CNE PR1
CNE PR1
Configure Peer-to-Peer Network with at least three hosts using CISCO Packet Tracer:
1. Connect all 3 pc to switch (using cross over cable)
2. Assign the IP address to all PCs (select each pc-;Desktop ;IP configuration) with
same subnet mask
3. Verify the connection using command prompt
( select one pc; Desktop ;Command Prompt)
4. Ping ip address (sending the messages from one pc to another pc)
2. Create a small physical Network using 6 computers, one router and two switches. Configure
all devices:
1. Give all the computers IP address in the same subnet mask(same default
Gateway for same network)
2. For Router configuration, click on Router; configure; IP configuration Gigabit
Ethernet 0/0 (Give default gateway address for first network)
Repeat the procedure for second network
3. Turn ON the Router connection
4. All device connection will turn in Green color.
5. Select the packet from menu bar, and place where we want to send and receive
message.
6. Use Simulation mode to see the process.
4. Explain Ring and Tree Topology in detail. Draw the network structure layout with its
topology for network set-up.
RING:
It is called ring topology because it forms a ring as each computer is connected to
another computer, with the last one connected to the first. Exactly two neighbors
for each device.
Features of Ring Topology
1. A number of repeaters are used for Ring topology with large number of nodes,
because if someone wants to send some data to the last node in the ring topology
with 100 nodes, then the data will have to pass through 99 nodes to reach the 100th
node. Hence to prevent data loss repeaters are used in the network.
2. The transmission is unidirectional, but it can be made bidirectional by having 2
connections between each Network Node, it is called Dual Ring Topology.
3. In Dual Ring Topology, two ring networks are formed, and data flow is in opposite
direction in them. Also, if one ring fails, the second ring can act as a backup, to keep
the network up.
4. Data is transferred in a sequential manner that is bit by bit. Data transmitted, has
to pass through each node of the network, till the destination node.
TREE:
It has a root node and all other nodes are connected to it forming a hierarchy. It is
also called hierarchical topology. It should at least have three levels to the hierarchy.
Features of Tree Topology
1. Ideal if workstations are located in groups.
2. Used in Wide Area Network.
Enter ipconfig /all into the Command Prompt window and press Enter on your keyboard.
5. Prepare and test straight through cable, Write the color coding and procedure:
Prepare straight through cable procudure:
1. Cut into the plastic sheath 1 inch from the end of the cut cable. The crimping
tool has a razor blade that will do the trick. Untwist it and pair of the similar
colors.
Pinch the wires between your fingers and straighten them out.
(The wire colors line up to form a standard cat 5 cable)
Use scissors to make a straight out across the wires 1/2 Inch from the
cut sleeve to the end of the wires. Push the wires into the connector.
6. Setup a FTP client/server and transfer the file from one pc to another. Draw the diagram and
write the procedure:
Procedure:
1.Configure all devices (assign IP address) server router switch
2. for Router configuration, click on Router; configure; IP configuration- Gigabit
Ethernet 0/0 and Ethernet 0/1
3. Enable port status (on)
4. for server configuration, click on server; Desktop Assign IP address
5. Again Desktop; Services; select FTP (You can assign the new username and
password) And enable write, read, rename and add.
To Upload File
1. Select PC1; Text Editor; Write some content; Save the file using .txt extension;
close.
To access the file
2. Select command prompt and type
ping IP address (FTP server IP address)
ftp IP address
To Login; enter Username and Password
Now you are login to the FTP , type ftp; put filename to upload file
Transfer complete.....
To download the file
1. Select PC2; command prompt; ftp IP address
2. Enter username and password for login
3. ftp; get filename.
7. Explain the installation of NIC and identify the MAC Address of your PC.
1. Unplug the power cable on your computer power supply.
2. Open your PC case, there are usually two screws at the back of your PC, unscrew
it and set aside the screw. Some pc case don‘t have screws to remove the cover you
just have to slide the cover to open
3. Discharge yourself from any static charge that my damage the component before
touching any pc component
4. Find an available PCI slot on your motherboard. PCI slot can be easily
distinguished over PCI-E since PCI slot are shorter in length than PCI-E slots except
for PCI-E 1x slot which is shorter than PCI slot. Refer to the image below.
5. Install the NIC card by aligning the guide notches with the PCI slot and pressing
the card gently till it sit firmly on the PCI slot,
6. Secure the card by using a single screw, screwing the card bracket firmly to the
computer casing.
7. Plug in the power cord to the power supply and power on your computer. Wait
for windows to load, a ―new device detected‖ message by windows should appear
and it will install the necessary driver or ask you for the device driver, after the
installation of device driver you can install its software if it has.
8. Check device manager if the driver is installed properly, you should see no yellow
exclamation on the NIC device.
9. If everything works out right then you can now close your computer casing and
return the screw at the back of your PC
{in short}
1. Power off computer and unplug power cable.
2. Open PC case (unscrew or slide cover).
3. Discharge static electricity by touching metal.
4. Identify available PCI slot on motherboard.
5. Align NIC card with PCI slot and gently insert.
6. Secure NIC card with screw to case.
7. Plug in power cable and power on computer.
8. Windows detects new device, installs driver.
9. Check Device Manager for proper driver installation.
10. Close PC case and replace screws.
9. Configure and use TELNET client server. Draw the diagram and write the procedure:
Procedure
Enabling the Telnet Server
1. Go to Start -> Control Panel -> Programs.
2. In the Programs and Features section, click Turn Windows features on or
off. If the User Account Control permission warning pops up, click on
Continue. And if you are prompted for an administrator password, type it in.
3. In the Windows Features dialog box, select the Telnet Server check box.
4. Click OK and wait for the installation to finish.
Starting the Telnet Server:
1. Go to Control Panel, and then go to System -> Administrator Tools.
2. Click on the Services applet (services.msc if you prefer to use Run command or
Start Search).
3. Locate the ―Telnet‖ service, right-click on it and select Properties.
4. In the Startup Type drop down menu, select ―Automatic‖ instead of ―Disabled‖.
5. Click on Apply button.
6. Right-click on the ―Telnet‖ service again, but this time select Start option
on right-click context menu. Telnet Server service should be running after this.
7. Click OK
10. Create IPV6 environment in a small network using simulator(One router, 2 PCs):
1. **Select Simulator**: Choose a network simulator like Cisco Packet Tracer or GNS3.
2. **Add Devices**:
- Add one router to the network topology.
- Add two PCs to the network topology.
3. **Connect Devices**:
- Connect the router to each PC using Ethernet cables.
4. **Configure Router**:
- Assign IPv6 addresses to router interfaces:
- Configure the router's LAN interface with a global unicast IPv6 address.
- Enable IPv6 routing on the router.
5. **Configure PCs**:
- Assign IPv6 addresses to each PC:
- Use unique global unicast IPv6 addresses for each PC.
- Configure the PCs with the IPv6 address of the router's LAN interface as their default
gateway.
6. **Test Connectivity**:
- Verify that the PCs can ping each other and ping the router's LAN interface using IPv6
addresses.
- Verify that the PCs can access external IPv6 resources if available.
7. **Optional**:
- Implement additional IPv6 features such as DHCPv6 for automatic address configuration.
- Implement IPv6 access control lists (ACLs) on the router for security purposes.
11. Explain Internet Layer Protocol: IP, ARP, RARP and ICMP:
IP: It is a protocol through which data is sent from one host to another over the
internet. It is used for addressing and routing data packets so that they can reach
their destination.
ARP: ARP is a protocol that helps in mapping Logical addresses to the Physical
addresses acknowledged in a local network. For mapping and maintaining a
correlation between these logical and physical addresses a table known as ARP
cache is used.
ICMP: It is a layer 3 protocol that is used by network devices to forward operational
information and error messages. It is used for reporting congestions, network errors,
diagnostic purposes, and timeouts.
RARP (Reverse ARP): It is a networking protocol used by the client system in a local
area network (LAN) to request its IPv4 address from the ARP gateway router table. A
table is created by the network administrator in the gateway-router that is used to
find out the MAC address to the corresponding IP address.
12. Run Following Commands: Explain each use of commands and write output
1. Ping (-t, -a, -n count, -l size):
-t: Pings the specified host until interrupted (press Ctrl+C to stop sending).
-a: Resolves addresses to hostnames.
-n: count Indicates the number of Echo Requests to send.
-l: size Sends a specific size of data. If this size is greater than the local network
can handle, thesender will generate fragmented packets directly on the
network.
2. ipconfig (/?, /all):
/?: Displays the help message.
/all: Displays complete configuration information.
3. NETSTAT(-a, -f)
-a: Lists all current connections and open, listening ports on the local system.
-f: Displays fully qualified domain names (FQDN).
4. ARP( -a)
-a or –g: Displays current entries in the ARP cache. If inet_addr is specified, the
IP and data link address of the specified computer appear. If more than one
network interface uses ARP, entries for each ARP table appear.
5.Tracert: