CN Lab File
CN Lab File
MAHARASHTRA
AMITY INSTITUTE OF INFORMATION
TECHNOLOGY
COMPUTER NETWORK
LAB FILE
Enrollment.No:A71004821030
AMITY UNIVERSITY MUMBAI
Established vide Maharashtra Act No.13 of 2014, of Government of Maharashtra, and recognized under Section 2 (f) of UGC Act 1956.
CERTIFICATE
PROCEDURE:
HUB:
1. Connect four PCs to a HUB in cisco packet tracer.
2. configure each PC with IP address and subnet mask.
3. select the simulation tab.
4. Edit filters for ARP and ICMP.
5. Take a simple PDU, and select a source and destination PC for it.
6. Press Auto Capture/Play button
7. observe the HUB operation.
SWITCH:
1. Connect four PCs to a switch in cisco packet tracer.
2. configure each PC with IP address and subnet mask.
3. select the simulation tab.
4. Take a simple PDU, and select a source and destination PC for it.
5. Press Auto Capture/Play button
6. observe the switch operation.
7. ping all other PCs from each PC.
ROUTER:
1. Connect Two routers with a serial connection and connect a switch
to each router in cisco packet tracer.
2. connect four PCs to each switch.
3. configure the serial and fastethernet interfaces for ip addresses on
each router
4. Define static routes on each router
5. configure each PC with IP address and subnet mask.
6. check the connectivity between two PCs belonging to different
networks (routers)
7. select the simulation tab.
8. Take a simple PDU, and select a source and destination PC for it.
9. Press Auto Capture/Play button
10. observe the router operation
Experiment 2
Aim : Study of network IP
• Classification of IP address
• Sub netting
• Super netting
Apparatus (Software): NA
Procedure: Following is required to be study under this practical.
• Classification of IP address
As show in figure we teach how the ip addresses are classified and
when they are used.
A computer network is a group of computers and various networking
devices that connect to share information and resources. To uniquely
identify each computer or networking device in the network, computer
networks also use addresses. Addresses in computer networks are
known as IP addresses. An IP address consists of two components: the
network address and the host address. The network address is used to
find the subnet in which the computer or the device is located and the
host address is used to find the computer or the device in the subnet. If
a large computer network is divided into smaller groups, each group is
known as a subnet.
There are two versions of IP addresses: IPv4 and IPv6. The length of IP
addresses is different in both versions. Both versions also use different
formats to differentiate between network addresses and host
addresses
Experiment 3
Aim : Study of Subnetting scenario.
Objective :- Learn what IP Subnetting is, Subnetting
components such as Network ID, Broadcast ID, network portion, host
portion, FLSM, VLSM, Subnetting eligible bits, reserved network bits
and host bits including Subnetting rules in detail.
What is IP Subnetting ?
IP Subnetting is a process of dividing a large IP network in smaller IP
networks. In Subnetting we create multiple small manageable
networks from a single large IP network.
Both addresses are 32 bits in length. These bits are divided in four
parts. Each part is known as octet and contains 8 bits. Octets are
separated by periods and written in a sequence.
Subnet
THEORY:
Ifconfig commands:
ifconfig is used to configure, or view the configuration of, a
network interface. ifconfig stands for
"interface configuration". It is used to view and change the
configuration of the network interfaces on
your system.
Ping commands:
ping is a simple way to send network data to, and receive
network data from, another computer on a
network. It is frequently used to test, at the most basic level,
whether another system is reachable over a
network, and if so, how much time it takes for that data to be
exchanged. The ping utility uses the
ICMP protocol's mandatory ECHO_REQUEST datagram to elicit
an ICMP
ECHO_RESPONSE from
a host or gateway. ECHO_REQUEST datagrams ("pings") have an
IP and ICMP header, followed by a
struct timeval and then an arbitrary number of "pad" bytes
used to fill out the packet.
nslookup commands:
The nslookup command is used to query internet name servers
interactively for information. nslookup,
which stands for "name server lookup", is a useful tool for
finding out information about a named
domain. By default, nslookup will translate a domain name to
an IP address (or vice versa)
Experiment 5
Aim: Configure a network having four PCs and a switch
Procedure:
Objectives:
Procedure:
a. Using the proper cable, connect the FastEthernet0/0 on Customer
Router to the FastEthernet0/1 on Customer Switch.
Procedure:
a. Using the appropriate cable, connect the router port to the first
available switch port. Click the Config tab on the router. Select the
interface and ensure that the On box is checked.
c. Using the appropriate cable, connect the existing PCs to the new
switch.
Step 1: Prepare the network for Simulation mode. Verify that the
network is ready to send and receive traffic. All the link lights should be
green. If some link lights are still amber, you can switch between
Simulation and Realtime mode several times to force the lights to turn
green faster. Switch to Simulation mode before going to the next step.
Pool Name:- This is the name of pool. We can choose any descriptive
name here.