Download as pdf or txt
Download as pdf or txt
You are on page 1of 34

CONFIGURING NETWORK

DEVICES

NAME : M.M.N FERNANDO


REGISTRATION NO : EN 91416
INDEX NO : 18/ENG/018
II.PRELIMINARY WORK
1. Network topology is the method a network is organized, including the physical or logical
description of how links and nodes are set up to relate to each other. There are several
types of network topologies such as point-to-point, bus, star, etc.
2. OSI stands for Open System Interconnection. This is a reference model to as if how
applications communicate throughout a network. A reference model is a conceptual
framework for understanding relationships. OSI reference model comprises of 7 layers.
i. Physical Layer
ii. Data Link Layer
iii. Network Layer
iv. Transport Layer
v. Session Layer
vi. Presentation Layer
vii. Application Layer
a. Physical Layer – This layer sends and receives bits. Applications of the physical layer
are HSSI, V.35, and EIA-350
b. Data Link Layer - Provides the physical transmission of the data and handles error
notification, network topology, and flow control. Applications of the Data link layer
are Ethernet, HDLC, PPP
c. Network layer – This layer manages devices addressing, tracks the location of devices
on the network, and determines the best way to move data. Applications of the
Network layer are PDU, TCP/IP, ARP, RARP, ARP
d. Transport Layer – This layer segments and reassembles data into a data stream.
Applications of the transport layer are TCP and UDP.
e. Session Layer – This is the layer responsible for setting up, managing and tearing
down sessions between Presentation Layer entities. Some of the applications are SQL
and NFS.
f. Presentation Layer – This layer presents data to the Application Layer and is
responsible for data translocation and code formatting. Applications of the
presentation layer are JPEG and MPEG.
g. Application Layer – This is the layer where user interact with the computer and with
the network. Some of the applications of this layer are File Transfer Protocol (FTP),
DNS systems and HTTPS used in internet browsing.
3.
Hub Switch Router
Layer Physical Layer Data Link Layer Network Layer
Function To connect a Allow connections Direct data in a
network of to multiple devices, network
personal manage ports,
computers manage VLAN
together, they can security settings
be joined through
a central hub
Data Transmission Electrical signals Frame and packets Packets
form or bits
No of Ports 4/12 ports Multi-port, usually 2/4/5/8 ports
between 4 and 48
Transmission Type Frame flooding, First broadcast, At initial level
unicast, multicast then unicast and/or broadcast then
or broadcast multicast depends unicast and multicast
on the need
Device Type Non-intelligent Intelligent Device Intelligent Device
Used in (LAN, LAN LAN LAN, MAN, WAN
MAN, WAN)
Transmission mode Half-duplex Half/Full duplex Full duplex
Speed 10Mbps 10/100 1-
Mbps,1Gbps 100Mbps(wireless),
100Mbps-
1Gbps(wired)
Address used for MAC address MAC address IP address
data transmissions

4. A media access control address (MAC address) is a unique identifier assigned to a


network interface controller (NIC) for use as a network address in communications
within a network segment. Within the Open Systems Interconnection (OSI) network
model. MAC addresses are used in the medium access control protocol sublayer of the
data link layer. MAC addresses are recognizable as six groups of two hexadecimal digits.
5. IP addresses are separated into 5 classes that are identified by the value of the first octet
(the first decimal number) The system of IP address classes was developed for the
purpose of internet IP address assignment. The classes generated were based on the
network size. Classification is shown below:
a. Class A- For large networks with many devices
b. Class B- For medium-sized networks.
c. Class C- For small networks with the small number of hosts
d. Class D- For multicast addresses
e. Class E- Experimental purposes
6. The PING command send a packet of data to a specific IP address on a network and
provide details about the time taken to transmit that data and to get a response. It uses a
series of Internet Control Message Protocol (ICMP) Echo messages to determine

