Download as pdf or txt
Download as pdf or txt
You are on page 1of 38

Guru Tegh Bahadur Institute of

Technology

Computer Networks
Practical File
SUBMITTED TO: - Mrs. Meenakshi Sihag
NAME: - Jatin Mittal
BRANCH: - IT-2
ENROLLMENT NO: - 10113203121
Experiment – 1
Aim: To study different types of network cables and practically implement the
cross-wired cable and straight through cable using clamping tool
Apparatus (Components): RJ-45 connector, Clamping Tool, Twisted pair Cable.
Theory:
Twisted Pair Cable - Twisted pair is a physical media made up of a pair of cables
twisted with each other. A twisted pair consists of two insulated copper wires
arranged in a regular spiral pattern. The degree of reduction in noise interference
is determined by the number of turns per foot. Increasing the number of turns per
foot decreases noise interference. The frequency range for twisted pair cable is
from 0 to 3.5KHz.
Types of Twisted Pair Cables:
1. Unshielded Twisted Pair (UTP): UTP consists of two insulated copper wires
twisted around one another. It is used for in telecommunication.
2. Shielded Twisted Pair (STP): A shielded twisted pair is a cable that contains
the mesh surrounding the wire that allows the higher transmission rate.
Network cables (Cat5e or Cat6): These are types of Ethernet cables used to
transmit data over a wired network. Cat5e (Category 5e) and Cat6 (Category 6)
cables are standards for Ethernet cables, with Cat6 being the newer and higher
performing standard. They are used to connect devices such as computers,
routers, switches, and other networking equipment to create a wired network
connection.
Clamping tool: This is a tool used to attach connectors to the ends of network
cables. It typically has a mechanism that allows it to strip the outer insulation of
the cable and crimp the connector onto the exposed wires, creating a secure
connection. Clamping tools are essential for creating custom Ethernet cables and
terminating the ends of network cables with RJ-45 connectors.
RJ-45 connectors: These are connectors that are used to terminate the ends of
network cables, specifically Ethernet cables. They have eight pins that are used to
transmit data signals over the wires inside the network cable. RJ45 connectors are
commonly used in networking applications and are compatible with both Cat5e
and Cat6 cables.
Procedure: To do these practical following steps should be done:
1. Start by stripping off about 2 inches of the plastic jacket off the end of the
cable. Be very careful at this point, as to not nick or cut into the wires, which are
inside. Doing so could alter the characteristics of your cable, or even worse render
is useless. Check the wires, one more time for nicks or cuts. If there are any, just
whack the whole end off, and start over.
2. Spread the wires apart, but be sure to hold onto the base of the jacket with
your other hand. You do not want the wires to become untwisted down inside the
jacket. Category 5 cable must only have 1/2 of an inch of 'untwisted' wire at the
end; otherwise, it will be 'out of spec'. At this point, you obviously have ALOT
more than 1/2 of an inch of un-twisted wire.
3. You have 2 end jacks, which must be installed on your cable. If you are using a
pre-made cable, with one of the ends whacked off, you only have one end to
install - the crossed over end. Below are two diagrams, which show how you need
to arrange the cables for each type of cable end. Decide at the point which end
you are making and examine the associated picture below.
Experiment – 2
Aim: To study different Network devices like Hub, Bridge, Switch, Router, Repeater,
Gateways etc. in Detail.
Hub -
A hub is basically a multiport repeater. A hub connects multiple wires coming from
different branches, for example, the connector in star topology which connects
different stations. Hubs cannot filter data, so data packets are sent to all
connected devices. In other words, collision domain of all hosts connected
through Hub remains one. Also, they do not have intelligence to find out best path
for data packets which leads to inefficiencies and wastage. Hub is a generic term,
but commonly refers to a multiport repeater. It can be used to create multiple
levels of hierarchy of stations. The stations connect to the hub with RJ-45
connector having maximum segment length is 100 meters. This type of
interconnected set of stations is easy to maintain and diagnose. Figure shows how
several hubs can be connected in a hierarchical manner to realize a single LAN of
bigger size with a large number of nodes.
Figure Hub as a multi-port repeater can be connected in a hierarchical manner to
form a single LAN with many nodes.

