0% found this document useful (0 votes)
24 views27 pages

CN Lab File

The document is a lab file submitted by a student named Parasmani Jaiswal for their computer network lab course. It contains details of the various experiments and assignments completed by the student such as studying networking devices, IP addresses, subnetting, cabling a network, and configuring different network topologies using devices like switches and routers.

Uploaded by

ananyajme8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views27 pages

CN Lab File

The document is a lab file submitted by a student named Parasmani Jaiswal for their computer network lab course. It contains details of the various experiments and assignments completed by the student such as studying networking devices, IP addresses, subnetting, cabling a network, and configuring different network topologies using devices like switches and routers.

Uploaded by

ananyajme8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 27

AMITY UNIVERSITY

MAHARASHTRA
AMITY INSTITUTE OF INFORMATION
TECHNOLOGY

COMPUTER NETWORK
LAB FILE

Submitted to:- Submitted by:-


SACHIN RATHOD PARASMANI JAISWAL
BCA IInd Sem

Enrollment.No:A71004821030
AMITY UNIVERSITY MUMBAI
Established vide Maharashtra Act No.13 of 2014, of Government of Maharashtra, and recognized under Section 2 (f) of UGC Act 1956.

CERTIFICATE

This is to certify that Mr./Mrs. Parasmani Jaiswal Enrollment No.


A71004821030 of class BCA Has satisfactorily completed the
practical course prescribed by Amity University Mumbai during
year 2021-2022.

Name & signature Name & signature


Faculty In charge External Examiner

Name & signature Hade of


department
Index
Ass. Topic Date Sign
no.
1. Study of Networking Devices using
cisco packet tracer.
2. Study of Network IP Address.
3. Study of Subnetting scenario.
4. Cabling a network.
5. Configure a network having four PCs
and a Switch.
6. Configure a network having four PCs,
Switch and a router.
7. Configure a network having four PCs,
two switches and two a router.
8. Configure a network having four PCs,
two switches and two routers.
9. Simulation of dynamic routing
protocols (RIP) using Cisco Packet
Tracer.
10. Examining Network Address
Translation (NAT).
11. Simulation of dynamic routing
protocols OSPF using Cisco Packet
Tracer.
12. To configure port address translation
(PAT) in router
Experiment 1
AIM: Study of Networking Devices using cisco packet tracer.

REQUIREMENT: cisco packet tracer.

THEORY: Cisco network devices such as routers, switches, and other


generic devices such as bridges, hubs, repeaters, and WAN emulators
are available to work in the cisco packet tracer. Network devices
enable the end devices to communicate with each other. These devices
can be configured from the config tab. You will be able to configure
routers and switches using the config tab without using Cisco
commands.

PROCEDURE:
HUB:
1. Connect four PCs to a HUB in cisco packet tracer.
2. configure each PC with IP address and subnet mask.
3. select the simulation tab.
4. Edit filters for ARP and ICMP.
5. Take a simple PDU, and select a source and destination PC for it.
6. Press Auto Capture/Play button
7. observe the HUB operation.

SWITCH:
1. Connect four PCs to a switch in cisco packet tracer.
2. configure each PC with IP address and subnet mask.
3. select the simulation tab.
4. Take a simple PDU, and select a source and destination PC for it.
5. Press Auto Capture/Play button
6. observe the switch operation.
7. ping all other PCs from each PC.

ROUTER:
1. Connect Two routers with a serial connection and connect a switch
to each router in cisco packet tracer.
2. connect four PCs to each switch.
3. configure the serial and fastethernet interfaces for ip addresses on
each router
4. Define static routes on each router
5. configure each PC with IP address and subnet mask.
6. check the connectivity between two PCs belonging to different
networks (routers)
7. select the simulation tab.
8. Take a simple PDU, and select a source and destination PC for it.
9. Press Auto Capture/Play button
10. observe the router operation
Experiment 2
Aim : Study of network IP
• Classification of IP address
• Sub netting
• Super netting
Apparatus (Software): NA
Procedure: Following is required to be study under this practical.
• Classification of IP address
As show in figure we teach how the ip addresses are classified and
when they are used.
A computer network is a group of computers and various networking
devices that connect to share information and resources. To uniquely
identify each computer or networking device in the network, computer
networks also use addresses. Addresses in computer networks are
known as IP addresses. An IP address consists of two components: the
network address and the host address. The network address is used to
find the subnet in which the computer or the device is located and the
host address is used to find the computer or the device in the subnet. If
a large computer network is divided into smaller groups, each group is
known as a subnet.

