0% found this document useful (0 votes)
6 views

CNE PR1

The document provides detailed instructions for configuring various network setups using Cisco Packet Tracer, including peer-to-peer networks, physical networks with routers and switches, and different topologies like star, ring, and tree. It also explains the installation of network interface cards (NICs), setting up DHCP servers, FTP clients/servers, and Telnet services, along with the Internet Layer Protocols and TCP/IP model. Additionally, it includes command usage for network diagnostics and subnetting for a Class C network address.

Uploaded by

pizzabliss55
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

CNE PR1

The document provides detailed instructions for configuring various network setups using Cisco Packet Tracer, including peer-to-peer networks, physical networks with routers and switches, and different topologies like star, ring, and tree. It also explains the installation of network interface cards (NICs), setting up DHCP servers, FTP clients/servers, and Telnet services, along with the Internet Layer Protocols and TCP/IP model. Additionally, it includes command usage for network diagnostics and subnetting for a Class C network address.

Uploaded by

pizzabliss55
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

1.

Configure Peer-to-Peer Network with at least three hosts using CISCO Packet Tracer:
 1. Connect all 3 pc to switch (using cross over cable)
 2. Assign the IP address to all PCs (select each pc-;Desktop ;IP configuration) with
same subnet mask
 3. Verify the connection using command prompt
( select one pc; Desktop ;Command Prompt)
 4. Ping ip address (sending the messages from one pc to another pc)

2. Create a small physical Network using 6 computers, one router and two switches. Configure
all devices:
 1. Give all the computers IP address in the same subnet mask(same default
Gateway for same network)
 2. For Router configuration, click on Router; configure; IP configuration Gigabit
Ethernet 0/0 (Give default gateway address for first network)
Repeat the procedure for second network
 3. Turn ON the Router connection
 4. All device connection will turn in Green color.
 5. Select the packet from menu bar, and place where we want to send and receive
message.
 6. Use Simulation mode to see the process.

3. Create a network setup of laboratory using STAR topology:


 In this type of topology all the computers are connected to a single hub through a
cable. This hub is the central node and all others nodes are connected to the central
node.
 Features of Star Topology
1. Every node has its own dedicated connection to the hub.
2. Hub acts as a repeater for data flow.
3. Can be used with twisted pair, Optical Fiber or coaxial cable.

4. Explain Ring and Tree Topology in detail. Draw the network structure layout with its
topology for network set-up.

 RING:
 It is called ring topology because it forms a ring as each computer is connected to
another computer, with the last one connected to the first. Exactly two neighbors
for each device.
 Features of Ring Topology
1. A number of repeaters are used for Ring topology with large number of nodes,
because if someone wants to send some data to the last node in the ring topology
with 100 nodes, then the data will have to pass through 99 nodes to reach the 100th
node. Hence to prevent data loss repeaters are used in the network.
2. The transmission is unidirectional, but it can be made bidirectional by having 2
connections between each Network Node, it is called Dual Ring Topology.
 3. In Dual Ring Topology, two ring networks are formed, and data flow is in opposite
direction in them. Also, if one ring fails, the second ring can act as a backup, to keep
the network up.
 4. Data is transferred in a sequential manner that is bit by bit. Data transmitted, has
to pass through each node of the network, till the destination node.

 TREE:
 It has a root node and all other nodes are connected to it forming a hierarchy. It is
also called hierarchical topology. It should at least have three levels to the hierarchy.
 Features of Tree Topology
 1. Ideal if workstations are located in groups.
 2. Used in Wide Area Network.

 Find out the MAC Address of given PC:

Enter ipconfig /all into the Command Prompt window and press Enter on your keyboard.

5. Prepare and test straight through cable, Write the color coding and procedure:
 Prepare straight through cable procudure:
1. Cut into the plastic sheath 1 inch from the end of the cut cable. The crimping
tool has a razor blade that will do the trick. Untwist it and pair of the similar
colors.
 Pinch the wires between your fingers and straighten them out.
(The wire colors line up to form a standard cat 5 cable)
 Use scissors to make a straight out across the wires 1/2 Inch from the
 cut sleeve to the end of the wires. Push the wires into the connector.
6. Setup a FTP client/server and transfer the file from one pc to another. Draw the diagram and
write the procedure:

 Procedure:
1.Configure all devices (assign IP address) server router switch
2. for Router configuration, click on Router; configure; IP configuration- Gigabit
Ethernet 0/0 and Ethernet 0/1
3. Enable port status (on)
4. for server configuration, click on server; Desktop Assign IP address
5. Again Desktop; Services; select FTP (You can assign the new username and
password) And enable write, read, rename and add.
 To Upload File
1. Select PC1; Text Editor; Write some content; Save the file using .txt extension;
close.
 To access the file
2. Select command prompt and type
ping IP address (FTP server IP address)
ftp IP address
 To Login; enter Username and Password
Now you are login to the FTP , type ftp; put filename to upload file
Transfer complete.....
 To download the file
1. Select PC2; command prompt; ftp IP address
2. Enter username and password for login
3. ftp; get filename.

7. Explain the installation of NIC and identify the MAC Address of your PC.
 1. Unplug the power cable on your computer power supply.
 2. Open your PC case, there are usually two screws at the back of your PC, unscrew
it and set aside the screw. Some pc case don‘t have screws to remove the cover you
just have to slide the cover to open
 3. Discharge yourself from any static charge that my damage the component before
touching any pc component
 4. Find an available PCI slot on your motherboard. PCI slot can be easily
distinguished over PCI-E since PCI slot are shorter in length than PCI-E slots except
for PCI-E 1x slot which is shorter than PCI slot. Refer to the image below.
 5. Install the NIC card by aligning the guide notches with the PCI slot and pressing
the card gently till it sit firmly on the PCI slot,
 6. Secure the card by using a single screw, screwing the card bracket firmly to the
computer casing.
 7. Plug in the power cord to the power supply and power on your computer. Wait
for windows to load, a ―new device detected‖ message by windows should appear
and it will install the necessary driver or ask you for the device driver, after the
installation of device driver you can install its software if it has.
 8. Check device manager if the driver is installed properly, you should see no yellow
exclamation on the NIC device.
 9. If everything works out right then you can now close your computer casing and
return the screw at the back of your PC

 {in short}
1. Power off computer and unplug power cable.
2. Open PC case (unscrew or slide cover).
3. Discharge static electricity by touching metal.
4. Identify available PCI slot on motherboard.
5. Align NIC card with PCI slot and gently insert.
6. Secure NIC card with screw to case.
7. Plug in power cable and power on computer.
8. Windows detects new device, installs driver.
9. Check Device Manager for proper driver installation.
10. Close PC case and replace screws.

8. Create a network setup and configure DHCP server:


 1. Select server -:> Desktop -> IP config (Assign the ip address)
IPV4 address -> 10.0.0.1
subnetmask - 255.0.0.0
Default gateway - 10.0.0.2
DNS Server -10.0.0.3
 2. Service -> DHCP ->ON
Default gateway ->10.0.0.2
DNS Server -> 10.0.0.3
Start IP address 10.0.0.4-> Save- Close
 3. Click PC0 -> IP config ->DHCP
Automatically assign IP address (repeat the process for PC1 &PC2)
 4. To verify the process, select PDU or type ping in command prompt
 5. Use simulation to see the process.

9. Configure and use TELNET client server. Draw the diagram and write the procedure:
 Procedure
Enabling the Telnet Server
 1. Go to Start -> Control Panel -> Programs.
 2. In the Programs and Features section, click Turn Windows features on or
off. If the User Account Control permission warning pops up, click on
Continue. And if you are prompted for an administrator password, type it in.
 3. In the Windows Features dialog box, select the Telnet Server check box.
 4. Click OK and wait for the installation to finish.
Starting the Telnet Server:
 1. Go to Control Panel, and then go to System -> Administrator Tools.
 2. Click on the Services applet (services.msc if you prefer to use Run command or
Start Search).
 3. Locate the ―Telnet‖ service, right-click on it and select Properties.
 4. In the Startup Type drop down menu, select ―Automatic‖ instead of ―Disabled‖.
 5. Click on Apply button.
 6. Right-click on the ―Telnet‖ service again, but this time select Start option
on right-click context menu. Telnet Server service should be running after this.
 7. Click OK

