Professional Documents
Culture Documents
Cnfile 20EC413
Cnfile 20EC413
Id No.:20EC413
BACHELOR OF TECHNOLOGY
ELECTRONICS AND COMMUNICATION
1
Computer Networks Lab Manual 20EC413
Certificate
2
Computer Networks Lab Manual 20EC413
INDEX
3
Computer Networks Lab Manual 20EC413
PRACTICAL – 1
AIM: Introduction to RS232 Communication and BIOSCOM Function.
SOFTWARE USED: CISCO Packet Tracer
THEORY:
Serial and Parallel Communication
In serial communication, data is in the form of binary pulses where one represents a
logic HIGH or 5 Volts, and zero represents a logic LOW or 0 Volts. Serial
communication can take many formsdepending on the type of transmission mode
and data transfer. The transmission modes are classified as Simplex, Half Duplex,
and Full Duplex. There will be a source (also known as a sender) and destination
(also called a receiver) for each transmission mode.
4
Computer Networks Lab Manual 20EC413
5
Computer Networks Lab Manual 20EC413
Handshaking
Handshaking is the process which is used to transfer the signal from DTE to
DCE to make the connection before the actual transfer of data. The messaging
between transmitter & receiver can be done by handshaking.
6
Computer Networks Lab Manual 20EC413
Working of RS232
RS232 works on the two-way communication that exchanges data to one another.
There are two devices connected to each other, (DTE) Data Transmission
Equipment & (DCE) DataCommunication Equipment which has the pins like TXD,
RXD, and RTS & CTS.
1. Now, from DTE source, the RTS generates the request to send the data.
2. Then from the other side DCE, the CTS, clears the path for receiving the data.
3. After clearing the path, it will give a signal to RTS of the DTE source to send
the signal. Then the bitsare transmitted from DTE to DCE.
4. Now from DCE source, the request can be generated by RTS and CTS of DTE
sources clears the pathfor receiving the data and gives a signal to send the data.
5. This is the whole process through which data transmission takes place.
For example: The signals set to logic 1, i.e., -12V. The data transmission starts from
next bit and to informthis, DTE sends start bit to DCE. The start bit is always ‘0’, i.e.,
+12 V & next 5 to 9 characters is data bits. If we use parity bit, then 8 bits data can be
transmitted whereas if parity doesn’t use, then9 bits are being transmitted. The stop bits
are sent by the transmitter whose values are 1, 1.5 or 2 bits after the data transmission.
7
Computer Networks Lab Manual 20EC413
BIOSCOM Function
Arguments
8
Computer Networks Lab Manual 20EC413
bioscom Meaning
0x02 7 DATA BITS
0x03 8 DATA BITS
0x00 NO PARITY
0x08 ODD PARITY
0x18 EVEN PARITY
For example:
If a byte = (0xE0 | 0x08 | 0x00 | 0x03), the communication port is set to:
• 9600 BAUD RATE
• ODD PARITY
• 1 STOP BIT
• 8 DATA BITS
Return value
For all values of cmd, both functions
return a 16-bit integer.The upper 8 bits
of the return value are status bits:
• If one or more status bits is set to 1, an error has occurred.
• If no status bits are set to 1, the byte was received without error.
9
Computer Networks Lab Manual 20EC413
The lower 8 bits of the return value depend on the value of cmd specified:
10
Computer Networks Lab Manual 20EC413
PRACTICAL – 2
AIM: Implementation of Full Duplex Communication between two
PCs.
SOFTWARE USED: CISCO Packet Tracer
THEORY:
Duplex
A duplex communication system is a point-to-point system composed of two
or more connected parties or devices that can communicate with one another
in both directions.
Duplex systems are employed in many communications networks, either to
allow for simultaneous communication in both directions between two
connected parties or to provide a reverse path for themonitoring and remote
adjustment of equipment in the field.
There are two types of duplex communication systems: Full-Duplex
(FDX) and Half- Duplex (HDX).
Full Duplex (FDX)
Full-duplex data transmission means that data can be transmitted in both
directions on a signal carrierat the same time. For example, on a local area
network with a technology that has full- duplex transmission, one
workstation can be sending data on the line while another workstation is
receivingdata. Full-duplex transmission necessarily implies a bidirectional
line (one that can move data in both directions).
11
Computer Networks Lab Manual 20EC413
Null modem is used to connect two DTE's together. This is used to transfer files between the
computers using different protocols.
Above-mentioned figure shows the wiring of the null modem. The main feature indicated here is
that the to make the computer to chat with the modem rather than another computer. The guest &
host computer connected through the TD, RD, and SG pins. Any data that is transmitted through
TD line from the Host to Guest is received on RD line. The Guest computer must have the same
setup as the Host. The signal ground (SG) line of the both must be shorted so that grounds are
common to each computer.
The Data Terminal Ready (DTR) is looped back to Data Set Ready and Carrier Detect on both
computers. When the Data Terminal Ready is asserted active, then the Data Set Ready and Carrier
Detect immediately become active. At this point, the computer thinks the Virtual Modem to which
it is connected is ready and has detected the carrier of the other modem.
12
Computer Networks Lab Manual 20EC413
All left to worry about now is the Request to Send and Clear to Send.
As both computerscommunicate together at the same speed, flow control is
not needed thus these two lines are also linked together on each computer.
When the computer wishes to send data, it asserts the Request toSend high and
as it is hooked together with the Clear to Send, it immediately gets a reply that
it is ok to send and does so.
The Ring indicator line is only used to tell the computer that there is a ringing
signal on the phone line. As we do not have, a modem connected to the phone
line this is left disconnected.
To know about the RS232 ports available in your computer, Right click on
"My Computer”, Go to 'Properties', Select tab 'Device Manager', go to Ports
(COM & LPT), In that you will find 'Communication Port (Com1)' etc. If you
right click on that and go to properties, you will get devicestatus. Make sure
that you have enabled the port (Use this port is selected).
PROCEDURE:
1) Connection Diagram:
13
Computer Networks Lab Manual 20EC413
the virtual modem has the room for storing thedata and the computer
can send data.
14
Computer Networks Lab Manual 20EC413
bioscom Meaning
0x02 7 DATA BITS
0x03 8 DATA BITS
0x00 NO PARITY
0x08 ODD PARITY
0x18 EVEN PARITY
15
Computer Networks Lab Manual 20EC413
PRACTICAL – 3
AIM: Introduction to CISCO Packet Tracer.
SOFTWARE USED: CISCO Packet Tracer
THEORY:
Cisco Packet Tracer
• Packet Tracer is a protocol simulator developed by Dennis Frezzo
and his team at CiscoSystems.
• Packet Tracer (PT) is a powerful and dynamic tool
that displays the variousprotocols used in
networking, in either Real Time or Simulation mode.
• This includes layer 2 protocols such as Ethernet and PPP, layer 3
protocols such as IP, ICMP, and ARP, and layer 4 protocols such as
TCP and UDP. Routing protocols can alsobe traced.
Interface Overview
When you open Packet Tracer, by default you will be presented with the following
interface:
This initial interface contains ten components. They are explained in the table next:
16
Computer Networks Lab Manual 20EC413
This bar provides:
The File, Edit, Options, View, Tools, Extensions,
1 Menu Bar and Help menus. You will find basic commands such as Open, Save,
Save as Pkz, Print, and Settings and Preferences in these menus. You
will also be able to access the Activity Wizard from the Extensions
menu.
This bar provides shortcut icons to most commonly used menu
2 Main Tool Bar
commands.
This bar provides access to these commonly used workspace tools:
Select, Inspect, Delete, Resize Shape, Place Note, Drawing Palette,
3 Common Tools Add Simple PDU, and Add Complex PDU. See "Workspace Basics"
Bar for more information.
You can toggle between the Physical Workspace and the Logical
Workspace with the tabs on this bar. In Logical Workspace, this bar also
allows you to go back to a previous level in a cluster, create a New
Logical/Physic Cluster, Move Object, Set Tiled Background, and Viewport. In
4 al Workspace Physical Workspace, this bar allows you to navigate through physical
and locations, create a New City, create a New Building, create a New
Navigation Closet, Move Object, apply a Grid to the background, Set
Bar Background, and go to the Working Closet.
This area is where you will create your network, watch simulations, and
5 Workspace view many kinds of information and statistics.
You can toggle between Realtime Mode and Simulation Mode with
the tabs on this bar. This bar also provides buttons to Power Cycle
Realtime/Simulation Devices and Fast Forward Time as well as the Play Control buttons
6
Bar and the Event List toggle button in Simulation Mode. Also, it contains
a clock that displays the relative Time in Realtime Mode and
Simulation Mode.