IP addresses can be written in three notations: binary, dotted-decimal,


and hexadecimal. From these notations, computers understand only
binary notation. Binary notation is complex to write and understand.
To make IP addresses human friendly, IP addresses are also written in
dotted-decimal and hexadecimal notations. If IP addresses are written
in dotted-decimal notation or hexadecimal notation, computers
automatically convert them into binary notation before processing
them.

There are two versions of IP addresses: IPv4 and IPv6. The length of IP
addresses is different in both versions. Both versions also use different
formats to differentiate between network addresses and host
addresses
Experiment 3
Aim : Study of Subnetting scenario.
Objective :- Learn what IP Subnetting is, Subnetting
components such as Network ID, Broadcast ID, network portion, host
portion, FLSM, VLSM, Subnetting eligible bits, reserved network bits
and host bits including Subnetting rules in detail.
What is IP Subnetting ?
IP Subnetting is a process of dividing a large IP network in smaller IP
networks. In Subnetting we create multiple small manageable
networks from a single large IP network.

Let’s take an Example.

To best utilize available addresses if we put more than 16000000 hosts


in a single network, due to broadcast and collision, that network will
never work. If we put less hosts then remaining addresses will be
wasted.

Subnetting provides a better way to deal with this situation. Subnetting


allows us to create smaller networks from a single large network which
not only fulfil our hosts’ requirement but also offer several other
networking benefits.

I have already explained the advantages of Subnetting along with why


Subnetting is necessary in previous parts of this tutorial. In this part, I
will mainly focus on Subnetting components and terminology.
Identifying network portion and host portion in an IP address is the first
step of Subnetting. Subnetting can only be done in host portion. Subnet
mask is used to distinguish the network portion from host portion in an
IP address.

An IP address and a subnet mask both collectively provide a numeric


identity to an interface. Both addresses are always used together.
Without subnet mask, an IP address is an ambiguous address and
without IP address a subnet mask is just a number.

Both addresses are 32 bits in length. These bits are divided in four
parts. Each part is known as octet and contains 8 bits. Octets are
separated by periods and written in a sequence.

Subnet

A subnet is a single small network created from a large network. In


Subnetting we break a single large network in multiple small networks.
These networks are known as subnets.

Network address and Broadcast address


In each network there are two special addresses; network address and
broadcast address. Network address represents the network itself
while broadcast address represents all the hosts which belong to it.
These two addresses can’t be assigned to any individual host in
network. Since each subnet represents an individual network, it also
uses these two addresses.
In simple language, in a single network only two IP addresses will be
used for these addresses. But if we breaks this network in two small
networks then four IP addressed will be used for these addresses.
Experiment 4
Aim: Introduction to network commands (ifconfig, ping, Netstat,
traceroute, nslookup, tcpdump, ethtool, arp)

REQUIREMENT: Cisco packet Tracer System

THEORY:
Ifconfig commands:
ifconfig is used to configure, or view the configuration of, a
network interface. ifconfig stands for
"interface configuration". It is used to view and change the
configuration of the network interfaces on
your system.
Ping commands:
ping is a simple way to send network data to, and receive
network data from, another computer on a
network. It is frequently used to test, at the most basic level,
whether another system is reachable over a
network, and if so, how much time it takes for that data to be
exchanged. The ping utility uses the
ICMP protocol's mandatory ECHO_REQUEST datagram to elicit
an ICMP
ECHO_RESPONSE from
a host or gateway. ECHO_REQUEST datagrams ("pings") have an
IP and ICMP header, followed by a
struct timeval and then an arbitrary number of "pad" bytes
used to fill out the packet.

nslookup commands:
The nslookup command is used to query internet name servers
interactively for information. nslookup,
which stands for "name server lookup", is a useful tool for
finding out information about a named
domain. By default, nslookup will translate a domain name to
an IP address (or vice versa)
Experiment 5
Aim: Configure a network having four PCs and a switch

Requirement: 4 PCs and 1 Switch

Procedure:

All commands related to Network configuration which includes how to


switch to privilege mode and normal mode and how to configure
router interface and how to save this configuration to flash memory or
permanent memory.
This commands includes
• Configuring the Router commands
• General Commands to configure network
• Privileged Mode commands of a router
• Router Processes & Statistics
• IP Commands • Other IP Commands e.g. show ip route etc.
Experiment 6
Aim: Configure a network having four PCs Switch and a router

Requirement: 4 PCs switches and router

Objectives:

1.Connect a switch to the network.


2. Verify the configuration on the switch.

Procedure:
a. Using the proper cable, connect the FastEthernet0/0 on Customer
Router to the FastEthernet0/1 on Customer Switch.

b. Using the proper cable, connect the Customer PC to the Customer


Switch on port FastEthernet0/2. c. Using the proper cable, connect the
Local Server to the Customer Switch on port FastEthernet0/3.
Experiment 7
Aim: Configure a network having four PCs, two switches and two router

Requirement : 4 PCs and two switches and two routers

Procedure:

a. Using the appropriate cable, connect the router port to the first
available switch port. Click the Config tab on the router. Select the
interface and ensure that the On box is checked.

b. Verify connectivity. A green light appears on each end of the link if


the cabling is correct.

c. Using the appropriate cable, connect the existing PCs to the new
switch.

d. Verify connectivity. A green light appears on each end of the links if


the cabling is correct.

e. Click the Check Results button at the bottom of this instruction


window to check your work.
Ping:
Experiment 8
Aim: Configure a network six PCs, three Generic Switch & three Generic
Router.

Requirement: 6 PCs, 3 Generic Switch and 3 Generic Router

1. Connect an Ethernet cable into an outgoing port on your modem or


router – sometimes marked as a “WAN” port (on a router – any port
will do)
2. Take the other end of the Ethernet cable and plug it into any port on
your switch
3. Now plug another Ethernet cable cable into another port on your
switch
4. Plug the other end of the Ethernet cable into your device
Experiment 9
AIM: Simulation of dynamic routing protocols (RIP) using Cisco Packet
Tracer.

OBJECTIVES: To Simulate RIP routing protocol, check the updated


routing tables and check the connectivity among devices.

REQUIREMENT: cisco packet tracer

Procedure for RIP:


Step 1: Configure the router interfaces for IP addresses as shown in the
scenario Step 2: Set clock rate on at least one serial interface belonging
to different networks Step 3: Activate all the interfaces Step 4: Check
directly connected networks for each router. (Using show ip route)
Step 5: Check updated routing tables on each router. (Using router RIP)
Step 6: Set gateways on each PC, Now successful ping is possible
among the PCs belonging to different networks.
Experiment 10
Aim: Examining Network Address Translation (NAT)

Objectives : Examine NAT processes as traffic traverses a NAT border


router.
Background / Preparation In this activity, you will use Packet Tracer
Simulation mode to examine the contents of the IP header as traffic
crosses the NAT border router.

Step 1: Prepare the network for Simulation mode. Verify that the
network is ready to send and receive traffic. All the link lights should be
green. If some link lights are still amber, you can switch between
Simulation and Realtime mode several times to force the lights to turn
green faster. Switch to Simulation mode before going to the next step.

Step 2: Send an HTTP request from an inside host to an outside web


server. Click Customer PC. Click the Desktop tab and then Web
Browser. In the URL field, type the web address for the ISP server
(www.ispserver.com). Make sure that you are in Simulation mode, and
then click Go. In the event list, notice that Customer PC queues a DNS
request and sends out an ARP request

Step 3: Send an HTTP request from an outside host to an inside web


server. Customer Server provides web services to the public (outside
addresses) through the domain name www.customerserver.com.
Follow a process similar to Step 2 to observe an HTTP request on ISP
Workstation. a. Click ISP Workstation. Click the Desktop tab, and then
Web Browser.
Experiment 11
AIM: Simulation of dynamic routing protocols OSPF using Cisco Packet
Tracer.
OBJECTIVES: To Simulate OSPF routing protocol and, check the updated
routing tables and check the connectivity among devices.
REQUIREMENT: cisco packet tracer Scenario.
Scenario for OSPF
Procedure for OSPF:
Step 1: Configure the router interfaces for IP addresses as shown in the
scenario
Step 2: Configure each router with OSPF o
2.1 Router OSPF processID o
2.2 Network networkIPaddress wildcard mask areaID o
2.3 repeat step 2.2 for all neighboring networks of each router
Step 3: run show IP route on each router
Step 4: Set gateways on each PC, Now successful ping is possible
among the PCs belonging to different network
Experiment 12
AIM: To configure port address translation (PAT) in router
OBJECTIVES: : To Simulate PAT routing protocol, check the updated
routing tables and check the connectivity among devices.

Procedure for Pat :


PAT configuration requires four steps: -

1. Create an access list of IP addresses which need translation


2. Create a pool of all IP address which are available for translation
3. Map access list with pool
4. Define inside and outside interfaces

In second step we define a pool of inside global addresses which are


available for translation.

Pool Name:- This is the name of pool. We can choose any descriptive
name here.

Start IP Address:- First IP address from the IP range which is available


for translation.

End IP Address :- Last IP address from the IP range which is available


for translation. There is no minimum or maximum criteria for IP range
for example we can have a range of single IP address or we can have a
range of all IP address from a subnet.
Subnet Mask :- Subnet mask of IP range

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy