Professional Documents
Culture Documents
Lab Manual - CSE 324 - Computer Networks Lab v2.1
Lab Manual - CSE 324 - Computer Networks Lab v2.1
To the Internet
Subnet: 192.168.1.0
Hub 192.168.1.1
255.255.255.0
a. Subnet Masks: Subnet mask identifies the network portion of an IP address. Make sure every
machine in the same network has the same subnet mask. The value of subnet mask is
255.255.255.0 in the example we will use.
b. Network or Subnet Address: Find the network portion of the IP address of the Gateway
Machine. Fill in the host portion with 0s. Write that label above the network (in the upper left,
in these diagrams). In the above example, the Gateway Machine has an IP address of
192.168.1.101 and since the subnet mask is 255.255.255.0, the network portion includes only
the first 3 bytes. To find the subnet label, replace the last byte with zero: 192.168.1.0.
c. Check the IP Addresses
Network Portion: Make sure that each NIC on a subnet has the same network address as the
label you wrote at the top of the subnet. In the example, on the left subnet, that means
every IP address must start with 192.168.1
Host Portion: Make sure that each NIC on a subnet has a different host address, including the
default gateway. In the example, the Gateway Machine has a host address of 1, and the
others are 101, 102, and 103, so there are no duplicates.
d. Default Gateway: On each subnet, the default gateway is the Gateway Machine‟s IP address. It
is the same for each NIC on the subnet, except the Gateway Machine itself, which has a default
gateway of the network above it, usually an ISP. In the example, the Gateway Machine has an
IP address of 192.168.1.1, so the default gateway must be 192.168.1.1 for all three PCs at the
bottom of the chart.
Step 4: Compare the TCP/IP configuration of this computer to another computer on the LAN
Select another computer B. Perform step 2 & 3 for the computer B. Fill up the following table.
Familiarize yourself with the functions of the two screen modes; Realtime and Simulation.
Real time Mode is used to build and configure your network,
Simulation mode is used to generate network traffic (packets) and observe network activity.
2b. Crossover and Straight-through Cables
Common Ethernet network cables are straight and crossover cable. This Ethernet network cable is
made of 4 pair high performance cable that consists of twisted pair conductors that used for data
transmission. Both end of cable is called RJ45 connector. Straight and crossover cable can be Cat3, Cat
5, Cat 5e or Cat 6 UTP cable, the only difference is each type will have different wire arrangement in
the cable for serving different purposes.
Hub PC/Laptop/Server
Switch Router
You usually use straight cable to connect different type of devices (different category). This type of
cable will be used most of the time and can be used to:
Connect a computer to a switch/hub's normal port.
Connect a computer to a cable/DSL modem's LAN port.
Connect a router's WAN port to a cable/DSL modem's LAN port.
Connect a router's LAN port to a switch/hub's uplink port. (normally used for expanding
network)
5 | © 2019 Department of CSE, UIU Version 2.1
Sometimes you will use crossover cable, it's usually used to connect same type of devices (same
category). A crossover cable can be used to:
Connect 2 computers directly.
Connect a router's LAN port to a switch/hub's normal port. (normally used for expanding
network)
Connect 2 switches/hubs by using normal port in both switches/hubs.
Exercise 2: To create a single-segment network using a Hub and a Switch.
Step 1: Start Packet Tracer and create the shown topology using Hub, Switch and PCs.
Step 2: Configure the PCs with Host IP Address, Subnet Mask as follows:
Host IP Address Subnet Mask
PC0 192.168.10.10 255.255.255.0
PC1 192.168.10.11 255.255.255.0
PC2 192.168.10.12 255.255.255.0
PC3 192.168.10.13 255.255.255.0
Step 3: Test the network, e.g., ping PC3 from PC0.
Step 4: Run the test in Simulation mode.
Step 6: Return the IP address of PC3 to 192.168.10.13. Change the IP address of PC2 to 192.168.11.12.
Perform a ping from PC0 to PC2. What is the ping result?
Point 2:
Point 3:
Point 4:
What is the common information listed under the TCP section of PDU Details, as compared to
the information listed under the OSI Model tab, and with which layer is it associated?
What is the Host listed under the HTTP section of the PDU Details? What layer would this
information be associated with under the OSI Model tab?
i. Click the Outbound PDU Details tab. Scroll down to the HTTP section. What is the first line in
the HTTP message that displays?
j. Click the last colored square box under the Info column. How many tabs are displayed with this
event and why?
c. Click the first DNS event in the Info column. As you look at the OSI Model tab with Layer 7
highlighted, a description of what is occurring is listed directly below the In Layers and Out
Layers (“1. The DNS client sends a DNS query to the DNS server.”). This is very useful
information to help understand what is occurring during the communication process.
d. Click the Outbound PDU Details tab. What information is listed in the NAME: in the DNS QUERY
section?
e. Click the last DNS Info colored square box in the event list. Which device is displayed?
