Switch and Hub.
Theory:
Star topology is one of the most common network setups. In this configuration, every node
connects to a central network device, like a hub, switch, or computer. The central network
device acts as a server and the peripheral devices act as clients. All the data on the star
topology passes through the central device before reaching the intended destination. Hub
acts as a junction to connect different nodes present in Star Network, and at the same time it
manages and controls whole of the network. Depending on which central device is used,
―hub‖ can act as repeater or signal booster. Central device can also communicate with other
hubs of different network.
Hubs vs Switches:
Hubs and Switches are two terms that are used interchangeably when referring to the
network component that connects all the nodes in network. Even if most devices in
existence today are switches, most people still call them hubs and get away with it. The
difference between the two types of devices is the overall speed that they can broadcast
data across the network. Switches are able to transmit data a lot faster compared to hubs.
Hubs are very simplistic devices that accept a single data packet then sends it out to all the
computers that are connected to it. This means that only one data packet can pass through
the hub at a time and all the data must wait for its turn. The overall bandwidth of the router is
then shared by all the computers and that degrades the speed. This method often leads to a
collision of data where a computer tries to send a packet of data to the hub while it is
broadcasting. In order to detect and correct such collisions, most hubs employ added
hardware that could slow down the total speed even more; an additional effect that it has is
the limit on the number of elements you can have on your network.
Switches do not broadcast the data to all the computers in the network. Whenever a computer
wishes to connect to another computer, the internal circuitry of the switch creates a bridge
between the two; very comparable to old telephone operators who operate switchboards. This
means that multiple paths can exist in the switch at the same time, making it possible for
computers to send data at full speed regardless of what other network elements are doing.
Collisions do not happen on switches; this lifts the speed and element limits seen on hubs.
Procedure:
Using Switch:-
Select ―End Devices‖ and then click at ―Generic‖ and click at workspace to see the PC
Repeat the process to place as many PCs as we want.
Choose the ―Switches‖ and select ―Generic‖. After selecting it, click on the main area.
Drag and Drop the message to the source device and then to the Destination device.
Using Hub :-
Select ―End Devices‖ and then click at ―Generic‖ and click at workspace to see the
PC.Repeat the process to place as many PCs as we want.
Choose the ―Switch‖ and select ―Generic‖. After selecting it, click on the main area.
Drag and Drop the message to the source device and then to the Destination device.
Result: Studied about the bus, ring, mesh, tree, hybrid topologies and making connections
among them successfully.
ExperiMent-9
Aim: Performing an Initial Switch Configuration
Topology Diagram:
Objectives:
Perform an initial configuration of a Cisco Catalyst 2960 switch.
Background/Preparation:
In this activity, you will configure these settings on the customer Cisco Catalyst 2960 switch:
Host name
Console password
vty password
Privileged EXEC mode password
Privileged EXEC mode secret
IP address on VLAN1 interface
Default gateway
Procedure:
Step-1: Configure the switch host name.
Fromthe Customer PC, use a console cable and terminal emulation software to
connect to the console of the customer Cisco Catalyst 2960 switch.
Set the host name on the switch to CustomerSwitch using these
commands. Switch>enable
Switch#configure terminal
Switch(config)#hostname CustomerSwitch
Objectives:
Configure the router host name.
Configure passwords.
Configure banner messages.
Verify the router configuration.
Background/Preparation
In this activity, you will use the Cisco IOS CLI to apply an initial configuration to a
router, including host name, passwords, a message-of-the-day (MOTD) banner,
and other basic settings.
Procedure:
Step 4: Configure the vty password to allow Telnet access to the router.
1-In global configuration mode, switch to line configuration mode to
specify the vty lines.
CustomerRouter(config)#line vty 0 4
Set the password to cisco123, require that the password be entered at
login, exit line configuration mode, and then exit the configuration session.
Step 5: Configure password encryption, a MOTD banner, and turn off domain
server lookup.
Currently, the line passwords and the enable password are shown in clear
text when you showthe running configuration. Verify this now by entering
the show running-config command.
To avoid the security risk of someone looking over your shoulder and
reading the passwords, encrypt all clear text passwords.
CustomerRouter(config)#service password-encryption
Use the show running-config command again to verify that the passwords
are encrypted.
To provide a warning when someone attempts to log in to the router,
configure a MOTD banner.
CustomerRouter(config)#banner motd $Authorized Access Only!$
Test the banner and passwords. Log out of the router by typing the exit
command twice. The banner displays before the prompt for a password.
Enter the password to log back into the router.
You may have noticed that when you enter a command incorrectly at the
user or privileged EXEC prompt, the router pauses while trying to locate
an IP address for the mistyped word you entered.
For example, this output shows what happens when the enable command is
mistyped.
CustomerRouter>emable
Translating "emable"...domain server (255.255.255.255)
To prevent this from happening, use the following command to stop all DNS
lookups from the router CLI.
CustomerRouter(config)#no ip domain-lookup
Save the running configuration to the startup configuration.
Select ―End Devices‖ and then click at ―Generic‖ and click at workspace to
see the PC.Repeat the process to place as many PCs as we want.
Choose the ―Switch‖ and select ―2950-24‖ as well as ―Generic‖ from ―End
Devices‖. After selecting it, click on the main area.
Select ―Connections‖ from Power Cycle Devices and click on the wire to
form a connection.
Result;
Impementation of Client Serve Network done.
Findings and Disscussion:
Advantages of Client Server Networks
Centralized back up is possible.
Use of dedicated server improves the performance of whole system.
Security is better in these networks as all the shared resources are centrally administered.
Use of dedicated servers also increases the speed of sharing resources.
Now we have accessed both interfaces one by one and we have assigned IP
address respectively. 5-It can be sent that lengths have changed the colour from red
to green.
Green colour indicates that connection has been established and any data can be sent
from source to destination.
Select the message and put it on the source.
Now, our communication is enabled and we are able to communicate from PC0 to
PC1 via router. 9- Once all the connection setup click on the simulation icon.
Result:
The connection is setup between the devices through router.
@ Cisco Packet Tracer Student
Logical Ne w CIuster
PC-W
PCO
Realtime
" Scenario 0
D elete
P C0 — a x
Physical Config Desktop Custom Interface
IP Configuration
O DHCP Satic
IP Address 191168.1.1
Eiubnet I task 2S S , 2S S , 2SS , 0
Default Gateway 192 1s8 1.2
DNg gerver
IPv6 Configuration
Q DHCP Q Auto Config O• Static
IPv6 Address
Link Local Address FE8o: : 2og : zCFF : FECS : E38B
IPV6 Gateway
Steps:
Making the system available for remote desktop connection:
Go to My Computer
settings.
2- Click Remote
settings.
Select allow Remote Assistance connections to the computer.
Select allow connections only from computers running remote desktop with network level
authentication. 5- Click apply and then OK.