Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 32

LAB MANUAL

DATA COMMUNICATION & NETWORKING


TABLE OF CONTENT
S.NO DESCRIPTION

1
(a) INTRODUCTION TO DCN
(b ) INTRODUCTION TO PACKET TRACER

(c) Difference between intermediary and end devices

2 Network Topologies

3 Diagnostic Utilities (Ping , Tracert , ARP, NSLookup , Netstat , IpConfig)

4 (a) Understanding the IP addresses and their classes


(b) Establishing connectivity between end devices

5 (a) Establishing connectivity between client and server


(b) Troubleshooting connecting same and different devices scenario

6 (a) Assigning IP to intermediary devices


(b) Assigning IP and connection between different intermediary devices

7 (a) Understanding DHCP


(b)design a topology through DHCP server through which pc’s will get ip’s dynamically .
8 Basic concepts about subnetting

9 Static Routing

10 (a) Introduction to switch port security


(b) Configuring port security

11 (a) Introducing Routing protocol


(b) Configuring RIP protocol
LAB
a)INTRODUCTION TO DATA COMMUNICATION AND NETWORKING
Data communication:

refers to the exchange of data between a source and a receiver. Data communication is said to
be local if communicating devices are in the same building or a similarly restricted geographical
area.

The meanings of source and receiver are very simple. The device that transmits the data is
known as source and the device that receives the transmitted data is known as receiver. Data
communication aims at the transfer of data and maintenance of the data during the process but
not the actual generation of the information at the source and receiver.

In this diagram pc0 is a source which is sending data to pc1


Pc1 is a receiver of data.

NETWORK
A network consists of two or more computers that are linked in order to share
resources (such as printers and CDs), exchange files, or allow electronic
communications. The computers on a network may be linked through cables,
telephone lines, radio waves, satellites, or infrared light beams.

Two very common types of networks include:

 Local Area Network (LAN) ,Wide Area Network (WAN)


(b)Introduction to Packet Tracer

 Packet Tracer is a powerful router simulator created by Cisco Systems. It provides


virtual interfaces to interact with physical environment. 

 The purpose of Packet Tracer is to offer students and teachers a tool to learn the
principles of networking as well as develop Cisco Technology specific skills. 

 Packet Tracer is a simple Drag & Drop simulator that provides user-friendly
environment. 

 One of the biggest advantage of packet tracer is that when implementing a large scale of
network in a physical environment it helps to establish the whole scenario in the
simulator. 

  Packet Tracer creates .pkt & .pka Extension when saving files. 
 Packet Tracer Include Routers, Switches, Hub, Servers, End Devices, Firewalls, And
Multi user environment support, so one can easily perform a large activity with its
group members or partners on two computers. After completing of an activity both can
merge a single Lab in one activity. 


 
(c) Difference between intermediary and end
devices

Intermediary devices:
A device that connects directly to end user devices or provides end user routing to
other networks. For instance, A router is an example of intermediary devices
Intermediary devices connect the individual hosts to the network and can connect
multiple individual networks to form an internet-work.

End Devices
The network devices that people are most familiar with are called end devices.
These devices form the interface between the human network and the underlying
communication network. Some examples of end devices are:

Computers (work stations, laptops, file servers, web servers)


Network printers
VoIP phones
Security cameras
Mobile handheld devices (such as wireless barcode scanners, PDAs)

Symbols of Cable Type:

Console Cable (used to connect with a router)

Straight Through Cable (Used to Connect Different Devices}

Copper Crossover cable (Used to connect with the same devices)

Fiber (used in WAN environment)

Phone (used in VOIP Phone)


Coaxial cable (used in WAN emulation)

Serial DCE Cable (Used in WAN links where clock rate is required)

Serial DTE Cable (used in WAN link where clock rate is not required)
Lab

(a)Understanding ip address
An Internet Protocol address (IP address) is a numerical label assigned to each
device (e.g., computer, printer) participating in a computer network that uses
the Internet Protocol for communication.An IP address serves two principal functions:
host or network interface identification and location addressing. Its role has been
characterized as follows: "A name indicates what we seek. An address indicates where
it is. A route indicates how to get there.

An IP address consists of four numbers, each of which contains one to three digits, with
a single dot (.) separating each number or set of digits. Each of the four numbers can
range from 0 to 255. Here's an example of what an IP address might look like:
78.125.0.209. This innocuous-looking group of four numbers is the key that
empowers you and me to send and retrieve data over our Internet connections,
ensuring that our messages, as well as our requests for data and the data we've
requested, will reach their correct Internet destinations. Without this numeric protocol,
sending and receiving data over the World Wide Web would be impossible .

Classes

1st Octet Network/Host


1st Octet Number
High ID Default Hosts per Network
Class Decimal of
Order (N=Network, Subnet Mask (Usable Addresses)
Range Networks
Bits H=Host)
126 (27 –
A 1 – 126* 0 N.H.H.H 255.0.0.0 16,777,214 (224 – 2)
2)
16,382
B 128 – 191 10 N.N.H.H 255.255.0.0 65,534 (216 – 2)
(214 – 2)
2,097,150
C 192 – 223 110 N.N.N.H 255.255.255.0 254 (28 – 2)
(221 – 2)
D 224 – 239 1110 Reserved for Multicasting
E 240 – 254 1111 Experimental; used for research
Class A Network
In a Class A Network binary address start with 0, therefore the decimal number can be
anywhere from 1 to 126. The first 8 bits (the first octet) identify the network and the remaining
24 bits indicate the host within the network. An example of a Class A IP address is
102.168.212.226, where "102" identifies the network and "168.212.226" identifies the host on
that network.

Class B Network
In a Class B Network, binary addresses start with 10, therefore the decimal number can
be anywhere from 128 to 191. The number 127 is reserved for loopback and is used for
internal testing on the local machine. The first 16 bits (the first two octets) identify the
network and the remaining 16 bits indicate the host within the network. An example of a
Class B IP address is 168.212.226.204 where "168.212" identifies the network and
"226.204" identifies the host on that network.

Class C Network
Binary addresses start with 110, therefore the decimal number can be anywhere from
192 to 223. The first 24 bits (the first three octets) identify the network and the
remaining 8 bits indicate the host within the network. An example of a Class C IP
address is 200.168.212.226 where "200.168.212" identifies the network and "226"
identifies the host on that network.

b)Establishing connectivity between end devices


Task-1
Drag & Drop All the END devices & Intermediary devices

Task-2
Connect these Devices with Copper Cross over cable

Task-3
After establishing the connectivity between all the devices check that all devices must be Showing
GREEN signal

LAB
(a) Establishing connectivity between client and server

Task –1
Configure Server-Pt with the following

IP address: 192.168.1.254
Subnet Mask: 255.255.255.0

Click on the Server-PT icon Then Select from the Upper menu “Desktop” After selecting the
desktop select “IP CONFIGURATION”. Place the above Address with respect to their names.
Task-2
Click on the PC-PT icon, then selects From the upper Menu “Desktop” After selecting desktop,
select IP CONFIGURATION. Place the following address

IP Address: 192.168.1.1
Subnet Mask: 255.255.255.0

Task- 3
Go to the PC-PT icon, then selects From the upper Menu “Desktop” After selecting desktop,
click on the “WEB BROWSER” place the following IP in the “URL”

192.168.1.254

When you hit enter a message will arrive “Welcome to Packet Tracer”

Task- 4

Finals Again, click on the PC-PT icon, then selects From the upper Menu “Desktop” After
selecting desktop, click on “Command Prompt” to check the connectivity between the client &
server put the following command in Command Prompt
PC>ping 192.168.1.254
(b)

Troubleshooting Connecting same devices Scenario

Refer to the Figure


PC1 is connected with PC3, and PC2 is connected with PC4. PC1 can communicate with PC3
but PC2 & PC4 are unable to communicate with each other
Task –1
Design the above topology and show how PC’s are communicating with each other
Task- 2
Identify the problem and solve it by placing the correct IP & subnet masks.
PC1 IP Address _________________________

PC1 Subnet Mask _______________________

PC3 IP Address _________________________

PC3 Subnet Mask________________________

PC2 IP Address _________________________

PC2 Subnet Mask________________________

PC4 IP Address _________________________

PC4 Subnet Mask________________________


Lab
a)Assigning the IP Addresses to the Intermediary Devices

Task –1
Drag two routers in the white area of the packet tracer.

Task –2
NOTE: First power OFF your router then place a WIC-2T , then power ON the router.
Click each router and go the Physical Interface as shown in the (figure 2) Click WIC-2T button,
which is placed in the left side of the Interface. When you click on WIC-2T button, after
clicking the button drag the following figure in the above-mentioned panel.

WIC-2T is used when we need to connect two WAN interfaces with each other

Perform the same task with the remaining router.

Task –3
When the WIC-2T is placed properly in the router the next step is to plug the Serial Cable in
each router.

Note: Serial Cable must be DCE from one End and DTE from another end otherwise
router will not work.

Task –4
Click on Router 1 Select CLI(command Line interface) Tab & enter the following commands.

--- System Configuration Dialog ---

Continue with configuration dialog? [yes/no]: N

Press RETURN to get started! (Press Enter Key)

Router>enable (Press enter key)


Router#
Router# configure terminal (press Enter)
Enter configuration commands, one per line. End with CNTL/Z.
Router (config)#
Router(config)#interface serial 0/0/0
Router(config-if)#
Router(config-if)#ip address 10.0.0.1 255.255.255.0
Router(config-if)#clock rate 64000 ------------------(First Router is DCE )
Router(config-if)#no shutdown
Router(config-if)#End
Task –5
Click on Router 1 Select CLI(command Line interface) Tab & enter the following commands

--- System Configuration Dialog ---


Continue with configuration dialog? [yes/no]: N

Press RETURN to get started! (Press Enter Key)

Router>enable (Press enter key)


Router#
Router# configure terminal (press Enter)
Enter configuration commands, one per line. End with CNTL/Z.
Router (config)#
Router(config)#interface serial 0/0/0
Router(config-if)#
Router(config-if)#ip address 10.0.0.2 255.255.255.0
Router(config-if)#no shutdown
Router(config-if)#End

Task –6
Finally ping another router. In the end your ping should be 100%

Router#ping 10.0.0.2

Type escape sequence to abort.


Sending 5, 100-byte ICMP Echos to 10.0.0.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 40/42/51 ms
b) Assigning IP Address to the Different Intermediary Devices

Task –1
Drag A Router & a switch with respect to the Topology diagram

Task –2
Click on the Router 1 and select CLI Tab

Task –3
Configure the Fast Ethernet Interface from the router so that it would show Green signal &
acknowledge each other

--- System Configuration Dialog ---

Continue with configuration dialog? [yes/no]: N

Press RETURN to get started! (Press Enter Key)

Router>enable (Press enter key)


Router#
Router# configure terminal (press Enter)
Enter configuration commands, one per line. End with CNTL/Z.
Router (config)#
Router(config)#interface FastEthernet 0/0
Router(config-if)#ip address 11.0.0.1 255.255.255.0
Router(config-if)#no shutdown
Router(config-if)#End

Task –4
Router#ping 11.0.0.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 11.0.0.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 10/14/30 ms
LAB

UNDERSTANDING DHCP

Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to
automatically assign an IP address to a computer from a defined range of numbers (i.e., a
scope) configured for a given network. DHCP assigns an IP address when a system is started.

Benefits of DHCP
In Windows Server 2003, the DHCP Server service provides the following benefits:

 Reliable IP address configuration. DHCP minimizes configuration errors caused by manual IP


address configuration, such as typographical errors, or address conflicts caused by the
assignment of an IP address to more than one computer at the same time.

 Reduced network administration. DHCP includes the following features to reduce network
administration:

o Centralized and automated TCP/IP configuration.

o The ability to define TCP/IP configurations from a central location.

o The ability to assign a full range of additional TCP/IP configuration values by means of
DHCP options.

o The efficient handling of IP address changes for clients that must be updated frequently,
such as those for portable computers that move to different locations on a wireless
network.

o The forwarding of initial DHCP messages by using a DHCP relay agent, thus eliminating
the need to have a DHCP server on every subnet.
Why use DHCP

Every device on a TCP/IP-based network must have a unique unicast IP address to access the network and
its resources. Without DHCP, IP addresses must be configured manually for new computers or computers
that are moved from one subnet to another, and manually reclaimed for computers that are removed
from the network.

DHCP enables this entire process to be automated and managed centrally. The DHCP server maintains a
pool of IP addresses and leases an address to any DHCP-enabled client when it starts up on the network.
Because the IP addresses are dynamic (leased) rather than static (permanently assigned), addresses no
longer in use are automatically returned to the pool for reallocation.
b) Design a topology for DHCP server Through which PC would be able to Get IP’S
Dynamically .