What is the value listed next to ADDRESS: in the DNS ANSWER section of the Inbound PDU
Details?
Now, use the above IPv4 address table, determine the class, network address and broadcast
address for the following IP addresses:
i. IP address: 207.21.54.240 Address Class:
Subnet mask: 255.255.255.0 Network Address:
Broadcast Address: Possible # of Hosts:
ii. IP address: 60.41.211.5 Address Class:
Subnet mask: 255.0.0.0 Network Address:
Broadcast Address: Possible # of Hosts:
iii. IP address: 190.101.2.199 Address Class:
Subnet mask: 255.255.0.0 Network Address:
Broadcast Address: Possible # of Hosts:
c) Determine the class and major network address for the following IPv4 addresses. Use the subnet
masks to determine the number of subnets created for the address, and the number of hosts
permitted on each subnet:
i. IP address: 207.21.54.140 Address Class:
Subnet mask: 255.255.255.224 Network Address:
Possible # of Subnets: Possible # of Hosts:
ii. IP address: 60.41.211.5 Address Class:
Subnet mask: 255.255.255.0 Network Address:
Possible # of Subnets:
Possible # of Hosts:
iii. IP address: 182.191.25.11 Address Class:
Subnet mask: 255.255.254.0 Network Address:
Possible # of Subnets: Possible # of Hosts:
User EXEC mode Limited command set, e.g., ping, telnet, Router>enable
traceroute
No change of system parameters
3. What is the basic difference between “startup configuration” file and “running configuration”
file?
Demonstrate your work to the instructors before leaving. Signature of the Instructor
Step 1: Subnet the 192.168.100.0/24 network into the appropriate number of subnets.
a. Based on the topology, how many subnets are needed? ................................................
b. How many bits must be borrowed to support the number of subnets in the topology
table? ...............
c. How many subnets does this create? .................................
d. How many usable hosts does this create per subnet? ..................................................
e. Calculate the binary value for the first five subnets. The first subnet is already shown.
Net 0: 192 . 168 . 100 . 0 0 0 0 0 0 0 0
Net 1: 192 . 168 . 100 .
Net 2: 192 . 168 . 100 .
Net 3: 192 . 168 . 100 .
Net 4: 192 . 168 . 100 .
f. Calculate the binary and decimal value of the new subnet mask.
11111111.11111111.11111111.
255 . 255 . 255 .
g. Fill in the Subnet Table, listing the decimal value of all available subnets, the first and last usable
host address, and the broadcast address. Repeat until all addresses are listed.
Subnet Table
Subnet First Usable Host Last Usable Host
Number Subnet Address Address Address Broadcast Address
0
1
2
3
4
5
6
7
Step 2: Assign the subnets to the network shown in the topology.
a. Assign Subnet 0 to the LAN connected to the GigabitEthernet 0/0 interface of R1:…………………
b. Assign Subnet 1 to the LAN connected to the GigabitEthernet 0/1 interface of R1:…………………
c. Assign Subnet 2 to the LAN connected to the GigabitEthernet 0/0 interface of R2:……………………
d. Assign Subnet 3 to the LAN connected to the GigabitEthernet 0/1 interface of R2:……………………
e. Assign Subnet 4 to the WAN link between R1 to R2:………………………………
v. Find Network Address, Broadcast Address and Host Range for the subnet # 121.
Q.2 Given a host with IP address 160.50.145.189/21:
i. Is a host with IP address 160.50.146.210/21 part of the same network? Show calculations.
ii. Is the IP address 160.50.145.255 valid according to the given IP? Why or why not?
iii. What is the first valid host on the subnetwork that the node 172.18.142.179 255.255.254.0
belongs to?
iv. Which subnet does host 192.168.11.198 255.255.255.240 belong to?
v. What is the last valid host on the subnetwork 192.168.98.176 255.255.255.240?
vi. What is the last valid host on the subnetwork 172.25.13.112 255.255.255.240?
vii. How many subnets and hosts per subnet can you get from the network
10.0.0.0 255.255.240.0?
viii. What is the first valid host on the subnetwork that the node 192.168.207.190/28 belongs
to?
Benefits
Reduced Internet access costs: Using automatic IP address assignment at each remote site
substantially reduces Internet access costs. Static IP addresses are considerably more expensive
to purchase than are automatically allocated IP addresses.
Reduced client configuration tasks and costs: Because DHCP is easy to configure, it minimizes
operational overhead and costs associated with device configuration tasks and eases
deployment by nontechnical users.
Centralized management: Because the DHCP server maintains configurations for several
subnets, an administrator only needs to update a single, central server when configuration
parameters change.
3. Instructions
This lab provides an opportunity to revise your understanding of DHCP, and the commands for
configuring DHCP functions on a router. One router is the DHCP server. The other router forwards
DHCP requests to the server.
Task 1: Physical Connections
Create a topology as shown in the following figure (Given as DHCP_WiFi.pkt file):
Task 5: Implement DHCP in router R1 for PC4 and PC5 using the network address 192.168.10.0/24
Do yourself.
Task 7 – Exercise: Configure Wireless router 2 to create a Wireless LAN (Wi-Fi) with SSID CSE324_2.
After an ACL has been properly configured, you can apply it to an interface to filter traffic. The
security appliance can filter packets in both the inbound and outbound direction on an interface.
When an inbound ACL is applied to an interface, the security appliance analyzes packets against the
ACEs after receiving them. If a packet is permitted by the ACL, the firewall continues to process the
packet and eventually passes the packet to the defined interface.
2b. Standard ACLs
Standard access control lists (ACLs) are router configuration scripts that control whether a router
permits or denies packets based on the source address only. Tasks are: defining filtering criteria,
configuring standard ACLs, applying ACLs to router interfaces, and verifying and testing the ACL
implementation.
Example:
Consider the following topology (Given .pkt file):
b. By default, an access list denies all traffic that does not match a rule. To permit all other
traffic, configure the following statement:
R3(config)# access-list 1 permit any
c. For the ACL to actually filter traffic, it must be applied to some router operation. Apply the
ACL by placing it for outbound traffic on the Gigabit Ethernet 0/0 interface.
R3(config)# interface GigabitEthernet0/0
R3(config-if)# ip access-group 1 out
a. Create two access list statements to permit tcp for accessing FTP server at 172.17.100.3
and permit ICMP (ping, etc.) traffic from Library/Study Room (172.16.10.0/24) network
to Server Farm at 172.17.100.0/24. Note that the access list number remains the same
and a specific type of ICMP traffic does not need to be specified.
R1(config)# access-list 100 permit icmp 172.16.10.0 0.0.0.255 host 172.17.100.3 echo
R1(config)# access-list 100 permit tcp 172.16.10.0 0.0.0.255 172.17.100.0 0.0.0.255 eq ftp
Q3. LAB#6 network is not allowed to access Office Server using http/https/browsing, but All other Traffic
is Permitted for Lab#6 Network.
Q4. Office Server will be allowed to access only by Office Network, but all other networks will be
denied. All networks will be allowed to access any other Datacenter Servers.
Note: In the previous task, you could have added the keyword overload to the ip nat inside source list
1 pool MY-NAT-POOL command to allow for more than four concurrent users.
Task 6 – Exercise: Configure STATIC NAT (to access Web Server-2) and DYNAMIC NAT (to access
INTERNET from the LANs connected to R4) in the router R4.
2. Instead of using a browser, write your own HTTP client to test your server. Your client will connect
to the server using a TCP connection, send an HTTP request to the server, and display the server
response as an output. You can assume that the HTTP request sent is a GET method.
The client should take command line arguments specifying the server IP address or host name,
the port at which the server is listening, and the path at which the requested object is stored at the
server. The following is an input command format to run the client.
FTP/Web Metropolis
Server 10.44.1.254 255.255.255.0 Bank HQ
Email/DNS Metropolis
Server 10.44.1.253 255.255.255.0 Bank HQ
NTP/AAA Metropolis
Server 10.44.1.252 255.255.255.0 Bank HQ
File Gotham
Backup Healthcare
Server 10.44.2.254 255.255.255.0 Branch
Objectives
Part 1: Configure the FTP Server
Part 2: Configure the Web Server
Part 3: Configure the Email Server
Part 4: Configure the DNS Server
Part 5: Configure the NTP Server
Part 6: Configure the AAA Server
Background / Scenario
In this activity, you will configure basic server components. The IP addressing configuration is already complete.
You will use the Services tab on multiple servers to deploy FTP, Web, Email, DNS, NTP, and AAA services.
Objectives
Part 1: Send Email between Users
Part 2: Upload and Download Files using FTP
Part 3: Remotely Access an Enterprise Router using Telnet
Part 4: Remotely Access an Enterprise Router using SSH
36 | © 2019 Department of CSE, UIU Version 2.1
Background
In this activity, you will communicate across remote networks using common network services. The IP addressing,
network configuration, and service configurations are already complete. You will use the client devices in the
differing geographic regions to connect to both servers and other client devices.
Objectives
Part 1: Connect to the Web Server
Part 2: Prevent Unencrypted HTTP Sessions
Part 3: Access the Firewall on the Email Server
Background
In this activity, you will access a user within the Metropolis site and connect using HTTP and HTTPS to a remote
Web Server. The IP addressing, network configuration, and service configurations are already complete. You will
use a client device in the Metropolis site to test connectivity to a remote Web Server and then secure the
Metropolis site by preventing unencrypted web sessions from connecting to the outside world.
In this lab, you will create VLANs on both switches in the topology, assign VLANs to
switch access ports, verify that VLANs are working as expected, and then create a VLAN
trunk between the two switches to allow hosts in the same VLAN to communicate through the
trunk, regardless of which switch the host is actually attached to.
Topology
Addressing Table