10. Create IPV6 environment in a small network using simulator(One router, 2 PCs):
1. **Select Simulator**: Choose a network simulator like Cisco Packet Tracer or GNS3.
2. **Add Devices**:
- Add one router to the network topology.
- Add two PCs to the network topology.
3. **Connect Devices**:
- Connect the router to each PC using Ethernet cables.
4. **Configure Router**:
- Assign IPv6 addresses to router interfaces:
- Configure the router's LAN interface with a global unicast IPv6 address.
- Enable IPv6 routing on the router.
5. **Configure PCs**:
- Assign IPv6 addresses to each PC:
- Use unique global unicast IPv6 addresses for each PC.
- Configure the PCs with the IPv6 address of the router's LAN interface as their default
gateway.
6. **Test Connectivity**:
- Verify that the PCs can ping each other and ping the router's LAN interface using IPv6
addresses.
- Verify that the PCs can access external IPv6 resources if available.
7. **Optional**:
- Implement additional IPv6 features such as DHCPv6 for automatic address configuration.
- Implement IPv6 access control lists (ACLs) on the router for security purposes.

11. Explain Internet Layer Protocol: IP, ARP, RARP and ICMP:
 IP: It is a protocol through which data is sent from one host to another over the
internet. It is used for addressing and routing data packets so that they can reach
their destination.
 ARP: ARP is a protocol that helps in mapping Logical addresses to the Physical
addresses acknowledged in a local network. For mapping and maintaining a
correlation between these logical and physical addresses a table known as ARP
cache is used.
 ICMP: It is a layer 3 protocol that is used by network devices to forward operational
information and error messages. It is used for reporting congestions, network errors,
diagnostic purposes, and timeouts.
 RARP (Reverse ARP): It is a networking protocol used by the client system in a local
area network (LAN) to request its IPv4 address from the ARP gateway router table. A
table is created by the network administrator in the gateway-router that is used to
find out the MAC address to the corresponding IP address.

12. Run Following Commands: Explain each use of commands and write output
1. Ping (-t, -a, -n count, -l size):
 -t: Pings the specified host until interrupted (press Ctrl+C to stop sending).
 -a: Resolves addresses to hostnames.
 -n: count Indicates the number of Echo Requests to send.
 -l: size Sends a specific size of data. If this size is greater than the local network
can handle, thesender will generate fragmented packets directly on the
network.
2. ipconfig (/?, /all):
 /?: Displays the help message.
 /all: Displays complete configuration information.
3. NETSTAT(-a, -f)
 -a: Lists all current connections and open, listening ports on the local system.
 -f: Displays fully qualified domain names (FQDN).
4. ARP( -a)
 -a or –g: Displays current entries in the ARP cache. If inet_addr is specified, the
IP and data link address of the specified computer appear. If more than one
network interface uses ARP, entries for each ARP table appear.

5.Tracert:

 -d: Tells the system not to resolve addresses to host names.


 -h: maxHops Specifies the maximum number of hops to search for target.
 -w: timeout Specifies the number of milliseconds to wait for each reply.
 -4: Specifies to use IPv4 specifically.
 -6: Specifies to use IPv6 specifically.

13. Explain TCP/IP Model and it's Layers in detail.


TCP/IP Reference Model is a four-layered suite of communication
protocols.
The four layers in the TCP/IP protocol suite are:
 Host-to- Network Layer: It is the lowest layer that is
concerned with the physical transmission of data. TCP/IP does
not specifically define any protocol here but supports all the
standard protocols.
 Internet Layer: It defines the protocols for logical
transmission of data over the network. The main protocol in
this layer is Internet Protocol (IP) and it is supported by the
protocols ICMP, IGMP, RARP, and ARP.
 Transport Layer: It is responsible for error-free end-to-end
delivery of data. The protocols defined here are Transmission
Control Protocol (TCP) and User Datagram Protocol (UDP).
 Application Layer: This is the topmost layer and defines the
interface of host programs with the transport layer services.
This layer includes all high-level protocols like Telnet, HTTP,
FTP, SMTP, etc.
14. Design a network class ‘c’ with network address 192.156.5.0 with 2 subnet. State the subnet
mask and subnet address.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy