Professional Documents
Culture Documents
Computer Communication and Networks Lab Manual
Computer Communication and Networks Lab Manual
Lab Manual
OBJECTIVE:
APPARATUS:
CAT 5 Cable - bulk Category 5, cable, RJ45 Ends, Crimper for RJ45, Wire Cutters - to
cut and strip the cable if necessary, Cable Tester.
THEORY:
RJ-45 Connectors:
The RJ45 end is a 8-position modular connector.
PROCEDURE:
2. Untwist the pairs - don't untwist them beyond what you have exposed
5. Insert the wires into the RJ45 end - make sure each wire is fully inserted to the
front of the RJ45 end and in the correct order.
6. Verify the wires ended up the right order and that the wires extend to the front of
the RJ45 end and make good contact with the metal contacts in the RJ45 end.
7. Crimp the RJ45 end with the crimper tool
8. Cut the cable to length - make sure it is more than long enough for your needs
RESULTS:
The cable tester verified that the wire was absolutely right.
EXPERIMENT NO. 02
OBJECTIVE:
APPARATUS:
THEORY:
Modem:
It is a computer peripheral that allows you to connect and communicate with other
computer via telephone line. Modem changes the digital data from your computer into
analog data, a format that can be carried over telephone lines. In the same way the
modem receiving the call then changes the analog signal back into digital data that the
computer can understand.
Ethernet card:
The type of Ethernet card given below is developed by Xerox Corp. along with DEC and
Intel. It uses a Bus or Star topology. Supports data transfer rates of up to 10 Mbps. It is
also called a LAN card. The address assigned to it is called a physical address. It is in a
48 bit address format. e.g. 0F.38.6E.55.4A.AE.
RJ-45 Connector:
The Registered Jack-45 connector is commonly used for network cabling and for
telephony applications. It is an eight wire connector which is commonly used to connect
computers on the local area networks, especially Ethernets. It is similar to telephone
connector RJ-11 except that it has eight wires as compared to 4 in RJ-11.
It is used to connect several computers together. In this network device the information
flow is accumulated and then distributed to various groups and users. It can be between
users on the same LAN and users on different LANs. It is often used in Star or Ring
topology. All the devices connected to a hub are said to be in the same collision domain.
Collision domain:
Two devices are said to be in the same collision domain if simultaneous transmission
from them results in a collision. In other words, being in the same collision domain, they
cannot transmit simultaneously.
Switch:
Bridges provide the ability to expand beyond a single LAN. Further they provide
interconnection to other LANs/WANs. Bridges are a simpler choice than routers to
connect similar LANs and are used with identical protocols for physical and link layers.
Repeater:
It is a device that amplifies and restores the power of a signal being transmitted on the
network. It is used in long network lines.
Router:
A router is a computer whose software and hardware are usually tailored to the tasks of
routing and forwarding. This device routes the information packet between two or more
physically or logically connected networks. It is different from Bridge as this uses logical
address while bridge uses physical address.
Broadcast Domain:
All devices on a network segment that hear all broadcasts sent on that segment are said to
be in the same broadcast domain. Routers break broadcast domains by default.
Router Advantages:
Gateway:
This device usually a server is used to communicate between dissimilar networks i.e.
networks with different protocols. e.g. to connect a LAN with Novell Netware with
another LAN with Microsoft NT. In enterprises, the gateway is the computer that routes
the traffic from the workstation to the outside world. In homes, the gateway is the ISP
that connects the user to the Internet.
RESULTS:
OBJECTIVE:
APPARATUS:
DIAGRAM:
Firstly, I launched boson simulator and designed a net-map consisting of two routers and
made a serial connection between them keeping router 1 as DCE. Then, I loaded the net-
map in to the simulator. After that I logged on to router 1 and pressed enter to get in to
user prompt:
Router>
The symbol (>) indicates that we are in the user mode. Now type (?) to see the list of
commands in the user mode:
Router>?
Type “enable” to get in to the privileged mode. The symbol (#) indicates that we are in
the privileged mode:
Router>enable
Router#
Now type (?) to see the list of commands in the user mode. Notice that there are more
commands in the privileged mode than the user mode.
Router#?
R1 (config)# ctrl ^ z
R1#
R1# disable
R1>
RESULTS:
OBJECTIVE:
APPARATUS:
DIAGRAM:
THEORY:
Firstly, I launched boson simulator and designed a net-map consisting of two routers and
made a serial connection between them keeping router 1 as DCE. Then, I loaded the net-
map in to the simulator. After that I logged on to router1 typed the following commands:
Router> enable
Router# config
Router (config)# hostname R1
R1 (config)# enable password boson
R1 (config)# enable secret cisco
(b) Setting up the banner motd
THEORY:
The “banner – message of the day” displays a message when logging in to a router.
Repeat the steps as in 4 (a), and then type the following command to set the banner.
R1 (config)#
The command followed by the z is displayed as message and end the message using the
letter z again.
(c) Using the copy command
THEORY:
The copy command is used to copy the running configuration to the start-up
configuration. Running configuration is where the configuration is being done and start-
up configuration is where the configuration would be in case of a power failure. The
former configuration is in the volatile RAM whereas the later configuration is in the Non-
volatile RAM.
Use the following commands to copy running configuration to the start-up configuration.
THEORY:
Repeat the steps as in 4 (a), and then type the following commands to configure the
interfaces:
R1:
R1 (config)# interface s0
R1 (config-if)# clock rate 64000
R1 (config-if)# no shut
Router> enable
Router# config
Router (config)# hostname R2
R2 (config)# interface s0
R2 (config-if)# no shut
RESULTS:
After this lab, I could successfully set enable passwords, set the banner motd, use the
copy command and configure interface as beginner level.
EXPERIMENT NO. 05
OBJECTIVE:
APPARATUS:
DIAGRAM:
THEORY:
Cisco Discovery Protocol (CDP) is a Data Link Layer Protocol and is used in Cisco
devices for neighbor discovery and knowing neighbor parameters. Two terms need to be
defined here:
Holdtime:
The time for which a router has to keep the update from a specific neighbor saved with it.
Timer:
The interval defined by the timer is the time after which the CDP packets should be sent
to keep CDP running.
Repeat the steps as in 4 (d), log onto R1 and type the following commands:
The above command shows the interfaces that broadcasting and receiving updates to and
from the neighbors respectively.
The above command gives detailed information of a specific router in case of multiple
routers connected to R1.
The above command shows the cdp holdtime and the timer settings for R1.
RESULTS:
I was able to learn what CDP is and all the commands were successfully run.
EXPERIMENT NO. 06
OBJECTIVE:
APPARATUS:
DIAGRAM:
THEORY:
Repeat the same steps at both routers until entrance in to the configuration mode. Then,
use the following commands:
At R1:
R1 (config)# interface s0
R1 (config-if)# ip address 172.16.1.3 255.255.0.0
R1 (config-if)# clock rate 64000
R1 (config-if)# no shut
At R2:
R2 (config)# interface s0
R2 (config-if)# ip address 172.16.1.4 255.255.0.0
R2 (config-if)# no shut
R1 # ping 172.16.1.4
Similarly you may go to R2 and PING R1 using its IP address:
R2 # ping 172.16.1.3
RESULTS:
I successfully assigned the IP addresses to the routers and was able to PING them
successfully from the other router.
EXPERIMENT NO. 07
OBJECTIVE:
APPARATUS:
DIAGRAM:
THEORY:
ARP is the Address Resolution Protocol which works as follows: When a packet arrives
at router, the router views the IP address and maps it to a specific MAC address. If the
routing table does not contain the MAC address of the destination machine, it broadcasts
an ARP query over the network. The addressed machine receives the ARP query and
responds with its MAC address back to the router so that it can send the packet to that
MAC address.
Connect Router 1 with Router 4 serially keeping Router 1as DCE and with Router 2
through Fast Ethernet. Repeat configuration steps as in the previous experiments till the
entrance in to configuration mode. Then go to all routers and type the following
commands:
At R1:
Configuring s0:
Configuring f0/0:
At R2:
At R4:
If the links are running, continue with the following command to view the ARP table:
Running this command will show the local IP and MAC address and the IP and MAC
addresses of the routers connected through the fast Ethernet port. Now, type “clear arp”
to delete the neighbor’s information from the ARP table.
RESULTS:
The links in the network were successfully enabled and ARP table was successfully
viewed and cleared.
EXPERIMENT NO. 08
OBJECTIVE:
APPARATUS:
DIAGRAM:
THEORY:
RIP is a distance-vector routing protocol in which the nodes learn about their directly
connected networks and using this information they are able to establish connectivity
with indirectly connected routers.
Repeat the procedure as in experiment no. 7, and then use the following commands to
make the routers about their directly connected networks.
At Router1:
At Router4:
Now go to Router2 and Router4 and check connectivity with Router4 and Router2
respectively.
RESULTS:
After making the routers learn about their directly connected networks, I was able to ping
indirectly connected routers.
EXPERIMENT NO. 09
OBJECTIVE:
APPARATUS:
DIAGRAM:
THEORY:
A VLAN is a LAN with in a LAN. These are required in large scale networks where
separating some of the nodes to create a separate domain with in a LAN is desired.
Router> enable
Router#
Router# config
Router (config)# hostname R1
R1 (config)# interface f0/0
R1 (config-if)# ip address 24.17.2.1 255.255.255.0
R1 (config-if)# no shut
Connect to PC-1 and set the IP address to 24.17.2.3/24 with router as the default gateway.
i.e. ip address 24.17.2.1.
C:>winipcfg
Connect to PC-2 and set the IP address to 24.17.2.4/24 with router as the default gateway.
i.e. ip address 24.17.2.1.
C:>winipcfg
Now, ping router and PC-1 from PC-2. The pings will be successful.
Now, connect to switch and set the VLAN up. Start by creating the VLAN.
>enable
#config t
(config)# VLAN 22 name pcs
Now, ping router and PC-1 from PC-2. The ping to router will be successful and the one
to PC-1 will be unsuccessful.
Connect back to switch and assign port e0/2 for PC-2 to the new VLAN.
Again, ping router and PC-1 from PC-2. The ping to router will be unsuccessful and the
one to PC-1 will be successful.
Finally, connect back to switch and assign port f0/26 for the router to the new VLAN.
(config)# interface f0/26
(config-if)# vlan membership-static 22
Now, ping the router and PC-1 from PC-2.Both pings will be successful showing that all
nodes have been successfully shifted to a new VLAN.
(config)# end
# show VLAN
# show VLAN membership
RESULTS: