CN Lab Cse 230816 091446

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 58

CSB 304

Computer Network

LABORATORY MANUAL

B.Tech. CSE III Year

Prepared by:

Prof. Jyoteesh Malhotra

Department of Electronics and Communication Engineering


National Institute of Technology Delhi
(An autonomous Institute under the aegis of the Ministry of Education, Government of India)
CSB 304 Computer Network

Table of Contents

Sr. No. Particulars Page No.

1. About the Department of ECE 3

2. Program Educational Objectives (PEOs) and 4-5


Program Outcomes (POs)

3. Instruction to students for equipment handling 6-7


and safety
4. List of Lab Experiments 8

5. List of Equipment to be used for the Lab Course 9

6. Additional Assignments and Activities identified 9


by faculty including Mini project and additional
experiments etc.
7. Details of Experiment No:1 To 15 10-57

8. Reference Materials and Books 58

Page 2 of 58
CSB 304 Computer Network

ABOUT THE DEPARTMENT

Bachelor of Technology-ECE
B. Tech ECE programme provides students a strong foundation in the fundamentals of Electronics and
Communications engineering through different courses offered in the B. Tech Curriculum. The program is
supported by relevant, up-to-date curriculum, well equipped labs, and experienced faculty members. The
curriculum has undergone a substantial revision, which incorporates the recent trends in electronics engineering,
information and communication technology, microelectronics and VLSI design, artificial intelligence and internet
of things. Minimum Credits requirements for completion of B. Tech. program is 160 and also offers provision of
Major degree and Minor Degree for students by earning additional credits.

VISION
Create an educational environment to prepare the students to meet the challenges of the modern electronics and
communication industry through state-of-the-art technical knowledge and innovative approaches beneficial to
society.

MISSION
• To promote teaching and learning by engaging in innovative research and by offering state-of-the-art
undergraduate, postgraduate, and doctoral programs.
• To cultivate an entrepreneurial environment and industry interaction, leading to the emergence of creators,
innovators, and leaders.
• To promote co-curricular and extra-curricular activities for the overall personality development of the
students.
• Building of responsible citizens through awareness and acceptance of ethical values.

GOALS
• Effective teaching and learning with continuous improvement in curriculum
• Placements for all graduates and postgraduates
• Quality research publications
• Accreditations of programs offered
• MOU with industry and academia
• R&D projects
• Organization of conferences/FDPs/STCs and Workshops.

Page 3 of 58
CSB 304 Computer Network

Programme Educational Objectives (PEOs)


and
Programme Objectives (POs)

Program Educational Objectives (PEOs)

PEO-1 Engineering Graduates will excel in Electronics & Communication fields both in the industry and
academics by analyzing and applying their knowledge in a professional manner.

PEO-2 Demonstrate multi-disciplinary knowledge and skills to analyze, interpret and create solutions to the real-
life electronics engineering problems.

PEO-3 Embrace capability to expand horizons beyond engineering for creativity, innovation and entrepreneurship.

PEO-4 Imbibe competence and ethics for social and environmental sustainability with a focus on the welfare of
humankind.

Program Outcomes (POs)

PO-1 Engineering Knowledge: Apply the knowledge of mathematics, science, engineering fundamentals, and an
engineering specialization to the solution of complex engineering problems.

PO-2 Problem Analysis: Identify, formulate, review research literature, and analyze complex engineering
problems reaching substantiated conclusions using first principles of mathematics, natural sciences, and
engineering sciences.

PO-3 Design/Development of Solutions: Design solutions for complex engineering problems and design system
components or processes that meet the specified needs with appropriate consideration for the public health and
safety, and the cultural, societal, and environmental considerations

PO-4 Conduct Investigations of Complex Problems: Use research-based knowledge and research methods
including design of experiments, analysis and interpretation of data, and synthesis of the information to provide
valid conclusions.

PO-5 Modern Tool usage: Create, select, and apply appropriate techniques, resources, and modern engineering
and IT tools including prediction and modelling to complex engineering activities with an understanding of the
limitations.

PO-6 The Engineer and Society: Apply reasoning informed by the contextual knowledge to assess societal,
health, safety, legal and cultural issues and the consequent responsibilities relevant to the professional engineering
practice.

PO-7 Environment and Sustainability: Understand the impact of professional engineering solutions in societal
and environmental contexts, and demonstrate the knowledge of, and need for sustainable development.

Page 4 of 58
CSB 304 Computer Network

PO-8 Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms of the
engineering practice.

PO-9 Individual and Team Work: Function effectively as an individual, and as a member or leader in diverse
teams, and in multidisciplinary settings.

PO-10 Communication: Communicate effectively on complex engineering activities with the engineering
community and with society at large, such as being able to comprehend and write effective reports and design
documentation, make effective presentations, and give and receive clear instructions.

PO-11 Project Management and Finance: Demonstrate knowledge and understanding of the engineering and
management principles and apply these to one’s own work, as a member and leader in a team, to manage projects
and in multidisciplinary environments.

PO-12 Life-long learning: Recognize the need for, and have the preparation and ability to engage in independent
and life-long learning in the broadest context of technological change.

Program-Specific Objectives (PSOs)

PSO-1 Capability to analyze the problems and develop solutions in the area of Electronics and Communication.

PSO-2 An ability to make use of acquired technical knowledge for a successful career, and contribution to research
and entrepreneurship.

Page 5 of 58
CSB 304 Computer Network

Instruction to students for equipment handling and safety

General Rules of Conduct in Laboratories:

Do’s
1. All users of the laboratory should comply with the instructions, written or oral, of Faculty/ Teaching
assistants/ Technical staff during the Lab sessions.
2. Every student/scholar needs to make an entry in “DAILY COMPONENTS ISSUE REGISTER” for
using components inside the lab for their respective practical/project/Lab Exam.
3. Every student/scholar needs to make an entry in “COMPONENTS LOAN REGISTER” for taking
components/instruments outside the lab for their respective project with the permission of technical staff.
4. Users are always encouraged/advised to clear and clean their workbench after completion of their
Experiment/project work.
5. Arrange the stools/chairs before leaving after completion of your work in the lab.
6. SWITCH OFF instruments, Power supply and Lights after completion of work.
7. Please treat equipment and fellow users of the laboratory with the appropriate level of care and respect.
8. You are expected to arrive on time and not depart before the end of a lab session.
9. You must ensure that at the end of the laboratory session, all equipment used is stored away where you
found it.
10. You must put all waste/paper etc. in corridor dustbins. Broken components should be returned to the
lab technical staff for safe disposal.

Don’ts
1. Food and/or drinks are not permitted inside the laboratory.
2. Do not remove/replace/change anything from the laboratory without the permission of technical staff.
3. Do not put your bags and/ or your belongings on the worktables.
4. Do not enter a lab without permission from technical staff or faculty.
5. Do not stand on the stools or benches in the laboratory.
6. The use of mobile phones during laboratory sessions is prohibited.
7. The use of email or messaging software for personal communications during laboratory sessions is
prohibited.
8. Playing computer games in laboratories is prohibited.

Page 6 of 58
CSB 304 Computer Network

Specific Safety Rules for Laboratories:


1. You must not damage or tamper with the equipment or leads.
2. You should inspect laboratory equipment for visible damage before using it. If there is a problem with a
piece of equipment, report it to the technical staff.
3. You should not work on circuits where the supply voltage exceeds 30 volts without very specific
approval from your lab supervisor. If you need to work on such circuits, you should contact your supervisor
for approval and instruction on how to do this safely before commencing the work.
4. Do not touch, connect or disconnect any plug or cable without permission of your faculty/technical staff.
5. Do not plug in any external devices like a laptop/mobile charger.
6. Users should not attempt to tamper, open or repair any of the instruments, cabling, air conditioning
or other equipment in the laboratory.
7. Report any broken plugs or exposed electrical wires to your faculty/technical staff immediately.
8. Always use an appropriate stand for holding your soldering iron.
9. Turn off your soldering iron if it is unlikely to be used for more than 10 minutes.
10. Never leave a hot soldering iron unattended.
11. Never touch a soldering iron element or bit unless the iron has been disconnected from the mains and has
had adequate time to cool down.
12. Never strip insulation from a wire with your teeth or a knife, always use an appropriate wire stripping
tool.
13. Users are advised to follow the instructions strictly. Violators may attract strict action against them.
In case, any item(s)/equipment(s) are found missing from the laboratory then the procedure for the fine will
be decided by the competent authority. It may be charged on the whole batch if the guilty person is not
notified/identified by the concerned group.

Page 7 of 58
CSB 304 Computer Network

List of Experiments

Sr. No. Lab Experiments/ Lab Sessions

1. Proficiency in Cisco Packet Tracer exploration and usage.


2. Study basic network commands and Cisco IOS show commands.
3. Hands-On Practice for Preparing Straight and Crossover Cables.
4. Familiarize with Networking Components & Devices.
5. Study IP classification and configure TCP/IP in LAN system.
6. Study various Network topologies.
7. Create Peer-to-Peer network with switch in LAN; enable file transfer between computers.
8. To perform initial switch configuration.
9. To perform initial router configuration.
10. To connect two different LAN using switches and router in Cisco Packet Tracer.
11. To connect 3 different LANs using switches and 2 routers in Cisco Packet Tracer.
12. Implement dynamic (RIP) routing using Cisco Packet Tracer.
13. To implement OSPF protocol of dynamic routing in CLI command line.
14. To implement BGP protocol of dynamic routing in CLI command line.
15. Introduction to IOT in Cisco Packet Tracer.

Page 8 of 58
CSB 304 Computer Network

List of Equipment to be used for the Lab Course

Sr. Name of Equipment Experiment


No. Number
/Details
1. LAN Cable, RJ-45 Connector, Crimping Tool, LAN cable tester, 3
Cable wire stripper, LAN cable cutter

2. Hub, Switch, Router 4


3. Computer system with internet connection 1,2,4-15
4. Computer systems, LAN cables, Switch 1,2,4-15
5. Computer system with Cisco Packet Tracer Software. 1,2,4-15

Additional Assignment and Activities identified by faculty, including Mini projects,


additional experiments, etc.

1. Implement IPv6 addressing and routing within a network topology in Packet


Tracer.
2. Create a virtual private network (VPN) using Packet Tracer.
3. Configure a wireless network using Packet Tracer, including access points,
wireless clients, and a wireless controller.

Page 9 of 58
CSB 304 Computer Network

Experiment No. 1
Aim: Proficiency in Cisco Packet Tracer exploration and usage.

Objectives:

1. Install and set up Cisco Packet Tracer software effectively.


2. Familiarize with the various components and functions of Cisco Packet Tracer.
3. Navigate and utilize the main user interface to simulate and configure network scenarios.

Equipment/Component Required: Cisco Packet Tracer software

Theory: Cisco Packet Tracer is a powerful cross-platform visual simulator created by Cisco that enables the users to create network
topologies and comprehend computer networks practically. It enhances our skills in networking and cybersecurity. It helps the users
imply various communication complexities without requiring dedicated equipment.
This software is available for both linux and Windows desktops. Its is also available as free software that enables the users to practice
various networking components.

Procedure:

Procedure 1:
(1) Login into Cisco networking academy.
(2) Select the RESOURCES from the menu in the upper right portion of your screen.
(3) Click on Download Packet Tracer .
(4) Select the version of packet tracer you require.
(5) Launch packet tracer install program.
(6) Enter email id and password and click on login.

Procedure 2 :
Various icons are as follows :-
1. New – Prompts the creation of a new and blank workspace.

2. Open – Allows the user to open an existing file in the system.

Page 10 of 58
CSB 304 Computer Network

3. Save – This option allows the user to save the current workspace in our desktops.

4. Network Information – This option allows the user to write a short description or note on the network being made.

5. Copy – This option allows the user to copy any selected item from the workspace.

Page 11 of 58
CSB 304 Computer Network

6. Paste – This option allows the user to paste the copied item by the user.

7. Undo – This option allows the user to reverse a move, this rendering the network to its previous state

8. Zoom In – This option allows the user to zoom into the network for better understanding.

Page 12 of 58
CSB 304 Computer Network

9. Zoom Out – This option allows the user to zoom out of the network for better understanding.

10. Viewport – This option allows the user to view current network structure in real time.

11. Select – This option allows the user to a specific item to be moved, copied or deleted from the network.

12. Delete – This option allows the user to remove an item from the network.
Page 13 of 58
CSB 304 Computer Network

13. Note – This option allows the user to create notes in the workspace to easy anyone working on it.

14. Physical - This option allows the user to view the network structure in real time with map view.

Page 14 of 58
CSB 304 Computer Network

15. Networking Devices - This box contains the type of devices and connections available in Packet Tracer. It contains
the Device-Type Selection Box (upper box of icons) and the Device-Specific Selection Box (lower box of icons, the sub-
category of Device-Type Selection Box).

16. Connection Devices – This box contains devices the user can specifically choose add to the network and also connection of the

devices.
17. Connection – This is the connection wires which are available in for the user to make connections for the network.

Procedure 3:
1. Packet tracer is a tool that allows us to simulate real networks.
2. It provides three main menus that allows us to add devices and connect them via cables or wireless,
select, delete, inspect, label or group components within our network and manage our network.
3. The network management menu allows us to open an existing network, save our current network.

CONCLUSION: Packet Tracer is a very useful interface that enables the users to implement various basic topologies of
communicational entities.

Page 15 of 58
CSB 304 Computer Network

Experiment No. 2
Aim: Study basic network commands and Cisco IOS show commands.

Objectives:

1. Implementation of Network Troubleshooting Commands:


- Execute Ping and Traceroute commands using Cisco Packet Tracer.
- Utilize nslookup and pathping commands in cmd.exe to analyze network connectivity.
2. Utilization of Show Commands for Network Analysis:
- Run relevant show commands within the provided network to gather essential information about devices, interfaces, and routing
configurations.
Equipment/Component Required: Cisco Packet Tracer software

Theory:
The following are some Microsoft Windows network commands:
Ping: The ping command verifies IP-level connectivity to another TCP/IP computer by sending Internet Control Message Protocol
(ICMP) Echo Request messages. The receipt of corresponding Echo Reply messages are displayed, along with round-trip times. It is the
primary TCP/IP command used to troubleshoot connectivity, reachability, and name resolution.
Tracert: It sends a series of ICMP echo requests, and the requests TTL increased by 1 each time. This allows the utility to
display the routers through which packets are passing to be identified.

Page 16 of 58
CSB 304 Computer Network

nslookup: It is a UNIX shell command to query Internet domain name servers. It stands for Name Server lookup.
pathping: The pathping command provides information about network latency and network loss at intermediate hops
between a source and destination. It sends multiple Echo Request messages to each router between a source and destination
over a period of time and then computes results based on the packets returned from each router. Other common networking
commands are: netstat, arp, nbtstat, ipconfig, winipcfg, netdiag, route, net, hostname Cisco IOS allows us to control the Cisco
device on which it runs. IOS software contains several commands to configure and control Cisco devices. The show
command is probably the most used command for Cisco IOS. It can be used to fetch any information from the router.

Page 17 of 58
Show arp: It displays the ARP table of the router address to MAC address mappings.
Show flash: It displays information about Flash memory.
Show ip route: It displays the IPv4 routing table of the router.
Show users: It displays all users connected to the router.
Show protocols: It displays status of configured Layer 3 protocols; both parameters are optional.
Show version: It displays information about loaded Cisco IOS software.
Show interfaces: It displays information of all interfaces in the chassis or one specified interface.

Procedure:

TO IMPLEMENT PING AND TRACERT COMMANDS IN CISCO PACKET TRACER –

1. In CPT, build a basic network using routers, switches and PCs.


2. Open Command Prompt on one of the PCs in the network.
3. To ping other PCs, type ping ip address and press Enter.
4. To use tracert, type tracert ip address and press Enter.

TO IMPLEMENT NSLOOKUP AND PATHPING COMMANDS IN COMMAND


PROMPT –

1. Press Windows Key + R, type cmd.exe and hit Enter.


2. Type nslookup in Command Prompt and press Enter. Type the address of the
website and get its IP address. Abort the command after the result is displayed.
3. Type pathping IP address and then press Enter.

For the show arp command –

1. First, create the topology by connecting with specified cables and give the
IP address to all the devices.
2. Then click on router, CLI window, and first create the hostname.

For the show flash command –

1. This command will display the content of flash memory, used space and available
space.
3. Write ‘show’ flash command and the press enter key.

Conclusion: In the last of this practical we can know about what are the IOS commands and how it is used and
their functionality.
CSB 342 Computer Network

Experiment No. 3
Aim Hands-On Practice for Preparing Straight and Crossover Cables.

Objectives:

1. Cable Identification and Study


2. Practical Implementation of Straight and Crossover Cables
3. Testing and Troubleshooting

Equipment/Component Required: LAN Cable, RJ-45 Connector, Crimping Tool, LAN cable tester, Cable wire
stripper, LAN cable cutter.

Theory:
Crimping Tools:
A crimping tool is a device used to conjoin two pieces of metal by deforming one or both of them to hold each
other. The result of the tool's work is called a crimp. An example of crimping is affixing a connector to the end of
a cable. For instance, network cables and phone cables are created using a crimping tool (shown below) to join
RJ-45 and RJ-11 connectors to both ends of phone or Cat 5 cable.

Network Cables:
Network cables are essential components used to establish wired connections between networking devices, such
as computers, switches, routers, and modems. These cables transmit data signals in the form of electrical impulses,
allowing devices to communicate with each other.
Twisted Pair Cables:
Twisted pair cables are the most common type of network cables. They consist of pairs of insulated copper wires
twisted together to reduce interference from external sources and crosstalk between the wires. The two main
categories of twisted pair cables used in networking are Category 5e (CAT5e) and Category 6 (CAT6).
RJ-45 Connector:
The RJ-45 (Registered Jack-45) connector is the standardized connector used for network cables. It has eight pins
that align with the eight wires inside the cable. The connector is crimped onto the cable to establish a secure
connection.

Department of Electronics and Communication Engineering

Page 19 of 58
CSB 342 Computer Network

Straight-Through Cable:
A straight-through cable is the most commonly used type of network cable. It is used to connect different types
of devices, such as a computer to a switch or a router to a modem. Straight-through cables use the same wiring
order on both ends, following either the T568A or T568B standard.

Cross-Wired Cable (Crossover Cable): A cross-wired cable, also known as a crossover cable, is used to connect
similar types of devices directly, such as two computers or two switches. In a crossover cable, the wiring order of
the wires is altered, allowing the devices to transmit and receive signals correctly. The T568A standard is used on
one end, while the T568B standard is used on the other end.

Department of Electronics and Communication Engineering

Page 20 of 58
CSB 342 Computer Network

Straight Cable
Pin 1 orange/white orange/white

Pin 2 Orange Orange


Pin 3 green/white green/white
Pin 4 Blue Blue
Pin 5 blue/white blue/white
Pin 6 Green Green
Pin 7 brown/white brown/white
Pin 8 Brown Brown
Crossover cable

Pin 1 orange/white green/white


Pin 2 Orange Green
Pin 3 green/white orange/white
Pin 4 Blue Blue
Pin 5 blue/white blue/white
Pin 6 Green o or orange
Pin 7 brown/white brown/white
Pin 8 Brown Brown

Procedure:
Understanding Network Cable Components
1. Familiarize yourself with the different components of a network cable, including:
- Copper wires: Twisted pairs of copper wires within the cable, typically color-coded (e.g., orange, green, blue,
brown).
- Insulation: Plastic or rubber material that surrounds and protects the copper wires.
- Jacket: The outermost layer of the cable, providing additional protection and durability.
- RJ-45 Connector: The connector used to attach the cable to networking devices.

Creating a Straight-Through Cable


1. Take a LAN cable of suitable length and use the cable cutter to cut it to the desired length. Make sure the cable
ends are clean and straight.
2. Use the cable wire stripper to remove approximately 1 inch (2.5 cm) of the jacket from both cable ends, exposing
the twisted pairs of copper wires.
3. Untwist the twisted pairs and arrange them according to the T568B wiring standard. The wire color order from
left to right should be:
- Orange/White, Orange, Green/White, Blue, Blue/White, Green, Brown/White, Brown.
4. Trim the wires to ensure they are all the same length, leaving about 0.5 inches (1.3 cm) exposed.

Department of Electronics and Communication Engineering

Page 21 of 58
CSB 342 Computer Network

5. Insert the arranged wires into the RJ-45 connector, ensuring they go all the way to the end of the connector and
are in the correct order.
6. Use the crimping tool to crimp the connector onto the cable, applying firm pressure to ensure a secure
connection.
7. Repeat steps 2-6 for the other end of the cable.
8. Once both ends are crimped, use a LAN cable tester to verify the continuity and functionality of the straight-
through cable.

Creating a Cross-Wired Cable (Crossover Cable)


1. Follow steps 1-5 from Part 2 to strip, untwist, and arrange the wires according to the T568B standard.
2. In a cross-wired cable, the wiring order is different. Swap the positions of the orange and green pairs at one end
of the cable:
- Orange/White, Orange, **Blue/White, Blue**, Green/White, Green, Brown/White, Brown.
3. Trim the wires and insert them into the RJ-45 connector, making sure they are fully inserted and in the correct
order.
4. Crimp the connector using the crimping tool, ensuring a secure connection.
5. Repeat steps 1-4 for the other end of the cable.
6. Test the continuity and functionality of the crossover cable using the LAN cable tester.

Precautions:
1. Safety First: Ensure the lab environment is safe and free from hazards. Handle tools and equipment with care
to avoid injury.
2. Use Proper Tools: Utilize the appropriate tools, such as cable cutters, wire strippers, and crimping tools,
designed for network cable termination.
3. Precision in Cable Cutting: Cut the network cables to the desired length carefully, ensuring clean and straight
cuts. Avoid damaging the wires during the cutting process.
4. Strip the Cable Jacket Correctly: Use a cable wire stripper to remove the jacket from the cable ends. Be cautious
not to nick or cut the wires while stripping.
5. Follow Wiring Standards: Adhere to the T568A or T568B wiring standards consistently for creating straight-
through and cross-wired cables. Mixing the standards can result in connectivity issues.
6. Check Wire Arrangement: Verify that the wires are arranged correctly and fully inserted into the RJ-45
connector before crimping. Incorrect wiring can lead to network connectivity problems.
7. Firm and Secure Crimping: Apply firm and even pressure while crimping the RJ-45 connector onto the cable.
A proper crimp ensures a strong connection between the wires and the connector.
8. Test Cable Continuity: Use a LAN cable tester to check the continuity and functionality of the created cables.
This ensures that the cables are correctly terminated and ready for use.

Conclusion:
We have successfully demonstrated and studied different types of network cables and their components. We have
also practiced creating straight-through and cross-wired (crossover) cables using a crimping tool. This hands-on
experience enhances our understanding of network cables and their role in establishing reliable wired connections
between devices.

Department of Electronics and Communication Engineering

Page 22 of 58
CSB 342 Computer Network

Experiment No. 4
Aim: Familiarize with Networking Components & Devices.

Objectives:

1. Identify and describe various networking components and devices.


2. Understand the functions and roles of LAN adapters, hubs, switches, routers, etc. in a network environment.

Equipment/Component Required: LAN adapters (Ethernet cards), Ethernet cables, Hubs, Switches, Routers,
Computers (with Ethernet ports)

Theory:

1. LAN Adapters (Ethernet Cards):


- Examine the LAN adapter, also known as an Ethernet card, which enables network connectivity on a computer.
- Identify the Ethernet port on the LAN adapter, typically located on the back of the computer.
- Discuss the importance of LAN adapters in establishing wired network connections.

2. Hub:
- Study the hub, a networking device that connects multiple devices in a network.
- Observe the number of ports on the hub, which allow computers to connect through Ethernet cables.
- Explain that hubs operate at the physical layer of the network and broadcast incoming data to all connected
devices.
- Discuss the limitations of hubs, such as increased network congestion and lack of intelligent packet forwarding.

3. Switch:
- Examine the switch, a more advanced networking device that improves upon the limitations of hubs.
- Observe the number of ports on the switch and compare it to the hub.

Department of Electronics and Communication Engineering

Page 23 of 58
CSB 342 Computer Network

- Explain that switches operate at the data link layer and use MAC addresses to intelligently forward packets to
the intended recipient.
- Discuss the benefits of switches, including reduced network congestion and increased network performance.

4. Router:
- Explore the router, a networking device responsible for forwarding data packets between different networks.
- Observe the WAN (Wide Area Network) port and multiple LAN (Local Area Network) ports on the router.
- Explain that routers operate at the network layer and use IP addresses to route packets across networks.
- Discuss the role of routers in connecting multiple networks and enabling communication between them.

Procedure:
HUBS:
1. In Cisco Packet Tracer, select Hubs under Network Devices from the Device-Type Selection Box and drag
Hub-PT from Device-Specific Selection Box onto the workspace.

Department of Electronics and Communication Engineering

Page 24 of 58
CSB 342 Computer Network

2. Select End Devices from the Device-Type Selection Box and then drag PC-PT from-Specific Selection Box
onto the workspace.
3. Select Connections from the Device-Type Selection Box and then Copper Straight through Cable from
Device-Specific Selection Box.
4. Click on the hub and then on PC, connect these via Fast Ethernet ports.Click on the PC, go to the Desktop tab
in the dialog box, click on IP Configuration, and enter the IP address.
5. Click on one of the PC, go to desktop tab then open command prompt and ping all other PCs to check if the
network is working, using the command:
Ping ip address of other computer
6. Select Add Simple PDU from the Common Tools Bar. Click on the PC intended to send the PDU and then
the PC intended to receive it. Switch to Simulation Mode, click on Play under Play Controls to understand the
working of the hub in a step-by step manner.
SWITCHES:
1. In Cisco Packet Tracer, select switches under network devices from the device-type selection box and drag
the required switch from device-specific selection box onto the workspace.
2. Select ’ End Devices’ from the device-type selection box and then drag PC-PT from device-specific selection
box onto the workspace.
3. Select connections from the Device-Type Selection Box and then copper straight through cable from Device-
Specific Selection Box.
4. Click on the switch and then on PC, connect these via Fast Ethernet ports.
5. Click on the PC, go to Desktop tab in the dialog box then click on IP Configuration and enter the IP address
.Then click on one of the PC, go to Desktop tab then open Command Prompt and ping all other PCs to check if
the network is working, using the command:
Ping IP address of the other computer

6. Select add simple PDU from the Common Tools Bar. Click on the PC intended to send the PDU and then the
PC intended to receive it. Switch to Simulation Mode, click on Play under Play Controls to understand the
working of network switch in a step-by-step manner.
ROUTERS:
1. In Cisco Packet Tracer, select Routers under Network Devices from the Device-Type Selection Box and drag
1841 router from Device-Specific Selection Box onto the workspace.
2. Select Switches under Network Devices from the Device-Type Selection Box and drag 2960-24TT switch
from Device-Specific Selection Box onto the workspace.
3. Select End Devices from the Device-Type Selection Box and then drag PC-PT (say PC0) from Device-
Specific Selection Box onto the workspace.
4. Select Connections from the Device-Type Selection Box and then Copper Straight through Cable from
Device-Specific Selection Box. Click on the switch and then on PC0, connect these via Fast Ethernet ports.

Department of Electronics and Communication Engineering

Page 25 of 58
CSB 342 Computer Network

5. Click on the PC0, go to Desktop tab in the dialog box and then click on IP Configuration, enter the IP
Address 192.168.10.2 and Default Gateway 192.168.10.1.
6. Repeat steps 3 to 5 for another PC with IP address 192.168.10.2 to build LAN 1.
7. Build another LAN (say LAN 2) by following steps 2 through 7 with addressing as:
PC2 PC3
IP Address 192.168.10.2 192.168.10.2
Default Gateway 192.168.10.1 192.168.10.1
8. Now, connect the switches with the router using straight through cable via Fast Ethernet ports in the router
and Gigabit Ethernet ports in the switches.
9. Click on the router, go to Config tab and under the Interface menu select Fast Ethernet0/0 and enter the
address of the default gateway of the LAN it is connected to as the IP address and turn on the Port Status.
Repeat for Fast Ethernet 0/1.
10. Click on one of the PC, go to Desktop tab then open Command Prompt and ping all other PCs to check if the
network is working, using the command:
HUB

SWITCH

Department of Electronics and Communication Engineering

Page 26 of 58
CSB 342 Computer Network

Router

Precautions:

- Handle networking devices and cables with care to avoid damage.


- Ensure proper grounding and power connections for devices that require them.

Department of Electronics and Communication Engineering

Page 27 of 58
CSB 342 Computer Network

- Avoid disconnecting or altering network connections while devices are powered on to prevent disruption or
damage.

Conclusion:

We have familiarized ourselves with key networking components and devices, including LAN adapters, hubs,
switches, and routers. We have learned about their functions and observed their physical characteristics. Unlike
hubs, which broadcast the same data from each of its ports and let the devices decide what data they need, a switch
forwards data only to the devices that need it. Routers allow data transmission over different networks whereas
hubs and switches allow data transference within a local network.

Department of Electronics and Communication Engineering

Page 28 of 58
CSB 342 Computer Network

Experiment No. 5
Aim: Study IP classification and configure TCP/IP in LAN system.

Objectives:

1. Study Network IP Classification


2. Configure Host IP, Subnet Mask, and Default Gateway in a System in LAN (TCP/IP Configuration)

Equipment/Component Required: Computers connected to a LAN, LAN switch, and Network cables

Theory:

IP (Internet Protocol) addresses are numerical identifiers assigned to devices on a network to enable
communication between them. IP addresses play a vital role in routing data packets across different networks in
the Internet Protocol suite.

IPv4 (Internet Protocol version 4):


IPv4 is the most widely used version of IP addresses. It consists of a 32-bit address, represented as four octets
separated by periods. Each octet represents 8 bits, allowing for a total of 2^32 (approximately 4.3 billion) unique
IP addresses.

IP Address Classes:
IPv4 addresses are classified into five classes: A, B, C, D, and E. The classes are based on the range of network
addresses and the number of addresses available for hosts within a network.

1. Class A:
- The first octet identifies the network, and the remaining three octets represent hosts.
- The range of Class A addresses is from 1.0.0.0 to 126.0.0.0.
- Class A addresses are typically assigned to large networks.

2. Class B:
- The first two octets identify the network, and the remaining two octets represent hosts.
- The range of Class B addresses is from 128.0.0.0 to 191.255.0.0.
- Class B addresses are commonly assigned to medium-sized networks.

3. Class C:
- The first three octets identify the network, and the last octet represents hosts.
- The range of Class C addresses is from 192.0.0.0 to 223.255.255.0.
- Class C addresses are typically assigned to small networks.

4. Class D:
- Class D addresses are reserved for multicast addresses, used for delivering data to a group of hosts
simultaneously.
- The range of Class D addresses is from 224.0.0.0 to 239.255.255.255.

5. Class E:
- Class E addresses are reserved for experimental or future use.
- The range of Class E addresses is from 240.0.0.0 to 255.255.255.255.

Department of Electronics and Communication Engineering

Page 29 of 58
CSB 342 Computer Network

Subnet Mask:
A subnet mask is a 32-bit value used to divide an IP address into network and host portions. It determines the
network's size and specifies which part of the IP address represents the network and which part represents the
host. The subnet mask is typically represented in dotted decimal notation, like an IP address.

Default Gateway:
The default gateway is the device’s IP address responsible for routing data packets from one network to another.
It acts as the exit point for packets leaving a network and the entry point for packets entering a network. The
default gateway is usually the router’s IP address connected to the local network.

In TCP/IP configuration, setting the host IP address, subnet mask, and default gateway on a system allows it to
communicate with other devices within the network and access resources in other networks through routing.

Understanding IP addresses, subnet masks, and default gateways is essential for designing and troubleshooting
networks, ensuring proper addressing, and establishing effective network communication.

Procedure:

1. Network IP Classification:
- Discuss the concept of IP classification and IP address classes (A, B, C, D, and E).
- Explain the range of IP addresses and their corresponding classes.
- Describe the purpose of IP addresses, subnet masks, and default gateways in TCP/IP networking.
2. TCP/IP Configuration:
- Identify the system to be configured within the LAN.
- Power on the system and ensure it is connected to the LAN via an Ethernet cable.
- Open the network settings on the system, usually found in the Control Panel or Network and Sharing Center.
- Locate the network adapter corresponding to the LAN connection and access its properties.
3. Configuring the Host IP Address:
- Within the network adapter properties, select "Internet Protocol Version 4 (TCP/IPv4)" and click on the
"Properties" button.
- Choose the option to "Use the following IP address."
- Assign an appropriate IP address to the system within the IP address range of the LAN. Ensure the IP address is
unique and not already assigned to another device in the network.
- Enter the subnet mask for the LAN. The subnet mask defines the network portion and host portion of the IP
address.
- Save the changes by clicking "OK."
4. Configuring the Default Gateway:
- Within the same "Internet Protocol Version 4 (TCP/IPv4)" properties window, locate the option to set the default
gateway.
- Enter the IP address of the default gateway, which is typically the router’s IP address in the LAN.
- Save the changes by clicking "OK" and close the network adapter properties.
5. Verifying Configuration:
- Open the command prompt on the system and type the command "ipconfig" to view the system's IP configuration
details.
- Verify that the assigned IP address, subnet mask, and default gateway match the configured values.
- Use the "ping" command to test connectivity to other devices within the LAN by their IP addresses.

Precautions:
- Ensure that all computers in the LAN are properly connected to the LAN switch and powered on.
- Double-check the IP address assigned to the system to avoid conflicts with other devices in the network.
- Use valid IP addresses within the range defined for the LAN.

Department of Electronics and Communication Engineering

Page 30 of 58
CSB 342 Computer Network

- Ensure the subnet mask is correctly entered to establish proper network segmentation.
- Verify the accuracy of the default gateway IP address to ensure proper routing.

Conclusion:
In this lab, we have studied network IP classification and learned how to configure the host IP address, subnet
mask, and default gateway on a system within a LAN. By understanding TCP/IP configuration, we can establish
correct network communication and connectivity. Proper configuration of IP settings is crucial for devices to
communicate effectively within the network.

Department of Electronics and Communication Engineering

Page 31 of 58
CSB 342 Computer Network

Experiment No. 6
Aim: Study various Network topologies.

Objectives:

1. Understand Bus and Star Networks with Ethernet Hubs.


2. Study Bus, Star, Ring, Mesh, and Hybrid Networks with Switches.

Equipment/Component Required: Cisco Packet Tracer software, Network devices (switches, routers, hubs),
Ethernet cables (straight-through, crossover), Computers

Theory:
Network topology is the arrangement of a communication network's elements (links, nodes, etc.). The study of
network topology recognizes eight basic topologies: point-to-point, bus, star, ring or circular, mesh, tree, hybrid,
or daisy chain.

• BUS: A bus network is a network topology in which nodes are directly connected to a common half-duplex link
called a bus. A host on a bus network is called a station.
• STAR: A star network implements computer networks' spoke—hub distribution paradigm. In a star network,
every host is connected to a central hub. One central hub acts as a conduit to transmit messages in its simplest
form. The star network is one of the most common computer network topologies.
• RING: A ring network is a network topology in which each node connects to exactly two other nodes, forming
a single continuous pathway for signals through each node - a ring. Data travels from node to node, with each
node along the way handling every packet.
• MESH: A mesh network is a local network topology in which the infrastructure nodes connect dynamically and
non-hierarchically to as many other nodes as possible and cooperate with one another to efficiently route data
from/to clients.
• TREE: Tree Topology is a topology which has a tree structure in which all the computers are connected like the
branches which are connected with the tree. In the Computer Network, tree topology is called a combination of a
Bus and Start network topology.
• HYBRID: Hybrid networks combine two or more topologies in such a way that the resulting network does not
exhibit one of the standard topologies. Some of the hybrid networks are a tree network (starbus network), star-
ring network, snowflake topology (star network of star networks), hybrid mesh, and hierarchical star.

Procedure:

Bus Topology (hubs):


1. In Cisco Packet Tracer, select hubs under network devices from the device-type selection box and drag three
Hub-PT from the device-specific selection box onto the workspace. Align these horizontally.
2. Select end devices from the device-type selection box and then drag two PC-PT from the device-specific
selection box onto the workspace. Align these vertically with respect to one of the hubs.
3. Select connections from the device-type selection box and then copper straight through cable from the device-
specific selection box. Click on the hub and then on one of the PCs, connect these via Fast Ethernet ports. Repeat
for the other PC.
4. Click on one of the PCs, go to the Desktop tab in the dialogue box, click on IP Configuration, and enter the IP
address. Repeat for the other. Connect the hubs linearly using Copper Cross over cables from Connections.
5. Click on one of the PC, go to desktop tab then open a command prompt and ping another PC to check if the
network is working, using the command: ‘ping IP address of other pc’

Department of Electronics and Communication Engineering

Page 32 of 58
CSB 342 Computer Network

6. Select add simple PDU from the common tools bar. Click on the PC intended to send the PDU and then the PC
intended to receive it. Switch to simulation mode, click on play under play controls to understand the data flow in
a bus network using hubs.

Star Topology (hubs):


1. Select hubs under network devices from the device-type selection box and drag a HubPT from device-specific
selection box onto the workspace.
2. Select end devices from the device-type selection box and then drag five PC-PT from device-specific selection
box onto the workspace.
3. Select connections from the device-type selection box and then copper straight-through Cable from device-
specific selection box. Click on the hub and then on one of the PCs, connect these via Fast Ethernet ports.
4. Click on one of the PCs, go to the desktop tab in the dialog box, click on IP configuration, and enter the IP
address. Click on one of the PCs, go to the desktop tab then open command prompt and ping another PC to check
if the network is working, using the command: ping IP address of other pc.
5. Select Add Simple PDU from the common tools bar. Click on the PC intended to send the PDU and then the
PC intended to receive it. Switch to simulation mode, click on play under play controls to understand the data
flow in a star network using a hub.

Bus Topology (switches):


1. Select switches under network devices from the device-type selection box and drag three switches from device-
specific selection box onto the workspace. Align these horizontally.
2. Select end devices from the device-type selection box and then drag two PC-PT from device-specific selection
box onto the workspace. Align these vertically with respect to one of the switches.
3. Select connections from the device-type selection box and then copper straight through cable from device-
specific selection box. Click on the switch and then on PC, connect these via fast ethernet ports. Repeat for the
other PC.
4. Click on one of the PCs, go to the desktop tab in the dialog box, click on IP configuration, and enter the IP
address. Repeat for the other.
5. Connect the switches linearly using copper cross over cables from connections via fast ethernet ports.
6. Click on one of the PCs, go to the desktop tab, then open command prompt and ping another PC to check if the
network is working, using the command : ‘ping IP address of other pc’.
7. Switch to simulation mode, click on play under play controls to understand the data flow in a bus network using
switches.

Ring Topology (switches):


1. Select switches under network devices from the device-type selection box and drag four switches from device-
specific selection box onto the workspace. Align these as vertices of a closed loop.
2. Select connections from the device-type selection box and then copper cross over cable from device-specific
selection box. Click on a switch and then on another one, connect these via fast ethernet ports. Repeat such that a
closed shape is formed.
3. Select end devices from the device-type selection box and then drag four PC-PT from device-specific selection
box onto the workspace.
4. Click on one of the PCs, go to the desktop tab in the dialog box, click on IP configuration, and enter the IP
address. Repeat for the others.
5. Connect PCs to switches using copper straight through cables from connections via Fast ethernet ports such
that one PC is exclusively connected to one switch.
6. Click on one of the PCs, go to the desktop tab then open command prompt and ping another PC to check if the
network is working, using the command: ‘ping IP address of other pc’.
7. Select add simple PDU from the common tools bar. Click on the PC intended to send the PDU and then the PC
intended to receive it. Switch to simulation mode, click on play under play controls to understand the data flow in
a ring network using switch.

Department of Electronics and Communication Engineering

Page 33 of 58
CSB 342 Computer Network

Star Topology (switches):


1. Select switches under network devices from the device-type selection box and drag a 2960- 24TT switch from
device-specific selection box onto the workspace.
2. Select end devices from the device-type selection box and then drag five PC-PT(s) from device-specific
selection box onto the workspace.
3. Select connections from the device-type selection box and then copper straight through cable from device-
specific selection box. Click on the switch and then on one of the PCs, connect these via fast ethernet ports.
4. Click on one of the PCs, go to the desktop tab in the dialog box, click on IP configuration, and enter the IP
address.
5. Repeat steps 3 and 4 for remaining PCs.
6. Click on one of the PC, go to desktop tab then open command prompt and ping another PC to check if the
network is working, using the command: ping IP address of other pc
7. Select add simple PDU from the common tools bar. Click on the PC intended to send the PDU and then the PC
intended to receive it. Switch to simulation mode, click on play under play controls to understand the data flow in
a star network using switch.

Mesh Topology (switches):


1. Select switches under network devices from the device-type selection box and drag four switches from device-
specific selection box onto the workspace. Align these as vertices of a closed loop.
2. Select end devices from the device-type selection box and then drag four PC-PT from device-specific selection
box onto the workspace.
3. Click on one of the PCs, go to the desktop tab in the dialog box, click on IP configuration, and enter the IP
address. Repeat for the others.
4. Connect PCs to switches using copper straight through cables from connections via fast ethernet ports such that
one PC is exclusively connected to one switch.
5. Click on one of the PCs, go to the desktop tab then open command prompt and ping another PC to check if the
network is working, using the command: ping IP address of other pc . Switch to simulation mode, click on play
under play controls to understand the data flow in a mesh network using switch.

Tree Topology (switches):


1. Select switches under network devices from the device-type selection box and drag three switches from device-
specific selection box onto the workspace. Align these in a hierarchical manner.
2. Select connections from the device-type selection box and then copper cross over cable from device-specific
selection box. Click on a switch and then on another one, connect these via fast ethernet ports. Similarly connect
the other switch also.
3. Select end devices from the device-type selection box and then drag four PC-PT from device-specific selection
box onto the workspace.
4. Click on one of the PCs, go to the desktop tab in the dialog box, click on IP configuration, and enter the IP
address. Repeat for the others.
5. Connect two PCs to switches using copper straight through cables from connections via Fast ethernet ports to
one switch similarly connect the other two with the corresponding switch.
6. Click on one of the PCs, go to the desktop tab then open command prompt and ping another PC to check if the
network is working, using the command: ‘ping IP address of other pc’.

Hybrid Topology (switches):


1. Select switches under network devices from the device-type selection box and drag four switches from device-
specific selection box onto the workspace. Align these as vertices of a closed loop
2. Select end devices from the device-type selection box and then drag four PC-PT from device-specific selection
box onto the workspace.
3. Click on one of the PCs, go to the desktop tab in the dialog box, click on IP configuration, and enter the IP
address. Repeat for the others.

Department of Electronics and Communication Engineering

Page 34 of 58
CSB 342 Computer Network

4. Connect PCs to switches using copper straight through cables from connections via fast ethernet ports such that
one PC is exclusively connected to one switch.
5. For implementing the hybrid topology we have to interconnect various topologies together with consecutive ip
addresses together . Then after implementation we have to prompt ping command from a pc to another pc.

BUS:

RING:

Department of Electronics and Communication Engineering

Page 35 of 58
CSB 342 Computer Network

STAR:

MESH:

Department of Electronics and Communication Engineering

Page 36 of 58
CSB 342 Computer Network

TREE:

HYBRID:

Precautions:
- Ensure that the devices and cables are properly connected.
- Double-check the IP addressing and subnetting configurations to avoid conflicts.
- Save your progress periodically to avoid data loss.

Conclusion:
This lab experiment provided hands-on experience in studying and creating various LAN topologies using
network devices, cables, computers, and the Cisco Packet Tracer software. By simulating different LAN
topologies, we gained practical knowledge of network design, configuration, and the impact of topology choices
on network behaviour.

Department of Electronics and Communication Engineering

Page 37 of 58
CSB 342 Computer Network

Experiment No. 7
Aim: Create Peer-to-Peer network with switch in LAN; enable file transfer between computers.

Objectives:

1. Establish Peer-to-Peer Network Connection using a Switch in a LAN.


2. Connect Computers in the Local Area Network and Transfer Files between systems.

Equipment/Component Required: Two computers, LAN switch, Ethernet cables, Files for transferring, CPT

Theory:

Local Area Network (LAN):


A Local Area Network (LAN) is a network that connects computers and other devices within a limited
geographical area, such as an office, building, or campus. LANs are commonly used for sharing resources and
facilitating communication between connected devices. In a LAN, devices can directly communicate with each
other without the need for internet access.

Switch:
A switch is a networking device that connects multiple devices in a LAN. It operates at the data link layer (Layer
2) of the OSI model and allows devices to communicate with each other by forwarding data packets based on their
Media Access Control (MAC) addresses. Switches provide higher bandwidth and better performance compared
to hubs, as they create separate collision domains for each device.

Peer-to-Peer Network Connection:


A peer-to-peer network is a decentralized network model where computers are connected to each other without a
central server. In this type of network, each computer can act as both a client and a server, allowing users to share
resources directly with each other. Peer-to-peer networks are commonly used in small-scale environments, such
as homes or small offices, where there is no dedicated server.

File Transfer:
File transfer involves copying or moving files from one computer to another within a network. In a LAN, users
can transfer files between computers using various methods, such as network shared folders, File Transfer
Protocol (FTP), or directly copying files between computers. File sharing allows users to access and collaborate
on shared files, enhancing productivity and collaboration within a networked environment.

Procedure:

1. Setup LAN and Connect Computers:


a. Position the LAN switch in a central location accessible to both computers.
b. Connect the LAN switch to a power source.
c. Use Ethernet cables to connect each computer's Ethernet port to an available port on the LAN switch.
d. Ensure all connections are securely made.

2. Verify LAN Connectivity:


a. Power on both computers.
b. Wait for the computers to boot up and establish network connections.
c. Open the command prompt on one computer and use the "ipconfig" command to obtain the IP address of that
computer.

Department of Electronics and Communication Engineering

Page 38 of 58
CSB 342 Computer Network

d. Ping the IP address of the other computer from the command prompt to verify network connectivity. Repeat
the process from the other computer.

3. Configure File Sharing:


a. On both computers, enable file sharing by opening the Control Panel and accessing the Network and Sharing
Center.
b. Click on "Change advanced sharing settings."
c. Enable network discovery, file and printer sharing, and allow Windows to manage homegroup connections.
d. Save the changes.

4. Transfer Files:
a. Select the files you want to transfer from the source computer.
b. Right-click on the selected files and choose the "Copy" option.
c. Open the destination computer's file explorer and navigate to the desired folder where you want to save the
transferred files.
d. Right-click inside the folder and choose the "Paste" option.
e. The files will be copied from the source computer to the destination computer over the LAN connection.

5. Verify File Transfer:


a. Check the destination computer's folder to ensure the transferred files are present.
b. Verify the integrity and completeness of the transferred files by comparing them to the original files on the
source computer.
c. Optionally, transfer files in the opposite direction to ensure bidirectional file sharing.

Precautions:
- Ensure all devices (computers and the switch) are powered off before connecting.
- Double-check the Ethernet cable connections to ensure they are properly seated and secure.
- Verify that both computers have compatible network configurations, such as IP addresses within the same subnet.
- Enable proper firewall settings to allow file sharing between the computers.
- Be cautious when transferring files and avoid unintentionally overwriting or deleting important data.

Conclusion:
We have successfully established a peer-to-peer network connection between two systems using a switch in a
LAN. We connected the computers, verified the LAN connectivity, and configured file-sharing settings. We
demonstrated the ability to share files between the connected systems through file transfer.

Department of Electronics and Communication Engineering

Page 39 of 58
CSB 342 Computer Network

Experiment No. 8
Aim: To perform initial switch configuration.

Objectives:
To configure the following:
1. Hostname
2. Password
3. Banner Message
4. IP address on VLAN1 interface

5. MAC Table

6. Startup – Configuration file and running – configuration file

Equipment/Component Required: Cisco Packet Tracer

Theory:

Hostname:

Specifies the hostname for the ASA or for a context. This name can be up to 63 characters. A hostname must start
and end with a letter or digit, and have as interior characters only letters, digits, or a hyphen. When you set a
hostname for the ASA, that name appears in the command line prompt. If you establish sessions to multiple
devices, the hostname helps you keep track of where you enter commands. The hostname that you optionally set
within a context does not appear in the command line, but can be used by the banner command $(hostname) token.

Password:

Changes the enable password, which lets you enter privileged EXEC mode. By default, the enable password is
blank. The password argument is a case-sensitive password of up to 16 alphanumeric and special characters. You
can use any character in the password except a question mark or a space. This command changes the password
for the highest privilege level. If you configure local command authorization, you can set enable passwords for
each privilege level from 0 to 15. The password is saved in the configuration in encrypted form, so you cannot
view the original password after you enter it. Enter the enable password command without a password to set the
password to the default, which is blank.
Banner messages:
This is used to configure banners on Cisco devices with required banner types.

Procedure:
1. Go to the desktop of the Customer PC, open terminal and click on ok.
2. Go to global configuration mode, enter the command hostname followed by the new hostname, press
enter.
3. Enter the command enable secret followed by the desired password.

Department of Electronics and Communication Engineering

Page 40 of 58
CSB 342 Computer Network

4. Enter the command enable password followed by the desired password. This password cannot be the
same as the secret password.
5. Enter the command console line and hit enter. Now, in the sub-configuration mode enter the command
password followed by desired password then type login in the next line to confirm the password and exit
from the sub configuration mode.
6. Enter the command line vty 0 15 and hit enter. Now, in the sub-configuration mode enter the command
password followed by desired password then type login in the next line to confirm the password and exit
from the sub configuration mode. Enter the command ip default-gateway followed by the IP address of
default gateway.
7. Enter the command interface vlan 1 and hit enter. Now, in the sub-configuration mode enter the command
ip address followed by desired IP address and subnet mask then type no shutdown in the next line to
enable the interface and exit from the sub configuration mode.
8. Enter the command do show running-config to verify the configuration. Press Space to see more details.

Department of Electronics and Communication Engineering

Page 41 of 58
CSB 342 Computer Network

Conclusion: In this experiment, we are able to configure switches with various commands.

Department of Electronics and Communication Engineering

Page 42 of 58
CSB 342 Computer Network

Experiment No. 9
Aim: To perform initial router configuration.

Objectives:
To configure the following:
1. Hostname
2. Password
3. Banner Message
4. IP address on VLAN1 interface
5. Copying and Erasing Configuration
Equipment/Component Required: Cisco Packet Tracer

Theory:
Hostname:
The default router name is "Router." Giving each router a unique name aids in network management by allowing
you to uniquely identify each router within the network. The router’s name is considered the host name and is
displayed in the system prompt. Let's change the hostname from "Router" to "CIM-Router1." Notice that the name
in the system prompt changes immediately after the hostname command is entered.
Passwords:
You can use the password command in line configuration mode to configure a password to restrict access to a
router. Console passwords can be established on individual lines. Remember that passwords are case sensitive.
Passwords can be configured for console terminals or for incoming Telnet sessions. Configure the
password cisco for console line 0. Then exit the EXEC completely and log back into the router. You will be
prompted for the console password you just configured before you can enter user EXEC mode.
Banner messages:
The message-of-the-day banner is displayed at login and is useful for sending startup messages to all connected
terminals. By default, no message is displayed at logon. Enter the banner motd command in global configuration
mode. When using the banner motd command, enter a few blank spaces and then type a delimiting character. The
information typed until the next delimiting character is recognized as the message of the day. Use the pound key
(#) as the delimiting character in this simulation. For the purposes of this exercise, the CIM-SE will accept only a
one-word message of the day. Then exit completely out of the EXEC and re-enter user EXEC mode, and you will
see the message-of-the-day banner displayed.
Procedure:
1. Go to the desktop of the Customer PC, open terminal and click on ok.
2. Go to global configuration mode, enter the command hostname followed by the new hostname, press
enter.
3. Enter the command enable secret followed by the desired password.
4. Enter the command enable password followed by the desired password. This password cannot be the
same as the secret password.
5. Enter the command line console 0 and hit enter. Now, in the sub-configuration mode enter the command
password followed by desired password then type login in the next line to confirm the password and exit
from the sub configuration mode.

Department of Electronics and Communication Engineering

Page 43 of 58
CSB 342 Computer Network

6. Enter the command line vty 0 15 and hit enter. Now, in the sub-configuration mode enter the command
password followed by desired password then type login in the next line to confirm the password and exit
from the sub configuration mode.
7. Enter the command banner motd # then enter the message the is required to be displayed followed by #
sign (delimiter).
8. Enter the command do show running-config to verify the configuration. Press Space to see more details.

Conclusion: In this experiment we are able to configure the router with the help of various
commands.

Department of Electronics and Communication Engineering

Page 44 of 58
CSB 342 Computer Network

Experiment No. 10

Aim : To connect two different LAN using switches and router in Cisco Packet Tracer.

Objectives:

1. Connect two different LANs using switches and a router in Cisco Packet Tracer.
2. Configure IP addressing and subnetting for seamless communication between devices in each LAN and across
the interconnected LANs.
3. Verify network connectivity and perform necessary tests to ensure successful communication between devices
in both LANs.

Equipment/Component Required: Cisco Packet Tracer software, Two switches, One router, Six computers

Procedure:

1. Launch Cisco Packet Tracer:


- Open the Cisco Packet Tracer software on your computer.

2. Design the Network Topology:


- From the "Devices" panel, select two switches, one router, and six computers.
- Drag and drop the switches, router, and computers onto the workspace.
- Arrange the devices in a logical manner, ensuring there is space for interconnections.

3. Connect the Switches to the Router:


- Connect one end of an Ethernet cable to a FastEthernet port on the router.
- Connect the other end of the cable to an Ethernet port on the first switch.
- Repeat the above steps to connect another FastEthernet port on the router to the second switch.

4. Connect Computers to the Switches:


- Connect three computers to each switch using Ethernet cables. Ensure each computer is connected to an available
switch port.

5. Configure the Router and Switches:


- Double-click on the router to access its configuration.
- Assign IP addresses to the router's interfaces connected to the switches. Set the IP address of the interface
connected to the first switch as 192.168.0.1 with a subnet mask of 255.255.255.0. Set the IP address of the
interface connected to the second switch as 192.168.1.1 with the same subnet mask.
- Configure the default gateway on the computers connected to the switches. For computers connected to the first
switch, set the default gateway as 192.168.0.1. For computers connected to the second switch, set the default
gateway as 192.168.1.1.
- Save the configurations.
6. Configure IP Addresses on Computers:
- Double-click on each computer and assign IP addresses within the corresponding LAN's subnet range. For
computers connected to the first switch, assign IP addresses like 192.168.0.2, 192.168.0.3, 192.168.0.4 with a
subnet mask of 255.255.255.0. For computers connected to the second switch, assign IP addresses like
192.168.1.2, 192.168.1.3, 192.168.1.4 with the same subnet mask.

Department of Electronics and Communication Engineering

Page 45 of 58
CSB 342 Computer Network

7. Test Connectivity:
- Power on the devices.
- Open a command prompt on one computer connected to the first switch and ping the IP address of a computer
connected to the second switch. For example, if the IP address of a computer connected to the second switch is
192.168.1.2, ping that IP address from a computer connected to the first switch.
- Repeat the process from a computer connected to the second switch to a computer connected to the first switch.

Precautions:
- Follow proper safety precautions while working with networking devices and software.
- Ensure that the devices are powered off before making any connections.
- Double-check the connections to ensure they are properly seated and secure.
- Verify the IP addressing scheme and default gateway configurations on the router, switches, and computers.
- Troubleshoot any connectivity issues by reviewing the configurations and checking for any misconfigurations
or incorrect cabling.

Conclusion:
In this experiment, we successfully connected two separate LANs using switches and a router in Cisco Packet
Tracer. We established communication between devices in different networks by configuring the appropriate IP
addresses, subnet masks, and default gateways. This setup allows for data transfer and network connectivity
between the LANs, demonstrating the capability of switches and routers in interconnecting networks.

Department of Electronics and Communication Engineering

Page 46 of 58
CSB 342 Computer Network

Experiment No.11
Aim: To connect 3 different LANs using switches and 2 routers in Cisco Packet Tracer.

Objectives:

1. Establish Connectivity between Three Different LANs


2. Implement Routing and Subnetting
3. Verify Network Connectivity and Routing

Equipment/Component Required: Cisco Packet Tracer software, Two switches, Two routers, Four computers.

Procedure:

1. Launch Cisco Packet Tracer:


- Open the Cisco Packet Tracer software on your computer.
2. Design the Network Topology:
- From the "Devices" panel, select two switches, two routers, and four computers.
- Drag and drop the switches, routers, and computers onto the workspace.
- Arrange the devices in a logical manner, ensuring there is space for interconnections.
3. Connect the Switches to the Routers:
- Connect one end of an Ethernet cable to a FastEthernet port on Router 1.
- Connect the other end of the cable to an Ethernet port on the first switch.
- Repeat the above steps to connect Router 2 to the second switch.
4. Connect Computers to the Switches:
- Connect two computers to each switch using Ethernet cables. Ensure each computer is connected to an
available switch port.

5. Configure the Routers and Switches:


- Double-click on Router 1 to access its configuration.
- Assign IP addresses to the interfaces connected to the first switch. Set the IP address of the interface as
192.168.0.1 with a subnet mask of 255.255.255.0.

Department of Electronics and Communication Engineering

Page 47 of 58
CSB 342 Computer Network

- Configure the default gateway on the computers connected to the first switch. Set the default gateway as
192.168.0.1.
- Repeat the above steps for Router 2, configuring the IP address of its interface connected to the second
switch as 192.168.1.1 and the default gateway for computers connected to the second switch as 192.168.1.1.
6. Configure IP Addresses on Computers:
- Double-click on each computer and assign IP addresses within the corresponding LAN's subnet range. For
computers connected to the first switch, assign IP addresses like 192.168.0.2, 192.168.0.3 with a subnet mask of
255.255.255.0. For computers connected to the second switch, assign IP addresses like 192.168.1.2, 192.168.1.3
with the same subnet mask.
7. Connect Routers:
- Connect a serial DCE cable from the Serial0/0/0 port on Router 1 to the Serial0/0/0 port on Router 2. Ensure
the clock rate is set on the DCE end (Router 1).
- Assign IP addresses to the serial interfaces of the routers. Set the IP address of the Serial0/0/0 interface on
Router 1 as 192.168.2.1 with a subnet mask of 255.255.255.0. Set the IP address of the Serial0/0/0 interface on
Router 2 as 192.168.2.2 with the same subnet mask.
8. Configure IP Routing:
- On both routers, enable IP routing to allow traffic between LANs.
- Configure static routes on Router 1 for the LAN connected to the first switch (192.168.0.0/24) and the LAN
connected to Router 2 (192.168.1.0/24). Set the next-hop IP address as 192.168.2.2, the serial interface IP
address of Router 2.
9. Test Connectivity:
- Power on the devices.
- Open a command prompt on a computer connected to the first switch and ping the IP address of a computer
connected to the second switch. For example, if the IP address of a computer connected to the second switch is
192.168.1.2, ping that IP address from a computer connected to the first switch.
- Repeat the process from a computer connected to the second switch to a computer connected to the first
switch.

Precautions:
- Follow proper safety precautions while working with networking devices and software.
- Ensure that the devices are powered off before making any connections.
- Double-check the connections to ensure they are properly seated and secure.
- Verify the IP addressing scheme and default gateway configurations on the routers, switches, and computers.
- Configure the static routes correctly on the routers to ensure proper routing between the LANs.
- Troubleshoot any connectivity issues by reviewing the configurations and checking for any misconfigurations
or incorrect cabling.

Conclusion:
In this experiment, we successfully connected three separate LANs using switches and routers in Cisco Packet
Tracer. By configuring IP addresses, default gateways, and static routes, we established interconnectivity
between the LANs, allowing for communication between devices in different networks.

Department of Electronics and Communication Engineering

Page 48 of 58
CSB 342 Computer Network

Experiment No. 12
Aim : Implement dynamic (RIP) routing using Cisco Packet Tracer.

Objectives:

1. Connect 5 different LANs using 3 different routers in Cisco Packet Tracer.


2. Implement dynamic routing protocol (RIP) to enable automatic exchange of routing information among the
interconnected LANs.

Equipment/Component Required: Cisco Packet Tracer software, Two switches, Three routers, Four computers

Procedure:

1. Launch Cisco Packet Tracer:


- Open the Cisco Packet Tracer software on your computer.
2. Design the Network Topology:
- From the "Devices" panel, select two switches, three routers, and four computers.
- Drag and drop the switches, routers, and computers onto the workspace.
- Arrange the devices in a logical manner, ensuring there is space for interconnections.
3. Connect the Routers and Switches:
- Connect Router 1 to Router 2 using an Ethernet cable. Connect one end of the cable to the Ethernet port of
Router 1 and the other end to the Ethernet port of Router 2.
- Connect Router 1 to Router 3 using an Ethernet cable. Connect one end of the cable to the Ethernet port of
Router 1 and the other end to the Ethernet port of Router 3.
4. Connect Computers to the Switches:
- Connect two computers to the first switch using Ethernet cables. Ensure each computer is connected to an
available switch port.
- Connect the remaining two computers to the second switch using Ethernet cables. Ensure each computer is
connected to an available switch port.

Department of Electronics and Communication Engineering

Page 49 of 58
CSB 342 Computer Network

5. Configure IP Addresses on Routers:


- Double-click on each router to access its configuration.
- In the router configuration window, click on the "Interfaces" tab.
- Select the interface connected to Router 2 in Router 1's configuration window. Set the IP address as 192.168.2.1
and the subnet mask as 255.255.255.0.
- Select the interface connected to Router 3 in Router 1's configuration window. Set the IP address as 192.168.3.1
and the subnet mask as 255.255.255.0.
- Select the interface connected to Router 1 in Router 2's configuration window. Set the IP address as 192.168.2.2
and the subnet mask as 255.255.255.0.
- Select the interface connected to the second switch in Router 2's configuration window. Set the IP address as
192.168.4.1 and the subnet mask as 255.255.255.0.
- Select the interface connected to Router 1 in Router 3's configuration window. Set the IP address as 192.168.3.2
and the subnet mask as 255.255.255.0.
- Select the interface connected to the second switch in Router 3's configuration window. Set the IP address as
192.168.4.2 and the subnet mask as 255.255.255.0.
6. Configure IP Addresses on Computers:
- Double-click on each computer and assign IP addresses within the corresponding LAN's subnet range.
- For the computers connected to the first switch, assign IP addresses like 192.168.0.2, 192.168.0.3, and set the
default gateway as 192.168.0.1.
- For the computers connected to the second switch, assign IP addresses like 192.168.1.2, 192.

