CN

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 53

Objective: To simulate Bus Topology using Cisco Packet Tracer

Bus Topology, Alternatively referred to as a line topology, a bus topology is a network


setup in which each computer and network device are connected to a single cable or
backbone. Depending on the type of network card used in each computer of the bus
topology, a coaxial cable or a RJ-45 network cable is used to connect computers
together.

Network Model

Simulation Results

1
Computer Networks - 2
Computer Networks - 3
Objective: To simulate Ring Topology using Cisco Packet Tracer

Ring Topology, A ring topology is a bus topology in a closed loop. Data travels around
the ring in one direction. When one node sends data to another, the data passes
through each intermediate node on the ring until it reaches its destination. The
intermediate nodes repeat (re transmit) the data to keep the signal strong. Every node
is a peer; there is no hierarchical relationship of clients and servers. If one node is
unable to re transmit data, it servers communication between the nodes before and
after it in the bus.

Network Model

Computer Networks - 4
Simulation Result

Computer Networks - 5
Objective: To simulate Star Topology using Cisco Packet Tracer

Star topology is one of the most common network setups. In this configuration, every
node connects to a central network device, like hub, switch etc. The central network
device acts as a server and the peripheral devices act as clients. Depending on the type
of network card used in each computer of the star topology, a coaxial cable or RJ-45
cable is used to connect computers together.

Network Model

Simulation Result

Computer Networks - 6
Computer Networks - 7
Objective: To simulate Mesh Topology using Cisco Packet Tracer

Mesh Topology, A network setup where each computer and network device is
interconnected with one another, allowing for most transmissions to be distributed,
even if one of the connections go down. Mesh topology commonly used for wireless
networks. A mesh topology can be a full mesh topology or a partially connected mesh
topology.

Network Model

Computer Networks - 8
Simulation Result

Computer Networks - 9
Objective: To simulate Hybrid Topology using Cisco Packet Tracer

Hybrid Topology, A hybrid topology is a type of network topology that uses two or
more other network topologies, including bus topology, mesh topology, ring topology,
star topology, and tree topology.

Network Model

Computer Networks - 10
Simulation Result

Computer Networks - 11
Computer Networks - 12
Simulation 2

Objective: To execute TELNET with switch configuration using Cisco Packet Tracer

Description:
Switch: A network switch is a computer networking device that connects
devices together on a computer network by using packet switching to receive, process,
and forward data to the destination device. A network switch is a multiport network
bridge that uses hardware addresses to process and forward data at the data link layer
(layer 2) of the OSI model.

TELNET: Telnet is a user command and an underlying TCP/IP protocol for


accessing remote computers. Through Telnet, an administrator or another user can
access someone else's computer remotely. On the Web, HTTP and FTP protocols allow
you to request specific files from remote computers, but not to actually be logged on as
a user of that computer. With Telnet, you log on as a regular user with whatever
privileges you may have been granted to the specific application and data on that
computer.

Network Model

Computer Networks - 13
Switch Configuration

Cisco WS-C2960-24TT (RC32300) processor (revision C0) with 21039K bytes of memory.
2960-24TT starting...
Base ethernet MAC Address: 0002.1794.1CC2
Xmodem file system is available.
Initializing Flash...
flashfs[0]: 1 files, 0 directories
flashfs[0]: 0 orphaned files, 0 orphaned directories
flashfs[0]: Total bytes: 64016384
flashfs[0]: Bytes used: 4414921
flashfs[0]: Bytes available: 59601463
flashfs[0]: flashfs fsck took 1 seconds.
...done Initializing Flash.
Boot Sector Filesystem (bs:) installed, fsid: 3
Parameter Block Filesystem (pb:) installed, fsid: 4
Loading "flash:/c2960-lanbase-mz.122-25.FX.bin"...
############################################################### [OK]

Cisco IOS Software, C2960 Software (C2960-LANBASE-M), Version 12.2(25)FX, RELEASE


SOFTWARE (fc1)
Copyright (c) 1986-2005 by Cisco Systems, Inc.
Compiled Wed 12-Oct-05 22:05 by pt_team
Image text-base: 0x80008098, data-base: 0x814129C4

Cisco WS-C2960-24TT (RC32300) processor (revision C0) with 21039K bytes of memory.
24 FastEthernet/IEEE 802.3 interface(s)
2 Gigabit Ethernet/IEEE 802.3 interface(s)

Computer Networks - 14
63488K bytes of flash-simulated non-volatile configuration memory.
Base ethernet MAC Address : 0002.1794.1CC2
Motherboard assembly number : 73-9832-06
Power supply part number : 341-0097-02
Motherboard serial number : FOC103248MJ
Power supply serial number : DCA102133JA
Model revision number : B0
Motherboard revision number : C0
Model number : WS-C2960-24TT
System serial number : FOC1033Z1EY
Top Assembly Part Number : 800-26671-02
Top Assembly Revision Number : B0
Version ID : V02
CLEI Code Number : COM3K00BRA
Hardware Board Revision Number : 0x01Switch Ports Model SW Version SW Image
------ ----- ----- ---------- ----------
* 1 26 WS-C2960-24TT 12.2 C2960-LANBASE-M
Cisco IOS Software, C2960 Software (C2960-LANBASE-M), Version 12.2(25)FX, RELEASE
SOFTWARE (fc1)
Copyright (c) 1986-2005 by Cisco Systems, Inc.
Compiled Wed 12-Oct-05 22:05 by pt_team
Press RETURN to get started!
%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to up
%LINK-5-CHANGED: Interface FastEthernet0/2, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/3, changed state to up
%LINK-5-CHANGED: Interface FastEthernet0/4, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/4, changed state to up
%LINK-5-CHANGED: Interface FastEthernet0/5, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/5, changed state to up
Switch>enable
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#hostname s1
s1(config)#interface vlan 99
s1(config-if)#ip address 192.168.99.254 255.255.255.0
s1(config-if)#no shutdown
s1(config-if)#interface fa0/23
s1(config-if)#switchport mode access
s1(config-if)#switchport access vlan 99
% Access VLAN does not exist. Creating vlan 99
s1(config-if)#
%LINK-5-CHANGED: Interface Vlan99, changed state to up
s1(config-if)#exit
s1(config)#line console 0
s1(config-line)#password cisco
s1(config-line)#logins1(config-line)#line vty 0 4
s1(config-line)#password cisco
s1(config-line)#login
s1(config-line)#exit
s1(config)#enable secret cisco
s1(config)#exit
s1#
%SYS-5-CONFIG_I: Configured from console by console
s1#exit

Computer Networks - 15
s1 con0 is now available

Press RETURN to get started.

Simulation Result

Computer Networks - 16
Simulation 3

Objective: To connect 2 Networks using Router configuration using Cisco Packet Tracer

Description:
Router is a networking device that forwards data packets between computer
networks. Routers perform the traffic directing functions on the Internet. A data packet
is typically forwarded from one router to another router through the networks that
constitute an internetwork until it reaches its destination node. A router is connected to
two or more data lines from different networks. When a data packet comes in on one of
the lines, the router reads the network address information in the packet to determine
the ultimate destination. Then, using information in its routing table or routing policy, it
directs the packet to the next network on its journey.

Network Model

Computer Networks - 17
Router Configuration

System Bootstrap, Version 15.1(4)M4, RELEASE SOFTWARE (fc1)


Total memory size = 512 MB - On-board = 512 MB, DIMM0 = 0 MB
CISCO2911/K9 platform with 524288 Kbytes of main memory
Main memory is configured to 72/-1(On-board/DIMM0) bit mode with ECC disabled
Readonly ROMMON initialized
program load complete, entry point: 0x80803000, size: 0x1b340
program load complete, entry point: 0x80803000, size: 0x1b340
IOS Image Load Test
___________________
Digitally Signed Release Software
program load complete, entry point: 0x81000000, size: 0x3bcd3d8
Self decompressing the image :
##########################################################################
[OK]Smart Init is enabled
smart init is sizing iomem
TYPE MEMORY_REQ
Onboard devices &
buffer pools 0x022F6000
-----------------------------------------------
TOTAL: 0x022F6000
Rounded IOMEM up to: 36Mb.
Using 6 percent iomem. [36Mb/512Mb]
Cisco CISCO2911/K9 (revision 1.0) with 491520K/32768K bytes of memory.
Processor board ID FTX152400KS
3 Gigabit Ethernet interfaces
DRAM configuration is 64 bits wide with parity disabled.
255K bytes of non-volatile configuration memory.
249856K bytes of ATA System CompactFlash 0 (Read/Write)
--- System Configuration Dialog ---
Would you like to enter the initial configuration dialog? [yes/no]: no
Press RETURN to get started!
Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface GigabitEthernet 0/0
Router(config-if)#ip address 192.168.1.1 255.255.255.0

Computer Networks - 18
Router(config-if)#no shutdown
Router(config-if)#
%LINK-5-CHANGED: Interface GigabitEthernet0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0, changed state to
up
interface GigabitEthernet 0/1
Router(config-if)#ip address 192.168.2.1 255.255.255.0
Router(config-if)#no shutdown
Router(config-if)#
%LINK-5-CHANGED: Interface GigabitEthernet0/1, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1, changed state to
up
Router(config-if)#exit
Router(config)#exit
Router#
%SYS-5-CONFIG_I: Configured from console by console
Router#exit
Router con0 is now available

Press RETURN to get started.

Simulation Results

Computer Networks - 19
Simulation 5

Objective: To implement Static Routing using Cisco Packet Tracer

Computer Networks - 20
Description:
Static Routing, Static routing is the most secure way of routing. It reduces
overhead from network resources. In this type of routing we manually add routes in
routing table. It is useful where numbers of route are limited. Like other routing
methods static routing also has its pros and cons.

Advantage of static routing


I. It is easy to implement.
II. It is most secure way of routing, since no information is shared with other
routers.
III. It puts no overhead on resources such as CPU or memory.

Disadvantage of static routing


I. It is suitable only for small network.
II. If a link fails it cannot reroute the traffic.

Network Model

Computer Networks - 21
Router 1 Configuration

1) Interface FastEthernet 0/0

2) Interface Serial 2/0

Computer Networks - 22
3) Routing Static

Router 2 Configuration

1) Interface FastEthernet 0/0

Computer Networks - 23
2) Interface Serial 2/0

3) Routing Static

Computer Networks - 24
Simulation Results

Computer Networks - 25
Simulation 6

Objective: To implement Routing Information Protocol using Cisco Packet Tracer

Description:
Routing Information Protocol RIP: The Routing Information Protocol (RIP) is one
of a family of IP Routing protocols, and is an Interior Gateway Protocol (IGP) designed
to distribute routing information within an Autonomous System (AS). RIP is a simple
vector routing protocol with many existing implementations in the field. In a vector
routing protocol, the routers exchange network reachability information with their
nearest neighbors. In other words, the routers communicate to each other the sets of
destinations ("address prefixes") that they can reach, and the next hop address to
which data should be sent in order to reach those destinations. This contrasts with link-

Computer Networks - 26
state IGPs; vectoring protocols exchange routes with one another, whereas link state
routers exchange topology information, and calculate theirown routes locally.

A vector routing protocol floods reachability information throughout all routers


participating in the protocol, so that every router has a routing table containing the
complete set of destinations known to the participating routers.

Network Model

Router 1 Configuration

1) Interface FastEthernet 0/0

Computer Networks - 27
2) Interface Serial 2/0

3) Routing RIP

Computer Networks - 28
Router 2 Configuration

1) Interface FastEthernet 0/0

Computer Networks - 29
2) Interface Serial 2/0

3) Routing RIP

Computer Networks - 30
Simulation Results

Computer Networks - 31
Simulation 7

Objective: To implement Open Shortest Path First Routing using Cisco Packet Tracer

Description
Open Shortest Path First OSPF: The OSPF protocol is one of a family of IP
Routing protocols used to distribute IP routing information throughout a single
Autonomous System (AS) in an IP network. The OSPF protocol is a link-state routing
protocol, which means that the routers exchange topology information with their
nearest neighbors. The topology information is flooded throughout the AS, so that
every router within the AS has a complete picture of the topology of the AS. This
picture is then used to calculate end-to-end paths through the AS, normally using a
variant of the Dijkstra algorithm. Therefore, in a link-state routing protocol, the next hop
address to which data is forwarded is determined by choosing the best end-to-end
path to the eventual Destination.

The main advantage of a link state routing protocol like OSPF is that the complete
knowledge of topology allows routers to calculate routes that satisfy particular criteria.
This can be useful for traffic engineering purposes, where routes can be constrained to
meet particular quality of service requirements. The main disadvantage of a link state
routing protocol is that it does not scale well as more routers are added to the routing
domain. Increasing the number of routers increases the size and frequency of the
topology updates, and also the length of time it takes to calculate end-to-end routes.

Network Model

Computer Networks - 32
Router 1 Configuration

1) Interface FastEthernet 0/0

2) Interface Serial 2/0

Computer Networks - 33
3) Command Line Interface
Router(config)#router ospf 1
Router(config-router)#network 192.168.1.0 0.0.0.255 area 1
Router(config-router)#network 10.0.0.0 0.255.255.255 area 1
Router(config-router)#exit

Computer Networks - 34
Router 2 Configuration

1) Interface FastEthernet 0/0

Computer Networks - 35
2) Interface Serial 2/0

3) Interface Serial 3/0

Computer Networks - 36
4) Command Line Interface
Router(config)#router ospf 2
Router(config-router)#network 192.168.2.0 0.0.0.255 area 0
Router(config-router)#network 10.0.0.0 0.255.255.255 area 1
Router(config-router)#network 11.0.0.0 0.255.255.255 area 2
Router(config-router)#exit