This box is where you choose devices and connections to put into
theworkspace. It contains the Device-Type
Selection Box and the Device-Specific Selection Box. There's a
Network
7 searchable field that allows you to enter a device name to look for
Component Box
that specific device quickly. Device name shows when you mouse
over the device icon in the Device-Specific Box.
Device-Type This box contains the type of devices and connections available
8
Selection Box inPacket Tracer. The Device-Specific Selection Box will change
depending on which type of device you choose.
17
Computer Networks Lab Manual 20EC413
This box is where you choose specifically which devices you want to
put in your network and which connections to make. In this box, you'll
Device-Specific
9 find devices that may have already been obsolete. You have an option
Selection Box
to hide legacy equipment in the Preferences window under Options.
User Created This window manages the packets you put in the network
10
Packet during simulation scenarios.
Window
Types of Devices
18
Computer Networks Lab Manual 20EC413
19
Computer Networks Lab Manual 20EC413
20
Computer Networks Lab Manual 20EC413
2) Building the Topology – Adding Hosts. Single click on the End Devices.
Move the cursor into topology area. You will notice it turns into a plus
“+” sign. Single clickin the topology area and it copies the device.
21
Computer Networks Lab Manual 20EC413
22
Computer Networks Lab Manual 20EC413
23
Computer Networks Lab Manual 20EC413
24
Computer Networks Lab Manual 20EC413
Choose the Config tab: It is here that you can change the name of PC4. It is
also here where you would enter a Gateway IP Address, also known as the
default gateway. We will discuss this later, but this would be the IP address of
the local router. If you want, you can enter the IP Address 192.16.1.1, although
it will not be used in this lab.
Click on Fast Ethernet add the IP Address to 192.168.10.10. Click once in
the Subnet Mask field to8 enter the default Subnet Mask. You can leave this
at 255.255.0.0. We will discuss this later.
25
Computer Networks Lab Manual 20EC413
Also, notice this is where you can change the Bandwidth (speed) and Duplex
of the Ethernet NIC (Network Interface Card).
The default is Auto (auto negotiation), which means the NIC will negotiate
with the hub or switch. The bandwidth and/or duplex can be manually set by
removing the check from the Autobox and choosing the specific option.
Bandwidth – Auto: If the host is connected to a hub or switch port which can
do 100 Mbps, thenthe Ethernet NIC on the host will choose 100 Mbps (Fast
Ethernet). Otherwise, if the hub or switchport can only do 10 Mbps, then the
Ethernet NIC on the host will choose 10 Mbps (Ethernet).
Duplex - Auto Hub: If the host is connected to a hub, then the Ethernet NIC on
the host will chooseHalf Duplex.
Switch: If the host is connected to a switch, and the switch port is configured
as Full Duplex (or Auto negotiation), then the Ethernet NIC on the host will
choose Full Duplex. If the switch port is configured as Half Duplex, then the
9 Ethernet NIC on the host will choose Half Duplex.(Full Duplex is a much
more efficient option.) The information is automatically saved when entered.
Verify the information, to verify the information that you entered, move the
Select tool (arrow) overeach host.
For deleting a device or link, choose the Delete tool and click on the item you wish to
delete. Perform thefollowing steps to connect Hub0 to Switch0:
To connect like-devices, like a Hub and a Switch, we will use a Cross-over cable.
Click once the Cross-over Cable from the Connections options. The link light for
switch port FastEthernet0/4 will begin as amber and eventually change to green as
the Spanning Tree Protocol transitions the port to forwarding.
26
Computer Networks Lab Manual 20EC413
CONCLUSION: Hence in this practical we learned about Cisco packet tracer and
how to operate it.
27
Computer Networks Lab Manual 20EC413
PRACTICAL – 4
AIM : To study about different Network Commands.
THEORY:
Windows has some very useful networking utilities that are accessed from a
command line (CMD
Console). On Windows 10 type CMD in the search box to open a command
console. The networking commands are mainly used for getting system
information and troubleshooting networking problems.
Let us look at some commonly used network commands:
ipconfig Command
Another indispensable and frequently used utility that is used for finding
network information aboutyour local machine-like IP addresses, DNS
addresses etc.
Basic Use: Finding Your IP Address and Default Gateway.
Type the command ipconfig at the prompt. The following is displayed:
28
Computer Networks Lab Manual 20EC413
For example, you might find that there are no responses when pinging a network
printer, only to find out that the printer is offline and its cable needs replaced. Or maybe
you need to ping a routerto verify that your computer can connect to it, to eliminate it
as a possible cause for a networking issue.
29
Computer Networks Lab Manual 20EC413
arp Command
This is used for showing the address resolution cache. This command must be
used with a command line switch. arp -a is the most common. Address
Resolution Protocol (ARP) is a procedure for mapping a dynamic Internet
Protocol address (IP address) to a permanent physical machine address in a
local area network (LAN).
The physical machine address is also known as a Media Access Control or MAC
address.
30
Computer Networks Lab Manual 20EC413
31
Computer Networks Lab Manual 20EC413
netstat Command
This is used for displaying information about TCP/UDP connections and ports.
The netstat command, meaning network statistics, is a Command Prompt
command used to display very detailedinformation about how your computer
is communicating with other computers or network devices.
tracert Command
The tracert command is a Command Prompt command that's used to show
several details about thepath that a packet takes from the computer or device
you're on to whatever destination you specify.
32
Computer Networks Lab Manual 20EC413
You might also sometimes see the tracert command referred to as the trace route
command ortraceroute command.
33
Computer Networks Lab Manual 20EC413
PRACTICAL – 5
AIM: To study about IPv4 Addressing and Subnetting.
THEORY:
Basic Terms
• Address - The unique number ID assigned to one host or interface in a
network.
• Subnet - A portion of a network that shares a particular subnet address.
• Subnet Mask - A 32-bit combination used to describe
which portion of an address refers to the subnet and which
part refers to the host.
• Interface - A network connection
IPv4 Addressing
An IPv4 address is a 32-bit address that uniquely and universally defines the
connection of a device(for example, a computer or a router) to the Internet.
IPv4 addresses are unique. Theyare unique in the sense that each address
defines one, and only one, connection to the Internet. Two devices on the
Internet can never have the same address at the same time. If a device operating
at the network layer has m connections to the Internet, it needs to have m
addresses. The IPv4 addresses are universal in the sense that the addressing
system must be accepted by any host that wants to be connected to the Internet.
Notations
There are two prevalent notations to show an IPv4 address: binary notation
and dotted decimal notation.
Binary Notation
In binary notation, the IPv4 address is displayed as 32 bits. Each octet is often
referred to as a byte.So, it is common to hear an IPv4 address referred to as a
32-bit address or a 4-byte address. The following is an example of an IPv4
address in binary notation:
01110101 10010101 00011101 00000010
Dotted-Decimal Notation
To make the IPv4 address more compact and easier to read, Internet addresses
are usually written in decimal form with a decimal point (dot) separating the
bytes. The following is the dotted decimalnotation of the above address:
117.149.29.2
Figure below shows an IPv4 address in both binary and dotted-decimal notation. Note that
because each byte(octet) is 8 bits, each number in dotted-decimal notation is a value
ranging from 0 to 255.
34
Computer Networks Lab Manual 20EC413
With an IPv4 IP address, there are five classes of available IP ranges: Class
A, Class B, Class C, Class D and Class E, while only A, B, and C are
commonly used. Each class allows for a range ofvalid IP addresses, shown
in the following table:
Class Range
CLASS A 0.0.0.0 TO
127.255.255.255
CLASS B 128.0.0.0 TO
191.255.255.255
CLASS C 192.0.0.0 TO
223.255.255.255
CLASS D 224.0.0.0 TO
239.255.255.255
CLASS E 240.0.0.0 TO
255.255.255.255
Network Masks
These distinguishes which portion of the address identifies the network and
which portion of theaddress identifies the node.
Default Masks:
1) CLASS A: 255.0.0.0
2) CLASS B: 255.255.0.0
3) CLASS C: 255.255.255.0
35
Computer Networks Lab Manual 20EC413
Subnetting
Subnetting allows you to create multiple logical networks that exist
within a single ClassA, B, or C network. If you do not subnet, you
are only able to use one network from your Class A,B, or C network,
which is unrealistic.
Each data link on a network must have a unique network ID, with
every node on that linkbeing a member of the same network. If you
break a major network (Class A, B, or C) into smaller subnetworks,
it allows you to create a network of interconnecting subnetworks.
Each data link on this network would then have a unique
network/subnetwork ID. Any device, or gateway, that connects n
networks/subnetworks has n distinct IP addresses, one for each
network / subnetwork that it interconnects.