Task-1
Configure the interface of a router with a correct IP address

Router>en
Router#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#intfastEthernet 0/0
Router(config-if)#ip address 192.168.1.1 255.255.255.0
Router(config-if)#no shutdown
Router(config-if)#exit

%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up %LINEPROTO-5-


UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up
Task-3 Configuring DHCP
Router(config)#ipdhcp excluded-address 192.168.1.2 192.168.1.10
Router(config)#ipdhcp pool Network1
Router(dhcp-config)#network 192.168.1.0 255.255.255.0
Router(dhcp-config)#default-router 192.168.1.1
Router(dhcp-config)#exit

Task-4

When electing the IP address to the PC . The pc would be able to get the IP assigned
Automatically

Task –5 (Troubleshooting)

If a pc has assigned the IP statically then it would not be able to get acknowledgement from other
PC’S
LAB
BASIC CONCEPTS ABOUT SUBNETTING

What is subnetting?
When we subnet a network, we basically split it into smaller networks. For
example, when a set of IP addresses is given to a company, the company
might want to "break" (the correct term is "partition") that one network into
smaller ones, one for each department. This way, the technical department
and management department can each have a small network of their own. By
subnetting the network, we can partition it to as many smaller network as we
need. This also helps reduce traffic and hides the complexity of the network.

By default, all type of classes (A, B and C) have a subnet mask; we call it the
default subnet mask. You need to have one because:

1) All computers need the subnet mask field filled when configuring IP

2) You need to set some logical boundaries in your network

3) You should at least enter the default subnet mask for the class you're using

In the previous pages I spoke about IP classes, network IDs and host IDs.
The subnet mask is what determines the network ID and host ID portion of an
IP address.

The table below shows clearly the subnet mask that applies for each network
class.
When dealing with subnet masks in the real world, we are free in most cases
to use any type of subnet mask in order to meet our needs. If, for example, we
require one network which can contain up to 254 computers, then a class C
network with its default subnet mask will do fine. If we need more, then we
might consider a class B network with its default subnet mask.

Note that the default subnet masks have been set by the IEEE committee, the
same guys that set and approve the different standards and protocols.

We will have a closer look at this later on and see how we can achieve a class
C network with more than 254 hosts.

TASK: SUBNETTING OF CLASS C,IDENTIFY HOST,NETWORK,SUBNET


MASK.

1)192.168.1.0/30

2) 200.100.100.0/29

3)200.200.200.0/27
Lab

STATIC ROUTE
a) Configuring Static Route

Task-1

Configure ip address on the three router

Router1>enable

Router1#configure Terminal

Router1(Config)# interface se0/0/0

Router1(Config-if)# ip address 10.0.0.1 255.0.0.0

Router1(Config-if)# clock rate 64000

Router1(Config-if)# no shutdown

Router2>enable

Router2#configure Terminal

Router2(Config)# interface se0/0/0

Router2(Config-if)# ip address 10.0.0.2 255.0.0.0

Router2(Config-if)# no shutdown

Router2(Config-if)#end
Router2>enable

Router2#configure Terminal

Router2(Config)# interface se0/0/1

Router2(Config-if)# ip address 192.168.2.1 255.255.255.0

Router2(Config-if)# clockrate 64000

Router2(Config-if)# no shutdown

Router3>enable

Router3#configure terminal

Router3(Config)#interface se0/0/1

Router3(Config-if)#ip address 192.168.2.2 255.255.255.0

Router3(Config-if)#no shutdown

Router3(Config-if)#end

Router3>enable

Router3#configure terminal

Router3(Config)#interface fa0/0

Router3(Config-if)#Ip address 172.16.1.1 255.255.255.0

Router3(Config-if)#no shutdown

Router3(Config-if)#end
Configuring Static Route

Router1>enable

Router1# Configure terminal

Router1(Config)# ip route 172.16.1.0 255.255.255.0 10.0.0.2

(Where 172.16.1.0= Destination Address 255.255.255.0= Subnet mask, 10.0.0.2= Next Hop
Address)

Router1(Config)# ip route 192.168.2.0 255.255.255.0 10.0.0.2

Router2>enable

Router2#configure Terminal

Router2(Config)# ip route 172.16.1.0 255.255.255.0 192.168.2.2

Router3>Enable

Router3#configure terminal

Router3(Config)# ip route 10.0.0.0 255.0.0.0 192.168.2.1


LAB

Port Security
To configure Port security on interface fa0/1 such that no more than 1 PC connect to that
interface

Method
Test PC> IP address 10.0.0.1 Mask 255.0.0.0
Laptop 3>IP address 10.0.0.2 Mask 255.0.0.0
Laptop 4>IP address 10.0.0.3 Mask 255.0.0.0
Laptop 5>IP address 10.0.0.4 Mask 255.0.0.0

Switch Configuration

Enter interface configuration mode for FastEthernet 0/11 and enable port security.