Router 3 Configuration

Computer Networks - 37
1) Interface FastEthernet 0/0

2) Interface Serial 2/0

3) Command Line Interface


Router(config)#router ospf 3

Computer Networks - 38
Router(config-router)#network 192.168.3.0 0.0.0.255 area 2
Router(config-router)#network 11.0.0.0 0.255.255.255 area 2
Router(config-router)#exit

Simulation Results

Simulation 8

Computer Networks - 39
Objective: To implement DNS and HTTP protocol using Cisco Packet Tracer

Description:
Domain Name System DNS: The domain name system (DNS) is the way that
internet domain names are located and translated into internet protocol (IP) addresses.
The domain name system maps the name people use to locate a website to the IP
address that a computer uses to locate a website. For example, if someone types
TechTarget.com into a web browser, a server behind the scenes will map that name to
the IP address 206.19.49.149.

HyperText Transfer Protocol HTTP: HTTP is the underlying protocol used by the
World Wide Web and this protocol defines how messages are formatted and
transmitted, and what actions Web servers and browsers should take in response to
various commands. For example, when you enter a URL in your browser, this actually
sends an HTTP command to the Web server directing it to fetch and transmit the
requested Web page. The other main standard that controls how the World Wide Web
works is HTML, which covers how Web pages are formatted and displayed.

Network Model

Computer Networks - 40
Server 1 Configuration

1) Desktop IP Configuration

2) Services HTTP

3) Services DNS

Computer Networks - 41
Simulation Results

Computer Networks - 42
Simulation 9

Objective: To implement SMTP using Cisco Packet Tracer

Description:
Simple Mail Transfer Protocol (SMTP): SMTP is a TCP/IP protocol used in
sending and receiving e-mail. However, since it is limited in its ability to queue
messages at the receiving end, it is usually used with one of two other protocols, POP3
or IMAP, that let the user save messages in a server mailbox and download them
periodically from the server. In other words, users typically use a program that uses
SMTP for sending e-mail and either POP3 or IMAP for receiving e-mail. On Unix-based
systems, sendmail is the most widely-used SMTP server for e-mail. A commercial
package, Sendmail, includes a POP3 server. Microsoft Exchange includes an SMTP
server and can also be set up to include POP3 support.

Network Model

Computer Networks - 43
Server 3 Configuration

1) Desktop IP Configuration

2) Services Email & SMTP server setup

3) Desktop Email & Username and email configuration

Computer Networks - 44
4) Save- Compose Email & Send

Simulation Results: Receiving Email by Recipient

Computer Networks - 45
Computer Networks - 46
Simulation 10

Objective: To implement FTP using Cisco Packet Tracer

Description:
File Transfer Protocol (FTP): FTP is a standard Internet protocol for transmitting
files between computers on the Internet over TCP/IP connections. FTP is a client-server
protocol that relies on two communications channels between client and server: a
command channel for controlling the conversation and a data channel for transmitting
file content. Clients initiate conversations with servers by requesting to download a file.
Using FTP, a client can upload, download, delete, rename, move and copy files on a
server. A user typically needs to log on to the FTP server, although some servers make
some or all of their content available without login, also known as anonymous FTP.

Network Model

Server 3 Configuration

1) Desktop IP Configuration

Computer Networks - 47
2) Services FTP & FTP setup configuration

Simulation Results: Desktop Command Prompt & Username verification for file transfer

Computer Networks - 48
Computer Networks - 49
Simulation 4

Objective: To connect Wireless Router using Cisco Packet Tracer

Description:
Wireless Technology: Wireless technology uses radio waves to transmit
information without cables or wiring. This technology is now being widely used to
create wireless computer networks. There are many standards for wireless
communications, including Bluetooth, DECT and WiMax. WiFi or 802.11 is a set of
standards designed for wireless ethernet LANs (local area networks) and is the
protocol used by all of our miniPCI wireless cards.

Computer Networks - 50
Wireless Router: A wireless router is a device that performs the functions of a
router and also includes the functions of a wireless access point. It is used to provide
access to the Internet or a private computer network. Depending on the manufacturer
and model, it can function in a wired local area network, in a wireless-only LAN, or in a
mixed wired and wireless network.

Network Model:

Devices Configuration

1) Switch 2960

2) Router 1841

Computer Networks - 51
3) Wireless Router WRT300N

Simulation Results

Computer Networks - 52
Computer Networks - 53

You might also like