In order to subnet a network, extend the natural mask with some of the bits from
the hostID portion ofthe address in order to create a subnetwork ID. For
example, given a Class C network of 204.17.5.0 which has a natural mask of
255.255.255.0, you can create subnets in this manner:
204.17.5.0 - 11001100.00010001.00000101.00000000
255.255.255.224 - 11111111.11111111.11111111.11100000
|sub|
36
Computer Networks Lab Manual 20EC413
Notice that each of the routers in Figure 2 is attached to four subnetworks, one
subnetwork is common to both routers. Also, each router has an IP address for
each subnetwork to which itis attached. Each subnetwork could potentially
support up to 30 host addresses.
This brings up an interesting point. The more host bits you use for a subnet mask,
the more subnetsyou have available. However, the more subnets available, the less
host addresses available per subnet. For example, a Class C network of 204.17.5.0
and a mask of 255.255.255.224 (/27) allows you to have eightsubnets, each with 32
host addresses (30 of which could be assigned to devices).
37
Computer Networks Lab Manual 20EC413
38
Computer Networks Lab Manual 20EC413
PRACTICAL – 6
AIM: To study about ping and ARP packets with simulation in CISCO
Packet Tracer.
SOFTWARE USED: Cisco Packet Tracer
THEORY:
ping Command
The ping command is a Command Prompt command used to test the ability of
the source computerto reach a specified destination computer.
The ping command is usually used as a simple way to verify that a computer
can communicate overthe network with another computer or network device.
The ping command operates by sending Internet Control Message Protocol
(ICMP) Echo Requestmessages to the destination computer and waiting for a
response. How many of those responses arereturned, and how long it takes for
them to return, are the two major pieces of information that theping command
provides.
For example, you might find that there are no responses when pinging a network
printer, only to find outthat the printer is offline and its cable needs replaced. Or
maybe you need to ping a router to verify that your computer can connect to it, to
eliminate it as a possible cause for a networking issue.
39
Computer Networks Lab Manual 20EC413
arp Command
This is used for showing the address resolution cache. This command must be
used with a command line switch. arp -a is the most common. Address
Resolution Protocol (ARP) is a procedure for mapping a dynamic Internet
Protocol address (IP address) to a permanent physical machine addressin a
local area network (LAN).
The physical machine address is also known as a Media Access Control or MAC
address.
The job of the ARP is essentially to translate 32-bit addresses to 48-bit addresses
and vice- versa. This isnecessary because in IP Version 4 (IPv4), the most common
level of Internet Protocol (IP) in use today, an IP address is 32-bits long, but MAC
addresses are 48-bits long.
40
Computer Networks Lab Manual 20EC413
ARP works between network layers 2 and 3 of the Open Systems Interconnection
model (OSImodel). The MAC address exists on layer 2 of the OSI model, the
network layer, while the IP address exists on layer 3, the data link layer.
When a new computer joins a LAN, it is assigned a unique IP address to use
for identification and communication. When an incoming packet destined for
41
Computer Networks Lab Manual 20EC413
a host machine on a particular LAN arrives at a gateway, the gateway asks the
ARP program to find a MAC address that matches the IP address. A table
called the ARP cache maintains a record of each IP address and its
corresponding MAC address.
All operating systems in an IPv4 Ethernet network keep an ARP cache. Every
time a host requestsa MAC address in order to send a packet to another host in
the LAN, it checks its ARP cache to see if the IP to MAC address translation
already exists. If it does, then a new ARP request is unnecessary. If the
translation does not already exist, then the request for network addresses is sent
and ARP is performed.
ARP broadcasts a request packet to all the machines on the LAN and asks if
any of the machines know they are using that particular IP address. When a
machine recognizes the IP address as its own, it sends a reply so ARP can
update the cache for future reference and proceed with the communication
1) Design the topology in Cisco packet tracer using one Switch, three Laptops or
PCs.
42
Computer Networks Lab Manual 20EC413
3) Now, open command prompt in Cisco packet tracer and write ping and
then copy the physicaladdress.
43
Computer Networks Lab Manual 20EC413
4) To observe the traffic closely, select the ‘Simulation Mode’ and in the
Simulation Panel clickon “Show all/none” button.
44
Computer Networks Lab Manual 20EC413
5) In the PDU information at Device PC-0, you can see how the PDUs are
traversing between the OSILayers.
45
Computer Networks Lab Manual 20EC413
7) This is the final step where we will test the ARP entries in the ARP
Tables of PC-0, PC- 1,andLaptop-0.
PRACTICAL – 7
AIM: To study about Virtual LAN (VLAN) and simulate in
CISCO Packet Tracer.
SOFTWARE USED: Cisco Packet Tracer
THEORY:
VLAN
VLAN is a logical grouping of networking devices. When we create VLAN, we
actually break largebroadcast domain in smaller broadcast domains. Consider
VLAN as a subnet. Same as two differentsubnets cannot communicate with
each other without router, different VLANs also requires router to
communicate.
Advantages of VLAN
• Solve broadcast problem.
• Reduce the size of broadcast domains.
• Allow us to add additional layer of security.
• Make device management easier.
• Allow us to implement the logical grouping of devices by
2) Assign IP addresses to the PCs and Laptops on the Network. For this practical, the IP
addresses assigned are as follows:
47
Computer Networks Lab Manual 20EC413
PC Name IP Address
PC0 192.168.10.10/24
PC1 192.168.10.11/24
Laptop0 192.168.10.12/24
Laptop1 192.168.10.13/24
To create two different VLANs, run the following commands in Switch0’s CLI:
Switch>enable
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#vlan 1
Switch(config-vlan)#exit
Switch(config)#vlan 2
Switch(config-vlan)#exit
Switch(config)#
switchport access vlan [vlan number] command is used to assign VLAN to the
interface.
49
Computer Networks Lab Manual 20EC413
50
Computer Networks Lab Manual 20EC413
PRACTICAL – 8
AIM: To implement Static Routing using CISCO Packet Tracer.
SOFTWARE USED: Cisco Packet Tracer
THEORY:
Static Routing
Static routing is the most secure way of routing. It reduces overhead
from network resources. In this type of routing, we manually add
routes in routing table. It is useful wherenumbers of route are
limited. Like other routing methods static routing also has its pros
and cons.
Advantages of Static Routing
• It is easy to implement.
• It is most secure way of routing, since no information is shared with other routers.
• It puts no overhead on resources
51
Computer Networks Lab Manual 20EC413
2) Assign IP addresses to the PCs on the Network. For this practical, the IP
addresses assigned are asfollows:
interface fastEthernet 0/0 command is used to enter in interface mode. ip address 8.0.0.1
52
Computer Networks Lab Manual 20EC413
255.0.0.0 command will assign IP address to interface.no shutdown command will bring the
interface up.
exit command is used to return in global configuration mode.
Serial interface needs two additional parameters clock rate and bandwidth. Every serial
cablehas two ends DTE and DCE. These parameters are always configured at DCE end.
Now let’s assign IP address to serial interface:
Router#configure terminal
Router(config)#interface Serial 0/0/0
Router(config-if)#ip
address 192.168.0.177
255.255.255.252
Router(config-if)#clock rate 64000
Router(config-if)#bandwidth 64
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#
53
Computer Networks Lab Manual 20EC413
4) Now routers have information about the networks that they have on their own interfaces.
Routers do not exchange network information between them on their own. We need to
implement a mechanism that insists them to share this information. This mechanism is
called routing. By default, when a packet arrives in interface, router checks destination
filed in packet and compare it with routing table. If it finds a match for destination
network then it will forwardthat packet from related interface. If it does not find a match
54
Computer Networks Lab Manual 20EC413
in routing table then it will discard that packet. This is the default behavior of router. We
do not need to configure directly connected networks.
Run following command from global configuration mode in routers:
Router0:
Router(config)#ip route 8.0.0.0 255.0.0.0 8.0.0.2
Router(config)#ip route 16.0.0.0 255.0.0.0 192.168.0.178
Router1:
Router(config)#ip route 8.0.0.0 255.0.0.0 192.168.0.177
Router(config)#ip route 16.0.0.0 255.0.0.0 192.168.0.182
Router2:
Router(config)#ip route 8.0.0.0 255.0.0.0 192.168.0.181
Router(config)#ip route 16.0.0.0 255.0.0.0 192.168.0.190
Router3:
Router(config)#ip route 8.0.0.0 255.0.0.0 192.168.0.189
Router(config)#ip route 16.0.0.0 255.0.0.0 16.0.0.2
55
Computer Networks Lab Manual 20EC413
56
Computer Networks Lab Manual 20EC413
57
Computer Networks Lab Manual 20EC413
PRACTICAL – 9
AIM: To implement Routing Information Protocol (RIP) using
CISCO PacketTracer.
SOFTWARE USED: Cisco Packet Tracer
THEORY:
Routing Information Protocol (RIP)
2) Assign IP addresses to the PCs on the Network. For this practical, the IP addresses
assigned areas follows:
58
Computer Networks Lab Manual 20EC413
59
Computer Networks Lab Manual 20EC413
Router(config-if)#bandwidth 64
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface Serial 0/0/1
Router(config-if)#ip address 192.168.1.182 255.255.255.252
Router(config-if)#clock rate 64000
Router(config-if)#bandwidth 64
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#
Router#configure terminal command is used to enter in global configuration mode.
Router(config)#interface serial 0/0/0 command is used to enter in interface mode.
Router(config-if)#ip address 192.168.0.177 255.255.255.252 command assigns IP
address tointerface. For serial link we usually use IP address from /30 subnet.
Router(config-if)#clock rate 64000 and Router(config-if)#bandwidth 64: In real life
environment these parameters control the data flow between serial links and need to be set
at service providers end. In lab environment we need not to worry about these values. We
can use these values.
Router(config-if)#no shutdown command brings interface up.
Router(config-if)#exit command is used to return in global configuration mode.
We will use same commands to assign IP addresses on interfaces of remaining routers. We
need to provided clock rate and bandwidth only on DCE side of serial interface.
60
Computer Networks Lab Manual 20EC413
Router#configure terminal
Router(config)#interface FastEthernet 0/0
Router(config-if)#ip address 16.0.0.1 255.0.0.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface Serial 0/0/0
Router(config-if)#ip address 192.168.1.190 255.255.255.252
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface Serial 0/0/1
Router(config-if)#ip address 192.168.1.181 255.255.255.252
Router(config-if)#no shutdown
Router(config-if)#exit
4) Now routers have information about the networks that they have on their own
interfaces. Routers will not exchange this information between them on their
own. We need to implement RIP routing protocol that will insist them to share
this information.
router rip command tell router to enable the RIP routing protocol.
network command allows us to specify the networks which we want to advertise. We
onlyneed to specify the networks which are directly connected with the router.
That’s all we need to configure the RIP. Follow same steps on remaining routers.
Router1:
Router(config)#router rip
Router(config-router)# network 192.168.1.0
Router2:
Router(config)#router rip
Router(config-router)# network 16.0.0.0
Router(config-router)# network 192.168.1.0
61
Computer Networks Lab Manual 20EC413
5) Our network is ready to take the advantage of RIP routing. To verify the setup,
we will use ping command. ping command is used to test the connectivity
between two devices.
Access the command prompt of PC1 and use ping command to test the connectivity from
PC0.
62
Computer Networks Lab Manual 20EC413
63
Computer Networks Lab Manual 20EC413
PRACTICAL – 10
AIM : To study about Wireshark Software.
SOFTWARE USED : Wireshark
THEORY:
Wireshark
Wireshark is a network packet analyzer. A network packet analyzer presents
captured packet data in as much detail as possible. The term packet sniffer is
also used for such software.
You could think of a network packet analyzer as a measuring device for
examining what’s happening inside a network cable, just like an electrician
uses a voltmeter for examining what’s happening inside an electric cable (but
at a higher level, of course).
In the past, such tools were either very expensive, proprietary, or both.
However, with the advent ofWireshark, that has changed. Wireshark is
available for free, is open source, and is one of the best packet analyzers
available today.
Features of Wireshark
• Available for UNIX and Windows.
• Capture live packet data from a network interface.
64
Computer Networks Lab Manual 20EC413
Getting Wireshark
In order to run Wireshark, you will need to have access to a computer that
supports both Wireshark and the libpcap or WinPCap packet capture library.
The libpcap software will be installed for you, if it is not installed within your
operating system, when you install Wireshark.
Download and install the Wireshark software:
• Go to http://www.wireshark.org/download.html and download and install the
software.
Running Wireshark
When you run the Wireshark program, the Wireshark graphical user interface
shown in figure belowwill be displayed. Initially, no data will be displayed in the
various windows.
65
Computer Networks Lab Manual 20EC413
66
Computer Networks Lab Manual 20EC413
67
Computer Networks Lab Manual 20EC413
68
Computer Networks Lab Manual 20EC413
CONCLUSION: By this practical we learned about how to operate and use of Wireshark
software.
69