Bridge -
A bridge operates at data link layer. A bridge is a repeater, with add on
functionality of filtering content by reading the MAC addresses of source and
destination. It is also used for interconnecting two LANS working on the same
protocol. It has a single input and single output port, thus making it a 2 port
device. The device that can be used to interconnect two separate LANs is known
as a bridge. It is commonly used to connect two similar or dissimilar LANs as
shown in Fig. 6.1.4. The bridge operates in layer 2, that is data-link layer and that
is why it is called level-2 relay with reference to the OSI model. It links similar or
dissimilar LANS, designed to store and forward frames, it is protocol independent
and transparent to the end stations. The flow of information through a bridge is
shown in Fig. 6.1.5. Use of bridges offer a number of advantages, such as higher
reliability, performance, security, convenience and larger geographic coverage. But
it is desirable that the quality of service (QOS) offered by a bridge should match
that of a single LAN. The parameters that define the QOS include availability,
frame mishaps, transit delay, frame lifetime, undetected bit errors, frame size and
priority. Key features of a bridge are mentioned below:
1. A bridge operates both in physical and data-link layer
2. A bridge uses a table for filtering/routing
3. A bridge does not change the physical (MAC) addresses in a frame
4. Types of bridges:
a. Transparent Bridges
b. Source routing bridges
A bridge must contain addressing and routing capability. Two routing algorithms
have been proposed for a bridged LAN environment. The first, produced as an
extension of IEEE 802.1 and applicable to all IEEE 802 LANs, is known as
transparent bridge. And the other, developed for the IEEE 802.5 token rings, is
based on source routing approach. It applies to many types of LAN including token
ring, token bus and CSMA/CD bus.
Routers -
A router is a device like a switch that routes data packets based on their IP
addresses. Router is mainly a Network Layer device. Routers normally connect
LANS and WANs together and have a dynamically updating routing table based on
which they make decisions on routing the data packets. Router divide broadcast
domains of hosts connected through it. A router is used to route data packets
between two networks. It reads the information in each packet to tell where it is
going. If it is destined for an immediate network, it has access to, it will strip the
outer packet (IP packet for example), readdress the packet to the proper ethernet
address, and transmit it on that network. If it is destined for another network and
must be sent to another router, it will re-package the outer packet to be received
by the next router and send it to the next router. Routing occurs at the network
layer of the OSI model. They can connect networks with different architectures
such as Token Ring and Ethernet. Although they can transform information at the
data link level, routers cannot transform information from one data format such
as TCP/IP to another such as IPX/SPX. Routers do not send broadcast packets or
corrupted packets. If the routing table does not indicate the proper address of a
packet, the packet is discarded. There are two types of routers: 1. Static routers -
Are configured manually and route data packets based on information in a router
table. 2. Dynamic routers - Use dynamic routing algorithms. There are two types
of algorithms: 0 Distance vector - Based on hop count, and periodically broadcasts
the routing table to other routers which takes more network bandwidth especially
with more routers. RIP uses distance vectoring. Does not work on WANs as well as
it does on LANS. o Link state - Routing tables are broadcast at startup and then
only when they change. The open shortest path first (OSPF) protocol uses the link
state routing method to configure routes or distance vector algorithm (DVA).
• A crossover cable has different ends.
• A straight-thru is used as a patch cord in Ethernet connections.
• A crossover is used to connect two Ethernet devices without a hub or for
connecting two hubs.
• A crossover has one end with the Orange set of wires switched with the Green
set.
• Odd numbered pins are always striped; even numbered pins are always solid
colored.
• Looking at the RJ-45 with the clip facing away from you, Brown is always on the
right, and pin 1 is on the left.
• No more than 1/2" of the Ethernet cable should be untwisted otherwise it will
be susceptible to crosstalk.
• Do not deform, do not bend, do not stretch, do not staple, do not run parallel
with power cables, and do not run Ethernet cables near noise inducing
components.
Common routing protocols include:
• IS-IS -Intermediate system to intermediate system which is a routing protocol for
the OSI suite of protocols.
• IPX - Internet Packet Exchange. Used on Netware systems. Link Services protocol
Uses OSPF algorithm and
• NLSP – Netware Link Services protocol - Uses OSPF algorithm and is replacing
IPX to provide internet capability.
• RIP - Routing information protocol uses a distance vector algorithm.

Switch -
A switch is a multiport network device with a buffer and design that can improve
its efficiency (having a large number of ports means less traffic) and performance.
A switch is a networking device that operates at the data link layer. A switch has
numerous ports into which computers can be plugged. When a data frame arrives
at any network switch port, it evaluates the destination address (destination MAC
address), performs the necessary checks, and sends the frame to the associated
device. The switch performs error checking before forwarding the data, making it
very efficient because it does not forward packets with errors and only forwards
good packets to the correct port. The working of the switch can easily be
illustrated by the diagram given below in which Host A wants to send some data
to Host B.
Types of Switches
There are generally four types of switches.
Managed Switch:
These are expensive switches used in organizations with large and complex
networks because these types of switches can be customized to augment the
functionalities of a standard switch. Augment functionalities like QoS (Quality of
Service) enhancements such as higher security levels, better precision control, and
complete network management. Despite their high cost, they are preferred in
growing organizations due to their scalability and flexibility.
Unmanaged Switch:
These are low-cost switches that are commonly found in home networks and
small businesses. They can be easily set up by simply connecting to the network,
and they will immediately begin operating. They are called "U" managed because
they do not need to be configured or monitored.
LAN Switch:
LAN switches connect devices on an organization's internal LAN. They are also
known as Ethernet switches or data switches. These switches are especially useful
for alleviating network congestion or bottlenecks. They allocate bandwidth in such
a way that data packets in a network do not overlap.
POE Switch:
PoE Gigabit Ethernets uses Power over Ethernet (PoE) switches. Devices linked to
it can receive energy and data over the same line thanks to PoE technology, which
combines data and power transmission over the same connection.
Gateway -
A gateway is a network node in telecommunications that connects two networks
that use different transmission protocols. Gateways serve as network entry and
exit points because all data must pass through or communicate with the gateway
before being routed. Traffic that does not go through at least one gateway in most
IP-based networks is traffic between the nodes on the same local area network
(LAN) segment. The primary benefit of using a gateway in personal or business
scenarios is that it consolidates internet connectivity into a single device. A
gateway node in the enterprise can also serve as a proxy server and a firewall.

Types of Gateways
Gateways can be classified into two types based on the direction of flow.
Unidirectional Gateways:
These gateways allow alerts to go in only one direction. Changes that are made in
the source Object Server are replicated in the destination Object Server or
application, while changes made in the destination Object Server or application
are not duplicated in the source Object Server. Unidirectional gateways can be
thought of as archiving tools.

Bidirectional Gateways: These gateways enable alerts to be sent from the source
Object Server to the target Object Server or application, as well as feedback to the
source. Changes to the contents of a source Object Server are replicated in a
destination Object Server or application in a bidirectional gateway configuration.
The destination ObjectServer or application replicates its alerts in the source
ObjectServer.
Gateways can be classified into five types based on functionalities.
Network Gateway:
This is the most common gateway type, serving as an interface between two
disparate networks that use different protocols. When the term gateway is used
without specifying the type, it refers to a network gateway.
Cloud Storage Gateway:
This type of gateway translates storage requests into API calls to various cloud
storage services. It enables organizations to integrate private cloud storage into
applications without migrating to a public cloud.
IoT Gateway:
This type collects sensor data from IoT devices, translates sensor protocols, and
processes sensor data before sending it.
Internet-To-Orbit Gateway (120):
It connects Internet devices to satellites and spacecraft in orbit around the Earth.
Project HERMES and the Global Educational Network for Satellite Operations are
two prominent 120 gateways (GENSO).
VoIP Trunk Gateway:
This type of gateway makes it possible to use traditional telephone service
equipment with a voice over IP (VoIP) network, such as landline phones and fax
machines.

Repeater-
A repeater is a two-port device that operates at the physical layer. It is used to
regenerate the signal over the same network before it becomes too weak or
corrupted, allowing the signal to be transmitted for a longer distance over the
same network. It is important to understand that repeaters do not amplify the
signal. When the signal weakens, repeaters copy it bit by bit and regenerate it at
its original strength.
Types of Repeaters
On the basis of signals that repeaters generate.
Analog Repeaters: In an analog repeater, data is transmitted through analog
signals to increase its amplitude. These repeaters are used in trunk lines to
help broadcast multiple signals using frequency division multiplexing (FDM).
It houses the linear amplifier as well as the filters.
Digital Repeaters: In a digital repeater, data is transmitted in the form of
binary digits such as Os and 1s. While transmitting data, 0 and 1 values are
generated, and it is capable of transmitting data over long distances.
Based on the types of connected networks.
Wired Repeaters: These repeaters are commonly used in wired Local Area
Networks.
Wireless Repeaters: They are commonly used in wireless LANS and cellular
networks.

Based on the domain of LAN networks.


Local Repeaters: They link LAN segments that are only slightly apart.
Remote Repeaters: They connect LANs that are located far away.
Experiment – 3
Aim: To study Network IP Address. Classification of IP Addresses (Classful and
Classless) along with Subnetting and Super netting.

NETWORK IP ADDRESS:
An IP address is the identifier that enables your device to send or receive data
packets across the internet. It holds information related to your location and
therefore making devices available for two-way communication. The internet
requires a process to distinguish between different networks, routers, and
websites. Therefore, IP addresses provide the mechanism of doing so, and it forms
an indispensable part in the working of the internet. You will notice that most of
the IP addresses are essentially numerical. Still, as the world is witnessing a
colossal growth of network users, the network developers had to add letters and
some addresses as internet usage grows.
An IP address is represented by a series of numbers segregated by periods(.). They
are expressed in the form of four pairs - an example address might be
255.255.255.255 wherein each set can range from 0 to 255.
IP addresses are not produced randomly. They are generated mathematically and
are further assigned by the IANA (Internet Assigned Numbers Authority), a
department of the ICANN.
ICANN stands for Internet Corporation for Assigned Names and Numbers. It is a
non-profit corporation founded in the US back in 1998 with an aim to manage
Internet security and enable it to be available by all.
Classful Addressing
In its initial days, IP addresses use the concept of classful addressing which splits
the available address space into five classes A, B, C, D & E. IPv4 addresses are
represented using 32-bit addresses. The 32-bit IPv4 address is also referred to as
the 4-byte address or 4- octet address. So, we can conclude that the address
space of IPv4 is 232 which is equal to 4,294,967,296.
Generally, the IPv4 addresses are expressed using the binary. notation or dotted
decimal notation or hexadecimal notation. The first few bits of binary notation of
IPv4 addresses recognizes the class of the address whereas, in dotted-decimal
notation of IPv4 address the value of the first byte recognizes the class of the
address. As you can see the image below, the first byte of each class denotes the
range of addresses in each class.

Dotted Decimal Notation


The classful addressing concepts divide the address space into a fixed number of
blocks and each block has a fixed number of hosts. In IPv4 addresses of class A, B
& C the first part of the address is considered as net-id (Network id) and the
second part of the address is called host- id. The size of these parts varies with the
classes.
Net-id: The net-id denotes the address of the network. Host-id: The hoist-id
denotes the address of the host attached to the corresponding network.
In Class A, the net-id is defined by the first byte of the address. And the rest 3
bytes defines the host-id.
In Class B, the first two bytes of the address defines the network address and the
rest two bytes defines the host-id.
In Class C the first three bytes defines the network address and the last byte
defines the host-id.

Classes of Classful address


Class A
The network id of class A is defined by the first byte of the 32-bit IPv4 address. In
class A, the first bit of the net-id stays 'O' to define that the IPv4 address belongs
to the class A and the other 7 bits of the net-id can be changed to defines different
blocks in class A. As the first bit is preserved the remaining seven bits calculate the
number of blocks in the class A i.c. 27- 128 blocks. There are 128 blocks in class A,
as the addressing would start from 0 the range of blocks will be from 0-127.
The host-id in class A is defined by the remaining three bytes of the IPv4 address
which is equal to 24 bits. So, we can calculate the number of hosts for each block
as 224-16,777,216. So, we conclude that we can assign 128 blocks from class A to
128 organizations where each organization can have 16,777,216 hosts connected
to the network.

Now, as we have calculated the number of blocks and the number of addresses in
each block of class A. Let us count the total number of addresses in class A which
can be calculated as follow:
As we have seen above the first bit of the entire 32-bit addresses of class A stays
'0'. The remaining 31 bits of 32-bit addresses can be changed to define the
address space of class A i.e., 231 = 2,147,483,648
Class B
The network id or the net-id of class B is defined using the first two bytes of the
IPv4 address. The first two bits of net-id stays '10' to define that the IPv4 address
belongs to the class B and the remaining 14 bits of net-id can be changed to
calculate the number of blocks in class B i.e., 214 = 16, 384
The next two bytes to of IPv4 address denote the host id in class B which is 16
bits. The number of hosts can be calculated as 216= 65,536 So, we conclude that
we can assign 16,384 blocks from class B to 16,384 organizations where each
organization can have 65,536 hosts connected to the network.

Now, as we have calculated the number of blocks and the number of addresses in
each block of class B. Let us count the total number of addresses in class B which
can be calculated as follow:
As we have seen above the first two bits of the entire 32-bit addresses of class B
stays '10' to define the class. The remaining 30 bits of entire 32-bit addresses can
be changed to define the address space of class B, i.e. 230-1,073,741,824.
Class C
In class C the network id is defined by the first 3 bytes of the IPv4 address. The
first 3 bits in network id stay '110' to define the class and the remaining 21 bits
defines the number of blocks in class B. The number of blocks can be calculated as
221=2,097,152.

The last byte of the IPv4 address in class C defines the host-id. The number of
hosts can be calculated as 2^8= 256. So, we conclude that we can assign
2,097,152 blocks from class C to 2,097,152 organizations where each organization
can have 256 hosts connected to the network.
Class D
IP address belonging to class D is reserved for multi-casting. The higher-order bits
of the first octet of IP addresses belonging to class D is always set to 1110. The
remaining bits are for the address that interested hosts recognize. Class D does
not possess any subnet mask. IP addresses belonging to class D range from
224.0.0.0 – 239.255.255.255.

Class E
IP addresses belonging to class E are reserved for experimental and research
purposes. IP addresses of class E range from 240.0.0.0 – 255.255.255.254. This
class doesn’t have any subnet mask. The higher-order bits of the first octet of class
E are always set to 1111.

Subnetting and Super-netting

To overcome the flaws of classful addressing, these two solutions were introduced
to compensate for the wastage of addresses. Let us discuss them one by one.

Subnetting
As class blocks of A & B are too large for any organization. So, they can divide their
large network in the smaller subnetwork and share them with other organizations.
This whole concept is subnetting.
Super-netting
As the blocks in class A and B were almost consumed so, new organizations
consider class C. But, the block of class C is too small then the requirement of the
organization. In this case, the solution which came out is super-netting which
grants to join the blocks of class C to form a larger block which satisfies the
address requirement of the organization.

Classless Addressing
The address depletion issue was not fully resolved by classful addressing's
subnetting and super-netting techniques. As the Internet expanded, it became
obvious that a bigger address space was required as a long-term fix. However, the
expanded address space necessitates that IP addresses should be longer as well,
necessitating a change in IP packet syntax. The short-term solution, which uses the
same address space but modifies the distribution of addresses to deliver a fair
amount to each business, was developed despite the fact that the long-term
solution, known as IPv6, has already been developed. Classless addressing is the
temporary fix, which nevertheless makes use of IPv4 addresses. In order to make
up for address depletion, the class privilege was taken out of the distribution.
The entire address space is partitioned into blocks of varying lengths with classless
addressing. An address's prefix designates the block (network); its suffix
designates the node (device). We are capable of having a block of 20, 21, 22, ...,
232 addresses, theoretically. One of the limitations is that a block of addresses
must have a power of two addresses. One address block may be given to an
organization. The given figure demonstrates the non-overlapping block
segmentation of the entire address space.