168.1.3, and set the default gateway as 192.168.1.1.


7. Configure RIP Routing:
- Click on Router 1 to select it.
- In the router configuration window, click on the "Routing" tab.
- Click on the "Static" button to change it to "RIP".
- Click on the "RIP" tab and enable RIP for each interface by checking the corresponding box.
- Repeat the above steps for Router 2 and Router 3, enabling RIP for their respective interfaces.
8. Test Connectivity:
- Power on the devices.
- Open a web browser on one of the computers connected to the first switch and enter the IP address of another
computer connected to the same switch.
- Repeat the process to test connectivity between computers in different LANs.

Precautions:
- Ensure that the devices are powered off before making any connections.
- Double-check the connections to ensure they are properly seated and secure.
- Verify the IP addressing scheme and default gateway configurations on the routers, switches, and computers.
- Configure RIP correctly on each router, enabling RIP for the appropriate interfaces.
- Troubleshoot any connectivity issues by reviewing configurations and connections.

Conclusion:
In this experiment, we successfully connected four different LANs using two switches, and three routers, and
implemented dynamic routing using the Routing Information Protocol (RIP) in Cisco Packet Tracer. By
configuring RIP on the routers, we enabled the automatic exchange of routing information, allowing devices in
different networks to communicate with each other

Department of Electronics and Communication Engineering

Page 50 of 58
CSB 342 Computer Network

Experiment No. 13
Aim : To implement OSPF protocol of dynamic routing in CLI command line.

Objectives:

1. Implement OSPF Protocol for Dynamic Routing in CLI.


2. Verify OSPF Configuration and Adjacency.
3. Analyze OSPF Route Selection.

Equipment/Component Required: Cisco Packet Tracer software, Three routers, Two switches, Four computers

Theory:
OSPF (Open Shortest Path First) is a dynamic routing protocol used in large-scale networks. It employs the
Dijkstra algorithm to determine the shortest path to a destination network based on link state information. OSPF
uses areas to divide the network into logical groups, and routers exchange link state advertisements (LSAs) to
build a complete view of the network topology.

Procedure:

1. Launch Cisco Packet Tracer:


a. Open Cisco Packet Tracer software on your computer.
2. Build the Network Topology:
a. Drag and drop three routers, two switches, and four computers onto the workspace.
b. Connect the devices using appropriate cables, ensuring proper connectivity.
3. Configure OSPF Protocol:
a. Double-click on Router 1 to open its configuration window.
b. Configure IP addresses on the interfaces of Router 1. For example:
- Interface: GigabitEthernet0/0
- IP Address: 192.168.0.1
- Subnet Mask: 255.255.255.0
c. Repeat the above steps to configure Router 2 and Router 3 IP addresses.
d. Configure OSPF protocol on each router by following these steps:
- Click on the "CLI" tab in the router configuration window.
- Enter the following commands:
#enable
#configure terminal
#router ospf 1
# network 192.168.0.0 0.0.0.255 area 0
- Repeat the above steps for Router 2 and Router 3, adjusting the network statement accordingly.
4. Configure Switches and Computers:
a. Double-click on each switch to open its configuration window.
b. Configure VLANs on the switches and assign interfaces to the respective VLANs.
c. Double-click on each computer to open its configuration window.
d. Configure IP addresses on the computers within the appropriate VLAN subnet.
5. Test Connectivity:
a. Use the "Simulation" mode in Cisco Packet Tracer to test the connectivity between computers.
b. Verify the OSPF configuration by checking the routing tables on each router.
c. Test connectivity between computers connected to different routers to ensure dynamic routing is working
correctly.

Department of Electronics and Communication Engineering

Page 51 of 58
CSB 342 Computer Network

Precautions:
- Pay attention to the proper placement and interconnection of devices in Cisco Packet Tracer.
- Ensure that the IP addresses and subnet masks are correctly configured on routers and computers.
- Verify cable connections to ensure proper connectivity within the network.

Conclusion:
In this experiment, we successfully configured OSPF protocol for dynamic routing using Cisco Packet Tracer. By
implementing OSPF on the routers and establishing connectivity between switches and computers, we were able
to create an efficient network with seamless communication. The OSPF protocol enabled dynamic routing,
allowing for the automatic determination of the shortest paths between networks.

Department of Electronics and Communication Engineering

Page 52 of 58
CSB 342 Computer Network

Experiment No. 14
Aim : To implement BGP protocol of dynamic routing in CLI command line

Objectives:

1. Implement BGP Protocol for Dynamic Routing in CLI.


2. Verify BGP Configuration and Adjacency.
3. Analyze BGP Route Selection.

Equipment/Component Required: Cisco Packet Tracer software, Two routers, Two switches, Four computers

Theory:
BGP (Border Gateway Protocol) is an exterior gateway protocol used for routing between autonomous systems
(AS) in large-scale networks. It is commonly used by Internet Service Providers (ISPs) to exchange routing
information and determine the best path for data transmission. BGP uses a complex set of rules to select the
optimal path based on attributes such as the AS path, path length, and preference.

Procedure:

1. Launch Cisco Packet Tracer:


a. Open Cisco Packet Tracer software on your computer.
2. Build the Network Topology:
a. Drag and drop two routers, two switches, and four computers onto the workspace.
b. Connect the devices using appropriate cables, ensuring proper connectivity.

3. Configure BGP Protocol:


a. Double-click on Router 1 to open its configuration window.
b. Configure IP addresses on the interfaces of Router 1. For example:
- Interface: GigabitEthernet0/0

Department of Electronics and Communication Engineering

Page 53 of 58
CSB 342 Computer Network

- IP Address: 192.168.0.1
- Subnet Mask: 255.255.255.0
c. Repeat the above steps to configure IP addresses for Router 2.
d. Configure BGP protocol on each router by following these steps:
- Click on the "CLI" tab in the router configuration window.
- Enter the following commands:
#enable
#configure terminal
#router bgp 100
#neighbor 192.168.0.2 remote-as 200
#network 192.168.0.0 mask 255.255.255.0
- Repeat the above steps for Router 2, adjusting the neighbor IP and remote AS number accordingly.

4. Configure Switches and Computers:


a. Double-click on each switch to open its configuration window.
b. Configure VLANs on the switches and assign interfaces to the respective VLANs.
c. Double-click on each computer to open its configuration window.
d. Configure IP addresses on the computers within the appropriate VLAN subnet.

5. Test Connectivity:
a. Use the "Simulation" mode in Cisco Packet Tracer to test the connectivity between computers.
b. Verify the BGP configuration by checking the routing tables on each router.
c. Test connectivity between computers connected to different routers to ensure dynamic routing is working
correctly.

Precautions:
- Pay attention to the proper placement and interconnection of devices in Cisco Packet Tracer.
- Ensure that the IP addresses and subnet masks are correctly configured on routers and computers.
- Verify cable connections to ensure proper connectivity within the network.

Conclusion:
In this experiment, we successfully configured the BGP protocol for dynamic routing using the CLI command
line in Cisco Packet Tracer. By implementing BGP on the routers and establishing connectivity between switches
and computers, we were able to create an efficient network with seamless communication. The BGP protocol
enabled dynamic routing between autonomous systems, allowing for the selection of optimal paths for data
transmission.

Department of Electronics and Communication Engineering

Page 54 of 58
CSB 342 Computer Network

Experiment - 15
Aim: Introduction to IOT in Cisco Packet Tracer.

Objective:
1. IOT Server Configuration.
2. Registration of IOT devices .
3. Understanding the functionality of IOT based networks.

Theory:
The term Internet of Things generally refers to scenarios where network connectivity and computing capability
extends to objects, sensors and everyday items not normally considered computers, allowing these devices to
generate, exchange and consume data with minimal human intervention. There is, however, no single, universal
definition.

Procedure:
1. Write the ip address of the server, webcam and motion detector respectively.
2. Go to server services >IoT and on the services option.
3. In the desktop option click on sign up now to create an IoE account.
4. Add username and password to both the IoT devices in the configuration option.
5. Now sign in to your IoE account and add the respective conditions.

Department of Electronics and Communication Engineering

Page 55 of 58
CSB 342 Computer Network

Department of Electronics and Communication Engineering

Page 56 of 58
CSB 342 Computer Network

Conclusion: In this practical we are able to know about what are the IOS devices and how they are used and
their functionality.

Department of Electronics and Communication Engineering

Page 57 of 58
CSB 342 Computer Network

Reference Materials and Books


1. Computer Network, 4e, by Andrew S. Tenenbaum, Pearson Education/ PHI.

2. Data Communication & Networking by Forouzan, Tata McGraw Hill

3. Kurose and Ross, “Computer Networking- A Top-Down Approach”, Pearson.

Department of Electronics and Communication Engineering

Page 58 of 58

You might also like