• Whether a remote host is active or inactive


• The round-trip delay in communicating with the host
• Packet loss
The PING command first sends an echo request packet to an address, then
waits for a reply. The ping is successful only if:
• The echo request gets to the destination and
• The destination is able to get an echo reply back to the source within a
predetermined time called a timeout
III.PRACTICAL WORK

Figure 01: Simulation Diagram

Figure 02: Configuration of Router 0


Commands
• enable
This enables the user to enter into the privileged mode as similar to root mode.
• config t
This enables the user to enter into global configuration mode where user can edit the
configuration of the router.
• hostname NetXA
This command lets the user to change the hostname of the router to ‘NetXA’ as required
• enable secret NetXAenablepass
This is the password that would be required in the case user intents to change global
configuration mode
• line con 0
This takes the user to configuration of command line configurations the ‘0’ is a specific
command to let the user to set a password
• password NetXAconsolepass
This sets the console password to ‘NetXAconsolepass’ as required.
• login
This saves the new password to the command line configuration and then exits from the
command line configuration mode to global configuration mode.
• interface FastEthernet0/0
This let the user to access the relevant interface configuration defined after the ‘interface’
command, in this case it is ‘FastEthernet0/0’.
• ip address 10.0.0.1 255.255.255.252
This command let the user define the relevant IP address of the current interface. Here
after the IP address the corresponding sub net mask has to be submitted.
• no shutdown
This will ensure that the IP address and the relevant configurations made on the interface
configuration mode are saved after a shutdown

• copy running-config startup-config


This copy command copies the current running configuration details into the default
startup configuration file. This will overwrite the configuration if edited.
Figure 03: Ping From NetXA PC to NetXA
Figure 04 : Telnet from NetXA PC to NetXA
2

Figure 05: Simulation Diagram


Figure 06: Configuration of Switch 0 - diagram 1

Figure 07: Configuration of Switch 0 – Diagram 2


The PING command worked properly.

Figure 08 :PING from PC1 to PC2

Figure 09 : PING from PC2 to PC1

Commands
• switch-port mode access
This command let the user access the switch-port mode configuration of the relevant
interface.
• switch-port access VLAN 99
• switch-port port-security
This command let the user access the port-security configuration of the relevant switch-
port
• switch-port port-security maximum
Set the maximum number of devices accessible at once to one
• switch-port port-security mac-address sticky
Set the MAC address automatically without specifying by the user
• switch-port port-security violation shutdown
This command will shutdown the port if a violation of the port-security happens as in a
case of a unrouted network packet.

Figure 10: Simulation Diagram


Figure 11 :Configuration of Router 0
Figure 12: Configuration of Router1
Figure 13: Configuration of Router2
Figure 14 : Static routing of Router0 using ip route
Figure 15: Static routing of Router1 using ip route
Figure 16: Static routing of Router2 using ip route
Figure 17: PING through Router0
Figure 18: PING through Router1
Figure 19 :PING through Router2
Figure 20: PING through PC0 in the same network
Figure 21: PING through PC0 to another network
Figure 22: PING through PC0 to another network

Commands
• ip route
This command takes to three arguments, first one is the IP address of the destinated
network, next is the default sub net mask of the destinated network and the last argument
is the Next Hop or the neighboring network accessor.
4

Figure 23: Simulation Diagram


Figure 24 : Configuration of Router0
Figure 25: Configuration of Router1
Figure 26: Configuration of Router2
Figure 27: Configuration of Router3
Figure 28: Dynamic routing of Router0 using RIP protocol
Figure 29: Dynamic routing of Router1 using RIP protocol
Figure 29: Dynamic routing of Router2 using RIP protocol
Figure 30: Dynamic routing of Router3 using RIP protocol
Figure 31: PING command to verify the routing of the network

Commands
• router rip
Let the user edit the RIP configuration of the router
• network
This command let the user add the required networks to the routing table of the router for
dynamic routing

You might also like