Download as pdf or txt
Download as pdf or txt
You are on page 1of 71

University of Technology (UoT), Nowshera

LAB MANUAL

Communication Network
Department: Electronics engineering technology

Dr.Engineer Muhammad Israr

Student Name:
Roll Number: NSR/20/ELT/

1
AUTHOR’S DECLERATION

I hereby declare that I am the sole author of this Lab manual. This
is true copy of the manual, including any required final revision. I
understand that this manual may be made electronically available
to the public.

2
ACKNOWLEDGMENT
All praise to Al-Mighty ALLAH, the most beneficent and merciful, who
enabled us to explore the present studies and also to the Holy prophet
Muhammad (SAWW), the source of knowledge and torch of guidance for the
entire world.
We are highly indebted to Dr.Engineer Muhammad Israr for their constant
direction and encouragement in all phases of this Lab Manual. They devoted
numerous hours from their busy schedule for our help. It is only due to their
endless help and support that we have been able to complete this Lab Manual.

3
DEDICATION
All our efforts are dedicated to our beloved parents and teachers who have
been a constant support and source of encouragement for us throughout our
lives. May Allah bless them with long lives and always provide us their loving
and thorough guidance (Ameen).

4
GENERALRULES
 Each person may only use one computer at a time.
 Computers and peripherals are not to be moved or reconfigured without
approval of Lab and Classrooms staff.
 Students may not install software on lab computers. If you have a question
regarding specific software that you need to use, contact the Classroom and
Labs support team.
 The use of tobacco products is not allowed in computer classrooms and labs.
 Food is generally not allowed in computer labs, though some exceptions
may apply. Check with staff to determine THAT lab’s policy.
 Drinks are allowed, as long as they are in no-spill containers.
 Behavior and activities that disturb other users or disrupt the operations of
the lab are not allowed. This includes, but is not limited to: physical
activities such as "rough-housing," loud music, etc.
 Children are only allowed in computer labs if they are well-behaved and
supervised at all times. Children may not use the computers or occupy
workstation areas. At no time are children to be left unattended.
 Remember to log out whenever you are done using any lab computer. SOU
cannot be held responsible for the protection of your data or account when
you leave a computer logged in with your account.
 Violation of any of the above rules may result in disciplinary action and the
loss of lab privileges.

5
GENERAL ELECTRICAL SAFETY PRINCIPLES
When planning and performing work on electrical systems and equipment, keep
these principles in mind:
1. Understand the procedure completely before starting the work.
2. Use good quality footwear/shoes in order to provide maximum resistance.
3. Never take a shock on purpose.
4. Never energize any circuit unless you are sure that no one is working on the
circuit. Give electric supply to the wiring system only after thorough
verification.
5. Before placing a blown fuse always remember to put the switch off.
6. Do not touch switch boards. Main switches, holder points etc. with wet
hands.
7. Do not use broken switches, sockets or plug.
8. Use non-conductive tools whenever possible.
9. Before putting the plug pins in socket put off the plug switch and disconnect
the plug by pulling the plug pin and not by pulling cable.
10. Take utmost care while handling lamps. Lamp holders, switches etc.,
because these materials are brittle.
11. Never drape electrical cords over heat sources.
12. Avoid working on “Live” circuits as much as possible.
13. Check meter test leads for frayed or broken insulation before working with
them.
14. Avoid touching the bare metal clips or tips of test probes.
15. Never use the ohmmeter on a “live” circuit.
16. Never connect an ammeter in parallel with a voltage source.
17. Before beginning work, tie back long hair. And roll up loose sleeves.
18. Know the location and how to operate shut-off switches and/or circuit
breaker panels. Use these devices to shut off equipment in the event of a fire
or electrocution.
19. Don’t over bend cables when pulling them through a bend in a raceway,
often a pressure or squeezing develops causing insulation damage.
20. Avoid touching any grounded objects while working on electrical
equipment.

6
Table of Contents
Lab No. 01 ............................................................................................................................................... 8
Basic PC Network TCP/IP Configuration............................................................................................ 8
Lab No. 02 ............................................................................................................................................. 11
Using ping and tracert command from a Workstation .................................................................... 11
Lab No. 03 ............................................................................................................................................. 18
INTRODUCTION TO PAKCET TRACER .............................................................................................. 18
Lab No. 04 ............................................................................................................................................. 23
To Study the Function of DNS Server in CISCO Packet Tracer .......................................................... 23
Lab No. 05 ............................................................................................................................................. 27
To Study the Function of DHCP Server in CISCO Packet Tracer ........................................................ 27
In addition to the IP address, DHCP also assigns the subnet mask, default gateway address, domain
name server (DNS) address and other pertinent configuration parameters. Request for comments
(RFC) 2131 and 2132 define DHCP as an Internet Engineering Task Force (IETF)- defined standard
based on the BOOTP protocol. Dynamic host configuration protocol simplifies and improves the
accuracy of IP addressing but can raise security concerns. .............................................................. 27
Lab No. 06 ............................................................................................................................................. 31
Design a network have all topologies and three servers (DHCP, DNS, UoT)..................................... 31
Lab No. 07 ............................................................................................................................................. 36
To connect two LANS through a router .......................................................................................... 36
Network switch: ................................................................................................................................ 37
Lab No. 08 ............................................................................................................................................. 40
Introduction to Wireshark and Capturing of Real Time Packets ...................................................... 40
Lab No. 09 ............................................................................................................................................. 44
Creation of data base for Packet Analysis students ........................................................................ 44
Lab No. 10 ............................................................................................................................................. 49
To study the Display Filter and Capture Filter ................................................................................. 49
Lab No. 11 ............................................................................................................................................. 53
Wireshark Lab DNS ........................................................................................................................ 53
Lab No. 12 ............................................................................................................................................. 61
Design Star Topology & Check the Delay of Network & Load on Server .......................................... 61
Lab No. 13 ............................................................................................................................................. 65
Optimization of Network by Connecting Multiple Hubs through a Single Switch ............................ 65
Lab No. 14 ............................................................................................................................................. 68
Blocking a Specific Application through Firewall in OPNET ............................................................. 68

7
Lab No. 01

Basic PC Network TCP/IP Configuration

OBJECTIVES OF THE LAB:


In this lab, we will cover the following topics
• Identify tool used for discovering a computer’s network configuration,
• Gather information, including the connection, host name (PC Name), MAC (Layer2) address, and
TCP/IP
Network Address (Layer 3),
• Compare the network information to that of other PC’s on the network.

ABOUT IPCONFIG
ipconfig (Internet Protocol Configuration) in Microsoft Windows is a console application. It can be
used from MS-DOS shell to display the network settingscurrently assigned and given by a network. This
command can be utilized to verify a network connection as well as to verify network settings.

USAGE:
Ipconfig
[ /? | /all | /renew [adapter] | release [adapter] |

/flushdns | /displaydns |

Options Description
Ipconfig: Displays IP address, gateway address and subnet mask number.

/? Displays help message

/all Displays full configuration information

/release Releases the IP address for the specified adapter

/renew Renew the IP address for the specified adapter

/flushdns Removes the DNS Resolver cache

/displaydns Displays the contents of the DNS Resolver Cache

8
Let’s find the IP (logic) address of your system using ipconfig command. These steps will also help you
find your MAC (hardware) address, DHCP server, DNS server and other useful information
1. Use the Start menu to open the command-prompt:
Start > Programs > Accessories > Command Prompt or
Start>Programs>Command Prompt

2. Type ipconfig and press Enter key. The spelling of the ipconfig is critical, butthe case is not.

The screen shows the IP address, subnet mask and the default gateway. The IP address and the default
gateway should be in the same network or subnet; otherwise this host wouldn’t be able to communicate
outside the network. Thiscan be seen in Figure 1.1.

Figure 1.1: Basic TCP/IP Information

If your IP address is 192.168.x.x, 10.x.x.x, or 172.16.x.x, then you are receiving an internal IP address
from a router or other device. The IP address that the world sees is that of the router. If you are receiving
a 169.254.x.x address, this is a Windows address that generally means your network connection is not
working properly.

TASK 1
a) Record the following TCP/IP information for your computer:

i. IP address: 192.168.43.33

ii. Subnet mask: 255.255.255.0

iii. Default gateway: 192.168.43.43


b) Compare your computer’s TCP/IP configuration to that of others on the LAN and
answer the following questions:

i. Are there any similarities? 255.255.255.0

ii. What is similar about the IP addresses? 192.168.10.1

9
iii. What is similar about the default gateway? 192.168.10.1

iv. Record a couple of the IP addresses (of your nearby hosts)

i. 192.168.10.16

ii. 192.168.10.18

Checking Additional TCP/IP Configuration:


To see more information about your network connection, type ipconfig/all and press Enter key.
Figure 1.2 shows the detailed IP configuration on the screen

Fig: 1.2 TCP IP Detail Information

You would see the following information: the host name (computer name), thePhysical address of this
machine, IP address, subnet Mask, Default Gateway and DNS Servers.

Task 1:
a) Record the additional TCP/IP information for your system (Mac address, and compare your result
with a few nearby computers. What similarities do you see in the physical (MAC) address?

Subnet mask is same


b) Write down your computer’s host name: PC

c) Write down the host names of a couple of other computer:


i) Furqan
ii) Sudais

10
Lab No. 02
Using ping and tracert command from a Workstation

2.1 ABOUT PING

Brief History

The original PING command stood for "Packet Internet Groper", and was a package of diagnostic utilities
used by DARPA personnel to test the performance of the ARPANET. However, the modern Internet Ping
command refers to a program written by Mike Muss in December, 1983, which has since become one of
the most versatile and widely used diagnostic tools on the Internet.

Typical Diagnostic Tests Performed By Ping Command

Some of the internet diagnostic tests performed by ping command are:

• Access – Ping is used to determine whether the remote host is active or inactive. If a certain site is not
pinged, but the other sites can, then it's a pretty good sign that your Internet network is fine and that site is
down. On the other hand, if you can't ping any site, then likely your entire network connection is down
that needs rebooting.

• Time & distance – Another use of Ping command is to determine how long it takes to bounce a packet
off of another site. Thereby giving Internet distance in network terms. For example, a web site hosted on
your neighbor's computer with a different Internet service provider (ISP) might go through more routers
and be farther away in network distance than a site on the other side of the ocean with a direct connection
to the Internet backbone.
If a site seems slow, then ping distance of that site can be compared with that of other Internet sites to find
out whether it is the site, the network, or your system that is slow. You can also compare ping times to get
an idea of which sites have the fastest network access and would be most efficient for downloading,
chatting, and other applications.

• Domain IP address – Typically, Ping command is used to probe a Ip address of domain name, if a
domain name is pinged, then it displays the corresponding IP address in its response. if a domain name is
pinged, then it displays the corresponding IP address in its response.

Working:
Ping command uses a series of Internet Control Message Protocol (ICMP) Echo messages to perform its
operation. It first sends an echo request packet to an address, and then waits for a reply.
The ping is successful only if:
• The echo request gets to the destination, and
• The destination is able to get an echo reply back to the source within a predetermined time called a
timeout. The default value of this timeout is two seconds on Cisco routers.

Usage:

ping [-t] [-n count] [-l size] [-f] [-i TTL] [-r count]
[-w timeout] target name where target name can be either IP Address or host name/domain name.

11
Option Description

Ping the specified host until stopped. To see starts &Continue, type Control-
-t
Break; to stop, type Control-C

-n count (Echo Count) Sends echo packets specified by count; Default is 4

Use to increase or decrease the size of the ICMP


-l size
packets sent in the ping request; Min=0, Max=65500

Records the route of the outgoing packet and the returning packet in the
-r count (Record Route record field;
for Hops)
Min=1, Max=9

Select to send a DO NOT FRAGMENT flag in the packet. The packet will
-f (Set Packet don’t
not be fragmented by Gateways on the route. Use in conjunction with Send
Fragment Flag)
Buffer Size option.

-i TTL (Time to Live)


Sets the number of hops (routers) that the ping request can traverse before it
is discarded. The TTL field in the packet is decremented by one each time it
passes through a router. When the number reaches zero, the router discards
the packet and sends a TTL Expired ICMP message back.

Timeout in milliseconds that ping waits for each


-w timeout
Reply

2.2 EXAMPLES

Example – Ping A Local Host in this example, a local host is pinged to see if the computer is able to send
andreceive information.

12
1. Use the Start menu to open the command-prompt:
Start>Programs>Accessories>Command Prompt or
Start>Programs>Command Prompt

2. Type ping, space, and 192.168.2.x. Press Enter key.


Since Ping uses the Internet Control Message Protocol (ICMP) echo-request and echo-reply feature to
test physical connectivity, it reports on four attempts and gives an indication the reliability of the
connection. Look over the result andverify that the ping was successful. Was the ping successful? If not,
report to the instructor. A successful host ping is shown in Figure 2.1.

Figure 2.1: Ping Information

TASK 01

a) Ping the IP address of the Default Gateway and DNS Servers. Was the result successful?

b) Ping the computer’s loop-back address. Type the following command:


>> ping 127.0.0.1

13
Note: The address 127.0.0.1 is reserved for loop-back testing. If the ping is successful, then TCP/IP is
properly installed and functioning on this computer. Was the ping successful in your case?

Use of Ping Option:

In this example, a website is pinged using its domain Name This Domain Name is resolved into its
respective IP address. Also the ping option: Echo Count (-n count) is used to send only 3 echo packets.
The details are shown in Figure 2.2.

Figure 2.2

Use of Time to Live option


Example – Use of Ping Option: Time to Live
As mentioned above, Time to Live (-i TTL) sets the number of hops that the ping request can traverse
before it is discarded. In order to set hops, knowledge of tracert command is required, which is explained
in Section 2.3. With the help of tracert, any website’s / web server complete route can be determined;
where route consists of maximum number of hops (routers) traversed from source to destination.

1. Type ping, space, -i 3, space, www.google.com sets the TTL to 3.


The TTL gets expired before reaching the server Result can be seen in Figure 2.3.

14
Figure 2.3: Use of Time to Live Ping Option

2. Typetracert, space, and 96.44.142.42 (UoT official website IP Address).


The result of this command is shown in Figure 2.3. It can be seen from the figure that intended website
can be reached by traversing three hops. Thus, a minimum TTL value of three must be specified.

15
TASK 02
a) Ping the UoT Official website (www.uotnowshera.edu.pk ), and apply the following ping options:
i. Using Example for TTL, use ping to set a TTL value to 2 & 1. Show the results and interpret it.
ii. Use the Set Packet Don’t Fragment Flag option for the value of 5 size set to 1500 & 1472.Show the
result & interpret it. Also, test it for buffer sizes other than mentioned.
iii. Use the timeout option
iv. Use the Record Route for Host option

2.3 ABOUT TRACERT


Trace route (tracert) is a command-line utility used to trace the path that an Internet Protocol (IP) packet
takes to its destination from a source. Tracert will determine the path taken to a destination. It does this by
sending Internet Control
Message Protocol (ICMP) Echo Request messages to the destination.

Usage
tracert [-d] [-h maximum hops] [-w timeout] target name
where target name can be either IP Address or host name.

16
Option Description

-d (Do Not Resolve Displays the route using numeric addresses only
Addresses)
rather than showing both IP address and host
names, for faster display.

h maximum hops (Max -. Specifies the maximum number of hops to use for
Hops)
tracing; Default is 30
-w timeout Specifies how long to wait for a reply to each
Request in milliseconds; Default is 4000 [for 4 sec]

TASK 03

Trace the route to the GOOGLE PAKISTAN website by typing:


>> tracert www.google.com.pk

The result shows the complete route to the site, along with the number of hops inthe path.

17
Lab No. 03
INTRODUCTION TO PAKCET TRACER

OBJECTIVES OF THE LAB:

• Cisco Packet Tracer Overview


• Creating Devices
• Making Connections

Cisco Packet Tracer Overview

When you open Packet Tracer, by default you will be presented with the following interface:

This initial interface contains ten components. If you are unsure of what a particular interface
item does, move your mouse over the item and a help balloon will explain the item.

18
1 Menu Bar This bar provides the File, Edit, Options, View, Tools, Extensions,
and Help menus. You will find basic commands such
as Open, Save, Save as Pkz, Print, and Preferences in these
menus.
2 Main Tool Bar This bar provides shortcut icons to the File and Edit menu
commands. This bar also provides buttons
for Copy, Paste, Undo, Zoom, and the Custom Devices Dialog. On
the right, you will also find the Network Information button, which
you can use to enter a description for the current network (or any
text you wish to include).
3 Common Tools Bar This bar provides access to these commonly used workspace
tools: Select, Move Layout, Place Note, Delete, Inspect, Resize
Shape, Add Simple PDU, and Add Complex PDU. See
"Workspace Basics" for more information.
4 Logical/Physical You can toggle between the Physical Workspace and the Logical
Workspace and Workspace with the tabs on this bar. In Logical Workspace, this bar
Navigation Bar also allows you to go back to a previous level in a cluster, create
a New Cluster, Move Object, Set Tiled Background,
and Viewport. In Physical Workspace, this bar allows you to
navigate through physical locations, create a New City, create
a New Building, create a New Closet, Move Object, apply
a Grid to the background, Set Background, and go to the Working
Closet.
5 Workspace This area is where you will create your network, watch simulations,
and view many kinds of information and statistics.
6 Real time /Simulation You can toggle between Real time Mode and Simulation Mode with
Bar the tabs on this bar. This bar also provides buttons to Power Cycle
Devices as well as the Play Control buttons and the Event
List toggle button in Simulation Mode. Also, it contains a clock that
displays the relative Time in Real time Mode and Simulation Mode.
7 Network Component This box is where you choose devices and connections to put into
Box the workspace. It contains the Device-Type Selection Box and the
Device-Specific Selection Box.
8 Device-Type This box contains the type of devices and connections available in
Selection Box Packet Tracer. The Device-Specific Selection Box will change
depending on which type of device you choose.
9 Device-Specific This box is where you choose specifically which devices you want
Selection Box to put in your network and which connections to make.
10 User Created Packet This window manages the packets you put in the network during
Window* simulation scenarios. See the "Simulation Mode" section for more
details.

19
Workspaces and Modes

Procedure
Creating Devices
a. Choose a device type from the Device-Type Selection box
b. Click on the desired device model from the Device-Specific Selection box
c. Click on a location in the workspace to put your device in that location
d. If you want to cancel your selection, press the Cancel icon for that device
e. Alternatively, you can click and drag a device from the Device-Specific Selection box onto the
workspace
f. You can also click and drag a device directly from the Device-Type Selection box and a default device
model will be chosen for you

20
Making Connections

a. To make a connection between two devices, first click the Connections icon from the Device-
Type Selection box to bring up the list of available connections.
b. Then click the appropriate cable type.
c. The mouse pointer will change into a "connection" cursor.
d. Click on the first device and choose an appropriate interface to which to connect.
e. Then click on the second device and do the same.
f. A connection cable will appear between the two devices, along with link lights showing the
link status on each end (for interfaces that have link lights).

21
TASKS:

1. Design a simple peer to peer network us

22
Lab No. 04
To Study the Function of DNS Server in CISCO Packet Tracer

Environment:

CISCO Packet Tracer

Equipment:

One Laptop, one PC, Hub and three server

Domain Name System (DNS).

DNS is a client/server application program used to help other application programs. DNS is used to map a
host name in the application layer to an IP address in the network layer.

NEED FOR DNS


To identify an entity, TCP/IP protocols use the IP address, which uniquely identifies the connection of a
host to the Internet. However, people prefer to use names instead of numeric addresses. Therefore, we
need a system that can map a name to an address or an address to a name.
When the Internet was small, mapping was done using a host file. The host file had only two columns:
name and address. Every host could store the host file on its disk and update it periodically from a master
host file. When a program or a user wanted to map a name to an address, the host consulted the host file
and found the mapping.

Today, however, it is impossible to have one single host file to relate every address with a name and vice
versa. The host file would be too large to store in every host. In addition, it would be impossible to update
all the host files every time there is a change.

One solution would be to store the entire host file in a single computer and allow access to this centralized
information to every computer that needs mapping. But we know that this would create a huge amount of
traffic on the Internet. Another solution, the one used today, is to divide this huge amount of information
into smaller parts and store each part on a different computer. In this method, the host that needs mapping
can contact the closest computer holding the needed information. This method is used by the Domain

23
Name System (DNS).
Domain Name Space
To have a hierarchical name space, a domain name space was designed. In this design the names are
defined in an inverted-tree structure with the root at the top. The tree can have only 128 levels: level 0
(root) to level 127

Label
Each node in the tree has a label, which is a string with a maximum of 63 characters. The root label is a
null string (empty string). DNS requires that children of a node (nodes that branch from the same node)
have different labels, which guarantees the uniqueness of the domain names.

Domain Name
Each node in the tree has a domain name. A full domain name is a sequence of labels separated by dots
(.). The domain names are always read from the node up to the root. The last label is the label of the root
(null). This means that a full domain name always ends in a null label, which means the last character is a
dot because the null string is nothing. Figure 19.3 shows some domain names.

24
Procedure

25
Task:
Design a network in which there are three clients, a DNS server and four servers of different websites.
And search these websites from each client.

26
Lab No. 05
To Study the Function of DHCP Server in CISCO Packet Tracer

Environment:
CISCO Packet Tracer
Requirements:
Software:
Cisco Packet Tracer
Equipment:
1. Two PCs
2. Four servers
3. One switch

Objective:
To see how DHCP (Dynamic Host Configuration Protocol) works. DHCP is an
essential glue protocol that is used to configure your computer with an IP address,
as well as other information.
Explanation:
DHCP stands for dynamic host configuration protocol and is a network protocol
used on IP networks where a DHCP server automatically assigns an IP address and
other information to each host on the network so they can communicate efficiently
with other endpoints.

In addition to the IP address, DHCP also assigns the subnet mask, default gateway
address, domain name server (DNS) address and other pertinent configuration
parameters. Request for comments (RFC) 2131 and 2132 define DHCP as an
Internet Engineering Task Force (IETF)- defined standard based on the BOOTP
protocol. Dynamic host configuration protocol simplifies and improves the
accuracy of IP addressing but can raise security concerns.

DHCP relies on the existence of a DHCP server that is responsible for providing
configuration information to hosts. There is at least one DHCP server for an
administrative domain.

27
At the simplest level, the DHCP server can function just as a centralized
repository for host configuration information. Consider, for example, the problem
of administering addresses in the internetwork of a large company. DHCP saves the network
administrators from having to walk around to every host in the company with a list of addresses
and network map in hand and configuring each host manually.
Instead the configuration information for each host could be stored in the DHCP server and
automatically retrieved by each host when it is booted or connected to the network.
However, the administrator would still pick the address that each host is to receive; he would
just store that in the server. In this model, the configuration information for each host is stored in
a table that is indexed by some form of unique client identifier, typically the hardware address
(e.g., the Ethernet address of its network adaptor).
A more sophisticated use of DHCP saves the network administrator from even
having to assign addresses to individual hosts.

Task:
Connect DHCP, Gmail server in cisco packet tracer.
Procedure:

28
Diagram:

29
30
Lab No. 06
Design a network have all topologies and three servers (DHCP, DNS, UoT).

Environment:
CISCO Packet Tracer

Equipment:
Fourteen Laptops, Twelve switches and three servers.

Defining some topologies:


So for the network topology, we have the bus, star, ring and mesh topology.
Bus Topology:
In this type of topology, a single network cable runs in the building or campus called
the bus or backbone [2]. Each device can be simply connected to the backbone.

Advantages:
 This type of topology is reliable in very small networks
 It is easy to use and understand.
 This also requires the least amount of cables to connect the computers

Disadvantages:
 Because of the fact that any computer in the network can transmit data at any time,
network traffic can slow down a bus.
 Also, each connection between two cables can deteriorate the electrical signal.
 In this type of topology, the bus configuration can
be difficult to find and can cause the whole network to stop working
Star Topology:
In this type of topology, each of the devices on a network connects to a central hub.
This hub acts as a conduit to transmit messages.

31
Advantages:
 In a star topology, if one of the computers fails, it does not affect the others and
this also contributes to its good performance.
 The center of a star network is a good place to diagnose network faults and if one
computer fails, the whole network is not disturbed.
 Replacement or removal of devices can be easily done.
Disadvantages:
 This type of topology is expensive to install as it requires more cable, it costs more
for all network cables must be pulled to one central point.
 This requires more cable length than other types of networking topologies. Since the
network depends upon the hub, or the central node, if it fails to operate, then the
whole network also fails to operate.
Ring Topology:
In a ring topology all of the nodes or devices are connected to the devices on each of
their side.

Advantages:
 In this type of topology, the ring network offers high performance for a small
number of workstations or for larger networks where each station has a similar
workload.
 The ring networks can also span longer distances compared to other types
of networks and these are also easily extendable.
 Unlike a bus topology, there is no signal loss in Ring topology because the tokens are
data packets that are re-generated at each node.

32
Disadvantages:
 This type of topology costs much money, time and effort for its installation.
 If one computer fails, it can affect the whole network and it is difficult to find fault in
the network.
 The whole system is disrupted when computers arebeing added or replaced in the
network.
 This is much slower than an Ethernet network under normal load.

Mesh Topology:
In a mesh topology each device is capable of connecting to any of the devices inside
the network.

Advantages:
 This type of topology yields the greatest amount of redundancy in the event that
One of the nodes fails where network traffic can be redirected to another node.
 This is a good system when it comes to privacy because each computer can interact
with each other anytimewithout the knowledge of the parties that are not involved
in the conversation.
 Here, the network problems are easier to diagnose.
Disadvantages:

 The amount of cable requirement is very high and costly and large numbers of
Input/output ports are required.

Lab Task:
Design the computer Network Topologies in Cisco Packet Tracer.
Design a network have all topologies and three servers (DHCP, DNS, UoT).
Note: be sure that all pcs have access to UoT server.
Diagram of network:

33
Now we send a message to different topology Laptops:

34
At the last the message has been successfully received to the actual laptop:

35
Lab No. 07
To connect two LANS through a router
Environment:
Laptops, switch, router, hub.

Defining:
Purpose: In this lab, we will learn how to create two LANs and connect them with Cisco routers
and switches. Basic commands for Cisco devices are demonstrated in this lab. Upon completing
the Lab, students should know how to create a small office wide network.

Router:
A router is a switching device for networks, which is able to route network packets,
based on their addresses, to other networks or devices. Among other things, they are used for
Internet access, for coupling networks or for connecting branch offices to a central office via
VPN (Virtual Private Network).

36
Network switch:
A network switch connects devices within a network (often a local area
network, or LAN*) and forwards data packets to and from those devices.

Design:

37
Simulation:

38
Connectivity:

39
Lab No. 08

Introduction to Wireshark and Capturing of Real Time Packets

Getting Wireshark:

Wireshark for Windows and Mac OS X can be easily downloaded from its official website. If you are
Linux users, you’ll probably find Wireshark in its package repositories.
Detailed installing steps can be found on the Internet, so this tutorial won’t cover this part.

Running Wireshark:
When you run the Wireshark program, the Wireshark graphical user interface shown in Figure 2
will be displayed. Initially, no data will be displayed in the various windows.

The Wireshark interface has five major components:


• The packet-header details window provides details about the packet selected (highlighted) in
the packet listing window. (To select a packet in the packet listing window
place the cursor over the packet’s one-line summary in the packet listing window and click with
the left mouse button.). These details include information about the Ethernet frame and IP
datagram that contains this packet. The amount of Ethernet and IP-layer detail displayed can

40
be expanded or minimized by clicking on the right-pointing or down-pointing arrowhead to the
left of the Ethernet frame or IP datagram line in the packet details window. If the packet has
been carried over TCP or UDP, TCP or UDP details will also be displayed, which can similarly be
expanded or minimized. Finally, details about the highest level protocol that sent or received
this packet are also provided.
• The packet-contents window displays the entire contents of the captured frame, in both
ASCII and hexadecimal format.
• Towards the top of the Wireshark graphical user interface, is the packet display filter field,
into which a protocol name or other information can be entered in order to filter the
information displayed in the packet-listing window (and hence the packet-header and packet-
contents windows). In the example below, we’ll use the packet-display filter field to have
Wireshark hide (not display) packets except those that correspond to HTTP messages.

Test Run:
The best way to learn about any new piece of software is to try it out! First, you need to know the
network interconnections in the lab. The IP addresses are shown in Table 1 The 11 PCs are connected in
the following fashion. (1 ↔ 2), (3 ↔ 4),(5 ↔ 6),(7 ↔ 8),(9 ↔2),(9 ↔ 1),(10 ↔ 3),(10 ↔ 4),(11 ↔
5),and(11 ↔ 6). For ex (1 ↔ 2) means Pc1 and Pc2 are connected to the same switch. So PC1 and PC2
can communicate with each other. To perform the following steps, identify the two PCs for your test
run.

Do the following;

1.Start up your favorite web browser:

2.Start up the Wireshark software:


You will initially see a window like shown in Figure 3, except that no packet data will be
displayed in the packet listing, packet-header, or packet-contents window, since Wireshark
has not yet begun capturing packets. Make sure you check “Don't show this message again”
and press “ok” on the small dialog box that pops up.

3. To begin packet capture :


Select the Capture pull down menu and select Interfaces. This Will cause the
“Wireshark: Capture Interfaces” window to be displayed.
The network interfaces (i.e., the physical connections) that your computer has to the
network are shown. The attached snapshot was taken from my computer. You may
not see the exact same
entries when you perform a capture in the lab. You will notice that eth0 and eth1 will
be

41
displayed. Click “Start” for interface eth0. Packet capture will now begin - all packets
being sent /
received from/by your computer are now being captured by Wireshark!

4. If you started your Web browser on PC1, you can only connect to PC2
and PC9 (refer to the interconnections listed at the start of this section):
If you want to connect to PC2, refer to Table 1, and identify the IP address of eth0. The
IP address is 10.0.1.3. If you wanted to connect to PC9, the IP address would be
10.0.1.17. While Wireshark is running, enter the URL: http://10.0.1.3/INTRO.htm to
connect to the web server in PC2 and have that page displayed in your browser. In
order to display this page, your browser will contact the HTTP server at 10.0.1.3(PC2)
and exchange HTTP messages with the server in order to download this page. The
Ethernet frames containing these HTTP messages will be captured by Wireshark.

5. After your browser has displayed the intro.html page, stop Wireshark
packet capture by selecting stop in the Wireshark capture window:
This will cause the Wireshark capture window to disappear and the main Wireshark
window to display all packets captured since you began packet capture. The main

Wireshark window should now look similar to Figure 2. You now have live packet data
that contains all protocol messages exchanged between your computer and other
network entities! The HTTP message exchanges with the PC2 web server should
appear somewhere in the listing of packets captured. But there will be m
any other types of packets displayed as well (see, e.g., the many different protocol

types shown in the Protocol column in Figure 2). Even though the only action you took
was to download a web page, there were evidently many other protocols running on
your computer that are unseen by the use.

42
7. Type in “http” (without the quotes, and in lower case – all protocol names are
in lower case in Wireshark):
Type in “http” (without the quotes, and in lower case – all protocol names are in lower case in
Wireshark into the display filter specification window at the top of the main Wireshark
window. Then select Apply (to the right of where you entered “http”). This will cause only
HTTP message to be displayed in the packet-listing window.

8. Select the first http message shown in the packet-listing window:


This should be the HTTP GET message that was sent from your computer (ex. PC1) to the
PC2 HTTP server. When you select the HTTP GET message, the Ethernet frame, IP datagram,
TCP segment, and HTTP message
header information will be displayed in the packet-header window2. By clicking on right
pointing and down-pointing arrows heads to the left side of the packet details window,
minimize the amount of Frame, Ethernet, Internet Protocol, and Transmission Control
Protocol information displayed. Maximize the amount information displayed about the HTTP
protocol. Your Wireshark display should now look roughly as shown in Figure 5 (Note, in
particular, the minimized amount of protocol information for all protocols except HTTP, and
the maximized amount of protocol information for HTTP in the packet-header wind.

Exit Wireshark:
43
Lab No. 09
Creation of data base for Packet Analysis students

OBJECTIVES OF THE LAB:

 Capture packets
 Preferences
 Saving selected packet
 Coloring
 Timing

Start Wireshark:
 Show zero packet capture.

44
Go to capture and select Wi-Fi:

45
Capture only TCP packets:

Capture only UDP packets:

Searching the TCP packets only (Display filter):

46
Option enable click the check box:

Option field (Stop the capture after 10 packets):

47
Resolve field disable:

Coloring of some packets:

48
Lab No. 10
To study the Display Filter and Capture Filter
OBJECTIVES OF THE LAB:

 To understand the basic difference b/w display filter and capture filter.

Description:
In Wireshark, there are capture filters and display filters. Capture filters only keep copies of packets
that match the filter. Display filters are used when you’ve captured everything, but need to cut through
the noise to analyze specific packets or flows.

Capture filters and display filters are created using different syntaxes. Display filters use syntax of
Boolean operators and fields that intuitively describe what you’re filtering on. Display filters aren’t that
hard to write once you’ve created a few. Capture filters use syntax of byte offsets, hex values, and
masks coupled with Booleans to filter. Capture filters are less intuitive, as they are cryptic when
compared to display filters.

Display Filter:

49
Capture TCP packets in display filter:

Capture filter:

50
Capture filter interface:

Capture only TCP packets:

51
Capture TCP packets:

52
Lab No. 11
Wireshark Lab DNS

Run nslookup to obtain the IP address of a Web server in Asia. What is its IPaddress?
ANSWER:I performed nslookup for www.rediff.com. Its IP address is 208.184.138.70

Run nslookup to determine the authoritative DNS servers for a university in


Europe.What is its IP address.
ANSWER: I performed nslookup for a European University in Ioannina Greece. Its IP
address is128.238.29.22

53
Run nslookup so that one of the DNS servers obtained in Question 2 is queried for the mail
servers for Yahoo! mail. What is its IP address?

ANSWER:the IP address of the mail server(s) is18.72.0.3.

Locate the DNS query and response messages. Are then sent over UDP or TCP?
ANSWER:They are sent overUDP.

What is the destination port for the DNS query message? What is the source port of DNS
response message?

54
ANSWER:The destination port for the DNS query is 53 and the source portof the DNS response
is53.

To what IP address is the DNS query message sent? Use ipconfig to determine the IP addressof
your local DNS server. Are these two IP addresses the same?

ANSWER:It’s sent to 192.168.1.1, which is the IP address of one of my local DNSservers.

Examine the DNS query message. What “Type” of DNS query is it? Does the query
message contain any “answers”?
ANSWER:It’s a type A Standard Query and itdoesn’t contain anyanswers.
Examine the DNS response message. How many “answers” are provided? What do
each of these answers contain?
ANSWER:There were 2 answers containing information about the name of the host,
the type of address, class, the TTL, the data length and the IPaddress.
Answers
www.ietf.org: type A, class IN, addr209.173.57.180
Name:
www.ietf.org
Type: A

55
(Host
address)
Class:
IN (0x0001)
Time to live: 30
minutes Data length:
4
Addr: 209.173.57.180
www.ietf.org: type A, class IN, addr209.173.53.180

Name:
www.ietf.org
Type: A
(Host

address)
Class:

IN (0x0001)
Time to live: 30
minutes Data length:
4
Addr: 209.173.53.180

Consider the subsequent TCP SYN packet sent by your host. Does the
destinationIP address of the SYN packet correspond to any of the IP addresses
provided in the DNS response message?
ANSWER:The first SYN packet was sent to 209.173.57.180 which corresponds
to the first IP address provided in the DNS responsemessage.
This web page contains images. Before retrieving each image, does your host issuenew DNS
queries?
ANSWER:No.

56
What is the destination port for the DNS query message? What is the source port of DNS
response message?
ANSWER:The destination port of the DNS query is 53 and the source portof the DNS
response is53.

To what IP address is the DNS query message sent? Is this the IP address of your default
local DNS server?
ANSWER:It’s sent to 192.168.1.1 which as we can see from the ipconfig –all screenshot, is
the default local DNSserver.

Examine the DNS query message. What “Type” of DNS query is it? Does the
querymessage contain any “answers”?
ANSWER: The query is of type A and it doesn’t contain anyanswers.
Examine the DNS response message. How many “answers” are provided? What do
each of these answers contain?
ANSWER:The response DNS message contains one answer containingthe name of the
host, the type of address, the class, and the IPaddress.

Answers
www.mit.edu: type A, class IN,

57
addr18.7.22.83 Name: www.mit.edu
Type: A
(Host
address)
Class: IN
(0x0001)
Time to live: 1
minute Data length: 4
Addr: 18.7.22.83

58
To what IP address is the DNS query message sent? Is this the IP address of your
default local DNS server?
ANSWER:It was sent to 128.238.29.22 which is my default DNSserver.

Examine the DNS query message. What “Type” of DNS query is it? Does the query
message contain any “answers”?

ANSWER:It’s a type NS DNS query that doesn’t contain anyanswers.

Examine the DNS response message. What MIT nameservers does the response message
provide? Does this response message also provide the IP addresses of the MIT
nameservers?ANSWER:The nameservers are bitsy, strawb and w20ns. We can find their IP
addresses if we expand the Additional records field in Wireshark as seenbelow.

To what IP address is the DNS query message sent? Is this the IP address of your default local DNS
server? If not, what does the IP address correspond to?

ANSWER : The query is sent to 18.72.0.3 which corresponds to bitsy.mit.edu.

59
Examine the DNS query message. What “Type” of DNS query is it? Does the query message
contain any “answers”?
ANSWER: It’s a standard type A query that doesn’t contain any answers.
Examine the DNS response message. How many “answers” are provided? What does each of
these answers contain?

ANSWER : One answer is provided in the DNS response message. It contains thefollowing:

Answers

www.aiit.or.kr: type A, class inet, addr


222.106.36.102 Name: www.aiit.or.kr

Type: Host
address Class:
inet

Time to live: 1
hour Data
length: 4

Addr: 222.106.36.102

60
Lab No. 12
Design Star Topology & Check the Delay of Network & Load on Server
OBJECTIVES OF THE LAB:
How to make a Star Topology and Connect with the Server and also checked delay and load on server.

Star Topology:
A star topology is a network topology in which all the network nodes are individually connected to a
central switch, hub or computer which acts as a central point of communication to pass on the messages.
In a star topology, there are different nodes called hosts and there is a central point of communication
called server or hub. Each host or computer is individually connected to the central hub. We can also term
the server as the root and peripheral hosts as the leaves.
In this topology, if nodes want to communicate with a central node, then they pass on the message to the
central server and the central server forwards their messages to the different nodes. Thus, they form a
topology like the representation of a star.

61
Procedure:
 First we open the Opnet software.
 Then opened the software and create a new window to select the project name and scenario and
click OK.
 Then we do some other step then we create a window.
 After that click on topology option and select the rapid configuration and then select the star,
click on next. And create some option this option fill, Click on OK.
 And make the star topology and the center node is switch and other nodes is PC.
 Then back to object Platte tree where to take the server, application config , profile config and
10baseT wire.
 Click on application config >>Edit attributes>>click on application definition>>select the number
of row >>and come to enter application name and click on >>write the name>> then click on
description >>select the database>>click on off create some option click on high load and click
on ok.
 Now click on application profile>>click on Edit attributes>>click on application>>and click on
data access (light) we select high and where come to light so change to this and click on this in
select database application>>and set the profile click OK.
 Now right click on node ad select the “select similar node “when select all nodes.
 Now click on node 1>> Edit attributes>>the first is tick the apply to all>> click on
application>>application support services>>select “all” >>click OK.
 Now click on server>> Edit attributes>>application>>application support profile>>select the
number of row>>none on click>>select” sm-int-profile”>>and click OK.
 Now generate graph. And click on the working place>>create window and choose the “choose
individual DES statistics “click on global>>Ethernet>>delay sec>>and click OK.
 And the server delay how take a load right click on server>> “choose individual DES statistics
“>>Ethernet>>load(packet/sec)>>click on OK.
 Now click the run option>>choose duration of the time and click run.and we show the graph.

62
Scenario Star Topology:

Results:
Ethernet delay:

63
Ethernet load:

64
Lab No. 13
Optimization of Network by Connecting Multiple Hubs through a Single Switch
OBJECTIVES OF THE LAB:
How to optimized the network multiple hubs through a single switch?

Apparatus:
 River bed modeler (OPNET)
 Ethernet timing module
 12 Pcs
 Hub
 Switch

Hub:
A hub is basically a multiport repeater. A hub connects multiple wires coming from different branches,
for example, the connector in star topology which connects different stations. Hubs cannot filter data, so
data packets are sent to all connected devices. In other words, collision domain of all hosts connected
through Hub remains one. Also, they do not have intelligence to find out best path for data packets which
leads to inefficiencies and wastage.

Two types of Hub:


Active Hub: - These are the hubs which have their own power supply and can clean, boost and relay the
signal along with the network. It serves both as a repeater as well as wiring center. These are used to
extend the maximum distance between nodes.

Passive Hub: - These are the hubs which collect wiring from nodes and power supply from active hub.
These hubs relay signals onto the network without cleaning and boosting them and can’t be used to
extend the distance between nodes.

Switch:
A switch is a multiport bridge with a buffer and a design that can boost its efficiency (a large number of
ports imply less traffic) and performance. A switch is a data link layer device. The switch can perform
error checking before forwarding data, that makes it very efficient as it does not forward packets that have
errors and forward good packets selectively to correct port only. In other words, switch divides collision
domain of hosts, but broadcast domain remains same.

65
Scenario of multiple Hubs through single switch:

Results:
Ethernet delay:

66
Traffic sent / received:

Hub collision:

67
Lab No. 14
Blocking a Specific Application through Firewall in OPNET

OBJECTIVES OF THE LAB:


Make a network for the department include multiple system to access a sever to multiple
application. But I want to some application not access so that problem solves by firewall.

Apparatus:
 River bed modeler (OPNET)
 Firewall
 Router
 Pcs
 Server

Firewall:
A firewall is a system designed to prevent unauthorized access to or from a private network. You can
implement a firewall in either hardware or software form, or a combination of both. Firewalls prevent
unauthorized internet users from accessing private networks connected to the internet, especially
intranets. All messages entering or leaving the intranet (the local network to which you are connected)
must pass through the firewall, which examines each message and blocks those that do not meet the
specified security criteria.

Procedure:
 First we open the OPNET
 Create a window click on file >>new>>project =OK>>write a project name and scenario>>OK.
 The Next step is go to topology>>click on object palette>>when open then take application
configuration>>profile configuration>>Ethernet _slip8 _gtway router >>ppp server>>IP 32
clouds>>ppp DS3 wires >>ppp workstation.
 Set of the name of the nodes. And then make this scenario.
 Next step is click on application definition >>edit attributes >> application >> none >>change to
default >> OK.
 Next step is click on profile configuration >> edit attributes >> profile configuration >> none
>>select on “simple profile”>>OK.
 Next step is click on sale A>>select similar nodes>>click edit attribute >>application
>>application support profile >> row=1 and profile name=sales person >>OK.
 Next step is click on server >>edit attributes >> application >>application support services >>
none >> select “All” >>OK.
 Next step is choosing DES and click >>global statistics>>DB Query >> FTP >>HTTP>> OK
 Next step is click sales A>>node statistic>>Client DB Query>> client ftp >> client HTTP>> OK
 Same mothedfor sales B.
 Last step is run and checked the result.

68
Main Interface network:

Data base query response time:

69
Page response time:

Sales A person access:


Data base access:

70
Page response time:

Sales B person access:


Data base and page access:

71

You might also like