In contrast to classful addressing, classless addressing allows for varying prefix


lengths. Prefix lengths that vary from 0 to 32 are possible. The length of the prefix
has an inverse relationship with network size. A smaller network has a large prefix;
a larger one has a small prefix.
We must stress that classful addressing is just as easily adaptable to the concept
of classless addressing. Consider an address in class A as a classless address with a
prefix length of 8. Class B addresses can be viewed as classless addresses with the
prefix 16 and so on. Putting it another way, classless addressing is a specific
instance of classful addressing.
Prefix Length - Slash Notation
In classless addressing, the first issue that needs to be resolved is how to
determine the prefix length if an address is provided. We must individually
provide the prefix length because it is not a property of the address. The address
is inserted in this scenario, followed by a slash, and the prefix length, n. Slash
notation is the colloquial name for the notation, while classless interdomain
routing, or CIDR (pronounced cider) method, is the official name. An address in
classless addressing can thus be expressed as illustrated in the figure below.

Extracting Information from an Address


With respect to any given address in the block, we typically like to know three
things: the number of addresses in the block, the start address in the block, and
the last address. These three pieces of information, which are depicted in the
picture below, are simple to locate because the prefix length, n, is known.
1. The block has N=232n addresses, according to the calculation.
2. Then leftmost bits are kept, and the (32 - n) rightmost bits are all set to
zeroes to determine the first address.
3. The n leftmost bits are kept, while the (32 - n) rightmost bits are all set to 1s
to determine the last address.
For Example - The address 167.199.170.82/27 is a classless address. The following
is where we can find the aforementioned three pieces of data. In the network,
there are 232-n=25 = 32 addresses in all.

The first 27 bits are kept while the remaining bits are converted to 0s to determine
the first address.
Experiment – 4
AIM: Study basic router configuration commands.

Commands:

1. User Prompt
Router>
2.View list of commands that can be entered in user mode
Router>?

3. Enter privileged mode


Router> enable
Router#
4. View list of commands that can be entered in privileged mode
Router#?

5. Exit privileged mode


Router# disable
Router>
6. Enter configuration mode
Router> enable
Router# configure terminal
Router> enable
Router(config)#

7. Configure Hostname
Router(config)# hostname Router1
Router1(config)#

8. View list of valid parameters to be used with enable command.


Configure an enable password of ‘cnlab’ that will not be encrypted when viewing the router
configuration file
Configure an enable password of ‘it2’ that will be encrypted
Router1(config)# enable?
Router1(config)# enable password cnlab
Router1(config)# enable secret it2

9. Configure an IP address for Ethernet and activate it


Router1(config)# interface fast Ethernet 0/1
Router1(config-if) # IP address 192.168.101.1 255.255.255.0
Router1(config-if) # no shut

10. Configure an IP address for a serial interface and activate it


Router1(config)# interface serial 0/1
Router1(config-if) # IP address 192.168.1.1 255.255.255.0
Router1(config-if) # no shut

11. Exit configuration mode


Router1(config-if) # Ctrl+Z
Router1#

12. Exit command-line interface


Router1# logout

13. Prompt for password entry in privileged mode


Router1> enable
password: it2
Router1#

14. Summary of interfaces


Router1# show ip interface brief

15. Detailed interface information


Router1# show interfaces
16. View active configuration in DRAM
Router1# show running-config
17. View saved configuration in NVRAM
Router1# show startup-config
18. Save active(running) configuration to NVRAM
Router1# copy running-config startup-config

19. Version commands


Router1# show version

20. View current protocols on router


Router1# show protocols
21. Configure Router2 and ping Router2 from Router1
Router1# ping 192.168.1.2
EXPERIMENT-5
AIM: Study advanced router configuration commands.

Commands:
1. Configure a console password
Router1(config)# line console 0
Router1(config-line) #password cisco
Router1(config-line) #login

2. Configure a banner
Router1(config)# banner motd #
WELCOME TO ROUTER1 – Authorized Users Only!!!

3. Test Banner and Console Password


Router1#logout
enter
password: cisco
Router1>enable
password: it2
Router1#

4. Configure a password for telnet users


Router1(config-line) # password cisco
Router1(config)# login
5. Associate a name of Router2 with its remote ip address to Router1
Router1(config)#ip host Router2 192.168.1.2
Router1# ping Router2
Success rate 100%

6. View Router1 host table


Router1# show hosts

7. View Router1 flash memory


Router1# show flash

8. View history table and previously entered commands (ctrl+p)


Router1#show history
Router1#Ctrl+P
9. Configure interface
Router1#configure terminal
Router1(config)# interface s0/0
Router1(config-if)# bandwidth 64
Router1(config-if)# clock rate 64000
Router1(config-if)#Ctrl+Z
Router1# show interfaces serial 0/0

10. Add description to interface to serial0/0


Router1(config)#interface serial0/0
Router1(config-if) # description Serial Link to Router2
Router1(config-if) # exit
Router1(config)#exit
Router1#show interfaces serial0/0
Experiment – 6
Aim: Host to Host communication using IP Addressing.
Lab Scenario:
• Host A: IP address: 192.168.101.2/24, Default gateway: 192.168.101.1
• Host B: IP address: 192.168.100.2/24, Default gateway: 192.168.100.1
• Router R1: Ethernet interface: IP address: 192.168.101.1/24, Serial interface: IP
address: 192.168.1.1/24, DCE cable connected
• Router R2: Ethernet interface: IP address: 192.168.100.1/24, Serial interface: IP
address: 192.168.1.2/24

REQUIREMENTS:
1. Host A with appropriate IP address settings
2. Host B with appropriate IP address settings
3. Router R1 and R2 with appropriate IP address settings
4. DCE cable for connecting Router RI
5. Ethernet cables for connecting hosts and routers
6. Console cables for configuring routers
7. Terminal emulator software (such as PuTTY or HyperTerminal)
8. 8Appropriate networking equipment (switches, hubs, etc.) as required

PROCEDURE:
1. Setup Host A with the IP address 192.168.101.2/24 and default gateway
192.168.101.1. Verify the settings.
2. Setup Host B with the IP address 192.168.100.2/24 and default gateway
192.168.100.1. Verify the settings.
3. Configure Router R1 with the Ethernet interface IP address
192.168.101.1/24 and the Serial interface IP address 192.168.1.1/24.
Connect the DCE cable to Router R1.
4. Configure Router R2 with the Ethernet interface IP address
192.168.100.1/24 and the Serial interface IP address 192.168.1.2/24.
5. Connect Host A and Host B to the respective Ethernet interfaces of Router
RI and Router R2 using Ethernet cables.
6. Connect the Serial interfaces of Router R1 and Router R2 using the DCE
cable.
7. Configure the host names of Router RI and Router R2 as per lab
requirements.
8. Configure the interfaces of Router RI and Router R2 with appropriate
settings, including the clock rate on the DCE interface.
9. Save the configurations on Router RI and Router R2.
10. Test the connectivity between Host A and Host B by pinging each other's IP
addresses.
11. Test the connectivity between Host A and Router RI, and Host B and Router
R2 by pinging the respective interface IP addresses.
12. Document the process, including the configurations made, any
observations, and results obtained.

Router R1 Configuration: -
Router Con0 is now available
Press RETURN to get started!
Router>enable
Router#config t
Enter configuration commands, one per line. End with CNTL/Z
Router(config)#hostname R1
R1(config)#interface f0/0
R1(config-if)#ip address 192.168.101.1 255.255.255.0
R1(config-if)#no shut
03:47:46 %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state to up
03:47:46 %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state
to up
R1(config-if)#interface s0/0
R1(config-if)#ip address 192.168.1.1 255.255.255.0
R1(config-if)#clock rate 64000
R1(config-if)#no shut
03:48:43 %LINK-3-UPDOWN: Interface Serial0/0, changed state to up
03:48:43 %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up
R1(config-if)#

Router R2 Configuration: -
Router Con0 is now available
Press RETURN to get started!
Router>enable
Router#config t
Enter configuration commands, one per line. End with CNTL/Z
Router(config)#hostname R2
R2(config)#interface f0/0
R2(config-if)#ip address 192.168.100.1 255.255.255.0
R2(config-if)#no shut
03:51:11 %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state to up
03:51:11 %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state
to up
R2(config-if)#interface s0/0
R2(config-if)#ip address 192.168.1.2 255.255.255.0
R2(config-if)#no shut
03:52:02 %LINK-3-UPDOWN: Interface Serial0/0, changed state to up
03:52:02 %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up
R2(config-if)#exit
R2(config)#

You might also like