Before any other port security commands can be configured on the interface, port security must
be enabled.

SW1(config-if)#interface fa0/1
SW1(config-if)#switchportmode access
SW1(config-if)#switchport port-security

* Notice that you do not have to exit back to global configuration mode before entering interface
configuration mode for fa0/1.

6. How To configure the maximum number of MAC addresses.

To configure the port to learn only one MAC address, set the maximum to 1:

SW1(config-if)#switchport port-security maximum 1

7. How To configure the port to add the MAC address to the running configuration.

The MAC address learned on the port can be added to (“stuck” to) the running configuration for
that port.

SW1(config-if)#switchport port-security mac-address sticky

SW1(config-if)#switchport port-security violation shutdown


You can use the show port-security interface fa0/1 command to also verify a security violation
with the command.
SW1#show port-security interface fa0/1

Port Security : Enabled


Port Status : Secure-shutdown
Violation Mode : Shutdown
Aging Time : 0 mins
Aging Type : Absolute
SecureStatic Address Aging : Disabled
Maximum MAC Addresses : 1
Total MAC Addresses : 1
Configured MAC Addresses : 1
Sticky MAC Addresses : 0
Last Source Address:Vlan : 00E0.F7B0.086E:20

Security Violation Count : 1


LAB

a) INTRODUCTION TO ROUTING PROTOCOL

1. A routing protocol specifies how routers communicate with each other, disseminating
information that enables them to select routesbetween any two nodes on a computer
network. Routing algorithms determine the specific choice of route. Each router has a
priori knowledge only of networks attached to it directly.

RIP is a relatively old but still commonly used interior gateway protocol
created for use in small, homogeneous networks. It is a classical distance-
vector routing protocol. RIP is documented in RFC 1058.
RIP uses broadcast User Datagram Protocol (UDP) data packets to
exchange routing information. Cisco IOS software sends routing
information updates every 30 seconds, which is termed advertising. If a
router does not receive an update from another router for 180 seconds or
more, it marks the routes served by the nonupdating router as being
unusable. If there is still no update after 240 seconds, the router removes
all routing table entries for the nonupdating router.
The metric that RIP uses to rate the value of different routes is hop
count. The hop count is the number of routers that can be traversed in a
route. A directly connected network has a metric of zero; an unreachable
network has a metric of 16. This small range of metrics makes RIP an
unsuitable routing protocol for large networks.
A router that is running RIP can receive a default network via an update
from another router that is running RIP, or the router can source (generate)
the default network itself with RIP. In both cases, the default network is
advertised through RIP to other RIP neighbors.
Cisco IOS software will source the default network with RIP if one of the
following conditions is met:
• The ip default-network command is configured.
• The default-information originate command is configured.
• The default route is learned via another routing protocol or static route
and then redistributed into RIP.
RIP sends updates to the interfaces in the specified networks. If the
network of an interface network is not specified, it will not be advertised in
any RIP update.
.
.

b)
Configuring RIP protocol

Router>enable
Router#configure t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname pooh
pooh(config)#interface se0/0/0
pooh(config-if)#ip address 192.168.1.1 255.255.255.0
pooh(config-if)#clock rate 64000
pooh(config-if)#no shutdown
Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname Piglet
Piglet(config)#interface se0/0/0
Piglet (config-if)#ip address 192.168.1.2 255.255.255.0
Piglet (config-if)#no shutdown
Piglet (config-if)#exit
Piglet (config)#interface se0/0/1
Piglet (config-if)#ip address 172.16.1.1 255.255.255.0
Piglet (config-if)#clock rate 64000
Piglet (config-if)#no shutdown

Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#Hostname Newman
Router(config)#interface se0/0/0
Newman(config-if)#ip address 172.16.1.2 255.255.255.0
Newman(config-if)#no shutdown
Task-2
Configuring Rip v1
pooh(config)#router rip
pooh(config-router)#network 192.168.1.0
pooh(config-router)#exit
pooh(config)#end
Piglet(config)#router rip
Piglet(config-router)#network 192.168.1.0
Piglet(Config-router)#network 172.16.0.0
Piglet(config-router)#exit
Piglet(config)#end
Newman>enable
Newman#configure terminal
Newman(config)#router rip
Newman(config-router)#network 172.16.0.0
Newman(config-router)#exit
Finally verify the Connectivity from End to End
Ping From Newman to pooh
Newman# ping 192.168.1.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 49/59/63 ms

You might also like