Professional Documents
Culture Documents
CN
CN
CN
Network Model
Simulation Results
1
Computer Networks - 2
Computer Networks - 3
Objective: To simulate Ring Topology using Cisco Packet Tracer
Ring Topology, A ring topology is a bus topology in a closed loop. Data travels around
the ring in one direction. When one node sends data to another, the data passes
through each intermediate node on the ring until it reaches its destination. The
intermediate nodes repeat (re transmit) the data to keep the signal strong. Every node
is a peer; there is no hierarchical relationship of clients and servers. If one node is
unable to re transmit data, it servers communication between the nodes before and
after it in the bus.
Network Model
Computer Networks - 4
Simulation Result
Computer Networks - 5
Objective: To simulate Star Topology using Cisco Packet Tracer
Star topology is one of the most common network setups. In this configuration, every
node connects to a central network device, like hub, switch etc. The central network
device acts as a server and the peripheral devices act as clients. Depending on the type
of network card used in each computer of the star topology, a coaxial cable or RJ-45
cable is used to connect computers together.
Network Model
Simulation Result
Computer Networks - 6
Computer Networks - 7
Objective: To simulate Mesh Topology using Cisco Packet Tracer
Mesh Topology, A network setup where each computer and network device is
interconnected with one another, allowing for most transmissions to be distributed,
even if one of the connections go down. Mesh topology commonly used for wireless
networks. A mesh topology can be a full mesh topology or a partially connected mesh
topology.
Network Model
Computer Networks - 8
Simulation Result
Computer Networks - 9
Objective: To simulate Hybrid Topology using Cisco Packet Tracer
Hybrid Topology, A hybrid topology is a type of network topology that uses two or
more other network topologies, including bus topology, mesh topology, ring topology,
star topology, and tree topology.
Network Model
Computer Networks - 10
Simulation Result
Computer Networks - 11
Computer Networks - 12
Simulation 2
Objective: To execute TELNET with switch configuration using Cisco Packet Tracer
Description:
Switch: A network switch is a computer networking device that connects
devices together on a computer network by using packet switching to receive, process,
and forward data to the destination device. A network switch is a multiport network
bridge that uses hardware addresses to process and forward data at the data link layer
(layer 2) of the OSI model.
Network Model
Computer Networks - 13
Switch Configuration
Cisco WS-C2960-24TT (RC32300) processor (revision C0) with 21039K bytes of memory.
2960-24TT starting...
Base ethernet MAC Address: 0002.1794.1CC2
Xmodem file system is available.
Initializing Flash...
flashfs[0]: 1 files, 0 directories
flashfs[0]: 0 orphaned files, 0 orphaned directories
flashfs[0]: Total bytes: 64016384
flashfs[0]: Bytes used: 4414921
flashfs[0]: Bytes available: 59601463
flashfs[0]: flashfs fsck took 1 seconds.
...done Initializing Flash.
Boot Sector Filesystem (bs:) installed, fsid: 3
Parameter Block Filesystem (pb:) installed, fsid: 4
Loading "flash:/c2960-lanbase-mz.122-25.FX.bin"...
############################################################### [OK]
Cisco WS-C2960-24TT (RC32300) processor (revision C0) with 21039K bytes of memory.
24 FastEthernet/IEEE 802.3 interface(s)
2 Gigabit Ethernet/IEEE 802.3 interface(s)
Computer Networks - 14
63488K bytes of flash-simulated non-volatile configuration memory.
Base ethernet MAC Address : 0002.1794.1CC2
Motherboard assembly number : 73-9832-06
Power supply part number : 341-0097-02
Motherboard serial number : FOC103248MJ
Power supply serial number : DCA102133JA
Model revision number : B0
Motherboard revision number : C0
Model number : WS-C2960-24TT
System serial number : FOC1033Z1EY
Top Assembly Part Number : 800-26671-02
Top Assembly Revision Number : B0
Version ID : V02
CLEI Code Number : COM3K00BRA
Hardware Board Revision Number : 0x01Switch Ports Model SW Version SW Image
------ ----- ----- ---------- ----------
* 1 26 WS-C2960-24TT 12.2 C2960-LANBASE-M
Cisco IOS Software, C2960 Software (C2960-LANBASE-M), Version 12.2(25)FX, RELEASE
SOFTWARE (fc1)
Copyright (c) 1986-2005 by Cisco Systems, Inc.
Compiled Wed 12-Oct-05 22:05 by pt_team
Press RETURN to get started!
%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to up
%LINK-5-CHANGED: Interface FastEthernet0/2, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/3, changed state to up
%LINK-5-CHANGED: Interface FastEthernet0/4, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/4, changed state to up
%LINK-5-CHANGED: Interface FastEthernet0/5, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/5, changed state to up
Switch>enable
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#hostname s1
s1(config)#interface vlan 99
s1(config-if)#ip address 192.168.99.254 255.255.255.0
s1(config-if)#no shutdown
s1(config-if)#interface fa0/23
s1(config-if)#switchport mode access
s1(config-if)#switchport access vlan 99
% Access VLAN does not exist. Creating vlan 99
s1(config-if)#
%LINK-5-CHANGED: Interface Vlan99, changed state to up
s1(config-if)#exit
s1(config)#line console 0
s1(config-line)#password cisco
s1(config-line)#logins1(config-line)#line vty 0 4
s1(config-line)#password cisco
s1(config-line)#login
s1(config-line)#exit
s1(config)#enable secret cisco
s1(config)#exit
s1#
%SYS-5-CONFIG_I: Configured from console by console
s1#exit
Computer Networks - 15
s1 con0 is now available
Simulation Result
Computer Networks - 16
Simulation 3
Objective: To connect 2 Networks using Router configuration using Cisco Packet Tracer
Description:
Router is a networking device that forwards data packets between computer
networks. Routers perform the traffic directing functions on the Internet. A data packet
is typically forwarded from one router to another router through the networks that
constitute an internetwork until it reaches its destination node. A router is connected to
two or more data lines from different networks. When a data packet comes in on one of
the lines, the router reads the network address information in the packet to determine
the ultimate destination. Then, using information in its routing table or routing policy, it
directs the packet to the next network on its journey.
Network Model
Computer Networks - 17
Router Configuration
Computer Networks - 18
Router(config-if)#no shutdown
Router(config-if)#
%LINK-5-CHANGED: Interface GigabitEthernet0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0, changed state to
up
interface GigabitEthernet 0/1
Router(config-if)#ip address 192.168.2.1 255.255.255.0
Router(config-if)#no shutdown
Router(config-if)#
%LINK-5-CHANGED: Interface GigabitEthernet0/1, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1, changed state to
up
Router(config-if)#exit
Router(config)#exit
Router#
%SYS-5-CONFIG_I: Configured from console by console
Router#exit
Router con0 is now available
Simulation Results
Computer Networks - 19
Simulation 5
Computer Networks - 20
Description:
Static Routing, Static routing is the most secure way of routing. It reduces
overhead from network resources. In this type of routing we manually add routes in
routing table. It is useful where numbers of route are limited. Like other routing
methods static routing also has its pros and cons.
Network Model
Computer Networks - 21
Router 1 Configuration
Computer Networks - 22
3) Routing Static
Router 2 Configuration
Computer Networks - 23
2) Interface Serial 2/0
3) Routing Static
Computer Networks - 24
Simulation Results
Computer Networks - 25
Simulation 6
Description:
Routing Information Protocol RIP: The Routing Information Protocol (RIP) is one
of a family of IP Routing protocols, and is an Interior Gateway Protocol (IGP) designed
to distribute routing information within an Autonomous System (AS). RIP is a simple
vector routing protocol with many existing implementations in the field. In a vector
routing protocol, the routers exchange network reachability information with their
nearest neighbors. In other words, the routers communicate to each other the sets of
destinations ("address prefixes") that they can reach, and the next hop address to
which data should be sent in order to reach those destinations. This contrasts with link-
Computer Networks - 26
state IGPs; vectoring protocols exchange routes with one another, whereas link state
routers exchange topology information, and calculate theirown routes locally.
Network Model
Router 1 Configuration
Computer Networks - 27
2) Interface Serial 2/0
3) Routing RIP
Computer Networks - 28
Router 2 Configuration
Computer Networks - 29
2) Interface Serial 2/0
3) Routing RIP
Computer Networks - 30
Simulation Results
Computer Networks - 31
Simulation 7
Objective: To implement Open Shortest Path First Routing using Cisco Packet Tracer
Description
Open Shortest Path First OSPF: The OSPF protocol is one of a family of IP
Routing protocols used to distribute IP routing information throughout a single
Autonomous System (AS) in an IP network. The OSPF protocol is a link-state routing
protocol, which means that the routers exchange topology information with their
nearest neighbors. The topology information is flooded throughout the AS, so that
every router within the AS has a complete picture of the topology of the AS. This
picture is then used to calculate end-to-end paths through the AS, normally using a
variant of the Dijkstra algorithm. Therefore, in a link-state routing protocol, the next hop
address to which data is forwarded is determined by choosing the best end-to-end
path to the eventual Destination.
The main advantage of a link state routing protocol like OSPF is that the complete
knowledge of topology allows routers to calculate routes that satisfy particular criteria.
This can be useful for traffic engineering purposes, where routes can be constrained to
meet particular quality of service requirements. The main disadvantage of a link state
routing protocol is that it does not scale well as more routers are added to the routing
domain. Increasing the number of routers increases the size and frequency of the
topology updates, and also the length of time it takes to calculate end-to-end routes.
Network Model
Computer Networks - 32
Router 1 Configuration
Computer Networks - 33
3) Command Line Interface
Router(config)#router ospf 1
Router(config-router)#network 192.168.1.0 0.0.0.255 area 1
Router(config-router)#network 10.0.0.0 0.255.255.255 area 1
Router(config-router)#exit
Computer Networks - 34
Router 2 Configuration
Computer Networks - 35
2) Interface Serial 2/0
Computer Networks - 36
4) Command Line Interface
Router(config)#router ospf 2
Router(config-router)#network 192.168.2.0 0.0.0.255 area 0
Router(config-router)#network 10.0.0.0 0.255.255.255 area 1
Router(config-router)#network 11.0.0.0 0.255.255.255 area 2
Router(config-router)#exit
Router 3 Configuration
Computer Networks - 37
1) Interface FastEthernet 0/0
Computer Networks - 38
Router(config-router)#network 192.168.3.0 0.0.0.255 area 2
Router(config-router)#network 11.0.0.0 0.255.255.255 area 2
Router(config-router)#exit
Simulation Results
Simulation 8
Computer Networks - 39
Objective: To implement DNS and HTTP protocol using Cisco Packet Tracer
Description:
Domain Name System DNS: The domain name system (DNS) is the way that
internet domain names are located and translated into internet protocol (IP) addresses.
The domain name system maps the name people use to locate a website to the IP
address that a computer uses to locate a website. For example, if someone types
TechTarget.com into a web browser, a server behind the scenes will map that name to
the IP address 206.19.49.149.
HyperText Transfer Protocol HTTP: HTTP is the underlying protocol used by the
World Wide Web and this protocol defines how messages are formatted and
transmitted, and what actions Web servers and browsers should take in response to
various commands. For example, when you enter a URL in your browser, this actually
sends an HTTP command to the Web server directing it to fetch and transmit the
requested Web page. The other main standard that controls how the World Wide Web
works is HTML, which covers how Web pages are formatted and displayed.
Network Model
Computer Networks - 40
Server 1 Configuration
1) Desktop IP Configuration
2) Services HTTP
3) Services DNS
Computer Networks - 41
Simulation Results
Computer Networks - 42
Simulation 9
Description:
Simple Mail Transfer Protocol (SMTP): SMTP is a TCP/IP protocol used in
sending and receiving e-mail. However, since it is limited in its ability to queue
messages at the receiving end, it is usually used with one of two other protocols, POP3
or IMAP, that let the user save messages in a server mailbox and download them
periodically from the server. In other words, users typically use a program that uses
SMTP for sending e-mail and either POP3 or IMAP for receiving e-mail. On Unix-based
systems, sendmail is the most widely-used SMTP server for e-mail. A commercial
package, Sendmail, includes a POP3 server. Microsoft Exchange includes an SMTP
server and can also be set up to include POP3 support.
Network Model
Computer Networks - 43
Server 3 Configuration
1) Desktop IP Configuration
Computer Networks - 44
4) Save- Compose Email & Send
Computer Networks - 45
Computer Networks - 46
Simulation 10
Description:
File Transfer Protocol (FTP): FTP is a standard Internet protocol for transmitting
files between computers on the Internet over TCP/IP connections. FTP is a client-server
protocol that relies on two communications channels between client and server: a
command channel for controlling the conversation and a data channel for transmitting
file content. Clients initiate conversations with servers by requesting to download a file.
Using FTP, a client can upload, download, delete, rename, move and copy files on a
server. A user typically needs to log on to the FTP server, although some servers make
some or all of their content available without login, also known as anonymous FTP.
Network Model
Server 3 Configuration
1) Desktop IP Configuration
Computer Networks - 47
2) Services FTP & FTP setup configuration
Simulation Results: Desktop Command Prompt & Username verification for file transfer
Computer Networks - 48
Computer Networks - 49
Simulation 4
Description:
Wireless Technology: Wireless technology uses radio waves to transmit
information without cables or wiring. This technology is now being widely used to
create wireless computer networks. There are many standards for wireless
communications, including Bluetooth, DECT and WiMax. WiFi or 802.11 is a set of
standards designed for wireless ethernet LANs (local area networks) and is the
protocol used by all of our miniPCI wireless cards.
Computer Networks - 50
Wireless Router: A wireless router is a device that performs the functions of a
router and also includes the functions of a wireless access point. It is used to provide
access to the Internet or a private computer network. Depending on the manufacturer
and model, it can function in a wired local area network, in a wireless-only LAN, or in a
mixed wired and wireless network.
Network Model:
Devices Configuration
1) Switch 2960
2) Router 1841
Computer Networks - 51
3) Wireless Router WRT300N
Simulation Results
Computer Networks - 52
Computer Networks - 53